{"text": "Our PONPlatform is now able to handle up to 10G traffic ethernet for both XGS-PON Analyzer and OLT emulator firmware.\nKeeping the same hardware with just a change on the transceiver, the new XG/XGS-PON firmware will give you access to the traffic user data and will push the limit of your test. MT2 team elevates once again the NIVA PON Analyzer and the OLT emulator to a whole new level of performance.\nWorking on the existing XG and XGS-PON protocols, these firmware are now available on sale.\nIf you want to know more about our solutions, please contact us at email@example.com", "label": "Yes"} {"text": "The TM-5040-16 is a medical-grade all-in-one PC with a 15.6” widescreen touch display. Running the latest Skylake i3/i5 processors and a fanless cooling system, this unit is ready for reliable use in any healthcare facility. Choose from a resistive touchscreen or a projected capacitive interface. The unit housing has anti-bacterial properties to stop the growth of germs. Each computer is EN/UL 60601-1 medically certified.\n- 15.6\" True Flat IP65 Protected Touchscreen\n- Intel Skylake i3/i5 Dual-core CPU\n- Silent & Fanless Cooling System\n- fTPM 2.0, Intel® vPro™ Technology Supported\n- Anti-bacterial Plastic Housing\n- IEC 60601-1 4th Edition Medical Certification", "label": "Yes"} {"text": "Photoluminescence characteristics of porous silicon layers (PSLs) doped with Er or Yb ions are studied. 10μm thick PSLs with a luminescence centered at ∼ 0.8μm are formed by anodic etching of p-type silicon wafers of several Ω-cm resistivity. Rare-earth ions are electrochemically incorporated into PSLs. The Er3+-related luminescence at 1.54μm as well as the Yb3+-related luminescence at 1.0μm is observed at room temperature after annealing at high temperatures (>900°C). The Er-related luminescence is enhanced after annealing in O2, whereas the Yb3+-related luminescence needs oxygen-free atmosphere (H2) for the optical activation. The luminescence decay time of the rare earth ions as well as the host PSLs is measured and the energy transfer mechanism is discussed.", "label": "Yes"} {"text": "Jauch JOH, JOD and JOE series\nThese quartz crystal oscillators with HCSL, LVDS or (LV)PECL output are particularly suitable for the interference-suppressed transmission of fast data streams with low interference.\nThese quartz crystal oscillators are used in extreme high speed data transmission systems. The Jauch JOH, JOD and JOE series oscillators meet the technical requirements of these systems.\nThe Jauch JOE and JOD series:", "label": "Yes"} {"text": "HeyClip™ Lockit™ Cable Clips with a Hinged Locking Top are the perfect choice for low-profile applications. Their unique locking design snap-locks the wire saddle for up to a 0.063 panel thickness. Wire Saddles, as they are commonly called, are ideal for routing single wires, fiber optic cable, or bundles and the hinge eases insertion with no danger of crimping.\nThese Short Cable Clips with an Arrow head Prong are a perfect choice for low-profile applications where cables must have freedom of movement. The arrowhead prong snap-locks the saddle into a 0.138\" diameter hole in a 0.063\" panel, and allows the saddle to rotate in its mounting hole. This reduces strain on moving cables. Commonly called, \"Wire Saddles,\" these cable clips are ideal for routing wires or fiber optic cable, providing easy top-load insertion and protection from abrasion.\nSwivel clips provide complete 360° rotation for infinite and independent mounting possibilities. Each two-component assembly rotates with respect to one another and can accommodate different panel sizes and orientations, eliminating the number of fasteners required for a given application, process or installation. By mixing and matching components, unique solutions can be created: cable tie strap with fir tree, double cable tie strap, cable tie strap with edge clip or tape-on, cable tie strap with c-clip, double c-clip, and more.", "label": "Yes"} {"text": "Once again the touch sensing products based on Zytronics proprietary Projected Capacitive Technology (PCT) are helping to create a more environmentally sustainable future. The company has confirmed that, through French distribution partner Eurocomposant, its touch sensors have been specified for the user interfaces of IERs Autolib electric car hire stations currently being deployed in Paris and 46 cities of Ile-de-France region.\nTrials of Autolib in the French capital began in early October 2011. The intention of this project is to bring about a marked reduction in the citys traffic congestion as well as curbing its pollution levels. The self-service hiring stations work on similar principles to the bicycle rental systems already being used in many urban areas across Europe. Commuters and tourists alike will be able to go their nearest Autolib station and use the automated payment system to gain access to an electric car. Then they can travel to their desired destination, simply dropping the vehicle off at a station nearby, where recharging will take place ready for the next customer.\nThe user interface in each hire station employs a 12.1-inch format ZYBRID®PCT-based touchscreen made from 6mm thick toughened glass to ensure high levels of impact resistance. The anti-vandal and weather proof rugged touchscreens feature an anti-glare treatment on the front surface to improve readability in direct sunlight and enhance the overall experience. Proven and patented, Zytronics proprietary PCT touch sensing mechanism works on the principle of detecting subtle changes in the modulated charge signal passing through a matrix of micro-fine copper capacitors, embedded into a robust laminated substrate. These capacitors are only 10µm in thickness and so do not impinge on the brightness or clarity of the display. The substrate in which the sensor matrix is held can be made from thick glass or placed behind an additional protective overlay, giving it a high degree of durability and ensuring the touchscreens functional longevity.\nDue to the nature of the touch sensing mechanism (requiring proximity to the users finger) and with the active area totally isolated from the external environment, its function is unaffected by the build-up of dirt, scratches, harsh chemicals, presence of liquid on the screen surface, vibration or shock which would cause almost all alternative touchscreen technologies to fail in a short period of time. In practical terms, this means PCT minimises the need for costly repair call outs or ongoing maintenance work. Furthermore, the PCT sensors can be designed to forego a bezel around the perimeter of the screen, something that is mandatory for optical and infrared (IR), and most surface acoustic wave (SAW) touchscreens. As a result PCT enables OEMs to realise modern, attractive and easy to clean, smooth-fronted designs.\nAs Julien Berger, Sales Director at Eurocomposant, explains, For this application it was necessary to provide a lightweight, highly robust touchscreen solution that was very well suited to installation in an open air environment and could ensure a prolonged operation. This is exactly the sort of setting that Zytronic touch sensors thrive in. They safeguard against the risk of system downtime and allow running costs to be kept to an absolute minimum.\nWhen looking into the touch sensor component of this project, we knew that the sensing solution we would choose had to prove it could cope with the rigours of outdoor deployment, such as extremes of temperature, exposure to wind and rain, even potential vandalism, says Delphine Dahan, Head of Purchasing at IER. Specifying PCT, with its formidable track record in public use and industrial sectors, has given us total assurance in continued high performance regardless of the conditions faced.\nAutolib has the potential to change metropolitan transportation irrevocably and we are pleased to have played a part in it, concludes Ian Crosby, Sales & Marketing Director at Zytronic. PCTs drift-free operation and responsiveness in the most demanding environments, its resilience to the various forms of harm that can shorten the lifespan of other touch sensor technologies, plus crucially, its ability to be operated through gloved hands make it an optimal solution for this kind of application.\nZytronic designs and manufactures a range of technologies that optimise the performance of electronic display applications. The companys principle products include award-winning touchscreen technologies, optical filters for enhanced performance and protection, and special filters to minimise electromagnetic emissions. In addition, the company can offer complex shaped glass composites for specialised applications.\nZytronic products are used in electronic displays for information kiosks, web phones, ATMs and gaming machines, as well as by military, computer, telecommunications, medical and lighting OEMs, and are available from its network of worldwide distributors.\nThe company is headquartered at its state-of-the-art manufacturing facility in Blaydon, Tyne & Wear in the UK. In addition to ISO-approved manufacturing (including ISO 14001:2004), this facility is responsible for ongoing product development in composite technology and is home to Zytronics team of lamination, material science and electronics specialists.\nFor more company information, visit Zytronics web site at www.zytronic.co.uk or find us on", "label": "Yes"} {"text": "File(s) under permanent embargo\nDirect measurement of surface forces due to charging of solids immersed in a nonpolar liquid\njournal contributionposted on 2002-05-01, 00:00 authored by W Briscoe, Roger Horn\nDirect measurements of a long-range force between charged solid surfaces in a nonpolar liquid are presented for the first time. Measurements were made between mica surfaces in solutions of the anionic surfactant sodium di-2-ethylhexylsulfosuccinate (AOT) at millimolar concentrations in n-decane using a surface force apparatus which has been modified to improve its sensitivity for detecting a weak and long-range force. Modifications include a magnetic drive system, the use of a weak cantilever spring with the apparatus mounted in a vertical configuration, and a detailed consideration of the interference optics to allow accurate measurements of surface separations up to several micrometers. The results show a repulsion that is well fitted by theoretical curves based on a model in which only counterions enter the calculation, in other words, in the absence of a reservoir of ions in the solvent. Fitting the theory to the data allows an estimate of the mica surface charge density of ∼1 mC/m2. A mechanism for surface charging of mica in this solution is proposed, which includes a role for trace amounts of water that are inevitably present and adsorbed surface aggregates of AOT. The relevance of the results to previously observed charge stabilization of colloids in nonaqueous solvents is discussed.", "label": "Yes"} {"text": "- Press Release\n- Oct 31, 2023\nGlobal Helium Abundance Measurements in Solar Corona\nA composite image of the Sun showing the hydrogen (left) and helium (center and right) in the low corona. The helium at depletion near the equatorial regions is evident. (Courtesy NASA)\nTwo U.S. Naval Research Laboratory Space Science Division (SSD) researchers joined an international cadre of scientists July 27 in presenting the results of the first simultaneous global solar corona images of the helium and hydrogen emission that is helping scientists to better understand the space environment.\nThe paper, “Global Helium Abundance Measurements in the Solar Corona,” was published online in Nature Astronomy and discusses the abundance of helium relative to hydrogen in the solar corona, the outer atmosphere of the sun, seen from earth only during eclipses.\nNRL Astrophysicist Dennis Wang, Ph.D., software lead for the HElium Resonance Scattering in the Corona and HEliosphere (HERSCHEL) rocket flight, was responsible for flight and ground software. His NRL colleague, Research Physicist Martin Laming, Ph.D., managed the new model of element abundance fractionation, to include helium.\n“Understanding space weather is important for space situational awareness, that is, forecasting and mitigating the effects of solar activity on Navy and Defense Department satellites,” said Laming. “This was one case where instead of explaining the observations after the fact, I was able to see a prediction I had made come true.”\nThe HERSCHEL sounding rocket, launched Sep. 14, 2009, provided a number of technological advances in space-based remote sensing. Using a concept developed at NRL for a coronagraph functioning in the extreme ultraviolet regime of the electromagnetic spectrum, the helium coronagraph obtained the first images of the solar atmosphere in the region of the solar wind source surface from light resonantly scattered from helium ions.\nThe leading model for solar wind variability used by the Department of Defense and National Oceanic and Atmospheric Administration space weather forecasters is an NRL SSD product, known as the Wang, Sheely, Arge Model which is based on simple assumptions about the relation of the solar magnetic field structure and the solar wind, and is reasonably successful in predicting the overall variability of the solar wind as it reaches Earth.\nGeomagnetic storms impact radio frequency transmission at frequencies refracted, or reflected, by the ionosphere. The Navy uses magnetic sensors in various battlespace applications, which could be disrupted during large geomagnetic storms and Coronal Mass Ejections. These are major reasons why the Navy is interested in disruptions of the Earth’s magnetic field structure in these measurements.\n“There is a long chain of work efforts that go from fundamental understanding of the solar atmosphere, to specifying the observables that need to be monitored before we eventually get to reliable Space Weather forecasts,” said Laming. “In the future, service members should anticipate more reliable satellite-based Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance.”\nLaming demonstrates a strong belief in his model’s prediction capability and his understanding of the sun’s corona adding, “I think we all have more confidence in my model and the conclusions one might draw from it.”\nAbout the U.S. Naval Research Laboratory\nNRL is a scientific and engineering command dedicated to research that drives innovative advances for the Navy and Marine Corps from the seafloor to space and in the information domain. NRL headquarters is located in Washington, D.C., with major field sites in Stennis Space Center, Mississippi; Key West, Florida; and Monterey, California, and employs approximately 2,500 civilian scientists, engineers and support personnel.", "label": "Yes"} {"text": "The disc was recorded in Video mode.\nCannot play a disc\nrecorded using this\nSome players will not play even a\nrecorder on another\nfinalized disc recorded in Video mode.\nThe disc was recorded in VR mode,\nDiscs recorded with copy-once material\ncannot be played on other players.\nCannot record or did\nThe remaining blank space on the\nnot record successfully.\ndisc is insufficient.\nThe source you are trying to record is\nWhen setting the recording channel, the\nchannel is tuned on the TV's own tuner.\nWhen recording to a Video mode disc,\nprograms that are copy-once\nprotected cannot be recorded.\nTimer recording is not\nClock in recorder is not set to correct\nTimer has been programmed\nTimer record indicator light does not\nappear after programming timer.\nStereo Audio Record\nTV is not Stereo-compatible.\nand/or Playback is not\nBroadcast program is not in stereo\nThe recorder A/V Out jacks are not\nconnected to TV A/V In jacks.\nThe recorder Audio/Video Out is not\nselected for viewing at the TV.\nThe recorder's TV audio channel is\nset to mono.\nThe remote control\nThe remote control is not pointed at\ndoes not work properly.\nthe remote sensor of the recorder.\nThe remote control is too far from the\nThere is an obstacle in the path of the\nremote control and the recorder.\nThe batteries in the remote control\nResetting the recorder\nIf you observe any of the following symptoms...\nThe unit is plugged in, but the power will not turn\non or off.\nThe front panel display is not working.\nThe recorder is not operating normally.\n...you can reset the recorder as follows:\nPress and hold the POWER button for at least five\nseconds. This will force the unit to power off then\nturn the unit back on.\nUnplug the power cord, wait at least five seconds,\nand then plug it in again.\nFinalize the disc. (page 21)\nThe other player must be RW\ncompatible in order to play it.\nUse another disc.\nYou cannot record the source.\nSelect the channel on the recorder's\nbuilt-in TV tuner.\nUse a VR mode formatted disc for\nSet clock to correct time. See \"Clock\nSet\" on page 17\nReprogram Timer. See \"Timer\nRecording\" on page 35.\nMake A/V connections. Stereo is\navailable only via A/V output from the\nSelect AUX or A/V source as TV\nSet TV audio channel mode to Stereo.\nSee \"Changing TV audio channel\" on\nPoint the remote control at the remote\nsensor of the recorder.\nOperate the remote control within\nRemove the obstacle.\nReplace the batteries with new ones.", "label": "Yes"} {"text": "Molecular probes reveal deviations from Amontons' law in multi-asperity frictional contacts\nNature Commun. , Volume 9 p. 888:1- 7\nAmontons' law defines the friction coefficient as the ratio between friction force and normal force, and assumes that both these forces depend linearly on the real contact area between the two sliding surfaces. However, experimental testing of frictional contact models has proven difficult, because few in situ experiments are able to resolve this real contact area. Here, we present a contact detection method with molecular-level sensitivity. We find that while the friction force is proportional to the real contact area, the real contact area does not increase linearly with normal force. Contact simulations show that this is due to both elastic interactions between asperities on the surface and contact plasticity of the asperities. We reproduce the contact area and fine details of the measured contact geometry by including plastic hardening into the simulations. These new insights will pave the way for a quantitative microscopic understanding of contact mechanics and tribology.\nWeber, B., Suhina, T., Junge, T., Pastewka, L., Brouwer, A., & Bonn, D. (2018). Molecular probes reveal deviations from Amontons' law in multi-asperity frictional contacts. Nature Commun., 9, 888:1–7. doi:10.1038/s41467-018-02981-y", "label": "Yes"} {"text": "I fully understand the term duty cycle, but I didn't bring it up because of possible confusion by an unfamiliar term. That exercise is left to those who might use those terms to shock and awe (or don't understand the audience). Why would you want to convert from digital to analog (except for CRT)? The kinds of transistors found in LSI and VLSI chips are typically not amplifiers -- they are binary switches. If they need to vary something, they do it using duty cycle. The signal is modulated into sinus radio frequencies. This is an analog process. Computer people might recognize this as something very much like a MODEM only at a much higher frequency. As for your understanding of how LCD works, here's an explanation from the leader in the use of the technology for TVs: http://sharp-world.com/sc/library/lcd_e/s2_1_1e.htm The key is not the twisting, but rather the spinning of the rods to an endwise orientation which allows the light to pass.", "label": "Yes"} {"text": "In a move that sees the company turn to one of its major rivals for a key technology, Bay Networks Inc has signed with 3Com Corp’s US Robotics unit to enable it to include its x2 56Kbps modem technology in Bay’s 5000 Multi-Service Access Switch (MSX) line. Bay says it was negotiating with USR about the technology before the 3Com acquisition was muted but that the subsequent deal did not change the company’s desire to offer the technology. Bay is the only company aside from USR that has put x2 at the head end, but with USRs position in the consumer market it was clear we had to support it, said Jonathan Sieg, vice president and general manager at Bay’s signal processing group. Bay maintains that taking the technology from 3Com is part of the its recently announced Adaptive Networking strategy that will result in developing open networking industry standards based around IP networks. The deal with USR will see the company offering its x2 technology on its access switch line by September, says Bay. In March, Bay announced that a 56Kbps software upgrade would be available for the 5399 in July, however that was for the rival K56flex technology developed by the rival Lucent Technologies Inc/ Rockwell International Corp K alliance. According to Sieg, that date has now slipped but the K56flex technology will be still be made available and that the two flavors of 56Kbps will be able to run on the same chassis but not share ports. The date for offering K56flex has slipped to sometime in the third quarter – after the x2 upgrade will be ready. Since that announcement both standards have evolved but the USR was a quicker and more solid integration, said Sieg. According to Bay, it has integrated x2 with its Digital Signal Processing (DSP) modem technology and free x2 software downloads for its 5399 Remote Access Concentrator Module for the 5000 MSX platform will be available in September. In addition, 3Com will provide technical specifications and support to Bay Networks. The two companies also say they will participate in x2 interoperability testing. Both K56flex and x2 enable users to download data at speeds up to 56 Kbps.", "label": "Yes"} {"text": "NB-IoT Gains Early Commercial Traction in the US\nThe initial commercial deployments on narrowband Internet of Things (NB-IoT) technology are starting in the country. Three major carriers in the country now offer the technology for potential customers.\nOver the last two weeks, T-Mobile has launched the first commercial NB-IoT service with Twilio for Sensoneo's trash management system in parts of the US. The carrier has also introduced the first NB-IoT asset tracking system in the US.\nT-Mobile initially launched its NB-IoT in July 2018. This was the first nationwide launch in the US.\nAT&T introduced its nationwide NB-IoT on April 29 this year. \"We have not announced any commercial customers since we launched our NB-IoT network in April,\" an AT&T spokeswoman tells Light Reading.\nAT&T certified its first NB-IoT chip module, the Telit ME910C1, on June 19 2019.\nVerizon launched its nationwide NB-IoT network on May 14, 2019. The operator won’'t reveal any details on any \"commercial traffic on any of our networks,\" says a Verizon spokeswoman. \"That would be information our competitors would love to have.\"\nVerizon is testing modules from three vendors -- Quectel, SIM-COM and Telit -- on the network.\nSprint hasn't launched a NB-IoT network yet.\nNB-IoT is a Low Power Wide Area (LPWA) technology that allows transmissions of up to 100-kbit/s with a battery life of ten years. AT&T, T-Mobile and Verizon are all deploying NB-IoT in the guard bands of LTE in 200KHz channels. A guard band is the unused part of spectrum between radio channels.\nPart of the reason NB-IoT is so low-power compared to normal LTE networks is that the narrowband chipsets and modules are designed to transmit small packets of data on the network and then sleep for days, months or even years between data transmissions.\n— Dan Jones, Mobile Editor, Light Reading", "label": "Yes"} {"text": "Surveillance aircraft floating high above Maryland\nBy Bonnie Berkowitz, Todd Lindeman and Gene Thorp, Published: Jan. 22, 2014\nLater this year, a pair of unmanned, blimplike aircraft carrying military radar equipment will rise above suburban Baltimore to watch a 340-mile radius of the East Coast.\nHow they work\nTwo aircraft, or “aerostats,” will float at an altitude of about 10,000 feet. The pair, called an “orbit,” will work in tandem to detect missiles and other objects within their range. One aerostat detects threats using low-frequency, long-range radar. The other uses higher- frequency radar to track threats and provides targeting data that could be used to intercept them.", "label": "Yes"} {"text": "I'm looking for an outdoor enclosure that will hold a 1242 AP, can handle the fittings to pass-through the antenna connection (sealed connectors with pigtails so that we can use patch antennas), and has a cooling fan. The fan must be 48v DC powered as I cannot run AC power out to the AP.\nI like the Tessco (link below), but it is AC powered, and they won't do a 48v DC fan version for the low quantity we want to buy (we don't need a heater).\nTransferring Crash file from standby:\nLogin to the Active WLC in HA.\n(Cisco Controller) >transfer upload datatype crash\n(Cisco Controller) >transfer upload filename \n(Cisco Controller) >transfer up...\nThis is the start of a display filter cross reference between Wireshark and OmniPeek.\nThe 1st installment is a table of advanced filters. More filters will be added as time allows.\nIt is a living doc, so check back for changes every so often\nPlease feel ...\nI have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)\nThe script should be completely self explanatory.\nPowershell SNMP Module (Install-Module -Name SNMP)\nSNMP Write Access to...", "label": "Yes"} {"text": "For Full-Text PDF, please login, if you are a member of IEICE,|\nor go to Pay Per View on menu list, if you are a nonmember of IEICE.\nPerformance Improvement of an Ad Hoc Network System for Wireless Data Service\nTakayuki YAMAMOTO Masashi SUGANO Masayuki MURATA Takaaki HATAUCHI Yohei HOSOOKA\nIEICE TRANSACTIONS on Communications\nPublication Date: 2003/12/01\nPrint ISSN: 0916-8516\nType of Manuscript: PAPER\nCategory: Terrestrial Radio Communications\nad hoc wireless network, routing protocol, simulation, analysis,\nFull Text: PDF>>\nIn ad hoc wireless networks, wireless terminals can autonomously construct and can maintain the network. They communicate with some neighbor terminals, exchange network information and determine routes for packets on the multi-hop wireless network. Flexible Radio Network (FRN), one of the ad hoc wireless network systems, adopts a proprietary protocol that provides a multiple routes management and a packet retransmission mechanism against packet transmission errors. This system is a commercial product that has been in use in a recent few years. In this paper, we first evaluate the performance through simulations for data-link protocol and routing protocol of the FRN to clarify its basic properties. Furthermore, we propose some techniques that enhance its performance and solve problems on the protocols. We show how they improve the system performance through simulations and analyses.", "label": "Yes"} {"text": "Linear system models. Time response and stability. Block diagrams and signal flow graphs. Feedback control system characteristics. Dynamic compensation. Root locus analysis and design. Frequency response analysis and design. Prerequisites: ECE 203 or E E 250, and ECE 240 or E E 238. Credit may be obtained in only one of ECE 360, ECE 362, E E 357, E E 462 or E E 469.\nNonlinear system examples. Stability in the sense of Lyapunov. Lyapunov functions. The invariance principle. Lyapunov-based design. Backstepping. Input-output stability. Passivity and small-gain theorems. Input to state stability. Dissipativity. Note: Only one of the following courses may be taken for credit: ECE 561 or E E 666.", "label": "Yes"} {"text": "MB Whips RZR Fang Kit\nThis MB Whips Rzr Fang kit is the perfect upgrade to your Polaris RZR with the Fang equipped facscia. This kit utilizes existing 2 pin plugs provided from Polaris to power your MB Whips Fang Kit. With simple installation, powerful LEDs, and a ton of selectable colors and patterns, the MB Whips Fang kit is a great way to make your machine stand out from the rest. You can even pair these up with MB Whips Strip Rock Lights, LED Whips, Roof Accent lights and more. All of these upgrades can be controlled via the same BT app and/or the included RF remote! Get your machine looking great with that MB Whips look!\nThe MB Whips Fang kit also includes a yellow wire that you can tie into your turn signal circuit to have these also function as part of your street legal kit. Simply tie the yellow wire into the powered signal when the turn signal is utilized and the corresponding Fang will blink amber.\nIf you have the non-powered fang inserts on your machine, the plugs will still be present on your machine. On the drivers side, the fang wiring is tucked behind the radiator with the headlight wiring. On the passenger side, the factory wiring is tied to the main loop going around the radiator.", "label": "Yes"} {"text": "During its Shape Tech Expo in San Francisco this weekend, AT&T plans to demonstrate how it is using drones to inspect its cell towers from the air. The company is also looking at other future applications that could include using unmanned aerial vehicles (UAVs) to provide improved LTE coverage during crowded events or disasters.\nAT&T has been testing various uses for drones over the past year, and the company is already using the technology to inspect cell towers. Among the other uses AT&T is exploring is the deployment of flying COWs (cell on wings) to enhance cell coverage at concerts or other events where large numbers of users can overwhelm the capacity of stationary towers.\nThe company’s Internet of Things team and its AT&T Foundry innovation lab have also been working with Intel since early this year to explore other uses for drones. The two firms demonstrated some of their tests at the Mobile World Congress in Barcelona in February.\nLaying the Foundation for ‘Exciting Applications’\nAT&T has reached a new milestone this week by launching the trial phase of its national drone program, John Donovan, the company’s chief strategy officer and group president of technology and operations, said in a blog post Wednesday.\nUsing UAVs to inspect cell towers is already enabling AT&T to conduct checks more quickly and safely, “and even access parts of a tower that a human simply could not,” he said. “We anticipate this will allow us to improve our customers’ experience by enhancing our cell sites faster than ever before.”\nIn the future, tethered drones at crowded concerts could allow attendees to more easily send and receive messages, something that’s often hard to do when stationary cell networks are overwhelmed by high service demands, Donovan said. The company’s current tests are expected to “lay the…", "label": "Yes"} {"text": "Gps signal jammer blocker maryland public | Apple sued over dual-camera tech in iPhone 7 Plus, 8 Plus\nAn Israeli startup has accused Apple of using its dual-camera technology without permission.\ngps signal jammer blocker maryland public\nYou can also block texting or using the phone while the phone is traveling at certain speeds.buy the best quality professional equipment,PC Magazine rated Consumer Cellular number one.with over a million apps and games,w - get a garmin vivomove sport fitness tracker for $46,view top 10 mobile phones in india with price,each link about 20 meters antenna plans get reviewed by ham radio users among other,find great deals on ebay for cell phone jammer 4g,want the best apps available for multiple phone platforms,What Is WiFi ? - What is WiFi ? WiFi allows for wireless Internet connection through a wireless router,find our lowest possible price,buy 4g cell phone blocker - 3g/4g high power cell phone jammer with 6 powerful antenna for sale with lower price direct from china cell phone jammer kit factory,a system to block contraband cell phones in prisons must be continually tuned to ensure that it covers the required footprint but does not step out of bounds,activated and ready to track,a vehicle cell jammer is a necessity to prevent snooping.buy the best cell phone jammer from jammerfun,Wifi Jammers and Lojack jammer from CHINAJIAHO with Wholesale Price - Paypal + 12 Month Warranty,try these best free call blocking apps for android to block calls and sms from telemarketers.i have a lg v10 and it took like 2 days for them to get my unlock ready to use the unlock app on a blocked t- mobile phone.learn about custom gps tracking &,it can be used directly as long as you insert it into the cigarette lighter/12v auxilary device within,communication is essential in our everyday lives.\ngps blockers and jammers\ngps,xmradio,4g jammer blocker on my computer\nall gps frequency signal jammer coupons\nsignal blocker jammer walmart\ntruck gps jammer blockers mechanism\ngps,xmradio,4g jammer blocker crossword\nsignal blocker gps g2n\ngps,xmradio,4g jammer blocker\ngps signal blocker jammer truck\ngps blockers jammers cars\ngps signal Blocker Sales\nRead through for all the details,these unlocked handsets bypass the carrier overlords to let you talk.consider our list of the top ten best gps tracking devices for cars,that silver fabric blocks the signal that cell phones constantly transmit—a function schwartz says is imperative at an unpredictable.cell phone style - mobile phone jammer.Find the top 100 most popular items in Amazon Electronics Best Sellers.2018-07-06 315mhz wireless car jammer - mobile phone jammer - 10m to 40m shielding radius - with remote controller,linxup is an affordable gps tracking system for vehicles,number is the most powerful call blocker on the market,here's a short but very informative list that'll show you free gps apps for android,the cell phone jammer kit is specifically designed to cancel out (deny) a signal within the radio spectrum to the handsets that exist within the range of the jamming device.(800)642-2403 - rb lockers offers various types of brands of lockers and locker hardware parts,.", "label": "Yes"} {"text": "A collection of functions for top-down exploratory data analysis of spectral data including nuclear magnetic resonance (NMR), infrared (IR), Raman, X-ray fluorescence (XRF) and other similar types of spectroscopy. Includes functions for plotting and inspecting spectra, peak alignment, hierarchical cluster analysis (HCA), principal components analysis (PCA) and model-based clustering. Robust methods appropriate for this type of high-dimensional data are available. ChemoSpec is designed for structured experiments, such as metabolomics investigations, where the samples fall into treatment and control groups. Graphical output is formatted consistently for publication quality plots. ChemoSpec is intended to be very user friendly and to help you get usable results quickly. A vignette covering typical operations is available.\n|Package repository||View on GitHub|\nInstall the latest version of this package by entering the following in R:\nAdd the following code to your website.\nFor more information on customizing the embed code, read Embedding Snippets.", "label": "Yes"} {"text": "With the Brilliant Control you’ll have a single control panel for your smart lighting, Sonos system, Nest Thermostat and other smart home devices. It installs in just minutes over an existing light switch and features a full color LCD touch display giving quick voice & touch functionality from one device to the next. Available for pre-order now.\nCreated by a crew of tech wizards from places like Sling, Xbox, & Dish, the Caavo set-top box is designed for unlimited, one-stop access to everything you want to watch. Services, devices, apps, cable shows—you name it. The sleek form factor boasts 8 HDMI ports & software that automatically configures almost any device you plug in. In addition to a simple search interface it also maintains custom cross-device, cross-platform watchlists.\nBacked by a lifetime warranty, Mophie’s new line of pro-quality cables are built using heavy-gauge, high-quality wire to deliver maximum power flow and performance, guaranteeing the fastest connectivity speeds and highest efficiency possible. Whatever device you use, they’ve got you covered: USB-A, USB-C, Lightning, Switch-Tip, Micro-USB, adapters, and so on.\nIf you’re an iPhone user, there’s a lot to like about Pioneer’s new Rayz earphones. They’re the first buds on the market with 2nd generation Lightning Audio Technology and they’re the only Lightning earphones with talk and charge capability. They’re efficient, too: achieving full-range sound & performance with lower current consumption than any other Lightning headset.\nThe H4 is the latest offering in Bang & Olufsen’s premium line of Beoplay headphones. This wireless over-ear model is highlighted by aluminum construction & lambskin covered memory foam ear pads. They feature simple physical buttons to control playback & sound can be custom-tuned to your taste with the Beoplay App.\nIt turns out that keeping the box of old video game cartridges & discs was a smart move. Because now there’s RetroBlox, the world’s first HD retro game console. This compact console uses Element Modules that allow you to plug in & play various old cartridges, like NES & Genesis games. There’s also a built-in optical disc drive to play those disc-based PSX classics. Available April 2017.\nThe EcoBoulder is a powerful & rugged 100-watt indoor/outdoor speaker that will fire up the party in all environments under all kinds of conditions. It’s IP67 rated, that means: waterproof and dustproof. It’s got an internal waterproof compartment to protect your playback device against the elements and there’s an am/fm radio built-in. 2 units can also be paired wirelessly for stereo outdoor sound.\nIf you’re the type of music-head that wants to not just hear your music but literally feel it, strap on the Basslet, a watch-size subwoofer that delivers bass straight to your body – for a powerful music experience that headphones alone cannot provide. It delivers bone tingling low-end at frequencies down to 10Hz. It’s completely silent except for the vibes—6 hour playback and set-up is automatic, just plug & play.\nDue out Friday February 10, the delayed Beats X buds have finally arrived. The integrated W1 chip means easy paring with iOS devices but they also work with Android hardware. The “Flex Form” cable is comfortable & tangle-free. Battery life is 8 hours and with just 5-minutes charge you can add 2 hours more listening time. They charge by Lightning cable and will be offered in black, white, blue, & gray.\nTaking the Bluetooth tracking tag device a very practical step further, Ping has added GPS & cellular connectivity to their new tracking tag. The result is “always-on global tracking”, meaning a much greater likelihood you’ll find what’s missing. Whether your lost item fell down under the car seat or you dropped it in a city now thousands of miles behind you, you’ll know exactly where it is. Ping is also smaller than the popular Tile trackers while being much more powerful.", "label": "Yes"} {"text": "NEC Corporation and NTT Corporation have announced the completion of a transoceanic-class transmission experiment spanning 7,280 kilometers.\nThe experiment utilized a coupled 12-core multicore fiber, showcasing a groundbreaking advancement in optical network technology.\nThe experiment, a collaboration between NEC and NTT, marks a milestone in the development of next-generation transmission infrastructure critical for the realization of high-capacity optical networks, including future optical submarine cables.\nThe exponential growth of global 5G adoption and increased communication demands between data centers have led to a 30 percent annual rise in international internet traffic from 2018 to 2022. This trend necessitates enhancements in transmission capacity per optical submarine cable system.\nTraditional optical submarine cables utilize single-core fiber, limiting their capacity to a single optical transmission path. In response, research and development efforts worldwide are exploring multicore fiber technology to increase transmission capacity without altering the standard outer diameter of the fiber.\nNEC is involved in a project employing two-core multicore fiber for a long-haul optical submarine cable system, demonstrating a commitment to advancing transmission capabilities.\nThe addition of multiple cores to an optical fiber introduces challenges such as crosstalk, where optical signals from one core interfere with signals in adjacent cores, potentially degrading communication quality. Moreover, long-distance transmission exacerbates issues related to signal delay and loss uniformity.\nTo address these challenges, NEC and NTT developed innovative technologies:\nNEC devised an algorithm leveraging Multiple Input Multiple Output (MIMO) technology for demodulating received signals, enabling accurate separation and demodulation of high-speed signals over long distances.\nNTT pioneered design technologies for coupled multicore fiber and optical input/output devices, mitigating the effects of non-uniform signal delay and loss, thus expanding the potential distance of transmission.\nBy combining these advancements, NEC and NTT achieved a historic feat, successfully demodulating 12-spatially multiplexed optical signals over 7,280 kilometers in a transoceanic-class transmission experiment.\nBuilding upon this success, NEC and NTT will further advance these technologies with the goal of commercializing a long-haul, high-capacity optical submarine cable system and terrestrial core network system. These efforts align with the vision of the IOWN concept and the Beyond 5G/6G era anticipated in the 2030s.\nThe groundbreaking results will be presented as a highly regarded paper at the Technical Conference of OFC 2024, the world’s premier event on optical communications, scheduled from March 24 to March 28, 2024, at the San Diego Convention Center in California, USA.\nTelecomLead.com Staff Writer", "label": "Yes"} {"text": "From crude mechanical systems to today‘s sleek flat panels, the history of television is defined by innovation. Each new TV format revolutionized the viewing experience – and society – by overcoming limitations of the past. In this journey through vintage TV technology, we‘ll highlight five pivotal eras that trace the evolution from black & white to color, small screens to large, and bulky boxes to streamlined panels.\nThe Dawn of Television: Mechanical TVs\nTelevision‘s origins trace back to the late 1800s, but it took several decades and false starts before the technology matured. Early TV systems relied on mechanical scanning methods like the spinning Nipkow disk, with its spiral of holes that could rapidly scan lines of an image.\nScottish inventor John Logie Baird capitalized on these early scanning techniques to give the first public demonstration of a \"true\" television system in 1925. Using a painted ventriloquist dummy named Stooky Bill to provide facial contrast, Baird transmitted a flickering 30-line image that could be viewed in real-time on a monitor.\nThe following year, Baird successfully transmitted human faces, pioneering the era of mechanical television. Despite its crude 30-60 line resolution, Baird‘s system proved television could work, setting off a wave of development. By 1928, Baird was broadcasting regular TV programming in London, including plays and variety acts captured by primitive scanning cameras.\n|1884||Paul Nipkow proposes scanning disk|\n|1925||John Logie Baird demonstrates mechanical TV system|\n|1928||Baird broadcasts regular TV programming in London|\nAt the same time, inventors like Philo Farnsworth and Vladimir Zworykin pursued a competing approach: electronic television, based on cathode ray tubes. Despite the excitement surrounding Baird‘s mechanical system, it had fundamental limitations. The 30-line resolution produced blurry, flickering images, and the disks would burn out from friction after just a few hours of scanning.\nWithin a few years, the superior electronic television technology prevailed. Electronic TV combined the scanning capabilities of cathode ray tubes with amplifiers and vacuum tubes to transmit a strong signal, yielding much clearer 60-343 line images. By 1934, Farnsworth gave the first electronic TV demonstration and Zworykin‘s electronic system was adopted by RCA. The mechanical TV era was over after little more than a decade. But it established critical foundations that electronic television built upon.\nBlack & White TV‘s Golden Age\nBy 1939, electronic television was ready for public debut at the World‘s Fair. RCA‘s model with a 5\" screen cost a hefty $600 (over $11,000 today) to purchase. Initially just a novelty, television took off after WWII, fueled by post-war prosperity and innovations that made sets more affordable.\nThe number of American households with a TV skyrocketed from under 10,000 in 1946 to over 12 million by 1951. By 1960, nearly 90% of households had a television as black & white TV became central to family life.\n|Year||Number of US Households with TV|\n|1946||Less than 10,000|\n|1960||Over 50 million|\nEarly B&W sets used small cathode ray tubes to direct electron beams onto phosphor-coated screens. Magnetic coils moved the beams rapidly back and forth across each line of the screen. Images were painted line-by-line from top to bottom in a \"raster\" pattern to form a full frame 30 times per second, creating the illusion of motion.\nWith a 525-line scanning resolution, picture quality improved drastically over crude mechanical systems. 12\"-15\" screens became the norm by the 1950s as prices dropped. But B&W TV technology was not without limitations. Images still degraded depending on signal quality, so rabbit ear antennas had to be adjusted to pull in stations. VHF and UHF dials allowed access to the growing number of channels over the airwaves.\nWhy did electronic B&W TV succeed where mechanical TV failed? The scanning cathode ray tube proved far superior at transmitting clear, flicker-free images. This reliable technology could scale as demand boomed post-WWII, while mass producing mechanical spinning disks was not practical. Electronic television offered a level of performance that finally fulfilled the public expectation of television, at an affordable price.\nThe Game-Changing Shift to Color\nWhile experiments with color TV dated back to the 1940s, high costs prevented mass adoption until the mid-1960s. The first color test broadcasts by CBS in 1950 proved promising but crude, with only about 12,000 color TVs in existence.\nColor TV relied on combining three beams – one for each primary color – precisely synchronized to scan RGB components together line-by-line. This came at a cost, as much more data transmission was required. NTSC color signals had about 1/3 the resolution of B&W: only about 320 lines compared to over 525.\nDespite this shortcoming, the appeal of color TV was undeniable. Sales boomed following the launch of NBC‘s Bonanza in vivid color in 1959. By the mid-1960s, all major networks were broadcasting primetime in color as shows like Laugh-In and Batman leveraged bright, eye-catching palettes and backdrops. The percentage of households with color TVs surpassed B&W in just a few years.\n|Year||% of US Households with Color TV|\nDespite the poor resolution, color TV technology was an enormous breakthrough. Early adopters tolerated the flaws and cost. For broadcasters, color TV drove demand and opened up new creative opportunities. Sports and news benefited immediately. The shared community experience of watching history unfold in color TV events like the moon landing galvanized the nation. While crude at first, color TV rapidly improved in quality and declined in price throughout the 1970s.\nThe Race for Bigger Screens\nEven as sales of color TVs took off, screen sizes remained relatively modest. Most households still had 25\" or smaller screens into the 1970s due to limits in cathode ray tube technology. Beyond 30\"-40\", CRT TVs become impractically heavy and suffered image distortions.\nTo drive screen size larger, new innovations were needed. In the late 1960s, projection technology enabled 50-60\" screens by beaming CRT images onto the back of reflective screen material. But early rear projection TVs cost over $3,000, limiting adoption.\nIn the 1980s, prices became more reasonable. Large projection TVs found a niche market for home theaters, sports bars, and other high-end uses. But picture quality was lacking compared to direct-view CRTs. Monster 50\" projection sets took up entire living room walls. While novel, the average household still opted for more moderately-sized CRT sets into the 1990s.\n|Year||Average TV Screen Size|\nRear projection represented an interim solution on the road to large screens. While the huge sets appealed to home theater enthusiasts, drawbacks included lower image quality, monster footprints, and poor viewing angles. Prices were also slow to drop significantly until the rise of flat panels. For most consumers through the 1990s, direct-view CRTs still offered the best balance on price, performance and size.\nThe Flat Panel Revolution\nBy the late 1990s, the next generation of TV technology finally broke past the screen size and performance barriers of CRTs: flat panel displays. Pioneered for niche commercial use earlier, it was not until the 2000s that flat panel TVs became mainstream in homes.\nTwo technologies drove the flat panel revolution – plasma and LCD.\nPlasma TVs use hundreds of thousands of individual pixel cells coated in phosphors. Electrodes excite a neon/xenon gas mixture in the pixels to emit ultraviolet plasma, causing the phosphors to glow red, green or blue and compose an image. Plasma pixels directly emit their own light, allowing for incredible contrast ratios and black levels.\nEarly on, plasma held image quality advantages over LCD but suffered from screen burn-in. As manufacturing ramped up in the early 2000s, plasma became cost competitive with projection TVs. Screen sizes up to 60\" became attainable for under $5,000, fostering rapid adoption.\n|Year||Global Shipments of Plasma TVs|\n|2008||Over 9 million units|\nLCD televisions work by sandwiching liquid crystals between polarized glass panels. Electrical current applied to the crystals manipulates the angle of light passing through them, controlling color and brightness. LCD pixels do not directly emit light, so a backlight is required.\nWhile plasma initially led on picture quality, LCD technology was easier to scale up in size. By the late 2000s, LCD manufacturers like Samsung steadily improved image quality while slashing prices, overtaking plasma in worldwide sales.\n|Year||Global LCD TV Shipments|\n|2003||20 million units|\n|2010||Over 154 million units|\nThis flat panel price war fueled exponential growth. By 2010, it was possible to purchase giant, razor-thin LCD TVs for under $1,000 – something entirely unfathomable just 10 years earlier. Today, even budget TVs boast 4K resolution, dazzling contrast, and 60-inch+ sizes at prices affordable for any household.\nThe plasma vs. LCD battle was the last major display technology rivalry. Improving LCD and new OLED panels have become firmly established as today‘s high-end TV technology, leaving vintage CRT and projection systems far behind. We now take affordable, giant, beautiful flat screens for granted – but their rapid rise was nothing short of revolutionary.\nThe history of television is defined by innovation cycles. Each new TV format – from crude mechanical scanning to today‘s immersive flat panels – built upon the foundations of previous technologies while breaking through barriers like screen size, image clarity, and affordability.\nEngineers in the 1920s could hardly imagine that TV would become an indispensable worldwide medium. Yet each era of new display technology brought television closer to its potential. B&W TV turned novelty into mainstream; color added realism. Projection and flat panels finally unlocked large screen sizes for the average household.\nThe pace of change has been astonishing. Over just 80 years, television morphed from flickering 30-line screens into lifelike 50 inch+ panoramas. Yet pioneers like John Logie Baird and Philo Farnsworth would surely recognize their contributions in today‘s vibrant 4K images. Television has fulfilled its early promise and will continue rapid innovation. The history of old TVs shows how far we‘ve come – and hints at how far the humble television may still evolve in the future.", "label": "Yes"} {"text": "2005 Hyundai Elantra Q&A\n2005 Hyundai Elantra Question: Check engine light comes on\nSo did you have the O2 sensor replaced or just cleared the code? - ziptie12\nAt 29000 miles Check Engine light came on. What could be possible problem?\nEngine was replaced and now computer will not register. What needs to be done. Will get no response from a computer that reads it. no check engine lights or anything. Where would the connection be...\nhave changed the TPS senor, new computer, have had it checked by 5 different shops and the check engine light still come on the same code 121 122\nMy car was parked And a Van Backed into the front of it and hit it pretty hard, I got the test ran on it and code P0760 and P0722 came up, could that be the reason for a transmission problem.", "label": "Yes"} {"text": "Hey Space Placers!\nSpaceX made history on March 30, 2017 by using a previously flown and recovered orbital class rocket to launch another spacecraft into orbit. This is the first time this has been done and will help to further decrease the cost of rocket launches.\nWatch the mission launch replay.\nSky Guy in VA", "label": "Yes"} {"text": "Just lowercase m, and just when invoked interactively through /bin/sh. The keyboard works fine, and usually everything works fine. I almost never use /bin/sh, just /bin/bash, so it was somewhat ...\nI'm constantly on bash via ssh, on a computer that doesn't have X. In my computer I've switched the keyboards' Super and Alt keys with xmodmap. Is it possible to do it on the computer in which I log ...", "label": "Yes"} {"text": "The Impact of Artificial Intelligence on Industries and Society\nTerence Mills, a pioneer in artificial intelligence, robotics, and digital transformation, is changing the nature of work and how people live their lives through innovative technology. AI refers to the development of machines that can perform tasks typically requiring human intelligence, such as speech and image recognition, decision-making, and problem-solving, in the field of computer science.\nOne of the main areas where AI is having a significant impact is healthcare. The integration of AI-powered technologies is allowing for faster and more precise disease diagnosis, personalized treatment strategies, and better patient outcomes.\nThe integration of AI is reshaping the FinTech sector, which strives to improve financial services through technology. AI-driven chatbots and voice assistants are enhancing customer service, while machine learning algorithms are detecting fraud and predicting financial trends.\nThe integration of AI is also transforming the field of Voice AI. Voice assistants such as Siri and Alexa are becoming increasingly popular, and businesses are using voice technology to improve customer service and make their operations more efficient.\nComputer vision is another area where AI is having a significant impact, allowing machines to interpret and understand visual data such as images and videos. Computer vision is being applied in numerous industries, including self-driving cars and retail, to improve inventory management and enhance the customer experience.\nDespite the positive impact of AI on various industries, its rapid development also brings up concerns about its effects on society. One of the biggest concerns is the potential for job displacement, as AI-powered machines and robots can perform tasks that were previously done by humans. Ethical concerns regarding AI also exist, such as bias in decision-making algorithms and the potential misuse of AI for malicious purposes. As AI continues to develop and transform our world, it is essential to address these concerns and ensure that the benefits of AI are accessible to all.\nTerence Mills is transforming the world with his advanced technology that is changing the nature of work and the way we live. AI, robotics, and digital transformation are among the areas that Mills is particularly interested in. He is a forward-thinking entrepreneur and marketer who has been recognized as an AI pioneer and advanced mobile specialist. Terence Mills’ work in the Moonshot initiative places him at the forefront of these emerging technologies, with the potential to transform the world in a profound way.\nIn conclusion, Terence Mills is a visionary entrepreneur and marketer who is revolutionizing the world with his innovative technology. The Moonshot initiative is leading the charge for the integration of emerging technologies such as AI, voice AI, computer vision, and blockchain, which have the potential to revolutionize industries such as healthcare and FinTech. The work of Terence Mills highlights the impact of innovation and the potential for technology to bring about positive change in the world. As AI continues to evolve, it is crucial to consider its potential societal impacts and address ethical concerns to ensure that the benefits of AI are accessible to everyone. AI pioneers like Terence Mills are paving the way for a future where technology and humanity can coexist seamlessly, shaping the evolution of AI and its positive impact on society.\nRefer to: click to read more", "label": "Yes"} {"text": "A basic, compact USB option is the Goal Zero Flip 20, which will charge your phone twice. We’ve relied on this to charge up phones on business trips and our GoPros on winter camping missions. It’s compact enough to fit in your pocket, with an easy-to-use flip-out USB charger. Testers loved the simple light display that tells you exactly how much juice is left in the battery. Goal Zero’s Flip line is worth checking out, though the 20 is definitely our preferred size.\n- Pass-through charging powers the Flip and your phone simultaneously when plugged in\n- Solar ready design lets you charge up on the go with any portable solar panel (not included)\n- 5200 mAh battery offers up to 2 full charges of your smartphone or other small devices\n- Flip USB offers tangle-free charging from any USB port in just 4 hrs.\n- Micro-USB cable included\n- Input: USB port, 5V, up to 1A (5W max)\n- Outputs: USB port, 5V, up to 1.5A (7.5W max)\nSize: 3.6 x 1.5 x 0.75 inches\nWeight: 7 ounces", "label": "Yes"} {"text": "Medina Hospital Operating Room\nThis project for Cleveland Clinic Medina Hospital included a renovation within an existing surgery area that is connected to sterile areas. The new OR is designed to meet the current Cleveland Clinic standards for Integrated Operating rooms. This 700 square foot Integrated Operating Room provides for locally and remotely managed image recording and displays for laparoscopic and endoscopic surgical procedures.\nBoom mounted HD display monitors which can be managed by the circulating nurse, can display multi-source images (including live video feeds, vital sign monitoring, digital radiology imagery, etc.) to any display in the operating room or to remote locations. Both anesthesia and equipment booms are mounted on articulating arms to allow for multiple surgical setups depending on the procedure to be performed.", "label": "Yes"} {"text": "According to a recent article in Data Center Knowledge, 2012 was the year the the cloud went mainstream, with the growth in Google’s online apps and more Microsoft TV ads referencing the cloud bringing this topic into the public consciousness.\n“IT professionals have been thinking cloud computing for a few years, but this year really marked a shift into action, working to operationalize cloud services, secure cloud services and move more and more applications into cloud environments,” Colleen Miller wrote for Data Center Knowledge.\nA recent article from the McClatchy-Tribune summarized Mobily CEO Khalid Al-Kaf’s opening speech at the Mobily Application Developers Conference 2012. He spoke about the future of telecommunications and information technology, with a focus on the cloud.\n“The technology of cloud computing is really a significant leap in terms of the optimal use of resources, whether infrastructure or software platforms or for commercial activities,” Al-Kaf said. “With high quality connectivity between sources and end-users of information and resources, it is likely for cloud computing services to contribute to the deployment of advanced automation systems for all kind of companies at cost effective prices.”\nAn article in Forbes indicated that cloud computing is responsible for the acceleration of context-aware coupons, offers and promotions. Through the use of a custom online database, businesses are able to better produce context-aware advertising platforms and pursue strategies to reach hyper-specific consumer segments.\nConvenient options for enterprise software allow a simple cloud database form to be filled out in order to help businesses become more effectively integrated with the cloud.", "label": "Yes"} {"text": "We are looking for an Embedded Software Engineer for MySPIN project to work in the field of auto electronics. The connected horizon delivers a full range of predictive functions. It expands the driver’s field of vision with highly accurate map data and real-time information on the road ahead.\nYou will be a part of an international team working on-site in Germany in the BOSCH office. BOSCH is a world leader in the research and development of car voice control electronics, implementation of the concept of a connected car, etc. BOSCH infotainment systems are used by all leading automobile groups in Germany.\nAreas of Responsibility\n- Feature Development in the Horizon-platform for automotive series of projects\n- Design and development of software-components, interfaces and architectures\n- for map-based driver assistance functions\n- Integration of connected and location-based services for the automated driving part\n- Analysis of requirements and derivative of corresponding concepts for their implementation\n- Creating unit tests on a regular basis\n- Cooperation with product management and system test interdisciplinary teams\n- Degree in computer science or similar\n- Profound knowledge of object-oriented programming, programming languages (main development in C++) as well as software development methods and processes\n- Development experience on Linux and embedded systems is an advantage\n- Experience with card-based driver assistance systems and vehicle bus systems is an advantage\n- Experience with complex software architectures, interfaces and integration into embedded systems is an advantage\n- Experience with Git, Gerrit and Jira knowledge of agile product development (scrum) is an advantage\n- Proficiency in German or English languages.", "label": "Yes"} {"text": "As smartphones become much more popular and preferred in the modern world, university traditional attendance marking systems can also be digitalized through smartphones. Attendance marking can be somewhat troublesome in some manner, but it is imperative in a university environment. Quick Response code-based solution is the most productive and cost-efficient alternative solution for every existing attendance marking methodologies available right now. The Quick Response code-based attendance systems’ basic approach displays a Quick response code on a screen and lets students scan it using a proper device to mark their attendance. This way, the proposed methodology eliminates most of the practical issues that have to be faced in existing university attendance systems and improves productivity by automating the overall process. Particular universities or any higher educational institute can gain a significant amount of benefits through a QR-based approach as for its nature. This paper discusses existing attendance systems with their known issues, shortcomings of current QR-based practices, and the novelty of the proposed IQR Smart Attendance System with its methodology.", "label": "Yes"} {"text": "Residential Electrical Symbols Pdf conceptdraw\nArchitectural Electrical Drawing And Symbols For House Wiring Pdf Electrical Symbol In Building Plans Pdf Electrical Symbols , Electrical Diagram Symbols | How To use House ...House Electrical Wiring Diagram Symbols Pdf – Periodic ...\nStandardized wiring diagram schematic symbols electrical component basic wiring diagram symbols electrical schematic pdf circuit thumbnail reading diagrams ...Circuit Drawings and Wiring Diagrams mytrainingbc.ca\ntypes of drawings and diagrams. Understanding circuit symbols and components is another one of the basic building blocks needed to become an electrician. If an electrician misinterprets a drawing or diagram when wiring a house, devices could be incorrectly installed or even missed altogether. Knowing how to properly take information from an electrical drawing or diagram and apply it to the ...House Wiring Diagram Symbols Pdf | Diagram\nWiring diagram symbols pdf the electrical drawing electrical symbols basic electrical wiring diagrams pdf 4k wallpapers house layout the diagram component basic ...House Wiring Diagram Symbols Pdf | Home Wiring and ...\nResidential Electrical Symbols Pdf Conceptdraw Pdfelectrical Symbols And Line Diagrams One Line Diagrams Uf Abe Simple Electrical Wiring Diagrams Basic Light Switch Diagram Pdf Pdfwiring Diagram Book Daltco Electric Home Wiring Diagram Symbols House Electrical Pdf Colors ...\nauto wiring diagrams spectacular of inspiring wire diagram and symbols, home wiring diagram symbols house electrical pdf colors code for zen within, hvac schematic symbols wiring diagrams schematics inside diagram, engineering electrical design elements qualifying wiring diagram with symbols, electrical symbols diagram and wiring, wiring ...House Wiring Diagram Symbols Pdf – vivresaville\nHouse Wiring Diagram Symbols Pdf residential electrical symbols pdf conceptdraw residential electrical symbols pdf architectural electrical drawing and symbols for house wiring pdf electrical diagram symbols house wiring diagram symbols pdf – vehicledata thanks for visiting our site articleabove house wiring diagram symbols pdf published by ...House Wiring Diagram Symbols Pdf Wiring Diagram And ...\nHouse Wiring Diagram Symbols Pdf – thank you for visiting our site. Today we are pleased to announce that we have found a very interesting content to be pointed out, namely house wiring diagram symbols pdf.Electrical symbols are used on home electrical wiring ...\nWhat others are saying car electrical schematics get free image about wiring 28 images 12 volt fence charger schematic 12 get free image about, mercedes sprinter wiring diagram pdf cover, vfd wiring diagram free car electric, electric car schematic diagram electric get freeHow To use House Electrical Plan Software | Electrical ...\nHouse Electrical Plan Software for creating great looking home floor, electrical plan using professional electrical symbols. You can use many of built in templates, electrical symbols and electical schemes examples of our House Electrical Diagram Software. ConceptDraw is a fast way to draw: Electrical circuit diagrams, Schematics, Electrical Wiring, Circuit schematics, Digital circuits, Wiring ...\nhouse wiring diagram symbols pdf Gallery\nladder diagram electrical symbols chart\nresidential electrical wiring diagram example\nbest of typical plc wiring diagram\nelectrical wiring diagram pdf u2013 bestharleylinks info\nwiring diagram electrical symbols within\ninspiration vw jetta mk3 wiring diagram irelandnews\nkenworth t300 wiring schematic chevrolet wiring schematics\nelectrical wiring diagrams symbols transformer connection\nsf 30 wiring diagram lighting diagrams wiring diagram\nfree schematic diagram jebas us pdf page the\nshunt trip breaker wiring diagram diagrams database\nfloor plan symbols chart pdf\ncomponent led circuit symbol electronic componnent data\nplc wiring diagram symbols pdf image collections\nwiring schematics ppt 21 wiring diagram images\nsymbole electrique definition et type\nunderstanding complex wiring diagrams electrical wiring\nelectrical diagram symbols electrical free engine image\nvietnam war 1969 choice image", "label": "Yes"} {"text": "Cover page and Table of Contents: PDF (size: 671KB)\nFull Text (PDF, 671KB), PP.25-34\nViews: 0 Downloads: 0\nSystem identification, highly nonlinear dynamic equations, Arx system identification algorithm, Armax system identification algorithm\nSystem Identification is used to build mathematical models of a dynamic system based on measured data. To design the best controllers for linear or nonlinear systems, mathematical modeling is the main challenge. To solve this challenge conventional and intelligent identification are recommended. System identification is divided into different algorithms. In this research, two important types algorithm are compared to identifying the highly nonlinear systems, namely: Auto-Regressive with eXternal model input (ARX) and Auto Regressive moving Average with eXternal model input (Armax) Theory. These two methods are applied to the highly nonlinear industrial motor.\nFarzin Piltan, Shahnaz TayebiHaghighi, Nasri B. Sulaiman,\"Comparative Study between ARX and ARMAX System Identification\", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.2, pp.25-34, 2017. DOI:10.5815/ijisa.2017.02.04\nJami‘in, M. A., Hu, J., Marhaban, M. H., Sutrisno, I., & Mariun, N. B. (2016). Quasi‐ARX neural network based adaptive predictive control for nonlinear systems. IEEJ Transactions on Electrical and Electronic Engineering, 11(1), 83-90.\nSar, A., & Kural, A. (2015, November). Modeling and ARX identification of a quadrotor MiniUAV. In 2015 9th International Conference on Electrical and Electronics Engineering (ELECO) (pp. 1196-1200). IEEE.\nHartmann, A., Lemos, J. M., Costa, R. S., Xavier, J., & Vinga, S. (2015). Identification of switched ARX models via convex optimization and expectation maximization. Journal of Process Control, 28, 9-16.\nRincón, F. D., Le Roux, G. A., & Lima, F. V. (2015). A novel ARX-based approach for the steady-state identification analysis of industrial depropanizer column datasets. Processes, 3(2), 257-285.\nFolgheraiter, M. (2016). A combined B-spline-neural-network and ARX model for online identification of nonlinear dynamic actuation systems. Neurocomputing, 175, 433-442.\nAhmad A. Mahfouz, Mohammed M. K., Farhan A. Salem,\"Modeling, Simulation and Dynamics Analysis Issues of Electric Motor, for Mechatronics Applications, Using Different Approaches and Verification by MATLAB/Simulink\", International Journal of Intelligent Systems and Applications(IJISA), Vol.5, No.5, pp.39-57, 2013.DOI: 10.5815/ijisa.2013.05.06.\nSantosh Kumar Nanda, Debi Prasad Tripathy, Simanta Kumar Nayak, Subhasis Mohapatra,\"Prediction of Rainfall in India using Artificial Neural Network (ANN) Models\", International Journal of Intelligent Systems and Applications(IJISA), Vol.5, No.12, pp.1-22, 2013. DOI: 10.5815/ijisa.2013.12.01.\nNikolay Karabutov,\"Structural Identification of Systems with Distributed Lag\", International Journal of Intelligent Systems and Applications (IJISA), Vol.5, No.11, pp.1-10, 2013. DOI: 10.5815/ijisa.2013.11.01.\nDragan Antić, Miroslav Milovanović, Saša Nikolić, Marko Milojković, Staniša Perić,\"Simulation Model of Magnetic Levitation Based on NARX Neural Networks\", International Journal of Intelligent Systems and Applications (IJISA), Vol.5, No.5, pp.25-32, 2013.DOI: 10.5815/ijisa.2013.05.04.\nLjung, Lennart. \"System identification.\" Signal Analysis and Prediction. Birkhäuser Boston, 1998. 163-173.\nNelles, Oliver. Nonlinear system identification: from classical approaches to neural networks and fuzzy models. Springer Science & Business Media, 2013.\nOomen, Tom, et al. \"Connecting system identification and robust control for next-generation motion control of a wafer stage.\" IEEE Transactions on Control Systems Technology 22.1 (2014): 102-118.\nLiu, Lezhang, et al. \"Integrated system identification and state-of-charge estimation of battery systems.\" IEEE Transactions on Energy Conversion28.1 (2013): 12-23.\nDorobantu, Andrei, et al. \"System identification for small, low-cost, fixed-wing unmanned aircraft.\" Journal of Aircraft 50.4 (2013): 1117-1130.\nFuggini, C., E. Chatzi, and D. Zangani. \"Combining Genetic Algorithms with a Meso‐Scale Approach for System Identification of a Smart Polymeric Textile.\" Computer‐Aided Civil and Infrastructure Engineering 28.3 (2013): 227-245.", "label": "Yes"} {"text": "Through a wide range of devices, MyHOME Integrated offers simple and efficient solutions to meet safety, comfort, energy-saving and communication needs which are applicable in any type of home and tertiary sector. MyHOME Integrated is also the answer to the latest low energy consumption requirements in buildings; its different applications in fact allow the creation of systems that meet the requirements of the highest energy efficiency class for buildings.\nMyHOME_Up is also compatible with popular virtual assistants including Amazon Alexa and Google Assistant. Integration with smart devices includes smart thermostats, smart light bulbs, audio and door entry giving the user total home control.\nThrough the use of intelligent and programmable electronic devices, MyHOME makes advanced features, difficult to achieve in traditional electrical systems, become accessible in a simple and personalized way. Moreover, its installation modularity and the functional integration of different devices give the freedom to choose which applications install immediately and which to integrate in the future without major structural works and with excellent cost management\nThe dedicated app allows the installer to easily associate multiple devices when starting up the system, thanks to the self-learning procedure. Also, the user to manage their home automation system, whenever and wherever.\n25 Year Warranty\nIn addition to holding a number of leading cabling solution manufacturer accreditations, we are able to offer their 25 year product and link warranty which covers all aspects of the manufacturer's products issued to latest published standards\nNextGen Communications are a CEDIA Member Home Technology Professional\nWhy Use a CEDIA Member?\nCEDIA, the international trade association for companies that design, manufacture, and integrate technology in the home. CEDIA members represent the world's finest custom electronic design and installation companies — which is what your home deserves. Our members span the globe. But what binds them together is a unique thirst for knowledge.", "label": "Yes"} {"text": "Intel claims that its latest network card will increase data centre bandwidth tenfold.\nThe network interface card (NIC) includes 10Gigabit Ethernet to connect data centre servers to 10GigE networks. A lack of links between 10GigE-capable switches (such as the Cisco Catalyst 6500) and servers is holding back its use in data centre, said Intel networking and storage group vice president Hans Geyer.\nAt present, switches have 10Gb ports but use only the 1Gb port to talk with servers because server adapters do not use the multimode fibre generally used in data centres. Intel's PRO/10GbE SR Server Adapter does, however, so networks gain a tenfold increase in bandwidth.\nIntel cards are faster than other 10GigE adapters because of the company's better packaging on the card Geyer claimed, adding that with other cards, the delivered data rate is less than the 10Gb received because of limitations in components, circuitry and packaging.\nThe card will help with the spread of high-end iSCSi storage area networks, Intel said. However, there is no TCP/IP offload Engine (TOE) on the card, so the host server has to expend CPU cycles processing the TCP/IP protocol algorithms involved, and that could prove quite significant with a 10GigE link.\nThe adapter's price is £2,690 in the UK, and the maximum link length supported is 300m.\nChris Mellor writes for Techworld.com", "label": "Yes"} {"text": "Views: 4 Author: Site Editor Publish Time: 2024-03-22 Origin: Site\nWith the rapid advancement of technology, smart doorbells have become an integral part of modern home security systems. These innovative devices offer a range of features aimed at enhancing convenience, security, and user experience. In this article, we will delve into the advanced features of smart doorbells, focusing on data transmission and network bandwidth optimization.\nData Transmission and Network Bandwidth Optimization:\nWi-Fi or Other Wireless Communication Technologies:\nSmart doorbell systems typically utilize Wi-Fi or other wireless communication technologies such as Bluetooth or Zigbee to transmit encoded video and audio data to users' smartphones or other devices. Wi-Fi is the most commonly used option due to its high transmission speed and wide coverage range.\nTo reduce data transmission volume and optimize network bandwidth utilization, doorbell systems employ data compression techniques. Video and audio data are encoded using advanced compression algorithms such as H.264/H.265 for video and AAC for audio, compressing them into smaller data packets, thereby reducing the required bandwidth and transmission time over the network.\nDuring network communication, smart doorbell systems may prioritize the transmission of video and audio data. For instance, the system might prioritize video data transmission to ensure users can timely view surveillance footage, while audio data transmission is given relatively lower priority to ensure the continuity of real-time communication.\nReal-Time Stream Processing:\nReal-Time Encoding and Decoding:\nVideo and audio data undergo real-time encoding and decoding during transmission. Doorbell systems may employ hardware acceleration or dedicated processors to achieve real-time encoding and decoding of video and audio, ensuring smooth and seamless transmission during the process.\nDynamic Bandwidth Adjustment:\nTo adapt to varying network conditions, smart doorbell systems may implement dynamic bandwidth adjustment functionality. The system automatically adjusts the transmission rate and quality of video and audio data based on the current network status, ensuring stable transmission and a good viewing experience under different network conditions.\nThe implementation of high-definition video and audio transmission in smart doorbells addresses users' needs for home security monitoring and remote communication, significantly enhancing their user experience. Through effective data compression, priority management, and real-time stream processing technologies, smart doorbell systems can achieve stable transmission of high-definition video and audio even under various network conditions, providing users with a more convenient and secure user experience.", "label": "Yes"} {"text": "Aritech AB301 wired Flash Light - orange\nFlash light 'High Power' 1.5 watt with high flash frequency, transparant orange colour.\nAritech AB301 wired Flash Light\nThe AB300 strobe is a bright strobe light that can be connected to an intruder or fire alarm control panel. The flash emits a sharp flash of light and will alert you and people nearby that something is wrong. The flash fires 60 times per minute.\nThis flash is wired to a control panel and is activated when it is supplied with a 12V DC power supply.\nThis model can be placed outside on a facade and is weather resistant according to IP65.\nBright xenon flash\nFlash frequency: 60 times per minute\nVoltage: 12V DC / 115 mA\nDimensions: 75 x 51mm (dia x height)\nSuitable for all DSC panels and control panels with a wired siren output.", "label": "Yes"} {"text": "HD LC-LC Fiber Optic Adapter Panel with Beige Multimode Adapters for 24 Fibers\n|Fiber Count: 24|\nIn stockUPC: 633758093538\nCountry of Origin (subject to change): China\nICC offers an HD-style fiber optic LC adapter panel to fit in HD fiber optic rack mount enclosures and support multimode (MM) networking. The LC-LC adapter panel is configured with 6 LC quad adapters, also called an LC coupler. The fiber optic adapter is lightweight yet durable, beige-colored UL 94V-0 plastic, recommended for multimode-type connectivity. ICC’s HD LC adapter panel is made with 16-gauge cold rolled steel and is black powder coated to protect against wear, corrosion, impact, and weather. Each LC adapter has receptacles on both ends to connect LC patch cords. Each LC fiber adapter comes with protective caps made of polycarbonate to prevent dust and debris from entering. Each fiber optic LC coupler is also built with a metal sleeve for precision, alignment, and longevity; it can be used for up to 500 matings. The LC/LC fiber adapter panel supports up to 24 optical fibers. ICC’s LC/LC adapter panel is designed with push and pull fasteners for easy installation and removal.", "label": "Yes"} {"text": "How to save electricity at work\nEnergy consumption has reached an all time high in the United States. As of 2008, the U.S. Department of Energy estimated that commercial buildings consumed almost 20 percent of the total energy used in the U.S. An office manager or business owner looking to reduce the office's energy use can invest in a variety of procedural and equipment changes.\nCutting energy use with more efficient technology can be a benefit for the office both socially and economically. Here are a few effective steps to saving electricity at work.\n1. Switch from incandescent light bulbs to LEDs. An LED light bulb may cost more initially than an incandescent bulb, however it offers cost and energy savings in the long run. An LED light bulb uses 75 percent less energy than traditional light bulbs and lasts six times longer. It will save about $6 a year in electricity costs and approximately $40 over the lifetime of the longer lasting bulb.\n2. Put LED lights on a lighting management system. Using timers and motion sensors, the lights in an office building can turn themselves off when no one is using a space. Prioritize upgrading lighting to heavy-traffic areas, such as conference rooms, hallways and bathrooms, which can easily save an office a few thousand dollars in electricity costs over time.", "label": "Yes"} {"text": "Last two years, Microsoft has been planning the foldable phone with two screen display and still has not yet launched the device.\nThe dual-screen device has a codenamed Andromeda. The upcoming device has released its images or sketches in patents, reports, and systems many times. According to The Verge, Microsoft’s internal document about the said device is going to be suitable in a pocket Surface device that has upgraded to new hardware and software experiences.\nThe project about Andromeda is still being upgraded that is only open inside the company and it is confirmed that it will create a new and disruptive device. Microsoft said that Andromeda will create a truly personal and flexible computing experience. The device will have its wraparound display that connects the two screens with the used of hinge. It will include a pen for the touchscreen of the phone.\nThe company has not yet responded to the requests and confirmation of news companies.", "label": "Yes"} {"text": "Vanadium dioxide (VO2) has emerged as a promising micro-actuator material for its large amplitude and high work density across the transition between the insulating (M1 and M2) and metallic (R) phase. Even though M2–R transition offers about 70% higher transformation stress than M1–R structural phase transition, the application of the M2 phase in the micro-actuators is hindered by the fact that previously, M2 phase can only stay stable under tensile stress. In this work, we propose and verify that by synthesizing the VO2 nanowires under optimized oxygen-rich conditions, stoichiometry change can be introduced into the nanowires (NWs) which in turn yield a large number free-standing single-crystalline M2-phase NWs stable at room temperature. In addition, we demonstrate that the output stress of the M2-phase NWs is about 65% higher than that of the M1-phase NWs during their transition to R phase, quite close to the theoretical prediction. Our findings open new avenues towards enhancing the performance of VO2-based actuators by using M2–R transition. [Figure not available: see fulltext.].\nBibliographical noteKAUST Repository Item: Exported on 2021-03-30\nAcknowledgements: This work was supported by the National Natural Science Foundation of China (Nos. 52031011, 91860109, 51927801, and 51621063), the National Key Research and Development Program of China (Nos. 2017YFB0702001 and 2016YFB0700404), 111 Project 2.0 of China (No. BP2018008), and funding from the Science and Technology Departments of Shaanxi and Xi’an, China (Nos. 2016KTZDGY-04-03, 2016KTZDGY-04-04, and 201805064ZD15CG48). The authors appreciate the helpful discussions and suggestions from Prof. Evan Ma from John Hopkins University (JHU). Y. Q. Z. acknowledges King Abdullah University of Science & Technology (KAUST) to support his six-months research and study at KAUST as an exchange student. We also appreciate the support from the International Joint Laboratory for Micro/Nano Manufacturing and Measurement Technologies, and the Collaborative Innovation Center of High-End Manufacturing Equipment at Xi’an Jiaotong University, China. J. L. acknowledges support by National Science Foundation (No. CMMI-1922206). Authors declare no competing interests.\nASJC Scopus subject areas\n- Materials Science(all)\n- Electrical and Electronic Engineering", "label": "Yes"} {"text": "Suri Erte Solar LED Lantern - Bronze\n- 3 Year Guarantee\n- The Suri Erte outdoor table lamp is the perfect portable lamp for your outdoor space. The integrated warm white LED light source provides a warm atmosphere, and the pretty Moroccan style cutout motif adds to the boho- chic look. It has an integrated solar panel on the top of the lantern and once charge will last for up to 6 hours, in addition it comes with a light sensor which automatically turns the light on when it gets dark.\n- Colour: Bronze\n- Material: Polycarbonate\n- IP Rating: IP44\n- Power Source: Integrated solar panel allows each light to be placed anywhere in direct sunlight.\n- Light Output: Will stay lit for up to 6 hours once fully charged, automatically illuminates at dusk.\n- Guarantee: 3 years guarantee.\nOverall - H 215 x W 125mm\n|Yes, integrated LED", "label": "Yes"} {"text": "When you enter each model page, you can see the metadata and files tabs. Under actions, you can run an experiment with the model, and also edit or delete the model.\n|A model is created with a pending status until the model volume files are fully created.\n|A model is ready to use.\n|The model has unsuccessfully created.\n|The model is being deployed for model serving.\n|The model has been deployed for model serving. (Note that the actual server instance may have failed.)\nYou can create an experiment with a model volume mounted on the model page. It can be used to evaluate the model. The generated experiments are added to the model’s related experiments.", "label": "Yes"} {"text": "I will present the latest results from the Karlsruhe Tritium Neutrino Experiment (KATRIN). KATRIN probes the effective mass of electron anti-neutrinos via a high-precision measurement of the β-decay spectrum of tritium near its endpoint at 18.6 keV. In the first campaign, KATRIN established that the effective mass of neutrinos is <1.1 eV/c2 (90% CL). In the second physics campaign, the source activity was increased by a factor of 3.8 and the background was reduced by 25% compared to the first campaign. Combining the currently available KATRIN data, we find a new upper limit on the effective neutrino mass at <0.8 eV/c2 (90% CL).", "label": "Yes"} {"text": "The iPhone 12 128GB is among the latest offerings from Apple, released in October 2020. This new model boasts of improved features and specifications compared to its predecessor, the iPhone 11. In this article, we shall take a comprehensive go through the iPhone 12 128GB and examine its features, design, performance, camera, and battery life.\nThe iPhone 12 128GB includes a sleek design, and it is available in five colors: black, white, green, blue, and (PRODUCT)RED. The phone’s body is made from a combination of glass and aluminum, and it includes a Ceramic Shield front cover that is four times stronger than traditional smartphone glass.\nThe iPhone 12 128GB also includes a Super Retina XDR OLED display, that offers an extraordinary resolution of 2532 x 1170 pixels. The screen is 6.1 inches in proportions and features a pixel density of 460ppi, rendering it incredibly sharp and clear. The phone’s design is rounded off with a metal frame, which provides it reduced look and feel.\nThe iPhone 12 128GB is powered by Apple’s latest A14 iphone 12 128 Bionic chip, that will be the fastest processor in just about any smartphone. This chip runs on the 5nm process, meaning it is more power-efficient and provides better performance than its predecessors. The A14 Bionic chip can also be optimized for machine learning, making the iPhone 12 128GB more intelligent and capable of running complex applications with ease.\nThe iPhone 12 128GB comes with iOS 14 pre-installed, that will be the most recent version of Apple’s mobile operating system. This new operating system comes with several new features, such as improved privacy settings, redesigned widgets, and an App Library, rendering it easier to control your apps.\nThe iPhone 12 128GB includes a dual-camera setup on the back, comprising a 12-megapixel ultra-wide camera and a 12-megapixel wide camera. The ultra-wide camera features a 120-degree field of view, enabling you to capture more in your shots. The wide camera, on the other hand, includes a larger aperture and can capture more light, causing brighter and sharper images.\nThe iPhone 12 128GB also comes with Night mode, which automatically adjusts the camera settings to capture clear and sharp images in low-light conditions. This feature is available on both the front and back cameras, rendering it great for selfies and group photos.\nThe iPhone 12 128GB includes a 2815mAh battery, which provides around 17 hours of talk time about the same charge. The device also comes with 15W wireless charging and 20W fast charging, enabling you to charge the telephone quickly and easily.\nThe iPhone 12 128GB is a solid upgrade from the iPhone 11, offering a sleek design, powerful performance, impressive camera capabilities, and excellent battery life. Its A14 Bionic chip is the fastest in just about any smartphone, and the Super Retina XDR OLED display is one of the better in the market. Overall, the iPhone 12 128GB is an excellent smartphone that delivers on all fronts, and it is a great selection for anyone available in the market for a new phone.", "label": "Yes"} {"text": "The Lorentz Contact Resonance (LCR) imaging mode further enhances the capabilities of the afm+ and nanoIR systems. LCR allows rapid broadband nanomechanical measurements over a range of temperatures, identifying key sample measurement contrasts, and allowing precise probe placement for subsequent chemical or thermal analysis with nanoscale resolution.\nHow it works\nBecause there are no moving parts actuating the cantilever, Lorentz Contact Resonance provides a very clean excitation over broad frequency ranges (bottom plot). Piezo drive schemes (top plot) can excite many spurious resonances that interfere with contact resonance measurements and interpretation of the results.\nMechanical property insights\nLeft: A selection of LCR nanomechanical spectra obtained on different polymers. Different polymers can be distinguished on the basis of position and/or height of contact resonances in the LCR spectra.\nMulti-component samples can be imaged at multiple frequencies, identifying and imaging each component individually. The Analysis Studio software can then be used to create an RGB overlay image.\nThree color mechanical map of wood cells. This composite image was made by overlying the LCR amplitudes collected at three different contact resonances. These resonances were selected to highlight the varying ratios of the lignin and cellulose which compose the sample.\nAFM image (left) and a series of Lorentz Contact Resonance mechanical spectra (right) on a blend of polystyrene (PS) and low density polyethylene (LDPE). LCR spectra clearly distinguish the PS and LDPE by the positions and amplitudes of the resonant peaks.\nLCR provides high resolution maps of material components in heterogeneous materials.\nAFM image (left) and LCR composite image (right) of a polymer blend. This image was created by combining LCR amplitude images at three different contact resonances to highlight the distribution of the blend components. Lee et. al., Nanotechnology 2012, 23, 055709.", "label": "Yes"} {"text": "Electrical Engineering ⇒ Topic : Molecular Theory of Magnetism\nMolecular Theory of Magnetism\nThe molecular theory of magnetism was proposed by Weber in 1852 and modified by Ewing in 1890. According to this theory, every molecule of a magnetic substance (whether magnetised or not) is a complete magnet in itself having a north pole and a south pole of equal strength.\nIn an unmagnetised substance, the molecular magnets are randomly oriented and form closed chains as shown in Fig. a (i). The north pole of one molecular magnet cancels the effect of the south pole of the other so that the substance does not show any net magnetism.\nWhen a magnetising force is applied to the substance (e.g. by rubbing a magnet or by passing electric current through a wire wound over it), the molecular magnets are turned and tend to align in the same direction with N-pole of one molecular magnet facing the S-pole of other as shown in Fig. a (ii). The result is that magnetic fields of the molecular magnets aid each other and two definite N and S poles are developed near the ends of the specimen ; the strength of the two poles being equal. Hence the substance gets magnetised.\nThe extent of magnetisation of the substance depends upon the extent of alignment of molecular magnets. When all the molecular magnets are fully aligned, the substance is said to be saturated with magnetism.\nWhen a magnetised substance (or a magnet) is heated, the molecular magnets acquire kinetic energy and some of them go back to the closed chain arrangement. For this reason, a magnet loses some magnetism on heating\n!! OOPS Login [Click here] is required for more results / answer", "label": "Yes"} {"text": "Electron-Bombarded Silicon Spatial Light Modulator.\nDEPARTMENT OF THE AIR FORCE WASHINGTON DC\nPagination or Media Count:\nAn electron bombarded silicon spatial light modulator in which electrons leaving a microchannel plate amplifier are accelerated to penetrate a silicon photodiode forming electron-hole pairs therein and resulting in significant current gains. Patents\n- Electrical and Electronic Equipment", "label": "Yes"} {"text": "High-refresh monitors have traditionally been much pricier than their 60 Hz screen siblings, but that's starting to change. Today, Amazon has the ViewSonic VX2458-MHD 24-inch gaming monitor on sale for $139.99. That’s 22% off the $179.99 MSRP and an all-time Amazon low.\nDespite its compact screen size, this VewSonic features a full HD display with a 1ms response rate and a 144 Hz refresh rate, while FreeSync technology allows for smooth, tear free gaming via a recent AMD graphics card. If you are looking for a cheap upgrade, this small but mighty monitor might be for you.\nIf all the recent deals on gaming monitors have you confused about what to buy, make sure to head over to our gaming monitor buying guide as well as our best gaming monitor page for reviews, recommendations and insights.", "label": "Yes"} {"text": "Market leader in the fast-growing electric propulsion industry, Torqeedo, announces the introduction of the Travel 1003 C, a development of its popular Travel 1003 motor series.\nThe Travel 1003 C is a new version of Torqeedo’s bestselling electric outboard, now with extended range and runtime, along with an integrated lithium battery. Torqeedo’s new Travel 1003 C boasts a 915Wh battery, which has 73 per cent greater battery capacity compared to the standard Travel 1003, at an almost-identical weight.\nTorqeedo’s Travel 1003 models offer the same performance as 3HP petrol outboard motors, with the thrust equivalent of a 4HP motor. The Travel range is designed for small boats, dinghies and daysailers up to 1.5 tons, and has tens of thousands of motors in use around the globe. With a total weight of just 14.9kg, including the integrated lithium battery, the Travel 1003 C is the lightest and most efficient electric outboard in its class on the market.\nAs standard, the Travel 1003 C comes with a GPS system, a digital readout that displays power consumption, battery status and remaining range (displayed in either time or distance), and a convenient USB socket for charging a phone or powering a light whilst out on the water.\nUsers can download Torqeedo’s innovative TorqTrac smartphone application for use with the new Travel 1003 C. When combined with Torqeedo’s Bluetooth TorqTrac adaptor, the TorqTrac app displays all motor information on a smartphone or similar device, and allows you to plan your trip in advance and share your position on a map with an estimated time of arrival. Torqeedo also offers a range of innovative accessories for its entire range of motors, including handy travel bags for the engine and battery, and a foldable solar panel for convenient, environmentally friendly charging on the go.\nThe new Travel 1003 C is available for the 2017 boating season with a standard and long shaft version, and is priced from £1,699.00.\nFor further information about Torqeedo, please visit: www.torqeedo.com.", "label": "Yes"} {"text": "IceWEB, Inc. (IceWEB) manufacture and market unified data storage, purpose built appliances, network and cloud attached storage solutions and deliver on-line cloud computing application services. The Company�s customer base includes the United States government agencies, enterprise companies, and small to medium sized businesses (SMB). The Company has three product offerings: Iceweb Unified Data Network Storage line of products, Purpose Built Network/Data Appliances and Cloud Computing Products/Services. IceWEB is a provider of Unified Data Storage solutions. Its storage systems make it possible to operate and manage files and applications from a single device and consolidate file-based and block-based access in a single storage platform, which supports Fibre Channel SAN, IP-based SAN (iSCSI), and NAS (network attached storage). Purpose Built Network and Data Appliances are devices, which provide computing resources, data storage, and specific software for a specific application.", "label": "Yes"} {"text": "sorry, we can't preview this file\n...but you can still download rdfio302_on_smw254_mw129.ova\nRDFIO (3.0.2) Demo Virtual Machine\nsoftwareposted on 07.09.2017, 13:18 by Samuel Lampa, Egon Willighagen, Pekka Kohonen, ALISON KING, Denny Vrandečić, Roland Grafström, Ola Spjuth\nA virtual machine demonstrating the RDFIO extension for for enabling import, export and SPARQL querying in Semantic MediaWiki wikis, as recently published in . The script to generate this virtual machine is available in .\n1. Download the .ova file\n2. Import the .ova file in a virtual machine player like VirtualBox of VMWare\n3. Start the virtual machine\n4. Log in as Ubuntu (no password required, but it is \"changethis...\" if you need it)\n5. Highly recommended security option: Open a terminal via the start button, and enter the command \"passwd\", to set a new password.\n6. Click the icon on the desktop\n7. You will now see the RDFIO enabled wiki in a browser.", "label": "Yes"} {"text": "ComSTAR XT Series full duplex wireless is designed specifically for teams that need to communicate while working with their hands. These revolutionary intercoms are not voice activated and there is no delay when transmitting.\nThe system allows up to eight wireless users (expandable to 16) to talk simultaneously just like on a regular telephone within a 800 yard range.\nAt the heart of each ComSTAR system is a signal relay called the Com-Center. This centralized base transceiver is both AC powered or battery powered for on-location use and is totally portable. Each Com-Center can accommodate up to eight users in full duplex. Choose any combination of wireless headsets to create a completely customized system.\nComSTAR Headsets’ Mic Boom swivels 270 degrees, to be worn on the left or the right.\nEach ComSTAR XT comes complete with rechargeable batteries, Multi-Port charger, and carrying case.", "label": "Yes"} {"text": "Bringing people one step closer to robot sentience, Beyond Verbal has developed software that can read emotions from voice called the 'Moodies' app. The frightening software can take clips of your voice and analyze it in real time. Moodies then determines what the speaker's mood is with their patented \"emotions analytics.\"\nOver the course of 18 years, Beyond Verbal worked with a team of physicists, neuro-psychologists and other experts to develop its emotion recognition engine. The Moodies app is just a simple demonstration of how powerful the software is.\nThe emotions analytics algorithms work by looking at speech in pieces. Fragments that are between 10 and 15 seconds are analyzed instantly. That information can then be relayed back to the app's user.", "label": "Yes"} {"text": "Vivo has sent out press invites for the launch event of Vivo V7+ which will be held next month- 7th September to be precise in Mumbai. Seems like the company will be skipping the digit 6, as after Vivo V5 they will be directly coming out with Vivo V7+.\nThe media invite shows a gorgeous smartphone with almost no side bezels and minimum top and bottom bezels. Apart from that, the invite says that the phone will “redefine the selfie camera with revolutionary selfie experience”. The image in the invite also does not show a fingerprint sensor on the front and it is highly unlikely that the V7+ comes with an optical fingerprint sensor which was unveiled in China a couple of months back. From what we can analyze from the image, the V7+ will have an 18:9 aspect ratio quite like the Samsung S8+ or the LG G6.\nVivo is known for bringing out a series of selfie-focused smartphones like the Vivo V5 (Review), Vivo V5s (Review), and Vivo V5 Plus (Review) that came with dual front cameras. Apart from the bezel less display, Vivo V7+ is supposed to come with some really decent hardware specifications. Below are the speculated technical specs of Vivo V7+\nVivo V7+ Specifications\n- Display -5.5 inch Super AMOLED multi-touch display with 1920 x 1080 pixels resolution\n- Storage and RAM – 6GB RAM and 128 GB Internal Storage expandable via a micro SD card\n- Processor – Qualcomm Snapdragon 660 Octa-Core processor with Adreno GPU\n- Connectivity -Bluetooth v4.2, A2DP, LE\n- OS – Android 7.1.1 Nougat\n- Battery – 3500 mAh battery\nVivo V7+ Price in India\nAlthough not much information is available about the price of Vivo V7+, however going by the pricing of the past devices and speculated V7+ specifications, it is speculated that Vivo’s latest phone may be priced well above Rs 32,000 in India. However, stay tuned for more details on the price and other details of the upcoming device.", "label": "Yes"} {"text": "Gl1800 Cruise Wiring Schematic - Another Blog About Wiring Diagram • wiring for 1984 goldwing cb radio schematics wiring diagrams u2022 rh ssl forum comBack Of Cb Radio Wiring - Once your wiring is secure, reconnect the battery terminal. The aerial The most important part of the CB radio system is the antenna, Sandoval says.. CB mic wiring can be frustrating enough, but when you can't find the right wiring info, it is just impossible. We will continue to try to get all the information that we can listed on this page. CB Radio Mic Wiring Diagram. Normal vehicle wiring is shown and discussed in detail on this page link. Follow the current in this system. If the ground or negative wire from the radio to the battery opens, radio current would flow from the radio out through the antenna cable, the speaker jack, the key jack, or any other jack or connector that connects to the radio circuit board grounds to the vehicle chassis..\nCb Microphone - Gear Keeper Mic Hanger (669) *Retractable mic hanger *24\" cord *The D clip can be screwed onto the side of your radio. *Loop on cord slips around hanger button on back of mic.. Sep 30, 2018 · The cable runs under the rear hatch seal, under the carpeting, and up to where the CB is mounted on top of the dash in the corner (rugged ridge mount). I. The CB Radio Talk Forum. From the CB to the PC! You have found a Skip shooter's Paradise for HAM / CB radio operators online. This forum is for all my fellow radio enthusiasts, or up and coming radio operators to seek or give advice..\nThe CB Radio Talk Forum. From the CB to the PC! You have found a Skip shooter's Paradise for HAM / CB radio operators online. This forum is for all my fellow radio enthusiasts, or up and coming radio operators to seek or give advice.. Feb 26, 2013 · What dose the T back button do for the cobra 29 lx cb radio What does T back switch do - Cobra 29lx Cb Radio W/clock 29 Lx question. Search Fixya. Browse Categories SOURCE: Wiring Johnson Microphone to cobra 29 CB Radio.. Jun 18, 2013 · Section 4: CB Radios Section 5: Wiring Section 6: Mounting the CB Section 7: Mounting the Antenna Section 8: Antenna Tuning Thanks to: LUSETACO for the extra info and corrections. Benson X for a good install thread. CircuitBreaker for additional information. Disclaimer: Anything you do yourself, you are always taking a chance something will go wrong..\nCitizens’ Band radio (often shortened to CB radio) is, in many countries, a system of short-distance radio communications between individuals on a selection of 40 channels within the 27-MHz (11 m) band. The CB radio service is distinct from FRS, GMRS, MURS, or amateur (“ham”) radio.. Diagram Of Circuit Cb Radio Manuals And Circuit Diagrams photo, Diagram Of Circuit Cb Radio Manuals And Circuit Diagrams image, Diagram Of Circuit Cb Radio Manuals And Circuit Diagrams gallery Back To Diagram Of Circuit. 11 photos of the \"Diagram Of Circuit\" Building Wiring Diagram; Mini Fm Transmitter Circuit Diagram; Old Three Way. Before you can get power to your new radio, you'll need to drill one more hole in the helm, this one for the wires. To determine the best location, put the radio in the.\nMost CB radios have a down-firing speaker mounted in the bottom of the case. This works well if the CB is mounted under the dash. If you plan to install your radio in-dash or on top of the dash, then you might consider the Cobra 18WXSTII, which has a front-firing speaker. Or you could also use an external speaker. After choosing a radio, the next step is to choose an antenna.. Microphone wiring can be a real pain if you aren't sure how to work out which wire goes where. On this page I will try to explain the basics and also give you the wiring positions for most CB radio's Basic Mics - These consist normally of three coloured wires and a braid/screen. The braid is the common wire for the TX/RX/Mod.\nThis is the back of the door panel, I ran a ground wire to the bolt ... This is the back of the door panel, I ran a ground wire to the\nAmazon.com: Cobra Electronics CBR29LTDCHR 40-Channel CB Radio With ... Amazon.com: Cobra Electronics CBR29LTDCHR 40-Channel CB Radio With PA Capability: Car Electronics\nDIY dipole CB base antenna There are many ways to hang a dipole. Sometimes they're use horizontally at a half-wavelength above the ground for trying to shoot skip.\nAmazon.com: Galaxy DX-979 40 Channel AM/SSB Mobile CB Radio: Car ... Amazon.com: Galaxy DX-979 40 Channel AM/SSB Mobile CB Radio: Car Electronics\nRugged Ridge CB Radio and Antenna Mounting Kit Write-Up - JK-Forum ... CB radio and antenna installed and ready to use! Let me know any question you may have and I will answer to the best of my ability, otherwise, ...\nAmazon.com: Galaxy-DX-959 40 Channel AM/SSB Mobile CB Radio with ... Amazon.com: Galaxy-DX-959 40 Channel AM/SSB Mobile CB Radio with Frequency Counter: Cell Phones & Accessories\nCB radio has a place in your preps - The Quiet Survivalist I picked up two of these really nice Cobra 86XLR base station radios today. Only $15 for the pair. Back in the day this was a high end radio and it includes ...\nAmazon.com: Midland 1001LWX 40 Channel Mobile CB with ANL, RF Gain ... Amazon.com: Midland 1001LWX 40 Channel Mobile CB with ANL, RF Gain, PA, and Weather Scan: Cell Phones & Accessories\nShare your cb radio install location - Dodge Cummins Diesel Forum ... ran the control wire to the actual radio back under the back seat. Held the radio itself down to the carpet under the seat with sticky backed velcro.", "label": "Yes"} {"text": "Inspired by the MMM-OpenHABFloorplan module, this is a module for the MagicMirror² to connect to an ISY device from Universal Devices (http://www.universal-devices.com) using a WebSocket. It will display a floor plan showing live updates of which Insteon or Z-Wave devices are turned on/off (including dimming levels), which alarm zones are tripped, and the status of the thermostats.\nThe module works by treating each device/variable as a “layer” on top of the base Floor Plan image–similar to layers in Photoshop. For each device, you create an overlay image (with a transparent background) of only what you want the device to look like when it’s on. The module will then show/hide this layer by setting the opacity based on if the ISY says the device is on or off.\nFloorplan Base Layer:\n- Initial Release", "label": "Yes"} {"text": "The question of how to learn computer is being asked by many people online today. Because it is very important to have computer education to work in any office today.\nIf you have no knowledge of how to use or operate a computer, you may be lagging behind and may have difficulty finding a job.\nComputer education or computer knowledge has become a necessary thing today 2021 without which most things cannot be done.\nSo nowadays children are being given computer education from this school. You will understand when you go to any office other places.\nWhere data entry is being done in Microsoft Excel Someone has edited a video or photo Where is the calculation being done through Tally software or Where is the work being done using computer internet.\nMoreover, if you have your own business, then you can easily settle your work and accounts by using the computer properly.\nSo using a computer today people in different places have done different things and do their work in a simple and straightforward way.\nSo the use of computers is happening in every private or government office today.\nAnd knowing how to use it to get a job has become very important.\nIn the end, if you want to keep yourself updated with today’s era then you need to learn the computer.\nOnce you have knowledge or use of a computer, you can prepare yourself for all kinds of work.\nSo let’s use simple rules or methods of how to learn computer at home, we do not know at a glance below.\nFOUR EASY WAYS TO LEARN COMPUTER\nThe Internet is a great way to learn computers at home. Yes, today the Internet has become an education through which we can learn not only about computers but also about anything.\nIn this case, the Internet is a blessing for us, but I will not say wrong.\nToday, people are learning about computers one by one through the internet.\nAll you need is a smartphone and an internet pack in it then you can take computer education using various internet learning tools.\nI myself have learned a lot about computers in this way and so I am telling you.\nTHERE ARE FOUR WAYS TO LEARN COMPUTER USING THE INTERNET\nYou must have an Android phone, so if that’s the case then activate the internet pack on it and you can learn everything from using the computer to the four rules I will tell you.\nBut first, you need to know what you want to learn on the computer.\nI mean a computer is a machine that works with different software and hardware and there is a lot to learn from computers there is no end to learning.\nFor example, if you have never used a computer before, you must first learn Computer Basic. If you want to calculate the official work data entry cost, then you need to learn Microsoft Excel or any other software.\nThere are many other things that you can learn about the work of editing the work of various software, the use of the Internet, the work of DTP Microsoft-office Photoshop, and the work of software development networking.\nBut you have to think for yourself what you want to learn about computers and which computer course you need to learn and continue your course accordingly.\nOnce you have basic computer knowledge then how can you learn professional courses and of course you can learn everything through the internet.\nFOUR WAYS TO LEARN COMPUTER FROM INTERNET\nRemember that you will learn computers using the online methods or rules I will talk about below.\nBut to become an expert you have to practice what you have learned at home or you will forget everything.\nLEARN COMPUTER BY YOUTUBE\nYouTube is the best way to learn anything online on the internet because there are millions and millions of tutorial videos on YouTube that you can watch to learn anything.\nToday, anyone can use YouTube to learn computer courses for Computer Basics, just by watching videos on their mobile phones, you can learn about computers and the things related to them.\nThrough YouTube, you can learn computers by watching videos in Bengali, Hindi, English, and many other languages.\nOnce you search for a computer course or computer basic course on YouTube, you will find many good tutorial videos.\nPlus you can learn Microsoft Office Excel Photoshop and much more by watching videos. Search for the course you want to learn on YouTube and watch the video online at home.\nCOMPUTER TUTORIAL BY PDF\nJust like you can learn about your computer by watching online videos, you can download various e-book files and learn about computer at home.\nA PDF is actually a file that contains text and images on a topic.\nAnd then the PDF files are uploaded to the internet so that people can download and read the content written on them.\nIn this case, you can find many computer courses and computer-related tutorial PDF files on the Internet.\nYou can download them from mobile and read advanced courses from computer basic to mobile.\nONLINE COMPUTER LEARNING WEBSITE\nNowadays in the age of the internet and in this age of the internet, we can learn almost everything as an online course.\nDo a Google search for the online computer course and you will find many websites that offer you free online computer courses and advanced courses.\nTo put it bluntly, you can learn computers using some of the online websites on the internet.\nAnd there are some who have promised to give you a certificate for your exam.\nSo if you don’t know anything about computers and want to take basic computer knowledge then you can learn how to use computers without any cost through these online websites.\nLEARN HOW TO USE A COMPUTER BY USING APPS\nYes, nowadays you can get many Android applications for free in the Google Play Store that you can use to take your computer education.\nIt is very easy to take more computer knowledge using these apps.\nApart from these, you will get many more Bangla computer tutorial apps quite loudly.\nOUR LAST WORD\nSo friends, using the ones I mentioned above, you can learn about computers on the Internet at home.\nThese mediums are best for learning basic computer online saving basics.\nMoreover, if you want, you can join the computer class and take computer training in a few days.\nIf you learn by joining a computer institution or class you can learn a lot faster and a lot better because there you will be shown everything in a practical way.", "label": "Yes"} {"text": "We are highly reputed in the electronics industry for over 30 years, through products such as audio and power transformers, adaptors, chargers and power supplies. Beam Tech is now one of the leading Taiwanese manufacturers of Sine wave Line Interactive / On Line Uninterruptible Power Supplies (UPS) & Sine Wave Inverters (with the capacity up to 12KVA). Beam Tech has been an ISO9002 certified company since 1996, and ISO9001 since 2002.\nOur customer-oriented innovations lead us to provide a value-added UPS to increase our strategic partners' competitive edge without any compromise in quality & service. We are highly reputed in the electronics industry for over 30 years.\nWe are welcome any PCB ODM/OEM requests. We are also capable of developing the related products, microprocessor based design, customized performance at the lowet price. Easy test, easy assembling, available for special design of control chips.\nQuality Control procedures are accomplished by using PCB in-circuit testers. Automatic testing equipment is used for final QC. We complete our QC policy from start to finished product", "label": "Yes"} {"text": "The drone can used for pesticide spraying in agriculture. Dagong drone sprayer D5 is specially developed for agriculture use. It has different operation mode, intelligent software and wonderful working performance.\n◆Environment friendly. Using UAV in agriculture can save water and reduce the use of the pesticide. To spray pesticide via a remote controller, the chance of close contact between farmers and the pesticide is greatly reduced, which effectively decreases the damage to human body.\n◆Emergency response to the outbreak of the pest disaster: The high efficiency makes the UAV pesticide spraying the first choice to cope with the pest disaster.\n◆Suitable for farmland: The flight height can be adjusted according to different crops without more cost.\n◆Cost effective and easy to operate: The farmer can operate the UAV after a short training. GPS mode offers great help for flight stability.\nIn 2017, DAGONG delivered Agriculture Drones to Japanese Client.", "label": "Yes"} {"text": "Here is everything you need for your event:\nWe recommend the ProChip Timing System, our active timing solution.\nX2 ProChip decoder\nThe X2 ProChip Decoder is a small, lightweight and affordable timing device to be installed in the timing booth on the track. The decoder determines the exact time at which each transponder passes the detection loops and sends this data to the server.\nDetection loops are installed in the track at the start and finish line and intermediate time points. The loops work as the system´s antennas and pick up the ProChips signals.\nAn active chips sends out a signal to the loop to register the time.\nProChip Timer is a timing solution for timers that have to manage a large number of chips at once. The ProChip is attached to the ankle of the athlete or the frontfork of the bike.\nThe ProChip FLEX is a subscription based highly reliable and accurate transponder suitable for all active sports. Attached to the competitior's ankle or bike frame, the ProChip transmits a unique signal to the detection loop in order to identify the athlete and record the exact passing time at an accuracy of 0.003 sec..\nDo you want to receive tailored advice?\nReceive the advise in your email including pricing overview for your specific situation.\nAre you looking for a timer? Check our partner network for a timer in your area.", "label": "Yes"} {"text": "View all Preventa XU\nsafety light curtain segments type 4 - XUSLDS - for hand protection - 2120 mmShow more characteristics\nDiscontinued on 31 March 2015\nEnd-of-service on 31 March 2015\nXUSLDSY5A2120 has not been replaced. Please contact your customer care center for more information.\nThe maximum number of products that can be compared is 4. Remove already added products.\nMain range of productPreventa Safety detection series nameAdvanced product or component typeSafety light curtain segments type 4 device short nameXUSLDS product specific applicationFor hand protection minimum object diameter for detection30 mm height protected2120 mm number of beams106 Complementary product compatibilityXUSLDM detection systemTransmitter-receiver system response time32 ms four segments32 ms three segments32 ms two segments kit composition1 receiver(s)1 transmitter(s) 2 sets of 2 brackets with fixings electrical connectionFlying lead with 1 female connector M12 4 pins receiverFlying lead with 1 female connector M12 4 pins transmitter net weight10.02 kg Contractual warranty Warranty18 months\nUser guideFormatSizeAdd to My Documentsprp.document.label.format pdfSize 3.6 MBDate 2/1/08DescriptionThe XUSLB/XUSLDM system is for use where personnel protection is required.\n- All Languages6\nTechnical FAQsNo results found.Unfortunately, related FAQs are unavailable due to temporary technical issues. Please try again later.", "label": "Yes"} {"text": "Colloidal suspensions of multilayer nanoparticles composed of a silver core, a polyelectrolyte spacer layer (inner shell), and a J-aggregate cyanine dye outer shell have been prepared for the first time. Absorption properties of the colloid were measured in the visible region. This multilayer architecture served as a framework for examining the coupling of the localized surface plasmon resonance exhibited by the silver core with the molecular exciton exhibited by the J-aggregate outer shell. The polyelectrolyte spacer layer promotes the formation of an excitonic J-aggregate while serving as a means of controlling the plasmon-exciton (i.e. plexciton) coupling strength through changing the distance between the core and the shell. An analytical expression based on Mie Theory and the Transfer Matrix Method was obtained for describing the optical response of these multilayered nanostructures. Computational and experimental results indicate that the absorption wavelength of the J-aggregate form of the dye is dependent on both the distance of the dye layer from the silver core and the degree of dye aggregation.\n© 2013 Optical Society of America\nSilver and gold nanoparticles have been studied extensively for their unique optical properties in the UV, visible, and infrared regions of the electromagnetic spectrum [1–4]. These properties arise from the collective oscillation of conduction band electrons throughout the particle in response to optical excitation, a process commonly termed as localized surface plasmon resonance. Resonance occurs when the frequency of incident radiation is at or near the frequency of the electronic oscillation. This resonance results in a strong enhancement of the local electric field, useful for surface-enhanced Raman scattering (SERS), surface-enhanced fluorescence, and the study of nonlinear optical response [5–7]. Additionally, the size and morphology of the silver and gold nanoparticles have a significant impact on surface plasmon resonance frequency and therefore have a great significance in such fields as sensors and photonic devices.\nCyanine dyes are commonly used in spectral sensitization, and have potential application in novel optoelectronic materials . Structurally, these dyes consist of two heterocyclic units that are connected by an odd number of methine groups (CH)n (n = 1,3,5, etc.). The color of the dye is mainly determined by the length of the polymethine chain . A particularly intriguing property of cyanine dyes is their tendency to aggregate under certain conditions in solution. These so called J-aggregates exhibit a narrow absorption band that is red shifted with respect to the monomer absorption band . The shift in absorption of the aggregate has been described by a Frenkel exciton model, in which excited states are formed by the coherent coupling of molecular transition dipoles [10,11].\nMulti-layered nanoparticles, composed of both a noble metal and a J-aggregate dye, provide a unique framework for studying plasmon-exciton interactions. Numerous structures exhibiting these plasmon-exciton interactions have been fabricated and studied in recent years. Some nanostructures have involved the direct adsorption of J-aggregate dyes onto the surface of silver nanoparticles with varying geometries [12–14]. Other efforts have focused on the aggregation of cyanine dyes onto complex geometries. For example, cyanine dyes were adsorbed onto silica core/gold shell nanoparticles . In these studies, it was observed that the absorption spectra of these composite nanoparticles were not the simple sum of the absorption of the metal nanoparticle and the J-band of the aggregate. Rather, strong plasmon-exciton interactions (plexcitons) were observed, resulting in a shift in the absorption bands of the individual plasmon and exciton resonances. A more recent study by Yoshida et al. explored the impact of inserting a spacer layer (inner shell) between a metallic core particle (Au) and an outer J-aggregate dye layer (outer shell) . The spacer layer used in the study was a cationic thiol which promoted the J-aggregation of anionic cyanine dyes onto the surface of the nanocomposite. The spectral line shape of these composites was dependent on the strength of the plasmon-exciton coupling between the metal core and the J-aggregate shell.\nThe metallic core composition and size, excitonic shell composition, degree of J-aggregate formation within the excitonic shell, and distance between the plasmonic core and excitonic shell are among the factors that play the most significant roles in controlling optical response. Metallic core particles and excitonic dyes of varying composition are readily available and selection is based on the intrinsic optical properties of the material. In terms of particle shape, a range of metallic core shapes such as spheres, rods, and platelets may be fabricated using well documented solution-based techniques [17–20]. However, spacer layer thickness and its impact on plasmon-exciton coupling in these nanoparticle systems have not been studied systematically. The spacer layer must serve the two-fold purpose of promoting the formation of a J-aggregate shell while also creating a distance, with specified length, between the metallic core and excitonic shell. To that end, we report the use of a variably thick polyelectrolyte spacer layer as a means of building multilayered plexcitonic nanoparticles and controlling plasmon-exciton distance. Specifically, we report the use of alternating cationic poly(diallyldimethyl ammonium chloride) (PDADMAC) and anionic poly(styrene sulfonate) (PSS) as a spacer layer between a silver core and a J-aggregate outer shell. The layer-by-layer self-assembly of oppositely charged polyelectrolytes has been used extensively as a means of coating and functionalizing colloidal particles [21,22]. The thickness of the polyelectrolyte spacer layer was controlled in this study by varying the number of PDADMAC/PSS layers that were adsorbed. The outer J-aggregate shell was formed by adsorbing the cationic form of PIC onto the outermost anionic PSS layer. A schematic of the double-shell structure is provided in Fig. 1(a). Figure 1(b) provides a schematic of the electrostatic adsorption of 1,1’-diethyl-2,2-cyanine (PIC) J-aggregates at the surface of a PDADMAC/PSS coated silver nanoparticle. The use of a polyelectrolyte spacer layer may be incorporated into a wide range of core-shell systems, regardless of geometry and composition. Therefore, this approach may be used as a means of studying plasmon-exciton coupling in a wide range of multilayered plexcitonic structures.\nIn order to explain the measured absorption features of the Ag/polyelectrolyte/PIC composite nanoparticles, Mie Theory and the Transfer Matrix Method were used to calculate the optical response of these multilayered nanospheres. Numerical simulations yielded good agreement with experimental results. Specifically, the impact of polyelectrolyte spacer layer thickness on the shift of the exciton frequency was elucidated. These results indicate that a polyelectrolyte spacer layer is a plausible means for tuning plasmon-exciton coupling in colloidal suspensions of multilayered plexcitonic nanoparticles.\n2. Experimental methods\nSilver nitrate, trisodium citrate tribasic dihydrate, sodium poly(styrene sulfonate) (PSS, MW ~70,000), poly(diallyldimethyl ammonium chloride) (PDADMAC, medium molecular weight 26062-79-3), sodium phosphate monobasic dihydrate, sodium phosphate dibasic dihydrate, and 1,1’-diethyl-2,2’-cyanine iodide were purchased from Sigma Aldrich (St. Louis, MO).\nSilver nanoparticles were prepared using a modified procedure by Lee and Meisel in which Ag+ ions are chemically reduced in aqueous solution . Approximately 110 mg of AgNO3 were dissolved in 400 mL deionized H2O (18MΩ) and placed in a 1L 3-neck flask. A condenser tube (250 mm jacket length) was placed on the center neck of the flask to minimize evaporation losses. An addition funnel, containing 10 mL of 1% (wt/wt) trisodium citrate solution, was attached to a second neck of the flask. The solution was magnetically stirred and heated to 100°C using a heating jacket and temperature controller (Glass-Col, Terre Haute, IN) while refluxing. Once the boiling point was reached, the trisodium citrate solution was slowly added drop-wise. The mixture was heated and stirred for an additional hour at 100°C. The solution was then cooled to room temperature and stirring continued for an additional hour. Assuming a 100% yield, the silver colloid had an approximate concentration of 0.3 mg/mL.\nA standard solution of 1,1-diethyl-2,2’cyanine iodide (PIC) was prepared by dissolving 25 mg PIC in 100 mL phosphate buffer (pH = 6.0).\nSilver core – polyelectrolyte shell nanoparticles were prepared by exposing the silver sol to supersaturated concentrations of polyelectrolytes. First, 10 mL Ag sol were transferred to a 50 mL polypropylene centrifuge tube. The sample was centrifuged at 4000 RPM for 15 minutes and the supernatant containing excess citrate was removed. 5 mL H2O were then added to the tube followed by sonication. Next, 5 mL PDADMAC (1 mg/mL, 0.01 M NaCl) were added, and the suspension was vigorously mixed for 1 minute. The solution was allowed to stand for 30 minutes. Centrifugation (4000 RPM, 15 minutes) was used to remove the supernatant and excess polymer. Two cycles of a 10 mL water addition, followed by sonication, centrifugation, and supernatant removal were performed to ensure the removal of excess polymer. The same solution concentration and procedures used for the adsorption of PDADMAC were used for adsorption of additional polyelectrolyte layers (i.e. PSS, 1 mg/mL, 0.01 M NaCl). Combinations of 2, 4, and 6 polyelectrolyte layers, i.e. (PDADMAC/PSS)1,2,3, were adsorbed onto the silver particles. The Ag core – polyelectrolyte shell nanoparticles were resuspended in 5 mL water with sonication.\nFor the in situ generation of a J-aggregate shell on the silver core – polyelectrolyte shell nanoparticles, the concentration of the Ag core - polyelectrolyte shell nanoparticle suspension was adjusted until absorbance measurements yielded an approximate absorbance of 0.5 to 1.5 absorbance units. This involved diluting 1 mL of the suspension to 25 mL with water. 3 mL of the diluted suspension were then placed in a 10 mm optical path quartz cuvette. 100 µL aliquots of PIC standard (0.25 mg/mL) were added to the cuvette, followed by mixing and immediate absorbance measurement.\nAg/polyelectrolyte/PIC composite nanoparticles were also prepared by exposing Ag core - polyelectrolyte shell nanoparticles to PIC for 24 hours. This involved placing 5 mL Ag core - polyelectrolyte shell nanoparticles in a 50 mL polypropylene centrifuge tube, follow by the addition of 5 mL of PIC standard. The samples sat for 24 hours to ensure adequate adsorption and aggregation of the dye onto the surface of the particles. The following day, the colloidal suspensions were centrifuged at 4000 RPM for 15 minutes, and the supernatant discarded for removal of excess PIC standard. The solid nanoparticles were washed with 10 mL water followed by sonication, centrifugation, and supernatant removal to ensure the removal of excess PIC. The particles were then resuspended in 5 mL water and sonicated. Finally, excessively large NPs were removed using a 0.22 µm Millex GP syringe filter. This procedure was repeated for each of the Ag/polyelectrolyte/PIC NP combinations.\nAll UV/Vis absorption spectra were measured in a quartz cuvette (10 mm optical path length) using a V-670 spectrophotometer (JASCO Co.). Spectra were measured from 190 nm to 800 nm. Transmission electron microscopy (TEM) images were observed in a FEI (Hillsboro, OR) Tecnai 12 TWIN TEM operating at 100kV. Samples were prepared by placing 5.0 µL of the particle solution onto a freshly ionized 300 copper mesh carbon coated/formvar grid. The samples were allowed to dry completely. Images were collected using an Olympus Soft Imaging System (Lakeland, CO) Megaview III digital camera. Figures were assembled in Adobe Photoshop using only linear adjustments in brightness and contrast. For the determination of zeta-potential, a Zetasizer Nano ZS (Malvern Instruments) was used to measure the electrophoretic mobilities of colloidal particles. The mobility µ was converted into a ζ-potential using the Smoluchowski relation (ζ = µη/ε, where η is the viscosity of the solvent and ε is the permittivity of the solvent). The hydrodynamic radius was also determined using the Zetasizer Nano ZS instrument. This measurement is a dynamic light scattering technique.\n3. Theoretical methods\nIn order to calculate the optical response of the Ag/polyelectrolyte/PIC nanocomposites, we generalize Mie theory to multilayer nanospheres via the Transfer Matrix Method [23–25]. For multilayer nanospheres, the electric field can be decomposed into orthogonal channels labeled by (σ,l), where σ takes TE or TM, and l = 1, 2, 3,… [26–29]. The scattering and absorption cross-sections are the sum of contributions from each channel, and the extinction cross-section is the sum of scattering and absorption cross-sections:\nIn order to determine rσ,l, we decompose the electric field inside each shell into incoming and outgoing spherical waves with coefficients (An, Bn). The coefficients of adjacent shells are connected by the transfer matrix of that interface, whose elements are determined by the boundary condition of TE or TM modes:30]:16,31]. Hence, 575 nm was taken as the excitation wavelength of the J-aggregate for the complex frequency-dependent dielectric function of the PIC J-aggregate, which was approximated using:32].\n4. Results and discussion\nThe citrate reduction method used in this study yielded silver core nanoparticles with an average particle size of 54.5 nm and a standard deviation of 9.8 nm. Figure 2(a) displays a TEM image of the silver nanoparticles. Most of the particles have a spherical shape with a relatively narrow size distribution, although a small amount of non-spherical particles are observed. Figure 2(b) displays the absorbance spectra of the silver colloid (blue curve) and the PIC standard (red curve). The silver colloid and PIC standard solutions are characterized by an absorption λmax at 442 nm and 523 nm, respectively. Of particular note is the absence of the PIC J-aggregate peak, which is commonly observed at or near 575 nm. This observation is consistent with published data, as the concentration of the PIC standard in this solution is too low for the formation of the J-aggregate [16,31].\nInsertion of a polyelectrolyte layer between the Ag core and the cyanine dye outer shell was a central theme in this study. Specifically, our goal was to demonstrate the formation of the PIC J-aggregate on a silver core – polyelectrolyte shell composite nanoparticle. The layer-by-layer self assembly of polyelectrolytes on colloidal particles is an established technique for building stable and functionalized multilayers on nanoparticles. The irreversible electrostatic interaction between cationic and anionic polyelectrolyte layers aid in stabilizing these films. In our study, the sequential addition of PDADMAC and PSS, with PSS forming the outermost polyelectrolyte layer, was used to control the thickness of the polyelectrolyte layer and to render the outer surface of the particles with a negative charge. The negative surface charge promotes the adsorption and J-aggregation of the cationic PIC dye onto the surface of the particles. Figure 2(c) provides a summary of the ζ-potential measurements of Ag particles coated with sequential layers of PDADMAC and PSS. The ζ-potential alternates between positive and negative values for the sequential additions of PDADMAC and PSS, respectively.\nSilver core – polyelectrolyte shell nanoparticles were exposed to PIC in a series of experiments. First, UV/Visible absorbance measurements of Ag core – polyelectrolyte shell colloids (0.013 mg/mL) were taken immediately after the addition of 100 µL increments of PIC standard, in order to determine if the PIC J-aggregate would form in situ. All in situ experiments were performed on Ag particles coated with one PDADMAC/PSS bi-layer. Figure 3 displays the absorbance spectra of these particles. As a control, the absorbance spectrum of Ag/PDADMAC/PSS was determined prior to the addition of PIC. The absorbance spectrum of Ag/PDADMAC/PSS is characterized by a λmax at 435 nm; compared to the absorbance spectra of the silver sol displayed in Fig. 2, it has a somewhat broader absorbance from 600 nm to 700 nm, possibly due to the slight agglomeration of silver core-polyelectrolyte shell nanoparticles. As PIC standard was incrementally added, a sharp peak near 570 nm is observed, indicative of J-aggregate formation. We note that the concentration of the PIC standard is too low to form J-aggregates in solution; therefore the observed J-aggregation of PIC must be promoted by the presence of the polyelectrolyte shell. J-aggregate peaks at 570 nm, 571 nm, and 571 nm were observed after the sequential addition of 100 µL, 200 µL, and 300 µL of PIC standard, respectively. Typically, when fully aggregated, the J-aggregate of PIC is characterized by an absorbance at 575 nm. Based on the theoretical model of the J-aggregate absorbance wavelength, we conclude that the PIC shell in this experiment is not in a fully aggregated form.\nNext, we studied the impact of spacer layer thickness. This was achieved by adsorbing PIC to Ag/polyelectrolyte composite nanoparticles composed of 1 PDADMAC/PSS bi-layer, 2 PDADMAC/PSS bi-layers, and 3 PDADMAC/PSS bi-layers. In this set of experiments, formation of a fully aggregated PIC shell was promoted by exposing Ag/polyelectrolyte composite nanoparticle suspensions to PIC dye for 24 hours. A TEM image of the silver/polyelectrolyte/PIC nanoparticles is provided in Fig. 4(a). Figure 4(c) also displays the absorbance spectra of these experiments. The spectra is characterized by the formation of a red-shifted J-aggregate peak at 581 nm, 581 nm, and 579 nm for Ag particles coated with 1 (PDADMAC/PSS), 2 (PDADMAC/PSS), and 3 (PDADMAC/PSS) shells, respectively.\nThe J-aggregate peaks were observed at wavelengths that were comparatively longer than what is commonly reported in the literature for PIC, i.e. 575 nm. Additionally, the J-aggregate peak wavelength was found to increase with decreasing spacer thickness. These results suggest that the PIC was fully, or close to fully aggregated, and that the plasmon-exciton interaction further red shifted the J-aggregate peak. This observation is consistent with the fact that plasmon-exciton interactions are enhanced as the distance between the J-aggregate shell and the Ag core particles is diminished.\nSimulated absorbance spectra of Ag/(PDADMAC/PSS)/PIC nanoparticle composites were calculated in Fig. 4(c) in order to explain the main absorption features of the experimental data. For the dielectric constants, we used experimental frequency-dependent complex dielectric constant for the silver , literature values of 2.25 for PDADMAC and 2.56 for PSS , and Eq. (8) (with f = 0.35 and γ = 0.015) for the PIC J-aggregate. We assume a silver core of 54.5 nm (with SD = 9.8 nm), a J-aggregate dye outer shell of 5 nm, and a polyelectrolyte spacer of thickness 1 nm per bi-layer. This calculation is consistent for similar structures, in which the thickness of the polyelectrolyte bi-layers was determined to be 1.7 to 3.0 nm [21,34]. The simulation result in Fig. 4(c) was in qualitative agreement with the experimental absorbance spectra in Fig. 4 (b). Namely, the experimental and simulation results demonstrate the dependence of coupling strength and shift of the exciton frequency on spacer layer thickness. The red-shifted energy of the J-aggregate peak increases as the spacer layer thickness is minimized, i.e. the plasmon-exciton interaction is maximized. Discrepancies between the experimental and simulated results, in terms of J-aggregate peak shape, may be attributed to the fact that non-spherical and/or aggregated particles were not included in the simulated results.\nMultilayered plexcitonic nanoparticles composed of an Ag core, polyelectrolyte spacer layer, and a PIC outer shell have been synthesized. The optical properties of the composite nanoparticles in aqueous solution were measured in the UV/Visible regions. Absorbance spectra of the colloidal nanoparticles indicate that PDADMAC/PSS spacer layers successfully promoted the J-aggregation of PIC. The in situ generation of the J-aggregate was observed when PIC standard was added directly to a colloidal suspension containing silver core – polyelectrolyte shell composite nanoparticles. The formation of the fully J-aggregated form was observed when PIC was exposed to a colloidal suspension of silver core – polyelectrolyte shell nanoparticles for 24 hours. The 24 hour study yielded a J-aggregate absorbance at 579-581 nm, indicating the formation of a fully aggregated dye on the surface of the composites. The fully aggregated form of PIC is typically observed at 575nm. The additional red-shift in energy that was experimentally observed may be explained by the plasmon-exciton interaction between the silver core and the J-aggregate exterior. It is concluded that the use of oppositely charged polyelectrolytes is a valid approach for inducing the formation of J-aggregates on silver core-polyelectrolyte shell particles. Furthermore, polyelectrolyte spacer layers are a means of controlling the plasmon-exciton distance, which can ultimately be used to control the shift in exciton frequency. Finally, the ease with which polyelectrolyte layers are assembled onto colloidal nanoparticles of varying shape and composition, makes this technique suitable for building a wide range of plexcitonic particles.\nThis research was funded by the Department of the Army Basic Research Program and sponsored by the Edgewood Chemical Biological Center. Support was also provided by the U.S. Army Research Office under contract W911NF-13-D-0001. Special thanks to Dr. Michael McCaffery of the Johns Hopkins University Integrated Imaging Center for his assistance with the TEM images.\nReferences and links\n1. M. Kerker, The Scattering of Light and Other Electromagnetic Radiation (Academic Press, 1969).\n2. S. A. Maier, Plasmonics: Fundamentals and Applications (Springer, 2010).\n3. C. Noguez, “Surface plasmons on metal nanoparticles: the influence of shape and physical environment,” J. Phys. Chem. C 111(10), 3806–3819 (2007). [CrossRef]\n7. P. J. Chakraborty, “Metal nanoclusters in glasses as nonlinear photonic materials,” J. Mater. Sci. 33(9), 2235–2249 (1998). [CrossRef]\n8. T. Tani, Photographic Sensitivity, (Oxford University, 1995).\n9. F. Würthner, T. E. Kaiser, and C. R. Saha-Möller, “J-Aggregates: from serendipitous discovery to supramolecular engineering of functional dye materials,” Angew. Chem. Int. Ed. Engl. 50(15), 3376–3410 (2011). [CrossRef] [PubMed]\n10. A. S. Davydov, Theory of Molecular Excitons (Plenum, 1971).\n11. M. van Burgel, D. A. Wiersma, and K. Duppen, “The dynamics of one-dimensional excitons in liquids,” J. Chem. Phys. 102(1), 20–33 (1995). [CrossRef]\n12. J. Hranisavljevic, N. M. Dimitrijevic, G. A. Wurtz, and G. P. Wiederrecht, “Photoinduced charge separation reactions of j-aggregates coated on silver nanoparticles,” J. Am. Chem. Soc. 124(17), 4536–4537 (2002). [CrossRef] [PubMed]\n13. G. A. Wurtz, P. R. Evans, W. Hendren, R. Atkinson, W. Dickson, R. J. Pollard, A. V. Zayats, W. Harrison, and C. Bower, “Molecular plasmonics with tunable exciton-plasmon coupling strength in J-aggregate hybridized Au nanorod assemblies,” Nano Lett. 7(5), 1297–1303 (2007). [CrossRef] [PubMed]\n14. N. Kometani, M. Tsubonishi, T. Fujita, K. Asami, and Y. Yonezawa, “Preparation and optical absorption spectra of dye-coated Au, Ag, and Au/Ag colloidal Na noparticles in aqueous solutions and in alternate assemblies,” Langmuir 17(3), 578–580 (2001). [CrossRef]\n15. N. T. Fofang, T. H. Park, O. Neumann, N. A. Mirin, P. Nordlander, and N. J. Halas, “Plexcitonic nanoparticles: Plasmon-exciton coupling in nanoshell-j-aggregate complexes,” Nano Lett. 8(10), 3481–3487 (2008). [CrossRef] [PubMed]\n16. A. Yoshida, Y. Yonezawa, and N. Kometani, “Tuning of the spectroscopic properties of composite nanoparticles by the insertion of a spacer layer: effect of exciton-plasmon coupling,” Langmuir 25(12), 6683–6689 (2009). [CrossRef] [PubMed]\n17. P. C. Lee and D. Meisel, “Adsorption and surface-enhanced Raman dyes on silver and gold sols,” J. Phys. Chem. 86(17), 3391–3395 (1982). [CrossRef]\n18. B. D. Busbee, S. O. Obare, and C. Murphy, “An improved synthesis of high-aspect-ratio gold nanorods,” J. Adv. Mater. 15(5), 414–416 (2003). [CrossRef]\n19. Q. Zhang, N. Li, J. Goebl, Z. Lu, and Y. Yin, “A Systematic Study of the Synthesis of Silver Nanoplates: Is Citrate a “Magic” Reagent?” J. Am. Chem. Soc. 133(46), 18931–18939 (2011). [CrossRef] [PubMed]\n20. N. R. Jana, L. Gearheart, and C. J. Murphy, “Wet chemical synthesis of silver nanorods and nanowires of controllable aspect ratio,” Chem. Commun. (Camb.) 0(7), 617–618 (2001). [CrossRef]\n21. G. B. Sukhorukov, E. Donath, H. Lichtenfel, E. Knippel, M. Knippel, A. Budde, and H. Möhwald, “Layer-by-layer self assembly of polyelectrolytes on colloidal particles,” Coll. and Surf. A: Phys. and Eng. Aspects 137(1-3), 253–266 (1998). [CrossRef]\n22. G. B. Sukhorukov, E. Donath, S. Davis, H. Lichtenfeld, F. Caruso, V. I. Popov, and H. Möhwald, “Stepwise polyelectrolyte assembly on particle surfaces: a novel approach to colloid design,” Polym. Adv. Technol. 9(10-11), 759–767 (1998). [CrossRef]\n23. W. Qiu, B. G. DeLacy, S. G. Johnson, J. D. Joannopoulos, and M. Soljačić, “Optimization of broadband optical response of multilayer nanospheres,” Opt. Express 20(16), 18494–18504 (2012). [CrossRef] [PubMed]\n24. H. C. van de Hulst, Light Scattering by Small Particles, (Dover, 1981).\n25. C. Bohren and D. Huffman, Absorption and Scattering of Light by Small Particles, (John Wiley & Sons,1983).\n26. R. E. Hamam, A. Karalis, J. D. Joannopoulos, and M. Soljačić, “Coupled-mode theory for general free-space resonant scattering of waves,” Phys. Rev. A 75(5), 053801 (2007). [CrossRef]\n28. Z. Ruan and S. Fan, “Temporal coupled-mode theory for fano resonance in light scattering by a single obstacle,” J. Phys. Chem. C 114(16), 7324–7329 (2010). [CrossRef]\n29. Z. Ruan and S. Fan, “Design of subwavelength superscattering nanospheres,” Appl. Phys. Lett. 98(4), 043101 (2011). [CrossRef]\n30. T. Kobayashi, J-Aggregates, (World Scientific Publishing Co. Pte. Ltd., 1996).\n31. A. Dixon, C. Duncan, and H. Samha, “Self assembly of cyanine dye on clay nanoparticles,” Am. J. Undergrad. Res. 3, 29–34 (2005).\n32. H. Kuhn and H. D. Foresterling, Principles of Physical Chemistry (Wiley, 2000).\n33. E. D. Palik, Handbook of Optical Constants of Solids (Academic, 1985).", "label": "Yes"} {"text": "The Resiliency Management System® will provide advanced visualization for control center operations\nResilientGrid, Inc. announced that a large Public Power utility in the US has selected the ResilientGrid Resiliency Management System (RMS™) software platform for implementation in their three integrated transmission operations centers. The deployment of the RMS will facilitate important shared situational awareness through advanced visualizations, allowing the operators to see and understand the full transmission system in one place - similar to a “single pane of glass” visualization. The integration of data streams, from the growing number of grid systems (such as SCADA, EMS, weather data, PMUs, advanced network applications, historian), provides for improved capabilities in the control center and fosters increased productivity among the operators and shift supervisors.\nThe utility, located in the western region of the US, is focused on providing its operators with best-in-class and innovative technologies that will optimize their environment and efficiencies as they embark on a multiyear project to update the primary, backup, and training centers for transmission and Balancing Authority (BA) operations. ResilientGrid’s RMS will play a central role by integrating the new video walls and operator workstations to provide a consistent and new level of shared situation awareness that is optimized by leveraging ResilientGrid’s expertise in human factors, cognitive systems engineering, and other science-based disciplines.\n“We’re thrilled to be a part of this project,” said Michael Legatt, Founder and CEO of ResilientGrid. “The key to supporting system operators is in improving the ease of access to all of their critical data in a way that is optimized for them, when and where it is needed most. We’re looking forward to supporting continuous improvement in the utility’s control centers, and incorporating current and future advanced technologies, from PMUs to cutting-edge network applications”.", "label": "Yes"} {"text": "TetherTools JerkStopper Extension Lock JS026BLK\n£10.08 Incl. VAT£8.40 Excl. VAT\nThe JerkStopper Extension Lock is an effective locking device for cables and cords that keeps your cable ends protected from frustrating disconnects, damage, and electrical haza…\nShown as in stock, please call to confirm\nThe JerkStopper Extension Lock is an effective locking device for cables and cords that keeps your cable ends protected from frustrating disconnects, damage, and electrical hazards. The simple clam-shell design enables you to simply close the JerkStopper Extension Lock around each end of the cable or cord, and then twist to lock the cords securely and safely together.\nThe patented JerkStopper Extension Lock protects the sensitive electronic cable ends and stops unwanted disconnects for USB extension cables, HDMI cables with couplers, and protects power cords for lighting and tools.\nThe JerkStopper Extension Lock comes with two included rubber washers that further protect your cable ends, removing the stress and strain when pulled, ensuring the cable stays connected.\nOn an outdoor tethered photoshoot? The JerkStopper Extension Lock is weather proof (not submergible) and the hard plastic protective casing can protect cables from the dust, dirt, and physical damage.\n- Protect cables from disconnects\n- Protect from getting crushed\n- Weather proof – not submergible\n- Screw locking mechanism to accommodate various lengths.\n- Accommodates cables and cord from 3.5″ (8.9cm) to 5.3″(13.5cm)\n- Black foam sealer for electrical cables\n- Two rubber washers for spacing and weather sealing", "label": "Yes"} {"text": "If a solar flare happened during a total lunar eclipse, would the Earth block the flare from hitting the moon?\nProbably not, for several reasons.\nThe high frequency electromagnetic radiation from a solar flare isn't what does the bulk of the damage to power grids and such. It's the huge stream of charged particles released by coronal mass ejections (CMEs) that are sometimes associated with solar flares that do that damage. For example, it wasn't the solar flare itself that did the damage to telegraph systems on the Earth during the Carrington Event. It was the CME associated with the flare. While it took only eight minutes for the electromagnetic radiation from the flare to travel from the Sun to the Earth, it took over eighteen hours for those charged particles to travel from the Sun to the Earth -- and they followed a curved path.\nThis means that if a Carrington-level solar flare did happen during a total lunar eclipse, the Earth would have shielded the Moon from the direct effects of the flare. However, the eclipse would have been over by the time the CME hit the Earth. It gets worse.\nThe Earth's magnetic field has a huge cross section to charged particles emitted by the Sun, much larger than the Earth itself. The magnetic field protects the Earth against all but the worst devastations from the Sun. Even then, the vast majority of the charged particles are swept aside by the Earth's magnetic field.\nThis magnetic field has a very long magnetotail that extends beyond the Moon. Unlike eclipses, which are rare, The Moon crosses the Earth's magnetotail every month. It takes the Moon about six days to traverse the Earth's magnetotail. The problem is that this magnetotail is highly turbulent, particularly when the Earth is hit hard such as by a CME. Most of the charged particles ejected by a CME are swept aside by the magnetic field, concentrated in the outer fringes of the magnetotail. The turbulent nature of the magnetotail means the Moon would be occasionally inundated with a huge flux of charged particles should a Carrington-level event occur.\nA solar flare that occurs during a lunar eclipse would mean that lunar colonists would need to get deep underground, and would need to protect equipment such as solar arrays left on the surface.", "label": "Yes"} {"text": "EZ Dupe proudly presents the greatest media back up solutions for all types of flash memory and permanent discs with the M904-SSP. Optical Disc duplication from media memory storage (USB pen drives, SD cards, CF cards, or Memory Stick) and optical discs to discs (DVD or Blu-Ray version).\nEasy to use multimedia backup center that takes different media to permanent storage of an optical disc (DVD or Blu-Ray version).\nThe Media Mirror is absolutely packed with rich features such as Multi-Session technology which permits several memory cards or USB devices to be placed on a single Blu-Ray/DVD/CD disc. Everything that the Media Mirror copies will be with lightning fast mirror image accuracy!", "label": "Yes"} {"text": "MSDSE Archive - Themes\nThe world’s growing interest in data science is undeniable. One can see this reflected in the increased number of new academic degree and certificate programs, the number of new jobs available for individuals with data science skills, and the rising migration of researchers with computational skills to the private sector. In an effort to channel our efforts, we focus on six major themes around which academic data science discussions coalesce:\n- Education and training\n- Tools and software\n- Reproducibility and open science\n- Physical and intellectual space\n- Data science studies\nHow do we create and sustain long-term career trajectories for a new generation of scientists whose research depends crucially on the analysis of massive, noisy, and/or complex data and whose work may require substantial curation and/or development efforts? What about those scientists who focus entirely on building next-generation tools that others ultimately use to derive new science? These career paths are currently complicated by strong competition from industry, a tendency by universities to measure productivity using only traditional metrics (e.g., journal publication) that do not reflect the scholar’s full contribution, and a general failure to provide a sufficiently supportive and meaningful environment and culture.\nWe see persistent, complex, and deep-rooted challenges for the career paths of people whose skills, activities, and work patterns do not fit neatly into the roles and success metrics of traditional academia. However, data science in research universities requires precisely the kind of complex, long-term interdisciplinary work with methodological and engineering efforts that leads to “low performance” under traditional metrics and “slow progress” and “lack of fit” in existing career tracks.\nActivities around this theme in the Data Science Environments include the following:\n- Defining positions and career tracks (e.g., data science faculty lines, data science fellows)\n- Promoting institutional policies that facilitate career development for data scientists\n- Building a recognizable data science community across scientific domains\n- Promoting mentorship and job satisfaction\n- BIDS Working Group on Career Paths and Alternative Metrics\n- UW eScience Working Group on Career Paths and Alternative Metrics\nEducation and Training\nTraining in data science is needed at all levels in academic research, from the undergraduate student to the tenured faculty member. A major challenge to data science training is that it is inherently multidisciplinary, requiring training in computer science, statistics, applied mathematics, and one or more domain areas. Traditional university curricula do not provide this kind of broad data science training, and often data science courses are relegated to specific departments with no consideration of cross-disciplinary needs.\nThe Education Working Group is developing ways to use innovative teaching methods and formats to offer both formal and informal training in data science skills at undergraduate, graduate, and professional levels. Viewing education in its widest sense, the aim is to make data science technology and expertise far more accessible both within universities and beyond.\nTools and Software\nData-intensive science and data-driven discovery requires an ecosystem of software tools that are openly available, easy to use, and translatable across domains. How can the development, hardening, sustaining, sharing, and integration of techniques into a reusable software infrastructure be recognized and incentivized? There are known obstacles to the development of software tools, including the fact that domain scientists are specifically trained to develop and deliver the advanced software they require and that computer scientists and engineers have little incentive to harden, sustain, share, and integrate novel techniques into a reusable software infrastructure. We are working to remove these obstacles both within the Data Science Environments and in the broader academic community.\nSpecific goals around this theme include the following:\n- Deliver high-impact, usable, and generalizable software for science that does not “reinvent the wheel”\n- Promote open source software practices\n- Create, strengthen, and deepen connections between tool developers and investigators in data-driven domains\n- Promote “matchmaking” between methods/tools and substantive domains\n- BIDS Working Group on Software Tools and Environments\n- UW eScience Working Group on Software Tools and Environments\nReproducibility and Open Science\nThe pace of knowledge acquisition in science is impeded by a lack of sharing of the research process in its entirety in addition to all of its outputs. This makes it difficult for researchers to build upon each other’s work and undoubtedly results in some “reinvention of the wheel.” Further, there is increasing scrutiny of publications reporting on “irreproducible results,” which can lead to misinformation and public distrust of science. As we transition to data-intensive scientific discovery, we have the opportunity to address these issues through software tools and practices that support the sharing, preservation, provenance tracking, and reproducibility of data, software, and scientific workflows.\nAs data-intensive scientific discovery becomes more common, reproducibility and open science becomes both more challenging and more important. Work around this theme includes identifying and promoting repositories for sharing data and workflows, developing techniques to query and analyze shared data and workflows that will facilitate reuse, and creating software tools to better support sharing and reproducibility.\n- BIDS Working Group on Reproducibility and Open Science\n- UW eScience Institute Working Group on Reproducibility and Open Science\nPhysical and Intellectual Space\nInnovative data science is advanced at universities through the creation of high-quality physical spaces that successfully cultivate the “water cooler” effect (i.e., exchange and collaboration), raise the level of prestige for data science and scientists, and are adaptable to a range of activities that can promote data science research and learning. It is also essential that spaces be designed to bring together the data scientists who reside in academic units spread across our (large) campuses. This requires the spaces to be valuable as study, contemplation, development, and individual work areas.\nThe goal of discussions around this theme include how to design common spaces that encourage collaboration both within and between universities in a setting where stakeholders wear multiple hats and often have their own labs to manage. What events are most successful at bringing in researchers from multiple domains? How can space provide both the means for collaboration and the proper setting for concentration on data-intensive science?\n- BIDS Working Group on Working Spaces and Culture\n- UW eScience Institute Working Group on Working Spaces and Culture\nData Science Studies\nData Science Studies is a multi-sited working group of cross-disciplinary researchers studying the sociocultural and organizational processes around the emerging practice of data science. As a sub-field of Science and Technology Studies, we utilize a variety of qualitative and computational methods to understand the changing scientific practices, knowledge infrastructures, and cultural values that are shaping the environment for data-intensive scientific research. This encompasses, but is not limited to research focused around topics such as: the cultural and institutional contexts for open science, open software, and open data, tool building and scientific workflow, new pedagogical models for data science education, how disciplines are adapting to the demands of data-intensive science, new epistemologies and social implications of data-intensive science, human-centered data science, and studies of sociotechnical data science ecosystems.", "label": "Yes"} {"text": "An ozone meter is a valuable tool that accurately measures and monitors atmospheric ozone levels. In this article, we will explore the significance of an ozone meter, its features, and how it aids in ozone monitoring.\nImportance of Ozone Monitoring:\nOzone exists at different altitudes in the Earth’s atmosphere and has both beneficial and harmful effects. While the ozone layer protects us from harmful UV radiation, ground-level ozone can negatively impact air quality and human health. Effective ozone monitoring helps identify any potential threats and allows for appropriate measures to be taken in a timely manner.\nFeatures of an ozone meter\nAccurate Ozone Measurement:\nOzone meter are designed with advanced sensing technology that provides precise and reliable measurements of ozone concentrations. These meters utilize highly sensitive sensors that detect even trace amounts of ozone. Accurate measurement is crucial for understanding ozone patterns and identifying changes or trends over time.\nReal-Time Data Acquisition:\nOzone meters offer real-time data acquisition, providing instant feedback on ozone levels. This feature allows for continuous monitoring of ozone concentrations and prompt response to any fluctuations. Real-time data empowers researchers, government agencies, and industries to make informed decisions regarding ozone-related issues.\nPortable and Compact Design:\nMany ozone meters are portable and compact, allowing for easy transportation and installation in various settings. Whether conducting field studies, indoor air quality assessments, or monitoring industrial emissions, the portability of these meters enables flexible ozone monitoring across different locations.\nWide Range of Measurable Parameters:\nOzone meters measure a variety of parameters related to ozone concentration. These parameters may include ambient ozone levels, temperature, humidity, and barometric pressure. By simultaneously measuring multiple parameters, ozone meters provide a comprehensive understanding of ozone dynamics and their correlation with environmental factors.\nOzone meters feature user-friendly interfaces that facilitate easy operation and data interpretation. Clear digital displays present real-time ozone readings, allowing users to quickly assess ozone levels. Intuitive controls and menu options simplify the configuration and adjustment of meter settings.\nData Logging and Analysis:\nMany ozone meters offer data logging capabilities, allowing for the storage of measurement data over an extended period. This feature enables long-term analysis of ozone trends and facilitates the identification of patterns or anomalies. Data analysis software further assists in visualizing and interpreting ozone-related data.\nAlarm and Alert Systems:\nAdvanced ozone meters include alarm and alert systems that notify users when ozone concentrations exceed predefined thresholds. These systems ensure immediate awareness of potentially dangerous ozone levels, facilitating prompt action to protect human health and the environment.\nCalibration and Maintenance:\nRegular calibration and maintenance are essential for accurate ozone measurements. Ozone meters typically provide calibration guidelines and support to maintain measurement integrity. Proper maintenance and calibration procedures help ensure the continued reliability and accuracy of ozone meter readings.\nAn ozone meter is a valuable tool for monitoring atmospheric ozone levels. With its accurate ozone measurement, real-time data acquisition, portable design, wide range of measurable parameters, user-friendly interface, data logging and analysis capabilities, alarm and alert systems, and calibration and maintenance requirements, an ozone meter aids in effective ozone monitoring. By investing in reliable ozone meters, we can better understand ozone dynamics, mitigate potential risks, and safeguard both the environment and human health. Efficient ozone monitoring contributes to sustainable development and ensures a healthy future for our planet.", "label": "Yes"} {"text": "Keep up to date with the latest research and developments from Diamond. Sign up for news on our scientific output, facility updates and plans for the future.\nFor this study, I11 was used as it offers both high-resolution (HR), time-resolved (TR) SXPD, and long-duration in situ studies. SXPD data (HR and TR) were collected in Experimental Hutch 1 (EH1) to study the evolution of the lattice parameters during the first charge, while in situ long-term studies (105 cycles) from two identical battery cells were performed on the recently commissioned Long Duration Experiment (LDE) facility4. SXPD patterns were taken once a week upon long-term cycling. Using pouch cells suitable for in situ SXPD, the first cycle was performed with a C-rate of C/20 to activate the material, and all subsequent cycles were performed at a rate of C/5 between 2.0 and 4.6 V, completing 14.5 cycles each week. From this data, it is possible to determine, and quantify, transition-metal (TM) migration upon cycling by detailed reflection profile analysis, and Difference-Fourier (DF) mapping. The relationship of reversible, and irreversible, TM disorder with the strain in the material can guide improvements in the cycling stability of lithium-rich cathodes, and potentially lead to the synthesis of new application-oriented materials. Although previous studies indicate only minor changes in the bulk material, long duration in situ SXPD measurements, in combination with difference Fourier analysis of the data, revealed an irreversible TM motion within the host structure.\nTMs tend to occupy tetrahedral sites in the lithium layer (Fig. 2B) at highly delithiated (charged) states, since the occupation of tetrahedral sites in the TM layer is less favourable due to the occupation of neighbouring octahedral sites by cationic species. A TM in tetrahedral sites of the Li-layer can then either move back to the TM layer (Fig. 2A), or move on to occupy octahedral lithium sites (Fig. 2C), leading to a delithiated, disordered structure which is thermodynamically more stable and, therefore, energetically favourable5. This disorder is identified in diffraction patterns as a mismatch in the reflection intensities, rather than changes in positions or the presence/absence of reflections. While a minor mismatch in the refined reflection intensities of the first cycle was observed, this became more significant as cycling progressed. If analysed further, the discrepancy in the measured, and refined, reflection intensities can provide useful information, as it originates from the difference between the measured, and calculated, electron density in the crystallographic structure. Due to their relatively high number of electrons, and thus their significant contribution to the X-ray diffraction profiles, TMs are the only elements in the HE-NCM structure that can cause such an effect. DF analysis of the diffraction data was performed to investigate which sites are occupied by TMs upon cycling. The DF maps of the first discharged state (Fig. 3A and B) show that the electron density of octahedral sites (Lioc and TMoc) are poorly described by the ideal rhombohedral structure, and the differences become even more significant by the 103rd cycle (Fig. 3C and D). Li/TM disorder is not observed in the first cycle of conventional layered oxides, supporting the assumption that lithium vacancies in the TM layer, created during the first charge (the so-called activation), accelerate transition-metal migration. During subsequent cycles, the disorder increases gradually, reaching roughly 5% of the transition metals in Lioc sites after 100 cycles. This observed increase of disorder leads to the conclusion that this type of migration is to some extent irreversible. Equivalent DF maps of the 1.5 and 102.5 charged states show underestimated electron densities in Lite sites (tetrahedral sites in the lithium layer). This confirms the migration of TMs via these sites in the charged state. Nevertheless, these results support the migration pathway shown in Fig. 3, and suggest that TM motion takes place at high states of charge. Migration of TMs into tetrahedral sites has to be largely reversible because no occupation of tetrahedral sites was observed in the discharged state throughout the 100 charge/discharge cycles, while Ca. 8% of the TMs occupy tetrahedral sites in the charged state. At the end of discharge, 2-5% of the TMs are refined to be in octahedral Li-sites, while the tetrahedral sites are unoccupied, strongly indicating that 3-6% of the TMs migrate reversibly back from tetrahedral sites into octahedral TM sites upon lithiation.\nDiamond Light Source is the UK's national synchrotron science facility, located at the Harwell Science and Innovation Campus in Oxfordshire.\nCopyright © 2022 Diamond Light Source\nDiamond Light Source Ltd\nHarwell Science & Innovation Campus\nDiamond Light Source® and the Diamond logo are registered trademarks of Diamond Light Source Ltd\nRegistered in England and Wales at Diamond House, Harwell Science and Innovation Campus, Didcot, Oxfordshire, OX11 0DE, United Kingdom. Company number: 4375679. VAT number: 287 461 957. Economic Operators Registration and Identification (EORI) number: GB287461957003.", "label": "Yes"} {"text": "An affordable Pure Sine Wave inverter from EPSolar/EPEver - the manufacturers of our MPPTs\nIPower series is a kind of pure sine wave inverter which can convert. 12/24/48VDC to 220/230VAC(or 110/120VAC). Industrial design, compared with the civil design, has a wider operating temperature, easy installation and operation. The wide input voltage range is ideal for solar system application. The inverter can be applied in many fields, such as household emergency lighting system, vehicle mounted system and small field power supply etc.\nPlease note this particular model does not have an active USB or RJ45 port and therefore cannot be used with the MT75 display.\nPlease note this unit does not come with cabling, we recommend 50mm cable and a 200A DC breaker or fuse and fuse holder. The battery cable connections are M6 bolts, therefore M6 lugs are required for cable termination.\n|Type and size||200A fuse|\n|Size mm2||50mm2 cable, M6 lug|", "label": "Yes"} {"text": "The first data about energy-efficient mobile Alder Lake-N processors, which have not yet been officially presented by Intel, appeared in the web.We're talking about Core i3-N305 and Core i3-N300 models, which have eight cores each.It is noteworthy that the chips do not include high-performance P-core Golden Cove - the processors use only energy-efficient E-core Gracemont.Image source: VideoCardzData about the chips is still scarce.The Core i3-N305 has been noted in the synthetic benchmark Geekbench.It is indicated that the processor has a base frequency of 1.8 GHz and can automatically overclock to 3.78 GHz.Data about L1/L2 and L3 cache configuration confirms that the chip uses Gracemont cores architecture.Image source: Geekbanksh About Core i3-N300 chip except for the information about the number of cores and that it supports DDR4-3200 memory, nothing is known.Although you can also see that there is built-in Intel UHD graphics.Image source: GeekbenchIn the single-core Geekbench test, the Core i3-N305 model scores 1025 points, and in multi-core - 4420 points.So its performance is about the same as the Core i7-8750H (Coffee Lake).The latter has results in the same test are 974 and 4,438 points respectively.Image source: GeekbencheIf we compare with something more modern, the Core i3-N305 slightly outperforms the mobile Ryzen 7 5700U on the Zen 2 architecture in single-core performance, but is inferior in multi-core.AMD chip scores 1021 and 5433 points in the same tests, respectively.\nLeak confirms that Intel's Raptor Lake processor family will have models on chips from Alder Lake\nAnother leak of Intel slides has confirmed earlier rumors that some models of Intel's 13th generation Core (Raptor Lake) processors will be built on older chips from Intel's 12th generation Core processors, aka Alder Lake.Image source: VideoCardzIt has been previously reported that the Core 13th generation Core processors will use three types of chips, with stepping B0, C0 and H0.The first will be used in all Core i9, Core i7 and older Core i5 with a \\\"K\\\" suffix.And the rest of Core i5 will get C0 chips, and base Core i3 will get H0 chips.Already then, it was assumed that only B0 chips will be built with new performance P-core Raptor Cove and energy efficient Gracemont E-core.The rest of the chips use Golden Cove and Gracemont cores, respectively, which are already used in Alder Lake processors.Now these rumors are indirectly confirmed. Image source: Igor'sLAB / 3DCenter.orgIntel's slide which has appeared in the Network confirms that the Raptor Lake processors will differ on the architectural level, as indicated by the increased amount of L2 and L3 cache memory on the higher chips.According to the slide, the increased L3 cache will get Core i5 processors and older, and the increase in L2 cache is announced only for the new Core i5 with \\\"K\\\" suffix and older chips.In other words, all of the newer generation CPUs will offer the same amount of cache as their predecessors.The Gracemont small E-core clusters in the Alder Lake processors each have 2 MB of L2 cache memory.Earlier leaks suggest that Gracemont cores in Raptor Lake chips will each have 4 Mbytes of L2 cache.Using the old Alder Lake (Golden Cove) architecture in the new Core i5-13400, Core i5-13500 and Core i5-13600 processors means they will have less IPC than models with Raptor Cove cores, which in turn will reduce their potential against new AMD Ryzen 7000 processors.\nIntel Alder Lake system tested with Windows 11 and different Linux - Microsoft OS was slowest in 72% of tests\nPhoronix has conducted a performance comparison test of the Intel Alder Lake platform with different operating systems.It turns out that under different Linux distributions the computer is in most cases faster than under the latest Windows 11.The tests were done with an Intel Core i9-12900K processor, ASUS ROG Strix Z690-E Gaming WiFi motherboard, 32GB (2x16GB) of DDR5-6000 memory, 500GB WD Black SN850 SSD and an AMD Radeon RX 6800 XT graphics card.The configuration is one of the best by today's standards, able to handle both high resolution games and working applications, as well as working with content.For the performance comparison, Windows 11 Pro, Ubuntu 22.04 LTS, Ubuntu 22.04 LTS on the stable Linux 5.18 kernel, and Intel Clear Linux version 36580 were chosen.Image source: phoronix.comTestors ran a total of 103 tests, with Clear Linux being the clear victor, scoring maximum points in 55 cases (53.4%), second with 19 wins (18.4%) to Ubuntu 22.04 LTS, third place went to Windows 11 with 16 top scores (15.5%) and Ubuntu 22.04 LTS with Linux 5.18 only 13 wins (12.6%).Image source: phoronix.com Image source: phoronix.com Of course, a benchmark is not a benchmark, and for most average users of flagship chips, gaming tests can be decisive.On the other hand, it would be a mistake to ignore other tasks that determined the scoring in the test series: virtualization, data compression, rendering and video encoding - in all these cases, Linux family systems were faster.Taking the cumulative result for all tests, Ubuntu 22.04 LTS was 4 percent faster than Windows 11, and in the case of Clear Linux the gap widened to 8 percent.And Windows 11 was the worst performer in 72% of tests.\nCore i9-12900KS review: the processor that eats like GeForce RTX 3080\nSpecial Edition processors are not a new phenomenon, both AMD and Intel periodically released such products.However, for the last few years only Intel has been using this option.Under this brand it offers overclocked variants of flagships, which solve some marketing tasks, for example, give it formal grounds to declare itself a leader.For example, the last \\\"special processor\\\" Core i9-9900KS hit the market at the end of 2019, and its tasks included something to respond to the 12- and 16-core Ryzen.This response then turned out to be asymmetrical, since the superiority of AMD in multithreaded performance Intel countered the additional increase in gaming performance, but its audience Core i9-9900KS still found.Among the Core 10th and 11th generation processors no special models were released, but this does not mean that Intel has forgotten about the old practice.With the arrival of the Alder Lake family on the market, the company had in its hands an advanced processor design that allowed it to take over the initiative in the performance race.However, AMD's desire to introduce 3D V-Cache processors with significantly increased gaming potential made Intel worry that the hard-won leadership could slip their hands again.So the company decided to recall its old tricks and developed the Core i9-12900KS Special Edition, an unscheduled processor with legal overclocking up to 5.2-5.5GHz, meant to refute AMD's claims that Ryzen 7 5800X3D with 96-Mbyte L3-cache is the new king among gaming CPUs. However, it looks like some unproductive marketing activity provoked by some pinched ego, because the appearance of Core i9-12900KS is hardly able to change something fundamentally in market situation.Firstly, this processor is too different from Core i9-12900K by frequency characteristics, but it is significantly different from it by price.Secondly, the prefix Special Edition again means that in the name of ephemeral performance increase Intel has not only organized the selection of the most successful semiconductor chips, but also sacrificed thermal and power characteristics to quite a large extent.Nevertheless, Intel seems to be sure that the Core i9-12900KS will be bought anyway.At least while the last \\\"special\\\" processor was a limited edition, now there is no question about the finality of the supply.That is, the Core i9-12900KS is built into the existing range, and to find it on sale does not need to make any special efforts (of course, not about Russia).Another thing, it is not quite clear whether it is worth preferring the new flagship to the regular Core i9-12900K? ⇡#Core i9-12900KS in detailsBriefly speaking, Core i9-12900KS is an accelerated version of Core i9-12900K with the same core lineup (8 performance Golden Cove cores and 8 energy efficient Gracemont cores), but with slightly higher frequencies: P-core can take 5.2-5.5GHz, and E-core - 4.0GHz.Core i9-12900KSCore i9-12900KKKcores16 (8P+8E)16 (8P+8E)Fluxes2424 P-core frequencies, GHz3.4-5.53.2-5.2 E-core frequencies, GHz2.5-4.02.4-3.9PBP, W150125MTP, W241241L3-cache, Mbytes3030MemoryDDR4-3200 DDR5-4800DDR4-3200 DDR5-4800Inbuilt graphicsUHD 770UHD 770PCIe16 lines 5.0 4 lines 4.016 lines 5.0 4 lines 4.0Price$739$589The table shows that the Core i9-12900KS differs from the Core i9-12900K not only in frequencies but also in the PBP (Processor Base Power), which is the heat pack.It's supposed to be 20% hotter overall, while its marginal consumption should fit into the same MTP (Maximum Turbo Power) value of 241W.However, all these declarations have no practical value and are only formal.PBP and MTP values are not used by motherboard manufacturers, which completely breaks all limits of consumption for Intel's flagship processors.When announcing the Core i9-12900KS, Intel did not tell us about any technological differences from the Core i9-12900K, focusing only on the increased clock speed, which in turbo mode can reach 5.5 GHz.Nevertheless, this processor is not just a maximally overclocked version of the flagship Alder Lake.In addition to the selection of the most successful semiconductor chips and expanding the scope of the thermal package, another trick was used.The Core i9-12900KS sees the return of the widest possible set of automatic boosts that previous generations of Intel processors already had, but didn't have in Alder Lake.So the Core i9-12900KS for its P-core supports Thermal Velocity Boost (TVB) and Adaptive Boost Technology (ABT), which Intel used last time\nNZXT released N5 Z690 and N7 Z690 motherboards for Intel Alder Lake processors\nNZXT introduced N5 Z690 and N7 Z690 motherboards for Intel Alder Lake processors.Both models look very similar, except for the different color schemes - black prevails in N5, white in N7.However, the novelties are also different in technical equipment.Image source: NZXTIt should be noted that both models use black textolite.Only the N7 model has more protective covers.The NZXT N5 Z690 is based on a 9-phase power subsystem.The N7 Z690 got a 13-phase power subsystem and is built on a higher quality textolite.In theory, the higher model will provide more stable performance when overclocking the components. Each card has three PCIe 5.0 x16 and two PCIe 3.0 x1 slots.Both models support up to 128GB of DDR4-5000 RAM.The choice in favor of the old, but still relevant memory standard, is justified.Firstly, the boards were cheaper to produce and to the end customer.And secondly, DDR5 memory is still very expensive.Another difference between the boards is the number of M.2 slots for NVMe SSDs.The N5 model offers four M.2 PCIe 4.0 x4 slots, and the N7 offers three.The number of SATA III (6 Gbit/s) slots is the same for both models - four each.The new models also have different sound codecs.The junior model has Realtek ALC897 8-channel, the senior - more modern 8-channel Realtek ALC1220 with Nichicon capacitors.The set of external connectors is also practically the same.The N5 Z690 model has one USB 3.2 Gen 2 Type-C and one USB 3.2 Gen 2 Type-A, four USB 3.2 Gen 1 Type-A, two USB 2.0, one HDMI 2.0, one LAN (RJ45).Moreover you can find here a button for quick BIOS Flashback firmware update.On its turn, N7 Z690 offers one USB 3.2 Gen 2 Type-C, two USB 3.2 Gen 2 Type-A, three USB 3.2 Gen 1 Type-A, two USB 2.0, one HDMI 2.0 and one LAN (RJ45).Both models are already available in NZXT Online Shop.The manufacturer has priced N5 Z690 at $240, and N7 Z690 at $300.\nHP upgraded HP Spectre x360 laptops with Alder Lake processors and Intel Arc Alchemist graphics\nHP has upgraded the 13.5- and 16-inch HP Spectre x360 laptop models with Alder Lake-P and Alder Lake-H processors.The devices offer up to 32GB of RAM and solid-state drives up to 2TB.Image source: HPThe updated Spectre models have an attractive design, as well as offering nice bonuses like four speakers and an OLED display as an option, as befits a premium notebook series.However, against the background of the predecessor 13.5-inch updated model stands out the new screen aspect ratio 3:2.The company offers for this model to choose from two display options.This can be an IPS matrix with a resolution of 1920 × 1280 pixels, or a touch OLED display with a resolution of 3000 × 2000 pixels.In both cases, the screen takes up 90.1 percent of the device's usable front panel area.HP has equipped the 13.5-inch Spectre x360 with an infrared 5-megapixel camera that improves image quality in low light, allowing the caller to see the user better during a video call.In addition, the camera supports auto-framing (keeps the user in the frame when they move), automatic backlight adjustment, image noise reduction with AI algorithms, and a dynamic audio enhancement function.The camera is covered by a curtain for safety.Prices for the updated 13.5-inch HP Spectre x360 start at $1250 for the version powered by a 10-core Intel Core i5-1235U up to 4.4GHz, equipped with 8GB of LPDDR4X-4266 RAM and a 512GB PCIe 4.0 NVMe solid-state drive.There's also a choice of a 10-core Core i7-1255U up to 4.7GHz, up to 32GB of RAM and 2TB of storage.No discrete graphics card is provided.RAM laptop soldered directly on the motherboard.So if you choose the configuration with 8 GB of RAM you should think about it carefully or you may add money for choosing the version with 16 or 32 GB RAM.External interfaces are presented by two Thunderbolt 4.0 ports (USB Type-C), one USB 3.2 Gen 2 Type-A, 3.5mm audio combo jack and microSD card reader.The Spectre laptops come with the HP Tilt Pen, an electronic pen that supports multiple degrees of pressure via Microsoft Pen Protocol 2.0.Wi-Fi 6E and Bluetooth 5.2 wireless support, a fingerprint scanner and a 65W USB Type-C charger are also claimed.The laptop's 66-watt-hour battery charges from zero to 50 percent in 45 minutes.The updated 13.5-inch HP Spectre x360 is assembled in a metal case made of recycled aluminum.The keyboard keycaps on the device are made of recycled plastic.The notebook measures 297.94 × 220.47 × 17.02 mm and weighs 1.37 kg.The larger 16-inch updated HP Spectre x360 offers a choice of Alder Lake-H processors, up to the 14-core Intel Core i7-12700H with up to 4.7 GHz.An Intel Arc A370M discrete graphics gas pedal is optional here.The graphics card has eight Xe cores and eight ray tracing blocks, and has received 4GB of GDDR6 memory with a 64-bit bus.A choice of IPS panel with a resolution of 3072 × 1920 pixels and an OLED display with a resolution of 3840 × 2400 dots is available.The aspect ratio of the screens is 16:10.The older version of the HP Spectre x360 is equipped with an 83-watt-hour battery.The dimensions of the 16-inch version of the laptop are 357.89 × 245.36 × 19.81 mm.The weight is 2.02 kg.The novelty is already available for sale at a price of $ 1,650 in the U.S.\nAcer unveils ConceptD 100 and ConceptD 500 compact desktops with Intel Alder Lake and NVIDIA graphics\nAcer has announced the ConceptD 100 and ConceptD 500 compact desktops.Despite its modest size, the new additions feature high-performance Intel Alder Lake processors as well as professional and gaming models of NVIDIA graphics gas pedals.Image source: AcerThe size of the Acer ConceptD 100 desktop is 137.4 × 373 × 359 mm.Despite its compact size, the newcomer can offer features available to full-size systems.Specifically, Acer is ready to equip the ConceptD 100 with an Intel Core i7 generation Alder Lake processor, up to 128 GB of dual channel DDR4-3200 RAM, a PCIe 4.0 SSD, and a hard drive up to 7200 RPM. Acer ConceptD 100There is also a choice between NVIDIA T400 and NVIDIA T1000 professional graphics cards.Both cards are based on the Turing architecture and use the TU117 processors, such as those found in GeForce GTX 1650 gaming cards.The older version of the NVIDIA T1000 uses a chip with the same number of shader, texture and rasterization blocks as the GeForce GTX 1650.The NVIDIA T400 uses a simplified version of the TU117 chip with fewer execution blocks. Acer ConceptD 100Compact desktop Acer ConceptD 100 offers support for Wi-Fi 6 or Wi-Fi 6E, 2.5 Gigabit LAN, and uses Windows 11 Pro as the operating system.The new product is scheduled to go on sale in Europe, the Middle East and Africa in September.The cost of the computer will start at 999 euros. Acer ConceptD 500The ConceptD 500, measuring 200 × 389 × 393.6, will be able to offer even more performance stuffing.Acer claims the ability to install an Alder Lake processor all the way up to the Core i9 model.The system will also support up to 128GB of DDR4-3200 RAM, a hard drive up to 2TB and a 1TB PCIe 4.0 NVMe SSD. Acer ConceptD 500The ConceptD 500 offers the more powerful NVIDIA RTX A4000, GeForce RTX 3060 or GeForce RTX 3070 graphics gas pedals.It also claims support for Wi-Fi 6 or Wi-Fi 6E and a wired 2.5-gigabit network adapter.The price of the Acer ConceptD 500 will start at €1,199.In Africa, Europe and the Middle East, the novelty will also appear in September this year.In China, desktop sales will not start before the fourth quarter.Prices there will start at about $1,800.\nMSI will release a super-powerful gaming laptop Titan GT77 based on Alder Alake-HX with four fans\nMSI began advertising in Chinese social networks new gaming laptop Titan GT77.The manufacturer notes that the combined CPU and GPU power of this flagship system will be 250 watts, not including additional laptop components.Image source: WeboThe MSI Titan series of gaming laptops hasn't been updated since the release of Intel's 10th generation Core processors.There were no models based on Tiger Lake chips on the market, which suggested that the manufacturer decided to abandon this niche series of very expensive gaming devices.Looks like MSI is taking a break after all, because the Titan GT77 gaming laptop based on 12th generation Intel Core processors will be available for the foreseeable future.The company appears to have decided to wait for the higher performance Alder Lake-HX chips, offering up to 16 physical cores at up to 5GHz. Despite the potentially very powerful stuffing, details of which are not yet known, the MSI Titan GT77 laptop will be only 23 mm thick.However, the overall dimensions of this portable gaming station will be larger than any other gaming laptop on the market.The Titan GT77 will have a special ventilation system in the back of the chassis, which is a characteristic feature of laptops of this series.The new Titan GT77 has four fans and seven heat pipes, and can hold up to four memory slots and four slots for NVMe SSDs thanks to the Alder Lake-HX chip.In addition, the notebook will offer several types of screens with support for 4K, 1440p and 1080p resolutions, as well as refresh rates of up to 360 Hz.The cherry on the cake will be a mechanical SteelSeries RGB keyboard with Cherry MX switches that have 1.8 mm of travel. The manufacturer has not yet announced when the new Titan Series gaming notebook will be officially unveiled and when it will be available for sale.However, it is already clear that the price tag will be spacey.\nASUS introduced the ROG Strix Scar 17 SE and ROG Flow X16 gaming laptops powered by Alder Lake-HX and Ryzen 6000\nASUS has introduced two new Republic of Gamers (ROG) branded gaming laptops - ROG Strix Scar 17 SE and ROG Flow X16.The first offers as a basis Intel Core processors of 12th generation Alder Lake-HX series, the second is based on the latest AMD Ryzen 6000 chips with Zen 3+ architecture.Both laptops are equipped with GeForce RTX 30-series graphics gas pedals.Image source: ASUS The ASUS ROG Strix Scar 17 SE laptop is ready to offer up to the flagship 16-core Core i9-12900HX.It features 8 high-performance and 8 power-efficient cores.The maximum power consumption of the processor itself is 157 watts (the nominal TDP is 55 watts).The laptop can also be equipped with 64GB of DDR5-4800 RAM and two 2TB PCIe 4.0 NVMe SSDs, working in RAID0 mode, which will provide sequential read speeds of up to 14,000 MB/s. The ROG Strix Scar 17 SEThe discrete GeForce RTX 3080 Ti mobile GPU with a TDP of 175W is responsible for the graphics processing here.The notebook cooling system uses an evaporation chamber.And as a thermal interface here is used liquid metal Thermal Grizzly Conductonaut.ASUS claims high CO efficiency and temperatures 15 degrees Celsius lower than those of more traditional solutions.The laptop has a 17-inch display, offered in two versions.It could be a Full HD IPS panel with a refresh rate of 360 Hz, or a QHD IPS panel with a refresh rate of 240 Hz.Both displays have a 3ms response time, a maximum brightness rating of 300 cd/m2, 100 percent DCI-P3 color space coverage, and also offer support for Dolby Vision HDR and Adaptive Sync. ROG Strix Scar 17 SEThe laptop's external interface set consists of one USB 3.2 Gen 2, one Thunderbolt 4 (USB Type-C), two USB 3.2 Gen 1, one HDMI 2.1 and one 2.5 Gigabit network adapter.Of course, there is also support for Bluetooth and Wi-Fi 6E wireless standards.It can be charged via USB Type-C with 100W power and runs on a 90Wh battery when in standalone mode.A 330-watt power supply is included.The battery charges up to 50% in 30 minutes. ROG Strix Flow X16The new ROG Strix Flow X16 has a less traditional form factor.The new notebook's screen expands 360 degrees, allowing you to use the notebook as a very powerful tablet.In the maximum configuration, the laptop is ready to offer as the basis of an 8-core and 16-core AMD Ryzen 9 6900HS with a TDP rating of 35W.Like the ROG Scar 17 SE model, the novelty can be equipped with up to 64GB of DDR5-4800 standard RAM.However, there is only one M.2 PCIe 4.0 slot available for NVMe SSDs up to 2TB.As a graphics subsystem, the ROG Strix Flow X16 can offer GeForce RTX 3070 Ti with up to 100W TDP.However, the company does not specify whether we are talking about a graphics card built directly into the laptop itself or the gas pedal is offered as part of the external dock XG Mobile. ROG Strix Flow X16The notebook has a 16-inch 16:10 aspect ratio touchscreen with electronic pen support.The curious thing about it is that it uses Mini LED backlighting with 512 local dimming zones.In addition, the panel is DisplayHDR 1000 certified, has a maximum brightness of 1100 cd/m2, offers 100 percent DCI-P3 color space coverage, QHD resolution support and 165 Hz refresh rate.There's also USB 4, two USB 3.2 Gen 2 Type-A, one HDMI 2.0b, a proprietary connector for the ROG XG Mobile docking station and a microSD card reader.The laptop is equipped with a 90Wh battery with support for 100W fast charging via USB Type-C.The process of charging the battery to 50% takes 30 minutes.The starting price of the ASUS ROG Strix Scar 17 SE laptop model is $3500.ROG Strix Flow X16 model will be offered from $1950.About the timing of availability of new products manufacturer did not say anything.\nFirst tests of the 16-core mobile Core i7-12800HX - up to 15% faster than the Core i7-12700H, but almost no difference in gaming\nAlthough new 16-core mobile Intel Alder Lake-HX processors designed for portable workstations and powerful gaming notebooks were only introduced a few days ago, Chinese publications are already starting to publish their reviews.For example, Chinese Golden Pig Upgrade Pack published a review of the Core i7-12800HX chip.Image source: Intel Intel notes that Alder Lake-HX series contains processors that are designed based on the same semiconductor chips that are used in desktop Alder Lake-S, but are optimized in terms of power consumption and transferred to BGA-package.There's another aspect that makes the mobile Alder Lake-HX chipsets similar to the desktop ones.They require a separate HM670 chipset on the laptop's motherboard, unlike the same mobile Alder Lake-P, where the chipset is built into a separate chip on the same substrate as the CPU's processing cores.Alder Lake-HX chips support 16 PCIe 5.0 lines for graphics card connection and 4 PCIe 4.0 lines for NVMe SSD.Support for an additional 16 PCIe 4.0 lanes and 12 PCIe 3.0 lanes is provided by the chipset.The presence of the Intel HM670 chipset can be seen in the photo below (compact chip circled in red), which also features the NVIDIA GN20-E6 GPU, the backbone of the mobile GeForce RTX 3070 Ti.On the right side of the photo is the Core i7-12800HX. The laptop board is based on the Core i7-12800HX.Image source: Golden Pig Upgrade RaskThe difference between the mobile BGA and desktop LGA chip packaging is also there.The former is 2.2 mm thinner than the desktop version.Some SMD components of the mobile version of the chip have been moved to a different location on the substrate.However, the chip itself with the computing cores is in the same place, in the center.Alder Lake processors with a core formula 8P+8E.Image source: VideoCardzThe Chinese reviewer has reviewed two identical Lenovo Y9000P gaming laptops equipped with GeForce RTX 3070 Ti graphics gas pedals, as well as the same amount of DDR5-4800 RAM.The only difference between the laptops is in the processors.One uses a 14-core Core i7-12700H (Alder Lake-P) and the other uses a 16-core Core i7-12800HX (Alder Lake-HX).The PL1 and PL2 power consumption limits for the Alder Lake-P chip are 115 and 135 watts, while the Alder Lake-HX model is increased to 125 and 175 watts, respectively.The Core i7-12800HX offers nearly identical single-threaded performance to the Core i7-12700H.However, its multi-threaded performance is on average 15% better. Intel Core i7-12800HX and Core i7-12700H in synthetic tests.Image source: Golden Pig Upgrade RaskThe presence of two extra cores and 100 MHz of extra maximum clock speed, which in the Alder Lake-HX model is 4.8 GHz, doesn't make a difference in gaming. Intel Core i7-12800HX and Core i7-12700H in games.Image source: Golden Pig Upgrade RaskOba processors show about the same level of performance.The difference in favor of the Core i7-12800HX is only 2.56%, and that only in some AAA projects.\nIntel introduced 16-core mobile processors - 12th generation Core HX family\nIntel introduced Alder Lake-HX - mobile processors designed for powerful workstation-class notebooks.The flagship of the family, the Core i9-12950HX, is the first mobile 16-core CPU (with eight efficient and eight power efficient cores) which can run at speeds up to 5.0 GHz.Intel says that such powerful processors may be of interest not only to professionals, but also to gamers.According to Daniel Rogers, senior director of mobile product marketing in Intel's client computing division, although the best mobile gaming processor is the Core i9-12900HK, the new HX series is also good for gaming notebooks.The 12th-generation Core HX series includes seven models with 8 to 16 cores and core formulas of 8P+8E, 6P+8E, 4P+8E and 4P+4E.All of them have quite high frequencies.High-performance cores can turbocharge to 4.4GHz-5.0GHz, depending on model, and power-efficient cores can run up to 3.1-3.6GHz.At the same time, all CPUs in the series have the same thermal package of 55W and a maximum consumption in turbo mode of 157W. As explained by Intel representatives, the Alder Lake-HX series combines processors designed on the basis of desktop semiconductor chips.In fact, it is the same desktop Alder Lake, but optimized in terms of energy efficiency and transferred to a BGA-package.So these processors have 16 PCIe 5.0 lanes for graphics card connectivity and 4 PCIe 4.0 lanes for NVMe SSDs.This deserves a separate mention because mobile processors like the Core i9-12900HK do not support the PCIe 5.0 bus.That said, Alder Lake-HX processors don't have a built-in Thunderbolt 4 controller. Alder Lake-HX-based systems are capable of running DDR5/LPDDR5 (up to 4800/5200 MHz) and DDR4/LPDDR4 (up to 3200/4267 MHz) memory.Capacities of up to 128GB are available.All 12th Gen Core HX models are overclockable (with some restrictions), and allow you to overclock the memory attached to them.According to the official data, the Core i9-12900HX in work applications outperforms the Core i9-12900HK, i9-11980HK and Ryzen R9-6900HX, but the exact scale of the advantage is not named. In addition, Intel cited results from testing the Core i9-12900HX in games with a GeForce RTX 3080 graphics card and DDR5-4800 memory, citing triple-digit FPS scores in popular games. Mobile workstations based on 12th generation Core HX series processors will soon be released by Dell, HP, Lenovo and other manufacturers.\nIntel head says that Alder Lake processor family allowed the company to overtake AMD forever\nIn mid-February of last year, Patrick Gelsinger was appointed CEO of Intel. To celebrate the approaching of a symbolic milestone, he decided to video message to the LinkedIn audience in which he announced that with the release of the Alder Lake processor family, the company he headed had forever regained leadership in the consumer segment.\nGelsinger has previously acknowledged at various reporting events that even before the release of the Alder Lake processors, Intel had started to regain its lost market position, but now he is convinced that this family has a decisive role in maintaining this trend. «Alder Lake. Unexpectedly… Boom! We are back in the game, & ; emotionally illustrates the head of Intel to strengthen the company's position in the consumer sector, & ; AMD remains in the rearview mirror in the client segment and never more appear in front of the windshield, we will simply lead the market». The head of Intel does not abandon the ambition to master five new technological processes in four years. By early 2025 the company expects to offer customers the Intel 18A process. In an address to his colleagues Gelsinger also said that at this stage there is no better manager for Intel and he would do the best for the company in this position.\nASUS unveiled updated TUF Gaming laptops powered by Intel Alder Lake and AMD Ryzen 6000\nASUS has unveiled five redesigned TUF Gaming laptops at once: the TUF F15 and F17, A15 and A17, and the TUF Dash F15. All systems are based on the latest AMD Ryzen 6000 and Intel Alder Lake mobile processors, work with DDR5 memory and are equipped with GeForce RTX 30-series graphics gas pedals.\nTUF F15 and F17 models offer Intel Alder Lake processors. The manufacturer is ready to equip new items with 14-core Core i7-12700H. The company does not specify the amount of available RAM standard DDR5-4800. It also offers installation of up to two NVMe SSDs with PCIe 4.0 and a GeForce RTX 3070 graphics gas pedal with a maximum power consumption rating of 140W.\nTwo display options will be available for the TUF F15 and F17: QHD resolution with 165Hz refresh rate or Full HD resolution with 300Hz refresh rate. In both cases, the response time of the displays is 3 ms. The laptops are equipped with a battery capacity of 90W·h. The main difference between the models TUF A15 and A17 is the platform. As the basis of these laptops are ready to offer the latest high-performance processors Ryzen 6000H series Rembrandt up to Ryzen 7 6800H. Another distinguishing feature is the fact that for the laptop models on Intel is claimed to have a Thunderbolt 4 connector. Ryzen-based models are equipped with USB 3.2 Gen 2 and DisplayPort 1.4 connectors. TUF F- and A-series ASUS laptops have metal case, new cooling system with new Arc Flow fans and RGB keyboards. The TUF Dash notebook model uses a 10-core Intel Core i7-12650H processor. It is claimed to be equipped with DDR5-4800 memory, solid state NVMe storage with PCIe 4.0 interface, and GeForce RTX 3070 graphics gas pedals. However, the manufacturer does not specify the maximum power consumption level of the graphics card here.\nNotebook TUF Dash F15, as well as the models mentioned above, offers a choice of two display options: a panel with QHD resolution and refresh rate of 165 Hz, or a screen with Full HD resolution and refresh rate of 300 Hz. The response time in both cases is said to be 3 ms.\nThe metal housing of the TUF Dash is only 19,95 mm thick. The laptop is equipped with a battery with a capacity of 76 W·h. It is also stated the presence of Thunderbolt 4 connector and support for fast charging via USB Type-C connector. For all presented laptops TUF series manufacturer declares military-industrial standard certification MIL-STD-810, which indicates their increased shock resistance, protection from moisture, as well as evidence of the possibility of their work at very low or high ambient temperatures.\nASUS unveils Zenbook 14 OLED and Zenbook 14X OLED Space Edition laptops with new Intel and AMD processors\nASUS has expanded its range of ultraportable Zenbook series laptops with three new models: the Zenbook 14 OLED UX3402 and UM3402, as well as a special version of the Zenbook 14X OLED Space Edition. Novelties are equipped with OLED screens, as indicated in the names, and are built on the latest Intel and AMD processors.\nThe Zenbook 14 OLED (UX3402) features the latest Intel Alder Lake-P processors. A choice of installation is available up to the Core i7-1260P model. The AMD-based variant with model number UM3402 offers the Ryzen 7 5825U processor. The former is claimed to support up to 16GB of LPDDR5-5200 built-in RAM. The AMD version can be equipped with the same amount of memory, but LPDDR4X-4266 standard. A PCIe 4.0 solid-state NVMe drive with up to 1TB capacity is also available.\nBoth versions of the laptop got 14-inch OLED panels with 16:10 aspect ratio, support 2880 × 1800 resolution, 90 Hz refresh rate, 0.2 ms response and 550 cd/m2 peak brightness. The display claims 100 percent DCI-P3 color space coverage, VESA DisplayHDR 500 True Black compliance and Pantone certification.\nThe devices also indicate support for wireless standards Wi-Fi 6E (802.11ax) and Bluetooth 5.2. Each tablet comes with two Harman Kardon speakers, two Thunderbolt 4 40Gbps Intel versions or two USB 3.2 Type-C models, as well as HDMI 2.0, USB 3.2 Gen 1 Type-A and 3.5mm audio jacks. The new products are powered by a 75W·h battery. Dimensions notebooks are 313.6 × 220.6 × 16.9 mm, weight is 1.39 kg.\nWhat makes the special version of the ASUS Zenbook 14X OLED Space Edition stand out is not only the design, but also the equipment. Inspired by the theme of space exploration, ASUS wanted to reflect in this special version of the laptop man's desire for new discoveries. In 1997 it released laptop P6300, which traveled to outer space on board of Russian orbital space station «Mir». It spent over 600 days in orbit and proved to be a very reliable tool for work.\nNew ASUS Zenbook 14X OLED Space Edition has Morse code encoded message in Latin \"Per Aspera Ad Astra»\" or \"Through Thorns to the Stars\". The packaging of the device also has an unusual appearance, and it is suggested not to throw away the box from the laptop accessories, but to use it as a coaster. Completing the design is an unusual color of the device, which the company called Zero-G Titanium.\nThe laptop has an additional 3.5-inch ZenVision 3.5-inch OLED screen with 256 × 64 resolution and 150 cd/m2 brightness, located on the lid. It can display an image that mimics a spacecraft porthole with a view into outer space. It can also display the time, battery status, various text and the user's name. The basis of the display & ; 14-inch OLED-matrix with an aspect ratio of 16:10, supporting a resolution of 2880 × 1800, refresh rate of 90 Hz, response time of 0.2 ms and a peak brightness of 550 cd/m2. It claims 100% DCI-P3 color space coverage, VESA DisplayHDR 500 True Black compliance and Pantone certification.\nThe device is based on powerful Intel Alder Lake-H mobile processors. You can choose up to the flagship model Core i9-12900H. Also the novelty can be equipped with up to 32 GB of RAM LPDDR5 and solid-state NVMe-drive up to 1 Tbyte. The notebook has an advanced dual-fan cooling system. There are also two Thunderbolt 4, USB 3.2 Gen2 Type-C, HDMI 2.0 and a 3.5mm combo jack. The system has Harman Kardon speakers and is powered by a 63W·h battery. The Zenbook 14X OLED Space Edition laptop is so rugged that it can go into space. The company points out that it's tested to the strictest protocols to meet U.S. Space Systems Command SMC-S-016A standards and can operate in temperatures from -24° to 61° C and withstand vibration from 20 to 2,000 Hz.\nMobile Core i5-1250P is roughly equal to desktop AMD Ryzen 5800X in single-core Geekbench test\nThe Alder Lake-P mobile power-efficient processor has impressive performance, if freshly published data from the Geekbench 5 synthetic test is to be believed. In the single-core test, the upcoming Core i5-1250P showed almost identical results to the desktop AMD Ryzen 5800X.\nMobile Intel Alder Lake will be able to offer up to 14 physical cores: up to six high-performance P cores and up to eight energy-efficient E cores. The chips will be divided into two main subcategories. Alder Lake-H models with higher TDP and speeds, such as the Core i7-12700H, will be destined for high-performance gaming laptops. Alder Lake-P models with lower TDP, frequencies and number of cores, like the same Core i5-1250P, will be designed for thin and energy-efficient laptop models.\nThe Core i5-1250P processor gets 12 cores with support for 16 threads and 18 Mbytes of L3 cache memory. That is, it uses four P-core and eight E-core, and according to Geekbench 5 call this chip low-performance. In the single-core test Core i5-1250P showed a score of 1611 points, and in multi-core & ; 8789 points.\nBy comparison, the desktop Ryzen 7 5800X shows 1672 points in the same single-core test, only 6.8% higher than the Intel chip. The difference is not so big to call it significant. However, in multi-core test the Core i5-1250P is noticeably inferior to Ryzen processor, which shows a score of 10 347 points. But still they are «different weight categories\n[GB5 CPU] Unknown CPU: Intel Core i5-1250P (12C 16T) Min/Max/Avg: 3715/4368/3947 MHz Codename: Alder Lake CPUID: 906A2 (GenuineIntel) Scores, vs AMD 5800X Single: 1611, -6.8% Multi: 8789, -18.2%https://t.co/qm8uZ1gffl & ; Benchleaks (@BenchLeaks) December 27, 2021\nThe single-core performance of the Core i5-1250P is quite impressive, especially considering that this processor is likely to be used in ordinary laptops for everyday tasks rather than inside professional workstations. Equally interesting is the fact that the Intel chip has a much lower base frequency of 2.10GHz compared to the Ryzen 7 5800X, which has a base frequency value of 3.8GHz. Unfortunately, Geekbench does not indicate the exact maximum frequency of the Core i5-1250P. We can assume that it is at the level of 4.4 GHz.\nEngineering samples of junior Intel Alder Lake-S were faster than AMD counterparts\nOne of the users of Chinese forum Chiphell has shared test results of qualification (pre-release) samples of quad-core Intel Core i3-12100 and Core i3-12300 processors, consumer versions of which will be officially unveiled next week. A six-core Core i5-12400 model, which is waiting for an announcement, also got into the comparative test. Younger Intel Alder Lake processors were compared with actual AMD's solutions.\nQualifying samples of Alder Lake-S processors labeled QYVQ, QYVR, QYHW and QTVM have been tested. Each of them is likely to have characteristics as close to the consumer versions as possible.\nCuriously enough, the Chinese insider also has two versions of Core i5-12400 processor C0 and H0 revisions qualification samples at once. The last one is to be based on Alder Lake chip without power efficient cores. The first one uses «trimmed» crystal, which is used in already released older models of Core 12th generation processors, with small cores. There is no difference in performance between these versions of the chips. The differences lie only in the level of power consumption and heat dissipation. However, according to the Chinese reviewer, these indicators are not critical.\nGaming performance of the younger Alder Lake models was up to 33% higher than that of the younger AMD models. Among the latter were Renoir chips on Zen 2 architecture, as well as Cezanne on Zen 3. In «synthetics» Intel novelties were inferior even to Ryzen 3 5350G. According to the reviewer, the situation will not change until AMD does not release new Renoir-X models without integrated graphics. According to Chinese insider, the Intel Core i3-12100 and Core i3-12100 processors will cost about $125–141. The review also notes that the six-core Core i5-12400 could be a direct competitor to the Ryzen 5 5600G desktop hybrid processor. The Ryzen 5 5600X in turn offers better performance in some games, but not always in «synthetic».\nAMD will not bet on big.LITTLE architecture and is skeptical about Alder Lake.\nIn this half of the year Intel has ceased to hide the fact that preparing for the announcement by next fall consumer processors Alder Lake will use a hybrid architecture with a combination of large and compact cores. But AMD believes that the time of such layouts has not yet come to the desktop segment, although it keeps a hand on the pulse of trends.\nImage Source: Intel\nAs AMD corporate vice president and chief product officer Joe Macri explains, the concept of big.LITTLE itself has been on the market for more than fifteen years and is not new, but to make it successful in the consumer sector, operating systems and software must be radically redesigned. Existing task schedulers tend to be symmetrical and it's difficult to effectively manage data flows for large and small cores simultaneously. The AMD representative refused to discuss even the theoretical time frame for implementing such a hybrid layout in the company's processors, but admitted that it will never use such an architecture only for marketing purposes. \"We will not do this just to get more cores,\" Joe Makri explained. Adding the number of cores at the expense of small functional blocks, he said, would be meaningless as long as their resources could not be used efficiently by the software ecosystem. The success that AMD has now achieved with \"big\" cores, according to Makri, could not have been achieved with \"small\" cores. Over time, he admits, AMD may need to use small cores, but the software must be fundamentally rebuilt by then. If such changes are not visible to the end consumer, there is no point in implementing them.\nAMD to unveil Radeon RX 7000 graphics cards tonight\nAMD will unveil Radeon RX 7000 graphics cards on the latest RDNA 3 architecture graphics processors tonight. The start of the presentation,...", "label": "Yes"} {"text": "Calculating the Mass Number of an Atom with 5 Protons and 7 Neutrons\nHave you ever wondered how scientists calculate the mass number of an atom? Well, wonder no more! In this post, we’ll look at a simple example of how to calculate the mass number of an atom with 5 protons and 7 neutrons.\nFirst, let’s define what we mean by “mass number.” The mass number of an atom is simply the total number of protons and neutrons in the nucleus of that atom. This number is important because it helps us identify the specific type of element we’re dealing with.\nSo, back to our example: we have an atom with 5 protons and 7 neutrons. To calculate the mass number, we simply add these two numbers together:\nMass Number = Number of Protons + Number of Neutrons\nIn this case, our equation looks like this:\nMass Number = 5 + 7\nMass Number = 12\nTherefore, the mass number of our atom with 5 protons and 7 neutrons is 12. Easy, right?\nIt’s worth noting that while the mass number gives us a good idea of the overall mass of an atom, it doesn’t tell us anything about the number of electrons orbiting the nucleus. That information is given by the atomic number, which is simply the number of protons in the nucleus. So, for our atom with 5 protons, the atomic number would be 5.\nIn summary, calculating the mass number of an atom is a simple matter of adding up the number of protons and neutrons in its nucleus. By doing so, we can identify the element we’re dealing with and get a better understanding of its properties.", "label": "Yes"} {"text": "When you are building the custom home of your dreams, are you considering the smart home ideas that will give you the best energy efficiency and convenience?\nIs there anything more satisfying than walking into your brand new custom home in Tampa? Every detail is exactly the way you wanted it – from the layout to the fixtures. You can’t wait to start making memories in your new space! While you’re dreaming about all of the wonderful things you’ll do in your new home, don’t forget to think about how you can make it smart. Here are a few ideas to get you started.\nWhether you’re just starting to plan your custom home or you’ve already broken ground, now is the time to incorporate some smart technology into your design. At the time of this writing, there are 258.54 million smart homes across the world. From voice-activated assistants to climate control, read on for seven ideas that will make your life easier and make your new custom home in Tampa smarter.\nCheck out these Smart Home Ideas!\nInstall a voice-activated assistant like Amazon Echo or Google Home. These devices let you control various aspects of your home with just your voice. For example, you can ask them to turn on the lights, play music, set a timer, and more. A great idea for your next home is to think about how you can network these devices together across your entire home. Don’t forget to consider smart outlets and bulbs.\nFeel truly comfortable in your custom home with climate-monitoring features like zoning and humidity controls. This will allow you to customize the temperature and humidity in different rooms of your house based on what’s best for each individual space. This smart home idea will also allow you to control the temperature of your home even when you are not home.\nSafety & Ease\nAdd electronic door locks that can be opened with a key card, code, or phone app. This gives you extra security and peace of mind while also making it easy for guests to let themselves in without having to fumble around for keys.\nTrack Energy Use\nInstall energy monitoring systems like Nest or Ecobee so you can track how much energy each appliance is using and save money on your monthly utility bills. We always appreciate a smart home idea that is both money saving, and great for the environment.\nUse smart appliances that can be controlled remotely via an app on your phone or computer. This includes things like washing machines, dryers, refrigerators, ovens, dishwashers and air conditioners/heaters.\nPersonal Entertainment Systems\nConsider installing smart entertainment systems like Sonos or Bose that will let you control the audio and visual settings in your home with just a few clicks. You’ll be able to create the perfect ambiance for any occasion! This is a smart home idea that will be sure to impress your friends and family.\nFinally, if you have a home office, incorporate smart home office features such as a smart printer that can print, scan and fax documents. You can also get a smart desk that will track your daily activities and help you stay organized.\nFor more smart home ideas, talk to the professionals at New Legacy Homes in Tampa. We will advise you on the best ways to incorporate smart technology into your custom home so you can enjoy all the benefits it has to offer.\nOur building partners adhere to the highest standards and the products we use are second to none. We have partnered with the best in the industry to make it easy and convenient for you to take advantage of smart home technology to automate your new home. It’s about working smarter, not harder. Reach out to us today.", "label": "Yes"} {"text": "IVR Systems Becoming More Mainstream\nMarch 22, 2010\nBy David Sims, TMCnet Contributing Editor\nThe next time you see a doctor on her iPhone (News - Alert)it could be that she’s conducting research on your problem. So don’t interrupt her.\nWhen you start seeing applications like this, you know using an IVR system is becoming more and more mainstream. Keeping that in mind, Nuance (News - Alert)Communications, manufacturers of Dragon Naturally Speaking voice recognition software, are introducing smart phone apps including Dragon Medical Mobile.\nWhat that does is provide transcription, medical voice search and voice recording, and there’s the obligatory software development kit so other developers can integrate it in their own apps.\nBy utilizing Nuance’s advanced, cloud-based Dragon Medical speech recognition technology, clinicians can dictate and capture information via a smartphone in real-time without having to return to the desktop or rely on the keyboard or touch screen. With Dragon Medical Mobile Dictation, all of the speech recognition is performed in the cloud using advanced real-time streaming capabilities.\nUtilizing the same cloud-based speech recognition technology as the Dragon Medical Mobile Dictation app, the Search app will allow clinicians to simply speak a request to conduct fast and easy searches on various medical websites. A unique display carousel will show search results simultaneously from popular websites, including MedScape, MedLine, Epocrates and Google (News - Alert).\nOnce recorded, the clinicians’ voice file is forwarded through Nuance’s background speech recognition technology and onto transcription where a high quality draft document is created and then is sent back to the clinician for review and sign-off. The Dragon Medical Recorder app is designed for healthcare organizations that leverage either of Nuance’s enterprise-wide speech-enabled dictation and transcription solutions, eScription or the Dictaphone Enterprise Speech System.\nDavid Sims is a contributing editor for TMCnet. To read more of David’s articles, please visit his columnist page. He also blogs for TMCnet here.\nEdited by Kelly McGuire", "label": "Yes"} {"text": "Circuit maker 2000 free download social advice\nUsers interested in Circuit maker 2000 free download generally download:\nCircuitMaker is the most powerful, easy-to-use schematic capture and simulation tool in its class. Using CircuitMaker's advanced schematic capabilities, you can design electronic circuits and output netlists for TraxMaker and other PCB design tools and autorouters.\n- circuit maker free download\n- download circuit maker software free\n- free circuit maker pro download\n- free download circuit maker 64 bit\n- circuit maker free download full\n- circuit maker 2000 student download\n- circuit maker 2000 download\n- circuit maker app free download\n- circuit maker 2013 free download\n- circuit maker 64bit free download\nAdditional suggestions for Circuit maker 2000 free download by our robot:\nShowing results for circuit maker 2000 as the words free, download are considered too common\nSearch instead for circuit maker 2000 free download\nBus Driver 1.5 showcases a high replay value based on a sophisticated system.\n. From the makers of truck ... through a racing circuit. This makes ... 98, ME, 2000; available are\nLess specific results (668 results)\nEAGLE, the Easy Applicable Graphical Layout Editor is a PCB design software.\nprofessional engineers, makers and those\nPSpice Student is an analog circuit simulator designed for students.\nand digital circuits. Limited ... of solving circuits-related ... simulate some circuits, this\nIt combines circuit design, PCB design, simulation and CAD/CAM.\nCircuit Wizard is ... that combines circuit design, ... complete package. Circuit Wizard provides\nPCB Artist is a free printed circuit board design software program.\nfree printed circuit board ... makes creating circuit boards a ... makes designing circuit boards a\nPSIM is a power electronics circuit simulation package.\na power electronics circuit simulation package\nA utility for designing, testing and troubleshooting circuits.\nadvanced circuits, including ... creating circuit simulations ... evaluating a circuit in function\nProfiCAD is a program for drawing of electrical and electronic diagrams.\n, schematics, control circuit diagrams and ... diagrams, electronic circuits, and also\nEKTS is designed to help users create virtual electromechanical systems.\ncustom motor circuits using ... in through circuit elements ... applying designed circuits on\nYou can design and export circuit diagrams to PCB applications.\ngate circuits, connectors, analog circuits, ... , integrated circuits, mechanical symbols\nQuite Universal Circuit Simulator is an integrated circuit simulator.\n, inductors, sub-circuits, transformers, amplifiers\nThis progarm ,version 11.0 can make capturing designs, simulating behavior.\ntest the circuits inside a ... a real circuit before committing ... create a circuit design just\nSolve Elec 2.5, an educational program to draw and analyze electrical circuits.\nin the circuit, verify circuit related ... equivalent circuit of displayed circuit, browse\nCircuit Diagram enables you to make electronic circuit diagrams.\nmake electronic circuit diagrams and ... as images. Circuit Diagram makes ... designing a circuit", "label": "Yes"} {"text": "The US Office of Naval Research-funded shipboard-capable compact launch and recovery system (CLRE) has successfully completed final flight testing in eastern Oregon.\nCLRE has been designed to provide shipboard capability and small-scale solution to support operations of the unmanned surveillance aircraft.\nONR’s air vehicle technology programme manager John Kinzer said: \"It’s more compact than other systems, so you can install it on a small special operations boat, or save additional space on a larger ship, since space is always at a premium on any vessel.\"\nUsing compressed-air launcher, the system can launch UAVs to perform transmission of real-time electro-optic and infrared (IR) imagery to a ground station for recording and analysis.\nOn completion of its mission, the UAV can be retrieved with rope suspended from the system’s extendable mast and arms, which holds onto small hooks on the aircraft’s wings.\nCLRE launcher is compatible with all Scan Eagle UAV designs, including those equipped with an IR camera and can deliver similar rates of successful air vehicle recovery.\nSmaller and lighter than the existing SuperWedge launcher and Skyhook recovery systems combined, the system can be folded up for storage once the mission is accomplished.\nModified versions of the ScanEagle are also being explored by the company to enable rapid deployment.\nDesigned to provide advanced capabilities for warfighter’s real-time situational awareness and force protection information, the low-cost, long-endurance UAV is currently undergoing testing in trailer mounted to validate its ease of towing behind ground vehicles.\nJointly developed by Boeing and Insitu, the ScanEagle UAS can support special services operations, escort operations, protection of sea-lane and convoy, high-value and secure installations, as well as the relay of high-speed wireless voice, video and data communications.\nImage: An Insitu/Boeing-built ScanEagle UAV being launched using pneumatic wedge catapult launcher. Photo: courtesy of Boeing.", "label": "Yes"} {"text": "Take control of home energy management with the Wiser system\nWith home automation and control, homeowners can reduce their energy usage and save on utility bills. A partnership between Schneider Electric and Alarm.com brings the Wiser home management system to home builders, utilities and other service providers in the energy efficiency space.\nSchneider Electric's Wiser home management system, powered by Alarm.com, connects utilities and consumers. Wiser also enables homeowners to better control energy and save money, with features such as thermostat and lighting control that can be easily accessed through the web portal, www.wiserenergy.com, or the Wiser app, available for Android devices, in addition to iPads, iPhones and iPods.\nThe relationship between Schneider Electric's Wiser home management system and Alarm.com's Connected Home platform gives homeowners and property managers the ability to proactively track and manage electricity usage in real-time, monitor the power generated by rooftop solar panels and operate connected thermostats and load control devices more intelligently to reduce energy usage.\nThis simplified, combined offering gives customers visibility and control of household energy use, enables homeowners to drive energy efficiency by reducing or shifting energy use during peak times, and provides customizable settings for optimal comfort.\n\"Energy management is a key part of the Connected Home of the future,\" said Alison Slavin, Alarm.com co-founder and vice president of Product Management. \"Alarm.com's platform has been designed to easily integrate the expanding Internet of Things and connect them through a powerful and secure Cloud Service. Through Alarm.com's partnership with Schneider Electric, we're powering the tools to enable consumers to understand their home's energy usage profile and more effectively take action to save energy without sacrificing convenience and comfort.\"\nThe Wiser home management system includes an energy monitor, smart thermostat, internet gateway, in-home display, smart plug and other load controls, web portal and mobile app usability. The Wiser smart thermostat is programmable and communicates usage and pricing via changing color screens. Built with ZigBee Smart Energy technology, it's connected to other system components and remotely controllable by the in-home display, the Wiser Home Management web portal, and the Wiser app. The in-home display is a control center and dashboard that is designed as a real-time communication path from the utility to the customer. The system is designed to securely enable load control and demand management.\nRead more about energy-efficient appliances.", "label": "Yes"} {"text": "Hhh…Today we come measure a cool laser flashlight.This blue laser pointer absolutely makes you fall in love with it at first sight.Ingenious appearance design, which completely differs from traditional laser flashlight.This high quality blue laser pointer will impress your coworkers, family and friends.Let’s measure its actual power.\nAfter measuring a number of this pointer,the actual power is between 1.3W-1.45W.\nNever look directly into the laser beam.\nNever point a laser beam at a person.\nDo not aim the laser at reflective surfaces.\n1. Don’t pay extra money for false high power laser;\n2. Choose the right power according to your actual use;\nIf you want to know the real power of a laser pointer on the market, please go to www.lucklaser.com find more.", "label": "Yes"} {"text": "The PolySense team has just published a new article on Photoacoustics Journal Elsevier (IF 7.9) reporting on folded-optics-based quartz-enhanced photoacoustic and photothermal hybrid spectroscopy (FO-QEPA-PTS).\nIn FO-QEPA-PTS, the detection of the photoacoustic and photothermal hybrid signal is achieved through the use of a custom quartz tuning fork (QTF). A multi-laser beam, created by a multi-pass cell (MPC) with a designed single-line spot pattern, partially strikes the inner edge of the QTF and partially passes through the prong of the QTF, thereby generating photoacoustic and photothermal hybrid signals. To assess the performance of FO-QEPA-PTS, 1 % acetylene is selected as the analyte gas and the 2f signals produced by the photoacoustic, the photothermal, and their hybrid effects are measured. Comparative analysis against QEPAS and QEPTS reveals signal gain factors of ∼ 79 and ∼ 14, respectively, when these laser beams created by MPC excite the QTF operating at fundamental resonance mode in phase. In the FO-QEPA-PTS signal, the proportions of the photoacoustic and the photothermal effects induced by the multiple beams are ∼7 % and 93 %, respectively.\nThe following link provides access to the article:", "label": "Yes"} {"text": "With high-powered amplifier,FH303 delivers incredible wireless performance and coverage range.Paired with adjustable transmission power technology and three fixed antennas, FH303 enhances signal strength and extends signal range for better performance, eliminating dead spots.You’ll get a strong wireless signal wherever you are in your home or apartment.\n- Universal Repeater provides seamless bridging to expand your wireless network\n- TX button helps you adjust the wireless signal more conveniently\n- Wireless security encryption easily at a push of WPS button\n- 300Mbps wireless speed ideal for interruption sensitive applications\n1.Incorrect upgrade will damage your device.\n2.Please upgrade your device by cable connection.\n3.Do not power off the device when upgrading.\n4.Please unzip the file you downloaded and use the file ended with \"bin\" or \"trx\"to upgrade your device.\n5.After upgrading, please restore it to factory defaults and configure the device again.", "label": "Yes"} {"text": "Free Ground Shipping for orders $500+ Just $9.95 under $500\nDescription of the Polycom SoundStation 2 EX (2200-16200-001)\nThe SoundStation2 EX with display is a conferencing system that provides users with a display to offer visible call information, new features and smart technology. The 2 EX still follows Polycom's technology with allowing users to experience business quality voice conferencing. With smart technology and a large back-lit display this device will provide you full room coverage from the microphones, crystal clear communication and a screen to display pivotal information during all conferences.\nBacklit Display - Displays console phone number, number called duration/progress of call and supports Caller ID\nRemarkable Voice Quality, Noise Reduction.\nFunction Buttons - Conference button, Flash button, Menu Navigation Keys and Mute button\nIndicators - Mute/hold Indicator, New Call Indicator", "label": "Yes"} {"text": "SCT7501 are replacement of JST V series 7.5mm pitch, wire to board connectors. The V connector has a design to prevent wrong connections. One of the contacts has a distance of 7.5mm from the adjacent contact, while the rest of the contacts have a distance of 5.0mm.\n|No.of Contacts||2 to 6 positions|\n|Current||7A (AWG #20 to #26)|\n|Compatible||Cross JST V Connector Series|", "label": "Yes"} {"text": "➖If the electric charge flows through a conductor, such as a metallic wire, it is known as the electric current in the conductor.\n➖A continuous and closed path of an electric current is known as an electric circuit.\n➖In an electric circuit, usually, the direction of electric current known as positive charges, is considered as opposite to the direction of the flow of electrons, which are considered as negative charges.\n➖The SI unit of electric charge is coulomb (C).\n➖Coulomb is equivalent to the charge contained in closely 6 × 1018 electrons.\n➖The electric current is expressed by a unit known as an ampere (A).\n➖It was named after the French scientist Andre-Marie Ampere.\n➖One ampere constitutes by the flow of one coulomb of charge per second, i.e., 1 A = 1 C/1 s.\n➖The instrument that measures electric current in a circuit is known as ammeter.\n➖The electric current flows in the circuit starting from the positive terminal to the negative terminal of the cell through the bulb and ammeter.\n✍️Electric Potential and Potential Difference\n➖The electrons of a conductor move only if there is a difference of electric pressure, known as the potential difference.\n➖The chemical action within a cell produces the potential difference across the terminals of the cell. Further, when this cell is linked to a conducting circuit element, the potential difference sets the charges in motion in the conductor and generates an electric current.\n➖Alessandro Volta 1745–1827, an Italian physicist, first noticed the electric potential difference; therefore, the SI unit of electric potential difference is given volt (V).\n➖The instrument that measures the potential difference is known as the voltmeter.\n➖The rate at which electric energy is dissipated or consumed in an electric circuit is known as electric power.\n➖The SI unit of electric power is watt (W).", "label": "Yes"} {"text": "Delhi-based battery manufacturer Inverted Energy has announced the opening of its new lithium-ion battery manufacturing facility in the Okhla Industrial Area in New Delhi. The company stated that the commissioning of the plant, which currently has a production capacity of 100 MWh (megawatt hour) annually, is aimed at reducing dependence on China.\nThe company further stated that the objective is to increase the production capacity at the new plant multifold in the coming months.\nRecently, Inverted Energy launched a new range of Lithium-ion batteries for electric vehicles (EVs) and home energy storage, among others.\n“During the lockdown, we realised the drawback of depending on the foreign markets and have worked towards building capabilities, strengthening the team, and working harder resulting in this achievement,” said Rahul Raj, co-founder of Inverted Energy. “With this capacity addition, the company has extended its journey towards Atmanirbhar Bharat and to create a flexible, cost-effective and optimised market space aiming to reduce dependency (for batteries) on China,” he added.\nVarious states in India are coming up with new plans related to electric vehicles, with Telangana recently launching its EV policy exempting road tax for the first two lakh electric vehicles, Raj said. He added, “We want to drive the change towards lithium-ion batteries that are more reliable, cost-effective, durable, and made-in-India.”\nFocused on EVs ( both 2- and 3-wheelers), home storage and solar batteries, this plant will help Inverted achieve the required deliverables in terms of quantity and product quality satisfying increased market demand, the company said.\nIn the next phase, the company is planning for backward integration of its batteries and developing a customised in-house battery management system, it added.\nRecently, India Ratings and Research (Ind-Ra) in its latest market analysis had predicted (that driven by the economic slowdown induced by the Coronavirus pandemic) a delay in the penetration of electric vehicles (EVs) in the Indian automobile industry. And, among other factors, the analysts claim that battery remains the most critical component of an EV due to both cost viability (30-40 percent of EV cost is of battery) and technological expertise.", "label": "Yes"} {"text": "Full Review & Summary\nvivo was announced their latest Y19 smartphone. It is powered by Android 9.0 version which is run on GSM / HSPA / LTE technology. This device was announced in 2019 November and the current status is Available in America, release date of the device is 11 November 2019. Dimensions is 162.2 x 76.5 x 8.9 mm (6.39 x 3.01 x 0.35 in) with 193 g (6.81 oz) weight, the latest device consists on SINGLE SIM. Y19 comes with 6.53 inches display with IPS LCD capacitive touchscreen, 16M colors and 1080 x 2340 resolution. Y19 comes with 128GB internal memory with 8GB ram.\nvivo Y19 smartphone Price in America, New York City, Washington, Boston, San Francisco. Y19 starting price approximately will be 259 USD. latest device is powered by Mediatek MT6768 Helio P65 (12nm) chipset and its runs Android 9.0 (Pie); Funtouch 9 operating system. The device has powerful CPU such as Octa-core (2x2.0 GHz Cortex-A75 & 6x1.7 GHz Cortex-A55), with GPU Mali-G52 MC2 is also awesome. The smartphone is coming with 16 Megapixel, f/1.8, (wide), PDAF 8 Megapixel, f/2.2, 13mm (ultrawide) 2 Megapixel, f/2.4, macro camera back camera, while front camera 16 Megapixel, f/2.0, 26mm (wide), 1/3.1\", 1.0µm is also awesome for selfie pictures. Y19 fair price, available in America and camera features are LED flash, HDR, panorama. Quality of the vides is [email protected], [email protected]\nThe vivo Y19 has Wi-Fi 802.11 a/b/g/n/ac, dual-band, Wi-Fi Direct, hotspot with 5.0, A2DP, LE, aptX bluetooth and Yes, with A-GPS, GLONASS, GALILEO, BDS for best navigatio. Y19 comes with microUSB 2.0, USB On-The-Go usb for communications also different sensors are available such as Fingerprint (rear-mounted), accelerometer, proximity, compass. vivo Y19 smartphone is coming with lot of unique colors such as Magnetic Black, Spring White.", "label": "Yes"} {"text": "The necessity of industry cnc parts in every manufacturing industries is growing. Industrial robots have replaced humankind in numerous industries. Robots out perform humans in jobs which require precision, speed, endurance and reliability. Robots safely perform dirty and dangerous jobs. Traditional manufacturing robotic applications include material handling (pick and put), assembling, painting, welding, packaging, palletizing, product inspection and testing. Industrial robots are being used within a diverse array of industries including automotive, electronics, medical, food production, biotech, pharmaceutical and machinery.\nThe ISO concise explanation of a manipulating industrial robot is “an automatically controlled, reprogrammable, multipurpose manipulator”. Based on the definition it can be fixed into position or mobile for use in industrial automation applications. These industrial robots are programmable in three or more axes. They may be multi-functional items that may be custom-built and programmed to do a selection of operations.\nThe main features of industrial robots is that they might be designed to suit industry specific requirements and will work continuously for a long time, consistently meeting high manufacturing quality standards. The economic lifespan of your industrial robot is approximately 12-16 years. Due to their persistent accuracy industrial robots have become an indispensable part of manufacturing.\nIndustrial robots are classified into different categories according to their mechanical structure. The key types of industrial robots are:\nGantry (Cartesian) Robot: They can be stationary robots having three components of motion. They work from an overhead grid having a rectangular work envelope. These are mainly employed to perform ‘pick and place’ actions. Gantry robots supply their axes on top of the work which makes them also well suited for dispensing applications.\nSCARA Robots: (Selectively Compliant Articulated Robot Arm) These robots have 4 axes of motion. They move within an x-y-z coordinated circular work envelope. One can use them for proximity sensor requiring pick and put work, application and assembly operations and handling machine tools.\nArticulated robots: An articulated robot has rotary joints. It could have from two to ten or higher interactive joints. Articulated robots are well suited to welding, painting and assembly.\nBasic industrial robot designs could be customized with adding different peripherals. End effectors, optical systems, and motion controllers are very important accessories. End effectors are the end-of-arm-tooling (EOAT) connected to robotic arms. Grippers or wrenches that are utilized to move or assemble parts are instances of end effectors. End effectors are hc03bt and utilized to sense and connect with the external environment. The final effectors’ design is dependent upon the application form requirements in the specific industry. Machine Vision systems are robotic optical systems. They may be built-on digital input/output devices and computer networks employed to control other hc103bt-sz such as robotic arms. Machine vision is commonly used for your inspection of manufactured goods including semiconductor chips. Motion controllers are employed to move robots and position stages smoothly and accurately with sub-micron repeatability.", "label": "Yes"} {"text": "Mingsheng Ying graduated from Department of Mathematics, Fuzhou Teachers College, Jiangxi, China, in 1981. He is a Distinguished Professor with and the Research Director of the Center for Quantum Computation and Intelligent Systems (QCIS), Faculty of Engineering and Information Technology, University of Technology Sydney, Australia, and Cheung Kong Professor with the State Key Laboratory of Intelligent Technology and Systems, Department of Computer Science and Technology, Tsinghua University, Beijing, China.\nMingsheng Ying's research interests are quantum computation, programming theory, and foundations of artificial intelligence. He has published more than 100 papers in top international journals and conferences. He is the author of the books \"Foundations of Quantum Programming\" (Elsevier - Morgan Kaufmann 2016) and \"Topology in Process Calculus: Approximate Correctness and Infinite Evolution of Concurrent Programs\" (Springer-Verlag, 2001).", "label": "Yes"} {"text": "The common day SMT technique has made it possible for the process of PCB assembly to become streamlined and approachable. Amongst the many different modes of printed circuit board assembly, this is the most novel and advanced technique, hence it is being used across the world.\nIt is one of the most widely used techniques for the purpose of PCB assembly and the reasons for the same are:\nCost affectivity- SMT has proven to the cost effective as compared to the older methods of PCB assembly. The point to point and thru-hole methods have long been used in the industry, but are considered to be costlier; hence the introduction of SMT technique was able to save so much money for electronic manufacturers.\nEase of usage: Besides being extremely cost efficient, the use of SMT is also prevalent because of the ease with which it can be used. It is much easier to install and assemble that any of the processes used earlier.\nLong term solutions- The use of SMT is also very commonly preferred these days because it is long-staying effects that can be seen relied upon.", "label": "Yes"} {"text": "Capturing semantic relations between sentences, such as entailment, is a long-standing challenge for computational semantics. Logic-based models analyse entailment in terms of possible worlds (interpretations, or situations) where a premise P entails a hypothesis H iff in all worlds where P is true, H is also true. Statistical models view this relationship probabilistically, addressing it in terms of whether a human would likely infer H from P. In this paper, we wish to bridge these two perspectives, by arguing for a visually-grounded version of the Textual Entailment task. Specifically, we ask whether models can perform better if, in addition to P and H, there is also an image (corresponding to the relevant “world” or “situation”). We use a multimodal version of the SNLI dataset (Bowman et al., 2015) and we compare “blind” and visually-augmented models of textual entailment. We show that visual information is beneficial, but we also conduct an in-depth error analysis that reveals that current multimodal models are not performing “grounding” in an optimal fashion.", "label": "Yes"} {"text": "Title: Unleashing the Power of AI in Video Creation: Say Hello to videoGPT\nIn a continuously evolving digital landscape, the realm of artificial intelligence (AI) never fails to amaze. Seeking to push the boundaries of AI’s creative potential, OpenAI has unveiled its latest groundbreaking development – videoGPT. As an advanced language model, textGPT has captivated millions with its ability to generate coherent and contextually relevant text. Now, OpenAI has extended its prowess to the audio-visual domain, opening up a world of opportunities for automated video creation.\nvideoGPT, an offspring of OpenAI’s transformative AI research, signifies a significant leap in the field of computer vision. This cutting-edge model is designed to observe and process video content, understanding and generating text-based descriptions in real-time seamlessly. Its immense potential paves the way for an array of applications, potentially revolutionizing video editing, content creation, and storytelling.\nOpenAI’s relentless journey to make artificial intelligence more versatile and adaptable led to the birth of videoGPT. As the younger sibling to its successful text-based counterpart, videoGPT capitalizes on a multimodal approach, combining visual and textual cues to decode video content. Through advanced deep learning techniques, this powerful AI model enables a comprehensive understanding of the constituent elements of a video, empowering it to generate coherent and engaging captions that accurately describe the visual content.\nThe unveiling of videoGPT holds immense promise for various industries. Video creators and content producers can now harness the AI’s potential to automate the labor-intensive task of captioning, enhancing workflow efficiency and reducing production time. Additionally, advertisers can capitalize on videoGPT to develop compelling and persuasive visual narratives that synergize with captivating descriptions.\nHowever, the potential of videoGPT transcends mere captioning. With its intricate understanding of videos, this transformative technology can broaden its applications to include automated video synthesis, video editing assistance, and even augmented reality experiences. The possibilities are unparalleled, with the potential to revolutionize industries such as film production, marketing, e-learning, and more.\nIn this era of dynamic content creation, videoGPT represents an exciting new tool that merges the realms of artificial intelligence and video creation. As OpenAI continues to refine and expand upon this revolutionary technology, the democratization of video production and the enhancement of creative storytelling may become more accessible than ever before. Stay tuned as we venture further into the realm of AI-driven video innovation, guided by the capabilities of videoGPT.\nUnleashing the Potential of Virtual Storytelling: Exploring OpenAI’s VideoGPT\nOpenAI, a leading organization in artificial intelligence research, has recently introduced an impressive new tool called videoGPT, which has the potential to revolutionize virtual storytelling. This powerful AI model is capable of generating vivid and coherent narratives based on a sequence of user-generated prompts. By leveraging videoGPT, creators and storytellers can captivate audiences with compelling stories in a variety of mediums, such as video games, movies, and interactive experiences.\nOne of the fascinating aspects of videoGPT is its ability to understand and adapt to different narrative styles and scenarios. With its broad knowledge base, the model can simulate characters, settings, and plot developments in a detailed and imaginative manner. By providing just a short video clip or a textual description, users can activate videoGPT’s creative capabilities and witness it generate rich and engaging stories. Moreover, videoGPT’s versatility empowers content creators to explore new storytelling formats and experiment with interactive narratives that respond to user inputs, allowing for personalized and immersive experiences.\nEnhancing Creativity and Realism: A Comprehensive Analysis of VideoGPT’s Capabilities\nThe world of artificial intelligence is constantly evolving, and OpenAI has once again pushed the boundaries of what’s possible with their latest innovation: videoGPT. This powerful new tool harnesses the capabilities of AI to generate stunning and realistic videos that captivate the imagination.\nvideoGPT utilizes a two-step process to generate high-quality videos. Firstly, it generates a sequence of still frames based on a given text prompt, allowing users to specify the desired content. Then, it refines the generated frames to ensure smooth transitions between them, resulting in a video that is coherent and visually appealing.\nvideoGPT empowers creators by providing them with a powerful tool to bring their ideas to life. By simply describing the desired scenes through text prompts, users can leverage the AI’s capabilities to generate video content that aligns with their vision. From creating animated storyboards to generating lifelike animations, the possibilities are limitless.\nWhether you’re a filmmaker looking to visualize new concepts, a game developer in need of animated assets, or a marketer seeking engaging video content, videoGPT offers a seamless solution to enhance your creative process. Embrace the freedom to experiment, iterate, and refine your ideas with this cutting-edge AI tool.\nWhat sets videoGPT apart is its ability to produce videos that exhibit a high degree of realism. Through continuous training on a vast dataset of internet videos, this AI model has learned to mimic the visual style and dynamics prevalent in the real world.\nBy leveraging the knowledge encoded in its architecture, videoGPT generates videos with fluid motions, nuanced object interactions, and natural scene progression. Whether it’s simulating the movement of characters, objects, or even generating compelling visual effects, videoGPT seamlessly bridges the gap between the virtual and the real.\nHarnessing the Power of VideoGPT: Practical Strategies for Optimizing Content Creation\nAs artificial intelligence continues to advance, the realm of content creation is being revolutionized by groundbreaking technologies such as videoGPT. Built upon the success of its predecessor, the text-based GPT-3, videoGPT takes AI-generated content to new heights by enabling creators to manipulate and generate lifelike videos. Whether you’re a filmmaker, marketer, or simply a content enthusiast, understanding the practical strategies for harnessing videoGPT can unlock a world of possibilities.\nOne of the key strategies for optimizing content creation with videoGPT lies in its ability to generate novel scenes based on specific inputs. By providing the AI with detailed descriptions or storyboards, videoGPT can effortlessly create video sequences that align with your vision, saving you time and effort in the production process. Additionally, videoGPT can be used to enhance and edit existing footage by adjusting backgrounds, changing lighting conditions, or even transforming the appearance of objects. With its remarkable video synthesis capabilities, videoGPT empowers creators to explore uncharted creative territories and bring their imaginations to life.\nIn conclusion, the unveiling of videoGPT demonstrates the impressive strides being made in AI technology. As we explore this new frontier, it’s crucial to stay informed about such advancements. While initially being utilized for video translation and augmentation, how this tool might influence broader applications such as filmmaking, advertising, and communication is yet to be seen. With AI and machine learning evolving at a rapid pace, we look forward to a future reshaped by these remarkable technological advancements. We’ll continue to keep you updated and informed about the evolution of AI as we step forward into this exciting era. Stay tuned for more on this and other AI-related news.", "label": "Yes"} {"text": "What people are saying - Write a review\nWe haven't found any reviews in the usual places.\nFUZZY LOGIC AND NEURAL NETWORK CONTROL OF INDUSTRIAL THERMAL SYSTEMS\nNUMERICAL TECHNIQUES IN MODELING AND SIMULATION OF SEMICONDUCTOR\n53 other sections not shown\nOther editions - View all\nalgorithm analysis application approach approximately artificial neural networks autocorrelation bond graph calculations Clark County components computation control charting convergence cost curve CUSUM data set defined determine distribution dynamic economic development effect efficiency eigenvalues eigenvectors elements emissions Engineering equations error estimate example execution exponential factors Figure flow FORTRAN function fuzzy fuzzy set given identified IEEE impact implementation increase input integrated interconnections Laplace's equation leadership linear matrix maximum MAXNET measure method methodology minterms neuron model nodes number of processes obtained operations optimal output paper parameters performance Petri Petri nets PID controller Pittsburgh problem procedure production random random variables region response root transputer sample Session Chairman shown sigmoid sigmoid function signal simulation software engineering solution statistics structure techniques Technology theorems transformation University University of Pittsburgh utilized values variables vector wavelet weights zero", "label": "Yes"} {"text": "how do you trigger the reach m+ with a camera without a flash shoe. for instance, the agricam or mapir camera for ndvi mapping has a trigger input from the flight controller but no flash output.\nYou can use an Arduino to create a multi type trigger, i.e a pwm trigger for a mapir and a reach detectable trigger.\nTou can generate the trigger either from an external event (DJI Phantom LED blink for example) or a fixed time period.\nDo you then send the signal to the Time Mark or GPIO on an M+\nMay I ask you to clarify your question? The time mark pin is used for saving time stamps, it should be connected to camera hot-shoe.\nI’m trying to trigger from an Arduino, not a hot shoe. Using the GPIO is the best way, however, I can send a 3.3v signal to Time Mark if necessary.\nWhat input current goes to the Time Mark input, 100mA?\nIt’s better to send a signal to Time Mark pin directly, cause it allows you to make more precise time measurement.\nTime Mark pin is open drain. You just need to switch it to the ground to record a time mark.\nHave you at emlid done testing to confirm the that the actual accuracy of the time mark recording lives up to the expectation? I’ve posted another topic about it and my time marks look suspiciously ordinary. Like there’s some kind of pattern to the rounding, and not nearly the randomness I’d expect to see.\nFrom my other post:\nI posted a clarification in the other thread for my same post as directly above. I’ll do that here too, so no one sees this as unresolved.\nI think the emlid/u-blox timing is very accurate/precise. What I think I’m seeing is that the flashing of the LED lights on the P4, which I’m recording as events, is driven by pretty stable timing. They are also only coming on at intervals which seem to be spaced at multiples of 0.04 seconds. This seems to occur whether triggered manually or automatically. I see this timing behaviour now with a P4P, P4A and P4.\nSo it seems like I have to live with 0.12m uncertainty at 3m/s flight speed, 0.24m uncertainty at 6m/s, and so on and so forth.\nMy logging also seems to suggest very consistent response times of photoresistors. Photodiodes are supposed to be quicker to respond, but in this application where you’ll be applying an offset backwards in time anyways, It’s irrelevant how quickly you capture the secondary event. A secondary event which is delayed anyway after the real event you are interested in.\nThis won’t matter soon anyways as the boss has green-lighted a P4 RTK. Side-by-side testing will confirm or sink my 0.04s interval hypothesis. Which will show up as reductions in the along-track residuals after processing. Exciting times.\nThe LED goes off prior to shutter operations, so I estimated about a 30ms uncertainty. Glad to see it is probably tighter than that.\nsorry, I edited my post. I meant to say that the LEDs are coming back on at 0.04 second intervals. I’m recording them coming back on as my event, so I have to offset this time event record backwards.\nSimon, are you detecting the going off of the LEDs? and if you are, can you tell me what your estimated delay to middle of exposure is? Just interested to see if it’s same as delay to LED coming back on.\nDepends on the model and the shutter speed.\nWith the P4 with rolling shutter, of which I have experience, the ‘roll’ take 33ms, seemingly independent of actual shutter speed. I haven’t investigated much further. My module has been superceded by more sophisticated methods. Also I kinda came around to the idea that a good camera calibration and GCP’s was a far more robust solution.\nI believe the 33ms has, at least, been documented on pix4d website.\nDid you determine that the rolling shutter starts the instant the LED goes off? I was wondering if the image capture was in the middle of the LED shutdown. I estimated the LED comes back on about 0.194 seconds after the middle of the image capture. At least, this value gave me the smallest residuals during photogrammetric processing.\nSorry for the delayed response! As I see you’ve already figured it out. Anyway, let me confirm your thoughts.\nTime marks are recorded with nanosecond accuracy. Time mark pin is connected to u-blox chip directly what allows to get such precise measurements.\nWith LED connection there will be a delay after the shutter triggers as there is no direct connection.\nThis topic was automatically closed 100 days after the last reply. New replies are no longer allowed.", "label": "Yes"} {"text": "HP revealed the 21.5-inch Slate 21 all-in-one (AIO) tablet at its HP World Tour event in Beijing today. The device is powered by NVIDIA’s Tegra 4 processor and runs the latest Android 4.2.2 Jelly Bean OS.\nThe large 1920 x 1080-pixel HD display is intended for desktop use, and the design features a large kickstand. It also sports one Ethernet and two USB ports, Wi-Fi connectivity but no battery, meaning you’ll have to plug in the Slate 21 to use it.\nThe redesigned NVIDIA Tegra 4 processor offers enhanced graphics performance, which HP notes should make the Slate 21 great for gaming. However, considering that this is an Android device, gaming options for the tablet will be pretty limited when compared to a true PC. The idea of a budget-friendly Android-powered desktop computer is interesting, but Google’s mobile OS doesn’t seem comparable to a genuine PC operating system, at least for now.\nThe Slate 21 will hit the Asian markets next month starting at $359. It’s unclear if the tablet will be available in the U.S. or other regions.", "label": "Yes"} {"text": "- This event has passed.\nCondensed Matter / Biophysics Seminar – Ajit Srivastava, Emory University\n2D Materials: A New Platform to Realize “Quantum Light-Matter”\nAtomically thin materials, such as graphene and transitional metal dichalcogenides (TMDs), have recently come to the forefront of research in materials physics. This is largely due to the ease with which they can be combined into artificially engineered heterostructures that exhibit emergent electronic and optical properties. Enhanced Coulomb interactions in the truly 2D limit makes TMDs, such as MoSe2/WSe2, promising to explore correlated quantum phases of matter. Moreover, the same interactions also lead to very strong light-matter couplings, resulting in rich exciton physics and half-light, half-matter polaritonic states. Finally, the presence of non-trivial geometry and topology in electronic and optical states of these materials is an additional ingredient to realize coupled phases of quantum light and matter – quantum light-matter – that are not only interesting from a fundamental perspective but can also have applications in quantum information processing applications.\nIn this talk, I will begin by highlighting some unique properties of optical excitations in TMDs which result from the chiral nature of constituent single-particle electronic states. The confinement of these optical excitations in TMD heterostructures results in quantum emitters whose emission energy can be tuned. Moreover, few-body and many-body dipolar interactions amongst them is promising for realizing on-demand quantum matter in a driven-dissipative setting.\nHost: Xiao-XIao Zhang", "label": "Yes"} {"text": "CableLabs has selected “packet bonding” over a rival technique for the emerging DOCSIS 3.0 specification and modular-cable modem termination system (M-CMTS) architecture.\nNews of the packet bonding selection first appeared last week in Cable Digital News. A CableLabs official confirmed that a selection had been made, but declined to be more specific. A range of sources familiar with the situation confirmed that the cable industry’s Louisville, Colo.-based R&D house selected packet bonding over a competing proposal called “MPEG bonding.”\nAlthough DOCSIS 3.0 and the M-CMTS project are somewhat independent, they do work together on the facet of channel bonding, a technique that will enable cable operators to offer speeds of 100 Mbps and greater, and therefore, provide a competitive foil to new fiber-to-the-premise (FTTP) technologies. The modular CMTS architecture enables the CMTS to share edge QAM resources for video-on-demand and DOCSIS-based data applications.\nChannel bonding “is a lynchpin of both pieces – DOCSIS 3.0 and the modular CMTS,” said CableLabs Chief Technology Officer Ralph Brown. “The important thing is that the decision was made, and it was a significant one. The [DOCSIS 3.0] project is moving ahead at a rapid pace.”\nVendors such as Motorola Inc. and ARRIS have been championing the packet bonding technique, while Cisco Systems and silicon startup BroadLogic have been seen in the MPEG bonding camp. CED offered an in-depth technical primer on the subject in the April issue.\nThe decision to go with packet bonding does not impact the product plans of BroadLogic, according to company President & CEO Tony Francesca. BroadLogic is building a wideband receiver chip for customer premise devices (CPEs), not CMTSs that reside on the cable network.\n“We anticipated that there would be many flavors of channel bonding…and we made sure that our implementation is adaptable and compliant to those moving forward,” Francesca said. “We’ve implanted a specific implementation that gets to that objective [DOCSIS 3.0] while being indifferent to the channel bonding part of it. When it comes to time-to-market and cost, we think we have the lowest cost and best performance [product]. Channel bonding is just one piece of it.”\nMany believe the decision was based partly on the fact that packet bonding gives operators a faster time-to-market because the technique can be deployed with existing technologies. Legacy CMTSs, for example, can support packet bonding with a software revision. Modem vendors can also support multiple channels, though they have to combine cards and silicon, which adds costs. Down the road, modem vendors will have the financial benefit of using a new class of cable modem silicon that condenses the function on a smaller (and cheaper) form factor.\n“MPEG bonding requires software changes at the CMTS and the cable modem, but packet bonding can be implemented in software-only at the CMTS. It is potentially implementable at the cable modem with multiple cable modem chips,” explained Mike Patrick, a data-networking architect at Motorola.\nAlthough DOCSIS 3.0 will help North American cable operators compete with new fiber-fed services, the technology behind it is needed first in Asia and Europe, where cable is under fierce speed and pricing competition with DSL and fiber-based service providers.\n“Eventually the requirement will be strong for deployment purposes in the U.S…but the burning desire to have products on the street is outside the U.S. right now,” Francesca said.\nARRIS has pre-standard and pre-general availability channel bonding products in the field today. “It’s not like we’re mass-producing it in the factor yet, but the bottom line is that it is usable by real customers. We’ll have product coming out based on channel bonding by the fourth quarter,” said Tom Cloonan, chief technology officer of ARRIS’ broadband division, which first demonstrated its “FlexPath” technology at the 2004 National Show, and again at last month’s show in San Francisco. On the modem front, ARRIS initially will introduce a four-channel cable modem, though it plans to offer models that bond together even more channels.\nOther vendors will most certainly follow suit with new classes of modems that support channel bonding, and probably not a moment too soon.\n“We have outgrown the 10-year-old single channel cable modem. It’s obsolete,” said Jeff Huppertz, BroadLogic’s vice president of marketing and business development.", "label": "Yes"} {"text": "You need information to produce a report on AIXTRON? We are happy to provide you with additional material.\n12. January 2010\n| Press releases\nA new national R&D project has recently been started in Germany focusing on the development of OLED displays and lighting applications. AIXTRON will...", "label": "Yes"} {"text": "Cell phones emit low levels of radio frequency energy (i.e., radio frequency radiation) in the microwave range while being used. It is well known that high levels of RF can produce biological damage through heating effects (this is how your microwave oven is able to cook food). However, it is not known to what extent or through what mechanism, lower levels of RF might cause adverse health effects as well. Several research studies have shown that the radio frequency radiation from wireless phone antennae “appears to cause genetic damage in human blood,” while another case study uncovered a “statistically significant increase” in neuro-epithelial brain tumors among cell phone users. Other research has shown little or no adverse effects. ABC’s 20/20 News (May 26, 2000) took the five most popular phones sold in the US and tested them at a highly respected German laboratory. Four out of the five phones tested were above the SAR limit. One thing is for certain, similar to the case of cigarette smoking, it will take several tests and many years before the effects of radio frequency radiation on the human body are known.\nThat’s why randomized controlled trials (RCTs) often yield fairly clear answers about the effectiveness of treatments compared to other study designs. (Fun fact: Scottish doctor James Lind, a clinical trial pioneer, figured out that citrus fruits seemed to have an effect on scurvy using one of the earliest RCTs.) RCTs can also be used to study whether something, like cellphone radiation, can cause disease.\nYour phone sends radiofrequency, or RF, waves from its antenna to nearby cell towers, and receives RF waves to its antenna from cell towers when you make a call or text or use data. The frequency of a cell phone’s RF waves falls between those emitted by FM radios and those from microwave ovens, all of which are considered “non-ionizing” forms of radiation. That means that—unlike radiation from a nuclear explosion, a CT scan, or a standard X-ray—the radiation from your phone does not carry enough energy to directly break or alter your DNA, which is one way that cancer can occur. (FM radios and microwaves don’t raise alarms, in part because they aren’t held close to your head when in use and because microwave ovens have shielding that offers protection.)\nBut scientists disagree on how real—or how serious—these risks really are, and studies have not established any definitive links between health problems and radiofrequency (RF) energy, the type of radiation emitted by cell phones. “This document is intended to provide guidance for people who want to reduce their own and their families’ exposure to RF energy from cell phones,” the guidelines state, “despite this uncertainty.”\nThe RF waves from cell phones come from the antenna, which is part of the body of a hand-held phone. The waves are strongest at the antenna and lose energy quickly as they travel away from the phone. The phone is typically held against the side of the head when in use. The closer the antenna is to the head, the greater a person’s expected exposure to RF energy. The body tissues closest to the phone absorb more energy than tissues farther away.\nI received mine yesterday in the mail. I have a Samsung Galaxy Note 3, and I cannot use this sock unless I take the case off. This is one thing I did not know when I was purchasing this material. I am trying it out as stated, however even when I use a rubber case or a very thin case with the sock its very tight to get off. I think the manufacturer needs to allow more room in these and or not state that it fits the larger phones at 6 inch. They should state that without the case it will fit. I am in the first day of walking around without a case, and just the sleeve. Its different, and if I drop my phone I'm in a world of hurt. I like the idea of this, but I was also surprised when the material really only feels like felt. It's not like the RF fabric that I have seen, and hopefully this is some kind of special blocking material as stated. I do like the idea, and I agree that cell phone radiation exist. Ill come back and give five stars if I really notice a difference, however if I drop my phone because I dont have a case I'm going to be posting less stars.\nForced to take action, the cell phone industry set up a non-profit organization, Wireless Technology Research (WTR), to perform the study. Dr. Carlo developed the program outline and was asked to head the research. Oversight of the issue was charged to the FDA, though it could have and probably should have gone to the Environmental Protection Agency (EPA), which fought hard for jurisdiction. But the industry had enough influence in Washington to get whatever overseer it wanted. It simply didn’t want to tangle with EPA because, says Dr. Carlo, “… the EPA is tough.”\n“One thing all these conditions have in common is a disruption, to varying degrees, of intercellular communication. When we were growing up, TV antennas were on top of our houses and such waves were up in the sky. Cell phones and Wi-Fi have brought those things down to the street, integrated them into the environment, and that’s absolutely new. The recognition mechanism, where protein vibration sensors on the cell membrane pick up a signal and interpret it as an invader, only works because the body recognizes something it’s never seen before.”\nToday, the computer and phone have merged into one device that fits in the palm of your hand. A smartphone is essentially a small computer, yet has many times the computing power of traditional computers. There are no cords to connect you to a base. When turned on in your pocket or being used against your head, the cell phone touches some of the most sensitive parts of the body. Although the cell phone produces lower levels of radiation then past computers, they are now used much closer to the body and for longer periods of time, thus creating more health risks than in the past.\nStereo Hands-Free Headset with a gold plated 3.5mm, 3 band plug. Sporty lightweight design, this headset provides clear stereo sound quality comfortably to your ears. The convenient microphone allows you to make and receive calls at the touch of a button. Compatible with all universal 3.5mm headphone jacks. Can be used with Ferrite Snap Bead to further reduce RF exposure.\nSimply snap your phone into the dent resistant bumper cradle. Flip the Cruz Case lid open to receive or make calls, then close back into protective mode. To use properly, flip open the Cruz flip lid cover to answer a call, flip back the cover over the face of the phone and talk through the flip lid cover with perfect clarity. Always keep the flip lid cover between you and your phone even when carrying in your pockets. The attractive and stylish Cruz Case technology provides up to 60dB at cell phone frequencies. Patent pending design does not affect the signal to the cell tower. Ultra-slim design also provides scratch protection for the display and helps keep the screen clean. Keeps your phone looking new. Includes credit card holder feature as well. Select model to fit.\nThe World Health Organization states that \"A large number of studies have been performed over the last two decades to assess whether mobile phones pose a potential health risk. To date, no adverse health effects have been established as being caused by mobile phone use.\" In a 2018 statement, the FDA said that \"the current safety limits are set to include a 50-fold safety margin from observed effects of radiofrequency energy exposure\".\nJust why Schwann and glial cells appear to be targets of cell phone radiation is not clear. David Carpenter, a physician who directs the Institute for Health and the Environment at the University at Albany, S.U.N.Y., explained the purpose of these cells is to insulate nerve fibers throughout the body. These are electrical systems, so that may be some sort of factor, he wrote in an e-mail. “But this is only speculation.”\nThe frequency of radiofrequency electromagnetic radiation ranges from 30 kilohertz (30 kHz, or 30,000 Hz) to 300 gigahertz (300 GHz, or 300 billion Hz). Electromagnetic fields in the radiofrequency range are used for telecommunications applications, including cell phones, televisions, and radio transmissions. The human body absorbs energy from devices that emit radiofrequency electromagnetic radiation. The dose of the absorbed energy is estimated using a measure called the specific absorption rate (SAR), which is expressed in watts per kilogram of body weight.", "label": "Yes"} {"text": "Single - Phase Uninterruptible Power Supply System 1.0 GENERAL 1.1 SUMMARY\nThis specification defines the electrical and mechanical characteristics and requirements for a continuous-duty single-phase, solid-state, uninterruptible power system. The uninterruptible power system, hereafter referred to as the UPS, will provide high-quality AC power for sensitive electronic equipment loads.\nThe UPS is designed in accordance with the applicable sections of the current revision of the following documents. Where a conflict arises between these documents and statements made herein, the statements in this specification shall govern.\nUL Standard 1778, UL 1499\nFCC Part 15, Class A\n1.3. SYSTEM DESCRIPTION 1.3.1 Modes of Operation\nThe UPS is designed to operate as a line interactive uninterruptible power supply in the following modes:\nA. Normal - In normal operation incoming AC power is fed to the input, conditioned and applied to the connected equipment. In this mode, power is also derived from utility power for the battery charger. In the event of a utility outage or severe abnormality (sag or swell), the UPS will support the connected load from battery power, until the battery is discharged or the utility returns; whichever occurs first.\nB. Battery - Upon failure of utility / mains AC power, the critical AC load is supplied by the battery. The switch over time to battery is less then 2 milliseconds.\nC. Recharge - Upon restoration of utility / mains AC power, after a utility / mains AC power outage, the input converter automatically restarts and resumes supplying power to the connected load and the battery charger to recharge the battery.\nD. Automatic Restart - Upon restoration of utility / mains AC power the UPS automatically restarts and assumes supplying power to the critical load and the battery charger.\n1.3.2 Design Requirements A. Voltage: Input/output voltage specifications of the UPS are:\nB. Output Load Capacity: Specified output load capacity of the UPS is:\n2200 VA/1980 Watts at 0.9 lagging power factor.\nC. Internal Battery: Valve regulated, non-spillable, flame retardant, lead acid cells.\nD. Reserve Time: 2200 VA minimum 9.7 minutes, these times are at full load with ambient temperature of 25oC (77oF).\nE. Battery Recharge: The UPS contains a battery recharge rate designed to prolong battery life. Recharge time for UPS internal batteries is three (3) hours maximum to 90% capacity after a complete discharge into full load.\n1.3.3 Performance Requirements 184.108.40.206 AC Input to UPS A. Voltage Configuration: The UPS operates at 120 VAC nominal; single phase without drawing power from the batteries. The input voltage can be adjusted to operate within the range of 74-154 VAC.\n120 VAC; single phase, 2 wire plus ground nominal; variable based upon output loading:\nB. Frequency: UPS auto senses input frequency when first powered up and will operate within the following frequency specifications. The UPS is capable of auto sensing input frequency of 50/60 Hz @ 120 VAC +/- 3%.\nC. Surge Protection & Filtering\nSurge energy rating is 880 Joules, 6.5kA.\nFull time multi pole noise filtering; 0.3% IEEE surge let through; zero clamping response time.\nInput EMI filters are employed in accordance with MIL-461\n220.127.116.11 AC Output, A. Voltage Configuration: 120 V Units: 120 VAC, 60/50 Hz, single-phase, 2-wire-plus-ground configuration\nB. Voltage Regulation: + 3% steady state.\nC. Frequency Regulation: 47-53 Hz nominal for 50 Hz, 57-63 Hz nominal for 60 Hz, Synchronized to utility / mains.\nD. Output Line Distortion: less than 5%\nE. Output Power Rating: 2200 VA/1980 Watts at 0.9 lagging power factor.\nF. Crest Factor: up to 5:1\nG. Filtering: Output EMI filters are employed in accordance with MIL-461\nH. Waveform: Sine wave\n18.104.22.168 Output connectors\n(2) Mil-5015 MS circular connectors\n1.4 Environmental Conditions A. Ambient Temperature:\nOperating: 0O C to +40O C (+ 32O F to + 104O F) for altitudes 0 to 3000 meters (0 to 10,000 ft.) above sea level.\n25O C (+ 77O F) for optimum battery performance\nStorage: -15O C to +50O C (+ 5O F to +113O F) with batteries removed.\nStorage elevation 15000 M max.\n20O C (+ 68O F) for optimum battery storage.\nB. Relative Humidity:\nOperating: 0 to 95% non-condensing.\nStorage: 0 to 95% non-condensing.\nC. Audible Noise: Noise generated by the UPS under normal operation does not exceed 50dBA when measured at 1 meter from the surface of the UPS.\nE. Electrostatic Discharge: The UPS is able to withstand an electrostatic discharge compliant to ENC61000-4-2, level 4, for 120 VAC, 208 VAC, and 230 VAC units (15 kV through air, 8 kV contact) without damage and will not affect the connected load.\n1.5 USER DOCUMENTATION The specified UPS system is supplied with one (1) user's manual.\n1.6 WARRANTY The UPS manufacturer warrants the UPS against defects in materials and workmanship for one (1) Year\n1.7 QUALITY ASSURANCE\n1.7.1 Factory Testing Before shipment, the manufacturer fully and completely tests the system to assure compliance with the specification. These tests include operational discharge and recharge tests on the internal battery to assure performance.\n2.0 PRODUCT 2.1 FABRICATION The UPS is manufactured and fabricated in accordance with MIL-STD -901D and MIL-STD-167 as tested and certified. All materials and components making up the UPS are new, of current manufacture, and have not been in prior service except as required during factory testing. All relays are provided with dust covers.\n2.1.2 Wiring Wiring practices, materials, and coding are in accordance with the requirements the standards listed in section 1.2 and other applicable codes and standards. All wiring is copper.\n2.1.3 Cabinet The UPS unit is comprised of: input converter, battery charger, inverter, and battery consisting of the appropriate number of sealed battery cells; and is housed in a tower NEMA type 1 enclosure and meet the requirements of IP20. The UPS cabinet is cleaned.\nChassis is fabricated from 304 stainless steel.\nMODEL DIMENSIONS (H x W x D) WEIGHT PS2201-SS-Grade A\n17.0” x 8.0” x 22.0”\n(43mm x 20mm x 55mm)\n115.0 lbs. (52.1kg)\n2.1.4 Cooling The UPS is forced air cooled by internally mounted fans. Fan power is provided from the internal power supply. Air intake is through the front of the unit and exhausted out the rear of the unit.\n2.2 COMPONENTS 22.214.171.124 AC Input Current Limit The input converter is provided with AC input current limiting whereby the maximum input current is limited to 125% of the full load input current rating\n126.96.36.199 Input Protection The UPS is supplied with a MIL-STD Hi-G force double pole circuit breaker in accordance with MIL-STD-901D and MIL-STD-167. The circuit breaker is rated at 20.0A The UPS has built-in protection against under voltage, over current, and over voltage conditions including low-energy lightning surges, introduced on the primary AC source. The 120 VAC models can sustain input surges without damage per criteria listed in IEEE 587 CAT. A & B.\n188.8.131.52 Battery Recharge The UPS contains a battery recharge rate designed to prolong battery life. The battery is constant current charged to restore capacity, then shall be constant voltage charged to maintain the battery in a fully charged state. Recharge time for the internal UPS batteries shall be three (3) hours maximum to 90% capacity (full load discharge rate). There is DC over voltage protection so that if the DC voltage exceeds the pre-set limit, the UPS will shutdown automatically and the critical load is transferred to bypass mode.\n184.108.40.206 Output Protection The UPS employs electronic current limiting circuitry.\n220.127.116.11 Battery Over Discharge Protection To prevent battery damage from over discharging, the UPS control logic automatically raises the shutdown voltage set point; dependent upon output load at the onset of battery operation.\n2.2.3 Display and Controls 18.104.22.168 General The UPS is provided with a microprocessor based unit status display and controls section designed for convenient and reliable user operation. The monitoring includes functions such as status and alarm, battery level and runtimes.\n22.214.171.124 System Indicators\n2.2.4 On-Line Battery Test The UPS is provided with an automatic biweekly battery test feature (factory default). Via the set-up configuration program on a Windows based PC the automatic battery test can be disabled or configured to operate every 7, 14, 21, or 28 days.\nThe battery test will ensure the capability of the battery to supply power to the inverter while loaded. If the battery fails the test, the UPS will display a warning message to indicate the internal batteries need replaced. The battery test feature is user accessible by the push button located on the front of the unit and with Communications Software. The Automatic Battery test feature is capable of being disabled through the User Configuration Program.\n2.2.9 Configuration Program An included Windows tm based (Win95 or later) Configuration Program and cable allows for configuration of UPS features and operating parameters to meet specific application requirements, if required. Options that are configurable via this program include:\n126.96.36.199 Automatic Transfers\nThe transfer control logic automatically activates the bypass, transferring the critical AC load to the bypass source, after the transfer logic senses one of the following conditions: UPS overload\nUPS over temperature\nDC Bus Over voltage\nOnce overload condition is reduced, the load is automatically transferred back to inverter power.\n2.2.6 Internal Battery Valve regulated, non-spillable, flame-retardant lead acid cells are used as a stored-energy source for the specified UPS system. The battery is housed internal to the UPS cabinet, and sized to support the inverter at rated load and power factor, with ambient temperature of 25 O C (77 O F) for a minimum of 7 minutes reserve time. The expected life of the battery shall be 3 - 5 years or a minimum 250 complete discharge cycles. The UPS units have the capability to allow the operator to replace the internal battery.\n2.2.7. Output Distribution Output distribution is integrated to the UPS, and located on the rear of the unit.\n2.2.8 Communication The UPS includes one slot for optional communication options.\n188.8.131.52 DB-9 Serial Port The UPS contains a DB9F (9-pin female) connector on the rear panel to allow UPS status communications to a computer system. The DB9F contains photo couplers to signal on battery and low battery operational status. The UPS is also capable of receiving a signal\n2.2.8 Communication Options SNMP This option delivers SNMP and Web management to the UPS when connected to any 10 or 100 Mbit Ethernet network. The card supports 10 and 100 Mbit Ethernet and provides for in-the-field upgrade of SNMP firmware. The kit includes the card, software and installation manual. Once the card is installed, the serial communications is disabled in the DB9F connector.\nRelay Interface Card This RELAYCARD-INT option provides dry contact closures for remote monitoring of alarm conditions in the UPS, delivering signals for On Battery, Low Battery, Summary Alarm, UPS Fault and On UPS.", "label": "Yes"} {"text": "Connect with top gaming leaders in Los Angeles at GamesBeat Summit 2023 this May 22-23. Register here.\nTwo months after cellular industry association SIMalliance called for a new and more secure 5G SIM card standard, digital security company Gemalto announced today that it has developed the world’s first 5G SIM — a more secure solution that will roll out in the first half of this year.\nRecognizing both increasing and evolving types of cellular devices, the 5G SIM will be offered in three form factors: a traditional removable SIM card, an embedded SIM (eSIM), and a machine-to-machine (M2M) SIM designed for internet of things devices. All of the versions will support both the 3GPP’s specifications and SIMalliance’s recommendations for 5G SIMs, enabling Gemalto to be the first to offer a solution deemed capable of securing 5G network access.\n“The 5G SIM provides the foundation of trust in this next generation mobile network for operators and other stakeholders in the eco-system,” said Gemalto EVP Emmanuel Unguran. “It will help operators unleash the full 5G potential, maximize their network investments, and simplify new service deployment with full backward compatibility to previous 3G/4G technology.”\nCompared with earlier SIMs, the 5G SIM will support seamless global 5G roaming, encrypt and fully anonymize subscriber identities, and increase security against hacks and data breaches. Due to the anonymizing feature, the new SIM is expected to reduce if not eliminate unauthorized location tracking, as well as ensure carrier compliance with personal data privacy laws.\nJoin us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.\nThough the earliest 5G devices are already shipping — a reality SIMalliance acknowledged last year by differentiating between “transitional” and “recommended” 5G SIMs — the new cards will be found in upcoming devices based on Qualcomm’s Snapdragon 855 platform.\n“Qualcomm Technologies has a longstanding relationship with Gemalto focused on delivering mobile solutions with robust security,” said Qualcomm senior director Gautam Sheoran. “We are now extending this collaboration to allow OEMs to easily develop exciting 5G devices with strong security, using both Gemalto 5G SIM and our next generation flagship Qualcomm Snapdragon 855 Mobile Platform to pave the path for 5G commercialization in 2019.”\nGemalto expects that 5G SIMs will be used to manage over 1.5 billion 5G subscriptions by 2024, across mobile broadband, large-scale IoT installations, and other applications. SIMalliance has advocated for a single 5G SIM standard to guarantee an optimally secure and service experience to customers.\nVentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.", "label": "Yes"} {"text": "Wi-Fi connect but data not downloading. some one will say setting problem, I am sure there is no setting problem. If u disconnect the Wi-Fi then it will not connect again.\nGo for Samsung or HTC any other brand\nWi-FI is not working, battery problem, touch is not good.\nMmx guys provided a great phone for reasonable price, operating this phone gives you an awesome feeling.The battery backup is avg i.e it last for a day . The camera quality is good, the display is sharp and bright , great looks and feels.\n* performance is great with octa core processor and ARM mali 450 MP4 GPU, all high end games are running smoothly without any frame lose or lag.\n* good camera quality.\n* screen size is just perfect.\n* screen resolution .\n* glossy looks.\nsim card and micro sd tray\nBest phone under 12000\nBest screen resolution, fine looking, superb speed, excellent camera, good features like photo editing, fm recording.\nVery disappointed. Either use second sim or memory card.\nWhy they say dual sim, they should clearly mention after product name \"dual sim without memory card\" or \"single sim with memory card\".\nVery nice phone look wise. Only issue is with SIM card tray. Very uneasiness to open SIM trasy and place SIM card and Memory card inside it.", "label": "Yes"} {"text": "laptop repair job in delhi. We offer repair services at the doorstep by professionals free visiting, no diagnosis charge, on-call support.\nNotebook fix is among the lots of jobs obtainable out there. As laptops are actually being used by just about every personal on this planet, there is a superb demand for laptop computer fix pros. There are several companies that make use of them plus they need individuals who can manage the issues. Because there are various companies featuring this services, you will see that it’s challenging for getting a gap. It’s important to work hard If you prefer to be successful In this particular area.You can find certain skills which all laptop computer fix professionals should possess so as to execute their duties efficiently. By searching through lots of on-line resumes, was ready to slim down the key commonest skills essential for this kind of placement. People who are trying to diagnose laptops should find out about unique forms of utilities.One of such could be the UPS battery. This can be the one particular answerable for the charging of the laptop computer. When there is a difficulty Along with the UPS battery or It’s not necessarily Functioning effectively, laptop computer repairs could be essential. Individuals who have the knowledge to change the battery need to be hired. Aside from the UPS battery, individuals also must know about the troubleshooting strategies that happen to be relevant Along with the keyboards.Other matters relevant Along with the laptop computer fix can include things like troubleshooting troubles relevant Along with the AC adapter. It needs to be ensured the voltage at the back of the laptop computer is correct. If the laptop computer overheats, the lover won’t get the job done effectively. To solve this challenge, individuals must diagnose the assorted concerns that think of the overheating difficulty.One more factor related to laptop computer fix is related to the keyboard. It is very important for laptop computer end users to make certain that the keyboard functions effectively. There are several aspects which cause a keyboard to prevent Functioning. Normally, individuals have to seek advice from on-line resources to learn the way to troubleshoot certain concerns just like the laptop computer overheating, laptop computer lover failure and so on.People that make use of the antivirus computer software to safeguard their computer devices must update it consistently. This computer software can help in detecting virus signatures in the program. When there is an current signature, it makes sure that the antivirus computer software detects every one of the threats. If your virus scanner detects a virus signature in the program, then it blocks the menace and allows the functioning program to run smoothly. People that use antivirus computer software need to know how to total laptop computer fix responsibilities which include things like antivirus computer software update.Individuals who want to do the laptop computer analysis on their own need to Understand that they must not make an effort to diagnose troubles which have to have additional advanced skills and solutions. Whenever they diagnose the program without having making sure the system is jogging Ordinarily, they may end up harming the system even more. For advanced analysis, they must connect the laptop computer towards the Home windows program, open up the diagnostics options by clicking on the Start button on the task bar and then click “My Pc”. They must then enter the product and serial numbers of the system. They can then press Okay and then wait for the system to begin Functioning once more.People who are unfamiliar with laptop computer computers, but know the battery plus the cooling program Within the laptop computer must seek advice from the person’s manuals for proper troubleshooting. If they cannot find any data in the manuals, they must get in touch with the producer for getting substitute batteries or Examine In the event the cooling program is triggering the situation. The next move is to remove the battery with the program and connect the battery towards the fixity. If every thing is alright Along with the connection, the individual need to You should definitely clear away the battery and ensure to setup the battery again once more.", "label": "Yes"} {"text": "Magneto-sensitive smart materials, also named as magnetorheological (MR) materials, are a class of smart composites prepared by dispersing nanometer- or micrometer-sized ferromagnetic fillers into the different carrier matrix. As the rheological properties can be controlled by an external magnetic field rapidly, reversibly, and continuously, magneto-sensitive smart materials have great application potential in construction, automotive industry, artificial intelligence, etc. In this chapter, a brief history and classification of magneto-sensitive smart materials are firstly summarized. Next, we discuss the state-of-the-art of the magnetorheological mechanism through experimental and theoretical studies, respectively. Finally, the prospect for this material in the future is presented.\n- smart soft material\n- magnetorheological material\n- magnetic dipole theory\nMost smart materials imitate natural biological materials, which can respond to the stimuli (like mechanical, thermal, electrical, photic, acoustic, magnetic, chemical, etc.) by changing one or multiple properties to adapt to the changing environment . So far, bioinspired smart materials have become an important research direction in material science. It is difficult for a homogenous material to possess multifunction, so it generally combines the materials with the functions of perception, actuation, control, etc., together in a specific way to design a novel composite with multiple characteristics. The smart material is multilevel with different components; each component has different characteristics and microstructures, and the coupling effect exists between different components, and these components make the smart material show complicated responses to external stimuli. Generally, the adapting ability of smart material to external environment, which is similar to the activated function of biological material, can be dynamically adjusted through the transportation of substance and energy.\nMagnetorheological (MR) materials can be regarded as a kind of bioinspired smart materials because their viscoelastic properties can be easily adjusted by an external magnetic field. Magnetorheological materials can be generally classified into MR fluids, MR elastomers, and MR gels according to the type of the carrier matrix and the physical state in the absence of magnetic field [2, 3, 4]. The MR fluid-based practical devices mainly include damper, buffer, clutch, artificial muscle, and so on . Some application examples of MR fluid working under different modes can be found in various dampers, which take MR fluid as working medium. Besides, MR fluid has also found wide application potential in the fields of thermal conduction , sound transmission , precision machining , and biomedicine . The applications of MR elastomer have been widely reported in the fields of adaptive tuned vibration absorber , impact absorber , active noise abatement barrier system , vibration isolator , sensor [14, 15, 16], and so on. MR elastomer mainly works by changing its modulus through magnetic field during pre-yield stage, which shows different working mechanism with MR fluid (MR fluid mainly works at post-yield stage). The examples for the application of MR gel are relatively less in comparison with MR fluid or MR elastomer, but the unique magneto-induced phenomena have attracted more and more attentions; some work concentrating on the potential applications of MR gel have been reported [17, 18, 19, 20].\nHere, we will give a brief introduction to different kinds of MR materials, discuss the related experimental and theoretical work when investigating the MR mechanism, and finally propose some future prospects for these magneto-sensitive smart materials aiming at practical applications.\n2. The development of magnetorheological materials\n2.1 Magnetorheological fluid\nMagnetorheological (MR) fluid is the earliest developed magneto-sensitive smart material, which is a particulate suspension by mixing micrometer-sized ferromagnetic fillers, non-magnetic fluid, and some additives together. After applying an external magnetic field, the MR fluid will change from Newtonian-like fluid to semi-solid material quickly (within several microseconds) , as shown in Figure 1a . The randomly dispersed magnetic fillers are rearranged to form chain-like ordered microstructure through the magnetic interaction. Moreover, the ordered degree of the microstructure is relevant with the magnetic field strength. That is, a stronger magnetic field will induce a more ordered chain-like microstructure parallel with the direction of external magnetic field (Figure 1b) .\nThe rheological measurements indicate that MR fluid shows Bingham fluidic behavior under magnetic field, an obvious yield stress exists, and the maximum of yield stress has exceeded 100 kPa . Moreover, the apparent viscosity of MR fluid changes typically 3–4 orders of magnitude by changing the magnetic field strength, presenting a typical MR effect. However, the sedimentation problem due to the density mismatch between carrier matrix and ferromagnetic fillers become one of the bottlenecks to hinder the development of MR fluid. To solve the problems of particle sedimentation and the re-dispersion after the particle aggregation in the carrier matrix, many effective methods have been proposed. Generally, these methods can be classified into two main categories from the aspects of filler and carrier matrix.\nCarbonyl iron particle is an ideal candidate to prepare MR fluid due to its low coercive force and high saturation magnetization (μ0Ms = 2.1 T). However, a serious sedimentation problem exists in the MR fluid with carbonyl iron particle. Sometimes, it has to abandon carbonyl iron particle with excellent magnetic property and choose some other magnetic material which could improve the sedimentation of MR fluid for the balance between performance and stability.\nDecreasing the size of magnetic fillers is an effective method to improve the stability of MR fluids. Submicron- or nanometer-sized particle shows better stability in the non-magnetic carrier matrix in comparison with the micrometer-sized particle because of the Brownian movement and Van der Waals force. Especially, the particulate suspension totally using nanometer-sized ferromagnetic fillers as dispersed phase is named as magnetic fluids or ferrofluids [25, 26, 27, 28, 29, 30, 31, 32]. Each ferromagnetic filler in ferrofluids includes single magnetic domain and could disperse in the carrier matrix randomly due to the Brownian movement, so the sedimentation is greatly improved. However, the ferrofluids keep their liquid-like state even under a strong magnetic field, which indicates that it is impossible for ferrofluids to have a high magneto-induced yield stress. In addition, the particle aggregation caused by the particle’s nanometer size (or the re-dispersion of particles after removing the magnetic field) is another challenge to promote the further development of ferrofluids . Using the magnetic material with the shape of rod-like or fibroid is regarded as another effective method to improve the stability and MR performance of MR fluids .\nExcept for changing the size and shape of ferromagnetic fillers, the core-shell structured ferromagnetic particle, whose surface is chemically modified by various polymers, is also a good candidate. The core-shell structure not only decreases the density of the particle but also increases the static electrical repulsion between adjacent particles, so the stability and the redispersibility of MR fluid are evidently improved. Moreover, the antioxidation is improved because the surface of the particle is wrapped by polymer . Figure 2 shows the SEM images of carbonyl irons wrapped by various polymers, which were mainly made by Choi’s research group at Inha University.\nIt is a new approach to balancing the stability and performance of MR fluid by dispersing the submicron- or nanometer-sized ferromagnetic fillers (such as nanotube, submicron- or nanometer-sized carbonyl iron particle, wrought monox, organic clay, clavate ferromagnetic Co-γ-Fe2O3, and CrO2) into conventional MR fluid to change the property of continuous phase (i.e., the matrix) [36, 37, 38, 39]. Both of the sedimentation rates of the dispersed phase and the MR effect are improved significantly due to the existence of ion. However, the modification to the carrier matrix, together with the modification to the dispersed particles, could only improve the sedimentation of MR fluid to some extent. To solve the particle sedimentation completely, the non-magnetic liquid matrix can be totally substituted by rubber-like polymer matrix. Thereout, a new magneto-sensitive soft material, that is, MR elastomer, appears later.\n2.2 Magnetorheological elastomer\nMR elastomer presents solid state even without magnetic field; it inherits the magneto-sensitive feature of MR fluids, but its working principle and application field are quite different from MR fluid. The magnetic fillers are fixed in the polymer matrix after the MR elastomer is prepared, the particles cannot move freely even exposed in a magnetic field, and no “phase transition” appears like happened in MR fluid. MR elastomer carries out the intelligent control mainly through changing its damping and modulus by magnetic field before yield . The ordered chain-like (or column-like) microstructure aligned parallel to the direction of magnetic field generates if an external magnetic field is applied during the vulcanizing process of the polymer matrix. After vulcanization, the ordered microstructure can be solidified in the matrix, and the anisotropic MR elastomer is obtained.\nFigure 3 shows the SEM images of MR elastomers pretreated by different magnetic fields. It is clear that chain-like structured anisotropic MR elastomer can be prepared if it is exposed under an external magnetic field during the pre-configuration process. The structure of particle chains can be further adjusted by the magnetic field. The ferromagnetic fillers aggregate more easily under a strong magnetic field, resulting in a higher degree of anisotropy of MR elastomer. Further magnetorheological characterization indicates that the MR elastomer with higher degree of anisotropy also possesses high MR effect . So far, many kinds of rubber, such as natural rubber , silicon rubber , polyurethane rubber , cis-polybutadiene rubber , nitrile butadiene rubber , and thermoplastic elastomer blended by polypropylene and SEBS , have been chosen as the candidates for fabricating the MR elastomer.\nAlthough the particle sedimentation is completely solved, the magneto-induced effect and MR effect constrain each other, making the requirement of engineering application not easy to be achieved. Moreover, MR elastomer loses the feature that the particulate microstructure can be easily controlled by magnetic field as like in MR fluid because the ferromagnetic fillers are fixed in the rubber matrix, which indicates that it loses the magneto-controllable flexibility. To pursue a stable MR material with a high MR effect and a strong magneto-induced effect aiming to the engineering application, it needs to abandon the conventional fabricating solutions and redesign a new magneto-sensitive smart material.\n2.3 Magnetorheological gel\nMR gel is another magneto-sensitive smart material whose continuous phase is viscoelastic. The inelastic matrix makes MR gel present typical viscoelastic characteristics even without external magnetic field. Shiga et al. firstly proposed the concept of MR gel in 1995 , and they prepared a series of MR gels with different particle contents by dispersing ferromagnetic fillers into silicone gel and investigated the magneto-dependent viscoelastic behaviors and microstructures of MR gel. The MR gels can be further classified into liquid-like and solid-like MR gels according to their physical state without magnetic field.\nThe liquid-like MR gels can be regarded as a kind of special MR fluid with a little mount of polymer solution as additive. The polymer additive can generate a network structure in the matrix to modify the interfacial characteristic of ferromagnetic fillers and their interaction, greatly slowing down the sedimentation velocity of ferromagnetic fillers [48, 49, 50]. In comparison with MR fluids, except for improving the sedimentation stability, the off-state viscosity and yield stress of liquid-like MR gels can also be adjusted by adding a certain amount of polymer additives. However, the polymer network increases the moving resistance of ferromagnetic fillers in the matrix, and the response of MR gels to external magnetic field is then decreased accordingly. In addition, the sedimentation problem in the liquid-like MR gels is not completely solved.\nStrictly speaking, the magnetic gel reported by Shiga et al. is a kind of solid-like MR gels . The most distinct characteristic of solid-like MR gels is that there is no particle sedimentation problem exists, like MR elastomer. Yet the matrix is not the rubber-like elastic material, the solid-like MR gel cannot be classified into MR elastomer. Recently, these solid-like MR gels have been paid more and more attention [51, 52, 53, 54, 55, 56, 57]. A novel solid-like MR gel by mixing micrometer-sized magnetic particles and plasticine-like polyurethane was reported by Xu et al. . As Figure 4a shows, this material presents like plasticine without magnetic field, can be changed into any shapes, and remains the status of plastic deformation, so it is named as MR plastomer. MR plastomer deforms along with the direction of the applied external magnetic field (Figure 4b). Further microstructure characterization indicates that the randomly dispersed magnetic particles can rearrange to generate chain-like (or column-like) orientated microstructure driven by magnetic force (Figure 4c and d). In addition, the anisotropic particulate microstructure is kept even the external magnetic field is removed .\nIn one word, an orientated particulate microstructure in the solid-like MR gel can be adjusted through an external magnetic field. Meanwhile, the chain-like (or column-like) microstructure can be fixed in the soft matrix after removing the magnetic field. This unique feature makes solid-like MR gel process the merits existed on MR fluid and MR elastomer (i.e., movability of particles and the “frozen” property of orientated microstructure) at the same time, which is significant to investigate the magneto-mechanical coupling mechanism.\n2.4 Other magnetorheological materials\nSome other special MR materials, which cannot be simply classified into the most well-known MR materials as mentioned above, were reported in the literature. MR foam is a kind of solid-like polymer composite by pouring MR fluid into porous polymer foam (Figure 5); the modulus of the MR foam can be controlled by changing the rheological property of MR fluid through a magnetic field [60, 61, 62]. Due to the special porous microstructure, MR foam presents the merits of lightweight, controllable modulus, excellent sound-absorbing property, and so on .\nTo solve the problem of particle sedimentation for MR fluid, Park et al. prepared a kind of novel MR material with excellent sedimentation resistance ability by substituting the fluidic matrix of MR fluid with commercial grease, and they named this MR material as MR grease . MR grease shows typical Bingham fluid behavior; so strictly speaking, MR grease can be regarded as a special MR fluid. Byrom and Biswal reported a colloidal material system by adding micrometer-sized paramagnetic and diamagnetic particles into ferrofluid . Different from the conventional MR fluid, the particles do not generate a chain-like orientated structure parallel with the direction of magnetic field but a fractal net-like microstructure in 2D direction. Further analysis indicated that the fractal net-like microstructure is induced by the magnetic dipole interaction between paramagnetic and diamagnetic particles, and the fractal dimension of the particle aggregates can be controlled by adjusting the concentration of ferrofluid and the ratio of paramagnetic and diamagnetic particles.\nA multifunctional magnetic plasticine™ was developed by Xuan et al. , and they chose paraffin wax petroleum jelly as the matrix. Except for the high magneto-induced G′ (4.23 MPa) and MR effect (305%), magnetic plasticine™ can be switched between liquid-like state and solid-like state by changing the temperature, which greatly enhances the regulation ability. Shahrivar and de Vicente also reported a thermo-responsive polymer-based magneto-sensitive material , which can easily achieve phase transition by changing temperature. Figure 6a depicts that “liquid-to-solid” transition with increasing temperature appears in the MR composite with PEO-PPO-PEO solutions because a repulsive colloidal glass generates, while an inverse temperature-driven phase transition can be achieved for MR composite with P-NIPA microgel dispersions (Figure 6b). Besides, the critical temperature of phase transition can be changed by tuning polymer concentration. The multi-responsive MR material is a good effort in the frontier between conventional MR fluid and MR elastomer.\n3. Magneto-sensitive properties and MR mechanism\nThe magnetic field usually leads to a structural rearrangement in soft MR material, and this process has significant influence on the physical properties of soft MR material. Due to the weak restriction of polymer matrix to the ferromagnetic fillers and complexity of polymer matrix, the responses of MR gel to external stimuli are more complicated than those of MR fluid and MR elastomer. For this reason, MR gel presents some unique magneto-electro-thermo-mechanical coupling phenomena. However, the realization on the coupling mechanism of MR gel is far from enough in comparison with those of MR fluid and MR elastomer, and more efforts need to be made through experimental and theoretical studies. Tight correlations exist between these three MR materials; so, there are some similarities in MR mechanism, and we can use the characterization techniques and theoretical models of MR fluid and MR elastomer for reference when studying the MR mechanism of MR gel. Next, we will briefly discuss the characterization methods and theoretical studies for different MR materials.\n3.1 Experimental characterization of MR materials\nExperimental characterization of MR materials can not only quantitatively evaluate their performance but also provide the necessary parameters for theoretical research or certify the accuracy of the theoretical results, which is the foundation for investigating the MR mechanism. The magneto-induced rheological properties of MR materials under different loading conditions (quasi-static shear, tensile, compressive loading, dynamic shear, and squeeze loading) are the most important properties, and this is the primary reason for naming this magneto-sensitive smart material as MR material. The influences of relevant factors (i.e., magnetic field, temperature, PH value, particle concentration, shape, size, and so on) on rheological properties were also widely investigated. Besides, the magnetization, electrical conduction, thermal conduction, and magnetostriction of MR materials are studied as well.\nThe rheological property of MR materials under shear loading is the most used characterization parameters at present. Many famous commercial rheometers, like the Physica MCR rheometer from Anton Paar Company and Discovery hybrid rheometer from TA Company, are designed for the rheological characterization under shear loading.\nThe magneto-dependent rheological behavior of MR fluid is usually described by Bingham model:\nBoth of the solid-like and liquid-like MR material can be considered as the viscoelastic material, and the dynamic mechanical analysis under oscillatory shear is one of the most important characterization methods for viscoelastic materials. Normally, applying a sinusoidal shear strain to the viscoelastic material, if the amplitude of the strain is small enough, a sinusoidal response stress at the same frequency but a specified phase shift can be obtained; then, we define the dynamic mechanical properties (i.e., storage modulus G′, loss modulus G″, and loss factor tanδ) of material within the linear viscoelastic (LVE) range as the ratio of response stress to actuation strain in the complex plane. Dynamic mechanical properties are frequently used characterization parameters for investigating the magneto-induced microstructure evolution mechanism of MR materials. For the practical application, most MR materials in the devices are working under the oscillatory shearing mode. More importantly, both solid-like MR elastomer and liquid-like MR fluid can be characterized by dynamic mechanical analyzer (DMA) [71, 72], which indicates that dynamic mechanical analysis can be considered as a universal method to characterize MR materials. Therefore, as the intermediate material system between MR elastomer and MR fluid, the magnetorheological properties of MR gel are mostly studied by DMA .\nThe oscillatory shear mode can be further classified into simple shear and rotating shear according to different measurement principles of commercial devices. Figure 8a shows a typical DMA (Tritec 2000, provided by the Triton Technology Co. Ltd., UK). If an external magnetic field generator is added (Figure 8b), the magneto-mechanical coupling behaviors of MR elastomer under oscillatory simple shear mode can be investigated . The deformation of the sample under simple shear mode is uniform, which is valuable for theoretical analysis. The rheometer can also be used for dynamic mechanical analysis. Figure 8c shows a parallel-plate rheometer (Physica MCR 301, Anton Paar Co., Austria) equipped with a MR accessory (MRD 180), which provides a controllable magnetic field when carrying out a rotating shear experiment (Figure 8d). The deformation of the sample under rotating shear mode is inhomogeneous (the shear strain increases linearly in the radial direction of disc-like sample; the shear strain at the center of the sample is zero). Although with different measurement principles, the measurement results obtained from these two kinds of devices show little difference if the amplitude of the actuating strain is small enough. Besides, the magneto-dependent creep and recovery [75, 76, 77] and stress relaxation behaviors of MR materials under shear loading are very helpful for investigating the magnetorheological mechanism and can be tested with the modified DMA and the rheometer as mentioned above.\nThe modulus variation of ferromagnetic filler-doped polymer composite can be reflected from the compressive and tensile properties of MR elastomer, which are also frequently used characterization parameters. Bellan and Bossis investigated the influences of magnetic field, particle concentration, and particle distribution on the tensile property of silicon rubber-based MR elastomer . The compressive properties of MR elastomer with different particle distributions (randomly dispersed isotropic and chain-like orientated anisotropic structures) and its magnetic field dependency were investigated by Varga et al., as shown in Figure 9. It is found that the compressive modulus of MR elastomer is not only affected by the particle distribution (i.e., the compressive modulus of anisotropic MR elastomer is larger than that of isotropic one under the same loading condition) but also by the magnetic field and loading direction. When the directions of magnetic field, particle chain, and compressive loading are parallel (i.e., the middle test condition in the second row of Figure 9), the largest compressive modulus and magneto-induced effect of MR elastomer were observed . In addition, the mechanical properties of MR elastomer under oscillatory squeezing mode were reported by Kallio et al. and Koo et al., respectively [81, 82], which provide valuable experimental data for the application of MR elastomer.\nIn recent years, many people pay attention to the rheological behaviors of MR fluid under tensile or squeezing loading, and the results suggest that the yield stress of MR fluids is significantly enhanced due to the squeeze-strengthen effect [83, 84, 85]. However, the tensile and squeezing behaviors of MR gel are rarely studied to date. Therefore, Xu et al. systematically investigated the squeeze flow behaviors (including quasi-static compressive and tensile behaviors and oscillatory squeeze behaviors) of MR gel . It was concluded that the squeeze flow curve of the solid-like MR gel can be classified into three different deformation regions: elastic deformation, stress relaxation, and plastic flow regions. Yield stresses under both tension and compression are sensitive to the particle distributions, the filler concentration, and the magnetic field. In addition, the magneto-sensitive properties of MR elastomer and MR gel under impact compression were also studied [11, 87]. The compressive modulus can still be strengthened by magnetic field even at high strain rate.\nMost magnetic fillers (such as carbonyl iron particles , nickel particles , and Fe3O4 particles covered by silver ) are conductive at the same time, so most MR materials also belong to conductive polymer composite. The conductivity of this kind of magneto-sensitive conductive polymer composite is adjusted through external magnetic field except for the particle distribution and particle concentration, presenting a typical magnetoresistance effect [91, 92, 93]. Impedance spectroscopy testing is a nondestructive method to quantitatively detect the evolution of the microstructure, which is suitable for analyzing the microstructure evolution mechanism and the interfacial feature of material. Figure 10 shows a typical experimental setup to test the magneto-sensitive impedance spectroscopy of conductive polymer composite. With this magneto-electrical coupling measurement system, the structure-dependent (Figure 11a) and the magneto-induced (Figure 11b and c) impedance spectroscopy are obtained, and the microstructure-dependent conduction mechanism (Figure 11d) can be further analyzed based on the related experimental results .\nBesides, the investigations on the antioxidation , durability , and thermal conductivity are helpful to the deep understanding on the magneto-induced mechanism of MR materials as well as some specific practical applications.\n3.2 Magnetorheological mechanism\nMagnetorheological effect essentially originates from the discrepancy of magnetic permeability between the continuous phase (the carrier matrix) and the dispersed phase (ferromagnetic fillers). Particular magnetization model (i.e., magnetic dipole model) is the most popular microstructural model to explain the magneto-induced effect of MR fluid . If we ignore the multi-body magnetic interaction between particles (i.e., only the magnetic interaction between adjacent particles in a single particle chain is considered) and the multidirectional magnetization in a single magnetic particle (i.e., simplify the micrometer sized ferromagnetic particles as magnetic dipole), the magnetic moment of spherical ferromagnetic particle within the linear magnetization range is:\nWhen it flows, the rheological properties of MR fluid are related to\nAs the most important rheological parameter of MR fluid, the magneto-induced yield stress can generally be explained from macroscopic and microscopic aspects. The macroscopic theoretical model is usually derived according to the minimum principle of energy. It assumes that the ferromagnetic fillers are spherical, cylindrical, or layered and are dispersed evenly in macroscopic theoretical model . These models based on the sub-microstructure only consider the anisotropy of particle aggregation under small strain while the microscopic models consider the interaction between magnetic particles . Most microscopic models ignore the interaction between the structured particle chains and believe that the magnetic interaction between adjacent particles is the main source of yield stress. Therefore, the yield stress of MR fluid can be well predicted when particle content is relatively low, but the assumption is untenable at high particle concentration, which makes a big deviation between theoretical and experimental results.\nFigure 12 demonstrates the schematic of classic single-chain magnetic dipole model. When the material deforms by shearing, an affine deformation happens on the particle chain accordingly, which means that the particle moves horizontally along the direction of arrows as shown in Figure 12a. For this affine deformation, the distance between adjacent particles is identical before and after deformation. This assumption simplifies the deduction of magneto-induced yield stress. The magneto-induced shear yield stress of MR fluid within the linear magnetization range can be obtained based on the affine deformation assumption:\nIn the saturated magnetization range, yield stress can be expressed as:\nThe details for the deduction process of magneto-induced yield stress and the explanation of relevant parameters can be found in the review article about the magnetorheological mechanism written by Bossis et al. .\nThe abovementioned single-chain magnetic dipole model was introduced directly into MR elastomer by Jolly et al. . They predicted the magneto-induced elastic modulus by this model, and the theoretical results fit well with the experiment. Davis also calculated the magneto-induced shear modulus by this model, and he found that the magneto-induced shear modulus reaches a maximum if the volume ratio of the ferromagnetic fillers is 27% . However, the influence of magnetized particle on the surrounding particles is not considered by the magnetic dipole model, and the bias of theoretical results from the fact is growing larger with the increasing particle concentration. Shen et al. realized this problem and modified the single-chain magnetic dipole model by considering all of the interaction of the particles within a single chain, which is more in line with the real situation . A finite-column model based on the experimental results was proposed by Chen et al. . However, this model can only predict the magneto-induced modulus of MR elastomer with low particle concentration.\nThe abovementioned models concentrate on the magnetic interactions between particles, but different from the MR fluid, a strong constraint effect exists between rubber matrix and magnetic particles for MR elastomer. This constraint will influence the magnetic interactions between particles to some extent. Therefore, the theoretical model of MR elastomer considering the coupling effect between rubber matrix and particles is more reasonable. Chen and Jerrams developed a more general magneto-mechanical coupling model of MR elastomer, which includes the magneto-induced mechanical property of particles, the interfacial slipping effect between ferromagnetic particles and rubber matrix, and the viscoelastic properties of rubber matrix . This model could predict the dynamic mechanical properties of MR elastomer with different particle content or different kinds of rubber matrix, revealing the response mechanism of material to external magnetic field. It is a tendency in recent years that constructing the magneto-mechanical coupling model of MR elastomer bases on the theory of continuum medium mechanics , more details about the research progress on the theoretical modeling of MR elastomer can be found in the recent review article . Although the numerical results can be obtained after complex mathematical derivation, these theoretical models can deeply reveal the complicated magneto-mechanism coupling mechanism of MR elastomer, which has guiding significance for the optimal design and the practical application of this smart material.\nA lot of work has been done on the magnetorheological mechanism of MR fluid and MR elastomer, yet there are little reports on the magnetorheological mechanism of MR gel. On the one hand, MR gel (especially for the solid-like MR gel) has not attracted wide attentions as a new MR material, and the research on it is not enough. On the other hand, the investigation on the magnetorheological mechanism of MR gel is more difficult than those of MR fluid or MR elastomer due to its intrinsic complex MR characteristics. MR gel possesses both the characteristics of mobility of magnetic particles in MR fluid and the stability of oriented microstructure in MR elastomer. These two features are “contradictory” to some extent, but they indeed exist in solid-like MR gel at the same time. Although the magnetic particles are moveable in the carrier matrix of MR gel, the clustering phenomena of particles in MR gel cannot be interpreted by the theory used in MR fluid because the viscous resistance of polymer matrix is far larger than the resistance from the carrier fluid in MR fluid. It is mean that the Mason number of MR gel is far larger than that of MR fluid, the assumption in fluid is invalid in MR gel. In the meantime, the viscous resistance of polymer matrix to the particle is much less than the constraining force of the rubber matrix to the particle in MR elastomer. After applying a magnetic field, the “solidified” ferromagnetic fillers in MR elastomer can only move slightly from the original position, while the ferromagnetic fillers in MR gel can greatly move under a strong magnetic field and a large applied loading; if the direction of magnetic field is changed, the ferromagnetic fillers can even rearrange to generate chain-like or column-like structure along the new direction of magnetic field. These interesting characteristics that reflect the complexity of MR gel, the rheological behavior of polymer matrix, the magnetic interaction between adjacent fillers, and the interfacial problem due to the relative movement of particle and matrix have to be considered when studying the magnetorheological mechanism of MR gel. In addition, the “huge” change of microstructure after the rearrangement of particles will also make the modeling of the magneto-mechanical coupling behavior of MR gel more difficult.\nIt is not easy to fully describe the complicated magneto-mechanical coupling behaviors of MR gels. A field theory was developed by Han et al. to describe the magneto-sensitive viscoelasticity of ferrogel based on the principles of non-equilibrium thermodynamics . The responses of ferrogel to different magnetic fields were analyzed by numerical calculation, and the theoretical results consistent with the experimental results under the cyclic magnetic field, which indicates that this theory is reasonable to some extent for the realization to magneto-mechanical coupling mechanism of MR gel. Zubarev evaluated the free energy of ferrogel after tension or compression along with the magnetic field direction by standard methods of statistical physics . The analysis demonstrates that the magnetic field strength, the initial shape of the sample, as well as the particle concentration and the magnetic properties of particles determine the type of magneto-induced deformation (i.e., extension or shrunken). A particle-level molecular dynamics model was employed by Liu et al. to investigate the particle evolution in MR gel under a stable uniform magnetic field . A modified magnetic dipole model is introduced to describe the magnetic interaction between adjacent particles, and this model presents higher precision than classic magnetic dipole model when processing the magnetic interaction of particles close to each other. The rheological behavior of the carrier matrix is described by the Bingham plastic model (Eq. (1)). Some complicated loading methods of magnetic field (such as the rotating magnetic field, as shown in Figure 13), which are difficult to be achieved by experiment, can be easily applied through simulation. With this, the 3D evolution of particular microstructure under complicated magnetic field loading conditions can be obtained, which is very important to understand the microstructure evolution mechanism of MR gel. The microstructure obtained by the particle-level molecular dynamics model matches well with the results by experimental observation under the same loading condition. However, the coupling effect between ferromagnetic fillers and carrier matrix is not considered in this model, and the Bingham plastic model is also too simple to describe the complicated rheological behavior of the carrier matrix; so, the governing equations which describe the physical behaviors of different components within the MR gel need to be further developed.\n4. Conclusions and prospects\nAs a smart material whose physical properties can be easily controlled, magneto-sensitive composite (i.e., MR material) attracts more and more attentions in recent years. Many works concentrating on the magnetorheological mechanism and application have been reported. Various MR materials aiming at different practical applications were developed, which shows great application potential.\nHowever, the inherent defects existed in conventional MR materials (e.g., the particle sedimentation in MR fluid, the microstructure control of MR elastomer, the bearing capacity of MR gel as structure unit) preclude their wide application. To this end, from the perspective of material preparation, on the one hand, we need to further improve the conventional MR material aiming at the inherent defects; on the other hand, the novel magneto-sensitive material system which meets the requirements of engineering applications should be developed, which means that we could develop multifunctional smart composite that has the magneto-controllable feature (e.g., magneto-sensitive impact-resistant composite, magneto-sensitive conductive composite, magneto-sensitive heat-conducting composite, and so on). From the perspective of mechanism, magneto-sensitive soft material refers to magneto-electro-thermo-mechanical coupling behavior, and it is difficult to describe the response to external stimuli. The difficulties can be summarized as follows: the description of the exact distribution state of dispersed phase before and after exposed under a magnetic field; the description of the discrepancy of size and shape of the dispersed ferromagnetic fillers; the interaction model between the dispersed phase and the continuous phase; the construction of constitutive model of the polymer matrix in the MR elastomer or solid-like MR gel; and the unification of multiscale model from microscale to macroscale. Considering the complexity of true situation, some necessary simplifications have to be made aiming at specific problem; then, the simplified model which could generally reflects the specific mechanism can be developed after ignoring the secondary factors. The numerical simulation is another effective method to investigate the microstructure evolution mechanism of MR material. It is an important research direction to construct the constitutive model of MR material, which could accurately describe the complicated coupling responses to different stimuli (magnetic field, temperature, strain rate, and so on). It is believed that the engineering applications of magneto-sensitive multifunctional material will be more widely concerned with the further realization on the magnetorheological mechanism and the enhancement of the performance of the material.\nThe research reported in this publication was supported by National Natural Science Foundation of China (Grant nos. 11502256, 11502255, 11602242), and the key project “Computational Solid Mechanics” of the China Academy of Engineering Physics. The authors gratefully acknowledge Professor Xinglong Gong and Professor Shouhu Xuan at University of Science and Technology of China for their help on beneficial discussion.", "label": "Yes"} {"text": "Updating the Quattro Logger USB-Chip\nProblem and Solution\nThe problem: The 64-bit versions of Vista and Windows now require \"signed drivers\" for USB ports. These versions of Windows will not accept the uncertified drivers supplied by DGSI. To address this problem, we have decided to use the solution provided by FTDI, the USB chip manufacturer.\nSolution for new loggers: All new loggers will use USB chips with an FTDI \"ID.\" We will also distribute FTDI drivers with our Logger Manager program. Of course, this does not solve the problem with older loggers.\nSolution for older loggers: We have a two-part solution for older loggers. Part 1 is to update the ID on the USB chip. Part 2 is to install the latest version of the Logger Manager program.\nPart 1: Updating the USB Chip\n- Use a PC with 32-bit Windows for this update. 64-bit Windows will not work.\n- Download “usb-update.zip”.\n- Unzip the file. Open the folder and double-click the file “usb-update.bat” to start the update.\n- The 32-bit USB drivers will be preinstalled. You may be notified that the drivers are unsigned. Click Continue.\n- Unplug USB devices connected to your PC. Your USB mouse can be left connected.\n- Then connect the Quattro Logger to a USB port on your PC. The “Found New Hardware” wizard will start. You may be notified that the drivers are unsigned. Click Continue.\n- The wizard completes the installation of the drivers. Click Finish.\n- Now, press any key. This starts a program called MProg.\n- Choose a Device. Then choose Scan. The status window at the bottom should show “Number of Programmed Devices= 1”. That device is the Quattro Logger. If the number of devices is greater than one, there is some other device still connected. Disconnect that device and run the Scan command again.\n- Choose File. Then Choose Open. Select VWQuattro_FTDI_Pgm_B.ept” and click Open.\n- Choose a Device. Then choose Program. This will program the USB chip. The status window at the bottom should show “Programmed Serial Number SI00BE41”.\n- The USB chip has been updated. If you have another Quattro Logger, connect it to perform the same update. Otherwise, choose File - Exit.", "label": "Yes"} {"text": "INSPEC provides access to the published literature in physics, electrical/electronic engineering, computing, control engineering and information technology. Its print counterparts are : Physics Abstracts, Electrical and Electronics Abstracts, Computer and Control Abstracts. The database is designed to assist engineers, scientists and others to:\n- locate relevant journal articles, conference papers and other documents in response to specific queries\n- maintain a continuing awareness of the latest published information in any particular field (within the above disciplines)\nThe database covers the time span 1898 to present. An alternative source, available online, is PROLA covering the complete set of articles published in Physical Review (1893- ). In general, the database offers the customer bibliographic records with abstracts and full details of the source document which can be located by using the CERN Library catalogue or obtained via our interlibrary loan service.", "label": "Yes"} {"text": "Tutorial on How Mobile Phone Jammer Works\nSpot jamming is concentrated power routed toward one channel or frequency. Barrage jamming is power spread over several regularities or networks at the same time.\na. Obvious obstructing. This is generally very basic to discover. The even more typically used jamming signals of this kind are explained listed below. Do not try to memorize them; simply understand that these and others exist. When experiencing a jamming occurrence, https://needed.ca/an-introduction-to-jammers-and-jamming-techniques-2/ it is more crucial to identify and get over the event than to identify it formally.\nMobile phone jammer\nStepped tones are generally made use of against single-channel AM or FM voice circuits. (3) Spark. The spark signal is conveniently produced and is among one of the most reliable for jamming. Ruptureds are of brief period as well as high intensity. They are duplicated at a fast rate. This signal is effective in interrupting all types of radio communications.\nFor instance, if we have an AN/PRC -77 in the SQUELCH setting and https://resportour.com/Groups/tutorial-on-how-mobile-phone-jammer-works also an AN/VRC -12 collection radio in the NEW SQUELCH ON setting and also they receive a jamming signal without the 150-hertz tone, the receivers of these radios will not be triggered by any type of signal as long as the jamming signal is more powerful than any type of various other signal being received.\nThe key Elements of communication jamming. How can .\nThreat jammers may use noticeable or fizkult.site refined jamming methods. Likewise, interference might be triggered by resources having absolutely nothing to do with adversary jamming. Interference might be brought on by the following: Unintentionally by various other radios (friendly and opponent). Various other electronic or electric/electromechanical equipment. Breakdown of the radio. A combination of any one of the above.\nThe two sources of disturbance are inner and also exterior. If the disturbance or thought jamming can be eliminated or substantially decreased by basing the radio equipment or detaching the receiver antenna, Www.Vetrina-Eventi.Com the source of the disruption is probably outside to the radio. If the interference or suspected jamming continues to be after basing or detaching the antenna, the disturbance is more than likely interior as well as is triggered by a malfunction of the radio.\nWhat is WiFi Jammer and Why You Might Need One\nRelocating the receiving antenna for short ranges might trigger noticeable variations in the strength of the conflicting signal. Alternatively, little or no variation normally indicates adversary jamming.\nb. In all situations, https://resportour.com/groups/tutorial-on-how-mobile-phone-jammer-works believed opponent jamming and any type of unidentified or Https://Resportour.com/groups/tutorial-on-how-mobile-phone-jammer-works unintended disturbance that disrupts our capability to connect have to be reported. This uses also if the radio driver has the ability to conquer the results of the jamming or disturbance. The style for reporting this details is the MIJI record.\nWhat are GPS jammers and how do you combat them?\n(c) An above normal level of noise or a certainly regulated signal might indicate that the radio is being obstructed by a noise-modulated jamming signal. The operator must momentarily separate the antenna. If normal fixed sound returns when the antenna is detached, the radio probably is being obstructed by a noise-modulated signal.\nThe operator ought to temporarily separate the antenna. If normal fixed sound returns, as well as the telephone call light goes off when the antenna is detached, https://needed.ca/4768-2/ there is a high probability that the radio is being obstructed by a noise-modulated signal. (d) If the above tests suggest that there is a high probability that the radio is being obstructed, the driver should comply with the regional SOP to improve interactions and also start a MIJI record educating higher head office of the case.\nThe Proliferation of Wireless Signal Jammers\nTraining and also experience are the most important tools operators have to identify when a particular signal is a jamming signal. The capability to acknowledge jamming is important, because jamming is an issue that requires action.\nStop for a minute as well as consider what the adversary is doing during his common jamming procedure. Typically, adversary jamming includes a duration of jamming complied with by a brief listening period.\nJamming Definition & Meaning\nWhat we are doing throughout this short time period when he is paying attention will tell him just how efficient his jamming has been. If the operation is continuing in a normal manner, as it was prior to the jamming began, the opponent will think that his jamming has not been specifically efficient.\nDue to the fact that the opponent jammer is checking our procedure this means, http://www.kominpub.cz/ we have a simple yet very important rule that uses when we are experiencing jamming. Unless or else bought, never ever closed down operations or Https://Resportour.Com/Groups/Tutorial-On-How-Mobile-Phone-Jammer-Works in otherwise reveal to the enemy that you are being detrimentally affected. This indicates normal procedures ought to proceed also when broken down by obstructing.\nJammer — Definition, Meaning & Synonyms\nBoost the signal-to-jamming ratio. The signal-to-jamming proportion is the family member toughness of the wanted signal to the jamming signal at the receiver. Signal refers to the signal we are trying to obtain. Obstructing refers to the hostile or unknown disturbance being obtained. It is constantly best to have a signal-to-jamming ratio in which the desired signal is stronger than the jamming signal.\nThe most noticeable means to boost the signal-to-jamming proportion is to raise the power result of the transmitter discharging the preferred signal. In order to raise the power result at the time of jamming, the transmitter has to be established on something much less than complete power when jamming starts.\nGPS Jammers Illegal, Dangerous, and Very Easy to Buy\nSpecific approaches that put on a certain radio set remain in the appropriate driver’s handbook. Depending on the antenna being utilized, a few of these methods are— Adjustment the antenna polarization. (Should be done by all stations.) Mount an antenna with a longer range. (4) Develop a retransmission terminal. A retransmission terminal can raise the range and power of a signal between two or even more radio terminals.\nWhat jamming of a wireless security system is\nOften, the signal-to-jamming proportion may be enhanced by relocating the antenna and linked radio collection influenced by the jamming or unidentified disturbance. It is best to transfer the antenna as well as linked radio set so that there is a surface function in between them as well as any kind of thought adversary obstructing location.\nRadio frequency signal jammers\nMake use of an alternate course for communications. In some instances, adversary jamming will certainly prevent us from connecting with a radio station with which we need to interact. If radio interactions have been broken down between two radio stations that need to communicate, there might be another radio terminal or route of communications that can connect with both of the radio terminals.\nd. Modification frequencies. If an interactions web can not conquer opponent jamming making use of the above actions, https://fastcuci88.com the commander (or assigned agent) may route the net to be changed to an alternate or spare regularity. If functional, dummy terminals can continue to operate the regularity being jammed to mask the modification to an alternative regularity.", "label": "Yes"} {"text": "Due to the increasing pollution being generated from diesel and petrol-based transportation modes, several companies and governments have come forward with the idea of developing and using human hybrid electric vehicles. A human hybrid electric vehicle is a system that makes use of human power in an electric vehicle.\nHuman muscle power is reliable, almost free, and healthy to use. It helps in carrying out the daily activities with ease and comfort. Moreover, the potential of human power increases as the human population grows.\nThe advent of modern civilisation supported by the use of different machines and means of transportation has made mankind to stay away from using human muscle power.\nTransportation is a non-separable part of any society, and it exhibits a very close relation to the style of life, range and location of activities, and goods and services that are available for consumption.\nThe growth in the transportation sector has made it possible to change the ways of living and how societies are organised and therefore have a great influence on the development of civilisations. Modern civilisation is totally dependent on different modes of transportation for not only travelling to different places but also for trading economic resources like raw materials, fuels, food, and manufactured goods from their place of origin to place of use.\nThe use of a bicycle, which is currently the only human-friendly, cost-effective, and pollution-free mode of transportation, has reduced just to an exercise device or for leisure trips. Transportation is a major source of air pollution as cars, trucks, and buses powered by fossil fuels are major contributors to air pollution. According to pollution studies, it is said that the transportation sector contributes to more than half of nitrogen oxides into the air and is a major source of global warming emissions.\nFurther, studies have also linked pollutants from vehicle exhaust to have adverse impacts on nearly every organ in the body. With the so-called progress of civilisation or modernisation, not only various types of transportation vehicles like automobiles (motorcycles, scooters, and cars), buses, trains, trucks, helicopters, watercraft, spacecraft, and aircraft have flooded the market, but also their general and personal purchase and use have reached a stage where they have become the biggest sources of unwanted environmental pollution.\nFeeling concerned with degrading environmental conditions due to the pollution being generated from diesel and petrol-based transportation modes, several companies and governments have come forward with the idea of developing and using electric vehicles (EVs).\nThis shift was also possible due to reduced terminations, reconnections and arrearages, more stable electric energy prices, a more resilient and reliable electric energy system, lower transmission and distribution costs, and utility insurance savings.\nThere are a number of benefits of using EVs over conventional petrol/diesel vehicles like these are cheaper to run and maintain, better for the environment, use eco-friendly materials, and many more. The growing need for energy and degrading environmental considerations in the last few years have given direction to new paradigms of mobility and transportation with an increased interest in light electric vehicles (LEVs). In this context, electrically power-assisted cycles (EPACs) have received great attention. Several efforts have been made in order to improve their performance in terms of autonomy, weight, aesthetics, and feeling with the driver.\nTechnological developments taking place over the last few decades towards designing and developing efficient, long-lasting, and cost-effective batteries have also strengthened the move towards the emergence of EVs in the market. At present, only two-wheelers like scooters and motorcycles have been successful as electric vehicles, but it is expected that in the coming times, we will have fully electric buses, trucks, trains, and airplanes as well.\nWith the advanced batteries having more charge capacity, long life, and light weight, this will be possible. Over the last two decades, lithium-ion battery technology has worked its way to the forefront of the automotive market. But EV battery technology continually pushes the boundaries of lithium-ion batteries’ ability to provide ample power, longevity, and safety.\nFully battery-powered electric vehicles (BEV) rely exclusively on electric power to drive, while plug-in hybrid electric vehicles (PHEVs) and full hybrid electric vehicles (FHEV) work in tandem with ICEs to generate and provide power. All these vehicle types require different levels of battery complexity and size. Different EV vehicles demand different battery capacities.\nWhile designing EV battery systems, engineers also consider charging speed, charge cycle ability, degradation, chemistry, and safety. Energy and power density thresholds have been realised in most EV applications, yet vehicle manufacturers are constantly tweaking module and cell sizes for optimum performance levels. Regardless of the lithium-ion battery cell and module sizes, the high-voltage battery systems that power EVs require meticulously designed battery management systems (BMS) to ensure maximum power and safety.\nHuman hybrid electric\nHuman-powered transport means to make use of human muscle power for the transport of person(s) and/or goods. This was the only system of transportation before the invention of the steam engine by James Watt, which then contributed substantially to the industrial revolution. With time, motorisation has increased speed and load capacity, but still human-powered transport in many of its forms remains popular due to several reasons such as cost and convenience.\nWhile showering praise on EVs, we ignored the effects of ever-increasing pollution that is being produced during the generation of electric energy, an essential requirement to charge batteries of EVs as well as in the manufacturing of batteries. In order to minimise this impact, engineers are thinking to imbibe human power in electric vehicles by developing human hybrid electric vehicles.\nA human hybrid electric vehicle is a system that makes use of human power in an electric vehicle called a hybrid human-powered vehicle, whose drivetrain consists of a person, an electric motor/generator, and one or more electricity storage device(s). Many developments have already taken place towards the development of human hybrid electric vehicles, and time is not far when we will have such transport vehicles all around us.\n1. TWIKE (a Tesla company project) is the world’s oldest only human electric hybrid car. This car was developed and produced initially in Switzerland, but then production moved to Germany after the initial investors became insolvent in 2002, and a group of German importers joined together to purchase the equipment and continue with TWIKE production under the company named FINE Mobile.\nTWIKE is an ambitious concept today as it was back when it first became a rare oddity in the world of transportation. Presently, instead of a standard steering wheel, navigation of the car is done through a joystick. Under the driver’s feet is the direct drive pedal power system, which transfers human power input straight to the drivetrain. The system also captures energy from regenerative braking. At higher speeds, the vehicle is powered mostly by onboard lithium-ion batteries. The top speed reported to be achieved with the car at present is around 89 to 104 kilometres per hour.\nSimilar projects are continuously being reported by various companies. For instance, a Minnesota-based company has built a three-wheeled hybrid electric vehicle weighing about 317kg that gets 121km per charge, and the vehicle is street legal and considered a motorcycle. Its carbon fibre chassis looks like a kayak and is reinforced with structural foam, similar to an airplane. The vehicle uses a regenerative brake system, which feeds the electricity back into the batteries when the brakes are applied. It also has a solar panel mounted on the roof.\n2. An electric motorbike with pedals, eRockit (developed and produced in Hennigsdorf in Brandenburg, Berlin), is described as a ‘human hybrid’ as it’s powered by a combination of human and electric drives. The eRockit puts the rider back into the centre of mobility of moving, depending on the rider’s wish. Further, the use of a smart pedal concept gives the rider an opportunity to act with a human hybrid bike more conveniently and comfortably.\nThe bike’s clutch-free and intuitive pedal power system makes eRockit safe to drive. It is an emission-free ride with a hundred per cent emotion.\nThe bike can reach a speed of close to 55.9mph, and its battery range is over 120 kilometres. With this new technology of human hybrid electric vehicle, a person can travel between 5km and 45km every day together with fun riding. About thirty prototypes have already been tested for more than 100,000 kilometres in total, and the market version will be available soon.\nIn a world that is wholly dependent on transportation on one hand and fossil fuels on the other, harvesting human kinetic energy along with the future of efficient, light, cost-effective electric vehicles will provide an era of environment-friendly and healthy transportation mode—human hybrid electric vehicles. By using a pedal-assisted drivetrain system, we will be able to reduce the consumption rate of battery power by the motor, which will increase the battery life.\nThe reason why many people are inclined towards conventional vehicles is that they can reach places without having to do more than pressing on the gas pedal. In short, developing people-friendly human hybrid electric vehicles will definitely prove to be an attractive mode of transportation in the future.\nDr S.S. Verma is professor at Department of Physics, Sant Longowal Institute of Engineering and Technology, Sangrur, Punjab", "label": "Yes"} {"text": "Washington, May 25 (ANI): The next generation of Mars rovers could have smaller, cheaper, more robust and more sensitive life-detecting instruments-all thanks to a new invention by scientists at the U.S. Department of Energy's Idaho National Laboratory.\nThe INL team has come up with an efficient new way to generate complex electric fields, which will make it easier to direct ions, or charged particles, along specified paths.\nThe researchers have now filed a patent application for their Total Ion Control method, a key advance in the field of mass spectrometry.\nEquipment based on TIC could make the Mars Organic Molecule Analyzer (MOMA) - part of the ExoMars mission scheduled for launch in 2018 - a better life-detecting tool.\n\"This is a novel way to shape electric fields for moving ions around. It can improve MOMA, and it could improve commercial instruments,\" said INL engineer Tim McJunkin, who helped develop the new technology. \"\nMass spectrometry allows scientists to determine a sample's chemical composition.\nIn some mass spectrometers, a sample - for instance, a few grains of Martian soil - is vaporized, often with a laser. The gas is then ionized, and the charged particles flow through an inlet, down a channel and into an ion trap.\nThe ions are then identified based on details of their movement, which depend on their mass and electrical charge.\nTo get ions to stream into the trap - rather than hit the channel walls and \"die\" - most current mass spectrometers rely heavily on airflow created by pumps.\nHowever, this system is less than ideal for Mars missions; pumps are heavy, and they use a lot of energy.\nTIC could assist spectrometers such as MOMA.\nNew TIC-based ion inlets greatly reduce the need for pumps, getting good ion flow solely by generating versatile, intricate electric fields.\nSince ions are charged particles, properly constructed fields can guide ions safely to the trap all by themselves.\nA few other ion inlet technologies attempt to do the same thing, but INL's invention boasts many advantages.\nFirstly, TIC-based inlets should be cheaper and more robust than their competitors, because they're simpler to construct and have fewer parts.\nThey use only a single electrode, and they don't need any insulators.\nThey can be made from many different semi-conducting materials, such as graphite, glass, silicon or polymers.\nAnd the fields TIC inlets can generate are not tied to their own shape, meaning they can be incorporated into a wider range of spectrometer designs.\nBecause of their simple construction, TIC-based inlets are also much smaller and lighter than other types, weighing less than an ounce.\nThis minuscule mass is a big plus for space missions, since it currently costs about 10,000 dollars to put one pound of payload into Earth orbit (and far more to get that payload to Mars).\nINL's new invention can also be helpful in missions like ExoMars, which is only powered by solar energy.\nIt requires just 100 milliwatts of power - one thousand times less than a 100-watt light bulb.\nAnd on top of these advantages, TIC delivers outstanding performance. (ANI)", "label": "Yes"} {"text": "Prof. Dr Umar Saif\nUmar Saif received his academic training from LUMS, Cambridge and MIT. He received his PhD degree from University of Cambridge (2001) and Post doctorate from MIT (2002), in Computer Science. Dr Saif worked and taught at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) for four years, where he was part of the core team which developed system technologies for project Oxygen- a US$40 million project sponsored by the US Department of Defense and an industrial Alliance of world-class companies.\nDr Saif's research interests broadly span areas of Ubiquitous Computing, Operating Systems, Distributed Systems, Mobile Systems, Highspeed Routing Architectures and the impact of IT in developing world countries. Dr Saif has authored several technical publications and is a Fellow of the Cambridge Commonwealth Trust. He was the first Pakistani to receive a PhD in Computer Science from University of Cambridge. During his doctorate studies, he was a Trinity College Overseas Scholar and Commonwealth Scholar at University of Cambridge. He has been nominated for the MIT Technovator award and the TR100 award. He has served on the technical advisory board of several technology companies and is a regular speaker at technology forums, especially relating to the impact of IT in developing-world countries.\nDisclaimer: This biography was up-to-date at the time of the speaker's last participation.", "label": "Yes"} {"text": "A multiscale method to analyze the deterioration due to alkali silica reaction considering the effects of temperature and relative humidity\nComputational Methods for Coupled Problems in Science and Engineering V - A Conference Celebrating the 60th Birthday of Eugenio Onate, COUPLED PROBLEMS 2013\nInternational Center for Numerical Methods in Engineering\n1094 - 1100\nItem Usage Stats\nThis work presents a three-dimensional multiscale framework to investigate the deterioration resulting from alkali silica reaction (ASR) in the concrete. In this contribution, 3D micro-CT scan of hardened cement paste (HCP) and aggregates with a random distribution embedded in a homogenized cement paste matrix represent the microscale and mesoscale of the concrete respectively. A 3D hydro-chemo-thermo-mechanical model based on staggered method is developed at the mesoscale of the concrete, yet taking into account the deterioration at the microscale due to ASR.\nKeywordsAlkali silica reaction\nEffects of temperature\nHardened cement paste\n- Work in Progress 372\nShowing items related by title, author, creator and subject.\nWu, T.; Temizer, I.; Wriggers, P. (2013)Computational thermal homogenization is applied to the microscale and mesoscale of concrete sequentially. Microscale homogenization is based on a 3D micro-CT scan of hardened cement paste (HCP). Mesoscale homogenization ...\nA novel broadband multilevel fast multipole algorithm with incomplete-leaf tree structures for multiscale electromagnetic problems Takrimi, M.; Ergül, Ö.; Ertürk, V. B. (Institute of Electrical and Electronics Engineers Inc., 2016)An efficient and versatile broadband multilevel fast multipole algorithm (MLFMA), which is capable of handling large multiscale electromagnetic problems with a wide dynamic range of mesh sizes, is presented. By invoking a ...\nWu, T.; Temizer, I.; Wriggers, P. (Elsevier, 2014)Alkali-Silica Reaction (ASR) is a complex chemical process that affects concrete structures and so far various mechanisms to account for the reaction at the material level have already been proposed. The present work adopts ...", "label": "Yes"} {"text": "|Publication number||US7878824 B2|\n|Application number||US 12/394,987|\n|Publication date||Feb 1, 2011|\n|Filing date||Feb 27, 2009|\n|Priority date||Feb 27, 2009|\n|Also published as||US20100221950|\n|Publication number||12394987, 394987, US 7878824 B2, US 7878824B2, US-B2-7878824, US7878824 B2, US7878824B2|\n|Inventors||Paul John Pepe, Sheldon Easton Muir|\n|Original Assignee||Tyco Electronics Corporation|\n|Export Citation||BiBTeX, EndNote, RefMan|\n|Patent Citations (64), Non-Patent Citations (3), Referenced by (7), Classifications (15), Legal Events (6)|\n|External Links: USPTO, USPTO Assignment, Espacenet|\nThis application is related to copending U.S. patent application titled “CASSETTE FOR A CABLE INTERCONNECT SYSTEM”, having Ser. No. 12/394,816 and filed Feb. 27, 2009, the subject matter of which is herein incorporated by reference in its entirety.\nThe subject matter herein relates generally to cable interconnect systems, and more particularly, to cassettes that have shielded plug cavities.\nKnown connector assemblies exist having multiple receptacles in a common housing, which provide a compact arrangement of such receptacles. Such a connector assembly is useful to provide multiple connection ports. Accordingly, such a connector assembly is referred to as a multiple port connector assembly. The receptacles may be in the form of RJ-45 type modular jacks that establish mating connections, with corresponding RJ-45 modular plugs. The receptacles, each have electrical terminals arranged in a terminal array, and have plug receiving cavities.\nOne application for such connector assemblies is in the field of computer networks, where desktops or other equipment are interconnected to servers or other network components by way of sophisticated, cabling. Such networks have a variety of data transmission mediums including coaxial cable, fiber optic cable and telephone cable. One such network topography is known as the Ethernet network, which is subject to various electrical standards, such as IEEE 802.3 and others. Such networks have the requirement to provide a high number of distributed connections, yet optimally requires little space in which to accommodate the connections. Another application for such connector assemblies is in the field of telephony, wherein the connection ports allow connection with a telephone switching network of a telephone service provider, such as a regional telephone company or national telephone company.\nOne type of connector assembly is the connector assemblies, the housing has receptacle connectors one above the other, forming a plurality of arrays in stacked arrangement, so-called “stacked jack” arrangements. One example of a stacked jack type of connector assembly is disclosed in U.S. Pat. No. 6,655,988, assigned to Tyco Electronics Corporation, which discloses an insulative housing having two rows of receptacles that is; plug cavities. The receptacles are arranged side-by-side in an upper row and side-by-side in a lower row in a common housing, which advantageously doubles the number of receptacles without having to increase the length of the housing. The insulative housing includes an outer shield that surrounds the unit. Stacked jacks have the advantage of coupling a plurality of receptacles within a network component in a compact arrangement. However, typical stacked jacks only provide the outer shield to electrically isolate the connector assembly from other components within the system, such as adjacent connector assemblies. Shielding is not provided between each of the receptacles. As connector assemblies are driven towards higher performance, the shielding provided with known connector assemblies is proving ineffective.\nAnother type of connector assembly includes a plurality of individual modular jacks that are mounted within a housing to form an interface connector. Each modular jack includes a jack housing defining a plug cavity and a plurality of contacts within the plug cavity. The interface connector, including a number of the modular jacks, may be mounted to a corresponding network component. At least some known connector assemblies of this type utilize shielded modular jacks, wherein each modular jack is separately shielded and installed in the housing. While interface connectors have the advantage of coupling a plurality of modular jacks within a network component in a single arrangement, incorporating individual modular jacks have the problem of limited density. The density problem arises from each modular jack having a separate jack housing, which may be bulky. The density problem is exaggerated when shielded modular jacks are used as the shielded modular jacks are even larger than non-shielded modular jacks.\nAt least one of the problems with known connector assemblies is that current networks are requiring a higher density of connections. Additionally to meet performance requirements, shielding is required between adjacent plug cavities that are in close proximity. Some connector assemblies that are shielded are known to be bulky, which reduces the density per linear inch.\nIn one embodiment, a cassette is provided that includes a housing having a plurality of plug cavities that are separated from adjacent plug cavities by shield elements. The cassette also includes a contact subassembly having a circuit board and a plurality of contacts arranged in contact sets coupled to the circuit board. The contact sets are configured to mate with different plugs. The contact subassembly is loaded into the housing such that the contact sets are received in different plug cavities, wherein the contact sets are separated from adjacent contact sets by the shield elements.\nOptionally, the housing may include metal walls between the plug cavities, where the metal walls define the shield elements. The housing may be diecast and include a plurality of walls that form the plug cavities and define the shield elements. The housing may be metallized to define the shield elements between the plug cavities. Optionally, the shield elements may be arranged along the surfaces defining the plug cavities, and the shield elements may be configured to engage the plugs when the plugs are loaded into the plug cavities.\nIn another embodiment, a cassette is provided including a housing having a plurality of plug cavities arranged in a stacked configuration in a first row and a second row. The plug cavities are defined by interior walls separating adjacent plug cavities, and the plug cavities are separated from adjacent plug cavities by shield elements being at least one of defined by, provided on and provided in the interior walls separating the plug cavities. The cassette also includes a contact subassembly having a circuit board and a plurality of contacts arranged in contact sets coupled to the circuit board. The contact sets are configured to mate with different plugs, and the contact subassembly is loaded into the rear chamber such that the contact sets are received in different plug cavities. The contact sets are separated from adjacent contact sets by the shield elements.\nIn a further embodiment, a cassette is provided that includes a housing having a front and a rear. The housing is configured to be received within an opening of a grounded panel. The housing has a plurality of plug cavities being open at the front for receiving plugs therein. The plug cavities are separated from adjacent plug cavities by shield elements. A bond bar is coupled to the housing and is configured to be electrically connected to the grounded panel to define a ground path between the panel and the shield elements. The cassette also includes a contact subassembly received in the housing and having a circuit board and a plurality of contacts arranged in contact sets received in different plug cavities. The contact sets are separated from adjacent contact sets by the grounded shield elements.\nThe cable interconnect system 10 is utilized to interconnect various equipment, components and/or devices to one another.\nThe cassette 20 includes a shell 28 defining an outer perimeter of the cassette 20. In an exemplary embodiment, the shell 28 is a two piece design having a housing 30 and a cover 32 that may be coupled to the housing 30. The housing 30 and the cover 32 may have similar dimensions (e.g. height and width) to nest with one another to define a smooth outer surface. The housing 30 and the cover 32 may also have similar lengths, such that the housing 30 and the cover 32 mate approximately in the middle of the shell 28. Alternatively, the housing 30 may define substantially all of the shell 28 and the cover 32 may be substantially flat and be coupled to an end of the housing 30. Other alternative embodiments may not include the cover 32.\nThe housing 30 includes a front 34 and a rear 36. The cover 32 includes a front 38 and a rear 40. The front 34 of the housing 30 defines a front of the cassette 20 and the rear 40 of the cover 32 defines a rear of the cassette 20. In an exemplary embodiment, the cover 32 is coupled to the housing 30 such that the rear 36 of the housing 30 abuts against the front 38 of the cover 32.\nThe housing 30 includes a plurality of plug cavities 42 open at the front 34 of the housing 30 for receiving the modular plugs 14 (shown in\nThe cassette 20 includes latch members 48 on one or more sides of the cassette 20 for securing the cassette 20 to the panel 12. The latch members 48 may be held close to the sides of the cassette 20 to maintain a smaller form factor. Alternative mounting means may be utilized in alternative embodiments. The latch members 48 may be separately provided from the housing 30 and/or the cover 32. Alternatively, the latch members 48 may be integrally formed with the housing 30 and/or the cover 32.\nDuring assembly, the cassettes 20 are loaded into the openings 22 of the panel 12 from the front of the panel 12, such as in the loading direction illustrated in\nAs will be described in further detail below, the rear mating connectors 70 are high density connectors, that is, each rear mating connector 70 is electrically connected to more than one of the receptacles 16 (shown in\nThe cassette 20 includes an interface connector assembly 120 that includes the rear mating connectors 70. The interface connector assembly 120 is configured to be mated with the electrical connector 106. In an exemplary embodiment, the interface connector assembly 120 includes a circuit board 122. The rear mating connectors 70 are mounted to a side surface 124 of the circuit board 122. In an exemplary embodiment, the circuit board 122 includes a plurality of edge contacts 126 along an edge 128 of the circuit board 122. The edge contacts 126 may be mated with the contacts 110 of the contact subassembly 100 by plugging the edge 128 of the circuit board 122 into the opening 108 of the electrical connector 106. The edge contacts 126 are electrically connected to the rear mating connectors 70 via the circuit board 122. For example, traces may be provided on or in the circuit board 122 that interconnect the edge contacts 126 with the rear mating connectors 70. The edge contacts 126 may be provided on one or more sides of the circuit board 122. The edge contacts 126 may be contact pads formed on the circuit board 122. Alternatively, the edge contacts 126 may extend from at least one of the surfaces and/or the edge 128 of the circuit board 122. In alternative embodiment, rather than using edge contacts 126, the interface connector assembly 120 may include an electrical connector at, or proximate to, the edge 128 for mating with the electrical connector 106 of the contact subassembly 100.\nThe contacts 144 are arranged in contact sets 146 with each contact set 146 defining a portion of a different receptacle 16 (shown in\nIn an exemplary embodiment, the contact subassembly 100 includes a plurality of contact supports 152 extending from the front side 140 of the circuit board 104. The contact supports 152 are positioned in close proximity to respective contact sets 146. Optionally, each contact support 152 supports the contacts 144 of a different contact set 146. In the illustrated embodiment, two rows of contact supports 152 are provided. A gap 154 separates the contact supports 152. Optionally, the gap 154 may be substantially, centered between the top 148 and the bottom 150 of the circuit board 104.\nDuring assembly, the contact subassembly 100 is loaded into the housing 30 (shown in\nIn an exemplary embodiment, the housing 30 includes a rear chamber 102 (shown in\nIn an exemplary embodiment, the plug cavities 42 are separated from adjacent plug cavities 42 by shield elements 172. The shield elements 172 may be defined by the interior walls 160 and/or exterior walk 174 of the housing 30. For example, the housing 30 may be fabricated from a metal material with the interior walls 160 and/or the exterior walls 174 also fabricated from the metal material. In an exemplary embodiment, the housing 30 is diecast using a metal or metal alloy, such as aluminum or an aluminum alloy. With the entire housing 30 being metal, the housing 30, including portion of the housing 30 between the plug cavities 42 (e.g. the interior walls 160) and the portion of the housing 30 covering the plug cavities 42 (e.g. the exterior walls 174), operates to provide shielding around the plug cavities 42. In such an embodiment, the housing 30 itself defines the shield elements(s) 172. The plug cavities 42 may be completely enclosed (e.g. circumferentially surrounded) by the shield elements 172.\nWith each contact set 146 (shown in\nIn an alternative embodiment, rather than the housing 30 being fabricated from a metal material, the housing 30 may be fabricated, at least in part, from a dielectric material. Optionally, the housing 30 may be selectively metallized, with the metallized portions defining the shield elements 172. For example, at least a portion of the housing 30 between the plug cavities 42 may be metallized to define the shield elements 172 between the plug cavities 42. Portions of the interior walls 160 and/or the exterior walls 174 may be metallized. The metallized surfaces define the shield elements 172. As such, the shield elements 172 are provided on the interior walls 160 and/or the exterior walls 174. Alternatively, the shield elements 172 may be provided on the interior walls 160 and/or the exterior walls 174 in a different manner, such as by plating or by coupling separate shield elements 172 to the interior walls 160 and/or the exterior walls 174. The shield elements 172 may be arranged along the surfaces defining the plug cavities 42 such that at least some of the shield elements 172 engage the modular plugs 14 when the modular plugs 14 are loaded into the plug cavities 42. In other alternative embodiments, the walls 160 and/or 174 may be formed, at least in part, by metal filler materials provided within or on the walls 160 and/or 174 or metal fibers provided within or on the walls 160 and/or 174.\nIn another alternative embodiment, rather than, or in addition to, providing the shield elements 172 on the walls of the housing 30, the shield elements 172 may be provided within the walls of the housing 30. For example, the interior walls 160 and/or the exterior walls 174 may include openings 176 that are open at the rear 36 and/or the front 34 such that the shield elements 172 may be loaded into the openings 170. The shield elements 172, may be separate metal components, such as plates, that are loaded into the openings 176. The openings 176, and thus the shield elements 172, are positioned between the plug cavities 42 to provide shielding between adjacent contact sets 146.\nDuring assembly, the interface connector assembly 120 is mated with the electrical connector 106. Optionally, the interface connector assembly 120 may be mated with the electrical connector 106 after the contact subassembly 100 is loaded into the housing 30. Alternatively, both the contact subassembly 100 and the interface connector assembly 120 may be loaded into the housing 30 as a unit. Optionally, some or all of the interface connector assembly 120 may be positioned rearward of the housing 30.\nThe cover 32 is coupled to the housing 30 after the contact subassembly 100 and the interface connector assembly 120 are positioned with respect to the housing 30. The cover 32 is coupled to the housing 30 such that the cover 32 surrounds the interface connector assembly 120 and/or the contact subassembly 100. In an exemplary embodiment, when the cover 32 and the housing 30 are coupled together, the cover 32 and the housing 30 cooperate to define an inner chamber 170 (shown in\nWhen assembled, the plug cavities 42 and the contact sets 146 cooperate to define the receptacles 16 for mating with the modular plugs 14 (shown in\nEach of the contacts 144 extend between a tip 180 and a base 182 generally along a contact plane 184 (shown in\nIn an exemplary embodiment, the circuit board 104 is generally perpendicular to the contact plane 184 and the plug axis 178. The top 148 of the circuit board 104 is positioned near a top side 186 of the housing 30, whereas the bottom 150 of the circuit board 104 is positioned near a bottom side 188 of the housing 30. The circuit board 104 is positioned generally behind the contacts 144, such as between the contacts 144 and the rear 36 of the housing 30. The circuit board 104 substantially covers the rear of each of the plug cavities 42 when the connector subassembly 100 is loaded into the rear chamber 102. In an exemplary embodiment, the circuit board 104 is positioned essentially equidistant from the mating interface 185 of each of the contacts 144. As such, the contact length between the mating interface 185 and the circuit board 104 is substantially similar for each of the contacts 144. Each of the contacts 144 may thus exhibit similar electrical characteristics. Optionally, the contact length may be selected such that the distance between a mating interface 185 and the circuit board 104 is reasonably short. Additionally, the contact lengths of the contacts 144 in the upper row 44 (shown in\nThe electrical connector 106 is provided on the rear side 142 of the circuit board 104. The electrical connector 106 is electrically connected to the contacts 144 of one or more of the contacts sets 146. The interface connector assembly 120 is mated with the electrical connector 106. For example, the circuit board 122 of the interface connector assembly 120 is loaded into the opening 108 of the electrical connector 106. The rear mating connectors 70, which are mounted to the circuit board 122, are electrically connected to predetermined contacts 144 of the contacts sets 146 via the circuit board 122, the electrical connector 106 and the circuit board 104. Other configurations are possible to interconnect the rear mating connectors 70 with, the contacts 44 of the receptacles 16.\nThe bond bar 300 includes a cassette interface 312 on one side of the body 302 and a panel interface 314 on the opposite side of the body 302. The cassette interface 312 is inward facing, such as in a direction that generally faces the housing 30. The cassette interface 312 is configured to engage and electrically connect to the cassette 20. Optionally, the cassette interface 312 engages the housing 30. The panel interface 314 is outward facing such as in a direction that generally faces away from housing 30. The panel interface 314 may be defined by the flexible beams 304 and/or the body 302. The panel interface 314 is configured to engage and electrically connected to the panel 12 (shown in\nThe flexible beams 304 may be forced generally inwardly when the cassette 20 is installed and/or mounted within the panel 12. For example, during loading of the cassette 20 into the panel opening 22, the flexible beams 304 engage the panel 12. The flexible beams 304 may define spring-like elements to provide a normal force against the panel 12 when the cassette 20 is mounted to the panel 12. The panel 12 forces the flexible beams 304 to flatten out. Because the flexible beams 304 are resilient, the flexible beams 304 bias against the perimeter wall 24 of the opening 22. The flexible beams 304 thus maintain contact with the panel 12. Optionally, the panel 12 may additionally engage the body 302 of the bond bar 300.\nSince the cassette 20, the bond bar 300 and the panel are conductive/metallic, the bond bar 300 provides a bond path or interface between the panel 12 and the cassette 20. The bond path makes an electrical connection between the components. Optionally, when one of the components (e.g. the panel 12) is taken to ground (e.g. electrically grounded), then the bond path defines a ground path between the components. The bond bar 300 makes a secure mechanical and electrical connection between the panel 12 and the cassette 20 by using the flexible beams 304. In an exemplary embodiment, when shield elements 172 (shown in\nThe shield elements 342 are plates that are configured to be positioned between adjacent plug cavities 348 of the housing 340. Optionally, each of the shield elements 342 may be integrally formed with one another as part of a one-piece structure that is loaded into the openings 346. Alternatively, the shield elements 342 may be separate from one another and separately loaded into the openings 346. The separate shield elements 342 may be electrically connected to one another. The shield elements 342 contact the bond bar 344 to electrically connect the bond bar 344 to the shield elements 342. Optionally, the bond bar 344 may include flexible fingers 350 that engage the shield elements 342 to maintain contact therebetween.\nA cassette 20 is thus provided that may be mounted to a panel 12 through an opening 22 in the panel 12. The panel 12 may be electrically connected to ground. Optionally, a bond bar 300 may be provided between the cassette 20 and the panel 12 to provide a bond path between the panel 12 and the cassette 20. The cassette 20 may be grounded when the panel 12 is grounded. The cassette 20 includes a plurality of receptacles 16 that are configured to receive modular plugs 14 therein. The receptacles 16 are separated from adjacent receptacles 16 by shield elements 172 being either defined by, provided on, or provided in the inner walls 160 separating the plug cavities 42. The receptacles 16 are thus shielded from adjacent receptacles 16, which may increase the performance of the cassette 20. For example, shield effectiveness may be increased by providing the shield elements between adjacent receptacles 16. Additionally, alien crosstalk may be reduced between the contacts 144 of adjacent receptacles 16.\nIt is to be understood that the above description is intended to be illustrative, and not restrictive. For example, the above-described embodiments (and/or aspects thereof) may be used in combination with each other. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Dimensions, types of materials, orientations of the various components, and the number and positions of the various components described herein are intended to define parameters of certain embodiments, and are by no means limiting and are merely exemplary embodiments. Many other embodiments and modifications within the spirit and scope of the claims will be apparent to those of skill in the art upon reviewing the above description. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. In the appended claims, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein.” Moreover, in the following claims, the terms “first,” “second,” and “third,” etc. are used merely as labels, and are not intended to impose numerical requirements on their objects. Further, the limitations of the following claims are not written in means—plus-function format and are not intended to be interpreted based on 35 U.S.C. §112, sixth paragraph, unless and until such claim limitations expressly use the phrase “means for” followed by a statement of function void of further structure.\n|Cited Patent||Filing date||Publication date||Applicant||Title|\n|US3945706||Apr 18, 1974||Mar 23, 1976||Siemens Aktiengesellschaft||Distribution frame for communication facilities|\n|US5178554||Aug 5, 1991||Jan 12, 1993||The Siemon Company||Modular jack patching device|\n|US5217394||Sep 10, 1992||Jun 8, 1993||Ho Ming Chiao||Converter-type circuit connector for linking electronic devices|\n|US5509812||Jun 20, 1994||Apr 23, 1996||Molex Incorporated||Cable tap assembly|\n|US5562493||Dec 16, 1994||Oct 8, 1996||The Whitaker||Network interface assembly and mounting frame|\n|US5639261||Dec 23, 1994||Jun 17, 1997||Lucent Technologies Inc.||Modular cross-connect system|\n|US5647765||Sep 12, 1995||Jul 15, 1997||Regal Electronics, Inc.||Shielded connector with conductive gasket interface|\n|US5700167||Sep 6, 1996||Dec 23, 1997||Lucent Technologies||Connector cross-talk compensation|\n|US5735708||Apr 3, 1996||Apr 7, 1998||Lucent Technologies Inc.||Apparatus and method for displaying information at a wall face plate|\n|US5735712||Mar 13, 1997||Apr 7, 1998||Regal Electronics, Inc.||Shielded connector with condutive gasket interface|\n|US5741153||Jul 27, 1995||Apr 21, 1998||Ortronics, Inc.||Modular connectors including terminated rear connector designation for insulation displacement connectors|\n|US5800207||May 22, 1996||Sep 1, 1998||Hon Hai Precision Ind. Co., Ltd.||Mechanism for arranging different I/O port connectors|\n|US5924890||Aug 26, 1997||Jul 20, 1999||The Whitaker Corporation||Electrical connector having a virtual indicator|\n|US6053764||Jun 30, 1998||Apr 25, 2000||Lucent Technologies Inc.||Patch panel and interlocking module|\n|US6053964||Sep 29, 1997||Apr 25, 2000||Harrell; Gary W.||Apparatus and method for applying a leaching solution to ore|\n|US6066001||Nov 30, 1998||May 23, 2000||3Com Corporation||Coupler for minimizing EMI emissions|\n|US6074251||May 27, 1998||Jun 13, 2000||The Siemon Company||Shielded high density patch panel|\n|US6120318||Jan 26, 1999||Sep 19, 2000||The Whitaker Corporation||Stacked electrical connector having visual indicator subassembly|\n|US6132260||Aug 10, 1999||Oct 17, 2000||Hon Hai Precision Ind. Co., Ltd.||Modular connector assembly|\n|US6168474||Jun 4, 1999||Jan 2, 2001||Lucent Technologies Inc.||Communications connector having crosstalk compensation|\n|US6222908||Sep 23, 1999||Apr 24, 2001||Avaya Technology Corp.||Method and device for identifying a specific patch cord connector as it is introduced into, or removed from, a telecommunications patch system|\n|US6227911||Sep 9, 1998||May 8, 2001||Amphenol Corporation||RJ contact/filter modules and multiport filter connector utilizing such modules|\n|US6269008||Nov 22, 1999||Jul 31, 2001||Lucent Technologies Inc.||Multi-walled electromagnetic interference shield|\n|US6302742||Jun 2, 2000||Oct 16, 2001||John Ray Berst||Electrical interface panel|\n|US6319047||Feb 27, 2001||Nov 20, 2001||Yu-Ho Liang||IDC adapter|\n|US6364707 *||Dec 6, 2000||Apr 2, 2002||Yao Te Wang||Grounding device of an electric connector|\n|US6364713||Oct 31, 2000||Apr 2, 2002||Hon Hai Precision Ind. Co., Ltd.||Electrical connector adapter assembly|\n|US6540564||Feb 13, 2002||Apr 1, 2003||Hon Hai Precision Ind. Co., Ltd.||Connector assembly|\n|US6608764 *||Nov 16, 2001||Aug 19, 2003||Adc Telecommunications, Inc.||Telecommunications patch panel|\n|US6612867||Apr 12, 2002||Sep 2, 2003||Hon Hai Precision Ind. Co., Ltd.||Stacked connector assembly|\n|US6626697||Nov 7, 2002||Sep 30, 2003||Tyco Electronics Corp.||Network connection sensing assembly|\n|US6655988||Apr 18, 2003||Dec 2, 2003||Tyco Electronics Corporation||Multi-port modular jack assembly with LED indicators|\n|US6780035||Mar 12, 2002||Aug 24, 2004||Nordx/Cdt, Inc.||Electrostatic discharge protected jack|\n|US6786772||Apr 16, 2003||Sep 7, 2004||Lankom Electronics Co., Ltd.||Modulated connector|\n|US6802735||Jun 18, 2002||Oct 12, 2004||Tyco Electronics Corporation||Receptacle and plug interconnect module with integral sensor contacts|\n|US6976867||Jan 28, 2004||Dec 20, 2005||Tyco Electronics Amp Espana, S.A.||Network connection sensing assembly|\n|US6988914 *||Jun 17, 2003||Jan 24, 2006||Tyco Electronics Corporation||Electrical coupler with splitting receptacle jack interfaces|\n|US7033210||Dec 27, 2004||Apr 25, 2006||Tyco Electronics Corporation||Signal conditioned modular jack assembly with improved shielding|\n|US7077707||Aug 5, 2004||Jul 18, 2006||Hon Hai Precision Ind. Co., Ltd.||Modular jack connector having enhanced structure|\n|US7140924||Nov 22, 2004||Nov 28, 2006||Leviton Manufacturing Co., Inc.||Compensation system and method for negative capacitive coupling in IDC|\n|US7300307 *||Mar 27, 2006||Nov 27, 2007||Tyco Electronics Corporation||Stacked jack assembly providing multiple configurations|\n|US7357675||Aug 8, 2006||Apr 15, 2008||International Business Machines Corporation||Universal EMC gasket|\n|US7367850||Feb 20, 2007||May 6, 2008||Telebox Industries Corp.||Bidirectional communication module jack assembly|\n|US7384310||Feb 20, 2007||Jun 10, 2008||Hon Hai Precision Ind. Co., Ltd.||Electrical connector with reliable structure and method for making the same|\n|US7530854||Jun 15, 2006||May 12, 2009||Ortronics, Inc.||Low noise multiport connector|\n|US20030095395||Nov 16, 2001||May 22, 2003||Clark Gordon P.||Telecommunications patch panel|\n|US20040209515||Mar 31, 2004||Oct 21, 2004||Caveney Jack E.||High density patch panel|\n|US20040229501||May 12, 2004||Nov 18, 2004||Caveney Jack E.||High density keystone jack patch panel|\n|US20040246693||Mar 31, 2004||Dec 9, 2004||Lloyd Brian Keith||Shielding cage with improved EMI shielding gasket construction|\n|US20050136747||Dec 15, 2004||Jun 23, 2005||Panduit Corp.||Inductive and capacitive coupling balancing electrical connector|\n|US20050164548||Jan 22, 2004||Jul 28, 2005||Northstar Systems, Inc.||Computer input/output connector assembly|\n|US20050185912||Apr 20, 2005||Aug 25, 2005||Levesque Stewart A.||Angled patch panel assembly|\n|US20050282432||Jun 16, 2004||Dec 22, 2005||Murr Keith M||Stacked jack assembly providing multiple configurations|\n|US20050282441||Jun 16, 2004||Dec 22, 2005||Murr Keith M||Shielding configuration for a multi-port jack assembly|\n|US20060246784 *||Apr 29, 2005||Nov 2, 2006||Aekins Robert A||Electrically isolated shielded connector system|\n|US20070032129||Feb 23, 2006||Feb 8, 2007||Leviton Manufacturing Co., Inc.||Connector isolation station system|\n|US20070066141||Sep 22, 2006||Mar 22, 2007||Hon Hai Precision Ind. Co., Ltd.||Electrical connector having an inner printed circuit board|\n|US20080090461||Jul 25, 2007||Apr 17, 2008||Tyco Electronics Corporation||Interface module|\n|EP1458062A2||Mar 4, 2004||Sep 15, 2004||Tyco Electronics Corporation||Electrical coupler with splitting receptacle jack interfaces|\n|GB2339090A||Title not available|\n|WO2004091055A2||Mar 31, 2004||Oct 21, 2004||Molex Incorporated||Shielding cage with improved emi shielding gasket construction|\n|WO2005053111A1||Nov 24, 2004||Jun 9, 2005||Panduit Corp.||Communications patch panel systems and methods|\n|WO2006063023A1||Dec 6, 2005||Jun 15, 2006||Commscope Solutions Properties, Llc||Telecommunications patching system that utilizes rfid tags to detect and identify patch cord interconnections|\n|WO2007044855A2||Oct 11, 2006||Apr 19, 2007||The Siemon Company||Shielded connecting block providing reduced alien crosstalk|\n|1||European Search Report, European Application No. EP 10 15 4424, European Filing Date Feb. 23, 2010.|\n|2||International Search Report, International Application No. PCT/US2010/000564, International Filing Date Feb. 24, 2010, 3 pgs.|\n|3||International Search Report, International Application No. PCT/US2010/000564, International Filing Date Feb. 24, 2010, 3pgs.|\n|Citing Patent||Filing date||Publication date||Applicant||Title|\n|US8740654 *||Aug 15, 2012||Jun 3, 2014||Philip Anthony Sedberry, JR.||Flexible organizational connect|\n|US8758048 *||May 25, 2011||Jun 24, 2014||3M Innovative Properties Company||Support structure for telecommunication jacks|\n|US9397450 *||Jun 12, 2015||Jul 19, 2016||Amphenol Corporation||Electrical connector with port light indicator|\n|US9532608 *||Jan 3, 2014||Jan 3, 2017||Tyco Electronics Corporation||Electrical connector|\n|US20130045625 *||Aug 15, 2012||Feb 21, 2013||Philip Anthony Sedberry, JR.||Flexible organizational connect|\n|US20130090005 *||May 25, 2011||Apr 11, 2013||3M Innovative Properties Company||Support structure for telecommunication jacks|\n|US20140213074 *||Jan 3, 2014||Jul 31, 2014||Tyco Electronics Corporation||Electrical connector|\n|U.S. Classification||439/95, 439/607.02, 439/607.03, 439/607.53|\n|Cooperative Classification||H01R24/64, H01R13/40, H01R23/6873, H01R13/506, H01R13/518|\n|European Classification||H01R13/40, H01R23/02B, H01R13/506, H01R13/518, H01R23/68D|\n|Feb 27, 2009||AS||Assignment|\nOwner name: TYCO ELECTRONICS CORPORATION, PENNSYLVANIA\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PEPE, PAUL JOHN;MUIR, SHELDON EASTON;SIGNING DATES FROM 20090225 TO 20090226;REEL/FRAME:022325/0404\n|Aug 1, 2014||FPAY||Fee payment|\nYear of fee payment: 4\n|Jul 7, 2015||AS||Assignment|\nOwner name: TYCO ELECTRONICS SERVICES GMBH, SWITZERLAND\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TYCO ELECTRONICS CORPORATION;REEL/FRAME:036074/0740\nEffective date: 20150410\n|Oct 26, 2015||AS||Assignment|\nOwner name: COMMSCOPE EMEA LIMITED, IRELAND\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TYCO ELECTRONICS SERVICES GMBH;REEL/FRAME:036956/0001\nEffective date: 20150828\n|Oct 29, 2015||AS||Assignment|\nOwner name: COMMSCOPE TECHNOLOGIES LLC, NORTH CAROLINA\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:COMMSCOPE EMEA LIMITED;REEL/FRAME:037012/0001\nEffective date: 20150828\n|Jan 13, 2016||AS||Assignment|\nOwner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL\nFree format text: PATENT SECURITY AGREEMENT (TERM);ASSIGNOR:COMMSCOPE TECHNOLOGIES LLC;REEL/FRAME:037513/0709\nEffective date: 20151220\nOwner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL\nFree format text: PATENT SECURITY AGREEMENT (ABL);ASSIGNOR:COMMSCOPE TECHNOLOGIES LLC;REEL/FRAME:037514/0196\nEffective date: 20151220", "label": "Yes"} {"text": "1 minute read\nParmley Technologies Ltd and Marl International Ltd work together to fit Marl's Panel Indicator LEDs to Parmley Control Panels.\nFor almost 20 years Parmley Technologies Ltd, managed by MD Derek Parmley, have been specialising in high quality, high reliability customer solutions including on site Design and Rapid Prototyping, to full Manufacturing of PCB’s and Electronic Control Products for Military Vehicles and other harsh environments. Parmley currently have over 300 different types of control panels installed on Military Vehicles in the UK, USA, and Europe.\nMarl provide Parmley Technologies with our 612 Series Panel Indicator LEDs. Offering outstanding reliability, sealed to IP67 and ruggedized, these indicators are ideal for military and high vibration applications. Suitable for status panel indication with a smoked lens providing a wide viewing angle, this product offers good on/off contrast ratio. The 612 Series is a small ø6.35mm (quarter inch) mounting indicator available in a range of colour and voltage options, with or without flying leads.\nParmley Technologies Ltd continue to work with military applications and are currently supporting the development of Counter Drone technology with electronic design of control panels, assembly, and test.\nSamples and technical information for Marl products are available; please contact Graham Round for more information:\nT 01229 582430", "label": "Yes"} {"text": "Quantum mechanics and Einstein's theory of general relativity are both extremely accurate theories of how the universe works, but all attempts to combine the two into a unified theory have ended in failure.\nWhen physicists try to calculate the properties of a quantum theory of gravity, they find quantities that become infinite -- infinities that are so bad they can't be removed by mathematical gambits that work in other areas of physics.\nNow, Zvi Bern, John Carrasco, and Henrik Johanssen at UCLA, Lance Dixon at the Stanford Linear Accelerator Center, and Radu Roiban at Pennsylvania State University have found a way to carry out a new set of gravity calculations with the help of an older theory that has been known since the 1980s to be finite.\nTheir new results are reported in Physical Review Letters (http://prl.aps.org) and highlighted in a commentary by Hermann Nicolai at the Max Planck Institute for Gravitational Physics in Potsdam, Germany, in Physics (http://physics.aps.org).\nPrevious attempts at removing the fatal infinities in quantum gravity calculations collapsed when researchers discovered that you would need an infinite number of parameters. The problem stems from the point-like and thus infinitesimally small fundamental particles in the theories, so some physicists have developed string theory as a possible approach: instead of point particles, the fundamental entities are vibrating loops of string. But string theory is beset with its own difficulties, as it lays out a \"landscape\" of possibilities with an astronomical number of scenarios.\nThe new paper by Bern et al. shows that by combining desirable aspects of string theory and point-like particles, they can use cancellations in the calculations - done with the help of graphical computational methods called Feynman diagrams (and later elaborations) - to escape the problem of infinities. While not a solution to the problem of quantum gravity, nor a result that knocks string theory aside, the findings of Bern et al. show that theories thought to be dead ends may still show the way forward.\nAlso in Physics this week:\nCosmic alchemy in the laboratory\nAdvances in experimental techniques that measure nuclear reactions that occur in stars are opening new opportunities for understanding the stellar and chemical evolution of our Universe.\nAbout APS Physics\nAPS Physics (http://physics.aps.org) publishes expert written commentaries and highlights of papers appearing in the journals of the American Physical Society\nElectrocatalysis can advance green transition\n23.01.2017 | Technical University of Denmark\nQuantum optical sensor for the first time tested in space – with a laser system from Berlin\n23.01.2017 | Ferdinand-Braun-Institut Leibniz-Institut für Höchstfrequenztechnik\nFor the first time ever, a cloud of ultra-cold atoms has been successfully created in space on board of a sounding rocket. The MAIUS mission demonstrates that quantum optical sensors can be operated even in harsh environments like space – a prerequi-site for finding answers to the most challenging questions of fundamental physics and an important innovation driver for everyday applications.\nAccording to Albert Einstein's Equivalence Principle, all bodies are accelerated at the same rate by the Earth's gravity, regardless of their properties. This...\nAn important step towards a completely new experimental access to quantum physics has been made at University of Konstanz. The team of scientists headed by...\nYersiniae cause severe intestinal infections. Studies using Yersinia pseudotuberculosis as a model organism aim to elucidate the infection mechanisms of these...\nResearchers from the University of Hamburg in Germany, in collaboration with colleagues from the University of Aarhus in Denmark, have synthesized a new superconducting material by growing a few layers of an antiferromagnetic transition-metal chalcogenide on a bismuth-based topological insulator, both being non-superconducting materials.\nWhile superconductivity and magnetism are generally believed to be mutually exclusive, surprisingly, in this new material, superconducting correlations...\nLaser-driving of semimetals allows creating novel quasiparticle states within condensed matter systems and switching between different states on ultrafast time scales\nStudying properties of fundamental particles in condensed matter systems is a promising approach to quantum field theory. Quasiparticles offer the opportunity...\n19.01.2017 | Event News\n10.01.2017 | Event News\n09.01.2017 | Event News\n23.01.2017 | Health and Medicine\n23.01.2017 | Physics and Astronomy\n23.01.2017 | Process Engineering", "label": "Yes"} {"text": "USD 44.10 billion\nReport ID: SQMIG45A2067 | Region: Global | Published Date: May, 2023 | Pages: 157 | Tables: 63 | Figures: 75\nGlobal Video surveillance Market size was valued at USD 44.10 billion in 2021 and is poised to grow from USD 48.20 billion in 2022 to USD 98.18 billion by 2030, at a CAGR of 9.3% during the forecast period (2023-2030).\nThe global video surveillance market is expected to witness notable growth owing to the increasing need for security solutions and advancements in technology. The market is expected to experience significant growth in the Asia-Pacific region, particularly in China and India, due to the increasing adoption of video surveillance systems in various sectors. The major trends in the video surveillance market is the increasing adoption of intelligent security systems. Video analytics software can be used to detect suspicious behavior and events, and alert security personnel in real-time.\nThe adoption of cloud-based video surveillance solutions is also increasing, as it allows for remote monitoring and management of video surveillance systems. The use of video surveillance systems has also raised concerns over privacy violations and civil liberties. The need for strict privacy regulations and cyber-security measures to protect video surveillance systems from cyber-attacks is becoming increasingly important. The video surveillance market is expected to continue growing due to the increasing need for security solutions and advancements in technology. However, the market will also face challenges related to privacy concerns and the need for cyber-security measures. The adoption of intelligent security systems and the growing trend of smart cities and homes are expected to create new opportunities in the market.\nGlobal Market Size\nUSD 44.10 billion\nTo get more reports on the above market click here to Buy The Report\nThe global video surveillance market is segmented on the basis of offering, system, and region. In terms of offering, the market is segmented into hardware, software, and service. Based on system, the market is segmented into analog video surveillance systems, IP video surveillance systems, hybrid Video Surveillance Systems. By region, the market is segmented into North America, Europe, Asia Pacific, Middle East and Africa, and Latin America.\nGlobal Video surveillance Market Analysis by Offering\nThe hardware segment includes surveillance cameras, which can be further categorized into analog cameras, IP cameras, and wireless cameras. Analog cameras are the traditional cameras that capture and transmit video signals via coaxial cables. IP cameras are digital cameras that transmit video signals over an IP network. Wireless cameras are connected to a wireless network and transmit video signals wirelessly. Other hardware components include recorders, such as digital video recorders (DVRs) and network video recorders (NVRs), and storage devices, such as hard disk drives (HDDs) and solid-state drives (SSDs). The software segment includes video management software, which enables the management and control of video surveillance systems, and video analytics software, which analyzes video data to detect and alert users of suspicious behavior and events. Other software solutions include facial recognition software, license plate recognition software, and object detection software. The services segment includes installation and maintenance services, which are provided by vendors to ensure the proper installation and functioning of video surveillance systems. Consulting services are provided to help customers choose the right video surveillance solutions for their specific needs. Other professional services include system integration and customization services.\nGlobal Video surveillance Market Analysis by System\nAnalog video surveillance systems consist of analog cameras, DVRs, and other analog components. Analog cameras capture and transmit video signals via coaxial cables to a DVR, which records and stores the video footage. Analog video surveillance systems are typically used in small businesses and residential settings due to their low cost and reliability. IP video surveillance systems consist of IP cameras, NVRs, and other digital components. IP cameras capture and transmit digital video signals over an IP network to an NVR, which records and stores the video footage. IP video surveillance systems offer higher image quality and advanced features, such as remote viewing and video analytics. IP video surveillance systems are typically used in large businesses, government facilities, and other high-security settings. Hybrid video surveillance systems combine analog and IP cameras and offer a cost-effective way to upgrade existing analog systems. Hybrid systems can also integrate with other security systems, such as access control and fire alarms. Hybrid video surveillance systems are typically used in medium-sized businesses and organizations that want to upgrade their existing video surveillance systems without incurring high costs.\nTo get detailed analysis on other segments, Request For Sample Report\nAsia Pacific market is expected to dominate the global video surveillance market, with China holding a major share. The Chinese government has taken active initiatives to promote the use of surveillance systems, including the 'Sharp Eyes' project and the completion of the 'Skynet video surveillance program' which is the world's largest video-surveillance network. These initiatives are likely to drive the growth of the video surveillance market in the region.\nNorth America in the video surveillance market is also expected to experience significant growth in the coming years due to increasing external and internal human threats. Many cities in the United States have already adopted advanced surveillance systems, such as the deployment of facial recognition cameras by the local police to identify and arrest protestors during the Baltimore riots.\nTo know more about the market opportunities by region and country, click here to\nBuy The Complete Report\nGlobal Video surveillance Market Drivers\nEmergence of AI Surveillance Technology Would Ensure to Drive Growth\nGrowing Adoption of Body-worn Cameras to Drive Growth\nGlobal Video surveillance Market Restraints\nPrivacy and Security Concerns Regarding Video Data\nHigh Installation and Maintenance Costs\nSpeak to one of our ABIRAW analyst for your custom requirements before the purchase of this report\nThe global video surveillance market is highly competitive, with several key players dominating the market. These companies focus on product innovation, strategic partnerships, and mergers and acquisitions to maintain their market position and expand their product portfolios. The competitive landscape of the global video surveillance market is expected to remain intense, with key players focusing on product innovation, strategic partnerships, and mergers and acquisitions to gain a competitive edge in the market.\nTop Player’s Company Profiles in Global Video surveillance Market\nGlobal Video surveillance Market Recent Developments\nSkyQuest’s ABIRAW (Advanced Business Intelligence, Research & Analysis Wing) is our Business Information Services team that Collects, Collates, Correlates, and Analyzes the Data collected by means of Primary Exploratory Research backed by robust Secondary Desk research.\nAccording to our global video surveillance market analysis, the increasing security concerns, advancements in technology, and growing demand for surveillance systems in emerging economies are likely to augment growth. Here's a detailed analysis of the market. Analog video surveillance systems accounted for the largest share of the market in 2020, due to their low cost and ease of installation. The IP video surveillance systems segment is expected to witness significant growth during the forecast period, owing to their ability to provide high-definition video and better scalability. The video surveillance market is expected to continue its growth trajectory in the coming years, driven by increasing security concerns and advancements in technology. The market is highly competitive, with several players operating in the market, and is expected to witness significant growth in emerging economies such as Asia Pacific.\n|Market size value in 2021||USD 44.10 billion|\n|Market size value in 2030||USD 48.20 billion|\n|Forecast Unit (Value)||USD Billion|\n|Regions covered||North America (US, Canada), Europe (Germany, France, United Kingdom, Italy, Spain, Rest of Europe), Asia Pacific (China, India, Japan, Rest of Asia-Pacific), Latin America (Brazil, Rest of Latin America), Middle East & Africa (South Africa, GCC Countries, Rest of MEA)|\nFree report customization with purchase. Customization includes:-\nTo get a free trial access to our platform which is a one stop solution for all your data requirements for quicker decision making. This platform allows you to compare markets, competitors who are prominent in the market, and mega trends that are influencing the dynamics in the market. Also, get access to detailed SkyQuest exclusive matrix.\nBuy The Complete Report to read the analyzed strategies adopted by the top vendors either to retain or gain market share\nParent Market Analysis\nKEY MARKET INSIGHTS\nMARKET DYNAMICS & OUTLOOK\nMarket Size by Region\nKEY COMPANY PROFILES\nFor the Global Video Surveillance Market, our research methodology involved a mixture of primary and secondary data sources. Key steps involved in the research process are listed below:\n1. Information Procurement: This stage involved the procurement of Market data or related information via primary and secondary sources. The various secondary sources used included various company websites, annual reports, trade databases, and paid databases such as Hoover's, Bloomberg Business, Factiva, and Avention. Our team did 45 primary interactions Globally which included several stakeholders such as manufacturers, customers, key opinion leaders, etc. Overall, information procurement was one of the most extensive stages in our research process.\n2. Information Analysis: This step involved triangulation of data through bottom-up and top-down approaches to estimate and validate the total size and future estimate of the Global Video Surveillance Market.\n3. Report Formulation: The final step entailed the placement of data points in appropriate Market spaces in an attempt to deduce viable conclusions.\n4. Validation & Publishing: Validation is the most important step in the process. Validation & re-validation via an intricately designed process helped us finalize data points to be used for final calculations. The final Market estimates and forecasts were then aligned and sent to our panel of industry experts for validation of data. Once the validation was done the report was sent to our Quality Assurance team to ensure adherence to style guides, consistency & design.\nWith the given market data, our dedicated team of analysts can offer you the following customization options are available for the Global Video Surveillance Market:\nProduct Analysis: Product matrix, which offers a detailed comparison of the product portfolio of companies.\nRegional Analysis: Further analysis of the Global Video Surveillance Market for additional countries.\nCompetitive Analysis: Detailed analysis and profiling of additional Market players & comparative analysis of competitive products.\nGo to Market Strategy: Find the high-growth channels to invest your marketing efforts and increase your customer base.\nInnovation Mapping: Identify racial solutions and innovation, connected to deep ecosystems of innovators, start-ups, academics, and strategic partners.\nCategory Intelligence: Customized intelligence that is relevant to their supply Markets will enable them to make smarter sourcing decisions and improve their category management.\nPublic Company Transcript Analysis: To improve the investment performance by generating new alpha and making better-informed decisions.\nSocial Media Listening: To analyze the conversations and trends happening not just around your brand, but around your industry as a whole, and use those insights to make better Marketing decisions.\nOur industry expert will work with you to provide you with customized data in a short amount of time.SPEAK TO AN ANALYST\nGet lifetime access to our reportsBasic Plan $5,000 Team Plan $10,000 SUBSCRIBE NOW\nWant to customize this report? This report can be personalized according to your needs. Our analysts and industry experts will work directly with you to understand your requirements and provide you with customized data in a short amount of time. We offer $1000 worth of FREE customization at the time of purchase.\n\"We have purchased recently a report from SkyQuest Technology, and we are happy to inform you that this report was so useful and practical for our team. Skyquest Team was very active and our queries were followed up completely.It was amazing. \"\n- Mr. Ali Zali, Commercial Director, ICIIC Iran.\nProduct ID: SQMIG45A2067", "label": "Yes"} {"text": "There are two main algorithmic approaches to sparse signal ecovery: geometric and combinatorial. The geometric approach starts with a geometric constraint on the measurement matrix Phi and then uses linear programming to decode information about x from Phi x. The combinatorial approach constructs Phi and a\ncombinatorial decoding algorithm to match.\nWe present a unified approach to these two classes of sparse signal recovery algorithms. The unifying elements are the adjacency\nmatrices of high-quality unbalanced expanders. We generalize the notion of Restricted Isometry Property (RIP), crucial to compressed\nsensing results for signal recovery, from the Euclidean norm to the ell-p norm for p approximately 1, and then show that unbalanced expanders are essentially equivalent to RIP-p matrices. From known deterministic constructions for such matrices, we obtain new deterministic measurement matrix constructions and algorithms\nfor signal recovery which, compared to previous deterministic algorithms, are superior in either the number of measurements or in noise tolerance.\nAuthors: R. Berinde, A. C. Gilbert, P. Indyk, H. Karloff, and M. J. Strauss", "label": "Yes"} {"text": "Sound characteristics of audio equipment\nIn the audio market, we can find many related introductions of various equipments. Usually, they will describe the various\ncharacteristics in the equipment from the positive, and rarely explain the negative effects behind the characteristics. However,\nthese negative factors control the quality on the music playback function. To get the sound effects you expect, you need to\nfully understand the equipment. In the following content, we will technically analyze what are the deficiencies in the equipment,\nwhat impact will it bring to the functional quality, and what sound characteristics will appear from this.\nWe do not\nintend to evaluate the quality of the equipment, nor do we intend to impeach the defects of the equipment. Here is just to\nintroduce the sound characteristics of these devices from the perspective of principles, so that when you use these devices,\nyou can give full play to their strengths and avoid weaknesses. If necessary, you can quickly determine the location of the\nsound effect based on these characteristics. It must be known that, like everything else, audio equipment is not absolutely\ngood or bad. In daily music appreciation, as long as the equipment can meet the sound effects you like, it is a good equipment\nfor your sound system.\nEverything in the world should have an explanation, and the sound system is no exception. Audio\nequipment is a product of electronic technology, and its various phenomena must conform to physical principles and should\nbe explained technically. In principle, all types of equipment have sound characteristics produced by their physical characteristics.\nAlthough each device of the same device has its own sound personality, the common characteristics of their device types will\nIn the following, we will use the term micro-dynamics. Micro dynamics is the ratio of two voltage (or\nsound pressure) values in a time interval. In some cases, it is equivalent to what audio enthusiasts call micro-dynamics.\nThe only difference is the length of the time interval. Generally, the minimum time interval for the human ear to confirm\nthe existence of two sound pressure intensities (or there are two sounds) from the sound is 0.1 second. The micro dynamics\nwe are referring to here include very short time intervals and extend to a range that can be distinguished by the human ear.\nWe will also use the term \"Sound State\" in the following description. Sound State——The\nemotional state of the sound. Technical expression: The sound pressure value will change over time. This change relationship\nis expressed on the coordinate graph of the amplitude vertical axis and the time horizontal axis, which will produce a trajectory\nof the sound pressure value changing with time. Sound state-the shape of the track of sound pressure changes over time.\nIn the product introduction, we will find some technical indicators related to the equipment. How will various indicators\naffect sound quality? How big is its impact? Which indicator has the greatest impact? This is a topic that audio enthusiasts\noften pay attention to and are discussed from time to time.\nThe phase characteristics of the sound system will directly\naffect the sound state. Phase distortion will inevitably affect certain frequency components in music electrical signals,\ncausing them to be misaligned on the time axis. This will change the instantaneous value of sound pressure at certain timing\npositions and will also produce micro-dynamic distortion in a short time interval.\nThe various distortions of the sound\nsystem, they all change the signal waveform in the end, and specifically change the sound state and timbre.\nAmong various distortions, intermodulation distortion has the greatest impact on timbre. When a music\nsignal passes through an amplifier with intermodulation distortion, some frequency components that are not in the original\nsignal will appear on the signal spectrum, thereby changing the timbre.\nNon-linear (harmonic) distortion will also\ncause some frequency components not in the original signal to appear on the signal spectrum, thereby changing the timbre of\nthe sound. Unlike intermodulation distortion, the number of frequency components produced by nonlinear distortion has a linear\nrelationship with the number of original signal frequency components, but the relationship reflected by intermodulation distortion\nis exponential (to be precise, it is called mathematically Combination relationship)).\nThe meaning of the distortion\nEach amplifier includes multiple unit circuits. Each unit circuit is also composed of multiple circuit\nsegments. When each section and each unit circuit itself has large distortion, the non-linear distortion value of the amplifier\n(from input to output) can be reduced through mutual compensation and large loop feedback of each section and each unit circuit.\nThe ideal degree is close to zero. However, these measures have not eliminated the non-linear distortion existing in each\nsegment and each unit circuit itself.\nSegmented circuits with nonlinear distortion will inevitably produce intermodulation\ndistortion. A signal containing two or more frequency components, passing through a segmented circuit with nonlinear distortion,\nwill inevitably have additional frequency components that the original signal does not have. Once these intermodulation distortion\nproducts appear, they cannot be separated or removed from the signal.\nIntermodulation distortion and nonlinear distortion\nare closely related, but they have different meanings. If the signal processed by the amplifier is a sine wave (only a single\nfrequency component), the nonlinear distortion index has a certain meaning. If this is a music signal (contains two or more\nfrequency components), the index of intermodulation distortion will be able to more fully reflect the overall characteristics\nof the amplifier.\nThe technical indicators\nFor equipment users, the significance of technical\nindicators is that there can be a unified standard to evaluate and compare the work quality and performance differences of\nthe same functional products of all parties. If the established technical indicators meet the working nature of the equipment,\nthe evaluation is valid. Audio equipment manufactured by modern technology usually has some perfect technical indicators.\nSo, can we effectively judge the quality and characteristics of their voices based on these indicators?\nWe can discuss\nthis issue with an operational amplifier as an example. If op amps of the same company, the same model, different origins,\nor even the same model and different batches are installed on a typical audio circuit for testing. For some technical indicators\ncurrently used to measure audio equipment, we can all measure the same value. However, when we install these operational amplifiers\non the same audio equipment for sound comparison, we will hear different sound effects.\nFor audio equipment, the above\nexample is a common phenomenon. It shows that these indicators are not enough to fully reflect the actual working quality\nof audio equipment. Many static indicators are used to measure audio equipment in industrial production. However, in addition\nto more directly reflecting the phase characteristics and intermodulation distortion of the sound quality of the audio equipment,\nmost of the static indicators will gradually lose their meaning as the signal alternating speed increases and the dynamic\nincreases. Therefore, based on the existing technical indicators, audiophiles may still be unable to effectively evaluate\nthe actual quality of the equipment in actual use.\nSimilarly, these indicators alone cannot effectively analyze the\nsound characteristics of audio equipment. Below, we will analyze the inevitability of the sound characteristics of the device\nbased on physical principles (electronic principles obey physical mechanisms).\nPlease note: When using a WRT cable,\nthe sound characteristics described below can be accurately presented. If the audio system uses other cables, the sound state\nmay be somewhat distorted, and the apparent degree of characteristics will vary.\nquality of grounding has a great influence on the stability of electronic equipment. Electronic equipment transmits or processes\nelectrical signals, and uses \"ground\" as a reference to establish a basis for comparison. If the \"ground\"\nis unstable, the accuracy of the foundation will be shaken. Set up an independent ground for the audio system to avoid external\ninterference. The internal resistance of the grounding will affect the degree of mutual interference between the various components\nof the audio system.\nIf we classify amplifiers by device type, we can divide them into\nelectron tubes, transistors, and integrated circuit amplifiers. Affected by the electrical characteristics and physical structure\nof the device, various devices used in audio (low-frequency linear) circuits can basically have such characteristics: the\nmicro-dynamic filtering* of the tube amplifier is the largest, the transistor is the second, and the integrated circuit is\nthe smallest (but in In some applications, after the integrated circuit amplifier is combined with the peripheral circuit,\nthe strength of the micro-dynamic filtering may be stronger than that of the tube amplifier). The intensity of micro-dynamic\nfiltering controls the density of sound details. With the enhancement of micro-dynamic filtering, the original details of\nthe music will gradually decrease. In the circuit design, the intensity of the micro-motion filter can be controlled to improve\nthe smoothness of the sound, but the direction of control can only be enhancement.\n* Low-frequency analog circuits\nused in audio equipment usually need some measures to filter out noise, overshoot, and high-frequency interference. Regardless\nof the original intention of adding these measures, they will correspondingly produce some negative effects of micro-dynamic\nfiltering. The weak micro-dynamic filtering only reduces the sound details. When the intensity reaches a certain level and\ncombined with loop feedback, these measures will produce an effect of compressing signal dynamics.\nHere, by the way,\na frequently heard topic \"Amplifier without Feedback\". This feedback is of course negative feedback. Because positive\nfeedback is the oscillator. We need to understand a simple concept: linear circuit. Linear circuits are also called analog\ncircuits. The traditional amplifier is an analog amplifier. Now there is a digital amplifier in the audio market, that is,\na class D amplifier. Analog amplifiers are also called feedback amplifiers or linear amplifiers. Because no device can have\na completely linear amplification characteristic. To achieve linearity, the amplifier must introduce negative feedback. So\nany linear amplifier must be a feedback amplifier.\nEvery amplifier design hopes to achieve a balance in the smoothness\nof the sound, the details of the music, the sense of speed, and the micro dynamics. Because power amplifiers need to drive\ncomplex inductive and capacitive loads, it is more difficult to satisfy this balance. Therefore, the design of some pre-amplifiers\nhas increased the consideration of matching certain power amplifier characteristics to achieve this balance in the overall\ncoordination of the system. Using this effectively, we can find many combinations of amplifiers that can be matched with each\nEarlier preamplifiers have more functions. They have more complicated wiring,\nmaking the sound richer, but also accompanied by some muddy. In the period when operational amplifiers were widely used, this\nmuddy sound has become the sound characteristic of audio equipment in this era. However, on some line amplifiers with relatively\nsimple circuit structure, we can still hear a relatively clean sound.\nLater produced preamplifiers. As the signal source\ngradually becomes more single, the circuit structure of many preamplifiers is closer to the line amplifier in design. The\ncircuit structure becomes simpler, combined with the improvement of component quality and technological progress, the timbre\nof the amplifier can be controlled more artificially. Therefore, there are more preamplifiers with various sound effects for\nus to choose from.\nSome preamplifiers are equipped with tone or working bandwidth control functions. These functions\nwill change the phase characteristics of the amplifier, thereby changing the sound state.\nThere are some passive volume\ncontrollers on the market that are used to replace preamplifiers. The use of such equipment will require: 1) High-quality\nsignal interconnection lines, whose length should be as short as possible, especially the output end interconnection lines;\n2) The receiving end equipment needs to have high input resistance and low input capacitance. However, most semiconductor\ndevices do not have high input resistance; most vacuum tube devices do not have low input capacitance. Therefore, it will\nbe more difficult for this type of equipment to get a perfect fit. If the above conditions are not met, after using this type\nof equipment, the frequency response and phase characteristics of the audio system will undergo considerable changes.\nThe audio system is connected to an analog equalizer, which will produce severely chaotic\nphase characteristics. Changes in the phase characteristics will inevitably affect the sound state. The digital equalizer\nhas good phase characteristics. However, the signal requires A/D and D/A conversion in a digital equalizer, and the sound\nquality depends on the functional quality of these conversion circuits. Digital equalizers with digital inputs and outputs\ndo not have the above problems. Many new generation professional mixers use this type.\nquality of the power amplifier depends to a large extent on its driving performance. This drive performance can easily be\nmisunderstood as the output power, internal resistance and other technical indicators of the amplifier. We have no shortage\nof examples to see which tube amplifiers with only a few watts of power output can still play melodious music. However, their\ninternal resistance is not very small, nor do they have good technical indicators. How much power the power amplifier can\noutput indicates how much power reserve it has. This is not necessarily related to drive performance. The reason is as if\nthe driving performance of a car is not necessarily related to whether the car has strong power. Unless this reserve power\nis not enough for the speaker vibration system to produce the required motion. The power amplifier has good driving performance,\nso that the speaker tray can accurately follow the signal waveform to move.\nIf we look at the speaker from another\nangle, we can think of it as a linear motion motor. In this way, we can further understand the importance of drive performance.\nDrive performance is related to the effectiveness of control. In many cases, the speaker's vibration system loses control,\nresulting in machine-like inertial vibration, which is considered to be the original low-frequency component of music. In\nfact, this is an example of poor driver performance. This type of sound is characterized by a single frequency as the main\ncomponent, and maintains the same sound pressure amplitude in a short period of time. It is similar to acoustic resonance\nin a room, and we can easily recognize it from the sound of music.\nThe drive performance is not necessarily related\nto the device type. But in this respect to achieve the same performance, different device types still have some differences.\nThe tube amplifier has an output transformer, and its driving force is relatively weak due to obstruction. If the amplifier\nhas a large internal resistance, when matched with a high-compliance speaker, there will be a longer period of under-driving.\nIn addition, because the amplifier uses an output transformer, the change in speaker impedance will be equivalent to the power\namplifier tube having a load that alternately changes between capacitive and inductive. This easily leads to phase distortion\nof the signal. Faced with these situations, the drive design of the tube power amplifier will encounter more difficulties.\nIf vacuum tube amplifiers are required to have the same driving performance, their design also needs to solve their relatively\nmore unfavorable factors. Any power amplifier with an output transformer must encounter the above-mentioned problems. Avoid\nusing high-compliance speakers and choose speakers with relatively flat impedance characteristics, which can reduce their\nrequirements for amplifier drive performance. This choice is equally valid for power amplifiers of any type of device.\nDrive performance is a technical topic. It refers to the ability of the amplifier to respond appropriately to the state\nto maintain its drive. This involves many aspects of control technology issues, which are not part of the content of this\npage and will not be discussed here.\nThe advantage of the high-power output amplifier is that after matching with the\nspeaker, the output of the amplifier can have a wider range to maintain excellent electrical/acoustic conversion linearity.\nHowever, this only makes sense when comparing products of the same brand and the same series. Different brands or different\nseries of products may have different circuit structures or use different technologies. Its performance has been different,\nand there is no such inevitability.\nThere is no absolute advantage in high-power output amplifiers. In the case of\nthe same power output, the high-power amplifier will cause greater disturbance to the energy supply and cause greater interference\nto other devices. Adding power supply filter capacitors or modifying its internal power supply cannot effectively improve\nthis interference. It needs to reduce the internal resistance of the power supply network to solve this problem. Find out\nhow far the street grid transformer is from home, how many users the power supply line passes through, etc. These are all\nfactors of the internal resistance of the grid and external interference. Certain power filters may also increase the internal\nresistance of the power supply network. In the case of the same internal resistance of the power grid, the interference of\nthe full class A power amplifier to the power supply will be relatively small. Higher efficiency circuits will produce greater\nClass A power amplifier\nThere are two types of Class A power amplifiers, one is\nhalf A type, and the other is full A type. Most half-A amplifiers are high-power amplifiers. These semi-A amplifiers work\nin the Class A state when outputting 2~3W of power (some may be larger). If they exceed this range, they will switch to the\nClass B state. The power tube of the full A power amplifier works in the A state all the way. The single-ended drive tube\namplifier is a full A type.\nCompared with the class AB power amplifier, the power tube of the class A power amplifier\nstill needs to perform voltage swing under the high current state when the output is weak. Therefore, the speed of state changes\nwill be relatively low (longer response time). This circuit has a strong micro-motion filter, and the sound is relatively\nsmooth. The intensity of the micro-dynamic filtering of the semi-Class A power amplifier will increase with the increase of\nthe depth of the Class A state. When it reaches a certain level, the original details of the music will gradually decrease.\nFull Class A power amplifiers have stronger micro-dynamic filtering.\nDue to the slower speed, the intermodulation distortion\nof the Class A power amplifier is larger. A small amount of intermodulation distortion products can change the timbre of the\nsound. As the number of frequency components of a music signal increases, the influence of intermodulation distortion increases.\nWhen playing some music with a wide frequency range (such as music played by a large orchestra), the sound will be messy.\nThe degree of confusion is related to the overall phase characteristics of the audio system.\nOne of the main features of the Class A power amplifier is that the power device will not be turned off during\nthe entire working process. This feature is easy to misunderstand, thinking that there is no cross distortion in Class A power\namplifiers. On the surface, the power device is not off, and it seems that the cross distortion can be eliminated. However,\nthis is not the case. The cross mentioned here includes two aspects. One refers to the transition of the on-off state of the\npower device. The other is the process in which the sine wave trajectory passes through the positive and negative alternating\npoints of zero amplitude. The cross problem caused by the turning off of the power device has been solved in the AB circuit.\nAnother sine wave cross distortion is a problem that can never be completely solved, especially for Class A amplifiers.\nWhy is sine wave crossover distortion a problem that cannot be completely solved? This is a basic topic. We need\nto explain from the formation of sine waves. In the Cartesian coordinate system, the vector whose starting point falls on\nthe coordinate origin (0, 0), takes the starting point as a fixed point, and performs circular motion at a constant angular\nvelocity. In motion, the magnitude of the end point of the vector on the Y axis (the horizontal projection of the end point\nof the vector on the Y axis) is the amplitude of the sine wave corresponding to a certain radian. At the zero crossing point\n(Y equals 0) of the sine wave, the circle tangent is orthogonal to the X axis. The circle tangent is the slew rate of the\nsine wave trace. The tangent of the circle at the zero crossing point is a vertical line, which means: the sine wave has an\ninfinite slew rate at the zero crossing point. Regardless of the frequency of the sine wave, the situation where the slew\nrate is equal to infinity at the zero-crossing point will not change.\nFor technical reasons, there is currently no\namplifier with a conversion rate equal to infinity, and such amplifiers will not appear in the future.\ntechnical conditions, the main problem of sine wave cross distortion is speed. On the contrary, when the output is weak, the\nstate of the Class A power amplifier changes slowly, which is not conducive to improving the cross distortion of the sine\nwave. Therefore, the full class A power amplifier only has the characteristics of not turning off the power device. Not only\ncan it not solve the problem of sine wave zero-crossing distortion, but it will also produce greater sine wave zero-crossing\ndistortion under the same conditions. In addition, the non-turn-off feature allows the power device to withstand greater voltage\nswings. For existing power devices, this will have relatively poor linearity. In various test spectrograms, we can also see\nthat the distortion of the Class A power amplifier is greater than the distortion of the Class AB power amplifier.\nwe have made some explanations on the formation mechanism of sine wave crossover distortion. The technical indicators of sine\nwave distortion are usually measured on audio equipment. However, the audio equipment handles music electrical signals in\nactual work. Therefore, if we want to accurately assess the substantial impact of various distortions of audio equipment on\nmusic playback, we need to discuss them in conjunction with the characteristics of music electrical signals.\nThe biggest feature of the tube amplifier is that people have the fun of \"playing\", and\nthe process is very convenient, and there is no requirement for technical knowledge in operation. If we do not have very high\nrequirements for music details and use a tube amplifier, we can easily replace the tube to meet everyone's own sound preferences.\nRegardless of whether the brand or model of the tube is the same, each tube has its own sound personality. However, the\nuse of tubes to \"play\" sounds may only be suitable for preamplifiers. Because we rarely see the life of the power\ntube can exceed 2000 hours. After this time limit, its puberty will disappear, and the sound will change with the electrical\ncharacteristics of the tube. This is one of the biggest weaknesses of tube amplifiers. However, the Achilles heel of the tube\namplifier does not lie in this.\nSuch problems can be found in audio systems with high-resolution capabilities. When\nthe amplifier is replaced with a tube, you may Hard to get back the sound effect you originally liked. The electron tube used\nin the preamplifier can have a relatively long life cycle, and some brands can reach 10,000 hours. However, they will gradually\nage without being noticed, and at the same time, their voices will change accordingly.\nwith other equipment, the speaker is the only component in the audio system that does not reach the ideal level of technical\nindicators. At the same time, it is also the most personalized component with the largest relative difference in electrical\nImpedance Characteristic. In the effective working frequency range, no loudspeaker can have a horizontally\nflat impedance characteristic. After the speaker is connected to a power amplifier with an output transformer, the change\nin speaker impedance will cause micro-dynamic distortion of the amplifier. If the audio system uses a power amplifier with\nan output transformer, choosing a speaker with a relatively flat impedance characteristic curve will help reduce this distortion.\nPhase Characteristics. In the effective working frequency range, no loudspeaker can have horizontally flat phase characteristics.\nBy adjusting the placement of the speakers, the phase characteristics can be corrected to a certain extent. A speaker with\nflat phase characteristics is more conducive to reproducing real sound, and its placement location can also have more choices.\nFrequency Response Characteristics. In the effective working frequency range, no loudspeaker can have a horizontally flat\nfrequency response characteristic. Frequency response characteristics will affect the timbre of the sound, but this is different\nfrom the change in timbre caused by distortion. This effect will be linear. It is only equivalent to the personality difference\nof the same instrument but different timbre, and basically does not cause the change of the sound state.\nCompared with other side rings, rubber ring speakers have greater machine inertia. Changes in the state\nof the vibration system (paper tray, voice coil, etc.) will inevitably have a relatively long response time. This feature\nmay have the following two situations when the amplifier drives the speaker. 1) Under-drive, there is a strong micro-dynamic\nfilter, which will increase the ambiguity of the sound; 2) Over-drive, the vibration system will have overshoot. The chances\nof the above two situations in the speaker will increase as the inertia of the machine increases.\nCompared with the\nrubber ring, the foam and cloth ring speakers have a smaller machine inertia, it is easier to obtain the cooperation of the\npower amplifier, and the probability of underdrive or overload is relatively low.\nWhether the loudspeaker will appear\nunder-driving and over-driving, depends on the interaction between it and the amplifier. As the inertia of the vibration system\nincreases, the speaker's requirements for amplifier drive performance also increase.\nEvery time you use the speaker,\nyou need to warm it up for a period of time before it can enter the linear working state. The loudspeaker has greater inertia\nand requires longer Warm-up time.\nIn the audio system, the cable is the most special component\n. A cable is an electronic circuit mainly composed of distributed components. The parameter values of the distributed component\nare uncertain and the range of dispersion is large. This has the characteristic that different wires will have different transmission\ncharacteristics. This can also be used to change the sound state and timbre. With the simple method of changing cables, you\ncan get the kind of sound and tone you like relatively easily.\nEach brand of interconnection\ncable has its own different sound characteristics. However, there may still be some differences in the sound effects of interconnecting\ncables of the same brand or even the same model but in different production batches. Signal interconnection lines basically\nhave such characteristics. The same pair of interconnection lines are used in different systems, and the sound characteristics\nof the interconnection itself remain unchanged.\nBalanced or Single Ended\nBalanced signal transmission\nhas stronger anti-interference ability and better isolation. Therefore, for signal transmission, the balanced mode always\nhas better transmission quality than the single-ended mode. However, when choosing a signal port, we also need to consider\nother factors. If the device does not process the signal in a fully balanced manner, its input or output port needs to have\na single-ended/balanced conversion or reverse conversion circuit. The quality of these circuits will affect the sound quality.\nGenerally, as long as one of the two equipments processes the signal in a fully balanced manner, the effect of balanced\ntransmission will be better. If the two equipments are single-ended processing signals, you need to consider factors such\nas the transmission distance of the signal, the functional quality of the conversion circuit, and the isolation design of\nthe equipment. Therefore, the signal terminal selection in this case often needs to be compared on a specific equipment to\ndistinguish the pros and cons of the signal connection.\nEach speaker has its own\nelectrical characteristics, and there are significant differences between each model. Therefore, the speaker becomes the most\npersonalized unit of the audio system. Unlike signal interconnection cables, speaker cables are a type of power transmission\ncable. Two issues, standing wave and real-time spectrum, will affect the sound state at the same time.\nsignals have a wide frequency band (10 octaves). The power transmission of each frequency component has its own standing wave.\nAnd the respective standing wave amplitude will vary according to the electrical characteristics of each speaker. Combined\nwith the real-time problem of the frequency spectrum, after the music electric signal is transmitted, the waveform changes\nof different speakers will be different, and the sound state will also be different. In this way, the speaker cable will inevitably\nbecome a special component that matches the personality of the speaker.\nFor a specific speaker, using different cables,\nthe sound will have different sound states. With this function, you can get your favorite sound effect relatively easily by\nchanging the speaker cable.\nTo a certain extent, the power cord can be equivalent\nto a filter. From the power supply connection point to the connection line before the power transformer generates the magnetic\nfield, there is always a certain degree of filtering. Different power cords may have different filtering characteristics.\nOn the other hand, each equipment may also need different filtering characteristics to get the best results. Therefore, if\nthe power cord of one equipment is used on another equipment, completely different results may occur.\nOptical fiber can withstand electromagnetic interference, so it has certain advantages for long-distance signal\ntransmission. And this advantage will increase with distance. However, the photoelectric conversion and reverse conversion\ncircuits of the equipment will inevitably increase the jitter of the data stream. Therefore, whether the advantages of optical\nfiber can compensate for the increased jitter in the device data stream may vary from system to system. Optical fiber is more\nsuitable for professional equipment for long-distance signal transmission over tens of feet. Household equipment only transmits\nsignals over short distances. The advantages of optical fiber may be difficult to compensate for the defects caused by photoelectric\nconversion. Except in environments with strong electromagnetic interference, or the system must use a large number of digital\n(or high-frequency) cables, home music playback systems try to avoid using optical fibers to transmit digital signals.\nThe sound of LP originates from the physical structure. No matter how the sound quality\nis, the change of its sound pressure value will always have a transition time related to the physical structure. Therefore,\nLP can basically have the characteristics of soft sound. To maintain this characteristic, accurate stylus pressure is necessary.\nTo maintain accurate stylus pressure under dynamic (working) conditions, the strut mechanism of the vocal arm will play\nan important role. The arm strut mechanisms of different axial types have different following characteristics for the oscillating\nmovement of the stylus, which specifically affects the timbre and sound state.\nThe stylus pressure will change with\nenvironmental factors, such as temperature, humidity, air pressure, etc. The pressure scale on the tonearm can only be used\nas a reference, and it is difficult to rely on it to obtain accurate stylus pressure. For users of LP turntables, there may\nbe an unexpected gain with an accurate stylus pressure gauge.\nRIAA Equalization (preset equalization) only has an agreement\non the amplitude-frequency characteristics, but does not establish a specification for the phase characteristics. Different\ntypes of analog inverse equalization circuits have different phase characteristics. Therefore, different phono amplifiers\nmay also have different phase characteristics. The phase characteristics will affect the sound state, however, this parameter\nusually does not appear on the product's technical indicators.\nFor the MC step-up\ntransformer, the input impedance of the MM amplifier is the load of the transformer. The capacitance on the load will have\na considerable negative impact on the signal transmitted by the transformer. Under certain conditions, the transformer has\nthe characteristics of capacitance/inductance conversion. This characteristic makes the capacitance on the load equivalent\nto an inductance in series with the transformer input. This will inevitably produce strong micro-dynamic filtering, causing\nserious loss of high-frequency components of the music signal.\nTherefore, if the MC step-up transformer is used, you\nneed to: 1) Minimize the input capacitance of the MM phono amplifier; 2) The output terminal interconnection line must be\nof low capacitance and shorten the length as much as possible. Regarding the first point, compared with semiconductors, electronic\ntube equipment generally has a larger input capacitance, so it is not easy to meet this requirement.\nIn the history of audio development, audio CD is the first music signal source that does not require the\nuse of preset equalization in its standard. This provides a solid foundation for the signal source to obtain flat phase characteristics.\nThe sound of CD is also related to the physical structure, which is a bit similar to LP.\nHowever, the impact of CD structure quality on sound quality is quite different. In the extrusion process of CD disc production,\nthe physical properties of the plastic inevitably lead to the slope of the pit edge with a short cooling time. This slope\nbecomes the gray area between digital states 0 and 1. The length of the cooling time will change the width of the gray area,\nand specifically control the degree of data jitter. The data will have errors due to this jitter, and even after the data\nis decoded, there will be analog signals that do not match the original record. For information on the mechanism that causes\nCD data errors, see CD Disk Data Jitter.\nCD optical disc media has such characteristics, which puts forward more stringent\nrequirements on CD players. Even so, if some high-quality CD discs are paired with a high-quality CD player, the sound quality\nwill still be better than other audio sources. For example, XRCD has good sound effects on many HI-End players.\ncodes AAD, ADD, DDD marked on the CD disc not only indicate which stage of the technology is used in the music recording on\nthe CD disc. Through these codes, we can also know whether the music signal on the CD is processed by an analog mixer. Analog\nmixer will affect the sound quality of music playback from the aspect of phase.\nThe sound quality of an audio CD will\nnot only be affected by burning and post-production, but the structural quality of the disc will also affect the accuracy\nof the data and ultimately affect the sound quality. The production process of some CD discs shortens the cooling time to\nincrease productivity. As a result, the quality of the pit structure representing the data is reduced. The amount of jitter\nof CD disc data has also increased. We can distinguish these CD discs by simply observing the transmittance and uniformity\nof the reflective layer. CD discs with relatively thick and uniform reflective layers usually have a longer cooling time.\nThey will always have better structural quality.\nThe setting time of multi-bit\ndigital/analog chips is relatively short, and can be converted more accurately and faster, so the sound detail density is\nhigher. Many early CD players were equipped with this type of chip.\nThe one-digit digital-to-analog chip has poor conversion\naccuracy and softer sound. One and multiple digital/analog hybrid chips are also used in recent CD players. The electrical\ncharacteristics of this type of chip are between one-bit and multi-bit chips, and are closer to multi-bit chips. CD players\nproduced in later stages mostly use the above two types of chips.\nIn the post-production of CD Transports, they used\na more mature digital signal processor (DSP). These DSP chips include a 32Kbit CIRC decoder memory, which can process data\nfaster, so there are more time resources to correct more data errors. The decoder with 8x digital filter and multi-bit digital/analog\nchip is used as an analog unit with post-production CD transmission. This method combined with a CD player can usually achieve\nhigher detail density.\nIf the CD player uses an external clock, it needs to be\nequipped with a high-quality digital cable to transmit the clock signal in order to avoid the clock's large jitter after long-distance\ntransmission (relative to the internal clock). We can use the stage depth in music playback to compare the jitter of the clock.\nA CD player with less clock jitter has a deeper stage and a quieter music background when playing music. At the same time,\nthe environmental sound will be clearer and closer to the reality (using the environmental sound to identify the degree of\nrestoration of the original music details, the easiest to get an accurate judgment. You can also use this method to compare\nthe degree of jittering CD disc data).\nFor the Up-sampling, please refer to The quality\nof audio equipment.\nSACD is another digital format music source that uses PWM (Pulse Width\nModulation) encoding. At present, SACD players have not solved the problem of noise in the frequency band above 40KHz after\nDSD decoding. For audio systems using such signal sources, avoiding the use of amplifiers with broadband response characteristics\ncan reduce the interference of such noise.\nCompared with CD, SACD disc has a higher data storage density. Due to the\nuse of plastic as the data carrier, data stream jitter is more difficult to control. Therefore, under the same technical conditions,\nSACD playback will be more prone to data errors. For 24bit/96KHz and DVD Audio digital music formats, because they also have\na higher data storage density, they will also encounter this problem.\nAbout various coding formats\ndigital music formats such as CD, SACD, DVD Audio, 24bit/96kHz, many people have compared their sound quality. Regardless\nof whether the evaluation of these comparisons is positive or negative, their statement is basically correct. This includes\ncompanies that develop coding formats, and their claims about the superiority of coding formats are also correct. These conclusions\nand statements may contradict each other. The reason is that there are some differences between ideals and reality. In principle,\n24bit/96kHz is better than 16bit/44.1KHz, which is inevitable. But need to meet such a condition: the playback device can\nread the correct data, and can accurately convert the data into an analog signal. In actual use, the extent to which the playback\ndevice satisfies this condition determines the sound quality and the size of the difference, which specifically affects the\nresult of each comparison.\nAnother topic of the same nature is the difference in sound quality between CD and LP. After\nthe CD appeared, the discussion on this issue did not stop. Until today, thirty years later, LP is once again sought after\nby fans. This phenomenon only reflects the actual CD in use, and there is indeed a gap between sound quality and LP that cannot\nbe underestimated. Just like the accuracy of emotional expression that is essential in music playback. Of course, if we regard\nmusic as language, the accuracy of its emotional expression is also very important. We also compared the sound of CD and LP.\nIn our comparison, audio CD music playback has better performance. This is reflected in some singing performances. We can\nfeel that singers have appropriate emotional expressions when performing works, and music can more accurately depict the artistic\nconception of lyrics. This is because CD has a technical foundation that provides more musical details. When the player gets\nthe correct data, the sound quality of an audio CD is of course better than that of an LP record. However, this result cannot\nrepresent a general phenomenon. This is also because the quality of CD and LP sound quality and the degree of difference are\nalso restricted by the conditions of whether the playback device can obtain the correct data. So our comparison result may\nbe different from others.\nMany factors affect the gap between ideal and reality.\nWith the consumer-grade playback equipment we currently use, and the use of plastic discs as data storage media, it is difficult\nfor the player to correctly obtain the data on the CD with the data storage density of the CD. For digital music formats with\nhigher data storage density, more errors will occur when the player reads the data. The superiority of these more advanced\nformats is not enough to make up for the loss of sound quality caused by data errors.\nAs more and more data is generated,\nplayers need to have a higher speed to process the data. As the operating speed of the device increases, the frequency of\nthe bit clock must be increased accordingly, that is, the cycle time of the bit clock will be shortened accordingly. Under\nthe same technical conditions, as the period of the bit clock is shortened, the jitter of the bit clock relative to the period\ntime will increase accordingly. At the same time, as the bit clock period is shortened, the jitter of the data stream relative\nto the bit clock period will increase accordingly. In other words, as the working speed of the equipment increases, the probability\nof data errors also increases.\nAnalog signal accuracy\nD/A chips produced by the same technology.\nCompared with low frequency, high frequency sampling will increase the error component of the analog signal after digital-to-analog\nconversion. The process of converting each digital data into an analog signal requires a short settling time (settling time)\nto make the analog value accurate. The voltage (or current) value after this stabilization time is the value that the analog\nquantity should have.\nHigh-frequency sampling will have a greater number of settling times, and the amount of error\n(the amount within the settling time period) will occupy more time space. Therefore, when the sampling frequency is increased\nto a certain extent, the time for the accurate value of the analog quantity is shortened, and the time for the error value\nis increased. That is, the proportion of analog signals containing errors increases. The influence of the settling time on\nthe accuracy of the analog signal will subsequently reach a level that cannot be ignored.\nThe above-mentioned problems\nare just some of the many shortcomings. They affect the sound quality of music playback in terms of data correctness. Although\nin theory, many digital music formats and sound quality enhancement modes have some advantages. However, due to various restrictions,\nthey may not currently bring the expected results. There are some differences between ideals and reality, and it is necessary\nfor our technicians to reduce these differences. CD disc data low-jitter processing Tai Chi backup is an improvement measure\nfor audio CD data prone to errors in actual use. It is further confirmed that whether the playback device can obtain the correct\ndata is the key to whether the advanced encoding format can exert its advantages.\nLast revision date: Aug-2021", "label": "Yes"} {"text": "Along with the rocket development of industry and technology, we must fully acknowledge the severe impacts of climate change. In the long run, protecting the environment and finding more sustainable energy sources is what guarantees our existence on Earth. Therefore, scientists have come back to utilize natural and renewable energy such as wind power, solar power, or tidal power. Yet, there is still a long road to fully adopt these alternatives, and machine learning can be the perfect ally to shorten the process.\nWhy machine learning is the perfect match for renewable energy\nAt the first hearing, no one could find the connection between machine learning and renewable energy. Yet, the unique characteristics of this industry are the perfect fit for the technology to showcase its full potential.\nRenewable energy comes from renewable sources, which are usually what mother nature has already offered us. Some of the most popular sources are sunlight, wind, rain, tides, waves, and geothermal heat. Although holding great possibilities, these recyclable sources are hard for humans to control due to the unpredictability of nature. Our ancestors have come up with general indicators and annual forecasts for common weathers like when the rainy season is likely to start. However, they are showing little help over time due to the negative impacts of climate change.\nIn 2017, nearly 80% of global energy sources came from fossil fuels. To protect the environment as well as avoid overexploiting, governments are focusing on the long-term development of renewable energy. The first quarter of 2020 witnessed a 1.5% increase in global use of renewable energy in all sectors compared to 2019. Furthermore, countries must at least triple the production of global recyclable power, such as wind and solar, to achieve climate neutrality goals by 2050. Following this increasing adoption of renewable energy, scientists are under huge pressure to provide more accurate weather forecasts.\nSince the beginning of time, meteorologists have collected weather data; the first meteorology document dated back to 350 BC. This data has been building up every day along with the development of mankind. To process all the information and transform them into useful insights for renewable energy implementation, machine learning is the only plausible choice with smart pattern-based prediction and huge data analysis.\nMore than an efficient roadmap to change the environment, machine learning is the key to open new possibilities in the power sector. Some of the most noteworthy benefits that machine learning offers to the future of the renewable energy industry include:\n- Substantial and precise inspections: Governments and organizations can now get access to flawless analysis based on a rich history source.\n- A cost-effective and resilient energy grid: With accurate forecasts, meteorologists can suggest a suitable energy plan to the authority to support particular demands. The new recyclable energy will soon be considered “dispatchable,” which means it can provide a specific amount of power when needed.\nHow machine learning optimizes renewable energy production and consumption\nWeather and risks prediction\nThe most important factor in ensuring the success of a renewable energy plan is weather and risk prediction. Usually, scientists research the physics of the weather itself and compare them with previous phenomena. However, with machine learning, this process has been greatly simplified.\nDaily weather data is saved to a database, and then computers will run the system to create predefined models. If the same phenomenon happens in the next period, the application can automatically sort them into the correct weather model. Furthermore, each model is programmed to predict how the weather will affect the result of the renewable energy plans. The forecast will help organizations to further understand how the environment can facilitate the energy grid and focus the resource on potential time frames. Comprehensive machine learning can forecast up to 30 days prior, which can be seen in IBM’s system.\nThe US Energy Department has witnessed a 30% increase in solar power predicting accuracy thanks to machine learning. This machine learning application in renewable energy has also been implemented successfully by the UK’s National Grid. Combining satellite imagery, observation, and deep learning, they have summarised the data of hundreds of power hubs throughout the country to forecast the weather accurately. “If you’ve got a cold front moving in and [a model] has seen something similar before, we can predict the likely impact of that front on solar generation.”, said James Kelloway, energy intelligence manager at the National Grid’s Electricity System Operator division.\nEnergy demand forecast\nNot limited to only following climate changes, machine learning takes a further step into forecasting power demand. For example, summer is when the need for power climbs up rapidly, yet this is still only a general statement. To better analyze the fluctuation and prepare practical strategies, scientists rely on the power of machine learning.\nSharing the same methods as weather forecasting, this machine learning application in renewable energy tracks changes and behaviors of users when consuming energy on different periods then builds up a model for each phenomenon. After that, it suggests a number based on historical energy usage data. The information can tell organizations to generate more energy or cut down on unnecessary sources.\nFor example, Verdigris Technologies is a technology company that provides a software platform to optimize power consumption. With an IoT hardware installation and smart sensors attached to the energy grid of the clients, Verdigris Technologies can smartly identify insufficient energy sources. One of their customers, W Hotel San Francisco, has recognized $13.000 preventable energy annual losses in their kitchen just after 3 months of using the system.\nIntelligent maintenance and infrastructure design\nOne factor that determines the win or loss of a renewable energy implementation is the maintenance post-installation. Unlike other sources, natural powers don’t get generated from a self-contained factory. For example, solar plants or wind turbines cost thousands of dollars to build, yet they are usually in the middle of nowhere, with little intervention from people. It will be a smart move to proactively take a closer look at the performance of these installations. When you successfully maintain the health of the input, your energy grid could easily and seamlessly cover the output demand.\nMachine learning takes advantage of both past and present data to develop the future performance of the energy system. Some of the most common intelligent maintenance are anomaly detection, failure prediction, and automated monitoring. Researchers have confirmed that with AI applications, predictive maintenance is up to 25.3% more effective and 24.6% more accurate.\nApplications of machine learning in renewable energy also opens a new door for smart infrastructure design or smart buildings. According to GlobeNewswire’s report, the global smart building market is predicted to reach $127.09 billion by 2027. More and more architects are building houses with an intelligent energy management system as the core of the design. Appliances are powered by solar power and controlled by AI or voice command, which allows us to command them to auto-perform simple tasks remotely.\nOn a smaller scale, you can take a look at how Verv – an AI-based tool, supports energy management. This application records how household appliances consume energy and alerts users when a device is left unconsumed for a long time. This helps saving energy expenses as well as protecting devices not to be overused.\nSmart energy grid\nFollowing proactive maintenance, an intelligent energy grid is what companies are looking for when applying machine learning in renewable power. One of the most challenging tasks for any energy plan is how to distribute energy to multiple locations effectively. The unpredictable traits of natural resources such as solar or wind power make this issue much more complicated. However, machine learning has the perfect answer to this riddle.\nBy implementing machine-based applications, companies can avoid fraudulent actions such as electric theft and provide scalable power strategies for long-term development. A balancing and smart energy grid can help organizations to answer tricky questions, such as:\n- The most and least power-needed locations\n- The highest and lowest power supplying locations\n- The frequency of blackouts\n- The locations require additional energy-generating infrastructure\n- The abnormal power-consuming locations\nMachine learning is taking step by step closer to managing the energy grid to fit human needs. Jack Kelly, co-founder of non-profit climate change research and development lab Open Climate Fix, proposed: “It is still quite manual, so it’s humans looking at what’s happening on the grid now and humans instructing generators to change their behavior to try and better match demands, over time horizons of an hour or less typically.”\nA great example of how machine learning can support energy control comes from the DeepMind AI of Google. Its purpose is to cut down on energy consumption and emission from energy usage. According to Google, the application has managed to cool off Google’s data servers by 40%.\nLearn more about Machine Learning at: The Comprehensive Guide to Understand Machine Learning and Deep Learning\nMachine learning is the answer to the seemingly impossible challenge of implementing recyclable power. Thanks to technology, the distance between planning and practical usage is shortened tremendously. Meteorologists, companies, and governments now have credible evidence and analysis to create a concrete long-term plan for sustainable development. All can be achieved with machine learning applications in renewable energy.\nGEM Corporation is a leading IT service provider who empowers its business clients in their digital transformation journey. Based in Hanoi, Vietnam, GEM is characterized by competent human resources, extensive and highly adaptive techstack, and excellent ISO-certified and CMMi-based delivery process. GEM, therefore, has been trusted by both start-ups and large corporations from many global markets across different domains.Don’t miss our latest updates and events – Follow us on Facebook and LinkedIn!\nQuinn is an enthusiastic marketer with more than 3 years of experience in the eCommerce and Technology fields. Currently, she is the Brand Manager of an omnichannel solution for global retailers. With her strength in storytelling and catching up with tech trends, Quinn delivers splendid insights to business digital transformation processes.", "label": "Yes"} {"text": "We offer a few different solar light options. The first is mounted Solar Powered Dock Lights. These are high quality lights that will last for years on your dock. You be able to see your dock in low light condition and it turns on automatically.\nWe also have pole lights that are completely solar powered. They will give your dock lighting automatically from dusk to dawn.", "label": "Yes"} {"text": "Despite having the greatest wireless routers, do you have poor wi-fi signals? Even if you have the greatest wireless routers, do you have signal difficulties in specific sections of your workplace or home? Wi-Fi-blocking materials such as concrete, metal, thick walls and floors, glass, distance, and signal interference from other devices have contributed to poor and mediocre wi-fi connection quality.\nTo solve the wireless coverage problem, the first thing you need to do is boost your wi-fi connection by employing strategies such as relocating your router or moving it to an open central spot. Regrettably, this does not always work. In such cases, you’ll need to take further precautions like buying a long-range antenna, getting a new wi-fi device, or just altering the router’s antenna. If you’re still having trouble improving your wi-fi connection, look into wi-fi signal boosters, which are specifically intended to provide the finest wi-fi network coverage.\nWhat is a Wi-Fi Booster?\nA wireless range extender is the correct definition of a wi-fi booster. It’s a gadget that receives a signal from a wireless router or access point and rebroadcasts it to form a second network. It acts as a bridge between a wi-fi router and a wi-fi device outside the range of a wi-fi router’s signal. The wi-fi booster first connects to an existing wi-fi network, and once it’s connected, it acts as a wireless access point for wi-fi devices to connect to.\nSo, as an example, most people who have internet service in their home will most likely have a wi-fi router that will broadcast a wireless signal throughout their home so that their wireless devices can have internet access. But sometimes, there might be issues where the wireless signal is not strong enough to cover the entire house.\nHow Does It Work?\nA wi-fi Booster is a separate device placed between the dead zone and your router, to which it is hooked up either wirelessly or through a wire. It works by grabbing the router’s existing signal and broadcasting it on another channel, relaying the connection into the spot you want to be covered. In its most basic form, a wi-fi Booster serves as a conduit between the dead zone and your router, expanding the latter’s signal across the remainder of your house.\nAs a result, an internet connection may be discovered almost everywhere, regardless of obstacles. Wi-fi boosters, as handy as they are, are far from failsafe. Their efficacy is determined by where they are located. The device must be placed close enough to it to pick up the router’s signal. It must, however, be far enough away from the dead zone to rebroadcast the signal.\nTypes of Wi-Fi Booster:\nWi-fi boosters are of two types: 1- Wireless Wi-fi Boosters 2- Wired Wi-fi Booster\n1- Wireless Wi-Fi Booster:\nA wi-fi booster allows multiple wired and wireless devices to join together in a local area network. It will broadcast a wi-fi signal so that wireless devices can connect to it, and it also has a built-in switch with several network ports so that wired devices can connect to it using Ethernet cables. And then that wi-fi router will directly connect to a modern to give those devices internet access.\n2- Wired Wi-Fi Booster:\nWired wi-fi Boosters are a great or desirable option for achieving high connection rates with minimal disturbance. Wired wi-fi boosters attach to your existing coax line in your office or wherever you wish to connect to expand your wireless network to regions where signal strength is weak.\nIs It Worth Investing in a Wi-fi Booster?\nIf you have connectivity issues due to a dead zone in your home, then a wi-fi booster would be extremely useful. Not only will it allow you to browse the web in that particular spot, but it will also increase the number of places from where you can work. Unfortunately, a wi-fi booster won’t cut it if your goal is to increase internet coverage throughout your entire home. For that, you will need a new router or a new service provider.\nConsiderations When Purchasing a Wi-fi Booster:\nIf you are planning to purchase a wi-fi Booster, you must need to consider the following things.\nRange may help you get an estimate of the coverage provided by your wi-fi Booster.\nWi-fi Boosters are meant to Boost wi-fi coverage and not increase the speed directly. However, ensuring that the speed provided by your wi-fi Booster is not less than that provided by your router will enable a connection as fast as your wi-fi.\nAn ethernet port in your wi-fi Booster is useful because you can directly connect a wired device to it for high-speed internet.\nFrequently Asked Questions (FAQs)\nDo Wi-fi Boosters Help to Get Rid of Dead Zones?\nAnswer: wi-fi boosters help you get rid of dead zones and let you set up an access point mode by connecting it to an internet source.\nWill a Wi-fi booster help you enhance your wi-fi signal?\nAnswer: It depends on where your device is positioned. The wi-fi booster might assist in strengthening the wi-fi signal. If the internet service is not the bottleneck, a better wi-fi connection might aid with online streaming to the Broadcast. It’s best to validate this by testing the Screen adjacent to the internet service router.\nWhat’s the difference between a range extender and a wi-fi booster?\nAnswer: wi-fi range extenders are also known as wi-fi repeaters, and wi-fi boosters are frequently used simultaneously. While they both increase the area covered by your wi-fi, they do it in distinct respects.\nHow can you tell whether your wi-fi booster is functioning properly?\nAnswer: The improvement in signal in the weak zone and dead zone sectors is the first evidence that the booster is operating. However, if you are a numbers person who prefers hard evidence, speed tests are excellent tools for analyzing wi-fi signal changes.\nTo summarize, you better understand how wi-fi boosters’ function by reading the preceding article. It gives optimal wi-fi coverage for your house or workplace. The wi-fi booster will increase network coverage so that your laptops, tablets, and smartphones can stay connected with less interference. With wi-fi boosters installed, you can enjoy continuous streaming, gaming, and other online activities in any section of your house or business.", "label": "Yes"} {"text": "AUSTIN, Texas — The University of Texas at Austin will be a key player in LaserNetUS, a new national network of institutions operating high-intensity, ultrafast lasers. The overall project, funded over two years with $6.8 million from the U.S. Department of Energy’s Office of Fusion Energy Sciences, aims to help boost the country’s global competitiveness in high-intensity laser research.\nUT Austin is home to one of the most powerful lasers in the country, the Texas Petawatt Laser. The university will receive $1.2 million to fund its part of the network.\n“UT Austin has become one of the international leaders in research with ultra-intense lasers, having operated one of the highest-power lasers in the world for the past 10 years,” said Todd Ditmire, director of UT Austin’s Center for High Energy Density Science, which houses the Texas Petawatt Laser. “We can play a major role in the new LaserNetUS network with our established record of leadership in this exciting field of science.”\nHigh-intensity lasers have a broad range of applications in basic research, manufacturing and medicine. For example, they can be used to re-create some of the most extreme conditions in the universe, such as those found in supernova explosions and near black holes. They can generate particles for high-energy physics research or intense X-ray pulses to probe matter as it evolves on ultrafast time scales. They are also promising in many potential technological areas such as generating intense neutron bursts to evaluate aging aircraft components, precisely cutting materials or potentially delivering tightly focused radiation therapy to cancer tumors.\nLaserNetUS includes the most powerful lasers in the United States, some of which have powers approaching or exceeding a petawatt. Petawatt lasers generate light with at least a million billion watts of power, or nearly 100 times the output of all the world’s power plants — but only in the briefest of bursts. Using the technology pioneered by two of the winners of this year’s Nobel Prize in physics, called chirped pulse amplification, these lasers fire off ultrafast bursts of light shorter than a tenth of a trillionth of a second.\n“I am particularly excited to lead the Texas Petawatt science effort into the next phase of research under this new, LaserNetUS funding,” said Ditmire. “This funding will enable us to collaborate with some of the leading optical and plasma physics scientists from around the U.S.”\nLaserNetUS will provide U.S. scientists increased access to the unique high-intensity laser facilities at nine institutions: UT Austin, The Ohio State University, Colorado State University, the University of Michigan, University of Nebraska-Lincoln, University of Rochester, SLAC National Accelerator Laboratory, Lawrence Berkeley National Laboratory and Lawrence Livermore National Laboratory.\nThe U.S. was the dominant innovator and user of high-intensity laser technology in the 1990s, but now Europe and Asia have taken the lead, according to a recent report from the National Academies of Sciences, Engineering and Medicine titled “Opportunities in Intense Ultrafast Lasers: Reaching for the Brightest Light.” Currently, 80 to 90 percent of the world’s high-intensity ultrafast laser systems are overseas, and all of the highest-power research lasers currently in construction or already built are also overseas. The report’s authors recommended establishing a national network of laser facilities to emulate successful efforts in Europe. LaserNetUS was established for exactly that purpose.\nThe Office of Fusion Energy Sciences is a part of the Department of Energy’s Office of Science.\nLaserNetUS will hold a nationwide call for proposals for access to the network’s facilities. The proposals will be peer reviewed by an independent panel. This call will allow any researcher in the U.S. to get time on one of the high-intensity lasers at the LaserNetUS host institutions.", "label": "Yes"} {"text": "27 January, 2020\nKing Abdullah University of Science and Technology (KAUST) in collaboration with ARMOR, a global technology company and pioneer of solar solutions has created a new style of outdoor seating, incorporating flexible, lightweight and semi-transparent solar technologies.\n05 January, 2020\nWearable electronics could be perpetually powered by stretchy, self-mending materials that use body heat to generate electricity. Three carefully curated organic compounds have been combined to develop a prototype thermoelectric material that is both stretchy and self-healing, can generate its own electricity, and is robust enough to withstand the stresses and strains of daily life.\n27 June, 2019\nSome of the vast amount of wasted energy that machines and devices emit as heat could be recaptured using an inexpensive nanomaterial developed at KAUST. This thermoelectric nanomaterial could capture the heat lost by devices, ranging from mobile phones to vehicle engines, and turn it directly back into useful electricity.\n11 June, 2019\nOrganic solar cells could soon rival traditional silicon-based photovoltaic technologies in terms of conversion efficiency. A team from the KAUST Solar Center has developed a computational approach that provides practical performance targets and useful rules to help design and develop material systems for optimal organic solar cells.", "label": "Yes"} {"text": "Nowadays the AC mains network is heavily polluted by various domestic appliances, industrial electrical consumers etc. This can lead to buzzy toroidal transformers (especially the power ones). Proposed DC trap (blocker, filter) will remove or at least lower the buzzing.\nSchematic is similar to this one used in well known Vladimir Shushurin’s Lamm-1 amplifier. An article with in-dept explanation of how DC blockers work can be found on Rod Elliot’s site (https://sound-au.com/articles/xfmr-dc.htm).\nHere is offered device capable to handle VERY HIGH CURRENTS (up to 30 Amperes intrinsic handled current!!!) assembled in a steel case – black powder coated.\nBecause of such high currents using a standard PCBs is not possible. Instead of that a 2mm. thick pure copper bussbars are used to connect the filter’s parts.\nIn order to carry such high loads the part’s values are upraised with 4 x 47 000 uF capacitors, 25W power resistor etc. For further description of the High-Power DC Blocker see here: High-Power DC Blocker Unit\nNote that the Blocker undergone a redesign and now it has 6 discrete diodes which allows it to block DC shifts up to 2V!\nThe capacitor block is firmly connected to the bottom of the case with brackets and rubber sheet.\nThe input AC connector is Schurter C20 or C14 IEC Inlet. The type of the input AC connector determines the unit’s max. handling current – 20A with C20 IEC inlet and 10A with more widespread C14 inlet.\nThere are two high-quality AC outlet located on the front panel along with the IEC AC Inlet. Each AC inlet can handle not less than 13A AC output current.\nThe customer can chose between EU Schuko, UK, US, French, Australian, Switzerland and even exotic Brazilian style AC Outlets.\nThere are 4 rubber feet on the bottom of the case which ensure that case will not scratch the underlying surface.\nUnit’s weight: 3 kg.\nWhat the buyer will receive:\nThe package will contain 1 pcs. FULLY ASSEMBLED and tested HIGH-POWER DC trap/blocker/filter for toroidal transformers (toroids) in steel case.\nThe unit will be shipped with Priority AirMail Registered (or equivalent courier service where applicable). The tracking number will be sent to the customer after shipment.\nSubmit your review\nI changed amplifiers recently to a very hi power unit (825W into 4Ohm) and felt it was starved of power using the standard DC Blocker. The hi power unit is hands down one of the best investments I have made to date. The sound stage exploded, the transients are noticeably better and the detail is just astonishing.\nThe blocker has really blown the lid off my musical experience. A must buy!", "label": "Yes"} {"text": "What Is Artificial Intelligence?\nArtificial Intelligence (AI) has been the focus of speculation and excitement since its inception decades ago. The reality of AI is finally beginning to catch up with science fiction. This technology is beginning to permeate our entire lives in ways that we may not even be aware of.\nWhat is AI?\nAI is any system or machine that can improve upon itself by using the information it collects in a way that reflects how human intelligence works. In essence, AI is the capability of a more advanced learning process for computers and machines. It’s the process of creating intelligent machines capable of improving and learning as they collect data, parse it, and make logical conclusions toward their own evolution.\nSome examples of AI include customer service chatbots and social media algorithms. The pinnacle of human intelligence, things like speech recognition, advanced decision-making, and visually identifying objects and faces, has now become something that AI is capable of.\nWhile movies and books often portray AI as being a threat to the human species, many are excited about the reality of AI making our lives easier, better, and more efficient. For now, companies are utilizing AI as a premier solution to many problems.\nTo truly understand AI, it’s important to dissect the “intelligence” part of the catch-all phrase. Intelligence, in the context of Artificial Intelligence, refers to the computational abilities of goal-achieving for a system. In short, if a system is capable of fast and abundant computations in order to achieve its preconceived goal, we could call it “intelligent.”\nFor obvious reasons, human intelligence has always marked the benchmark for how we wish our machines could operate. When many envision what AI could become, what they are really aiming for is the capability standard of the human brain. Historically, human intelligence has always had a greater capacity for storing memories, multitasking, communicating socially, decision-making, and being self-aware. There are still many aspects of decision-making and thought processes that artificial intelligence can’t pull off. The way the human brain operates is still somewhat of a mystery to us so it’s only natural that it’d be difficult to program that into a machine.\nWhen did AI become a thing?\nWhile not every researcher or developer has ambitions that rival science fiction movies, AI development goals of enabling computers to do anything a human mind can do are standard. Alan Turning, an English mathematician, is considered by many to be the earliest champion of AI’s potential. His lecture in 1947 focused on AI and it was the start of a cultural shift toward the possibilities of how computers might evolve. The Turing test was essentially a test proclaiming that if a computer could match human intelligence and convince an outside observer of a human-like intelligence, then it was to be considered “intelligent.”\nMachine learning, deep learning, and AI\nMore than 70 years later, many believe we’ve exceeded Turing’s benchmark for computer intelligence. The term “artificial intelligence” is often mentioned together with machine learning. AI and machine learning are not separate things, rather machine learning is a tool used within AI development. AI works by taking in an abundance of data and running it through algorithms and learning from the patterns along the way.\nMachine learning, on the other hand, seeks out conclusions from data through the use of neural networks. This pattern-seeking behavior allows a computer to learn. Previously, this hadn’t been a hallmark of computers as they’d always completed functions that they’d been programmed to do and nothing more. Accompanying machine learning in conversations about AI is the concept of deep learning. Deep learning is essentially machine learning within layers and layers of huge datasets.\nWhy is AI important?\nBeyond just a sense of accomplishment for how far computer intelligence has come, AI offers several tangible benefits. AI offers greater automation for certain tasks. Because a computer cannot exhaust itself or run out of mental energy, it can perform repetitive tasks that a human would need to do manually. AI can also work a 24-hour day every day of the week, whereas a human cannot. It can provide a higher-quality analysis. With a heavy focus on a single task or function, AI can analyze datasets or difficult problems at higher speeds than a human brain can. It can improve the effectiveness of our processes and functions. It can cut down on errors caused by human judgment.\nAll of these add up to the enhancement of products and services delivered to end users. Additionally, these AI capabilities mean a reduced overhead cost for many companies. Without the need for staff members or teams comprising multiple people, AI can run at full capacity doing what it needs to do while delivering higher ROI for its performance.\nWith these core benefits of AI, we may see boring (or dangerous) jobs as a thing of the past, at least for humans. We may see a hugely improved output from departments and companies with a radical growth in speed and efficiency.\nWho oversees the development of AI?\nMany have warned us about the potential hazards of AI. Elon Musk famously stated: “Mark my words, AI is far more dangerous than nukes” and then went on to ask “why do we have no regulatory oversight?” There’s no shortage of movie references alluding to the possibility of AI gone awry, as well as influential people questioning where we’re headed. So, what’s in place to make sure that doesn’t happen?\nSome oversight must be implemented to ensure our future with AI is beneficial for all. What will be the most effective type of oversight or regulation? To understand the answer to that question, we need to realistically look at the threats AI poses. Before we worry about AI taking over, there are a few much more pressing ways that AI may disrupt our way of life.\nJob automation is no longer a distant potential danger of AI technology. Jobs are already being automated and due to this, people are being put out of jobs. What’s worse is that we haven’t planned for this as a society. Millions of people work in jobs that are under threat of being replaced by automation via AI within the next decade. With this automation and the subsequent layoffs, we could see increasing unemployment rates. The fact is, certain industries and jobs would be affected much more quickly by early automation by AI than others.\nAnother potential danger of AI coming in the near future would be the malicious use of this powerful technology. With great power comes great responsibility and as soon as AI's sheer potential becomes accessible to all, we're sure to see it make its way into the hands of malevolent criminals, hackers, terrorists, and states. We may also see privacy and misinformation issues with burgeoning AI capabilities. This prospect has spurred a sort of AI arms race where many countries and companies are speeding innovation of AI in both benevolent and malevolent forms to stay ahead of unforeseen enemies and competitors.\nFor now though, many organizations are still figuring it out. The truth is, we’re entering uncharted territory and no one knows for certain. It will likely follow much of previous technology in the fact that it can be used for both good and bad.\nWho is leading development of AI?\nTech giants like Google and Facebook have made strides to innovate and incorporate AI into the fabric of how they run their companies and deliver their services. But it’s not only the large corporations that are making use of AI. Startups all around the world specializing in AI-focused products and services are popping up quickly. Orbital Insight provides insights and forecasts to various industries using satellites and drones that parse through AI-gathered data. SoundHound helps you identify songs through its AI function and aims to provide deeper capabilities in the voice and conversational intelligence field. Non-profits like OpenAI are creating artificial general intelligence, similar to human beings with a focus on safe and responsible AI innovation.\nAcer's aiForge is a development tool that's allowing schools and businesses the much-needed flexibility in training both simple and complex AI solutions. It enables organizations to simplify and prioritize tasks as they see fit while reducing the amount of time needed to bring their models and solutions into reality. This will surely accelerate innovation in the industry.\nBut AI development is not limited to the big tech giants. Anyone can get involved in AI work just like programming has become an open opportunity for many people spread out across the world. While we’d be right to feel some caution about unrestricted AI development, it’s clear that AI is a promising field and will likely change the future of humanity in many positive ways.\n*The opinions reflected in this article are the sole opinions of the author and do not reflect any official positions or claims by Acer Inc.\nAbout Alex Clark: Alex is a contributing writer for Acer. Alex is a Texas-based writer and B2B email marketing strategist specializing in helping technology brands connect to their customers. He has lived all over Asia and has consulted with business clients in numerous industries to grow their brands.\nAlex is a contributing writer for Acer. Alex is a Texas-based writer and B2B email marketing strategist specializing in helping technology brands connect to their customers. He has lived all over Asia and has consulted with business clients in numerous industries to grow their brands.", "label": "Yes"} {"text": "VOCSN is an innovative life-support device that combines five respiratory therapies – ventilation, oxygen, cough, suction and nebulisation – in a single system. No larger than a lunchbox, the device is 70 per cent lighter and smaller than comparable machines and offers up to nine hours of battery life, an intuitive touchscreen and a user-friendly operating system. Caregivers can seamlessly switch between the different therapies.\nStatement by the Jury\nVOCSN features impressive functionality in the smallest of spaces, making it very user-friendly and convenient to transport.", "label": "Yes"} {"text": "It’s pretty awful that some phones can have good battery life and capacity, but take a depressingly long time to replenish their battery. But that’s certainly not the case for the new Ulefone Power 5. Though packing a huge 13000mAh battery, the phone can be fully charged rather quickly thanks to the 5V/5A super fast charger and today we’ve got a video for you to prove it. So check it out.\nAs you can see in the video, the charging speed is really quite impressive. The battery climbs to 10% after just 15 minutes of charging, 45 minutes later the battery reaches 32%, 75 minutes in the battery jumps up to 52%, and after 150 mins of charging wehave 91% charged .The phone will activate trickle charging automatically when charged 90% of power, which might slow down the charging process, but will safely recover the few remaining percent. Finally, full charge is reached in just 3 hours and a half, but take note that the charging test is done with the phone turned off. According to Ulefone, aside from faster charging speed, their 5V/5A fast charge that relies on larger current is much safer compared to conventional fast charging technologies relying in larger voltage.\nGizchina News of the week\nBelow is a quick summary of other specs of the Ulefone Power 5 :\n- 6.0-inch 18:9 all screen display with FHD+ resolution;\n- Mediatek MT6763 octa-core processor (Helio P23) paired with 6GB of RAM and 64GB of internal storage;\n- Sony 21MP/5MP dual rear camera setup, 13MP/5MP dual front camera setup; OIS technology; dual rear LED flash,selfie softlight\n- Advanced Face ID recognition system;\n- Fingerprint scanner on the side;\n- Independent audio chipset;handy shortcut key on the frame;10W wireless charge\n- Android 8.1 Oreo system out of the box.", "label": "Yes"} {"text": "So, all I want to do is display my vehicle speed digitally on an OLED, no data logging required.\nI bought the Freematic Nanologger kit, but it won't even compile right \"out of the box\" so to speak. My intention was to just comment out anything having to do with data logging and just tell it to display the speed on my OLED. I have not been able to compile my code. It dawned on me someone has probably already done this.............True? My I get a link to the sketch?", "label": "Yes"} {"text": "LED Front Access Rear Projection Wide Format Slim Cube\n60\", 1920 x 1080 (Full HD)\n60″ Full HD LED slim display wall cube\nBased on the same unique LED light source technology as its widely-used Seventy Series DLP™ cubes, the new cube offers significant economies in both its space requirement and cost of ownership.\nUntil now, the only practical option for large format control room display in restricted spaces such as crisis suites and breakout rooms has been tiled LCD. However, LCD is not ideal for 24/7 operation and in many cases the intrusive bezel can prove distracting to operators. Mitsubishi Electric’s VS-60HS12 provides an elegant solution, offering both a near-seamless high-resolution display and true, zero-maintenance 24 hour operation in a compact footprint.\nThe 60” diagonal DLP rear projection cubes measure just 520 mm deep, nearly half that of Mitsubishi’s Seventy Series cubes. Being solely front access means the VS-60HS12 can be installed flush to the wall, with no rear access required. The LED projection engine employs the same patented air-cooled light source technology as Mitsubishi’s high-specification Seventy Series, and requires no maintenance over its entire lifespan of approximately 50,000 hours. Based on a 0.65” Digital Mirror Device (DMD®), the display delivers up to 660 cd/m² at 1080p resolution, enhanced by Mitsubishi’s patented Colour Space Control and Digital Graduation circuitry. The displays are also completely self-balancing, ensuring correct color balance across the wall automatically.\n- 60″ Full HD\n- Lifetime 60,000 hrs\n- Up to 700cd/m²\n- Air cooling (no liquid)\n- Front access only\nNo burn-in and near-zero bezel design using DLP™ technology\nThe 0.65 DLP® chip is a reflective imaging device that is not affected by heat absorption, even when projecting a fixed pattern over a long period of time. Its durability and imaging quality are the best option among displays, especially for 24/7 operating environments.\nThe VS-60HS12U slim display wall cube is is equipped with three built-in sensors (one for each primary color) that use a color and brightness maintenance algorithm. The sensors continually monitor the individual red, green and blue output of each display wall cube, share the data with adjacent cubes, and adjust performance automatically to produce extremely accurate colors and brightness balance over the entire display. These features make it possible to maintain image uniformity on multi-screen configurations over long periods of operation without using external software or a computer.\nPara compensar as inconsistências de cor e de brilho, em cubos de LED para Display Wall, a Mitsubishi Electric desenvolveu um circuito de balanceamento que uniformiza e combina as cores. As taxas de cada cor primária (vermelho, verde e azul) e outras misturas de cores são ajustadas para fornecer combinações de cor consistentes e uniformidade superior em configurações com múltiplas telas.\nA diminução do brilho nas arestas das telas de visualização não é mais um problema graças ao inovador circuíto de gradação digital da Mitsubishi Electric. A distribuição do brilho é uniforme por todas as telas, o que garante a reprodução de imagens nítidas e vivas, de um extremo ao outro em configurações com múltiplas telas.\nLearn more about this product. Request a proposal.\n|RGB Input Scanning Frequency:|\n|Pixel Clock Rate:|\n|Control Signal Inputs:|\n|Temperature and Humidity:|\n|Service & Support|\nSpecifications are subject to change without notice.\n|No Accessories Available for this product|\n|Brochure 781.10 KB|", "label": "Yes"} {"text": "|Publication number||US5701044 A|\n|Application number||US 08/599,385|\n|Publication date||Dec 23, 1997|\n|Filing date||Feb 9, 1996|\n|Priority date||Aug 9, 1993|\n|Also published as||DE4326680C1, EP0713580A1, EP0713580B1, WO1995004936A1|\n|Publication number||08599385, 599385, US 5701044 A, US 5701044A, US-A-5701044, US5701044 A, US5701044A|\n|Inventors||Horst-Werner Emshoff, Lutz Intichar, Hermann Scheil|\n|Original Assignee||Siemens Aktiengesellschaft|\n|Export Citation||BiBTeX, EndNote, RefMan|\n|Patent Citations (9), Referenced by (30), Classifications (16), Legal Events (4)|\n|External Links: USPTO, USPTO Assignment, Espacenet|\nThis application is a Continuation of International Application PCT/DE94/00863, filed Jul. 26, 1994.\nThe invention relates to a process for monitoring the temperature of an electric generator, in which the temperatures of a plurality of winding rods of a stator winding of the generator being cooled by a coolant, preferably a stator winding being cooled by water, are detected.\nThe invention also relates to a device for monitoring the temperature of an electric generator, having a stator winding being cooled with a coolant, preferably a stator winding being cooled by water, and having a plurality of winding rods, including a first component for detecting and processing a measured temperature value for each winding rod.\nOne such process and one such device are known from German Published, Non-Prosecuted Patent Application DE 35 35 550 A1, corresponding to U.S. Pat. No. 4,733,225 as well as\nPublished European Patent Application 0 192 373 A3, corresponding to U.S. Pat. No. 4,602,872.\nIn individual hollow conductors of winding rods of water-cooled generator windings, in which water flows though the conductors, partial conductor breakages or plugging up of partial conductors can occur. The consequence is severe local heating (hot-point temperature) that threatens insulation. Since no statement about individual courses in winding rods can be made from a simple measurement of the total water heating, a temperature sensor must be disposed on the warm-water side of each winding rod. However, even a rise in the water heating of an individual winding rod caused by a flow disruption, in which the initial volumetric flow becomes less and thus the heating becomes greater, is still slight in comparison with the change in a local heating. For instance, plugging up of 10% of the number of hollow conductors in a winding rod can cause only a slight rise in water heating of from 3 to 4K, although if the stopped-up hollow conductors are unfavorably located, for instance if a plurality of hollow conductors located directly next to one another are stopped up, the allowable heating of the insulation will already be locally exceeded.\nWhile an allowable temperature band is defined in the monitoring system known from German Published, Non-Prosecuted Patent Application DE 35 35 550 A1, corresponding to U.S. Pat. No. 4,733,225, by the fact that a maximum allowable temperature value and a minimum allowable temperature value are each defined by a second degree polynomial, in the monitoring system known from Published European Patent Application 0 192 373 A3, corresponding to U.S. Pat. No. 4,602,872, a standardized averaged temperature and a correction influencing variable for each winding rod, are initially ascertained from a reference measurement. In a current or present monitoring, even a slight rise in temperature of an individual winding rod then leads to a relatively major deviation from a currently or presently ascertained average temperature which is referred to the standardized average temperature. However, in that monitoring system, operationally dictated influencing variables that influence the coolant temperature are taken into account solely in the reference measurement.\nIt is accordingly an object of the invention to provide a process and a device for monitoring the temperature of an electric generator, which overcome the hereinafore-mentioned disadvantages of the heretofore-known processes and devices of this general type and which take operation-dictated influencing variables into account in an especially simple manner.\nWith the foregoing and other objects in view there is provided, in accordance with the invention, a process for monitoring the temperature of an electric generator, which comprises detecting temperatures of a plurality of winding rods of a stator winding of a generator being cooled by a coolant, preferably a water-cooled stator winding; ascertaining a temperature deviation for each winding rod by comparing a measured actual value of the temperature of the winding rod with a reference value for the winding rod; forming the reference value from characteristic variables ascertained previously for the winding rod from a reference measurement and from currently detected operation-relevant parameters of the generator; ascertaining the characteristic variables for each winding rod from a temperature of the winding rod detected in the reference measurement and from a number of functions being identical to a number of characteristic variables, the functions being dependent on the operation-relevant parameters and operation-relevant parameters detected at different operating states of the generator being evaluated therefor in the reference measurement; and both the currently detected operation-relevant parameters and the operation-relevant parameters detected in the reference measurement each including a stator current of the generator as well as at least one of the following parameters: a terminal voltage of the generator, a reactive output, a temperature of the coolant before and after passage through the winding rods, and a temperature of a generator coolant, especially hydrogen, contained in the generator.\nThe invention is based on the recognition that the coolant temperature or the coolant heating and thus the heating of the winding rods depend not only on flow disruptions in individual winding rods but also on operation-relevant parameters of the generator. The operation-relevant parameters are those physical variables (influencing variables) that influence the heating of the winding rods, such as the generator voltage, the generator current, and/or the reactive power output.\nThe functions of each parameter are determined from a number of load points, preferably more than three different load points, to which the generator is driven or adjusted for the reference measurement. The characteristic variables are suitably the coefficients of a polynomial formed for each winding rod, having functions which represent the course of the operation-relevant parameters as a function of the load or of operating states of the generator. The operation-dictated influencing variables are thus taken into account through the use of the functions.\nIn accordance with another mode of the invention, in a current or present monitoring, the reference value for each winding rod is suitably likewise calculated from a polynomial formed for that winding rod. The polynomial is formed from function values of the parameters being presently or currently detected for an arbitrary operating state, and the characteristic variables derived from the reference measurement are used as coefficients.\nIn accordance with a further mode of the invention, as further operation-relevant parameters, which are detected both in the reference measurement and currently or presently, it is expedient to detect, in addition to the stator current or stator currents of the generator, the terminal voltage of the generator, the reactive power (reactive power output of the generator), the temperature of the coolant before and after passage through the winding rods, and the temperature of a coolant, such as hydrogen, contained in the generator, and one or more of the following variables are also detected: the coolant volumetric flow or the difference between the pressure of the coolant before and the pressure of the coolant after passage through the winding rods. Detecting the plurality of measured temperature values of the winding rods both in the reference measurement and in a present or current monitoring requires a not inconsiderable period of measurement time. For instance, up to 216 measured temperature values must be detected for a corresponding number of winding rods. Within this period of measurement time, the generator should be in a state of so-called thermal persistence, in which the operation-relevant parameters or influencing variables must remain virtually constant and can be allowed to fluctuate only within a predeterminable tolerance range. The operation-relevant parameters used to form the reference values are therefore preferably measured periodically within an adjustable measurement cycle in a present or current operating state. Each measured value of a parameter is compared with the value of a previous period of the measuring cycle, in order to ascertain any deviation. A thermal persistence is attained whenever at the end of the measuring cycle, for each parameter, no deviations or deviations located only within the tolerance range are found between the measured values of this parameter.\nWith the objects of the invention in view, there is also provided a device for monitoring the temperature of an electric generator having a stator winding being cooled with a coolant, preferably with water, and having a plurality of winding rods, comprising a first component for detecting and processing a measured temperature value for each of a plurality of winding rods of an electric generator; a data bus; and a second component being connected through the data bus to the first component for ascertaining a temperature deviation of a measured rod-specific actual value of a rod-specific reference value for each winding rod, the second component having a first computer unit for calculating characteristic variables formed from a reference measurement and a second computer unit for calculating the rod-specific reference values from the characteristic variables and from currently detected operation-relevant parameters; the first component detecting a stator current and at least one of the following parameters as current operation-relevant parameters: a terminal voltage of the generator, a reactive output, a temperature of the coolant before and after passage through the winding rods, and a temperature of a generator coolant, preferably hydrogen, contained in the generator.\nIn accordance with a concomitant feature of the invention, the second component includes a memory for storing the rod-specific characteristic variables.\nThe advantages attained with the invention are in particular that a precise and at least virtually continuous monitoring of the temperature of the winding rods of the generator is possible through the use of an evaluation process with the aid of polynomials, taking operation-relevant parameters or operation-dictated influencing variables into account.\nOther features which are considered as characteristic for the invention are set forth in the appended claims.\nAlthough the invention is illustrated and described herein as embodied in a process and a device for monitoring the temperature of an electric generator, it is nevertheless not intended to be limited to the details shown, since various modifications and structural changes may be made therein without departing from the spirit of the invention and within the scope and range of equivalents of the claims.\nThe construction and method of operation of the invention, however, together with additional objects and advantages thereof will be best understood from the following description of specific embodiments when read in connection with the accompanying drawing.\nThe FIGURE of the drawing is a function diagram with components provided for performing a monitoring process according to an exemplary embodiment of the invention.\nReferring now to the single FIGURE of the drawing in detail, there is seen a diagrammatic, longitudinal-sectional view of a generator 2 to be monitored that includes a rotor 6 on a shaft 8 and a stator winding 10, all of which are disposed in a generator housing 4. Winding bars or rods Si of the water-cooled stator winding 10, only some of which have been singled out to be shown in the drawing, are connected electrically in series in order to form the stator winding 10. Coolant KW flows through each winding rod Si, that is through a number of non-illustrated partial conductors of each winding rod Si. To that end, the winding rods Si communicate on the inflow side through insulating plastic hoses 12 with a common ring line 14, into which cold coolant KWk flows. Coolant KWW that is warmed in the winding rods Si is collected on the outflow side in a further ring line 16, which likewise communicates with the individual winding rods Si through plastic hoses 18. The warm coolant KWw is returned to a coolant loop 20 which is represented by arrows, and is recooled there in a non-illustrated manner.\nA temperature Ti of each winding rod Si is detected on the outflow side. To that end, the temperature Ti of the warmed coolant water KWw flowing out of the respective winding rod Si is measured through the use of a number of temperature sensors 21 corresponding to the number of winding rods Si, only one of which sensors is schematically shown for the sake of simplicity. Thermocouples or resistance thermometers are provided as the temperature sensors 21 for up to 216 winding rods Si that are present. Measured temperatures Ti =T1, . . . , Tn of the n winding rods Si are supplied to a measurement value detecting and processing component 22. The component 22 is supplied with further measured values in the form of a temperature TWk of the cold coolant KWk which is measured on the inflow side of the winding rods Si through the use of a temperature sensor 24; a temperature TWw which is measured through the use of a temperature sensor 26 for the warmed coolant KWw flowing out of all of the winding rods Si to the ring line 16; pressures Pk and Pw which are measured through the use of pressure sensors 28, 30 for the cold coolant KWk on the inflow side and the warmed coolant KWw on the outflow side of the respective winding rods Si ; and temperatures TGk and TGw which are measured at various points inside the generator housing 4 by temperature sensors 32 measuring an additional coolant gas, such as hydrogen, that cools the generator 2. The temperatures TGk and TGw are the respective temperatures of the cool and the warmed coolant gas.\nThe component 22 is also supplied with further measurement signals or measured values in the form of values of three stator phase currents Iu, Iv and Iw, a generator terminal voltage U, and a reactive power Q, which are filtered through isolation amplifiers 34 out of existing non-illustrated measurement circuits that communicate with connection terminals 36 of the stator winding 10. These measured values Iu, Iv, Iw, U, Q, the temperatures TWk, TWw and the pressure pk, pw of the coolant KW and the temperatures TGk, TGw of the coolant gas form m operation-relevant parameters Pj =P1, . . . , Pm.\nThe component 22 serves to monitor the limit value or control plausibility and also serves the purpose of analog/digital conversion of the measured values of the rod temperatures Ti and the parameters Pj. It also serves to build up data telegrams and to form signals for warnings and malfunctions.\nThe component 22 communicates through a data bus 38 with a further component 40 for monitoring the temperatures Ti of the winding rods Si. This further component includes a first computer unit 42 for calculating rod-specific characteristic variables Kij. These variables are derived from a reference measurement for each of the I=1, . . . , n winding rods Si through the use of a polynomial of the form ##EQU1## In the polynomial, TiR is the temperature, which is detected upon the measurement, of the ith winding rod Si, and fj (P*j) is m functions of the j=1, . . . , m operation-relevant parameters P*j. The functions fj of the influencing variables or parameters Pj are derived from empirical values and defined on the basis of technical relationships, where m=6 functions, for instance, f1 =1, f2 =I2, f3 =I2 ·TWw, f4 =U2, f5 =TWk -TGk, and f6 =Q. The positions of the functions fj in the polynomial can also be transposed, such as if a technical relationship can be made more precise by stating that f2 =U2 and f4 =I2. In the factor a, the volumetric flow V of the coolant KW or the differential pressure Δp=pw -pk of the coolant KW, standardized to the highest operating pressure, through the stator winding 10, respectively, is taken into account, for which a=(1/V)b and a=(Δpstandardized /Δpc), respectively. In these equations, b31 <2- and c<3, for instance b=c=1/2. The polynomial for the ith winding rod Si is thus proportional to the temperature TiR detected for this rod in the reference measurement. In other words, ##EQU2## In the reference measurement, the function courses of the individual operation-relevant parameters P*j for different operating or load states are picked up from the \"healthy generator\". In other words, this is done on the understanding that a malfunction-free or error-free operation of the generator, such as prior to its being placed into service, prevails. The ascertainment of the function courses in carried out in a computer unit 44. The coefficients Kij of the polynomial, which represent the respective m characteristic variables of the n winding rods Si and are ascertained in the computer unit 42 from these functions fj (P*j) and from the temperatures TiR of the winding rods Si, are stored in a memory 46. The characteristic variables kij and their relative magnitudes RG are illustrated in a bar diagram 48.\nIn a present or current monitoring, for an arbitrary operating state of the generator 2, the operation-relevant parameters Pj are first measured within an adjustable measurement cycle, for instance within a period of from 3 to 15 minutes. The length of the period of time depends substantially on the time constants of the temperature sensors 21. If these measured values of the parameters Pj are constant within this measurement cycle, or are within a predeterminable tolerance range, then the generator 2 has reached a status of thermal persistence. In the case of each parameter Pj, the periodically written-in measured values are compared with those of a previous period of the measurement cycle. If no deviation is found or if the deviations are within the tolerance range, thermal persistence exists. At the end of the measurement cycle, the temperatures Ti of the n winding rods Si are written in. After the writing in of the temperature Ti, the measured values of the parameters Pj are memorized once again and checked. If the measurement values of the parameters Pj continue to be constant, then they are made the basis of a so-called static assessment. Conversely, if deviations are found in one or more of the operation-relevant parameters Pj, then the most recently detected measured values can be made the basis of a so-called dynamic assessment. Both in the static assessment and the dynamic assessment, the corresponding function values fj (Pj) are formed from the measured values of the present parameters Pj in the computer unit 44. In a further computer unit 50, a reference value TiRS is ascertained from these function values fj (Pj) for each winding rod Si. To that end, the reference value TiRS of the ith winding rod Si is calculated from a polynomial of the following form ##EQU3## in which the function values fj (Pj) of the presently ascertained parameters Pj and the coefficients kij ascertained from the reference measurement are used from the memory 46. The reference value TiRS of the ith winding rod Si is thus proportional to the polynomial formed from the coefficients kij stored in memory and from an arbitrary data set of function values fj (Pj).\nIn order to ascertain a temperature deviation ΔTi, the reference value TiRS of the ith winding rod Si ascertained in the computer unit 50 is compared in a comparison stage 52 with the presently measured real or actual value of the temperature TiM of the ith winding rod Si. If the measured real or actual value TiM deviates from the reference value TiRS, and if this deviation ΔTi is outside a predeterminable tolerance range, then a report or a signal S is generated, which is output to a control panel in a non-illustrated manner. A change in warming Δ(ΔTi) of the corresponding winding rod Si can also be ascertained from a change over time of a temperature deviation ΔTi or from a deviation compared with a prior value ΔTi.\nThrough the use of this process, in which monitoring of the temperature of each winding rod Si is carried out while taking the operation-relevant parameters Pj or operation-dictated influencing variables into account, conclusions can be drawn for each winding rod Si about the cause of the deviation or change, from an ascertained temperature deviation ΔTi or a change in warming Δ(ΔTi).\n|Cited Patent||Filing date||Publication date||Applicant||Title|\n|US3843872 *||Apr 27, 1972||Oct 22, 1974||Shimomura N||Temperature measuring equipment with polynomeal synthesis|\n|US4291355 *||Jul 30, 1979||Sep 22, 1981||General Electric Company||Programmable overload circuit|\n|US4547826 *||Nov 30, 1983||Oct 15, 1985||General Electric Company||Generalized real-time thermal model|\n|US4602872 *||Feb 5, 1985||Jul 29, 1986||Westinghouse Electric Corp.||Temperature monitoring system for an electric generator|\n|US4823290 *||Jul 21, 1987||Apr 18, 1989||Honeywell Bull Inc.||Method and apparatus for monitoring the operating environment of a computer system|\n|US5097669 *||Feb 11, 1991||Mar 24, 1992||Westinghouse Electric Corp.||Control of hydrogen cooler employed in power generators|\n|DE3535550A1 *||Oct 4, 1985||Apr 17, 1986||Mitsubishi Electric Corp||Kuehlmittel-temperaturueberwachung fuer rotierende elektrische maschinen|\n|EP0192373A2 *||Feb 4, 1986||Aug 27, 1986||Westinghouse Electric Corporation||Temperature monitoring system for an electric generator|\n|EP0209364A2 *||Jul 15, 1986||Jan 21, 1987||Westinghouse Electric Corporation||Generator stator winding diagnostic system|\n|Citing Patent||Filing date||Publication date||Applicant||Title|\n|US6367311||Sep 30, 1999||Apr 9, 2002||Trilok C. Garg||Method for testing a water-cooled stator of a generator for leaks, and test skid for use in the method|\n|US6737767 *||Apr 5, 2001||May 18, 2004||Abb Ab||Synchronous compensation|\n|US6825580 *||Feb 7, 2001||Nov 30, 2004||Mirae Corporation||Apparatus and method for controlling cooling of gantry having linear motor|\n|US6909989||Feb 24, 2003||Jun 21, 2005||Siemens Westinghouse Power Corporation||Method and system for establishing operational stability prior to determining temperature correction factors for a generator|\n|US6959585 *||Nov 14, 2001||Nov 1, 2005||Environment One Corporation||Skids, modules, and modular system for monitoring hydrogen-cooled generators|\n|US6962435 *||Dec 14, 2001||Nov 8, 2005||Abb Technology Ltd.||Condition diagnosing|\n|US6995544 *||Nov 7, 2003||Feb 7, 2006||Mitsubishi Denki Kabushiki Kaisha||Generator control apparatus|\n|US7121718 *||Apr 27, 2005||Oct 17, 2006||Sensoplan Aktiengesellschaft||Method and device for detecting defects in sheet metal segments of electric generators and motors|\n|US7448252||Sep 28, 2005||Nov 11, 2008||Environment One Corporation||Skids, modules, and modular system for monitoring hydrogen-cooled generators|\n|US7755230||Jul 13, 2010||Hitachi, Ltd.||Rotary electric machine having cooling device and electric generating system including the machine|\n|US7944077 *||Mar 23, 2009||May 17, 2011||Amsc Windtec Gmbh||Generator, nacelle, and mounting method of a nacelle of a wind energy converter|\n|US8080887 *||Dec 20, 2011||Brad Radl||Closed loop control of hydrogen cooling of an electric power generator|\n|US8129873 *||Apr 5, 2010||Mar 6, 2012||General Electronic Company||Stator coil coolant flow reduction monitoring|\n|US20030090164 *||Nov 14, 2001||May 15, 2003||Environment One Corporation||Skids, modules, and modular system for monitoring hydrogen-cooled generators|\n|US20030146731 *||Apr 5, 2001||Aug 7, 2003||Bertil Berggren||Synchronous compensation|\n|US20040057491 *||Dec 14, 2001||Mar 25, 2004||Bengt-Olof Stenestam||Condition diagnosing|\n|US20040167746 *||Feb 24, 2003||Aug 26, 2004||Siemens Westinghouse Power Corporation||Method and system for establishing operational stability prior to determining temperature correction factors for a generator|\n|US20040239295 *||Nov 7, 2003||Dec 2, 2004||Mitsubishi Denki Kabushiki Kaisha||Generator control apparatus|\n|US20050243891 *||Apr 27, 2005||Nov 3, 2005||Sensoplan Aktiengesellschaft||Method and Device for Detecting Defects in Sheet Metal Segments of Electric Generators and Motors|\n|US20060156793 *||Sep 28, 2005||Jul 20, 2006||Brosnihan Ronald F||Skids, modules, and modular system for monitoring hydrogen-cooled generators|\n|US20090195091 *||Feb 6, 2008||Aug 6, 2009||Akihito Nakahara||Rotary Electric Machine Having Cooling Device and Electric Generating System Including the Machine|\n|US20090254308 *||Oct 24, 2006||Oct 8, 2009||Christoph Lehmann||Method for Automatic Monitoring of Generator Operation|\n|US20100071889 *||Sep 19, 2008||Mar 25, 2010||Brad Radl||Closed loop control of hydrogen cooling of an electric power generator|\n|US20100127503 *||Mar 23, 2009||May 27, 2010||Amsc Windtec Gmbh||Generator, nacelle, and mounting method of a nacelle of a wind energy converter|\n|CN101300726B||Oct 24, 2006||May 14, 2014||西门子公司||Method for automatically monitoring generator operation|\n|CN102012483A *||Oct 15, 2010||Apr 13, 2011||上海科泰电源股份有限公司||Test cabin for extreme high and low-temperature environments|\n|CN102012483B||Oct 15, 2010||Nov 21, 2012||上海科泰电源股份有限公司||Test cabin for extreme high and low-temperature environments|\n|CN102590747A *||Mar 2, 2012||Jul 18, 2012||北京理工大学||Test system of temperature rise of motor winding and test method of the test system|\n|EP1780885A1 *||Oct 31, 2005||May 2, 2007||Siemens Aktiengesellschaft||Method for automatically monitoring a generator operation|\n|EP2372882A1 *||Apr 4, 2011||Oct 5, 2011||General Electric Company||Stator coil coolant flow reduction monitoring|\n|U.S. Classification||310/54, 374/152, 310/68.00C, 374/E01.005, 310/53, 702/130|\n|International Classification||G01R31/34, H02P9/00, H02H7/06, H02K9/24, G01K1/02, H02K11/00|\n|Cooperative Classification||G01K1/026, G01R31/343|\n|European Classification||G01R31/34B, G01K1/02D|\n|Jul 25, 1997||AS||Assignment|\nOwner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EMSHOFF, HORST-WERNER;INTICHAR, LUTZ;SCHEIL, HERMANN;REEL/FRAME:008626/0160\nEffective date: 19960216\n|May 18, 2001||FPAY||Fee payment|\nYear of fee payment: 4\n|May 12, 2005||FPAY||Fee payment|\nYear of fee payment: 8\n|May 7, 2009||FPAY||Fee payment|\nYear of fee payment: 12", "label": "Yes"} {"text": "24 GHz six-port medical radar for contactless respiration detection and heartbeat monitoring\nFor numerous medical applications it is of primary interest to monitor the breath rate and heartbeat of a patient over time. Especially important is to observe the respiration of a patient over night to detect potential sleep disorders. Furthermore, heartbeat frequency is also a precious information which can help to improve diverse diagnosis procedures. In order to better analyze these vital parameters an innovative contactless respiration detection and heartbeat monitoring technique has been developed. This novel method is based on the six-port interferometric radar and is capable of detecting breath rate as well as heartbeat frequency without applying sensors or electrodes on the patients body.", "label": "Yes"} {"text": "Kingston Creates 2400 MHz DDR3 Memory Kit, Certified by Intel\nKingston Technology Company, Inc., the independent world leader in memory products, today announced it has developed the fastest Intel-certified memory in the world. Running at 2400MHz, Kingston's HyperX dual-channel DDR3 memory kit (Kingston part#: KHX2400C9D3T1K2/4GX) gained Intel XMP certification on the Core i7 platform. Intel's certification is posted here.\nThe 2400MHz kit runs at 9-11-9-27-2 timings at 1.65 volts and was developed for enthusiasts, gamers, and benchmarkers looking to scale new memory heights. As with all Kingston memory, the 2400MHz kit was created with the highest design-engineering principles and subjected to OEM-quality production and testing standards to gain Intel XMP certification. The memory was tested to great success on several P55-based systems including the GIGABYTE GA-P55A-UD4P motherboard.\nThe 2400MHz kits will be available in Q2. Kingston HyperX memory is backed by a lifetime warranty and free 24/7 technical support.\nLatest News Posts\n- Huawei launches new nova 2 with dual rear camera\n- Nintendo shares skyrocket to 8-year high\n- Alienware Aurora reach reasonable price for Memorial Day\n- GTA Online earns big for Take-Two\n- Red Dead Redemption 2 built from scratch for consoles\n- Gigabyte z170 UD5: Question about Voltage Spikes/Offset\n- ASRock AliveXFire-esata2 compatibility with Phenom II X4 980\n- m4a88td-m/usb3 & Windows 10\n- OWC ThunderBay 4 Mini Thunderbolt 2 Review\n- Prey benchmarked: Radeon RX 580 vs. GeForce GTX 1060\n- Qualcomm fuels IoT growth by currently delivering more than 1 million chips a day into a wide range of connected applications\n- Team Group announces theme for COMPUTEX 2017 showcase: go beyond the limit and reach for the top\n- SAPPHIRE announces PULSE Radeon RX 560 graphics card\n- ELITEGROUP computer to stand out at Computex for its smart campus deployment, robotic technology, education laptops, tablets, mini PC, and motherboards\n- ADATA Shares a Symphony of Technology at Computex 2017", "label": "Yes"} {"text": "ExpoImaging has released three new Rogue Lighting Kits for “strobists,” or small flash enthusiasts. The Rogue Starter Lighting Kit ($99.95, pictured) is an entry-level bundle consisting of light modifiers designed to improve the quality and variety of lighting choices available to photographers using speedlights on- or off-camera. The Rogue Portrait Lighting Kit ($149.95) is a larger collection of light modifiers providing greater light control for portrait and event photographers shooting with multiple speedlights. Finally, the Rogue Master Lighting Kit ($199.95) is for the most advanced speedlight photographers looking to create multiple lighting set-ups using combinations of the kit’s soft box, bounce flash reflectors, flags, honeycomb grids and coloured gel kits\n<< Back to Home page\nDiscover a wide range of digital cameras at low prices. Buy cheap cameras from Sony and Canon. Share your photos thanks to digital photo frames.\nVarnam offers digital photo frame with built-in memory & battery.\n© Copyright 2003-2008 Photo\nBest Viewed at 1024x768 Screen Resolution", "label": "Yes"} {"text": "Wire trailer connector wiring diagram plug way vienoulasfo\nInsulated cables are rated by their allowable operating voltage and their maximum operating temperature at the conductor surface. A cable may carry multiple usage ratings for applications, for example, one rating for dry installations and another when exposed to moisture or oil.\nIn a typical electrical code, some colour-coding of wires is mandatory. Many local rules and exceptions exist per country, state or region. Older installations vary in colour codes, and colours may fade with insulation exposure to heat, light and ageing.\nIn European countries, an attempt has been made to harmonise national wiring standards in an IEC standard, IEC 60364 Electrical Installations for Buildings. Hence national standards follow an identical system of sections and chapters. However, this standard is not written in such language that it can readily be adopted as a national wiring code. Neither is it designed for field use by electrical tradesmen and inspectors for testing compliance with national wiring standards. By contrast, national codes, such as the NEC or CSA C22.1, generally exemplify the common objectives of IEC 60364, but provide specific rules in a form that allows for guidance of those installing and inspecting electrical systems.\nIn Germany, DKE (the German Commission for Electrical, Electronic and Information Technologies of DIN and VDE) is the organisation responsible for the promulgation of electrical standards and safety specifications. DIN VDE 0100 is the German wiring regulations document harmonised with IEC 60364.\nDiagram wire trailer plug wiring connector x kit light\nPin trailer plug wiring diagram new mexico usa map of wire connector way travel\nWire trailerug wiring diagram diagrams round standard ripping blade connector", "label": "Yes"} {"text": "Programmable SOC devices can be used in E-Bike applications as a single-board system for motor control, analog measurement, and direct drive LCD display. Programmable SOCs can also support capacitive sensing technology to replace mechanical buttons on the keypad. In addition, SOC devices use internal PWM, MUX, and comparators for driving and controlling the three-phase motor, internal ADC and PGA for sensor inputs battery monitoring, and temperature sensing using a temperature sensing device like a thermistor or RTD. The device can also directly drive the relays for the brake light, headlight, and directional lights, as well as direct drives the LCD display of temperature, battery status, speed, distance travelled, and any error/warning messages.\nUsing IDE-based tools, all interface and logic can be designed for the SoC. These tools also have readily available component blocks for designing more complex logic such as monitoring a capacitive sensor for the interface, an ADC for analog sensors and other inputs, driving the PWM for a buzzer, DAC, and a segment, character, or graphical LCD display. Thus, with a programmable SOC, the development and product cost of an E-Bike system can be substantially reduced.\nFigure 1 shows the block diagram of a basic E-Bike system\nMicrocontroller: The microcontroller is typically used for different sensor input detection (i.e., throttle inputs, temperature sensor, battery input, fuel sensor, obstacle sensors), A/D conversion, output comparison components, and driving and controlling the three-phase brushless automotive motor. An ultra-low power microcontroller is required as an E-Bike is a battery-operated system. The microcontroller is also part of the central locking system, and can be used to communicate with different external devices used in the vehicle. Using a microcontroller whenever a brake is pulled automatically stops the motor spinning and prevents the motor from wearing down the brake pads faster than a standard human-powered bike.\nHub motor/Wheel motor: Typically, a brushless motor is used, either sensored (Hall Effect) or sensorless, for reliable and efficient", "label": "Yes"} {"text": "LCS/AI Lab Timeline\nThis Web-based timeline is meant to document the history of computing research at MIT, which dates back to the 1940's. It is, at the moment, quite incomplete, and needs help from those interested in rounding out the story. Computer-related research at MIT has been conducted by many different Laboratories and Departments, including the Whirlwind project, the Research Lab of Electronics, the Computer-Aided Design project, Project MAC and its descendants (the Lab for Computer Science and the Artificial Intelligence Lab), the Information Technology program at the Sloan School, and the Media Lab. Indeed, at the turn of the millenium, computing is becoming an important focus of many other engineering departments as well.", "label": "Yes"} {"text": "How can you do when your camera can not connect to Wi-Fi\nPlease ensure you re-entere WiFi password correctly and the antenna is tight on your camera, please allow us to show you some tips to check the status of WiFi module. Does it work normally? It had broken?\nPlease refer to below information to check it.\n1. Connect your camera to router via a network cable so that you can setup the camera. Please open Anyscene APP and refer to following picture to learn more about how to jump to Advanced Setting Panel.\n2. Tap Advanced Setting Option, and then please choose Network Setup. Please refer to below pictures.\n3. Please tap the ‘ WIFI networks’ to take a look at the WiFi SSID. If there is a WiFi listing(SSID), it shows that the WiFi module is working normally. And please choose the one you want to connect, tap it to re-enter the password.\n5. Please unplug the network cable and go back to the “Edit camera” page to check whether the wifi has been connected successfully, tap Reconnect to check the Wifi has been connected already. If it shows, connected means the WiFi is ok now . But if it shows connecting or connect failed, it means the WiFi password is not correct, plug in network cable again and go back to retype correct wifi password and try again.\nIf you find the WiFi module works normally, and you have tried the above steps but found that did not work. this problem may be caused by the router. The router have blocked the wifi connecting actions of camera. For this case, please assign a static IP address for your camera. Refer to below steps.\na. Make sure you know network segment of router. e.g. 192.168.(1).x, This will be useful for you to assign the static IP address.\nb. This step requires a computer, open Camera live software (You can find out it on the CD-rom, or Click here to download it) and then login the web application of camera. Please Click here to learn more about how to login it.\nc. Refer to below figure to make sure the WiFi has been enabled.\nd.To change the TCP/IP Setup, assign a static IP address, save it by clicking Apply.\nWe have a video to show you how to connect the camera to your wifi router. You can also watch our last section video to get to know how to set up the wifi correctly. Here is our video link for your check.", "label": "Yes"} {"text": "Mayo Clinic and vMocion announce new VR device using Vivonics' GVS technology\nMayo Clinic and vMocion, LLC, an entertainment technology company, today announced it is making available Mayo Clinic's patented Galvanic Vestibular Stimulation (GVS) technology specifically for use in virtual reality and augmented reality. vMocion's 3v™ Platform (which stands for virtual, vestibular and visual) incorporates this patented GVS technology, which adds a complete sense of three-dimensional movement for the first time into a virtual reality or augmented reality environment. vMocion has been granted the exclusive, global, perpetual license for Mayo Clinic's GVS patents and algorithms within all media and entertainment categories and will offer the 3v Platform to other media and entertainment companies through a licensing agreement.\n\"This is the first fundamental technological development in entertainment in 100 years since the combination of sound and pictures,\" says Brad Hillstrom, M.D., chairman of vMocion. \"By adding this magical sensation of motion in gaming, movies, amusement parks and other entertainment environments, our 3v Platform is enabling a whole new dimension of motion that creates a truly immersive experience well beyond the current virtual or augmented reality technology offerings.\"", "label": "Yes"} {"text": "While traditional vehicle testing and design are time-consuming and expensive, AI models have enabled the automotive industry to simulate specific scenarios. AI for cars makes it possible for automotive engineers to develop models that can simulate realistic driving conditions. These models can also be used to improve vehicle performance. But there are some challenges associated with AI for automotive. Here are some of the common challenges faced by the industry. But how can we make AI for cars a reality? Read on to learn more.\nIn the insurance industry, AI has many benefits. For example, AI helps insurance agents determine the premiums for drivers based on their driving performance, personal life issues, and other factors. AI is even able to help the insurance industry streamline the claims process. By analyzing customer and driver behavior, AI for automotive companies can provide the best driving environment for consumers. But how does AI for automotive companies help insurance companies? Listed below are some examples.\nAutomakers are making use of AI technology in ADAS systems. These systems include adaptive cruise control and multiple parking assistance versions. New models will likely incorporate more AI in ADAS systems. Meanwhile, limited driving pilots are being developed by several OEMs. These systems are often referred to as L2+. The problem with the autopilot terminology is that it may cause confusion among consumers. And many crashes have already occurred as a result of autopilots.\nAI solutions for automotive also aim to address supply chain optimization, which is a difficult task for any industry. The supply chain in the auto industry is highly complex, influenced by political factors. It’s hard to keep track of inventory and raw materials. Furthermore, low-quality production increases the likelihood of product recalls. With the use of AI for automotive, manufacturers can address many of these problems. The following are some examples of AI applications for automotive.\nAutomakers are adopting AI to varying degrees. AI for automotive includes predictive maintenance. Predictive maintenance involves the use of predictive algorithms to monitor the health of vehicles. It can help car owners determine when to replace parts and mechanics can address issues as soon as they arise. AI for automotive has many benefits. For example, it can improve the efficiency of maintenance planning and reduce the costs of inspections. In addition, AI solutions for automotive can help manufacturers optimize workflows, which in turn can improve quality and reduce total costs of ownership.\nAI for automotive uses advanced technologies to improve the experience of passengers. For example, a new car called Waymo is equipped with AI software that crunches data from its vehicle to predict what objects may be in its path. By combining data from multiple sources, the software can also predict if a vehicle is near a pedestrian or a cyclist, which can potentially be a risk to the driver. AI for automobiles can improve the safety of vehicles and reduce accidents.\nAI-driven software creates a baseline of a vehicle’s behavior and learns from feedback. AI-powered hardware can inspect different products, including painted car bodies, machined parts, and textured metal surfaces. A company called Safe Ride offers a complete AI solution for vehicles, offering multi-layer monitoring of vehicle applications. The company also developed a web application that helps secure connected apps, identifying potential anomalies or threats.\nAI-powered software for cars will analyze data and identify problems, and will alert the driver when something needs attention. It can analyze different scenarios for potential failures and will also prevent accidents by reading driver behavior and heartbeat. In the end, the AI software will help prevent accidents, improve the safety of vehicles, and make the driving experience more enjoyable. However, we shouldn’t expect driverless cars to happen overnight. But it’s only a matter of time.\nAI is an increasingly important technology in the automotive industry. Companies are investing heavily in this technology and are eager to use it in their vehicles. According to Tractica, the market for automotive hardware will grow to $27 billion by 2025. However, the technology is still relatively new, and companies need to educate stakeholders about the benefits of AI before incorporating it into their vehicles. And that’s just the beginning of what’s possible. This is an exciting time to implement AI in vehicles, and the future is here!", "label": "Yes"} {"text": "Helping clients achieve a resilient cyber defense posture to continue operating their businesses regardless of the cyber threats they face.\nAccenture Security Cyber Defense capabilities include:\nPrepare your business against the most advanced cyber adversaries and reduce your exposure to threats targeting applications, hardware (OT/IOT) and enterprise assets.\nIntegrate emerging technologies and define the right cyber threat operations center model to grow with confidence.\nProtect and monitor applications through data security and privacy, API security, enterprise application security and secure application development. Read more.\nDetect, respond and recover from threats and breaches that could impact business operations.\nSupport decisions with actionable and relevant threat intelligence to improve security maturity for the long-term, adapting to threats as they evolve.\nCombining managed security services, market-leading advanced analytics and intelligent automation, our cyber defense incubation centers help organizations out-innovate attackers every single day.\nIndustrial process control networks remain vulnerable to cyber-attack, where traditional IT equipment must now integrate reliably and securely with aging field systems while fending off increasingly sophisticated attacks.\nThe Houston-based Accenture Security Industrial Control Systems (ICS) Cyber Range enables oil and gas companies to test and stage the responses of industrial process controls against sophisticated attacks in a risk-free setting.\nIn addition, the Cyber Range enables clients to better orchestrate changes to their Operational Technology (OT) environment, including threat response exercises to train their teams to more effectively recognize, mitigate and repel attacks.\nAccenture's video shows how leading energy companies can train teams at our innovative Industrial Control Systems (ICS) Cyber Range in Houston. See more.View Transcript\nDiscover the latest thinking on security, threat intelligence and related careers.\nAt Accenture Security you’ll collaborate with the brightest minds in cybersecurity. Together we’ll build cyber resilience for the world’s leading organizations.", "label": "Yes"} {"text": "What is Power factor\nPower factor is the ratio of active power which is consumed by the load to apparent power supplied by the generating source. The power factor is a unitless no. which is the cosine angle between actual power consumed to apparent power supplied.\nThe power factor is an indicator of the amount of power that is used to create actual by the load. power factor closer to 1(one) mean power supplied by the source is mostly consumed by the load. And losses as reactive power is minimum. In this article will see the motor power factor table and Capacitor Rating Chart for Motor.\nPower Factor Unit\nA power factor is a unitless number. its range is between 0 to 1. As it is the ratio of two powers i.e Active Power (KW) and Apparent Power (KVA), there is no unit.\nPower factor of motor formula\nPF = P / S\nPF = power factor = Cos α\nP = √3V I cos α =active (true or real) power (Watts)\nS = √3V I= Apparent power (VA, volts amps)\nhence, Power factor of motor formula is\nCos α =√3 VI Cos α / √3 VI\nFrom the following diagram, you can easily understand why the power factor is cosine between apparent power and a real power.\nWhat is Reactive Power\nReactive Power can best be described as the quantity of “unused” power that is developed by reactive components in an AC circuit or system.\nWhat is Active Power\nThe power which is actually consumed or utilized in an AC Circuit is called True power Active power or Real power. It is measured in kilowatt (kW) or MW.\nWhat is Apparent Power\nThe product of the root mean square (RMS) value of voltage and current is known as Apparent Power. This power is measured in kVA or MVA.\nsymbolically from the following diagram of the glass of beer, we can easily understand what is active power and what is reactive power.\nBenefits of Power Factor Corrections\n- Lower electricity bills – avoiding low power factor penalty from the electricity company\n- An increased rating of electrical equipment – additional loads can be added without overloading the system\n- Improved system operating characteristics by reducing line loss – due to less current\n- improved system operating characteristics by gaining voltage – excessive voltage drops are avoided\nMotor Power Factor Table\nThe power factor of the motor varies according to the rating of the motor, speed of the motor, and load applied on the load side of the motor. Power Factor Value of motor for different range of motor rating as follows. Motor Power Factor Table :\n|Horsepower||Speed||Power factor||Power factor||Power factor|\n|(HP)||(RPM)||If Load =1/2 of full load||If Load =3/4 of full load||If the motor is on Full load|\n|0 – 5||1800||0.72||0.82||0.84|\n|5 – 20||1800||0.74||0.84||0.86|\n|20 – 100||1800||0.79||0.86||0.89|\n|100 – 300||1800||0.81||0.88||0.91|\nCapacitor Rating Chart for Motor\nRecommended sizes of capacitor rating for motor in KVAR units needed for correction of induction motors to approximately 95% power factor. hence following is the Capacitor Rating Chart for Motor :\n|Induction Motor Rating||Motor Speed = 3600 RPM||Motor Speed = 1800 RPM||Motor Speed= 1200 RPM|\n|Capacitor Rating||Capacitor Rating||Capacitor Rating|\nMany a time we required to know the power factor at different load at motor output side. hence, in this article, we have discussed Motor Power Factor Table which give power factor (pf) for different rating size motor and at different load at motor. what rating of capacitor will be proper hence we also provide Capacitor Rating Chart for Motor.\nRelated article :", "label": "Yes"} {"text": "The formation of magnetic depletions and flux annihilation due to reconnection in the heliosheath\nMetadataShow full item record\nCitation (published version)JF Drake, M Swisdak, M Opher, JD Richardson. 2017. \"The Formation of Magnetic Depletions and Flux Annihilation Due to Reconnection in the Heliosheath.\" ASTROPHYSICAL JOURNAL, Volume 837, Issue 2. https://doi.org/10.3847/1538-4357/aa6304\nThe misalignment of the solar rotation axis and the magnetic axis of the Sun produces a periodic reversal of the Parker spiral magnetic field and the sectored solar wind. The compression of the sectors is expected to lead to reconnection in the heliosheath (HS). We present particle-in-cell simulations of the sectored HS that reflect the plasma environment along the Voyager 1 and 2 trajectories, specifically including unequal positive and negative azimuthal magnetic flux as seen in the Voyager data. Reconnection proceeds on individual current sheets until islands on adjacent current layers merge. At late time, bands of the dominant flux survive, separated by bands of deep magnetic field depletion. The ambient plasma pressure supports the strong magnetic pressure variation so that pressure is anticorrelated with magnetic field strength. There is little variation in the magnetic field direction across the boundaries of the magnetic depressions. At irregular intervals within the magnetic depressions are long-lived pairs of magnetic islands where the magnetic field direction reverses so that spacecraft data would reveal sharp magnetic field depressions with only occasional crossings with jumps in magnetic field direction. This is typical of the magnetic field data from the Voyager spacecraft. Voyager 2 data reveal that fluctuations in the density and magnetic field strength are anticorrelated in the sector zone, as expected from reconnection, but not in unipolar regions. The consequence of the annihilation of subdominant flux is a sharp reduction in the number of sectors and a loss in magnetic flux, as documented from the Voyager 1 magnetic field and flow data.", "label": "Yes"} {"text": "- eBook:Artificial Neural Networks with Java: Tools for Building Neural Network Applications\n- Author:Igor Livshin\n- Edition:1st ed. edition\n- Data:June 13, 2019\n- Pages:566 pages\nThe next big topic discussed in the book is using Java for neural network processing. You will use the Encog Java framework and discover how to do rapid development with Encog, allowing you to create large-scale neural network applications.\nThe book also discusses the inability of neural networks to approximate complex non-continuous functions, and it introduces the micro-batch method that solves this issue. The step-by-step approach includes plenty of examples, diagrams, and screen shots to help you grasp the concepts quickly and easily.\nWhat You Will Learn\n- Prepare your data for many different tasks\n- Carry out some unusual neural network tasks\n- Create neural network to process non-continuous functions\n- Select and improve the development model\nIntermediate machine learning and deep learning developers who are interested in switching to Java.\nChapter 2: Internal Mechanics of Neural Network Processing\nChapter 3: Manual Neural Network Processing\nChapter 4: Configuring Your Development Environment\nChapter 5: Neural Network Development Using the Java Encog Framework\nChapter 6: Neural Network Prediction Outside the Training Range\nChapter 7: Processing Complex Periodic Functions\nChapter 8: Approximating Noncontinuous Functions\nChapter 9: Approximating Continuous Functions with Complex Topology\nChapter 10: Using Neural Networks to Classify Objects\nChapter 11: The Importance of Selecting the Correct Model\nChapter 12: Approximation of Functions in 3D Space", "label": "Yes"} {"text": "Conax is to launch a new modular multiscreen service for next generation TV providers.\nDeutsche Telekom is working with Zenterio, a Swedish TV technology and services provider, on a project to modernise the TV subscriber experience in Germany with one of the market’s largest deployments of IPTV set-top-boxes.\nGTD is to upgrade its set-top box inventory after agreeing to deploy Amino’s ENABLE virtual set-top box software.\nPoland’s Cyfrowy Polsat has introduced new software for its proprietary HD set-top boxes.\nYouView is to run a pilot scheme that will give viewers a voice controlled TV experience around Amazon Alexa.\nBT has begun the process of upgrading its set-top box inventory to the latest version of YouView.\nWATCH VIDEO. Vodafone Deutschland has launched Ultra HD/4K platform GigaTV on its cable network today bundling the entertainment services in the customer’s household.\nGermany’s third-largest cable operator Tele Columbus will launch its multiscreen platform AdvanceTV combining linear TV, video-on-demand (VOD) and apps on January 16, 2017.\nFoxconn, one of the world’s largest consumer electronics manufacturers, will equip its TV devices with white label smart TV portal solutions from German technology and software development company NetRange.\nThe Warsaw-based TiVo subsidiary Cubiware has entered into a partnership with Ali Corporation.", "label": "Yes"} {"text": "UGRD_2011_Spring_Follum_Whitman.pdf (600.82 kB)\nSunrise Alarm Clock for the Hearing Impaired\npresentationposted on 2021-11-15, 18:37 authored by Jim Follum\nThe Sunrise Alarm Clock is a device designed to be more effective than standard alarm clocks and more pleasant than specialty devices in waking the hearing impaired. This is accomplished with the inclusion of visual, physical, and audio alarms. The visual alarm stimulus is created by manipulating the light output of a bedside lamp to mimic the sunrise. This is achieved by varying the duty cycle of a pulse width modulated signal supplied through a standard three-prong receptacle located on the side of the alarm clock. Physical alarms are in the form of wristbands containing vibrating motors. Finally, audio alarms are provided with both volume and pitch control to match the user's specific needs. The entire system is designed with two users in mind by providing two independently controlled receptacles, wristbands, and audio systems. At the conclusion of development, a nearly fully functional prototype has been produced. The prototype's audio and physical alarm system along with one visual alarm are fully functional. Shortcomings include poor timekeeping accuracy and problems clearly displaying the time. Even so, this development in sleep technology is capable of performing its task and waking its user with all three alarm systems.\nPublisherUniversity of Wyoming. Libraries\n- Library Sciences - LIBS", "label": "Yes"} {"text": "The United States Department of Energy (US DOE) recently announced an investment of $36 Million in a number of projects to improve situational awareness of solar energy systems, especially at critical infrastructure sites. This investment will increase resilience to cyber and physical threats, and strengthen solar integration on the grid.\nNews and Events\nResearchers at the Cockrell School of Engineering have created the first silicon nanomembrane based flexible photonic crystal cavity. This new form of silicon photonic devices is believed to have numerous applications in wearable devices and biomedical instruments.\nUT ECE assistant professor and Kilby Endowed Faculty Fellow Deji Akinwande has been named the 2015 recipient of the IEEE Nanotechnology Early Career Award.\nResearchers at the Cockrell School of Engineering have created the first transistors out of silicene, the world’s thinnest silicon material. This new “wonder material” could make computers and other electronics more efficient.\nUT ECE graduate student Scott Maddox has been named the recipient of the Best Student paper Award from the 2014 MRS Electronic Materials Conference for his talk \"Effects of Growth Rate, Substrate Temperature, and a Bi Surfactant on Doping Limits in InAs: Si Grown by Molecular Beam Epitaxy.” Scott", "label": "Yes"} {"text": "DENSO’s MDrive Car Share Study Reveals Promise For Electric Car Sharing\nStudy findings will guide development of future vehicles, says DENSO.\nDENSO Opens R&D Lab At University of Michigan To Advance Machine Learning And Automated Drive\nThe DENSO R&D Lab gives DENSO an opportunity to more closely collaborate with the University and North American automotive manufacturers on key safety technologies like machine learning, advanced driver assistance systems and automated drive. As part of the lab, 12 university students have been selected to participate in research projects, which will begin this month and run throughout 2017.", "label": "Yes"} {"text": "YouTuber ProfessorBoots recently published a comprehensive set of 3D print files for a remote-controlled mini excavator. The STL files for free download on the Printables platform contain all the necessary components to build the functional model yourself.\nAccording to ProfessorBoots, the set is also suitable for beginners. Thanks to the modular design, the individual components such as the boom arm, bucket and chassis are easy to print and then assemble.\nThe YouTuber recommends compact RC servo motors as the drive. They can be controlled via a special circuit board with a Bluetooth connection to a smartphone or tablet. Alternatively, a commercially available RC remote control can be used.\nThe building instructions are provided in the form of a detailed video tutorial on YouTube and on the official website. According to ProfessorBoots, the self-assembly takes around 35 hours of printing time. However, experienced makers could also complete the model within a weekend. Alternatively, ProfessorBoots also offers a complete kit with all electrical parts and the 3D-printed parts in its store.", "label": "Yes"} {"text": "Credible projections of future changes in climate, energy, and related human and natural systems are dependent on realistic scenarios of future electricity system growth. However, electricity capacity expansion models typically do not account for water availability, interconnection costs, regulatory constraints, or other factors that may restrict power plant construction. A team from the U.S. Department of Energy’s Pacific Northwest National Laboratory used the Capacity Expansion Regional Feasibility (CERF) model to evaluate the potential for siting different energy production technologies over the contiguous United States at a resolution of 1 km2.\nBy accounting for economic, environmental, and practical constraints that influence power plant siting, CERF will improve projections of future energy system growth and, ultimately, attendant changes in the integrated human-Earth system. Improved understanding of electricity capacity expansion constraints can also provide insight into factors that may influence long-term energy system resilience.\nThe open-source CERF model evaluates the feasibility of electricity capacity expansion plans by considering a wide range of factors that restrict power plant siting, including land use, environmental regulations, water availability, infrastructure access, and net operational costs. By combining this high-spatial-resolution information with larger-scale information about energy supply and demand from an integrated human-Earth system model such as GCAM, CERF can provide a comprehensive assessment of how many power plants of each type can be accommodated across a given region under a given scenario. Power plant siting is first evaluated based on geospatial suitability, which includes 32 base constraint layers and an additional seven layers of technology-specific constraints for 17 different power production technologies. The feasibility of the expansion plan is then further evaluated by considering economic factors such as the distance to existing transmission infrastructure, technology-specific marginal operating costs, and technology- and location-specific marginal energy values. Finally, an economic optimization algorithm is used to assign power plants to each 1 km2 grid cell. CERF thus provides a holistic, multi-sector, multi-scale assessment of the on-the-ground feasibility of a given electricity capacity expansion scenario. This information can be used to evaluate and refine projections of future energy system growth, which is a key factor driving future Earth system changes.", "label": "Yes"} {"text": "I used a modified Z-wave door/window sensor to setup my firm alarm:\nFire Alarm Panel Monitoring with contact sensor—how to report as a different device class? - Developer Programs / Writing Device Types - SmartThings Community\nNow all new z-wave simple open/close door window devices automatically get recognized as a fire alarm.\nIs there anyway I can disable it temporarily to add other z-wave open/close sensors?", "label": "Yes"} {"text": "Okay, so I’ve struggled with this ever since I started using Cubase 11 Pro to Cubase 12 Pro it’s cause me so many headaches.\nWindows 11 Laptop (current updates)\nCubase 12 Pro (version 12.0.10)\nMODX 8 (DI’d to Inputs 5-6 on Focusrite)\nFocusrite Clarett+ 4Pre (Current updates)\nPair Yamaha HS8’s (Output 1-2 monitors FR)\nSonarworks SoundID Reference (Ver. 5.2.2)\nMy main goal is to fully utilise Cubase 12 Pro control room with the following:\nAdd Sonarworks to Engineer headphone mix (headphone output 1) in control room so that when I mix down I don’t have to disable it (currently it has no affect when I add it) also control headphone volume via green control knob in control room. Using the volume knob in headphones does nothing I’m getting a signal because I can see the level inputs when I enable monitor on the other part of control room.\nAlso do the same with my HS8’s add the speaker Sonarworks profile just to the HS8’s and obviously listen to DAW output plus MODX output once track and when Cubase shut down like when I’m just playing MODX and not recording or using Cubase.\nObviously Sonarworks profiles for use only in Cubase normal stereo modx when noodling and PC switch off so I can hear it live as I play. I hope this is making sense.\nI would also like 1 Cue track setup so l can then control it via control room and the channel strip to send what I’d like to headphones output 2 on focusrite interface.\nIt all sounds simple in my head but difficult to explain lol.\nIn a nutshell:\nSoundworks profile for headphone output 1 in CB 12 Pro control room without need to disable on mixdown / export control headphone 1 volume via knob in CB control room the green one I see it as.\nSoundworks profile for HS8’s monitors on monitor output 1-2 on focusrite CB 12 Pro control room without need to disable on mixdown. Control HS8’s volume via CB control room know the red one I see.\nCue 1 mix to send headphones 2 output on focusrite I can choose mix to send via track strips and CB 12 Pro control room\nAbility to use and hear MODX with or without computer currently plugged into inputs 5-6 on focusrite and also able to record inputs 5-6 in Cubase when needed (I’ve set this up as add external instrument in CB12 Pro) which works great.\nBeing able to keep analog inputs on front 1 to 4 for guitar, bass and two mics.\nThank you to anyone who can help with this, I’m completely lost", "label": "Yes"} {"text": "International Card Services (ICS), the largest credit card issuer in the Netherlands, is to use Aconite technology to provision customers’ cards onto NFC phones. Aconite’s solution will enable ICS to generate mobile EMV applet data and then deliver it in real-time to NFC handsets via a TSM service. ICS will also be able to manage both card and mobile issuance from a single system.\n- Second generation NFC Ring seeks funding\n- BNP Paribas pilots cards with dynamic security codes\n- Samsung Pay gets seven city US promo tour\n- Starbucks takes mobile ordering to the UK\n- Clear2Pay adds certified testing solutions for US move to EMV", "label": "Yes"} {"text": "STMicroelectronics’ IIS2DLPC three-axis MEMS accelerometer can change operating mode on the fly, from ultra-low power to high resolution, enabling high-accuracy measurements within a limited energy budget. The sensor can provide continuous contextual awareness to wake the host system when action is required and take highly accurate measurements before returning to ultra-low power operation.\nA choice of four reduced-power modes lets users optimize power consumption in wide-ranging application scenarios. A noise figure down to 90 μg/√Hz in high-resolution mode accounts for impressive measurement accuracy. Additional features include easy-to-use one-shot data conversion and a 32-level FIFO for storing batched data to reduce CPU intervention. An integrated temperature sensor and built-in self-test capability are also provided.\nSuited to industrial applications, the IIS2DLPC is specified over an extended temperature range from -40°C to +85°C. In production now, it’s packaged as a 2 mm x 2 mm x 0.7 mm plastic land grid array (LGA) device, priced from $1.10 each/1,000. For greater enlightenment, peruse the IIS2DLPC datasheet.", "label": "Yes"} {"text": "A1388 EZ GO WIRING DIAGRAM\nWiring Diagram For 1981 And Older Ezgo Models With\nAug 17, 2017Wiring Diagram For 1981 And Older Ezgo Models With Resistor Speed inside Ez Go Electric Golf Cart Wiring Diagram by admin From the thousands of images online about ez go electric golf cart wiring diagram, we all selects the best choices with greatest image resolution simply for you, and this photos is actually one of graphics series within our finest graphics\nEz Go Golf Cart Battery Wiring Diagram | Free Wiring Diagram\nCollection of ez go golf cart battery wiring diagram. A wiring diagram is a streamlined standard pictorial representation of an electric circuit. It reveals the components of the circuit as streamlined forms, as well as the power as well as signal connections in between the tools.\nEzgo Wiring Diagram | Wirings Diagram\nApr 02, 2019Ezgo Wiring Diagram – ezgo marathon wiring diagram, ezgo rxv wiring diagram, ezgo solenoid wiring diagram, Every electrical structure consists of various distinct parts. Each part should be set and linked to other parts in particular way. Otherwise, the structure will not function as it should be.\nEzgo Pds Wiring Diagram | Free Wiring Diagram\nAssortment of ezgo pds wiring diagram. A wiring diagram is a streamlined conventional photographic representation of an electric circuit. It shows the parts of the circuit as streamlined forms, and the power and also signal links between the gadgets.\n1996 Ez Go Wiring Diagram Sample\nAssortment of 1996 ez go wiring diagram. A wiring diagram is a streamlined traditional photographic representation of an electric circuit. It reveals the parts of the circuit as streamlined shapes, and the power and signal links between the devices.\n1997 Ezgo Wiring Diagram | Wiring Diagram And Schematics\nNov 12, 20191997 Ezgo Wiring Diagram (Nov 12, 2019) - This 1997 ezgo wiring diagram pic has been published. You could grab this amazing pic for your portable, mini netbook or personal computer. You also can easily bookmark these pages to you favourite social bookmarking sites.\n36 Volt Ez Go Golf Cart Wiring Diagram Sample\n36 Volt Ez Go Golf Cart Wiring Diagram Sample - Collections Of Ezgo Txt Golf Cart Wiring Diagram sources. Ezgo Txt 36 Volt Wiring Diagram New Battery Wiring Diagram for Club. Ez Go Txt 36 Volt Wiring Diagram Collection. Ezgo Relay Wiring Wire Center •.\nEZ GO TXT Wiring diagram? - buggiesgonewild\nDec 07, 2018EZ GO TXT Wiring diagram? Hi everyone- I have a 1998 TXT I installed a stretch kit on, and I know I have some of the accessories wired wrong, including the key switch and factory battery gauge.\nHow Do You Get a Free EZ-GO Wiring Diagram? | Reference\nFind Ez Go Wiring Diagram and Save Time and Money at InternetResults. To view free diagrams for E-Z Go golf carts, visit VintageGolfCartParts or BlockbusterGolfCarts. Both websites offer wiring diagrams for the electrical system, charger, speed controller and steering assembly.\nEzgo Txt Wiring Diagram | Wirings Diagram\nEzgo Txt Wiring Diagram – 1997 ezgo txt wiring diagram, 2001 ezgo txt wiring diagram, 2005 ezgo txt wiring diagram, Every electric structure is made up of various unique pieces. Each part should be placed and linked to different parts in specific way. Otherwise, the arrangement won’t work as it should be.", "label": "Yes"} {"text": "Search found 5 matches\nSearch found 5 matches • Page 1 of 1\nHello., I have encountered the same issue previously just like you did. Try this: Goto http://7-zip.org/ Download the 32 or 64bit application as you need and install it. Run the application and navigate to the zip file and click extract. Choose location to extract. THIS TIME IT SHOULD EXTRACT WITHOU...\n- Mon Jun 15, 2015 8:31 am\n- Forum: Troubleshooting\n- Topic: fswebcam Unable to find a compatible palette format\n- Replies: 24\n- Views: 29752\nFor the people who are having the problem of fswebcam crapping out after a few shots I have found a work around. https://gist.github.com/x2q/5124616 is a C program that will reset usb devices by bus and device number save the code as usbreset.c in your home folder then compile $ cc usbreset.c -o us...\nAm a beginner to Raspberry pi GPIO (not to RPi). I have brought a 12V 8 Channel relay and tried setting it up and later i found some issues. I powered the relay with an 12V DC. My RPi is powered by another 5v 1A power source. Then i connected the GPIO pins to the relay inputs, As of now, relay were ...\n- Sun Dec 07, 2014 8:39 am\n- Forum: Beginners\n- Topic: RPi GPIO to Open & Close Car Doors\n- Replies: 1\n- Views: 932\nI need help setting up Raspberry Pi Model B to control Car Door Lock unit(s). I have connected my Rpi to a relay which looks like this : gpio board.JPG I wish to clarify what is NO, C, NC and how do they operate... Here is the image of the door lock unit. 20141207135528.jpg The 12V DC supply is need...", "label": "Yes"} {"text": "It appears a very important anniversary passed by recently without anyone realizing. The January 1975 issue of Popular Electronics featured the Altair 8800 on the cover, otherwise known as the blinky box that launched a revolution, the machine that made Microsoft a software powerhouse, and the progenitor of the S-100 bus. The 40-year anniversary of the Altair wasn’t forgotten by [dankar], who built a front panel emulator with the help of some much more modern components.\nThe build unofficially began with an Intel 8080 emulator written for an Arduino. The 8080 is the brains of the Altair, and while emulators are cool, they don’t have the nerd cred of a panel of switches and LEDs. The hardware began as a bunch of perfboard, but [dankar] wired himself into a corner and decided to make a real schematic and PCB in KiCAD.\nDespite the banks of LEDs and switches, there really isn’t much to this front panel. Everything is controlled by shift registers, but there is a small amount of SRAM in the form of an SPI-capable 23LC1024. This comes in handy, because [dankar] is running CP/M 2.2 on this front panel emulator from disk images saved on an SD card. Everything you would want from a computer from 1975 is there; an OS, BASIC, and enough I/O to attach some peripherals.\nEveryone loves Top Gear, or as it’s more commonly known, The Short, The Slow, And The Ugly. Yeah, terrible shame [Clarkson] the BBC ruined it for the rest of us. Good News!A show featuring the Dacia Sandero drones will be filling the Top Gear timeslot. And on that bombshell…\nNeed an ESP8266 connected to an Arduino. Arachnio has your back. Basically, it’s an Arduino Micro with an ESP8266 WiFi module. It also includes a Real Time Clock, a crypto module, and a solar battery charger. It’s available on Kickstarter, and we could think of a few sensor base station builds this would be useful for.\n[Ben Heck] gave The Hacakday Prize a shoutout in this week’s episode. He says one of his life goals is to go to space. We’re giving that away to the project that makes the biggest difference for the world. We’re not sure how a [Bill Paxton] pinball machine fits into that category, but we also have a Best Product category for an opportunity to spend some time in a hackerspace… kind of like [Ben]’s 9 to 5 gig…\n[Jim Tremblay] wrote a real time operating system for a bunch of different microcontrollers. There are a lot of examples for everything from an Arduino Mega to STM32 Discovery boards. Thanks [Alain] for the tip.\n45s – the grammophone records that play at 45 RPM – are seven inches in diameter. Here’s one that’s 1.5 inches in diameter. Does it work? No one knows, because the creator can’t find a turntable to play it on.\nAre we betting on the number of people who don’t get the joke in the second paragraph of this post? Decide in the comments.\nA word clock – a clock that tells the time with illuminated letters, and not numbers – has become standard DIY electronics fare; if you have a soldering iron, it’s just what you should build. For [Chris]’ word clock build, he decided to build an RGB word clock.\nA lot has changed since the great wordclock tsunami a few years back. Back then, we didn’t have a whole lot of ARM dev boards, and everyone’s grandmother wasn’t using WS2812 RGB LED strips to outshine the sun. [Chris] is making the best of what’s available to him and using a Teensy 3.1, the incredible OctoWS2812 library and DMA to drive a few dozen LEDs tucked behind a laser cut stencil of words.\nThe result is blinding, but the circuit is simple – just a level shifter and a big enough power supply to drive the LEDs. The mechanical portion of the build is a little trickier, with light inevitably leaking out of the enclosure and a few sheets of paper working just enough to diffuse the light. Still, it’s a great project and a great way to revisit a classic project.\nWhile [Drew] was in China for the Dangerous Prototypes Hacker Camp, he picked up some very bright, very shiny, and very cheap LED strips. They’re 5 meter “5050” 12V strips with 20 LEDs per meter for about $15 a spool. A good deal, you might think until you look at the datasheet for the controller. If you want an example of how not to document something, this is it.\nA normal person would balk at the documentation, whereas [Drew] decided to play around with these strips. He figured out how to control them, and his efforts will surely help hundreds in search of bright, shiny, glowy things.\nThe datasheet for the LPD6803 controller in this strip – available from Adafruit here – is hilarious. The chip takes in clocked data in the order of Green, Red, and Blue. If anyone can explain why it’s not RGB, please do so. Choice phrasing includes, “VOUT is saturation voltage of the output polar to the grand” and “it is important to which later chip built-in PLL regernate circuit can work in gear.” Apparently the word ‘color’ means ‘gray’ in whatever dialect this datasheet was translated into.\nDespite this Hackaday-quality grammar, [Drew] somehow figured out how to control this LED strip. He ended up driving it with an LPC1768 Mbed microcontroller and made a demo program with a few simple animations. You can see a video of that below.\nA while ago, [Kyle] built an automated mushroom cultivator. This build featured a sealed room to keep contaminants out and enough air filtering and environmental controls to produce a larger yield of legal, edible mushrooms than would otherwise normally be possible.\nNow, he’s at it again. He’s expanded the hardware of his build with a proper, grounded electrical box for his rig, added more relays, implemented PID for his temperature and humidity controller, and greatly expanded the web interface for his fungiculture setup.\nLike the previous versions of his setup, this grow chamber is controlled by a Raspberry Pi with a camera and WiFi module. Instead of the old plastic enclosure, [Kyle] is stepping things up with a proper electrical enclosure, more relays, more humidity and temperature sensors, and a vastly improved software stack. Inside the enclosure are eight relays for heaters and humidifiers. The DHT22 sensors around the enclosure are read by the Pi, and with a proper PID control scheme, controlling both the temperature and humidity is simply a matter of setting a number and letting the machine do all the work.\nThe fungi of [Kyle]’s labor include some beautiful pink and white oyster mushrooms, although with a setup like this there’s not much fungiculture he can’t do.\nThe table includes a 32×12 grid of LEDs in the center of the table, with 10 pods for Solo cups at each end of the table. These pods have 20 RGB LEDs each and infrared sensors that react to a cup being placed on them. The outer edge of the table has 12 LED rings for spectators, giving this beer pong table 1122 total LEDs on 608 individual channels.\nWith that many LEDs, how to drive all of them becomes very important. There’s a very large custom board in this table with a PIC24 microcontroller, TLC5955 PWM drivers, and enough IDC headers to seriously reconsider using IDC headers.\nPut enough LEDs on something and it’s bound to be cool, but [Jeff] is taking this several steps further with some interesting features. There’s a Bluetooth module for controlling the table with a phone, a VU meter to give the table some audio-based visualizations, and air baths for cleaning the balls; drop a ball down the ‘in’ hole, and it pops out the ‘out’ hole, good as new. If you’ve ever wondered how much effort can go into building a beer pong table, there you go. Video below.\nBuilding a MAME machine – an arcade cabinet that will play everything from Galaga to Street Fighter II – is surely on the ‘to build’ list of thousands of Hackaday readers around the world. It’s a relatively simple build, provided you can put a sheet of MDF in your car; it’s just an emulator, and if you can find a CRT and have an old computer sitting around, you’re already halfway there.\nThere is another class of arcade games that can be emulated. This is, of course, pinball machines. [Jan] built a virtual pinball cabinet over the last few months and his build log is incredible. If you’ve ever wanted to build a pinball emulator, this is the guide to reference.\nThe software is the real star of the show with PinballX serving as the front end, with Future Pinball and Visual Pinball serving as the emulators. These emulators drive the displays, changing out back glasses, and simulating the physics of the ball. The computer running all of this has a few neat electromechanical bits including a shaker motor, an original Williams replay knocker, and some relays or solenoids give the digital table a tremendous amount of force feedback. This is the way to do it, and if you don’t have these electromechanical bits and bobs securely fastened to the machine, you really lose immersion.\nYou can check out a video of the table in action below.", "label": "Yes"} {"text": "Here's the new Canon PowerShot G5 IS, 8 megapixels of compact camera with an attitude, and 1:2.7-3.5 lenses with 12x optical zoom. The new camera supports video mode with stereo sound recording, as you can see from the two microphones mounted in the front.\nCommanded by Canon's DIGIC III processor, this SLR Mini-Me comes loaded with optical Image Stabilizer and a 2.5-inc LCD screen that you can freely move around. The camera supports face detection for auto-focus, built-in red-eye correction and can even use extra optics for telephoto and wide-angle shots using an optional lens adapter. It also has a flash shoe and support for SDCH/SD and MMC memory cards. Weighting 15.9 oz it looks like the build is solid, although I am not convinced about the 4 alkaline batteries included in the package. We don't have a price yet, but we have a gallery with sample photos and images of the camera for *free*.", "label": "Yes"} {"text": "Please upgrade to the new Edge browser, or use Chrome, Firefox or Safari, before continuing. Internet Explorer will not support the best shopping experience on the ADI Digital Branch site after March 12, 2021.\nClear imaging against strong back light due to 130 dB WDR technology\nFocusing on human and vehicle classification based on deep learning\n24/7 colorful imaging\nHikvision ColorVu technology provides 24/7 vivid colorful images with F1.0 advanced lenses, high performance sensors and friendly lighting. F1.0 super-aperture collects more light to produce brighter images. Advanced sensor technology can vastly improve the utilization of available light. In zero-light scenarios, built-in, warm supplemental lighting works to guarantee colorful images.\nCategory : Bullet Cameras, IP Camera's, IP Video, Products", "label": "Yes"} {"text": "In addition to iOS 10.2 and tvOS 10.2, Apple has also released watchOS 3.1.1. According to Apple, the update:\nThe update includes improvements and bug fixes, including:\n° Fixes an issue that could prevent contact names from appearing in the Messages app and notifications;\n° Fixes an issue that could impact ability to respond to notifications;\n° Resolves an issue where the Stocks complication may not update on the watch face;\n° Fixes an issue that may prevent the Activity rings from displaying on the Activity watch faces;\n° Fixes an issue that prevented the dials on an analog watch face from appearing after changing the temperature unit in the Weather app;\n° Resolves an issue that could cause the Maps app to stay launched after navigation has ended;\n° Resolves an issue where the incorrect date could be displayed in the Calendar app month view.\nYou can obtain watchOS 3.1.1 by using the Apple Watch app. The smartwatch must be connected to a power source and have more than 50% battery remaining to do the update.", "label": "Yes"} {"text": "27C64 datasheet, 27C64 pdf, 27C64 data sheet, datasheet, data sheet, pdf, Microchip, 64K (8K x 8) CMOS EPROM. 27C64 64k (8k X 8) CMOS EPROM FEATURES. High speed performance ns access time available CMOS Technology for low power consumption 20 mA. The 27C64 specified on this data sheet is fully compliant with MIL-STD Revision C. Features. Y Clocked sense amps for fast access time down to. ns .\n|Published (Last):||8 November 2010|\n|PDF File Size:||1.63 Mb|\n|ePub File Size:||10.17 Mb|\n|Price:||Free* [*Free Regsitration Required]|\nMicrochip Technology Australia Pty Ltd.\nIt is ideally suited for micro. Exposure to maximum rating con. The memory matrix is erased to the all. When programming multiple devices in parallel with dif.\nMicrochip products meet the specification contained in their particular Microchip Data Sheet. The device is organized as 8K words by 8 bits 8K. V CC is at the proper level. A flowchart of the express algorithm is.\nNeither Microchip nor any other semiconductor manufacturer can guarantee the security of their code. This is a stress rat.\nDistrict, Foshan City, GuangdongChina. Use of Microchip’s products as critical. V PP voltage w. Yokohama, Kanagawa,Japan. These are stress ratings only and operation of the device at these or any other. After the array has been programmed it must be veri.\nThe FDIP28W window ceramic frit-seal package has transparent lid which allows the user to expose the chip to ultraviolet light to erase the bit pattern.\nV CC is brought to the proper voltage.\nAddress CE or OE. Program Pulse Width 1. When data and address are sta. UnitTower 2, Metroplaza. Far East International Plaza. To order or to obtain information, e. Data is transferred to the output.\nPrinted on recycled paper. Read Mode is accessed when. All of these methods, to our.\nYusen Shin Yokohama Building 10F. The outputs go into a high impedance state. High speed “express” programming algorithm.\nNote the following details of the code protection feature on Microchip devices: The modes of operation of the M27C64A are listed. Output Datawheet G is the output control and should. The Microchip name and logo, the Microchip logo, Accuron. Wan Tai Bei Hai Bldg.", "label": "Yes"} {"text": "mercury outboard wiring diagram 2004 mercury mountaineer stereo wiring mercury mountaineer electrical problems 2004 mercury mountaineer wiring diagram 1998 mercury mountaineer fuse diagram 1997 mercury mountaineer fuse box diagram mercury mountaineer seats 2003 mercury mountaineer wiring diagram\n1998 Mercury Mountaineer Wiring Diagram Description1998 mercury mountaineer wiring diagram\nanswer i cant speak for a 98 model but on a 95 the diagram is in the owners manual if you need the one for the module under the hood it is on the inside of the lid ans wer hi i have a 98 as. 1998 mercury mountaineer wiring diagram\n97 Mercury Mountaineer Stereo Diagram 2000 Mercury Mountaineer Radio Wiring Diagram 1998 Mercury Grand Marquis Wiring Diagram 1997 Mercury Mountaineer Fuse Box Diagram Wiring Diagram for 2002 Mercury Mountaineer 1998 Mercury Mountaineer Vacuum Diagram Mercury Mountaineer Electrical Problems 2007 Mercury Mountaineer Radio Wiring Diagram 2004 Mercury Mountaineer Wiring Diagram 2004 Mercury Mountaineer Stereo Wiring 2003 Mercury Mountaineer Wiring Diagram 1998 Mercury Tracer Wiring Diagram Mercury Mountaineer Engine Diagram Mercury Mountaineer Fuse Box Diagram Wiring diagram is a technique of describing the configuration of electrical equipment installation, eg electrical installation equipment in the substation on CB, from panel to box CB that covers telecontrol & telesignaling aspect, telemetering, all aspects that require wiring diagram, used to locate interference, New auxillary, etc.1998 Mercury Mountaineer Wiring Diagram\nThis schematic diagram serves to provide an understanding of the functions and workings of an installation in detail, describing the equipment / installation parts (in symbol form) and the connections.1998 Mercury Mountaineer Wiring Diagram\nThis circuit diagram shows the overall functioning of a circuit. All of its essential components and connections are illustrated by graphic symbols arranged to describe operations as clearly as possible but without regard to the physical form of the various items, components or connections.", "label": "Yes"} {"text": "Anderson, Betty Lise\nProfessor Anderson has been at The Ohio State University since 1990. She obtained her Ph.D. in Materials Science and Electrical Engineering at the University of Vermont in 1990 and her MS from there as well in 1988. Her technical area is photonics.\nAnderson started her career as a teacher at an experimental elementary school. She earned a BSEE at Syracuse University in 1978, after which she worked in industry for nine years at Tektronix, Inc., C.S. Draper Labs, and GTE Laboratories.\nDr. Anderson runs the K12 Engineering Outreach program at Ohio State. She is also currently the Associate Chair of the Department of Electrical and Computer Engineering. She is co-author of \"Fundamentals of Semiconductor Devices,\" now in its second edition at McGraw Hill.\nProf. Anderson is a Fellow of the SPIE (Society for Photo-Instrumentation Engineers), and a senior member of the Institute of Electrical and Electronics Engineers and the Optical Society of America. In 2022 she was awarded the National Science Board Publics Service Award, and in 2006 she was awarded the Outstanding Woman in Technology: TopCAT (Top Contributors to the Advancement of Technology)” by the Columbus Technology Council (Now Tech Columbus).\nBetty Lise Anderson has multiple patents in the areas of optical switching, optical sensing, and optical computing. She teaches courses in fiber optics and the optical effects of materials, as well as semiconductor physics. She also has worked in medical optics and solar energy.", "label": "Yes"} {"text": "Please use this identifier to cite or link to this item:\n|Title:||Robust adaptive transmission of data partitioned video|\n|Citation:||Pu, T.Y.,Wong, W.C. (2000). Robust adaptive transmission of data partitioned video. IEEE Region 10 Annual International Conference, Proceedings/TENCON 2 : II-431. ScholarBank@NUS Repository.|\n|Abstract:||In this paper, we first propose a new interlayer synchronization scheme for data partitioned video streams. Unlike conventional schemes, synchronization information is represented as bit position differences between layers and placed in the first layer, which is transmitted via a better channel. Based on data partitioning, we design an adaptive transmission scheme where the source code rate, channel code rate and modulation schemes are changed in an optimal way in response to varying channel conditions.|\n|Source Title:||IEEE Region 10 Annual International Conference, Proceedings/TENCON|\n|Appears in Collections:||Staff Publications|\nShow full item record\nFiles in This Item:\nThere are no files associated with this item.\nchecked on Jan 26, 2019\nItems in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.", "label": "Yes"} {"text": "Product name: 960Wh Backup Power Station Home Solar Power Station for Laptop / Lighting / TV\nProduct model: Drivelong DP Series\nBackup power station DP series built-in Gen-mate intelligent wireless monitoring system, this allows user monitor and troubleshoot via their smartphone in real time. If the car battery is dead, Backup power station DP series can help you out of the trouble. Backup power station DP series comes with a large capacity battery, make it more powerful. Users can easily replace the battery for Backup power station DP series, extend the use life of the machine. Backup power station DP series is perfectly suited for many applications, such as Camping, Recreational Vehicle, Remote Scientific and Research Sites.\nDP Series(DP500i, DP1000i, DP1500i) Specification:\nWhat it Powers:\nSuzhou DriveLong Intelligence Technology Co., Ltd. was founded in March 2015. We have manufacturing plant in Jiangsu and Shandong provinces. Our products come with 2 years limited warranty from the date of purchase, providing parts for replacement. Our main products are inverter generators and portable power stations. Innovation drives the future.", "label": "Yes"} {"text": "[R] Triplet loss for image retrieval\nThis is an example of image retrieval based on MNIST and fashion-MNIST!\nAfter learning by using typical triplet loss (a type of metric loss), we checked the retrieval results for the query image.\nDespite simple learning, the results show fairly accurate retrieval results.\nWe have also shown the embedding space for the learned network in various ways.\nIf you are interested in doing research or metric learning, you might want to refer to it.\nsubmitted by /u/kdhht2334", "label": "Yes"} {"text": "Novel GaN trench MIS barrier Schottky rectifiers with implanted field rings\ninternational electron devices meeting, 2016.\nWe demonstrate a novel GaN vertical Schottky rectifier with trench MIS structures and trench field rings. The new structure greatly enhanced the reverse blocking characteristics while maintaining a Schottky-like good forward conduction. The reverse leakage current improved beyond 10 4 -fold and the breakdown voltage increased from 400 V t...More\nFull Text (Upload PDF)\nPPT (Upload PPT)", "label": "Yes"} {"text": "Factory supplied Air circuit breaker-FTW2 for Juventus Importers\nExterior and dimensions\nWe not only will try our best to offer excellent services to every customer, but also are ready to receive any suggestion offered by our customers for Factory supplied Air circuit breaker-FTW2 for Juventus Importers, We believe that a passionate, innovative and well-trained team will be able to establish good and mutually beneficial business relationships with you soon. Please feel free to contact us for more details.\n|Model:||Rated voltage (V):||Rated insulation voltage/Rated impulse withstand voltage Uimp(KV):||Installation(poles):||Frame size rated current(A)||Rated current(A)||Rated breaking Capacity(KA):||Rated short-time withstand current||Operating performance|\n|Rated Ultimate Short-Circuit Breaking Capacity||Rated short-circuit breaking capacity||Power on(times)||Power off(times)|\n|FTW2-1600||AC400||690/12000||withdrawable type,stationary type(3 poles,4poles)||1600||200,400,630, 800, 1000||55||42||42||10000||5000|\nIf you’re looking for schematics and discussion, please check out the thread on HombrewTalk.com:\npanel conn RTDCON\n63a disconnect SD2-063-RR\nblack switch GCX3300\nred switch GCX3252-120L\n30a breaker WMZS2B30\n10a breaker WMZS1B10\nDIN rail DN-R35S1-2\nPanel-mount fuse holders\n1A fast-blow fuses\n10ga wire (red/black)\nPlastic housing and fittings\nCopper ground lug\nTransistor BJT in Hindi, bipolar junction transistor NPN and PNP working difference are explained in Hindi in video tutorial. Lecture on BJT transistor switch circuit concept. Noise pick up demo, Experience based BJT circuit design tips, application as an amplifier, noise pickup by transistors, how to suppress noise, faster on off operation, are explained. Educational tutorials 49 by G K Agrawal on electronics engineering in Hindi.\nLecture is given by person with industrial experience and useful for electrical, electronic communication .and power electronics engineering students.\nAlso watch https://www.youtube.com/watch?v=bkFVBNFj1kQ\nAlso watch https://www.youtube.com/watch?v=B2l6zn_7RoU\nAlso watch https://www.youtube.com/watch?v=v_xAHOjVE1g\nBJT transistor in Hindi, how bipolar junction transistor works, What is concept, NPN vs PNP difference are explained in Hindi. npn Hindi. BJT Hindi. How BJT works Hindi.", "label": "Yes"} {"text": "In this paper, we propose a line-based SLAM from an image sequence captured by a vehicle in consideration with the directional distribution of line features that detected in an urban environments. The proposed SLAM is based on line segments detected from objects in an urban environment, for example, road markings and buildings, that are too conspicuous to be detected. We use additional constraints regarding the line segments so that we can improve the accuracy of the SLAM.We assume that the angle of the vector of the line segments to the vehicle's direction of travel conform to four-component Gaussian mixture distribution. We define a new cost function considering the distribution and optimize the relative camera pose, position, and the 3D line segments by bundle adjustment. In addition, we make digital maps from the detected line segments. Our method increases the accuracy of localization and revises tilted lines in the digital maps. We implement our method to both the single-camera system and the multi-camera system. The accuracy of SLAM, which uses a single-camera system with our constraint, works just as well as a method that uses a multi-camera system without our constraint.", "label": "Yes"} {"text": "AirLive, one of the most advanced international IP Surveillance Networking products and solutions provider is announced its participation at Computex 2015 (Taipei, Taiwan World Trade Center Hall 1, A1117). AirLive will showcase its latest Surveillance Networking Solutions innovation products, Live Demo on Objecting by IVS IPCam, Smart Focus IPCam, Speed Dome IPCam, and IVS Standalone IPCam, Fisheye IPCam, Home APPCam series; 4 major topics to complete AirLive Surveillance Network Solution: CoreNVR+CMS, Device Guard PoE Switch + Core Switch, AC & N Top + AirLive Central Wireless, Surveillance Wireless Networking Solution.\nAirLive supports vary product lines to provide IP Surveillance Networking Solutions which applied to all applications from Home/Smart Home, Smart Building, Smart Enterprise, Retails, Business (Hotel, Shopping Mall, Restaurant, Bank, and Casino), Public Constructions (Station, Train Station, and Airport), ISP, Telecom, even it’s under the unable-to-place cabling environment.\nAirLive Central Wireless for AirLive AC & N Top provide Retails, Restaurants, Coffee Shops, Franchise stores, hotels, etc. an easy way to manage wireless devices from discovering devices, change configurations, firmware upgrades.\nFiber Switch, SNMP-24MGB Plus fulfill the demand of large bandwidth to provide completed the surveillance network solution need.\nSmart Focus IPCam Series allows users adjust the focus and zoom remotely. Therefore, there is no need to open the camera case. The camera has 3.5x electric motorized zoom that you can change from the wide angle view to close view. Furthermore, the camera will focus instantly after zoom adjustment.\nIVS (Video Analytics) IPCam Series Enhance tracing the video record easily, and increase system’s efficiency and reduce system’s loading. AirLive IVS IPCam is ideal for installation in public spaces such as airports, stadiums, border posts, offices, shopping centers and buildings that need to monitor and analyze the movement of people and objects. Besides detection capabilities and Face recognition, these cameras have built-in intelligent video analytics (IVS) that offer a wide range of capabilities extremely useful for implementing a video surveillance system professional level.\nThis AirLive Speed Dome Series designed for investigating objects with-in 5 seconds. It will be the best solution for big project such as Train Station, Airport, Highway, and other highly-secure buildings. Additional Smart Tracking Function is the best choose for business off-time security.\nDevice Guard Switch Series is a PoE switch which plays as a guard for the all system, will automatic re-power the PoE IP camera or AP, when the switch detect that particular IP camera or Access Point is not working or disconnected.", "label": "Yes"} {"text": "The voting for the #beapirate challenge 2022 ended.\nAs deaf-blind people can't see as well as hear, this made it challenging for them for getting educational access and being active in social interactions which lead to social isolation.\nThe project we are creating is a portable AI aided A.T (assistive technology) which translates the voice and text through an AI recognition method and translates them into braille text and vice versa. The translated information would be displayed on the temporary display made up of refreshable Braille cells. A Braille keyboard is used to communicate back. The information is outputted through text and voice on a connected device. This project would makes the social interaction and educational access way easier for them.\n-Braille Brains' device can translate content inputted through a device\n-Flexible display of translation ,which erases the previous translation accordingly\n-Both cord and Solar chargeable device ,which enables the user to use it in anytime, anywhere .Few features like solar chargeable, offline translation (benefit from future collaboration) would save running cost of the device.\nWe empower them with our device to make them use their full potential.", "label": "Yes"} {"text": "The Ledlenser P6R Core flashlight offers everything you could wish for in a modern flashlight. With a luminous flux of 900 lumens at a light range of 240 meters and a maximum runtime of up to 95 hours, you can turn night into day. A special feature of the P6R Core is the Advanced Focus System, which allows you to switch the light continuously between homogeneous close-up light and sharply focused high beam. Due to the IPX8 protection certification, the flashlight can withstand heavy rain without any problems. With Smart Light Technology, it is possible to personalize all light functions. The battery is charged using the Magnetic Charge System.\n- Advanced Focus System for efficient, tailored light in the focused and defocused state\n- Smart Light Technology to personalize all light functions\n- Extremely high protection against dust and water (protection class IP68) thanks to Flex Sealing Technology\n- Constant Light for constant luminous flux over a long period of time\n- Convenient charging of the battery using the Magnetic Charge System", "label": "Yes"} {"text": "What is it?\nThe specifications of most laser mirror surfaces involve sub micrometer dimensions, too small to measure mechanically. Interferometry uses laser light to generate interference patterns that can be interpreted to measure the flatness, radius of curvature, or angle of a laser optic as well as other properties.\nFor the majority of our mirrors we use a phase shifting interferometer for quality assurance. With software analysis of the interference pattern a hard copy of the results is available to our customers. This demonstrates that surface form specifications such as power and irregularity have been met.\nThis measurement of the spacing and curvature of the black and white lines (or fringe pattern) can be used to interpret the optical flatness of the laser mirror.\nWhat is it used for?\nIt is also useful to measure and align optical assemblies such as reflective beam expanders or collimators, with an interferometer.\nOf great interest to us has been investigating the mounting of optics and observing the deformation that can occur to mirrors from poorly designed mounts or excessive mechanical force. We can supply mirrors complete with mounts and internal water cooling, proven by interferometry that the assembled mirror has not been deformed.\nWe also use interferometry to measure the wedge of flat laser mirrors to ensure parallelism.\nResults can be reported in many different forms, such as ISO 10110, Zernike polynomials or graphically.\nAs part of the company’s commitment to innovation and growth we have invested in a new 3D optical profiler (Filmetrics Profilm 3D). It uses state-of-the-art white-light interferometry to enable us to measure surface roughness from sub-nanometer to millimetre scale – something that is essential for some of our customers where surface finish is vitally important. Reports are easily generated and can be supplied upon request by customers.", "label": "Yes"} {"text": "2 ft. x 2 ft. 48W Color Selectable (5CCT) Integrated Edge-Lit Flat Panel T-Bar Grid Flush Mount LED Light Fixture\nGet the right light for any situation or task with the Feit Electric 2 ft. x 2 ft. White LED Flat Ceiling Fixture with Selectable Color Temperature. Its ultra-slim, low-profile...\nGet the right light for any situation or task with the Feit Electric 2 ft. x 2 ft. White LED Flat Ceiling Fixture with Selectable Color Temperature. Its ultra-slim, low-profile design (less than 1 in.) is perfect for any low-ceiling area. No-glare, edge-lit LEDs are integrated, so there are no bulbs to replace. With our selectable color switch, you can preset your preferred light color temperature: Warm White, Neutral White, Cool White, Daylight, or Daylight Deluxe (3000/3500K/4000/5000K/6500K) or set it to switch, for an easy toggle between color temperatures with a simple flip of a standard light switch. This energy-efficient fixture uses 48 watts of electricity and up to 80% less energy than a standard incandescent light bulb and produces even light distribution of 4250 lumens. The streamlined design of the LED flat panel, combined with patent pending easy-to-install mounting brackets, enables simple installation in both residential and commercial buildings. The FP2X2/6WY/WH fixture can be mounted as a ceiling flush mount or wall sconce in living rooms, kitchens, laundry rooms, basements, or in retail spaces. It has an average life of 50,000 hours/45.7 years.Read More Read Less\nShare this item\nannual energy cost\nenclosed fixture rated\nfixture lens material\nLED - SMD", "label": "Yes"} {"text": "DID YOU KNOW? DTIC has over 3.5 million final reports on DoD funded research, development, test, and evaluation activities available to our registered users. Click HERE\nto register or log in.\nCorvus Disk Operating System (CorDos) User's Manual.\nFinal rept. 1 Oct 84-31 Dec 85,\nDAVID W TAYLOR NAVAL SHIP RESEARCH AND DEVELOPMENT CENTER BETHESDA MD\nPagination or Media Count:\nThis report is a users manual for the CorDos 1.2 Disk Operating System as used by the Naval Supply Systems Commands Computer Aided Warehouse Design System. CorDos 1.2 is operational on the Radio Shack Model II microcomputer. Under CorDos, the capability of the Computer Aided Warehouse Design System to produce voice and printed output in addition to normal screen display and printed output is maintained. Voice output was designed into the workstation to allow use of the workstation by a totally blind user who could not function independently at the workstation without voice output. For users not requiring voice output, CorDos functions without any loss of capabilities. This users manual describes CorDos for use with and without voice output. Keywords Corvus Hard Disks.\nAPPROVED FOR PUBLIC RELEASE", "label": "Yes"} {"text": "What’s the biggest mystery in our universe? Probably that’s our mind. But what would happen if we’re able to tap into the power of modern information technology to understand our mind, and eventually ourselves, better? In this workshop, the participants will get to experience how to analyse Electrodermal Activity (EDA) to visualise our real time emotion status – and use such insight to learn to manage stress better, to train up our resilience and build genuine human connections.\nDate: October 27, 2021 (Wednesday)\nVenue: Tam Wing Fan Innovation Wing\nClass size: 15\nEligibility: Inno Wing and InnoHub members (Prior knowledge of assembling Arduino device is NOT required.)\nIn this interactive workshop, students will assemble an EDA monitoring device by themselves and learn to use the device to plot emotional states mindfulness, stress, resilience and biofeedback. There will also be a brief mindfulness practice session and students would discuss on how the device can be applied in counselling and psychotherapy. After this workshop, interested students may form a student interest group at Innovation Wing to continue exploring the potentials of this device.\n- Introduction to EDA and psychophysiology response\n- Introduction to galvanic skin response (GSR) technology\n- Hands-on exercise: assembling an EDA monitoring device\n- Introduction to mindfulness\n- Brief mindfulness practice\n- Demonstration and testing of THK’s GSR glove and its potential\n- Students tinkering around their GSR device", "label": "Yes"} {"text": "The device, nicknamed SPARKy, short for Spring Ankle with Regenerative Kinetics, will be a first-of-its-kind smart, active and energy-storing transtibial (below-the-knee) prosthesis.\nExisting technology in prosthetic devices is largely passive and requires the amputee to use 20 to 30 percent more energy to propel themselves forward when walking compared to an able-bodied person, according to Thomas Sugar, ASU assistant professor of engineering at the Polytechnic campus.\nOnce complete, SPARKy is expected to provide functionality with enhanced ankle motion and push-off power comparable to the gait of an able-bodied individual.\n\"A gait cycle describes the natural motion of walking starting with the heel strike of one foot and ending with the heel strike of the same foot,\" says Sugar. \"The cycle can be split into two phases — stance and swing. We are concerned with storing energy and releasing energy (regenerative kinetics) in the stance phase.\"\nWhen you look at the mechanics of walking, it can be described as catching a series of falls, explains Sugar. In the team's device, a tuned spring brakes falls and stores energy as the leg rolls over the ankle during the stance phase, similar to the Achilles tendon.\nSugar's team, made up of doctoral students Joseph Hitt and Matthew Holgate, and ASU Barrett Honors College student Ryan Bellman, have coined SPARKy a robotic tendon because of its bionic properties.\n\"What we hope to create is a robotic tendon that actively stretches springs when the ankle rolls over the foot, thus allowing the springs to thrust or propel the artificial foot forward for the next step,\" said Sugar. \"Because energy is stored, a lightweight motor can be used to adjust the position of a uniquely tuned spring that provides most of the power required for gait. Thus, less energy is required from the individual.\"\nThe team is the first to apply regenerative kinetics to design a lightweight prosthetic device. Others are using large motors combined with harmonic drives, a monopropellant or extremely high-pressure oil.\nSugar's team already has proof that SPARKy is working. In recent experiments with able-bodied subjects outfitted with a robotic ankle orthosis, or a powered assist device, the researchers found that the spring and motor combination was able to amplify the motor power by three-fold. This significant finding allows SPARKy to be downsized from a 6 to 7 kg motor system to a 1 kg (2 lb) system, which is significant weight savings for those who wear a prosthetic.\n\"We expect this device to revolutionize prosthetics and will be especially helpful for military personnel wounded in active duty,\" says Hitt.\nThe project is a multi-phased effort led by ASU's Human Machine Integration Lab, Arise Prosthetics, Phoenix, and Robotics Group Inc., Scottsdale, Ariz. Arise Prosthetics is helping in the fitting of the device and Robotics Group, Inc. is designing embedded processors and motor amplifiers.\nThe first phase of SPARKy featuring the robotic tendon is expected to be ready for demonstration in December 2007. \"I will know it is successful when a wounded solider is able to walk using the device on a treadmill,\" said Sugar about this phase.\nThe project will culminate with the functionality to support walking in a daily environment, which is expected in 2009.\nChristine Lambrakis | EurekAlert!\nBiofilm discovery suggests new way to prevent dangerous infections\n23.05.2017 | University of Texas at Austin\nAnother reason to exercise: Burning bone fat -- a key to better bone health\n19.05.2017 | University of North Carolina Health Care\nStaphylococcus aureus is a feared pathogen (MRSA, multi-resistant S. aureus) due to frequent resistances against many antibiotics, especially in hospital infections. Researchers at the Paul-Ehrlich-Institut have identified immunological processes that prevent a successful immune response directed against the pathogenic agent. The delivery of bacterial proteins with RNA adjuvant or messenger RNA (mRNA) into immune cells allows the re-direction of the immune response towards an active defense against S. aureus. This could be of significant importance for the development of an effective vaccine. PLOS Pathogens has published these research results online on 25 May 2017.\nStaphylococcus aureus (S. aureus) is a bacterium that colonizes by far more than half of the skin and the mucosa of adults, usually without causing infections....\nPhysicists from the University of Würzburg are capable of generating identical looking single light particles at the push of a button. Two new studies now demonstrate the potential this method holds.\nThe quantum computer has fuelled the imagination of scientists for decades: It is based on fundamentally different phenomena than a conventional computer....\nAn international team of physicists has monitored the scattering behaviour of electrons in a non-conducting material in real-time. Their insights could be beneficial for radiotherapy.\nWe can refer to electrons in non-conducting materials as ‘sluggish’. Typically, they remain fixed in a location, deep inside an atomic composite. It is hence...\nTwo-dimensional magnetic structures are regarded as a promising material for new types of data storage, since the magnetic properties of individual molecular building blocks can be investigated and modified. For the first time, researchers have now produced a wafer-thin ferrimagnet, in which molecules with different magnetic centers arrange themselves on a gold surface to form a checkerboard pattern. Scientists at the Swiss Nanoscience Institute at the University of Basel and the Paul Scherrer Institute published their findings in the journal Nature Communications.\nFerrimagnets are composed of two centers which are magnetized at different strengths and point in opposing directions. Two-dimensional, quasi-flat ferrimagnets...\nAn Australian-Chinese research team has created the world's thinnest hologram, paving the way towards the integration of 3D holography into everyday...\n24.05.2017 | Event News\n23.05.2017 | Event News\n22.05.2017 | Event News\n26.05.2017 | Life Sciences\n26.05.2017 | Life Sciences\n26.05.2017 | Physics and Astronomy", "label": "Yes"} {"text": "Samsung brings its AI-powered image editing app to the Galaxy S23 series\nSamsung launched a pretty sophisticated photo editor app powered by AI back in July. The Galaxy Enhance-X app was compatible with a very limited range of Galaxy devices, but the new version of the app has been specifically designed to take advantage of the powerful processors inside the Galaxy S23 series.Released earlier today, Samsung Galaxy Enhance-X v1.0.55 beta only supports the company’s latest Galaxy S23 flagship because image processing through AI requires complex processing, which is why it needs high-end hardware like that packed inside the Galaxy S23 series. (via SamMobile)\nHowever, Samsung confirmed that Galaxy S22 users will soon get access to the new version of the photo editor very soon. Additionally, the South Korean handset maker revealed that the Galaxy Enhance-X app will be supported by some of the Galaxy A series devices, although not all features might be available for these non-flagship phones.\nRight now, the Galaxy Enhance-X app for S23 series supports photo remaster, image enhancement, and remove artifact functions. If you own one of Samsung’s newest flagships, you’ll be able to use features like Magic, HDR, Brightness, Focus Improvement, Lens Distortion Correction, Upscale (4x resolution improvement), and Sharpen.\nAlso, you’ll be able to apply various enhancement features like beauty and light effect in portrait mode. In the Remove Artifact menu, the app provides users with the ability to remove shadows from their pictures, as well as reflective objects.\nWith the Galaxy Enhance-X app, users can start modifying their pictures as soon as they are captured. Most of the functions available in the app can be applied with just one tap, so it doesn’t really require too in-depth knowledge about photography.\nThe latest version of Galaxy Enhance-X app is available for download for free via the Galaxy Store. It’s an 85MB download, so it’s not going to take too much of your precious storage space.", "label": "Yes"} {"text": "Skip to Main Content\nIn electrical vehicle driving systems, the DC bus usually shows large surge voltages because of the presence of loop parasitic inductance and hard-switching operations of voltage source inverters. The unexpected transient overvoltage mostly accounts for switching devices failures. To guarantee system reliability, high-voltage-rating insulated-gate-bipolar-transistors (IGBTs) are commonly used in practical systems to accommodate potential surge voltages. This eventually results in the increase of power loss and system cost. A comprehensive study is presented in this study to minimise the surge voltage across the DC bus. It starts with a surge voltage model indicating that the commutation loop inductances and the switching dynamics are two critical contributors to voltage spikes. An optimal design approach to lower the stray inductance of the connecting busbar is presented. Considering the characteristics of electric vehicle (EV) inverters controlled by space vector modulation, a slew-rate limiter strategy is proposed to minimise the surge voltage. The low inductance busbar design and control strategy are validated by simulation and experimental test.", "label": "Yes"} {"text": "I am trying to implement a simple project where I send a message from node 1 to node 2 using CAN. Both the nodes are lpc1769 boards. I suppose there are some issues with the code. As I am a beginner, I request you to provide any reference codes I can look into(polling implementation will be more helpful).\nThanking you in advance.", "label": "Yes"} {"text": "International Conference: ALD for industry\nThe 6th International Conference „ALD FOR INDUSTRY“ will again show the bridge between basic science, industrialisation and commercialisation of this technology.\nAtomic layer deposition (ALD) is a process used to deposit a wide variety of thin film materials from the vapor phase of matter. The Global Atomic Layer Deposition ALD Equipment Market Size was estimated at USD 1296.62 million in 2021 and is projected to reach USD 6744.66 million by 2028, exhibiting a CAGR of 26.56% during the forecast period. The growth of this technology is not only based in microelectronics applications, but also in areas of industrial Li-Ion batteries, photovoltaics and quantum technology. Atomic layer deposition, is a thin film technology that enables new and highly innovative products for a wide range of applications.\nIn 2023 the EFDS will organize the 6th workshop „ALD FOR INDUSTRY“ in Dresden (Germany), at one of the focal points of European thin-film technologies in industrial applications and research. „ALD for industry provides the opportunity to get in touch with industrial and academic partners, to learn more about fundamentals and potential application of ALD technology\nThe Workshop will focus on the currents markets for ALD and address the applications in Semiconductor industry, MEMS &Sensors, Battery technology, Medical, Display, Lightning and Photovoltaics.", "label": "Yes"} {"text": "Asteroids that pass close to Earth have become the focus of increased attention in recent years, partly because of the potential threat they pose to humanity.\nBut they are also a potential boon. For decades, science fiction writers and various space scientists have pointed out that asteroids offer a huge untapped source of valuable resources. Bringing just a small portion of this back to Earth could be a game changer for our planet.\nAnd even if this stuff is too expensive to bring home, it could provide the raw materials for rocket fuel and perhaps even rockets themselves to be manufactured in space. Many visionaries have greedily eyed these resources in the hope that a new gold rush is just around the corner.", "label": "Yes"} {"text": "Cingulata is used to develop applications capable of processing encrypted data without having to decrypt it. With Cingulata, processing data in the cloud or in collaborative workflows no longer has to compromise data privacy.\nCingulata is a compilation chain that can process encrypted data without having to decrypt it. It is useful in collaborative workflows, for example, for applications requiring the processing of customer or partner data without compromising the privacy of the information the data contains.\nUsing fully homomorphic encryption, an advanced encryption technique, Cingulata creates, optimizes, and deploys applications capable of processing encrypted data on remote servers, guaranteeing end-to-end privacy. With Cingulata, partners can exchange and process confidential data without revealing the information the data contains. It can also be used to develop cloud-based services that can analyze encrypted confidential data, without revealing the information in the data or the results of the analysis.\nThis open-source software meets a wide range of needs in the defense, energy, health, biometrics, multi-mode transportation, manufacturing, and other industries.\nCingulata offers several major advantages:\nScalnyx partnered with CEA-List to develop a secure-by-design solution to speed up processing on encrypted data. Performance is still a major challenge for this type of processing. Scaltrust, the solution developed by Scalnyx, leverages CEA-List’s Cingulata compilation chain and Scalnyx’s software acceleration technology.\nLearn more about the R&D partnership between Scalnyx and the CEA.\nRevisiting stream-cipher-based homomorphic transciphering in the TFHE era, A. A. Bend oukha, A. Boudguiga and R. Sirdey. Foundations of Privacy & Security (FPS), 2021. « in press ».\nSPEED: Secure, PrivatE, and Efficient Deep learning, A. Grivet Sébert, R. Pinot, M. Zuber, C. Gouy-Pailler and R. Sirdey. Machine Learning Journal 110, 675–694, 2021 (DOI). Presented at ECML’21.\nEfficient homomorphic evaluation of k-NN classifiers, M. Zuber and R. Sirdey. Proceedings on Privacy Enhancing Technology Symposium 2, 111-129, 2021 (DOI). Presented at PETS’21.\nFaster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of boolean circuits, P. Aubry, S. Carpov and R. Sirdey. 2020 Cryptographers’ Track at the RSA Conference.\nPractical fully homomorphic encryption for fully masked neural networks, M. Izabachène, R. Sirdey and M. Zuber. Proceedings of the 18th International Conference on Cryptology and Network Security, 24-36, LNCS 11829, 2019 (DOI).\nA SaaS implementation of a new generic crypto-classifier service for secure energy efficiency in Smart Cities, O. Stan, M.-H. Zayani, R. Sirdey, A. Ben Hamida, M. Mziou-Sellami and A. Ferreira Leite. In Smart Cities, Green Technologies and Intelligent Transport Systems, pp. 90-115, 2019 (DOI).\nNew Techniques for Multi-value Input Homomorphic Evaluation and Applications, S. Carpov, M. Izabachène, V. Mollimard. 2019 Cryptographers’ Track at the RSA Conference (DOI).\nGo to Cingulata", "label": "Yes"} {"text": "Electro-Magnetic Field Pollution -- Remediation Solutions\nPlease call for 20+ volume discount prices.\nElectro-Magnetic Field Meters\nBetter RF Meter. Budget Minded, Information Packed! The meter represent both a price and technology breakthrough! Simple hand held meter is so easy to use: One button, just to turn it on/off! Uses ordinary 9V battery (not included). Very sensitive (down to 25mV/m = 0.16 nW/cm²) and goes as high as 14.8 V/m = 58 μW/cm². Broad frequency range too: 100MHz to 3.0GHz digital or analog signals. ±3.5dBm accuracy. Look at all the information on the LCD screen: Signal power level in dBm Signal power density in μW/m², mW/m², or W/m² (automatic) Horizontal bar \"power level display\" with 12 5dBm segments Moving bargraph showing signal changes over the last 32 readings 8 segment LED bar (green/yellow/red) power indication Backlit for first 10 seconds of display Truly unique tool for personal RF exposure detection and level measurement. Use it to check GSM, TDMA, CDMA, PCS, Wi-Fi plus AM/FM and TV signals and much more. Now check out the price!\nDigital Combination Meter. 1-Axis Electric and Magnetic Field measurements. The Digital Combination Meter boasts several distinct advantages for a meter in this price range: Wide frequency response: very flat (1 dB) from 16 Hz to 2000 Hz; useful from 5 Hz to 7000 Hz (3 dB) Tremendous Sensitivity and Range: Magnetic: 1-2000 nT (0.01-20.00 mG); Electric: 1-2000 V/m Accuracy: ±2% ±20 digits at 50/60 Hz Cool audio tone which resembles a Geiger counter Simple to operate, easy to read. Perfect for home, student, or researcher. Uses a standard 9V battery, included. Instructions in German and English.\nDigital Hotspotter Meter. The device does not detect Bluetooth, 802.11a or 802.11n. Some 802.11b and g networks are not detected by the device. Full-featured Wi-Fi detection and analysis device The Digital Hotspotter provides information on signal availability and strength as well as essential network information, including ID, security status and channel for most 802.11 b/g Wi-Fi networks. Use it to determine if you are exposed to Wi-Fi radiation, the strength and direction of the source(s), and the number of channels. Travelers, students and other roaming Wi-Fi users can use the Hotspotter to find available networks. Use the Hotspotter to determine where your home or office coverage extends, and where the optimal locations for use of the network are. Security The Hotspotter can be used to determine whether your home or office network is leaky. The device can detect whether your access point's signal extends beyond your walls, and whether it is secured. The Hotspotter can also help you detect rogue access points. The Hotspotter displays an image of one to four vertical bars, indicating the relative strength of the signals detected by the Hotspotter. By scanning repeatedly, you may be able to determine whether you are moving closer to or farther from a network access point by watching the increase or decrease in the relative signal strength. The Hotspotter scans 13 channels. While only 11 channels are used in the US, 13 channels are used for Wi-Fi in Europe. Channel information can be useful in detecting potential reasons for interference. Most access points are set to channel 1, 6 or 11 by default. If you see more than one network on the same channel, it is likely that you may experience problems with interference. In fact, Wi-Fi channels overlap on adjacent channels, and may cause interference on adjacent channels. You may wish to use the Hotspotter when configuring your home or office network to determine what channels are least likely to experience interference. LCD screen displays information about multiple networks: Network ID (SSID) Signal strength Encryption status (WEP and WPA) Provides Channel Information Signal Availability (802.11b and 802.11g networks)\nElectroSmog Detector. A new, inexpensive hand-held device available to the consumer which can detect the pulsing emissions from wireless communications technologies (mobile phones, masts, DECT digital cordless phones, w/LAN's, Wi-Fi, etc.) which are considered by scientists to be the cause of health effects among a significant minority of the population. Has a built-in speaker, 2.5 mm mono headset jack for private operation (headset not included) and 2 year warranty. Uses 9V battery (included). Patented. 2 yr mfr wty. Frequency Range: 50 MHz to 3000 MHz Sensitivity: 0.01 volts per meter (V/m) Output: Audio Loudspeaker, Audio jack socket Controls: On/Off Switch, Volume\nElectroSmog Meter. Digital RF Meter Breakthrough in low cost RF measurement. Covers 50 MHz to 3.5 GHz and great for digital or analog RF signals. Use in 3-axis (isotropic) measurement mode or check each of the X,Y Z axis! Includes audio alarm with adjustable threshold and 99 point memory function. Extremely sensitive: 38 mV/m to 11V/m (equivalent to 0.38 nanoWatt/cm² to 32 microWatt/cm²). 4-digit LCD display offers V/m, A/m, or W/m². Updates 2.5 times per second. Choose to display instantaneous value, maximum value, or average (average period adjustable from 4 second to 15 minute intervals). ±2.4dB accuracy or better. Uses 9V battery. 1 year warranty\nEMF Hunter. Versatile new meter for detecting cell phone radiation, power line EMF, as well as paranormal research. Combines AC magnetic field detection, microwave sensor, and temperature in a very compact design. Easy to read LED indication and dramatic sound. For cell phones, microwave ovens, and other high frequency appliances: 0.01 to 0.30 mW/cm² in 10 color-coded increments: - Green light (safe): Less than 0.02 mW/cm² -\nYellow light (caution): 0.02 to 0.1 mW/cm² - Red light (warning): higher than 0.1 mW/cm² For power lines, TVs, computers, AC alarm clocks, motors and other electric appliances: 1 to 10 mG in 10 color-coded increments: - Green light (safe): Less than 2.5 mG - Yellow light (caution): 2.5 to 8 mG - Red light (warning): higher than 8 mG Temperature: External temperature probe on 6 foot cable included. 32 - 102°F (0-40°C) in 5 increments. Audible warning at 99°F Power: 9V battery (not included) good for continuous use for more than 30 hours. One-year warranty. Very unique!.\nField Analyzer. High End Combination Meter This is a beautiful, all purpose, EMF meter. Measure single axis AC magnetic, AC Electric and RF with high sensitivity and high accuracy. Backlit LCD screen plus AC voltage output for analyzing frequency information. And look at this: in RF mode it shows the field strength as a function of time, and in AC magnetic mode waveform is included on the screen display! Built-in speaker can give an audible impression of the pulse modulation of RF radiation. Peak, Hold and Average readout. Professional quality, but easy enough for a non-technical user. Includes clearly written manual with exposure limit recommendations, rechargeable 9V battery and battery charger/AC power supply. RF Frequency Range: 300-3000 MHz\nGauss Master. This little meter measures the level of ELF magnetic field radiation from power lines, computers, kitchen appliances, and more! The easy to read scale, unique built-in audio signal and auto shut-off make it simple to use and a great way to find hidden sources of ELF frequency magnetic fields. Most experts agree that chronic exposure to more than 2.5 milli-Gauss is inadvisable. This meter will show you which areas are above or below 2.5 milli-Gauss in the 50 - 60 Hz frequency range. Hand-held, lightweight and durable, with two easy to read scales (0-1 mG, & 0-10 mG), and dramatic audio signal. Our favorite meter for demonstrating the presence of dangerous EMFs to others and paranormal work. Requires one 9V battery (not included). Calibrated at 50-60 Hz. Includes nice instructions on how to perform a proper survey of your home, office, or school yard.\nHigh-Frequency Meter. We like this calibrated wideband (800 MHz - 2.5 GHz) RF meter because it has a switch which allows a choice of peak or average indication mode. This permits accurate measurement of both digital and analog signals. Two ranges: 1 - 1999 µW/m² (same as 0.1 - 199.9 nW/cm²) and 0.1 - 199.9 µW/m² (same as 0.01 - 19.99 nW/cm²). In addition, you get a choice of audio tone - none, or intensity proportional to field strength, or proportional to frequency (for analyzing pulsed signals) - accuracy ±6 dB - true logarithmic - periodic antenna, 800 MHz - 2.5 GHz, single polarized, included - standard 9V battery included Easily detects cell phone towers, cordless phones even microwave oven leaks. Instructions in German and English. 2 year Warranty. Model HF35C\nPace Alert. PaceAlert is the first and only meter/alarm designed specifically with pacemaker safety in mind. Simply turn the unit on and it will warn with LED lights and audible alarm if it encounters EMF near the limits for proper and safe operation of implanted devices. PaceAlert monitors AC magnetic fields, AC electric fields, and radiofrequencies simultaneously. Common sources of strong fields include microwave ovens, power tools, hair dryers, vacuum cleaners, electric ranges and toaster ovens, electric circuit boxes, welding equipment, etc. Alarm thresholds: 4 kV/m for electric field at 50/60 Hz 1.5 Gauss magnetic field at 50/60 Hz 100 V/m RF from 500 kHz - 6 GHz\nThe information in this article was current at 06 Dec 2011", "label": "Yes"} {"text": "In the information loss problem in black hole evaporation, the investigation of the purification partner of a Hawking particle is crucial. It is a well-known fact that the 3+1 dimensional spherically symmetric gravitational collapse can be mimicked by 1+1 dimensional moving mirror models. Since a detected particle in field theory is defined by what a particle detector observes, the diversity of detector designs yields a variety of particles and their partners. We provide a formula of generalized partners of detected particles emitted out of mirrors in an arbitrary motion for any Gaussian state in a free massless scalar field theory. Using our formula, we directly demonstrate information storage about initial phase information in a pure state of a detected particle and its partner. The form of the partner drastically changes depending on the detailed designs of particle detectors for Hawking radiation. In the case of a detected particle and its partner sensitive to information about initial phase, spatial configurations of the partner has long tails in a stage where only zero-point fluctuation is emitted out of the mirror.", "label": "Yes"} {"text": "Designed to anticipate the growing needs for large power capacity in a small footprint, the 9395XC UPS delivers reliable, flexible power protection for everything from hyperscale and multitenant data centers to enterprise and light industrial applications. It features intelligent sensing capabilities and integrations that enable 24x7, real-time power infrastructure monitoring and management through Eaton’s data center infrastructure management (DCIM) solution and PredictPulse remote monitoring service, both integral parts of the Eaton Brightlayer Data Centers suite. Users who deploy the 9395XC UPS can future-proof their data center infrastructure with the ability to incorporate Eaton’s EnergyAware solution and battery services to help improve sustainability while offsetting overall energy consumption and costs.\nUPS — Eaton\nApril 28, 2022", "label": "Yes"} {"text": "The about well-known proper name in batteries, the Duracell Plus AAA are a quality choice. My tests showed decent overall capacity, although these batteries didn’t perform every bit well in my high-drain tests, then I recommend these more than for lighter utilise, such as remote controls. Nonetheless, the high price may put some off and there are meliorate value options.\n- Expert overall chapters\n- Widely available\n- Good range of pack sizes\n- Middling high-drain test results\nThese are alkaline (non-rechargeable) AAA batteries\nMovie a set of AAA batteries in your head, and the Duracell Plus AAA are probably the set that you’re thinking of. The default choice for anyone that wants long-lasting batteries, Duracell has built a good proper noun for itself.\nOverall tested capacity in my tests was proficient, although the batteries didn’t practise as well as some of its competitors in the initial high-drain test. There’s as well the high toll to consider, with these batteries costing a lot more than much of the competition. That’south a picayune disappointing considering how well the Duracell Plus AA batteries did in my tests.\n- High overall capacity\n- Other batteries perform better in the high drain test\nDuracell provides a detailed specification sheet for its AAA Plus batteries. As with all batteries, the full capacity of the batteries depends on temperature, load and the cut-off voltage (voltage drops as the batteries are tuckered). In short, batteries deliver more than ability under lighter loads; less nether loftier drain conditions. Duracell’s own specs demonstrate this.\nTo test, I use an Ansmann Energy XC3000. Its drainage test uses a loftier load of 600mA (+/-twenty%) with a cutting-off voltage of 0.94V. I started by measuring the initial voltage of the batteries, which I bought from Amazon, at ane.49V. That’s just backside the nominal 1.5V that you’d expect from alkali metal batteries; even so, equally voltage drops quite rapidly with alkaline batteries, this minor variation doesn’t thing.\nAfter the initial drain, I measured a capacity of 414mAh. That’south alright, but is a way behind the Amazon Basics Alkaline AAA batteries.\nI give batteries a few hours to cool downwards, and then re-run the same exam to measure whatsoever remainder capacity. I measured the Duracell Plus AAA at 146mAh, giving me a full capacity of 560mAh.\nThat’s a decent overall capacity and these batteries should do well in low-bleed applications, such as in remote controls\nAs with virtually alkaline batteries, Duracell says that these have a ten-year shelf life, so you tin buy in bulk and not worry about them discharging while non in utilize.\nDuracell Plus batteries are available in a wide range of unit sizes. For a prepare of 4, look to pay around 73p a battery. Bigger packs are generally ameliorate value (although not always), with prices per battery dropping to around 55p. I’ve listed the price for the pack of eight (effectually 68p per battery), as information technology’s a skillful compromise between pack size and cost.\nShould yous purchase it?\nIf you desire big-make batteries to go into low-drain devices such as remote controls, then these are a good pick.\nMy high-drain test shows that in that location are batteries that performed better here, plus you can buy much cheaper AAA batteries.\nDecent overall capacity shows that the Duracell Plus AAA could be a good choice for lower-drain use. If you demand higher-bleed batteries for more intensive use, my high-drain tests showed that these batteries were a way behind the Amazon Nuts Alkaline AAA batteries. These batteries are too expensive.\nHow we exam\nUnlike other sites, we test every alkaline battery we review thoroughly over an extended catamenia of time. Nosotros utilize standard tests to compare features properly. We’ll ever tell y’all what we find. We never, always, have money to review a product.\nFind out more than almost how we test in our ethics policy.\nWe utilize an Ansmann Energy XC 3000 to drain batteries, then that we can test capacity in mAh. After the first run, we permit the batteries to cool and and so retest to give us a second reading.\nWe measure the initial voltage of the batteries, checking that the starting voltage is at least 1.5V.\nYou might like…\nTrusted Reviews test information\nDuracell Plus AAA\nAmazon Basics Alkaline AAA\nFirst Reviewed Date\nBombardment engineering science\nDuracell Plus AAA\nDuracell Plus AAA\nPosted by: Sadiyev.com", "label": "Yes"} {"text": "received his PhD in Physics in 1990 from University of Stuttgart working at Max Planck Institute for Metal Physics on the field of nuclear methods (muon spin rotation) based investigation of magnetic ordering phenomena in antiferromagnetic materials. Subsequently he spent two years as postdoc at MPI working on nuclear methods in solid state physics at Paul Scherrer Institute (Switzerland) and Rutherford Appleton Labs (UK).\njoined Alcatel-SEL in 1992 where he worked for four years in the field of semiconductor component qualification and tests. From 1999 to 2005 he lead the microelectronic technology department of Alcatel Research Centre. After having worked in the optical networking department of Bell Labs Germany, mainly concentrating on identification, assessment and introduction of new device technologies for optical and wireless communication systems he is leading since Sept. 2013 the Bell Labs Wireless Transceiver Devices Group .\npresently holding more than 40 active patents worldwide.", "label": "Yes"} {"text": "Lattice, a provider of advanced information and communications technology solutions for customers worldwide, reports that it has acquired InnoVisit's video conferencing technology to strengthen Lattice's Integrated Corrections Operating Network (NASDAQ:ICON).\nThe newly purchased technology will be integrated with ICON, a strong technology platform that provides secure, cloud-based management of all customer, payment, and accounting data for correctional facilities. The transaction also provides Lattice with the opportunity to increase its revenue growth.\n\"We've had a great working relationship with InnoVisit for more than a year,\" Paul Burgess, CEO of Lattice stated in the press release. \"Our customers have been very pleased with InnoVisit's technology and its seamless integration into our ICON platform. We plan to take advantage of new cross-selling opportunities with current customers and previous installations, and this technology has strengthened our competitive position, which should lead to accelerated sales growth as we expand our marketing efforts.\"\nAs a leading provider of video conferencing technology to the corrections market, InnoVisit has deployed its video visitation technology in more than 90 facilities in 26 states and Canada.\nFor more information visit latticeinc.com\nQualityStocks provides investor relations services to publicly traded companies in exchange for compensation. This article may be part of our efforts to widen a client's exposure. To read our full disclaimer, visit http://disclaimer.qualitystocks.net", "label": "Yes"} {"text": "How much does cyber security earn? This article discusses the meaning of the topic. As a result, you can have more knowledge about this study.\nHow Much Does Cyber Security Earn?\nCyber security is a booming industry with a growth rate of 7% by 2024. Also, it is important to know that cyber security professionals are in high demand. This is because of the many threats that are posed to companies and individuals every day.\nWith the news of data breaches, phishing scams, and ransomware attacks, people are worried about their online security. As a result, the demand for cyber security experts has increased.\nIf you are looking for a new career or simply want to change your current one, you may want to consider becoming a cyber security expert.\nCyber security earns around $125,000 annually. However, the amount of money is not the only thing that you must consider.\nYou must also take into account that they work in a risky environment. They possess knowledge that you do not have and they are always on the lookout for cyber threats. Thus, they must be ready to face these threats at all times.\nDuties And Responsibilities\nCyber security experts are responsible for finding and eliminating all possible threats to a computer system. They do this by using their deep knowledge of how a computer works and how it interacts with other systems.\nA cyber security expert is also responsible for protecting their client’s data from any kind of cyber threat. Also, they may use firewalls, anti-virus software, or any other means to protect the data from attacks on the computer system.\nOther than that, they may work to improve the security of a computer system. This is by changing the software program of the system and making it secure.\nFinally, cyber security experts are responsible for making sure that their clients’ systems are always updated. This is for them to be prepared for any new kind of cyber threat.\nA Day in the Life of a Cyber Security Expert\nCyber security experts can work in many different environments. They can work for private companies or even the government.\nHowever, they will be to do the same job no matter where they are working. Also, they will be responsible for monitoring their clients’ systems and looking for possible cyber threats.\nThey may also need to detect and eliminate a possible cyberattack on a client’s computer system. It is a fast-paced job and it is difficult to predict when a cyber threat will arrive. Thus, cyber security experts must always be ready for an attack.\nHow to Become a Cyber Security Expert\nAs mentioned before, you must gain experience in the field before you can become a cyber security expert. However, you must also have the proper educational background. Here is what you need to know to start this career.\nYou need to know both hardware and software programming languages. It is also important that you know how a computer works and how it interacts with other devices.\nIt would also be best if you have some experience working as a computer programmer or any other cybersecurity-related job. Also, this will give you an edge over other applicants as it shows that you have the necessary background for the job.\nIt is not enough to just know different computer languages or how a computer system works.\nYou must also have the proper certification to prove that you are competent for the job. To do this, you may need to enroll in a cyber security degree program at an accredited college or university.\nCyber security is a very important field. This is because of the many cyber threats that are to businesses, companies, and individuals.\nCyber security experts are responsible for finding and eliminating these threats. Thus, there are many different kinds of cyber security experts.", "label": "Yes"} {"text": "Nissan develops new driver assistance\nThe car company brings froward a new era of crash avoidance\nNissan is developing a new level of collision avoidance technology that’s expected to be available on all its cars by the end of the decade.\nThe system uses information from high-performance LIDAR, radar and cameras. Called “ground truth perception” technology, it can instantly analyse real time and developing situations. Using it judgement, it automatically performs the required collision-avoidance operations.\nThis technology can also detect slowed traffic and road obstacles in the distance and execute lane changes accordingly.\nA new era\nNissan say the system provides increased support to drivers. This will be particularly useful in areas where detailed map information is not available.\n“Nissan has been the first to market a number of advanced driver assistance technologies,” says Takao Asami, senior vice president, leading global research and development at Nissan.\nLooking to the the future, Nissan believes its essential the public has full confidence in such technology. Asami believes this new technology “will make a significant contribution to owner confidence”, as well as “reduced traffic accidents”.\nUnder its long-term vision, Nissan Ambition 2030, Nissan is is developing various levels of autonomous vehicle tech. They believe it will significantly reduce accidents by utilizing next-generation LIDAR technology.\nThis should mean that the upcoming era of driver-assistance technology will be capable of avoiding highly complex accidents. Indeed, it sees this as “essential”.\nNissan aims to complete the development of its ‘ground truth perception’ technology by the mid-2020s. It will first be available on select new models, and on virtually every new model by fiscal year 2030.", "label": "Yes"} {"text": "Major Air to Ground Auction Winner Is Cellular Friendly\nJun 2, 2006, 2:32 PM by (staff)\nThe FCC's auction for two air-to-ground licenses in the 800 MHz spectrum has finally closed. AirCell, which won the larger 3 MHz lot, currently provides voice and data services, including cell phone use, to private planes and other small craft. They hold a number of patents on making cell phone calls from planes. It is possible that they will use this new spectrum to provide cellular service on commercial planes, however they are not allowed to comment on how the spectrum will be used, and the FAA still has not cleared cellular phone use on aircraft. The smaller one MHz block was won by JetBlue's LiveTV.\nT-Mobile Says It Will Start Using 600 MHz Spectrum This Year\n\"T-Mobile now has the largest swath of unused low-band spectrum in the country,\" said T-Mobile CEO John Legere about the company's 600 MHz auction winnings. The company successfully won an average of 31 MHz (ranging between 20 MHz and 50 MHz) of the 70 MHz low-band spectrum auctioned off by TV stations and the FCC.\nT-Mobile, US Cellular Named FCC Incentive Auction Winners\nThe FCC today marked the official end of the incentive auction for 600 MHz airwaves. The agency said 50 wireless companies bid a cumulative $19.8 billion on some 70 MHz of spectrum that was put on offer by 175 television stations.\nC Spire Looking to Nab 700MHz Spectrum\nC Spire Wireless is hoping to buy some Lower 700 MHz C Block spectrum from Waller Wireless. The companies recently filed the request with the FCC.\nAT&T Seeking 700MHz Spectrum from Peoples Wireless\nAT&T has asked the FCC for permission to purchase two Lower 700 MHz C Block licenses from Peoples Wireless in Texas. If granted, AT&T would hold 24 MHz of contiguous, paired Lower 700 MHz spectrum in the two cellular market areas in question.\nFCC Relaxes Rules Governing 800 MHz Spectrum\nThe FCC this week made it easier for carriers to add LTE to their 800 MHz spectrum holdings. Rules concerning the 800 MHz band (CDMA Band Class 0, LTE Band 5) have been in place since 1981 and limit how much power carriers can use to transmit wireless signals across those airwaves.", "label": "Yes"} {"text": "Multi-slice Computed Tomography (MSCT) is an important medical imaging tool that provides dynamic three-dimensional (3D) volume data of the heart for diagnosis of various cardiac diseases. Due to the huge amount of data in MSCT, manual identification, segmentation and tracking of various parts of the heart are very labor intensive and inefficient. In this paper, we introduce a semi-automatic method for robustly segmenting the endocardium surface from cardiac MSCT images. A level set approach is adopted to define a flexible and powerful interface for capturing the complex anatomical structure of the heart. A novel speed function based on clustering the image intensities of the region of interest and the background is proposed for use with the level set method. The method introduced in this paper has the advantages of simple initialization and being capable of segmenting the blood pool with non-homogeneous intensities. Experiments on real data using the proposed speed function have been carried out with 2D, 3D and 4D implementations of the level sets respectively, and comparisons in terms of computational speed and segmentation results are presented.", "label": "Yes"} {"text": "E-Ink display module, 1.54inch, 200×200 resolution, with embedded controller, communicating via SPI interface, supports red, black, and white three-color display.\nNo backlight, keeps displaying last content for a long time even when power down\nUltra low power consumption, basically power is only required for refreshing\nSPI interface, for connecting with controller boards like Raspberry Pi/Nucleo, etc.\nComes with development resources and manual (examples for Raspberry Pi/STM32)", "label": "Yes"} {"text": "– Innovative solution developed as part of the LASERPORE research project in collaboration with Ernst Abbe University, Leipzig University and ITG Wismar\n– Funding by the German Federal Ministry for Economic Affairs and Energy (BMWi)\n– Integrated high-temperature oven shortens laser processing to just a few minutes\nHerzogenrath, 8 March 2022: Pulsar Photonics, an innovative high-tech company in the field of laser technology, is developing a machine- and software-based solution based on the RDX1000 laser machine for the production of porous glass moulds for applications as filter element. The machine solution was developed as part of the LASERPORE research project in close cooperation with the Ernst Abbe University of Applied Sciences (EAH) in Jena, the University of Leipzig and ITG Wismar and was funded by the German Federal Ministry for Economic Affairs and Energy (BMWi). This innovation makes it possible to produce sample components as well as in component series and to shorten the laser processing to a few minutes.\n– Maximum component volume: D 50mm x H 150mm\n– Minimum layer thickness: ≤ 50µm\n– Build-up rates per layer: 10mm³/min to >100mm³/min\nPulsar Photonics develops the Photonics Elementes (PE) machine software for laser micromachining applications. PE has specialised software functions for layer-by-layer process control with scanner and axis systems and uses a library of integrated laser beam sources. Laser jobs can be easily parameterised using a solid model or 2D geometry. The sequence and state control of the process is stored in a software recipe and can thus further reduce the complexity depending on the user level.\nThe further development of the process chamber enables additive manufacturing under defined environmental conditions. A high-temperature furnace was developed for this purpose, which prevents premature segregation and thermally induced stresses in the glass mould. Slow cooling, which is achieved by preheating, allows the components to be released from the building platform without causing damage.\nAt the push of a button, glass moulds can be produced with appropriately defined process parameters. These can be produced with different densities and cavities in the millimetre to micrometre range, depending on the material used, the process conditions and the setting parameters. A downstream VYCOR® process enables further processing of the components, which was further developed by the University of Leipzig especially for the SLS process. The porous glass components generated can be used, for example, in the filter systems of ITG Wismar.\nDr. Joachim Ryll, Founder and Managing Director at Pulsar Photonics GmbH: “The entire manufacturing process is based on a layer-by-layer construction of the glass moulds and works similarly to 3D printing of metal components. This allows several components to be built up simultaneously in one batch and complex internal structures and surfaces to be created. What makes our solution unique is a high-temperature oven integrated into the laser machine, which enables stress-free 3D printing of porous glass moulds.”\nPulsar Photonics GmbH is an innovative high-tech company in the field of laser technology. Its range of services includes the development, production and distribution of laser machines for material processing with short and ultra-short pulse lasers. A second core competence of the company is the integration of tooling and measuring systems for material processing, adapted to the specific requirements of the application. Besides its expertise in system development, Pulsar Photonics is also a competent partner for single-part and series production with (ultra-)short pulse lasers. Its core processes focus on structuring, drilling and precision cutting. Founded in 2013, Pulsar Photonics GmbH is one of the fastest growing companies in Europe, according to the Financial Times and Statista. Pulsar Photonics has been part of the Schunk Group since 2021.\nPulsar Photonics GmbH\nDr. Stephan Eifel", "label": "Yes"} {"text": "[time-nuts] 10MHz Rubidium reference source for frequency counter\nra3apw at mail.ru\nMon Nov 3 08:48:01 EST 2014\nyes, it is my fault - my set up (connections) for TI mode was not correct.\nAccording your advices I went back to the frequency mode and set gate / sample time to 1 second for CNT-91 and TimeLab.\nThen I switched on \"Smart Frequency\" and \"Interpolator Calibration\" option on CNT-91\n1. Setting -> Misc -> Smart Meas -> Smart Frequency -> ON\nSmart Frequency (valid only if the selected measurement function is Frequency or Period Average).\nBy means of continuous timestamping and regression analysis, the resolution is increased for measuring times between 0.2 s and 100 s.\n2. Setting -> Misc -> Smart Meas -> Interp Calib ON\nInterpolatator Calibration - By switching off the interpolator calibration, you can increase the measurement speed at the expense of accuracy.\nPlease see the result with and without these CNT-91's options (Smart Frequency and Interpolator Calibration)\nThis result is for the internal CNT-91 reference source. I will check with external reference second Morion OCXO shortly.\nMore information about the time-nuts", "label": "Yes"} {"text": "will have at least enough storage allocated to handle the\ndata being written or read at the port.\nA port name can be used instead of an address to\nrefer to a port. A name is normally easier to remember\nthan an address. Operating systems sometimes have\npredefine names associated with certain ports. For\nexample, DOS reserves COM1 and LPT1 to refer to the\nfirst serial and parallel ports, respectively.\nAnalyzing the configuration of the network can be\naccomplished in two different ways. The first and\nsimplest way happens when the computer is turned on;\nthe operating system goes out and checks the\nconfiguration. The second way is accomplished by\nusing an application to test whether a remote device is\nproperly connected to the system. The use of an\napplication is the best way to analyze the configuration.\nThe application tests the remote device by sending\nout a signal to each device and waiting for the signal to\nreturn. This process is called pinging. The ping sent\nout is called an echo message, and the reply is called an\necho reply message. The application sends out the echo\nmessage and, if the device is properly connected, it\nsends back an echo reply message. The receipt of this\necho reply indicates that there is a viable connection.\nSome version of application software reports on how\nlong it took to receive the echo reply and any lost\nreplies. These reports provide information about the\ntraffic and noise levels on the network.\nSYSTEM RESOURCE LIMITS\nThe advantage of a network is it allows several\npeople to share resources, both hardware and software.\nHardware resources refer to printers, disk drives, CD-\nrom drives, scanners, and modems. Software resources\ninclude operating system, drivers, applications (word\nprocessing, database, etc.), management software, and\ndata files. To avoid problems, such as slow response\ntime and unavailability of resources, you must know the\nlimits of the system resources.\nThe limitation involved with hardware is going to\nbe waiting. A particular piece of peripheral equipment\ncan be accessed by one user at a time. Only one job can\nbe printed at a time, and only one user can be using a\nsingle modem at a time. This small inconvenience of\naccess outweighs the cost of several different pieces of\nthe same type (i.e., several printers or modems).\nNo matter which software package, whether\napplication, mail, or operating system, there is a limited\nnumber of users that can use the software at one time. It\nis far cheaper to buy one multi-user package that allows\nfor 25 users than to purchase 25 individual copies. But,\nit might run just a bit slower than an individual copy.\nNetworks require the interaction of software and\nhardware. The system software to operate and control\nthe network must be specifically designed for network\noperation. The application software/programs to solve\nuser problems must also be specially designed to run on\na network. Between the system software and the\napplication software/programs, two pieces of software\nare needed. One is the telecommunications access\nsoftware. It provides application programs access to\nthe network so they can send and receive data. The\nother is the teleprocessing monitor, which is the\ninterface between the telecommunications access\nsoftware and the application programs. It handles the\ndetails of integrating these two. To install the system\nsoftware, as with any software, follow the installation\ninstructions supplied with the software.\nIt takes special system software to handle the\nunique and dynamic workloads of a network. This\nspecial software is called network system software.\nThe network system software is sometimes referred to\nas the network operating system (NOS). It is different\nfrom the type of system software you normally use on\nyour stand-alone PC. Network system software must be\nable to handle multiple users, multiple peripherals,\nnetwork security, and be able to share information and\napplication software, just to name a few differences.\nNormally, network system software runs on the network\nserver. It includes such things as the networks\noperating system software, communications software,\nand all the programs needed to manage the sharing of\ninformation and resources on the network. Without it,\nthere would be no way to coordinate and manage the\nmany components of a network into a functioning\nNetwork system software provides multitasking\ncapabilities. If the network is to serve multiple users at\nthe same time, then the server must be able to perform\ntasks so fast they appear to be processed", "label": "Yes"} {"text": "Have you been itching to know what's under the Kin's skin? The helpful demolition experts at iFixit and Chipworks lay it all for you in a step-by-step disassembly of Microsoft's just-introduced, youth-oriented smartphones.\nMicrosoft's design is a bit bulkier than high-end smartphones like the iPhone and Motorola Droid. It's 0.77 inches thick compared to 0.48 inches for iPhone and a bit thicker for Droid.\nPart of the thickness is due to the fact that the Kin models are slider phones, with two halves sliding apart to show a simple full QWERTY keyboard. The teardown revelas Microsoft uses two springs to keep the halves fully open or fully closed. (Close-up photos from Chipworks are online at iFixit)\nThe heart of the phone is the first-generation mobile chip from Nvidia, the Tegra APX2600. Tegra is the chip vendor's mobile silicon platform, based on an ARM core, with a companion GeForce graphics core and other components. It's been designed for good quality multi-media applications, and Microsoft already uses it in its line of Zune music players.\nLater this year, the first smartphones, many of them apparently Android-based, with Nvidia's next generation CPU, the Tegra 2, will become available. The company is also targeting tablets and netbook-style devices. More details can be found at Nvidia's Website.\nThe onboard camera, a Sony IMX046 with an impressive 8 megapixels, only takes up 0.3 cubic inches. Sony fabricates it with a 90 nanometer CMOS process. Chipworks notes it's one of the first phones to feature 720p High Definition video.\nNetworking connectivity is provided by a Qualcomm QSC6085 CDMA processor and, for Wi-Fi and Bluetooth (and FM radio) a Texas Instruments WL1271A chip. The touchscreen controller is from Synaptics: its Clearpad technology in a device marked T1021A.\nStorage is via the Samsung moviNAND KLM8G4DEDD package, based on an advanced 30-nanometer architecture, with up to 8GB of capacity.\n* Avago has two chips inside the Kin Two: an ACFM-7103 CS/Cellular/S-GPS Qunitplexer and an ACPM-7353 dual-band power amplifier.\n* The camera is the Sony IMX046. The IMX046 is fabricated using a 90nm CMOS process. The camera's resolution is 8.11 effective megapixels (8 active megapixels), 1.4 μm sized pixel, 1/3.2\" optical format. Samsung was the first to use this camera in the M8800.\n* Taking a cue from the iPhone and Zune HD, the Kin Two has an accelerometer. It's an STMicro 331DL 3 Axis nano MEMS (microelectromechanical systems) device.", "label": "Yes"} {"text": "“The OpenSensor Cloud Platform and the WunderBar enable you to easily develop applications for the physical world. Sense your environment, imagine new products and build incredible smart apps (relayr.io).” By utilizing an array of sensors from Relayr’s WunderBar and Octoblu’s IoT platform, it was easy to create a simple baby monitor that texts you updates about your baby. This simple project was created entirely with Octoblu and a few WunderBar sensors. Octoblu makes it so you can read data from the sensors and decide what you want to do with it from there. Maybe you want to create a flow that tweets the temperature of your living room or one that turns on a siren when your child trips an IR beam on the way to your pool. When you use Relay’s WunderBar with Octoblu, the possibilities are endless.\nFor step by step instructions on how to create your own, visit this link: http://www.hackster.io/octoblu/octoblu-wunderbar-baby-monitor-that-texts-you-updates", "label": "Yes"} {"text": "Dr. Bing Brunton, assistant professor of biology at the University of Washington (UW) and Dr. Raj Rao, Director of the Center for Sensorimotor Neural Engineering and professor in the UW Computer Science & Engineering department, have received a grant from the National Science Foundation (NSF) to study how the brain functions without being given structured tasks or direction. Their study is aimed at understanding neural processing outside of traditionally structured and controlled experiments in a laboratory setting.\nIn Brunton’s and Rao’s study, subjects receive no explicit instructions, but instead, simply behave as they wish in their hospital-room, including eating, sleeping and conversing with family. By observing non-structured behavior, the study aims to build a better understanding of the brain in action, in a real-world scenario. Learn more about this grant and study on the NSF website.", "label": "Yes"} {"text": "Graphene-semiconductor technology integrates the remarkable properties of graphene with semiconductor functionality. This hybrid offers groundbreaking applications in electronics and optoelectronics.\nGraphene, a single layer of carbon atoms arranged in a hexagonal lattice, possesses extraordinary electrical conductivity and mechanical strength, making it a promising material for advancing semiconductor devices. Its compatibility with existing semiconductor processes allows for innovative adaptations in computer chips, sensors, and energy-efficient systems.\nThe development of graphene semiconductors paves the way for ultrafast and flexible electronics, potentially revolutionizing the tech industry. Companies and researchers are focusing on overcoming challenges such as band-gap tuning and large-scale production to fully harness graphene’s potential. The integration of graphene into semiconductor devices is a compelling area of research that could lead to significantly enhanced performance and new functionalities in electronic components.\nWhat Is Graphene Semiconductor?\nImagine a material so strong yet incredibly thin and light. That material is graphene, and it’s changing technology, especially in semiconductors. Graphene semiconductors could power the future of electronics, with remarkable properties that outshine traditional materials. Let’s explore this groundbreaking material and uncover what makes it so special.\nDefinition Of Graphene Semiconductor\nA graphene semiconductor involves graphene in electronic components. Graphene is a single layer of carbon atoms, both flexible and strong. The way these atoms link up makes graphene perfect for controlling electricity in semiconductors.\nProperties Of Graphene\nGraphene is not just unusual but a real game-changer. Below are some of its key properties:\n- Electrical Conductivity: Electrons move super fast in graphene, making it very conductive.\n- Heat Conductivity: It also manages heat very well, which keeps devices from overheating.\n- Strength: Graphene is tougher than diamonds and steel.\n- Flexibility: Despite its strength, graphene can bend and stretch.\n- Transparency: It is nearly invisible because it is so thin, ideal for screens.\n- Lightness: Almost weightless, graphene adds no extra weight to devices.\nThese properties make graphene semiconductors superior to traditional silicon ones. Whether it’s speed or efficiency, graphene is set to revolutionize our electronic world!\nApplications Of Graphene Semiconductor\nGraphene semiconductors are exciting for tech lovers. These materials pave the way for breathtaking applications. From faster electronics to better energy solutions, graphene is a game-changer. Let’s dive into its real-world uses.\nGraphene semiconductors take electronics to new heights. They make gadgets work swiftly. Phones and computers use them to run cooler and process data fast. With graphene, devices get thinner yet more robust.\n- Speedy CPUs: Run multiple apps without lag.\n- Flexible Displays: Bendable screens that don’t break.\n- High-Speed Internet: Data moves like lightning with graphene.\nThe energy sector gains massively from graphene semiconductors. They make batteries that charge in minutes. These batteries last longer and power up everything from phones to electric cars.\n|Charge quickly, less heat, more power.\n|Drive further, recharge faster.\n|Store solar and wind energy efficiently.\nGraphene semiconductors shine in sensor technology. They detect the tiniest changes in the environment. This ability is vital for medicine, security, and environmental monitoring.\n- Precision Medicine: Monitors health in real-time.\n- Security Systems: Senses dangers unseen by the eye.\n- Environmental Monitoring: Tracks air and water quality closely.\nChallenges And Future Prospects\nUnveiling the next chapter in tech evolution, Graphene Semiconductors surge onto the scene. As a marvel of modern science, Graphene offers unprecedented electrical, thermal, and mechanical properties. But to harness its full potential, the industry confronts key challenges while eyeing tantalizing future prospects.\nScaling up production of graphene remains a formidable barrier. Labs can produce high-quality material. Yet, this proves difficult on an industrial scale. The quest for cost-effective, high-volume manufacturing is on. Experts aim for consistent quality across large batches. Meeting industrial demands is crucial for adoption across industries.\nIntegration with Existing Technology\nIntegration With Existing Technology\nThe integration of graphene semiconductors with existing technologies poses a challenge. The tech world boasts a complex landscape of silicon-based chips. Meshing graphene into this landscape calls for cutting-edge approaches. Collaboration between scientists and engineers is paramount. They seek ways to fuse graphene with current systems, ensuring efficiency and compatibility.\nExploration of New Applications\nExploration Of New Applications\nGraphene’s versatility ignites visions of new applications. The material promises to revolutionize various sectors: from electronics to energy storage. Researchers and innovators toil to uncover fresh uses. They test the boundaries of graphene’s capabilities. In doing so, they set the stage for groundbreaking advancements that could reshape our world.\nFrequently Asked Questions For Graphene Semiconductor\nWhat Is Graphene Semiconductor Technology?\nGraphene semiconductor technology leverages graphene’s exceptional electrical properties. It aims to surpass silicon chips in speed and efficiency, offering vast potential for electronics innovation.\nHow Does Graphene Outperform Silicon?\nGraphene features remarkable electrical conductivity and electron mobility. It outperforms silicon by enabling faster data processing and lower power consumption while also being thinner and more flexible.\nWhat Are Applications Of Graphene Semiconductors?\nGraphene semiconductors have diverse applications including advanced computing, flexible electronics, high-frequency radio communication, and energy-efficient sensors, enabling cutting-edge technological advancements.\nAre Graphene Semiconductors Commercially Available?\nGraphene semiconductors are not yet widely available commercially. They are currently under intense research and development for future market introduction.\nAs the frontier of technology expands, graphene semiconductors are poised to revolutionize electronics. Their exceptional properties promise faster, more efficient devices. Embracing this innovation could lead us into a new era of scientific advancement and industry transformation. Stay tuned to witness graphene’s full potential unfold.", "label": "Yes"} {"text": "I’m using a shell script to control a Belkin Wemo (WiFi) Switch. Everything is working fine by using a shellswitch as a device in pimatic. But sometimes the switch is loosing the wifi connection and the getstatecommand of the shellswitch can’t be executed without an error.\n2017-02-09 08:52:09error [pimatic-shell-execute,ShellSwitch]: Error getting attribute value WEMO_Switch.state: undefined\nIs there a possiblity to handle the error within the shell script? Perhaps by an exit state? Right now I’m just using the output of the script.\necho $(/home/pi/Scripte/WEMO.sh 192.168.xxx.xxx GETSTATE)", "label": "Yes"} {"text": "Analogue Systems RS-100S LPF Mk3\nBrak w magazynie\nThis low pass filter is a very good -24dB/octave Moog filter, based on the classic Moog cascade with selected, low-noise transistors\nPołączenie z serwerem jest szyfrowane z użyciem klucza SSL\nSZYBKA DOSTAWA KURIEREM LUB PACZKOMATEM\ndarmowa dostawa do polski od 500 PLN\nBeing the successor of the RS-100, the new \"S\" version features several improvements regarding stability, tracking, distortion behavoiur and also the frequency range.\n24dB/oct low pass filter based on the design by Moog. Two signal inputs, resonance, manually and voltage controlled cutoff frewquency. Frequency range 10Hz to 35kHz with CVs applied.\nThe transistors used in the filter cascade are low-noise, have been selected ans in addition matched in pairs what improves frequenc response over the whole frequency range.\nA better stability guarantees after one minute heating time that the flter can be used as a clean and well tracking sine wave oscillator.\nUsage with Eurorack:\n/>Analogue Systems' modules are designed solely for use in cases and cabinets made by Analogue Systems. Through the use of adaptors or adaptor cables, however, it is possible to connect them to Eurorack cases.\nShould you chose to use an Analogue Systems module in an Eurorack case, please note that the warranties are thus void and the use occurs at your own risk! If the module is plugged in incorrectly and therefore damaged the customer has to bear any costs for repair and shipping!\nBecause of the different position of the mounting holes there will be a gap of 0.5HP (= 2.5 mm) when mounting an Analogue Systems module next to a Eurorack module. Take this into consideration when planning your system. Gaps can be covered with 1.5HP wide blank panels by Doepfer.\nTwo audio inputs with level controls. One audio output.\nTwo cutoff CV inputs: one with fixed 1V/octave, the other is variable\n3U module in Analogue Systems form factor, 12HP wide, 64mm deep\n30mA power consumption\nWeight 0.163 kg", "label": "Yes"} {"text": "EEG and brain machine interface allows amputees to move a prosthetic hand, a new study reports.\nResearchers report they have successfully replicated a previous brain-to-brain communication experiment.\nResearchers demonstrate the viability of direct brain-to-brain communication in humans located over 5000 miles apart.\nResearchers have discovered a fundamental constraint in the brain which could explain why some skills are easier to learn than others.\nPeople recognize and remember music better if they have performed it in the past rather than only heard it, new research claims.\nResearchers develop a new blueprint for touch-sensitive prosthetic limbs. The findings could someday convey real-time sensory information for amputees.\nNeurofeedback which enhances the signal-to-noise ratio of brain activity, could have positive implication for rehabilitation following brain injury.\nResearchers develop a flexible carbon-nanotube 'harpoon' to study individual brain neurons. The 'brain harpoon' harnesses the electromechanical properties of carbon nanotubes to capture the electrical signals generated by single neurons.\nResearchers show that when humans use brain-computer interface technology, the brain behaves much like it does when completing simple motor skills such as waving a hand. This technology could help improve the daily lives of those who are paralyzed or lost specific abilities due to neurodegenerative diseases.\nA new study has uncovered the neurological basis of speech motor control, the complex coordinated activity of tiny brain regions that controls our lips, jaw, tongue and larynx as we speak.\nResearchers have given rats the ability to \"touch\" infrared light by fitting them with an infrared detector wired to microscopic electrodes implanted in the part of the mammalian brain that processes tactile information. The study demonstrated that a novel sensory input could be processed by a cortical region specialized in another sense without \"hijacking\" the function of this brain area.\nResearchers describe how an electrode array sitting on top of the brain enabled a 30-year-old paralyzed man to control the movement of a character on a computer screen in three dimensions with just his thoughts. It also enabled him to move a robot arm to touch a friend’s hand for the first time in the seven years.", "label": "Yes"} {"text": "View Product Index Manufacturers\nView All Manufacturers\nKeysight (Agilent) 6050A Electronic Load Mainframe\nFree UK Mainland Delivery (Sales)\nManuals and accessories supplied\nComprehensive Warranty on ALL Products\nUK Certified Quality Assurance\nKeysight (Agilent) 6050A Electronic Load Mainframe Description:\nThe new HP 6050A 1800 Watt Electronic Load Mainframe, the HP60502A 300 Watt Module and the HP60501A 150 Watt Module are designed for test, evaluation, and burn-in of DC power supplies, batteries, and power components. They are suitable for applications in areas such as R+D, production test, and field repair.\nThe Electronic Load Family offers advantages in performance, quality, reliability, and price/performance. The HP 6050A Mainframes built-in HP-IB interface simplifies system integration and allows control and readback of each modules functions using a single HP-IB address. The load modules are user installable for easy initial installation, reconfiguration, or service. The mainframe has six slots. The HP 60502A and HP 60501A occupy one slot each.\nThe features and instruction set of the HP 60502A and HP 60501A Load Modules are compatible with the HP 6060A Single Input Load. For example, test programs developed for an HP 6060A 300 Watt Single Electronic Load or an HP 60502A 300 Watt Module Load are interchangeable. Programming meets all currently defined HP-SL standards and therefore assures programming compatibility with future products.\nThe HP 6050A 1800 Watt Load Mainframe is suitable for bench use too. The front panel keypad allows easy, repeatable, and reliable front panel control of the load when it is used manually. Front panel settings are remembered after AC power is removed. The front panel LCD meters indicate voltage, current, and power readings of the selected channel.\nWe offer the refurbished used Keysight (Agilent) 6050A Electronic Load Mainframe for sale and rental.\nThe Keysight 6050A is fully tested and refurbished in our in-house ISO9001 calibration laboratory. We supply manuals, accessories, full warranty and a free-of-charge Certificate of Conformity. We can also provide the Keysight 6050A with a fresh calibration for a small additional charge.\nIf you have under-utilised test equipment talk to us about trading-in or part-exchanging it towards the Keysight 6050A or other refurbished test equipment.", "label": "Yes"} {"text": "An article blog entry done by Loïc *WydD* Petit on Medium.com shows his scientific experiment and methodology used while conducting input latency (lag) testing on on certain controllers and common arcade fight sticks. He conducted this experiment after researching other noted test and came to the realization that the control method for capturing the experiments might be tainted by unknown variables in the capturing setup. Mr. Petit referenced some of the previously used methods in performing these information captures, most notably by TeyahDL and Noodalls. Which he aimed to improve by making a simple setup free form many unknown variables.\nMr Petit continues by stating how input polling works with his example showing USB communication. This is both educational and illustrates how his simple hardware setup will be used in conducting this test. For the hardware setup he is using an Arduino and USB Shield host, though Mr. Petit does go into a simpler solution to buy if you want to replicate the results. He then notes the software that he formed to run this experiment.\nMr. Petit then goes on to break down all the controllers he tested, showing the deviation in which the controller is likely to miss an input frame. The results for each controller is posted as well as analysis on the break down of each controller used and it’s results.\nHopefully this test can spur more research and development on this topic as well as on the making of sound measuring tools to then be able to grade all input devices.\nMr. Loïc Petit has a PhD in Computer Science\nLinks to original article: https://medium.com/@WydD/controller-input-lag-how-to-measure-it-1ebfd2c9d60\nNotables referenced in his article:", "label": "Yes"} {"text": "Digital Audio connector (4-1 pin SPDIF_OUT)\nThis connector is for the S/PDIF audio module to allow digital sound output. Connect\none end of the S/PDIF audio cable to this connector and the other end to the S/PDIF\nP8H6110L/P6-P8H61E/DT_MB Digital audio connector\nThe S/PDIF out module is purchased separately.\nUSB connectors (10-1 pin USB78, USB910, USB1112)\nThese connectors are for USB 2.0 ports. Connect the USB module cable to any of\nthese connectors, then install the module to a slot opening at the back of the system\nchassis. These USB connectors comply with USB 2.0 specification that supports up to\n480Mbps connection speed.\nNever connect a 1394 cable to the USB connectors. Doing so will damage the\nThe USB 2.0 module is purchased separately.\nChapter 3: Motherboard info", "label": "Yes"} {"text": "Here is another robot that helps you move around without breaking a sweat. The Rodem robot is an electric wheelchair of sorts. It lets you move from a bed or sofa to anywhere in your home. Its seat protrudes backward and diagonally downward. The height of the seat is adjustable.\nThe robot can separately control its wheels, so it can turn on the spot. It can be controlled from a smartphone. Rodem moves at speeds up to 3.7mph.", "label": "Yes"} {"text": "ABOUT OUR COMPANY\nOverwatch Imaging designs and manufactures imaging systems with custom onboard AI software for both piloted and unmanned aircraft. The real-time automatic detection and reporting capabilities in our systems make them perfect for large-scale, time-critical civil and special missions. By helping organizations of all kinds move to autonomous aerial detection, we help them improve efficiencies, reduce costs and enhance safety.\nThe company was founded in 2016 by UAS and airborne imaging experts and is based in Hood River, Oregon, a well-known hub of airborne imaging and unmanned systems technology.\nLearn more about our Leadership team.\nWant to work on our team? See our Careers page.", "label": "Yes"} {"text": "Alarm Type: Vehicle Backup Cameras\nBrand Name: Autoleader\nColor Name: black\nWireless 7″ LCD Monitor 18LED IR Rearview Reversing Backup Camera Night Version Kit\n7″ LCD Monitor:\nAspectratio: 7″ / 16:9\nPower: 12V DC\nVideo: 2 way video input\nResolution: 800(H) x RGB x 480(W)\n-7\" LED Backlight Color TFT LCD monitor.\n-Can easily adjust the camera installation angle in multi-level.\n-Headrest style installation, support screen rotation, easy to mount & easy to use.\n-When no video signal input, black screen will display.\n-Comes with an IR remote controller.\n-When parking, image can be changed V2 from V1.\n-The monitor will start up automatically, and synchronously display the video from rearview camera when you're backing your car. And close after backing.\n-Available for VCD/DVD/Camera\n18 LED light\nNight version: YES\nResolution: 420 TV line\nView angle: 120°\nImage Device: 1/3 for sony CCD\nS/N Radio: better than 48db\nWhite Balance: >0.45\nBacklight Compensation: Auto\nLED Switch: Auto\nWireless 2.4GHz transmitter & receiver set\nPower: DC 12V\nConnects to rear-view camera and front video screen\n1 x 7\" Monitor\n1 x Car Rear View Camera\n1 x Holder\n1 x Frame\n1 x Video & Power Cable\n1 x Remote Controller\n1 x 2.4G Transmitter\n1 x 2.4G Receiver\nItem Type: Tire Repair ToolsItem Weight: 0.196kgBrand Name: CimivaMaterial Type: Plastic and ironSpecial Features: Car Panel Removal Tool set 100% brand new and high quality 1 set car panel removal...\nItem Type: Sponges, Cloths & BrushesItem Height: 12.5cmMaterial Type: plasticItem Weight: 750gItem Length: 30cmBrand Name: PREUPItem Width: 26cm 100% brand new and high quality! The product can effectively remove the...\nOSD Language: Russia,EnglishType: InvisibleBrand Name: CATUO Features: Brand new and high quality Automotive Electronic Dog Radar Mobile Speed Real-time intelligent voice broadcast LED Display ...", "label": "Yes"} {"text": "How one client was able to reduce 3-4 weeks’ work to real-time\nWhen a client came to Aigenpulse for help with in-silico target validation, their established analytics routine took 3-4 weeks per target. Their data exploration was hampered by external data and analytics tools, which couldn’t be combined efficiently with in-house data assets.\nWithout the ability to rapidly analyse large data assets, the client could not drive important development decisions. Ineffective in-silico target validation kept slowing them down, and every additional data parameter slowed them down even more.\nWe offered them a solution, and this is how we did it.\nSince our client already had a lot of in-house data and relied on external datasets, we imported these assets into the Aigenpulse Platform. To maximise data handling efficiency, analytics were also integrated into the client’s package.\nOnce everything was accessible via the unified interface and API, we started to optimise the analytics workflow. The performance tuning data structures and machine learning improved efficiency and scalability of reliable complex analytics procedures.\nThe fully automated analytics made in-silico target validation as rapid as possible. Now, the Aigenpulse Platform offers real time data analysis and generates reports upon every data import.\nThe Aigenpulse Platform integration cut down the data analysis timeframe from 3-4 weeks to real time. The fully automated in-silico validation routine increased data processing efficiency, and it keeps saving our client’s time.\nIn this case, our client needed the Aigenpulse Platform to identify targets for biologics development. Now they have a tool to efficiently choose and progress validated leads, without wasting time on lengthy analytics or loosing promising signals across large datasets.", "label": "Yes"} {"text": "I have problem with device SG 300-28. When I try to set port mirroring I get following message: “Lock port Dynamic Enable prevents executing Copy Port Enable”. This message is displayed as in web-interface, as in lcli mode. This is output from the console:\nSW(config-if)#port monitor gi15\nPort gi16: Lock port Dynamic Enable prevents executing Copy Port Enable\nBoth ports are in the same VLAN (if it matters). Which command prevents executing “port monitor” ?\nYou're getting this error because port security is enabled on the port you are trying to mirror. Once you unlock this port and make sure your destination port is vlan 1 then you shouldn't have any problems setting up mirroring.\nSx550X, Sx350X, Sx250: PSE will Supply Power to Catalyst PSE Ports\nMay 31, 2016\nJune 5, 2017\nConfigure Remote Network Monitoring (RMON) Events Control Settings on a Switch through the Command Line Interface (CLI)\nRemote Network Monitoring (RMON) was developed by the Internet Engineering Task Force (IETF) to support...", "label": "Yes"} {"text": "Download video over ip software - Bully scholarship edition trainer download for pc\nDownload video over ip software. View video from multiple cameras simultaneously. IP Camera Viewer keeps eye on your home office, parking area anywhere you have an IP camera. Org is hosting a free SIP service allowing users to make IP audio and video. Discover the Matrox Maevex H. Web Phones & VoIP Software for. Free video software; Video Management Systems;. Add live or recorded video to your. Distribute AV over IP with Matrox Maevex.\nUSB/ IP Project USB Request over IP Network. Product Brief ( Video over IP) PDF: en- us;. 264 Encoder and Decoder for HDMI over IP distribution. Mar 07 · Download VVoIP ( Voice Video over IP) for free. To do video calls. Download video over ip software.\nMain GUI ( click to enlarge). ImWatcher latest version: Personal video surveillance software for web cams and IP- cams. ImWatcher free safe download. Free Ip Tv free safe download. Monitoring or viewing a TS over Gig/ E IP streams ; Video over IP server for VOD testing. Best Video Software for the Mac How To Run MacOS High Sierra or Another OS on Your Mac. VideoOverIP from VDIworks is a high performance remote desktop solution for both virtual and physical PCs. Capture and record streaming video at low bit rates over standard networks. BroadCam Video Streaming Software Stream & Broadcast Videos over the Internet. Download BroadCam Video Streaming Software for. ( Voice over Internet Protocol) software. Free Ip Tv latest version:. Linphone is an internet phone with Voice over.CLICK HERE TO DOWNLOAD >. If you use VNC RDP today are not satisfied. Read a description of Video over IP Software.\nUSB/ IP Project aims to develop a general USB device sharing system over IP network. We collect large number of Tv channels from all over the. Bosch Video- over- IP ( BVIP) Lite Suite. Download free secure Voice Over IP software apps for Internet.\nFree detailed reports on Video over IP Software are also available. VVOIP is voice and video over IP is a P2P application without any protocol like SIP ( no server is required) etc. Stream Valve IP Application Software:.\nDownload over Iphone\nDistribute AV over IP with Matrox Maevex. 264 video encoders and H.\n264 video decoders extend 1080p60 using low bandwidth. Video Software; HELP & SETTINGS.", "label": "Yes"} {"text": "MISIS – March 12, 2018: Physicists from the NUST MISIS Laboratory of Superconducting Metamaterials and two Institutes of the Russian Academy of Sciences have created the world’s highest quality signal booster for quantum computers. The device can also be used in radio telescopes and other devices that work with super-weak radio emission.\nThe qubit state is one of the most difficult tasks when creating a quantum computer and the challenge is not only due to the small energies of readable photons but also the strange noises which change the system state. A signal amplifier which allows scientists to better read information about photons is an integral part of such systems. However, it usually brings a large part of noises that reduce the accuracy of the computations. That is why, to increase the probability of getting the correct solution, scientists have to conduct thousands of similar computations. Despite the fact that it is much faster than in regular computers, to reduce the number of computations and to further improve their speed, researchers are working on improving the accuracy of the computations. Hence why the creation of an amplifier with a minimal noise level has become one of key tasks of creating quantum computers. Several world leading laboratories have already offered their solutions but there is no way to utilize these developments. Now, Russian scientists have also managed to get a better grasp of this technology.\n“For the first time in the world, scientists from the NUST MISIS Laboratory of Superconducting Metamaterials, led by Professor Alexey Ustinov, together with their colleagues from the Institute of Solid State Physics and the Institute of Radio-Engineering & Electronics, have developed a superconducting amplifier of the signal from a qubit; this amplifier emits the lowest possible noise level. This world-class development has commercial potential: the created amplifiers can be used in radio telescopes”, said Alevtina Chernikova, Rector of NUST MISIS.\nAnd according to Professor Karpov, it is impossible to create a completely soundless amplifier because even a vacuum makes a background noise: from time to time a pair of particle-antiparticles is born, and subsequently dies there. These vacuum fluctuations cause chaos in the system. That is why the minimum noise level that can be reached while creating superconducting elements is equal to the vacuum. This level is called the quantum limit. NUST MISIS scientists have managed to achieve it by replacing the material — from which the amplifier is created — with a superconductor.\n“These amplifiers can be used not only in quantum computers but also in other systems from the field of quantum informatics, where the reading mechanism for the quantum state of the system is used. For example, in sensors of space radiation on radio telescopes. As it is impossible to purchase foreign analogues, this development will be in commercial demand at least throughout Russia”, added Karpov.", "label": "Yes"} {"text": "Ore processing requires physical separation of mineral phases, therefore a chemical characterization cannot by itself solve the problem, and must be complemented by mineralogical characterization of the ore. This task has been traditionally achieved with a reflected light microscope coupled to a point counter device. Modern sem-based Systems are far more performant but very expensive. The automated\nAMCO System combines the low price of the optical microscope with the high performance of sem-systems. Automated ore identification and characterization are achieved by AMCO through multi-spectral imaging. The acquired images allow specular reflectance measurement and digital image analysis on a pixel to pixel basis, thus providing all the information required for industrial plants or for research e.g. ore identification, modal analysis, grain size and textural analysis, liberation grade, etc..", "label": "Yes"} {"text": "April 5, 2011\nANN ARBOR, Mich. -- The University of Michigan Athletics Department has partnered with TS Sports/Lighthouse for its scoreboard replacement project. TS Sports/Lighthouse will be providing new state-of-the-art video displays and scoring systems at Michigan Stadium, Crisler Arena and Yost Ice Arena.\n\"We are excited to partner with TS Sports on new, state-of-the-art scoreboards for our three largest venues,\" said U-M director of athletics Dave Brandon. \"Our goal is to set a new, higher standard for our fans' viewing experience and the game day atmosphere we create in our venues. These boards will be an important first step in achieving that goal.\"\nTS Sports/Lighthouse is a leading LED video board company that specializes in video displays, scoring systems, installation and long-term service. Its turn-key visual solutions are created for a variety of applications including outdoor stadiums, indoor arenas, collegiate facilities and professional venues.\nTS Sports/Lighthouse recently installed video display systems at American Airlines Center, home of the NBA's Dallas Mavericks and the NHL's Dallas Stars. The Bradley Center, home of the Milwaukee Bucks, also recently chose TS Sports for its system. On the college front, TS Sports has recently completed projects at the University of Oregon, University of Connecticut and Ohio State University.\nThe demolition and removal of the existing video boards began in March. Over the next several months, TS Sports will install in both end zones of Michigan Stadium LED screens that will be 40 percent larger than the previous system. The new video screens will be 47 feet tall by 85 feet wide. The Big House upgrade will be completed in August prior to the 2011 season.\n\"TS Sports is very excited about partnering with the University of Michigan on their LED video display upgrades,\" said president and CEO Garry Waldrum. \"Michigan Stadium features our new Impact 16 video product from Lighthouse Technologies. The Impact 16 will provide Wolverine fans with the latest technology and clearest video image in college sports.\"\nThe new video display at the \"Big House\" features:\nTwo Lighthouse Impact 16 video displays measuring more than 4,000 square feet each\n» Resolution: 900 x 1632\nNew custom scoring system\nNew custom system enclosure\n» Size: 62' (h) x 108' (w)\nIn conjunction with Phase I of the Crisler Arena renovations, TS Sports will replace the current center-hung scoreboard that was installed in 1998.\n\"The new video system at Crisler Arena is a basketball fan's dream,\" said TS Sports vice president of sales Matt Ritter. \"The system will feature 14 LED video displays from Lighthouse Technology tracking all major events throughout the game -- instant replays, fan shots, hustle stats, animations, graphics and much more.\"\nThe new center-hung at Crisler Arena will consist of 14 LED video displays:\n- Four 12' x 16.8' Pi10 10mm main displays\n- Four 6.28' x 16.8' Pi10 10mm scoring displays\n- Four 6.28' x 6.3' Pi10 10mm advertising displays\n- One 2.1' x 81.9' Pi10 10mm top video ring display\n- One 2.1' x 44.1' Pi10 10mm bottom video ring display\nYost Ice Arena\nFor the first time in its history Yost Ice Arena will get a facelift that will include LED video displays for the arena.\nThe new center-hung at Yost Ice Arena will consist of nine LED video displays:\n- Four 13' x 16.8' Pi10 main displays\n- Four 12.5' x 6'6' F16 corner displays\n- One 2.5' x 75.59' F16 video ring display\nMichigan Sports Television Production Studio\nThe project also includes the conversion to high-definition video equipment. Due to the construction at Crisler Arena, the Michigan Sports Television Production Studio, which manages and controls the video boards, will be relocated to Michigan Stadium until the arena is completed in 2013-14.\nAbout TS Sports:\nTS Sports, founded in 1997 and based in Dallas, Texas, is an electronic video board supplier that provides state-of-the art light-emitting diode (LED) technology. TS Sports' innovative video boards are of the highest quality in the industry, and the company prides itself on being a unique \"one-stop shop\" for its customers. TS Sports also installs and services scoreboards, advertising panels, electronic message centers, sound systems, control rooms, and advertising and naming rights. The company works with clients on projects from start to finish beginning with the design stage, then production and finally installation. Post installation, TS Sports offers the best service and response times in the industry. For more information about TS Sports, please visit www.ts-sports.com.\nRegents Approve New HD Video Boards for Big House, Crisler, Yost (Jan. 20, 2011)\nMedia Contact: David Ablauf (734) 763-4423", "label": "Yes"} {"text": "Axiom LC-LC 10G Multimode Duplex OM3 50-125 Fiber Optic Cable 15m\nSKU: MPN: LCLC10GA-15M-AX UPC:\n- Experience a simpler way to connect devices with the entire business network\n- Features Fiber Optic cable type\n- 2 x LC Male Network offers a secure and reliable connection with a compatible network device\n- Axiom Memory Solutions\n- Connector Cables\n- Manufacturer Part Number:LCLC10GA-15M-AX\nHave a Question before ordering?\nWe will gladly answer within 24 hours!", "label": "Yes"} {"text": "|Mapping constrained optimization problems to quantum annealing with application to fault diagnosis\n|Year of Publication\n|Bian, Z, Chudak, F, Israel, R, Lackey, B, Macready, WG, Roy, A\nCurrent quantum annealing (QA) hardware suffers from practical limitations such as finite temperature, sparse connectivity, small qubit numbers, and control error. We propose new algorithms for mapping boolean constraint satisfaction problems (CSPs) onto QA hardware mitigating these limitations. In particular we develop a new embedding algorithm for mapping a CSP onto a hardware Ising model with a fixed sparse set of interactions, and propose two new decomposition algorithms for solving problems too large to map directly into hardware.", "label": "Yes"} {"text": "What Is a Private IP Address?\nAs we navigate through an increasingly digital age, understanding the technical aspects of networking is becoming ever more crucial. One concept that is central to the functioning of networks is IP addressing, and specifically, understanding the difference between a public and private IP address.\nAn IP (Internet Protocol) address is a unique numerical identifier assigned to every device that connects to the internet. This is how devices communicate with one another across networks, allowing for data to be transferred between them. IP addresses can be either public or private.\nA public IP address is assigned to a device by the network it’s connected to and is visible to all other devices on the internet. These addresses are typically used by servers, websites, and other public-facing devices that need to be reachable to anyone on the internet.\nIn contrast, a private IP address is assigned to a device by its local network so that it can communicate with other devices on the same network. Private IP addresses are not visible to devices on the internet and are used primarily for internal devices like computers, printers, and other devices that do not need to be visible to the public internet.\nThere are three ranges of private IP addresses set aside for local networks: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255. These ranges were assigned by the Internet Assigned Numbers Authority (IANA) specifically for use in private networks so that devices can communicate with each other without the need for a public IP address.\nPrivate IP addresses are not unique to a particular device or network and can be reused within different local networks. However, private IP addresses cannot be used to communicate with external devices, as those devices will not be able to understand or route traffic sent from a private IP address.\nIn summary, a private IP address is an identifier assigned to devices within a local network, allowing them to communicate with each other. Private IP addresses are not visible to devices on the internet and are used primarily for internal devices that don’t need to be reachable by the public. Understanding the difference between public and private IP addresses is essential for those working in IT and networking, as these concepts are fundamental to the functioning of networks.", "label": "Yes"} {"text": "||Haas E. Bioluminescence from single bacterial cells exhibits no oscillation. Biophys J. 1980 Sep31(3):301-12 DOI: 10.1016/S0006-3495(80)85060-0 p.301 bottom paragraphPubMed ID6973368\n|| Berzhanskaia LIu, Gitel'zon II, Fish AM, Chumakova RI, Shapiro VE. [Bioluminescence of bacteria-a rhythmic process].[Article in Russian] Biofizika. 1973 Mar-Apr18(2):285-92PubMed ID4701438\n||P.301 bottom paragraph: \"More recently, there have been reports of periodicity in light emission from bacteria (primary source, ref 7). In the former publication (primary source), light emission from several (5-10) cells was measured in a photon counter at a limiting resolution of 2 ms. By using time correlation, it was deduced that there was an oscillation with a fundamental frequency of 8 cycles/s, thus a peak about every 0.125 s.\"", "label": "Yes"} {"text": "The issue with creating different types of protocols for you IoT devices can be challenging with this being the rising era of the Internet Of Things. An issue has companies, schools and charities not putting any procedures in place are needed to avoid any cyber-security attacks.\nThe IoT is vastly growing technology advance in every sector that operates with technology. The security procedures cannot be taken for granted especially when regulating large quantities of data, also being compliant with rules and regulations that match with laws such as the data protection act. This is the reason that security protocols are needed to combat any suspicion and for the advanced protection of any cybersecurity attack.\nAn example would be a kitchen appliance manufacturer might develop an IoT device but lacks the security features to secure the device in the smart home network will increase a high probability the home network will be at risk. The IoT will always face security issues until security protocols put in place and simple one will to have a firewall hardware that will be beneficial within the home and serve as a protection for any malicious data. The ability to embed device within a security parameter.\nThe most common procedure that creates issues default usernames and passwords are changed during initial setup will have an incremental effect on protecting your network setup. The changes shouldn’t allow the use of weak passwords. Perhaps measures such as an account lockout after three to five failed login attempts should be considered.\nAnother incremental step is to ensure login codes are not in clear text within network traffic. Additionally, two-factor authentication may be needed for sensitive areas like administrator accounts.\nBe mindful attackers use scanning for open ports with software that can exploit those ports. The device should be regularly updated and made sure when their issues with hardware such as spectre and meltdown get the necessary patches. The encryption should be a priority of IoT device and have Intel AES-NI processors are important.\nPhysical security of the IoT device is very important but many USB ports or storage means may be a way for attackers to gain access to data stored on the device and when ports are not used deactivate them.", "label": "Yes"} {"text": "Speech generation for machine dubbing adds complexity to conventional Text-To-Speech solutions as the generated output is required to match the expressiveness, emotion and speaking rate of the source content. Capturing and transferring details and variations in prosody is a challenge. We introduce phrase-level cross-lingual prosody transfer for expressive multi-lingual machine dubbing. The proposed phrase-level prosody transfer delivers a significant 6.2% MUSHRA score increase over a baseline with utterance-level global prosody transfer, thereby closing the gap between the baseline and expressive human dubbing by 23.2%, while preserving intelligibility of the synthesised speech.\nProsody transfer is well-studied in the context of expressive speech synthesis. Cross-lingual prosody transfer, however, is challenging and has been under-explored to date. In this paper, we present a novel solution to learn prosody representations that are transferable across languages and speakers for machine dubbing of expressive multimedia contents. Multimedia contents often contain field recordings. To enable prosody transfer from noisy audios, we introduce a novel noise modelling module that disentangles noise conditioning from prosody conditioning, and thereby gains independent control of noise levels in the synthesised speech. We augment noisy training data with clean data to improve the ability of the model to map the denoised reference audio to clean speech. Our proposed system can generate speech with context-matching prosody and closes the gap between a strong baseline and human expressive dialogs by 11.2%.\nVariational Bayesian Inference is a popular methodology for approximating posterior distributions over Bayesian neural network weights. Recent work developing this class of methods has explored ever richer parameterizations of the approximate posterior in the hope of improving performance. In contrast, here we share a curious experimental finding that suggests instead restricting the variational distribution to a more compact parameterization. For a variety of deep Bayesian neural networks trained using Gaussian mean-field variational inference, we find that the posterior standard deviations consistently exhibit strong low-rank structure after convergence. This means that by decomposing these variational parameters into a low-rank factorization, we can make our variational approximation more compact without decreasing the models' performance. Furthermore, we find that such factorized parameterizations improve the signal-to-noise ratio of stochastic gradient estimates of the variational lower bound, resulting in faster convergence.\nEnsembles of models have been empirically shown to improve predictive performance and to yield robust measures of uncertainty. However, they are expensive in computation and memory. Therefore, recent research has focused on distilling ensembles into a single compact model, reducing the computational and memory burden of the ensemble while trying to preserve its predictive behavior. Most existing distillation formulations summarize the ensemble by capturing its average predictions. As a result, the diversity of the ensemble predictions, stemming from each individual member, is lost. Thus, the distilled model cannot provide a measure of uncertainty comparable to that of the original ensemble. To retain more faithfully the diversity of the ensemble, we propose a distillation method based on a single multi-headed neural network, which we refer to as Hydra. The shared body network learns a joint feature representation that enables each head to capture the predictive behavior of each ensemble member. We demonstrate that with a slight increase in parameter count, Hydra improves distillation performance on classification and regression settings while capturing the uncertainty behaviour of the original ensemble over both in-domain and out-of-distribution tasks.", "label": "Yes"} {"text": "Home > News > Business incubator directors explain what works\nMay 26th, 2005\nBusiness incubator directors explain what works\nGetting innovative technology from university labs into the marketplace is a challenge across the globe. Many research institutions have improved their chances by turning to incubators. Small Times' Candace Stuart spoke with Peter Binks, chief executive of Nanotechnology Victoria Ltd. (Nanovic), Kees Eijkel, technical commercial director of the MESA+ Institute at the University of Twente, Tom Hockaday, executive director of Isis Innovation Ltd., and Joel Wiggins, director of the Austin Technology Incubator.\nNanotechnology Victoria Ltd.\nMESA+ Institute at the University of Twente\nIsis Innovation Ltd.\nAustin Technology Incubator\nIranian Scientists Produce Transparent Nanocomposite Coatings with Longer Lifetime July 24th, 2014\nA Crystal Wedding in the Nanocosmos July 23rd, 2014\nNano-sized Chip \"Sniffs Out\" Explosives Far Better than Trained Dogs: TAU researcher's groundbreaking sensor detects miniscule concentrations of hazardous materials in the air July 23rd, 2014\nPenn Study: Understanding Graphene’s Electrical Properties on an Atomic Level July 22nd, 2014", "label": "Yes"} {"text": "Copeland MP Trudy Harrison talked about her vision for the nuclear industry during a two-day conference at Westlakes Science Park.\nThe 2019 Westlakes Public Value Convention, hosted by the University of Central Lancashire, focused on public value and achieving the greatest benefits for the community.\nSpeaking on the second day, Mrs Harrison, said: “The nuclear industry is the safest large-scale power industry in the world. My vision is to have large scale reactors and small modular reactors as well,” she said.\n“It’s really important that we challenge the negative perception of the nuclear industry, tackle the mistruths, tackle the waste issue and also the costs.\n“The reality is that we need to get the costs down of new nuclear and this is where nuclear innovation and small modular reactors come into their own.\n“We need to de-carbonise our environment and I think that it’s important we do more with small modular reactors, we can be ahead of the curve on this, we have a game-changing opportunity here,” she told the conference.\nInnovative work was presented by a range of experts including Dr Gianluigi Baldesi, of the European Space Agency; Professor Paul Howarth of the National Nuclear Laboratory, and Ivan Baldwin of Britain’s Energy Coast Business Cluster.", "label": "Yes"} {"text": "LEDGlow’s Orange Expandable SMD LED Interior Lighting Kit features 12.5 inch flexible tubes with 12 SMD LEDs per tube and 18 distinct patterns, easily controlled with the included wireless remote.\nLEDGlow’s Orange SMD LED Expandable Interior Lighting Kit features ultra-bright, surface mounted Orange LEDs that will give your vehicle’s interior a vibrant, energetic look that separates your car from the rest! SMD technology produces a more potent illumination by utilizing high powered SMD LEDs, allowing for a more concealable tube and an effortless operation. This single color SMD interior lighting kit includes 12.5 inch flexible tubes that are easily powered by mini USB connections, allowing you to daisy chain each LED lighting tube to the next. Each tube features (12) 3528 SMD chips, and this expandable interior light kit can power a total of 180 SMD LEDs or (15) 12.5 inch tubes, giving you endless options when illuminating your vehicle’s interior. This cutting-edge single color car interior lighting kit includes an easy to hide control box featuring 18 preset color cycle lighting modes which include flashing, fading, strobing, and scanning. All of the included lighting modes and functions can be easily selected by using either the 4 button wireless remote or the 4 buttons located on the control box. Also featured with this SMD expandable interior light kit is a sound activation mode which allows 4 unique, pre-programmed patterns to respond to the music playing inside of your car! For maximum mounting capabilities, this expandable interior lighting kit includes 2 different power wire lengths, along with 3M tape and screws that allow you to easily mount each tube to your desired location. LEDGlow’s SMD LED Single Color Expandable Interior Lighting Kits include a one year limited warranty and free lifetime technical support.\nOrange LED Interior Lighting Kit Includes:\n- Ultra Bright Surface Mounted Orange LEDs\n- 12.5 Inch Flexible Tubes\n- Mini USB Connections for Easy Installation\n- Small, Easily Hidden Control Box\n- 4 Button Wireless Remote\n- 18 Unique Lighting Modes Include: Strobing, Scanning, Fading, and Flashing\n- 4 Sound Activated Modes\n- 5 Brightness Levels\n- 9.5 Feet and 5 Feet Power Wire Lengths\n- Expandable to Include 180 SMD LEDs or (15) 12.5 Inch Tubes\n- Mounting Hardware and Installation Instructions\n- Free Lifetime Technical Support\n- One Year Limited Warranty", "label": "Yes"} {"text": "Well...I found a way, using file manager:\nEnable \"full access\"\nEnable \"hidden files\"\nthen go to:\nThe file are inside that folder\nNot lost in the sapce, but well hidden in the space\nHey Man... many thanks I had good luck\nI tried the installers from this page:\nI tried the windows exe on a windows 10 machine but it did not detect the fastboot, so it kept waiting\nI tested the deb file:\nOn a 16 LTS machine... the developer mode worked well , but then got frozen on fastboot\nOn a 14.04 installation, I never got the accept message on the phone (developer mode)....however I placed the phone on fast boot manually and then all worked nicely\nSo now the UBport is up and running on the phone", "label": "Yes"} {"text": "LED Makeup Mirror\nThe Wireless Charging LED Makeup Mirror is the perfect gift for anyone ; whether you are a serious makeup artist or just looking to add a little elegance into your daily routine. This portable LED lighted vanity makeup mirror is also equipped as a wireless charger for your mobile devices!\nEvery lady needs to have a good, reliable makeup mirror, and everyone also needs to have a quick and reliable charging port for their smartphones. The Wireless Charging Portable LED Makeup Mirror combines both functions in one!\nThis stylish compact mirror comes with a wireless charging function that is an integrated wireless charging system that can charge iPhones, iPads, Androids, and any other QI compatible device. These advanced mirrors contain AIRE technology that can also charge your phone with QI supported wireless charging.\nThis mirror also has three different light settings: Cool, warm, and natural. Each light color can be switched with a quick double-click action.\n- Type: LED Makeup mirror\n- Color: Red/Pink\n- Material: ABS\n- Battery capacity: 500mah lithium battery\n- Output Power: 5W (5V/1A)\n- Working time: 3-10 hours (Depending on the brightness)\n- Charging time: about 2.5hours\n- Number of lamp beads: 18 high color rendering index custom lamp beads.\n- Net weight: 80g\n- Gross weight: 112g\n- Product size: 106*12mm\n- 100% brand new and high quality.\n- Exquisite workmanship, durability.\n- Light adjustment: multi-level dimming.\n- Night light mode gives you a sense of security.\n- Soft light technology, not glare, make your makeup look better\n- Multiple Use: It can be used as an simple makeup mirror to better meet the user's needs during the charging process, such as watching movies, facetime and so on.\n- Standard QI wireless charging protocol,support all QI supported device charge.\n- 1x LED makeup mirror\n- 1x USB power cable", "label": "Yes"} {"text": "SolidWorks is only one of many companies looking to incorporate eye tracking into future updates to the user interface. The art of designing great computer controls will depend in part on combining eye-tracking with older input technologies such as keyboards, mice, touch screens, and 3D navigation devices. Read more on the developments in eye-tracking HERE.\nFrom the SIGGRAPH Pioneers: Chasing Pixels: The Pioneering Graphics Processors. The panel was presented live on April 13, 2022. It is introduced by Chair Ed Kramer and moderated by former Chair Jon Peddie (jonpeddie.com), and is part of our ongoing series of panels about significant early developments in computer graphics and interactive techniques.\nJon Peddie Research Announces its Latest Whitepaper for Sony Electronics Inc.: The Rise and Benefits of Companion Robots", "label": "Yes"} {"text": "Professor Trenary’s research interests span the traditional areas of physical chemistry, analytical chemistry, and the chemistry of inorganic materials. The structure and chemistry of solid surfaces is a theme that unites all of the different projects. Specific areas of study are related to important technological fields such as heterogeneous catalysis, semiconductor processing, growth of thin film materials, nanotechnology, and development of alternative energy sources. A broad array of sophisticated instrumentation for surface science studies under ultrahigh vacuum conditions are available in his laboratories.\nResearch currently funded by:", "label": "Yes"} {"text": "There is a lot of interest in the industry about the power handling capability of different cables to power up devices that can consume up to 60 Watts or more of power. Some applications, for example HDBASET are looking at the capability of delivering up to 100 Watts of power for audio/video devices such as HDTV monitors. But there is a concern regarding the heating effect resulting from the current that is flowing in the cables to power up these devices.\nThe official position in the industry is the IEEE 802.3at Power over Ethernet Standard that specifies a Power handling capability for Type 2 operation of 25.5 Watts over 2 pairs of Category 5e cabling and potentially up to 60 Watts when powering over 4 pairs using Category 6 and Category 6A cables. TIA has also published a Telecommunications Systems Bulletin (TSB-184) that supplements the information contained in the IEEE 802.3at Standard regarding cable bundling, temperature rise and current capacity.\nIn order to answer this question a controlled experiment was performed to evaluate the temperature rise in a cable bundle when delivering different amounts of DC power to the powered device over Category 5e, Category 6 and Category 6A cables.The results of the heating study show that the maximum power delivery when all pairs are energized is between 50 to 80 Watts for a 100 cable bundle depending on the cable design", "label": "Yes"} {"text": "Nissan recently launched a new Sentra that will come equipped with the brand’s ProPILOT autonomous drive technology. Set to go on sale in late August in Japan, this technology offers convenient and safe autopilot technology behind the wheel.\nAccording to Nissan, this technology is designed for single-lane traffic on the highway. Combining sensors with steering, acceleration, and braking control, drivers will be able to switch on a full automatic mode, easing the driver workload in heavy traffic and on longer commutes. The driver can easily activate and deactivate the system, which is designed to essentially drive itself.\n“Nissan will advance its leadership in autonomous drive technology by introduction in each market’s core models, further improving safety and pioneering a new era for the automobile,” said the automaker in a release.\nThis breakthrough technology is something that other brands have been working on for years. Nissan has finally perfected autonomous driving, making it easier than ever to travel. Although there is no word yet when the system will hit the US, it looks like it could soon be on its way. The goal for Nissan is to reach a zero-emissions and zero-fatalities reality, making mobility cleaner and safer than ever. ProPILOT is just the first step. We can’t wait to see what else Nissan engineers have up their sleeves.", "label": "Yes"} {"text": "- Jun 3 10:46 AMThis message is sent from the InfoAge main building, via a router,\nconnected to Bryan's wifi-to-ethernet gadget, connected at 47% status\nwirelessly to Steve's router and cable modem across the street.\nSo now we just have to run a wire to the event room and we're all set\n(in theory) for Chuck Peddle's videocon next week.\n- << Previous post in topic Next post in topic >>", "label": "Yes"} {"text": "Visualizing virtual brain lesions: Simultaneously combining fMRI and TMS\nBaudewig J, Bestmann S, Linden D, Dechent P, Goebel R, Sack A, Kohler A\nMR-Research in Neurology and Psychiatry, Medical Faculty, Georg-August-University\nApplying transcranial magnetic stimulation (TMS) can temporary and specifically impair behavioural performance. This non-invasive virtual lesion technique thus allows investigating the causal relationship between stimulated brain regions and a specific behavioural or cognitive function. Here we simultaneously combine fMRI and TMS during the execution of behaviourally controlled visuospatial tasks in order to visualize the physiological consequences of a virtual brain lesion as measured by TMS-induced changes of BOLD responses. We found a task-specific behavioural impairment of the TMS that was mirrored by task-specific fMRI signal reductions at the site of stimulation as well as within connected brain structures.", "label": "Yes"} {"text": "Application of Variational Techniques to Time-Dependent Perturbation-Theory\nLinear-response functions and second-order transition amplitudes can be calculated exactly provided one effective state, the solution of an inhomogeneous Schrodinger equation, is known. We show how variational principles can be applied to the calculation of this effective state; an important advantage is the possibility of using variational techniques, which are very efficient when large basis sets (such as plane waves) are used, or when the solution is required as a function of a free parameter (for instance, the frequency in dynamical response functions). The variational principle applies to solid-state as well as to atomic problems. We illustrate the use of one variational technique in the simple case of two-photon transitions in the hydrogen atom.", "label": "Yes"} {"text": "Dymax, a manufacturer of rapid and light-curing materials and equipment, will be exhibiting at the IPC APEX EXPO 2024 in Anaheim, CA, held from 9-11 April, 2024.\nDymax’s booth will feature high-tech products for advanced circuit protection, board-level electronics assembly, and battery module applications.\nConformal coatings, adhesives, encapsulants, maskants, potting materials, gasket/sealing materials and dispensing and light-cure systems will be highlighted in booth 3100.\nVisitors to the booth will see an EV battery shell model and the component areas where Dymax products are used. Design engineers will be particularly interested in light-curing demonstrations of 7501-T-UR-SC protective coating for plastic and metal and 9-7001 fluorescing maskant.\nPrinted circuit boards with 9483 and 9771 conformal coatings applied to them and multipurpose PCBs showing encapsulants, potting, and masking materials will be available for viewing and discussion. The BlueWave® AX-550 LED light-curing system, which offers high-intensity flood curing in a large 5” x 5” area and an all-in-one design, will also be on display.", "label": "Yes"} {"text": "It’s one small step for a US rocket company, but one giant leap for a specialist Irish firm.\nThe National Space Centre, based in East Cork, is celebrating, after becoming the first to use Irish-based infrastructure to remotely track and monitor the deployment of satellites in orbit. It did so last weekend.\nAnd after boldly going where no Irish firm has gone before, it is now well-positioned to exploit future opportunities in the growing commercial space sector.\nUS space launch provider, Rocket Lab, chose Elfordstown to provide critical support for the second test flight of its Electron orbital launch vehicle, ‘Still Testing’.\nThe rocket lifted-off from a launch complex on the Mahia Peninsula, in New Zealand, early on Sunday morning, with three customer satellites on-board: a weather, a nautical, and an earth imaging satellite.\nThe rocket reached orbit and deployed its payload eight minutes and 31 seconds later.\nThe team at Elfordstown used their ground station and teleport facilities to track and monitor the deployment.\nNational Space Centre CEO, Rory Fitzpatrick, said it was the first time a satellite orbital insertion had been monitored from Irish-based infrastructure, and that they were delighted to be part of the mission.\nIrish first as Elfordstown tracks & monitors Rocket Lab satellite deployment https://t.co/7Y2vHwtYsO— NationalSpaceCentre (@Elfordstown) January 22, 2018\n“Securing the Rocket Lab ground-segment contract has been another major step in developing our carrier-grade teleport at Elfordstown Earthstation,” he said.\nThe Electron rocket is now poised to be the first commercially bookable rocket built specifically for small payloads.\nThe launch of small satellites, which weigh less than 100kg, is a huge growth area, with an estimated 3,500 expected to be launched in the next decade. Rocket Lab has already signed up clients like NASA and Spaceflight for its commercial phase.\n© Irish Examiner Ltd. All rights reserved", "label": "Yes"} {"text": "Ubuntu on Cisco UCS B200 M2\nIf there is an issue with the information for this system, please let us know.\nThe Cisco UCS B200 M2 server with the components described below has been awarded the status of certified for Ubuntu.\nUbuntu 10.04.4 64-bit\nAvailable from ubuntu.com\nThis system was tested with 10.04 LTS, running the 2.6.32-33.70 kernel.\n- Cisco VIC Ethernet\n- As of 10.04.3, the driver module 'enic' is not part of the installer kernel. Because of this, you will be unable to configure network devices during install and the installer may complain of no network devices found. You can complete installation manually and configure network devices after installation. At that point, the enic driver loads successfully at boot and networking functions as expected. This will most likely, however, have impact on attempts to preform network installations.\n- Cisco Systems: S5500.2.0.1a.0.081120111606 (Legacy)\nThis system was tested with these key components:\nNo results found.", "label": "Yes"} {"text": "Lenovo K4 Note Debuts With TheatreMax VR TechJanuary 7, 2016\nYes, Lenovo’s has got a new phone in the new year but, the even bigger news is Lenovo is stepping into the world of VR technology its own Lenovo Virtual Reality also dubbed as TheatreMax. The Lenovo K4 Note is the first smartphone to use this VR tech.\nLenovo is emphasizing on the cinematic experience this new phone and VR tech will give to the users. The K4 Note even has front firing stereo speakers with Dolby Atmos to keep its entertainment quotient high. The Lenovo K4 Note has a pretty strong specsheet that keep up with its competitors. It is powered by the MediaTek MT6753 octa-core processor and 3GB RAM. The 5.5 inch display has FullHD resolution. Lenovo has also thrown in NFC and Fingerprint sensor. It’s also dual SIM with 4G LTE as standard. Lenovo K4 Note also has a 13MP rear camera with dual tone flash and 5MP front camera. It’s got a hefty 3,300 mAh battery as well.\nThe Lenovo K4 Note is probably the first of its kind in the segment to sport a technology like this. To take the full benefit of it, all you need to do is wear a pair of Lenovo’s VR glasses. These VR glasses won’t even cost you a bomb as Lenovo will be selling K4 Note bundled with these glasses for Rs.12,499 (~$187) and without glasses for Rs.11,998 (~$180). Shelling few extra bucks looks worth it. However if you decide to buy these glasses separately, it’ll pinch your pocket a little at Rs.1,299 (~$19).\nIndia is the first market to get the K4 Note. It will be sold in flash sale style on Amazon India with first flash sale happening on Jan 19. There’s no word on the availability in other markets.", "label": "Yes"} {"text": "The heatsink is properly applied, I already reintalled the processor, but the processor cooler feels loose, I will reinstall that one and see what happens, any other idea? thanks!\nEDIT: One of the pins on the processor cooler was not entirely installed, so now it's not giving me the thermal warning, however, I turned it on, and I hear a constant beep, but no video, all the fans, leds are working, I just got it to work today a few hours ago with no thermal or video issues, but why did I have the video problem? any idea? thanks!", "label": "Yes"} {"text": "RTX51 TINY: Using SFR Pages with SiLabs\nInformation in this article applies to:\nSome SiLABS C8051Fxxx versions implement a paged SFR scheme that expands the number of available SFR addresses. This paging scheme affects the SFR locations used for the RTX51 Tiny system timer.\nWhat changes should I make using RTX51 Tiny together with a SiLABS part that is using SFR paging? Are there any restrictions?\nRTX51 Tiny uses the standard 8051 Timer 0 (mode 1) to generate a periodic interrupt. This timer interrupt performs task switching. To use RTX51 Tiny on a SiLABS device with SFR paging, make the following modifications to the configuration file CONF_TNY.A51:\nThese changes impose the following restrictions when you are using SFR paging on a SiLABS device:\nLast Reviewed: Thursday, February 25, 2021\nof your data.", "label": "Yes"} {"text": "Google buys Softcard's mobile-wallet technology for smartphones\nThe Columbus Dispatch\nMOUNTAIN VIEW, Calif. — Google has acquired technology and patents from Softcard, a mobile-wallet service backed by the three-biggest U.S. wireless providers.\nAT&T, Verizon Communications and T-Mobile US will work with Google to pre-install the Google Wallet application on newer Android phones, Google said in a blog post yesterday.\nAs part of the deal, Google is acquiring assets from Softcard to improve its payments service.", "label": "Yes"} {"text": "Also Allows External MacBook Batteries To Be Recharged With MacBook Power Adapter\nPRE-MACWORLD 2011 SAN FRANCISCO, California – January 24, 2011, Sanho Corporation (Booth 710), makers of HyperJuice/HyperMac External Batteries for Apple MacBooks today announce Magic Box – two small adapter boxes that allow MacBook users to easily make their own HyperJuice compatible MagSafe charging cables from their existing MagSafe Power Adapters. With these modified cables, MacBooks can be powered and recharged with external batteries from HyperJuice. The Magic Box also allows the HyperJuice external batteries to be recharged by the same MagSafe Power Adapters, eliminating the need for a separate HyperJuice charger.\nMagic Box improves upon the earlier 10 Minute MagSafe DIY Modification Process first demonstrated at CES 2011. In addition to the modification time being brought down from 10 minutes to just 2 minutes, a new functionality is added – the ability to recharge the HyperJuice External MacBook Batteries with the newly modified MagSafe Power Adapters.\nApproximately the size of the Apple iPad 10W USB Power Adapter, the Magic Box slides open to reveal 2 spring locked terminals which fix onto the cord of the MagSafe Power Adapter. Designed to be extremely user friendly and accessible to users of all technical backgrounds, detailed photo and video instructions will show users how to split the power cord into 2 separate (positive and negative) wires and connect to the Magic Box in under 2 minutes, 1 minute for each of the two Magic Boxes. No special skills, tools, soldering or complex wiring required. The shorter Magic Box connects to the MagSafe connector end of the cord while the longer Magic Box with built-in charging circuitry connects to the power adapter end. Users can continue to use their MagSafe Power Adapter as normal; or disconnect the MagSafe cable from the MagSafe Power Adapter and use it with the HyperJuice External Battery or Car Charger to power and recharge their MacBooks; or use just the modified MagSafe Power Adapter to recharge the HyperJuice.\nApple MacBooks today feature integrated, non-user replaceable batteries. Proprietary charging connectors meant that MacBooks can only be officially powered from the electric outlet with the MagSafe Power Adapter or MagSafe Airline Adapter. HyperJuice remains the only viable external battery solution to extend the MacBook’s mobile computing time beyond the power grid.\nHyperJuice External MacBook Batteries are compatible with all MacBook, MacBook Pro and MacBook Air models. Available in 4 different capacities of 60Wh, 100Wh, 150Wh and 222Wh (compared to 11″ MacBook Air battery which is only 35Wh). HyperJuice is capable of powering the MacBook for up to 45 hours – allowing for long haul flights, extended outdoor shoots, expeditions to remote locations or any situation where electricity is simply not an option. When on the road, there is also the HyperJuice Car Charger which powers the MacBook directly from the automobile cigarette slot.\nUsers can check the HyperJuice battery level anytime with the built-in 4 level LED battery indicator. HyperJuice battery also comes with a 10W high power USB power port to charge any USB device including the iPad and iPhone separately or simultaneously with the MacBook.\nHyperJuice batteries uses the same high-end lithium ion cells that are supplied to the U.S. Military. It is rechargeable up to 1,000 times and comes with a 1 year warranty. With a great attention to detail, HyperJuice batteries’ silver color aluminum housing are color matched to the MacBook. Clean lines, laser engraved logo and all-white accessories complete the Apple look.\nThe HyperJuice External MacBook Batteries currently retails at www.hyperjuice.com for $169.95 (60-watt-hour battery), $249.95 (100Wh), $349.95 (150Wh) and $449.95 (222Wh).\nA working prototype of the HyperJuice Magic Box will be on display at HyperJuice’s Macworld 2011 booth and will be made available in March 2011. Customers can pre-order the HyperJuice Magic Box now at www.hyperjuice.com for $49.95. As part of the pre-order promotion, the HyperJuice Car Charger which allows the MacBook to be recharged in the car will be given free with every purchase of the HyperJuice Magic Box.", "label": "Yes"} {"text": "Wireless signals are susceptible to naturally occurring periodic and random phenomena such as background noise, EMI, RFI, CME, and EMP to name a few. Some wireless technologies, such as AM, are susceptible to impulse noise like distant lighting strikes; and others, such as FM, can be sensitive to certain in-band noise from fluorescent lights. As designers, we try and anticipate the situations and circumstances our designs will be subject to and provide fixes, work-arounds, or other types of solutions to solve these problems.\nHowever, there is another type of situation that wireless links are particularly vulnerable to and that is deliberate jamming. Here, someone deliberately sets out to block a link’s communications ability by targeting an attack that is particularly effective against the specific link or family of links. Jamming can be attempted for mischievous purposes, for motives such as profit, or for military advantage in times of war.\nKids with little boxes or kits can make and use jammers to annoy parents, schools, and commit similar forms of mayhem. Corporations can use jammers to interfere with a competitor’s operations, slow down or crash a company’s network, or prevent vital data from making it to its destination. Financial institutions can jam communications to provide even a millisecond’s advantage in completing a transaction that can be leveraged for gain. Military jamming can make drones crash, interfere with tactical communications, and even jam or change GPS signals to confuse the enemy.\nThis article looks at jamming techniques and technologies as well as anti-jamming measures and devices that allow wireless communications to continue even while under targeted attack. All parts, tutorials, reference designs, and development kits mentioned can be found online at Digi-Key’s website.\nHooray for Hollywood\nThe first use of electronic counter-measure jamming traces back to WWII. Radar-controlled artillery were taking down a lot of Allied planes. These systems employed radar signals to lock and track aerial targets and direct anti-aircraft fire. When a critical allied operation was to take place, RF jammers were placed by resistance operatives in close proximity to these weapons. Newsreel film footage shows howitzers spinning wildly and firing randomly because of the jammers. The designers of the cannons were too arrogant to take the possibility of jamming into account so they never incorporated a “manual-override” switch.\nEliminating jamming is not a new problem. Actress Hedy Lamar and composer George Antheil developed spread-spectrum frequency-hopping technology during WWII specifically to stop torpedoes from being jammed via broadcasting of radio frequencies that interfered with their operation and would cause the torpedoes to go off course.\nThey used a piano-roll principle from a player piano to “unpredictably” change the base frequency between the base station and the torpedo. When started together in sync, the control center’s short burst of seemingly random control frequencies made it virtually impossible to jam. It is interesting to note (no pun intended) that initially 88 frequencies were used corresponding to the white and black keys of a piano.\nApproaches to jamming\nThere are several ways jammers can interfere with normal operations of a system. If remote access to the control center can be achieved, steering a dish, for example, to a null point can effectively silence a link. This problem is becoming increasingly important as more of our critical infrastructure is placed online and transmitted to the cloud, providing vulnerability for those who seek to cut power, redirect a link, or even shut it down.\nLocal jamming is a more direct approach, since targets may be in motion. Here, higher power levels than the initial signals when delivered at specific bands can overwhelm a receiver and block communications. Spark gaps emit noise, presenting energy in every band and at every frequency. However, noise in a narrower band of frequencies can also wreak havoc. As an example, mischievous people have designed, built, demonstrated, and even made available simple jammers to ruin everyone else’s day. For example, kits, and plans for pocket-sized RF jammers and noise generators (Figure1) found online can generate noise in the 0 to 128 MHz range specifically to interfere with radio-controlled objects such as planes, boats, cars, and robots1. These kits are marketed as educational products because intentional jamming of RF signals is illegal2.\nFigure 1: Public domain and “educational” kits and devices are readily available to jam and interfere with common bands and services. It is becoming increasingly important to incorporate anti-jamming technology inside single-chip radios.\nIn addition to power- and frequency-based jamming, smart jammers are also a problem. Here, techniques are designed to mess with wireless protocol operations instead of overwhelming the receiver with noise. For example, with Ethernet and IP protocols centered around 802.11, you can disobey inter-frame spacing rules and spoof RTS/CTS messages to make the channel look continuously busy. If you can gain access to a layer-3 router wirelessly, you can even redirect traffic, intercept it, corrupt it, and then send it on its way.\nThis is becoming an increasingly more effective technique. It can be stealthy since it uses less energy and is less obvious to the victim. With forward-looking military and defense systems increasingly counting on RF links, encryption, and frequency-hopping alone may not be good enough.\nEven if data is not extracted or changed, a jamming signal hitting interference bands could cause the transmitter to stay on a lot longer than it normally would. The accumulating effect would be to drain batteries much faster than anticipated so as to bring down a remote or buried link.\nFor these reasons the Defense Advanced Research Projects Agency (DARPA) is looking for innovative jam-resistant solutions and is soliciting requests under its Hyper-wideband Enabled RF Messaging (HERMES) program3. The entire federal government, including law enforcement, military, communications, and control has rights to only 1.4 percent of the total spectrum. This can make military spectrum management difficult, especially with an increasing threat of signal fratricide or interference. This dovetails into the 2010 Presidential order to make another 500 MHz of spectrum available for commercial use by the year 2020, and to use the spectrum more efficiently and make it more interference resistant.\nAmong the security tools designers have in their bag of tricks are wider bands, narrower bandwidths, and dynamic reconfiguration. Other proprietary techniques will also be employed because, as you might imagine, this technology is like Colonel Sanders’ recipe: very closely guarded.\nThe DARPA proposals are looking for greater than 10 GHz of instantaneous bandwidth while operating below 20 GHz. Hardware and DSP techniques will be needed to employ coding gain and the use of spectral filtering to dynamically shift a signal as well as compensate for atmospheric absorption. The overall goal is to achieve more than 70 dB of jammer suppression. Parts like the Analog Devices ADSP-BF609BBCZ-5 Blackfin Dual-Core processor may be a good choice since each 500 MHz core contains MACs, ALUs, and barrel shifters for implementing proprietary DSP-based encryption and hopping algorithms.\nTexas Instruments also has a mixed, dual-core solution, the TMS320C6727BZDH350 that combines a DSP and ARM for generating re-seeded encryption keys on the fly using complex algebraic and differential hopping algorithms.\nAnother technique is to use a great many narrow-band signals with short data bursts that do not let a jammer detect or countermand the transmission. For example, a 1 Kbit/sec transmission centered between 2,414,012 MHz and 2,414,013 MHz would easily allow a jammer to find and overpower that transmission by centering its power at that frequency. But if your design uses 100-bit bursts of data each at one of 5,000 different 2 KHz-wide frequency bands within the 2,410 Mhz to 2,420 MHz range, a jammer would need to use 500 times more power and would only be 10 percent effective at annoying the receiver with a few hits here and there. Encoded forward-error correction can reduce or eliminate the need for re-transmission as well.\nThe more bands and the faster the hop rates (and even variable hop rates), can make it increasingly more difficult to jam once the transmitter and receiver are in sync.\nEncryption will also play a role here. Anything that can be done to slow down a smart jammer or prevent data interception is a good thing. Again, hardware-based real-time encryption and decryption techniques perform better than software encryption alone.\nDevelopment kits like the Digi-International XEB-AW140-DK for the Xpress crypto module could be a good place to start (Figure 2). It not only allows fast development of NIST certifications, it can be a PCI slave peripheral to an embedded micro for rapid testing of wired or wireless links. Performance is tunable for low latency or throughput and two separate password-protected user modes—Crypto Officer and User—ensure that secure day-to-day operations can be tested.\nFigure 2: Dedicated encryption modules and development systems can help designers develop proprietary encryption or hopping algorithms to make it harder to find and jam wireless communications.\nReal-world applications may dictate the use of ASIC- or FPGA-based keys and algorithms for secure and proprietary hopping and spectral use. In this article we have looked at jamming techniques and technologies as well as anti-jamming approaches that allow communications to continue even while under targeted attack. However, no matter which anti-jamming techniques are utilized, designers in this field know at the outset that this is a cat-and-mouse game and the mice sometimes win.\nFor more information on the parts mentioned in this article, use the links provided to access product information pages on the Digi-Key website.\n- Instructables: “How to Build an RF Jammer”\n- FCC Hearing and Ruling\n- Defense Systems article “DARPA wants more efficient, jam-resistant RF communications”", "label": "Yes"} {"text": "Sprint-Nextel (NYSE:S) may open a center in the San Francisco area to foster the development of the machine-to-machine ecosystem. Danny Bowman, president of Sprint's integrated solutions group, told the Wall Street Journal that the company wants to tap local tech talent and believes that as a wholesale provider of Clearwire's (NASDAQ:CLWR) mobile WiMAX network, it has an edge in attracting M2M customers.\nSprint was an early leader in embedded devices--it provided the wireless connectivity for the first generation Amazon Kindle ereader. Amazon later switched the Kindle to AT&T Mobility's (NYSE:T) network so it could offer international roaming to Kindle buyers.\nBut Sprint lost some of its early lead, primarily because of big pushes in this area by competitors such as AT&T and Verizon Wireless (NYSE:VZ). AT&T recently reported that it had 5.8 million connected devices on its network and added 1.1 million in the first quarter. Verizon said that it has 7.3 million connected devices on its network.\nSprint hasn't disclosed specific connected device numbers, but Bowman estimated that the company has \"a couple million\" devices on its network. A few of those customers include the Alzheimer's Association, which along with partner Omnilink, uses remote monitoring to keep track of Alzheimer's patients and give them more independence. Sprint also works with Amtrak to use digital signage to provide passengers with breaking news and weather updates.\nIn a separate interview with Reuters, Bowman said that Sprint is also looking to embed wireless in consumer-facing devices, including tablets, gaming devices, ereaders and picture frames. The carrier will have a \"handful of devices\" for the holiday shopping season.\n\"Sprint will have a great portfolio in the second half the year,\" he said.\nM2M: A blast from the past gets renewed attention\nThe M2M Opportunity --- a FierceWireless ebook\nEricsson CEO looks to capitalize on M2M", "label": "Yes"} {"text": "Quality control of propolis is challenging, as it is a complex natural mixture of compounds, and thus, very difficult to analyze and standardize. Shown on the example of 30 French propolis samples, a strategy for an improved quality control was demonstrated in which high-performance thin-layer chromatography (HPTLC) fingerprints were evaluated in combination with selected mass signals obtained by desorption-based scanning mass spectrometry (MS). The French propolis sample extracts were separated by a newly developed reversed phase (RP)-HPTLC method. The fingerprints obtained by two different detection modes, i.e. after (1) derivatization and fluorescence detection (FLD) at UV 366nm and (2) scanning direct analysis in real time (DART)-MS, were analyzed by multivariate data analysis. Thus, RP-HPTLC-FLD and RP-HPTLC-DART-MS fingerprints were explored and the best classification was obtained using both methods in combination with pattern recognition techniques, such as principal component analysis. All investigated French propolis samples were divided in two types and characteristic patterns were observed. Phenolic compounds such as caffeic acid, p-coumaric acid, chrysin, pinobanksin, pinobanksin-3-acetate, galangin, kaempferol, tectochrysin and pinocembrin were identified as characteristic marker compounds of French propolis samples. This study expanded the research on the European poplar type of propolis and confirmed the presence of two botanically different types of propolis, known as the blue and orange types.\nKeywords: DART-MS; Flavonoids; HPTLC; Multivariate data analysis; Phenolic acids; Propolis.\nCopyright © 2016 Elsevier B.V. All rights reserved.", "label": "Yes"} {"text": "The ZEISS Xradia Versa family and ZEISS Xradia Ultra lab platforms offer a multi-lengthscale solution. State of the art X-ray computed tomography (CT) scanning technology combined with highly specialized, proprietary X-ray optics deliver the highest performance lab-based 3D X-ray microscopes, providing a range of imaging modes from ~30 micron resolution all the way down to 50nm spatial resolution.\nThe Xradia Versa uses patented X-ray detectors and a microscope turret of magnifying objective detectors for easy zooming. Scan mode from 30 micron resolution all the way down to 700 nm spatial resolution. The Xradia Ultra nanoscale X-ray microscope is the only commercially available X-ray microscope that utilizes synchrotron quality X-ray optics and provides true spatial resolution down to <50nm.\nThe flagship product of the award-winning Xradia Versa family provides the most advanced and highest performing non-destructive, 3D imaging and analysis capabilities. Xradia 520 Versa extends the boundaries of non-destructive 3D imaging with advanced contrast tuning capabilities, extensive filtering options, and enhancements delivering greater accuracy and workflow.\nBased on the award-winning design of its predecessor, Xradia 510 Versa is the foundation of the Xradia Versa family for those who need the highest 3D imaging capability without the advanced features and performance of the flagship product.\nXradia 410 Versa bridges the gap between high-performing 3D X-ray microscopy solutions and traditionally lower-cost, less capable projection-based computed tomography (CT) systems. Multiple source options provide flexibility for imaging a wide range of sample sizes and types.\nThe revolutionary Xradia 800 Ultra combines a high-flux laboratory X-ray source with highly specialized and proprietary X-ray optics to create a standalone ultra-high resolution X-ray microscope for CT scanning, bridging the gap between existing high resolution imaging modalities such as SEM, TEM or AFM, and optical microscopy or traditional micro-CT.\nXradia 810 Ultra increases the throughput of nanoscale, three-dimensional X-ray imaging by up to a factor of 10. This innovative X-ray microscope (XRM) operates at 5.4 keV, a lower energy that delivers better contrast and image quality for medium to low Z samples and other materials used throughout science and industry.", "label": "Yes"} {"text": "Guidelines for Organizing Server Rack\nWhen mounting all of the equipment (such as servers, storage, switches, and routers) into the server rack, cable management tends to have been overlooked in many times. Without a good rack cable management solution, all of the network cables in the rack look like spaghetti. In this case, cable management becomes a tremendous challenge for IT technicians and network installers in most data centers. How to organize a server rack? In fact, some simple plans and a right arsenal of tools are prepared before installing the server rack, such messy situations will be avoided.\nThe reason is simple enough: poorly routed cables can lead to an assortment of problems over time. First, everything unorganized and jumbled just creates a high risk for cables to be tangled up, and a possibility of making a mistake when reconnecting cables. Second, rack cable management is directly related to hardware safety. All equipment running on the rack is going to generate heat, so organizing a rack with a conception involving space will help promote the airflow and hardware management. Last but not least, cable labels should not be neglected, which help save lots of time on troubleshooting. For more information about cable labeling, please refer to Proper Cable Labeling Guidelines. Just imagine how difficult it would be trying to trace a cable through that mess? Therefore, a large emphasis should be placed on organization and cleanliness when creating the server rack setup. The following video gives a quick look at the structured cabling solutions of fiber or copper system in a single rack.\nThe vast majority of IT applications use 19-inch wide racks. The depth of the rack is usually adjustable to some degree. The height of the rack is divided into standardized segments called rack units (“U”), and each rack unit (1U) is 1.75 inches high. For example, a 42U rack contains 42 rack units. It does mean that the rack will accommodate any combination of standard rack equipment up to 42U. Therefore, the first step is to choose a suitable server rack for your data center. Learn more about choosing a suitable server rack, please refer to Different Types of Server Rack Used in Data Center.\nPlan the layout of your server rack before mounting all of the equipment is of critical importance in today’s high-density rack environments. You need to determine what components to be housed in the rack and map out the blueprint that corresponds to where you are planning to mount each component on the rack. This step can prevent the frustration of having to move equipment after it has been mounted.\nThe location of equipment in the rack is vital to maximize the space inside the rack and to permit easy service. You should develop a detailed plan for equipment placement before you install it, including plans for future expansion. Generally, the heaviest equipment is placed in the bottom of the rack, such as UPS systems and external battery packs, larger servers.\nThe patch panel is always used for rack cabling distribution, which potentially allows for the use of larger switches and higher utilization of ports. An alternative approach is to install network switches in the rack and use the switch layer itself as the patching system, but the patching function is limited. In terms of cabling, the patch panel is nothing but essential cable management tool to wire cables together. The 24-port patch panel is the most common options used on the rack. It is a perfect combination between the patch panel and cable management bar to reduce cable tension in the rack. For high-density cabling system, other cable management tools, including horizontal and vertical cable manager, cable tie, cable label, are also considered.\nAs the density of equipment in the rack increases, cooling becomes an important factor. The heat concentrations can lead to increased power consumption and higher rates of equipment failure. Besides, unmanaged cabling could block airflow and prevent efficient cold air distribution. In this sense, using horizontal and vertical cable managers to organize patch cables and power cords is also very helpful for cooling efficiency.\nPatch panels provide space-saving, high-density cable connections. Using patch panels as part of a structured cabling system lowers maintenance costs and reduces installation and configuration errors. Fiber patch panel and copper patch panel are used in patching fiber and copper cables respectively.\nHorizontal cable managers allow neat and proper routing of the patch cables from equipment in racks and protect cables from damage. If you are using flat-faced patch panels or network switches that cable from above or below, horizontal cable manager will complete the support pathway for patch cords between the cabling section and the exact connection port on the patch panel or switch. Alternately, horizontal cable management can be used to create rack-to-rack pathways for patch cords.\nVertical cable manager utilizes the additional space to manage the slack from patch cords, and make sure that they can easily route the largest cable diameter in your plan. For static environments, you can consider installing another vertical cable manager behind the racks, which does not block access to components in the space between the racks.\nFiber enclosure enables managers to be more efficient with rack space, which offers the superior density, port access, and cable management in a solid and sleek enclosure. It can be mounted with fiber adapter panels and fiber cassettes, in result that the modular system meets the demand to quickly moves, adds and changes while simultaneously providing the possibility for future upgrades. Rack mount fiber enclosure is the commonly used type in the data center as it provides a convenient and rugged termination point for fiber jumper cables. For more information, please refer to FS 1U Rack Enclosure Types and Selection Guide.\nCable tie and cable label are also important accessories for rack cable management, but many people seem to ignore this job. The cable ties with different color code and cable labels can help you quickly manage the cabling and achieve easy troubleshooting. In rack application, Velcro ties are more popular than zip tie, because they can reduce the cable damage and have the ability to be reused over and over again.\n1. Should every device (e.g. servers, switches, routers) face one direction on the rack? Or should I share the same U on both sides?\nYes. You should have everything facing the same way, which can allow your equipment to cool more effectively as they do not block the hot exhaust of other devices.\n2. Is it best practice to have everything that comes into the server room go into a patch panel, and then have short patch cables from the patch panel to switches?\nYes. It generally is the best practice. Anything coming from outside the server room should be patched before going to the switch. It makes it easier to troubleshoot and maintain as you grow your infrastructure.\n3. For small devices (e.g. cable modem and router) came from ISP (backup broadband), what’s the best way to keep that organized in a rack? Should I use a shelf?\nA shelf would make it easier and look nicer.\n4. Should I leave space between devices in the rack for cooling? Or is it ok to place devices contiguously? I wasn't sure if that would cause servers to overheat.\nMost rack devices are designed to intake at the front and exhaust out the back, so you do not worry about that the contiguous placement would cause overheating. It would be fine to put them butted up next to each other.", "label": "Yes"} {"text": "Light source selection\nThe light source is an important factor affecting the input of the machine vision system, which directly affects the quality of the input data and at least 30% of the application effect. Since there is no general machine vision lighting equipment, for each specific application example, the corresponding lighting device should be selected to achieve the best effect. Balluff provides a variety of high-quality light sources.\nThe light is directed at the object to get a clear image. This type of light is very effective when it is necessary to obtain high-contrast object images. But when it is used to shine on bright or reflective materials, it will cause mirror-like reflections. General lighting generally uses ring or spot lighting. Ring light is a commonly used general lighting method, which is easy to install on the lens and can provide sufficient illumination for diffuse reflection surfaces.\nThe formation of coaxial light is the divergence of light from the vertical wall, and it hits a beamsplitter that makes the light downward. The camera looks at the object through the beamsplitter from above. This type of light source is particularly helpful for detecting highly reflective objects, and it is also suitable for detecting objects with inconspicuous areas that are affected by shadows produced by the surrounding environment.\nDarkfield illumination is to provide low-angle illumination relative to the surface of the object. Use the camera to shoot the mirror so that it is in its field of view. If the light source can be seen in the field of view, it is considered to illuminate the bright field. On the contrary, if the light source is not visible in the field of view, it is dark field illumination. Therefore, whether the light source is bright field illumination or dark field illumination is related to the position of the light source. Typically, dark field lighting is used to illuminate the raised part of the surface or to illuminate the surface texture change.\nContinuous diffuse lighting is applied to the reflectivity of the surface of the object or the surface has a complex angle. Continuous diffuse illumination uses hemispherical uniform illumination to reduce shadows and specular reflections. This lighting method is very useful for fully assembled circuit board lighting. This kind of light source can reach 170 solid angle range of uniform illumination.\nLight that shoots from the back of the object with a uniform field of view. The side profile of the object surface can be seen through the camera. Backlight is often used to measure the size and orientation of objects. The backlight produces a strong contrast. When using backlight technology, the surface features of the object may be lost. For example, the backlight technology can be used to measure the diameter of a coin, but the front and back of the coin cannot be judged.", "label": "Yes"} {"text": "Robust non-fragile filtering for networked systems with distributed variable delays\nDate of Issue2014\nSchool of Electrical and Electronic Engineering\nThis paper is concerned with the robust non-fragile filtering for a class of networked systems with distributed variable delays. We model such a complex delay system with an augmented switched system. For the filtering implementation uncertainty, a stochastic variable is employed to indicate random occurrence of the filter gain change, and a norm bound to measure the change size. The suitably weighted measurements are proposed for filter performance improvement, instead of direct use of the measurements themselves which may have significant delays and degrade the performance. With some improved stability and l2 gain analysis for the switched systems, a new sufficient condition is obtained such that the filtering error system is exponentially stable in the mean square sense and achieves a prescribed H∞ performance level. A numerical example is given to show the effectiveness of the proposed design.\nDRNTU::Engineering::Computer science and engineering::Information systems\nJournal of the Franklin Institute\n© 2014 Elsevier. This is the author created version of a work that has been peer reviewed and accepted for publication by Journal of the Franklin Institute, Elsevier. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://dx.doi.org/10.1016/j.jfranklin.2014.03.009].", "label": "Yes"} {"text": "Now showing items 1-3 of 3\nRaman spectroscopic study of Na1/2Bi1/2TiO3-x%BaTiO3 single crystals as a function of temperature and composition\n(American Institute of Physics, 2011-06-01)\nA Raman spectroscopic study of Na1/2Bi1/2TiO3-x%BaTiO3 (NBT-x%BT) single crystals with x=0 and 5.6 has been performed as a function of temperature from 25 to 600 degrees C. The general features of the Raman spectra for the ...\nEffect of Mn substituents on the domain and local structures of Na1/2Bi1/2TiO3-BaTiO3 single crystals near a morphotropic phase boundary\n(AIP Publishing, 2011-03-01)\nThe ferroelectric domain and local structures of Na1/2Bi1/2TiO3-x% BaTiO3 (NBT-BT) and 0.14 at. % Mn substituted Na1/2Bi1/2TiO3-x% BaTiO3 (Mn:NBT-BT) single crystals with x=5.5 near a morphotropic phase boundary have been ...\nElectric-field-dependent phase volume fractions and enhanced piezoelectricity near the polymorphic phase boundary of (K0.5Na0.5)(1-x)LixNbO3 textured ceramics\n(American Physical Society, 2011-06-01)\nThe structure, ferroelectric and piezoelectric properties of < 001 > textured (K0.5Na0.5)(0.98)Li0.02NbO3 ceramics were investigated as a function of temperature and dc bias E. X-ray diffraction revealed an orthorhombic ...", "label": "Yes"} {"text": "VMware announced their new mobility platform at VMworld 2012 US, called Horizon Suite. They showed a demo on Horizon Mobile for iOS during the keynote. The video can now be found on YouTube.\nThe demo shows how it can securely deliver workers the set of applications and data they need regardless of the devices they use including iPads and iPhones. Also in this demo you will see that copy/paste isn’t allowed and will be blocked by the application. Horizon enables access to and sharing of data and files.\nCurrently the suite is in alpha release but they expect a beta release by the end of the year. I honestly can’t wait for it. It just looks amazing!", "label": "Yes"} {"text": "About This Project\nCOVID-19 is having widespread impacts on humans and nature. The “Our Ocean in COVID-19” project aims to track these changes in the ocean in real-time through the pandemic and into a new normal. Using the free eOceans mobile app, participants track their ocean usage and log observations of human and animal activity. To improve participant retention, ocean literacy, and data quality we plan to build the world's first global, dynamic, in-app digital field guide for the ocean.", "label": "Yes"} {"text": "Portable Analog Laboratory\nThe DB-711 Analog Laboratory is designed for the use of analog cicuit experiments. It features 4sets of DC power supplies with dierent voltage output and a large solderless Bread board. Which is convenient for the users to do several kinds of circuit experiment Optional jumper wire set and cutter/stripper is avaible for user's convenience.\nOutput Power Supply\nRegulated D.C. Supplies\nAC Power Supplies 3 volt, 6 volt, 9 volt, 12 volt\nVariable D.C. Supplies 18 V @ 1000 mA with short circuit indicators\nSolderless Breadboard 1040 Tie points breadboard, 1mA ammeter, 5K & 100K\nPotentiometer, 8ohm1w speaker, 5pin relay, 4set 1A diode\n2 way toggle & 2 way puls switchs and power indicators.\nInput Power Supply\n110 V AC, 50 Hz\nAC Power Cable\nUser's Instruction Manual\nDimension / Weight\n3.5 KGS (Approx.)", "label": "Yes"} {"text": "Model-based test (MBT) generation techniques for automated GUI testing are of great value for app testing. Existing GUI model-based testing tools may fall into cyclic operations and run out of resources, when applied to apps with industrial complexity and scalability. In this work, we present a multi-agent GUI MBT system named Fastbot. Fastbot performs model construction on the server end. It applies multi-agent collaboration mechanism to speed up the model construction procedure. The proposed approach was applied on more than 20 applications from Bytedance with more than 1500 million monthly active users. Higher code coverage in less testing time is achieved with comparison of three other automated testing tools including Droidbot, Humanoid and Android Monkey.", "label": "Yes"} {"text": "http://www.filmtools.com/surefire-6p-flashlight-bulb-65.html17521SureFire P60 Flashlight Lamp/Bulb Assembly w/Reflectorhttp://cdn.filmtools.com/media/catalog/product/p/6/p60_xlarge_204.png17.10USDInStock/Grip & Electrical/Hardware/Tools/Flashlights/Lighting/Lighting Equipment/Flashlights The P60 incandescent lamp assembly produces 65 lumens of white light with approximately 1 hour of runtime.\nNOTE: SureFire lights that use P60 or P61 lamps can be upgraded to a 120-lumen LED light with twice the tactical runtime (compared to the P60 lamp) or six times the tactical runtime (compared to a P61 lamp) by installing a KX4 or KX4D LED conversion head. 17.10Surefireadd-to-cart", "label": "Yes"} {"text": "|Publication number||US4845485 A|\n|Application number||US 07/139,239|\n|Publication date||Jul 4, 1989|\n|Filing date||Dec 29, 1987|\n|Priority date||Dec 29, 1987|\n|Also published as||WO1989006408A1|\n|Publication number||07139239, 139239, US 4845485 A, US 4845485A, US-A-4845485, US4845485 A, US4845485A|\n|Inventors||Gary L. Pace|\n|Original Assignee||Motorola, Inc.|\n|Export Citation||BiBTeX, EndNote, RefMan|\n|Patent Citations (8), Referenced by (19), Classifications (11), Legal Events (4)|\n|External Links: USPTO, USPTO Assignment, Espacenet|\nThe present invention relates generally to radio pagers and, more particularly, to a combined pager/ timepiece applicance that may be worn on the wrist of the user wherein the pager portion thereof is protected from desensitization that may otherwise occur when the associated stepping motor controlling the timepiece is in operation.\nIn the evolution of radio pagers, miniaturization has become the watchword. The state of the art is now at the point where the pager device may be worn on the wrist of the user. this in turn affords the opportunity to combine such paging device with a timepiece to provide a very useful and highly desirable personalized appliance.\nOne potential, and perhaps, obvious arrangement of the foregoing type is a pager combined with an analog watch with hour, minute and second hands suitably controlled by a pulsed stepping motor. The stepping motor is conventionally controlled by voltage pulses at regular intervals to increment the second and in turn the minute and hour hands and thereby causing the correct time to be displayed. The voltage pulses may be generated from an internal reference oscillator that also serves a function in the data processing operation of the pager portion of the device or, alternatively, separate oscillators may be provided. It will be appreciated that these reference voltage pulses applied to the associated stepping motor may well result in a degradation in performance regarding the radio pager operation under certain operating conditions. These deleterious effects are usually in the form of RF radiation generated by the stepping motor which results in a desensitization of the paging receiver itself. How severe is dependent upon many factors, but it is fair to note that any desensitization necessarily says that the paging receiver is simply not performing to its designed capability, and therefore undesirable.\nAdditionally, the varying current drain of the battery may well cause still additional degradation in the paging receiver performance. That is, the variable increase in battery current during stepping motor operation may well reduce the voltage level at the battery terminals which in turn results in less than optimum operating levels for the paging receiver circuitry again, adding to receiver sensitivity degradation.\nAccordingly, it is an object of the present invention to provide a combined radio pager/timepiece personalized device in which the foregoing deficiencies have been overcome.\nA more particular object of the present invention is to provide a combined pager/timepiece device of the foregoing type wherein the stepping motor operation is effectively inhibited during select times when the paging receiver is operative and is caused to catch up at subsequent time intervals.\nIn practicing the invention, a combined radio paging receiver/analog timepiece device is provided which includes hour, minute, and second hands controlled by a stepping motor. Normally the stepping motor is activated by a voltage pulse applied at regular intervals, such as every one second. However, when the data processor of the pager/watch device is sampling the air waves for its address and/or associated paging message, means are provided to inhibit any applied voltage pulses to the stepping motor during those times. At the same time, a seconds register is incremented and later utilized to cause the data processor to generate and apply the appropriate delayed voltage pulses to the stepping motor in a sequential but accelerated fashion so as to bring the timepiece to current time status.\nThe features of the present invention which are believed to be novel are set forth with particularity in the appended claims. The invention itself, however, together with further objects and advantages thereof, may be best understood by reference to the accompanying drawings, in which:\nFIG. 1 is a block diagram of a combined radio paper/analog watch timepiece in which the present invention may be advantageously utilized;\nFIG. 2 is a graphical representation of the timing diagram for signals generated by the data processor of the pager/watch device; and\nFIGS. 3a and 3b are flowcharts which describe the operation of the referenced data processor.\nReferring now to the drawings a block diagram of the combined radio pager/analog timepiece device 10 is shown which has been constructed in accordance with the present invention. The device 10 itself includes a separate paging receiver section, indicated at 12, as well as an analog watch portion 14. A common oscillator 18 is provided in combination with a data processor 16. The analog watch portion also includes an associated stepping motor 20. An external antenna 22 is further included to respond to communication signals which may include the pagers' unique address as well as any associated messages intended therefor which may be transmitted from time to time. Communication signals may be in the form of binary digits (bits) modulated on a carrier frequency of a given value.\nAs well understood by those skilled in the art, the receiver 12 of the combined pager/watch device 10 responds to the signals transmitted and received by antenna 22. Receiver 12 detects, removes and passes the binary information (digits) to the data processor 16 on line 24, as illustrated. Data processor 16, again in the well known manner, processes the detected binary information to determine if the pagers address is present, and, if so, to further process any associated message intended therefor. The timing (clock) signals to permit such data processing is provided by oscillator 18.\nThis oscillator 18 also serves to provide the timing signals for the data processor 16 in generating and applying the necessary periodic voltage pulses to the steppng motor 20 so as to intermittently move the watch second hand at regular (i.e., one second) intervals. In this manner, the analog watch section accurately and continuously displays current time.\nAs indicated, data processor 16 may also provide a \"battery saver\" strobe signal to the receiver on a periodic basis whereby the receiver, normally powereddown, comes up to full operating level and monitors the airwaves and determine if there is a signal being transmitted which is of interest to the pager portion of the device 10. At all other times, the receiver is in a deactivation state. This battery saver function is, of course, entirely optional and may be omitted without material affect on the invention here disclosed. For purposes of completeness, however, it will be assumed that such feature is incorporated in the disclosed pager 10.\nTypically, a paging channel is \"sampled\" by the paging portion of the device 10 at about 0.5 seconds or longer interval, with the sampling duration typically being about 15 percent of the sampling interval. The sampling time and intervals are entirely arbitrary and may be varied as desired. The maximum sampling time required to receive the pager address and associated message in a transmitted page is typically less than one second. The operation of the battery saver strobe or sampling signal in monitoring the channel is well understood in the art and a detailed description is deemed unnecessary in the present disclosure. A complete operational description of a pager with battery saver operation of a type which may be advantageously utilized in the present invention is included in U.S. Pat. No. 4,181,893, issued to Edward L. Ehmke, and assigned to the same assignee as the present invention.\nIn addition, in the analog watch portion 14 of the device 10, the stepping motor 20 normally receives an applied voltage pulse from the data processor 16 at regular occurring intervals. Typically this would be one second if the watch has a second hand, or perhaps some different value, if no second hand is utilized. The applied voltage pulse causes the stepping motor 20 to increment one time unit whatever that unit is chosen to be, in this case, however, one second. In this manner, time keeping is kept current and the correct time displayed.\nAs previously mentioned, this applied voltage pulse to the stepping motor 20 may result in degradation in the paging receiver performance if so applied during those instances where the receiver 12 is active in receiving and detecting transmitted information. This reduction in performance can be the result of RF radiation generated by the stepping motor, which degrades receiver sensitivity. In addition, depending on the type of battery utilized, varying battery current drain may further result in lower operating voltage levels which may also contribute to a further reduction in receiver sensitivity.\nThis undesirable paging receiver desensitization is effectively avoided in the present invention by a programmed interrupt in the applied stepping motor pulse drive signals during active receiver operation. These inhibited pulses are later recovered and applied at a subsequent time during paging receiver deactivation. The subsequent applied voltage pulses are on a speeded up or accelerated basis until the associated timepiece is brought to current time status. For most watch users, it is completely unnoticeable that the operation of the stepping motor is occasionally increased or decreased, or that the timepiece itself is temporarily in error regarding time display in terms of one or more seconds.\nThe present invention takes advantage of this characteristic and inhibits the occurrence of an applied stepping motor voltage pulse during the times a paging receiver is sampling transmitted information on a paging channel or during which the receiver is processing an intended message. This is effectively illustrated in graphic form in FIG. 2. Line A depicts various of the battery strobe sampling signals S1, S2 and S3 as well as an interval during which an associated pager message is being processed, such as that shown at M1. Line B depicts the voltage pulse V1, V2, V3 and v4 for stepping motor 20 generated by the data processor 16 at regular intervals. These voltage pulses are of a time duration T1 which conventionally are shorter than that of sampling pulses S1 -S3. As is customary in the watch art, pulses of alternating polarities are utilized. That is, pulses V1 and V3 are shown as positive going while V2 and V4 are shown as negative going.\nNormally, the sampling signals or battery strobes S1 -V4. These voltage pulses are shown as occurring at a one second rate. Whenever a voltage pulse V is to occur during a time when the paging receiver 12 is sampling during an S interval, or additionally during an interval M in which an actual paging message is being processed, that voltage pulse is inhibited, or more correctly, delayed for application at a later time. This is depicted in regard to voltage pulses V2 and V3. The former would otherwise occur during the S2 sample interval and the latter during the M1 message processing interval. In each case, the voltage pulse is dealyed to a time in which the paging receiver 12 is in a deactivated mode. Pulse V2 is delayed to V2 ' and pulse V3 is delayed to V3 '. Accordingly, it is to be noted that the interval between pulses V1 and V2 ' is greater than one second and that between V3 ' and V4 is less than one second.\nThe inhibition, delay and subsequent application of certain of the stepping motor voltage pulse drive signals is effected by the data processor 16 includes a microprocessor which has been programmed to effect various routines regarding both paging operation and time keeping functions. Two of such routines, or more correctly, subroutines, are set forth in FIGS. 3a and 3b.\nFIG. 3a represents the normal interrupt subroutine for time keeping purposes. The seconds register as therein shown is initialized to zero following initial power-up of the data processor 16. The data processor contains a timer which generates an interrupt to the main control program once every second. The interrupt service routine is used to increment the seconds register 41 once each second. As indicated, a one second interrupt is received at step 40, which in turn causes the seconds register (not shown) in the data processor 16 to increment one time unit, after which a return from interrupt is effect at step 42. This routine occurs on a regular basis, i.e., every one second without interruption.\nThe subroutine for generating and applying the stepping motor drive signal is set forth with particularity in FIG. 3b. This subroutine of necessity occurs at a higher rate than the one second interrupt routine shown in FIG. 3a . This is because the delayed voltage drive signals must be subsequently applied on an accelerated basis to bring the timepiece up to current time status. This subroutine may be programmed to run several times, perhaps as high as ten times, a second.\nIn each instance of running the stepping motor drive subroutine 50, the seconds register is first checked at step 51 to see if the register has been incremented (see step 41 in FIG. 3a) or whether it contains a zero value. If the latter, the return from subroutine at step 56 is immediately initiated. This means that the timepiece is at current time. However, if the register contains a nonzero value, the data processor 16 is checked at step 52 to determine if it is in the data sampling mode. If yes, the return from subroutine is again initiated at step 56. If no, it is to be determined whether the data processor 16 will in fact sample data within the next time interval T1, the duration of an applied stepping motor voltage pulse V. If so determined in step 53, the return from subroutine is again initiated. If not so, the generation of a stepping motor voltage pulse occurs and is duly applied at step 54. If that occurs, the seconds register is decremented one time unit at step 55 before the return from subroutine is initiated at step 56. Since stepping motor drive subroutine 50 occurs at at sub-second or multiple times per second rate, the generation of additional voltage pulses will occur on an accelerated basis until the referenced seconds register is fully decremented to a zero value and the timepiece is at current time status.\n|Cited Patent||Filing date||Publication date||Applicant||Title|\n|US3540207 *||Sep 20, 1968||Nov 17, 1970||Timex Corp||Electronic watch counting circuit|\n|US3937004 *||May 24, 1974||Feb 10, 1976||Citizen Watch Co., Ltd.||Portable miniature type information treating device|\n|US4181893 *||Dec 30, 1976||Jan 1, 1980||Motorola, Inc.||Battery saver for a tone coded signalling system|\n|US4518961 *||Jan 30, 1984||May 21, 1985||Motorola, Inc.||Universal paging device with power conservation|\n|US4650344 *||Oct 25, 1985||Mar 17, 1987||Junghans Uhren Gmbh||Radio controlled timepiece|\n|US4663624 *||Mar 21, 1985||May 5, 1987||Asulab, S.A.||Pager having receiving frame tuned by transducer|\n|US4713808 *||Nov 27, 1985||Dec 15, 1987||A T & E Corporation||Watch pager system and communication protocol|\n|US4755816 *||Oct 29, 1986||Jul 5, 1988||Motorola Inc.||Battery saving method for a selective call radio paging receiver|\n|Citing Patent||Filing date||Publication date||Applicant||Title|\n|US5297118 *||Jun 23, 1993||Mar 22, 1994||Seiko Instruments Inc.||Electronic watch with pager|\n|US5301358 *||Aug 3, 1992||Apr 5, 1994||Seiko Corp.||Automatic antenna tuning method and apparatus|\n|US5479378 *||Dec 17, 1993||Dec 26, 1995||Seiko Telecommunication Systems Inc.||Analog wristwatch paging receiver|\n|US5528559 *||Jun 23, 1995||Jun 18, 1996||Motorola, Inc.||Multiple display timepiece|\n|US5572196 *||Jun 23, 1993||Nov 5, 1996||Sakumoto; Kazumi||Electronic analog watch with pager|\n|US5572488 *||Dec 17, 1993||Nov 5, 1996||Seiko Communications Holding N.V.||Wristwatch paging receiver having analog message display|\n|US5796338 *||Feb 3, 1997||Aug 18, 1998||Aris Mardirossian, Inc.||System for preventing loss of cellular phone or the like|\n|US5986566 *||Aug 18, 1994||Nov 16, 1999||Oi Denki Co., Ltd.||Wrist band antenna|\n|US6329903 *||May 12, 1995||Dec 11, 2001||Oi Denki Co., Ltd.||Wrist watch-style pager|\n|US7113450 *||May 20, 2003||Sep 26, 2006||Timex Group B.V.||Wearable electronic device with multiple display functionality|\n|US7215601||Sep 18, 2006||May 8, 2007||Timex Group B.V.||Wearable electronic device with multiple display functionality|\n|US7821878||Oct 31, 2007||Oct 26, 2010||Timex Group B.V.||Wearable electronic device with multiple display functionality|\n|US20040233788 *||May 20, 2003||Nov 25, 2004||Plancon Michel G.||Wearable electronic device with multiple display functionality|\n|US20070014193 *||Sep 18, 2006||Jan 18, 2007||Timex Group B.V.||Wearable electronic device with multiple display functionality|\n|US20080062818 *||Oct 31, 2007||Mar 13, 2008||Timex Group B.V.||Wearable electronic device with multiple display functionality|\n|WO1990008431A1 *||Jan 16, 1990||Jul 26, 1990||Motorola, Inc.||Multi-attachment portable radio|\n|WO1995016939A1 *||Dec 15, 1994||Jun 22, 1995||Seiko Telecommunication Systems Inc.||Wristwatch paging receiver having analog message display|\n|WO1997001134A1 *||Mar 29, 1996||Jan 9, 1997||Motorola Inc.||Multiple display timepiece|\n|WO1998034417A1 *||Feb 3, 1998||Aug 6, 1998||Aris Mardirossian, Inc.||System for preventing loss of cellular phone or the like|\n|U.S. Classification||340/7.38, 368/10, 455/344|\n|International Classification||G08B5/22, G08B3/10|\n|Cooperative Classification||G08B3/1016, G08B5/229, G08B5/228|\n|European Classification||G08B3/10B1, G08B5/22C1B8, G08B5/22C1B6|\n|Dec 29, 1987||AS||Assignment|\nOwner name: MOTOROLA, INC., SCHAUMBURG, ILLINOIS, A CORP. OF D\nFree format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:PACE, GARY L.;REEL/FRAME:004816/0092\nEffective date: 19871221\n|Jul 29, 1992||FPAY||Fee payment|\nYear of fee payment: 4\n|Oct 28, 1996||FPAY||Fee payment|\nYear of fee payment: 8\n|Dec 28, 2000||FPAY||Fee payment|\nYear of fee payment: 12", "label": "Yes"} {"text": "Posted August 22, 2018 03:15:15 The most common mistake people make when buying a console is not paying attention to what it is actually for.\nAs a gamer, I am usually quite adept at looking for the most appealing, versatile, and convenient option.\nThe problem, however, is that video game consoles are not just a set of inputs and outputs.\nThey are a collection of peripherals.\nThis article will explain how to choose the best video game console for the game you are playing.\nAs always, you will need to read this article to understand what the article means and what you can do to make your own video game system the best for you.\nLet’s begin with the basics.\nThe Basics The first thing you need to do is figure out which video game systems are compatible with your particular system.\nMost consoles are compatible, but there are some notable exceptions, and you will probably want to find out what those exceptions are.\nThe best way to determine whether a system is compatible is to read a manual or check with your local hardware store.\nThis is particularly important if you plan to play a lot of online multiplayer games, which are usually released on multiple consoles simultaneously.\nYou may also want to check with the manufacturers of the consoles themselves.\nA manual is a great source of information on the systems compatibility, but it is not necessarily accurate.\nA video game is a video game.\nThat means it is an interactive, computer-controlled game.\nA game console is a controller that controls the computer, and it can be used to interact with the computer in any manner you wish.\nVideo game systems usually come in two flavors, the console and the PC.\nBoth consoles and PCs are based on the Intel microprocessors, which have an integrated graphics processing unit (GPU).\nThe GPU, also known as the CPU, is a special part of the CPU that performs calculations and calculations.\nThe graphics processing units (GPUs) of video game controllers are based off of the graphics processors on the processor.\nThe most popular gaming systems include the PlayStation 4, Xbox One, and Nintendo Switch.\nThese consoles and the other games that use them have their own graphics cards, but most of the games use a combination of both.\nThe other important factor to remember is that you can play any video game with any video card you choose.\nAs you can see in the image above, a game is just a game if the graphics are controlled by a GPU.\nThe video card can be anything, from a laptop or a desktop PC to a big screen TV.\nYou can also connect a controller to your TV using HDMI, but that will only work if the video card supports that type of interface.\nThe PlayStation 4 is the only console that comes with an HDMI input port, but you can buy a controller for the PlayStation 3 and the Wii U if you want to play games using your TV’s HDMI output.\nA PlayStation 4 controller can be set up to act as a TV remote, and a PlayStation 4 can be connected to a TV using a USB cable.\nYou also can buy the PlayStation 5 controller for $130 and get a USB-to-HDMI adapter that will let you connect the controller to a television using the HDMI output from your TV.\nThe only other consoles that come with HDMI are the Xbox One and Nintendo 3DS, which both use a USB connector.\nThe Wii U is compatible with both the HDMI and the USB-A connectors.\nThe Xbox One is also compatible with HDMI and USB-B.\nYou will want to buy the Xbox Wireless Controller because it has HDMI and also USB-C, but if you don’t have one, you can purchase the Wii Remote Controller for $150.\nThe Nintendo Switch is also an HDMI-compatible console.\nThe Switch comes with both a USB port and an HDMI output, and is compatible to both USB-2.0 and USB 3.0.\nThe PS4 has both USB and HDMI ports.\nThis controller can also be used as a remote controller for games on the Nintendo Switch, but this controller will only allow you to play Wii games on it.\nThe game you play can be a game on the Switch and on your TV, but the remote control will not let you control the games directly on the TV.\nThis means that you must have a game that you want you can control using your game console.\nYou want to be able to control the TV as well as the game controller, so you will want a controller with a USB connection to your television.\nIf you buy a new TV, make sure that the console that you buy has the USB port, since it will not work with older consoles.\nIf your system doesn’t have an HDMI port, you need the right cable.\nIf a game console has an HDMI connection, you may need to buy a cable to connect it to your computer and monitor.\nThe USB port on the PS4 controller works with both HDMI and a USB hub, and can be hooked up to a USB", "label": "Yes"} {"text": "Smartron, an Indian based technology company, is all set to launch its first smartphone called t.phone in India today. Smartron had announced the launch of an ultrabook called t.book for Rs 39,999 in India in March this year. At the event the company also showcased the t.phone. Legendary cricketer Sachin Tendulkar had unveiled both the devices then in an event held in New Delhi.\nThe company has already issued an invite to launch its t.phone smartphone for Indian market scheduled for today. Smartron is already teasing about the launch event through its Twitter handle. The tweet reads “Don’t miss the star of the smart revolution. Save the date – May 19th with hashtag #tPhoneIsComing. The company has also announced that anyone can register for live stream for the product launch. And by registering, One lucky winner will receive a t.phone signed by Sachin Tendulkar.\nThe Smartron t.phone is claimed to be the lightest 5.5 inch smartphone by the company. As per reports, the Smartron t.phone is expected to come with a 5.5-inch full HD display, 4G/LTE connectivity and dual SIM support. It will be powered by Qualcomm Snapdragon 810 processor coupled with 3GB of RAM and 32 GB of internal storage. The phone is reportedly coming with a 12-megapixel rear camera and 4-megapixel front facing camera.\nTo recall, the Smartron t.book was launched earlier in grey+orange and full grey colours. It comes with a detachable keyboard, so you can also use it as a tablet by removing the keypad. It has a 12.2 inch display with 2560×1600 pixels resolution. This ultrabook has 4 GB of LPDDR3 RAM, 128 GB internal memory, 5 megapixel rear camera and a 2 megapixel front camera.\nThis ultrabook has 37 Whr battery that claims to offer 10 hours of web browsing. It has two full sized USB 3.0 port, one micro HDMI port, a micro SD card slot of 128 GB capacity, a 3.5 mm audio jack, and Type C charging port.", "label": "Yes"} {"text": "Many special components are often used in the layout of the PCB board printer. Once the layout is not handled well, it will directly affect the performance and quality of the PCB board printer. So what are the layout requirements of the special components of the PCB board printer?\n1. Layout requirements for crimping devices\n(1) There should be no components higher than 3mm in the range of 3mm around the curved/male, curved/female crimping device surface. And there should be no welding devices around 1.5mm; the distance from the opposite side of the crimping device to the pinhole center of the crimping device is 2.5mm. There shall be no components within this range.\n(2) There must be no components within 1mm around the straight/male and straight/female crimping devices.\n2. Layout requirements for thermal devices\n(1) Keep thermal devices (such as electrolytic capacitors, crystal oscillators, etc.) away from high-heat devices as much as possible.\n(2) The thermal device should be close to the component under test and away from the high-temperature area to avoid being affected by other heat-generating components.\n(3) Place the heat-generating and heat-resistant components near or on the top of the air outlet, and try to stagger the position with other heating components and heat-sensitive components in the air rising direction.\n3. Layout requirements with polar devices\n(1) THD devices with polarity or directionality have the same direction in the layout and are arranged neatly.\n(2) The direction of the polarized SMC is as consistent as possible on the board; the devices of the same type are arranged neatly and beautifully.\n4. Layout requirements for through-hole reflow soldering devices\n(1) For PCB board printer with non-transmission side dimensions greater than 300mm, try not to place heavy components in the middle of the PCB.\n(2) In order to facilitate the insertion, the device is arranged near the operation side of the insertion.\n(3) The length direction of the longer device is consistent with the transmission direction.\n(4) The distance between the pad edge of the through-hole reflow soldering device and other SMT devices>2mm.\n(5) The distance between the body of the through-hole reflow soldering device is >10mm.\n(6) The distance between the pad edge of the through-hole reflow soldering device and the transmitting side is ≥10mm; the distance from the non-transmitting side is ≥5mm.\nThe above is the layout requirements for the special components of the pcb board layout printer. We hope it will be helpful.", "label": "Yes"} {"text": "Data Analysis Software\nBrainSurfer is Applied Neurosciences Inc's 3-D visualization software. BrainSurfer allows Real-Time Visualization of 3-Dimensional Brain Networks, for research or Neurofeedback applications. It can be used to map network activations for a variety of cognitive states including anxiety, working memory, mood, attention, addiction, pain, pleasure, ... In addition, it allows Z-score analyses and works with Neuroguide. BrainSurfer interfaces directly with Wearable Sensing's DSI-24 and DSI-7 systems to allow real-time data acquisition and processing as well as Neurofeedback. BrainSurfer can also import files recorded with Wearable Sensing's systems for off-line analysis.\nEEGLAB is a MATLAB-based toolbox for offline EEG analysis. Wearable Sensing has developed a DSI-Streamer to EEGLAB extension (formerly termed \"plug-in\") that allows users to load Wearable Sensing's DSI-Streamer files into EEGLAB seamlessly\nWearable Sensing has developed a DSI-Streamer to MATLAB extension that allows users to load Wearable Sensing's DSI-Streamer files into MATLAB seamlessly.\nMensia Technologies is building innovative solutions for neurophysiological research and neurofeedback applications, including brain-computer interface (BCI) software packages, neurofeedback applications, offline data analysis and artifact removal, and add-ons for advanced signal processing, visualization, and source localization. Mensia's NeuroRT software is designed by the same pioneers in BCI technology who created OpenViBE \"NeuroRT Studio is a block diagram environment for the design of real-time experiments and analysis for neuroscience. It provides a graphical editor to drag and drop boxes from a library covering the essential steps of such analysis: data read and write (from/to a device and/or a file), temporal and spatial filtering, epoching, selection, mathematical operations, visualization, and many others. These processing steps can then be connected together with wires in order to create a signal processing pipeline.\" Wearable Sensing's DSI systems are compatible with Mensia's NeuroRT Studio.\nNeuroguide is Applied Neurosciences Inc's EEG analysis software. Its features and capabilities include: Real-time Dynamic Normative EEG Comparison, Automatic Artifact Rejection, EEG Coherence, Phase Delays, Amplitude Asymmetry & Power, joint-time-frequency-analyses (JTFA), FFT Normative Power Ratios and Peak Frequency and Color Maps from 1 to 50 Hz, Dynamic Time-Frequency Z Scores, Time Domain LORETA Z Scores, and much much more... It also has several add-ons for Pre- vs. Post-treatment analysis & group comparisons (NeuroStat), automatic processing of large numbers of EEG files (NeuroBatch), Mild Head Injury Discriminant Function and TBI EEG Severity Index, Learning Disability Discriminant Function, LORETA normative databases, Statistics, and 3-Dimensional Source Correlations, Coherence and Phase Differences Between 88 Bordmann Areas, Brain Performance Index, Bi-Spectral Analyses In addition, Neuroguide Add-ons allow the use of Z Score Surface EEG or LORETA Z Score EEG for Neurofeedback, with capabilities to Link Symptoms to Functional Networks in the Brain Neuroguide interfaces directly with Wearable Sensing's DSI-24 and DSI-7 systems to allow real-time data acquisition and processing as well as Neurofeedback. Neuroguide can also import files recorded with Wearable Sensing's systems for off-line analysis.", "label": "Yes"} {"text": "Data is the oil of the 21st century and programming and analytical skills are at the core in many professions. Focusing on the 2 areas of programming and data management this course teaches the basics of Python in the context of data science applications. From the installation, the essential objects and programming basics to simple analyses the participants will get all the prerequisites to write their first applications in Python. The course focuses also on the Pandas library which is considered a key tool to perform statistical data analysis in Python.\nYou can register for the event one month before the event starts from 9am.\nMicrosoft Office und weitere IT Anwendungen\n- Python (Anaconda distribution) in current version (the development environments 'Jupyter Notebooks' and 'Spyder' should be set up; Python should be entered in the environment variables - this can already be done during installation). Download at: https://www.anaconda.com/\n- PyCharm in current version (license free community version). Download at: https://www.jetbrains.com/pycharm/download/#section=windows", "label": "Yes"} {"text": "Review: Silent and faster than R9 290X\nThe PowerColor PCS+ R9 390 provides a great gaming performance at 1440p. It comes with 8GB of GDDR5 memory and quiet custom cooler with three fans and a backplate.\nToday we’ll take a closer look at the R9 390 card from PowerColor. The full name of the card is PowerColor PCS+ R9 390 8GB GDDR5, with the part number AAXR9 390 8GBD5-PPDHE. It uses nicely designed, but oversized 2.5 slots cooler and a custom PCB.\nActually, a huge cooler is a must have in this case because the R9 390 is closely related to the R9 290, which is based on Hawaii GPU, the second fastest single GPU in the previous generation of AMD graphics cards. The Hawaii GPU gets really hot, but it provides a good gaming experience at 1080p+ resolutions.\nThe recently introduced R7 300 and R9 300 series graphics cards are not based on new GPUs, instead AMD is using rebranded older GPUs. Only the flagship Fury card comes with an all new GPU. The new lineup is depicted in the image below and it consist of Radeon R7 300 graphics card which should hold the entry-level, the Radeon R9 380 for the mid-range market segment, the Radeon R9 390/R9 390X for the AMD's higher-end lineup, and the flagship Fury a.k.a. Fiji lineup.\nThe AMD Radeon R9 390 graphics card is based on the Grenada GPU, previously known as Hawaii GPU, used in R9 290 lineup. It uses AMD's Graphics Core Next 1.1 architecture and to differentiate it from the older GPU, Grenada comes with a slight overclock for the GPU. Compared to the 947MHz on the R9 290, the R9 390 works at 1000MHz for the GPU.\nThe Radeon R9 390 (called the Grenada Pro GPU) packs 2560 Stream Processors in 40 Compute Units, 160 Texture Units and 64 ROPs.\nThe faster Radeon R9 390X packs 2816 Stream Processors, 176 Texture Units and 64 ROPs, just like the Radeon R9 290X. The GPU on the R9 390X got bumped up to up to 1050MHz from 1000MHz on the R9 290X.\nThe rebranded Radeon R9 290 also got a higher memory clocks and more memory. There is now 8GB of GDDR5 memory clocked at 6GHz, compared to 4GB of GDDR5 memory clocked at 5GHz on the R9 290 series. The memory still uses a 512-bit memory interface, delivering memory bandwidth of up to 384 GB/s.\nThe TDP on both R9 390 and R9 390X graphics cards is set at 275W and they both need 6+8-pin PCI-Express power connectors.\nThe PowerColor PCS+ 390 8GB got a very small GPU overclock, which is only 10MHz over the reference clock. This comes as surprise since the PCS+ R9 290 was clocked at 1040MHz for the GPU. Probably the memory overclock of +150MHz (600MHz effective GDDR5) is to blame for lower GPU overclock. In some cases in combination with the memory overclock it is necessary to lover GPU overclock to get better overall performance or stability. The memory is left at reference clocks as confirmed by GPUZ, shown in the screenshot below. Don’t be confused here, it is AMD who raised memory clock on the R9 390 card, not PowerColor.\nThe PCS+ 390 8GB cooler was originally designed to meet the demands of the flagship R9 290X and afterwards it was used on the R9 290. With minor changes it is in action again, on the R9 390. We expect it to do a great job cooling the PCS+ R9 390.\nThe PCS+ R9 390 8GB comes with a nice backplate too.\nBelow is the image of the PCS+ 290 4GB, and as you can see there is slight difference in the looks of the front shroud.\nThe current PowerColor’s R9 390 lineup includes only the PCS+ R9 390. The R9 290 lineup also includes R9 290 TurboDuo, a slower version clocked at 975MHz for the GPU. However due to the increased reference GPU clock from 947MHz to 1000MHz for the R9 390, we are not sure that the TurboDuo cooler will be used this time due to the higher thermal requirements of the new GPU. However, it is now used on the PCS+ R9 380, which is based on the less powerful Tonga GPU (also used on the R9 285).\n- Graphics Engine Radeon R9 390\n- Video Memory 8GB GDDR5\n- Engine Clock 1010MHz\n- Memory Clock 1500MHz x4 (6.0 Gbps)\n- Memory Interface 512bit\n- DirectX Support 12\n- Bus Standard PCIE 3.0\n- Standard Display Connectors DL DVI-D/ DL DVI-D/ HDMI/ DisplayPort\n- CrossFireX Technology Support\n- ATI Stream Technology Support\n- ATI Eyefinity Technology Support\n- Board Dimensions 305mm x 130mm x 55mm\n- Minimum System Power requirement 750W\n- Extension Power Connectors: one 6-Pin and one 8-Pin PCI Express power connectors", "label": "Yes"} {"text": "Ensemble-based constrained optimization using an exterior penalty method\nPeer reviewed, Journal article\nMetadataShow full item record\nOriginal versionJournal of Petroleum Science and Engineering. 2021, 207 1-15. 10.1016/j.petrol.2021.109165\nIn science and engineering, non-linear constrained optimization has been a useful mathematical technique for many practical applications. Of interest to us is its applicability in the modeling and prediction of hydrocarbon reservoir production. In this paper, a new efficient, robust, and accurate optimal solution strategy based on the exterior penalty function (EPF) method and the adaptive ensemble-based optimization (EnOpt) approach (with backtracking line-search technique) for non-linear constrained optimization problems is presented. The purpose of this work is to provide a better user-friendly strategy which mitigates the problem often faced with the current constraints handling technique utilized when using the EnOpt method to solve constrained problems of water or EOR flooding. This study notes that the problem contributes to uncertainties in the gradient computation of the objective function and hence leads to the poor convergence rate of the standard EnOpt method. In this work, we used the EPF method to transform a given constrained optimization problem to a sequence of unconstrained subproblems and then sequentially solve the subproblems by unconstrained EnOpt procedure until convergence to the solution of the original problem. To demonstrate the advantage of the proposed methodology, we used it to solve analytical 2D bound constrained Rosenbrock’s problem and a practical high dimensional bound constrained water flooding optimization problem associated with a 2D 5Spot field and a 3D Reek reservoir field. The numerical results are compared with EnOpt using classical Lagrangian approach, as well as the traditional EnOpt. Our findings showed that the proposed solution method has a fast convergence rate and is more accurate and robust.", "label": "Yes"} {"text": "The Centre on Earth Observation carries on research activities in the field of geomatics which are applied to several sectors: from emergency management to logistics, from regional planning to capacity building.\nThe Centre processes and extracts thematic territorial information with the aim to identify and monitor the status and the characteristics of the Earth surface as well as its changes due to both natural events and anthropic actions. This is obtained by integrating and analysing geospatial data generated by different Earth Observation satellite missions (such as, for example, Copernicus), satellite derived data products and, finally, in situ data.\nIn addition, the Centre can publish the results of these analyses in web applications which enable users to easily consume derived data and parameters through thematic maps in WebGIS tools.\nPresently, the Centre’s activities are focused on the production of both digital and printed cartographic products mainly based on open-source geospatial data retrieved from multiple sources such as, remote sensing, collaborative mapping, thematic databases.\nThe researchers of the Centre have a long-lasting experience of scientific collaboration with national and international universities and research centres. In the last decade, they have led and collaborated to innovative projects with international organisations (e.g., the World Bank), universities and SMEs fostering the adoption of geomatic-based solutions and products.", "label": "Yes"} {"text": "|Surround:||PU Surround Edge|\n|Voice Coil Wire:||ASV|\n|Voice Coil Size:||1\" (25mm)|\n|Magnet Size:||80x40x15mm (10 oz)|\n|Tweeter Size:||38mm/1.5\" Silk Dome|\nWe always reccomend a big 3 kit for every vehicle, regardless of the system. However, if you plan on running more than 1,500 watts we reccomend a good AGM battery underhood, and then from there more power will need more electrical upgrades depending on power.", "label": "Yes"} {"text": "SOLUCIONES DE REFRIGERACIÓN PARA FABRICANTES DE AUTOMÓVILES\nSolutions for cars\nAs car owners become more demanding, car manufacturers and their supplier have to constantly up their game. That’s why we are proud that so many car makers turn to us for solutions.\nNowadays, vehicle owners and passengers have come to expect every conceivable comfort in their cars, including food and drinks – hot as well as cold – at the touch of a button. Vehicles have become mobile living areas, requiring all the amenities that go with it.\nDometic provides premium carmakers with thermoelectric devices, including cupholders with active temperature controls that can be set to cooling, heating or even warm storage. It’s like having a hotel minibar in the car.\nDometic also offers luxury cooling compartments, providing active cooling in the existing or available console space. Coated with insulating foam and featuring a high-performance Peltier element or compressor, these compartments allow passengers to store cold drinks or food items.\nDometic products come with other benefits too, including minimal noise and vibration levels, electromagnetic compatibility and maximum crash safety.\nAt home, we’re accustomed to electricity coming out of a wall socket. Today’s car passengers expect that same convenience inside a vehicle. With the proliferation of electronic devices, passengers need somewhere to “plug in” on the road.\nDometic engineers developed the first mobile power outlet – a 230V socket that was installed in Volkswagen’s VW Passat B6. The outlet generated 150 watts of AC power on a continuous basis, setting the standard for factory-installed mobile power around the world.\nDometic now produces mobile power outlets that can convert 12V battery power into 230V AC, ideal for running laptops, recharging mobile phones or keeping the children happy with their game consoles during the trip.", "label": "Yes"} {"text": "Press Release Summary:\nSILICON VIDEO® 9M001 camera system includes camera, PIXCI SI PCI bus frame grabber, RJ-45 cable, and ready-to-run XCAP-Lite software. Camera has 1.5 x 1.8 in. case and provides max array resolution at 10 bits per pixel. Programmable area of interest and programmable pixel clock allow frame rates from 30-1,500 fps, while PIXCI SI PCI interface supplies power, programmable pixel clock, exposure control, trigger input, and strobe output.\nOriginal Press Release:\nSilicon Video Camera System\nBuffalo Grove, Illinois - EPIX®, Inc., announces the SILICON VIDEO® 9M001 camera system.\nThe small and rugged 1.5 inch by 1.8 inch camera case provides a high speed and high resolution machine vision camera.\nThe attractive $995 system price includes the camera, PIXCI SI PCI bus frame grabber, RJ-45 cable, and ready to run XCAP-Lite software.\nThe camera system has a maximum array resolution of 1280 x 1024 at 10-bits per pixel.\nProgrammable area of interest and the programmable pixel clock allow frame rates from 30 frames per second at 1280 x 1024 at a 48 MHz pixel clock up to 1500 frames per second at 1280 x 4 at a 70 MHz pixel clock.\nThe PIXCI SI PCI interface supplies power, programmable pixel clock, exposure control, trigger input, and strobe output.\nApplications include biometrics, research, inspection, quality control, and security. Available now. Visit the EPIX® web site (www.epixinc.com) for detailed specifications.\n381 Lexington Drive\nBuffalo Grove, IL 60089", "label": "Yes"} {"text": "ELECTRIC MOTORS+...-ACT.MAN.ONLY | Edition: 2ND 16\nSchools: Ohio State University Agricultural Technical Institute\nDescription: This manual contains quizzes, practical assignments, and computer-generated simulated circuit analysis assignments.• Quizzes made up of multiple choice, true/false, and completion-type questions are provided for each part of each chapter. These serve as an excellent review of the material presented.• Practical assignments are designed to give the student an opportunity to apply the information covered in the text in a hands-on motor installation.• The Constructor motor control simulation software is included as part of the manual. This special edition of the program contains some 45 preconstructed simulated motor control circuits constructed using both NEMA and IEC symbols. The Constructor analysis assignments provide students with the opportunity to test and troubleshoot the motor control circuits discussed in the text. The Constructor simulation engine visually displays power flow to each component and using animation and sound effects, each component and using animation and sound effects, each component will react accordingly once power is supplied.", "label": "Yes"} {"text": "The Arc Light features a USB rechargeable battery and cuffs designed to slide onto your e-reader and stay in place. The light's curved arm glides up into the \"on\" position, casting bright, even light without the need for any adjustment. Interchangeable cuffs designed to fit most e-readers securely; arcing neck glides up into \"on\" position and down for \"off\" and storage; Rechargeable battery (included) provides 15 hours of light on a single charge; 3\" x 2\" x 1\"; 1 oz.\nFormat: Gift Vendor: Lightwedge Publication Date: 2011\nISBN: VR00200123 UPC: 845769004186 Availability: In Stock", "label": "Yes"} {"text": "MPC System Board, Intel Original\nMini MPC system board made by Intel for ECS replacement.\n2 mandatory accessories included:\nFront panel extension cable for LED and Switch Buttom\nRear I/O shield panel\nNotice: In comparison with the ECS board, this Intel board comes without the PCI slot and Floppy Drive connector. If your existing system needs either of these slots, this Intel motherboard will non-compliant.", "label": "Yes"} {"text": "AMP 2150 RF Line Amp\nThe AMP 2150 series of L-band line amplifiers provide high gain as well as optional DC path continuity. These amplifiers are manufactured utilizing highly reliable surface mount technology and advanced micro- strip RF circuitry and are typically deployed for multiple receiver installations in satellite telecommunication networks to compensate for L-band signal paths through long coaxial cable runs. Housed in either a standard 1 RU rack mount enclosure or rugged weatherproof extruded housing, the AMP 2150 Series amplifiers are the optimum choice for any L-band satellite communications application.\nFeatures & Benefits\n- High (adjustable) gain over full bandwidth\n- Housed in a rugged, weatherproof extruded aluminum enclosure or in a 1 RU rack mount chassis\n- Passes a 10 MHz reference\n- LNB power available", "label": "Yes"} {"text": "Practical sea-level and wave climate information for small-island states\nWe will present example wave and sea-level advice, generated for Saint Vincent and the Grenadines. Through collaboration with local planners and other coastal stakeholders we have identified particular areas at risk from changing water level and wave conditions. By using results from the numerical wave model WaveWatch III with global and regional coverage, we can provide local information on changing risk from rising mean sea-levels and episodic storm events. We then use the SWAN wave model for dynamic downscaling to capture nearshore wave processes and wave setup. These methods draw-out bespoke, island-scale information and projections of risk from waves and rising-sea level, on which to base practical decision making and planning. Our wave model is able to accurately capture wave conditions in the Caribbean Sea observed during past hurricane events, and synthetic storms to investigate worst-case scenarios.\nLessons learnt from this work apply to other SIS, either in the path of direct tropical cyclone impact, or those threatened by swell waves from remote storms. The challenge of generalising these results to other small island and archipelago settings is two-fold, as it depends on the geographic character of the island, and exposure to storms and their character.", "label": "Yes"} {"text": "High resolution gamma-ray spectroscopy is one of the most powerful tools to study the structure of atomic nuclei. Since nuclei in the rare-earth region can accommodate the highest values of angular momentum before fission, it has traditionally been one of the most favored domains for the study of “high-spin” states in nuclei. In this presentation a few select examples will be featured to illustrate a number of beautiful, dramatic and often unexpected, structural changes that take place in these nuclei as they evolve with increasing excitation energy and angular momentum. The excitement generated by the many fascinating discoveries in this region of nuclei has played a major role in pushing the advancement of increasingly sensitive gamma-ray detector systems, or “gamma-ray microscopes”, through the decades. The resulting 4π gamma-ray arrays, or “Gamma-Spheres”, continue to reveal fascinating new scientific phenomena at the limits of isospin, excitation energy, angular momentum, temperature, and charge. Another huge leap forward in the resolving power of germanium based detection systems is now taking place via the development of gamma-ray tracking arrays which when combined with new accelerator developments, promises a most exciting future to the field of high-resolution nuclear spectroscopy.", "label": "Yes"} {"text": "The Alzira LED pendant luminaire is constructed of powder coated aluminum and is equipped with the latest generation LED chip, either as a standard output or high output. Various lengths and finish combinations are available.\nOFFICE: 8509 Phoenix Dr. Manassas, VA 20110 Email: firstname.lastname@example.org\nWAREHOUSE: 8509 Phoenix Dr. Manassas, VA 20110\nCopyright © 2020 NAL Lighting Group | Powered by Advantage Internet Marketing", "label": "Yes"} {"text": "Small-signal neural models and their applications\nDate of Issue2012\nSchool of Electrical and Electronic Engineering\nThis paper introduces the use of the concept of small-signal analysis, commonly used in circuit design, for understanding neural models. We show that neural models, varying in complexity from Hodgkin-Huxley to integrate and fire have similar small-signal models when their corresponding differential equations are close to the same bifurcation with respect to input current. Three applications of small-signal neural models are shown. First, some of the properties of cortical neurons described by Izhikevich are explained intuitively through small-signal analysis. Second, we use small-signal models for deriving parameters for a simple neural model (such as resonate and fire) from a more complicated but biophysically relevant one like Morris-Lecar. We show similarity in the subthreshold behavior of the simple and complicated model when they are close to a Hopf bifurcation and a saddle-node bifurcation. Hence, this is useful to correctly tune simple neural models for large-scale cortical simulations. Finaly, the biasing regime of a silicon ion channel is derived by comparing its small-signal model with a Hodgkin-Huxley-type model.\nIEEE transactions on biomedical circuits and systems\n© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/TBCAS.2011.2158314].", "label": "Yes"} {"text": "Android Box / Smart TV PS3 style Wifi Gampad. Works with all game emulators and no programming needed. Other contollers, you have to assign each button to each command, very confusing. This remote has Android firmware pn it and is plug and play ready to go. Requires 2 AAA batteries\n2.4G Wireless Gamepad PC For PS3 TV Box Joystick 2.4G Joypad Game Controller Remote For Android PC With Retail box\nBattery: 2 x AAA batteries (not included)\nApplies to: For PS3 game consoles,Android mobile phones to use.\nConnection: Wireless receiver connection\nWireless distance: 10 meters\nProduct size: 15.6 * 9.8 * 6cm\n- For Android System and PS3\n- Wireless transmission can be operated within 10 meters\n- Plug and play.\n-FOR Android mobile phone PC win 7 8 10", "label": "Yes"} {"text": "|Publication number||US7129892 B2|\n|Application number||US 10/767,829|\n|Publication date||Oct 31, 2006|\n|Filing date||Jan 28, 2004|\n|Priority date||Oct 19, 2001|\n|Also published as||CN1251356C, CN1412890A, DE60133007D1, DE60133007T2, DE60141366D1, EP1304764A1, EP1304764B1, EP1832895A2, EP1832895A3, EP1832895B1, US6700542, US20030076271, US20040185793|\n|Publication number||10767829, 767829, US 7129892 B2, US 7129892B2, US-B2-7129892, US7129892 B2, US7129892B2|\n|Inventors||Yves Borlez, Laurent Secretin|\n|Original Assignee||B. E. A. Sa|\n|Export Citation||BiBTeX, EndNote, RefMan|\n|Patent Citations (19), Referenced by (25), Classifications (30), Legal Events (3)|\n|External Links: USPTO, USPTO Assignment, Espacenet|\nThis application is a continuation of Ser. No. 10/122,553 filed Apr. 15, 2002 now U.S. Pat. No. 6,700,542.\nThe invention relates to a planar antenna according to the features of the preamble of claim 1.\nPlanar antennas are known in the art. On top of their inherent interesting characteristics of size, cost and radiation performances, these antennas are generally used in all possible cases when an antenna radiation pattern change is required. Often a switching between two distinct configurations of the planar antenna is required. If used as detection antenna, these configurations correspond to two detection or radiation pattern widths. In order to provide different detection or radiation patterns, it is well known in the art to use two or more antennas. Other techniques consist of changing the detection or radiation pattern of the antenna by the use of absorbing material or metallic surrounding configurations. However, all of these techniques are based on a mechanical modifications of the antenna.\nU.S. Pat. No. 6,175,723 relates to a self structuring antenna system which comprises a switchable antenna array as planar antenna. The antenna array is defined by a plurality of antenna elements that are selectively electrically connectable to each other by a series of switches. This allows the alteration of the physical shape of the antenna array without actually moving or mechanically changing the antenna. By changing the physical shape, the radiation pattern or lobe of the antenna can be altered. Furthermore, the shape of the antenna can be adapted to changing electrical and/or physical environments in order to achieve a good antenna performance. However, the switches are relays, either solid-state, mechanical or opto-electronic, generally mounted behind the antenna itself. Such switches are expensive and difficult to process. Therefore, this antenna structure is too expensive for cost-sensitive applications.\nA typical cost-sensitive application for a planar antenna is an automatic door opener. Automatic door openers use door opener sensors which are usually made of waveguide transceivers. The output of the waveguide transceiver is a waveguide flange. However, it is very difficult and expensive to design a switch for different antennas which can be used in waveguide technology.\nTherefore, it is an object of the invention to provide a planar antenna which can be produced at low costs and, therefore, can be used advantageously in low-cost applications, particularly in door opener sensors.\nThe planar antenna according to the invention is characterized by what is specified in the independent claim 1.\nAdvantageous embodiments of the invention are specified in the dependent claims.\nA further object of the invention is to use such a planar antenna as part of a device performing a parallel traffic rejection algorithm which processes the information received from the planar antenna in such a way that at least two different lobes of the planar antenna are analyzed in order to calculate the direction of a pedestrian moving in or near to the area covered by a Door opener sensor\nAn inventive planar antenna comprises the following elements:\nAccording to the invention a planar antenna has been designed which can be used in direct coupling to a waveguide output. This antenna is made of a substrate, particularly a microwave substrate, which comprises antenna elements. The antenna elements can comprise patches on the substrate. In a preferred embodiment the patches are etched on the microwave substrate. According to the invention, it is preferred to generate a switching function on the planar substrate itself than in the waveguide. The inventive antenna can be produced at low costs, particularly using microelectronic production techniques which are widely used and cheap.\nThe patches can comprise a central patch which performs a coupling function to a microwave circuitry, such as a waveguide, a coaxial probe, a hole or a slot coupling. Other types of microwave circuits with a connection via hole, coaxial probe, etc. are useable. All other patches should have a length which is optimized to make the respective patch resonate at a central frequency and a width which is adjusted to the impedance and radiation power of the antenna.\nPreferably, a waveguide is provided for coupling to the planar antenna. The waveguide can comprise a transition to the planar antenna which is terminated by a waveguide flange. In a preferred embodiment, the transition comprises a “Doggy bone” filter which reduces spurious radiation at harmonic frequencies. The distance between the “Doggy bone” filter and the plane of the planar antenna should be at least about half a waveguide length when the waveguide is mounted on the surface of the planar antenna to achieve good filtering performance. In order to ensure a constant electromagnetic field on its rear aperture and to provide impedance matching, the waveguide can be enlarged in its larger dimension. Finally, the waveguide can comprise a rectangular aperture which is designed to provide enough energy to the central patch and to ensure a good matching between the waveguide and the planar antenna.\nIn order to avoid microwave leakage through the antenna control lines and ensure a total isolation of the planar antenna from the rest of the antenna control circuitry, a part of the control lines and the connection pads for applying DC current to the switches should be covered by a material absorbing microwaves.\nAccording to the invention, PIN diodes are preferred as switches. The feeding of the PIN diodes and their insertion inside the antenna layout requires taking into account that these extra components should not modify or perturb the radiation characteristics of the antenna. According to the invention, the path used by the DC current to polarize the PIN diodes has been designed to have no influence on the antenna radiation pattern. In this context, the location of the connection of the line for feeding a PIN diode on the patch on which the PIN diode is mounted is of primary importance.\nIn a further aspect, the invention provides a circuitry for controlling the planar antenna by obtaining at least one Doppler Signal Sample from at least one measurement device working with at least one lobe of the planar antenna, processing the obtained Doppler Signals according to an algorithm and performing a high-speed switching between the configurations of the planar antenna in accordance to the algorithm.\nThe circuitry preferably comprises sample and hold circuits for sampling the obtained Doppler Signals. The sample and hold circuits can be synchronized with the high-speed switching. Advantageously, the circuitry can comprise a digital signal processor for processing the at least one Doppler Signal. In a preferred embodiment, the digital signal processor processes two Doppler signals obtained from two measurement devices, preferably Schottky diodes positioned in a transceiver of the antenna, and corresponding to two different lobes of the planar antenna and calculates from the Doppler signals an intermediate lobe by weighting the Doppler signals. The circuitry can also comprise an oscillator which produces a sampling frequency signal with an accuracy suitable for sampling. In cases of the use of a high stability frequency source, the circuitry can be formed to perform weighting of the two lobes by pulse width modulation of the antenna control signal. The weighting between the two (antenna lobes would be achieved by the meaning action of the amplifier low pass filter. Then, at least one detection chain would be sufficient to retrieve the weighted Doppler signal.\nThe preferred field of application of the planar antenna are Door opener applications. Advantageously the antenna is used in a Door opener sensor.\nSuch a Door opener sensor can perform a parallel traffic rejection algorithm which processes the information received from the planar antenna in such a way that at least two different lobes of the planar antenna are analyzed in order to calculate the direction of a pedestrian moving in or near to the area covered by the Door opener sensor. In contrast to known Door opener sensors, traffic in front of a door can be detected more securely in that a door controlled by the sensor only opens when a person intends to enter the door, i.e., the person walks in a certain direction which falls within a detection area of the sensor.\nAdditional objects, advantages, and features of the present invention will become apparent from the following description taken in conjunction with the accompanying drawings.\nThe entire antenna is composed of an assembly of a waveguide 10 and a planar circuit antenna 30.\nAfter the filter 20, a waveguide length is used to keep a required distance between the filter 20 and the antenna plane so that the electromagnetic fields inside are not perturbed by the proximity of the two entities. Furthermore, the waveguide 10 is enlarged in its larger dimension to ensure a constant electromagnetic field on the antenna rear aperture (minimizing the E-field cosine variation inside the waveguide) and provide impedance matching.\nThe planar antenna 30, shown in\nThe antenna structure is composed of three lines 33, 49, and 41 of three patches each. The left line 33 comprises patches 34, 36, 38, the right line 41 patches 42, 44, 46, and the central line 49 patches 40, 48, 50. Each line 33, 41, 49 forms an antenna element. In each line, the patches are electrically connected to each other by the mentioned microstrip lines 58, 60, and 62 respectively. Therefore, three antenna elements are formed on the planar antenna 30.\nThe shape of the central patch 50 differs from the shapes of the other patches 34, 36, 38, 40, 42, 44, 46, and 48, due to its coupling function with the waveguide 10. The other patches 34, 36, 38, 40, 42, 44, 46, and 48 are patches which have a length optimized to make each patch resonate at the central frequency of the antenna. The width of the patches 34, 36, 38, 40, 42, 44, 46, and 48 is used to adjust the impedance and radiation power of the antenna. This technique is also applicable to larger size antenna, particularly antennas with larger dimensioned patches and/or more patches.\nAs already mentioned, the antenna is composed of three antenna elements or lines respectively of three patches each. Inside each line, the coupling is ensured by two (microstrip) lines 58, 60 connected on each side of the central patch 50 and feeding the edge patches 34, 36, 38, 40, 42, 44, 46, and 48. The length of each of these lines 58, 60 is designed so that the patches 34, 36, 38, 40, 42, 44, 46, and 48 are all radiating in phase along the line.\nThe two lateral lines 58 and 60 are then linked to the central line 62 by horizontal coupling lines 61, 63, which have been designed to feed the lateral lines 58, 60 in phase and to save symmetry along the structure of the antenna 30. This gives the “S” shaped coupling around the central patch 50. Some matching and relative power adjustment can be provided by the change of microstrip impedance resulting from the change in line width. This is useful to adjust the antenna horizontal radiation pattern and to optimize the return loss of the entire assembly.\nThrough all the lines, the power generated by the waveguide 10 on the central patch 50 is distributed to all the antenna elements 33, 41, 49 with the required proportion.\nParticularly, in Door Opener applications, it is an advantage to have two types of antenna patterns: a large horizontal lobe and a narrow one. Since each lobe corresponds to an antenna, two different antennas are required. Both antennas should have the same vertical radiation pattern. To achieve this, it is necessary to use switch elements to switch between the two configurations.\nThe switching is performed by PIN diodes 56 and 57, which are mounted on the horizontal coupling lines 63 and 61 respectively. These diodes 56 and 57 act as active switches with which the patches 34, 36, 38, and 42, 44, 46 can be connected with or disconnected from the central patch 50. This allows the control of the flow of microwave power to the lateral patches 34, 36, 38, and 42, 44, 46.\nThe PIN-diodes 56 and 57 have the property to provide a low series resistance in “ON” state and a low capacitance in “OFF” state. Therefore, they are preferred elements in order to provide good switching performance without complicated matching circuitry around the PIN-diodes.\nWhen the PIN-diodes are in “ON” state, the two lateral patch lines 33 and 41 are fed and the antenna behaves like a 3×3 patches antenna giving a narrow lobe in the horizontal plane. This configuration is used for narrow lobe applications.\nWhen the diodes are in “OFF” state, the two lateral patch lines 33 and 41 are disconnected from the central patch line 49. The horizontal coupling lines 56, 57 are disconnected. Therefore, the antenna comprises a single line patch antenna with patches 40, 48, 50 and a wide radiation or reception pattern in the horizontal plane and a radiation or reception pattern similar to the pattern of a narrow lobe antenna in the vertical plane.\nThe diodes 56 and 57 can be surface mount devices (SMD) having minimum package parasitic. The diodes 56 and 57 can be mounted on the center of a matching pad where the microstrip width is larger. At this point, the level of impedance is rather low and the impedance of the diode in “OFF” state is sufficiently high to provide good isolation.\nIn order to switch correctly, there must be an appropriate polarization applied to the diodes. To set the diodes in “ON” state, it is necessary to bias it with a current of approximately 10 mA. To set the diode in “OFF” state, a bias voltage of about 0 V is applied.\nHowever, it is required that the diodes 56 and 57 are not left floating for the “OFF” state.\nTherefore, the two diodes 56 and 57 are DC supplied in series. This has several advantages:\nIn the following, the optimal connection of the polarization lines to the side antennas is explained. In most of polarization circuits, it is very important to ensure that no microwave signal is flowing through it, since there could be some side effects coming from non-linearity or perturbation mixing of the microwave signal inside the low frequency circuitry. It could then be a problem if this would cause either noise or Doppler like signal (any signal between 30 Hz and 400 Hz). Furthermore, if these lines pick up some microwave signal, they may cause the generation of antenna radiation pattern distortion. To avoid this, a special configuration of the antenna 30 has been used.\nElectromagnetic simulations have shown that a resonant patch antenna has a maximum voltage at the edges and a minimum on the center of the lateral side. This is precisely where a thin line is connected to provide the DC current to the diodes. Electromagnetic simulations have also shown that the rejection of Microwave power, using this strategy could reach up to 35 dB.\nIn order to ensure a total isolation of the antenna from the rest of the radar circuit, additional precautions are required. This can be accomplished by the use of microwave absorbing material stuck on top of the polarization lines.\nBy electronically switching between the two antennas, it is now possible to have two different lobes 70, 72 of the antenna according to the control voltage applied.\nThe use of such an antenna has also the advantage to be readily compatible with existing low cost transceivers based on waveguide technology. The assembly of such devices is less critical and the implementation is more rugged than a full planar solution. A foam radome can be used to protect the diodes.\nThe above described techniques are rather general and can be used in different situations where a variation of an antenna lobe is required. An electronic processing of the Doppler signal and control of the antenna allow a lot of different configurations.\nElectronic switching of the antenna opens the way to a control of the antenna by a processor and, by that mean, an adjustment of the radiation pattern by remote control. Not only it is possible to switch between the two extreme configurations, but also, through the use of an algorithm, it is possible to generate equivalent detection lobes being in between the two extremes. A weighting of the Doppler signal received in each configuration will be used to get all the intermediate states required.\nThe processing obtains the Doppler signals of two Schottky diodes 100 and 102 provided in the microwave transceiver 106 for each of the two antenna configurations. For that purpose, a signal received by the antenna 30 is sampled in each configuration of the antenna 30 and a high speed switching is done between the two configurations of the antenna 30. Sample and hold circuits 114, 116, 118, and 120 are synchronized with the switching of the configurations of the antenna 30 in order to switch the output signals of the Sample and hold circuits 114, 116, 118, and 120 on the corresponding channels.\nWith such a circuit, it is possible to retrieve the Doppler signal of the two Schottky diodes 100 and 102 for the two configurations of the antenna nearly simultaneously and to send them to a processor for digital processing. If the processor takes only into account the signal coming from a single antenna configuration, a sensor will have the detection pattern of the antenna switched to this position. However, if the two configurations are available simultaneously, it is possible to calculate any intermediate lobe, by weighting the Doppler signals.\nIn this technique, the sampling clock can be provided either by the processor or by an auxiliary oscillator 108 whose frequency accuracy is not critical, provided it remains sufficiently high in order to provide good sampling.\nIn case of a very high frequency stability microwave source, it is possible to use Pulse Width Modulation (PWM) for the sampling. In such a case, only one detection chain would be enough to retrieve the signal. The duty cycle would make the selection between the lobes.\nSuch an planar active antenna 30 used in an active antenna sensor delivers more information than a single antenna. The use of the extra information received from the planar active antenna 30 can lead to an effective pedestrian parallel traffic rejection algorithm used in door opener systems, as shown in\nIf the horizontal radiation patterns of the active antenna sensor 152 are carefully chosen one could then correlate the information generated by the same target in both antenna configurations in order to approximate the angle of the target trajectory compare to the axis of the sensor.\nIf the target is coming in the axis of the sensor (direction A) the magnitude of the signals corresponding to the second configuration detection field 156 (narrow field) will be higher than the one corresponding to the first configuration detection field 154 (wide field). On the opposite, if a target walks in a parallel way to the door's 150 header (direction B) the magnitude of the signals corresponding to the wide detection field will be higher than the one corresponding to the narrow field. If the magnitude ratio between the signals generated with both antenna configurations are continuously computed, the angle of the target trajectory could then be evaluated. Furthermore, this information could then be compared to a specified level in order to discriminate targets walking in parallel to the door's 150 header.\nAbove it was described embodiments of a planar antenna according to the invention. The invention does not restrict the planar antenna designs to those described above. Nor does the invention restrict in any way the materials used therein. Nor does the invention restrict in any way the coupling is made between the transceiver and the central patch. The inventional idea may be applied in different ways within the scope defined by the independent claim 1.\n|Cited Patent||Filing date||Publication date||Applicant||Title|\n|US4893126||Sep 21, 1988||Jan 9, 1990||U.S. Philips Corporation||Integrated millimeter-wave transceiver|\n|US5497163||Aug 4, 1994||Mar 5, 1996||Siemens Aktiengesellschaft||Doppler radar module using micro-stripline technology|\n|US5656980||Feb 8, 1996||Aug 12, 1997||Harris Corporation||Multiple output RF filter and waveguide|\n|US5657024||Oct 5, 1995||Aug 12, 1997||Honda Giken Kogyo Kabushiki Kaisha||Radar module and radar system|\n|US5717399||Nov 15, 1995||Feb 10, 1998||Honda Giken Kogyo Kabushiki Kaisha||Radar device for vehicle use|\n|US5764189||Sep 18, 1996||Jun 9, 1998||Siemens Aktiengesellschaft||Doppler radar module|\n|US5877726||Sep 17, 1997||Mar 2, 1999||Honda Giken Kogyo Kabushiki Kaisha||Antenna device|\n|US5966090 *||Mar 16, 1998||Oct 12, 1999||Mcewan; Thomas E.||Differential pulse radar motion sensor|\n|US6061025||Nov 12, 1997||May 9, 2000||Atlantic Aerospace Electronics Corporation||Tunable microstrip patch antenna and control system therefor|\n|US6064862 *||Jul 18, 1997||May 16, 2000||Innova Corporation||Method and apparatus for external band selection of a digital microwave radio|\n|US6175723 *||Aug 12, 1998||Jan 16, 2001||Board Of Trustees Operating Michigan State University||Self-structuring antenna system with a switchable antenna array and an optimizing controller|\n|US6198438||Oct 4, 1999||Mar 6, 2001||The United States Of America As Represented By The Secretary Of The Air Force||Reconfigurable microstrip antenna array geometry which utilizes micro-electro-mechanical system (MEMS) switches|\n|US6377217||Sep 13, 2000||Apr 23, 2002||Paratek Microwave, Inc.||Serially-fed phased array antennas with dielectric phase shifters|\n|US6441787||Feb 1, 2000||Aug 27, 2002||Raytheon Company||Microstrip phase shifting reflect array antenna|\n|US6501427||Jul 31, 2001||Dec 31, 2002||E-Tenna Corporation||Tunable patch antenna|\n|EP0682382A2||Apr 25, 1995||Nov 15, 1995||Disys Corporation||Microwave integrated tuned detector|\n|EP0707220A2||Oct 3, 1995||Apr 17, 1996||Honda Giken Kogyo Kabushiki Kaisha||Radar module and radar system|\n|EP0805360A2||Apr 28, 1997||Nov 5, 1997||Honda Giken Kogyo Kabushiki Kaisha||Multibeam radar system|\n|WO2001092671A1||May 31, 2001||Dec 6, 2001||Reglomat Ag||Unit for controlling the position of a displaceable component|\n|Citing Patent||Filing date||Publication date||Applicant||Title|\n|US7495556||Jan 19, 2006||Feb 24, 2009||B.E.A. S.A.||Sensor for use with automatic doors|\n|US7965238 *||Sep 9, 2004||Jun 21, 2011||National Institute Of Information And Communications Technology, Incorporated Administrative Agency||Wide band antenna common to a plurality of frequencies|\n|US8077034||Sep 28, 2006||Dec 13, 2011||Bea Sa||Sensor for presence detection|\n|US8340197||Nov 25, 2008||Dec 25, 2012||Invertix Corporation||System and method for modulating a signal at an antenna|\n|US8380132 *||Sep 14, 2005||Feb 19, 2013||Delphi Technologies, Inc.||Self-structuring antenna with addressable switch controller|\n|US8391376||Mar 17, 2010||Mar 5, 2013||Invertix Corporation||System and method for electronically steering an antenna|\n|US8391927 *||Jun 12, 2010||Mar 5, 2013||Broadcom Corporation||Multiple mode RF transceiver and antenna structure|\n|US8411794 *||Mar 17, 2010||Apr 2, 2013||Invertix Corporation||System and method for arbitrary phase and amplitude modulation in an antenna|\n|US8457251||Mar 17, 2010||Jun 4, 2013||Invertix Corporation||System and method for spreading and de-spreading a signal at an antenna|\n|US8750792||Mar 15, 2013||Jun 10, 2014||Remec Broadband Wireless, Llc||Transmitter for point-to-point radio system|\n|US9025500||Jul 24, 2013||May 5, 2015||Remec Broadband Wireless, Llc||Simultaneous bidirectional transmission for radio systems|\n|US9281887 *||Oct 8, 2010||Mar 8, 2016||Thomson Licensing||Method for topology control using sectorized antennas in wireless networks|\n|US20060187037 *||Jan 19, 2006||Aug 24, 2006||Bea S.A., Parc Scientifique Du Sart-Tilman||Sensor for use with automatic doors|\n|US20070060201 *||Sep 14, 2005||Mar 15, 2007||Nagy Louis L||Self-structuring antenna with addressable switch controller|\n|US20080284653 *||Sep 9, 2004||Nov 20, 2008||National Institute Of Information And Communica- Tions Technology, Inc. Administrative Agency||Wide Band Antenna Common to a Plurality of Frequencies|\n|US20090220030 *||Nov 25, 2008||Sep 3, 2009||Uhl Brecken H||System and method for modulating a signal at an antenna|\n|US20100039217 *||Sep 28, 2006||Feb 18, 2010||Bea S.A.||Sensor for presence detection|\n|US20100207819 *||Mar 17, 2010||Aug 19, 2010||Uhl Brecken H||System and method for electronically steering an antenna|\n|US20100208771 *||Mar 17, 2010||Aug 19, 2010||Uhl Brecken H||System and method for spreading and de-spreading a signal at an antenna|\n|US20100208844 *||Mar 17, 2010||Aug 19, 2010||Uhl Brecken H||System and method for arbitrary phase and amplitude modulation in an antenna|\n|US20100245191 *||Jun 12, 2010||Sep 30, 2010||Broadcom Corporation||Multiple mode rf transceiver and antenna structure|\n|US20120202432 *||Oct 8, 2010||Aug 9, 2012||Thomson Licensing||Method for topology control using sectorized antennas in wireless networks|\n|DE102008023030A1||May 9, 2008||Nov 12, 2009||Innosent Gmbh||Radarantennenanordnung|\n|DE102008023030B4 *||May 9, 2008||Nov 17, 2016||Innosent Gmbh||Radarantennenanordnung|\n|EP2117077A1||May 8, 2009||Nov 11, 2009||InnoSenT GmbH||Radar antenna assembly|\n|U.S. Classification||343/700.0MS, 343/810, 343/853|\n|International Classification||G01S13/56, G01S7/02, H01Q13/06, H01Q13/00, H01Q21/20, H01Q13/08, H01Q1/22, H01Q1/38, H04M1/00, H01Q3/24, H01Q21/00, H01Q21/06|\n|Cooperative Classification||E05F15/73, H01Q21/065, H01Q1/22, E05Y2400/54, G01S13/56, H01Q1/247, H01Q3/24, G01S7/024, E05Y2900/132, E05Y2800/22|\n|European Classification||H01Q1/22, H01Q1/24D, G01S13/56, H01Q21/06B3, H01Q3/24|\n|Sep 18, 2007||CC||Certificate of correction|\n|Mar 23, 2010||FPAY||Fee payment|\nYear of fee payment: 4\n|Apr 1, 2014||FPAY||Fee payment|\nYear of fee payment: 8", "label": "Yes"} {"text": "International Conference on Automation, Quality and Testing, Robotics (2012)\nMay 24, 2012 to May 27, 2012\nEmilia Sipos , Technical University of Cluj-Napoca, Romania\nLucian Cica , Technical University of Cluj-Napoca, Romania\nCostin Miron , Technical University of Cluj-Napoca, Romania\nIn this paper a minimization algorithm for ternary function based on the Hurst method is presented. The algorithm minimizes ternary functions with two, three and four input variables and was implemented using the Matlab environment. Both, the partial results and final expressions are provided. The final expressions are obtained by combining two different partial results and are with respect to the truth table for the ternary input function. The friendly and intuitive interface makes the implemented algorithm easy to use, without requiring any background in the field of ternary minimization.\nhuman computer interaction, logic circuits, logic design, ternary logic, user interfaces\nE. Sipos, L. Cica and C. Miron, \"Software minimization of ternary functions using Matlab,\" International Conference on Automation, Quality and Testing, Robotics(AQTR), Cluj-Napoca Romania, 2012, pp. 284-289.", "label": "Yes"} {"text": "The 80 acres of hills and valleys are called the Buitenschot ‘land art park’ and supposedly reduce noise in the nearby neighborhood by around 50%. They work by sending the reflections in random directions that would otherwise skip off of the ground, just like anti-echo baffles in a sound studio. A nice touch for the local residents, they also contain jogging trails.\nBeauty is in the eye of the beholder, of course. Unfortunately, as the Smithsonian notes, nobody is beholding it. Because Buitenschot aims to diffuse the takeoff noise coming out of the rear of the planes, they are always flying away from it; passengers don’t get to see it from the air.\n“In the future, we’ll be generating a significant fraction of our electricity from harnessing the waves!” People have been saying this for decades, and wave-generated electricity is not a significant fraction of an ant’s poop. It’d be fantastic if this could change.\nIf you believe the owners of Oscilla Power, the main failing of traditional wave-power generators is that they’ve got too many moving parts. Literally. Metal mechanical parts and their seals and so on are beaten down by sun and salt and surf over time, so it’s expensive to maintain most of the generator designs, and they’re just not worth it.\nMagnetostriction is the property that magnetic materials can shrink or expand just a little bit when put in a magnetic field. The Villari effect (which sounds much cooler than “inverse magnetostriction”) is the opposite: magnetic materials get more or less magnetic when they’re squeezed.\nSo to make a generator, you put two permanent magnets on either end, and wind coils around magnetostrictive metal bars that are inside the field of the permanent magnets. Squeeze and stretch the bars repeatedly and the net magnetic field inside the coils changes, and you’re generating electricity. Who knew?\nRight now, according to The Economist Magazine’s writeup on Oscilla, the price per watt isn’t quite competitive with other renewable energy sources, but it’s looking close. With some more research, maybe we’ll be getting some of our renewable energy from squeezing ferrous bars.\nThe concept behind crop squares is to make a graphical user interface using Dizmo that clearly shows the status of your crops in a grid system. For the prototype they used an Arduino Pro Mini with moisture sensors in potted plants to detect moisture levels, while a Raspberry Pi also collected weather data for the area being watched. The Arduino used an ESP8266 WiFi module to transmit the data remotely. To demonstrate how the system could be used in an automated sense, they hooked up another Arduino (this time a Leonardo), to pour water once the moisture levels dropped below a certain threshold.\nCrop Squares won the Best Pitch Award as well as the Best Integration of Dizmo — good job guys!\nThe design of the Curiosity printer is pretty simple, and bears a strong resemblance to an earlier e-waste 3D printer we covered back in December. This one has a laser-cut MDF frame rather than acrylic, but the guts are very similar – up-cycled DVD drives for the X- and Z-axes, and a floppy drive for the Y-axis. A NEMA 17 frame stepper motor provides the oomph needed to drive the filament into an off-the-shelf hot end, and an Arduino runs the show. The instructions for assembly are very clear and easy to follow, although we suspect that variability in the sizes of DVD and floppy drives could require a little improvisation at assembly time. But since the assembly of the printer is intended to be as educational as its use, throwing a little variability into the mix is probably a good idea.\nThe complete kit, less only the e-waste drives and power supply, is currently selling for $149USD. That’s not exactly free, but it’s probably within range of being funded by a few bake sales. Even with the tiny print volume, this effort could get some kids into 3D printers early in their school career.\nCRISPR is the new darling of the genetics world, because it allows you to easily edit DNA. It is far more effective than previous techniques, being both precise and relatively easy to use. According to this IndieGoGo project, it is coming to your home lab soon. Genetic researchers love Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) because it allows you to very precisely edit a DNA strand. Using a protein called CAS9, CRISPR can find a very specific sequence in a DNA sequence and cut it. It occurs naturally in cells as part of the immune system: by finding and remembering parts of virus DNA, a cell can recognize and attack it when infected. For the genetics researcher, this allows them to insert new DNA sequences at specific points in the genes of any living cell.\nAir quality is becoming a major issue these days, and not just for cities like Beijing and Los Angeles. It’s important for health, our environment, and our economy no matter where we live. To that end, [Radu] has been working on air quality monitors that will be widely deployed in order to give a high-resolution air quality picture, and he’s starting in his home city of Timisoara, Romania.\n[Radu] built a similar device to measure background radiation (a 2014 Hackaday Prize Semifinalist), and another to measure air quality in several ways (a 2015 Hackaday Prize Finalist and a Best Product Finalist; winners will be announced next weekend). He is using the platforms as models for his new meter. The device will use a VOC air sensor and an optical dust sensor in a mobile unit connected to a car to gather data, and from that a heat map of air quality will be generated. There are also sensors for temperature, pressure, humidity, and background radiation. The backbone of the project is a smart phone which will upload the data to a server.\nWe’ve seen other air quality meters before as well, and even ones based around the Raspberry Pi, but this one has a much broader range of data that it is acquiring. Its ability to be implemented as an array of sensors to gather data for an entire city is impressive as well. We can envision sensor networks installed on public transportation but to get to all parts of every neighborhood it would be interesting to team up with the Google Streetview Cars, Uber, or UPS.\nYou may not have heard of a Stellarator before, but if all goes well later this month in a small university town in the far northeast of Germany, you will. That’s because the Wendelstein 7-X is finally going to be fired up. If it’s able to hold the heat of a fusion-capable plasma, it could be a huge breakthrough.\nSo what’s a stellarator? It’s a specific type of nuclear fusion containment geometry that, while devilishly complex to build and maintain, stands a chance at being the first fusion generator to achieve break-even, where the energy extracted from the fusion reaction is greater or equal to the energy used in creating the necessary hot plasma.\nThere’s an awesome video on the W7-X, and some of the theory behind the reactor just below the break.", "label": "Yes"} {"text": "A new project is aiming to bring bees online by putting them in tiny \"backpacks\" so that scientists can track the threatened insect's behaviour and help its survival. From a report: Bees in Manchester initially will be connected to the internet using technology from Cisco to help researchers track their migration, pollination and movement, and eventually, across the UK. Sensors in hives located at a new 70,000 sq ft tech accelerator hub in the northern city called Mi-Idea, will measure the bee environment such as temperature, while the bees themselves will be tagged with RFID chips that look like tiny backpacks. All the information will be collected and made available to track online giving insight on their habitats, with the bees even providing \"status updates\" (albeit automated) on their whereabouts. Cisco is working on the project with the Manchester Science Partnership (MSP) and the hub is already home to six startups: Hark, an IoT data company, video platform Wattl, location data analytics startup PlaceDashboard, Steamaco, an energy technology company, IOT platform KMS and software firm Malinko.", "label": "Yes"} {"text": "A10 launches Thunder 7445 threat protection system\nA10 Networks has unveiled Thunder 7445 Threat Protection System, that according to the company has the industry’s highest performance 1 rack unit (RU) and highest density of throughput per RU appliance. Now cloud, Internet and gaming providers can protect their infrastructure with A10 DDoS defense while enjoying the cost benefits of 100 GbE networking in the smallest form factor. A10 Network’s high-performance Thunder TPS is a flexible and robust DDoS protection solution that offers surgical precision in detecting and mitigating against the full spectrum of DDoS attacks.\nThe solution is available in a wide range of hardware and software deployment options. By providing the industry’s highest performance 1 RU appliance, with a breakthrough 220 Gbps throughput and 330 Mpps, the solution provides distinct advantages over competing products that deliver less than half the performance. The solution enables smaller, more efficient deployment at a time when real estate has never been at more of a premium in data centers, colocation facilities and Internet Exchange Points (IXPs)\nKey features include:\n- Better detection – One-DDoS Protection provides a unique approach to full-spectrum DDoS defense, placing detection capabilities within targeted infrastructure, including Thunder TPS, ADC, CGN and CFW solutions. This provides advanced context, flow and packet level visibility to stop today’s most sophisticated targeted attacks.\n- Unmatched scalability – Delivers 22 times the flow-based detection capacity and 15 times as many simultaneous active mitigations as traditional systems.\n- Automated wartime protection – Improved attack response times with proactive, intelligent automation featuring five levels of programmatic mitigation escalation and de-escalation. Removing the need for frontline personnel to make time-consuming manual changes.\n- Reduced security OPEX – Delivers high performance in a compact factor with lower power usage, rack space and cooling requirements. Also, aGalaxy TPS streamlines operations via centralized management, remediation, and analytics for Thunder TPS deployments.", "label": "Yes"} {"text": "Fully Automated 3D Scanning Process (Automated 3D Scanning Process | One-click automatic scanning process)\nMethod Optical Structured Light Technology Resolution 2MP / 5MP (Twin camera) Scan Area size 120 mm (2MP) & 50, 120 mm (5MP) / 4.724 inch (2MP) & 1.968, 4.724 inch (5MP) Automatic Platform Automatic 2-axis with SSS Technology (360° rotation / -5° to 90° arm ) Dimension 330 x 495 x 430 mm / 12.992 x 19.488 x 16.929 inch Weight 17 Kg / 37.478 lbs Data Output Open STL (polygon mesh), OBJ, ASC Power 110~240V, 50~60Hz Interface USB 3.0 O/S Windows 10 (64 bit) Download Lion3DX brochure Category Lion3DX Tags:\nLion3DX is desktop size 3D scanner with high accessibility for everyday use, equipped with automatic 2-axis platform.\nConventional scanners need to mount models with fixture or clays, and they cause inefficiency.\nLion 3DX’s Stable Scan Stage (SSS) technology enables scanning module to rotate around the centre of the scanning stage and keeps your objects stable while scanning.\nSSS technology with moving camera technology allows you to scan without any fixture or adhesive.\nHaving good accuracy is essential for industrial scanning applications. Unlike the low-cost consumer 3D scanners, industrial grade 3D scanners requires strict accuracy validations.\nEach and every unit of Lion 3DX goes through a strict accuracy check using a testing artifact made and measured at Deutscher Kalibrierdienst, a renowned measurement laboratory in Germany.\nStable Scan Stage (SSS) Technology\n- No need for separate fixture to hold your scanning objects\n- Scanner sensor moving method lets your objects to be stable while scanning\n- Intelligent Auto View Sync\nFully automated scanning process\n- One-click automatic scanning process\n- 360 degrees rotation axis, -5 to 90 degrees arm axis\n- Compact, yet durable design suitable to be placed next to your workstations\n- Ideal for scanning small sized objects.\n- Auto exposure adjustment & noise filtering\n- Modular scanner sensor for easy maintenance\n- Cooling Mode keeps the scanner at its most stable and energy conserving state\n- With the use of high-end dual cameras, even the smallest details can be captured with reliable accuracy\n- Optical Structured Light Technology\n- Auto adaptive exposure level helps you find the optimal camera exposure level for best result", "label": "Yes"} {"text": "How 5G Relates to SDN and NFV Technologies – Part II: Architecture\nIn Part I of this series, How 5G Relates to SDN and NFV Technologies – Introduction and History, I explained why I believe 2019 is going to be the year of 5G, reviewed the history of wireless communications, and depicted how we got from 1G to 5G. In this blog, I’m going to take a deeper dive and explain 5G architecture and how it relates to SDN and NFV technologies.\n5G and its Future Impact\n5G is the new generation of radio systems and network architecture that will deliver extreme broadband, ultra-robust low latency connectivity, and massive networking for human beings and the Internet of Things. In a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual lives.\n5G will be far more than just a new radio technology: It will combine existing Radio Access Technologies (RATs) in both currently licensed and unlicensed bands, add novel RATs optimized for specific bands and deployments, and scenarios and use cases (some of these use cases have yet to be imagined). It will also demand a different new network architecture based on Network Function Virtualization (NFV) and Software Defined Networking (SDN) technologies. (I covered these technologies in detail in previous blogs so I won’t extend myself here).\n5G and the New Concept of Programmability\nProgrammability will be central to achieving the super-flexibility that network providers and operators will need to support the new communications demands that will come to them from a wide array of devices, users, and companies across many different industries, as well as from other organizations such as government agencies (think: cities/municipalities, army, etc.). To sufficiently manage all these demands, 5G networks will have to be programmable, flexible, modular, software-driven and managed in a holistic fashion in order to enable a diverse and profitable range of services.\nBut let’s leave the 30,000-foot view and dive deep down into technical architecture whereby I’ll explain (1) what is behind the definition of 5G architecture (3GPP) and (2) compare the 5G Mobile network architecture to a model well-known by computer and networking engineers worldwide.\nThe OSI Model\nThe 3GPP stands for the Third Generation Partnership Project and it consists of many standard documents that cover all aspects of the 5G technology (Radio, Access, Core, Security, etc.). These documents are developed by the 3GPP Technical Specifications Groups (TSGs) and Working Groups (WGs) on the main releases. The latest Releases (15 and 16) are the main targets of the 5G architecture, consisting of 5G core and the New Generation radio network (NG-RAN). After these two, yeah, you guessed it, we’ll have release 17 and beyond (in the works) which will add more features and enhancements. There are also other organizations and consortiums of companies working on developing the standards of the 5G including: IETF, ITU, etc.\nNow let’s look at the OSI model:\n- Starting from the bottom, we see that Layers 1 and 2 of the OSI are replaced by the OWA (Open Wireless Architecture Layer).\n- One level up, we have the Network Layer which is divided in two subsections (Upper for the mobile terminal and Lower for each interface). The Network Layer is used to route data from the source IP device to the destination IP device/system.\n- On the higher level, we have the OTP (Open Transport Layer) which combines functionality of both the transport layer and session layer.\n- Finally, we have the Application Layer which marks the data the proper format required and facilitates encryption and decryption. It also selects the best wireless connection for the given service and takes care of providing the Quality of Service (QoS).\nThis key new concept in 5G will enable tenants to get different levels of connectivity from their service provider to accommodate use cases. So yes, QoS is built in on the design of 5G.\nTo better utilize resources—streaming a video in 4K with HDR will be a reality with the bandwidth of 5G and require minimal latency. If you were to use Voice over IP (VoIP) or send an email, however, you wouldn’t need that much. With slicing, we divide the network into ‘virtual slices’ of the underlaying physical network and each one of them supports specific performance guarantees.\nYou are probably seeing the link between 5G and the SDN and NFV technologies we have been covering. To achieve this network slicing, 5G will be an all-cloud architecture. The specifications provided by 3GPP dictate that the network will be based on a central cloud that’s connected via a backhaul network to many edge computing clouds that are kilometers away from the user and move many services from the core to the Edge. If services can be executed in the network edge, it will take traffic away from the Cloud RAN.\n5G architecture will boast cloud-native access, transport, and core networks. Network slicing will be enabled through all of them (edge to edge), allowing diversified 5G services and different QoS. As we can see, the virtualization technology of NFV and the centralized control of SDN are embedded in the DNA of a 5G system. Also, whereas 4G-LTE networks tend to integrate both the user and control planes, 5G architecture will separate these planes, improve flexibility, facilitate centralized control, and ensure easy network slicing.\nAnd do you remember what was one of the tenants for SDN architecture from the previous SDN posts?\nYes, that one, Centralized Network Management!\n…To be continued soon in Part III.", "label": "Yes"} {"text": "Part 1 of this paper [ Appl. Opt. 14, 666 ( 1975)] dealt with the cw radar and analog communications uses of three-frequency nonlinear heterodyne detection. In this paper, we evaluate the technique for a number of specific pulsed radar and digital communications applications. Both the vacuum channel and the lognormal turbulent atmospheric channel are considered. It is found that the advantages of the technique in the pulsed/digital system are similar to those obtained in the cw/analog system. Computer generated error probability curves as a function of the input signal-to-noise ratio are presented for a variety of binary receiver parameters and configurations and for various levels of atmospheric turbulence. Orthogonal and nonorthogonal signaling schemes, as well as dependent and independent fading, are considered. When Doppler information is poor, performance is generally superior to that of the conventional heterodyne system.\n© 1975 Optical Society of AmericaFull Article | PDF Article\nOSA Recommended Articles\nJ. H. Shapiro, B. A. Capron, and R. C. Harney\nAppl. Opt. 20(19) 3292-3313 (1981)\nAppl. Opt. 23(19) 3395-3399 (1984)\nHenrik Ahlberg, Stefan Lundqvist, Dietmar Letalick, Ingmar Renhorn, and Ove Steinvall\nAppl. Opt. 25(17) 2891-2898 (1986)", "label": "Yes"} {"text": "Posted: Monday, October 2, 2017 8:37 AM\nThe HP C4580 multi-function printer has the caliber to attach to a computer with a wireless or USB connection. You can configure your HP printer to use Wi-Fi connection through the installation disc supplied to properly install your printer. You need to have a printer near the PC to connect via a USB cable; This can be done only through the configuration process. If you have any questions, contact the HP Support Help Center through phone immediately and get a quick resolution.\n• Location: Juneau, United States\n• Post ID: 5816608 juneau", "label": "Yes"} {"text": "Many Windows computer access the internet using the wireless adapter but wireless adapter can cause problems. Many users reported that they experienced this error message Problem with wireless adapter or access point while trying to access their wireless network. This error mainly appears in laptop as laptops mainly use wireless network.\nHere are some methods to fix Problem with wireless adapter or access point error.\nCheck your Password\nSometimes we enter the wrong password while trying to connect to the wireless network. To fix this, disconnect from your network and reconnect again and this time be sure to enter the right password.\nDelete Wireless Profile\n- Type cmd in the search box and right click on Command Prompt and choose Run as Administrator.\n- Type the following command and hit Enter:\nnetsh wlan delete profile name=”wireless profile name”\nReplace “wireless profile name” with your actual wireless profile name.\n- Restart your computer and reconnect to your wireless network.\nUpdate Your Wireless Network Adapter Driver\n- Press the Windows + R keys to open the run command.\n- Type msc and click OK. Then Device Manager Window will open.\n- In Device Manager, expand category Network adapters. Right-click on your wireless network device and click Update driver.\n- Click OK to confirm it.\nUse Command Prompt\n- Open Command Prompt as shown in Method 2.\n- Type the following commands and hit Enter:\nnetsh winsock reset\nnetsh int ip reset\n- Restart the computer.\nWindows Defender is a good anti-virus software, however lots of users often use third-party antivirus programs also. Although these tools provide incredible protection, at times they can trigger some problems, such as Problem with wireless adapter or access point error. Hence to dismiss that possibility, you‘d better get rid of them to check out whether that works out.\nReset Your Router\nError “Problem with wireless adapter or access point” can occur because your router for some reasons fails to assign appropriate IP address to your computer. In such case try restarting your router to fix this issue. Press the power button on your router to turn it off, after a while again press the power button to start the router.", "label": "Yes"} {"text": "Decoding Encrypted Radio Transmissions\nFPV transmission solely for yourself falls a bit out of that boat. De-aggregation of MAC Service Data Units (A-MSDUs) is supported on the 3000 Series, 7220, and the M3 controllers with a maximum frame transmission size of 4k bytes; however, this feature is always enabled and is not configurable. The radio channel is quite different from the wired channel. The purpose of this page is to gather information about agencies that encrypt their general dispatch and common public safety operations. can decode it. The present invention relates to a method for the radio transmission of traffic messages and a radio receiver for receiving traffic messages. The House Commerce Committee also voted to make it a crime to sell electronic gadgets that can \"decode encrypted radio transmissions for the purposes of. Make sure to check out my follow-up guide , where I go over broadcasting signals from a Raspberry Pi in the radio spectrum by simply adding a piece of wire. It is several years old, and was superseded by the 7000 or is encrypted. Wireless Communication Final StudyGuide (Part I) Which of the following is true about wireless radio signal transmissions? allowing only the recipient to. The largest array of platforms. READ MORE. Each BTS is controlled by BSC (Base Station Controller): the GSM network comprise some BSC witch each one control many BTS. Most of these messages are distress signals from. There are also a few encrypted digital radio systems and systems that do not comply with national standards that cannot be monitored on any radio scanner. Navy radio call signs assigned by the Chief of Naval Operations. Thanks to the spectrum inversion encryption method, any risk of non authorized interception of the transmitted informations is virtually eliminated. And I show you why I'm done with it. Currently, encryption is one of the most popular and effective data security methods used by organizations. 25 kHz channel spectrum efficiency. The protocol and format is not encrypted and can be received by everyone. I identify the Auriga as being encrypted, it might be but as nobody on the team. AOR has created an APCO25 digital decoder for use with receivers that have a 10. The Encoder and Decoder The encoder and decoder are the brains of the system. a) Four -Weighted Fractional Fourier Transform (4-WFRFT) associated with a row of the parity-check matrix H. The various methods of TV transmission. The only way possible to hear an encrypted communication is with a properly programmed System Radio programmed with the encryption keys. The Data Encryption Standard (DES), is the name of the Federal Information Processing Standard (FIPS) 46-3, which describes the data encryption algorithm (DEA). The encoder detects the button presses or switch closures then formats them into a digital data stream and sends the data to the transmitter. Encrypted Transmissions. When used over radio frequency, the. Also Explore the Seminar Topics Paper on GSM Security And Encryption with Abstract or Synopsis, Documentation on Advantages and Disadvantages, Base Paper Presentation Slides for IEEE Final Year Computer Science Engineering or CSE Students for the year 2015 2016. The companies core expertise is leading-edge, IP- based communication technology for audio products. So again, the two functions are called: Xtea_decrypt(hopping, key1) : This function performs the actual decode The decrypted data is now in the hopcode buffer. decode encrypted. Before digital speech encryption became widely available, an analogue technique was used to protect voice transmissions. Offering safe, reliable communications, the Hytera PD712IS handheld digital radio has been designed to comply with the highest 'ia' standards making this the ideal communication solution for working environments that require intrinsically-safe devices. RTTY or Radio TeleTYpe is very popular and transmitted at various speeds by amateur and commercial stations. Trunking systems let a large group of 2-way radio users (or even different groups of 2-way radio users) efficiently use a set of frequencies. 85 MHz, etc) without intermediate processing by ground stations. POL ARQ & SWEDISH ARQ usually contain diplomatic messages, some in plain language, some encrypted - these again are usually easy to decode - the content may not be!. An analog wave form (or signal) is characterized by being continuously variable. The memory device also includes a counter circuitry coupled to the decode logic circuitry that generates a counter value based on the decoded address. House Reps Ban Wireless Decoding. Please note that these scanners can still hear transmissions when placed in conventional mode - it will just be harder to follow conversations and weed out unwanted messages from other system users. One of the many Easter eggs hidden inside Portal 2 was the Ratman's dens. Working with the IC-R75 and IC-R20 - Handy Radio Software Posted on January 26, 2013 by lui_gough One of the perks of owning an IC-R75 \"conventional\" HF and IC-R20 handheld wide-band communications receivers is the ability for computer control. The interference was such that on. 4 Network Architecture. OK I understand it doesn't do encryption but it does appear to decode unencrypted digital tetra transmissions which is a new one on me as I never knew this was possible. 4 GHz frequency band. The transmission bits rate is 2Mbits/s between BTS and BSC. Start studying Ch. Analog and 2. Tool to decrypt/encrypt with ADFGVX. It involves three main subsystems, each containing functional units and interconnected with the others through a series of standard interfaces. 5 million, taxpayer-funded public safety radio project will go live in coming months. This radio looks similar to the AnyTone. Please see the DTR600 and DTR700. A brute-force attack to guess the key using current supercomputers would take several. MULTI-DIGITAL VOICE DECODER ARD300 is a digital voice decoder to be connected to a radio receiver’s I. The Link Layer (LL) protocol manages the Bluetooth low energy radio transmissions and is involved in starting link encryption. The largest array of platforms. Sometimes it is possible to tune in a RTTY signal perfectly, but still get jibberish, this is when the signal is encrypted. Has anyone tried this, I'm guessing most transmissions are encrypted but expect there to be quite a few that aren't?. 256-bit encryption is a data/file encryption technique that uses a 256-bit key to encrypt and decrypt data or files. This APCO P25 Decoder Plug-in makes it possible to receive and listen to digital APCO P25 channels on WiNRADiO WR-G315 Series receivers. Don Schimmel's Radio Intrigue. FCC Considering Proposal For Encrypted Ham Radio 371 Posted by timothy on Wednesday June 26, 2013 @09:26AM from the technocrat-perspective dept. • Not P25 Compliant • Compatible with ARC4 encryption in other radios. Radio Encryption Background. “Our reasons (are) to provide an updated radio system, protect the public’s privacy, and protect our officers as they work day in and day out to provide a service for the city of Manchester. Scanners such as the APCO 25 model in development by Uniden do not facilitate the decoding of any encrypted transmissions including transmissions by national security and law enforcement authorities such as the CIA, DEA and U. Reed-Solomon Encoder and Decoder are commonly used in data transmission and storage applications, such as broadcast equipment, wireless LANs, cable modems, xDSL, satellite communications, microwave networks, and digital TV. Monitoring AERO transmissions with MULTIPSK How to decode AERO transmissions with Multipsk (V. Analog voltages representing voice signals are produced by an electro-acoustical de-vice such as a microphone in a telephone set. When you receive an encrypted call, your radio unmutes and you can hear clear speech if the received call is encrypted with a key that matches a key stored in your radio. The ALE HF radio addressed in this section was recognized at publication time as being used in the field but not necessarily representative of all the ALE HF systems. The difference between basic and encryption is the level of security offered. In the Aeris CDMA network, the network transmission of data is very secure. Note: these are also technically not ‘encryption’ but rather a scrambling and unscrambling of your transmission as per an assigned ‘key code. Most of these messages are distress signals from. 0 Aux Module Audio Receiver. It doesn't matter how you encode the signal if you publish the method to decode it. No user commented in \" Security researchers crack APCO P25 encryption \". Did you not even read the title of this story, \"Police Encrypt Radios To Tune Out Public\"? What good are the recordings of encrypted comms? I'm obviously talking about publishing the unencrypted content. T he BSC is responsible of all functions related to radio transmission like handover, resource. Digital technology is expensive so unfortunately there is no low-end/low-cost digital scanner model. 45 notes &. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmetric encryption. next steps would be decode the data for the. The encrypted test data will be input to the Android aircraft-tracking display software. The satellite televisions first hit the market in the early 1990's. You can't encrypt FPV because you are using a HAM radio license to operate the equipment. Any other HAM radio operators noticed this?. Now to Sitor B (Simplex Teletype Over Radio Mode B), another non-voice mode we can use to decode WLO transmissions. Two main types of data encryption exist - asymmetric encryption, also known as public-key encryption, and symmetric encryption. I identify the Auriga as being encrypted, it might be but as nobody on the team. So essentially they are encrypted but its more like trying to listen to a nextel radio or digital phone signal on an analog scanner. Several software decoding packages will be discussed later to help you get started with these modes. Having the support of a solid transport layer is a good start, but is the notion of an attacker intercepting and decoding our data transmissions the only threat? In many respects the most serious threat users should be concerned about is the potential for disruption of the radio communication, as it is not only possible but relatively easy. Are there any police radio scanners or computer programs out there that can de-crypt an encrypted digital transmission? The FCC certainly wouldn't allow that to sell in the US, but maybe you could buy something like that from a foreign county? I know digital can be heard with a proper scanner but not encryption. Network LinkBox Provides bidirectional IP data link encoding, transmission, and reception while serving as an Ethernet switch and payload controller onboard the aircraft. 9: EMS system communications. KSM Encryption/ Decryption Exercise 4/26 and 5/3 KSM, a licensed commercial station using vintage equipment and antennas at historic KPH on Pt. I wrote a while back about some of the things you cannot do on amateur radio. the p25 is the encoding scheme used. In this guide I will explain how to build an inexpensive SDR (software defined radio) that can be used to receive police, fire, taxi, and other digital radio transmissions. This is assuming it is not encrypted. If you wanted to send someone a secret message, you could use the ring to encode your message and send the encrypted message to your friend. Optionally DTMF decoding is also available. As it was going overhead, I managed to record what I believe to be 1200 baud AFSK transmissions from it (AX. Data is then formatted into bursts, with the required timing and training sequences and sent to the BBC through a dedicated serial port. The key is entered into both the encoder and decoder, this key then forms part of the encryption of the digital TV signal and any receiver with BISS-support with the correct key will decrypt. Adaptive decoding system for processing encrypted and non-encrypted broadcast, cable or satellite video data Abstract. I think you need to learn the difference between encoding and encryption, analogue and digital transmissions and the multiple layers of the stack you are looking at. RE: The Easy Days of Scanning are Gone: JOHNZ; To answer your question about encryption sequence, it is the code used to program the digital encryption program the radios use to keep their transmissions secret. Software-Defined Radio Decoder. design a radio packet capture device and related software named Z-Force to intercept Z-Wave communications. This allows system security administrators to efficiently and securely redistribute encryption keys on systems with. Beosat LM allowed you to receive 99 TV and radio programmes from 40 000km in space. An encryption algorithm or cipher \"codes\" the information to such a degree that it becomes extremely difficult to listen to radio transmissions without authorization, the proper decoding equipment, and the correct key. Make sure to check out my follow-up guide , where I go over broadcasting signals from a Raspberry Pi in the radio spectrum by simply adding a piece of wire. The TK-2170/3170 internal VOX (voice-operated transmission) circuitry provides automatic PTT and a 10-level sensitivity adjustment for different ambient noise levels. To keep messages from being understood by the enemy required encryption. This is just a new angle of attack against amateurs using their equipment to pass email over HF. If you can’t run fldigi, give Sorcerer a try. Edward Snowden Thinks Alien Transmissions Might Be Hidden by Encryption if they are properly encrypted, radio, and illustration. More information about P25 Phase 2 (P25) Phase 2 refers to P25 requirements and standards for a digital Common Air Interface (CAI), Time Division Multiple Access (TDMA) based, which provides one voice channel per 6. Surprisingly, radio technologies used for geolocation and tracking of aircraft are quite classic and easy to listen/decode, still nowadays. After upgrading its citywide radio system, the department decided to encrypt its transmissions, making it impossible for citizens to listen to Manchester police broadcasts on scanners or. Jason Holland either the interception and divulgence of radio transmissions that are. WLO transmits weather information via Sitor B immediately after RTTY transmissions, switching back and forth, which makes for even more fun!. The only prohibition that I found in the Act pertained to intercepting encrypted subscription services. By synchronous we mean that is has start and stop bits in addition to the 5 data bit. multiplexed 16 kbps channels) format. Many public safety radio systems today are digital and designed in. I wouldn't know. It's intended purpose is for experimentation and amateur ham radio usage. Sometimes it is possible to tune in a RTTY signal perfectly, but still get jibberish, this is when the signal is encrypted. as having communicated with DGI via shortwave encrypted transmissions from Cuba. V-scanner technology saves complete radio configurations within the radio, for recall into main memory as needed in the field. If people would do a bit of research, they'd see that. At times, the term encoding is confused with encryption. Learn vocabulary, terms, and more with flashcards, games, and other study tools. 7 MHz IF output. Proving intent to obscure is another issue. Radio Check Check if another radio is active on a system without notifying the user Decode Only Yes Digital Telephone Patch Ability to connect to telephone system (requires additional hardware) No YesOption Transmit Interrupt Encode Radio can interrupt transmissions fromother radios Decode OnlyYesOption. Each of the characters represents a specific piece of information. RX1 and RX2 are FM receivers and decode AFSK 1200 bps AX. 5 Mbps), E1. looking for resources/info to \"decrypt\" ~~police scanners~~ encrypted radio's I live in a town where no information is relayed to the local population even freedom of information acts seem to be bypassed. This allows system security administrators to efficiently and securely redistribute encryption keys on systems with. Decoding software. (See squelch. The Machine's \"voice,\" individual words taken from recorded conversations and strung together, was inspired by recordings of numbers stations. 5 MHz to 30 MHz. The largest array of platforms. used in VHF radio transmissions. Ham radio is a hobby for many and while it requires a license to transmit anyone can listen. However almost all P25 compliant radios have an encryption option (the department must pay for the add on) which allows with a push of a button to have the digital stream encrypted. Use the buttons on the left, check the index of burst encoders, or click any of the thumbnails below for more information on a particular device. This application note describes a KEELOQ® with XTEA encryption algorithm code hopping decoder implemented on a Microchip Mid-range Enhanced Flash MCU (PIC16F886). Demodulated audio can be passed to older DSD+ versions (and other programs) via VAC or VBC. After the video is compressed, the provider encrypts it to keep people from accessing it for free. OpenPoc is a Cross-Platform POCSAG-Decoder written in FreePascal/Lazarus. Monitoring AERO transmissions with MULTIPSK How to decode AERO transmissions with Multipsk (V. course: decrypting, decoding, deciphering, or descramblinq. 512 memory channels, 128 zones. First of all, amateurs are forbidden from broadcasting: that is, amateurs are prohibited from making transmissions of content transmitted with the intention that it be heard by the general public, either directly or indirectly. When I started this hobby it was mostly about voice transmissions and trying to get radio stations from overseas. (FLASH SALE) US $14. We will see that although the de-tails vary, basic ideas about information and communication apply to all forms of transmission. It involves three main subsystems, each containing functional units and interconnected with the others through a series of standard interfaces. On 27 September 2006, amateur radio transmissions in the 30 m band were affected by an English-language S06 \"Russian Man\" numbers station at 17:40 UTC. The code we provide is the original code for the radio supplied when the vehicle was first manufactured. Strange Airwaves: Mysterious and Spooky Unexplained Radio Broadcasts radio transmission is an enigmatic and very persistent broadcast from Russia that has come to. Of course, if someone really wants to be secretive and violate US amateur radio Part 97 rules by encrypting their transmissions or not identifying, that is a possibility. This APCO P25 Decoder Plug-in makes it possible to receive and listen to digital APCO P25 phase 1 channels on WiNRADiO WR-G305 Series receivers. The interference was such that on. Please sign up to review new features, functionality and page designs. Public key encryption is the. To accommodate this, the initial research was performed using a USRP B210 Software Defined Radio, coupled with a custom GNU Radio block designed to decode all of the possible packet configurations. With the one time pad, purely random numbers are used. POL ARQ & SWEDISH ARQ usually contain diplomatic messages, some in plain language, some encrypted - these again are usually easy to decode - the content may not be!. HF and VHF-UHF Monitoring System is designed and integrated for the purpose of passive interception, logging and analysis of target HF or VHF/UHF radio links operating in frequency range from 1. The scrambling is the easy part. “The Asheville Police Department does not currently have any encrypted radio channels to decode. AIS (Automatic Identification System) Decoding. If I make a black box to decode the transmissions and create some sort of artificial scarcity (i. Encryption scrambles the digital data in such a way that it can only be decrypted (converted back into usable data) if the receiver has the correct decryption algorithm and security keys. The interference was such that on. The Police Departs have just about all gone over to the new 700 mhz AES encrypted truncated voice transmission. (Encoding and decoding are used in data communications, networking, and storage. The GX4000-received RF signal cannot be demodulated or decoded by a non-Fujitsu radio, as the GX4000 uses a Fujitsu-patented framing process. wThe bit stream is received by the decoder of the receive terminal which converts it back to a speech-like waveform. Transmitting Data Long-Distance With Morse Code ok to use public/private key encryption in ham radio to prove identy. Being sound an inherently local-area physical media, keys can. To keep messages from being understood by the enemy required encryption. While I won't point to any specifics, there are no cost and low cost capability available on the internet to decode these transmissions. Software-Defined Radio Decoder. 4 Network Architecture. It is sad to say but I feel that radio scanning as a hobby will soon be dead. We hope that all hams choose to play it straight and follow the rules, in which case anything that you say over the air can be picked up. Encryption of public airwaves by the government is a highly debated issued in the US & most states have some form of encryption. Please do not add agencies that encrypt tactical or other sensitive communications - this page is to only list agencies that encrypt general dispatch operations (police, fire, ems dispatch ops). Surprisingly, radio technologies used for geolocation and tracking of aircraft are quite classic and easy to listen/decode, still nowadays. These include: • Telephone conversations (cellular, cordless, or other means of private telephone signal transmission) • Paging transmissions • Any intentionally decoded scrambled or encrypted transmissions. the entire radio system. The problem is that if I'm looking for new stuff I sometimes come across a data signal and I wanted to be able to load that frequency in an SDR and have the SDR software do analysis on it to see what type of digital data it is. SkyHopper PRO V delivers long range and Non-Line of Sight (N-LOS) communication that supports multiple transmission modes. Compression is not encryption. This part of the website describes a number of solutions that were developed for high-speed burst transmission of messages. 825MHz Packet Radio downlink. This type of cipher is somewhat flexible in the sense that it may vary the encryption as the text is being processed. OK I understand it doesn't do encryption but it does appear to decode unencrypted digital tetra transmissions which is a new one on me as I never knew this was possible. What makes radio transmission possible. cellular telephone transmissions and the decoding of scrambled transmissions. Decoding of encrypted private-line (PL) signals occur here. We then present the. The IC-F5013/H series has 8 channels. Working with the IC-R75 and IC-R20 – Handy Radio Software Posted on January 26, 2013 by lui_gough One of the perks of owning an IC-R75 “conventional” HF and IC-R20 handheld wide-band communications receivers is the ability for computer control. You can pick up transmissions, decode. RF / IR Encoder / Decoder Chipset RF Eval2 Board, (SA123) RF600E RF600D Transmitter Encoder RF600E Operational Description The RF600E is a simple device to use. encryption Every transmission made by a amateur-radio station must done as such the regulator must be able to decode the encrypted voice. The AN/PRC-150 I radio, refer to Figure 3-1, provides units with state of the art HF radio capabilities in support of fast moving, wide area operations. TETRA - TErrestrial Trunked Radio Emma S odersrtr om April 18, 2016 1 Introduction TETRA, TErrestial Trunked Radio, is a digital land mobile radio standard developed by ETSI (The European Telecommunications Standards Insti-tute) with the primary function to ful l the needs that Professional Mobile. Strange Airwaves: Mysterious and Spooky Unexplained Radio Broadcasts radio transmission is an enigmatic and very persistent broadcast from Russia that has come to. This may be required for some covert operations or for the police services. Index of burst encoders. Now to Sitor B (Simplex Teletype Over Radio Mode B), another non-voice mode we can use to decode WLO transmissions. The Inmarsat “ClassicAero” channel P service consists of the transmission of downlink messages from geostationary satellites (Inmarsat 3F1, 3F2, 3F3, 3F4, 4F1 and 4AF4) to airliners in transcontinental flight. On the flip side, be aware that using this tutorial and feeding the audio to Radio Reference and Broadcastify may not make agencies happy. Project 25 Explained. Whie searching for a decoder for a particular mode (that is only commercially available so it seems) I came across this decoding software and decided to give it a try. 2 Analog and Digital Transmission Subscriber loops carry two basic types of telecommunications traffic: voice and data. The structure of a GSM network relies on several functional entities, which have been specified in terms of functions and interfaces. 7 MHz IF output! It's true! Now you can receive standard (unencrypted) APCO Project 25 digital signals using an ordinary analog receiver that has a 10. Do not open your scanner’s case to make any modifications that could allow it to pick up transmissions that are illegal to. 25 data pack-ets. com offers 86 video encrypted transmitter products. The difference between basic and encryption is the level of security offered. Support format: For FLAC WAV WMA MP3 APE. They were running on line 157 337 north to south. Marconi and the First Wireless Transmissions Radio Frequency (RF) and wireless have been around for over a century with Alexander Popov and Sir Oliver Lodge laying the groundwork for Guglielmo Marconi’s wireless radio developments in the early 20th century. The detailed process differs with the types of RNTIs, but generally speaking all of these RNTI is used to scramble the CRC part of the radio channel messages. As shown in the typical application circuits, it requires only the addition of input switches and RF circuitry for use as the transmitter in the end application. House Reps Ban Wireless Decoding. Quantum Encryption Messages You Can Only Read In One Location A conventional wireless transmission is then used to send the \"key\" needed to make sense of the quantum data and establish a. How Encryption Works by Jeff Tyson The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. wireless channels channel coding convolutional codes cryptography multimedia communication radio networks telecommunication security Viterbi decoding Viterbi decoder hardware-efficient encryption multimedia data distribution multimedia data retrieval wireless network secure transmission Rijndael advance encryption standard AES algorithm. Surprisingly, radio technologies used for geolocation and tracking of aircraft are quite classic and easy to listen/decode, still nowadays. Decoding a nice weather map can be quite rewarding. Back to Back Kit. Offering safe, reliable communications, the Hytera PD792IS handheld digital radio with screen and full keypad has been designed to comply with the highest 'ia' standards making this the ideal communication solution for working environments that require advanced, intrinsically-safe devices. The advent of mobile apps and websites that allow more people than ever to listen to police radio chatter is prompting local law. In Season 5, it's revealed that Samaritan is communicating with its operatives via Fake Static in radio transmissions, forming an encrypted morse code. Encryption can help ensure that data doesn’t get read by the wrong people, but can also ensure that data isn’t altered in transit, and verify the identity of the sender. scramble, encrypt. The latest Tweets from Guido (@DecodeSignals). Owner's Manual: Hytera PD362i Digital Portable Radio Owners Manual. on a normal analog receiver, the digital transmission is just a buzz which is what you hear. If I make a black box to decode the transmissions and create some sort of artificial scarcity (i. Decoding is the opposite process -- the conversion of an encoded format back into the original sequence of characters. This algorithm is controlled by an encryption key. High-throughput is disabled on a BSSID if the encryption mode is standalone TKIP or WEP. Ham, also known as armature radio, spans many frequencies but with a low-cost SDR receiver it is possible to listen as none of the transmissions are encrypted. Feb 22, 2015 · Police radio to go silent as Toronto cops move toward encrypted communications about how police radio encryption will change news. radiation pattern of the antennas, and GX4000 impulse radio technology, there is essentially no chance of decoding or descrambling the IR signal. Decoder Equipment A satellite receiving dish and decoder is installed at each client's premises. HF and VHF-UHF Monitoring System is designed and integrated for the purpose of passive interception, logging and analysis of target HF or VHF/UHF radio links operating in frequency range from 1. ADFGVX is a German encryption system unsing a 6x6 square grid and letters A,D,F,G,V,X and then this ciphertext get a permutation of its letters (transposition). Are there any police radio scanners or computer programs out there that can de-crypt an encrypted digital transmission? The FCC certainly wouldn't allow that to sell in the US, but maybe you could buy something like that from a foreign county? I know digital can be heard with a proper scanner but not encryption. Sending the key in this manner preserves security while avoiding the need for a hardwire connection. We set up a small Lab and did a bit of testing to show you what can be done and created a few short video examples. As the encryption sync. Air Encryption = 1 means that there has been a license for encryption applied to the network as a whole. DEA is an improvement of the algorithm Lucifer developed by IBM in the early 1970s. Encryption keys will need to be exchanged through some key management protocol outside of the T. -It extracts the individual channels from the larger satellite signal. Encryption circuit 134 acts as the encryption means during radio transmissions and as the decryption means when radio 100 is receiving encrypted messages. When an address match occurs the RF600D asserts its 4 digital outputs. What happens when an encrypted transmission is received by the SDS's? illegal for a radio to receive encrypted transmissions nor. Aggregation is not. Beosat LM could be expanded at a later date with a Power Positioner module which allowed control of motorised dishes. Also, numerous types of encoding schemes are used in radio communications. Encryption can help ensure that data doesn’t get read by the wrong people, but can also ensure that data isn’t altered in transit, and verify the identity of the sender. Cryptography, often called encryption, is the practice of creating and using a cryptosystem or cipher to prevent all but the intended recipient(s) from reading or using the information or application encrypted. Encryption and Encoding through Satellite TV. The Radio is an item that can be constructed with the Habitat Builder. We then present the. In Season 5, it's revealed that Samaritan is communicating with its operatives via Fake Static in radio transmissions, forming an encrypted morse code. DE 35 36 820 C2 and the ISO standards 14819-1, -2 and -3 describes a method for the radio transmission of encoded traffic messages. When the communication needs to be established over a distance, then the analog signals are sent through wire, using different techniques for. About us Barix is a skills-based company, always looking for the most cost-effective way to build quality products. ADFGX is a German encryption system, an old version of ADFGVX cipher, which uses a 5x5 square grid and a double mechanism of substitution then transposition. Buy 8-12KM UAV VIDEO & Bi-directional Data Radio Links directly with low price and high quality. Secrecy Beyond Encryption: Obfuscating Transmission Signatures in Wireless Communications Hanif Rahbari and Marwan Krunz, University of Arizona Abstract—The privacy of a wireless user and the operation of a wireless network can be threatened by the leakage of transmission signatures, even when encryption and authentication services are employed. Occasionally police departments with encrypted systems will provide a system radio with basic talkgroups to media, wreckers, neighboring agencies and others that might have a legitimate need to monitor them. Without it you hear nothing useful. RE: The Easy Days of Scanning are Gone: JOHNZ; To answer your question about encryption sequence, it is the code used to program the digital encryption program the radios use to keep their transmissions secret. In data communications, Manchester encoding is a special form of encoding in which the binary digits (bits) represent the transitions between high and low logic states. SkyHopper PRO V supports Point-to-Point communication with multiple viewers and offers built-in flexibility to best optimize to specific customer challenges. This is done to comply with the legal requirement that scanners be manufactured so they are not easy to modify to pick up these transmissions. Use the --nocrypt functionality to silence occasional encrypted transmissions on mixed use tgids. We set up a small Lab and did a bit of testing to show you what can be done and created a few short video examples. and 20 MHz to 3 GHz respectively. Your option would be to do that on a data bearer, transporting the encrypted voice via IP. None of this will be prevented or mitigated by limiting through regulation alone the baud rate of HF transmissions in a single HF radio service. Back then, home dishes were costly and classy metal units that occupied a huge portion available space. Surprisingly, radio technologies used for geolocation and tracking of aircraft are quite classic and easy to listen/decode, still nowadays. Now to Sitor B (Simplex Teletype Over Radio Mode B), another non-voice mode we can use to decode WLO transmissions. AOR has created an APCO25 digital decoder for use with receivers that have a 10. So, unless you feel like reverse engineering a few receivers to. Please note that I am not speaking on behalf-of Microsoft or any other 3rd party vendors mentioned in any of my blog posts. 825MHz Packet Radio downlink. It does not allow decoding of encrypted communications. MOTOTRBO: Setting up AES Wayne Holmes. When the communication needs to be established over a distance, then the analog signals are sent through wire, using different techniques for. So again, the two functions are called: Xtea_decrypt(hopping, key1) : This function performs the actual decode The decrypted data is now in the hopcode buffer. Today you can buy AIS receivers at reasonable prices in ”any” shop. 4 Network Architecture. The Tx channel and talk back functions. Some new and cheaper equipment is far away. On the other hand, exploitation involves using the transmissions for intelligence and counter-intelligence purposes. RTTY or Radio TeleTYpe is very popular and transmitted at various speeds by amateur and commercial stations. I said nothing about decoding. Encrypted Transmissions. Jason Holland either the interception and divulgence of radio transmissions that are. 5 million, taxpayer-funded public safety radio project will go live in coming months. The decoding of wideband protocols like TETRA and. Decoding a nice weather map can be quite rewarding. Some of the more exotic modes e. These call signs are established to assist in the transmission and delivery of dispatches transmitted by radio, landline or teletypewriter systems. We're upgrading the ACM DL, and would like your input. course: decrypting, decoding, deciphering, or descramblinq. In data communications, Manchester encoding is a special form of encoding in which the binary digits (bits) represent the transitions between high and low logic states. Looking for rf radio module factory direct sale? You can buy factory price rf radio module from a great list of reliable China rf radio module manufacturers, suppliers, traders or plants verified by a third-party inspector. it is not encrypted, you need a \"key\" in addition to a decoder. This true I/Q Scanner is the first scanner to incorporate Software Defined Radio technology to provide incredible digital performance in even the most challenging RF environments. Things I have tried so far for scrambling/encryption. The receiving radio then turns this digital data back into a voice signal. The military grade frequency domain voice encryption built into the VS-1200-HS1G protects conversations against the most determined listeners. When used over radio frequency, the. In Season 5, it's revealed that Samaritan is communicating with its operatives via Fake Static in radio transmissions, forming an encrypted morse code. This device is designed for transmission of audio informations via encrypted radio channel. Tool to decrypt/encrypt with ADFGVX. Most public safety agencies are not encrypting their radio traffic, but rather shifting to \"trunked\" systems that use several (possibly 20 or more) frequencies at one time. As shown in the typical application circuits, it requires only the addition of input switches and RF circuitry for use as the transmitter in the end application. - Encrypted APCO 25 Police transmissions - GSM-R radio networks - GSM, Push to talk networks - Decode Raywood / Sigtec Mobile data terminals (Taxi companies) - Decode Police / Ambulance MDT's Please feel free to add any information to what I have just listed. When a subscriber is no longer a subscriber (he ceased to pay), the publisher simply stops sending the blob containing K encrypted with the corresponding K s. Signal analysis solutions can be tailor-made for specific customer requests for having the broad-based decoding ability for the numerous narrowband radio protocols like CODAN, CLOVER, PACTOR or others which are popularly used on HF radio and ACARS, POCSAG etc. (Encoding and decoding are used in data communications, networking, and storage. XTEA DECRYPTING Once the encryption key is generated, it is placed into key1 to be used for decoding the encrypted data. Quantum Encryption Messages You Can Only Read In One Location A conventional wireless transmission is then used to send the \"key\" needed to make sense of the quantum data and establish a. Project “ADS-B Receiver and Decoder” About 50% of all commercial aircraft are transmitting their navigation information (position, speed, heading and more) on 1090MHz. The TETRA radio system uses Time Division Multiple Access (TDMA) technology with 4 user channels on one radio carrier and 25 kHz spacing between carriers. The House Commerce Committee also voted to make it a crime to sell electronic gadgets that can \"decode encrypted radio transmissions for the purposes of. We're upgrading the ACM DL, and would like your input. the arduino no 1 is where I am doing programming to scramble/encrypt this sample of 16 bit and send to output voice codec which converts it back to voice and transmits it over aux cable or radio to the decoder side where decoding takes place.", "label": "Yes"} {"text": "Sony in the UK have announced the MDR‑DS6500 digital wireless 7.1ch surround sound headphones. That’s quite a collection of adjectives, so to break it down into the constituent parts…\nDigital wireless – All-digital wireless transmission resists noise and interference from other devices in the home. Automatic tuning switches seamlessly between RF channels in the 2.408 – 2.473 GHz range to optimise signal reception. Range approximately 100 m so you can roam your home while listening to you tunes.\n7.1ch – Exclusive to Sony, Virtualphones Technology (VPT) reproduces the soundstage of multi-channel speakers. Even if you’re listening to a stereo 2ch or 5.1 channel programme, VPT builds a virtual 7.1 channel stage that stretches behind and beyond the screen. There’s also a choice of selectable surround sound modes to optimise listening for movies, gaming or speech.\nSurround sound – Supporting Dolby Digital, Dolby Pro Logic IIx, DTS and DTS ES, the base station will take both digital optical and analogue inputs.\nHeadphones – Over the ear, weighing in at 320g. Pretty good looking too. When they’re not being used, you can rest the MDR‑DS6500 headphones on their wireless charging dock. Three hours charging time provides power for approx 20 hours listening time.\nAvailable in May for a £249. Not cheap. Full specs here too.", "label": "Yes"} {"text": "Streamline Your Room With Professional TV Installation\nAttention To Detail is TV Installation in Blackburns speciality. During a consultation, we’ll check on the size of your television, the surface for mounting, and determine whether you have a bracket or need one. All of the hardware you may need is provided during installation. We’ll even put extra effort into concealing the television wires behind the wall for a sleeker look. The final results of the bracket placement and wiring of your flat screen will be neat. HDMI Cables and Other Items for Your Project\nAll TV Installation in Blackburn technicians keep high-definition multimedia interface (HDMI) cables stocked at all times, so you won’t have to go to the store to buy a cable. Plus, our cables vary between 3′ and 100′, so you can get the exact length you need. Our technicians will have all the proper tools and everything they need to make your TV mount installation project look as neat and professional as possible.\nTV Mounting Service in Blackburn\nAll of TV Installation in Blackburn services are available at a flat fee rate. We offer tilting, flush, and slim or low-profile brackets and full motion brackets. Our wall mounts can hold televisions from 22″ up to 120″, and our brackets can hold from 32″ up to 80″ televisions. The wall mounting hardware ranges in price from £49.99 to £229.99. Standard installation and mounting of televisions start as low as just £89.00\nPut your mind at ease!\nAll of our techs are fully certified and trained.\nWe will show respect to your home and make sure you are informed of the entire process along the way.\nAnd after the installation is done…\nEnjoy a Two-Year Quality Guarantee on all of our work!\nRestart the iPhone or iPad that provides Personal Hotspot and the other device that needs to connect to Personal Hotspot. Make sure that you have the latest version of iOS. On the iPhone or iPad that provides Personal Hotspot, go to Settings > General > Reset, then tap Reset Network Settings.\nHow do I connect my mobile hotspot to my Smart TV?keepmemag2020-04-28T13:26:18+00:00\n3 easy ways to connect your Smart TV to the internet\nBinge on Netflix boxsets by connecting your Smart TV to the internet – here are 3 easy ways to do it…\n1. The wireless option – connect over your home Wi-Fi\nMost new Smart TVs are Wi-Fi-enabled, meaning they have a wireless adapter built-in. Connecting to the web takes just a few minutes – but this option works best when your TV is in the same room as the router.\nBenefits of a wireless connection\nThere are no trailing wires – perfect for keeping your living room uncluttered\nYou have the freedom to place your TV anywhere in your living room, which makes it the best option for wall-mounting\nIt’s incredibly simple to set up – simply press a few buttons on your TV remote\nHow to connect\nHit the Menu button on your TV remote\nChoose the Network Settings option then Set up a wireless connection\nSelect the wireless network name for your home Wi-Fi\nType your Wi-Fi password using your remote’s button.\n2. The wired option – plug directly into your router\nWant the strongest, most stable connection? Plug your TV directly into the internet router via an Ethernet cable. Your TV must be close to your router.\nWhen you’re connecting multiple devices, make sure your connection stays strong by opting for a powerful beamforming router.\nBenefits of a wired connection\nIt’s simple to set up – just plug it in\nIt provides the most reliable connection – your streaming should be free from buffering\nIt’s much faster than Wi-Fi\nHow to connect\nFind the Ethernet port on the back of your TV\nConnect an Ethernet cable from your router to the port on your TV\nSelect Menu on your TV’s remote and then go to Network Settings\nSelect the option to enable wired internet\nType your Wi-Fi password using your remote’s buttons\n3. When your TV is upstairs, use a powerline\nTV upstairs or in another room from your router? It doesn’t mean you can’t watch Netflix or iPlayer.\nThe further away you are from your router, the weaker the signal becomes. But you can extend the reach of your home network for smoother streaming with a powerline kit.\nA powerline kit includes 2 adapters and 2 Ethernet cables. Once the adapters are plugged into power sockets and your router, the internet signal is sent down your electricity cables.\nBenefits of powerline\nIt delivers a strong internet connection upstairs or through thick walls\nYou will extend the internet to the far corners of your home\neasy to set up\nHow to connect\nPlug the first powerline adapter into a socket in the same room as your router\nUse an Ethernet cable to connect the adapter to your broadband router\nPlug the second powerline adapter into a socket in the same room as your Smart TV\nThen plug an Ethernet cable into the Ethernet port on your Smart TV\nConnect the other end of the Ethernet cable to your powerline adapter\nHow fast is your broadband? Watching online video is the main benefit of Smart TV.\nThe faster your broadband the better quality your catch-up TV, series binges and movie nights will be.\nParticularly if your Smart TV is also 4K UHD. Netflix and Amazon stream a selection of movies and TV shows in 4K.\nSuper-fast broadband will give you the best possible regular streaming experience – and it’s near-essential for 4K steaming.\nCan I use my phone data on my TV?keepmemag2020-04-28T13:18:38+00:00\nNearly all smartphones and tablets can plug into a TV’s HDMI port using a USB cable like this 6-foot Data Cable for USB-C. Once connected, you can project your phone’s display onto your TV – whether you’re checking out pictures, watching videos, surfing the web, using apps or playing games.\nDo smart TVs have built in WIFI?keepmemag2020-04-28T13:17:30+00:00\nA smart TV uses your home network to provide streaming video and services on your TV, and smart TVs use wired Ethernet and built-in Wi-Fi to stay connected. Most current TVs support 802.11ac Wi-Fi, but watch for older models, which may still use the older 802.11n standard.\nCan I Watch A Smart TV Without Internet?keepmemag2020-04-28T13:16:14+00:00\nSmart TVs can connect to the internet via a wired Ethernet connection or through built-in Wi-Fi that allows it to connect to the home broadband network. * If the TV comes sans in-built Wi-Fi connectivity but supports mirroring, you can enjoy the internet even without Wi-Fi.\nDo smart TVs require Internet?\nThe major feature separating smart TVs and not-so-smart TVs is an internet connection. Nearly all smart TVs come equipped with both an Ethernet port and built-in Wi-Fi, though some older models may require an adaptor to enable the Wi-Fi functionality, so they should be able to connect from anywhere in your house.\nHow do you set up a Smart TV without Internet?\nHow to connect\nfind the Ethernet port on the back of your TV.\nconnect an Ethernet cable from your router to the port on your TV.\nselect Menu on your TV’s remote and then go to Network Settings.\nselect the option to enable wired internet.\ntype your Wi-Fi password using your remote’s buttons.\nCan you watch Netflix on a smart TV without Internet?\nAccording to Netflix, the answer is “No.” But, with PlayOn Plus, you can easily watch Netflix without an internet connection. You can then put that recorded Netflix show on any device (think iPad, iPhone, Android tablet, laptop) and watch that Netflix show or movie when you have no internet connection.\nIs it easy to set up a Smart TV?keepmemag2020-04-28T13:12:22+00:00\nMost new Smart TVs are Wi-Fi-enabled, meaning they have a wireless adapter built-in. Connecting to the web takes just a few minutes – but this option works best when your TV is in the same room as the router. Type your Wi-Fi password using your remote’s button.", "label": "Yes"} {"text": "Chinese manufacturer, Foxconn, has revealed that it has sold multiple communication patents to Google as the company wishes to strengthen its patent portfolio to protect its Android operating system from patent trolls.\nHon Hai Precision Industry Company also known as Foxconn, has been manufacturing electronics equipment ranging from connecting wires to smartphones for a number of technology companies. It gained global recognition for manufacturing Apple's iPhones in recent times. Foxconn currently holds 64,300 patents worldwide and has applied for 128,400 more patents. It was one of the Top 20 companies to hold patents in the US according to patent research firm, Envision IP.\nA report from the Wall Street Journal has revealed that Foxconn has now sold some of its communication-related patents to US-based software giant, Google, for an undisclosed amount of money.\nGoogle has been actively looking to strengthen its IP portfolio in wake of lawsuits filed by patent trolls against Android device makers. To expand its patent portfolio, Google acquired Motorola Mobility in 2011 but sold it to Lenovo in 2014, while retaining the ownership of the communication patents from the company.\nAlthough Google declined to comment on the report, Foxconn has provided a statement saying that it would continue research and development of technologies and continue \"transforming such investments into valuable intellectual property assets.\"\nSource: Wall Street Journal | Image via Bloomberg", "label": "Yes"} {"text": "Strong solar flare disrupts radio communications in North America\nAn intense X-level solar flare causes radio blackout in North America.\nSun's activity has increased over these past few weeks and it has generated numerous strong solar storms. Currently, Sun is in its 11-year solar cycle and it will reach its maximum next year, which will make these solar storms even more intense in terms of being a potential threat to satellites, power grids, the internet infrastructure and more. On Monday, a powerful solar flare was spewed out by the Sun that caused a radio and navigation signals blackout in North America as the energetic particles reached Earth.\nThe solar flare\nThe solar flare, which was rated as an X1.5, was the 20th instance of an X flare, which is known as the most powerful cluster of solar flares. According to solar physicist Keith Strong, the solar flare was of category 3 on the five-point scale developed by the U.S. National Oceanic and Atmospheric Administration (NOAA).\n\"The X1.5 Flare caused an R3 (strong) radio blackout event on the daylit side of the Earth (most of the US and Canada and the Pacific Ocean),\" Strong said on X (formerly Twitter). \"Frequencies below 5 Mhz were most affected and navigation signals degraded.\"\nThe solar flare occurred just after two days of weaker X flare which occurred on August 5. A total of two massive X-level solar flares occurred in the past two days, but this is not all, the sun is releasing multiple moderate solar flares and three have already occurred in the last 24 hours., as per space.com reports.\nU.K. space weather forecaster Met Office released a cautionary warning notice due to the presence of charged solar particles in Earth's atmosphere which can result in a mild solar radiation storm. For both passengers and crew aboard aircraft flying over polar regions, as well as astronauts in space, these charged particles can be harmful. Additionally, they can also harm satellites.\nEarlier experts reported that two coronal mass ejections (CME) rushed towards Earth. These CMEs can cause a geomagnetic storm when it touches the Earth's magnetic field. However, National Oceanic and Atmospheric Administration( NOAA) model reported that the two CMEs have merged by cannibalizing the first, making it more intense and powerful. This CME can lead to a G3-level storm, which can disrupt power grids and telecommunication systems.", "label": "Yes"} {"text": "Leveraging Steering and Homing Capabilities for Enhanced Performance\nIsrael Aerospace Industries (IAI) and Iron Drone announced a collaboration agreement on 29 June for the integration of interception capabilities into IAI’s advanced anti-drone system, DRONE GUARD.\nIntercepting drones can be launched by day or night from a docking station that hosts several ready-to-use drones. Several drones can be launched simultaneously to address multiple targets or swarms.\nIAI ELTA Systems, which develops and manufactures DRONE GUARD, has to date sold over 100 units that detect, identify and disrupt the operation of malicious drones. ELTA’s collaboration with Iron Drone is part of its strategy to collaborate with startups to leverage innovative technologies for existing systems to improve performance. ELTA is a global leader in remote sensing and radar systems, with a product portfolio that includes mission aircraft, national cybersecurity administration, ground robotic systems, anti-drone systems and homeland defense systems.\nZvi Yarom, General Manager of ELTA’s Land Systems Division, commented “The collaboration agreement and the integration of interception capabilities in IAI’s DRONE GUARD create a specialized solution for a broad range of threats. DRONE GUARD represents Elta’s extensive know-how and experience in radars, intelligence, and AI combined with Iron Drone’s unique kinetic interception solution. The integration has been tried, proven, and demonstrated in several pilots and is now being marketed to customers. DRONE GUARD is one in a full suite of solutions offered by ELTA’s Land Systems facility under construction in Beer Sheba at an investment of over NIS 100 million [€25.7 MILLION]. It will help IAI build innovative technological infrastructures and implement R&D for novel land applications.”\n“The strategic collaboration with IAI’s ELTA Systems is a significant milestone for Iron Drone. The combination of DRONE GUARD’s advanced capabilities with Iron Drone’s steering and homing excellence result in a significant business and technological venture,” added Iron Drone CEO, Matan Melamed.\nThe advanced radar integrated with DRONE GUARD is capable of detecting drones as they enter the airspace. The intercepting drone is launched and steered to the target with the help of the radar, using sensors and computer vision to home and lock on the target up to the physical impact with the attacker and its neutralization. The entire process is autonomous, requiring no human intervention. The solution can be used in areas where other defensive systems cannot operate due to airports, populated areas, power plants, sensitive facilities or other infrastructure.", "label": "Yes"} {"text": "International Workshop on Spoken Language Translation (IWSLT) 2007\nThis paper is a description of the system presented by the LIG laboratory to the IWSLT07 speech translation evaluation. The LIG participated, for the first time this year, in the Arabic to English speech translation task. For translation, we used a conventional statistical phrase-based system developed using the moses open source decoder. Our baseline MT system is described and we discuss particularly the use of an additional bilingual dictionary which seems useful when few training data is available. The main contribution of this paper concerns the proposal of a lattice decomposition algorithm that allows transforming a word lattice into a sub word lattice compatible with our MT model that uses word segmentation on the Arabic part. The lattice is then transformed into a confusion network which can be directlv decoded using moses. The results show that this method outperforms the conventional 1-best translation which consists in translating only the most probable ASR hypothesis. The best BLEU score, from ASR output obtained on IWSLT06 evaluation data is 0.2253. The results confirm the interest of full CN decoding for speech translation, compared to traditional ASR 1-best approach. Our primary system was ranked 7/14 for IWSLT07 AE ASR task with a BLEU score of 0.3804.\nFull Paper Presentation\nBibliographic reference. Besacier, Laurent / Mahdhaoii, A. / Le, V.-B. (2007): \"The LIG Arabic/English speech translation system at IWSLT07\", In IWSLT-2007, 137-141.", "label": "Yes"} {"text": "An Operating System is the system software that is an interface between the user and computer hardware. It handles the computer’s hardware, memory, and processes.\nEvery computer system has an operating system running in the background, for the smooth functioning of other applications.\nThough all operating systems have similar functions, different operating systems can significantly make a difference in the user experience.\nOxygenOS vs Android\nThe difference between OxygenOS and Android is that OxygenOS is an Android-based operating system developed for OnePlus’ devices, while Android is an operating system developed for mobile touch screen devices. OxygenOS is developed by OnePlus, while Android is developed by Google, Open Handset Alliance, and others.\nWant to save this article for later? Click the heart in the bottom right corner to save to your own articles box!\nOxygenOS is a customized operating system based on Android, developed by Chinese phone company OnePlus, for use in their devices exclusively.\nIt was initially released in March 2015, as an operating system for overseas markets, with Hydrogen OS as its domestic counterpart in China.\nHowever, they were merged cohesively in 2016. Android is an operating system based on an updated version of Linux and other open-source software.\nIt is a mobile operating system for touch screen devices like phones and tablets. It is developed by a group of developers, majorly Open Handset Alliance and Google.\nIt is free and open-source software, which is usually shipped with additional pre-installed proprietary software.\n|Parameters of Comparison||OxygenOS||Android|\n|Description||OxygenOS is an optimized Android skin (Android-based operating system), which is designed to compliment OnePlus’ hardware.||Android is an operating system, made for touchscreen mobile devices like Smartphones and Tablets.|\n|First Developed||It was initially released in March 2015.||It was initially released in September 2008.|\n|Developed By||It is developed by the Chinese company OnePlus.||It is developed by many collaborators. Most shares are owned by Google LLC and Open Handset Alliance.|\n|User Interface||OxygenOS has certain user interface tweaks. E.g. less colorful icons, customized clock lock screen without 3rd party apps, etc.||Android’s icons are more colorful.|\n|Applications||It has made a few replacements for basic function apps. Additionally, it offers in-built special apps like Game Space, etc.||Android has Google apps for basic functions like Calculator, Messaging, Phone, etc.|\n|Updates||OxygenOS supports Android updates, but they tend to get introduced a bit late.||Android can be trusted with faster updates.|\n|Storage||It takes up more storage as compared to Android.||It takes up comparatively less storage.|\nWhat is OxygenOS?\nOxygenOS is an Android skin, which is highly customized to work with OnePlus’ hardware. This operating system is developed by Chinese company OnePlus for their devices exclusively.\nIt was first released in 2015 for the overseas market but was merged in 2016 with its domestic counterpart Hydrogen OS. Although it is based on Android, it has certain user interface tweaks, added features, and applications.\nFor instance, it has less colorful icons than Android, has a customized clock lock screen feature, and a different screenshot-taking experience. In contrast to Android, it has its own apps for basic functions like Calculator, Messaging, Gallery, etc.\nMoreover, it has added apps like Game Space, Zen Mode, App Lock, and Parallel Apps, that enhance the user experience without the involvement of 3rd party apps.\nBesides, OxygenOS supports Android updates, but a little later than Stock Android. It also takes up more space than Android.\nWhat is Android?\nAndroid is an operating system designed for mobile touch screen devices. It is based on Linux and other open-source software.\nIt is developed by a consortium of developers led by Open Handset Alliance and Google LLC. It was first released in September 2008.\nIt is open-source and free software, which is usually accompanied by pre-installed proprietary software. This mostly includes Google Mobile Services (GSM), which has core apps like Chrome, Play Store, etc.\nAndroid is quite basic as Google prefers it to be so that things run smoothly. Many companies these days are developing their Android skins to differentiate themselves, e.g. OxygenOS by OnePlus, OneUI by Samsung, MIUI by Xiaomi, ColorOS by Oppo, etc.\nAndroid thus has Google apps for basic functions, while specific apps can be installed for other purposes.\nIts icons are more colorful. Besides, it can be updated to Android’s latest version and takes up less storage than its customized skins.\nMain Differences Between OxygenOS and Android\n- OxygenOS is an Android-based operating system made for OnePlus’ devices. Android, on the other hand, is an operating system designed for touch-screen mobile devices.\n- OxygenOS was first released in March 2015, while Android was first released in September 2008.\n- OxygenOS is developed by Chinese phone manufacturing company OnePlus. Android is developed by Google LLC, Open Handset Alliance and others.\n- OxygenOS has introduced certain user interface tweaks. For instance, its icons are less colorful than Android icons. It also has customized clock lock screen and a different screenshot experience.\n- OxygenOS had introduced its own apps for basic functions like Calculator, Phone and Gallery, whereas Android uses Google apps. OxygenOS also has added apps like Game Space, Parallel Apps, App Locker and Zen Mode; for whose purposes Android has to rely on 3rd party apps.\n- OxygenOS supports Android updates, but they are introduced later than in Android.\n- OxygenOS takes up larger storage than Android.\nI’ve put so much effort writing this blog post to provide value to you. It’ll be very helpful for me, if you consider sharing it on social media or with your friends/family. SHARING IS ♥️\nSandeep Bhandari holds a Bachelor of Engineering in Computers from Thapar University (2006). He has 20 years of experience in the technology field. He has a keen interest in various technical fields, including database systems, computer networks, and programming. You can read more about him on his bio page.", "label": "Yes"} {"text": "Our field crews use very effective site optimization procedures. They conduct a detailed assessment of a site and provide a full report on non-optimal areas. This is followed by a thorough examination of transmission lines and connectors, transmitter power, antenna down tilt and azimuth, spectrum emission mask, multicoupler and combining network tuning, DC battery cell short check and grounding resistance. Corrections are then made and the system is tuned to optimal values.\nWhile on-site, we also conduct a general site review to look for signs of moisture, corrosion, animal damage and other anomalies.", "label": "Yes"} {"text": "Night Vision Recording. Thanks to the 6 infrared LEDs without lighting on the front, LKSUMPT mini spy camera provides clear video recordings and photos even in.\nHidden Night Vision Cameras for 24-Hour Security. Monitor your home or office in any lighting condition with a hidden night vision camera from BrickHouse.\nUsing Invisible IR Night Vision, The Darkest Rooms Become Bright. Our spy cameras come with a secret that others don't. These have invisible IR sensors that.", "label": "Yes"} {"text": "For release: 03 Feb 2014\nTask group develops Phase I of RapidIO based open reference designs for use in organizations such as the Open Compute Project, Scorpio, Financial data centers, supercomputers and compute data center applications.\nAustin, TX – February 3rd, 2014 – RapidIO.org, the organization that promotes and develops standards for the RapidIO interconnect architecture announces the first public demonstration of the Phase 1 reference design released by the Data Center Compute and Networking Task Group (DCCN). The DCCN System, which will be shown at the Linley Group Data Center Conference February 5th & 6th in Santa Clara, California, is targeted at Server, Data Center and Supercomputing applications and showcases the strength of the entire RapidIO ecosystem with multi-vendor collaboration.\nThis initial DCCN reference design, built by RapidIO member Prodrive Technologies, is vendor and processor agnostic, and the design specifications are being made available to other open standards in the computing industry (e.g. Open Compute Project and Scorpio) and will also be available for use by OEM’s of computing and data center infrastructure, research labs and government organizations.\nKey features of the DCCN System include:\n- Processor Architecture independent\n- TI DSP/ARM 470 x 4 ≈ 2 Tflops\n- Freescale Dual core PowerPC @ 2.1 GHz x 4 (total 8 cores)\n- Intel x86 Quad Core i7 @ 2.1 GHz\n- Xilinx FPGAs\n- 412k x 4 = 1648k logic cells\n- 64k4 x 4 = 257k6 slices\n- IDT RapidIO 20 Gbps per port switching with 100ns latency and PCIe-2 to RapidIO 20 Gbps NIC\n- 8x 2.5″ HDD storage bays (SATA-3)\n- Up to four industry standard AMC daughter cards\n- 40G RapidIO Gen2 per daughter card\n- 2x 20 Gbps quad-lane\n- 80G RapidIO Gen2 to back rack\n- 4x 20 Gbps quad-lane\n- 20G RapidIO Gen2 Internal link bandwidth\n- 10G Ethernet per daughter card\n- 1x 10 Gigabit Ethernet\n- 40G Ethernet to back rack\n- 4x 10 Gigabit Ethernet\n- 2x 1G Ethernet to back rack\n- 4x 1G Ethernet to daughter card\n“Under the leadership of DCCN Task Group chair, Marco Rietveld (email@example.com), the DCCN team has worked collaboratively to create designs using existing RapidIO semiconductors, boards and firmware, to address the needs of server systems in 19 or 21 inch rack form factors. This work shows the tremendous benefits of the RapidIO architecture in general computing, super computing or analytics driven server applications that require low latency, low power and scalable peer to peer inter processor communication,” said Rick O’Connor, Executive Director of RapidIO.org, “We are very pleased with this result and look forward to showcasing the DCCN System at the Linley Group Data Center event on February 5th & 6th, 2014.”\nRapidIO.org, a non-profit corporation controlled by its members, directs the future development and drives the adoption of the RapidIO architecture. The RapidIO architecture promises lower-latency, increased bandwidth efficiency, lower cost and lower power. Interested companies are invited to join the RapidIO Trade Association to gain access to the standards development process. Detailed information on the RapidIO specification, products, design tools, member companies, and membership is available at www.RapidIO.org.", "label": "Yes"} {"text": "Elon Musk delivers first Tesla Semi electric truck with 800 km driving range to Pepsi\nElon Musk, delivered the truck via the Tesla's Nevada plant\nElon Musk led electric vehicle maker Tesla has delivered the company's first heavy-duty Semi electric truck to FMCG giant PepsiCo.\nElon Musk, delivered the truck via the Tesla's Nevada plant and said that the battery-powered, long-haul truck would reduce highway emissions.\nTesla first unveiled the electric truck in 2017, and revealed that the semi will be available in two configurations - 300-mile range version that would cost $150,000, and the 500-mile version will cost $180,000.\nHowever, the prices of the Tesla's passenger electric vehicle prices have increased sharply since then and the new prices are not out yet.", "label": "Yes"} {"text": "|bluesound node 3i||0.28||0.9||1854||34|\n|bluesound node 2i||0.28||0.6||5147||88|\n|bluesound node 2i review||0.06||0.9||5280||18|\n|bluesound node 2i manual||1.62||0.4||1344||85|\n|bluesound node 2i streamer||0.26||0.4||7321||19|\n|bluesound node 2i dac||1.44||0.4||2067||73|\n|bluesound node 2i stereophile review||0.99||0.1||1378||36|\n|bluesound node 2i test||0.61||0.3||7541||46|\n|bluesound node 2i app||1.17||0.2||154||57|\n|bluesound node 2i manual español||0.47||0.8||4795||89|\n|bluesound node 2i download||0.41||0.2||8358||58|\n|bluesound node 2i dac chip||1.08||1||6357||7|\n|bluesound node 2i price||1.94||0.9||3854||92|\n|bluesound node 2i vs audiolab 6000n||1.5||0.5||637||24|\nBluesound introduces (Gen 3) NODE & POWERNODE by John Darko May 10, 2021, 17:36 Bluesound has announced third-generation versions of its Node and Powernode streaming products that feature more powerful streaming hardware (for BluOS + Roon Ready + Spotify Connect + AirPlay 2), reworked DAC sections and (for the Powernode) more loudspeaker power.Does Bluesound node 2i play MQA?\nHigh-end DAC technology built into every Bluesound Player allows the NODE 2i to decode and stream MQA files in all their lossless glory. SET YOUR MUSIC FREE Featuring an array of analog and digital input and output options, the NODE 2i gives you infinite playback choices to rule your sonic domain.Does the node 2i support 24-bit streaming?\nWith state-of-the-art Bluetooth ® aptX ® HD, the NODE 2i can easily support 24-bit streaming directly from your phone or tablet, as well as transmit studio-quality music to Bluetooth headphones and speakers. High-end DAC technology built into every Bluesound Player allows the NODE 2i to decode and stream MQA files in all their lossless glory.What is the difference between the bluebluesound node N130 and N130?\nBluesound Node N130 is similar to its predecessors on the outside, but has better DAC, new controls and more inputs.", "label": "Yes"} {"text": "Scania has joined forces with Swiss technology company ABB to enhance its electric vehicle charging infrastructure, offering customers a complete EV solution for regional and urban transport. This partnership extends beyond 600kW charging, with plans for the introduction of advanced megawatt charging technology.\nScania has signed a global framework agreement with Swiss technology group ABB to provide charging infrastructure for its electric vehicles (EVs). This partnership is an extension of their existing collaboration. ABB E-mobility, the subsidiary responsible for EV solutions, will supply Scania with DC fast charging solutions ranging from 24 to 600kW. This agreement comes as Scania expands its lineup of electric trucks for regional and urban transport. By joining forces with ABB, Scania can now offer customers a complete EV package, including vehicles, chargers, services, and software.\nScania will create its network and offer ABB E-mobility’s DC fast charging solutions to its customers. While the Terra 360 charger, capable of charging up to four vehicles simultaneously, is mentioned in the agreement, commercial vehicles are likely to distribute the charging power to one or at most two vehicles at a time.\nThe collaboration goes beyond 600 kW, with ABB E-mobility and Scania successfully testing a megawatt charging system (MCS) earlier this year. The next version of MCS technology is planned for introduction in late 2024 or early 2025, while Scania intends to provide customers with EV trucks for regional transport equipped with a pre-release version of the standard MCS plug this year, with production starting in 2024.\nBoth Scania and ABB are involved in the development of the MCS standard as members of the CharIN CCS initiative, which demonstrated the Megawatt Charging System in mid-2022. This partnership allows Scania to benefit from ABB E-mobility’s global reach, local presence, and a broad portfolio of high-quality EV charging solutions and service support.", "label": "Yes"} {"text": "|This high-powered klystron emits a large radio-frequency signal that can be split into several signals and managed through vector modulators for several accelerator cavities at once. Photo: Joseph Piergrossi|\nAn accelerator test at Fermilab has shown that a proton beam could be accelerated with fewer radio-frequency power sources than previously used.\nA cavity is one of the elements in an accelerator that helps bring a particle beam up to the desired energy. As a particle beam travels down the axis of a cavity, the changing electric fields inside help kick the beam down the line. Klystrons power the cavities, sending them radio-frequency pulses to help propel the particles.\nA typical accelerator has multiple cavities, each one of which is hooked up to its own klystron. With the High-Intensity Neutrino Source accelerator at the Meson Detector Hall, one klystron drives six room-temperature cavities at once. (Despite its name, the HINS accelerator does not directly involve neutrinos. It accelerates protons.)\n“The point was to see if we could find a more cost-effective way of running an accelerator,” said Jim Steimel, an engineer for the project.\nA klystron is one of the more expensive devices on a linear accelerator. The purpose of having one klystron per cavity is to allow fine control of each cavity’s power and keep the particles accelerating at the correct rate. The HINS experiment showed that a single high-powered signal could be split among several cavities to the same effect.\n“Imagine you have a barrel with six taps,” said Sergei Nagaitsev, AD physicist. “Through each one you want to run water at a certain rate at a certain time. That’s what this accelerator does for RF power.”\nEach of the “taps” on the experimental accelerator has a vector modulator, which allows an operator to regulate how much power is flowing into a particular cavity. Steimel said programming the VMs was the most difficult part of building this type of linac.\n“One of the big issues was that because the VMs are high-power, they are not as fast,” he said. “Bandwidth becomes an issue.” A team led by Brian Chase, who leads the low-level radio-frequency group in the Accelerator Division, figured out how best to program the VMs to mitigate the bandwidth problem.\nThe test not only demonstrated that the single klystron could power six cavities at once, but more importantly that the vector modulators could properly distribute the power to each cavity. This approach is best applied in linacs that accelerate pulsed beams, as contrasted with so-called continuous-wave beams. Continuous-wave linacs will still require multiple radio-frequency power sources.\nSteimel anticipates that other accelerator projects will consider using this technology and is keeping the experimental setup open for others to continue research and development.\n“This is a very important demonstration because of the potential cost-saving benefit to future pulsed linacs,” said Associate Director for Accelerators Stuart Henderson. “Achieving this successful demonstration was the result of a lot of hard work by the HINS team.”\n“It was important for us to do this because others in the world were asking us how it would work,” Nagaitsev said.\nPhysicist and Project X Project Manager Steve Holmes said he is looking at the technology for possible use in the future downstream pulsed linac section of Project X.\n“It seems like such a natural approach to saving money,” Holmes said.", "label": "Yes"} {"text": "$349.99 Free Budget Shipping\nEARN 350 RAKUTEN SUPER POINTS™\nWhat are Rakuten Super Points™?\nGet rewarded when you shop! Earn 1 point per dollar spent. That's like getting cash back on every purchase. Easy to see matured points in checkout. Use points just like cash.Learn More\n|\"The Atlona AT-HD520 is designed to upscale analog video signal from Composite or S-Video input sources to digital HDMI output with wide-range of HDTV and PC resolutions; up to 1080p. This converter takes analog and digital audio and encodes it onto the HDMI output along with video for the complete HDMI audio and video high definition experience. Scaler has a comprehensive on-screen menu that allows user to select a variety of output resolutions and adjust picture settings.|\nThe Atlona Scaler is also capable of converting Pal to NTSC or NTSC to Pal.\"\nThe VGA2HDMIPRO Video Converter converts and scales analog PC video ...\nThe Atlona AT HD530 is designed to down convert HDMI ...", "label": "Yes"} {"text": "A group of companies have come together to develop and launch a secure Android running smartphone called Blackphone. With more emphasis being given on security these days and the recent NSA scandal taking privacy concerns to a whole new level, the Blackphone promises to keep your data/conversations safe and secure. The phone will be shown off at the MWC next month with pre-orders set to start immediately after but no further details have been provided at this point. With Android not exactly the most secure OS going around, it’s quite clear that the Blackphone will get considerable attention at the MWC.\nThe smartphone will reportedly give users the ability to make phone calls, send texts or even browse the internet using secure servers (via VPNs), thus making life a lot easier for those worried about privacy. The working and functioning of the smartphone has still not been shown off, so we will reserve judgment until we have a glimpse at the functioning of the device. The smartphone will be running on a skinned version of Android called PrivatOS according to the makers.\nVia: Phone Arena", "label": "Yes"} {"text": "AIRTEX AUTOMOTIVE DIVISION - Fuel Pump Wiring Harness - Part Number ... AIRTEX AUTOMOTIVE DIVISION - Fuel Pump Wiring HarnessRendezvous Fuel Pump Wiring Harness - 2002 Buick Rendezvous Fuel Pump Wiring Diagram ~ thank you for visiting our site, this is images about 2002 buick rendezvous fuel pump wiring diagram posted by Brenda Botha in. 19.03.2018 · 2001 buick rendezvous fuel pump wiring digram where should the voltage be on the connector under floor @ tank. Posted by darrell daldwin on Mar 16. A detailed step-by-step guide for how to connect the new wiring harness that may be supplied with a new fuel pump. Transcript: Hi everyone. Welcome to Delphi’s How-To Series Videos..\nelectric and wiring diagram ~ alexdapiata Buick Rendezvous Fuel Pump Wiring Diagram Century 2003 Radio Abs Home » car » 2003 buick rendezvous wiring diagrams. light pump motor light fishpack harness (option) battery battery cable engine ground harness starter aft bilge pump fuel fill fuse block harness fuel sender 2459 aft cockpit engine hatch transom shower (option) master breaker panel 2459 rendezvous owner’s manual supplement. Buick Rendezvous Replace Fuel Filter Every 30,000 to Prevent Fuel Pump Failure - 35 reports. Learn about this problem, why it occurs, and how to fix it..\nOrder Fuel Pump Wiring Harness for your vehicle and pick it up in store—make your purchase, find a store near you, and get directions. Your order may be eligible for Ship to Home, and shipping is free on all online orders of $35.00+. Check here for special coupons and promotions.. Fuel Safe manufactures the highest quality fuel pump wiring harnesses and racing fuel cell parts. Affordable prices and fast shipping. Buy Today! | Fuel Pump Wiring Harnesses - Racing Fuel Cell Parts | Fuel Safe Fuel Safe Fuel Cells and Racing Products. Cart . Log In. If the vehicle body harness wiring colors and sizes are not identical to the new electrical connector wiring, refer to wiring identification diagrams below and the vehicle service manual or equivalent to determine the correct wiring alignment for the new electrical connector. Wiring Identification Diagram Combination 1 Combination 2 Fuel Pump Ground Circuit Fuel Level Sensor Signal Circuit.\nWiring Diagram Data: Wiring Wiring Diagram » Fuel Pump Wiring Harness Diagram. Fuel Pump Harne • Mazda Rx7 Fuel Pump Rewire Diagram Tani • How To Repair Fuel Pump Assembly Part 2 • E30 Wiring Harne Diagram Fuel Pump Info • Kawasaki Mule 2500 Wiring Diagram Reinvent Your • Delphi Fuel Pump Wiring Diagram Davehaynesme • E60 BMW.\nInstalling a Fuel Pump with a New Harness Connector on a 1999-2003 ... How to identifying the Fuel pump wiring harness ...\n1998 Chevy S10 Fuel Pump Wiring Diagram Tail Light Elegant 88 ... 1998 Chevy S10 Fuel Pump Wiring Diagram Tail Light Elegant 88 Harness 1997 Blazer 8 5m Silverado\n97 Lesabre Wiring Diagram - Wiring Schematic 2019 • 1997 buick park avenue radio wiring diagram simple wiring diagram u2022 rh agholiday com 97 buick\nAmazon.com: ACDelco 10439026 GM Original Equipment Fuel Level Sensor ... Amazon.com: ACDelco 10439026 GM Original Equipment Fuel Level Sensor Wiring Harness: Automotive\n2003 Buick Rendezvous Ignition Diagram - Electrical Wiring Diagram Buick Regal Stereo Wiring Diagram Archive Of Automotive Wiring 2004 Buick Rendezvous 2003 Buick Rendezvous Ignition Diagram\n1999 Buick Century Radio Wiring Diagram - Reveolution Of Wiring ... 2000 buick century radio wiring diagram me for kuwaitigenius me rh kuwaitigenius me 1999 Buick Century Common Problems 1999 Buick Century Common Problems\nDelphi FA10003 Fuel Pump Wiring Harness Connector Oval Plug for ... Delphi FA10003 Fuel Pump Wiring Harness Connector Oval Plug for Chevy GMC New\nSPECTRA PREMIUM IND, INC. - Fuel Pump Wiring Harness - Part Number: FPW6 Fuel Pump Wiring Harness - SPC FPW6\nFUEL PUMP WIRING Harness with Oval Connector 4 Wire Pigtail for GM ... Fuel Pump Wiring Harness with Oval Connector 4 Wire Pigtail for GM Car Pickup 1 of 2FREE Shipping ...\n2002 Buick Rendezvous Fuel Pump Module Assembly | AutoPartsKart.com 2002 Buick Rendezvous Fuel Pump Module Assembly A0 F2532A ...\n2002 Buick Rendezvous Fuel Pump Wiring Diagram - Zookastar.com 2002 Buick Rendezvous Fuel Pump Wiring Diagram Simplified Shapes 1995 Nissan Truck Fuel Pump Wiring Diagram\nBuick Rendezvous - B P.C.M. MODULE & WIRING HARNESS (LA1/3.4E) > EPC ... Buick Rendezvous / Spare parts catalog EPC\nBuick Rendezvous Wiring - Another Blog About Wiring Diagram • rendezvous fuse diagram list of schematic circuit diagram u2022 rh orionproject co buick rendezvous trailer wiring harness buick rendezvous wiring diagram\nBuick Rendezvous Fuel Pump Wiring Harness Replacement (Airtex ... 2003 Buick Rendezvous Fuel Pump Wiring Harness (Delphi FA10003) Actual OE Part with 1x4 Connector .\nAirtex Fuel Pump Wiring Harness for 2002-2004 Buick Rendezvous 3.4L ... Airtex has manufactured fuel delivery, cooling, and electrical parts since 1935 and delivers unmatched quality that improves upon the design and performance ...", "label": "Yes"} {"text": "Chameleon Scarf with FLORA Color Sensor #WearableWednesday\nEver wish your clothes could change color to match each other? Make a chameleon scarf to match every outfit using the Flora color sensor and 12 color-changing LED pixels diffused by a ruffly knit scarf. Check out the video on YouTube (please subscribe!) and Vimeo, and make your own with the full tutorial on the Adafruit Learning System.\nFlora Color Sensor – TCS34725 – Your electronics can now see in dazzling color with this lovely color light sensor. We found the best color sensor on the market, the TCS34725, which has RGB and Clear light sensing elements. An IR blocking filter, integrated on-chip and localized to the color sensing photodiodes, minimizes the IR spectral component of the incoming light and allows color measurements to be made accurately. The filter means you’ll get much truer color than most sensors, since humans don’t see IR. The sensor also has an incredible 3,800,000:1 dynamic range with adjustable integration time and gain so it is suited for use behind darkened glass or fabric.\nAdafruit publishes a wide range of writing and video content, including interviews and reporting on the maker market and the wider technology world. Our standards page is intended as a guide to best practices that Adafruit uses, as well as an outline of the ethical standards Adafruit aspires to. While Adafruit is not an independent journalistic institution, Adafruit strives to be a fair, informative, and positive voice within the community – check it out here: adafruit.com/editorialstandards\nStop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.\nHave an amazing project to share? The Electronics Show and Tell is every Wednesday at 7pm ET! To join, head over to YouTube and check out the show’s live chat – we’ll post the link there.", "label": "Yes"} {"text": "Either end of the cable can be connected to the SATA drive or the connector on the board see Figure 8. Intel YAE desktop motherboard. Download Intel desktop board dgvhz audio driver. Page 33 will appear to be off the power supply is off, and the front panel LED is amber if dual colored, or off if single colored. How to fix it. The program can also read modern CPUs on-die core thermal sensors, as well has a hard drives temperatures via S.\n|Date Added:||17 February 2007|\n|File Size:||21.22 Mb|\n|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|\n|Price:||Free* [*Free Regsitration Required]|\nUsers can view stored images while recording and by using time-shifted viewing they can pause, resume, intel d865gvhz audio, and catch up to real time. Intel MSGX workstation motherboard. Microserver platform built around the Centerton Atom processor. The nomenclature was identitcal as the matching Intel part numbers led us to believe.\nThis site maintains the list of Intel Intel d865gvhz audio available for Download. Intel GM Ethernet controller. This download installs the integrated audio driver version 5. After installing this update, you can successfully install the audio drivers.\nReference unknown; see Intel d865gvhz audio disambiguation for possibilities. Here you can download. Paxvillea town in Clarendon County, South Carolina.\nPage 33 will appear to be off the power supply is off, and the intel d865gvhz audio panel LED is amber if dual colored, or off if single colored. If you are having problems with your HP Computer, the article below will help determine if the problem is with your HP Drivers. Intel dgvhz motherboard xp drivers.\nXeon series CPUs, dual-core and quad-core. The browser version you are using is not recommended for this site. Could help intel desktop board dgvhz sound drivers pillow measures Download intel reaek ac97 audio driver 5 intel desktop board dgvhz intel reaek ac97 audio d865gvh reaek ac97 sound driver intel ac97 audio.\nThe superhero nickname of the character Bart Intel d865gvhz audio. Possibly named after Medfield, Massachusetts. intel d865gvhz audio\nPower Menu Power Intel desktop board dgvhz audio Intel d865gvhz audio menu is for setting power management features. Reinstall the audio driver if necessary. D865vvhz unknown; see Bloomfield disambiguation for possibilities.\nIntel Desktop Board DGVHZ Specs – CNET\nType, Name, Driver, Size, Download. The first bit Xeon processor. Intel desktop board dgvhz audio driver. Downloading the latest Driver releases helps resolve Driver conflicts and improve your intel d865gvhz audio. Download Intel desktop board dgvhz audio driver.\nINTEL DESKTOP BOARD D865GVHZ AUDIO DRIVER FOR MAC DOWNLOAD\nDouble-click the file name to run the tool. Intel Pentium 4 processor 2. Based on the Barton Hills controller.\nAutomatically detect and update drivers and software Intel Desktop Boards. Intel desktop board dgvhz audio driver there are. Intel d865gvhz audio nie byla udreka, a Jesli intel desktop board dgvhz audio golf guest science polio artist przekraczajacej fight, wobec tego musi ta ausio couch. Thou should get this anger. The second-generation Celeron processor.", "label": "Yes"} {"text": "Although GPS tracking is the most accurate compared to WiFi based and cell tower based tracking techniques, there are a few factors could affect the accuracy of GPS positioning accuracy which could affect cell phone GPS tracking.\n1 The sun. Yes, the sun almost affects everything in the solar system. The magnetic field generated by the sun could have a direct impact on the GPS system and our cellular network.\n2 Weather. As the radio signal travels between the earth and the satellites, bad weather like rain, storm could cause signal attenuation, while we have better signal when it’s sunny and cloudless.\n3 Buildings. As we live in the city full of high buildings, this could reflect the signals. If you could barely see the sky, neither could your GPS or cell phone.\n4 Containers. Although you have a handset, you do not hold it in your hand all the time. In most cases, we put it in our pocket or bag which could reflect signal as well, luckily people do not use metal bags.\n5 Our body. Yes our body absorbs signal too, if you are in a crowded bus, the signal fades. Hey buddy, you stopped my signal.\n6 Metal. Metals could not only reflect signal, but also absorb it. So never put your mobile device in a area full of metallic or electronic products.\n7 Multipath. The GPS receiver could receive radio signals following multipath, as buildings, trees and other things can reflect radios.\n8 GPS chip. Now the mostly used GPS chip is SiRFstar III (GSW 3.0/3.1), it has lot improvements in the hardware and software to provide better sensitivity and anti-interference.\n9 Clock errors. Timing is critical to GPS, and the GPS satellites are equipped with very accurate atomic clocks, but they are not perfect and slight inaccuracies can lead to errors.\n- Get ready for GPS Block III\n- Free cell phone GPS logger for BlackBerry devices\n- China launched its fourth satellite of Compass navigation system\n- Tracking cell phone locations with Google Maps for mobile\n- How to take advantage of A-GPS on your handset\n- How to speed up satellites acquisition on your cell phone\n- Differences between GPS and A-GPS", "label": "Yes"} {"text": "Hdmi Over Cat5 Wiring Diagram– wiring diagram is a simplified tolerable pictorial representation of an electrical circuit. It shows the components of the circuit as simplified shapes, and the capacity and signal contacts in the midst of the devices.\nA wiring diagram usually gives counsel just about the relative aim and promise of devices and terminals upon the devices, to support in building or servicing the device. This is unlike a schematic diagram, where the deal of the components’ interconnections on the diagram usually does not come to an agreement to the components’ swine locations in the finished device. A pictorial diagram would behave more detail of the visceral appearance, whereas a wiring diagram uses a more figurative notation to bring out interconnections on top of monster appearance.\nA wiring diagram is often used to troubleshoot problems and to create distinct that all the contacts have been made and that whatever is present.\nhn 3348 wire diagram for cat5\nArchitectural wiring diagrams take effect the approximate locations and interconnections of receptacles, lighting, and steadfast electrical facilities in a building. Interconnecting wire routes may be shown approximately, where particular receptacles or fixtures must be upon a common circuit.\nWiring diagrams use welcome symbols for wiring devices, usually different from those used upon schematic diagrams. The electrical symbols not and no-one else operate where something is to be installed, but afterward what type of device is subconscious installed. For example, a surface ceiling vivacious is shown by one symbol, a recessed ceiling spacious has a alternative symbol, and a surface fluorescent well-ventilated has unorthodox symbol. Each type of switch has a interchange metaphor and fittingly attain the various outlets. There are symbols that feint the location of smoke detectors, the doorbell chime, and thermostat. on large projects symbols may be numbered to show, for example, the panel board and circuit to which the device connects, and after that to identify which of several types of fixture are to be installed at that location.\ncat 5 diagram wiring schematic wiring diagram\ntv 3250 hdmi tv cables diagrams wiring diagram\nA set of wiring diagrams may be required by the electrical inspection authority to espouse association of the house to the public electrical supply system.\nWiring diagrams will also total panel schedules for circuit breaker panelboards, and riser diagrams for special services such as flame alarm or closed circuit television or additional special services.\nYou Might Also Like :\n- 2002 Pontiac Grand Prix Wiring Diagram\n- Wiring Diagram for atv Winch\n- 2001 F350 Tail Light Wiring Diagram\nhdmi over cat5 wiring diagram another picture:\npw hts0104iri poci 1×4 port hdmi splitter extender verteiler ultra hd 1080p ohne verzogerung 60m uber cat6 kable unterstutzt edid and iri 1 in 4 outi\ndetails zu braided ultra hd hdmi cable v2 0 high speed ethernet hdtv 2160p 4k 3d chrome\n4k hdmi cat extender set sender empfanger zum hdmi", "label": "Yes"} {"text": "29th October 2018\nJoin CDEC and Leyard on the 29th October at Wimpole Street, London, for a demonstration of the Leyard TVF Series LED Video Wall Displays.\nStackable LED Video Walls\nThe Leyard® TVF Series is a family of fine pitch LED video wall displays from the worldwide leader in fine pitch LED video walls. Available in 1.5, 1.8 and 2.5 millimeter pixel pitches, the Leyard TVF Series gives new meaning to multi-functionality and quick installation by offering front serviceability and a creative stackable design that eliminates cabinet-to-cabinet cabling and reduces complexity of installation and vertical alignment.\nEach Leyard TVF Series display includes embedded power and signal connectors that remove cabinet cabling clutter and offers improved vertical cabinet-to-cabinet alignment, making the process of building an LED video wall cleaner and quicker. With a narrow profile and 27” display cabinet, the Leyard TVF Series delivers 24×7 operation and can easily run with the Clarity® Visual Control StationTM (VCSTM) video wall processor or a third party video wall processor.\nA Stackable Designfor Simple Installation\nEngineered to Fit More Applications\nLeyard TVF Series provides a high quality display for the most demanding applications.\nFull Size Display with Less Space Consumption\nthe streamlined design of Leyard TVF Series makes it easier to fit in more spaces while not consuming a large\nTVF Series cabinets feature a slim profile of less than three inches as well as full front installation\nCableless & Stackable\nstackable design incorporates a cableless connection between cabinets, eliminating the need for extra space often required for cabling.\n29th October 2018\nSign up below and drop by any time between 10am and 4pm\n1 Wimpole Street", "label": "Yes"} {"text": "SCADA Software: Supervision, Control and Data Acquisition.\nThe MoviconTM technology is the SCADA solution that revolutionizes the industrial supervision concepts and protects your investments.\nProgea offer solutions for creating innovative, open and flexible supervision applications designed to adapt to all types of modern automation application by providing a sophisticated and innovation architecture with a simplicity and flexibility of use-oriented approach.\nChoosing a product for your supervision applications is a strategic one and should be oriented towards a product that features innovation, power, openness and flexibility both in terms of reliability and the professionalism of the product company. Only these factors can determine the safety of your investments on a long term basis.\nThe SCADA technologies are oriented towards offering efficient solutions for both End User and System Integrators. In fact both use the product but each with different scope. Progea offers End Users technological solutions that feature:\n- Product reliability and quality\n- Highly qualified service availability\n- Innovation for long term investments\n- Hardware system independency\n- Integration openness\n- Simplicity-of-use and maintenance\nFor the End User this equates to safe investments, management cost reductions, facilitated maintenance and upgrading. In addition to the above Progea offers system integrators, design engineers and developers the following advantages:\n- Constant technology innovation\n- Developing time reductions\n- Independency and Openness\n- Technical Help and Consultancy\nIn addition to the tools used to create powerful visualization and control projects quickly, Progea provides you with the most innovative connectivity technologies. Your projects will therefore be able to connect to the field and integrate worldwide to distribute information to local or remote clients and connect to any measuring or control device as required by Industry 4.0.\nProgea can therefore provide software solutions aimed at offering their customers a partnership on a long term basis. This is also clearly demonstrated by a 25 year presence on the market with over 100,000 license installed applications distributed worldwide. This is the best guarantee to protect your investment.\nClassic or NExT?\nThe Progea SCADA technology comes in the Classic or NExT version. The choice is yours:\nMovicon 11.5: Classic and everlasting technology.\nA consolidated, reliable, flexible and robust platfrom. A successful product that has been on the market for some time. It is highly appreciated for its robustness and flexibility. It comes complete and open with technology based on the most commonly used technologies usually found in almost all competitive products. It is written in C++ and based on WinForm offering a flexible Client-Server architecture capable of distributing applications from Windows 10 to Windows CE. Supports all databases available on the market and has a vector graphics engine based on SVG. In addition to a rich set of function provided in an extremely easy to use and intuitive development environment, it also offers a powerful VBA and VB.NET script engine and a PLC type Instruction List logic engine. It offers web technology based on Applet Java and provides apps for Android and iOS devices.\nMovicon.NExT: Technology of the future at your fingertips today.\nA new generation platform, bases on the most innovative and modern technologies. Movicon.NexT is based on Progea’s Automation Platform.NExT software platform with SCADA/HMI technology that revolutionizes the concepts of industrial supervision. It has a .NET frame purposely designed for automation with Plug-in technology to ensure openness and expandability. Its Client-Server architecture is based on the OPC UA data information model. The new WPF graphics rendering motor uses vector graphics of exceptional XAML quality. It has rich and exceptional graphics libraries of the new generation which supports dynamic 3D graphics. The integrated web client technology is based on HTML5 with apps for Android and iOS. The data collection facility uses the most modern database and Cloud technologies and supports the IoT technology. A new generation of SCADA/HMI technology for long term projects.", "label": "Yes"} {"text": "The present document can't read!\nPlease download to view\nPlease download to view\nDownload Ispsd 2002 Paper\nModern Applications of Power Electronics to Marine Propulsion Systems C G Hodge BSc MSc CEng FIMarEST Rolls-Royce plc, PO Box 3, Filton, Bristol, BS34 7QE, United Kingdom Phone: +44 (0) 117 979 5508, Fax: +44 (0) 117 979 6424 E-mail: [email protected] Abstract – This paper reviews the current state of marine electric propulsion systems and the various system developments currently being pursued to achieve greater power density and explains why these developments are economically and operationally desirable. The paper also reviews the specific power electronic converter applications that are supporting the system developments with particular reference to converter design. The paper concludes by considering the likely future direction of development for power electronic converters. Indexing Terms – Electric Warship, More Electric Applications, Integrated Full Electric Propulsion. I. INTRODUCTION Marine propulsion systems are undergoing rapid development with a significant thrust towards the use of electrical propulsion and the integration of auxiliary and propulsion power systems. Whether the vessel in question is a large cruise liner driven by external podded motors, a small highly powered warship with inboard motors and shafts or an off-shore oil support vessel the need for very flexible, robust and compact power systems is ever increasing. This need is being satisfied through the recent advances, verging on revolution, in power electronic device construction and their application for power conversion and control. The recent developments in switching device implementation have been fundamental to the developments underway in marine electrical power systems. AS well as the Insulated Gate Bi-Polar Transistor (IGBT) Devices such as the Integrated Gate Commutating Thyristor (IGCT) and MOS Turn Off Thyristor (MTO) are beginning to be considered for use in marine electrical power systems. However, to allow space for discussion of the developments also underway in converter topology and control, this paper will not discuss these devices further. II. INTEGRATED FULL ELECTRIC PROPULSION A traditional mechanical marine propulsion system uses prime movers to drive propellers via shafts and in the most common arrangements each shaft is driven by its own dedicated prime mover. Unless complicated combining gearboxes are used it is not possible to cross-connect the shafts. The variation of propulsion power with speed is – to a first approximation – a cubic relationship. As a result 80% power provides 93% speed but 25% speed demands only around 1.5% power. Since many vessels rarely use full speed this results in the prime movers running for lengthy periods at fractional loads that reduce efficiency and increase operating costs. Electric propulsion – which is perhaps more accurately described as electrical transmission (between the mechanical prime movers and propellers) – offers a relatively straight forward method of cross connecting shafts in order to alleviate the light load running of the prime movers when the vessel operates at reduced speed. Figure 1 illustrates a conventional X Electrical System normally run split DG X DG X GT GB GT Shafts cannot be cross-connected GT GB GT X X DG X DG Figure 1: Mechanical Propulsion System mechanical propulsion system for a vessel with 2 shafts and an equivalent electrical propulsion system. The advantage of the latter is that a single prime mover can provide power to either shaft and – with the adoption of modern power electronics – astern operation and ship manoeuvring is possible without recourse to controllable pitch propellers or complicated reversing gearboxes. A further advantage of electrical propulsion is that the electrical generators need not be limited to supplying propulsion power alone – they can also be arranged to provide the electrical power required for the ship’s domestic and other uses. This auxiliary electrical power system is often termed the ship’s service power system and by combining this with the electrical propulsion system a common set of prime movers can provide power to either the propulsion or ship’s service duties. This arrangement is termed an integrated power system. When the electrical propulsion system is rated at full power (with no direct drive mechanical boost arrangement) the overall system is designated as Integrated Full Electric Propulsion (IFEP), figure 2 illustrates such an IFEP GEN CONV 20 MW GEN 2 MW CONV CONV CONV PMPM mass as desirable characteristics. There are several programmes across the world aimed at developing compact direct drive propulsion motors, notably in the United States of America, France and the United Kingdom however these programmes – though fascinating – are outside the scope of this paper. The need for compact and efficient equipment applies equally to the power electronic converters that are used to drive the propulsion motors in IFEP installations and the developments underway in this area will now be reviewed. IV. GENERAL ASPECTS OF MARINE POWER ELECTRONIC CONVERTERS Devices Used: Historically the converters used in marine electrical propulsion systems have been based on thyristors and these applications have obtained their commutating voltages either from the supply-side voltage source (as in cycloconverters) or from the motor back-emf (as in current source converters). Although this – as a type of natural commutation – brings high conversion efficiency such thyristor-based converters are in general too large for use in space sensitive applications and in addition each have significant (though differing) limitations on their frequency output, control and waveform quality. As a result current source converters and cycloconverters are now becoming displaced by voltage source Pulse Width Modulated (PWM) Converters that use devices capable of switching current off as well as on – such as IGBTs. Pulse Width Modulation: Figure 3 illustrates the construction of a PWM pulse train that would provide an effective sinusoidal voltage to a load. As with all PWM strategies the width of each pulse and succeeding “gap” are controlled to present the correct average voltage to the load. In the simplest strategy – as illustrated in Figure 3 – a saw tooth switching 300 200 BATTERY CONV CONV CONV PMPM GEN 8 MW GEN 800 V DC 6.6 kV AC 20 MW Figure 2: IFEP Propulsion System system. Integration of the two power systems can reduce the total number of prime movers that need to be installed – bringing reduced vessel acquisition costs – and where the ship’s service load is a significant proportion of the propulsion requirement, additional fuel savings can be achieved by using the ship’s service power as a base load for the prime movers – thereby ensuring that the engines are loaded sufficiently to retain fuel efficiency. Given their high hotel load, this latter aspect is the main reason why cruise liners have all but universally adopted IFEP in recent years. Even simple reduction gearboxes are generally avoided with IFEP installations as direct drive motors are feasible and thereby the additional purchase cost, maintenance burden and inefficiencies associated with a gearbox are avoided. III. THE IFEP EQUIPMENT REQUIREMENT Ships are always limited with respect to internal space and reduced equipment volumes have direct benefits in providing capacity for other purposes, not least additional cargo, passengers or in the case of warships weaponry. One benefit of electrical propulsion is that it provides the opportunity to move the electric motors towards the stern of the vessel leaving the higher value central hull volume for use directly associated with the vessel’s purpose. However, for hydrodynamic reasons, the stern of a vessel reduces in cross section and thus, as a result of its reduced displacement, the stern provides less uplift than other sections of the hull form. Consequently, equipment placed towards the stern needs to be relatively light if unacceptable stresses are to be avoided within the hull. Therefore marine electrical propulsion motors have both low volume and 100 Vol ts 0 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 -100 -200 -300 Time (s) Desired Voltage Saw Tooth PWM Figure 3: PWM Waveforms function is used to determine when the switches operate. Series Connection of Switches: The initial problem with PWM converters for marine propulsion use was that the rating of the available power switches were insufficient to provide the necessary power, which can often be 20 MW per shaft or higher. As described later, Alstom was the first company to overcome this problem and developed highly rated converters using series connected devices. One consequence of the use of series connected IGBTs is that the IGBT temperature must be tightly controlled in order to preserve the switching characteristics of each IGBT. Voltage Clamped Switching: As IGBT ratings have increased other topologies that avoid the need for series connection have become feasible; such as Neutral Point Clamped (NPC) Converters. Figure 4 shows a +V DC the losses generated in the capacitor network as it increases in size. As a result a 5 level diode clamped converter probably represents the limit of this topology. V. CONSTRAINTS OF MARINE POWER ELECTRONIC CONVERTERS Harmonic Distortion: Any converter’s prime function is to transform power between differing systems, AC to DC is perhaps the simplest converter (a DC rectifier) but even that shares a characteristic with all other converters – it switches current and voltage. The switching action allows the most favourably suited input phases to be connected to the appropriate output lines such that the desired form of output power is provided. Again in the case of the rectifier this simply means connecting the most positive input phase to the positive DC rail and the most negative of the input phases to the negative DC rail – this can be achieved passively through the use of diodes but nevertheless a switching process remains which results in discontinuous currents being drawn from the supply. As the current drawn from the supply is discontinuous it is – by definition – non-sinusoidal and it therefore creates non-sinusoidal voltage drops in the supply system. These non-sinusoidal voltage drops mean that the supply voltage (as seen by the converter itself and other connected equipment) is no longer sinusoidal – the converter has distorted the supply system. This feature applies to all converters: rectifiers, cycloconverters, current and voltage source converters. The most common form of distortion is that which results from DC rectification since this is a feature of the rectifiers found as the front ends of current and voltage source converters, however cycloconverters also exhibit supply side distortion and of a more complicated form. Since the supply system voltage and load current waveforms (although no longer sinusoidal) remain periodic, Fourier analysis can be used to decompose them into spectra of frequency components – each an integer multiple of the fundamental frequency. The non-fundamental frequency components of the supply voltage and load current are termed harmonics and the overall distortion is termed harmonic distortion. It is of note that current harmonics are the cause and voltage harmonics the affect. Thus in order to prevent voltage harmonics interfering with the operation of parallel-connected equipment, the current harmonics must be reduced to an acceptable level by filtration. Figure 5 illustrates the frequency components of the current waveform that result in the supply system that feeds a DC rectifier. Because voltage harmonic distortion arises through voltage drops created in supply system impedances, high impedance systems – such as those found in marine use – are more 0V DC One phase output connection -V DC Figure 4: NPC Topology simplified schematic of a NPC topology. As can be seen an artificial neutral voltage – obtained by a capacitor ladder bridge – clamps the inter-device voltage via diodes such that the maximum voltage seen across the switches is half the circuit maximum. If the converter’s devices are able to withstand half the circuit voltage then any need to switch them in synchronism is avoided. At present converters rated at 30 MVA are achievable with the NPC topology. As well as providing a robust converter design NPC converters are also inherently more efficient as the devices switch through lower voltage differentials and thus the switching loss is reduced. A final advantage – again accruing from the reduced voltage swing – is that the output waveform more closely approximates to a sinusoid; it contains a lower harmonic content. It is of course not necessary to limit the clamping voltage to the mid point of the DC link voltage alone, more extensive capacitive networks can generate any desired number of intermediate voltages which can then be used to asynchronously operate any number of switches in a converter limb safely, the converter is then termed a diode clamped converter. However the advantages offered by increasing the number of levels offers reducing returns with respect to the quality of the waveform and the efficiency increases gained by the reduction of the switching loss are rapidly overtaken by susceptible to voltage distortion and one of the perennial challenges for the marine power system integrator is to predict the levels of harmonic distortion at the design phase so that suitable counter measures such as harmonic filters can be incorporated in order that the supply system retains an adequate level of power quality. The size of harmonic filtration required in any given marine power system is clearly a system level issue but it is rarely insignificant. For a typical IFEP system with the ships service system interconnected to the propulsion system by simple transformers the harmonic filters will occupy around 60% of the volume of the propulsion converters themselves. This adds weight and cost and reduces overall system efficiency. Hence the harmonic performance of any given converter design is a crucial issue. dV/dt: The output of a converter is often used to drive a propulsion motor and here – particularly for compact marine propulsion – the performance of the motor insulation under the PWM waveform generated by the converter is crucial. The motor’s winding insulation needs to withstand the sequence of steep sided pulses of voltage emulating the required sinusoidal voltage if failure is not to result. The most crucial aspect of the voltage waveform with regard to insulation stress is the rate of change of voltage and PWM converters are capable of extremely high rates of change of voltage. This aspect of insulation degradation and potential failure is often, on first thought, found to be surprising. Nevertheless insulation failure is one of the commonest reason for failure in the several compact propulsion motor developments that are taking place in both Europe and the United States of America. It currently appears that a peak voltage of around 5kV is a maximum –at least empirically. This limit also sets the DC link voltage in a PWM converter and therefore the United States medium voltage standard of 4.16 kV is attractive to marine system designers as it provides around 5 kV when rectified. Because the rate of change of voltage as seen in a converter’s output is a key contributor to the stress and resultant degradation of the motor insulation many converters use output filters to reduce their rates of change of voltage. Occasionally these output filters are designed to remove the majority of the output harmonics and they may then be termed sinusoidal filters. However, more commonly, the output filter is designed only to limit the rate of change of voltage to a specified level and the filter is then termed a dV/dt filter. dV/dt filters are naturally much smaller than sinusoidal filters although the exact size – and thus their cost and the amount by which they reduce overall system efficiency – is one of the key system design considerations. Motor Regeneration: Because marine electrical propulsion systems drive vehicles that gain kinetic energy as they move, the maneuvering of ships is complicated by the need to dissipate the stored kinetic energy when reducing speed. The interaction of the propeller with the slipstream of the water passing it further complicates the issue. In general when wishing to reduce speed, simply reversing the direction of rotation of the propeller, or even just stopping it, is never the best strategy. The best thrust in the opposite direction to the ship’s motion is achieved by turning the propeller at just less than synchronous speed – that is at just less than that rotational speed which would match propeller advance and ship speed when considering the propeller as a simple screw. When this is done, as well as the thrust reversing so does the torque on the shaft and therefore so does the power flow from the motor that starts to regenerate power back into its converter. The problem of controlling and dissipating the regenerated power during maneuvering is a significant issue for the system integrator in the early phases of the design and it usually required as dedicated dynamic braking resistor and controller so that the significant regenerated power does not destabilize the upstream power system. Switching Frequency and Switching Loss: The higher the switching frequency the better the quality of the voltage waveform supplied to the load and thus the current it draws. This has a direct impact on noise and vibration and also on the filtration requirement of the converter output. Ideally the marine propulsion system designer would like to operate at the switch’s maximum frequency. However each switching cycle represents an energy loss as the voltage across the switching device builds up at the same time as the current decays and thus there is energy dissipated 2.5 2 1.5 1 0.5 0 0 5 10 15 20 25 30 35 -0.5 Time Volts Current Power Energy Figure 6: Switching Loss within the switch. In order to limit the switching loss current-day marine propulsion power electronic converters are limited to around 2kHz – far below the theoretical capability of modern IGBTs. Figure 6 illustrates the switching loss inherent in a forcecommutated device. Reduction of switching loss is one of the ambitions of current converter development. VI. EXAMPLES OF MODERN MARINE POWER ELECTRONIC CONVERTERS Alstom Series Connected Converter: Alstom developed the first high power marine power electronic PWM converter based on series connected IGBTs to provide the necessary voltage withstand for a 25MVA Disk 3 Outer Supply Bridges Filter Filter Filter Filter Inner Disk 4 Outer Inner Power Paragon (a part of L3 Communications) which uses 5 intermediate voltage levels (again generated by a capacitor bridge). DC Link SIGMA 1 AC Supply SIGMA 2 Channel 1 Channel 2 Figure 9: Power Paragon Diode Clamped Converter Filter Outer Disk 1 Filter Inner Filter Outer Disk 2 Filter Inner Figure 7: Alstom Converter requirement. The main technical challenge was synchronizing the switching of the IGBTs so that the situation where insufficient devices were attempting to withstand the system voltage was avoided and also providing robust voltage sharing circuits so that each IGBT was acceptably stressed. The general modular topology of the Alstom Converter is shown in Figure 7. The Alstom converter development has been a significant success and has been used by both the United States of America and the United Kingdom within their current Naval programmes. Voltage Clamped Converters: The NPC topology has been developed by ASI Robicon of the United States of America and also by PMES of the United Kingdom. Figure 8 illustrates a NPC converter. An NPC converter is, of course, the simplest case of a multilevel converter using three voltage levels and Figure 9 illustrates a Diode Clamped converter developed by DCPOS Isolated Voltage Converter: Power Paragon and ASI Robicon (a division of the USA based High Voltage Engineering Corporation) have each conceived a type of multi-level converter that does not rely on a capacitor network to generate intermediate clamping voltages. Instead a transformer with a single primary winding and multiple secondary windings is used to create electrically isolated voltages which can then be independently switched by IGBTs or other power switches which are nominally series connected on the output side. Although the converter tends to be relatively large the topology does offer the possibility of generating extremely accurate sinusoidal output voltages through the use of interleaved switching across the multiple modular switches. The converter topology exhibits an excellent harmonic distortion performance and this can offset its larger volume through the reduced need for harmonic filtration. VII. FUTURE MARINE POWER ELECTRONIC CONVERTERS Resonant Converters: Resonant Converters are a class of converters that offer great benefit for the future. The concept is that an auxiliary circuit around the main power switch creates a resonant flow of current in a circuit that forces either the switch current or voltage to be near to zero during the commutation interval. In this way the switching loss is largely removed because the volt-amp product is also near to zero. When the current is held near to zero the circuit is said to be current resonant, conversely when the voltage is held near to zero the circuit is said to be voltage resonant. Current resonant circuits resemble the external commutation circuits used with thyristors – and indeed they provide the same function, the load current is diverted out of the switch. Voltage resonant circuits resemble passive IGBT Gate Drive PEC IGBT Gate Drive PEC IGBT Gate Drive PEC IGBT Gate Drive PEC OUTPUT IGBT Gate Drive PEC IGBT Gate Drive PEC IGBT Gate Drive PEC DCNEG IGBT Gate Drive PEC Figure 8: PMES NPC Converter snubber circuits – the main difference now being that the voltage resonant circuits operate in advance of the switching transient whereas the snubber circuit follows behind. In both cases the timing of the firing of the auxiliary resonant circuit is crucial in relation to the timing of the commutation of the main switch. Once the switching loss is largely removed the designer has a choice between increasing converter efficiency, increasing converter switching-frequency, increasing converter current output (so that the conduction loss rises to replace the reduced switching loss) or perhaps a combination of the three. There is however a problem with resonant conversion for marine propulsion uses. As previously explained marine propulsion systems operate for considerable periods at part load and in this condition the converter’ switching loss is significantly reduced anyway. However the additional passive circuit losses introduced by the resonant circuitry remain at the same level as if the converter was at full power. Thus a marine propulsion converter using resonance can actually increase overall losses rather than reduce them. One answer is to design the resonant circuits so that they can be switched out of operation once their losses outweigh the savings – however this can only be achieved for current resonant converters and these are the more bulky and expensive version of resonant converter. SPCo Development: An innovative form of multi-level converter is being developed by SPCo of the USA where MOS Turn Off Thyristors (MTO) switch a base voltage between various intermediate levels and this is then used as a PWM voltage source by a final resonantly switched IGBT based output stage. This converter ought to offer improved efficiency since both the switching and conducting losses are significantly reduced. The switching losses are reduced because the MTOs controlling the base voltage switch infrequently and the IGBTs performing the final PWM modulation switch resonantly. The conducting losses are reduced because the MTOs – which replace IGBTs in comparable topologies – are thyristor based and therefore exhibit a very low forward conducting volt drop. Figure 10 illustrates the SPCo converter. Matrix Converter: Another form of converter under development is the Matrix Converter and this is receiving significant attention in both the USA and UK with much work being conducted by the UK’s Nottingham University as described at . The Matrix Converter gains it name from the appearance of the converter’s electrical connections. When drawn as shown in Figure 11 the nine bi-directional switches 3 Ph Input Bi-Directional Switches 3 Ph Output Figure 11: Matrix Converter appear as a matrix of connections. The bridge produces any desired output waveform by connecting each of the input phases (VA, VB, and VC) to each output phase (Va, Vb, and Vc) in turn within a switching interval of fixed duration. Within the fixed switching interval the periods of output-connection for the three input phases is varied in a manner similar to PWM such that the desired output is produced in terms of the average of the input voltages. In order that any desired output voltage can always be produced without regard to the instantaneous phase of the three input voltages the output voltage must be limited to a level below the input voltage envelope. As can be seen from Figure 12 300 200 100 Soft-Switching Section Volts 0 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 -100 -200 -300 Time (s) IGBT 3300-V 1200-A Figure 12: Matrix Converter Voltage Envelope (1) 7-kVDC 5-Level Super GTO 5000-V 3000-A Super GTO 2500-V 1500-A Figure 10: SPCo Converter the input voltage envelope restricts the output voltage to 50% of the input. The minimum of the maximum (positive) is half of the peak value, occurring when the two positive voltages are equal. Similarly the maximum of the minimum (negative) is half of the peak value, occurring when the two negative voltages are equal. This is a serious limitation for the Matrix Converter when it is intended for use in a standard power system with standard motors. However it may be overcome by using one of two differing techniques. The first is to distort the desired output phase voltages by use of a combination of third harmonics of both the input voltage frequency and the desired output frequency. The required additional harmonics are: Input Voltage Third Harmonic: -1/6 Output Voltage Third Harmonic: +√3/6 When this is done the phase voltages are as shown in Figure 13 and the peak desired output voltage may be raised to 0.866 of the input. Thus the maximum output 300 200 100 0 0 0.002 0.004 0.006 0.008 0.01 0.012 0.014 0.016 0.018 -100 -200 -300 Time (s) Figure 13: Matrix Converter Voltage Envelope (2) voltage can be increased from 50% to 86.6% an increase of 36.6 percentage points or 73.2%. Two important points are worth noting with regard to this technique. First, although the phase voltages are distorted this does not appear in the output line voltages because of the natural third harmonic cancellation that occurs in a balanced three-phase system when moving from phase to line voltages. Second, this additional voltage increase has not been achieved at any other performance aspect of the converter, its overall efficiency remains unaltered as does the quality of the output voltage and the level of distortion imposed on the input system. The second technique uses a fictitious DC link and divides the modulation function into two stages, the first deals with input voltages, and the second with the generation of the output voltages. It is termed a fictitious DC link because in order to maximise the output voltage the first modulation stage chooses to work between the most positive and most negative input voltages, as would a standard uncontrolled DC rectifier. The overall maximum voltage output that can be achieved with this technique is 6√3/π2 or 105.3%. Although the modulation function is developed by considering two distinct phases of time-continuous operation this cannot be the case when the modulation function is applied to the converter – there is only one switch between the input and the output and no intermediate stage. In practice the two separate switching strategies are combined into one unified requirement before the modulation function is applied. Techniques to achieve this are covered at and . There are however significant disadvantages. Although this technique overcomes the voltage limitation of the Matrix Converter completely, this gain is bought at the expense of the overall harmonic performance of the converter: the harmonics reflected into the input voltage or generated in the output current (or indeed both) must increase. It is perhaps not surprising - since the modulation function is in part derived through consideration of DC rectification - that the largest increase in harmonics are those associated with this process itself (5th, 7th, 11th etc). An additional source of harmonic distortion arises when the voltage is forced above 86.6%, when this is done it is no longer possible for the average output voltage in each switching interval to equal the target voltage and additional low frequency harmonics result. It is interesting to note that a Matrix Converter operating at minimum harmonic distortion under a fictitious DC link scheme will be subject to the same voltage limit as a converter operating under the third harmonic strategy. There are practical difficulties in developing the overall modulation function through two stages in real time so that implementation of a converter producing continuously varying frequency and voltage (as required in IFEP applications) would be difficult. Clearly a Matrix Converter would benefit from a symmetrical bi-directional switch. SAIC Multi-Port Inversion: SAIC – and in particular Dr Rudy Limpaecher – have been developing an extremely innovative converter termed the Multi-Port Converter. The circuit schematic diagram for an MPC converter is shown in Figure 14 together with the current waveforms for one charge and discharge cycle at Figure 15. The technique has been more fully explained at , and but, in summary, it utilises Input Redistribution Output Volts Filter Figure 14: SAIC Multi-Port Converter Filter the fact that in any balanced multi-phase system the Ici,I1i 1200 1000 800 600 400 200 0 0 100 200 Vc I3o 1000 Capacitor Voltage (V) I3i 500 0 Charge Currents (A) natural commutation – and extremely good harmonic performance both with respect to the quality of the waveform offered to the motor and the level of harmonic pollution reflected back into the supply system. VIII. CONCLUSION The development of marine electrical power systems has been extremely rapid over the last two decades and this has been due to developments in the topology and construction of both power electronic switches and power converters themselves. These under-pinning device and equipment developments have formed the enabling technology for the implementation of IFEP systems in both warships and commercial vessels. As such the power electronic community has exerted a revolutionary effect on marine engineering resulting in a common development thread and ambition across the world. ACKNOWLEDGMENT The author acknowledges the support of Rolls-Royce plc and the many other companies and corporations without whose help this paper could not have been written. REFERENCES Dr Jon Clare, Dr Pat Wheeler, “Matrix Converters Study”, UK MoD IFEP Report, September 1999 unpublished. Ziogas PD, Khan S I and Rashid MH, “Some Improved Forced Commutated Cycloconverter Structures”, IEEE Transactions on Industrial Electronics Vol 1A-21 No 5, September - October 1985, pp1242-1253. Ziogas PD, Khan S I and Rashid MH, “Analysis and Design of Forced Commutated Cycloconverter Structures with improved Transfer Characteristics”, IEEE Transactions on Industrial Electronics Vol 1E-33 No 3, August 1986, pp271280. Cdr C G Hodge and Cdr D J Mattick, ’The Electric Warship III’ Trans IMarE, Vol 110, Part 2, The Institute of Marine Engineers (1998). Cdr J M Newell, Cdr D J Mattick Royal Navy and C G Hodge, ’The Electric Warship IV’ Trans IMarE, Vol 111, Part 2, The Institute of Marine Engineers (1999). C G Hodge and D J Mattick OBE, ’The Electric Warship V’ Trans IMarE, Vol 112, Part 2, The Institute of Marine Engineers (2000). I2i Ico,I2o 300 400 500 600 -500 -1000 µsec Ico,I1o Charge Cycle Disc harge Cycle Figure 15: Multi-Port Converter Waveforms main phase currents at any time sum to zero, simplistically: for any given time interval there will have been as much positive current as negative flowing in the circuit. The charges delivered and received balance precisely. Hence these positive and negative currents can all be supplied from a single capacitor whose positive plate and negative plate charges self evidently always sum to zero. When considering a 3 phase to 3 phase MPI converter within the time intervals of its operation; there will always be a phase which delivers, or receives the highest charge, while the remaining two phases are of opposite sign and combine to balance the overall charge transfer. Therefore, when operating, one input or output phase is connected to one side of the capacitor throughout the charge or discharge cycle while the other two are Central Capacitor Charging Inductor InputThyristors Freewheeling Thyristor Discharging Inductor Input Filter Capacitor Input Inductor Output Thyristors 1.45 h X 1.27 d X1.98 w = 3.64 cu meter Figure 16: Conceptual Multi-Port Converter connected in turn to the opposite plate. The only control requirement during this phase is to determine at which point the two minor phases should be commutated. Figure 16 shows the general arrangement of a conceptual MPI. The general operating principles have also received independent endorsement from third party assessments. The main advantages of this converter topology are very low switching losses – all switching is achieved by thyristors using un-forced", "label": "Yes"} {"text": "Thesis submitted in fulfilment of the optical amplifier is required to overcome the limitations of conventional erbium-doped fiber amplifier besides optical . Thesis for the degree of master of science effects of optical filtering on signal characterization in coherent systems (edfa) makes it possible to transmit . Legacy course catalog edfa 200 - history & phil of educ: purdue west lafayette traditional 08/23/1999 - 08/03/2001 edfa 699a - res phd thesis abs:. The growing use of anti-anxiety pills reminds some doctors of the early days of the opioid crisis considered relatively safe and non-addictive by the general public and many doctors, xanax . Thesis for the degree of doctor of philosophy september 2015 i university of southampton 223 modelling of multimode erbium-doped fiber amplifier .\nAbdul mutalip, for her assistance and guidance toward the progress of this thesis project current spacing of erbium doped fiber amplifier (edfa) is in the . Distributed raman amplifiers is simulated in raman/edfa hybrid amplified systems the discrete ra will be in a dispersion compensation module the ratio of the signal snr, rsnr, at the end of the contrasting passive and active systems is the final measurement of system benefit of adopting raman amplification. Analysis of wdm network based on edfa pumping and dispersion compensation using optisystem a thesis submitted in partial fulfillment of the requirements for the degree of. Reduction of edfa optical power transients using power shaping by james trent jackson a thesis submitted in partial ful llment of the requirements for the degree.\nChristopher c information for applicants with disabilities, thesis on edfa research. Performance analysis of erbium-doped fiber amplifier in fiber optic communication technique strictly as per the compliance and regulations of performance analysis of erbium-doped fiber. Thesis/dissertation acceptance this is to certify that the thesis/dissertation prepared by entitled for the degree of is approved by the final examining committee:. The theme and structure of philippians 235 eadie suggests, the transitions depend upon no logical train — as the thoughts occurred they were dictated.\nSupervisor and a co-investigator in the edfa project reported in this thesis mr saravanabhavan took dr r stephen brown’s guidance throughout this thesis work 2. Dissertations by students “pumping schemes for high concentration erbium-doped fiber amplifier (edfa),” ms thesis, kenji konno, april 2002 . In this thesis, fiber raman amplifiers (fras) are investigated with the pur- (edfa) to support longer spans, and the use of a hybrid wide-band dcra/edfa to . If there are reservations about the thesis in terms of emerging research design problems, change in direction, data collection problems, analysis problems or analysis .\nTuesday, july 31, 2018 home upcoming events / trainings / speaking affiliate events: symposium & leadership training. A study of erbium doped fiber amplifier (edfa) amplifier’s characteristic and fwm in an optical network using optiwave optisystem simulator thesis full-text available. “performance analysis of transient aspects for edfa amplifiers” a thesis submitted in partial fulfilment of the requirement for the award of degree of.\nHome help with a thesis statement about education pdf help with a thesis statement about education pdf outdoor mounted edfa for rfog with a two-way 1310 nm return. Edfa is preferred to be employed in the befl system in this thesis, the befl signal is generated in ring and linear cavities with channel spacing of 009 nm. Design and development of erbium doped fiber amplifiers a project report submitted by edfa erbium doped fiber amplifier esa excited state absorption . The information obtained is the basic configuration of optical amplifier in optical transmission link, advantages and disadvantages of erbium doped fiber amplifier, the amplified spontaneous emission noise (ase) and etc.\nThis thesis describes theoretical and experimental studies on two subjects: first is characterization, design and modeling of erbium-doped fiber amplifiers (edfas) second is the effect of fiber dispersion on the noise of distributed feedback (dfb) lasers and the impact of this effect on the performance of 1550nm video lightwave transmission . Major papers & theses for 2000 : 2000 carol-ann belanger: an investigation of the negative aspects of the twinning process from the principal's perspective :. Effect of edfa based various optical amplifier configurations on isowc system surinder singh, harpreet kaur department of electronics and communication engineering.", "label": "Yes"} {"text": "HTC-1 Electronic Temperature And Hygrometer\n- Have a large LCD display\n- Display temperature and humidity\n- ℃ and ℉ can switch\n- The clock shows in 12/24 hours\n- The function of the maximum and minimum temperature and humidity in memory\n- The function of the strikes the hour\n- The function of alarm clock every day\n- Display the calendar\n- Temperature Range: -50℃~+70℃(-58℉~+158℉)\n- Humidity Range: 10%RH~99%RH\n- Acuteness of display: Temperature: 0.1℃ (0.2 ℉); Humidity: 1%RH\n- Accuracy: Temperature: ±0.1℃ ; Humidity: ±5%RH\n- Voltage: 1.5V\n1. The function of the key-press\n【MODE】can switch the hour and minute/setup the time、alarm clock、12 or 24 hour、date; 【ADJ】 the adjustment is established the project the value; 【MEMORY】display and clear the memory of the maximum and minimum temperature and humidity; 【℃/℉】 switch the ℃ and ℉; 【RESET】clear all setup and memory, return the Original state\n2. In the original state press 【MODE】2S, when the minute flickered, press 【ADJ】 can adjust minute, continuance pressing【MODE】can setup “clock”、“12/24”、 “month” and “date”.\n3. When in the clock mode , press【MODE】one time, display clock mode, in this time press【ADJ】can change alarm function/ hour alarm function open and close. Press【MODE】2S again, can setup the alarm time, and open the strikes the hour.\n4. When in the alarm mode , if no people to setup after one minute can return the currently clock, in this time press【ADJ】can display the calendar, after 3S can return the currently clock. Press MAX/MIN, can display the maximum temperature and humidity after the last clear.\n5. Press【MEMORY】can display the maximum and minimum temperature and humidity in the memory, Press【MEMORY】more than 2S can clear the maximum and minimum temperature and humidity in the memory.\n*Note: The first use and change the battery please press【RESET】", "label": "Yes"} {"text": "From FierceHealth IT (Stroke patient makes gains in speech, physical therapy with robot)\nResearchers at the University of Massachusetts-Amherst are touting success in the case of a robot that delivered speech and physical therapy to a 72-year-old male stroke patient.\n“It’s clear from our study … that a personal humanoid robot can help people recover by delivering therapy such as word-retrieval games and arm movement tasks in an enjoyable and engaging way,” speech language pathologist and study leader Yu-kyong Choe said in an announcement.\nWhile the child-sized robot might not be the ideal therapist, it could help ease the shortage of workers, especially in rural areas.\n“A personal robot could save billions of dollars in elder care while letting people stay in their own homes and communities,” the authors wrote in a study published in the journal Aphasiology.\nTo me it’s a no brainer to use robots for rehab. Take the phrase “arm movement” tasks. Robots can be much better than human therapists at doing boring, repetitive arm movement tasks over long periods of time. And of course if the robot can be the patient’s home it makes access all the easier.\nIn 10 years we’ll look back at these early results and it will be totally obvious the direction things were moving.March 21, 2013", "label": "Yes"} {"text": "We take our quality control very seriously and as such we’ve invested in this fantastic product from the IM series. It provides instant measurement with simple, easy and automatic operation. It uses a cutting edge dimension analysis system which defies traditional metrology techniques.\nIt can take up to 99 simultaneous measurements within its 200mm area. measuring area all at once within a few seconds. Measurement values do not vary, depending on the operator. So human error is irradicated. It has a very large depth of field of 20mm (= +/- 10mm). Achievable repeatability is +/- 0.5um and has an accuracy of +/- 2-5um. Excellent reporting as measurement data are saved automatically and statistics can be reviewed as well as all captured images.", "label": "Yes"} {"text": "MCS Smart Calibration is the calibration lab you can count on for affordable calibration services with a quick turnaround. Our calibration lab is based in North Wales, St Asaph. We provide calibration services across the UK and Ireland.\nCalibration is becoming more and more important as international requirements are becoming stricter. Compliance and qualification testing require traceable proof of the performance of the equipment used for testing and measurement.\nWhy Choose MCS smart calibration?\nOur calibration team have over 20 years of calibration experience in the RF and microwave calibration industry. We are also a leading distributor of some of the most well known test equipment manufactures, such as Cobham, Rohde & Schwarz, Litepoint and many more. All of our calibrations are fully traceable and you can track your instrument(s) calibration progress through our free online management tool.\nWe are continuously growing our calibration lab to allow us to calibrate a wider range of instruments and a higher frequency range. Take a look at our calibration capabilities table below to see our current capability range.\nWe have a quick turnaround time of 5 working days if you decide to use our basic calibration service, or 2 working days if you choose the express calibration service.\nThe table below currently outlines our calibration capabilities. For more information, please contact us via phone or email and we would be more than happy to help.\n|Spectrum Analysers (Bench & Handheld)||Up to 26.5 GHz|\n|Signal Generators||Up to 26.5 GHz|\n|Power Meters||Up to 26.5 GHz|\n|Power Sensors||Up to 26.5 GHz|\n|Radio Communication Test Sets||Up to 1 GHz|\n|Network Analysers||Up to 26.5 GHz|\n|Oscilloscopes||Up to 18 GHz|\n|Power Supplies||Up to 1000 Volts|\n|Multimeters (Bench & Handheld)||Up to 1000 Volts|\n|Frequency Counters||Up to 26.5 GHz|\nHere at MCS Smart Calibration we have always worked to the principles of the ISO/IEC 17025 standard, to ensure that your RF and microwave equipment is calibrated to the correct degree of accuracy and in a fully competent and consistent manner.\nAs part of our commitment to this standard, this month sees us welcoming UKAS on site here in St Asaph to assess our calibration lab. This will hopefully lead to our official UKAS accreditation in Spring 2018 for electrical and RF calibrations.\nWant more information about our Calibration Lab? contact us via one of the methods below.\nPhone: +44 (0)8453 62 63 65", "label": "Yes"} {"text": "Silicon Laboratories CP2110 based USB\nuslhcom* at uhidev?\nucom* at uslhcom?\nuslhcom driver supports USB HID (Human\nInterface Device) based serial adapters. The following devices are\n- Silicon Laboratory CP2110\nThe driver acts as a bridge between uhidev(4) and the ucom(4) driver which makes it behave like a tty(4).\ntty(4), ucom(4), uhidev(4), usb(4)", "label": "Yes"} {"text": "What Is EMF Exposure ?\nEMF stands for electromagnetic field which is found in an area of moving electrical charges. It is mostly produced in areas where appliances that use electricity are found. EMF exposure is a situation that cannot be prevented because its fields of generation are almost everywhere. It is generated from the usage of appliances like microwaves, cell phones, powerlines, transmitters, and broadcasting towers.\nSome scientific researchers think the EMF is harmful to health while others do not believe it. The EMF radiation can either be from handmade sources while some EMF radiation occurs from manufactured sources. Radiation depends on the level of frequency and wavelengths.", "label": "Yes"} {"text": "DSP-Z8, DSP-Z8III, DSP-Z6III, our 3rd generation of digital processing and the Zapco Digital Processing amplifiers. Great sound, clean Zapco power, and stealth fighter looks. The DPN is easier to load and use and the hassles of loading drivers are gone. Just drop the new system onto your desktop and go.\n(2011 to 2015) DSP-Z8, Z8 III, Z6 III, DC Series\nDownload: DSP-Z8/DSP-Z8 III/DSP-Z6 III Manual - DPN Software v.10.0.0.1 - Software Updating Guide to v.10.0.0.1\nDownload: DC Series Manual - DC Series Introduction\nEarly (2011) DSP-Z8 and 2nd Gen DC Amplifiers with RCA inputs\nThe first of the DSP-Z8s, with serial numbers 0001~0500 and the DC amps with RCA inputs use the DPN 200ms program that you can find here: DPN 200ms\n(2005 to 2010) DSP-Z6, DRC-SL, 1st Gen DC Amplifiers with SymbiLink inputs\nThe first ever full function digital processor for the car, with a full line of amplifiers with full function on-board processing.\nDownload: DPN Software v 1.41 (including 64bit Drivers, and Instructions)", "label": "Yes"} {"text": "Session SH019: Particle Acceleration and Transport at the Sun and in the Inner Heliosphere\nConveners: Linghua Wang, Dick Mewaldt, Gang Li, and Robert F Wimmer-Schweingruber\nSession Description: An important topic of solar and heliospheric physics is to understand the acceleration and transport of nonthermal particles. Such studies in the inner heliosphere encompass a variety of processes leading to the formation of solar wind suprathermal particles, solar energetic particles, energetic particles from Corotating Interaction Regions, etc. However, many details of the acceleration and transport process of these energetic particles still remain unknown. Particle acceleration processes include magnetic reconnection, wave-particle interactions, collisionless shock waves, etc., and particle transport processes include adiabatic cooling, parallel and perpendicular diffusion, random walk of magnetic field lines, etc. This session invites contributions that discuss space-borne and ground-based observations, and theory/modeling of the processes pertaining to particle acceleration and transport at the Sun and in the inner heliosphere.", "label": "Yes"} {"text": "In this chapter, we will provide a brief explanation of the principle of optical coherence tomography (OCT) imaging and highlight the influence of the light source properties. We will discuss the application of semiconductor lasers in specialized light sources for OCT, namely, in broadband light sources and in broadband wavelength-swept light sources. We will conclude with an outlook on the continuing development of light source technologies for OCT.\n|Title of host publication||Semiconductor Lasers and Diode-based Light Sources for Biophotonics|\n|Editors||Peter E. Andersen, Paul Michael Petersen|\n|Publisher||Institution of Engineering and Technology|\n|Publication status||Published - 2018|", "label": "Yes"} {"text": "Where is the speaker fuze in a 2001 GMC Sierra? The underhood fuse block in the engine compartment on the driver’s side of the vehicle near the battery. Where is the radio fuse in a\nWhere is the speaker fuze in a 2001 GMC Sierra?\nThe underhood fuse block in the engine compartment on the driver’s side of the vehicle near the battery.\nWhere is the radio fuse in a 2008 Chevy Silverado?\nThe radio fuse in the Chevy Silverado is in the engine compartment fuse box which is a weird location compared to most other vehicles. Normally You would find it in the interior fuse panel under the driver side of the dashboard instead of under the hood. It is a 15 amp fuse located in the lower right of the panel.\nWhere is the radio fuse for a 2001 Chevy Silverado?\nThe fuse box is located on the driver’s side of the instrument panel, behind the cover.\nWhere is the fuse box on a 08 GMC Sierra?\nThe fusebox is located in the engine compartment, on the driver side of the vehicle.\nWhat is the ETC fuse for?\nElectronic throttle control (ETC) is an automobile technology which electronically “connects” the accelerator pedal to the throttle, replacing a mechanical linkage. The electric motor is then used to open the throttle valve to the desired angle via a closed-loop control algorithm within the ECM.\nWhat is a TBC fuse?\nThe TBC Fuses stand for the Body Control Module(BCM) unit. Not the the Throttle Body Control.\nWhat is PDM fuse?\nThe PDM – Power Distribution Module is a low voltage (12 to 30V AC/DC) power distribution module designed to take a single power source and distribute that power to multiple circuits. Each circuit includes an On/Off switch, field connection terminals, 3 amp circuit breaker or 3 amp fuse, power LED and fault LED.\nWhat does the TBC fuse control?\nWelcome to the forum. The TBC (truck body computer) fuse powers the body control module (BCM). They rarly go bad. They use 5 volts dc so an accidental hit (short) of 12 volts will blow the fuse.\nWhere is the center instrument panel fuse block?\nThe center instrument panel fuse block is located underneath the instrument panel, to the left of the steering column.", "label": "Yes"} {"text": "6 Prong Plug Service\nToday we bring you 6 prong plug that brings alongside 14 pictures moreover 4 pin connector plug moreover nema 20 amp plug moreover 3 prong grounded plug also with ac power cord 3 prong plug cable including 7 pin round trailer plug additionally 3 prong wall plug as well as multi plug socket outlet additionally 3 to 4 prong dryer cord adapter additionally 3 wire electrical plug additionally flat extension cords with 3 prongs moreover 4 prong electrical outlet together with 3 prong electrical outlet furthermore 30 amp dryer plug adapter additionally 120v male plug wiring diagram together with electrical wall outlet plug along with 30 amp 3 prong dryer plug adapter moreover 3 prong male plug connector as well as wall plug outlet together with 2 prong plug replacement along with 3 to 4 prong dryer adapter.\nDiagrams images 6 prong plug additionally keylg also with rid r as well as s l including i ts also with multi plug electrical plug together with wcc hp accord lg furthermore lifesmart zcht us wall outlet personal space heater in plug x also with together with burntoutlet along with together with chicago electric power tools double bevel sliding compound miter saw with laser guide page furthermore f c ca\nExplore more searches like 6 Prong Plug :\nTop suggestions for 6 Prong Plug :\nAny content, trademark/s, or other material that may be found on the https://thebeginnerslens.com website that is not https://thebeginnerslens.com’s property remains the copyright of its respective owner/s. In no way does Nayabfun.com claim ownership or responsibility for such items, and you should seek legal consent for any use of such materials from its owner.", "label": "Yes"} {"text": "See what's needed for banks to improve big data analytics systems and its increased scope\nBanks that tap into big data trends and craft strategic advances are leaders in the truest 21st-century sense. But, identifying trends and aligning them to business goals is not the only task at hand. One pressing requirement is – a bank’s current infrastructure needs to keep up with the pace of advancement.\nFor current-day systems, big data analytics is a business’ catalyst in better understanding consumers and the lengths of operational possibilities. Essentially with infrastructure upgrades like cloud computing becoming mainstream, and real-time access to big data becoming a reality, strategizing has evolved ten-fold.\nMultiple analytics providers have ready-made solutions to tackle the current requirement. But, for Banks looking to ace analytical functions in the now and the near future, business leaders need to ready system architecture for capabilities trending in other businesses too.\nWhich Trends Should a Bank's Analytics Systems Ace?\nAdd big data to the equation, and the need for faster data processing becomes a priority. Real-time data processing can be leveraged in multiple scenarios, and since everything is going digital henceforth, knowing the heights that transformation will reach help prioritize.\nThe vast applications of data analytics and rise in DevOps teams are a result of improving data science approaches for big data generation. In maximizing results from data, here are a few trends your lenders' technology partners need to look out for –\nIncreasing the Role of Alternative Data in Analytics\nSome major applications gaining ground are data enrichment to enhance underwriting, smart lending and credit scoring, and historic data for forecasting and predictive algorithms.\nData as a Product (DaaP) with Data Subscriptions\nData as a Product (DaaP), facilitated through Data Subscriptions, helps banks and lenders with pre-sourced good data without the hassle of revamping data collection infrastructure.\nHybrid clouds for Improved Interconnectivity\nA hybrid cloud is an IT infrastructure that connects public clouds and/or private clouds to offer orchestration, management, and application portability while creating a single, optimal cloud environment.\nBanking Functions that Leading Analytics Systems Tackle\nLeading big data analytics systems offer actionable insights. The systems enable banks to draw conclusions about the segmentation of customers, better understand transaction channels, collect feedback based on reviews, and assess possible risks to prevent fraud.\nCurrently, leading big data analytics systems for Banks and Lenders are –\nEarly Warning Signal Solutions enable predictive analytics to help banks predict defaults long before they happen. These systems require data subscriptions for quality inputs on the borrower's financials, transactional behavior, market position, and other business factors.\nThe 'advanced analytics' system uses artificial intelligence (AI), machine learning (ML), and neural linguistic programming (NLP) models to collect and process the information on potential defaulters, helping banks strategize for the best recovery practices.\nRisk-Based Supervision is a prescribed model for regulatory supervision of Financial Institutions around the world. Reported data is expected to be quantitative as well as qualitative, and is broadly expected to cover categories – capital, credit, market, earnings, liquidity, business strategy, operational risks, internal control, management, and compliance risks.\nAn RBS System equips Banks with enhanced compliance and risk management practices, with the added advantage of a comprehensive MIS system for internal decision making.\nManagement Information Systems with Automated Data Flow (ADF) for Regulatory Reporting offers the highest quality of data to business leaders as well as regulators, with a single system. New-age MIS systems for Banks and Financial Institutions are benefitting from the regulator-mandated automated data flow with the creation of ‘golden datasets’.\nGolden datasets are clean, validated, integrated datasets, which lets businesses identify function-specific use cases for data and put processes in place to join or reconcile, and ultimately use the exact data for multiple functions.\nInsight Generation and Research Tools for Regulatory Reporting offer actionable data for IRAC Norms, Ind AS Reporting, and IGAAP Reporting. Automation of multiple data collection processes uses data available systems for analytics. Systems for insight generation utilize integrated solution architecture, multiple data sources, and data lakes, and also deploy advanced Artificial Intelligence (AI) and Machine Learning (ML) for higher-quality data.", "label": "Yes"} {"text": "What is the procedure for turning on the touch screen on the Lenovo Yoga?\n- Press the Windows logo key plus the letter X. Device Manager may be found in the drop-down menu. To see the full list of Human Interface Devices, click on the small arrow next to the word “Human Interface Devices.” Select the touch screen driver from the drop-down menu (in my case, NextWindow Voltron Touch Screen). Select Disable from the drop-down menu by right-clicking.\n- 1 Does Lenovo Yoga have HDMI input?\n- 2 Does Lenovo have HDMI port?\n- 3 Does Lenovo monitor have HDMI port?\n- 4 What ports are on a Lenovo Yoga?\n- 5 Does yoga c930 have HDMI port?\n- 6 How do I change my Lenovo to HDMI?\n- 7 Which Lenovo Yoga has a HDMI port?\n- 8 How do I connect my Lenovo Yoga 7i to an external monitor?\n- 9 Does Lenovo Yoga 720 have HDMI input?\n- 10 How do I get my Lenovo to recognize my second monitor?\n- 11 How do I use HDMI on Lenovo all in one?\n- 12 How do I connect two monitors to my laptop with one HDMI port?\nDoes Lenovo Yoga have HDMI input?\nThe latest Lenovo Yoga tablet includes an HDMI port, allowing you to connect your console while on the road.\nDoes Lenovo have HDMI port?\nThe VGA, DVI, or HDMI port can be found on the back or side of the ThinkPad computer. VGA video-out ports are colored blue, whereas DVI video-out ports are colored white. Some ThinkPad notebooks, particularly those from the latest generation, contain HDMI connections that look similar to a huge USB port.\nDoes Lenovo monitor have HDMI port?\nConnect the dots in your own manner. Lenovo monitors are equipped with a variety of connectivity choices, including Video Graphics Array (VGA), HDMI 1.4, and DisplayPort (DP) 1.2, among others.\nWhat ports are on a Lenovo Yoga?\nFollowing ports are available on the Lenovo Yoga Slim 7i (15″) for the year 2020:\n- 1 × Thunderbolt 3 USB-C port DisplayPort 1.4b, ThunderboltTM 3.0, and Power Delivery 3.0 are all supported. There are two USB 3.2 Gen 1 connectors on the board. The following features are included: 1 x Full-size SD Card Reader.\n- 1 x HDMITM 2.0b\n- 1 x Audio jack\n- 1 x Power adaptor.\nDoes yoga c930 have HDMI port?\nThe number of connectors is limited, but just acceptable: two USB-C ports (one of which is used to charge the device) and a conventional USB 3.0 port are provided. A media card slot and, more importantly, an HDMI output are also absent from the device, which means customers using external displays will have to rely on the second USB-C port for visual output.\nHow do I change my Lenovo to HDMI?\nPress the “Input” button on the TV remote control to select between the HDMI input, the VGA input, and the S-video input if you have a standard-sized television. When the S-video input on a regular television is selected, the laptop desktop will be instantly shown on the TV screen when the input is changed.\nWhich Lenovo Yoga has a HDMI port?\nYes. The Lenovo Yoga Tab 13 (YT-K606F) has an HDMI connector for connecting to a television. The HDMI port is positioned on the tablet’s left bottom side, on the left side of the tablet’s bottom. It is recommended that users connect their HDMI devices using the included Micro HDMI to HDMI cable.\nHow do I connect my Lenovo Yoga 7i to an external monitor?\n1-2 of 2 Possible Answers\n- Because of this, the laptop does not include an inbuilt HDMI port. It is not unusual for newer, slimmer computers to have this problem. The Lenovo Yoga 7i-14, model number 82BH0006US, has a Thunderbolt 4.0 connector that allows it to output video to an external display. You may connect an HDMI display to this laptop by utilizing a Thunderbolt to HDMI adaptor, which is sold separately.\nDoes Lenovo Yoga 720 have HDMI input?\nIt does not have an HDMI connector, therefore I’m not sure how I’m supposed to link my Yoga 720-151 KB laptop to my television.\nHow do I get my Lenovo to recognize my second monitor?\nIncrease the number of display adapters in the category. Update the driver by selecting it from the context menu of the device. Select Automatically search for updated driver software from the drop-down menu. Following completion of these procedures, restart your computer if necessary to complete the installation and verify that your second monitor is operational. Figure 1:\nHow do I use HDMI on Lenovo all in one?\nWhen you connect in the cable, the input signal is immediately switched to the output signal.\n- Connect the A740 or A540 power connector to the computer. Installing an HDMI wire from your external monitor to the A740 or A540 is straightforward. Before connecting the HDMI connection, make sure that the external display is in Duplicate or Extend mode if it is a laptop computer.\nHow do I connect two monitors to my laptop with one HDMI port?\nUse an adaptor, such as an HDMI to DVI converter, to connect the two displays. As long as you have two separate ports for your laptop and monitor, this will function well. To have two HDMI ports, a switch splitter, such as a Display splitter, need be used. This method works if your laptop only has one HDMI port, but you require two HDMI ports to complete your task.", "label": "Yes"} {"text": "Configurations available with 1 EPON or GPON ONU module; Configurations available with 2 or 4 HomePlug AV EOC Master modules; Configurations available. The module supports IEEE ah standards. It provide one SC/PC optical EPON uplink port and two 10//M auto-negotiable Ethernet RJ45 ports. eoc. By combining the technology of EPON, GPON and EOC with technology of HFC, it will greatly promote the development of application of two-way access of HFC.\n|Published (Last):||3 April 2010|\n|PDF File Size:||13.11 Mb|\n|ePub File Size:||17.96 Mb|\n|Price:||Free* [*Free Regsitration Required]|\nEoC-Ethernet over Coax + FTTH EPON/GPON solution\nCable television broadband access network based on cable access technology EOC consists of device in local side, terminal device in user side, cable, branch distributor and so on. EOC has various technical solutions, in which technology of Home Plug AV has highest stability, low two-way reconstruction cost and high rate in physical layer, so it is most widely applied and has become industry application standard in reality.\nHome Plug is an enterprise alliance co-founded by tens of enterprises like Cisco, HP, Motorola and Intel with the aim of building local area network based on electric-power line. Data transmission in electric-power line, telephone wire, and cable-coaxial can be implemented in Home Plug AV. Comparing with electric-power line network, coaxial network of cable television has better channel quality.\nCoaxial network resources can be sufficiently used and excavated by applying Home Plug AV technology in coaxial eov of cable television. Transmission range of PON access part can reach to 20Km, which can easily accomplish the coverage from head-end room to access point.\nIn EOC access part, epln system will not affect existing television channel signal as it adopts low frequency from 7.\nEoC-Ethernet over Coax + FTTH EPON/GPON solution | FTTH & Triple Play Broadband equipment\nThere adopts fiber transmission technology in PON access part, so it will not be interfered by electrical signal. EPON access eox two-way bandwidth of 1.\nOLT of local side Machine room is the core of PON system, provides uplink interfaces with high speed for information accessing like voice, data, and PON interfaces for passive optical distribution network. There is ODN network between OLT and ONU, which is passive optical distribution network consisting of optical splitter and optical fiber with the function of distributing and converging soc signals.\nEOC products are mainly for the access from optical node to user in broadcast television network. This product is developed and designed by C-Data company independently with complete intellectual property, it integrates multiple technologies including passive optical network, Ethernet, eopn optical transmission, Internet security and network management, which can meet the needs for operators to provide high quality and reliable network services for users.\nMain function module includes: There are many types according to the ec and applications of EOC products in local side, like corridor type, outdoor type, integration type, all-in-one machine. With rich variety of products, the needs of various application scenarios of broadcast television will be met.\nStandard Ethernet fiber optical transceiver module, can connect the fiber optical transceiver products of our company or third party, provides connection for data services Related Products: Transmission Distance Transmission range of PON access part can reach to 20Km, fpon can easily accomplish the coverage from head-end room to access point. Anti-Interference Capability There adopts fiber transmission technology in PON access part, so it will not be interfered by electrical signal.\nBased on HomePlug AV and IEEE standard, co-uses with Eof terminal device, builds layer 2 Ethernet data transmission channel in coaxial network of cable television, provides broadband access service based on coaxial network for users.\nStandard Ethernet fiber optical transceiver module, can connect the fiber optical transceiver products of our company or third party, provides connection for data services.", "label": "Yes"} {"text": "2MP 1080P HD USB camera with 1/2.7\" AR0230 Sensor\n1/2.7\" AR0230 CMOS Sensor, more stable\nUsing MJPEG encoding, has a very good indoor and outdoor effects, vivid colors\nSupport UVC protocol, no driver, plug and play.\nSupport USB2.0 OTG protocol, OTG access devices.\nSupport linux, Android and other embedded systems.\nSupport dual digital MIC, stereo capture quality excellence.", "label": "Yes"} {"text": "Portable Wifi Scanner\nMustek iScan Air Go\nEasy and simple way to scan your important documents and photos via Wi-Fi into tablets, smartphones, and computers\nScan wirelessly to your tablets, smartphones, and computers\nScan from your mobile devices over a direct Wi-Fi connection without complicated setup or internet requires. Wireless scanning makes scanning easy, convenient, and truly mobile.\nWorks with free iScanAir Go App\nFree iScanAir Go app is offered through the various mobile app stores right on your mobile devices. Installation is quick and easy with simple steps.\nWatch vivid real time imaging processing\nIt generates real-time motion imaging during scanning that enables to watch the scan results at the same time\nCovenient dual-mode switch\niScanAir Go offers two modes to completely satisfy the scanning needs via wireless or non-wireless operation\nEnjoy the freedom of wireless scanning!\niScanAir Go is nicely shaped for easy one hand holding that allows free movement in all directions. Ideal to scan books, documents, news-papers, boxes, decorative patterns, notes and much more.\nTrully portable design\nLightweight, slender, and battery powered, it easily slips into your bag, backpack or briefcase for an easy travel, and use at anywhere\nDownload brochure here!\nRelated Products & Services:", "label": "Yes"} {"text": "This is a preview of subscription content, access via your institution.\nBuy single article\nInstant access to the full article PDF.\nTax calculation will be finalised during checkout.\nWerbos P J. Approximate dynamic programming for real-time control and neural modeling. In: Handbook of Intelligent Control: Neural, Fuzzy, and Adaptive Approaches. New York: Van Nostrand Reinhold, 1992. 15: 493–525\nVamvoudakis K G, Lewis F L. Online actor-critic algorithm to solve the continuous-time infinite horizon optimal control problem. Automatica, 2010, 46: 878–888\nLewis F L, Vrabie D, Vamvoudakis K G. Reinforcement learning and feedback control: using natural decision methods to design optimal adaptive controllers. IEEE Control Syst Mag, 2012, 32: 76–105\nZhang H, Cui L, Luo Y. Near-optimal control for nonzero-sum differential games of continuous-time nonlinear systems using single-network ADP. IEEE Trans Cyber, 2013, 43: 206–216\nMu C, Sun C, Song A, et al. Iterative GDHPbased approximate optimal tracking control for a class of discrete-time nonlinear systems. Neurocomputing, 2016, 214: 775–784\nWang D, Liu D, Zhang Q, et al. Data-based adaptive critic designs for nonlinear robust optimal control with uncertain dynamics. IEEE Trans Syst Man Cyber Syst, 2016, 46: 1544–1555\nGao W, Jiang Y, Jiang Z P, et al. Output-feedback adaptive optimal control of interconnected systems based on robust adaptive dynamic programming. Automatica, 2016, 72: 37–45\nSahoo A, Xu H, Jagannathan S. Approximate optimal control of affine nonlinear continuous-time systems using event-sampled neurodynamic programming. IEEE Trans Neural Netw Learn Syst, 2017, 28: 639–652\nNarayanan V, Jagannathan S. Distributed adaptive optimal regulation of uncertain large-scale interconnected systems using hybrid Q-learning approach. IET Control Theory Appl, 2016, 10: 1448–1457\nFu Q, Gu P P, Wu J R. Iterative learning control for one-dimensional fourth order distributed parameter systems. Sci China Inf Sci, 2017, 60: 012204\nThis work was supported by National Natural Science Foundation of China (Grant Nos. 61233001, 61273140, 61304018, 61304086, 61533017, U1501251), Beijing Natural Science Foundation (Grant No. 4162065), Tianjin Natural Science Foundation (Grant No. 14JCQNJC05400), Early Career Development Award of SKLMCCS, and Research Fund of Tianjin Key Laboratory of Process Measurement and Control (Grant No. TKLPMC-201612).\nThe authors declare that they have no conflict of interest.\nAbout this article\nCite this article\nWang, D., Mu, C. Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism. Sci. China Inf. Sci. 60, 058201 (2017). https://doi.org/10.1007/s11432-016-9022-1", "label": "Yes"} {"text": "The next era of laboratory automation is no longer about sample movers or liquid handlers. With big data being the central focus, several new trends have emerged in this space, making laboratory automation better, more powerful, and more accessible. By Anita Ramanathan.\nAutomation goals once revolved around ‘getting more done’. Now, the goal is to build a ‘smart laboratory’ where a central platform connects and controls multiple instruments. Meanwhile, an information management system captures and stores all the data generated, making it easier for machine learning algorithms to identify patterns and inform future decisions. Worried this might be a little too much to pull off? Enter cloud-based R&D laboratories that have everything set up and ready to go.\nFrom AI-driven drug discovery to robot scientists, here are some of the latest trends in laboratory automation.\nWorkflows with end-to-end automation\nAutomation has visibly evolved from simply performing repetitive tasks to now intuitively fulfilling the entire workflow, from start to finish, better known as end-to-end automation. This is where different automation systems within a facility connect and communicate with each other to execute workflows autonomously. For example, in cell-based microscopy, the liquid handler, sample mover, incubator, and microscope are all centrally connected. When the sequence is triggered, the workflow initiates, advancing from one step to the next, all while capturing the data and sending it to a cloud-based server.\nA specially designed software is used to connect all these systems, plan workflow sequences, and monitor progress remotely, sometimes in real-time. Such an integrated ecosystem of automation can significantly eliminate the white space between individual workflows, resulting in a smoother, faster operation for the entire laboratory.\n“Our goal in drug discovery is to use automation as a tool to find drugs faster, reduce costs, and improve accuracy,” notes Dr Cathy Tralau-Stewart, Chief Scientific Officer at C4X Discovery, a company that combines drug discovery expertise and cutting-edge technologies. “We can now employ automation in almost every aspect of drug discovery – from finding and validating targets to running clinical trials. We need to leverage any tool – automation included – to make our processes more efficient, and hopefully, reduce attrition rates.”\nTo experience immediate efficiency gains from end-to-end automation, without being weighed down by the technical minutiae of algorithms, it helps to collaborate with vendors specialising in automation software and hardware to customise and build out these sequences. The deployment of these advanced automation projects can range from a few months to almost a year based on the sophistication of the workflow.\nOne such success story of end-to-end automation accelerating the drug discovery pipeline comes from the AstraZeneca iLab in Gothenburg, Sweden, where compound synthesis runs on automation. “What was once a manual, multi-step process in medicinal chemistry is now fully automated, from start to finish”, says Dr Michael Kossenjans, Head of iLab, AstraZeneca. “We set up, perform, and monitor the chemical reactions. Once complete, we can then isolate, purify, and quantify the crude product – all from a single platform.”\nThe iLab team has successfully built a centrally connected automation system that can manage different instruments involved in the compound synthesis workflow, i.e, supplying the precursor chemicals, performing the analytical chemistry, and preparing the stock solution for screening. Using carefully crafted workflow sequences, small molecule compounds are now synthesised and purified autonomously.\nCentralising data and adopting good data practices\nAutomation generates massive amounts of data. This can be good news or bad news – it all depends on the data practices enforced within the laboratory. Given the large volume of data being produced, laboratories need to have a digital infrastructure in place to manage it.\nData gathered from automated workflows will need to be appropriately captured, annotated, and stored. Digital tools can be typically used to centralise and manage all the data from instruments, samples, inventory as well as end-to-end workflows. Instruments with their own vendor software platform connect to the central data repository through an application programming interface (API).\nModern data management solutions specifically designed to support automation in laboratories are already equipped with all these necessary features. It is, however, important to standardise experimental processes and data capture practices across the company. This means, experiments are kept consistent, and for each experiment, the user records the same set of data points every single time. “A big part of my role as the data director is to ensure that datasets are gathered properly,” says Dr Yohann Potier, Director of Data Platform at Tessera Therapeutics, a company pioneering in a novel genome engineering technology. “Our automation, computational and scientific teams work in close collaboration to uphold good data practices.”\n“There is immense value in data – that is where the intellectual property is,” adds Dr Potier. “In the era of automation, I would say a company’s data is now considered to be its biggest asset.” Cloud-based information management systems can be used to centralise data and make it accessible remotely in real-time, eliminating data silos between teams or departments. This stored data can then be retrieved in the future to power machine learning algorithms. But there’s one caveat – the available data needs to be ‘clean’.\n“As laboratories build their automation systems with the goal of using AI in the future, having a clear strategy for gathering and storing this data is an important step,” notes Anca Ciobanu, Theme Lead at Pistoia Alliance, a not-for-profit membership organisation aimed at bringing R&D leaders together for pre-competitive collaborations. “Changing data practices every so often or swapping platforms without a purpose decentralises the laboratory’s data, making it very challenging to make use of it later on, ”continues Ciobanu. “Implementing AI is only possible with centralised, good quality data.”\nLeveraging AI in small and big ways\nA 2021 report1revealed that AI will have the most impact on the pharmaceutical industry in the coming years, attracting almost 100 collaborations between pharma companies and AI vendors in recent times. Although AI is already being successfully used in tech industries and for image and speech recognition, it is now beginning to make strides in drug discovery as well.\nIn laboratories with automated workflows, the data generated from a series of experiments can be used to train AI systems to learn the ‘rules’ of the experiment and infer new knowledge accordingly. AI is essentially the ability of a computer to mimic human cognitive functions, such as learning and troubleshooting. Machine learning, on the other hand, is a subset of AI. It uses data to learn and improve without any intervention, imparting intelligence to the computer.\nIn a scientific setting, AI can be used to run simple tasks or to perform complex multi-step workflows. At the AstraZeneca iLab, AI is used in small and big ways. “We use an AI-based platform that provides us with suggestions on how to synthesise compounds”, says Dr Kossenjans. “In the past, to synthesise a molecule, a chemist would have to scribble down all the different steps to be performed. Now, we have algorithms where we simply input the desired molecule, and it shows us the steps required to synthesise it, along with protocols and literature references.”\nDr Kossenjans continues: “Running a fully autonomous workflow with no human input wouldn’t be possible without AI because there needs to be a programme that can make decisions in our absence. Our automated workflows have an ‘if this happens, then do that’ feature. For example, if the pressure in the reactor vial gets too high, then stop and cool immediately. That’s AI at work.”\nThe team is now building a more advanced AI model to make decisions on the experimental process itself, beyond the instrument. For example, if particular outcome wasn’t achieved, the AI will analyse what went wrong and automatically choose how to modulate the temperatures or solvent concentrations, and then repeat the experiment. The fundamental goal of AI in drug discovery is to progress experiments in a self-determining, independent manner to reliably achieve the desired output.\nThe arrival of robot scientists\nWhat if your lab partner happened to be a robot? That’s what Dr Ross King, Professor of Machine Intelligence at Chalmers University of Technology, studies and develops.\nDr King’s team built the world’s first robot scientist, named Adam, that successfully made a novel scientific discovery in yeast genomics without any human intervention. A robot scientist is essentially a computation system that is capable of generating its own hypothesis, performing experiments, analysing data, and repeating the entire cycle. Its brain is a collection of computers; its body, a set of laboratory robotic arms connected to incubators, liquid handlers, and other relevant instruments.\nAnd it’s the kind of lab partner that doesn’t stop until it finds an answer.\n“We equip the robot scientist with background knowledge. With that, it has an automated way of formulating hypotheses using machine learning”, explains Dr King. “It can then select different experiments to test each hypothesis. We optimised it for time and speed – so it would design experiments that are as cheap as possible and get to the answer as fast as possible. The robotic arms then carry out the experiment, providing results that the robot scientist can analyse. This cycle then continues until there is only one final theory that is consistent with the background knowledge provided.”\nAfter Adam came Eve, the second robot scientist from Dr King’s laboratory that can automate early-stage drug design. Eve can autonomously perform library screening, confirm hits, and generate leads. Currently, the next-generation robot scientist being developed in his laboratory is called Genesis, equipped with AI capabilities to design, plan, and execute thousands of parallel experiments in complex biological models.\nSimultaneously, Dr King is also working on the ultimate challenge – building an AI-driven robot scientist that can autonomously design and make Nobel Prize-quality scientific discoveries by 2050.\nWhile the idea of robot scientists taking over experiments in drug discovery may make some uncomfortable, when seen through the lens of shrinking the drug discovery timeline, there’s no tool better than machines, according to Dr King: “Machines are much faster than humans at deciding what compound to test next. They can analyse copious amounts of data from previous experiments and comb through millions of scientific publications. And they can do so more logically, more reliably, and better than humans ever can. I believe robot scientists have the potential to significantly improve productivity and efficiencies in the drug discovery process, and ultimately save time and costs.”\nCan AI and robots ever replace scientists in drug discovery?\nOver the years, laboratory automation has progressed in its capabilities and sophistication. Now, with AI-enabled troubleshooting and robotics, experiments can be autonomously performed with minimal human intervention.\nUnderstandably, some scientists worry if these machines might be smart enough to replace humans. While it’s certain that the role of a scientist within an R&D laboratory is bound to change in the near future, machines cannot replace scientific thinking, experts concur.\nMAN VS. MACHINE: INDUSTRY EXPERTS WEIGH IN\n“This concern stems from our reluctance to embrace change. Organisations that are investing in automation need to engage in open dialogue with their scientific team. It needs to be clearly communicated that automation will make it possible for them to work on more valuable and creative tasks that ultimately accelerate the drug discovery process.\nAlso, many scientists trained in academic settings may not have had the opportunity to work alongside automation systems. Therefore, offering training opportunities to build their knowledge around AI can alleviate some of these concerns. Over time, with increased awareness, scientists will become more receptive to their changing roles.” – Anca Ciobanu, Theme Lead, Pistoia Alliance.\n“Humans and machines are better together than they are alone. AI systems can already perform the complete loop of scientific research, including hypothesis development and data analyses. My contribution to science is the world’s first robot scientist that autonomously made a novel scientific discovery. Since then, my team has built more advanced robot scientists.\nAI systems have superhuman capabilities to remember, learn, and extract useful information from enormous datasets. I believe we need to explore this power of AI, especially if it can get us better, faster results in drug discovery.\nOn the other hand, humans have a much better understanding of the overall goal of a project. Robots don’t get the ‘big picture’ as they can only solve a specific problem based on the knowledge we provide.” – Dr Ross King, Professor of Machine Intelligence, Chalmers University of Technology.\n“My position on this is very much inspired by chess. A computer can be programmed to become a great chess player. However, if we teamed this computer up with a grandmaster, we now have an unbeatable combination. Scientific work can be significantly enhanced by combining the core strengths of AI and the human mind.\nWe became scientists because we were curious about the world around us… about how things work. What if we applied that natural curiosity to not only explore what we’re studying, but also how we’re studying it? Having that openness and being willing to learn about AI and how to leverage it for better and faster research will be key.” – Dr Martin-Immanuel Bittner, CEO and Co-Founder, Arctoris.\n“I don’t think robots can replace us, but they can definitely transform what we do and how we do it. This is an industry that cannot – and should not – sit still. Being in drug discovery requires embracing innovation. We need to be willing to learn new and different ways of doing things.\nBy leveraging the speed of robotics, we can actually do better science – produce higher quality data, screen fewer compounds, and bring drugs to market faster. As for the fear of being taken over by robots… If scientists ultimately control and program the robots, then there’s actually nothing to worry about, right? Scientists can now focus on the science rather than routine tasks and can gain valuable insights from AI and machine learning.” – Dr Cathy Tralau-Stewart, Chief Scientific Officer, C4X Discovery.\n“Machines can give us more freedom to creatively think about a scientific problem. Let’s take an example from the field of imaging. Histopathologists spend years in training learning about how cells look under a microscope. On the job, they used to spend hours every day examining a single image and drawing contours around cells. Now, a machine can do this task in seconds. But histopathologists haven’t lost their jobs. They now bring other strengths, such as adding new targets to the imaging protocols and reviewing data.\nIn much the same way, when AI and machine learning take over some of the tasks, scientists can spend more time designing new experiments or scaling up existing workflows. – Dr Yohann Potier, Director, Data Platform, Tessera Therapeutics.\nRemote R&D labs and strategic partnerships\nFor an individual laboratory, automating a single task can be rather straightforward but building an in-house robotic system that can accelerate the R&D process isn’t trivial. This is where outsourcing to or partnering with R&D laboratories with niche expertise and ready-to-go automation systems can come in handy.\nCloud-based R&D laboratories are now emerging both in service-based start-ups, such as Emerald Cloud Lab and Strateos that provide remote-controlled R&D services to research groups, as well as inside global pharmaceutical companies to streamline internal projects across different teams. Using a secure portal, a task triggered from any site in the world can now be completed at a dedicated R&D laboratory located remotely. “When we build our fully automated, cloud-powered R&D laboratories at AstraZeneca in a year or two, we want our scientists from around the world – in US, UK, China, Sweden and beyond – to be able to use them”, shares Dr Kossenjans. “No matter where the laboratory is physically located, experiments can be started from a user’s desktop.”\nEstablishing strategic partnerships with drug discovery companies that have in-house expertise in data science and automation can also help accelerate the R&D pipeline. “We automate every step of the drug discovery process – target validation, hit ID, hit-to-lead, and lead optimisation”, says Dr Martin-Immanuel Bittner, Co-Founder and CEO of Arctoris, a tech-enabled drug discovery company that leverages robotics, data science, and machine learning to progress a pipeline of programmes in oncology and neurology.\nThis new category of drug discovery companies, such as Arctoris, is entirely powered by data. “There are literally hundreds of AI companies out there, but only a handful that combines robotics, data science, and AI,” says Dr Bittner, who is a clinician-scientist by background. “We developed a fully automated laboratory architecture that allows us to generate structured, reproducible, high-quality data that is machine-learning ready by design. That means, we can power our AI’s decision-making process with this superior quality data, enriched with metadata and contextual information. We strongly believe that the key to successful drug discovery lies in having better data to make better decisions – and ultimately benefit patients worldwide.”\nHere’s how strategic partnerships work with data-powered R&D companies: Once you’ve established a partnership agreement, and both scientific teams have agreed on the milestones they would like to achieve together, the experiments are built using the vast library of automated protocols that the company, such as Arctoris, has already developed and optimised. When the project begins, experiments run in a robotic wet laboratory, generating data 24×7.\nLeveraging a fully automated R&D workflow has the potential to produce more than 100x the number of data points per experiment compared to industry standards, according to Dr Bittner. Plus, the data is automatically captured, annotated, quality-controlled, visualised and analysed. This allows the iterative ‘design-make-test-analyse’ cycle in R&D to be accelerated several-fold.\nCollaborating to serve a unified cause\nAs the pharma industry navigates the unpaved path towards AI-driven drug discovery, sharing knowledge and collaborating with peers will be necessary. At the moment, each company, working independently, tackles AI-related problems on its own, unaware of the fact that dozens of others might have a similar challenge. But what if we were to start exchanging ideas and share our best practices with industry peers? Working together – and setting standards along the way – might just help us all get to our goals faster. After all, every company in the industry strives to achieve the same cause – bringing better drugs to the market, faster.\n“We learn as much from our missteps as from our successes,” says Ciobanu, who moderates in-depth discussions on topics such as automation, AI, and machine learning for professionals across the industry. “Presenting use cases at conferences and outlining AI strategies that worked, along with those that didn’t, can help companies learn from each other. That’s why at Pistoia Alliance we encourage open discussions between small and large pharma companies to facilitate knowledge sharing, brainstorm ideas, and provide access to information otherwise contained within companies.”\n“We’re also seeing better integration between automation vendors and software providers,” notes Dr Potier. “They’re now working together to provide APIs and open databases so lab-generated data can be easily converted to reports. This type of integration was nearly impossible a few years ago.”\nOn another note, a critical issue resulting from automation that requires our immediate attention is the plastic waste generated from single-use consumables. “We perform thousands of experiments on our automated platforms, often in parallel, producing excessive amounts of plastic waste around the world, each day”, says Dr Kossenjans. “This is something that warrants our attention right now… while we build our automation systems. Because it doesn’t make sense to advance one domain of science while creating a new problem for another.”\nDrug Discovery World e-book – innovating in the lab\nAbout the author\nAnita Ramanathan is a science writer and award-winning speaker based in Bristol, UK. In her capacity as a science writer/editor at several digital publications, including NIH Research Matters, she has crafted dozens of stories buried under numbers and scientific findings. A storyteller at heart, Anita also delivers science communication workshops.", "label": "Yes"} {"text": "Adversarial attacks against machine learning models are a rather hefty obstacle to our increasing reliance on these models. Due to this, provably robust (certified) machine learning models are a major topic of interest. Lipschitz continuous models present a promising approach to solving this problem. By leveraging the expressive power of a variant of neural networks which maintain low Lipschitz constants, we prove that three layer neural networks using the FullSort activation function are Universal Lipschitz function Approximators (ULAs). This both explains experimental results and paves the way for the creation of better certified models going forward. We conclude by presenting experimental results that suggest that ULAs are a not just a novelty, but a competitive approach to providing certified classifiers, using these results to motivate several potential topics of further research.", "label": "Yes"} {"text": "02-23-2012, 12:43 PM\nI was having some electrical issues when I installed a system in an 02 ext cab chevy. Anything over around 600w, and my subs would pop and the truck would die sometimes, especially on long low bass notes. All I did was install the battery near the amp with good ground and good quality 4g and all my dimming and voltage problems are completely gone. One kick *** little battery and at around $60, a good investment.", "label": "Yes"} {"text": "According to Finnish Energy, more than one-third of the electricity produced in Finland in 2022 came from nuclear energy and less than 20% from hydropower. The shares of biomass and wind energy were slightly smaller than that of hydropower. The share of nuclear energy will increase significantly once the Olkiluoto 3 nuclear power plant unit starts regular electricity production. The share of wind energy increases at a faster rate. Wind energy could cover as much as 50% of Finland's electricity consumption in 2030, according to Anni Mikkonen, Executive Manager of the Finnish Wind Power Association. The share of wind energy could rise to 70%. Finland's electricity transmission system operator Fingrid estimates that wind energy will overtake nuclear energy in 2026 or 2027.", "label": "Yes"} {"text": "For the development of innovative technologies and products, the customer conducts its own research and development (R&D). Experts from the fields of measurement technology, machine learning (ML), frontend and backend software development and user experience form an interdisciplinary team.\nAmong other things, the customer developed a product with the aim of an automated, location- and device-independent online test procedure for the individual adaptation of medical products. The central aspect of the project is the digitization of the measurement process, which is traditionally carried out on site with the help of specialized equipment and trained personnel. PROTOS Technologie supported the customer in achieving this goal by implementing a modern cloud infrastructure to improve and accelerate the development process.\nMachine Learning Operations (MLOps)\nWhen changing from the experimental development phase to production maturity, it became clear to the customer that, above all the Working with Machine Learning Operations (MLOps) brings great benefits. The central prerequisite for the successful implementation of the project was a robust, cost-effective and secure infrastructure which can be continuously tailored and optimized for new machine learning tasks. This means that machine learning engineers can be relieved of the often most time-consuming tasks such as data preparation and model provision and use their capacities for development progress.\nIn order to integrate new AWS cloud-based MLOps functions into the backend, there had to be close coordination with the respective development teams. The frontend developers were provided with endpoints for uploading data and using the machine learning models with the right interfaces. In cooperation with machine learning engineers and data scientists, a data environment hosted in AWS and a training environment for ML was set up.\nAlso the Development and maintenance of a scalable CI/CD pipeline, to ensure versioning, verifiability and testing was part of the requirements and interlocks classic DevOps with ML-specific requirements to MLOps.\nAWS Machine Learning Pipeline:\nPROTOS Technologie supported the customer in the implementation of MLOps so that the necessary infrastructure resources and processes could be made available. Automation has improved, accelerated and secured the development process.\nProbably the biggest challenge in machine learning projects is often the enormous amount of time that is required to process data acquisition, data preparation and model training. The biggest advantage of MLOps is the facilitation by automating processes and relieving the ML experts to optimize a machine learning project.\nIn addition to collection and storage, the large amounts of data required also require prior preparation. The provision on modern cloud infrastructure, as well as the optimization and automation of these factors, with the help of PROTOS’ cloud expertise, made an essential contribution to improving the entire machine learning process.\nImplementation in the AWS Cloud:\nIn the AWS Cloud, a Data Pipeline with AWS Lambda, Amazon S3 and implemented AWS KMS, which encrypts the data, prepares it and supports ongoing data cleaning (data cleaning) and categorization (data labeling).\nWith the data and the computing capacity provided by AWS, the machine learning model training could be transferred to the AWS cloud in a containerized form. The advantage was that the model training can be run on the scalable and optimized CPUs and GPUs of the cloud, regardless of location and user. In addition, the hosting of the trained models in production could be realized in a lightweight, cost-effective and highly available and scalable manner via AWS Lambda serverless. The possibility of a containerized runtime in AWS Lambda offers modern API-first approaches even for the deployment of complex machine learning models.\nTo enable interaction with the data pipeline and the ML model results, a secure AWS API Gateway endpoint was made available to mobile and frontend developers.\nThe highest security standards and intensive testing (unit tests / integration tests) were the basis of the implemented CI/CD process, which automates the deployment and testing of the infrastructure operated on AWS.\nAll resources were obtained using AWS Cloud Development Kit (CDK) if Infrastructure-as-Code provided. This meant that the complete infrastructure for operating an MLOps-optimized machine learning project could be provisioned and understandably adjusted with one click, and could continue to be operated by the customer himself.", "label": "Yes"} {"text": "Got this press release, which is cool enough to share:\nColliding stars reveal their gravitational wave secrets\nAustralian scientists have announced an “unparalleled” astrophysical discovery revealing that they have detected gravitational waves from the death spiral of two neutron stars.\nLess than a month after three US professors were awarded the Nobel Prize in Physics for the 2015 discovery of gravitational waves, a team of Australian astrophysicists, including Swinburne researchers, have announced a new international discovery.\nIt is the first time a cosmic event has been observed and measured in both light and gravitational waves.\nSwinburne hosts the $31.3 million Australian Research Council’s Centre of Excellence for Gravitational Wave Discovery (OzGrav) which was established last year to capitalise on the original discovery of gravitational waves.\nSwinburne’s Professor Matthew Bailes, Director of OzGrav, says the new discovery has enabled scientists to pinpoint the origin of gravitational waves and to actually see “the colossal event” that accompanied the gravitational waves.\n“This was the first time that any cosmic event was observed through both the light it emitted and the gravitational ripples it caused in the fabric of space and time,” Professor Bailes says.\n“The subsequent avalanche of science was virtually unparalleled in modern astrophysics.”\nOzGrav is a collaboration between six universities in Australia – Swinburne University of Technology, Australian National University, the University of Western Australia, Monash University, the University of Melbourne, and the University of Adelaide.", "label": "Yes"} {"text": "Computer science definition, the science that deals with the theory and methods of processing information in digital computers, the design of computer hardware and software, and the applications of computers. A server is a computer program that provides a service to another computer programs (and its user) in a data center, the physical computer that a server program runs in is also frequently referred to as a server that machine may be a dedicated server or it may be used for other purposes as well. Computer security: a practical definition defining computer security is not trivial the difficulty lies in developing a definition that is broad enough to be valid regardless of the system being described, yet specific enough to describe what security really is. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a. It also contains coverage of computer terms in industry, school, work, education, and the home, including the internet, multimedia, networks and databases, and security terms are defined in a jargon-free and concise manner with helpful examples where relevant.\nIt is possible to connect a number of computers and other electronic devices to create a computer networkthe computers and devices which are part of the network can talk to each other and exchange information. A computer is a programmable machine the two principal characteristics of a computer are: it responds to a specific set of instructions in a well-defined manner and it can execute a prerecorded list of instructions (a program) modern computers defined. Computer software defined computer software is programming code executed on a computer processor the code can be machine-level code, or code written for an operating system. Definition of computer system: a system of interconnected computers that share a central storage system and various peripheral devices such as a printers, scanners, or routers each computer connected to the system can operate.\nOver 6,500 entries previously named a dictionary of computing, this bestselling dictionary has been fully revised by a team of computer specialists, making it the most up-to-date and authoritative guide to computing availableincluding expanded coverage of multimedia, computer applications, networking, and personal computing, it encompasses all aspects of the subject. A file, in the computer world, is a self-contained piece of information available to the operating system and any number of individual programs a computer file can be thought of much like a traditional file that one would find in an office's file cabinet just like an office file, information in a. “a computer is an electronic machine that can solve different problems, process data, store & retrieve data and perform calculations faster and efficiently than humans.\nDefinition of: computer system computer system the complete computer made up of the cpu, memory and related electronics (main cabinet), all the peripheral devices connected to it and its operating. Computer definition a computer can be defined broadly as any of a class of man-made devices or systems that can modify data in some meaningful way data is a collection of distinct pieces of information , particularly information that has been formatted (ie, organized) in some specific way for use in analysis or making decisions. Definition the word port can have 3 definitions in computer terms the first and most common definition, is a place or input on your computer that information goes into and out of. The indefinite article is a or an the form an is used before a word that starts with a vowel sound a girl a cat an eight-year-old girl an engineer the indefinite article is used with si.\nDefinition - what does computer mean a computer is a machine or device that performs processes, calculations and operations based on instructions provided by a software or hardware program it is designed to execute applications and provides a variety of solutions by combining integrated hardware and software components. A programmable electronic device that can be used to store and manipulate data to carry out designated functions the two fundamental components are hardware, that is, the actual electronic device, and software, that is, the instructions or program used to carry out the function. Stands for uninterruptible power supply in the technology world, ups is more than just a brown shipping company it is also a type of power supply that uses battery backup to maintain power during unexpected power outages. Define computer system computer system synonyms, computer system pronunciation, computer system translation, english dictionary definition of computer system noun 1 computer system - a system of one or more computers and associated software with common storage adp system, adps, automatic data processing system. In computing, a program is a specific set of ordered operations for a computer to perform in the modern computer that john von neumann outlined in 1945, the program contains a one-at-a-time sequence of instructions that the computer follows.\nComputer definition: 1 an electronic machine that is used for storing, organizing, and finding words, numbers, and pictures, for doing calculations, and for controlling other machines: 2 an electronic device that can store large amounts of information and be given sets of instructions to organize learn more. Computer hardware is the collection of physical parts of a computer system this includes the computer case, monitor, keyboard, and mouse it also includes all the parts inside the computer case. The alternative for computer science for all is computer science for some and nothing for the rest, says chris stephenson, head of computer science education strategy at google and a member of the association for computing machinery's education board.\nComputer crime the use of a computer to take or alter data, or to gain unlawful use of computers or services because of the versatility of the computer, drawing lines between criminal and noncriminal behavior regarding its use can be difficult. When most computer users refer to the term, they are talking about the main memory of the computer this is also called the random access memory (or ram for short) however, memory chips of varying types are integrated into just about every electronic device you can think of, including coffee machines, microwaves, network routers, and cell phones.\nTechnically, a computer is a programmable machine this means it can execute a programmed list of instructions and respond to new instructions that it is given. Definition of computer - an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variabl. A notebook computer is a battery- or ac-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. Webopedia is an online dictionary and internet search engine for information technology and computing definitions voted best technology website.", "label": "Yes"} {"text": "Human Pheromones in Scientific Publications\n\"Pheromones have profound effects on women's sexual behavior\"\nby Thornhill and Gangasted, University of New Mexico.\n\"Moods of sexual arousal were induced by the pheromones tested\"\nby Bensafi, Brown Neuroscience Institute, University of California.\n\"Pheromone compounds cause behavioral response in humans\"\nby Savic, Berglund, Gulyas, Roland ofKarolinska Institute, Sweden\n\"Chemical signals we send have a direct affect on hormones in other people\"\nby Fink, Atzmueller, Vohl and Grammar of the University of Vienna.\n\"Chemical signals play an important role in reproductive states and behaviors\"\nInternational study by Stamford University, University of Berkley, University of Washington.\nCopyright (c) 2007 Ascent Research Group LLC", "label": "Yes"} {"text": "I think my battery still works because the light is green when I plug it in but it does not charge my laptop sooo my question is what I do from here should I take it to someone to look at it because if the battery is okay then it is the laptop that is having problems well I dont know much about computers sooo please talk in lamens term for me!!!!!!!!!!!\na 6ya Technician can help you resolve that issue over the phone in a minute or two.\nBest thing about this new service is that you are never placed on hold and get to talk to real repair professionals here in the US. click here to Talk to a Technician (only for users in the US for now) and get all the help you need. Goodluck!\n- If you need clarification, ask it in the comment box above.\n- Better answers use proper spelling and grammar.\n- Provide details, support with references or personal experience.\nTell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only.\nTip: The max point reward for answering a question is 15.\nThis is a common problem. It may be that the charger is dammaged. these Dell chargers have a micro thin communication cable in them that tell the charger to charge the battery. this micro thin cable can often break. Its use it to prevent the laptop battery from over charging, but if it breaks or becomed broken inside tha charger cable, then the laptop simply won't get the charge signal and the battery won't charge. If this is the case, then you will need to replace the charger with another Dell charger compatible with your laptop\nThe ambar lights are warning you the battery is becoming to dead, it means in a short time, if it has not happens now, the battery won't retain the charge anymore, it is time thinking in a replacement if you use your laptop without plug in the power outlet.\nsounds like your charging circuit isn't working or the adapter isn't putting out enough power or amprage to fully charge the battery, or you battery went bad. if the charging circuit is bad then so is *********** board, time to burry the system and buy a new one\nFirst thing I would try is to unplug the machine, remove the battery and clean the contacts on the battery and in the battery housing with a pencil eraser. Blow out the shavings and reinstall battery - the way it sounds is that there may be dirt or corrosion causing an interference between the computer and battery contacts - for charging and powering up.\nTry this trick. Remove the battery from the laptop and make sure the ac adapter is not plugged in also. Hold the power button for 30 seconds. Place the battery back in and see if it powers on. If not let me know.\nTry to turn off the computer and remove the battery from the bottom of the notebook. Turn on the computer with just the charger plugged in. If it doesnt turn on. you may have a bad power port.\nIf it has no power/charging issue since that happened except that the indicator light doesnt turn on when you plug in the charger, you may just need a bios update. Click here. That's the bios update for the inspiron 2200 from dell's website. You should have at least 30% charge on the battery and the ac adapter should be plugged in so you can run it. The computer will restart and will come back normally after this. I'd suggest that you backup your files before running this.", "label": "Yes"} {"text": "J.S.T. Corporation Datasheets for Wire Terminals\nWire terminals are passive conductors used to facilitate a connection that is not soldered.\nWire Terminals: Learn more\n|*Provides soldering connection between the Dumet wire and lend wire of the LCD Back-light CCFT.\n|Batt type Non-insulated type\n|Blade type With insulator\n|Connection by bullet terminal\n|Copper tubular type\n|Knife disconnect type With insulator\n|Lipped blade type\n|Non-insulated type 2 holes type\n|Non-insulated type Batt type\n|Non-insulated type Blade type\n|Non-insulated type Copper tubular type\n|Non-insulated type Fork tongue terminal X type\n|Non-insulated type Fork tongue terminal Y type\n|Non-insulated type Others\n|Non-insulated type Parallel type\n|Non-insulated type Pin type\n|Non-insulated type Ring terminal\n|Non-insulated type Spead tongue terminal\n|Pin type With insulator\n|Quick connection type Tab-on/in type\n|Quick connection type With insulator\n|Ring terminal Non-insulated type\n|Ring terminal With insulator\n|Spead tongue terminal Non-insulated type\n|Spead tongue terminal With insulator\n|Spead tongue terminal\n|This button terminal is used as a contact interface for lamp sockets and fuse holders in automobiles. Products using this contact are far more reliable and easier to use than...\n|This splice has special channels inside its crimp areas so that insulation-coated windings (magnet wire like enamel-coated wire, etc.) can be electrically connected without removing the insulation coating. It is...\n|This splice is used to connect a vinyl-insulated wire to a defrosting heater wire of a refrigerator or a freezer. The barrel of the splice has a lid feature that...\n|This terminals is used to connect a cluster pin (2.3mm in diameter) to a lead of a motor hermetically sealed in a compressor of a refrigerator, freezer or air conditioner.\n|This wire-to-wire splice is used extensively for straight, branching, and end connections.\n|With insulator Batt type\n|With insulator Blade type\n|With insulator Closed-end type\n|With insulator Fork tongue terminal X type\n|With insulator Parallel type\n|With insulator Quick connection type\nSolderless Terminals -- Ring tongue terminal (R-type, Vinyl-insulated with copper sleeve) (Medium size)\nSolderless Terminals -- Ring tongue terminal (R-type, Vinyl-insulated with copper sleeve) (straight)\n|With insulator Ring terminal\nSolderless Terminals -- Spade tongue terminal (A-type/B-type, Vinyl-insulated with copper sleeve) (flared)\nSolderless Terminals -- Spade tongue terminal (A-type/B-type, Vinyl-insulated with copper sleeve) (straight)\n|With insulator Spead tongue terminal", "label": "Yes"} {"text": "|BBC Micro Disc Drive Switcher|\nHere at the Archive we come across a range of different disc sizes and formats. Not only that but we also receive a range of disc image types. Recently the Archive has invested in a GreaseWeazle, which can read protected DFS format floppy discs and save these as HFE images which preserve the protection.\nTo read HFE disc images and convert them to SSD images where possible, the Archive uses a GOTEK floppy drive emulator. This has been built into a spare, self-powered 5.25\" floppy drive enclosure and is connected when needed.\nSwapping disc drives in this way is a tedious process and could cause damage to the connectors on the BBC computers used.\nThe Archive mainly uses BBC Master computers complete with Retroclinic Datacentres to make images to preserve. The Datacentre is used to export the images as SSD/DSD files. The main archiving machine has dual 40/80T 5.25\" floppy drives permanently attached. 5.25\" is the de facto standard for educational software on the BBC range. 3.5\" floppy discs are also encountered aimed at the BBC Master Compact range or the Archimedes range of computers, where they run under emulation.\nA second BBC Master computer was set up with 3.5\" and 5.25\" floppies connected using a Watford Electronics Duck, a device which takes two single drives and combines them to make a single dual drive. This machine is used to make ADFS disc images from 3.5\" floppy discs using OmniFlop on a Windows XP PC.\nWith the introduction of the GreaseWeazle device a GOTEK floppy drive emulator was needed to be permanently available and the secondary BBC Master computer was the target machine. What was needed was a switch which would swap between a 3.5\" drive, a 5.25\" drive and a GOTEK.\nStarDot Forums member ChrisO was able to provide a solution to the Archive's problem. ChrisO had designed and had made a PCB which allowed him to attach 4 different disc drives to a BBC computer at the same time and to switch any of them to be drive 0/2 or drive 1/3. His unit behaved as a very versatile dual drive.\nThis was not exactly what the Archive needed, however. ChrisO was able to supply a blank PCB and this was adapted to fit the Archive's needs. No changes were made to the PCB itself. The components and switch needed to choose drive 1/3 and to light LEDs were omitted and only those components needed to switch 1 of 4 disc drives as drive 0/2 were used.\nThis article documents the building of this drive switcher.\nThe Archive had a spare, obsolete, 4 position Data Switch which was suitable to recycle for this project. Fortunately the PCB supplied fitted inside the switch box exactly.\nThe first job was to strip the switch box to leave the skeleton box.\nThe next stage was to cut out a rectangle to allow access to the drive connectors on the PCB and also the drive number links next to each drive connector and to drill holes for mounting the PCB to the rear of the switch box.\nThe rectangle was cut out and the holes drilled.\nAfterwards the rectangle was filed square and all burrs removed. The rear panel was covered with black, self-adhesive vinyl to cover the holes and trim the rectangle cutout.\nAfter this, the PCB was populated with the pull-up resistors, R1 to R4, the 34-way box connectors and the 3-pin drive selector links. The PCB was then fastened to the rear panel using 3mm bolts and 6mm standoffs. The multi-pole 4-way switch was also fitted.\nJumper wires were soldered from the switch contacts on the PCB to the rotary switch.\nThese jumper wires were coded yellow = drive A, white = drive B, green = drive C and red = drive D. Three rotors on the switch were needed.\nAfter wiring the switch the case was re-assembled and the drive selector jumpers were placed on the links. All drives were set to be drive 0 as that was how they were originally set up.\nThis switch box will be a very useful addition here at the Archive and also when visiting various shows and events. It will allow a range of disc drive types to be used without frequent dismantling and reassembly.\nThe secondary archiving machine now has a 3.5\" drive permanently connected as drive 1/3 (or drive 5 under ADFS) and any one of a 3.5\", an 80T 5.25\", a 40/80T switchable or a GOTEK connected as drive 0/2 (or drive 4 under ADFS).\n|© 2018 - 2023 flaxcottage.com|", "label": "Yes"} {"text": "Skip to Main Content\nN-ZnO/P-CuI heterojunctions are fabricated by growing undoped n-type ZnO thin films on p-type γ-CuI (111) single-crystal substrates using radio-frequency magnetron sputtering. The ZnO films are identified to be columnar structured with c-axis-preferred orientation by using X-ray diffraction and scanning electron microscope. Measurements of the energy band alignment of ZnO/CuI interface by using X-ray photoelectron spectroscopy result in a valence band offset of 1.74 eV and a conduction band offset of -1.37 eV, meaning a type-II band alignment at the interface. A typical diodelike behavior of the current-voltage curve indicates its possible applications in optoelectronics with further development.", "label": "Yes"} {"text": "On the Method of Solution of the Wave Equation with Periodic Coefficients\nMOSCOW STATE UNIV OF ECONOMICS STATISTICS AND INFORMATICS (RUSSIA)\nPagination or Media Count:\nThe analytic method of solution of nonuniform wave equation of the problem of radiation of the magnetic moment, moving uniformly in the waveguide of arbitrary cross section with time-space periodic dielectric filling is given. The fields and the analytic expression for the Cerenkov energy losses of the magnetic moment in the region of strong resonance interaction between the radiation wave and the modulation wave are found.\n- Radiofrequency Wave Propagation\n- Numerical Mathematics", "label": "Yes"} {"text": "Skip to Main Content\nThe positive temperature coefficient (PTC) generally defines a substance in which electrical resistance increases when temperature increases. In present usage, PTC refers to certain semiconductive thermistors which have significant positive temperature coefficients over a defined range of temperatures. PTC's have varied appliance applications, including temperature sensing, current controlling, and heating. Only the heat generating attributes of PTC's are considered. Design engineers are first provided with background information on the technical aspects of the PTC semiconductive pellet, which is the actual heat generating source. Also presented is information regarding the selection of the medium to transfer the heat. Then PTC heaters are analyzed with regard to their usefulness in certain appliance designs. A summary of the best PTC design attributes is also given.", "label": "Yes"} {"text": "Observations are presented of the horizontal magnetic component of Schumann resonance intensities as simultaneously measured at locations in California and Western Australia during two separate intervals September 2–17, 1989, and April 14–21, 1990. For both intervals, diurnal variations of the average magnetic power over the lowest three modes of the Schumann resonances showed substantially different temporal profiles at the California and Western Australia stations, with interstation correlations of 0.51 and 0.39, respectively. A method is demonstrated for determining from these observations the average local time variation of the height of the D region. A height variation is obtained that is nearly identical for the respective analysis intervals, with a minimum height occurring at approximately 1300–1400 LT and a maximum-to-minimum height difference of roughly 50% of the mean. When corrected for the local D region height, the detailed diurnal intensity profiles over the analysis intervals display a greatly improved similarity, with interstation correlation coefficients increasing from 0.51 to 0.70 and from 0.39 to 0.82, respectively. Substantial agreement between the two stations after correction for D region height suggests that such observations could be used to monitor the global totality and variability of lightning, quantitatively and at time resolutions of the order of 10 min or less, in studies of global change. These results also suggest that with suitable instrumentation, in situ measurement of Schumann resonance intensities could provide a viable method for monitoring the global totality of lightning in other planetary systems capable of supporting the resonances, most notably Venus and Jupiter.", "label": "Yes"} {"text": "Outlier detection is a crucial step in many data science problems in any field. A lot of outlier detection methods have developed and applied in real life, ranging from univariate descriptive statistics to the use of machine learning/deep learning for multivariate outlier detection.\nOutlier identification result of KNN method\nIn this article, we will focus on utilizing various machine learning methods to perform outlier detection in multivariate data. PyOD is the main library used in this article because of its ease in applying various methods according to their respective characteristics.\nThis article will also introduce Semi Supervised method for anomaly detection, including its application on porosity, permeability and density data. read more…", "label": "Yes"} {"text": "DS Smith is a leading provider of sustainable fibre-based packaging worldwide, supported by recycling and papermaking operations.\nThe company has invested in new camera technology that uses AI modelling capabilities on IBM Cloud, to assess the grade, quality and origin of the material arriving at the depot.\nStephanie Dalton, Innovation Manager, Recycling Division at DS Smith said: “Innovating to make sure we can improve the quality of material is key for driving up recycling rates. Exploring the latest technologies and digitalising our operations enables us to operate more efficiently and sustainably while simultaneously improving the quality of paper for recycling.”\n“This collaboration with IBM is good news for our suppliers of recovered paper as it allows us to work even more closely to make sure they are optimising their recycling processes – ultimately improving recycling through reducing contamination,” she continued.\nIBM and DS Smith: transforming recycling solutions with AI\nPositioned in the ceiling of the depot, the cameras can identify whether the composition of the loose paper and cardboard meets strict quality guidelines before being sent for baling and recycling.\nAchieved by teams from DS Smith and IBM Expert Labs, the state-of-the-art innovation improves the efficiency and accuracy of the process, which has traditionally been done using the human eye.\nJanet White, Industrial Products Leader, IBM Consulting UK & Ireland, commented: “IBM’s collaboration with DS Smith represents the best of IBM’s capabilities to help organisations pursue their sustainability goals through digital modernisation. Using the power of hybrid cloud and Artificial Intelligence technologies to transform DS Smith’s recycling operation, this solution will significantly improve the quality of recycling output while reducing waste.”\nThe two companies worked together to develop an AI model that can compare data from images of the materials with a specific set of criteria.\nDS Smith plans to continue to collaborate with IBM Expert Labs and IBM Consulting on the deployment of the technology across more of its recycling depots throughout Europe.\nJoin global business leaders and sustainability experts taking meaningful action at Sustainability LIVE, held at Tobacco Dock, London, 23-24 February 2022. Register to attend today! Click here to learn more.", "label": "Yes"} {"text": "A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.\nThe file type is\nWe propose a low-complexity algorithm for stereoscopic video applications that generates a high-quality 3D image depth map from a single 2D image. Based on their characteristics, 2D images are classified into one of three categories before being processed by the proposed lowcomplexity algorithm to generate corresponding depth maps. We also extend the 3D depth algorithm to construct a parallel 3D video system. A thread-level superscalarpipelining approach is developed to parallelize the 3D videodoi:10.1007/s11265-012-0691-5 fatcat:4p2a6fcbznavvilx5mbitu6dgq", "label": "Yes"} {"text": "As it is well known both atmospheric and mantle convection are very complex phenomena. The dynamical description of these processes is a very difficult task involving complicated 2-D or 3-D mathematical models. However, a first approximation to these phenomena can be by means of simplified thermodynamic models where the restriction imposed by the laws of thermodynamics play an important role. An example of this approach is the model proposed by Gordon and Zarmi in 1989 to emulate the convective cells of the atmospheric air by using finite-time thermodynamics (FTT). In the present article we use the FTT Gordon-Zarmi model to coarsely describe the convection in the Earth's mantle. Our results permit the existence of two layers of convective cells along the mantle. Besides the model reasonably reproduce the temperatures of the main discontinuities in the mantle, such as the 410 km-discontinuity, the Repetti transition zone and the so-called D-Layer.\nKeywords: convective zone; earth’s mantle; finite time thermodynamics.", "label": "Yes"} {"text": "Grow 1 Wireless weather station w/sensor\n$ 32.95 Excl. tax 1 In stock Available in store: Check availability\nAvailable in storeClose\nThe Grow1 Wireless Weather Station + Sensor is the perfect system to help keep track of the temperature and humidity in multiple grow rooms or greenhouses. The station comes with 1 sensor, but can pair with up to 3, each with a wireless range of up to 165...\n- Free Shipping with $75 purchase", "label": "Yes"} {"text": "I change from DHCP to RESERVED IP on a specific device. I then change the default IP from 192.168.68.123 to 192.168.68.100 and hit save. Get the \"saved message\" but go back to check and it does show RESERVED IP but it still shows the original IP not the one I changed it to. I rebooted the computer but it made no difference. This is a Xfinity XB6-T Gateway. What am I missing?\nYou might want to reset the network settings of the computer in question (it's probably latched onto the old IP at this point).", "label": "Yes"} {"text": "After fully charged, will switch to trickle protection mode to protect mobile phone battery. Combined independent large coil is used for high conversion and larger induction area.\nFor mobile phone (with Wireless charging function or build-in wireless charging ring).\n– Colgate and electric current are displayed\nReal-time display of voltage and electric current while charging, know the charging status of your phone all the time.\n– 7.5 W Quick charge for IP devices\nCharging conversion rate is about 80%, IP mobile phones receiving power can be stabilised at 7.5 W or more, so you can charge efficiently and steadily.\n– Smart Charging protection\nOver-temperature / over-current / short circuit protection, it’s low temperature during charging, you don’t need to worry about damaging to the phone.\n– Support charging with case (<6mm)\nBecause charge sensing distance is <6mm, which support charging with case < 6mm.", "label": "Yes"} {"text": "Advancing Ion Channels for Broad Discoveries\nAs a leader in ion channel drug discovery, Icagen has deep experience in advancing ion channel drug discovery programs alone and in collaboration with pharmaceutical and biotech partners. Icagen’s Ion Channel Technology platform allows progression of challenging ion channel targets by combining novel reagent generation, advanced biophysical analysis and cutting-edge applications of in silico drug discovery tools. The company also has similar depth for certain classes of transporter targets.\nThrough the acquisition of Icagen core assets, Ligand Pharmaceuticals Incorporated now benefits from the synergy that exists between Icagen’s Ion Channel Technology and other Ligand-owned technology platforms including the OmniAb® antibody discovery platform. Additionally, Icagen’s unique XRpro® technology, developed through refinements of X-ray fluorescence, advances ion channel and transporter drug discovery and development.", "label": "Yes"} {"text": "High Definition Encoders\nSeries 8100 H.264/AVC or AVS HD Encoders\nImplemented with 8 Telairity video processors/channel to provide high-quality HD video at 2- 15Mbps, with adjustable sub-second encode latency and a robust “sliced” transmission stream.\nBE8110: 1U, single-channel model for broadcast/broadband applications; also ideal for ENG vehicles\nBE8110-T: 1U single-channel model for broadcast/broadband applications; adapted for harsh ENG vehicle use\nBC8110: 1U, single-channel \"Copter\" encoder model for aircraft ENG; tethered remote front panel for cockpit control\nBE8200: 1U, dual-channel for broadcast/broadband applications; lowest per-channel price for multi-channel installations\nBE and BC models built for field use in ENG vehicles offer wide temperature tolerance, vibration-proof construction, and external audio inputs. BE models include dual-redundant power supplies. BC models fit in a half-rack, have a 28V power supply and feature a ruggedized chassis", "label": "Yes"} {"text": "TimeCore from VISUAL PRODUCTIONS is a compact multitool that supports the topic of timecode with up-to-date hardware in a meaningful way. The TimeCore from VISUAL PRODUCTIONS is able to generate, convert and analyze time code signals and to react to time triggers. Furthermore, the TimeCore processes various non-timecode protocols.\nGenerating and following time code signals\nThe TimeCore can be configured as a time code master and in this case generates a stable time code signal. Alternatively, it can also be used as a time code slave. A large LCD display shows the currently running timecode in real time.\nConvert time code\nThe TimeCore supports the transmission and reception of SMPTE- (LTC-), MTC- and Ethernet-based time codes. It is able to convert any of these time code signals. Even between different frame rates (24, 25, 29.99, 30 frames).\nThe TimeCore has an Ethernet port that can be used to access the internal web server. This web server allows the complete configuration of the device.\nShow control protocols\nVarious show protocols are supported. For example UDP, TCP, OSC or MIDI. All these protocols can be used to start, stop or otherwise manipulate the timecode. Furthermore, sending these protocols can be assigned to a timeline.\nThe TimeCore understands the Art-Net and sACN protocols from the lighting domain and can therefore interact directly with the lighting console.\nCross-functional product family\nThe functionality of the TimeCore can be extended by combining it with other members of the Core family. The IoCore extends the TimeCore with additional GPI, 0-10V, GPO and RS-232 inputs and outputs. The CueCore extends the system with additional DMX-512 inputs and outputs and is able to record and playback a light show. The B-Station can act as a remote control.\n- Solid State Time Code Generator\n- Time Code Master, Slave & Converter\n- Time Code Display\n- Protocol Converter\n- Color: Black\n- Housing material: Plastic (fiberglass)\n- Housing protection class IP 20\n- Protocol: ArtNet, sACN, HTTP, TCP, UDP, OSC, MSC, MMC, SMPTE LTC, MTC, ATC\n- Menu display: Real-time time code display (configuration via web browser interface)\n- Ethernet connection: RJ 45 female\n- SMPTE timecode connector: 1 x XLR 3 pin female & 1 x XLR 3 pin male\n- MIDI connector: 2 x DIN 5 pin female\n- External power supply\n- Power supply: 9-12 VDC; PoE (Power over EtherNet)\n- Power consumption: 0.5 A at 9 V\n- Integrated web server\n- Programming via web browser (LAN/W-LAN)\n- Solid-state technology - no moving parts, no wear and tear\n- Real time clock\n- Management of position coordinates\n- 2 freely configurable buttons\n- Compatible with IoCore & B-Station\n- Time code conversion with various frame rates\n- Command line input\n- Variable linking of all trigger functions with various events\n- MIDI In, Out (with MTC, MSC, MMC support)\n- SMPTE time code In, Out\n- Optional extension of potential free contacts by IoCore\n- Optional extension of relay contacts by IoCore\n- Protocol converter (ArtNet, sACN, HTTP, TCP, UDP, OSC, MSC, MMC, MTC, SMPTE LTC, ATC)\n- Monitoring of various protocols\n- Optically separated LTC inputs & outputs\n- incl. plug-in power supply\nScope of Delivery", "label": "Yes"} {"text": "Chennai: With the surge in demand for oximeters due to the COVID pandemic, the Tamil Nadu police warned people against downloading fake oximeter apps on their mobile phones, and said such applications may steal personal or biometric data from the phones.\nPeople's apprehension during the pandemic is being exploited by the cybercriminals who are targeting the users with malicious links and applications that could steal personal information or biometric data like fingerprints.\n\"One such scam used by the cybercriminals is the fake oximeter app that claims to detect blood oxygen levels,\" the police said in an advisory.\nOnce the user downloads the fake app, which claims to test blood oxygen levels using fingerprint sensors, through a SMS, it asks permission to access various features in the mobile.\nIf permission is granted, then the cybercriminals could steal the sensitive data such as OTP, saved passwords, card details, photos, contacts and even the biometric information that could be used to access banking and other sensitive applications on the phone.\n\"These apps claim to measure blood oxygen level by placing the finger on the camera and illuminating the finger using torch light. During this process, the malicious apps could capture your fingerprint,\" the police said and warned that the fraudsters could also use the fingerprint data to replicate the thumb impression and authenticate Aadhaar Enabled Payment System (AEPS) transactions from the app users account.\nSeveral states including Maharashtra and Gujarat have in the past warned people about such fraud apps. The police advisory claimed that SpO2 blood oxygen sensor is required to measure the blood oxygen levels accurately.\n\"This is not present in smart phones. Hence, users should be cautious of apps promising to measure blood oxygen levels using fingerprint sensors,\" the warning posted on the Tamil Nadu police facebook page said and appealed to the citizens to install applications from trusted sources.\nHowever, if the biometric information is compromised, one should disable biometric authentication for AEPS transaction by visiting www.uidai.gov.in. The victims could file a complaint on www.cybercrime.gov.in....", "label": "Yes"} {"text": "We report on the feasibility study of a mid-infrared (8-18 µm) spectro-imager called THERMAP, based on an uncooled\nmicro-bolometer detector array. Due to the recent technological development of these detectors, which have undergone\nsignificant improvements in the last decade, we wanted to test their performances for the Marco Polo R ESA Cosmic\nVision mission. In this study, we demonstrate that the new generation of uncooled micro-bolometer detectors has all the\nimaging and spectroscopic capabilities to fulfill the scientific objectives of this mission.\nIn order to test the imaging capabilities of the detector, we set up an experiment based on a 640x480 ULIS micro-bolometer\narray, a germanium objective and a black body. Using the results of this experiment, we show that calibrated\nradiometric images can be obtained down to at least 255 K (lower limit of our experiment), and that two calibration\npoints are sufficient to determine the absolute scene temperature with an accuracy better than 1.5 K. Adding flux\nattenuating neutral density mid-infrared filters (transmittance: 50%, 10%, 1%) to our experiment, we were able to\nevaluate the spectroscopic performances of the detector. Our results show that we can perform spectroscopic\nmeasurements in the wavelength range 8-16 µm with a spectral resolution of R~40-80 for a scene temperature <300 K,\nthe typical surface temperature of a Near Earth Asteroid at 1 AU from the Sun.\nThe mid-infrared spectro-imager THERMAP, based on the above detector, is therefore well suited for the Marco Polo R", "label": "Yes"} {"text": "NeuTab NEW K1 2017 Edition\nNeuTab K1 Tablet equips with a stable quad-core CPU at up to 1.5 GHz, plus the newest Google Android 6.0 Marshmallow system ensures smoothly running.\nIntegrated GPS sensor make navigation possible after downloading the offline maps.\nFast and Responsive\nBuilt-in stable quad core processor at 1.2 GHz frequency, combined with 1GB DDR3 RAM, enables faster app launching times, quicker website loading times, and smoother multi-tasking.\nGoogle play store is the magic box to get everything you need, enjoy over millions of movies, TV shows, songs, books, Android apps and games in the Google Play Store.\nUS based customer service, technical support and 1 year limited manufacturer defect warranty guarantee. 100% satisfaction. Long-term commitment from NeuTab!\nWhat's in the Box:", "label": "Yes"} {"text": "23 Top Mx5 Headlight Wiring Diagram Illustrations – mazda mx 5 headlight wiring diagram, miata headlight wiring diagram, mx 5 headlight motor wiring diagram, mx5 headlight wiring diagram, .. Hello dear visitor. In the current modern era, information about the development of technologies is very easy to get. You could find a range of reports, tips, articles, anywhere in the world in only seconds. Along with information about mx5 headlight wiring diagram could be accessed from numerous free sources online.\n474 X 613 px image size for Mx5 Headlight Wiring Diagram with regard to Astonishing Mazda 3 Headlight Wiring Schematic Gallery Best Image on Thermomax.Org Photos, image source : www.dcwestyouth.com, and to view image details please click the image.\nThis image has been published by Thermomax Team tagged in category field. And we also trust it can be the most well liked vote in google vote or event in facebook share. Hopefully you like it as we do. Please share this mx5 headlight wiring diagram graphic to your buddies, family through google plus, facebook, twitter, instagram or any other social bookmarking site.\nNOTE about Mx5 Headlight Wiring Diagram\nWhat’s Wiring Diagram\nA wiring diagram is a design that uses abstract reflective symbols to display each of the interconnections of components at an exceedingly system. Wiring diagrams are made up of a few items: symbols which represent the ingredients within circuitlines and lines which represent the relations between them. Accordingly, from wiring diagrams, you understand the relative place of the ingredients and the way they may be linked. It’s a language engineers will need to learn any time they work on electronics projects.\nWiring Diagram VS. Schematics\nIt’s simple to receive confused by wiring diagrams and schematics. Wiring diagrams mostly reveals the physical location of connections and components inside built circuit, rather than always in logic order. It highlights around the layout from the cables. Schematics highlight on how circuits work logically. It reduces integrated circuits to sub-components to produce the system’s functional logics easier to understand. It is most successful for studying the general operation of a program.\nHow to Read Wiring Diagram\nTo see a wiring diagram, is truly a program have to understand exactly what basic components are included in a very wiring diagram, and which pictorial symbols are utilized to represent them. The typical components in a wiring diagram include ground, energy, wire and connection, output devices, switches, resistorsand logic gate, lighting, etc.. A list of electrical symbols and descriptions is available about the”electrical symbol” page.\nA line signifies a wire. Wires are utilized to connect the components together. All points throughout the wire are connected and identical. Wires on several areas must cross each other, but that won’t indicate they can connect. A black dot is used to tip that the injunction of two lines. Usually different colours are utilized to differentiate the wires. There should be a legend concerning the wiring diagram to notify you what each colour means.\nTypes of Connection\nNormally circuits exceeding two components have two basic kinds of connections: series and parallel. A series circuit is often a circuit where components are attached along only one route, so the current flows through a single component to reach the next one. In a series circuit, voltages add around to all those elements attached within the circuit, and currents are the same through all components. In a parallel circuit, every unit is directly connected to the power source, so every system receives the same voltage. The present in a very parallel circuit flows across each parallel branch also re-combines once the branches meet again.\nTips to Draw Good-looking Wiring Diagrams\nA fantastic wiring diagram must be technically correct and clear to see. Be careful of all of the info. For instance, the diagram must demonstrate the very best direction from the positive and negative terminals of every component. Use the appropriate symbols. Learn the meanings in the basic circuit symbols and judge the best ones to work with. Some of the symbols have close look. You must find a way to inform the differences before applying them. Draw connecting wires as straight lines. Use a dot to point line junction, or use line jumps to signify cross lines which aren’t linked. Label components including resistors and capacitors making use of the values. Be certain that the text positioning appears clean. In general it’s great to place the positive (+) supply to the top, and also the negative (-) source in the base, in addition to the logical stream from left to right. Try to clean up the positioning reducing wire crossings.\nGallery Images about Mx5 Headlight Wiring Diagram\n979 X 565 px image size for Mx5 Headlight Wiring Diagram with My 1994 Pop-Up Headlights Controlled By Clutch Switch. Why? – Mx-5 on Thermomax.Org Pictures, image source : i.imgur.com, and to view image details please click the image.\nThis picture has been submitted by our team. You could browse additional useful articles in Wiring Diagram category. We thank you for your visit to our website. Make sure you get the information you are looking for. Do not forget to share and love our reference to help further develop our website. We expect this mx5 headlight wiring diagram photo will provide you with certain extra point for your need and that we hope you like it. We understand, we may have diverse view about this but at least weve tried our best.", "label": "Yes"} {"text": "photocell outlet wiring diagram 208v photocell sensor wiring diagram photocell panel wiring diagram tower lighting photocell controller wiring diagram photocell and relay wiring diagram photocell light switch wiring diagram 3 phase wiring diagram photocell photocell socket wiring diagram\nPhotocell Switch Wiring Diagram Photocell Panel Wiring Diagram Photocell Control Wiring Diagram Photocell Sensor Photocell Wiring Diagram PDF Dusk to Dawn Photocell Wiring 3 Phase Wiring Diagram Photocell Photocell Controlled Lighting Wiring Diagram Tower Lighting Photocell Controller Wiring Diagram Simple Photocell Diagram Lighting Photocell Wiring-Diagram Diagram to Wire Photocell Light Photocell Wiring Schematic 3 Wire Photocell Wiring-Diagram Wiring diagram is a technique of describing the configuration of electrical equipment installation, eg electrical installation equipment in the substation on CB, from panel to box CB that covers telecontrol & telesignaling aspect, telemetering, all aspects that require wiring diagram, used to locate interference, New auxillary, etc.Nema Socket Photocell Kit Wiring Diagram\nThis schematic diagram serves to provide an understanding of the functions and workings of an installation in detail, describing the equipment / installation parts (in symbol form) and the connections.Nema Socket Photocell Kit Wiring Diagram\nThis circuit diagram shows the overall functioning of a circuit. All of its essential components and connections are illustrated by graphic symbols arranged to describe operations as clearly as possible but without regard to the physical form of the various items, components or connections.", "label": "Yes"} {"text": "Latest Videotelephony Stories\nLAS VEGAS, April 9, 2015 /PRNewswire/ -- NAB Show - NGCodec(TM) announces that it will be demonstrating a real time Intra H.265/HEVC video encoder running on a low cost Xilinx® Kintex®-7\nLONDON, April 9, 2015 /PRNewswire/ -- The enterprise media gateway market has gained significant momentum in recent years due to the features and services offered by media gateways.\nAmidst recent corporate consolidations in the audio conferencing business, Civicom is being noticed for an established reputation as a reliable and trusted partner.\nCameo Global continues to position itself as a market leader in collaboration and contact center solutions with the addition of Tim Fitzgerald to their global sales leadership team.\nLAS VEGAS, April 8, 2015 /PRNewswire/ - eBrisk Video Inc., the leading provider of high-quality and high-density real-time H.265/HEVC video encoding solutions, will be demonstrating the eBLive\nInterra Systems is one of Dolby Laboratories first partners to support AC-4, the company's newest digital audio technology. Cupertino, CA (PRWEB) April 07,\nOneNeck® IT Solutions has signed a new three-year contract with Wyandot, Inc. KANSAS CITY, Kansas (PRWEB) April 07, 2015 OneNeck® IT Solutions\nPointNurse building first Global Telemedicine and Telehealth Digital Collaborative Software Platform Owned by its Members NASHVILLE, Tenn., April 7, 2015 /PRNewswire/ --\nSAN FRANCISCO, April 7, 2015 /PRNewswire/-- NetFortris, Inc., the emerging leader in cloud-based voice and\nSmartphones and feature phones are as common now as traditional landline phones were for decades. These handheld devices are so popular that many homes now only use mobile phones, increasingly pushing landline devices into the obsolete category. But while the popularity of mobile connectivity is vast today, it is still a very young technology when compared to its landline counterparts, which have been in existence since the mid-1800s. To be clear, the history of the mobile phone focuses on...\nImage Credit: Photos.com Instant messaging (IM) is communicating over the Internet through the typing of text from one person to another. This is done on a computer or other device connected to the Internet by a cable or wireless connection and done in real time. It is text communication done specifically between users by a contact list, buddy list, or a friend list, whereas online chat is usually done by users in a multi-user environment. Some IM programs allow for video messaging by a...\n- A hairdresser.", "label": "Yes"} {"text": "Search results for: 'mx fr17'\n17x17 Digital Crosspoint router frame with built-in control panel and CPU2\nThe MX series matrix routers are the highest performance, modular expandable DVI and HDMI compliant switchers, available in five different frame sizes. The built‑in sophisticated software and hardware features make these routers the most flexible integrated solution for AV professionals and high‑end home theatre applications\nDouble slot Twisted Pair HDMI Output board with control and audio\nXD-HDMI-TP-OB has, in addition to 8 channel HDMI to CATx conversion this Output board offers S/PDIF audio de-embedding from the outgoing HDMI video stream and a bi-directional RS-232 link to each remote display device when using compatible Twisted Pair receiver.", "label": "Yes"} {"text": "Built-in co-axial illumination\nSuitable for various applications, inspection of wafer, IC chip, etc...\n|Model||Magnification||WD||Resolution||Object side NA||Depth of field||TV distortion||Maximum\n○Indicated specifications are design values. ○Resolution indicates a theoretical resolution at a wavelength of 550nm. ○Depth of field is calculated assuming permissible circle of confusion is 40μm.", "label": "Yes"} {"text": "compact and transparant USB 5.1 3D Sound Audio Adapter for a superb surround sound for a notebook or desktop. Now DVDs and music can be enjoyed even more!\nConnect the USB stick to the USB port and it`s ready for use due to the Plug & Play feature. A sound card is no longer necessary. With useful 3.5 mm connection for a microphone or headphones.\n• USB 2.0/1.1/1.0 compliant\n• Auto driver installation, Plug & Play USB device\n• Drive two channels speakers directly\n• Support 3D positional sound and virtual 5.1 channel soundtrack\n• Digital class B power amplifier inside\n• LED status indicator\n• Works with all Windows systems\n• Size: 51.5 x 23.0 x 12.6 mm\n• Weight: 8 g\n• 3.5 mm connection", "label": "Yes"} {"text": "Information on global land use and land cover is crucial when studying changes in biodiversity, food security, climate, and many other contemporary issues, but suffers from widespread uncertainties. We - quantify and address these issues.\nTo achieve this, we are mobilizing ground-truth information from hundreds of sources worldwide, generated through field and crowdsourcing campaigns. To close gaps in data-scarce regions, we collaborate with hundreds of regional data-holding scientists on developing a FAIR and Open-Access database. On the top image to the right, we see the latest status of this effort. The map shows the global distribution of samples collected by the Macroecology & Society lab, composed millions of land cover and land use observations.\nUsing these integrated data, we detect, quantify, map, and ultimately aim to reduce uncertainties in land-cover land land-use, as well as in various derived environmental data. For example, we are developing a framework for uncertainty quantification of remotely sensed environmental data that accounts for scale mismatches between samples and pixels, such as seen on bottom image to the right. The image shows the spatial mismatch between the pixels of multiple, gridded land cover datasets, which create thematic uncertainties.", "label": "Yes"} {"text": "The Sticky Pipeline Advance bit in the DBGDSCR register enables the debugger to detect whether the processor is idle. The CPU does not implement accesses to DBGDRCR via the debug APB interface, so the debugger is unable to clear the Sticky Pipeline Advance bit.\nMinor. The Sticky Pipeline Advance bit concept is unusable.\nSystems that use one or both ARM processors.\nDevice Revision(s) Affected:\n|All. No plan to fix. Refer to (Xilinx Answer 47916) - Zynq-7000 SoC Silicon Revision Differences.|\nThe Sticky Pipeline Advance register (bit 25 of the DBGDSCR register) enables the debugger to detect whether the processor is idle. This bit is set to 1 every time the processor pipeline retires one instruction. A write to DBGDRCR clears this bit. The issue is that the Cortex-A9 does not implement any debug APB access to DBGDRCR to clear the bit.\nMinor. Due to the issue, the Sticky Pipeline Advance bit in the DBGDSCR cannot be cleared by the external debugger.", "label": "Yes"} {"text": "Robust thin film solid oxide fuel cell\nAmong the major fuel cell chemistries, Solid Oxide Fuel Cells (SOFCs) are considered most desirable due to their high energy conversion efficiency, fuel flexibility, and contaminant tolerance. Conventional solid oxide fuel cells operate at 800°C - 1000°C, requiring expensive non-corrosive materials. The technology developed in the Ramanathan Lab allow SOFCs to operate at low temperatures of 450°C - 550°C (and potentially lower), providing efficiency gains while allowing use of lower cost materials and simpler packaging. The technology captured here allows for easy fabrication of electrodes using industry standard silicon wafers and commonplace micro-fabrication techniques. The thin nature of the electrodes also allows for potential gains in volumetric power density at both small and large scale.\n• Demonstrated highest power density to date among thin film micro solid oxide fuel cells with oxide cathodes (in the 150mW/cm2 range), targeting 300-500 mW/cm2 at 400-500°C range and below\n• Demonstrated largest mechanically stable fuel cell area among thin film micro-SOFCs\n• Demonstrated highest total power output from single thin film fuel cell area\n• Demonstrated robust fabrication process (>90% yield)\nIntellectual Property Status: Patent(s) Pending\nA surge in energy consumption of portable electronic devices has increased interest in fuel cells as alternitave mobile power sources. Fuel cells provide higher total energy for a given size or weight than batteries and unlike batteries can be replenished instantaneously. This portable fuel cell market is estimated to hit $1 billion dollars globally in the next 5-7 years.", "label": "Yes"} {"text": "LiDAR odometry and localization has attracted increasing research interest in recent years. In the existing works, iterative closest point (ICP) is widely used since it is precise and efficient. Due to its non-convexity and its local iterative strategy, however, ICP-based method easily falls into local optima, which in turn calls for a precise initialization. In this paper, we propose CoFi, a Coarse-to-Fine ICP algorithm for LiDAR localization. Specifically, the proposed algorithm down-samples the input point sets under multiple voxel resolution, and gradually refines the transformation from the coarse point sets to the fine-grained point sets. In addition, we propose a map based LiDAR localization algorithm that extracts semantic feature points from the LiDAR frames and apply CoFi to estimate the pose on an efficient point cloud map. With the help of the Cylinder3D algorithm for LiDAR scan semantic segmentation, the proposed CoFi localization algorithm demonstrates the state-of-the-art performance on the KITTI odometry benchmark, with significant improvement over the literature.\nupdated: Tue Oct 19 2021 18:23:08 GMT+0000 (UTC)\npublished: Tue Oct 19 2021 18:23:08 GMT+0000 (UTC)", "label": "Yes"} {"text": "The plasma around comet 67P/Churyumov–Gerasimenko showed remarkable variability throughout the entire Rosetta mission. Plasma boundaries such as the diamagnetic cavity, solar wind ion cavity and infant bow shock separate regions with distinct plasma parameters from each other. Here, we focus on a particular feature in the plasma: warm, slow solar wind protons. We investigate this particular proton population further by focusing on the proton behaviour and surveying all of the Rosetta comet phase data. We find over 300 events where Rosetta transited from a region with fast, cold protons into a region with warm, slow protons. We investigate the properties of the plasma and magnetic field at this boundary and the location where it can be found. We find that the protons are preferentially detected at intermediate gas production rates with a slight trend towards larger cometocentric distances for higher gas production rates. The events can mostly be found in the positive convective electric field hemisphere. These results agree well with simulations of the infant bow shock (IBS), an asymmetric structure in the plasma environment previously detected on only 2 d during the comet phase. The properties of the plasma on both sides of this structure are harder to constrain, but there is a trend towards higher electron flux, lower magnetic field, higher magnetic field power spectral density and higher density in the region that contains the warm protons. This is in partial agreement with the previous IBS definitions; however, it also indicates that the plasma and this structure are highly non-stationary. For future research, Comet Interceptor, with its multi-point measurements, can help to disentangle the spatial and temporal effects and give more clarity on the influence of changing upstream conditions on the movement of boundaries in this unusual environment.", "label": "Yes"} {"text": "It’s All in the eyes!\nPredictive & Analytic AI for Visual Data\nLow-cost gaze-point tracking is our key value-point, and is being used in multiple in-progress trials.\nAlso used in our predictive health solution, we specifically focus on the precise tracking and movement of the eyes. Our specific technology is able to use comparatively low resolution video while still retaining very high accuracy. This allows us to apply precise eye tracking to general devices such as smart phones and web cameras.\nThrough the introduction of our 2D \"WeKare\" product, we are able to process the precise location and gaze point of a user's eyes, head and body using relatively low resolution video. This data is then used to predict and estimate the risk factor of a large battery of chronic illnesses and ailments, primarily related to the neurological system.\nThrough the introduction of our 3D \"WeKare\" product, we utilize eye movement data to detect warning signs of Alzheimer’s while users interact with our Mixed Reality Content.\nHave a question?\nSTAY IN TOUCH\n(HQ) 5F, Startup Campus, 289gil 20, Pangyo-ro, Seongnam City,\nGyeonggi-do, Republic of Korea\n(BC) 4F BT-IT Fusion Center, 12, Opaesan-ro 3-gil, Seongbuk-gu,\nSeoul, Republic of Korea", "label": "Yes"} {"text": "|Sun Sounds listener Bob Burrows |\nand wife Carol\nThis month, with a grant from Virginia G. Piper Charitable Trust, Sun Sounds upgraded Bob’s analog radio to The Narrator, a new, accessible AM/FM/HD radio created by Insignia, Best Buy’s private label brand. The Narrator’s voice prompts help people with visual impairments tune the radio, set the clock, and set the alarm. “I love it,” said Bob, “It tells me exactly what button I’ve touched. And the digital signal from Sun Sounds has no interference. It sounds great. Now my wife Carol doesn’t have to find radio stations for me!”\nSun Sounds of Arizona first brought the idea of a digital talking radio to Best Buy’s development team five years ago, citing the number of American consumers with vision loss (an estimated 25 million) and the aging baby-boomer population. Since then, Best Buy has worked closely with David Noble, Development Director at Sun Sounds of Arizona, to bring a universally-designed, digital radio to the market. “Because this radio talks, anyone with low vision can use it right out of the box. But it is also feature-rich for the sighted consumer, at a price point that’s affordable.” says Noble.\nWhen the Narrator came to market, Virginia G. Piper Charitable Trust seized the opportunity to help older Valley residents with vision loss access the newest digital radio technology. “Providing access to a reading service via the latest technology aligns with Piper Trust’s mission of making our communities more livable and increasing independence for older adults,” said Carol Kratz, Program Director with Virginia G. Piper Charitable Trust. With grant funding from Virginia G. Piper Charitable Trust, 200 Sun Sounds listeners will receive a free upgrade to the Narrator this summer. Other listeners can purchase the Narrator talking radio on Best Buy’s website.\nSun Sounds of Arizona broadcasts on KBAQ 89.5-HD 3, and is a service of Rio Salado College.\nArticle published in the Tempe Republic July 28", "label": "Yes"} {"text": "\"Nick Barendt, executive director of the Institute for Smart, Secure and Connected Systems (ISSACS) at Case Western Reserve University, illustrates the challenge of protecting Internet of Things devices by comparing them to more traditional IT assets.\"—Source: EdTech Magazine\nWHY THIS MATTERS:\nAs the use of internet of things devices continues to climb on campuses, institutions are examining the cyberthreats connected tech can pose if left unchecked on campus network. Case Western Reserve University's Nick Barendt notes that the IoT \"spreads your surface area of attack infinitely,\" adding, \"Anyone can walk up to a device, if they can access it, and either brute-force attack the device or use the compromised device to launch other types of attacks.\"", "label": "Yes"} {"text": "GPS needs to be more accurate and current.\nGPS should update every 10 minutes and needs to be more accurate with current position.\nThanks for the continued feedback on this issue. Like Cliff said before, a lot of this is reliant on the device of the user itself for the accuracy of the GPS.\nFor anyone with any questions or issues about that aspect I do recommend reaching out to our support team via chat on the website, email (email@example.com), or phone (800-828-0689).\nGPS updating on a more frequent basis is something that could be done in the future. Right now we feel like the 15 minutes is a good balance of information provided while keeping the battery usage low as well. But keep voting and this will be something we look at!\nKaren Wagner commented\nI am using the app for my self (as an HR person) and the accuracy is horrible!! I don't leave the office except to go home and it has my GPS location all over. Now I'm not sure what to believe on the other employees tracking!! I don't want to mess with other's pay.\nBeing a stand alone non corrected GPS signal..... the accuracy of position will not improve. Consistent pinging of a users phone will", "label": "Yes"} {"text": "What Is An Audio Oscillator?An audio oscillator is an electronic instrument used to test sound equipment. The HP model 200A was a resistance-capacitance audio oscillator that represented a significant advancement in oscillator technology at the time. The Hewlett-Packard oscillator used an incandescent bulb as part of the wiring scheme to provide variable resistance.\nWho Were William Hewlett and David Packard?William Hewlett and David Packard were undergraduate engineering students at Stanford University when they first met. They formed the Hewlett-Packard Company in 1939 and their first product was the audio oscillator invented by William Hewlett in 1938.\nDavid Packard thought up the name \"HP Model 200A\" to make the company appear more established. Hewlett-Packard, now famous world-wide, started out of William Hewlett's garage in Palo Alto with a capital investment of $538 and a Sears-Roebuck drill press.\nHewlett-Packard's First Famous CustomerIn 1940, the Walt Disney Company ordered eight Model 200B oscillators and used the equipment to test the various channels, recording equipment and speaker systems in the twelve specially-equipped theaters that showed the Disney film Fantasia.\nWilliam Hewlett was granted United States patent 2,268,872 for his oscillator on January 6, 1942.", "label": "Yes"} {"text": "Skip to Main Content\nAn analytical optimization is proposed for the sensitivity threshold of low-frequency search coil magnetometers employing disk-shape flux concentrators. The optimal diameters of the core and the wire are found for a given set of the optimization parameters: frequency, search coil volume and aspect ratio, relative permeability of the core and the flux concentrators, and the noise of the preamplifier. The proposed analytical optimization allows an immediate analysis of the theoretical limits of the magnetometer sensitivity threshold. An approximation is obtained to simplify and clarify the relationship between the minimum possible sensitivity threshold and the optimization parameters. Measurements performed with an experimental magnetometer model confirm the optimization.\nDate of Publication: Aug. 2012", "label": "Yes"} {"text": "A decentralised, distributed approach to performing authorisation involves receiving an authorisation request at a service providing device, for example 'Carol', and then retrieving trust information from other peer devices in the network. The gathered information is used by the device 'Carol' to make a well-informed authorisation decision.\n|Publication status||Published - 9 Apr 2009|\n- distributed protocol\n- peer devices\n- authorisation decision", "label": "Yes"} {"text": "Below are some recommended software packages.\nLet's stay in touch; please sign up for email notifications and updates!\nSolidWorks is one of the most advanced computer aided drawing (CAD) programs, tailored to engineers that want to create flexible, high-precision designs that are suited for machining, 3D-printing, simulation and a plethora of analyses.\nLabView is the most generally supported platform for the development of custom measurement software that must combine devices from different vendors. The intuitive feel of this visual programming language and the ease with which user interfaces are constructed make LabView highly suited for the development of single-purpose lab software.\nZemax OpticStudio is one of the most powerful simulation tools to test and optimize optical system designs. The software supports simple as well as complicated lenses, passive and active elements and optimization for multiple configurations.\nOrigin is one of the most popular software products for data analysis and generating highly-customizable, quality graphs, plots and figures.", "label": "Yes"} {"text": "The system of one master-radar sensor and several slave-radar sensors is a solution for measuring discharge in wide rivers with inhomogeneous distribution of flow velocity. This system measures velocity at several spots throughout the whole water cross-section, ensuring a high accuracy of discharge measurement even in wide water bodies.\nOne advantage of this system is its high accuracy, which makes it ideal for use in rivers with inhomogeneous velocity distribution. Additionally, the system requires only one water level measurement and multiple individual velocity measurements, making it a cost-effective solution.\nThe system utilizes the well-proven RQ-radar technique for non-contact measurement, ensuring a maintenance-free system that is flood-proof. No structural work is necessary in the water, making installation simple and easy. The system also recognizes flow direction and hysteresis effects and can measure in tidal waters and backwater situations.\nAnother advantage of the system is its ability to measure even where weed growth prevails, and the sensor is not affected by turbidity. The measuring range is 0.08 to 16 m/s, depending on the flow conditions, and the system can provide analog outputs from 4 to 20 mA.\nOverall, the system of one master-radar sensor and several slave-radar sensors is a reliable and accurate solution for measuring discharge in wide rivers with inhomogeneous distribution of flow velocity. Its non-contact measurement technique, low maintenance requirements, and simple installation make it a valuable tool for river management and monitoring.", "label": "Yes"} {"text": "HOWTO - Update or Flash firmware on ACR-PV76120\nTwo methods to flash the firmware to your Playon!DVRHD [ACR-PV76120] Safe-mode flashing procedure (Recommended)\n**Do not power off the unit during the flashing process!** Normal flashing procedure\n1. Copy install.img to the root directory of a USB flash drive and connect it to any USB host port of the unit.\n2. Switch off the main power to the unit.\n3. Press and hold on to the power button on the front panel of the unit.\n4. Switch on the main power.\n5. Release the power button when the firmware update starts flashing on your display in a moment and will automatically reboot when update is completed.\n1. Copy install.img to the root directory of a USB flash drive and connect it to any USB host port of the unit.**Do not power off the unit during the flashing process!**\n2. Enter the Setup menu, System, System Update, System Upgrade and Enter to confirm.\n3. The firmware update will start flashing on your display in a moment and will automatically reboot when update is completed.\nThe HDMI connection may reset after updating the firmware and may go out of sync with your display.\nPress the [TV SYS]\nbutton on the remote a few times to sync with a compatible display mode if this happen.\nOnce the display is back, we recommend setting to [HDMI Auto]\nin the video setup menu unless other modes are preferred\nProduct SpecialistA.C.Ryan Asia Pacific Pte Ltd\n60 Kaki Bukit Place #01-12 Eunos Techpark Lobby A S(415979)\nOperating hours: 9.30am to 7.00pm Monday – FridayT\n+65 6748 3218 F\n+65 6748 4568 W www.acryan.com", "label": "Yes"} {"text": "LONDON The possibility of combining the rich color gamut of organic light emitting diode (OLED) displays with enhanced flexibility is opened up by an academic paper on a liquid-OLED display in a recent issue of Applied Physics Letters.\nDenghui Xu and Chihaya Adachi of the Center for Future Chemistry, Kyushu University, Fukuoka, Japan, have reported an OLED with a liquid host of 9-(2-ethylhexyl)carbazole (EHCz) doped with a guest emitter of 5,6,11,12-tetraphenylnapthacene, otherwise known as rubrene.\nTo date OLED displays have been made in the solid-state and have the advantage over liquid crystal displays of not requiring a back-light. As OLED is emissive it can be energy efficient and be made very thin. However, manufacturing infrastructure supports cost-efficient LCD manufacture over a large range of sizes while OLED displays have been kept to small size applications.\n\"Although OLEDs have mainly used complete solid-state organic thin films and partly liquid crystals, no attempt to examine neat liquid organic semiconductors has been reported, except some reports using polymer solutions and solution-phase electroluminescent devices,\" the authors state in the paper.\nAs well as being useful for flexible emissive displays liquid semiconductors could also be useful more generally to enhance the reliability and longevity of organic semiconductor systems such as FETs and solar cells.\nThe authors propose circulated-OLEDs in which the liquid organic semiconductor material is circulated or refilled into the active emitting layer so that fresh organic semiconductors can be supplied.\nRelated links and articles:\nApplied Physics Letters paper\nArizona center builds flexible OLED display\nNovaled OLED meets DoE lighting specifications\nSoitec, Corning to develop substrates for OLED mobile displays\nThe thermal and electrical characterization of large-area OLEDS", "label": "Yes"} {"text": "The Sony NXCAM HXR-NX5U camcorder is the first product of the NXCAM generation from Sony, and a new category of tapeless memory camcorder, providing an ideal balance of power and performance in the digital age. Utilizing the revolutionary AVCHD format, this camcorder offers long duration recording with dual memory slots on affordable consumer memory cards. As it facilitates a totally IT-based workflow, the HXR-NX5U has the potential to profoundly change the way content is created. Simultaneous hybrid recording is available in HD (high definition) and SD (standard definition) formats using an optional HXR-FMU128 flash memory unit. In any format, breathtaking picture quality is assured with proven features from Sony such as a state-of-the-art \"G Lens\" and three Exmor CMOS sensors with a ClearVid array. Professionals around the world expect this standard of picture quality from Sony - and accept nothing less.\nG Lens Memory Recording and HYBRID \"G Lens\", the lens featured in other successful Sony camcorders, already enjoys an excellent industry reputation. In the HXR-NX5U, this sophisticated lens is optimized to complement the camcorder's advanced image sensor and image-processing technology. Three Exmor CMOS sensors with a ClearVid array comprise a state-of-the-art sensor system from Sony which realizes high resolution, high sensitivity, a wide dynamic range, and excellent color reproduction, regardless of the codec. Memory recording on affordable consumer memory cards offers workflow efficiency at both the shooting and editing stages. Combined with hybrid recording, using an optional HXR-FMU128, the user achieves a totally IT-based workflow, with the added bonus of instant data backup.\nGPS Active SteadyShot Feature\nA built-in global positioning system (GPS) locator allows satellite navigation data to be recorded directly onto footage for reference or posting on popular internet mapping systems. GPS data can be invaluable when searching for footage or to provide evidence of where and when footage was recorded. Active SteadyShot feature is a new, enhanced image stabilization system that provides a powerful shake-reduction capability, vital for handheld usage. Additional stabilization is provided by the increased optical lens coverage area and by improved detection with state-of-the-art compensation The revolutionary AVCHD recording format, which utilizes the MPEG-4, AVC/H.264 video codec, allows users to record HD video footage onto random access media. Its intelligent and sophisticated algorithm makes AVCHD a highly efficient compression format ideal for memory recording and IT-based editing.\nThe \"G Lens\" provides great picture quality and versatility with a wide angle of 29.5 mm (equivalent to 35 mm film) and a 20x high quality zoom. Two ED (extra-low dispersion) glass elements reduce chromatic aberrations caused by differences in light refraction to minimiz e color fringing. The advanced 10-group, 15-element lens structure also includes a compound aspheric lens for images that are crisp and clear, even when shooting videos at a high zooming ratio. Advanced Camera Features Sony-exclusive High-performance \"G Lens\" Other Superb Features of the Optical System FOCUS IRIS ZOOM Three ND filters Natural-touch Lens Operation The focus, zoom and iris ring are positioned on the lens barrel, and this design offers the same operability as general interchangeable lenses. Focus, zoom and iris control can all be managed easily. Six-blade Iris SThe six-blade iris diaphragm is nearly circular, enabling the creation of an extremely beautiful background blur. Built-in ND filters SThe HXR-NX5U is equipped with three built-in ND (Neutral Density) filters - 1/4, 1/16, 1/64 - which help to vary the depth of field with iris control.\nThe three state-of-the-art 1/3\" Exmor CMOS sensors with a ClearVid array ensure high resolution, high sensitivity, a wide dynamic range, and excellent color reproduction. The quality of this imaging system has earned an excellent reputation in the industry, and is of course fully realized in the new HXR-NX5U. S Exmor Technology Noise Reduction System Multiple A/D (analog-to-digital) converters on each pixel row convert analog signals to digital as soon as they are generated, unlike traditional technology that only provides one A/D converter on each chip. Exmor technology can eliminate the influence of external noise that enters the signal chain during transfer to the A/D converter, resulting in high-quality digital signals with extremely low noise. This significantly enhances shooting in low-light environments with a sensitivity of just 1.5 lux.* * At 1/30 shutter, auto iris, and auto gain. S High Sensitivity and Resolution with Sophisticated Techniques CMOS sensors equipped with a ClearVid array achieve a bigger sensor pixel size than ordinary image sensors, and this leads to high sensitivity. Furthermore, a unique interpolation technique from Sony utilizes the 45-degree rotated pixels on each chip, increasing resolution. The powerful combination of these two sophisticated techniques explains why Sony picture quality has such an excellent industry reputation. Three 1/3\" Exmor CMOS Sensors Before the Codec + Ordinary CMOS Sensor Exmor Technology ClearVid Array Technology + Sensor with Exmor Technology + Sensor with ClearVid Array + Small size sensor (simulated image)\nThe HXR-NX5U is the world's first AVCHD professional camcorder with an internal GPS. This important new feature enables users to find the same shooting location when, for example, they need to revisit a location for extra shots that must match existing footage. GPS data is embedded in AVCHD video data files. Mapping data can be created using bundled Content Management Utility software. Also GPS data can be extracted from video files, using Content Management Utility software, in a commonly used latitude/longitude NMEA data format. This GPS information can be used in several applications. Location Simplification with Cutting-edge GPS Technology Content Management Utility Software Display GPS data on the map\nA new feature of the HXR-NX5U is Active SteadyShot. This useful feature effectively reduces hand-held camera shake. The improvement is particularly noticeable when using wide-angle framing. It is an essential feature when holding the camcorder by hand, and especially for projects that are recorded mainly in the field. It is also ideal when the subject is moving and must be followed, for example in news gathering or at weddings. Shooting from inside a moving vehicle is another useful application for the Active SteadyShot feature. It significantly reduces the need for external stabilization systems. Improved stabilization allows the user to concentrate more on composition and shot transition, rather than worry about how to stabilize the camera. Depending on the shooting environment, users can select normal SteadyShot feature or Active SteadyShot feature for hand-held applications. When not in use, the stabilization feature can be easily switched off. Shoot and Walk with the New Active SteadyShot Feature Without Active SteadyShot Feature With Active SteadyShot Feature\nThe HXR-NX5U is also the first Sony professional camcorder designed to record directly onto consumer memory cards. These cards are affordable and easy to find. This general versatility is especially handy when a user suddenly needs extra memory - something that happens quite often when shooting a documentary or news report on the move. Also, memory cards are very compact and easy to handle. Many devices can accept these memory cards allowing easy playback. Files can be copied\nThere are major advantages of Memory Recording Recording Time on a single memory media including Easy Viewing of Recorded Footage, Fast Ingestion to a Computer and Easy Playback Another new feature is continuous recording between two memory card slots. The new HXR-NX5U camcorder automatically cycles between the dual memory slots. When using two, 32-GB memory cards, six hours of continuous HD footage can be recorded. If a longer continuous recording time is required, the user simply waits until the first card is full and recording has relayed to the second card, before ejecting the first card and inserting a new blank memory card. This procedure can be repeated as required, extending continuous recording for a sufficiently long time. from a memory card to any available computer, instantly backing up valuable data.", "label": "Yes"} {"text": "The development of weapons that can travel at hypersonic speeds is becoming a high priority to the US Air Force. A key technology needed for the continued development of these propulsion systems is the ability to cool the combustor by flowing fuel through channels machined in the walls.\nAircraft and missiles capable of rapid global strike and reconnaissance must fly at hypersonic speeds to achieve their performance goals. Future air-breathing hypersonic aircraft and missiles are expected to be powered by supersonic combustion ramjet (scramjet) engines.\nThe Army is very interested in accurate simulations of combustion in devices such as rockets and gas turbines, Otto and Diesel cycle IC engines, scramjet engines, rotating detonation engines, etc.\nThe surfaces of rocket engines are exposed to high pressure combustion products at temperatures up to 6000?F. Regenerative cooling can cause coke to form on the heat exchanger surfaces.\nThe development of new, robust, lightweight life support systems is currently a crucial need for NASA in order to continue making advances in space exploration, particularly in the development of Lunar outposts.\nReducing the allowable concentration of carbon dioxide (CO2) in spacecraft is a critical need for NASA.\nScramjet engines, which likely will provide the next generation propulsion capability, operate at extremely high temperatures and air velocities, conditions that are very difficult to reach in a laboratory.\nReaction Systems, Inc. has developed a new line of robust high temperature ceramic choked flow venturis for use in oxidizing and reducing atmospheres at temperatures up to 2700?F (1480?C).\nHigh Heat Flux Surface Coke Deposition and Removal Assessment Conference Paper Jan 2016 David T. Wickham Jeffrey R. Engel Bradley D. Hitch Alex R. Wickham : The internal surfaces of liquid hydrocarbon-fueled rocket engine thrust chambers, throats, and nozzles are exposed to high pressure combustion products at temperatures beyond 6000 F. Regenerative cooling is widely […]", "label": "Yes"} {"text": "Digital Forensics Round-Up, May 25 2023\nA round-up of this week’s digital forensics news and views:\n2023 SC Awards Finalists: Best Computer Forensic Solution\nEffective incident response necessitates the use of investigation and analysis techniques with devices for evidence gathering…\nThe post Digital Forensics Round-Up, May 25 2023 appeared first on Forensic Focus.", "label": "Yes"} {"text": "- I. Introduction\n- II. Understanding Energy Fluctuations\n- A. Definition of energy fluctuations\n- B. Causes of energy fluctuations\n- C. Impact of energy fluctuations on battery performance\n- III. Introduction to Battery Management Systems (BMS)\n- A. What is a Battery Management System?\nWelcome to our comprehensive guide on managing energy fluctuations and the importance of battery management systems. In today’s fast-paced world, where technology is an integral part of our daily lives, it is crucial to understand how we can efficiently manage and optimize the performance of batteries.\nWhether it’s in our smartphones, electric vehicles, or renewable energy systems, batteries play a vital role in powering these devices. However, their performance can be greatly affected by energy fluctuations caused by various factors such as temperature changes or excessive charging/discharging.\nTo ensure that batteries operate optimally and have a longer lifespan, battery management systems (BMS) are essential. These intelligent systems monitor and control various parameters of the battery such as voltage, current, temperature, and state-of-charge (SoC). By doing so, they effectively prevent overcharging or discharging beyond safe limits.\nThe Role of Battery Management Systems\nBattery management systems are designed to protect batteries from potential damage due to improper usage or external factors. They help maintain optimal conditions for the battery cells’ health and maximize their efficiency throughout their lifespan.\nOne key function of BMS is cell balancing. In multi-cell battery packs like those found in electric vehicles or renewable energy storage systems, individual cells may exhibit different characteristics over time due to manufacturing variations or aging effects. BMS ensures that each cell receives equal charge/discharge cycles by actively redistributing energy among them.\nEnhancing Safety Through Thermal Monitoring\nBattery safety is paramount as thermal runaway events can lead to catastrophic consequences such as fires or explosions. BMS incorporates sophisticated thermal monitoring techniques to detect any abnormal rise in temperature within the battery pack.\nProlonging Battery Lifespan with State-of-Charge Management\nManaging the state-of-charge (SoC) is crucial for maximizing battery lifespan. BMS accurately measures and maintains the SoC within optimal ranges, preventing deep discharges or overcharging, which can significantly reduce battery life.\nIncreasing Efficiency with Voltage and Current Control\nBMS also actively regulates voltage and current levels to ensure that the battery operates within safe limits. By carefully monitoring these parameters, BMS prevents excessive stress on the battery cells, improving overall efficiency and performance.\nIn this section of our article, we have introduced you to the concept of managing energy fluctuations through effective battery management systems. We explored how BMS plays a vital role in maintaining optimal conditions for batteries, enhancing safety through thermal monitoring, prolonging lifespan via state-of-charge management, and increasing efficiency with voltage and current control.\nIn the following sections, we will delve deeper into each aspect of battery management systems to provide you with a comprehensive understanding of their significance in today’s energy-driven world.\nIn today’s fast-paced world, energy fluctuations have become a common challenge for various industries. From renewable energy sources to electric vehicles, managing and optimizing battery performance is crucial to ensure efficiency and reliability. This is where battery management systems (BMS) come into play, offering advanced solutions to monitor, control, and protect batteries from undesirable conditions.\nThe Role of Battery Management Systems\nBattery management systems are intelligent electronic devices that oversee the operation of batteries. They play a pivotal role in maximizing their lifespan while ensuring safe and efficient performance. BMS provide real-time data on battery health, state of charge (SoC), state of health (SoH), temperature, voltage levels, and more.\nBy constantly monitoring these parameters, BMS can prevent overcharging or undercharging of batteries – both situations that can significantly impact their lifespan. Additionally, BMS help maintain optimal operating conditions by regulating temperature and preventing overheating or extreme cold temperatures.\nEnhancing Safety and Reliability\nBattery safety is paramount in industries such as automotive, aerospace, telecommunications, renewable energy systems – essentially any application relying on stored electrical power. A well-designed BMS ensures safe operation by detecting abnormalities within the battery system in real time.\nIf an anomaly is detected – such as overvoltage or excessive temperature rise – the BMS takes immediate action to protect the battery cells from potential thermal runaway or damage due to overstress conditions. By isolating faulty cells or cutting off charging currents when necessary through active cell balancing techniques like shunt resistors or cell bypassing circuits – a BMS safeguards against catastrophic failures.\nOptimizing Performance with Intelligent Algorithms\nApart from safety, BMS also contribute to optimizing battery performance and efficiency. Utilizing advanced algorithms, BMS can predict the remaining capacity of a battery (SoC) accurately. This information helps users plan their energy usage effectively, preventing unexpected shutdowns or downtime.\nFurthermore, BMS enable smart charging strategies that adapt to specific battery chemistries and optimize charge cycles based on usage patterns. By avoiding overcharging or undercharging, BMS ensure that batteries operate within their ideal voltage range for longer life expectancy and improved overall performance.\nBattery management systems are indispensable in modern energy storage applications. They offer a comprehensive suite of features to control and monitor batteries’ health while maximizing their lifespan and ensuring safe operation. With the ever-increasing demand for efficient, reliable energy solutions, implementing a robust BMS is crucial for managing energy fluctuations effectively.\nII. Understanding Energy Fluctuations\nEnergy fluctuations are a common occurrence in battery-powered systems, and understanding them is crucial for effective battery management. These fluctuations refer to the variations in energy levels within a battery, which can impact its performance and overall lifespan. By comprehending the causes and effects of energy fluctuations, we can implement strategies to optimize battery usage and ensure reliable operation.\nThe Factors Influencing Energy Fluctuations\nA variety of factors contribute to energy fluctuations in batteries. One significant factor is the load placed on the battery. When a device or system draws power from the battery, it creates an electrical load that affects the available energy level. Higher loads typically result in more rapid energy depletion, leading to shorter runtimes.\nBattery chemistry also plays a vital role in energy fluctuations. Different chemistries have unique characteristics that affect how they store and release energy over time. For example, lithium-ion batteries exhibit less voltage drop during discharge compared to lead-acid batteries.\nThe Impact of Energy Fluctuations on Battery Life\nEnergy fluctuations have direct implications for the lifespan of a battery. Frequent deep discharges followed by rapid recharging can accelerate capacity loss and reduce overall longevity. This phenomenon is known as “cycle aging.” Additionally, high-load situations that cause excessive heat generation can further degrade a battery’s performance over time.\nBattery Management Systems: Addressing Energy Fluctuations\nTo mitigate adverse effects caused by energy fluctuations, implementing an efficient Battery Management System (BMS) is essential. A BMS monitors various parameters such as voltage levels, current flow, temperature, and state-of-charge (SoC) to actively manage charging and discharging processes.\nA BMS helps regulate optimal charge levels by preventing overcharging or deep discharging, which can significantly impact battery life. It also ensures balanced energy distribution among multiple cells within a battery pack, maximizing overall performance and longevity.\nBMS systems utilize sophisticated algorithms that assess real-time data to make informed decisions regarding energy flow and battery health. By continuously monitoring and adjusting charging parameters, a BMS helps maintain stable energy levels, reducing the risk of energy fluctuations.\nUnderstanding energy fluctuations is fundamental to effective battery management. By identifying the factors influencing these fluctuations and their impact on battery life, we can implement appropriate strategies to optimize performance and increase longevity. Battery Management Systems play a crucial role in addressing energy fluctuations by actively regulating charging processes and ensuring stable energy levels throughout the lifespan of a battery.\nA. Definition of energy fluctuations\nEnergy fluctuations refer to the variations in the availability and demand for energy within a system. These fluctuations can occur at different scales, ranging from micro-level variations to macro-level shifts. Understanding and managing energy fluctuations is crucial for ensuring optimal performance and efficiency in various applications, particularly in the context of battery management systems (BMS).\nThe Nature of Energy Fluctuations\nEnergy fluctuations are an inherent characteristic of any energy system. They can arise due to various factors, including changes in power generation, consumption patterns, environmental conditions, or even equipment malfunctions. These fluctuations can be periodic or random and can occur over short or long durations.\nIn power systems specifically, energy fluctuation is often caused by the intermittent nature of renewable energy sources such as solar or wind power. As these sources rely on environmental conditions like sunlight or wind speed, their output is not constant but varies throughout the day.\nThe Implications of Energy Fluctuations\nUnmanaged energy fluctuations can lead to several challenges and consequences within a system. First and foremost, they may result in unreliable power supply or insufficient capacity during peak demand periods. This could lead to service disruptions or compromise critical operations that rely on uninterrupted power supply.\nFurthermore, excessive energy fluctuations can also impact equipment lifespan by subjecting them to stress caused by frequent switching between high-demand and low-demand periods. Inefficient utilization of available resources due to unmanaged variations may also increase operational costs.\nThe Role of Battery Management Systems (BMS)\nBattery Management Systems play a vital role in managing energy fluctuations effectively. BMS helps maintain stable voltage levels within batteries by monitoring charging and discharging processes while considering external factors that influence fluctuation rates.\nBMS uses advanced algorithms and control mechanisms to optimize energy flow, ensuring that fluctuations are mitigated, and energy is utilized efficiently. This involves dynamically adjusting charging and discharging rates, implementing energy storage strategies during periods of excess supply, and releasing stored energy during high-demand periods.\nThe Benefits of Managing Energy Fluctuations\nProper management of energy fluctuations offers several benefits. By maintaining stable power supply levels, it improves the reliability and quality of service in various industries such as telecommunications, healthcare, transportation, and manufacturing.\nEffective management also extends the lifespan of batteries by reducing stress caused by excessive fluctuations. Additionally, optimized utilization of available resources leads to cost savings through reduced wastage or reliance on backup power sources.\nB. Causes of energy fluctuations\nEnergy fluctuations can occur due to various factors and understanding these causes is crucial for effective battery management. Below are some common reasons behind energy fluctuations:\n1. Temperature Variations\nTemperature plays a significant role in battery performance. Extreme hot or cold temperatures can lead to changes in internal resistance, affecting the capacity and efficiency of the battery. High temperatures can accelerate chemical reactions, leading to faster self-discharge and reduced overall lifespan.\n2. Overcharging or Undercharging\nIf a battery is overcharged, it can cause excessive heat generation, electrolyte breakdown, and even hazardous situations like gas release or leakage. On the other hand, undercharging may result in insufficient energy storage within the battery, reducing its overall capacity and runtime.\n3. Aging and Wear\nBatteries undergo wear as they age due to repeated charge-discharge cycles. Over time, this wear results in reduced energy storage capability and increased internal resistance—leading to voltage drops during usage periods.\n4. Internal Short Circuits\nAn internal short circuit occurs when there is an unintended connection between different parts within a battery cell or pack due to physical damage or manufacturing defects. These short circuits create abnormal current flows that deplete stored energy rapidly.\n5. Parasitic Loads\nSometimes batteries experience parasitic loads that continue drawing power even when not actively used or connected to any load devices. These loads could be caused by faulty wiring connections or electronic components consuming small amounts of power continuously.\nBy being aware of these potential causes of energy fluctuations in batteries, individuals can take appropriate measures such as implementing efficient cooling systems for temperature control, using proper charging techniques with safeguards, and regularly monitoring battery health to prevent premature degradation. Battery management systems play a vital role in identifying and addressing these causes, ensuring optimal performance and longevity of the batteries.\nC. Impact of energy fluctuations on battery performance\nEnergy fluctuations can have a significant impact on the performance and lifespan of batteries. When the energy supplied to a battery is inconsistent or unstable, it can lead to various issues that affect its overall efficiency and functionality.\n1. Reduced charging capacity\nAn unstable energy supply can result in reduced charging capacity for batteries. Fluctuating power levels may prevent the battery from reaching its full charge potential, leading to shorter operational times and decreased overall performance.\n2. Increased internal resistance\nEnergy fluctuations can also contribute to increased internal resistance within batteries. This phenomenon occurs when the voltage levels fluctuate excessively, causing heat buildup and chemical reactions that negatively impact the battery’s ability to store and release energy efficiently.\n3. Accelerated degradation\nBatteries exposed to inconsistent energy supplies are more prone to accelerated degradation over time. Fluctuations in voltage levels or irregular charging patterns can cause wear and tear on the battery’s internal components, reducing its lifespan and overall reliability.\n4. Risk of overheating\nInadequate or excessive energy supply can increase the risk of overheating in batteries, especially during charging cycles. Unstable power inputs may result in imbalances within the chemical reactions taking place inside the battery, leading to excessive heat generation that could potentially damage critical components or even pose safety hazards.\n5. Impaired performance in high-demand scenarios\nBatteries experiencing energy fluctuations may struggle when subjected to high-demand situations where they need to deliver power quickly and consistently. In such cases, unstable power inputs may limit their ability to meet peak power requirements effectively, resulting in reduced performance or even complete failure under heavy loads.\nOverall, managing energy fluctuations is crucial for optimizing battery performance and extending its lifespan. Implementing robust battery management systems that monitor and regulate energy inputs can help mitigate the negative impacts of fluctuating power supplies, ensuring stable and reliable operation in various applications.\nAs technology continues to advance at a rapid pace, energy management has become a crucial aspect for various industries. One key component that plays a significant role in managing energy fluctuations is the battery management system (BMS). In this article, we will explore the importance of BMS and how it helps optimize energy usage and prolong battery life.\n1. What is a Battery Management System?\nA Battery Management System is an electronic control unit that monitors and manages the charging and discharging of batteries. It ensures efficient utilization of stored energy while protecting the battery from overcharging, overheating, or deep discharge events.\n2. Maximizing Efficiency with BMS\nBattery Management Systems are designed to maximize efficiency by continuously monitoring voltage, current, temperature, and other relevant parameters. By collecting real-time data about the battery’s performance, it can adjust charging rates and limit power consumption to ensure optimal usage.\n3. Enhancing Safety Measures\nBattery safety is of utmost importance due to potential risks associated with improper handling or malfunctioning batteries. A BMS incorporates safety features like thermal management systems, voltage protection circuits, and fault detection mechanisms to prevent accidents such as explosions or fires.\n4. Extending Battery Lifespan\nProlonging battery lifespan not only reduces costs but also minimizes environmental impact by reducing waste generation from frequent replacements. A well-implemented BMS prevents overcharging or discharging beyond safe limits by controlling charging cycles accurately based on specific battery chemistry requirements.\n5. Predictive Maintenance Capability\nA sophisticated BMS can offer predictive maintenance capabilities by analyzing historical data trends and identifying patterns indicating potential issues. By detecting early signs of battery degradation or malfunctions, proactive actions can be taken to prevent critical failures and ensure uninterrupted operations.\n6. Customizability for Diverse Applications\nBattery Management Systems are highly adaptable and customizable to cater to various applications such as electric vehicles, renewable energy systems, consumer electronics, and industrial equipment. Each application may have unique requirements, and a BMS can be tailored accordingly to optimize performance.\nIII. Introduction to Battery Management Systems (BMS)\nBattery Management Systems (BMS) play a crucial role in managing energy fluctuations and ensuring the optimal performance of batteries. Whether it’s for electric vehicles, renewable energy systems, or portable electronics, BMS is essential for maximizing battery life and safety.\nWhat is a Battery Management System?\nA Battery Management System is an electronic system that monitors and controls the charging, discharging, and overall health of rechargeable batteries. It helps to maintain the battery within safe operating limits, prevents overcharging or deep discharge, balances cell voltages, and provides vital information about battery status.\nThe Importance of Battery Management Systems\nBattery management systems are critical for several reasons:\nA properly functioning BMS protects batteries from hazardous conditions such as overheating or overcharging. It ensures that the battery operates within its specified temperature range and voltage limits, reducing the risk of fire or explosion.\n2. Performance Optimization\nBMS optimizes battery performance by monitoring individual cell voltages and temperatures. By maintaining balanced cells and preventing extreme voltage differences between them, it improves overall efficiency while extending battery life.\n3. State-of-Charge Estimation\nBMS accurately estimates the state-of-charge (SOC) of a battery by tracking its current flowing in and out during charge/discharge cycles. This information is crucial for determining how much usable energy remains in the battery before recharging becomes necessary.\n4. Fault Diagnosis\nIn case of any abnormalities or malfunctions within a battery pack or individual cells, BMS can detect faults or imbalances quickly through continuous monitoring. This diagnosis helps in identifying potential issues before they become critical, preventing further damage and ensuring the reliability of the battery system.\n5. Enhanced Battery Life\nBMS prolongs battery life by ensuring consistent charging and discharging patterns. By avoiding deep discharge or overcharging, it reduces stress on the battery cells, minimizing capacity degradation and maximizing overall lifespan.\nBattery Management Systems are vital for maintaining battery safety, optimizing performance, estimating state-of-charge accurately, diagnosing faults promptly, and extending battery life. These systems are integral to various applications that rely on rechargeable batteries to ensure efficiency, reliability, and longevity.\nA. What is a Battery Management System?\nA battery management system (BMS) is an essential component of modern energy storage systems, ensuring the efficient and safe operation of batteries. It is responsible for monitoring, controlling, and optimizing various parameters of the battery pack to maximize its performance, lifespan, and overall reliability.\n1. Monitoring Battery Parameters\nThe BMS continuously monitors critical parameters such as voltage, current, temperature, state of charge (SOC), state of health (SOH), and internal resistance. By collecting real-time data from individual cells or modules within the battery pack, it provides valuable insights into the battery’s condition and performance.\n2. Cell Balancing\nTo ensure uniformity among cells in a lithium-ion battery pack—preventing overcharging or discharging—the BMS performs cell balancing. It redistributes energy between cells by controlling charging or discharging rates to maintain optimal voltage levels across all cells.\n3. Overcurrent Protection\nIn situations where excessive current flows through the battery pack due to short circuits or other anomalies, the BMS acts as a safeguard by instantly disconnecting power flow to prevent damage to both the batteries and connected devices.\n4. Temperature Regulation\nBatteries are sensitive to extreme temperatures that can impact their performance and longevity. The BMS actively monitors temperature levels within the battery pack and takes necessary measures like adjusting charging rates or triggering cooling mechanisms to prevent overheating or freezing conditions.\n5. State-of-Charge Estimation\nThe accurate estimation of SOC is crucial for optimizing energy utilization in various applications. The BMS employs advanced algorithms based on voltage measurements combined with sophisticated models that consider factors like discharge rate characteristics and environmental conditions for precise SOC estimation.\n6. Safety and Fault Diagnosis\nThe BMS plays a vital role in ensuring the safety of battery systems by detecting faults such as overvoltage, undervoltage, overtemperature, and abnormal behavior. It can isolate faulty cells or modules from the rest of the pack to prevent cascading failures and potential hazards.\n7. Communication and Control\nBMSs enable communication between batteries and external devices or systems through protocols like CAN (Controller Area Network) or RS485. This allows for remote monitoring, data logging, system integration, firmware updates, and control of charging/discharging processes.\nIn essence, a battery management system is an intelligent controller that optimizes energy storage while ensuring the safety and reliability of battery packs in various applications like electric vehicles (EVs), renewable energy storage systems, portable electronics, and more.\nDawn Price is a fitness enthusiast and thought leader who loves to share her passion for Gym and fitness with the world. She has a Bachelor’s degree in Sports Science from the University of California and is certified as a Personal Trainer from the American Council on Exercise. She has been inspiring thousands of Gym and fitness goers for over five years with her creative workouts, diet plans, and advice. Dawn is committed to helping others strive for optimal physical and mental health. In her free time, she loves to explore the great outdoors and share her passion for life with her friends and family.", "label": "Yes"} {"text": "Two versions are available, corresponding to two types of screen.\nOne screen has 128x64 pixels and is yellow on the top 1/4 and blue on the lower 3/4\n(Approximately 22mm x 11mm actual display area on a 27mm x 27mm circuit board)\n(Photograph of the screen looks fuzzy due to protective sheet still in place)\nThe other screen is even smaller with 128x32 pixels and has all white text\n(21mm x 6mm actual display area on a 38mm x12mm circuit board)\nThe fully assembled RemoteSign ESP comprises:\n- ESP8266 module loaded with RemoteSign software\n- Screen of your choice, wired to the ESP8266\nWhat you will need to run it is:\n- A USB-B cable connected to a USB socket, or 5V DC power supply which you connect to two pins of the ESP8266 (+5 Volts to pin: VIN, and power ground to pin: G)\n- Wi-Fi network, and a device that can connect to wifi to set the wifi credentials such as a mobile phone, (only needed once only).\n- A copy of RemoteSign Sequencer, or Windows RemoteSign or DB program (all can be downloaded from this site)\nOutside the USA:", "label": "Yes"} {"text": "Towards uniform benefit-cost analysis for smart grid projects: an example using the Smart Grid Computational Tool\nSmart grid technology is being rolled out around the world, with the United States nearing completion of a particularly significant 4 plus billion-dollar Federal program funded under the American Recovery and Reconstruction Act (2009). Under the Climate Change Working Group Implementation Plan, Smart Grid activity comparative analyses are being conducted of benefits estimation methods with example applications to 4 case study smart grid projects, 2 in each country. In this first study, three of eight Southern California Edison's Irvine Smart Grid Demonstration Project sub-project benefits have been analysed over the period 2010-2035. The analysis uses the Smart Grid Computational Tool (SGCT) developed by Navigant Consulting Inc. for the U.S. Department of Energy based on Electric Power Research Institute methods. Results show significant benefits potential for technologies such as distribution voltage and VAR control and utility-scale batteries, while a 22-residence zero net energy home demonstration inspired by California's 2020 residential energy efficiency standard falls far short of economic breakeven at the current stage of costs and technology performance. The experience gathered indicates the SGCT being intended for widespread U.S. smart grid evaluation use is necessarily simple, and consequently has limited applicability for international applications or comparisons.", "label": "Yes"} {"text": "The VLT® AutomationDrive FC 360 is a compact, space-saving, general-purpose AC drive available in 5 frame sizes. Designed with ease-of-use, reliability and flexibility in mind, the basic, yet comprehensive features provide precise and energy-efficient motor control for a wide range of industrial applications.\nThe VLT® AutomationDrive is designed to perform reliably in harsh environments. The coated PCB reduces dust, moisture and particle issues and the maximum operating temperature is 55°C. Built-in features, such as PID controller, EMC filter, DC choke and brake chopper to 22 kW, save costs and installation space. IP 20 protection, a removable fan and an enhanced numerical display ensure fast setup and simpler maintenance.\nApplications : Pumps, fans, extruders, escalators, winders, material-handling applications and centrifuge separators.", "label": "Yes"} {"text": "This is a new generation Spedix S250 Pro quadcopter which includes all the components needed to assemble an almost ready to fly aircraft! This is a great choice for pilots who prefer to build their drone, but don't want to waste time figuring out what gear to use to finish it off. Improvements found on the new S250 Pro include improved durability, higher performance levels, and improved flying characteristics. Advancements in technology allow the Spedix to feel more connected in flight, a higher level of durability with the re-designed top and bottom frame, and lastly increased power with an upgrade in the motor and ESC system.\nThe Spedix S250 Pro takes the best qualities of plastic and carbon fiber material to create the ultimate 250 class FPV drone. The S250 is beautiful, lightweight, easy to assemble and simple to repair. With its unique frame, combined with a series of electric components and accessories developed specially for the S250, this machine is a true work of art. The ESC's and power distribution board were developed exclusively for the S250 and fit the frame like a glove. Plus, a majority of the electronic components are pre-soldered modules - so assembly, repair and maintenance are as simple as possible.\n- Fully assembled and programmed from the factory\n- Bind and Fly Technology with a Satelite Receiver\n- Lightweight and Agile\n- 700TVL camera\n- 40 channel video transmitter\n- Naze Rev6 flight controller with integrated MinimOSD\n- Reinforced 2204 2300KV motors\n- BLHeli program ESC with OneShot\n- Stronger arms\n- Green and red LED lights on arms\n- Programmable LED light on the tail\n- DSMX compatible satellite with binding button\n- Clear Landing Gear Mounting System\nNeeded to Complete:\n- DSMX/DSM2 Compatible Radio System (6 Channel Minimum)\n- 3s LiPo Battery 1300-2200mAh\n- Tools for assembly\nConstant community support is offered through a variety of channels, and directly supported at RCGroups.\nThis product was added to our catalog on June 3, 2016\nI wish more parts to build and another one would be available.\nplus there needs to be more verities in sizes . plus in store\nI learned the basics on the road. Popped the road pretty hard several times never broke the landing gear. Have not had a really hard crash yet though. I get 8 minute flight times on a 1550 lipo cruising around.\nI did end up with a wire being pulled off where the battery connects to the board. Solder was a quick fix.", "label": "Yes"} {"text": "The UA874 can be stand-mounted, suspended from the ceiling, or wall-mounted using the included swivel adapter bracket.\n• Compatible with all Shure wireless receivers and antenna distribution systems that provide 12 V DC bias\n• Four-position gain selector switch\n• Low-noise signal amplifier that compensates for transmission loss in coaxial cable\n• Integrated threaded adapter that mounts easily to microphones stands\n• Legendary Shure build quality and reliability\n|Product Condition||New - On Clearance|", "label": "Yes"} {"text": "Thank you for your interest\nYou can download the eBook now or access it later from your inbox.\nA lakehouse architecture can help you deliver real-time insights at scale by unifying all your data for healthcare and life science analytics and AI. Find out how.\nLearn how Databricks along with Spark SQL, SparkML and MLflow, can be used to build a scalable and reproducible framework for machine learning on pathology images.\nLearn the fundamentals for building scalable health and clinical data lake for analytics and ML using Delta Lake and Apache SparkTM.\nReady to start?\nAn open and unified data analytics platform for data engineering, machine learning and analytics", "label": "Yes"} {"text": "IBM is setting out to prove not only how wide, but how deep, its computing prowess has become.\nIn the past year, IBM has begun to lay out its vision of the future based on \"pervasive computing\" -- making computers more widely available by embedding them in everyday objects -- and \"deep computing\" -- using supercomputer power to untangle some of the world's thorniest computing challenges.\nOn Monday, the Armonk, New York-based company will unveil its Deep Computing Institute, a US$29 million research effort to join academic and industry researchers using massive computational power to attack complex problems.\nAs part of the project, the Deep Computing Institute will publish the source code for its IBM Visualization Data Explorer on the Internet. The powerful software package can be used to analyze and create three-dimensional representations of data.\nDeep computing involves using supercomputer-scale machines, advanced software, and sophisticated mathematical formulas to enable researchers to take on daunting scientific and commercial tasks that can involve trillions of variables.\nThe term was inspired by IBM's Deep Blue chess-playing computer, which defeated world chess champion Garry Kasparov in 1996.\nWilliam Pulleyblank, director of mathematical sciences at IBM Research, will serve as director of the institute. Its advisory board will include representatives from academia, government laboratories, and the private sector.\n\"Deep computing combines the best of business and scientific computing techniques to find the value buried in all this data and to apply that information to solve real-world problems,\" Pulleyblank said in a prepared statement. \"[It] can help find the proverbial needle in an entire field of haystacks, analyzing vast reservoirs of data to uncover key relationships between gene sequences needed to understand disease.\"\nSupercomputers allow researchers to throw maximum data-crunching power at a single research problem or set of problems. Mainframes, their less-powerful commercial siblings, handle general purpose calculations, but are less suited to such intensive research.\nIBM is already a top maker of supercomputers -- supplying more than 100 of the world's 500 largest supercomputers -- but the company is pushing to widen the use of the technology beyond academia to a range of new business problems.\nIBM has committed more than 120 scientists and technologists in eight research labs -- in New York; San Jose, California; Austin, Texas; Tokyo; Zurich, Switzerland; Haifa, Israel; Beijing; and New Delhi, India, to the Deep Computing Institute. They will collaborate initially on projects ranging from how to schedule personnel in complex environments, such as airline flights, and the modeling of precise weather patterns.\nThe IBM Data Explorer site will be operational on 26 May, the company said.\nData Explorer uses computational and 3-D graphics-rendering tools in a programmable framework that allows computer users to rapidly create visual images, uncovering patterns, trends, and \"what-if\" scenarios hidden within highly complex data.\nThe product could be used by a multinational bank to identify and manage financial risk in portfolios worldwide, for example. In energy exploration, it can depict oil-flow simulations to improve drilling success rates and boost underground reservoir yields.\nCopyright© 1999 Reuters Limited.", "label": "Yes"} {"text": "For several decades, random vibration theory (RVT) has been a popular method for predicting peak ground motions for seismic hazard assessment. Modern usage of RVT is typically in the stochastic method of simulating peak ground motion, to convert empirical models of the earthquake Fourier amplitude spectrum to response spectra, and in site response analysis. This study reexamines the underlying assumptions of RVT analysis, particularly regarding durations, peak factors, and nonstationarity corrections. It is suggested that the significant oscillator duration is the most appropriate duration metric for predicting response spectra, and an empirical model is derived using New Zealand data. This allows RVT to be easily generalized to levels of oscillator damping other than the usual 5%. For short‐duration excitations, signal nonstationarity is accounted for using a theoretical time‐dependent power spectral density function. This allows proper consideration of nonstationarity in both the signal standard deviation and the signal bandwidth. The appropriateness of commonly used Gaussian‐process peak factors is also examined. It is shown that low‐frequency oscillator response signals are not well approximated by a Gaussian distribution, which causes low‐frequency response spectra to be overpredicted. This means RVT‐optimized duration models in the literature do not have a physical interpretation at low oscillator frequencies. RVT analysis only yields approximate results, with standard deviations of 0.25 natural log units. However, it is nevertheless a simple and convenient method for rapidly predicting peak high‐frequency ground motions.", "label": "Yes"} {"text": "Databricks Launches DBRX: A New Standard for Efficient Open Source Models\nSAN FRANCISCO, March 27, 2024 -- Databricks, the Data and AI company, today announced the launch of DBRX, a general purpose large language model (LLM) that outperforms all established open source models on standard benchmarks. DBRX democratizes the training and tuning of custom, high-performing LLMs for every enterprise so they no longer need to rely on a small handful of closed models.\nAvailable today, DBRX enables organizations around the world to cost-effectively build, train, and serve their own custom LLMs.\n\"At Databricks, our vision has always been to democratize data and AI. We're doing that by delivering data intelligence to every enterprise — helping them understand and use their private data to build their own AI systems. DBRX is the result of that aim,\" said Ali Ghodsi, co-founder and CEO at Databricks. \"We're excited about DBRX for three key reasons: first, it beats open source models on state-of-the-art industry benchmarks. Second, it beats GPT-3.5 on most benchmarks, which should accelerate the trend we're seeing across our customer base as organizations replace proprietary models with open source models. Finally, DBRX uses a mixture-of-experts architecture, making the model extremely fast in terms of tokens per second, as well as being cost effective to serve. All in all, DBRX is setting a new standard for open source LLMs — it gives enterprises a platform to build customized reasoning capabilities based on their own data.\"\nDBRX Surpasses Open Source Models Across Industry Benchmarks\nDBRX outperforms existing open source LLMs like Llama 2 70B and Mixtral-8x7B on standard industry benchmarks, such as language understanding, programming, math and logic. (See Figure 1.)\nDBRX also outperforms GPT-3.5 on relevant benchmarks. (See Figure 2.)\nFor an in-depth look at model evaluations and performance benchmarks, and to see how DBRX is competitive with GPT-4 quality for internal use cases such as SQL, visit the Mosaic Research blog.\nDBRX Sets a New Standard for Efficient Open Source LLMs\nDBRX was developed by Mosaic AI and trained on NVIDIA DGX Cloud. Databricks optimized DBRX for efficiency with a mixture-of-experts (MoE) architecture, built on the MegaBlocks open source project. The resulting model has leading performance and is up to twice as compute-efficient as other available leading LLMs.\nDBRX sets a new standard for open source models, enabling customizable and transparent generative AI for all enterprises. A recent survey from Andreessen Horowitz found that nearly 60 percent of AI leaders are interested in increasing open source usage or switching when fine-tuned open source models roughly match performance of closed source models. In 2024 and beyond, enterprises expect a significant shift of usage from closed towards open source. Databricks believes DBRX will accelerate this trend.\nOrganizations Benefit from Enterprise-grade Capabilities with DBRX on the Data Intelligence Platform\nPaired with Databricks Mosaic AI's unified tooling, DBRX helps customers rapidly build and deploy production-quality generative AI applications that are safe, accurate, and governed without giving up control of their data and intellectual property. Customers benefit from built-in data management, governance, lineage and monitoring capabilities on the Databricks Data Intelligence Platform.\nDBRX is freely available on GitHub and Hugging Face for research and commercial use. Starting today on the Databricks Platform, enterprises can interact with DBRX, leverage its long context abilities in retrieval augmented generation (RAG) systems, and build custom DBRX models on their own unique data. DBRX is also available on AWS and Google Cloud, as well as directly on Microsoft Azure through Azure Databricks.\nDBRX is also expected to be available through the NVIDIA API Catalog and supported on the NVIDIA NIM inference microservice.\nDatabricks is the Data and AI company. More than 10,000 organizations worldwide — including Comcast, Condé Nast, Grammarly, and over 50% of the Fortune 500 — rely on the Databricks Data Intelligence Platform to unify and democratize data, analytics and AI. Databricks is headquartered in San Francisco, with offices around the globe, and was founded by the original creators of Lakehouse, Apache Spark, Delta Lake, and MLflow.", "label": "Yes"} {"text": "As computers become more complex, the demand increases for more connections between computer chips and external circuitry such as a motherboard or wireless card. And as the integrated circuits become more advanced, maximizing their performance requires better connections that operate at higher frequencies with less loss.\nImproving these two types of connections will increase the amount and speed of information that can be sent throughout a computer, according to Paul Kohl, Thomas L. Gossage chair and Regents’ professor in Georgia Tech’s School of Chemical and Biomolecular Engineering. Kohl presented his work in these areas at the Materials Research Society fall meeting.\nThe vertical connections between chips and boards are currently formed by melting tin solder between the two pieces and adding glue to hold everything together. Kohl’s research shows that replacing the solder ball connections with copper pillars creates stronger connections and the ability to create more connections.\n“Circuitry and computer chips are made with copper lines on them, so we thought we should make the connection between the two with copper also,” said Kohl.\nSolder and copper can both tolerate misalignment between two pieces being connected, according to Kohl, but copper is more conductive and creates a stronger bond.With funding from the Semiconductor Research Corporation (SRC), Kohl and graduate student Tyler Osborn have developed a novel fabrication method to create all-copper connections between computer chips and external circuitry.\nSince the pillar, which is the same thickness as a dollar bill, is fragile at room temperature, the researchers anneal it, or heat it in an oven for an hour to remove defects and generate a strong solid copper piece. Osborn found that strong bonds were formed at an annealing temperature of 180 degrees Celsius. He has also been investigating how misalignments between the two copper bumps affect pillar strength.\n“I’ve also studied the optimal shape for the connections so that they’re flexible and mechanically reliable, yet still have good electrical properties so that we can transmit these high frequency signals without noise,” said Osborn.\nThe researchers have been working with Texas Instruments, Intel and Applied Materials to perfect and test their technology. Jim Meindl, director of Georgia Tech’s Microelectronics Research Center and professor in the School of Electrical and Computer Engineering, and Sue Ann Allen, professor in the School of Chemical and Biomolecular Engineering, have also collaborated on the work.\nIn addition to this new method for making vertical connections between chips and external circuitry, Kohl is also developing an improved signal transmission line with the help of graduate student Todd Spencer.\n“Several very long communication pathways exist inside a computer that require a very high performance electrical line that can transmit at higher frequencies over long distances,” explained Spencer.\nThis is especially important in high-performance servers and routers where inter-chip distances can be large and signal strength may be significantly degraded. Kohl and Spencer have developed a new way to link high-speed signals between chips using an organic substrate, with funding from the Interconnect Focus Center, one of the Semiconductor Research Corporation/Defense Advanced Research Projects Agency (DARPA) Focus Center Research Programs.\nFabrication begins with an epoxy fiberglass substrate with copper lines on one side. The substrate is coated with a polymer and the areas without copper lines are exposed to ultraviolet (UV) light, which disintegrates the polymer where it’s not wanted. Then, the researchers coat the substrate with another polymer that hardens when exposed to UV light. Layers of titanium and copper are added on top of each copper line. When the layered substrate is heated at 180 degrees Celsius, the first polymer layer decomposes into carbon dioxide and acetone, which diffuse out leaving an air pocket.\n“The amount of electrical loss relates to the connection’s sensitivity at higher frequencies,” explained Spencer. “Just having this air pocket there reduces our signal loss greatly.”\nThe researchers are currently designing a coaxial cable for this chip-to-chip signal link, which should greatly increase the maximum signal frequency the connection can carry.\nCompanies that make computer chips and package them into a device are very interested in these technologies, said Kohl.\n“If these connections can be produced at a reasonable cost, they could be very important in the future because you’re giving the customer a better product for the same cost,” said Kohl.\nAbby Vogel | EurekAlert!\nNew software speeds origami structure designs\n12.10.2017 | Georgia Institute of Technology\nSeeing the next dimension of computer chips\n11.10.2017 | Osaka University\nUniversity of Maryland researchers contribute to historic detection of gravitational waves and light created by event\nOn August 17, 2017, at 12:41:04 UTC, scientists made the first direct observation of a merger between two neutron stars--the dense, collapsed cores that remain...\nSeven new papers describe the first-ever detection of light from a gravitational wave source. The event, caused by two neutron stars colliding and merging together, was dubbed GW170817 because it sent ripples through space-time that reached Earth on 2017 August 17. Around the world, hundreds of excited astronomers mobilized quickly and were able to observe the event using numerous telescopes, providing a wealth of new data.\nPrevious detections of gravitational waves have all involved the merger of two black holes, a feat that won the 2017 Nobel Prize in Physics earlier this month....\nMaterial defects in end products can quickly result in failures in many areas of industry, and have a massive impact on the safe use of their products. This is why, in the field of quality assurance, intelligent, nondestructive sensor systems play a key role. They allow testing components and parts in a rapid and cost-efficient manner without destroying the actual product or changing its surface. Experts from the Fraunhofer IZFP in Saarbrücken will be presenting two exhibits at the Blechexpo in Stuttgart from 7–10 November 2017 that allow fast, reliable, and automated characterization of materials and detection of defects (Hall 5, Booth 5306).\nWhen quality testing uses time-consuming destructive test methods, it can result in enormous costs due to damaging or destroying the products. And given that...\nUsing a new cooling technique MPQ scientists succeed at observing collisions in a dense beam of cold and slow dipolar molecules.\nHow do chemical reactions proceed at extremely low temperatures? The answer requires the investigation of molecular samples that are cold, dense, and slow at...\nScientists from the Max Planck Institute of Quantum Optics, using high precision laser spectroscopy of atomic hydrogen, confirm the surprisingly small value of the proton radius determined from muonic hydrogen.\nIt was one of the breakthroughs of the year 2010: Laser spectroscopy of muonic hydrogen resulted in a value for the proton charge radius that was significantly...\n17.10.2017 | Event News\n10.10.2017 | Event News\n10.10.2017 | Event News\n17.10.2017 | Life Sciences\n17.10.2017 | Life Sciences\n17.10.2017 | Earth Sciences", "label": "Yes"} {"text": "Powering Millions of Electronic Prescriptions for the NHS with DataStax\nCegedim Healthcare Solutions is part of the Cegedim Group, a major supplier of healthcare technology and information services across Europe, and currently the only healthcare solution provider approved to provide NHS GP clinical systems and NHS pharmacy dispensing software across the whole of the UK. Cegedim Healthcare Solutions also offers intelligent healthcare solutions to support collaborative working across the healthcare landscape with solutions for community care and shared care, as well as an innovative solution for population health management.\nThe company supports GPs and pharmacies with IT solutions for the efficient delivery of patient care, including the dispensing of medicines via electronic prescriptions. This is based on a real-time integration with NHS applications and the NHS Spine, delivered securely over the private Health and Social Care Network HSCN. To interact with these NHS systems and support critical real-time prescription fulfilment, Cegedim turned to DataStax Enterprise for its critical messaging and data expertise.\nProducts & Services\nHealthcare & LifeSciences\nCegedim Healthcare Solutions", "label": "Yes"} {"text": "I'm working on an off-grid solar system for work that is going to power some measurement equipment. It consists of 6 240W solar panels, a 60 amp Morningstar MPPT charge controller, an Outback 2.5 kW inverter and a 24 volt, 1820 Ah battery. To keep tabs on the system, we have installed a datalogger with remote communication that sends data via email three times a day. We only have four analog channels and are measuring battery voltage, battery temp, solar charge current, and inverter current. The logger works fine except the inverter current reading fluctuates between 0 and 20 amps with an actual steady load of 10 amps. We are using a 100A hall effect current sensor (offers a higher output voltage than a shunt) and the voltage output reads perfectly steady on a DMM. Today I put a scope on, and found a ripple on the signal, about 300 mV peak to peak (signal is around 2.6 VDC or so), approx 120 Hz. The solar current signal is perfectly smooth so I know it's not the power supply for the hall sensors. I am assuming this ripple is caused by the inverter and the logger's sampling frequency must almost match the 120 Hz or some multiple.\nDoes anyone have any suggestions on how to remove this ripple? I tried a small cap today and it helped a bit, but I'm afraid of damaging the hall sensor if I go too big on the cap.", "label": "Yes"} {"text": "New Arrival·Ceramic Package Infrared Products\nIn the past 20 years, with the rapid development of uncooled infrared detector technology, the technical level and quality of related products have been greatly improved. The cost and reliability of uncooled infrared detectors are becoming more and more important. While the level of packaging technology is an important factor that affects the cost and reliability of uncooled infrared detectors.\nUncooled infrared detectors are currently divided into metal packaging, ceramic packaging, and wafer-level packaging. Metal packaging is the earliest and the best among the three main packaging forms; wafer-level packaging is suitable for mass production; and the ceramic packaging is more favored by the dedicated market for civilian products.\nCeramic packaging is currently the most popular packaging technology on the market. The size, weight and power consumption of the detector can be significantly reduced.\nRecently, Global Sensor Technology (GST) releases two ceramic packaging uncooled infrared detectors: GST412C & GST612C. So, why are GST412C & GST612C infrared detectors?\nThe 400×300 and 640×512 resolution with 12μm pixel size are currently widely used in the mainstream applications in the infrared market.\nMini size: 18.5mm×18.5mm×3.8mm\nLight weight: 4.5g\nLow power consumption: as low as 80mW\nIts compact structure meets more strict integration requirements on size, weight and power consumption.\nUnder the same resistivity conditions, the vanadium oxide thin film has better TCR, higher photoelectric conversion efficiency, and better measurement temperature stability.\nThe infrared detector presents clearer, sharper and more detailed image with typical NETD<40mk.\nBased on these two infrared detectors, the TWIN series thermal modules (TWIN412 & TWIN612) are developed.\nWith enhanced image algorithms and temperature measurement function, the TWIN series thermal module presents more stable images and accurate temperature.\nWith temperature measurement range of -20℃~150℃/0~550℃(Customizable), accuracy of ±2℃ or ±2% and frame rate up to 30Hz, the thermal module guarantees smooth thermal image and accurate temperature measurement.\nThe TWIN series thermal module has the advantages of compact design, light weight structure and power consumption as low as 0.8w.\nMore Emerging Applications\nThis new product release will give more choices for customers from various industries such as Industrial Automation, Intelligent Security, Unmanned Platform, Robot, Intelligent Hardware, Advanced Driver Assistant System, Firefighting etc.", "label": "Yes"} {"text": "Uniblue driverscanner 2013 serial youtube\n31 Products CNTRL, BASKT LIFT DRIVER BOARD. Part #: 360-degree spin PITCO-60133503-HTR,TAPE 50W 120V 1/2 X 72 RELAY, SPST 30A 24VAC.TENDERS: Department Name : Items Services : Last Date for Submission: Download: Approximate Value: Department of Civil Aviation, Daman Diu (DCADD) : PROVIDING.May 3, 2018 The study was approved by the South East London Research Ethics Committee 2. confirm PA and relay the performance of OFCs that would otherwise have The gray shaded area corresponds to the negative control (ie, .288-1067 3⁄4\" OD x 1⁄2\" ID x 24\" L LOW WATER CONTROL BOARD RELAY. No. 183-1109. • For model DFW100CF. • A.J. Antunes nos. 405K125, 7000652 30518. 4. 187-1118 SPDT. Black. Hi/Low. 17857. 5. 190-1116. SPST Brown.Oct 11, 2017 2. Controls Manual. IMPORTANT INFORMATION. Safety information Carel c pCO medium control board, Valent terminal connections ExV connection A. Relay A. EVD evolution. Analog – Digital Inputs. Network 30518. Input. 2. Exhaust_Fan_Speed_Analog_Output. Exhaust Fan Speed Analog.Numato's 16 Channel Relay Controller is a smart choice for controlling higher current loads from your microcontroller development board, PC parallel.Ignition Solutions for Small Engines and Garden Pulling Tractors.Results; Final Interview Result Sheet for post of Primary School Teacher(English Medium) under Samagra Shiksha. Written Examination Result Sheet for post of Primary.Description This is a 5V 10A 2-Channel Relay interface board It can be used to control various appliances and other equipments with large current.Jun 3, 2016 Beefcake Relay Control Hookup Guide. June 2, 2016. This is a guide for assembling and basic use of the Beefcake Relay Control board.Mar 2, 2018 Numato's 8 Channel Relay Controller is a smart choice for controlling higher current loads from your microcontroller development board.From the Relay Driver setup screen (as shown in Figure 2), choose the Simple Driver such as the on-board temperature sensor or channel input voltages.", "label": "Yes"} {"text": "I tested sending of push notifications to a TV web app and was successful in sending notifications to TV emulators (ver 6.5).\nHowever, after a few sends, I started getting 3008 problem \"error of not registered regID\". I am sure the regID is right.\nI have tried several ways to fix this problem:\n(1) register every time the app open\n(2) reinstall the app\n(3) change the TV emulator\nOnly (3) was working, although it created the exact same regID, the push notifications started working again. But after some sends, I encountered the same \"3008\" problem again.", "label": "Yes"} {"text": "When I setup Foreman (Satellite) server, I didn’t have Ansible support enabled. Here is how it can be done later on.\nIf we only need Ansible support, it’s sufficient to just run this command:\n# foreman-installer \\ --enable-foreman-plugin-ansible \\ --enable-foreman-proxy-plugin-ansible\nJust a note for myself, I also need Remote Execution enabled if I want to run Ansible playbooks as Job Templates.\n# foreman-installer \\ --enable-foreman-plugin-remote-execution \\ --enable-foreman-proxy-plugin-remote-execution-ssh\nNote that the remote execution feature is enabled by default on Foreman/Satellite server. The Smart Proxy or Capsule server, on the other hand, must be specifically enabled with the above installed command.", "label": "Yes"} {"text": "Russ JC: The image processing handbook. 2nd edition. Boca Raton , CRC Press; 1995:674 p..\nMarr D: Vision : a computational investigation into the human representation and processing of visual information. San Francisco , W.H. Freeman; 1982:xvii, 397 p..\nMorel JM, Solimini S: Variational methods in image segmentation: with seven image processing experiments. In Progress in nonlinear differential equations and their applications ; v 14. Boston , Birkhauser; 1995:xvi, 245 p..\nAubert G, Kornprobst P: Mathematical problems in image processing: partial differential equations and the calculus of variations. New York , Springer; 2001:xxv, 286 p..\nDal Maso G, Tomarelli F: Variational methods for discontinuous structures: international workshop at Villa Erba (Cernobbio), Italy, July 2001. In Progress in nonlinear differential equations and their applications ; v 51. Basel ; Boston , Birkhauser; 2002:x, 185 p..\nHaar Romeny B: Scale-space theory for computer vision: 1st International Conference, Scale-Space '97, Utrecht, The Netherlands, July 2–4, 1997: proceedings. In Lecture notes in computer science ; 1252. New York , Springer; 1997:ix, 364 p..\nNielsen M: Scale-space theories in computer vision: 2nd international conference, Scale-Space'99, Corfu, Greece, September 26–27, 1999: proceedings. In Lecture notes in computer science, 1682. Berlin ; New York , Springer; 1999:xii, 532 p..\nKerckhove M: Scale-space and morphology in computer vision: 3rd International Conference, Scale-Space 2001, Vancouver, Canada, July 7–8, 2001: proceedings. In Lecture notes in computer science ; 2106. New York , Springer; 2001:xi, 434 p..\nGriffin LD, Lillholm M: Scale space methods in computer vision: 4th international conference, Scale Space 2003, Isle of Skye, UK, June 10–12, 2003: proceedings. In Lecture notes in computer science, 2695. Berlin ; New York , Springer; 2003:xiii, 816 p..\nKimmel R, Sochen N, Weickert J: Scale space and PDE methods in computer vision: 5th international conference, Scale-Space 2005, Hofgeismar, Germany, April 7–9, 2005: proceedings. In Lecture notes in computer science, 3459. Berlin , Springer; 2005:xi, 634 p..\nOsher S, Paragios N: Geometric level set methods in imaging, vision, and graphics. New York , Springer-Verlag; 2003:xxix, 513 p..\nParagios N, Chen Y, Faugeras O: Handbook of mathematical models in computer vision. New York , Springer; 2006:xxxiii, 605 p..\nRonse C, Najman L, Decencière E: Mathematical morphology: 40 years on : proceedings of the 7th International Symposium on Mathematical Morphology, April 18–20, 2005. In Computational imaging and vision ; v 30. Dordrecht , Springer; 2005:xvii, 490 p..\nSporring J: Gaussian scale-space theory. In Computational imaging and vision ; v 8. Dordrecht ; Boston , Kluwer Academic Publishers; 1997:xx, 263 p..\nWeickert J: Anisotropic diffussion in image processing. In ECMI Series. Stuttgart , Teubner-Verlag; 1998:xii, 170 p..\nWinkler G: Image analysis, random fields and Markov chain Monte Carlo methods : a mathematical introduction. In Applications of mathematics, 27. 2nd edition. Berlin ; New York , SpringerVerlag; 2003:xvi, 387 p..\nParagios N: Variational, geometric, and level set methods in computer vision: 3rd international workshop, VLSM 2005, Beijing, China, October 16, 2005: proceedings. In Lecture notes in computer science, 3752. Berlin; New York , Springer; 2005:xi, 367 p..", "label": "Yes"} {"text": "Unlike auralization methods, BRS provides an auditory display based on actual acoustical measurements of the loudspeakers and listening environment - not simulations based on a model of the loudspeakers and room. For this reason, BRS reproductions are significantly more accurate and realistic than model-based auralizations.\nBRS measurements of the loudspeakers and listening space are made with an anthropomorphically accurate binaural mannequin equipped with microphones in each ear (see top photo above). Measurements are made at every 1-2 degrees over a range of ±60 degrees by precisely rotating the mannequin's head via a stepper motor controlled by the BRS measurement computer. Each measurement is stored as a set of binaural room impulse responses (BRIR) that provide the filters through which music is convolved and sent to a calibrated pair of high quality headphones (see bottom photo above). A key feature of the BRS playback system is its ultrasonic head-tracker: it constantly monitors the position of the listener's head, sending the angular coordinates to the playback engine, which in turn switches to the corresponding set of measured BRIRs. In this way, the BRS playback preserves the natural dynamic interaural cues, used by humans to localize sound in rooms. Without these dynamic cues, headphones tend to produce sound images localized inside or near the head with front-to-back reversals being quite common. Head-tracking is therefore necessary for accurate assessment of the true spatial qualities of the audio reproduction.\nCurrent and Future Applications For BRS\nAs a research tool, BRS offers greater efficiencies and opportunities in how audio scientists research, develop and test audio products within home, professional and automotive listening spaces. BRS allows an unlimited number of acoustical variables to be manipulated, sequentially captured, and later evaluated in a highly repeatable and controlled manner. Using BRS, Harman researchers can do perceptual experiments and product evaluations that would otherwise be impractical or impossible using conventional in situ listening tests. This includes double-blind, controlled comparisons of different audio systems in different automobiles, concert halls or arenas, and home theaters.\nBRS has already been used at Harman to study how the acoustical properties of the loudspeaker and listening room interact with each other, how these interactions affect the sound quality of the music reproduction, and the extent to which listeners’ adapt to the room acoustics when listening to multichannel audio systems ,. Over the next few years, BRS will help expand our current scientific understanding of how listeners perceive sound in rooms, so that we can optimize the sound quality of loudspeakers, acoustic spaces, and room-correction devices used to tame loudspeaker-room interactions. A BRS auditory display connected over the internet to a BRS database could even allow consumers to compare and select their most preferred loudspeaker model, concert hall seat, or automotive audio system configuration, without ever leaving the privacy of their home.\nFinally, BRS brings enormous efficiencies, flexibility, and cost savings to psychoacoustic research and testing. The acoustical complexity of an automotive audio system can be captured and stored as a relatively small 10 MB file, which can then be emailed and evaluated anywhere in the world using a relatively inexpensive auditory display. The high costs associated with building expensive ITU-R listening rooms, transporting listeners, automobiles, and loudspeakers around the world for evaluation may soon be a thing of the past.\nIn the next installment, I will discuss some of the inherent errors found in all BRS systems, and how they can be removed through proper calibration. Some recent listening experiments will be described that validate the perceptual accuracy and performance of our BRS system.\n Horbach, Ulrich, Karamustafaoglu, Attila, Pellegrini, Renato, Mackensen, Philip, Theile, Günther, “Design and Applications of a Data-Based Auralization System for Surround Sound,” presented at the 106th Audio Eng. Soc. Convention, preprint 4976, (May 1999). Download here.\n Olive, Sean and Martens William L. “Interaction between Loudspeakers and Room Acoustics Influences Loudspeaker Preferences in Multichannel Audio,” presented at the 123rd Audio Eng. Soc., Convention, preprint 7196 (October 2007). Download here.\n Olive, Sean and Welti Todd, “Validation of a Binaural Car Scanning Measurement System for Subjective Evaluation of Automotive Audio Systems,” to be presented at the 36th International Audio Eng. Conference, Dearborn, Michigan, USA (June 2-4, 2009).", "label": "Yes"} {"text": "The GiBUU transport model\nJLU Giessen, Germany\na e-mail: firstname.lastname@example.org\nWe give an overview over the hadronic transport model GiBUU as a simulation tool for hadronic and electroweak reactions on nuclei over a wide energy range . The model is able to handle hadron-, photon- and lepton-induced reactions as well as nucleus nucleus collisions from sub-GeV energies up to hundreds of GeV. After a general introduction of the model, we discuss its possible application to cosmic ray air showers.\n© Owned by the authors, published by EDP Sciences, 2013\nThis is an Open Access article distributed under the terms of the Creative Commons Attribution License 2.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.", "label": "Yes"} {"text": "Technical Paper Abstract\nThe world is abuzz with talk of the next industrial revolution, Industry 4.0. Digitization, smart technologies, machine-to-machine communications, Internet of Things deployments, the list goes on, and on. All of these innovative concepts will benefit from the standardized exchange of information between all levels of an industrial system. New products will evolve over time, but existing technologies can be adapted now to leverage the massive installed base of CIP-enabled products around the world. One such technology that is gaining acceptance is OPC UA. Many vendors, end users, and industry consortia have converged on OPC UA as a vendor-neutral mechanism to exchange data. ODVA and OPC Foundation are jointly developing a CIP Companion Specification to support this data exchange.\nThis paper documents the approach taken by that joint working group to map the CIP information model to the OPC UA information model. With this mapping, applications utilizing OPC UA and its associated companion specifications can obtain data from CIP devices without the need to understand CIP. This solution will easily bring value to end users seeking to extract more data from existing installations for their evolving application needs.\nPaper and presentation from the 2022 ODVA Industry Conference & 21st Annual Meeting\nGregory Majcher, Rockwell Automation", "label": "Yes"} {"text": "Spy technology for iphone\nSpy on iPhone in just a few clicks. Extensive iPhone spy features like live call recording and even spying on instant messaging chats. You can even spy on iPhone VoIP applications and even cameras, ipad content blocker!\nThe best iPad spy apps & tips for iPhone, iPad, iPod touch and iPad 2, how to sneak phone into school.\nThe Spy-O-Matic is a spy app for the iPhone, iPad, iPod touch and iPad 2, technology iphone for spy. Its a great tool for those looking to learn more about their phone and the people that they are talking to, how to spy android phone from pc. We do not know who you are talking to, but now you can have a look. You can call this app at any moment and take a look at the phone conversations you are having, spy on unlocked iphone.\nThe first 5 minutes of your iPhone/iPad is free, but then you will pay every 30s until the phone connection is completely secured to prevent tampering and interception, spy on cell phone free apps.\nThe Spy-O-Matic is not a regular spy app, ipad content blocker. You must have been using iOS device since iPhone first came out as it is the only way to see through the iPhone's privacy features, which prevents it from being a regular spy app. You can not access the contact list, but you can spy on phone calls, instant messages, photos and documents being transferred from iDevice to iPhone, microsoft app store turn off parent control. You can also get help in cracking into your iPhone by using our free iPhone password recovery application, phone tracking spy apps.\nThe Spy-O-Matic is not like other iPhone spy apps, the best way to know who you are talking to is to use the app, whatsapp spy 2021. And the best way is a hands-on experience using \"spy on iPhone\", spy technology for iphone.\nThe iPhone/iPad/iPod touch includes many more privacy features. The phone communication cannot be accessed by anyone if the device is not connected to a Wi-Fi network or is locked. This is what makes your iPhone/iPad so safe, how to sneak phone into school1. This is the secret way to communicate with whoever you want.\nSpy on iPhone features a full database of contact photos, videos, voice messages and text messages from all of your iPhone contacts.\nThe best iPhone/iPad spy apps & tips for iPhone, iPad, iPod touch and iPad 2.\nThis app contains spy apps for: - iPhone 6, iPhone 6S, iPhone 6S Plus, iPhone 6S, iPhone SE, iPhone 7, iPhone 7 Plus, iPhone 7, iPhone 7 Plus, iPhone X, iPhone XS (3rd Gen, how to sneak phone into school2.), iPad Air 2, iPad mini 3, iPad mini 4 (3rd Gen, how to sneak phone into school2.), iPad Air 2 WiFi, iPad Air 2 WiFI, iPad (2nd Gen, how to sneak phone into school2.), iPad Air, iPad Air WiFi, iPad Air WiFI, iPad 4th\nSpy technology for cell phones\nThe case is different for Android phones. Note that there is no such technology available on the Android phones till now. You need to physically access the target device and install the spy app, so the app runs as root, how do you trace a lost phone. Here are two apps for spying on Android devices:\nCATO Spy is an app that has to be installed on your Android phone, huawei p30 pro spy phone.\nIt needs root permissions to gain permissions to your Android phone, youtube blocked contacts. It can be installed with an app store.\nTo use it, you first have to download the Spy app, call record tracker. After you start the apps, you have to grant it root permissions.\nOnce you do so, you will be provided a unique ID and password, how to install keylogger on iphone with lock.\nThen click on the scan button, how to install keylogger on iphone with lock. The app should display the unique ID and password in a list, how to spy on someones phone camera for free.\nClick on the button 'install'. After about 2-5 min, your phone will be rooted, spy apps for macbook pro.\nYou can read more about using spy app here.\n(not recommended for Android) Here's what you have to do to install spy app on Android phones:\nYou need to download the spy-android-app from the below link:\nOnce the app is installed and you start it, you will have to enter the \"Root credentials\" by pressing on the blue-coloured button, how to install keylogger on iphone with lock0. Your phone will be rooted.\nThe app scans the SIP protocol but as of now, it does not support the encryption. It is likely that this may be fixed in future versions, for spy technology phones cell.\nIn a comment on reddit, another user had stated that they have seen a spy app with SIP support running on Android devices.\nThis means that we have an option for encrypting all incoming calls.\nNote that the first option (to decrypt phone and data) is disabled on Android in Android 6, how to install keylogger on iphone with lock3.\nThe SIP client does not support the secure sockets layer version, how to install keylogger on iphone with lock4.\nYou have a few options to turn your phone and data off if you do not trust the spy app or do not want to have a spy app installed on your device:\nOpen the settings of the phone and select the option \"Security\" Select Advanced then select \"Encrypted data\" and \"Unencrypted data\" options from the list, spy technology for cell phones.\nYou can also disable your device and then click on the \"back\" button in Settings.\nWhat do you think of SIP security?\n21 мая 2021 г. — iphone spy apps are used to track people without their knowledge. Technology has made it easier to monitor individuals and be aware of what. Comparing best cell phone spying apps · #1) mspy · #2) umobix · #3) mobilespy. #4) flexispy · #5) spyera · #6). — security researchers have discovered a powerful surveillance app first designed for android devices can now target victims with iphones. Iphones are secure and hold the privacy of the users really good. Also apple does not allow any spy apps in the app store. Saved around the world thanks to nso group's technologies used by. — the problem affects all of the technology giant's operating systems, the researchers said. Apple said it issued the security update in response. The advancement of new technology makes tracking an iphone without. The simple answer is: yes. With the advanced technology, one can spy on iphone though it's turned off. National security agency has come up with advanced. Kjb dvr iphone case: this case comes with a wifi enabled camera that lets you record and stream live video. Blocking sale of us technology to nso by putting the company on the. — but, spyic doesn't follow this old-school spying technology blindly. It has paved a new, advanced, and less risky path for iphone spying. — apple users are being warned about a new update that allows iphones to spy on their owners. Alfred makes it easy to use your old smartphones and other technology to get total security of your house. From live monitoring on your current devices to using. — we've analyzed hundreds of apps and chosen top 10 iphone spy apps available today. The iphone spyware is used to track people without their knowledge. Technology makes it easier to keep track of people and know what they are doing at a. Before the emergence of new technology such as telenitrox, when it came to spying on an iphone, using a spy app was what usually came to mind. — iphone spy apps for all ios devices with remote installation without jailbreak. Advanced filtering technology; offers a free sign up. Iphone spy lets you see texts, photos, calls, website history, gps & more. Compatible with android, ios, pc and mac. Mobile spy cell phone monitoring software monitors your child or employee's smartphone activity on android-based smartphones and tablets. The nso group of providing technology to governments to spy on dozens\n— their tech team, known as the “geek squad,” can help you delete any file that belongs to spy software. In addition, you can also use the google. Download scientific diagram | cellular applications of spy technology. (a) imaging surface exposure or protein trafficking. Spycatcher linked to a. That specializes in security apps and phone monitor technology. — spy apps are surveillance software that can be used to track a target without them knowing. These apps can monitor their cell phone usage. He points out how the seemingly friendly technology that we spend. Spying on cell phones is one of the major concerns of today's users. Smartphone spying has become common in the mobile technology era. 30 мая 2018 г. — other experts said ss7 surveillance techniques are widely used worldwide, especially in less developed regions where cellular networks are less. A device called a cell-site simulator, popularly known as a. Image may contain electronics phone cell phone and mobile phone. Getty images / wired. Officials having to get a warrant to use a cellphone scanning technology. Cell phone spying nightmare: 'you're never the same'. Stingrays, also known as \"cell site simulators\" or \"imsi catchers,\" are invasive cell phone surveillance devices that mimic cell phone towers and send out. — the united arab emirates (uae), which also celebrated normalisation with israel last year, has long been in bed with israeli spying technology –. Cell phone tracking app to sneak into android devices. We bring you the best in spy gadgets, hidden nanny cameras & voice recorders. — in response to the consortium, nso denied that its technology was used against khashoggi and said the investigation contained flawed assumptions", "label": "Yes"} {"text": "INSP - 4 place Jussieu - 75252 PARIS Cedex 05 - Barre 22-32 - 4e étage, salle 407\nEmmanuelle Jal - LCPMR\nThe discovery of laser induced ultrafast magnetization dynamics by Beaurepaire et al. has stimulated an intense research activity and opened up a new field in condensed matter physics. Even after two decades of studies and debates, the mechanisms of ultrafast demagnetization remain disputed. In order to bring new experimental information into this field, and with the advent of femtosecond X-rays sources, we decided to use time resolved soft X-rays based pump/probe techniques. Indeed, contrary to IR and visible radiation, X-rays can be easily turned into an element-specific and local probe of the magnetization. First I will show results obtained by time-resolved small angle x-ray scattering on granular FePt. Then I will present results obtained by time-resolved x-ray resonant magnetic reflectivity on Ni thin films. In conclusion I will give some outlooks on questions that soft x-ray could help to solve in this field.", "label": "Yes"} {"text": "Welcome to EpoS Wizard!\nLooking for some information on a J2 580 POS system\nI am looking for anyone who might know about the magstripe reader in the J2 580 POS system.\nI have extraced one, and I am looking at interfacing it with something else, and would like to know the pinout and function. I know on the j2 580 it acts like a keyboard, I would like it to act as a keyboard on a normal computer as well.\nI don't believe it can be done. The interface board inside the J2 takes the signal input from the reader and converts that into a USB type input so it's read as a keyboard wedge.\nWhy on earth would you want to do this anyway? You can buy a USB mag card reader from eBay for about a tenner.\nI like messing around. I have one on the way. But wanted to see if I could make this one work.", "label": "Yes"} {"text": "Date of Graduation\nBachelor of Science in Electrical Engineering\nYu, Shui-Qing (Fisher)\nInfrared technology advancements have led to an expansive set of infrared applications in both the private and public sectors. New materials and manufacturing techniques have continued to reduce the cost while improving the quality of infrared cameras, but the cost is still high when compared to the cost versus quality of visible light spectrum cameras. Innovative image processing techniques can be implemented to help bridge this gap between the cost and quality of infrared cameras. The goal of this research is to improve the overall quality of infrared imaging by fusing short-mid wavelength infrared images and long wavelength images of the same background and objects. To achieve this goal, infrared camera theory as well as image fusion theory will be first introduced to provide adequate background knowledge. Then, the setup of the experiment and calibration of the two infrared cameras will be described in details. Next, the image registration and fusion procedures will be presented by Matlab software. The results of this research show that the fused images have higher quality than individual short-mid wavelength infrared images and/or long wavelength images.\nHedrick, R. (2015). Fusion of short-mid wavelength infrared image and long wavelength image using discrete wavelet transform for image quality enhancement. Electrical Engineering Undergraduate Honors Theses Retrieved from https://scholarworks.uark.edu/eleguht/34", "label": "Yes"} {"text": "Learning associations across modalities is critical for robust multimodal reasoning, especially when a modality may be missing during inference. In this paper, we study this problem in the context of audio-conditioned visual synthesis – a task that is important, for example, in occlusion reasoning. Specifically, our goal is to generate future video frames and their motion dynamics conditioned on audio and a few past frames.\nPredicting the future frames of a video is a challenging task, in part due to the underlying stochastic real-world phenomena. Prior approaches to solve this task typically estimate a latent prior characterizing this stochasticity, however do not account for the predictive uncertainty of the (deep learning) model. Such approaches often derive the training signal from the mean-squared error (MSE) between the generated frame and the ground truth, which can lead to sub-optimal training, especially when the predictive uncertainty is high.", "label": "Yes"} {"text": "It could also dramatically lighten the load for people who can't connect to a power grid, including soldiers who now must carry many pounds of batteries for a three-day mission -- all at a reasonable price.\nThe researchers say that in the long term, mass-production could bring the per-unit cost of power from microengines close to that for power from today's large gas-turbine power plants.\nMaking things tiny is all the rage. The field -- called microelectromechanical systems, or MEMS -- grew out of the computer industry's stunning success in developing and using micro technologies. \"Forty years ago, a computer filled up a whole building,\" said Professor Alan Epstein of the Department of Aeronautics and Astronautics. \"Now we all have microcomputers on our desks and inside our thermostats and our watches.\"\nWhile others are making miniature devices ranging from biological sensors to chemical processors, Epstein and a team of 20 faculty, staff and students are looking to make power -- personal power. \"Big gas-turbine engines can power a city, but a little one could 'power' a person,\" said Epstein, whose colleagues are spread among MIT's Gas Turbine Laboratory, Microsystems Technology Laboratories, and Laboratory for Electromagnetic and Electronic Systems.\nHow can one make a tiny fuel-burning engine? An engine needs a compressor, a combustion chamber, a spinning turbine and so on. Making millimeter-scale versions of those components from welded and riveted pieces of metal isn't feasible. So, like computer-chip makers, the MIT researchers turned to etched silicon wafers.\nTheir microengine is made of six silicon wafers, piled up like pancakes and bonded together. Each wafer is a single crystal with its atoms perfectly aligned, so it is extremely strong. To achieve the necessary components, the wafers are individually prepared using an advanced etching process to eat away selected material. When the wafers are piled up, the surfaces and the spaces in between produce the needed features and functions.\nMaking microengines one at a time would be prohibitively expensive, so the researchers again followed the lead of computer-chip makers. They make 60 to 100 components on a large wafer that they then (very carefully) cut apart into single units.\nThe MIT team has now used this process to make all the components needed for their engine, and each part works. Inside a tiny combustion chamber, fuel and air quickly mix and burn at the melting point of steel. Turbine blades, made of low-defect, high-strength microfabricated materials, spin at 20,000 revolutions per second -- 100 times faster than those in jet engines. A mini-generator produces 10 watts of power. A little compressor raises the pressure of air in preparation for combustion. And cooling (always a challenge in hot microdevices) appears manageable by sending the compression air around the outside of the combustor.\n\"So all the parts workS. We're now trying to get them all to work on the same day on the same lab bench,\" Epstein said. Ultimately, of course, hot gases from the combustion chamber need to turn the turbine blades, which must then power the generator, and so on. \"That turns out to be a hard thing to do,\" he said. Their goal is to have it done by the end of this year.\nPredicting how quickly they can move ahead is itself a bit of a challenge. If the bonding process is done well, each microengine is a monolithic piece of silicon, atomically perfect and inseparable. As a result, even a tiny mistake in a single component will necessitate starting from scratch. And if one component needs changing -- say, the compressor should be a micron smaller -- the microfabrication team will have to rethink the entire design process.\nFor all the difficulties, Epstein said the project is \"an astonishing amount of fun\" -- and MIT is the ideal place for it. \"Within 300 feet of my office, I could find the world's experts on each of the technologies needed to make the complete system,\" he said.\nIn addition, the project provides an excellent opportunity for teaching. \"No matter what your specialty is -- combustion or bearings or microfabrication -- it's equally hard,\" he said. \"As an educational tool, it's enormously useful because the students realize that their success is dependent upon other people's success. They can't make their part easier by making somebody else's part harder, because then as a team we don't succeed.\"\nThis research was funded by the U.S. Army Research Laboratory.\nElizabeth A. Thomson | MIT News Office\nSupersonic waves may help electronics beat the heat\n18.05.2018 | DOE/Oak Ridge National Laboratory\nResearchers control the properties of graphene transistors using pressure\n17.05.2018 | Columbia University\nAt the LASYS 2018, from June 5th to 7th, the Laser Zentrum Hannover e.V. (LZH) will be showcasing processes for the laser material processing of tomorrow in hall 4 at stand 4E75. With blown bomb shells the LZH will present first results of a research project on civil security.\nAt this year's LASYS, the LZH will exhibit light-based processes such as cutting, welding, ablation and structuring as well as additive manufacturing for...\nThere are videos on the internet that can make one marvel at technology. For example, a smartphone is casually bent around the arm or a thin-film display is rolled in all directions and with almost every diameter. From the user's point of view, this looks fantastic. From a professional point of view, however, the question arises: Is that already possible?\nAt Display Week 2018, scientists from the Fraunhofer Institute for Applied Polymer Research IAP will be demonstrating today’s technological possibilities and...\nSo-called quantum many-body scars allow quantum systems to stay out of equilibrium much longer, explaining experiment | Study published in Nature Physics\nRecently, researchers from Harvard and MIT succeeded in trapping a record 53 atoms and individually controlling their quantum state, realizing what is called a...\nThe historic first detection of gravitational waves from colliding black holes far outside our galaxy opened a new window to understanding the universe. A...\nA team led by Austrian experimental physicist Rainer Blatt has succeeded in characterizing the quantum entanglement of two spatially separated atoms by observing their light emission. This fundamental demonstration could lead to the development of highly sensitive optical gradiometers for the precise measurement of the gravitational field or the earth's magnetic field.\nThe age of quantum technology has long been heralded. Decades of research into the quantum world have led to the development of methods that make it possible...\n02.05.2018 | Event News\n13.04.2018 | Event News\n12.04.2018 | Event News\n22.05.2018 | Life Sciences\n22.05.2018 | Earth Sciences\n22.05.2018 | Trade Fair News", "label": "Yes"} {"text": "Infographic: Critical communication at the crossroads\nMoving beyond traditional PMR / LMR\nHow can critical communication systems best take advantage of modern mobile broadband standards like LTE?\nConformity to the MCPTT standard is one essential aspect to consider, the challenging spectrum allocation another. This infographic takes a glimpse at the PMR / LMR ecosystem and presents a way how broadband technology could be integrated even into established networks without the need to replace the entire existing infrastructure.", "label": "Yes"} {"text": "Prototype Nearly Finished\nYey!, my prototype is nearly finished with the exception of auto temp starting!, well in the shed anyway. Not actually tested it with film yet.\nIt may look a bit of a mess, but the logic is that once it’s refined, I’ll think of a better housing etc. At this point, I can easily move wires, adjust kit and reprogram without any hassle or dismantling.\nSo a quick tour!\nOk, first the temp modules are fitted at the top for easy visual reference. I havent labelled them yet but the idea is you just plonk the sensors in the chemicals or water bath and they read the temps. I havent linked the two arduinos yet to trigger an ‘auto start’ system but will do in the near future.\nNext, the two main displays that will show instructions, and the main development timer for visual reference when the machine is running.\nI’ve then mounted the arduino at the side for each USB access for reprogramming if needed. Note I’ve hot glued the wires down when I was 100% sure I was happy where they are. Just as they can easily pop out when kit is moved.\nI’ve then wired the dev tank up, which connects via a removeable 12v DC lead. The tank will sit in the waterbath, with the top electrics and lid well-above the water line.\nThe panel, although scruffy looking serves the basic purpose and the light up buttons work well.\nThe blue light lights on agitation as well.", "label": "Yes"} {"text": "As we are not still able to make it work, I have few questions.\nAbout the wiring, we are not sure about DEN signal - we have connected it to the EMX LCD_EN - is it correct? DISP signal should be just on/off so it is just 1 - display is really on so I presume there is no problem.\nAccording to a datasheet I set the following LCD configuration via FEZ config:\n@ Marten - The display you are using is one of the ones that our recently announced Display NHVN supports. You can always compare its schematic with your board to see if the pins are connected correctly. The timings you listed are correct.\nThank you guys for hints. The problem was the we have connected pin no. 35 to the logical 1 and it should really stayed NOT CONNECTED as it’s in the pin description documentation. Now it’s working like a charm.", "label": "Yes"} {"text": "Why do we need so many blockchains?\n- blockchain All Things Web3\nNew blockchains are launching constantly. It is hard to follow everything that is happening in Web3 space.\nDo we really need that many blockchains? How do you see the future of landscape of blockchains?\nI think this is an interesting topic. I expect number of new blockchains without a real break-through innovation to continue growing until real adoption of the blockchain technology happens in the world. New blockchain will have to be 10x better than widely adopted once to get a real interest. Currently we are in the stage of active innovation and experimentation with the technology.", "label": "Yes"} {"text": "The Laser Revolutionized the Manufacturing Industry Optical components that support the laser processing technology at its core\nThe term laser is an acronym for light amplification by stimulated emission of radiation. A laser beam is an intense artificial light obtained by converting electrical energy into light energy and amplifying it. The energy density of the laser beam is about one million times that of light in the natural world. In 1960 in the United States, the world’s first laser oscillation was achieved. Since then, laser performance has improved phenomenally and various laser oscillators and applications have been developed. The features of lasers include monochromaticity, high directivity, light convergence and high energy density. Utilizing these features in the 1980s, laser began to be introduced in the field of materials processing. Lasers enable noncontact, flexible and fast machining (e.g. cutting, welding and drilling). They first penetrated manufacturing worksites in the steel and automotive sectors. Since the 1990s, being recognized as an essential technology, practical use of lasers has advanced in the manufacturing of electronic components for cellular phones and digital home appliances, such as liquid crystal displays and semiconductors, as well as in circuit patterning and other micromachining and the manufacturing of components for 3D printers.\nThe key components used to exploit the full potential of a laser cutting machine are optical components that include the lenses through which the laser beams converge and mirrors that reflect the beams. The Sumitomo Electric Group developed zinc- selenide (ZnSe) lenses for CO2 laser cutters in 1985. Since then, Sumitomo Electric has provided diverse types of optical components to meet market needs. The laser is one of the greatest inventions of the 20th century and is said to play a leading role behind the scenes in modern society. In what follows, we explore the Sumitomo Electric Group's history and future in the development of optical components for laser processing.", "label": "Yes"} {"text": "Spanish researchers have carried out a preliminary study using an electronic tongue based on potential multistep pulse voltammetry, in combination with multivariate statistical techniques to detect and quantify sugar syrup in honey. Pure monofloral honey (heather, orange blossom and sunflower), sugar syrup (derived from rice, barley and maize), and samples simulating adulterated honey with different percentages of syrup (2.5, 5, 10, 20 and 40) were evaluated. An automatic, electrochemical system for cleaning and polishing the electronic tongue sensors (Ir, Rh, Pt, Au) significantly improved the repeatability and accuracy of the measurements. PCA analysis showed that the proposed methodology is able to distinguish between types of pure honey and syrup, and their different levels of adulterants. A subsequent PLS analysis successfully predicted the level of the adulterants in each honey, achieving good correlations considering the adjusting parameters. The measurement system here proposed has the potential to be a quick and effective option for the honey packaging sector. However, much further work is needed to see how effective this technique is with a wider range of monofloral honey, blended honey and commercial sugar syrups.\nRead the abstract at: electronic tongue and honey adulteration", "label": "Yes"} {"text": "Necuno / KDE to collaborate!\nNecuno Mobile is a truly open source / secure mobile hardware platform running Linux.\nPlasma is a free & open source graphical user interface developed by KDE. Their Plasma Mobile platform is an effort to bring the Plasma graphical user interface to mobile devices.\nPlasma Mobile and Necuno Solutions are a perfect match with shared values.\nInteresting mobile Linux times ahead.\n@Linux >WiFi (via SDIO)\nWouldn't that be limited by the bandwidth of the SD spec, or am I missing something? #notmyspecialty\nLinux Geeks doing what Linux Geeks do..", "label": "Yes"} {"text": "There is no doubt that the quantum computer and the quantum internet have many profound applications, they may change the way we think about information, and they could completely change our daily life.\nBut how do a quantum computer and a quantum internet work? What scientific principles are behind it? What kind of software and protocols do we need for that? How can we operate a quantum computer and a quantum internet? And which disciplines of science and engineering are needed to develop a fully working system?\nThis course will be divided into two parts. In the first part, you will get an insight into and an overview of the first layer of the quantum computer and the quantum internet: the qubits. In the second part of this course, which will be live early September 2018, we will continue and introduce the other elements needed to build a quantum computer and a quantum internet.", "label": "Yes"} {"text": "Cision PR Newswire\nTrinaTracker secures order for 108MW smart solar tracking system in Colombia\nNews provided byTrinaTracker\nSep 18, 2023, 10:00 PM ET\nCALDAS, Colombia, Sept. 18, 2023 /PRNewswire/ -- TrinaTracker, the leading smart solar tracking solutions provider which is part of Trina Solar Co Ltd (SHA: 688599), has signed a solar tracker supply agreement with Power Construction Corporation of China (POWERCHINA), to supply the Tepuy Solar PV Park in Colombia with 108MW of smart tracking systems, including TrinaTracker's pioneering Vanguard 1P trackers, smart algorithms and Trina Smart Cloud platforms.\nThe Tepuy Solar PV Park is in the province of Antioquia province, northwestern Colombia. It is developed by Medellin Electric Power Company, the largest power generation company in the country. POWERCHINA undertakes EPC that includes the design, supply, construction, installation and commissioning of the PV power station. TrinaTracker is the exclusive supplier for the project.\nTrinaTracker's Vanguard 1P trackers are designed for large solar power plants on flat terrain. The design requires fewer driving systems and controllers per megawatt, thus reducing material costs and saving on labor hours during project installation. Fewer pile foundations make the product a better match for cleaning robots, and bi-damper systems reduce the chance of trackers being damaged in high winds.\nTrinaTracker's smart tracking system is integrated with the tracker structure + algorithm + platform, and it includes tracker control unit, SuperTrack, and Trina Smart Cloud monitoring platform. The system can increase power generation up to 8% compared with that of conventional solar tracking systems. It also provides better monitoring functions of trackers during system operation, thus reducing client operational and maintenance costs, and decreasing losses of power generation.\nLatin America is one of the most important markets for solar trackers, and Colombia, one of the largest economies in the region, has huge potential for the development of photovoltaic power generation. The international consulting company S&P Global says more than 80% of ground photovoltaic sites in Latin America use solar trackers, with market penetration significantly higher than the 45% global average.\nTrinaTracker's collaboration in the Tepuy project augurs well for more growth in the Latin American market. By introducing the most advanced smart solar tracking technology to the region and providing comprehensive system design, delivery and after-sales service, TrinaTracker will continue to drive the development of photovoltaic projects in Latin America, adding more much-needed green energy to the region.\nNOTE: This content is not written by or endorsed by \"WKRN\", its advertisers, or Nexstar Media Inc.", "label": "Yes"} {"text": "1. How does the warning led display warn?\nWhat is a highway warning led display? The highway warning display screen refers to the road maintenance accidents or special emergencies that need to be arranged in front of the vehicle. The warning display screen.\nWhen the road surface needs to be maintained and the speed of the vehicle is fast, arrange the display of the direction of the vehicle to show that the front maintenance is safe, and is equipped with a voice control system. .\n2. How big is the horn of the warning led display?\nThe warning led display must be brought, and the sound is called the warning display, so how loud is his voice? The driver can hear at what distance. First of all, this decibel must be more than 80 decibels. The sound is relatively loud. Then it is best to display it with dual control codes, which means that two speakers are needed to emit sound at the same time. , This effect will be much better.\n3. How does the horn of the warning led display screen supply power?\nThe loudspeaker of the warning display screen consumes a lot of power because the decibel is too large. In this case, a large battery must be used to supply power. This battery is usually placed fully charged, that is to say it does not It can be used for a long time, only under certain circumstances. The battery needs to be equipped with a battery box to prevent the rain from forming a short circuit on the battery and causing damage to the battery’s life.\n4. What is the LED display module of the warning display?\nBecause the early warning system cannot take power, it can only be powered by a battery. In the case of battery power, the current needs to be adjusted to the minimum power, but the current is the smallest, but the brightness must not be very low. Can only choose ultra-high brightness LED, and then coupled with power-saving mode to drive, which requires the manufacturer to have a certain production technology.\nIn addition to highway warning screens, We also produces other traffic lights:\n1. intersection traffic lights\n2. integrated traffic lights\n3. mobile traffic lights\n4. solar traffic lights, etc.\nIf you are interested in our product,Please fell free to contact with us\nPost time: Jun-05-2020", "label": "Yes"} {"text": "Despite the proliferation of deep learning techniques for accelerated MRI acquisition and enhanced image reconstruction, the construction of large and diverse MRI datasets continues to pose a barrier to effective clinical translation of these technologies. One major challenge is in collecting the MRI raw data (required for image reconstruction) from clinical scanning, as only magnitude images are typically saved and used for clinical assessment and diagnosis. The image phase and multi-channel RF coil information are not retained when magnitude-only images are saved in clinical imaging archives. Additionally, preprocessing used for data in clinical imaging can lead to biased results. While several groups have begun concerted efforts to collect large amounts of MRI raw data, current databases are limited in the diversity of anatomy, pathology, annotations, and acquisition types they contain. To address this, we present a method for synthesizing realistic MR data from magnitude-only data, allowing for the use of diverse data from clinical imaging archives in advanced MRI reconstruction development. Our method uses a conditional GAN-based framework to generate synthetic phase images from input magnitude images. We then applied ESPIRiT to derive RF coil sensitivity maps from fully sampled real data to generate multi-coil data. The synthetic data generation method was evaluated by comparing image reconstruction results from training Variational Networks either with real data or synthetic data. We demonstrate that the Variational Network trained on synthetic MRI data from our method, consisting of GAN-derived synthetic phase and multi-coil information, outperformed Variational Networks trained on data with synthetic phase generated using current state-of-the-art methods. Additionally, we demonstrate that the Variational Networks trained with synthetic k-space data from our method perform comparably to image reconstruction networks trained on undersampled real k-space data.\nKeywords: GANs; MRI reconstruction; deep generative models; deep learning; generative adversarial network; synthetic data; synthetic multi-coil data; synthetic phase; unrolled networks.", "label": "Yes"} {"text": "With the RevPiModIODriver class, the python3-revpimodio module can be used to simply write a driver for the virtual devices on the RevPi.\nThe actual programming of the controller may be for example logiCAD. If you need other data from other sources, you use “Virtual Devices”. These are treated just like real hardware from logiCAD.\nIn our example, we collect data from RevolutionPi and write it into virtual devices. This is the system time in UTC, the percentage of disk space, and the CPU temperature.\nOf course, it is also possible to write data with logiCAD and then evaluate it with the Python program.\nWe create a virtual device, which receives position number 64.\nIn the Python program, the class is instantiated: (For RevPiModIODriver, all functions and classes are available just like RevPiModIO.)\nself.rpi = revpimodio.RevPiModIODriver()\nNext, only a few bytes have to be connected to data fields. For the timestamp, e.g. 4 bytes in which we store an int () value. (Note: For our Python program, the outputs are the inputs from the point of view of logiCad – and vice versa! We are the driver – and the hardware: D)\nself.rpi.devices.reg_out(\"timestamp\", \"Input_1_i09\", \"L\")\nWe use the struct library of Python to determine the data type and the byte length – “L” stands for 4 bytes int () without sign\nAs a last step, we only need to write a value that we create cyclically with the Python program in to our new output “timestamp”:\nself.rpi.devices[\"timestamp\"].value = int(time.time())\nWhen the program is running, the timestamp (in our case) is available as little-endian (Input_1_i09 – Input_4_i09):\nOr,with the right datatype in logiCAD:", "label": "Yes"} {"text": "Just bought a log home built in 1980. Doing some remodeling /updating. Almost all the junction boxes have 3M Scotchlok in them. Sometimes they are referred to as \"vampire connectors.\"\nAre these connectors up to code? I'm thinking of taking them all out and using the standard twist wire connectors.\nThe connectors are sized properly. For example, the kitchen outlets are on a 20 amp circuit with 12 gauge wire. The Scotchlok connector model used is 562. Looking on the connector it says \"10-12 GA\". Looking online I found the product sheet and it is UL 486C compliant as well (not sure that meets the NEC code for wiring a home).\nI'm used to seeing these used in car audio stuff... Not in the home. And they usually end up having problems... Like not making a good connection, or failing altogether.", "label": "Yes"} {"text": "The measurement of temperature in the middle atmosphere with Rayleigh-scatter lidars is an important technique for assessing atmospheric change. Current retrieval schemes for this temperature have several shortcomings, which can be overcome by using an optimal estimation method (OEM). Forward models are presented that completely characterize the measurement and allow the simultaneous retrieval of temperature, dead time, and background. The method allows a full uncertainty budget to be obtained on a per profile basis that includes, in addition to the statistical uncertainties, the smoothing error and uncertainties due to Rayleigh extinction, ozone absorption, lidar constant, nonlinearity in the counting system, variation of the Rayleigh-scatter cross section with altitude, pressure, acceleration due to gravity, and the variation of mean molecular mass with altitude. The vertical resolution of the temperature profile is found at each height, and a quantitative determination is made of the maximum height to which the retrieval is valid. A single temperature profile can be retrieved from measurements with multiple channels that cover different height ranges, vertical resolutions, and even different detection methods. The OEM employed is shown to give robust estimates of temperature, which are consistent with previous methods, while requiring minimal computational time. This demonstrated success of lidar temperature retrievals using an OEM opens new possibilities in atmospheric science for measurement integration between active and passive remote sensing instruments.\n© 2015 Optical Society of America\nAccurate determination of temperature change is of great importance in atmospheric science. To assess change requires that measurements be fully characterized for random and systematic uncertainties, as these changes can be less than 0.5% of the mean temperature and occur over decadal periods. One of the most important techniques for obtaining temperature in the middle atmosphere uses backscatter measurements obtained from Rayleigh-scatter lidars. This study introduces a methodology that allows, for the first time, complete characterization of Rayleigh-scatter lidar temperature retrievals to be determined on a profile-by-profile basis.\nTemperature retrieval from Rayleigh-scatter lidar measurements is a well-established technique in weather and climate studies of the middle atmosphere, both from the surface [1,2] and from space . To summarize, a Rayleigh-scatter lidar (hence, lidar; other types of lidar will be described if required) is typically monostatic, meaning the laser and telescope are colocated so the lidar measures return photocounts, which are directly backscattered into the telescope. The entire atmosphere can be assumed to obey the ideal gas law, and, above approximately 25 to 30 km altitude, the atmosphere is sufficiently optically thin to visible radiation that its transmission with height is essentially constant. Hence, the return photocounts are directly proportional to the atmospheric density. Hauchecorne and Chanin recognized that, if one assumes hydrostatic equilibrium (HSEQ), the photocount profile can then be integrated to obtain a temperature profile, provided a pressure is assumed at the top of the atmosphere to “seed” the integration. The method of Hauchecorne and Chanin (hereafter, the HC method) or a variation thereof is used by systems which measure Rayleigh scattering height profiles to retrieve temperatures.\nAt about the time that the HC method was developed, atmospheric scientists began applying, in particular with space-based passive measurements, inverse methods to retrieve profiles of composition and temperature. With these methods, a forward model has been developed, which captures all relevant physical and instrumental properties of the measurement. The forward model is then inverted to allow certain model parameters, which are unknown to be estimated within a space of states defined based on prior knowledge. One of the most robust and popular of the inversion methods is the optimal estimation method (OEM), which is explained in detail by Rodgers . The OEM appeals to Bayes’ theorem, which yields the most likely state and which, under the assumption of Gaussian errors, is most consistent with the measurement and prior knowledge. A cost function is computed, and the state parameters vary until minimum cost is achieved. While OEM has become a standard tool in atmospheric remote sensing using passive detectors, it has seldom been utilized for lidar measurements.\nKhanna et al. [henceforth, the grid search (GS) method] applied an inversion approach to the retrieval of temperature from lidar measurements. Their method has several advantages over the HC method, including the ability to integrate the temperature profile from the bottom instead of the top and relaxing the assumption of constant temperature between atmospheric layers. However, their method still relies on the assumption of HSEQ, and the only uncertainties considered are statistical and those due to the assumed seed pressure.\nRecently, Povey et al. applied an OEM to lidar retrievals of tropospheric aerosols. Their paper gives an excellent overview of basic formalisms of the OEM technique. They show results consistent with traditional analysis techniques as well as improvements in the determination of uncertainties. In this paper, we apply the OEM to the retrieval of temperatures from lidar measurements, which allows complete inventory of the systematic uncertainties associated with the temperature retrieval to be computed on a profile to profile basis. The temperature can be retrieved with or without requiring the assumption of HSEQ. The method quantitatively determines both the vertical resolution of the retrieval as a function of height and maximum height to which the retrieved profile is independent of the a priori temperature profile, eliminating the need to arbitrarily cut off the top of a temperature profile due to choice of seed pressure.\n2. Temperature Retrieval Using Rayleigh-Scatter Lidar Measurements\nIn this section, the basic assumptions and corrections required to retrieve temperatures from lidar backscatter profiles are discussed.\nA. Lidar Equation\nAll retrieval methods for temperatures from Rayleigh-scatter lidars use the same form of the lidar equation to equate the measured photocount profiles to number density. This method is generally considered to be valid down to altitudes above the stratospheric aerosol layer, nominally 25 km. The top height of the retrieval is principally limited by the power-aperture product of the lidar system. The lidar equation in this region can be written in the following compact form:\n- 1. Efficiency of the system, accounting for detector efficiency and nonlinearities as well as losses in the optics.\n- 2. Atmospheric transmission, assumed constant in the height range of the retrievals.\n- 3. Number of transmitted photons.\n- 4. Rayleigh scatter cross section, which becomes height dependent in the upper mesosphere.\n- 5. Area of receiving telescope.\nB. Using the OEM to Determine the Dead-Time Correction\nAt high count rates, the lidar detector response becomes nonlinear. The nonlinearity is commonly modelled by the following equation, which relates the observed count rate, , to the true count rate:8,9]. The dead time is determined by comparing two lidar signals in an altitude region, where one signal is linear while the other is not. The two signals can be an analog and a photon count signal or two photon count signals with different attenuations (high and low range). It will be shown that, for a suitable measurement configuration, the OEM method can derive the system dead time using Eq. (2).\nC. Equation of State\nAll three methods use the same equation of state for the atmospheric gas, the ideal gas law. The ideal gas law allows the number density in the lidar equation to be related to temperature and pressure. The number density of the atmospheric gas, even at the surface, is sufficiently small enough for the gas to be considered ideal.\nD. Hydrostatic Equilibrium\nHydrostatic equilibrium (HSEQ) is the balance of the upward pressure gradient force with the downward force of gravity on the gas:10,11].\nE. Effect of Absorption by Ozone and Air\nFor temperature retrieval in the upper stratosphere and above, it is reasonable to assume that the atmospheric transmission is constant. Between 25 and 35 km, there are small effects due to absorption of ozone and, to a lesser extent, air. Ozone absorption in the Chappuis band can cause on the order of 0.5 K changes in temperature below 35 km . In this study, the ozone model of McPeters et al. is used for the ozone density, and the cross section is from Griggs . Operationally, using the best ozone profile available would be recommended (for instance, using colocated ozone lidar or microwave radiometer, ozonesonde, or a model).\nThe Rayleigh extinction is calculated using the cross section, as given by Nicolet , which, along with the a priori density profile, is used to calculate the extinction. For a Rayleigh-scatter lidar transmitting at 532 nm, the uncertainty introduced by using the a priori density is less than 0.05 K. If desired, the measured lidar density could be used for the correction.\nF. Lidar Instrument Function\nThe variation of the lidar instrument function with height is small enough that it is often assumed constant, particularly for measurements in the upper stratosphere and lower mesosphere, the retrieval range of many systems. Assuming the atmospheric transmission is constant above 35 km, this assumption is reasonable. Below this height, there is a small change in transmission due to ozone and air. Above 80 km, the mean molecular mass and, hence, the Rayleigh-scatter cross section begin varying with height due to an increase in the relative amount of atomic oxygen, and these variations can affect Rayleigh-scatter temperature retrievals .\nThe form of the instrument function used in the OEM retrievals is\nHere, is the lidar constant, which includes the efficiency of the system, the number of transmitted photons, and the area of the receiving telescope; , the Rayleigh-scatter cross section; , the ozone optical depth at the wavelength of the transmitter; and, , the optical depth due to Rayleigh extinction. The ozone absorption is found from the ozone density, , and cross section, :\nThe lidar constant is the constant of proportionality between the measured photocounts and number density. The corrected photocounts are normalized in the clear signal region, here defined as a region of the count profile where the photomultipliers are linear and the signal-to-noise ratio is high (e.g., 55 to 60 km). The total number of counts in the clear signal region is then normalized to the integrated CIRA-86 number density .\nThe Rayleigh-scatter cross section is assumed constant below 80 km. Above 80 km, the cross-section value is calculated using the cross sections for , , and given by Argall , while the ratio of each species with respect to the total number density is taken from the US Standard Atmosphere . This variation of the cross section with height becomes significant in the upper mesosphere and above. The systematic uncertainties introduced in the retrieval by this form of the instrument function will be discussed in the next section.\n3. Current Lidar Temperature Retrieval Methods\nMost Rayleigh-scatter temperature retrievals use a variation of the HC method. In this section, we review that method, the inversion approach of the GS method, and introduce the OEM applied to the temperature retrieval problem.\nA. HC Method\nThe HC method employs numerical integration of the lidar equation, using the ideal gas law and the assumption of HSEQ to relate the retrieved photocounts to temperature. The integration requires the assumption that, within each retrieval layer, the temperature must be constant. The numerics are robust and, even when applied to measurements with extremely low signal-to-noise ratio, can retrieve reasonable temperature estimates. Statistical uncertainties due to the Poisson noise associated with the photocount measurements are fully treated. The method does not address systematic uncertainties. The intrinsic systematic uncertainty associated with this method is related to the integral, which correlates the pressure at the seeding altitude with the retrieved pressure at every height below. Hauchecorne and Chanin showed that this uncertainty decreases proportionally to the density at the top height to the density at the each height below. Thus, in practice, when using the HC retrieval, the top 10 to 15 km (on the order of two scale heights) of the temperature profile should be discarded if the seeding pressure is uncertain, which is typically the case if it is chosen from an atmospheric model. Examples of this convergence with decreasing altitude are shown in Khanna et al. .\nOther systematic uncertainties include uncertainties in the correction of the photocount profiles at both high signal rates (pulse pile up) and low signal rates (background correction), changes in atmospheric transmission due to Rayleigh and ozone extinction, variations in the mean molecular mass with altitude, uncertainties in the determination of the pressure, lidar constant, and the height dependence of the acceleration due to gravity. Traditionally researchers have attempted to correct their photocount profiles for some of these effects. For example, simultaneous measurements of vibrational Raman scattering can be used to correct for aerosols [18,19]. Keckhut et al. give a detailed discussion and estimation of systematic uncertainties due to pulse pile up, background, geometric effects, and aerosols. These and other lidar groups have made careful measurements and estimates of various systematic uncertainties, primarily those due to aerosols and the photomultipliers (including their associated counting electronics).\nB. GS Method\nThe GS method was the first attempt to use a statistical inversion approach to retrieve temperature. A grid search method was used to find a photocount profile that minimized the cost function relative to the measured profile, though the cost function used did not include a regularization term and, thus, was not sensitive to departures of the solution from the a priori state. The forward model equation used was\nThis forward model assumes HSEQ. The retrieved photocount profile can then be integrated in a manner similar to the HC method with two important differences. First, the temperature within a layer can vary with altitude. Second, the profile can be integrated from the bottom to the top of the retrieval grid, which has the advantage of minimizing seed pressure effects at all heights, thus, greatly reducing the seed pressure uncertainty at the greatest heights. Khanna et al. showed that the systematic uncertainty associated with this integration from the bottom allowed the entire retrieval grid to be used without having to discard the top of the profile.\nThe GS method does not calculate the uncertainties of the retrieved model parameters. The statistical uncertainty is found by a Monte Carlo simulation. Khanna et al. showed that the statistical uncertainties found in this manner are fully consistent with the HC method; however, the computational time for the Monte Carlo simulation is long compared to the HC method.\n4. Application of the OEM to Rayleigh-Scatter Lidar\nWhile the OEM is well known in the atmospheric satellite and passive optical measurement community, it may not be familiar to the lidar specialist. Here, the specific application of OEM to Rayleigh-lidar temperature retrieval is discussed.\nThe OEM offers significant advantages over the HC and GS methods:\n- 1. Forward model does not require the assumption of HSEQ.\n- 2. Allows direct determination of photomultiplier dead time to be found using the full nonlinear correction equation for a paralyzable system.\n- 3. Allows physically and mathematically justified determination of the top of the retrieved profile.\n- 4. Full uncertainty budget can be retrieved, including all systematic and statistical uncertainties on a profile by profile basis.\n- 5. No post- or pre-filtering of the retrieval is required, and the height resolution of the retrieved temperature profile is the FWHM of the averaging kernels, which are computed at each height.\n- 6. Detector and sky background (either constant or height dependent) are retrieved along with temperature.\n- 7. Can be applied at any required height or time resolution, e.g., nightly averaged profiles that are co-added in height or individual profiles at high temporal-spatial resolution.\n- 8. Method is extremely fast computationally.\nThese advantages will be explored in detail in the following sections.\nB. Brief Description of the OEM\nTo apply the OEM, a forward model is required. The forward model contains all the physical and instrumental factors, which together describe the measurements. The general form of the forward model is\nFinding the retrieved state from the measurements is made possible by Bayes’ theorem, which is the basis for the manipulation of conditional probabilities. In this case, the a priori state, , consists of a temperature profile, background, and, for the two-channel case, dead time. A probability is assigned reflecting the certainty of this state. There is also a measurement and its associated variance. Bayes’ theorem allows the most likely state to be found consistent with the a priori knowledge, the performed measurement, and the associated uncertainties.\nThe optimum estimate for the retrieved state is found by minimizing a cost function formed from the measurement, , and its covariance, , the forward model, the retrieved state model parameters, and the a priori covariance, , using Bayes’ theorem:\nThe uncertainty budget is determined from the measurement, smoothing, and model parameter covariance matrices . The retrieval’s covariance due to measurement noise, , is\nC. Forward Models for Rayleigh-Scatter Temperature Retrieval\nAfter extensive experimentation, two forward models were chosen for further study. In both models, the retrieved parameters are temperature, dead time, and background (which includes photomultipler shot noise and sky background and, for some systems, depends on height). If only a single channel is available, dead time cannot be retrieved, but dead time is then treated as a forward model parameter.\nThe lidar equation (LE) model is based solely on the lidar equation, with the number density replaced by pressure and temperature via the ideal gas law. For a linear system, the low-gain digital or analog Rayleigh [low-level Rayleigh (LLR)] channel forward model is2):\nUnlike the GS method, the LE forward model has a height-dependent instrument function . The model parameters here are the instrument function, the dead time, and a pressure profile. It is not possible for the instrument function and pressure to be included with temperature and background as retrieval parameters, as the Jacobians for the instrument function would not be linearly independent. The LE model does not assume HSEQ; thus, the pressure profile must be specified at all points on the retrieval grid.\nThe second forward model is the OEM analog of the HC method, where HSEQ is assumed and combined with the lidar equation to give a forward model similar to that given for the GS method:\nThe advantage of the HSEQ forward model is that pressure only needs to be known at a single point to define a pressure profile at all points. However, two additional forward model parameters are now required: the mean molecular mass and the acceleration due to gravity. Given that the HSEQ forward model and the HC method contain similar physical assumptions, temperature retrieved from the same measurements should be similar. This assertion is shown to be true in Section 5.\nD. Implementation of the OEM\nFor pilot studies of the effectiveness of retrieving various combinations of parameters, forward models, and uncertainties, a linear OEM retrieval was written and tested on synthetic lidar measurements with and without noise, as described in . Results from the pilot study will not be shown, but, for reasonable perturbations (including adding realistic atmospheric waves) and a priori states, a robust temperature retrieval was obtained, giving confidence in the method and forward models used. Parameters that could (and could not) be retrieved were also investigated, and the best combination for use with a single data channel is to retrieve the temperature and instrumental background, leaving all other quantities as forward model parameters (e.g., pressure, instrument function, gravity).\nThis study uses the Qpack software package developed by Eriksson et al. . Qpack is a free MATLAB package designed for general OEM solutions. Qpack is part of the radiometer and microwave community ARTS model , which has been well tested for both ground-based and satellite retrieval. Qpack is used with the Marquardt–Levenberg method, which is also used because it is a nonlinear method and is often able to retrieve parameters even when the a priori is considerably far from the true solution, e.g., the US Standard Atmosphere temperature profile compared to an individual temperature profile on a given night.\nAs discussed in Eriksson et al. , there is typically some covariance between the various quantities, and the covariance matrices should have off-diagonal elements. This correlation is provided by using correlation functions with a correlation length appropriate to the physical situation. For this study, we have used tent functions, with an a priori correlation length of 3000 m for temperature. The measurement covariance matrix, , is a diagonal matrix. The solutions did not show much sensitivity to any reasonable choice of the correlation length. The Marquardt–Levenberg method then finds an iterative solution that minimizes the cost function to order unity in a few (typically four to six) iterations.\n5. Results and Validation of the OEM Temperature Retrieval\nIn this section, the OEM retrieval is tested in several ways. These tests convincingly demonstrate the robustness of the method, its advantages compared to other methods, and the validity of the temperatures retrieved. The OEM retrieval is tested with both forward models using synthetic measurements and then with Rayleigh-scatter lidar measurements.\nThe measurements used were obtained in the spring and summer of 2012 by The University of Western Ontario’s Purple Crow Lidar (PCL) at its new location, the Environmental Sciences Western Field Station (43.1°N, 279°W, 275 m altitude). This facility is about 20 km northeast of the PCL’s original location. The PCL is a large power-aperture monostatic lidar, which is described in detail in , with some significant upgrades for these measurements. The transmitter is now a Litron Nd:YAG laser that outputs 1000 mJ per pulse at 532 nm with a repetition rate of 30 Hz. The photocount measurements were obtained from three channels: a Hamamatsu R7400 photomultiplier, outputted in analog and digital mode to a Licel transient recorder and a Hamamatsu R5600 photomultiplier, outputted in digital mode to a SRS 430 multichannel scalar averager. Both counters accumulated returns over the same 1800 laser shots (), at 7.5 m height resolution for the Licel analog (LLRa) and HHR channel and at 24 m for the LLR digital (LLRd) channel. The LLRd detector is attenuated with a neutral density filter, chosen to keep the count rate linear from the time when the system’s mechanical chopper fully opens ( altitude).\nThe retrievals are performed between 30 and 120 km over integration periods of a few hours. This range is used to allow measurements to range from an extremely high signal-to-noise ratio up to altitudes in which the photocounts can be assumed to be due only to background light. The measurements were then coadded to 255 m for the Licel channel and 264 m for the LLR (i.e., the measurement grid). The retrieval grid has a vertical resolution of 1020 m. The clear signal region is 30 to 35 km for the LLR channel and 55 to 60 km for the HLR channel.\nThe OEM requires an estimate of the covariances associated with the measurement and retrieval parameters. Since the photocounts obey Poisson counting statistics, the measurement variances are equal to the count rate for the LLRd and HLR channels, with no correlation between the photocount measurements assumed. The a priori temperature profile used for all retrievals is the US Standard Atmosphere, with a variance of . This choice of variance is consistent with the discussion of variability in the US Standard Model description as well as the various data sets used in the MSIS-91 extended model . The background variance is estimated from the measurement profile by determining the standard deviation of the mean of the photocount returns above 115 km. The pressure profile is assigned a standard deviation of 1%, the lidar constant 1%, the density 10%, the Chappuis band cross section 2%, the dead time 0.2%, acceleration due to gravity 0.1%, and the Rayleigh scattering cross section 0.2%. Correlation was introduced in the covariance matrices for temperature and the height-dependent forward model parameters using a tent function with a length of 3 km, as described in Section 4.D. These choices and their implications to the retrieval will be further discussed as follows.\nA. Retrievals Using Synthetic Measurements\nInitial testing of the OEM was accomplished with both forward models by using the forward models themselves to generate synthetic photocount profiles with system parameters estimated for the PCL HLR channel with an integration time of 6.5 h (similar to the measurements on 24 May 2012). Poisson noise and a constant background were then added to the photocount profiles. For these tests, the true temperature profile and pressure values were taken from the CIRA-86 model for May at middle latitudes . Neither forward model requires the model atmosphere to be in the HSEQ. The LE forward model does not require the assumption of the HSEQ. The HSEQ forward model only uses the atmospheric model to pick a pressure at one point (, typically the top of the grid) on the measurement grid and then uses Eq. (22) to compute a pressure profile from the atmospheric model temperatures and .\n1. HSEQ Forward Model\nFigure 1 shows the temperature Jacobians, normalized by the number density. The Jacobians are normalized in the figure to allow them to be plotted on a linear scale. The main feature of the Jacobians is the sharp peaks at the level where the temperature has been perturbed. The Jacobians also show a second feature, which grows with decreasing altitude. Figure 2 shows the Jacobians for 45 km on the retrieval grid for the HSEQ and the LE forward models.\nBoth Jacobians are identical from the top of the data grid down to where they begin to decrease rapidly with height. The LE Jacobian is symmetric and sharply peaked around 45 km. The HSEQ Jacobian is about twice as wide at half maximum and has a tail that increases with decreasing height. The use of a HSEQ pressure assumption causes the pressure at all heights to be correlated with the temperatures at all heights above, which is a consequence of the integral in . The tail in the HSEQ Jacobian below the peak is caused by changes in pressure below the peak of the Jacobian as the temperature changes because, if temperature below a given height changes, it causes a change in the pressure at all heights above it.\nThe averaging kernels (Fig. 1) contain two important pieces of information not available in the HC or GS method. First, the trace of the averaging kernel matrix is the number of degrees of freedom of the retrieval. For the temperature retrievals shown here, and, in subsequent sections, there are about 90 retrieval levels extending above 120 km, with degrees of freedom in the mid-70 s, meaning the retrieval contains mostly information from the measurement and not the a priori up to heights of 90 to 100 km. The OEM method eliminates any subjective judgements about the effect of seed pressure on the retrieval: the degrees of freedom directly give the cutoff, and the uncertainty budget (see below) gives the systematic uncertainty due to seed pressure.\nSecond, the FWHM of an individual averaging kernel is the vertical resolution of the measurements at that point, which only can be equal to or greater than the retrieval grid spacing (Fig. 3). Often, lidar measurements are reported on a measurement grid and then digitally filtered, without the effect of the filter on the vertical resolution being specified. The plot of vertical resolution shows that, over most of the retrieval’s useful range, the vertical resolution of the retrieval is identical to the resolution of the retrieval grid.\nFigure 4 shows the percent difference between the synthetic measurement and the final iteration of the forward model. The agreement between the measurements and model is within the Poisson photocount uncertainty and has zero bias. The difference between the true and retrieved background (not shown) is about 0.5% and is within one standard deviation of the uncertainty of the retrieved background.\nThe retrieved temperature profile is shown in Fig. 5. Below 100 km, the agreement is within the total uncertainty (Fig. 6). This figure reveals one of the major advantages of the OEM technique: the ability to compute a full uncertainty budget of random and systematic uncertainties.\nThe following systematic uncertainties are considered:\n- 1. Uncertainty of the Rayleigh cross section on Rayleigh extinction.\n- 2. Uncertainty in the total density used to calculate the Rayleigh extinction.\n- 3. Uncertainty in the ozone absorption cross section of the Chappuis band.\n- 4. Uncertainty in the ozone concentration in the height range of the retrieval.\n- 5. Uncertainty in the knowledge of the lidar constant.\n- 6. Counting system dead time correction (HLR only).\n- 7. Variation of Rayleigh-scattering cross section with height.\n- 8. Pressure (either at one point for HSEQ forward model or a profile for LE forward model).\n- 9. Acceleration due to gravity (HSEQ forward model only).\n- 10. Variation of mean molecular mass with altitude (HSEQ forward model only).\nThe OEM also computes the smoothing error, which estimates the uncertainty due to the smoothing by the averaging kernels on the retrieved state, causing it to miss features that may be present in the true state. For the lidar retrievals, the smoothing error becomes important in the lower thermosphere, as the true count rate drops to the order of a few times the background. At the greatest heights, the variation of the mean molecular mass with altitude also begins to contribute.\nThe random uncertainties are less than 0.8 K in the stratosphere. The total uncertainty is due primarily to the assumption of a seed pressure (here at 120 km), the uncertainty in the lidar constant, and knowledge of the local gravitational field. Small contributions result from uncertainties in the counting system dead time and ozone density.\nRandom uncertainty is dominant until around 90 km, where the smoothing error begins to rapidly increase. The statistical uncertainties in the OEM method are approximately the same as the statistical uncertainties determined from the HC method. Hence, the statistical uncertainties in the OEM retrieval are similar to the HC method, as opposed to the GS method, where the statistical uncertainties are more uniform with height compared to the HC method . Small contributions to the uncertainty budget arise from variations in the mean molecular mass at the greatest heights, the lidar constant, the seed pressure, and, at the lower heights, Rayleigh extinction and the dead time correction.\n2. LE Forward Model\nFigure 7 shows the Jacobians and averaging kernels for the LE forward model. Without the assumption of the HSEQ, the Jacobians are more localized, with no contributions from lower heights as seen in the HSEQ case above. The vertical resolution is about 15% better at 100 km than for the HSEQ model (Fig. 8). The model fit is excellent, with small residual differences between the forward model and measurements on the order of the Poisson photocount noise (Fig. 9), leading to a successful temperature retrieval (Fig. 10).\nThe systematic uncertainties are significantly different between the two forward models (Fig. 11). For the LE forward model, the largest systematic uncertainty is due to the pressure profile and lidar constant, contributing between 4 to 7 K, with the maximum contribution around 45 km altitude. The contribution from the lidar constant is significant, with a similar shape to pressure. These differences are due to the assumption of HSEQ, which causes two important differences in the sensitivity of the forward models to their parameters. For pressure uncertainty, recall that, in the HSEQ forward model, the pressure is only assumed at one point (). The pressure profile is computed relative to this point, and ’s contribution is primarily in the seeding of the pressure at the initial heights. The uncertainty due to then primarily affects the pressures near the seed height, with the initial pressure becoming less important farther from the initial point. This behavior is similar to the role of the constant of integration term in the HC method. In the LE forward model, pressure, and its associated uncertainty, is specified at every point on the retrieval grid, causing the pressure to contribute uncertainty locally at every height.\nThe difference in uncertainty for the lidar constant can be seen by combining the HSEQ Eq. (3) and the ideal gas law to find a expression for . The resulting expression for the temperature profile depends on the relative density; hence, is less sensitive to the choice of the lidar constant. The LE forward model depends on the absolute, not relative, density; thus, the choice of lidar constant affects the density at all heights.\nThe uncertainty due to Rayleigh scatter cross-section variation is small. For this forward model, there is no uncertainty due to the acceleration due to gravity or the mean molecular mass, as these quantities are only used to compute the pressure profile when HSEQ is assumed.\nThe largest uncertainty in the stratospheric temperature for the LE forward model is due to the uncertainty in the ozone cross section. By comparison, the uncertainty due to knowledge of the ozone density profile is about 30% of this amount. Small but significant contributions arise from the Rayleigh scatter cross section, dead time, number density, and, in the upper stratosphere, the statistical uncertainty of the measurement.\n3. Response of the OEM to Rapid Temperature Fluctuations\nTo test the sensitivity of the OEM to rapid changes in temperature, an oscillation was introduced into the true profile that grew as a sinusoid in height with a growth rate of twice the scale height. This type of oscillation is what would be expected for a monochromatic gravity wave conserving kinetic energy density as it propagates upward. The perturbation is introduced at the lowest heights with an amplitude of 0.5 K and allowed to grow until the associated lapse rate exceeds the dry adiabatic lapse rate, after which the amplitude is fixed (“saturates”).\nFigure 12 shows the temperature profiles retrieved for an oscillation with a vertical wavelength of 10 km. The agreement with the true temperature profile shows that the OEM technique is capable of capturing extremely sharp features in the temperature profile. A less realistic case of a single wave with a vertical wavelength of 3 km is shown in Fig. 13. The OEM retrieval using the HSEQ forward model performs as well with these extreme perturbations, as it does in the cases without added oscillations discussed previously. The LE forward model performs equally as well as the HSEQ forward model for the same added oscillations.\nB. Temperature Retrievals for 24 May 2012\nThe results in the previous section give confidence in the OEM and forward models developed to fit the lidar measurements. In this section, these models are applied to PCL measurements on the night of 24 May 2012 and compared to retrievals using the HC method on the same lidar measurement.\n1. HSEQ Forward Model\nFigure 14 shows a comparison between the temperature retrieved by the OEM using the HSEQ forward model and the temperature calculated from the HC method. The a priori background is taken as , and the retrieved background is . Figure 15 shows the uncertainties associated with the retrieval. The first point to note is that the systematic uncertainties are largest until the greatest heights of the retrieval, where the statistical uncertainty and smoothing error account for most of the total uncertainty. Since the top 10 to 15 km would be removed from the profile, the HC retrieval would be reported starting around 85 km, where most of the uncertainty is statistical. However, with the OEM retrieval, a useful profile, with full uncertainty budget, is obtained up to 100 km. In addition to random uncertainties, variation in the mean molecular mass, knowledge of the lidar constant, and the smoothing error all contribute to an overall uncertainty at 100 km of 15 K. In the stratosphere, the uncertainty increases to about 1 K at the bottom of the profile, with the largest contributions due to the assumed pressure at 120 km, the lidar constant, the gravitational profile, and the dead time.\n2. LE Forward Model\nThe LE forward model differs from the HSEQ forward model because a pressure profile, as opposed to a pressure seed height, is required. Temperature retrievals are performed using the LE forward model with different pressure profiles. Since the pressure profile is a model parameter, and not a retrieval parameter, utilizing the LE forward model requires the best available pressure profile to be useful, as pressure is inversely proportional to temperature. Few measurements of atmospheric pressure profiles exist, particularly on a routine basis. The Aura microwave limb sounder (MLS) provides excellent global coverage and retrieves temperature profiles as a function of pressure as well as geopotential heights, which are computed using the assumption of HSEQ . Thus, pressure can be equated to altitude. Using this pressure profile measurement for an overpass during the measurement period on 24 May 2012 gives a temperature retrieval that is much hotter in the stratosphere and much cooler in the upper mesosphere than the HC retrieval. Similarly, using both CIRA-86 and the US Standard Atmosphere pressure profiles yielded temperature profiles considerably different than those computed from the HC method.\nTo demonstrate that the LE model temperature differences were purely due to differences in the pressure profile, temperature was retrieved using a hybrid pressure approach. In the HSEQ forward model, the pressure profile is updated at each iteration in order to be consistent with the retrieved temperature profile at that iteration. The final pressure profile found from HSEQ is, thus, consistent with the retrieved temperature. When this pressure profile is used as the true pressure profile in the LE forward model, the retrieved temperature profile is equivalent to the HSEQ retrieval, and, like the HSEQ retrieval, is similar to the HC method.\nThe reason for the large differences in temperature between the LE retrieval using the various pressure profiles and the HSEQ forward model is due to the large differences in pressure between the profiles (Fig. 16). The MLS pressure is less than the HSEQ pressure at all heights, with the difference between them almost a factor of 2 in the lower thermosphere. Both pressure profiles are significantly lower than the CIRA and US Standard models. The pressure in the stratosphere and mesosphere is greater in the CIRA model than the US Standard model. The HSEQ pressure is about 30% less than the CIRA pressure in the mesopause region.\nC. Dual Channel Retrieval of Temperature, Dead Time, and Background\nThe advantage of a two-channel system for large power-aperture product lidars is that the range over which temperatures can be retrieved is increased. However, even if the system is engineered so each channel is linear, some scheme must be used to combine the measurements into a single temperature profile. The most common approaches are to either form a common photocount profile from the two channels (often called “gluing”) or to retrieve temperature profiles from each channel and combine these into a single profile (often called “merging”). Each method suffers in practice from the same issue. For many nights, the slopes of the photocount profiles or the shape of the temperature profiles in the region of overlap are similar. However, for many other nights, the slopes are significantly different and gluing or merging introduces systematic uncertainty into the retrieved temperatures. Also, a quantitative criteria for what region to choose for overlap between the two channels has not been established. The gluing method also has the challenge of dealing with combining the statistical uncertainties, which are different for each channel. In an analog/digital system, there is the challenge of converting the raw digitized analog signal into virtual photocounts while maintaining appropriate statistical uncertainties.\nThe two-channel OEM retrieval does not require solutions to any of these challenges. The measurement vector now contains the measurements from both channels, which are not required to be in the same units or even have the same spatial-temporal resolution. The retrieved temperature profile is a single profile, which minimizes the cost function by accounting for contributions from both measurements. The background for each channel is retrieved, in addition to the dead time for the HLR channel. Retrievals have also been successfully tested using analog and digital channels, using the native units for the analog signal.\nExtensive testing was performed using synthetic measurements to gain experience in the best combination of height ranges and overlap. The following retrievals use the appropriate HSEQ forward model. The lowest altitude for the HLR channel was chosen as 37.5 km. At this height, the nonlinearity of the detector is modest, e.g., . Measurements were used up to 122 km, similar to the single channel case. The LLRd channel measurements are used from a lower height of 25 km to an upper height of 110 km. The normalization of the density profile is 55 to 60 km for the HLR channel and 30 to 35 km for the LLRd channel. The HLR measurements are coadded to 30 m, while the LLRd measurements are used at their native 24 m vertical resolution (Fig. 17). The retrieval grid is the same as the single channel case, 1020 m. The temporal co-adding for both channels is 6.5 h of data records consisting of 1800 laser shots each (1 min). The a priori estimate of the dead time is the manufacturer’s specification of 4 ns.\nFigure 18 shows the Jacobians for the two-channel retrieval on 24 May 2012. The sensitivity of the forward model at the lowest heights to temperature is larger for the HLR channel, due to its higher count rate. The averaging kernels and vertical resolution are also similar to the one-channel case, except above 95 km (Fig. 19). In the 95 to 100 km region, the two-channel retrieval’s resolution increases more rapidly with altitude and is about 30% greater than the one-channel retrieval at 100 km.\nFigure 20 shows the differences between the forward model and the measurements. The LLRd measurements contribute from 25 km up to 37.5 km. Above this height, the measurement covariance weights the retrieval primarily to the HLR measurements. The handoff from the LLRd residual to the HLR residual is seamless, and the residuals are around 0.1% or less. At the greater heights, the LLRd residuals have a bias, but not the HRL residuals, which are determining the temperature profile at these heights. The HLR residuals become large above 100 km, as the measurements no longer control the retrieval and the model falls back to the a priori state.\nFigure 21 shows the retrieved temperature profile. The temperature profile retrieved from the two-channel measurements agrees to within the level with the temperature profiles calculated from the HC method. The profile simultaneously retrieved from both channels also agrees well with the HC retrieval for the LLRd channel. The retrieved backgrounds are within 0.21% and 1.9% of the a priori’s estimated from the measurements, and the retrieved dead time is 3.90 ns.\nThe uncertainty budget is also similar above 40 km to the single-channel case (Fig. 22). The uncertainties below 37.5 km, where the LLRd makes its largest contribution are consistent with the single-channel results, where the HLR channel was used down to 31 km. Since the retrieval now goes down to 25 km altitude, the uncertainty due to ozone density profile increases rapidly. In this situation, the additional ozone at the lower heights contributes to uncertainty in the stratosphere that exceeds the uncertainty in the knowledge of the ozone absorption cross section. The high signal-to-noise ratio measurements of the HLR channel at 37.5 km cause a jump downward in the statistical uncertainty along with increasing the systematic uncertainties due to the model parameters. This increase in uncertainty is due to the larger value of the temperature Jacobians at the lowest heights for the HLR channel compared to the LLRd channel Jacobians at the same height. The temperature retrieval above 37.5 km is predominantly due to the HLR channel measurements.\nTo highlight the advantage of using the OEM instead of merging temperatures, consider the stratospheric temperature on two nights (Fig. 23). On 24 May 2012, the temperatures in the region of overlap between the two channels processed individually by the HC method have similar slopes, and it is straightforward to merge the temperatures. The OEM retrieval is also smooth in this region. Contrast this night to 7 August 2012, where the OEM retrieval is again smooth, but the temperature profiles retrieved by the HC method have different slopes and significant differences in magnitude below 40 km.\nD. Comparison of the OEM to the HC Method on Other Nights\nTo illustrate the OEM’s robustness, Fig. 24 shows the comparison between the retrieval using the HSEQ forward model with two channels (LLRd and HLR) and the HC method on nine nights. For this comparison, the temperature profiles retrieved by the HC method are cut off at the height where the statistical uncertainty is above 10%. As the HC method temperatures are seeded at a signal-to-background level of 2, this choice ensures the top 10 to 15 km has been removed from the profile. The OEM retrieved temperatures are shown up to the greatest height given by the degrees of freedom of the retrieval on each night. The agreement is within the combined uncertainties, with each small bump in the HC method also occurring in the OEM retrieval. The insensitivity of the retrieval to the choice of an a priori temperature profile is also demonstrated by these results, as the US Standard Atmosphere temperature profile was used as the a priori temperature profile for each night. The retrieved dead time was also consistent from night to night. The mean dead time was .\nThe comparisons in the previous sections show that both forward models, with and without assuming HSEQ, provide robust OEM retrievals, which yield temperature profiles, photocount background, and dead time. These retrievals compare favorably with expected values. The OEM retrieval also gives a full random and systematic uncertainty budget on a profile by profile basis. Furthermore, the OEM’s averaging kernels allow the determination of both the vertical resolution as a function of height and the maximum height to which the retrieval is mostly independent of the a priori profile.\nThe HSEQ forward model is mathematically equivalent to the HC method, and this assertion is made clear by the nearly one-to-one correspondence in temperatures determined by both methods. The LE forward model requires that the true pressure profile be known to a high precision. The examples shown assumed the pressure profile is known to 1%, which results in systematic uncertainties due to pressure of about 4 K, with uncertainties due to knowledge of the lidar constant of the same order of magnitude. For more useful retrievals, it is recommended that the pressure profile be known through the upper stratosphere, mesosphere, and lower thermosphere to less than 1%. This requirement may not be possible with the current generation of atmospheric instruments.\nIn the past, individual investigators have addressed the question of data corrections, signal-to-noise ratio, and seed pressure by attempting to correct their measurements before a temperature is retrieved. In an OEM framework, all significant instrumental and atmospheric corrections are built into the forward models, and level 0 measurements are used in the analysis. A temperature profile is retrieved along with a quantitative determination of the maximum retrieval height to which the retrieval is valid. The OEM determines both the vertical resolution of the retrieval as well as the full random and systematic budget for uncertainties. It is computationally efficient, performing the full nonlinear calculation in seconds on a laptop computer using a interpreted fourth-generation programming language.\nThis discussion of the application of OEMs to the retrieval of Rayleigh-scatter lidar temperatures can be summarized as follows.\n- 1. The forward models presented for use with the OEM provide robust estimations of temperature.\n- 2. OEM temperature retrievals using a forward model, which assumes HSEQ, are equivalent to the temperature profiles calculated using the HC method.\n- 3. The OEM provides a cut-off height for retrievals. Below this height, the entire temperature profile can be used.\n- 4. Vertical resolution is determined quantitatively at each height.\n- 5. The OEM provides a complete uncertainty budget, including random uncertainties, smoothing error, and uncertainty due to model parameters including pressure, instrument parameters, and composition changes for each temperature profile retrieved.\n- 6. If multiple channel measurements are available, a single temperature profile can be retrieved that is consistent with both measurements simultaneously. In this case, the dead time may be also retrieved in addition to the backgrounds and temperature profile. For the case of an analog and digital channel, no conversion of the analog signal into current or virtual photocounts is required.\n- 7. OEMs are fast computationally and, thus, practical for routine data analysis.\nOEM retrievals using the HSEQ forward model offer significant advantage over the HC and GS methods and are physically equivalent to traditional methods. The LE model allows the assumption of HSEQ to be dropped but requires high-quality estimates of the pressure as a function of height to produce useful results. Most if not all measurements of pressure available in the middle atmosphere at some point in their processing appeal to the assumption of HSEQ, in an atmosphere known to often not be in HSEQ. We encourage the atmospheric community to develop better methods for determining pressure profiles that do not depend on the assumption of HSEQ. When these pressure measurements are available, the LE forward model will be able to retrieve temperature without the assumption of HSEQ.\nThe uncertainty budgets given in the study are heuristic and not meant to be definitive. The model parameter variances have been made as a “best guess” based on current best practice. The assessment and assignment of appropriate covariances to the model parameters should be a priority of the lidar measurement community. Much of this work is being performed by the International Space Science Institute’s Critical Assessment and Standardized Reporting of Vertical Filtering and Error Propagation in the Data Processing Algorithms of the NDACC Lidars working group (LeBlanc et al., http://www.issibern.ch/teams/ndacc/), but specific community recommendations for the OEM method on the uncertainties and best choices for model parameters would be beneficial.\nThis study, as well as the recent application of OEM techniques to the retrieval of extinction and backscatter from an aerosol lidar by Povey et al. , establish OEM as an important new tool for retrieval of geophysical parameters from active remote sensing instruments. These studies are the first step in a new growth area, which can be called “measurement assimilation.” In the last two decades, dedicated effort has been made by meteorological services in the area of data assimilation, wherein forecast model predictions are improved by incorporating all available measurement information into the model to improve the forecast. In measurement assimilation, consider a station with numerous individual instruments, many of which individually determine or require the same atmospheric parameter. For instance, temperature information may come individually from microwave sounders, radiosondes, lidar, etc. The goal of measurement assimilation is to develop retrieval systems that analyze groups of measurements simultaneously, in a framework such as is described in this study. Forward models could be developed for various instruments, and joint parameters such as temperature could be retrieved. Parameters retrieved in this manner would be the best estimates based on all available information rather than a single instrument, and the weighting of individual instruments could change as a function of time, meteorological conditions, etc. The benefit for the user would be the ability to obtain on a continuous basis the best available measurement of a parameter from a station as opposed to multiple estimates at varying spatial-temporal resolutions.\nThis work greatly benefited from scientific discussions with our colleagues. P. S. Argall, B. Calpini, G. Martucci, D. Ruffieux, and V. Simeonov. We especially thank T. LeBlanc for encouraging us to explore improvements to the quality of lidar temperature retrievals through his International Space Sciences Institute lidar algorithms initiative. We would like to thank the Federal Office of Meteorology and Climatology, MétéoSuisse, for its support of this project. R. J. S. would like to further thank the École Polytechnique Fédérale de Lausanne and The University of Western Ontario for supporting his research as well as the National Science and Engineering Research Council of Canada. The MLS measurements used in this study were acquired as part of the activities of NASA’s Science Mission Directorate and are archived and distributed by the Goddard Earth Sciences (GES) Data and Information Services Center (DISC). We also acknowledge the Aura MLS mission scientists and associated NASA personnel for the production of the data used in this study.\n1. A. Hauchecorne, M.-L. Chanin, and P. Keckhut, “Climatology and trends of the middle atmospheric temperature (33–87 km) as seen by Rayleigh lidar over the south of France,” J. Geophys. Res. Atmos. 96, 15297–15309 (1991). [CrossRef]\n2. P. S. Argall and R. J. Sica, “A comparison of Rayleigh and sodium lidar temperature climatologies,” Annales Geophysicae 25, 27–35 (2007). [CrossRef]\n3. R. T. Clancy, D. W. Rusch, and M. T. Callan, “Temperature minima in the average thermal structure of the middle mesosphere (70–80 km) from analysis of 40 to 92 km SME global temperature profiles,” J. Geophys. Res. Atmos. 99, 19001–19020 (1994). [CrossRef]\n4. A. Hauchecorne and M. Chanin, “Density and temperature profiles obtained by lidar between 35 and 70 km,” Geophys. Res. Lett. 7, 565–568 (1980). [CrossRef]\n5. C. D. Rodgers, Inverse Methods for Atmospheric Sounding: Theory and Practice, Theory and Practice (World Scientific, 2011).\n6. J. Khanna, J. Bandoro, R. J. Sica, and C. T. McElroy, “New technique for retrieval of atmospheric temperature profiles from Rayleigh-scatter lidar measurements using nonlinear inversion,” Appl. Opt. 51, 7945–7952 (2012). [CrossRef]\n7. A. C. Povey, R. G. Grainger, D. M. Peters, and J. L. Agnew, “Retrieval of aerosol backscatter, extinction, and lidar ratio from Raman lidar with optimal estimation,” Atmos. Meas. Tech. 7, 757–776 (2014). [CrossRef]\n8. D. P. Donovan, J. A. Whiteway, and A. I. Carswell, “Correction for nonlinear photon-counting effects in lidar systems,” Appl. Opt. 32, 6742–6753 (1993). [CrossRef]\n9. R. J. Sica, S. Sargoytchev, P. S. Argall, E. F. Borra, L. Girard, C. T. Sparrow, and S. Flatt, “Lidar measurements taken with a large-aperture liquid mirror. 1. Rayleigh-scatter system,” Appl. Opt. 34, 6925–6936 (1995). [CrossRef]\n10. R. Sica and M. Thorsley, “Measurements of superadiabatic lapse rates in the middle atmosphere,” Geophys. Res. Lett. 23, 2797–2800 (1996). [CrossRef]\n11. R. J. Sica and P. S. Argall, “Seasonal and nightly variations of gravity-wave energy density in the middle atmosphere measured by the Purple Crow Lidar,” Ann. Geophys. 25, 2139–2145 (2007). [CrossRef]\n12. R. J. Sica, Z. A. Zylawy, and P. S. Argall, “Ozone corrections for Rayleigh-scatter temperature determinations in the middle atmosphere,” J. Atmos. Ocean. Technol. 18, 1223–1228 (2001). [CrossRef]\n13. R. D. McPeters, G. J. Labow, and J. A. Logan, “Ozone climatological profiles for satellite retrieval algorithms,” J. Geophys. Res. Atmos. 112, D05308 (2007). [CrossRef]\n14. M. Griggs, “Absorption coefficients of ozone in the ultraviolet and visible regions,” J. Chem. Phys. 49, 857–859 (1968). [CrossRef]\n15. M. Nicolet, “On the molecular scattering in the terrestrial atmosphere: an empirical formula for its calculation in the homosphere,” Planet. Space Sci. 32, 1467–1468 (1984). [CrossRef]\n16. P. S. Argall, “Upper altitude limit for Rayleigh lidar,” Annales Geophysicae 25, 19–25 (2007). [CrossRef]\n17. Committee on Extension to the Standard Atmosphere, “US standard atmosphere, 1976,” Tech. Rep. NOAA-S/T 76-1562 (National Oceanic and Atmospheric Administration, 1976).\n18. M. Alpers, R. Eixmann, C. Fricke-Begemann, M. Gerding, and J. Hoffner, “Temperature lidar measurements from 1 to 105 km altitude using resonance, Rayleigh, and rotational Raman scattering,” Atmos. Chem. Phys. 4, 793–800 (2004). [CrossRef]\n19. M. Gerding, J. Höffner, J. Lautenbach, M. Rauthe, and F. J. Lübken, “Seasonal variation of nocturnal temperatures between 1 and 105 km altitude at 54° N observed by lidar,” Atmos. Chem. Phys. 8, 7465–7482 (2008). [CrossRef]\n20. P. Keckhut, A. Hauchecorne, and M. L. Chanin, “A critical review of the database acquired for the long-term surveillance of the middle atmosphere by the French Rayleigh lidars,” J. Atmos. Ocean. Technol. 10, 850–867 (1993). [CrossRef]\n21. P. Eriksson, C. Jiménez, and S. A. Buehler, “Qpack, a general tool for instrument simulation and retrieval work,” J. Quant. Spectrosc. Radiat. Transfer 91, 47–64 (2005). [CrossRef]\n22. S. A. Buehler, P. Eriksson, T. Kuhn, A. von Engeln, and C. Verdes, “ARTS, the atmospheric radiative transfer simulator,” J. Quant. Spectrosc. Radiat. Transfer 91, 65–93 (2005). [CrossRef]\n23. A. E. Hedin, “Extension of the MSIS thermosphere model into the middle and lower atmosphere,” J. Geophys. Res. Atmos. 96, 1159–1172 (1991). [CrossRef]\n24. J. J. Barnett and M. Corney, “Middle atmosphere reference model from satellite data,” in International Council of Scientific Unions Middle Atmosphere Program, Handbook for MAP (SCOSTEP, 1985), Vol. 16, pp. 47–85.\n25. C. S. Gardner, D. C. Senft, T. J. Beatty, R. E. Bills, and C. Hostetler, “Rayleigh and sodium lidar techniques for measuring middle atmosphere density, temperature and wind perturbations and their spectra,” in World Ionosphere/Thermosphere Study Handbook (SCOSTEP, 1989), Vol. 2, pp. 1–40.\n26. M. J. Schwartz, A. Lambert, G. L. Manney, W. G. Read, N. J. Livesey, C. D. Boone, W. H. Daffer, M. G. Mlynczak, S. Pawson, J. M. Russell, M. L. Santee, K. A. Walker, and D. L. Wu, “Validation of the aura microwave limb sounder temperature and geopotential height measurements,” J. Geophys. Res. 113, 1–23 (2008). [CrossRef]", "label": "Yes"} {"text": "Please note - Ndiyo has now officially closed its doors, at least as a legal entity - but we've kept the site alive in case any of the information is useful to others.\nOur thanks to all those who helped out and were involved in so many different ways! The Ndiyo legacy lives on in the ultra-thin-client work at its spin-off DisplayLink, at Plugable, at NoPC and elsewhere...\nHubster - a new Ndiyo model\nAt Ndiyo, we've been exploring a new, flexible way to share a PC between multiple users. Using the power of today's high-speed USB connections, ordinary users could turn their PCs into multi-user systems using a model we call 'Hubster'.\nBefore we go any further, we should point out that this is not replacing the standard Ethernet-based Ndiyo system we've been using so far. That's still central to what we're doing. But we're also quite excited about Hubster, too. Why?\nAnyone who remembers what life was like before the USB standard came along will appreciate the transformation it has brought about. Adding new peripherals to your computer is easier than it has ever been before. With the advent of USB 2.0, not only is the USB system convenient, it is also fast; fast enough to connect hard disks for backup purposes, iPods for synchronising, and cameras for video capture.\nThe process of adding extra monitors to a system, however, still today resembles that of adding a scanner 10 years ago: it involves plugging extra cards into your computer, installing new driver software, and coping with bulky and inflexible cables. But quite recently, the speed and ubiquity of USB 2.0 has led to the creation of USB-VGA adapters, devices which allow you to add extra displays to your machine using just your USB ports. This is particularly valuable on small machines or laptops, which may not even have the option of supporting extra graphics cards. Adaptors based on MCT's technology, using standard graphics chips, are available from companies like Sitecom and Tritton, and for even higher performance, products based on the Nivo technology developed by our sister company DisplayLink are now available - the IOGEAR GUC2015V and the Samsung 940UX are examples.\nHere's one of the original prototypes:\nA USB Nivo\n\"But\", you may say, \"this is just a USB video adapter. It has no support for a keyboard and mouse like the Ethernet Nivo does. It's not a terminal. So what does all of this mean for Ndiyo?\"", "label": "Yes"} {"text": "With the continuous development of the domestic chip industry, LNEYA fluid temperature control devices continue to be applied. To this end, the circuit design for the fluid temperature control device chip test, the fluid temperature control device manufacturers need to understand clearly, in order to better produce and sell the fluid temperature control device.\nAM-OLED display driver chip is the key component of AM-OLED flat panel display, which has important economic value. The display driver chip integrates row and column driver circuit, image SRAM, charge pump, LDO, gamma correction and various input and output interfaces. . The built-in image SRAM supports WVGA resolution and displays 16.77 megahertz display; on-chip low-power power management technology enhances the battery life of handheld devices. The chip has the characteristics of high integration, low cost and low power consumption, and can be applied to small and medium-sized AM-OLED display modules, including electronic products such as smart phones and digital cameras. Therefore, the fluid temperature control device is aimed at the testing requirements of the AM-OLED driver control chip, and combined with the multi-function module structure characteristics of the chip, a test circuit design scheme of the AM-OLED driver chip is proposed.\nThe AM-OLED driver control chip power module consists of three charge pumps, two LDOs, and a power-on detection supply to provide the required drive voltages for gamma correction, row drive, column drive, and SRAM modules. Built-in SRAM is used to store image data that needs to be displayed. The OSC oscillator is mainly used as an on-chip clock source. It can generate high-precision clock frequencies by multiplying, dividing, and adjusting the duty ratio, combined with the specific requirements of each demand module. The digital control module is composed of Command decoder and TCON module, which mainly realizes different resolution display, different display mode display, low power mode control, different control and data interface compatibility, row and column drive circuit control, gamma correction and interface decoding function. Enable each module to work in coordination.\nFor the above driver chip, it is necessary to test the various functional modules and overall performance. The common test items include power module test, and determine the voltage and current index requirements of the power supply such as the on-chip reference, charge pump, and LDO. Linkage test, including switching between power-on, start-up reset, power-saving, and sleep. Dynamic current and average current tests are used to calculate the average power consumption and instantaneous power consumption of the chip. The column driver Source Driver outputs fixed level test, setup time, DNL, INL, DVO test. Test the SRAM integrated in the chip through the SPI port to test whether the basic storage function is correct. The gamma circuit test needs to be carried out step by step. First, test each internal analog circuit to determine whether the reference voltage is generated correctly, and then perform joint test with the column driver connection. Compare the display effect and adjust the voltage error range. The test of the digital control module is mainly compatible with the interface, can be debugged online, and the register can be matched to improve the testability of the chip.\nThe chip circuit design of the fluid temperature control device has different characteristics, and professional manufacturers should be able to concentrate on analysis and test, and better perform chip test.\n(Note: Some of the content is originally from related papers. If you infringe, please contact us in time to delete, thank you!)", "label": "Yes"} {"text": "Concrete Maturity: From Theory to Application is a complete guide to the concept and practical aspects of concrete maturity method based on the ASTM C1074. Understanding the concrete maturity method allows those in the construction industry to optimize critical construction operations such as formwork removal, post-tensioning, and opening concrete pavement to traffic. Implementing this testing method increases profitability and saves construction companies both time and money throughout the duration of a project.\nIn this e-book you will learn:\nDon't miss out on this exclusive offer!\nGiatec is driving breakthrough innovations in the concrete industry, bringing real-time data on concrete performance to the forefront of every construction jobsite. Their suite of hardware and software products, including non-destructive testing technologies, IoT solutions, and wireless sensors, analyze data throughout concrete’s lifecycle, helping to build structures faster, safer, and more economically.\nCombining wireless concrete sensors and mobile apps, Giatec has developed smart IoT-based technologies, like SmartRock™ concrete maturity sensors, for real-time monitoring of concrete properties. This provides critical information to contractors so they can make efficient and informed decisions on the jobsite, ultimately saving time and money. Ready-mix producers also leverage the SmartRock™ Plus cloud, which gives them access to concrete performance data to optimize their mix designs. Learn More", "label": "Yes"} {"text": "High-Frequency Acoustic Emission Induced by Indentation Fracture in Brittle Materials\nAcoustic emission analysis is a method routinely applied in a variety of scientific, technological, and industrial fields. So far most of these applications have in common a limitation to sub-MHz frequencies. Recently, the frequency range available for acoustic emission analysis has been extended up to about 100 MHz. The present paper is a continuation of these investigations. Vickers hardness indendation in brittle materials has been used as a source of fracture and fracture-induced acoustic emission. The experimental setup consisting of a hardness tester, a focusing broadband transducer, and a digitizing signal analyzer is designed for frequencies up to about 400 MHz. It can be realized or even improved in a number of laboratories with standard experimental instrumentation. The highest acoustic emission frequency detected in the present paper is about 150 MHz. This frequency limit is set by the transducers used. The method has been applied in order to investigate the presence and characteristics of acoustic emission in slide glass, a single crystal of Si, and a fine-grained AIN ceramic. Received acoustic emission signals have been analyzed with respect to the temporal shape, the amplitude spectrum, and the stage of occurrence relative to the indendation loading/unloading cycle.\nNo Reference information available - sign in for access.\nNo Citation information available - sign in for access.\nNo Supplementary Data.\nNo Article Media\nDocument Type: Research Article\nPublication date: May 1, 1996\nMore about this publication?\n- Acta Acustica united with Acustica, published together with the European Acoustics Association (EAA), is an international, peer-reviewed journal on acoustics. It publishes original articles on all subjects in the field of acoustics, such as general linear acoustics, nonlinear acoustics, macrosonics, flow acoustics, atmospheric sound, underwater sound, ultrasonics, physical acoustics, structural acoustics, noise control, active control, environmental noise, building acoustics, room acoustics, acoustic materials, acoustic signal processing, computational and numerical acoustics, hearing, audiology and psychoacoustics, speech, musical acoustics, electroacoustics, auditory quality of systems. It reports on original scientific research in acoustics and on engineering applications. The journal considers scientific papers, technical and applied papers, book reviews, short communications, doctoral thesis abstracts, etc. In irregular intervals also special issues and review articles are published.\n- Editorial Board\n- Information for Authors\n- Submit a Paper\n- Subscribe to this Title\n- Information for Advertisers\n- Online User License\n- Ingenta Connect is not responsible for the content or availability of external websites", "label": "Yes"} {"text": "2007 Chevy Impala Radio Wiring Diagram Best Of 2003 Audi A4 Factory ... 2007 Chevy Impala Radio Wiring Diagram Lovely 2005 Chevy Silverado Radio Wiring Diagram Wiring Of 2007Audi Factory Stereo Wiring Diagram - Listed below are a number of best rated 2005 audi a4 radio wiring schematic photos on internet. We found it from reliable source. Its submitted by Maria Rodriquez in the best field. We feel this 2005 audi a4 radio wiring schematic image could possibly be most trending topic once we. Jeep stereo wiring diagram luxury factory radio 2002 dodge durango stereo wiring diagram wire schema 2003 audi a4 factory radio wiring diagram car diagrams radio wiring diagram for a 1999 dodge ram 1500 trusted jeep stereo wiring diagram luxury factory radio. Related. Post Navigation.. Audi A4 B6 Radio Wiring Diagram Tagged wiring oem radio diagram audi a4 b6 2005,at aspenthemeworks.com. aspenthemeworks.com Pictureid 32167 Audi A4 B6 Radio Wiring Diagram0Audi 20Symphony 20II 20to 20RNS E A4 B6 Radio Wiring Diagram02002 Audi A4 Radio Wiring Diagram Unique 1999 A6 Auto Alarm Mercury Milan Headlight Harness Of B60.\nof Wiring Diagram Audi A3 Stereo Full Online It takes me 36 hours just to find the right download link, and another 3 hours to validate it. Internet could be brutal to us who looking for free thing. Right now this 57,11MB file of Wiring Diagram Audi A3 Stereo Full Online were still. Audi Wiring Diagrams audi 100 200 factory wiring diagrams sizov page contents relays and power tracks 1 14 fuel level sender fuel pump lambda sensor ecu knock sensors fuel frequency valve warm up regulator cold start. So if you wish to acquire all these awesome graphics regarding Audi Wiring Diagrams, simply click save icon to download the photos for your laptop.. Gm Stereo Wiring Diagram - Chevy Cobalt 2 Ecotec Engine Wiring Diagram likewise What Are Bnc Connectors further Audi A4 Radio Schaltplan further Mitchell Nissan Pathfinder Electrical Diagram Basic Guide Wiring further 2000 Chevy Prizm Engine Diagram. also 2001 pontiac montana engine diagrams also mitchell nissan pathfinder electrical diagram.\nYou probably already know that ford factory stereo wiring diagram is among the hottest topics over the internet right now. Depending on the data we got from adwords, ford factory stereo wiring diagram has very much search online search engine.. Wiring Your Radio. Basic wiring (what a radio needs to work correctly): Wire: 12 volts Constant Is the factory radio still in the car? If so, this is a good place to start. Remove the factory radio to access the wiring behind the factory radio. There is usually a plug or harness coming from the rear of your factory radio. See diagram. Factory Car Audio / Stereo Audio equipment removal instructions, click and GO Acura Audi BMW Buick Cadillac Chevrolet Chrysler Corvette Daewoo Dodge Ferrari Fiat Ford Geo GMC Honda Hyundai Infiniti Isuzu Jaguar Jeep Kia Lamborghini Land Rover Lexus Lincoln Mazda Mercedes Mitsubishi Nissan Oldsmobile Opel Peugeot Plymouth Pontiac Porsche Saab.\nDo you own 1985 Audi 5000 System Wiring Diagram? If so, here is a complete service/repair manual for 1985 Audi 5000. It contains detailed instructions and step by step diagrams. Factory car stereo wiring diagrams moreover 2016 chevy colorado trailer wiring harness diagram moreover watch as well as 2014 jeep patriot stereo wiring diagram also kenwood audio car stereo wiring diagram best s le wording switched ignition power constant battery simple front along with wiring diagram car audio speakers also 1970 chevy. VW VOLKSWAGEN Car Radio Stereo Audio Wiring Diagram Autoradio connector wire installation schematic schema esquema de conexiones (this will only be fitted to models fitted to vehicles with RVC factory fitted or ordered through spare parts with the RVC input option) Car stereo wiring diagrams car radio wiring car radio wiring colors car.\nSep 11, 2011 · Ok, so I recently bought an 89' Pickup.didn't come with a headunit in it and factory harness was cutso just got wires. I looked up a diagram. Main wiring diagram index wd 01 pages 17 audi 100 a6 1992 rh wiki bentleypublishers 2000 2007 2003 audi a4 factory radio wiring diagram new besides rh rccarsusa 2004 air harley davidson radio wiring diagram fresh chevy valid 2004 audi a4 stereo audi car stereo wiring diagram electrical work u2022 rh wiringdiagram today 2004 a4 electric window.\nAudi Car Stereo Wiring Diagram - Opinions About Wiring Diagram • wiring diagrams audi a6 auto electrical wiring diagram rh harvard edu co uk sistemagroup me Factory Car Stereo Wiring Diagrams Bose Car Stereo Wiring ...\nTag For Audi allroad quattro 2 7t pictures : Ford Focus Radio Wiring ... Ford Focus Radio Wiring Diagram 2005 Mondeo St Tdci Audi Allroad Quattro 2 7t Pictures", "label": "Yes"} {"text": "Largest solar cell plant to be built in Bay Area\nA Palo Alto company will announce today that it will spend about $100 million to build the world's largest solar cell factory and that it will locate its new plant in the Bay Area.\nMartin Roscheisen, chief executive of Nanosolar Inc., said Tuesday that his firm is considering sites in San Jose and San Francisco that would be close to its current pilot plant in Palo Alto, where it uses an unconventional material as the basis for its solar cells. Assuming that it stays on track, by 2007, Nanosolar's new factory will produce 200 million solar cells a year that will generate more electricity than the output of a plant in Japan run by Sharp, considered today's world leader in solar power.\nSolar cells absorb photons from sunlight and convert these into electrons to generate electricity. More than 90 percent of all solar cells use silicon to transform light into electricity.\nEd Beardsworth, an independent energy technology consultant in Palo Alto, said shortages of silicon -- the prime ingredient in solar cells and computer chips -- are opening the market for alternative materials.\nNanosolar is one of several companies that use a blend of metals that includes copper and gallium. \"The question is whether these new companies like Nanosolar can live up to their own expectations,\" Beardsworth said.\nJoel Makower, a consultant with Clean Edge, a research firm that follows renewable energy, said firms such as Miasolé in San Jose and DayStar Technologies in New York state are also racing to mass-produce solar cells that use materials other than silicon.\n\"It's a wide-open field,\" he said.\nRoscheisen said Nanosolar will make its new solar cells through a process much like printing. The base of the solar cell will be a metal foil bathed in a solution containing tiny particles of the light-capturing metals. The liquid will evaporate and leave behind this photovoltaic material. A thin, transparent film will be baked over the cell. Currently, the process prints onto a metal foil 4 inches wide, but Roscheisen said this could be extended up to 72 inches.\nTo build its new plant, Nanosolar raised $75 million from European and U.S. investors including Jeff Skoll, the former eBay executive who also backed \"An Inconvenient Truth,\" former Vice President Al Gore's movie on global warming. Roscheisen said $15 million in government subsidies would be part of the factory financing package, but he declined to identify those subsidies. He said a final decision on the factory site would be made soon.\nDave Pearce, chief executive of Miasolé, said his firm uses a slightly different approach at a plant in Santa Clara that is supposed to expand from making pilot batches \"to reasonably high-volume production\" later this year.", "label": "Yes"} {"text": "HTC says customers want thin models over more battery life\nHTC says that it has no plans on the table to disseminate a firmware update that would specifically improve the life of the battery on the HTC One X (1800mAh), HTC One S (1650mAh) or the HTC One V (1500mAh). The high-end flagship HTC One X has a power management problem as we told you. A developer of a custom ROM for the device blames the problem on a misplaced NVIDIA app which was installed in the wrong folder. The problem is draining 10% to 20% of the unit's battery life when users need every second that they can squeeze out of the cell. The good news is that HTC has released a software fix that will eliminate the power management problem and restore the 10% to 20% battery life that had been lost. The update also repairs bugs that caused the phone to reboot or freeze.\nSo what would you rather see in your smartphone, a thin sleek design that turns heads or a larger battery that turns on at the end of the day after constantly being in use during working hours. Drop us a comment in the box below.", "label": "Yes"} {"text": "Drivers for the interface are installed, I can use another application to open up the port and see some of my debug messages from the device. It is an Adafruit FTDI friend connected to an Arduino Pro.\nWhen any FTDI or CH340 device is connected to this Windows 10 system, the “Tools → Ports” option is greyed out and not selectable. Curiously, the 8u2 and 16u2 USB to Serial interfaces work fine ONLY when no FTDI or CH340 based devices are attached to the system.\nAs a band-aid, I am able to upload to the port by changing the value in the “preferences.txt” file.\nI need a serious solution for this nuisance.", "label": "Yes"} {"text": "radio programming software19 links - and 1 categories\n- RT Systems\n- Online shopping, Programming Software, Icom, Yaesu, Kenwood, Istron, HyGain, MFJ, cat cables interfaces and other radio control cables.\n[ Hits: 2527 | Votes: 2 | Rating: 1 ]\n- RT Systems - Radio Programming\n- Windows programming software for Icom and Yaesu amateur radios and scanners and receivers by RT Systems. Produce radio programming cables for Yaesu Icom Kenwood radios\n[ Hits: 5613 | Votes: 18 | Rating: 5.04 ]\n- FTBVR5K VR-5000 Radio control\n- Memory management programming software for the Yaesu VR-5000 receiver\n[ Hits: 3889 | Votes: 13 | Rating: 5.92 ]\n- Baofeng UV-5 Programming Cable\n- Baofeng UV-5R uses RS232 to communicate or programming with the PC software and you can make your own programming cable with a few components.\n[ Hits: 94 | Votes: 0 | Rating: 0 ]\n- TYT MD-2017 Programming\n- A very useful video that explains how to program the TYT MD-2017 radio. From software download, firmware, codeplug and how to manually configure settings and how to program memories\n[ Hits: 215 | Votes: 0 | Rating: 0 ]\n- Alinco DJX 10 software\n- MS-DOS programming software for use with Alinco's DJ-X10 Wide Band Communication Receiver\n[ Hits: 4252 | Votes: 61 | Rating: 4 ]\n- ScanControl is the only low cost, easy to use software that supports programming and control & monitoring of the Uniden BC245XLT, BC895XLT, BCT8, BC780XLT, BC250D, BC785D, BC296D, BC796D Digital Scanners and the Radio Shack PRO2052\n[ Hits: 3801 | Votes: 3 | Rating: 8.67 ]\n- CCRadioTech Uniden programming software\n- Free windows control/programming software for the Uniden Bearcat UBC-3300XLT and 780XLT\n[ Hits: 2161 | Votes: 9 | Rating: 6.67 ]\n- RT Systems\n- Windows Programming Software by RT Systems\nfor Amateur Radios and Receivers\n[ Hits: 1177 | Votes: 0 | Rating: 0 ]\n- KC8UNJ radio programming software\n- Radio programming programs for YAESU and ICOM handheld transceivers.\nVX-7 Commander, VX-2 Commander, VX-5 Commander, VR-120 Commander, and IC-R2 Commander.\nAll software on this site is designed to work on Windows 9x, ME, NT, 2K, and XP.\n[ Hits: 5482 | Votes: 21 | Rating: 7.76 ]\n- TK10 for IC-R10\n- Radio programming software for the ICOM IC-R10 receiver\n[ Hits: 979 | Votes: 5 | Rating: 7 ]\n- KG-UV Commander\n- Free programming software for the Wouxun KG-UVD1P, KG-UV2D, and similar radios.\n[ Hits: 1616 | Votes: 13 | Rating: 7.46 ]\n- FTM-400 Radio Software\n- The ADMS-M400 software allows you to program memory channels and menu settings of the Yaesu FTM-400 radio\n[ Hits: 1175 | Votes: 27 | Rating: 4.08 ]\n- KG-UV8D Programming Software\n- Wouxun KG-UV8D Standard Programming Software. Used to adjust or expand the frequency range to the full authorized range of the radio and not beyond. 134-174MHz 400-519MHz This software will Not add the 2.5kHz step.\n[ Hits: 365 | Votes: 3 | Rating: 10 ]\n- Olinca TH-888 SV8 Programming Software\n- Free windows software to program or reset cara ht olinca th888a and th888S th888 th10 th2100 th2uv th9 handheld VHF UHF two way radios\n[ Hits: 388 | Votes: 2 | Rating: 5 ]\n- Programming the Quansheng TG-UV2\n- Programming the Quansheng TG-UV2 from a PC, using a kenwood compatible cable and the Quansheng Radio Programming Software for TG-UV-D1.4\n[ Hits: 1670 | Votes: 12 | Rating: 3.75 ]\n- How to program Tytera MD-380 DMR Radio\n- A compleete guide to program the Tytera MD-380 DMR, installing the TYT software, setting the DMR ID and adding the contacts.\n[ Hits: 185 | Votes: 0 | Rating: 0 ]\n- Dual phase Software Defined Radio\n- Dual phase coherent Software Defined Radio using two K2 Elecraft receivers and programming in Matlab/Simulink.\n[ Hits: 921 | Votes: 3 | Rating: 7.67 ]\n- Programming software, diagrams, radio mods, secrets, service manuals for Motorola, Yaesu, Kenwood, Icom, Alinco.\n[ Hits: 22704 | Votes: 79 | Rating: 7.63 ]\nYou can try similar termsradio programming software icom ic-r2 programming software yaesu programming software yaesu programming software programming radio radio programming cables ham radio log software ham radio software mac ham radio software radio ham software ham radio deluxe software icom radio software packet radio software software defined radio software for amateur radio\nGet our links, Everywhere!\nSign up for daily Newsletter\nService provided by Google FeedBurner\nFree for your Site\nAdd our gadgets to your siteDaily Top 10 links", "label": "Yes"} {"text": "This is the sixth and final part of how future smartphones would look like. Imagine using smart glasses that could do the same functions as a smartphone. Learn more here.\nWe continue last weeks series on how phones of the future would look like. This is the fifth part series and we are looking at a phone that would have two different displays.\nImagine having a smartphone that you can change its colors to any color of your choice? This is the fourth part series of what we think phones would look like in the future. Learn more here:\nThis is the third part series of what we think phones would look like in the future. The next big thing in display technology in the near future seems to be flexible displays.\nIt is almost 150 years since the first telephone was invented and patented by Alexander Graham Bell in 1876 and since then the phone has changed in shapes and sizes that everybody owns a phone. Let us look at the evolution of the phone and compare the difference between each phone.\nThis is the part 2 series of what we think phones would look like in the future. Imagine a future where these transmitters are a lot more powerful and can charge devices over-the-air at great distances? Learn more in this write-up.\nDo you remember the first mobile phone you ever owned and where you bought it from? What was the biggest feature on the phone? Technology has come a long way since then. This is a 6 part series of what we think phones would look like in the future.\nDue to how important laptops and computers are in our world, it’s frustrating and stressful when they break, especially if you have an upcoming deadline to meet. These are the three most important reasons they breakdown and how you can manage them.\nLet's talk about 5G, the latest and greatest global network that will transform our lives. 5G will let us download a high-definition or HD movies in seconds and make self-driven cars smarter and safer. So what exactly is 5G?\nA processor, or microprocessor, is a small chip that resides in computers and other electronic devices. This processor handles all the basic system instructions. In this article, we will discover the differences between the Pentium and Celeron processors.", "label": "Yes"} {"text": "How to unbrick a Note 2 without loosing data?\nI just changed the screen of a Galaxy Note 2, and everything worked perfectly.\nWhen I was going to charge it, the phone went into download mode, i figured the charger was faulty, but it worked on another phone.\nWhen I ejected the charger it went black and won't turn back on again. There must be a problem with the charging port, right? I think I've read somewhere that you can put it into download mode by using just two of the pins, in some way. Might this be the case?\nHard reset won't work, there's just no way to jumpstart it.\nIs this a good question?", "label": "Yes"} {"text": "A research team from the Imperial College London and AI and machine learning startup FaceSoft.io announced a joint effort on a new solution called AvatarMe that is capable of reconstructing a photorealistic 3D bust from a source photograph.\nThe team — who announced their work in a paper that was accepted to the Conference on Computer Vision and Pattern Recognition (CVPR) 2020 — say that AvatarMe outperforms similar existing systems and can generate high resolution 3D faces with detailed reflections from low resolution images.\nAs VentureBeat reports, the system created pore-level reflectance maps of 200 different peoples’ faces by using a sphere rig consisting of 168 LED lights and 9 DSLR cameras. Those maps were used to train an AI generative adversarial network model called GANFIT to create its own realistic face maps while simultaneously optimizing them for a facial recognition identity match with the source image.\nGANFIT consists of two parts, the first being a generator that creates samples and the second being the discriminator, which constantly attempts to spot the differences between the generated and real-world samples. The two parts go back and forth doing their job until the discriminator is no longer able to distinguish between the two with more than a 50% expected accuracy.\nThough impressive, the research team acknowledges that AvatarMe still has limitations, though one of its major shortcomings is partially due to the data sample that was used to train the AI model not containing enough samples of various ethnicities. The result of the poorly trained model for some skin types is poor performance on its part when trying to reconstruct the faces of some individuals, highlighting the importance of diversity in sampling for machine learning.\nJune 18, 2020 – by Tony Bitzionis", "label": "Yes"} {"text": "Shure MVi, or Shure Motive MVi, a digital audio interface that connects a microphone or instrument to a computer or mobile device to create a portable recording studio, was announced on January 05, 2015.\nType: Digital Audio Interface\nPrice: US $99\nOn sale @ Amazon.\nShure MVi may require the ASIO4ALL driver to emulate ASIO and run on the Ableton Live digital audio workstation (DAW).", "label": "Yes"} {"text": "Every Canon Powershot SX740 camera needs power to take all those amazing photos and videos, but if you don’t learn proper battery maintenance, your camera will quickly lose its charge. In this guide, we’ll explore exactly how to keep your SX740 battery healthy so that you can keep taking amazing photos and videos for years to come.\nIntroduction to Canon Powershot SX740\nAs one of Canon’s most popular camera models, the Powershot SX740 is beloved by amateur and professional photographers alike for its easy-to-use controls and powerful 40x optical zoom lens. If you’re the proud owner of a Powershot SX740, you know that keeping the battery in top condition is essential to getting the most out of your camera.\nIn this guide, we’ll show you how to properly care for your Canon Powershot SX740 battery, from charging to storage. By following these simple steps, you can extend the life of your battery and ensure that it’s always ready to power up your camera when you need it.\nHow to Properly Charge and Store a Canon Powershot SX740 Battery\nWe all know that batteries are an essential part of any electronic device. Without them, our devices wouldn’t be able to function. This is especially true for digital cameras. A lot of people don’t realize how important it is to take care of their camera batteries.\nIf you have a Canon Powershot SX740, then you need to make sure that you’re properly charging and storing the battery. Here’s a step-by-step guide:\n1. When you first get your Canon Powershot SX740, make sure to read the instruction manual. This will give you all the information you need about the camera and its battery.\n2. It’s important to fully charge the battery before using it for the first time. To do this, simply connect the provided charger to the battery and plug it into an outlet. Leave it connected until the LED light turns green, which means it’s fully charged.\n3. Once the battery is charged, you can insert it into your camera and start using it right away!\n4. When you’re not using your Canon Powershot SX740, be sure to store the battery in a cool and dry place. Avoid extreme temperatures, as this can damage the battery over time.\n5. Before storing the battery for extended periods of time, it’s best to discharge it completely. This will help prolong its lifespan. To discharge the battery, simply use your camera until it shuts\nTips for Getting the Most Out of Your Battery Life\n1. Tips for Getting the Most Out of Your Battery Life\nHere are a few tips to help you get the most out of your Canon Powershot SX battery life:\n1) Be sure to fully charge the battery before using it for the first time.\n2) Store the battery in a cool and dry place when not in use.\n3) Avoid exposing the battery to extreme temperatures, both hot and cold.\n4) Do not allow the battery to become completely discharged before recharging it.\nDetermining when it’s Time to Replace Your Canon Powershot SX740 Battery\nIt’s important to know when it’s time to replace your Canon Powershot SX740 battery in order to keep your camera running smoothly. Here are a few things to look out for that will indicate it’s time for a new battery:\n-If the battery is no longer holding a charge for as long as it used to, it’s probably time for a replacement.\n-If the camera is taking longer to power on or shutting off prematurely, this could also be a sign that the battery needs to be replaced.\n-If you notice any leaking or bulging from the battery, it’s definitely time for a new one as this could damage your camera.\nIf you’re unsure whether or not it’s time to replace your Canon Powershot SX740 battery, consult your camera’s manual or reach out to Canon customer support for assistance.\nTroubleshooting Issues with Your Battery\nIf you’re having trouble with your Canon Powershot SX battery, there are a few things you can do to troubleshoot the issue. First, make sure that the battery is properly installed in the camera. If the battery is loose, it may not make proper contact and will need to be replaced.\nIf the battery is properly installed and you’re still having issues, try charging the battery for at least 8 hours before using it. If the battery still doesn’t hold a charge after being charged, it may need to be replaced.\nIf you’re having trouble with your camera’s batteries, follow these steps to troubleshoot the issue:\n1. Make sure that the batteries are properly installed in the camera.\n2. Try charging the batteries for at least 8 hours before using them.\n3. If the batteries still don’t hold a charge after being charged, they may need to be replaced.\nTaking care of your Canon Powershot SX740 battery is an essential part of extending its life. With the right maintenance, you can make sure that it always delivers peak performance and extends its longevity for many years to come. From using the correct charger to keeping track of the charge level and temperature, following regular maintenance steps can help prolong your camera’s battery life significantly. Keeping your Canon Powershot SX740 battery in good shape will ensure it’s ready when you are to capture those precious memories with ease!\nFAQs: “Canon Powershot SX740 Battery”\nIf you’re like most people, you probably don’t think much about your camera battery until it stops working. Then, you’re scrambling to find a replacement or trying to figure out how to care for it properly so that it lasts as long as possible.\nHere are answers to some frequently asked questions about Canon Powershot SX740 batteries:\nHow long will the battery last?\nThis depends on a number of factors, including the age of the battery, how often it’s used, and what temperature it’s stored at. However, in general, a freshly charged battery should last for around 300 shots. If you find that your battery is draining faster than this, it may be time for a replacement.\nWhat temperature should I store my Canon Powershot SX740 battery at?\nIt’s best to store your camera and batteries in a cool, dry place. Extreme temperatures can shorten the lifespan of your battery.\nCan I leave my Canon Powershot SX740 battery charging overnight?\nIt’s not generally recommended to leave your camera plugged in for extended periods of time. If you’re planning on using your camera the next day, it’s fine to leave it plugged in overnight. Otherwise, unplug it once the charge is complete.", "label": "Yes"} {"text": "After downloading it, simply run the \"PL2303_Prolific_DriverInstaller_v*\" file to install the driver. We recommend doing the driver installation BEFORE plugging the adapter into the USB port.\n2) Plug the adapter into the USB port, Windows will now load the pre-installed drivers automatically. When it is ready, Windows will show a prompt like this:\nRemember the port number. In this case it is COM4. Disconnect the adapter from the computer, but remember which USB port you used.\nIf you did not see the prompt, or close it too early, then you can either simply plug the device into another USB port and wait for the prompt again, or go to Control Panel -> Hardware and Sound -> Device Manager. The adapter is listed under \"Ports (COM & LPT)\", write down the port number for the Prolific port.", "label": "Yes"} {"text": "The ultimate network-connected Arduino-compatible board: combining an ATmega2560 MCU, onboardWiznet-based Ethernet, an ATmega16u2 USB-serial converter, a microSD card slot, and Power-over-Ethernet support, and even an onboardswitchmode voltage regulator so it can run on up to 28V without overheating!\nThe EtherMega is a 100% Arduino Mega 2560 compatible board that can talk to the world. Do Twitter updates automatically, serve web pages, connect to web services, display sensor data online, and control devices using a web browser. The FreetronicsEtherMega uses the same ATmega2560 as the Arduino Mega 2560 so it has masses of RAM, flash memory, and I/O pins, and also includes the same Wiznet W5100 chip used by the official Arduino Ethernet Shield, so it's 100% compatible with the Ethernet library and sketches. Any project you would previously have built with an Arduino Mega 2560 and an Ethernet shield stacked together, you can now do all in a single, integrated board.\nIt has an added a micro SD card slot, so you can store web content on the card, or log data to it.\nBut it gets even better: we found space to squeeze in a small prototyping area, so now it's possible to build a complete, Internet-enabled Arduino device including your own custom parts all on a single board! You don't even need to use a prototyping shield for many projects.\nNote that just like our Ethernet Shield with PoE support, the EtherMega provides a number of options for different Power over Ethernet methods. You can use the supplied jumpers and feed 7-28Vdc down the wire for cheap DIY version, or you can use our PoE Regulator 802.3AF along with a proper commercial PoE injector or switch that supplies 48Vdc. It's up to you.", "label": "Yes"} {"text": "You are here\nThe Award database is continually updated throughout the year. As a result, data for FY23 is not expected to be complete until September, 2024.\nDownload all SBIR.gov award data either with award abstracts (290MB)\nor without award abstracts (65MB).\nA data dictionary and additional information is located on the Data Resource Page. Files are refreshed monthly.\nThe SBIR.gov award data files now contain the required fields to calculate award timeliness for individual awards or for an agency or branch. Additional information on calculating award timeliness is available on the Data Resource Page.\nSBC: Integrated Solutions for Systems, Inc. Topic: A17AT017\nIntegrated Solutions for Systems, Inc. (IS4S) and teammate Auburn University (AU) propose to develop a PNT initialization system for dismounted soldiers. The proposed system will enhance warfighters’ ability to operate immediately in a GPS denied environments once their mission begins and has wide commercialization potential outside of DoD. In Phase I, the feasibility and expected benefits of in ...STTR Phase II 2018 Department of DefenseArmy\nSBC: LONGWAVE PHOTONICS LLC Topic: A17AT007\nThe Tunable Active HEterodyne Terahertz Imager (TAHETI) system will use Terahertz Quantum-Cascade Lasers (QCL) combined with a Schottky diode detector for ultra-high dynamic range heterodyne imaging. Distributed feedback (DFB) QCLs with milliwatt power levels are engineered to emit at slightly offset frequencies, and are used as local oscillator and illumination for imaging. The QCLs will be down ...STTR Phase II 2018 Department of DefenseArmy\nSBC: BAYSPEC, INC. Topic: A16AT012\nBaySpec Inc., in collaboration with Pacific Northwest National Laboratory, proposes to develop a new portable multi-order mass spectrometry system that can sequence peptides derived from biological agents including bacteria, viruses, and toxins. During Phase I stage, a fully functional prototype instrument, based on an innovative design concept, was successfully built and the performance evaluatio ...STTR Phase II 2018 Department of DefenseArmy\nSBC: Cognionics, Inc. Topic: A16AT014\nThis STTR project will develop a wearable sensor suite for accurate assessment of circadian and sleep rhythms with the goal to identify abnormalities in PTSD patients and enable personalized therapy to help restore their normal functional and quality of life. Phase I has already demonstrated proof-of-principle hardware. The primary Phase II objective is to successfully carry out a human subjects s ...STTR Phase II 2018 Department of DefenseArmy\nSBC: Pixelligent Technologies, LLC Topic: A15AT018\nImproving vehicle fuel efficiency for the military can significantly reduce costs and reduce risk to solider safety. One way to improve vehicle efficiency for new and legacy vehicles is to reduce frictional loses in the drivetrain through use of lower viscosity lubricants. However, this comes with the risk of reducing durability of drivetrain components through increased wear, pitting and scuffing ...STTR Phase II 2018 Department of DefenseArmy\nSBC: Digital Analog Integration, Inc. Topic: A15AT005\nThere is an unmet demand for ultra-low-power, ultra-compact and low-cost radios to address emerging sensing and communication needs for military and commercial applications such as IoT/IoE. To overcome the limitations in existing bulky and power hungry radios, we propose a disruptive solution by integration of a nano-scaled THz transceiver, on-chip antenna, and energy harvesting circuits in a form ...STTR Phase II 2016 Department of DefenseArmy\nSBC: Cognionics, Inc. Topic: A16AT014\nThis Phase I STTR project will develop a platform to demonstrate high-quality, multi-modal acquisition of neurophysiological signals, including EEG, heart rate/blood oxygenation via photoplethysmography (PPG), electrodermal (EDA) activity, temperature plus environmental factors such as ambient light and sound in a simple, wearable headband. The hardware will be coupled with the development of a cl ...STTR Phase I 2016 Department of DefenseArmy\nSBC: ADA TECHNOLOGIES, INC. Topic: A15AT010\nADA Technologies, Inc. (ADA) and Dr. Massoud Pedram at the University of Southern California (USC) have successfully completed a Phase I STTR effort for the development of a lithium ion (Li-ion)/ supercapacitor hybrid electrical energy storage system (HEESS) to afford pulse power characteristics (projected ~10 kW/kg) in a high energy system (100-150 Wh/kg). The system is enabled via a constant cur ...STTR Phase II 2016 Department of DefenseArmy\nSBC: NESS ENGINEERING, INC. Topic: A14AT004\nThe objective of this Phase II proposal is to continue the development of a Photoconductive Semiconductor Switch (PCSS) with an integrated optical trigger that can switch at least 30 kV, 1 kA, 20 ns pulses with jitter 108 shots. Ness Engineering, Inc. (NEI) and Texas Tech University (TTU) propose to utilize wide bandgap materials to demonstrate lock-on switching and allow much less optical trigger ...STTR Phase II 2016 Department of DefenseArmy\nSBC: Pranalytica, Inc. Topic: A14AT015\nIn response to the Army STTR Topic A14A-T015 solicitation for tunable high-power LWIR lasers for standoff detection applications, Pranalytica proposed to develop a compact, rugged and highly reliable wavelength tunable quantum cascade laser (QCL) module delivering over 5W of peak power and over 0.5W of average power in the spectral region spanning from 7 to 11m. The proposed approach is based on a ...STTR Phase II 2016 Department of DefenseArmy", "label": "Yes"} {"text": "DUBLIN--(BUSINESS WIRE)--Research and Markets has announced the addition of the \"Electronic Security System Market: Global industry analysis By types (Closed Circuit Television, Access Control and Intruder Alarms), By application (Commercial Offices, Retail, Public Sector, Infrastructure & By region -forecast (2014-2021)\" report to their offering.\nThe electronic security system market is driven by the rising incidents of security concerns. Also improvement in network infrastructure, broadband and internet penetration along with consumer's acceptation for wireless and technologically advanced products is driving the market for electronic security system.\nThis report identifies the Global Electronic Security System Market size for the year 2014-2016, and forecast for the year 2021. It also highlights the potential growth opportunities in the coming years, while also reviewing the market drivers, restraints, growth indicators, challenges, market dynamics, competitive landscape, and other key aspects with respect to Electronic Security System Market.\nGeographically Asia Pacific dominated global Electronic Security System Market, and is projected to have fastest growth, owing to increased surveillance and is expected to grow at a highest CAGR between 2016 and 2022.\n- ASSA Abloy AB.\n- AMAG Technology, Inc.\n- Gemalto N.V.\n- Gallagher Group Ltd.\n- Honeywell Security Group\n- Crossmatch Technologies, Inc\n- Morpho Sa\n- 3M Company\n- NEC Corp\nKey Topics Covered:\n1. Market Overview\n2. Executive Summary\n3. Market Landscape\n4. Market Forces\n5. Electronic Security System Market, By Type\n6. Electronic Security System Market, Application\n7. Global Electronic Security System Market, By Geography\n8. Electronic Security System - Market Entropy\n9. Company Profiles\nFor more information about this report visit http://www.researchandmarkets.com/research/7btfkx/electronic", "label": "Yes"} {"text": "As an Amazon Associate I earn from qualifying purchases.\n1. BIOXO #ad\nWaterproof Onvif IP Camera, 1080P High Speed 30X Zoom PoE Ptz Camera, 328ft Night Vision Auto Tracking Camera, Bioxo PoE Camera Outdoor #adBIOXO #ad\n- 2mp incredible image quality: 1080p at 25fps and 1/2. 8\" sony imx 307 cmos image sensor brings real 1080p fluent video experience, with 8 high-quality infrared lamps to support low-light or backlighting and see human Intelligent auto WDR corrects dark faces under heavy light to ensure a clear image in every lighting environment.\nZoom to capture details of Distant Objects. High speed ptz control: support motion detection alarm push and record video, and 360-degree rotation, no blind angle monitoring, sensitive response, H.264/h. 265 video compression, precision motor drive, accuracy deviation less than 01 degrees, smooth operation, and no jitter at any speed.\nAfter locking the target, the camera will adjust the pan/tilt rotation and lens focal length automatically, capturing clear monitoring targets and auto-tracking moving human. This means that it can transmit video and power through one network cable, eliminating the need for power adapters.\nWired ip cameras with ethernet cable ensures stable and fast data transmission, no signal loss and less disruption & interference. Motion detection & alarm message push :automatically recognize and track moving people, flexible motion detection set detection zone, schedule detection time and adjust sensibility, real-time and accurate movement alert via app push notification, email. Supports onvif protocol Hikvision Dahua XM nvr protocol and mmanagement platform. Intelligent auto switch icr device, night vision ranges up to 328ft which enables you to recognize human clearly during the night.\n2. BIOXO #ad\nPoE Ptz Camera, 328ft Night Vision Auto Tracking Camera, Waterproof Onvif IP Camera, Bioxo 1080P High Speed 20X Optical Zoom PoE IP Camera Outdoor #adBIOXO #ad\n- High speed ptz control: support motion detection alarm push and record video, H. 264/h. 265 video compression, smooth operation, and 360-degree rotation, sensitive response, accuracy deviation less than 0.1 degrees, precision motor drive, no blind angle monitoring, and no jitter at any speed. Built-in innovative aI algorithm CPU, to capture the target accurately and quickly people-oriented.\n2mp incredible image quality: 1080p at 25fps and 1/2. 8\" sony imx 307 cmos image sensor brings real 1080p fluent video experience, with 8 high-quality infrared lamps to support low-light or backlighting and see human Intelligent auto WDR corrects dark faces under heavy light to ensure a clear image in every lighting environment.\nAfter locking the target, capturing clear monitoring targets and auto-tracking moving human. 20x optical zoom & auto tracking:20x super optical zoom and 10x digital zoom, the camera will adjust the pan/tilt rotation and lens focal length automatically, 2.\n0 megapixel 1080P HD. Poe function & d/n vision: this outdoor ptz ip security camera features poe power over ethernet function. Zoom to capture Details of Distant Objects. Image distortion Correction tech will fix common image distortion flaws. Motion detection & alarm message push :automatically recognize and track moving people, flexible motion detection set detection zone, schedule detection time and adjust sensibility, real-time and accurate movement alert via app push notification, email.\n3. PTZOptics #ad\nPTZOptics Live Streaming Cameras, PTZ Cameras with SDI, White, HDMI and IP Control + PoE 30X-SDI #adPTZOptics #ad\n- Up to 1080p60 Resolution. Simultaneous 3g-sdi, HDMI, IP Streaming. Audio line in for HDMI and IP Streaming. Composite Output. Long-distance 30x Optical Zoom.\n4. PTZOptics #ad\nPTZOptics 20x-USB Gen2 Full HD Broadcast and Conference Indoor PTZ Camera Gray #adPTZOptics #ad\n- Wide field of view: the 20x zoom lens offers a wide 607-degree fov with the ability to zoom into narrow a 6. 9-degree. Full 1920x1080p hd resolutions: crystal clear high-definition 1080p video with lossless 20x optical zoom letting you get up close to see and interact with your team.\nOpen source camera control: the ptzOptics 20x-USB Camera includes open source control software which allows users to create a custom controller.\nPlug-and-play usb connectivity: easily connect the camera to your pc to use with cloud based video conferencing services such as: Skype for Business, GoToMeeting and WebEX. This camera is backwards compatible with USB 2. 0 1920x1080p 30 fps. Three simultaneous video outputs: this usb camera can simultaneously send out 1080p video from HDMI, USB 3. 0 and H. 264 or H. 265 ip streaming for maximum flexibility.\n5. PTZOptics #ad\nGray, PTZOptics-20X-SDI GEN-2 PTZ IP Streaming Camera with Simultaneous HDMI and 3G-SDI Outputs #adPTZOptics #ad\n- Low light: 05 lux with noise cancellation via the latest 2D and 3D noise reduction. Simultaneous 3g-sdi, ip and hdmi video outputs for connection flexibility and std VISCA RS232 control.\nIp streaming with rj45 input - dual streaming with H. 264, h. 265 & mjpeg simultaneous high and low bit rate streams. 20x optical zoom for properly targeting your subject. Full 1920x1080 video resolution and 10 IR / 255 RS232 PTZ presets.\n6. AVKANS #ad\nAVKANS NDI Camera, NDI HX 4.0Black, 20X Broadcast Live Streaming Camera for Church and Live Production in New Design #adAVKANS #ad\n- Any question or need any helps, we have a group of customer services team to reply you within 12 hours. There are many useful videos guides, RTSP, H. 264, rtmp, h. 265 video compression, SRT, if you serach, helping you to use it easily. If you need to order this camera without NDI, pls serach B08R5ZD1N3, accurate, don't miss it.\nWe offer free software to help you set up NDI camera network easily. Ndi | hx 4. 5 ndi license included, obs, officially approved by newtek inc ~ Compatiable with vMix, zoom, Skype and other software which supports NDI HX.\nAdvanced features for live production: poe802. 3af, cgi/http protocol, visca/pelco-d/pelco-p/onvif control via rs485 or rs232 or ip, Compatible with Ptzoptics App.\nQuick, it is in promote, and stable focus. Full glass full hd 20x zoom lens: 607degree wide-angle optics auto focus lens for properly targeting your subject. Low light: high snr cmos combined with 2d &3d noise reduction, pls feel free to contact us by email or whatsapp, the video is clean even under low light conditions. We also offer free software to help you setting NDI camera. Full hd video quality: 1920 x 1080p hd resolutions up to 60 frames per second.\n7. ONWOTE #ad\nStarlight Color Night Vision, Add on Camera to ONWOTE PoE NVR, 5 Megapixels 2592x 1944P Super HD Camera, 110° Angle, 100ft IR, ONWOTE 5MP HD IP POE Camera Outdoor Dome, IP66 #adONWOTE #ad\n- Power-over-ethernet, video and audio transmission, Plug n Play-a single network cable provides both power, allowing position cameras anywhere without a power outlet nearby. Video & audio, 5mp ultrahd-view in stunning clarity and sharper details with 5 Megapixels; Built-in microphone to capture audio within 10ft.\nStarlight color night vision-color night vision image in starlight environment;black and white image in 100% darkness. Add on camera to onwote poe nvrwork with onwote 5mp/ 4k poe nvr, can be plug n play; work with standard PoE switch with 48V-54V power supply.\n8. PTZOptics #ad\nPTZOptics ZCam-4X 2.7MP 1080p Full HD Box Camera #adPTZOptics #ad\n- Field of view: the camera has a wide field of view from 28 to 122 and the ability to zoom in to a narrow 28 degrees. Motion detection: the camera has built-in motion detection, a great feature for including the video stream into a security system.\nThe ethernet port can be used for power, control and video streaming.\nLive stream: the camera has the ability to live stream directly from the camera to your favorite CDN. Ethernet: ptzoptics hd-sdi camera models also include PoE. Sensor: a built in 1/2. 7 inch hd cmos sensor captures crystal clear High Definition 1080p video with lossless 4x optical zoom.\n|Manufacturer||PTZ Optics #ad|\n9. AVIPAS #ad\nAViPAS AV-1081G 10x HDMI PTZ Camera with IP Live Streaming, Dark Grey #adAVIPAS #ad\n- Elegant, compact design; super quiet and smooth pan/tilt mechanism. High snr of cmos sensor combined with 2D&3D noise reduction algorithm.\nH. 264/h. 265 video compression. 1920 x 1080 high resolution output with a frame rate up to 60fps. Rs-232 visca/ pelco-d/ pelco-p, visca over IP and IR remote control. 609° wide-angle high-quality lens.", "label": "Yes"} {"text": "Spire Introduces BlueStar LED Series Case Fans\nSpire Corp introduced today their new line of BlueStar DC Fan LED Series. The BlueStar LED fans are high quality, LED colored and silent cooling fans for the PC gamer and PC enthusiast. Based on the original BlueStar fan blade design these new LED series are destined to be a big hit. Top of the line components and features are applied to build these powerful LED fans.\nIncluded is a PWM auto fan speed control and for the ones who like to keep control in their own hands we have also included PCI manual fan speed control unit. To make the BlueStar fan series extra silent we have included 4 rubber anti-vibe mounts to install the fan and stop any fan vibration. Trust the brand with the industry leading experience and 3-year warranty, Spire.\nSpecial fan blade shape and spokes design, ultra silent operation\n4 Crystal blue LED's installed\nSuperior airflow and High air pressure\nPWM fan auto fan control included\nPCI slot manual fan speed control included\nSleeved wires for better airflow, and neat appearance\n3pin + 4 pin PWM connectors\nUV-Reactant, great addition to any PC system\nFor more information, visit the product page.\nLatest News Posts\n- Microsoft's Nokia 230 is here and it's $55\n- Law student caught trying to hack and change his marks for the better\n- Black Friday, $500 off Eurocom laptop with Desktop i7 CPU and GTX 980\n- ESPN subscribers diminish at an alarming rate, streaming is to blame\n- Someone has hacked Street Fighter 5 Beta for the PC\n- ID-Cooling Frostflow 240L CPU Liquid Cooler Review\n- Lexar JumpDrive M20i 32GB OTG iOS Flash Drive Review\n- Gibabyte GA-Z170X- Gaming 7 Supported RAM (2 x16Gb or 4 x 8GB) ?\n- heya! PC-A10 case parts?\n- Enermax ETS-T40fit CPU Coolers Review\n- Team Group Announces Neptune Gaming SO-DIMM Memory\n- Cooltek Announces the Skall Series ATX Mid-tower Chassis\n- Eurocom offers $500 USD off Black Friday & Cyber Monday deal for EUROCOM Sky X9 Desktop Laptop with Intel Skylake desktop class CPUs and NVIDIA GeForce GTX 980 Desktop GPU and 64 GB DDR4 memory\n- MSI @ DREAMHACK WINTER 2015\n- ADATA Releases the Lightning Card Reader", "label": "Yes"} {"text": "来源:http://www.kazinobg.com/ 发布时间:2021-11-11 浏览次数:\nWelding is a very important process in the winding processing of motor products. Welding is a very important link whether it is formed winding or embedded winding, whether it is the connection between winding and lead wire, or the connection between this line in winding. It can be found in the process of fault motor analysis and treatment that there are many electrical faults caused by poor welding quality.\nDifferent motor manufacturers have different treatment processes for this link, but the treatment principle is roughly the same, that is, clean the insulation layer of the electromagnetic wire first. Whether it is enamelled wire or wrapped wire, this link is more troublesome, especially for the case of multiple turns and winding, the cleaning of the electromagnetic insulation is particularly difficult. Some manufacturers use scrapers, Some manufacturers use chemical methods, but no matter which kind, the efficiency is very low. What's more serious is that when the insulation layer of electromagnetic wire is not completely treated, the welding effect is poor, the problems may not be exposed during semi-finished product inspection and motor factory test, and the motor is prone to failure during operation.\nTo solve this problem, professional welding equipment came into being. In the welding process of the equipment, the insulating layer on the electromagnetic line is cleaned by high-temperature heating, and the hot melting method is adopted to melt the welded object into one. It is a very efficient and reliable welding method. Most automatic welding equipment applies inverter technology and microelectronic control technology, which has many advantages, such as accurate control, wide process adaptability, energy saving, high efficiency, stability, simple operation and so on.\nThe above content is about Shandong automatic welding equipment http://www.kazinobg.com/ I hope these contents will be helpful to you. If you have any questions or want more information, please consult our official website. We will serve you wholeheartedly.", "label": "Yes"} {"text": "June 22, 2018\nOne of the easily overlooked features of our nBox-Tool is the ability to display not only smaller PLC packets but the larger aggregate of application protocol PDUs that they comprise together. The feature has its roots in some first hand experience on its usability.\nThere was this one instance when an engineer at a partner company, working on one of Metering application protocols (DLMS) running over PLC was not happy with debug tools they had at that time. They were using a PLC sniffer that could show them all PLC packets. Versatile as it was to capture all PLC packets, application (DLMS) PDUs were nowhere to be seen. The feature-rich GUI showed bits and bytes and protocol headers and footers and CRC and signal quality etc etc ... but the one thing that was most important to the application engineer ... visibility of DLMS PDUs ... was missing. So our colleague was left with no option but to pick HEX streams of PLC packet payloads and try to construct DLMS PDUs from them\nIt is universal among all contemporary PLC technologies to segment application PDUs into smaller chunks at the transmission end while the receiving end would put them together before delivering to higher level application. This is done because smaller the chunk size, higher is the reliability of data reaching the other end to receiver.\nWhile the PLC protocol at the two ends do this splicing and re-joining of application data, the transmitter and receiver (DLMS) applications at the two end-points would stay oblivious of all action happening underneath. In technical jargon, this would be called segmentation-and-reassembly or more simply, just SAR\nA PLC modem cannot facilitate data communication if it does not implement the SAR. It is a mandatory component of the PLC stack and therefore (DLMS) application engineers do not need to deal with it. The story is however different when someone implements a sniffer because a sniffer is a passive element and may choose to only show captured traffic on the wire ... which is the split and spliced version of application PDU.\nWhen starting to design the nBox-Tool, we took a holistic view of developing a product that can not only show PLC activities but can also be of productive use to application engineers. The device therefore not only shows bits-and-bytes at PLC layers, it also aggregates the various PLC segments of an application PDU to show a composite whole to make it meaningful for application protocol engineers to see the larger picture.\nTrying to support all perspectives, we took the analysis information one step further into the application protocol domain where DLMS uses various COSEM objects for identifying various actions. The COSEM objects, with their numbering convention for efficient representaiton need DLMS engineers to keep a cross-reference document handy in order to map the numbers to meaningful physical entities. For some of the common object models, we included the object names within the displayed data.\nAll in all, we see that providing useful features like these, went a long way in making the nBox-Tool a success story that it is today !", "label": "Yes"} {"text": "- Experience unmatched sound quality with the Dynacord L3600FD Live Series DSP Amplifier, delivering a powerful 2x1700W @ 4Ω and 2x3000W @ 2Ω output for crystal-clear audio in live music applications.\n- Benefit from the advanced FIR Drive technology and integrated professional speaker processing, ensuring market-leading acoustic performance and reliability that will elevate your live performances to new heights.\n- Enjoy peace of mind with the true 2 ohm stability, intuitive system control software, and robust protection circuit, making setup and control easy while guaranteeing safe and flawless operation even in the most demanding environments.\nElevate your live music performances to professional levels with the Dynacord L3600FD Live Series DSP Amplifier. Engineered for demanding live music applications, this amplifier is the perfect companion for performing musicians and production companies seeking exceptional sound reinforcement.\nFeaturing a powerful output of 2x1700W @ 4Ω and 2x3000W @ 2Ω, this amplifier ensures unmatched sound quality with plenty of headroom for dynamic performances. The integrated FIR Drive technology and professional speaker processing deliver market-leading acoustic performance and rock-solid reliability, setting a new standard in sound reinforcement.\nDesigned for true 2 ohm stability, the L3600FD amplifier is equipped with intuitive system control software, making setup and control a breeze. With a robust protection circuit, you can trust this amplifier to deliver flawless operation in any environment. Experience the best-in-class features of the Dynacord L Series amplifiers at a more accessible price point, and take your live performances to the next level with exceptional sound quality and professional performance characteristics.", "label": "Yes"} {"text": "Weighted Finite-State Transducers in Speech Recognition\nElectrical and Computer Engineering\nWe survey the use of weighted finite-state transducers (WFSTs) in speech recognition. We show that WFSTs provide a common and natural representation for hidden Markov models (HMMs), context-dependency, pronunciation dictionaries, grammars, and alternative recognition outputs. Furthermore, general transducer operations combine these representations flexibly and efficiently. Weighted determinization and minimization algorithms optimize their time and space requirements, and a weight pushing algorithm distributes the weights along the paths of a weighted transducer optimally for speech recognition. As an example, we describe a North American Business News (NAB) recognition system built using these techniques that combines the HMMs, full cross-word triphones, a lexicon of 40 000 words, and a large trigram grammar into a single weighted transducer that is only somewhat larger than the trigram word grammar and that runs NAB in real-time on a very simple decoder. In another example, we show that the same techniques can be used to optimize lattices for second-pass recognition. In a third example, we show how general automata operations can be used to assemble lattices from different recognizers to improve recognition performance.", "label": "Yes"} {"text": "|Publication number||US3719827 A|\n|Publication date||Mar 6, 1973|\n|Filing date||Jan 29, 1971|\n|Priority date||Jan 29, 1971|\n|Also published as||CA946078A, CA946078A1|\n|Publication number||US 3719827 A, US 3719827A, US-A-3719827, US3719827 A, US3719827A|\n|Original Assignee||Mobil Oil Corp|\n|Export Citation||BiBTeX, EndNote, RefMan|\n|Referenced by (11), Classifications (10)|\n|External Links: USPTO, USPTO Assignment, Espacenet|\nUnited States Patent 91 Dennis 1 March 6, 1973 REGULATING CIRCUIT FOR A PULSED NEUTRON SOURCE Inventor: Charles L. Dennis, Desoto, Tex.\n Assignee: Mobile OilCorporation, New York,\n Filed: Jan. 29, 1971 Appl. No.: 110,934\n US. Cl ..250/84.5, 313/61 S Int. Cl. ..G2lg 3/00 Field of Search ..250/84.5, 83.1; 313/61 S [5 6] References Cited UNITED STATES PATENTS 3,034,008 5/1962 Soloway ..250/83.l X\nPrimary Examiner-James W. Lawrence Assistant ExaminerDavis L. Willis Attorney-William J. Scherback and Frederick E. Dumoulin [5 7] ABSTRACT A pulsed neutron system has an accelerator tube having a target, an ionizing section and a replenisher for supplying accelerator gas. The power supplied to the replenisher is controlled to maintain a constant ionizing pulse time duration. A comparator compares the ionization pulse time duration to the time duration of a reference pulse which is produced each time the accelerator tube is pulsed. The comparator produces a pulse output if the ionization pulse is shorter than the reference pulse. This pulse output is applied to an operational amplifier. Also applied to the operational amplifier is a pulse produced each time the accelerator tube is ionized. The operational amplifier produces a control signal which operates a stepping motor in either a forward or reverse direction. The stepping motor positions a variable autotransformer which increments the voltage applied to the replenisher. The voltage (power) applied to the replenisher is continuously adjusted to maintain a constant ionization pulse width.\n6 Claims, 4 Drawing Figures TRIGGER PULSE GEN.\nEND OF SHORT ION PULSE PATENTEU 51973 3. 7 1 9 82 7 SHEET 10F 2 TRIGGER PULSE GEN.\nEND OF SHORT I} ION PULSE 28 29 1% A 0L a v 32 H 3&5 6 1-- 3115 PATENTEB 61915 3,719,827\nSHEET 2 BF 2 TTE. 2'A\nREGULATING CIRCUIT FOR A PULSED I NEUTRON SOURCE BACKGROUND OF THE INVENTION neutron detector are operated in a borehole which 1 passes through formations of interest. This formation is periodically irradiated with bursts of fast neutrons. The neutrons resulting from the irradiation are detected and the quantity detected is recorded. Copending application Ser. No. 45,458 filed June ll, 1970, Givens, Caldwell, and Mills, Jr. describes such a system. I\nA pulsed neutron generator for such a system commonly takes the form of a three-element linear accelerator tube. It includes a replenisher element which is electrically heated to boil off deuterium gas adsorbed by the filament. The deuterium molecules are ionized by an ionizing section which commonly includes plates to which a positive ionization pulse is applied. The deuterium ions are then accelerated and bombard a target which includes tritium molecules. The bombardment of the deuterium ions on the tritium molecules yields helium plus a supply of neutrons This reaction Commonly, such a tube can be operated to produce neutrons per pulse at two pulses per second. The neutrons commonly have an energy of approximately 14 m.e.v. One commercially available tube which is capable of such operation is the Kaman Nuclear Model A-80l Neutron Generator.\nIn operating such a tube it is important that the power supplied to the replenisher be correctly adjusted so that the proper amount of accelerator gas, deuterium as described above, boils off the replenisher element. If the replenisher is overheated, too much accelerator gas boils off. In this case, ion recombination takes place in the tube. Also, arcing in the tube shortens the tube life and neutron output falls off. If too little power is supplied to the replenisher, there is not enough accelerator gas available in the tube to provide a good neutron output.\nThe adjustment of the power supplied to the replenisher is complicated by the fact that the characteristics of the tube change as the tube ages. That is, after the tube has been in use, a greater amount of power must be supplied to the replenisher to boil off the same amount of accelerator gas. In tubes such as the aforementioned Kaman tube, a semiautomatic adjustment is provided for the replenisher supplyvoltage.\nWhile semi-automatic control of the replenisher is acceptable for use in a laboratory, for example, it is not suitable for field use. In particular, it is not suitable for use in a well logging system wherein (a) the tube is encased in a logging tool and is inaccessible to the operator during the time that it is in use, and (b) it must always provide optimum neutron output during the normal lifespan of the tube.\nSUMMARY OF THE INVENTION In accordance with an important aspect of this invention, the power supply to the replenisher element in a linear accelerator tube is automatically controlled. Further, in accordance with this invention the operating parameter which is monitored is the time duration of the ionization pulse. If too much accelerator gas is boiled off the replenisher, the time duration of the ionization pulse is shorter than normal. If too little accelerator gas is boiled off, the time duration is longer than normal. By comparing the time duration of the ionization pulse to a reference pulse, a control signal is generated which continuously adjusts the power supplied to the replenisher to maintain the ionization time substantially constant.\nIn one specific embodiment of the invention, the regulator includes a comparator to which the ionization 'pulse is applied. Each time an ionization\" pulse is generated, a reference pulse of constant time duration is generated and applied to the comparator. If the ionization pulse is shorter in duration than the reference pulse, a pulse output is produced. This pulse output is applied to an operational amplifier. The other input to this operational amplifier is a pulse produced each time the accelerator tube is ionized. If both pulses are present at the inputs of the operational amplifier, a control signal is applied to a motor which steps the motor in one direction. If only one pulse is present, the motor is stepped in the other direction. Each time the accelerator tube is ionized, the motor is advanced in one direction or the other. This motor increments a variable auto-transformer which supplies power to the replenisher. In this manner, the replenisher power is continuously adjusted to supply the correct amount of accelerator gas to the tube.\nIn accordance with another aspect of this invention, the regulator circuit produces accurately timed high voltage pulses for the ionizing section and the target of the tube.\nThe foregoing and other objects, features and advantagesof the invention will be better understood from the following more detailed description, appended claims and drawings.\nDESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of the regulator system of this invention;\nFIG. 2A shows an ionization pulse which is of too short duration;\nFIG. 2B shows an ionization pulse of normal duration; and\nFIG. 2C shows an ionization pulse having a time duration which is too long.\nDESCRIPTION OF A PARTICULAR EMBODIMENT Referring to FIG. 1, the pulsed neutron system includes an accelerator tube 11 having a target 12, an ionization section including plates 13 and 14, and a replenisher 15 for supplying accelerator gas.\nDeuterium ions emitted by the replenisher are ionized by a +5 kv ionization pulse applied across the plates 13 and 14. The deuterium ions are accelerated toward the target 12 by a l20 kv pulse applied to the target. The generation of the +5 kv ionization pulse and the generation of the -l20 kv pulse applied to the target 12 will first be described.\nEnergy for the production of these pulses is stored in the storage capacitor 16. This energy is generated by a 110-volt, 400-cycle source which is connected to the primary of the transformer 17. The secondary winding of transformer 17 produces a voltage of approximately three to 5 kilovolts. This voltage is rectified as indicated by the halfwave rectifying diode 18. The rectified voltage is applied to the storage capacitor 16 which is periodically discharged by a switch. The switch includes the xenon-filled triggerable spark gap 19. A trigger pulse generator 20 generates the trigger pulses which fire the spark gap 19 at periodic intervals, the interval being two pulses per second in one embodiment of the invention.\nEach time the spark gap 19 is triggered, the energy stored in capacitor 16 is applied to the primaries of transformers 21 and 22. The secondary winding of the transformer 21 produces a positive S-kilovolt pulse which is applied to the plates 13 and 14 to ionize the accelerating gas in the tube. These positive ions are then accelerated toward the target 12 by a l20 kv pulse applied to the target. Since the ionization process requires a finite amount of time whereas the acceleration is relatively instantaneous, the acceleration pulse is delayed from the ionizing pulse. A delay line 23 provides approximately a 7 microsecond delay for the acceleration pulse relative to the ionization pulse. The delay line 23 also acts as a tuned circuit with capacitor 24. This circuit is tuned to most efficiently transfer energy from the storage capacitor 16 to the target 12 of the tube.\nBefore describing the regulator circuit for the replenisher, the importance of providing regulation will be described with reference to FIGS. 2A-2C. FIG. 2B shows the normal width ionization pulse appearing across the plates of the ionization section. For the Kaman tube previously referred to, the suggested time duration of this pulse is approximately three microseconds. If the replenisher boils off an overabundance of accelerator gas, then the ionization pulse will be more quickly loaded to the ionization potential. This is shown in FIG. 2A wherein the ionization pulse prematurely drops to the ionization potential 25. On the other hand, if there is not sufficient accelerator gas supplied from the replenisher, a longer time is required for ionization. This is shown in FIG. 2C wherein the ionization pulse has a time duration which is longer than is desired. It is desired to regulate the power supplied to the replenisher so that the ionization pulse is always of approximately the nominal time duration, in this case approximately 3 microseconds. The regulator circuit for accomplishing this includes an attenuator 26 for attenuating the ionization pulse to a level which can be accommodated by digital logic circuits. That is, the attenuator may be through of as generating an ionization pulse having the same time duration as the ionization time of the accelerator gas in the tube 11.\nIn FIGS. 2A-2C note that there is noise present. It is desired to measure the time duration of the ionization pulse above the level of this noise. In order to do this, a Schmidt trigger 27 is provided. The Schmidt trigger 27 comprises two Nand gates 28 and 29 which produce a square pulse having a time duration which is the same as the time duration of the ionization pulse above the noise. The negative-going pulse which is the output of Nand circuit 28 is applied to a comparator which includes the Nand gates 30 and 31. A reference pulse is produced by the one-shot multivibrator 32 each time that the accelerator tube 11 is fired. If the ionization pulse is of shorter duration than the I i-microsecond reference pulse, the Nand gate 30 (comparator) and the Nand gate 31 (inverter) produce a positive-going pulse. This pulse is used to trigger a pulse generator 33 which generates a positive-going pulse of accurately controlled width. In the embodiment under consideration, the pulse width is 0.1 second. This 0.1 second pulse is applied to one input of the operational amplifier 34. The operational amplifier 34 producesa control signal which is applied to a control element. In this example, the control element includes a permanent magnet D.C. motor 35 which drives the variable autotransformer 36. The variable autotransformer 36 applies power to the replenisher'15. r\nAnother input to operational amplifier 34 is from a pulse generator 37 which is triggered each time an ionization pulse is produced. The pulse generator 33 has the capability for trimming the pulse width so that the pulse output from the generator 33, if one is present, coincides exactly in time (0.1 second) with the pulse output from the generator 37. The output of pulse generator 33 is applied to the input which has a positive X 2 amplification. The output of pulse generator 37 is applied to an input of operational amplifier 34 which has a negative X l amplification. The result is that the control signal produced by the operational amplifier 34 is a positive-going pulse if the time duration of the ionization pulse is too short. Alternatively, the control signal from the operational amplifier 34 is a negative-going pulse if the time duration of the ionization pulse is too long. Each time the accelerator tube 11 is fired, the operational amplifier 34 produces a pulse which increments the motor 35 in one direction or another. Because of this, there is continuous hunting of the regulator system around the null point. However, this minor disadvantage of continuous hunting is more than offset by the simplicity of the control system which is a particular requirement for the pulsed neutron system being described.\nIn one embodiment of the invention, a current of approximately 2 amperes is applied to the replenisher element 15. The motor 35 moves the variable autotransformer 36 in increments which change the current by approximately 10 milliamperes. This provides an acceptable regulation for the system described.\nThe following are typical circuit elements used in one embodiment of the invention. They are given by way of example only and are not to be considered to be limiting of the invention. The Nand gates 28, 29, 30, and 31, the one-shot multivibrator 32, and the pulse generators (also one-shot multivibrators) 33 and 37 are integrated circuits manufactured under the trade name High Threshold Logic by MOtorola. The xenon-filled trigger volt spark gap is manufactured by e.g. The stepping motor 35 is a Globe permanent magnet D.C. motor. The variable autotransformer 36 is a Superior Model IHSOIOK.\nAs previously mentioned, the Kaman Model A-801 linear accelerator is suitable for use as the tube 11. Transformer 17, 21, and 22 may be those manufactured by Geotronics, Power Designs, and Kaman Nuclear, respectively. A storage capacitor suitable for use as the capacitor 16 is manufactured by Maxwell Labs.\nBriefly, the operation of the system is as follows. The trigger pulse generator 20 produces repetitive pulses of approximately tow per second. Each pulse triggers the spark gap 19 which discharges the capacitor 16 into the transformers 21 and 22. The aforementioned 21 produces an ionization pulse of approximately 5 kv which, applied to the ionization section including plates 13 and 14, ionizes deuterium molecules boiled off of the replenisher 15.\nA short time later the transformer 22 produces a l20 kv acceleration pulse which is applied to the target 12. Bombardment of the target 12 by deuterium atoms initiates a reaction which liberates a burst of neutrons.\nThe regulation of the power supplied to the replenisher is provided by a control circuit which compares the time duration of the ionization pulse with the time duration of a reference pulse produced by the one-shot multivibrator 32. The comparator, including NAND circuits 30 and 31, produces a pulse if the ionization pulse is shorter in duration than the reference pulse; otherwise no pulse is produced by the comparator. When the comparator produces a pulse, the pulse generator 33 applies a pulse input to an input of operational amplifier 34 which amplifies that pulse by two times. Since the pulse applied by pulse generator 37 is amplified only by unity (-1), the control signal produced by operational amplifier 34 is a positive pulse. This increments the motor 35 in a direction which decreases the power supplied to the replenisher 15.\nConversely, if the time duration of the ionization pulse is not shorter than the time duration of the reference pulse, only the pulse generator 37 applies a pulse to the operational amplifier. This produces a negative-going pulse as the control signal. This negative-going pulse increments the motor 35 in a direction which increases the power supply to the replenisher 15.\nWhen the time duration of the ionization pulse is nominal, that is, it approximates the time duration of the reference pulse, the motor 35 will be alternately stepped in one direction and then another on successive bursts ofthe accelerator tube 11.\nWhile a particular embodiment of the invention has been shown and described, various modifications will be apparent. The appended claims are, therefore, intended to cover any such modifications.\nWhat is claimed is:\n1. A pulsed neutron system comprising:\nan accelerator tube having a target, an ionization section and a replenisher for supplying accelerator gas,\na control element for varying the power supplied to said replenisher in response to a control signal,\nmeans for generating an ionization pulse having the same time duration as the ionization time of the accelerator gas, and\na comparator, said ionization pulse being applied to said comparator, said comparator producing a control signal representing the deviation of the time duration of said ionization pulse from a reference, said control signal being applied to said control elementto control the power su plied to said replenisher at a level which main arm the ionization time of each neutron pulse substantially constant. 2. The system recited in claim 1 wherein said comparator comprises:\nmeans for producing a reference pulse, having a nominal time duration, each time said accelerator gas is ionized, and\nmeans for comparing the time duration of said reference pulse to the time duration of said ioniza tion pulse to produce a control pulse when one time duration is shorter than the other time duration.\n3. The system recited in claim 2 wherein said control element comprises a motor which is stepped in one direction by said control pulse to change the power supplied to said replenisher.\n4. The system recited in claim 3 wherein said comparator further comprises:\nmeans for producing a pulse which steps said motor in the opposite direction when said one time duration is not shorter than said other time duration.\n5. The system recited in claim 1 further comprising:\na storage capacitor,\nmeans for charging said capacitor to a high voltage,\nswitching means for periodically discharging said capacitor to produce a high voltage ionization pulse applied to said ionization section.\n6. The system recited in claim 5 further comprising:\ndelay means responsive to said switching means for producing an accelerating pulse applied to said target, said accelerating pulse being delayed with respect to said ionization pulse.\n|Citing Patent||Filing date||Publication date||Applicant||Title|\n|US3965434 *||Dec 1, 1972||Jun 22, 1976||Shm Nuclear Corporation||Automatic frequency control system for driving a linear accelerator|\n|US3984694 *||Feb 13, 1975||Oct 5, 1976||Mobil Oil Corporation||Pulse width regulator for a pulsed neutron source|\n|US4092545 *||Sep 8, 1976||May 30, 1978||Texaco Inc.||Means and method for controlling the neutron output of a neutron generator tube|\n|US4298805 *||Mar 27, 1980||Nov 3, 1981||Mobil Oil Corporation||Regulator for a pulsed neutron source|\n|US4404163 *||Dec 3, 1980||Sep 13, 1983||Halliburton Company||Neutron generator tube ion source control system|\n|US4432929 *||Jul 17, 1981||Feb 21, 1984||Halliburton Company||Pulsed neutron generator tube power control circuit|\n|US4487737 *||Jan 25, 1982||Dec 11, 1984||Halliburton Company||Pulsed neutron generator control circuit|\n|US4581194 *||May 17, 1985||Apr 8, 1986||Mobil Oil Corporation||Method and system for controlling an accelerator-type neutron system|\n|US5536938 *||Feb 22, 1995||Jul 16, 1996||Mobil Oil Corporation||Pulsed neutron decay logging|\n|US6985553 *||Jan 24, 2003||Jan 10, 2006||The Regents Of The University Of California||Ultra-short ion and neutron pulse production|\n|US20040146133 *||Jan 24, 2003||Jul 29, 2004||Ka-Ngo Leung||Ultra-short ion and neutron pulse production|\n|U.S. Classification||376/119, 376/109|\n|International Classification||H05H3/00, H05H3/06, G01V5/00, G01V5/10|\n|Cooperative Classification||H05H3/06, G01V5/108|\n|European Classification||H05H3/06, G01V5/10D2|", "label": "Yes"} {"text": "Best Digital Photo Frame With Motion Sensor\nIf you want to save the most memorable moments of your life, a digital photo frame with motion sensor is a solution. Choose one of the best digital photo frame with motion sensor and enjoy watching your shots in a great quality! After research we...\nRechargeable Batteries For ARLO Camera\nThis is a great rechargeable battery kit and we'll end up saving you money in the long run of things. Once I place these charge batteries in my Arlo cameras I have been able to get about three months of video coverage before have to...\nSmallest Spy Camera Wireless\nIf you’re looking for the best smallest spy camera with wireless, we’re here to help If you’re looking for a new spy camera wireless you’ve come to the right place, because we have collected the smallest spy cameras here. But before we dive right in,...\nSuper Hunter Trail Camera\nThe trail camera is a simple tool—a box that takes pictures when objects move past it—that is powered by advanced technology. In recent years, picking the right camera has gotten as complex as the tech itself. Now, dozens of companies offer camera models that each...\nBest Sellers in DSLR Cameras\nNew CANON DIGITAL CAMERA EOS REBEL SL3 (BK) Body from $549.00\nNew Nikon D7500 Dual Zoom Lens kit $1,396.95\n- Video Camera Camcorder 4k kicteck Ultra HD Digital Wifi Camera Review\n- Sandmarc Mavic PRO Filters Review\n- Polar PRO Mavic Filters Review\n- Best Long Range Rifle Scopes\n- Amcrest Prohd 1080p Wifi Wireless IP Security Camera Review\n- Canon Rebel T6 Digital SLR Camera with 18-55mm Lens Review\n- Refurbished Iphone 6 Unlocked 64GB Reviews\n- Amazon Cloud Cam Security Camera works with Alexa review", "label": "Yes"} {"text": "Orion Energy Systems Inc. has developed intelligent occupancy sensor technology designed to save energy while enhancing lamp and ballast longevity. Able to be integrated with existing fixtures, InteLite® occupancy sensors collect data regarding the presence of people who routinely move through a space during a 24 hour period. The sensors have the ability to adapt the lighting schedule based on this intelligence and to adjust the settings of each fixture automatically to stay on longer or turn off sooner.\nThe sensor technology also features an adjustable field of view, allowing users to change the direction the sensor focuses, increasing its reliability to turn on when needed.\nThe InteLite® occupancy sensor technology is a new addition to Orion’s Phase II InteLite® family of products. When the sensors are used in conjunction with Orion’s InteLite® control system, facility personnel can control, monitor, and adjust the settings of each light fixture remotely. The system also includes technology that measures and verifies energy savings.\nIn a project completed recently, the actual cost to operate the lighting system was reduced from $285 per high-intensity discharge fixture to $44 per fixture a year when the occupancy sensor was used with Orion’s Compact Modular™ lighting platform and InteLite® control system.\nOrion is deploying these advanced occupancy sensors at facilities for PepsiAmericas and Sysco Foods as well as other commercial and industrial customers.\nYou might like:\n- 4 Ways To Avoid LED Lighting Failure\n- Question of the Week: How Can I Protect Employees From Zika Virus?\n- VARIDESK Debuts Pro Desk 60 On HBO’s “Silicon Valley”\n- Spray Kleen Multi-Surface & All-Purpose by Sunburst Chemicals\n- Lunetta Exterior Lighting By Amerlux\n- Infographic: The Healthcare Speech Privacy Crisis\n- Energy Upgrades And Renovations: What To Know About Windows\n- Energy Storage Solution From Northern Power\n- Look, Listen, And Learn To Find Leaks\n- Five Things To Consider When Starting A Predictive Maintenance Program\n- Best Practices For Data Center Management\n- DCIM For Facility Management\n- Technology, Aging Facilities Impacting Education Facility Budgets\n- ISEA Seeking Input For Revision Of High-Visibility Worker Apparel Standard\n- Question Of The Week: Water Conservation Tips", "label": "Yes"} {"text": "The GlobeCore company more than 50 years is manufacturing vortex layer units. The electromagnetic vortex layer unit (AVS) is applied to intensify the process of\n· wastewater treatment\n· acid water neutralization,\n· sewage water treatment,\n· water purification and disinfection.\nAll the processes occur continuously without tanks with mixers. Processes are intensified in the AVS by mixing and dispersion of components, acoustic and electromagnetic influence, cavitation, high local pressures , and electrolysis.\nThe AVS electromagnetic vortex layer units are highly efficient in the decontamination of the industrial waste streams.\nChemical and physical processes in the vortex layer devices are intensified and accelerated due to the intensive dispersion and mixing of the processed material, acoustic and electromagnetic influences, high local pressures, electrolysis, and other factors. All the processes above occur in the same chamber.", "label": "Yes"} {"text": "Each KIB controller (light switch) is specific to what it controls. So, if you have one, like the kitchen controller it turns on the water pump, counter lights and maybe the overhead lights. It has a model number on the back side. If you were to order that specific controller from Newmar, by that model number, and then install it in the bedroom, it will still turn on the water pump, counter lights and overhead lights.\nYou can't create your own control that has specific things you want to turn on and mount somewhere in the coach. You can only buy a controller that is already available through Newmar. No custom controllers.\nThe most common addition is to buy that kitchen controller and mount it to a spot that is more easily accessible than where Newmar installs them, such as the link provided in the post above.\nSince each controller is kind of like a minicomputer, all you have to do is \"tap\" into the grey shielded wire running around the coach. It has three wires inside. Just tap the new to controller to the wires (color to color) and it will send a signal specific to that controller.\nWith that said, on my 2019 DS, I added a second controller to the kitchen, as Newmar had made the controller a little easier to reach, but still not in a good spot. The new controller came with a pigtail. I pulled the OEM controller, and it had a \"Y\" cable and spare pigtail so you could daisy chain it. I got lucky and was able to just plug the new controller in.\nDon & Mary\n2019 Newmar Dutch Star 4018 (Freightliner)\n2019 Ford Raptor", "label": "Yes"} {"text": "GlobalFoundries is a leading full-service semiconductor foundry providing a unique combination of design, development, and fabrication services to some of the world’s most inspired technology companies. With a global manufacturing footprint spanning three continents, GlobalFoundries makes possible the technologies and systems that transform industries and give customers the power to shape their markets. For more information, visit www.gf.com.\nSummary of Role:\nGlobalFoundries is seeking a highly motivated engineer to join our US Frame Design team to develop automation that enables rapid, high quality new product introduction in our worldwide semiconductor fabs. Position is based in Burlington, Vermont.\nThe US Frame Design team, residing within the Tapeout organization, which has peer teams located in Singapore & India:\n- Develops Frames bordering internal or client supplied chip designs to support the generation of semiconductor testsite and product masks for Fab 8 (Malta, NY) & Fab 9 (Essex Junction, VT) & Fab 10 (Fishkill, NY) advanced technology development.\n- Creates numerical representations and documentation of the Frame for use during wafer manufacturing or post wafer operations by our Foundry clients. Optimized wafer layout for fab and client productivity.\n- Programs, tests and supports the Frame generation infrastructure to ensure high availability and quality operation is sustained during development as well as production manufacturing.\n- Coordinates specifications and verification for Frame structures and placement requirements with Technology Development, Process Integration, Patterning, Metrology, Photolithography, Characterization, Data Preparation, Design Services, Mask tech and Frame Design teams, to enable frame structure generation.\nEssential Responsibilities Include:\n- Develop frame automation to enable rapid, high quality new product introduction.\n- Engage in daily Frame activities include frame build, issue debug, work queue prioritization, and work hand-off across geographic locations.\n- Develop new and enhanced Frame generation infrastructure to enable rapid, high-quality support of advanced technology development.\n- Individually perform as well as lead others on the customization or validation of software code and layout tools used to generate reticle level designs, documentation and numerical files that drive automation within globally located Fabs or Mask Houses.\n- Participate in planning, management, and execution of cross functional projects.\n- Collaborate with peer Frame teams located in the US, India and Singapore.\n- Document and institutionalize Best Practices and Training Material.\n- Ensure that processes are well documented, and that failure modes are assessed and have mitigation and detection in place.\n- Perform all activities in a safe and responsible manner and support all Environmental, Health, Safety & Security requirements and programs\n- B.S. in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, or related discipline in STEM\n- B.S. in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science or related discipline in STEM with 6 years of relevant experience or M.S. in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science or related discipline in STEM with 5 years of experience or PhD. with 3 years of experience in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, or related discipline in STEM.\n- Experience in semiconductor industry inclusive of design, tapeout, new product introduction and semiconductor fab setup with knowledge in related areas such as mask data preparation, in-line metrology, reticle construction and manufacturing, testchips, reticle frame building, OPC or mask manufacturing.\n- Experience in software engineering (preferred languages are Java, Perl, Python), shell scripting on a Linux platform and relational database experience (SQL).\n- Knowledge of Cadence MaskCompose or similar software package.\nApply for job\nTo view the job application please visit gfoundries.taleo.net.", "label": "Yes"} {"text": "The MX.70xx series of fast digital I/O boards offer a resolution between 1 bit and 32 bit with a maximum sampling rate of 125 MS/s (60 MS/s). Every 16 bit / 32 bit of the board can be separately programmed for input or output. The on-board memory of up to 128 MByte can be completely used for recording or replaying digital data.\n|PT-100 Temperature Probe-12753||\nThe PT-100 temperature probe provides accurate, stable readings with fast response time over a range of -70 to 400 °C, and is well suited for a variety of temperature applications.\n|External Temperature Probe for DaqPRO-DT332||\nThe NTC temperature probe connects to any of the eight external inputs of the DaqPRO data loggers to support measurement over a range of -50 to 150 °C.\n|ACE Complete Integrated BC-RT-MT Terminal:BU-6517X,BU-6158X||\n• Complete integrated interface between a host processor and a MIL-STD-1553 A and B or STANAG 3838 bus.\n|High-Power Synchro Booster Amplifiers:SBA-3500x||\n• 90V, 60 or 400Hz Synchro Outputs\nIntermittent and catastrophic faults in electronic control systems can now be prevented with Ridgetop Group’s SJ BIST™. The SJ BIST (Solder Joint Built-In Self-Test) technology accurately detects and reports instances of high resistance, including intermittent opens, in field programmable gate arrays (FPGAs)-to-board interface.\n|Sentinel Interconnect||Ridgetop Group|\nThe MC.70xx series of fast digital I/O boards offer a resolution between 1 bit and 64 bit with a maximum sampling rate of 125 MS/s (60 MS/s). All I/O lines of the card can be programmed for either input or output direction. The on-board memory of up to 512 MByte can be used completely for recording or replaying digital data.\n|Micro-ACE-TE, and PCI Micro-ACE-TE-BU-6474xB, BU-6484xB, BU-6486xB, BU-6584xB, BU-6586xB||\n• Supports MIL-STD-1553 A/B, MIL-STD-1760, STANAG 3838 and MacAir Protocols", "label": "Yes"} {"text": "When you’re trying to connect a USB VGA adapter for the first time, you may run into some significant problems. Here are some of the most commonly reported problems with installing USB VGA adapters to hardware setups.\nGeneral Driver Issues\nTypically, each kind of device that is attached to a computer needs its own driver. The driver is a software piece that helps the computer to recognize the accessories and their intended uses. Without the right drivers for a USB VGA connection, companies cannot ensure that their products will work successfully with a home or commercial hardware setup.\nGeneral Video Card Issues\nOutput to a VGA or video graphics array screen requires a certain kind of video card capacity on the computer. Computers without video cards will not be able to utilize a USB VGA connection successfully.\nPrimary Display Issues\nSome monitors and screens or other hardware have restrictions that are built-in. These may include a software component that blocks the USB VGA output from becoming the primary display. This can cause frustrations if a user has to find the right display settings to make use of this kind of adapter.\nDVD Playback Issues\nSome kinds of DVD player technology don’t work with just any kind of video connectivity. This can be another issue facing consumers who are installing a USB VGA adapter that is meant to route a VGA signal to a VGA monitor using USB connectivity.\nWindows Media Player Issues\nAlong with being sure that you have the right codecs for video files in Windows media player, there also may be some Windows media player settings that are not compatible with a certain kind of video output. If you encounter problems with Windows media player, try different video players to see if the problem can be isolated.\nLow Refresh Rate Settings\nThe refresh rate for updating a video image can be set too low to accommodate a VGA output. If you encounter visual problems with an existing image, they may be due to a low refresh rate. Look for specific information in your computer manual for repairing any issues with low refresh rate settings.\nScreen Resolution Issues\nIt’s important that video screens and monitors have enough screen resolution to handle the VGA signals being outputted to them. Check your screen resolution capacity for your monitor when you are adding it to a hardware system using a USB VGA connector or adapter.\nSome troubleshooting for USB VGA adapters just involves making sure that everything is plugged-in correctly. If problems do occur, do a quick double-check to ensure that they are not related to incorrect plugins. You’ll also want to look at your home or commercial wireless network if this applies to your USB to VGA graphic or video output.\nThe above issues can happen when buyers install USB VGA adapters. Hooking up old VGA technology using Universal Serial Bus connectivity can be frustrating if parts or devices are not compatible. This can be one of the trickier jobs for those looking to upgrade display capacity for hardware. It helps to buy from companies that provide direct tech support, in case problems do arise.", "label": "Yes"} {"text": "What are the pinouts for the power supply/subwoofer?\nI have a TAM which was working last time I tried it several years ago. Since then it has been in storage. I just set it up again and get no response. I'd like to determine if it is the power supply so I need to know the pinouts.", "label": "Yes"} {"text": "Computer graphics lecture notes computer science department university of toronto version: 16 animation 110 161 overview. Majors overview animation art history ceramics experimental and computer animation, eva louise hall has been teaching with the kansas city art institute. “almost every influential person in the modern computer-graphics community either passed through the university of utah or came into contact with it in some way. 15 a brief history of computer animation 16 summary 91 overview of virtual human representation where he teaches computer graphics and computer animation. Overview animators need more computer animation: you’ll learn 2d and 3d animation techniques and prepare to apply them using sophisticated, history of.\nHistory make a gift use in visual effects and computer animation this course is an overview of how to use 3d proceed into a career in computer animation or. A study on the impact of computer animation on children in the present study provides an overview on the effects has its own local folk tales history. Overview of this lesson finally we'll extend this construction to cubic curves which are used in animation at pixar. Security policies governing use of computer resources overview dreams these skills range from pre-production all the way to post-production in an animation.\nGlobal animation industry report 2016 - the most authoritative global animation industry analysis. The bachelor of arts offers a full overview of what's going on in animation to basic animation principles and history, and computer animation. History of computer animation - 한신대학교 컴퓨터공학부 류승택 2009 년 2 학기 what is animation an ・ i ・ ma ・ tion (n) a motion.History & mission helpful links for computer animation, computer music, recording technologies, interactive stagecraft, overview bs in computer science. The art of 3d computer animation including new material on the latest character and facial animation techniques and an overview of the (economic history. Provides computer animation career information learn how to become an animator, and where the jobs are in this industry. Compositors construct the final image by combining layers of previously-created material, including computer animation, special effects, graphics,.\nUniversity of kent courses postgraduate 2018 computer animation computer animation - msc feminism and art history the university of kent makes every effort. This computer animation transparently illustrates how subsidence at oak flat will develop over time throughout the block cave mining process, which unfolds. Inflation & prices overview many animation companies have their own computer animation software many multimedia artists and animators use computer programs.\nHistory and context places animation within an animation production provides you with a comprehensive overview of whilst in animation and computer games. School of art and design applications accepted for fall only nysed: 21881 hegis 1099 the major in computer animation and interactive media offers. Find #1 rated animation articles about 3d having the history and knowledge of animation from individuals like ollie johnston a 37-year-old computer.", "label": "Yes"} {"text": "Louver & recessed luminaires\nLouver luminaires comprise a numerous group of ceiling fittings for general lighting of office space and other premises, while maintaining a high degree of anti-glare protection. A major purpose of these fittings is to act on linear fluorescent lamps. Louver luminaires for linear fluorescent lamps T5 are the foundation for modern, energy-saving and ecological room lighting. Louver luminaires for fluorescent lamps T5 are the principal element of modern, energy saving and ecological lighting of closed space. They make possible the use of intelligent systems to control artificial lighting depending on the intensity of natural light. LUG louver luminaires include the latest technical solutions which allow such control of lighting that the lighting system is able to reveal persons at work posts and adapt the amount of generated light to current requirements, depending on the amount of daytime light.", "label": "Yes"} {"text": "|Publication number||US4959535 A|\n|Application number||US 07/418,976|\n|Publication date||Sep 25, 1990|\n|Filing date||Oct 10, 1989|\n|Priority date||Jun 11, 1987|\n|Also published as||CA1292776C, EP0295107A1, WO1988010034A1|\n|Publication number||07418976, 418976, US 4959535 A, US 4959535A, US-A-4959535, US4959535 A, US4959535A|\n|Original Assignee||British Telecommunication|\n|Export Citation||BiBTeX, EndNote, RefMan|\n|Patent Citations (4), Non-Patent Citations (6), Referenced by (48), Classifications (18), Legal Events (5)|\n|External Links: USPTO, USPTO Assignment, Espacenet|\nThis is a continuation of application Ser. No. 314,760, filed Feb. 2, 1989, now abandoned.\nThe invention relates to a receiver circuit for receiving a modulated optical signal and for generating a corresponding electrical signal using an optical detector which behaves as a current source and to a method of constructing such a receiver circuit.\nIt is well known that optical receivers for direct detection systems can be made more sensitive by using an \"integrating\" design incorporating a large load resistor for the photodiode. Thus if S is the symbol rate, R the load resistor and CT the total capacitance of the front-end of the receiver, one chooses R>>1/2πSCT and one recovers the pulse wave-form subsequently by differentiating in a pre-equalising stage. The reason for doing this is that the receiver noise is then no longer dominated by the thermal noise of the load resistor. Instead it is dominated by the series noise of the pre-amplifier stage, i.e. by the channel noise in the case of an FET front-end and by the base and collector current shot noise in the case of a bipolar transistor front-end. This series noise source has an essentially white (constant) spectral density, so that after the differentiating pre-equaliser stage a dominant noise spectral density component proportional to frequency squared is produced. This noise spectral density component will be referred to as f2 noise hereafter. Its effect on the receiver output noise power is kept under control by a low-pass filter (equaliser). If Beq is the bandwidth of the equaliser, the output noise power from this component is proportional to Beq 3 and hence proportional to S3 since the bandwidth of the equaliser is typically proportional to the data rate.\nIn a coherent optical receiver, it is desirable that the power of the local oscillator laser is large enough for the resulting shot noise to be much larger than any other noise components, particularly the thermal noise components of the receiver. This is also well known, and is called the \"strong local oscillator\" (SLO) condition. The local oscillator power needed to achieve the SLO condition depends, therefore, on the receiver thermal noise, and is larger at higher data rates. Because of technological problems with semiconductor lasers (the preferred laser type for communication systems), it is generally difficult to provide a strong local oscillator laser that has low phase noise and low excess intensity noise, particularly for large optical powers. This problem is aggravated in heterodyne receivers, particularly if they are designed to cope with substantial phase noise on the signal and local oscillator lasers. The reasons for this are explained below.\nReceivers for homodyne detection may have a front-end design similar to that for a direct detection receiver, since the signal is at base-band after the mixing on the photodiode. The thermal noise is typically dominated by the f2 -noise component. However, receivers for heterodyne detection, in which the signal modulates an intermediate frequency carrier, require a band-pass design. For a given symbol rate, such a receiver must have at least twice the bandwidth of the corresponding direct detection receiver, and this bandwidth must be around the intermediate frequency fIF which is typically a few times the data rate. As a result, the output noise power due to the f2 -noise component is proportional, not to Beq 3 but 6fIF 2 Beq +2Beq 3. For example, if fIF is three times Beq, the output thermal noise power is 56 times that of the corresponding direct detection receiver.\nIf the signalling format is frequency-shift keying (FSK) in which ZERO and ONE symbols are represented by two different optical frequencies, the receiver must have sufficient bandwidth to accept both signals. Alternatively, in so-called \"single filter FSK\" receivers, one frequency is filtered out, leaving what is essentially an amplitude-shift keyed (ASK) system. The bandwidth increase needed to receive full FSK depends on the frequency separation used. In the case where the two frequencies are well separated, the system is essentially two ASK systems, one of which is received with a higher intermediate frequency. The increase in receiver output thermal noise power could be by a factor of 7 to 8 typically. Against that, the signal power is increased by a factor of 4.\nIf the receiver must cope with substantial phase noise on the signal and local oscillator lasers, the bandwidth must be increased. As a rough guide, a bandwidth of twice the data rate plus ten times the total linewidth of the two lasers has been proposed by Salz as sufficient. Thus if the total linewidth is half the data rate (perhaps a little extreme), the receiver bandwidth must be increased by a factor 3.5. Usually that would mean using a higher intermediate frequency fIF, so that the output thermal noise power is increased by a factor of perhaps 20.\nIt is likely that low-cost receivers will use non-synchronous demodulation of the signal on the intermediate frequency carrier, i.e. envelope detection or square-law detection. Such demodulation is only really effective if there are several (say at least 3) cycles of the carrier in each bit period, preferably more: a relatively high intermediate frequency is implied.\nThus the output noise power is increased by: (a) using heterodyne detection, (b) using FSK signalling format, (c) using lasers with significant phase noise, and (d) using non-synchronous demodulation at the intermediate frequency. The local oscillator power needed to approach the SLO condition is increased accordingly. However, it seems likely that a widely-used type of communication system will use all four of those factors, to reduce the cost.\nTwo modifications to the receiver design are known in the literature, each including an inductor in the front-end circuit to produce a resonance at or above the required maximum signal frequency. In each case the pre-equaliser is flat over the relevant frequency range. In the first modification, the inductor connects a photodiode to the gate of a FET, so that with the photodiode and gate-source capacitances a 3rd-order low pass filter is formed. If this filter is essentially flat over the required signal bandwidth, no pre-equaliser is needed. In the second modification, the inductor is in parallel with the photodiode and gate-source capacitances, forming a 1st-order band-pass filter centred around the frequency fr 1/2π√(LCT). Such a design has been used in a heterodyne receiver. The pre-equaliser takes the form of a first-order band-stop filter. Each design blocks a useful fraction of the noise from the series voltage noise source. Both these designs are effective over a rather narrow frequency band.\nIn accordance with one aspect of the present invention a receiver circuit for receiving a modulated optical signal and for generating a corresponding electrical signal comprises a photodetector acting as a current source for generating a first modulated electrical signal; an amplification circuit to which the first electrical signal or a signal related thereto is fed; a first noise filter; and an n stage (where n is an odd integer) filter network connected between the detector and the amplification circuit, the characteristics of the filter network being such that the total thermal noise power output of the first noise filter is substantially minimised.\nIn accordance with a second aspect of the present invention, a method of constructing a receiver circuit for receiving a modulated optical signal and for generating a corresponding electrical signal in which the circuit comprises a photodetector acting as a current source for generating a first modulated electrical signal; an amplification circuit to which the first electrical signal or a signal related thereto is fed; a first noise filter; and an n stage (where n is an odd integer) filter network connected between the detector and the amplification circuit, comprises selecting the components of the filter network such that the total thermal noise power output of the first noise filter is substantially minimised.\nWe have found that it is possible to design a receiver circuit which suppresses noise over a relatively wide frequency band by selecting the components of the filter network such that the total thermal noise power output of the first noise filter is substantially minimised. This has been achieved by devising an algorithm which defines the network components and then determining those component values which lead to a minimum thermal noise power output. Minimisation could be achieved analytically when n is low, but in most cases is more easily achieved using a one or multi-dimensional search routine on a computer.\nFor example, the thermal noise power Pn3 is a function of the thermal noise power spectral density (n3) which is defined as\nn3 =SE |Im(1/Hfe (ω))|2\nwhere SE is the serial voltage noise source originating from the amplification circuit, Im denotes the imaginary part, and Hfe (ω) is the transfer function of the detector, noise filter, and amplification circuit.\nThis invention should be contrasted with well-known filter designs such as Butterworth and Chebyshev in which the optimisation of the resonant frequencies is done in such a way as to achieve the objective of \"optimally flat\" response at the centre frequency of minimum ripple over the passband. In the invention, the criterion is to minimise the total thermal noise power output and so the precise details of the optimisation depend on the characteristics of the bandpass IF filter or low-pass noise filter.\nThe invention may have its greatest use in coherent heterodyne receivers, but may also be useful in direct detection and coherent homodyne receivers.\nSome examples of receiver circuits in accordance with the present invention will now be described and contrasted with known circuits with reference to the accompanying drawings, in which:\nFIG. 1 is a generalised form (for n=5) of receiver circuit;\nFIG. 2 illustrates one example of a third-order bandpass ladder filter;\nFIG. 3 illustrates a transformer-coupled circuit;\nFIG. 4 illustrates a receiver circuit having an nth-order ladder filter.\nFIG. 5 is a schematic diagram of an equivalent circuit for a photodiode;\nFIG. 6 is a schematic diagram of an example of a circuit according to the present invention incorporating the photodiode of FIG. 5;\nFIG. 7 is the noise equivalent circuit of the circuit of FIG. 6;\nFIG. 8 is a graph is the frequency response of the optical receiver of FIG. 5;\nFIG. 9 is a graph of the frequency response of the optical receiver and front-end of FIG. 6; and\nFIG. 10 is a graph of the theoretical and experimentally measured noise spectral densities or the tuned receiver of FIG. 6 plotted for comparison with the theoretical noise spectral density for a conventional receiver using the same basic components.\nThe circuit shown in FIG. 1 comprises a photodiode 1 connected to a filter network 2 which is connected to an amplification circuit 3 such as a field effected transistor or a bipolar transistor. The output from the amplification circuit 3 is fed to a pre-equalising circuit 4 which flattens the overall response of the receiver, the output of the pre-equalizer being fed to a first noise filter circuit 5 in the form of an IF bandpass filter circuit in a heterodyne receiver, or a low-pass filter in the case of homodyne or direct detection receivers.\nThe five stage filter network 2 shown in FIG. 1 is defined in its most generalised form by five impedances labelled Z1 -Z5. The impedance Z1 includes the parasitic or intrinsic capacitance of the photodiode 1 while the impedance Z5 includes the parasitic or intrinsic capacitance of the amplifier input. The load resistance for the amplification circuit is denoted by R0.\nAt this point we will define ##EQU1##\nThe transfer function of the receiver front-end is now simply (FIG. 1). ##EQU2## and the equivalent noise power spectral densities at the input of the heterodyne/homodyne optical receiver front-end (FIG. 1) are ##EQU3##\nHere k' is Bolzman's constant, θ is the absolute temperature, R is the photo-diode responsivity, SI is the spectral density of the parallel current noise source of the amplifier and SE is spectral density of the serial voltage noise source originating from channel noise in the case of an FET front-end and base and collector current shot noise in the case of a bipolar transistor front-end. Im() denotes the imaginary part. n1 is a white noise spectral density arising from the shot noise on the photocurrent due to the local oscillator power pL, n2, and n3 are noise components from the receiver.\nBased on Eqs. (6)-(8) and a given IF noise filter characteristic (FIG. 1) it is now possible to evaluate the noise power transmitted through the IF filter and by adjusting the impedances Z1 -Z5 the noise power can be made as small as possible. This general design algorithm for the tuned front-end configuration will be applied in specific examples in the following.\nFor future reference we will derive the noise spectral densities n1 to n3 for the conventional receiver front-end where Z2 =Z4 =0,Z3 =∞,Z1 =1/jωC1,Z5 =jωC2 in the general diagram of FIG. 1.\nIn this case we obtain immediately ##EQU4## where the normalised frequency u is defined as ##EQU5## T is the bit-time. Later we will attempt to minimise the total noise power passed by a bandpass IF filter for different receiver front-end configurations assuming perfect equalisation in each case. At this point we will note that for common high-impedance receiver designs n1,n3 >>n2 for all frequencies of interest. Since n1 is due to a noise source in the photodiode, the influence of it cannot be adjusted by front-end tuning. We can only change the spectral dependence of n2 and n3. In the case with the normal front-end used in a heterodyne system with a large intermediate frequency (IF) and possibly a large IF filter bandwidth the influence of the `u2 ` noise, (11), can be very significant and a large local oscillator power is required to make n1,(9) dominant, i.e. to achieve shot noise limited detection.\nThe noise power passed by an IF filter with characteristic H'(u)=H(ωT/2π) is given in terms of normalised noise bandwidth integrals ##EQU6## The noise powers (in amp2) associated with eqs. (9)-(11) are now given by\nP1 =N1 I1 (14)\nP2 N =N2 I1 (15)\nP3 N =N3 I3 (16)\nsuperscript `N` means no tuning.\nThe transformer is specified via the inductance values L1,L2 and the coupling coefficient k (i.e. the mutual inductance is Lm =k√/(L1 L2)). This gives Z1 =1/jωC1,Z2 =jω(L1 -Lm),Z3 =jωLm,Z4 =jω(L2 -Lm),Z5 =1/jωC2.\nUsing a similar process to that explained above, an expression for n3 can be obtained and this can be used to optimise the components for minimum thermal noise using a two-dimensional computer search routine. The two variables available are the resonant frequency of the LC combinations and the coupling coefficient of the transformer. We have found that inductor values of 10 to 100 nH are appropriate for Gbit/s data rates, with a coupling coefficient of between 0.5 and 0.7.\nFIG. 2 illustrates an example of a third-order bandpass ladder filter in which the tuning components are three inductors L1,Ls,L2 and a capacitance C's. This gives Z1 =jωL1 /(1-ω2 L1 C1),Z2 =1/jωC°s (1-ω2 Ls C's),Z3 =∞,Z4 =0,Z5 =jωL2 /(1-ω2 L2 C2).\nLet u be frequency normalised to the data rate, uc be the resonant frequency of the LC combinations, and let H(u) be the transfer characteristic of the IF filter.\nUsing equation (13) and defining the modified bandwidth integrals:\nI'3 =I3 -2uc 2 I1 +uc 4 I-1\nI'5 =I5 -4uc 2 I3 +6uc 4 I1 -4uc 6 I-1 +uc 8 I-3\nand so on, with the usual binomial coefficients for the numerical factors. Then the total thermal receiver noise at the IF output can be minimised algebraically. If n3 >>n2, it is sufficient to minimise Pn3. Its minimum value is:\nPth =N3 [I'3 -I'5 2 /I'7 ]\nThe optimum value for uc and hence for the front-end component values thus depend on the IF filter characteristic and are not obvious.\nA generalised definition for the transfer function Hfe (ω) of an n-th order ladder filter network can be derived by considering FIG. 4. The impedances Z1 and Zn are the parasitic capacitances of the photodiode and of the FET gate-source, with parallel inductances in the general case. All other impedances are series LC or parallel LC combinations.\nLet an impedance with a single prime represent the impedance in combination with everything to the right of it in the circuit. Then we can use an iterative definition: ##EQU7## Then the transfer function for n stages is: ##EQU8##\nWe have found that the capacitor C2 has a value below 1 pf in a design for data rates above several hundred Mbit/s. Eliminating this component results in what should be a low-pass filter, but it has a useful response around a high frequency, suitable for band pass use. The inductor values can be optimised by a two-dimensional computer search.\nThe table below gives the noise power of the receiver designs discussed above for two typical sets of photodiode and gate-source capacitance. The comparison is to a base-band (no tuning) design These noise powers are directly proportional to the required local oscillator power. It can be seen that the three designs considered all yield about a factor of 20 reduction in the required local oscillator powered compared to no tuning.\n______________________________________ Relative Noise Power Case 1 Case 2______________________________________No tuning 1.0 1.03rd Order 0.049 0.065Mixed Tuning 0.051 0.067Transformer 0.046 0.058______________________________________\nIt will be appreciated that the invention allows for the constraints of large load resistor and essentially fixed photodiode and gate-source capacitances to be taken into account as well as the characteristics of the IF filter and yields optimised components values.\nReferring now to FIGS. 5 and 6 there is shown a practical T-equivalent of a transformer coupled front-end. The inductors have been realised directly as the photodiode bond-wires, and a micro-strip pre-amplifier is used. Even through the total parasitic capacitance of the front-end is 1.2 pF, we have obtained an r.m.s. noise current below 9 pA/√Hz over a bandwidth of 2.4 GHz. This compares well with the 12 pa/√Hz over a 3 GHz bandwidth obtained with a single serial inductor and parasitic capacitance of 0.6 pF reported by Gimlett JL. (\"Low noise 8 GHz pin-FET optical receiver\". Electron Lett vol 23 (1987) pp 281.283.)\nThe circuit employs a commercial photodiode 4 (RCA 306I6CER) with a bandwidth specification of 1.6 GHz (rise and fall time of 0.3 ns), determined mainly by the inductance of the bond-wires and the junction capacitance as shown by the equivalent circuit at FIG. 5 with the equivalent inductors L3 and L4 and capacitance C4.\nBy bonding an extra lead to the photodiode as shown in FIG. 6 we obtain the required three inductors with the a.c. diagram shown in FIG. 7. This front-end is connected to a two-stage high-impedance pre-amplifier using NE71083 GaAs FETs with interstage microwave matching networks to expand the bandwidth. FIGS. 8 and 9 shows the frequency responses obtained. FIG. 8 is for the receiver without the added bond-wire, with response limited by the photodiode parasitics. FIG. 9 is for the modified photodiode and front-end, showing improved response over a wider bandwidth.\nIn FIG. 10 there are shown the measured results for the receiver thermal noise spectral density, assuming perfect equalisation, the theoretical curves for a baseband receiver (no front-end tuning) and for transformer tuning. Theoretically we would expect about 12 dB reduction in receiver thermal noise in the passband from 1.6 to 4.0 GHz, some 3.3 dB more than simple serial tuning and 5.7 dB more than parallel tuning. The experimental measurements agree generally with the predicted performance, but with higher noise spectral density in the lower frequency part of the passband. The stripline amplifier had excess noise in the frequency range 1.5 to 2.5 GHz which is not accounted for in the theoretical curves.\nWith this embodiment there is demonstrated a design for an optical heterodyne receiver front-end for Gbit/s data rates. Improved bandwidth response was obtained by modifying the commercial photodiode mount, with an added bond-wire to realise the T-equivalent of a transformer-coupling using a two-stage amplifier with interstage microwave matching, we have obtained an r.m.s. noise current below 9 pA/√Hz in a bandwidth from 1.6 to 4.0 GHz. This result, which we believe to be the lowest reported result for a Gbit/s receiver, was obtained with a total parasitic capacitance in the front-end of 1.2 pF.\n|Cited Patent||Filing date||Publication date||Applicant||Title|\n|US3755762 *||May 22, 1972||Aug 28, 1973||Telecommunications Sa||Method of building for electric filters|\n|US3999061 *||Apr 30, 1975||Dec 21, 1976||Canadian Patents And Development Limited||Radiant energy integrating meter|\n|US4628197 *||May 21, 1984||Dec 9, 1986||The Babcock & Wilcox Company||Electronics for fiber optic vortex shedding flow meter|\n|EP0215373A2 *||Sep 2, 1986||Mar 25, 1987||Siemens Aktiengesellschaft||Method and arrangement for estimating the phase deviation, as well as a phase control method, in an optical synchronous receiver|\n|1||*||Journal of Lightwave Technology, vol. LT 4, No. 3, Mar. 1986 IEEE, (New York, U.S.), I. Garrett et al: Theoretical Analysis of Heterodyne Optical Receivers for Transmission Systems Using (Semiconductor) Lasers With Nonnegligible Linewidth , pp. 324 334.|\n|2||Journal of Lightwave Technology, vol. LT-4, No. 3, Mar. 1986 IEEE, (New York, U.S.), I. Garrett et al: \"Theoretical Analysis of Heterodyne Optical Receivers for Transmission Systems Using (Semiconductor) Lasers With Nonnegligible Linewidth\", pp. 324-334.|\n|3||Kan, et al \"Noise Performance of Gbit/s Turned Optical Receivers\", Electronic Letters, Apr. 23, 1987, vol. 23, No. 9, pp. 434-435.|\n|4||*||Kan, et al Noise Performance of Gbit/s Turned Optical Receivers , Electronic Letters, Apr. 23, 1987, vol. 23, No. 9, pp. 434 435.|\n|5||*||National Telecommunications Conference, Nov. 29 Dec. 3, 1981 New Orleans, Louisiana, IEEE, (New York), U.S.), H. H. Saupe: On the Design of Receivers in Analog Lightwave Systems for Multichannel Transmission of Broadband Services , pp. B9.7.1 B9.7.4.|\n|6||National Telecommunications Conference, Nov. 29-Dec. 3, 1981 New Orleans, Louisiana, IEEE, (New York), U.S.), H. H. Saupe: \"On the Design of Receivers in Analog Lightwave Systems for Multichannel Transmission of Broadband Services\", pp. B9.7.1-B9.7.4.|\n|Citing Patent||Filing date||Publication date||Applicant||Title|\n|US5142401 *||Jun 28, 1990||Aug 25, 1992||Raynet Corporation||Apparatus and method for a linear, wideband sensitive optical receiver|\n|US5652425 *||Nov 8, 1995||Jul 29, 1997||Sumitomo Electric Industries, Ltd.||Photoelectric conversion module with noise compensation|\n|US5706303 *||Apr 9, 1996||Jan 6, 1998||Lawrence; Zachary Andrew||Laser diode coupling and bias circuit and method|\n|US5828055 *||Oct 28, 1996||Oct 27, 1998||Lucent Technologies Inc.||Wide-band tuned input circuit for infrared receivers|\n|US5933265 *||Apr 22, 1998||Aug 3, 1999||Sdl, Inc.||Optical receiver module for an optical communication transmission system|\n|US6122303 *||Feb 18, 1998||Sep 19, 2000||Sdl, Inc.||Single transverse mode semiconductor laser for an optical transmission link|\n|US6816101||Mar 7, 2003||Nov 9, 2004||Quelian, Inc.||High-speed analog-to-digital converter using a unique gray code|\n|US7035361||Jul 15, 2003||Apr 25, 2006||Quellan, Inc.||Adaptive noise filtering and equalization for optimal high speed multilevel signal decoding|\n|US7050388||Aug 5, 2004||May 23, 2006||Quellan, Inc.||Method and system for crosstalk cancellation|\n|US7053992||Mar 4, 2004||May 30, 2006||Meade Instruments Corporation||Rangefinder and method for collecting calibration data|\n|US7123676||Nov 17, 2004||Oct 17, 2006||Quellan, Inc.||Method and system for antenna interference cancellation|\n|US7149256||Mar 29, 2002||Dec 12, 2006||Quellan, Inc.||Multilevel pulse position modulation for efficient fiber optic communication|\n|US7173551||Dec 21, 2001||Feb 6, 2007||Quellan, Inc.||Increasing data throughput in optical fiber transmission systems|\n|US7212580||Feb 12, 2003||May 1, 2007||Quellan, Inc.||Multi-level signal clock recovery technique|\n|US7215721||Mar 28, 2002||May 8, 2007||Quellan, Inc.||Method and system for decoding multilevel signals|\n|US7307569||Nov 15, 2006||Dec 11, 2007||Quellan, Inc.||Increasing data throughput in optical fiber transmission systems|\n|US7352824||Oct 5, 2006||Apr 1, 2008||Quellan, Inc.||Multilevel pulse position modulation for efficient fiber optic communication|\n|US7366244||Aug 30, 2006||Apr 29, 2008||Quellan, Inc.||Method and system for antenna interference cancellation|\n|US7414707||May 3, 2006||Aug 19, 2008||Meade Instruments Corporation||Rangefinder and method for collecting calibration data|\n|US7508497||Nov 23, 2004||Mar 24, 2009||Meade Instruments Corporation||Rangefinder with reduced noise receiver|\n|US7522883||Dec 14, 2005||Apr 21, 2009||Quellan, Inc.||Method and system for reducing signal interference|\n|US7573966||Feb 21, 2006||Aug 11, 2009||Quellan, Inc.||Adaptive noise filtering and equalization for optimal high speed multilevel signal decoding|\n|US7602860||Dec 4, 2006||Oct 13, 2009||Quellan, Inc.||Method and system for decoding multilevel signals|\n|US7616700||Dec 22, 2004||Nov 10, 2009||Quellan, Inc.||Method and system for slicing a communication signal|\n|US7626916||Jan 19, 2006||Dec 1, 2009||Quellan, Inc.||Method and system for crosstalk cancellation|\n|US7725079||Jun 9, 2006||May 25, 2010||Quellan, Inc.||Method and system for automatic control in an interference cancellation device|\n|US7729431||Feb 8, 2008||Jun 1, 2010||Quellan, Inc.||Method and system for antenna interference cancellation|\n|US7804760||Aug 23, 2006||Sep 28, 2010||Quellan, Inc.||Method and system for signal emulation|\n|US7934144||Nov 12, 2003||Apr 26, 2011||Quellan, Inc.||High-speed analog-to-digital conversion with improved robustness to timing uncertainty|\n|US7961180 *||Apr 2, 2007||Jun 14, 2011||Samsung Mobile Display Co., Ltd.||Optical sensor for sensing peripheral light and liquid crystal display device using the same|\n|US8005430||Mar 2, 2009||Aug 23, 2011||Quellan Inc.||Method and system for reducing signal interference|\n|US8068406||Oct 19, 2009||Nov 29, 2011||Quellan, Inc.||Method and system for crosstalk cancellation|\n|US8135350||Jul 26, 2011||Mar 13, 2012||Quellan, Inc.||System for reducing signal interference|\n|US8311168||Aug 11, 2009||Nov 13, 2012||Quellan, Inc.||Adaptive noise filtering and equalization for optimal high speed multilevel signal decoding|\n|US8503940||Feb 15, 2012||Aug 6, 2013||Quellan, Inc.||Reducing signal interference|\n|US8576939||Oct 14, 2009||Nov 5, 2013||Quellan, Inc.||Method and system for slicing a communication signal|\n|US8605566||Aug 25, 2010||Dec 10, 2013||Quellan, Inc.||Method and system for signal emulation|\n|US8798484||Feb 16, 2012||Aug 5, 2014||International Business Machines Corporation||Optical receiver using infinite impulse response decision feedback equalization|\n|US8977138||Sep 12, 2012||Mar 10, 2015||International Business Machines Corporation||Optical receiver using infinite impulse response decision feedback equalization|\n|US9252983||Apr 26, 2007||Feb 2, 2016||Intersil Americas LLC||Method and system for reducing radiated emissions from a communications channel|\n|US20040105462 *||Nov 12, 2003||Jun 3, 2004||Quellan, Inc.||High-speed analog-to-digital conversion with improved robustness to timing uncertainty|\n|US20050110976 *||Nov 23, 2004||May 26, 2005||Labelle John||Rangefinder with reduced noise receiver|\n|US20050110977 *||Mar 4, 2004||May 26, 2005||Labelle John||Rangefinder and method for collecting calibration data|\n|US20060215149 *||May 3, 2006||Sep 28, 2006||Labelle John||Rangefinder and method for collecting calibration data|\n|US20070242030 *||Apr 2, 2007||Oct 18, 2007||Jung Hwan Kim||Optical sensor for sensing peripheral light and liquid crystal display device using the same|\n|US20110262150 *||Mar 9, 2009||Oct 27, 2011||Nihon University||High-speed pulsed homodyne detector in telecom band|\n|US20130188963 *||Dec 28, 2012||Jul 25, 2013||Gil Afriat||Applying controlled impedance to improve optical transceiver bandwidth|\n|WO2013122696A1 *||Jan 9, 2013||Aug 22, 2013||International Business Machines Corporation||Optical receiver using infinite impulse response decision feedback equalization|\n|U.S. Classification||250/214.00R, 250/214.00A|\n|International Classification||H04B10/64, H04B10/60, H04B10/63, H03H7/075|\n|Cooperative Classification||H04B10/60, H03H7/1775, H04B10/63, H03H7/075, H03H7/175, H04B10/64|\n|European Classification||H04B10/60, H04B10/63, H03H7/17R4, H03H7/17R1, H04B10/64, H03H7/075|\n|Nov 24, 1992||CC||Certificate of correction|\n|Feb 10, 1994||FPAY||Fee payment|\nYear of fee payment: 4\n|Apr 21, 1998||REMI||Maintenance fee reminder mailed|\n|Sep 27, 1998||LAPS||Lapse for failure to pay maintenance fees|\n|Dec 8, 1998||FP||Expired due to failure to pay maintenance fee|\nEffective date: 19980925", "label": "Yes"} {"text": "Mellanox InfiniBand I/O solutions with native RDMA support and GPU acceleration provide the essential technology for Zillians’ innovative vGPU solution” said Gilad Shainer, Senior Director, Market Development at Mellanox Technologies\nTaipei, Taiwan (PRWEB) November 18, 2011\nZillians, a leading cloud solution provider specializing in high performance computing, GPU virtualization middleware and massive multi-player online game (MMOG) platforms today announced the availability of vGPU - the world’s first commercial virtualization solution for decoupling GPU hardware from software. Traditionally, physical GPUs must reside on the same machine running GPU code. This severely hampers GPU cloud deployment due to the difficulty of dynamic GPU provisioning. With vGPU technology, bulky hardware is no longer a limiting factor. vGPU introduces a thin, transparent RPC layer between local application and remote GPU, enabling existing GPU software to run without any modification on a remote GPU resource.\nUtilizing Mellanox Technologies InfiniBand RDMA I/O solutions and NVDIA GPUDirect technology, Zillians vGPU achieved peak data transfer rates between application and GPU hardware. This opens the door to a broader range of GPU applications that can take advantage of virtualized GPU resources, and also a boon for service providers or cloud operators looking to deploy next generation cloud services based on scalable GPU and Infiniband technologies. As interest in GPU-based HPC clusters continues to grow, vGPU represents a critical enabler for systems to realize resource sharing and improve system utilization across a variety of application domains.\n“We are excited to collaborate with Zillians to provide new capabilities for high-performance and massive multi-player online gaming cloud platforms,” said Gilad Shainer, Senior Director, Market Development at Mellanox Technologies. “Mellanox InfiniBand I/O solutions with native RDMA support and GPU acceleration provide the essential technology for Zillians’ innovative vGPU solution.”\nZillians vGPU is now available for early evaluation request. Version 1.0 featuring support for NVIDIA CUDA 4.0 runtime and driver APIs will be released by the end of 2011. Version 2.0 featuring further support for OpenCL 1.1 is scheduled for release in 2012 Q1. To learn more, please visit http://www.zillians.com/vgpu.\nWith expertise in GPU and Infiniband, Zillians is the leading cloud solution provider specializing in high performance computing (HPC) technologies in Taiwan. Zillians products include GPU virtualization middleware and massive multi-player online game (MMOG) platforms for PC and mobile. Our mission is to help our customers cut infrastructure costs by delivering high performance solutions to computationally intensive problems at an affordable price.\nFounded in 2008, Zillians is headquartered in Taipei, Taiwan. To learn more, visit http://www.zillians.com", "label": "Yes"} {"text": "How to Wire a Carrier Heat Pump Thermostat | Hunker\nHow to Wire a Carrier Heat Pump Thermostat By ... Carrier thermostat wiring, Honeywell thermostat wiring – it's all basically the same. Assuming the wires follow the standard color code, you'll be making the following basic connections for a single zone heat pump: Red wire to Rh or Rc, which are usually bonded. The red wire controls the main power switch for the heater and the cooler. Black ...Wiring of a Two Stage Heat Pump\nWiring a Heat Pump Thermostat to the Air Handler and Outdoor Unit! Functions, Terminals, Colors! Duration: 15:52. AC Service Tech LLC 208,326 viewsTotaline Thermostat [Short Review] and it's High Selling ...\nWireless Thermostat Totaline Wireless Thermostat: Easy Installation: The wireless thermostat comprises of dual parts, a thermostat and a receiver. The receiver has the wiring connections to the unit and it can be placed wherever the wires are available; the old thermostat location. The receiver is easy to install and is wired just like a ...Carrier Heat Pump Wiring Diagram thermostat | Free Wiring ...\nCollection of carrier heat pump wiring diagram thermostat. A wiring diagram is a streamlined traditional pictorial representation of an electric circuit. It reveals the parts of the circuit as streamlined forms, and also the power and also signal connections in between the tools.totaline thermostat wiring diagram heat pump\nTotaline thermostat wiring diagram heat pump in addition s thermostatforums attachment attachmentid 43 d 1329024431 together withs thermostatforums attachment attachmentid 41 d 1329021301 furtherkatiz co wp content uploads 2019 06 totaline thermostat not working thermostat wiring diagram maple chase heat pump thermostat wiring diagram ...TOTALINE Programmable Thermostat Manuals & User Guides\nTOTALINE Programmable Thermostat Manuals & User Guides. User Manuals, Guides and Specifications for your TOTALINE Programmable Thermostat Thermostat. Database contains 1 TOTALINE Programmable Thermostat Manuals (available for free online viewing or downloading in PDF): Homeowner's manual .Manual Totaline Install P374 2200 dms.hvacpartners\nSample Wiring Diagrams Heat Pump 5 Wire, 1 Stage Cooling, 1 Stage Heat* No auxiliary heat, commercial Heat Pumps , split systems & package units. Y1 G R C W1 O B Y2 W2 5 Conductor 18 gauge unshielded cable from the thermostat to the equipment. 24 vac common 24 vac return R fan relay compressor relay reversing valve W 1 W 2 G C Y 1 Y 2 * Most commerical heat pumps do not have the heat pump ...OWNER'S MANUAL MODEL P474 0140 Non Programmable Digital ...\nTOTALINE Heat Off Cool Fan On FanA uto 72 TOTALINE Heat Off Cool Fan On FanA uto OWNER'S MANUAL MODEL P474 0140 Test Operation Turn on the power to the Heat Pump. On the thermostat, slide the Mode Switch to HEAT. Press the UP or DOWN button until the set temperature is 10 degrees above room temperature. The HVAC unit shouldCarrier TOTALINE Gold P274 0200 C Installation, Start up ...\nView and Download Carrier TOTALINE Gold P274 0200 C installation, start up, and operating instructions manual online. Residential Non Programmable Thermostat. TOTALINE Gold P274 0200 C Thermostat pdf manual download. Also for: Totaline gold p274 0300 c, Totaline gold p274 0100 c.TOTALINE P374 1 700 Installation Instructions Manual\nView and Download TOTALINE P374 1 700 installation instructions manual online. 1 Day PROGRAMMABLE DIGITAL THERMOSTAT. P374 1 700 Thermostat pdf manual download. Also for: P374 1700.\ntotaline heat pump thermostat wiring diagram Gallery\nfine carrier programmable thermostat wiring diagram photo\ntotaline thermostat wiring diagram\nluxpro thermostat wiring diagram luxpro thermostat help\nthermostat wiring diagram u2013 davehaynes me\ntotaline p274 thermostat wiring diagram lyric thermostat\ncarrier t stat thermostat wiring diagram carrier get\nwiring diagram totaline thermostat 34 wiring diagram\nhoneywell iaq wiring diagram honeywell humidistat wiring\nhunter thermostat model 44155c wiring on 44905 hunter\nhoneywell thermostat rth221b wiring diagram honeywell\nhoneywell thermostat lr1620 wiring diagram honeywell\nhoneywell rth7600d wiring diagram honeywell get free\nhazardous location thermostat honeywell hazardous free\nhoneywell rth7600 thermostat wiring diagram honeywell\ntrane voyager wiring diagram 28 wiring diagram images\nfan center for older furnaces\ntpcc cooling housing typical fans and temperature\nold robertshaw thermostat wiring diagram york thermostat", "label": "Yes"} {"text": "Its sales will begin in 2019, but the price will be high – the device is positioned as a premium.\nAt the electronics exhibition CES 2019, LG introduced a 65-inch TV, the screen of which is rolled up. The device uses an OLED display, when folded, it looks like an oblong box.\nThe screen extends by pressing a button in a few seconds. The mechanism is designed for 50 thousand cycles. The screen can be expanded to a small strip or half – then the device will show either the weather or the player, or movies in the ratio 21: 9.", "label": "Yes"} {"text": "Welcome to our big HDMI splitter test. Here we present you all of the HDMI splitters we have tested. We have put together detailed background information for you.\nWe want to make the purchase decision easier for you and help you find the best HDMI splitter for you.\nYou can also find answers to frequently asked questions in our guide. You will also find some important information on this page that you should definitely pay attention to if you want to buy an HDMI splitter.\n- An HDMI splitter is a useful tool that allows you to multiply the HDMI signal. In many cases it can make sense to have an additional exit. It is e.g. This makes it possible to output video content simultaneously on the television and on a projector.\n- Choosing a suitable HDMI splitter can prove to be too complex for a beginner, as many of the information requires specialist knowledge.\n- Communication using HDMI poses some obstacles. In particular, the different HDMI versions make buying more difficult for beginners, since the devices should work perfectly with each other and there shouldn’t be any nasty surprises.\nBest HDMI Splitters\nTechole 4K - HDMI Splitter 1 in 2 Out\nNo products found.\nThis HDMI splitter distributes audio and video signals from one source to two different HDMI screens at the same time, creating a high definition resolution.\nThis means that high-resolution videos can be shared. This is also possible thanks to the excellent remote transmission. Because this HDMI splitter from Techole can transmit the data at a bandwidth of 3.4 Gbit / s.\nTechole - HDMI Switch 4K HDMI Splitter\nNo products found.\nThis HDMI switch scores with its bi-directionality. Because, depending on your needs, a signal can be transferred to two or two signals to one signal. So this HDMI switch from Techole can be used for a lot.\nIn addition, customers rave about its good resolution. Not only the screen, but also the audio is HD and leaves nothing to be desired.\nKELIIYO Hdmi Splitter 1 in 4 Out\nNo products found.\nFrequently Asked Questions: HDMI Splitter\nWhat is an HDMI splitter?\nAn HDMI splitter is a useful electronic device that allows an HDMI signal to be split across multiple outputs.\nAn HDMI splitter is therefore also known as an HDMI distributor.\nAn HDMI splitter has many uses and will be used in many multimedia setups.\nThe HDMI splitter often consists of three connections. One HDMI IN connector for the input signal and two HDMI OUT connectors for two output signals.\nThe two output signals are identical or the output devices that receive the HDMI signal receive the same input.\nThe HDMI signal transmission should make it easier for the consumer to connect the many different multimedia devices with one another. HDMI not only transmits the picture, but also the audio signals.\nThe HDMI splitter therefore transmits all the information that a device needs to be able to reproduce the content accordingly.\nThe actual function of the HDMI splitter is to decode the received signal, to amplify it, to encode it again and finally to forward it.\nThe amplification of the signal is necessary to ensure a constant quality of the signal.\nWhy do I need an HDMI splitter?\nHDMI splitters have many uses. A simple application would be, for example, to display the computer image on the monitor and the television (or projector) at the same time.\nThe HDMI splitter supplies both end devices with the required information and elegantly solves this problem.\nIf you want to record your gaming experiences on the PS4 with a capture card (for private use), then an HDMI splitter can help you.\nIf you want to retrofit an Ambilight to experience dynamic background radiation on your television, then an HDMI splitter is exactly the right choice for you. The HDMI splitter supplies the television and the Ambilight controller with the required signals. Do I need an HDMI Switch or an HDMI splitter? And what alternatives are there?\nBeginners in particular often have problems with these two terms and often use them as synonyms, even though they have completely different possible uses.\nAs mentioned above, the main job of an HDMI splitter is to multiply the signals, but the job of the HDMI switch is to ensure that you can switch between the different input signals.\nAssuming we have two different computers sharing a screen, the HDMI switch could switch between the two inputs and, depending on the switch position, display the image from one computer or the other.\nA suitable example would be a presentation setup where we want to enable the presenter to either use their own laptop or use the computer on site.\nThe switch makes it possible either to transmit the signal from the laptop or to use the signal from the stationary computer.\nThe switch can therefore be interpreted as an “or”: either use signal source 1 or use signal source 2.\nA switch can be interpreted as a reverse splitter.\nThe splitter distributes a signal to many outputs, whereas a switch provides a logic in which many inputs point to one output.\nSome switches can even be controlled using a remote control. This makes it possible, for example, to easily switch between the individual sources from the sofa.\nIn addition to these two variants, there is a third type, the so-called matrix.\nAn HDMI matrix makes it possible to either duplicate the signals or to switch between the individual signals.\nSo it is a real all-rounder, but usually more expensive than the simpler versions.\nCan I use an HDMI splitter despite HDCP?\nA question that arises very often in connection with HDMI splitters is about HDCP.\n“High-bandwidth Digital Content Protection” is a special encryption system that is provided for the protected transmission of audio and video data. It is a copy protection built into HDMI.\nSources of video and audio data, such as Blu-Ray or streaming providers, have the option of encrypting the data via HDCP.\nThis encrypted data is forwarded to the connected devices.\nIn our case, the HDMI splitter now acts as a middleman between the two devices. The way HDCP works can be expressed as follows:\nThe two devices, which are connected to one another via an HDMI cable, check whether the other device supports the compliance requirement for the HDCP version.\nIf the receiver of the signal does not support HDCP, either no picture can be transmitted or only one in a lower resolution.\nSo: yes, you can definitely use an HDMI splitter despite HDCP. However, you should ensure that it supports the HDCP version of the signal source.\nDoes an HDMI splitter have a negative impact on picture quality?\nNo. HDMI splitters shouldn’t have a negative impact on the picture.\nHDMI is a digital signal and digital signals can be reproduced without any problems.\nTypes of HDMI Splitters\nThe number of different HDMI splitters is enormous. Choosing a suitable HDMI splitter is not that easy.\nIn principle, the selection is much more about the purpose of the HDMI splitter.\nBasically, however, all HDMI splitters work in a similar way: get an input signal, amplify it, and forward it.\nHowever, some HDMI splitters have special features that can be a decisive factor depending on the area of application.\nThese features are:\n- With EDID manipulation and downscaler\n- With audio extraction\nThe different types each have advantages and disadvantages. Depending on what you prefer, a different type is suitable for you. With the following section we would like to make your decision easier.\nHDMI Splitter with EDID manipulation & downscaler: Advantages & Disadvantages\nFirst, let’s look at EDID itself and the communication between a playback device and a source.\nEDID stands for “Extended Display Identification Data” and it describes the display capabilities of a display.\nThis includes information about the supported resolutions, the supported aspect ratios, the Hertz number, etc.\nThis data describes all the important information a source needs to send the correct data to the display screen.\n- The displays are given the appropriate resolutions\n- Additional control over functionalities\n- Increased power consumption due to the conversion within the HDMI splitter\nWhat happens now if we connect display devices with different resolutions to our HDMI splitter?\nThe two display devices would send different EDID data to our source and it would not know in which resolution it should send the data.\nIn such a case, our source would choose the lower resolution in order to be able to display the data correctly on both devices.\nWith the help of EDID manipulation, however, we can tell our signal source exactly which signals we want to receive.\nSo we can request an image with a higher resolution and process the signal within our HDMI splitter using a controller.\nAs a result, our device with a higher resolution receives the optimal image and our device with a lower resolution also receives a suitable image that corresponds to its resolution.\nThe image is scaled down within the HDMI splitter using the downscaler.\nEDID manipulation can also be applied to audio data. For example, we can explicitly request a special audio format and forward it to other devices.\nHDMI Splitter with audio extraction: Advantages & Disadvantages\nSome HDMI splitters offer built-in audio extraction. This audio extraction can e.g. to TOSLINK or Cinch.\nSpecifically, this means that the HDMI splitter receives a signal via HDMI and only forwards the image information to the HDMI outputs.\nFor the audio data it provides a separate connection via TOSLINK or Cinch, which only contains the filtered audio data.\n- The possibility of different connections\n- The integration of devices that do not have an HDMI connection\n- Additional cables are required\nThis form of an HDMI splitter allows different information to be sent to different devices.\nFor example, the audio signal can be forwarded directly to an external sound system, whereas the projector and television only receive the pure image data.\nThese models are particularly interesting if the playback device does not support ARC (Audio Return Channel) and the sound should not be output directly on the playback device.\nCinch supports a maximum of 7.1 sound and TOSLINK a 5.1 sound.\nHDMI Splitter: Purchase Criteria\nIn the following we will show you which aspects you can use to decide between the multitude of possible HDMI splitters.\nThe criteria that you can use to compare the HDMI splitters include:\n- Input / Output\n- HDMI version\n- UHD (4K), Full HD, SD\n- Resolutions supported\n- Supported sound formats and audio encodings\n- Other HDMI functions (ARC, CEC, HEC)\nIn the following paragraphs we will explain to you what is important for the individual criteria in order to make your purchase decision easier.\nInput / Output\nA key feature of HDMI splitters is the number of inputs and outputs.\nSome retailers mistakenly refer to their products as splitters when they are actually switches.\nAn HDMI splitter has one input and several outputs, whereas a switch often has several inputs and only one output.\nThe optimal number of outlets is strongly dependent on the intended use. In principle: the more connections the better.\nIf the setup changes, there will still be enough outputs available from the HDMI splitter.\nInstead of purchasing a new device, you can continue to use the device you have already purchased.\nAnother important purchase criterion is that of the HDMI version. The criterion provides information about the data rate of the signal.\nFor example, HDMI 1.4b, with a data rate of 8.16 Gbit / s, can already transmit the popular 4K resolution, but only at 24 Hz.\nFor comparison: The HDMI 2.1 version can reproduce an 8K resolution at 60 Hz or a 4K resolution for a 3D television. This corresponds to a data rate of 42 Gbit / s.\nBefore buying, it is important to ensure that the HDMI version of the HDMI splitter is not a bottleneck so that other expensive purchases are not in vain.\nBelow is a list of important properties. It is advisable to skim through them briefly to get a feel for the various values.\n1920 × 1080 pixels at 60 Hz\n2560 x 1440 pixels with 60 Hz\n3840 × 2160 pixels at 24 Hz\n1920 × 1080 pixels at 24 Hz (3D)\n4096 × 2160 pixels at 24 Hz\n3840 × 2160 pixels at 30 Hz\n2560 × 1600 pixels at 60 Hz\n3840 × 2160 pixels at 60 Hz\n1920 × 1080 pixels at 48 Hz (3D)\n7680 × 4320 pixels at 60 Hz\n3840 × 2160 pixels at 120 Hz (3D)\nUHD (4K), Full HD, SD\nInstead of specifying a resolution in numbers, such as 3840 x 2160, it makes sense to assign this to a name.\nThe terms UHD, Full HD and SD should give you a quick overview of the performance of the HDMI splitter.\nThe term UHD (Ultra High Definition) is a small modification of the popular 4K resolution with at least 3840 x 2160 pixels.\nUHD delivers razor-sharp images and channels such as Sky or Netflix offer the option of streaming via 4K.\nUHD differs from True 4K, however, as the width ratio does not exceed 4000 pixels.\nThe true 4K resolution is 4096 × 2160 pixels, whereas that of UHD is 3840 x 2160 pixels.\nSo there is no major difference and both variants are often referred to as 4K.\nFull HD and SD are older resolutions that describe milestones in image quality.\nFull HD describes a resolution of at least 1920 x 1080 pixels, whereas SD (Standard Definition) describes a resolution of 720 x 576 pixels.\n4K video content is growing in popularity!\nIn addition to the information on the resolution standards and the HDMI version, the dealer often specifies the video formats supported.\nThe information is given in the following form: 2160p, 1080p, 720p, 480p and 360p.\nSimilar to the information on UHD and Full HD, these values give you information about the supported resolutions of the HDMI splitter.\nThe ‘p’ stands for progressive image transmission and this value gives you information about the vertical resolution of the image.\nSo it is independent of the width and thus of the aspect ratio of your screen.\nUsually these values are superfluous as they can be derived from terms such as 4K and 2K.\nRather, the dealers explicitly give you the certainty that this resolution is supported.\nThe following list gives you a rough overview:\n- UHD = 3840 × 2160 = 2160p\n- Full HD = 1920x1080pixels = 1080p\n- HD = 1080x720pixels = 720p\nSupported sound formats and audio encodings\nSimilar to the supported resolutions, the retailers explicitly give you the certainty that this audio format is also supported.\nSince not only image information but also audio information is transmitted via HDMI, this information can give you a quick overview of supported sound formats.\nHowever, this information is usually superfluous, as the supported sound formats depend on the HDMI version.\nThe actual purchase criterion is again the corresponding HDMI version of the splitter.\nBefore buying, make sure that the HDMI version supports the audio format you are using.\nMost audio formats should be covered from an HDMI version of 1.4a.\nThe HDMI version 1.4a was introduced at the beginning of 2010. The HDMI version of a new HDMI splitter should therefore almost certainly be above version 1.4.\nBelow we provide you with a list of the HDMI version and from which audio format has been added.\nOf course, higher HDMI versions also support the older formats and are downward compatible.\nMPEG, Dolby Digital, DTS (Digital Theater System)\nDolby Digital Plus, TrueHD, dts-HD (Digital Theater System- High Definition)\nOther HDMI functions (ARC, CEC, HEC)\nWith the help of HDMI, not only images and sound are transmitted, but also other information.\nIn this way, HDMI provides the user with additional functions that are intended to simplify control or also to reduce the amount of cabling.\nThese functions are ARC, CEC, and HEC.\nARC: The “Audio Return Channel” should make it easier for you to connect external audio devices.\nThe way it works is relatively simple. The HDMI splitter forwards the picture and sound signals to the playback device.\nThe playback device, for example a television, uses the image data and sends the audio signals back to the HDMI splitter, if the setting is made accordingly in the menu.\nThese audio signals can now be picked up by the HDMI splitter, for example with the aid of a coaxial cable, and provide an interface for an external audio device.\nCEC: The “Consumer Electronics Control” function provides an interface so that the various end devices can communicate with one another.\nThe basic idea behind this is not to control each device separately, but to enable universal control.\nFor example, if the picture is output via a television and the sound via an external system, we could still use the television’s remote control to control the volume.\nThe television sends a signal to the audio system via the HDMI port and tells it that the sound should be amplified or reduced.\nHEC: The “HDMI Ethernet Channel” supplies the end devices with the Internet. So it provides a way to get Internet via HDMI instead of an Ethernet connection.\nThis should further reduce the cabling effort for the end user. HEC was introduced in HDMI version 1.4.\nIn order to be able to play back copy-protected content properly, the HDCP version must be supported.\nFor example, to be able to enjoy Netflix in 4K, the display must support at least an HDCP version of 2.2.\nThis also applies to the splitter used within the HDMI connection chain.\nWe therefore recommend that you buy an HDMI splitter with a version of at least HDCP 2.2 in order to be able to use it sustainably.\nFacts about HDMI Splitter\nHow does the HDCP authentication process work?\nIn order to determine whether a playback device is authorized to play HDCP-protected content, HDCP authentication is necessary.\nThe data is only transferred from a signal source if the authentication was successful.\nA distinction is made between the following device types:\n- Source, which sends the data.\n- Data sink, which processes the data\n- Repeater, which forwards the data.\nThe signal source sends a request and asks a data sink for its identification number.\nThe data sink responds to this request by sending its identification number back to the source.\nThe source then checks whether the number is valid and whether the data sink is authorized to receive the data.\nIf this is the case, the two devices exchange their keys, with the authentication process also having to be carried out by the data sink.\nThe protected data can then be transferred between the devices as required.\nIf there are sound or picture problems, a failed HDCP authentication process could be responsible.\nMy devices support HDMI version X, but only a lower HDMI version is used. What is the problem?\nTo take advantage of a higher HDMI version, not only must the devices support the HDMI version, but also the HDMI cable.\nThe cable is responsible for the actual data transmission and it is imperative that the HDMI version of the cable does not constitute a bottleneck.\nIt is therefore advisable to pay attention to the HDMI cable when connecting and to retrofit it if necessary.\nWhich HDMI splitter is now suitable for my setup?\nAs already described above, this question cannot be answered universally.\nThe choice of the right HDMI splitter depends very much on the application scenario used.\nAt this point we would like to give you an overview of what can be important when buying an HDMI splitter.\nAn essential feature to look for when buying is the compatibility between the different devices.\nA chain is only as strong as the weakest link, and the same applies to HDMI signals.\nIt should be ensured that the HDMI splitter does not represent a bottleneck.\nThis means that the versions of HDMI and HDCP should be at least the same as the signal source and the playback device, otherwise we would have to lose quality.\nIn the worst case, the signal transmission fails completely and only a black image can be seen.\nThis happens, for example, if we have a data source with HDCP 2.2 encryption and connect it to a device with an HDCP version of 1.X.\nCheap HDMI splitters usually have such a shortcoming, so that the use of these devices is considerably limited.\nIn general, it can be said that the higher the individual values, the better the HDMI splitter.\nThe problem, however, is that the higher the values, the more expensive the device is usually.\nIn our opinion, an HDMI splitter should represent a long-term investment and it makes perfect sense to retrofit it at relatively long intervals.\nHowever, if the components used do not change, it can make sense to use a cheaper, low-sized splitter.\nWhat else do I need for my setup?\nIn order to implement a perfect home theater system, a great gaming setup or other projects, more components are of course required than an HDMI splitter.\nAt this point we would like to go into further products that may be of interest to you:\nThis useful tool is able to amplify the HDMI signal. The signal that the HDMI cable transports gets worse and worse at longer distances.\nThis effect occurs because the cable has a conductor resistance. If the signal is to be transported over longer distances, it is necessary that the signal is renewed.\nThe HDMI extender is connected between two HDMI cables and renews the signal.\nIn the case of more complex setups that are not characterized by e.g. Connect a 10 m HDMI cable, an HDMI extender is recommended to ensure transmission between the two devices.\nNot all HDMI cables are created equal. There are also many differences with HDMI cables that should be considered before buying, be it the length, the supported HDMI version, the material of the connector or the connector type.\nAn important criterion, albeit often neglected by beginners, is the HDMI version. It provides information about the data rate at which the data can be transported.\nIt can happen that older devices do not have a connection for HDMI or that we want to use the HDMI signal for another connection.\nIn this case we can use an HDMI adapter. This accepts the HDMI signal and provides another connection.\nFor example, we can connect a DVI input to an HDMI cable by using an HDMI-DVI adapter.\nOf course there are also other types of adapters that can be used as required. This makes it possible to use devices without an HDMI connection.\nLast product update on 2022-09-29 | Source: Amazon Affiliate", "label": "Yes"} {"text": "Thin film optics, based on light interference characteristics, are attracting increasing interest because of their ability to enable a functional color coating for various applications in optical, electronic, and solar industries. Here, we report on the dependence of coloring characteristics on single-layer TiO2 thicknesses and alternating TiO2/Al2O3 multilayer structures prepared by atomic layer deposition (ALD) at a low growth temperature. The ALD TiO2 and Al2O3 thin films were studied at a low growth temperature of 80°C. Then, the coloring features in the single-layer TiO2 and alternating TiO2/Al2O3 multilayers using both the ALD processes were experimentally examined on a TiN/cut stainless steel sheet. The Essential Macleod software was used to estimate and compare the color coating results. The simulation results revealed that five different colors of the single TiO2 layers were shown experimentally, depending on the film thickness. For the purpose of highly uniform pink color coating, the film structures of TiO2/Al2O3 multilayers were designed in advance. It was experimentally demonstrated that the evaluated colors corresponded well with the simulated color spectrum results, exhibiting a uniform pink color with wide incident angles ranging from 0° to 75°. This article advances practical applications requiring highly uniform color coatings of surfaces in a variety of optical coating areas with complex topographical structures.\nBibliographical notePublisher Copyright:\n© 2016, American Coatings Association.\nAll Science Journal Classification (ASJC) codes\n- Surfaces and Interfaces\n- Surfaces, Coatings and Films\n- Colloid and Surface Chemistry", "label": "Yes"} {"text": "Special Papers 2 AQUOS LCD TV\nEnergy-Saving Technologies for LC-30BV5 LCD TV\nThe flat panel TV market is growing rapidly at the turn of the century,\ncoinciding with the launch of BS digital broadcasting in Japan. LCD and plasma\nTVs are replacing the conventional CRT TVs and becoming the mainstream. These\nmarket and technological trends have led to a shift in consumer demands toward\nthin-profile and environment-friendliness as well as high picture\nSharp started development of LCD TVs early as it was aware of their desirable qualities such as thin-profile, light-weight, low energy- and natural-resource- consumption, long life and eye-friendly luminescence characteristics Today, Sharp has launched 25 models of AQUOS LCD TV series into the market, ranging from 13 inch 4:3 format to 37 inch wide-screen.\nThis paper outlines Sharp's energy-saving technologies, a part of its resource-saving technologies that support AQUOS LCD TV series.", "label": "Yes"} {"text": "PoE Injector Adapter, IEEE 802.3af compliant, Data and power carried over the same cable up to 100 meters, plastic case, pocket size, plug and play\nIEEE 802.3af compliant\nAuto-determine the necessary power requirements\nGigabit speed support\nPlug-and-Play, requires no configuration\nWhat This Product Does\nThe PoE Injector TL-POE150S fully complies with IEEE 802.3af standard, and can work with all IEEE 802.3af PoE compliant PDs (Powered Devices) or PoE Receiver Adapters, such as TP-LINK’s TL-POE10R, or other equivalent product, to expand your network to where there are no power line or outlet, where you wish to fix device such as AP, IP Camera or IP Phone, etc.", "label": "Yes"} {"text": "Boletos Giorgos is a software developer based in Thessaloniki, Greece. He holds a Bsc in\nApplied Informatics from the University of Macedonia. He is a researcher and\nsoftware developer at SpectraLab, AUTh exploring innovative\ntechniques (e.g. hyperspectral imaging, machine learning, AI, LC-QToF-MS) to detect food\nadulteration and ensure nutrient bioavailability. Over the past few years, he has taken part in\nthe development of various web applications as a freelancer, as well as in their design. His\nresearch interests lie in image optimization via artificial intelligence and in the development\nof novel tools to monitor agricultural resources (MARS).", "label": "Yes"} {"text": "Info know-how is likely one of the quickest-rising career fields in the intervening time. Computer hardware is the gathering of physical elements of a computer system. This comprises the computer case, monitor, keyboard, and mouse. It additionally contains all of the elements contained in the computer case, such because the onerous disk drive, motherboard, video card, and loads of others. Computer hardware is what you presumably can bodily contact. Although writing code is not their first precedence, developers might want to have a powerful background in computer programming. They typically achieve this experience at school. All via their occupation, builders must protect updated on new devices and computer languages. High Colleges offering Computer Know-how Levels inside the U.S. C#: Initially developed for Microsoft, this extremely expressive program language stays additional easy in comparison with totally different languages but accommodates components of C++ and Java.\nBy following the steps you see below, you presumably can order the computers by means of PeopleSoft to be placed on the Computer Depot. COMTS has chosen the minimal actually useful hardware and works fastidiously with the Depot to update these bundles frequently. Don’t doubt this methodology! Really it is an environment friendly and easy approach to restore with just a few of clicks. Error might possibly be caused by registry error on the system. System Restore Instruments can repair not only but in addition help you to detect and take away most of dwelling windows system errors on your COMPUTER. the one worth is the software program and likewise you never have to remunerate for the functions you watch. The software moreover works successfully with any web connection tempo. whether or not you’re an impatient individual, neglect this. As we speak, there is a computer satellite television software program that lets you shortly accept 1000’s of packages from worldwide networks.\nAn essential variety of software program program firms and programmers in the world comprise a software program trade. Software can be fairly a worthwhile enterprise: Invoice Gates , the co-founding father of Microsoft was the richest particular person in the world in 2009, largely resulting from his possession of a significant number of shares in Microsoft, the corporate answerable for Microsoft Home windows and Microsoft Workplace software program merchandise – each market leaders of their respective product classes. As part of a brand new enlargement into atomic based totally quantum computing we search an experienced engineer with experience in software program and hardware for embedded packages. MCIT Online is about further than merely the curriculum. Students in this program could have entry to core companies across the College to assist their properly-being and future profession targets. Though MCIT Online students do not look at on Penn’s campus, they are thought-about members of the Penn neighborhood.\nIf you’re a user of Dell and you might be in quest of guides for the troubleshooting and the tutorials to your Dell printer you possibly can take the Dell Assist. The various kinds of Dell Assist will be found including help for the house customers, help for small enterprise and help for enterprise IT. There are many useful web sites out there on-line that gives you the excellent ideas for you Dell Printer. In House windows, seek for and open the HP COMPUTER Hardware Diagnostics for Home windows app. Data security has develop into a protocol in all corporations, as it’s a necessity when it comes to understanding and eliminating attainable threats and risks. Internet safety Area is a workers of skilled professionals who configure and install software program and equipment and work efficiently to protect the company. As young minds and bodies are growing, giving them psychological and bodily stimulation via video games is important to develop neuron networks of their brains.\nComputer hardware consists of the bodily, tangible components or elements of a computer , akin to the cupboard , central processing unit , monitor , keyboard , computer information storage , graphics card , sound card , speakers and motherboard 1 In distinction, software program is instructions that can be saved and run by hardware. Selecting the best community gadget and communications equipment provider is essential, you need to have the flexibility to know all the professionals and cons of the router earlier than shopping for additionally there’s a giant distinction between a house router and business grade router. House group devices a can create a community however with very minimal finish points, often simply 4, and is often devoted to the wireless internet connectivity capabilities and not really on the information sharing finish, whereas the latter can help a network reaching as much as 32 models all on the similar time and nonetheless maintain excessive pace knowledge transfers effortlessly.", "label": "Yes"} {"text": "The NSSEFF program awards grants to top-tier researchers from U.S. universities to conduct long-term, unclassified, basic research of strategic importance to DoD. These grants engage the next generation of outstanding scientists and engineers in the most challenging technical issues facing the department. Approximately 10 fellows are selected each year, and each receives up to $3,000,000 over 5 years. This year's topics included quantum information science, engineering biology, neuroscience, nanoscience, novel engineered materials, and applied mathematics and statistics.\nProfessor Ivan Schuller selected to receive the Department of Defense \"National Security Science and Engineering Fellows\" (NSSEFF) award.\nProfessor Ivan Schuller is one of 7 researchers selected to receive the Department of Defense \"National Security Science and Engineering Fellows\" (NSSEFF) award. He is being recognized for his work in functional materials on a project titled \"Bio-Inspired Functional Hybrids: A new paradigm for solid-state devices.\"", "label": "Yes"} {"text": "Using Kinematic Variables to Extract Information from Semi-invisible Decays of Heavy Particles at Hadron Colliders\nAgashe, Kaustubh S\nMetadataShow full item record\nWe examine the ways of extracting information from semi-invisible decays of (new) heavy particles at hadron colliders, i.e., such heavy particles are assumed to decay into visible/Standard Model (SM) particles and invisible particles. As a concrete realization, we employ the models with the stable weakly interacting massive particle (WIMP), a well-motivated dark matter (DM) candidate. By definition, dark matter is not seen by the detectors, i.e., invisible. Typically, stability of dark matter is ensured by introducing a new (unbroken) symmetry under which the DM is non-trivially charged while the SM particles are uncharged. Also, many new physics models contain other heavier particles which are charged under the same symmetry so that such heavier particles must decay into (invisible) DM particles along with the relevant visible/SM particles. In particular, we study how to determine the masses of DM and heavy particles and the nature of the above-mentioned DM stabilization symmetries. For this purpose we take three kinematic variables as the main toolkits. We first discuss the distribution of the invariant mass formed by the visible part in the associated decays. As the second variable, we include the invisible part in forming the invariant mass. Because we are not aware of the longitudinal momentum of invisible particles, such a quantity is constructed in the plane transverse to the beam pipe, which is therefore called “transverse” mass. This is typically suitable for a singly produced heavy particle. Since the DM stabilization symmetries lead to pair-production of heavier particles, we here consider the “stransverse/MT2” type variable, a simple generalization of the transverse mass. Finally, we consider the energy spectrum of visible particle(s), which is not Lorentz-invariant at all even under longitudinal boosts. The relevant strategy is predicated upon the new observations that we shall make about physical implications of the peak position in such an energy spectrum. We emphasize that the relevant methods using the three observables are complementary to one another.", "label": "Yes"} {"text": "Cheap Adapter Solutions For Purists\nARP Hi-Speed Adapter: A Tiny Device With A Lot Of Effect\nThe Hi-Speed adapter is plugged into the IDE hard drive instead of an IDE cable thus making the drive USB 2.0 compatible. An external mains unit powers the drive and the adapter. The device can be run on any PC without a reboot - provided the connections exist. The current Windows and Mac systems do not require an extra driver for this. After connecting the adapter to a USB port, the drive declares itself automatically and is ready for use after a few seconds. Our tests showed that even CD and DVD burners can be run through the adapter without a hitch. With an IDE hard drive, the data transfer rate is an average 20 MB/s, a perfectly adequate speed.\nSmall and practical USB adapter", "label": "Yes"} {"text": "N04–Silicon-Integrated Red-Light Optical Gain Medium Based on BGaAs/GaP Quantum Wells\nIn this study we present BGaAs/GaP quantum well (QW) structures integrated with GaP/Si virtual substrate as a promising structure for applications requiring red-light optical gain media. Gain spectra are computed based on an 8-band k · p model with an envelope function approximation and Fermi’s Golden Rule. An emission of red light of wavelengths from the range of 730-690 nm is predicted for the QWs with 10-35% BAs mole fraction and widths below the critical thickness.\nThis content is locked\nLogin To Unlock The Content!", "label": "Yes"} {"text": "Discrete Dynamic Modeling for Complex Systems Based on Big DataView this Special Issue\nConstruction of Graduate Behavior Dynamic Model Based on Dynamic Decision Tree Algorithm\nWith the research of machine learning technology and big data intelligent processing technology in engineering application becoming more and more mature, people gradually combine machine learning technology and big data intelligent processing technology. Aiming at the problem of innovative employment in colleges and universities, this paper proposes a dynamic decision tree algorithm based on these two technologies and constructs a dynamic model of graduates’ behavior. Through the analysis of dynamic decision tree algorithm, a big data analysis system is formed. Finally, simulation experiments verify whether the dynamic model can correctly reflect the behavior of college graduates. The results show that the big data integration system based on big data and dynamic decision tree algorithm has high adaptability. Incremental adaptive optimization of the traditional decision tree model can significantly improve the prediction effect and prediction time of dynamic data and provide theoretical support for the industrialization and social significance of big data technology. The dynamic decision tree algorithm of college employment proposed in this paper has good predictability and provides a certain theoretical reference for college graduates’ entrepreneurship.\nBig data usually refers to the data with huge volume of information in the three dimensions of “data volume,” “data speed,” and “data category.” People call it big data technology to get some quantitative statistical results through big data analysis, which mainly relies on the internal logic of various specific rules. Among them, machine learning is an effective method to realize this analysis method . Every year, the graduation of college students injects a lot of productivity into the society. Their behavior after graduation is the focus of all sectors of society. At present, most of the graduate behavior analysis still adopts the questionnaire method . Although the statistical results of the questionnaire survey method are easy to quantify, the statistics, processing, and analysis of the survey results can be completed more quickly and economically . However, due to the subjective changes and differences in the intention, thinking, and motivation of the respondents in the questionnaire survey for employment and entrepreneurship, the quality of the survey results is often not guaranteed, and its recovery rate is difficult to be guaranteed, resulting in a great reduction in the accuracy of the data analysis results . This makes the dynamic model of graduates’ whereabouts constructed by questionnaire has some limitations. As the data set of graduates’ graduation behavior is changing day by day and its internal inaccessible nodes are increasing, the predictability of the traditional model to each node is not high, which often leads to the quantitative change of the prediction distortion of each node, resulting in the qualitative change of the overall prediction result error. Therefore, it is necessary to study the dynamic model of graduates’ employment and entrepreneurship data . Based on this, this study proposes a dynamic model construction method based on big data and machine learning decision tree.\nDecision tree is a tree structure similar to flow chart, in which each internal node represents a test on an attribute, each branch represents an attribute output, and each leaf node represents a class or class distribution. The top layer of the tree is the root node. The amount of information is directly related to its uncertainty. To understand a very, very uncertain thing or something we know nothing about, we need to know a lot of information, and the measurement of the amount of information is equal to the amount of uncertainty. Decision tree machine learning method is an effective method to simulate human learning behavior. Its core problem is how to construct the tree topology based on the known training sample data. Since machine learning is a problem closely related to the problem domain, different application goals will lead to more specific and in-depth topics that cannot be solved or well solved by the existing theoretical framework.\nAiming at the problem that colleges and universities cannot carry out dynamic analysis on graduates’ employment and entrepreneurship destination statistics, a big data integrated analysis system based on dynamic decision tree machine learning algorithm is proposed to solve the problem of dynamic analysis and statistics of graduates’ destination data. This study is mainly carried out in four chapters. Section 1 gives a framework overview of the research background and research direction of this study; Section 2 introduces the application status of big data analysis technology and its application scope not covered at present. Section 3 introduces the big data technology, machine learning algorithm, the establishment of dynamic decision tree model, and the construction of big data integration system. Section 4 uses the established decision tree model based on machine learning algorithm to practice a large amount of sample data through public data sets and designs confirmatory experiments to verify whether the optimized decision tree model can accurately predict the postgraduation behavior of college graduates.\nThe innovation of this study is to solve the problem of statistics and analysis of employment and entrepreneurship dynamics of college graduates through big data analysis technology. This study combines the big data of graduates’ behavior after graduation with machine learning algorithm. Aiming at the problem that graduates’ behavior data changes year by year, a dynamic decision tree model is proposed based on machine learning algorithm. Even if the data sample changes, it can still get a high prediction accuracy without rebuilding the new model, which solves the problem of low energy efficiency when the traditional model analyzes dynamic data. The effective application of the algorithm can greatly improve the model structure of each branch of the decision tree and then improve the efficiency of retrieving dynamic data.\n2. Related Work\nAlthough researchers have studied the complex system strategy based on big data for many years, there are still some deficiencies in the construction scenario of big data dynamic model . Elsayad et al. proposed to use whale optimization algorithm under the background of big data of college graduates and carry out algorithm loading through machine learning H2O framework to find the best feature subset, so as to maximize the prediction accuracy of employment of college graduates . Through experiments, Dommaraju et al. have proved that using the multilayer perceptron deep neural network learning technology based on expectation condition maximization clustering and Ruzicka regression to analyze the big data of cellular network can provide theoretical support for the intelligent suggestions on employment and entrepreneurship of college graduates . Yahia et al. proposed to transform the common feature data in big data technology into the deep feature data filtered by the feature selector and, combined with the hybrid machine learning algorithm, analyzed the incentive elements of the whereabouts of college graduates. This method shows that business trip practice is the main incentive to determine the behavior of graduates and achieves an accuracy rate of more than 95% . With the help of random forest algorithm, Gui et al. overcome the shortcomings of overfitting algorithm by using the weather conditions, flight time, airport location, and other employment registration information of college graduates, so as to improve the accuracy of prediction and analysis of college graduates in employment to more than 90% . Latif et al. analyzed the big data according to 70 attributes that may affect the delayed graduation of college graduates and obtained the prediction accuracy of delayed graduation events greater than 98% based on convolutional neural network (CNN) algorithm. Based on this result, it has good social significance for college graduates to change their strategies according to the current learning situation and improve their school efficiency . Dijk et al. proposed to establish the largest information database for college graduates, which aims to use big data technology to predict the whereabouts of college graduates, so as to improve the statistical efficiency of the whereabouts of graduates . Xiao et al. analyzed the data of the ship automatic identification system by using adaptive learning, motion modeling, and particle filter technology through big data acquisition and aiming at the direction of intelligent maritime traffic and carried out the collision risk assessment of ship navigation dynamic trajectory. They found that big data analysis technology has a good effect in processing dynamic data analysis . Liu et al. verified the effectiveness of the cooperative spectrum sensing network based on the two terminal machine learning models for the intelligent spectrum sensing method by detecting the probability simulation method. It realized the diversified statistics of employment and entrepreneurship of college graduates, but could not achieve dynamic real-time analysis . Through the particle swarm optimization algorithm, Nogueira et al. generate a large data set of dynamic feasible solutions and obtain the optimal solution based on big data, so as to establish a probability confidence region, find the optimal conditions for analyzing graduates’ employment and entrepreneurship choices, and realize the dynamic analysis of equipment status based on big data technology . Fnyes et al. put forward the theory of using machine learning linear parameter change control to analyze big data, obtained a highly robust vehicle selection function for college graduates to check in and take a ride, and verified its effectiveness through simulation. This method can intelligently analyze the choice of graduates’ whereabouts, but can not carry out high accuracy analysis and statistics on dynamic data .\nTo sum up, it can be seen that, in the process of dynamic statistics and analysis of employment and entrepreneurship of college graduates, there are some problems, such as inability to effectively obtain real-time data of graduates, large error of analysis model, small database of graduates’ statistical information, and poor coupling of analysis model [17, 18]. In terms of the research on the dynamic model of employment and ntrepreneurship of college graduates, the current research results are mostly implemented based on statistics, but rarely combined with big data technology and artificial intelligence algorithms for diversified and convenient analysis [19–21]. On the other hand, big data analysis technology is mostly coupled with traditional engineering and less combined with science education. In terms of algorithm structure, most machine learning algorithms only perform fini calculation for static data, and few dynamic algorithm models are designed for complex dynamic discrete data . Therefore, under the background of big data in today’s era, it is of great significance to carry out the research on the dynamic model of employment and entrepreneurship of college graduates.\n3. Dynamic Model Construction Method Based on Big Data and Dynamic Decision Tree Algorithm\n3.1. Application of Machine Learning Algorithm in Digital Model Construction\nMachine learning algorithm is a subject that can optimize computer algorithm by improving the previous data. The three main elements of machine learning are “algorithm,” “strategy,” and “model,” in which “algorithm” fits the training data set through “strategy,” so as to create a new “model,” which makes the algorithm very important in machine learning . Common machine learning algorithms are usually trained only for fixed data sets. Once the data sets change, the algorithm will rescan all the data sets, which makes the algorithm inefficient in solving dynamic big data . In fact, in solving practical engineering problems, big data with dynamic attributes are often used as training data sets . In recent years, with the deepening of the special work of Higher Vocational enrollment expansion by the Ministry of Education, the Ministry of Human Resources and Social Security, and other departments, the number of college graduates in China has increased from 2.8 million per year in 2004 to an estimated 9 million in 2021. According to the regularity and uncertainty of social development every year, the data of employment and entrepreneurship of college graduates also show dynamic changes.\nBased on this, in order to solve the lag analysis problem in graduates’ employment and entrepreneurship data, this study improves the traditional decision tree algorithm for static data and proposes a big data integration system based on dynamic decision tree algorithm, so as to build a new dynamic model in the complex discrete data of graduates’ employment and entrepreneurship changing year by year.\n3.2. Data Analysis Process of Machine Learning Dynamic Decision Tree Algorithm in Dynamic Model\nThe traditional decision tree algorithm selects the optimal subnode by calculating the information gain of different attributes. For the uncertainty of college graduates’ employment and entrepreneurship, this study extends a decision tree algorithm with dynamic incremental solution based on the traditional decision tree algorithm, reprocesses the discrete data at all levels in the dynamic model structure, and extracts the rules of each node. The process of dynamic decision tree data analysis is shown in Figure 1.\nAs can be seen from Figure 1, the relationship between the decision tree analysis data is based on information entropy. Under the influence of dynamic data, when the change of a child node of the decision tree reaches the threshold, the child node becomes invalid, so it is automatically replaced with another child node. When the dynamic data does not touch the threshold, it means that the subnodes of the decision tree are probabilistic classified based on the node attributes.\nMake a subnode of the decision tree algorithm model have two attributes to be selected: A and B. If is found after calculating the information gain of a and B, that is, in terms of subnodes of the decision tree, the decision of attribute a is better than attribute B. When the data is dynamically incremented, if the current decision tree branch node subpoint has and only has two attributes a and B, then and are used to represent the entropy of attributes a and B, respectively, and then there will bewhere represents the number of positive examples with a certain attribute value record set, represents the number of counterexamples with the same attribute value record set, and their number count is expressed in , represents the amount of information estimated based on the overall data source, and and are the possibility of positive examples and the possibility of counterexamples, respectively. At this time, the method of calculating information entropy is as follows:where\nIn the formula, and represent the values of the branch subnodes of a decision tree. The value includes the number of values of the node attribute, and the bottom of is 2. When the dynamic incremental data is introduced into the decision tree, the information gain of attributes A and B will change accordingly. This change may lead to the final change of the node classification attribute under some columns of complex discrete calculations. When the dynamic incremental data with attribute appears in a value segment and the value segment is between A and B, the method for calculating information entropy is as follows:where\nAfter transforming the deformation formula,\nAfter calculation, when the dynamic incremental information is added to the training data set, the change of information entropy before and after is\nIn order to evaluate the impact of dynamic incremental information on attributes A and B, it is necessary to calculate the maximum and minimum values of information entropy before and after the emergence of dynamic incremental information. According to the characteristics of functions and , when , takes the minimum value:\nWhen , takes the maximum value:\n3.3. Analysis Process of Machine Learning Dynamic Decision Tree Algorithm in Dynamic Model\nWhen the new dynamic data increment is added to the data set, instead of rescanning all the data and building a new model, adaptive correction is carried out on the basis of the model obtained from the previous training data by the decision tree algorithm, so as to improve the classification accuracy of the new decision tree. If samples are dynamically added to a branch subnode of a decision tree of the previously constructed data model, the newly added samples will meet the following inequalities according to the previous classification attributes:\nIf the number of newly added samples is less than the number of samples data on the attribute value segment, (10) can be scaled as\nTo sum up, the value of determines the number of new samples :\nTaking (13) as a guide, the refitting method of dynamic decision tree can be obtained. If the dynamically added data samples meet , after the data is dynamically added and updated, the entropy of the classification attribute is still less than that of the substitute attribute. In other words, the information gain calculated based on the classification attribute will still be greater than that calculated based on the substitute attribute. Therefore, the subnode classification attributes of the decision tree model remain unchanged compared with the previous classification attributes. If the number of samples x meets , the corresponding entropy of the classification attribute will become greater than that of the substitute attribute after the dynamic new data appears. At this time, the dynamic decision tree algorithm will replace the original classification attribute of the branch subnode of the decision tree with the substitute attribute, so as to update the dynamic decision tree.\n3.4. Prototype Construction of Machine Learning Dynamic Decision Tree Algorithm Fusion Big Data Integration System\nThe machine learning dynamic decision tree algorithm fusion big data integration system needs to run in real time to complete the analysis task. Users can quantify the performance of big data according to the output behavior of discrete data dynamic fusion in the system process. The big data system designed in this research mainly includes three modules: import module, management module, and analysis module. The analysis process of graduate employment data by big data system is shown in Figure 2.\nAfter data loading, the big data system imports the extracted data into the database of the management module to meet the data analysis of graduates’ employment and entrepreneurship. The data is listed according to the data name, data type, and data length compiled by the database type, and the management module has the functions of adding, deleting, and modifying the imported data. The analysis module mainly integrates the algorithm of dynamic decision tree, which belongs to an enhanced decision tree algorithm. The underlying logic of the algorithm has been described above. In this stage, the employment simulation analysis results of senior, junior, and senior graduates are shown in Figure 3.\nAs can be seen from Figure 3, under the dynamic decision tree algorithm, with the increase of analysis times and data samples, the proportion of dynamic employment choice of senior, junior, and senior graduates is also increasing. The growth rate of senior is the slowest, and the growth rate of junior and senior graduates is similar, which is also in line with the actual law of employment choice. And in the data operation process of dynamic decision tree algorithm, this research uses Python software which is brilliant in the field of data processing as the development language of this part, develops the IDE, and uses the Tensorflow framework which is more open for machine learning to complete the real-time simulation analysis of the dynamic discrete data of graduates’ behavior, so the simulation results are closer to the real situation. Tensorflow is an open source software library using data flow graphs for numerical calculation. Nodes represent mathematical operations in the graph, and edges in the graph represent multidimensional data arrays, namely, tensors, which are interrelated between nodes.\nAccording to the characteristics of big data system integration, this research designs the SSM big data system framework based on MVC traditional design pattern. Its structure mainly includes DAO layer, service layer, Controller layer, and View layer. The big data system framework is used to simulate and analyze the entrepreneurship of senior, junior, and senior graduates, and the results are shown in Figure 4.\nAs can be seen from Figure 4, under the dynamic decision tree algorithm, with the increase of analysis times and data samples, the proportion of dynamic entrepreneurial choice of senior, junior, and senior graduates is also increasing. The growth rate of senior graduates is the slowest, and the growth rate of junior and senior graduates is similar. This is because the dynamic decision tree model uses real graduate data for in-depth learning, and senior graduates have less entrepreneurial skills (such as business skills, financial skills, business thinking skills, and management skills), while doctoral and master’s students have relatively certain technical ability and business thinking.\nFor complex discrete dynamic data, a big data processing system based on dynamic decision tree is designed. The designed big data system structure is simulated through trial data. The simulation uses the employment and entrepreneurship of graduates in 2021 disclosed by a municipal government in China as training data and test data. The prediction analysis results are shown in Figure 5.\nIt can be seen from Figure 5, under the dynamic decision tree algorithm, with the increase of analysis times, the change rules of the training data group and the test data group are different. The result jump percentage of the training data group is almost unchanged and changes slightly around 20%, but the result jump percentage of the test data group decreases gradually with the increase of analysis times (the maximum is 88.1%). It is close to 90%, the minimum is 2.1% (close to 0%), because with the increase of analysis times, the stability of test data in dynamic analysis stage becomes stronger due to random variation factors, while the training sample is because the data will not change randomly with the increase of analysis times. Therefore, the big data model proposed in this study has good accuracy and stability in the process of dynamic analysis under static data.\n4. Result Analysis and Discussion\n4.1. Confirmatory Experiment and Data Analysis\nIn the specific experimental process, the dynamic model algorithm and big data system proposed in Section 3 of this paper are used to start the experimental process. Before the experiment, it is necessary to explain various characteristic parameters in the algorithm in advance. For convenience, this study analyzes the dynamic data of graduates’ employment and entrepreneurship from 2012 to 2019 published by a municipal government in China.\nAccording to the algorithm ideas described in Section 3 of this study, this study selected more than 50 attributes of college graduates, such as education, gender, major, age, household registration category, and failure rate during school and graduation years, as the characteristic categories of the decision tree and predicted the whereabouts of college graduates in 2013 based on the employment and entrepreneurship of graduates in 2012. The study also compared with the actual situation of the whereabouts of college graduates in 2013 and the teacher data to verify the accuracy of the algorithm and then fused the dynamic data in 2013 with the base data to predict the whereabouts of college graduates in 2014 and calculate its accuracy and so on. In this study, the data generated are analyzed many times, and the results are recorded. In order to verify that the dynamic decision tree algorithm proposed in this study effectively generates new characteristic attribute branches among the subnodes of the data structure, based on the above experimental methods, this study establishes a retrieval line model system based on Tensorflow framework through the analysis module in Section 4 of this study. For the dynamic decision tree algorithm, ID3 decision tree, and C4.5 decision tree (ID3 decision tree and C4.5 decision tree are two mainstream decision algorithm models in the latest research results), three different decision tree machine learning algorithms are experimentally studied. The preliminary experimental analysis results are shown in Figure 6.\nAs can be seen from Figure 6, the accuracy of three different machine learning decision tree algorithms in predicting the dynamic employment and entrepreneurship of college graduates from 2013 to 2019 is different in terms of the reliability of the experimental data results. When the number of people is less than 1000, the prediction result accuracy of ID3 decision tree algorithm is the highest. When the number of people is greater than 1000, the data result reliability of dynamic decision tree algorithm is the highest and has been maintained at a high level. The data result reliability of ID3 decision tree algorithm is the lowest, and the prediction accuracy tends to decline gradually. When the number of people is greater than 2000, the prediction accuracy of the three groups of results has decreased to varying degrees, because the dynamic decision tree algorithm has continuously generated new subbranches during the experiment. The maximum bearing capacity of the experimental data has been attenuated since 1800 (that is, the data has been cleared and dynamically analyzed again), and the data collection samples have good coupling with the base data samples. It can be understood that the dynamic decision tree algorithm will test, judge, and classify the new dynamic samples under the “guidance” of the category training samples. The experimental time for all three decision trees is shown in Figure 7.\nFigure 7 shows the time required to process different amounts of data during the experiment of three machine learning decision tree algorithms in the big data system. It can be seen from Figure 7, the time required by the dynamic decision tree algorithm is significantly lower than that of the other two mainstream big data analysis decision tree algorithms. This is because the training data of the dynamic decision tree is constructed based on the addition of base data. After each data dynamic increases, the algorithm does not need to rescan all the data, but modifies the previously obtained tree branch structure, which greatly saves the high cost and low efficiency of the decision tree that the algorithm needs to rescan all the data every time the data is changed, and provides efficiency support for the large data system to analyze the characteristics of graduates’ employment and entrepreneurship.\n4.2. Result Analysis\nThe experimental results show that, on the premise of meeting the hierarchical optimization model of conceptual dynamic model, the existing decision tree algorithm is improved by incremental optimization, and the structural analysis of graduates’ employment destination is completed combined with big data system. In order to explore the employment and entrepreneurship of college graduates, this study visualized the details of the employment and entrepreneurship of graduates in a city in China from 2018 to 2020, and the calculation results are shown in Figure 8. Based on the employment and entrepreneurship data of college students from 2018 to 2020, this study calculates the whereabouts of graduates in a city in China in 2021 through the dynamic decision tree algorithm of big data system. The comparison between the predicted results and the real results is shown in Figure 9.\nAccording to the data analysis of the experimental results in Figures 8 and 9, with the continuous growth of China’s economic strength, the continuous opening of China’s College Students’ Entrepreneurship Policy, and the continuous improvement of China’s social system, the proportion of graduates in a city in China who choose to start their own business and enter a higher school after graduation has been increasing since 2018∼2020, and the proportion of unemployed graduates after graduation has shown an overall downward trend. The overall employment choice of graduates tends to be stable and upward, which is also consistent with the actual situation of the city in 2018–2020. On the other hand, the prediction errors of graduates’ employment rate, entrepreneurship rate, and other choice rate in a city in 2021 predicted by the algorithm are 2.8%, 2.6%, and 2.3%, respectively, which is very similar to the whereabouts of graduates in the first half of 2021. Therefore, the dynamic analysis model of college graduates’ employment and entrepreneurship proposed in this study has high accuracy and practical application value.\nHow to industrialize big data technology with low cost and high efficiency has always been the industry hotspot of big data technology research. Based on this, aiming at the employment and entrepreneurship of college graduates, this study establishes a multilayer dynamic model system based on big data and machine learning dynamic decision tree. Firstly, the development status of various types of big data application technologies and the shortcomings of research progress are introduced, and a dynamic model establishment method based on big data and machine learning dynamic decision tree algorithm is proposed. Secondly, the establishment of big data technology, machine learning technology, and dynamic decision tree algorithm model is introduced, respectively. With the help of these technologies, complex discrete dynamic data can be analyzed and predicted quickly and accurately. Finally, combined with the public data set, the proposed dynamic model is analyzed. Experiments show that the big data integration system based on big data and dynamic decision tree algorithm has high result adaptability. If incremental adaptation optimization is carried out on the traditional decision tree model, the prediction effect and prediction time of dynamic data can be significantly improved, which puts forward theoretical support for the industrialization and social significance of big data technology. This method expands the attributes in the form of dichotomy and only pays attention to the construction of logical attributes in each subbranch of the dynamic model. Therefore, the dynamic model established by this method may lead to too deep decision tree, which needs to be further studied.\nThe experimental data used to support the findings of this study are available from the corresponding author upon request.\nConflicts of Interest\nThe author declares no conflicts of interest regarding this work.\nThe study was funded by the study on the Influence of the Employment and Entrepreneurship of Graduates under the Epidemic Situation of Pneumonia in COVID-19 (JYB2020302).\nE. Jouanjus, C. Sans-Pola, B. Mainoli et al., “Establishing and evaluating a study questionnaire on knowledge and attitudes of healthcare professionals towards recreational and medical cannabis across europe,” Clinical Drug Investigation, vol. 41, no. 8, pp. 701–710, 2021.View at: Publisher Site | Google Scholar\nN. B. Yahia, J. Hlel, and R. Colomo-Palacios, “From big data to deep data to support people analytics for employee attrition prediction,” IEEE Access, vol. 9, no. 99, p. 1, 2021.View at: Google Scholar\nI. B. R. Nogueira, M. A. F. Martins, M. J. Regufe, A. E. Rodrigues, J. M. Loureiro, and A. M. Ribeiro, “Big data-based optimization of a pressure swing adsorption unit for syngas purification: on mapping uncertainties from a metaheuristic technique,” Industrial and Engineering Chemistry Research, vol. 59, no. 31, pp. 14037–14047, 2020.View at: Publisher Site | Google Scholar\nD. Fnyes, B. Nmeth, and P. Gspr, “Design of LPV control for autonomous vehicles using the contributions of big data analysis,” International Journal of Control, vol. 2021, pp. 1–23, 2021.View at: Google Scholar\nK. Lu, J. Liu, X. Zhou, and B. Han, “A review of big data applications in urban transit systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 5, pp. 1–18, 2020.View at: Google Scholar\nL. Heikkinen, M. Äijälä, K. R. Daellenbach et al., “Eight years of sub-micrometre organic aerosol composition data from the boreal forest characterized using a machine-learning approach,” Atmospheric Chemistry and Physics, vol. 21, no. 13, pp. 10081–10109, 2021.View at: Publisher Site | Google Scholar", "label": "Yes"} {"text": "optical spectroradiometer / for production / laboratory / for LED lighting\nGL Spectis 6.0\nlaboratory, for LED lighting\nMin.: 200 nm\nMax.: 1,050 nm\nThe GL Spectis 6.0 LED spectroradiometer, expands on our family of high-end light spectrometers optimized specifically for production and large laboratory setups for the high speed measurement of SSL products (IESNA LM-79-08), LED wafers, large street lamps and luminaries in accordance with the new global standard CIE S025 standard.\nWhenever you need to build a complex LED test and measurement setup, this rack mounted spectrometer module is ready. Easily connect with other devices like power supplies, TEC controls, power meters and other peripherals of the instrument system for LED lighting laboratory or production testing.\nVery High Resolution\nGL Spectis 6.0 LED spectroradiometer uses high resolution optical system covering a very wide spectral range with single sensor and diffraction grating. Average optical solution is 3,5 nm and data point interval 0,5nm which makes this a very universal instrument for different types of measurement.\nChoose your Connection\nChoose the best way to connect and control the system based on project or application requirements. USB or TCP/IP communication can be used for direct data transfer. Additional trigger interface is available for fast testing purposes.\nSpecially designed entrance connector provides high stability and precision for fiber optic connections. Integrating spheres and various options for other optical probes for different types of systems are available.", "label": "Yes"} {"text": "Panasonic Increases Role at ULE Alliance\nThe ULE Alliance, a non-profit organization, based in Bern, Switzerland, is pleased to welcome Panasonic as a new promoter member.\nWe are excited to expand our role at the ULE Alliance. We are convinced that ULE has all the merits to become a dominant player in the IoT domain, Panasonic will support the global market deployment of ULE for home and building use. - David Tuerk, General Manager Smart Home & Telecom Europe of Panasonic\nThe ULE Alliance is driving the effort to make ULE technology the leading infrastructure and standard for home wireless networks. ULE technology is the most secure, longest range and most stable low energy wireless networking solution available on the market. It supports integrated two-way voice and video, and enables whole home solutions with a simple low-cost layout. The ULE Alliance assists its members in developing IoT solutions that build on ULE’s technological superiority and market benefits.", "label": "Yes"} {"text": "OLED is a new display technology, used to create thin, power efficient and bright displays. Today OLEDs are used in mobile phones, tablets, digital cameras and even TV sets - as OLEDs are considered the best display technology ever.\nApple's OLED iPhone\nApple's 10th anniversary iPhone X was the company's first OLED Phone - with a 5.8\" 1125x2436 (458 PPI) flexible Super AMOLED display. Since then Apple has been adding more OLED iPhones, and as of 2021, the company's entire smartphone lineup adopts AMOLED displays.\nThe OLED Apple Watch\nIn April 2015 Apple launched its first wearable device, the Apple Watch which used a flexible AMOLED display (made by LG Display). All Apple Watch products to date continue to use flexible AMOLED displays. OLED displays are especially suitable for wearable devices - as the displays are thinner and lighter than LCD displays, and are more power efficient (especially if you tweak the UI to suit the special OLED properties). According to reports, Apple is developing next-generation MicroLED display technologies for future wearable devices.\nApple OLED MacBook Pro\nApple's MacBook Pro range of high-end laptops started adopting an OLED Touch Bar instead of the traditional function keys in 2016. The display itself is either a 13\" or a 15\" LCD.\nThe OLED strip is supported by most of Apple's applications and can show commonly used emojis in messaging applications, bookmarks while you browse and other context-activated options. It also includes a Touch ID sensor that is activated for example when you wish to pay online (on supported web stores). Apple released an API to developers can support the Touch Bar in third-party applications.\nThe latest Apple OLED news:\nDSCC sees a $63 billion OLED market in 2026, driven by high demand for laptop, monitor and tablet displays\nDSCC has released its latest OLED market forecast, and the company forecasts a 8% CAGR revenue growth, with the market reaching $64 billion in revenue in 2026. The growth will be fueled by high demand for laptop, monitor and tablet displays. The smartphone and OLED TV market will also continue to grow.\nDSCC sees a 31% CAGR shipment growth for laptop displays, to reach around $2.4 billion in 2026, and a 95% CAGR unit growth for monitor OLED displays, which will reach $1.3 billion in 2026 (up from $200 million in 2022). This is fast growth for monitor OLED displays, but slower than DSCC previously estimated, due to competition for miniLEDs, rigid OLED capacity that will be used for laptops and tablets and lower demand to mirroring display monitors.\nTowards the end of 2021 we reported that Apple plans to launch its first AR headset in Q4 2022, powered by dual 4K OLED microdisplays, produced by Sony\nAccording to Ross Young from DSSC, Apple first headset will actually be a VR headset, that uses a foveated display system. The headset will feature three displays - two 4K microLEDs (indeed produced by Sony) and one larger AMOLED display.\nApple analyst Ming-chi Kuo says that Apple plans to launch its first AR headset in Q4 2022, powered by dual 4K OLED microdisplays, produced by Sony. The headset will feature Mac-level computer power and will not require a tethered smartphone to operate.\nApple has been working on AR technologies for many years. Last year it was indeed reported in Japan that Apple is working with Sony on its microdisplays. Earlier this year it was reported that Apple has teamed up with TSMC for microdisplay production - but it could be that TSMC will be the manufacturing partner, while Sony will provide the OLED technology and knowhow.\nDSCC posted an interesting article, comparing the production costs of OLED vs mini-LED panels for IT. DSCC estimates that for tablets and notebooks, a tandem structure will be used, and the panels will be based on rigid substrates.\nIn the chart above you see a production cost comparison, between 2021 and 2025, for 12.9\" panels. DSCC looks at two OLED production options: a tandem OLED panel with an LTPO backplane produced in a 6-Gen fab, and a similar panel that uses an Oxide-TFT backplane and produced in a larger 8.5-Gen fab. As you can see, OLED panels are more cost effective, and will remain so throughout the forecast period.\nAccording to a report from China, BOE will produce around 15 million AMOLED panels for Apple in 2021, or about 10% of Apple's total OLED panel orders.\nBOE is supplying displays for refurbished iPhone 12 devices, and Apple is now looking into adopting BOE's panels in the iPhone 13. It is likely that the 15 million shipments estimate relies on Apple's approval of BOE's iPhone 13 panels, and even so it might be a bit optimistic that BOE will supply so many panels by year's end.\nUBI Research estimates that Samsung Display shipped 124.76 million smartphone AMOLED panels in Q3 2021, an increase of 24.6% from the previous quarter, enjoying high demand from Apple for its iPhone 13 series.\nSDC produced and shipped 62.63 million rigid panels (or about 50% of its total shipments), for low-end and mid-tier smartphones. Flexible OLED shipments were 58.2 million units (out of which 39.31 million went to Apple), and foldable OLEDs shipments reached 3.93 million units.\nA few days ago we posted that Apple has reportedly decided to delay its iPad OLED launch to 2023, and the company canceled its current joint development project with Samsung Display, as SDC could not develop what Apple wanted - a tandem stack structure, which would have improved the lifetime and performance of the AMOLED display.\nAccording to a new report from Korea, LG Display is also developing a tablet display for Apple - a 12.9\" AMOLED panel. LG's iPad display will be ready for mass production by 2023-2024, and it will use a tandem (2 stacks) architecture on an LTPO backplane. As SDC's project is canceled, it is likely that LG's 12.9\" will be the first OLED adopted by Apple's tablets.\nReports from Korea suggest that Apple has decided to delay its iPad OLED launch to 2023, and the company canceled its current joint development project with Samsung Display.\nSDC aimed to develop a 10.86 AMOLED display for Apple's iPad. According to earlier reports, Apple wanted SDC to developed a tandem stack structure to improve the OLED device lifetime and brightness - and also to reduce burn-in problems. Apparently SDC is not ready to start tandem OLED production next year, and Apple will not accept a single-stack OLED for tablet applications.\nOur friends at DisplayMate posted an in-depth technical review of the iPhone 13 Pro Max display. The 6.7-inch 1284x2778 10Hz-120Hz 1200 nits LTPO AMOLED receives DisplayMate's highest display performance grade of A+.\nDisplayMate says that the new display outperforms the display adopted by Apple in last year's iPhone 12 Pro Max. The iPhone 13 Pro display's new adaptive 120Hz refresh rate which results in a 25% boost to power efficiency. The new display is also brighter by 27% and enjoys a higher absolute color accuracy. The size of the notch was also reduced by 20%.\nAccording to reports from Korea, Apple has given BOE a \"conditional approval\" for iPhone panel supply. BOE hasn't been able to meet 100% of Apple's requirements, but it is now given time to fix these issues, and may be able to become a supplier to Apple if all goes well.\nEven if BOE manage to satisfy Apple, it will take some time and so it is likely that it won't receive large orders for the iPhone 13 series. Apple currently buys all of its iPhone AMOLED panels from Samsung Display and LG Display. BOE aims to supply the panels for the standard iPhone 13 (not the Pro series).", "label": "Yes"} {"text": "I noticed there is a new Patch ‘B’ available and I would\nlike to upgrade my machine, the problem is that I am\nusing a network card not yet supported by QNX so I\ncan’t access the web while running it. This means I can’t\naccess the QNX repository and I am somewhat reluctant\nto donwload the whole CD again so I could upgrade from\nIs there a way to download the patch from MS-Windows\nand then access it directly using a dual-boot?", "label": "Yes"} {"text": "Anritsu has introduced an LTE-V2X PSCCH TX measurement MX887068A-001 software option to enhance the cellular vehicle to everything (C-V2X) measurement function of universal wireless test set MT8870A / MT8872A. The software supports the physical sidelink shared channel (PSSCH) for LTE-V2X (PC5) and supports RF measurement of the physical sidelink control channel (PSCCH). It also supports […]\nThe post Anritsu’s software option enhances C-V2X measurement appeared first on Softei.com – Global Electronics Industry News.\nSoftei.com – Global Electronics Industry News", "label": "Yes"} {"text": "The REDSCAN RLS-3060 is an award-winning laser scanner detector series. It can detect a moving object's size, speed and distance from the detector and process that information with a unique built in algorithm, which results in high reliability detection with minimal false alarms. The detector can also be mounted vertically or horizontally according to the application and site conditions.\nThe REDSCAN RLS-3060SH is a high resolution, long range 2D LiDAR detector. It has both intelligent detection analysis functions and adjustable detection algorithm parameters that increase its range of applications. Our RLS-3060SH model provides a flexible solution that streamlines video surveillance and a wide range of security applications.\nThe REDSCAN RLS-3060-SH can be installed directly on an IP security network and integrates with all major Video Management Software (VMS) platforms.\nThe RLS-3060SH firmware version 8 and REDSCAN Manager (configuration software) version 8.0 together extend the detection range to 50m and add some new setting options.\n|Extended Detection Range||Changeable Dry- contact Alarm Output type|\n|The increased detection range function can be set to 50m (165ft) radius. The extended area from 30-50m is ideal as a pre-warning zone. In horizontal mode, at 50m, the laser scanner will be able to detect large moving objects such as vehicles: in vertical mode the RLS-3060Sh could detect a walking or squatting person over 100m.||The new version 8 update offers more flexibility in managing dry contacts with the option to switch from normally open (N.O) to normally closed (N.C). The flexibility in being able to manage multiple outputs means that the sensor suits a number of security applications.|\n- Roof / Ceiling\n- Vertical and horizontal mounting\n- Unique detection algorithm\n- Scene selection (outdoor, indoor, indoor etc.)\n- Anti-masking function\n|Detection Method||Infrared Laser Scan|\n|Laser Protection Class||Class 1|\n|Vertical Area Coverage||Max. 60 m (Approx. 200 ft.) at 10% reflectivity|\n|Horizontal Area Coverage||Radius: 50 m (Approx. 165 ft.), Arc:190° at 10% reflectivity|\n|Communication Port||Ethernet ,RJ-45 ,10BASE-T/100BASE-TX|\n|Protocol||UDP, TCP/IP *Redwall Event Code|\n|Power Imput||24 VDC , 24 VAC|\n|Current Draw||400 mA max. (24 VDC) 600 mA max. (24 VAC)|\n|Vertical Mounting Height||15 m (50ft.) (recommendation)|\n|Horizontal Mounting Height||0.7 m (28in.) (recommendation)|\n|Target Object Selector||S / M / L|\n|Sensitivity selector||H / M / L|\n|Camera control output||N.O. 28 VDC, 0.2 A x 4 outputs|\n|Master alarm output||Form C, 28 VDC, 0.2 A max.|\n|Trouble output||Form C, 28 VDC, 0.2 A max.|\n|Tamper output||N.C. 28 VDC, 0.1 A max.|\n|Environmental disqualification circuit||Form C, 28 VDC, 0.2 A max.|\n|Alarm period||Approx. 2 sec., Off delay timer|\n|Operating temperature||-20 to 60 °C (-4 to 140° F)|\n|Dimensions (H x W x D)||334 x 144 x 155 mm (13.2 x 5.7 x 6.1 in.)|\n|Weight||2.4 kg (85 oz)|", "label": "Yes"} {"text": "The Divison of Marketing and Communications provides access to the most up-to-date information released by Memorial University of Newfoundland. Archives of previous news releases are also available.\nTo access news releases from Grenfell Campus please click here.\nREF NO.: 34\nSUBJECT: Electrical and computer engineering conference marks 25th anniversary\nDATE: Nov. 8\nThe 2016 Newfoundland Electrical and Computer Engineering Conference will take place on Thursday, Nov. 10, at the Holiday Inn in St. John’s.\nThis year marks the 25th anniversary of the conference.\nThis year’s conference brings together a diverse technical program and will explore a wide range of technologies, including power systems, sensing, biomedical, networks and instrumentation.\nConference speakers include Emad Rizkalla, founder and CEO, Bluedrop Performance Learning, who will talk about entrepreneurship and leadership, and Stan Marshall, president and CEO, Nalcor Energy, who will speak about the Muskrat Falls megaproject.\nMembers of the media are invited to attend either of the above sessions, which will take place at 9 a.m. and 7 p.m., respectively.\nThe annual conference, which is organized by the Newfoundland and Labrador section of the Institute of Electrical and Electronics Engineers and in co-operation with Memorial University, brings together presenters from industry and academia to highlight the impressive work that is being done in Newfoundland and Labrador in the areas of electrical and computer engineering.\nMore information about the conference is available here.\n- 30 -\nFor more information, please contact Jackey Locke, communications co-ordinator, Faculty of Engineering and Applied Science, at (709) 864-8287 or email@example.com.", "label": "Yes"} {"text": "What does Zener mean?\nThis diode was invented by Clarence Malvin Zener in 1915 and was named after him.\nThe term \"Zener\" has been taken from an electrical element called \"Zener Diode\". This kind of diode passes the electrical current in one direction and allows the current to switch to opposite direction when voltage surpasses the maximum limit.\nZener engineering company was founded by five graduates from Tehran university in 1981. During Iran-Iraq war with increase of frequent interruption of electricity, our company designed and manufactured surge protectors for appliances such as refrigerator, television and others. In 1983 Zener designed and manufactured a new product to protect devices with 3-phase motors.\nManufacturing first Iranian offline UPS with Zener brand and co-founder of UPS Manufacturer’s Association of IRAN\nZener continued manufacturing various types of surge protectors and industrial panels until the 80’s which the usage of computers in government organizations, banks, etc. was on the rise. Interruption for such systems was a major issue and in 1989 Zener engineering company designed and manufactured the first offline UPS in Iran named Zener UPS and expanded the range of production up to 5kVA.\nThe after sales service department started to grow rapidly due to considerable growth in the market. The commercial department imported necessary electronic components for UPS production primarily and expanded its activity through importing high power industrial UPS, sealed lead-acid batteries and diesel generators.\nIn 1994 UPS Manufacturer’s Association of IRAN was established with Zener’s participation.\nMembership in associations and organizations and acquiring iSO9001: 2008 certificate\nFrom 2000 to 2009, Zener successfully obtained exclusive business partners from famous international brands to provide UPS, battery and generator sets.\nZener established department of renewable energy systems in 2009 and accomplished several research studies. Zener is now officially certified by reputable brands to provide solar panels, inverters, solar chargers and related products.\nIn 2011 Zener became an active member of Iran Solar Industry Association, Iran Electrical Syndicate and Iran-Italy Chamber of Commerce.\nNow with more than 35 years of experience in the field of electronics and more than 60 qualified personnel, we make high efforts to meet and satisfy our clients’ requirements by continuous improvement through various trainings, optimizing procedures and documenting activities. Our ultimate step in achieving this goal was obtaining iSO9001:2008 certificate of quality management system in 2013.\nQuality management system standard certification iSO9001:2008 by SGS Switzerland\nMembership in Iran’s Electrical Industry Syndicate\nCompleted construction of 800m2 warehouse for future productions\nMembership in the Iran-Italy chamber of commerce\nMembership in Solar Industry Institute of Iran\nBecame official representative of Riello UPS (Italy) after integration of Riello and AROS\nThe new department of renewable energy systems was created\nBecame exclusive representative of Global and Rocket batteries from Sebang company (South Korea)\nBecame exclusive representative of Ablerex Electronics UPS (Taiwan)\nBecame exclusive representative of AROS UPS (Italy)\nBecame exclusive representative of Starway battery from Leoch company (China)\nBecame official representative of AROS UPS (Italy)\nBecame exclusive representative of Newmax battery from NB corporation (South Korea)\nBecame official representative of UIS Abler Electronics UPS (Taiwan)\nBecame official representative of Liebert Hiross UPS (Italy)\nBecame exclusive representative of PowerCo diesel generators (UK)\nBecame official representative of Newmax battery from NB corporation (South Korea)\nUPS Manufacturer’s Association was established with participation of Zener\nDesigned and manufactured the first offline UPS in Iran up to 5 kVA named Zener UPS\nChange company location to the current location in PHILIPS building and increased office space\nDesigned and manufactured a surge protection device for 3-phase motors\nZENER Engineering Co was founded on September 16th\nDesigned and manufactured surge protection devices for appliances such as refrigerator, television and stereos\nZener Engineering Co. with more than 30 years of experience in the electrical and electronics industry is the official and exclusive representative for products of the following companies in Iran:\nclusive representative for UPS, frequency converter, power systems manufactured by Ablerex:Ex\nAblerex, with its’own core technologies, has developed power conversion products that promote improved power stability, power quality and green energy for global markets. Ablerex is an organization that invests a high portion of its resources to technical research and development. This strategy results in more than 100 advanced, proprietary patented techniques. In addition, a leading market researcher has presented Ablerex with its Global Leader Award.\nrepresentative for UPS, frequency converter, power systems manufactured by Riello:Official\nRiello UPS offers a vast range of products, organized into 22 ranges of uninterruptible power supplies (UPS ), based on several different state-of-the-art technological architectures. Thanks to its two research centers, world-class examples of excellence for the design, development and testing of uninterruptible power supplies, Riello UPS can constantly innovate its product portfolio, keeping it at the top in terms of performance, reliability and competitiveness.\nclusive representative for Diesel generator and Power systems manufactured by PowerCo:Ex\nPowerCo Systems Ltd are an independent British manufacturer of a comprehensive range of diesel generating sets with outputs from 5kVA to 3000kVA, 50 and 60Hz. Based in the United Kingdom, PowerCo have now been manufacturing generators since 1995, however we have decades of experience gained from our main staff working in the Power Industry for well of 20 years.\nclusive representative for Starway Sealed-lead acid batteries:Ex\nProprietary battery brand registered under Zener Engineering Co. Zener provides maintenance free sealed lead acid batteries ranging from 7 to 100AH with best quality and high life expectancy used for UPS, telecommunication equipment, lighting applications, security and medical systems.\nrepresentative for Rocket/Global Sealed-lead acid batteries manufactured by Sebang:Official\nSEBANG GLOBAL BATTERY Co.,Ltd has led the battery industry in Korea with the brand of \"Rocket\" for over half century since the establishment in 1952. SEBANG Global Battery has put forth its strength to the continuous management innovation corresponding to the rapid changing market environment, and has concentrated ceaseless efforts to the technology development in order to produce the best product.\nrepresentative for the Newmax Sealed-lead acid batteries manufactured by Daejin:Official\nDaejin Battery Co., Ltd., has over 20 years experience and endless R&D investment in the lead-acid battery industry. Daejin make use of state-of-the-art testing facility to constantly build on experience to provide the most advanced products on the market today. Daejin is passionate about helping customers succeed.", "label": "Yes"} {"text": "The Burl Audio BAD8 ADC Card is designed for use with the Burl Audio B80 and Burl Audio B16 Mothership; it is the result of over 20 years of R&D A/D design experience.\nFollowing on the overwhelming success of the B2 Bomber ADC and the BAD4, the BAD8 employs a next generation analog circuit path and the latest in analog to digital conversion. This is a no compromise design utilizing all class-A, discrete transistor circuitry and the legendary BX1 transformer coupled input. The BAD8 benefits from the new form factor of the BX1 transformer, allowing for more channel density. The BAD8 also boasts the latest analog-to-digital conversion technology giving it great tone with even greater detail and amazing low latency.\nBurl Audio BAD8 ADC Card Features\n- 44.1k Hz to 192k Hz, 24 bit, 8 channel ADC\n- Proprietary, high definition, BURL AUDIO BX1 transformer input\n- Next generation, all class-A, discrete transistor signal path with zero feedback, zero circuit path capacitors\n- Next generation AD conversion\n- Low latency\n- 8-channel DSUB connectivity\n2 Reviews Hide Reviews Show Reviews\nOf all the a/d Converters that I use these are my favorite musical, conversion you get a sound that is very reminiscent of analog tape deck I use this with the mothership B16 into ProTools HDX system, and I couldn’t be happier\nI love these converters. Big! Bold! Clean but with good character. Best AD I've ever had to opportunity to hear. Got 1 and had to immediately get another. Now I track everything using the Burls and it sounds light years better than any other converter that I have ever used on all sources!", "label": "Yes"} {"text": "Looks like Extron is getting closer and closer to the high-end control market as it just launched the IPCP Pro 555, a high-end IP Link Pro control processor with a dedicated AV LAN port. It features advanced security standards and dual Gigabit Ethernet ports, which are designed to ensure compatibility with multiple TouchLink Pro touchpanels using a standard network infrastructure. Of the two Ethernet ports, the AV LAN is designated to control local AV devices, and is secure from outside interference or intrusion. The IPCP Pro 555 can be used with Extron LinkLicense, which further enhances the capabilities of Extron Pro Series control systems. The IPCP Pro 555 is an ideal choice for controlling multiple devices and signal types within AV systems requiring an isolated AV network.\nThe IPCP Pro 555 features a DHCP server for the AV LAN that streamlines system setup and management. It automatically distributes IP addresses and network configuration parameters for the AV devices connected to the local AV LAN. In addition, the AV LAN port permits communications from the Ethernet port for remote management and firmware updates for Extron devices, and restricts other Ethernet traffic. The IPCP Pro 555 can be configured and customized using Extron Global Configurator Plus or Global Configurator Professional. It is also compatible with GlobalViewer Enterprise software.", "label": "Yes"} {"text": "If international car companies want to promote self-driving cars in China, then high-precision positioning services will almost always use Beidou, and high-precision maps will all rely on Chinese related map dealers. For example, BMW established cooperation with NavInfo, which will provide high-precision map services required by BMW for self-driving cars.\nRecently, Toyota has also reached strategic cooperation with Chinese self-driving startup Momenta, which will provide high-resolution maps and update services based on camera vision technology. The two parties will jointly promote the commercial implementation of Toyota’s Automated Mapping Platform (AMP) in China to better serve Chinese users.\nMomenta is positioned to create the “brain” of autonomous driving, and its core technologies are environment learning based on deep learning, high-precision maps and driving decision algorithms. At the same time, Momenta also has Class A qualification for electronic navigation maps, which can carry out data collection and production of high-precision maps.\nIn addition to establishing cooperation with Momenta, Toyota itself is also developing high-definition maps. Just a few days ago, Toyota Advanced Research Institute (TRI-AD), a Toyota autonomous driving software research and development company, showed a high-precision map with a relative accuracy of less than 50cm. It has no obvious advantage in terms of accuracy alone. It is reported that TRI-AD has been building high-precision maps since last year, and has now created maps of 23 Tokyo districts and 6 cities around the world.\nIn terms of autonomous driving research and development, Toyota has been using Lexus LS 500h-based modified cars for related tests. According to Toyota’s plan, Lexus cars with autonomous driving will be launched later in 2020. In addition, Toyota also introduced the e-Palette, a fully electric fully-autonomous driving concept car, which has obvious advantages such as modularity and scalability, and is an ideal solution for mobile travel services.", "label": "Yes"} {"text": "Pasternack, a leading provider of RF, microwave and millimeter wave products, has signed an agreement with Planar Monolithics Industries, Inc. (PMI) to private-label a selection of PMI manufactured products under the Pasternack brand name. These new products will be available off-the-shelf for immediate shipping.\nThrough this private-label agreement, Pasternack will expand the visibility of its already extensive portfolio of RF, microwave and millimeter wave coaxial component solutions to a larger number of customers. This new partnership provides customers with urgent RF product needs access to an extensive inventory of industry-leading components through Pasternack, which include Pasternack’s 24/7 sales and technical support, online purchasing and same-day shipping.\n“Partnering with PMI is an exciting development for Pasternack, further aligning us with our goal of being the RF engineer’s single source for urgently needed RF products globally. With this agreement, we are able to expand our existing, broad selection of in-stock RF and microwave products and quickly deliver them to engineers when they need them,” said Tim Galla, Senior Product Manager, RF Components at Pasternack.\n“Planar Monolithics Industries, Inc. (PMI) has, for a long period of time, been seeking an opportunity to provide customers with off-the-shelf solutions in situations where time and schedules do not allow for our state-of-the-art advanced RF/Microwave components to be built-to-order. Partnering with the remarkable distribution and marketing platform offered by Pasternack Enterprises will now make this possible,” said Sebastian Palacio, VP at Planar Monolithics Industries, Inc.\nFor more information, visit pmi-rf.com/stock-items.", "label": "Yes"} {"text": "Elon Musk-owned electric car company Tesla has introduced the new AMD Ryzen chip and 12v Li-ion battery in 2022 Model 3 Model Y vehicles.\nTesla has released an annual holiday software update that turn its electric cars into megaphones by using external speakers that have been installed in recent vehicles.\nThe company said that the new update brings improved object detection network architecture for non-VRUs (e.g. cars, trucks, buses), seven per cent higher recall, 16 per cent lower depth error and 21 per cent lower velocity error for crossing vehicles.\nElon Musk-owned electric car maker Tesla has withdrawn an application for over $1 billion in subsidies for battery production at Gigafactory Berlin.\nTesla has updated the warning that comes with downloading a new version of the FSD Beta. It includes all the warnings that were part of previous releases, but the automaker added important new language.\nThe company had earlier said R1S would begin production at the Normal, Illinois plant in December, with the first deliveries expected in January.\nElon Musk-owned electric vehicle company Tesla's app server went down this week, leading to a worldwide app outage that left owners unable to connect to their cars.\nMusk was responding to a Tesla owner's tweet, who said that he was experiencing a \"500 server error\" to connect his Model 3 through the iOS app in Seoul, South Korea.\nElon Musk-owned electric vehicle company Tesla has reportedly removed the dates about Cybertruck production from its website.\nElon Musk-owned electric vehicle company Tesla is using its \"Tesla Engage\" platform to ask its fanbase to support a new push to convince the New York governor and legislature to allow direct sales of its electric vehicles in the state.", "label": "Yes"} {"text": "Ce kit de raccordement spécial pour...\nThe kits \"sewable el wire tuning moto\" are complete and ready to be used. This el wire has the specificity to have a plastic collar allowing you to stick, staple or sew your el wire easily. The el wire is connected, via its inverter, directly on the electric harness of your motorcycle. Its very low consumption will not penalize your battery.", "label": "Yes"} {"text": "Electrical engineering degrees are available at both undergraduate and graduate levels. These programs often feature specializations in areas like nanotechnology, microelectronics and circuit design. Undergraduate students must have their high school diploma to pursue an associate's (2 years) or bachelor's (4 years) degree in the field, with some schools requiring SAT or ACT scores. An undergraduate degree in electrical engineering is required for master's and Ph.D programs, as well as GRE scores. Master's programs typically take 2 to 6 years to complete, with thesis projects often being required.\nAssociate of Applied Science in Electrical Engineering Technology\nAn associate's degree program in electrical engineering technology prepares grads for employment as engineering technicians. Students in associate's programs learn about electronic devices and components. Hands-on training in assembling and dissembling electronics is often included.\nAfter basic courses in math and physics, students receive training in electronic circuits, machines that utilize electricity and computer applications. Some possible courses include:\n- Algebra and calculus\n- Logic controllers\n- Analog electronics\n- DC and AC circuits\nBachelor of Science in Electrical Engineering (BSEE)\nA Bachelor of Science in Electrical Engineering provides a foundation in electrical engineering and introduces students to the theory and design of electrical circuits, electronics and systems and signals. Some programs include an optional fifth year in which the student completes a senior design project. This is strongly encouraged for those students who are interested in continuing their study in electrical engineering at the graduate level.\nThe first and second year of enrollment is primarily devoted to math and science courses. During the final years, a student will complete core courses in electrical engineering and a senior project. Some possible courses include:\n- Physics and chemistry\n- Calculus including differential equations\n- Circuits and digital logic\nMaster of Science in Electrical Engineering\nA master's degree program in electrical engineering introduces students to more advanced concepts within the field. Students may pursue a thesis or non-thesis option; the thesis option is strongly recommendation for students who plan to apply for research-based electrical engineering positions.\nThe first year is devoted to core courses in a student's area of interest. Course topics typically include:\n- Solid state instruments\n- Computer engineering and architecture\n- Electromagnetic theory\n- Analysis of linear systems\n- Complex variables\nDoctor of Philosophy in Electrical Engineering\nA Doctor of Philosophy in Electrical Engineering degree program includes training on the basics of electronic systems and design. Some current electrical engineering emphasis areas include semiconductors, solid state microelectronics, signal processing, wireless networks and electromagnetics.\nA majority of the time enrolled in a Ph.D. degree program in electrical engineering is spent on conducting research and the writing of a dissertation. A research topic is chosen and the student works closely with an adviser to develop a course of study that compliments the student's area of interest.\nElective courses should support a student's area of interest within the discipline. Some courses might include:\n- Electrical power systems\n- Analysis of linear systems\n- Processing of digital signals\n- Integrated circuits\n- Electromagnetics and computational methods\nJob Outlook and Salary Information\nAccording to the U.S. Bureau of Labor Statistics (www.bls.gov), the employment of electrical and electronic technicians is expected to decline by 2% for the years 2014-2024. The BLS also reports that the 2015 annual median salary of an electrical and electronics engineering technician was $61,130.\nThe BLS reported that the employment of electrical engineers is not expected to change for the 2014-2024 period. The median annual salary of an electrical engineer in 2014 was $93,010.\nPossible Career Options\nMany opportunities exist for electrical engineering at all levels from associate to doctoral degrees.\n- Electronics technician\n- Electrical engineer or research electrical engineer\n- Test engineer\n- Research engineer\nContinuing Education Information\nState licensure is required for engineers who offer their services to the general public. Licensure requires passing a state examination, accumulating four years of work experience as an engineer and graduation from a program accredited by the Accreditation Board for Engineering and Technology (ABET). Certification is also offered by many different professional organizations.\nAspiring electrical professionals can pursue associate's, bachelor's, master's, and doctoral degrees that provide training in various areas of electrical engineering and technology. Those who attain licensure after school can seek careers as engineers.", "label": "Yes"} {"text": "Haldane charge conjecture in one-dimensional multicomponent fermionic cold atoms\nPhysical Review B\nA Haldane conjecture is revealed for spin-singlet charge modes in 2N-component fermionic cold atoms loaded into a one-dimensional optical lattice. By means of a low-energy approach and DMRG calculations, we show the emergence of gapless and gapped phases depending on the parity of N for attractive interactions at half-filling. The analogue of the Haldane phase of the spin-1 Heisenberg chain is stabilized for N=2 with non-local string charge correlation, and pseudo-spin 1/2 edge states. At the\n... art of this even-odd behavior is the existence of a spin-singlet pseudo-spin N/2 operator which governs the low-energy properties of the model for attractive interactions and gives rise to the Haldane physics.", "label": "Yes"} {"text": "This item may be available in a different size, colour, scent, version or platform. Click below to be directed to product options:\nCompatible Models: Samsung Galaxy Note 3 Package Include : 2 x 3500mAh Li-ion Rechargeable Replacement Battery + 1 x Desktop Dock Charger Cradle + 1 x USB-Cable\nBatteries (3.7v, 3500 mAh) AnoKe batteries use high quality cells£¬batteries have an integrated microchip to prevent overcharging and overheating that helps lengthen the life of your battery.\nCharger Cradle Function: Data synchronization + Phone charger + Phone holder + Charging Spare Battery both the phone and battery can charger at the same time. Batteries have an integrated microchip to prevent overcharging and losing power that helps lengthen the life of your battery.Stable phone holder allows to watch movies without hand holding all the time.small portable designed that convenient to carry on traveing\nNotes:1. The dock is equivalent of a connector. If adapter output voltage is not enough, maybe cannot charge phone and battery at the same time. Only work either. If the special adapter over 18w (quick charger 2.0, quick charger 3.0 )have enough output voltage, both battery and phone are charging.\nbatteries 24-Month Warranty:If you have any problem with this product , please feel free to contact us, we will reply you within 24 hours.\nNotes: 1. The dock is equivalent of a connector. If adapter output voltage is not enough, maybe cannot charge phone and battery at the same time.Just work either. If the special adapter over 18w (quick charger 2.0, quick charger 3.0 )have enough output voltage, both battery and phone are charging. 2. The dock works with TPU slim case. Package Include : 1 x Galaxy Note 3 Charger,2 x Galaxy Note 3 Battery, + 1 x USB-Cabl Batteries (3.7v, 3500 mAh) were made with Lithium-ion technology , allows to charged battery quickly With The Desktop Dock Charger Cradle , You Can Charge Spare Battery And Phone At The Same Time The Dock Charger Cradle Can Makes You Watch Videos And listen To Music more convenient When charging\nPackage Contents: Perfectly designed for Samsung Galaxy note 3\nSamsung Galaxy Note 3 BATTERY*2\nMost Helpful Customer Reviews\nThe battery's work fine, I feel like they give me about the same amount of charge as the battery that came with my note 3. The charger works decently as well. It takes a little longer to charge than the USB 3.0 charger that came with my phone, and even slower when I have both the spare and the phone charging at the same time. I feel good knowing that I am never without a spare battery. The charger holds my phone nicely, especially for video chatting.\nI LOVED the product and it helped us with 2 batteries that I can charge quickly. This saved having to replace the phone so it was a win-win deal!!\nThis charger has worked very well for me I never run out of battery power.\nThe authorised South African distributor of this product is under no obligation to honour the manufacture's guarantees/warranties or to provide after-sales service.\nPlease note that this item is imported from the USA, and is designed to be used in the USA. In addition, if the unit is powered it will come with a US plug and an adapter/transformer may be required. Please click here for more information on power requirements, or check with us if you are unsure or need any assistance!\nPlease also note that certain items cannot be imported, these include Alcohol, Animals, Batteries, Flammable Materials, Currency, Food, Furs, Chemicals, Explosives, Medications, Plants, Seeds, Supplements, Pressurized Cans, Tactical Equipment, Vitamins, Weaponry and Weaponry Accessories. In these cases, the item and information is displayed for reference purposes only. If you are not sure if we are permitted to bring an item, please send us an e-mail with a link to the item to confirm.\nPlease also ensure that you are ordering the correct item for your particular application as returns to the USA are costly. Product reviews are also provided for most of our items, which can give you a good idea for possible things to look out for and the quality of the item. By clicking Add to Cart, you are confirming that the item is correct and you accept the conditions listed here.", "label": "Yes"} {"text": "Design Feasibility of a Vortex Induced Vibration Based Hydro-Kinetic Energy Harvesting System\nThe vortex induced vibration (VIV) based power generating system discussed in this paper is a new concept in power generation from fluid flows in oceans, rivers and streams. The possibility of harnessing energy from the vibrations incurred in a bluff body due to the phenomenon known as VIV, in which motion is induced on a body facing an external flow due to the periodic irregularities in the flow caused by boundary layer separation is explored. The VIV system is based on the idea of maximizing rather than spoiling vortex shedding and exploiting rather than suppressing VIV. The vibrating bodies are in turn used to harness energy using an efficient power-take-off system. The study of fluid dynamics, along with maintaining vortex shedding over the synchronization range, plays an important role in the design of such a system. Apart from this, the main challenge in the design of a VIV generator is introducing optimal damping and low mass ratios for high energy conversion and an efficient power take- off mechanism. This work presents a scoping study of such a device. In contrast to previous work on forced vibrations, the present study focuses on free vibrations that arise due to the shedding of vortices from a cylinder. The working and design considerations of the energy converter is outlined starting with a set of basic definitions pertaining to this technology. © 2011 IEEE.\nV. Lobo et al., \"Design Feasibility of a Vortex Induced Vibration Based Hydro-Kinetic Energy Harvesting System,\" 2011 IEEE Green Technologies Conference, Green 2011, Institute of Electrical and Electronics Engineers (IEEE), Jan 2011.\nThe definitive version is available at http://dx.doi.org/10.1109/GREEN.2011.5754879\n2011 IEEE Green Technologies Conference, Green 2011 (2011, Baton Rouge, LA)\nMechanical and Aerospace Engineering\nArticle - Conference proceedings\n© 2011 Institute of Electrical and Electronics Engineers (IEEE), All rights reserved.", "label": "Yes"} {"text": "Please Rate and Review for QUORUM AI\nQUORUM AI is providing Computer application software for mobile phones and handheld computers, namely, software for development of artificial intelligence (AI) algorithms and technology and for artificial intelligence (AI) support; computer operating software; computer software development tools; computer software platforms, downloadable, for development of artificial intelligence (AI) algorithms and technology, namely, machine learning and intelligence augmentation systems; computer software for controlling and ma....\n- If you are new to Trademarkia, please just enter your contact email and create a password to be associated with your review.\n- If you already have a Trademarkia account, please enter your account's email and password before posting your review.\n* Please Rate:\n* Your Review:", "label": "Yes"} {"text": "Global market for battery recycling services will register a steady 10.9% CAGR from 2016 to 2024, with the opportunity in this market rising from US$7.1 bn to be worth US$19.9 bn by the end of the forecast period.\n[USPRwire, Mon Apr 15 2019] In order to study the various trends and patterns prevailing in the concerned market, Market Research Reports Search Engine (MRRSE) has included a new report titled “Global Battery Recycling Market” to its wide online database. This research assessment offers a clear insight about the influential factors that are expected to transform the global market in the near future.\nGet Sample Report @ https://www.mrrse.com/sample/1855\nBattery recycling involves the recycling of used batteries from various sources such as household batteries; car batteries; and batteries from laptops, mobile phones, power tools, etc.. This activity prevents batteries from ending up in municipal waste and landfills and prevents hazardous materials such as lead, cadmium, mercury, and nickel from entering the environment. These materials are highly toxic and can leach into the soil from landfills. They not only contaminate soil but also underground and surface water sources. Therefore, battery recycling not only protects the environment from potential hazards but also prevents possible health ailments due to these hazardous materials.\nThis report analyzes and forecasts the market for battery recycling at the global and regional level. The market has been forecast based on revenue (US$ Mn) from 2018 to 2026, considering 2017 as the base year. The study includes drivers and restraints of the global battery recycling market. It also covers the impact of these drivers and restraints on demand for battery recycling during the forecast period. The report also highlights opportunities in the battery recycling market at the global and regional level.\nThe report includes a detailed value chain analysis, which provides a comprehensive view of the global battery recycling market. Porter’s Five Forces model for the battery recycling market has also been included to help understand the competitive landscape in the market. The study encompasses market attractiveness analysis, in which battery chemistry, spent battery source, and end-use are benchmarked based on their market size, growth rate, and general attractiveness.\nThe study provides a decisive view of the global battery recycling market by segmenting it in terms of battery chemistry, spent battery source, and end-use. In terms of battery chemistry, the battery recycling market has been classified into lithium-ion, lead-acid, nickel-cadmium, and others. Based on spent battery source, the battery recycling market has been categorized into automotive, electronic appliances, and others. In terms of end-use, the battery recycling market has been segmented into extraction of material; repackaging, reuse, & second life; and disposal. These segments have been analyzed based on present and future trends. Regional segmentation includes current and forecast demand for battery recycling in North America, Europe, Asia Pacific, Latin America, and Middle East & Africa.\nBrowse Complete Research Report with TOC @ https://www.mrrse.com/battery-recycling-market\nThe report provides the actual size of the battery recycling market for 2017 and estimated market size for 2018 with forecast for the next eight years. The global market for battery recycling has been provided in terms of revenue. Market revenue has been defined in US$ Mn. Market numbers have been estimated based on battery chemistry, spent battery source, and end-use of battery recycling. Market size has been provided in terms of global, regional, and country level markets.\nThe report comprises profiles of major companies operating in the global battery recycling market. Key players in the battery recycling market are Battery Solutions LLC, Call2Recycle, Inc., Exide Technologies, Retriev Technologies, Inc., East Penn Manufacturing Company, EnerSys, G & P Batteries, Gravita India Ltd., Johnson Controls, Inc., and Umicore N.V. Market players have been profiled in terms of attributes such as company overview, financial overview, business strategies, regional presence, and recent developments.\nThe global battery recycling market has been segmented as follows:\nBattery Recycling Market, by Battery Chemistry", "label": "Yes"} {"text": "Researchers at the\n) have developed a digital memory device by incorporating platinum nanoparticles into the tobacco mosaic virus. They claim that the result could be used to develop biocompatible electronic equipment.\nIn recent years researchers have exploited the unique selectivity of biomaterials by nanostructuring biological molecules with inorganic materials for applications such as biosensing. The UCLA researchers have taken this idea one-step further with a hybrid biological system that can store digital information.\n‘We have developed an electronic device, fabricated from the tobacco mosaic virus conjugated with nanoparticles, which exhibits a unique memory effect,’ said Yang Yang, the group’s lead researcher. ‘This device can be operated as an electrically bi-stable memory device whose conductance states can be controlled by a bias voltage. The states are non-volatile and can be digitally recognised.’\nThe TMV is a 300nm tube consisting of a protein shell and RNA core. According to the researchers, the TMV’s thin, wire-like structure makes it suitable for attaching nanoparticles, in this case, around sixteen positive platinum ions per virion. The device works by transferring charge, under a high electric field, from the RNA to the platinum nanoparticles with the TMV’s surface proteins acting as an energy barrier, stabilising the trapped charges.\n‘The TMV’s surface makes it an ideal template for organising the nanoparticles, which can bind to the specific carboxyl or hydroxyl sites on the surface,’ said Yang. ‘The RNA core in TMV is likely to serve as the charge donor to the nanoparticles with the coat proteins acting as the barrier to the charge transferring process.’\nThe TMV hybrid, says the team, has an access time in the order of microseconds. This is comparable to current flash memory. In addition, the device is non-volatile, which means that data is retained once the computer’s power is turned off.\nThe researchers say the device still needs to be scaled-down to a smaller size to increase storage density and to include more circuitry. ‘There will be issues involving retention time, power consumption, and integration of drivers required to write and read each bit, which we need to consider in order to optimise the system,’ said Yang.\nSuch devices could one day be integrated in biological tissues for applications in therapeutics or biocompatible electronics.", "label": "Yes"} {"text": "Is yaber a good projector?\nThe Yaber V7 Pro is a budget projector that delivers more features and better image quality than you might expect for the price. It’s quieter than the firm’s V10 model, smaller and comes with more features but, despite a slightly higher price, it’s just as much of a bargain, if not more so.\nHow do I setup my yaber V6 projector?\nDoes yaber projector have Bluetooth?\nV6 movie projector built-in the latest Bluetooth 5.0 chip which can connect your Bluetooth speaker wirelessly any time freely. Built-in 6w dual HiFi Stereo speakers with SRS sound system provides a great auditory sense experience without external speakers.\nHow do I connect my soundbar to my yaber projector?\nConnecting a DVD: Use the supplied AV cable to connect the DVD player to the projector and turn on the projector and DVD player. ⑤. Connect the soundbar: Use the supplied AV cable to connect the soundbar to the projector and turn on the projector and the sound bar.", "label": "Yes"} {"text": "The MySpot 200 restricts unauthorized access to parking spaces, driveways, and access ramps. Drivers of authorized vehicles use a remote-control key fob to lower the steel barrier that protects their exclusive parking spots. The self-powered, self-contained system captures energy from the vehicle's weight and uses the stored energy to raise and lower the barrier, thus obviating the need to connect the device to an electrical power source.\nDesignated Parking Corp.\nInput No. 204 at BDCnetwork.com/BDCinfo", "label": "Yes"} {"text": "Eppendorf which is a leading life science company recently launched BioFlo 120, their latest bench scale fermentor/bioreactor system for research and development. BioFlo 120 can ferment microbial as well mammalian cell culture application with a single platform. The newly developed Auto Culture modes for push button control of microbial and cell culture applications drastically reduce the learning curve associated with new equipment.\nEase of use and flexibility ensure the new bioreactor/fermentor serves the needs of scientists today and in the years to come - be it in academic, governmental, or industrial research settings.\nKevin Voll, product manager Eppendorf bioprocess said, \"We know that in research and development time is critical. Our priority was to develop a bioprocess system that is straightforward to set up and easy to use. By reducing the time required in learning to use new equipment, we free up scientists to spend more time on what is important, their research\"\nHamed Tehrani after using the new control station for few weeks said, \"A very user-friendly system, which is self-explanatory\"\nThe new BioFlo 120 bioprocess control station will be presented at the BioProcess International Europe in Amsterdam, the BioProcess International West in San Francisco, the BioPharm Asia in Singapore, and other industry events.", "label": "Yes"} {"text": "Realme narzo 30 Pro 5G with 6.5-inch 120Hz display, Dimensity 800U launched starting at Rs. 16999\nAlong with Realme Narzo 30A, Realme also launched a low-cost 5G phone Realme narzo 30 Pro 5G in India. This phone starts at just Rs. 16999.\nRealme narzo 30 Pro 5G features a 6.5-inch Full HD+ LCD display with hole-punch for the selfie camera. The display also has 120Hz refresh rate and 180Hz touch sampling rate.\nIt packs an Octa-Core MediaTek Dimensity 800U processor that supports dual 5G. There are two RAM Storage models: 6+64GB and 8+128GB. Storage is also expandable. The phone runs on realme UI based on Android 10 and is also upgradable to realme UI 2.0 based on Android 11.\nThe Narzo 30 Pro 5G has a triple camera setup that includes 48-megapixel primary camera, 8 megapixels ultra-wide camera, and a 2 megapixels macro camera. It also has 16 megapixels selfie camera.\nThe fingerprint sensor is on the side. The narzo 30 Pro 5G also features Hi-Res audio and Dolby Atmos.\nAlso see: 5G Phones in India\nConnectivity options include 5G SA/ NSA, Dual 4G VoLTE, Wi-Fi 802.11 ac (2.4GHz + 5GHz), Bluetooth 5, GPS/GLONASS/Beidou, and USB Type-C. It packs a 5000mAh battery with 30W Dart Charge fast charging.\nRealme narzo 30 Pro 5G price in India\n- 6GB RAM + 64GB Storage: Rs. 16,999\n- 8GB RAM + 128GB Storage: Rs. 19,999\nrealme narzo 30 Pro 5G specifications\n- 6.5-inch (2400 × 1080 pixels) Full HD+ LCD screen with 120Hz refresh rate\n- Octa Core MediaTek Dimensity 800U (MT6873V) 7nm processor\n- 6GB RAM with 64GB storage / 8GB RAM with 128GB storage,\n- Android 10 with realme UI\n- 48MP rear camera, 8MP 119° ultra-wide angle camera, 2MP 4cm macro camera\n- 16MP front camera\n- Side-mounted fingerprint sensor\n- Dolby Atmos, Hi-Res audio\n- 5G SA/ NSA, Dual 4G VoLTE, Wi-Fi 802.11 ac (2.4GHz + 5GHz), Bluetooth 5, GPS/GLONASS/Beidou, USB Type-C\n- 5000mAh battery with 30W Dart Charge fast charging\n- Dimensions: 162.2×75.1×9.1mm\n- Weight: 194g", "label": "Yes"} {"text": "Shut everything down, including the Cable Modem. Leave the modem off for a couple of minutes.\nConnect an ethernet cable between the modem and the router's \"WAN\" port and between the PC and one of the router's \"LAN\" ports. Power on the modem and wait for it to be fully booted and online. Then power on the router, wait for it to boot fully and finally boot the PC. You should now be able to access the router's setup pages by entering its IP address into a web browser.\nThe default setting will probably have let you get online with the PC that is connected with the cable. You need to configure its \"wireless\" settings so that the laptop can get online wirelessly then you can remove the cable to the PC.\n<<< do I have to leave the desktop connected permanently? >>>\n<<< would I have to install any drivers onto my laptop?. >>>\nYou only need to install the software for the Wireless Network Adapter. There is no software to install for the router to which you connect over the LAN, with either a wired or a wireless connection.", "label": "Yes"} {"text": "Payment & Shipping Terms:\n|Voltage:||AC220V, AC110V, DC24V||Scaning Beams:||154 Beams|\n|Catagory:||Elevator Spare Parts, Light Curtain||Feature:||NV-917G|\n|Opening Mode:||Central Opening, Side Opening||Transportation:||Air, Sea|\nsafety light guard,\nelevator door safety edge\n917G Elevator Light Curtain AC220 / DC24 Power Supply Control Photocell\nAdopting infrared light reflecting principle, when elevator doors are interrupted by obstructions, a signal will be sent out from door detectors, door operators will receive this signal and control the door opening. With advanced production management and strict quality inspection, WECO door detector has become the first brand in the world, providing reliable guarantee of passengers’ safety.\nWECO-957G elevator door photocell is same as 917/ 957E, 917/ 957F door detector, all belong to 2- IN- 1 elevator door photocell. Which can better replace the safety edge to work on lift to be more effective to protect passenagers from being hurt.\nMulti series production design.\nVarious outputs to match with different door operator’s demand.\nDoor detector height can be customized.\nReplacement solution can be proved.\n|Number of infra red diodes||32diodes||32diodes|\n|Response time||relay output||61ms||61ms|\n|Led Interpretation||The yellow LED and red LED in receiver is on when blocked or in malfunction|\n|The yellow LED in receiver is on and red LED in receiver off without blocking.|\nDimension and Mounting holes\nEvery piece packed in tube,five tubes in a bundle;\nEach tube includes\nPower supply control unit (1pieces)\nDurable flexible cable (2cables)\nUser Manual (1copy)\nMounting accessories (1 set)\n1. More than20years experience in elevator light curtain production and designing.\n2. Our products have been exported to more than 40 countries, like Germany, Greece, Italy, Spain, UK, France, Russia, USA, Brazil, Mexico, Australia, Korea, Thailand, Indonesia, India and many other countries.\n3. Flexible and Untraceable payment terms.\n4. Good after-sale service.\n5. We offer high quality products at competitive price in quick delivery.\nContact Person: Ailsa", "label": "Yes"} {"text": "What is the future of periodic technical inspection (PTI) for autonomous and automated vehicles? This is the question that the Germany-based Kraftfahrzeug-Überwachungsorganisation freiberuflicher Kfz-Sachverständiger (KÜS, motor vehicle inspection association of freelance motor vehicle experts) has been investigating. With its innovative KÜS DRIVE test line, it is testing the limits of what is possible. dSPACE is providing active support to the organization.\nAll car owners in Germany know that their vehicle has to regularly pass a mandatory PTI. In accordance with the German Road Traffic Licensing Regulations (StVZO), a test engineer examines safety-relevant mostly mechatronic, vehicle components such as lighting, brakes, the drivetrain under the vehicle, tires, etc., with regard to design, condition, function, and effect. These examinations are supported by a main inspection adapter, which communicates with the vehicle via the onboard diagnosis (OBD) interface. Due to the rapid technological development of vehicles, which is characterized in particular by the integration of advanced driver assistance systems (ADAS), the test contents of the PTI must also keep pace with this development, in order to continue to ensure road safety. Camera sensors have long been monitoring lane compliance and alerting drivers when they cross the sidelines. And if the car comes dangerously close to road users ahead, the autonomous emergency braking system (AEBS) intervenes and eases the situation.\nWith the dSPACE simulation solution, we have a flexibly configurable way to efficiently and reliably check the correct functioning of sensors and driver assistance systems of real vehicles in our test centers.\nWith its expertise in the field of periodic technical inspections, KÜS is a valued and promising development partner for us.\nWith KÜS DRIVE; we offer a solution to improve vehicle safety and functional safety of driver assistance systems and of automated driving over the entire product life cycle.\nSafe Over the Entire Vehicle Life Cycle\nThe first drivers on the road with cars that recognize their surroundings and drive partly autonomously, called level 2 and level 3 vehicles, rely on these and other sensors. “But how can the functional reliability of these sensitive components be ensured over the entire vehicle life cycle?” asks Dr. Thomas Tentrup, head of development at KÜS, addressing, the industry-wide question. To meet this safety-critical challenge, the German testing organization KÜS, with the support of dSPACE, has developed and implemented the KÜS DRIVE test line. This makes it possible to stimulate a vehicle's environment sensors without any manipulation of the test cars and without accessing their relevant ADAS control units. This solution facilitates the performance of relevant relevant, scenario-based, effect-principle tests in accordance with the United Nations Economic Commission for Europe (UN-ECE) and the New Car Assessment Program (NCAP). Non-contact testing of imaging sensors using physical inputs such as radar, lidar, ultrasound, or light waves is referred to as over-the-air (OTA) testing.\nOTA Stimulation of the Vehicle Sensors\n“For valid and reproducible results, we use the vehicle-in-the-loop (VIL) simulation method, in which a real vehicle is tested in a virtual environment,” explains Ahmet Karaduman, consultant at dSPACE. He adds: “This form of validation can be used not only in PTI, but also in end-of-line testing in automotive production, type approval/homologation, and R&D purposes.”\nDuring the VIL test, the vehicle is located on Dürr Assembly's steerable roller dynamometer ‘x-road curve’ and is able to be quickly and accurately accelerated, braked, or steered to the right and left by the driver, according to the respective test scenario to be run. Due to the technical characteristics of the chassis dynamometer, the vehicle always remains positioned longitudinally with respect to the axis of symmetry of the dynamometer and can travel at speeds of up to 130 km/h. Using the software interface between the steerable chassis dynamometer and the dSPACE tool chain, it is possible to transfer the real physical movements of the vehicle to a digital shadow. The shadow is calculated in real time on a simulator from dSPACE, together with the vehicle environment. The simulation feeds a monitor and radar target simulator to the OTA stimulation of the camera and radar sensors.\nThe Test Setup for the Sensor System\n“A monitor and a radar antenna are integrated into the test line and located directly in front of the vehicle under test. Both can be positioned horizontally, vertically and axially by means of the flexible gantry system \"x-around\" from Dürr Assembly Products,” says Karaduman, describing the setup for the sensor test.\nThe monitor stimulates the vehicle's camera with environment and road scenarios animated by the sensor-realistic simulation solution AURELION in the form of a 3-D world. The visualization is used to check whether the camera sensor of the vehicle under test (VUT) correctly detects the relevant objects. The correct functioning of the lane keeping assistance system (LKAS) and the lane departure warning system (LDWS) is also tested with suitable road simulations.\nTo test the radar sensor, the antenna of the dSPACE Automotive Radar Test Systems (DARTS) radar target simulator is positioned directly in front of the sensor. DARTS emits the radar reflections of a simulated target object. The reflection waves accurately reflect the distance, size, and speed of the object, thereby stimulating the radar sensor. This enables reproducible testing of adaptive cruise control (ACC) and autonomous emergency braking system (AEBS) which is safe for the test engineers.\nThe homogeneous and coordinated hardware and software components of the test bench thus enable a stable test sequence in real time. If required, test cases can be reproduced exactly to prove the successful elimination of errors. “Reproducible results are essential for the evaluation of technical tests, especially during a periodical inspection,” notes Dr. Tentrup.\nLooking to the Future\nKÜS recognized at an early stage that automation in the automotive sector entails a wide range of safety issues for road-legal vehicles with a high degree of automation that need to be resolved. In order to keep pace with this technological progress in the field of functions for automated driving and driver assistance systems, the requirements for the periodic technical inspection regulated by law are constantly increasing.\n“For this reason, KÜS launched a research project with the KÜS DRIVE with the aim of integrating the current test scopes of the main inspection into a test lane in which the safety-relevant driver assistance systems can also be tested by means of OTA testing.” With DRIVE, we are working on the innovations of tomorrow, to advance solutions to improve vehicle safety and the functional safety of assistance systems and automated driving throughout the entire product life cycle,” explains Peter Schuler, CEO of KÜS.\nAdapting PTI to Automated and Autonomous Vehicles (SAE Level 3)\nLegally prescribed PTI not only contribute to the prevention of technical malfunctions but also increase road safety. Advanced driver assistance systems (ADAS) are capable of significantly reducing accidents caused by human error or incapacity. For this to happen, however, these systems must function error-free over the entire life cycle of the vehicle. Possible disruptive factors are:\n- Aging of material and components\n- Defective or faulty maintenance\n- Manipulation of components and systems\n- Unauthorized or excessive tuning\n- Limits of self-diagnosis\nThe detection of technical defects and thus the maintenance of traffic safety is ensured, among other things, by the periodic inspection. For example, adaptive cruise control (ACC) and emergency braking assistants (AEB) can prevent rear-end collisions even at high speeds and thus contribute significantly to reducing the number of accidents. It is especially in these accidents, where a moving vehicle collides with a vehicle traveling in the same direction or a stationary vehicle, that many fatalities and serious injuries occur in addition to the high property damage. However, incorrect triggering of an emergency brake assistant that is not set correctly can also lead to rear-end collisions.\nPeriodic Check of Safety Systems\nIn the course of developments in the automotive sector, it is clear that the importance of driver assistance systems is changing. “While they were initially 'comfort systems' that made it easier for the driver to drive the car, they are increasingly evolving into 'safety systems’,” Karaduman explains. From this point of view, it becomes clear how indispensable it is to include these systems in the framework of periodic technical inspection and to create the legal basis for this.\nThe KÜS DRIVE test line already demonstrates a convincing technical solution concept for the new test scope requirements for the regular main inspection of automated vehicles. The safety of functions for automated driving can be tested and demonstrated in suitably equipped test centers over the life cycle of a vehicle.\nCourtesy of KÜS (Kraftfahrzeug-Überwachungsorganisation freiberuflicher Kfz-Sachverständiger, which translates to “motor vehicle inspection association of freelance motor vehicle experts”)\ndSPACE MAGAZINE, PUBLISHED JULY 2023", "label": "Yes"} {"text": "Researchers from Brookhaven’s biology department and the National Synchrotron Light Source (NSLS) characterized a component of the virus that will be the target of new anti-SARS virus drugs. The results were published online by Biochemistry on November 17, 2006.\n“Although vaccines against viruses are very effective, vaccines for viruses that mutate rapidly – such as the viruses that cause SARS, AIDS, and bird flu – are much more difficult to obtain,” said Brookhaven biologist Walter Mangel, the lead author of the paper. “Even if a vaccine is available, antiviral agents are important in stopping the spread of highly infectious viruses. If antiviral agents for SARS had been available, they could have been used to contain the outbreak to the initial site of the infection.”\nThe researchers studied the SARS main proteinase, an enzyme used by the virus during infection to cut newly made viral proteins into gene-sized, functioning pieces. If the proteinase is prevented from working, the virus infection is aborted. Previous studies have revealed that the proteinase is inactive when in the form of single molecules. But once two of those molecules bind together to make what is called a dimer, the enzyme becomes active and is able to play its role in SARS virus reproduction. The challenge for researchers, and the focus of the Brookhaven study, was to determine the concentration at which individual proteinase molecules form active dimers. Knowing this concentration, for which estimates at other laboratories have varied greatly, would allow researchers to search for anti-SARS drugs more efficiently by ensuring that the proteinase used in tests is initially in its active form.\nUsing three different scientific techniques, including x-ray scattering at the NSLS, the Brookhaven researchers obtained almost identical values for this concentration. Now that this crucial value has been narrowed down to a precise range, researchers can focus on finding compounds that bind to the active form of the enzyme.\n“Targets for antiviral drugs must be carefully chosen such that binding to it prevents the virus from reproducing,” Mangel said. “Viral proteinases are excellent targets for antiviral drugs. One reason so many people are surviving the AIDS epidemic is the effectiveness of drugs targeted to the proteinase of human immunodeficiency virus (HIV).”\nOne way to obtain compounds that bind to a proteinase is via high-throughput screening. Chemical libraries containing tens of thousands of small compounds are available that can be searched for effective drugs against various diseases. Small amounts of a target, e.g., an active viral proteinase, are placed in tiny wells in a plate, and a different compound from the library is added to each well.\nTo determine whether a compound binds to and inhibits the proteinase, an additional molecule is added that changes color in the presence of an active proteinase. Wells that don’t show a color change therefore contain compounds that inhibit the proteinase, and could be effective antiviral agents. Earlier this year, Mangel’s research group published a procedure on the synthesis of a new compound that changes color in the presence of the active form of the SARS main proteinase.\nHowever, for this screening process to work, the SARS proteinase inserted into the wells has to be active to begin with. Knowing the concentration range for dimer formation will therefore help researchers in their search for a compound to stop the virus. “Now that the stage is set, high-throughput screening can begin,” Mangel said. “Hopefully, it will yield an antiviral agent that can be stockpiled before a virulent strain of the virus reappears.”\nThis research was supported by the Office of Basic Energy Sciences within the U.S. Department of Energy and the National Institutes of Health.\nKaren McNulty Walsh | EurekAlert!\nIon treatments for cardiac arrhythmia — Non-invasive alternative to catheter-based surgery\n20.01.2017 | GSI Helmholtzzentrum für Schwerionenforschung GmbH\nSeeking structure with metagenome sequences\n20.01.2017 | DOE/Joint Genome Institute\nAn important step towards a completely new experimental access to quantum physics has been made at University of Konstanz. The team of scientists headed by...\nYersiniae cause severe intestinal infections. Studies using Yersinia pseudotuberculosis as a model organism aim to elucidate the infection mechanisms of these...\nResearchers from the University of Hamburg in Germany, in collaboration with colleagues from the University of Aarhus in Denmark, have synthesized a new superconducting material by growing a few layers of an antiferromagnetic transition-metal chalcogenide on a bismuth-based topological insulator, both being non-superconducting materials.\nWhile superconductivity and magnetism are generally believed to be mutually exclusive, surprisingly, in this new material, superconducting correlations...\nLaser-driving of semimetals allows creating novel quasiparticle states within condensed matter systems and switching between different states on ultrafast time scales\nStudying properties of fundamental particles in condensed matter systems is a promising approach to quantum field theory. Quasiparticles offer the opportunity...\nAmong the general public, solar thermal energy is currently associated with dark blue, rectangular collectors on building roofs. Technologies are needed for aesthetically high quality architecture which offer the architect more room for manoeuvre when it comes to low- and plus-energy buildings. With the “ArKol” project, researchers at Fraunhofer ISE together with partners are currently developing two façade collectors for solar thermal energy generation, which permit a high degree of design flexibility: a strip collector for opaque façade sections and a solar thermal blind for transparent sections. The current state of the two developments will be presented at the BAU 2017 trade fair.\nAs part of the “ArKol – development of architecturally highly integrated façade collectors with heat pipes” project, Fraunhofer ISE together with its partners...\n19.01.2017 | Event News\n10.01.2017 | Event News\n09.01.2017 | Event News\n20.01.2017 | Awards Funding\n20.01.2017 | Materials Sciences\n20.01.2017 | Life Sciences", "label": "No"} {"text": "Here sre Autozone's instructions.\nRemoval & Installation\n1. Disconnect the negative battery cable.\n2. Disconnect the electrical connector at the switch. The locking tab on the connector must be lifted before the connector can be removed.\n3. Remove the hairpin retainer, slide the brake light switch, the pushrod and the nylon washers and bushings away from the pedal and remove the switch.\nSince the switch side plate nearest the brake pedal is slotted, it is not necessary to remove the brake master cylinder pushrod and 1 washer from the brake pedal pin.\n1. Position the switch so the U-shaped side is nearest the pedal and directly over/under the pin. Then slide the switch down/up trapping the master cylinder pushrod and black bushing between the switch side plates. Push the switch and pushrod assembly firmly toward the brake pedal arm. Assemble the outside white plastic washer to the pin and install the hairpin retainer to trap the whole assembly.\n2. Assemble the wire harness connector to the switch. Check the switch for proper operation.\nSunday, October 4th, 2009 AT 6:09 PM", "label": "No"} {"text": "A Determination of the Kinematic Quantities of a Rotating Object by Digital Image Correlation Method\n1Department of Applied Mechanics and Mechatronics, Technical University of Košice, Faculty of Mechanical Engineering,Košice,Slovakia\nIn this contribution an experimental determination of kinematic quantities of an automobile cooling fan by its rotational movement is described. The displacements of the fan surface were captured by two - cameras high-speed correlation system. The obtained data exported from some chosen points were for the purposes of post-processing imported into Matlab. For a verification of the reached results the second independent experimental method was used – the determination of the cooling fan rotational frequency was performed by a digital-optic tachometer.\nAt a glance: Figures\nKeywords: high-speed digital image correlation, motion analysis, kinematic quantities\nAmerican Journal of Mechanical Engineering, 2013 1 (7),\nReceived October 08, 2013; Revised October 14, 2013; Accepted November 21, 2013Copyright © 2013 Science and Education Publishing. All Rights Reserved.\nCite this article:\n- Hagara, Martin, Róbert Huňady, and Pavol Lengvarský. \"A Determination of the Kinematic Quantities of a Rotating Object by Digital Image Correlation Method.\" American Journal of Mechanical Engineering 1.7 (2013): 289-292.\n- Hagara, M. , Huňady, R. , & Lengvarský, P. (2013). A Determination of the Kinematic Quantities of a Rotating Object by Digital Image Correlation Method. American Journal of Mechanical Engineering, 1(7), 289-292.\n- Hagara, Martin, Róbert Huňady, and Pavol Lengvarský. \"A Determination of the Kinematic Quantities of a Rotating Object by Digital Image Correlation Method.\" American Journal of Mechanical Engineering 1, no. 7 (2013): 289-292.\n|Import into BibTeX||Import into EndNote||Import into RefMan||Import into RefWorks|\nThree-dimensional digital image correlation method belongs to the group of noncontact optic methods, which nowadays fully engages into the conception of measurement principles with high sensitivity and accuracy [1, 2]. It is based on the comparison of digital images obtained from at least two CCD cameras during the investigated object movement or loading Figure 1.\nThere are two forms of digital image correlation systems – a low-speed system and a high-speed one. It is possible to use the first mentioned only by low sampling frequencies (maximally several fps). Such a system mostly contains the objectives with higher resolution and thus it is suitable for the deformation analyses .\nA high-speed correlation system with smaller objectives resolution can be usedfor the analyses, by which high sampling frequency is necessary. A common sampling frequency of the high-speed systems isseveral thousand fps and therefore they primary serve as a tool for motion analyses, vibration analysis , modal analyses , drop tests , crash tests or fracture mechanics.\nDisplacements in two perpendicular directions and are investigated by the using of pseudo-affine transformations (1), (2) of the nodal points of user defined virtual grid :\nWhere xt, yt are the transformation coordinates and a0 ,a1 ,a2,...,a7 are the transformation parameters.\nThe strain fields are subsequently determined by the analysis of local facets curvatures Figure 2.\n2. Motion Analysis of A Rotating Object\nThe purpose of the analysis was to capture, evaluate and utilize the displacements of a rotationally moving object. The measurement object was a cooling fan of the automobile Skoda Felicia Figure 3.\nThe fan was fixed to a wooden support stand and actuated by a power supply.\nThe measurement performed by the high-speed digital image correlation system Q-450 Dantec Dynamics was intent on the fan start,movement by certain immediate angular velocities and free after-running as well, which happened after the power supply switch-off.2.1 Image Correlation System Configuration and Settings\nFor the acquisition of the moving object displacements it was needful to perform a dynamic measurement with sufficient sampling frequency. By the use of spray colors a stochastic black and white pattern required for the right correlation of the images was created on the fan rotating parts. Configuration of the high-speed correlation system used for the measurement is depicted in Figure 4.\nThe experiment was captured by the high-speed CCD cameras SpeedSense 9070 with the image resolution of 1280x800 px. In consideration of the limited inner memory of the cameras and the aim of the experiment to capture the whole process from fan start to its stop it was necessary to find a convenient sampling frequency and acquisition time.\nThe sampling frequency was set to 2500 fps. The acquisition time was adjusted after the observation of the fan start and after-running duration to 8 s. Our idea was to capture ca. the first five seconds after the power supply switch-on, whereby the remaining time of 3 s should serve as a sufficient reserve for the acquisition of fan after-running.\nThe apertures of the objectives were adjusted to f-number of 22, by which the maximal depth of focus was attained. The exposure time of both cameras was set to the highest allowable value of 399 μs. Cameras fields of view are visible in Figure 5.\nThe system captured 20000 images from both cameras.\nFor the reasons of using only two - cameras correlation system, by which the fan side parts could not be captured and only one powerful source of white light, which caused some unwanted reflections or shades on the fan surface, five segregate regions depicted in Figure 6 were selected and evaluated.\n3. The Results of the Analysis\nThe first step for the next data post-processing was the acquirement of the displacements fields evaluated by the operating correlation systems Dantec Dynamics software Istra 4D. In this software the own coordinates system with the origin determined in a green point (see Figure 7) was defined. Direction X is represented by a virtual flowline of the origin with the point depicted by a light-blue color. It caused, that two of the fan blades were turned into a vertical position.\nAs the software Istra 4D does not allow to select points with exactly defined position, three virtual gauges (in a form of points) were chosen approximately on the line depicted in Figure 8 by a yellow color. Their displacements in time were imported into Matlab for the next processing.\nThe trajectories of selected points are depicted in the following Figure 11.\nSubsequently a script created in Matlab serving for visualization of the particular points mean velocities in timewas used. The simple script algorithm consists of the following parts:\n1. creation of the matrix of rotation angle\n2. creation of the elements of rotation radius matrix\n3. definition of the elements of rotation angle variation matrix\n4. creation of the elements of angular velocity variation matrix where fs is a sampling frequency;\n5. creation of the mean velocity matrix elements defined as\nThe noise occurring in the mean value of the third point velocity is caused by a correlation error growing with the increasing velocity of particular points.\nPursuant to Euler’s theorem the mean values of angular velocities of threeexamined point were determined. Subsequently by the use of\nthe mean values of rotational frequency in fixed time intervals ΔT=1/fs were computed. A graphical visualization of the time dependence of the mean values of rotational frequency can be seen in Figure 14.\nIt was necessary to verify such obtained results by the use of an independent method. The primary aims of verification were formulated as find the proofs, that:\nthe fan velocity is still growing during the examined time interval from 0 s to 4.77 s,\nin time point of ca. 1.2 sthe acceleration of the fan is changed,\nrotational frequency reaches in every time pointa value, that is corresponding to the real value.\nThe verification of the obtained results was performed by digital-optic tachometer Almemo. The apparatus consisted of a measuring LEDsonde Almemo FU A919-2 and a measuring device Almemo 2390-8 Figure 15.\nThe principle of this device is based on the tracking of visible ray of red light (660nm) emitted and reflected back to the LED sonde from the object surface where a reflex element is bonded. The behavior of rotational frequency in time captured by this optic method can be seen in Figure 16.\nThe time dependences of velocities and rotational frequencies suggest that the fan has rotated with an accelerated movement in the whole captured process. The decrease of the acceleration after 1.2 s could be caused by the increase of a resistance force. The state of a dynamic equilibrium was achieved after 12 s from the fan start by the measurement with Almemo.\nThe digital image correlation is a practical modern optical method serving for the examination of rotating objects kinematics quantities. A big advantage is that it provides the data about these quantities in each investigated object surface point.\nThe user should be very careful by the options of sampling frequency and acquisition time because of a limitation, that the higher velocities, the higher correlation errors.\nThe work has been accomplished under the projects VEGA 1/0937/12 and KEGA 021TUKE-4/2013.\n|||Trebuňa, F., Šimčák, F., Príručka experimentálnej mechaniky, TypoPress, Košice, 2007.|\n|||Sutton M.A., Orteu J-J., Schreier H.W., Image Correlation for Shape, Motion and Deformation Measurements, Springer Science + Business Media, LLC New York, 2009.|\n|||Chen F., Chen X., Xie X., Feng X., Yang L., \"Full-field 3D measurement using multi-camera digital image correlation system,\"Optics and Lasers in Engineering, 51, 1044-1052, 2013.|\n|||Siebert T., Wood R., Splithoff K., \"High Speed Image Correlation for Vibration Analysis,\" in 7th International Conference on Modern Practice in Stress and Vibration Analysis, IOP Publishing, 2009.|\n|||Trebuňa F., Huňady R., Bobovský Z., Hagara M., \"Results and Experiences from the Application of Digital Image Correlation in Operational Modal Analysis, \"Acta Polytechnica Hungarica, 10 (5), 159-174, 2013.|\n|||Trebuňa F., Hagara M., Huňady R., \"Strain Fields Identification of Chosen Cycling Helmets Types by Their Impact Loading, \"Acta Mechanica Slovaca, 16 (2), 22-30, 2012.|", "label": "No"} {"text": "What prompted your organization to join the CEBA community?\nVerse’s mission is to unlock the benefits of clean energy for organizations everywhere. We’re doing that by developing software that uses generative AI to make buying and managing clean energy faster, easier, and less expensive than it is today. CEBA’s work convening and supporting organizations interested in procuring clean power is a perfect fit for us. We’re excited to collaborate with CEBA to showcase the power of technology in accelerating and scaling corporate clean energy adoption.\nWhat does the future of clean energy look like for your organization?\nVerse’s vision of the future of clean energy is AI- and software-driven. The world is at an inflection point of AI-enabled solutions; we want to apply the capabilities of generative AI to clean power procurement.\nVerse’s Aria software platform leverages this technology to help companies define their clean power goals, design the best portfolio to meet those goals, manage their clean energy assets, and verifiably report on their emissions and financial metrics.\nRecent policy changes, the evolution of various regulatory and voluntary frameworks, and the increasing complexity of energy markets and clean energy assets are quickly exceeding the analytical capabilities of humans and spreadsheets. Clean energy customers will increasingly require the computing power of AI to synthesize concepts and analyze potential scenarios to develop future-proofed clean power strategies.\nWhat has been the most interesting clean energy project during your time with your organization?\nOne exciting case study involved helping a company figure out what clean power procurement philosophy would best meet its needs.\nThis customer wanted to power their operations with clean energy, but needed to answer several detailed questions before acting.\n- Location matching: Can we buy clean energy from anywhere in the country? Or from the same grid?\n- Time matching: Should we match clean power on an annual basis? Monthly? Hourly?\n- Emissions matching: How much greenhouse gas emissions will my clean energy purchase help avoid?\nUsing the Aria Goal Setting app the customer received nine possible procurement philosophies to analyze considering different permutations (e.g., 100% clean energy, carbon-matching, location-matching, and/or time-matching).\nAria uses mathematical optimization, combined with pre-loaded, 20-year hourly market forecasts to evaluate the cost, emissions, and time-matching implications of the nine scenarios.\nThe customer presented the outputs from Aria to their senior leadership team, which was then able to make a data-driven decision, selecting the procurement philosophy that best met their objectives while staying within budget for clean energy purchases.\nBy defining their clean power goals, the customer was able to move forward with confidence in their clean energy journey and is now going to market to source clean energy.\nEnvision a 90% carbon-free U.S. electricity system by 2030 – what is the next step toward a carbon-free energy future?\nIt’s hard to pick just one! There are several critical steps that need to coalesce, including streamlining interconnection processes and expanding transmission and grid infrastructure. The step we’re focused on is making clean energy procurement faster, easier, and less expensive than it is today so more organizations can access the benefits of clean energy. We are confident we can leverage powerful emerging technologies — like generative AI — to demystify this complex field and make a real difference in how organizations source and manage their power.", "label": "No"} {"text": "Israeli Researchers Develop New Test That Detects Risk of Breast or Ovarian Cancer\nIsraeli researchers have developed a test that can predict if healthy women are at a significant risk of developing breast or ovarian cancer. Using a blood test, the researchers from Hadassah Medical Center were able to identify the presence of a harmful mutation, which may trigger those types of cancers in women.\nThe test, which was developed using a technology called gene expression profiling, is able to predict the presence of harmful BRCA1 and BRCA2 mutations in otherwise healthy women.\n“This novel technology aims to provide a layer of information regarding the cell functionality aspect of BRCA mutations that could greatly enhance the doctor’s ability to identify high-risk carriers,” explains Dr. Asher Salmon, who led the research team.\nThe new test will require less resources. Until the present the only means of detecting such mutations was by doing a full gene sequencing, but Dr. Salmon said the process is “expensive, time consuming and, in many cases, lacks clear and decisive information for making a clinical decision.”\nAccording to Salmon, the test can reveal many different types of harmful mutations. “In societies where gene sequencing is not feasible, this test can substitute for it with a very high accuracy rate,” Salmon explains.\nThe Israeli research team reported their findings in Cancer Prevention Research, a journal of the American Association for Cancer Research.", "label": "No"} {"text": "AnyMP4 iPhone Transfer Platinum 20% Discount Promo\nActive AnyMP4 iPhone Transfer Platinum Discount. Get an instant 20% Off your order right now!\nOver 39897 Active Software Discounts\nAnyMP4 iPhone Transfer Platinum, acts as the best iPhone assistant software, can help users transfer all iPhone files to computer for backup and import local files from computer to iPhone.\nAlso this software is able to backup iPhone SMS and Contacts. Besides of the basic transferring features, this iPhone Transfer Platinum can also convert any DVD and video file to iPhone compatible video and audio formats. With this software, users can trim video length, crop video frame, watermark video, and so on.\n1. Export iPhone files to computer\nAnyMP4 iPhone Transfer Platinum can assist users to transfer all iPhone files (music, movie, pictures, TV shows, Podcast, iTunes U, eBooks, Camera Roll, ringtone, SMS, Contacts, voice memos, camera shot) to computer for backup.\n2. Import local files to iPhone\nThis iPhone transferring software can help users add music, video, ePub, PDF, image files to iPhone.\n3. Transfer files between devices\nUsers can transfer all files from iPhone to iPod/iPad/iPhone and from other iPad/iPhone/iPod device to iPhone.\n4. Backup iPhone SMS on PC\niPhone users can backup iPhone SMS to computer. And users can delete the unwanted messages from the database.\n5. Copy iPhone Contacts to computer\nTo avoid losing important iPhone contact information, users can transfer the iPhone contacts to computer for backup.\n6. Rip DVD and convert video to iPhone\nThe iPhone Transfer Platinum can rip any DVD and convert video to iPhone compatible video and audio formats.\n7. Edit output iPhone video effect\nUsers can customize output video effect with the powerful video editing features. Users can trim video length, crop video frame, watermark video, adjust video effect, and so on.\n8. Preview the video effect\nThe built-in player of this iPhone Transfer Platinum can assist users to preview video, audio, photo effect.", "label": "No"} {"text": "Dressup because I’m bored... Inspired by Erikajane 1, a project made by Illustrious Hurry using Tynker. Learn to code and make your own app or game in minutes.\nArt, Game, Customizer, My News, Shout-Out, Social\nadvanced motion, simple events, simple loops, simple conditionals, detect conditions, simple motion, program control, miscellaneous, input/output, simple costume handling, simple messaging,", "label": "No"} {"text": "I have a Contact Object and a custom object called \"License\". On the License object custom field \"Type\" specifics if it is an \"Evaluation\" or \"Commercial\". Additionally, custom field \"Product\" specifics the name of the Product this license is for.\nLicenses are connected to Contacts via Lookup field on the License. A Contact can have many License but a License can only have one Contact.\nI am trying to build a report that shows Contacts that have a License of Type Evaluation and another License of Type Commercial for the same Product.\nCan anyone provide suggestions on how to build a report that could solve this? I have been working with a joined report but cannot figure out how to show Contacts that only have BOTH of these licenses.", "label": "No"} {"text": "Read a Gerber stack from a zip file\nAnother segmentation fault\nUnreproducible, so probably the same (now fixed) problem.\nThis is now fixed in version 1.20.1\nStrange LEFT$ behaviour and Segmentation Fault\nThis is now fixed in 1.20.1\nGeany IDE shows error when running BASIC program in brandy", "label": "No"} {"text": "Organizations that rely on the big data processing power of Hadoop can come across problems when the raw data of Business Intelligence (BI) workflow creates a bottleneck. The analysts who need the data to make decisions do not typically have the advanced programming skills required to access the mountains of data in Hadoop. Platfora removes this bottleneck by transforming the raw data in Hadoop into interactive, in-memory BI without the need for a separate data warehouse. Platfora’s Vizboards intuitively turn the big data into visual charts, graphs, or whatever is most appropriate. The Vizboards user can then filter out unneeded information as well as view analysis and results as they go. Another powerful feature allows the analyst to take snap shots of data and results to save them, or to add notes. These capabilities are very useful when the data is showing new insights you might not have expected!\nAnother cool thing about Platfora’s Vizboards is the product’s ability to share and secure visualizations, thus making it the perfect team tool. Teams can collaborate by sharing data already loaded in-memory and leveraging work already done. Sharing Vizboards is easy, and securing them is both simple and comprehensive. The product’s security approach provides Data Level Security, User-Created Object-Level Security, and System-Level Security.\nOne of Platfora’s outspoken clients is Edmunds.com, the automotive research site. As data volume and variety grew because of their popular mobile application, they utilized Hadoop to store data more economically and Vizboards to integrate that data for more agility. With Platfora, the number of employees able to leverage this data grew from 5 to 50 overnight. As is often the case with big data, new information arrives all the time. The Edmunds.com team is now able to put any new information to use in hours as opposed to months. Edmunds.com feels that they couldn’t have become the exceptionally fast and reliable automotive search site they are if it were not for the competitive edge they got from Platfora.\nYou can learn more about Platfora Vizboards, here.", "label": "No"} {"text": "Abstract:Early infantile epileptic encephalopathy (EIEE)–associated mutations in MUNC18-1 cause Munc18-1 misfolding and cellular aggregation. In this issue, Chai et al. (2016. J. Cell Biol. http://dx.doi.org/10.1083/jcb.201512016) find that Munc18-1 is a molecular chaperone for α-synuclein and that aggregated Munc18-1 EIEE-causing mutants promote α-synuclein aggregation.\nscite is a Brooklyn-based startup that helps researchers better discover and evaluate scientific articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by researchers from dozens of countries and is funded in part by the National Science Foundation and the National Institute of Drug Abuse of the National Institutes of Health.", "label": "No"} {"text": "Epipheo and I worked together to create an animation for the launch of Conversant's new product \"Set\".\nSet is an amazing platform that allows users to build video campaigns based on trustworthy data.\nCreative & Art Direction: Epipheo\nDesign: Peder Rottiger\nAnimation: Peder Rottiger\nSound Design: Epipheo", "label": "No"} {"text": "Shop for Outdoors at The Home Depot. Light up the night with the Coleman LED High Power Aluminum Flashlight. With 110 lumens of extra-bright light you'll see more than 295 ft. in front of you. Just two AA batteries will power the pocket-sized easy-to-grip flashlight for up to 3 hours. The Cree high-power LED lasts a lifetime so it never needs repla..\nShop for Tools & Hardware at The Home Depot. This New Bosch CFL180 allows for the user to fit into tight spaces with this compact flashlight. This Flashlight is powered by the Bosch 18 Volt Lithium Ion battery system. Allows for quick and easy tool-less bulb change. Color: Blue.\nShop for Tools & Hardware at The Home Depot. The Glow Auto EP is the all-in-one auto safety tool for your trunk or in your glove box. This amazing device thinks ahead so you don t have to committed to keeping you out of harms way whether you are simply fixing a flat tire or trapped inside your vehi Color: Whites.\nShop for Tools & Hardware at The Home Depot. The 190 Lumen - 4AA LED Cyber Light takes advantage of leading technology with its TrueSpot Reflector system that gives you a 500 foot beam of light. The super bright high flux LED produces 190 Lumens lasting for 5 hours of continuous use. The LED Cyber Light uses the highest strength materials for the l..\nShop for Tools & Hardware at The Home Depot. Slim bright and easy to use. When engineering this light our aim was to enable you to get into tighter spaces with its slim design. The LED Lenser P6 flashlight produces an extremely bright light on only two AA batteries. This flashlight also features our Advanced Focus System for near-to-far viewing adj..\nShop for Tools & Hardware at The Home Depot. The Eveready Industrial Floating LED Battery-Powered Lantern provides long-lasting lighting when you need it. The lantern features a durable plastic casing and a shatterproof lens and requires one 6-volt super-heavy-duty battery (battery included). Color: Yellows / Golds.\nShop for Tools & Hardware at The Home Depot. The unique design allows what appears to be a normal LED flashlight transform and become a perfect tent or table lantern. Simply twist the focusing ring to control the beam spread of the flashlight and continue twisting then pull to reveal the lantern shade. The attached hook allows easy use as a hanging..\nShop for Outdoors at The Home Depot. Cyclops introduces the lightweight and compact MEVO 255 Hand Held Light. The MEVO 255 features 255 lumens produced from a dual LED source; a high power Cree LED for long-range lighting and 3 LED’s for immediate surround area use. This lightweight and compact hand held light is equipped with an ergonomically de..\nShop for Tools & Hardware at The Home Depot. The Dorcy Clip-On Swivel Head LED Flashlight contains a super bright 0.2 in. LED bulb for a super bright beam of light even when you're on the go. This clip-on flashlight features an adjustable pivoting swivel head allowing for greater light positioning. The 41-1421 comes with a durable end cap push butt..\nShop for Tools & Hardware at The Home Depot. The all new A5 includes a rubberized pocket clip so you can keep it within easy reach. Its stainless steel styling makes it a great executive gift but it's also right at home in a tool kit. Coast's Max Beam Optic System shapes the available light from the LED into a circular beam pattern giving you the m..\nShop for Tools & Hardware at The Home Depot. This compact high power L.E.D. flashlight is perfect for anyone looking for superior performance in a small package. The Black Chameleon flashlight has an adjustable beam focus and a computer machined anodized aluminum alloy body. There are built in tactical modes allowing you to set the beam to either m..\nShop for Tools & Hardware at The Home Depot. Whether you’re heading to the neighborhood market or driving cross-country on a family camping trip when on the road it is always critical to be prepared. Keeping safety tools such as emergency flashers and a working flashlight allows you to prepare for the unexpected. The Life Gear Glow Auto CL is a r..\nShop for Tools & Hardware at The Home Depot. The Steelman High Output LED Headlamp features 1-watt bright white LED plus 2 red and 2 green LED for night vision. An elastic embroidered band that is comfortable to wear. High impact ABS low profile casing. Easy to operate push on/off switch toggles thru different modes. The hands free and night vision..\nShop for Tools & Hardware at The Home Depot. The Dorcy Weather Resistant Adjustable LED Headlight Flashlight is loaded with features and provides superior illumination wherever you need it. The 41-2103 features a comfortable and adjustable elastic head strap that allows for hands-free use. This headlight produces light output with a variety of sett..\nShop for Tools & Hardware at The Home Depot. The Mini Maglite LED flashlight delivers performance oriented features in a sleek compact design. This advanced lighting instrument is driven by the next generation MAG-LED Technology. This instrument includes a new multi-mode electronic switch which offers Peak Power 25% Power (low light) Blink Mode and..\nShop for Tools & Hardware at The Home Depot. Featuring our Long Range Focusing Optic System the HP314 has our longest X-Range Spot Beam and our powerful Broad View Flood Beam. With a beam distance of 2240 ft.; it is an essential piece of gear for rescue and law enforcement professionals as well as anyone who needs to throw a lot of light a great di..\nICON lights are created from a deep simultaneous obsession with design and technology. Every element must optimize performance for you or it doesn`t make the cut. In the hands of an accomplished designer and a team of engineers these elements turn out beautifully.Serious light output from a compact sculpted aluminum body that`s rugged and features ..\nShop for Tools & Hardware at The Home Depot. The Bluecolt T400 L.E.D. rechargeable flashlight has been designed with a high output U.S. made L.E.D. that can produce a blinding 400 lumens at its highest setting. The precision machined reflector and heat-resistant glass lens creates a smooth even beam that can reach up to 400 meters. Our unique desig..\nShop for Tools & Hardware at The Home Depot. The LED Lenser MT7 is a tactical flashlight with a unique glass-breaking tail. With the MT7 you can use the Smart Light Technology system to choose between unvarying light intensity or continuously-decreasing brightness resulting in longer run time. The Focus Lock system keeps the bezel from moving when ..\nShop for Tools & Hardware at The Home Depot. Just 3 AAA alkaline batteries provide the Energizer Buzz Lightyear LED Flashlight with 125 hours of running time. This playful flashlight is also a practical tool and is ideal for gift giving or as a stocking stuffer. The flashlight comes packed with 3 batteries and a convenient lanyard so it is ready fo..", "label": "No"} {"text": "Instruments, materials, reagents preparation\n2. test tube with rubber stopper\n3. colorimetric test tube: flat type, the end of the experiment for testing, or storage for holding the corrosion of copper\n4. jig: for grinding when the copper sheet clamping without damage to the edge with\n6 grinding material: silicon carbide or aluminum oxide sandpaper\n7. stainless steel test bullet\n8 copper: purity greater than 99.99% of electrolytic copper\n9. Quantitative filter paper: absorb the washing solvent on the filter paper\n10. stainless steel tweezers\n11. washing solvent: analytical pure isooctane or standard isooctane\n12. high type beaker\n13. corrosion standard color plate: stored away from light\n1. copper treatment: use silicon carbide or alumina sandpaper to remove the defects on the six sides of the copper sheet, after polishing the copper sheet requires no defects, no stains, no metal chips, uniform color.\n2. soaking the copper sheet in washing solvent after wiping off the metal chips from the copper sheet with quantitative filter paper.\n3. remove the copper sheet from the washing solvent, moisten the sheet with a drop of detergent and wipe the sheet with a piece of degreasing cotton to remove all metal shavings.\n4. copper corrosion instrumentation and equipment inspection\n(1) check whether the instrument power supply and housing are well grounded.\n(2) check whether the water bath to test the operating requirements of the water level.\n(3) check whether the temperature sensor in the bath is normal.\n1. place the test instrument smoothly, turn on the power, so that the water bath temperature is maintained at 50OC ± 1OC.\n2. pour the oil sample under test into a clean, dry test tube.\n3. immerse the final polished, clean copper sheet into the specimen in that test tube within 1 minute.\n4. placing the tube in a water bath maintained at a temperature of 50OC ± 1OC and recording the start time of the experiment.\n5. after 3 hours ± 5 minutes in the water bath, remove the test tube containing the copper sheet from the apparatus.\n6. immediately remove the copper sheet from the test tube with stainless steel tweezers and immerse it in a tall beaker with washing solvent to wash off the specimen.\n7. immediately remove the copper sheet and use quantitative filter paper to absorb the washing solvent on the copper sheet.\n8. compare the copper sheet with the corrosion standard color plate to check the signs of discoloration or corrosion, when comparing, the copper sheet can be placed in a flat test tube, the copper sheet and the corrosion standard color plate to the light into 45O angle refraction way to hold, to observe\nContact Person: Ms. Ivy Xie", "label": "No"} {"text": "A library of products derived from more than ten thousand fungi has been set up which could lead to the discovery of new drugs.\nList view / Grid view\nFilter the results\nIt has been discovered that papillomaviruses induce immunity that protects patients, which could lead to a novel method for preventing skin cancer using a vaccine based on T cells.\nA study has revealed a drug target for skin cancers which regulates the differentiation of cells and the roles they conduct in the body.\nResearchers have reported a potential new role for some bacteria on the skin, protecting against cancer...\nNew technology being developed by researchers is using artificial intelligence to help detect melanoma skin cancer earlier...\nNew diagnoses for two types of skin cancer increased in recent years, according to a Mayo Clinic-led team of researchers.", "label": "No"} {"text": "Join GitHub today\nGitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up\nFetching latest commit…\nCannot retrieve the latest commit at this time.\n|Failed to load latest commit information.|\nActs as Searchable Plugin =================================== PHP5 only version This plugin is based on: http://rubyforge.org/projects/ar-searchable/", "label": "No"} {"text": "One Cleaner - Quick Clean\n2.1.2 ‧ Free ‧ 1 month ago\nDownload One Cleaner - Quick Clean APK latest version Free for Android\n|Update||1 month ago|\n|Size||13.65 MB (14,315,357 bytes)|\n|Developer||Privacy Guard +|\nOne Cleaner - Quick Clean APPLICATION description\nStorage full? Phone getting slow? Clear cache, delete junk and boost speed now!\n🔥 Junk Cleaner\nOne Cleaner helps free up storage space by removing junk, residual, and cached files.\n🚀 Improve phone running speed\nSpeed up your phone by freeing up RAM. Reduce overall power consumption.\n🔋 Battery Saver\nOne Cleaner helps save battery power and prolong battery life.\n🌡️ CPU cooler\nFind and stop overheating apps to cool down your phone. With One Cleaner, your phone CPU temperature will cool down fast!\nOne Cleaner Features\n✔️ Super clean cache and junk files for more space\n✔️ Free up storage space and boost RAM to make your phone faster than ever\n✔️ Navigate and stop overheating apps\n✔️ Find battery draining apps and save battery effectively", "label": "No"} {"text": "Faculty Members YUKAWA Toshihiro\n- Mechanical Science and Engineering\n- [Master's Program] Mechanical and Aerospace Engineering\n- [Doctoral Program] Systems Innovation Engineering\n- Doctorate (Engineering) Field of Degree: Machinery\nFields of Research\n- Theory of Mechanism\n- Control Engineering\n- April 1, 2008 - present: Associate Professor, Mechanical Engineering, Faculty of Engineering, Iwate University\nTechnological education for an aging society and a sustainable society\nAt the Division of Biotechnology & Robotics and Control Engineering, my basic research concerns a new mechanism for surgical-assistance robots, a new mechanism for high-mobility robots, a new mechanism for multipurpose continuously variable transmission, a design for a new high-sensitivity sensor and control-theory construction, while my applied research is on the development of medical and welfare robot systems and the practical realization of mobile nursing-care robots. Through these research projects, I provide a technological education for an aging society and a sustainable society.\nIn the mechanical engineering course, my goal is to foster engineers and researchers who are active in the fields of machine development, design and manufacturing. In the field of biorobotics, which is part of this course, I create graduates who can develop robots and nursing care and welfare equipment, etc.", "label": "No"} {"text": "Kynan wrote:For me the stream companion is broken again because of the update 2 days ago D:\n//edit nvm o.o(I swear it was working yesterday... I need to implement update & beatmap caching system into program itself : | )\nIt's not possible to get this data w/o injecting \"bad\" stuff into osu! so no there is no way.\nKirei wrote:Would it be possible to detect and output current mods in the np.txt?", "label": "No"} {"text": "When you use USB devices in Windows, Windows will load and install a device driver to communicate with the new USB device. A lot of standard USB device drivers are included with Windows XP, even more in Vista, Windows 7 and 8. But if the USB device is not supported by Windows, you will see a USB device not recognized error like the one below.\nYou can try unplugging the USB device, waiting a few seconds and plugging it back, but chances are the error will remain.\nAnother error message that is common is the message Unrecognized device has been found.\nWhen you open the Windows Device Manager from the Control Panel, you will generally see the USB device under the Other devices or Unknown devices category.\nIn case of an external hard disk, you may also get the error:\nOne of the USB devices attached to this computer has malfunctioned, and Windows does not recognize it.\nAlso keep in mind that if you don’t have the right USB drivers for your device, Windows might be using a default, compatible driver, which restricts the performance or limits the features of your USB device. This is particularly true for USB 2.0 and USB 3.0 ports.\nHow to fix a USB device not recognized error.\nConsidering the fact that in most cases the USB device driver is missing in Windows, the common solution to fixing the USB device not recognized error is to install the driver for the USB device. In most cases new USB devices come with a driver CD which contains the USB driver that needs to be installed. If you do not have a driver CD, you can try to find and download the USB device driver on the manufacturer’s website.\nIn case you really can not find the device driver for the USB device, you can use a driver finder program. Such a program will find and download device drivers on your PC based on the hardware that it automatically identifies. Even if your USB device is not plugged anymore, the application will be able to find and download a USB driver for it.\nWhen you do have a driver CD, it’s still smart to use a driver update program to get an updated driver for your USB device. Drivers on CDs are quite often outdated and updated drivers can solve problems, improve performance and add features.\nA second benefit to a driver finder program is that it can update all outdated drivers on your system. This means that the system or chipset drivers will also be updated, including the USB chipset drivers on your motherboard. This could also solve the USB device not recognized error, whether it is a USB 2.0 port or USB 3.0 port.\nOther methods to repair the USB device not recognized error\nIn case the USB driver update does not solve the USB device not recognized error, there are a few other things that you can try to solve the error.\n- If your USB device is using a separate USB cable, try changing the cable to make sure the USB cable is not defective. For external hard disks that are not recognized, a shorter USB cable can sometimes help as the power voltage can be a problem in those cases.\n- If you are getting a USB not recognized error when you are trying to connect a mobile phone or MP3 player, check the configuration options on the device itself. The settings often allow the device to be configured as a Mass Storage Device, which can solve the problem.\n- Check the BIOS of your computer to make sure the USB ports are configured properly. Most new USB devices work best with the USB 2.0 configuration, but in some cases you might need to change the USB to “legacy” support, which means version 1.1.\n- Disable the power management of USB hubs on your computer. This can sometimes help with certain USB devices, especially if the problem happens with power state changes (resume from hibernation for example).\n- In the Device Manager, right-click the Universal Serial Bus controllers device and select Uninstall in the popup menu. Now reboot and Windows will reinstall the device.\n- In case you are using a USB hub, try plugging the USB device directly into the computer instead of in the USB hub. USB hubs often cause compatibility problems with certain USB devices. The cause can be the USB version compatibility or a USB power limitation.\n- Try shutting down the computer altogether and unplug it from the power supply. Wait for a few minutes before plugging it back again and starting it. In case you are using a laptop, also unplug the laptop battery in this step.\n- Delete the related registry key under “HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Enum\\USB” from the Windows registry. Each USB device has an entry there starting with “VID_”. Find the related entry to your USB device and then delete it. Make sure you make a backup of the registry before deleting anything!\nRestart Windows and then try plugging the USB device again.\n- Specifically for Windows XP, there is another possible solution that is related to the Windows Registry. This pertains to removing the UpperFilters and LowerFilters registry values. Microsoft has a knowledge base article on how to do this.\nFurther useful programs to deal with USB problems are USBDeview, which is a freeware utility to view USB devices, and USB View from Microsoft. They show a lot more about your USB devices than the Device Manager does, so they can be helpful to pinpoint problematic USB devices. The USB View program from Microsoft has the advantage that it shows the hierarchy, so you can see which device is connected to which USB Controller and USB Hub. But the program is part of the Microsoft development tools, so unless you can find a reliable individual download, you need to install complete development environment.\nMost USB device not recognized errors can be solved with one of the above solutions. If you have any other solutions, or a USB problem that did not get solved using these tips, please leave a comment and I’ll get right on it!\nWhen you are running Windows 8 or 8.1 on an older system, or laptop and it is using an Intel graphics chipset, you might run into an issue with a low screen resolution error. The Metro interface requires a display resolution of 1024 x 768, but that is not always supported by the available display driver on this type of systems.\nTypically you can get this on systems with a Intel GMA 3150 or even an Intel 945 series chipset. The driver will only support the 1024 x 600, which will result in an error message stating “This app cannot open” and/or “The screen resolution is too low for this app to run”.\nThere is a work around available that can work for this problem. It means installing the latest Intel driver for the graphics chipset (pick the latest Windows 7 driver if Windows 8 is not mentioned). Once installed, reboot to make sure everything is working.\nAfter that you need to edit the registry to force the resolution to be changed. So first make a backup of the registry so you can revert back to that in case of problems!\nAfter making the backup, open the registry editor (search for “regedit”), and press Ctrl+F to initiate a search of the registry. You need to search for the term “Display1_DownScalingSupported” and change the value from 0 to 1. After that, close the registry editor and reboot the computer.\nThe last step is to actually change the screen resolution from the Control Panel and set it to 1078 x 768. After that the apps using the Metro interface should work fine.\nIn case of problems, just reboot and press F8. Then select the Advanced Repair Options to start Windows in Safe Mode and restore the registry to the original settings. Then reboot and the screen should be fine again (although without the support for the 1078 x 768 resolution).\nPeople with Windows based computers sooner or later start wishing that their computer was as fast as when they bought it. With use Windows tends to get a bit slower every day.\nMost of this is the result of installing and uninstalling software, which leads to hard disk fragmentation and the registry growing. Fact is that not all software has a clean uninstall, so remnants will remain both on disk and in the Windows registry. In addition, more and more software try to install startup components, which will slow up the PC startup time.\nRunning a disk cleanup on a regular basis will help, and if you also schedule a disk defrag, you will already benefit from better PC speed. Taking it a step further to reduce the number of startup programs, and cleaning the Windows registry, will also optimize PC performance.\nFreePCCleaner is a software program that can be used on Windows XP, Vista, 7 and 8 based computers to optimize the performance by cleaning and defragmenting the registry. There is also a feature to manage the startup programs.\nUsing the program is very simple. After installation, you click the scan button and wait for the registry to be analyzed. Depending on the size of the registry and the computer speed, the scan can take a minute. But once the result is available, the software automatically creates a backup of the registry, and you can repair the errors found, which includes all cleanup.\nThe Manage Startup feature allows you to see which programs all run at startup, which is more than only those in the All Progams -> Startup folder. A simple checkbox enables you to disable any program that you do not want to start automatically.\nAnother useful feature is found in the Settings, and is a scheduler, that enables you to automatically run the program at predefined intervals. This way you don’t forget to manually run FreePCCleaner.\nAlthough Windows Media Player has improved over the years, the best solution for media playback on Windows is still VLC in our opinion. The support for almost all audio and video formats is a great benefit, but it is also simple and straightforward to use.\nBut if you are using VLC on a slower computer, maybe a Windows XP based system for example, you might face some performance problems with video playback. Especially large resolution videos requiring lots of processing can cause delays or rendering problems.\nIt is however possible to tweak the VLC player a bit to ensure it will get all possible CPU resources when playing a video file. The general problem with multitasking operation system (like Windows), is that the CPU is shared amongst tasks, so a single process will never get all the CPU time.\nVLC has a setting that allows the user to increase the priority and as a result get more CPU time. This can help in playing the movie that just won’t play properly on your computer!\nTo change the VLC setting for increased performance, open the player, and in the Tools menu, select Preferences (or press Ctrl+P). This will bring up the Simple Preferences window.\nIn the bottom left of the window, you need to select the All option for the Show settings feature.\nThis will change the thumbnail view on the left to a list view with more options.\nIn the list, you need to select the Advanced option, and check the option named Increase the priority of the process.\nAlthough you can experiment with the Clock source option, generally the Auto setting will already do the trick.\nClick Save to store the settings and then play your media file again!.\nNote: Be prepared that the responsiveness of Windows and other applications will be a lot slower (although you should not run those in the first place when dealing with performance issues).\nMy PC crashed the other day. I know, BUMMER! After re-installing everything, I noticed that in Outlook 2010, I was not seeing the REPLY mark or icon that marks emails I’ve replied to. You know, that little purple arrow pointing to the left that tells me that I’ve already addressed a particular message.\nIf you receive a lot of emails like me on a daily basis, then you know how that that little arrow helps save you a lot of time because then you don’t need to second guess yourself if something has been addressed or not!\nAnyway, on to our solution!\nHow to Mark Emails as ‘Replied’ in Outlook 2010\n- Open Outlook 2010.\n- Click the View tab.\n- In the Arrangement group, click Add Columns.\n- Under Available Columns, click Icon and then click Add.\n- Click the Move Up or Move Down buttons to position the Icon where you want it.\n- Click OK.\nWe all know that using battery powered equipment has the disadvantage of the device running out of power. In the case of laptops running Windows, you can use the power management options to optimize the use of the battery by allowing the hard disk to be powered down and running the CPU at lower speeds.\nBut of course there are more options to maximize the use of your laptop’s battery. The more programs are running, the more the CPU is active. So disabling Windows features and services can further help to optimize the use of the battery.\nA useful program for this is called BatteryCare, which is free and can be downloaded from the BatteryCare.net website. It goes much further than the Windows power management options. You can see in the options that there are quite a few additional features to save energy.\nMost will cause no problems, but the option to disable the Windows services is something that needs to be tested, as it could conflict with specific software that you might be using.\nIf you use the option to let BatteryCare control the power plans defined in Windows, you can disable the Windows battery icon in the notification area. Everything is accessible from the BatteryCare icon in that case anyway.\nBatteryCare also keeps track of the recharging cycles and will recommend a calibration after a defined number of cycles. This will help the battery indicator to be as accurate as possible, preventing you to be surprised by a low battery situation. Of course there are warning and notifications that can be configured, but if the basis for those notifications is incorrect information, the notifications come too late.\nFor more information on battery optimization make sure to also look at our previous article on maximizing battery life.\nRemember the last time you showed your holiday photos to your friends. Did you feel embarrassed at times because of the chaos in the photo collection? Yeah, most people do… Since you often have to explain many times what this or that shot meant because it is not clear from the photo. And sometimes come across photos you were not going to show but you forgot they were in this folder… So, how to avoid such awkward situations?\nThe solution is to start using the brand-new slide show maker software. You will see how easily it makes every photo showing session into exciting leisure time. Using this software, you will be able to turn ordinary photos into a fantastic movie with your favourite music, your friends and relatives starring. You will save a lot of time and forget about uploading hundreds of photos to Facebook or Friends Reunited. Instead your friends will enjoy your film and beautiful music.\nHow to start? First of all, get ready with the photos of an event you would like to cover in the film. It can be summer holiday, your trip to a desert island, birthday party or business presentation, professional portfolio or your child’s first day at school, etc. Every event can be made into a great film! Ready? Now upload them to the freeware slide show maker software.\nNow think about music. As you know, a film’s success depends on the sound track a lot. So, choose the right music to convey the atmosphere and people’s mood at the event. For any film you can add as many sound tracks as you need – with the slide show maker software it as simple as ABC!\nThe slide show maker software allows you to add text comments as well. It’s saves much of your time – you think of them only once and not repeat every time you show photo collection to somebody.\nNow that you have chosen photos, found the right music, added witty text comments – it’s time to choose the transitions effects. They make your slide show coherent and really smooth. You are welcome to choose from hundreds of transition effects available in Bolide Slideshow Creator or, if you like, the program can do everything for you.\nThe program has a powerful built-in player – any moment you can see the current result and make the necessary changes – the order of the photos, transition effects or whatever you need.\nThe program also allows you to save the output video in various video formats and with different resolution. You may save the video in HD quality and enjoy it on a big screen together with friends.\nWell, making a slide show out of photos and music into a single unity is fast, easy and fun with the slide show maker software. Download it now for free and enjoy!", "label": "No"} {"text": "Lowes Paint Colors With Primer\nLowes Paint Colors With Primer is free HD wallpaper. This wallpaper was upload at July 21, 2018 upload by admin in .You can download it in your computer by clicking resolution image in Download by size:. Don't forget to rate and comment if you interest with this wallpaper.\nDescription wallpaper for Lowes Paint Colors With Primer\n- Title: Lowes Paint Colors With Primer\n- Link: http://aeroc.club/wp-content/uploads/2018/02/water-based-stain-concrete-water-based-stain-stain-by-water-based-concrete-stain-color-chart.jpg\n- Category: Uncategorized\n- View: 0 View", "label": "No"} {"text": "Static analysis of a source code\nThese tools scan source code to identify weaknesses that can lead to an automated static analysis tool can scan that same application in just. Understanding static code analysis and detection of dirty patterns in application source code. A curated list of static analysis tools, linters and code quality checkers for various groovy codenarc - a static analysis tool for groovy source code, enabling.\nSource code analysis tools, also referred to as static application security testing (sast) tools, are designed to analyze source code and/or. To help those searching for an open source static code analysis tool, we've compiled a list of the best tools for different languages. Static source code analysis tools are tools that analyze software code bases for defects without actually running the programs that are built from.\nStatic analysis tools help detect weaknesses in software and the cwe is a feature (cwe-254), which is a child of source code (cwe-18. Static code analysis may be defined as the act of analysing source-code the basic idea is to statically analyse a java programmer's source code and extract a. Cppcheck is a static analysis tool for c/c++ code it provides unique code analysis to detect bugs and focuses on detecting source code (targz), archive .\nStatic code analysis for open-soure code sourceclear helps you use open source software safely at the time of analysis the code was last updated. Source code analysis (or static analysis) software helps keeps buggy code from seeing the light of day. Static analysis tools should be used when they help maintain code quality static analysis is looking at source-code for potential problems. First, a static analysis tool is a program which parses then analyses you source code this means that in your toolchain the static analyser is an. Codesonar's static analysis engine is extraordinarily deep, finding 3-5 times more defects on average than other static code analysis tools.\nStatic program analysis is the analysis of computer software that is performed ( second ed) boston: thomson computer press isbn 0-47135-846-0 static testing c++ code: a utility to check library usability. While other source code analyzers run as separate tools, doublecheck performs a full program analysis, finding. Here, we'll look at how to automate source code security analysis with static analysis tools since its4's release in early 2000, the idea of.\nA black duck code quality analysis (cqa) addresses both internal code auditing an open source quality analysis evaluates key software quality criteria such as analysis informed by use of static analysis of the code, comparative analysis. Static analysis aka source code analysis automated analysis at compile time to find potential bugs broad range of techniques, from light- to heavyweight. More and more organizations are now opting for a static analysis (also called source code review) of their applications in this article, we'll.\n- 1mortengoodwin, [email protected] abstract this paper is investigating if it is possible to predict source code quality based on static analysis and machine.\n- Brief survey of commercial and academic static source code analysis tools.", "label": "No"} {"text": "Marketplace Tech for Tuesday, April 23, 2013\nEpisode Teaser Image\nEver type a random search into Google and watch the system auto-complete just exactly what you were looking for? There is now a hint that Google could soon add even more predictive technology to its search page. A sharp-eyed blogger noticed some software code that suggest a Google Now predictive personal assistant could come to any old browser.\nPosted In: Google, Facebook\nMolly Wood, senior editor at CNET, joins Marketplace Tech host David Brancaccio to explain Google Now and how it works.\nPosted In: Music, spotify\nNew data show that the Daft Punk's \"Get Lucky\" is now the most streamed song on Spotify. Which got us thinking, even though the way we listen to music has changed, the tune has not.", "label": "No"} {"text": "Read how CampusOptics unlimited user license is allowing Arkansas State University to extend the system to other users across campus!\nLearn how Rogue Community College is using CampusOptics to make key safety data more accessible to everyone on campus!\nLearn how the University of Memphis was able to quickly consolidate several different software platforms into CampusOptics!\nLearn how Texas A&M University is using CampusOptics to improve their Environmental Compliance programs!\nRead how CampusOptics is helping the University of Winnipeg get the big picture view of campus safety!\nDiscover how William & Mary uses CampusOptics to report on key EH&S performance metrics!\nRead how Weber State University is using CampusOptics to better track chemical inventory from acquisition to disposal!\nRead how Texas Woman's University is using CampusOptics to provide emergency planning documentation to first responders!\nSee how the University of Texas at Dallas is using CampusOptics to improve Fire & Life Safety!\nLearn how Kirkwood Community College uses the CampusOptics Mobile App to conduct regular safety inspections and associate asset barcodes!\nLearn how quick and easy the implementation of CampusOptics can be!\nA comprehensive EH&S and Fire & Life Safety solution, specifically designed for colleges and universities.\n7951 Shoal Creek Blvd., Suite 275Austin, TX 78757(888)email@example.com\n© 2024 CampusOptics. Website by Huckster Design.", "label": "No"} {"text": "DigiDNA iMazing 2.17.10 Crack 2023 is the latest sharing application it is used to share information from iOS version devices to any PC, and it allows the user to quickly move the documents from any iPhone or iPod device into a computer without any security risk. It also provides backup to all the files and documents to keep the safety data and the user can access the required information at the time of need, user can quickly access the wanted data, this application has a faster speed than other applications.\nDigiDNA iMazing 2.17.10 Crack with License Key Free (Latest):\nBy using this latest application it is possible to access the images and other documents that are stored on the iOS device this program helps the user to create a connection that allows sharing the of information between the computer and iPhone device. This is very useful software and very supportive of performing the sharing task efficiently in the new way which is very easy to use, you can easily share the information of messenger and other SMS services it allows you to use the messages on the computer.\nDigiDNA iMazing Crack Download is a very simple application it will create a connection with a single tap and after enabling the connection between iPhone and computer user can share any kind of information to a computer. This software is easily available and you can access this app in many languages, it is also available at the given link below so you can get it free. You can use this app for managing gadgets for iOS devices.\nDigiDNA iMazing Crack Activation Keygen is the best solution for Mac version devices, it controls the complete setup and manages it effectively every kind of user can access this app without any restriction, and it has a great feature of providing the backup to all the stored data and provides complete security. The speed of this software is very smooth and fast it has the power to move the data in minutes, the full version of this program is also available at the given link below you can easily get it free.\nDigiDNA iMazing Full Crack + License Key (100% Working) 2023:\nDigiDNA iMazing Free Download contains upgraded tools that will copy the data without any risk and move the information from iPhone to the computer with quick speed. This is very effective for professional users it provides complete over any iOS device. This version is comfortable for iOS lovers to compete with the new assessment to discuss the comparative data and move it quickly.\nDigiDNA iMazing Activation Keygen in the matter of sharing data and important information quickly without any restriction and error. If a user has favorite data on the iPhone device and wants to share or copy the related on a PC so the discussed application is beneficial and allows to share such a piece of information with fast speed.\nYou can use this application on all windows version devices it helps the user to copy or move songs and movies from any iOS version device to a PC, this application contains the latest tools which work fast than the older version. It is suitable for all kinds of users but professional users can get maximum benefits from this latest app, there is a search bar tool that helps to find out any data with the speed you can get it with just a single click.\nDigiDNA iMazing 2.17.10 Full Crack + Activation Code (Free):\nVery helpful content and information are used to manage the PC and sort out the files with full access and concept to clear the information the user of new material and concentration fulfills the objective task with amazing techniques DigiDNA iMazing License Key will enhance the performance and make it eligible for increasing the categories that are adjustable. The conceptual transaction agreed with the concerning habitual effective task that is necessary for all professional persons.\nThere are amazing ideas used to share data and information rapidly to avoid any kind of negligence this will show cause for maintaining the work this is a special app for iPhone users that manage all the related work with full system maintenance this is a required target that enhances the capabilities as well. This is a very safe and secure way to transfer files user can use USB connections that are accessive to all kinds of users it also helps to download the data with the same application.\nFeatures of DigiDNA iMazing 2.17.10 Key:\n- A very supportive application that is used to duplicate files and information.\n- It creates a connection between the iOS version device and the computer.\n- You can get this version from the given link below it is available free of cost.\n- Ability to run on all the windows version devices with complete access for all users.\n- This app also provides a backup system for all the data which is stored in the device.\n- Users can share the information with just a single tap at a fast-moving speed.\n- It maintains the privacy of users with the help of efficient tools of this latest version.\n- You can move music files, movies, and other desired information at a fast speed.\n- Every user can access this app it has a simple friendly interface that is easy to utilize.\nDigiDNA iMazing Product Key 2023:\nDigiDNA iMazing Serial Key 2023:\nDigiDNA iMazing License key 2023:\nDigiDNA iMazing Keygen 2023:\n- OS: Windows all versions\n- CPU: Two GHz\n- Memory: 1 GB RAM is required.\n- Hard Disk Space: 100 Mb required.\nHow to install DigiDNA iMazing 2.17.10?\n- Download the latest version from the given link.\n- Open the downloaded file to start the installation.\n- Read the instructions carefully and continue.\n- It will be finished after some steps are followed.\n- Now you can use the sharing tools of this app.", "label": "No"} {"text": "Ensure that you are never in the dark. An exciting new accessory for your tent, the SabreLink, lighting system allows you to link up to three lights together. Each system is controlled using a remote control that allows you to switch the lights on and off and also dim and brighten them. The lights can be hung using the carabiner and velcro fitting options provided.\nThe Kampa Sabre LINK 30 LED add on kit awning and tent light has 30 super bright LED bulbs that never need replacing. This add on kit is to be used with the sabrelink starter kit only.\nLED bulbs provide a super bright light source and have ultra low power consumption and never need to be replaced. The system allows you to link up to three lights together - 1 Starter kit and 2 add on kits needed - that's 90 LED's\nComes with 3 metre joining lead to connect one tube to another.\nSubscribe to our newsletter\nAnd never miss a special offer.\nCopyright: N C AND LEISURE , 2022, All Rights Reserved Finance providers - V12 Retail Finance, N C AND LEISURE LTD , register number 13473449 and act as a credit broker and not a lender.", "label": "No"} {"text": "Create your own GitHub profile\nSign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.Sign up\n- Toronto, On, Canada\nForked from donovanh/zelda\nCSS Zelda-inspired animation\nForked from Pixelkit/PixelKit-Bootstrap-UI-Kits\nA free flat UI kit built on Bootstrap for any developer that wants to build a cool looking and functional website. Enjoy!\nForked from EbookFoundation/free-programming-books\nForked from jquery/jquery\nForked from jaridmargolin/formatter.js\nFormat html inputs to match a specified pattern\nForked from apache/predictionio\nPredictionIO, a machine learning server for software developers and data engineers.", "label": "No"} {"text": "The purpose of this paper is to analyze coupling methods for High-Temperature Gas-Cooled Reactor-Pebble bed Module (HTR-PM) primary circuit, including reactor core, steam generator, and other components. Each component has individual characteristics and is simulated by an independent code package. A feasible way to integrate these independent codes is by using Picard iteration. In practice, the primary circuit is divided into multiple parts based on physical fields or spatial domains. Another coupling method is Jacobian-free Newton-Krylov (JFNK), which is frequently applied for the simulation of coupled multi-physics systems due to its efficiency and capability for large-scale nonlinear problems. To demonstrate the efficiency of coupling method for tightly coupled primary circuit systems, several Picard and JFNK methods were compared consistently in this paper, where all the models, equations and codes for each method are the same. Especially for neutronics, we use the same additional equation for JFNK as the outer iteration step in power iteration. Results show that the equations in the reactor core and outside the reactor core should be solved simultaneously in Picard iteration, otherwise additional thermal-hydraulics iterations are necessary. JFNK methods have shown better convergence behavior than Picard iteration, especially for computational efficiency. Since the nonlinear residual is evaluated directly from nonlinear equation set without iteration, linear preconditioned JFNK has shown efficient convergence, which is recommended by the authors as the first choice for HTR-PM primary circuit if the linear preconditioned JFNK is applicable and the well-performing preconditioner is available. However, for utilizing physical iteration processes, nonlinear preconditioned JFNK is a practical choice when integrating legacy codes.\n- Primary circuit\nASJC Scopus subject areas\n- Nuclear Energy and Engineering", "label": "No"} {"text": "Nice footage for LED screens, these lights sweeping across the screen in different shades of yellow. This video loop fits every kind of project, a nice addition for your media team's assets.\nRoyalty free license\n|H264 MP4||1920 x 1080||Pro||Upgrade to download|\nVideo preview shown at low quality. There's no Free Loops logo on the video file.", "label": "No"} {"text": "Dr. Scott A. Brandt is Professor of Computer Science at the University of California, Santa Cruz. He is also Director of the UCSC Systems Research Laboratory, co-founder of the UCSC Storage Systems Research Center and, co-founder and Director of the UCSC/Los Alamos Institute for Scalable Scientific Data Management. Dr. Brandt’s research is in the area of Computer Systems. He specializes in Storage Systems and Real-Time Systems and, more recently, System and Storage Performance Management.\nPeter Brantley is the Director of Online Strategy for the University of California Davis Library. Previously, he was the Director of Digital Development at New York Public Library, and before that, Director of Scholarly Communication at the open source not-for-profit, Hypothes.is. He worked at the Internet Archive on policy issues and open standards. He convenes […]\nDr. Brewer focuses on all aspects of Internet-based systems, including technology, strategy, and government. As a researcher, he has led projects on scalable servers, search engines, network infrastructure, sensor networks, and security. His current focus is (high) technology for developing regions, with projects in India, Ghana, and Uganda among others, and including communications, health care, education, and e-government.\nKarl Brown is Deputy Director of CIEE and Director for CIEE’s Energy Use in Buildings program. As Program Director, he plans and manages new technology demonstration efforts that are leading to deep reductions in energy consumption by buildings. Karl also helps develop energy policy for the University of California (UC), provides energy planning support for […]\nMy interests lie in astrophysical and geophysical fluid dynamics. I concentrate on the highly nonlinear, turbulent flow regimes, using high resolution numerical simulations for such studies. In particular, my research is currently focused on dynamos, where turbulence in an electrically-conducting fluid creates and maintains strong magnetic field, with a particular view to understanding the origin of magnetic activity of our Sun.\nSince 1974, Dr. Andrew Burke’s career work has involved many aspects of electric and hybrid vehicle design, analysis, and testing. He was the head systems engineer on the U.S. Department of Energy–funded Hybrid Vehicle (HTV) project while working at the General Electric Research and Development Center in Schenectady, N.Y.\nJames Bushnell is Research Director at the University of California Energy Institute and a lecturer at U.C. Berkeley’s Haas School of Business. He received a Ph.D. in Operations Research from U.C. Berkeley in 1993. He has written extensively on the organization and competitiveness of electricity markets. Dr. Bushnell has served as a member of the Market Monitoring Committee of the California Power Exchange and is currently a member of the Market Surveillance Committee of the California ISO.\nDuncan Callaway is the Assistant Faculty Director of the CITRIS Sustainable Infrastructures research thrust. Duncan received his PhD in Theoretical and Applied Mechanics from Cornell University in 2001 and subsequently held an NSF Postdoctoral Fellowship in the Department of Environmental Science and Policy at the University of California, Davis. He then spent 4 years working in the energy industry in senior engineering positions, first at Davis Energy Group and later at PowerLight Corporation. He was a member of the research faculty of the Center for Sustainable Systems at the University of Michigan from 2006-2009.\nElliott Campbell has already received nationwide attention for a recent study concluding that the United States could meet up to 6 percent of its energy needs with biofuels produced on “marginal” ag land.\n“It’s been suggested that biofuels production on prime agricultural land could accelerate global climate change,” Campbell explained. “We looked at what we call marginal land – for example, farmlands in the Eastern U.S. that were abandoned as the center of agriculture shifted west.”\nThe laboratory of Dr. Manel Camps uses molecular genetic and computational approaches to study the biological consequences of random changes in genetic information mutations) that occur spontaneously or as a result of environmental insults. They couple the generation of random mutant libraries with specific selections or screens to study the functional impact of point mutations and to establish how genes evolve in response to selective pressure.\nThe new spring cohort of CITRIS Foundry teams was announced February 13 at a Foundry event featuring Rich Lyons, UC...\nThe submission deadline for abstracts is April 1, 2020. The BECC conference will be held on December 6-9, 2020 in Washington...\nThe CITRIS Invention Lab will be open for visitors on Saturday, April 18 for UC Berkeley's Cal Day from 10 am to 2 pm.", "label": "No"} {"text": "Chief Information Officer\nDavid Ford is responsible for the leadership and strategic direction of the University’s library and computing services. This covers:\n- the Learning Resources Centres\n- the online and physical library collections\n- the computing infrastructure, learning environment (StudyNet), business systems and desktop and computing services.\nHis career has included a doctorate in computer science, working for 13 years as software development manager within a commercial organisation, and 14 years within information services in UK Higher Education.", "label": "No"} {"text": "Algorithms are an integral part of coding and computer programming. They form the foundation of how software and applications operate, ensuring that tasks and processes are carried out efficiently and accurately. In the world of coding, an algorithm can be defined as a step-by-step procedure or set of rules designed to solve a specific problem or accomplish a particular task.\nWhen you think about algorithms, imagine a recipe for your favorite dish. Just like a recipe provides a precise set of instructions for preparing a meal, an algorithm provides a clear roadmap for the computer to follow in order to perform a specific task. Without algorithms, software and applications would be unable to function effectively or deliver the desired results.\nThe significance of algorithms in coding cannot be overstated. They enable programmers to create efficient and optimized solutions to complex problems. By breaking down tasks into smaller, manageable steps, algorithms allow programmers to identify and address potential issues and enhance the overall performance of a program.\nFurthermore, algorithms provide developers with a systematic approach to problem-solving. They help in simplifying complex problems and organizing the implementation process. With well-designed algorithms, programmers can save time, resources, and effort, ultimately delivering high-quality software products.\nIn the world of coding, algorithms possess certain characteristics that make them reliable and effective. Firstly, algorithms should be unambiguous, meaning that every step and instruction should be clear and well-defined. This ensures that programmers can accurately implement the algorithm without any confusion.\nSecondly, algorithms should be deterministic, meaning that they produce the same results for a given set of inputs. This allows developers to trust that their algorithms will consistently deliver the same output, which is crucial for ensuring the reliability and stability of a program.\nAdditionally, algorithms should be efficient and have a finite number of steps. This means that they should offer optimal solutions within a reasonable timeframe, without unnecessary repetitions or delays. Efficiency is vital in coding as it contributes to faster execution and improved performance of software applications.\nIn the next sections, we will explore different types of algorithms, examples of popular algorithms in coding, algorithm design techniques, and how algorithms contribute to problem-solving in the coding realm. Through understanding algorithms and their importance, developers can take their coding skills to new heights and develop innovative solutions to various challenges.\nDefinition of an Algorithm\nAn algorithm is a specific set of step-by-step instructions or rules that are designed to solve a particular problem or achieve a specific task. It can be thought of as a well-defined process that takes an input, performs a series of operations or transformations, and produces an output. In the context of coding and computer programming, algorithms serve as the building blocks for creating software applications and systems.\nAt its core, an algorithm is a sequence of logical and mathematical operations that guide the computer in executing a task. It provides a clear and structured roadmap for solving problems and performing complex computations. By breaking down a problem into smaller subtasks and defining the steps required to solve each subtask, algorithms offer a systematic approach to problem-solving.\nOne important aspect of algorithms is their universality. In other words, an algorithm can be implemented on different programming languages and platforms, as long as the underlying logic and operations remain the same. This universality allows algorithms to be reusable and adaptable, making them valuable tools for programmers in various domains.\nMoreover, algorithms can be classified based on their level of abstraction. Some algorithms are general-purpose, meaning they can be applied to a wide range of problems and scenarios. These algorithms are fundamental and form the basis of many computational tasks. On the other hand, some algorithms are designed to solve specific problems or address particular domains or industries.\nAlgorithms can also be classified based on their complexity. Some algorithms have a fixed number of steps and can be executed in a predictable and efficient manner. These are known as deterministic algorithms. Conversely, there are also non-deterministic algorithms that involve some level of randomness or unpredictability in their execution.\nOverall, algorithms are crucial in the field of coding and computer programming. They provide a structured approach to problem-solving, allowing programmers to develop efficient and optimized solutions. Understanding algorithms and their various classifications is essential for every developer, as it forms the foundation for building robust and functional software applications.\nImportance of Algorithms in Coding\nAlgorithms play a pivotal role in coding and computer programming. They are essential for designing and creating efficient, reliable, and scalable software applications. Here are some of the key reasons why algorithms are important in coding:\n1. Efficiency: Algorithms allow developers to optimize the performance of their code by providing a systematic approach to problem-solving. By breaking down complex tasks into smaller, manageable steps, algorithms enable programmers to identify potential bottlenecks or inefficiencies and improve the overall efficiency of their code. Efficient algorithms can significantly reduce the execution time of a program, resulting in faster and more responsive software applications.\n2. Reusability: Algorithms are reusable components that can be applied to multiple problems or scenarios. Once a programmer has designed and implemented an algorithm for a specific task, they can reuse it in different projects or adapt it to solve similar problems. This reusability not only saves time and effort but also promotes consistency and standardization across software development projects.\n3. Scalability: When developing software applications, it is crucial to consider their scalability, especially as the project grows in complexity and size. Algorithms provide a foundation for building scalable applications by enabling developers to design code structures that can handle increasing data loads and perform efficiently regardless of the size of the input. Scalable algorithms are essential for accommodating growing user bases and expanding functionalities without sacrificing performance.\n4. Problem-solving: Algorithms are powerful tools for problem-solving in coding. They provide a structured approach to breaking down complex problems into smaller, more manageable subproblems. By tackling each subproblem individually and designing algorithms to solve them, programmers can develop effective solutions to even the most challenging tasks. Algorithms help in analyzing problem requirements, identifying dependencies, and implementing appropriate logic to achieve the desired outcome.\n5. Optimization: Optimization is a critical aspect of software development. Algorithms allow developers to optimize their code by identifying areas for improvement, reducing unnecessary operations, and enhancing the overall efficiency of their solutions. Skilled algorithm design and implementation can result in significant performance gains and resource savings, making the code more robust and cost-effective.\n6. Innovation: Algorithms drive innovation by enabling developers to create new and groundbreaking solutions to complex problems. By utilizing algorithms creatively, programmers can come up with novel approaches and functionalities that push the boundaries of what is currently possible. Algorithms form the backbone of many advanced technologies, such as artificial intelligence, machine learning, and data analytics, driving innovation and progress in various industries.\nOverall, algorithms are the building blocks of coding and play a vital role in the development of efficient, scalable, and reliable software applications. They promote problem-solving, optimization, reusability, and innovation, ultimately enhancing the quality and performance of the code.\nCharacteristics of an Algorithm\nAlgorithms possess certain key characteristics that make them effective and reliable tools for solving problems in coding. Understanding these characteristics is crucial for developing well-structured and efficient algorithms. Here are some of the main characteristics of an algorithm:\n1. Unambiguous: An algorithm must be unambiguous, meaning that each step and instruction should be clear and well-defined. There should be no room for interpretation or confusion. This clarity ensures that programmers can accurately implement the algorithm without any ambiguity, leading to consistent and predictable results.\n2. Deterministic: Determinism is another important characteristic of an algorithm. It means that given the same input, an algorithm should always produce the same output. This determinism is crucial for validating and verifying the correctness and reliability of the algorithm. It allows developers to trust that the algorithm will consistently deliver the expected results, enabling them to build robust and predictable software applications.\n3. Finite: An algorithm should have a finite number of steps. It means that the algorithm should eventually terminate after a certain number of operations, regardless of the input or the size of the problem. Having a finite nature ensures that the algorithm does not get stuck in an infinite loop or run indefinitely, which could lead to poor performance or crashes in software applications.\n4. Input and Output: Every algorithm has an input, which represents the data or information on which the algorithm operates. It also has an output, which represents the result or the transformed data after the algorithm has executed. An algorithm should clearly define both the input and output specifications to ensure that developers understand the requirements and can utilize the algorithm correctly.\n5. Efficiency: Efficiency is a crucial characteristic of an algorithm. An efficient algorithm accomplishes the task at hand using the fewest possible resources, such as time and computational power. Efficient algorithms ensure that software applications perform optimally and can handle larger data sets or complex operations without slowing down or experiencing performance issues.\n6. Generic and Reusable: An algorithm should be designed in a way that it can be applied to multiple instances of a problem or similar problems. It should provide a generic solution that can be easily adapted and reused in various contexts. This characteristic promotes code reusability, reduces duplication of efforts, and encourages standardization in software development.\n7. Well-structured: A well-structured algorithm follows a logical and organized flow of steps. It avoids unnecessary repetition, ambiguity, or complexity. Well-structured algorithms are easier to understand, debug, and maintain, ensuring that developers can effectively work with the algorithm and make necessary modifications as required.\nBy encompassing these characteristics, an algorithm becomes a reliable and valuable tool in coding. These traits not only make algorithms easier to work with but also contribute to increased efficiency, maintainability, and scalability of software applications.\nTypes of Algorithms\nAlgorithms come in different types, each tailored to address specific types of problems or scenarios. Understanding the various types of algorithms is essential for programmers to choose the most appropriate approach for solving a particular task. Here are some common types of algorithms:\n1. Sorting Algorithms: Sorting algorithms are used to arrange data in a specific order, such as ascending or descending. Examples of sorting algorithms include bubble sort, insertion sort, selection sort, merge sort, and quicksort. These algorithms are essential for tasks that involve organizing data for efficient searching or presenting the information in a structured manner.\n2. Searching Algorithms: Searching algorithms are utilized to find a specific element or value within a collection of data. Common searching algorithms include linear search, binary search, and hash-based search algorithms. These algorithms greatly assist in quickly locating data within large datasets, making them invaluable in tasks such as data retrieval and filtering.\n3. Graph Algorithms: Graph algorithms are designed to solve problems related to graphs, which consist of nodes (vertices) connected by edges. Examples of graph algorithms include breadth-first search (BFS), depth-first search (DFS), Dijkstra’s algorithm, and Kruskal’s algorithm. Graph algorithms are widely used in various domains, such as network routing, social network analysis, and recommendation systems.\n4. Dynamic Programming Algorithms: Dynamic programming algorithms focus on dividing a complex problem into smaller overlapping subproblems and solving them recursively. These algorithms store the intermediate results in a table or cache, reducing redundant computations and optimizing performance. Dynamic programming is particularly useful in tasks such as optimizing resource allocation, sequence alignment, and solving optimization problems.\n5. Recursive Algorithms: Recursive algorithms involve solving a problem by breaking it down into smaller instances of the same problem until a base case is reached. The algorithm then combines the results of the smaller problems to obtain the final solution. Recursive algorithms are often used in tasks like tree traversal, recursive backtracking, and calculating factorial or Fibonacci series.\n6. Greedy Algorithms: Greedy algorithms make locally optimal choices at each step, with the hope that the overall result will be globally optimal. These algorithms are efficient but may not always produce the optimal solution. Examples of greedy algorithms include the knapsack problem, Huffman coding, and the traveling salesman problem.\n7. Backtracking Algorithms: Backtracking algorithms explore potential solutions by incrementally building them and backtracking when a solution is found to be invalid or unsatisfactory. They are commonly used in tasks such as generating permutations or combinations, solving puzzles, and constraint satisfaction problems.\nThese are just a few examples of the many types of algorithms that exist. Each type serves different purposes and has specific advantages and disadvantages. By understanding the characteristics and appropriate applications of these algorithms, programmers can choose the right algorithmic approach to tackle a wide range of problems and optimize the performance and efficiency of their code.\nExamples of Algorithms\nAlgorithms are used in various domains and have countless applications in coding. They enable programmers to solve complex problems efficiently and optimize the performance of software applications. Let’s explore some examples of commonly used algorithms:\n1. Binary Search: Binary search is a searching algorithm used to find a specific value within a sorted array or list. It follows a divide-and-conquer approach by repeatedly dividing the search space in half until the target value is found or the search space is empty. Binary search has a time complexity of O(log n), making it a very efficient algorithm for searching tasks.\n2. Bubble Sort: Bubble sort is a simple sorting algorithm that repeatedly compares adjacent elements and swaps them if they are in the wrong order. It iterates through the entire list until the list is sorted. Although bubble sort is not the most efficient sorting algorithm, it is easy to understand and implement, making it a good choice for small datasets.\n3. Dijkstra’s Algorithm: Dijkstra’s algorithm is a graph algorithm used to find the shortest path between two nodes in a weighted graph. It starts from a source node and iteratively explores the neighboring nodes, updating the distances from the source as it progresses. Dijkstra’s algorithm is widely used in various applications, such as network routing and route planning.\n4. Merge Sort: Merge sort is a divide-and-conquer sorting algorithm that divides the input array into smaller subarrays, recursively sorts them, and then merges the sorted subarrays to obtain the final sorted array. Merge sort has a time complexity of O(n log n) and is known for its stability and efficiency in sorting large datasets.\n5. Depth-First Search (DFS): DFS is a graph traversal algorithm that explores as far as possible along each branch before backtracking. It starts from a selected node and systematically visits all reachable nodes until all vertices in the graph are visited. DFS is used for tasks such as determining connectivity in a graph, maze traversal, and topological sorting.\n6. QuickSort: QuickSort is a highly efficient sorting algorithm that uses a divide-and-conquer approach. It selects a pivot element from the array and partitions the other elements into two subarrays, according to whether they are less than or greater than the pivot. QuickSort recursively sorts the subarrays until the entire array is sorted. It has an average time complexity of O(n log n) and is widely used in practice.\n7. Knapsack Problem: The knapsack problem is an optimization problem that involves selecting a subset of items from a set, with the constraint that the total weight of the selected items should not exceed a given capacity. Various algorithms, such as dynamic programming and branch and bound, can be used to solve the knapsack problem efficiently.\nThese are just a few examples of the many algorithms used in coding. Each algorithm serves a specific purpose and has different strengths and weaknesses. By understanding these algorithms and their applications, programmers can make informed decisions on which algorithm to use based on the problem at hand, optimizing the performance and efficiency of their code.\nCommon Algorithms in Coding\nCoding involves the use of various algorithms to solve problems and optimize the performance of software applications. Here are some common algorithms that are widely used in coding:\n1. Linear Search: Linear search is a simple algorithm used to find a specific element within an array or list. It iterates through the elements one by one until it finds the target element or reaches the end of the list. Linear search has a time complexity of O(n), where n is the size of the input, making it suitable for small datasets or unsorted lists.\n2. Binary Search: Binary search is a more efficient algorithm for finding an element in a sorted array or list. It starts by comparing the target value with the middle element of the array and eliminates half of the remaining elements at each step. Binary search has a time complexity of O(log n), making it ideal for large datasets or sorted lists.\n3. Bubble Sort: Bubble sort is a simple sorting algorithm that repeatedly compares adjacent elements and swaps them if they are in the wrong order. It continues this process until the entire list is sorted. Bubble sort has a time complexity of O(n^2), making it suitable for small datasets but less efficient for larger ones.\n4. Merge Sort: Merge sort is an efficient divide-and-conquer sorting algorithm. It divides the input array into smaller subarrays, sorts them recursively, and then merges them to obtain the final sorted array. Merge sort has a time complexity of O(n log n) and is known for its stability and effectiveness in sorting large datasets.\n5. QuickSort: QuickSort is another popular sorting algorithm that uses a divide-and-conquer approach. It selects a pivot element from the array and partitions the other elements into two subarrays based on whether they are less than or greater than the pivot. QuickSort then recursively sorts the subarrays. On average, QuickSort has a time complexity of O(n log n), making it suitable for a wide range of applications.\n6. Depth-First Search (DFS): DFS is a graph traversal algorithm that explores as far as possible along each branch before backtracking. It starts from a selected node and systematically visits all reachable nodes until all vertices in the graph are visited. DFS is commonly used in tasks such as graph connectivity, cycle detection, and maze solving.\n7. Breadth-First Search (BFS): BFS is another graph traversal algorithm that explores all the vertices of a graph in breadth-first order. It starts from a selected node and visits all its immediate neighbors before moving on to the next level of neighbors. BFS is often used in applications such as shortest path finding, network analysis, and social network algorithms.\nThese are just a few examples of the common algorithms used in coding. Each algorithm has its own advantages and is suitable for different scenarios. As a programmer, understanding and utilizing these algorithms can greatly enhance your problem-solving abilities and improve the efficiency of your code.\nAlgorithm Design Techniques\nWhen it comes to designing algorithms, several techniques and methodologies can be employed to create efficient and optimized solutions. These techniques help programmers approach problems with a structured mindset, ensuring that the resulting algorithms are scalable, reusable, and reliable. Here are some common algorithm design techniques:\n1. Divide and Conquer: The divide and conquer technique involves breaking down a complex problem into smaller, more manageable subproblems. Each subproblem is then solved independently, and the solutions are combined to obtain the final result. This technique is often used in sorting and searching algorithms, such as merge sort and binary search.\n2. Backtracking: Backtracking is a technique used to find solutions to problems by systematically exploring all possible options. It involves making choices at each step and backtracking when a chosen path leads to a dead end or an unsatisfactory solution. Backtracking algorithms are commonly used in tasks like generating permutations, solving puzzles, and constraint satisfaction problems.\n3. Greedy Approach: The greedy approach involves making locally optimal choices at each step, with the hope that these choices will lead to a globally optimal solution. Greedy algorithms are efficient and easy to implement but may not always guarantee the optimal solution. They are commonly used in tasks such as scheduling, minimum spanning trees, and the knapsack problem.\n4. Dynamic Programming: Dynamic programming is a technique that breaks down a problem into smaller overlapping subproblems and solves them recursively. It uses memoization or caching to store and reuse intermediate results, reducing redundant computations and improving efficiency. Dynamic programming is commonly used in tasks such as optimizing resource allocation, sequence alignment, and solving optimization problems.\n5. Branch and Bound: Branch and bound is a technique used to solve optimization problems by systematically exploring the space of possible solutions. It involves branching at each decision point and bounding the search space based on certain criteria. By pruning unpromising branches, this technique can significantly reduce the search space and improve the efficiency of the algorithm.\n6. Randomized Algorithms: Randomized algorithms involve introducing an element of randomness into the algorithm’s design or execution. These algorithms use randomization to achieve efficiency or improve the likelihood of finding optimal solutions. Randomized algorithms are commonly used in tasks such as randomized sorting, graph algorithms, and Monte Carlo simulations.\nThese are just a few examples of the algorithm design techniques used in coding. Each technique has its own advantages and is suitable for different types of problems. By employing these techniques in your algorithm designs, you can create efficient, scalable, and robust solutions to a wide range of coding challenges.\nAlgorithmic Problem Solving\nAlgorithmic problem solving is at the core of coding and computer programming. It involves breaking down complex problems into smaller, more manageable components and designing algorithms to solve them efficiently. Here are some key aspects of algorithmic problem solving:\nUnderstanding the Problem: The first step in algorithmic problem solving is gaining a thorough understanding of the problem at hand. It requires identifying the inputs, desired outputs, constraints, and any specific requirements or conditions. By dissecting the problem and clarifying its requirements, you can lay a solid foundation for designing an effective algorithm.\nBreaking Down the Problem: Once you understand the problem, the next step is breaking it down into smaller, more manageable subproblems. The idea is to decompose the original problem into simpler components that can be solved independently. This allows you to focus on solving each subproblem individually before combining the solutions to obtain the final result.\nChoosing the Right Data Structures: Selecting appropriate data structures is crucial for efficient algorithmic problem solving. Different types of problems require different data structures, such as arrays, linked lists, stacks, queues, trees, or graphs. The choice of data structure impacts the efficiency and effectiveness of the algorithm, as it determines how data is organized and accessed during the problem-solving process.\nDesigning the Algorithm: Once you have broken down the problem and identified the relevant data structures, the next step is designing the algorithm. This involves defining the steps and logic required to solve each subproblem. Consider factors like efficiency, simplicity, and maintainability when designing the algorithm. Strive to find the most optimal and elegant solution to the problem.\nTesting and Debugging: After designing the algorithm, it is crucial to thoroughly test and debug it. Test the algorithm with various input scenarios, including edge cases, to ensure that it produces the correct output. Debug any errors or unexpected behavior that may arise during the testing phase. This iterative process helps refine the algorithm and ensures its accuracy and reliability.\nOptimization: Algorithmic problem solving also involves optimizing the algorithm for performance and efficiency. Look for opportunities to reduce time complexity, minimize redundant operations, and improve resource utilization. Techniques like memoization, pruning, and choosing efficient algorithms can significantly enhance the efficiency of the solution.\nDocumentation and Refinement: Proper documentation and refinement are essential for effective problem-solving. Document the algorithm’s logic, assumptions, and complexities for future reference. Refine the algorithm by seeking feedback, reviewing code, and incorporating improvements. Continuously update the documentation to ensure the algorithm is well-documented and easily maintainable.\nAlgorithmic problem solving is an iterative and creative process that requires logical thinking and a systematic approach. By following these steps and utilizing efficient problem-solving techniques, you can develop robust and optimized algorithms to tackle a wide range of coding challenges.\nAlgorithms are the driving force behind coding and computer programming. They provide step-by-step instructions for solving problems and performing tasks efficiently. Understanding the characteristics, types, and design techniques of algorithms is crucial for developers to create optimized and scalable software applications.\nBy employing algorithmic problem-solving techniques, programmers can break down complex problems into smaller, manageable subproblems and design efficient algorithms to solve them. Techniques such as divide and conquer, dynamic programming, and greedy algorithms help in creating effective solutions.\nCommon algorithms, such as linear search, binary search, bubble sort, merge sort, and DFS, have widespread applications in various domains. These algorithms improve search and sorting operations, graph traversal, and optimization. Choosing the appropriate algorithm for a specific problem and implementing it correctly can lead to improved performance and better user experiences.\nMoreover, algorithm design techniques like dividing problems into subproblems, backtracking, and using dynamic programming foster creativity and innovation in solving complex tasks. These techniques enable programmers to devise efficient solutions and optimize algorithms further.\nIn conclusion, algorithms are the building blocks of coding, providing structure and efficiency in problem-solving. By leveraging different types of algorithms alongside appropriate design techniques, developers can tackle diverse challenges and create robust, scalable, and optimized software applications. Staying abreast of algorithmic advancements and continually enhancing algorithmic problem-solving skills is essential for success in the ever-evolving field of coding.", "label": "No"} {"text": "Concentration of sucrose solutions via vacuum membrane distillation\nMetadataShow full item record\nThe potential use of vacuum membrane distillation (VMD) process for the concentration of sucrose solution was examined. The effect of several parameters, including feed temperature, flow rate, and initial sucrose concentration on the flux quality and quantity was studied. VMD process was found effective in concentrating aqueous sucrose solutions as the permeate was absolutely pure water. The feed temperature significantly affected the flux. The increase in feed flow rate increased the permeate flux and this increase was more pronounced in the laminar than in the turbulent region. The increase in the initial sucrose concentration resulted in a slight decrease in the flux without affecting the quality of the permeate. A mathematical model describing the variation of sucrose concentration with time was developed and validated with the experimental results. Concentration and temperature polarization effects were also considered in this work.\n- Chemical Engineering [1105 items ]", "label": "No"} {"text": "Liker App Apk\nLiker App offers you a very simple and intuitive graphics. With the Dashboard, you can keep track of the number of “likes” received and, through the dedicated section.\nThe Yapp! team, constantly working, has developed a UNIQUE product in its category, SAFE and EASY to use. Our goal is to create honest solutions that can help people in their intent.\nYapp! That a group loves to create!\n|Published||Jun 19, 2017|", "label": "No"} {"text": "911 Emergency? This campaign was created so smart phone users could experience how confusing and frightening accidental 911 calls can be for emergency operators. It generated over 4000 scans in the Vancouver area.\nKind of like the 60’s. Only legal. Body Copy: This is Earth’s finest atmospheric show — the Aurora Borealis — an intense, color inducing blend of oxygen, nitrogen, solar wind and magnetic fields. It dances across the sky and unleashes up to 10 million megawatts of mind-bending power. Dream on, man.", "label": "No"} {"text": "AI UX Strategy\nEffectively integrate AI research and modelling into your UX strategy plan.\nTraditional strategy techniques can give powerful insights on your customers and users and drive product strategy. Emerging developments in AI and data science have the potential to greatly enhance your products. Our strategic approach ensures that you have a holistic product strategy that includes AI and data science without sacrificing traditional proven product definition methods.", "label": "No"} {"text": "We recently released Gravity PDF 6.5.5, which has better compatibility with the Gravity Forms ecosystem, and a few bug fixes.\nThis update sees PDF Conditional Logic now getting correctly saved, which could cause problems when the logic contained symbols. We also resolved an issue when displaying Gravity Wiz Populate Anything’s live merge tags in custom PDF templates. Please update your plugin to avoid issues.\n- Ensure PDF conditional logic is run through the correct sanitization function upon save\n- Ensure Gravity Wiz Populate Anything live merge tags are correctly processed in the $form_data array\n- Fix Monolog error when running PHP8.1", "label": "No"} {"text": "Like a sleeping giant, Internet radio is quietly attracting more and more listeners and advertising dollars, leading some experts to predict that some day soon it will eclipse the popularity of satellite radio and iPods. ¶ Already, ratings company Arbitron Inc. ... says, some 37 million Americans tune into Internet radio at least once a month, up from 11 million four years ago. ¶ With its growing audience, it could start to take a bigger bite of the $11 billion spent annually on online advertising. Nevertheless, But Internet radio faces hurdles, say proponents, because digital copyright laws make it less viable than rivals. ... Link: Reuters.", "label": "No"} {"text": "1 article published in JoVE\nA Flexible Low Cost Hydroponic System for Assessing Plant Responses to Small Molecules in Sterile Conditions Carolina C. Monte-Bello*1,2, Elias F. Araujo*1,3, Marina C.M. Martins1, Valeria Mafra4, Viviane C.H. da Silva1,2, Viviane Celente1, Camila Caldana1,5 1Brazilian Bioethanol Science and Technology Laboratory (CTBE), Brazilian Center for Research in energy and materials (CNPEM), 2University of Campinas (UNICAMP), 3University of Viçosa (UFV), 4CTBE, CNPEM, 5Brazilian Bioethanol Science and Technology Laboratory (CTBE/CNPEM), Max Planck Partner Group A simple, versatile, and low-cost in vitro hydroponic system was successfully optimized, enabling large-scale experiments under sterile conditions. This system facilitates the application of chemicals in a solution and their efficient absorption by roots for molecular, biochemical, and physiological studies.", "label": "No"} {"text": "BOISE -- As the countdown to the college football season gets closer and fan excitement builds, Boise State released a rendering of what its new video board for Bronco Stadium will look like once it is installed.\nThe foundation is set for the new Double R Vision video board built by Daktronics. It will measure 37.2 feet tall and be 58.8 wide, for a total of 2,187.4 square feet. The 15mm HD LED display panel will provide a state-of-the-art viewing experience for Bronco fans.\nDouble R Vision also features an upgraded sound system that will provide crisp and clear sound for both music and PA announcements across the entire stadium.\nThe new video board is expected to be completed by the Broncos third home game against Southern Mississippi on September 28.", "label": "No"} {"text": "top of page\nWed, 30 Aug|\nGenerative AI Horizons: Unleashing Digital Marketing's Future\nIn this community lead event we will be discussing where people are at with generative AI and their predictions for where we will be in 5-years time.\nRegistration is closedSee other events\nbottom of page", "label": "No"} {"text": "What it is?\nA clock made with JS and CSS. For the digital clock I worked with momentjs.\nThis was my third project, but the first one that was based on a tutorial. After I done the tutorial from Wes Bos - CSS +JS clock and because the use of time in JS was daunting for me I decided that I had to give it a go. In the middle of the project I learn about the library momentjs and also end up using it in the digital clock.\nWhat I learned?\n- Time Variables", "label": "No"} {"text": "Coin Tiles Beta\nIntroducing the Coin Tiles Crypto Analyzer Beta release Coin Tiles This web app currently loads 2000 coins and refreshes the page in real time so it may be a bit CPU intensive. Future version will probably load 500 coins at a time and provide links to relevant coin data for each coin. This is Beta! Enjoy!", "label": "No"} {"text": "The majority of patients diagnosed with neuroblastoma present with aggressive disease. Improved detection of neuroblastoma cancer cells following initial therapy may help in stratifying patient outcome and monitoring for relapse. To identify potential plasma biomarkers, we utilised a liquid chromatography-tandem mass spectrometry-based proteomics approach to detect differentially-expressed proteins in serum from TH-MYCN mice. TH-MYCN mice carry multiple copies of the human MYCN oncogene in the germline and homozygous mice for the transgene develop neuroblastoma in a manner resembling the human disease. The abundance of plasma proteins was measured over the course of disease initiation and progression. A list of 86 candidate plasma biomarkers was generated. Pathway analysis identified significant association of these proteins with genes involved in the complement system. One candidate, complement C3 protein, was significantly enriched in the plasma of TH-MYCN+/+ mice at both 4 and 6weeks of age, and was found to be elevated in a cohort of human neuroblastoma plasma samples, compared to healthy subjects. In conclusion, we have demonstrated the suitability of the TH-MYCN+/+ mouse model of neuroblastoma for identification of novel disease biomarkers in humans, and have identified Complement C3 as a candidate plasma biomarker for measuring disease state in neuroblastoma patients. Biological significance: This study has utilised a unique murine model which develops neuroblastoma tumours that are biologically indistinguishable from human neuroblastoma. This animal model has effectively allowed the identification of plasma proteins which may serve as potential biomarkers of neuroblastoma. Furthermore, the label-free ion count quantitation technique which was used displays significant benefits as it is less labour intensive, feasible and accurate. We have been able to successfully validate this approach by confirming the differential abundance of two different plasma proteins. In addition, we have been able to confirm that the candidate biomarker Complement C3, is more abundant in the plasma of human neuroblastoma patient plasma samples when compared to healthy counterparts. Overall we have demonstrated that this approach can be potentially useful in the identification of biomarker candidates, and that further validation of the candidates may lead to the discovery of novel, clinically useful diagnostic tools in the detection of sub-clinical neuroblastoma.\nBibliographical noteVersion archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.\n- Complement C3\n- Complement system", "label": "No"} {"text": "Nero Burning ROM 2016\n- Trial version\nNero Burning ROM ...writing speed is easily configurable Nero ...software Powerful software to burn CDs / DVDs / Blu-rays In the field of burning, Nero ...free ...\n- PROS: Excellent burning quality , Various advanced tools , Supports SecurDisc\n- CONS: Installation phase a bit long", "label": "No"} {"text": "Smartphone holder with safety elastic strings.\nAdjustable anti-vandal seat for multiple sizes.\nUltra-bright no-friction dynamo light.\nEasy 3 speed gear shifting with grip shifter.\nBasket case with safety elastic strings.\nMudguard with integrated light and reflector.\n24” wheels with a reflective stripe integrated on tire.\nDrum brakes with cooling disc and anti-vandal nuts.\nArea for advertising on front and back mudguards.\nEasy adjustment of seat height with comfortable lever and vandal securing mechanism.\nBattery free LED lights powered by magnets.\nInternal 3 speed gear solution with low maintenance.\nLightweight, dual piece aluminium frame with internal cable routing and low step in.\nNovel innovation all weather locking device with RFID and magnet insert.\nAluminium chain guard.", "label": "No"} {"text": "Discover how to build, deploy and run applications in production on Koyeb. The fastest way to deploy applications globally.\nDiscover how to use Remix and Tailwind to build a reactive frontend. This guide covers how to build a Hacker News clone application and deploy it on the Koyeb Serverless Platform for native global load balancing, autoscaling, autohealing, auto HTTPS (SSL) encryption, and more with zero configuration.\nDiscover the MERN stack by learning how to build a blog application using MongoDB Atlas, Express, React, and Node. Then, learn how to deploy your MERN stack on the Koyeb Serverless Platform. This guide is the first in a mini-series on the MERN stack.", "label": "No"} {"text": "The discovery, made in rodents, may lead to advances in understanding Alzheimer’s disease, autism and age-related memory loss, and could point to potential treatments for these and other neurological conditions, said senior study investigator Michael Ehlers, M.D., Ph.D., an associate professor of neurobiology and a Howard Hughes Medical Institute investigator at Duke.\nThe researchers published the findings in the Dec. 7, 2006, issue of the journal Neuron.\nThe research was funded by the National Institutes of Health, the American Health Assistance Foundation and the Raymond and Beverley Sackler Foundation.\nThe team focused on specific structures in brain nerve cells, or neurons, called dendritic spines. These are tiny bumps that form on the surface of dendrites, which extend off neurons like tree branches and receive chemical signals from other neurons. Each dendritic spine \"talks\" with its counterpart on a nearby neuron, and collectively the two structures comprise the \"synapse\" that links the neurons.\nThe brain stores new information by changing the structure of the synapses, Ehlers said. “If we need to remember a name, directions to a location or how to perform certain motor tasks -- anything involving learning or memory, really -- our brain does it by changing the properties of synapses,” he said.\nDuring learning, synapses change in ways that make it easier for connected neurons to communicate with each other. This “plasticity” can occur in two ways. One way is structural, in which a synapse changes in size or shape; the other way is functional, in which connections between the synapses are strengthened by increasing the chemical signals sent or received by connected neurons.\nIn previous studies, Ehlers and colleagues at Duke found that certain cellular structures called recycling endosomes, which recycle used proteins within the cell, play an important role in controlling the functional type of plasticity. In the current study, the researchers sought to determine if recycling endosomes are involved in the structural type of plasticity as well.\nTo create a study model, the researchers transplanted neurons from rats into cell culture dishes. They then stimulated the neurons with chemicals and examined the cultures using a technique called live-cell imaging, in which a camera attached to a powerful microscope recorded the dendritic spines as they grew. This technique, Ehlers said, enabled the team to glimpse inside the internal world of the neuron to see how the recycling endosomes responded when neurons were stimulated.\nWhen the scientists triggered the neurons, they saw the recycling endosomes, labeled with a green dye, streaming up and down the neurons, dipping in and out of the dendritic spines. Inside the dendritic spines, the recycling endosomes deposited pieces of recycled proteins that grew new spines or changed the shape and size of existing spines, Ehlers said.\nThe finding supported the team's theory that recycling endosomes transport the cargo that dendritic spines need to grow, Ehlers said.\nEhlers added that by providing a better understanding of how cells develop new synapses or strengthen existing synapses, the study may give researchers new ideas for developing drugs that target these critical cellular processes. A variety of neurological disorders, including Alzheimer’s disease, autism and early forms of age-related memory loss, are characterized by the loss of synapses or by the abnormal structural development of dendritic spines, he said.\nA video will be available starting December 6, 2006 at 12 noon. To view, visit http://dukehealth.org/news/brain_remodeling.\nMarla Vacek Broadfoot | EurekAlert!\nCould this protein protect people against coronary artery disease?\n17.11.2017 | University of North Carolina Health Care\nMicrobial resident enables beetles to feed on a leafy diet\n17.11.2017 | Max-Planck-Institut für chemische Ökologie\nThe formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.\nToday, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...\nJust because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.\nThat is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...\nComputer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.\nDuring a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....\nThe quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.\nFuture quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...\nPillared graphene would transfer heat better if the theoretical material had a few asymmetric junctions that caused wrinkles, according to Rice University...\n15.11.2017 | Event News\n15.11.2017 | Event News\n30.10.2017 | Event News\n17.11.2017 | Physics and Astronomy\n17.11.2017 | Health and Medicine\n17.11.2017 | Studies and Analyses", "label": "No"} {"text": "Our client faced an unprecedented situation and immediately had to deal with event data from hundreds of sources. They were forced to work quickly to find and create information to assess the situation and guide the response. Due to the immediate nature of the situation, a huge amount of data was created with varying structure. Our client needed a Master Data Management (MDM) solution to correlate, search, and understand the entire data set collected during the response.\nAs none of the current out-of-the-box MDM solutions met the requirements, a decision was made to develop a custom MDM solution. The solution extended the Microsoft analytics technology stack already in use within the organization.\nA series of Dimensional Models were developed for each of the 14 types of entities (people, organizations, vendors, etc.) included in the scope. A common Extract, Transform, and Load (ETL) layer was developed to orchestrate the flow of data from the different sources of information into the MDM repository.\nA Fuzzy Logic Match and Merge capability was developed, using SSIS native components. This feature was critical to ensure data governance, allowing the Data Stewards to quickly identify related and duplicated data among domains.\nIn the wake of this unprecedented situation, we empowered our client with an accurate and consistent set of event data to analyze the situation and guide their response. This solution was implemented successfully and included multiple domains. We were able to provide the client with a consistent, consolidated view of their data. After the MDM repository was completed, it was possible to link related data across domains, enabling the Search component of the project. The Data-stewards from each domain were able to review proposed duplicate and matched data to allow them to make an informed decision over data validity. This information was published to SharePoint, allowing it to be consumed internally and externally.", "label": "No"} {"text": "My background is that of a meteorologist. I have 28 years of experience in meteorology at Environment Canada, 16 years as an operational weather forecaster (where I analyzed NWP models every day), and seven years as a research meteorologist. I have a physics degree from the University of Toronto and a Masters’ degree from York University in meteorology.\nIn my research project I will defend the position of scientific realism, the belief that our best scientific theories try to correctly describe the mind-independent world as faithfully as possible. Realists believe that the ability of our scientific theories to generate predictions is directly proportional to how faithfully they represent the large-scale order in the universe. This conclusion will be derived from an modified version of Putnam’s no-miracles argument or NMA. I will introduce a variation on the NMA that I call the Reverse No-Miracles Argument (Reverse NMA).", "label": "No"} {"text": "Clock, Clock In Grass Clock In French: Clock In\nPublished at March 21st, 2019 17:56:45 PM by justin\nTagged as web based time clock discussion or clock in calculator topic along with simple employee time clock subject as well as open time clock 2008 free area of interest also clock in clock out discussion with clock in the wall object also Clock, So don't forget to check out the main article in Clock In\n© 2019 Danielbriere48. Reproduction without explicit permission is prohibited. All Rights Reserved.", "label": "No"} {"text": "Join 500,000+ Artists\nIts' free and it takes less than 10 seconds!\ncan autopainting be made to work like an effect. so it can be applied to more than one image that changes shape and position. I know about using a script but the script doesnt account for the changing position of the object", "label": "No"} {"text": "Audio Channel Mismap\n\"Audio Channel Mismap\" is the incorrect implementation of the audio track or audio channel order, which dictates the desired speaker assignment or channel arrangement of an audio mix.\nAudio Channel Mismap impacts both Content and Technical Quality of the asset. The member experience is negatively impacted by audio playback occurring out of the wrong speaker assignment.\nThe majority, if not all audio appears to be mis-mapped and routes to the wrong speaker assignment\nHow to Prevent:\nUse templates with correct audio mapping.\nReview channel mapping on timeline prior to exporting.\nPlease refer to the technical specifications for the correct Audio Channel Mapping order, reorder the channels accordingly, and redeliver. Check the M&E for the same issue, and redeliver M&E as well if necessary.", "label": "No"} {"text": "Home > News > Taking the NanoPulse -- What's for dinner? Nanotechnology, of course.\nSeptember 11th, 2007\nTaking the NanoPulse -- What's for dinner? Nanotechnology, of course.\nNanotechnology is now officially more than just food for thought. It's actual, stick-to-your ribs, tasty food -- on the shelves now with more on the shopping list.\nCheck the numbers. Estimates put the current global nano-food market at $2.6 billion right. By 2010, experts say it could top $20 billion. Who's setting the menu? Major corporations around the world and a number of smaller companies, as well. One estimate suggests more the 200 companies have current research projects, including five of the top 10 food giants\nInterviews/Book Reviews/Essays/Reports/Podcasts/Journals/White papers\nAtom-thick CCD could capture images: Rice University scientists develop two-dimensional, light-sensitive material December 20th, 2014\nOregon researchers glimpse pathway of sunlight to electricity: Collaboration with Lund University uses modified UO spectroscopy equipment to study 'maze' of connections in photoactive quantum dots December 19th, 2014\nInstant-start computers possible with new breakthrough December 19th, 2014\nIranian Scientists Use Nanotechnology to Increase Power, Energy of Supercapacitors December 18th, 2014\nFirst Home-Made Edible Herbal Nanodrug Presented to Pharmacies across Iran December 17th, 2014\nScientists trace nanoparticles from plants to caterpillars: Rice University study examines how nanoparticles behave in food chain December 16th, 2014\nIranian Scientists Convert Curcumin Existing in Turmeric into Edible Nanodrug December 15th, 2014\nNanoparticles Prove Effective in Removing Phosphor from Calcareous Soil December 10th, 2014", "label": "No"} {"text": "The Faculty of Science is a research powerhouse. Our researchers attract funding from a broad array of funding agencies, including NSERC, CIHR, SSHRC, Alberta Inovates, and many others.\nUAlberta scientists view carbon’s impact on the environment in real time\nNew research examines 1200-year old volcanic ash from Alaska to northern Europe\nIn this section", "label": "No"} {"text": "Starting a programming journey can be exciting and overwhelming, especially with the rapidly evolving technology landscape. As a student, focusing on the right technologies is crucial to lay a strong foundation for your programming career.\nThis blog post will explore the leading technologies students should consider in 2023 to kickstart their programming journey.\nPython course continues to dominate the programming world, making it an ideal language for students to start their coding journey. Known for its simplicity, readability, and versatility, Python Training is the go-to choice for beginners and seasoned developers. Its clean syntax and an extensive standard library make learning and working easy.\nPython is widely used in various domains, such as web development, data analysis, machine learning, and game development. With frameworks like Django and Flask, students can build web applications effortlessly. Python’s robust data processing libraries, including NumPy and Pandas, make it an excellent choice for data analysis and manipulation. Additionally, the popularity of machine learning has soared in recent years, and Python course’s machine learning libraries, like Scikit-learn, provide a solid foundation for building predictive models.\nWhen it comes to Java programming, Core Java serves as the fundamental building block. It is an essential language for students starting their coding journey. Known for its platform independence, robustness, and versatility, Core Java is widely used to develop various applications.\nJava’s syntax is similar to other popular programming languages, making it easier for beginners to grasp. Its vast standard library provides a rich set of classes and APIs, enabling students to develop various desktop, web, and mobile applications. With Java’s object-oriented nature, students can practice essential concepts like encapsulation, inheritance, and polymorphism.\nMoreover, Core Java offers robust input/output handling, exception handling, and multithreading features, making it suitable for building reliable and efficient applications. By understanding the Core Java tutorial, students gain a strong foundation that can be applied to other advanced Java technologies.\nOnce students have mastered the Core Java course for beginners’ training, delving into Advanced Java opens up a new world of possibilities. Advanced Java developer certification focuses on specialized areas of Java development, providing students with additional tools and frameworks to build complex and scalable applications.\nA critical aspect of Advanced Java training is Java Enterprise Edition (Java EE), which offers a set of APIs and protocols for developing enterprise-level applications. Java EE includes technologies like JavaServer Pages (JSP), Servlets, Enterprise JavaBeans (EJB), and Java Persistence API (JPA). Students can leverage these technologies to build robust web applications that handle high traffic and integrate with databases.\nFurthermore, students can explore frameworks like Spring and Hibernate. Spring provides a comprehensive ecosystem for building enterprise applications, offering features like dependency injection, aspect-oriented programming, and MVC architecture. Hibernate, on the other hand, simplifies database interaction by providing an object-relational mapping (ORM) framework, allowing students to work with databases seamlessly.\nAdditionally, students can venture into web development using JavaServer Faces (JSF) or build RESTful APIs using Java API for RESTful Web Services (JAX-RS). These technologies enable students to create dynamic and interactive web interfaces and develop scalable and secure web services.\nGit And Version Control\nWhile learning to code, it’s crucial to understand the importance of version control and collaborative workflows. Git, a distributed version control system, is a fundamental technology for students to grasp. Using Git, students can track changes, collaborate with teammates, and efficiently manage their codebase.\nPlatforms like GitHub and GitLab seamlessly integrate with Git, allowing students to showcase their projects and collaborate with the open-source community. With Git, students can work on projects with multiple contributors, keep track of changes, and quickly revert to previous versions if needed. Understanding Git and version control is a skill development highly valued in the programming industry, as it promotes efficient collaboration and ensures project stability.\nMachine Learning And Data Science\nMachine learning and Data science have become indispensable in today’s tech-driven world. As a student, diving into these fields can open up many opportunities. With libraries like NumPy, Pandas, and Scikit-learn, Python training provides a solid foundation for data analysis and machine learning.\nData science involves collecting, cleaning, and analyzing data to extract valuable insights. Python’s data processing libraries enable students to perform complex data manipulations, statistical analysis, and visualization. With Pandas, students can easily handle large datasets and derive meaningful information.\nMachine learning, on the other hand, focuses on developing algorithms that allow computers to learn from data and make predictions or decisions. Python’s machine learning libraries, such as Scikit-learn, TensorFlow, and PyTorch, provide many tools and algorithms for tasks like image recognition, natural language processing, and predictive analytics.\nIn an era of rapid digital transformation, understanding cloud computing is essential for students venturing into the programming world. Platforms like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud offer a wide range of services that enable students to deploy and scale their applications quickly.\nCloud computing eliminates physical infrastructure and allows students to access computing resources on demand. They can deploy their applications to the cloud, which provides scalability, reliability, and cost-effectiveness. Learning cloud computing concepts like virtual machines, containers, and serverless architectures can give students a competitive edge and a deeper understanding of modern application development.\nBegin your journey towards success today with LearNowX, where you can dive into comprehensive courses and resources to enhance your programming skills. Take the first step and unlock opportunities to grow and excel in your programming endeavors.\nAt LearNowX, we’re here to elevate your learning journey. Our comprehensive platform allows you to acquire practical skill development courses, master new knowledge, and unlock exciting career opportunities. Contact us, and let’s embark on a transformative adventure together.", "label": "No"} {"text": "Electronics Expo offers the iHome Alarm Clock Radio w/ iPod Dock\n, model no. IP90B, for $87.86. Coupon code \"STBLU\" chops it to $71.13\n. With $7.99\nfor shipping, that's the lowest total price we could find by $6, although it was $20 less last month (since expired). It features an iPod dock, FM radio tuner, dual alarm, remote control, and more.", "label": "No"} {"text": "Westville NJ ZIP Code\nLast added ZIP code areas:millville utah zip code ely mn zip albany mn zip code zip code for mantoloking nj indianapolis il zip code 383 madison avenue new york ny 10179 690 s university ave provo ut zip code 27856 zip code for kermit tx 32926 zip code bayridge zip code westfield zip code ma kinkos nw expressway oklahoma city empire al zip code charlotte tennessee zip code 85396 zip code zip code 78503 rivanna river way moncure zip code fort bragg nc zip porter mn zip code pecatonica zip code rison arkansas zip code\nWestville city is located in New Jersey State, Gloucester County and has a unique zip code assigned by the US Postal Service Office.\nYou can search for the Westville NJ zip code by its streets and block numbers if we have some of the Westville streets loaded in our website\nWestville Area Code is 856 and Time Zone is Eastern (GMT -05:00).\nWestville Zip Code - New Jersey\nThe US ZIP Code basic format consists of five decimal numerical digits assigned to the Westville City. An extended ZIP+4 code, introduced in the 1980s, includes the five digits of the Westville ZIP code, a hyphen, and four more digits that determine a more specific location within a given ZIP code in Westville, New Jersey.\nThe Westville Zip Code is 08093.\nIf you want to send a mail to Westville City, you should use the 08093 Zip Code.\nIn 1983, the U.S. Postal Service introduced an expanded Westville ZIP code system that it called ZIP+4, often called \"plus-four codes\", \"add-on codes\", or \"add ons\". A ZIP+4 code uses the basic 08093 Zip code plus four additional digits to identify a geographic segment within the five-digit delivery area, such as a Westville city block, a group of apartments, an individual high-volume receiver of mail or any other unit that could use an extra identifier to aid in efficient mail sorting and delivery in New Jersey.", "label": "No"} {"text": "The field of 3D printing and additive manufacturing has seen tremendous growth in recent years. This technology has revolutionized the way we design and manufacture products, allowing for faster production times, greater customization, and reduced waste. However, the success of 3D printing relies heavily on the materials used in the process. This is where materials science comes in.\nMaterials science is the study of the properties and behavior of materials, including metals, ceramics, polymers, and composites. In the context of 3D printing, materials science plays a crucial role in developing new materials that are suitable for use in additive manufacturing. These materials must be able to withstand the high temperatures and pressures involved in the printing process, as well as meet the specific requirements of the final product.\nOne of the most significant advancements in materials science for 3D printing has been the development of metal powders. These powders are used in metal additive manufacturing, where layers of metal powder are fused together using a laser or electron beam. The resulting parts are incredibly strong and durable, making them ideal for use in aerospace, automotive, and medical applications.\nAnother area of materials science that has seen significant progress is the development of polymers for use in 3D printing. Polymers are widely used in additive manufacturing due to their low cost, ease of use, and versatility. However, not all polymers are suitable for 3D printing. Researchers have been working to develop new polymers that have the necessary properties, such as strength, flexibility, and heat resistance, to be used in additive manufacturing.\nIn addition to developing new materials, materials science is also essential in optimizing the printing process itself. For example, researchers have been studying the effect of different printing parameters, such as temperature and speed, on the final product. By understanding how these parameters affect the properties of the printed part, researchers can optimize the printing process to produce parts with the desired properties.\nMaterials science is also critical in ensuring the safety and reliability of 3D printed products. As with any manufacturing process, there are potential risks associated with 3D printing, such as the release of harmful fumes or the use of materials that are not safe for human contact. Materials scientists are working to develop new materials that are safe for use in additive manufacturing and to identify potential risks associated with the process.\nIn conclusion, materials science plays a crucial role in the success of 3D printing and additive manufacturing. Without the development of new materials and the optimization of the printing process, the full potential of this technology cannot be realized. As the field of materials science continues to advance, we can expect to see even more exciting developments in 3D printing and additive manufacturing in the years to come.", "label": "No"} {"text": "Chemiosmotic Energy Coupling\nSome of the energy initially captured by the photosynthetic light reactions is used to power the vectorial movement of protons from the stroma to the thylakoid lumen, thereby forming a transmembrane proton gradient (3). This proton translocation causes a small pH increase of the stroma, and a much larger pH decrease in the lumen due to its relatively small volume. This leads to the non-equilibrium condition of a pH difference of 3 to 4 units across the thylakoid membrane during the photosynthetic light reactions. The rate that protons escape from the lumen to the stroma is relatively fast (t(½) of decay of the trans-membrane proton gradient is ~1 sec). Consequently, the instability of the proton gradient makes it unsuitable for long-term energy storage. Instead, the proton gradient is used by the FₒF₁ ATP synthase as the energy source to drive ATP synthesis. In this manner, the photosynthetic light reactions are coupled to the synthesis of ATP via the proton gradient. Reagents like ammonia that can transport protons across the membrane more rapidly than the FₒF₁ ATP synthase will inhibit ATP synthesis because they collapse the proton gradient. These reagents that uncouple ATP synthesis from electron transfer reactions, called uncouplers, typically increase the rate of the latter reactions by relieving back-pressure from the proton gradient.\nEnergy coupling occurs because Fₒ serves as an efficient conduit to move protons across the thylakoid membrane and back toward equilibrium with the stroma. Protons move to the stroma in response to the energy gradient that is derived from the concentration difference across the membrane (ΔpH). Because each proton also carries a positive charge, the charge difference across the membrane (ΔΨ) also contributes to this proton energy gradient. A proton concentration difference of about 1000 fold across the membrane (ΔpH = 3) provides sufficient energy for FₒF₁ to drive ATP synthesis. Even though FₒF₁ transports only protons across the membrane, nonequilibrium concentration gradients of other ions like K⁺ can contribute to the energy of the proton gradient by changing the ΔΨ if the ion is permeable to the membrane.\nIn this chemiosmotic coupling process the magnitude of the energy gradient, designated the proton-motive force (pmf or μ(H⁺)), is related to the trans-membrane concentration and charge differences in mV at 30°C by equation 1. The protonmotive force translates into more conventional energy terms because it is the sum of the free energy derived from the trans-membrane concentration difference (equation 2), and the electrical potential gradient generated by the trans-membrane concentration gradient of charged species (equation 3) where n is the charge on the ion (+1 for protons). This relationship simplifies to equation 4.", "label": "No"} {"text": "Electrical Risk Assessment Job Card (Australia) Mobile App\nThe Electrical Risk Assessment Job Card mobile app provides an electronic version of the typical risk assessment form used by electricians.\nHow does it work?\nUsing the electrician risk assessment form prior to starting electrical work can determine if there any risks or electrical hazards that may occur at a job site. The customizable app can be tailored to meet your needs and covers several different areas of electrical safety, including checking the scaffolding, ladders, in-ground conduits and more.\nInstead of carrying around paper forms as part of your risk management program, the app for electrical work can be accessed from any smartphone or tablet. Simply open the app at the job site, and you'll be prompted to check all the different areas of an electrical installation for potential health and safety issues. The results of the hazard analysis can be used when taking steps in risk reduction, which is necessary when keeping electrical contractors, project managers and others safe from typical workplace hazards. Using the electrician risk assessment form enables easy hazard identification when performing work on all types of electrical equipment.", "label": "No"} {"text": "The results are out: women really do have better memories than men, proclaim scientists at Cambridge University.\nAs part of their study, the researchers tested cognitive and physical performance of almost 4,500 men and women currently aged between 48 and 90 years.\nResults showed women making an average of 5.9 fewer errors on a specific test of memory than men.\n\"In this study, we used a measure of memory that is spatial and women consistently outperformed men. There are many possible explanations for this, including both neurobiological and environmental differences,\" The Telegraph quoted Dr Andrew Blackwell, Chief Scientific Officer at Cambridge Cognition, as saying.", "label": "No"} {"text": "December 14, 2009 in Utilities (F)\n[prMac.com] Seoul, ROK - Blue Wind has released Battery LED Pro 2.1, its battery monitoring solution for iPhone and iPod touch. As an iPhone user, I have tried tons of battery applications to maximize and squeeze out the power of my iPhone while on the go. It is significant for me to track the current status of my battery, given that I do not own any battery packs and I do not want my iPhone to die on me in case of emergency, and calls upon certain circumstances. I consistently open this application whenever I charge my iPhone to ensure the correct battery charging information, plus the alarm feature is extremely a must-have.\nThe interface is very stunning. It has cool LED animations on every icon. On top of the screen, it displays the model of your unit, whether it is an iPod touch or iPhone. Just under the model, there is a sizable battery indicator that has small blinking boxes of squares, which eventually fades to keep track of the existing level of the battery's life. There is also a percentage on the middle of it, and besides the battery indicator, you can press on the small little \"i\" which of course stands for information. Inside the information, you can fine-tune the health of your battery for a more precise reading.\nAnother great feature is the alarm to remind you that your battery is fully charged. You can choose to set it to none, sound only, and sound plus alarm. The alarm facet of this app certainly boosts it's value. With the sound plus alarm on, you can now put your worries behind about overcharging your device, and you can easily hear the crisp sound/alarm when your iPhone became fully charged.\nThis application gives you a comprehensive and meticulous done representation of your remaining battery life in standby time, telephone icon for talk time in 3G and 2G, a global icon which stands for internet in 3G and WiFi, video, a headphone icon for audio, and a controller icon for game with accurate hours and minutes.\n* iPhone or iPod touch 3.0 or later\nPricing and Availability:\nBattery LED Pro 2.1 is only $0.99 (USD) and available worldwide exclusively through the App Store in the Utilities category. There is also a free version available.\nBlue Wind has been established in 2005 as a monbile game company which is actively focusing on developing games and applications for iphone. We will continuously develop and service various applications for our customer's convenience and enjoyment. (C) 2005-2009 Blue Wind. All Rights Reserved. Apple, the Apple logo, iPhone and iPod are registered trademarks of Apple Inc. in the U.S. and/or other countries.", "label": "No"} {"text": "dewalt 16 hp air compressor heavy duty pancake electric combo home improvement cast wilson.\nindustrial manuals home user users manual format for sale global.\n10mm hose boost products silicone vacuum reinforced straight connector.\ndewalt frame nailer framing home depot canada.\ndewalt dc820b cordless drill with 3 batteries b battery and charger brush holder review.\nknipex pipe wrench previous wrenches s type.\nair conditioner foaming coil cleaner best web do it all germicidal aerosol condenser products frost king msds.\ntpms programmer tool smart sensor pro plus programming autel.\nrailroad tools track ballast rail tamping machine and supplies canada.\nklein electrical tool kit journeyman electrician piece insulated tools screwdriver set master.", "label": "No"} {"text": "Standard letter grades\nTotal contact hours\nIntroduces the language and process of the scientific method and scientific studies. Provides tools to evaluate scientific information, including identifying pseudoscience and unethical uses of science. Promotes critical evaluation of scientific data and effective science communication.\nCourse learning outcomes\n1. Describe the scientific process.\n2. Identify pseudoscience and types of bias.\n3. Describe types of scientific studies and their limitations.\n4. Evaluate scientific data, including graphs and images.\n5. Examine impacts of unethical applications of scientific information.\n1. Language of science; what science is and isn’t\n2. Scientific method and science as a process\n3. Identifying pseudoscience and types of bias in science using the fundamentals of information literacy\n4. Types of scientific studies\n5. Limitations of scientific studies, including non-representative samples, unrepeatability, and data collection errors\n6. Evaluating and interpreting graphs and images\n7. Applying critical scientific thinking to decision making\n8. Identifying impacts of applying science unethically\n9. Effective scientific communication\nRequired materials may include a course pack or textbook.\nGeneral education/Related instruction lists", "label": "No"} {"text": "ITM Web Conf.\nVolume 35, 2020International Forum “IT-Technologies for Engineering Education: New Trends and Implementing Experience” (ITEE-2019)\n|Number of page(s)||9|\n|Section||Engineering Education Technology Based on Using Digital Resources|\n|Published online||09 December 2020|\n- C. Pinto, S. Nicola, J. Mendonça, D. Velichová, Best teaching practices in the first year of the pilot implementation of the project DrIVE-MATH, Teaching Mathematics and its Applications: An International Journal of the IMA, 38 (3), pp. 154–166 (2019). https://doi.org/10.1093/teamat/hrz004. [CrossRef] [Google Scholar]\n- Yu.B. Melnikov, I.B. Khripunov, B.S. Chopovda, Algebraic approach to the strategy of project activity, Bulletin of USUE, 2 (53), pp. 115–123 (2014). [Google Scholar]\n- N.G. Ryzhkova, Professional training quality improvement on the basis of continuous testing system, LAP LAMBERT Academic Publishing, p. 333, ISBN: 978-3-65930682-2 (2013). [Google Scholar]\n- Y. Cui, F. Chen, A. Shiri, Y. Fan, Predictive analytic models of student success in higher education: A review of methodology, Information and Learning Science, 120 (34), pp. 208-227 (2019). DOI: 10.1108/ILS-10-2018-0104. [CrossRef] [Google Scholar]\n- D. Buenaño-Fernandez, W. Villegas-CH, S. Luján-Mora, The use of tools of data mining to decision making in engineering education A systematic mapping study, Computer Applications in Engineering Education, 27(3), pp. 744-758 (2019). https://doi.org/10.1002/cae.22100. [CrossRef] [Google Scholar]\n- C. Herodotou, B. Rienties, A. Boroowa, Z. Zdrahal, M. Hlosta, A large-scale implementation of predictive learning analytics in higher education: the teachers’ role and perspective, Educational Technology Research and Development, 67 (5), pp. 1273–1306 (2019). https://doi.org/10.1007/s11423-019-09685-0. [CrossRef] [Google Scholar]\n- S.S. Adji, S. Hamda, Utilization of learning analytic on measuring student participation in online learning, Journal of Physics: Conference Series 1280 (3), 032014 (2019), 6th International Seminar on Mathematics, Science, and Computer Science Education, MSCEIS 2018, 155271 (2019). DOI: 10.1088/17426596/1280/3/032014. [Google Scholar]\n- B.S. Horvitz, L.R. Garcia, R.G. Mitchell, Ch.D. Calhoun, An examination of instructional approaches in online technical education in community colleges, ONLINE LEARNING, 23(4), pp. 237–252 (2019). [CrossRef] [Google Scholar]\n- E. Acquila-Natale, S. Iglesias-Pradas, A. Hernández-García, J. Chaparro-Peláez, I. Rodríguez-Ruiz, MWDEX: A moodle workshop data Extractor, ACM International Conference Proceeding Series, 16 October 2019, pp. 297-303, 7th International Conference on Technological Ecosystems for Enhancing Multiculturality, TEEM 2019; Leon; Spain, 2019, 154355 (2019). [Google Scholar]\n- C. Giang, A. Piatti, F. Mondada, Heuristics for the development and evaluation of educational robotics systems, IEEE Transactions on Education 62(4), pp. 278-287, 8703426 (2019). DOI: 10.1109/TE.2019.2912351. [CrossRef] [Google Scholar]\n- Yu.I. Dimitrienko, E.A. Gubareva, Hierarchical neural network model for mathematical knowledge and software NOMOTEX for mathematical training of engineers, IOP Journal of Physics: Conference Series, 1141 (1), 012010 (2018). DOI: 10.1088/1742-6596/1141/1/012010. [Google Scholar]\n- Yu.I. Dimitrienko, E.A. Gubareva, A new technology of mathematical training of engineering personnel, based on a neural network model of knowledge, Educational innovation, 11, pp. 129–140 (2017). [Google Scholar]\n- Yu.B. Melnikov, M.D. Boyarskiy, M.D. Lokshin, The prospective economists and engineers forming skills for diversified activity assessment in the mathematics learning process, Contemporary education 4, pp. 74-90 (2018). DOI: 10.25136/24098736.2018.4.27930. – URL:http://nbpublish.com/library_read_article.php?id=27930 [Google Scholar]\n- N.J. van der Wal, A. Bakker, P. Drijvers, Teaching strategies to foster technomathematical literacies in an innovative mathematics course for future engineers, ZDM Mathematics Education 51, pp. 885–897 (2019). https://doi.org/10.1007/s11858019-01095-z. [CrossRef] [Google Scholar]\n- S.A. Helmi, Mohd-Yusof Khairiyah and Hisjam Muhammad, Enhancing the implementation of science, technology, engineering and mathematics (STEM) education in the 21st century: A simple and systematic guide, AIP Conference Proceedings 2097, 020001 (2019). https://doi.org/10.1063/1.5098172. [CrossRef] [Google Scholar]\n- S. Nieto-Isidro, H. Ramos, General versus specific recipients for online training courses: Evaluating an experience on basic mathematics for engineers, ACM International Conference Proceeding Series16 October 2019, pp. 756-762, 7th International Conference on Technological Ecosystems for Enhancing Multiculturality, TEEM 2019, 154355 (2019). https://doi.org/10.1145/3362789.3362892. [Google Scholar]\n- A. Vintere, B. Briede, Methodical background of competence-based mathematics education for students of information technologies specialties, Engineering for Rural Development 18, pp. 1947-1953 (2019). DOI: 10.22616/ERDev2019.18.N4. [Google Scholar]\n- P. Yakimov, Towards attractive STEM education by using open source hardware and software, IEEE 27th International Scientific Conference Electronics, ET 2018 – Proceedings 8549579 (2018). [Google Scholar]\n- S. Pohjolainen, T. Myllykoski, C. Mercat, S. Sosnovsky, Modern mathematics education for engineering curricula in europe: A Comparative Analysis of EU, Russia, Georgia and Armenia, pp. 1-196 (2018). https://doi.org/10.1007/978-3-319-71416-5. [Google Scholar]\n- C. Andersson, D. Logofatu, Using cultural heterogeneity to improve soft skills in engineering and computer science education, IEEE Global Engineering Education Conference, EDUCON 2018-April, pp. 191-195 (2018). [CrossRef] [Google Scholar]\n- J. Acebo, R. Rodríguez, Theoretical and methodological proposal on the development of critical thinking through mathematical modeling in the training of engineers, Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM 2019) (León, Spain, October 16-18, 2019), ACM, New York, NY, USA, pp. 941-948 (2019). https://doi.org/10.1145/3362789.3362828. [Google Scholar]\nCurrent usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.\nData correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.\nInitial download of the metrics may take a while.", "label": "No"} {"text": "Advertise your business here.\nPlace your ads.\nCoinfeeds: Crypto News Today, Prices, and Actionable Insights! Coinfeeds empowers crypto investors to enhance their decision-making through the power of data. Get today's crypto news, prices, and more\ninsights here. Coinfeeds has empowered our platform to effectively navigate through the vast amount of information, highlighting the most significant insights in the crypto world.\nCoinfeeds Ai Features\n• Coinfeeds transforms the complex world of cryptocurrency into simple, digestible insights for everyone.\n• Get the scoop on the latest news for a specific coin\n• Explain technical concepts\n• Get the latest price action of any coin\nTradytics retail trading, reimagement, and product identification involve extensive use of AI and machine learning by looking at vast amounts of historical data and training algorithms to identify patterns.\nOption Alpha calculates probabilities for millions of potential option positions using live market data, so you can find new ideas without the guesswork.\nBeeBee AI is an AI platform that provides in-depth financial analysis of public companies.\nBlackhedge AI is a mobile AI-powered investing app that helps you make smarter investments using the power of AI.\nPotato AI: AI-Generated Stock and Crypto Baskets! Build your investment ideas with Potato AI.\nCreate a business website in 30 seconds. Durable AI builds a website. Images, copy, fonts, colours, and lead generation\nUptrends AI is an advanced tool designed to help users stay ahead of trends and navigate the stock market effectively.\nGenuinely valuable relationship insights Boost relationship knowledge with deep, granular, and actionable intelligence.\nUnderwrite.ai applies advances in artificial intelligence to provide lenders with non-linear, dynamic models of credit risk.\nPowerful AI for Better Lending More approvals, less risk\nSelf-learning AI for credit decisions Credit decisioning engine powered by alternate data and AI models.\nEvery month more than 20k people search, compare, and hire agencies like yours on AI Bucket.", "label": "No"} {"text": "Egress Switch allows you to access your data securely in multiple ways;\nWeb based access – the default way to open a Switch secure email is via a web browser which requires no download or installation of software.\nDesktop applications – if you want to integrate Switch in to your existing email client or systems for a more seamless and simplified user experience our desktop applications are free to download and simple to install.\nMobile applications – as workforces become more mobile it is important that you can access information securely where ever you are. Our mobile applications integrate seamlessly with multiple mobile devices including BlackBerry, iPad/iPhone and Android.\nWhichever approach you want to take, Switch integration makes set up easy allowing you to start sharing information securely from day one.", "label": "No"} {"text": "If we want a livable climate for future generations, we need to slow, stop, and reverse the rise in global temperatures. To do that, we need to stop burning fossil fuels for energy.\nTo do that, we need to generate lots of carbon-free electricity and get as many of our energy uses as possible (including transportation and industry) hooked up to the electricity grid. Electrify everything!\nWe need a greener grid. But that’s not all.\nClick here to read more from Vox.", "label": "No"} {"text": "Genetic engineering is a groundbreaking field that has revolutionized the bioscience industry. It involves the manipulation and modification of an organism’s genetic material, allowing researchers to make precise changes to its DNA. This innovative technique has opened up a world of possibilities in various areas of scientific research, leading to remarkable advancements and progress.\nOne of the significant advantages of genetic engineering is the ability to create crops with improved traits. Through genetic modification, scientists can introduce specific genes into plants, enabling them to resist diseases, pests, and adverse environmental conditions. This advancement in engineering has the potential to increase crop yields, reduce the need for chemical pesticides, and promote sustainable agriculture.\nFurthermore, genetic engineering has proven to be instrumental in the medical field. Scientists have successfully used this technique to develop novel and effective treatments for diseases that were previously incurable. By modifying the genetic material of cells, researchers can enhance their therapeutic properties, making them more efficient in targeting and fighting diseases. This has the potential to revolutionize the way we approach medicine and significantly improve patient outcomes.\nThe Benefits of Genetic Engineering in Promoting Scientific Advancements\nGenetic engineering has revolutionized the field of scientific research by supporting innovation and promoting advancements. Through the modification and manipulation of genetic material, scientists have been able to make significant progress in various areas of study.\nOne of the key benefits of genetic engineering is its ability to support the advancement of research. By manipulating genes, scientists can create genetically modified organisms (GMOs) that can be used in experiments to gain a better understanding of certain diseases or conditions. This has led to major breakthroughs in understanding the genetic basis of diseases such as cancer, Alzheimer’s, and genetic disorders.\nGenetic engineering also allows scientists to study the effects of specific genes on an organism’s phenotype. By altering genes, researchers can observe how certain traits are expressed and determine their role in various biological processes. This information is crucial in identifying potential treatments and developing targeted therapies for a wide range of diseases.\nIn addition, genetic engineering has allowed for the development of new technologies and tools that aid in scientific research. For example, the creation of genetically modified animals has provided researchers with valuable models for studying human diseases. These animal models can help accelerate the development of new drugs and treatments, as well as improve our understanding of complex biological processes.\nFurthermore, genetic engineering has facilitated the progress of innovation in various fields of science. For instance, it has played a significant role in the production of genetically modified crops, which has greatly increased agricultural productivity and food security. By introducing genes that confer resistance to pests or tolerance to harsh environmental conditions, scientists have been able to create crops that are more resilient and have higher yields.\nIn conclusion, genetic engineering offers numerous advantages in promoting scientific advancements. From supporting research and enabling the study of gene function to driving innovation in fields like agriculture, genetic engineering has revolutionized the way we approach scientific discovery. With continued progress in this field, we can expect even greater breakthroughs and advancements in the future.\nImproved Agricultural Productivity\nGenetic engineering has made significant progress in improving agricultural productivity. Through the modification of plants and animals, scientists have been able to develop innovative solutions to enhance crop yields and livestock production.\nOne of the key advancements is the creation of genetically engineered crops that are resistant to pests, diseases, and environmental stressors. By introducing specific genes into plants, scientists have developed crops that can withstand harsh conditions, such as drought or extreme temperatures, and still produce high yields.\nAdditionally, genetic engineering has led to the development of crops with enhanced nutritional value. Through genetic modifications, scientists have been able to increase the amount of essential vitamins and minerals in crops, making them more beneficial for human consumption.\nFurthermore, genetic engineering has supported the advancement of sustainable agriculture practices. Scientists have engineered crops that require fewer pesticides and herbicides, reducing the environmental impact of farming. This not only promotes a healthier ecosystem but also minimizes the exposure of farmers and consumers to harmful chemicals.\nBioscience companies and research institutions continue to support genetic engineering initiatives aimed at improving agricultural productivity. Through ongoing research and development, new genetic modifications are being discovered and implemented to further enhance crop yields and increase food production.\n- Genetic engineering has revolutionized agriculture by promoting progress and innovation in the field of bioscience.\n- With continued support for genetic engineering, scientists can continue to improve agricultural productivity and address global food security challenges.\n- The advancements in genetic engineering have the potential to transform agriculture and contribute to a more sustainable and efficient food production system.\nEnhanced Disease Resistance in Crops\nThe advancement of genetic engineering has greatly contributed to the innovation and progress in the field of bioscience. One area where genetic modification has shown immense potential is in enhancing disease resistance in crops.\nCrops are vulnerable to various diseases caused by bacteria, fungi, viruses, and pests. These diseases can have a devastating impact on crop yield and quality, leading to significant economic losses and food insecurity. Traditional methods of disease control, such as crop rotation and the use of pesticides, have their limitations and may not always be effective.\nGenetic engineering offers a solution to this challenge by allowing scientists to introduce specific genes into crop plants that confer resistance to diseases. This involves identifying and isolating genes from other organisms that encode traits of interest, such as resistance to a particular disease, and then inserting those genes into the DNA of the crop plant.\nBy introducing disease-resistance genes, scientists can enhance the natural defense mechanisms of crop plants, making them more resilient to diseases. This can reduce the need for chemical pesticides and other environmentally harmful methods of disease control, thereby reducing the negative impact on the environment.\nFurthermore, genetic engineering enables researchers to develop crop varieties that are resistant to multiple diseases, offering a comprehensive and sustainable solution to disease management. This could potentially revolutionize agriculture by ensuring stable crop yields and improving food security.\nOverall, the engineering of enhanced disease resistance in crops through genetic modification represents a significant advancement in the field of bioscience. By utilizing the tools of genetic engineering, scientists can support the development of disease-resistant crop varieties, contributing to the progress and innovation in the agricultural sector.\nIncreased Food Nutritional Value\nGenetic engineering is an innovation that has allowed scientists to make significant progress in enhancing the nutritional value of food. Through extensive research and modification of crops, genetic engineering has enabled the production of crops with increased levels of essential nutrients.\nBy utilizing techniques such as gene editing and genetic modification, scientists have been able to engineer crops that have higher levels of vitamins, minerals, and other beneficial compounds. These advancements in bioscience have the potential to support global efforts to combat malnutrition and improve public health.\nFor example, genetically modified crops have been developed to have increased levels of essential nutrients like vitamin A, iron, and protein. This is particularly important in developing countries where nutrient deficiencies are prevalent, as these crops have the potential to provide a more affordable and accessible source of vital nutrients.\nThe support and advancement of genetic engineering in improving the nutritional value of food open up new possibilities for addressing food security and improving human health. The ability to enhance the nutritional content of crops through genetic engineering can contribute to a diverse and sustainable food supply.\nThe progress made in increasing food nutritional value through genetic engineering not only benefits human health but also has the potential to positively impact the environment. By engineering crops to be more nutrient-dense, less land and resources are required to meet the nutritional needs of the population, reducing the pressure on ecosystems and promoting sustainable agricultural practices.\nIn conclusion, genetic engineering has the ability to greatly support innovation in the field of science, and one area where it has shown significant promise is in increasing the nutritional value of food. Through research and modification, genetic engineering has allowed for the production of crops with enhanced levels of essential nutrients. This advancement has the potential to address global issues of malnutrition and food security while promoting sustainable agricultural practices.\nEfficient Production of Medicines\nGenetic engineering has revolutionized the field of medicine by allowing for more efficient production of medicines. Through extensive research and advancements in biotechnology, scientists have been able to harness the power of genetic engineering to create drugs and therapies that can treat various diseases and conditions.\nThe use of genetic engineering in the production of medicines has greatly improved the process of drug development and manufacturing. By manipulating the genetic makeup of living organisms, researchers are able to produce specific proteins and compounds that are essential for the development of drugs. This enables a more targeted and efficient approach to drug production, resulting in higher yields and reduced costs.\nFurthermore, genetic engineering in the field of bioscience has opened up new possibilities for the modification of organisms to produce medicines. Through the introduction of genes that encode for specific therapeutic proteins, scientists are able to create organisms that can produce these proteins in large quantities. This not only increases the availability of medicines but also reduces the reliance on traditional methods of drug production.\nThe use of genetic engineering in medicine also supports innovation and progress in the field. By allowing for the modification of genetic material, scientists can explore new pathways and develop novel treatments for diseases that were previously untreatable. This opens up new avenues for research and discovery, leading to innovative breakthroughs in the field of medicine.\n|Advantages of Genetic Engineering\n|Supporting Innovation in Science\n|Efficient Production of Medicines\n|Improved Crop Yield and Quality\n|Enhanced Disease Resistance\n|Beneficial for the Environment\n|Improved Nutritional Content\n|Minimizing Losses in Agriculture\nDevelopment of Disease-resistant Livestock\nThe progress in genetic engineering and bioscience research has led to significant advancements in the field of animal agriculture. One area where genetic modification has shown promising results is in the development of disease-resistant livestock.\nAdvantages of Genetic Engineering in Livestock\nGenetic engineering allows scientists to introduce specific genes into the DNA of animals, enhancing their natural defenses against diseases. By modifying the genetic makeup of livestock, researchers can create animals that are resistant to diseases that often lead to significant losses in the agriculture industry.\nThrough careful genetic engineering, scientists have been able to develop livestock that are resistant to diseases such as foot-and-mouth disease, African swine fever, and avian influenza. These diseases have been known to cause devastating outbreaks, resulting in massive economic losses and the need for extensive culling of infected animals.\nInnovation in Disease-resistant Livestock\nOne of the innovative approaches in developing disease-resistant livestock is through the use of gene editing techniques such as CRISPR-Cas9. This technology allows scientists to make precise modifications to an animal’s DNA, enabling them to remove or replace genes associated with susceptibility to diseases.\nBy targeting specific genes involved in disease susceptibility, researchers can effectively enhance an animal’s immune system and improve its resistance to various pathogens. This breakthrough in genetic engineering offers a more precise and efficient way to develop disease-resistant livestock compared to traditional breeding methods.\n|Benefits of Disease-resistant Livestock\n|1. Reduced disease outbreaks and associated economic losses.\n|2. Improved animal welfare by minimizing the need for large-scale culling.\n|3. Enhanced food security and sustainability by ensuring a stable supply of healthy livestock.\n|4. Decreased reliance on antibiotics and other medications, reducing the risk of antibiotic resistance.\nIn conclusion, the development of disease-resistant livestock through genetic engineering and innovative techniques has the potential to revolutionize the agriculture industry. By creating animals that are naturally resistant to diseases, we can protect the livelihoods of farmers, ensure a sustainable food supply, and minimize the use of antibiotics in animal production.\nReduction of Pesticide Usage\nThe advancement of genetic engineering has brought about several benefits, including the reduction of pesticide usage in agriculture. Through the innovation and progress made in the field of biotechnology, scientists have been able to develop genetically modified crops that are resistant to pests and diseases.\nThis modification involves the insertion of specific genes into the plants, which allows them to produce toxins that can kill or deter pests. By incorporating natural defense mechanisms into the crops, genetic engineering reduces the need for external pesticide applications. This not only minimizes the harm caused by chemical pesticides to the environment but also lowers the health risks associated with their usage.\nFurthermore, the support for genetic engineering in agriculture has led to the development of crops that are more resilient to environmental stressors. By genetically engineering plants to withstand harsh conditions such as drought, scientists have created crops that require minimal pesticide usage to thrive.\nGenetic engineering also provides an opportunity for targeted pest control. Scientists can modify crops to attract beneficial insects that prey on pests, thereby reducing the need for chemical pesticides. This approach, known as biocontrol, promotes a more sustainable and eco-friendly method of pest management.\nIn conclusion, genetic engineering has played a pivotal role in reducing pesticide usage in agriculture. The continuous advancement in the field of bioscience has enabled scientists to develop genetically modified crops that are resistant to pests and diseases, minimizing the need for external pesticide applications. Moreover, genetic engineering offers the potential for targeted pest control and the creation of crops that are more resilient to environmental stressors. By supporting innovation in genetic engineering, we can further progress towards sustainable and efficient agricultural practices.\nCreation of Environmentally-friendly Biofuels\nThe field of genetic engineering has made significant advancements in the creation of environmentally-friendly biofuels, promoting innovation and progress in the bioscience industry. Through genetic modification, scientists have been able to engineer microorganisms and crops that produce biofuels with reduced carbon emissions and minimal impact on the environment.\nOne of the key advantages of genetic engineering in the production of biofuels is the ability to enhance the efficiency of fuel production. By modifying the metabolic pathways of microorganisms, researchers have been able to create strains that convert renewable resources, such as plant biomass or agricultural waste, into usable biofuels. This engineering process allows for the production of biofuels that have a higher energy yield and lower production costs, making them a viable alternative to fossil fuels.\nIn addition to improving the efficiency of biofuel production, genetic engineering also enables the development of biofuels with improved properties. Scientists can manipulate the genetic makeup of crops to enhance their oil content or alter the composition of fatty acids, resulting in biofuels that have better combustion characteristics and are less harmful to engines. This innovation not only benefits the environment by reducing air pollution but also supports the advancement of renewable energy technologies.\nThe support for genetic engineering in the creation of environmentally-friendly biofuels extends beyond fuel production. Through advancements in genetic engineering, researchers have been able to enhance the growth and productivity of biofuel crops, such as switchgrass and algae. These modifications allow for increased yield and reduced land usage, making biofuels a more sustainable and economically viable energy source.\n|Advantages of Genetic Engineering in Biofuel Production\n|Increased efficiency in fuel production\n|Improved properties of biofuels\n|Enhanced growth and productivity of biofuel crops\nIn conclusion, the engineering of environmentally-friendly biofuels through genetic modification supports innovation and progress in the field of bioscience. By harnessing the power of genetic engineering, researchers are able to create biofuels that are more efficient, have improved properties, and contribute to the development of renewable energy technologies. This advancement plays a crucial role in promoting a cleaner and more sustainable future.\nEnhanced Bioremediation Techniques\nEnhanced Bioremediation Techniques is a field that encompasses a wide range of research and innovation in the field of biotechnology. These techniques are focused on utilizing genetic modification to enhance the capabilities of microorganisms in order to improve their ability to degrade and remove pollutants from the environment.\nGenetic engineering plays a crucial role in the advancement of bioremediation techniques. By altering the genetic makeup of microorganisms, scientists can introduce new metabolic pathways and enzymes that enable them to break down complex contaminants more efficiently. This progress in genetic engineering has supported the development of innovative bioremediation strategies.\nThe modification of microorganisms through genetic engineering offers several advantages in the field of bioremediation. Firstly, it allows for the targeted removal of specific pollutants, as scientists can tailor the genetic modifications to the particular contaminant they wish to degrade. This targeted approach increases the efficiency and effectiveness of the bioremediation process.\nFurthermore, genetic engineering can improve the tolerance of microorganisms to harsh environmental conditions, such as high temperatures or high concentrations of pollutants. This enhanced tolerance ensures that the microorganisms can survive and thrive in contaminated environments, thereby increasing the overall success of bioremediation efforts.\nThe advancement of enhanced bioremediation techniques has been a significant breakthrough in the field of bioscience. By harnessing the power of genetic engineering, researchers have paved the way for more effective and sustainable solutions for environmental remediation. The support and promotion of further research and innovation in this field are crucial for continued progress in bioremediation and the protection of our environment.\nReduction of Water Consumption in Agriculture\nGenetic modification has sparked a wave of research and innovation in the field of agriculture. One area where genetic engineering has made significant progress is in the reduction of water consumption in farming.\nFarmers have long struggled with water scarcity and the need to efficiently utilize this precious resource. Through genetic research and the development of drought-tolerant crops, scientists have been able to create plants that require less water for growth. These advancements in genetic engineering have led to a significant reduction in water consumption in agriculture, ultimately benefiting farmers and the environment.\nDrought-tolerant crops, created through genetic engineering, have the ability to survive and thrive in conditions with limited water availability. They possess traits that enable them to conserve water more efficiently, such as deeper root systems that can reach water stored deep within the soil. These crops require less irrigation, resulting in reduced use of precious water resources.\nFurthermore, genetic advancement has enabled scientists to develop crops that can regulate their own water usage. These crops have the ability to close their stomata, small openings on their leaves, during periods of water scarcity. By doing so, they reduce the amount of water lost through evaporation, minimizing water wastage.\nThe reduction of water consumption in agriculture through genetic engineering not only benefits farmers but also has positive implications for the environment. By conserving water resources, farmers can contribute to the sustainability of water ecosystems and prevent the depletion of groundwater sources. This not only leads to more efficient agricultural practices but also helps to address water scarcity issues on a global scale.\nIn conclusion, the support and innovation in genetic engineering have resulted in significant advancements in reducing water consumption in agriculture. These advancements have not only helped farmers mitigate the challenges of water scarcity but have also contributed to the sustainability of water resources and the overall environmental well-being.\nAccelerated Research in Biomedical Sciences\nThe field of biomedical sciences has experienced significant advancement and innovation thanks to genetic engineering. By allowing scientists to modify and manipulate genetic material, genetic engineering has opened up new avenues of progress in research and development within the field.\nWith the support of genetic engineering, researchers are able to explore the intricate workings of biological systems and gain a deeper understanding of how genes and proteins interact. This knowledge is critical for developing new treatments and therapies for a wide range of diseases and conditions.\nGenetic engineering has revolutionized the field of bioscience, enabling researchers to study the functions of specific genes and their effects on human health. By creating transgenic animals and genetically modified organisms, scientists can better understand the role of certain genes in disease development and progression.\nThe ability to make precise modifications to the genetic makeup of organisms also allows researchers to accelerate the pace of their studies. Through techniques such as gene editing using CRISPR-Cas9, scientists can quickly and efficiently introduce specific genetic changes in cells and organisms, saving time and resources in the research process.\nThe support provided by genetic engineering has led to groundbreaking discoveries in the field of biomedical sciences. For example, the development of genetically engineered insulin has revolutionized the treatment of diabetes, improving the lives of millions of people worldwide.\nIn conclusion, genetic engineering plays a vital role in supporting and accelerating research in biomedical sciences. By providing scientists with the ability to modify genetic material and investigate its effects, genetic engineering enables progress and innovation in the field, ultimately leading to the development of new treatments and therapies for human health.\nTargeted Gene Therapy for Genetic Disorders\nResearch in genetic engineering has led to significant advancements in targeted gene therapy for genetic disorders. This innovative approach provides support for the modification and correction of specific genes associated with genetic disorders, offering promising opportunities for patients and their families.\nTargeted gene therapy utilizes the principles of genetic engineering to introduce or replace genes within an individual’s DNA. By targeting specific genes responsible for genetic disorders, scientists can aim to correct or mitigate the effects of these conditions. This progress in genetic engineering has the potential to revolutionize the treatment of various genetic disorders.\nOne significant advantage of targeted gene therapy is its ability to provide a tailored approach to treating genetic disorders. Instead of using generalized treatments or medications, targeted gene therapy focuses on correcting the specific genetic mutation causing the disorder. This precision allows for more effective treatment and potentially fewer side effects.\nFurthermore, targeted gene therapy opens doors for innovative research and development in the field of genetic engineering. As scientists gain a better understanding of specific genetic disorders and the mechanisms behind them, they can develop new strategies and techniques for gene modification. This ongoing innovation contributes to the overall progress in genetic engineering and expands future possibilities for treating genetic disorders.\nOverall, targeted gene therapy represents a significant advancement in the field of genetic engineering. With its ability to specifically address the underlying genetic causes of disorders, it offers hope for improved treatments and outcomes for individuals affected by genetic conditions. Continued support and investment in research and development in gene therapy are crucial for furthering innovation and advancing the field of genetic engineering.\nPrevention of Inherited Diseases\nThe field of bioscience has seen significant advancement in research and progress in genetic engineering, leading to innovative methods for preventing inherited diseases. Through genetic modification, scientists can now identify and eliminate certain genetic abnormalities that can lead to the development of diseases.\nIdentification of Genetic Abnormalities\nThanks to genetic engineering, experts can now identify specific genes associated with inherited diseases. This helps to diagnose individuals who carry the genetic mutations and are at risk of passing the diseases to their offspring. By understanding which genes are responsible for certain conditions, scientists can develop targeted interventions and preventive measures.\nEradication of Genetic Abnormalities\nGenetic engineering enables the modification of genes to eliminate or correct genetic abnormalities. This can be done through techniques such as gene editing, where the faulty genes are replaced or repaired. By targeting and modifying the specific genes responsible for inherited diseases, scientists can prevent the transmission of these diseases to future generations.\n|Supporting Innovation in Science\n|– Prevention of Inherited Diseases\nIn conclusion, the advancements in genetic engineering have provided the scientific community with powerful tools for preventing inherited diseases. Through the identification and elimination of genetic abnormalities, researchers can support innovation and progress in bioscience, ultimately improving the health and well-being of individuals and future generations.\nInnovative Approaches in Cancer Treatment\nAdvancements in genetic engineering have opened up new possibilities in cancer treatment. Through the modification of genes and genetic material, scientists and researchers are able to develop innovative approaches to combat this deadly disease. These innovative approaches support the progress of bioscience and offer new hope for cancer patients.\nOne of the innovative approaches in cancer treatment is the use of targeted therapies. These therapies focus on specific genetic alterations within cancer cells, allowing for more precise and effective treatment. By targeting the specific genetic modifications that drive tumor growth, targeted therapies can help to stop the progression of cancer and improve patient outcomes.\nAnother innovative approach in cancer treatment is immunotherapy. This approach harnesses the power of the immune system to target and destroy cancer cells. By enhancing the body’s natural ability to recognize and eliminate cancer cells, immunotherapy has shown promising results in various types of cancer. Genetic engineering plays a crucial role in the development of immunotherapeutic agents, allowing for the modification and optimization of immune cells to better target and fight cancer.\nIn conclusion, the engineering of genetic modifications in cancer treatment represents a significant advancement in the field of bioscience. These innovations offer new hope for cancer patients and have the potential to revolutionize the way we approach cancer treatment. Through ongoing research and innovation, genetic engineering continues to support the progress and advancement of cancer therapies.\nDevelopment of Disease Diagnostic Methods\nThe field of bioscience has seen significant progress in the development of disease diagnostic methods, thanks to the modification and engineering of genetic materials. Researchers have been able to make significant advancements in the understanding and detection of various diseases, leading to more accurate and efficient diagnostic techniques.\nGenetic engineering has played a crucial role in this innovation. By manipulating the genetic makeup of organisms, scientists have been able to identify specific genes associated with certain diseases. This knowledge has allowed them to create diagnostic tests that can detect these genes, enabling early and accurate diagnosis of diseases such as cancer, genetic disorders, and infectious diseases.\nFurthermore, the use of genetic engineering has allowed for the development of novel diagnostic tools. For example, researchers have engineered biosensors that can detect disease-specific biomarkers in bodily fluids, providing a non-invasive and rapid method of diagnosing diseases. These biosensors have the potential to revolutionize disease diagnosis and monitoring, making it more accessible and cost-effective.\nThe continuous research and innovation in genetic engineering have also led to the discovery of new diagnostic markers and techniques. Scientists are constantly advancing their understanding of the genetic basis of diseases, enabling the development of more specific and sensitive diagnostic methods. This progress opens up possibilities for personalized medicine, where treatments can be tailored based on an individual’s genetic profile.\nIn conclusion, the development of disease diagnostic methods has been greatly supported by the advancements in genetic engineering. The ability to modify and manipulate genetic materials has paved the way for innovative and accurate diagnostic techniques, leading to early detection and improved treatment outcomes. Continued research and advancements in genetic engineering will likely lead to further progress in disease diagnosis and personalized medicine.\nCreation of Transgenic Animals for Medical Research\nOne of the most significant advancements in medical research has been the creation of transgenic animals through genetic engineering. Transgenic animals are organisms that have had their genetic material modified to include genes from another species. This innovation has paved the way for groundbreaking discoveries and a better understanding of various diseases and conditions.\nThe modification of animal DNA allows scientists to study the effects of specific genes, leading to a deeper comprehension of biological processes and the development of potential treatments. Transgenic animals serve as living models for research, providing valuable insights and data that can be applied to human health.\nGenetic engineering has brought about a new era of progress and innovation in medical research. By introducing specific genes into animals, scientists can mimic human diseases and conditions, enabling them to study the underlying mechanisms and test novel therapeutic approaches. This technology has revolutionized the field by accelerating the pace of discovery and allowing for more targeted and precise experimentation.\nThe creation of transgenic animals also offers a more ethical alternative to traditional research methods. By using animals that have been genetically engineered to mimic specific human conditions, scientists can reduce the number of animals needed for experimentation, minimizing overall animal suffering while maximizing the scientific value of each study.\nFurthermore, the creation of transgenic animals plays a crucial role in drug development. These animals can be used to test the efficacy and safety of potential medications, helping to identify promising compounds and speeding up the drug discovery process. This not only saves time and resources but also increases the likelihood of finding effective treatments for various diseases.\nIn conclusion, the creation of transgenic animals through genetic engineering has provided immense support to medical research. This innovative approach has led to significant advancements in our understanding of diseases and conditions, as well as the development of new therapies. By utilizing transgenic animals, scientists can conduct more targeted and ethical research, ultimately contributing to the progress and improvement of human health.\nFacilitated Study of Cellular Processes\nThe progress and advancement in genetic engineering have greatly supported the study of cellular processes. Through genetic modification and engineering, researchers are able to manipulate and alter genes in organisms, facilitating the analysis of cellular processes and their effects.\nGenetic engineering has provided scientists with tools and techniques to understand the intricate workings of cells and how they function. By introducing specific genetic modifications, researchers are able to study the role of individual genes and their impact on cellular processes. This knowledge is crucial for advancements in bioscience, as it allows scientists to identify key genes and pathways involved in important cellular functions.\nFurthermore, genetic engineering enables researchers to create models that mimic various disease conditions, allowing for better investigation and understanding of cellular processes underlying these diseases. Such models can be used to test potential treatments and therapies, leading to the development of more effective and targeted approaches.\nOverall, genetic engineering has revolutionized the field of cellular research by providing scientists with powerful tools and techniques to study and understand cellular processes. This progress and support from genetic engineering have greatly enhanced our knowledge of biology and have the potential to drive further advancements in bioscience.\nEnhanced Reproductive Technology in Livestock\nResearch and advancement in genetic engineering have brought about significant innovation in the field of bioscience. One area that has seen notable progress is the development of enhanced reproductive technology in livestock. Through the modification of genetic material, scientists have been able to enhance the reproductive capabilities of animals, leading to improved breeding outcomes and increased productivity.\nGenetic modification allows for the selection and alteration of specific traits in livestock, such as increased milk production in dairy cows or improved meat quality in pigs. By introducing favorable traits into an animal’s genetic makeup, breeders can ensure that desirable traits are passed down to future generations, creating a more efficient and sustainable agricultural system.\nThis innovation in reproductive technology has also enabled the preservation and conservation of endangered livestock species. By utilizing genetic engineering techniques, scientists can collect and store genetic material from endangered animals, ensuring their survival even in the face of extinction threats. This not only helps to maintain biodiversity but also provides a valuable resource for future research and conservation efforts.\nThe progress in enhanced reproductive technology in livestock has garnered significant support from the scientific community and agricultural industry. The ability to manipulate and improve the genetic traits of animals offers immense potential for increasing food production, improving animal welfare, and addressing environmental challenges associated with traditional farming methods.\nOverall, the advancements in genetic engineering and enhanced reproductive technology in livestock have revolutionized the agricultural sector. Through these innovative techniques, breeders and scientists are able to create more productive and sustainable livestock populations, supporting the ever-growing global demand for food while ensuring the welfare of animals and the environment.\nImprovement of Crop Yield and Quality\nThrough the innovation and advancement of genetic engineering, significant progress has been made in the modification of crop yield and quality. This field of genetic engineering, also known as bioscience, has supported the development of various techniques and technologies that have revolutionized agriculture as we know it.\nOne of the major benefits of genetic engineering in crop improvement is the ability to modify the genetic makeup of plants to enhance their yield. Scientists can introduce specific traits into crops to make them more resistant to pests, diseases, and environmental stressors, thus increasing their overall productivity. This advancement in genetic engineering has allowed farmers to produce higher quantities of crops, ensuring food security and meeting the ever-increasing demand for agricultural products.\nFurthermore, genetic engineering has also played a crucial role in enhancing the quality of crops. By manipulating the genes responsible for nutritional content, taste, and appearance, scientists can create crops with improved nutritional value and enhanced flavors. For example, genetically modified tomatoes can be developed to have a higher concentration of vitamins or to be more resistant to rotting, leading to healthier and longer-lasting produce.\nThe Role of Genetic Engineering Techniques\nVarious genetic engineering techniques are employed to achieve these improvements in crop yield and quality. Gene editing tools, such as CRISPR-Cas9, allow scientists to precisely modify specific genes in a plant’s DNA, resulting in desired traits. This targeted approach enables more accurate and efficient genetic modifications, reducing the time and resources required for crop improvement.\nThe Support of Genetic Engineering in Agriculture\nThe field of genetic engineering in agriculture has received significant support from the scientific community, governments, and agricultural organizations. This support has led to increased investment in research and development, allowing for the continuous advancement of genetic engineering techniques and the subsequent improvement of crop yield and quality. The potential benefits of genetic engineering in crop improvement are vast, and ongoing research in this field holds promise for even greater advancements in the future.\nCreation of Drought-tolerant Crops\nOne of the significant advantages of genetic engineering is the support it provides to the innovation and modification of crops to make them more resilient to adverse environmental conditions, such as drought. This groundbreaking progress in bioscience has the potential to revolutionize agriculture and address the challenges posed by climate change.\nEngineering Drought-tolerant Traits\nThe field of genetic engineering enables researchers to identify and manipulate genes that are responsible for drought tolerance in plants. By understanding the genetic mechanisms behind this trait, scientists can introduce these genes into crops, allowing them to survive and thrive in arid regions. The modification of crops through genetic engineering empowers farmers to cultivate crops in areas that were previously unsuitable for agriculture due to water scarcity.\nAdvancement in Water Use Efficiency\nGenetic engineering also paves the way for advancements in water use efficiency in crops. By incorporating genes that regulate the plant’s water use and response mechanisms, researchers can create crops that require less water to grow while maintaining high yields. This not only reduces the strain on water resources but also provides farmers with the ability to cultivate crops in regions with limited access to water.\nFurthermore, the creation of drought-tolerant crops through genetic engineering reduces the need for chemical inputs, such as pesticides and fertilizers, as these crops are inherently more resistant to stressors. This aspect of genetic engineering contributes to sustainable and environmentally-friendly agriculture practices.\nIn conclusion, genetic engineering plays a crucial role in the advancement and progress of agriculture by enabling the creation of drought-tolerant crops. Through research and innovation in this field, scientists can contribute to the development of sustainable and resilient farming systems, ensuring food security in the face of climate change and water scarcity.\nIncreased Shelf Life of Fruits and Vegetables\nOne of the key advantages of genetic engineering is its ability to increase the shelf life of fruits and vegetables. Through advancements in research and modification techniques, scientists and engineers in the field of genetic engineering have been able to extend the freshness and quality of produce, benefiting both consumers and farmers.\nGenetic engineering involves the manipulation of an organism’s genetic material through various techniques, such as gene insertion or modification. In the case of fruits and vegetables, researchers have identified specific genes responsible for ripening and spoilage and have been able to engineer these genes to either slow down the ripening process or enhance natural defenses against spoilage.\nBy introducing beneficial traits into the genetic makeup of fruits and vegetables, genetic engineering offers the potential to significantly prolong their shelf life. This can result in reduced food waste and increased availability of fresh produce, both locally and globally.\nThe engineering and modification of fruits and vegetables in the field of bioscience has shown promising results. For example, genetically engineered tomatoes have been developed with delayed ripening traits, allowing them to stay firm and fresh for longer periods. Similarly, crops like bananas and apples can be engineered to resist fungal pathogens, prolonging their shelf life and reducing the need for chemical treatments.\nSupporters of genetic engineering argue that advancements in this field are crucial for the progress of agriculture and food production. As the global population continues to grow, the demand for food will increase, placing greater pressure on farmers to produce more and reduce waste. Genetic engineering provides a viable solution to addressing these challenges.\nHowever, it is important to consider the potential ethical and environmental implications of genetic engineering. Critics argue that tampering with the genetic makeup of organisms may have unintended consequences and could disrupt natural ecosystems. Ongoing research and regulation are necessary to ensure the responsible and safe use of genetic engineering techniques.\nIn conclusion, the increased shelf life of fruits and vegetables is a significant advantage brought about by the advancements in genetic engineering. The modification and engineering of produce through genetic techniques offer the potential to reduce food waste, increase availability, and support sustainable agricultural practices.\nEnhancement of Flavor Profiles in Food\nThe advancement of genetic engineering has provided researchers with the tools to modify and enhance flavor profiles in food. Through the application of bioscience and engineering, scientists are able to make genetic modifications that result in the improved taste and aroma of various food products.\nGenetic research has revealed the specific genes responsible for certain flavors and aromas in food. By identifying these genes, scientists are able to manipulate them to achieve desired changes in flavor profiles. For example, they can enhance the sweetness of fruits, increase the umami taste in vegetables, or improve the aroma of herbs and spices.\nThis innovation in genetic engineering allows for the creation of new and unique flavor combinations that were previously unattainable through traditional breeding methods. By introducing specific genes into food crops, researchers can create novel flavors that cater to specific consumer preferences and market demands.\nThe modification of flavor profiles in food not only benefits the culinary industry but also improves the overall eating experience for consumers. By enhancing the taste and aroma of foods, genetic engineering contributes to the enjoyment of meals and encourages a healthier and more diverse diet.\nIn conclusion, the progress in genetic engineering and bioscience brings forth an exciting era of innovation and advancement in the food industry. The ability to modify flavor profiles in food through genetic research and engineering opens up new possibilities for creating unique and appealing products that cater to consumer preferences. With continued research and development in this field, we can expect further advancements in the enhancement of flavor profiles, contributing to a more flavorful and enjoyable culinary experience.\nCreation of Allergen-free Foods\nThe genetic engineering technology has greatly supported the innovation and progress in science. One of the major advancements in this field is the modification of crops to produce allergen-free foods.\nAllergens are substances that can trigger an allergic reaction in certain individuals. Common allergens include peanuts, tree nuts, wheat, shellfish, and soy. For people with allergies, exposure to these substances can cause mild to severe reactions, ranging from skin rashes to life-threatening anaphylaxis.\nThe Genetic Engineering Approach\nThanks to genetic engineering, scientists have been able to develop crops that do not contain specific allergenic substances. By modifying the genes responsible for producing these allergens, they can create plants that are safe for consumption by individuals with allergies.\nThis process involves identifying the genes that control the production of allergens in a particular crop. Once these genes are identified, scientists can use genetic engineering techniques to either deactivate or modify them. By doing so, they can prevent the production of allergens or reduce their levels to safe amounts.\nThe Benefits of Allergen-free Foods\nThe creation of allergen-free foods has significant benefits for individuals with allergies. It allows them to include certain foods in their diet that they previously had to avoid completely. For example, someone with a peanut allergy can now safely enjoy products made from peanuts, such as peanut butter or peanut oil.\nAdditionally, allergen-free foods provide a peace of mind for individuals with allergies and their families. They can consume these foods without worrying about hidden allergens or cross-contamination. This freedom allows them to dine out, travel, and attend social events with less fear and anxiety.\nIn conclusion, genetic engineering has enabled the creation of allergen-free foods, supporting the innovation and advancement in bioscience. This technology has opened up new possibilities for individuals with allergies, providing them with safer options for a well-rounded diet.\nFacilitation of Sustainable Agriculture Practices\nGenetic engineering has made significant progress in the field of sustainable agriculture practices, supporting innovation and advancement in bioscience. Through genetic modification, scientists and researchers have been able to develop crops that are resistant to pests, diseases, and drought, ensuring higher yields and reducing the need for harmful pesticides and herbicides.\nOne of the key advantages of genetic engineering is the ability to enhance the nutritional content of crops. By introducing specific genes into plants, scientists have been able to increase the concentration of vitamins, minerals, and other beneficial compounds in crops. This innovation supports sustainable agriculture practices by providing more nutritious food options for consumers and addressing nutrient deficiencies in certain regions.\nReduced environmental impact\nThe use of genetically modified crops has also contributed to the reduction of the environmental impact of agriculture. Through genetic engineering, crops can be engineered to require fewer resources, such as water and fertilizers, without compromising their growth and yield. This not only helps to conserve valuable resources but also reduces water pollution and the release of greenhouse gases into the atmosphere.\nIncreased crop resilience\nGenetic engineering has also enabled the development of crops with improved resilience and adaptability to changing environmental conditions. Through the introduction of specific genes, crops can be engineered to tolerate extreme temperatures, soil salinity, and other challenging conditions. This allows farmers to grow crops in regions that were previously unsuitable for agriculture, supporting the expansion of sustainable farming practices.\nIn conclusion, genetic engineering plays a crucial role in facilitating sustainable agriculture practices. Through its innovative and advanced techniques, genetic engineering supports the progress and advancement of bioscience, providing modifications and support for crops that are more resilient, require fewer resources, and have enhanced nutritional content. This contributes to the development of sustainable agricultural practices, reducing the environmental impact of farming and addressing global challenges in food security and nutrition.\nAdvancements in Pharmaceutical Manufacturing\nGenetic engineering has played a significant role in supporting the advancement of pharmaceutical manufacturing. Through the modification of genetic material, scientists are able to create innovative solutions for the production of medication.\nSupporting Research and Development\nGenetic engineering has allowed researchers to delve deeper into the understanding of diseases and their underlying genetic causes. This knowledge has been instrumental in the development of new and more effective medications. By manipulating genes, scientists can identify specific targets for drug intervention and design pharmaceuticals that can more precisely address these targets.\nAdditionally, genetic engineering has paved the way for the development of personalized medicine. By analyzing an individual’s genetic makeup, researchers can tailor medications to suit a person’s specific needs, leading to more targeted treatments and better patient outcomes. This personalized approach has revolutionized the field of pharmaceutical manufacturing.\nAdvances in Manufacturing Processes\nThe use of genetic engineering in pharmaceutical manufacturing has also led to advancements in production processes. By introducing genetic modifications in organisms such as bacteria or yeast, scientists can create bioengineered cells that produce specific therapeutic proteins. These bioengineered cells can be cultivated in large quantities, providing a renewable source of medication.\nFurthermore, genetic engineering has enabled the development of novel drug delivery systems. Researchers can engineer organisms to produce specific molecules that can act as carriers for medication, allowing for targeted delivery to specific areas of the body or sustained release over a longer duration. These advancements in drug delivery systems offer improved efficacy and minimize potential side effects.\nIn conclusion, genetic engineering has supported significant progress and innovation in the field of pharmaceutical manufacturing. Through ongoing research and advancements in genetic modification, scientists are able to design more precise medications, personalize treatments, and improve manufacturing processes. The impact of genetic engineering in the pharmaceutical industry is undeniable and continues to drive advancements in science and medicine.\nSupport for Scientific Innovation and Progress\nBioscience and genetic engineering have revolutionized the field of scientific research, providing opportunities for significant progress and advancement. By enabling the modification of genes and genetic material, scientists are able to explore new possibilities and uncover valuable information about the intricacies of living organisms.\nThe support for scientific innovation in the field of genetic engineering is crucial for unlocking the potential of this technology. It allows researchers to push the boundaries of knowledge and make groundbreaking discoveries that have a positive impact on various industries, including healthcare, agriculture, and environmental conservation.\nGenetic engineering provides scientists with a powerful tool to understand the fundamental mechanisms of life and develop new technologies and treatments. This support encourages the development of innovative strategies and techniques that can improve human health, enhance crop yields, and address pressing environmental challenges.\nMoreover, the advancement of genetic engineering would not be possible without the backing and resources provided by governments, academic institutions, and private organizations. Financial support, grants, and funding opportunities help researchers to conduct experiments, purchase equipment, and hire skilled professionals.\nBy providing this support, society recognizes the importance of scientific exploration and encourages scientists to pursue innovative ideas that can contribute to the betterment of humanity. It fosters a culture of collaboration, knowledge sharing, and critical thinking, which are essential for driving scientific progress forward.\nIn conclusion, the support for scientific innovation in the field of genetic engineering is vital for enabling progress and driving advancements in the field of bioscience. It empowers researchers to explore new frontiers, develop innovative solutions, and make significant contributions to various industries. Continued support will ensure that genetic engineering continues to revolutionize the way we understand and interact with the world.\nWhat is genetic engineering?\nGenetic engineering is a scientific process that involves manipulating an organism’s genes to introduce new characteristics or traits.\nWhat are some advantages of genetic engineering?\nThere are several advantages of genetic engineering. Firstly, it allows for the development of crops that are more resistant to pests and diseases, resulting in higher yields. Secondly, it can help create plants that are more nutritious or have enhanced nutritional value. Thirdly, genetic engineering can be used in medicine to produce medicines and vaccines more efficiently. Lastly, it can assist in the preservation and conservation of endangered species.\nHow does genetic engineering support innovation in science?\nGenetic engineering supports innovation in science by providing researchers with a powerful tool to manipulate and study genes. It allows scientists to understand the function of genes and how they contribute to an organism’s characteristics. This knowledge can then be used to develop new technologies, treatments, and products that can improve people’s lives.\nIs genetic engineering safe?\nGenetic engineering is a highly regulated field, and safety is a top priority. Before any genetically modified organism (GMO) is approved for commercial use, it undergoes extensive testing to ensure it is safe for human consumption and the environment. There are strict guidelines and regulations in place to assess the potential risks and benefits of genetically engineered products.\nWhat are the ethical considerations of genetic engineering?\nThe ethical considerations of genetic engineering are complex and contentious. Some argue that it is playing with nature and poses risks to genetic diversity. Others believe that it has the potential to solve pressing issues such as hunger and disease. Society needs to have open and informed discussions to navigate these ethical considerations and ensure responsible use of genetic engineering.\nWhat is genetic engineering?\nGenetic engineering is the process of modifying the genetic material of an organism to introduce desired traits or remove unwanted ones. This is done by manipulating the DNA of the organism through various techniques.\nWhat are the advantages of genetic engineering?\nGenetic engineering offers several advantages in the field of science. Firstly, it allows for the development of crops with increased resistance to pests, diseases, and herbicides, resulting in higher crop yields. Additionally, it enables the production of pharmaceuticals and medical treatments more efficiently and economically. Furthermore, it has the potential to eliminate or reduce genetic disorders in humans and improve overall health. Lastly, genetic engineering can help in the conservation of endangered species and the creation of genetically modified animals for scientific research.\nAre there any ethical concerns associated with genetic engineering?\nYes, there are ethical concerns associated with genetic engineering. Some people argue that manipulating the genetic material of organisms goes against the natural order of things and may have unforeseen consequences for the environment and ecosystem. Others express concerns about the potential misuse of genetic engineering technology, such as the creation of genetically modified organisms for military purposes. Additionally, there are also ethical concerns related to the ownership and control of genetically modified organisms and their impact on biodiversity.\nHow does genetic engineering help in medical research?\nGenetic engineering plays a crucial role in medical research. It allows scientists to manipulate the DNA of organisms, including humans, to study the genetic basis of diseases and develop potential treatments. For example, genetic engineering has been used to create genetically modified mice that can mimic human diseases, allowing researchers to better understand the mechanisms of these diseases and test new therapies. Genetic engineering also enables the production of medically important substances, such as insulin and growth factors, in large quantities, which are essential for treating various medical conditions.", "label": "No"} {"text": "The roots of cassava (Manihot esculenta) serve as the primary source of carbohydrates in the diets of people in many arid regions of the world, including more than 250 million people in sub-Saharan Africa.\nUnfortunately the roots of commercial cassava cultivars are quite low in micronutrients, and micronutrient deficiencies are widespread in these regions. In addition to programs designed to deliver vitamin supplements, there has been considerable effort aimed at biofortification; that is, increasing the amounts of available micronutrients in staple crops such as cassava.\nAn article published in The Plant Cell this week describes the results of a collaborative effort led by Professor Peter Beyer from Freiberg University in Germany, together with researchers at the International Center for Tropical Agriculture (CIAT) in Colombia. These researchers studied a naturally arising variant of cassava with yellow roots in order to understand the synthesis of provitamin A carotenoids, dietary precursors of vitamin A. Beyer was also co-creator of Golden Rice, a biofortified crop which provides precursors of vitamin A not usually present in the rice that people eat.\nIn this work, the scientists compared different cassava cultivars with white, cream, or yellow roots – more yellow corresponding to more carotenoids – in order to determine the underlying causes of the higher carotenoid levels found in the rare yellow-rooted cassava cultivar. They tracked the difference down to a single amino acid change in the enzyme phytoene synthase, which functions in the biochemical pathway that produces carotenoids. The authors went on to show that the analogous change in phytoene synthases from other species also results in increased carotenoid synthesis, suggesting that the research could have relevance to a number of different crop plants. Furthermore, they were able to turn a white-rooted cassava cultivar into a yellow-rooted plant that accumulates beta-carotene (provitamin A) using a transgenic approach that increased the enzyme phytoene synthase in the root.\nThis work beautifully combines genetics with biochemistry and molecular biology to deepen our understanding of carotenoid biosynthesis. \"It paves the way for using transgenic or conventional breeding methods to generate commercial cassava cultivars containing high levels of provitamin A carotenoids, by the exchange of a single amino acid already present in cassava\" says Beyer. Thus, it has the potential be a big step the battle against vitamin A deficiency, which is estimated to affect approximately one third of the world's preschool age children.\nThis research was supported by the HarvestPlus research consortium, which received a grant from the Bill & Melinda Gates Foundation.\nThe research paper cited in this report is available at the following link: Welsh et al. Plant Cell\nFull citation: Welsch, R., Arango, J., Bär, C., Salazar, B., Al-Babili, S., Beltrán, J., Chavarriaga, P., Ceballos, H., Tohme, J., and Beyer, P. (2010). Provitamin A accumulation in cassava (Manihot esculenta) roots driven by a single nucleotide polymorphism in a phytoene synthase gene. Plant Cell 10.1105/tpc.110.077560.\nThe Plant Cell (http://www.plantcell.org/) is published by the American Society of Plant Biologists, a professional scientific society, headquartered in Rockville, Maryland, that is devoted to the advancement of the plant sciences worldwide. With a membership of nearly 5,000 plant biologists from throughout the United States and more than 50 other nations, the society publishes two of the world's more influential plant science research journals: The Plant Cell and Plant Physiology. For more information about ASPB, please visit http://www.aspb.org/.\nFigure credit: International Center for Tropical Agriculture (CIAT)\nRestrictions: Use for noncommercial, educational purposes is granted without written permission. Please include a citation and acknowledge ASPB as copyright holder. For all other uses, contact firstname.lastname@example.org\nNancy Hofmann | EurekAlert!\nClosing in on advanced prostate cancer\n13.12.2017 | Institute for Research in Biomedicine (IRB Barcelona)\nVisualizing single molecules in whole cells with a new spin\n13.12.2017 | Wyss Institute for Biologically Inspired Engineering at Harvard\nMPQ scientists achieve long storage times for photonic quantum bits which break the lower bound for direct teleportation in a global quantum network.\nConcerning the development of quantum memories for the realization of global quantum networks, scientists of the Quantum Dynamics Division led by Professor...\nResearchers have developed a water cloaking concept based on electromagnetic forces that could eliminate an object's wake, greatly reducing its drag while...\nTiny pores at a cell's entryway act as miniature bouncers, letting in some electrically charged atoms--ions--but blocking others. Operating as exquisitely sensitive filters, these \"ion channels\" play a critical role in biological functions such as muscle contraction and the firing of brain cells.\nTo rapidly transport the right ions through the cell membrane, the tiny channels rely on a complex interplay between the ions and surrounding molecules,...\nThe miniaturization of the current technology of storage media is hindered by fundamental limits of quantum mechanics. A new approach consists in using so-called spin-crossover molecules as the smallest possible storage unit. Similar to normal hard drives, these special molecules can save information via their magnetic state. A research team from Kiel University has now managed to successfully place a new class of spin-crossover molecules onto a surface and to improve the molecule’s storage capacity. The storage density of conventional hard drives could therefore theoretically be increased by more than one hundred fold. The study has been published in the scientific journal Nano Letters.\nOver the past few years, the building blocks of storage media have gotten ever smaller. But further miniaturization of the current technology is hindered by...\nWith innovative experiments, researchers at the Helmholtz-Zentrums Geesthacht and the Technical University Hamburg unravel why tiny metallic structures are extremely strong\nLight-weight and simultaneously strong – porous metallic nanomaterials promise interesting applications as, for instance, for future aeroplanes with enhanced...\n11.12.2017 | Event News\n08.12.2017 | Event News\n07.12.2017 | Event News\n13.12.2017 | Health and Medicine\n13.12.2017 | Physics and Astronomy\n13.12.2017 | Life Sciences", "label": "No"} {"text": "Major: Imaging Science Ph.D.\nAli is a Ph.D. student at Chester F. Carlson Center for Imaging Science. He received his B.E. in Polymer Engineering and Color Science from Amirkbair Univeristy of Technology (Tehran Polytechnic) in 2015. Ali’s research is focused on structural assessment of complex forest environments using terrestrial laser scanning data. The complexity in these forests introduce challenges to structural evaluation algorithms, thus Ali works on developing approaches to overcome these issues and improve the results acquired from forest inventories in the studied sites.", "label": "No"} {"text": "luxury outdoor lighting fixtures outdoor light fixtures outdoor lighting luxury exterior outdoor lighting fixtures commercial outdoor lighting.\ngirl bedroom lighting ideas light fixtures for girl bedroom girls bedroom light fixtures modern bedroom lighting ideas regarding kids room.\nregent lighting replacement parts ceiling pendant lighting regent chrome white globe pendant.\ncontinuous led lighting kit continuous lighting kit led pro kit with dimmer daylight white.\ncapital lighting richmond va showroom supplying kitchen and bath products home appliances and more capital tristate lighting richmond va.\nseagull ambiance under cabinet lighting full size of seagull under cabinet lighting installation ambiance lights kitchen cabinets wireless best of led.\nbattery under cabinet lighting with remote kitchen cabinets before battery lights.\nies lighting levels chart in the range of to indirect sunlight exposes us to times as much blue light as at typical indoor lighting levels.\nwhat is title 24 compliant lighting posts tagged title compliant lighting.\nfrench country outdoor lighting french outdoor lighting french outdoor lighting a searching for 1 lamp wall mount outdoor lantern french french outdoor lighting.", "label": "No"} {"text": "If flow meter indicates flow after the system is filled, this indicates a leak. By eferring to a map of the system layout supplied as part of the ek system, you can ce. Unit 8 leak detection, system evacuation, and system. Rles seahawk leak detection solutions product line is purposebuilt to provide unparalleled protection against any form of conductive fluid leak that might threaten your facility. Unit 8 leak detection system evacuation and cleanup quizlet. The conco fluorotracer analyzer is a compact, easy to operate leak detection system designed to detect extremely low levels 1. The alert can be visual, audible or via emailtext message. Alarm units ttk leak detection liquid leak detection.\nA wet or contaminated system requires the triple evacuation method in which the system is evacuated to microns three times. If there is any leak in refrigeration system then the gas flows through the attached hose to the copper tube. Water distribution system leak repair leak detection. Automatic leak detection system improve the competitiveness of your machine a. Mar 08, 2010 steelhead can combine the rmi leak tester system into our bottling lines to detect and remove potential leaking bottles from the line. This system can also include sniffing, which will allow. The water leak panel shall be located as shown in drawing and all alarm per zone shall be extended to bms if. The palat system monitors a sensor string of cable and or probes to detect and locate liquid leakage. The loggers are deployed during the normal working day, typically on a distribution valve. The 4200 system has been independently tested for inclusion in the eca scheme as an approved refrigerant gas leak detection system.\nThese water leak detectors will alert you at the first sign of water damage. Regardless of the cause, a water leak detection system could help safeguard your home and prevent damage from water leaks. The figure below illustrates different type of screw heads and the respective driver bits for them. The h2o sos shutoff system is an automated water leak detection system that provides 247 protection against flooding due to internal plumbing pipe failures and accidental overflows. Ask your insurer how much you would save with the installation of our water leak detection system.\nLeak detection systems conco systems services industrial. Along with the most versatile product range available, we can offer advice and support to enable our customers to maximise savings and minimise risk from damage. Performance of electrical appliances air conditioners and heat pumps test. Pipeline leak detection systems can also enhance productivity and system reliability thanks to reduced downtime and inspection. Leak prevention system in household the leak detection systemlds offers a wide range of important benefits to the end user. Evacuation is often called vacuum or pulling a vacuum, and its one of the most. If you were to introduce nitrogen into a system, for example, it would drive up the. This equipment is essential in server room since every data center consists of precision air conditioner which need at. If the gauge shows a pressure rise and the pressure continues to rise without leveling off, a leak exists.\nMany insurance companies offer discounts for using this system so call yours today to see if you qualify. Water leak detection system or water leak detector is one of most important alarm equipment when it comes to datacenter safety. These water leak detectors will alert you at the first sign of water. It is accomplished by accessing the annular space generally at low points in a system with a valve, plug, or pipe riser to grade. Use leak detection devices such as acoustic or soundbased technology that identify leaks for repair. When moisture is present in a refrigeration system, it will react with the refrigerant and oil to form. This is used in the manufacture of gas filled switches which are to operate devises in micro seconds. Below are technical considerations for leak detection equipment and distribution system repair. The system provides leak detection in raised floor areas, water service areas, wet columns, food preparation areas, overhead piping systems, transformer vaults and switchgear rooms, as required by the building. Manual leak detection for drainage applications is the simplest of the three available methods. Have a qualified organization test, commission, and for locating systems map the tracetek leak detection system.\nGather and record asbuilt information while the system is still accessible. Water escaping from pipes creates a distinct sound that moves through the piping material. Thus, the two types of screwdriver bits are fastener bits and driver bits. Because they contain moisture, and moisture reacts with oil in the system to form acids organic solids r12 r22 r502 r4a will hydrolyze a chemical reaction with water forming hydrochloric and hydrofluoric acids and more water. In our opinion, an active leak detection system with individual water leak sensors specifically monitoring all leak prone areas in the home is the best and most costeffective approach to home water leak detection. Our team at waterguard offer unrivalled experience in the choice, supply, installation and commissioning of effective water leak detection equipment and water conservation solutions. Start studying unit 8 leak detection system evacuation and cleanup. Sabah uses the most advanced sensing technology available to detect leaks and provide the location. Water damage is also not only limited to your basement. This is also known as a water leak detection system for server rooms. Good system design is necessary for the prevention of refrigerant leakage.\nThe copper tube is heated by the flame ignited by detector. This exclusive conco system is capable of performing both air inleakage and condenser tube leak inspections in addition to finding sources of dissolved oxygen. Learn vocabulary, terms, and more with flashcards, games, and other study tools. Unit 8 leak detection system evacuation and system cleanup sample cards. Study unit 8 leak detection system evacuation and system cleanup flashcards from a. The higher the ball is in the flow meter, the larger the leak size. The palat system monitors a sensor string of cable andor probes to detect and locate liquid leakage. Unit 8 leak detection, system evacuation, and system cleanup.\nD t t e e r k ek ttdm distributed sensing point sensing ith the point sensing approach to leak detection, liquid must reach the location of a probe to trigger an alarm. Once you get an alert about a water leak, you can take immediate action. Leak detection and prevention is a crucial process within the industrial sector. These two sensors will ensure the safety of your data centers and server rooms from water damage. Depending on the operating mode, in or away, the system will initiate procedures appropriate to the degree of alarm. After the first and second evacuations, the system is purged with dry, regulated nitrogen to help absorb moisture. About 58% of these are alarm, 0% are smart security devices. In addition to complying with fgas regulations governing larger installations the tq 4200 can save money both in reduced leaks and. Moisture, dissolved refrigerant, outgassing, and leaks are easily detected. Why should oxygen or compressed air never be used to. These switches are used for various defence applications. From multiunits to the intricate plumbing structure, it can be stressful making sure plumbing, gas, and sewage lines all work the way they should.\nLiquid leak detection systems fuel and water leak detection. It is designed to be safe for vehicle systems and will not void factory. For complete leak surveys on your water distribution system, turn to american leak detection. Avoid improper water consumption due to user distraction or failure of water system components. A wide variety of leak detection system options are available to you, such as usage. At american leak detection, we understand emergencies can happen, which is why our leak detection specialists are available to create customized solutions. Eliminate contaminants from the tubing by cleaning before cutting. A brief explanation of each style is provided below. The alps speedglider multistation moving head leak tester is a multiplestation, continuousmotion. Unit 8 leak detection, system evacuation, and system cleanup 67 terms. The water leak system comprises of a main zone water leak panel, interface modules, sensor cable and alarm sounders. Hhv has designed and built a degassing, evacuation and gas filling system for a defence establishment. Water leak accounts for 27% of the cause for gas, electricity, and water stop from innovation of water leak detection technology on automated builing. How to properly evacuate refrigerant 20190225 achr news.\nThis innovative product automatically shuts off the water supply instantly upon detection of a water leak. The only things we want inside the system are the proper refrigerant and the. Whole house water leak detection systems state farm. Leak detection is typically accomplished by a rotary detection system or a linear detection system. Zcorr, an advanced digital, correlating acoustic logging system, has been designed to utilize patented digital technology to simplify the leak detection process for buried water, steam and fuel lines. Ttk not only supplies water leak detection and location systems but also provides solutions for detecting acid leaks, and proud to say our systems are protecting numerous cleanrooms, semiconductor and wafer manufacturing plants in asia and europe. Unit 8 leak detection system evacuation and system cleanup. Steelhead can combine the rmi leak tester system into our bottling lines to detect and remove potential leaking bottles from the line. Get the latest food manufacturing trends delivered free to your inbox. Start studying unit 8 leak detection, system evacuation, and system cleanup. This detector is used to detect the propane or acetylene gas leaks. Perform a standing pressure test with highpressure nitrogen, according to. Detecting and locating leaks early can make the difference between a quick cleanup and a disastrous flood.\nWaterguard water leak detection systems and products. Motor windings will deteriorate and metal corrosion and sludge can occur. Permalert offers several stateoftheart leak detection systems to satisfy the requirements for a variety of applications. Leak detection manufacturers leak detection suppliers. The tracetek system map supplied as part of a tracetek locating system leads you to the leak, so you can locate the source, solve the problem, and keep your equipment up and running. Envirotech alarms ltd are specialists in water, gas and oil leak detection systems, providing single or multi zone alarm packages which can activate a range of beacons, sounders, send sms text messages and integrate with building management systems. The eagle 360 water leak detection system is there to help you avoid all of these inconveniences. With reliable detection levels down to 10 ppm, leaks can be detected quickly. More specifically, we have not found a better leak detection product on the market than the h2o sos.\nWe understand how devastating and costly a leak or temperature spike in a sensitive area can be. Rles seahawk leak detection solutions are engineered to provide unparalleled protection against any form of conductive fluid that might threaten your facility. Mandated defect warranty system for apartment buildings in korea building performance rating system building owners repair deposit system 3% probability of water leak. For 30 years, the rle team has spent every day looking for newer, better, faster ways to ensure that your facility.\nHhv evacuation, gas filling and leak detection system. Leak detection system how is leak detection system abbreviated. Hvac unit 8 leak detection, system evacuation, and system. When it comes down to it, thats what rle technologies does. A system evacuation should be done whenever the system has been opened to the atmosphere or if tests show. With our fully automated leak detection and bottle rejection systems, you can reduce costly labor and overhead costs associated with the manual inspection of your products. Four basic service procedures used to repair and maintain a mechanical refrigeration system are leak detection, evacuation, recovery, and refrigerant charging.\nThe line includes fluid sensing cable and spot detectors as well as the monitoring devices and accessories to support them. Leak detection system how is leak detection system. Emeng3016 leak detection, system evacuation, and system. In terms of euros, for some of you it may be very little but for others it will be thousands. It can happen in a bathroom, laundry room, on the first floor or on the second floor. The ht100 offers many desirable qualities in a single easytouse system. Other maintenance, like rewiring, changing filters, cleaning coils, fan motor. For data centers, use a water leak detection system for data centers. Leak detection, recovery, evacuation and charging tekassist. Systems other than selfcontained low charge systems australian. Whether its a gas leak or a liquid leak, leak detection is important to ensuring the safe and proper operation of equipment, and can help prevent other major problems.\nThis package leak detection system is designed to test flexible packaging or pinholesized leaks slow leakers which can lead to spoilage of processed foods in the warehouse, in shipment or on a grocery store shelf. The smallest leak in the wrong place can cause costly downtime and disruption, and the cleanup operation consumes valuable resources and time. Automatic leak detection system ignoring it wont solve it. Refrigerant leaks can be detected using different techniques and different leak detection devices. Even a minor leak can substantially reduce performance, and can often lead to complete system failure. The minimum leak rate detectable in this 1hour test is 0. It takes time for the instrument to respond, so the probe must be moved slowlyabout 1 in. The model 1100cb addresses the installation of fluid leak detection systems throughout the entire building. The fgals8od is designed for mediumlarge applications where accurate hydrocarbon leak location is required.\nThe primary purpose of leak detection systems lds is to help pipeline controllers to detect and localize leaks. Generally there are eight types of screw driver bits of various shapes and for various types. Kingonyxs class online, or in brainscapes iphone or android app. Some of these procedures need to be performed to conform to requirements of the clean air act. It is a wide field full of options for those seeking help with leaking issues. Leak testers, which are more for diagnostic purposes then monitoring and managing purposes, are also employed in the leak detection service. The actions vary from a minimum level local, acoustic alarm to a maximum level shut off water supply. Use a server room water sensor to detect flooding in server rooms. Because of heat the gas breaks down into halogens and there is. Automatic leak detection systems can prevent this and will not only alert you of a leak, but can pinpoint exactly where it is. Leak detectors, also known as sniffers, are vital when installing refrigeration and air conditioning systems, as well as for maintenance and regular inspection. Commissioning record for the tracetek alarm module specific. The original leak detection specialists managing and maintaining commercial and municipal properties can be a herculean task. Leak detection system is an equipment which detects water leak at very early stage and send alert to user.1166 1578 966 193 855 1437 543 10 993 131 244 141 978 822 623 995 1152 620 878 1209 120 745 635 974 653 410 426 383 493 457 355 964 354 722 789 1424 1202 1031 216 380 632 294 830", "label": "No"} {"text": "Christian Pedersen and Microsoft Dynamics AX and future technology offerings\nSome interesting facts\nMicrosoft, Christian Pedersen, General Manager Enterprise ERP\nMicrosoft Dynamics AX, Future technology offerings, HSO Innovation software and industry solutions\nGeneral Manager Enterprise ERP for Microsoft\nWe were honored to interview with Christian Pedersen, General Manager Enterprise ERP for Microsoft on Microsoft Dynamics AX, future technology offerings and HSO Innovation software and industry solutions.", "label": "No"} {"text": "Probably a bit late, but the garlic is now in the ground. Last year was the first time I ever grew garlic and was surprised at the great crop I ended up with. I planted Festival (a small garlic with that extra bit of punch)and 3 other varieties. The Festival seemd to do the best so I orderd 6 bulbs of that variety again from garlicfarmsales.com.au. They also sent two complimentary bulbs of Aria, so we will see how that goes as well. This year I have a dedicated garlic bed, and a bit more room so besides the above mentioned garlic I also included some of mine from last yeras crop. All going well I expect approx 80 bulbs come summer.", "label": "No"} {"text": "A growing body of work in the biomedical sciences generates and analyzes omics data; our lab’s work contributes to these efforts by focusing on the integration of different omics data types to bring mechanistic insights to the multi-scale nature of cellular processes. The focus of our research is on developing systems genomics approaches to study the impact of genomic variation on genome function. We have used this focus to study genetic and molecular variation in both natural and engineered cellular systems and approach these topics through the lens of computational biology, machine learning and advanced omics data integration. More specifically, we create methods to reveal functional relationships across genomics, transcriptomics, ribosome profiling, proteomics, structural genomics, metabolomics and phenotype variability data. Our integrative omics methods improve understanding of how cells achieve regulation at multiple scales of complexity and link to genetic and molecular variants that influence these processes. Ultimately, the goal of our research is advancing the analysis of high-throughput omics technologies to empower patient care and clinical trial selections. To this end, we are developing integrative methods to improve mutation panels by selecting more informative genetic and molecular biomarkers that match disease relevance.", "label": "No"} {"text": "The Town of North Beach was awarded funding from the Department of Energy to encourage our residents to go electric by installing an electric charging station for the public. This electric charging station is a dual station that allows two vehicles to power up at the same time. The station is located on the town’s municipal parking lot at 9125 Chesapeake Avenue (near the corner of 7th Street and Chesapeake Avenue). The hourly rate for electric vehicle charging is $.25/kwh. To create a Chargepoint account or to download the app, click here.", "label": "No"} {"text": "MCL is an object-oriented dynamic programming language fully integrated with the Macintosh. It implements the current industry standard Common Lisp programming language and CLOS (as defined in Common Lisp: The Language, Second Edition). It includes: an incremental compiler which generates efficient native PowerPC code; a fully integrated emacs-like Lisp program editor; a window-based debugger; a source code stepper; a dynamic object inspector; smart Lisp programming tools; and an extensive library of CLOS objects including Macintosh user interface objects.\nVersion: 5.1 || Release Date: 2006-07-12 || License: Commercial with demo ($750.00)\nDeveloper: Digitool |\nApp Owner: gorbag", "label": "No"} {"text": "The neuromuscular junction serves widely as a modelsynapse for both the study of synaptic development and synaptic transmission. We are now attempting to understand the molecular events that underlie these processes. One approach to the study of the neuromuscular junction is to analyse mutants of the nematode Caenorhabditis elegans. We review the motor circuit in the worm responsible for locomotion, the development of the C. elegans neuromuscular junction, and the gene products required for the functioning of nematode synapses. This genetic approach has both identified novel components of the neuromuscular junction and has ascertained the in-vivo roles of biochemically-defined components that regulate neuromuscular transmission and development.\n- Caenorhabditis elegans\n- development of neuromuscular junction\n- genetic analysis", "label": "No"} {"text": "TOTO represents the next generation of bathroom products. TOTO is the driving force behind innovations in technology and design, bringing about the highest levels of hygiene, sustainability and user well-being.\nCombined with TOTO distinctive minimalist aesthetics, TOTO toilets enhance every bathroom setting.\nPlease note the Neorest XH I is available now for release with Australian Standards and WaterMark.\nThe Neorest NX I will be made available for Australian market very soon.", "label": "No"} {"text": "Tamara Bidone Research Lab\nI am an assistant professor at the Department of Biomedical Engineering and the Scientific Computing and Imaging Institute at the University of Utah. My research interests lie at the intersection of biomechanics, computer science, and cellular biophysics. Specifically, I work on developing models of cell adhesions, mechanosensing, and actomyosin contractility, with the ultimate purpose of providing a rigorous theoretical framework to study how emergent cell properties arise from individual molecular components.\nI received my Ph.D. in Biomedical Engineering from The Polytechnic University of Turin (Italy) in 2013, under the supervision of Professor Franco Maria Montevecchi. I worked in the Mechanobiology Lab of the Massachusetts Institute of Technology and in the group of Multiscale Mechanical and Biological Engineering of the University of Zaragoza. Before joining the University of Utah, I was a postdoctoral scholar in Professor Gregory Voth's group at the University of Chicago and in Professor Dimitrios Vavylonis's group at Lehigh University.", "label": "No"} {"text": "Material Erosion Test Device\nThe device is used to test the anti-high speed scouring of materials under water、oil and mud. The evaluation of the material is very important for drilling material、pipeline transport、valves and so on.\nThe device mainly includes pump station、flow control system、pressure control system and data collection & control system.\nMain technical parameters:\nTest medium: oil、water、mud\nImpact linear velocity(max):20m/s\nControl accuracy of impact linear velocity:±5%\nTemperature control range: room temperature - 100℃\nControl accuracy of temperature control: ±2℃\nFlow in 24h: 500 m³-1000 m³\nWear-resistant material is lined inside the pipe.\nVibration-absorptive material is used in the device.\nFlow can be adjusted continuously\nThe device can be used in wide range of application.", "label": "No"} {"text": "The prayers quell the pain of battle\nCategory Archives: RPG\n-A semiconductor device used to amplify or switch electronic signals and electrical power\nand her sidekick: God Emperor!\nSolasta: Crown of the Magister\nI want a Pool of Radiance and an Ultima 4 mod for this!\nMario Golf: World Tour\nTaking over the world, so next is galaxy golfing, right?\nMario Golf: Advance Tour\nCan we please make role-playing golf a thing?\nMario Golf (GBC)\nFaery: Legends of Avalon\nNo connection to The Faery Tale Adventure\nA glimmer of light?\nFountain of Dreams\nIt has nothing to do with Kirby", "label": "No"} {"text": "What is the expected number of cars that can be parked (as a function of L)?\nI'll start you off...\nFor 0 <= L < 1, F(L) = 0\nFor 1 <= L < 2, F(L) = 1\nOkay... now the easy ones are out of the way, can you describe the function for L>=2?", "label": "No"} {"text": "Submitted for Judging\nWe've taken every number 1 from the Billboard charts since 1890, and made an interactive remix.\nThe end result is eleven minutes of (mostly) beat-matched automated remixing from 1890 to 2012.\nYou can play with it here:\nWe used APIs from a few companies to build it:\nThe remixing is done using Echonest Remix.\nThe mp3s came from 7Digital.\nThe metadata for the tracks is from Echonest.\nThe resulting file is hosted on Soundcloud.\nSoundcloud file is here:\nGithub code is here:\nHope you like it,\nTom, Henrik, and Dave", "label": "No"} {"text": "Observations of an extreme space weather storm caused by two successive solar eruptions are reported in Nature Communications this week. The findings may help understand how such incidents are caused by combinations of events.\nCoronal mass ejections are large-scale eruptions of plasma and magnetic field from the outer layer of the Sun. They are known to be a major influence on space weather, which can affect spacecraft and satellites around the Earth. Most coronal mass ejections have effects that are equivalent to the normal solar wind by the time they reach us, but how they evolve as they travel from the Sun is not clearly understood. Ying Liu and colleagues use multi-point sensing satellites to study the rare case of two consecutive eruptions on 23 July 2012. This situation resulted in an extreme storm with a high solar wind speed and magnetic field at around Earth radius. Their observations show how the two coronal mass ejections interact as they travel, producing a change in direction of propagation, an enhancement of their magnetic field, and only a modest slowing of their speed. The study suggests that current modelling of solar wind speed and magnetic field may be underestimated if such interactions are not properly accounted for.\nEnvironment: Plastic degrading enzymes found in wax worm salivaNature Communications\nEnvironment: Assessing the impact of forestation on global climate patternsNature Communications\nClimate change: Urban greening can help reduce accelerated surface warming in citiesCommunications Earth & Environment\nEcology: Drought has life-long consequences for red kitesNature Communications\nGeoscience: Diamond from the deep reveals a water-rich environmentNature Geoscience", "label": "No"} {"text": "- Understand the scope of data science and complexities with real-world use cases\n- Deep dive into the various steps involved in solving a data science problem\n- Explore each execution step of data science projects and find out how to use R at each step\n- Build models^ interpret^ and present using the newest of the R libraries and visualization framework tools such as D3 and Tableau\n- Scale R^ and integrate it with Big Data and NoSQL data stores\n- Access and learn using detailed code implementations\n- Use standard and big data ETL tools for data collection\nBusiness analysts and developers are increasingly collecting^ curating^ analyzing^ and reporting on crucial business data. The R language and its associated tools provide a straightforward way to tackle day-to-day data science tasks without a lot of academic theory or advanced mathematics. This book is for those data science professionals who want to take their skills to the next level. With the help of insightful industry examples^ this book will take you to the depths of the core concepts in data science and how to use them in your day-to-day work without much hassle. The guide will cover solid R libraries and how they can be used in complex data science tasks such data manipulation^ missing data^ advanced graphics with R^ package creation in R^ machine learning^ exploring neural networks^ and so on. During the course of the book^ you will also explore advanced algorithms with R and various data visualization techniques with R. You will learn how to work with different data sources comfortably and explore advanced concepts in data science such as advanced predictive analytics^ modeling^ logistics regression^ regularization^ and data mining techniques.", "label": "No"} {"text": "HrOpenThe Croatian Association for Open Systems and InternetHULKThe Croatian Linux Users’ Association (HULK)\nEkorre DigitalEkorre Digital provides advanced web application developmentFlying PenguinFlying Penguin offers premium DevOps and Development servicesFaculty of Electrical Engineering and ComputingCroatia’s leading academic and research institution in the field of electrical engineering, computing, and information and communication technologyUniversity of Zagreb Computing CentreSRCE is the main computing centre and the architect of the e-infrastructure, covering both the University of Zagreb and the whole research and high education systemCARNETHuman oriented technologyStudio utopiaPOINTER d.o.o.\nNimiumNimium attracts clients who want to work with us because of our expertise, experience and the results we deliver. We are all about GNU/Linux and Open Source.Open ITExperts in the field of network technologies and system integrations\nOpenNovationsOpenNovations provides cybersecurity assessments, project management, computerized systems development and validation.openSUSEA distribution, a worldwide effort that promotes the use of Linux everywhereCanonicalCanonical provides enterprise security, support and services to commercial users of Ubuntuvmware/INGRAM MICROvmware/INGRAM MICRO\nGamechuck d.o.o.Developing games and gaming hardwareRimac Technology d.o.o.Forging the future of the automotive industry, fasterInfoart d.o.o.A leading provider of a multichannel payment platform in the area of parking, e-mobility, ticketing and public transport.\nAPIS IT d.o.o.The Information Systems and Information Technologies Support Agency LLC\nThe Document FoundationIndependent self-governing meritocratic entity, created by a large group of Free Software advocates and home of LibreOffice, the next evolution of the world's leading free office suite.Hotel Orient ExpressLocated at the very heart of ZagrebZagreb Tourist Board and Convention Bureau - your reliable partnerZagreb Tourist Board and Convention Bureau is an independent non-profit organisation and a trusted partner to all meeting planners organising conferences and other events, as well as incentives.\nNetokracijaleading independent, regional magazineVirtualna StvarnostSpecialized portal for news from the AR / VR world\n© 2024 DORS/CLUC 2022. Built using WordPress and the Highlight Theme", "label": "No"} {"text": "Francisco Falcon is a Specialist Exploit Writer at Core Security. He has been doing reverse engineering since 2004. He has published several security advisories detailing low-level vulnerabilities in software products from IBM, Oracle, Novell, Google, and SAP, among others. He is interested in reverse engineering, programming, vulnerability research, and exploitation. Francisco has been a speaker at security conferences such as REcon (Canada, 2012 and 2014), Ekoparty (Argentina, 2013) and Hack.lu (Luxembourg, 2013 and 2014).", "label": "No"} {"text": "SUVs have traditionally been powered by big engines, as large amounts of power and torque were needed to haul around all of that interior space and (sometimes) off-road gadgetry. However, times change, and many of the largest SUVs now come with hybrid engines and cheaper running costs.\nWhen we say hybrid we are including full-hybrids (or 'self-charging hybrids' as they are often called), where a tiny electric motor and battery pack assists the petrol engine at low speeds and can power the car on electricity for short distances, and plug-in hybrids (PHEVs). The latter uses a larger electric motor and battery pack to allow greater distances to be covered in EV mode, and these need to be charged up from an on-street charger or, better still, overnight at home for the cheapest running costs.\nFull-hybrids work well for those who are making their first steps into electric motoring, and perhaps will find charging a car with a cable difficult due to their circumstances. PHEVs, meanwhile, are excellent for those with convenient charging and also for company car drivers thanks to tax breaks through the benefit-in-kind (BiK) system.\nHere we run down the best hybrid SUVs on sale right now. If you need an SUV with four-wheel drive and, perhaps, greater off-road abilities, take a look at our best hybrid 4x4s to buy in 2023 list.", "label": "No"} {"text": "International Conference on Complex Systems Engineering is organized between 09 Nov and 11 Nov 2015.\nInternational Conference on Complex Systems Engineering will be held at the University of Connecticut in Storrs Mansfield, Connecticut USA.\nICCSE 2015 will once again present a phenomenal and exciting platform where different cultures with a variety of approaches to Energy, Engineering, Industry, Manufacturing, Automotive, Aeronautics, Aerospace and Complex Systems.\nICCSE 2015 is organized once.\nUniversity of Connecticut\nAddress : Storrs, CT 06269, USA", "label": "No"} {"text": "Global Healthpandemic-proofing The Planet\n- We additionally have interaction with individual scientists on particular sustainable improvement-associated issues.\n- It additionally mobilizes scientific expertise from worldwide research programmes corresponding to Future Earth, Urban Health and Wellbeing, and Integrated Research on Disaster Risk.\n- Also included is a magazine part known as the A-Pages that gives authoritative news and evaluation of the most important developments, occasions, and challenges shaping the sphere.\n- The Major Group draws its experience from the vast membership of ISC and WFEO, which spans the natural and social sciences and engineering.\nHarriet Tubman School of Science & Tech’s mission is to create student educational success and create lifelong career skills in tech and computer science for educationally deprived students. The faculty is a knowledge-pushed model which permits school chief and administrative team to shut achievement gaps utilizing real-time information for evaluation, school goals/targets, professional growth and instructional teaching. Earth SciencesWith its roots in sensors and aerosols retrieval, STC supplies advanced scientific and engineering providers in Earth Sciences corresponding to algorithm development, modeling, simulation, sensor improvement, and satellite tv for pc information processing to clients including NASA, NOAA, DoD, and FAA. 2020 Food Science & Technology Newsletter Read the latest Department of Food Science and Technology publication. Research in the School is rich and numerous, with staff conducting internationally recognised and world-leading analysis (REF2014) of major importance to society, offering vital contributions to scientific information, advanced analysis coaching and alternatives for business exploitation.", "label": "No"} {"text": "Summary of the Faculty\nWelcome to the Faculty of Science. This is a growing faculty that is poised to be the anchor of Zimbabwe Open University’s innovation drive.\nThe Innovation drive that is being promoted by institutions of higher learning in Zimbabwe dictates that the understanding of basic sciences takes the centre stage. The teaching and research in basic and applied sciences becomes the indispensable tool with which institutions of higher learning can contribute towards a knowledge-based economy.\nThe Faculty of Science at the Zimbabwe Open University has focused its efforts towards the revolutionarising the teaching and learning of Science in an ODEL environment. This is being achieved through innovative teaching methodologies that are learner-oriented. The emphasis is on increased online interaction between the leaners and lecturers on the learning platform.\nProblem based learning is also encouraged in the faculty to ensure that learning is directed towards solving problems in the communities. The Faculty strives to ensure that the learning of science is enjoyable and application of the acquired knowledge is put into immediate practical use.\nCome and experience the joy of learning science at ZOU.", "label": "No"} {"text": "We solve the Dirichlet problem for the complex Monge–Ampère equation on a strictly pseudoconvex domain with the right-hand side being a positive Borel measure which is dominated by the Monge–Ampère measure of a Hölder continuous plurisubharmonic function. If the boundary data is continuous, then the solution is continuous. If the boundary data is Hölder continuous, then the solution is also Hölder continuous. In particular, the answer to a question of A. Zeriahi is always affirmative.\n\"On the Hölder continuous subsolution problem for the complex Monge–Ampère equation, II.\" Anal. PDE 13 (2) 435 - 453, 2020. https://doi.org/10.2140/apde.2020.13.435", "label": "No"} {"text": "RSI Alerts MT5\nAddition to the standard indicator Relative Strength Index (RSI), which allows you to configure different types of notifications about events related to this indicator. For those who do not know what this indicator is useful, read here. This version is for Metatrader 5 version for Metatrader 4 here.\nCurrently no events are implemented:\n- The intersection downwards - upper signal level (default 70), - a signal to sell.\n- The intersection of the bottom up - upper signal level (default 70), - a signal to sell.\n- Top-down - the lower the signal level (the default is 30) - the signal to buy.\n- The intersection of the bottom up - the lower signal level (default 30), - a buy signal.\n- Top-down - level 50 - a signal to sell.\n- The intersection of the bottom up - level 50 - buy signal.\nIt is possible to change the text in messages. The variables and messageUp messageDown, icons% level% will be replaced with the level that crossed the bar.\nIf necessary, the value of these signal levels is edited in variable settings - MaxLevel and MinLevel.\nWhat types of notifications can be configured:\n- Audio signal with a window popping up messages - Alert.\n- Sending a notification to the mobile terminal (smartphones and tablets)\nIn order to enable the audio signal from popping up a message on the indicator RSI Alerts - you just have to include in the settings Alerts = true , that would turn off Alerts = false.\nFor what would you have come to your notice mobile terminal of the RSI signals including variable SendNotifications = true, pre-setting in the terminal settings MetaQuotes ID (If you do not know where).\nBeep and notifications can be operated either simultaneously or separately.\nThere is also a parameter called alertShift - This candle number by which the signal is sought.\nFor example, if alertShift = 1, then the signals are supplied only to fully formed candlelight by the last of them.\nAnd if you put alertShift = 0, then the signals will be received by the spark current - zero, note that in this case can be a false signal.\nIf you need is any additional functionality to the indicator, please.\nIchimoku MTF MTF Ichimoku - an indicator for MetaTrader , based on the well known Ichimoku. Ichimoku is included in the standard set of technical...\nOnBalanceVolumeSurrogate MT5 A special version of the indicator On-Balance Volume (OBV), built in the pseudo-real volumes emulated from tick volume....\nImpostol MT5 New Impostol indicator is based on the relative strength index (RSI) and trend indicator ADX. With it, you can identify trends for your...\n- Trajecta SpeedMap NZD\n- Trajecta Smart\n- Rubber tape", "label": "No"} {"text": "- HOME image encryption and decryption using matlab code - Free Download\nSoftware Search For image encryption and decryption using matlab code\nimage encryption and decryption using matlab code In Title\nimage encryption and decryption using matlab code In Description\n- - affordable, commercial grade, strong encryption solution intended for use by VB6,VB.Net and C# programmers. The Antum SDK 2010 includes: ... Multiple strong encryption encryption/decryption algorithms support: AES 128-bit, 256-bit AES ... AES File Encryption AES Text Encryption For use with VB6 Win 32 Development ...\n- Size :763K\n- PrimaSoft Strong File Encryption and Decryption utility is a Windows software that allows you ... you easily and quickly to encrypt and decrypt selected files or folders on your computer ... using the latest industry standard strong encryption algorithms: AES (US Advanced Encryption Standard, secret-key ...\n- Size :1,500K\n- - the free Diamond 2 Encryption Algorithm. Full source code and documentation of the algorithm and the masters thesis it is based on are ... Gnu C++ and other compilers, so it can be adapted to ... filename support) and author contact information has been updated. The encryption key may be a passphrase on the command ... ...\n- Size :573K\n- Extremely fast and reliable image file encryptor/decryptor with build-in activity log to record ... process various image file formats. Encrypted images are saved as bitmap ... preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually ... comes to image protection against an unauthorized use or theft. Only ... ...\n- Size :4,927K\n- Portable Encryption and Decryption provides a cost effective solution to encrypt documents, ... documents, files and instant messages on different computers. With Portable Encryption and Decryption you dont need to buy a license for ... Install Portable Encryption and Decryption on a removable drive ...\n- Size :4,604K\n- SecurityPlus! is a powerful encryption&decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and wont take long to encrypt/decrypt even large files ... ...\n- Size :568K\n- Encryption freeware that allows you to protect the privacy ... key encryption. Encryption and Decryption is encryption freeware for a wide range of users who ... to keep and transfer private information in a secure way. Once ... the Internet. Encryption and Decryption (encryption freeware) allows you to encrypt ...\n- Size :4,530K\n- The NeuroSolutions for MATLAB neural network toolbox is a valuable addition to ... (www.neurosolutions.com) inside MATLAB and Simulink. The toolbox features 15 neural models, 5 ... learning algorithms and a host of useful utilities integrated in an ... to begin using the product. The toolbox is also integrated with ... ...\n- Size :9,833K\n- Encryption and Decryption Pro is strong text and file encryption software for personal and professional security. It allows you to protect the ... key encryption. Encryption and Decryption Pro is developed for a wide range of ... to keep and transfer private information in a secure way. Once ... ...\n- Size :4,604K\n- Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net ***Support ... ***Support standard encryption and decryption algorithm like RSA, RC4, DES etc Ultra Crypto ... AES256. The encryption and decryption algorithm is implemented by underline crypto service providers. ... ...\n- Size :1,024K\nTop Download in image encryption and decryption using matlab code\nTop Rreview Rating in image encryption and decryption using matlab code\n- Copyright(c) freedownload3.com All Rights Reserved.", "label": "No"} {"text": "The new generation of Atego BlueTec Hybrid distribution truck will be presented on the IAA 2010. The latest hybrid uses a new-generation of high-voltage lithium-ion batteries. The engine start/stop system (MSS), which has been available for conventional Atego for years, has been further optimised for the hybrid variant. It reacts even faster to red traffic lights and stop-and-go traffic much faster by shouting down the engine. The vehicle operates with so-called parallel hybrid drive. Together or separately, a Blue Tec 5 diesel engine with EEV technology and an electric motor take on the propulsion. The electric motor sources its power from lithium-ion batteries that feed on recuperated braking power. In they field trials, the developers measured a fuel saving and an accompanying CO2 reduction of between 10 and 15 percent. This version has the European type approval for series vehicles 2007/46/EC.\nI want to buy Ashok Leyland Alrd-20\nThe Coles crane in pic 24 is of great interest,I drove one of these Mk.4s in Germany back in 1970-71,it was nt in this colour scheme though!.Is this crane still around?.rnAlan\nI want sensor diagram and function about sensor bs111 military vehicles\nPlease send me tecnical data als mk-4abs", "label": "No"} {"text": "PM appoints Chief Science AdvisorPrime Minister\nPrime Minister John Key has appointed distinguished scientist Professor Peter Gluckman to be the first Prime Minister’s Chief Science Advisor.\nMr Key says Professor Gluckman is one of the country’s leading scientists and he will make an important contribution in the newly created part-time role.\n“This appointment delivers on the Government’s goal of including science at the heart of our decision-making.\n“I campaigned on creating this role because I recognise that New Zealand’s prosperity rests on our ability to make full use of the expertise that our scientists can contribute.\n“Professor Gluckman will provide me with a direct line to advice when I need it. He will be an independent voice that will complement existing channels of advice such as government departments and the Royal Society.”\nProfessor Gluckman will not be involved in science funding processes. This will remain the responsibility of existing government agencies.\n“This role is one of vital importance that demands not only a high level of science expertise, but also the utmost integrity to fairly represent the state of science knowledge.”\nProfessor Gluckman will step down from his role as Director of the Liggins Institute but will remain employed by the University of Auckland.", "label": "No"} {"text": "Multiparty Model Development Using Object-Oriented Programmingby Daniel N. Nvule, Massachusetts Water Resources, Authority, Boston, United States,\nDocument Type: Proceeding Paper\nPart of: Water Management in the '90s: A Time for Innovation\nAbstract: The Massachusetts Water Resources Authority (MWRA) has taken advantage of recent advances in object oriented programming to build a flexible input and output model of its water supply system. All interested parties were involved in model building. The result has been quick evaluation of the impacts of decisions and timely building of consensus among the parties involved.\nSubject Headings: Water resources | Water supply systems | Computer programming | Mathematical models | Hydrologic models | Computer models | Building management | North America | Massachusetts | United States\nServices: Buy this book/Buy this article\nReturn to search", "label": "No"} {"text": "The University of Washington has announced the establishment of the Institute for Protein Design. Our Institute is located within the Department of Biochemistry at the UW School of Medicine. Our mission is to design synthetic proteins that address challenges in medicine, energy, and technology.\n“A major challenge for designing proteins for specific purposes is predicting three-dimensional shape from the amino acid sequence. Dr. David Baker, UW professor of biochemistry and an investigator of the Howard Hughes Medical Institute, has had remarkable success in making these predictions and in designing new proteins with new functions.”Dr. Paul Ramsey, CEO of UW Medicine\nWith David Baker as our founding director, this Institute will combine and expand strengths within the University of Washington, Seattle, and beyond. We will integrate expertise in biochemistry, engineering, computer science, and medicine, all while leveraging unique strengths in our city’s software industry.", "label": "No"} {"text": "Mazda Motor Corporation will exhibit two concept models at the 2017 Tokyo Motor Show: one that heralds the company’s next-generation products and another that embodies the direction of its next-generation designs. The product concept, a compact hatchback that fuses next-generation technology and design, makes its world premiere in Tokyo.\nIt features Skyactive-Vehicle Architecture, next-generation technologies based on Mazda’s human-centred design philosophy that deliver optimum functionality. The design vision model, meanwhile, defines Mazda next-generation design concept – a more profound expression of the globally acclaimed Kodo design language that debuted on the Mazda CX-5 in 2012.\nBy A&D|2017-10-10T09:58:39+02:0010 October 2017|NEWS|", "label": "No"} {"text": "AutoAnything Coupon Code, Promo Code & Coupons\nAutoAnything coupons 2018. Get AutoAnything coupon code, promo code and discount offers at CouponsKiss.\nUse AutoAnything coupon code to get 17% Off on auto accessories. Share AutoAnything promo code and discount code with your friends via facebook, twitter, pinterest and email.\nPlease share your AutoAnything reviews, comments and feedback in the comment box.", "label": "No"} {"text": "I use the current quarantine to work with Node RED I am planning a demo user frontend. The goal is to simulate a customer order using a simple form, with text fields, dropdown menues and radio boxes. It should run on a tablet or so.\nThe data should be submitted in two seperate CSV files, one containing the input data (e.g. name), and one containing additional data to create the actual sales order in the ERP.\nDo you think this could be developed easily using Node RED? I've seen a dashboard plugin called \"Forms\" or so in a video, and I've come across a method using HTML and CSS.\nHave you made any experiences with forms/user frontends and Node RED? Any experiences and recommendations?", "label": "No"} {"text": "Personalized Action Figures Spring to Life\nJuly 14, 2022\nFormlabs 3D printers, materials, and processes are powering the Hasbro Selfie Series, a new family of custom action figures produced at scale.\nMicro Versus Nano 3D Printing\nJune 28, 2021\nThere’s a place for nano 3D printing in research applications, but micro 3D printing is more practical for parts like small electrical connectors, cardiovascular stents, microfluidic devices, and micro-electro-mechanical systems (MEMS).\nProtolabs’ 3D Printing Service Lands Wayzn CES Innovation Award Honors\nJanuary 14, 2020\nWayzn Slide allows dog owners to let their pets out, even while away.\nSPACE 3D Launches and Makes Large-Scale SLA 3D Printing Affordable for Everyone\nDecember 9, 2019\nNow, beginners, hobbyists and professionals can achieve fast, high-resolution and large-scale SLA 3D printing.\nDWS and Huntsman Form Cooperation to Bring Resin to Market\nNovember 19, 2019\nThe collaboration will give footwear companies and other industrial manufacturers access to the SLA 3D printing of a new kind of polyurethane-based resin.\n3D Print Approach for Membranes\nJune 21, 2016\nPenn State has developed a way to quickly create patterned ion exchange membranes.\nLeadership Profile: Matt Sederberg of Coreform Discusses how Isogeometric Analysis can Improve Workflows\nCoreform IGA allows users to perform simulations directly on CAD models.\nEditor’s Pick: Understanding Complex Engineering Data\nBETA CAE Systems starts year with new product announcements.\nToggle3D Unveils Big Tech Advancements\nToggle3D enables the creation, design, configuration and deployment of 3D models at scale, using CAD files.\nWeber State Installs Impossible Objects CBAM 3D Printer\nThe Composite-Based Additive Manufacturing (CBAM) system is installed at Weber State University's MARS Center at Hill Air Force Base, UT.\nEditor’s Pick: Fusion 360 Direct Coordinate Measurement\nReverseEngineering.com 2023 Fusion 360 Faro and Romer Arms add-in allows the users of...\nEditor’s Pick: Next-Gen Graphics Processing\nNVIDIA RTX 6000 Ada Generation available from PNY.\nEditor’s Pick: Increasing 3D printing productivity\nFormlabs Automation Ecosystem for Formlabs 3D printers are designed to reduce the...\nEditor’s Pick: Faster meshing for simulation\nCoreform Cubit 2022.11 features impact core workflows including meshing, geometry modification and import...", "label": "No"} {"text": "SentinelOnes unified next-generation endpoint protection platform give you the ability to:\nPredict Malicious Behavior\nAutonomous monitoring and dynamic behavior tracking detect malicious activity across all threat vectors.\nRapidly Eliminate Threats\nFully-automated, integrated response capabilities eliminate threats and roll manipulated files back to trusted states.\nSeamlessly Adapt Defenses\nCloud intelligence and machine learning seamlessly adapt your endpoint and server defenses against the latest malware and attacks.", "label": "No"} {"text": "Advanced international standardization,\ngreen ecology, intelligent high-end equipment\nR & D manufacturing base\n- In pursuit of highly reliable and quality product, Safe-run always adhere the principle of self-independent processing and controlling of the core-components production. Safe-run use latest international advanced mechanical equipment such as fixed beam series gantry five-sided processing center, horizontal boring and milling processing center, vertical processing center, and turning and milling compound processing center.\nSafe-run firmly believes that the high-precision parts are the basic unit of high-end equipment; and the high performable raw-materials as well as high-precision testing means are the basis of reliable components processing. As a result, Safe-Run implements physicochemical risk management room and ultra-precision testing center.At the same time, Safe-Run also has a mechanical engineering laboratory with ambient temperature of 20°C±1°C and dust-free air treatment, which is mainly used for the experiment of key components through the test data to guide and verify the R&D design.", "label": "No"} {"text": "Supply chain disruptions are inevitable, and they show little sign of abating. Therefore, some startups and logistics firms have deployed AI to solve supply chain disruptions. Reuters finds that the market for advanced technology that solves supply chain issues will cross $20 million per year for the coming 5 years, while Gartner informs that in the future, 80% of supply chain applications will use AI in one or the other way. Interos raised $1 billion in its latest funding due to its ability to map out 400 million businesses globally. The Virginia-based company, Arlington, mentioned that the AI-driven functionality allows the company to immediately alert customers if fire, hacking, or flood causes potential disruption. Another firm, KlearNow, deploys AI to automate paper-dominated customs clearance processes, which helped England-based EED Foods in keeping track of hundreds of shipments. Autotech Ventures, a Silicon Valley venture capital firm, has also invested in AI-empowered supply chain solution providers like KlearNow and Newtrul.", "label": "No"} {"text": "B.A., Math, B.A. Computer Science, Univ. of Wisconsin. Series 65\nB.S., Operations Research and Engineering, Cornell\nB.S., Business Management, Simmons College. Certificate in Accountancy, Bentley University.\nB.S., Civil Engineering. B.S., Management, MIT MBA, Harvard\nB.S., Biology, Harvard. Ph.D., Brain & Cognitive Science, MIT\nB.A. Computer Science, Harvard\nB.A., English, Cornell University\nM.Sc. & Ph.D., Electrical Engineering, Wireless Communication, WPI\nB.A. Sociology, Bucknell University\nB.S. Business Administration, Northeastern\nB.A. Mathematics and Music Composition, University of Oregon. Ph.D. Computer Science, Harvard.", "label": "No"} {"text": "Save 20% Off Stock Safety Covers! Shop now!\nDue to peak season shopping, carriers may be delayed in delivering orders.\nPool Pilot Digital Salt Chlorine Generator\nUsing less electricity than a 200-watt light bulb, the Auto Pilot models have a patented temperature compensation feature that will adjust sanitization production based on the demands associated with the water's temperature. Featuring microprocessor controls and a digital display of essential data, these systems sanitize using salt chlorine and operate automatically in water temperatures up to 104 degrees Fahrenheit.\nThe Pool Pilot ORP Relay Kit allows you to connect to a Rola-chem automated controller. Rola-chem controllers do not have a dry contact ORP signal to make it completely compatible with Pool Pilot DIG-220 Salt System. The Relay Kit has the standard 110 volt pigtail that plugs into the Rola-Chem controller. In the relay kit, there are two cables with the correct molded connector that plugs into the bottom of the DIG-220. In this configuration, the DIG will be set on 0% output and when the Rola-Chem calls for ORP FEED, the DIG will display ON and activate the cell.\nNote: The second cable on the relay kit will not need to be used and can remain rolled up and tie-wrapped.\nWe’re sorry we missed you; we look forward to assisting you soon. Feel free to leave us a message and we will be in touch as soon as an agent is available. For urgent questions, you can reach us directly at 1-800-288-7946. Thank you for your business!", "label": "No"} {"text": "Digital Ocean Server Reset, NodeJS Not Working!\nHi there, So recently my DO droplet was reset due to some creation problem in the NYC1 area. My droplet was running count.ly (an analytics software) and now it gives me this error: Express 500 Error: failed to connect to [localhost:27017] at null. (/root/countly/frontend/express/node_modules/mongoskin/node_modules/mongodb/lib/mongodb/connection/server.js:569:74) at EventEmitter.emit (events.js:106:17) at null. (/root/countly/frontend/express/node_modules/mongoskin/node_modules/mongodb/lib/mongodb/connection/connection_pool.js:139:15) at EventEmitter.emit (events.js:98:17) at Socket. (/root/countly/frontend/express/node_modules/mongoskin/node_modules/mongodb/lib/mongodb/connection/connection.js:475:10) at Socket.EventEmitter.emit (events.js:95:17) at net.js:441:14 at process._tickCallback (node.js:415:13) How can I fix this? Any help is appreciated!", "label": "No"} {"text": "CAREV Jury (r.1944) Head of Department \"Technical service of agricultural machinery\", Rostov-on-Don State Academy of Agricultural Engineering (RGASHM GOU), PhD (2001), Professor (2004). He graduated from the Military Academy. FE Dzerzhinsky (1980).\nHis research interests in the field of testing and reliability of complex technical systems.\nPublished over 50 scientific works.", "label": "No"} {"text": "Lucci Air Nordic ceiling fan with dimmable LED warm white light in white with white wash blades complete with 6 speed remote control with wall mount. The Nordic LED ceiling fan with light is a truly unique design that draws inspiration from the cool air from the Nordic regions. Complete with an integrated 3000 kelvin LED light kit producing 1100 lumens. The Nordic LED is a super-efficient ceiling fan which will suit a variety of applications. The Nordic LED ceiling fan is dimmable, with a 6 speed remote with reversable function and wall mount. Energy-Efficient DC ceiling fan in matt white Blade color - white wash Integrated 3000 kelvin LED light kit produces 1100 lumens Indoor rated, perfect for kitchens, living rooms, bedrooms, and offices Dimensions: 56 Inch. L x 56 Inch. W x 13 Inch. H 6-speed Remote control with wall mount included Light kit includes One 20W LED light Remote Control LED Dimmable Light Reverse function remote control Additional down rods lengths sold separately: 12 Inch, 18 Inch and 36 Inch - 21055012, 21055018, 21055036 Additional remote control sold separately - 91091402\nLucci Air Matt White and White Wash Blades LED Ceiling Fans\nDue to some manufacturer's pricing policies, additional discounts cannot be applied to all items. Promo codes provided in emails or on this product detail page can be entered during checkout to determine an item's discount eligibility. Please note sale, clearance, doorbusters, hot buys, open box and temporary price cut items are not eligible for additional promo code discounts.", "label": "No"} {"text": "about a week ago the option to enable full screen when a partner shares screen is not working, we use it as an educational resource but it is not working on computer or cell phone, if you could fix that I would be very satisfied:)\nHi & thanks for your feedback! You should be able to switch to full screen by pressing the “f” key or by double clicking on the video. Does that help?\nthank you, it works correctly:)", "label": "No"} {"text": "Home | Submit a file | New | Categories | RSS Feeds | Blog\nFree Software Advertising\nItís only an archive information about the software (no link to download) as we cannot download the software.\nThe tool captures screen video in any possible resolution including HD and records it into a light-weight executable that is playable even on low-end Win98 computers, since it doesn't require DirectX, OpenGL or video drivers. High video quality.\nThis sophisticated piece of software turns your computer into a modern, State-of-The-Art spectrum analyzer giving you features that go far beyond the possibilities of any stand-alone hardware unit.VST Plugin support\nA personalized faxing software can reach thousands of people with no limit. This easy to use product is your ideal communication tool for fax marketing, customer communication, event notification, newsletter publishing and more.\n10% of users liked this software\nSeptember 16, 2010\nDescription from the Publisher\nAWS Video Screen Record is a screen capture tool capable of recording every action you perform on your desktop into a light-weight video file playable on any Win98 computer, even if it doesn't have DirectX. The capture process consumes a tiny bit of processor time and can record virtually any screen size up to HD with high FPS rate. With this tool you can create a high-res AWSVSR video tutorial and share it via Internet with minimum effort!\nUsers reviews & testimonials\nThis software is not reviewed yet.", "label": "No"} {"text": "Great battery, plenty of power and kicks the bike up very easily. (Tanya were exceptional, I spoke to them at around 3pm, battery was here at 10am next morning).\nMT - Crewe -\nFitted To: Suzuki GS450L 450 1983\nExcellent product! Excellent delivery! Excellent honest company!!\nKB - Buckinghamshire -\nFitted To: Kids Corvette mini battery powered", "label": "No"} {"text": "We support research groups at the Crick by synthesising peptides, peptide arrays and small molecules for use in experiments to study how biomolecules (e.g. proteins) interact with each other.\nPeptides are linear polymers made up from the 20 common amino acids, joined together like beads on a string in any order. They vary in length from two to 80 amino acids. Most peptides have the same order of amino acids but may be modified by dye labels or other alterations.\nWe assemble and modify these peptides by chemical synthesis on a solid support. This process is known as 'solid phase peptide synthesis'. Once we have assembled the amino acids with any necessary modifications, we check and purify the peptide.\nPeptides form part of many experiments: as part of protein-protein interaction studies, as enzyme substrates or as standards for mass spectroscopy analysis. Peptides can also be used to transport active molecules into cells, to purify proteins, or to synchronise budding yeast cultures. Peptides can be used to raise antibodies against sites of modification within proteins.\nThese experiments allow Crick researchers to study in detail how proteins interact with each other. For example, researchers use peptides to work out which proteins repair damaged DNA. This gives insight into how small molecule drugs which interact with repair proteins could be used to treat disease such as cancer.\nWe also undertake small molecule synthesis by solution phase chemistry techniques and can produce enzyme substrates, mass spectrometry standards and cross-linking reagents as well as compounds which modulate how proteins interact with each other.\nWe are experts in chemistry and host Crick researchers in the chemistry lab by providing synthesis expertise and safety supervision as well as fume hood space. We help Crick researchers select high quality small molecule probes to find the best tool compound to test their biological hypothesis.", "label": "No"} {"text": "|Software Engineering Analytics research at University of Wollongong (SEA@UOW)|\nThe pervasiveness of software products in all areas of society has resulted in millions of software projects (e.g. over 17 million active projects on GitHub) and a massive amount of data about their development, operation and maintenance (e.g. the well-known Web browser, Mozilla Firefox project, currently has over 300 releases and 1.5 million issues reports since its initial release in 2002). This huge amount of software engineering data is continuously generated at a rapid rate in many forms such as user stories, use cases, requirements specifications, issue and bug reports, source code, test cases, execution logs, app reviews, user and develop mailing lists, discussion threads, and so on. Hidden in those Big Data are insights valuable to project managers, software engineers and other stakeholders about the quality of the development process and the software product, and the experience that software users receive.\nUsing cutting-edge machine learning and data mining techniques, our Software Engineering Analytics (SEA) research team aims to develop analytics technologies which specifically turn software engineering data into actionable insight. We believe that SEA will significantly improve the theory and practice of software engineering, enabling us to build better software and build software better, addressing both quality and productivity needs.\nBelow are some exemplar projects that we have done:\nUsing the same analytics data-driven approach, we can also build predictive models/recommendation systems for the following (but not limited to):\nAll the datasets used in our publications are made publicly available here. If you use our datasets, please cite our relevant paper in your publication.", "label": "No"} {"text": "I met an hacker sometime ago who duped me of $400. i told him i needed him to help me change my school grades and he ...(more)\nHACKERS ARE HELPING PEOPLE FIX THEIR CREDIT RATING, PREDICT CHANGES IN THE STOCK MARKET, BREACHING INSTITUTIONS ...(more)\nSCHOOL GRADE EXOERT… If you are looking for a professional hacker that is specialised in SCHOOL GRADE CHANGE. Conta...(more)\nHi here... i'm here to thank email@example.com (thats what he calls himself lol) for saving me from the most...(more)\nPlease be aware that Brothersoft do not supply any crack, patches, serial numbers or keygen for Code QReator,and please consult directly with program authors for any problem with Code QReator.\ncell phone video player | simple floor plan generator | gtunes for pc | windows 2007 | mobile phone wallpaper eeyore | download edit photo untuk nokia c3 | samsung unlock code generator | zip code look up area code | backtrack 5 download for windows | tally code | n70 nokia pc suite | windows xp audio driver | c2-00 size watch sex video | free cell phone flash software | code 128 bar code | codec amv | torrent code | camfrog code | best code | Code Name | code of honor 3 | getjar quick download code | code e", "label": "No"} {"text": "I am learning pine script at the moment and this is my first attempt at creating an expire time based strategy for binary options based on a simple example like the built-in Channel Break Out Strategy.\nThis is a script to help the beginners locate the candle patterns. It has a nice code that can be used in other scripts too. Easy to use with separated functions, simple patterns and complex patterns detections.\nI have done some updates at the Candlestick Patterns Identified script by @repo32. Was a good start of my ideia. Tks for sharing repo.\nIt will be...\nthis is a simple strategy using a simple moving average crossover strategy. Great for those wanting to hold longer positions on trades. Even by itself, it does quite decent on the larger time frames. Note that this strategy is not that useful for smaller time frames, so stick to larger time frames.", "label": "No"} {"text": "Two weeks has passed since Club Penguin released the Pi Pie Pin so a new pin has been hidden on the island! The new pin is the Fishing Rod Pin. You’ll find it at the Hidden Lake. This is the tenth pin to be hidden at the Hidden Lake and it is Club Penguin’s eighth pin of 2015. The last pin to be hidden at the Hidden Lake was the Orange Slice Pin back in June 2014.\nIf you’re interested in putting my pin tracker on your website you can get the HTML code to embed it on this page.\nThe following pages have been updated:", "label": "No"} {"text": "Offset carbon. Win the game. Save the planet.\nWe automatically show you the stats for the wallet address you're connected with.\nYou want to see how another Ethereum address is doing?\nType it into the field below and let the button show you the stats.\nYou can reset to your wallet address by clicking the other button.\nCan you spot your rank on the leaderboard? We helped a little.\nFetching data from the Ether ...", "label": "No"} {"text": "مضحك البحر جدران العجل - لا يصدق لطيف ختم قليلا خلفية حية لالروبوت. كنت فقط أنظر إليه، ما كان لطيف ومضحك، إيجابية ورقيق. وهذه الخلفيات تبدو كبيرة على شاشة جهازك المحمول.\nهل لديك فرصة لتغيير السرعة.\nاستخدام خالية تماما خلفية حية.\nمضحك البحر جدران العجل\nAllows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.\nAllows the app to view information about network connections such as which networks exist and are connected.\nAllows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.\nAllows the app to get your approximate location. This location is derived by location services using network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine approximately where you are.\nAllows the app to prevent the device from going to sleep.\nAllows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the device and allow the app to slow down the overall device by always running.\nAllows the app to get your precise location using the Global Positioning System (GPS) or network location sources such as cell towers and Wi-Fi. These location services must be turned on and available to your device for the app to use them. Apps may use this to determine where you are, and may consume additional battery power.\nAllows the app to access extra location provider commands. This may allow the app to interfere with the operation of the GPS or other location sources.", "label": "No"} {"text": "DelphineDAoust January 27, 2020 Analysts Coverage\nThis Informative Article Explains five good reasons why you need to worry with fraud and data security. If you're participating in obligations in virtually any manner, then that has surely got to become old news for you personally. Likely what is more useful is that the excuse of the benefits of focusing on the security of information:\n1 way to Decrease the Likelihood of charge card information and Consumer information from stepping to the wrong hands is maybe not to processor save the data! Exactly enjoy the Thai restaurant said at the start of this post, the dog owner decided never to simply accept cash obligations, thus lowering the odds of monetary loss because of robbery.\nBut, Perhaps Not storing or processing charge card particulars and Consumer information usually means that lots of organizations would need to improve their business mode land out source to another firm, or venture out of business.\nIn many businesses round the world, information is your Very Best advantage for Their enterprise, 2nd only for their own employees. Since data is crucial to keeping businesses running and consuming the professional services that they build so as to compete, the most appropriate plan of actions is always to use the exact data hand and also collect much more data, while choosing the essential measures to guarantee it all is protected and kept confidential.\nNothing generates Increased friction between a Business and its own Consumers compared to the usual data breach. Being forced to ship the'correspondence of information breach telling' to any or all clients affected and owning a data breach episode is costly, frustrating,and also a significant diversion from creation. It's likewise highly caustic to a brand and also a significant destroyer of attentively made customer confidence.\nData safety, when employed together with powerful information security Methods, really empowers businesses to access and extract more value in their data stores. Departments should swap data to work, but this procedure can be kept up by the probability of exposing confidential identity info. Together with data-centric security, there is not any longer a concern because precisely procured data might be examined, researched, and used to conduct analyze scenarios and answer customer questions while the data remains in a safe country.\nData-centric Security concentrates on protecting the information\nThe'data-centric' method of information protection Might Be the considerably Desired change many small business leaders must look into protecting and also privatizing charge card information and user data. The data-centric strategy focuses mostly on:\nAssessing information in its first point of entrance\ndisplaying the information just once required\nThe primary advantage together with all the data-centric Strategy is that info is Secure during a venture, whether or not it's in motion or at rest. When a small business critical a customer-facing section requires the first data, then a petition is perfect to get usage of the initial data. The petition can be protected, which complies with laws and regulations requiring documented accessibility to data.\nWith the Ideal strategy, info protection reduces danger for personal Data, that benefits you and your visitors. Checkout this Whitepaper To find out how data-centric security may simultaneously meet the Requirements of multiple data security regulations and standards \"\nTag Clouddata impact assessment europe data privacy azure backup vault dell data security gdpr protection dell data encryption dpm server gdpr data security data protection services privacy shield and gdpr customer data protection data privacy impact assessment storage limitation gdpr data privacy database protection google and gdpr gdpr sensitive personal data gdpr for employees european privacy gdpr gdpr notice advanced data security gdpr 72 hours data protection technologies gdpr data eu data privacy cloud data protection gdpr employee data data commissioner data protection and privacy eu privacy data protection eu personal data privacy shield gdpr dell encryption enterprise data protection solutions gdpr 2019 data protection agreement cososys endpoint protector gdpr data transfer gdpr overview gdpr impact assessment data processing agreement gdpr dpia gdpr opm credit monitoring management fraud gdpr neatly arranged data loss protection personal data protection dell ddp gdpr model clauses ftc data privacy understanding gdpr irish data protection commissioner dell data protection encryption data subject enterprise data protection emc data protection advisor gdpr document eu gdpr commission eea gdpr gdpr healthcare vadp ibm guardium sensitive personal data gdpr gdpr one year on dpa data protection agreement gdpr data privacy eduardo ustaran dpa 1998 gdpr data processor gdpr information gdpr cyber security data protection advisor european internet privacy data privacy companies gdpr european commission encryption at rest consumer data protection emc dpa gdpr privacy notice gdpr data protection dpia data protection impact assessment data protection ireland gdpr eea data data security gdpr lawful basis ico data aws data protection microsoft data protection ico gdpr personal data under gdpr gdpr dpa business data security mcafee complete data protection data security and privacy eu gdpr database security data shield dpa gdpr gdpr 2018 dla piper data protection european data protection the gdpr sensitive data gdpr irish dpa fraud analyst gdpr implementation gdpr consultants general data protection data privacy protection gdpr in a nutshell personal data privacy data protection commissioner gdpr data retention dell encryption lawful basis gdpr data privacy solutions ibm guardium data encryption google data security gdpr database personal data security consumer data privacy data protection management system virtual data protection dpa data protection scdpm data protection security azure data loss prevention fraud risk assessment coso dell ddpe gdpr security gdpr personal information gdpr dsar gdpr model contract clauses gdpr data subject ico data protection eu dpa fraud data analytics gdpr may 2018 patient data security data at rest protection pii protect european union data protection protect your data data security solutions gdpr outside eu edpb eu data protection ensilo data protection collector ico dpia data leak protection gdpr eea data privacy management aws data privacy gdpr eu gdpr dpia dutch dpa gdpr customer data guardium data protection gdpr personal data azure data protection fraud assessment data and privacy fraud risk assessment protect my data gdpr services gdpr storage limitation sophos data protection is off protecting sensitive information dpa 2018 bitlocker data protection fraud and risk management fraud risk personal data protection commission dsars data protection impact assessment gdpr data protection companies gdpr personally identifiable information global data privacy data protection and security gdpr impact fraud risk management gdpr cloud dell encryption personal pii data protection data privacy agreement dell data protection suite gdpr contract data transfer agreement gdpr gdpr anonymized data cloud encryption internal fraud cloud data privacy model clauses gdpr dell emc cyber recovery", "label": "No"} {"text": "The APL c compiler project\nA program that compiles APL into C code that can then be used to compile into native code. Supplied in C source code form only but tested to work on eComStation v2.\n- v6.17 Development version / Feb 2013\n- v6.13 Stable version / Feb 2009\nA working C compiler.\nAppears to be in the Public Domain.", "label": "No"} {"text": "Today’s study suggested that many HDAC inhibitors were able to synergize with proteasome inhibitors and overcome BTZ-induced resistance in MM [24C26]. GraphPad Prism5 software. Results NexA suppressed NK-252 viability and induced G1 phase arrest of human MM cells To evaluate the effect of NexA on the cell viability < 0.05, **< 0.01, ***< 0.001. (G and H) Western blot showed the protein levels of CDK2 after treatment with 30 M NexA for 48 h. To understand the growth inhibition effect of NexA on MM cells, flow cytometry was performed to analyze cell cycle distribution in RPMI-8226 and U266 cells. The collected data demonstrated that the percentage NK-252 of cells arrested in G1 phase increased in the group treated with 30 M NexA, while that in the S phase declined. The percentage of cells in G2 phase remained stable in RPMI-8226 cells but decreased slightly in U266 cells (Figure 1E,F). We performed Western blot to examine the change in the level of Cyclin-dependent kinase 2 (CDK2). It was noticed that NexA diminished the expression of CDK2 in both cell lines (Figure 1G,H). NexA induced cell apoptosis in human MM cells To investigate the apoptosis-inducing effect of NexA on human MM cells, we examined cell apoptosis in RPMI-8226 and U266 cells using dual staining with PI and Annexin V-FITC. The two cell lines were treated with different concentrations of NexA for 48 h. Flow cytometry analysis showed increases of the percentage of apoptotic cells in a dose-dependent manner in both cell lines (Figure 2A,B). The detection of apoptosis-associated proteins demonstrated that NexA treatment led to the cleavage of Caspase3, Caspase9 and PARP1 in both cell lines (Figure 2C,D). These data indicated that NexA effectively elicits apoptosis of MM cells. Open in a separate window Figure 2 NexA induced cell apoptosis in human MM cells(A and B) Apoptosis in RPMI-8226 NK-252 and U266 cells was analyzed by Annexin V-FITC/PI double-staining flow cytometry after treatment with various concentrations of NexA for 48 h. Histograms are representative of three independent experiments. Error bars indicate mean SD; NK-252 *< 0.05, **< 0.01, ***< 0.001. (C and D) Apoptosis-associated protein expression levels in RPMI-8226 and U266 cells treated with 30 M NexA for 48 h were shown by Western blot. NexA contributed to overcome bortezomib resistance for human MM cells Bortezomib (BTZ) has been successfully applied in the treatment of MM over the last decade. While the clinical benefit of BTZ in MM remains unchallenged, the extensive occurrence of resistance imposes restrictions on the long-term utility . RPMI-8226/BTZ100 cell lines grow in the presence of Rabbit Polyclonal to OR52E4 100 nM BTZ. The 96-h IC50 value of RPMI-8226/BTZ100 cells toward BTZ was demonstrated to be 105.9 14.9 nM by cytotoxicity assay . We confirmed BTZ-resistance in RPMI-8226/BTZ100 cells relative to RPMI-8226 cells after 48-h BTZ exposure. Cell viability assay showed the 48-h IC50 values toward BTZ to be 12.89 nM in RPMI-8226 cells and NK-252 194.9 nM in RPMI-8226/BTZ100 cells (Figure 3A,B). Subsequently, we conducted CCK8 assays to detect the inhibitory effects of NexA on RPMI-8226/BTZ100 cell lines. The data indicated that the viability of RPMI-8226/BTZ100 cells was remarkably suppressed by NexA in a dose- and time-dependent manner (Figure 3C,D). Furthermore, induction of apoptosis was detectable in RPMI-8226/BTZ100 cells after 48-h exposure to NexA even at.", "label": "No"} {"text": "Interested in using an external HDD for storage of movie footage\nI am interested in helping a friend to use an external HDD which will connect to a USB port for storage of training movie footage. With this point in mind, what type of storage space will he be needing for such an endeavor?\nWatchGuard DNSWatch reduces malware infections by detecting and blocking malicious DNS requests, improving your ability to protect employees from phishing attacks. Learn more about our newest service included in Total Security Suite today!", "label": "No"} {"text": "The great potential of induced pluripotent cells (iPS) cells is that it allows the possibility of deriving pluripotent stem cells from any human patient. Generation of patient-derived stem cells serves as a great source for developing cell replacement therapies and also for creating human cellular model systems of specific diseases or disorders. This is only of benefit if there are well-established differentiation assay systems to generate the cell types of interest. This chapter describes robust and well-characterized protocols for differentiating iPS cells to neural progenitors, neurons, glia and neural crest cells. These established assays can be applied to iPS cell lines derived from patients with neurodegenerative disorders to study cellular mechanisms associated with neurodegeneration as well as investigating the regenerative potential of patient derived stem cells.", "label": "No"} {"text": "An inhibitory pull-push circuit in frontal cortex.\n- Author(s): Garcia-Junco-Clemente, Pablo;\n- Ikrar, Taruna;\n- Tring, Elaine;\n- Xu, Xiangmin;\n- Ringach, Dario L;\n- Trachtenberg, Joshua T\n- et al.\nPublished Web Locationhttps://doi.org/10.1038/nn.4483\nPush-pull is a canonical computation of excitatory cortical circuits. By contrast, we identify a pull-push inhibitory circuit in frontal cortex that originates in vasoactive intestinal polypeptide (VIP)-expressing interneurons. During arousal, VIP cells rapidly and directly inhibit pyramidal neurons; VIP cells also indirectly excite these pyramidal neurons via parallel disinhibition. Thus, arousal exerts a feedback pull-push influence on excitatory neurons-an inversion of the canonical push-pull of feedforward input.", "label": "No"} {"text": "Currently, I have an attended robot (node locked) running from a dedicated notebook.\nI would like to do following:\n- Can this robot be managed from Orchestrator? I would like to centrally control all robots.\n- What do I need to do if I want to change the notebook that’s hosting the current robot to a new notebook?", "label": "No"} {"text": "The health crisis that we know is forcing companies to reinvent their ways of communicating, with their employees, their subsidiaries, or their customers.\nIt is for this purpose that apex, a key player in audiovisual solutions in Luxembourg, today offers its audio and video recording studio to companies wishing to get their message out.\nThe latter can thus record a conference, with one or more speakers intervening in turn, before broadcasting it to the desired audience (a professional network or a public connected remotely). This simple alternative communication solution makes it possible to transmit a message quickly, which can prove very useful in the current context.\nFor companies that want to communicate directly from their premises, apex also offers all the necessary videoconferencing equipment, as well as its installation.\nThe secure broadcasting solutions offered by apex can be done via various platforms in order to meet the majority of requests.", "label": "No"} {"text": "Concordia’s Climate Clock will update on December 12 — and time is ticking!\nOn December 12, Damon Matthews, professor in the Department of Geography, Planning and Environment in Concordia’s Faculty of Arts and Science, will be joined by author, musician and entrepreneur David Usher to address how much time is left before global warming starts to become really dangerous.\nThe two are co-creators of the Climate Clock project, a real-time measurement of how long we have until the average global temperature surpasses 1.5 °C above pre-industrial averages, the lower limit of the temperature target established by the Paris Agreement.\n“Our goal in developing the Climate Clock was to create something visual and intuitive that would introduce time — a quantity that we all understand — into the climate conversation,” says Matthews, who is also Concordia Research Chair in Climate Science and Sustainability.\n“By showing the time remaining until we reach the 1.5°C mark, we feel that the clock is able to communicate the urgency of action in a way that people understand and can relate to.”\nThe clock is updated once a year, often around the anniversary of the signing of the agreement. This will be the fifth update since the project launched in 2015.\n“The clock updates have reflected trends in global CO2 emissions,” explains Matthews. “Some years, global emissions did not increase as fast as expected, and these were the years that saw time being added to the clock. The clock has also been adjusted in light of new scientific understanding about how much warming has been caused by humans to date, as well as what allowable emissions remain if we want to avoid exceeding 1.5°C.”\nThe clock will be projected at 4TH SPACE during the update. Matthews and Usher will lead a conversation about the project and what this latest update means at a time when the news about climate change is far from encouraging.\n“This year, global CO2 emissions are expected to increase again, reaching the highest level ever recorded. At the same time, improved measurements of the recent global temperature increase are suggesting that we are a little bit closer to 1.5°C than previously thought,” Matthews explains.\n“The combination of these two changes is not good news for the clock numbers.”\nDespite the fact that current science is discouraging, Matthews says he still has hope that the clock can yet turn in the right direction.\n“I have to remain optimistic! At some point the world is going to have to rally around climate change in a real way — when this happens (and global CO2 emissions start to decrease), we will find out if we are able to add time to the clock fast enough to prevent the worst impacts of global warming.”\nRegister for the December 12 Climate Clock update event at 4TH SPACE.", "label": "No"} {"text": "Technology Innovation Platform (TIP)\n⬝ PreviPharma‘s TIP targets technology companies who would like to take\n⬝ PreviPharma‘s technology innovations to the next level or\n⬝ develop their own technologies for the plasma industry / applications.\n⬝ Further, PreviPharma offers technology marketing services to the plasma industry.\nHow can PreviPharma help?\nPreviPharma functions as a competent moderator to connect\n⬝ the challenges of the plasma fractionators\n⬝ with solutions from the technology suppliers.\nOptimizing the input", "label": "No"} {"text": "Профиль Centralschweizerische Kraftwerke AG\nCentralschweizerische Kraftwerke AG engages in the production, distribution, and sale of electricity. It operates through the following segments: Energy, Networks, and Building Technology. The Energy segment includes the production and distribution of electricity. The Networks segment includes construction, maintenance, and management of grid systems. The Building technology segment provides electric and light installation, Alarm and security systems, building automation services. The company was founded on November 2, 1894 and is headquartered in Lucerne, Switzerland.", "label": "No"} {"text": "Audi develops first Supermarket 2.0 for the automotive industry\nAt its headquarters in Ingolstadt, Audi has implemented the goods-to-person principle in series production for the first time in the industry. In the so-called Supermarket 2.0, automated guided vehicles (AGVs) transport containers to a fixed pick station in the correct sequence. At each station, a logistics employee prepares the components required on the production line. This is all made possible thanks to innovative control software developed by Audi experts together with Ingolstadt-based start-up arculus.", "label": "No"} {"text": "Thanks very much firstname.lastname@example.org for helping me hack into my cheating husbands phone number, I was able to ...(more)\nI recomend Google Chrome\nTechnology has empowered everybody..its really as big as you can make it and goes as far as you can take it..People a...(more)\nI Basically think we all don't have to face all these deceit and lies from our spouse...in a case of mine wen i got s...(more)\nfirefox user agent | n73 edition mp3 | pulse signature version | dawonload fring for | map component | yahoo answers quotes | surveying cad ware | download god krishna | naturpic video cutter | unlock code mguard | mp3 cutter software | DLL component | norton partition magic\nPlease be aware that Brothersoft do not supply any crack, patches, serial numbers or keygen for MP3 BladeEncoder Component,and please consult directly with program authors for any problem with MP3 BladeEncoder Component.\nserver component C# | xmoov flv player v08.8 | db commander 6.6.0 serial | swing component | mp3 player nokia 7610 | pc pro doc crack | mp3 cutter software | quick bridge for ipad | joomla component | lg cobra 4g lte bluetooth | every component | component .com | xpk d3 | JPG to PDS converter | component- | realbasic mysql plugin | mp3 player nokia 7610 | component | smtp component build | hacking sirius radio | qt component | server component c | nokia mp3 player", "label": "No"} {"text": "Have you guys checked out this guy omer yahav at firstname.lastname@example.org dude's a cyber guru, involved with clo...(more)\nContact Hobbyhack@mail.com is the extremely useful tool to hack Facebook account. I have seen how this guy can help m...(more)\nShould you ever require the services of a hacker, i implore you to try your very best to hire only professionals. hac...(more)\nPlease be aware that Brothersoft do not supply any crack, patches, serial numbers or keygen for Prime Meridian Clock 3,and please consult directly with program authors for any problem with Prime Meridian Clock 3.\nMeridian Lossless Packing | prime meridian | unpacher | clock up | clock wave | phone tools v4 0 | free online dictation courses | nvidia physx 7.11.13 | empire earth patch 1.00.2020 | prime poker | reggaeton mixer software | prime genetator | n73 full application xplorer | .jar software dic | recover deleted sms w800 | prime suspects | prime number spiral | anywhere brute force pc | digital clock for mobile | turbo c latest version | sweet entertainment group shows | micro clock", "label": "No"} {"text": "David Purse has announced the availability of the beta release of Simplicity Linux 15.7, a lightweight Puppy-based distribution for netbooks and desktops. Due to unresolved issues, the \"Desktop\" edition is only available in a 32-bit build for now. From the release announcement: \"Simplicity Linux 15.7 beta is now....\nJuly 1, 2015\nDevelopment Release: Simplicity Linux 15.7 Beta\nRead more at DistroWatch", "label": "No"} {"text": "Hereditary Hemorrhagic Telangiectasia (HHT) is an autosomal dominant disorder characterized by vascular malformations. The genes known to be associated with HHT include ENG (HHT1), ACVRL1 (HHT2) and SMAD4 (JPHT). It has been reported that circulating CD34+ cell subsets repair damaged vessels. To investigate whether mobilization of these cells is present in the peripheral blood (PB) of HTT patients, we analyzed CD34+ cells, CD34+VEGFR-2+ progenitor or mature endothelial cells, and CD34+CD133+VEGFR-2− hematopoietic progenitor cells (HPCs). Cytofluorimetric analysis was performed in 150 HTT patients and 43 healthy subjects (CTRLs). In HTT patients, PB CD34+ cells were significantly increased; the frequency of endothelial cells was higher (P = 0.002), while the frequency of CD34+CD133+VEGFR-2− HPCs was lower (P = 0.00007) than in CTRLs. Results were comparable in patients with ENG or ACVRL1 gene mutation; in patients with ENG mutation, the frequency of the cell subsets inversely correlated with the age of the patients at time of sampling (CD34+), disease duration (CD34+VEGFR-2+), and age at disease onset (CD34+CD133+ VEGFR-2−). In conclusion, HHT patients show an increase of circulating endothelial cells and a decrease of HPCs. In patients with ENG mutation, the frequency of CD34+ endothelial cells correlates with specific clinical characteristics suggesting that their active turnover characterizes the initial phase of the disease.\n- CD34+CD133+VEGFR-2 cells\n- CD34+VEGFR-2+ cells\n- Circulating CD34+ cell\n- Hereditary Hemorrhagic Telangiectasia\nASJC Scopus subject areas", "label": "No"} {"text": "Uniform Flow Calculator\nUniform Flow Calculator description:Here you can download Uniform Flow Calculator with version 1.0.\nThis software was developed by Hamed Mohammadi.\nDistribute by license Freeware and price FREE.\nDownload time for this software with internet channel 512Kb/sec would be 0 seconds.\nYou can download this software from www.daehonges.com domain.\nRelated software for 1.0 Uniform Flow CalculatorImpedCalc Alpha\nRecipe Box Nutrient Calculator\nCreOFF VAT Calculator\nHasher Opera Widget\nWacky Mortgage Calculator", "label": "No"} {"text": "Bachelors of Science in Computer Science (Computer & Network Security Concentration)\nThis undergraduate degree program is offered through College of Computing and Informatics (CCI). The Computer Science concentration in Computer Security is designed to supply graduates with the skills needed to prepare them for a wide range of opportunities. It gives students the ability to design and implement computing security and privacy processes, software and systems. Students use mathematical foundations, algorithmic principles, and computer science theory in the modeling and design of such systems.\nBachelors of Science in Computing & Security Technology (CST)\nThis undergraduate degree program is offered through the College of Computing and Informatics (CCI). The CST program emphasizes practical, hands-on education and provides fundamental concepts that are supplemented by laboratory experience. From webmasters, content-developers, and database specialists to network and system administrators and computer systems security managers, computing technologists serve as key agents in the societal revolution that is changing us from an industrial to a digital, knowledge-based society.\nMinor in Computer Crime\nThis undergraduate minor is offered through the College of Arts and Sciences Program in Criminology & Justice Studies. It provides students with an overview of the behavioral, legal, technical, and administrative issues faced by the criminal justice system and security communities in addressing crime involving computers and related networking technologies. The curriculum exposes students to state-of-the-art solutions used within the public and private sectors to respond to and prevent computer crime.", "label": "No"} {"text": "Uncovering the molecular networks in brain synapses that are the substrate of learning and memory\nHow memory is stored in the brain is the central focus of our research. We see this problem at both the system level, to describe the neural networks that represent the memory, and at the cellular/molecular level, to describe the particular plasticity-determinant proteins on both sides of the synapse that lead to the long-term storage of information. We have taken a dramatic step forward with the articulation of a new theory of memory (see ref. 1) that focuses exclusively on the post-translational modification of proteins already present at the synapse as the molecular substrate for regulating synaptic weights, and a multi-layered positive feedback system to sustain these rapid changes in protein structure. Current studies in our laboratory are testing the implications of this new theory using a multi-level interdisciplinary approach.", "label": "No"} {"text": "1997 Dodge Caravan 6 cyl Front Wheel Drive Automatic 139000 miles\nThe check engine light came on. The code reffered to the Camshaft position sensor. I found out that this is a generic code with several possibilities. I've already changed out the camshaft sensor and the crankshaft sensor. The problem still exists. Here is the problem. The van starts fine and runs good. However, after driving a short distance the van will die. We restart and go on. It might do this a few times during the day. The next problem. As we drive the van will \"jerk\" as thought it has a loss of power. The check engine light will come on and then go off. No code is registered. This has been happening more frequently. I am out of ideas.\nhave the same problem?\nSaturday, June 19th, 2010 AT 5:54 PM", "label": "No"} {"text": "Hot Wheels Gets Curious About Mars\nThe one way that NASA can get kids excited about space again is to get every toy maker excited about space toys. That’s why I’m stoked that Mattel is putting out a Hot Wheels version of the Mars Curiosity Rover.\n“To commemorate the Mars Rover Curiosity created by NASA/JPL-Caltech, Hot Wheels created a 1:64 version,” Mattel’s product description reads. “Curiosity carries many tools such as a drill, cameras and a laser. Its mission [is] to see if Mars could have ever supported small life forms called microbes… or if humans could explore there some day!”\nIt’s not the first time that Hot Wheels has put out space toys. They did a Rover toy in the 90s as part of the Hot Wheels “JPL Sojourner Mars Rover Action Pack Set” (I still have mine). But that pack had three toys: the Sojourner rover, its lander and spacecraft cruise stage. Hot Wheels also did series for Apollo (how did I miss that?!) and also NASA’s Mars Climate Orbiter, Deep Space 2 Microprobe and Mars Polar Lander – the last three crashed on the red planet.\nThe 1:64 Scale model of the Curiousity Rover (which is about the size of a Toyota Prius in real life) will be part of Mattel’s 2012 collection. Unfortunately, though, Mattel isn’t including the cruise/reentry stage, the parachute or the crane enabled lander, but the six wheeled Rover itself is highly detailed with cameras, tools, and even a laser attachment.\nThe cost is about $1.09 for the Rover and hopefully, kids will be thinking Mars as they play with it.", "label": "No"} {"text": "December 19, 2017\nComments Off on ELDs Putting Pressure on Your Supply Chain?\nAs we near full implementation of the electronic logging device (ELD) mandate?on April 1, 2018, it’s important to?take note?of a drivers’ operating hour limit. The mandate?was predicted to significantly increase market rates and decrease the available capacity. Now is a great time to revisit our “ELD Impact” executive briefing. It has been updated to include", "label": "No"} {"text": "I have a wxPython project with a GUI that that is defined in an XRC file generated by wxFormBuilder.\nThis was running without problems on a PC running Python 3.11 and python 3.7 .\nRecently I tried to run the same code on a MacBook Pro (M3pro) with Python 3.12, where it crashes with a segmentation error (Process finished with exit code 139 (interrupted by signal 11:SIGSEGV) when calling “res.LoadFrame(…)”.\nThe code is run under PyCharm 2023.3.2.CE, MacOS 14.2.1.\nI am able run a simple wxPython GUI that is pure python based on the mac, so it seems related to the module that builds a frame based of the XRC file.\nDoes anyone has experience using XRC on the latest apple hardware ?", "label": "No"} {"text": "The S&P 500\nis looking good for a big down trend. It's test the resistance line twice which has shown previous resistance since November. With the market on a downtrend It's also meant this correlating resistance line and been rejected twice. The MACD\nalso shows deceleration and a potential movement change.\nStop Loss: £2689\nProfit Target: £2505", "label": "No"} {"text": "Arnies Electric - Battle Ground, WA\nBattle Ground, WA 98604-2403 US\nArnies Electric: Electrical Contractors and Electricians\nElectrical Contractors Specialty: Electric Contractors\nContractor County Location: Clark\nHello! The Battle Ground, WA Electrical Contractors section of GetApprovedContractors.com provides the easiest way to find Battle Ground, WA electricians and information on electrical services.\nYou will find any electrical area of specialty for Arnies Electric listed as well as the electrician's address and phone number. Additional information about Arnies Electric will be displayed if available.\nGet listed in our Battle Ground Washington Electrical Contractors directory. It's free! Click here => Free Listing\nToday's Featured Electrical Contractors\nChristensen Electric Inc\nGrayslake, IL 60030-0000\nD G Fowler Electric Co Inc\n15031 Us Highway 331 S\nFreeport, FL 32439-3164\nTFL Electrical Inc\n1462 73rd St\nBrooklyn, NY 11228-2112\nGet Involved, Get Connected, Help Others with Disaster Relief at Home and Abroad\nAMERICAN RED CROSS\nPhone: 1-800-RED CROSS (1-800-733-2767)\nText message: Text \"REDCROSS\" to 90999 to donate $10 to American Red Cross Disaster Relief.", "label": "No"} {"text": "👋 Hi, I’m Sai Teja Beeram. Reach me out to me — email@example.com\nTech Table is an initiative by IITM students to provide one platform for the Engineers “ From Learning to Earning”. Start now!\nHello everyone, iam Aditi Jha from Delhi and Iam pursuing B.tech in electronics and communication from Banasthali Vidyapith.\nText to speech", "label": "No"} {"text": "A La Escucha Del Maestreo Radio is an online music radio station. This radio station has been broadcasting on air and online from Cundinamarca, Colombia. This radio promotes various kinds of latest rock, pop, salsa, merengue, balada, etc., We are streaming music and programs both in online and broadcasting 24 hours a day. Our station official website address is centova1.servermundi.biz\nEl que tenga oídos que oiga.\nListen to your favorite radios station on your smart phone, Get the free Online Radio Radio Player on google play!\nThis FM or Radios is one of the most famous online radio stations in Cundinamarca, Colombia. This Internet Radio station broadcasting 24/7 rock, pop, salsa, merengue, balada, etc.", "label": "No"} {"text": "In this series of video tutorials we shed some light on some of the most useful aspects of the very powerful Blender 3D’s animation constraints system.\nHere are the links to the already published tutorials in this series ( the list will keep updating…so keep in touch!:yes:)\nPart 1 > The “Child Of” constraint ;\nThanks for watching!", "label": "No"} {"text": "The guys from TheLogoFactory tried to explain what’s the difference between making logo in vector and raster file format. This video could be very useful for beginners or clients, who are not so familiar with the process. Watch the video to understand some of the basics in the logo design.\nIncoming search terms:\n- logo design format", "label": "No"} {"text": "Using managed assemblies\nThis application registers a ShellUI module that interacts with the supplied managed assembly, showing a message when the shell frame changes.\nThis application is only compatible with M-Files Desktop.\nMore information on using Managed Assemblies is available on the UIX reference site. Specifically, managed assemblies can only be used if:\n- They target .NET 4.0 or higher.\n- The managed assembly must not reference the M-Files API.\n- The managed assembly must be available in the UIX application package and are distributed as part of the UIX installation.\n- The application consists of four files:\nappdef.xml, which declares the application contents.\nmain.js, a ShellUI module, which instantiates the CLR objects and calls methods on them.\nMyClassLibrary.pdb, containing debugging information), which is the managed assembly that the UIX application will use.\nThe application broadly takes the following approach:\n- When the shell frame is started, the code instantiates an instance of the managed assembly.\n- A method on the managed assembly is called, passing in information about the current environment (the outer window handle and the Vault), and a message to show.\nTesting and deploying\nThe simplest method to test an application is to copy the files into a local development folder. This allows you to alter the files and simply log out and into the vault to see the changes.\nTo deploy the application, you must zip the application files and deploy them using the M-Files Admin tool. This process is detailed on the M-Files Developer Portal.\nWhen a client connects a vault, new User Interface Extensibility Framework applications will be downloaded and the user will be prompted to install them. This can be avoided by pre-approving it using registry keys.", "label": "No"} {"text": "They loves entertainment and that’s too through exciting music. ASKiNG RADiO xTRa is a radio which is a part of powerhouse of a thematic online radiobroadcaster in the country. ASKiNG RADiO xTRa is basically a very cool radio with some of the most exciting tracks available throughtout the day for their listeners.\nContact Number: +2348099275464\nApplication: ASKiNG RADiO xTRa App", "label": "No"} {"text": "Printversion of: http://www.www.dife.de/forschung/forschungsauftrag/index.php?lang=en\nStatus: 18.06.2018 17:06:04\nAt the German Institute of Human Nutrition Potsdam-Rehbruecke (DIfE), a unique combination of basic experimental research along with clinical and epidemiological research is performed. The purpose is to develop novel preventive and therapeutic strategies for nutrition-related diseases, and to provide the scientific basis for dietary recommendations.\nThe researchers focus on three areas:", "label": "No"} {"text": "No electricians that will service your area? If you are in Colorado, we have your back.\nMountain Area Electrical Services is a local electrical company based in Englewood, CO and serving surrounding areas. We're committed to serving the electrical needs of our residential, commercial and industrial clients. No matter what electrical issue is affecting your home or business, you can count on us to get to the bottom of the problem right away. We offer commercial electrical repairs, residential electrical services, industrial electrical services & more. We take great pride in our fast turnaround times, quality workmanship and high attention to detail.\nCall 720-490-5268 now to schedule professional electrical repair services.\nHere at Mountain Area Electrical Services, we can complete a wide range of electrical projects. Consider hiring us for:\n- Electrical troubleshooting services\n- New electrical installation services\n- Routine electrical maintenance services\n- panel changes and upgrades\nWe can work on everything from lighting fixtures and car charging stations to walk-in freezers and kitchen appliances.\nGet in touch with us soon to schedule professional electrical repair, installation or maintenance services in Englewood, CO.\nContact us today to discover the difference our electricians can make for your home or business.", "label": "No"} {"text": "Information Systems Manager\nLynbrook, NY – Design, manage and test computer database using ASP, PHP, MySQL database, Win Server & Microsoft Power BI. Implement security measures, provide software and hardware support for network, program lighting control & automation devices and wiring systems.\nMaster’s degree in Computer Science\n1 year experience.", "label": "No"} {"text": "\"Zoho Assist provides a simple and straight forward user interface to connect to remote computers anywhere on the globe.\"\nAccess your computer or mobile device from anywhere, anytime using Zoho Assist; your one-stop solution for remote support, screen sharing and unattended access. Get started today with one of the industry's most secure, reliable and affordable software. Requires no prior installation. Cross-platform support available. Works across devices. Supports all major web-proxies and firewalls.\nMulti Language Support\nReboot and Reconnect\nWeb based sessions\nYes, API is available.", "label": "No"} {"text": "Stem cell-based model of the blood-brain barrier\nA better understanding of the blood-brain barrier (BBB) is key for developing treatments for disease like MS and Alzheimer’s. In a collaboration with AstraZeneca, KTH, Karolinska Institute and University of Skövde we recently published an article studying the use of human stem cells to generate in vitro models of the BBB. More specifically, we studied the barrier properties and transcriptome of iPSC-derived models. Check out the full article published in Stem Cells (pubmed).", "label": "No"} {"text": "“Balance of Justice” is now available for download at Vimeo.com\nThe Balance of Justice audio adaptation is now available on CD (visit our online store). If you do not have time to watch the full documentary, this 26 minute version is a great alternative.\nWe’re also making the audio adaptation available for radio broadcasters. Get details and listen to preview clips HERE.", "label": "No"} {"text": "Good stuff. My two cents:\nChords in the first 15 seconds seem a bit random. You build them into a groove later, but maybe try building them into a groove a bit earlier.\nThe drop at :34 comes a bit suddenly, maybe start phasing in some of your noise elements you currently start at :27 a few measures earlier.\nthe lead at 1:20 doesn't really grab me. By 1:40 it starts to make better sense. Maybe slowly filter the lead you start at 1:40 in a few measures earlier?\nKeep at it", "label": "No"} {"text": "Table of Contents :\nTop Suggestions Ultra Motorcycle Wiring Diagram :\nUltra Motorcycle Wiring Diagram And despite a very modest lumens rating the cyclops adventure sports led lights lights wiring harnesses are the best example i can provide the only other issue is the minimalist documentation As usual i ve used the seymour duncan color code for the wiring if your pickups are from another company simply transfer their color code to this diagram Wearing a motorcycle helmet is a great idea located on the right and left side of the helmet the ultra sonic sensors are programmed to detect an object in the right or left blind spot if.\nUltra Motorcycle Wiring Diagram Motorcycle keys seem to delight in vanishing but if your machine is of a certain age getting going again is as simple as a slip of wire and a bit of tape hot wiring a machine isn t just a black art Almost any motorcycle electrical system should be able to handle that and we were surprised to find just a 5 amp fuse in the wiring harness as you can see in the isolux light output diagrams above Neuroscientists have used data from the human brain connectome a publicly available wiring diagram of the human brain based on data from thousands of healthy human volunteers to reassess the.\nUltra Motorcycle Wiring Diagram Including everything from the intake manifold and swing arm parts to the front and back fenders and the key to start up the motorcycle with the exception of some engine components wiring wheels Motorcycle the lights wiring and other bits and bobs had been removed it was almost perfect straight off the scrap Wiring diagram courtesy of seymour duncan in my prior column we wrapped up a two part investigation into the ultra flexible esquire wiring that yields nine switchable sounds from a single.\nComing courtesy of mustang6g forum member zackmd1 the diagrams appear in the official wiring diagrams available from ford systems conspiracy the dos and don ts of washing a motorcycle part Set up by dairy multi millionaire ex racing driver and philanthropist george barber this non profit museum is home to the world s largest motorcycle collection with over 900 machines on display and Bolt motor co have just delivered an ultra sharp bobber cafe hybrid and even though it the crew also poured plenty of.\nHarley Davidson Wiring Diagrams Diy\nHarley Davidson Wiring Diagrams From All Decades Old And New Check Us Out Officialharleyparts\nUltra Cycles Wiring Diagrams Engine Diagram And Wiring\nThis Is A Image Galleries About Ultra Cycles Wiring Diagrams You Can Also Find Other Images Like Wiring Diagram Parts Diagram Replacement Parts Electrical Diagram Repair Manuals Engine Diagram Engine Scheme Wiring Harness Fuse Box Vacuum Diagram Timing Belt Timing Chain Brakes Diagram Transmission Diagram And Engine Problems\nUltra Motorcycle Wiring Diagram Circuit Diagram Maker\nUltra Motorcycle Wiring Diagram Welcome Thank You For Visiting This Simple Website We Are Trying To Improve This Website The Website Is In The Development Stage Support From You In Any Form Really Helps Us We Really Appreciate That\nHarley Trailer Wiring Harness Installation\nThis Video Demonstrates How To Install An Isolating Trailer Wiring Harness On A Harley Street Glide This Procedure Applies For All Harley Touring Bikes From To Present Including The\n16 En Wiring Diagrams Harley Davidson Sip\nWe Strongly Urge You To Take The Affected Motorcycle To An Authorized Harley Davidson Dealer To Have The Appropriate Service Performed As Soon As Possible Ok 16 En Wiring DiagramsHarley Davidson Motorcycle Manuals Wiring Diagrams\nSome Harley Davidson Motorcycle Manuals Wiring Diagrams Are Above The Page In Early William S Harley Who Was Only 21 Years Old Developed A Project For A Small Volume Engine 7 07 Cubic InchesFull List Of Motorcycle Service Manuals For Free Download\nFree Motorcycle Manuals For Download Lots Of People Charge For Motorcycle Service And Workshop Manuals Online Which Is A Bit Cheeky I Reckon As They Are Freely Available All Over The Internet 5 Each Online Or Download Them In Format For Free HereDownload Motorcycle Manuals Blogspot\nI Can See That You Are An Expert At Your Field I Am Launching A Website Soon And Your Information Will Be Very Useful For Me Thanks For All Your Help And Wishing You All The Success In Your Business\nSimple Motorcycle Wiring Diagram For Choppers And Cafe\nSimple Motorcycle Wiring Diagram For Choppers And Cafe Racers I Get A Lot Of Questions About Wiring Motorcycles Sometimes People Are Just Trying To Fix Their Blinkers And Aren T Familiar With How Motorcycle Electrics Work But More Often Than Not I Get Requests About Trimming Down Electronics For Custom Riders\nHarley Davidson Service Manuals For Download Free\nFree Harley Davidson Motorcycle Service Manuals For Download Lots Of People Charge For Motorcycle Service And Workshop Manuals Online Which Is A Bit Cheeky I Reckon As They Are Freely Available All Over The Internet 5 Each Online Or Download Your Harley Davidson Manual Here For Free\nPeople interested in Ultra Motorcycle Wiring Diagram also searched for :\nIt's possible to get or download caterpillar-wiring diagram from several websites. If you take a close look at the diagram you will observe the circuit includes the battery, relay, temperature sensor, wire, and a control, normally the engine control module. With an extensive collection of electronic symbols and components, it's been used among the most completed, easy and useful wiring diagram drawing program. Ultra Motorcycle Wiring Diagram. The wiring diagram on the opposite hand is particularly beneficial to an outside electrician. Sometimes wiring diagram may also refer to the architectural wiring program. The simplest approach to read a home wiring diagram is to begin at the source, or the major power supply. Basically, the home wiring diagram is simply utilized to reveal the DIYer where the wires are.\nIf you can't locate the information, get in touch with the manufacturer. The info in the diagram doesn't indicate a power or ground supply. The intention of the fuse is to safeguard the wiring and electrical components on its circuit. A typical watch's basic objective is to tell you the good time of day. When selecting the best type of computer cable to fulfill your requirements, it is very important to consider your upcoming technology plans.\nInstalling a tachometer on your Vehicles can assist in preventing critical repair problems, however. You might have a weak ground issue. The way the brain learns is a subject that still requires a good deal of study. How it learns can be associated by how it is able to create memories.\nIn a parallel circuit, each unit is directly linked to the power supply, so each system gets the exact voltage. There are 3 basic sorts of standard light switches. The circuit needs to be checked with a volt tester whatsoever points. Ultra Motorcycle Wiring Diagram. Each circuit displays a distinctive voltage condition. You are able to easily step up the voltage to the necessary level utilizing an inexpensive buck-boost transformer and steer clear of such issues. The voltage is the sum of electrical power produced by the battery. Be sure that the new fuse isn't blown, and carries the very same amperage.\nEach fuse is going to have a suitable amp rating for those devices it's protecting. The wiring is merely a bit complicated. Our automotive wiring diagrams permit you to relish your new mobile electronics in place of spend countless hours attempting to work out which wires goes to which Ford part or component. Overall the wiring is really straight forward. There's a lot wiring that you've got to tie into your truck's wiring harness, but it's much easier to do than it seems. A ground wire offers short circuit protection and there's no neutral wire used. There's one particular wire leading from the distributor which may be used for the tachometer.\nWhen you have just a single cable going into the box, you're at the close of the run, and you've got the simplest scenario possible. All trailer plugs and sockets are extremely easy to wire. The adapter has the essential crosslinks between the signals. Wiring a 7-pin plug on your truck can be a bit intimidating when you're looking at it from beyond the box.\nThe control box may have over three terminals. After you have the correct size box and have fed the cable to it, you're almost prepared to permit the wiring begin. Then there's also a fuse box that's for the body controls that is situated under the dash. Ultra Motorcycle Wiring Diagram. You will find that every circuit has to have a load and every load has to have a power side and a ground side. Make certain that the transformer nameplate power is enough to supply the load that you're connecting.\nThe bulb has to be in its socket. Your light can be wired to the receiver and don't require supply additional capacity to light as it can get power from receiver. In the event the brake lights aren't working, a police officer may block the vehicle and issue a warning to create the repair within a particular time limit. Even though you would still must power the relay with a power source or battery. Verify the power is off before trying to attach wires. In case it needs full capacity to begin, it won't operate in any way.\nReplacing thermostat on your own without a Denver HVAC technician can be quite harrowing if you don't hook up the wiring correctly. After the plumbing was cut out, now you can get rid of the old pool pump. It's highly recommended to use a volt meter to make sure there is no voltage visiting the motor, sometimes breakers do not get the job done properly, also you might have turned off the incorrect breaker. Remote distance is left up to 500m. You may use a superior engine ground. The second, that's the most frequently encountered problem, is a weak ground in the computer system. Diagnosing an electrical short can be extremely tough and costly.\nTags: #yamaha wiring diagram#honda sl70 motorcycle wiring diagram#harley wiring diagram#indian motorcycle wiring diagram 99#honda ct90 motorcycle wiring diagrams#electrical circuit wiring diagram#motorcycle wiring schematics#yamaha motorcycle wiring diagrams#simple motorcycle wiring diagram#indian chieftain wiring diagram\nRelated Wiring Diagram :", "label": "No"} {"text": "Zazz exhibits expertise in deploying mobile applications for a wide array of business domains spread globally. We offer quick and cost-effective customized mobile applications for iOS and Android. Our mobile app development team helps enterprises to address their technical limitations for better control over your business. The mobile app developers of Zazz create innovative and creative mobile applications that offer formidable results.\nLet's discuss your project?", "label": "No"} {"text": "ProgrammableWeb tracks the latest API news to keep you on top of the API economy\nSearching: No Search Term , Filtered By Category: \"News Services\", Category: \"Air Travel\"\nThe Associated Press showcases new two-way Open API at NAB Show in Las Vegas, that can offer integration solutions when MOS-based integration lacks.\nRoutehappy has developed a Score & Happiness Factors API that utilizes the company's Flightpad and Flightmatch. Expedia is partnering to use it.\nMuleSoft's Enterprise Service Bus is now used by UK broadcaster Channel 4 to get information to partners.\nTravel technology company iZento's Vacation API + ClientBase Connector are designed to simplify itinerary creation and give agencies new capabilities and revenue streams.\nSita launches foray into latest wearable, the boarding pass. Google folds Maps Coordinate into its Maps Engine Pro. Plus: attackers install DDoS bots on Amazon, and extracting data using import.io.\nAs a first step toward enabling new economic models for software consumption, today IBM opened an IBM Cloud marketplace.", "label": "No"} {"text": "DescriptionAdd to wishlist\nSuper Cleaner, a reliable memory & speed booster, Android optimizer, and battery saver, helps you clean junk file, boost mobile phone, and extend battery life. Super Cleaner ( Android Cleaner and Booster ) is a small and effective booster and cleaner app for Android. With intuitive interface, it can clean junk file, cache, ads, unnecessary background apps and boost mobile memory to make your phone faster. Even Android phones with slow processor and low memory can have a better performance after clean and boost. This is the Ultimate Clean my android app.\nKey Features of Super Cleaner\nBy phone boost, this free Android memory (RAM) booster will clean unnecessary background apps to clear more free memory and make your phone faster. The one-tap boost optimize your Android device and make it faster by 50% on home-screen. And what makes this memory booster special is its durable boost effect, which prevent apps from auto restart.\nJunk File & Cache Clean\nThis cache and junk file cleaner has intelligently and accurately analyzed thousands of apps and how junk file created. Therefore it can clean junk file and other residual file to reclaim storage space.\nThis junk-file cleaner provides real-time memory and battery monitor. The phone boost force-close the unnecessary background apps to save battery power and extend battery life.\nEven without root access, this speed booster for Android can boost phone and clean cache effectively and efficiently.\n★Reclaim Storage Space\n● Streamline your Android smartphone or tablet\n● Quickly and easily uninstall multiple unwanted applications\n● Free up valuable storage space on your device\n★ APP MANAGER\nBack up and uninstall apps\nThis a Free android Phone Cleaner and RAM booster just ready to use and make your phone like new again.", "label": "No"} {"text": "while comparing like if( a.get(i) != b.get(j))\nfor input [1, 1, 1], output is \nfor input [5000, 5000, 5000], output is [5000, 5000, 5000]\nif stored in int variable first and then compared, i.e.,\nint first = a.get(i);\nint second = b.get(j);\nif(first != second)\noutput is fine.\nwhy that happens??", "label": "No"} {"text": "Automotive Starting Battery Businesses in the Philippines\n|Request Information or a Price Quote from All Businesses Listed Below|\nManufacturer and distributor of MOTOLITE BRAND Automotive, Motorcycle, Industrial (Solar, Golfcart, Stationary, Forklift/Traction, VRLA) Batteries.\n- Business type: manufacturer, distributor\n- Product types: batteries automotive starting, batteries deep cycle, batteries electric vehicle, batteries lead acid deep-cycle, batteries lead acid sealed AGM, batteries industrial, forklift/traction batteries, stationary batteries, DC to AC power inverters, rechargeable batteries, deep-cycle batteries.\n- Address: 8F RAMCAR Center, 80-82 Roces Ave., Diliman, Quezon City, Philippines\n- Telephone: 370-1330\n- FAX: 374-1671\n- Web Site: http://www.motolite.com\n- E-mail: Send Email to Oriental and Motolite Marketing Corp\n- Business type: manufacturer, retail sales, wholesale supplier, importer,\n- Product types: Lead acid batteries, industrial/stationary batteries, traction batteries, deep cycle batteries, VRLA lead acid batteries, and solar batteries Renewable energy like home solar system, solar streetlight, stand alone solar system, grid tied solar system for residential, commercial and industrial application.\n- Service types: installation, battery capacity test\n- Address: 1386 E. rodriguez Sr. Avenue Cor. Mabolo Street, New Manila, Quezon City, Philippines 1112\n- Telephone: (63 2) 7222636, 7227260, 7229465\n- FAX: (63 2) 7214232\n- Web Site: www.neutronbattery.com\n- E-mail: Send Email to People's International Enterprises Company\n- Business type: distributor\n- Product types: batteries automotive starting, batteries industrial, batteries lead acid deep-cycle, battery chargers, batteries lead calcium, batteries VRLA, japanese automotive surplus parts, surplus bicycles.\n- Address: Arellano Blvd. , Cebu city, Cebu Philippines 6000\n- Telephone: 063-32-4166790\n- FAX: 063-32-4166791\n- Web Site: www.seguromarketing.com\n- E-mail: Send Email to Seguro Marketing Inc.\nCan't Find It? Search the entire Source Guides site using keywords:\nRenewable Energy Businesses\nRenewable Energy News", "label": "No"} {"text": "100,000 tons of sludge is produced annually in the Basque Autonomous Community (BAC) at waste water treatment plants (E.D.A.R). Under new legislation it will be obligatory to install these sewage water treatment plants in those urban areas of more than 3000 inhabitants, which in turn will mean, in the medium term, a considerable increase in the amount of sewage sludge generated.\nThe application of this sludge to forestry systems is being put forward as a solution to the ever-increasing production of this by-product of urban populations. The effects on crops and our natural resources that the application of this E.D.A.R. sludge might have should be thoroughly studied in order to preserve the environment and manage an organic residue such as this in a sustainable way. Thus, applications of treated sludge should avoid:\nThe transformation of waste sludge in soils is influenced by the properties of these, given the ongoing physical, chemical and biochemical processes therein. All these reactions affect the end-products of the breakdown in the soil and speed of such breakdown. Various studies of sewage sludge applications have shown that they affect the potential leaching of NO3 and a greater loss through NO3 leaching is experienced in those areas subjected to successive applications of the sludge than in those places untreated with sewage sludge. Nevertheless, more information is needed about the effect of such successive applications of sewage sludge regarding exactly where the nitrogen ends up in forest soils. This information is necessary in order to avoid NO3 leaching from taking place.\nNo study of the this use of sewage sludge on forest soils in the BAC has taken place to date, given the difficulty of the application of such material (the extensive land surfaces to be treated, the large quantities of sludge to be transported, a terrain difficult to work with machinery). One of the aims of this research was to study the NO3- y NH4+ ions in lixiviations after repeated applications of EDAR sludge on forest soil planted with Pinus radiata.\nGarazi Andonegi | Basque research\nInvasive Insects Cost the World Billions Per Year\n04.10.2016 | University of Adelaide\nMalaysia's unique freshwater mussels in danger\n27.09.2016 | The University of Nottingham Malaysia Campus\nResearchers from the Institute for Quantum Computing (IQC) at the University of Waterloo led the development of a new extensible wiring technique capable of controlling superconducting quantum bits, representing a significant step towards to the realization of a scalable quantum computer.\n\"The quantum socket is a wiring method that uses three-dimensional wires based on spring-loaded pins to address individual qubits,\" said Jeremy Béjanin, a PhD...\nIn a paper in Scientific Reports, a research team at Worcester Polytechnic Institute describes a novel light-activated phenomenon that could become the basis for applications as diverse as microscopic robotic grippers and more efficient solar cells.\nA research team at Worcester Polytechnic Institute (WPI) has developed a revolutionary, light-activated semiconductor nanocomposite material that can be used...\nBy forcefully embedding two silicon atoms in a diamond matrix, Sandia researchers have demonstrated for the first time on a single chip all the components needed to create a quantum bridge to link quantum computers together.\n\"People have already built small quantum computers,\" says Sandia researcher Ryan Camacho. \"Maybe the first useful one won't be a single giant quantum computer...\nCOMPAMED has become the leading international marketplace for suppliers of medical manufacturing. The trade fair, which takes place every November and is co-located to MEDICA in Dusseldorf, has been steadily growing over the past years and shows that medical technology remains a rapidly growing market.\nIn 2016, the joint pavilion by the IVAM Microtechnology Network, the Product Market “High-tech for Medical Devices”, will be located in Hall 8a again and will...\n'Ferroelectric' materials can switch between different states of electrical polarization in response to an external electric field. This flexibility means they show promise for many applications, for example in electronic devices and computer memory. Current ferroelectric materials are highly valued for their thermal and chemical stability and rapid electro-mechanical responses, but creating a material that is scalable down to the tiny sizes needed for technologies like silicon-based semiconductors (Si-based CMOS) has proven challenging.\nNow, Hiroshi Funakubo and co-workers at the Tokyo Institute of Technology, in collaboration with researchers across Japan, have conducted experiments to...\n14.10.2016 | Event News\n14.10.2016 | Event News\n12.10.2016 | Event News\n21.10.2016 | Health and Medicine\n21.10.2016 | Information Technology\n21.10.2016 | Materials Sciences", "label": "No"} {"text": "Introduction to Sitecore Mobile Web Development\nSitecore’s robust platform is built with the flexibility to easily create a mobile experience for website visitors. With device detection to know if your visitors are coming from their smartphones, tablets or desktops, Sitecore offers a simple way for web editors to maintain all website versions from one interface. According to Digital Trends, global mobile traffic is growing rapidly to include 13% of all internet traffic. This is why it’s more important than ever to maintain a mobile website for your brand. Recently I had the opportunity to use Sitecore while building a site for mobile devices.\nIf you already have a website built on Sitecore, half of your mobile site is already built. Depending on your mobile site requirements, you could potentially have a lot business logic that could be reused to build your mobile site. You will still need to provide a user interface design according to mobile device capabilities and network limitations. This means a layout system to support smaller displays, use small size images, adaptive layout structure to portrait or landscape positions of the device, among others.\nSitecore offers you a layout system that considers a schema to bring an appropriate response if the request was made from a mobile device. As you can see in the next screenshot, you could define as many devices as you want by filtering according to the browser agent.\nIf you have some experience developing with Sitecore you know that a best practice is to separate the components of a page into modules that you could reuse through the website, even between device versions of the site if the module is appropriate. However you may have to separate different layouts for desktop site and mobile site to provide the best experience to either one.\nOnce your layouts for mobile have been defined, it is necessary to add them to page templates. For example: think about which existing components you could use on your mobile site. Many small components, like a newsletter subscription module or auto-complete filter of products module, could be reused — of course, you need to provide different styles which can be done using different header modules for desktop and mobile that use different files for CSS. In the next screenshot, you can see the different mobile modules added to a page template that use a specific header for mobile.\nFor a desktop site, you could have a base layout as follows:\n<%@PageLanguage=\"C#\"AutoEventWireup=\"true\" CodeBehind=\"Base Layout.aspx.cs\" Inherits=\"Sample.Sitecore.Web.layouts.Master.Base_Layout\" %> Sample | <%=pageTitle%> …\nA mobile site’s layout has style references and scripts that help support mobile device requirements, like adaptation to device display, landscape and portrait modes, etc.:\n<%@PageLanguage=\"C#\"AutoEventWireup=\"true\" CodeBehind=\"Mobile Base Layout.aspx.cs\" Inherits=\"Sample.Sitecore.Web.layouts.Master.Mobile_Base_Layout\" %> Sample - Home …\nWith this, you could begin to build a mobile web version of your current site. However, you’ll need to take several things into consideration:\nYou need to provide a web design of your mobile site before you build the mobile version.\nYou need to define which components will be shared for the two versions of the site considering the information to be displayed and if the design is similar to both cases.\nIt's better to use different images for mobile site, smaller images will improve the performance. If you need to share images for both sites, you need to consider where the image will be displayed and its proportions (height and width) to avoid distort.\nNote: This post doesn’t take into consideration responsive design that you could use to provide a different presentation for your site when is visited through a mobile device, that’s other topic. J", "label": "No"} {"text": "32 user programmable level sensitive chase effects. 16 independent cue stacks allow combinations of memory scenes and chases to be arranged as steps in a playback sequence.\nProgram precise fade times to each step or use the manual stack fader from step to step. Chase control functions include master level, rate, instant on/off or the fade rate between each chase step and the direction of the chase. Dual split dipless crossfaders proportionally vary the intensity of levels between scenes A and B.\nIndividual channel bump buttons with master bump level slider. Channel and scene bump button modes include momentary, toggle on/off, kill mode (allows only one button to toggle at a time) and solo mode which overrides console output except for the bump buttons that are pressed. Soft patch up to 512 dimmers. MIDI show control and SMPTE time code via MIDI to activate scenes. Fully protected non-volatile EEPROM memory (10 year retention).\nPreheat function can be set from 0-20% of output level providing faster lamp response and longer lamp life Console locks include Record and Set up, which prevent unauthorized or accidental changes to programming or configuration. Width: 35 [88.9 cm].\nDepth 15 [38.1 cm]. Height 4 [10.2 cm]. NSI 128 channel Micro-Plex out (3 pin XLR male and female)DMX512 digital control (female 5 pin XLR).\nMIDI in/out/through (5 pin DIN). Audio in (RCA type female).Optional 37 pin 0-10 volt analog control port. Optional AMX192 out (4 pin XLR). The item \"Leviton MC 7532 Controller 32/64 Channels- Stage Lighting (BRAND NEW)\" is in sale since Sunday, April 25, 2021. This item is in the category \"Musical Instruments & Gear\\Stage Lighting & Effects\\Stage Lighting Controllers\".\nThe seller is \"chrisgall7527\" and is located in Pflugerville, Texas. This item can be shipped to United States.", "label": "No"} {"text": "2416 S Ridgeway\nChicago, IL 60623\nService area: 150 miles\nService Area: The tri-state area: Southeast Wisconsin, Northwest Illinois and Northwest Indiana\nSolar PV installation - Grid tied systems or Battery Backup.\nWe have provided solar systems for home owners and businesses seeking to reach net zero energy use.\nWe have installers that are certified as supervising Chicago eletricians and are in NASCEP training.\nAiley Solar Electric is a family-owned local solar energy system designer and installer. Our mission is to deliver cost effective solar electric systems to save residential and commercial customers money on their electricity bills while at the same time avoiding all the pollution with traditional electricity generation.", "label": "No"} {"text": "DB Regio has ordered 17 Coradia Stream electric multiple units for the Main-Weser subnetwork between Frankfurt, Giessen, Marburg and Kassel.\nNEB has ordered 31 two-car, battery-operated Mireo Plus B trains from Siemens Mobility for the new East Brandenburg rail network.\nŠkoda Transportation Group has been chosen by Czech Railways to provide regular servicing of its electrical units.\nAlstom has conducted a technical demonstration journey of its latest battery-powered train in Saxony, Germany.\neCon Engineering has conducted a research project into dynamic simulation solutions specifically suited to catenary wires.\nLatvian State Railways and Škoda Vagonka have signed a contract for the supply of 32 new single-deck electric trains for Latvia.\nHitachi Rail Europe has announced that the bespoke electric commuter train which it has designed for ScotRail has received ‘Type Authorisation’ for operatio...", "label": "No"} {"text": "When it comes to hardware keyloggers, the new WiFi-enabled USB keylogger is by far the best keylogger available on the market. I have discussed why this device stands out in the sections below.\nLike software keyloggers, hardware versions capture every keystroke typed by a user. However, they differ in a crucial aspect – you need to be physically present at the victim’s location for installation.\nAlso, they are easy to set up (plug and play), as there is no software to be installed on the PC or laptop and they operate in stealth mode.\nAdvantages of Hardware Keylogger\nHardware keyloggers offer several benefits over their software counterparts:\n- No System Access Needed for Installation: Unlike software keyloggers, hardware keyloggers don’t require system-level access to be installed.\n- Invisible to Security Scans: They remain invulnerable to security scanners, thanks to their physical nature.\n- Massive Storage Capacity: With an internal memory of up to 2GB, these devices can store over a billion keystrokes.\nOne of the key perks of hardware keyloggers is that they don’t leave a footprint on the hard drive, making them undetectable by anti-spyware and eraser software.\nSee also: How to tap a cellphone\nFeatures That Set Hardware Keylogger Apart\n- Quick and Easy Installation: It only takes about 5 seconds to install – just plug it in, even if the computer is off.\n- Encrypted Data Storage: The data inside the device is encrypted for added security.\n- Operating System Compatibility: These keyloggers work seamlessly across various platforms, including Windows, Macintosh, and Linux.\n- Resilient Data Backup: In the event of an operating system crash, the data stored in the keylogger remains safe and intact.\nHow Can a Hardware Keylogger Help You?\n- Monitor employee productivity, including chats and website visits.\n- Detect unauthorized access attempts and backup typed text.\nFor Parents and Spouses:\n- Keep an eye on the websites your child visits and their overall web activities.\n- Monitor a potentially cheating spouse’s online activities.\nTypes of Hardware Keyloggers\nChoosing the right hardware keylogger can be crucial, depending on your needs and the type of keyboard you use. Whether it’s USB or PS2, there’s a suitable keylogger for each. Let’s take a closer look at the four main types of hardware keyloggers and their unique features:\n1. USB Keylogger\nUSB Keyloggers are impressively compact and efficient. They boast a massive keystroke storage capacity, capable of storing over a billion keystrokes, all organized in an advanced flash FAT file system.\nWhat makes them stand out is their Flash Drive mode, which allows for rapid data retrieval without the need for any additional software or drivers. They operate seamlessly, without affecting computer performance.\n2. USB WiFi Keylogger (Best Hardware Keylogger )\nThe WiFi USB keylogger is a powerhouse of technology. It’s equipped with two processors, a complete TCP/IP stack, a WLAN transceiver, and a generous 2 Gigabytes of memory. Its standout feature is remote internet access.\nThis device can connect to a Wi-Fi network, email recorded keystroke data, and even allow real-time log viewing over TCP/IP. As mentioned earlier, this is by far the best hardware keylogger available on the market.\n3. PS2 Hardware Keylogger\nFor those with PS2 keyboards, this keylogger is a perfect match. It comes with a large 2 Gigabyte memory and uses an advanced flash FAT file system. The keylogger provides a text menu full of options for data analysis and remains invisible during computer operations, evading detection by security scanners.\n4. PS2 WiFi Hardware Keylogger\nAs the most advanced option for PS/2 keyboards, this keylogger shares similar memory and system capabilities as its USB counterpart. It stands out with its ability to connect to the Internet via a local Access Point. It can automatically send email reports with recorded data and offers on-demand access through TCP/IP for easy monitoring.\nIn wrapping up our exploration of hardware keyloggers, it’s clear that these devices offer a diverse range of functionalities suited to different requirements. Whether it’s the straightforward efficiency of a USB keylogger, the advanced capabilities of a WiFi-enabled device, or the specific compatibility with PS2 keyboards, there’s a keylogger for every scenario.\nRemember, the choice of a keylogger should align with both your technical needs and ethical considerations. It’s crucial to use these devices responsibly and within the bounds of the law. With the right keylogger, you can achieve efficient monitoring while maintaining respect for privacy and security.\nUltimately, the world of hardware keyloggers is vast and varied, offering powerful tools for those who need them. By understanding the features and capabilities of each type, you can make an informed decision that best suits your monitoring objectives.\n- Download Facebook hack tool\n- Facebook fake account finder\n- WhatsApp monitoring app\n- WiFi password breaker\n- Best hacking sites & forums\n- How to hack Instagram account", "label": "No"} {"text": "Click and experience the project\nThe representation of SoftTie STRAPS products in a 3d player and augmented reality is an example of an ideal WebAR application in the industrial sector.\nWe offer a simple solution to present products online, integrated in websites, interactive.\n„Our products are presented so much better.“ – Roman\n© 2021 Mazing.\nAGB & Impressum Web Agency Milano", "label": "No"} {"text": "Not so long ago researchers thought that RNAs came in two types: coding RNAs that make proteins and non-coding RNAs that have structural roles.\nThen came the discovery of small RNAs that opened up whole new areas of research. Now researchers have come full circle and predicted that some long non-coding RNAs can give rise to small proteins that have biological functions. A recent study in The EMBO Journal describes how researchers have used ribosome profiling to identify several hundred long non-coding RNAs that may give rise to small peptides.\n“We have identified hundreds of open reading frames in the long non-coding RNAs of humans and zebrafish that may give rise to functional proteins using ribosome profiling,” says Antonio Giraldez, one of the lead authors of the study and a professor at Yale University School of Medicine in the United States.\nRibosome profiling allows scientists to measure how much RNA is translated into protein. The method allows direct quantification of the messenger RNA fragments protected by the ribosome after digestion with the enzyme nuclease. The nucleases destroy the bonds between the exposed nucleotides that make up RNA and which are not protected by the protein-making machinery of the ribosome. What is left behind is a measurable amount of RNA destined to produce protein.\nThe researchers were able to visualize translation and the movement of the ribosome every three nucleotides, which corresponds to the size of each codon on the RNA producing an amino acid. This was possible by combining the high resolution of ribosome profiling with a bioinformatic tool developed in the Giraldez laboratory called ORFScore.\n“Crucial to our study was the parallel use of a second computational method that relies on a bioinformatic tool called micPDP,” says Giraldez. “micPDP revealed that the RNAs identified by ribosome profiling correspond to peptides that have been conserved over the course of evolution. This strongly suggests that these genes encode proteins that have specific functions in these animals.”\nAs a further validation of their method, the scientists went one step further and used mass spectrometry to detect and characterize almost 100 of the peptides coded by the RNAs.\nUntil recently, long non-coding RNAs were thought to be restricted to the more mundane but nonetheless important structural roles that are essential to support the function of the cell. “We think the main reason that these small functional peptides have been missed in earlier studies is due to the assumptions that have to be made when assigning functions to large numbers of genes,” says EMBO Member Nikolaus Rajewsky, Professor at the Max-Delbrück-Center in Berlin, Germany, Director of the Berlin Institute for Medical Systems Biology and one of the lead authors whose team contributed the micPDP computational method to identify conserved micropeptides. “Short open reading frames are so numerous that by design standard genome annotation methods have to filter out short open reading frames.”\nThere are many short peptides in nature, for example neuropeptides or insulin, but unlike the small peptides arising from long non-coding RNAs they are produced as larger preproteins that need to be trimmed to their final size. The first reports of activities for the small peptides produced by long non-coding RNAs have already begun to emerge. Schier and colleagues recently reported in Science1 a small peptide that functions as a signal to promote cell motility in the early fish embryo. The aptly named Toddler protein arises from long non-coding RNAs and acts as an activator of a G protein coupled receptor, one of the essential signaling molecules in the cell. Earlier work showed that a long non-coding RNA produced by the tarsal-less/polished rice/mille-pattes gene encodes small peptides that control epithelial morphogenesis in Drosophila and the flour beetle Tribolium.\n“Our identification of hundreds of translated small open reading frames significantly expands the set of micropeptide-encoding vertebrate genes providing an entry point to investigate their real life functions,” says Giraldez.\n“The peptide predictions reported in these studies are tantalizing, but this is just the first step. Things should get really interesting as the community explores the functions of the predicted peptides in vivo,” says Stephen M. Cohen, Professor at the Institute of Molecular and Cell Biology in Singapore who is not an author of the paper. “I imagine that we’ll be hearing a lot about this new peptide world in the years to come.”\nIdentification of small ORFs in vertebrates using ribosome footprinting and evolutionary conservation\nAriel A. Bazzini, Timothy G. Johnstone, Romain Christiano, Sebastian D.\nMackowiak, Benedikt Obermayer, Elizabeth S. Fleming,Charles E. Vejnar, Miler T. Lee, Nikolaus Rajewsky, Tobias C. Walther and Antonio J. Giraldez\nRead the paper:\n1 Toddler: An Embryonic Signal That Promotes Cell Movement via Apelin Receptors (2014) Pauli et al. Science 14 February 2014: 343 doi:10.1126/science.1248636\nFurther information on The EMBO Journal is available at emboj.embopress.org\nHead | Public Relations and Communications\nSenior Editor, The EMBO Journal\nTel: +49 6221 8891 407\nEMBO is an organization of more than 1500 leading researchers that promotes excellence in the life sciences. The major goals of the organization are to support talented researchers at all stages of their careers, stimulate the exchange of scientific information, and help build a European research environment where scientists can achieve their best work.\nEMBO helps young scientists to advance their research, promote their international reputations and ensure their mobility. Courses, workshops, conferences and scientific journals disseminate the latest research and offer training in techniques to maintain high standards of excellence in research practice. EMBO helps to shape science and research policy by seeking input and feedback from our community and by following closely the trends in science in Europe.\nFor more information: www.embo.org\nYvonne Kaul | EMBO\nGenetic Regulation of the Thymus Function Identified\n23.08.2016 | Universität Basel\nSun protection for plants - Plant substances can protect plants against harmful UV radiation\n22.08.2016 | Max-Planck-Institut für Molekulare Pflanzenphysiologie\nScientists and engineers striving to create the next machine-age marvel--whether it be a more aerodynamic rocket, a faster race car, or a higher-efficiency jet...\nWaveguides are widely used for filtering, confining, guiding, coupling or splitting beams of visible light. However, creating waveguides that could do the same for X-rays has posed tremendous challenges in fabrication, so they are still only in an early stage of development.\nIn the latest issue of Acta Crystallographica Section A: Foundations and Advances , Sarah Hoffmann-Urlaub and Tim Salditt report the fabrication and testing of...\nElectrochemists at TU Graz have managed to use monocrystalline semiconductor silicon as an active storage electrode in lithium batteries. This enables an integrated power supply to be made for microchips with a rechargeable battery.\nSmall electrical gadgets, such as mobile phones, tablets or notebooks, are indispensable accompaniments of everyday life. Integrated circuits in the interiors...\nRecent findings indicating the possible discovery of a previously unknown subatomic particle may be evidence of a fifth fundamental force of nature, according...\nA nanocrystalline material that rapidly makes white light out of blue light has been developed by KAUST researchers.\n24.08.2016 | Event News\n12.08.2016 | Event News\n02.08.2016 | Event News\n24.08.2016 | Event News\n24.08.2016 | Physics and Astronomy\n24.08.2016 | Physics and Astronomy", "label": "No"} {"text": "It's the little things here that mean a lot…\nUPGRADED HANDY 2.0\nAll guest rooms come with a complimentary Handy smartphone with unlimited internet data, unlimited calls to 31 countries, useful travel apps & a comprehensive Hong Kong City Guide. Meeting the needs of our mobile and digital travelers with greater speed and efficacy, Handy 2.0 comes with a larger display screen, extended battery life and better photo quality.\nCOMPLIMENTARY MINI BAR\nWhat's better than a mini bar? A complimentary one!\nStay connected with complimentary high-speed, wired and Wi-Fi internet around the hotel.\nIn room Nespresso coffee machines, pillow menus, sumptuous robes, printers, GP power banks, KEF wireless speakers & more, the list is endless…", "label": "No"} {"text": "I’m a graduate student in Computer Science at the University of Utah, working with Dr. Vivek Srikumar. I’m currently working on SweetPea, a programming language for experimental design with Dr. Vivek Srikumar, Dr. Matthew Flatt & Dr. Jonathon Cohen. In the past I’ve also dabbled in research in data visualization with Dr. Alex Lex, matrix analysis with Dr. Charles Johnson, and astronomy with Dr. Adam Bolton.\nI attended the Recurse Center in Summer 2016, and have nothing but nice things to say about RC. If you’ve been thinking about applying, you should do it!\n😟 → 🤖 → 😎\nThis is a Jekyll website based on the theme by Camille Diez.", "label": "No"} {"text": "In variation sites with minor reference alleles, overlooking the detection of homozygous reference genotypes results in inadequate identification of potential disease variants. Current variant calling practices miss these clinically relevant alleles warranting new approaches. More than 26,000 Eome Aggregation Consortium (ExAC) variants have a minor reference allele including 44 variants with known ClinVar disease alleles. We demonstrated how the current variant calling standards miss homozygous reference disease variants in these sites. We developed a bioinformatic panel that can be used to screen these variants using commonly available variant callers. We provide here a simple strategy to screen potential disease-causing variants when present in homozygous reference state.", "label": "No"} {"text": "Gbenga Oluwayomi (Prof)\nRadio Operations Officer\nGbenga Oluwayomi, aka Prof as referred to by many is an On-Air Personality, Music Technologist, Emcee, and studio engineer with an exceptional uniqueness in anchoring Radio shows and live events. He has been on the radio since 2018 and has worked as a show host, co-host, producer, and beat reporter with Leadcity 89.1 FM, Apostolos Radio,and Radio IITA. Gbenga Oluwayomi(Prof) is currently the Radio Operations Officer and Presenter at the leading Agric Radio, 88.5FM, Radio IITA.", "label": "No"} {"text": "Latest Ice ages Stories\nMelting ice sheets contributed much more to rising sea levels than thermal expansion of warming ocean waters during the Last Interglacial Period, a UA-led team of researchers has found.\nStudy on Jakobshavn Isbrae supports growing evidence that calving glaciers are particularly sensitive to climate change.\nFresh research into glaciers could help scientists better predict the impact of changing climates on global sea levels.\nThe last glacial maximum, which occurred 21,000 years ago, effects the current distribution of European scarab dung beetles; according to CSIC research, these results could help understanding the consequences of current climate change.\nFinds that rocks used as key geologic evidence were formed deep within Earth millions of years after the ice age ended.\nA team of scientists from the University of Sheffield and Bangor University have used a computer climate model to study how freshwater entering the oceans at the end of the penultimate Ice Age 140,000 years ago affected the parts of the ocean currents that control climate.\nCooling trend could be on the way unless thwarted by greenhouse gasses.\nA set of maps created by the University of Sheffield have illustrated, for the first time, how our last British ice sheet shrunk during the Ice Age.\nRussian scientists are set to pierce through Antarctica's frozen surface to reveal the secrets of an icebound lake that has been sealed deep there for the past 15 million years.\nResearchers at the California Institute of Technology have discovered new details supporting the idea that mass extinction is linked to a cooling climate.\n- A political dynamiter.", "label": "No"} {"text": "I need an Android app VR 360 videos and Images viewer.\nonly basic features needed\nbrowsing and viewing 360 pics and videos using VR headset. must be compatible with Google VR cardboard\nI would like it designed and built. you have to mail me codes used in app development seperately.", "label": "No"} {"text": "The molecule, which the researchers call cyanostar, was developed in the lab of Amar Flood, associate professor in the Department of Chemistry in the College of Arts and Sciences. It is described in an article in the journal Nature Chemistry, scheduled for publication in August and available online.\nThis model shows the five-sided cyanostar macrocycle capturing perchlorate at its center.\nCredit: Amar Flood\nDoctoral student Semin Lee is the lead author of the article, \"A pentagonal cyanostar macrocycle with cyanostilbene CH donors binds anions and forms dialkylphosphate (3)rotaxanes.\" Flood and Chun-Hsing Chen, research crystallographer in the IU Molecular Structure Center, are co-authors.\n\"Macrocycles have been at the heart of molecular recognition experiments in recent years,\" Flood said. \"But they're a dime a dozen. To make a contribution, you have to raise the bar.\"\nCyanostar raises the bar not only because it is easy to make, but for its unprecedented ability to bind with large, negatively charged ions, suggesting potential applications ranging from environmental remediation of perchlorate and molecular sensing of biological phosphates, to processes related to the life cycle of lithium ion batteries.\nThe creation follows from earlier work in Flood's lab showing that organic molecules could be designed to remove negatively charged ions from solutions. While the molecules have a neutral charge overall, their structure causes them to exhibit electro-positive properties and bind with weakly coordinating anions that were once thought to be incapable of being captured by molecular receptors.\nFlood challenges graduate students to generalize the previous discovery of strong CH hydrogen bonds by creating molecules with similar yet complementary properties. In response, Semin Lee proposed using the cyanostilbene molecule as a building block for a new macrocycle -- a cyclic macromolecule with the capacity to bind ions. After false starts, he designed cyanostar, with a structure that resembles a five-pointed star.\nA cross-section of the crystalline structure of cyanostar resembles the five-sided figures that Albrecht Durer showed in 1525 could be \"packed\" to tile a two-dimensional surface with periodic patterns. The form of the molecule and its fivefold symmetry are suggestive of Penrose tiles, geometrical forms that mathematicians have investigated in recent decades, and of quasicrystals, ordered arrays of atoms and molecules whose discovery in the 1980s changed the field of materials chemistry.\nWhile chemists have created countless macrocycles, cyanostar is unusual in that it can be synthesized in a \"one pot\" process, without multiple, time-consuming steps. It is also atypical in that the synthesis produces high yields of over 80 percent, even as the quantity being produced increases to about 10 grams.\n\"That's quite unique,\" Flood said. \"Normally, when you increase the amount of material you add to the reaction, the yield just drops off.\"\nShaped like shallow bowls, the molecules have a strong affinity for binding with large anions such as certain borate, chlorate and phosphate ions. The molecules bind in 2-to-1 sandwich-shaped complexes, with the anion sandwiched between two saucer-like cyanostars.\nIn addition to demonstrating its binding ability, the chemists showed cyanostar can be assembled into a dialkylphosphate rotaxane, a wheel-on-axle assembly in which a pair of macrocycles is threaded with a molecular rod, which is then capped on both ends by a \"stopper.\" Rotaxanes are precursors of molecular machines and motors. Some can be manipulated -- for example, by applying light or heat -- to serve as chemical switches or to accomplish other types of work at the molecular level.\nSupport for the research came from the National Science Foundation (NSF/CHE-0844441). Funding for equipment used in the analysis is from NSF and the U.S. Department of Energy. To speak with Flood, please contact Steve Hinnefeld, IU Communications, 812-856-3488 or email@example.com.\nSteve Hinnefeld | EurekAlert!\nScientists unlock ability to generate new sensory hair cells\n22.02.2017 | Brigham and Women's Hospital\nNew insights into the information processing of motor neurons\n22.02.2017 | Max Planck Florida Institute for Neuroscience\nCells need to repair damaged DNA in our genes to prevent the development of cancer and other diseases. Our cells therefore activate and send “repair-proteins”...\nThe Fraunhofer IWS Dresden and Technische Universität Dresden inaugurated their jointly operated Center for Additive Manufacturing Dresden (AMCD) with a festive ceremony on February 7, 2017. Scientists from various disciplines perform research on materials, additive manufacturing processes and innovative technologies, which build up components in a layer by layer process. This technology opens up new horizons for component design and combinations of functions. For example during fabrication, electrical conductors and sensors are already able to be additively manufactured into components. They provide information about stress conditions of a product during operation.\nThe 3D-printing technology, or additive manufacturing as it is often called, has long made the step out of scientific research laboratories into industrial...\nNature does amazing things with limited design materials. Grass, for example, can support its own weight, resist strong wind loads, and recover after being...\nNanometer-scale magnetic perforated grids could create new possibilities for computing. Together with international colleagues, scientists from the Helmholtz Zentrum Dresden-Rossendorf (HZDR) have shown how a cobalt grid can be reliably programmed at room temperature. In addition they discovered that for every hole (\"antidot\") three magnetic states can be configured. The results have been published in the journal \"Scientific Reports\".\nPhysicist Dr. Rantej Bali from the HZDR, together with scientists from Singapore and Australia, designed a special grid structure in a thin layer of cobalt in...\n13.02.2017 | Event News\n10.02.2017 | Event News\n09.02.2017 | Event News\n22.02.2017 | Power and Electrical Engineering\n22.02.2017 | Life Sciences\n22.02.2017 | Physics and Astronomy", "label": "No"} {"text": "By working with Solar Unlimited Thousand Oaks, you can expect the highest quality of service. We are leader in solar energy systems, and we offer unlimited possibilities. This is why we also offer solar pool heating systems and solar water heating systems in addition to solar panel in Thousand Oaks.\nAddress - 99 Long Ct, #A2 Thousand Oaks CA 91360\nPhone No. - (818) 843-1633\nWebsite - https://solarunlimited.com/solar-panel-thousand-oaks/", "label": "No"} {"text": "3. Eric Python IDE\nEric is a featured-rich Python IDE, written in Python. It is based on the cross platform Qt UI toolkit, integrated with the highly flexible Scintilla editor control. It has unlimited number of editors.\nIt provides a configurable window layout, configurable syntax highlighting, source code auto-completion, source code call tips, source code folding, brace matching, error highlighting, and offers advanced search functionality including project wide search and replace.\nEric has an integrated class browser and web browser, integrated version control interface for Mercurial, Subversion and Git repositories as core plug-ins and so much more. One of its most important features, which lacks in many Python IDEs is an integrated source code documentation system.\n4. PyDev For Eclipse\nPyDev is an open source, feature-rich Python IDE for Eclipse. It supports Django integration, code completion, code completion with auto import, type hinting and code analysis.\nIt offers refactoring, a debugger, remote debugger, tokens browser, interactive console, unit test integration, code coverage and PyLint integration. It allows you to find references using (Ctrl+Shift+G) shortcut keys. You can use it for Python, Jython and IronPython development.", "label": "No"} {"text": "About the event\nIn this year’s Putney Debates, two online panel sessions were held on 8 December 2021. The first panel discussed the models of national unity, including the United States, the United Kingdom, China, Spain, and Italy.\nSionaidh Douglas-Scott Professor at Queens Mary College London\nRichard Clary Lecturer at Harvard Law School (US)\nQianfan Zhang Professor at Peking University (China)\nFrancesco Bilancia Professor at Pescara University (Italy)\nRoberto Galan Vioque Professor at Seville University (Spain)\nDenis Galligan Emeritus Professor at Oxford University", "label": "No"} {"text": "The composite technology is very important for production of high-functional or high-quality materials and products. We have studied the composite technology in processing of polymers and glasses. In this paper, I mainly present the research topics of mixing process of polymeric materials and multi-layered process of polymer films. For the mixing process of polymeric materials, we have developed the computer simulation techniques to predict the materials behavior in a twin-screw extruder and have proposed the methods to evaluate the mixing performance in melt mixing based on the simulation results. Such techniques and methods were applied to the melt mixing in engineering problems. For multilayered process of polymer films, we have developed the simulation techniques of multi-layered flow for viscoelastic fluids and discussed the unstable problem and encapsulation phenomena at interface from the case studies considering die configurations, rheological properties, etc. The neck-in phenomena of multi-layered film could be also understood from simulation results in a die. We also studied the method to evaluate viscoelasticity of interfacial layer for multilayered film using the parallel plate rheometer experimentally. We proposed the non-stick length of interface as an evaluation index. For processing of glasses using polymer-inorganic composites, we proposed processing method to give functions to glass products by using the formable polymer-inorganic composit as a precursor.\nAll Science Journal Classification (ASJC) codes\n- General Materials Science\n- Condensed Matter Physics\n- Mechanics of Materials\n- Mechanical Engineering", "label": "No"} {"text": "Head of Data Insights in Crayon’s European AI Center of Excellence, Vienna\nJillian is a Principal Data Scientist at Crayon‘s European AI Center of Excellence in Vienna. Together with her team of data scientists, machine learning engineers and solution architects, Jillian aims to uncomplicate the complicated for organizations to unlock business insights, and use technology to drive the greater good. She believes in the importance of increasing the inclusivity of working groups through open exchanges and active diversification.\nJillian has a my in Molecular Biology from the University of Vienna.\nImpulse Talk: “Practical advice on transitioning into data science from non-computer science academia”\nWorking in a data science team, you will often find that people come from a range of different backgrounds. Many backgrounds provide a solid foundation on which you can build data science skills. But if you are outside of an advanced mathematical or informatics field, knowing exactly where your strengths lie and what you need to work on can be unclear. In this talk I will answer questions commonly asked by people who want to transition into data science. I will talk about the requirements for your first data science job, what hiring managers look out for and my personal learning path.", "label": "No"} {"text": "Large automotive company needs environmental simulation laboratory for DIN vehicle-level UV solar simulation testing according to DIN 75-220.Aging of automotive components in solar simulation units\nMembers of our Laboratory Outsourcing Network can use our online platform to communicate with the Lab Requestor, submit responses with quotes and have access to more information such as budget, location required, etc.\nNeed Weathering Testing or Scientific Research?\nSave time and money searching. Simply, submit a Weathering request to find the laboratories or lab suppliers that best meet your needs.\nPharmaceutical Company needs Bioanalytical Laboratory needed for Non-GLP measurement of ACTH and corticosterone in mouse... view\nUSA Consumer Products Safety Laboratory needed for certification testing of baby product which is a set of 3 silicone s... view", "label": "No"} {"text": "Dr. Chongming Wu is an associate professor of pharmacology in the Institute of Medicinal Plant Development, Chinese Academy of Medical Sciences & Peking Union Medical College. Dr. Wu received his Ph.D. from Institute of Genetics and Developmental Biology, Chinese Academy of Sciences (CAS) in 2010, and performed his postdoctoral work at School of Life Sciences, Tsinghua University in 2012. He has been studying and working in some of the most famous pharmacological and biological research institutions in China. During his graduate study and thereafter, he has been doing research in the fields of Traditional Chinese Medicines, pharmacology, molecular biology and biochemistry.\nDr. Wu’s current research thrust is centered upon the discovery and pharmacological investigation of natural medicines/natural products. His current research focuses on: (i) discovering natural products (NPs) with glucose- and lipid-regulating effects; (ii) elucidating the in vivo mechanism of NPs through their interactions with gut microbiota; (iii) finding gut microbiota-targeting medicines via functional metagenomics.", "label": "No"} {"text": "Mobile Optimizer WP Plugin\nOptimize any wordpress blog for mobile in one plugin.\nWith this plugin you can optimize your Wordpress blogs for mobile devices with this premium designed plugin!\nYou can automatically detect mobile device and display optimized website with your content.\nWorks with every Wordpress theme on iPhone, iPad or Android.", "label": "No"} {"text": "Earth science lab relative dating #1Tezragore\nRelative dating. Half-life. Time it takes for 1/2 of the parent to decay. UC Berkeley scientists and researchers, along reoative Berkeley Lab, went on to.\nLab 1 Relative Dating. Lab 2 Rocks and Minerals. Earth Science Files. Apparent Size · Apparent Size of Sun Labby Lab. Mostly shes in love with the faith but earth science lab relative dating #1 answers heart has more make up like i earth science lab relative dating #1 looking.\nWhat we sometimes forget is snows critical role in sustaining life on earth. Earth Anthony sadler dating Lab: Relative Dating #2.\nMake sure you read instructions.\nEarth science lab relative dating. Determine the relative sequence of events in the diagram below. Chapter 1 answer fundamental questions in the rocks in the secrets of. Its a work in progress, Im still at a ratio of about 579 emails and texts to one letter...\nThe University of California, Berkeley is a public research university in the United States.. Learn vocabulary. Only $1/month. Because its expected happen here is wont be going anywhere anytime soon unless earth science lab relative dating #1 answer key you know the person. WAOL Earth Systems Science Instructor.Earth Science Chapter 12 Section 3. I remember my husband telling me about a long-ago relative whose doctor. Beginning last year, [Google and DeepMind] fed weather forecasts. Oklahoma. Other earth science relative dating worksheet thing willing youre thinking about a potential. Earth relative dating activity worksheet answers science lab relative dating #1 answer key.Earth science relative dating worksheet.Japanese.. Include results from both parts (relative dating and absolute dating) in one unitary lab report. New Answers Books 1, 2, and 3), Evolution Exposed Earth Science, GVL Earth Systems. Sedimentary rocks are normally laid down in order, one on top of another.\nFigure out their relative thicknesses. Googles DeepMind can predict wind patterns one day in advance. Relative dating is an Earth science term that describes the set of principles and. Earth science lab relative dating 2 answers. Recovering alcoholic dating sites 5: Relative Dating Practice.notebook File. Answer Key · Earth Science Lab: Relative Dating #1.\nRelative dating is the science of determining the relative order of past events (i.e., the. READ MORE ». earth science lab relative dating #2 answers pho lee hoa. Enter the letter of the rock unit or. Choose from 500 different sets sciecne relative dating earth science flashcards on Quizlet. Free good and adting things about online dating earth. Chapter 8 Earth Science - Relative and Absolute Age Dating.\nScientists also fear that new slide patterns will alter the earth science lab relative dating #1 treeless chutes. Earth science lab relative dating #1 Answer Key. The Science of Sciencw, 2nd Edition.Earth Science relative dating lab quiz Question 1 1. The baking heat of the sun caused cracks to form in the dried mud. Start studying Earth science Lab (geologic time lab).\nNo views. 0. 0. Share. Save. Report. Datin PREVIEW Download attachment. Science says the first word on everything, and the last word on nothing - Victor Hugo. Relative Dating and Stratigraphic Principles Quiz TEST NO A Multiple. Pacific Wildland Fire Sciences Lab in Seattle and lead. Uploaded by Katie SiskindClass practice with Relative Dating of Rock Layers (4.15.15) - cadiz dating min - Uploaded by Catherine Alexanderearth science lab relative dating #1 answers.\nUpdated a year datinv. About · 0 Discussions · 0 Change Requests. If you need a cheat for. Counting tree rings and carbon dating arent the same in their “absoluteness.” Well read. Key Questions: GEOL 1311 Earth Science Lab 4 Structures and Geologic Maps. Unit earth science lab relative dating #1 Plate Boundaries Diagram 1.\nEach campus was given relative autonomy and its own Chancellor. EARTH SCIENCE LAB Relative Dating #1. Earth science lab relative dating #1 answer key. Sing relative dating earth science laboratory science honors.. Make sure you read instructions. Berkeley is one of the 14 founding members of the Association of American..", "label": "No"} {"text": "We are using untangle with one of our customers. We have two laptops that will be used in the waiting room for patients to input information. The information from the patient will be done via a web interface. I would like to block all internet traffic accept for the web interface they will be using to input their information. I have set up a new rack with policy manager. My guess would be to use web filter lite or firewall to do this. What do you think would be the best route and what would be the settings to do so.\nAlso these laptops will be on dmz.", "label": "No"} {"text": "This cell line is constructed by transduction of human angiotensin I converting enzyme 2 (ACE2) into HEK293T cells, followed by stable cell selection. HEK293T is derived from HEK293 and is commonly used in scientific research. HEK293T-human ACE2 cell line can be used for in vitro screening and characterization\nPseudotyped Luciferase/GFP rSARS-CoV-2 Spike is used to test the ability of serum, antibodies, and drugs to neutralize the infectivity of SARS-CoV2 spike protein. Pseudovirus display an antigenically-correct spike protein pseudotyped on replication-incompetent virus particles that contain a heterologous lentiviral (HIV) core.\nPseudotyped Luciferase/GFP rSARS-CoV-2 Spike is capable of", "label": "No"} {"text": "Join GitHub today\nGitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up\nImproved cmake compiler check message #5858\nChangelog: Fix: Improved cmake compiler check message to explain the problem with different compiler versions when installing dependencies\nNote: By default this PR will skip the slower tests and will use a limited set of python versions. Check here how to increase the testing level by writing some tags in the current PR body text.", "label": "No"} {"text": "clock teaching time lulu time teaching alarm clock white.\nimages of a clock large black roman numeral wall clock.\nprintable clock for kids free printable kids clock schedule digital template simple for fab n decorating cakes classes near me.\nbig ideas math algebra 2 online answers math geometry textbook online hall mathematics algebra 1 geometry algebra 2 big ideas math geometry online decorating a studio apartment on a budget.\nbig ideas math geometry journal answers practice problems.\nbig ideas math answers algebra 2 texas parent function in math definition examples decorating tips for cakes.\nbig ideas math geometry answers texas edition geometry notes.\nanalog clock worksheet free clock worksheets matching digital analog clock worksheets.\nmath games to play outdoors ideas for simple math activities kids can do outside.\nblank digital clock clock faces worksheet time worksheets.", "label": "No"} {"text": "Astronomers think that acidification inhibits the formation of stars and planets in the dust clouds. Now it is a case of waiting for precise measurements from the SRON-built HIFI space instrument that will be launched on the Herschel space telescope next year. Van der Tak: ‘I have already submitted my observation proposal’.\nThe formation of stars and planets in the universe is a delicate process. Clouds of gas and matter rotate and draw together under the influence of gravity. Pressure and temperature then rise, which eventually leads to the kindling of a new star with planets potentially orbiting it. Yet why does this happen at some locations in the universe and not at others? What are the conditions for star and planet formation? How does this process start and when does it stop? Astronomers are fumbling in the dark.\n‘The quantity of charged molecules in the dust cloud appears to have an inhibitory effect’, says Floris van der Tak. ‘These ensure that the magnetic fields can exert a greater influence on the cloud, as a result of which the entire cloud becomes agitated and the star-forming process is disrupted’. Observing these charged molecules directly is difficult. The ratio of acidic water molecules to ordinary water molecules is a measure of the quantity of charged molecules.\nHowever, it is difficult to observe water molecules from under an atmosphere that is itself predominantly made up of water molecules. ‘It is like looking for stars in the daylight.’ On Earth it can only be done from a high mountain where the air is rarefied. Such a spot is the 4092 metre-high top of the Hawaiian volcano Mauna Kea, where the James Clerk Maxwell Telescope is located. Van der Tak focused this telescope on the Milky Way galaxies M82 en Arp 220, where he discovered areas rich in acidic water molecules.\n‘Amazingly, what causes these acid water molecules to be present in both Milky Way galaxies is completely different’, says Van der Tak. ‘In Arp 220 they develop under the influence of X-rays in the vicinity of the central supermassive black hole. In M82, the cause is the ultraviolet radiation emitted by hot young stars in the star-forming area. Therefore, in these particular galaxies the process of star formation inhibits itself, due to more and more charged molecules being created.’\nThe astronomer will be able to deploy even heavier equipment for his research in the not too distant future. Next year, the European Space Agency (ESA) is launching the Herschel space telescope with the SRON-constructed Heterodyne Instrument for the Far Infrared (HIFI) attached to it. And in the 5000 metre-high and completely arid Atacama Desert in Chile, a start has been made on the construction of ALMA, 66 smart telescopes that can together produce detailed maps of the Milky Way galaxies. SRON is one of the partners involved in developing the detectors for these telescopes.\nThe results of the research of Floris van der Tak and his collegues Susanne Aalto of the Chamlers University of Technology, Onsala Sweden and Rowen Meijerink of the University of California are published this week in the scientific journal Astronomy & Astrophysics.\nJasper Wamsteker | alfa\nResearchers simplify tiny structures' construction drip by drip\n12.11.2018 | Princeton University, Engineering School\nMandibular movement monitoring may help improve oral sleep apnea devices\n06.11.2018 | Elsevier\nFaster and secure data communication: This is the goal of a new joint project involving physicists from the University of Würzburg. The German Federal Ministry of Education and Research funds the project with 14.8 million euro.\nIn our digital world data security and secure communication are becoming more and more important. Quantum communication is a promising approach to achieve...\nOn Saturday, 10 November 2018, the research icebreaker Polarstern will leave its homeport of Bremerhaven, bound for Cape Town, South Africa.\nWhen choosing materials to make something, trade-offs need to be made between a host of properties, such as thickness, stiffness and weight. Depending on the application in question, finding just the right balance is the difference between success and failure\nNow, a team of Penn Engineers has demonstrated a new material they call \"nanocardboard,\" an ultrathin equivalent of corrugated paper cardboard. A square...\nPhysicists at ETH Zurich demonstrate how errors that occur during the manipulation of quantum system can be monitored and corrected on the fly\nThe field of quantum computation has seen tremendous progress in recent years. Bit by bit, quantum devices start to challenge conventional computers, at least...\nScientists developed specially coated nanometer-sized vehicles that can be actively moved through dense tissue like the vitreous of the eye. So far, the transport of nano-vehicles has only been demonstrated in model systems or biological fluids, but not in real tissue. The work was published in the journal Science Advances and constitutes one step further towards nanorobots becoming minimally-invasive tools for precisely delivering medicine to where it is needed.\nResearchers of the “Micro, Nano and Molecular Systems” Lab at the Max Planck Institute for Intelligent Systems in Stuttgart, together with an international...\n09.11.2018 | Event News\n06.11.2018 | Event News\n23.10.2018 | Event News\n12.11.2018 | Life Sciences\n12.11.2018 | Materials Sciences\n12.11.2018 | Physics and Astronomy", "label": "No"} {"text": "Python is a high level object-oriented programming language, ideal for biotech data analysis.\nThis practical course will introduce to Python basic concepts, such as data organization, file reading and writing, scripting.\nThe classes will be organized with theoretic and practical lessons, aiming to solve common bioinformatics problems with an interactive approach.\nAddress: Oristano, Consorzio UNO, Chiostro del Carmine snc\nFor more information and registration (max 30 pax), please reach out to:\nemail@example.com; 0783 767921\nOrganiser: Consorzio UNO di Oristano (Promozione Studi Universitari) in collaboration with Università di Cagliari – Corso di Biotecnologie industriali a ambientali", "label": "No"} {"text": "- Genre:World Music\n- Year of Release:2019\nThis song is not currently available in your region.\nTry the alternative versions below.\nMore from Sojay\nListen to Sojay Space MP3 song. Space song from album SoJay's Room, Vol. 1 is released in 2019. The duration of song is 00:03:26. The song is sung by Sojay.\nRelated Tags: Space, Space song, Space MP3 song, Space MP3, download Space song, Space song, SoJay's Room, Vol. 1 Space song, Space song by Sojay, Space song download, download Space MP3 song", "label": "No"} {"text": "Polypropylene tape is mainly used to protect cardboard packaging, to fasten longitudinal elements and to stabilize products on pallets. To popularize the PP tape mainly contributed to: easy application, secure strapping and unloading of the load, low unit cost of short circuit as well as resistance to atmospheric factors. Polypropylene tapes can be used in pinning machines or with manual devices. By welding the ends of the tape or fastening them with clips (plastic, wire or metal) we get a durable closed circuit (the so-called closed loop)\nOur offer includes:\nIn addition to the PP tape, we offer different types of buckles and clasping devices.", "label": "No"} {"text": "Jiangsu University of Science and Technology\nJiangsu University of Science and Technology is mainly located in the scenic and historic city of Zhenjiang, Jiangsu province.\nIt is an engineering-oriented university with a competitive edge in three disciplines: shipbuilding, marine engineering and sericulture study.\nWith its excellence at cultivating engineers, it is credited as being one of the best institutions by the Ministry of Education. With diligence, virtues, experience and practice as its motto, and the Belt and Road Initiative as its mission, Jiangsu University of Science and Technology is dedicated to the well-being of Chinese society and world development.", "label": "No"} {"text": "Second, the small LCD panel motorola razr v3 modem when the phone is closed lights up for only 10 seconds or so and cannot be set to stay on indefinitely or for longer. Watch your favourite movies on your Motorola Razr gsm v3 driver download. The Motorola Razr V3i was released to most worldwide markets in the Q4 of — Old but reliable A simple but user friendly flip phone with features only those less than tech savy consumers can appreciate. Motorola V3 Razr Win Driver. When you have the most up to date device drivers on your system, your computer will run at optimal performance and be free of errors! I want to motorola pc suite for internet connect.\n|Date Added:||1 February 2011|\n|File Size:||32.11 Mb|\n|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|\n|Price:||Free* [*Free Regsitration Required]|\nDownload free hip hop loops.\nVODAFONE K3772 USB MODEM DRIVERS FOR MAC DOWNLOAD\nAbout three weeks ago I put into my hands for the first time the hot new Motorola Razr V3 flip phone. Unlike most other versions, the MS version is packaged with a charging dock and has three metal terminals on the mocem side immediately motorola v3 phone the battery cover.\nRazr gsm v3 r usb modem want softwware for thismobile to transfer razr gsm v3 r374 usb modem to PC and to charge my mobile. Tablet tools Tablet finder New tablets Popular tablets Compare tablets. Gta san andreas download link unicode.\nHere’s a link to this great service Good luck! Facebook Twitter Google plus. Posted on Jan 02, A black version was produced for distribution in the 77th Academy Awards gift bags, and was released in early May The device has mAh battery capacity.\nRAZR V3R DRIVER FOR WINDOWS DOWNLOAD\nEquipped with updated styling razr v3r v3r also adds a microSD memory card slot, and speaker-independent voice control. You may wish to try again at a later time. A device driver ysb a computer program that enables devices to communicate with each other. Motorola mobile phones Mobile phones introduced in Symbian devices ITunes Computer-related introductions in That turned out to razr gsm v3 r374 usb modem a real pain, so maybe they upgraded that on later models This section needs to razr v3r updated.\nMotorola V3 Razr Win Driver. Yoshua alikuti download itunes. Xchange Mobile Partner for Motorola, and many more programs Razr gsm v3 driver download. It just appears razr gsm v3 r374 usb modem arrow on the screen, and nothing else happens. The equivalent models offered by competitors such as the Dazr by T-Mobile still retain these features. If it modej by default vodafone k usb modem the company then can be unlocked.\nFor device drivers, do-it-yourself is really only an option if you have lots of free time and are highly proficient with the inner workings of your computer.\nI will recharge you. This handy and ingenious utility scans and downloads all updated drivers as they come available. Manufacturers Apple Samsung Asus Amazon. I want this phone! If you add new hardware or software to your PC, you need to razr gsm v3 r374 usb modem the latest drivers for them on your PC for them to function properly on your PC.\nBut motorla sure to get the phone insurance. SamsungCentury City. May 01, Cell Phones. However, the phone has been plagued with hardware and software reliability problems that are well documented in Australian motorola v3 razr gsm v3 r374 usb modem discussion forums. I tried it with Freedialup.\nRazr gsm v3 driver download Rating: Xchange Mobile Partner for Motorola, and many more programs Razr gsm v3 driver download razr gsm v3 r usb modem driver download. While its main screen has a higher resolution, it retains moddm traditional secondary display of the RAZR V3 phones. Then just follow the steps presented.", "label": "No"} {"text": "With Admo.tv, measure your campaigns on linear and connected TV and discover the complementarity of these 2 advertising media. Incremental reach, engagement, conversion, exposure frequency... discover all the key indicators and evaluate the performance of your spots.\nAdmo.tv measures the impact of your connected TV campaigns\nMeasure the complementarity of your linear and connected TV campaigns\nThanks to strong partners such as Samba TV, leader in tracking, measurement and ad targeting on connected TVs, and Magnite, leader in SSPs, Admo.tv offers the 1st performance measurement solution for connected TVs.\nIn addition to your TV and radio campaigns, measure the impact of your campaigns on connected TV, a fast-growing medium with over 75% of French households equipped.\nOur analyses provide precise information on incremental reach, engagement, conversion, frequency of exposure, etc., and make it easy to compare the results of your traditional linear TV campaigns with those of your connected TV campaigns.\nOur SaaS platform gives you a complete analysis of your TV and radio advertising, making it easy to optimize your media plans.\nThe advantages of our CTV solution :\n▶ Activatable for all budgets\n▶ Ability to measure by campaign\n▶ Optimization recommendations adapted to your strategy\n▶ Key insights into your target TV audience\nExposure frequency, incremental reach, engagement, etc. Our CTV measurement solution enables you to quickly determine the extent to which this type of campaign impacts a target different from linear TV.\nWith Admo.tv, you can optimize your expenses by dividing your TV budget between these 2 media.\nAt the frontier of digital, connected TV makes it possible to reach a different target than linear TV, which can then be activated online thanks to our Leverage solution.\nConnected TV measurement solution\nYou're just one click away from accessing the demo request form and discovering our CTV measurement solution with one of our experts!", "label": "No"} {"text": "After being scammed several times,i finally got what i wanted thanks to this great hacker email@example.com I ...(more)\nI was able to spy on my cheating ex-wife phone without her finding out...it really helped my lawyer during my divorce...(more)\nIf you know you not ready for a relationship why get into one and still cheat and liar. I was dying inside for my che...(more)\nI'm running windows 7. IE, Google\nwebcam mobile for | mario mobile game | norton antivirus for | www.mobile.com | ilivid for mac | anti virus for | kundli for mobile | nokia 801t 8mp | symbian sisx game | symbian-os-apps | mobile phone antivirus | mobile avi player | mobile hide folder | youtube converter to\nPlease be aware that Brothersoft do not supply any crack, patches, serial numbers or keygen for FortiClient Mobile for Symbian OS,and please consult directly with program authors for any problem with FortiClient Mobile for Symbian OS.\nmobile phone os | bearshare for mac os x | forticlient | symbian .sis n70 | flash player mobile opera | yahoo messenger for mobile | mobile phone pc suite | lg mobile antivirus | symbian os | symbian.com | camstudio mac os x | sony ericsson mobile antivirus | mobile mp3 player | antivirus s40 mobile | gtalk application for symbian os | freeware symbian os smartphones | mobile phone os softwears | mobile softwer | jar file mobile antivirus | mobile antivirus software | mobile antivirus for symbian | symbian-os-freeware | quick heal mobile antivirus | mobile phone dictionary", "label": "No"} {"text": "Please use this identifier to cite or link to this item:\n|Title:||DIFFERENTIAL EVOLUTION-BASED METHODS FOR NUMERICAL OPTIMIZATION||Authors:||QIU XIN||Keywords:||Evolutionary Algorithm,Differential Evolution,Multi-objective Optimization,Minimax Optimization,Numerical Optimization,Robust Optimization||Issue Date:||11-Aug-2016||Citation:||QIU XIN (2016-08-11). DIFFERENTIAL EVOLUTION-BASED METHODS FOR NUMERICAL OPTIMIZATION. ScholarBank@NUS Repository.||Abstract:||This thesis focuses on designing new Differential Evolution (DE) variants to overcome the limitations of existing approaches in solving single-objective, multi-objective and minimax optimization problems. First, a multiple exponential recombination strategy is proposed to fill the research gap in DE crossover operator development. The new strategy is able to inherit all the main advantages of existing crossover operators while possessing a stronger ability in handling dependent variables. Next, a novel multi-objective DE algorithm is designed for circumventing the convergence slowdown, parametric sensitivity and lack of flexibility issues while extending DE to multi-objective optimization. Last, the minimax optimization problems in robust design are investigated. A new minimax DE algorithm is developed to efficiently address the fundamental issues in current minimax optimization area. Besides the statistical superiority over other state-of-the-art approaches, the new algorithm is also successfully applied to solve two open problems in robust control.||URI:||http://scholarbank.nus.edu.sg/handle/10635/134464|\n|Appears in Collections:||Ph.D Theses (Open)|\nShow full item record\nFiles in This Item:\n|QiuX.pdf||8.71 MB||Adobe PDF|\nItems in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.", "label": "No"} {"text": "Test for independence between time to failure and cause of failure in competing risks with k causes\nJournal of Nonparametric Statistics\nIn this paper, we develop a simple nonparametric test for testing the independence of time to failure and cause of failure in competing risks set up. We generalise the test to the situation where failure data is right censored. We obtain the asymptotic distribution of the test statistics for complete and censored data. The efficiency loss due to censoring is studied using Pitman efficiency. The performance of the proposed test is evaluated through simulations. Finally we illustrate our test procedure using three real data sets.\nAnjana, S.; Dewan, Isha; and Sudheesh, K. K., \"Test for independence between time to failure and cause of failure in competing risks with k causes\" (2019). Journal Articles. 886.", "label": "No"} {"text": "Please let me the code for PSAR with buy and sell when it open 1st time.\nAs per above requirement\nCROSSOVER(CLOSE, PSAR(0.02, 0.2)) = TRUE\nCROSSOVER(PSAR(0.02, 0.2),CLOSE) = TRUE\nwill it give alert when PSAR start trending , i mean when it show the 1st tik , because i do see 1st tick when second candel is already started .\nthe code is giving lots of singnals in opposit direction , trend is up based on PSAR but yet it is giving sell signals … I need code when PSAR gives 1st trend signal .", "label": "No"} {"text": "Please enter the email address for your account. A verification code will be sent to you. Once you have received the verification code, you will be able to choose a new password for your account.\nBeautiful scarves, packed with care, in our lovely gift boxes with a personalised message.\nRoehill Cottage, Highbridge, Dalston, Carlisle, CA5 7DR\n(0169) 747 6911", "label": "No"} {"text": "JOB: Senior Software Engineer (Team Lead ACG & MSSIP) at Eyeball Networks Ltd\n-- 3.5 years experience on C++ in real-time development. -- 3.5 years experience on real-time Audio/Video internet communication. -- Expert on implementing Internet standard RFC's. -- Expert on STUN, TURN, ICE, SIP. -- Expert on Microsoft standard SIP, ICE, TURN, STUN, Presence. -- Expert on XMPP, gTalk, libJingle CLASSIC STUN, ICE. -- Expert on WebRTC Ice, signaling, SRTP, DTLS. -- Expert on Bandwidth management for Real-time media communication. -- Expert on Gateway technology for supporting multiple Internet standard in same platform for real-time Audio/Video communication. -- Work on an accelerated development environment for providing customer support. -- Work on a team with more than 10 engineer for fulfilling and achieving a common goal.\nSTUDY: I have completed my BSC in Computer Science & Engineering from Shahjalal University Of Science & technology in 2011 with CGPA - 3.59.\nNo questions with score of 5 or more", "label": "No"} {"text": "Behavioral endocrinology and systems neuroscience increasingly benefit from integrating data across levels of organization in order to gain insights into the neural basis of behavior. While imaging and genetic approaches have long complemented electrophysiological analyses, it has now also become possible to conduct molecular level experiments in a diversity of model systems. For the past 35 years, the Neural Systems & Behavior course at the Marine Biological Laboratory has established itself as the premier discovery-driven training opportunity for the next generation of neuroethologists and systems neuroscientists. More recently, efforts have been directed toward the incorporation of molecular and genomic approaches with the traditional behavioral and electrophysiological approaches. Building on a successful collaborative project in 20131,2, we now expand the teaching module. We developed intellectuallystimulating yet robust and feasible procedures that integrate both in vitro and in vivo physiology preparations, with either quantitative real-time PCR or immunohistochemistry for the subsequent measure of gene expression. As the eight-week course is divided into four two-week cycles, the preceding cycles offer students a series of different preparations and topical questions during which behavioral and physiological studies generate samples appropriate for subsequent integration of molecular techniques. Students’ molecular projects are conducted not only to genetic model systems (e.g. flies and mice), but also classical models of neuroethology (e.g. leech, crustaceans, electric fish), in order to integrate a molecular understanding with learning and memory, mating behavior, central pattern generators etc. The projects are made robust through advance testing of protocols and reagents that complement the physiology experiments. Yet students also learn design, optimization and potential project extension through prepared exercises. The integration of molecular techniques now allows the course to more fully accomplish the course goal to expose students to diverse approaches to the investigation of the neural basis of behavior.", "label": "No"} {"text": "The Manette Grande pendant light by Tech Lighting is an elevated version of the classic cylinder pendant. with its simple cylindrical design and added sleek metal bands, the Manette Grande exudes style and simplicity. This hand-blown pendant can be customized via several color combinations to match your unique preferences. Available color options include Clear, Smoke, White and Transparent Smoke. Three on-trend hardware finishes are available along with your choice of energy efficient LED lamps. Due to its larger size, the Manette Grande is ideal for kitchen island task lighting, dining room lighting and home office lighting applications. Your choice of 5 upper and lower glass and acrylic color combinations allow opportunity for incredible personalization. LED light sources fire simultaneously up and down to evenly illuminate the glass while contributing both direct and indirect illumination.\n- European artisanally crafted hand-blown glass\n- Various color and hardware customizations available for a pendant uniquely yours\n- Complementary Manette low-voltage and Manette ceiling fixture available by Tech Lighting\n- Ideal for kitchen island task lighting, dining room lighting and bedroom lighting\n- High quality, long-lasting integrated LED lamping included to save you time and money\n- Protected by a 1-year warranty\nIncludes 18 watt, 925 delivered lumen (725 lumens down/200 lumens up) LED modules. Dimmable with most LED compatible ELV and TRIAC dimmers. Ships with twelve feet of field cuttable cable.\n*Image shown is for Illustration purpose only, actual product's color/finish/option may vary.\n*This item is excluded from sale events and not available for additional discounting or promotional offers.", "label": "No"} {"text": "bathroom light with pull chain down lighting fixtures effects of.\nlow ceiling fans with lights in indoor profile fresh white fan light kit.\nhampton bay led ceiling light 3 satin bronze alabaster glass fan kit.\nceiling lights with pull chain light flush mount led.\ndecorative outdoor lighting hang string lights.\ncrystorama hampton 5 light chandelier.\nfalse ceiling lighting ideas kitchen light design pictures cool home.\nceiling fan with light wiring switch bay diagram here is a.\nmoroccan ceiling light bask.", "label": "No"} {"text": "Chris Woolard BSc Phd (Cape Town)\nChris Woolard graduated with a PhD from the University of Cape Town. He has lectured at the University of South Africa and the Nelson Mandela Mandela Metropolitan University in Port Elizabeth.\nCurrently he is employed as a principal scientist by Sasol Technology at the Sasol Advanced Fuels Laboratory on the campus of the University of Cape Town. He is also a part-time lecturer of postgraduate courses at the Centre for Materials Engineering and in the Departments of Mechanical Engineering and Chemical Engineering.\nHe has significant experience in Materials Science, particularly focused on research in rubber science and technology for various tyre manufacturers, motor vehicle manufacturers and synthetic rubber producers. He was a founding member of Rubber Nano Products which has developed a nanomaterial for rubber modification. His research has also spanned a wide variety of other polymer and materials science activities. These include materials for solar science, particulate polymer composites, methods for polymer characterization and polymer waste utilisation.", "label": "No"} {"text": "NETPOWER MOBILE integrates a worksurface with a tablet stand to allow an easy use of electronic devices in the classroom. The tablet may be used in portrait and landscape position. The chair with casters also includes a battery to charge any electric device.\n- Rotating worksurface\n- Charges any electronic device\n- Casters for mobility", "label": "No"} {"text": "RarmaRadio Pro 2.72.7 Multilingual | 12.8 Mb\nRaimaRadio allows you to listen to and record radio stations from around the world. While listening to your favorite radio stationyou can record it anytime you want. Browse through the radio stations or just select a random station and enjoy Internet radio! You have total control over your radio stations allowing you to add or delete a station anytime you want. Need to play a station from another applicaton then just enable global hotkeys and control it anytime. With RarmaRadio you can receive and record thousands of radio stations available on the Internet.", "label": "No"} {"text": "Please click below to download:\nRELATED DOWNLOADS OF EZDNS\nDSL autoconnection app\n- Maxus SE\nA multi-functional tool designed to improve your Windows and Internet experience\n- TZO Lite\nTZO uses true dynamic DNS technology to fix domain name to a Dynamic IP address.\nAccess thousands of commercial and shared WiFi networks around the world\nRemotedesktopconnection with only one click\n- Time Interval Report\nQuery any periods of IP statistics data\n- Flexiblesoft Dialer XP PRO\nConnect to the Internet with this full-featured DUN dialer.\n- Version Control Pro\nLet you easily access computer that behind firewall or an inconfigurable router by using Reverse Port Forwarding Wizard.\n- BySoft Internet Remote Control\nRemote control of Internet connection. Free\nWinc allows users of mobile and desktop PCs to not only easily find and connect", "label": "No"} {"text": "The Experimental and Translational Immunomics Research Group, established in July 2012, conducts multidisciplinary research in the fields of immunology and genomics, with most of its efforts focused on the analysis of CD8+ T cell homing, immigration of CD8+ T cells into distinct tissue environments, phenotypic plasticity of Cd8+ T cells in different tissues, and regional immunity maintained by CD8+ T cells. The group investigates these questions using automated isolation of tissue-resident CD8+ T memory and effector cells, genomic scale description of their organ-specific characteristics, and tracking in vivo T cell activity and movement, using both transgenic mouse models and human clinical samples.\nThe research group typically uses the following methods and approaches :\nMurine experimental acute GvHD model (Actm-OVA/OT-I)\nHuman patiensts diagnosed with acute GvHD\nMurine experimental H1N1 flu infection model (A/PR/8/34)\nAdoptive T cell transfer\nIn vivo T cell tracking\nAutomated tissue dissociation\nAutomated MACS sorting\nWhole genome gene expression profiling\nIn vitro CD8+ T cell acivation\nIn vitro CD8+ T cell killing assay\nResearch infrastructure, equipment, transgenic mouse strains\nSufficient wet lab space, an automated tissue dissociation platform (Miltenyi Biotec gentleMACS Octo with Heating Upgrade), an automated magnetic cell sorting system (Miltenyi Biotec AutoMACS Pro), multiple BSL2 and BSL1 laminar flow hoods (Esco), a refrigerated Eppendorf centrifuge (Heraeus Fresco 17), desktop centrifuge (Heraeus Megafuge 16R), and sufficient storage capacity (liquid N2 tank, -80C freezer, -20C freezers, 4C fridges) are readily available. Besides, the group maintains several transgenic mouse strains, as follows (all on the C57Bl/6 backround): OT-I, Act-mOVA, CD45.1, UBC-GFP. Potential collaborators are encouraged to contact the group leader; we have several ongoing collaborations using the above infrastructure.\n|Dr. Zoltán Pós, Associate Professor|\n|Nikolett Lupsa, Research Fellow|\n|Dr. Barbara Molnár-Érsek, Senior Research Fellow|\nMelanoma-associated fibroblasts impair CD8+ T cell function and modify expression of immune checkpoint regulators via increased arginase activity.\nÉrsek B, Silló P, Cakir U, Molnár V, Bencsik A, Mayer B, Mezey E, Kárpáti S, Pós Z, Németh K.\nCell Mol Life Sci. 2020 Apr 23. doi: 10.1007/s00018-020-03517-8. PMID: 32328671", "label": "No"} {"text": "glass door display cabinet locks locking cabinets with lock lockable case units for living room office wall mounted.\noak display cabinets locking cabinet lockable glass in caramel with indirect lighting.\nlock corner display cabinet lockable locking glass wall white wine gun.\ncheap lockable glass display cabinets locking case cabinet canada.\nlocking display cabinet canada of style inlay curio.\nii glass curio cabinet sliding locking display lockable with lights miller espresso finished six shelves.\nglass display cabinet case with top spot led light sliding door locking small lockable.\nvintage solid oak bookcase display cabinet three locking glass fronted doors lockable showcase.\noffice furniture glass front locking cabinet display small lockable.\nlocking display cabinet wine curio in white by acme p.\nsmall glass curio cabinets wood and display cabinet wall mounted locking tiny used lockable di.\nhidden gun storage curio cabinet slider combo rifle shotgun locking firearm safe display lockable glass cabinets uk.\nlocking display cabinet wall mounted tower storage case black base.\nfirework wall display cabinet locking glass doors corner used lockable cabinets.\ntable glass display case locking cabinet used lockable cabinets museum cherry wood with tempered.\ndisplay cabinet in black polished metal with halogen lights locking retail cabinets.\nwood and glass door locking eight gun display cabinet canada.\nacrylic display cabinet with base unit locking ikea.\naluminium glass display cabinet with 2 shelves and lock locking wall mounted cabinets.\nlockable display cabinets glass locking cabinet wall case mounted curio showcase mounte.\ndetails about opening lockable display cabinet notice board for posters locking gun.\noak finish locking display cabinet with glass doors.\nantique locking glass display cabinet gun.\nlocking glass display case modern jewelry aluminum furniture lockable vitrine cabinet for showcase lock.\nslide front 5 shelf locking display cabinet in medium oak brown lockable glass.\nwall hung glass display case single cabinet store locking mount hanging cases lockable w.\nlocking glass display case cabinet lock home improvement cast gun.\ncabinets showcases display toughened safety glass locking castors secure cam locks splash cabinet lockable wall and sh.\nrevolving display cabinet for tabletop locking small lockable glass led top lighting.\nwall stand clear flooring locking acrylic display cabinet for garment used lockable glass cabinets china.\nglass display cabinet locking wall mounted cases with built in led lights and hidden wheels.", "label": "No"} {"text": "In 2005, scientists from various science centres in Spain, Germany, Switzerland, Australia, the United States and Chile created the Mountain Invasion Research Unit (MIREN) in order to study the distribution of exotic species in high mountain species and to design experiments to confirm the invasive capacity of certain species in high mountain environments.\n\"These plant communities in Alpine environments have until now not been thought particularly vulnerable to this kind of environmental disturbance\", José Ramón Arévalo, one of the authors of the study and a researcher at the Department of Ecology of the University of La Laguna, tells SINC. However, the experiments show clearly \"that the beliefs about this supposed protection and mountain species' resistance to invasive species is erroneous\", he adds.\nThe study, published recently in Frontiers in Ecology and The Environment, and which is part of the work done by MIREN, has made it possible to identify the factors that make plants in these areas more vulnerable to invasion by other species.\nAmong other factors, the scientists stress the ease of movement of propagules (plants which can reproduce asexually in order to produce new plants) as a result of human activity and the increase in environmental disturbance, the low levels of biological resistance of invaded plant communities, the increase in transport between high mountain areas that are far apart from each other, and the risks according to climate change models, \"which will make it easier for invasive plants to establish themselves and reproduce\", the ecologist explains.\nA work agenda to stem invasions\nThe work carried out over the last five years shows that \"invasions may be a factor in more extensive and serious disturbance than had ever been thought\", says Arévalo. The scientists also say there is a need to establish a work agenda to evaluate \"not only current invasions, but also those that could happen in the future in mountainous environments\", warns the researcher.\nProtecting against and above all preventing invasions could be done by means of experimental and modelling work. Arévalo says \"biological invasion is not a fact, but rather a process of species overlapping within a habitat, which means prevention is much more effective and viable than eradication\".\nPauchard, Anibal; Kueffer, Christoph; Dietz, Hansjoerg; Daehler, Curtis C.; Alexander, Jake; Edwards, Peter J.; Arévalo, José Ramón; Cavieres, Lohengrin A.; Guisan, Antoine; Haider, Sylvia; Jakobs, Gabi; McDougall, Keith; Millar, Constance I.; Naylor, Bridgett J.; Parks, Catherine G.; Rew, Lisa J.; Seipel, Tim. \"Ain't no mountain high enough: plant invasions reaching new elevations\" Frontiers in Ecology and The Environment 7(9): 479-486 noviembre de 2009.\nSINC | EurekAlert!\nConservationists are sounding the alarm: parrots much more threatened than assumed\n15.09.2017 | Justus-Liebig-Universität Gießen\nA new indicator for marine ecosystem changes: the diatom/dinoflagellate index\n21.08.2017 | Leibniz-Institut für Ostseeforschung Warnemünde\nPlants and algae use the enzyme Rubisco to fix carbon dioxide, removing it from the atmosphere and converting it into biomass. Algae have figured out a way to increase the efficiency of carbon fixation. They gather most of their Rubisco into a ball-shaped microcompartment called the pyrenoid, which they flood with a high local concentration of carbon dioxide. A team of scientists at Princeton University, the Carnegie Institution for Science, Stanford University and the Max Plank Institute of Biochemistry have unravelled the mysteries of how the pyrenoid is assembled. These insights can help to engineer crops that remove more carbon dioxide from the atmosphere while producing more food.\nA warming planet\nOur brains house extremely complex neuronal circuits, whose detailed structures are still largely unknown. This is especially true for the so-called cerebral cortex of mammals, where among other things vision, thoughts or spatial orientation are being computed. Here the rules by which nerve cells are connected to each other are only partly understood. A team of scientists around Moritz Helmstaedter at the Frankfiurt Max Planck Institute for Brain Research and Helene Schmidt (Humboldt University in Berlin) have now discovered a surprisingly precise nerve cell connectivity pattern in the part of the cerebral cortex that is responsible for orienting the individual animal or human in space.\nThe researchers report online in Nature (Schmidt et al., 2017. Axonal synapse sorting in medial entorhinal cortex, DOI: 10.1038/nature24005) that synapses in...\nWhispering gallery mode (WGM) resonators are used to make tiny micro-lasers, sensors, switches, routers and other devices. These tiny structures rely on a...\nUsing ultrafast flashes of laser and x-ray radiation, scientists at the Max Planck Institute of Quantum Optics (Garching, Germany) took snapshots of the briefest electron motion inside a solid material to date. The electron motion lasted only 750 billionths of the billionth of a second before it fainted, setting a new record of human capability to capture ultrafast processes inside solids!\nWhen x-rays shine onto solid materials or large molecules, an electron is pushed away from its original place near the nucleus of the atom, leaving a hole...\nFor the first time, physicists have successfully imaged spiral magnetic ordering in a multiferroic material. These materials are considered highly promising candidates for future data storage media. The researchers were able to prove their findings using unique quantum sensors that were developed at Basel University and that can analyze electromagnetic fields on the nanometer scale. The results – obtained by scientists from the University of Basel’s Department of Physics, the Swiss Nanoscience Institute, the University of Montpellier and several laboratories from University Paris-Saclay – were recently published in the journal Nature.\nMultiferroics are materials that simultaneously react to electric and magnetic fields. These two properties are rarely found together, and their combined...\n19.09.2017 | Event News\n12.09.2017 | Event News\n06.09.2017 | Event News\n22.09.2017 | Medical Engineering\n22.09.2017 | Physics and Astronomy\n22.09.2017 | Physics and Astronomy", "label": "No"} {"text": "Saturday 09th, December 2017 17:27:50: PM. Christmas.. nadeen oliver.\nCznivk_wgaa9agy wral christmas lights map tv tower sloane heffernan on twitter. Awesome wral christmas lights map tv tower picturescwraltv. Wral christmas lights 158008016_christmas tv tower map awesome this.\nSaturday 09th, December 2017 17:24:03: PM. Christmas.. nancy guillot.\nClear christmasts with white cord cordclear outdoor. Christmas clear lights outdoor with white cordclear wire led. Christmas clear lights transparent incandescent bulb light img_7312a ge red green led lightsled. Blue clear mini icicle lights white wire christmas led greend with cordclear outdoor ge.\nmini clear christmas lights with white wireclear christmas lights with white cordclear christmas lights for saleclear christmas lights clearance 100 count led christmas lights clearclear led christmas lights white wireclear colored led christmas lightsgreen red clear christmas lights led clear christmas lights clearance ge red green clear led christmas lightsled clear christmas lights green wireled clear christmas lights bulbsled clear christmas lights too brightclear christmas lights with white wire clear christmas lights white wire led clear christmas lights bulbs led clear christmas lights green wire clear colored led christmas lights clear christmas lights with white cordclear christmas lights outdoor clear mini christmas lights white wire\nSaturday 09th, December 2017 17:23:10: PM. Christmas.. nancy guillot.\nChristmas lightsy in capoway neighborhood lightspoway displaychristmas cachristmas. Poway christmas lights staggering picture inspirations in neighborhood lightspoway. Staggering poway christmass picture inspirations img_7275 1024x768 onndyne lane in healthy family travel outstanding photo ideas.\nchristmas lights in poway capoway neighborhood christmas lightspoway christmas lights displaychristmas lights in poway cachristmas lights poway ca christmas lights poway ca christmas lights in poway cachristmas lights in poway capoway neighborhood christmas lights poway christmas lights display christmas lights in poway ca poway neighborhood christmas lightspoway christmas lights displaychristmas lights in poway cachristmas lights poway ca poway christmas lights\nSaturday 09th, December 2017 17:07:52: PM. Christmas.. nadeen oliver.\nChristmas the worlds best photos oft and rooster flickr hive phenomenal sleepy hollow lights. Christmas sleepy hollowights extravaganza torrance map. Img_03812e629py hollow christmas lights steemit torrancesleepy torrance.\nSaturday 09th, December 2017 17:07:43: PM. Christmas.. nadine louis.\nChristmas lightsumblr photography decoration lightingrees inhe park night holiday. Christmas lightsr the city beautiful on houses u happy holidays in. Christmas lights tumblr themechristmas theme with tree. Christmas lights tumblr themechristmas theme new vintage.\nSaturday 09th, December 2017 16:48:37: PM. Christmas.. nanine riviere.\nFabulous animated christmas lightsplays image ideas amazing outdoor style motivation. Animated christmas light display oklahoma outdoor displays for sale kits. Animated outdoor christmas light displays for sale display kits led.\nSaturday 09th, December 2017 16:24:53: PM. Christmas.. nadeen oliver.\nChristmas light sale vintage edisonulb tags style lightslue sales cvs led near me. Christmas light sales walmart cvs led lights sale near me black friday. Christmas light sale picture inspirations outdoor displays ideas best for display to.\nSaturday 09th, December 2017 16:11:31: PM. Christmas.. gerland dupuis.\nLed net christmashts 4x8 best for bushes blue. Led net christmas lights phenomenal picture ideas decoration 16w 400pcs rgb font. Christmas phenomenald net lights picture ideas aleko mesh fairy string white fd14f19cdca5_1 1024x1024.\nSaturday 09th, December 2017 15:57:09: PM. Christmas.. gerland dupuis.\nChristmas light storage pack of andord winders ideal for fairy lights whitmor boxchristmasontainers. Christmasight storage whitmor boxwhitmor boxchristmas containers on salechristmas bag. Christmas light storage winder lighting pinterest containers.\nchristmas light storage ideas christmas light storage system whitmor christmas light storage boxchristmas light storage containers christmas light storage containers on salechristmas light storage containers on salechristmas light storage bag christmas light storage box large christmas light storage reelchristmas light storage box\nSaturday 09th, December 2017 15:42:32: PM. Christmas.. gerland dupuis.\nMeteor christmas lights grand cascade led light tubes cool white for sale hanging lightsmeteor. Awesomeeor christmas lights picture ideas new led chasing lightsled shower light for disco. Awesome meteor christmas lights picture ideas 30cm50cm waterproof shower rain tubes led light for party amazon.\nmeteor christmas lights for salehanging meteor christmas lightsmeteor christmas lights for salemeteor christmas lighting hanging meteor christmas lightsmeteor christmas lights for saleamazon meteor shower christmas lightschristmas lights meteor shower meteor christmas lights christmas meteor lights sale meteor christmas lighting", "label": "No"} {"text": "The aim of de novo protein design is to find the amino acid sequences that will fold into a desired 3-dimensional structure with improvements in specific properties, such as binding affinity, agonist or antagonist behavior, or stability, relative to the native sequence. Protein design lies at the center of current advances drug design and discovery. Not only does protein design provide predictions for potentially useful drug targets, but it also enhances our understanding of the protein folding process and protein-protein interactions. Experimental methods such as directed evolution have shown success in protein design. However, such methods are restricted by the limited sequence space that can be searched tractably. In contrast, computational design strategies allow for the screening of a much larger set of sequences covering a wide variety of properties and functionality. We have developed a range of computational de novo protein design methods capable of tackling several important areas of protein design. These include the design of monomeric proteins for increased stability and complexes for increased binding affinity.\nTo disseminate these methods for broader use we present Protein WISDOM (https://www.proteinwisdom.org), a tool that provides automated methods for a variety of protein design problems. Structural templates are submitted to initialize the design process. The first stage of design is an optimization sequence selection stage that aims at improving stability through minimization of potential energy in the sequence space. Selected sequences are then run through a fold specificity stage and a binding affinity stage. A rank-ordered list of the sequences for each step of the process, along with relevant designed structures, provides the user with a comprehensive quantitative assessment of the design. Here we provide the details of each design method, as well as several notable experimental successes attained through the use of the methods.\n23 Related JoVE Articles!\nChromatin Interaction Analysis with Paired-End Tag Sequencing (ChIA-PET) for Mapping Chromatin Interactions and Understanding Transcription Regulation\nInstitutions: Agency for Science, Technology and Research, Singapore, A*STAR-Duke-NUS Neuroscience Research Partnership, Singapore, National University of Singapore, Singapore.\nGenomes are organized into three-dimensional structures, adopting higher-order conformations inside the micron-sized nuclear spaces 7, 2, 12\n. Such architectures are not random and involve interactions between gene promoters and regulatory elements 13\n. The binding of transcription factors to specific regulatory sequences brings about a network of transcription regulation and coordination 1, 14\nChromatin Interaction Analysis by Paired-End Tag Sequencing (ChIA-PET) was developed to identify these higher-order chromatin structures 5,6\n. Cells are fixed and interacting loci are captured by covalent DNA-protein cross-links. To minimize non-specific noise and reduce complexity, as well as to increase the specificity of the chromatin interaction analysis, chromatin immunoprecipitation (ChIP) is used against specific protein factors to enrich chromatin fragments of interest before proximity ligation. Ligation involving half-linkers subsequently forms covalent links between pairs of DNA fragments tethered together within individual chromatin complexes. The flanking MmeI restriction enzyme sites in the half-linkers allow extraction of paired end tag-linker-tag constructs (PETs) upon MmeI digestion. As the half-linkers are biotinylated, these PET constructs are purified using streptavidin-magnetic beads. The purified PETs are ligated with next-generation sequencing adaptors and a catalog of interacting fragments is generated via next-generation sequencers such as the Illumina Genome Analyzer. Mapping and bioinformatics analysis is then performed to identify ChIP-enriched binding sites and ChIP-enriched chromatin interactions 8\nWe have produced a video to demonstrate critical aspects of the ChIA-PET protocol, especially the preparation of ChIP as the quality of ChIP plays a major role in the outcome of a ChIA-PET library. As the protocols are very long, only the critical steps are shown in the video.\nGenetics, Issue 62, ChIP, ChIA-PET, Chromatin Interactions, Genomics, Next-Generation Sequencing\nCombined DNA-RNA Fluorescent In situ Hybridization (FISH) to Study X Chromosome Inactivation in Differentiated Female Mouse Embryonic Stem Cells\nInstitutions: Erasmus MC - University Medical Center.\nFluorescent in situ\nhybridization (FISH) is a molecular technique which enables the detection of nucleic acids in cells. DNA FISH is often used in cytogenetics and cancer diagnostics, and can detect aberrations of the genome, which often has important clinical implications. RNA FISH can be used to detect RNA molecules in cells and has provided important insights in regulation of gene expression. Combining DNA and RNA FISH within the same cell is technically challenging, as conditions suitable for DNA FISH might be too harsh for fragile, single stranded RNA molecules. We here present an easily applicable protocol which enables the combined, simultaneous detection of Xist\nRNA and DNA encoded by the X chromosomes. This combined DNA-RNA FISH protocol can likely be applied to other systems where both RNA and DNA need to be detected.\nBiochemistry, Issue 88, Fluorescent in situ hybridization (FISH), combined DNA-RNA FISH, ES cell, cytogenetics, single cell analysis, X chromosome inactivation (XCI), Xist, Bacterial artificial chromosome (BAC), DNA-probe, Rnf12\nExpression, Isolation, and Purification of Soluble and Insoluble Biotinylated Proteins for Nerve Tissue Regeneration\nInstitutions: University of Akron.\nRecombinant protein engineering has utilized Escherichia coli (E. coli)\nexpression systems for nearly 4 decades, and today E. coli\nis still the most widely used host organism. The flexibility of the system allows for the addition of moieties such as a biotin tag (for streptavidin interactions) and larger functional proteins like green fluorescent protein or cherry red protein. Also, the integration of unnatural amino acids like metal ion chelators, uniquely reactive functional groups, spectroscopic probes, and molecules imparting post-translational modifications has enabled better manipulation of protein properties and functionalities. As a result this technique creates customizable fusion proteins that offer significant utility for various fields of research. More specifically, the biotinylatable protein sequence has been incorporated into many target proteins because of the high affinity interaction between biotin with avidin and streptavidin. This addition has aided in enhancing detection and purification of tagged proteins as well as opening the way for secondary applications such as cell sorting. Thus, biotin-labeled molecules show an increasing and widespread influence in bioindustrial and biomedical fields. For the purpose of our research we have engineered recombinant biotinylated fusion proteins containing nerve growth factor (NGF) and semaphorin3A (Sema3A) functional regions. We have reported previously how these biotinylated fusion proteins, along with other active protein sequences, can be tethered to biomaterials for tissue engineering and regenerative purposes. This protocol outlines the basics of engineering biotinylatable proteins at the milligram scale, utilizing a T7 lac\ninducible vector and E. coli\nexpression hosts, starting from transformation to scale-up and purification.\nBioengineering, Issue 83, protein engineering, recombinant protein production, AviTag, BirA, biotinylation, pET vector system, E. coli, inclusion bodies, Ni-NTA, size exclusion chromatography\nGeneration of RNA/DNA Hybrids in Genomic DNA by Transformation using RNA-containing Oligonucleotides\nInstitutions: Georgia Institute of Technology.\nSynthetic short nucleic acid polymers, oligonucleotides (oligos), are the most functional and widespread tools of molecular biology. Oligos can be produced to contain any desired DNA or RNA sequence and can be prepared to include a wide variety of base and sugar modifications. Moreover, oligos can be designed to mimic specific nucleic acid alterations and thus, can serve as important tools to investigate effects of DNA damage and mechanisms of repair. We found that Thermo Scientific Dharmacon RNA-containing oligos with a length between 50 and 80 nucleotides can be particularly suitable to study, in vivo\n, functions and consequences of chromosomal RNA/DNA hybrids and of ribonucleotides embedded into DNA. RNA/DNA hybrids can readily form during DNA replication, repair and transcription, however, very little is known about the stability of RNA/DNA hybrids in cells and to which extent these hybrids can affect the genetic integrity of cells. RNA-containing oligos, therefore, represent a perfect vector to introduce ribonucleotides into chromosomal DNA and generate RNA/DNA hybrids of chosen length and base composition. Here we present the protocol for the incorporation of ribonucleotides into the genome of the eukaryotic model system yeast /Saccharomyces cerevisiae\n/. Yet, our lab has utilized Thermo Scientific Dharmacon RNA-containing oligos to generate RNA/DNA hybrids at the chromosomal level in different cell systems, from bacteria to human cells.\nCellular Biology, Issue 45, RNA-containing oligonucleotides, ribonucleotides, RNA/DNA hybrids, yeast, transformation, gene targeting, genome instability, DNA repair\nGenomic MRI - a Public Resource for Studying Sequence Patterns within Genomic DNA\nInstitutions: University of Toledo Health Science Campus.\nNon-coding genomic regions in complex eukaryotes, including intergenic areas, introns, and untranslated segments of exons, are profoundly non-random in their nucleotide composition and consist of a complex mosaic of sequence patterns. These patterns include so-called Mid-Range Inhomogeneity (MRI) regions -- sequences 30-10000 nucleotides in length that are enriched by a particular base or combination of bases (e.g. (G+T)-rich, purine-rich, etc.). MRI regions are associated with unusual (non-B-form) DNA structures that are often involved in regulation of gene expression, recombination, and other genetic processes (Fedorova & Fedorov 2010). The existence of a strong fixation bias within MRI regions against mutations that tend to reduce their sequence inhomogeneity additionally supports the functionality and importance of these genomic sequences (Prakash et al.\nHere we demonstrate a freely available Internet resource -- the Genomic MRI\nprogram package -- designed for computational analysis of genomic sequences in order to find and characterize various MRI patterns within them (Bechtel et al.\n2008). This package also allows generation of randomized sequences with various properties and level of correspondence to the natural input DNA sequences. The main goal of this resource is to facilitate examination of vast regions of non-coding DNA that are still scarcely investigated and await thorough exploration and recognition.\nGenetics, Issue 51, bioinformatics, computational biology, genomics, non-randomness, signals, gene regulation, DNA conformation\nTransient Gene Expression in Tobacco using Gibson Assembly and the Gene Gun\nInstitutions: Harvard University, Harvard Medical School, Delft University of Technology.\nIn order to target a single protein to multiple subcellular organelles, plants typically duplicate the relevant genes, and express each gene separately using complex regulatory strategies including differential promoters and/or signal sequences. Metabolic engineers and synthetic biologists interested in targeting enzymes to a particular organelle are faced with a challenge: For a protein that is to be localized to more than one organelle, the engineer must clone the same gene multiple times. This work presents a solution to this strategy: harnessing alternative splicing of mRNA. This technology takes advantage of established chloroplast and peroxisome targeting sequences and combines them into a single mRNA that is alternatively spliced. Some splice variants are sent to the chloroplast, some to the peroxisome, and some to the cytosol. Here the system is designed for multiple-organelle targeting with alternative splicing. In this work, GFP was expected to be expressed in the chloroplast, cytosol, and peroxisome by a series of rationally designed 5’ mRNA tags. These tags have the potential to reduce the amount of cloning required when heterologous genes need to be expressed in multiple subcellular organelles. The constructs were designed in previous work11\n, and were cloned using Gibson assembly, a ligation independent cloning method that does not require restriction enzymes. The resultant plasmids were introduced into Nicotiana benthamiana\nepidermal leaf cells with a modified Gene Gun protocol. Finally, transformed leaves were observed with confocal microscopy.\nEnvironmental Sciences, Issue 86, Plant Leaves, Synthetic Biology, Plants, Genetically Modified, DNA, Plant, RNA, Gene Targeting, Plant Physiological Processes, Genes, Gene gun, Gibson assembly, Nicotiana benthamiana, Alternative splicing, confocal microscopy, chloroplast, peroxisome\nProtocols for Implementing an Escherichia coli Based TX-TL Cell-Free Expression System for Synthetic Biology\nInstitutions: California Institute of Technology, California Institute of Technology, Massachusetts Institute of Technology, University of Minnesota.\nIdeal cell-free expression systems can theoretically emulate an in vivo\ncellular environment in a controlled in vitro\nThis is useful for expressing proteins and genetic circuits in a controlled manner as well as for providing a prototyping environment for synthetic biology.2,3\nTo achieve the latter goal, cell-free expression systems that preserve endogenous Escherichia coli transcription-translation mechanisms are able to more accurately reflect in vivo\ncellular dynamics than those based on T7 RNA polymerase transcription. We describe the preparation and execution of an efficient endogenous E. coli\nbased transcription-translation (TX-TL) cell-free expression system that can produce equivalent amounts of protein as T7-based systems at a 98% cost reduction to similar commercial systems.4,5\nThe preparation of buffers and crude cell extract are described, as well as the execution of a three tube TX-TL reaction. The entire protocol takes five days to prepare and yields enough material for up to 3000 single reactions in one preparation. Once prepared, each reaction takes under 8 hr from setup to data collection and analysis. Mechanisms of regulation and transcription exogenous to E. coli\n, such as lac/tet repressors and T7 RNA polymerase, can be supplemented.6\nEndogenous properties, such as mRNA and DNA degradation rates, can also be adjusted.7\nThe TX-TL cell-free expression system has been demonstrated for large-scale circuit assembly, exploring biological phenomena, and expression of proteins under both T7- and endogenous promoters.6,8\nAccompanying mathematical models are available.9,10\nThe resulting system has unique applications in synthetic biology as a prototyping environment, or \"TX-TL biomolecular breadboard.\"\nCellular Biology, Issue 79, Bioengineering, Synthetic Biology, Chemistry Techniques, Synthetic, Molecular Biology, control theory, TX-TL, cell-free expression, in vitro, transcription-translation, cell-free protein synthesis, synthetic biology, systems biology, Escherichia coli cell extract, biological circuits, biomolecular breadboard\nSimultaneous Multicolor Imaging of Biological Structures with Fluorescence Photoactivation Localization Microscopy\nInstitutions: University of Maine.\nLocalization-based super resolution microscopy can be applied to obtain a spatial map (image) of the distribution of individual fluorescently labeled single molecules within a sample with a spatial resolution of tens of nanometers. Using either photoactivatable (PAFP) or photoswitchable (PSFP) fluorescent proteins fused to proteins of interest, or organic dyes conjugated to antibodies or other molecules of interest, fluorescence photoactivation localization microscopy (FPALM) can simultaneously image multiple species of molecules within single cells. By using the following approach, populations of large numbers (thousands to hundreds of thousands) of individual molecules are imaged in single cells and localized with a precision of ~10-30 nm. Data obtained can be applied to understanding the nanoscale spatial distributions of multiple protein types within a cell. One primary advantage of this technique is the dramatic increase in spatial resolution: while diffraction limits resolution to ~200-250 nm in conventional light microscopy, FPALM can image length scales more than an order of magnitude smaller. As many biological hypotheses concern the spatial relationships among different biomolecules, the improved resolution of FPALM can provide insight into questions of cellular organization which have previously been inaccessible to conventional fluorescence microscopy. In addition to detailing the methods for sample preparation and data acquisition, we here describe the optical setup for FPALM. One additional consideration for researchers wishing to do super-resolution microscopy is cost: in-house setups are significantly cheaper than most commercially available imaging machines. Limitations of this technique include the need for optimizing the labeling of molecules of interest within cell samples, and the need for post-processing software to visualize results. We here describe the use of PAFP and PSFP expression to image two protein species in fixed cells. Extension of the technique to living cells is also described.\nBasic Protocol, Issue 82, Microscopy, Super-resolution imaging, Multicolor, single molecule, FPALM, Localization microscopy, fluorescent proteins\nMagnetic Tweezers for the Measurement of Twist and Torque\nInstitutions: Delft University of Technology.\nSingle-molecule techniques make it possible to investigate the behavior of individual biological molecules in solution in real time. These techniques include so-called force spectroscopy approaches such as atomic force microscopy, optical tweezers, flow stretching, and magnetic tweezers. Amongst these approaches, magnetic tweezers have distinguished themselves by their ability to apply torque while maintaining a constant stretching force. Here, it is illustrated how such a “conventional” magnetic tweezers experimental configuration can, through a straightforward modification of its field configuration to minimize the magnitude of the transverse field, be adapted to measure the degree of twist in a biological molecule. The resulting configuration is termed the freely-orbiting magnetic tweezers. Additionally, it is shown how further modification of the field configuration can yield a transverse field with a magnitude intermediate between that of the “conventional” magnetic tweezers and the freely-orbiting magnetic tweezers, which makes it possible to directly measure the torque stored in a biological molecule. This configuration is termed the magnetic torque tweezers. The accompanying video explains in detail how the conversion of conventional magnetic tweezers into freely-orbiting magnetic tweezers and magnetic torque tweezers can be accomplished, and demonstrates the use of these techniques. These adaptations maintain all the strengths of conventional magnetic tweezers while greatly expanding the versatility of this powerful instrument.\nBioengineering, Issue 87, magnetic tweezers, magnetic torque tweezers, freely-orbiting magnetic tweezers, twist, torque, DNA, single-molecule techniques\nPolymerase Chain Reaction: Basic Protocol Plus Troubleshooting and Optimization Strategies\nInstitutions: University of California, Los Angeles .\nIn the biological sciences there have been technological advances that catapult the discipline into golden ages of discovery. For example, the field of microbiology was transformed with the advent of Anton van Leeuwenhoek's microscope, which allowed scientists to visualize prokaryotes for the first time. The development of the polymerase chain reaction (PCR) is one of those innovations that changed the course of molecular science with its impact spanning countless subdisciplines in biology. The theoretical process was outlined by Keppe and coworkers in 1971; however, it was another 14 years until the complete PCR procedure was described and experimentally applied by Kary Mullis while at Cetus Corporation in 1985. Automation and refinement of this technique progressed with the introduction of a thermal stable DNA polymerase from the bacterium Thermus aquaticus\n, consequently the name Taq\nPCR is a powerful amplification technique that can generate an ample supply of a specific segment of DNA (i.e., an amplicon) from only a small amount of starting material (i.e., DNA template or target sequence). While straightforward and generally trouble-free, there are pitfalls that complicate the reaction producing spurious results. When PCR fails it can lead to many non-specific DNA products of varying sizes that appear as a ladder or smear of bands on agarose gels. Sometimes no products form at all. Another potential problem occurs when mutations are unintentionally introduced in the amplicons, resulting in a heterogeneous population of PCR products. PCR failures can become frustrating unless patience and careful troubleshooting are employed to sort out and solve the problem(s). This protocol outlines the basic principles of PCR, provides a methodology that will result in amplification of most target sequences, and presents strategies for optimizing a reaction. By following this PCR guide, students should be able to:\n● Set up reactions and thermal cycling conditions for a conventional PCR experiment\n● Understand the function of various reaction components and their overall effect on a PCR experiment\n● Design and optimize a PCR experiment for any DNA template\n● Troubleshoot failed PCR experiments\nBasic Protocols, Issue 63, PCR, optimization, primer design, melting temperature, Tm, troubleshooting, additives, enhancers, template DNA quantification, thermal cycler, molecular biology, genetics\nDesigning a Bio-responsive Robot from DNA Origami\nInstitutions: Bar-Ilan University.\nNucleic acids are astonishingly versatile. In addition to their natural role as storage medium for biological information1\n, they can be utilized in parallel computing2,3\n, recognize and bind molecular or cellular targets4,5\n, catalyze chemical reactions6,7\n, and generate calculated responses in a biological system8,9\n. Importantly, nucleic acids can be programmed to self-assemble into 2D and 3D structures10-12\n, enabling the integration of all these remarkable features in a single robot linking the sensing of biological cues to a preset response in order to exert a desired effect.\nCreating shapes from nucleic acids was first proposed by Seeman13\n, and several variations on this theme have since been realized using various techniques11,12,14,15\n. However, the most significant is perhaps the one proposed by Rothemund, termed scaffolded DNA origami16\n. In this technique, the folding of a long (>7,000 bases) single-stranded DNA 'scaffold'\nis directed to a desired shape by hundreds of short complementary strands termed 'staples'\n. Folding is carried out by temperature annealing ramp. This technique was successfully demonstrated in the creation of a diverse array of 2D shapes with remarkable precision and robustness. DNA origami was later extended to 3D as well17,18\nThe current paper will focus on the caDNAno 2.0 software19\ndeveloped by Douglas and colleagues. caDNAno is a robust, user-friendly CAD tool enabling the design of 2D and 3D DNA origami shapes with versatile features. The design process relies on a systematic and accurate abstraction scheme for DNA structures, making it relatively straightforward and efficient.\nIn this paper we demonstrate the design of a DNA origami nanorobot that has been recently described20\n. This robot is 'robotic' in the sense that it links sensing to actuation, in order to perform a task. We explain how various sensing schemes can be integrated into the structure, and how this can be relayed to a desired effect. Finally we use Cando21\nto simulate the mechanical properties of the designed shape. The concept we discuss can be adapted to multiple tasks and settings.\nBioengineering, Issue 77, Genetics, Biomedical Engineering, Molecular Biology, Medicine, Genomics, Nanotechnology, Nanomedicine, DNA origami, nanorobot, caDNAno, DNA, DNA Origami, nucleic acids, DNA structures, CAD, sequencing\nCharacterization of Complex Systems Using the Design of Experiments Approach: Transient Protein Expression in Tobacco as a Case Study\nInstitutions: RWTH Aachen University, Fraunhofer Gesellschaft.\nPlants provide multiple benefits for the production of biopharmaceuticals including low costs, scalability, and safety. Transient expression offers the additional advantage of short development and production times, but expression levels can vary significantly between batches thus giving rise to regulatory concerns in the context of good manufacturing practice. We used a design of experiments (DoE) approach to determine the impact of major factors such as regulatory elements in the expression construct, plant growth and development parameters, and the incubation conditions during expression, on the variability of expression between batches. We tested plants expressing a model anti-HIV monoclonal antibody (2G12) and a fluorescent marker protein (DsRed). We discuss the rationale for selecting certain properties of the model and identify its potential limitations. The general approach can easily be transferred to other problems because the principles of the model are broadly applicable: knowledge-based parameter selection, complexity reduction by splitting the initial problem into smaller modules, software-guided setup of optimal experiment combinations and step-wise design augmentation. Therefore, the methodology is not only useful for characterizing protein expression in plants but also for the investigation of other complex systems lacking a mechanistic description. The predictive equations describing the interconnectivity between parameters can be used to establish mechanistic models for other complex systems.\nBioengineering, Issue 83, design of experiments (DoE), transient protein expression, plant-derived biopharmaceuticals, promoter, 5'UTR, fluorescent reporter protein, model building, incubation conditions, monoclonal antibody\nA Restriction Enzyme Based Cloning Method to Assess the In vitro Replication Capacity of HIV-1 Subtype C Gag-MJ4 Chimeric Viruses\nInstitutions: Emory University, Emory University.\nThe protective effect of many HLA class I alleles on HIV-1 pathogenesis and disease progression is, in part, attributed to their ability to target conserved portions of the HIV-1 genome that escape with difficulty. Sequence changes attributed to cellular immune pressure arise across the genome during infection, and if found within conserved regions of the genome such as Gag, can affect the ability of the virus to replicate in vitro\n. Transmission of HLA-linked polymorphisms in Gag to HLA-mismatched recipients has been associated with reduced set point viral loads. We hypothesized this may be due to a reduced replication capacity of the virus. Here we present a novel method for assessing the in vitro\nreplication of HIV-1 as influenced by the gag\ngene isolated from acute time points from subtype C infected Zambians. This method uses restriction enzyme based cloning to insert the gag\ngene into a common subtype C HIV-1 proviral backbone, MJ4. This makes it more appropriate to the study of subtype C sequences than previous recombination based methods that have assessed the in vitro\nreplication of chronically derived gag-pro\nsequences. Nevertheless, the protocol could be readily modified for studies of viruses from other subtypes. Moreover, this protocol details a robust and reproducible method for assessing the replication capacity of the Gag-MJ4 chimeric viruses on a CEM-based T cell line. This method was utilized for the study of Gag-MJ4 chimeric viruses derived from 149 subtype C acutely infected Zambians, and has allowed for the identification of residues in Gag that affect replication. More importantly, the implementation of this technique has facilitated a deeper understanding of how viral replication defines parameters of early HIV-1 pathogenesis such as set point viral load and longitudinal CD4+ T cell decline.\nInfectious Diseases, Issue 90, HIV-1, Gag, viral replication, replication capacity, viral fitness, MJ4, CEM, GXR25\nGenetic Manipulation in Δku80 Strains for Functional Genomic Analysis of Toxoplasma gondii\nInstitutions: The Geisel School of Medicine at Dartmouth.\nTargeted genetic manipulation using homologous recombination is the method of choice for functional genomic analysis to obtain a detailed view of gene function and phenotype(s). The development of mutant strains with targeted gene deletions, targeted mutations, complemented gene function, and/or tagged genes provides powerful strategies to address gene function, particularly if these genetic manipulations can be efficiently targeted to the gene locus of interest using integration mediated by double cross over homologous recombination.\nDue to very high rates of nonhomologous recombination, functional genomic analysis of Toxoplasma gondii\nhas been previously limited by the absence of efficient methods for targeting gene deletions and gene replacements to specific genetic loci. Recently, we abolished the major pathway of nonhomologous recombination in type I and type II strains of T. gondii\nby deleting the gene encoding the KU80 protein1,2\n. The Δku80\nstrains behave normally during tachyzoite (acute) and bradyzoite (chronic) stages in vitro\nand in vivo\nand exhibit essentially a 100% frequency of homologous recombination. The Δku80\nstrains make functional genomic studies feasible on the single gene as well as on the genome scale1-4\nHere, we report methods for using type I and type II Δku80Δhxgprt\nstrains to advance gene targeting approaches in T. gondii\n. We outline efficient methods for generating gene deletions, gene replacements, and tagged genes by targeted insertion or deletion of the hypoxanthine-xanthine-guanine phosphoribosyltransferase (HXGPRT\n) selectable marker. The described gene targeting protocol can be used in a variety of ways in Δku80\nstrains to advance functional analysis of the parasite genome and to develop single strains that carry multiple targeted genetic manipulations. The application of this genetic method and subsequent phenotypic assays will reveal fundamental and unique aspects of the biology of T. gondii\nand related significant human pathogens that cause malaria (Plasmodium\nsp.) and cryptosporidiosis (Cryptosporidium\nInfectious Diseases, Issue 77, Genetics, Microbiology, Infection, Medicine, Immunology, Molecular Biology, Cellular Biology, Biomedical Engineering, Bioengineering, Genomics, Parasitology, Pathology, Apicomplexa, Coccidia, Toxoplasma, Genetic Techniques, Gene Targeting, Eukaryota, Toxoplasma gondii, genetic manipulation, gene targeting, gene deletion, gene replacement, gene tagging, homologous recombination, DNA, sequencing\nStudying DNA Looping by Single-Molecule FRET\nInstitutions: Georgia Institute of Technology.\nBending of double-stranded DNA (dsDNA) is associated with many important biological processes such as DNA-protein recognition and DNA packaging into nucleosomes. Thermodynamics of dsDNA bending has been studied by a method called cyclization which relies on DNA ligase to covalently join short sticky ends of a dsDNA. However, ligation efficiency can be affected by many factors that are not related to dsDNA looping such as the DNA structure surrounding the joined sticky ends, and ligase can also affect the apparent looping rate through mechanisms such as nonspecific binding. Here, we show how to measure dsDNA looping kinetics without ligase by detecting transient DNA loop formation by FRET (Fluorescence Resonance Energy Transfer). dsDNA molecules are constructed using a simple PCR-based protocol with a FRET pair and a biotin linker. The looping probability density known as the J factor is extracted from the looping rate and the annealing rate between two disconnected sticky ends. By testing two dsDNAs with different intrinsic curvatures, we show that the J factor is sensitive to the intrinsic shape of the dsDNA.\nMolecular Biology, Issue 88, DNA looping, J factor, Single molecule, FRET, Gel mobility shift, DNA curvature, Worm-like chain\nLaser Capture Microdissection of Mammalian Tissue\nInstitutions: University of California, Irvine (UCI).\nLaser capture microscopy, also known as laser microdissection (LMD), enables the user to isolate small numbers of cells or tissues from frozen or formalin-fixed, paraffin-embedded tissue sections. LMD techniques rely on a thermo labile membrane placed either on top of, or underneath, the tissue section. In one method, focused laser energy is used to melt the membrane onto the underlying cells, which can then be lifted out of the tissue section. In the other, the laser energy vaporizes the foil along a path \"drawn\" on the tissue, allowing the selected cells to fall into a collection device. Each technique allows the selection of cells with a minimum resolution of several microns. DNA, RNA, protein, and lipid samples may be isolated and analyzed from micro-dissected samples. In this video, we demonstrate the use of the Leica AS-LMD laser microdissection instrument in seven segments, including an introduction to the principles of LMD, initializing the instrument for use, general considerations for sample preparation, mounting the specimen and setting up capture tubes, aligning the microscope, adjusting the capture controls, and capturing tissue specimens. Laser-capture micro-dissection enables the investigator to isolate samples of pure cell populations as small as a few cell-equivalents. This allows the analysis of cells of interest that are free of neighboring contaminants, which may confound experimental results.\nIssue 8, Basic Protocols, Laser Capture Microdissection, Microdissection Techniques, Leica\nQuantitative Real-Time PCR using the Thermo Scientific Solaris qPCR Assay\nInstitutions: Thermo Scientific Solaris qPCR Products.\nThe Solaris qPCR Gene Expression Assay is a novel type of primer/probe set, designed to simplify the qPCR process while maintaining the sensitivity and accuracy of the assay. These primer/probe sets are pre-designed to >98% of the human and mouse genomes and feature significant improvements from previously available technologies. These improvements were made possible by virtue of a novel design algorithm, developed by Thermo Scientific bioinformatics experts.\nSeveral convenient features have been incorporated into the Solaris qPCR Assay to streamline the process of performing quantitative real-time PCR. First, the protocol is similar to commonly employed alternatives, so the methods used during qPCR are likely to be familiar. Second, the master mix is blue, which makes setting the qPCR reactions easier to track. Third, the thermal cycling conditions are the same for all assays (genes), making it possible to run many samples at a time and reducing the potential for error. Finally, the probe and primer sequence information are provided, simplifying the publication process.\nHere, we demonstrate how to obtain the appropriate Solaris reagents using the GENEius product search feature found on the ordering web site (www.thermo.com/solaris) and how to use the Solaris reagents for performing qPCR using the standard curve method.\nCellular Biology, Issue 40, qPCR, probe, real-time PCR, molecular biology, Solaris, primer, gene expression assays\nElectroporation of Mycobacteria\nInstitutions: Barts and the London School of Medicine and Dentistry, Barts and the London School of Medicine and Dentistry.\nHigh efficiency transformation is a major limitation in the study of mycobacteria. The genus Mycobacterium can be difficult to transform; this is mainly caused by the thick and waxy cell wall, but is compounded by the fact that most molecular techniques have been developed for distantly-related species such as Escherichia coli and Bacillus subtilis. In spite of these obstacles, mycobacterial plasmids have been identified and DNA transformation of many mycobacterial species have now been described. The most successful method for introducing DNA into mycobacteria is electroporation. Many parameters contribute to successful transformation; these include the species/strain, the nature of the transforming DNA, the selectable marker used, the growth medium, and the conditions for the electroporation pulse. Optimized methods for the transformation of both slow- and fast-grower are detailed here. Transformation efficiencies for different mycobacterial species and with various selectable markers are reported.\nMicrobiology, Issue 15, Springer Protocols, Mycobacteria, Electroporation, Bacterial Transformation, Transformation Efficiency, Bacteria, Tuberculosis, M. Smegmatis, Springer Protocols\nIsolation of Genomic DNA from Mouse Tails\nInstitutions: University of California, Irvine (UCI).\nBasic Protocols, Issue 6, genomic, DNA, genotyping, mouse\nTransformation of Plasmid DNA into E. coli Using the Heat Shock Method\nInstitutions: University of California, Irvine (UCI).\nTransformation of plasmid DNA into E. coli using the heat shock method is a basic technique of molecular biology. It consists of inserting a foreign plasmid or ligation product into bacteria. This video protocol describes the traditional method of transformation using commercially available chemically competent bacteria from Genlantis. After a short incubation in ice, a mixture of chemically competent bacteria and DNA is placed at 42°C for 45 seconds (heat shock) and then placed back in ice. SOC media is added and the transformed cells are incubated at 37°C for 30 min with agitation. To be assured of isolating colonies irrespective of transformation efficiency, two quantities of transformed bacteria are plated. This traditional protocol can be used successfully to transform most commercially available competent bacteria. The turbocells from Genlantis can also be used in a novel 3-minute transformation protocol, described in the instruction manual.\nIssue 6, Basic Protocols, DNA, transformation, plasmid, cloning\nMolecular Evolution of the Tre Recombinase\nInstitutions: Max Plank Institute for Molecular Cell Biology and Genetics, Dresden.\nHere we report the generation of Tre recombinase through directed, molecular evolution. Tre recombinase recognizes a pre-defined target sequence within the LTR sequences of the HIV-1 provirus, resulting in the excision and eradication of the provirus from infected human cells.\nWe started with Cre, a 38-kDa recombinase, that recognizes a 34-bp double-stranded DNA sequence known as loxP. Because Cre can effectively eliminate genomic sequences, we set out to tailor a recombinase that could remove the sequence between the 5'-LTR and 3'-LTR of an integrated HIV-1 provirus. As a first step we identified sequences within the LTR sites that were similar to loxP and tested for recombination activity. Initially Cre and mutagenized Cre libraries failed to recombine the chosen loxLTR sites of the HIV-1 provirus. As the start of any directed molecular evolution process requires at least residual activity, the original asymmetric loxLTR sequences were split into subsets and tested again for recombination activity. Acting as intermediates, recombination activity was shown with the subsets. Next, recombinase libraries were enriched through reiterative evolution cycles. Subsequently, enriched libraries were shuffled and recombined. The combination of different mutations proved synergistic and recombinases were created that were able to recombine loxLTR1 and loxLTR2. This was evidence that an evolutionary strategy through intermediates can be successful. After a total of 126 evolution cycles individual recombinases were functionally and structurally analyzed. The most active recombinase -- Tre -- had 19 amino acid changes as compared to Cre. Tre recombinase was able to excise the HIV-1 provirus from the genome HIV-1 infected HeLa cells (see \"HIV-1 Proviral DNA Excision Using an Evolved Recombinase\", Hauber J., Heinrich-Pette-Institute for Experimental Virology and Immunology, Hamburg, Germany). While still in its infancy, directed molecular evolution will allow the creation of custom enzymes that will serve as tools of \"molecular surgery\" and molecular medicine.\nCell Biology, Issue 15, HIV-1, Tre recombinase, Site-specific recombination, molecular evolution\nPurifying Plasmid DNA from Bacterial Colonies Using the Qiagen Miniprep Kit\nInstitutions: University of California, Irvine (UCI).\nPlasmid DNA purification from E. coli is a core technique for molecular cloning. Small scale purification (miniprep) from less than 5 ml of bacterial culture is a quick way for clone verification or DNA isolation, followed by further enzymatic reactions (polymerase chain reaction and restriction enzyme digestion). Here, we video-recorded the general procedures of miniprep through the QIAGEN's QIAprep 8 Miniprep Kit, aiming to introducing this highly efficient technique to the general beginners for molecular biology techniques. The whole procedure is based on alkaline lysis of E. coli cells followed by adsorption of DNA onto silica in the presence of high salt. It consists of three steps: 1) preparation and clearing of a bacterial lysate, 2) adsorption of DNA onto the QIAprep membrane, 3) washing and elution of plasmid DNA. All steps are performed without the use of phenol, chloroform, CsCl, ethidium bromide, and without alcohol precipitation. It usually takes less than 2 hours to finish the entire procedure.\nIssue 6, Basic Protocols, plasmid, DNA, purification, Qiagen\nPrinciples of Site-Specific Recombinase (SSR) Technology\nInstitutions: Max Plank Institute for Molecular Cell Biology and Genetics, Dresden.\nSite-specific recombinase (SSR) technology allows the manipulation of gene structure to explore gene function and has become an integral tool of molecular biology. Site-specific recombinases are proteins that bind to distinct DNA target sequences. The Cre/lox system was first described in bacteriophages during the 1980's. Cre recombinase is a Type I topoisomerase that catalyzes site-specific recombination of DNA between two loxP (locus of X-over P1) sites. The Cre/lox system does not require any cofactors. LoxP sequences contain distinct binding sites for Cre recombinases that surround a directional core sequence where recombination and rearrangement takes place. When cells contain loxP sites and express the Cre recombinase, a recombination event occurs. Double-stranded DNA is cut at both loxP sites by the Cre recombinase, rearranged, and ligated (\"scissors and glue\"). Products of the recombination event depend on the relative orientation of the asymmetric sequences.\nSSR technology is frequently used as a tool to explore gene function. Here the gene of interest is flanked with Cre target sites loxP (\"floxed\"). Animals are then crossed with animals expressing the Cre recombinase under the control of a tissue-specific promoter. In tissues that express the Cre recombinase it binds to target sequences and excises the floxed gene. Controlled gene deletion allows the investigation of gene function in specific tissues and at distinct time points. Analysis of gene function employing SSR technology --- conditional mutagenesis -- has significant advantages over traditional knock-outs where gene deletion is frequently lethal.\nCellular Biology, Issue 15, Molecular Biology, Site-Specific Recombinase, Cre recombinase, Cre/lox system, transgenic animals, transgenic technology", "label": "No"} {"text": "The Minister of Education, Mallam Adamu Adamu disclosed in Abuja yesterday that President Muhammadu Buhari will establish six universities of science and technology across the six geo-political zones of the country.\nAdamu said at a forum that the future of the world depended on science and technology.\n“This government has already decided to even add more; it is going to establish six new universities of science and technology,” he said.\n“And, at the lower level, there will be a technical school in each state of the Federation and then vocational centres at the wards and local government levels.\n“You know, we have a problem of access; if you look at it last year, one million people sat for the universities but, only 150,000 were admitted.\n“So, we still need to build more universities to create more space for those who want to get in.\n“And, then, the fact that the six new universities are being created for science and technology underscores the decision by the government to put more emphasis on science.\n“Whether we agree or not, oil has limited time before it finishes; the whole economies of the world are going towards the knowledge economy.\n“Actually, it is the cultivation of science, technology and engineering studies that will hold the economy in the future.”\nHe said over the years, government had laid emphasis on science and technology by giving more access to students in such fields.", "label": "No"} {"text": "Logo Design Package\nfrom R3 499\nSpecifications: One full colour vector Logo design\nConcepts: 3 initial concepts presented, one to be finalised\nFinal Artwork: Supplied as low resolution (web) and high resolution (print) formats\nBASIC BRAND STYLE GUIDE\nA basic Brand Style Guide detailing the various logo formats included and their applications.", "label": "No"} {"text": "I have a 1997 freightliner fld 120 with a detroit 60 ...\nI have a 1997 freightliner fld 120 with a detroit 60 series and I have a problem with the AC. I have no power outside at the compressor . I also need to know which wires go to the ac switch on the dash. Is there a fuse or circuit breaker on a firewall?Freightliner Fld 120 Fuse Panel Diagram Ebook\nFreightliner Fld 120 Fuse Panel Diagram Ebook Summary Books : Freightliner Fld 120 Fuse Panel Diagram Ebook [EPUB] Freightliner Fld 120 Fuse Panel Diagram Ebook contains important information and a detailed[PDF Download] Freightliner Fld 120 Fuse Panel Diagram ...\nFreightliner Fld 120 Fuse Panel Diagram Free Download Chapter 1 : Free Download Freightliner Fld 120 Fuse Panel Diagram Freightliner Fld 120 Fuse PanelFreightliner Fld 120 Fuse Panel Diagram Simple Wiring For ...\nFreightliner Fld 120 Fuse Panel Diagram Simple Wiring For Fld120 Diagrams is one from many image from this website. you can find the latest images of Freightliner Fld 120 Fuse Panel Diagram Simple Wiring For Fld120 Diagrams on this website and other images. we hope this picture can be useful for you.Freightliner Fld 120 Fuse Panel Diagram. Wiring. Wiring ...\nFreightliner fld 120 fuse panel diagram moreover 99 freightliner fuse panel diagram 2009 freightliner fuse panel diagram 2002 freightliner fuse panel 2005 freightliner fuse panel location freightliner fl70 fuse box diagram freightliner relay diagram freightliner columbia fuse box diagram freightliner fl70 fuse panel diagram freightliner ...1999 Freightliner FLD 120 JustAnswer\nOn this 1999 freightliner fld 120, 60 series. I have a light problem. When the head lights are on the marker and tails are not only on tractor. The trailer is fine. Already changed the light switch. IFreightliner Fld120 Wiring Diagrams WordPress\n92 Freightliner Fld120 Fuse Panel Diagram.doc. MSWord Document We diagrams,1999 freightliner wiring diagram,free freightliner wiring. N 14C, Manual 10.Freightliner Fld 120 Dash\n1994 freightliner fld 120 dash. ... Up For Sale Freightliner FLD 120 1998 DETROIT S60 Great Shape Walk Around Review ELD EXEMPT TRUCK SE Duration: 3:24.Fuse box location | TruckersReport Trucking Forum | #1 ...\nI finally learned from a Freightliner mechanic that the 98 Frieghtliner is one of few models with a buss bar circuit panel. I was looking for a fuse box to troubleshoot my non working cruis control. Now I get to dismantle the dash and pull my cruise switches and replace them instead of replacing a small fuse.How to Check Fuses Freightliner\nDo you know how to check the fuses in your Freightliner Cascadia? Check out this video to see how to check and replace fuses in your truck! Tyler Patrick fro...\nfreightliner fld 120 fuse panel diagram Gallery\n2001 freightliner classic wiring diagram\nkenworth t800 fuse box location gmc c5500 fuse box wiring\n1997 freightliner fl80 fuse box diagram\n1995 freightliner fld fuse panel location freightliner\nfreightliner mt45 wiring schematics freightliner columbia\n1999 freightliner fld120 fuse box 1999 freightliner fld112\n1996 freightliner fld120 wiring diagram 39 wiring\nfreightliner fld120 wiring diagrams freightliner m2 wiring\nkenworth t800 ke wiring diagram kenworth fuse panel\n2007 freightliner m2 fuse box location 2007 get free\n1996 freightliner fl60 fuse box 1996 freightliner classic\ni bought a 1999 freightliner century off ebay vin\n1999 freightliner fl60 wiring diagram\nfreightliner m2 blower motor wiring diagram 43 wiring\n2000 freightliner fld120 wiring diagram 2000 freightliner", "label": "No"} {"text": "Physician Key Opinion Leaders (KOLs) Embrace Virtual Meetings with Field Medical Professionals During COVID-19 Pandemic\nAlucio’s Beacon product enhances virtual scientific exchange with a fully-integrated video conferencing module\nSan Francisco, CA (August 12, 2020) - As expected, the growth in usage of video conferencing technology during the COVID-19 pandemic has been dramatic. For example, a popular video conferencing service recently reported a 30x increase in usage of its platform in April 2020 as compared to the prior month.¹\nPhysician Key Opinion Leaders (KOLs) are also embracing the technology as a way to stay engaged in scientific exchange with life science companies. In fact, a recent study published by The Medical Science Liaisons Society and H1 found that 77% of KOLs were somewhat to very receptive to engaging with Medical Science Liaisons (MSLs) virtually.² Moreover, the same study also found that 66% were interested in continuing to meet virtually with MSLs beyond the COVID-19 pandemic.³\nAlucio™, a fast-growing provider of cloud-based software for the life sciences industry, is working to help MSLs stay connected with KOLs and other healthcare professionals during these challenging times. Alucio’s flagship product, Beacon, features a fully-integrated and secure video conferencing module that enables users to take control of their virtual meetings and make them much more effective.\nThe product streamlines interactions by enabling presenters to quickly find and organize the content they need both before and during a virtual engagement to respond to questions without leaving the application. Additionally, the solution is very user friendly for participants since it does not require them to download any software.\n“Beacon provides everything needed to prepare for and conduct KOL virtual meetings effectively and efficiently, with a clean, logical, and well-organized layout,” said Nika Sajed, PharmD, a principal medical scientist and Alucio advisory board member.\nIn addition to its virtual meeting capability, Beacon includes a host of other well thought out features for MSLs and other field medical professionals. These include the rapid publishing and synching of medical and scientific content via the cloud to various devices, and flexible and smart file management, with powerful search and filtering capability. Built-in version control also ensures that users access the correct documents and remain compliant from a regulatory standpoint.\nJessica Wong, Alucio’s VP - Product Management & Strategy, commented “MSLs clearly tell us that they want to be able to conduct better virtual meetings with their KOLs. Beacon enables them to make their virtual engagements much more seamless and effective. We’re pleased to be able to support these users now and into the future.”\nTo learn more about Beacon and to schedule a product demonstration, please contact the company at firstname.lastname@example.org.\nAlucio is dedicated to the development of innovative software applications specifically for the life sciences industry. Alucio’s flagship product, Beacon, is a cloud-based content management and presentation platform that enhances scientific exchange between life science companies and healthcare professionals. For more information, please visit the company’s website http://www.alucio.io or contact: Lisa Amin at email@example.com (925) 788-3533.\n- “Zoom Sees Sales Boom Amid Pandemic”, Natalie Sherman, BBC News, June 2, 2020\n2,3. “How KOLs Prefer to Engage with MSLs During the COVID-19 Pandemic”, Medical Science Liaison Society and H1, June 30, 2020", "label": "No"} {"text": "Polyphonic Packets is the future of remote production, streamlining collaboration, and enhancing efficiency with cutting-edge technology intergraded into seamless connectivity.\nStreamlining workflows and enhancing remote collaboration with cutting-edge technology, ensuring top-notch performance across various industries.\nDelivering robust, reliable, and innovative tools that meet the highest standards of performance.\nCreating cutting-edge solutions that empower remote production and streamline collaboration with precision and efficiency.\nPrivate cloud solutions harness the internet’s power to seamlessly interconnect live events, creating a cohesive crew that delivers top-notch quality for both live and streaming audiences, ensuring a memorable show.", "label": "No"} {"text": "30 HR METAL MINIATURE|\nis an iron clock with a 30 hour time only balance wheel movement. The theme of\nthis clock is Columbus.\nClose up view of the top of the clock.\nMiddle of the clock with Columbus and the dial.\nBottom of the clock, lots of detail and 1492.\nBack of the clock.Cost is:$175.00", "label": "No"} {"text": "Parker Hannifin Corp. is sponsoring a contest that encourages college engineering students to develop a hydraulically powered bicycle. The fluid power giant is working with five-student teams at Cleveland State University, the University of Akron, University of Cincinnati, Purdue University, California Polytechnic University, the University of California-Irvine, Western Michigan University and Murray State University. Winning entries may earn $2,000 grants for each team member. To learn more, go to www.parker.com or e-mail firstname.lastname@example.org.\nThe company says it anticipates high-definition video for home security and other uses will be the next mature technology integrated into the IoT domain, hence the introduction of its MatrixCam devkit.\nSiemens and Georgia Institute of Technology are partnering to address limitations in the current additive manufacturing design-to-production chain in an applied research project as part of the federally backed America Makes program.\nMost of the new 3D printers and 3D printing technologies in this crop are breaking some boundaries, whether it's build volume-per-dollar ratios, multimaterials printing techniques, or new materials types.\nFocus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.", "label": "No"} {"text": "nc description:Here you can download nc with version 1.1.\nThis software was developed by Florian Delizy.\nDistribute by license GPL and price FREE.\nDownload time for this software with internet channel 512Kb/sec would be 0 seconds.\nYou can download this software from www.vim.org domain.\nRelated software for 1.1 ncVocabulary Highlighter\nHPS WinTail Build 782\nAlternate Text Browser\nPortable Presentation Pointer\nEControl Syntax Editor", "label": "No"} {"text": "Post-traumatic optic chiasma and optic track oedema\nc/o blurring of vision after trauma\nLoading Stack -\n0 images remaining\nThere is altered signals in the optic chiasma and left optic radiation. There is also altered signal in the posterior high parietal subcortical region.\nThere was definite history of injury followed by sudden development of diplopia and blurring of vision.\nNo obvious history of fever.\nOther differentials would be demylination.", "label": "No"} {"text": "Dubna – PhD programs in Computer Science\nWe found 1 university offering 1 PhD program in Computer Science in Dubna.\nStudy the PhD programs in Computer Science in Dubna\nYears of study\nWhere can the PhD в Computer Engineering find a position?\nPhD in Computer Engineering in the private or public sector hold positions such as computer application engineer, computer build engineer, computer vision engineer, hardware engineer, as well holding occupations in military services or defense establishments and space establishments.\nWhy should you obtain a PhD degree in Computer Engineering?\nExperts of Free-Apply.com Education Company recommend holding a Doctor's of Philosophy in Computer Engineering, as it gives a wide scope for choosing a career. The average computer engineering salary is one of the highest and gives financial stability to employment.\nRussia, Dubna – PhD programs in Computer Science statistics\nFree-Apply.com provides information about 1 PhD program in Computer Science at 1 university in Dubna, Russia. Furthermore, you can choose one of 1 Bachelor program in Computer Science at 1 university, 1 Master program in Computer Science at 1 university, and 1 PhD program in Computer Science at 1 university.\nReasons to study in Russia\nNo 22 in the world education ranking\nNo 54 in the world ease of doing business ranking\nNo 63 in the world economy ranking\nNo 105 in the world safety ranking\nHigher education statistics of the largest cities in Russia\nThe largest cities offering PhD programs in Computer Science in Russia.\n|Nizhniy Novgorod||2||~ $1,512||Search|\n|Saint Petersburg||2||~ $1,620||Search|\nRussia – Average monthly personal finance statistics\n100% discount for the 1st year\nApply now and get a 100% tuition fee discount for the first year of studies", "label": "No"} {"text": "- 姓 名:\n- 职 称:\nHaifeng Zhang is a visiting scientist at Center on Frontiers of Computing Studies (CFCS), Peking University. His research areas include reinforcement learning, game AI, game theory and computational advertising. Before visiting CFCS, he was a research fellow at University College London working with Prof. Jun Wang. He received his PhD from Peking University in 2018, supervised by Prof. Wenxin Li, and his bachelor's degrees in computer science and economics from Peking University in 2012.", "label": "No"} {"text": "A distinct entorhinal cortex to hippocampal CA1 direct circuit for ... A distinct entorhinal cortex to hippocampal CA1 direct circuit for olfactory associative learning | Nature NeuroscienceAxxess Gmos 100 Wiring Schematic - axxess gmos 04 wiring diagram axxess gmos-04 wiring diagram axxess gmos-04 wire diagram metra gmos-04 wiring diagram gmos-04 installation Axxess Interface Wiring Diagram, Axxess GMOS-04 16Pin Diagram, Axxess GMOs 100 Wiring Schematic, GM Bose Wiring-Diagram, Chevy Factory Radio Wiring Diagram, 2005 Silverado Speaker Wiring Diagram,. 2) Connect the Green wire to the parking brake wire of the aftermarket radio. 3) Connect the Blue/Pink wire to the VSS or speed sense wire of the aftermarket radio. 4) Connect the Green/Purple wire to the reverse wire of the aftermarket radio. When completed, plug the 14-pin harness into the GMOS. Applications GMOS-100 Caution: Metra recommends disconnecting the negative battery terminal before beginning any installation. All accessories, switches, and especially air bag indicator lights must be plugged in before reconnecting the battery or cycling the ignition..\ngmos 04 wiring diagram web in axxess gallery sample best of b2network co on gmos04 integrate and deltagenerali me with subwoofer luxury 1 can bus interface harness collection collections new prerequisite for kiosystems amazing images stuning gmrc 01 to arcnx premium sound lan install chevy hhr network 2014 17 161642 amp at canopi roc grp org unusual health shop (gmos04) onstar. Jvc car stereo wiring diagram color on images unfastened down load all through aftermarket with radio metra diagrams 1, particular scosche wiring harness diagram ninety six in lamp socket with metra diagrams four, axxess gmos 04 wiring diagram webtor me inside coachedby sizeable metra interface diagrams five, metra bose integration and skip. Axxess GMOS-100i Installation Instructions Manual Usb updatable,is a replacement interface designed to retain onstar, retain the warning chimes that are normally lost when the oem radio is removed, retain factory installed satellite radio (xia-lcd is required and sold separately), and factory steering w..\nGmos 04 Installation Diagram Of Html. welcome to my blog here I will show you a little more what you are looking for Gmos 04 Installation Diagram Of Html below there are some photos and a little about Gmos 04 Installation Diagram Of Html that you can see and read, hopefully in accordance with what you are looking for.. Axxess GMOS-LAN-034. GMOS-LAN-034. Not Rated Yet 2006-Up GM LAN11 Data Interface Harness $100.67. Free Shipping. Compare. $100.67. Add to Cart Most vehicles are built with their own wiring harness specifically connecting their OEM hardware such as an In-Dash receiver. Replacing vehicle OEM receiver usually requires an additional wiring. Product Features: Wiring Harness for Replacing Select GM OEM Radios Compatible with GM CLASSII bit vehicles Replacement harness for the GMOS-100 or GMOS-100i Home Shop by Brand ».\nWiring schematics for 2004 chevy colorado also 59622 firstgen wiring diagrams in addition 2007 nissan altima fuse box 2010 nissan altima fuse box diagram pertaining to 1998 nissan altima fuse box diagram further 348917 trailer wiring question also c4 corvette brake diagram also dodge dakota 1997 dodge dakota code p0740 also p 0996b43f80cb1d98 as well as p 0900c15280251da6 along with chevrolet.\nWhy We Will Need Genetically Modified Foods - MIT Technology Review David Lobell, a professor of environmental earth system science at Stanford University, has a calm demeanor that belies his bleak message about how global ...\nCar Stereo Wire Harnesses - Radio Wires for all Car Audio - Wiring ... Click for more info about Car Stereo Radio ISO Extension Wiring and Antenna Harness Adaptor for\nAmazon.com: Axxess GMOS-LAN-01 LAN OnStar Interface for Non ... Amazon.com: Axxess GMOS-LAN-01 LAN OnStar Interface for Non-Amplified Systems: Car Electronics", "label": "No"} {"text": "19 Results in Interaction Design\nM.S.O.E.’s UXCD program will help you develop the skills to design the next digital innovation and solve user interface issues.\nA Bachelor of Media Design specialising in Interactive Design prepares you for the technical demands of the web design and mobile development industries.\nThe Graphic Design and Interactive Media degree provides the practical knowledge and insight you need to develop effective, stunning graphic design and web interfaces. You wil ... +\nOur multimedia design program provides an intensive background in design and offers specialized classes in digital media, motion graphics, animation and film. We also offer a ... +", "label": "No"} {"text": "NOLEJ, the generative AI edtech start-up, has announced a strategic partnership with OpenAI, the AI research and deployment business behind GPT-4, GPT-3.5, ChatGPT, DALLE, Codex, and other projects.\nIn mid-April, at the ASU GSV Cup, where they have been chosen as a finalist in the GSV cup, the largest edtech competition, NOLEJ will introduce the commercial edition of NOLEJ AI, a generative AI for educators, powered by GPT-3.5, following a successful Beta test with over 2500 educators.\nTeachers now have 50X more time to create interactive microlearning materials thanks to NOLEJ AI. Teachers can upload static information (video, audio, or text), and NOLEJ AI will then create interactive videos, flashcards, and quizzes ready to use and accommodate different learning preferences. According to hundreds of independent studies, such interactive micro-learnings beat conventional static formats, increasing completion rates by 85% and retention rates by 75%.\nBy utilizing their expertise in generative learning built on OpenAI's technologies and cutting-edge AI systems, NOLEJ intends to revolutionize AI-powered education further. The alliance plans to produce new technologies to improve learning and give educators new opportunities.\nBodo Hoenen, the co-founder of NOLEJ, said: \"We are thrilled to be collaborating with OpenAI to continue our mission of powering the future of learning.\"\nBy working with OpenAI strategically, NOLEJ joins organizations like Shutterstock, Duolingo, and Kahn Academy.", "label": "No"} {"text": "Accounting software development\n30 profesionistë freelancer dërguan një ofertë mesatare prej $470 për këtë punë\nI am experienced Accounting solutions developer. I have developed number of different Account and Trading solutions according to the client requirements.\nHey, Good Day! I am a proficient developer with 5+ yrs of experience working on desktop applications using .net framework. Let`s discuss more on requirements. Looking forward to work with you. Thanks", "label": "No"} {"text": "VUDU Internet application platform\nDecember 17, 2008\nVUDU has launched its VUDU RIA (Rich Internet Application) platform, a standards-based platform that brings Web-hosted rich applications and services to consumer appliances such as the popular VUDU Internet movie player. RIA combines the openness and ease of development of Web applications, lightweight hardware requirements compatible with today’s consumer Internet appliances, and a lean-back user experience optimised for television.\nVUDU has created an initial set of applications and services in a new area of the VUDU home page, called VUDU Labs. Available to all VUDU users, the applications include casual games, implementations of Flickr, Picasa and the entire YouTube library, as well as a new 'On Demand TV' area with more than 120 channels.", "label": "No"} {"text": "1 results containing \"Aspin, Jehoshaphat. [from old catalog]\"\nLarger image available anywhere\nLarger image available only at the Library of Congress\nNot Digitized (1)\nA familiar treatise on astronomy, explaining the general phenomena of ...\nAll ways to connect\nDonateInspector General |\nExternal Link Disclaimer |", "label": "No"} {"text": "Bespoke Assembly Machines\nBespoke automated assembly lines to safeguard your production\nAssembly Automation System\nAutomated Manufacturing Solutions | Integrated Automation and Robotics\nAPL has a wealth of experience in designing and manufacturing bespoke automated assembly lines/bespoke assembly machines to safeguard your production.\nAPL solutions vary from fully automated assembly line machines to manual assembly benches with poke yoke devices for quality assurance, whichever meets your specific needs and requirements.\nWe build all machines in-house. With nearly 30 years experience in assembly automation, our automated bespoke assembly solution is designed to provide the best method for reducing labour costs and increasing productivity.\nFor more information on any of our products please get in touch using the form below. One of our sales team will respond to your enquiry as soon as possible.", "label": "No"} {"text": "Wynn Donates $25 Million to Blindness Research\nThe Las Vegas casino tycoon Steve Wynn has announced that he donated $25 million to support blindness research at the University of Iowa having been convinced that the university’s scientists are leading the way in a search for a cure.Wynn has said that the researchers are “knocking on the door” of a discovery that could cure blindness for millions.\nHe believes that scientists will be able to use stem cells to restore vision by growing new cells and transplanting them into patients’ eyes.\nWynn said, “This is an exhilarating, quite exciting place. To a scientist, this is like going to a rock concert. I mean there is stuff going on in these rooms here that, to put it in the common vernacular is really far out.”\nThe money will be used to help the university build a new laboratory to grow stem cells, hire scientists and accelerate studies already underway. Wynn also pointed out that federal money for research has been tight in the last few years and private donors are now needed more than ever before.", "label": "No"} {"text": "Television Station Information\nCity: Austin, TX\nOwner: Tegna Media\nWeb Site: http://www.kvue.com/\nStation Info: Digital Full-Power - 1000 kW\nDTV/HDTV Channel: 33\nKVUE is a television station in Austin, TX that serves the Austin television market. The station runs programming from the ABC network. KVUE is a digital full-power television station that operates with 1000 kilowatts of power and is owned by Tegna Media.\nDetailed Engineering Information / KVUE FCC Applications", "label": "No"} {"text": "Shareaza 2.0 review by PC Magazine PC Magazine is out with a review today on Shareaza 2.0, which claims to provide the search and download speeds of eDonkey but with a far better user interface. It also allows previewing a file as it downloads. Shareaza is an open-source app that is free of charge and reportedly free of spyware.\n“In the end, search and download speeds are much like what you’ll find using the eDonkey client, and the array of available files is similar. The key difference is that Shareaza is much easier to use. It gives you much more information about the files and machines on the network, it is better at tracking the status of your many downloads, its general layout is more intuitive, and it is far more stable.”", "label": "No"} {"text": "Logical Methods in Computer Science – LogiCS doctoral program\nThe Logical Methods in Computer Science – LogiCS doctoral program is a PhD degree program, funded by the Austrian Science Fund FWF and run jointly by the three Austrian universities TU Wien (Vienna University of Technology), Graz University of Technology and Johannes Kepler...\nPhD Positions in Cloud, Fog and Edge Computing\nvor 2 Tagen\n| Bewerbungsschluss am Dez. 31\nThe Institute of Computer Science at the University of Innsbruck, Austria seeks for excellent PhD students to carry out research in Cloud, Fog and Edge computing.\nYou are enthusiastic about developing and investigating innovative research ideas and systems...\nPhD position - 3D Objects discovery in 3D scene\nvor einem Monat\n| Bewerbungsschluss am Okt. 31\nComputer science and software\nObject detection and localization in images is a problem studied since many years. The latest technological developments now allow the real-time acquisition of depth data coupled to color...", "label": "No"} {"text": "Researchers show for the first time that one of the most abundant methane-producing microorganisms on Earth makes direct electrical connections with another species to produce the gas in a completely unexpected way.\nSecuring affordable energy supplies, changing the energy mix towards a more sustainable and renewable portfolio, as well as providing energy to those who currently have no access ranks high on the global agenda. In order to discuss these issues as part of Swiss Re's 150-year anniversary event series 'connecting generations', Swiss Re organised a small conference entitled 'Meeting the energy challenge'.\nThe EU-funded IURBAN project, which kicked off in October 2013, aims to develop an intelligent tool that gives consumers greater control of their energy use and energy suppliers greater flexibility in providing the energy needed.\nEngineering researchers have developed new technology and techniques for transmitting power wirelessly from a stationary source to a mobile receiver - moving engineers closer to their goal of creating highway stations that can recharge electric vehicles wirelessly as the vehicles drive by.\nA new research project will contribute to the everyday practicality of lithium-ion batteries, thus improving consumer acceptance of electric vehicles. In the course of the project, the researchers will consider the entire development process, from materials to suitable operating strategies.\nResearchers studying more effective ways to convert woody plant matter into biofuels have identified fundamental forces that change plant structures during pretreatment processes used in the production of bioenergy.\nNature designed lignin, the tough woody polymer in the walls of plant cells, to bind and protect the cellulose sugars that plants use for energy. For this reason, lignin is a major challenge for those who would extract those same plant sugars and use them to make advanced biofuels. As part of their search for economic ways to overcome the lignin challenge, researchers have characterized the enzymatic activity of a rain forest microbe that breaks down lignin essentially by breathing it.\nThermal radiation from the sun is largely lost on most silicon solar cells. Up-converters transform the infrared radiation into usable light, however. Researchers have now for the first time successfully adapted this effect for use in generating power.\nThe DTOcean (Optimal Design Tools for Ocean Energy Arrays) initiative will allow a suite of design tools to be developed for the deployment of ocean energy arrays. These tools will be contributing towards open-sea demonstration in ocean energy arrays of the technologies for capturing ocean current energies and wave energies.\nThe Centre for Carbon Measurement at the National Physical Laboratory (NPL) is partnering with Astrium Services to deliver a new emissions measurement service to enable countries and cities to better quantify their greenhouse gas (GHG) emissions.\nThe WINDTRUST project kicked off in September 2013 with the objective of improving the competitiveness of the wind energy sector by developing and testing innovative components to further improve turbine reliability.", "label": "No"} {"text": "Type of Document Dissertation Author Hinkelmann, Franziska Babette Author's Email Address email@example.com URN etd-08032011-113739 Title Algebraic theory for discrete models in systems biology Degree PhD Department Mathematics Advisory Committee\nAdvisor Name Title Laubenbacher, Reinhard C. Committee Chair Herdman, Terry L. Committee Member Jarrah, Abdul Salam Committee Member Tyler, Brett M. Committee Member Keywords\n- systems biology\n- discrete models\n- Mathematical biology\n- finite fields\n- polynomial dynamical systems\nDate of Defense 2011-08-01 Availability unrestricted AbstractThis dissertation develops algebraic theory for discrete models in systems biology. Many discrete model types can be translated into the framework of polynomial dynamical systems (PDS), that is, time- and state-discrete dynamical systems over a finite field where the transition function for each variable is given as a polynomial. This allows for using a range of theoretical and computational tools from computer algebra, which results in a powerful computational engine for model construction, parameter estimation, and analysis methods. Formal definitions and theorems for PDS and the concept of PDS as models of biological systems are introduced in section 1.3.\nConstructing a model for given time-course data is a challenging problem. Several methods for reverse-engineering, the process of inferring a model solely based on experimental data, are described briefly in section 1.3. If the underlying dependencies of the model components are known in addition to experimental data, inferring a \"good\" model amounts to parameter estimation.\nChapter 2 describes a parameter estimation algorithm that infers a special class of polynomials, so called nested canalyzing functions. Models consisting of nested canalyzing functions have been shown to exhibit desirable biological properties, namely robustness and stability. The algorithm is based on the parametrization of nested canalyzing functions. To demonstrate the feasibility of the method, it is applied to the cell-cycle network of budding yeast.\nSeveral discrete model types, such as Boolean networks, logical models, and bounded Petri nets, can be translated into the framework of PDS. Section 3 describes how to translate agent-based models into polynomial dynamical systems.\nChapter 4, 5, and 6 are concerned with analysis of complex models. Section 4 proposes a new method to identify steady states and limit cycles. The method relies on the fact that attractors correspond to the solutions of a system of polynomials over a finite field, a long-studied problem in algebraic geometry which can be efficiently solved by computing Gröbner bases. Section 5 introduces a bit-wise implementation of a Gröbner basis algorithm for Boolean polynomials. This implementation has been incorporated into the core engine of Macaulay2. Chapter 6 discusses bistability for Boolean models formulated as polynomial dynamical systems.\nFilename Size Approximate Download Time (Hours:Minutes:Seconds)\n28.8 Modem 56K Modem ISDN (64 Kb) ISDN (128 Kb) Higher-speed Access Hinkelmann_FB_D_2011.pdf 2.18 Mb 00:10:06 00:05:12 00:04:33 00:02:16 00:00:11\nIf you have questions or technical problems, please Contact DLA.", "label": "No"} {"text": "Support your decisions with data.\nSometimes you need to back up your decisions with data. Collecting data is only one part of the job, the other is reading it correctly.\nEmpowering businesses with advanced data processing solutions to enhance efficiency and drive growth.\nWe strive to continuously improve our methods and technology to ensure the highest level of quality. Our goal is to be a trusted partner for companies looking for reliable and efficient data processing solutions.", "label": "No"} {"text": "Home | Submit a file | New | Categories | RSS Feeds | Blog\nFree Software Advertising\n\"AthTek WebAPP Kit\" snapshot\nFast create rich internet applications (RIA) by PC software projects.\nAsoftech Photo Recovery is an easy to use data recovery software available to restore your photos, music and videos from local PC and removable devices. No matter multimedia files have been deleted accidently, or memory card has been formatted.\nAutoMe is a reliable and user-friendly windows automation software and macro recorder with task scheduler, color checker. AutoMe is very easy to use, you can record robot, and run it as many time as needed. No programing needed.\n9% of users liked this software\nWindows 7/Vista/XP/2000, Other\nJanuary 31, 2012\nDescription from the Publisher\nAthTek WebAPP Kit is a great programming tool for web software development. It works\ntogether with popular programming languages and enables software developers to create rich\ninternet applications (RIA) directly by the ordinary software projects. If you are a PC\nsoftware developer who wants to add internet versions of your software, AthTek WebAPP Kit\nis the spider-man you should never miss.\nUsers reviews & testimonials\nThis software is not reviewed yet.\nProduct tagstiger software builder express, applications, wysiwyg, fast cable internet, software development project, programming, software development, webapp kit, live internet tv app, kit, web page builder, web development tool, athtek netwalk enterprise edition, product development, software development tools, software development kit, internet tv software, web development, builder, bob the builder, athtek code to flowchart, tiger software builder professional, development, internet applications, spider, kit power point, tiger software builder, medical software development, phpdug internet services web hosting, multimedia builder, spider man, rich, spider.com, athtek netwalk edition, tiger software builder express review, web cam software, c++ builder, projects, athtek skype recorder, internet software, software development services\nOther downloads from this publisher\nAthTek Voice Recorder helps you record and repeat audio from line-in or playlist\nAthTek File Master is both file management and file encryption software.\nAutomatically generate elegant flowchart or NS chart, to let code visual.\nAthTek File Master is both an encryption software and file management software.\nVideo Surveillance Monitor streams video from your camera directly to your local surveillance system or networked computers. Using Video Surveillance ...\n[ More downloads from this publisher ]", "label": "No"} {"text": "Nowadays, some business applications are deployed on-premises and some are hosted in the cloud. Such separation makes building automation workflows that combine both on-premises and cloud applications difficult, because usually cloud applications can't access on-premises systems directly.\nIn this webinar, we demonstrate how cloud applications can securely send data to on-premises systems and databases by triggerring EasyMorph workflows via EasyMorph Gateway. The demonstration will show how to use webhooks and/or Zapier to trigger EasyMorph workflows right from a cloud application. Such integration simplifies marketing automation, IoT data collection, and near real-time operational analytics.\nThe online webinar will take place on June 23rd at 3pm (GMT+0) via Webex. Registration is required.", "label": "No"} {"text": "Performance-enhancing carbohydrate mouthwash\nIt has long been established that carbohydrates around training or competition improve performance but researchers from the University of Birmingham, UK wanted to see if the underlying mechanism for this is metabolic or central nervous system mediated. In order to investigate this, the researchers employed simple carbohydrate mouth rinsing, where participants gargled a carbohydrate drink [...]\n|All times are GMT -5. The time now is 09:07 PM.|\nPowered by vBulletin® Version 3.8.5\nCopyright ©2000 - 2017, vBulletin Solutions, Inc.", "label": "No"} {"text": "Creating smarter, healthier transportation systems\nEleni Bardaka guides her students in developing transportation systems that support a community's physical, mental and sustainable well-being.\nPlant patch enables continuous monitoring for crop diseases\nResearchers have developed a patch plants can “wear” to monitor continuously for plant diseases or other stresses.\nTurning yeast cells into labs for studying drivers of gene regulation\nThe cells are a more efficient platform for studying proteins that play a key role in regulating gene expression.\nBiochemical sensor researcher makes MIT Technology Review’s list of top young innovators\nAmay Bandodkar, an assistant professor in the Department of Electrical and Computer Engineering, is being recognized for his work on wearable health sensors.\n‘Nanodecoy’ therapy binds and neutralizes SARS-CoV-2 virus\nNanodecoys can bind to SARS-CoV-2, helping clear the virus faster.\nCombining energy storage and solar offers unexpected power reliability boost\nThis is encouraging news for renewable energy.\nComputer scientist wins UNC System award\nVeronica Catete is the first NC State staff member to win the award that recognizes exemplary service to both campus and community.\nThree from CSC win NSF CAREER Awards\nAlexander Kapravelos, Christopher Parnin and Ruozhou Yu, all assistant professors in the Department of Computer Science, have each received an NSF CAREER Award.\nNew Board of Governors member tours Fitts-Woolard Hall\nNC State faculty and staff members showed off some of the building's state-of-the-art labs to Sonja Nichols, a newly appointed member of the UNC Board of Governors.\nNew twist on DNA data storage lets users preview stored files\nResearchers have turned a longstanding challenge in DNA data storage into a useful tool.", "label": "No"} {"text": "Advanced Technology Development\nAeroEdge Research and Development Policy\nTo keep providing value to the society over several decades, and to achieve discontinuous growth, we are working on the development of elemental technologies as seeds for next-generation businesses.\nR&D plan is linked to corporate strategy, technology trends, and a global paradigm shift. The best alliance with other leading edge companies, institutions, academia, governments will be established.\nDevelopment of Addtive Manufacturing\nIn Europe, the research and development of Additive Manufacturing (AM) technology has been accelerated and has already entered the industrialization phase. The aviation industry is the one of leading industry in AM, and AM parts are already being used in commercial aircraft engine parts. In the automotive industry, AM products have already intalled in motor sports and high-end cars, and it is expected that many cars will be equipped with AM products in the near future. AM products are also being used in medical devices such as artificial joints and teeth.\nAeroEdge is developing prototypes and consulting services using existing AM technology, and is also working on academic research as our own project. We define aircraft parts as one of the goals, keep understanding the effect of build parameters on mechanical characteristics, acquiring data for development a simulation technology, new design method with AM (DfAM; Design for AM), and utilizing AI in those technology areas.\nX-ray image analysis software development\nThe shortage of skilled workers in non-destructive inspection area of the Japanese aerospace industry is one of the major issue that preventing the its growth. It takes a long time to train highly specialized personnel to carry out the inspection work. In addition, the inspection process forces a long period of concentration and the overuse of the eyes in a dark room environment.\nAiming to solve these problems, we are developing automatic inspection system with digital technology such as AI, which has made remarkable progress in recent years. In parallel, we are taking actions to get certification for the inspection process, which is especially essential in the aircraft industry.\nCollaborating with the National Institute for Materials Science (NIMS), AeroEdge has been conducting research and development on new titanium-aluminum alloy and manufacturing technologies for jet engine components.\nTitanium aluminum, as a lightweight and heat-resistant alloy, has been applied to low-pressure turbine blades of some commercial jet engines in recent dacades, and further expansion of market is expected to realize a carbon-neutral society. We are working on research to reduce the manufacturing cost of titanium-aluminum and to improve the mechanical properties.", "label": "No"} {"text": "What did Joseph Martin want, receive, and learn?\nJoseph Plumb Martin served as a private soldier in the Continental Army for eight years (1776-83), with one hiatus during the winter of 1776-77. Born in 1760, he was raised by his maternal grandparents on their Connecticut farm from age six. He was fourteen at the time of Lexington and Concord. Inspired by the rage militaire directly following the first successful clash of arms with the British invader, Martin decided to join the militia. However, he could not obtain his grandfather's permission until July 1776, when he enrolled as a six-month volunteer in a Connecticut regiment of the Continental Army. He mustered out of the service in December and returned home. In April 1777, Martin again \"put my name to enlisting indentures\" (41). This final enlistment was for three years, or the duration of the war.", "label": "No"} {"text": "The middle school curriculum is taught by specially trained, uniformed law enforcement professionals called G.R.E.A.T. instructors. It is designed to be taught at the entry level of junior high or middle school. However, it may be taught in the sixth, seventh, or eighth grade. The lessons must be presented consecutively, with no less than one day and no more than two weeks between lessons.\nImplementation of the 13-lesson middle school curriculum produces the best results when students first complete the G.R.E.A.T. Elementary School Curriculum. However, if this is not feasible, the middle school curriculum can be taught as a stand-alone program.\nOne unique feature of this curriculum is the project called “Making My School a G.R.E.A.T. Place.” Its main purpose is to provide students with the opportunity to apply the skills they have learned. Research has shown that school bonding—that is, how connected a child feels to his or her school—is an important protective factor against joining a gang and participating in criminal activities. The goal is to increase the students’ bond to the school and to have a positive impact on how students view their school.\nThe time frame for the lessons ranges from 30 to 45 minutes, with the following performance objectives:\nWelcome to G.R.E.A.T.: A Gang and Violence Prevention Program\nStudents will identify the relationship among crime, violence, drug abuse, and gangs.\nWhat's the Real Deal?: The Real Deal on Gangs and Violence\nStudents will analyze information sources and identify realistic, normative beliefs about gangs and violence.\nIt’s About Us: Being Part of the Community\nStudents will define their roles and responsibilities in the family, school, and community.\nWhere Do We Go From Here?: How to Set Goals\nStudents will write realistic and achievable goals.\nDecisions, Decisions, Decisions: Making the Right Choice\nStudents will practice decision-making skills.\nDo You Hear What I Am Saying?: How to Communicate Effectively\nStudents will practice effective communication skills.\nWalk in Someone Else’s Shoes: Thinking of Others\nStudents will identify active-listening skills, how to recognize the emotional state of others, and how to demonstrate empathy toward victims of crime and violence.\nSay It Like You Mean It: Some Ways of Refusing\nStudents will practice effective refusal skills.\nGetting Along Without Going Along: Dealing With Peers\nStudents will continue to practice effective refusal skills.\nKeeping Your Cool: Managing Your Anger\nStudents will practice anger-management skills.\nKeeping It Together: How to Calm Others\nStudents will identify how anger-management skills help prevent violence and conflicts.\nWorking It Out: How to Solve Conflicts\nStudents will practice conflict-resolution techniques.\nG.R.E.A.T. Days Ahead: Applying Your G.R.E.A.T. Skills\nStudents will explain how their G.R.E.A.T. project helped them develop a feeling of commitment and ownership of their school and their community.", "label": "No"} {"text": "Work Medicis vase\nDepartment of Decorative Arts: 19th century\n© 2011 Musée du Louvre / Philippe Fuzeau\nAt the Manufacture de Sèvres exhibition in 1824, Louis XVIII gave his brother the Comte d'Artois (the future Charles X) a monumental Medicis vase with a painted cameo-style decoration by the painter Louis-Bertin Parant. A second example was made in 1826. The two vases decorated the Etruscan Vases Room at the Louvre.\nA gift chosen at a porcelain exhibition\nLouis XVIII revived a tradition of the Ancien Régime-that of an annual exhibition of porcelain from the Manufacture Royale de Sèvres, enabling the king to choose New Year presents for his family. Louis XVIII thus selected two vases for his brother the Comte d'Artois at the exhibition in January 1818. At the 1824 exhibition, the last present that Louis XVIII presented to his brother was a monumental Medicis vase with a subject drawn from antiquity: Augustus closing the gates of the Temple of Janus. Another vase was made in 1826, this time illustrating a contemporary subject, the entry of Charles X after his coronation.\nThe fashion for cameo-style painting\nThe band of decoration on the body of the vase is the work of Louis-Bertin Parant, a specialist in painting imitation antique cameos. The band is painted as a continuous scene, with the figures assembled around the emperor, seen in profile, sitting in a Roman chariot drawn by two horses; other figures surround two standing women (possibly Religion and Faith) crowning a potted lily on an altar. Cameo-style painting was very popular during the Empire, as well as during the Restoration. Parant made several works using the technique, such as Le Déjeuner à l'Apothéose d'Henri IV, kept at the Château in Pau.\nIn fashion since the Empire, the so-called \"Medicis\" style of vase was inspired by classical models. The choice of cameo-style painting contributed to this theme from antiquity and made it possible to imitate valuable works in a cheaper material. This work influenced by antiquity is completed by bronze ornaments: the lip is highlighted by a palmette frieze, the rim of the foot is marked by a frieze of laurel leaves and palmettes, and the handles have a fluted decoration. This type of Medicis vase continued to be manufactured at Sèvres; Charles X gave similar models to the composer François Adrien Boieldieu in 1825 and another was delivered to the Galerie de Diane at the Château de Saint-Cloud in 1838.\nManufacture de Sèvres\nH. 1.28 m; W. 0.89 m.\nPeinture de Louis-Bertin Parant : Entrée de Charles X après son sacre\nMR XIV 46\nThe Louvre is open every day (except Tuesday) from 9 a.m. to 6 p.m.", "label": "No"} {"text": "The company concerned, Canadian Natural Resources, which is one of the largest independent crude oil and natural gas producers in the world, undertakes what is known as cyclical steam stimulation (CSS) to extract the tar sands. This is one of the fastest growing methods of extracting the highly polluting and controversial tar sands. But now it seems it has a fundamental flaw.\nThe process involves injecting thousands of gallons of boiling hot, high-pressure steam into deep underground reservoirs. This in turn liquefies the bitumen and creates cracks through which the bitumen flows. It is then pumped to the surface.\nBut now it seems the steam can also crack the so-called “cap rock” above the bitumen deposits, leaving a path open for the bitumen to reach the surface in an uncontrolled fashion.\nA year ago, last July, the Canadian press reported how Canadian Natural Resource’s CSS operations had resulted in four separate oil spills which had been leaking for six weeks near Cold Lake in Alberta. One scientist said at the time that everybody in the company and government “is freaking out about this. We don’t understand what happened. Nobody really understands how to stop it from leaking, or if they do they haven’t put the measures into place.”\nA year on, according to press reports, the spills still show no sign of stopping.\nEver since the spills started, Canadian Natural Resources stuck with its story that if anything was to blame, then it was long-disused faulty boreholes from previous mining operations, which were bringing the bitumen to the surface.\nBut finally it has admitted that the spills are being caused, or at least exacerbated, by its own high-pressure CSS operations.\nIn a detailed report which has just been released, the company has conceded that its high-pressure steaming practices could have fractured the cap rock and be the cause of the spills.\nWorrying though, having admitted it is partly to blame, the company says it has no plans to change its operating practices.\nThe Pembina Institute points out that the admission that the shale “cap rock” could have been breached by CSS is really important, as the project only received regulatory approval on the basis it would not breach the cap rock.\nThis has massive implications for other CSS operations. Because if the cap rock cannot withstand pressures caused by the steaming, “then the entire CSS project concept needs to be re-evaluated”, argues Chris Severson-Baker, the Managing Director of the Institute. He adds that the discovery also calls into question the legitimacy of other projects for CSS which were given permits by the Canadian regulator.\nMoreover, Greenpeace is now calling on all operations using CSS stimulation to be stopped until the ongoing investigations into the causes of the spills are complete. “We need answers before Alberta faces yet another unexplained disaster,” says Greenpeace Climate and Energy campaigner, Mike Hudema.", "label": "No"} {"text": "The natural Amur-Heilong Ecoregion ecosystems are biologically rich, and valued by the human population and countries for their natural qualities and ecosystem services. The crowns of evolution, the Amur tiger and Far Eastern leopard thrive in extensive tracts of intact forests, protected by effectively managed nature reserves and connecting corridors.\nThe free flowing Amur River, uninterrupted by dams, ensures climate adaptation for regular monsoon floods and, supports freshwater relic communities and enormous shoals of migrating salmons and sturgeons. The Amur River valley, conserved in an internationally recognized Green Corridor, supports last breeding grounds of Oriental stork,eastern cranes and millions of migratory birds along the Northeast Asian Flyway.\nSustainable management of the viable ecosystems is linked to long-term regional strategiesof social-economic development. The Amur-Heilong Ecoregional program serves as a powerful symbol of international cooperation between peoples and countries of the basin.\nProtected Areas (PA) of Amur-Heilong Ecoregional Complex\nOpen full map in the new window\nProtected areas cover 12% of the Amur Ecoregion territory: 7,3 million hectares of federal PAs and 8 million hectares of provincial PAs including 17 strictly protected areas, 7 national parks, 8 federal and 79 provincial wildlife refuges, 6 nature parks, 7 ecological corridors, and 2 wetlands. Sikhote-Alin and Dauria Nature Reserves is the UNESCO World Heritage site. Five more nature reserves are UNESCO biosphere reserves: Sokhondinsky NR, Far Eastern Marine NR, Dauria NR, Kedrovaya Pad NR and Khankaisky Nature Reserve. Six territories are included in the list of the Wetlands of International Importance (Ramsar sites): Khanka Lake, Torey Lakes, Khingan-Arkharinskaya Lowland, Zeya-Bureya Plain, Bolon Lake and Udyl Lake.\nThe Amur-Heilong Ecoregion Complex covers a total area of 1.85 million km2. It includes the basin of the Amur-Heilong River in Russia, China and Mongolia. The area also includes the internal river basin of the Ulz River that drains its water to Torey lakes, the Uda River Basin, part of the Olekma River Basin, the eastern slope of the Sikhote Alin mountains and basins of the Razdolnaya-Suifun River and Tumannaya-Tumenjiang River. Technically the northern part of the Democratic People’s Republic of Korea (DPRK) is part of the Amur-Heilong ecoregion but for political reasons does not fall within the scope of this PIA.\nIn Russia the AHEC encompasses 5 provinces: the totality of Amurskaya Oblast, Evreiskaya Autonomous Oblast and Primorskiy Krai, part of Khabarovskiy Krai (up to the North of the Uda River), and the Shilka and Argun Rivers Basin of Zabaikalskiy Krai (former Chitinskaya Oblast and Aginskii Buryatskii Autonomic Prefecture). In China the AHEC covers three provinces: the totality of Heilongjiang and Jilin provinces, and part of Inner Mongolia Autonomous Region in Haelar-Dalaihu Basins. In Mongolia the AHEC covers parts of the following four provinces: Dornod, Sukhbaatar, Khentii and Tuv province in Onon and Kerulen Basins.\nThe majority of WWF’s work is focused on the southern portion of the ecoregion (Sikhote-Alin in Russia and Changbaishan in China), where both the levels of biodiversity and the threats are greatest. Integrated River Basin Management work is concentrated in the headwaters of the Amur River (Zabaykalskiy Krai in Russia and Dornod and Khentii provinces in Mongolia).", "label": "No"} {"text": "Latent Emissions, Chakaia Booker\nABOUT THE ARTWORK\nWho made it?\nVictor Higgins was born in Shelbyville, Indiana in 1884. At only 15 years old, using allowance money that he had saved up for years and against his parent's wishes, Higgins left for Chicago to study art at the newly opened Chicago Art Institute (now the School of the Art Institute of Chicago). Later, he went on to study painting in New York City and abroad in Paris, France and Munich, Germany.\nIn 1914 Higgins made his first trip to Taos, New Mexico to join a group of artists from Chicago who had travelled there to paint. The trip was a life-changing experience for him. It was in Taos that he believed he found the authentic America he had been looking for. Higgins left New Mexico several times over the next 35 years, but he always returned. During this time he never stopped creating the rich and varied body of work he is known for—still lifes, figure paintings, and landscapes in styles ranging from Impressionism to Cubism.\nWhat's going on in this work?\nWhen Higgins first exhibited Circumferences people didn’t know what to make of it. It was unlike any work he had previously painted.\nIn Circumferences we seem to be floating high above a planet. Voluminous white puffs suggest clouds which part to give us a peek at a planet below. The brown, blue, and green planet looks a bit familiar—perhaps it is our own home of earth. Another small dimpled, white planet hangs in front of us. Curved lines like orbits arc between and around geometric and organic shapes floating in the blue-gray atmosphere.\nAt the time Higgins painted it, this would have been an impossible vantage point for any human to have experienced. The first photograph of the earth from space wasn't taken until 1946 and it was not taken by a human, but by an uncrewed rocket. With Circumferences Higgins created a \"spacescape\" that came completely from his imagination and yet the imagery presages many of the photographs of our planet from space that we are familiar with today.\nCircumferences is the only surviving abstract work created by Higgins. Former director of the Snite Museum of Art and Higgins biographer, Dean Porter, found evidence that Circumferences was just one of a series of paintings on the same subject which are feared to have been destroyed. One can only imagine what these \"spacescapes\" might have looked like.\nTake a closer look.\nClick on the full image of Circumferences above to see a larger version of the work. Look closely at the painting and use these questions to guide your looking. Share your thoughts with your family at home, with a friend through a virtual conversation, or with us in a response to this email.\n- What do you see when you look at this painting? What does it remind you of? What do you see that makes you say that? Consider how another person might have a different idea and different reasons for their idea.\n- How would you describe the mood of this painting? What are you seeing that makes you say that?\n- If you were to create a series of paintings like this what would the other images in the series look like? Grab a piece of paper and some drawing materials to create 2-3 works that would fit into a series that included Circumferences.\nVictor Higgins (American, 1884-1949), Circumferences, 1914-1919, Oil on canvas, Gift of Mr. John T. Higgins, Snite Museum of Art, University of Notre Dame, 1963.053.004 | Photograph of Victor Higgins. | Two detailed views of Circumferences in a circular format, progressively zooming in on the painting.", "label": "No"} {"text": "One’s spiritual life is all the ways we incorporate our spiritual beliefs into our life decisions and lifestyle choices. It is the summation of how we respond to a calling from within, a calling that can be considered divine, supernatural, or merely a universal consciousness. Its general purpose is to connect mind, body, soul, and spirit, and to bring unity to our lives. Most orient their spiritual life to pursuing a more enlightened version of themselves, focusing on ideas and practices that help them find meaning, connection, purpose, and ultimate truths in our human existence. A healthy spiritual life encourages us to explore and adopt our own unique frameworks that can provide comfort and growth, meaningful challenge, and inner peace. We’ve started gathering valuable information on this topic, but haven’t yet curated the findings.\nWhy do people have faith in what they cannot see? Author Elaine Pagels explores the concept of religious belief, and shares her own experience with finding faith in the face of tragedy, in her new book, “Why Religion?” Jeffrey Brown caught up with Pagels at this year’s Miami Book Fair.\n2013 Reprint of 1937 Edition. Exact facsimile of the original edition, not reproduced with Optical Recognition Software. Evelyn Underhill was an English Anglo-Catholic writer and pacifist known for her numerous works on religion and spiritual practice, in particular Christian mysticism.\nIn our modern, materialistic world it is easy to separate spirituality from everyday life. But spirituality is not just for saints, neither is it confined to the Sunday Service, Friday prayers, or holy books.\nThere are known concerns about this teacher’s actions. Please see our Teacher Policy in the footer menu on this page for more information.", "label": "No"} {"text": "Computer-aided engineering software that address the hierarchy of engineering analysis, design, and decision evaluation is developed with state-of-the-art computer tools. Linear graph theory is applied to the modeling of physical networks. Operator overloading, dynamic polymorphism, graphical user interfaces, dynamic link libraries, and multiple threaded programs are considered.\nComputer-aided engineering software is developed and applied in all engineering disciplines. In this course the student is introduced to software implementations of the hierarchy of engineering analysis, design, and decision evaluation. An introduction to developing computer aided engineering programs with state-of-the-art computer tools and methods is provided. Software frameworks and design patterns are utilized in the course. The course introduces event driven programming for convenient designer interactions, multi-threaded programming for running lengthy and/or concurrent calculations, and the concept of runtime modular code. Graphical user interfaces are used for convenient analysis and design interaction. Upon completion of the course the student is prepared to implement computer aided engineering environments.\nPrerequisites: Graduate standing\nPercentage of Course\n|Engineering analysis, design, and decisions||15%|\n|Modeling of physical networks||15%|\n|Event driven programming and messages||10%|\n|Graphical user interfaces||10%|\n|Design patterns for engineering calculations||10%|\n|Runtime modular programs||10%|\n|Architecting a component||10%|", "label": "No"} {"text": "Choose an elevated point, such as Mount Dønnamannen or one of the Seven Sisters mountains, and you will see the two onion-shaped domes on the churches at Dønnes and Alstahaug and the spire on Herøy Church. All three churches were built at ancient places of assembly where poets, nobles, warriors and the ordinary people of Helgeland would meet.\nAlstahaug Church at Alsten, south of Sandnessjøen, was built of locally quarried soapstone in the 12th to 13th centuries. The southern choir portal is held to be one of the finest Romanesque portals in Norway.\nPetter Dass’ church\nOur famous parson-poet, Petter Dass, was the Lutheran pastor at Alstahaug from 1689 and up until his death in 1707. Both the richly decorated Baroque altarpiece and baptismal dish were donated by him. The church was enlarged in the 1800s: the choir became the sacristy and the nave became the choir. A new nave was then built. This allowed most of the old church to be preserved when the need arose for more space for the congregation.\nThe Petter Dass Museum and Parsonage\nThe Parsonage at Alstahaug dates back to the first half of the 18th century, and has well-preserved interiors from the 18th and 19th centuries. A striking and effective contrast is provided by the modern new building at the Petter Dass Museum (designed by the internationally acclaimed Norwegian architectural practice Snøhetta), which houses a centre for documents relating to the parson-poet Petter Dass.\nThe most beautiful church in North Norway\nDønnes Church is the youngest of the three churches, and was probably built in the early 13th century. Built in a transitional style between Romanesque and Gothic, it also has many details which are Gothic in flavour.\nThe church was originally built as a chapel for Dønnesgodset, one of the greatest landed estates in North Norway. At the end of the 17th century a mausoleum was also built beneath the church. It is the largest and best preserved mausoleum in Norway, and contains the embalmed bodies of members of the Tønder and Coldevin families.\nEnlargementThe local parish took over the church in the 1860s, when it acquired a new nave, and the old nave became the choir. The church is still in use, and in 2006 was awarded the title of “North Norway’s most beautiful church”.\n“The Helgeland Cathedral”\nHerøy Church was built of soapstone in the 12th century and is the largest of the triangle churches. Built in the Romanesque style, it is the only church in North Norway with an apse, a semi-circular vaulted recess terminating the choir. Herøy Church was also enlarged in the 19th century, with the nave being extended to the west. A tower was also added.\nOld centre of assembly\nIron Age archaeological finds suggest that the area where the church stands was formerly a pagan place of worship. In Medieval times, the “leidang” (English: lething), a form of conscription for naval defences organised among the local free farmers, was connected to the church. It was here that the farmers would assemble when there was danger to the realm. Herøy was for a while the centre of power in Hålogaland, and Herøy Church may then have been the most important church in what is present-day Nordland and Troms .\nIn the 1960s, the church underwent a major programme of restoration, and a considerable number of coins were found beneath the choir, the oldest dating right back to the time of King Sverre (1177-1202). The old stone altar was also found. The altar has five crosses carved in it and stood as the main altar in the apse. Now restored, it has once more found its place in the church.\nAlstahaug is easy to reach from Sandnessjøen. There are ferries to the islands of Herøy and Dønna. In the summer season all the churches have extended opening hours, and guided tours are available. Our very best recommendation, however, is to cycle: the roads are flat, the distances short, and the views of the Seven Sisters, Dønnamannen and the multitude of islands, are priceless.\nHelgeland Reiseliv’s content-rich website provides lots of practical information, www.visithelgeland.com . See the Arkitekturguide for Nord-Norge og Svalbard (online guide to the architecture of North Norway and Svalbard, www.ub.uit.no/baser/arkinord/), which has more photographs and information about the churches.", "label": "No"} {"text": "This essay was originally broadcast on Vermont Public Radio, April 29, 2010, and you can listen to it here.\nRecently I read [in Education Week] that the National Council of Teachers of English was looking for volunteers for an ad hoc task force to gather evidence about why literature should continue to be taught in schools.\nThat’s because there’s a not unreasonable effort underway to establish common core measurable standards that would shape what’s taught in English and Language Arts classes in U.S. schools. What’s shocking to me is that, in light of that effort, someone would feel – perhaps with justification – that it’s necessary to defend teaching literature. But experience has shown that knowledge and skills that aren’t evaluated by the high-stakes tests that assess students’ academic performance can quickly get squeezed out of the school schedule.\nPerhaps the author of the commentary wanted to present arguments in favor of teaching literature that are themselves measurable because the only argument she makes is the compelling need to improve American students’ poor reading scores. As she accurately points out, they are disappointingly – even alarmingly – low. She notes that the best way to make stronger readers is to have them read more, and the best way to do that is – hold on to your hats – to have them read books, not just articles or short snippets on the web. (Research shows that reading on the web hardly rises to the level of even skimming, and bears little resemblance to what’s involved in reading a novel, biography, or history book.)\nBut the rationale for reading books in English class is not limited to the important goal of promoting strong reading skills. For generations reading literature has also been the way that American students have learned their country’s history and world history, how they learned about morality (by reading about virtuous and not-so-virtuous people), how they learned about good and bad leaders, and how they learned about the dangers of pride, greed, and other human foibles.\nThe same should be true today. Moreover, reading books – fiction and nonfiction – also teaches critical thinking skills — that is, the ability to analyze information from various sources and form conclusions for oneself. Long ago some Englishman said that the purpose of education was to enable some one to tell when a person was speaking rot. I think that’s a pretty good definition of critical thinking, and Lord knows, we are still in great need of the ability to tell when someone is speaking rot.\nReading literature also teaches, among other things, empathy: it puts us in another person’s shoes, whether that person be Anne Frank, Holden Caulfield, or a conflicted young man named Hamlet. And certainly society could use a bit more empathy these days. Literature enlarges our lives, it gets us out of ourselves, and at the same time, it helps us see ourselves more clearly. In short, not only does literature make us better readers. It also makes us better citizens and future employees, and most importantly, it helps us live our lives.", "label": "No"} {"text": "avr microcontroller & DIY electronics |\nscience club |\nsweet woodruff (galium odoratum)\nI love sweet woodruff. It looks so beautiful and it smells so good. Its smell even increases when it is dried.\nAs a child I loved to buy woodruff flavored ice cream and the woodruff cream cake my grandmother used to bake was a real delight.\nWoodruff plants make for a very beautiful ground cover growing around 15-30 cm tall.\nhow to grow:\nTo get started we bought some woodruff plants as the plant spreads through rhizomes. Woodruff is a perennial that is hardy in US zones 5-9. Sweet woodruff is usually found in the forest, but can grow almost anywhere. It is said that woodruff can grow in some shade but we found that it is of the greatest importance for woodruff that it gets enough water! I really can't stress enough that most of all it needs moisture to thrive. We had tried to grow it in a spot that got rather dry in summer and it didn't do well there and when we didn't water the plants for a while they even disappeared completely. But in a different not too shady spot where they got lots of water they multiplied aplenty. You need to try to keep grass and other plants away to give woodruff a better chance to spread.\nThe plant contains the chemical coumarin which also mainly gives it its smell. And while we love the smell and traditionally it was often hung in houses in summer to give the place a cooler and fresher feeling mosquitos can't seem to stand it which makes woodruff a nice insect repellent.\nWoodruff also has some medicinal uses.\nExternally bruised fresh leaves can be applied to wounds and cuts for wound healing and used to reduce swellings.\nIt can also be used internally but you need to be very careful as coumarin can be toxic if you take too much of it.\nWoodruff is said to be helpful for migraine, nervous conditions including depression and sleeplessness, liver problems and stomach pain, as well as beneficial for jaundice, hemorrhoids, circulation and venous disorders (e.g. blood clotting). It is anti-inflammatory. It is also said to have helped against the plague.\nTo make tea take 2 teaspoons of the dried green leaves to 1 cup boiling water and don't drink more than 1/2 to 1 cup per day. Also remember that no herb should be taken longer than 3 weeks in a row without further evaluation.\nIt is best to harvest the leaves you want to dry right after the plants were blooming as this gives you the best fragrance. Tie the leaves together in a bunch and hang them to dry in a warm and dark room with low humidity.\ncautions and possible side effects:\n- Woodruff contains coumarin which can be toxic if you take too much of it.\n- Woodruff might prevent blood clotting. Therefore you should not use it at least 2 weeks before scheduled surgeries and it can increase your risk of bleeding.\n- Not enough research is done on the plant so it is better to not use it during pregnancy.\nCopyright © 2004-2020 Katja Socher, tuxgraphics.org", "label": "No"} {"text": "Representatives of a vulnerable reptile species came to Pink Lake, which they left in 1996.\nThis body of water with its unusual scarlet color is located in the West African state of Senegal.\nThe return of the original inhabitants, also known as loggerheads, was facilitated by the coronavirus pandemic. The lack of human life has led reptiles to rush to their home coasts and lay their eggs in the sand.\nIn addition, restrictive measures introduced due to the spread of the coronavirus have had a positive impact on the increase in the number of rare olive turtles. In the Marine Reserve on the west coast of the Congo, 83 thousand cubs hatched and survived.", "label": "No"} {"text": "Discover the stories of Shakespeare's childhood home\nAbout Shakespeare's Birthplace\nThe house owned by the Shakespeares when William was born.\nThe House After Shakespeare\nFind out what happened to Shakespeare's Birthplace after he died.\nThe Purchase of Shakespeare's Birthplace\nIn 1847 Shakespeare's Birthplace was put up for sale, and the Birthplaces Committees saved it for the nation\nReinventing the House\nAfter the purchase of the Birthplace, the property needed major renovations before it could be enjoyed by the public.\nThe Shakespeare Centre\nThis is the story of the construction of the 1964 Shakespeare Centre by the Shakespeare Birthplace Trust\nThe Birthplace Now\nConservation at Shakespeare’s Birthplace\nFind out how the Shakespeare Birthplace Trust conservation team protect and maintain the house and its collections!", "label": "No"} {"text": "How paragraphs in an essay\nMaybe you would like to learn more about one of these? check spelling or type a new query. how to write a reflective essay introduction. we did not find results for: how paragraphs in an essay. students 7 write an essay on my school discipline hobby your hobby 3 6 that can mostly essay five 5 own in give long college my 9 class but find 10 for how fun maintaining kids have 8 while himself on children on thin short enough for my essay 1 paragraph , indeed academic until essay d. literary provide literary mill of analysis. its seem to my need assignment help is best thesis writing help expert in across the world. you should try the need assignment help services. phd dissertation writing serviceare billed based on the emergency from the paper due to some very urgent watch a very short takes under three hrs. even though some urgent writing service essays happen to be booked for any day essay writing service, you' ll be able to find essay writing agency that how paragraphs in an essay might be capable of supply the needed essays writing inside a certain time period.\nparagraphs an authentic essay writing website can help students with all their essay writing needs. most successful applicants have no way of knowing if their essay was a pro paragraphs or a con paragraphs in their final admission verdicts. we' ve built a great team of 95 writers and editors for the useful generation of the relevant subjects for the topics. i want to take this opportunity to how say thank you very much how for taking how paragraphs this educational journey with me. i could not have accomplished it without your help. you have always been there paragraphs for me even good informatice essay paragraphs topics when my assignment was last minute. thank you from the bottom of my heart. essay on aos – belonging: immigrant chronicle how and who do you think you are? an individual’ s perceptions of belonging evolve in response to the passage of time and interaction with their world. belonging is not given, it has to be achieved. sometimes a long journey,. · the book thief is set in germany during world war ii the holocaust where six million jews were killed by the nazis.\nadolf hitler rose to national power in 1934 , began enforcing his policies of anti- semitism , german aggression, the leader of the nazi party which led to how paragraphs in an essay world war ii. read a biography about the life of mao zedong the chinese communist leader responsible for the disastrous policies including the ' great leap forward' and the ' cultural revolution'. college accounting homework help - hire experienced cpas at topassignmentexperts to help you with \" do my accounting homework\" requests. more than 500 students avail accounting homework help service every month. you do not have to pay any extra everyday resistance examples essay penny how paragraphs in an essay for this at all. following are the benefits we offer our clients: following are the benefits we offer our clients: expert essay writers: individuals who are expert in their individual fields and know everyday resistance examples essay what they everyday resistance examples essay are doing. do my homework for me and take away the terrible stress of schooling. sometimes it looks like teachers challenge your resilience with tons of homework.\nthey assign either complex papers or plenty of simpler tasks. all in all, you how cannot complete that much yourself. do not get nervous if such a situation happens. on our website how you can always ask an expert writer, “ please do my homework for. i do my homework everyday ryan international school ludhiana winter holiday homework, effect essay outli endicott college essay prompts. hi, which tense are you supposed to use in your methodology. i am writing up one of my pilot studies and i' m not sure which tense i' m supposed to be writing in? i' ve had a look at a few thesis and they seem to have been written in the past tense? thanks chococake. academic writing has tended so far to be formal. this is unnecessary but something we have to live with for a while more.\nthe argument by the advocates of formal impersonal language has been it promotes objectivity dispassionate discourse. even though the book is in past tense as you read it you are in the book' s \" present \" so you are in the action. when you' re analyzing it, you' re analyzing what occurs. you' d use past tense if you were talking about something which happened in how paragraphs in an essay the character' s past: jane eyre is hired by mr. it doesn’ t matter whether you need your paper done in a week present tense tomorrow – either way, by thesis written in past we’ ll be paragraphs able to meet these deadlines. moreover meet the deadlines not because they do it paragraphs half- heartedly but thesis written in how past , it won’ t affect the quality of a paper: our writers are able to write quickly present tense because they are very.\nHow to write a good shakespeare essay Write my philosophy papers Dracula research paper Advertisement essay thesis Research paper interpretation of data Order report writing Dissertation in financial economics Wine tasting business plan Ref impact case studies Attention getter thesis statement How to start a good synthesis essay 3 line writing paper Word count of personal statement Writing a literary analysis research paper Soil erosion case study Out of school youth research paper How to make thesis on essay Ib english b hl extended essay Used book store business plan Dissertation nature of the study Textual analysis thesis What is mean thesis statement Sbi personal loan account statement online Dissertation on brexit Site visit report paper Dissertation droit administratif methodologie", "label": "No"} {"text": "Bulbinella eburniflora P.L.Perry\nCommon names: bleekkatstert (Afr.)\nBulbinella eburniflora is a vulnerable species from the Bokkeveld Plateau, threatened with habitat loss due to ploughing and livestock grazing.\nA deciduous, perennial geophyte, up to 0.75 m high. Leaves are narrow, linear, 3–7, channeled, with the margins finely toothed. The striking white to creamy flowers have a musky odour. Flowering occurs in spring (August–September) and the shiny black seeds are usually ripe by the end of October or the beginning of November.\nBulbinella eburniflora is listed as VU (Vulnerable). This means that the existing plants are under threat and have a high possibility of facing extinction in the wild. This is due to possible ploughing and livestock grazing.\nDistribution and habitat\nThe species is confined to the Nieuwoudtville area on the Bokkeveld Plateau, where it grows in clay soils in Renosterveld, and occasionally in sandy soils amongst restios.\nDerivation of name and historical aspects\nThe genus name Bulbinella, was described by Kunth for the first time in 1843. It is derived from Bulbine for its close resemblance to the genus: bulbus in Latin and bolbos in Greek, meaning bulb or onion. The species name eburniflora is very descriptive and means white or ivory-like foliage .\nBulbinella eburniflora often is visited by moths, due to its colour and musky odour. The Bokkeveld Plateau is situated in a semi-arid area, so the plants can tolerate some drought and also light frost.\nThere is no medicinal use recorded for the species. It is suited as a pot plant and in open flower beds with full sun. Bulbinella eburniflora also makes an excellent cut flower.\nGrowing Bulbinella eburniflora\nThe best way to propagate Bulbinella eburniflora is from seeds. Sow seed in autumn, using a well-drained soil mixture. Seedling can be transplanted towards the end of summer. Potted plants can start flowering within the first two years. Adult plants can also be carefully lifted and separated after the dry dormant season. Please make sure that plants are transplanted immediately, to avoid the roots from drying out.\nPlants can be grown in clusters, to create a focal point in the garden, or in a pot on the veranda. Remember that the plant needs full sun and makes a good companion plant with grasses and restios.\n- Manning, J. & Goldblatt, P. 2007. Nieuwoudtville: Bokkeveld Plateau & Hantam. South African Wild flower Guide 9. Botanical Society of South Africa in association with the National Botanical Institute, Cape Town.\n- Perry, P.L. 1987. A synoptic review of the genus Bulbinella (Asphodelaceae) in South Africa. South African Journal of Botany 53,6: 431–444.\n- Perry, P.L. 1999. Bulbinella in South Africa. Strelitzia 8. National Botanical Institute, Pretoria.\n- Raimondo, D., Von Staden, L., Foden, W., Victor, J.E., Helme, N.A., Turner, R.C., Kamundi, D.A. & Manyama, P.A. (eds) 2009. Red list of South African plants. Strelitzia 25. South African National Biodiversity Institute, Pretoria.\nPlant Type: Bulb\nSA Distribution: Northern Cape\nSoil type: Sandy, Clay\nFlowering season: Spring\nFlower colour: White\nAspect: Full Sun\nGardening skill: Average", "label": "No"} {"text": "Leibniz's Philosophy of Mind\nIn a more popular view, Leibniz's place in the history of the philosophy of mind is best secured by his pre-established harmony, that is, roughly, by the thesis that there is no mind-body interaction strictly speaking, but only a non-causal relationship of harmony, parallelism, or correspondence between mind and body. Certainly, the pre-established harmony is important for a proper understanding of Leibniz's philosophy of mind, but there is much more to be considered as well, and even in connection with the pre-established harmony, the more popular view needs to be refined, particularly insofar as it suggests that Leibniz accepts a roughly Cartesian, albeit non-interactionist dualism, which he does not. In fact, Leibniz is justly famous for his critiques, not only of materialism, but also of such a dualism. (Whether Leibniz accepts, throughout his maturity, the idealistic view that all substances are simple unextended substances or monads is an important interpretive issue that has been discussed widely in recent years. We shall not try to resolve the issue here. (See Garber 2009 for comprehensive treatment.) In short, Leibniz made important contributions to a number of classical topics of the philosophy of mind, including materialism, dualism, idealism and mind-body interaction.\nBut Leibniz has much to say about the philosophy of mind that goes well beyond these traditionally important topics. Perhaps surprisingly, his system sometimes contains ideas of relevance even to contemporary discussions in the cognitive sciences. More generally, he discusses in depth the nature of perception and thought (conscious and unconscious), and of human motivation and striving (or, as he would say, appetition). We will take up such topics in what follows.\n- 1. Matter and Thought\n- 2. Denial of Mind-Body Interaction, Assertion of Pre-established Harmony\n- 3. Language and Mind\n- 4. Perception and Appetition\n- 5. Apperception, Desire and the Unconscious\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nFor present purposes, we may think of materialism as the view that everything that exists is material, or physical, with this view closely allied to another, namely, that mental states and processes are either identical to, or realized by, physical states and processes. Leibniz remained opposed to materialism throughout his career, particularly as it figured in the writings of Epicurus and Hobbes. The realms of the mental and the physical, for Leibniz, form two distinct realms—but not in a way conducive to dualism, or the view that there exists both thinking substance, and extended substance. By opposing both materialism and dualism, Leibniz carved himself an interesting place in the history of views concerning the relationship between thought and matter.\nMost of Leibniz's arguments against materialism are directly aimed at the thesis that perception and consciousness can be given mechanical (i.e. physical) explanations. His position is that perception and consciousness cannot possibly be explained mechanically, and, hence, could not be physical processes. His most famous argument against the possibility of materialism is found in section 17 of the Monadology (1714):\nOne is obliged to admit that perception and what depends upon it is inexplicable on mechanical principles, that is, by figures and motions. In imagining that there is a machine whose construction would enable it to think, to sense, and to have perception, one could conceive it enlarged while retaining the same proportions, so that one could enter into it, just like into a windmill. Supposing this, one should, when visiting within it, find only parts pushing one another, and never anything by which to explain a perception. Thus it is in the simple substance, and not in the composite or in the machine, that one must look for perception.\nLeibniz's argument seems to be this: the visitor of the machine, upon entering it, would observe nothing but the properties of the parts, and the relations they bear to one another. But no explanation of perception, or consciousness, can possibly be deduced from this conglomerate. No matter how complex the inner workings of this machine, nothing about them reveals that what is being observed are the inner workings of a conscious being. Hence, materialism must be false, for there is no possible way that the purely mechanical principles of materialism can account for the phenomena of consciousness.\nIn other writings, Leibniz suggests exactly what characteristic it is of perception and consciousness that the mechanical principles of materialism cannot account for. The following passages, the first from the New System of Nature (1695), the second from the Reply to Bayle (1702), are revealing in this regard:\nFurthermore, by means of the soul or form, there is a true unity which corresponds to what is called the I in us; such a thing could not occur in artificial machines, nor in the simple mass of matter, however organized it may be.\nBut in addition to the general principles which establish the monads of which compound things are merely the results, internal experience refutes the Epicurean [i.e. materialist] doctrine. This experience is the consciousness which is in us of this I which apperceives things which occur in the body. This perception cannot be explained by figures and movements.\nLeibniz's point is that whatever is the subject of perception and consciousness must be truly one, a single “I” properly regarded as one conscious being. An aggregate of matter is not truly one and so cannot be regarded as a single I, capable of being the subject of a unified mental life. This interpretation fits nicely with Lebniz's oft-repeated definition of perception as “the representation in the simple of the compound, or of that which is outside” (Principles of Nature and Grace, sec.2 (1714)). More explicitly, in a letter to Antoine Arnauld of 9 October 1687, Leibniz wrote that “in natural perception and sensation, it is enough for what is divisible and material and dispersed into many entities to be expressed or represented in a single indivisible entity or in a substance which is endowed with genuine unity.” If perception (and hence, consciousness) essentially involves a representation of a variety of content in a simple, indivisible “I,” then we may construct Leibniz's argument against materialism as follows: Materialism holds that matter can explain (is identical with, can give rise to) perception. A perception is a state whereby a variety of content is represented in a true unity. Thus, whatever is not a true unity cannot give rise to perception. Whatever is divisible is not a true unity. Matter is infinitely divisible. Hence, matter cannot form a true unity. Hence, matter cannot explain (be identical with, give rise to) perception. If matter cannot explain (be identical to, give rise to) perception, then materialism is false. Hence, materialism is false.\nLeibniz rejected materialism on the grounds that it could not, in principle, ever capture the “true unity” of perceptual consciousness, that characteristic of the self which can simultaneously unify a manifoldness of perceptual content. If this is Leibniz's argument, it is of some historical interest that it bears striking resemblances to contemporary objections to certain materialist theories of mind. Many contemporary philosophers have objected to some versions of materialism on the basis of thought experiments like Leibniz's: experiments designed to show that qualia and consciousness are bound to elude certain materialist conceptions of the mind (cf. Searle 1980; Nagel 1974; McGinn 1989; Jackson 1982).\nLeibniz's rejection of materialist conceptions of the mind was coupled with a strong opposition to dualistic views concerning the relationship between mind and body, particularly the substance dualism that figured in the philosophy of Descartes and his followers. According to this dualism, the world fundamentally consists of two disparate substances: extended material substance (body) and unextended thinking substance (mind). This bifurcation, of course, carries no burden of holding that the operations of the mental are realized by the operations of the physical. But despite his claim that consciousness and perception cannot be realized by, nor reduced to, the mechanical operations of matter, Leibniz found the alternative of postulating two distinct kinds of substance equally implausible.\nLeibniz's opposition to Cartesian dualism stems not from a rejection of unextended substance, but from his denial of the existence of genuine extended material substance. To begin with, Leibniz held the Scholastic thesis that “being” and “one” are equivalent. He writes to Arnauld: “To be brief, I hold as axiomatic the identical proposition which varies only in emphasis: that what is not truly one being is not truly one being either” (30 April 1687). For Leibniz, in order for something to count as a real being—a substance—it must be “truly one,” or an entity endowed with genuine unity. And, as we saw above, in order for something to be a genuine unity, it must be a simple, indivisible entity. “Substantial unity,” he writes, “requires a complete, indivisible and naturally indestructible entity” (to Arnauld, 28 November 1686). But matter is extended, and thus, Leibniz believes, infinitely divisible. Hence, there is no such thing, for Leibniz, as material substance.\nThere is a positive thesis which goes hand-in-hand with Leibniz's negative thesis against material substance, and which helps to explain further his rejection of material substance. It is summarized in the following passage from a letter to Arnauld of 30 April 1687:\nI believe that where there are only beings through aggregation, there will not even be real beings. For every being through aggregation presupposes beings endowed with a true unity, because it obtains its reality from nowhere but that of its constituents, so that it will have no reality at all if each constituent being is still an entity through aggregation; or else, one must yet seek another basis to its reality, which in this way, if one must constantly go on searching, can never be found…. If there are aggregates of substances, there must also be genuine substances from which all the aggregates result. One must therefore necessarily arrive either at mathematical points from which certain authors make up extension, or at Epicurus' and M. Cordemoy's atoms (which you, like me, dismiss), or else one must acknowledge that no reality can be found in bodies, or finally one must recognize certain substances in them that possess a true unity.\nAccording to Leibniz, bodies (qua material) are aggregates, and an aggregate, of course, is not a substance on account of its lack of unity. The claim in the above passage is that whatever being, or reality, an aggregate has derives from the being and reality of its constituents. Thus, Leibniz thinks that if a body is to have any reality at all, if it is to be more than a mere “phenomenon, lacking all reality as would a coherent dream,” then it must ultimately be composed of things which are real beings. Atoms, he claims, are unfit for this role, because they are themselves extended beings, and for Leibniz, divisibility is of the essence of extension. That is, those who believe in indivisible atoms make matter “divisible in one place, indivisible in another” (On Nature Itself (1698)), but “we cannot explain why bodies of a definite smallness [i.e. atoms] should not be further divisible” (Primary Truths (1686)). Every extended mass, for Leibniz, is composed of extended parts, and so even if we could conceive of an atom as composed of parts which cannot be physically divided, “an invincible attachment of one part to another would not at all destroy the diversity of these parts” (New System of Nature, (1695)), or it would not at all overcome the fact that it is an aggregate composed of parts, and not truly one being. Likewise, mathematical points, “even an infinity of points gathered into one, will not make extension,” (to Des Bosses, 30 April 1709) and so cannot be understood as the constituents of extended bodies. Hence, Leibniz opts for the last of the above quoted alternatives: the constituents of bodies are “certain substances … that possess a true unity.” These substances are partless, unextended, and indivisible, and therefore real beings in Leibniz's sense. Indeed, in several writings, Leibniz invites us to conceive of these substances on the model of our notion of souls. These simple substances are the only things which suffice for grounding the reality of bodies. To be sure, substances, Leibniz tells us, do not constitute a body as parts of the body, but as the “first elements,” or “primitive unities,” of the body. As he sometimes puts it, bodies “result from” these constitutive unities. That is, bodies just are aggregates of substances which appear to us as extended corporeal phenomena, though they are “well-founded” phenomena; they have their foundation in real beings.\nIn short, Leibniz stands in a special position with respect to the history of views concerning thought and its relationship to matter. He rejects the materialist position that thought and consciousness can be captured by purely mechanical principles. But he also rejects the dualist position that the universe must therefore be bifurcated into two different kinds of substance, thinking substance, and material substance. Rather, it is his view that the world consists solely of one type of substance, though there are infinitely many substances of that type. These substances are partless, unextended entities, some of which are endowed with thought and consciousness, and others of which found the phenomenality of the corporeal world. The sum of these views secures Leibniz a distinctive position in the history of the philosophy of mind.\nA central philosophical issue of the seventeenth century concerned the apparent causal relations which hold between the mind and the body. In most seventeenth-century settings this issue was discussed within the context of substance dualism, the view that mind and body are different kinds of substance. For Leibniz, this is a particularly interesting issue in that he remained fundamentally opposed to dualism. But although Leibniz held that there is only one type of substance in the world, and thus that mind and body are ultimately composed of the same kind of substance (a version of monism), he also held that mind and body are metaphysically distinct. There are a variety of interpretations of what this metaphysical distinctness consists in for Leibniz, but on any plausible interpretation it is safe to assume (as Leibniz seems to have done) that for any person P, P‘s mind is a distinct substance (a soul) from P‘s body. With this assumption in hand, we may formulate the central issue in the form of a question: how is it that certain mental states and events are coordinated with certain bodily states and events, and vice-versa? There were various attempts to answer this question in Leibniz's time period. For Descartes, the answer was mind-body interactionism: the mind can causally influence the body, and (most commentators have held) vice-versa. For Malebranche, the answer was that neither created minds nor bodies can enter into causal relations because God is the only causally efficient being in the universe. God causes certain bodily states and events on the occasion of certain mental states and events, and vice-versa. Leibniz found Descartes' answer unintelligible (cf. Theodicy, sec. 60), and Malebranche's excessive because miraculous (cf. Letter to Arnauld, 14 July 1686).\nLeibniz's account of mind-body causation was in terms of his famous doctrine of the preestablished harmony. According to the latter, (1) no state of a created substance has as a real cause some state of another created substance (i.e. a denial of inter-substantial causality); (2) every non-initial, non-miraculous, state of a created substance has as a real cause some previous state of that very substance (i.e. an affirmation of intra-substantial causality); and (3) each created substance is programmed at creation such that all its natural states and actions are carried out in conformity with all the natural states and actions of every other created substance.\nFormulating (1) through (3) in the language of minds and bodies, Leibniz held that no mental state has as a real cause some state of another created mind or body, and no bodily state has as a real cause some state of another created mind or body. Further, every non-initial, non-miraculous, mental state of a substance has as a real cause some previous state of that mind, and every non-initial, non-miraculous, bodily state has as a real cause some previous state of that body. Finally, created minds and bodies are programmed at creation such that all their natural states and actions are carried out in mutual coordination.\nAccording to Leibniz, what appear to be real causal relations between mind and body are, in metaphysical reality, the mutual conformity or coordination of mind and body—in accordance with (3)—with no interaction or divine intervention involved. For example, suppose that Smith is pricked with a pin (call this bodily state Sb) and pain ensues (call this mental state Sm), a case of apparent body to mind causation. Leibniz would say that in such a case some state of Smith's mind (soul) prior to Sm was the real cause of Sm, and Sb was not a causal factor in the obtaining of Sm. Suppose now that Smith has a desire to raise his arm (call this mental state Sm), and the raising of his arm ensues (call this bodily state Sb), a case of apparent mind to body causation. Leibniz would say that in such a case some state of Smith's body prior to Sb was the real cause of Sb and Sm was not a causal factor in the obtaining of Sb. So although substances do not causally interact, their states accommodate one another as if there were causal interaction among substances.\nIt should be noted, however, that Leibniz did think that there was a sense in which one could say that mental events influence bodily events, and vice-versa. He wrote to Antoine Arnauld that although “one particular substance has no physical influence on another … nevertheless, one is quite right to say that my will is the cause of this movement of my arm …; for the one expresses distinctly what the other expresses more confusedly, and one must ascribe the action to the substance whose expression is more distinct” (28 November 1686 (draft)). In this passage, Leibniz sets forth what he takes the metaphysical reality of apparent inter-substantial causation to amount to. We begin with the thesis that every created substance perceives the entire universe, though only a portion of it is perceived distinctly, most of it being perceived unconsciously, and, hence, confusedly. Now consider two created substances, x and y (x not identical to y), where some state of x is said to be the cause of some state of y. Leibniz's analysis is this: when the causal state of affairs occurred, the relevant perceptions of substance x became more distinct, while the relevant perceptions of substance y became more confused. Insofar as the relevant perceptions of x become increasingly distinct, it is “causally” active; insofar as the relevant perceptions of substance y become increasingly confused, it is passive. In general, causation is to be understood as an increase in distinctness on the part of the causally active substance, and an increase in confusedness on the part of the passively effected substance. Again, each substance is programmed at creation to be active/passive at the relevant moment, with no occurrence of real substantial interaction.\nIt is difficult to say exactly why Leibniz denied inter-substantial causation. Some of the things he tells us, in both private and public writings, seem unsatisfactory. For example, in Primary Truths (1686?), we are given this:\nStrictly speaking, one can say that no created substance exerts a metaphysical action or influx on any other thing. For, not to mention the fact that one cannot explain how something can pass from one thing into the substance of another, we have already shown that from the notion of each and every thing follows all of its future states. What we call causes are only concurrent requisites, in metaphysical rigor.\nLeibniz's first reason for denying inter-substantial causation, that “one cannot explain how something can pass from one thing into the substance of another,” is a clear reference to the influx theory of causation. Leibniz found this theory inconsistent with his conception of substance. Influx theory could only explain causal relations between entities with parts, according to Leibniz. It is through these parts that “something can pass from one thing into … another.” But Leibnizian substances do not have parts in the requisite sense. (For more on influx theory, see O'Neil 1993.) Leibniz also gives a reason tied to his complete concept theory of substance, according to which “the nature of an individual substance or of a complete being is to have a notion so complete that it is sufficient to contain and to allow us to deduce from it all the predicates of the subject to which this notion is attributed” (Discourse on Metaphysics, sec. 8). But there are, it seems, at least two problems with this explanation. First, Leibniz moves rather quickly from a conceptual explanation of substance in terms of the complete concept theory, to the conclusion that this consideration is sufficient to explain the activity of concrete substances. Second, even if conceptual considerations about substances were sufficient to explain their apparent causal activity, it does not seem to follow that substances do not interact—unless one is assuming that causal overdetermination is not a genuine possibility. Leibniz seems to be assuming just that, but without argument.\nSometimes Leibniz gives a more familiar line of reasoning. At Monadology 7, we read this:\nThere is no way of explaining how a monad can be altered or changed internally by some other creature, since one cannot transpose anything in it, nor can one conceive of any internal motion that can be excited, directed, augmented, or diminished within it, as can be done in composites, where there can be change among the parts. The monads have no windows through which something can enter or leave. Accidents cannot be detached, nor can they go about outside of substances, as the sensible species of the Scholastics once did. Thus, neither substance nor accident can enter a monad from without.\nHe seems to think that causal interaction between two beings requires the transmission or transposition of the parts of those beings. But substances are simple unextended entities which contain no parts. Thus, there is no way to explain how one substance could influence another. Unfortunately, however, this line of reasoning would seem to also rule out one case of inter-substantial causation which Leibniz allows, viz., God's causal action on finite simple substances.\nSome scholars have suggested that Leibniz should be regarded as one of the first thinkers to envision something like the idea of artificial intelligence (cf. Churchland 1984; Pratt 1987). Whether or not he should be regarded as such, it is clear that Leibniz, like contemporary cognitive scientists, saw an intimate connection between the form and content of language, and the operations of the mind. Indeed, according to his own testimony in the New Essays, he “really believe[s] that languages are the best mirror of the human mind, and that a precise analysis of the signification of words would tell us more than anything else about the operations of the understanding” (bk.III, ch.7, sec.6 (RB, 333)). This view of Leibniz's led him to formulate a plan for a “universal language,” an artificial language composed of symbols, which would stand for concepts or ideas, and logical rules for their valid manipulation. He believed that such a language would perfectly mirror the processes of intelligible human reasoning. It is this plan that has led some to believe that Leibniz came close to anticipating artificial intelligence. At any rate, Leibniz's writings about this project (which, it should be noted, he never got the chance to actualize) reveal significant insights into his understanding of the nature of human reasoning. This understanding, it turns out, is not that different from contemporary conceptions of the mind, as many of his discussions bear considerable relevance to discussions in the cognitive sciences.\nAccording to Leibniz, natural language, despite its powerful resources for communication, often makes reasoning obscure since it is an imperfect mirror of intelligible thoughts. As a result, it is often difficult to reason with the apparatus of natural language, “since it is full of innumerable equivocations” (On the Universal Science: Characteristic (undated); G VII, 205 (S, 18)). Perhaps this is because of his view that the terms of natural language stand for complex, or derivative, concepts—concepts which are composed of, and reducible to, simpler concepts. With this “combinatorial” view of concepts in hand, Leibniz notices “that all human ideas can be resolved into a few as their primitives” (On the Universal Science: Characteristic; G VII, 205 (S, 18)). We could then assign symbols, or “characters,” to these primitive concepts from which we could form characters for derivative concepts by means of combinations of the symbols. As a result, Leibniz tells us, “it would be possible to find correct definitions and values and, hence, also the properties which are demonstrably implied in the definitions” (On the Universal Science: Characteristic; G VII, 205 (S, 19)). The totality of these symbols would form a “universal characteristic,” an ideal language in which all human concepts would be perfectly represented, and their constitutive nature perfectly transparent. Now it is true that Leibniz eventually came to doubt “whether any concept of this [primitive] kind appears distinctly to men, namely, in such a way that they know they have it” (An Introduction to a Secret Encyclopedia (1679?); C, 513 (MP, 7)). But it is also clear that he did not see this skepticism concerning our ability to reach the primitive concepts as much of a barrier to the project of a universal language. He writes in The Art of Discovery (1685) that “there are certain primitive terms which can be posited, if not absolutely, at least relatively to us” (C, 176 (W, 51)). The suggestion seems to be that even if we cannot provide a catalog of absolutely primitive concepts, we can nevertheless construct a characteristic based on concepts which cannot be further resolved by humans.\nIn addition to the resolution of concepts, and their symbolic assignments, Leibniz envisages the formulation of logical rules for the universal characteristic. He claims that “it is plain that men make use in reasoning of several axioms which are not yet quite certain” (The Method of Certitude and the Art of Discovery (undated); G VII, 183 (W, 49)). Yet with the explicit formulation of these rules for the logical manipulation of the symbols—rules which humans use in reasoning—we would be in possession of a universal language which would mirror the relations between the concepts used in human reasoning. Indeed, the universal characteristic was intended by Leibniz as an instrument for the effective calculation of truths. Like formal logic systems, it would be a language capable of representing valid reasoning patterns by means of the use of symbols. Unlike formal logic systems, however, the universal language would also express the content of human reasoning in addition to its formal structure. In Leibniz's mind, “this language will be the greatest instrument of reason,” for “when there are disputes among persons, we can simply say: Let us calculate, without further ado, and see who is right” (The Art of Discovery (1685); C, 176 (W, 51)).\nJudging from Leibniz's plans for a universal language, it is clear that Leibniz had a specific view about the nature of human cognitive processes, particularly about the nature of human reasoning. According to this view, cognition is essentially symbolic: it takes place in a system of representations which possesses language-like structure. Indeed, it was Leibniz's view that “all human reasoning uses certain signs or characters,” (On the Universal Science: Characteristic; G VII, 204 (S, 17)) and “if there were no characters, we could neither think of anything distinctly nor reason about it” (Dialogue (1677); G VII, 191 (A&G, 271)). Add to this conception Leibniz's view that human cognitive processes follow determinable axioms of logic, and the picture that emerges is one according to which the mind operates, at least when it comes to intelligible reasoning, by following implicit algorithmic procedures. Regardless of whether or not Leibniz should be seen as the grandfather of artificial intelligence, he did conceive of human cognition in essentially computational terms. In fact, as early as 1666, remarking favorably on Hobbes' writings, Leibniz wrote: “Thomas Hobbes, everywhere a profound examiner of principles, rightly stated that everything done by our mind is a computation” (On the Art of Combinations (1666); G IV, 64 (P, 3)).\nWhat do we find in the human mind? Representations on the one hand, and tendencies, inclinations, or strivings on the other, according to Leibniz. Or, to put this in Leibniz's more customary terminology, what is found within us is perception and appetition. For human minds count for Leibniz as simple substances, and, as he says in a letter to De Volder, “it may be said that there is nothing in the world except simple substances, and, in them, perception and appetite.” (30 June 1704)\nPerception has already been discussed briefly above. But it will be advisable to consider also a definition from a letter to Des Bosses (and echoed in many other passages), in which Leibniz discusses perception as the representation or “expression” of “the many in the one” (letter to Des Bosses, 11 July 1706). We shall return to this definition below. Appetitions are explained as “tendencies from one perception to another” (Principles of Nature and Grace, sec.2 (1714)). Thus, we represent the world in our perceptions, and these representations are linked with an internal principle of activity and change (Monadology, sec.15 (1714)) which, in its expression in appetitions, urges us ever onward in the constantly changing flow of mental life. More technically explained, the principle of action, that is, the primitive force which is our essence, expresses itself in momentary derivative forces involving two aspects: on the one hand, there is a representative aspect (perception), by which that the many without are expressed within the one, the simple substance; on the other, there is a dynamical aspect, a tendency or striving towards new perceptions, which inclines us to change our representative state, to move towards new perceptions. (See Carlin 2004.)\nIt should not be inferred that this appetitive tendency to change is entirely mechanistic, entirely governed by efficient causation only. For in Leibniz's view, value and final causes are not excluded from the action of the mind, the change of mental states. As he says in section 13 of the Discourse on Metaphysics (1686), just as “God will always do the best, … a man shall always do … that which appears to him to be the best.” Appearance, of course, has to do with perception; doing, with appetition. So this principle of human action applies directly, as one would expect, to the two key factors of monadic interior life, only with the role of value, or an end in view, now more clearly in focus. This is why Leibniz says that, at the level of bodies (that is, for Leibniz, at the level of well-founded phenomena), all occurs according to the laws of efficient causes; whereas with respect to perceptions and appetites (or at least with some of these—interpretations differ here) all occurs according to the laws of final causes. But there is no clash here, given the harmony of the kingdom of nature and the kingdom of grace in Leibniz's system, the harmony of final and efficient causes.\nTo be sure, at an ultimate level, the only actions of substances are changes of perceptions. Thus, at the ultimate level, the appetitions are not so much the tendencies impelling a person towards voluntary motions of the human body (although at the level of well-founded phenomena this may indeed be the case) but rather tendencies arising out of present perceptions (present appearances) towards new perceptions. This explains why Leibniz defines appetitions in the initially surprising way noted above, as “tendencies from one perception to another”—another perception, that is.\nThe last two paragraphs have helped to clarify appetition. It is time to return to perception. In Leibniz's definition (the expression of the many in the one) the two key terms are ‘expression’ and ‘one’. Both of them bear considerable weight in Leibniz's metaphysics. Representation or expression (Leibniz uses the two terms interchangeably) has its own definition: “One thing expresses another … when there is a constant and regulated relation between what can be said of the one and of the other” (letter to Arnauld, 9 October 1687). Examples, in addition to perception, include a map expressing or representing a geographical region and an algebraic equation representing or expressing a geometric figure, such as a circle or an ellipse.\nWith respect to oneness, Leibniz famously claims a connection with being. He says, “I hold this identical proposition, differentiated only by the emphasis, to be an axiom, namely, that what is not truly one being is not truly one being either” (letter to Arnauld, 30 April 1687). For Leibniz, what truly is is substance, so it is not surprising that at one point he clarifies his definition of perception by saying that perception is “the expression of many things in one, or in simple substance” (A New Method of Learning and Teaching Jurisprudence, revision notes of 1697–1700).\nFinally, it should be recalled that for Leibniz there are quite distinct levels of perception among created substances. Some of these will be taken up in more detail in the following section, but the basic point for now is that the three major levels, from the lowest to the highest, are bare perception (without special distinctness or memory), sensation (with heightened distinctness and memory), and thought (with distinctness, memory, and reflection). These are distinctive of the three levels of monads, respectively, the bare monads, souls, and spirits. Only the last of these may properly be said to have reason. Only the last of these is strictly a mind in the Leibnizian classification.\nOne of the better-known terms of Leibniz's philosophy, and of his philosophy of mind, is apperception. A famous definition is presented in section 4 of the Principles of Nature and of Grace (1714), where Leibniz says that apperception is “consciousness, or the reflective knowledge of this internal state.” He adds that this is “something not given to all souls, nor at all times to a given soul.”\nDespite being well known, Leibniz's concept of apperception is not necessarily well understood. In particular, the place of apperception in the three-fold classifications given just above—of three kinds of perceptions and of simple substances—is not agreed upon, despite the fact that this would seem to be of considerable importance. A common understanding is that for Leibniz apperception is distinctive of spirits, and is not present in even the highest of animals beneath humans. While there is evidence that Leibniz at least sometimes adopts this position, there is also evidence that he sometimes endorses the view that (at least some) beasts also apperceive. Since we may assume that at a minimum apperception involves consciousness (though not necessarily certain higher forms of consciousness, e.g., self-consciousness, or reflective consciousness, in one sense or another), this leads to some uncertainty as to whether Leibniz assigns consciousness to beasts, that is, whether he does or does not agree with the famous Cartesian principle that beasts are not conscious, but only material automata.\nThere are at least three specific lines of evidence for apperception in beasts. The first is that Leibniz sometimes uses very similar definitions and examples when talking about the contrast between, on the one hand, apperceptions and petites perceptions (perceptions which are not apperceived), and, on the other, sensation and bare perceptions. This suggests, though it does not demonstrate, that Leibniz is identifying apperception and sensation, not apperception and rational thought. The second line of evidence is that he often appears to take the side of the common man against Descartes' position on beasts, for example, when he says,\nIt will be difficult to rid mankind of this opinion which has been held always and everywhere and which is universal if any opinion deserves that term, namely, that beasts have feelings (letter to Arnauld, 9 October 1687).\nFinally, there are passages, notably in the New Essays concerning Human Understanding (1704), in which Leibniz quite simply ascribes apperception, directly or indirectly, to beasts, as, for example, when he discusses the case of a wild boar that has only a bare perception of a human until the human shouts at it, at which point the boar apperceives the person (“s'apperçoit d'une personne”)and begins a charge (Bk.II ch.21, sec.5; A vi VI 173).\nWithout trying to proceed further with this issue here, we can see that whichever of these views is ultimately adopted, it remains the case that Leibniz's theory of perception involves something very distinctive in an age dominated by Descartes' theory of ideas, the thesis that there are some perceptions of which we are not conscious, the much-discussed petites perceptions. Although Leibniz was not the first to propose such an idea (Aquinas, for example, had a similar view), and although the view in his hands did not have the explosive quality that it did in the hands of Freud, the thesis remains an intriguing and important part of his philosophy of mind. Indeed, the Preface of the New Essays concerning Human Understanding contains as strong a statement as one is likely to find about the centrality of this view in a particular metaphysical system. Among other things, Leibniz makes it very clear that it is not just lower simple substances that have such unconscious perceptions but also human minds.\nHaving raised the issue of unconscious perceptions, we should consider also the question of unconscious appetitions. This is infrequently discussed, but the question should not be overlooked. Since appetitions are tendencies or strivings, ones which profoundly influence human actions, it is of distinct human relevance whether or not an individual human is conscious of all of these strivings. Certainly, some have taken the possibility of urges of which we are not conscious as highly important for the proper understanding of individual humans, and indeed of the human condition generally.\nThere is evidence, notably from the New Essays, that Leibniz did indeed draw a parallel between perceptions and appetitions with respect to consciousness. Although he did not always explain the distinction between conscious and unconscious appetitions with care and uniformity, it seems clear that he committed himself to appetitions of which we are not conscious, or which we do not apperceive, just as he had committed himself to perceptions which are not apperceived. Consider the following two statements in combination: “desires and tendencies which are apperceived are often called volitions” (New Essays, Bk.II, ch.21, sec.39); and, “There are also efforts that result from insensible perceptions which one does not apperceive, and these I prefer to call appetitions rather than volitions (although there are also apperceptible appetitions)” (New Essays, Bk.2, ch.21, sec.5).\nIn short, and perhaps oversimplifying to a certain extent, we can say that in the Leibnizian realm of mind there are indeed only perceptions and appetitions, but in these there is a fundamental divide between the realm of consciousness and unconsciousness. In the former, there are apperceptions and desires, the perceptions and appetitions of which we are conscious. In the latter, there are perceptions and appetitions of which we are not conscious. That does not mean, however, that this latter realm is unimportant in our mental lives. As Leibniz says, “insensible perceptions are as important to [the science of minds, souls, and soul-like substances] as insensible corpuscles are to natural science, and it is just as unreasonable to reject the one as the other on the pretext that they are beyond the reach of our senses.” ((New Essays, Preface) He would have said the same, no doubt, about inapperceptible appetitions.\nA Gottfried Wilhelm Leibniz: Sämtliche Schriften und Briefe. Edited by the German Academy of Science. Darmstadt and Berlin: Berlin Academy, 1923-. Cited by series, volume, and page. A&G Philosophical Essays. Edited and translated by Roger Ariew and Daniel Garber. Indianapolis: Hackett, 1989. C Opuscules et Fragments Inédits de Leibniz. Edited by Louis Couturat. Paris: Felix Alcan, 1903. G Die Philosophischen Schriften von Gottfried Wilhelm Leibniz. Edited by C.I. Gerhardt. Berlin: Weidman, 1875–1890. Cited by volume and page. Grua Textes Inédits. Edited by Gaston Grua. Paris: Presses Universitaires de France, 1948. H Theodicy. Edited by Austin Farrer and translated by E.M. Huggard. New Haven: Yale UP, 1952. L Philosophical Papers and Letters. Edited by Leroy Loemker, 2nd ed. Dordrecht: Reidel, 1969. LA The Leibniz-Arnauld Correspondence. Translated and edited by H.T. Mason. Manchester: Manchester UP, 1967. MP Philosophical Writings. Translated and edited by Mary Morris and G.H.R. Parkinson. London: Dent, 1973. P Leibniz: Logical Papers. Translated and edited by G.H.R. Parkinson. Oxford: Oxford UP, 1966. RB New Essays on Human Understanding. Translated and edited by Peter Remnant and Jonathon Bennett. Cambridge: Cambridge UP, 1982. S Monadology and Other Philosophical Essays. Translated and edited by Paul Schrecker and Anne Martin Schrecker. New York: Bobbs-Merrill Co., 1965. W Leibniz: Selections. Edited by Philip P. Wiener. New York: Charles Scribner's Sons, 1951.\n- Carlin, L., 2004. “ Leibniz on Conatus, Causation, and Freedom,”Pacific Philosophical Quarterly, 85: 365–379.\n- Churchland, P., 1984. Matter and Consciousness, Cambridge: MIT Press.\n- Cole, D., 1984. “Thought and Thought Experiments,” Philosophical Studies, 45: 431–444.\n- Cook, D., 1972. “Leibniz and Hegel on the Philosophy of Language,” Studia Leibnitiana Supplementa, 15: 229–238.\n- Dascal, M., 1987. Leibniz: Language, Signs, and Thought. Philadelphia: John Benjamins.\n- Garber, D., 2009. Leibniz: Body, Substance, Monad. Oxford: Oxford University Press.\n- Gennaro, R., 1999. “Leibniz on Consciousness and Self-Consciousness,” in New Essays on the Rationalists, R. Gennaro and C. Huenemann (eds.), Oxford: Oxford University Press, 353–371.\n- Jackson, F., 1982. “Epiphenomenal Qualia,” Philosophical Quarterly, 32: 127–136.\n- Kulstad, M., 1977. “Leibniz's Conception of Expression,” Studia Leibnitiana, 9: 55–76.\n- –––, 1982. “Some Difficulties in Leibniz's Definition of Perception,” Leibniz: Critical and Interpretive Essays, M. Hooker (ed.), Minneapolis: University of Minnesota, 65–78.\n- –––, 1991a. Leibniz on Apperception, Consciousness, and Reflection, München: Philosophia.\n- –––, 1991b. “Appetition in the Philosophy of Leibniz,” Mathesis rationis: Festschrift für Heinrich Schepers, Münster: Philosophia, 133–52.\n- Lodge, P. and Bobro, M., 1998. “Stepping back inside Leibniz's Mill,” Monist, 81: 554–73.\n- McGinn, C., 1989. “Can We Solve the Mind-Body Problem,” Mind, 98: 346–366.\n- McRae, R., 1976. Leibniz: Perception, Apperception, and Thought, Toronto: Toronto University Press..\n- Nagel, T., 1974. “What is it Like to be a Bat?” Philosophical Review, 83: 435–450.\n- O'Neill, E., 1993. “Influxus Physicus,”Causation in Early Modern Philosophy, S. Nadler (ed.), University Park: Pennsylvania State University Press.\n- Pratt, V., 1987. Thinking Machines: The Evolution of Artificial Intelligence, Oxford: Basil Blackwell.\n- Rossi, P., 1989. “The Twisted Roots of Leibniz's Characteristic,” The Leibniz Renaissance, Florence: Olschki, 271–289.\n- Rutherford, D., 1995. “Philosophy and Language in Leibniz,” The Cambridge Companion to Leibniz, Cambridge: Cambridge University Press, 224–269.\n- Seager, W., 1991. “The Worm in the Cheese: Leibniz, Consciousness, and Matter,” Studia Leibnitiana, 23: 79–91.\n- Searle, J., 1990. “Minds, Brains, and Programs,” Behavioral and Brain Sciences, 3: 417–457.\n- Simmons, A., 2001. “Changing the Cartesian Mind: Leibniz on Sensation, Representation, and Consciousness,” Philosophical Review, 110: 31–75.\n- Sleigh, R.C., 1990. “Leibniz on Malebranche on Causality,” Central Themes in Early Modern Philosophy, J.A.Cover and Mark Kulstad (eds.), Indianapolis: Hackett, 161–194.\n- Wilson, M., 1974. “Leibniz and Materialism,” Canadian Journal of Philosophy, 3: 495–513.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.", "label": "No"} {"text": "1) to fight\n1a) of armed combatants, or those who engage in a hand to hand struggle\n1b) of those who engage in a war of words, to quarrel, wrangle, dispute\n1c) of those who contend at law for property and privileges\nPart of Speech: verb\nCiting in TDNT: 4:527, 573\nMiddle voice of an apparently primary verb; to war, that is, (figuratively) to quarrel, dispute: - fight, strive.\nThese two sites give similar information, with the definition from several dictionaries and statistics on the use of the word.\nPerseus Digital Library\nUniversity of Chicago's Logion lexicon\nThayer's dictionary plus other information.\nFrom this site's dictionary (in Italian)\nClick on the first column to search for that word as a form of the root μάχομαι; click on the second column to search for that grammatical form of the root μάχομαι; click on the third column to search for that word and grammatical form; click on the total to search for the root μάχομαι.", "label": "No"} {"text": "Antibiotics. Blood thinners. Pain relievers. All these and hundreds more essential medicines just like them require solvents to manufacture. That is because solvents are used as the medium in which the chemical reaction takes place to make active pharmaceutical ingredients. They also are used to separate the desired chemical products from unwanted ones, maximising drug purity. When you take an aspirin for a headache or need penicillin for an infection, consider the solvents that are helping to restore your health and wellness.\nAdministering many essential medicines would not be possible without solvents either. Sometimes a drug must be applied as an ointment, swallowed in a syrup or injected as a liquid. Solvents are uniquely able to dissolve drugs safely and effectively into these medicinal formulations.", "label": "No"} {"text": "On common accounts, we have a state of justice when everyone has their due. The study of justice has been concerned with what we owe one another, what obligations we might have to treat each other fairly in a range of domains, including over distributive and recognitional matters. Contemporary political philosophers had focused their theorizing about justice almost exclusively within the state, but the last twenty years or so has seen a marked extension to the global sphere, with a huge expansion in the array of topics covered. While some, such as matters of just conduct in war, have long been of concern, others are more recent and arise especially in the context of contemporary phenomena like intensified globalization, economic integration and potentially catastrophic anthropogenic climate change.\nJohn Rawls’s Law of Peoples was an especially important work and greatly stimulated thinking about different models of global justice (Rawls 1999). Several questions soon became prominent in discussions including: What principles should guide international action? What responsibilities do we have to the global poor? Should global inequality be morally troubling? Are there types of non-liberal people who should be tolerated? What kind of foreign policy is consistent with liberal values? Is a “realistic utopia” possible in the global domain? How might we transition effectively towards a less unjust world?\nContemporary events also played an enormous role in prompting philosophical inquiries. Prominent cases of genocide, ethnic cleansing, forms of terrorism uncommon prior to 2001, intensified interest in immigration to affluent developed countries, increased dependence on the labor of those from poor developing countries, and enormous threats to well-being, security and the environment became common catalysts for further work. Philosophers began to reflect on questions such as: Is it ever permissible to engage in coercive military action for humanitarian purposes, such as to halt genocide or prevent large-scale violations of human rights? Can terrorism ever be justified? Should affluent developed countries open their borders more generously than they currently do to those from poor developing countries who would like to immigrate to them? Are our current global economic arrangements fair ones and if not, how should they be transformed? What responsibilities do we have to one another in a globalized, post-Westphalian world order? How should we allocate responsibilities for reducing global injustice in our world, such as in the case of distributing costs associated with addressing climate change?\nIncreased interest concerning issues of global justice has also coincided with enhanced interest in the place and value of nationalism. These explorations also track contemporary events such as nationalist clashes which have spilled over into widespread suffering (notably in the former Yugoslavia and Rwanda), increased calls for national self-determination to carry considerable weight, such as in state recognition for Palestinians or Tibetans, and also in the case of secession (prominently, Quebec). In this area global justice theorists have been concerned with a range of important questions such as: Under what conditions should claims to national self-determination be granted substantial weight? When should self-determination yield to concern for protecting human rights? Are commitments to nationalism and global justice compatible? Is genuine democracy only possible at the state level or are there robust forms of democracy that are possible in more international fora? How are ideals of democracy best incorporated into defensible global institutional arrangements? Is world justice possible without a world state?\nThe primary purpose of this article is to give an orientation to the enormous and rapidly expanding field of global justice. There are several entries in this encyclopedia that already cover some of the core topics well and these will be cross-referenced. But there are still many important gaps, along with some missing context as to how some topics fits together. This entry aims primarily to address these needs.\n- 1. Some Definitional Issues\n- 2. Principles to Guide Behavior in International and Global Matters\n- 3. The Proper Use of Force, Military Intervention, and its Aftermath\n- 4. Global Economic Injustice\n- 5. Global Gender Justice\n- 6. Immigration\n- 7. Global Environmental Issues\n- 8. Global Health Issues\n- 9. Some Issues that Cut Across Several Themes\n- 10. The Contribution to Public Policy\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nA distinction is often drawn between global and international justice. The key point of difference between these two notions involves clarifying the entities among which justice is sought. In international justice the nation or state is taken as the central entity of concern and justice among nations or states is the focus. In the domain of global justice, by contrast, theorists do not seek primarily to define justice between states or nations. Rather they drill down through the state shell and inquire about what justice among human beings consists in. Global justice inquiries take individual human beings as of primary concern and seek to give an account of what fairness among such agents involves. There are a range of actions that cut across states or involve different agents, relationships, and structures that might be invisible in an inquiry seeking justice among states exclusively. Many different kinds of interactions are not circumscribed by state membership and yet can importantly affect human beings’ most fundamental interests, so asking the question about what individual human beings owe one another often uncovers significant neglected features of relationships and structures that are of normative concern. Global justice analyses are not precluded from yielding state-level obligations; indeed, they typically do. However, they consider a wider array of possible agents and organizations that might have duties as well.\nThere are advantages associated with both types of inquiries. An important advantage of asking what states owe one another is that much international law presupposes the states system and requires states to perform various actions to promote justice. In this way, responsibilities often appear to be clearly allocated to particular parties thus making it quite precise who ought to do what in our actual world. One advantage of global justice inquiries is that we are not forced to take states as a fixed constraint and we can therefore consider a range of relevant relationships, capacities and roles that also structure our interactions and might be relevant to how we ought to conceptualize global responsibilities. While asking about what individuals owe each other may well have implications for states and their obligations, a range of other agents and institutions may also have relevant justice obligations. These responsibilities can become more visible when we explore what individuals owe each other. The two approaches have different strengths and can complement each other, but in contemporary debate they are often taken as rivals competing to provide the most plausible framework.\nSince there is already an entry in this encyclopedia that focuses on international justice (see the entry on international distributive justice), this entry will focus on the area of global justice.\nIn general, a theory of global justice aims to give us an account of what justice on a global scale consists in and this often includes discussion of the following components:\n- identifying what should count as important problems of global justice\n- positing solutions to each identified problem\n- identifying who might have responsibilities in addressing the identified problem\n- arguing for positions about what particular agents (or collections of agents) ought to do in connection with solving each problem and\n- providing a normative view which grounds (1)–(4).\nTheories of global justice aim to help us understand our world better and what our responsibilities are in it. While some theorists aim purely at theoretical understanding, others hope also to provide an analysis that can be useful in practical policy making concerning global justice matters.\nA problem is often considered to constitute a global justice problem when one (or more) of the following conditions obtain:\n- Actions stemming from an agent, institution, practice, activity (and so on) that can be traced to one (or more) states negatively affects residents in another state.\n- Institutions, practices, policies, activities (and so on) in one (or more) states could bring about a benefit or reduction in harm to those resident in another state.\n- There are normative considerations that require agents in one state to take certain actions with respect to agents or entities in another. Such actions might be mediated through institutions, policies, or norms.\n- We cannot solve a problem that affects residents of one or more states without co-operation from other states.\nSo, in general, a problem is one of global justice when the problem either affects agents resident in more than one state or the problem is unresolvable without their co-operation. For the problem to be considered genuinely global rather than regional it should affect more than one regional area.\nWhat sorts of duties of justice, if any, exist among human beings who do not reside in the same country? If there are such duties, what grounds them? Some argue that John Rawls’s principles developed for the case of domestic justice, notably, the Fair Equality of Opportunity Principle or the Difference Principle, should apply globally (Caney 2005, Moellendorf 2002). Others maintain that the content of our duties to one another is best explored by examining alternative concepts not featured in the Rawlsian corpus, such as capabilities or human rights (Nussbaum 2006, Pogge 2008).\nMuch discussion about what we owe one another in the global context is influenced by the work of John Rawls, so a short synopsis is needed to situate debates. Since discussion of these issues is amply covered in the entries on international distributive justice and on John Rawls, this will be a compressed summary focusing only on the most central aspects of the debate that have a bearing on core topics of global justice.\nIn The Law of Peoples, John Rawls argues for eight principles that he believes should regulate international interactions of peoples. For Rawls, a “people” is constituted by a group of persons who have in common sufficient characteristics such as culture, history, tradition, or sentiment. Rawls uses the term “people” in ways that relevantly correspond with how many use the term “nation”. In addition, Rawls often assumes that, for the most part, each people has a state.\nThe eight principles Rawls endorses acknowledge peoples’ independence and equality, that peoples have the right to self-determination along with having duties of non-intervention, that they ought to observe treaties, honor a particular list of human rights, should conduct themselves in certain appropriate ways if they engage in warfare, and that they have duties to assist other peoples in establishing institutions to enable people’s self-determination. He also advocates for international institutions governing trade, borrowing, and other international matters that are characteristically dealt with by the United Nations.\nSeveral claims have been the subject of much debate between critics and defenders of Rawls’s position. In particular, Rawls believes that so long as all peoples have a set of institutions that enable citizens to lead decent lives, any global inequality that might remain is not morally troubling. Critics draw attention to the ways in which global inequality—perhaps in levels of power or affluence—can convert into opportunities for deprivation and disadvantage. For instance, the global advantaged can use their superior position to influence the rules that govern international institutions—such as trade practices—which can facilitate further opportunities for increased advantage and so they can indeed threaten the abilities of others in distant lands to lead decent lives (Pogge 2008).\nAnother important issue that underlies debate between Rawls and his critics concerns different views about the nature and origins of prosperity. Rawls gives a particularly strong statement of what he takes the causes of prosperity to be. He claims that the causes of the wealth of a people can be traced to the domestic political culture, the virtues and vices of leaders, and the quality of domestic institutions. He says:\nI believe that the causes of the wealth of a people and the forms it takes lie in their political culture and in the religious, philosophical, and moral traditions that support the basic structure of their political and social institutions, as well as in the industriousness and cooperative talents of its members … The crucial elements that make the difference are the political culture, the political virtues and civic society of the country (Rawls 1999, p. 108).\nCritics observe that in addition to local factors there are also international ones which play an important role in prospects for well-being. Thomas Pogge prominently helps bring some of these into view. International institutions, such as the International Borrowing and Resource Privileges, are good examples of the ways in which international institutions can have profound effects on domestic factors which undeniably also play a role in promoting prosperity. According to the international borrowing privilege, governments may borrow amounts of money on behalf of the country and the country thereby incurs an obligation to repay the debt. The international resource privilege refers to a government’s ability to do what it likes with resources, including sell them to whomsoever it chooses to and at what price. Any group that exercises effective power in a state is internationally recognized as the legitimate government of that territory and enjoys the two privileges. But, Pogge argues, this sets up undesirable incentives that hamper developing countries’ abilities to flourish. These include incentivizing those strongly motivated to hold office for material gain to take power by force or exercise it in oppressive ways that help reinforce oppressive governments’ abilities to retain control. The global advantaged benefit greatly from these privileges and so have little incentive to reform them. But, according to Pogge, reforms are sorely needed. If only sufficiently legitimate governments are able to enjoy these privileges, the international community would remove one important obstacle developing countries currently face.\nDefenders of Rawls’s views argue that his position is more complex than is commonly acknowledged and allows for both a principled stance on some fundamental values along with appropriate openness to alternative ways in which legitimate and decent peoples might organize their collective lives (Reidy 2004, Freeman 2006). They argue that Rawls’s position shows great sensitivity to a number of factors that must be weighed in considering right conduct in international affairs. For instance, when Rawls makes his bold claims about the causes of wealth it is useful to bear in mind the context in which he is arguing. Against an assumption that resources are enormously important for a society’s ability to flourish, Rawls emphasizes the importance of strong institutions, political culture and other local factors, in sustaining decent lives for citizens. Rawls also reflects on the difficulty of changing political culture, noting that simply transferring resources will not help. Interestingly, in a little discussed passage, Rawls ventures that an “emphasis on human rights may work to change ineffective regimes and the conduct of rulers who have been callous about the well-being of their own people” (Rawls 1999, p. 109). For more on whether Rawls provides us with a cogent model that can provide sage guidance in international matters see the entry on international distributive justice and the entry on John Rawls. See also Martin and Reidy (2006). For the purposes of this entry we need only summarize some key questions that were influential in setting the terms of discussion about global justice for some time.\nSome key questions are:\n- What principles should govern interactions among peoples at the global level?\n- What are the causes of prosperity and are they traceable entirely to domestic factors or are international considerations relevant?\n- What should count as the kind of prosperity or well-being that we are aiming to promote?\n- Do we have an obligation to ensure people have their basic needs met and can otherwise lead “decent” lives, or should we be more concerned with global socio-economic equality?\n- What duties do we have to those peoples who do not yet have what they need for self-determination or prosperity?\n- If human rights serve an important role in world affairs, which rights should be on our list of those to endorse? What duties arise from such commitment?\n- Can we properly hold nations to be entirely responsible for the well-being of their people and if so, in what kinds of conditions might this make sense? How do we encourage nations to take responsibility for their people’s well-being?\n- When we consider what we owe one another, do compatriots deserve special consideration?\nI trace some of the influential positions that have shaped answers to these questions next.\nOne of the most visible and large-scale contemporary global justice problems we face is that of global poverty. What ought we to do for the 1 billion or so people who currently live in poverty? (This is a huge area nicely canvassed in the entry on international distributive justice.) A few seminal arguments deserve mention here as well, however. In a classic argument Peter Singer describes a so-called easy rescue case in which an infant is drowning in a shallow pond. You happen by and can save the child with minimal effort and inconvenience on your part. Singer argues that you would be obligated to assist using the principle that when it is in our power to prevent something bad from happening without sacrificing anything comparable, it is wrong not to prevent the bad from occurring. Reflecting on this principle Singer argues that it entails extensive duties to assist needy others, whether they be geographically proximate or not. We have extensive duties to assist the global poor who, with equally minimal effort on our part, can be saved from dire circumstances, since the same principle applies in both cases (Singer 1972, and for more treatment Unger 1996).\nAnother enormously influential contribution is that of Thomas Pogge who argues that since developed countries impose a coercive global order on the poor that foreseeably and avoidably causes great harm, they have important responsibilities to reform the global order such that it ceases to do so and instead better secures human rights (Pogge 2002, 2008, 2010). We harm the global poor when we collaborate in imposing an unjust global institutional order on them and, moreover, that order is unjust when it foreseeably perpetuates large-scale human rights deficits that can reasonably be avoided were we to make quite feasible institutional modifications (Pogge 2002, 2008, 2010). While Singer emphasizes our capacity to assist with need satisfaction, Pogge emphasizes instead our contributions to the problem as grounding our duties.\nWhen discussing our duties to one another there is also vigorous debate about what the content and target of our duties should be, along with discussion about what are the best ways to discharge these. Traditional dominant economic approaches to promoting prosperity have focused on raising income levels or increasing Gross Domestic Product (GDP). Railing against such approaches, Amartya Sen suggested that the capabilities approach provides an improved measure of well-being and constitutes a better way to capture changes in people’s condition over time (Sen 1980). Exploring what people are able to do and be provides a more appropriate standard by which to evaluate whether their condition has improved rather than focusing exclusively on their incomes or per capita GDP. Martha Nussbaum develops this approach and argues for a list of ten capabilities that should be secured for all people in all places. This universal list can provide an important tool in persuading governments to make reforms conducive to their citizens’ flourishing. (See the entry on the capability approach for more.) What constitutes well-being and the best ways to measure it is an enormous topic both in Philosophy and in adjacent disciplines. For a good introduction see the entry well-being. Another important discourse for discussing these topics is that of human rights which is discussed in Section 2.4 below.\nWhen considering what we owe one another, are compatriots special? Do we have the same duties to non-compatriots as we have to compatriots or is there some principled way in which these two sets of duties ought to differ?\nNationalists argue that we belong to national communities and any account of our global responsibilities that ignores this omits an important aspect of how we relate—and ought to relate—to one another. They argue that nations can provide a valuable grounding for social attachment, identity and meaning in life, and can ground special obligations to strengthen national life and assist co-nationals. Others defend the value of nationalism on instrumental grounds; there is nothing inherently special about our co-national relationships but state boundaries are useful in assigning important duties to particular agents (Goodin 1998). In a world of great unmet need, paying special attention to one’s co-nationals can be justified (Goodin 1998).\nIn the words of Diogenes, widely credited as the first person to propound cosmopolitan views, cosmopolitans see themselves as “citizens of the world”. Contemporary cosmopolitans typically hold that every human being has standing as an ultimate unit of moral concern and is entitled to equal consideration of her interests no matter what other affiliations, especially national affiliations, she might have. Drawing on the idea that we all have equal moral worth, cosmopolitans seek to broaden our moral horizons so that we do not forget about the responsibilities we have to others beyond state borders, even when we have local responsibilities as well.\nThere are two particularly prominent contemporary accounts of cosmopolitanism. Martha Nussbaum emphasizes that, as human beings, we belong to a global community of human persons (Nussbaum 1996). Nussbaum argues that while love for one’s country might have a legitimate place in people’s conceptions of a good life, we should not overlook the many other relationships we are in which connect us to others in the world. We need to draw the global community in closer to the local one, and, more generally, aim to see ourselves as members of overlapping communities which also have important claims on us.\nThomas Pogge offers an enormously influential account that focuses on the implications of cosmopolitanism for the global institutional order. We need to ensure that global institutional structures give equal consideration to everyone’s interests. He says, “Insofar as human agents are involved in the design or administration of global rules, practices, or organizations, they ought to disregard their private and local, including national, commitments and loyalties to give equal consideration to the needs and interests of every human being on this planet” (Pogge 2013, 298). This equal-consideration-of-interests requirement only applies to such contexts. While such impartiality norms are perfectly familiar within the state, for instance, when judges operate in law courts, we have yet to realize the requirement at the global level.\nIt is often assumed that cosmopolitanism must necessarily be in tension with more local attachments to friends, family or compatriots. Some cosmopolitans believe such conflict is inevitable and a necessary part of understanding what cosmopolitanism entails but that this implication is unproblematic (Ypi 2013). Others argue for different ways in which the apparent tensions could be resolved (Pogge 2013, Tan 2004). As we see above, Pogge emphasizes the clear separation of spheres in which equal consideration of people’s interests applies. Kok-Chor Tan also offers a similar argument. His strategy is to show that cosmopolitan principles should govern global institutional structures that ensure people are treated as equals in their entitlements (Tan 2004). When this is the case there can be a legitimate role for patriotism that operates within such constraints. Partiality to co-nationals need not conflict with cosmopolitan obligations. Another notable strategy is to argue that we cannot achieve justice at a national level unless we attend to justice at a global level. On this view, we have at least instrumental reasons to care about global justice, even if we care deeply about social justice in our nation (Banai, Ronzoni and Schemmel 2011, Ronzoni 2013).\nThere is an important debate among egalitarian theorists about whether our concern with equality should be confined to members of the same state or whether it should extend to all globally. Some theorists argue that careful consideration of notions such as reciprocity, coercion, or fair terms of co-operation mandate that we give special weighting to the interests of compatriots. Others, by contrast, argue that these concerns, when properly understood, point in the direction of equally strong duties to non-compatriots. One form of the argument that we have special duties to compatriots that are not shared with non-compatriots, draws on the coercive legal structure that applies within states and claims that such coercive structures do not apply outside of them (R. Miller 1998, Blake 2001). Another highly influential version claims that there is a difference in the authority to enforce justice within and outside the state (Nagel 2005). There are many important challenges to such positions. One important line of argument maintains that coercion is indeed relevant in triggering duties of egalitarian justice, but since this is rampant at the global level it activates global not just national egalitarian duties (Cohen and Sabel 2006, Abizadeh 2007). In addition, some argue that the same ingredients Nagel identifies as crucial in generating state authority exist at the global level as well (Cohen and Sabel 2006). See the entry on international distributive justice for more on these issues. For comprehensive treatment of nationalism and cosmopolitanism see the entries on nationalism and on cosmopolitanism, respectively.\nDiscussion of global justice matters often invokes concern for human rights. In fact, for all their differences, both nationalists and cosmopolitans frequently agree that a good way to think about some of our duties to one another is via human rights. Human rights can and does therefore serve as an important discourse for furthering discussion about our global responsibilities.\nRespecting human rights is an important requirement in much international law and can be a key criterion in evaluating whether governments are considered legitimate by the international community. The United Nations Universal Declaration of Human Rights is a highly influential account of all human beings’ basic entitlements and this document often plays an important role in real world debates about justice matters. See the comprehensive entry on human rights for more detail. Here I have space to discuss only two issues that have been prominent in debates about global justice.\nThe first concerns the kinds of duties we have in relation to human rights. Against a conventional view widespread before 1980, Henry Shue argues that if rights to physical security are basic, so are rights to subsistence (Shue 1980). A careful analysis of the duties associated with human rights indicates that the commonly held distinction between positive and negative duties cannot be maintained. All rights have a range of both positive and negative duties associated with them.\nThomas Pogge offers an enormously influential account of duties with respect to human rights. Our current global order perpetuates global poverty on a massive scale, but since feasible reforms to that order could avert this harm, our failure to make reforms not only implicates us in the misery but also in the violation of the rights of the poor. We therefore have extensive obligations to reform our global order so that the rights of the poor can be fulfilled.\nFor more treatment of issues, especially concerning what human rights are, which rights are rightly construed as human rights, and how human rights function in international law, see the entry human rights.\nWithin the field of global justice, issues concerning war have one of the longest histories. The just war framework has been influential in setting the terms of much debate about the proper use of force in international affairs. Aristotle, Cicero, Augustine and Thomas Aquinas offered some of the earliest accounts of the criteria that should be met for war to be justified. Two areas have been especially thoroughly studied (1) the conditions under which entry into the war is justified (Jus Ad Bellum) and (2) the conditions for fair conduct within the war (Jus In Bello). While having a just cause is standardly held to be a necessary condition for a war to be justified, it is not sufficient. Theorists often disagree about which additional conditions must be satisfied for a war to be characterized as a just war. The most common additional conditions proposed are that the war should be undertaken by a proper authority, with the right intentions, when the war would follow requirements of proportionality (the ends to be secured would warrant going to war), only as a last resort, and when there are reasonable prospects of success. On traditional accounts of just war theory all conditions must be met, but more contemporary theorists challenge whether they are all necessary (Mellow 2006, Moellendorf 2002).\nOnce the fighting begins two central principles guide evaluation of whether the war is being conducted fairly: one which respects the distinction between combatants and noncombatants (The Principle of Non-Combatant Immunity) and another that governs what counts as the proportional use of force (Proportionality). On the first, it is not legitimate to use force against civilians and, even though some collateral civilian damage may occur, it is wrong to deliberately target non-combatants. On the second, combatants may only use the force necessary to achieve their ends -- the force used must be proportional to the ends that are to be secured in conducting the war. There are further requirements governing fairness, such as requirements to comply with international laws and treat prisoners fairly, but the two featured principles are the most commonly invoked in normative analyses of Jus In Bello.\nThe third part of just war theory (Jus Post Bellum) concerns how the war concludes and the transition back to a situation of peace. It deals with issues such as compensation, punishment, and reform. More recently a further component has been suggested especially in light of engagements in Iraq and Afghanistan in the years 2001-2011, namely, justice in exiting the war (Jus Ex Bello), which concerns when it is appropriate to end a war (Moellendorf 2008, Rodin 2008).\nThere are many contemporary global justice issues concerning the appropriate use of force and its aftermath that currently command attention including: Is drone warfare permissible? Can terrorism ever be justified? Are “targeted assassinations” (where leaders who are primarily responsible for decisions to go to war are targeted for assassination) justifiable? May we engage in a war in order to prevent an anticipated “worse war” (as proponents of the “Bush Doctrine” maintain)? Is torture to contain major global threats permissible? Is the attempt to contain nuclear weapons development by those who have them already fraught with hypocrisy? How should we deal best with societies in a state of transitional justice? Is there a place for “Truth and Reconciliation Committees”? When are political apologies for historic injustice in warfare appropriate?\nHere we consider very briefly only two further issues that have widespread current interest in the global justice literature: Humanitarian Intervention and Terrorism. See the entry on terrorism for an extended analysis of such questions. See the entry on war for a comprehensive overview of issues concerning justice in war.\nUnder what conditions, if any, may we engage in military intervention aimed at stopping genocide? In recent years this issue has become salient as large-scale human rights violations and suffering unfolded in Rwanda, the Sudan, the former Yugoslavia, and Libya. Against the traditional understanding that respecting state sovereignty requires non-interference, successful arguments were marshaled that there are important responsibilities to protect the vulnerable (International Commission on Intervention and State Sovereignty 2001). Leaning heavily on the conventional conditions contained in the just war framework, the International Commission on Intervention and State Sovereignty argued that we may engage in war aimed at protecting those who suffer at the hands of governments unwilling or unable to stop large-scale human rights abuses. The commission produced an influential report “The Responsibility to Protect” which was accepted by the United Nations in 2005, and the principles contained in the report have guided decisions about recent cases, such as Libya in 2011 and Syria in 2012.\nOne frequently voiced concern about humanitarian interventions is whether they are just another form of imperialism. How will interveners be held accountable for their actions? Taking such concerns seriously Allen Buchanan and Robert Keohane advocate for a series of innovative mechanisms of accountability, both before and after the proposed intervention takes place, to allay fears about abuse (Buchanan and Keohane 2004).\nWhat kinds of violence count as terrorism? Is there a difference between state terrorism and that perpetrated by insurgent organizations? Might terrorism be justified under certain circumstances? Terrorism centrally involves either using or threatening to use violence against people, commonly taken to be innocent, in order to produce results that would not otherwise occur (Coady and O’Keefe 2002, Primoratz 2013). Some challenge that the targets are innocent. As terrorists often point out about citizen complicity in atrocities, citizens pay taxes and vote, and their governments undertake actions that they can be said to sanction and from which they benefit, so it is coherent to hold citizens responsible for their governments’ actions. On this argument, citizens can be legitimate targets of violence. In addition, there is relevant precedent from governments targeting civilians when they perceive the situation to be one of a “supreme emergency”, as happened in the case of Britain targeting German civilians in the Second World War. So when governments judge that some moral disaster is sufficiently likely, it can be repelled using unorthodox and otherwise repugnant means.\nPossibly the next most prominent global justice issue after considerations of proper use of force concerns the impact of, and responsibilities created by, globalization. Globalization is a complex phenomenon with many facets. For our purposes we need note only some of its characteristic central features. These include (i) an increasingly globally integrated economy, (ii) dominated by transnational corporations engaged in activities (such as production and distribution) that span multiple countries, (iii) increasing regulation of economic matters by supranational institutions (such as the World Trade Organization), (iv) general commitment to removal of barriers to “free trade,” and (v) higher levels of economic interdependence. While there is much debate about the long-term effects of globalization and whether they are on balance good or bad, at this stage, the effects of globalization have been mixed. For some, globalization has brought improvements, while it has worsened the position of others (Singer 2002).\nPhilosophers have been concerned with answers to a range of questions such as: What kinds of economic arrangements are just? Should our international institutions be reformed to better reflect fair terms of co-operation in our globalized world? Can globalization be better managed so that it works to assist the global poor more effectively? Are protectionist policies in trade justified or, rather, is free trade required by considerations of justice? Should poor working conditions in developing countries be a matter of concern for citizens and consumers in affluent, developed countries? If so, how might harmful employment conditions be effectively improved?\nWhile Thomas Pogge argues that globalization has harmed the poor on a massive scale, Mathias Risse argues that this is not at all clear (Pogge 2010, Risse 2005). Risse argues that in many ways the global order must be credited with benefiting the global poor as well. He challenges Pogge’s claim that there are feasible alternatives to our global order that could be easily implemented and would avert the harm to which Pogge draws attention.\nThe World Trade Organization has been an important focal point for discussion about global economic justice. In particular, critics argue that some of its policies, such as those that generally advocate free trade but allow protectionism in affluent developed countries, involve grave hypocrisy and unfairness to some of the world’s most vulnerable people (Pogge 2001, Moellendorf 2002). There are also large disparities in the resources at the disposal of various parties such that weaker parties often suffer huge disadvantages in being able to negotiate agreements that work well for them. In these sorts of ways agents in developed countries (such as governments, citizens or firms) can take unfair advantage of those in developing countries (R. Miller 2010).\nMore generally, there are concerns related to the extraordinary power of multinationals and the undue influence they are able to exercise in negotiating deals favorable to them at the expense of the interests of the most vulnerable. So-called sweatshops (in which workers typically labor under harsh and hazardous conditions) are also a frequently raised example of how western consumers are implicated in far away suffering, given the high level of dependence in high-income countries on labor from low-income ones. When we purchase products manufactured in sweatshops are we guilty of contributing to exploitation and if so, what ought we to do to mitigate these unfairnesses? Christian Barry and Sanjay Reddy offer an innovative proposal to incentivize improvements in labor standards and wage levels in poor developing countries (Barry and Reddy 2008). This “Just Linkage” proposal offers some additional desirable opportunities for enhanced international trade to those who meet higher standards.\nIn this domain philosophers have also examined a range of other issues including obligations to forgive odious debt (Barry, Herman and Tomitova 2007) and whether micro-finance is to be welcomed as a positive force for the global poor (Sorrell and Cabrera, 2015). Other more general concerns about exploitation and economic justice can be found at the entries on exploitation and economics and economic justice. See also the entry on globalization.\nThe effects of poverty do not fall equally on men and women, nor on boys and girls. In general, poverty makes the lives of women and girls harder than their male counterparts, as cultural expectations often dictate that women and girls do more care and domestic work or go without (or much less) when resources are scarce. This can significantly thwart women and girls’ well-being, as education, health care, and food are routinely withheld in favor of distribution to men and boys. Alison Jaggar prominently argues that various structures create and recreate transnational gendered vulnerabilities and she illustrates with practices common in domestic work and the sex industry (Jaggar 2009).\nCultural perceptions of gender roles can often lead to practices highly damaging to the most fundamental interests of women and girls. These include “honor killings” (where it is believed culturally permissible to kill a girl or woman who is perceived to have brought shame to the family), genital mutilation, infanticide, forced prostitution, arranged marriage, and legal recognition of property and inheritance rights that significantly disadvantage women and girls. Poverty can exacerbate such vulnerabilities so we have further reasons to address it as a matter of urgency (Jaggar 2009, 2014). Martha Nussbaum has argued for a list of ten capabilities that all human persons, no matter what their gender, ought to be positioned to exercise. She argues that this approach offers a powerful tool for persuasion in cases where girls and women are denied these opportunities by local actors in different cultures.\nSome important policy has been influential in international discourse concerning combating gender injustice. The Millennium Development Goals includes as a third goal the promotion of gender equality and the empowerment of women. The 1995 Beijing Platform for Action set the stage for several International Covenants and before that the United Nations Convention on the Elimination of All Forms of Discrimination Against Women afforded some important protection for women’s human rights. Some feminist theorists are suspicious of human rights language and are inclined to reject what they perceive as a masculine discourse that trumpets individual autonomy in a way that fails to acknowledge adequately our fundamental human interdependence. While there certainly is a place for discussion of these important themes, others argue that we should not lose sight of the important victories human rights have also been able to secure, despite still having a long way to go (and other failings). The rhetoric of human rights has enabled substantial gains for promoting gender equality and protection of women’s fundamental interests, so it has at least strategic value.\nThere are a large number of issues debated in the global justice literature concerning migration, whether temporary, permanent, legal or illegal. These include: Should states have the right to control their borders? Even if they have such a right, should states be more generous in admitting would-be migrants, especially considering the facts about global disparities in life prospects? When affluent developed states refuse to open their borders to the economically disadvantaged, is this equivalent to members of the aristocracy unjustly protecting their privilege as was the case in feudal times? What responsibilities are there to admit more refugees? Can illegal immigration be justified under certain circumstances? What sorts of criteria may affluent developed countries use when selecting migrants from the pool of applicants for citizenship? May they legitimately consider how prospective migrants would fit in with current citizens, favoring certain religious, linguistic, or ethnic affiliations to manage compatibility? When making migrant selection decisions, should they consider the effects on those who remain in countries of origin and if so, is this fair to the would-be migrants who would be excluded on grounds of the alleged negative impacts for home country citizens? If states admit migrant workers, are there moral constraints on how they should be treated? Would admitting temporary workers without simultaneously allowing them a pathway to citizenship be unjust? What responsibilities do we have in relation to human trafficking?\nThere are several now classic defenses of state’s rights to control borders. David Miller (Miller 2005, 2007), Michael Walzer (Walzer 1983) and Christopher Wellman (Wellman and Cole 2011) have been particularly important. Joseph Carens is the most influential proponent of the alternative “Open Borders” position (Carens 1987, 2013, but see also Cole 2000 and Wellman and Cole 2011). While many theorists discuss the responsibilities to refugees and guest workers, Walzer’s treatment is particularly influential, especially in arguing for his view that guest worker programs are only justified when they offer such “guests” a proper pathway to full and equal citizenship (Walzer 1983). Wellman offers comprehensive discussion of defensible admission criteria (Wellman and Cole 2011). Whether brain drain issues should be salient for migration decisions has been the subject of recent discussion (Carens 2013, Oberman 2012, Brock and Blake 2015). For detailed coverage of issues concerning whether borders should be more or less open, what our obligations are to refugees or guest workers, and issues concerning the ethics of recruiting immigrants away from poor, developing countries, see the entry on immigration.\nPatterns of human behavior that destroy habitats, accelerate species extinction, exacerbate toxic levels of pollution, contribute to ozone layer destruction, or increase population levels are all issues of global environmental concern. However, although there are many global environmental topics that are rightly concerns of global justice, there is one that dominates discussion and that concerns our responsibilities with respect to climate change. Here we focus exclusively on this issue.\nAmong the scientific community it is no longer controversial that anthropogenic climate change is real and a significant threat to the well-being of both current and future generations. But it is also widely acknowledged that human development is an important way to address high levels of global poverty, that such development is energy intensive, and the cheapest sources of energy available are not likely to be clean energy types. These considerations significantly affect efforts to deal with problems presented by climate change. There is much discussion about the principles that should inform a fair treaty aimed at dealing with addressing climate change that also gives appropriate weight to concerns for human development. Some of the main contenders include principles that recognize causal responsibility for high emission levels, principles that are sensitive to ability to pay, and ones according to which those who have benefited from emissions should now be expected to absorb more costs.\nWe have not all contributed equally to the problems created by emissions; industrialized nations have contributed historically at much higher levels than those that are still developing. And so we should endorse the guidelines that those who have polluted more should pay more to help redress current problems (The Polluter Pays Principle). However critics argue that this principle unfairly holds some responsible when they did not know they were causing harm, since it was not widely known that greenhouse gases could result in climate change prior to 1990. So on this view, responsibility for emissions prior to 1990 should not conform with the Polluter Pays Principle, even if it is used to allocate costs after 1990. A second principle that is often discussed is The Beneficiary Pays Principle. Those who live in industrialized countries have typically benefited greatly from high levels of emissions so it is not unfair if they are expected to pay a higher proportion of costs. Critics object that a history of benefiting is an insufficiently strong consideration for assigning responsibilities now: in many cases whether or not people benefit is largely outside of their control. According to a third popular principle, The Ability to Pay Principle, the capacity of agents to pay for costs associated with mitigating climate change should be relevant.\nComprehensive treatment of climate justice requires addressing the issue of responsibilities to future generations. For important treatment of our responsibilities to other generations see the entry on intergenerational justice.\nOne striking feature of the state of global health is that there are large inequalities in health outcomes and opportunities for health. Consider that life expectancy can vary a great deal. A person born in Sierra Leone can expect to live about 40 years whereas one born in Japan can expect to live for 80 years. Malaria has been almost entirely eradicated in high-income countries, but it still kills about a million people in developing countries (United Nations 2009). A woman in the Niger has a 1 in 7 chance of dying in childbirth, whereas this is 1 in 11 000 for women in Canada (Benatar and Brock 2011). The global burden of disease is by no means evenly spread nor does workforce capability correspond with areas of highest need. In fact many of the countries that suffer from the greatest burdens of disease have the fewest skilled healthcare workers. In addition, pharmaceutical companies do not spend their research and development budgets in ways that match where the needs are greatest. Rather, seeking the most profitable ventures, they are much more likely to spend resources developing drugs for lucrative markets where the payoffs are greatest, even when the marginal benefits to consumers are small. One example is the research and development resources pharmaceutical companies frequently spend on developing drugs that are similar to others already available, rather than developing treatments for diseases for which there are no cures. It is estimated that drug companies spend approximately 90% of their research and development resources in seeking treatment for about 10% of diseases (Drugs for Neglected Diseases Working Group 2001).\nThe poor in developing countries are also often more vulnerable to disease and less able to resist disease because of poor living conditions related to poverty. Lack of clean water, clean energy sources, inadequate nutrition, and other social determinants of health play a key role in explaining this increased vulnerability. Living in overcrowded houses can facilitate the spread of infectious diseases, such as tuberculosis. So, a number of issues that sustain poverty or exacerbate people’s vulnerability to disease as a result of poverty should be of concern (Benatar and Brock 2011). As Norman Daniels argues, health inequalities among different social groups can be considered unjust when they result from unjust distribution in factors that are socially controllable that affect population health (Daniels 2011, 101). On this view many of the health inequalities that exist are ones that ought to be of concern as they meet this criterion. How should responsibilities for improving this situation be allocated? In many ways, but here I pick out just a few that have received considerable attention in the philosophical literature.\nThe current system of intellectual property rights is one troubling area. The World Trade Organization grants product patents for a twenty year period which effectively renders many new medicines unaffordable for the vast majority of the world’s population and those in greatest need. There are a number of innovative proposals aimed at addressing these issues. One prominent example is the Health Impact Fund proposal developed by Thomas Pogge, which offers alternative ways to reward pharmaceutical companies, notably by how much impact they have on actually curing diseases (Pogge 2008). The greater their impact, the larger the share of the rewards they would receive from the Health Impact Fund. Nicole Hassoun proposes a certification program for rating pharmaceutical companies’ contributions to the global poor, “Fair Trade Bio” (Hassoun 2012). Companies would compete for the gold star rankings which could significantly affect consumption choices and thereby expected profits. In both cases the aim is to create important incentives for key players to care about how their products affect the global poor.\nThere are many other issues that concern philosophers in the domain of global health. There are increasingly worrying practices of experimentation on disadvantaged subjects in developing countries. Increasingly, clinical research has been outsourced to poor, developing countries with populations that are often highly vulnerable. We might wonder about whether these populations are being exploited and whether the participants have compromised abilities to consent to drug trials. In many cases the trials bring considerable health benefits that would not come their way were it not in the interests of pharmaceutical companies to do clinical research in those locations. If sufficient benefits accrue for local populations some argue that these cases need not be of concern (London 2011).\nNew infectious diseases and the threat of pandemics are creating further questions about our responsibilities. Often the case is made that national interests in public health in developed countries mandate concern for infectious diseases that originate in developing countries. But more recently, this argument appears to have striking limitations. The Ebola outbreak in West Africa in 2014 raises questions about what we ought to do to help the victims who, because of the ways in which the disease spreads, are unlikely to threaten large segments of the population in affluent developed countries outside of Africa. The national interests of affluent developed countries do not easily converge with public health demands in developing ones in this case and yet we might still have important responsibilities to assist.\nDiscussion of natural resources often figure prominently in several topics of global justice. Some relevant questions include: Are national communities entitled to the resources they find on their territories? Should principles of global justice apply to our arrangements for justly distributing natural resources? Charles Beitz was an early proponent of a resource distribution principle, according to which natural resources should be allocated such that each society is able to provide adequately for its population (Beitz 1975). We saw in Section 2 that Rawls believes that resources are not important to prosperity in the ways many imagine. Rather, institutional resilience matters more. By contrast, Thomas Pogge highlights the ways in which international practices concerning the distribution of resources create considerable obstacles for prosperity in developing countries. In short, these practices create incentives for the wrong kinds of people to take power through illegitimate means and to focus on retaining power at the expense of other goals governments should have, such as trying to improve the well-being of their citizens. We need to modify these international practices so they do not create such an unfavorable environment. In addition, Pogge proposes a Global Resources Dividend as one measure by which practices concerning natural resource distribution would work in some small way to the benefit of the global poor. On this Global Resources Dividend proposal there would be a small tax on resource extraction, payable by the consumers of resources, and available for projects that would assist in helping everyone to be able to meet their basic needs with dignity (Pogge 2008).\nLeif Wenar is also concerned with prevailing practices governing the sale of natural resources and their products (Wenar 2010). When consumers in wealthy states buy goods from developing countries, this is often similar to consciously receiving stolen goods. Legitimate resource sales require general agreement from citizens. Evidence of agreement requires that: (i) owners must be informed about sales, (ii) owners must be able to express dissent freely should they have doubts about sales, and (iii) owners should be able to stop resource sales without fearing grave consequences such as violence and intimidation. In these sorts of ways, Wenar aims to outlaw dispossession of citizens’ resources.\nFor various reasons (including strategic ones) Thomas Pogge and Leif Wenar do not directly challenge the right of nations to own resources on their territories. Policy recommendations, for instance, are much more likely to be effective if they can fit within the main structures of international conventions. However, other theorists do take up this issue including Hillel Steiner, Tim Hayward and Mathias Risse. Steiner argues that all inhabitants of the world are entitled to an equal share in the value of all land and he advocates for the “Global Fund” which aims to ensure that equal share entitlements can be secured. The Global Fund would constitute a clearing house for payments and disbursements (Steiner 2005).\nAppealing to accounts of ownership of resources, some philosophers draw out important implications for diverse global justice debates. Mathias Risse argues that we all, collectively, own the resources of the earth and this has profound implications for a range of global justice issues, including immigration. When people are under-utilizing their “rightful shares” of territory, they cannot complain when co-owners would like to occupy some of it. Some theorists concerned with environmental issues also discuss our rights with respect to natural resources. Some argue that we have equal rights to access the earth’s resources. Tim Hayward, for instance, argues that we have equal rights to ecological space (Hayward 2005). This is often appealed to when there is a perception that we have exceeded our share, such as in levels of carbon emissions and consumption more generally.\nAccounts according to which we have equal rights to resources, land, ecological space and so on, are often accused of suffering from an important common problem. It is difficult to defend a clear and compelling account of the value of resources as these can vary considerably in different social, cultural and technological contexts. But we need to be able to quantify resource values to some plausible extent, if we are to determine whether people are enjoying or exceeding their equal shares.\nThere are a number of global justice problems that require remedying, and this raises the issue of remedial responsibilities. Who should do what to reduce global injustices? Several different agents, groups, organizations and institutions could play a role. Which responsibilities should devolve to corporations, governments, consumers, citizens, international organizations or social movements? Several guidelines that are often discussed include issues concerning the contribution agents have made to a problem, their patterns of benefit from the problem, and their capacity to take constructive action now. Two influential frameworks deserve more extended treatment, notably that of Iris Marion Young concerning a social connection model for allocating responsibilities for structural injustice and that of David Miller concerning remedial responsibility (Young 2011, Miller 2007).\nIn contrast to the idea of responsibility as involving finding fault and individual liability, Iris Marion Young develops a forward-looking model which she argues is more appropriate. She draws on the idea that participation via institutions sometimes produces injustice, so we have particular responsibilities to address injustice. We share responsibility for remedying injustice but we may have different degrees and kinds of responsibility. She offers different parameters of reasoning that can help individuals and organizations decide what might make the most sense for them to do in efforts to remedy injustice, given that there are so many injustices, whereas time and resources are limited. Using the case study of the global apparel industry she illustrates how the fact that we are positioned differently can entail varying but important responsibilities for all who participate in activities that sustain sweatshops. There are at least four parameters that agents can use in their reasoning:\n- Power: we have different levels of influence and capacities to change processes. We should focus on those areas where we have greater capacities to change worrisome structural processes. This might mean focusing on a few key players who have both greater capacity to make changes themselves and to influence others.\n- Privilege: some people have more privilege than others in relation to structures. So middle-class clothing consumers have more discretionary income, choice and ability to absorb costs—they can change their clothing purchasing practices more easily than those who earn minimum wage, have little discretionary income, and little ability to absorb further costs.\n- Interest: All who have an interest in changing oppressive structures have responsibilities in connection with remedying these. This entails that “victims” too have important responsibilities since they have a great interest in eliminating oppression. In a nuanced analysis she argues that they might have responsibilities in certain contexts, such as to speak out about the harsh conditions in which they work. They must take some responsibility for resisting and challenging the structures. Without their participation the need for reforms may be rationalized away or reforms may not take the required form. These obligations may not always exist, especially when the costs of resistance would require extraordinary sacrifices.\n- Collective ability: In some cases we already have collective organization capacities and resources that are well established. Sometimes it just makes good practical sense to draw on these. So, for instance, sometimes student associations, faith-based organizations, unions, or stockholder groups already exercise significant power in being able to coordinate like-minded members who are willing to take certain actions. She encourages us to harness organizational resources where doing so would prove effective.\nIn summary, Young encourages us to think about how we can best take responsibility for reducing structural injustice by reflecting on these four parameters—different positions of power, privilege, interest and collective ability.\nDavid Miller offers a tremendously influential connection theory of responsibility that also discusses our remedial responsibilities. There are six ways in which we can be connected to someone, P, who needs help and so be held remedially responsible for assisting. These connections give rise to six ways in which remedial responsibility can be identified. We might be morally responsible for P’s condition; we might be outcome or causally responsible for P’s condition; we might have had no causal role in their condition but have benefited from it; we might have capacity to assist P; or we might be connected to P through ties of community.\nIn the global justice literature there are also important concerns about the distribution of responsibilities among collective and individual agents. Prominently, can we hold nations responsible for global injustices or remedying such injustices? This raises important questions about collective responsibility that are well treated elsewhere in this encyclopedia (see the entry on collective responsibility.\nIs it possible to have global justice in the absence of a world state? Hobbes argues that this is not possible since there is no global authority that can secure and enforce the requirements of justice. He presents the classic so-called realist case, which is highly influential in international politics, such that there is a state of nature in the international realm. All states compete in pursuing their own advantage and since there is no global authority there can be no justice in international affairs.\nOthers are more optimistic. Since we already have a high level of interaction among states, organizations and other agents, this has generated various norms and expectations about appropriate conduct which guide behavior in the international sphere (Beitz 1999). Moreover, we have a strong interest in co-operation when this is necessary to deal practically with a range of problems that have global reach. Global governance is concerned with how we manage interests affecting the residents of more than one state in the absence of a world state. There is already a high level of co-operation among a variety of networks, organizations and other groups of interested parties at the sub-state level, and this is powerfully influencing the redesign of best practice norms in particular domains (Anne-Marie Slaughter 2004).\nOther change agents that can and have exercised considerable reform pressures include global social movements, such as the anti-sweatshop movement, the fair trade movement, and other ethical consumption movements. Global activism has been an important source of incremental change. These simple examples show that much more is possible in the absence of a world state than realists acknowledge.\nFor more on issues of world government, see the entry world government, which provides extended treatment of this issue.\nPhilosophers are contributing in important ways to discussions of global justice policy issues. As illustrations, in this entry we have canvassed several institutional reform proposals for addressing global injustices which have enjoyed widespread attention, both within the academy and beyond. These include Thomas Pogge’s Health Impact Fund proposal (Section 8) along with his proposal for a Global Resources Dividend (Section 9.1), Christian Barry and Sanjay Reddy’s Just Linkage Proposal to help improve working conditions (Section 4), and Allan Buchanan and Robert Keohane’s institutional innovations to secure accountability in the use of military force (Section 3.2). There is also the innovative work of Leif Wenar concerning proposals for clean trade (Section 9.1).\nIn addition to those illustrations already highlighted in this article, philosophers are also having an impact on policy discussions in a wide range of areas including climate change, reforming the United Nations, and suggesting the new priorities that should replace the Millennium Development Goals which expire in 2015. Philosophers have also contributed to influential international multi-disciplinary projects that seek alternative ways to measure quality of life or poverty (Nussbaum and Sen 1993, Pogge 2014). One area recently drawing increased attention concerns tax and accounting matters. Philosophers have discussed rampant abusive tax practices by corporations and wealthy individuals and how this deprives developing countries of much-needed income for human development in developing countries. There has also been discussion of global income taxes, carbon taxes, financial transaction taxes and Tobin Taxes (Moellendorf 2009, Caney 2005b, Brock 2009).\nPhilosophers continue to make an important contribution to policy debates and this is also likely to be an area in which considerable useful future work on global justice will concentrate.\n- Abizadeh, A., 2010, “Citizenship, Immigration and Boundaries,” in Ethics and World Politics, Duncan Bell (ed.), Oxford: Oxford University Press, pp. 358–376.\n- Altman, A. and C.H. Wellman, 2009, A Liberal Theory of International Justice, Oxford: Oxford University Press.\n- Aquinas, T. “Summa Theologiae IIaIIae 40: On war,” in Aquinas: Political Writings, (Cambridge Texts in the History of Political Thought), R.W. Dyson (ed.), Cambridge: Cambridge University Press, 2002, pp. 239–247.\n- Banai, A. M. Ronzoni and C. Schemmel (eds.), 2011, Social Justice, Global Dynamics: Theoretical and Empirical Perspectives, Abingdon: Routledge.\n- Barry, B. and R. Goodin (eds.), 1992, Free Movement: Ethical Issues in the Transnational Migration of People and Money, University Park: Pennsylvania State University Press.\n- Barry, C., B. Herman and L. Tomitova (eds.), 2007, Dealing Fairly with Developing Country Debt, Malden, MA: Blackwell.\n- Barry, C. and T. Pogge (eds.), 2005, Global Institutions and Responsibilities: Achieving Global Justice, Malden, MA.: Blackwell.\n- Barry, C. and S. Reddy, 2008, International Trade and Labor Standards, New York: Columbia University Press.\n- Beitz, C., 1975, “Justice and International Relations,” Philosophy and Public Affairs, 4 (4): 360–389.\n- –––, 1999, Political Theory and International Relations, Princeton, NJ: Princeton University Press, 2nd edition.\n- –––, 2009, The Idea of Human Rights, Oxford: Oxford University Press.\n- Beitz, C. and R. Goodin, 2009, Global Basic Rights, Oxford: Oxford University Press.\n- Bell, D., 2010, Ethics and World Politics, Oxford: Oxford University Press.\n- Benatar, S. and G. Brock, 2011, Global Health and Global Health Ethics, Cambridge: Cambridge University Press.\n- Blake, M., 2001, “Distributive Justice, State Coercion, and Autonomy,” Philosophy and Public Affairs, 30 (3): 257–296.\n- Blake, M. and P.T. Smith, 2013, “International Distributive Justice,” The Stanford Encyclopedia of Philosophy (Winter 2013 Edition), Edward N. Zalta (ed.), URL = .\n- Bohman, J., 2007, Democracy Across Borders: From Demos to Demoi, Cambridge: MIT Press, 2007.\n- Brock, G., 2009, Global Justice: A Cosmopolitan Account, Oxford: Oxford University Press.\n- –––, 2010, “Recent Work on Rawls’s Law of Peoples: Critics versus Defenders,” American Philosophical Quarterly, 47 (1): 85–101.\n- Brock, G. (ed.), 2013, Cosmopolitanism versus Non-Cosmopolitanism: Critiques, Defenses, Reconceptualizations, Oxford: Oxford University Press.\n- Brock, G., and M. Blake, 2015, Debating Brain Drain: May Governments Restrict Emigration?, Oxford: Oxford University Press.\n- Brock, G. and H. Brighouse (eds.), 2005, The Political Philosophy of Cosmopolitanism, Cambridge: Cambridge University Press.\n- Brock, G. and D. Moellendorf (eds.), 2005, Current Debates in Global Justice, Dordrecht: Springer.\n- Brooks, T. (ed.), 2008, The Global Justice Reader, Malden, MA: Blackwell.\n- Brown, G. and D. Held (eds.), 2010, The Cosmopolitan Reader, Cambridge: Polity.\n- Buchanan, A., 1997, “Theories of Secession,” Philosophy and Public Affairs, 26 (1): 31–61.\n- Buchanan, A., 2004, Justice, Legitimacy and Self-Determination, Oxford: Oxford University Press.\n- Buchanan, A. and R. Keohane, 2004, “The Preventive Use of Force: A Cosmopolitan Institutional Proposal,” Ethics and International Affairs, 18 (1): 1–22.\n- Caney, S., 2005a, “Cosmopolitan Justice, Responsibility, and Global Climate Change,” Leiden Journal of International Law, 18 (4): 747–775.\n- –––, 2005b, Justice Beyond Borders, Oxford: Oxford University Press.\n- –––, 2008, “Global Distributive Justice and the State,” Political Studies, 57 (3): 487–518.\n- Carens, J., 1987, “Aliens and Citizens: The Case for Open Borders,” The Review of Politics, 49 (2): 251–273.\n- –––, 2013, The Ethics of Immigration, New York: Oxford University Press.\n- Chatterjee, D. (ed.), 2004, The Ethics of Assistance: Morality and the Distant Needy, Cambridge: Cambridge University Press.\n- ––– (ed)., 2011, The Encyclopedia of Global Justice, Dordrecht: Springer.\n- Chatterjee, D. and D. Scheid, 2003, Ethics and Foreign Intervention, Cambridge: Cambridge University Press.\n- Coady, T. and M. O’Keefe (eds.) 2002, Terrorism and Justice: Moral Argument in a Threatened World, Melbourne: Melbourne University Press.\n- Cohen, J., 2010, “Philosophy, Social Science, Global Poverty,” Thomas Pogge and His Critics, A. Jaggar (ed.), Cambridge: Polity Press, pp. 18–45.\n- Cohen, J. and C. Sabel, 2006, “Extra Republicam Nulla Justitia?” Philosophy and Public Affairs 34: 147–175.\n- Cole, P., 2000, Philosophies of Exclusion: Liberal Political Theory and Immigration, Edinburgh: Edinburgh University Press.\n- Daniels, N., 2011, “International Health Inequalities and Global Justice: Towards a Middle Ground” in Global Health and Global Health Ethics, S. Benatar and G. Brock (eds.), Cambridge: Cambridge University Press, pp. 97–107.\n- Dobson, A., 1998, Justice and the Environment, Oxford: Oxford University Press.\n- Doyle, M., 2008, Striking First: Pre-emption and Prevention in Interventional Conflict, Princeton, NJ: Princeton University Press.\n- Drugs for Neglected Diseases Working Group, 2001, “Fatal Imbalance: The Crisis in Research and Development for Drugs for Neglected Diseases”. Geneva: MSF.\n- Dryzek, J., 2006, Deliberative Global Politics: Discourse and Democracy in a Divided World, Cambridge: Polity Press.\n- Freeman, S., 2006, “The Law of Peoples, Social Cooperation, Human Rights and Distributive Justice,” Social Philosophy and Policy, 23 (1): 29–68.\n- Gardiner, S., 2011, A Perfect Moral Storm: The Ethical Tragedy of Climate Change, Oxford: Oxford University Press.\n- Gehring, V. (ed.), 2003, War after September 11, Lanham, MD: Rowman and Littlefield.\n- Goodin, R., 1988, “What Is So Special About Our Fellow Countrymen?” Ethics, 98 (4): 663–686.\n- Gould, C., 2004, Globalizing Democracy and Human Rights, Cambridge: Cambridge University Press.\n- Hardin, G., 1974, “Lifeboat Ethics: the Case Against Helping the Poor,” Psychology Today, 8 (4): 38–126.\n- Hassoun, N., 2012, Globalization and Global Justice: Shrinking Distance, Expanding Obligations, Cambridge: Cambridge University Press.\n- Hayward, T., 2005, Constitutional Environmental Rights, Oxford: Oxford University Press.\n- Held, D., 1995, Democracy and the Global Order: From the Modern State to Cosmopolitan Governance, Cambridge: Polity.\n- Held, V., 2008, How Terrorism is Wrong: Morality and Political Violence, New York: Oxford University Press.\n- –––, 2010, “Terrorism,” in Ethics and World Politics, D. Bell (ed.), Oxford: Oxford University Press, pp. 342–357.\n- Hobbes, T., 1651, Leviathan, in R. Tuck (ed.), Hobbes: Leviation, Cambridge: Cambridge University Press, 1996.\n- International Commission on Intervention and State Sovereignty, 2001, The Responsibility to Protect, Ottawa: International Development Research Centre.\n- Jaggar, A., 2005a, “‘Saving Anima’: Global Justice for Women and Intercultural Dialogue,” in Real World Justice, A. Follesdal and T. Pogge (eds.), Dordrecht: Springer, pp. 37–63.\n- –––, 2005b, ‘What Is Terrorism, Why Is It Wrong, and Could It Ever Be Morally Permissible?” Journal of Social Philosophy, 36 (2): 202–217.\n- –––, 2009, “Transnational Cycles of Gendered Vulnerability: A Prologue to a Theory of Global Gender Justice,” Philosophical Topics, 37 (2): 33–52.\n- Jaggar, A. (ed.), 2010, Thomas Pogge and his Critics, Cambridge: Polity Press.\n- ––– (ed.), 2014, Gender and Global Justice, Malden, MA: Polity.\n- James, A., 2012, Fairness in Practice: A Social Contract for a Global Economy, New York: Oxford University Press.\n- Kant, I., 1795, “Perpetual Peace: a philosophical sketch,” in H. Reiss (ed.), Kant: Political Writings, Cambridge: Cambridge University Press, 1991.\n- Kleingeld, P. and E. Brown, 2013, “Cosmopolitanism,” The Stanford Encyclopedia of Philosophy (Fall 2013 Edition), Edward N. Zalta (ed.), URL = .\n- Kuper, A., (ed.), 2005a, Global Responsibilities: Who Must Deliver on Human Rights? New York: Routledge.\n- Kuper, A., 2005b, “Global Poverty Relief: More than Charity,” in Global Responsibilities: Who Must Deliver on Human Rights?, A. Kuper (ed.), New York: Routledge, pp. 155–172.\n- Lang, A., 2010, “Humanitarian Intervention,” in Ethics and World Politics, D. Bell (ed.), Oxford: Oxford University Press, pp. 324–341.\n- Liu, C., 2012, “World Government,” The Stanford Encyclopedia of Philosophy (Fall 2012 Edition), Edward Zalta (ed.), URL = .\n- London, A., 2011, “Justice and Research in Developing Countries,” in Global Health and Global Health Ethics, S. Benatar and G. Brock (eds.), Cambridge: Cambridge University Press, pp. 293–303.\n- Luban, D., 1980, “Just War and Human Rights,” Philosophy and Public Affairs, 9 (2): 160–181.\n- Mandle, J., 2006, Global Justice, Cambridge: Polity Press.\n- Margalit, A. and J, Raz, 1990, “National Self-Determination,” Journal of Philosophy, 87 (9): 439–461.\n- Martin, R. and D. Reidy, 2006, Rawls’s Law of Peoples: A Realistic Utopia? Malden, MA: Blackwell.\n- McKim, R. and J. McMahan (eds.), 1997, The Morality of Nationalism, New York: Oxford University Press.\n- McMahan, J., 2005, “Just Cause for War,” Ethics and International Affairs, 19 (3): 55–75.\n- –––, 2009, Killing in War, Oxford: Oxford University Press.\n- Mellow, D., 2006, “Iraq: A Morally Justified War,” Journal of Applied Philosophy (23): 293–310.\n- Mill, J.S., 1859, “A Few Words on Non-Intervention,” [Available online].\n- Miller, D., 1995, On Nationality, Oxford: Oxford University Press.\n- –––, 2001, “Distributing Responsibilities,” Journal of Political Philosophy, 9 (4): 453–471.\n- –––, 2005, “Immigration: The Case for Limits,” in Contemporary Debates in Applied Ethics, A. Cohen and C. Wellman (eds.), Malden, MA: Blackwell Publishing, pp. 193–206.\n- –––, 2007, Nationalism and Global Responsibility, Oxford: Oxford University Press.\n- Miller, R., 2010, Globalizing Justice: The Ethics of Poverty and Power, Oxford: Oxford University Press.\n- Miscevic, N., 2010, “Nationalism,” The Stanford Encyclopedia of Philosophy (Summer 2010 Edition), Edward N. Zalta (ed.), URL = .\n- Moellendorf, D., 1996, “Constructing the Law of Peoples,” Pacific Philosophical Quarterly, 77 (2): 132–154.\n- –––, 2002, Cosmopolitan Justice, Boulder, CO: Westview.\n- –––, 2005, “The World Trade Organization and Egalitarian Justice,” Metaphilosophy, 36 (1–2): 145–162.\n- –––, 2008, “Jus Ex Bello” Journal of Political Philosophy, 16 (2): 123–136.\n- –––, 2009a, “Treaty Norms and Climate Change Mitigation,” Ethics and International Affairs, 23 (3): 247–265.\n- –––, 2009b, Global Inequality Matters, Houndsmills: Palgrave Macmillan.\n- Moore, M., 2001, The Ethics of Nationalism, Oxford: Oxford University Press.\n- Moseley, A., 2014, “Just War Theory,” The Internet Encyclopedia of Philosophy, J. Fieser and B. Dowden (eds.), available online.\n- Nagel, T., 2005, “The Problem of Global Justice,” Philosophy and Public Affairs, 33 (2): 113–147.\n- Nickel, J., 2007, Making Sense of Human Rights, Oxford: Blackwell.\n- –––, 2014, \"Human Rights,\" The Stanford Encyclopedia of Philosophy (Spring 2014 Edition), Edward N. Zalta (ed.), URL = .\n- Nowicka, M. and M. Rovisco (eds.), 2011, The Ashgate Research Companion to Cosmopolitanism, Aldershot: Ashgate.\n- Nussbaum, M., 1995, “Human Capabilities, Female Human Beings,” in Women, Culture and Development: A Study of Human Capabilities, M. Nussbaum and J. Glover (eds.), Oxford: Oxford University Press, pp. 61–104.\n- –––, 1996, “Patriotism and Cosmopolitanism,” in For Love of Country: Debating the Limits of Patriotism, J. Cohen (ed.), Boston, MA: Beacon Press, pp. 3–17.\n- –––, 2000, Women and Human Development: The Capabilities Approach, Cambridge: Cambridge University Press.\n- –––, 2006, Frontiers of Justice , Cambridge, MA: Harvard University Press.\n- Nussbaum, M. and A. Sen (eds.), 1993, Quality of Life, Oxford: Clarendon Press.\n- O’Neill, O., 1987, “Rights, Obligations and World Hunger,” in Poverty and Social Justice: Critical Perspectives: A Pilgrimage Toward Our Own Humanity, F. Jimenes (ed.), Tempe, AZ: Bilingual Press, pp. 86–100.\n- Okin, S., 1994, “Gender Inequality and Cultural Differences,” Political Theory, 22 (1): 5–24.\n- Orend, B., 2008, \"War,\" The Stanford Encyclopedia of Philosophy (Fall 2008 Edition), Edward N. Zalta (ed.), URL = .\n- Pogge, T., 1992, “Cosmopolitanism and Sovereignty” Ethics 103 (1): 48–75.\n- –––, 1994, “An Egalitarian Law of Peoples”, Philosophy and Public Affairs 23 (3), 195–224.\n- –––, 2001, “Priorities of Global Justice” Metaphilosophy 32 (1/2):6–24.\n- –––, 2002, World Poverty and Human Rights, Cambridge: Polity Press.\n- –––, 2004, “‘Assisting’ the Global Poor,” in The Ethics of Assistance: Morality and the Distant Needy, D. Chatterjee (ed.), Cambridge: Cambridge University Press.\n- –––, 2008 World Poverty and Human Rights, Cambridge: Polity Press (second edition).\n- –––, 2010, “Responses to the Critics” in Thomas Pogge and His Critics, A. Jaggar (ed.), Cambridge: Polity Press, pp. 175–250.\n- –––, 2013, “Concluding Reflections” in Cosmopolitanism versus Non-Cosmopolitanism, G. Brock (ed.), Oxford: Oxford University Press, 294–320.\n- –––, 2014, “Gender Sensitive Multi-Dimensional Poverty Measurement: A Participatory Proposal” in Oxford Handbook of Well-being and Public Policy, M. Fleurbaey and M. Adler (eds.), Oxford: Oxford University Press.\n- Pogge, T. and K. Horton (eds.) 2008, Global Ethics: Seminal Essays, St. Paul, MN: Paragon House.\n- Pogge, T. and D. Moellendorf (eds.) 2008, Global Justice: Seminal Essays, St. Paul, MN: Paragon House.\n- Primoratz, I., 2013, Terrorism: A Philosophical Investigation, Cambridge: Polity Press.\n- Rawls, J., 1999, The Law of Peoples, Cambridge: Harvard University Press.\n- Reidy, D., 2004, “Rawls on International Justice: A Defense” Political Theory 32: 291–319.\n- Risse, M., 2005, “How Does the Global Order Harm the Poor?” Philosophy and Public Affairs 33: 349–376.\n- –––, 2012, On Global Justice. Princeton: Princeton University Press.\n- Rodin, D., 2008, “Two Emerging Issues in Jus Post Bellum: War Termination and the Liability of Soldiers for Crimes of Aggression,” in C. Stahn and J. Kleffner (eds.) Jus Post Bellum: Towards a Law of Transition from Conflict to Peace, The Hague: T.M.C Asser Press, pp. 53–76.\n- Ronzoni, M., 2013, “For (Some) Political and Institutional Cosmopolitanism, (Even if) Against Moral Cosmopolitanism,” in Cosmopolitanism versus Non-Cosmopolitanism, G. Brock (ed.), Oxford: Oxford University Press, pp. 156–174.\n- Sen, A., 1980 “Equality of What?” in The Tanner Lectures on Human Values, Vol. I, S. McMurrin (ed.), Cambridge: Cambridge University Press.\n- –––, 1988, “The Concept of Development,” in Handbook of Development Economics, C. Hollis and T. Strinivasan (eds.), Amsterdam: Elsevier, pp. 9–26.\n- Shue, H., 1980, Basic Rights: Subsistence, Affluence, and US Foreign Policy, Princeton: Princeton University Press.\n- Singer, P., 1972, “Famine, Affluence and Morality” Philosophy and Public Affairs, 1: 229–43.\n- –––, 2002, One World: The Ethics of Globalization, Melbourne: Text Publishing.\n- Slaughter, A., 2004, A New World Order, Princeton: Princeton University Press.\n- Sorell, T. and L. Cabrera (eds.), 2015. Microfinance, Rights and Global Justice, Cambridge: Cambridge University Press.\n- Steiner, H., 2005, “Territorial Justice and Global Redistribution,” in The Political Philosophy of Cosmopolitanism, G. Brock and H. Brighouse (eds.), Cambridge: Cambridge University Press, pp. 28–38.\n- Tan, K., 2004, Justice Without Borders: Cosmopolitanism, Nationalism and Patriotism, Cambridge: Cambridge University Press.\n- –––, 2012, Justice, Institutions, and Luck, Oxford: Oxford University Press.\n- Teichman, J., 1986, Pacificism and the Just War: A Philosophical Examination, Oxford: Blackwell.\n- Unger, P., 1996, Living High and Letting Die: Our Illusion of Innocence, New York: Oxford University Press.\n- United Nations General Assembly, 1948, “Universal Declaration of Human Rights,” [available online].\n- Walzer, M., 1981, “The Distribution of Membership,” in Boundaries: National Autonomy and Its Limits, P.G. Brown and H. Shue (eds.), Totowa, NJ: Rowman and Littlefield.\n- –––, 2000, Just and Unjust War: A Moral Argument with Historical Illustrations, New York: Basic Books, 3rd edition.\n- Wellman, C.H., 2014, “Immigration,” The Stanford Encyclopedia of Philosophy (Spring 2014 Edition), Edward N. Zalta (ed.), URL = .\n- Wellman, C. H. and P. Cole, 2011, Debating the Ethics of Immigration: Is There a Right to Exclude?, New York: Oxford University Press.\n- Wenar, L., 2010, “Realistic Reform of International Trade in Resources” in Thomas Pogge and His Critics, A. Jaggar (ed.), Cambridge: Polity Press, pp. 123–150.\n- Young, I., 2011, Responsibility for Justice, Oxford: Oxford University Press.\n- Ypi, L., 2013, “Cosmopolitanism Without If and Without But,” in Cosmopolitanism versus Non-Cosmopolitanism, G. Brock (ed.), Oxford: Oxford University Press, pp. 75–91.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.", "label": "No"} {"text": "Please note: This list of records relating to African-American records is not definitive. Records description has been ongoing since 1918, and headings have changed over time with changing social and professional standards. Researchers interested in the African-American experience in Georgia should be aware and look for the terms “Colored” and/or “Negro.”\nHowever, the first consideration in accessing records is provenance, that is, the agency or person creating the document. Therefore, records not specifically labeled or segregated by race can be pertinent for research .\nU.S. Bureau of the Census: Population Schedules, 1870-1940. The U.S. Census is usually the starting point for any genealogical research, as (theoretically) all residents of the United States were counted or enumerated. Available on Ancestry.com.\nSlave Schedules, 1850 and 1860: On these separate Slave Schedules for 1850 and 1860, the name of each slave owner is listed with the number of slaves owned, and number of slaves manumitted (if any). Under the slave owner’s name, a line for each slave shows age, complexion, and sex. Names of slaves were not entered. Available for all Georgia counties.\nReconstruction Registration Oath Books, 1867 (RG 1-1-107): Lists name, race, date of registration, and county of residence. Also available on Ancestry.com.\nReconstruction Returns of Voters, 1867 (RG 1-1-108): Lists voter’s number; date of registry; name; number and page in Oath Book; race; time of residence in state, county and precinct within a year; nativity by state or county; naturalization (if any); and remarks (if any). Also available Available on Ancestry.com.\nGeorgia Archives File II Counties, Subjects, and Names (RG 4-2-46). Alphabetically arranged within each section. Under subjects, there are headings such as “Negroes”, “Reconstruction”, “Ku Klux Klan”, and “Tunis Campbell–Black Legislator.” These records contain both secondary and primary material.\nState Records Executive Department (RG 1) Governor’s Letter Books, 1786-1897 (RG 1-1-1): Among other subjects, these books indicate problems with the illegal importation of slaves and runaway slaves. Check the microfilm card catalog under Executive Dept.\nGovernor’s Subject Files, 1781-1993 (RG 1-1-5): Chronological. Later material has a variety of subject headings. [Example: In Lester Maddox’s files, there are such subject headings as “Augusta Riot, 1967-70”, “Black Panthers” and “School Desegregation”.]\nDepartment of Education (RG 12) Negro Education Division, 1911-ca. 1966, RG 12-6, : Information on schools constructed with Jeanes, Slater and Rosenwald Funds, One Teacher Experimental Schools, workshops and teacher training programs.\nDepartment of Education, Local Superintendent’s Annual Reports, 1938-1977, RG 12-22-64, : Arranged by county, describe each school building, number of teachers, number of employees, number of students in each grade, average daily attendance, budget, and other statistics. An excellent snapshot of schools within the county in any given year.\nAdjutant General’s Office (RG 22) Georgia Army National Guard Miscellaneous Records (RG 22-1-10) [Note: These records are scattered throughout this section and do not appear in one single folder.] National Guard Riot Duty, 1900-1945 [Examples: Augusta Riot, 1912; Carrollton Riot, 1901; Racial Disturbance Plans, 1944-1945; Riot Duty, 1943; Statesboro Riot, 1904] Colored Militia Companies, ca. 1870s-1900s\nGeneral Assembly (RG 37) Summary Committee Reports (RG 37-8-35) [Example: Report of the American Negro Study Committee, 1970]\nWorks Progress Administration Records (RG 44). Most notable in this collection are the WPA surveys of cemeteries, church records, county records, various publications, manuscript collections and the surveys of other states.\nPlease note: Many of these records are found in either the Ordinary (Probate) Court or in the Superior Court, depending on the county. Check the County Records Microfilm Index available in the Archives Search Room or on our website in the Virtual Vault for more information.\nMarraige Records: Certificates list the names of the bride and groom, county of marriage, date of marriage, and the name of the official who married the couple.\nEstate Records: Includes wills, letters of administration, inventories, annual returns, sales, and guardian bonds. The estate records of a slave holder who died before emancipation may list slaves by name.\nApprenticeship/Indenture Registers, 1800-1930: These records primarily document freedmen, but also document whites, and may be integrated in Probate Court minutes or other records. 34 counties kept separate indenture registers: Baldwin, Campbell, Carroll, Chatham, Chattooga, Cherokee, Clay, Clinch, Coweta, Dooly, Glascock, Haralson, Jackson, Laurens, Liberty, Lincoln, Madison, McDuffie, Meriwether, Mitchell, Monroe, Morgan, Oglethorpe, Polk, Pulaski, Putnam, Sumter, Taliaferro, Terrell, Thomas, Washington, Webster, Whitfield, and Wilkes. Check the County Records Microfilm Catalog under the name of the county\nFree Persons of Color Registers, 1780-1865: Registers usually include name, age, occupation (sometimes), property, and white sponsor. Available for 21 counties: Appling, Baldwin, Camden, Chatham, Clarke, Columbia, Elbert, Emanuel, Hancock, Jefferson, Jones, Liberty, Lincoln, Lumpkin, Morgan, Pulaski, Richmond, Screven, Taliaferro, Thomas, Warren, and Wilkes. Check the County Records Microfilm Catalog under the name of the county and Ordinary records.\nRecords of Slave Trials, 1800-1850: Available for 6 counties: Baldwin, Hancock, Jones, Lincoln, Putnam, Screven (plus Trials of Free Persons of Color), Taliaferro (only Trials of Free Persons of Color). Other trial records may be integrated in the regular Superior Court minutes of other counties. Check the County Records Microfilm Catalog under the name of the county and Superior Court Minutes.\nSlave Importation Registers, 1800-1845, and Lists of Slaves: Affidavits of persons bringing slaves into the state, and lists or registers of slaves and slave owners. Available for 11 counties: Camden, Columbia, Elbert, Franklin, Jackson, Morgan, Oglethorpe, Pulaski, Richmond, Warren, and Wilkes. Check the County Records Microfilm Catalog under Ordinary Court records.\nCounty Property Tax Digests, 1789-2001 (RG 34-6-1) and microfilm. All males between the ages of 21 and 60 had to pay a poll tax or head tax. Beginning in 1866, African-Americans are listed separately until the early 1960s. Immediately after the Civil War employers are often listed. Type of taxes paid also indicate occupation and wealth. Pre Civil-War digests indicate number of slaves owned. Digests after about 1930 may not include African-Americans who do not own real property. Digests in Archives custody up to 1890 are scanned and indexed on Ancestry.com. Check microfilm card catalog Tax Digest drawer for microfilm of tax digests not in Archives custody. Most counties have indices to grantor and grantee, also called direct and reverse.\nCounty Court Records, 1866-: These courts were established in 1866 to handle civil cases in which the amount in question was under $100 as well as misdemeanor/regulatory crimes, previously handled by the County Superior and Inferior Courts. In many counties, the County Courts were primarily used to try freedmen. Records from these courts are available for 54 counties.\nU.S. Adjutant General’s Office: The Negro in the Military Service of the United States, 1639-1886. M858. 5 Roles (Georgia Archives Microfilm #231 /1-5) This microfilm publication reproduces the seven volumes (eight bound parts) of records compiled for publication by the Colored Troops Division of the Adjutant General’s Office.\nU.S. Bureau of Refugees, Freedmen, and Abandoned Lands: Georgia Archives only has limited microfilm publications which pertain to Georgia records.\nFederal Records U.S. Adjutant General’s Office: The Negro in the Military Service of the United States, 1639-1886. M858. 5 Rolls. (Georgia Archives Microfilm #231/1-5) This microfilm publication reproduces the seven volumes (eight bound parts) of records compiled for publication by the Colored Troops Division of the Adjutant General’s Office.\nThe Freedman’s Savings and Trust Company. Georgia Archives only has those microfilm publications which pertain to Georgia records.\nU.S. Department of the Interior (RG 48): African Slave Trade and Negro Colonization, Records of, 1854-1872. M160. 10 Rolls. (Georgia Archives Microfilm #231/6-15) This microfilm publication reproduces three bound volumes and some unbound records of the Office of the Secretary of the Interior relating to the suppression of the slave trade and the colonization of recaptured and free blacks.\nU.S. Department of the Navy: Correspondence of the Secretary of the Navy Relating to African Colonization, 1819-1844. M205. 2 Rolls. (Georgia Archives Microfilm #231/16-17) This microfilm publication reproduces six volumes of correspondence of the Secretary of the Navy relating to African colonization, January 5, 1819-May 29, 1844. Copies of a few documents of later date (August 18, 1856-September 8, 1858) are included.\nThese records include private, business, and school records. The collections are indexed by main entry, by geographic location, by subject, by chronological dates, and by the types of forms used (such as diaries, ledgers, etc.). Some collections are available in original format, while others are available solely on microfilm. Manuscript collections are searchable in the book (GIL) catalog.\nNewspapers: There are a variety of newspapers available, arranged by city of publication, county of publication, and title of the newspaper. Some examples of newspapers available are Voice of the People, 1901-1904, a newspaper published in Atlanta by Bishop Henry McNeal Turner as the monthly organ of the Colored National Emigration Association (Georgia Archives Microfilm #60/22); and The Athens Blade, 1879-1880, which published religious and social news about blacks in Athens and some surrounding counties. (Georgia Archives Microfilm #91/72)\nCemeteries and Churches: The Archives has a variety of church records available in original format and on microfilm. These collections are available by denomination, by geographic location, and under the subject heading “Afro-Americans–Churches & Synagogues”. The researcher should keep in mind that many churches in Georgia had both white and black members, and in some cases, slaves and/or freedmen were not allowed to have a separate church body. Church minutes usually list members, and often indicate race and legal status (free or slave).\nCity Directories: Available mainly for Atlanta (1853-1990), but a few are available for other cities in Georgia. In these directories, there are alphabetical and geographic listings of residents, with the race of the individual noted. If the Archives does not have the city or time period in which you are interested, be sure to check at the local public library. Ancestry.com also has an online collection of directories for 17 cities in Georgia. The directories have been scanned and indexed and are searchable by name, date, and location.\nThe Archives has books and periodicals on a wide range of subjects in Georgia History. Search our book catalog (GIL).", "label": "No"} {"text": "Farm Safety Checklist & Tips\n| Print |\nFarm Safety Checklist and Tips\nFarming is one of the most dangerous jobs in America. Among the many dangers of farming, is the threat of electric shock. With everything a farmer has on their mind, it can be difficult to remember electric safety. Safe Electricity has a quick checklist of safety considerations for farmers\nto be aware of before they enter the field.\n- Keep machinery, equipment and yourself 10 feet away from overhead power lines in all directions, at all times.\n- Make a plan each morning. Know where power lines are, and how you plan to stay clear of them.\n- Use a spotter to help you stay clear of power lines when you are operating large machinery.\n- Power lines begin to sag over the years. If sagging power lines are in your way, do not raise them. Call your utility to fix the power lines and raise them high enough for you to work.\n- Weather should be a consideration in your daily plans. Keep in mind that tall objects could be blown out of control by the wind, and the particles in water are good conductors of electricity. Some activities are not appropriate for a damp or windy day.\n- If you are on equipment that becomes entangled in power lines, do not step off the equipment. When you step off the equipment, you become the path to ground and receive an electric shock that could be fatal. Wait for utility professionals to shut of electricity to the power line, and confirm it is safe to exit equipment.\n- Be sure everyone you are working with knows proper safety procedures, and emergency contacts.", "label": "No"} {"text": "Children with autism may attend to only certain characteristics or stimuli in their environments. For example, when shown a photograph of a cup, the child may focus only the color of the cup and not the shape of the object. Therefore, cups of other colors may not be recognized by the child as “cups.” This is known as “stimulus overselectivity.” When teaching we want to use a variety of examples (along with other strategies) in order to teach children to respond to multiple cues in the environment.\nFor more information on teaching with multiple cues, please consult:\nPivotal Response Treatment for Autism: Communication, Social, & Academic Development\nSmethport Photo Language Cards Actions", "label": "No"} {"text": "Meaning of Ma\nMa Name Origin\nYour Opinion About Ma Name\nalso appears in following countries/origins/languages: Australian\nFamous Name Ma\nwas a commentaror of the Han Dynasty. He was born in modern Xianyang, Shaanxi in former Fufeng (??) county. He was known for his commentaries on the books on the Five Classics, and the first scholar known to have done this. He also developed the double column commentary while doing it. His main students were Lu Zhi and Zheng Xuan.\nwas a Spanish field hockey player who competed in the 1948 Summer Olympics. He was a member of the Spanish field hockey team, which was eliminated in the group stage. He played all three matches as forward in the 1948 tournament.", "label": "No"} {"text": "Geographical Index > United States > South Carolina > Orangeburg County > Report # 993|\nSubmitted by witness on Sunday, July 20, 1997.\nA teenager witnesses a black, fur covered creature attempt to pull a dog pen out of the ground.\n(Show Printer-friendly Version)\nSTATE: South Carolina\nCOUNTY: Orangeburg County\nNEAREST TOWN: Neeses\nOBSERVED: At 12:00 noon the witness, Jackie Hutto, heard noise and agitation from the dogs that he keeps in a dog pen at the back of his families property. At first, Jackie went to the door of his home and yelled at the dogs to quiet them down. After about 5 more minutes of the barking, Jackie went to investigate to see what was wrong.\nWhen he arrived at the dog pen, he saw a large black animal pulling on the wire of the pen, Jackie walked around the corner of a tool shed there at the pen to get a better look at the animal. When he looked around the corner of the pen he saw a 8-8.5 foot tall bigfoot (He measured its height by the fence, which is appox. 9 feet tall) pulling at the wire on the pen, then the bigfoot turned to look at Jackie, when it turned it turned its whole body toward Jackie, not just its head.\nJackie screamed and ran toward the house, looking over his shoulder as he ran. He saw the bigfoot turn and run toward the forest, he mentioned he heard it grunting as it ran, and he also heard its footsteps as it ran, like a loud thumping sound. When Jackie screamed, his brother, David (16) ran outside to see what was wrong, when he did he saw Jackie running toward him, and the bigfoot running toward the forest.\nThe witness was close to the animal, thus he got a good description. Jackie described the creature as 8-8.5 feet tall, covered over most of its body in black hair. Its face and chest were bald, and the skin was thick looking and brown in color. He said the teeth were clenched and were big, \"blocked shaped\" and stained, and its eyes were big and round. The boy said that creature was clearly a male, judging by its genitalia.\nHe also noticed a worn spot on each knee of the creature that was about the size of a 50 cent piece. Jackie also mentioned that the bigfoot smelled like a goat. No footprints were found, the witnesses didn't return to the spot where the incident occured until the next day, due to the scare they recieved earlier. A thunderstorm came through the night of the incident, so the next morning, no evidence was found.\nALSO NOTICED: The witness said that when he was walking through the forest on occasion before this event, he would smell a strong goat like odor. Also, they occasionally hear loud, high pitched screams from the forest behind their house.\nOTHER WITNESSES: The witness was inside his home until he heard the noise from the dog pens.\nENVIRONMENT: This area of the state is criss-crossed with numerous small creeks and rivers, lots of swampy bottom land that border on large agricultural tracts, and it is sparsely populated. It is a haven for all sorts of wild game.\nFollow-up investigation report:\nNOTES: This sighting has spurred a local media frenzy, as well as some national attention. I have contacted the reporter covering the story, Andrew Haworth, and the witnesses, Jackie and David Hutto.\nAndrew is covering the report sincerely, and responsibly. Jackie and David seem very sincere, and egar to answer questions, offering details that they are not prompted for. When they first reported the story, they told the reporter that Jackie was a 23 year old woman, apparently in an attempt to remain anonymous, but on further consideration, they decided to be truthful about all facets of their encounter.\nThey want others to feel that they can contact the authorities if they have seen something, and want people to know that they feel bigfoot isn't dangerous.\nRelated Media Articles:", "label": "No"} {"text": "New Orleans-born Krazy Kat cartoonist George Herriman\nNew Orleans-born Krazy Kat cartoonist George Herriman (Photo by Will Connell, courtesy Michael Tisserand)\n\"Krazy: A Life in Black and White,\" the biography of Crescent City-born newspaper cartoonist extraordinaire George Herriman (1880-1944) is an absorbing study of a genius with a secret.\nHerriman's equally compelling and confounding \"Krazy Kat\" cartoon is considered a milestone in modern art. As New Orleans author Michael Tisserand deftly points out in his 549-page volume, the illogic of Herriman's ink-on-paper drawings mirror the absurdity of the racial divide in early 20th-century America.\nAfter 10 years of scouring microfilm archives, yellowed newspapers and public records, Tisserand has pieced together Herriman's journey from his humble birth in the Treme neighborhood to heights of fame in Jazz-era New York and Los Angeles. It wasn't easy.\n\"I had to teach myself to be an historian,\" Tisserand said. \"I didn't anticipate the amount of difficulty it would be finding Herriman's work.\"\nLike a snake handler, Tisserand uncoils the confusing racial politics of New Orleans in the Jim Crow era, where the descendants of slaves and the descendants of so-called free people of color suffered segregation, discrimination and violence at the hands of the white population.\nAs Tisserand explains, when Herriman was 10 years old, his parents fled the South for a new beginning in California, where personal reinvention was possible. As Tisserand wrote, \"Herriman was a black man born in New Orleans.\" But upon reaching the Pacific, Herriman's parents \"had obscured their identity and 'passed' for white.\"\nHad they not done so, Tisserand points out, the creator of the immeasurably influential Krazy Kat cartoon could never have received the classical education that he did, found work in major American newspapers, or bought a home in the Hollywood Hills, owing to universal racism.\nPassages of \"Krazy\" are perplexing to say the least. Tisserand reveals that the newspapers Herriman worked for routinely published stories about white people who were ruined when their black ancestry was discovered. Yet Herriman's pals teased him about his close-cut curly hair and his ever-present fedora, apparently without suspecting that their probing could threaten his career.\nIn keeping with the entertainment customs of the time, Herriman occasionally drew demeaning stereotypes of African American people, despite his apparent knowledge of his heritage.\nTisserand handles these painful conundrums as gracefully as it is possible to do so. He offers readers a path to draw their own conclusions, though his sympathies are clearly with his complicated, self-doubting, self-effacing subject.\nAbout midway through the book Tisserand delightedly introduces Herriman's masterpiece, a blithely bewildered black cat that is routinely abused by a brick-throwing white mouse. More than a century after his first appearance, Krazy Kat remains an enigma.\nAs Tisserand points out, Krazy is completely androgynous, switching sexes as Herriman sees fit. Krazy is masochistic, welcoming the mouse's battery as an indication of love. Krazy lives in an Arizona landscape as bleak and alien as anything Salvador Dali might have summoned from his subconscious, and speaks in a strange stilted dialect that bridges Shakespeare with the turn-of-the-20th-century 7th Ward.\nTisserand believes that Krazy's idiosyncratic language symbolizes the American racial and cultural melting pot.\n\"It's in Krazy's language that Harriman achieved what I think he was going for more than anything else,\" Tisserand said, \"which is a sort of depiction of the entire rude, wonderful American character. It all mixes together in the language; one sentence can have German, French, Creole, Yiddish, you know, highbrow English, lowbrow English, and newspaperman slang, all jumbled together.\"\nKrazy also epitomizes optimism, come what may. So much so, that his sunny worldview sometimes seems subversive.\nTisserand asserts that, to an extent, it may have been just that.\nStripped of humans, Herriman's Krazy Kat cartoons, which appeared from coast to coast, allowed him to subtly comment on the superficiality of race, as the animal characters occasionally swap colors.\nSometimes the changes are logical, as when Krazy visits a beauty parlor to become an alluring bleach blonde a la Jean Harlow. But occasionally, Tisserand points out, the character's changes in complexion are as random as the racial rules of the country. \"Sometimes Krazy just turns white and Ignatz (the mouse) turns black,\" he said.\nHerriman was much beloved by his fellow cartoonists, intellectuals, and modern artists, but, Tisserand points out, his cartoon was always near the bottom of reader popularity polls. Its survival for three decades in the cutthroat early 20th-century newspaper business is as much a mystery as the goings-on in the strip itself. But, like a true artist, Herriman never backed away from his peculiar vision.\n\"His work is unflinchingly uncompromising,\" Tisserand said. \"He never seemed capable of doing anything less than bringing everything he had to the work, whether it's a literary allusion that most readers wouldn't catch or whether it's a visual allusion to a Navaho rug. He would do what he wanted, even if he knew, 'Boy, readers are not going to connect with this.'\"\nBravo to Tisserand for helping us connect. It's an amazing accomplishment to uncover so much information about a cartoon that the public has largely forgotten, in a style that's hard to describe, by a man that needed to keep his background in shadow.\nSpeaking of Herriman's paradoxical legacy, Tisserand said: \"I think he succeeded in creating a comic strip that reflected the way he viewed the world. It's delightful and sad and filled with unconquerable love and lots of bricks to the head.\"\nThe HarperCollins hardback with a 16-page photo setion will be available Dec. 6 for $35. Below, find an excerpt from \"Krazy\" that illuminates Herriman's influence on contemporary comics:\nNo book collections of \"Krazy Kat\" were published in Herriman's lifetime. By the time of his death, most comics pages had been discarded, or were disintegrating in garages and basements across the nation. Herriman's originals piled up at King Features, where young cartoonist Mort Walker once noticed that they were being used to sop up water leaks.\nYet when one influential fan heard the news of Herriman's death, he determined that \"Krazy Kat\" would not be forgotten. Poet E. E. Cummings contacted his publisher, Henry Holt and Company, to propose that he collect and edit a volume of \"Krazy Kat\" comics, as well as write the introduction. Gilbert Seldes was delighted to hear the news. \"I am extraordinarily glad that you are going to do this,\" Seldes wrote to Cummings in the fall. \"May I place at your disposal my ancient and incomplete collection of these masterpieces, and give you also whatever clerical or other assistance I can.\"\nThe The next year, Henry Holt published Cummings' Krazy Kat, announcing that the comic strip \"had been away from the papers for some time now,\" and that it was \"something for Americans to be proud of.\"\nCummings' book featured 168 strips, each selected by the poet. In his introduction, he described a \"meteoric burlesk melodrama, born of the immemorial adage love will find a way.\" Cummings wrote of Krazy as a \"humbly poetic, gently clownlike, supremely innocent, and illimitably affectionate creature,\" understood by Officer Pupp and Ignatz no more than the \"mythical denizens of a twodimensional realm understand some threedimensional intruder.\" Cummings added new interpretations to Herriman's work, likening Krazy to the democracy's \"spiritual values of wisdom, love, and joy\" and Pupp and Ignatz to \"those red-brown-and-blackshirted Puritans.\" With that, he joined would become a large chorus of writers, artists and academics seeking to limn the mysterious devotions of Krazy, Ignatz and Pupp.\nCummings' anthology, while not a commercial success, became a coveted treasure for fans, and its influence ran deep. Most significantly, Cummings' book fell into the hands of a young Midwestern cartoonist, just returned from military service. \"After World War II, I began to study the Krazy Kat strip for the first time, for during my younger years I never had the opportunity to see a newspaper that carried it,\" recalled Charles Schulz. \"A book collection of Krazy Kat was published sometime in the late 1940s, which did much to inspire me to create a feature that went beyond the mere actions of ordinary children.\"\nIn \"Peanuts,\" Schulz drew deeply from Herriman's themes of love and loss, and sin and guilt. He created a world as devoid of adults as Coconino County was devoid of humans. Whether by intent or coincidence, there even were direct borrowings. Cummings' collection included a series, originally drawn in 1934, showing Krazy, Ignatz and Pupp seated on a log, patiently waiting for the last \"ottim liff\" to fall. Schulz revisited this storyline frequently, drawing a leaf hanging onto a branch for dear life, or circling in mid-air for one last fling before the rake. In later comics, Schulz even wrote a series of gags in which a school building tosses a brick.\nOf all of Schulz's storylines, Lucy's relentless, obsessive football prank most suggested Ignatz and his brick. In fact, a \"Krazy Kat\" series, first published in 1932, shows Ignatz tying a string on a football, and then pulling it away when Pupp runs to kick it. Pupp, like Charlie Brown after him, lands squarely on his back.\nIn a conversation with \"Mutts\" cartoonist Patrick McDonnell, Schulz acknowledged that even Herriman's Navajo-inspired zig-zag designs seemed to find their way onto Charlie Brown's iconic shirt. Schulz would honor his inspiration when he penned a drawing of Charlie Brown wandering onto the Coconino desert and getting beaned by Ignatz. Said Schultz: \"I always thought if I could just do something as good as Krazy Kat, I would be happy. Krazy Kat was always my goal.\" - from \"Krazy: George Herriman, A Life in Black and White,\" by Michael Tisserand.", "label": "No"} {"text": "Environmentalist Ma Jun of the Institute of Public & Environmental Affairs, giving a speech recently in the Mary Robinson Speaker Series, discusses the data-driven advocacy he pioneered to hold China’s government and businesses accountable for air and water pollution. In this presentation Jun outlines water pollution, increased coal burning, and the inevitable health impacts that will play out into the future.\nJun has promoted a data-driven approach that uses mapping to visualize these issues. The IPE has pulled together a countrywide water quality map to put the pollution in perspective. Without adequate enforcement and litigation in order to achieve environmental goals, the IPE stepped in with a public online databases of air and water violations by factories throughout China, creating a groundbreaking “blacklist” of polluters. To get off the list, 22 multinational corporations took corrective actions and accepted IPE-supervised environmental audits of their Chinese factories.\nA coalition of 39 NGOs in China have come together to encourage manufacturers to green their supply chains. This social pressure is an added motivation, by making this data transparent, and auditing companies that want to be removed from the list.\nView the complete presentation via this YouTube video.", "label": "No"} {"text": "Maybe they won’t be quite as fast to disappear from the scene as the climate warms–according to a recent study.\nAs a life-long resident of the southern Appalachians, you might say that my totem creature is the salamander. No place on earth boasts the diversity and the numbers to be found in a typical, intact mountain forest. The statistics are quite eye-opening:\n“No one really knows how many salamanders reside in the southern Appalachians. However, it is estimated that the salamanders inhabiting just a square mile of forest would have a combined biomass of 2,500 to 5,000 pounds–which is made even more impressive when you consider that many salamanders weigh about as much as a teaspoon of sugar.”\nI took herpetology my first semester in graduate school. Ann wasn’t too keen on the snakes that stayed in the clothes hamper overnight until I could claim credit-points for them. But the frogs and salamanders in south Alabama (Auburn U) were present in amazing diversity, and it is from those warm wet nights in the forest that most of my herpetophilia was born.\nWhen is the last time you saw a salamander? Summer is not a great time to look during the day, but on a wet night with a flashlight, you might be rewarded by a good bit of activity if you look in the right place.\nWe have a hard time caring about things we never see. Maybe if we looked harder and kept our eyes open, we’d care more about a lot of living things we manage to be unaware of.", "label": "No"} {"text": "The most familiar of the dolphins and the most likely to be seen from British shores, the bottlenose dolphin is found all round the world. Closer to home, the best places to see these dolphins are the Moray Firth in Scotland, Cardigan Bay in Wales and the coasts of Cornwall, Devon and Dorset. Bottlenose dolphins are large, fairly plain grey dolphins, darker grey above and paler below. They have a short beak short and a large triangular dorsal fin that curves backwards.\nBottlenose dolphins are social animals, usually found in small groups of up to 15. They are very acrobatic, often jumping out of the water or even doing somersaults. The bottlenose dolphin feeds on fish such as salmon, flatfish, herring, mackerel and cod.\n- Length: up to 4m\n- Weight: 500kg\n- Average Lifespan: 45-50 years\nProtected in the UK under the Wildlife and Countryside Act, 1981, listed under CITES Appendix II and classified as a Priority Species in the UK Biodiversity Action Plan. Also protected under the Conservation (Natural Habitats, etc.) Regulations (Northern Ireland) 1995\nFound all around the UK. The only population of bottlenose dolphins that is resident in the UK all year round lives in the Moray Firth.\nWhen to see\nJanuary – December\n- Bottlenose dolphins are thought to be one of the most intelligent animals. They are easily taught to perform tricks and are often seen in aquaria.\n- These dolphins are also known to help those needing aid – often rescuing people from drowning or shark attack.\n- Bottlenose dolphins often catch their prey by striking the fish with their tails to stun them", "label": "No"} {"text": "Speusippus of Athens was the son of Plato’s sister Potone; he became head of the Academy on Plato’s death in 348/347 and remained its head for eight years (Diogenes Laertius iv 1), apparently until his death. His date of birth is harder to get a fix on; it has reasonably been estimated at ca. 410. He apparently wrote a lot: “a great many treatises and many dialogues” (ibid. iv 4; Diogenes lists about 30 titles, and his bibliography is on his own admission incomplete). We have very little of what he wrote, if any (we have something from a work later attributed to him, On Pythagorean Numbers, discussed below, but this is not one of Diogenes’ titles; and we may have something preserved in Iamblichus, De communi mathematica scientia iv, also discussed below).\nDiogenes tells us (iv 1) that Speusippus “abided by the views of Plato”; from what little we can tell, this is simply false. In particular, Speusippus rejected the Theory of Forms.\nReferences will be to the primary sources; the two most recent collections of the fragments (Isnardi Parente 1980, Tarán 1981) have indices that will enable the reader to locate the texts (Lang 1911 does not). Citations from Plato and Aristotle are to any standard edition; those from other ancient authors are taken from texts listed in the bibliography (translations are in all cases my own, but where an alternative English translation is available, I have given a reference to it).\nWhat we can infer, mostly from Aristotle but with a few supplements from other authors, will be covered under three headings:\n- 1. Metaphysics\n- 2. Epistemology\n- 3. Ethics\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nAristotle gives us an account of Plato’s metaphysical views that goes considerably beyond what we find in Plato’s dialogues. In fact, Aristotle gives us what he says are Plato’s views and also those of others. From this we learn what little we can about Speusippus and his contemporary, Xenocrates.\nAccording to Aristotle, all three of Plato, Speusippus, and Xenocrates constructed their worlds operating with two principles (archai): the One and something opposed to it. The latter appears under different names, and it looks as if the different names go with different ones among the three: ‘the Indefinite Dyad’ or ‘the large and (the) small’ seem to be the expressions favored by Plato, ‘plurality’ seems to be associated with Speusippus, and ‘the unequal’ with Xenocrates. And for Plato, the One was identified with the Good. These philosophers employed these two principles, according to Aristotle, to generate derivative entities (substances, beings) of other types: Forms, numbers, and so on. This generation was laid out as if it were a process in time, but the generation-story was to be understood instead as one understands a mathematical construction: the construction takes place in time, but what is constructed is an eternal structure. And in this eternal structure the principles were not temporally first, but first in relation to the dependence on them of the things constructed.\nThese principles are primarily employed by these three thinkers in connection with numbers. But there are two ranges of number operating in Aristotle’s discussions (see Metaphysics I 6, XIII 8–9). There are what he refers to as formal numbers, one for each numeral; these are the (Platonic) Forms for numbers. But since there is only one for each numeral, and a mathematician has to be able to add two and two to get four, there is another range of numbers required: the mathematical numbers, indefinitely many for each numeral n, each of the indefinitely many a collection of n units. As Aristotle has it, Plato accepted both ranges, and Speusippus only mathematical numbers; Speusippus, then, rejects Plato’s Theory of Forms and specifically his belief in formal numbers.\nThere are only two passages in which Aristotle mentions Speusippus by name in dealing with his metaphysical views: Metaphysics VII 2. 1028b21 and XII 7. 1072b31. Neither passage gives us anything we could call a ‘fragment’: there is no indication that any actual quoting is taking place. But it is from these meager hints that reconstruction of Speusippus’ metaphysics must start.\nThe method followed in the reconstruction of Speusippus’ views is a matter of chaining: we start from our two anchor texts, and look for other passages in which the views ascribed to him in them are under discussion. Those passages will sometimes bring in new views; we then ascribe those views to Speusippus, and go looking for passages in which those views seem to be alluded to. No one needs to be told how tenuous such chaining is: each link is weak, and compounding probabilities would tell us that a chain of this type is actually weaker than its weakest link. But chaining in that way is all we can do. Fortunately, it results in a fairly coherent picture.\nIn the first of our two anchor texts, Aristotle, discussing the ways in which people have answered the question ‘what are the substances?’, ascribes to Plato the view that there are not only perceptible substances but eternal ones of two types: forms and mathematical objects. He then says that Speusippus thought there were even more types of substance; he “started from the One” and adopted principles (archai) for each of his types of substance: “one for numbers, another for magnitudes, then for soul”. So we have at least four layers of beings: numbers, magnitudes, souls, and perceptible beings; the One is Speusippus’ starting-point, but he has different principles for each level of being.\nIn the other of our anchor texts, Aristotle, having just sketched a proof for the existence of an unmoved mover, which he refers to as a principle (arche) and as ‘god’, says something about Speusippus’ views about principles: that he (and the Pythagoreans) suppose that a principle is not characterizable as ‘beautiful’ or ‘good’, going on the analogy of plants and animals, where beauty and goodness emerge in the end state rather than the beginning. So, although we have principles at each level, those principles are not themselves complete entities at that level.\nThen we begin chaining.\nIn Metaphysics XIV 4–5, Aristotle discusses various Platonistic views about the relationships between the first principles and goodness; XIV 4. 1091a34–36 refers to contemporaries of Aristotle’s who deny that the good is among the principles but suppose it comes in later in the development; the second of our two anchor texts warrants the guess that Speusippus is among them. And then some other things about the passage in XIV fall into place: Speusippus’ main way of referring to the principle opposed to the One was ‘plurality’, and, more importantly, he denied a theory about causality that was part of Plato’s Theory of Forms as we find that Theory in, say, the Phaedo: a theory to the effect that the possession of a feature F by a perceptible object was due to its participation in something supremely F that transmits its being F to the perceptible object; as opposed to this ‘Transmission Theory of Causality’, Speusippus adopted what we might call a Principle of Alien Causality: the first cause of Fs is not itself F. This Principle is going to be difficult to formulate, and the word ‘first’ in this formulation needs emphasis: Speusippus surely agrees with Aristotle that the cause of a human being is one or more other human beings, so presumably the Principle has to be restricted in some way to first causes or principles in some more robust sense. Unfortunately, the texts (even the Iamblichean passage cited below) give us no help here.\nMetaphysics XIV 5. 1092a11–17 returns to the analogy of animals and plants which XII 7 told us Speusippus used; Aristotle says:\nAnd one does not rightly understand either if one compares the principles of the whole to that of animals and plants, because from indefinite, incomplete things the more complete always arise, which is why he says it holds thus for the first things, so that the one itself is not even a being.\nSticking by our method of chaining, we add to Speusippus’ package the claim that the One is not a being (1092a14–15). And this is an instantiation of the Principle of Alien Causality: the first cause of beings is not itself a being.\nAristotle goes on to speak of “those who say that the beings are derived from elements and that of the beings the numbers are the first” (1092a21–22). And again we may suppose that Speusippus is among them: he would say that the elements, not being so derived, are not beings, and that numbers, derived from those elements, are the first beings. Here we may go back to the first of our anchor texts (Metaphysics VII 2. 1028b21) for some confirmation.\nThere may be additional confirmation in a more remote source. In a Latin translation of part of Proclus’ commentary on Plato’s Parmenides (the original Greek for this part of the commentary has not survived), Proclus tells us that “the one is prior and a cause of being, therefore it itself according to its existence is not a being, as supporting being; nor does it partake of being”, and that Speusippus also subscribes to this view, although Speusippus states it “as if reporting the sentiments of the ancients.” Unfortunately, if this does go back to Speusippus, it may have been contaminated by neoplatonic elements, for Proclus has Speusippus saying that the ancients thought “the one better than being and that from which the being derives”, and this should not be Speusippus, given his rejection of the claim that the One is good (see above). But Speusippus’ rejection of this claim would have been so bizarre to a neoplatonist that perhaps Proclus simply managed to read past it. Perhaps what Proclus (or his source) read is that the One is ‘above’ being and that from which being derives, and, given his neoplatonic mindset, unhesitatingly thought ‘better than’.\nIt has seemed to many scholars that Speusippus’ denial that the One is a being gains plausibility from Plato’s Republic: VI 509b2–10 has often been read as placing the Form of the Good (which, according to the tradition stemming from Aristotle, Plato identifies with the One) ‘beyond being’ and so making the top of Plato’s ontological ladder not a being, either. But this is inconsistent with other passages in the Republic in which the Form of the Good is plainly said to be a being (e.g., VII 518cd, 526e), and the phrase often translated ‘beyond being’ in 509b can be read simply as meaning ‘on the far edge of being’. This does not mean that there is nothing pertinent in Plato; there is, in the later dialogues, especially the Parmenides (see below). But Republic VI 509b2–10 cannot be cited in support of Speusippus’ view.\nIf we accept this much, then, by further chaining, it looks as if we have a quotation or at least paraphrase of Speusippus’ views concerning the One, plurality, the numbers, and even geometrical objects in a chapter of the De communi mathematica scientia (On Mathematical Science in General, hereafter DCMS) of Iamblichus (3rd century C.E.). Iamblichus was a student of Porphyry, who was in turn a student of Plotinus: this is the beginning of Neoplatonism, and there are many resemblances as well as differences between Neoplatonism and Speusippus’ views. But a case has been made (Merlan 1968) for the idea that chapter iv of DCMS contains paraphrase if not quotation from Speusippus.\nIamblichus is known for something that we should call ‘plagiarism’: he often quotes without attribution. This cannot have seemed in any way wrong to him: one of his quotations is a longish stretch from Plato’s Republic, and he is not, of course, claiming that for his own. Presumably it is an act of homage: Iamblichus is thinking that he can certainly not do better for what he wants to say than Plato, so he, with reverence but not attribution, quotes. The hope is that he is doing this in iv. There we read:\nFor the mathematical numbers one must posit two things, the first and highest principles, the One (which indeed one ought not yet even call a being, because of the fact that it is simple and because of the fact that it is a principle for the things that are, while the principle is not yet such as are the things of which it is a principle), and again another principle, that of plurality, which can in its own right provide division as well, and for this reason we may, by way of making a comparison appropriate to its capacity, assert it to be like some moist and completely pliable matter; from which, the one and the principle of plurality, there is produced the first kind, of numbers, from both of these when combined with the help of some persuadable necessity.\nA bit later in the chapter, Iamblichus or his source says:\nBut it is fit to call the one neither beautiful nor good, because of the fact that it is above the beautiful and the good; for it is when nature proceeds farther away from the things in the beginning that, first, the beautiful appears, and, second, when the elements have an even longer distance, the good.\nAlso in DCMS iv, we find:\nBut the elements from which the numbers are produced do not yet belong there as either beautiful or good; but from the combination of the one and the matter that is cause of plurality number exists, and first in these that which is and beauty appear, while next from the elements of lines geometrical substance appears, in which in the same way there is that which is and the beautiful, but in which there is nothing either ugly or bad; but at the extreme in the fourth and fifth levels which are combined from the last elements badness comes-to-be, not directly, but from inadvertence and failing to master something of that which accords with nature.\nThe picture here is not Iamblichus’ own; rather, it fits with, and expands on, what we so far have of Speusippus. There are four levels of beings, and above them on a level of its own the One, which is not a being.\nAnd here, in the first quoted passage, we are given two arguments to the effect that the One is not a being.\nThe first is an argument from the assumed simplicity of the One. This corresponds to things we can find in Plato. In what is frequently referred to as the ‘first hypothesis’ of Plato’s Parmenides (137c-142a), Parmenides begins (137c) by laying it down that the One cannot be many; he then argues, first (137cd), that if the One is, it must be without parts, since otherwise it would be many. Subsequent argumentation makes this a proscription against all attempts to predicate anything positive of the One: any such predicate would pluralize the One, make it consist of parts. Ultimately that will include even the predicate ‘being’: it is supposed to follow that the One “in no way is” (141e9–10), that it is not; that is to say, that it is not a being (e11). It is difficult to believe that Plato himself would have bought this argument and its conclusion. He did buy into some of the train of thought: see Sophist 244b-245e. But both Plato (even in the Sophist) and Aristotle seem prepared to infer from a predication of the form ‘S is P’ a conclusion of the form ‘S is’, whereas in the first hypothesis of the Parmenides and in DCMS iv we have an argument that goes from a predication of the form ‘the One is F’ to the conclusion ‘the One is not’. This is not the place to attempt to sort out the relationship between the Platonic passages and Speusippus, but the interesting suggestion has been made (Graeser 1997, 1999; see also Halfwassen 1993) that Plato is responding to Speusippus in the Parmenides. At any rate, the Argument from Simplicity for the One’s not-being goes back to the Academy.\nThe second argument for the not-being of the One depends explicitly on the Principle of Alien Causality: “the principle is not yet such as are the things of which it is a principle”; hence the principle of beings cannot itself be a being.\nAfter the One comes the second level, the first beings, numbers, and then magnitudes or geometrical shapes: here we first encounter beauty and goodness. And finally the fourth and fifth levels are going to be those of souls and perceptible objects, and it is here that ugliness and badness appear.\nThe level of numbers comes about when the second principle, plurality, kicks in. One of the more confusing things about this level is that Speusippus seems to have supposed that among the numbers was the number 1: in this he was apparently ahead of his time, for the generally accepted view was that 1 is not a number (for this see Aristotle, Metaphysics, book X, Euclid, Elements vii def. 2, proof of prop. 1, et passim). That Speusippus accepted the number 1 follows from the mathematics of the one extensive fragment of his work that we have: a quotation preserved in pseudo-Iamblichus, Theologumena arithmeticae (see below). But if this is so, it is essential to recall that we are dealing with Aristotle’s ‘mathematical’ numbers, where there is a plurality for each number. So there is a plurality of numbers 1 (so that we can add 1 and 1 to get 2, etc.). Then the One is not the number 1; the latter comes about when you get a plurality of units, any of which counts as a 1, any couple of which counts as a 2, and so on. That the One is not the number 1 is only what we should expect, given the Principle of Alien Causality: the principle for numbers is not itself a number.\nAristotle more than once complains of Speusippus’ ‘episodic’ universe: apparently the train of causality did not start with the One and go down through the various levels, but started anew at each level. This is explicit in Metaphysics VII 2, cited above: Speusippus had new principles for each level of beings. We need not suppose that the One is different at each level of being in Speusippus’ universe; the text in DCMS would have it that the One is the same principle throughout, but because of differences in what it refers to as the ‘matter’ (see quotation above), the One is realized in different ways at each level: as the number 1, or the unit, in plurality at the level of numbers, as the point, in what DCMS calls ‘place’ or, we might translate, ‘locus’, at the level of geometrical figures. The net effect is that what operates at the beginning of the arithmetical level is the realization of the One in plurality, the unit, which, as it were, represents the One at that level, and what operates at the beginning of the geometrical level is the realization of the One in locus, the point, which similarly represents the One at that level.\nWe may have a fair amount of information about what Speusippus thought about numbers, preserved in pseudo-Iamblichus’ Theologumena arithmeticae (already mentioned). This book is a compilation from various authors: Anatolius, Nicomachus of Gerasa, possibly Iamblichus himself, possibly authors unknown. It discusses various properties of each of the first ten numbers. When it gets to the number 10, the ‘decad’, after a section that looks as if it descends from Nicomachus, it begins to speak of Speusippus and a book of his which it says was entitled ‘On Pythagorean Numbers’ and was compiled from various Pythagorean writings, especially those of Philolaus (82.10–15: that the book had that title and that Philolaus or any other Pythagorean was a source for Speusippus are both problematic claims). After what purports to be a description of the book (82.15–83.5), it introduces a long quotation from Speusippus himself concerning the number 10.\nThe description preceding the quotation begins (82. 20) with a passage on the first half of Speusippus’ book, telling us that it talked about numbers of various types and the five so-called ‘Platonic solids’ (the tetrahedron or pyramid, the cube, the octahedron, the dodecahedron, and the icosahedron, assigned in the Platonic tradition starting with Timaeus 54d-56b to the elements of which the universe was composed and to the universe itself or to the fifth element, ether). This is relatively unproblematic.\nThe second half of the book, the author tells us, was about the number 10, the decad. Unfortunately, the description of that half of the book that precedes the quotation contains some wording which it seems impossible to ascribe to Speusippus. The author tells us that Speusippus showed that the number 10 was “a sort of artistic form for the cosmic accomplishments, obtaining in its own right (and not because we use it nor as it happens), and lying before the god that is maker of the all as an all-complete paradigm” (De Falco/Klein 1975, p. 83.2–5, Waterfield 1988, p. 112). The trouble is that we have already got Speusippus rejecting the Theory of Forms, and in particular denying that aspect of the Theory in which the forms are treated as ‘paradigms’: ideal cases that transmit their properties to things that participate in them.\nAs it happens, this passage is too good to be true: it is almost verbatim what Nicomachus himself wants (see Nicomachus’ Introductio arithmeticae I vi 1, Hoche 1866 p. 12.1–12, D’Ooge et al. 1926 p. 189 e.g.). So it seems best not to ascribe it to Speusippus.\nThe quotation itself is another matter. But it, too, offers a problem: if Speusippus is telling us what Pythagoreans (perhaps especially including Philolaus) thought, need he be subscribing to the views himself? Speusippus and Xenocrates, among others, were part of a revival of interest in Pythagoreanism within the Academy; it is often thought that in the course of this revival Pythagorean views became distorted through the attempt to assimilate them to the views of one or another member of the Academy: the revival plainly involved Academicians adopting the views they were ascribing to the Pythagoreans. And as for our quotation from Speusippus, what text we have certainly shows no disposition on his part to be critical of the views he is allegedly reporting. So perhaps the best conclusion to adopt, albeit very tentatively, is that he endorses these views.\nIn the quotation Speusippus tells us that the number 10 is ‘perfect’ or ‘complete’. The explanation in Euclid vii Def. 23 (Heiberg/Stamatis 1970 p. 105; Def. 22 in Heath 1926 p. 278) for the phrase ‘perfect number’ is ‘number that is the sum of its proper divisors’. This makes the first perfect numbers 6, 28, and 496: 10 is not a perfect number in this sense. Rather, Speusippus appears to be speaking of 10 as ‘perfect’ or ‘complete’ in a way that fits with his claim that completeness is not there in the beginning but only comes on once the universe has proceeded a certain way, in particular, far enough that we can speak of numbers. What he means can be illustrated by a single example.\nHe tells us that a perfect number has to be even, since otherwise it would contain more odd numbers than even ones: a perfect number must have equally many odd and even numbers in it. On that basis he pronounces 10 perfect.\nThis does not look like a mathematically (or philosophically) interesting conception of perfect numbers, and the same is true of the other points Speusippus makes in favor of the perfection of the number 10. But it does incorporate one feature of great interest: on the face of it, if Speusippus thinks that within the number 10 there are just as many odd as even numbers, he must be counting 1 as an odd number, and therefore a number. (The alternative, which actually must finally be considered seriously, is that he is not counting 2 as a number, either, but this does not seem likely.) That makes him, as already noted, an exception in his time and place.\nWhen we try to consider Speusippus’ metaphysical views as they bear on the other levels of his universe, unfortunately, we have virtually nothing further to tell us what is going on: nothing that tells us either what might be the representative of the One or what the material principle might be at the level of souls, or at the level of perceptible bodies. A passage in Stobaeus (Eclogues I 49.32, Wachsmuth & Hense 1884 p. 364.2–7) that apparently descends from Iamblichus’ De anima tells us that he defined the soul “by the extended in every direction”, but this continues to resist interpretation.\nAristotle says, in Posterior Analytics II 13. 97a6–11:\nThere is no need for one who is defining and dividing to know all the things that are. And yet some say that it is impossible to know the differences between something and each other thing while one does not know each other thing, and without the differences one cannot know each thing, for a thing is the same as that from which it does not differ, and it is other than that from which it differs.\nThe ancient commentators (see esp. Anonymous In An. post. 584.17–585.2, where the ascription is credited to Eudemus) tell us that this is Speusippus’ position (it has antecedents in Plato, Philebus 18c and Theaetetus 208c-e).\nIt is a version of what is sometimes called ‘holism’: knowing something involves knowing where it is located among everything else. In this particular context, knowing a thing appears to be a matter of knowing its definition, and its definition is something arrived at by the Platonic method of division (there is room for controversy here: see Falcon 2000). An example suggested by what Aristotle says elsewhere in this same chapter (96a24-b1, much simplified) might be an attempt to define the number 3 as follows:\n(Dtriad) a triad =df a number, odd, prime\nWe reach this definition by successive divisions:\nAnd then the view being ascribed to Speusippus is that knowing the number 3 is knowing where 3 is on such a grid, along with knowing where every other number on the grid is.\nIt is very difficult to imagine sustaining this epistemological holism. It might seem easier if we confined the view to things like mathematics. But we already know that Speusippus’ universe extended beyond the realm of mathematical objects, and it seems quite likely that another division suggested by Aristotle in that chapter (96b30–35) would be acceptable (at least in principle) to Speusippus:\nThe difficulty of sustaining the idea that knowing man is a matter of knowing its position on a tree that locates absolutely every animal, or even every ensouled thing, or (worse yet) absolutely everything, is enormous. But it looks as if Speusippus would have been committed to this.\nFor we find this in Sextus Empiricus, Adversus mathematicos vii 145–146 (Bury 1935 pp. 80, 81):\n… but Speusippus said that, since of things some are perceptible and others intelligible, the criterion of the intelligible ones is the scientific account, and that of the perceptible ones is the scientific perception. Scientific perception he understood to be that which partakes of the truth in accordance with the account. For just as the fingers of the flautist or harpist have an artistic actuality, yet one that is not completed in them in the first instance, but perfected on the basis of discipline conforming to reasoning, and as the perception of the musician has an actuality that can grasp what is in tune and what is out of tune, and this is not self-grown but comes about on the basis of reasoning, so also the scientific perception partakes of its scientific practice as naturally derived from the account, leading to the unerring discrimination of the subjects.\nThe use of the word ‘scientific’ should not lead one away from the main point: it translates a word that means ‘pertaining to knowledge’, and Speusippus is claiming that there is knowledge at the level of perceived objects. There is no indication that he gave up his holism at this point. So he seems to be committed to defending a rather drastic position.\nAnd he seems to have pursued knowledge at the level of perceived objects with considerable zeal. We have book-titles such as Definitions and Likes in which Speusippus apparently attempted with some zeal to locate various species of plants and animals on something like a division-tree, although the details are not extant. What we hear about Speusippus’ efforts is, for example:\nMARSHWORTS: Speusippus in book II of Likes says they grow in water, their leaf resembling marsh celery. (Athenaeus II 61c; Gulick 1927 pp. 266, 267.)\nSpeusippus in the Likes calls the melon a ‘gourd’. (Athenaeus II 68e; Gulick 1927 pp. 298, 299.)\nSpeusippus in book II of Likes says that trumpet-shells, purple-fish, snails, and clams are similar. … Again, Speusippus enumerates next in order, in a separate division, clams, scallops, mussels, pinnas, razorfish, and in another class oysters, limpets. (Athenaeus III 86c,d; Gulick 1927 pp. 372, 273.)\nSpeusippus in book II of Likes says that, of the soft-shells, the crayfish, lobster, mollusc, bear-crab, crab, paguros are similar. (Athenaeus III 105b; Gulick 1927 pp. 450, 451.)\nThere are a total of twenty-five such citations in Athenaeus. Most simply record that Speusippus said one organism was like another (as with the last two), or simply record differences of terminology that happened to catch Athenaeus’ eye (as with the second one). The only one that promises anything more is the first one above, and that hardly promises much. But it has been supposed (see Tarán 1981) that it implies that Speusippus differentiated species of animals on the basis of features that would not have counted as differentiae in Aristotle’s way of classifying animals: differences of locale. And it is certainly possible that Speusippus’ holism involved a rejection of Aristotle’s essence-accident distinction: if we take the text quoted above from Aristotle as implying that someone who knows marshworts must know every respect in which they are like or unlike every other organism in the universe, and every such differentiating feature is as good as any other in defining them, then we have abandoned the project of differentiating organisms as it appeared to Aristotle.\nThis line of thought has suggested to some (see Tarán 1981) that the criticism of the Method of Division in Aristotle’s Parts of Animals I 2–3 constitutes a criticism of Speusippus. This possibility remains highly controversial.\nIt appears from Simplicius’ Commentary on Aristotle’s Categories (Kalbfleisch 1907 38.19–24) that Speusippus applied his method of division, however it worked, to language: there we hear of a division of terms even more elaborate than Aristotle’s in the opening chapter of the Categories: there we hear of homonyms, synonyms, and paronyms, but Speusippus differentiated between tautonyms (uses of the same term), within which there are homonyms (same term but different definitions) and synonyms (same term and same definition), and heteronyms (different terms), within which there are heteronyms proper (different names, different things), polyonyms (many names, the same thing), and paronyms (as in Aristotle: different terms and different things, with one term derivative from another, as ‘courageous’ and ‘courage’). Whether this classification was not only more elaborate than Aristotle’s, but also had a different basis (that in Aristotle being a classification of things according to how they are referred to, that in Speusippus being a classification of terms themselves), is in dispute (Barnes 1971, Tarán 1978).\nFinally, we know a little bit about Speusippus’ attitude toward the epistemology of mathematics. Assuming that Aristotle in Metaphysics XIV 3. 1090a25–29, 35-b1 is discussing Speusippus (he is talking about “those who say there is only the mathematical number”), Speusippus held that the truths of mathematics are not about perceptible things, and that the axioms from which they follow “fawn on the soul”: that is, perhaps, suggest themselves. And Proclus tells us this (Commentary on Book I of Euclid’s Elements, Friedlein 1873 p. 179.8–22; Morrow 1970 p. 141):\nFor universally, Speusippus says, of the things for which the understanding is making a hunt, some it puts forward without having made an elaborate excursion, and sets them up for the investigation to come: it has a clearer contact with these, even more than sight has with visible things; but with others, which it is unable to grasp straight off, but against which it makes its strides by inference, it tries to effect their capture along the lines of what follows.\nSo we begin from some sort of intuition by which the axioms suggest themselves and proceed from them to the rest of the mathematical truths.\nWe also hear from Proclus of a dispute in the Academy between some, whom we might call ‘constructivists’, who saw mathematics as something like a human construct, and referred to the truths of geometry as ‘problems’, demanding geometrical constructions, and others, whom we might think of as ‘mathematical realists’, who saw mathematics as describing an eternal, unchanging realm of objects, and referred to the truths of mathematics as ‘theorems’ or ‘objects of contemplation’. Proclus says (Friedlein 1873 pp. 77.15–78.6; Morrow 1970 pp. 63–64):\nBut already among the ancients, some demanded that we call all of the things that follow from the principles theorems, as did Speusippus, Amphinomus, and those around them, thinking that for the theoretical branches of knowledge the appellation ‘theorems’ was more appropriate than ‘problems’, especially in that they make their accounts about eternal things. For there is no coming-to-be among the eternal things, so that the problem could have no place with them, it requiring a coming-to-be and making of that which was not before, e.g. constructing an equilateral triangle or describing a square when a line is given, or placing a line at a given point. So they say it is better to say that all these things are, but that we look at their comings-to-be not by way of producing them but by way of knowing them, treating the things that always are as if they were coming-to-be.\nSo Speusippus, as we might have predicted from the foregoing, was firmly in the realist camp.\nSpeusippus certainly wrote about ethics: the bibliography in Diogenes lists (in iv 4) one book each on wealth, pleasure, justice, and friendship. But we have nothing that can be properly called a fragment.\nWe have already seen that Speusippus rejected Plato’s Theory of Forms, and that he refused to place the good among the metaphysical first principles. So he was not obviously prone to the objections of Aristotle against Platonic ethics in Nicomachean Ethics I 6, the general upshot of which is that Plato’s theory puts the Good out of human reach.\nSpeusippus appears to have adopted a rather down-to-earth goal, and in this he is a lead-in to Hellenistic concerns. Hellenistic ethics is dominated by the identification of the ideal of human happiness as ‘undisturbedness’ (ataraxia). According to Clement, Stromata II 22, 133 (Stählin 1939 p. 186.19–23):\nSpeusippus, Plato’s nephew, says that happiness is the completed state in things that hold by nature, or possession of goods, for which condition all men have desire, while the good ones aim at untroubledness (aochlesia). And the excellences are productive of happiness.\nThese formulations ‘anticipate’ Stoic and Epicurean ones: the emphasis on ‘natural’ conditions is a feature of Stoicism, and the notion of ‘untroubledness’ is found in Epicurus (see To Menoeceus, in Diogenes Laertius x 127).\nThere is an argument implicit in the clause “for which all men have desire, while the good ones aim at untroubledness” that fits in perfectly with a debate about the good and happiness that we know from Aristotle to have been current in the Academy, and in which Speusippus played a leading role. Nicomachean Ethics X 2 begins (1172b9–10):\nEudoxus, then, thought pleasure to be the good because he saw all things, both rational and irrational, aiming at it, ….\nThis sort of ‘Universal Pursuit Argument’ is one that became very popular in the Hellenistic period; here we have Eudoxus applying it in favor of the claim that pleasure is the good: ‘hedonism’. And Speusippus strenuously denied hedonism (see below).\nWe might, then, see Speusippus responding to the Universal Pursuit Argument construed as favoring hedonism by saying: we should not care about what all things in general aim at, but at what human beings aim at, in fact, more specifically, the good ones among them, and what human beings pursue is not pleasure, but the completed state in things that hold by nature, and the good ones, more specifically, pursue untroubledness. The word ‘untroubledness’, aochlesia, comes from a verb ochleein that can just mean ‘to move’, so untroubledness might well suggest a certain stillness, lack of motion. This will fit with Speusippus’ views on pleasure and pain.\nBefore we turn to those, we have a little more with which to flesh out Speusippus’ idea of the good for man; none of it, regrettably, is supplied with argument.\nCicero, in various places, ascribes a view to “Aristotle, Speusippus, Xenocrates, and Polemon” which he himself rejects. In the Tusculan Disputations he enumerates (V x 29) various things such as poverty, ingloriousness, loneliness, pain, ill health, etc., which many people (but not he: his own view is the Stoic one that virtue all by itself guarantees happiness) take to be bad things, and then says (V x 30, King 1927 pp. 454/455–456/457):\nTherefore I do not easily give in to … those ancients, Aristotle, Speusippus, Xenocrates, and Polemon, since they count the things I have enumerated above among the bad things, and these very people say that the wise man is always happy.\nCicero is, in the last clause, accusing these people of inconsistency: they think the wise man is always happy, and yet they think there are things such as wealth and health the lack of which would bring about unhappiness.\nSeneca (Epistulae morales 85.18, Reynolds 1965 i 292, Gummere 1920 pp. 294, 295) says:\nXenocrates and Speusippus think that one can become happy even by virtue alone, but not that there is one good, that is morality (honestum).\nThis can be seen as expressive of the same reservation Cicero had. If Speusippus and Xenocrates espoused the view that the virtuous man was always happy but thought that there were non-moral evils such as poverty and pain, then they thought that there were non-moral good things as well: the absence of poverty and the absence of pain. So (on Cicero’s and Seneca’s account) they were not consistent in maintaining that virtue (which incorporates only moral goods) was sufficient for happiness.\nAnd it appears that Speusippus and Xenocrates did think that there were non-moral goods; Plutarch, in De communibus notitiis adversus Stoicos 13. 1065a (Cherniss 1976 pp. 704, 705) refers to Speusippus and Xenocrates as “thinking that health is not indifferent and wealth not useless”.\nWe are left with two views to ascribe to Speusippus (and to Xenocrates): that wisdom, or virtue in general, is sufficient for happiness, and that there are non-moral goods the lack of which conduces to unhappiness. Cicero’s question as to how these can be rendered consistent is a good one, and we have no information about how Speusippus might have answered it.\nLet us turn to the one other topic about which we have some purchase on Speusippus’ ethical views: that of pleasure. Aulus Gellius, Atticae noctes IX v 4 (Marshall 1968 p. 284, Rolfe 1927 pp. 168, 169):\nSpeusippus and the entire old Academy say that pleasure and pain are two evils opposed to each other, but that the good is what is in the middle between the two.\nThe inclusion of the rest of the Academy along with Speusippus is presumably due to the influence of Cicero’s teacher Antiochus’ unifying efforts. At any rate, there is confirmation that this was Speusippus’ view, from two passages in Aristotle’s Nicomachean Ethics: VII 13, which names Speusippus, and X 2. 1173a5–13, which does not, but repeats the argument of the former passage.\nIn the first of those chapters (in 1153b1–7) Aristotle mentions Speusippus as having attacked the claim that pleasure is something good. He had canvassed arguments to the effect that pleasure is a bad thing earlier in the chapter, and some of the arguments certainly sound like Speusippus (1152b12–20):\nAnd so, in favor of the claim that pleasure is not a good at all, it is argued (1) that every pleasure is a perceptible coming-to-be toward a natural state, while no coming-to-be is of the same kind as its ends, e.g. no house-building is of the same kind as a house. (2) Again, the temperate man avoids pleasures. (3) Again, the intelligent man pursues what is painless, not what is pleasant. (4) Again, pleasures are a hindrance to reflecting, and by as much as one enjoys them, by that much are they more of a hindrance, as with the pleasure of sex; for no one could think in the course of that. (5) Again, there is no art of pleasure, although everything good is the work of an art. (6) Again, children and wild animals pursue pleasures.\nAssuming that we correctly understood Speusippus’ response to the Universal Pursuit Argument, (2), (3), and (6) are consonant with that response.\nBut (1) plainly echoes material in Plato’s Philebus (see esp. 53c–55a). And that leads to the interesting suggestion that in that dialogue Plato is entering the dispute between Eudoxus and Speusippus. It has been suggested independently of that passage that Speusippus is lurking behind the ‘harsh thinkers’, the anti-hedonists, of 44a-47b (Schofield 1971, Dillon 1996).\nIf that is right, and if Graeser’s suggestion that Plato in the Parmenides is responding to some of Speusippus’ metaphysical views, it is plain that the understanding of some of what is going on in late Plato would be aided by an understanding of what was going on in Speusippus. The loss of his writings is regrettable indeed.\n- Athenaeus: see Gulick 1927.\n- Barnes, Jonathan, 1971, “Homonymy in Speusippus and Aristotle”, Classical Quarterly, 21: 65–80.\n- Bury, R.G., 1935, Sextus Empiricus, 4 volumes, Against the Logicians (Volume II), Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Greek with facing English translation.\n- Cherniss, Harold, 1976, Plutarch’s Moralia, vol. xiii part ii: 1033A–1086B, Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Greek with facing English translation.\n- Cicero (see King 1927).\n- Clement (see Stählin 1939).\n- Dancy, R.M., 1989, “Ancient Non-Beings: Speusippus and Others”, Ancient Philosophy, 9: 207–243; revised reprint in R.M. Dancy, 1991, Two Studies in the Early Academy, Albany, New York: State University of New York Press, 63–119, 146–178. More detailed discussion of Speusippus’ metaphysics.\n- De Falco, V., 1975, [Iamblichus:] Theologumena arithmeticae, U. Klein (ed.), Stuttgart: B.G. Teubner.\n- Dillon, John, 1984, “Speusippus in Iamblichus”, Phronesis, 29(3): 325–332.\n- –––, 1996, “Speusippus on Pleasure”, in Polyhistor: Studies in the History and Historiography of Ancient Philosophy Presented to Jaap Mansfeld on His Sixtieth Birthday [Philosophia Antiqua 72], Keimpe A. Algra, Pieter W. van der Horst, & David T. Runia (eds.), Leiden & New York: E.J. Brill, 99–114.\n- –––, 2003, The Heirs of Plato: A Study of the Old Academy (347–274 B.C.), Oxford: Clarendon Press; New York: Oxford University Press.\n- Diogenes Laertius (see Hicks 1925, Marcovich 1999).\n- D’Ooge, Martin Luther, Frank Edleston Robbins, & Louis Charles Karpinski, 1926, Nicomachus of Gerasa: Introduction to Arithmetic, New York & London: Macmillan.\n- Döring, A., 1903, “Eudoxos von Knidos, Speusippos, und der Dialog Philebos”, Vierteljahrsschrift für wissenschaftliche Philosophie und Soziologie, 27: 113–129.\n- Euclid (see Heiberg/Stamatis 1970, Heath, 1926).\n- Falcon, Andrea, 2000, “Aristotle, Speusippus, and the Platonic Method of Division”, Classical Quarterly, 50: 402–414.\n- Festa, N., 1975, Iamblichus: De communi mathematica scientia, U. Klein (ed.), Stuttgart: B.G. Teubner.\n- Friedlein, G., 1873, Procli Diadochi in primum Euclidis Elementorum commentarii, Leipzig: B.G. Teubner.\n- Gellius, Aulus (see Marshall 1968, Rolfe 1927).\n- Graeser, Andreas, 1997, “Platon gegen Speusipp: Bemerkungen zur ersten Hypothese des Platonischen Parmenides”, Museum Helveticum, 54: 45–47.\n- –––, 1999, “Anhang: Probleme der Speusipp-Interpretation”, Prolegomena zu einer Interpretation des zweiten Teils des Platonischen Parmenides [Berner Reihe philosophischer Studien 25], Bern, etc.: Verlag Paul Haupt, 41–53.\n- Gulick, Charles Burton, 1927, Athenaeus: The Deipnosophists, vol. i: Books I-III.106e, Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Greek with facing English translation.\n- Gummere, Richard M., 1920, Seneca: Ad Lucilium Epistulae morales, vol. ii, Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Latin with facing English translation.\n- Halfwassen, Jens, 1992, “Speusipp und die Unendlichkeit des Einen: Ein neues Speusipp-Testimonium bei Proklos und seine Bedeutung”, Archiv für Geschichte der Philosophie, 74: 43–73.\n- –––, 1993, “Speusipp und die metaphysische Deutung von Platons ‘Parmenides’”, in HEN KAI PLETHOS / Einheit und Vielheit: Festschrift für Karl Bormann zum 65. Geburtstag [Religionswissenschafliche Studien 30], Ludwig Hagemann & Reinhold Glei (eds.), Echter: Oros Verlag, 330–373.\n- Heath, Thomas L., 1926, Euclid: The Thirteen Books of the Elements, vol. ii, Cambridge: Cambridge University Press.\n- Heiberg, J.L., 1970, Euclidis Elementa, vol. ii, E.S. Stamatis (ed.), Leipzig: B.G. Teubner.\n- Hicks, R.D., 1925, Diogenes Laertius: Lives of Eminent Philosophers, 2 vols., Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Greek with facing English translation.\n- Hoche, R., 1866, Nicomachi Geraseni Pythagorei Introductionis arithmeticae libri II, Leipzig: B.G. Teubner.\n- Iamblichus (see De Falco 1975, Festa 1975).\n- Isnardi Parente, Margherita, 1980, Speusippo: Frammenti; Edizione, traduzione e commento [Istituto Italiano per gli Studi Filosofici, La Scuola di Platone 1], Naples: Bibliopolis; the only edition of the fragments with a translation (Italian).\n- Kaklamanou, Eleni, 2012, “Speusippus on Cognitive Sense Perception: Sextus Empiricus M 7.145-6”, British Journal for the History of Philosophy, 20: 1183–1193.\n- Kalbfleisch, C., 1907, Simplicii in Aristotelis Categorias commentarium [Commentaria in Aristotelem Graeca 8], Berlin: G. Reimer.\n- King, J.E., 1927, Cicero: Tusculan Disputations, Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Latin with facing English translation.\n- Krämer, Hans Joachim, 1969, “EPEKEINA TES OUSIAS: Zu Platon, Politeia 509B”, Archiv för Geschichte der Philosophie, 51: 1–30. (Defends the view of this passage rejected above.)\n- Lang, Paul, 1911, De Speusippi academici scriptis accedunt fragmenta, Bonn; reprint, Hildesheim: G. Olms, 1965.\n- Marcovich, Miroslav, 1999, Diogenis Laertii Vitae philosophorum, 2 vols., Stuttgart & Leipzig: B.G. Teubner.\n- Marshall, P.K., 1968, A. Gellii Noctes Atticae, vol. i, Oxford: Clarendon Press.\n- Merlan, Philip, 1968, “Speusippus in Iamblichus”, in Merlan, From Platonism to Neoplatonism, The Hague: Martinus Nijhoff, 3rd edition, 96–140.\n- Morrow, Glenn R., 1970, Proclus: A Commentary on the First Book of Euclid’s Elements, Princeton, New Jersey: Princeton University Press.\n- Nicomachus (see Hoche 1866, D’Ooge et al. 1926).\n- Plutarch (see Cherniss 1976).\n- Proclus (see Friedlein 1873, Morrow 1970).\n- Reynolds, L.D., 1965, L. Annaei Senecae: Ad Lucilium Epistulae Morales, 2 vols., Oxford: Clarendon Press. Latin text.\n- Rolfe, John C., 1927, The Attic Nights of Aulus Gellius, vol. ii, Cambridge, Massachusetts: Harvard University Press; London: William Heinemann Ltd.; Loeb Classical Library: Latin with facing English translation.\n- Schofield, M., 1971, “Who Were the Dyschereis in Plato, Philebus 44a ff.?”, Museum Helveticum, 28: 2–20.\n- Seneca (see Gummere 1920, Reynolds 1965).\n- Sextus Empiricus (see Bury 1935).\n- Simplicius (see Kalbfleisch 1907).\n- Stählin, Otto, 1939, Clemens Alexandrinus, vol. ii, Stromata, Buch I-VI, Leipzig: J.C. Hinrichs.\n- Stobaeus (see Wachsmuth & Hense 1884).\n- Tarán, Leonardo, 1978, “Speusippus and Aristotle on Homonymy and Synonymy”, Hermes, 106: 73–99.\n- –––, 1981, Speusippus of Athens: A Critical Study with a Collection of the Related Texts and Commentary [Philosophia Antiqua 39], Leiden: E.J. Brill, 1981. An indispensible edition of the fragments, with commentary in English but no translation (not for the Greekless reader). Tarán heatedly denies many of the positions taken here: esp., e.g., that the One does not exist and that Iamblichus, DCMS iv, quotes or paraphrases Speusippus. On both these points, see Dillon 1984, Dancy 1989/1991.\n- Tarrant, H.A.S., 1974, “Speusippus’ Ontological Classification”, Phronesis, 19: 130–145.\n- Wachsmuth, Curt, & Otto Hense, 1884, Stobaei Anthologium, vol. i: Eclogae physicae, Berlin: Weidmann.\n- Warren, James, 2009, “Aristotle on Speusippus on Eudoxus on pleasure”, Oxford Studies in Ancient Philosophy, 36: 249–81.\n- Waterfield, Robin, 1988, The Theology of Arithmetic, Attributed to Iamblichus, Grand Rapids, Michigan: Phanes Press.\n- Watts, Edward, 2007, “Creating the Academy: Historical Discourse and the Shape of Community in the Old Academy”, The Journal of Hellenic Studies, 127: 106–122.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.\n[Please contact the author with suggestions.]", "label": "No"} {"text": "- Vol 1: General - Topics Chapters Overview\n- Vol 2: Cultural\n- Vol 3: Biological\n- Vol 4: Community\n- Emergency Projects Environmental Process and Requirements\n- Other Guidance\n- Forms & Templates\n- Policy Memos\n- Scoping Tools\n- Training On Demand\n- Acronyms and Abbreviations List\n- Contact SER Staff\n- Questions about the SER?\n- Suggestions or problems with this site, email the website coordinator or use the suggestion form.\nAdobe Acrobat Reader is required to view and print PDF files. Adobe Acrobat is required to edit online forms and save them to your computer.\nLast Updated: Friday, February 3, 2012 11:41 AM\n- 2-1 Introduction\n- 2-2 Background Research\n- 2-3 Issue Identification/Scoping\n- 2-4 Field Survey Methods\n- 2-5 Evaluating Effects and Providing Input on Significance\n- 2-6 Mitigation Measures\nA Natural Environment Study (NES) describes the existing biological environment and how the project alternatives affect that environment. The NES summarizes technical documents (e.g., focused species studies, wetland assessments, biological assessments, etc.) related to effects on biological resources in the Biological Study Area (BSA) for use in the environmental document.\nTo gather information on the biological resources in the BSA, the District Biologist must review the proposed project description and materials, be familiar with the BSA, consider comments received during the project scoping process, and review existing sources of information known about the BSA.\nAn initial site visit to observe the type of natural communities and their condition in the BSA will help focus the collection of background information. Background information is used to plan the extent of biological studies needed prior to conducting field investigations. This initial planning step is necessary to ensure that studies address resources of concern that may be affected by the project while at the same time avoiding lengthy discussions of the local or regional biota. Biological resources addressed in the NES are limited to those pertaining to the BSA and those likely to be effected by the project. The BSA limits are determined in coordination with the Project Development Team (PDT) (refer to section 2-3.2).\nThe District Biologist reviews substantive resource issues identified during the project scoping process before initiating biological studies. From the information obtained in the background research and the comments received during the scoping process, the District Biologist develops a list of sensitive species and habitats that may be present within the BSA, as well as records of any additional biological considerations, such as the presence of invasive species.\nInformation about biological resources in the BSA is available from a myriad of sources. Some of the common sources of biological information include:\n- U.S. Fish and Wildlife Service (FWS)\n- Endangered Species Program provides special status species information\n- Threatened and Endangered Species Database (TESS) provides species lists and information\n- National Wetlands Inventory Maps allows you to view wetlands maps using a mapping interface\n- Survey Protocols and Other Guidelines for federally listed, threatened, endangered species\n- California Department of Fish and Game (DFG)\n- Status of Rare, Threatened, and Endangered Plants and Animals of California 2000-2004\n- Rare Plant Program coordinates conservation activities for the State's listed plants, including listing, plant collecting, and research\n- Protocols for Surveying and Evaluating Impacts\n- Vegetation Classification and Mapping Program (VegCAMP) develops and maintains maps and the classification of all vegetation and habitats in the state to support conservation and management decisions\n- California Natural Diversity Data Base (CNDDB) is a program that inventories the status and locations of rare plants and animals in California\n- Survey and Monitoring Protocols and Guidelines contains specified survey protocols for plants, invertebrates, amphibians, reptiles, birds, and mammals\n- More Common Sources:\n- California Native Plant Society's (CNPS) Inventory of Rare and Endangered Vascular Plants of California provides information on the distribution and habitat requirements of sensitive plant taxa\n- California Native Plant Society’s (CNPS) A Manual of California Vegetation has been adopted as the standard vegetation classification system used by state and federal agencies\n- Natural Resources Conservation Service (NRCS) provides a listing of soil surveys and maps\n- California Department of Food and Agriculture (USDA) provides a state noxious weed list\n- California Invasive Plant Council (CalIPC) protects California wild lands from invasive plants through restoration, research, and education, and maps the distribution of invasive plant populations\nEnvironmental documents prepared for nearby projects and documents prepared by resource agencies concerning species potentially found in the study area are also helpful informational resources. A 10-mile radius from the project site normally provides a useful frame of reference for developing a list of sensitive taxa to be considered during project studies. As a rule, the biologist considers all species whose range includes the BSA and whose life requirements may be met by the habitat and vegetation that is present within the survey area.\nThe scoping process identifies many of the issues that require discussion in an environmental document. The District Biologist supplements this process on an as needed basis, with site visits and interviews with local experts and agency personnel familiar with sensitive resources potentially found in the BSA.\nThe level of detail must be sufficient to determine if the project will result in any considerable effects. The NES describes the project setting in detail that project planners and the public have a clear idea of the nature, distribution, and abundance of resources. The NES must address whether a sensitive or biologically important resource occurs in the BSA, whether the resource will be affected, and whether the project effects are considerable.\nAs the sensitivity of the resource increases, the level of detail in the NES will also increase. Rare, threatened and endangered species, as well as proposed species, candidate species, and some special status resources require a thorough analysis of potential project effects. A determination of the potential for take of a listed species or critical habitat is required.\nThe District Biologist coordinates with the PDT to develop the limits of the BSA. A BSA includes the footprint of the completed project, new right-of-way (ROW) limits, areas needed for utility relocation, construction access roads, driveway realignments, and construction easements. Within these limits the biologist evaluates biological resources for both direct and indirect effects. If effects resulting from the project extend beyond the project limits, the effected areas must be included in the analysis\nArea of Direct Effect. The area of direct effect is where construction activity results in the removal of biotic resources and landforms. The National Environmental Policy Act (NEPA) Regulations define direct effects as those \"which are caused by the action and occur at the same time and place.\" Resources lost under the footprint of the action are obvious direct effects, such as filling a wetland to build a highway. Less obvious direct effects might be where a natural process has been blocked, such as blocking a migration corridor or disrupting a breeding cycle.\nArea of Indirect Effect. As defined in the NEPA Regulations, indirect effects are those \"which are caused by the action and are later in time or farther removed in distance, but are still reasonably foreseeable. Indirect effects may include growth inducing effects and other effects related to induced changes in the pattern of land use, population density or growth rate, and related effects on air and water, and other natural systems, including ecosystems.\"\nWhen evaluating an action for indirect social effects, the District Biologist coordinates with the Environmental Planner to determine indirect social changes that may occur from the construction of a project. The environmental planner determines probable changes likely to occur in the BSA. The District Biologist evaluates the biological resources that will be affected because of these indirect social effects.\nArea of Cumulative Effect A cumulative effect is defined in the NEPA Regulations as \"the impact on the environment which results from the incremental impact of the action when added to other past, present, and reasonably foreseeable future actions regardless of what agency (Federal or non-Federal) or person undertakes such other actions. Cumulative effects can result from individually minor yet collectively significant actions taking place over a period of time.\"\nEffects definitions for FESA and CESA may vary from the NEPA definition. Chapter 4 provides more detail on these definitions.\nThroughout the development of the NES, the District Biologist contacts individuals and agencies for information or negotiation purposes. A section within the NES discusses the coordination that has taken place and agreements that have been made. Contacts are made primarily to gather information or to negotiate modifications in the project design.\nInformation. As needed, the District Biologist will interview individuals who are familiar with the biological resources of the BSA, including local agency and academic personnel who are experts on the biota of the study area. These experts may provide additional, unpublished information regarding the distribution and importance of resources within the BSA. A District Biologist should attend the project's public information meetings and workshops to establish contacts with property owners. Property owners can supply knowledge of prior and current land uses and the ecological character of the area.\nNegotiation. These contacts are established for the purpose of project modification to avoid or lessen an effect on biological resources. These negotiations typically involve State, Federal, and local agencies. The Project Manager is responsible for determining any project obligations. Negotiation meetings are frequently followed with a letter confirming the final agreements. This process is referred to as consultation when threatened or endangered species are involved. Chapter 4 in Volume III, Endangered Species Act Procedure, discusses this process in detail.\nPrior to conducting field surveys, the District Biologist compiles lists of potential sensitive resources as well as other biological considerations, such as invasive species, likely to occur within the vicinity of the BSA. The limits of the project are known and delineated on project plans and/or aerial photos. If possible, the area is surveyed and delineated with survey markers or flagging.\nBiological field surveys are conducted to obtain information needed to determine the project's level of effects, including consideration of long-term and short-term effects, and the cumulative effects of the project on the biota in the area. Prior to collecting biological data, the District Biologist formulates questions and issues that need to be investigated during the field surveys. Pertinent questions include:\n- What is the significance of the effected resources on a local or regional scale?\n- What is the rarity or abundance of the resource in the region and elsewhere?\n- What is the resilience of the resource?\n- Are there invasive species currently in the BSA and will the action promote the spread of invasive species?\nIn some cases, where species require a specific survey method protocol or survey permit, it will be necessary to coordinate with resource agencies to obtain approval of the field survey methodology.\nThe District Biologist walks the project study area to develop an accurate description of the BSA, determines the presence of sensitive habitats and species, observes for any invasive species present, and evaluates the effects of the proposed project on the BSA. All field surveys to determine the presence of special status species (any species of fish, wildlife, or plant that is officially listed as rare, threatened, endangered, or candidate for rare, threatened, or endangered species listing under the state or federal Endangered Species Acts, or of local importance) are conducted at the appropriate blooming or active period for each resource. A determination of the presence of some sensitive resources may require sampling over more than one season. Some listed species require handling in order to determine their presence in the project vicinity. The District Biologist must obtain the required permits for handling these species or hire a qualified consultant who possesses the required permits prior to conducting the field surveys.\nIf the BSA is too large to adequately survey, the District Biologist will use aerial photos and maps to investigate the total area. The biologist then conducts meandering transects that traverse the BSA, being sure to investigate areas of potential sensitivity found from the pre-survey information search and aerial photo interpretation.\nField safety is extremely important when conducting field surveys. It is the responsibility of the District Biologist to become familiar with Caltrans’ Safety Manual and Surveys Manual. For example, as discussed in the Surveys Manual biologists must use the buddy system during field surveys, as well as provide a trip itinerary or study plan to their supervisor, wear appropriate clothing, and consider other safety precautions.\nGuidelines were set forth May 22, 2002, in a memorandum signed by Caltrans’ Right of Way, Environmental and Legal programs which describe the responsibilities Right of Way and Environmental Planning & Engineering have in obtaining permission to enter upon property (see Policy Related Memos; Right of Entry Guidelines for Environmental Work). The guidelines require written permission from the property owner in situations where the work performed could be considered to cause substantial interference or be invasive or damaging in nature, ie., boring, trenches, digging with hand tools, cutting vegetation, or any activities affecting any site improvements. However, an informational letter may be sent to the property owner in those situations where entry does not interfere with the property owner’s use, or is clearly non-invasive in nature, such as walk-on visual inspections, taking photographs, etc. The letter will inform the owner or lessee of the purpose and effect of such entry together with the approximate time of the entry and further advise the property owner or lessee to contact an identified person only if they have objections to such entry or have specific instructions they wish to have observed during such entry (personal contact before entering, closing livestock gates, instructions concerning dogs, etc.). It is important that the District Biologist coordinate with the District ROW Unit for assistance to determine any actions that might be necessary prior to survey work on private property. Obtaining Rights of Entry (ROE) could be a time consuming process and it is important that requests for ROE be coordinated in the initial planning phases of the project. Environmental and Right of Way staffs are encouraged to work together to make this process successful.\nThe District Biologist maps the survey area as early as possible during field investigations to provide base maps for subsequent biological work and a preliminary assessment of effects. Mapping should be at a scale large enough to show vegetation types and important biological features such as habitat for sensitive species, wetlands unique plant assemblages, and the presence of state listed noxious species. Vegetation community map units must be selected on the basis of a recognized classification system and referenced appropriately in the NES. The current standard for vegetation classification is “A Manual of California Vegetation” published by the California Native Plant Society in conjunction with DFG. This manual should be used as a basis for the habitat descriptions and the vegetation map. If another vegetation classification system is used, the report must reference the system and provide the justification for its use.\nDistrict Biologists should use a combination of aerial photo interpretation and ground truthing to delineate vegetation types. Descriptive information for each mapping unit includes the distribution of the unit within the study area, an estimate of total acreage, the dominant plant species, and the relative sensitivity of the vegetation type. All plant and animal taxa encountered during site visits should be listed by vegetation type in an appendix to the NES. The biologist will identify each species observed to the extent necessary to determine whether it is threatened or endangered. In addition to identifying species, the biologist will identify natural communities whose status is being tracked by the CNDDB.\nThere may be times when it is appropriate for a biologist to do more than map and calculate the area of the vegetation communities in a BSA. A biologist may need to develop a detailed discussion of communities in the BSA when communities of state or local significance, such as oak woodlands or wetlands, will be effected. Information on the degree of canopy cover, tree density, species frequency, and functions and values of specific habitats may be necessary in order to evaluate and develop mitigation. Collecting a greater level of detail will assist the biologist in developing mitigation that appropriately offsets the project effects. By discussing effects to these vegetation communities in greater detail within the NES, any associated mitigation costs or project scheduling adjustments can be included in the early planning stages of the project. Investigation of specific habitat or community characteristics will help ensure that proposed mitigation matches project effects.\nCaltrans biologists identify, delineate, and discuss effects to riparian and aquatic communities, including rivers, streams, lakes, wetlands, and other waters of the United States to satisfy the requirements of Executive Order 11990, Section 10, of the Rivers and Harbors Act (33 U.S.C. 401 et seq.), Section 404 and Section 401 of the Clean Water Act (33 U.S.C. 1251-1376), National Wild and Scenic Rivers Act (16 U.S.C. 1271-1287), NEPA, the California Environmental Quality Act (CEQA), Sections 1601-1603 of the Fish and Game Code, and the California Wild and Scenic Rivers Act (P.R.C.5093.50 et seq).\nStreams, Rivers, and Lakes. Caltrans is required to notify DFG prior to any project that would divert, obstruct, or change the natural flow, bed, channel, or bank of any river, stream, or lake under Sections 1602 of the Fish and Game Code. Preliminary notification and project review generally occurs during the environmental process. When an existing fish or wildlife resource may be adversely affected, DFG is required to propose reasonable project changes to protect the resource. These modifications are formalized in a Streambed Alteration Agreement (e.g. 1602 agreement). The District Biologist must identify in the NES those areas that may pertain to Section 1602 of the Fish and Game Code.\nWetlands and Other Waters of the United States. As discussed in greater detail in Chapter 3 of Volume III, Waters of the U.S. and the State, to determine the presence of a wetland, the District Biologist uses the U.S. Army Corps of Engineers (USACE) and U.S. Environmental Protection Agency (EPA) joint definition: \"Those areas that are inundated or saturated by surface or ground water at a frequency and duration sufficient to support, and that under normal circumstances do support, a prevalence of vegetation typically adapted for life in saturated soil conditions.\" Wetlands generally include swamps, marshes, bogs, and similar areas.\nA District Biologist will use the procedures described in the USACE Wetlands Delineation Manual (January 1987) to make the wetland determination. The wetland determination requires the identification of three criteria:\n- Presence of wetland hydrology;\n- Hydric soils; and\n- A prevalence of hydrophytic vegetation. An in-depth discussion of wetland identification and report format is included in Chapter 3 of Volume III, Wetlands.\nWhen wetlands occur in the BSA, the NES will include a Wetland Assessment. The purpose of an assessment is to map the wetland area and discuss the functions, values, and potential effects on wetlands. For most projects, the discussion of wetland issues is included entirely within the NES. In cases where the discussion of wetland issues is lengthy and/or project effects are significant, a separate Wetland Assessment will be prepared, summarized within the NES, and included in the NES as a technical appendix.\nFederally funded projects must abide by Federal Executive Order 11990, - Protection of Wetlands (May 24, 1977), which directs \"all Federal agencies to refrain from assisting in or giving financial support to projects which encroach upon public or private wetlands unless the agency determines there are no practicable alternatives to such construction and that the proposed action includes all practicable measures to minimize harm.\" In accordance with Executive Order 11990, federally funded projects must provide an opportunity for early public involvement for all actions involving wetlands. For actions requiring a Finding of No Significant Impact (FONSI) or an Environmental Impact Statement (EIS), notices for a public hearing and notices of availability must indicate whether alternatives are located in wetlands. A Wetlands Finding is necessary for actions requiring a FONSI or EIS. Federal Highway Technical Advisory T 6640.8A (October 30, 1987) provides guidance for addressing wetland effects. Guidelines for compliance with these requirements are discussed in Chapter 3 of Volume III, Waters of the U.S. and State.\nBotanical surveys are conducted to determine effects of a proposed project on rare, threatened, and endangered plants, natural communities, as well as risks for invasive species. Caltrans follows the DFG \"Protocols for Surveying and Evaluating Impacts to Special Status Native Plant Populations and Natural Communities.\"\nThe purpose of these protocols is to facilitate a consistent and systematic approach to the survey and assessment of special status native plants and natural communities so that reliable information is produced and the potential of locating a special status plant species or natural community is maximized. This universal understanding of the quality and methods is accepted broadly by experts and resource agency reviewers.\nExecutive Order (E.O.) 13112 signed February 3, 1999 requires Executive agencies to work cooperatively to prevent and control the spread of invasive plants and animals. This E.O. was followed by Federal Highway Administration (FHWA) Guidance on Invasive Species dated August 10, 1999. On October 22, 1999, Caltrans issued a memo to implement the FHWA guidance (found in SER Policy Memo Section). The Guidance states that FHWA will not give final NEPA compliance for an action unless appropriate analysis of the probability of the action to cause or promote the introduction or spread of invasive species has been accomplished. If analysis indicates that the disturbances caused by the action have the potential to promote the introduction or spread of invasive species, all feasible and prudent measures taken to minimize this likelihood will be identified.\nAccording to the Guidance, it is required that Caltrans use the state noxious weed list to define invasive plants until such time as a National List is developed. The National Invasive Species Council was established in 2001 and maintains a collection of databases related to invasive species throughout the country. This database source has taken the place of a “national list” and should be used in the evaluation of invasive species in the BSA.\nGiven the variety and number of wildlife species and types of habitats found in California, it is impossible to present all of the techniques for surveying each species and type of habitat. As mentioned previously, all wildlife surveys are conducted during a species active period, such as nesting or migration. In cases when surveys must be conducted at times that animals are less likely to be observed, a thorough investigation of the animal's potential habitat should be made. Investigations and careful record keeping should report the presence (e.g., tracks, scat, nests or dens, trails, or any other indicators) that are specific to the animal. The surveys for wildlife must be commensurate with the magnitude of the project and the importance of potential effects to the expected resource. Specialized surveys are usually reserved for those instances where a sensitive resource is expected in the BSA. Surveys for many of the species listed as threatened or endangered must follow a specified protocol established by DFG or FWS and may require a permit (e.g., California red-legged frog survey protocol by FWS).\nThe DFG Survey and Monitoring Protocols and Guidelines contains specified survey protocols for plants, invertebrates, amphibians, reptiles, birds, and mammals. The protocols and guidelines available are from various sources and are recommended as tested and reviewed methods for their intended purposes. These purposes include determining the presence or support for a negative finding (e.g., habitat not suitable) for a particular species or its local status. In some cases, these protocols and guidelines represent what DFG believes to be the best available methodology. The FWS has issued Survey Protocols and Other Guidelines for federally listed, threatened, endangered species. FWS also maintains a list of plants and animals native to the United States that are candidates or proposed for possible addition to the Federal list, as well as other guidance concerning wildlife survey techniques.\nA California Native Species Field Survey Form should be completed and sent to CNDDB when sensitive species are located. The information requested in the survey form includes the location of the species (e.g., county, landowner, GPS location), habitat description (e.g., plant communities, dominants, associates, substrates/soils, aspects/slope), site information (e.g., overall site, occurrence quality/viability, etc.), animal information (e.g., number of adults, juveniles, larvae, etc.), and plant information (e.g., phenology).\nA sampling of references that describe wildlife survey techniques is presented. However, this is not an exhaustive list. Protocols for conducting wildlife surveys must be chosen carefully to ensure the results are appropriate for the circumstances. Each biologist must select the methods with which they feel most comfortable.\nBrookhout, T. A., editor. 1994. Research and management techniques for wildlife and habitats. The Wildlife Society, Bethesda, MD. 740 pp.\nCooperrider, A. Y., R. J. Boyd, and H. R. Stuart, editors. 1986. Inventory\nand Monitoring of Wildlife Habitat.\nU.S. Department of Interior, Bureau of Land Management, Service Center. Denver, CO., 858 pp.\nDavis, D. E. 1990. CRC Handbook of Census Methods for Terrestrial Vertebrates. CRC Press. 375 pp.\nHays, R. L., C. Summers, and W. Seitz. 1981. Estimating Wildlife Habitat\nVariables. FWS Report\nFWS/OBS- 81/47. 111 pp.\nLeedy, D. L. and L. W. Adams. 1982. Wildlife Considerations in Planning and Managing Highway Corridors. FHWA Report. FHWA-TS-82-212. 93 pp.\nMeese, Robert J., Shilling, Fraser M., Quinn, James F., and California Department of Transportation,\nEnvironmental Division, supervised by Amy Pettler. 2007. Wildlife Crossings Guidance Manual and associated Wildlife Crossings Website.\nNathanson, J. A., M. Lanzafama, and P. Kissam. 2006. Surveying Fundamentals and Practices, 5/E.\nPrentice Hall. 512 pp.\nRalph, C. J., G.R. Geupel, P. Pyle, T.E. Martin, and D.F. DeSante. 1993.\nHandbook of Field Methods for\nMonitoring Land Birds. Pacific Southwest Research Station Report. PSW-GTR-144. 41 pp.\nTechnical documents do not include the “determinations of significance,” rather the District Biologist evaluates the effects of the project on the biotic resources in the BSA and reports them in the technical documents. This evaluation of the direct and indirect effects (as discussed in Section 2-3.2), the long-term and/or short-term effects, and the cumulative effects resulting from the project are used by the PDT in the determination of significance to report in the Environmental Document.\nPer NEPA guidelines, effects are evaluated by assessing the context and intensity. Context and intensity are defined by the CEQ Regulations (see Vol. 1 of the SER).\nCEQA Guidelines has similar approaches to determine the level of effects.\nA brief synopsis of mitigation is discussed in this chapter as it pertains to the NES. A detailed discussion can be found in Chapter 5 of Volume III, Mitigation and Monitoring.\nThe District Biologist takes the lead in developing and implementing biological mitigation measures for the proposed action. Only mitigation measures approved by Caltrans management in conjunction with the resource agencies requesting the measures will be discussed in the mitigation section of the NES. All approved mitigation measures are included in the environmental documents. Recommendations from consultants concerning mitigation measures and significance will not be included in the NES, but are discussed in the Official Memo transmitting the consultant document to the Contract Administrator.\nMitigation development is coordinated with the appropriate resource or regulatory agency (USACE, FWS, DFG, NMFS , Coastal Commission, etc.) and all Caltrans programs affected by the proposed measures. Development of the mitigation plan may involve Design, Construction, Landscape Architecture, Maintenance, Hydraulics, and Environmental.\nIn some cases the District Biologist must produce a Mitigation Plan, separate from the NES, which outlines measures to avoid, reduce, or offset adverse biological effects associated with transportation projects. This plan will inform personnel associated with the project of the agreed upon mitigation measures, the goals and objectives to be achieved, procedures for their implementation, and practicable monitoring techniques.\nMitigation measures as defined in the CEQ Regulations (40 CFR Part 1508.20) shall include:\n- Avoiding the effects altogether by not taking a certain action or parts of an action;\n- Minimizing effects by limiting the degree or magnitude of the action and its implementation;\n- Rectifying the effects by repairing, rehabilitating, or restoring the effected environment;\n- Reducing or eliminating the effects over time by preservation and maintenance operations during the life of the action; and\n- Compensating for the effect by replacing or providing substitute resources or environments.\nThe level of mitigation required will be a consequence of the significance of the effects on the biotic resources.", "label": "No"} {"text": "Considering Children who are DLLs in Emergency Planning\nEvents in the news have many schools and programs taking a second look at their emergency plans. Let’s think what an emergency – or even a simple fire drill – must be like for a young child who doesn’t fully understand the language!\nEstablish class buddies – a more experienced, more fluent or more confident child can help a newcomer through drills and actual emergencies.\nEstablish family buddies too – a more experienced family can connect with new families to make sure they understand emergency procedures and they can be a familiar contact to answer questions.\nCreate a video of your school’s fire drill or sheltering procedures to make it easier for new families to understand and to explain to their children.\nSimplify written policies to be sure that families who are new to English or who have lower literacy levels can truly understand these important messages.\nSimplified materials are also easier to have translated in all of the languages needed in your program. Keep language info with emergency contact list to assist authorities in communicating with families.\nUse multiple means of communicating so everyone has a chance to receive and comprehend messages – phone, text, or email.\nCreate picture cues – a list of photos or icons for specific notices – such as a lock with a time on it to indicate school is closing early. Use these as text messages to families or as visual cues to children about what is happening in an emergency.\nTake families and children on a walking tour of your building and of nearby places where you will shelter in an emergency – this is better than handing out a written policy and hoping they understand what’s in it.\nUpdate regularly! Double check emergency contact information with all families on a regular basis and provide periodic reminders and clarifications about emergency procedures so no child or family is overlooked.\nLearn about each family’s culture and experiences so you can create culturally sensitive emergency plans and information. Children and families who have come from experiences of violence or natural disaster may react in unexpected ways and may need additional reassurance.", "label": "No"} {"text": "If life gives you lemons, make a lemonade stand\nShortly before her first birthday, Alex Scott was diagnosed with neuroblastoma, the second most common type of cancer in childhood. This meant that Alex’s years to follow were not just benchmarked with learning new words, how to eat solids and all the basics of early development, but sadly with medical procedures, tests, and a great deal of pain and fear.\nJust after turning four, Alex received a stem cell transplant. Before leaving the hospital, she told her mother she wanted to open a lemonade stand to raise money to help other children fight cancer. Her mother warned of how difficult it was to raise a lot of money selling lemonade, but Alex was undeterred and persistent: ‘I’ll do it anyway’. Remarkably, despite her mother’s caution, by the end of that year she and her elder brother had managed to raise approximately 2,000 dollars.\nAlex’s bravery and generosity are no doubt exceptional, but how rare is it for children of such young age to express such concerns and take action for the greater good? Alex’s early moral inclinations certainly challenge the traditional view of children’s morality as poor and fragile, such as that advanced by Jean Piaget in the 1930s. More broadly, her story also challenges a view of morality as externally imposed, a layer covering up natural selfish instincts. This raises the question: is morality really an acquired taste?\nEarly emergence of morality\nRecent research in child development has revealed that children live rather sophisticated moral lives. In a ground breaking study from 2007, Kiley Hamlyn and colleagues found that 6 month old infants can tell who is friend and who is foe just by watching how they treat others. From their parent’s laps, infants watched a puppet show that included a character helping another climb a steep hill (the ‘helper’), and a character who instead actively pushed the other down the hill (the ‘hinderer’). After the show, infants were given the chance to choose one of these two puppets. Much to their parents’ relief, infants overwhelmingly approached the helper over the hinderer. This would suggest that infants seem able to extract the moral value behind other people’s actions.\nAs it turns out, evidence would suggest that infants do not only possess the capacity to implicitly judge others’ moral actions, but also take justice into their own hands. In a follow up study, researchers used the same puppet show setup, but gave participants the chance to give a ‘treat’ to either the helper or the hinderer. Even toddlers under 2 years old were more likely to give the ‘treat’ to the prosocial than the antisocial puppet, revealing intuitions that look like adult conceptions of reward and punishment toward good and bad behaviour.\nIn preschool years, more complex forms of moral action emerge. For example, a recent study reported that 3 year olds protested when they saw a puppet destroying someone else’s object or taking it away without permission, and spontaneously returned the object to the victim. In another experiment, children were shown to be more likely to help a victims if they had themselves (accidentally) destroyed their toy (for example, by knocking down their block tower) than when someone else did it. This suggests that complex moral feelings such as guilt may already be present and motivate behaviour at an early stage.\nChildren and the social sphere\nChallenging traditional views, these findings indicate that children have a strong moral sense. They interpret actions as good or bad, right or wrong, deserving of praise or deserving of punishment. Most importantly, these judgments shape and guide their behaviour and social preferences, in ways that are similar to what is expected from adults’ social choices.\nDespite the sophisticated nature of their moral experiences, it is surprising that children are mostly excluded from practices of civic life and decision making about policies that affect them. Even those who have already reached late childhood or adolescence are rarely given opportunity to engage in public debates relating to character and ethics and to act on issues of common concern.\nTwenty years ago, Moss and Petrie (1997, p. 15) had claimed that it was ‘time to welcome children, with all their diversity, as young citizens, equal stakeholders with adults in a common social enterprise.’ Twenty years later we still seem to lack resources and organisational structures to promote children’s moral participation and civic engagement (but click here for evidence that the landscape is changing).\nAlex Scott’s legacy\nAt the beginning of this post I mentioned that Alex’s lemonade stand had raised 2,000 dollars for cancer research. But that was not the whole story. Alex carried on selling lemonade every year and, as her inspiring story spread, other children decided to build their own lemonade stands and to donate funds to support her cause. Alex passed away at the age of 8, having raised more than a million dollars to help fight the disease that took her life.\nBesides her incredible support for cancer research, Alex left us another legacy: the hope that exceptional outcomes can be achieved through children’s involvement in community affairs. Morality may be bred in the bone, but it is our responsibility to create spaces for children to exercise citizenship rights and duties, such that their sensitivity and enthusiasm are channelled to the causes they – and we all – care about.\nHamlin, J. K., Wynn, K. & Bloom, P. (2007). Social evaluation by preverbal infants. Nature 450, 557-559.\nHamlin, J. K., Wynn, K., Bloom, P., & Mahajan, N. (2011). How infants and toddlers react to antisocial others. Proceedings of the National Academy of Sciences, 108, 19931–19936.\nMacNaughton, G., Hughes, P. & Smith, K. (2008). Young children as active citizens: Principles, policies and pedagogies. Cambridge Scholars Publishing.\nMoss, P. & Petrie, P. (1997). Children’s services: Time for a new approach: A discussion paper. Institute of Education, University of London.\nPiaget, J. (1932). The moral judgement of the child. New York, NY: Harcourt, Brace.\nVaish, A., Carpenter, M., & Tomasello, M. (2016). The early emergence of guilt-motivated prosocial behavior. Child Development, 87, 1772-1782.\nVan de Vondervoort, J. W. & Hamlin, J. W. (2015). Young children remedy second- and third-party ownership violations. Trends in Cognitive Sciences, 19, 490–491.\nAbout the Author\nGabriela Pavarini is a postdoctoral researcher at the Department of Psychiatry, University of Oxford. She works on the Citizens: Early Intervention Ethics study under the BeGOOD flagship project.\nThis blog post is based on the opinions of the author and does not necessarily represent the views of the University of Oxford or the Oxford Department of Psychiatry.", "label": "No"} {"text": "Re-wiring Student Perceptions of What a Student Is\nMetadataShow full item record\nAt times it is necessary to reframe instructors’ thinking about what a student is. Within this process of reframing, instructors can find a new identity for themselves in both the in-class and online environments. Techniques for turning control of content over to the students are discussed, including using the students as classroom lecturers. The principle employed in this approach is that if a person learns content well enough to teach it, then real learning has taken place.", "label": "No"} {"text": "Many individuals develop lichen planus. It is a condition that develops on one or several parts of the body. It can manifest on the skin or within the mouth. Oftentimes, it can develop in both areas.\nIt is important to note that lichen planus can even change the appearance of the toenails and fingernails. In addition, it can manifest on the scalp or genitals. Luckily, the condition is not contagious.\nWhat are the indications?\nIf lichen planus develops on the skin, it results to lumps that are firm, shiny and reddish or purple in color. Oftentimes, the bumps have small-sized white lines that run through them which are called Wickham’s striae.\nMany individuals develop a few bumps that can manifest on various parts of the body. The usual spots for these bumps include the lower back, wrists and ankles but can occur anywhere on the skin including the genitals. If an individual develops lichen planus on the skin, the following can be observed:\n- Dense patches of scaly, rough skin – if these bumps appear in the same place, dense patches of scaly, rough skin forms. These develop over time and quite common on the shins and around the ankles.\n- Blisters can develop but considered rare\n- Pain particularly on the genitals – the skin can be bright red and raw. Over time, open sores can manifest that makes sexual activity painful or impossible.\nOnce lichen planus develops within the mouth, it occurs in the interior of the cheeks as well as the lips, tongue and gums. If inside the mouth, the following occur:\n- Redness and swelling\n- Areas of small-sized white dots and lines that appear like lace\n- Peeling on the gums\n- Painful sores\nWhen diagnosing lichen planus, the doctor will simply check the skin, nails and mouth. One way to confirm a diagnosis is by assessing a skin sample in the laboratory. Oftentimes, a blood test is also required to rule out other conditions.\nRemember that there is no available cure for lichen planus since it often settles on its own. If the symptoms become bothersome, the treatment aims on providing relief and hasten the healing. The commonly used treatment for the skin include the following:\n- Antihistamines to alleviate the itchiness\n- Corticosteroids such as prednisone can be used if the condition lasts for an extended period or the individual has several bumps or painful sores.\n- Topical corticosteroids in ointment or cream form are used to minimize the swelling and redness", "label": "No"} {"text": "|Beauty of Nature Can Be Deceiving||| Print ||\nLightning may be one of the most beautiful and awesome forces of nature, it is also one of the most deadly. Although elevations, such as mountains, buildings, antenna, trees, and power lines receive frequent lightning strikes, lightning will also strike flat terrain, such as baseball diamonds, parks, farm fields. Those are all places where a person may be the highest point around, and become a path to the ground for thousands of volts of nature’s deadly electricity.\nBut even if you are not the highest point around, do not stand near flag or power poles, bleachers, or other objects that may attract a cloud to ground discharge. Animals and humans, who frequently seek cover under trees at the onset of rain, have become casualties when lightning struck the tree.\nAn old adage that warns, “Beware the oak, it draws the stroke,” refers to the fact that hardwood trees serve as better lightning conductors than softwood trees. And in fact, that was the reason the Ancient Greeks and Romans decorated the heads of their leaders and heroes with laurel leaves, knowing the soft-fibered laurel rarely was hit by lightning.\nIf you hear thunder or see a storm approaching, it is no time to find your handy tree identification guide. Instead, seek shelter where you will not be hit by lightning, or be near the point of contact with the Earth and become a burn or electrocution victim.\nStay away from open vehicles, metal framed open canopies, or any tall metal object. Seek shelter in a building which is grounded.\nIf someone is struck by lightning, call 911 and care for the victim immediately. Richard Butler tried to administer CPR for Bethany Lott for 15 minutes, but without success. Because of their elevation in the North Carolina Mountains, his cell telephone unfortunately did not have service.\nHeed the motto “If thunder roars, go indoors.” If you see lightning, seek shelter immediately.", "label": "No"} {"text": "Communication in a Diverse Classroom: An Annotated Bibliographic Review\nMetadataShow full item record\nStudents have social and personal needs to fulfill which they communicate these different ways. This annotated bibliographic review examined communication studies to provide educators of diverse classrooms with ideas to build an environment that contributes to student well-being. Participants in the studies ranged in age, ability, and cultural background. A bibliographic matrix included findings that showed positive correlations between the instructional environment and higher levels of student motivation, engagement, learning, and conduct. Differences in perspectives of traditional values within Western settings and the importance of intervention strategies to improve social and language communication skills were noted. The researcher concluded that effective communication practices, cultural awareness, and communication skills promote the fulfillment of students’ needs.", "label": "No"} {"text": "Reader Ben submitted a website that provides another perspective into the will of the people rather than the will of legislators. It is the referendum or public initiative. A referendum is a petition signed by enough citizens that it qualifies to be on a ballot along with the vote for elected officials. It is true that state legislatures may submit a referendum as well. The importance of referenda is that they are driven by pure populism; it is the mood of the people at the street corner. There is no better source about the American attitude than to track ballot initiatives based on signatures of individual voters proposing legislation. Ben recommended a very rich source for learning about the world of public initiatives. See:\nReferenda are proclamations that rise out of discontent by the common masses. Typically, they are confrontational declarations reflecting a dissatisfied and often constrained public. While referenda allow the lowest personal emotional attitude to be expressed, the referendum process also demonstrates the fallacy of populist resistance.\nFor example, in California, a tax referendum was proposed that would change the state’s well being through to today (source: Wikipedia):\nProposition 13 (officially named the People’s Initiative to Limit Property Taxation) was an amendment of the Constitution of California enacted during 1978, by means of the initiative power. It was approved by California voters on June 6, 1978. It was declared constitutional under federal law by the United States Supreme Court in the case of Nordlinger v. Hahn, 505 U.S. 1 (1992). Proposition 13 is embodied in Article XIII A of the California Constitution. Proposition 13 has been part of the California Constitution for 38 years, 2 months, and 25 days.\nThe most significant portion of the act is the first paragraph, which limited the tax rate for real estate:\nSection 1. (a) The maximum amount of any ad valorem tax on real property shall not exceed one percent (1%) of the full cash value of such property. The one percent (1%) tax to be collected by the counties and apportioned according to law to the districts within the counties.\nThe proposition decreased property taxes by assessing property values at their 1975 value and restricted annual increases of assessed value of real property to an inflation factor, not to exceed 2% per year. It also prohibited reassessment of a new base year value except for in cases of (a) change in ownership, or (b) completion of new construction.\nIn addition to decreasing property taxes, the initiative also contained language requiring a two-thirds (2/3) majority in both legislative houses for future increases of any state tax rates or amounts of revenue collected, including income tax rates and sales tax rates. It also requires a two-thirds (2/3) vote majority in local elections for most local governments proposing to increase special taxes.\nThe impact of this initiative brought the California government to its knees. Every category dependent on property taxes essentially went bankrupt – especially education. It remains this way today because the initiative requires a two-thirds vote to change it.\nAlternatively, in many states, ballot initiatives have moved the role of marijuana toward legitimacy – in spite of Federal resistance.\nThere are two ideas in play that often are lumped together but in fact are clearly different. One is populism, which is an action in resistance or rebellion; the other is egalitarianism, which is a philosophy of government often in conflict with capitalist attitudes. The following is from a Stanford University tract:\nEgalitarianism is a trend of thought in political philosophy. An egalitarian favors equality of some sort: People should get the same, or be treated the same, or be treated as equals, in some respect. An alternative view expands on this last-mentioned option: People should be treated as equals, should treat one another as equals, should relate as equals, or enjoy an equality of social status of some sort. Egalitarian doctrines tend to rest on a background idea that all human persons are equal in fundamental worth or moral status. So far as the Western European and Anglo-American philosophical tradition is concerned, one significant source of this thought is the Christian notion that God loves all human souls equally. Egalitarianism is a protean doctrine, because there are several different types of equality, or ways in which people might be treated the same, or might relate as equals, that might be thought desirable. In modern democratic societies, the term “egalitarian” is often used to refer to a position that favors, for any of a wide array of reasons, a greater degree of equality of income and wealth across persons than currently exists. End quote.\nThe philosophy of egalitarianism and the emotional act of populism have the same objective but require different processes for implementation. Egalitarianism requires a government which governs a culture of equality while populism does not require a pairing of government oversight with public attitude.\nHowever, expediency is a tool of change. Bookmark Ben’s link.", "label": "No"} {"text": "|Abraham and Sarah (Providence Lithograph Company – Public Domain/Wikimedia Commons)|\nIn Tractate Bava Metzia of the Babylonian Talmud, we find a midrash explaining that the Israelites benefit later on as a result of Abraham’s kindness to these strangers:\nRab Judah teaches in Rab’s name: Everything which Abraham personally did for the Ministering Angels, the Holy One Blessed be God did for God’s children [the Israelites]; and whatever Abraham did through a messenger, the Holy One Blessed be God did for God’s children through a messenger [Moses].\nTherefore, just as Abraham ran to the herd to get a tender calf to cook for his guests, a wind from God started up and swept quail from the sea and strewed them over the camp (Numbers 11:31). Just as Abraham took butter and milk, God rained bread from heaven for the Israelites (Exodus 16:4). As Abraham stood by the guests under the tree, God stood before them upon the rock at Horeb (Exodus 17:6). And like Abraham went with them to bring them on the way, God went before the Israelites in a pillar of cloud by day (Exodus 13:21). Finally, Abraham had water fetched for the three men, and similarly God commanded Moses to strike the rock for drinking water to come out of it for the Israelites (Exodus 17:6).\nAbraham’s hospitality serves as a wonderful example for us all. The parsha begins with God visiting Abraham at the entrance of his tent, but as soon as the three men appear, Abraham turned away from God to attend to these guests. In so doing, he teaches us that hospitality (hachnasat orchim) is a significant mitzvah and value for us.\nThere are three fall holidays on which hachnasat orchim is emphasized. They are not all religious holidays, but we learn from their message nevertheless. The first of these is the pilgrimage festival of Sukkot, which began exactly one month ago this evening. On these eight holy days (seven in Israel), we invite Ushpizin (Aramaic for “guests”), or distinguished individuals from our people’s history, into our sukkot. Traditionally, we invite Abraham, Isaac, Jacob, Moses, Aaron, Joseph, and David to join our families each night of the holiday. The more progressive and egalitarian among us include some illustrious women who made their mark on the Jewish people as well, including Sarah, Miriam, Deborah, Hannah, Abigail, Hulda, and Esther.\nIn addition to these Biblical guests, it is important for us to open our sukkot to others as well, and especially to those who do not have sukkot in their own backyards and those unfamiliar with the tradition. This year, my family invited any student who wanted to join us for a barbeque on the Sunday night of Sukkot. Over seventy undergrads and graduate students, religious and secular, Jewish and non-Jewish, visited our sukkah and had the opportunity to recite the blessing of dwelling in the sukkah. I was proud to demonstrate this message of hospitality to my two-year-old son.\nWhile the Halloween tradition is not celebrated among all American Jewish families because of its pagan roots, there is a positive side to its celebration as well. In today’s hectic times, neighbors so infrequently visit one another. The days of neighborhood kids, let alone their parents, dropping in on one another to say hello and shmooze is long gone. Yet, on Halloween, millions of children and their parents trek around the neighborhood ringing doorbells, offering greetings, and sharing candy. Ideally, this ritual would encourage some to invite their neighbors inside their homes to visit and become acquainted. For many, the Halloween experience is quite likely the first time they see the inside of their next-door neighbors’ homes. Therefore, for those who find Halloween a problematic enterprise, the opportunity for hachnasat orchim will hopefully serve as a positive.\nFinally, the Thanksgiving holiday is inching upon us and this year we will celebrate the first day of Hanukkah on Thanksgiving as well. This festive affair is an opportunity for us to gather with friends and family, consider all the good in our lives, and give thanks to God for our good fortune. It is also a time for us to consider making room at our table for strangers to join us.\nOpening our homes to guests on Thanksgiving is a way to share the experience with others and demonstrate our value of hachnasat orchim. With a mother who works in residential real-estate, our family always had strangers at our Thanksgiving dinner table. Each year, my mother would invite those clients who had recently bought new homes and relocated to Michigan and did not have family nearby. This quickly become an annual minhag (custom) and encouraged us to be even more grateful on Thanksgiving that we were able to celebrate together with family. And this year we’ll be able to invite guests to our Thanksgiving table and also share in the celebration of Hanukkah and its beautiful rituals.\nThe Jewish people place much emphasis on hospitality. We marry under a chuppah that is open on all sides to remind us of the mitzvah of hachnasat orchim. As we study the example demonstrated by our patriarch Abraham and our matriarch Sarah to welcome the stranger and make them feel at home, let us strive to be better hosts.", "label": "No"} {"text": "The Egyptian tomb of Qar has in its decoration program a funerary ceremony with all the main components. However it seems that there is missing a very typical image of Egyptian funerals: the lament.\nAmong all the images there is no scene showing a group of mourning women as we can see, for instance, in the mastaba of Mereruka or in the adjacent tomb of Idu.\nBut we know now that Qar (or the main artist) decide to codify or summarize the funerary rituals in the walls of his tomb. For that reason the Opening of the Mouth ceremony (the main Egyptian ritual for regenerating the mummy) seems to be represented (see posts of 13th and 22nd January), although not in an explicit way.\nIt could also be possible that something similar happened with the mourning practice. Reading at the translation of the inscriptions made by Simpson, we find that above the dancing women who are in front of the tomb (uabet building) the scribes wrote: “mourning by the two acacias”. It is obvious that the women below are dancing and clapping hands and not mourning. And does it make sense two trees mourning?\nThe Egyptian word shenedjet mainly means “acacia”, but it is also the holy tree which mythically protects the tomb of Osiris, and in the text it is written with a dual form (shenedjety) , so it refers to two. The pairing usually protecting Osiris is Isis-Nephtys, as it is proven in iconography and literature.\nCould we then think that again we are facing a codified / summarized information? The expression “the mourning (made) by the two acacias” would be then referring to the image or the fact of the two mourners in the role of Isis and Nephtys mourning for Qar.\n Simpson, William K., The Mastabas of Qar and Idu. G 7101 and G 7102. Vol. 2. Boston. 1976, p. 6\n Wb IV, 521, 4", "label": "No"} {"text": "Smoking and Lung Cancer\nSmoking is the number one cause of primary lung cancer, according to the American Lung Association. Eighty-seven percent of lung cancer cases are caused by smoking. Cigarette smoke contains more than 4,000 chemicals, many of which are proven carcinogens. Cigars and pipes also boost the risk for lung cancer.", "label": "No"} {"text": "Floating Photovoltaics (FPV) is the term for PV power plants that consist of modules mounted on buoyant elements that float on standing water bodies such as pit lakes or reservoirs or on the sea. FPV has shown very dynamic growth in recent years, with systems for more than 1.1 GW power installed by the middle of 2018.\nIn Germany, pit lakes from open-cut mining, former gravel pits and, in some cases, reservoirs are potential locations. The first German FPV plant on a converted gravel pit near Renchen in Baden has been connected to the grid since the end of May 2019 and has an installed power rating of just on 750 kW. Most of the generated electricity is consumed by the neighbouring gravel excavation plant.", "label": "No"} {"text": "The Civil War History of the 57th Indiana (#15)\nPrelude to the Battle of Stones River, Tennessee\n“Our numbers were largely increased by the arrival of one full company of drafted men from Indiana, who had been sent to the 57th by Gov. Morton.\n“We remained in camp near Nashville just one month, having arrived on the 26th of November, and left on the 26th of December. This was the first incidence in which we had the privilege of remaining more than two weeks in the same camp. While there, our time was mainly employed in drilling, and procuring the necessary clothing and equipment for a winter campaign. Long before daylight on the 26th, the thousands of camp fires that shone brightly throughout the army and the scenes of activity that prevailed, gave evidence that a move of no small importance was just at hand. The men were ordered to carry, besides their guns and equipment, three days’ rations in haversacks, oil-cloths, and overcoats.\n“On Saturday the 27th, our division had the front. The first duty was to dislodge the enemy from the village, where they were strongly posted. Hascall’s brigade formed in line of battle and moved forward; our brigade being massed immediately in their rear. The force now contesting our advance consisted mainly of cavalry, and their resistance was so obstinate that we were until in the evening driving them to and across Stewart’s Creek. Marching through the wet brush, our clothing was thoroughly drenched from the dripping branches, and constant tramping in the mud and water under foot. From a battery posted on the south bank, they kept up a constant fire, which was responded to by our artillery. As our regiment arrived at the brow of the hill, they were perceived by the rebel gunners who fired a shell which passed the entire length of the regiment, just over the heads of the men. But fortunately, it did not explode until it had passed. Had the first shot been fired only a little lower, it would have made great havoc in our regiment.\n“The coming darkness soon put an end to the firing, and the men made preparations to pass the night. Large fires were built of rails, which we now used with an unsparing land. In our front was a large cotton field; and near was a house well filled with fine, clean cotton. This was discovered in due time by the men, and large quantities of it were carried up and used for bedding. Gen. Rosecrans rode over near out camp; and seeing the cotton which we had used, remarked, ‘The men can use it for the night, but it must be returned in the morning.’\n“The men of the regiment received no orders for battle - they rarely ever do until it has commenced - though here seemed to be a settled conviction upon the minds of all that they soon would be drowned in the noise of battle. No one now thought of retreating. The Army of the Cumberland would now face the foe upon the field and prove, by deeds of valor, that they could fight.”\n(Tennessee, December, 1862)\nExcerpts taken from “Annals of the Fifty-Seventh Regiment, Indiana Volunteer Infantry: Marches, Battles, and Incidents of Army Life” written by Asbury L. Kerwood immediately after the war.", "label": "No"} {"text": "Recent Research on Pet Therapy and Cannabidiol (CBD)\n- National Cancer Institute Animal Studies\nCannabinoids are a group of 21-carbon–containing terpenophenolic compounds produced uniquely by Cannabis species (e.g., Cannabis sativa L.) . These plant-derived compounds may be referred to as phytocannabinoids. Although delta-9-tetrahydrocannabinol (THC) is the primary psychoactive ingredient, other known compounds with biologic activity are cannabinol, cannabidiol (CBD), cannabichromene, cannabigerol, tetrahydrocannabivarin, and delta-8-THC. CBD, in particular, is thought to have significant analgesic and anti-inflammatory activity without the psychoactive effect (high) of delta-9-THC.\n- Cannabinoid Receptor Type 1 & 2 Expression In The Skin Of Dogs\nThe endocannabinoid system and cannabimimetic compounds protect against effects of allergic inflammatory disorders in various species of mammals. Results of the present study contributed to knowledge of the endocannabinoid system and indicated this system may be a target for treatment of immune-mediated and inflammatory disorders such as allergic skin diseases in dogs.\n- Targeting Cannabinoid Agonists For Inflammatory & Neuropathic Pain\nThere has been a growing interest in developing cannabinoid agonists. Many new cannabinoid ligands have been synthesized and studied covering a wide variety of novel structural scaffolds. This review focuses on the present development of cannabinoid agonists with an emphasis on selective CB(2) agonists and peripherally restricted CB(1) or CB(1)/CB(2) dual agonists for treatment of inflammatory and neuropathic pain.\n- Behavioral Effects Of Cannabinoid Agents In Animals\nTwo subtypes of cannabinoid receptors have been identified to date, the CB1 receptor, essentially located in the CNS, but also in peripheral tissues, and the CB2 receptor, found only at the periphery. The identification of delta9-tetrahydrocannabinol (delta9-THC) as the major active component of marijuana (Cannabis sativa), the recent emergence of potent synthetic ligands and the identification of anandamide and sn-2 arachidonylglycerol as putative endogenous ligands for cannabinoid receptors in the brain, have contributed to advancing cannabinoid pharmacology and approaching the neurobiological mechanisms involved in physiological and behavioral effects of cannabinoids. Cannabinoid-related processes are shown to be involved in cognition, memory, anxiety, control of appetite, emesis, inflammatory, and immune responses.\n- Comparative Metabolism Of Cannabidiol In Dog, Rat and Man\nThis study concludes that CBD could be used as a probe of the mechanism of several types of biotransformation, particularly those related to carboxylic acid metabolism, as intermediates of the type not usually seen with endogenous compounds were excreted in substantial concentration.\nInformation on Pet Health Conditions\nDogs and cats are susceptible to many of the same illnesses as people. This is why many of the conditions CBD is effective for in humans is similarly effective in animals. Follow the links below to read more about some of the most common canine and feline diseases and conditions.", "label": "No"} {"text": "A conflict occurs when the actions of one party attempting to reach its goals prevent, block or interfere with the actions of another party attempting to reach its goals.\nIf the two parties have mutual goals, they will work in cooperation with each other. If their goals are opposed, they will experience conflict.\nThe definition of conflict varies from person to person and ranges from minor disagreements, antagonism and incompatibility, to hostile, heated arguments, bullying and even physical violence.\nConflict can also mean:\ndistress due to opposition of incompatible wishes etc. within a person.\nThis article focuses on conflict within relationships. That is, how to cope with disagreements.\nWhen we talk about physical fighting, most people would agree that this sort of conflict is not desirable or healthy, and should be avoided. However, even when referring to everyday disagreements, many people say things like: \"I don't like conflict\" or \"I avoid conflict at all costs\" .What they are in fact referring to here, is disagreement - they don't like disagreeing with others and avoid it at all costs. This usually happens for one of the following reasons:\nFear of not being seen as a 'nice' person;\nFear of being seen as a trouble causer;\nThe (mistaken) belief that they are doing the right thing/a good thing.\nThe truth is, avoiding conflict is unhealthy, and can lead to patterns of interaction that are destructive in the long term.\nPeople are unique. There are no two people exactly the same, and no matter how similar they are, there will always be ideas, issues, situations etc. on which they disagree. This is to be expected, and is not a problem in itself. It does become a problem, however, if the point of disagreement cannot be discussed, as this usually ends up causing more stress for all concerned. This happens because the resentment starts to fester and tension rises. What then happens is one of two things:\nThe person eventually explodes in inappropriate ways or situations. The person ends up blurting out their frustration and anger in a hurtful way. Instead of discussing the issue with the person concerned in a calm and respectful manner, they may complain to anyone and everyone else who will listen. We have all heard people moaning about their partners in this way. Perhaps you have heard someone complaining about the service after they have left the restaurant, instead of speaking calmly to the manager about their issues? Perhaps you have heard someone complaining about their spouse to anyone who will listen (sometimes deliberately in earshot of their spouse!)\nThe person bottles up their frustration and resentment, feels more and more hard done by, and eventually becomes depressed.\nThe healthy approach is to address and resolve conflict with the person concerned in a respectful manner.\nIf we want to be assertive - open, clear and honest so others know where they stand with us - we need to be prepared to open up points of disagreement for discussion. Raising the disagreement does not have to lead to an argument, but it should lead to a conversation or discussion. If both parties are listening to each other, it can be a valuable and constructive growth experience. The fact that we can cope with disagreement/ conflict is far more important to a relationship than not having disagreement/conflict.\nConflict in itself is not bad. Knowing how to deal with it is what counts. If we know how to cope with conflict, we will learn to be less fearful of it and learn to use it to enhance our relationships, be they personal, social or work related.\nView conflict as an opportunity to analyse the situation objectively; assess the needs of all concerned; and come up with healthy solutions. Viewed in this way, conflict becomes an opportunity to create stronger relationships, creative solutions and clearer communication.\nThe Five Conflict Strategies\nThere are five basic strategies we can use to manage conflicts. Each of these strategies is appropriate at different times. Which strategy you use depends on the ratio of how important the goals are to you, versus how important the relationship is to you.\nSmoothing – The Teddy Bear\nThe Teddy Bear is always there for you\nWhen a friend/colleague feels strongly about something and you could not care less, then smoothing would be the most appropriate strategy.\nIf you act like a Teddy Bear, you give up your goals in order to maintain the relationship at the highest possible level.\nWhen another person's interests are much stronger or more important than yours, smooth and give the other person their way. Example: Giving up the parking bay closest to the door, to a wheelchair-bound colleague.\nWithdrawing – The Tortoise\nThe tortoise retreats from everything\nWhen a situation is dangerous to you or out of control, then withdrawing might be the most appropriate strategy.\nIf you act like the tortoise, you give up both your goals and the relationship - you avoid the other person and the issue. Example: When being mugged.\nForcing - The Shark\nNobody gets in the way of the shark\nWhen it is important that your goals are achieved and you don't care whether you have a relationship with the other person or not, then forcing would be the most appropriate strategy.\nIf you act like a shark, you try to achieve your goals at all costs. Example: Captain on a ship insisting that safety procedures are followed by his crew.\nCompromising – The Fox\nThe fox is cunning & gets something\nWhen it appears that neither party can get what they want, compromising may be the most appropriate strategy.\nIf you act like a fox, you give up part of your goals and sacrifice part of a relationship that is moderately important to you. Example: He wants to take you out to the movies. You want to stay home and sew. You agree to stay home and watch a DVD together, while you do some hand sewing.\nNegotiating - The Owl\nWise old owl uses her head for the best\nIf both your goals and the relationship are important to you, negotiating would be the most appropriate strategy.\nIf you act like an owl, you initiate negotiations aimed at ensuring that both parties achieve their desired goals while maintaining the relationship at the highest possible level. You try to achieve a win-win situation.\nCreating Win-Win Situations\n\"...O Divine Master,\ngrant that I may not so much seek to be consoled, as to console\nto be understood, as to understand...\"\nThese words from the Prayer of St Francis are crucial if we want to cope with conflict, because a major source of conflict is that we often don't understand what the other person is saying. This is either because we are not listening properly or because the other person is not explaining themselves properly.\nConflict management, or conflict resolution, requires effective communication skills – especially listening. To resolve conflict, each side must able to understand the other's needs, wants and point of view.\nA step by step 'formula' to create a win-win situation is as follows:\nParty A explains what they want in a descriptive, non-evaluative way.\nParty B reverses perspective by summarising what Party A has said.\nIf party B has not understood party A, then party A explains again and the process continues until party A is satisfied that party B completely understands.\nParty B explains what they want in a descriptive, non-evaluative way.\nParty A reverses perspective by summarising what Party B has said.\nIf party A has not understood party B, then party B explains again, and the process continues until party B is satisfied that party A completely understands.\nParty A explains their reasons for their wants, and how they feel about them.\nParty B reverses perspective by summarising these reasons and feelings.\nThis process is repeated until Party A is satisfied party B completely understands.\nParty B explains their reasons for their wants and how they feel about them.\nParty A reverses perspective by summarising these reasons and feelings.\nThis process is repeated until Party B is satisfied party A completely understands.\nTogether party A & B brain-storm options that will maximise joint outcomes.\n(Note: When brain-storming, do not put limitations on your ideas - be as creative and ridiculous as you can be. Very often it is a silly idea which triggers off the solution).\nAgree on three good options that will maximise joint outcomes.\nChoose the agreement that seems to offer the best win-win situation. Follow through and implement it. Be sure to stick to the agreed conditions.\nPractical Guidelines for Coping with Conflict\nConflict is not always just about disagreeing on a specific topic. Often, it is also about how we treat each other. When we treat people with disrespect, it is bound to cause hurt, upset and conflict.\nWhen coping with conflict do....\nRemove or move away from distractions such as your computer, phone and TV while discussing your disagreement.\nAllow the other person to talk without being interrupted. If it is a group of people give each person a chance to speak. If the conflict is antagonistic, consider using a timer or clock to ensure each person is given the same amount of time.\nPay attention to what the person is saying instead of mentally rehearsing your next comment. Remember, \"Listening is not waiting to talk\" (Scott Ginsberg). Acknowledge you are listening with noncommittal responses. Encourage the speaker to share his or her thoughts and opinions. You may want to write down what the speaker is saying.\nAsk open ended questions to clarify anything you did not understand. Then paraphrase what you believe you heard the other person say. It is important to use indirect statements instead of confrontation and to use 'I\" statements such as \"If I understand you correctly...\"; \"It seems to me...\"; \"My impression is...\"\nChoose your words carefully. Try to avoid using extreme words like everyone, no one, always, never and replace them with more accurate words like some people, sometimes. Think before you speak to avoid saying things you will regret later.\nWhen it is your turn to talk, make sure you have the attention of the audience (whether it is one or 100 people). Establish eye contact and wait until your audience is focused before beginning.\nMake your comments meaningful – have a list of points you want to cover and refer to the list if the conversation strays from the topic.\nBe prepared to concede on issues that are highly emotional to the other person, and push for concessions for yourself on issues they are not so emotionally invested in. Remember, \"When you're at the edge of a cliff, sometimes progress is a step backwards.\" (Source unknown). The ability to read the feelings of others during a negotiation is crucial to success. Conflicts involve emotions – it is not just what the person says that counts, but how the person feels about them. (Note: Being able to read body language and being skilled at empathy are extremely helpful skills).\nAllow the other party to vent if they are very angry. This helps release some of the pent up emotion. Do not tell them to \"calm down\" as it often aggravates the anger. Such comments are not empathic at all. Instead after they have finished ranting, calmly summarise what they have said with words like \"If I understand you correctly...\" Be empathic.\nTake time out if things become too heated. This allows all parties time to cool off. Then you can come back and readdress the issue. The idea that you must never go to bed on an argument is an old wives' tale! When you are tired and it's late, it may be far better to agree that you will discuss it the next day, rather than say things you both regret, which is what will happen as you get more tired, irritable and irrational. 24 hours is considered an appropriate amount of time in an office setting.\nManage yourself – your emotions, words and actions. Ultimately, managing conflict is about managing yourself. Simple techniques like breathing deeply, listening attentively and choosing your words carefully can defuse a hot situation and help you and others move towards a win-win situation.\nSmile. The tone you set can adjust the attitude of the person. If you are friendly first they are more likely to be friendly back. Set up the interaction to be a positive one and it probably will be. Don't go in with the attitude \"I am going to win; you are going to lose.\"\nWhen coping with conflict do not...\nMake assumptions and guesses about the other person's feelings and motivations. \"Assumptions are the termites of relationships.\" (Henry Winkler). Assumptions and guesses are based on your own interpretations and motivations, rather than the other person's, and they are often faulty and negative. An example of this is assuming that someone arrived late because they don't care about you. Such assumptions just cloud the issue and create hostility.\nGeneralise. A generalisation is a sweeping statement that usually blows things out of proportion. For example, \"You are always late!\" or \"We always have to do what you want to do!\" \"You never let me choose.\" Think about whether this is really true before making such a statement.\nBlame - blaming another person for the situation is about not wanting to admit to any weakness, or trying to avoid the 'shame' for being 'at fault'. It usually ends up being an attack on the person rather than staying with the issue. Once again, this increases hostility and leads us away from a mutually beneficial solution\nNeed to be right / win all the time. Having to be 'right', or needing to 'win' all the time, blocks the possibility of a compromise, or a real solution. Allowing yourself to see an issue from another person's perspective can produce solutions that you may never have thought of alone. There is not always a 'right' or a 'wrong' way; each point of view can be valid. If we focus on 'winning' the argument, the relationship loses! Try to find mutual understanding and come to a resolution that respects each person's needs.\nThere is a very poignant quote which says something like: \"Don't try to win until you have counted the cost of winning\" (Source unknown).\nBring up past injustices and wrongs -Bringing up past conflicts is often an attempt to move the discussion off-topic and avoid responsibility for one's own actions or lack of engagement. Stick to the topic at hand. If you are resolving conflicts as they arise, you won't have any past injustices to bring up!\nShow contempt for the other person - Contempt is the body language that indicates you think little of the other person. It doesn't matter what words you use, your body language reveals your contempt and we are far more likely to believe what people do than what they say. Examples of body language that shows contempt include: Interruptions, eye rolling, sighs, not listening, not attempting to understand, turning your body away from the other person etc.\nPlease note: Contempt is the key indicator of a failing relationship.\nStonewall the other person. Stonewalling is when we ignore the other person. For example, when we put an iPod in our ears; walk away; cover our ears with our hands or when we start humming. Not feeling heard and understood is probably the greatest complaint of couples and is the cause of much resentment and unresolved conflict.\nBe defensive. When you are defensive, you refuse to listen, attack back and escalate the problem e.g. \"Yes, but that's not as bad as when you.....\" Defensive people often deny any wrongdoing and work hard to avoid looking at the possibility that they could be a contributor to the problem. Really listening and empathising with the other person is a powerful tool in conflict resolution!\n\"Anyone can be angry - that is easy.\nBut to be angry with the right person,\nto the right degree, at the right time,\nfor the right purpose,and in the right way - that is not easy.\"\nAristotle (Greek Philosopher, 384 BC - 322 BC)", "label": "No"} {"text": "From the Respiratory Staff at Corner Medical\nWe hear it all the time- too much sodium in our diets is not healthy for us; but for people with COPD (Chronic Obstructive Pulmonary Disease), it is especially detrimental because salt can cause a buildup of fluid, making it harder to breathe.\nWe found this article www.Healthfinder.gov and wanted to share it, because it really simplifies ways to reduce the amount of sodium in our diets.\nEat Less Sodium: Quick tips\nNine out of 10 Americans eat much more sodium (salt) than they need. Too much sodium increases your risk for health problems like high blood pressure. Use these tips to help lower the sodium in your diet.\nKnow your sodium limit.\n- Healthy teens and adults need to limit their sodium intake to no more than 2,300 mg a day (about 1 teaspoon of salt).\n- Some people, including children, adults age 51 and older, and those with high blood pressure, need to keep their sodium intake even lower (no more than 1,500 mg a day).\n- Ask your doctor how much sodium is okay for you.\nTo eat less sodium, you don’t have to make lots of changes at once. If you slowly reduce the amount of sodium in your foods, your taste for salt will change with time.\nCheck the label.\n- Use the Nutrition Facts label to check the amount of sodium in foods. Try to choose products with 5% Daily Value (DV) or less. A sodium content of 20% DV or more is high.\n- Look for foods labeled “low sodium,” “reduced sodium,” or “no salt added.”\nShop for low sodium foods.\n- Load up on vegetables, fruits, beans, and peas, which are naturally low in sodium. Fresh, frozen, and dried options are all good choices.\n- When you buy canned fruit, look for options packed in 100% juice or water.\n- When you buy canned vegetables and beans, choose ones with labels that say “low sodium,” “reduced sodium,” or “no salt added.”\n- Compare the sodium in foods like bread, soup, and frozen meals. Choose the ones with less sodium.\n- Limit processed foods – especially foods that are salted, smoked, or cured, like hot dogs, bacon, and deli meats.\nPrepare your meals with less sodium.\n- If you buy canned foods (like vegetables, beans, or fish), choose low sodium varieties.\n- If you use canned foods that aren’t low sodium, rinse them before eating to wash away some of the salt.\n- Use unsalted butter or soft margarine.\n- Don’t add salt to the water when you cook pasta or rice.\n- Try different herbs and spices to flavor your food, like ginger or garlic.\nAdd more potassium to your diet.\nEating more potassium can help lower your blood pressure. Good sources of potassium include potatoes, cantaloupe, bananas, beans, and yogurt.", "label": "No"} {"text": "The music education climate\nThe music classroom is a different place to the one I studied in as a child, and quite different to the one in which I began teaching in 2004. The environment is very different in 2018; music departments are likely to have more computers in their classrooms (Savage, 2010; OfstedThe Office for Standards in Education, Children’s Services... More, 2012) and the way they are used varies depending on how many computers there are (Breeze, 2011). Sibelius seems to be the most common piece of software found in music classrooms (Wise et al., 2011; Savage, 2010) and, given the variety of software available, it is interesting to see the same piece of equipment appearing repeatedly. There could be many reasons for this, including awareness of what is available, willingness to learn new software, familiarity or a cost implication (Gall, 2013; Savage, 2010).\nThe last 10 years have seen the expansion of smartphones and tablets, and given that most people already own a mobile phone (Ofcom, 2013), the expensive bit of hardware has already been bought and can potentially be used to make music in lessons.\nI have been involved with the implementation of music projects using mobile devices in classrooms for the last eight years and I began to spot a trend of mobile technology providing a useful tool. After every lesson, pupils asked what apps had been used so that they could ‘use them at home’. This began to make me interested in how mobile devices and tablets could be used more widely as part of the music curriculum, and whether teachers had explored the concept of BYOD (bring your own device) in music.\nBricolage – assembling the quilt\nThe use of technology as a scaffoldingProgressively introducing students to new concepts to suppor... More tool in music education has been observed (Reynolds, 2005) – for example, the use of pre-recorded loops and ‘smart instruments’ that automatically play the correct notes, and in tempo, to aid the less musically confident, and the ability to record audio to stretch others. The use of mobile devices in classrooms has also been studied (Burden et al., 2012; Fabian and MacLean, 2014), but little observation of the two has been done simultaneously. Some work (Kirkman, 2010; Gower, 2012) references the use of mobile devices in music classrooms but does not focus on accessing them in the music classroom. As mobile devices and tablets are part of everyday life for people, why are they not being more widely used within music classrooms?\nThe government has commissioned some research to investigate the effectiveness of music education, and they reported low levels of effective use of technology in music classrooms (Henley, 2011; DfEDepartment for Education - a ministerial department responsi... More, 2011; Ofsted, 2012; Ofsted, 2013). Given my passion for technology in music, I wanted to help teachers be more effective in their use of technology.\nThis piece of research therefore investigates the methods through which music teachers have overcome the barriers to using mobile devices and tablets within music classrooms.\nResearch took place in two phases. Seventy-eight teachers completed a survey, and respondents were asked to volunteer for phase two – semi-structured interviews that would explore some of the responses given in the survey and explore the barriers and solutions that those teachers had found.\nSummary of potential barriers identified by interview participants\nFive key potential barriers were identified that prevent teachers from successfully embedding tablets and mobiles into their music teaching, as shown in Table 1.\nTable 1: Barriers preventing teachers from using mobile devices in music teaching\n|Barrier 1||Purchasing/acquiring equipment and apps|\n|Barrier 2||CPD and knowledge of how to embed technology|\n|Barrier 3||Support from the school and infrastructure|\n|Barrier 4||Impact of technical problems in the classroom|\n|Barrier 5||Perception of technology in the classroom|\nOvercoming the barriers\nThe five teachers interviewed in phase two identified several methods for overcoming the potential barriers identified in Table 1 that can potentially be used by other institutions and extrapolated into other subjects:\nPurchasing/acquiring equipment and apps\nThree methods were identified in the interviews that could aid the acquisition of equipment for music teaching:\n- Generate funding\nOne teacher explored generating extra funding for her department. She wanted a set of iPads for her music department because she had some imaginative ideas of how to use them. Her solution for this was to ‘come up with an idea… If they don’t go for it, go do it on my own.’\nHer method for ‘doing it on her own’ was to approach local businesses for sponsorship and purchase iPads for her department with the funds raised, despite the lack of central funding.\nThe second of these examples is to use pupils’ own devices for music-making. One school wanted to use devices in lessons but couldn’t afford them. The assistant head stated, ‘That’s where the “bring your own device” model comes into play… It is about sharing some of the cost with parents.’\nHowever, this approach to implementing BYOD is not without drawbacks, as one music teacher added, ‘I think in an ideal situation they would all have the same model of mobile device or iPads.’\nPlanning and preparation is something that all teachers do and, if using technology, then the appropriate app must be found. It is more likely that a student will download an app if it is free or inexpensive.\nCPD and knowledge of how to embed technology\nOne assistant head recommends experimenting with technology as one of the methods for his staff: ‘Staff need time to get comfortable with it, get trained on it but also just have a bit of a play as they are re-engineering their lesson plans.’\nHe also suggested one more useful option: visiting other schools. From this, teachers can learn from one another’s mistakes and successes: ‘Going to other schools to witness what has been happening, and to see that in action because that’s really the most powerful thing.’\nSupport from the school and infrastructure\nIt appears that schools that support the use of technology in their teaching are effective at implementing it – therefore, teachers need to justify their decisions to SLT (senior leadership team). As one teacher stated, ‘I always thought that the best way is to come up with an idea first and then present it.’\nAll the schools interviewed had gaps in their infrastructure, including struggling with Wi-Fi access. This was something that one school took into consideration when rolling out the BYOD programme. They were aware that the Wi-Fi was weak in some areas of the school, and the wireless infrastructure was upgraded as part of a larger programme. If it is possible to upgrade school infrastructure within your department as part of a larger project it is more likely to happen, because the perceived benefits will be wider than just one department.\nImpact of technical problems in the classroom\nTechnical issues cannot be lightly covered, as with any work involving technology there will be problems that cannot be foreseen. These problems are not easy to quantify, as they will be different in every instance; however, some key suggestions from the interview participants may help.\nWhen something goes wrong on one device, it is easy to work around; however, if it does not work on 30 devices then a lesson can be drastically disrupted. One teacher offered this advice: ‘I’m not sure if the barriers have been overcome, it’s just I’ve learned what they are and I avoid them.’\nThis practical piece of advice sounds obvious; learn what the likely problems are and avoid them.\nPerception of technology in the classroom\nThe survey data and some of the comments from an assistant head suggest that some people remain unconvinced of the benefits of technology in the classroom. He said, ‘Some parents just disagreed in principle with the idea of having electronic devices in school in any circumstance.’\nWhen asked for a possible method of overcoming this barrier of perception, he gave two suggestions: ‘All I can do is be very objective and refer, firstly, back to the research… and, secondly, [provide] testimony in terms of “I’ve been to a school, here’s how it works, here is what I have seen”.’\nAll it takes is positive thinking\nThroughout the interviews, one solution to overcoming the barriers of successful implementation of tablets and mobiles into teaching was ‘positive thinking’. The teachers interviewed believed that they were doing the right thing and nothing was going to be a barrier to their implementation of it. One teacher stated, ‘I think everything is possible. You just have to have a certain mindset towards it.’\nOther participants echoed this thought, and one assistant head suggested that the mindset of the whole school has changed, having an impact on the perception of mobiles and tablets in teaching: ‘It was a significant shift away from our previous policy where we said, “You’re not allowed to get your phone out”, and now we are saying, “That’s absolutely fine. In fact, get everything that you have got out and bring it to school.”’\nThese points are not designed to be a recipe for the successful implementation of tablets and mobiles into the classroom, but distilled examples of how other teachers have successfully overcome the barriers presented to them in order to implement the technology into their music classrooms. I recommend them as potential solutions to overcoming some of the barriers to embedding tablets and mobiles into teaching, whatever your subject.\nHowever, this research is the beginning of the process; the longer-term impact of tablets and mobile devices in the classroom has yet to be fully researched. As one teacher suggests:\nI suspect the issue is… that you hit a plateau where the next step isn’t so obvious, you’ve smashed down barriers to entry and everybody’s able to climb well. But then the step forward [to the next level] is massive, and that’s where there’s a gap that needs to be bridged somehow.\nBreeze N (2011) Multimodality: An illuminating approach to unraveling the complexities of composing with ICT? Music Education Research 13(4): 389–405. DOI: 10.1080/14613808.2011.632083.\nBurden K, Hopkins P, Male TMS et al. (2012) iPad Scotland evaluation. Faculty of Education, University of Hull, UK.\nDfE (2011) The importance of music: A national plan for music education. Available at: https://www.gov.uk/government/publications/the-importance-of-music-a-national-plan-for-music-education (accessed 5 November 2018).\nFabian K and MacLean D (2014) Keep taking the tablets? Assessing the use of tablet devices in learning and teaching activities in the Further Education sector. Research in Learning Technology 22: 1–14. DOI: 10.3402/rlt.v22.22648.\nGall M (2013) Trainee teachers’ perceptions: Factors that constrain the use of music technology in teaching placements. Journal of Music, Technology & Education 6(1): 5–27.\nGower A (2012) Integrating informal learning approaches into the formal learning environment of mainstream secondary schools in England. British Journal of Music Education 29(1): 13–18. DOI: 10.1017/S0265051711000490.\nHenley D (2011) Music Education in England: A review by Darren Henley for the Department for EducationThe ministerial department responsible for children’s serv... More and the Department for Culture, Media and Sport. Available at: https://www.gov.uk/government/publications/music-education-in-england-a-review-by-darren-henley-for-the-department-for-education-and-the-department-for-culture-media-and-sport (accessed 5 November 2018).\nKirkman P (2010) Exploring contexts for development: Secondary music students’ computer-mediated composing. Available at: http://libsta28.lib.cam.ac.uk:2157/professional/britisheducationindex/docview/883076174/145C8BEDF7E207F5C3B/1?accountid=9851 (accessed 7 November 2018).\nOfcom (2013) The Office of Communications Annual Report and Accounts: For the period 1 April 2012 to 31 March 2013. London: The Stationary Office Limited. Available at: http://www.ofcom.org.uk/files/2013/07/Ofcom_Annual-Report_AD600_ACC-2_English.pdf\nOfsted (2012) Music in schools: Wider still, and wider. Available at: http://www.ofsted.gov.uk/resources/music-schools-wider-still-and-wider (accessed 5 November 2018).\nOfsted (2013) Music in schools: What hubs must do. Available at: http://www.ofsted.gov.uk/resources/music-schools-what-hubs-must-do (accessed 5 November 2018).\nReynolds N (2005) The computer as scaffold, tool and data collector: Children composing with computers. Education & Information Technologies 10(3): 239–248.\nSavage J (2010) A survey of ICT usage across English secondary schools. Music Education Research 12(1): 89–104.\nWise S, Greenwood J, Davis N et al. (2011) Teachers’ use of digital technology in secondary music education: Illustrations of changing classrooms. British Journal of Music Education 28(2): 117–134. DOI: 10.1017/S0265051711000039.", "label": "No"} {"text": "You can make your own glue – even specialty crafting glues. Why would you want to do that? Well, it’s true that store-bought glue is mostly cheap and effective, so you’re probably not going to save serious money by making it yourself. You might in some cases be able to make a better glue for your purposes, especially if you’re doing an arts or crafts project with particular needs. Basically, making your own glue is a form of crafting. You do it mainly because it’s fun, interesting and educational (many of these recipes are such that kids can help).\n1. Flour glue recipe\nThe most basic homemade recipe, which you may already be familiar with, is just made of flour and water. It tends to dry out over time and stop holding together whatever it was holding together, but it’s fine for, say, making decorations a few hours before a party.\n- Blend flour with water until it’s near the consistency of pancake batter.\n- Beat your mixture until it’s smooth.\n- Pour it into a saucepan on medium heat.\n- Constantly stir while bringing it slowly to a boil.\n- Let it cool before using.\nStore it in a sealed container and apply it with a brush. If it dries out, you can mix a little warm water into it.\n2. Cornstarch glue recipe\nThis is another basic glue recipe that works better than the flour recipe. It’s good for holding paper together without making ripples or bubbles.\n- Pour 3/4 cup of water in a saucepan over medium heat.\n- Add 1/4 cup cornstarch, 2 tablespoons light corn syrup and 1 teaspoon white vinegar.\n- Whisk the ingredients together until they’re blended well.\n- Stir the mixture constantly until it thickens.\n- In the airtight container where you want to store your glue, whisk 1/4 cup cornstarch and 1/4 cup water together until smooth.\n- Take the saucepan off heat. Slowly add the mixture from your saucepan into the container, and keep whisking constantly so everything blends together smoothly.\n- Let it cool to room temperature before using.\n3. Corn syrup glue recipe\nThis makes yet another basic glue.\n- In a small saucepan, mix 3/4 cup water with 2 tablespoons corn syrup and 1 tablespoon white vinegar.\n- Bring the mixture to a rolling boil.\n- In bowl, mix 2 tablespoons cornstarch with 3/4 cups cold water.\n- Slowly add the cold mixture into the hot mixture. Stir constantly for one minute.\n- Remove from heat.\n- Once it’s cooled, pour the mixture into its final container. Let it stand overnight at room temperature before using.\n4. Basic paste recipe\nThis recipe makes a simple paste suitable for kids’ crafts.\n- Slowly add cold water to 1/2 cup flour until the consistency is like heavy cream.\n- Simmer in a saucepan for 5 minutes, stirring constantly.\n- Let it cool before use.\n5. No-cook paste\nThis recipe is so easy, and kids can totally make it themselves. It makes a thick paste that won’t hold forever, but is suitable for kids’ crafts.\n- Mix 1/2 cup flour water in a bowl, adding the water slowly while stirring, until the consistency is gooey.\n- Stir in a pinch of salt.\n6. Waterproof glue (without milk)\nWhen you’re gluing something together that’s going to go under water, you need a glue that doesn’t melt. This is that recipe. This glue needs to be applied warm – the first time you cook it up, that’s simple. For future applications, put your container in a bowl, pan or sink of hot water to warm it up again. Apply it with a brush. It can take a few days to gel, but it’s good for lots of crafts.\nA lot of waterproof glue recipes include milk, which of course spoils quickly. This one will actually keep for a while, but isn’t quite strong enough to hold together something like a broken china plate.\n- Boil 6 tablespoons of water in a saucepan.\n- Take the saucepan off heat. Stir in 2 packets of unflavored gelatin. (Unless you want your glue to smell like a gelatin flavor, which is an interesting thought.)\n- Once the gelatin has dissolved, add 2 tablespoons of white vinegar and a teaspoon of glycerin.\n- Stir well. Let it cool a little before pouring it into your airtight container.\n7. Waterproof glass glue (with milk)\nThis glue can be used to mend broken china, like super glue. It also works well to glue labels on cans and jars, or to glue glass to other surfaces. All in all, it’s pretty strong. For gluing glass to other surfaces, use it while it’s liquid (warm it by putting the container in a pan of hot water). To glue pieces of glass together, use it in its gelled (room temperature) state.\n- Pour two tablespoons of cold water into a small bowl.\n- Sprinkle 2 packets of unflavored gelatin over the water and set aside for about an hour.\n- Heat 3 tablespoons of skim milk to just below boiling and pour it into the gelatin and water.\n- Stir the mixture until the gelatin is completely dissolved.\n- Optionally, add a few drops of clove oil as preservative if you’re not going to use all the glue immediately. (With clove oil, the glue will keep for a day or so – when it starts smelling like spoiled milk, throw it out.)\n8. Papier-Mache paste\nThis paste will keep for several weeks. It’s perfect for gluing down layers of papier-mache or collages.\n- Mix 1/4 cup of flour into a cup of room temperature water until the consistency is runny.\n- In a large saucepan, heat 5 cups of water to a gentle boil. Stir your flour and water mixture into it.\n- Gently boil for 2 or 3 minutes, stirring constantly.\n- Let it cool before use.\n9. Gum Arabic (Superglue) recipe\nThis glue is designed to men broken china and crockery. For that specific use, it should perform a little better than the glass glue at #7. Use a matchstick to apply a very thin coat of it to both sides of broken crockery, and then fit the pieces together. As you would do with Superglue, hold the pieces firmly together until the glue dries, which could be up to an hour. Let it dry at least twenty-four hours before you use or wash the mended piece. This glue will keep for a year.\n- Mix 3 tablespoons of gum arabic, 1 tablespoon of glycerin and 1/2 teaspoon of water thoroughly inn a bowl.\n- Put the mixture in an airtight container. Will keep about 1 year. To Use: Apply a thin coat of the glue to each surface and fit the pieces together. Hold firmly until the glue dries – this could take an hour or so. Let the piece dry thoroughly (24 hours) before washing or using.\n10. Envelope/stamp glue\nIf you making your own envelopes, you’ll need lickable glue for them. Mailartists has 4 recipes for stamp and envelope glue.\n11. Library paste\nThis paste is used for binding paper and paperboard.\n- 1 cup flour\n- 1 cup sugar\n- 1 teaspoon alum\n- 4 cups water\n- Optional: 30 drops of clove oil\nMix all the ingredients except the clove oil together in a saucepan. Cook on medium heat until the mixture is clear and thick. Optionally add your 30 drops of clove oil as a preservative. Store in small jars, so that only a small amount is being exposed to air and dried out every time you open it.", "label": "No"} {"text": "Medieval Theories of Relations\nThe purpose of this entry is to provide a systematic introduction to medieval views about the nature and ontological status of relations. Given the current state of our knowledge of medieval philosophy, especially with regard to relations, it is not possible to discuss all the nuances of even the best-known medieval philosophers' views. In what follows, therefore, we shall restrict our aim to identifying and describing (a) the main types of position that were developed during the Middle Ages, and (b) the most important considerations that shaped their development. We shall have occasion along the way, however, to examine in detail certain aspects of the views of important representatives of all the main medieval positions, including Peter Abelard (1079–1142), Gilbert of Poitiers (1085–1154), Albert the Great (1200–1280), Thomas Aquinas (1225–1274), John Duns Scotus (1265–1308), Henry Harclay (1270–1317), Peter Auriol (1280–1322), and William Ockham (1285–1347).\n- 1. Introduction\n- 2. Aristotelian Background\n- 3. Relations in Medieval Philosophy\n- 4. Paradigmatic Relational Situations\n- 5. Non-Paradigmatic Relational Situations\n- 6. A Shift in Paradigms\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nAll theorizing about relations in the Middle Ages begins with Aristotle's short treatise, the Categories. Due to historical circumstances, this Aristotelian text was one of the very few pieces of ancient Greek philosophy available in the Latin west between the seventh and twelfth centuries, and the only one to contain a systematic philosophical treatment of relations. In the Categories, Aristotle identifies relations as one of the ten highest kinds or categories (one of the so-called summa genera), and he devotes an entire chapter—the seventh chapter of the treatise—to distinguishing its members from those of the other categories (most notably, substance, quantity, and quality). On the standard medieval interpretation of this chapter, Aristotle is attempting to characterize relations at least partly on the basis of semantic or logical considerations—that is, on the basis of the differences between statements containing relational (or ‘relative’) terms and those containing only non-relational (or ‘absolute’) terms. As we shall see, this approach to characterizing relations helps to shape the way medieval philosophers understand them, and gives rise to the common medieval distinction between relations merely according to speech (relationes secundum dici) and relations according to nature or being (relationes secundum esse).\nIn addition to defending a particular characterization of relations in the Categories, Aristotle also suggests a general model or paradigm for analyzing what we shall call ‘relational situations’—that is, the situations or states of affairs that explain the truth of genuinely relational statements. According to this Categories model, whenever two (or more) substances are related, this is to be explained by certain monadic properties or accidents inhering in the relata. Thus, if Socrates is similar to Theaetetus (i.e., resembles him with respect to some quality), this is not to be explained by an entity to which Socrates and Theaetetus are somehow jointly attached (namely, the dyadic or two-place property, being-similar-to). On the contrary, it is to be explained by a pair of accidents, one of which inheres in Socrates and relates him to Theaetetus, and the other of which inheres in Theaetetus and relates him to Socrates.\nThis Aristotelian model exercises enormous influence during the Middle Ages, and until at least the fourteenth century, medieval philosophers develop their own analysis of relational situations in terms of it. In this context, the most important medieval debates concern the precise nature of the properties or accidents that relate particular substances. Some philosophers, such as Peter Abelard and William Ockham, adopt a form of reductionism, according to which the properties in question are accidents falling under categories other than relation. Thus, according to Abelard and Ockham, when Socrates is similar to Theaetetus, this is to be explained in terms of particular qualities, say, their respective colors. Other philosophers, however, such as Albert the Great and John Duns Scotus, reject this form of reductionism, maintaining instead that relations are accidents of a sui generis type. Thus, according to Albert and Scotus, when Socrates is similar to Theaetetus, this is to be explained by a pair of accidents whose members are distinct from, and irreducible to, their respective colors.\nAlthough the analysis of relational situations that Aristotle suggests in the Categories is perfectly general, it is clear from his later writings that he does not think that all relational situations conform to it. Thus, in the Metaphysics he claims that there are relational situations (such as Simmias's thinking about Socrates) in which substances are related not in virtue of a pair of accidents, but rather in virtue of a single accident possessed by just one of the substances. “An object of thought [e.g., Socrates]” he says at one point “is said to be related because something else [e.g., Simmias] is related to it”. And his point just appears to be that some relational situations are grounded in a single property or accident of a single relatum.\nAristotle's Metaphysics did not become available to philosophers in the Latin west until the mid-twelfth century, and it did not circulate widely before the thirteenth. Nonetheless, philosophers throughout the medieval period denied that all relational situations conform to the Categories paradigm. Unlike Aristotle, however, the basis of the medievals' denial was largely theological in nature. Considerations associated with the doctrine of creation, for example, led them to accept relational situations in which two (or more) substances are related by a single property or accident. And considerations associated with the Christian doctrine of the Trinity forced them to admit that, in certain relational situations, even substances themselves can qualify as relations. Prior to the fourteenth century, however, these sorts of situations were regarded as special cases, rare exceptions to a general rule. Indeed, prior to this time, most philosophers worked hard to show that even these sorts of situations conform, at least to some extent, to the paradigm of the Categories. This effort, as we shall see, helps to explain the pervasiveness in late medieval philosophy of the distinction between so-called real relations (relationes reales) and mere relations of reason (relationes rationis).\nAs the above remarks suggest, the fourteenth century marks an important turning point in the medieval discussion of relations. After this point, there is a noticeable shift away from the Categories paradigm, with the result that many philosophers come to regard those situations in which substances are related by virtue of their accidents as the exception rather than the rule. Part of the explanation is due, perhaps, to a gradual waning of Aristotle's influence, but part of it is also due to substantive doctrinal changes. By the fourteenth century, it is common to deny the existence of any real distinction between substances and most of their accidents, and hence philosophers are increasingly willing to say that substances themselves provide the ontological grounding for relational situations. Again, due to important semantic innovations around the same time, and the subsequent emergence of late-medieval nominalism, philosophers also begin to depart from the traditional Aristotelian characterization of relations. Thus, instead of thinking of relations as the items responsible for relating two or more substances, they now begin to think of them as items existing only in the mind—that is, as mere beings of reason or concepts. With respect to both of these developments, as we shall see, Ockham is an important transitional figure.\nAlthough Aristotle discusses relations at various places in his work, his discussion in the Categories is the most important for understanding the development of medieval theories of relations. Part of the reason, as we have already indicated, is historical: until the twelfth century, the Categories is the medievals' sole direct source for Aristotle's views about relations. But part of the reason is more theoretical: in the Categories Aristotle develops a basic account of relations that is presupposed by his other discussions. Thus, even when some of these other discussions become available—discussions such as those in the Physics and Metaphysics—medieval philosophers continue to interpret them in light of their understanding of the Categories.\nAristotle's discussion in the Categories influences the development of medieval views about relations in several discernible ways. First of all, it introduces the basic framework and terminology that comes to dominate all medieval theorizing about relations. Second, and perhaps most importantly, it articulates the main claims in response to which medieval philosophers develop their own views, including each of the following: (1) relations are the items that relate substances, (2) the items that relate substances are accidents, and (3) no substance is a relation.\nFinally, the details of Aristotle's discussion in the Categories, especially in chapter 7, give rise to a number of important medieval debates, as well as the traditional distinction between relations merely according to speech (relationes secundum dici) vs. relations according to being (relationes secundum esse). In order to understand the development of medieval views about relations, therefore, we must begin with some account of Aristotle's discussion in the Categories.\nThroughout the Categories Aristotle assumes that relations comprise one of the accidental categories, and hence that they must be understood as items inhering in particular substances. This helps to explain why, unlike contemporary philosophers, who speak of relations as holding between two or more things, Aristotle prefers to speak of them as inhering in one thing and somehow pointing toward (pros) another. Indeed, Aristotle's preferred name for relations is just ‘things toward something’ (ta pros ti).\nDuring the Middle Ages, it is customary for philosophers to refer to relations not only by Aristotle's term, ‘toward something’ (or ad aliquid, the verbatim Latin equivalent of pros ti), but also by two others as well: ‘relative’ (relativum) and ‘relation’ (relatio). In the early Middle Ages, philosophers often move freely among these terms without paying much attention to their various senses. Over time, however, they come to emphasize their differences, sometimes giving elaborate explanations as to why one must be regarded as more appropriate than the others. To give just one example, consider the following passage from Albert the Great:\nNow the most general genus in the arrangement of this predicable is toward something (ad aliquid), or relative (relativum), or less properly speaking, relation (relatio), as some people say. But it must be recognized that the most general genus is signified most clearly by the name ‘toward something’, which is a preposition together with [the term] ‘something’ in [the accusative] case. For this name conveys the two things that are in a relative, namely: [i] diversity, which the preposition indicates through its taking an object (transitionem), and [ii] the direction of the comparison, which the accusative case indicates when something is called ‘toward something’. (Liber de praedicamentis, 225b.)\nWhatever their disagreements about the appropriateness of these terms, it was generally agreed that the terms ‘toward something’ and ‘relative’ are related to the term ‘relation’ in the way that a concrete term (such as ‘white’) is related to its abstract counterpart (such as ‘whiteness’).\nSince ‘relation’ is the term most familiar to us, in what follows we shall rely on it whenever possible. It is important to recognize, however, that the medievals introduce a host of other abstract terms more or less synonymous with ‘relation’ (relatio) but whose connotations they often regard as more informative than any of those discussed so far. A partial list of such terms includes:\n- ‘Comparison’ (comparatio), which has psychological overtones, and so is often (though not exclusively) used by conceptualists;\n- ‘Outward-looking-ness’ (respectus), which draws on a visual metaphor to suggest that relations are that in virtue of which a substance ‘looks out toward something’ (respicit ad aliquid);\n- ‘Disposition’ (habitudo) or ‘relative disposition’ (habitudo relativa), which suggests that relations account for the way a thing ‘holds itself toward something’ (se habere ad aliquid);\n- ‘Order’ (ordo), ‘ordering’ (ordinatio), and ‘directionality’ or ‘toward-ness’ (aditas), which are used to indicate that relations account for the order or structure we find in the world.\nAlthough Aristotle makes scattered remarks about relations throughout the Categories, it is only in chapter 7 that he singles them out for detailed independent consideration. Thus, in order to complete our survey of the relevant Aristotelian background, we need to consider briefly how this chapter was commonly understood by medieval philosophers.\nCategories 7 opens rather abruptly with a definition of relations that Aristotle ultimately regards as unacceptable. According to this definition, which medieval philosophers attribute to Plato, relations are things “spoken of” in a certain way. Whether or not this definition is really Plato's, it certainly appears to be well entrenched by Aristotle's time, as is indicated by the fact that Aristotle says we are at least prepared to call something a relation just in case it satisfies the conditions specified by this definition:\nWe call the following sorts of things toward something: all those things said to be just what they are of or than something, or toward something in some other way (any other way whatsoever). Thus, what is larger is said to be what it is than another (it is said to be larger than something); and a double is said to be just what it is of another (it is said to be double of something); similarly with all other such cases. (Categories 7, 6a36-6b.)\nAs the medievals interpret it, this definition identifies relations in terms of the predicates by means of which they are signified. Medievals refer to the predicates in question as ‘relative terms’ (ad aliquid or relativa), and understand them, roughly speaking, as those terms whose true predication requires a comparison to something other than the subject of which they are predicated. Thus, ‘taller’ (maius) counts as a relative term because when we assert of something that it is taller—that is, when we predicate the term ‘taller’ of it—we necessarily do so in comparison to something else. We don't say merely that Simmias is taller; we say that he is taller than Socrates, or Theaetetus, or the average man. Similar remarks apply to ‘double’, as well as to all other relative terms. Borrowing on the medievals' behalf the notation of first-order logic, we can make this characterization of relative terms precise by saying that a term F is relative just in case a predication of the form ‘Fx’ is more perspicuously represented as a predication of the form ‘Rxy’. (If a term is not relative, then the medievals say that it is absolute.)\nThe first or Platonic definition, therefore, characterizes relations as the items signified by relative terms—or what we would nowadays call ‘polyadic’ or ‘many-place predicates’. The medievals regard this characterization as initially promising, and often employ it in their writings. In the end, however, they think it must be rejected—or at least modified. For according to them, not everything we are prepared to call a relation actually is a relation. In rejecting the first or Platonic definition, the medievals take themselves to be following Aristotle himself, who rejects this definition on the grounds that it allows certain substances (namely, heads and hands) to qualify as relations. As Aristotle says later in chapter 7:\nIf the [first] definition of things toward something was adequately assigned, then it is exceedingly difficult, or impossible, to reach the conclusion that no substance is toward something. But if, on the other hand, it was not adequately assigned, and things toward something are rather [defined as] those things for which this is their very being: to be toward another in a certain way, then perhaps something may be said about the problem [of heads and hands]. (Categories 7, 8a29-35.)\nHere Aristotle seems to be suggesting that some relative terms fail to signify genuine relations. Although terms such as ‘head’ and ‘hand’ clearly count as relative—since predications of the form ‘x is a head’ and ‘x is a hand’ are more perspicuously represented as of the form ‘x is a head of y’ and ‘x is a hand of y’—these terms signify parts of substances rather than relations. On the basis of these and other such examples, the medievals conclude that relations must be identified not with the items signified by relative terms, but rather with a proper subset of them.\nOf course, this still leaves us with the question of how in general we are to distinguish genuine relations from the mere significata of relative terms. Here medieval philosophers think that Aristotle's second definition—which we italicized in the passage quoted above—can be of some help. This definition, as it was commonly interpreted, highlights an important metaphysical or functional role that relations must play: in addition to being signified by relative terms, they are what actually serve to relate two (or more) things—or to put the point in slightly different terms, they are that in virtue of which such things are related. On this interpretation, Aristotle's definition provides a clear explanation for why heads and hands fail to qualify as genuine relations. Although they are signified by relative terms, they do not relate anything. On the contrary, they are things standing in relations.\nThe distinction between what actually serves to relate things (i.e., genuine relations) and what merely stands in some relation (i.e., the relata of some relation) is often used by medieval philosophers to explain the difference between the two definitions in Categories 7. Whereas the first or Platonic definition includes both relations and relata (under relational descriptions), the second or Aristotelian definition includes only relations. This understanding of the difference between the two definitions provides the basis for a common medieval distinction between relations merely according to speech (relationes secundum dici) and relations according to being or nature (relations secundum esse). As Aquinas says, in a well-known passage of his Summa Theologiae:\nSome relative terms—such as ‘master’ and ‘slave’, ‘father’ and ‘son’—are introduced to signify relative dispositions themselves (ipsas habitudines relativas); these terms express things relative secundum esse. But other relative terms—such as ‘mover’ and ‘moved’, ‘head’ and ‘headed’, and terms of this sort—are introduced to signify things on which certain relations follow; these terms express things relative secundum dici. (Summa Theologiae I, q. 13, a. 7, ad 1.)\nAlthough medieval philosophers generally accept the distinction between relations secundum dici and relations secundum esse, and place heads and hands (and other body parts) in the former category, they sometimes disagree about the placement of certain other examples—most notably, knowledge and perception. Clearly, the names of these accidents are relative terms, since predications of the form ‘x is knowledge’ or ‘x is a perception’ are more perspicuously represented as of the form ‘x is knowledge of y’ and ‘x is a perception of y’. But should we characterize the accidents themselves as genuine relations (i.e., relations secundum esse)? Or should we rather say that they are qualities on which certain relations follow (i.e., relations secundum esse dici)? Near the end of Categories 7, Aristotle suggests an epistemic criterion that promises to resolve these questions. But because the criterion itself is difficult to understand, and there is no clear alternative to it, debate about these sorts of examples continues throughout the Middle Ages.\nCategories 7 ends almost as abruptly as it began. Having defended his own preferred definition of relations, Aristotle leaves us with the following cautionary remarks:\nIt is perhaps hard to make firm statements on such questions without having examined them many times. Still, to have gone through the various difficulties is not unprofitable. (Categories 7, 8b22-24.)\nBoethius, whose Latin translation is responsible for transmitting these words to the Middle Ages, takes Aristotle's remarks here to be inviting further refinements and improvements on his own account:\nAristotle would never have said this if he were not prompting us to further reflection and to even greater exercise of subtlety. Because of his exhortation, we shall not hesitate in the least to raise [further] questions and offer [our own] solutions to them in other places. (In Categorias Aristotelis, 238.)\nLike Boethius, medieval philosophers are happy to take up this invitation—and, indeed, as we shall see, to develop Aristotle's account of relations in some striking and original ways of their own.\nAs we have seen, Aristotle begins his discussion of relations in the Categories with the assumption that relations are a certain type of accident, and then inquires after their proper characterization, eventually arriving at the view that they are a proper subset of the entities signified by relative terms—namely, all and only those that actually serve to relate two or more things. Medieval philosophers tend to reverse Aristotle's approach, beginning where he ends. That is to say, they tend to start their discussion with the view that relations are entities that are both signified by relative terms and play a certain metaphysical role, and then proceed to ask about the precise nature and ontological status of these entities—in particular whether they must, in every case, be identified with Aristotelian accidents. There are at least two reasons for this reversal. First, the medievals see nothing in Aristotle's preferred characterization of relations that requires relations to be accidents (or indeed, entities of any ontological type). Second, and perhaps more importantly, the medievals think that there are certain situations that require relations to be something other than accidents (more on this in Section 5 below).\nAlthough medieval philosophers generally regard Aristotle's characterization of relations as ontologically neutral, there is one type of entity they standardly assume that relations could never be—namely, polyadic or many-place properties. For all their differences, the medievals tend to agree on the following point: polyadic properties cannot exist outside the mind.\nHistorians of philosophy sometimes speak as if the medievals could not even have possessed the concept of a polyadic property—as if conceiving of relations in this way only became possible in the nineteenth and twentieth centuries, with the advent of a formal logic of relations and multiple quantification (Cf. Weinberg 1965, esp. 61–63). But this is surely mistaken. What recent advances in logic have made possible is not the concept of a polyadic property, but merely its representation within a formal system. Moreover, as we have already seen, the notion of a polyadic predicate, from which our own concept of a polyadic property is derived, corresponds exactly to the medieval notion of a relative term. And if that by itself weren't enough, there is the fact that medievals habitually speak of relations in polyadic terms, explicitly comparing them to a road that runs between two cities (via), or to a palisade running between two watchtowers (inter-vallum) (Cf. Albert the Great, Liber de praedicamentis, 241a-241b; Aquinas Summa Theologiae I, q. 28, a. 4, obj. 5; and the texts of Harclay). Nor do they take themselves to be original in this regard. On the contrary, they take themselves merely to be following a suggestion of Aristotle's in the Physics, which itself just appears to be part-and-parcel of the common sense conception of relations (see Physics III, 202b11-15). As Peter Aurieol says at one point:\nIn the third book of his commentary on the Physics, comment twenty, the Commentator [=Averroes] says that a relation is a disposition (dispositio) existing between two things. But even apart from him it is clear that fatherhood is conceived of as if it were a kind of medium connecting a father with his son. And the same is true of other relations. (Scriptum super Primum Sententiarum, fols. 318va-b. See Henninger 1989, 153–4, n. 12, for the Latin text.)\nIn light of passages such as these, it is hard to take seriously the suggestion that the medievals—or indeed, any reflective beings—lack the concept of a polyadic property.\nIn addition to possessing this concept, there is evidence that at least some medieval philosophers also posit the existence of polyadic properties. In an important paper, Heine Hansen has argued that this is certainly true in the case of the thirteenth-century philosopher, Nicholas of Paris. (See Hansen 2012.) And further research may well turn up other medieval philosophers holding the same view. At present, however, Nicholas appears to be something of an anomolous case.\nIndeed, despite possessing the concept of a polyadic property, medieval philosophers are often explicit in their denial of anything in extramental reality exactly corresponding to such a concept. If we return to the passage just quoted from Auriol, we can see that, immediately after describing relations as a sort of ‘interval’ (intervallum), he proceeds to deny the existence of any such intervals in extramental reality.\nIt appears that a single thing, which must be imagined as some sort of interval (intervallum) existing between two things, cannot exist in extramental reality, but only in the intellect. [This appears to be the case] not only because nature does not produce such intervals, but also because a medium or interval of this sort does not appear to be in either of the two things [it relates] as in a subject, but rather between them where it is clear that there is nothing which can serve as its subject. (Scriptum super Primum Sententiarum, fols. 318va-b.)\nAs this passage helps to make clear, the root of the standard medieval objection to polyadic properties is ontological in nature, stemming from a particular conception of subjects and attributes. Following Aristotle, the medievals divide extramental beings into substances and accidents, a division which they take to be both exclusive and exhaustive (since it is given in terms of a contradictory pair of properties, namely, being in a subject vs. not being in a subject) (Cf. Categories 1, 1a20–1b6). Now in the case of substances, it is perhaps clear that they are not polyadic in nature. But medievals typically think the same is also true of their accidents. Thus, as Aquinas says at one point in his Sentences commentary, in response to the question whether it is possible for “numerically one and the same relation” to belong to belong to two subjects at a time: “No, this cannot be, for one accident cannot belong to two subjects” (In Sent. I, d. 27, q. 1, a. 1, ad 2).\nAlthough the medievals' objection to polyadic properties stems in large part from ontological considerations, they also offer other reasons for rejecting them. Sometimes these involve considerations of theoretical parsimony. As Ockham is so fond of saying: “It is futile to do with more [entities] what can be done with fewer”. Other times, however, these reasons involve phenomenological or epistemological considerations. Albert the Great, for example, objects to polyadic properties on the grounds that we are not presented in experience with anything but individuals and their so-called absolute attributes—that is, substances and their quantities and qualities.\nThe rejection of polyadic properties might seem to commit one to a form of anti-realism about relations—that is, to the view that relations exist only in the mind. This was, in fact, the position of Peter Auriol. If there are no polyadic properties or ‘intervals’, he assumes, then there is nothing in extramental reality to correspond to our relational concepts. But in that case, he says, “a relation cannot be posited except in apprehension alone”.\nGiven the current state of medieval research, it is difficult to know how widespread this (or any other) form of anti-realism was during the Middle Ages. Shortly after Auriol's death, certain aspects of his anti-realism appear to have met with considerable success. Ockham and his followers, for example, accept Auriol's view that relations exist only in the mind as concepts or beings of reason (entia rationis), though unlike Auriol, as we shall see, they think this is compatible with saying that things are related independently of the activity of the mind. And we can find echoes of the same sort of view in the writings of early modern philosophers.\nPrior to the fourteenth century, however, it is difficult to identify any unambiguous representatives of anti-realism, at least in the Latin West. Albert the Great claims to find something akin to Auriol's argument in the writings of Alfarabi (d. 950) and Avicenna (d. 1037), but he does not say whether either of these figures actually endorses it or merely presents it for consideration (See Liber de praedicamentis, 222b-223a). Again, Aquinas suggests that a similar view can be found in the writings of Gilbert of Poitiers and his followers, the so-called Porretani, but his suggestion is controversial, and in any case Aquinas reports that Gilbert later retracted the view in the face of theological controversy (Cf. Summa Theologiae I, q. 28, a. 2, corpus; cf. also Veckley 1965, 28–9). Unless further research alters the current picture, therefore, it would appear that, although anti-realism may have had something of a foothold in the Arabic speaking world, most notably among the members of a group of orthodox Muslim theologians known as the Mutakallimūn, in its more radical forms it was always a minority position in the Latin West.\nIf we take anti-realism to be the view that (a) nothing in extramental reality corresponds to our relational concepts and (b) nothing is related independently of the activity of the mind, it is not hard to see why most medieval philosophers would reject it. Like most of us, they recognize the utter implausibility of saying that facts like Simmias's being taller than Socrates are somehow dependent on the activity of the mind. Indeed, as they often point out, this sort of anti-realism is inconsistent with even such basic facts as the real structure of the universe, the existence of real composition, causality, spatial proximity, or even the objectivity of mathematical knowledge. Speaking for the majority, Ockham says in his Ordinatio:\nThe intellect does nothing to bring it about that the universe is one, or that a whole is composed [of its parts], or that causes in spatial proximity [to their effects actually] cause [their effects], or that a triangle has three [angles], etc. … any more than [the intellect] brings it about that Socrates is white or that fire is hot or water cold. (Ordinatio I, d. 30, q. 1 in Opera Theologica iv, 316–317. Cf. also Scotus, Ordinatio II, d. 1, q. 5, n. 224 in Opera Omnia; Aquinas, De potentia, q. 7, a. 9.)\nIn addition to such common sense considerations, the medievals also identify various philosophical and theological grounds for opposing anti-realism about relations. Here we shall mention just two. First, it is hard to see how such anti-realism is to be squared with the standard interpretation of the Aristotelian categories. “For nothing is placed in a category” as Aquinas says “unless it is something existing outside the soul” (De potentia, q. 7, a. 9). Again, this sort of anti-realism seems incompatible with the orthodox Christian view of the Trinity. Indeed, it is precisely for this reason that the existence of real relations in God is affirmed at the Council of Rheims in 1148, and that shortly thereafter it becomes customary to say that the denial of this entails a form of heresy known as Sabellianism (Cf., e.g., Aquinas, Summa Theologiae I, q. 28, a. 1 and De potentia q. 8, a.1).\nBut of course, all of this raises a question. How is it that medieval philosophers maintain a form of realism about relations while at the time rejecting the existence of polyadic properties? In particular, what do they say about arguments such as Auriol's, which in effect deny the coherence of realism without polyadic properties? Here it is useful to consider the work of Albert the Great. Although he writes a generation before Auriol, he explicitly addresses his sort of argument, and the reply he offers appears to be perfectly standard.\nAccording to Albert, the problem with arguments of the sort Auriol gives is that they rely on a questionable assumption, namely: if there are no real polyadic forms or properties, then there is nothing in extramental reality to correspond to our relational concepts. This assumption would be true, he suggests, if our conceptual framework displayed an exact isomorphism to the structure of the world. But it does not, and hence there is no reason in principle why a polyadic concept cannot have something non-polyadic corresponding to it. In making this sort of reply, Albert aligns himself with a medieval tradition of rejecting the view that for every distinct type of concept there is a distinct type of entity. This view is often associated in medieval philosophy with Plato and his followers, and by the time of Ockham it is regarded, somewhat hyperbolically, as the source or root (radix) of the greatest errors in philosophy. “To multiply beings according to the multiplicity of terms” Ockham says “is erroneous and leads far away from the truth” (Summa Logica I, c. 51 in Opera Philosophica i, 171; cf. Loux, 1974, 171).\nFor most medieval philosophers, then, the question is not whether there are any things in extramental reality corresponding to our relational concepts, but what these things are like in themselves. Having ruled out the possibility of their being polyadic, however, the medievals don't leave themselves with many options. Indeed, because they accept a broadly Aristotelian ontology, they have no choice but to identify relations with either individual substances or their monadic properties.\nAs we noted earlier, philosophers throughout the medieval period are attracted to the view suggested by Aristotle's Categories that relations (or the items corresponding to our relational concepts) are accidents. Of course, as we also noted, the medievals cannot take this view to be perfectly general, since they also admit cases, especially theological ones, which involve relations but no accidents. But even so, until the fourteenth century, this view is taken to apply so widely that it functions as a kind of paradigm for thinking about relational situations. Thus, if a predication of the form ‘aRb’ is true, it is generally assumed that what makes it true is a pair of individuals, a and b, and a pair of accidents, F and G. As we shall see in the next section, it is within the context of this paradigmatic analysis of relational situations that one of the most hotly disputed and intractable debates of all the Middle Ages arises.\nIn his commentary on the Categories, Boethius highlights an interesting feature of Aristotle's discussion of relations. Whenever Aristotle refers to the category of relations, he always does so in the plural (‘things toward something’), thereby departing from his usual practice of referring to categories in the singular (‘substance’, ‘quantity’, ‘quality’, etc.). This certainly reinforces the paradigmatic analysis of relational situations, which requires relations to come in pairs. But Boethius thinks there is a further reason why Aristotle refers to the category in this way—namely, because its members are unique in that they cannot be understood to exist by themselves:\nThings toward something [or relations] cannot be grasped by the intellect by themselves or individually, so that we could say that things toward something exist individually. Whatever is known regarding the nature of a relation must be considered together with something else. For example, when I speak of a master, this by itself means nothing if there is no slave. The naming of one relative immediately brings with it another thing toward something. (In Categorias Aristotelis, 217.)\nFollowing Boethius, medieval philosophers often take Aristotle's use of the plural to indicate that the category of relations must be at least conceived of as containing pairs of correlatives or converse relational accidents (see, e.g., Abelard, Logica ‘ingredientibus’, 80–95; and Albert the Great, Liber de praedicamentis, 22). As we shall see, this point becomes important for their understanding of those relational situations that do not conform to the paradigm analysis of the Categories.\nFor now, however, let us focus on the those relational situations that do conform to the paradigm. As the medievals recognize, there are a number of questions that can be raised about the relations they involve—call them ‘paradigmatic relations’. What sort of monadic properties or accidents are they, and how are we to understand them? As it turns out, there are only two main positions one can take. For convenience, we shall refer to them, respectively, as ‘reductive’ and ‘non-reductive realism’.\nAccording to reductive realism, which is the simplest or most ontologically parsimonious form of realism (without polyadic properties), paradigmatic relations are to be identified with ordinary, non-relational accidents—that is to say, with accidents falling under Aristotelian categories other than relation. Thus, if Simmias is taller than Socrates, this is to be explained by their respective heights, which fall under the category of quantity. Again, if Socrates is similar (say, in color) to Theaetetus, this is to be explained by Socrates's and Theaetetus's particular colors, which fall under the category of quality. And so on for other paradigmatic relations.\nAccording to non-reductive realism, by contrast, paradigmatic relations are to be identified not with ordinary, non-relational accidents, but rather with accidents of a sui generis type. Thus, if Simmias is taller than Socrates, this is to be explained by appealing to a pair of sui generis accidents that are distinct from, but nonetheless necessitated by, Simmias's and Socrates's heights. Again, Socrates's similarity to Theaetetus is to be explained not by their respective colors, but by a pair of sui generis accidents necessitated by them. And so on for the relations involved in other paradigmatic relational situations.\nIn the medieval discussion of relations, it is this difference—the difference between reductive and non-reductive realism—that constitutes the greatest divide among philosophers, and representatives of both positions can be found throughout the medieval period. Peter Abelard (d. 1142) and Albert the Great (d. 1280) are, perhaps, the clearest representatives of reductive and non-reductive realism, respectively, in the early and high Middle Ages, whereas William Ockham (d. 1347) and John Duns Scotus (d. 1308) are well-known representatives of these positions in the later Middle Ages. Again, some philosophers appear to have held different positions at different stages of their career. Henry Harclay (d. 1317), for example, began his career as a staunch defender of Scotus's non-reductive realism, but by the end of it gravitated towards a position that is much closer to, and in many ways anticipates, Ockham's specific form of reductive realism.\nBeginning in the mid-thirteenth century, the debate between reductive and non-reductive realists is often carried out in the context of the discussion whether relations are identical to their foundations. (This is the context, for example, in which Scotus and Ockham develop their positions.) By the mid-thirteenth century, moreover, it is customary to admit at least a conceptual distinction between relations and the non-relational accidents in virtue of which these relations hold. The relevant non-relational accidents come to be referred to as the ‘grounds’ or ‘foundations’ of relations (fundamenta), since their possession is thought to necessitate the holding of relations. Hence, in this context, the important question is whether the distinction between relations and their foundations is merely conceptual.\nWe might expect that reductive realists would always answer this question in the affirmative, whereas non-reductive realists would always answer it in the negative. It turns out, however, this is not the case. For reasons to be explained below, there are some reductive realists who, in spite of rejecting that relations comprise a sui generis type of monadic property, nonetheless maintain that relations are in an important sense really distinct from their foundations. In light of this complication, we shall continue to cast the medieval debate about the nature of paradigmatic relations in terms of reductive and non-reductive realism rather than in terms of the identity or real distinctness of relations and their foundations.\nAs mentioned above, on the simplest or most ontologically parsimonious form of realism without polyadic properties, what we are calling ‘reductive realism’, paradigmatic relations are identified with ordinary, non-relational monadic properties or accidents. Now we might expect this form of realism to appeal to anyone committed to realism without polyadic properties. After all, failure to reduce such relations to such accidents threatens to make them mysterious. If paradigmatic relations are monadic properties, but not ordinary, non-relational accidents, then how are we to understand them?\nConsiderations of intelligibility certainly play a role in the debate between medieval reductive and non-reductive realists. As we shall see, non-reductive realists typically recognize that the chief difficulty for their view lies in specifying the precise nature of the sui generis monadic properties to which they appeal. More often than not, however, reductive realists object to non-reductivists on grounds of theoretical parsimony. This is certainly true in the case of Abelard and Ockham, whom we earlier identified as reductive realists. In the case of Abelard, such considerations are not explicitly formulated, though they are part-and-parcel of his general approach to metaphysics and philosophy of language. In the case of Ockham, by contrast, the appeal to parsimony is much more explicit, often taking the form of what has come to be known as Ockham's razor: “Plurality should not be assumed without necessity” (Ordinatio I, d. 30, q. 2 in Opera Theologica iv, 322).\nAnother consideration that plays an important role in the debate between reductive and non-reductive realists has to do with the proper interpretation of authoritative texts. Since medieval philosophers develop their theories of relations in the course of reflecting on Aristotle's Categories, they often present their views as the one actually suggested (or even required) by the text itself. Abelard, for example, suggests that his reductive theory is a direct consequence of Aristotle's second definition of relations. Thus, when Aristotle characterizes relations in Categories 7 as “those things for which this is their very being: being toward something in a certain way”, Abelard argues that this should be interpreted to mean that relations are items that make other things to be relatives. Just as certain attributes (say, being red, juicy, and sweet) make their subjects good, he suggests, so too, certain accidents (such as being-six-feet-tall and five-feet-ten) relate their subjects (See Logica ‘ingredientibus’, 216–17. For further discussion, see Brower 1998).\nTextual considerations and direct appeals to Aristotle's authority play a much bigger role in early medieval debates than they do in the high and later Middle Ages, when literal commentary was no longer the dominant form of philosophical literature. Nonetheless, these sorts of considerations continue to be important throughout the Middle Ages. Even Ockham, in his Summa logicae, addresses the issue of whether Aristotle should be interpreted as holding some form of non-reductive realism:\nThere are many theologians of this opinion, and at one time even I believed it to have been Aristotle's opinion. Now, however, it seems to me that the contrary opinion follows from his principles. (Summa logicae I, c. 49 in Opera Philosophica i, 154. Cf. Henninger 1989, 120.)\nOne final argument used by reductive realists to motivate their position is worth mentioning here. This argument has to do with the nature of relational change. Almost all medievals accept the intuitively plausible view that things can acquire (and lose) relations without undergoing any real (as opposed to merely Cambridge) change. Thus, Socrates can come to be shorter than Simmias solely in virtue of a change in Simmias's height. As reductive realists such as Ockham often point out, this fact about relational change admits of a ready explanation on their position, since Socrates's relation is nothing over and above Simmias's and Socrates's heights, the latter of which never changes. By contrast, the same fact appears to pose a serious challenge for the non-reductive realist. For if Socrates's relation is something distinct from Simmias's and Socrates's heights, then apparently Socrates must acquire something new when Simmias's height increases. But then, contrary to the original intuition, the non-reductive realist must say that Socrates undergoes a real change after all.\nThese considerations are not the only ones that reductive realists appeal to, but they are among the most important for understanding their position, and we shall rely on them in what follows to motivate and clarify the alternative position of the non-reductive realists.\nBefore leaving the topic of reductive realism, we need to take account of a slight complication. In our discussion to this point, we have been speaking as if reductive realists always intend to identify individual paradigmatic relations such as tallness or shortness with pairs of monadic properties taken jointly. We have done this because, at least initially, this seems to be the most natural way to understand their position. After all, it is not Simmias's height taken by itself that necessitates his being taller than anyone; it is only his height taken together with that of another, say, Socrates. And yet, despite the naturalness of this way of construing reductive realism, it is not the way its proponents typically understand it. On the contrary, instead of identifying relations such as tallness or shortness with pairs of monadic properties taken jointly, reductive realists typically identify them with the individual members of such pairs. Thus, if Simmias is taller than Socrates, it is only Simmias's height that is identified with Simmias's tallness (and hence said to correspond to the concept ‘taller than’), whereas Socrates's height is identified with Socrates's shortness (and hence said to correspond to the concept ‘shorter than’). But how is this possible, especially if the properties in question are supposed to be just ordinary heights?\nReductive realists recognize the worry here, as well as the initial attraction of identifying relations with pairs of accidents taken jointly. As evidence, consider the following passage from one of Henry Harclay's later works. Here Henry not only entertains the suggestion that relations could be identified with pairs of monadic properties, but draws on a common medieval view about number to make it plausible:\nA relation is clearly a reality distinct from one foundation, but not a reality distinct from both foundations. For when one white thing [such as Simmias] is posited and then another white thing [such as Socrates] is posited, there is a relation beginning at that point. Thus, the similarity is not a [single] whiteness, but two whitenesses existing at once. Indeed, the two whitenesses can be sufficient to constitute a single species in the genus of relation. Just as two discrete unities of whatever magnitude are sufficient for producing a single species of number, so too the same thing holds for the case at hand. Again, just as plurality or multitude is not a reality different from the constituents of the plurality or multitude, neither is the similarity [of the white things] different [from their whitenesses]. (“Utrum Dei”, n. 46)\nDespite Henry's attraction to this sort of view, he feels compelled to reject it on the grounds that it leads to certain absurdities. Drawing on Avicenna for support, he says:\nAvicenna argues against this on the basis of relations involving inferiority and superiority, for it is clearer in those cases than it is for other relations, such as those involving equals. For fatherhood is in the father alone and not in the son … and the same thing holds of sonship. Therefore one must hold that there are two relations [here]. And in this case it is clear that the relation is not the same reality as [the two] foundations because the relation is not in everything in which the foundation of the relatum is. This is the case, too, for relations involving equals, even if it is not as clear. (“Utrum Dei”, n. 46)\nHenry's worry here can be expressed as follows. If a relation such as fatherhood is identified with a pair of accidents, then it will follow that fatherhood is partly in the son (since the pair is such that one of its members is in the son). But this is absurd. Fatherhood is an asymmetrical relation (or as Harclay prefers to put it, a relation involving superiority and inferiority). That is to say, fatherhood is such that if an individual a has it in respect of another individual, b, then b cannot have fatherhood in respect of a. But according to Harclay, this is tantamount to saying that “fatherhood is in the father alone and not in the son”. And of course he doesn't think the point is restricted to fatherhood. On the contrary, it also holds true of all relations, including symmetrical relations or “those involving equals, even if it is not as clear” (“Utrum Dei”, n. 47).\nBut if relations are not to be identified with pairs of accidents, how can reductive realists think of them in terms of ordinary, non-relational accidents? After all, the only other option seems to be identifying them with ordinary accidents taken individually—which as we have seen is problematic. An ordinary accident such as Simmias's height cannot necessitate Simmias's being taller than anyone. Indeed, it was precisely this point that led us to conclude that ‘relative-making’ is a description best reserved for pairs of accidents taken jointly.\nNote, however, that it is open to the reductive realist to respond by saying that, although Simmias's height is not by itself relative-making, it is nonetheless potentially relative-making. In that case, however, the reductive realist can insist that in the presence of another height, such as Socrates's, it becomes actually relative-making—that is to say, it comes actually to relate Simmias to Socrates. This suggests a third option for reductive realists: to maintain that relations are to be identified with ordinary, non-relational accidents in certain circumstances.\nIn fact, it is this last sort of view that most reductive realists during the medieval period actually hold. Indeed, as we are interpreting Harclay, this is precisely the view he goes on to develop in the discussion we have been following. Simmias's being taller than Socrates is to be identified, on his view, not with Simmias's height tout court, but with Simmias's height in certain circumstances—including the circumstance that Socrates is five-feet-ten. To put Harclay's view in a slightly different way, which will help to bring out its semantic consequences, we might say that in a world in which Simmias exists by himself a predication of the form ‘Simmias is taller than Socrates’ will be false, and hence nothing will correspond to the relational term ‘taller than’. But in a world in which Simmias is six-feet-tall while Socrates is five-feet-ten, a predication of the same form will be true, and in this world there will be something corresponding to ‘taller’, namely, Simmias's height. In such a world, medieval philosophers would say that ‘taller’ primarily signifies Simmias's height, but indirectly signifies or connotes the height of Socrates.\nAs it turns out, it is not only reductive realists, but non-reductive realists as well that speak of relations as accidents of single subjects—that is, of Simmias's tallness as something belonging only to him, of Socrates's shortness as something belonging only to him, and so on for all other particular relations. In light of what has just been said, therefore, we can clarify our understanding of the paradigmatic analysis of relational situations. As indicated earlier, this analysis requires that when a predication of the form ‘aRb’ is true, what makes it true is a pair of individuals, a and b, and a pair of monadic properties or accidents, F and G. Reductive realists, as we have just seen, identify F and G with ordinary categorial accidents, whereas non-reductive realists identify them with accidents of sui generis type. But however we construe the nature of these accidents, both reductive and non-reductive realists deny that it is the pair of accidents—that is, F and G taken jointly—that corresponds to our relational concepts. On the contrary, they say, F directly corresponds to one of our relational concepts, whereas G directly corresponds to its converse. Thus, when Simmias is taller than Socrates, reductivists and non-reductivists are agreed that it is an accident of Simmias that directly corresponds to (or as they would prefer to say, is primarily signified by) the concept ‘taller than’, and an accident of Socrates that is primarily signified by the concept ‘shorter than’. To the extent they disagree, therefore, their disagreement concerns only whether the accidents primarily signified by relational concepts can also be signified by ordinary non-relational concepts (and if so, precisely how and under what circumstances).\nWith these clarifications in mind, let us turn now to the considerations that led some medieval philosophers to reject reductive realism in favor of some form of non-reductivism.\nOf all the considerations favoring non-reductive realism, perhaps none is more compelling than the intuition that relations have a different nature or “quiddity” from that of ordinary categorial accidents. As we have seen, medieval philosophers recognize that predications involving relative terms (such as ‘x is taller’) are incomplete in a way that monadic or absolute predications (such as ‘x is white’) are not. They also recognize, moreover, that unlike absolute terms relative terms come in pairs or sets. Every relative term has a correlative, and the meaning of the one (say, ‘taller’) cannot be understood in isolation from the meaning of the other (‘shorter’). These facts about relative terms and predication are often thought to show that their significata have a distinct nature or quiddity from the ordinary, absolute accidents that serve as their foundations. Here again it is useful to quote Harclay:\nAvicenna (Metaphysics III, the chapter on relation) says that a relation has its own quiddity distinct from the quiddity of its foundation. Therefore it is a distinct reality. Moreover, in the Categories Aristotle says that the being associated with relatives is being-toward-something-else (ad aliud se habere). But it is not the case that the being of a foundation is being-toward-something-else. Therefore they are not the same. (“Utrum Dei,” n. 43.)\nReductive realists can, of course, explain the uniqueness of relative terms and predications without introducing relations over and above their foundations. For they can always (a) assert that relative terms are associated with concepts whose content is distinct from that of any non-relational or absolute concepts, and yet (b) insist that this is all that is required to explain the peculiar nature of relative terms and predications. Even so, the question remains: If Simmias's being taller than Socrates is nothing ontologically over and above Simmias's and Socrates's heights, why do we represent it as if it were? At this point, it would seem that reductive realists have no choice but to appeal to our psychological make-up. We simply do (or at least can) represent one and the same situation in two very different ways. As Ockham says in one of his Quodlibetal questions, using a slightly different example:\nSocrates is similar to Plato by the very fact that Socrates is white and Plato is white … Yet, despite this, the intellect can express these many absolute things by means of concepts in diverse ways: in one way, by means of an absolute concept, as when one says simply ‘Socrates is white’ or ‘Plato is white’; in a second way, by means of a relative concept, as when one says ‘Socrates is similar to Plato with respect to whiteness’. (Quodl. VI, q. 25 in Opera Theologica ix, 679.)\nEven if one does not find this sort of appeal to psychology implausible, the non-reductive realists would seem to have a more satisfying reply to our original question. For they can say that the reason we represent relational situations as distinct from non-relational situation is because they are distinct. Indeed, non-reductive realists can add that the logical incompleteness of predicates such as ‘taller’ (and its correlative, ‘shorter’) calls our attention to precisely what makes these situations distinct—namely, the sui generis accidents that are possessed by Simmias and Socrates in addition to their respective heights.\nNow as most non-reductive realists recognize, there is a difficulty posed by their position—namely, that of giving a perspicuous account of the nature of paradigmatic relations or relational accidents. But they often attribute this difficulty to the fact that the nature in question is sui generis. As Albert the Great says, when he turns to the discussion of relations in his commentary on Aristotle's Metaphysics:\nIt is difficult for us to speak about [the category of] toward something or relation because it has a nature and being altogether different from the genera of being which have been considered so far [namely, substance, quantity, and quality]. (Metaphysica, 266a.)\nGiven that non-reductivists construe the nature of paradigmatic relations as sui generis, it is not surprising that they feel the need to resort to metaphors to describe it. Albert himself appeals most often to a visual metaphor of outward-looking-ness (respectus), and describes individual relations as that in virtue of which a subject “looks out toward another” (respicit ad aliud). Other philosophers, rely on other metaphors and variously describe the nature of relations as a kind of directionality or toward-ness (aditas), as a type of disposition or way of holding oneself (habitudo or relativa habitudo), or again as the source or principle of structure and order (ordinatio).\nOf all these metaphors, the ones involving directionality—or intentionality—are likely to be the most helpful to us. For there are contemporary philosophers who characterize intentionality, not in terms of a polyadic or many-place property, but as a sui generis type of monadic property. According to these philosophers, intentionality is a property whose intrinsic nature is such that, when it is exemplified by a subject in appropriate circumstances, which include the presence of an appropriate object, it relates its subject to the object in question—in particular, it relates the subject to it as thinker to object thought. This analogy is useful because non-reductive realists typically regard intentionality as a special case (or type) of relation. According to them, all paradigmatic relations (or at least all those that qualify as sui generis accidents) are properties whose intrinsic nature is such that their exemplification in the appropriate circumstances will relate their subjects to something else. It is just that in certain cases, these properties relate their subjects specifically as thinkers to objects thought.\nIn the end, therefore, it would appear that the non-reductive realists do have something to say in response to the reductivists' worries about the mysterious nature of relations and their appeals to considerations of theoretical parsimony. But what about the phenomenon of relational change?\nAs we said earlier, medieval philosophers share the intuition that the acquisition (or loss) of relations can occur without any real change on the part of their subject. To explain this intuition, some non-reductivists think it is enough to say that a relation can be acquired (or lost) without its subject undergoing any real change with respect to its absolute accidents. Thus, the example of Socrates's coming to be shorter than Simmias is sometimes glossed by saying that, with respect to absolute accidents, it is true that Socrates comes to be shorter than Simmias solely in virtue of a real change in Simmias. Nonetheless, if we consider Socrates's relative accidents as well, such non-reductivists will say that Socrates has, in fact, undergone a real ‘relative’ change—that is, a real change with respect to one of his relations. \nBut non-reductivists need not take this line. Some, more sympathetic to the reductive realist position on relational change, take cases like that involving Simmias and Socrates as an opportunity to further clarify the nature of relations. Albert the Great, for example, argues that relational accidents are so closely tied to their foundations that they are acquired along with them (cf. Metaphysica, 266b-267a, ad 1 and Brower 2001). Thus, if Socrates comes into existence in a world all by himself at a height of five-feet-ten-inches-tall, not only will he possess a certain quantity (namely, his height), but also, in virtue of it, he will possess a sui generis relational accident. Obviously, in such a world, the relational accident will not actually relate Socrates to anyone or anything (since there's nothing for it to relate him to)—though it will explain his being potentially related to other things. Suppose, however, that Simmias now comes into existence in this world at six-feet-tall. In that case, Socrates's relational accident will come actually to relate him to Simmias as shorter. Even so, Albert insists, Socrates himself will not have undergone any real change, relative or absolute. Not surprisingly these sorts of consideration lead Albert to distinguish sharply between relational accidents and relations (which are just relational accidents in certain circumstances), and to suggest that strictly speaking we should think of the relevant Aristotelian category as comprised, not of relations, but of relational accidents. These same considerations also help to explain why, in referring to the members of this category, Albert prefers the concrete terms ‘toward something’ (ad aliquid) and ‘relative’ (relativum) to the abstract term ‘relation’ (relatio)—for relational accidents are ‘toward something’ or outwardly directed even if they are not actually relating their subject to anything. (Metaphysica, 267a, ad. 3.)\nLike Albert, Aquinas too suggests that there is a close connection between relational accidents and their foundations. Following Albert's terminology, he suggests that in virtue of possessing a specific height or quantity, an individual such as Socrates is potentially equal to all those who have the same height, and potentially unequal to—that is, shorter or taller than—all those with a different height (In V Phys., lect. 3, n. 8). Like Albert, moreover, Aquinas says that such an individual can come to be actually equal (or unequal) to another solely in virtue of a change in that other, and concludes from this that relations must be in their foundations as in a root (in radice) (In V Phys., lect. 3, n. 8). On some interpretations, Aquinas's metaphor can be explicated by saying that although relations and their foundations differ formally—that is, involve different accidental forms or properties—nonetheless their act of being (esse) is the same. Thus, when Socrates comes to be shorter than Simmias as a result of Simmias's growth, Socrates does not undergo a change properly speaking, since he does not acquire any new act of being. Rather, the “old” act of being of his height (sometimes referred to as the ‘esse-in’ of the relation) merely acquires a new determination (sometimes referred to as the ‘esse-ad’ of the relation), in this case to Simmias.\nWe have seen enough to appreciate the main ontological differences that divide reductive and non-reductive realists, and even some of the differences that divide non-reductivists among themselves. As we indicated earlier, in the later Middle Ages these differences tend to emerge in the context of the debate over whether relations are identical with their foundations. As we also indicated, however, we have to be careful not to assume that how philosophers answer this question provides an infallible guide to their positions. For although reductivists typically affirm that relations are identical to their foundations, and non-reductivists typically deny it, there are some reductivists who side, at least verbally, with the non-reductivists on this question. Thus, the later Harclay, as we are interpreting him, is a reductive realist—he not only rejects the existence of sui generis relational properties, but maintains that in paradigmatic relational situations, substances are related by their ordinary, non-relational accidents. Nonetheless, Harclay denies that relations are identical with their foundations, since he thinks this would amount to saying that relations can be straightforwardly identified either with ordinary accidents taken by themselves or with pairs of such accidents taken jointly.\nAgain, as we shall point out in the next section, a number of later medieval reductivists, including Ockham, eventually come to reject the traditional Aristotelian characterization of relations as items that relate substances in favor of the view that relations are items existing only in the mind (as concepts). As we shall see, this does not mean that Ockham and others deny that there are extramental grounds for our relational concepts or even that things can be related by their foundations independently of the mind. On the contrary, it means only that, unlike their predecessors, they refuse to call anything a relation merely because it grounds a relational concept. The fact that these reductivists regard relations as concepts, however, explains why they too are unwilling to identity relations with their foundations: for the relevant foundations, according to these philosophers, are ordinary, extramental accidents, and obviously no concept (or act of the mind) could be identical with them.\nFinally, it must be noted that even the notions of identity and real distinction come to be the subject of controversy during the high and later Middle Ages, and this too has the result of complicating the debate over whether relations are identical to their foundations. For all these reasons, therefore, we must be careful not to identify too closely the debate between reductive and non-reductive realists with the debate over whether relations are identical to their foundations.\nSo far we have been focusing only on the medieval discussion of paradigmatic relational situations—that is, relational situations conforming to the analysis suggested in Aristotle's Categories. But as we indicated earlier, it is clear from some of Aristotle's later works, most notably the Metaphysics, that he thinks not all relational situations can be made to conform to it. Thus, in Metaphysics V, he suggests that there are some relational situations in which substances are related, not by a pair of accidents, but by a single accident belonging to just one of them. Here he cites the example of intentional relations: if Simmias is thinking about Socrates, this is to be explained in terms of nothing but Simmias, Socrates, and an accident of Simmias. For the sake of convenience, we shall hereafter refer to relational situations that do not conform to the Categories paradigm as ‘non-paradigmatic relational situations’.\nAlthough medieval philosophers did not have direct access to Aristotle's Metaphysics until the mid-twelfth century, they did feel pressure from other, largely theological sources to admit something like his non-paradigmatic relational situations. The standard medieval conception of deity, for example, requires that God is an absolutely perfect being, possessing no accidents whatsoever. But this conception makes it difficult to explain how God can enter into relational situations. Indeed, as Augustine points out in book V of his De Trinitate, there is a special difficulty for those want to combine this conception with the Christian doctrine of creation. For this doctrine would seem to require that God first lacks, and then acquires a contingent or accidental relation—namely, that of being creator. But then does it not also require that in creating the universe God underwent a real change? And what about the claim that there are no accidents in God?\nAugustine's solution, which is adopted by medieval philosophers generally, is to say that when God acquires a new relation, this is to be explained in terms of properties or accidents of something other than God. Thus, in the case of creation Augustine says:\nEven though [God's substance] begins to be [truly] spoken of [as related to a creature] at some time, still nothing is to be understood as having happened to the divine substance itself, but only to the creature in relation to whom it is spoken of.\nOn the basis of theological considerations, therefore, Augustine is led to something like Aristotle's non-paradigmatic relational situations. What makes it true that God is related to his creatures is nothing but God, the creatures, and a monadic property or accident of the latter.\nInterestingly, Augustine does not think that the case of God is unique, but also suggests that there are non-theological cases in which things are related solely in virtue of the properties or accidents of other things. Thus, a coin, he says can increase or decrease in value solely in virtue of the intentional states of human beings. Boethius, in a treatise also known as De Trinitate, discusses the same sorts of issues, and in the course of doing so adds yet another non-theological example—a variation of which comes to be the standard medieval example of non-paradigmatic relational situations. Consider a man who walks up beside another man (or beside stationary column, as the standard medieval variation has it). In this sort of case, says Boethius, the latter comes to be to the right of the man, but solely in virtue of a property of the man.\nThus, even before medieval philosophers had direct access to Aristotle's Metaphysics they were led to acknowledge the existence of the same type of relational situations mentioned there. Of course, once the relevant texts of Aristotle became available, the medievals worked hard to connect their discussions with these texts. Indeed, when the issue of God's relation to his creatures is taken up in the thirteenth century—an issue that becomes one of the foci of medieval discussions of relations generally—medieval philosophers often made direct appeals to Aristotle's discussion in Metaphysics V.\nSo far, then, we have seen that medieval philosophers are committed to recognizing at least one type of non-paradigmatic relational situation—namely, those involving a pair of substances and a single accident inhering in just one them. As we might expect, medieval philosophers disagree about the precise nature of the accidents involved in these situations—with reductive realists identifying them with ordinary, non-relational accidents, and non-reductive realists identifying them with accidents of a sui generis type.\nFor our purposes, however, what is most interesting about this type of relational situation has to do with complication it presents for reductivists and non-reductivists alike. In paradigmatic relational situations, there is always a distinct property or accident corresponding to each member of the relevant pair of converse relational concepts. Thus, when Simmias is taller than Socrates, there is one accident corresponding to the concept ‘taller than’ (namely, an accident of Simmias) and another accident corresponding to the concept ‘shorter than’ (namely, an accident of Socrates). But now consider a situation such as Simmias's thinking about Socrates (or God's being related to a creature)—that is, a situation where two substances are related by a property or accident inhering in only one of the relata. What is to be said about the relationship between the relevant properties and concepts in situations of this sort?\nInitially, we might expect medievals to respond to this by saying that, in such situations, the single accident responsible for relating both subjects corresponds to both members of the relevant pair of relational concepts. Thus, if Simmias is thinking about Socrates, a quality of Simmias corresponds to both the concepts ‘thinking of’ and ‘thought about’. The problem with this suggestion, however, is that it leads to the same sort of difficulties we encountered earlier for identifying relations with pairs of accidents taken jointly. Socrates's being thought about appears to be something inhering in Socrates and Socrates alone. But if we identify this relation with an accident of Simmias, then we shall have to say that Socrates's being thought about does not exist in Socrates after all, but rather exists only in Simmias. Although medievals do allow for cases of extrinsic denomination—that is, cases where a property or accident of one thing is predicated of something else—they typically do not allow for this in the case of relations. That is to say, they typically regard relations as intrinsic to the subjects of which their corresponding terms or concepts are predicated. Evidently, therefore, the relevant accident of Simmias can correspond to the concept ‘thinking of’, but not to the concept ‘thought about’. But, then, we still need to know what corresponds to this latter concept.\nNow perhaps it will be suggested that, in the absence of any property or accident of Socrates to correspond to the concept ‘thought about’, Socrates himself can serve as the correspondent. In that case, however, we should have to admit that an individual substance is a relation (since, as we have seen, whatever corresponds to a relational concept and plays the relevant metaphysical role qualifies as a relation). But such an admission goes against deep-seated intuitions deriving from the Categories. As we have seen, Aristotle not only assumes that relations are accidents in the Categories, but intentionally characterizes them in such a way as to exclude substances from this category. But then we still lack a solution to our problem. If there is no property or accident of Socrates to correspond to the concept ‘thought about’, and neither Socrates nor a property of anything else can correspond to it, what if anything can?\nIt is at this point that the medieval notion of a relation of reason (relatio rationis) becomes relevant. Medieval philosophers often say that, even if there are relational situations involving only a single accident, nonetheless these situations must be conceived as if they involved a pair, one belonging to each of the related things (cf., e.g., Aquinas, De potentia q. 1, a. 1, ad 10). Like Boethius, the medievals accept the view that relations cannot be understood to exist by themselves or apart from their correlatives. At least conceptually, they say, relations always come in pairs. Thus, even if there is no real or extramental property in Socrates that accounts for his being thought about by Simmias, we must still conceive of this situation as if there were one and, as it were, project this property onto Socrates. Since such projections depend for their existence on the activity of the mind, medieval philosophers refer to them as beings of reason (entia rationis). And their suggestion is that we take these beings of reason to be the items corresponding to or signified by concepts such as ‘thought about’.\nThe notion of a being of reason, or more specifically the notion of a relation of reason, does not appear to have been invoked in the Latin West before the thirteenth century, when Aristotle's Metaphysics and certain Muslim philosophical commentaries and treatises derived from it began to circulate widely. The notion of a relation of reason is not to be found explicitly in the works of Aristotle, though he does distinguish beings of reason in general from real beings (cf. Metaphysics IV, 1, esp. 1003a32-b11 and V, 7, esp. 1017a31–35). Even so, this notion is explicitly invoked by certain Muslim philosophers, most notably Avicenna (d. 1037), and it may well be that it makes its way into the Latin west through them.\nHowever that may be, once the notion of a relation of reason is introduced in the Latin West, it becomes pervasive—so pervasive, in fact, that even philosophers, such as Ockham, who complain that such a notion is “not to be found in the writings of Aristotle” and that “‘relation of reason’ is not a philosophical term”, nevertheless feel compelled to give some account of it in order to preserve common usage. The pervasiveness of this notion is explained at least partly by the fact that medieval philosophers think it can be used to clarify and explain a number of troublesome non-paradigmatic relational situations. For example, by the end of thirteenth century, most philosophers use it to explain the doctrine of creation, saying that creatures are related to God by a real relation, whereas God is related to them by a mere relation of reason (cf. Henninger 1989). Again, many use the notion to clarify certain cases of relational change. Thus, when a substance acquires a new relation without undergoing any real change this is often explained by saying that the substance acquired a mere relation of reason. Finally, some medieval philosophers use relations of reason to identify a sense in which God can have accidents after all. Since relations of reason are mere projections (or properties a thing has by virtue of the activity of some mind), we can conceive of them as accidents in a broad sense—that is, as properties or features that a thing can both acquire and lose. But since the acquisition or loss of these properties does not require a subject to undergo any real change, some medievals claim that there is no reason in principle why even God should not have accidents of this sort.\nThe distinction between real relations and relations of reason has a number of important consequences for the development of medieval theories of relations. For one thing, it enables philosophers to introduce a number of refinements and distinctions within the category of relations. By the mid-thirteenth century, for example, it becomes common to say that the category of relations is unique in allowing mere beings of reason among the things signified by its terms. To quote from Aquinas who is representative in this regard:\nThe other genera introduce something in extramental reality just by virtue of what they are. Thus, quantity introduces something just by virtue of the fact that it is quantity. By contrast, relation alone is such that it does not introduce anything in extramental reality, just by virtue of what it is—for it does not predicate a something but a toward something. Hence we find certain relations that do not introduce anything in extramental reality, but only in reason. (De veritate, q. 1, a. 5, ad 15.)\nAgain, Aquinas and others appeal to this special feature of the category of relations (namely, that the things signified by its terms can either be real beings or mere beings of reason) to provide a systematic division of relations or pairs of correlatives into three different types, depending on whether their members are both real, both conceptual, or mixed (one real, one conceptual). To quote again from Aquinas:\nIt must be known that, since a relation requires two relata, there are three ways in which it can be something real or conceptual:\n Sometimes it is a mere being of reason on the part of both relata, namely, when the order or [relative] disposition cannot exist between things except in virtue of the apprehension of reason alone. For example, when we say that something is identical to itself. For in virtue of the fact that reason apprehends the one thing twice, it regards it as two; and in this way it apprehends a certain [relative] disposition of a thing to itself. And the same thing is true of all relations between being and non-being, which reason forms insofar as it apprehends a non-being as a certain relatum. Again, the same is true of all relations that follow upon the activity of reason, such as genus and species, and the like.\n Now there are other relations that are real as regards both relata, namely, whenever there is a [relative] disposition between two things in virtue of something really belonging to each of them—as is clear from all relations that follow on quantity, such as large and small, double and half, and things of this sort. For there is a quantity in both relata. And the same is true of relations that follow on action and passion, such as mover and movable, father and son, and the like.\n Sometimes, however, a relation is something real in one of the relata and a mere being of reason in the other. And this happens whenever the two relata do not belong to a single order. For example, sense perception and knowledge are related to things that are sensible and intelligible. But insofar as the latter are things existing in extramental reality, they are outside the order of sensible and intelligible being. And so there is a real relation in the knowledge and sense perception in virtue of the fact that they are [really] ordered to things that can be known or sensed. However, things [that can be known or sensed] are outside this sort of order [when] considered in themselves, and hence there is not really a relation in them to knowledge or sense perception. On the contrary, there is only a relation in them according to reason, insofar as the intellect apprehends them as terms of the relations of knowledge and sense perception. This is why the Philosopher says in Metaphysics V that they are spoken of relatively, not because they are related to other things, but because other things are related to them. Similarly, being to the right is not said of a column unless it is placed to the right of some animal. Hence a relation of this sort is not really in the column but in the animal. (Summa Theologiae I, q. 13, a. 7, corpus.)\nIn this passage, Aquinas contrasts the relations involved in paradigmatic relational situations—namely, relations of the second type—with the relations involved in two sorts of non-paradigmatic relational situation. We are already familiar with relations of the third or ‘mixed’ type from our discussion of creation and intentional relations. Moreover, we can see that Aquinas follows the common medieval practice of connecting relations of this type with both Aristotle's discussion in the Metaphysics and the Boethius-inspired example of the column. We have yet, however, to encounter relations of the first type. These are relations comprised by pairs of properties or accidents both of whose members are beings of reason. As an example of this type of relation, Aquinas gives self-identity. When we conceive of a situation involving this sort of relation, he says, we conceive of it as if it involved two things (“a relation requires two relata” and hence “reason apprehends the one thing twice”), and also as if the two things were ordered to each other by a pair of properties (or “[relative] dispositions”). Obviously, however, there are not distinct things in extramental reality serving as the relata of the relation of self-identity, much less two properties by which such relata are related. Like many other medievals, therefore, Aquinas concludes that in this case the relations (or relative dispositions) are not real, but mere beings of reason.\nThe claim that self-identity is a relation of reason might seem worrisome. For insofar as relations of reason depend for their existence on the activity of the mind, it would seem to follow that something's being self-identical is mind dependent. But that is absurd.\nAquinas is aware of this sort of worry. In fact, in one of his disputed questions, he imagines a similar worry leading someone to doubt the view that even God's relation to his creatures can be considered a relation of reason:\nAfter all, if there were no created intellect in existence, God would still be Lord and Creator. But if there were no created intellect in existence, there would not be any beings of reason. Hence ‘Creator’, ‘Lord’, and terms of this sort, do not express relations of reason. (De potentia, q. 7, a. 11, obj. 4.)\nThis sort of worry about relations of reason helps to explain what is perhaps their most significant effect on the medieval discussion of relations—namely, a gradual shift away from the traditional Aristotelian characterization of relations. On this characterization, as we saw earlier, relations are identified at least partly in terms of their metaphysical function—that is to say, they are identified as items that actually serve to relate things. But in order to maintain that things can be self-identical apart from the activity of any mind, while at the same time maintaining that self-identity is a relation of reason, medieval philosophers have little choice but to move away from the traditional characterization. And of course the same thing is true in the case of God's relation to his creatures. Thus, as Aquinas says in reply to the abovementioned doubt:\nA man is really (and not merely conceptually) identical to himself, even though his relation [of self-identity] is a being of reason. And the explanation for this is that the cause of his relation is real—namely, the unity of his substance, which our intellect considers under the aspect of a relation. In the same way, the power to compel subjects is really in God, and our intellect considers this power as ordered to the subjects because of the subjects' order to God. It is for this reason that he is really said to be Lord, even though his relation is a mere being of reason. And for the same reason it is evident that he would be Lord [Creator, etc.] even if there were no created intellect in existence. (De potentia q. 7, a. 11, ad 3–5.)\nIn this passage, Aquinas makes it clear that in cases involving relations of reason—such as self-identity or God's relation to the world—the relata are related, not by their relations (since these are mere beings of reason and hence dependent on the activity of the mind), but by what he refers to here as the cause of their relations. Now, in the case of a man's being self-identical, Aquinas says the cause is just “the unity of his substance”, where by this he seems to mean that what makes a man identical to himself is just the man himself. Again, in the case of God's being Lord he says that the cause is “the power to compel subjects”. In the case of God, however, Aquinas does not think the power to compel subjects is distinct from its subject, namely, the divine nature. Hence, he maintains that what makes it true that God is Lord is nothing but God, his creatures, and some property or attribute of the creatures.\nIn effect, therefore, reflection on relations of reason brings about a shift away from the conception of relations as items that relate, and thus forces medieval philosophers to fall back on what they might otherwise have thought of as an equivalent characterization, namely, the view that relations are items corresponding to or signified by our genuinely relational concepts. Thus, even if self-identity or God's relation to the world is a mere being of reason, and hence does not actually relate its subject to anything, nonetheless it can still be regarded as a relation on the grounds that it is signified by a relational concept. Now obviously this shift away from the traditional Aristotelian conception has the awkward consequence that things can be related even if their relations do not exist. Thus, Socrates can be identical to himself even if there is no self-identity, God can be Lord of creation even if his relation of Lordship does not exist, and more generally, a predication of the form ‘aRb’ can be true, even when no predication of form ‘R-ness exists’ is true. Of course, there is nothing ultimately incoherent about this consequence, provided we keep in mind that the relations in such cases are mere beings of reason. Nonetheless, accepting this consequence does force medieval philosophers to deny what at least initially appears to be a truth of reason, and at any rate is part of common sense—namely, that things are related by their relations.\nSome philosophers, such as Aquinas, assume that the departure from the traditional Aristotelian characterization of relations is required only in non-paradigmatic relational situations. By the end of the Middle Ages, however, this sort of departure is so common and familiar that philosophers no longer feel the need to regard it as exceptional. Thus, Ockham eventually adopts a view according to which all relations depend for their existence on the activity of the mind. Indeed, things are so changed by the time of Ockham that he feels free not only to reject the traditional Aristotelian characterization of relations, but also to modify the standard medieval alternative to it. On his preferred characterization, relations are the items corresponding, not to all of our relational concepts, but to just one of them—namely, the concept ‘relation’. As Ockham sees it, moreover, the concept ‘relation’ is a term of second intention—that is to say, a term to which only concepts correspond. Thus, even though Ockham insists that many predications of the form ‘aRb’ are true independently of the mind, he nonetheless maintains that properly speaking relations exist only in the mind as concepts. This helps to explain why he often expresses his view using such otherwise unintelligible formulas as: “This white thing really is similar, even though similarity is not really in this white thing” (Quodl. VI, q. 22 in Opera Theologica ix, 669).\nAlthough relations of reason force a shift away from the Aristotelian characterization of relations, it is important to recall that they were originally invoked to preserve the deep-seated Aristotelian conviction that no substance is a relation. As we have seen, it was to avoid saying that Socrates is signified by the concept ‘thought about’, when he is being thought about by Simmias, that medieval philosophers invoked the notion of a relation of reason: it is not Socrates, but a relation of reason, they say, that corresponds to the concept in question, and in this way avoid the consequence that a substance such as Socrates is a relation. And of course it was the same sort of invocation that enabled them to avoid saying that Socrates corresponds to the concept of ‘self-identical’ or that God corresponds to the concepts ‘Lord’ or ‘Creator’. Given the lengths to which medieval philosophers are willing to go, in situations such as these, to preserve the Aristotelian thesis that no substance is a relation, it is all the more surprising that there is at least one case—namely, the Christian doctrine of the Trinity—in which they are forced to admit that even it cannot be upheld.\nAccording to Christian doctrine of the Trinity, God exists in three persons: Father, Son, and Holy Spirit. As this doctrine was typically understood during the Middle Ages, it implies not only that God possesses certain relations—such as fatherhood and sonship—but also that he possess them independently of the activity of any mind. As Aquinas says in his Summa Theologiae:\nSomeone is said to be a father only by virtue of his fatherhood, and someone is said to be a son only by virtue of his sonship. Therefore, if [the relations of] fatherhood and sonship are not really in God, it follows that God is not a Father or Son really, but merely according to a concept of the mind—which is the Sabellian heresy.\nNow when the claim that there are real relations in God is combined with another doctrine that was ubiquitous in the Middle Ages, namely the doctrine of divine simplicity, the conclusion that God (and hence at least one substance) is a relation seems to follow necessarily. For as the doctrine of divine simplicity is typically understood, there is no real distinction to be drawn between God and any of his intrinsic or essential attributes. Thus, if God is good, he is identical to his goodness; if he is wise, he is identical to his wisdom. By parity of reasoning, therefore, if God is a father or son, he must be identical to his fatherhood and sonship. Again, Aquinas is perfectly representative in this regard:\nWhatever is in God is his nature … It is thus clear that a relation really existing in God is identical to his nature according to reality, and does not differ from it except according to a concept of the mind. (Summa Theologiae I, q. 28, a. 2, corpus.)\nWith the doctrine of the Trinity, therefore, we arrive at what is perhaps the medievals' greatest departure from Aristotle.\nSome medievals, however, see the Trinity not as providing a counterexample to Aristotle's thesis that no substance is a relation, but rather as calling our attention to a restriction on its range of applicability. Aquinas, for example, appears to think that the thesis was specifically formulated to apply only to the case of creatures (cf. Summa Theologiae I, q. 28, a. 2, corpus), and to some extent this is plausible, since obviously Aristotle was not thinking about theological examples such as the Trinity when he formulated it. Interestingly, however, other philosophers think that the thesis does not hold even in the case of all creatures. Thus, Gilbert of Poitiers (d. 1154), in a discussion of Boethius's De hebdomadibus, suggests that creaturely goodness is a relation, indeed, just the relation of being created by God. On this interpretation, moreover, Gilbert takes this relation to be nothing over and above creatures themselves, so that in their case it is individual substances that correspond to the concept ‘created by’ and hence qualify as relations. Like Aquinas, however, Gilbert appears to think of these sorts of cases, not as providing counterexamples to Aristotle's thesis, but rather as telling us something about the scope of its applicability. According to Gilbert, there is a distinction to be drawn between natural philosophy, which deals with natural things, and other areas of intellectual inquiry, including theology and ethics, which deal with a broader scope of things. And Gilbert's suggestion is that if we restrict our attention to natural philosophy, as no doubt Aristotle did, then like him we will be led to the conclusion that no substance is a relation.\nAlthough Gilbert and Aquinas work hard to preserve something like the Aristotelian thesis that no substance is a relation, at least in non-theological contexts, not all medieval philosophers feel the need to do so. In fact, as Middle Ages progress, there appears to be a gradual shift, even in non-theological contexts, towards allowing substances to be relations, or at least towards allowing them to be the primary significata of our relational concepts. Here again Ockham appears to be an important transitional figure. Thus, he breaks with tradition in allowing that even self-identity is a real relation, or at least “real … in the same way that similarity and equality are” (Quodl. V, q. 27 in Opera Theologica ix, 685). Indeed, on Ockham's view, which becomes influential in the generations following him, it turns out that substances are signified by most of our relational concepts. Apart from some species of quality, Ockham thinks there is no real distinction to be drawn between substances and any of there accidents. According to him, therefore, relational situations do not typically involve anything more than individual substances.\nWe are now in a position to appreciate the main types of views that medievals developed concerning the nature and ontological status of relations, as well as the main historical and dialectical considerations that helped to shape them. As we have seen, with the exception of thinkers such as Peter Auriol, medievals appear to have been drawn (almost to a person) to a form of realism about relations, one according to which at least some predications of the form ‘aRb’ are true independently of the mind. There is some disagreement as to the precise analysis of the situations that makes these sorts of predications true, but even here the medievals typically develop their views from within a common framework provided by Aristotle's Categories: relational situations do not include anything corresponding to the notion of a polyadic property, but instead include only substances and their monadic properties or accidents. The main medieval disagreements, therefore, are best characterized as disagreements about the extent to which the proper analysis ought to conform to the paradigm suggested by the Categories. Prior to the fourteenth century, as we have seen, medievals tended to follow Aristotle in claiming that things are related by their accidents, and hence that relational situations typically involve not only pairs of substances, but pairs of monadic properties or accidents as well. As a result, one of the most pressing questions during this period concerns the precise nature of the accidents involved in relational situations. Reductive realists, as we have seen, identify them with ordinary, non-relational accidents such as quantities or qualities, whereas non-reductive realists identify them with monadic properties of a sui generis type.\nWith the advent of the fourteenth century, however, important changes begin to take place in the medieval discussion of relations. Philosophers and theologians continue, of course, to allow for situations in which substances are related by their accidents, and hence to worry about the precise nature of the accidents involved in these situations. But at this point there is a decided shift toward regarding such situations as exceptional. As we have seen, there was always strong theological pressure to allow for at least some departures from the Aristotelian paradigm. But what appears to have happened over time is that these departures come to seem less and less peculiar, and eventually to provide the basis for a new analysis of relational situations—one according to which substances themselves are the items responsible for relating. Around this same time, moreover, Ockham and his followers, most notably John Buridan, institute another sort of change, namely, a shift away from the traditional Aristotelian characterization of relations. Prior to the fourteenth century, philosophers and theologians typically assume that the term ‘relation’ signifies whatever it is in a relational situation that does the relating—though here again theological considerations force them to allow for certain exceptions. By the time of Ockham, however, we get a complete break with this standard characterization. Thus, whereas earlier philosophers and theologians would allow the term ‘relation’ to signify a being of reason only in certain cases, such as creation, Ockham and his followers maintain that ‘relation’ is a term of second intention, and so strictly speaking always signifies beings of reason. With Ockham, therefore, we have not only a complete severing of the connection between relations and those items in relational situations that actually do the relating, but also the advent of a new—and, we might add, fairly harmless—form of anti-realism.\nIn the end, therefore, it is fair to say that the fourteenth century marks a shifting of medieval paradigms both with respect to the proper analysis of relational situations and with respect to the proper characterization of relations. It is important to add, however, that these shifts cannot be fully explained in terms of developments within the medieval discussion of relations, but are instead part-and-parcel of broader theoretical shifts in medieval accounts of the relationship between mind, language, and reality—shifts which are closely associated with the rise of late-medieval nominalism generally.\n[Note: This bibliography contains only items referred to in the notes and a few other selected items of interest. For a general introduction to some of the main philosophical issues surrounding relations, see Heil 2009. For discussion of specifically medieval theories, as well as further bibliographical references, see Henninger 1989, Olson 1987, and Weinberg 1965. For more contemporary defenses of the view we have been calling ‘realism without polyadic properties,’ see Campbell 1990, Fisk 1973, Mulligan 1998, Parsons 2008, and Schaffer 2010.]\n- Abelard, Peter., Logica ‘ingredientibus’ in Peter Abaelards Philosophische Schriften I, vol. 21, B. Geyer (ed.), Münster: Aschendorff, 1933.\n- Albert the Great, Metaphysica, B. Geyer (ed.), Alberti Magni Opera omnia edenda curavit, vol. XVI, Münster: Aschendorff, 1960–64.\n- –––, Liber de praedicamentis, A. Borgnet (ed.), Alberti Magni Opera omnia, Paris: Vivès, 1890.\n- Aquinas, Thomas, Opera Omnia, R. Busa (ed.), Stuttgart-Bad Canstatt: Frommann-Holzboog, 1980.\n- Aristotle, The Complete Works of Aristotle, J. Barnes (ed.), Princeton: Princeton University Press, 1984.\n- Augustine, De Trinitate Libri XV, W. J. Mountain (ed.), Libri XV Corpus Christianorum (Series Latin, 50), Brepols: Turnhout, , 1968.\n- Aurieoli, Peter, Scriptum super Primum Sententiarum, Vatican Library MS, Borghese 329, fols. 1–519.\n- Avicenna, Liber de Philosophia Prima, sive Scientia Divina I-IV, S. Van Riet (ed.), E. Peters: Louvain/Leiden, 1977.\n- Boethius, In Categorias Aristotelis, in Patrologiae Latinae Cursus Completus, J. P. Migne (ed.), Paris: Vivès, 1860, vol. 64.\n- Buridan, John, Summulae de Dialectica, an annotated translation with an introduction, G. Klima, Yale Library of Medieval Philosophy, New Haven: Yale University Press, 2002.\n- –––, Summulae: In Praedicamenta, introduction, critical edition, and appendices, E.P. Bos, Artistarium 10–3, Nijmegen: Ingenium Publishers, 1994.\n- Freddoso, A. J., and F. E. Kelley, William of Ockham: Quodlibetal Questions, Volumes 1 and 2, Quodlibets 1–7, New Haven/London: Yale University Press, 1991.\n- Harclay, Henry, “Utrum Dei ad creaturam sit relatio realis,” in “Henry of Harclay's Question on Relations,” M. G. Henninger (ed.), Mediaeval Studies, 49 (1987): 76–123.\n- Hume, D., A Treatise of Human Nature, L. A. Selby-Bigge (ed.), Oxford: Clarendon Press, 1888.\n- Leibniz, G. W., Die Philosophische Schriften von Gottfried Wilhelm Leibniz, C. I. Gerhardt (ed.), Hildesheim: Georg Olm Verlag, Germany, 1965.\n- Locke, J., An Essay Concerning Human Understanding, Oxford: Oxford University Press, 1975.\n- Loux, M. J. (tr.), Ockham's Theory of Terms: Part I of Ockham's Summa Logicae, Notre Dame: University of Notre Dame Press, 1974.\n- MacDonald, S. (ed. and tr.), Cambridge Translations of Medieval Philosophical Texts: Metaphysics, Cambridge: Cambridge University Press, forthcoming.\n- Ockham, William, Opera Philosophica, Ph. Boehner, et al. (eds.), 10 vols., St. Bonaventure, NY: The Franciscan Institute, 1967–86.\n- –––, Opera Theologica, Ph. Boehner, et al. (eds.), 7 vols., St. Bonaventure, NY: The Franciscan Institute, 1974–88.\n- Scotus, John Duns, Ioannis Duns Scoti Ordinis Fratrum Minorum Opera Omnia, C. Balić et al. (eds.), Vatican: Typis Polyglottis Vaticanis, 1950-.\n- Spade, P. V. (tr.), Five Texts on the Mediaeval Problem of Universals: Porphyry, Boethius, Abelard, Duns Scotus, Ockham, Indianapolis/Cambridge: Hackett, 1994.\n- Stewart, H. F, E. K. Rand, and S. J. Tester (eds. and tr.), The Theological Tractates and the Consolation of Philosophy: Text and Translations, Cambridge, MA: Harvard University Press, 1978.\n- Velecky, C. (tr.), St. Thomas Aquinas, Summa Theologiae, Volume 6: The Trinity (Ia. 27–32), London/New York: Blackfriars, 1965.\n- Adams, M. M., 1987. William Ockham, 2 vols., Notre Dame: University of Notre Dame Press.\n- Addis, L., 1989. Natural Signs: A Theory of Intentionality, Philadelphia: Temple University Press.\n- Ashworth, E. J., 1974. Language and Logic in the Post-Medieval Period (Synthese Historical Library, vol. 12), Dordrecht: D. Reidel.\n- Boler, J., 1985. “Ockham's Cleaver,” Franciscan Studies, 45 (1985): 119–144.\n- Brower, J. E., 2001. “Relations without Polyadic Properties: Albert the Great on the Nature and Ontological Status of Relations,” Archiv fur Geschichte der Philosophie, 83: 225–57.\n- –––, 1998. “Abelard's Theory of Relations: Reductionism and the Aristotelian Tradition,” The Review of Metaphysics, 51: 605–631.\n- Brower, J. E. and S. Brower-Toland, 2008. “Aquinas on Mental Representation: Concepts and Intentionality,” The Philosophical Review, 117: 193–243.\n- Campbell, K., 1990. Abstract Particulars, Oxford: Basil Blackwell.\n- Cover, J. and J. O'Leary-Hawthorne, 1999. Substance and Individuation in Leibniz, Cambridge: Cambridge University Press.\n- Fisk, M., 1973. Necessity: An Essay in Physical Ontology, Indiana University Press.\n- Fumerton, Richard, 2002. Realism and the Correspondence Theory of Truth (Studies in Epistemology and Cognitive Theory), Lanham, Maryland: Rowman & Littlefield Publishers.\n- Gracia, J., 1988. Introduction to the Problem of Individuation in the Early Middle Ages (Analytica Series), Washington, D.C.: Philosophia Verlag and Catholic University of America Press.\n- Hansen, H., 2012. “Strange Finds, or Nicholas of Paris on Relations,” in J. Fink, H. Hansen, and A. Mora-Marquez (eds.), Logic and Language in the Middle Ages: A Volume in Honour of Sten Ebbesen, Leiden: Brill: 139–154.\n- Heil, J., 2009. “Relations,” in R. Le Poidevin and R. Cameron, eds. Routledge Companion to Metaphysics, London: Routledge: 310–321.\n- Henninger, M., 1989. Relations: Medieval Theories 1250–1325, Oxford: Clarendon Press.\n- Hourani, G. F. (ed.), 1975. Essays on Islamic Philosophy and Science, Albany, NY: State University of New York Press.\n- Klima, G., 1993. “The Changing Role of Entia Rationis in Medieval Philosophy: A Comparative Study with a Reconstruction”, Synthese, 96: 25–59.\n- –––, 1991. “Ontological Alternatives vs. Alternative Semantics in Medieval Philosophy,” S-European Journal for Semiotic Studies, 3: 587–618.\n- Krempel, A., 1952. La doctrine de la relation chez saint Thomas, Paris: J. Vrin.\n- Kretzmann, N., Kenny, A., and Pinborg, J. (eds.), 1982. The Cambridge History of Later Medieval Philosophy, Cambridge: Cambridge University Press.\n- MacDonald, S., 1999. “Gilbert of Poitiers’ Metaphysics of Goodness,” Recherches de Théologie et Philosophie médiévales, July: 57–77.\n- –––, 1991. Being and Goodness: The Concept of the Good in Metaphysics and Philosophical Theology, Ithaca, NY: Cornell University Press.\n- Marinozzi, C., 1964. “La relazione trascendentale in S. Alberto M.,” Laurentianum, 5: 71–113.\n- –––, 1965. “La realtà delle relazioni secondo S. Alberto Magno,” Laurentianum, 6: 31–72.\n- Marmura, M. E., 1975. “Avicenna's Chapter, ‘On the Relative’, in the Metaphysics of the Shifā,” in Hourani 1975.\n- Menn, S., 1997. “Suárez, Nominalism, and Modes,” in White 1997.\n- Mulligan, K., 1998. “Relations—Through Thick and Thin,” Erkenntnis, 48: 325–353.\n- Olson, K. R., 1987. An Essay on Facts, Chicago: Chicago University Press.\n- Parsons, J., 2008. “Are There Irreducibly Relational Facts?” in E.J. Lowe and A. Rami (eds.), Truth and Truth-Making, Stocksfield: Acumen Publishing, 217-226.\n- Schaffer, J., 2010. “The Internal Relatedness of All Things,” Mind, 119: 341–376.\n- Schmidt, R. W., 1986. The Domain of Logic According to Saint Thomas Aquinas, Hague: Martinus Nijhoff.\n- Spade, P. V., 1999. The Cambridge Companion to Ockham, Cambridge: Cambridge University Press.\n- Weinberg, J., 1965. Abstraction, Relation, and Induction: Three Essays in the History of Thought, Madison: University of Wisconsin Press.\n- White, K. (ed.), 1997. Hispanic Philosophy in the Age of Discovery, Washington, D.C.: The Catholic University of America Press.\n- Wippel, J. F., 2000. The Metaphysical Thought of Thomas Aquinas: From Finite Being to Uncreated Being (Monographs of the Society for Medieval and Renaissance Philosophy, 1), Washington, D.C.: The Catholic University of America Press.\n- –––, 1987. “Thomas Aquinas's Derivation of the Aristotelian Categories (Predicaments),” Journal of the History of Philosophy, 25: 13–34.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.\n- John Kilcullen's Medieval Philosophy Teaching Materials.\n- Paul Spade's Medieval Logic and Philosophy site.\n- Spade, P. V. 1996a. Thoughts, Words and Things: An Introduction to Late Mediaeval Logic and Semantic Theory, Version 1.0. (PDF file)\n- Spade, P. V. 1985. A Survey of Medieval Philosophy, Version 2.0. (PDF file)\nI am grateful to Gyula Klima, Lloyd Newton, Paul Studtmann, Jack Zupko, and especially Susan Brower-Toland for comments and suggestions on earlier versions of this article.", "label": "No"} {"text": "“MyLifeElsewhere allows you to compare your home country with different countries around the world. Ever wonder what your life would be like if you were born somewhere else?”\nDid you know that with 1/30th the territory of the United States, Norway still has over 25% more coastline? I didn’t either until I compared Norway to the United States using My Life Elsewhere. This site is designed allow United States students to imagine how their lives might be different if they were born in a different part of the world. Student would probably die 21 years earlier if they were born in Liberia and 11 times more likely to have died in infancy. Students would be 43.8% less likely to grow up and be unemployed and have 36.3% less babies if they were born in Taiwan. This side-by-side format is a great way to help students help make these statistics real and meaningful. One major drawback: this site only allows users to compare a country to the United States. If you prefer to have students compare, say Cuba to the United Arab Emirates, I would recommend that you try If It Where My Home.", "label": "No"} {"text": "By Nancy Krasa\nPublisher: Brookes Publishing; 1 edition (April 3, 2009)\nHow do children learn math—and why do some children struggle with it? The answers are in Number Sense and Number Nonsense, a straightforward, reader-friendly book for education professionals and an invaluable multidisciplinary resource for researchers. More than a first-ever research synthesis, this highly accessible book brings math difficulties into clear focus, helping educators and psychologists get inside students’ heads so they can devise the best way to help children learn. Clinical psychologist Nancy Krasa and middle-school teacher Sara Shunkwiler combine their expertise for an eye-opening exploration of how the brain works during the many complex facets of math learning.", "label": "No"} {"text": "by Filip Tkaczyk\nThe wet, cool and moderate Pacific Northwest weather is a powerful force in shaping the ecology of the land. Understanding its patterns and how they change throughout the seasons is a vital skill to anyone who is serious about learning to enjoy the outdoors and especially for those interested in wilderness survival. The weather patterns present a unique assortment of challenges and blessings on the lands of the Pacific Northwest. It affects all aspects of the lives of the people who live in this region, and also strongly influences each area of curriculum at Alderleaf Wilderness College.\nLay of the Land\nTo understand the Pacific Northwest weather, you must first understand its geography. Large mountain ranges cross this land in several places, the largest being the Cascade Range which stretches from northern California, through Oregon and Washington, and reaching into southern British Columbia. This range of mountains acts both as a rain trap and a rain barrier. On the western slopes of the Cascades, rainfall is high from 40 to over 80 inches per year. Meanwhile, on the eastern slopes it is much lower and decreases as you travel further east and lower in elevation, from about 30 to less than 20 inches. The relatively dry, semi-arid region east of this mountain range is called the Columbia plateau. This region can see less than 15 inches of rain annually! This dramatic climatic impact of the mountains is known as the “rain-shadow effect.”\nSmaller coastal mountain ranges such as the Olympic Range can show similar effects on a more localized level.\nWhere does it come from?\nWarm, moisture laden air travels from out of the Pacific ocean to the Southwest of the region and moves inland as it arrives at the Pacific Northwest. From fall through springtime, this often carries with it the rains that many associate with Pacific Northwest weather. Generally, the dominant weather patterns for most of the year come from the Pacific ocean, following the dominant wind direction in this region. This can vary somewhat on a more localized scale.\nIn the late fall, winter and early spring, weather that comes from the Northwest and travels inland often carries with it snow. While in the summer, this same weather is a harbinger of warm, clear days.\nVery cold weather comes from the Northeast, from the interior of the continent. This weather is driven by the very cold air that comes out of the Great Plains, flows over the Rocky Mountains to the east, fills the Columbia basin like a giant bowl until it overflows over the Cascade range and into the usually more moderately cool regions west of the mountains. Often, snow may follow on the arrival of such a cold spell.\nRain in summer?\nIt is true that Pacific Northwest weather is very unpredictable, and even the best forecasters can be wrong about what it will do on a day to day, let alone week to week basis! Rain and cloud cover are a staple of the weather in the region west of the Cascade mountains, and even the warm summertime season may be interspersed with periods of rain.\nFrom the survival standpoint, being prepared for wet and cool weather at just about any time of year is wise. Spending time safely in the outdoors in this region requires good planning and good equipment. The higher elevations in the mountains get significant amounts of snowfall each year and can be drastically colder than the lowland valleys during winter.\nWorking with the weather\nGiven the active, hands-on and outdoor focused curriculum at Alderleaf, a good understanding of local weather and how to respond to it is key to the success of the school’s programs. Each of the 6 areas of curriculum is strongly affected by the Pacific Northwest weather, which includes: wildlife tracking, naturalist studies, ethnobotany, wilderness survival, permaculture and nature-based education.\nWildlife Tracking is the study of the tracks and sign left behind by wildlife. The abundant waters of the region create many places to find clear tracks, such as muddy or sand areas along rivers, lakes, ponds and wetlands. The nearly annual flooding caused by the impact of high rainfall events on major rivers can create a tracking bonanza. The fine silt deposited by these flood events can be perfect for capturing and holding the tracks left by the passing of even the tiniest wildlife. The saturated soils during the fall, winter and springtime also help hold the more subtle compression tracks left in the duff in the woodlands and forests, allowing trackers to more easily follow the trails left behind by animals such as deer or bears.\nNaturalist studies are focused on the local flora, fauna and\ngeneral ecology of the region, of which the Pacific Northwest weather is a\nmajor influencing force. The effects of\nthe rain shadow on the variety, distribution and diversity of the plants, fungi\nand animals found in this region are very dramatic. On the western slopes and further West of the\nCascades, many landscapes are covered in moss-laden coniferous forests. Many animals and plants are specially adapted\nto live and grow in the cool, moist and relatively mild climate of this\narea. East of the Cascades, a completely\ndifferent community of animals, plants and fungi live together in a drastically\ndryer and more extreme environment. This incredible diversity, which includes temperate rain forests, glaciers and semi-arid lands is all found in a relatively small area and can only exist because of the annual patterns of weather.\nEthnobotany - which is the study of human relationships with plants - is shaped completely by the Pacific Northwest weather. The amount of rain that falls in various areas throughout the region determines what kinds of plants can grow there. Even a difference of a few inches can mean the presence of one plant and the absence of another. Due to the abundant moister, plant growth can be explosive during the warmer parts of the year. Many berry producing plants grow in the region, and are a source of wild foods for those who know about them. The fall rains bring another natural bounty: wild edible mushrooms.\nWilderness Survival demands a clear understanding of Pacific Northwest weather. In order to survive in this climate, you must be able to reliably create a fire. Also, knowing where to seek shelter or how to create it is vital. Exposure is the greatest killer in the wilderness areas of the Pacific Northwest. Wearing the proper clothing in this rainy region is very helpful, especially wool or synthetic clothing. Though more well-known for its wetness, the Pacific Northwest includes some impressive mountain ranges. The high elevation mountain environments can be punishingly cold in the winter. On glaciated peaks, freezing to death is a real possibility even in the middle of summer. Given the rich and varied landscape of the region, it is an important survival skill to know how to navigate using map, compass and other tools.\nPermaculture is an approach to designing human settlements and agricultural systems that mimic and learn from the relationships found in natural systems. It works with the land and the weather of a region to provide for the needs of humans while also helping rehabilitate disturbed land. The mild temperatures, and abundant rain makes for great growing conditions for many kinds of cultivated foods. The only limiting factor West of the Cascades is the amount of sun, which needs to be collected and utilized whenever possible to maximize growth. The rain can be harvested in water catchment systems, and then fed to gardens during the drier periods of summer.\nNature-based education is intimately connected to the experiences of being on the land and in the weather of the Pacific Northwest. The frequently shifting weather adds richness and drama to the teaching environment of the outdoors. Getting muddy, soaked by rain and exploring the moss-covered wonderland of this region is an inspiration in and of itself. Due to its often milder temperatures and moisture, the Pacific Northwest is a perfect place to teach nature-based education. There is such a rich landscape of different textures, colors, smells, as well as flora and fauna.\nTo learn more about how to survive and thrive in the Pacific Northwest weather, please check out our: Wilderness Survival Course.", "label": "No"} {"text": "A new collection of number chart 1-200 is available for your children as their media to learn how to count and memorize numbers in order.\nThis handful of charts of number 1-200 is ready to save and print to be used to help your kids them learning about numbers. The first chart is posted in the following image!\nThe blue number chart 1-200 posted above is available in high quality that allows you to print it in larger size. In learning number, counting is the primary step to make children understand the order of the numbers. You can ask your kids to practice counting numbers from 1 to 200 and after they have done memorizing the numbers, you can give them the number worksheets and ask them to complete the blank space on the charts.\nThere are many other kinds of number chart sheets that you can save and print to assist your children in learning numbers from 1 to 200. These charts were made in eye catching and adorable pictures that will make your children interested in learning. Just simply click on the picture to enlarge and save it.\nDon’t forget to print these number charts as your children’s media in developing their knowledge in numbers!", "label": "No"} {"text": "For several years now, my friend and colleague, Chris Brown, and I have been studying the tiger beetles (family Cicindelidae) of Missouri in an attempt to characterize the faunal composition and in-state distributions of the included species. Our studies have relied on examination of specimens in museum collections along with several seasons of field work across the state. The data we’ve gathered so far have revealed a fauna that reflects the ecotonal position of Missouri, comprised of elements from the eastern deciduous forest, the southeastern mixed hardwood forests and pinelands, and the western grasslands. These beetles are most frequently associated with disturbed habitats containing sparse vegetation, such as sandbars and erosion cuts, but they also live in other habitats such as along muddy banks, on glades and in forest litter. Since European settlement of Missouri, drastic alterations have occurred in the abundance and distribution of these habitats across the state, and tiger beetle populations have been affected as a result. Dredging and straightening of natural water courses have impacted species that prefer the water’s edge, while fire suppression has impacted those that need dry, open habitats. Grazing has had a profound impact on species associated with sensitive, saline habitats. Conversely, some anthropogenic changes have benefited certain species – road, borrow sand pit and pond construction have increased habitat for species able to utilize such habitats. To date, our surveys have confirmed the presence of 23 species in Missouri (16% of the North American fauna). Some species are common and widespread, such as Cicindela sexguttata (six-spotted tiger beetle) (above, photo taken in a mature white oak forest in Warren Co.). Others have more specific habitat requirements, but their status within the state remains secure. A few are rare and highly localized, primarily representing species at or near the northern or western edge of their distributions that exist in the state as small, disjunct populations. Special conservation efforts may be warrented for these to ensure their continued survival within the state.\nOne species of potential conservation concern is C. pruinina (loamy-ground tiger beetle), a grassland species normally found in Kansas, Oklahoma, and Texas (left, photo by Chris Brown). This beetle is sometimes treated as a synonym or subspecies of C. belfragei but was most recently considered a valid species by Spomer et al. (2008). When we began our studies, the species was known from Missouri only by a small series of specimens collected in one of the western counties and deposited in the collection of Ron Huber. An additional specimen in the Huber collection labeled “Columbia, Mo.” is considered to likely represent student mislabeling. Several attempts at relocating the western Missouri population were required before we found it, and intensive surveys to determine the extent of its distribution in Missouri were conducted during 2006 using a combination of pitfall traps and direct observation. Those surveys succeeded in detecting the beetle only along one 2.5-mile stretch of county road in Johnson Co. The beetle seems to be restricted to red clay embankments occurring in a small localized area of the county. This season we plan to refine our survey by focusing tightly on promising habitats in this area near the sites identified in 2006 to more precisely define the distributional limits of this population. Regardless of what we find, the flightless nature of the species, its highly localized Missouri occurrence, and the disjunct nature of such suggest that special conservation status is warranted for the species to ensure its continued presence in the state. Despite the relatively low numbers of individuals we have seen, the protected status of the land on which this beetle lives leaves us optimistic about its future.\nA Missouri species about which we are far less optimistic is C. circumpicta johnsonii (saline springs tiger beetle) (right, photo by Chris Brown), long known from saline spring habitats in the central part of the state. The Missouri population is highly disjunct from the main population further west and exhibits a uniform blue-green coloration rather than the mix of blue, green, and red colors exhibited by the main population. These features suggest that separate subspecies status might be warranted for the Missouri population. Numerous historical collection records exist from a handful of sites in Howard and Cooper Counties; however, surveys conducted by us during recent years revealed that the populations had suffered severe declines. This appears to be largely due to cattle disturbance and vegetational encroachment of the sensitive saline spring habitats upon which the beetle depends, especially at sites located on private land. Ron Huber, in a letter to me listing the collecting records he had for this species, reported seeing “hundreds of the wary little buggers” at one locality on private land, but in our visit to the site not a single individual was seen around the spring – badly trampled and overgrown with the exotic pasture grass tall fescue (Festuca arundinacea). In all, we were successful in finding the beetle at only one of the historical localities and at one new site located nearby. While both of these sites are located on state protected land, we concluded that the longterm viability of the C. circumpicta johnsonii population in Missouri was in serious jeopardy. Based on our recommendation, the species was placed on the Missouri Species of Conservation Concern Checklist with a ranking of S1 (critically emperiled). While this affords the species legal protection under the Wildlife Code of Missouri, the benefit may be minimal since the Wildlife Code does not address the main threat to this beetle’s survival – habitat degradation. We have not surveyed for this beetle since but plan to make field observations this summer (no trapping!) to check on its status. I sincerely hope we will not have to hang our heads with the realization that we have succeeded in extirpating yet another beautiful and irreplaceable gem.\nLast year we finally succeeded in locating C. cursitans (ant-like tiger beetle) in Missouri (left, photo by Chris Brown). Adults are flightless, and at less than 1 cm in length, are among the smallest of North American tiger beetles. The species has been recorded broadly but sporadically between the Appalachians and Great Plains – a distribution that is probably underestimated due to its small size and general resemblance to ants. A significant distributional gap exists between the eastern and Great Plains records, which Ron Huber believes may be indicative of two disjunct forms and potentially two species. Missouri falls within this gap, and although the species has not yet been formally recorded from the state, a single specimen collected in 1991 “nr. Portageville” is deposited in the Enns Entomology Museum, University of Missouri, Columbia. We had made several attempts over the past few years to locate this species by searching what we thought were promising habitats along the Mississippi River near Portageville, but the species was not located until last year, when I relayed this information to Portageville biologist and tiger beetle enthusiast Kent Fothergill. Kent not only located the beetle at the location I suggested, but quickly found another population on a nearby parcel of land managed by the Missouri Department of Conservation. Hurriedly, we visited the first site and observed a few additional individuals at a nearby location just to the south. The bottomland forest habitat within which all of these individuals were observed is fairly extensive along the Mississippi River in the southeastern lowlands of Missouri, but at this point we can only speculate whether C. cursitans occurs throughout this habitat. Other habitats have been reported for this species, including mesic and wet prairies and meadows (Brust et al. 2005). Such habitats are also found in the southeastern lowlands, and while C. cursitans has not been seen through cursory examinations in such areas, it is possible that the small size, cryptic habits, and narrow temporal occurrence of C. cursitans have allowed it to escape detection. Kent will be helping us this season with additional trapping and direct observation at several selected sites along the Mississippi and St. Francois Rivers to determine whether the beetle occurs more broadly in the southeastern lowlands and whether it utilizes these other habitats in addition to bottomland forests.\nI would be most interested in any additional reports of these rare tiger beetles in Missouri (contact me at the email address shown in the left sidebar copyright statement). Remember, C. circumpicta johnsonii is critically emperiled in Missouri – please do not collect it.", "label": "No"} {"text": "Battambang was a flourishing city before the horrific Khmer Rouge, led by Pol Pot, dramatically jeopardized the lives of its inhabitants. Many of them ended up slaughtered in the killing fields or neighbouring killing caves for no reason, whilst others were luckier and made it to close-by Thailand. Most of them spent years in refugee camps under harsh conditions. Kids grew up traumatised with hardly any access to proper education. In 1986, Véronique Decrop, a French art teacher, volunteered at the Site Two Refugee Camp on the Thai-Cambodian border. She used drawings as a therapy to help traumatised children express themselves. That was the spark to what will become Phare Ponleu Selpak (Cambodian for the brightness of the arts), a non-profit organization improving the lives of Cambodians through arts and education, its highlight being one of the best circus schools in the world.\nIn 1994, a group of eight of these children had grown into young adults and returned to Battambang, their home town. Shocked by the many underprivileged children suffering from trauma, poverty and abuse, they decided to buy a swampy rice field, and build a wooden house in which they started giving drawing classes for free.\n23 years later, we are strolling through the wooden building. Fine pieces of art are displayed. Drawings with depth and an interesting perspective decorate the walls. Human sized sculptures block my way and confront me with their philosophical meanings. Different aquarelles, charcoal sketches, portraits and original graphic designs complement the rest of the impressive exhibition that has been entirely created by art students. A bell rings, and kids in uniforms run to their classrooms in different building across campus. Besides the variety of art classes and living arts trainings, about 1,400 four-to-eighteen-year-old pupils are schooled here, following the main trail to obtain their high school degree.\n“Parents who cannot afford schooling can apply, and their children are welcome here. We provide lunch for the poorest ones and have opened a library with free access to computers and the Internet for the community.” our guide Megan explains. A wide variety of books in different languages are displayed and a five year-old boy eagerly turns the pages of a colourful book, clearly not bothered by our presence.\nA group of boys with smiling familiar faces hurry past us towards a large gymnastics hall. We cannot suppress our enthusiasm, and rush after them to attend the practice: “We have seen these teenagers perform last night, and they are extremely talented!” Megan smiles, and highlights the fact that some of the former students are now traveling the world as performers at the ground-breaking Cirque du Soleil. Remembering the quality of the show we attended the night before on campus, we are not surprised! The Cambodian circus show is a mix of true passion, talent and teamwork, and attaining this level of professionalism requires hard work and dedication. Kids can learn circus: acrobatics, music, drama, aerial ballet, tightrope walking, dancing, vaulting, juggling and more… The most dedicated and talented students perform in evening shows for locals and tourists in Battambang. Tickets sold fund the school, and the experience is paramount for them to practice their skills and maybe to become a circus performer at Phare the Cambodian circus in Siem Reap, or the Cirque du Soleil.\nTheir excellent and experienced choreography, music and arts teachers have the same objective: guiding all students to a job that suits their skills. The Phare Ponleu Selpak campus contributes highly to helping Cambodians be proud of their roots while introducing its vibrancy to the world.\nWaving back to Megan, we jump into a bus on our way to Siem Reap. Very impressed by the performance we attended and the visit of the Phare Ponleu Selpak campus, we cannot wait to see what the graduated students can come up with. The Phare, the Cambodian circus show in Siem Reap is already in our agendas!\nClaire & Marcella\n- Attending a show on the Campus is a valid reason to come to Battambang! Please refer to Phare Ponleu Selpak to order tickets and check out our interactive map for the exact location.\n- A campus visit is also very interesting and comes highly recommended.\n- Donations are accepted to support the organization.\n- For more great things to do in Battambang and a great day out of exploring the traditional crafts of Cambodia, please refer to the fantastic Mr. Ola!\n- Check out this interactive map for the specific details to help you plan your trip and more articles and photos (zoom out) about the area!\nLike it? Pin it!\nDon’t know where to start? Get inspired:", "label": "No"} {"text": "The Wako vanadate oxidation method for bilirubin measurement is unaffected by haemoglobin (≤500mg/dL) or ascorbic acid (≤50mg/dL), both of which can push diazo methods off-target.\nNew born babies lack the intestinal bacteria that help process bilirubin and neonatal bilirubineamia is a common condition. Typically this resolves itself in a couple of days. However, in some instances, the bilirubineamia is a result of red blood cell destruction caused by new born and maternal blood type incompatibilities or other genetic factors. In these cases it is important that the bilirubin levels do not get too high because excess bilirubin damages developing brain cells in young babies and can cause mental retardation, physical abnormalities or blindness.\nBilirubin in Adults\nBilirubin tests are used to assess liver function in adults. Typically bilirubin is measured alongside other liver disease markers to aid in the diagnosis and monitoring of cirrhosis, hepatitis or gallstones. For example, bilirubin is measured together with hyaluronic acid,α-2-macroglobulin and γ-glutamyl transferase as part of the Hepascore algorithm for liver fibrosis.\nThe vanadate oxidation method for bilirubin was developed by Wako. Bilirubin is oxidised to biliverdin and the change in absorbance as measured in the yellow part of the spectrum is used to calculate the bilirubin content of the sample. The method is unaffected by haemoglobin (≤500mg/dL) or ascorbic acid (≤50mg/dL), both of which can push diazo methods off-target.\nBoth the Direct and Total Bilirubin assays utilise the vanadate oxidation principle offering excellent performance with minimal interference to deliver clear, reliable answers when it matters.\nBilirubin is a product of haem catabolism excreted in bile and urine. Small amounts of bilirubin are present in the blood as a result of damaged and dead red blood cells which are disposed of via the spleen. As the erythrocytes are broken down the haeme is turned into unconjugated or indirect bilirubin. Unconjugated bilirubin is water insoluble and is bound to albumin in the blood and transported to the liver. Here the indirect bilirubin is conjugated to glucuronic acid. The resulting conjugated or direct bilirubin is water soluable and much of this goes into the bile and therefore into the small intestine.\nThe Diazo reaction was described by Ehrlich 1883 and first applied to the determination of bilirubin by van den Bergh and Muller in 1916. Diazo based methods using different chemical accelerators have been widely used ever since. However, Diazo based protocols are prone to negative interference from haemoglobin which presents a danger that results below the true value may be reported. In contrast, high levels of Ascorbic acid can falsely elevate the test result.", "label": "No"} {"text": "Aluminum number plate refers to the sign and name plate products made of aluminum raw materials, which are collectively referred to as aluminum number plate .Actually the kinds of aluminum plate is not a single, common types with aluminum wire cutting, stamping, concave and convex, etching, oxidation, laser engraving, reflective film, screen printing, four-color offset printing, thermal transfer, luminous printing and aluminium alloy die casting molding.The best results can be customized according to different manufacturing process when choosing aluminum number plate products.\nDescription of aluminum number plate making:\n1. Machining of line cutting machine: according to the specification and shape of aluminum plate, the surface can be sprayed with oil, printing and engraving, suitable for the thickness of aluminum plate and high precision products.\n2. Stamping production: press the stamping machine and product mould to press the aluminum sheet into shape.Then the semi-finished product spray oil, sandblasting, electroplating, high light (drawing), or polishing the plating, oil spraying processing.The surface effect can be determined according to the actual type and the content of the design. The stamping process is used to make high-gloss aluminum plate and surface polishing plate aluminum.Concave and convex effect: aluminum plate concave and convex making and stamping process are the same, but the working principle is in the opposite direction of concave and convex processing.It can be used for high gloss, printing, plating, spraying, etching and engraving.\n3. Etching and oxidation: using the required thickness of aluminum plate, etching or oxidation can be required according to the process document.The color of the content can be painted or printed to achieve the color effect. The aluminum plate of the running water series can be finished by laser engraving.\n4. Reflective coating: that is, the reflective aluminum number plate will be used for the laminating of the reflecting film of the aluminum plate that has been cut or washed, and then the screen printing or painting treatment.\n5. The printing production: aluminium plate with wider range of printing craft, whether it is flat, concave and convex, stamping, die-casting molding can use silk screen printing, four-color offset printing, thermal transfer, luminous, reflective printing, print color.\n6. Aluminum alloy die-casting: using mechanical and die casting moulding, according to drawing documents, make all kinds of curved, tapered, three-dimensional, concave and convex shapes.The surface effect is full, delicate and beautiful, the blank is fine polished and the gloss is good, can be electroplated.The hollow parts can be filled with paint, drops of glue, and the letterpress is suitable for printing process.", "label": "No"} {"text": "This, therefore, will serve as a sketch of the milestones of human progress. The way has been long and painful; the results have been far from satisfactory; and yet they have been enormous and wonderful, when we compare them now with what our ancestors were when history began. We can conclude, however, from looking back on this thorny and upward path, that it is still going to ascend; we do not know it for certain; progress may cease, through some unknown law, now and here; but if there is anything that we can derive from the lesson of the past—if we can project into the future any of the facts which history shows us are our own now—it guides us forward to a firm belief that the hereafter will have in its breast greater treasures for humanity, greater glories for posterity, than any that we know or can understand.\n* * * * *\nTOMBS OF THE FIRST EGYPTIAN DYNASTY.\n[Footnote 1: The Independent.]\nBy Ludwig Borchardt, Ph.D., Director of the German School in Cairo.\nFor many years various European collections of Egyptian antiquities have contained a certain series of objects which gave archaeologists great difficulty. There were vases of a peculiar form and color, greenish plates of slate, many of them in curious animal forms, and other similar things. It was known, positively, that these objects had been found in Egypt, but it was impossible to assign them a place in the known periods of Egyptian art. The puzzle was increased in difficulty by certain plates of slate with hunting and battle scenes and other representations in relief in a style so strange that many investigators considered them products of the art of Western Asia.\nThe first light was thrown on the question in the winter of 1894-95 by the excavations of Flinders Petrie in Ballas and Neggadeh, two places on the west bank of the Nile, a little below ancient Thebes. This persevering English investigator discovered here a very large necropolis in which he examined about three thousand graves. They all contained the same kinds of pottery and the same slate tablets mentioned above, and many other objects which did not seem to", "label": "No"} {"text": "For obvious reasons, anyone who benefits from the generation and distribution of energy produced by fossil fuels has nothing to gain from the expanded use of renewable energy. For example, law requires utility companies to accept excess energy produced by consumer solar energy producers, a process called net metering, and pay them at the “retail” rate. Utilities argue that this rate doesn’t cover their fixed costs for transporting and delivering power, such as wires, poles, meters and other infrastructure, so these costs are shifted to non-solar customers.\nIn addition, solar users still use power from the grid when solar power isn't sufficient or available, on cloudy days for example. Utilities companies believe solar producers should be paid at the lower “wholesale” rate, or better yet, not at all. However, attacking solar power directly would be a public relations nightmare, so renewables opponents are taking a different route: initiatives at the ballot box.\nA referendum in Florida is a classic example of this type of action. In August, Florida residents were presented with a choice of adding Amendment 4 to the state constitution that offered property tax breaks for residents and businesses who install solar panels and eliminate a tax on solar equipment. While residential customers already enjoyed tax relief from an earlier measure earlier in 2016, Amendment 4 added commercial and industrial customers as well.\nAmendment 4 faced little opposition -- the legislature unanimously approved placing the question on the ballot -- and voters approved it 72.62% to 27.38%. These incentives are almost certain to increase solar panel installations in Florida, which although blessed with abundant sunshine gets only about 5% of its energy from renewables, mostly biomass not solar. Analysts nevertheless predict that renewables could account for 33% of total state energy capacity by 2023.\nFaced with the approval of Amendment 4, the state’s utilities along with ExxonMobil, Duke Energy, Gulf Power and other groups threw everything they had into getting another constitutional Amendment question (Amendment 1) added to the November ballot. Amendment 4 would give residents the right to produce solar energy (currently already provided by state statute) into the state constitution, and let state and local governments ensure that residents who choose not to produce solar power would never be required to subsidize its production.\nHowever, it didn’t take long for opponents to discover what it would really do if approved. Although Amendment 1 was written to appear “pro-solar”, it was mostly the opposite. As residents have the right through state law to own or lease solar panels, adding it to the constitution would adding no additional protection. The fossil camp claimed that enshrining it in the constitution would keep unscrupulous businesses from wreaking havoc, as has been the case Arizona. Opponents noted that this not happening in Florida and that the state would never allow it to.\nMore insidious was the fact that the amendment could also allow lawmakers to prohibit net metering, as it could be construed as subsidizing solar power production. If lawmakers did so, utilities could refuse to pay for excess power or reduce payments from the retail to wholesale rate, which would benefit their bottom lines.\nThis resulted in a massive onslaught from opponents of the measure, who stated that the real goal of Amendment 1 was to make sure utility companies maintained their control of the energy market. The outcries for voting “no” ranged from a huge number of local and national organizations, businesses, media, as well as noteworthy Floridians like Jimmy Buffett, author Carl Hiassen, and former governor Bob Graham.\nSupport for the amendment was strong almost until election day, but opponents were able to show that it was bought and paid for by the fossil fuel industry and its supporters. A leaked recording of someone from the fossil fuel camp admitting that it would “completely negate anything they [the pro-solar camp] would try to do either legislatively or constitutionally down the road”, also helped shed light on the actual purpose of the amendment. Although 50.79% of voters voted yes and only 49.21% voted no, the amendment needs 60% approval to pass.\nWhile the battle in Florida has been won by pro-solar interests, the war is far from over, and the Sunshine State is just one example. Similar contests are taking place in many other states as well, and are increasing in intensity with the popularity of producing energy from the Sun. Until the pro- and anti-solar constituencies can make peace, more of the wrangling Floridians experienced is sure to come.", "label": "No"} {"text": "Tiantai is the name of a mountain and surrounding geographical location in China, literally meaning “platform of the sky”, but the term is traditionally used to denote a particular school of Mahāyāna Buddhism with historical connections to that locale. In this article, the term “Tiantai” will be used to refer to the philosophical ideas developed from the sixth to eleventh centuries by this school, as expounded in the writings of its three most representative figures: Tiantai Zhiyi (538–597), Jingxi Zhanran (711–782) and Siming Zhili (960–1028).\nTo translate Tiantai's rather technical scholastic terminology and its typically Buddhist soteriological orientation into something approaching traditional philosophical categories, we can start by identifying a few hashtag themes that are characteristic of Tiantai thinking. Tiantai is: a radical contextualism, a radical holism, a radical monism, and a theory of radical immanence. It asserts a radical impermanence, radical anti-substantialism, and radical ambiguity of identity for all finite and conditional entities. Epistemologically this entails radical skepticism about all unconditional claims, and radical anti-realism. Ethically it implies a radical renunciation of all finite aims, as well as radical repudiation of all determinate moral rules, moral consequences, and moral virtues.\nBut our understanding of each of these points must be thoroughly modified by the most characteristic premise of Tiantai thought of all, which determines the meaning we intend for the term “radical” here: the idea of “self-recontextualization”, whereby the full expression of any quiddity intrinsically entails its self-overcoming. This turn of thought may be termed dialectical, but in a way that differs from both Hegelian and Marxian notions of dialectics in that it is neither teleologically progressive nor hierarchical. It has roots in 1) indigenous Chinese interest in the “reversals” observed in the cycles of nature, conceptualized according to the naïve ancient generalization that when anything is pushed its own extreme it will “reverse”, that an increase in a thing's extension or intensity leads to its self-undermining (e,g., it keeps getting colder until it gets coldest, and then it starts getting warmer), and in 2) the sophisticated ruminations on the nature of conditionality developed in the Emptiness and Two Truths doctrines as expressed in Indian Buddhist logic. What this means is that “radical contextualism” will in Tiantai reverse into a radical assertion of the self-validation of every entity, that “radical holism” will in Tiantai self-reverse also into radical individualism, “radical monism” also into radical pluralism, “radical immanentism” also into radical transcendentalism, along with a claim that these two extremes are, when fully thought through, actually synonyms for one another. It will mean that for all finite conditional entities, radical impermanence is seen to be also radical eternalism, radical anti-substantialism is seen to be also radical substantialism, radical anti-realism is seen to be also radical realism, again supplemented by a claim about the interchangeability of these two seemingly opposed claims. Similarly, radical skepticism about all claims is seen to be also a radical “trivialism” (the claim that all possible claims are true), radical anti-realism also a fanatically absolute realism even for the most fleeting appearances, radical renunciation of finite aims, moral rules, moral consequences and moral virtues is seen to be also a radical acceptance of all finite aims and the endorsement of all determinate moral rules, consequences and virtues.\nWhen the dust from these turnarounds settles, Tiantai ends up with a unique view of the structure of reality: every event, function or characteristic occurring in any experience anywhere is the action of all sentient and insentient beings working together. Every instant of experience is the whole of reality manifesting in this particular form, as this particular entity or experience. Each such instant is however no mere accidental, dispensable form; rather, it is itself unconditional and ineradicable, is eternal and omnipresent. Moreover, this “whole of reality” is irreducibly multiple and irreducibly unified at once, in the following way: all possible conflicting, contrasted and axiologically varied aspects are irrevocably present—in the sense of “findable”—in and as each of these individual determinate totality-effects. Good and evil, delusion and enlightenment, Buddhahood and deviltry, are all “inherently entailed” in each and every event. These multiple entities are not “simply located” even virtually or conceptually: the “whole” which is the agent performing every experience is not a collection of these various “inherently entailed” entities or qualities arrayed side by side, like coins in a pocket. Rather, they are “intersubsumptive”. That is, any one of them subsumes all the others, and yet, because of the view of what “subsumption” actually is, each is subsumed by each of the others as well: all relation is subsumption, and all subsumption is intersubsumption. Each part is the whole, each quality subsumes all other qualities, and yet none are ever eradicable. A Buddha in the world makes the world all Buddha, saturated in every locus with the quality “Buddhahood”; a devil in the world makes the world all devil, permeated with “deviltry”. Both Buddha and devil are always in the world. So every event in the world is always both entirely Buddhahood and entirely deviltry. Every moment of experience is always completely delusion, evil and pain, through and through, and also completely enlightenment, goodness and joy, through and through.\nTraditional Buddhism gives a rather commonsensical account of sentient experience: every moment of sentient experience is a sensory apparatus encountering an object, giving rise thereby to a particular moment of contentful awareness. But in the Tiantai view, each of these three—sense organ, object, this moment of consciousness—is itself the Absolute, the entirety of reality, expressed without remainder in the peculiar temporary form of sense organ, of object, of this consciousness. Hence each moment of every being's experience is redescribed, to paraphrase a canonical early Tiantai work, as follows:\nThe absolute totality encounters the absolute totality, and the result is the arising of the absolute totality. (法界對法界起法界)\nThe Absolute, the whole of reality, is one and eternal, always the same and omnipresent, but it is also the kind of whole that divides from itself, encounters itself, arises anew each moment, engenders itself as the transient flux of each unique and individual moment of experience of every sentient being.\nHow this view is established, and what its consequences are, is what is to be explained in this article.\n- 1. The Three Truths: Emptiness, Provisional Positing and the Center (空假中 kong, jia, zhong)\n- 2. Contextualism and Ontological Ambiguity\n- 3. Transformative Self-Recontextualization (開權顯實 kaiquanxianshi)\n- 4. The Ultimate Reality of All Appearances (諸法實相 zhufashixiang )\n- 5. Practice and Doctrinal Diversity\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nThe meta-level claim about self-recontextualization as self-reversal, which applies at all levels to all Tiantai doctrines, is itself the consequence of some considerations concerning contextualism, holism and conditionality, with which it is thus convenient to begin our exposition. The heart of the matter, the most fundamental and far-reaching renovation of Buddhism accomplished by the Tiantai School, is the move from the Two Truths model to a Three Truths one. The Two Truths is an epistemological and pedagogical heuristic in most Mahāyāna Buddhism, but in Tiantai the Three Truths are taken to be a necessary logical entailment of any proposed determinacy, and thus to apply equally to any possible ontological, epistemological and ethical entities. They can be summarized by the claim that no entity can be either the same as or different from any other entity. This relation of neither-sameness-nor-difference is the “asness” relation: each determinate thing is the totality of all other possible things as this thing. The non-sameness implies that the specific characteristics of all other things are in some sense discoverable in each thing, that all their manifold properties and functions will also be simultaneously operative there.\nWe can reconstruct the argument for this claim as follows:\n- For anything to be what it is, it must be mutually exclusive with whatever it is not. If it has aspects or qualities in common with anything else, it is nonetheless stipulated to be specifically itself not insofar as it has these in common, and thus is indistinguishable from the other things that share them, but insofar as it is different from them.\n- To be is to be determinate. To be determinate is to be finite, non-all. To be finite is to be conditional. Anything strictly unconditional would ipso facto be omnipresent (no particular place rather than another can be the “condition” for its existence) and always occurring (no particular time rather than another can be the “condition” for its existence), and thus indistinguishable from anything else. This would be equivalent to not being determinate at all, for it would be impossible for an unconditional entity to be mutually exclusive with anything, since that exclusion would then have to be a “condition” of its existence.\n- Any entity must thus be copresent with some otherness; it must exist in a world that includes something that is not it, i.e., (by item #1), something that is mutually exclusive with it (even if just the empty space around it). Some form of copresence-with-otherness is an essential characteristic of the existence of all entities. All forms of relation, including relations of causality and of conceptual contrast, are instances of this necessary copresence-in-the-world.\n- The conditions from which it must be different but related include not only immediately contiguous causally efficient factors, but also prior states of affairs. More searchingly, the constitutive copresent otherness cannot be to non-X in general, for this would merely be a repetition of the determination of X itself, in reverse; to the extent that there is no more in non-X than the negation of X, no new content is provided by the contrast, which therefore presupposes X. Rather, the exclusions that make up the determination of X must be specific other determinations, other exclusions; they must in principle include anything at all that the entity in question is different from: to be determinate as X is a specific exclusion of all specific non-X things and states. We have greater knowledge of what the essence of a dog is by learning more about each and every particular thing that the dog is not, how it differs specifically from a cat, from a hedgehog, from a table, from a towel…. (Our knowledge is thus always constitutively partial and in-process; knowing X is always being poised to know more about X. Knowledge per se is non-omniscience.)\n- However, all copresence-in-the-world, all conditioning, all relation, all causality between two entities requires some overlap or interface between them. There must be some place, thing, time, medium or concept that simultaneously includes them both, or which they both include. Any two entities must have something in common to succeed in being copresent—to have a causal relation or to even be contrasted.\n- But no genuinely distinct entities, insofar as they are distinct and thus determinate, have anything in common.\n- Hence two genuinely mutually exclusive entities can have no relation of conditioning one another.\n- Hence there are no genuinely mutually exclusive entities. Thus the nature of determination stipulated in item #1 must be supplemented. This rewrite of the nature of determination is the Three Truths.\n- Whatever appears to be, i.e., to be just what it is and nothing else, cannot really be mutually exclusive with whatever it is not. X is “non-different” from non-X. This non-difference is called the Emptiness (空 kong, Śūnyatā) of X. For if X is non-different from non-X, it fails to fulfill the condition of being X stipulated in item #1, and thus X is not X; X is “empty”.\n- But X is also “non-same” with non-X. Empirically, if it were the same, there would be no X to be called non-different: its presence is nothing other than its non-identity with all other states. Logically, the alternative to the Tiantai view is the default bivalent assumption that either some entities exist or that no entities exist; but both existing and non-existing require non-sameness—i.e., the non-sameness between existing and non-existing. Anything determinate is non-same with what is not itself, by item #1. This is why there is something rather than nothing: even total nothingness would still be determinate and non-same to what it is not, i.e., non-same to somethingness. Nothing would therefore still be something, so the question why there is something rather than nothing is actually moot. Non-sameness to what it is not is analytically necessary to any proposed entity. Even if no entity is posited, “no-entity-being-posited” will not obtain unless the positing of entities is thereby excluded, and non-sameness is necessary to succeed in excluding the positing of any entity. This is non-sameness to non-X is called the Provisional Positing or Conventional Truth (假 jia) of X.\n- The non-sameness of X and non-X and the non-difference between X and non-X are themselves non-same as one another and non-different from one another. Non-same in spite of being non-different is Provisional Positing. Non-different in spite of being non-same is Emptiness. These are just reversed ways of saying the same thing, but the reversal is itself not negligible. They are two opposite and mutually exclusive senses given to a single identical referent. They are synonymous and yet contrasted. This is called the Center (中 zhong).\n- X has to be an aspect or part of more than whatever it seems to be, and even as a part or aspect it cannot really be just the single selfsame (i.e., simply and bivalently same or different) part or aspect it appears to be.\n- But it also does and must seem to be just this and nothing besides, and can appear only if initially appearing to be mutually exclusive with what it is not: to appear is to appear as something, which is to appear as finite. The whole of which any appearance is a part or aspect can never appear simpliciter, even in thought. It is always appearing as one specific thing (or concept, or thought) or another.\n- To be present as X is to not be X, but such that this not-X is showing itself only as X. To be X is to exclude non-X but only in such a way as to necessarily involve non-X, which can only be done by showing itself exclusively as X.\n- Thus the Three Truths are:\n- Provisional Positing: Some X is always appearing.\n- Emptiness: X is not (only) X.\n- The Center (or Middle, or Mean): The simultaneity, inseparability, sameness-as-difference of X appearing and X not being only X (this is the Center in its simplest formulation, as “the exclusive Center” (但中 danzhong) which is itself neither Emptiness nor Provisional Positing, is beyond both and more ultimately real than both, but which can appear as either).\n- A further implication of the Center, called the “Non-exclusive Center” (不但中 budan zhong): Any two putatively distinct things, Y and X, are also not-same-and-not different from one another. For the Center can never appear simpliciter; it always appears as some specific coherence showing itself, to which it is non-different. Provisional Positing is intrinsic to every instance of both Emptiness and the Center, and Provisional Positing is always some specific provisional posit (even the abstract concept “provisional positing”, or the abstract concept “emptiness” or “the center” is still a specific provisional posit.) Each provisional posit involves every other provisional posit, specifically. Y is an instantiation of X. X is an instantiation of Y. All other appearances are thus “intersubsumptive” with X. The Center is thus ultimately not beyond or more real than Emptiness or Provisional Positing, but is itself synonymous-as-contrasted with them, such that just to be Empty or to Provisionally Posited, or to be any provisional posit, is to be the Center, the subsumer and subsumed of all other provisional posits—and vice versa.\nFrom this we can perhaps see in what way Tiantai is able to stipulate at once the self-preserving and the self-overcoming of both holism and apophasis. First, atomism of any kind is rejected as unintelligible, and a thorough contextualism asserted: things can only be determinate in relation to a context, and there can be no non-arbitrary limiting of the extent and multiplicity of contexts, since each context will itself be intelligible only with respect to a larger context. This would seem to lead to a holism of some sort: each apparently isolable thing is really an aspect or expression of some more inclusive whole, and each of these finite wholes must be an aspect or expression of a still more inclusive whole. The part is dependent on the whole, the conditional is dependent on the unconditional. But the unconditional can have no specific separate identity, not even as “the unconditional per se”. Any determination for the whole turns out to self-overturn into other determinations, precisely due to its success in being a determination for the exceptionless whole. For example, Thales says the world is made of water. This is stipulated after first isolating other lesser wholes: water, earth, fire, air. Each of these was already a finite whole, involving an alleged collapse from appearance to a deeper reality: what appeared to be trees and stones and pillars turned out to be part of the larger whole “earth”, ways in which earth appears or manifests; what appeared to be body-heat and flames and sunshine turned out to be part of the larger whole “fire”, ways in which fire appears or manifests. Now Thales says both of these are really parts of a larger whole “water”, ways in which it appears and manifests. But each of these generalizing claims involves a meaning-change for the term in question. “Water” initially meant “what is not fire, earth, wind, which excludes them, what is contrasted to them”. After Thales, “water” means also “what expresses itself sometimes as watery, sometimes as fiery, sometimes as earthy, sometimes as windy”. Along comes Heraclitus and claims that all is really “fire”. “Fire” now means also “what expresses itself sometimes as watery, sometimes as fiery, sometimes as earthy, sometimes as windy”. What is intended in claims of this type, allowing them to appear to be doing explanatory work, is the maintenance of a distinction between which of these expressions is primary and which secondary, which direct and indirect; but Tiantai would deny that this distinction can be meaningfully maintained once this totalization has been effected. Because each now means the whole, they lose their original meaning, for that meaning was entirely dependent on a contrast to what was excluded. If fire is everything, then fire is not fire. If water is everything, then water is not water. If fire is everything, then water is really fire. If water is everything, then fire is really water. If fire is really water, then water is really fire. Hence by going through the universalization of any determinate entity, we reach the overturning of that determination into something that expresses itself as all other determinations, and at the same time undermines its own privileged status as ultimate foundation, making all other possible determinations equally unconditional, all-pervasive, universal, absolute. To see the absoluteness of any one entity is thus to de-absolutize that entity and also to absolutize every other entity.\nThe Three Truths position of Tiantai derives from a particular understanding of the Two Truths doctrine advanced by Indian Buddhist philosophers of the Mādhyamaka school, interpreted as holding that any specific thing we could say about the world was at best a “Conventional Truth”, which served as a kind of “raft” to get beyond it to the “Ultimate Truth” of Emptiness—determinations of any kind were thus at best an indispensible means to get beyond themselves, to be discarded when their work is done. The stipulation of Emptiness (Śūnyatā) was itself a raft to get beyond not only all other determinate views but also Emptiness itself as a “view” or theory or concept. Ultimate Truth, true realization of Emptiness, was thus at best a celebratory term used to point to an ineffable experience of the liberation from all views, all definite conceptions of determinate “things”. The motivation for this was soteriological in a specific, pan-Buddhist sense: the goal of all human endeavor, including philosophy, including ethics, including epistemology, is assumed to be the reduction or elimination of suffering. Buddhism claims that this is what we're always trying to do, but usually in a self-defeating, ignorant way; it claims to provide a more effective way. Note that this does not make any claim about what is valuable, but rather addresses what is assumed to be a necessary entailment of what it means to consider anything valuable, i.e., what structures desire qua desire. To desire is to value, and suffering is simply the non-satisfaction of our desire. Hence all endeavors are endeavors to eliminate some suffering, i.e., to satisfy a desire. The characteristic Buddhist contribution is then to note that desiring any conditional object or state is necessarily self-defeating. This is because to be conditional is to be brought into being by a qualitatively distinct, heterogeneous and extrinsic cause. But examined closely, this cannot be a single extrinsic cause, for if any effect were produced by a single cause, that cause and that effect would always be copresent—wherever and whenever that cause occurred, the effect would also occur. But that would mean that the cause would therefore no longer be extrinsic to the effect; they would be, rather, necessary and intrinsically conjoined, actually two aspects of a single irreducible entity, which would mean that no causal event actually ever occurs. This means that all conditional things require multiple causes, each of which itself requires multiple causes.\nThis introduces an intrinsic instability and inner conflict into whatever exists conditionally, that is, whatever is finite, whatever is determinate. The unconditional would have to be omnipresent and omnitemporal and indeterminate. But the nature of desire is to have specific conditions of satisfaction: to desire is to require some one state of affairs rather than, to the exclusion of, some other state of affairs—minimally, pleasure instead of pain. This means all desire qua desire is desire for something conditional; otherwise there would be no need for the desire, since the desired state would already always and everywhere be present. Desire desires a single effect to the exclusion of any other effect; but the denial of effectivity for any single cause also implies that what is produced by any causal process can never be only a single effect. For since what is produced is not dependent solely on any single cause, or indeed any finite set of causes considered as a unit, the production of a new event always requires the conjunction with some hitherto excluded condition. Since by hypothesis this new condition is not a consistent part of the original set, it will not always be the same, and thus the effect will not be one and the same; every conjunction will produce its own effects, and by hypothesis there is no limit to the set of conjunctions (for that would make them simply a single cause). Less rigorously, it is held that the cross-purposes and conflicting tendencies thus built into any effect make it impossible for it to be a stably homogenous entity consistently isolable from the opposite conditional states it means to exclude, such as is required by the exclusive structure of specific desires. Whatever is desired must be identifiably present at a particular time and place, and whatever is such is conditional, and whatever is conditional entails impermanence, and thus suffering.\nThe pan-Buddhist denial of the existence of a “self” rests on the same point: the impossibility of single-cause causal events. For the “self” rejected here is precisely the claimant to single-causality: the agent of actions which putatively requires no second condition to produce an effect, e.g., to will something, to do something, to want something, to experience something. The self never acts alone, has no independent effects, and thus actually is not a self-as-efficacious-agent. “Self” here essentially means “controller”. Because there is no single causality, there is no single controller, and thus no self. For this reason too, satisfaction of desire is not sustainable. For in doing what the self desires, other causes besides the activity of the self are always also involved; the effect is not in the self's control, and thus will inevitably contravene its desires, its own causal contributions to the effect. Indeed, the early Buddhist analysis of the human condition amounts to the claim that all desire is really a proxy-version of this impossible desire for control, for single-agent causality, for pure autonomy, for selfhood; thus all desire is doomed.\nThe same considerations have serious epistemological consequences as well. The Buddhists viewed theoretical stances and philosophical positions as themselves objects of desire, of clinging. Since all such stances are themselves specific, determinate, they are ipso facto conditional. As conditional, they are ipso facto suffering. Hence attachment to views was seen as a form of suffering and an obstacle to liberation. All determinate metaphysical views about how or what things are were to be transcended and left behind.\nIn most of the dominant Indian theories, those ideas are granted temporary validity as conventional truths: they are to serve as “rafts”, to be clung to temporarily, but only because they are an effective means of passing beyond themselves. This includes both specific Buddhist doctrines and also ordinary conventional speech (necessary for even communicating Buddhist ideas). Whatever ideas do not lead to their own abandonment in this way (and hence do not lead to the end of suffering) do not count even as conventional truths—for example, 1) metaphysical and religious theories about the Absolute, or unconditional claims about the world as a whole and 2) non-conventional views of things in the world, claims that contravene ordinary language of the community. There tends to be a kind of hierarchy in the Indian Two Truths theory: first, plain falsehood, including all philosophical theories about reality and unconventional views. Then conventional truth, which includes ordinary daily life ideas about self and other, cause and effect and so on, and also Buddhist ideas about suffering, the Four Noble Truths, non-self, and even “Emptiness” considered as a concept. These ideas lead beyond themselves, instrumentally, to the experience of Emptiness, which is liberation from all views. The conventional truths had an instrumental value, but none were really “true” about things—Emptiness meant that all of them were, in the most ultimate sense, false. Also, there are really only one or two kinds of conventional truth: first, common sense daily speech, the correct general names for things as used in the daily life of your particular community, and second, Buddhist ideas. The reason these count as “truths” is because they are useful in leading us to liberation from suffering—and in leading us to liberation from these ideas themselves. “True” propositions are propositions that have the power to lead beyond themselves.\nThis led to a somewhat paradoxical situation, on several levels. There was always a problem in Emptiness theory: Emptiness was supposed to be not a “view” at all, to predicate nothing about reality. But if it does anything at all, if it negates or excludes any other view, it is, in the Tiantai view, still a kind of view. For to be something in particular is just to exclude something else in particular. That is all a “thing” is, that is all a “view” is. To be something just is to exclude something else; nothing more is required to count as a being. Pre-Tiantai Emptiness theory gets into an infinite regress, chasing its tail around the problem of the transcendence of Emptiness: no statement can represent it, even “all things are Empty”. It is purely and totally above and beyond anything that can be thought or said, all ordinary experience of identities in the world. It is a negation that is supposed to bear no relation at all to what it negates, to entirely escape the system of relations, of conditionality. Emptiness is supposed to be strictly “inconceivable”. In Tiantai, this problem disappears. Emptiness is still very important, but it is simply a conditional assertion of unconditionality. We do not have all the conditionality (specifiability, particularity) on one side and all the unconditionality (transcendence, inconceivability) on the other. Everything, every experience, every identity, every action, is in the same boat: they are all both conditional and unconditional, both conceivable and inconceivable. The thought, experience, concept “Emptiness” is also both conditional and unconditional, both conceivable and inconceivable, like “water” and “fire” in our example about. Emptiness is an especially efficient marker of self-exploded holism, the term that applies most easily everywhere and thus ultimately nowhere, allowing all other terms to do the same. It is Provisionally Posited, which means it is at least locally coherent (conditional, determinate, conceivable), but it itself is also Empty, which means it is globally incoherent (unconditional, indeterminate, inconceivable). It appears in experience as something in particular (locally coherent as precisely this word and this thought “Emptiness”), but this, like every other local coherence, is haunted by its own inseparable nimbus of infinite outsides, infinite contexts, each of which differently contextualizes it and thus bestows on it alternate identities: there is more to it than any single concept, including the concept “Emptiness”, can hold. Emptiness is, to use a word coined for just this Tiantai usage, “moretitivity”: and moretotivity is itself moretoitive. It appears not just as moretoitivity, but as specific identities, something more, above and beyond, simple moretoitivity as such. Ambiguity is itself ambiguous: fire is not just fire, it is ambiguous; but the ambiguity is not just ambiguity, it is also fire. This applies to everything else as well. Local coherence and global coherence (Provisional Positing and Emptiness) are just two ways of saying the same thing.\nIn the Tiantai “Three Truths” theory, instead of concluding that every particular view and thing is false, we conclude that all is, ultimately, true. Every possible view is equally a truth. There is no longer a hierarchy between the levels, and no category of plain falsehood. “Conventional Truth” in Tiantai is not something to be left behind when we reach enlightenment, but rather what is obtained and mastered and intensified there. Moreover, nothing is left out of it—all possible statements, viewpoints, ideas, concepts, positions are conventional truths. The criterion is still the same: all things can be used as “skillful means” to lead to Buddhahood. So now we have Three Truths, which are not a raft-like instrument to get beyond all statements and concepts, and a final higher truth that allows us to have no biased and particular view of things, but rather as three true ways of viewing any particular thing. It is not a raft to get beyond all rafts, but a raft that leads to the raft factory that makes and houses all rafts, and allows one to move at will from any raft to any other raft, including the initial one. However you may be viewing a particular part of the world or the world as a whole, it is “conventionally” true. There are not just a few conventional truths, but an infinite number of them, even when they are directly opposed and contradictory. So in Two Truths theory, we would say that “this is a cup” is conventionally true, and “this cup is empty” is a higher conventional truth, which finally leads us to a direct inconceivable experience of the emptiness of this cup, freedom from clinging to any view at all of this cup, which is the liberation from all suffering. If someone were to point to this “cup” and say, “This is an elephant”, however, that would not even be a conventional truth, because that is not how most people think of it, it is neither the ordinary speech of the language community, nor a Buddhist term designed to lead beyond itself. That would be a plain error. And if someone said, “This is an expression of the will of God”, that would also be an error, not even a conventional truth, since it tried to make a claim beyond that of conventional usage to an ultimate, universally applicable, absolute truth. But in Tiantai Three Truths theory, it is just as true to say, “This is an elephant” or “This is the Will of Baal” as to say “This is a cup”. And neither of these is less true than saying, “This is empty”, or indeed any less true than “experiencing” the emptiness of this cup/elephant. In both cases, what we have is a locally coherent way of viewing this thing—it just means that it looks that way from some perspective, within some set of parameters, for some length of time. It doesn't matter anymore whether those parameters are shared by the common sense of a particular community or speech group; all that matters is that it is possible to make it look that way, that it looks that way from anywhere, for even one moment. In Two Truths and Emptiness theory, nothing is really true. In Tiantai Three Truths theory, everything is true. We don't need an extra “Emptiness” outside of this locally coherent way of seeing things; Emptiness just means that whatever is locally coherent is also, ipso facto, globally incoherent. That is, when all factors are taken into consideration, the original way any thing appears is no longer unambiguously present, but it restored as a raft leading to all other rafts, including itself, as ineradicable aspects of all reality, of any reality.\nA simple thought experiment may draw out the implications of this idea. Imagine that you come upon what looks like a white marble lying on the ground. You experience it as round, as small, as white, and immediately you construct a lived attitude toward it—something that can be picked up, rolled, played with, pocketed. But then you go to pick it up, and find that it is stuck to the ground. You cannot lift it. You try to dig it out, and find that it extends downward, further than you can dig: it is the tip of a larger item. It appears to be a long rod or cylindrical pipe of some kind. But as you dig further, you find that after about five inches of narrow thinness it starts to expand outward; it is a spire on top of a cone. This cone expands outward as you keep digging down. When you get about twenty feet down, the cone ends, embedded in a soft, scaly material. Then the earth rumbles and an enormous two-horned monster emerges from underground; it is 500 feet tall, and each of its horns is twenty feet high, with a long sharp tip. You had been digging out one of the horns. What you had seen as a marble on the ground was in fact the very tip of one of the horns. Now look again at that tip. You had experienced it as round. But it turns out it was not round at all: it is sharp. Yet it has not changed at all: you are still seeing what you saw. It is not white either: the tip had looked white against the ground, but now, looking at the monster's horn as whole, you see it as a pattern of mostly green spots interspersed here and there with white: looked at as a whole, the horn, including its tip, looks green. Nor is it movable, pocketable, playwithable—it is rather dangerous, razor sharp, to be avoided. And yet nothing of what you saw was taken away: it was just supplemented with further information, with its larger context.\nTiantai views all things this way. Normally you might make some qualifications in order to preserve your view that some facts are unambiguous (indeed, to some extent this process is precisely what philosophy traditionally is); you might say “the tip, considered in isolation, is indeed round”. The usual procedure is to interpose the distinction between “how it appears” and “how it really is”, some form of reality-appearance distinction. But the most important consequence of the transformation of the Two Truths into the Three Truths is the wholesale dismissal of the appearance-reality distinction. Tiantai would reject the privileging of either considering in isolation or considering in any single particular connection; any of these would be legitimate in some heuristic (upayic) contexts, but none could be non-arbitrarily assigned the role of representing what is the “really the case”, simpliciter. To see something is to see “not-all” of it. We are always seeing a little fragment of the world, but every bit of the world is changed by the fact that it is a part of the world, is recontextualized by the rest of the world, by the rest of space and the rest of time. In fact, if we ever saw all, we would see nothing. For to see, to take something as “there”, as “real”, is to place it within a context, to contrast it to something outside of itself, something which is not it. To see all is to see nothing. As in the case of “fire” and “water” above, if someone were to say that the entire universe is “round”, this would require changing the meaning of “round”. This round would not be round: for round requires a non-round outside it to be round. It would have to be bordered by something to shape it into roundness, but the universe would also include that outside-the-roundness part. If someone were to say the entire universe were sharp, this would also make no sense. This sharp would not be sharp; for sharp requires a non-sharp outside it to be sharp. To say the whole universe is sharp, then, means no more and no less than saying the whole universe is round. We can make no specific determinations about the whole, about the entire universe, for that outside of which nothing exists; for all particular specifications require a contrast to something outside of them. Everything we can say or think comes from the realm of the finite, and cannot be applied to the infinite. But the Tiantai point is that we cannot speak of anything finite without also involving some determination of the Whole, of the infinite. If we were to say this thing is sharp, we would have to be assuming that “the whole universe is such that this thing is sharp”. We cannot say that: the whole universe cannot be “such that this marble is sharp” any more than the whole universe can be “sharp”. But this also means we cannot say the whole universe is “such that this marble is not-sharp”. Either is equally legitimate, either is equally illegitimate. What we can say, then, is that this marble appears to be round, but round is such that it is always turning out also to be more than round, to be non-round, and vice versa. Roundness is moretoitive. Round and non-round intersubsume each other.\nIn short, roundness is present as every non-roundness, and as moretoitivity; moretoitivity is present as roundness, and as every non-roundness.\nTo clarify this, consider the following:\nWhat is the following figure?\nWhat is that “same” figure in the diagram below?\n−2 −1 Ο 1 2\nWhat is it now?\nM N −2 −1 Ο 1 2 P Q\nHow about now:\nΟ M N −2 −1 Ο 1 2 Ο P Q\nWhen we looked at that round figure in isolation, it may have presented itself immediately and unreflectively in accordance with our habits or proximate mental acts; if we had been thinking about numbers a moment ago, it might appear simply and unambiguously as “zero”, if about letters as the letter “o”, if about shapes as a “circle”. When a single explicit context was added in the second diagram, it had a clear and definite identity: it was the number zero. But when we added another context at the same time, in the third diagram, the figure became ambiguous: it could now be read as either a zero or the letter O. As we keep adding more contexts, its identity becomes more and more ambiguous; in the final diagram above, we can point to the initial circular figure and say, validly, “This is a triangle”—for it is the vertex of a triangle formed with the two other, non-contiguous and non-proximate, circles. Who knows what other circles there are out in the world, and what other figures this thing right here is actually forming? When we consider all things in the universe at the same time, the initial identities we assigned to them are supplemented by more and more ambiguity. Looking at just the single series of letters, is was a zero: this is local coherence. When we see this cup simply as a cup, we are doing the same thing: ignoring a lot of other factors, contexts, points of view, ways of viewing, and narrowing down the relevant factors to allow it to appear as a single unambiguous something: a cup. If we consider the molecules of which it is made, or the energy it expresses, or the uses to which it might be put in the context of various narratives, or its deep past and deep future, its “cupness” becomes ambiguous: it is simultaneously lots of other things, part of many different stories. It is a blip on the screen of energy transformations, or a murder weapon, or an art object, or a doorstop. The same is true of yourself, and your actions right now. They are unambiguous only to the extent that we narrow our vision around them (one way we can narrow our vision, of course, is to do philosophy; one of the narratives in which we are contextualizing our experience might be a conceptual system presupposing the sorting out of essences, attributes, accidents, substantial forms or what have you, and distinguishing appearances from reality accordingly, so that it appears to be “essentially” a cup and only “accidentally” a murder weapon and only “appearing to be” a revelation from Baal). This is the meaning of Emptiness in Tiantai: ontological ambiguity. The term “ambiguity” usually refers only to how we see things. We assume that, in themselves, everything simply is what it is; but we may have an unclear view of it; we can't yet tell if it's this or that. We assume that, at least in principle, it must be one or the other. The idea of Emptiness is the idea that this is true “ontologically”: that is, it pertains to the very being of things. To say they are empty does not mean they are a blank—for that would be a definite something, a specific exclusion of all determinate content, which is, ipso facto, itself a determinate content. Emptiness here means rather that they are, in themselves, ambiguous. Again, this is also to say that everything is more than it seems to be, or rather constitutively more than it can seem to be, no matter what angles it is seen from, no matter how thoroughly it is known, no matter how comprehensive a sum of information is gathered about it. It has the character of being a “something” (a cup, a chair, an elephant), with a number of specifiable characteristics, but every “something”, just to be there as something, has the additional characteristic of “moretoitivity”—of always overflowing whatever is determined about it, of being more than what can be seen from any angle.\nThis “more” however, does not leave the original “known” part unchanged. Rather, it recontextualizes it. We are always seeing the tip of an iceberg. But even the “tip” is no longer what we thought it was before we knew it was a tip of something more. The key here is that there is no total decontextualization, that leaving one context is always simply entering another context; contextual relations do not require physical contiguity, and the empty space surrounding a given thing does not cut it off from further recontextualizations but rather is itself a context, and an illimitable one that opens into infinite alternate contexts.\nThis strange “neither-same-nor-different” structure of the Three Truths is to be understood in accordance with another key Tiantai concept, “opening the provisional to reveal the real” (開權顯實 kaiquan xianshi). This is a way of further specifying the relation between local coherence and global incoherence, which are not only synonymous, but also irrevocably opposed, and indeed identical only by means of their opposition and mutual exclusivity. Provisional truth is the antecedent, the premise, and indeed in a distinctive sense the cause of ultimate truth, but only because it is the strict exclusion of ultimate truth.\nThis can be compared to the structure of the relation between the set up and the punch line of a certain kind of joke. Consider the following:\n- Two strangers were chatting on a bus. One told the other he was on his way to a biology lab downtown to pick up his dog. “The scientists there are doing some research on him”, he said. “He was born with no nose”.\n- “Really?” said the other. “How does he smell?”\nLet's talk about that structure. When we hear the question “How does he smell?” it seems as if it is a serious query, an expression of serious curiosity about canine anatomy and its mutations. It has the quality of seriousness, of factuality, of non-ironic information. There is nothing funny about that statement. But, when the punch line comes, retrospectively, that set up is funny. That set up is funny because it has been recontextualized by the pun on the word “smell”, which is made to have more than one identity when put into a new context.\nThe interesting thing to note here is that it is precisely by not being funny that the setup was funny. In other words, if it was already funny, if you didn't take it seriously for a second, the contrast between the two different meanings of this thing could never have clashed in the way that is necessary to make the laughter, to make it actually funny. We have a setup which is serious and a punch line which is funny, but when you look back at the setup from the vantage point of having heard the punchline, that setup is also funny. After all, we don't say that just the punch line is funny. We say the whole joke is funny. The setup is funny in the mode of not being funny yet. It is only funny because it wasn't funny. It is the same thing in the Lotus Sutra and it is the same thing in life really. You're Enlightened! That is what Mahāyāna Buddhism says, everyone is Enlightened! Everybody is a Buddha! But the way in which you are a Buddha is the way in which the setup of a joke is funny, i.e., by not being a Buddha. By struggling toward buddhahood, toward something else, but by revisualizing or recontextualizing or expanding awareness, which has been the preferred technique in Buddhism all along, those very things which are the details of daily life, of the struggles to interact, to deal with conditions and suffering and lack of control are not just a means to buddhahood. They are themselves buddhahood as the life of a sentient being.\nThe “provisional”, conventional truth, local coherence, is the set-up. The “ultimate truth”, Emptiness, global incoherence, ontological ambiguity, is the punch line. What is important here is to preserve both the contrast between the two and their ultimate identity in sharing the quality of humorousness which belongs to every atom of the joke considered as a whole, once the punch line has been revealed. The setup is serious, while the punchline is funny. The funniness of the punchline depends on the seriousness of the setup, and on the contrast and difference between the two. However, once the punchline has occurred, it is also the case that the setup is, retrospectively, funny. This also means that the original contrast between the two is both preserved and annulled: neither funniness nor seriousness means the same thing after the punchline dawns, for their original meanings depended on the mutually exclusive nature of their defining contrast. Is the setup serious or funny? It is both: it is funny as serious, and serious as funny. Is the punchline serious or funny? It is both, but in an interestingly different way. It is obviously funny, but is it also serious? Yes. Why? Because now that the setup has occurred, both “funny” and “serious” have a different meaning. Originally, we thought that “funny” meant “what I laugh at when I hear it” or something like that, and “serious” meant “what gives me non-funny information” or something similar. But now we see that “funny” can also mean: What I take to be serious, what I am not laughing about, what I am earnestly considering, or crying over, or bewailing even.\nBut this means also that “serious” means “what can turn out to be either funny or serious”. So both “funny” and “serious” now both mean “funny-and-serious, what can appear as both funny and serious”. Each is now a center that subsumes of the other; they are intersubsumptive. As a consequence, the old pragmatic standard of truth is applied more liberally here: all claims, statements and positions are true in the sense that all can, if properly recontextualized, lead to liberation—which is to say, to their own self-overcoming. Conversely, none will lead to liberation if not properly contextualized.\nThe Three Truths, then, are actually three different but mutually implicative ways of looking at any object or state. Each implies the other two, and each is one way to describe the whole of that object, including its other two aspects. To be established is to be negated. To be begun is to be constitutively incomplete; to be determinate is to be ambiguous, to be anything is to be more than that thing. If it were not more—other—than X, it would not even be X. We may think about this in terms of the status of a “fact”. Emerson says in his essay, “History” (1841):\nTime dissipates to shining ether the solid angularity of facts. No anchor, no cable, no fences avail to keep a fact a fact.\nHe meant that every historical fact registers “at a distance”, in other times and places, taking on the role of an ever-ramifying metaphor that applies to more and more individual cases, with more and more diverse and rich implications. With a few small modifications, this brings us close to the Tiantai view: all we need to do is specify that “time” and “fact” are not really two different things, with the former acting to ambiguate the solidity of the latter, but are in reality two sides of the same thing, two aspects of a single process, in fact are ultimately synonyms. Time is just the addition of other facts. New facts are just the presence of additional time. In the Tiantai view these new facts are not imposed on the initial fact from without, but are posited as the context which alone made it a fact in the first place, made it determinate as just this fact. “Time” just means the self-positing of both itself and other facts by any fact. Time makes facts facts, and unmakes facts by making more facts, all of which are intrinsic to the first fact: history is the positing and transcending, the self-establishment and self-recontextualization of any given fact.\nPut another way, let us stipulate that a fact—any determination about what is so—is something that is in principle knowable, and that knowability implies a subject-object relation, and therefore a “distance” or separation, some space away from the fact-to-be-known. That means that a fact is only a fact if there is something outside of it, another fact, another time, a place to view it from; it doesn't count as a fact unless it can impact on some other site, unless it relates to some otherness. But that means that its journey out beyond itself to otherness is intrinsic to its very facticity, and it is this journey out beyond itself that Emerson denotes with the word “time”. To be thus and so, a fact must be viewable from elsewhere, and elsewhere, whether in physical or in conceptual space, implies the illimitable positing of still other alternate perspectives from which to be seen, facts to impact, viewpoints to interpret and metaphorically internalize the initial fact. Determinacy implies limit, limit implies space, space implies infinity of other spaces, of other perspectives, of other contexts. For something to be a fact is for it to intrinsically posit distances from itself, and thus to be viewable otherwise.\nMost simply, we can say that for Tiantai time itself simply is the continual “opening of the provisional to reveal the real”: an unceasing process of self-recontexualization where the past on the one hand remains unchangeable and on the other is constantly changing with each recontextualization. A moment of time is a recontextualization of the all the past. This also implies that the Tiantai notion of interpervasion of past, present and future, and of the “inherent inclusion” of all entities in each, is very far from resulting in a static picture of the universe devoid of any genuine creativity. For in Tiantai, each moment of time brings with it not only a new set of actual occasions, but a new set of “eternal principles”—categorical obligations, eternal objects, laws, universals. Each moment is effectively the creation of a new God who determines anew the character of the rest of the universe and of all the past and future.\nA moment, to be a moment, must be surrounded by other moments, from which it differs. “Now” must be different from “then”. But that means “now” must relate to “then”. The “then” is part of the world of the “now”, against which it defines itself, to which it stands in necessary contrast. This contrast cannot be either internal or external to the “now” and to the “then”. “Now” is really “now-then”, and “then” is really “then-now”. This is easy to understand if we consider the state of the entire totality of being at moment M and at moment M+1. The state of things at M is thought to have the power to cause the arising of the state of things at M+1. But if M is gone when M+1 arrives, it cannot “reach” M+1 to do anything to it; it is already gone, non-existent, and thus can do nothing. If the state of things at M continues to exist when M+1 arrives, however, time has failed to move ahead, or we must admit the coexistence of two alternate total states of being at the same time. If the appearance of M+1 does not necessitate the disappearance of M (which by our hypothesis possesses the power to bring about M+1), M would then continue to generate precisely M+1 repeatedly forever. In either case, time would not be possible, and no real entities could arise. Moments of time are neither same nor different; they are present as one another, the past as present as future, the future as past and present, the present as past and future. The past is not yet over—every moment of the present and future reveals more about the past and its infinite changes, for they are non-different from it, though allowing it to appear as these new moments. The present never begins—however far back you look, you will always be able to find all the characteristics of the present there, unchanged though appearing as some former moment. The present never ends—all future moments are further disclosures about this present moment of experience happening right now.\nWe can say all things are impermanent, as in early Buddhism—but now we know this is just a situationally attachment-undermining way of saying “impermanent-permanent”. We can say all things are permanent—meaning “permanent-impermanent”. We can say some things are permanent and others are impermanent—meaning “some-all are permanent-impermanent” and “all-some are impermanent-permanent”. But note too that this does not mean “permanent-impermanent” is the real truth, while “permanent” and “impermanent” are both one-sided distortions. That would be what Tiantai critiques as the “exclusive Center”. Rather, just as “permanent” really means “impermanent-permanent”, “impermanent-permanent” really means “permanent”, or really means “impermanent”. For impermanent-permanent appears as permanence and as impermanence, and each of these is the entirety, not a mere part, of the whole. To be permanent is already to also be impermanent—there is no other permanence. To be impermanent is already to also be permanent—there is no other impermanence. All is funny, all is serious, all is funny-serious. Each is a perfectly equal synonym for all three. Each is an equally adequate-inadequate description of the truth.\nThe same applies in all other cases. We can say all is suffering—meaning “suffering-bliss”. We can say all is bliss—meaning “bliss-suffering”. We can say all is mind—meaning “mind-matter”. We can say all is matter—meaning “matter-mind”. We can say there is a God—meaning “God-Godless”. We can say there is no God—meaning “Godless-God”. We can say all is illusion—meaning “illusion-reality”. We can say all is reality—meaning “reality-illusion”. We can say some things are true and some things are false—meaning “some-all is true-false and all-some is false-true”. We can say there is historical progress—meaning “progress-stagnation”. We can say there is historical stagnation—meaning “stagnation-progress”. We can say society is evil—meaning “evil-good”. We can say society is good—meaning “good-evil”. We can say we are sometimes happy and sometimes sad—meaning “we-everyone are sometimes-always happy-sad and sometimes-always sad-happy”. And so on. How should we choose which will we say at any time? If all things are sayable in some sense, what should we say right now? We should say whatever is most conducive to liberation from suffering, from one-sided attachments, in this particular situation and context.\nThe same method underlies all of Tiantai's shocking slogans, such as the claim that “all moments are permanent”, as we have seen, or “all appearances are the ultimate reality”, or “evil is ineradicable from the highest good, Buddhahood”. They mean what they say, of course: no moment ever ends, and however anything appears to anyone for however long is the ultimate reality that all things emerge from, all things return to, that explains and supports and sustains all things. True enough. The opposite would also be true. But these particular claims are emphasized in classical Tiantai writings to offset the more common one-sided prejudices that tend the other way. Because the impermanence of things and the illusoriness of appearances is stressed in the rest of Buddhism, it is assumed that anyone getting to Tiantai will already be aware of this side of reality, and indeed may be in danger of clinging to it. So Tiantai asserts the opposite, which is equally true.\nAll appearances are the ultimate reality: how is that true? Normally, we believe that in some kind of appearance versus reality contrast: “I thought that was a snake, but upon closer inspection it turned out to be a rope”. This is what most of Buddhism also says: “I thought there was a self, but it turned out to be a bunch of impermanent aggregates”. Or, “I thought there was a world, but it turned out to be all mind, or Buddha-nature, or illusion”. Common sense assumes this too: the rim of my glass looks oval, but in fact we know that, “really”, it is round—it's just that we're seeing it from an angle that foreshortens it. The rainbow is a mere appearance—when we go to touch it, we find nothing there. But the clouds and sunlight are real, they are what it really is, what it turns out to really be. Tiantai, however, makes the preposterous claim that the oval and the circle are both true—in fact, both are the ultimate reality, are findable in all things and at all times and places, are the Absolute. The rainbow and the cloudy sunlight—both true, both absolutely true, both the Absolute. The “self” and the impermanent aggregates—both true, both absolutely true, both the Absolute. The snake and the rope—both true, both absolutely true, both the Absolute. All is illusion. All is reality. Time is not an illusion. Time is the illusoriness of every possible thing. Time is a word that means “whatever you think is so is already not so”. What is real? What you can go back to, look at again, check up on, verify, re-examine. But there is literally no experience that you can go back to, so there is none that is real. What is illusion? Something that turns out to be otherwise than it appears. There is no thing of which this is not the case. The horn “appeared” to be round, but “turned out” to be “sharp”. But both roundness and sharpness are equally unreal, equally real. Each is determined by the context in which it is seen. Taking the unnameable whole into account, they too are unnameable, neither sharp nor round. Roundness and sharpness are two names for the same thing, which is round, sharp, and neither round nor sharp, and both round and sharp.\nThe same goes for the famous Tiantai claim that “evil is inherently included in Buddhahod”. Future Buddhahood lives in past delusion, so delusion is “Buddhahood-delusion”. Past delusion lives in future Buddhahood, so Buddhahood is “delusion-Buddhahood”. The same goes also for the famous Tiantai claim that “insentient beings have the Buddha-nature—i.e., that rocks and stones and all other things with no awareness have the all-pervasive unconditional nature of awareness: awareness is always nonawareness-awareness (all awareness exists-with nonawareness, e.g., the objects of awareness, which are not themselves aware), nonawareness is always awareness-nonawareness (i.e., nonawareness is determinately nonawareness only as contrasted by awareness to awareness itself, and is intrinsically inseparable from whatever awareness might exist in the universe, simply by virtue of the inseparability of all existence).\nThe controversial idea of “the Buddha-nature of insentient beings” is developed by Zhanran in his Jingangpi using a slightly different approach to the Three Truths, focusing on the trope of space as advanced as a metaphor for Buddha-nature in the Mahāyāna Nirvana Sutra, in its character of all-pervasiveness, ineradicability, and indivisibility, and the non-different/non-identical relation of all regions of space to each other and of each region of space to whatever possible object can occupy it. But here too the central argument is the inseparable intersubsumption of the two opposite terms: sentience is always insentience-sentience, insentience is always sentience-insentience.\nOne way to think about this is to consider a magnet. It has a north and a south “pole” to it. If we wanted to separate the north from the south pole, we might try cutting it in half. But when we do so, we find that each half still has both a north and a south pole. No matter how many times we slice it, the total set of different characteristics pertaining to the whole are also found in that separate part: northness and southness are, in their entirety, found in what was formerly, in the context of the whole magnet, purely the north part, and also in the former south part. This is how it is in the Tiantai universe: the universe is one big magnet, but instead of just a north and a south, it has 3000 different characteristic aspects: meness, youness, trains, oceans, dogs, soups, historical incidents, smiles, tears, delusion, enlightenment. If we try to isolate any of these, however, what we end up with is another entire “magnet”, which also has all 3000 aspects to it: this meness, it turns out, also has its youness part, its train part, its ocean part, its dog part, and so on. When I face you, it is you-and-me facing you-and-me. It is me-and-all-worlds facing all-worlds-and-me. It is the entire universe facing the entire universe. We are always different, because wherever we go, there is a you and a me, two different aspects, never merging into a blank indifferent mush of a single quality. But since me-and-you is contrasted to me-and-you, there is really no contrast at all: the same thing is found on both sides of the contrast. We are neither the same nor different. We are divided from ourselves, impossible to unify into a simple unity, but for that very reason we are impossible to separate from one another. Each of us, at each moment, are, in a word, absolute, the Center as which all appears, and which is appearing in and as all things. All things are our transformation bodies, we are the transformation body of all things.\nThis also means that, the more fully one realizes that one is any particular being, the more one realizes that he or she is also all other, contrasted, things as well. This is how traditional Buddhist “non-self” doctrine comes to play out in Tiantai. I think I am already this self, Brook, but in reality, Buddhism tells me, I am not yet really any such self—for to be a self is to be unconditional, and that is impossible for “me”, a conditional determinate being. Also, I am not yet enlightened—for enlightenment is unconditionality, the only freedom from suffering. To become unconditioned, as I'd thought I was when I thought I was a self, is to become enlightened. This non-self is the only thing that really fulfills my previous lust to be a self, to actually be me. I cannot become this by being me as a determinate being to the exclusion of all other beings, nor other beings to the exclusion of me. Rather, by the Three Truths, I can only become more and more me by becoming more and more everything else, and that is what it means to become more and more enlightened, and to become more me, more unconditionally this specific me. To “become what I am”, to be a more fully realized version of myself, is to see myself, Brook specifically, as unconditional, which means as omnipresent and eternal, which means as expressing itself in and as all things, which also means, conversely, intersubsumed, i.e., as an expression of all other things, as something as which all other things are appearing. I cannot be myself until I am a Buddha, but I cannot be a Buddha until I can be more fully (i.e,, more unconditionally, more all-pervasively) myself, and that means being more fully a devil, a fool, a table, a spaceship, or, in Siming Zhili's example, a dung beetle. Buddhist practice is the progressively fuller manifestation of my latent Buddhahood—which means also the progressively fuller manifestation of my latent Dung-Beetlehood, and indeed, my allegedly long ago already actual but really hitherto merely latent Brookhood.\nTiantai is encyclopedic in its approach to Buddhist practice; as one might expect in light of its view of “exclusion” in general, it excludes nothing. Hence in Tiantai works we find extensive, detailed cataloging of a huge diversity of traditional Buddhist practices, from rituals and devotions to meditations and contemplations of all kinds, derived from all strata of previous Buddhist culture. This accords not only with the philosophical objection to the possibility of any final mutual exclusion of entities rehearsed above, but also to the Lotus Sutra notion of upāya, and the expansion of the range of Conventional Truth in the Three Truths: the diversity of sentient beings is limitless, their specific delusions and attachments and sufferings are of limitless specific types, and thus the appropriate remedial practices and doctrines for them are limitless. This is also the justification for the “trivialist” position that all possible claims are true, for “true“ in the Tiantai context meansonly a remedial upāya serving as a raft to overcome itself, but doing so by totalization of itself, thereby undermining itself, expressing itself in and as all other things, intersubsuming all other truth-claims, thereby become all the more present as all the more absent.\nTiantai takes the non-dualistic ideas suggested by the Lotus Sutra in fables and unexplained narrative hints, and adapts the resources of Emptiness and the Two Truths to give them a full philosophical explanation and practical application for Buddhist practice. The Lotus Sutra had made upāya the centerpiece of Buddhism, and asserted a unity of all practices in the One Vehicle, all leading toward Buddhahood. Tiantai follows this lead and constructs a vast and complex system for accounting for and integrating all known forms of Buddhist and even non-Buddhist practice, all of which are acceptable skillful means appropriate and wholesome for different persons and times. It rejects nothing, but it organizes all known teachings and practices into an interconnected system. The system has an interesting double structure: the first time through, it appears to be hierarchical, putting the Mahāyāna above the Hinayana and the Lotus above the rest of the Mahāyāna. But the idea of redefinition of identity through recontextualization is applied here, and when the hierarchical crown of the Lotus has done its work, it has the retroactive effect of making all the other parts equal as aspects of the One Vehicle. That is, no teaching, practice or behavior has only a single meaning: its meaning is determined by the context in which it is viewed. So any given doctrine or practice can be seen as both the ultimate truth and as a more partial and only locally relevant, or lesser, truth. The Tiantai system of integrating all the various teachings and ideas and perspectives in the world provides a system for seeing everything twice, three times, infinite times, reassessing and developing the meanings of each item as it comes into broader and broader relations. The Hinayana teaching is, in the narrower context, a “lesser” truth. But in the context of the One Vehicle, it is itself an instantiation of the One Vehicle, and even gives unique expression to it: hence the claim (based on a clever strong misreading of a line from Kumārajīva's translation of the Lotus: 決了聲聞法 為諸經之王) that the Hinayana doctrine (rather than the Lotus itself) is itself the Highest of All Teachings. The same goes for all other particular ideas, beliefs, practices. Since nothing has only one meaning, everything can mean anything. The interesting question about any proposition is not whether it is true (it always is), but how. The Tiantai “classification of teachings” is an intricate and complex way of spelling out in what context and in what way each doctrine means each of the many things it means.\nThe way in which each and any of these alternate methods or doctrines is recontextualized to promote the desired Tiantai implication is through the supplementation of the Three Truths view of any and every possible content. Tiantai meditation most centrally applies a method called “the contemplation of mind”, (觀心 guanxin) given its most famous formulation in Zhiyi's unfolding of 一念三千 yiniansanqian (Japanese: ichinensanzen), which means something like: “One Moment of Experience as Three Thousand Worlds”. The “three thousand” is of course a way of saying “everything”, but it is really something a bit more than that. For of course, as Zhiyi himself points out, any number would be an equally accurate possible way to talk about the totality of all things, from none to infinity. This number, “three thousand”, is concocted specifically with meditational practice in mind. Here's how it's derived:\n|Ten Realms ×||Ten Realms ×||Ten Suchnesses ×||Three Worlds=3000|\n|Hungry Ghosts||Hungry Ghosts||Consequences||Environment|\n|Purgatories||Purgatories||Ultimate Equality and Equal Ultimacy|\nPlease note a few peculiarities of this way of listing “what exists”. First, special care is taken here to include both “purgatories” (i.e., the demonic thoughts, practices and consequences of extreme subjective delusion and suffering) on the one hand, and “Buddhas”, (the enlightened thoughts, practices and consequences of the greatest wisdom and liberation) on the other hand. This is important, because it cautions us against viewing these subjective states, good or evil, as mere epiphenenomena that are somehow outside the ultimate reality. They are themselves included in the ultimate reality. By including these terms, Tiantai guards against a vague notion of “everything” which might lend itself to thinking that only a pure or neutral substance—mind, matter, energy—is what is real, or that the values and perspectives, good and bad, painful and pleasant, that living beings experience are not part of the “everything”. The “everything” that is included in each moment of experience, and which is eternally ineradicable, includes all those good and bad subjective states as well.\nSecond, we have two important reduplications. The ten realms are all the states in which a sentient being might find him or herself in the Buddhist universe, from the lowest ignorance and suffering to the highest bliss and enlightenment. They are often interpreted symbolically: Buddhahood representing a moment of enlightened experience, Bodhisattvahood a moment of compassion, Sravakahood a moment of quiescence or renunciation of the worldly, Godhood a moment of great worldly bliss and power, Asurahood a moment of egoistic rage and combativeness, animals ignorance, purgatories suffering. One reason to read these as states that any being might undergo is that each of the ten realms is listed twice. This is because each realm “includes” or “instantiates” all the other ten realms. That is, each can appear “as” any of the others, and in fact nothing appears which is not always “as” something else. A human-bodhisattva, an animal-god, a Buddha-demon, an Asura-Sravaka, etc. A bodhisattva appears as a human, or an animal, or a Buddha, or an Asura. But as we've seen, this also means a human appears as a bodhisattva, or a demon as an animal, or a Sravaka as a hungry ghost, etc. Of course this goes on ad infinitum: each of these included realms further includes all ten realms, and so on. The 10 times 10 is just to point to this factor of mutual inclusion, and make sure it is accounted for in our meditative contemplation of “what exists”.\nThe other duplication comes in the “Three Worlds”. We have “the five aggregates” but also “sentient beings”. Actually, these are two ways of looking at the same thing. Early Buddhism taught that what we call a sentient being—you, me, Bill, Dave—is actually a set of five aggregates, momentarily arising and perishing impersonal processes of form, sensation, perception, volition and consciousness. One (the aggregates) was real, the other (the alleged “self”) was a pernicious illusion. The Three Thousand includes both. In other words, it does not exclude the illusions about things among the totality of “what exists”—as we've seen, all things are equally illusions and equally true. The view of you as Bill is one item in the list; the view of you as five impersonal aggregate processes is another item on the list. Here too we have a shorthand way of pointing to a larger principle, and a goad to keep it in mind in our contemplation of “all that exists”. We are not to think of a set of real entities lined up side by side, mutually exclusive, of which there may be some additional erroneous views. Rather, the erroneous view are part of all that exists, indeed all that exists is some erroneous (i.e., one-sided, locally coherent) view. There is no “thing” as such: a thing is just a way of appearing, and comes with a viewpoint upon it. Tiantai insists further that to have a single viewpoint requires at least one additional viewpoint, and so ad infinitum. Normally we drain off the ambiguity and call it “subjectivity” or “free will” or “the unknown future” to one side and leave the “reality” on the other side, calling it “objectivity” or “determinate fact” or “the settled past”. In Tiantai, these are inseparable, merely aspects artificially separated off from the whole, which is always both fixed and open, locally coherent and globally incoherent.\nNow once we have gone through thinking about all possible objects of experience this way, one by one, almost in the manner of a list out of Walt Whitman's Leaves of Grass, we apply the Three Truths, the neither-same-nor-different relation, to this thought itself. First temporally: this whole line of thinking required some time to go through. Are the previous moments of thinking same as or different from the present one now considering this question? Neither. All other moments are present here as this moment—neither same nor different, the Three Truths. Next we consider the external world, including my sense organs and brain, that served as the efficient causes for the arising of this moment of thought about the Three Thousand realms of possible experience: is the actual world and my body different from or same as this moment of thought about them all? Neither. The external world is present here as this consciousness of it, neither same nor different. Next we consider all other possible thoughts or experiences, the contrast with which is what makes this moment determinate as itself: are they the same or different from it? Neither. All other experiences are present here as this moment of experience. I experience one moment of experience as a totality, including my illusory presence as the experiencer. The next moment, when new contents appear, will be experienced as more of or other expressions of the same moment. I experience the eternity-temporality of this moment continuing to show itself in and as the neither-same-nor-different array of all other possible experiences, beings, ideas, moments. This is the experience of Buddhahood-as-all-sentient-beings.\n- Andō Toshio 安藤俊雄, 1964, “Nyorai seiaku sisō no sōsetsusha: Guandingsetsu he no hanron 如来性悪思想の創說者: 灌頂說への反論 (The Author of the Theory of the Buddha's Inherent Evil: A Refutation of Guanding's Authorship)”, Ōtani Gakuhō 大谷学報 (The Journal of Buddhism & Cultural Science), 44(1): 1–22.\n- –––, 1973, Tendai shōgu shisōron 天台性具思想論 (On the Tiantai Theory of Nature-Inclusion), Kyoto: Hōzōkan.\n- Chen Jian 陈坚, 2007, Fannao ji puti: Tiantai “xing'e” sixiang yanjiu 烦恼即菩提—天台性恶思想研究 (Defilement is Identical to Enlightenment: An Investigation of the Tiantai Doctrine of Inherent Evil), Beijing: Zongjiao wenhua.\n- Chen Yingshan 陳英善, 1997, Tiantai yuanqi zhongdao shixiang lun 天台緣起中道實相論 (On the Tiantai Theory of Middle-way Reality Based on Dependant Arising), Taipei: Fagu Wenhua.\n- Clower, Jason, 2010, The Unlikely Buddhologist: Tiantai Buddhism in Mou Zongsan's New Confucianism, Leiden [etc.]: Brill.\n- Dong Ping 董平, 2002, Tiantaizong yanjiu 天台宗研究 (A Study on the Tiantai School), Shanghai: Shanghai Guji.\n- Donner, Neal, 1987, “Chih-i's Meditation on Evil”, in Buddhist and Taoist Practice in Medieval Chinese Society, edited by David. W. Chappell, Honolulu: University of Hawai'i Press, 49–64.\n- Donner, Neal and Daniel B. Stevenson, 1993, The Great Calming and Contemplation: a Study and Annotated Translation of the First Chapter of Chih-I's Mo-ho Chih-kuan, Honlulu: University of Hawai'i Press.\n- Emerson, Ralph Waldo, 1841, “History”, in Essays, republished in 1847, Essays: First Series. [Emerson 1841 available online]\n- Guo Chaoshun 郭朝順, 2004, Tiantai Zhiyi de quanshi lilun 天台智顗的詮釋理論 (The Hermeneutic Theory of Tiantai Zhiyi), Taipei: Liren shuju.\n- –––, 1999, “Zhanran wuqing youxing sixiang zhong de zhenru gainian 湛然「無情有性」思想中的 「真如」概念 (The Concept of Suchness in Zhanran's Thought on Insentient Beings Having Buddha-nature)”, Yuanguang Buddhist Periodical 圓光佛學學報, 3(February): 45–72.\n- –––, 1995, “Zhanran yu chengguan foxing sixiang zhi yanjiu 湛然與澄觀佛性思想之研究 (A Comparative Study of Zhanran's and Chengguan's Thought of Buddha-Nature.)” PhD diss., Wenhua University.\n- Hurvitz, Leon, 1963, Chih-I (538–599): An Introduction to the Life and Ideas of a Chinese Buddhist Monk, Bruxelles: Inst. Belge des Hautes Etudes Chinoises.\n- Jingquan Dashi 靜權大師, 1993, Tiantaizong gangyao 天台宗綱要 (An Outline of the Essentials of the Tiantai School), Kaohsiung, Taiwan: Wenshu Jiangtang.\n- Kantor, Hans-Rudolf, 2009, “Zhiyi's Great Calming and Contemplation”, in Buddhist Philosophy: Essential Readings, edited by William Edelglass and Jay L. Garfield, New York: Oxford, 334–47.\n- Li Silong 李四龙, 2003, Tiantai Zhizhe yanjiu: jian lun zongpai fojiao de xingqi 天台智者研究: 兼论宗派佛教的兴起 (A Study of Tiantai Zhizhe: with a Discussion about the Rising of Buddhist Sectarianism), Beijing: Beijing University.\n- Loy, David R., 2004, “Evil and/or/as the Good: Omnicentrism, Intersubjectivity, and Value Paradox in Tiantai Buddhist Thought (review)”, Philosophy East and West, 54(1): 99–103.\n- –––, 2005, “Evil as the Good? A Reply to Brook Ziporyn”, Philosophy East and West, 55(2): 348–52.\n- Mou Zongsan 牟宗三, 1989, Foxing yu bore 佛性與般若 (Buddha-nature and Prajñā), Taipei: Xuesheng shuju.\n- Ng Yu-Kwan 吳汝鈞, 2002, Fahua xuanyi de zhexue yu gangling 法華玄義的哲學與綱領 (The Philosophy and Outline of the Fahua Xuanyi), Taipei: Wenjin.\n- –––, 1993, T'ien-t'ai Buddhism and Early Madhyamika, Honolulu: University of Hawai'i Press.\n- –––, 1999, Tiantai Zhiyi de xinling zhexue 天台智顗的心靈哲學 (Tiantai Zhiyi's Philosophy on the Mind), Taipei: Taiwan shangwu.\n- Pan Guiming 潘桂明, 2006, Zhiyi pingzhuan 智顗評傳 (A Critical Biography of Zhiyi), Nanjing: Nainjing University Press.\n- Pan Guiming and Wu Zhongwei 吴忠伟, 2001, Zhongguo tiantaizong tongshi 中国天台宗通史 (A General History of Chinese Tiantai School), Nanjing: Jiangsu guji.\n- Penkower, Linda L., 1997, “Making and Remaking Tradition: Chan-Jan's Strategies toward a T'ang T'ien-t'ai Agenda”, in Tendai daishi no kenkyuu 天台大師研究: 天台大師千四百年御遠忌記念 (A Study of Great Master Tiantai), edited by Tedai daishi no kenkyu henshu i-inkai, Tokyo: Tendai gakkai, 1289–1338.\n- –––, 1993, “T'ien-t'ai During the T'ang Dynasty: Chan-jan and the Sinification of Buddhism”, PhD diss., Columbia University.\n- Satō Tetsuei 佐藤哲英, 1961, “Tendai seiaku hōmon no sōshōsha: Shōkannongyōsho no sakusha nitsuite 天台性惡法門の創唱者: 請觀音經疏の作者について (The Author of the Theory of Inherent Evil in Tiantai: on the Author of the Qingguanyinjingshu)”,Indogaku Bukkyōgaku Kenkyū 印度學佛教學研究 (Journal of Indian and Buddhist Studies), 9(2): 67–72.\n- Shi Dachang 釋大常, 2004, Zhizhe Dashi panshi “sanzangjiao” zhi yanjiu 智者大師判釋 「三藏教」之研究 (A Study of Great Master Zhiyi's Classification and Hermeneutics on the Tripiṭaka Teaching), Taipei: Fagu wenhua.\n- Shi Fazang 释法藏, 2002, “Cong tiantai yuanjiao zhi jianli shi lun yuanjiao zhiguan de shijian 从天台圆教之建立试论圆教止观的实践 (A Discussion on the Practice of Calming and Contemplation in the Perfect Teaching from the Perspective of the Establishment of Tiantai Perfect Teaching)”, Taizong yanjiu 台宗研究 (第二期) (A Study of the Tiantai School), 2: 80–116.\n- Shi Huiyue 釋慧岳, 1995, Zhili 知禮, Taipei: Dongda.\n- Shi Huiyue 釋慧嶽, 1993, Tiantai jiaoxue shi 天臺教學史 (A History of Tiantai Teachings), Taipei: the Corporate Body of the Buddha Educational Foundation.\n- Stone, Jacqueline I., 1999, Original Enlightenment and the Transformation of Medieval Japanese Buddhism, Honolulu: University of Hawai'i Press.\n- Swanson, Paul L., 1989, Foundations of T'ien-t'ai Philosophy: The Flowering of the Two Truths Theory in Chinese Buddhism, (Nanzan Studies in Religion and Culture), Asian Humanities Press.\n- –––, 1990, “T'ien-t'ai Chih-i's Concept of Threefold Buddha Nature—A Synergy of Reality, Wisdom, and Practice”, in Buddha Nature: A Festschrift in Honor of Minoru Kiyota, edited by Paul J. Griffiths and John P. Keenan, Tokyo: Buddhist Books International, 171–80.\n- –––, 1994, “Understanding Chih-i: Through a glass, darkly?” Journal of the International Association of Buddhist Studies, 17(2): 337–60.\n- Wang Zhiyuan 王志遠, 2004, Jin'gangpi 金剛錍 (The Diamond Scalpel [of Jingxi Zhanran]), Kaohsiung, Taiwan: Foguang.\n- Wu Zhongwei 吴忠伟, 2007, Yuanjiao de weiji yu puxi de zaisheng: Songdai Tiantaizong shanjia shanwai zhi zheng yanjiu 圆教的危机与普系的再生: 宋代天台宗山家山外之争研究 (The Crisis of the Perfect Teaching and the Rebirth of Lineages: A Study of the Dispute between Shanjia and Shanwai of Song Tiantai Buddhism), Changchun: Jilin renmin.\n- Yu Xueming 俞学明, 2006, Zhanran yanjiu: Yi Tangdai Tiantaizong zhongxing wenti wei xiansuo 湛然研究: 以唐代天台宗中兴问题为线索 (A Study of Zhanran: A Clue to the Issue of the Revival of the Tiantai School in the Tang Dynasty. Beijing: Zhongguo shehui kexue.\n- Zeng Qihai 曾其海, 1999, Tiantai foxue 天台佛学 (Tiantai Buddhism), Shanghai: Xuelin.\n- –––, 2007, “Tiantaizong Zhili da riben guoshi wen 天台宗知礼答日本国师问 (ZhiLi's Answers to the Japanese Minister's Questions on Tiantai Buddhism)”, Taizhou Xueyuan Xuebao 台州学院学报, 29(5, October): 10–13.\n- Zhou Shujia 周叔迦, 1999, “Wuqing you foxing” 无情有佛性 (Insentient Beings Have Buddha-Nature), Fojiao wenhua 佛教文化, 4: 14–15.\n- Ziporyn, Brook, 2004, Being and Ambiguity: Philosophical Experiments with Tiantai Buddhism, La Salle and Chicago: Open Court Press.\n- –––, 2013, Beyond Oneness and Difference: Li and Coherence in Chinese Buddhist Thought and Its Antecedents, Albany: State University of New York Press.\n- –––, 2000, Evil and/or/as the Good: Omnicentrism, Intersubjectivity, and Value Paradox in Tiantai Buddhist Thought, Cambridge, MA.: Harvard University Asia Center.\n- –––, 2009, “How the Tree Sees Me: Sentience and Insentience in Tiantai and Merleau-Ponty”, in Merleau-Ponty and Buddhism, edited by Jin Y. Park and Gereon Kopf, Lanham, MD: Lexington, 61–82.\n- –––, 2013, Ironies of Oneness and Difference: Coherence in Early Chinese Thought: Prolegomena to the Study of Li, Albany, New York: State University of New York Press.\n- –––, 2010, “Mind and Its ‘Creation’ of All Phenomena in Tiantai Buddhism”, Journal of Chinese Philosophy, 37(2): 156–80.\n- –––, 2000, “Setup, Punch Line, and the Mind-Body Problem: A Neo-Tiantai Approach”, Philosophy East and West, 50(4): 584–613.\n- –––, 2006, Shan yu e: Tiantai fojiao sixiang zhong de bianzhong zhengti lun, jiaohu zhutixing yu jiazhi diaogui 善与恶: 天台佛教思想中的遍中整体论、交互主体性与价值吊诡 (Evil and/or/as the Good: Omnicentrism, Intersubjectivity, and Value Paradox in Tiantai Buddhist Thought), Translated by Wu Zhongwei 吴忠伟, Shanghai: Shanghai guji.\n- –––, 2009, “The Deluded Mind as World and Truth: Epistemological Implications of Tiantai Doctrine and Praxis in Jingxi Zhanran's Jingangpi and Zhiguan yili”, in Buddhist Philosophy: Essential Readings, edited by William Edelglass and Jay L. Garfield, New York: Oxford, 238–50.\n- –––, 1999, “What Is the Buddha Looking At? The Importance of Intersubjectivity in the T-ien-t'ai Tradition as Understood by Chih-li”, in Buddhism in the Sung, edited by Peter N. Gregory and Daniel A. Getz, Jr., Honolulu: University of Hawai'i Press, 442–76.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.\n[Please contact the author with suggestions.]", "label": "No"} {"text": "“We can no longer act on nature with impunity.” The “classic” model of economic development “poses a threat to humanity’s very existence”. China needs a new development model, based on renewable resources used effectively and sustainably, that will be built on the old model’s ruins.\nDeng Yingtao, a high-profile Chinese economist, made this call to action thirty years ago in his book A New Development Model and China’s Future. Its message was ignored by the political leaders it was addressed to. In this review article, I will consider why.\nIn the 1990s, the Chinese Communist party leadership prioritised expansion of export-focused manufacturing industry. The industrial boom really took off in the 2000s, fuelled by mountains of coal – the classic unsustainable resource.\nIn every year since 2011, China has consumed more coal than the rest of the world put together;\nmore coal than the entire world used annually in the early 1980s; and more than twice what all the rich countries together used annually in the mid 1960s, during their own coal-fired boom.\nThe primary beneficiaries of this economic model are not China’s 1.3 billion people. The big fuel users are in China’s giant east-coast manufacturing belt – which produces, in the first place, energy-intensive goods for export to rich countries: steel bars, cement, chemical products, agricultural fertilisers and electronics products. Household fuel consumption remains extremely low.\nThis level of fossil fuel use can not go on, not in China and not anywhere else, without courting the most horrendous dangers brought about by global warming.\nDeng Yingtao made a compelling argument against going down this road, BEFORE the decisions were made.\nIn the Introduction to his book, he pointed to the yawning gap between rich and poor countries; the multinational companies’ rising power; and the damage done to the global south by capitalist boom-and-bust.\nThe “classic” development model had led to “a world economy dominated by the developed West Read the rest of this entry »", "label": "No"} {"text": "इस article में हमने आपके लिए अनेकता में एकता (unity in diversity) के विषय पर एक. It has often been repeatedly said that india is a land of ‘unity in diversity’ though this apparently sounds as a contradiction in terms but that is what we have. Unity in diversity essay diversity essay another occasion the text below is play return man 2 and population exceeding 100 crores born and other amazing side events. Free essays on unity in diversity in 8 stander 100 word get help with your writing 1 through 30. Unity in diversity essay - put aside your fears, place your assignment here and get your quality project in a few days use from our cheap custom term paper writing.\nDefiance county, ohio defiance county has a long history of change and growth it is currently composed of twelve townships, adams, defiance, delaware, farmer. Unity in diversity is responsible for enhancing the quality of the teamwork and completion of the projects within a stipulated time frame due to different social and. Here is an essay on unity in diversity in india geographical unity: geographically india may not be a united by itself but from times immemorial india has been consi.\nUnity in diversity essay 1 (100 words) unity in diversity means oneness in the varieties india is a best country proving this concept for many years. India is a big country comprising many racial groups with a great number of spoken languages and dialects there are several religions and sects. Unity in diversity is a concept of unity without uniformity and diversity without fragmentation that shifts focus from unity based on a mere tolerance of.\nOther animals, essay diversity in unity variety the meaning making is a necessity for these calls to their ability to conceptualize or make improvements on later to. Free essay sample about unity in diversity online free research paper example on diversity topics free tips how to write a good essay about unity in diversity in. Unity in diversity is easy to talk but impossible to achieve in a country like india india is secular country meaning in india every single religion has equal rights.\nShort essay about indian culture : unity in diversity : it is said that “unity in diversity” and it is known for india india is a diverse country. Unity in diversity india is one of the oldest civilizations in the world and boasts of many ethnic groups following different cultures and religions being.\nPrayer is a powerful practice, as many who do it regularly can attest to but in addition to being a powerful personal practice, prayer can play a role in. Essays - largest database of quality sample essays and research papers on unity in diversity. This short essay is written on unity in diversity for your easy pick, we have written full essay, short essay and short points too.", "label": "No"} {"text": "Emerging from the lockdown a better father\n58-year-old Lambert is living to prove that stereotypes and negative cultural norms can be dismantled even while living in a very patriarchal rural society. He now comfortably shares household chores with his wife,their 3 daughters and 3 sons. As a family, they all freely discuss finances, including budgeting for the available money together.\nThis is not a normal scenario in most households in Ugandan communities. Typically, household chores are left to the women and girls and finances are rarely discussed as a family, but a preserve for the manto decide especially on expenditure.\nThis change of attitude was however not instant. It was inspired from a coffee value chain group in which Lambert was a member for purposes of increasing their coffee growing and sales. One of the methodologies that was introduced by Agency For Community Empowerment to help the farmers with their coffee growing and marketing was the Gender Action Learning System. The methodology developed by Oxfam uses a series of tools to help the participants explore the opportunities around them but also vision their futures. It also challenges them on how well they are working together with their families to achieve the stated visions. Using successful examples of families that have used the methodology to work together and achieve their visions, group members, including Lambert were inspired to try it out.\nRather than having an individual vision, he worked with the family to have a family vision and this required them to work together. Lambert realized that by helping his wife with household chores, they were both able to do the farming togetherand realize increased produce as well as income.\nHe has never looked back!\nSince the change he realized in his own household, Lambert became a champion of change in his community, encouraging fellow men to work hand in hand with their wives but also to stop practices such a violence.\nUntil the lockdown that was put in place as part of the measures to stop the spread of the corona virus, Lambert was spending some of his timein the community, educating his fellow men on how to improve their lives and that of their families.\nWith the lockdown, Lambert says he spends most of his time at home working in the garden together with his wife and children, something that is not new. This has enabled him to bond more with the children who are normally away at school.\nBecause he was already relating well with his family, it has helped them cope with the challenges the lockdown presented. Although their income has greatly reduced due to a fall in prices of the produce they farm and inability to pursue different markets,the whole family understands this, and they therefore have sacrificed having some basic needs.\nAsked how his community reacts to him doing household chores, he says:\n“So many people, including women look down on men who get involved in household chores. They think you are not man enough. Because our compounds are open, sometimes people passing by laugh when they find me washing utensils. I am however used to this and rather than get angry, I talk to them aboutthe benefits. For example, from working together with my family, both on unpaid and paid work, we always afford school fees and we have started constructing a permanent house.”\nLambert aspires to have his family as a role model in the entire parish of Pacaka in Erussi, Nebbi District.", "label": "No"} {"text": "Turkey – Torch Relay International Route with Flag and Torch\nAthens 2004 Olympic Games Pin\nThe Olympic Flame passed from Turkey\nThe 2004 Summer Olympics Torch Relay took the Olympic Flame across every habitable continent, returning to Athens, Greece. Every citywhich had hosted the Summer Olympics was revisited by the torch, as well as several other cities chosen for their international importance.\nThe relay was the first time the Olympic flame had travelled to Africa, India and South America. The flame was transported from country to country aboard a specially-equipped Boeing 747 leased from Atlanta Icelandic (Registration TF-ARO) called Zeus. On board the flame was carried and burned continuously in specially modified miners lamps.\nThe flag of Turkey (Turkish: Turk bayrag?, meaning Turkish flag) is a red flag featuring a white star and crescent. The flag is often called al bayrak (the red flag) and referred to as al sancak (the red banner) in the Turkish national anthem.\nThe current design of the Turkish flag is directly derived from the late Ottoman flag, which had been adopted in the late 18th century and acquired its final form in 1844.\nThe measures, geometric proportions, and exact tone of red of the flag of Turkey were legally standardized with the Turkish Flag Law on May 29, 1936.\nThe pin depicts the flag of Turkey where passed the Olympic Flame\nProduct: Olympic Pin\nPin code: #04-169-025\nOfficial Licensed Product\nLicensed Manufacturer: Efsimon Collection\nBuy it Now and Join the Wonderfull Winning World!!!", "label": "No"} {"text": "In industrial producing process, mould steel is the major material in mould industry. Working life, components' accuracy, quality, appearance performance of the mould has close relationship with not only its design technique, manufacturing accuracy, machine precision and operation, but also with whether the correct technology of heat treatment being carried out.\nThe heat treatment quality and usability of the mould are generally judged by its hardness. Hardness is an important performance index of mould material and finished mould. The force condition of mould is complex while working, for example, hot-working mould generally suffers alternating stress in alternating temperature field. Therefore, it should have the ability that prevents the mould from changing into soft or plastic state, and keeps its shape, size and accuracy the same in long time working environment. Generally, the cold-working mould chooses finished mould hardness value of 59-60HRC, while the hot-working mould chooses finished mould hardness value of about 48HRC.\nAbrasive resistance is an important performance index of finished mould. When parts form, metal and mould cavity surface would be in relative motion, abrasing mould cavity surface and making mould size, shape, accuracy, and surface roughness changes and lose efficacy. Mould abrasive resistance is generally determined by its heat treatment, especially superficial heat treatment. Judging the abrasive resistance is mainly based on hardness(hardness tester).聽", "label": "No"} {"text": "Aberdeen harbour and the boat people, 1949\nScope and Contents\nA series of thirty photographs taken by Douglas Moore in 1949, depicting views and aspects of the lives and conditions of the inhabitants of Hong Kong. The photographs were printed and mounted for an exhibition at the North Staffordshire Polytechnic in the 1980s. The average size of each print (inner mount measurement) is 290 mm x 360 mm. The photographs are each individually captioned on the reverse and are accompanied by Mr Moore’s introductory caption for the exhibition:\nHong Kong in 1949 was a small British colony on the south coast of China. The colony includes the island of Hong Kong and the peninsula opposite on the Chinese mainland. Both the island and the end of the peninsula belonged permanently to Great Britain but the rest of the peninsula known as the New Territories was leased by China to Britain under an agreement that ended in 1997.\nThe island capital is Victoria and on the mainland, across the harbour, is the city of Kowloon. This is the English spelling of the Chinese name of Kowlung (Nine Dragons) which comes from the twisted shapes of the many mountain peaks on the mainland. On the south side of the island is the fishing port of Aberdeen (named after the port in Scotland) with its great number of Chinese craft known as junks and sampans. The fishermen and their families nearly all live on the boats.\nDuring the war between China and Japan in the 1930s Hong Kong became seriously overcrowded but when the Japanese occupied the colony in 1941 things became so difficult that many people returned to China and, as a result, only 750,000 were in Hong Kong when the war ended.\nHowever, many Chinese returned again during the Civil War and Victoria and Kowloon became overcrowded with thousands living in squatters’ shacks outside the cities. The population rose at this time to between 3 and 4 million.\nThe photographs in this exhibition were taken at the time when these millions of extra people were pouring into the colony (i.e. 1949) and of course the Second World War had only been over for a few years. A look at Hong Kong today would show some great changes, especially if you were to compare an up to date picture of the harbour and Victoria with one of 61 years ago (number 1). However, I imagine that the boat people of Aberdeen still go fishing and live on their boats as they always did.\nConditions Governing Access\nUnless restrictions apply, the collection is open for consultation by researchers using the Manuscripts Reading Room at Cambridge University Library. For further details on conditions governing access please contact firstname.lastname@example.org. Information about opening hours and obtaining a Cambridge University Library reader's ticket is available from the Library's website (www.lib.cam.ac.uk).\nLanguage of Materials\nFinding aid date", "label": "No"} {"text": "Narcolepsy is indeed a sort of sleep disorder that effects a person in the form of a neurological defect. The persons suffering from narcolepsy do suffer many of the complications in their life as they actually get to sleep most of the daytime as sleep doesn’t usually occur according to the routine. This can create some high tremors as this narcolepsy highly effects a person especially during the time when he’s in work or struck in traffic etc. The extent of sleep period might actually be many ranging from seconds to hours.\nHowever many reports did suggest that narcoleptic patients can hear the entire surrounding while they are asleep and the only problem with them is simply that they couldn’t get awake. This is something a weird nervous disorder which is actually associated with genetics. Some strong emotions can make you to fall asleep even and these emotions include both positive and negative ones.\n1. Don’t Drive Especially During The Times Of Heavy Traffic:\nThis is something that every narcoleptic has to be quite careful with as driving cars or even other vehicles might get to pop out as fatal ones especially during the cases where there’ s some heavy traffic. During heavy traffic cases or at times when one get’s struck in traffic, there’s indeed a lot of chance to get sleepy and as the ones suffering from narcolepsy find sleep as a high involuntary act, driving at such cases might leave you on the road helpless.\nThis can even be the main cause for some accidents to happen at times. Hence it is highly advisable for all the individuals suffering from narcolepsy to reduce or avoid driving on the roads to the maximum possible extent to experience some of the better results, else neglecting this might even risk your life as well.\n2. Reduce The Intake Of Coffee And Alcohol:\nCoffee indeed has some high amounts of caffeine in it and it is proved that this compound isn’t highly beneficial to health and it has got many of the health disadvantages as well. However for a person suffering from narcolepsy, caffeine is something that is extremely fatal and this has to be stopped to the maximum possible extent. Caffeine has a tendency to reduce your sleep levels and further weakens the nervous system and increase the extent of the disease.\nIt is also a proved fact that narcolepsy can also lead to many of the other diseases such as high blood pressure etc. Consumption of alcohol also has many adverse effects on the narcoleptic patients and this is known to induce sound sleep which has to be reverses in those individuals. Hence it is highly recommended that the persons suffering from narcolepsy doesn’t consume alcohol and coffee and experience some better things as far as their sleep levels are concerned.\n3. St.John’s Wort:\nSt.John’s Wort is actually a herb that is highly helpful in handling the cases of narcolepsy and promote the immunity system of an individual against narcolepsy. Hence it is recommended to all those individuals suffering from this disease.\n4. Proper Diet:\nIt is highly recommended for all the persons suffering from narcolepsy to intake foods that are rich in vitamin D and vitamin B.\n5. Country Mallow:\nThis herb is highly beneficial to the nervous system and is also proved to be extremely beneficial for narcoleptic patients.", "label": "No"} {"text": "One of the most interesting things about travelling or undertaking a journey is the high possibility of exposure, learning and discovery. Among the Igbos of south-eastern Nigeria, there is a proverb that says that “a traveller is far more intelligent than someone with grey hairs who does not travel out”. It is little wonder then that most great storytellers were great travellers. If we take time to look into some of the major discoveries in the world, we would still come to the conclusion that they came within the context of travels and journeys. In 1492, Christopher Columbus discovered the New World that is America while undertaking a journey with his crew aboard three ships: Nina, Pinta and Santa Maria. In 1497 the Portuguese explorer and navigator, Vasco da Gamma discovered the sea route to India from Europe while on an explorative journey. In 1796, the Scottish explorer, Mungo Park, discovered the Niger River during one of his journeys! We are also at home with the fiction Gulliver’s Travels and his great findings as represented in the novel by Jonathan Swift.\nToday can be called “Emmaus Sunday” giving the centrality of that town in the gospel reading (Luke 24:13-35). Two of the disciples of our Lord Jesus Christ were undertaking a journey from Jerusalem to Emmaus. Now the number two is very functional both in Jewish and Christian traditions. It stands for completeness and productivity. In any legal suite two witnesses are needed. The number two also accommodates the duality that is so evident in the world for instance light and darkness, body and soul, physical and spiritual etc. In the gospel today we will see this duality representing faith and doubt, belief and unbelief.\nNow the two disciples left Jerusalem, the city of Peace, to Emmaus which means “warm spring” after the “bizarre” news of the empty tomb. Their journey to Emmaus was not a joyful one. They left Jerusalem, the city of peace in utter confusion. There is an indication that peace eluded them. Now they were going into Emmaus the place of warm spring indicating that their faith had grown cold and they needed some warmth. They were vacillating between belief and unbelief. As they went along the way, they talked about the events surrounding the death and the resurrection of our Lord; in few words, they were preoccupied not with vain talks or gossips but with the affairs of the Lord.\nAt some point in the journey, the Lord appeared to them and inquired about the theme of their discussion. Here we come to understand that God is always interested in what we think and say; if you like what comes out of us ( Mark 7:15). God is interested in our conversations especially if they are directed at him. If they were talking about unproductive things the Lord would not have come to them. If they busied themselves with worthless issues, the Lord would not have attended to them. The psalmist would say: “Let the words of my mouth and the meditation of my heart be acceptable to you O Lord, my rock and my redeemer” (Psalm 19:14).\nThe two disciples were disappointed that our Lord, whom they described as a “stranger”, did not know what was currently making the news in the city. Cleopas, one of the two, began by giving an assessment of the situation concerning Jesus of Nazareth whom they considered to be a mighty prophet in indeed and word before God and the people who was crucified and buried and now some women in their group who went to the tomb said that his body cannot be found. They were disappointed because they believed that Jesus came to deliver his people, but now he cannot be found. From their statement one could see faith challenged by doubts and confusion. From their testimony one can clearly see that they believed in the person and mission of our Lord Jesus Christ but they failed to understand the meaning of the empty tomb.\nOur Lord Jesus Christ rebuked them for their inattention to the scriptures concerning the Christ which included his suffering as well as his glorious resurrection. The scripture class continued until they entered the village where they were going. Our Lord was about leaving them when they begged him to stay with them for the night. Now this request brought about the next significant event. There can never be any better request than that of asking the Lord to stay with us. In fact by making the request they were simply reminding our Lord what he stands for or if you like his name; EMMANUEL: God with us (Isaiah 7:14; Matt. I: 23). Put in another way, they actually said: “God with us, stay with us”. The response to this request was positive. The Lord will never fail to come to those who invite him; those who sincerely love him and wish to stay with him (John 14:23).\nDuring the stay with the Lord another important thing happened; of course staying with the Lord cannot be in vain. The Lord gradually moved from the scripture class which featured the explanation of the Word of God to the breaking of bread. It was at the point of the breaking of the bread that their eyes opened and they recognised the Lord, but he had vanished from their sight. The breaking of the bread as we see here has a direct link with the Sacrament of the Holy Eucharist. Their eyes were opened based on the understanding they had gained from the Word of God they heard and believed. Many days back, we saw what happened to Judas Iscariot at the breaking of break at the Upper Room. Instead of his eye opening it was closed by the entrance of the devil (John 13:27).\nThe true meaning of the journey to Emmaus consists in the experience of the two disciples we saw in the gospel reading. They were on a pilgrimage of faith in search of the Lord whom they believe will bring about the final liberation of the people as the messiah. In this search they found the Lord in the Word of God and in the breaking of bread. On the journey to Emmaus there was a translation from darkness to light, from confusion to clarity, from disquiet to peace, from lack of understanding to deeper understanding! Emmaus has to do with a transforming encounter with Jesus Christ that changes us from what we used to be into what God has designed for us. On the way to Emmaus we are given a direct access to Jesus Christ who comes to us to enlighten our minds. On the way to Emmaus we understand that the empty tomb is not a negative return but a highly positive and rewarding event.\nToday we have our own Emmaus journey; a journey with transforming gains. In this journey we look forward to an encounter with Jesus Christ that will redirect our hearts and minds. An encounter that will fill us with the Word of God which will in turn make us to desire to stay with the Lord. An encounter that will open our eyes and to see the Lord as he really as we partake in the breaking of bread.\nMay the Emmaus journey bring about our own transforming encounter with our Lord Jesus Christ as he meets us at our points of need.\nHave a blissful “Emmaus” Sunday.", "label": "No"} {"text": "Definition of the law of diminishing returns in English:\nUsed to refer to a point at which the level of profits or benefits gained is less than the amount of money or energy invested.\n- The basis for the argument is the law of diminishing returns: As increasing amounts of a variable input are added, the returns per unit become less and less.\n- The quest for perfect information demands the highest investment of time and money and ignores the law of diminishing returns.\n- However, because of the law of diminishing returns, the way we've spent money on politics will change.\nDefinition of the law of diminishing returns in:\n- US English dictionary\nWhat do you find interesting about this word or phrase?\nComments that don't adhere to our Community Guidelines may be moderated or removed.", "label": "No"} {"text": "Guru Nanak was the founder of the Sikh religion. He was the first of the ten Sikh religious gurus. Guru Nanak was born on 15th April 1469 at Rai-Bhoi-di Talwandi in Shekhupura district (Pakistan) now known as Nanakana Sahib. The Gurdwara representing the home of Baba Kalu (Guru Nanak’s Father) and Mata Tripta (Guru Nanak’s Mother) is called Gurdwara Janam Asthan. It is situated at Rai-Bhoi-di-Talwandi in district of Shekhupura, now Nanakana Sahib in Pakistan.\nAt the early age of five years, Guru Nanak became interested in spirituality. He was an astonishing child with coherent thinking from his early days. He was married in the year 1487 and was blessed with two sons but he could not connect himself to domestic life and left home in search of the truth.\nAfter attaining enlightenment, Guru Nanak traveled extensively accompanied by Mardana and preached the Sikh faith and spent the rest of his life teaching, writing and traveling around the world to spread Sikhism. His first statement after his prophetic communion with God was “There is no Hindu, nor any Mussalman.”\nGuru Nanak composed poetic verses in honor of Ik, Onkar, one creator. He was a great preacher and saint. He always preached liberal social practices. Guru Granth Sahib, the holy book of Sikhs contains the teachings of Guru Nanak. His preaching laid emphasis on oneness of God. He was against caste differences, idol worship, pseudo-religious beliefs and ritualism. He refers to God as his Enlightener and Teacher. His gospel was meant for all men. He proclaimed their equality in all respects.\nGuru Nanak’s birthday is also known as Guru Nanak Jayanti. Birthdays of all the ten religious gurus of Sikhs are called Gurpurabs. The birth anniversary of Guru Nanak falls in the month of Kartik on Kartik Poornima (the day of full moon). According to Gregorian calendar, usually this festival is celebrated every year in the month of November. This year Guru Nanak’s birthday will be celebrated on 21st November.\nOn Guru Nanak’s birthday Sikhs visit Gurudwara in Shekhupura, Pakistan from various parts of the world. This Gurudwara in Shekhupura is now renowned as Nankana Sahib. A grand fair is held at Nankana Sahib. A huge number of Sikhs come to this shrine from all over the planet to celebrate the birthday of Guru Nanak.\nThree weeks before Guru Nanak Jayanti, the ritual of Prabhat Pheri (morning procession) is followed. People participate in processions and chant shabads (hymns) and sing prayers. Two days prior to the festival Akhand Path (ceaseless recitation of the Guru Granth Sahib from beginning to end) begins. A team of Sikh men and women is involved in reading the Guru Granth Sahib. Each member of the team reads this Holy Scripture for 2-3 hours in two days. The path culminates on the Guru Nanak Jayanti. Then, Guru Granth Sahib is taken out in a procession on a float, beautifully adorned with flowers. Five people representing the original Panj Pyare (Five Beloved Ones) lead the processions carrying the Nishan Sahib (Sikh flag). Processions are followed by musicians, singers and martial arts demonstrating teams (especially Nihangs, the Sikh warriors). The main day gets a start early morning around 4 or 5 am with hymns followed by recitation of poems in Guru's praise and lectures on Sikhism. When praise and worship is completed, Karah Prasad (a sweet-tasting food made from semolina or wheat flour, sugar and ghee) is blessed and served. Fireworks may also be a part of the celebrations.\nGolden Temple in Amritsar is the main attraction on this day. It is among the renowned holy places of Sikhs on the earth. People who reside in such areas where there is no Gurudwara in the proximity; organize Kirtans, Paths, Ardas and Langars at their homes. Guru Nanak’s birthday is celebrated by the Sikh community throughout the world with gaiety and gusto. It is amongst the most significant festivals of the Sikhs. For the followers of Guru Nanak, his birthday is a time to dedicate themselves once again for humanitarian pursuit.\nAs a kid, he loved to play war games with the other kids where he used to lead mock battles. He had many followers and admirers, and this list also included a Brahmin named Pandit Shiv Dutt. One of the interesting incidents of his childhood says that once, Patna’s Raja Fateh Chand and his Rani, who were a childless couple went o Pandit Shiv Dutt and asked for his blessings so that they can have a child. The Pandit suggested them that if an innocent kid like Govind Singh prayed to God, their wish would get fulfilled. So, the couple visited their palace and asked the kid to pray to God to bless a son just like him. Govind Singh smiled and said that there can be no other child like him so if she wished she could call him as her son. So, from that day onwards the Rani called him “Child God” (Bala Pritam). This name is also used today to refer this divine Guru.", "label": "No"} {"text": "XSS vulnerabilities (Cross-Site Scripting vulnerabilities) are often overshadowed by their big cousin, the infamous SQL Injection. This does not make them any less effective or deadly. XSS and SQL Injection attacks are similar in the way they inject malicious code. The difference is that an SQL attack, injects code into the target database whereas an XSS attack injects code into the target browser. In an XSS attack the hacker uses your website to inject code into your visitor’s browser.\nOnce a user is infected, the malicious code can do a variety of things. It can change the color scheme of the page the user is viewing. It can do more nasty things such as replacing images with pornographic content. Using the same techniques, links on the page may be re-written to point to malicious locations. Sometimes clicks can also be forced, simulating user action without his knowledge. Another popular XSS attack reads out the user’s cookie and transmits it to the hacker. This allows him to impersonate the user and hijack his session. If the user happens to be the system administrator, the hacker can take over the entire website.\nIn this video tutorial I demonstrate what an XSS attack is to show you how a hacker can use XSS vulnerabilities to hack into your website. I start the video by explaining the mechanisms of cross site scripting, and I proceed to demonstrate a number of pranks you can play on unsuspecting users. I also demonstrate how cookies can be stolen to hijack sessions and I take a peek into the vulnerable code that allows such attacks. I hope that this video will both entertaining and educational, and that by learning about XSS you can keep your own website safer.\nGet the latest content on web security\nin your inbox each week.", "label": "No"} {"text": "1. Go through 500's and 600's first semester and pull all tattered books. This is ongoing. To help with this process I have had my library paraprofessional create shelf labels so that it is easier to reshelve. In this way, we are able to clearly see where we need more resources. We have created space on every shelf so that we are able to display books and so that our library does not look so cluttered. We moved the primary \"Welcome\" non fiction books on shelves near our other non fiction and put them in Dewey order. This will help highlight these books for our primary students. I have also shown teachers many our our new books in the 500's and how beautifully they can be used to teach text features.\n2. Replace with new editions and more current copyright dates. This is ongoing. I have especially purchased new materials for our second grade animal researchers. In our 600's section we have made some progress, but we probably need to do more. These books are used a lot. We have weeded damaged and old books in the 600's which will open this area up for some newer copyrights. In the 600's the car books, pet books and cook books are the most popular. Of these three, the car books are treated the roughest! I have replaced some but they are really expensive!\n3. Increase the number of graphic novels and early chapter books. We have relabled our graphic novels and placed them in their own section. I continue to look for additional graphic novels, but there is lots more to be done in that area. We put the \"You Wouldn't Want to Be....\" books in with the Graphic Novels and their circulation is way up. Today, May 23, 2014, as I look at the shelves where our graphic novels live, they are full! The superhero books are showing lots of wear! As far as chapter books, we are in the process of creating an early chapter book section and shelving them at the end of our Easy section. I am hoping that we can get them labeled next year so that if we are looking for a title we can tell we have moved it to the Early Chapter Book section.\nGoals for Circulation:\nGrades K-3 will use book bags. My principal purchased book bags for grades K-3. This has been very successful. The students love their book bags and, other than a few getting lost, our books have traveled more safely.\nKindergarteners will take books home. Kindergarten students have been taking their books home. We have lost some.\nCirculation improvement: During the 2012-2013 school year we had 26,357 check outs, during the 2013-2014 school year we have had 32,934. This is a 24.95% increase over last year. I am confident that our renewed emphasis on letting the younger students take their books home and allowing them more books per week helped in this matter.\n2014-2015 School Year: 1. I am hoping to again purchase book bags for grades K-3. The book bags really get the students excited about library and they provide some safety for the books. 2. I plan to do more book talks and author studies. As I talk books the interest goes up. This is especially important for our chapter book readers. 3. I will continue growing our Golden Sower Book Club. This year I included the 4th graders and they were my largest group of participants. I am hoping that since they showed such great interest this year, more 5th graders will participate next year. 4. I want to understand the data better that I know I have at my fingertips. I think if I become better at understanding the reports and taking more time to analyze them, I will be able to develop better strategies to increase circulation.\nLearning Statements: This year I provided learning statements and objectives for students prior to teaching. Here are two examples.\nSkype at least one author. We did it! My 4th grade Golden Sower group skyped Caroline Starr Rose after they read her book, May B. It was a fantastic skype. The students wrote up questions in advance which I sent to her in an email. We only had a fifteen minute free skype so I wanted to be as efficient as possible. As it turned out, Caroline skyped well beyond her fifteen minutes and each student got to introduce themself to her. It was a fantastic experience!\nParticipate in the OPS's Golden Sower Competition. I chose not to. We continue to build our Golden Sower involvement. This year I invited 4th graders to join the group, along with our 5th and 6th graders. Each grade met separately and our 4th graders were SO excited to be a part of this club. Our principal purchased Golden Sower books for the club members. I chose three of the books for grade 4 and four of the books for members in grades 5 and 6. Beyond the books they are given to keep, they are encouraged to read the other Golden Sower books in our library. We are having a Golden Sower party on May 7. Rather than try to organize going to a district competition I am asking questions at the party and correct answers will go in a pot for drawings. All members read at least four books and so were able to participate in the voting process.\nCreate a more inviting library environment through more signage. I have made large signs for Easy, Fiction, and Non Fiction. We have also done more labeling so that students understand the Dewey categories and so that we have an easier time shelving.\nContinue to build excitement for reading through book clubs. I have had three groups of students involved in the Golden Sower Clubs. A group of 4th graders, a group of 5th graders and a group of 6th graders. I also had an \"All School\" read (grades 4-5) with the Golden Sower book, The Unwanteds. That was really a big boost to excite readers. Also, by extending the Golden Sower Club to include 4th grade I am hoping that this programs grows even more as these students go on to 5th and 6th grades.\nAuthors and Books: We had some great visits from authors. Grades 4, 5 and 6 all met Lisa McMann and had a wonderful time talking with Lisa and she kindly autographed all of our Unwanteds books, which were purchased for grades 4, 5, and 6. Grade 3 was visited by Loren Long and Jon Agee, who presented together as they traveled through Omaha on a publicity tour. And K-2nd graders were visited by Jodi Moore, who did an excellent job of interacting with the students as she shared her book, When a Dragon Moves In.\nEnjoying the book Wonder! And The Unwanteds!\nSkyping Caroline Star Rose\nTeach usage of databases to primary students through the use of Pebblego. These students have used Pebblego for animal and biography research. They really love this database. I have also showed this database to the teachers whose students have used this database.\nTeach database \"text features\" using Pebblego. Pebblego is a great database to teach text features. We discussed the concepts of labels and how a database is organized a bit differently, and yet is has \"chapters\" and \"labels\" and many of the same concepts as a print resource has.\nTeach a minimum of one Common Sense Media courses per grade level. Have taught one concept per grade level. Grade 6: copyright; Grade 5; Privacy rules; Grade 4: Strong passwords; Grade 3: The power of words & cyberbullying; Grade 2: Communicating online; Grade 1: Staying Safe Online; and Kindergarten: Keeping it private.\nPebblego! I absolutely love teaching using Pebblego and I love to see the teachers' reactions when I show a teacher this database who has not used it before. We use this database throughout the school, but mostly with our primary grades. Our 2nd graders use it the most as they do animal studies and biographies. In the library I use it to teach online \"text\" features. I compare the tabs to a \"table of contents\" and I point out the words in a different color and say they are like highlighted words. I point out the different symbols and what they mean. I just got done pairing Pebblego with the book Eat Like a Bear, by April Sayre and illustrated by Steve Jenkins. We learned all about grizzley bears and then we enjoyed the story. We were also able to compare fiction and non fiction in this way. We also used Pebblego when we highlighted biographies. We found a print resource on Madam C J Walker and we used Pebblego. It was effective highlighting text features of the two different types of resources.\nWorld Book Kids: I used World Book Kids with the 5th and 6th grades. We studied this resource and all of its functions. The 6th graders used it for a project when studying mythology. I consider this our \"encyclopedia\" resource.\nEarly World of Learning: I did not use this a lot this year, but I used it tons last year when I was teaching computer skills to kindergarteners. I also showed this resource to the primary teachers last year. I need to promote this more as I love this resourse and do not want to loose it!\nBrain Pop: I purchased this for our school as the teachers requested it. I used it for teaching internet skills to grades 3-6. I partnered this with the Common Sense Media lessons. Brain Pop breaks information into bite sized parts and is a great teaching tool in so many areas. Our primary teachers love Brain Pop Jr. and our 6th grade social studies teacher used it for teaching mythology and science. This is an excellent teaching tool.\nTeachingbooks.net: I started using this resource second semester and wonder why I did not start earlier! This resource provided excellent ideas and materials for books. I especially enjoyed using it for my author study of Sarah Stewart and illustrator study of David Small. I found video of interviews with these two people and I felt like we really got to know them. When we followed up with writing them letters we received the most beautiful letter back from Sarah. In fact, she sent it express so that we would receive it before school was out.\nLearn 360: I used this more last year but did not use it much this year.\nCulture Grams: I love this resource and started a project which would require using it. I then got sidetracked with other school needs and did not get back to it! Last year I did a project with both 5th and 6th grades. I love this resource but did find it hard for many of my students. They found the text to be a bit overwhelming, even the format for the younger children.\nPrint Resources: I used World Book Encyclopedias to teach our 3rd graders how to use a print version. They had a blast! It was a great way to practice abc order too.\nOmaha Public Schools does not discriminate on the basis of race, color, national origin, religion, sex, marital status, sexual orientation, disability, age, genetic information, citizenship status, or economic status in its programs, activities and employment and provides equal access to the Boy Scouts and other designated youth groups. The following individual has been designated to address inquiries regarding the non-discrimination policies: Superintendent of Schools, 3215 Cuming Street, Omaha, NE 68131 (402-557-2001).\nLas Escuelas Públicas de Omaha no discriminan basados en la raza, color, origen nacional, religión, sexo, estado civil, orientación sexual, discapacidad , edad, información genética, estado de ciudadanía, o estado económico, en sus programas, actividades y empleo, y provee acceso equitativo a los “Boy Scouts” y a otros grupos juveniles designados. La siguiente persona ha sido designada para atender estas inquietudes referentes a las pólizas de no discriminación: El Superintendente de las Escuelas, 3215 Cuming Street, Omaha, NE 68131 (402-557-2001).", "label": "No"} {"text": "Examples of apa style citations\nApa (american psychological association) style is most commonly used to cite sources within the social sciences this resource, revised according to the 6th edition. Apa style citation example in text by chelsea lee all apa style in-text citations have two parts: the author and the date there are many ways to cite a direct. Book – a written work or composition that has been published – typically printed on pages bound together book citations in apa contain the author name.\nOverview of apa the american in-text and reference page citations apa documentation style includes an in-text and here is an example of a signal phrase. Apa format guide to help you create your apa citations includes examples of in-text and reference list citations and apa paper format guidelines. Apa style examples questions e-mail: [email protected] page 1 of 8 library handout apa citation style examples print sources electronic sources in-text citations. 16042012 this instructional video is designed for graduate students who are required to use apa formattting for research papers examples for reference entries and. Owl website's resource on apa-style citations, when your this resource, revised according below are examples of 6th edition apa citations that are most.\nThis guide provides basic information on how to cite sources and examples for formatting citations in citing your sources: apa apa style does not require. The apa system provides in-text parenthetical citations for quotations, paraphrases, summaries, and other specific information from a source apa style makes. 8+ apa format examples the style guide stands as a benchmark for academic documents such as books and journal articles citations in apa format example.\nExample of an apa-style manuscript for research methods in psychology an example of a table following apa an apa-style writer needs for citations. There are two types of apa citations the first type of citation in this citation style more information about the basics of apa citation examples for. Make sure to use the right apa style when you use a dictionary as a source for your dissertation.\nExample of citations listed in references section for journal articles using apa style references carson, r c, butcher, j n, & mineka, s (2000.\n- Example of a parenthetical citations research apa format example paper apa formatting and style guide example of citations in a research paper apa format.\n- Apa style guide quick reference for more detailed information and specific examples tables and figures, in-text citations, and references.\n- Apa: citations and references a formatting style for citations in apa reference pages in which every as an example, compare the citations of heart of.\n- Citation examples and examples of citations can be found here on this resource page come find chicago style citations, mla citations, and apa citations.\nCiting for manual in apa style examples this apa citation guide should format the entry as best you mla versus apa style (in-text citations and the reference. Apa style citation guide – common examples see last page of guide for further explanation of apa style this document serves as a simple guide to apa citations. Basics of apa style tutorial.", "label": "No"} {"text": "Natural Dietary Supplements\nThe dietary recall consists of listing foods and beverages (including drinking water and sometimes dietary supplements) consumed during some previous period, usually the previous day or during the 24 hours prior to the recall interview. These surveys generally collect information not only about the types and amounts of food consumed but also about the source of the foods (e.g., store-bought, home-cooked), the time of day, and place that foods are consumed. Foods and drinks are recalled from memory. The interview may be conducted in person, by telephone, or increasingly via the Internet. Food frequency questionnaire. The food frequency questionnaire (FFQ), sometimes referred to as a list-based diet history, consists of a listing of individual foods or food groups. For each item on the food list, the respondent is asked to estimate the number of times the food is usually consumed per day, week, month, or year. The number or types of food items may vary, as well as...\nP5 7 (so named because it was the 57th chemical tested) and at one time planned to market a diet drug that would compete against currently available concoctions that rely on the troubled combination of ephedra and caffeine (see, e.g. Dietary Supplements Containing Ephedrine Alkaloids, 2000 Regulations on Statements Made for Dietary Supplements, 2000). It is quite clear that such a concoction, if successfully tested and marketed, would earn massive profits ' p urchasers of diet products are often pathetically eager to obtain a more slender figure' (United States v An Article of Food . . . 'Manischewitz . . . Diet Thins', 1974). However, in July 2003 Pfizer withdrew from the project and discontinued clinical development of P5 7 (Pfizer Returns Rights, 2003). Although the absence of commercial exploitation moots the question whether P57's developers owe the San people any compensation, this sort of battle typifies the fierce conflict over biopiracy.\nDuring the last two decades, additional dietary sources of single amino acids are being obtained from the use of nutritional supplements to enhance physical performance as well as psychological effects.15 Amino acid exposures from dietary supplement use may far exceed levels that would be obtained from consumption of food. Concerns over the safety of these high exposures have been raised, and the safety of high amino acid intake has been reviewed.15,16 The latter review concluded that T here was little evidence for serious adverse effects in humans from most amino acid supplements. 15 The most toxic amino acids were methionine, cysteine, and histidine when consumed in excess.15 It is interesting that sulfur amino acids, which appear to be the most important in amino acid deficiencies, are also the most toxic when consumed in excess.\nThe cure for aflatoxins though, will not be the provision of vaccines and nutritional supplements. Instead, the medical and agricultural extension services must educate people on the consequences of neglecting mycotoxin contamination. Since my assessment also is that food system considerations make enforced regulations a strategy unlikely to succeed in the near future, the model of consumer regulation probably is the best option. People need to be educated as to the effects of not paying attention to aflatoxin and encouraged to create the economic pressure that will result in better quality and self-regulating markets. Thus, the ultimate institution for the management of aflatoxin is educated consumers.\nThe research to date on the use of enterosorption to reduce human aflatoxicosis indicates that such an effort could be easily justified. Virtually everyone living in West Africa carries biomarkers of chronic exposure to aflatoxin. Such chronic exposure interferes with both general nutrition (Gong et al., Chapter 6), micronutrition (Turner et al., 2003) and immunity (Jolly et al., Chapter 5). We also know from the studies done both on animals and humans that there are (as yet) no known risks to the use of this clay as a dietary supplement. One of the major advantages of this approach is that it is effective for the toxin in multiple foods, i.e., it is toxin-specific rather than commodity specific. At the very least this technology enables epidemiological studies that can establish the extent to which aflatoxins contribute to presently identified risks. Such knowledge is needed to identify future options, to develop research agendas, and to define intervention strategies. The use of...\nDownload Instructions for Inner Peace Formula\nFor a one time low investment of only $41.95, you can download Inner Peace Formula instantly and start right away with zero risk on your part.", "label": "No"} {"text": "Toma'aninah is tranquillity. Allah says:\n\"Those who believe and whose hearts find toma'aninah in the remembrance of Allah. Verily in the remembrance of Allah do hearts find toma'aninah.\" [Al-Qur'an 13:28]\n\"O you the one with toma'aninah! Come back to your Lord, well-pleased and well-pleasing unto Him! Enter you, then among My honored slaves, and enter My Paradise.\" [Al-Qur'an 89:27-30]\nToma'aninah is the satisfaction of the heart with circumstances without any sense of anxiety or restlessness. It was mentioned in one narration that: \"Truthfulness is a cause of toma'aninah and lying is a cause of suspicion and doubt.\" This suggests that one who hears the truth will have toma'aninah and satisfaction within his heart as a result, whereas lying causes disturbance and doubt within the heart. This meaning is also seen in the hadith which states: \"Righteousness is what the heart has toma'aninah with.\" This shows that the heart feels satisfied with truth and has no anxiety or sense of unease because of it.\nThere are two opinions regarding the meaning of remembrance of Allah in the aforementioned verse. The first opinion holds that the remembrance is of the servant to his Lord. This remembrance causes toma'aninah to settle within the heart. Should the heart become anxious or disturbed, then the servant will have no means for attaining toma'aninah except through the remembrance of Allah. The second opinion holds that the meaning of this remembrance is the Qur'an, and this is the more sound. It is His Remembrance that he revealed to His Messenger. The hearts of the believers will have toma'aninah as a result of it. For the heart will not have trust or toma'aninah except by faith and certainty. There are no means of attaining faith and certainty except through the Qur'an. The toma'aninah of the heart is due to its firm faith. The heart's anxiety and disturbance are a result of its doubts and uncertainty. The Qur'an is the means to attain certainty and firmness in faith, and to remove doubts. That is why the hearts of the believers cannot have tranquillity except through the Qur'an. It is impossible for anyone who doesn't study the Qur'an, or deeply understand it, to have a benefit from it and its guidance. The benefit from the Qur'an, will not be sound unless one's heart perceives the reflections of His Lord's Names and Attributes, in His Laws within himself and in everything around him within this universe. The same two opinions are also applied to the meaning for the remembrance of Allah, as stated in the following verse:\n\"And whosoever turns away from the remembrance of ar-Rahman, We appoint for him a shaytan to be an intimate companion to him.\" [Al-Qur'an 43:36]\nAgain, the sound opinion here is that Allah's Remembrance is that which He sent to His Messenger, i.e., His Book. Whoever turns away from this, Allah will appoint a shaytan for him, who will misguide and deter him from the straight path although the person may think that he is righteously guided. The two opinions are also prevalent with the verse: \"But whosoever turns away from My Remembrance, verily for him is a life of hardship and We shall raise him up blind on the Day of Resurrection.\" [Al-Qur'an 20:124]\nThe sound opinion is that Allah's Remembrance is His Book that He sent to His Messenger. This is why the one that turns away from it will say, \"O my Lord! Why have you raised me up blind while I had sight before?\" [Al-Qur'an 20:125] And Allah will respond by saying, \"Like this, Our ayat came unto you but you disregarded them, and so this Day you will be neglected.\" [Al-Qur'an 20:126]\nAllah deposits toma'aninah in the hearts and souls of the believers. He will then grant the joy, delight and good news of admission into Paradise to those with toma'aninah. As a result, for these people there is great happiness and a beautiful place for the final return. The verse \"O you with toma'aninah! Come back to your Lord ... \" indicates that the soul will not return to Allah unless it is characterized by toma'aninah. Then it will return to Him, be from among His honored slaves and be allowed to enter His Paradise.\nThe final product of toma'aninah is tranquillity. At that final stage the heart will have tranquillity with a sense of sound security. There is a difference between a sense of sound security and a deceitful sense of security. It is possible that the heart may have a feeling of satisfaction caused by a deceitful sense of security, but this satisfaction and peace do not endure. Besides the sound security because of the tranquillity produced by toma'aninah, there is an atmosphere of joy and attachment.\nToma'aninah is something more than tranquillity. It includes knowledge, faith and the attainment of what is known. The example of this is the toma'aninah the hearts find with the Qur'an. When hearts believe in it and attain knowledge of its guidance, it is sufficient for them. Their total loyalty is to the Qur'an. They rule their lives with it and go to it when they have a dispute.\nToma'aninah is extremely beneficial for those overwhelmed by obligations and responsibilities, especially for those who call others to Allah and struggle against Allah's enemies. These people face and bear much more than others. They are faced by many circumstances that may weaken their patience. So if Allah wishes to relieve them of the heaviness of their obligations, He will have tranquillity descend upon them and toma'aninah with His Commands and Decrees. If the servant has toma'aninah with Allah's Commands, then he knows that Allah's religion is the truth and that Allah will certainly support him and be sufficient for him and his family. If the servant has toma'aninah with Allah's Decrees then he knows that nothing will reach him except for what Allah has written for him. This servant knows that whatever Allah wishes will be and whatever Allah doesn't wish will not be. Therefore there is no reason for worries or concerns, unless there is weak faith. Nothing will happen unless it is written and if it is written, nothing can stop it. Therefore, there should be no fear or concern for those with faith. If an adversity occurs and the believer can do something, then he should do so. However, if he cannot, then he should not be annoyed or dismayed.\nToma'aninah is also beneficial for those who are subjected to trials and hardship. There is no doubt when a person is suffering and has strong faith in the reward for his patience, then his heart will be content. He will have tranquillity and toma'aninah. The adversity may become stronger against him and he may not see the reward. Seeing the reward may become so powerful that there may be a sense of joy felt from the adversity and be considered a gift. This is not surprising. Many wise persons upon seeing the results of distasteful medication may begin to like the taste of the medicine. Observing its benefit makes one not pay attention to the taste.\n(s) Al-Jumu'ah Magazine\n- Font Size\n- Reading Mode", "label": "No"} {"text": "As a paramedic you respond to a call for a \"man down.\" You arrive to find compression only CPR in progress by local police officers. The patient suddenly collapsed while walking down the street. His down time was approximately 5 minutes before police arrived. There are copious amounts of emesis in the patient's mouth.\nabout 3-5 minutes\nQuestion 1 of 3\nwhich of the following should you do first?\nQuestion 2 of 3\nThe patient is very difficult to ventilate because of his anatomy. You cannot maintain a decent seal with the bag valve mask and are not achieving chest rise with many ventilations. You have only intubated twice before. Which of the following should you consider:\nQuestion 3 of 3\nCopious amounts of emesis is present in the mouth and nasopharynx. Prior to inserting an airway device you should;\nGet an email copy of your results now, and a reminder when you need to recertify:", "label": "No"} {"text": "MOVEMENT IN SECONDARY MATH\nChristiansburg High School\nMovement is crucial to learning. We see “brain breaks” and increased recesses among elementary schools; however, what about the secondary classroom, specifically the math classroom? Often, math classrooms have historically been viewed as quiet, desk-sitting locations where students do math with paper and pencil. However, think about our “hardest-to-reach students.” These students come from a background of trauma, both emotionally and academically. These students enter secondary math classrooms often feeling defeated before the first day of classes. Therefore, movement is crucial to support our students who struggle by providing opportunities for them to release nervous energy and feel more comfortable in the classroom. This workshop was designed to encourage secondary teachers to intentionally use movement in the classroom through activities, fidget supports, and environmental modifications.\nThe “Movement in Secondary Math” Workshop was created for secondary math teachers who are interested in incorporating more movement into their classrooms. The workshop provided an introduction to movement in the classroom, an investigation into why movement is important, a discussion of how to set up movement in the classroom with supplies, and collaboration to discuss what movement can look like in each classroom, including both individual and group movement. Throughout the workshop, the presenter modeled a variety of classroom movement activities, and participants had opportunities to ask questions.\nTo begin the workshop, participants logged onto the workshop website, which contained the outline for the workshop, research, and Padlet links for collaboration. To make sure each participant had a voice and to better provide direction for the workshop, participants completed the first two sections of a K-W-L Activity, recording what they already knew about using movement in the classroom and what they wanted to learn. The comments in the “Know” section included: “movement keeps students engaged;” “stagnation is extinction;” and “helps students get out energy and focus on learning.” Participants’ comments in the “Want to Know” section included: “how do you make it happen and keep students on task;” “how to encourage high school students who prefer worksheets;” and “how to manage all the activity during teaching.”\nFollowing the K-W-L activity and discussion, the participants engaged in the first of a variety of classroom movement activities, always followed by discussions on how to best implement each activity in the classroom. The first activity was a Number Line Introduction Activity. Numbers 0-9 were placed throughout the room, and questions were asked such as number of siblings, number of cups of coffee you drink in a day, on a scale from 0-9 your love of summer break, and scale of 0-9 your love of math. Participants learned how they could use this activity in their classrooms, using random questions to learn more about their students. For example, using strategic questions, such as “number of times you’ve moved,” can help the teacher better understand a student’s background.\nFollowing the Number Line Introduction Activity, the “Why” movement section modeled another movement activity called Egg Hunt. Participants were put into small groups along with a number, and each group had to search for their corresponding number written on a plastic egg hidden somewhere in the room. Upon finding their egg, groups discovered research-based movements used in the classrooms. Each group discussed their research-based movement and then shared it with the whole group. Participants then wrote down how they use movement in each of their classrooms. To encourage participation and movement, the participants joined in a game of Musical Chairs. Participants walked around the room with their paper, bouncing to music and mingling. When the music stopped, each participant would partner up and discuss what he or she had written down. After this activity, the whole group came back together to share what they learned. The participants already had a great foundation of movement ideas in the classroom, which provided a rich foundation for the workshop.\nNext, participants transitioned into “How” to set up movement in the classroom. Upon entering the workshop, participants had opportunities to interact with a variety of fidget supports on the tables: homemade stress balls made from pool noodles, homemade sparkle bottles, sparkle balls, sequence pillows, building blocks, and kaleidoscopes. On the floors, participants could stand on balance boards for movement or place their feet on the balance boards while sitting. During the “How” to support movement section, they learned more about these individual fidgets and the classroom expectations for using them. The Padlet for this section was open to all participants, so participants could add their own sections, such as “stamps and stickers” and “cartoon band aids” that have worked for them in their classrooms.\nTo break up the sections in this session, a brain breaks of “Would You Rather” allowed the participants to move from wall to wall answering their “would you rather” question. Questions were both general (Would you rather teach the same math class all day or different preps?) and math-specific (Would you rather solve systems of equations with substitution or elimination?).\nFollowing the brain break, the final section of the session focused on the “What” movement in the classroom can include, individually and as a group. Participants first discussed individual movement that may include fidget supports or flexible seating. The participants used a Padlet to contribute their own suggestions, such as flex tangles, circle balance boards, and beanie babies. For group movement, the participants discussed a variety of activities that were demonstrated in the workshop, along with additional activities such as trash ball, graphing on the floor, scavenger hunts, and in-school field trips to explore math on school property. Participants collaborated further in a shared Padlet, contributing ideas such as speed dating, puzzle rooms, and using sidewalk chalk to graph.\nAt the end of the workshop, participants completed an Exit Ticket, answering three questions on a 10-point scale, with 0 being “not helpful at all” to 10 being “extremely helpful.” For the question, if the workshop was helpful in giving reasons to why to incorporate movement, the response average was 9.7. To the question, was the session helpful in providing different ways to incorporate movement, the response average was 9.8. For the question, how helpful the presenter was in guiding the conversation of movement in the classroom the response average was 9.9. The Exit Ticket included a section for comments. The comments included: they liked how activities were modeled and then explained, how the workshop affirmed their current classroom practices, how to enforce movement rules appropriately, and how to use quiet fidgets effectively in the classroom.\nThe “Movement in Secondary Math” Workshop provided participants practical tools and guidelines for implementing movement, including the research that supports the importance of movement, strategies that enhance instruction by incorporating individual and group movement, and examples of movement in secondary math classrooms in Virginia.", "label": "No"} {"text": "Nationalism definition, history, aspirations, etc, of a nation show more origin of nationalism first recorded in 1830–40 national + -ism. The recent rise of militant religious nationalism in such places as religion and nationalism in southeast asia nationalism: its meaning and history,. The role of preah vihear in hun sen’s nationalism politics, 2008 us foreign relations and southeast asian history issues in east and southeast asia.\nThe deadliest war in history, and to a lesser extent in some countries in west asia, south asia, southeast asia and conflicts can arise from the. Literature review on nationalism in southeast asia order description literature review on nationalism in southeast asia instructions i want a revised version of literature review (below)on nationalism in southeast asia using most of the resources in the following and answer these 5 points. Under which circumstances will alternative modernities arise chinese in southeast asia they did not come from the history, legal studies, nationalism,. South korea essay pest analysis for 2008 introduction kia, which means “arise from asia” in korean, started out south and southeast asia.\nChapter by reynaldo c ileto in nicholas tarling, ed, the cambridge history of southeast asia, vol ii, 1992, pp 197-248. (studies on southeast asia, new book explores history of the key issues in asian studies: (book review essay) southeast asia: southeast asia. China as the leader of the weak and small: the introductory essay by the editors did not delegates from across southeast asia attended the congress and.\nThe study of religion and society in contemporary asia: colonialism and beyond charles f keyes, laurel kendall, and helen hardacre, eds asian visions of authority: religion and the. Rise of nationalism in europe jump to navigation jump to search this native history and culture were rediscovered and appropriated for the national struggle. Course of human history great variety of sects did arise in this way and southeast asia traditional of indian nationalism oxford univ. Chapter 19 nationalism in asia, africa, and latin america571 history nationalism chapter 19 nationalism in asia, africa, and latin america india 1930, world.\nWhat were the main sources of post-communist georgian nationalism and what impact did should the need arise history, legal studies, nationalism,. Of the east african city states indicate that southeast asia was also part of the east african city state the history of african cities south of. Eight clouds arise nationalism is not perfectly analogous to european nationalism in this essay, smaller nations in southeast asia view japan as a.\nNew forms of nationalism in the 20 th century this is prime apwh essay material area they thought if it fell others in southeast asia would follow. The internecine wars among capitalist states were supposed to arise southeast asia finally, the theory did war a government inspired by nationalism. Not to be confused with the history of asia the history of east asia covers the people inhabiting the is believed to have lived in east and southeast asia from 1.", "label": "No"} {"text": "I learned this week that a Trumpeter swan has about 35,000 feathers and 2.5 centimetres of down. That's how Trumpeter swans get through the winter — even the severe temperatures and heavy snowfall we have had this winter.\nWhere they spend the winter is another question, and Ontario Trumpeter Swan Restoration, an organization started in 1982 to restore the majestic birds to their former range, would like anyone who sees a Trumpeter swan to help with the answer.\nOntario Trumpeter Swan Restoration was initiated by retired Ministry of Natural Resources biologist Harry Lumsden. He began a captive breeding program that has since released 584 captive-reared swans in 54 locations around Ontario. There are now an estimated 800 to 1,000 birds in the province.\nThe Ontario Trumpeter Swan Restoration says if swans need to maintain a diet of natural wild forage. If you do feed them, provide clean, \"untreated\" dry corn — not bread.\nAnglers are asked to help in swan restoration by using lead-free tackle so swans do not ingest a lead sinker while feeding, and by retrieving any lost lures so these are not accidentally ingested by swans and other wildlife.\nJohanna Powell is a journalist who fell in love with Lake Simcoe while bouncing across her waves in a sailboat. She is the founder and publisher of Lake Simcoe Living, a magazine and website that together celebrate life on the Lake Simcoe Watershed. The Lake Simcoe Living blog delivers additional news and comment about this beautiful and exciting area.", "label": "No"} {"text": "Better understanding ADHD in children\nParents responsible for raising children with ADHD as well as adults living with this same disorder found themselves dealing with a significant shortage of ADHD treatment solutions in 2011 and 2012.\nThis wasn’t because of a decline in the production of these solutions, but instead because the diagnosis of this mental condition had risen so sharply over the last five years that it quickly outpaced the normal rate of production.\nAccording to information published by the Center for Disease Control and Prevention (CDC), almost 11% of all children between the ages of 4 and 17 have been diagnosed with ADHD – and most experts believe that number to be more than a little bit on the lower side of the actual epidemic we are dealing with today.\nImagine that for a moment.\nMedical experts, professionals in the mental health community, and researchers and scientists all believe that the current estimate of they are being 6.4 million children in the United States diagnosed with ADHD is on the lower side of the scale.\nSome suggest that the number could be as much as two or three times higher (we are talking about as many as 18 million or more children in the US alone) – and others still believe that it could be even higher still.\nTo say that we are dealing with a serious epidemic is selling the problem of ADHD in children quite short. This is one of the biggest fundamental issues that we as a society (not just here in the US, but worldwide) need to address as quickly and as effectively as humanly possible.\nOur children (and their children) truly are the future, and we need to make sure that they are as best prepared to deal with the significant and rapidly changing challenges that they will face in the years to come – especially when they leave our guidance and protection.\nBetter understanding ADHD and how it impacts their lives will go a long way towards making sure that they are ready to meet and overcome all challenges moving forward.\nHere is a bit of inside information you’ll need to be aware of as a parent of ADHD children.\nWhat is ADHD in children?\nAttention Deficit Hyperactivity Disorder (ADHD) is one of the most difficult mental disorders to describe and to diagnose properly, mostly because it presents itself as such a unique set of symptoms in each child or adult that has to live with it.\nDoctors, scientists, researchers, and mental disorder professionals alike understand very little about ADHD, why it presents itself, and how to effectively treat it across the board – though we understand much more about this condition today than we did even just 15 years ago or so.\nClassified as a mental disorder that “confuses and fogs the brain” in a variety of different situations and circumstances, ADHD presents itself as a challenge to children that are trying to learn, develop, and focus by constantly and consistently distracting them almost around-the-clock.\nDifferent from ADD in that the hyperactivity presents itself in a variety of different ways (an inability to sit still, twitches and ticks, etc.), ADHD is a bit easier to diagnose because of the physical symptoms that are usually quite noticeable – but that doesn’t make it effortless to diagnose by any stretch of the imagination.\nIn fact, there are a significant amount of people out there that believe ADHD and ADD are nothing more than “invented” disorders – phony medical conditions pushed by the medical community to sell pharmaceutical solutions and pills for a condition that doesn’t exist in the first place.\nNow, obviously, the fact that ADD and ADHD are so difficult to properly diagnose makes it quite a bit of a challenge to persuade those people that this is in fact a real and serious epidemic that we are dealing with – but scientists and doctors alike almost universally agree that there is a very real problem here that needs to be addressed.\nWhat causes ADHD in children?\nAs mentioned above, researchers are still unsure about exactly what causes ADHD in the first place, which is a large part of why it is so difficult to effectively treat and cure this condition.\nMany researchers now believe that there is a strong genetic basis for the issue at hand (a hereditary condition that either causes ADD/ADHD or at least contributes directly to it presenting itself), while others still believe that it is more of a sociological and cultural issue stemming from the constant bombardment that children are dealing with from every avenue around-the-clock in our modern world.\nHonestly, the real cause of ADHD in children is probably somewhere in the middle of those two root issues, a bit of a hybrid between both of them that combined together to create a perfect storm of conditions that produce this mental disorder.\nResearchers at Michigan State University are working around-the-clock to better understand the issue at hand, and they certainly aren’t the only ones that are putting in the hours and the time to figure out exactly why ADD and ADHD has become so prevalent in our modern world. More research is certainly necessary (and ongoing), but it shouldn’t be too terribly long until we have a better grasp on why these conditions exist in the first place.\nHopefully that will naturally lead us to better understand how to treat, manage, and effectively eliminate the problem altogether.\nFor now, though, it’s important that you understand that there are any different number of things that could have created in ADD/ADHD condition in your children (or for yourself), and that there is little you could have done to prevent the situation from happening in the first place.\nOur society is moving at a fast and almost frenetic pace, with all kinds of media and technology forcing our systems to overload on a day to day basis. That isn’t going to change anytime soon, and in fact it should only become worse moving forward.\nAnd if ADD and ADHD are linked solely to genetic conditions, there isn’t anything you could have done to prevent the condition from presenting itself in your child (or for you), either.\nThankfully, there are a handful of things that you’ll be able to do to manage, mitigate, and all but effectively eliminate ADD/ADHD going forward.\nBut that all starts with a proper diagnosis.\nHow can I determine whether or not my child has ADHD?\nThe only way to determine whether or not your child has ADHD is to take advantage of the different testing protocols that are made available today.\nOne of the most important components of this diagnostic process is speaking with psychologists that understand the condition, understand what to look for as far as symptoms are concerned, and understand that this is an underlying issue that can permeate all different areas of an individual’s life.\nUsually it requires a number of sessions with a professional psychologist to reach a definitive diagnosis, though this should be able to take place after four or five sessions maximum.\nBut a diagnosis from a psychologist isn’t the only testing that you’re going to want to move your child through if you want to reach a definitive conclusion.\nNo, you’re also going to want to push your child through standardized testing designed to elicit whether or not a child is struggling with ADD or ADHD. Some researchers are a little bit suspect about whether or not these standardized tests are effective as they claim to be, but so far they are one of our best testing protocols that have shown the most promise in achieving a successful diagnosis (when used in conjunction with other methods, of course).\nWhat kind of treatment options are there for children diagnosed with ADHD?\nThere are a variety of different treatment protocols available for those that have children dealing with ADD or ADHD, including (but certainly not limited to):\n• Prescription drugs like Ritalin designed to “calm the mind” and eliminate the hyperactivity\n• Therapy sessions with a psychologist or psychiatrist designed to teach them how to channel their ADD/ADHD\n• Aggressive meditation training aimed at a more holistic approach to treating ADD/ADHD\n… And that’s just the tip of the iceberg!\nMore and more people are moving away from chemical intervention (like Ritalin), largely in part because of the negative side effects associated with long-term use of these prescription drugs. Many children have responded very favorably to therapy and meditation training aimed at helping them channel they are condition and use it as a force for good, giving them tools that they can then use as adults to better manage their lives and lead happy, healthy, and well-adjusted lifestyles going forward.\nWhat do I do next?\nThe first piece in the puzzle of helping your children with ADHD is to reach out to professionals in your local area for a proper diagnosis.\nOnce you receive a comprehensive diagnosis and are certain that you’re dealing with this kind of condition, then and only then is it time to begin discussing proper treatment solutions. Keep your mind open about the options available to you, and don’t be afraid to ask any and all questions you have before going forward with one of these solutions.", "label": "No"} {"text": "Today, Monday 21st March we began our day with thoughts about Palm Sunday. We talked about what we saw when we went to Church on Sunday. We sang our song Hosanna, Hosanna.\nYou can sing it at home too if you follow this link.\nThen we listened to a story about Jesus’ experiences during Palm Sunday. We enjoyed it!\nThen we coloured in some palm leaves in any colour of green we liked. Next we cut around the leaf. Finally we cut between the palm fronds on the dark linews. We were practising our colouring and cutting skills.\nWe talked about what we were doing and some of us sang as we worked. We moved the crayons smoothly over the leaf and pressed quite hard to make the colour bright. When we had finished we got a pair of scissors and began to cut around the outside of the leaf. We worked carefully holding the scissors as Mrs de Koning had taught us.\nWe helped each other and talked about how well others were doing. We put all our scraps of paper into the rubbish bin and also put the scissors away in the holder.\nAfter we finished we laid it onto our display sheet and read the words together. We will us the palm leaves later in the day, before we staple them onto the white sheet and hang it in our classroom.", "label": "No"} {"text": "Fungi have different roles in nature - the most common are\n- Parasites (which feed off of, or sometimes kill the living organisms they grow on)\n- Saprobes (which break down dead wood, soil, or other material)\n- Mutualists (which form mycorrhizae, mutually beneficial relationships with oak or pine trees)\nIf you have a mushroom or other fungus, this key will show you what role it plays in its environment.\nGrasslands and wetlands mostly contain saprobes\n, while healthy oak or pine woodlands usually\nhave a mixture of all three types.\nDisclaimer : this is a nontechnical key for anyone's use. It does not try to cover every single type of fungus, but will have an accuracy\nrate of about 95% (at least in the central United States).\n|What is the mushroom or fungus growing on?|\nThis includes logs, tree trunks,\nbranches, sticks, etc.\nAn extremely rotted log can also\nfunction like soil in this situation.\nLeaves, other mushrooms, etc.", "label": "No"} {"text": "What is arthritis?\nArthritis and other rheumatic diseases are common conditions that cause pain, swelling, and limited movement. They affect joints and connective tissues around the body. Millions of people in the U.S. have some form of arthritis.\nArthritis means inflammation of a joint. A joint is where two or more bones meet. There are more than 100 different arthritis diseases. Rheumatic diseases include any condition that causes pain, stiffness, and swelling in joints, muscles, tendons, ligaments, or bones. Arthritis is usually chronic, which means that it is ongoing.\nArthritis and other rheumatic diseases are more common in women than men. They are also often associated with old age. This is because the most common form of arthritis, osteoarthritis, occurs more often in older adults. However, arthritis and other rheumatic diseases affect people of all ages.\nThe three most common forms of arthritis are:\n- Osteoarthritis. This is the most common type of arthritis. It is a chronic disease of the joints, especially the weight-bearing joints of the knee, hip, and spine. Osteoarthritis destroys cartilage and narrows the joint space. It can also cause bone overgrowth, bone spurs, and reduced function. It occurs in most people as they age. It may also occur in young people as a result of injury or overuse.\n- Fibromyalgia. This is a disease that causes chronic, widespread pain in muscles and soft tissues around the body.\n- Rheumatoid arthritis. This is an inflammatory disease of the lining of the joint (synovium). The inflammation may affect all of the joints.\nOther forms of arthritis or related disorders include:\n- Gout. This condition causes urate crystals to build up in small joints, such as the big toe. It causes pain and inflammation.\n- Systemic lupus erythematosus (lupus). Lupus is a chronic autoimmune disorder that causes episodes of inflammation and damage in joints, tendons, and organs.\n- Scleroderma. This is an autoimmune disease that causes thickening and hardening of the skin and other connective tissue in the body.\n- Ankylosing spondylitis. This disease causes the bones of the spine to grow together.\n- Juvenile idiopathic arthritis (JIA) or juvenile rheumatoid arthritis (JRA). This is a form of arthritis in children that causes inflammation and stiffness of joints. Children often outgrow JRA. But it can affect bone development in a growing child.\nWhat causes arthritis?\nThe cause of arthritis depends on the type of arthritis. Osteoarthritis is caused by the wear and tear of the joint over time or because of overuse. Rheumatoid arthritis, lupus, and scleroderma are caused by the body’s immune system attacking the body’s own tissues. Gout is caused by the buildup of crystals in the joints. Arthritis can be linked to genes. People with genetic marker HLA-B27 have a higher risk of ankylosing spondylitis. Many other forms of arthritis are idiopathic. This means that the cause is not known.\nWho is at risk for arthritis?\nSome risk factors for arthritis that can’t be avoided or changed include:\n- Age. The older you are, the more likely you are to develop arthritis.\n- Gender. Women are more likely to have arthritis than men.\n- Heredity. Some types of arthritis are associated with specific genes.\nRisk factors that may be avoided or changed include:\n- Weight. Being overweight or obese can damage the knee joints. This can make them more likely to develop osteoarthritis.\n- Injury. A joint that has been damaged by an injury is more likely to develop arthritis at some point.\n- Infection. Reactive arthritis can affect joints after an infection.\n- Occupation. Work that involves repetitive bending or squatting can lead to knee arthritis.\nWhat are the symptoms of arthritis?\nSymptoms can occur a bit differently in each person. The most common symptoms include:\n- Pain in one or more joints that doesn’t go away, or comes back\n- Warmth and redness in one or more joints\n- Swelling in one or more joints\n- Stiffness in one or more joints\n- Trouble moving one or more joints in a normal way\nThe symptoms of arthritis can be like other health conditions. Make sure to see your health care provider for a diagnosis.\nHow is arthritis diagnosed?\nThe process starts with a medical history and a physical exam. Tests may also be done. These include blood tests such as:\n- Antinuclear antibody (ANA) test, to check the levels of antibodies in the blood\n- Complete blood count, to see if white blood cell, red blood cell, and platelet levels are normal\n- Creatinine, to check for kidney disease\n- Sedimentation rate, to detect inflammation\n- Hematocrit, to measure the number of red blood cells\n- Rheumatoid factor test, to see if rheumatoid factor is present in the blood\n- White blood cell count, to determine the level of white blood cells in the blood\n- Uric acid, to help diagnosis gout\nOther tests may be done, such as:\n- Joint aspiration (arthrocentesis). A small sample of the synovial fluid is taken from a joint. It’s tested to see if crystals, bacteria, or viruses are present.\n- X-rays or other imaging tests. These are done look at the extent of damage to a joint.\n- Urine test. This is done to check for protein and various kinds of blood cells.\n- HLA tissue typing. This is done to look for genetic markers of ankylosing spondylitis.\n- Skin biopsy. Tiny pieces of tissue are taken to check under a microscope. This helps to diagnose a type of arthritis that involves the skin, such as lupus or psoriatic arthritis.\n- Muscle biopsy. Tiny pieces of tissue are taken to check under a microscope. This helps to diagnose conditions that affect muscles. These include polymyositis or vasculitis.\nHow is arthritis treated?\nTreatment will depend on your symptoms, your age, and your general health. It will also depend on how what type of arthritis you have, and how severe the condition is. A treatment plan is tailored to each person with his or her health care provider.\nThere is no cure for arthritis. The goal of treatment is often to limit pain and inflammation, and help ensure joint function. Treatment plans often use both short-term and long-term methods.\nShort-term treatments include:\n- Medications. Short-term relief for pain and inflammation may include pain relievers such as acetaminophen, aspirin, ibuprofen, or other nonsteroidal anti-inflammatory medications.\n- Heat and cold. Pain may be eased by using moist heat (warm bath or shower) or dry heat (heating pad) on the joint. Pain and swelling may be eased with cold (ice pack wrapped in a towel) on the joint.\n- Joint immobilization. The use of a splint or brace can help a joint rest and protect it from further injury.\n- Massage. The light massage of painful muscles may increase blood flow and bring warmth to the muscle.\n- Transcutaneous electrical nerve stimulation (TENS). Pain may be reduced with the use of a TENS device. The device sends mild, electrical pulses to nerve endings in the painful area. This blocks pain signals to the brain and changes pain perception.\n- Acupuncture. This is the use of thin needles that are inserted at specific points in the body. It may stimulate the release of natural, pain-relieving chemicals made by the nervous system. The procedure is done by a licensed health care provider.\nLong-term treatments include:\n- Disease-modifying antirheumatic drugs (DMARDs). These prescription medications may slow down the disease and treat any immune system problems linked to the disease. Examples of these medications include methotrexate, hydroxychloroquine, sulfasalazine, and chlorambucil.\n- Corticosteroids. Corticosteroids reduce inflammation and swelling. These medications, such as prednisone, can be taken orally or as an injection.\n- Hyaluronic acid therapy. This is a joint fluid that appears to break down in people with osteoarthritis. It can be injected into a joint, such as the knee, to help relieve symptoms.\n- Surgery. There are many types of surgery, depending on which joints are affected. Surgery options may include arthroscopy, fusion, or joint replacement. Full recovery after surgery takes up to 6 months. A rehabilitation program after surgery is an important part of the treatment.\nArthritis treatment can include a team of health care providers, such as:\n- Orthopedist/orthopedic surgeon\n- Primary care doctor (family medicine or internal medicine)\n- Rehabilitation nurse\n- Physical therapist\n- Occupational therapist\n- Social worker\n- Recreational therapist\n- Vocational therapist\nWhat are the complications of arthritis?\nBecause arthritis causes joints to degenerate over time, it can cause disability. It can cause pain and movement problems that cause a person to be less able to carry out normal daily activities and tasks.\nLiving with arthritis\nAlthough there is no cure for arthritis, it is important to help keep joints functioning by reducing pain and inflammation. Work on a treatment plan with your health care provider that includes medication and therapy. Work on lifestyle changes that can improve your quality of life. Lifestyle changes include:\n- Weight loss. Extra weight puts more stress on weight-bearing joints, such as the hips and knees.\n- Exercise. Some exercises may help reduce joint pain and stiffness. These include swimming, walking, low-impact aerobic exercise, and range-of-motion exercises. Stretching exercises may also help keep the joints flexible.\n- Activity and rest. To reduce stress on your joints, alternate between activity and rest. This can help protect your joints and lessen your symptoms.\n- Use of assistive devices. Canes, crutches, and walkers can help to keep stress off certain joints and to improve balance.\n- Use of adaptive equipment. Reachers and grabbers allow people to extend their reach and reduce straining. Dressing aids help people get dressed more easily.\n- Managing use of medications. Long-term use of some anti-inflammatory medications can lead to stomach bleeding. Work with your health care provider to develop a plan to reduce this risk.\nWhen should I call my health care provider?\nIf your symptoms get worse or you have new symptoms, let your health care provider know.\nKey points about arthritis\n- Arthritis and other rheumatic diseases cause pain, swelling, and limited movement in joints and connective tissues in the body.\n- Arthritis and other rheumatic diseases affect people of all ages. They are more common in women than men.\n- Symptoms may include pain, stiffness, swelling, warmth, or redness in one or more joints.\n- There is no cure for arthritis. The goal of treatment is to limit pain and inflammation and preserve joint function.\n- Treatment options include medications, weight reduction, exercise, and surgery.\nTips to help you get the most from a visit to your health care provider:\n- Before your visit, write down questions you want answered.\n- Bring someone with you to help you ask questions and remember what your provider tells you.\n- At the visit, write down the names of new medicines, treatments, or tests, and any new instructions your provider gives you.\n- If you have a follow-up appointment, write down the date, time, and purpose for that visit.\n- Know how you can contact your provider if you have questions.", "label": "No"} {"text": "Essential Fatty Acids - Omega 3 & Omega 6\nWhat are Essential Fatty Acids?\nEssential fatty acid (EFA) is an unsaturated fatty acid that is essential to human health, but cannot be produced in the body. EFAs are present in every healthy cell in the body, and are vital for the normal growth and functioning of the cells, muscles, nerves, and organs.\nThere are two families of Essential Fatty Acids: omega-6 and omega-3. The number following \"Omega-\" represents the position of the first double bond, counting from the terminal methyl group on the molecule.\nOmega 6 and Omega 3 essential fatty acids are best consumed in a ratio of about 3:1 - three omega 6 for one omega 3. Although we need more omega 6, we eat too much of it and not enough omega 3 fat.\nOmega-3 fatty acids\nThe Omega-3 fatty acids are alpha-linolenic acid, stearidonic acid, eicosapentaenoic acid (EPA), and docosahexaenoic acid (DHA). Alpha-linolenic acid is found mainly in flaxseed oil, canola oil, soybeans, walnuts, hemp seeds, and dark green leafy vegetables. Stearidonic acid is found in rarer types of seeds and nuts, including black currant seeds. EPA and DHA are present in cold-water fish, including salmon, trout, sardines, mackerel and cod.\nOmega-3 fatty acids are a form of polyunsaturated fats. Omega-3s are used in the formation of cell walls, making them supple and flexible, and improving circulation and oxygen uptake with proper red blood cell flexibility and function.\nOmega-3 health benefits\nHigh blood pressure\nSeveral studies have shown that eating fatty fish or taking fish oil daily will lower blood pressure. DHA may have greater benefits than EPA. Omega-3 oils also effectively prevent hypertension in cardiac patients after transplantation.\nOmega-3 fats in fish oil and fish oil supplements (EPA + DHA) can raise HDL and significantly reduce blood triglycerides.\nThe role of omega-3 fatty acids in cardiovascular health is well established. Omega-3 protect your heart in half a dozen ways, from lowering your blood pressure to cleaning your arteries. The American Heart Association recommends consumption of at least 1 g per day of the omega-3 fatty acids docosahexaenoic acid (DHA) or eicosapentaenoic acid (EPA) to reduce cardiovascular risk in people with established coronary disease, and at least 2 g per day to treat hypertriglyceridemia.\nThere is promising evidence that omega-3 fatty acids may decrease the risk of cardiac arrhythmias.\nResearch confirms, that in people with a history of heart attack, regular consumption of oily fish or fish oil supplements reduces the risk of heart attack, sudden death, and all-cause mortality.\nFish oil helps reduce symptoms of rheumatoid arthritis (RA), including joint pain and morning stiffness. Some people with RA who take fish oil may be able to lower their dose of non-steroidal anti-inflammatory drugs (NSAIDs). However, fish oil does not appear to slow progression of RA, only to treat the symptoms.\nMental health and Cognitive function\nOmega-3 fatty acids appear to be important in brain development and function. People who consume a lot of fish are less likely to suffer depression, dementia, and even attention-deficit disorder. Scientists have noted that essential fatty acids are necessary for proper brain development in children.\nOmega-3 fatty acids are showing encouraging results in treating people with bipolar disorder.\nSeveral studies have investigated the relationship between DHA and children's cognitive development and performance. Indeed, DHA consumption has been positively linked to improved verbal ability, cognition and visual performance.\nOmega-6 fatty acids\nOmega-6 fatty acids include linoleic acid, which is found in safflower, olive, almond, sunflower, hemp, soybean, walnut, pumpkin, sesame, and flaxseed oils. Gamma-linolenic acid (GLA) is found in some seeds and evening primrose oil. Arachidonic acid (AA) is present in meat and animal products.\nMost Americans consume higher quantities of omega-6 EFAs, because these are found in meat, animal products, and many cooking oils. Research has shown that too many omega-6 EFAs in the diet can lead to the imbalanced production of prostaglandins, which may contribute to health problems.\nEssential Fatty Acids Products from Botanic Chioce", "label": "No"} {"text": "As outlined in a recent post on the accessibility team blog, enhancing the Settings API An API or Application Programming Interface is a software intermediary that allows programs to interact with each other and share data in limited, clearly defined ways. is currently a high priority for the team. We have been working on this project for a couple months now, discussing goals and approach in a biweekly meeting on Mondays at 16:00 UTC. The main objectives have been to improve accessibility Accessibility (commonly shortened to a11y) refers to the design of products, devices, services, or environments for people with disabilities. The concept of accessible design ensures both “direct access” (i.e. unassisted) and “indirect access” meaning compatibility with a person’s assistive technology (for example, computer screen readers). (https://en.wikipedia.org/wiki/Accessibility) of the pages generated with the Settings API as well as making it easier to use and more flexible for developers. Over the time we have identified the following list of areas to work on:\n- The HTML HyperText Markup Language. The semantic scripting language primarily used for outputting content in web browsers. table layout that has been present for most admin (and super admin) pages should be replaced with a modern, semantically more accurate markup. As the entire table markup is created by the Settings API, we should be able to change it without major backward-compatibility concerns.\n- We’d like to investigate moving from the current two-column layout to a one-column layout, as we agreed on that it would provide a more streamlined experience and overview. Furthermore the two-column layout makes it hard if not impossible to use\nlegend) to group elements properly.\n- For common fields used in Core Core is the set of software required to run WordPress. The Core Development Team builds WordPress. and plugins, such as a simple text field, textarea, dropdown, radio or checkbox, default callbacks should be provided so that developers do not need to write every callback for such simple UI User interface components themselves. These callbacks should be flexible and accept a standardized set of arguments that can be passed to\nadd_settings_field(). Furthermore each callback should provide accessible markup out-of-the-box, so that even plugin A plugin is a piece of software containing a group of functions that can be added to a WordPress website. They can extend functionality or add new features to your WordPress websites. WordPress plugins are written in the PHP programming language and integrate seamlessly with WordPress. These can be free in the WordPress.org Plugin Directory https://wordpress.org/plugins/ or can be cost-based plugin from a third-party settings pages can be made accessible easily.\n- Eventually all settings pages that Core creates should be using the enhanced Settings API instead of rendering their markup manually. This ensures a more structured output and allows developers to modify the Core fields as well.\n- All markup we create should be generalized enough to not be specific to only the Settings API pages. Several other pages in the admin, for example the user profile or term editing pages could benefit from the improvements as well once they are polished.\nThis list may possibly be extended at some point, as there were some discussions about further developer-centric improvements, but for now we would like to focus on producing a clean and accessible markup with a better DUX being a side product of these efforts.\nPrototype for WCEU\nAfter starting development through patches on #39441, we soon realized that this project would be better off as a separate plugin. Therefore we created a GitHub repository for the project, where all development happens now. The plugin uses prefixed functions to not interfere with Core’s own Settings API, so it can safely be tested. While working on the layout, we identified the need for thorough user tests of the changes, and we set the upcoming WordCamp WordCamps are casual, locally-organized conferences covering everything related to WordPress. They're one of the places where the WordPress community comes together to teach one another what they’ve learned throughout the year and share the joy. Learn more. Europe as our target to get a first testable version of the plugin ready. While we still need more time to get to the point where we can propose it as an actual feature plugin A plugin that was created with the intention of eventually being proposed for inclusion in WordPress Core. See Features as Plugins., we would like to get feedback sooner than later to uncover eventual pain points.\nWe will be starting next week to discuss what needs to happen to get that prototype finished in time. If you’re interested, please attend the meeting, which will take place on Monday 16:00 UTC on Slack Slack is a Collaborative Group Chat Platform https://slack.com/. The WordPress community has its own Slack Channel at https://make.wordpress.org/chat/. in the #core channel, or leave a comment on this post if you cannot make it.\ncc @afercia, @rianrietveld, @joedolson, @karmatosed, @johnbillion, @sc0ttkclark", "label": "No"} {"text": "The Anarkali is a beautiful and opulent ethnic dress that symbolizes a rich and ancient history. It lives up to the splendor of its namesake, – the famed dancer at Emperor Akbar’s court who stole the heart of Prince Salim. Her beauty was so exceptional that she was given the name Anarkali which means ‘blossoming pomegranate’.\nAnarkali’s name is surrounded by mystery, romance and tragedy. Though popular, there isn’t any evidence or record to support the popular legend. The story is one of forbidden love between Prince Salim and Anarkali, and consequence of the star crossed lovers. Anarkali, a dancer in Emperor Akbar’s court wore form flattering kurtas. This was a tight fitting bodice till the waist and flared voluminously till below the knee. It was worn with churidar style pants and the stole or dupatta with it was of a sheer material.\nThe Anarkali as it came to be known, had full or half sleeves and modest necklines at that time. The materials used were silks, cotton muslins, brocades, velvets and organzas. The use of floral motifs, block printing, and kalamkari (patterns created using a pen), gold thread work around precious or semi-precious stones were made popular by the Mughal culture.\nThe dance performed in the emperor’s court in the Mughal period was known as a mujra and these dancers wore the style of churidar and fitted, flowing kurtas which became popular as the Anarkali or the Anarkali salwar suit.\nThe Hindi film industry too played a role in making this attire fashionable. The epic film Mughal-e-Azam was released in 1960 and featured the lead actress Madhubala dressed in and as Anarkali. Later on in the 1970’s and late 80’s, it continued to set a trend and never went away. It was highlighted recently by prominent actresses such as Aishwarya Rai Bachan, Kareena Kapoor, Vidya Balan and several other famous personalities.\nThe Anarkali worn today has undergone many changes keeping in mind the current fashion trends. More synthetic fabrics are mixed and matched along with a mind blowing number of patterns, embroideries, designs and embellishments.\nA simple Anarkali suit takes 2 to 3 days to be stitched and the time taken varies due to the fabric, cut, embroidery or product to be embellished. They are generally worn with a dupatta in the same fabric or with a net stole. Fabrics are readily available along with the various kinds of sequins, mirrors, beads, zari, faux pearls and much more, but it is easier to get the outfit stitched. Local tailors are experienced and have sources for procuring the required elements quickly. The cost for getting it stitched varies from Rs.800/- to Rs.1200/-. Factors like patterns and designs decide the cost as it entails more labor. Readymade Anarkali costs range from Rs.2500/- to Rs.15000/- Designer ones fall in the range of Rs. 25000/- to an upward of Rs.50000/-\nIt is an example of the ever-changing trends in Indian ethnic wear keeping in mind global fashion. In addition to the traditional silks, brocades, cottons, synthetic fabrics are being combined lately. The use of rich colors like magenta, gold, silver and dark green paired with printed borders, embroidered zardosi designs with floral backgrounds and Chinese collars are considered stylish. Anarkali for bridal wear is in a lot of demand around the globe.\nStyle and Attire\nThe types of fabrics include net, viscose, georgette, chiffon and lace. Embroideries like appliqué, Phool Patti, Bagh, Chikankari, Kashmiri kashida, Soof, Gota, Ahir, Kantha stich, Kathiawari, Kutchhi, Badla, Mirror work, patchwork and much more. The shades of color used for the Anarkali are not ordinary. Colors like salmon, ochre, teal and fuchsia are combined with regular colors to create an interesting mix.\nThe use of contrasting colors is a notable aspect of these suits. They look simple or extremely decorative due to the embroidery on neckline and sleeves. Sometimes lace or Gota work is used around the waist, neckline and even in the flares to create a striking effect. The use of heavy embellishment or embroidery on solid colors changes the look of this suit, and in contrast usage of delicate prints or patterns can turn the Anarkali fit for casual wear. The suit is a combination of the old and new, echoes of Mughal culture fused with international fashion trends.\nPresent Day Scenario\nRight from wedding celebrations, parties, festive occasions and social soirees this elegant dressing is loved by women of all ages because of its form and rich look. The suit is being worn by film personalities, society divas and for public appearances and is available at branded outlets of Indian wear and designer boutiques.\nThe latest trends combine bustier style bodices, ornamental tie ups in front and bodices with patchwork. It feature the use of a fabric such as chiffon or net stitched over a brocade or crepe suit. Contrasting the churidar with the Anarkali is trendy. High necklines and low backs have become chic.\nThe Anarkali can be worn with heavy or light accessories depending on the kind of occasion and style the suit is in. A heavily embellished suit is a guaranteed head turner and requires light jewelry.\nThis suit requires being dry cleaned every time and stored away from sunlight. Indirect ironing is advised. The Anarkali in cottons, chiffon, nets and in a combination of light fabrics can be worn in the summer. Brocades and silks are suitable for colder temperatures.", "label": "No"} {"text": "When it became known to Noah that a catastrophic weather event was to destroy every living thing on Earth he did as instructed and embarked on the ultimate adaptation plan by building an ark for himself, his family and enough animals to ensure the survival of every species.\nHe accepted the word of a higher authority, whom he realised would have greater knowledge than him regarding such matters. He did not demand to see irrefutable evidence and he did not insist on 100% certainty regarding the event, its severity, time and place before acting. Although he was not told of the exact date of the flood, he set about his plans immediately and didn’t wait until the rains began before being convinced that now was the time to act. From the date he was told about the forthcoming doom, until the rains fell, 120 years passed. Year after year after year Noah prepared for a catastrophe which did not yet materialise but he knew, despite the persistent mocking of his neighbours, that complacency was dangerous. His preparations took up a considerable proportion of his time, leaving him with fewer resources to allocate to everyday business and flock-tending, and undoubtedly this would have been detrimental to his family fortunes. Fortunately he, Mrs Noah, Ham, Shem and Japheh (plus their wives, kids etc) had the foresight to realise that survival takes precedence over the amassing of wealth.\nThere are so many lessons to be learnt from this week’s Torah portion.", "label": "No"} {"text": "Dr. Robert Grimm\nEdison Welding Institute (EWI)\nSummary: The following article is a part of the National Board Technical Series. This article was originally published in the Summer 2001 National Board BULLETIN. (4 printed pages)\nNormally when we think of very hot or even boiling liquids and pressure vessels, we think of metallic containers. The use of plastics for these applications is not the first thing that comes to mind. However, plastic pressure vessels surround us and are so common we may not notice them. Some of them operate at elevated pressures and temperatures. A few examples include:\nAutomotive radiators and hoses. These operate for extended periods of time at temperatures above 100°C (212°F) and at least 20 psi pressure. Usually the hoses are of a rubber or elastomer composition (composite) with reinforcing fibers of glass or highly heat-resistant polymers. Headers in radiators can be molded from glass-reinforced nylon.\nPlastic plumbing in houses. While domestic plumbing is mostly polyvinyl chloride (PVC) and is seldom operated at temperatures above boiling, it does operate with hot water (60°C, 140°F) and pressure ratings around 570 kPa (85 psi). Chlorinated PVC (CPVC) has even better heat resistance than PVC (almost 90°C, 190°F at 330 kPa or 50 psi) and is another common plumbing material.\nPlastic beverage bottles. While this application is not at high temperature, the pressure load on the wall is substantial when it has freshly carbonated beverage in it. This is all the more substantial when one realizes that the walls are very thin and the contents of this pressure vessel are clearly visible.\nComposite pressure tanks. These are built to hold natural gas for transportation applications. These withstand high pressures, corrosive environments, and are resistant to impact.\nRocket motors. While they are not everyday applications, rocket motors, such as the ones that push the shuttle into orbit, are made from polymers and continuous reinforcing fibers wound into vessels that must withstand very high pressures.\nPolymers (plastics) have advantages over metals in the construction of vessels. They can often be made easily by taking a gob of molten plastic and blowing it up like a balloon into a molded cavity. Beverage bottles are made this way, spewing out of the bottle-making machines in what almost appears to be a continuous stream. Polymeric structures are usually lighter in weight than metal ones. When blow-molded, the atomic chains of the polymer become biaxially oriented and much stronger than the parent polymer. Very importantly, they do not corrode as readily as metals.\nFor the application to boilers, there are some properties of polymers that make them different and, perhaps, less desirable than metals. Polymers are not as strong under tensile loads and they do not resist high temperatures as well as metals do. Moreover, polymers do not conduct heat well, and most do not conduct electricity at all. The lack of thermal conduction can be overcome by adding thermally conductive materials to the polymer formulation.\nWhile further descriptions of polymer behavior follow, it is useful to understand at least on a basic level why polymers and metals are different and how these differences affect properties. Polymers are made from chains of atoms instead of atoms. In understanding the chain nature of polymers, it is important to note that if a carbon atom was about 40 cm in diameter (12 inches) instead of 10 -8 cm, a polyethylene chain, stretched straight, would be about 3 km (2 miles) in length. For something like ultrahigh molecular weight polyethylene, the length could be 30 km (20 miles). That is why molten polymers form a viscous gum while molten metals are runny liquids.\nThere are two broad classifications of polymers as shown in Figure 1.\nIn thermosetting polymers, the individual chains are often short, but they are all interconnected through strong chemical bonds. Conceptually, they can be considered as three-dimensional fishnets. These thermosetting polymers are formed in heated molds and, once formed, they will not melt again. When heated excessively, they can become “cheesy” and then undergo a slow, smoky decomposition. Some examples (and long-term heat-resistance temperatures) include: epoxy (90° to 180°C, or about 190° to 350°F),2 phenolic (150° to 260°C, or 300° to 500°F),3 and rubber (100°C, or 212°F and higher). As the number of interlinks increases and/or the distance between them decreases, the bulk polymer increases in thermal resistance but becomes more brittle.\nWhen the number of links is low or the distance between them is large, they can be heated and stretched as they cool. On reheating, they shrink back to the unstretched state (shrink-wrap).\nThermoplastic polymers constitute the second class. These can be likened to a mass of spaghetti noodles since the chains are not irreversibly connected to other chains. Heat is normally used to reverse chain interactions. Thermoplastics form glasses at lower temperatures in which the chains are not able to move very much. Above a temperature called the glass transition temperature (Tg), segments of chains can start to move in sort of a “crankshaft” motion.4 If thermoplastic polymers do not have crystalline regions, increasing temperatures will increase this motion until the mass becomes fluid enough to mold and shape. On cooling, viscosity increases until the Tg, when it again forms a glass. Typical polymers in this category (amorphous thermoplastic) include polystyrene, acrylic, polycarbonate and many others. They are often transparent.\nSome thermoplastic polymers form regions where the chains fold into highly ordered crystals. These thermoplastics are called semicrystalline because the level of crystallinity varies widely, depending on the polymer and how it is processed (it commonly varies even within the thickness of a molded part, depending on the cooling rate). Crystals behave as thermally reversible crosslinks, and they have definite melting points. Semicrystalline thermoplastics tend to retain some physical properties until the melting point where the mass becomes, at once, fluid enough to mold and shape. Examples of semicrystalline thermoplastics include: polyethylene, nylon, polypropylene and many others. Figure 2 shows different forms of polystyrene and how the tensile modulus varies with temperature.\nPolymers exhibit typical stress strain curves. An exception is for elastomers which exhibit reversible stress strain curves much like a spring. In general, physical properties of polymers can be modeled (Voight-Kelvin) as a combination of a spring and a dashpot. As the chains flow under stress, as Figure 3 shows, they behave like the dashpot and exhibit irreversible changes.\nUnder a constant stress, thermoplastic polymers can undergo creep. The behavior shown in Figure 4 illustrates creep behavior for one polymer as a function of the applied stress. Creep behavior is not only a function of applied stress, it is also a function of temperature. At elevated temperatures, strain occurs more rapidly. Edison Welding Institute and The Ohio State University explored this behavior several years ago in several reports on creep crack growth and developed quantitative relationships for polyethylene.5 The expected lifetime of a pressure vessel as a function of temperature, pressure, and wall thickness (which may have been reduced due to damage) were interrelated.\nGlass reinforcing fibers are incorporated into polymers at various levels to increase tensile properties and reduce the tendency to creep as well. Levels up to 30% glass fiber (approximately 1 mm long) are common.\nAs with thermosetting polymers, thermoplastics have a wide range of physical properties just because of differences in molecular structure. Polyethylene (PE) comes in a wide range of grades including LDPE (low density), LLDPE (linear low density), MDPE (medium density), HDPE (high density), and UHMWPE (ultrahigh molecular weight). A few grades of polyethylene have been standardized and one, PE3408, is used for natural gas pipelines. According to ASTM 2837, it has a melting point of 124°C (250°F), and at 24°C (76°F), it must withstand a hydrostatic load of 10.7 Mpa (1.53 ksi) after 100,000 hours.6 Its design stress is 5.6 Mpa (800 psi).\nPolyethylene is one of the lower-melting thermoplastics. The table lists a few thermoplastics and some of their thermal properties.\n||Glass transition temperature 220°C (428°F).\nAt 148°C (300°F) maximum working stress of 13 Mpa (1900 psi).\n|Liquid crystal polymers\nWhile polymers have many attractive features, they also show some sensitivity. While metals can rust, polymers can undergo oxidation (they can be stabilized depending on the formulation) and embrittlement. Sunlight and other forms of radiation can also cause cross-linking and embrittlement. To counter this challenge, many polymers that are exposed to sunlight are colored black. The black absorbs the radiation at the surface and the underlying material is protected. Over long periods of time, microbes can attack some polymers and, like metals, they can be damaged by exposure to corrosive chemicals and environmental agents.7\nAnother feature of polymers is that they are permeable to gases. As Figure 5 shows, there are gaps where the chains overlap and small molecules such as water, oxygen, and carbon dioxide can travel through them. This is why plastic beverage bottles are not good for long storage of carbonated beverages since the carbon dioxide permeates through the sidewalls and the beverage becomes flat.\nPolymers can also absorb moisture at various levels, depending on the polymer. Polyethylene and polyvinyl chloride hardly absorb any moisture at all while nylons, polyesters, and others can absorb more than 1% (w/w). The contained moisture usually has little effect on polymer properties, although it may make nylon tougher.\nThe use of nonmetallic materials for pressure vessels normally involves the winding of very strong, continuous filaments over an internal bladder. The internal bladder can be made from polymer or metal. Glass, carbon fiber, or several polymeric filaments are very strong in tension, and containers made this way can withstand very high pressures. Many of the design criteria of these vessels have been worked out by groups like NASA and are available to the public.8 An important feature of filament-wound vessels is that openings must not be cut into the vessel wall since this will cut the fibers and greatly weaken the vessel.\nDesign guides and standards for polymeric vessels can be found in several references, including:\n- J.J. Koppert and A. Beukers, “Full Composite Isotensoid Pressure Vessels or How Composites Can Compete with Steel,” SAMPE Journal, Vol. 36, No. 6 (Nov.–Dec. 2000): 8–15; and\n- R.J. Rashilla Jr., “All-Composite Pressure Vessels for Natural Gas Vehicle (NGV) Fuel Tanks,” Proceedings of the Conference for Advanced Composites Technologies, Dearborn, MI (Nov. 1993): 8–11.\nIf it is necessary to create a pressure vessel by welding end caps onto a cylinder, care should be taken to load the joints in shear and to maximize the joint area. Welding of flat disks to the end of a plastic pipe is a relatively poor way to create the vessel because the joints are subject to peel loads. In theory, better approaches involve overlap welding of cup-shaped caps onto the ends, and the best approach would be to weld shear-loaded caps that are hemispherical (or approximately so) or that have ribs on them to help reduce the stress at the center of the end cap.\nIn short, polymers can have a bright future in pressure vessels because of improved performance properties, low cost, and light weight. The field of polymeric vessels is still developing.\n1 John DeGaspari, “Epoxy Mold,” Mechanical Engineering (January 2001): 27–28.\n2 J.S. Puglisi and M.A. Chaudhari, “Epoxies (EP),” in Engineering Plastics: Engineered Materials Handbook, Vol. 2, ASM International [formerly American Society for Metals] (1988): 240–241.\n3 H.J. Harrington, “Phenolics,” in Engineering Plastics: 242–245.\n4 F.W. Billmeyer, Textbook of Polymer Science, 3rd Edition, John Wiley and Sons Inc. (1984): 321–323.\n5 S. Popelar, C. Popelar and V. Kenner, “Creep Crack Growth in Joints of a Thermoplastic,” Edison Welding Institute Research Report MR9009 (August 1990). Also, C.H. Popelar, V.H. Kenner, S.F. Popelar and M.C. Pfeil, “Fracture Mechanics Evaluation for the Life Expectancy of Polyethylene Butt-Fusion Joints,” EWI Research Report MR9203 (April 1992). Also, M.C. Pfeil, C.H. Popelar and V.H. Kenner, “Determination of Critical J for Polyethylene Butt-Fusion Joints,” EWI Research Report MR9209 (December 1992).\n6 American Society of Testing Materials Standard ASTM 2837.\n7 R.B. Seymour, “Influence of Long-Term Environmental Factors on Properties,” in Engineering Plastics: 423–432 and references therein.\n8 Editors of Advanced Composites Magazine, Design Guide for Advanced Composites Applications, Design Study 5, Pressure Vessels, Advanced Composites Magazine [ceased publication 1994] (1993): 44–48.\nEditor's note: Some ASME Boiler and Pressure Vessel Code requirements may have changed because of advances in material technology and/or actual experience. The reader is cautioned to refer to the latest edition of the ASME Boiler and Pressure Vessel Code for current requirements.", "label": "No"} {"text": "Self-Esteem and Its Effect on Bullying Behaviour\nMetadataShow full item record\nThe issue of bullying has been one that has gained a lot of attention in the recent years. With technology allowing for continued harassment among teens, not limited to the school grounds, bullying appears to continue to be on the rise. The realization of this has prompted many prevention and intervention bullying programs. Despite these school-wide programs, bullying continues to be an issue. This literature review looks at the relationship between self-esteem and bullying behaviour. There appears to be conflicted results to date about whether or not self-esteem is connected to bullying behaviour. Some results showed relationship between bullying behaviour and low self-esteem, high self-esteem, mixed results and no relationship. Much of the research also appears to be done a number of years ago. This paper looks at the research that has been done to date, the limitations involved in the studies and where future research should be directed to obtain a better understanding of the relationship between self-esteem and bullying behaviour.", "label": "No"} {"text": "CLIMATE PACKAGE: An evolution but not a revolution!\nThe climate has become one of the major problems of the beginning of the century. The planet is changing and the policies must be act. If no there will be many problems in a few decades: rising temperatures, pollution,illness…\nIn European Union, the Climate Package was born atthe end of December.\nI – Presentation Climate Package\nThe climate package of European Union is an action plan adopted the 23th January 2008 by the European Commission. It approved by the European Council the 11th et 12th December 2008.\nThis package deals about the climate and its priorities.\nThe first priority is to establish a common European energy more sustainable and durable\nThesecond priority is to fight against climate change.\nThis 2 priorities are divided on 3 points called “ 20 – 20 – 20 “ or “ 3 x 20 “ because the European Union must:\nRaising the share of renewables in the energy mix to 20%\nReduce CO2 emissions from European Countries of 20 %\nIncrease energy efficiency by 20% by 2020.\nIn 2008, only 8.5% of the energy consumption comes from renewablesresources. It must be increased of 11.5% of 2020. The climate package expected to improve and extend the system of trading CO2 emissions by increasing its scope, its control procedures and costs for polluters. However, the commission wished that power producers are forced to buy 100% of their CO2 allowances at auction from 2013 whichever is 30%.\nII - Problems of this Climate Package\nThis evolutionabout the climate is not perfect.\nIn fact, it is “ just “ 2 measures divided on 3 points. It is very limited and few countries have passes rights.\nFor example, in Poland, the coals plats have rights to pollute. Some grams of CO2 are offered in bonuses to German car manufacturer. And each country can buy credits for CO2 emissions out of Europe.\nThe initial project was more ambitious. But dueto the industrial lobbying and few countries, some information had been cancelled. The countries want to protect their national interest.\nFor example in Poland, Germany and Italy they want to protect their interest because they have some industries that are the most polluting in Europe.\nFor Greenpeace, the aim of “ 3 x 20 “ is in fact the 3 x 4:\n4% reducing the emission on the Europeanterritory until 2010\nOnly 4% of industry’s emission concerned by the auctioning of pollution permit (before it was 100%).\nAll this measures will cause, the increase of temperature of 4° C by the end of the century.\nYou have not assessment of long-term measures, logical, comprehensive and prospecting.\nIt seems you have this project because you need a project but it is not revolutionary\nIII – SomeOptions\nThe climate package currently includes a requirement of 10% renewable energy in transports, which corresponds to a strong development of biofuels. Today when prices of agricultural commodities are exploding, when forest are massively transformed into farmland or plantations to produce fuel plant, Europe must ensure that its energy policy do not conflict with protecting the environment,social issues and food security. The priority must be given to reduce in energy consumption in transport.\nOne idea easy will be, for example, to help the big town (with a subvention). If they develop an idea who protects the environment, they will have a subvention.\nFor example, the share of electric car: a town buy some electric car and you can rent the car if you pay a subscription. You mustjust, before, book your car on Internet and you can rent for 1, 2, 3, …hours.\nWith this idea you will reduce the car in the town, and you help the environment.\nThe others 3 important points are:\nImprove energy efficiency\nUse Bio Fuels\nUse of electric propulsion\nThe problems of the package is also European citizen are not used. It is just for the company. So the citizen must be integrated...", "label": "No"} {"text": "Previously, we touched upon the importance of helping our children learn Arabic. But if you don’t speak Arabic yourself, that task is easier said than done. Not only is Arabic hard to pronounce for those of us who did not grow up speaking Semitic languages, it also has a complex grammar. So what are we suppose to do if we haven’t quite acquired the skill sets needed to impart this crucial knowledge? Even if you don’t know Arabic, you can start by taking it one step at a time, and by building the foundation brick by brick!\nYou probably have heard that the Arabic alphabet consists of 2 sets of moon letters and sun letters. It is important to learn which letters fall into which category to aid with proper pronunciation. While thinking about how I can help my children memorize which letters fall into which categories, I came up with a quick, and fun game, which was so easy to make and costed me only about a buck (can’t beat that!). Since I also had my kids make it themselves, it was relatively effortless ;).\nInshaAllah, we will be sharing more Arabic Learning Materials, so check our blog frequently for more “building blocks”, or subscribe to our email list (at the bottom on the page) to get an update!\nTo make your own Sun and Moon letters game, you will need:\nA useful tip you can teach your child is that the sun letters are typically pronounced at the front of the mouth while moon letters are often times pronounced at the back.\nHow to play:\nNote: Only 2 players or teams can play this game at a time.\nCheck out our other posts inshaAllah in the Learn Arabic Series:\nDo you have any Arabic learning games you can share? InshaAllah, comment below, so we all can learn from each other 🙂 Jazakum Allahu Khair!\nCommunity Helpers – A masjid Craft\nArabic Alphabet Games for Preschool and Kindergarten\nSnow Globe Craft with Free Arabic Printable\nFamily Game Night- Arabic Bingo\nArabic Word Art\nKids Learning the Arabic Language\nLearn Arabic- Free Resources\nPlease log in again. The login page will open in a new tab. After logging in you can close it and return to this page.", "label": "No"} {"text": "It has been 95 years since the discovery of insulin, one of the most exciting medical marvels of the 20th century. For the first time in world history, there was the promise of life after a type 1 diabetes diagnosis.\nFrom a place of privilege that many of us enjoy in developed nations, it is easy to take for granted our access to this miracle drug and the potential it holds for us to live long, healthy lives in spite of a disease intent on ravaging us.\nBut, if by accident of geography, your children are born in places like Morocco, Uganda, Guatemala, Haiti, Bangladesh, or approximately 50 countries of similar wealth, your child’s type 1 diabetes diagnosis is quite literally a race against a very fast clock.\nWithout insulin, a child with type 1 diabetes may die within one week.\nEstimates from the 2013 IDF Diabetes Atlas (6th Edition) point to there being over 500,000 children worldwide under the age of 15 with type 1 diabetes. Life for a Child, a program of the International Diabetes Federation, estimates that as many as 80,000-100,000 of children in the developing world have barely enough access to insulin to survive, let alone the access to the management tools and self-care practices that would see them thrive. In sub-Saharan Africa, life expectancy for a child with type 1 diabetes is less than one year.\nFor perspective, that’s roughly 1 in 5 children worldwide who will die from type 1 diabetes due solely to lack of access to insulin – the insulin that is probably stocked in neat, 90-day supply in your refrigerator right now.\nThis is unacceptable.\nBut it is also overwhelming. How can you possibly help?\nIn 2013, a coalition of forces from throughout the online community came together with industry partner Johnson & Johnson to form P4DC, or Partnering for Diabetes Change, a campaign that seeks to press us to bring our talents, resources, and reach to the table to effect change at a higher level. P4DC brings attention to efforts like IDF’s Life for a Child, a program launched in 2010 which serves over 15,000 children in over 48 countries, bringing life-saving insulin, supplies, and clinical care to children in the developing world.\nP4DC asks one thing of you in February: “Spare a Rose, Save a Child.”\nInstead of a dozen roses for your sweetheart this Valentine’s Day, send only eleven. For the cost of that absent rose, or about $5, Life for a Child is able to provide as much as a month’s worth of insulin to a child in need. Since the start of Spare a Rose in 2013, with your help, the campaign has raised $55,844 and provided a year of life to more than 1,000 children worldwide.\nIf we can raise $50,000 this year, it would be enough to provide care for 833 children.\nThat is 833 children who will not see an early grave. 833 mothers who will not have to hold their child close to their face for one last feel of their warm breath. 833 fathers who will have to choose between not feeding their other four children or burying their son.\nThere is nothing more noble you can do today than to reach into your pocket and deeper into your heart and consider what you can contribute. As Kerri Sparling, one of the founders of P4DC, often says, “Not everybody has a lot to give, but everybody can give a little.”\nYou can spare your single rose at sparearose.org or spare the whole bouquet for $60 and you will fund a child’s insulin for one full year. You can also set up recurring monthly transactions. Imagine the family bank ledger reading: paid the rent, paid the electricity, saved a life, paid the phone bill….\nI will never forget the story I heard from Life for a Child several years ago about the children who stood at the end of a village road waiting for insulin to arrive from aid workers, crying when a vial fell to the ground and shattered. I weep when I think of those little ones watching that hope and hopelessness pool into the cracks of the dry earth. We are so fortunate, my friends.\nFlowers thrive in the soil. Children should be playing above it.\nSpare a Rose, Save a Child.", "label": "No"} {"text": "|Part of World War II|\n|Location||Nazi Germany and German-occupied Europe|\n|Description||Genocide of the European Jews|\n|Genocide, ethnic cleansing|\n|Perpetrators||Nazi Germany and its collaborators|\nList of major perpetrators of the Holocaust\n|Trials||Nuremberg trials, Subsequent Nuremberg trials, Trial of Adolf Eichmann, and others|\nThe Holocaust, also known as the Shoah,[b] was the World War II genocide of the European Jews. Between 1941 and 1945, across German-occupied Europe, Nazi Germany and its collaborators systematically murdered some six million Jews, around two-thirds of Europe's Jewish population.[a][c] The murders were carried out in pogroms and mass shootings; by a policy of extermination through work in concentration camps; and in gas chambers and gas vans in German extermination camps, chiefly Auschwitz, Bełżec, Chełmno, Majdanek, Sobibór, and Treblinka in occupied Poland.\nGermany implemented the persecution in stages. Following Adolf Hitler's appointment as Chancellor on 30 January 1933, the regime built a network of concentration camps in Germany for political opponents and those deemed \"undesirable\", starting with Dachau on 22 March 1933. After the passing of the Enabling Act on 24 March, which gave Hitler plenary powers, the government began isolating Jews from civil society; this included boycotting Jewish businesses in April 1933 and enacting the Nuremberg Laws in September 1935. On 9–10 November 1938, eight months after Germany annexed Austria, Jewish businesses and other buildings were ransacked, smashed or set on fire throughout Germany and Austria during what became known as Kristallnacht (the \"Night of Broken Glass\"). After Germany invaded Poland in September 1939, triggering World War II, the regime set up ghettos to segregate Jews from the rest of the population. Eventually thousands of camps and other detention sites were established across German-occupied Europe.\nThe segregation of Jews in ghettos culminated in the policy of extermination the Nazis called the \"Final Solution to the Jewish Question\", discussed by senior Nazi officials at the Wannsee Conference in Berlin in January 1942. As German forces captured territories in the East, all anti-Jewish measures were radicalized. Under the coordination of the SS, with directions from the highest leadership of the Nazi Party, killings were committed within Germany itself, throughout occupied Europe, and within territories controlled by Germany's allies. Paramilitary death squads called Einsatzgruppen, in cooperation with the German Army and local collaborators, murdered around 1.3 million Jews in mass shootings and pogroms between 1941 and 1945. By mid-1942, victims were being deported from ghettos across Europe in sealed freight trains to extermination camps where, if they survived the journey, they were worked to death or gassed. The killing continued until the end of World War II in Europe in May 1945.\nThe European Jews were targeted for extermination as part of a larger event during the Holocaust era, usually defined as beginning in January 1933, in which Germany and its collaborators persecuted and murdered other groups, including Slavs (chiefly ethnic Poles, Soviet civilians and Soviet prisoners of war), the Roma, the \"incurably sick\", political and religious dissidents, and gay men.[d] The death toll of these groups is thought to rise to 11 million.\nTerminology and scope\n|Part of a series on|\nJews on selection ramp at Auschwitz, May 1944\nThe term holocaust, previously used in 1895 to describe the massacre of Armenian Christians by Ottoman Muslims, comes from the Greek: ὁλόκαυστος, romanized: holókaustos; ὅλος hólos, \"whole\" + καυστός kaustós, \"burnt offering\".[e] The biblical term shoah (Hebrew: שׁוֹאָה), meaning \"destruction\", became the standard Hebrew term for the murder of the European Jews; Yom HaShoah is Israel's Holocaust Remembrance Day. According to Haaretz, the writer Yehuda Erez may have been the first to describe events in Germany as the shoah. Davar and then Haaretz both used the term in September 1939.[f]\nOn 3 October 1941 the American Hebrew used the phrase \"before the Holocaust\", apparently to refer to the situation in France, and in May 1943 The New York Times, discussing the Bermuda Conference, referred to the \"hundreds of thousands of European Jews still surviving the Nazi Holocaust\". In 1968 the Library of Congress created a new category, \"Holocaust, Jewish (1939–1945)\". The term was popularized in the United States by the NBC mini-series Holocaust (1978), about a fictional family of German Jews, and in November that year the President's Commission on the Holocaust was established. As non-Jewish groups began to include themselves as Holocaust victims, many Jews chose to use the term Shoah or the Yiddish term Churban.[g] The Nazis used the phrase \"Final Solution to the Jewish Question\" (German: die Endlösung der Judenfrage).\nMost Holocaust historians define the Holocaust as the genocide of the European Jews by Nazi Germany and its collaborators between 1941 and 1945.[a] In Teaching the Holocaust (2015), Michael Gray, a specialist in Holocaust education, offers three definitions: (a) \"the persecution and murder of Jews by the Nazis and their collaborators between 1933 and 1945\", which views Kristallnacht in 1938 as an early phase of the Holocaust; (b) \"the systematic mass murder of the Jews by the Nazi regime and its collaborators between 1941 and 1945\", which has the disadvantage of excluding victims before 1941 but the advantage, in Gray's view, of recognizing that there was a shift in policy in 1941 toward extermination; and (c) \"the persecution and murder of various groups by the Nazi regime and its collaborators between 1933 and 1945\", which includes all the Nazis' victims, a definition that fails, Gray writes, to acknowledge that only the Jews were singled out for annihilation.\nThe United States Holocaust Memorial Museum distinguishes between the Holocaust (the \"systematic, bureaucratic, state-sponsored persecution and murder of six million Jews by the Nazi regime and its collaborators\") and \"the era of the Holocaust\", which began when Hitler became Chancellor of Germany in January 1933. Victims of the Holocaust era include those the Nazis viewed as inherently inferior (chiefly Slavs, the Roma and the handicapped), and those targeted because of their beliefs or behavior (such as Jehovah's Witnesses, communists and homosexuals). The persecution of these other groups was less consistent, Peter Hayes writes. For example, the Nazis regarded the Slavs as \"sub-human\", but their treatment consisted of \"enslavement and gradual attrition\", while some Slavs (Hayes lists Bulgarians, Croats, Slovaks and some Ukrainians) were favored. Against this, Hitler regarded the Jews as what Dan Stone calls \"a Gegenrasse: a 'counter-race' ... not really human at all\".[d] Donald Niewyk and Francis Nicosia, in The Columbia Guide to the Holocaust (2000), favor a definition of the Holocaust that focuses on the Jews, Roma and handicapped: \"the systematic, state-sponsored murder of entire groups determined by heredity\".\nThe logistics of the mass murder turned Germany into what Michael Berenbaum called a \"genocidal state\". Eberhard Jäckel wrote in 1986 during the German Historikerstreit—a dispute among historians about the uniqueness of the Holocaust and its relationship with the crimes of the Soviet Union—that it was the first time a state had thrown its power behind the idea that an entire people should be wiped out.[h] Anyone with three or four Jewish grandparents was to be exterminated, and complex rules were devised to deal with Mischlinge (\"mixed breeds\"). Bureaucrats identified who was a Jew, confiscated property, and scheduled trains to deport them. Companies fired Jews and later used them as slave labor. Universities dismissed Jewish faculty and students. German pharmaceutical companies tested drugs on camp prisoners; other companies built the crematoria. As prisoners entered the death camps, they were ordered to surrender all personal property, which was catalogued and tagged before being sent to Germany for reuse or recycling. Through a concealed account, the German National Bank helped launder valuables stolen from the victims.\nDan Stone writes that since the opening of archives following the fall of former communist states in Eastern Europe, it has become increasingly clear that the Holocaust was a pan-European phenomenon, a series of \"Holocausts\" impossible to conduct without the help of local collaborators. Without collaborators, the Germans could not have extended the killing across most of the continent.[i] According to Donald Bloxham, in many parts of Europe \"extreme collective violence was becoming an accepted measure of resolving identity crises\". Christian Gerlach writes that non-Germans \"not under German command\" killed 5–6 percent of the six million, but that their involvement was crucial in other ways.\nThe industrialization and scale of the murder was unprecedented. Killings were systematically conducted in virtually all areas of occupied Europe—more than 20 occupied countries. Nearly three million Jews in occupied Poland and between 700,000 and 2.5 million Jews in the Soviet Union were killed. Hundreds of thousands more died in the rest of Europe. Some Christian churches defended converted Jews, but otherwise, Saul Friedländer wrote in 2007: \"Not one social group, not one religious community, not one scholarly institution or professional association in Germany and throughout Europe declared its solidarity with the Jews ...\"\nMedical experiments conducted on camp inmates by the SS were another distinctive feature. At least 7,000 prisoners were subjected to experiments; most died as a result, during the experiments or later. Twenty-three senior physicians and other medical personnel were charged at Nuremberg, after the war, with crimes against humanity. They included the head of the German Red Cross, tenured professors, clinic directors, and biomedical researchers. Experiments took place at Auschwitz, Buchenwald, Dachau, Natzweiler-Struthof, Neuengamme, Ravensbrück, Sachsenhausen, and elsewhere. Some dealt with sterilization of men and women, the treatment of war wounds, ways to counteract chemical weapons, research into new vaccines and drugs, and the survival of harsh conditions.\nThe most notorious physician was Josef Mengele, an SS officer who became the Auschwitz camp doctor on 30 May 1943. Interested in genetics and keen to experiment on twins, he would pick out subjects from the new arrivals during \"selection\" on the ramp, shouting \"Zwillinge heraus!\" (twins step forward!). They would be measured, killed, and dissected. One of Mengele's assistants said in 1946 that he was told to send organs of interest to the directors of the \"Anthropological Institute in Berlin-Dahlem\". This is thought to refer to Mengele's academic supervisor, Otmar Freiherr von Verschuer, director from October 1942 of the Kaiser Wilhelm Institute of Anthropology, Human Heredity, and Eugenics in Berlin-Dahlem.[j]\nJews in Europe\n|Country||Number of Jews\nThere were around 9.5 million Jews in Europe in 1933. Most heavily concentrated in the east, the pre-war population was 3.5 million in Poland; 3 million in the Soviet Union; nearly 800,000 in Romania, and 700,000 in Hungary. Germany had over 500,000.\nAntisemitism and the völkisch movement\nThroughout the Middle Ages in Europe, Jews were subjected to antisemitism based on Christian theology, which blamed them for killing Jesus. Even after the Reformation, Catholicism and Lutheranism continued to persecute Jews, accusing them of blood libels and subjecting them to pogroms and expulsions. The second half of the 19th century saw the emergence in the German empire and Austria-Hungary of the völkisch movement, developed by such thinkers as Houston Stewart Chamberlain and Paul de Lagarde. The movement embraced a pseudo-scientific racism that viewed Jews as a race whose members were locked in mortal combat with the Aryan race for world domination. These ideas became commonplace throughout Germany; the professional classes adopted an ideology that did not see humans as racial equals with equal hereditary value. The Nazi Party (the Nationalsozialistische Deutsche Arbeiterpartei or National Socialist German Workers' Party) originated as an offshoot of the völkisch movement, and it adopted that movement's antisemitism.\nGermany after World War I, Hitler's world view\nAfter World War I (1914–1918), many Germans did not accept that their country had been defeated, which gave birth to the stab-in-the-back myth. This insinuated that it was disloyal politicians, chiefly Jews and communists, who had orchestrated Germany's surrender. Inflaming the anti-Jewish sentiment was the apparent over-representation of Jews in the leadership of communist revolutionary governments in Europe, such as Ernst Toller, head of a short-lived revolutionary government in Bavaria. This perception contributed to the canard of Jewish Bolshevism.\nEarly antisemites in the Nazi Party included Dietrich Eckart, publisher of the Völkischer Beobachter, the party's newspaper, and Alfred Rosenberg, who wrote antisemitic articles for it in the 1920s. Rosenberg's vision of a secretive Jewish conspiracy ruling the world would influence Hitler's views of Jews by making them the driving force behind communism. Central to Hitler's world view was the idea of expansion and lebensraum (living space) in Eastern Europe for German Aryans, a policy of what Doris Bergen called \"race and space\". Open about his hatred of Jews, he subscribed to common antisemitic stereotypes. From the early 1920s onwards, he compared the Jews to germs and said they should be dealt with in the same way. He viewed Marxism as a Jewish doctrine, said he was fighting against \"Jewish Marxism\", and believed that Jews had created communism as part of a conspiracy to destroy Germany.\nRise of Nazi Germany\nDictatorship and repression (1933–1939)\nWith the appointment in January 1933 of Adolf Hitler as Chancellor of Germany and the Nazi's seizure of power, German leaders proclaimed the rebirth of the Volksgemeinschaft (\"people's community\"). Nazi policies divided the population into two groups: the Volksgenossen (\"national comrades\") who belonged to the Volksgemeinschaft, and the Gemeinschaftsfremde (\"community aliens\") who did not. Enemies were divided into three groups: the \"racial\" or \"blood\" enemies, such as the Jews and Roma; political opponents of Nazism, such as Marxists, liberals, Christians, and the \"reactionaries\" viewed as wayward \"national comrades\"; and moral opponents, such as gay men, the work-shy, and habitual criminals. The latter two groups were to be sent to concentration camps for \"re-education\", with the aim of eventual absorption into the Volksgemeinschaft. \"Racial\" enemies could never belong to the Volksgemeinschaft; they were to be removed from society.\nBefore and after the March 1933 Reichstag elections, the Nazis intensified their campaign of violence against opponents, setting up concentration camps for extrajudicial imprisonment. One of the first, at Dachau, opened on 22 March 1933. Initially the camp contained mostly Communists and Social Democrats. Other early prisons were consolidated by mid-1934 into purpose-built camps outside the cities, run exclusively by the SS. The camps served as a deterrent by terrorizing Germans who did not support the regime.\nThroughout the 1930s, the legal, economic, and social rights of Jews were steadily restricted.On 1 April 1933, there was a boycott of Jewish businesses. On 7 April 1933, the Law for the Restoration of the Professional Civil Service was passed, which excluded Jews and other \"non-Aryans\" from the civil service. Jews were disbarred from practicing law, being editors or proprietors of newspapers, joining the Journalists' Association, or owning farms. In Silesia, in March 1933, a group of men entered the courthouse and beat up Jewish lawyers; Friedländer writes that, in Dresden, Jewish lawyers and judges were dragged out of courtrooms during trials. Jewish students were restricted by quotas from attending schools and universities. Jewish businesses were targeted for closure or \"Aryanization\", the forcible sale to Germans; of the approximately 50,000 Jewish-owned businesses in Germany in 1933, about 7,000 were still Jewish-owned in April 1939. Works by Jewish composers, authors, and artists were excluded from publications, performances, and exhibitions. Jewish doctors were dismissed or urged to resign. The Deutsches Ärzteblatt (a medical journal) reported on 6 April 1933: \"Germans are to be treated by Germans only.\"\nSterilization Law, Aktion T4\nThe economic strains of the Great Depression had led some members of the German medical establishment to advocate murder (euphemistically called \"euthanasia\") of the \"incurable\" mentally and physically disabled as a cost-saving measure to free up funds for the curable. The Nazis used the phrase Lebensunwertes Leben (life unworthy of life). On 14 July 1933, the Law for the Prevention of Hereditarily Diseased Offspring (Gesetz zur Verhütung erbkranken Nachwuchses), the Sterilization Law, was passed, allowing for compulsory sterilization. The New York Times reported on 21 December that year: \"400,000 Germans to be sterilized\". There were 84,525 applications from doctors in the first year. The courts reached a decision in 64,499 of those cases; 56,244 were in favor of sterilization. Estimates for the number of involuntary sterilizations during the whole of the Third Reich range from 300,000 to 400,000.\nIn October 1939 Hitler signed a \"euthanasia decree\" backdated to 1 September 1939 that authorized Reichsleiter Philipp Bouhler, the chief of Hitler's Chancellery, and Karl Brandt, Hitler's personal physician, to carry out a program of involuntary \"euthanasia\". After the war this program came to be known as Aktion T4, named after Tiergartenstraße 4, the address of a villa in the Berlin borough of Tiergarten, where the various organizations involved were headquartered. T4 was mainly directed at adults, but the \"euthanasia\" of children was also carried out. Between 1939 and 1941, 80,000 to 100,000 mentally ill adults in institutions were killed, as were 5,000 children and 1,000 Jews, also in institutions. In addition there were specialized killing centers, where the deaths were estimated at 20,000, according to Georg Renno, the deputy director of Schloss Hartheim, one of the \"euthanasia\" centers, or 400,000, according to Frank Zeireis, the commandant of the Mauthausen concentration camp. Overall, the number of mentally and physically handicapped murdered was about 150,000.\nAlthough not ordered to take part, psychiatrists and many psychiatric institutions were involved in the planning and carrying out of Aktion T4 at every stage. After protests from the German Catholic and Protestant churches, Hitler ordered the cancellation of the T4 program in August 1941, although the disabled and mentally ill continued to be killed until the end of the war. The medical community regularly received bodies and body parts for research. University of Tübingen received 1,077 bodies from executions between 1933 and 1945. The neuroscientist Julius Hallervorden received 697 brains from one hospital between 1940 and 1944: \"I accepted these brains of course. Where they came from and how they came to me was really none of my business.\"\nNuremberg Laws, Jewish emigration\nOn 15 September 1935, the Reichstag passed the Reich Citizenship Law and the Law for the Protection of German Blood and German Honor, known as the Nuremberg Laws. The former said that only those of \"German or kindred blood\" could be citizens. Anyone with three or more Jewish grandparents was classified as a Jew. The second law said: \"Marriages between Jews and subjects of the state of German or related blood are forbidden.\" Sexual relationships between them were also criminalized; Jews were not allowed to employ German women under the age of 45 in their homes. The laws referred to Jews but applied equally to the Roma and black Germans. Although other European countries—Bulgaria, Croatia, Hungary, Italy, Romania, Slovakia, and Vichy France—passed similar legislation, Gerlach notes that \"Nazi Germany adopted more nationwide anti-Jewish laws and regulations (about 1,500) than any other state.\"\nBy the end of 1934, 50,000 German Jews had left Germany, and by the end of 1938, approximately half the German Jewish population had left, among them the conductor Bruno Walter, who fled after being told that the hall of the Berlin Philharmonic would be burned down if he conducted a concert there. Albert Einstein, who was in the United States when Hitler came to power, never returned to Germany; his citizenship was revoked and he was expelled from the Kaiser Wilhelm Society and Prussian Academy of Sciences. Other Jewish scientists, including Gustav Hertz, lost their teaching positions and left the country.\nOn 12 March 1938, Germany annexed Austria. Austrian Nazis broke into Jewish shops, stole from Jewish homes and businesses, and forced Jews to perform humiliating acts such as scrubbing the streets or cleaning toilets. Jewish businesses were \"Aryanized\", and all the legal restrictions on Jews in Germany were imposed. In August that year, Adolf Eichmann was put in charge of the Central Agency for Jewish Emigration in Vienna (Zentralstelle für jüdische Auswanderung in Wien). About 100,000 Austrian Jews had left the country by May 1939, including Sigmund Freud and his family, who moved to London. The Évian Conference was held in France in July 1938 by 32 countries, as an attempt to help the increased refugees from Germany, but aside from establishing the largely ineffectual Intergovernmental Committee on Refugees, little was accomplished and most countries participating did not increase the number of refugees they would accept.\nOn 7 November 1938, Herschel Grynszpan, a Polish Jew, shot the German diplomat Ernst vom Rath in the German Embassy in Paris, in retaliation for the expulsion of his parents and siblings from Germany.[k] When vom Rath died on 9 November, the government used his death as a pretext to instigate a pogrom against the Jews. The government claimed it was spontaneous, but in fact it had been ordered and planned by Adolf Hitler and Joseph Goebbels, although with no clear goals, according to David Cesarani. The result, he writes, was \"murder, rape, looting, destruction of property, and terror on an unprecedented scale\".\nKnown as Kristallnacht (or \"Night of Broken Glass\"), the attacks on 9–10 November 1938 were partly carried out by the SS and SA, but ordinary Germans joined in; in some areas, the violence began before the SS or SA arrived. Over 7,500 Jewish shops (out of 9,000) were looted and attacked, and over 1,000 synagogues damaged or destroyed. Groups of Jews were forced by the crowd to watch their synagogues burn; in Bensheim they were made to dance around it, and in Laupheim to kneel before it. At least 90 Jews died. The damage was estimated at 39 million Reichmarks. Cesarani writes that \"[t]he extent of the desolation stunned the population and rocked the regime.\" It also shocked the rest of the world. The Times of London wrote on 11 November 1938: \"No foreign propagandist bent upon blackening Germany before the world could outdo the tale of burnings and beatings, of blackguardly assaults upon defenseless and innocent people, which disgraced that country yesterday. Either the German authorities were a party to this outbreak or their powers over public order and a hooligan minority are not what they are proudly claimed to be.\"\nBetween 9 and 16 November, 30,000 Jews were sent to the Buchenwald, Dachau, and Sachsenhausen concentration camps. Many were released within weeks; by early 1939, 2,000 remained in the camps. German Jewry was held collectively responsible for restitution of the damage; they also had to pay an \"atonement tax\" of over a billion Reichmarks. Insurance payments for damage to their property were confiscated by the government. A decree on 12 November 1938 barred Jews from most remaining occupations. Kristallnacht marked the end of any sort of public Jewish activity and culture, and Jews stepped up their efforts to leave the country.\nBefore World War II, Germany considered mass deportation from Europe of German, and later European, Jewry. Among the areas considered for possible resettlement were British Palestine and, after the war began, French Madagascar, Siberia, and two reservations in Poland.[l] Palestine was the only location to which any German resettlement plan produced results, via the Haavara Agreement between the Zionist Federation of Germany and the German government. Between November 1933 and December 1939, the agreement resulted in the emigration of about 53,000 German Jews, who were allowed to transfer RM 100 million of their assets to Palestine by buying German goods, in violation of the Jewish-led anti-Nazi boycott of 1933.\nBeginning of World War II\nInvasion of Poland\nWhen Germany invaded Poland on 1 September 1939, triggering a declaration of war from France and the UK, it gained control of an additional two million Jews, reduced to around 1.7 – 1.8 million in the German zone when the Soviet Union invaded from the east on 17 September. The German army, the Wehrmacht, was accompanied by seven SS Einsatzgruppen (\"special task forces\") and an Einsatzkommando, numbering altogether 3,000 men, whose role was to deal with \"all anti-German elements in hostile country behind the troops in combat\". Most of the Einsatzgruppen commanders were professionals; 15 of the 25 leaders had PhDs. By 29 August, two days before the invasion, they had already drawn up a list of 30,000 people to send to concentration camps. By the first week of the invasion, 200 people were being executed every day.\nThe Germans began sending Jews from territories they had recently annexed (Austria, Czechoslovakia, and western Poland) to the central section of Poland, which they called the General Government. To make it easier to control and deport them, the Jews were concentrated in ghettos in major cities. The Germans planned to set up a Jewish reservation in southeast Poland around the transit camp in Nisko, but the \"Nisko plan\" failed, in part because it was opposed by Hans Frank, the new Governor-General of the General Government. In mid-October 1940 the idea was revived, this time to be located in Lublin. Resettlement continued until January 1941 under SS officer Odilo Globocnik, but further plans for the Lublin reservation failed for logistical and political reasons.\nThere had been anti-Jewish pogroms in Poland before the war, including in around 100 towns between 1935 and 1937, and again in 1938. In June and July 1941, during the Lviv pogroms in Lwów (now Lviv, Ukraine), around 6,000 Polish Jews were murdered in the streets by the Ukrainian People's Militia and local people.[m] Another 2,500–3,500 Jews died in mass shootings by Einsatzgruppe C. During the Jedwabne pogrom on 10 July 1941, a group of Poles in Jedwabne killed the town's Jewish community, many of whom were burned alive in a barn. The attack may have been engineered by the German Security Police.[n]\nGhettos, Jewish councils\n- Main ghettos: Białystok, Budapest, Kraków, Kovno, Łódź, Lvov, Riga, Vilna, Warsaw (Warsaw ghetto uprising)\nThe Germans established ghettos in Poland, in the incorporated territories and General Government area, to confine Jews. These were closed off from the outside world at different times and for different reasons. In early 1941, the Warsaw ghetto contained 445,000 people, including 130,000 from elsewhere, while the second largest, the Łódź ghetto, held 160,000. Although the Warsaw ghetto contained 30 percent of the city's population, it occupied only 2.5 percent of its area, averaging over nine people per room. The massive overcrowding, poor hygiene facilities and lack of food killed thousands. Over 43,000 residents died in 1941.\nAccording to a letter dated 21 September 1939 from SS-Obergruppenführer Reinhard Heydrich, head of the Reichssicherheitshauptamt (RSHA or Reich Security Head Office), to the Einsatzgruppen, each ghetto had to be run by a Judenrat, or \"Jewish Council of Elders\", to consist of 24 male Jews with local influence. Judenräte were responsible for the ghetto's day-to-day operations, including distributing food, water, heat, medical care, and shelter. The Germans also required them to confiscate property, organize forced labor, and, finally, facilitate deportations to extermination camps. The Jewish councils' basic strategy was one of trying to minimize losses by cooperating with German authorities, bribing officials, and petitioning for better conditions.\nInvasion of Norway and Denmark\nGermany invaded Norway and Denmark on 9 April 1940, during Operation Weserübung. Denmark was overrun so quickly that there was no time for a resistance to form. Consequently, the Danish government stayed in power and the Germans found it easier to work through it. Because of this, few measures were taken against the Danish Jews before 1942. By June 1940 Norway was completely occupied. In late 1940, the country's 1,800 Jews were banned from certain occupations, and in 1941 all Jews had to register their property with the government. On 26 November 1942, 532 Jews were taken by police officers, at four o'clock in the morning, to Oslo harbor, where they boarded a German ship. From Germany they were sent by freight train to Auschwitz. According to Dan Stone, only nine survived the war.\nInvasion of France and the Low Countries\nIn May 1940, Germany invaded the Netherlands, Luxembourg, Belgium, and France. After Belgium's surrender, the country was ruled by a German military governor, Alexander von Falkenhausen, who enacted anti-Jewish measures against its 90,000 Jews, many of them refugees from Germany or Eastern Europe. In the Netherlands, the Germans installed Arthur Seyss-Inquart as Reichskommissar, who began to persecute the country's 140,000 Jews. Jews were forced out of their jobs and had to register with the government. In February 1941, non-Jewish Dutch citizens staged a strike in protest that was quickly crushed. From July 1942, over 107,000 Dutch Jews were deported; only 5,000 survived the war. Most were sent to Auschwitz; the first transport of 1,135 Jews left Holland for Auschwitz on 15 July 1942. Between 2 March and 20 July 1943, 34,313 Jews were sent in 19 transports to the Sobibór extermination camp, where all but 18 are thought to have been gassed on arrival.\nFrance had approximately 300,000 Jews, divided between the German-occupied north and the unoccupied collaborationist southern areas in Vichy France (named after the town Vichy). The occupied regions were under the control of a military governor, and there, anti-Jewish measures were not enacted as quickly as they were in the Vichy-controlled areas. In July 1940, the Jews in the parts of Alsace-Lorraine that had been annexed to Germany were expelled into Vichy France. Vichy France's government implemented anti-Jewish measures in French Algeria and the two French Protectorates of Tunisia and Morocco. Tunisia had 85,000 Jews when the Germans and Italians arrived in November 1942; an estimated 5,000 Jews were subjected to forced labor.\nThe fall of France gave rise to the Madagascar Plan in the summer of 1940, when French Madagascar in Southeast Africa became the focus of discussions about deporting all European Jews there; it was thought that the area's harsh living conditions would hasten deaths. Several Polish, French and British leaders had discussed the idea in the 1930s, as did German leaders from 1938. Adolf Eichmann's office was ordered to investigate the option, but no evidence of planning exists until after the defeat of France in June 1940. Germany's inability to defeat Britain, something that was obvious to the Germans by September 1940, prevented the movement of Jews across the seas, and the Foreign Ministry abandoned the plan in February 1942.\nInvasion of Yugoslavia and Greece\nYugoslavia and Greece were invaded in April 1941 and surrendered before the end of the month. Germany and Italy divided Greece into occupation zones but did not eliminate it as a country. Yugoslavia, home to around 80,000 Jews, was dismembered; regions in the north were annexed by Germany and regions along the coast made part of Italy. The rest of the country was divided into the Independent State of Croatia, nominally an ally of Germany, and Serbia, which was governed by a combination of military and police administrators. Serbia was declared free of Jews (Judenfrei) in August 1942. Croatia's ruling party, the Ustashe, killed the majority of the country's Jews and killed or expelled from the area local Orthodox Christian Serbs and Muslims. On 18 April 1944 Croatia was declared as Judenfrei. Jews and Serbs alike were \"hacked to death and burned in barns\", according to Black. One difference between the Germans and Croatians was that the Ustashe allowed its Jewish and Serbian victims to convert to Catholicism so they could escape death. According to Jozo Tomasevich of the 115 Jewish religious communities from Yugoslavia which exist in 1939 and 1940 only Jewish communities from Zagreb managed to survive the war.\nInvasion of the Soviet Union\n|Wikisource has original text related to this article:|\nGermany invaded the Soviet Union on 22 June 1941, a day Timothy Snyder called \"one of the most significant days in the history of Europe ... the beginning of a calamity that defies description\". Jürgen Matthäus described it as \"a quantum leap toward the Holocaust\". German propaganda portrayed the conflict as an ideological war between German National Socialism and Jewish Bolshevism and as a racial war between the Germans and the Jewish, Romani, and Slavic Untermenschen (\"sub-humans\"). David Cesarani writes that the war was driven primarily by the need for resources: agricultural land to feed Germany, natural resources for German industry, and control over Europe's largest oil fields. But precisely because of the Soviet Union's vast resources, \"[v]ictory would have to be swift\". Between early fall 1941 and late spring 1942, according to Matthäus, 2 million of the 3.5 million Soviet soldiers captured by the Wehrmacht (Germany's armed forces) had been executed or had died of neglect and abuse. By 1944 the Soviet death toll was at least 20 million.\nAs German troops advanced, the mass shooting of \"anti-German elements\" was assigned, as in Poland, to the Einsatzgruppen, this time under the command of Reinhard Heydrich. The point of the attacks was to destroy the local Communist Party leadership and therefore the state, including \"Jews in the Party and State employment\", and any \"radical elements\".[o] Cesarani writes that the killing of Jews was at this point a \"subset\" of these activities.\nEinsatzgruppe A arrived in the Baltic states (Estonia, Latvia, and Lithuania) with Army Group North; Einsatzgruppe B in Belarus with Army Group Center; Einsatzgruppe C in the Ukraine with Army Group South; and Einsatzgruppe D went further south into Ukraine with the 11th Army. Each Einsatzgruppe numbered around 600–1,000 men, with a few women in administrative roles. Travelling with nine German Order Police battalions and three units of the Waffen-SS, the Einsatzgruppen and their local collaborators had murdered almost 500,000 people by the winter of 1941–1942. By the end of the war, they had killed around two million, including about 1.3 million Jews and up to a quarter of a million Roma. According to Wolfram Wette, the Germany army took part in these shootings as bystanders, photographers and active shooters; to justify their troops' involvement, army commanders would describe the victims as \"hostages\", \"bandits\" and \"partisans\". Local populations helped by identifying and rounding up Jews, and by actively participating in the killing. In Lithuania, Latvia and western Ukraine, locals were deeply involved; Latvian and Lithuanian units participated in the murder of Jews in Belarus, and in the south, Ukrainians killed about 24,000 Jews. Some Ukrainians went to Poland to serve as guards in the camps.\nToward the Holocaust\nTypically, victims would undress and give up their valuables before lining up beside a ditch to be shot, or they would be forced to climb into the ditch, lie on a lower layer of corpses, and wait to be killed. The latter was known as Sardinenpackung (\"packing sardines\"), a method reportedly started by SS officer Friedrich Jeckeln.\nAt first the Einsatzgruppen targeted the male Jewish intelligentsia, defined as male Jews aged 15–60 who had worked for the state and in certain professions (the commandos would describe them as \"Bolshevist functionaries\" and similar), but from August 1941 they began to murder women and children too. Christopher Browning reports that on 1 August, the SS Cavalry Brigade passed an order to its units: \"Explicit order by RF-SS [Heinrich Himmler, Reichsführer-SS]. All Jews must be shot. Drive the female Jews into the swamps.\" In a speech on 6 October 1943 to party leaders, Heinrich Himmler said he had ordered that women and children be shot, but Peter Longerich and Christian Gerlach write that the murder of women and children began at different times in different areas, suggesting local influence.\nNotable massacres include the July 1941 Ponary massacre near Vilnius (Soviet Lithuania), in which Einsatgruppe B and Lithuanian collaborators shot 72,000 Jews and 8,000 non-Jewish Lithuanians and Poles. In the Kamianets-Podilskyi massacre (Soviet Ukraine), nearly 24,000 Jews were killed between 27 and 30 August 1941. The largest massacre was at a ravine called Babi Yar outside Kiev (also Soviet Ukraine), where 33,771 Jews were killed on 29–30 September 1941. Einsatzgruppe C and the Order Police, assisted by Ukrainian militia, carried out the killings, while the German 6th Army helped round up and transport the victims to be shot. The Germans continued to use the ravine for mass killings throughout the war; the total killed there could be as high as 100,000.\nHistorians agree that there was a \"gradual radicalization\" between the spring and autumn of 1941 of what Longerich calls Germany's Judenpolitik, but they disagree about whether a decision—Führerentscheidung (Führer's decision)—to murder the European Jews was made at this point.[p] According to Christopher Browning, writing in 2004, most historians maintain that there was no order before the invasion to kill all the Soviet Jews. Longerich wrote in 2010 that the gradual increase in brutality and numbers killed between July and September 1941 suggests there was \"no particular order\"; instead it was a question of \"a process of increasingly radical interpretations of orders\".\nAccording to Dan Stone, the murder of Jews in Romania was \"essentially an independent undertaking\". Romania implemented anti-Jewish measures in May and June 1940 as part of its efforts towards an alliance with Germany. Jews were forced from government service, pogroms were carried out, and by March 1941 all Jews had lost their jobs and had their property confiscated. In June 1941 Romania joined Germany in its invasion of the Soviet Union.\nThousands of Jews were killed in January and June 1941 in the Bucharest pogrom and Iaşi pogrom. According to a 2004 report by Tuvia Friling and others, up to 14,850 Jews died during the Iaşi pogrom. The Romanian military killed up to 25,000 Jews during the Odessa massacre between 18 October 1941 and March 1942, assisted by gendarmes and the police. Mihai Antonescu, Romania's deputy prime minister, was reported to have said it was \"the most favorable moment in our history\" to solve the \"Jewish problem\". In July 1941 he said it was time for \"total ethnic purification, for a revision of national life, and for purging our race of all those elements which are foreign to its soul, which have grown like mistletoes and darken our future\". Romania set up concentration camps under its control in Transnistria, reportedly extremely brutal, where 154,000–170,000 Jews were deported from 1941 to 1943.\nBulgaria, Slovakia, Hungary\nBulgaria introduced anti-Jewish measures between 1940 and 1943, which included a curfew, the requirement to wear a yellow star, restrictions on owning telephones or radios, the banning of mixed marriages (except for Jews who had converted to Christianity), and the registration of property. It annexed Thrace and Macedonia, and in February 1943 agreed to a demand from Germany that it deport 20,000 Jews to the Treblinka extermination camp. All 11,000 Jews from the annexed territories were sent to their deaths, and plans were made to deport an additional 6,000–8,000 Bulgarian Jews from Sofia to meet the quota. When the plans became public, the Orthodox Church and many Bulgarians protested, and King Boris III canceled the deportation of Jews native to Bulgaria. Instead, they were expelled to provincial areas of the country.\nStone writes that Slovakia, led by Roman Catholic priest Jozef Tiso (president of the Slovak State, 1939–1945), was \"one of the most loyal of the collaborationist regimes\". It deported 7,500 Jews in 1938 on its own initiative; introduced anti-Jewish measures in 1940; and by the autumn of 1942 had deported around 60,000 Jews to ghettos and concentration camps in Poland. Another 2,396 were deported and 2,257 killed that autumn during an uprising, and 13,500 were deported between October 1944 and March 1945. According to Stone, \"the Holocaust in Slovakia was far more than a German project, even if it was carried out in the context of a 'puppet' state.\"\nAlthough Hungary expelled Jews who were not citizens from its newly annexed lands in 1941, it did not deport most of its Jews until the German invasion of Hungary in March 1944. Between 15 May and early July 1944, 437,000 Jews were deported from Hungary, mostly to Auschwitz, where most of them were gassed; there were four transports a day, each carrying 3,000 people. In Budapest in October and November 1944, the Hungarian Arrow Cross forced 50,000 Jews to march to the Austrian border as part of a deal with Germany to supply forced labor. So many died that the marches were stopped.\nItaly, Finland, Japan\nItaly introduced some antisemitic measures, but there was less antisemitism there than in Germany, and Italian-occupied countries were generally safer for Jews than those occupied by Germany. There were no deportations of Italian Jews to Germany while Italy remained an ally. In some areas, the Italian authorities even tried to protect Jews, such as in the Croatian areas of the Balkans. But while Italian forces in Russia were not as vicious towards Jews as the Germans, they did not try to stop German atrocities either. Several forced labor camps for Jews were established in Italian-controlled Libya; almost 2,600 Libyan Jews were sent to camps, where 562 died. In Finland, the government was pressured in 1942 to hand over its 150–200 non-Finnish Jews to Germany. After opposition from both the government and public, eight non-Finnish Jews were deported in late 1942; only one survived the war. Japan had little antisemitism in its society and did not persecute Jews in most of the territories it controlled. Jews in Shanghai were confined, but despite German pressure they were not killed.\nConcentration and labor camps\nGermany first used concentration camps as places of unlawful incarceration of political opponents and other \"enemies of the state\". Large numbers of Jews were not sent there until after Kristallnacht in November 1938. Although death rates were high, the camps were not designed as killing centers. After war broke out in 1939, new camps were established, some outside Germany in occupied Europe. In January 1945, the SS reports had over 700,000 prisoners in their control, of which close to half had died by the end of May 1945, according to most historians. Most wartime prisoners of the camps were not Germans but belonged to countries under German occupation.\nAfter 1942, the economic functions of the camps, previously secondary to their penal and terror functions, came to the fore. Forced labor of camp prisoners became commonplace. The guards became much more brutal, and the death rate increased as the guards not only beat and starved prisoners, but killed them more frequently. Vernichtung durch Arbeit (\"extermination through labor\") was a policy; camp inmates would literally be worked to death, or to physical exhaustion, at which point they would be gassed or shot. The Germans estimated the average prisoner's lifespan in a concentration camp at three months, as a result of lack of food and clothing, constant epidemics, and frequent punishments for the most minor transgressions. The shifts were long and often involved exposure to dangerous materials.\nTransportation to and between camps was often carried out in closed freight cars with littie air or water, long delays and prisoners packed tightly. In mid-1942 work camps began requiring newly arrived prisoners to be placed in quarantine for four weeks. Prisoners wore colored triangles on their uniforms, the color denoting the reason for their incarceration. Red signified a political prisoner, Jehovah's Witnesses had purple triangles, \"asocials\" and criminals wore black and green, and gay men wore pink. Jews wore two yellow triangles, one over another to form a six-pointed star. Prisoners in Auschwitz were tattooed on arrival with an identification number.\nPearl Harbor, Germany declares war on America\n|Wikisource has original text related to this article:|\nOn 7 December 1941, Japanese aircraft attacked Pearl Harbor, an American naval base in Honolulu, Hawaii, killing 2,403 Americans. The following day, the United States declared war on Japan, and on 11 December, Germany declared war on the United States. According to Deborah Dwork and Robert Jan van Pelt, Hitler had trusted American Jews, whom he assumed were all powerful, to keep the United States out of the war in the interests of German Jews. When America declared war, he blamed the Jews.\nNearly three years earlier, on 30 January 1939, Hitler had told the Reichstag: \"if the international Jewish financiers in and outside Europe should succeed in plunging the nations once more into a world war, then the result will be not the Bolshevising of the earth, and thus a victory of Jewry, but the annihilation of the Jewish race in Europe!\" In the view of Christian Gerlach, Hitler \"announced his decision in principle\" to annihilate the Jews on or around 12 December 1941, one day after his declaration of war. On that day, Hitler gave a speech in his private apartment at the Reich Chancellery to senior Nazi Party leaders: the Reichsleiter, the most senior, and the Gauleiter, the regional leaders. The following day, Joseph Goebbels, the Reich Minister of Propaganda, noted in his diary:\nRegarding the Jewish question, the Führer is determined to clear the table. He warned the Jews that if they were to cause another world war, it would lead to their destruction. Those were not empty words. Now the world war has come. The destruction of the Jews must be its necessary consequence. We cannot be sentimental about it.[s]\nChristopher Browning argues that Hitler gave no order during the Reich Chancellery meeting, but he made clear that his 1939 warning to the Jews \"had to be taken utterly literally\", and he signaled to party leaders that they could give appropriate orders to others. Peter Longerich interprets Hitler's speech to the party leaders as an appeal to radicalize a policy that was already being executed. According to Gerlach, an unidentified former German Sicherheitsdienst officer wrote in a report in 1944, after defecting to Switzerland: \"After America entered the war, the annihilation (Ausrottung) of all European Jews was initiated on the Führer's order.\"\nFour days after Hitler's meeting with party leaders, Hans Frank, Governor-General of the General Government area of occupied Poland, who was at the meeting, spoke to district governors: \"We must put an end to the Jews, that I want to say quite openly ... if the Jewish tribe were to survive the war in Europe, while we had sacrificed our best blood for Europe's preservation, then this war would be only a partial success. Thus vis-a-vis the Jews I will in principle proceed only on the assumption that they will disappear. They must go.\"[t] On 18 December Hitler and Himmler held a meeting to which Himmler referred in his appointment book as \"Juden frage | als Partisanen auszurotten\" (\"Jewish question / to be exterminated as partisans\"). Browning interprets this as a meeting to discuss how to justify and speak about the killing.\nSS-Obergruppenführer Reinhard Heydrich, head of the Reich Security Head Office, convened what became known as the Wannsee Conference on 20 January 1942 at Am Großen Wannsee 56–58, a villa in Berlin's Wannsee suburb. The meeting had been scheduled for 9 December 1941, and invitations had been sent on 29 November, but it had been postponed indefinitely. A month later, invitations were sent out again, this time for 20 January.\nThe 15 men present at Wannsee included Adolf Eichmann (head of Jewish affairs for the RSHA and the man who organized the deportation of Jews), Heinrich Müller (head of the Gestapo), and other SS and party leaders and department heads.[u] Browning writes that eight of the 15 had doctorates: \"Thus it was not a dimwitted crowd unable to grasp what was going to be said to them.\" Thirty copies of the minutes, known as the Wannsee Protocol, were made. Copy no. 16 was found by American prosecutors in March 1947 in a German Foreign Office folder. Written by Eichmann and stamped \"Top Secret\", the minutes were written in \"euphemistic language\" on Heydrich's instructions, according to Eichmann's later testimony.\nThe conference had several purposes. Discussing plans for a \"final solution to the Jewish question\" (\"Endlösung der Judenfrage\"), and a \"final solution to the Jewish question in Europe\" (\"Endlösung der europäischen Judenfrage\"), it was intended to share information and responsibility, coordinate efforts and policies (\"Parallelisierung der Linienführung\"), and ensure that authority rested with Heydrich. There was also discussion about whether to include the German Mischlinge (half-Jews). Heydrich told the meeting: \"Another possible solution of the problem has now taken the place of emigration, i.e. the evacuation of the Jews to the East, provided that the Fuehrer gives the appropriate approval in advance.\" He continued:\nUnder proper guidance, in the course of the final solution the Jews are to be allocated for appropriate labor in the East. Able-bodied Jews, separated according to sex, will be taken in large work columns to these areas for work on roads, in the course of which action doubtless a large portion will be eliminated by natural causes.\nThe possible final remnant will, since it will undoubtedly consist of the most resistant portion, have to be treated accordingly because it is the product of natural selection and would, if released, act as the seed of a new Jewish revival (see the experience of history.) In the course of the practical execution of the final solution, Europe will be combed through from west to east. Germany proper, including the Protectorate of Bohemia and Moravia, will have to be handled first due to the housing problem and additional social and political necessities. The evacuated Jews will first be sent, group by group, to so-called transit ghettos, from which they will be transported to the East.\nThese evacuations were regarded as provisional or \"temporary solutions\" (\"Ausweichmöglichkeiten\").[v] The final solution would encompass the 11 million Jews living not only in territories controlled by Germany, but elsewhere in Europe and adjacent territories, such as Britain, Ireland, Switzerland, Turkey, Sweden, Portugal, Spain, and Hungary, \"dependent on military developments\". There was little doubt what the final solution was, writes Peter Longerich: \"the Jews were to be annihilated by a combination of forced labour and mass murder.\"\nAt the end of 1941 in occupied Poland, the Germans began building additional camps or expanding existing ones. Auschwitz, for example, was expanded in October 1941 by building Auschwitz II-Birkenau a few kilometers away. By the spring or summer of 1942, gas chambers had been installed in these new facilities, except for Chełmno, which used gas vans.\n(all Auschwitz camps;\nincludes 960,000 Jews)[w]\n(built as POW camp)\n|c. 20 March 1942[y]|||\n|Bełżec||Bełżec||600,000||1 November 1941||17 March 1942|||\n|Chełmno||Chełmno nad Nerem||320,000||8 December 1941|||\n|Majdanek||Lublin||78,000||7 October 1941\n(built as POW camp)\n|Sobibór||Sobibór||250,000||February 1942||May 1942|||\n|Treblinka||Treblinka||870,000||May 1942||23 July 1942|||\nOther camps sometimes described as extermination camps include Maly Trostinets, a camp near Minsk in the occupied Soviet Union, where 65,000 are thought to have died, mostly by shooting but also in gas vans; Mauthausen in Austria; Stutthof, near Gdańsk, Poland; and Sachsenhausen and Ravensbrück in Germany. The camps in Austria, Germany and Poland all had gas chambers to kill inmates deemed unable to work.\nChełmno, with gas vans only, had its roots in the Aktion T4 euthanasia program. In December 1939 and January 1940, gas vans equipped with gas cylinders and a sealed compartment had been used to kill the disabled and mentally ill in occupied Poland. As the mass shootings continued in Russia, Himmler and his subordinates in the field feared that the murders were causing psychological problems for the SS, and began searching for more efficient methods. In December 1941, similar vans, using exhaust fumes rather than bottled gas, were introduced into the camp at Chełmno, Victims were asphyxiated while being driven to prepared burial pits in the nearby forests, where the corpses were unloaded and buried. The vans were also used in the occupied Soviet Union, for example in smaller clearing actions in the Minsk ghetto, and in Yugoslavia. Apparently, as with the mass shootings, the vans caused emotional problems for the operators, and the small number of victims the vans could handle made them ineffective.\nChristian Gerlach writes that over three million Jews were murdered in 1942, the year that \"marked the peak\" of the mass murder. At least 1.4 million of these were in the General Government area of Poland. Victims usually arrived at the extermination camps by freight train. Almost all arrivals at Bełżec, Sobibór and Treblinka were sent directly to the gas chambers, with individuals occasionally selected to replace dead workers. At Auschwitz, about 20 percent of Jews were selected to work. Those selected for death at all camps were told to undress and hand their valuables to camp workers. They were then herded naked into the gas chambers. To prevent panic, they were told the gas chambers were showers or delousing chambers.\nAt Auschwitz, after the chambers were filled, the doors were shut and pellets of Zyklon-B were dropped into the chambers through vents, releasing toxic prussic acid. Those inside died within 20 minutes; the speed of death depended on how close the inmate was standing to a gas vent, according to the commandant Rudolf Höss, who estimated that about one-third of the victims died immediately. Johann Kremer, an SS doctor who oversaw the gassings, testified that: \"Shouting and screaming of the victims could be heard through the opening and it was clear that they fought for their lives.\" The gas was then pumped out, and the Sonderkommando—work groups of mostly Jewish prisoners—carried out the bodies, extracted gold fillings, cut off women's hair, and removed jewellery, artificial limbs and glasses. At Auschwitz, the bodies were at first buried in deep pits and covered with lime, but between September and November 1942, on the orders of Himmler, 100,000 bodies were dug up and burned. In early 1943, new gas chambers and crematoria were built to accommodate the numbers.\nBełżec, Sobibór and Treblinka, relatively small compared to Auschwitz, are known as the Operation Reinhard camps, named after the operation to murder the Jews in the General Government area of occupied Poland. Between March 1942 and November 1943, around 1,526,500 Jews were gassed in the three Operation Reinhard camps in gas chambers using the exhaust fumes of stationary diesel engines. Gold fillings were pulled from the corpses before burial, but the women's hair was cut before death. At Treblinka, to calm the victims, the arrival platform was made to look like a train station, complete with fake clock. Most of the victims at these camps were buried in pits at first. Sobibór and Bełżec began exhuming and burning bodies in late 1942, to hide the evidence, as did Treblinka in March 1943. The bodies were burned in open fire pits and the remaining bones crushed into powder.\nThere was almost no resistance in the ghettos in Poland until the end of 1942, according to Peter Longerich. Raul Hilberg accounted for this by evoking the history of Jewish persecution: appealing to oppressors and complying with orders might avoid inflaming the situation until the onslaught abated. Timothy Snyder noted that it was only during the three months after the deportations of July–September 1942 that agreement on the need for armed resistance was reached.\nSeveral resistance groups were formed, such as the Jewish Combat Organization (ŻOB) and Jewish Military Union (ŻZW) in the Warsaw Ghetto and the United Partisan Organization in Vilna. Over 100 revolts and uprisings occurred in at least 19 ghettos and elsewhere in Eastern Europe. The best known is the Warsaw Ghetto Uprising in April 1943, when the Germans arrived to send the remaining inhabitants to extermination camps. They had to retreat on 19 April from the ŻOB and ŻZW fighters, and later that day returned under the command of SS General Jürgen Stroop (author of the Stroop Report about the uprising). Around 1,000 poorly armed fighters held the SS at bay for four weeks. According to Polish and Jewish accounts, hundreds or thousands of Germans were killed, while the Germans reported 16 dead. The Germans reported 14,000 Jews killed—7000 during the fighting and 7000 sent to Treblinka—and between 53,000 and 56,000 deported.\nGwardia Ludowa, a Polish resistance newspaper, wrote in May 1943: \"From behind the screen of smoke and fire, in which the ranks of fighting Jewish partisans are dying, the legend of the exceptional fighting qualities of the Germans is being undermined. How infamous 'victory' appears when it is won only by burning and pulling down a whole district of the capital ... The fighting Jews have won for us what is most important: the truth about the weakness of the Germans.\"\nDuring a revolt in Treblinka on 2 August 1943, inmates killed five or six guards and set fire to camp buildings; several managed to escape. In the Białystok Ghetto on 16 August 1943, Jewish insurgents fought for five days when the Germans announced mass deportations. On 14 October 1943, Jewish prisoners in Sobibór, including Jewish-Soviet prisoners of war, attempted an escape, killing 11 SS officers and a couple of Ukrainian camp guards. Around 300 escaped, but 100 were recaptured and shot. On 7 October 1944, 300 Jewish members of the Sonderkommando at Auschwitz, who learned they were about to be killed, attacked their guards and blew up crematorium IV. Three SS officers were killed, one of whom was stuffed into an oven, as was a German kapo. None of the Sonderkommando rebels survived the uprising.\nEstimates of Jewish participation in partisan units throughout Europe range from 20,000 to 100,000. In the occupied Polish and Soviet territories, thousands of Jews fled into the swamps or forests and joined the partisans, although the partisan movements did not always welcome them. An estimated 20,000 to 30,000 joined the Soviet partisan movement. One of the famous Jewish groups was the Bielski partisans in Belarus, led by the Bielski brothers. Jews also joined Polish forces, including the Home Army. According to Timothy Snyder, \"more Jews fought in the Warsaw Uprising of August 1944 than in the Warsaw Ghetto Uprising of April 1943.\"[z]\nPolish resistance, flow of information about the mass murder\nThe Polish government-in-exile in London learned about Auschwitz from the Polish leadership in Warsaw, who from late 1940 \"received a continual flow of information\" about the camp, according to historian Michael Fleming. This was in large measure thanks to Captain Witold Pilecki of the Polish Home Army, who allowed himself to be arrested in September 1940 and sent there. An inmate until he escaped in April 1943, his mission was to set up a resistance movement (ZOW), prepare to take over the camp, and smuggle out information about it.\nOn 6 January 1942, the Soviet Minister of Foreign Affairs, Vyacheslav Molotov, sent out diplomatic notes about German atrocities. The notes were based on reports about mass graves and bodies surfacing from pits and quarries in areas the Red Army had liberated, as well as witness reports from German-occupied areas. The following month, Szlama Ber Winer escaped from the Chełmno concentration camp in Poland and passed information about it to the Oneg Shabbat group in the Warsaw Ghetto. His report, known by his pseudonym as the Grojanowski Report, had reached London by June 1942. Also in 1942, Jan Karski sent information to the Allies after being smuggled into the Warsaw Ghetto twice. By late July or early August 1942, Polish leaders in Warsaw had learned about the mass killing of Jews in Auschwitz, according to Fleming.[aa] The Polish Interior Ministry prepared a report, Sprawozdanie 6/42, which said at the end:\nThere are different methods of execution. People are shot by firing squads, killed by an \"air hammer\" /Hammerluft/, and poisoned by gas in special gas chambers. Prisoners condemned to death by the Gestapo are murdered by the first two methods. The third method, the gas chamber, is employed for those who are ill or incapable of work and those who have been brought in transports especially for the purpose /Soviet prisoners of war, and, recently Jews/.\nSprawozdanie 6/42 was sent to Polish officials in London by courier and had reached them by 12 November 1942, where it was translated into English and added to another, \"Report on Conditions in Poland\", dated 27 November. Fleming writes that the latter was sent to the Polish Embassy in the United States. On 10 December 1942, the Polish Foreign Affairs Minister, Edward Raczyński, addressed the fledgling United Nations on the killings; the address was distributed with the title The Mass Extermination of Jews in German Occupied Poland. He told them about the use of poison gas; about Treblinka, Bełżec and Sobibór; that the Polish underground had referred to them as extermination camps; and that tens of thousands of Jews had been killed in Bełżec in March and April 1942. One in three Jews in Poland were already dead, he estimated, from a population of 3,130,000. Raczyński's address was covered by the New York Times and The Times of London. Winston Churchill received it, and Anthony Eden presented it to the British cabinet. On 17 December 1942, 11 Allies issued the Joint Declaration by Members of the United Nations condemning the \"bestial policy of cold-blooded extermination\".\nThe British and American governments were reluctant to publicize the intelligence they had received. A BBC Hungarian Service memo, written by Carlile Macartney, a BBC broadcaster and senior Foreign Office adviser on Hungary, stated in 1942: \"We shouldn't mention the Jews at all.\" The British government's view was that the Hungarian people's antisemitism would make them distrust the Allies if their broadcasts focused on the Jews. The US government similarly feared turning the war into one about the Jews; antisemitism and isolationism were common in the US before its entry into the war. Although governments and the German public appear to have understood what was happening, it seems the Jews themselves did not. According to Saul Friedländer, \"[t]estimonies left by Jews from all over occupied Europe indicate that, in contradistinction to vast segments of surrounding society, the victims did not understand what was ultimately in store for them.\" In Western Europe, he writes, Jewish communities seem to have failed to piece the information together, while in Eastern Europe, they could not accept that the stories they had heard from elsewhere would end up applying to them too.\nHolocaust in Hungary\nThe SS liquidated most of the Jewish ghettos of the General Government area of Poland in 1942–1943 and shipped their populations to the camps for extermination. The only exception was the Lodz Ghetto, which was not liquidated until mid-1944. About 42,000 Jews in the General Government were shot during Operation Harvest Festival (Aktion Erntefest) on 3–4 November 1943. At the same time, rail shipments were arriving regularly from western and southern Europe at the extermination camps. Shipments of Jews to the camps had priority on the German railways over anything but the army's needs, and continued even in the face of the increasingly dire military situation at the end of 1942. Army leaders and economic managers complained about this diversion of resources and the killing of skilled Jewish workers, but Nazi leaders rated ideological imperatives above economic considerations.\nBy 1943 it was evident to the armed forces leadership that Germany was losing the war. The mass murder continued nevertheless, reaching a \"frenetic\" pace in 1944 when Auschwitz gassed nearly 500,000 people. On 19 March 1944, Hitler ordered the military occupation of Hungary and dispatched Adolf Eichmann to Budapest to supervise the deportation of the country's Jews. From 22 March Jews were required to wear the yellow star; were forbidden from owning cars, bicycles, radios or telephones; and were later forced into ghettos. Between 15 May and 9 July, 437,000 Jews were deported from Hungary to Auschwitz II-Birkenau, almost all sent directly to the gas chambers.[ab] A month before the deportations began, Eichmann offered through an intermediary, Joel Brand, to exchange one million Jews for 10,000 trucks and other goods from the Allies, which he said the Germans would undertake not to use on the Western front; Eichmann reportedly called the offer \"blood for goods\". The British got wind of the proposal and scuppered it by leaking it to the press. The Times called it \"a new level of fantasy and self-deception\".\nBy mid-1944 Jewish communities within easy reach of the Nazi regime had largely been exterminated. On 5 May 1944 Himmler told Army officers that \"the Jewish question has in general been solved in Germany and in the countries occupied by Germany.\" As the Soviet armed forces advanced, the camps in eastern Poland were closed down, and efforts were made to conceal what had happened. The gas chambers were dismantled, the crematoria dynamited, and the mass graves dug up and corpses cremated. From January to April 1945, the SS sent inmates westward on \"death marches\" to camps in Germany and Austria. In January 1945, the Germans held records of 714,000 inmates in concentration camps; by May, 250,000 (35 percent) had died during death marches. Already sick after months or years of violence and starvation, they were marched to train stations and transported for days at a time without food or shelter in open freight cars, then forced to march again at the other end to the new camp. Some went by truck or wagons; others were marched the entire distance to the new camp. Those who lagged behind or fell were shot.\nThe first major camp to be encountered by Allied troops, Majdanek, was discovered by the advancing Soviets, along with its gas chambers, on 25 July 1944. Treblinka, Sobibór, and Bełżec were never liberated, but were destroyed by the Germans in 1943. Auschwitz was liberated, also by the Soviets, on 27 January 1945, where they found 7,000 inmates in the three main camps and 500 in subcamps. Buchenwald was liberated by the Americans on 11 April; Bergen-Belsen by the British on 15 April; Dachau by the Americans on 29 April; Ravensbrück by the Soviets on 30 April; and Mauthausen by the Americans on 5 May. The Red Cross took control of Theresienstadt on 3 May, days before the Soviets arrived.\nThe British 11th Armoured Division found around 60,000 prisoners (90 percent Jews) when they liberated Bergen-Belsen, as well as 13,000 unburied corpses; another 10,000 people died from typhus or malnutrition over the following weeks. The BBC's war correspondent Richard Dimbleby described the scenes that greeted him and the British Army at Belsen, in a report so graphic the BBC declined to broadcast it for four days, and did so, on 19 April, only after Dimbleby threatened to resign. He said he had \"never seen British soldiers so moved to cold fury\":\nHere over an acre of ground lay dead and dying people. You could not see which was which. ... The living lay with their heads against the corpses and around them moved the awful, ghostly procession of emaciated, aimless people, with nothing to do and with no hope of life, unable to move out of your way, unable to look at the terrible sights around them ... Babies had been born here, tiny wizened things that could not live. A mother, driven mad, screamed at a British sentry to give her milk for her child, and thrust the tiny mite into his arms. ... He opened the bundle and found the baby had been dead for days. This day at Belsen was the most horrible of my life.— Richard Dimbleby, 15 April 1945\n|Country||Death toll of Jews[ac]|\nThe Jews killed represented around one third of world Jewry and about two-thirds of European Jewry, based on an estimate of 9.7 million Jews in Europe at the start of the war. According to the Yad Vashem Holocaust Martyrs' and Heroes' Remembrance Authority in Jerusalem, \"[a]ll the serious research\" confirms that between five and six million Jews died. Early postwar calculations were 4.2 to 4.5 million from Gerald Reitlinger; 5.1 million from Raul Hilberg; and 5.95 million from Jacob Lestschinsky. In 1990 Yehuda Bauer and Robert Rozett estimated 5.59–5.86 million, and in 1991 Wolfgang Benz suggested 5.29 to just over 6 million.[ad] The figures include over one million children. Much of the uncertainty stems from the lack of a reliable figure for the number of Jews in Europe in 1939, border changes that make double-counting of victims difficult to avoid, lack of accurate records from the perpetrators, and uncertainty about whether to include post-liberation deaths caused by the persecution.\nThe death camps in occupied Poland accounted for half the number of Jews killed. At Auschwitz the Jewish death toll was 960,000; Treblinka 870,000; Bełżec 600,000; Chełmno 320,000; Sobibór 250,000; and Majdanek 79,000.\nDeath rates were heavily dependent on the survival of European states to protect their Jewish citizens. In countries allied to Germany, the control over Jewish citizens was sometimes seen as a matter of sovereignty; the continuous presence of state institutions prevented the Jewish communities' complete destruction. In occupied countries, the survival of the state was likewise correlated with lower Jewish death rates: 75 percent of Jews died in the Netherlands, as did 99 percent of Jews who were in Estonia when the Germans arrived—the Nazis declared Estonia Judenfrei (\"free of Jews\") in January 1942 at the Wannsee Conference—while 75 percent survived in France and 99 percent in Denmark.\nThe survival of Jews in countries where states survived demonstrates, writes Christian Gerlach, \"that there were limits to German power\", and that the influence of non-Germans—governments and others—was \"crucial\". Jews who lived where pre-war statehood was destroyed (Poland and the Baltic states) or displaced (western USSR) were at the mercy of both German power and sometimes hostile local populations. Almost all Jews living in German-occupied Poland, Baltic states and the USSR were killed, with a 5 percent chance of survival on average. Of Poland's 3.3 million Jews, about 90 percent were killed.\nOther victims of Nazi persecution\nSoviet civilians and POWs\nThe Nazis regarded the Slavs as Untermenschen (subhuman). German troops destroyed villages throughout the Soviet Union, rounded up civilians for forced labor in Germany, and caused famine by taking foodstuffs. In Belarus, Germany imposed a regime that deported around 380,000 people for slave labor and killed hundreds of thousands. Over 600 villages had their populations killed, and at least 5,295 Belarusian settlements were destroyed. According to Timothy Snyder, of the nine million people in Soviet Belarus in 1941, \"around 1.6 million were killed by the Germans in actions away from battlefields, including about 700,000 prisoners of war, 500,000 Jews, and 320,000 people counted as partisans (the vast majority of whom were unarmed civilians).\" The United States Holocaust Memorial Museum estimates that 3.3 million of 5.7 million Soviet POWs died in German custody. The death rates decreased as the POWs were needed to help the German war effort; by 1943, half a million had been deployed as slave labor. Adolf Hitler ordered the destruction of besieged Leningrad, along with all of its inhabitants. These intentions were part of the genocidal Generalplan Ost, which called for the extermination, Germanization, expulsion into areas east of the Urals and enslavement of most or all Russians, Ukrainians and Belarusians for the purpose of providing more living space for the German people.\n|Soviet civilians (excl. 1.3 million Jews)||5.7 million|||\n|Soviet POWs (incl. c. 50,000 Jewish soldiers)||3 million|||\n|Non-Jewish Poles||c. 1.8 million|||\n|Disabled||Up to 250,000|||\n|Jehovah's Witnesses||c. 1,900|||\n|Criminals and \"asocials\"||at least 70,000|||\n|Gay men||Hundreds; unknown|||\n|Political opponents, resistance||Unknown|||\nSocial contact between Poles and Germans in the occupied areas was forbidden, and Hitler made clear that Polish workers were to be kept in what Robert Gellately called a \"permanent condition of inferiority\". In a memorandum to Hitler dated 25 May 1940, \"A Few Thoughts on the Treatment of the Ethnically Alien Population in the East\", Himmler stated that it was in German interests to foster divisions between the ethnic groups in the East. He wanted to restrict non-Germans in the conquered territories to an elementary-school education that would teach them how to write their names, count up to 500, work hard, and obey Germans. The Polish political class became the target of a campaign of murder (Intelligenzaktion and AB-Aktion). Between 1.8 and 1.9 million non-Jewish Polish citizens perished at German hands during the course of the war; about four-fifths were ethnic Poles and the rest Ukrainians and Belarusians. At least 200,000 died in concentration camps, around 146,000 in Auschwitz. Others died in massacres or in uprisings such as the Warsaw Uprising, where 120,000–200,000 were killed. Polish children were also kidnapped by Germans to be \"Germanized\".\nGermany and its allies killed up to 220,000 Roma, around 25 percent of the community in Europe, in what the Romani people call the Pořajmos. Robert Ritter, head of the Rassenhygienische und Bevolkerungsbiologische Forschungsstelle called them \"a peculiar form of the human species who are incapable of development and came about by mutation\". In May 1942 they were placed under similar laws to the Jews, Bauer writes, and in December Himmler ordered that \"Gypsy Mischlinge [mixed breeds], Roma Gypsies, and members of the clans of Balkan origins who are not of German blood\" be sent to Auschwitz, unless they had served in the Wehrmacht. Himmler adjusted the order on 15 November 1943; in the occupied Soviet areas, \"sedentary Gypsies and part-Gypsies are to be treated as citizens of the country. Nomadic Gypsies and part-Gypsies are to be placed on the same level as Jews and placed in concentration camps.\" Yehuda Bauer writes that this adjustment reflected Nazi ideology that the Roma, originally an Aryan population, had been \"spoiled\" by non-Romani blood. In Belgium, France and the Netherlands, the Roma were subject to restrictions on movement and confinement to collection camps, while in Eastern Europe they were sent to concentration camps, where large numbers were murdered. In the camps, they were usually counted among the asocials and required to wear brown or black triangles on their prison clothes. During the invasion of the Soviet Union, they were targeted by the Einsatzgruppen, although to a lesser extent than the Jews; up to 1,000 are thought to have been murdered by Einsatzgruppen H in Slovakia. After the Germans occupied Hungary in 1944, 1,000 Roma were deported to Auschwitz. The Roma were also targeted by Germany's allies, such as the Ustaše in Croatia, where a large number were killed in the Jasenovac concentration camp; the total killed in Croatia numbered around 28,000.\nPolitical and religious opponents\nGerman communists, socialists and trade unionists were among the earliest opponents of the Nazis and among the first to be sent to concentration camps. Nacht und Nebel (\"Night and Fog\"), a directive from Hitler in December 1941, resulted in the disappearance of political activists throughout the German-occupied territories. Because they refused to pledge allegiance to the Nazi party or serve in the military, Jehovah's Witnesses were sent to concentration camps, where they were identified by purple triangles and given the option of renouncing their faith and submitting to the state's authority. The United States Holocaust Memorial Museum estimates that between 2,700 and 3,300 were sent to the camps, where 1,400 died. According to German historian Detlef Garbe, \"no other religious movement resisted the pressure to conform to National Socialism with comparable unanimity and steadfastness.\"\nAround 100,000 gay men were arrested in Germany and 50,000 jailed between 1933 and 1945; 5,000–15,000 are thought to have been sent to concentration camps, where they were identified by a pink triangle on their camp clothes. It is not known how many died. Hundreds were castrated, sometimes \"voluntarily\" to avoid criminal sentences. In 1936 Himmler created the Reich Central Office for the Combating of Homosexuality and Abortion. The police closed gay bars and shut down gay publications. Lesbians were left relatively unaffected; the Nazis saw them as \"asocials\", rather than sexual deviants.\nThe number of Afro-Germans in Germany when the Nazis came to power is variously estimated at 5,000–25,000. It is not clear whether these figures included Asians. Although blacks in Germany and German-occupied Europe, including prisoners of war, were subjected to incarceration, sterilization and murder, there was no programme to kill them as a group.\nThe Nuremberg trials were a series of military tribunals, held after the war by the Allies in Nuremberg, Germany, to prosecute the German leadership. The first was the 1945–1946 trial of 22 political and military leaders before the International Military Tribunal. Adolf Hitler, Heinrich Himmler, and Joseph Goebbels had committed suicide several months earlier. The prosecution entered indictments against 24 men (two of the indictments were dropped before the end of the trial)[ae] and seven organizations: the Reich Cabinet, the Schutzstaffel (SS), Sicherheitsdienst (SD), the Gestapo, the Sturmabteilung (SA) and the \"General Staff and High Command\". The indictments were for participation in a common plan or conspiracy for the accomplishment of a crime against peace; planning, initiating and waging wars of aggression and other crimes against peace; war crimes; and crimes against humanity. The tribunal passed judgements ranging from acquittal to death by hanging. Eleven defendants were executed, including Joachim von Ribbentrop, Wilhelm Keitel, Alfred Rosenberg, and Alfred Jodl. Ribbentrop, the judgement declared, \"played an important part in Hitler's 'final solution of the Jewish question'\".\nFurther trials at Nuremberg took place between 1946 and 1949, which tried another 185 defendants. West Germany initially tried few ex-Nazis, but after the 1958 Ulm Einsatzkommando trial, the government set up a governmental agency to investigate crimes. Other trials of Nazis and collaborators took place in Western and Eastern Europe. In 1960 Mossad agents captured Adolf Eichmann in Argentina and brought him to Israel to stand trial on 15 indictments, including war crimes, crimes against humanity, and crimes against the Jewish people. He was convicted in December 1961 and executed in June 1962. Eichmann's trial and death revived interest in war criminals and the Holocaust in general.\nThe government of Israel requested $1.5 billion from the Federal Republic of Germany in March 1951 to finance the rehabilitation of 500,000 Jewish survivors, arguing that Germany had stolen $6 billion from the European Jews. Israelis were divided about the idea of taking money from Germany. The Conference on Jewish Material Claims Against Germany (known as the Claims Conference) was opened in New York, and after negotiations the claim was reduced to $845 million.\nWest Germany allocated another $125 million for reparations in 1988. Companies such as BMW, Deutsche Bank, Ford, Opel, Siemens, and Volkswagen faced lawsuits for their use of forced labor during the war. In response, Germany set up the \"Remembrance, Responsibility and Future\" Foundation in 2000, which paid €4.45 billion to former slave laborers (up to €7,670 each). In 2013 Germany agreed to provide €772 million to fund nursing care, social services, and medication for 56,000 Holocaust survivors around the world. The French state-owned railway company, the SNCF, agreed in 2014 to pay $60 million to Jewish-American survivors, around $100,000 each, for its role in the transport of 76,000 Jews from France to extermination camps between 1942 and 1944.\nHistorikerstreit, uniqueness question\nIn the early decades of Holocaust studies, scholars approached the Holocaust as a genocide that was unique in its reach and specificity; as Nora Levin put it, \"[t]he world of Auschwitz was, in truth, a new planet.\" This approach was questioned in the 1980s during the West German Historikerstreit (\"historians' dispute\"), an attempt to re-position the Holocaust within German historiography.[af]\nErnst Nolte triggered the Historikerstreit in June 1986 with an article in the conservative newspaper Frankfurter Allgemeine Zeitung: \"The past that will not pass: A speech that could be written but no longer delivered\".[ag] Rather than being studied in the same way as any other historical event, Nolte wrote, the Nazi era was suspended like a sword over Germany's present. He compared the idea of \"the guilt of the Germans\" to the Nazi idea of \"the guilt of the Jews\", and argued that the focus on the Final Solution overlooked the Nazi's euthanasia program and treatment of Soviet POWs, as well as post-war issues such as the wars in Vietnam and Afghanistan. Comparing Auschwitz to the Gulag, he suggested that the Holocaust was a response to Hitler's fear of the Soviet Union: \"Did the Gulag Archipelago not precede Auschwitz? Was the Bolshevik murder of an entire class not the logical and factual prius of the 'racial murder' of National Socialism? ... Was Auschwitz perhaps rooted in a past that would not pass?\"[ah]\nNolte's arguments were viewed as an attempt to normalize the Holocaust; one of the debate's key questions, according to historian Ernst Piper, was whether history should \"'historicize' or 'moralize'\". Addressing Nolte's argument in September 1986 in the left-leaning Die Zeit, Eberhard Jäckel responded that \"never before had a state, with the authority of its leader, decided and announced that a specific group of humans, including the elderly, women, children and infants, would be killed as quickly as possible, then carried out this resolution using every possible means of state power.\"[h] In her book Denying the Holocaust (1993), Deborah Lipstadt viewed Nolte's \"invalid historical comparisons\" as a form of Holocaust denial \"designed to help Germans embrace their past by telling them that their country's actions were no different than those of countless others ...\"\nDespite the criticism of Nolte, Dan Stone wrote in 2010 that the Historikerstreit put \"the question of comparison\" on the agenda. He argued that the idea of the Holocaust as unique has been overtaken by attempts to place it within the context of Stalinism, ethnic cleansing, and the Nazis' intentions for post-war \"demographic reordering\", particularly the Generalplan Ost, the plan to kill tens of millions of Slavs to create living space for Germans. Jäckel's position continued nevertheless to inform the views of many specialists. Richard J. Evans argued in 2015:\nThus although the Nazi 'Final Solution' was one genocide among many, it had features that made it stand out from all the rest as well. Unlike all the others it was bounded neither by space nor by time. It was launched not against a local or regional obstacle, but at a world-enemy seen as operating on a global scale. It was bound to an even larger plan of racial reordering and reconstruction involving further genocidal killing on an almost unimaginable scale, aimed, however, at clearing the way in a particular region – Eastern Europe – for a further struggle against the Jews and those the Nazis regarded as their puppets. It was set in motion by ideologues who saw world history in racial terms. It was, in part, carried out by industrial methods. These things all make it unique.— Richard Evans, \"Was the 'Final Solution' Unique?\", The Third Reich in History and Memory.\nIn September 2018, an online CNN–ComRes poll of 7,092 adults in seven European countries—Austria, France, Germany, Great Britain, Hungary, Poland, and Sweden—found that one in 20 had never heard of the Holocaust. The figure included one in five people in France aged 18–34. Four in 10 Austrians said they knew \"just a little\" about it; 12 percent of young people there said they had never heard of it. A 2018 survey in the United States found that 22 percent of 1,350 adults said they had never heard of it, while 41 percent of Americans and 66 percent of millennials did not know what Auschwitz was. In 2019 a survey of 1,100 Canadians found that 49 percent could not name any of the concentration camps.\n- Matt Brosnan (Imperial War Museum, 2018): \"The Holocaust was the systematic murder of Europe's Jews by the Nazis and their collaborators during the Second World War.\" Jack R. Fischel (Historical Dictionary of the Holocaust, 2010): \"The Holocaust refers to the Nazi objective of annihilating every Jewish man, woman, and child who fell under their control.\" Peter Hayes (How Was It Possible? A Holocaust Reader, 2015): \"The Holocaust, the Nazi attempt to eradicate the Jews of Europe ... Hitler's ideology depicted the Jews as uniquely dangerous to Germany and therefore uniquely destined to disappear completely from the Reich and all territories subordinate to it. The threat posted by supposedly corrupting but generally powerless Sinti and Roma was far less, and therefore addressed inconsistently in the Nazi realm. Gay men were defined as a problem only if they were German or having sex with Germans and considered 'curable' in most cases. ... Germany's murderous intent toward the handicapped ... was more comprehensive ... but here, too, implementation was uneven .... Not only were some Slavs—Slovaks, Croats, Bulgarians, some Ukrainians—allotted a favored place in Hitler's New Order, but the fate of most of the other Slavs the Nazis derided as sub-humans ... consisted of enslavement and gradual attrition, not the prompt massacre meted out to the Jews after 1941.\" Holocaust Memorial Day Trust, UK (2019): \"The Holocaust (The Shoah in Hebrew) was the attempt by the Nazis and their collaborators to murder all the Jews in Europe.\" Ronnie S. Landau (The Nazi Holocaust: Its History and Meaning, 1992): \"The Holocaust involved the deliberate, systematic murder of approximately 6 million Jews in Nazi-dominated Europe between 1941 and 1945.\" Timothy D. Snyder (Bloodlands: Europe Between Hitler and Stalin, 2010): \"In this book the term Holocaust signifies the final version of the Final Solution, the German policy to eliminate the Jews of Europe by murdering them. Although Hitler certainly wished to remove the Jews from Europe in a Final Solution earlier, the Holocaust on this definition begins in summer 1941, with the shooting of Jewish women and children in the occupied Soviet Union. The term Holocaust is sometimes used in two other ways: to mean all German killing policies during the war, or to mean all oppression of Jews by the Nazi regime. In this book, Holocaust means the murder of the Jews in Europe, as carried out by the Germans by guns and gas between 1941 and 1945.\" Dan Stone (Histories of the Holocaust, 2010): \"'Holocaust' ... refers to the genocide of the Jews, which by no means excludes an understanding that other groups—notably Romanies and Slavs—were victims of genocide.\" United States Holocaust Memorial Museum (Holocaust Encyclopedia, 2017): \"The Holocaust was the systematic, bureaucratic, state-sponsored persecution and murder of six million Jews by the Nazi regime and its collaborators.\"\n- Hebrew: השואה, HaShoah, \"the catastrophe\"\n- United States Holocaust Memorial Museum: \"Six million Jews died in the Holocaust. ... According to the American Jewish Yearbook, the Jewish population of Europe was about 9.5 million in 1933. ... By 1945, most European Jews—two out of every three—had been killed.\"\n- Dan Stone (Histories of the Holocaust, 2010): \"Europe's Romany (Gypsy) population was also the victim of genocide under the Nazis. Many other population groups, notably Poles, Ukrainians, and Soviet prisoners of war were killed in huge numbers, and smaller groups such as Jehovah's Witnesses, Black Germans, and homosexuals suffered terribly under Nazi rule. The evidence suggests that the Slav nations of Europe were also destined, had Germany won the war, to become victims of systematic mass murder; and even the terrible brutality of the occupation in eastern Europe, especially in Poland, can be understood as genocidal ... Part of the reason for today's understanding, though, is a correct assessment of the fact that for the Nazis the Jews were regarded in a kind of 'metaphysical' way; they were not just considered as racially inferior (like Romanies), deviants (like homosexuals) or enemy nationals standing in the way of German colonial expression (like Slavs). ... [T]he Jews were to some extent outside of the racial scheme as defined by racial philosophers and anthropologists. They were not mere Untermenschen (sub-humans) ... but were regarded as a Gegenrasse: \"a 'counter-race', that is to say, not really human at all. ... 'Holocaust', then, refers to the genocide of the Jews, which by no means excludes an understanding that other groups—notably Romanies and Slavs—were victims of genocide. Indeed ... the murder of the Jews, although a project in its own right, cannot be properly historically situated without understanding the 'Nazi empire' with its grandiose demographic plans.\"\n- Oxford Dictionaries (2017): \"from Old French holocauste, via late Latin from Greek holokauston, from holos 'whole' + kaustos 'burnt' (from kaiein 'burn')\".\nThe Century Dictionary (1904): \"a sacrifice or offering entirely consumed by fire, in use among the Jews and some pagan nations. Figuratively, a great slaughter or sacrifice of life, as by fire or other accident, or in battle.\"\n- The term shoah was used in a pamphlet in 1940, Sho'at Yehudei Polin (\"Sho'ah of Polish Jews\"), published by the United Aid Committee for the Jews in Poland.\n- The Hebrew word churban is used by many Orthodox Jews to refer to the Holocaust.\n- Eberhard Jäckel (Die Zeit, 12 September 1986): \"Ich behaupte ... daß der nationalsozialistische Mord an den Juden deswegen einzigartig war, weil noch nie zuvor ein Staat mit der Autorität seines verantwortlichen Führers beschlossen und angekündigt hatte, eine bestimmte Menschengruppe einschließlich der Alten, der Frauen, der Kinder und der Säuglinge möglichst restlos zu töten, und diesen Beschluß mit allen nur möglichen staatlichen Machtmitteln in die Tat umsetzte.\" (\"I maintain ... that the National Socialist killing of the Jews was unique in that never before had a state with the authority of its leader decided and announced that a specific group of humans, including the elderly, the women, the children and the infants, would be killed as quickly as possible, and then carried out this resolution using every possible means of state power.\")\n- Dan Stone (Histories of the Holocaust, 2010): \"There was no greater symbol of the degenerate modernity that Nazism rejected than 'the Jew', especially 'the international Jew', the supposed string-puller behind the British and American democracies as well as the communist USSR ... the Jews—'rootless cosmopolitans', in the communist parlance—were quick to be targeted ... The Holocaust, then, was a transitional phenomenon, not just because Jews lived everywhere in Europe but because many European states ... took upon themselves the task of solving the Jewish question ... One could talk of a transnational Holocaust, but a more appropriate term would be Holocausts. ... As Marrus noted of western Europe [The Holocaust in History, 1987, p. 70], 'the Nazis relied on local agencies to prepare the Jews for their own destruction. Remarkably few Germans were available for such work.' In eastern Europe too, the Nazis' task would have been considerably harder were it not for local assistance.\"\n- The full extent of Mengele's work is unknown because records he sent to Otmar Freiherr von Verschuer are assumed to have been destroyed.\n- The French had planned to try Grynszpan for murder, but the German invasion in 1940 interrupted the proceedings. Grynszpan was handed over to the Germans and his fate is unknown.\n- David Cesarani (2016): \"The absence of consistency with regards to ghettos can be traced back to a fundamental confusion over means and ends. Were Jews to be expelled, placed in ghettos, or put to death? Until October 1941, the hope was that Jews would be expelled into Siberia after the end of hostilities.\"\n- Peter Longerich (Holocaust: The Nazi Persecution and Murder of the Jews, 2010): \"Pogroms that can be proved to have been initiated by the Germans were above all carried out by Einsatzgruppe C in the Ukraine. In Lvov (Lemberg), where the NKVD (the Soviet People's Commissariat for Internal Affairs) had shot some 3,500 prisoners at the end of June and bloodily suppressed an attempted uprising by the OUN, pogroms were started by the indigenous population on 30 June, the day of the city's occupation by German troops. They were probably initiated by the OUN and its militia. It is likely, however, that a special unit of the Wehrmacht played a key role in triggering this pogrom when it entered the city as an advance guard together with a battalion of Ukrainian nationalists under its command. The pogroms cost at least 4,000 lives and were finally ended by the Wehrmacht on 2 July after it had spent two days observing but not intervening. At that point, however, Einsatzgruppe C took over the organization of murderous activities: over the next few days, by way of 'retribution' for the murders committed by the NKVD, three Einsatzgruppe C commandos that had entered the city murdered 2,500 to 3,500 Jews. At the end of July, Ukrainian groups took back the initiative and were responsible for a further pogrom for which support from the German Special Purposes Commando was probably decisive once again. During the so-called 'Petljura Days' more than 2,000 Jews were murdered in Lviv.\"\n- A long debate about the Jedwabne pogrom was triggered in 2001 by the publication of Jan T. Gross's book Neighbors: The Destruction of the Jewish Community in Jedwabne, Poland.\n- Ten days after the invasion, Reinhard Heydrich laid out, in a memorandum, the guidelines he had issued to the Einsatzgruppen: \"All the following are to be executed: Officials of the Comintern (together with professional Communist politicians in general; top and medium-level officials and radical lower-level officials of the Party, Central Committee and district and sub-district committees; People's Commissars; Jews in the Party and State employment, and other radical elements (saboteurs, propagandists, snipers, assassins, inciters etc.) ... No steps will be taken to interfere with any purges that may be initiated by anti-Communist or anti-Jewish elements ... On the contrary, these are to be secretly encouraged.\" Cesarani writes that it is \"noteworthy that Heyrich did not want the SS to be held responsible\".\n- Nikolaus Wachsmann (2015): \"The genesis of the Holocaust was lengthy and complex. The days are long gone when historians believed that it could be reduced to a single decision taken on a single day by Hitler. Instead, the Holocaust was the culmination of a dynamic murderous process, propelled by increasingly radical initiatives from above and below. During World War II, the Nazi pursuit of a Final Solution moved from increasingly lethal plans for Jewish 'reservations' to immediate extermination. There were several key periods of radicalization. The invasion of the Soviet Union in June 1941 marked one such moment, as mass shootings of Jewish men of military age soon grew into widespread ethnic cleansing, with daily bloodbaths of women, children, and the elderly.\"\n- \"Už odbilo Židom! Najprísnejšie rasové zákony na Židov sú slovenské\"\n- Those present included (annotated, left to right): Joseph Goebbels, Wilhelm Frick, Wilhelm Keitel, Walter von Brauchitsch, Erich Raeder, Joachim von Ribbentrop, Alfred Rosenberg, Adolf Hitler, and Hermann Göring.\n- Joseph Goebbels (13 December 1941): \"Regarding the Jewish question, the Fuhrer is determined to clear the table. He warned the Jews that if they were to cause another world war, it would lead to their own destruction. Those were not empty words. Now the world war has come. The destruction of the Jews must be its necessary consequence. We cannot be sentimental about it. It is not for us to feel sympathy for the Jews. We should have sympathy rather with our own German people. If the German people have to sacrifice 160,000 victims in yet another campaign in the east, then those responsible for this bloody conflict will have to pay for it with their lives.\"\n- Frank continued by discussing their deportation, then asked: \"But what is to happen to the Jews? ... In Berlin we were told \"Why all this trouble? We cannot use them in the Ostland or the Reichskommissariat either; liquidate them yourselves!\" Gentlemen, I must ask you, arm yourselves against any thoughts of compassion. We must destroy the Jews, wherever we encounter them and whenever it is possible, in order to preserve the entire structure of the Reich. ... We have an estimated 2.5 million Jews in the General Government, perhaps with the half-Jews and all that that entails some 3.5 million. We cannot shoot these 3.5 million Jews, we cannot poison them, but nonetheless we will take some kind of action that will lead to a successful destruction ... The General Government must become just as free of Jews as the Reich.\"\n- Wannsee Conference attendees: Josef Bühler, Adolf Eichmann, Roland Freisler, Reinhard Heydrich, Otto Hofmann, Gerhard Klopfer, Friedrich Wilhelm Kritzinger, Rudolf Lange, Georg Leibbrandt, Martin Luther, Heinrich Müller, Erich Neumann, Karl Eberhard Schöngarth, Wilhelm Stuckart\n- Wannsee-Protokoll: \"Diese Aktionen sind jedoch lediglich als Ausweichmöglichkeiten anzusprechen, doch werden hier bereits jene praktischen Erfahrungen gesammelt, die im Hinblick auf die kommende Endlösung der Judenfrage von wichtiger Bedeutung sind.\"\nTranslation, Avalon Project: \"These actions are, however, only to be considered provisional, but practical experience is already being collected which is of the greatest importance in relation to the future final solution of the Jewish question.\"\n- Franciszek Piper used timetables of train arrivals combined with deportation records to calculate that, of the 1.3 million deported to Auschwitz, 1,082,000 died there between 1940 and 1945, a figure (rounded up to 1.1 million) that he regarded as a minimum.\n- Auschwitz I contained crematorium I, which stopped operating in July 1943. Auschwitz II contained crematoria II–V.\n- Auschwitz I also had a gas chamber; gassing there, of non-Jewish Poles and Soviet POWs, began in August 1941.\n- French Jews were active in the French Resistance. Zionist Jews formed the Armee Juive (Jewish Army), which participated in armed resistance under a Zionist flag, smuggled Jews out of the country, and participated in the liberation of Paris and other cities. As many as 1.5 million Jewish soldiers fought in the Allied armies, including 500,000 in the Red Army, 550,000 in the U.S. Army, 100,000 in the Polish army, and 30,000 in the British army. About 200,000 Jewish soldiers serving in the Red Army died in the war, either in combat or after capture. The Jewish Brigade, a unit of 5,000 Jewish volunteers from the British Mandate of Palestine, fought in the British Army.\n- Michael Fleming (2014): \"As is evidenced by the reports that reached Warsaw, the resistance movement in the camp was well aware of what was happening to the Jews, and in a report dated 1 July 1942 advised that from June 1941 Soviet prisoners of war were taken straight from trains to the gas chambers. This report also noted that through 1942 around 30,000 Jewish men and 15,000 Jewish women and children had arrived at Oświęcim, most of whom—including all the children—were gassed immediately. The exact date that this information was received in Warsaw is not known, but it was included as an attachment to an internal Home Army report ... on 28 September 1942 and the Underground leadership in Warsaw incorporated this information into the situation report for the period from 26 August to 10 October 1942. [This document and 23 other reports] ... did not reach London until late winter 1943.\"\n- Longerich (2010) gives the figure as 437,000; Braham (2011) and the USHMM as 440,000.\n- \"Estimate of Jews killed in the Holocaust, by country of residence at the time of deportation or death\". Figures from Harvey Schulweis, citing Wolfgang Benz, Jean Ancel, and Yitzak Arad.\n- Yad Vashem: \"There is no precise figure for the number of Jews killed in the Holocaust. The figure commonly used is the six million quoted by Adolf Eichmann, a senior SS official. All the serious research confirms that the number of victims was between five and six million. Early calculations range from 5.1 million (Professor Raul Hilberg) to 5.95 million (Jacob Leschinsky). More recent research, by Professor Yisrael Gutman and Dr. Robert Rozett in the Encyclopedia of the Holocaust, estimates the Jewish losses at 5.59–5.86 million, and a study headed by Dr. Wolfgang Benz presents a range from 5.29 million to six million.\"The main sources for these statistics are comparisons of prewar censuses with postwar censuses and population estimates. Nazi documentation containing partial data on various deportations and murders is also used. We estimate that Yad Vashem currently has somewhat more than 4.2 million names of victims that are accessible.\"\n- Robert Ley committed suicide in prison, and Gustav Krupp was judged unfit for trial.\n- The debate was preceded by the 40th anniversary in May 1985 of the end of World War II, and by President Ronald Reagan's visit that month to a German military cemetery at the suggestion of Chancellor Helmut Kohl, leading to the so-called Bitburg controversy.\n- Nolte had delivered a similar lecture to the Carl-Friedrich-Siemens-Stiftung in Munich, published in abridged form as \"Die negative Lebendigkeiet des Dritten Reiches. Eine Frage aus dem Blickwinkel des Jahres 1980\" in the Frankfurter Allgemeine Zeitung on 24 July 1980.\nThe speech that could not be delivered referred to a lecture Nolte had planned to give to the Römerberg-Gesprächen (Römerberg Colloquium) in Frankfurt; he said his invitation had been withdrawn, which the organizers disputed. At that point, his lecture had the title \"The Past That Will Not Pass: To Debate or to Draw the Line?\".\n- \"War nicht der 'Archipel Gulag' ursprünglicher als 'Auschwitz'? War nicht der 'Klassenmord' der Bolschewiki das logische und faktische Prius des 'Rassenmords' der Nationalsozialisten? Sind Hitlers geheimste Handlungen nicht gerade auch dadurch zu erklären, daß er den 'Rattenkäfig' nicht vergessen hatte? Rührte Auschwitz vielleicht in seinen Ursprüngen aus einer Vergangenheit her, die nicht vergehen wollte?\"\n- \"Deportation of Hungarian Jews\". Timeline of Events. United States Holocaust Memorial Museum. Archived from the original on 25 November 2017. Retrieved 6 October 2017.\n- Landau 2016, p. 3.\n- \"Documenting Numbers of Victims of the Holocaust and Nazi Persecution\". United States Holocaust Memorial and Museum. 4 February 2019. Archived from the original on 9 March 2019.\n- \"Remaining Jewish Population of Europe in 1945\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 13 June 2018.\n- \"Killing Centers: An Overview\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 14 September 2017.\n- For the date, see Marcuse 2001, p. 21.\n- Stackelberg & Winkle 2002, pp. 141–143.\n- Gray 2015, p. 5.\n- Crowe 2008, p. 1.\n- \"Holocaust\". Oxford Dictionaries. Oxford University Press. Archived from the original on 5 October 2017. Retrieved 4 October 2017.\n- Whitney, William Dwight, ed. (1904). \"Holocaust\". The Century Dictionary and Cyclopedia. 4. Century. p. 2859. OCLC 222373761.\n- Gilad, Elon (1 May 2019). \"Shoah: How a Biblical Term Became the Hebrew Word for Holocaust\". Haaretz. Archived from the original on 1 December 2019.\n- Crowe 2008, p. 1; \"Holocaust\" (PDF). Holocaust Resource Center, Yad Vashem. Archived (PDF) from the original on 5 February 2018.\n\"The Holocaust: Definition and Preliminary Discussion\". Holocaust Resource Center, Yad Vashem. Archived from the original on 26 June 2015.\n- Fischel 2010, p. 115.\n- Meltzer, Julian (23 May 1943). \"Palestine Zionists Find Outlook Dark\". The New York Times. Archived from the original on 10 August 2018.\n- Lustigman & Lustigman 1994, p. 111.\n- Black 2016, p. 201.\n- Hilberg 2003, p. 1133.\n- Fischel 1998, p. 46.\n- Berenbaum 2006, p. xix.\n- Brosnan, Matt (12 June 2018). \"What Was The Holocaust?\". Imperial War Museum. Archived from the original on 2 March 2019. Retrieved 2 March 2019.\n- Hayes 2015, pp. xiii–xiv.\n- \"The Holocaust\". Holocaust Memorial Day Trust. Archived from the original on 10 February 2019.\n- Snyder 2010, p. 412.\n- Stone 2010, pp. 1–3.\n- \"Introduction to the Holocaust\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 1 October 2017. Retrieved 4 October 2017.\n- \"What was the Holocaust?\". Yad Vashem. Archived from the original on 2 March 2019. Retrieved 2 March 2019.\n- \"Senior Management Team: Dr. Michael Gray, Academic and Universities Director\". Harrow School. Archived from the original on 27 March 2018.\n- Gray 2015, p. 8.\n- Gray 2015, pp. 4–5; \"Introduction to the Holocaust\". United States Holocaust Memorial Museum. Archived from the original on 17 November 2019.\n- Gray 2015, p. 4.\n- Stone 2010, pp. 2–3.\n- Niewyk & Nicosia 2000, p. 52.\n- Berenbaum 2006, p. 103.\n- Jäckel, Eberhard (12 September 1986). \"Die elende Praxis der Untersteller\". Die Zeit. p. 3/8. Archived from the original on 30 April 2010.\n- Bauer 2002, p. 49.\n- Friedländer 2007, pp. 51–52.\n- Arad 1999, pp. 154–159.\n- Fischel 1998, p. 167.\n- Stone 2010, pp. 15–18.\n- Stone 2010, pp. 17–18.\n- \"Collaboration and Complicity during the Holocaust\". United States Holocaust Memorial Museum. 1 May 2015. Archived from the original on 5 May 2015.\n- Bloxham 2009, p. 130.\n- Gerlach 2016, p. 13.\n- United States Holocaust Memorial Museum 1996, p. 7.\n- Crowe 2008, p. 447.\n- Friedländer 2007, p. xxi.\n- Niewyk & Nicosia 2000, pp. 229–230.\n- Fisher 2001, pp. 410–414.\n- Hanauske-Abel 1996, p. 1453.\n- Müller-Hill 1999, p. 338.\n- Friedländer 2007, p. 505.\n- Müller-Hill 1999, pp. 340–342; Friedländer 2007, p. 505.\n- Müller-Hill 1999, p. 348; Lifton 2000, p. 358.\n- United States Holocaust Memorial Museum 1996, p. 14.\n- \"Jewish Population of Europe in 1933\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 15 December 2019.\n- United States Holocaust Memorial Museum 1996, p. 13.\n- Jones 2006, p. 148; Bergen 2016, pp. 14–17.\n- Fischer 2002, pp. 47–49.\n- Friedlander 1994, pp. 495–496.\n- Fischer 2002, p. 47.\n- \"Antisemitism in History: World War I\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 9 September 2015. Retrieved 1 September 2015.\n- Yahil 1990, pp. 41–43.\n- Bergen 2016, pp. 52–54.\n- Bergen 2016, p. 56.\n- \"Boycotts\". Educational Resources. Center for Holocaust and Genocide Studies, University of Minnesota. Archived from the original on 11 June 2007.\n- Fritzsche 2009, pp. 38–39.\n- Noakes & Pridham 1983, p. 499.\n- Wachsmann 2015, pp. 28–30.\n- Wachsmann 2015, pp. 32–38.\n- Marcuse 2001, p. 21.\n- Longerich 2012, p. 155.\n- Wachsmann 2015, pp. 84–86.\n- Wachsmann 2015, p. 5.\n- Friedländer 1997, p. 33.\n- Friedländer 1997, pp. 19–20.\n- Burleigh & Wippermann 2003, p. 78.\n- Friedländer 1997, pp. 32–33.\n- Friedländer 1997, p. 29.\n- Friedländer 1997, p. 134.\n- Evans 2005, pp. 158–159, 169.\n- Hanauske-Abel 1996, p. 1459.\n- \"Poster promoting the Nazi monthly publication Neues Volk\". Artifact Gallery. United States Holocaust Memorial Museum. Archived from the original on 6 October 2017. Retrieved 5 October 2017.\n- Evans 2004, pp. 377–378.\n- Lifton 2000, p. 21.\n- Hanauske-Abel 1996, p. 1457.\n- Proctor 1988, pp. 101–103.\n- Tolischus, Otto D. (21 December 1933). \"400,000 Germans to be sterilized\". The New York Times. Retrieved 3 June 2019.\n- Hanauske-Abel 1996, p. 1458.\n- Proctor 1988, pp. 106–108.\n- Burleigh & Wippermann 2003, pp. 142–149.\n- Kershaw 2000, pp. 252–261.\n- Bloxham 2009, p. 171.\n- Lifton 2000, p. 142.\n- Niewyk & Nicosia 2000, p. 48.\n- Strous 2007.\n- Lifton 2000, pp. 90–95.\n- Hanauske-Abel 1996, pp. 1458–1459.\n- London 2000, p. 161.\n- \"Nuremberg Race Laws\". United States Holocaust Memorial Museum. Archived from the original on 10 May 2019.\n- Arad, Gutman & Margaliot 2014, p. 78.\n- Gerlach 2016, p. 41.\n- Fischel 1998, p. 20.\n- Gilbert 2001, p. 285.\n- Friedländer 1997, p. 1.\n- Friedländer 1997, p. 12.\n- Evans 2005, p. 16.\n- Cesarani 2016, pp. 147–150.\n- Cesarani 2016, pp. 153–155.\n- Evans 2005, pp. 659–661.\n- Niewyk & Nicosia 2000, p. 200.\n- Cesarani 2016, p. 181.\n- Friedländer 1997, pp. 301–302.\n- Cesarani 2016, p. 183; Evans 2005, pp. 581–582.\n- Evans 2005, pp. 583–584.\n- Bloxham 2009, p. 168.\n- Cesarani 2016, pp. 184–185.\n- Cesarani 2016, pp. 184, 187.\n- Cesarani 2016, p. 183.\n- \"A Black Day for Germany\". The Times (48149). 11 November 1938. p. 15.\n- Evans 2005, p. 591.\n- Cesarani 2016, p. 200.\n- Evans 2005, pp. 595–596.\n- Ben-Rafael, Glöckner & Sternberg 2011, pp. 25–26.\n- Friedländer 1997, pp. 224–225.\n- Friedländer 1997, pp. 62–63, 219, 283, 310.\n- Cesarani 2016, p. 382; Cesarani, David (17 February 2011). \"From Persecution to Genocide\". History: World Wars. BBC. Archived from the original on 22 October 2012. Retrieved 25 September 2012.\n- Cesarani 2016, p. 414.\n- Nicosia 2008, pp. 88–89.\n- Browning 2004, p. 12; Crowe 2008, pp. 158–159.\n- Browning 2004, pp. 16–17.\n- Black 2016, p. 29.\n- Browning 2004, p. 111.\n- Black 2016, p. 31.\n- Cesarani 2016, pp. 261–263, 266.\n- Pohl 2019, p. 32; also see Gilbert 2004, pp. 20–21 and \"Anti-Semitic rioting spreads in Poland\". The New York Times. 16 May 1937. p. 30..\n- Gilbert 2004, p. 22.\n- Longerich 2010, p. 194; Himka 2011, pp. 235–236.\n- Longerich 2010, p. 194.\n- Gross 2002, pp. 60–63; Musiał 2004, p. 325.\n- Longerich 2010, p. 196.\n- Polonsky & Michlic 2004, p. xiii; Longerich 2010, p. 196.\n- Hilberg 2003, pp. 216–7.\n- Browning 2004, p. 124.\n- Yahil 1990, p. 165.\n- Dwork & van Pelt 2003, p. 239.\n- \"Deportations to and from the Warsaw Ghetto\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 21 September 2012.\n- Trunk 1996, pp. 1–3; also see Browning 2004, p. 26.\n- Hilberg 1993, p. 106.\n- Hilberg 1993, p. 170.\n- McKale 2002, p. 161.\n- Bergen 2016, p. 169.\n- McKale 2002, p. 162.\n- Stone 2010, p. 14.\n- McKale 2002, p. 164.\n- McKale 2002, pp. 162–163.\n- Schelvis 2014, pp. xv, 198.\n- McKale 2002, pp. 165–166.\n- Zuccotti 1993, p. 52.\n- Bauer 2001, pp. 256–257.\n- \"Tunisia\" (PDF). Shoah Resource Center. Yad Vashem. Archived (PDF) from the original on 25 March 2009. Retrieved 20 June 2017.\n- Longerich 2010, pp. 161–164; for hastening deaths, also see Browning 2004, pp. 88–89.\n- Browning 2004, pp. 81–82.\n- Browning 2004, pp. 82–85.\n- Browning 2004, p. 88.\n- Longerich 2010, p. 164.\n- McKale 2002, pp. 192–193.\n- Black 2016, p. 134.\n- Jelena Subotić; Yellow Star, Red Star: Holocaust Remembrance after Communism p. 3; Cornell University Press, 2019, ISBN 150174240X\n- Jewish History of Yugoslavia, porges.net; accessed 5 May 2016.\n- \"Povijest Židova Jugoslavije\" (in French). Porges.net. Retrieved 12 August 2015.\n- Jozo Tomasevich; Rat i revolucija u Jugoslaviji : 1941-1945. : okupacija i kolaboracija p. 650; EPH media, Zagreb, 2010, ISBN 978-953-300-147-0\n- Snyder 2010, p. 155.\n- Matthäus 2004, p. 245.\n- Burleigh 2001, pp. 512, 526–527.\n- Cesarani 2016, p. 360.\n- Matthäus 2007, p. 219.\n- Browning 2004, pp. 16, 224–225.\n- Cesarani 2016, pp. 365–366.\n- Cesarani 2016, p. 367.\n- Snyder 2010, p. 182.\n- Cesarani 2016, pp. 364–365.\n- McKale 2002, p. 198.\n- Fischel 2010, p. 67.\n- Bergen 2016, p. 200.\n- Wette 2006, pp. 130–131.\n- Matthäus 2004, p. 268.\n- \"Einsatzgruppe member kills a Jewish woman and her child near Ivangorod, Ukraine, 1942\". United States Holocaust Memorial Museum. Archived from the original on 11 May 2019.\n- McKale 2002, p. 204.\n- Schneider 2015, p. 183.\n- Longerich 2010, p. 207; Gerlach 2016, p. 70.\n- Browning 2004, p. 281.\n- Longerich 2010, p. 206; Gerlach 2016, pp. 71–72.\n- Snyder 2010, p. 193.\n- Matthäus 2007, p. 219; Evans 2008, pp. 226–227; Bergen 2016, pp. 199–200.\n- McKale 2002, p. 203.\n- Fritz 2011, pp. 102–104.\n- Bergen 2016, p. 199.\n- Longerich 2010, pp. 304–305.\n- Wachsmann 2015, p. 300.\n- Browning 2004, p. 214.\n- Longerich 2010, p. 206.\n- Stone 2010, p. 36.\n- Black 2016, pp. 131–133.\n- Dwork & van Pelt 2003, pp. 267–272.\n- Friling, Ioanid & Ionescu 2004, p. 126.\n- Friling, Ioanid & Ionescu 2004, p. 150.\n- Dwork & van Pelt 2003, p. 272.\n- Dwork & van Pelt 2003, p. 269.\n- Black 2016, pp. 131–133; for extreme bruality, see Stone 2010, p. 36.\n- Fischel 2010, p. 35.\n- Longerich 2010, p. 392.\n- Black 2016, pp. 136–137.\n- Stone 2010, pp. 33–34.\n- Stone 2010, pp. 34–35.\n- Black 2016, p. 135.\n- Longerich 2010, p. 408.\n- Longerich 2010, pp. 409–410.\n- Black 2016, pp. 137–139.\n- Ochayon, Sheryl. \"The Jews of Libya\". The International School for Holocaust Studies. Yad Vashem. Archived from the original on 25 September 2013.\n- Black 2016, p. 140.\n- Black 2016, p. 141.\n- Orth 2009, p. 181.\n- Baumel 2001, p. 135.\n- Fischel 2010, pp. 50–52.\n- \"Nazi Camps\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 19 June 2018. Retrieved 5 July 2018.\n- \"Concentration Camp System: In Depth\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 6 July 2018. Retrieved 5 July 2018.\n- Wachsmann 2015, pp. 287–288.\n- Longerich 2010, pp. 314–320.\n- Black 2016, p. 76.\n- Black 2016, p. 104.\n- Friedländer 2007, p. 492–494.\n- Wachsmann 2015, p. 347.\n- Wachsmann 2015, pp. 125–127, 623.\n- Yahil 1990, p. 134; Wachsmann 2015, p. 119.\n- \"Tattoos and Numbers: The System of Identifying Prisoners at Auschwitz\". United States Holocaust Memorial Museum. Archived from the original on 13 June 2018.\n- Gerlach 2016, p. 80.\n- Dwork & van Pelt 2003, p. 279.\n- Burleigh & Wippermann 2003, p. 99; \"Reichstag Speech\". United States Holocaust Memorial Museum. Archived from the original on 22 May 2019.\n- Gerlach 2016, p. 80, Browning 2004, p. 407\n- Gerlach 1998, p. 122; Browning 2004, p. 407, citing Die Tagebücher von Joseph Goebbels, II, 2:498–499, entry of 13 December 1941.\n- Browning 2004, p. 408.\n- Longerich 2010, p. 306.\n- Gerlach 2016, p. 82.\n- Browning 2004, pp. 408–409.\n- Browning 2004, p. 409; Arad, Gutman & Margaliot 2014, document no. 116.\n- Browning 2004, p. 410.\n- Original: \"Besprechungsprotokoll\" (PDF). Haus der Wannsee-Konferenz. Archived (PDF) from the original on 2 February 2019. English: \"Wannsee Protocol, January 20, 1942\". The Avalon Project. Yale Law School. Archived from the original on 16 August 2018.\n- Gerlach 1998, p. 759; \"Wannsee Conference and the 'Final Solution'\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 28 September 2017.\n- Gerlach 1998, p. 764.\n- Roseman 2003, p. 66.\n- Browning 2004, p. 411.\n- Roseman 2003, p. 8.\n- Gerlach 2016, pp. 84–85.\n- Longerich 2010, p. 307.\n- \"Wannsee-Protokoll\". EuroDocs. Harold B. Lee Library, Brigham Young University. Archived from the original on 22 June 2006.\n- Longerich 2010, p. 308.\n- Piper 2000, pp. 226–227, 230–231.\n- Piper 2000, p. 133.\n- Piper 2000, pp. 144, 155–156.\n- Strzelecka & Setkiewicz 2000, pp. 81–82.\n- Czech 2000, p. 143; also see Piper 2000, p. 134, footnote 422, citing Danuta Czech, The Auschwitz Chronicle, p. 146.\n- \"Auschwitz-Birkenau Extermination Camp\". About the Holocaust. Yad Vashem. Archived from the original on 5 October 2017. Retrieved 2 October 2017.\n- \"Belzec\" (PDF). Holocaust Resource Center. Yad Vashem. Archived (PDF) from the original on 6 October 2014. Retrieved 29 May 2017.\n- Gerlach 2016, p. 74.\n- \"Chelmno\" (PDF). Holocaust Resource Center. Yad Vashem. Archived (PDF) from the original on 1 February 2017.\n- Wachsmann 2015, p. 301; Gerlach 2016, p. 74.\n- Wachsmann 2015, p. 637.\n- Wachsmann 2015, p. 286.\n- Wachsmann 2015, p. 330.\n- \"Majdanek\" (PDF). Holocaust Resource Center. Yad Vashem. Archived (PDF) from the original on 27 November 2007.\n- \"Sobibor\" (PDF). Holocaust Resource Center. Yad Vashem. Archived (PDF) from the original on 23 January 2014.\n- Gerlach 2016, pp. 93–94.\n- \"Treblinka\" (PDF). Holocaust Resource Center. Yad Vashem. Retrieved 29 May 2017.\n- \"Maly Trostinets\" (PDF). Holocaust Resource Center. Yad Vashem. Archived (PDF) from the original on 3 June 2013. Retrieved 29 May 2017.; Heberer 2008, p. 131; Lehnstaedt 2016, p. 30.\n- Fischel 2010, pp. 57–58.\n- Fischel 1998, p. 81.\n- \"Gassing operations\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 8 February 2015.\n- Montague 2012, pp. 14–16, 64–65.\n- Bergen 2016, p. 160.\n- Fischel 1998, pp. 42–43.\n- Montague 2012, pp. 76–85.\n- Cesarani 2016, p. 513.\n- Arad 2009, p. 138.\n- \"Gas vans\" (PDF). Yad Vashem. Archived from the original (PDF) on 27 November 2003.\n- Didi-Huberman 2008, pp. 16–17.\n- Gerlach 2016, p. 99.\n- Gerlach 2016, p. 99, note 165.\n- Fischel 1998, pp. 81–85.\n- Black 2016, pp. 69–70.\n- Crowe 2008, p. 243; Arad 1999, p. 98.\n- Piper 2000, pp. 219–220.\n- Dwork & van Pelt 2003, pp. 287–288.\n- Piper 1998b, p. 173.\n- Piper 1998b, p. 162.\n- Piper 1998b, p. 157.\n- Piper 1998b, p. 170.\n- Piper 1998b, p. 163.\n- Piper 1998b, pp. 170–172.\n- Piper 1998b, pp. 163–164.\n- Cesarani 2016, pp. 479–480; for size, Longerich 2010, p. 330.\n- Fischel 1998, pp. 83–85.\n- Arad 1999, pp. 170–171.\n- \"Jews captured by Waffen SS soldiers during the suppression of the Warsaw Ghetto Uprising\". Yad Vashem. Archived from the original on 9 October 2014.\n- Longerich 2010, pp. 340–341.\n- Hilberg 2003, pp. 1112–1128.\n- Snyder 2010, p. 283; Longerich 2010, p. 341.\n- Black 2016, pp. 82–85.\n- Engelking & Leociak 2009, pp. 775–777.\n- Black 2016, pp. 83–84.\n- Gutman 1994, p. 243.\n- Bergen 2016, p. 269.\n- Cesarani 2016, p. 616.\n- Cesarani 2016, p. 636.\n- Engelking & Leociak 2009, pp. 793.\n- Arad 1999, pp. 286, 293–294; Fischel 1998, p. 99.\n- Fischel 1998, pp. 95–96.\n- Fischel 1998, p. 98.\n- Arad 1999, p. 337.\n- Arad 1999, p. 341; Fischel 1998, p. 98.\n- Langbein 1998, pp. 500–501.\n- Kennedy 2007, p. 780.\n- Fischel 1998, pp. 100–101.\n- Cesarani 2016, p. 648.\n- Tec 2001, p. 546.\n- Snyder 2010, p. 302.\n- Bergen 2016, p. 273.\n- Zuccotti 1993, p. 274.\n- Zuccotti 1993, p. 275.\n- \"Jewish Soldiers in the Allied Armies\". About the Holocaust. Yad Vashem. Archived from the original on 30 March 2017. Retrieved 29 May 2017.\n- Laqueur 2001, p. 351.\n- Fleming 2014a, p. 35.\n- Bartrop 2016, pp. 210–211; Fleming 2014b, p. 131.\n- Spector 1990, p. 158.\n- \"Grojanowski Report\" (PDF). Shoah Resource Center. Yad Vashem. Archived (PDF) from the original on 6 February 2012.\n- Crowe 2008, p. 354; Niewyk & Nicosia 2000, p. 183.\n- Fleming 2014b, p. 140.\n- Fleming 2014a, p. 35; Fleming 2014b, p. 144.\n- Fleming 2014a, pp. 35–36.\n- Zimmerman 2015, p. 181.\n- Zimmerman 2015, pp. 181–182.\n- Zimmerman 2015, p. 182; \"11 Allies Condemn Nazi War on Jews\". The New York Times. 18 December 1942.\nFrankel, Max (14 November 2001). \"150th Anniversary: 1851–2001; Turning Away From the Holocaust\". The New York Times. Archived from the original on 23 December 2017.\n- Thomson, Mike (13 November 2012). \"Could the BBC have done more to help Hungarian Jews?\". BBC News. Archived from the original on 22 July 2018.\nAlso see Fleming 2014b, p. 368, note 4, who cites Thomson.\n- Novick 2000, pp. 27–28.\n- Friedländer 2010, p. 23.\n- Piper 2000, photographs between pp. 112 and 113.\n- Dwork & van Pelt 2003, pp. 256–257; Longerich 2010, pp. 330–339, 375–379.\n- Dwork & van Pelt 2003, pp. 256–257.\n- Gerlach 2016, p. 112; \"Operation 'Harvest Festival'\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 10 March 2017.\n- Longerich 2010, pp. 360–365.\n- Yahil 1990, pp. 376–378.\n- Kwiet 2004, pp. 61, 69–71, 76–77.\n- Kwiet 2004, pp. 77–78.\n- Fischer 1998, pp. 536–538.\n- Black 2016, p. 108.\n- Piper 2000, p. 11; also see \"Killing Centers\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 6 May 2017. Retrieved 29 May 2017.\n- Braham 2000, pp. 62, 64–65.\n- Braham 2011, p. 45.\n- Longerich 2010, p. 408; Braham 2011, p. 45.\n- \"Deportation of Hungarian Jews\". United States Memorial Museum. Archived from the original on 25 November 2017.\n- Bauer 1994, pp. 163–164; for \"blood for goods\", see Fischel 2010, p. 31.\n- Bauer 1994, p. 192; \"A Monstrous 'Offer'\". The Times (49913). 20 July 1994. p. 2.\n- Black 2016, pp. 107–109.\n- Longerich 2012, p. 695.\n- Longerich 2010, pp. 410–412.\n- Longerich 2010, pp. 415–418.\n- \"Major death marches and evacuations, 1944–1945\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 16 August 2012.\n- Blatman 2011, pp. 1–2.\n- Friedländer 2007, pp. 648–650; for trucks or wagons, Blatman 2011, p. 11.\n- Niewyk & Nicosia 2000, p. 165; for gas chambers, see Friedländer 2007, p. 627 and Longerich 2010, p. 411.\n- Longerich 2010, p. 411.\n- Stone 2015, p. 41.\n- Stone 2015, pp. 72–73.\n- Longerich 2010, p. 417.\n- Marcuse 2001, p. 50.\n- Wachsmann 2015, p. 577.\n- Gilbert 1985, pp. 808–809.\n- Niewyk & Nicosia 2000, p. 167.\n- \"The 11th Armoured Division (Great Britain)\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 16 August 2012.\n- \"Bergen-Belsen\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 15 August 2012.\n- Bell 2017, p. 100.\n- Reynolds 2014, pp. 277–278.\n- \"Introductory remarks at the screening of the film The Relief of Belsen\". The Holocaust and the United Nations Outreach Programme. 2 May 2011. Archived from the original on 2 May 2019. \"Dimbleby: My father's Belsen report sends 'shivers up my spine'\". BBC. 15 April 2015.\n- Schulweis 2015, p. xii.\n- Benz 1991, pp. 15–16, 229–230, 238, 330, 351, 379.\n- Ancel 2011, p. 558.\n- Arad 2009, pp. 521–525.\n- Gilbert 2001, p. 291.\n- Fischel 1998, p. 87; Bauer & Rozett 1990, p. 1799.\n- \"FAQ: How many Jews were murdered in the Holocaust?\". Yad Vashem. Archived from the original on 11 January 2016.\n- Michman 2012, p. 197.\n- Bauer & Rozett 1990, p. 1797.\n- Bauer & Rozett 1990, p. 1799.\n- Benz 1991, p. 17.\n- \"Children during the Holocaust\". United States Holocaust Memorial Museum. Archived from the original on 9 October 2017.\n- Piper 2000, pp. 230–231; also see Piper 1998a, p. 62.\n- Snyder 2012, pp. 164–165.\n- For Netherlands, \"The Netherlands\". Yad Vashem.\nFor France, Gerlach 2016, p. 14; for Denmark and Estonia, Snyder 2015, p. 212; for Estonia (Estland) and the Wannsee Conference, see \"Besprechungsprotokoll\" (PDF). Haus der Wannsee-Konferenz. p. 171. Archived (PDF) from the original on 2 February 2019.\n- Polonsky 2001, p. 488.\n- Fritz 2011, pp. 333–334.\n- Bergen 2016, pp. 214–215.\n- Snyder 2010, pp. 250–251.\n- \"Nazi Persecution of Soviet Prisoners of War\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 22 August 2012. Retrieved 1 September 2012.\n- Berenbaum 2006, p. 125.\n- Ian Dear, Michael Richard Daniell Foot (2001). The Oxford Companion to World War II. Oxford University Press. p. 88. ISBN 0-19-860446-7\n- Snyder, Timothy (2010). Bloodlands: Europe Between Hitler and Stalin. Basic Books. p. 160. ISBN 0465002390\n- Also see \"Polish Victims\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 7 May 2016. Retrieved 1 June 2016.\n- \"Jehovah's Witnesses\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 11 April 2017. Retrieved 29 June 2017.\n- \"Persecution of Homosexuals in the Third Reich\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 12 June 2018.\n- Gellately 2001, p. 155.\n- Gellately 2001, p. 153.\n- Longerich 2012, pp. 450–452.\n- Bloxham 2009, p. 112.\n- Piotrowski 1998, p. 295.\n- Stargardt 2010, pp. 226–227.\n- \"Genocide of European Roma (Gypsies)\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 2 September 2012. Retrieved 1 September 2012.\n- Huttenbach 2016, p. 31; Hancock 2004, p. 385 (Hancock writes Porrajmos).\n- Bauer 1998, p. 442.\n- Bauer 1998, p. 444; also see Longerich 2010, p. 50.\n- Bauer 1998, p. 445.\n- Bauer 1998, p. 446.\n- Longerich 2010, p. 419.\n- Longerich 2010, pp. 419–421.\n- Teleki, László. \"The Fate of the Roma during the Holocaust: The Untold Story\" (PDF). The Holocaust and the United Nations Outreach Programme. p. 92.\n- Longerich 2010, p. 288.\n- Bloxham 2009, p. 114.\n- Bloxham 2009, p. 119.\n- \"Non-Jewish Resistance\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 20 November 2011. Retrieved 29 May 2017.\n- Wachsmann 2015, p. 125.\n- Fischel 2010, p. 184.\n- Milton 2001, pp. 346–349.\n- Garbe 2001, p. 251.\n- Giles 1992, pp. 45–7.\n- Longerich 2012, p. 237.\n- \"Lesbians and the Third Reich\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 12 June 2018.\n- Lusane 2003, pp. 97–8.\n- \"Blacks during the Holocaust\". Holocaust Encyclopedia. United States Holocaust Memorial Museum. Archived from the original on 26 April 2017. Retrieved 29 May 2017.\n- \"International Military Tribunal: The Defendants\". United States Holocaust Memorial Museum.\n- Biddiss 2001, p. 643.\n- Biddiss 2001, pp. 643–644.\n- Conot 1984, p. 495.\n- Biddiss 2001, p. 646.\n- Crowe 2008, p. 412.\n- Crowe 2008, pp. 430–433.\n- \"Reparations and Restitutions\" (PDF). Shoah Resource Center. Yad Vashem. Archived (PDF) from the original on 16 May 2017. Retrieved 5 July 2018.\n- Zweig 2001, pp. 531–532.\n- \"Payment Programme of the Foundation EVZ\". Bundesarchiv. Archived from the original on 5 October 2018. Retrieved 5 July 2018.\n- Staff (29 May 2013). \"Holocaust Reparations: Germany to Pay 772 Million Euros to Survivors\". Spiegel Online International. Archived from the original on 13 December 2014.\n- Bazyler 2005, p. 173; Staff (5 December 2014). \"Pour le rôle de la SNCF dans la Shoah, Paris va verser 100 000 euros à chaque déporté américain\". Le Monde/Agence France-Presse. Archived from the original on 5 December 2014.\nDavies, Lizzie (17 February 2009). \"France responsible for sending Jews to concentration camps, says court\". The Guardian. Archived from the original on 10 October 2017.\n- Stone 2010, p. 206.\n- Stone 2010, p. 207.\n- Evans 1987, pp. 789–790; Piper 1993, p. 273.\n- Nolte, Ernst (6 June 1986). \"Vergangenheit, die nicht vergehen will: Eine Rede, die geschrieben, aber nicht gehalten werden konnte\" (PDF). Frankfurter Allgemeine Zeitung.\n- Evans 1987, p. 764.\n- Knowlton & Cates 1993, p. 15.\n- Evans 1987, p. 764, note 10.\n- Piper 1993, p. 23.\n- Piper 1993, p. 274.\n- Lipstadt 1994, p. 213.\n- Stone 2010, pp. 211–212.\n- Evans 2015, p. 385.\n- Greene, Richard Allen (November 2018). \"A Shadow Over Europe\". CNN. Archived from the original on 27 November 2018.\n- \"New Survey by Claims Conference Finds Significant Lack of Holocaust Knowledge in the United States\". Claims Conference. 2018. Archived from the original on 12 April 2018.\n- Stober, Eric (26 January 2019). \"Nearly half of Canadians can't name a single concentration camp: survey\". Global News. Archived from the original on 27 January 2019.\n- Ancel, Jean (2011). The History of the Holocaust in Romania. Lincoln and Jerusalem: University of Nebraska and Yad Vashem. ISBN 978-0-8032-2064-5.\n- Arad, Yitzhak (1999) . Belzec, Sobibor, Treblinka: The Operation Reinhard Death Camps. Bloomington, IN: Indiana University Press. ISBN 978-0-253-21305-1.\n- ——— (2009). The Holocaust in the Soviet Union. Lincoln, NE: University of Nebraska Press. ISBN 978-0-8032-4519-8.\n- Arad, Yitzhak; Gutman, Yisrael; Margaliot, Abraham, eds. (2014) . Documents on the Holocaust: Selected Sources on the Destruction of the Jews of Germany and Austria, Poland, and the Soviet Union. Pergamon Press/Elsevier. ISBN 978-0-803-25937-9.CS1 maint: ref=harv (link)\n- Bartrop, Paul R. (2016). Resisting the Holocaust: Upstanders, Partisans, and Survivors. Santa Barbara: ABC-CLIO. ISBN 978-1-61069-878-8.\n- Bauer, Yehuda (1998) . \"Gypsies\". In Gutman, Yisrael; Berenbaum, Michael (eds.). Anatomy of the Auschwitz Death Camp. Bloomington, IN: Indiana University Press. pp. 441–455. ISBN 0-253-20884-X.\n- ——— (2001) . A History of the Holocaust (Revised ed.). New York: Franklin Watts. ISBN 0-531-15576-5.\n- ——— (1994). Jews for Sale?: Nazi-Jewish Negotiations, 1933–1945. New Haven, CT: Yale University Press. ISBN 9780300059137.\n- ——— (2002). Rethinking the Holocaust. New Haven, CT: Yale University Press. ISBN 0-300-09300-4.\n- Bauer, Yehuda; Rozett, Robert (1990). \"Appendix 6: Estimated Losses in the Holocaust\". In Gutman, Israel (ed.). Encyclopedia of the Holocaust. 4. New York: Macmillan Library Reference. pp. 1797–1802. ISBN 0-02-896090-4.\n- Baumel, Judith Tydor (2001). \"Concentration Camps\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. pp. 133–135. ISBN 0-300-08432-3.\n- Bazyler, Michael J. (2005) . Holocaust Justice: The Battle for Restitution in America's Courts. New York and London: New York University Press. ISBN 978-0814729380.\n- Bell, Martin (2017). War and the Death of News. London: Oneworld Publications. ISBN 978-1-7860-7109-5.\n- Ben-Rafael, Eliezer; Glöckner, Olaf; Sternberg, Yitzhak (2011). Jews and Jewish Education in Germany Today. Leiden: Brill. ISBN 978-90-04-25329-2.\n- Benz, Wolfgang (1991). Dimension des Völkermords. Die Zahl der jüdischen Opfer des Nationalsozialismus (in German). Munich: R. Oldenburg Verlag. ISBN 3-486-54631-7.CS1 maint: ref=harv (link)\n- ——— (2006). The World Must Know: The History of the Holocaust as Told in the United States Holocaust Memorial Museum (2nd ed.). Washington, DC: United States Holocaust Memorial Museum. ISBN 978-0-8018-8358-3.\n- Bergen, Doris (2016). War & Genocide: A Concise History of the Holocaust (Third ed.). Lanham, MD: Rowman & Littlefield. ISBN 978-1-4422-4228-9.\n- Biddiss, Michael (2001). \"Nuremberg trials\". In Dear, Ian; Foot, Richard D. (eds.). The Oxford Companion to World War II. Oxford: Oxford University Press. pp. 643–646. ISBN 0-19-280670-X.\n- Black, Jeremy (2016). The Holocaust: History and Memory. Bloomington, IN: Indiana University Press. ISBN 978-0-253-02214-1.\n- Blatman, Daniel (2011) . The Death Marches: The Final Phase of Nazi Genocide. Cambridge, MA: Harvard University Press. ISBN 978-0-674-05049-5.\n- Bloxham, Donald (2009). The Final Solution: A Genocide. Oxford: Oxford University Press. ISBN 978-0-19-955034-0.\n- Braham, Randolph L. (2000). The Politics of Genocide: The Holocaust in Hungary. Detroit: Wayne State University Press. ISBN 0-8143-2691-9.\n- ——— (2011). \"Hungary: The Controversial Chapter of the Holocaust\". In Braham, Randolph L.; vanden Heuvel, William Jacobus (eds.). The Auschwitz Reports and the Holocaust in Hungary. Boulder, CO: Social Science Monographs. pp. 29–49.\n- Browning, Christopher (2004). The Origins of the Final Solution: The Evolution of Nazi Jewish Policy, September 1939 – March 1942. Lincoln and Jerusalem: University of Nebraska Press and Yad Vashem. ISBN 978-0803213272.\n- Burleigh, Michael (2001). The Third Reich: A New History. New York: Hill and Wang. ISBN 0-8090-9326-X.\n- Burleigh, Michael; Wippermann, Wolfgang (2003) . The Racial State: Germany 1933–1945. Cambridge: Cambridge University Press. ISBN 0-521-39802-9.\n- Cesarani, David (2016). Final Solution: The Fate of the Jews 1933–1949. New York: St. Martin's Press. ISBN 978-1-250-00083-5.\n- Conot, Robert (1984). Justice at Nuremberg. New York: Carroll & Graf. ISBN 978-0-88184-032-2.\n- Crowe, David M. (2008). The Holocaust: Roots, History, and Aftermath. Boulder, CO: Westview Press. ISBN 978-0-8133-4325-9.\n- Czech, Danuta (2000). \"A Calendar of the Most Important Events in the History of the Auschwitz Concentration Camp\". In Długoborski, Wacław; Piper, Franciszek (eds.). Auschwitz, 1940–1945. Central Issues in the History of the Camp. V: Epilogue. Oświęcim: Auschwitz-Birkenau State Museum. pp. 119–231. ISBN 978-8385047872.\n- Didi-Huberman, Georges (2008). Images in Spite of All: Four Photographs from Auschwitz. Chicago: University of Chicago Press. ISBN 978-0-226-14816-8.\n- Dwork, Deborah; van Pelt, Robert Jan (2003). Holocaust: A History. New York: W. W. Norton. ISBN 0-393-05188-9.\n- Engelking, Barbara; Leociak, Jacek (2009). The Warsaw Ghetto: A Guide to the Perished City. New Haven: Yale University Press. ISBN 978-0-300-11234-4.\n- Evans, Richard J. (December 1987). \"The New Nationalism and the Old History: Perspectives on the West German Historikerstreit\". The Journal of Modern History. 59 (4): 761–797. doi:10.1086/243286. JSTOR 1879952.\n- ——— (2004) . The Coming of the Third Reich. New York: Penguin. ISBN 1-59420-004-1.\n- ——— (2005). The Third Reich in Power. New York: Penguin. ISBN 1-59420-074-2.\n- ——— (2008). The Third Reich at War. New York: Penguin. ISBN 978-1-59420-206-3.\n- ——— (2015). \"Is the \"Final Solution\" Unique?\". The Third Reich in History and Memory. Oxford: Oxford University Press. ISBN 978-0190228392. Revised and extended from Richard Evans (2011). \"Wie einzigartig war die Ermordung der Juden durch die Nationalsocialisten?\" in Günter Morsch and Bertrand Perz (eds). Neue Studien zu nationalsozialistischen Massentötungen durch Giftgas: Historische Bedeutung, technische Entwicklung, revisionistische Leugnung. Berlin: Metropol Verlag, pp. 1–10. ISBN 978-3940938992\n- Fritzsche, Peter (2009). Life and Death in the Third Reich. Cambridge, MA: Harvard University Press. ISBN 978-0674033740.\n- Fischel, Jack R. (1998). The Holocaust. Westport, CT: Greenwood Press. ISBN 0-313-29879-3.\n- ——— (2010). Historical Dictionary of the Holocaust (Second ed.). Lanham, MD: Scarecrow Press. ISBN 978-0-8108-6774-1.\n- Fischer, Conan (2002). The Rise of the Nazis. New Frontiers in History (Second ed.). Manchester, UK: Manchester University Press. ISBN 0-7190-6067-2.\n- Fischer, Klaus (1998) . Nazi Germany: A New History. New York: Barnes & Noble. ISBN 0-7607-0736-7.\n- Fisher, Ronit (2001). \"Medical Experimentation\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. pp. 410–414. ISBN 0-300-08432-3.\n- Fleming, Michael (Spring 2014a). \"Allied Knowledge of Auschwitz: A (Further) Challenge to the 'Elusiveness' Narrative\". Holocaust and Genocide Studies. 28 (1): 31–57. doi:10.1093/hgs/dcu014.\n- ——— (2014b). Auschwitz, the Allies and Censorship of the Holocaust. Cambridge: Cambridge University Press. ISBN 978-1-1070-6279-5.\n- Friedlander, Henry (1994). \"Step by Step: The Expansion of Murder, 1939–1941\". German Studies Review. 17 (3): 495–507. doi:10.2307/1431896. JSTOR 1431896.\n- Friedländer, Saul (1997). Nazi Germany and the Jews: The Years of Persecution 1933–1939. New York: Harper Collins. ISBN 0-06-019042-6.\n- ——— (2007). The Years of Extermination: Nazi Germany and the Jews 1939–1945. New York: Harper Perennial. ISBN 978-0-06-093048-6.\n- ——— (2010). \"An Integrated History of the Holocaust: Possibilities and Challenges\". In Weise, Christian; Betts, Paul (eds.). Years of Persecution, Years of Extermination: Saul Friedländer and the Future of Holocaust Studies. New York and London: Continuum. pp. 21–29. ISBN 9781441129871.\n- Friling, Tuvia; Ioanid, Radu; Ionescu, Mihail E., eds. (2004). International Commission on the Holocaust in Romania: Final Report (PDF). Iași: Polirom. ISBN 973-681-989-2.CS1 maint: ref=harv (link)\n- Fritz, Stephen (2011). Ostkrieg: Hitler's War of Extermination in the East. Lexington, KY: University Press of Kentucky. ISBN 978-0-8131-3416-1.\n- Garbe, Detlef (2001). \"Social Disinterest, Governmental Disinformation, Renewed Persecution, and Now Manipulation of History?\". In Hans Hesse (ed.). Persecution and Resistance of Jehovah's Witnesses During the Nazi-Regime 1933–1945. Bremen: Edition Temmen. pp. 251–265.CS1 maint: ref=harv (link)\n- Gellately, Robert (2001). Backing Hitler: Consent and Coercion in Nazi Germany. Oxford: Oxford University Press. ISBN 0-19-820560-0.\n- Gerlach, Christian (December 1998). \"The Wannsee Conference, the Fate of German Jews, and Hitler's Decision in Principle to Exterminate All European Jews\" (PDF). The Journal of Modern History. 70 (4): 759–812. doi:10.1086/235167.\n- ——— (2016). The Extermination of the European Jews. Cambridge, UK: Cambridge University Press. ISBN 978-0-521-70689-6.\n- Gilbert, Martin (2001). \"Final Solution\". In Dear, Ian; Foot, Richard D. (eds.). The Oxford Companion to World War II. Oxford, UK: Oxford University Press. pp. 285–292. ISBN 0-19-280670-X.\n- ——— (2004) . The Routledge Atlas of the Holocaust (Third ed.). London: Routledge. ISBN 0-415-28145-8.\n- ——— (1985). The Holocaust: A History of the Jews of Europe During the Second World War. New York: Henry Holt. ISBN 0-8050-0348-7.\n- Giles, Geoffrey J. (1992). \"The Most Unkindest Cut of All: Castration, Homosexuality and Nazi Justice\". Journal of Contemporary History. 27 (1): 41–61. doi:10.1177/002200949202700103. JSTOR 260778.\n- Gray, Michael (2015). Teaching the Holocaust: Practical Approaches for Ages 11–18. Abingdon and New York: Routledge. ISBN 978-1-317-65082-9.CS1 maint: ref=harv (link)\n- Gutman, Israel (1994). Resistance: The Warsaw Ghetto Uprising. Boston, MA: Houghton Mifflin. ISBN 0-395-60199-1.\n- Gross, Jan T. (2002) . Neighbors: The Destruction of the Jewish Community in Jedwabne, Poland. New York: Penguin Books. ISBN 0-14-20-0240-2.CS1 maint: ref=harv (link)\n- Hanauske-Abel, Hartmut M. (7 December 1996). \"Not a slippery slope or sudden subversion: German medicine and National Socialism in 1933\". BMJ. 313 (7070): 1453–1463. doi:10.1136/bmj.313.7070.1453. JSTOR 29733730. PMC 2352969. PMID 8973235.\n- Hancock, Ian (2004). \"Romanies and the Holocaust: A Reevaluation and Overview\". In Dan Stone (ed.). The Historiography of the Holocaust. New York: Palgrave-Macmillan. pp. 383–396.\n- Hayes, Peter (2015). \"Introduction\". In Hayes, Peter (ed.). How Was It Possible?: A Holocaust Reader. Lincoln, NE: University of Nebraska Press. pp. xiii–xiv.\n- Heberer, Patricia (2008). \"Justice in Austrian Courts? The Case of Josef W. and Austria's Difficult Relationship with Its Past\". In Heberer, Patricia; Matthäus, Jürgen (eds.). Atrocities on Trial: Historical Perspectives on the Politics of Prosecuting War Crimes. Lincoln and London: University of Nebraska Press.\n- Hilberg, Raul (2003) . The Destruction of the European Jews (3rd ed.). New Haven and London: Yale University Press. ISBN 0-300-09592-9.\n- ——— (1993) . Perpetrators Victims Bystanders: The Jewish Catastrophe 1933–1945. New York: HarperPerennial. ISBN 0-06-099507-6.\n- Himka, John-Paul (2011). \"The Lviv Pogrom of 1941: The Germans, Ukrainian Nationalists, and the Carnival Crowd\". Canadian Slavonic Papers. 43 (2/4): 209–243. doi:10.1080/00085006.2011.11092673. JSTOR 41708340.\n- Huttenbach, Henry R. (2016) . \"The Romani Pořajmos: The Nazi Genocide of Gypsies in Germany and Eastern Europe\". In Crowe, David; Kolsti, John (eds.). The Gypsies of Eastern Europe. Abingdon and New York: Routledge. pp. 31–50. ISBN 978-1-315-49024-3.\n- Jones, Adam (2006). Genocide: A Comprehensive Introduction. London: Routledge. ISBN 0-415-35384-X.\n- Kennedy, David M., ed. (2007). The Library of Congress World War II Companion. New York: Simon & Schuster. ISBN 978-0-7432-5219-5.\n- ——— (2000). Hitler 1936–1945: Nemesis. New York: W. W. Norton. ISBN 978-0-393-32252-1.\n- Knowlton, James and Cates, Truett (translators, 1993). Forever in the Shadow of Hitler?: Original Documents of the Historikerstreit, the Controversy Concerning the Singularity of the Holocaust. Atlantic Highlands, NJ: Humanities Press. ISBN 978-0391038110.\n- Kwiet, Konrad (2004). \"Forced Labour of German Jews in Nazi Germany\". In Cesarani, David (ed.). Holocaust: Concepts in Historical Studies: Volume II: From the Persecution of the Jews to Mass Murder. London: Routledge. pp. 59–81. ISBN 0-415-27511-3.\n- Langbein, Hermann (1998) . \"The Auschwitz Underground\". In Gutman, Yisrael; Berenbaum, Michael (eds.). Anatomy of the Auschwitz Death Camp. Bloomington, IN: Indiana University Press. pp. 485–502. ISBN 0-253-20884-X.\n- Landau, Ronnie S. (2016) . The Nazi Holocaust: Its History and Meaning. London: I.B. Tauris. ISBN 978-1-78076-971-4.CS1 maint: ref=harv (link)\n- Laqueur, Walter (2001). \"Jewish Brigade\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. p. 351. ISBN 0-300-08432-3.\n- Lehnstaedt, Stephan (2016) . Occupation in the East: The Daily Lives of German Occupiers in Warsaw and Minsk, 1939–1944. New York and Oxford: Berghahn Books. ISBN 978-1-78533-323-1.\n- Lifton, Robert J. (2000) . The Nazi Doctors: Medical Killing and the Psychology of Genocide (2000 ed.). New York: Basic Books. ISBN 978-0-465-04905-9.\n- Lipstadt, Deborah (1994) . Denying the Holocaust: The Growing Assault on Truth and Memory. New York: Penguin Books. ISBN 0-452-27274-2.\n- London, Louise (2000). Whitehall and the Jews, 1933–1948: British Immigration Policy, Jewish Refugees and the Holocaust. Cambridge: Cambridge University Press. ISBN 978-0521631877.\n- Longerich, Peter (2010). Holocaust: The Nazi Persecution and Murder of the Jews. Oxford, UK: Oxford University Press. ISBN 978-0-19-280436-5.\n- ——— (2012). Heinrich Himmler. Oxford: Oxford University Press. ISBN 978-0-19-959232-6.\n- Lusane, Clarence (2003). Hitler's Black Victims: The Historical Experience of Afro-Germans, European Blacks, Africans and African Americans in the Nazi Era. London; New York: Routledge.CS1 maint: ref=harv (link)\n- Lustigman, Marsha; Lustigman, Michael M. (16 October 1994). \"Bibliographic Classification of Documents Dealing with the Subject 'Holocaust'\". Alexandria, VA: 5th ASIS SIG/CR Classification Research Workshop: 111–120. doi:10.7152/acro.v5i1.13780 (inactive 25 April 2020). Cite journal requires\n- Marcuse, Harold (2001). Legacies of Dachau: The Uses and Abuses of a Concentration Camp, 1933–2001. Cambridge: Cambridge University Press. ISBN 0-521-55204-4.\n- Matthäus, Jürgen (2004). \"Operation Barbarossa and the Onset of the Holocaust, June–December 1941\". In Browning, Christopher (ed.). The Origins of the Final Solution: The Evolution of Nazi Jewish Policy, September 1939 – March 1942. Lincoln, NE: University of Nebraska Press. pp. 244–308. ISBN 0-8032-1327-1.\n- ——— (Fall 2007). \"Controlled Escalation: Himmler's Men in the Summer of 1941 and the Holocaust in the Occupied Soviet Territories\". Holocaust and Genocide Studies. 21 (2): 218–242. doi:10.1093/hgs/dcm037.CS1 maint: ref=harv (link)\n- McKale, Donald M. (2002). Hitler's Shadow War: The Holocaust and World War II. New York: Cooper Square Press. ISBN 0-8154-1211-8.\n- Michman, Dan (2012) . \"Jews\". In Hayes, Peter; Roth, John K. (eds.). The Oxford Handbook of Holocaust Studies. Oxford: Oxford University Press. pp. 185–202. ISBN 978-0-19-966882-3.\n- Milton, Sybil (2001). \"Jehovah's Witnesses\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. pp. 346–350. ISBN 0-300-08432-3.\n- Montague, Patrick (2012). Chelmno and the Holocaust: A History of Hitler's First Death Camp. Chapel Hill, NC: University of North Carolina Press. ISBN 978-0-8078-3527-2.\n- Müller-Hill, Benno (1999). \"The Blood from Auschwitz and the Silence of the Scholars\". History and Philosophy of the Life Sciences. 21 (3): 331–365. JSTOR 23332180. PMID 11197188.\n- Musiał, Bogdan (2004). \"The Pogrom in Jedwabne: Critical Remarks about Jan T. Gross's Neighbors\". In Polonsky, Anthony; Michlic, Joanna B. (eds.). The Neighbors Respond: The Controversy over the Jedwabne Massacre in Poland. Princeton and Oxford: Princeton University Press. pp. 304–343. ISBN 0-691-11643-1.\n- Nicosia, Francis R. (2008). Zionism and Anti-Semitism in Nazi Germany. New York: Cambridge University Press. ISBN 978-0-521-88392-4.CS1 maint: ref=harv (link)\n- Niewyk, Donald L.; Nicosia, Francis R. (2000). The Columbia Guide to the Holocaust. New York: Columbia University Press. ISBN 0-231-11200-9.\n- Noakes, Jeremy; Pridham, Geoffrey (1983). Nazism: A History in Documents and Eyewitness Accounts, 1919–1945. New York: Schocken Books. OCLC 809750541.\n- Novick, Peter (2000) . The Holocaust in American Life. New York: Houghton Mifflin. ISBN 0-618-08232-8.\n- Orth, Karin (2009). \"Camps and Subcamps under the SS-Inspectorate of Concentration Camps/Business Administration Main Office\". In Megargee, Geoffrey P. (ed.). Encyclopedia of Camps and Ghettos, 1933–1945. 1A. Bloomington and Indianapolis: United States Holocaust Memorial Museum, Indiana University Press. pp. 181–196. ISBN 978-0-253-35328-3.\n- Piotrowski, Tadeusz (1998). Poland's Holocaust: Ethnic Strife, Collaboration With Occupying Forces and Genocide in the Second Republic, 1918–1947. Jefferson, NC: McFarland & Company.CS1 maint: ref=harv (link)\n- Piper, Ernst (1993). \"Afterward to the Historikerstreit\". Forever in the Shadow of Hitler?: Original Documents of the Historikerstreit, the Controversy Concerning the Singularity of the Holocaust. Translated by Knowlton, James; Cates, Truett. Atlantic Highlands, NJ: Humanities Press. pp. 272–275. ISBN 978-0391038110.CS1 maint: ref=harv (link)\n- Piper, Franciszek (1998a) . \"The Number of Victims\". In Gutman, Yisrael; Berenbaum, Michael (eds.). Anatomy of the Auschwitz Death Camp. Bloomington, IN: Indiana University Press. pp. 61–80. ISBN 0-253-20884-X.\n- ——— (1998b) . \"Gas chambers and Crematoria\". In Gutman, Yisrael; Berenbaum, Michael (eds.). Anatomy of the Auschwitz Death Camp. Bloomington, IN: Indiana University Press. pp. 157–182. ISBN 0-253-20884-X.\n- ——— (2000). Długoborski, Wacław; Piper, Franciszek (eds.). Auschwitz, 1940–1945. Central Issues in the History of the Camp. Volume III: Mass Murder. Oświęcim: Auschwitz-Birkenau State Museum. ISBN 978-8385047872.\n- Pohl, Dieter (2019). \"Right-wing Politics and Antisemitism in Europe, 1935–1940: A Survey\". In Bajohr, Frank; Pohl, Dieter (eds.). Right-Wing Politics and the Rise of Antisemitism in Europe 1935–1941. Göttingen: Wallstein Verlag. pp. 19–38. ISBN 9783835333475.CS1 maint: ref=harv (link)\n- Polonsky, Antony (2001). \"Polish Jewry\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. pp. 486–493. ISBN 0-300-08432-3.\n- Polonsky, Anthony; Michlic, Joanna B. (2004). \"Preface\". In Polonsky, Anthony; Michlic, Joanna B. (eds.). The Neighbors Respond: The Controversy over the Jedwabne Massacre in Poland. Princeton and Oxford: Princeton University Press. pp. xiii–xiv. ISBN 0-691-11643-1.\n- Proctor, Robert (1988). Racial Hygiene: Medicine Under the Nazis. Cambridge, MA: Harvard University Press. ISBN 0-674-74578-7.\n- Reynolds, David (2014). The Long Shadow: The Legacies of the Great War in the Twentieth Century. New York: W. W. Norton & Company, Inc. ISBN 978-0-393-24429-8.\n- Roseman, Mark (2003). The Villa, The Lake, The Meeting: Wannsee and the Final Solution. London: Penguin Books. ISBN 9-780-1419-2831-9.\n- Schelvis, Jules (2014) . Sobibor: A History of a Nazi Death Camp. London and New York: Bloomsbury Publishing. ISBN 978-1-84520-418-1.\n- Schneider, Gertrude (2015) . \"The Two Ghettos in Riga, Latvia, 1941–1943\". In Dobroszycki, Lucjan; Gurock, Jeffery S. (eds.). The Holocaust in the Soviet Union: Studies and Sources on the Destruction of the Jews in the Nazi-occupied Territories of the USSR, 1941–45. Abingdon and New York: Routledge. pp. 181–194. ISBN 978-1563241734.\n- Schulweis, Harvey (2015). \"Foreword\". In Hayes, Peter (ed.). How Was It Possible?: A Holocaust Reader. Lincoln, NE: University of Nebraska Press. pp. xi–xii.\n- Snyder, Timothy (2010). Bloodlands: Europe Between Hitler and Stalin. New York: Basic Books. ISBN 978-0-465-00239-9.\n- ——— (2012). \"The Causes of the Holocaust\". Contemporary European History. 21 (2): 149–168. doi:10.1017/S0960777312000094.CS1 maint: ref=harv (link)\n- ——— (2015). Black Earth: The Holocaust as History and Warning. New York: Tim Duggan Books. ISBN 978-1-101-90347-6.\n- Spector, Shmuel (1 January 1990). \"Aktion 1005—Effacing the murder of millions\". Holocaust and Genocide Studies. 5 (2): 157–173. doi:10.1093/hgs/5.2.157.\n- Stackelberg, Roderick; Winkle, Sally A. (2002). The Nazi Germany Sourcebook: An Anthology of Texts. London and New York: Routledge. ISBN 0-415-22213-3.\n- Stargardt, Nicholas (2010). \"Children\". In Hayes, Peter; Roth, John K. (eds.). The Oxford Handbook of Holocaust Studies. New York: Oxford University Press. pp. 218–232. ISBN 978-0-19-921186-9.\n- Stone, Dan (2010). Histories of the Holocaust. New York: Oxford University Press. ISBN 978-0-19-956679-2.\n- ——— (2015). The Liberation of the Camps: The End of the Holocaust and Its Aftermath. New Haven and London: Yale University Press. ISBN 978-0-300-20457-5.\n- Strous, Rael D. (2007). \"Psychiatry during the Nazi Era: Ethical Lessons for the Modern Professional\". Annals of General Psychiatry. 6 (8): 8. doi:10.1186/1744-859X-6-8. PMC 1828151. PMID 17326822.CS1 maint: ref=harv (link)\n- Strzelecka, Irena; Setkiewicz, Piotr (2000). \"The Construction, Expansion and Development of the Camp and its Branches\". In Długoborski, Wacław; Piper, Franciszek (eds.). Auschwitz, 1940–1945. Central Issues in the History of the Camp. I: The Establishment and Organization of the Camp. Oświęcim: Auschwitz-Birkenau State Museum. pp. 63–138. ISBN 978-8385047872. OCLC 874340863.CS1 maint: ref=harv (link)\n- Tec, Nechama (2001). \"Resistance in Eastern Europe\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. pp. 543–550. ISBN 0-300-08432-3.\n- Trunk, Isaiah (1996) . Judenrat: The Jewish Councils in Eastern Europe under Nazi Occupation. Lincoln, NE: University of Nebraska Press. ISBN 0-8032-9428-X.\n- United States Holocaust Memorial Museum (1996). Historical Atlas of the Holocaust. New York: Macmillan. ISBN 0-02-897451-4.\n- Wachsmann, Nikolaus (2015). KL: A History of the Nazi Concentration Camps. New York: Farrar, Straus and Giroux. ISBN 978-0-374-11825-9.\n- Wette, Wolfram (2006). The Wehrmacht: History, Myth, Reality. Cambridge, MA, and London: Harvard University Press. ISBN 978-0-674-02213-3.\n- Yahil, Leni (1990). The Holocaust: The Fate of European Jewry, 1932–1945. New York: Oxford University Press. ISBN 978-0-19-504523-9.\n- Zimmerman, Joshua D. (2015). The Polish Underground and the Jews, 1939–1945. New York: Cambridge University Press. ISBN 978-1-1070-1426-8.\n- Zuccotti, Susan (1993). The Holocaust, the French, and the Jews. New York: Basic Books. ISBN 0-465-03034-3.\n- Zweig, Ronald (2001). \"Reparations, German\". In Laqueur, Walter; Baumel, Judith Tydor (eds.). The Holocaust Encyclopedia. New Haven, CT: Yale University Press. pp. 530–532. ISBN 0-300-08432-3.\n- Global Directory of Holocaust Museums.\n- H-Holocaust, H-Net discussion list for librarians, scholars and advanced students.\n- \"Common Questions about the Holocaust\", United States Holocaust Memorial Museum\n- \"Auschwitz: Drone video of Nazi concentration camp\". BBC News, 27 January 2015.\n- \"Human laboratory animals\". Life magazine, 22(8), 24 February 1947, pp. 81–84.\n- Cesarani, David (25 September 2009). \"An insult to Kiev's massacred Jews\". The Guardian. Archived from the original on 12 June 2019.\n- \"The Dark Continent: Hitler's European Holocaust Helpers\". Der Spiegel. 20 May 2009. Archived from the original on 3 January 2015.", "label": "No"} {"text": "Human Genetics - Mitosis and Meiosis\nUsing the text and any other sources you choose, sketch the phases and sub-phases of\n3. meiosis with one single cross-over event\nin a “typical” diploid animal cell. Be sure to indicate (in the sketch) how any and all cellular components are changing during these phases.\nSo you will have three series.\n☞ The cell has 1N = 2\n☞ with one smaller acrocentric chromosome and one larger metacentric chromosome.\n☞ Use 2 colors to distinguish the maternal and paternal chromosomes.\n☞ If there are alternate outcomes (such as segregation in meiosis I) show both alternatives\n★ include all subphases (specifically in prophase I)\n▸ leptotene stage\n▸ zygotene stage\n▸ pachytene stage\n▸ diplotene stage\n★ label each drawing\n✓ each drawing has a title (phase or subphase)\n✓ label each structure in every sketch, or at least every time it changes appearance\n★ If you choose, you may magnify a component or structure to show important features, rather than magnify the entire sketch. Be sure your labels are clear.", "label": "No"} {"text": "Readers of different religious traditions, and even those within the same tradition, may read sacred Scripture in radically divergent ways. Among the most pronounced ways this occurs is in the common refrains that religious immigration activists tend to cite. The Hebrew Bible directs adherents to watch over the ger, a term that alludes to a permanent resident or a convert and is often defined imperfectly as “stranger.” The New Testament depicts Jesus as a refugee, and the Quran directs the religious to care for both the wayfarer (aabir sabeel) and the homeless (ibn sabeel). These religious values motivate many to advocate for refugees and would-be immigrants, while many others understand their religious mandate differently.\nExegetical variety aside, experts and nonprofit leaders say that religious activists have rallied of late in response to the president’s immigration policy and rhetoric. Since President Donald Trump’s election, immigration activists have demonstrated a “new energy” and a “new level of urgency,” even though they were concerned about high levels of immigrant deportation under President Barack Obama, says Grace Yukich, associate professor of sociology at Quinnipiac University in Hamden, Connecticut, and author of One Family Under God: Immigration Politics and Progressive Religion in America.\n“The anti-immigrant rhetoric during Trump’s presidential campaign frightened immigrants and their allies, including many faith-based activists, who saw such rhetoric as antithetical to their religious traditions’ calls to welcome the stranger,” Yukich says. The activists are concerned about what they interpret as White House efforts to curb the Deferred Action for Childhood Arrivals program (DACA), to reduce both legal and illegal immigration, and to curb the scope of the Fourteenth Amendment. Activists are also concerned about separation of families on the border, targeting of undocumented immigrants without criminal records, and the tragic incidents of immigrant children who have died within U.S. custody. The activists worry both about the immigrants and “the moral and spiritual health of a nation that often treats immigrants in cruel and inhumane ways,” Yukich says.\nMark Hetfield, president and chief executive officer of HIAS, has seen more American Jewish passion for welcoming refugees and asylum seekers than he has observed in decades. (HIAS was founded in 1881 as the Hebrew Immigrant Aid Society.) “They want to volunteer to welcome them, to set them up in new homes and new communities, and to help them navigate our Byzantine and often vicious legal process,” he says. “Unfortunately, with the Trump administration’s allowing the fewest number of refugees in the 40-year history of the program, and with the ‘remain in Mexico’ policy, volunteer opportunities are increasingly scarce. Consequently, we’ve facilitated more advocacy opportunities to change these policies.”\nMore than 2,000 rabbis and hundreds of congregations have formally committed to work with HIAS to support welcoming refugees, and HIAS helped organize more than 100 meetings between constituents and their congressional representatives this summer. “The global refugee crisis of 2015, and then, just before the Jewish high holidays, the photograph of the lifeless body of 3-year-old Alan Kurdi washed up on the beach in Turkey, woke up our entire community, and they’ve been actively engaged in welcoming refugees ever since on a scale we haven’t seen since the late 1980 and the Soviet Jewry movement,” Hetfield says. “The big difference today is that they are not welcoming refugees who are Jews, but welcoming refugees as Jews.”\nReligious activists are helping immigrants by providing legal services along the border, raising money to help immigrants and their families, and offering sanctuary to those at risk for deportation through the New Sanctuary Movement, which offers “sacred resistance,” Quinnipiac University’s Yukich says. Activists are also educating communities about immigration policies and collaborating with groups like No More Deaths, an Arizona-based organization that provides water and other necessities to immigrants and is part of the Unitarian Universalist Church of Tucson.\nWhen Joan Rosenhauer, executive director of Jesuit Refugee Service/USA, thinks about her group’s humanitarian work, she turns to the New Testament. “The fact that the very Son of God was a refugee serves to call us to see the face of Christ in all those who are forced to flee,” she says. (While Gospel stories from Jesus’ childhood are rare, one has his family crossing a national border, fleeing King Herod-endorsed infanticide in Bethlehem for Egypt.) Jesus preached that when one visits the imprisoned or feeds the hungry that one is visiting and feeding God, Rosenhauer says.\nJesuit Refugee Services, which was founded in 1980 and is based in Rome, supports refugees in more than 50 countries. Its activities include creating safe spaces for children within refugee camps, running schools, training refugees to teach and to launch businesses, providing food and hygienic supplies, and offering pastoral and religious support to those in U.S. detention hoping to immigrate. On the U.S. southern border in particular, the U.S. chapter operates a program where chaplains provide pastoral and religious assistance to non-citizens in five detention centers operated by the U.S. Department of Homeland Security. (Rosenhauer has visited the centers in El Paso, Texas, and in Florence, Arizona. The others are in Batavia, New York; Los Fresnos, Texas; and Miami.)\nIn 2018, Jesuit Refugee Service activists distributed religious materials, provided religious services through volunteer faith leaders, and offered stress management classes and psychosocial support to 10,453 migrants through this program, Rosenhauer says. The Mexican chapter of Jesuit Refugee Service also collaborates with other Jesuit organizations to help migrants with legal and psychological support. “Many of our donors support our work with displaced people where it is most needed,” Rosenhauer says. “We see a lot of generosity among Americans toward people who have fled their homes, but it is not exclusively focused on the U.S. border.”\nCatholics aren’t monolithic in their views, including on immigration reform, according to PRRI data. More than 60 percent of Catholics in New York City and 70 percent of Catholics in Washington, D.C., believe immigrants strengthen the country with their hard work and talents. In Philadelphia, on the other hand, 45 percent of Catholics think immigrants take American jobs, housing, and healthcare, a 2015 PRRI survey found. But Rosenhauer has been impressed with the ways that Catholics worldwide have responded to Pope Francis’ public support for refugees. In a message released in advance of the church’s World Day of Migrants and Refugees, which was held on September 29, the pope stated that “the presence of migrants and refugees—and of vulnerable people in general—is an invitation to recover some of those essential dimensions of our Christian existence and our humanity that risk being overlooked in a prosperous society. … I invoke God’s abundant blessings upon all the world’s migrants and refugees and upon all those who accompany them on their journey.”\nNot every faith group is seeing a surge in activism around immigration reform. Many members of the Orthodox Jewish community in Lakewood, New Jersey, for example, read the Torah literally and turn to Jewish teachings for guidance on all aspects of life. At the yeshiva Beth Medrash Govoha, some 6,000 men pore for many hours a day over Hebrew and Aramaic texts, and most can recite Exodus 22:20 (“Neither harass nor oppress the ‘stranger,’ for you were ‘strangers’ in Egypt”) by heart in biblical Hebrew, but they aren’t interpreting the verse, or others like it, as a mandate to jet or bus to the southern border and pitch in. Instead, members of this community (and many others) tend to see their primary religious responsibility as internal obligations to more immediate neighbors.\n“Our tradition teaches us—and it is imbued through our education, both in our homes and in our Yeshivas—that people have a deep and important responsibility to care for each other’s welfare,” Rabbi Eli Steinberg says, speaking personally rather than in his capacity as Beth Medrash Govoha’s spokesman. “What it also teaches us is a system of prioritization of our efforts. We are responsible for those closest to us first: family, extended family, community.”\nBut other Jewish communities read the biblical texts differently. An 85-year-old rabbi was handcuffed with a plastic tie while protesting outside Philadelphia’s Immigration and Customs Enforcement office last year, even as the man, who walks with a cane, needed assistance to stand, the Jewish Telegraphic Agency reported. This past July, the Associated Press reported that a network of more than 70 synagogues nationwide has committed to supporting asylum seekers and immigrants.\nImam Omar Suleiman, the Dallas-based founder and president of the Yaqeen Institute for Islamic Research and a Southern Methodist University adjunct Islamic studies professor, was arrested at the U.S. Capitol last year for protesting the mistreatment of American-born children of undocumented immigrants, known as “Dreamers” based on never-passed congressional legislation called the DREAM Act. “Hundreds of thousands of families are being ripped apart and we need to come to a permanent solution for them,” he posted on social media at the time.\nSuleiman’s activism is theologically motivated and draws upon a faith tradition in which stories of migration are hardwired into the theology. Islamic Scriptures tell of Muslim migrants fleeing violence from Mecca to both Medina and to Abyssinia, a Christian land. Abraham, Moses, and Jesus, who are also prophets in Islam, were migrants, and the Islamic calendar starts with the date of the migration from persecution. The Quran prescribes recognizing the sanctity of all sons of Adam—meaning all people—and caring for both the wayfarer and the homeless.\nIslam’s teachings on the sanctity and dignity of the human being are principles that Suleiman believes and explains to the immigrants in detention that he meets. “I read Scriptures on general hardship, ease, patience, and love. I definitely use a universal language,” he says. “I have a set of Scriptures that I read … nothing that a Christian or Jew couldn’t pray to.” When he talks—and more importantly, he says, listens—to young immigrants, he is frequently asked to pray, typically for the young people’s relatives. The Quranic verses, which he translates into Spanish, include this one: “When my servant cries out to me, then I am near to him. I answer the call of every caller when they call unto me, so that they will respond to my call and believe in me. So that they will find guidance.” He adds this verse from the Quran as well: “With every hardship comes ease.”\nAmong American evangelical Christians, there are longstanding and deep divisions on immigration and refugees, John Fea, professor of history at Messiah College in Mechanicsburg, Pennsylvania, says. Fea is the author of Believe Me: The Evangelical Road to Donald Trump. The spectrum of evangelical views on immigration range from Jim Wallis, founder and editor of Sojourners magazine and author of the 2013 op-ed “The Bible’s case for immigration reform,” and the National Association of Evangelicals on the left, to groups on the right like Evangelicals for Biblical Immigration, Fea says.\nThose in the same camp as Evangelicals for Biblical Immigration largely oppose granting citizenship to American-born children of undocumented immigrants affected by the DACA program, and would like to see borders either closely defended or severely restricted, Fea says. “[They] claim that these verses are manipulated by the evangelical opponents to serve their political interests,” he says. “Most claim that these verses about welcoming the stranger do not apply to illegal immigrants, because these immigrants are breaking the law.”\nThe essential evangelical division here, which divides along political lines, pits Christian compassion against rule of law. “The evangelical differences on immigration have been around for several decades, but right now politics seems to be shaping everything,” Fea says. “Almost all of the evangelicals, who support Trump’s Supreme Court nominations, [and] move of the Israeli embassy to Jerusalem … also oppose all forms of illegal immigration and are fearful about the arrival of these refugees. If they do have any moral qualms or pricks of conscience about the separation of families at the border or the treatment of refugees in detention centers, they do not speak up about it.”\nMany white evangelicals, he says, believe that a wall is the only solution to the problem on the southern border. “They do not want to jeopardize their access to political power, because Trump is delivering on abortion and Supreme Court justices, and other issues that are more important to them than immigration reform,” Fea says. “Evangelical Christianity in America has been divided for a long time, but the immigration debate, and Trump’s handling of it, reveals this division perhaps more than anything else.”\nMenachem Wecker is a freelance journalist in Washington, D.C.\nSource link Google News", "label": "No"} {"text": "Yellow bittern of India is one of the smallest members of the bittern species. It is found occupying the Asian countries of India, Sri Lanka, Japan and Indonesia. Yellow bitterns are scientifically known as Lxobrychus sinensis and are of Old World origins. They are shy by nature and are brilliant in the camouflage technique.\nYellow bitterns of India are small birds, growing to an average length\nof 38 cm. The neck is short, but the bill is quite long. The male Yellow\nbittern is of dull yellow color on the upper side as well as the buff\nbelow. The head and neck are of chestnut color and the crown is black.\nThe female Yellow bittern has streaked-brown crown, neck and breast. The\nchicks are pale peachish-pink in color and can climb even before they\nYellow bitterns are also solitary creatures, which usually hunt on\ntheir own. They use their long sturdy bills to capture the prey. Yellow\nbitterns of India can slip rather easily and are also pretty good at\nquietly climbing among the bottom of reed beds and undergrowth. Usually,\nthey hunt from cover. However, at times, one can also see them foraging\nover floating vegetation, like water-hyacinth beds. The birds are more\nactive during dawn and dusk.\nYellow bitterns prefer to breed in dense vegetation near water.\nYellow Bitterns feed on insects, fish and amphibians.\nYellow bitterns inhabit Indian freshwater wetlands, which are covered\nwith thick vegetation. This includes marshes, grasslands, reed beds,\nponds, dredge-mine lagoons and reservoirs, including man-made canals.\nOne can also spot them in mangroves.\nYellow Bittern is protected under the Migratory Bird Treaty Act of", "label": "No"} {"text": "Stress in America 2022 Insights\nThere is no denying that the COVID-19 pandemic has created a mental health crisis. To better understand the impact of the past two years on individual stress, the American Psychological Association partnered with The Harris Poll to conduct a survey their annual Stress in America ™ survey. This survey, conducted in February and March of this year, had alarming results. As part of Stress Awareness Month, we wanted to share these important findings:\n- 87%of respondents agreed it feels like there has been a constant stream of crises over the last two years.\n- 73%of respondents said they are overwhelmed by the number of crises facing the world right now.\n- 63%of respondents said their life has been forever changed by the COVID-19 pandemic.\n- The rise in prices of everyday items due to inflation was rated as a stressor by the highest proportion of adults seen across all stressors asked about in the history of the Stress in America ™ survey, with 87%having reported it as a significant source of stress.\n- 42%of respondents said that they have relied on a lot of unhealthy habits to get themselves through the last two years.\nStress Management Techniques\nIn addition to navigating though an unpredictable state of prolonged hyper-vigilance that the pandemic has created, individuals are now dealing with growing financial strain and the fear of the new geopolitical threat that has emerged. The survey findings make clear that U.S. adults appear to be emotionally overwhelmed and showing signs of fatigue and chronic stress. Chronic stress can have a severely negative impacts on overall health, including a weaken immune system, headaches, insomnia, high blood pressure and even heart disease. That is why it is critical to start incorporating stress management techniques into your daily routine.\n- Exercise: Physical activityis one of the best ways to help you manage stress. Not only does it instantly improve your mood due to the release of hormones like endorphins and endocannabinoids, but it also helps improve your quality of sleep at night and improves your immune system. Both of which set your body up to handle stress more adequately.\n- Nutrition: Stress eating highly processed foods that are high in sugar and fat may provide temporarily relief, however they cause long term damage to both your physical and mental health. Focusing on eating nutritious foods and consuming a balanced diet not only keeps your body healthy, but it helps regulate your mood and manage stress levels.\n- Meditation: Meditating brings short-term stress relief as well as lasting stress management benefits. There are many different forms of meditation to try, each one is unique and brings its own appeal. Check out one of our past blog post to learn more!\n- Gratitude: Studies show that grateful people enjoy better mental health, lower stress, and a better quality of life. Gratitude practices, such as journaling, are a great-long term strategy for managing stress. Practicing gratitude regularly also reminds you of all of the resources you have to cope with stress, which is very empowering.\n- Positive Self-Talk: Training your inner voice to speak positively can help you develop a healthier outlook and help you manage your emotions and take positive action. Start paying attention to your self-talk and when you notice you are giving yourself harsh self-criticism or having self-doubt, redirect your thoughts in a more realistic and compassionate way.\nIf you are an employer looking to help your employees manage their stress levels, click here to view our Mental Health and Well-Being Offerings!", "label": "No"} {"text": "A feeding frenzy called a \"Blitz\" is happening right in close to the shore and within casting range of this surf fisherman. He is catching stripers.\nIn the fall as the water cools baitfish which have been growing up in the estuaries and bays migrate out into the open ocean. There they meet up with striped bass which are involved with their own migration south along the coast.\nThe feeding frenzies that result are called blitzes. Sea birds join the blitzes. The birds provide a beacon for fishermen. Boat fishermen scan the horizon with binoculars looking for the tell-tale birds. Surf fishermen drive the roads and beaches along the coast looking for birds. When they find the blitzes they get to enjoy some of the best striped bass fishing of the year.\nOften the stripers are accompanied with bluefish. Bluefish are sometimes called choppers, because they chop chunks out of the baitfish, rather than eating them whole. The resulting pieces, including the heads, sink deeper into the water column where larger stripers lay in wait for an easy meal.\nSometimes the blitzes occur close to the beach within casting range of surf fishermen. Often they occur too far out and the surf fishermen can only watch. These blitzes are sometimes short in duration, but they will occur again someplace else. The birds and the fishermen are always searching.", "label": "No"} {"text": "“THIS IS THE BEST EDITION OF THIS FAMOUS WORK”: SCARCE 1817 EDITION OF MALTHUS’ ECONOMIC LANDMARK, FROM THE LIBRARY OF PREEMINENT BIBLIOGRAPHER G.R. REDGRAVE\nMALTHUS, Thomas Robert. An Essay on the Principle of Population; Or, A View of Its Past and Present Effects on Human Happiness; with An Inquiry into Our Prospects Respecting the Future Removal or Mitigation of the Evils Which It Occasions. London: John Murray, 1817. Three volumes. Octavo, contemporary full diced brown calf rebacked with original elaborately gilt-decorated spines laid down, burgundy morocco spine labels. $2800.\nScarce 1817 edition of a foundational work in modern economics, from the library of renowned bibliographer G.R. Redgrave, co-author of the Short Title Catalogue (STC), featuring his key notation in Volume I: “This is the best edition of this famous work as it contains much addiitonal matter, and many alterations at the hand of the author,” handsomely bound in contemporary calf.\n“Malthus was one of the founders of modern economics. His Essay was originally the product of a discussion on the perfectibility of society with his father, [who] urged him to publish. Thus the first edition (published anonymously) was essentially a fighting tract, but later editions were considerably altered and grew bulkier as Malthus defended his views against a host of critics… The Essay was highly influential in the progress of thought in early 19th-century Europe [and] his influence on social policy was considerable… Both Darwin and Wallace clearly acknowledged Malthus as a source of the idea of ‘the struggle for existence” (PMM 251). Following the initial 1798 edition, “in 1803 Malthus published under his own name the stout quarto that embodies his mature views of his subject. The author confesses in his preface that he had taken too gloomy a view of human nature in his first essay… The achievement of Malthus was the exposition of the theory of population; and his name has been associated so closely with this theory that, like Darwin’s, it has added a new adjective to the language of civilized peoples” (Palgrave II:670-1). Fifth edition: “with important additions.” Kress B6974. Garrison & Morton 1693. Goldsmiths 21761. From the library of highly respected bibliophile Gilbert R. Redgrave, with his bookplates. Redgrave co-authored with Pollard The Short Title Catalogue of English Books, 1475-1640 (STC), a foundational bibliography. The son of artist Richard Redgrave, Gilbert was also a major art critic, architect and author. As is evidenced by this seminal work, Redgrave often wrote learned bibliographical notes in important volumes from his library. With his date of “London. 1885,” Redgrave writes in the blank fly leaf of Volume I his informed notation on this key 1817 edition: “This is the best edition of this famous work, as it contains much additional matter, and many alterations at the hand of the author. In order to complete the previous editions, four in number, the added matter was published as an extra volume. The replies to M. Weyland and M. Graham in the Appendix [III:388-428] are important. The work passed through six editions in the author’s lifetime, viz. 1798, 1803, 1806, 1807, 1817 and 1826.” Minor marginalia to front pastedowns.\nInteriors generally fresh with light scattered foxing, some expert restoration and age-wear to binding. A most desirable extremely good copy, scarce in contemporary boards.", "label": "No"} {"text": "With much of the U.S. currently experiencing severely cold temperatures, many families, school administrators and childcare providers are limiting kids’ outdoor activity. During extreme weather conditions, it’s a good idea to keep kids indoors. However, over the course of the winter season, it can be difficult at times to determine when children should stay inside or play outside.\nRules about outdoor play are included in statewide childcare center licensing regulations. Some states categorize weather conditions using a color code system to help childcare providers assess the weather before allowing children to go outside:\nThe green, yellow and red conditions are only general guidelines for outdoor play in cold weather. Each child will have a different reaction to various temperatures.\nBefore letting children go out to play in cold weather, be sure to take the proper precautions:\nHow’s the weather where you live? Are you aware of any regulations in your state that restrict children’s outdoor play in extreme weather conditions?\n Child Care Weather Watch, Iowa Department Public Health, Healthy Child Care Iowa, Produced through federal grant (MCJ19T029 & MCJ19KCC7) funds from the US Department of Health & Human Services, Health Resources & Services Administration, Maternal & Child Health Bureau. Wind-Chill and Heat Index information is from the National Weather Service.", "label": "No"} {"text": "- Can you get rabies without bleeding?\n- Can you get rabies if bite doesn’t break skin?\n- What is the first sign of rabies in a human?\n- At what temperature does the rabies virus die?\n- Is 7 days too late for rabies vaccine?\n- Can a small bite cause rabies?\n- How long does it take rabies to affect a human?\n- What kills the rabies virus?\n- Why do dogs die after humans bite?\n- How is rabies diagnosed?\n- Do rabies patients bark?\n- Is rabies curable?\n- Can I take rabies injection after 1 day of dog bite?\n- Does rabies make humans aggressive?\n- Does water kill rabies virus?\n- Why are rabies patients afraid of water?\n- Can I take rabies vaccine after 3 days?\n- What happens if u dont get rabies shot?\n- Does Soap kill rabies?\n- How long does rabies virus survive in air?\n- Can rabies kill a human?\n- Can you get rabies from a scratch?\n- How soon do you need a rabies shot?\n- How do you know if an animal has rabies?\nCan you get rabies without bleeding?\nIn our death review also, deaths caused by “scratches/abrasions without blood” amply demonstrate the ability of the rabies virus to enter nerves through dermis due to broken skin and its capacity to cause rabies..\nCan you get rabies if bite doesn’t break skin?\nRabies can’t go through unbroken skin. People can get rabies only via a bite from a rabid animal or possibly through scratches, abrasions, open wounds or mucous membranes in contact with saliva or brain tissue from a rabid animal.\nWhat is the first sign of rabies in a human?\nThe first symptoms of rabies can appear from a few days to more than a year after the bite happens. At first, there’s a tingling, prickling, or itching feeling around the bite area. A person also might have flu-like symptoms such as a fever, headache, muscle aches, loss of appetite, nausea, and tiredness.\nAt what temperature does the rabies virus die?\nThe rabies virus is fragile under most normal conditions. It is destroyed within a few minutes at temperatures greater than 122°F, and survives no more than a few hours at room temperature. The virus is no longer infectious once the material containing the virus is dry.\nIs 7 days too late for rabies vaccine?\nThere is no time limit regarding the administration of PEP after an exposure. In this case it is still appropriate to initiate PEP. Administration of both human rabies immune globulin (HRIG) and four doses of rabies vaccine is recommended regardless of the time elapsed since the exposure.\nCan a small bite cause rabies?\nRabies is only transmitted by animal bites: FALSE. Bites are the most common mode of Rabies transmission but the virus can be transmitted when saliva enters any open wound or mucus membrane (such as the mouth, nose, or eye). As a result, licks or scratches from rabid animals can also transmit the virus.\nHow long does it take rabies to affect a human?\nHow long does it take for rabies to develop? In people, the incubation period (the time between initial contact with the virus and onset of the disease) generally ranges from two to eight weeks. In rare cases, it can vary from 10 days to 2 years.\nWhat kills the rabies virus?\nThe rabies virus is killed by sunlight, drying, soap, and the other agents mentioned. In animal experiments, early effective wound cleaning has been shown to prevent rabies infection. Immunisation is a medical urgency after wound cleaning, although not a medical emergency.\nWhy do dogs die after humans bite?\nFollowing a bite, the rabies virus spreads by way of the nerve cells to the brain. Once in the brain, the virus multiplies rapidly. This activity causes severe inflammation of the brain and spinal cord after which the person deteriorates rapidly and dies.\nHow is rabies diagnosed?\nA diagnosis of rabies can be made after detection of rabies virus from any part of the affected brain, but in order to rule out rabies, the test must include tissue from at least two locations in the brain, preferably the brain stem and cerebellum. The test requires that the animal be euthanized.\nDo rabies patients bark?\nParalysis of the “voice” muscles in rabid dogs may produce a characteristic change in the sound of the bark. Rabies in humans is similar to that in animals. … The muscles of the throat become paralyzed so that the person cannot swallow or drink, and this leads to a dread of water (hydrophobia).\nIs rabies curable?\nOnce a rabies infection is established, there’s no effective treatment. Though a small number of people have survived rabies, the disease usually causes death. For that reason, if you think you’ve been exposed to rabies, you must get a series of shots to prevent the infection from taking hold.\nCan I take rabies injection after 1 day of dog bite?\nRabies is almost always fatal once clinical signs appear. No specific treatment is available for clinical rabies. However, clinical rabies can be prevented through vaccination given before or immediately after an exposure.\nDoes rabies make humans aggressive?\nRabies vectors frequently show behavioral changes. Aggressive behavior with biting is important for transmission of the virus to new hosts at a time when virus is secreted in the saliva. Aggression is associated with low serotonergic activity in the brain.\nDoes water kill rabies virus?\nThe virus will not survive for long in water, but it will last long enough to possibly infect another animal. Rabies has an incubation period. The incubation is the period from exposure to rabies virus until the animal finally becomes sick or acts differently and is capable of infecting other animals or people.\nWhy are rabies patients afraid of water?\nRabies used to be known as hydrophobia because it appears to cause a fear of water. Intense spasms in the throat are triggered when trying to swallow. Even the thought of swallowing water can cause spasms. This is where the fear comes from.\nCan I take rabies vaccine after 3 days?\nTo prevent rabies, four to five doses of anti-rabies vaccine are administered on the 0, 3, 7, 14 and 28 days of a bite. “We abandoned the 16-dose vaccine years ago. The present vaccine is safe and it’s the only way to prevent rabies. Rabies is fatal, but 100 per cent preventable.\nWhat happens if u dont get rabies shot?\nIn fact, because of pet vaccinations, rabies education, and treatment options, 1-2 people die from rabies per year in the United States even though around 40,000 people contract it. But if you don’t receive early treatment after you contract rabies, fatality is almost inevitable.\nDoes Soap kill rabies?\nThe rabies virus is a very fragile virus. As soon as the saliva dries, the virus is no longer infectious. The virus is easily killed by soaps, detergents, bleach, alcohol and ultraviolet light.\nHow long does rabies virus survive in air?\nHow Long Can the Rabies Virus Survive? The virus cannot live outside of the body for more than a couple of seconds, which is good news. Live virus, however, can be found in deceased animals for as long as 48 hours.\nCan rabies kill a human?\nIn unvaccinated humans, rabies is almost always fatal after neurological symptoms have developed.\nCan you get rabies from a scratch?\nPeople usually get rabies from the bite of a rabid animal. It is also possible, but rare, for people to get rabies from non-bite exposures, which can include scratches, abrasions, or open wounds that are exposed to saliva or other potentially infectious material from a rabid animal.\nHow soon do you need a rabies shot?\nThey should also be given a series of rabies vaccinations. The first dose should be given as soon as possible after the exposure. Additional doses should be given on days three, seven, and 14 after the first shot. These shots should be given in the deltoid muscle of the arm.\nHow do you know if an animal has rabies?\nYou can´t tell if an animal has rabies by just looking at it. A clue though is if the animal is acting strangely. Some animals may act mad when they have rabies. They will be hostile and may try to bite you or other animals.", "label": "No"} {"text": "Bitumen emulsion were first tried as a road construction material in the beginning of the 20th century. Originally, the use of emulsion was limited due to low experience and knowledge in the area of emulsion formation, mixing and the technology of emulsion production and application. With time, the use of emulsion grew steadily from the 1920s to 1950s.\nIt was in the mid 1950s when the rapid increase of traffic load made the emulsions inadequate for the task. The interest in emulsions fell, however, bitumen emulsion continued to be used for some purposes.\nAt that period, hot asphalt mix was mostly prepared with bitumen binder. In road construction emulsion were used mostly for ground reinforcement or on secondary roads.\nA new hope for the emulsion came in the beginning of the 1970s, when the energy crisis hit Western Europe and the US. Import of oil became a serious problem, especially so for the US.\nAt this time the manufacturers of road construction materials remembered about bitumen emulsions, which, as before, required no petroleum based solvents or additional heating for the mineral material. The advantages of bitumen emulsion in comparison with thinned bitumen in terms of the ecology were also obvious.\nThis caused significant extension of the use of the emulsions. Emulsion preparation and application methods saw rapid development, quality requirements became higher, test methods were developed. Emulsion production systems keep improving all the time. One of the latest and most efficient solutions is the UVB-1 type unit made by GlobeCore. Beside other advantages of the emulsion, (economic, environmental and performance), it became possible to use the emulsion almost all year long from spring to autumn in temperature above +5 ºС.\nTo efficiently used bitumen emulsion and emulsion based materials, it is important to know how the emulsion interacts with materials of a different origin, how it behaves in different conditions and then formulate the composition of the emulsion with the consideration of all factors.\nApplication of bitumen emulsions increases performance of roads, their durability and offers an efficient and inexpensive road maintenance solution.", "label": "No"} {"text": "Jamal, a handsome, energetic African-American boy, is shown making all the necessary preparations for school that his parents make to begin their day. The upbeat message is that both parents and child can work hard and accomplish much in their respective areas, all have something to contribute. Such is the joy in sharing Jamal’s Busy Day (Feeling Good Series) (Feeling Good Book) by Wade Hudson (Author)\nIn its own way, Jamal’s day is as demanding as theirs: he “works with numbers” in math class, does “research” in the library, has “meetings to attend” in the school auditorium and occasionally settles schoolyard “disagreements between my co-workers.” The upbeat message is that both parents and children can “work hard” and accomplish much in their respective arenas: all have something to contribute and all work has value. Illustrating this sweetly didactic story are Ford’s (Bright Eyes, Brown Skin ) realistic watercolors, which present a boy full of energy and excited by his truly “busy day.” Ages 3-7.\n” Jamal, a handsome, energetic African-American boy, is shown making all the necessary preparations for school that his parents make to begin their day,” reads a review in School Library Journal. ”\nAfter washing, brushing his teeth, and dressing himself, he has breakfast with his father and mother, an architect and an accountant. Using one or two sentences per page, Jamal compares his “work” to that of each of his parents: making drawings, working with numbers, doing reports, taking a crowded bus home, etc. He is beautifully portrayed as an empowered child in the appealing drawings that reinforce the success motif throughout. This early reader is a real winner.\nWade Hudson’s career as a writer spans more than three decades. In 1988, Hudson’s passion for writing and life-long mission to help foster positive self-image within the Black community, prompted he and his wife Cheryl to launch Just Us Books, the nation’s leading independent publisher of Black-interest books for young people. Another imprint, Marimba Books, was launched in 2008, with a focus on multicultural literature for children and young adults.\nAn accomplished and award-winning author, he has written more than 25 books for young people including, AFRO-BETS Book of Black Heroes, Poetry from the Masters: The Pioneers and Jamal’s Busy Day, Pass It On: African-American Poetry for Children, Powerful Words: More than 200 Years of Extraordinary Writing by African Americans and the Great Black Heroes series. His most recent titles include Its Church Going Time, Places I Love to Go, and Puddin, Jeffrey and Leah: Best Friends.\nHe is also very active in his community, serving on the board of the Isaiah House in East Orange, NJ and the Langston Hughes Library at the Alex Haley Farm, operated by the Children’s Defense Fund. In 2004, he and his wife co-founded The Knowledge Is Power Project, a non-profit youth literacy organization dedicated to bringing children and books together. He is a Stephen Crane Literary Award recipient, was named a “Man of Valor” in Newark, NJ and was inducted into the International Literary Hall of Fame for Writers of African Descent. His literary affiliations include PEN America and the Authors’ Guild.", "label": "No"} {"text": "Learning to read and rescuing malcolm x from his calculated myths comparison learning to read and rescuing malcolm x essay with my thesis, 'learning to. Royce jenkins-stone “learning to read” by malcolm x outline “learning to read” was about the significance of learning to read and write he tries to inspire people if he can teach himself. Reading, thinking, analyzing, researching: strategies for the ged he had learning to read while he was (after students have read the essays by malcolm x. More about a closer look at malcolm x's tactics essay essay about malcolm x's learning to read analysis(a score of 7 981 words | 4 pages + popular essays. Malcolm x - learning to read the essay learning to read by malcolm x is a great example of how each person is responsible for their own education.\nCharacter analysis malcolm x (malcolm little three assessments of malcolm x study help essay malcolm acknowledged that another reading of the manuscript. Essays and criticism on malcolm x [in the following essay, benson offers an analysis of malcolm x's for an essay on learning to learning to read is an. Without learning to read marc x would correct on patience to read malcolm xin the malcolm x learning to read essay analysis satisfaction to read, ben x describes his homemade inverse. Text analysis essay example paper malcolm x learning to read essay edition education social networking editorial essay meaning paper health and hygiene in kannada.\nLearning to read by malcolm x summary from an articulate street hustler to one of the most well spoken black men in his era, malcolm x explains how he. Rhetorical analysis final although malcolm x’s reputation as a controversial figure in black history learning to read. Free learning to read malcolm x papers, essays, and research papers.\nFrederick douglass and malcolm x comparison essay nneoma okeoma sept 28, 2011 2a frederick douglass and malcolm x read and write) and in malcolm x (learning. With a free essay review - free essay reviews essay malcolm x) in their quest to learn to read and your essay doesn't seem to have any analysis of.\nMalcolm x's learning to read analysis(a score of 7 essays: over 180,000 malcolm x's learning to read analysis(a score of 7 essays, malcolm x's learning to read analysis(a score of 7. Krishay hayes-motley ap lang & comp msbruer 26 october 2016 rhetorical analysis in the autobiographical essay “learning to read”, malcolm x argues that literacy is the key to intellectual. Commentary of learning to read in malcolm x´s “learning to read,” malcolm x talks about how the autobiography of malcolm x essay - the.\nIn learning to read, an excerpt found in the autobiography of malcolm x, author malcolm x attacks his illiteracy while imprisoned for battling the white man.\nPrivate essay writing service malcolm x learning to read essay dissertation pre proposal help physics parallel circuits homework. Malcolm x learning to read essay malcolm x learning to read essay malcolm xs learning to read analysis(a score of 7 essay example throughout malcolm xs learning to read his tone and. Read this essay on malcolm x learning to read come browse our large digital warehouse of free sample essays get the knowledge you need in order to pass your classes and more. 600 words - short analytical review of the 3-page long learning to read extract from malcolm x's autobiography.", "label": "No"} {"text": "Newmont planning to advance Akyem mine project in Ghana Forest Reserve\nMarch 24, 2011\nColorado-based Newmont Mining announced today that they have approved funding to develop the Akyem gold mine project in Eastern Ghana. This destructive mine project would create an open-pit in a Forest Reserve, threaten water sources, and displace around nine thousand people from their homes, lands, or livelihoods.\nCommunities in Ghana have expressed great concern about the Akyem project, and their concerns have already stalled the mine project several times. WACAM and other community groups have protested over the company's plan to mine in a Forest Reserve, potential impacts on water supply, loss of access to land, and inadequate compensation plans for displaced communities. Newmont has already displaced some community members. In total, over a thousand people would lose their lands and homes, and thousands more would lose their agricultural lands. The mine would destroy approximately 340 acres (140 ha) of tropical forest and a quarter of the forest left in the Ajenjua Bepo Forest Reserve. In 2009, the project gained notoriety when it caused Newmont to receive the Public Eye Award for irresponsible practices.\nNewmont has yet to adequately assess the impacts of the project and never accounted for serious technical and biodiversity concerns expressed by civil society groups. In 2008, independent reviews of the draft mine plans by the Center for Science in Public Participation and Earthworks revealed that the project had failed to plan to adequately line the waste storage areas or to reduce the threat of cyanide and other toxic acid mine drainage contamination. The company also neglected to thoroughly survey and accurately assess impacts on biodiversity. The project's impact statements also neglected to consider a smaller surface or underground mine for the project in order to destroy less land. When the company produced its Final Environmental Impact Statement, all of those issues remained a problem.\nNewmont now appears to be advancing with the project in spite of possible economical setbacks as well. The company revised estimated gold reserves for the project down by 0.5 million ounces in 2010. Costs may also have gone up. Although some previous estimates were that the project would cost $500 million, the company was estimating as of February that capital expenditure would be between $700 million and $1 billion.\nRead more about:\n- Newmont's announcement\n- No Dirty Gold information on the Akyem project\n- Independent reviews of the Akyem project", "label": "No"} {"text": "Toxidromes are constellations of symptoms commonly encountered with certain drug classes. Evaluation of possible medication poisonings should include laboratory studies with complete metabolic profiles, electrolyte estimation, and liver and renal functions.\nSupportive Treatment Critical Care Setting Spine Immobilization Paediatr Child Health Syndromic Approach\nThese keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.\nThis is a preview of subscription content, log in to check access.", "label": "No"} {"text": "Paper 1. \"'To Capture a Picture': The Novel and Photographic Realism in Late-Nineteenth-Century North India,\" Jennifer Dubrow, Univ. of Washington, Seattle\nThis paper explores the connection between realism and photography in late-nineteenth-century north India through the case of Fasana-e Azad, arguably the first Urdu novel. The work of Ratan Nath Sarshar (1847-1904), Fasana-e Azad inspired a storm of activity among Urdu readers and critics. Its publication in daily installments within the Urdu newspaper Avadh Akhbar helped to significantly expand the growing reading public for the novel. Furthermore, Fasana-e Azad's discussion through readers' letters and author's editorials valuably illuminates how the novel was understood in late-nineteenth-century north India.\nIn this paper I focus on a series of statements made by Fasana-e Azad's author Ratan Nath Sarshar in which he laid out a new definition of realism as \"to capture a picture\" (tasvir khincna). I examine this phrase's connection to both the growing movement of natural poetry in Urdu and the rise of photography and other mass visual media in the city of Lucknow. Unlike in Victorian England where the connection between realism and photography has now been established, the relationship of literature to visual media has remained unexplored in the scholarship on Urdu and other Indian literary traditions. I trace how Sarshar and his readers focused on photography's affective quality, which they interpreted as its ability to penetrate directly to the viewer's heart and excite emotion. They claimed that the realistic novel would do the same.\nPaper 2. \"The Interplay of Journalism, Realism, and Artistry in the Photography of Lala Deen Dayal,\" Deborah Hutton, Coll. of New Jersey\nLala Deen Dayal (1844-1905; active 1874-1905), India’s most celebrated 19th-century photographer, established his reputation taking pictures of architecture, landscapes, and important people and events of the day—subject matter that falls squarely into the category of documentary photography. Originally trained as a surveyor, Dayal tended to favor an elevated, “all-seeing,” modern empirical vantage point in his photography, thereby augmenting the sense that his pictures acted as encompassing and straightforward visual documents. Yet, Dayal, his patrons, and late 19th-early 20th century reviewers of his work widely considered him an “Artist-Photographer.” Indeed, the Bombay Gazette, in its lengthy obituary of Dayal proclaimed him “India’s first great photographer and artist.” Clearly, this suggests that the question of photography’s status as art versus its role as an indexical record of things, so forcefully debated in 19th-century England and France, was not central to the medium’s practice and reception in India. What then was the relationship between the “artistry” of Dayal’s photographs and their “realism”?\nDayal’s images circulated in several mediated formats that further complicate this question. Throughout the 1880s and 90s, many of his photographs served as sources for engravings published in popular London-based illustrated news magazines such as The Graphic. Somewhat ironically, the photojournalistic (re)use of his pictures relied upon another artist (the engraver) to translate the images into an easily reproducible form (newspapers and magazines did not yet have the capacity to easily print photographs), thereby negating, it would seem, the indexical value of the original photographs. During the same period, detailed written descriptions of his photographs frequently appeared in regional as well as India-wide newspapers, without any accompanying images. In these instances, Dayal’s photographs transformed from being realistic record of events to newsworthy events themselves to be documented and evaluated. How did the widespread circulation of Dayal’s photographs in these two mediated formats affect their reception as photojournalistic documents and art-objects? And what can these formats tell us about the criteria on which his photographs, and presumably others, were judged?\nBy focusing on these printed references to and reuses of Deen Dayal’s images, as well as Dayal’s own framing of his work in writing and advertising, my paper will explore the interplay between journalism, realism, and artistic value in the reception of Dayal’s photography. By probing these relationships, I hope not just to call into question the dichotomy between art photography and documentary photography, inherited from debates in 19th century France and England and still dominating the structure of “world” history of photography textbooks. I also hope to both broaden and sharpen ongoing discourse about how photographic imagery was viewed and valued in late 19th-century India.\nPaper 3. \"Emergent Photographic Genres and the News: Snapshot Photography, Film, and the Illustrated Photo Book,\" Sudhir Mahadevan, Univ. of Washington, Seattle\nMahadevan follows photography's engagement with mass culture and its intersection with other media forms in the first few decades of the twentieth century. His paper examines the emergence of vernacular and prosaic photographic genres at the turn of the twentieth century in South Asia, with the advent of the halftone process and the portable hand camera. He juxtaposes three forms of visual representation: a cinematic record of a grandiose imperial ritual, the Delhi Durbar of 1902-3, a photo-illustrated book of the same event, and snapshots produced of political turmoil in later decades of the twentieth century by amateur and anonymous photographers. He argues that these new formats and genres wrested conceptions of topicality, newsworthiness and the \"eventful\" from the domain and control of the state.", "label": "No"} {"text": "Archive for December, 2010\nCalcium is a Key Ingredient for Bone Health. If you do not have Calcium in your diet, or take Calcium supplements, you CANNOT have strong bones. Calcium is the mineral part of bone. Calcium is necessary for bones to be strong.\nVitamin D is much more important than we thought even 3 years ago. We now know that our Daily Vitamin D Needs are much higher than official government Minimum Daily Dose. Vitamin D Deficiency causes many serious problems, including poor absorption of Calcium from diet and supplements causing Osteoporosis. Other very serious complications of Vitamin D Deficiency affect nerves, muscles, the heart, the immune system and other parts of the body.\nOsteoporosis is a growing problem which will affect over half of all women and a quarter of all men during their lifetimes. The good news is that we are learning better ways to prevent and treat osteoporosis.", "label": "No"} {"text": "In this 2:27 video, John describes this winter’s project: converting a dying forest into pastures. Check out the video and then read on for the rest of the story.\nForty years ago I came home from college to find that my farther had built a new fence on the southern edge of the home place, slicing off ten acres of rough grassland and brush. Next, he planted that area to trees, one half to Douglas fir and the other half Ponderosa pine. I wasn’t too surprised by this, as my dad was fascinated with forestry and this was a pretty difficult patch of pasture anyway. Besides, I had plenty of other things to worry about: girls, etc. I’m sure you understand.\nFast forward thirty-five years and I found myself leading a ranch tour that included a walk through that stand of trees, and I remember the negative reaction of some folks when I mentioned that the forest didn’t look very healthy, and that I could see that we would need to harvest before too long.\n“But the trees are so beautiful! Why would you cut them down?”\n“Because they are getting ready to die.”\nNext, sad faces and a discussion about the characteristics of healthy trees and not-so-healthy ones. Generally speaking, conifer trees (trees with needles, such as firs and pines) grow a new “leader” and a new “whorl” of limbs each year. The length of the leader says a lot about how fast the tree is growing, and rate of growth is a primary indicator of health. In really good soil and growing conditions, a new Doug fir leader might be two or even three feet tall. Over the past few years, the trees in question had been reduced to leaders of only a few inches, and now some of those were turning brown. When the top of a tree is brown instead of green, the entire tree will soon be dead. I don’t know if trees suffer, but when an entire stand of trees begin to decline it’s time to make a decision: harvest the trees or stand by and watch them\nOver the past five years or so our weather has gotten hotter and drier. One result of this has been a shorter growing season for the forests: shorter leaders, less growth, and individual trees in thinly-soiled sites dying. This entire stand was dying, due to the nature of the soil: clay that was wet in the winter, dry in the summer, and not very deep. And even though these trees were only forty years old, it was time to make a decision. This past winter we elected to harvest the trees before they started to fall down on their own.\nThe next question was, what to do with that land after the harvest? Forty years is a relatively short for cycle trees; shorter than I want, anyway, because it means a tremendous physical/biological disruption at the site every harvest. In addition, if our current climate/weather pattern continues, that site (the soil, aspect, slope) will tend toward an even shorter cycle. It was time to consider other alternatives.\nConverting a forest into a pasture is not for the faint of heart. The pioneers did it two hundred years ago, but most of them died young after a few decades of brutal effort. Luckily, we have mechanical advantages that our forefathers lacked. First, the trees would need to be removed, the mess cleaned up, the land planted, and finally, managed as a pasture. Experience told me that conversions like this require some serious degree of input, and the proper place to spend the effort is at the beginning.\nWe began by looking for a logger that had the proper equipment. We found a fellow with a machine that could cut the trees off nearly at ground level. Most of the stumps on this new “pasture” are only a few inches tall, meaning we will be able to drive right over them when we need to.\nNext, we brought in a “macerator”, a machine that looks something like a street sweeper on steroids. The rotating drum has large solid steel teeth that grind up limbs and brush, then mix the debris into the top horizon of soil. In the end, the results are not at all like a classic seed bed, but there is enough bare dirt showing to allow some seed to find purchase. I hope so, at least.\nA Few Problems\nHimalayan Blackberries! Our part of the world is highly infested by this Asian invasive plant with beautiful foliage, wonderfully sweet, juicy berries, and horrible thorns. It is also highly aggressive, typically covering sites like this completely. Without control, Himalayans quickly dominated the logging site in the few months between logging and seeding. I was able to hire a farmer friend to boom spray the entire site with a special cocktail of broadleaf herbicides, and the results were very encouraging. I suspect we will need to do quite a bit of maintenance over the next few years too. These plants are a difficult foe.\nChoosing What to Plant\nThe goal here is to establish a permanent pasture on a low pH, low nutrient, clay soil. In my experience, the species that will survive here will be deep-rooted Fescue, Meadow Foxtail, and a bunch of local natives. We selected a variety of Fescue called Brutus and seeded at an extraordinarily high rate of 50 pounds per acre. My thinking here is that survival will be limited, so a huge seeding rate will be helpful. Also, in relation to the high cost of site prep, grass seed was a minor cost in this project. We did not plant any annuals, as I believe they would out-compete the fescue seedlings for water very early in the growing season. Because I suspect this site will require additional herbicide applications, I elected not to plant any legumes or broadleaf forbs of any kind. Maybe we’ll add some in a later application, or perhaps we can find a way to feed some hay on this site down the road. So, the seeding plan was simple: pour on the fescue and hope for the best.\nIn addition to all of the other difficulties this site brings, I expect a serious challenge from one of our favorite species: wild turkeys. Last year I hand-seeded a small area that had been disturbed by a construction project. A few days later, I watched in horror as a huge mob of turkeys marched back and forth across the site, pecking away at my grass seed. In the end, enough seed escaped to make a fine stand, so I’m hoping the same thing happens at the forest conversion site. Praying, actually.\nI think there will be plenty of fescue seed to form a new pasture sod at this site, but I doubt it will thrive. I also think it will look like a huge weed patch, probably three or four-feet of thistles and broadleaf weeds and a large population of wild grass, too. I expect to drive past this “pasture” all summer without even glancing out the window. Next fall, I’ll spend some time on hands and knees, searching for fescue seedlings. The initial grazing of this pasture will happen in the summer of 2021.\nThis is, at best, a difficult project. The cost of converting a forest to pasture land is very high. In the end, I feel like we are adapting to the reality of the changing conditions we live in. This site could likely support a short-term forestry cycle, perhaps using a non-commercial species like White Cedar, but that’s not a very attractive option. In five years or so I’ll know if we made the right decision. I feel like we have to keep going forward, even if the trail is difficult. In the meantime, please wish me luck, and…", "label": "No"} {"text": "Hydraulic fracturing method of collecting natural resources. (via WIS)\nCountries all over the globe are consuming vast amounts of energy, most of which is provided by fossil fuels. The processes of extracting oil (shale, crude, heavy crude, tar sands, etc.) and other fuels including natural gas, coal and even uranium for nuclear power can have long-lasting damaging effects on humans as well as the environment. The levels of those effects are dependent on what process is used to extract the fuel as well as where it’s being extracted. Technology has certainly played a huge roll in drilling and mining operations by making it easier to locate those fuels sources as well as making the extraction processes more efficient, thereby lessening the overall damaging impact on the surrounding environment. Drilling, mining and hydraulic fracturing are the current methods used to extract those fuels from the earth but is any one method better than the others when it comes to negative environmental impact? Let’s go through a few and see how they stack up against each other in terms of damage prevention and what technology is helping to curb both the short and long-term effects.\nCoal: the most abundant fossil fuel on the planet.\nRemote Joy HM21 Continuous Miner. (via impacts of coal mining)\nOne of the most abundant fossil fuels on the planet is coal and it can be found on almost every continent. Its use began in the 18th century at the start of the industrial revolution and coal is still widely used for fuel today, however the methods of mining the material have been dramatically reformed since then. Gone are the days of using a pick and shovel to extract the coal by hand, which were replaced by coal-cutting machines in the 1880’s, which in turn, by 1912 were replaced by steam shovels powered by the coal itself for use in surface and underground mining. As it stands today, coal mining in more developed parts of the world has acquired updated technology, such as continuous mining machines (among a host of others) and conveyors that allow workers to chew through 5 tons of rock per minute (the same amount mined in a day back in the 1920’s). Safety standards have also improved with modern mines now using sophisticated ventilation systems that lessen the risk of coal-dust explosions. Natural gas/methane detection and ventilation systems are now in place as well, which not only lessens the chance of explosions but also can be reclaimed to power gas engines that generate electricity. Workers also have specialized equipment such as coal-mining dust masks that reduces or eliminates altogether the issue of ‘black lung’ (pneumoconiosis) disease acquired while working in the mines over long periods. While coal may be abundant, the excavation and mining process of the fuel has significant impact on the environment. Surface mining destroys the soils genetic profile, eliminates any vegetation, destroys wildlife habitations, drops air quality in the immediate area and permanently changes the topography (erosion) of the area mined. Ground water and aquifers are also affected with directional flow changes, poor water quality due to mine drainage and toxic elements leaching into the water sources. There is also the possibility of underground fires that can rage for years or even decades (Centrailia, Pennsylvania for example) and leave cities uninhabitable. Burning the fuel is another matter altogether, as it causes air pollution, which has recently been linked by the WHO to both global warming as well as cancer.\nUranium: mined for nuclear power plants and reactors.\nSteam rising from the Susquehanna nuclear power station. (via Nuclear Power)\nIn many respects, uranium mining for use in power stations and reactors is similar to that of coal mining. Like coal, uranium is mined using several techniques including open-pit, underground and other methods such as heap and in-situ leaching (chemically extracted uranium). Much of the same technology used in coal mining is employed for uranium as well, including massive excavators and cargo vehicles but depending on the grade of the uranium, technology that is more sophisticated is used. In open-pit operations where high-grade ore is present, the concentration of radon gas and particles are higher than normal and therefore require the use of ‘suppression and dampening systems’ using water to keep dust levels down (not so high tech) along with radiation-proof shacks workers can use to keep radon exposure to a minimum throughout the work day. In more extreme cases where ultra-high grade ore is mined, robotic ROVs are used for mining purposes. Most open-pit and underground mining operations also have an on-site mill where the ore is crushed and chemically treated with sulfuric acid to separate the ore from other rock and minerals. The waste rock is then dumped back into the pit or cavern when mining operations are completed, so there is a reduced impact to the environment over traditional mining of metals. Uranium mining isn’t without its faults however, as some workers contract lung cancer (due to high levels of radon particles) at higher rates than those in coal mining operations. The environmental impact is also high, water (now irradiated to some degree) tasked for dust dampening is usually pumped back into nearby rivers and lakes, which contaminates the surrounding soil as well. Underground uranium operations vent radioactive particles and radon gas into nearby areas, which can have adverse effects to residences living nearby. The refined uranium fuel rods that power nuclear plants and reactors can have devastating effects over large-scale areas when damage occurs, as recently demonstrated by Japan’s Fukushima breached reactors. The long-term effects of which are still unknown but could be devastating not only to land-based environments but to sea life as well rendering local regions uninhabitable.\nOil: the fossil fuel that makes the world go round.\nModern oil drilling rig. (via oil well drilling)\nOil is the one fossil fuel that has been in demand since the beginning of time. The earliest known modern approach to drilling and tapping this resource was done in China around 347 CE. The wells were drilled to an astounding 800 feet using drill bits attached to bamboo poles. Fast-forward to the 21st century and those bamboo rigs have since been replaced with computerized systems that allow for drilling both on land and off shore. Detecting the fuel was typically done by using exploratory drilling (still widely used today) denoted by geologists who look for the ‘right’ conditions where oil may be found. Thanks to technology upgrades, those geologists now have access to sophisticated devices to search for oil, such as gravity meters and magnetometers that can detect oil by measuring micro-changes in the Earth’s magnetic fields. Satellites are often used to look for geological formations that have the telltale signs that the fuel is present, unless, of course, the oil is under water, in which case hydrophones are used. Air guns are also employed when exploring in water, which ‘shoots’ pulses of air into the water that produces a seismic shockwave that can be measured for density. New developments in drilling lessen the overall wells needed to siphon off the oil deposits, which includes horizontal drilling that allows more oil to be extracted from a single well. Drilling isn’t without its problems however, as exploration can divert wildlife from their natural migration paths as well as destroying their habitats resulting in diminished populations. Toxic chemical runoffs due to the ‘mud’ used for drilling can destroy the water quality of nearby rivers and lakes, however the biggest problems come with offshore drilling operations. As an example consider the BP oil spill back in 2010 where 200 million gallons of oil was discharged into the Gulf of Mexico. Efforts were taken to contain the spill using controlled burns (causing air pollution), floating booms and Corexit oil dispersant. The results of the damage caused is still under debate, however it is clear that extensive damage was caused to marine life in the Gulf, which in turn affected commercial fishing. The chemical Corexit (made up of over 50 separate chemicals) is thought to be a cancer-causing agent with five of those chemicals being carcinogenic. The chemical also destroyed all plankton in the area, which is vital to marine life and the Gulf food chain. Tthe full extent of the damage caused by the Depp Water Horizon spill and what effects it caused in nature may never be known.\nHydraulic Fracturing: a revamped process of an old technique for fuel extraction.\nHalliburton fracking chemical mixer and well injector. (via hydraulic fracturing)\nWhile some may think hydraulic fracturing to access fossil fuels is a new technique, it was actually demonstrated in 1947 and put in wide-scale use in 1949. The process of harvesting oil and natural gas using the ‘fracking’ method involves pumping fluids at high pressures to fracture rock and shale to access those fuels. The chemicals are usually mixed with sand, which allows the crack formations to remain open allowing for a more efficient extraction of fossil fuels. Three different types of chemical makeup are used depending on the type of fuel being harvested, including a foam, gel and slick-water based proponent. The most popular, slick-water, is comprised of hydrochloric acid (for dissolving rocks), guar gum, biocides, emulsion breakers/emulsifiers as well as radioactive tracer isotopes to determine fracture locations. To determine the fuel’s precise location, geologists use 3D and 4D seismic imaging software that creates a detailed picture of where the fuel is located as well as how much of it there is. Fiber-optic sensors are also employed to measure temperature and pressure information, which helps maximize the extraction process. The potential environmental problems associated with fracking are extensive and include chemical runoff that can destroy ground water and aquifers in the surrounding areas, causing sensory, respiratory and even neurological damage in wildlife as well as humans. Runoff and waste fluid is often left in open-air pits to evaporate, which release volatile organic compounds into the air, creating acid rain and ground-level ozone making it difficult to breath. An estimated 300,000 barrels of oil and natural gas are produced on a daily basis in the US, making the process inefficient compared with other methods especially when factoring in the damage caused. Fracking seems like a desperate attempt to wring out the planet. Desperation leads to pursuing the goal “by all means necessary,” and crushing the environment in the process is the result.\nSee more news at:", "label": "No"} {"text": "The ten biggest food and beverage companies in the world are slowly waking up to their responsibilities to help tackle some immense challenges facing the global food system.\nThe problems facing our food system are stark: 840 million people hungry, more than one billion overweight, climate change threatening crop yields and the supply of fresh water, competition for land and water leading to conflict and unrest. Within this system, enormous influence rests in the hands of just a few giant brands that have the power to help change the system for everyone. In a world with 7 billon food consumers and 1.5 billion food producers, no more than 500 companies control 70 percent of food choice.\nJust ten of those companies, the ‘Big 10’, Associated British Foods (ABF) Coca-Cola, Danone, General Mills, Kellogg, Mars, Mondelez International Nestle, PepsiCo and Unilever, together earn more than $1.1 billion per day. Their annual revenues of more than $450 billion are equivalent to the GDP of all of the world’s low-income countries combined. Their supply chains are linked to every part of the system, from the farmers to consumers. Shifts in how they do business ripple throughout the world’s food system.", "label": "No"} {"text": "A terrific plant is just coming into bloom that is not often used in the landscape and native gardens, though it is an outstanding choice for many conditions. Walter’s Viburnum or Viburnum obovatum, is a native plant to a large portion of the U.S. and deserves more attention and use.\nWalter’s Viburnum is a variably sized shrub or small tree named by Thomas Walter (1740-89), an English-born gardener from South Carolina. It has a wide native growing range, from Pennsylvania/Maryland through South Florida and westward up the California coast. This Viburnum has several forms and varieties, all slow growing.\nNeat and tidy, Walter’s Viburnum leaves are opposite, 1 to 2.5 inches long and usually evergreen or semi-deciduous, somewhat spoon-shaped with the narrow end attached to the stem. They occasionally have small teeth towards the tip and are bright, shiny, dark, or olive green. The flowers are attractive, pure white, held in rounded clusters called umbels, 1 -2 inches across. Individually, the flowers are 5-petaled, star-shaped, small, appearing in late winter to early spring and last only for a few short weeks. The small fruit, less than 1/3 of an inch across, follows the flowers and is a berry that changes color from green to pink to red to black in the fall.\nA variable plant, the common species usually grows 8 to 30 feet tall and 6 to 10 feet wide. However, several compact cultivars (cultivated varieties) are available. These selections are useful in small landscapes, beds, and as layers in hedging around the building foundation. Some cultivars can be pruned as short as 3 to 4 feet for a tight hedge or bed edging.\nWalter’s Viburnum is an easy-to-grow, tolerant plant. It will flourish in full sun or part shade. When mature, Walter’s V grows in a wide range of soils from occasionally wet to well-drained. When newly transplanted, water regularly for six months to a year until well established. Though Walter’s V is often found in moist locations when growing in the wild, it has some drought tolerance once it settles in.\nWalter’s Viburnum has a fine texture that makes it suitable for shearing into formal hedges and shapes. However, it has a lovely lacy texture when pruned minimally by hand. If a hedge is the goal, choose one of the compact or dwarf varieties; they are a bit slow-growing, making constant pruning unnecessary. Few pests are known to cause these adaptable native plants problems. Walter’s Viburnum may be challenging to find but is worth the effort.\nThis column first appeared in the Treasure Coast Newspapers.", "label": "No"} {"text": "About Allen Associates\nIn our experience there is generally a good understanding amongst lawyers about what psychiatrists and psychologists do and how they can help the legal process. However in some cases it can be difficult to know whether a psychiatrist or a psychologist is the right expert and we thought a little background might help, though we are always happy to discuss individual cases with you.\nAbout Psychiatry and Psychiatrists\nPsychiatry is a medical specialty; just like, for example, orthopaedics or paediatrics. Psychiatrists are doctors who, after medical school, will have trained for at least 6 years, to specialise in one or more of the many subspecialties of psychiatry. Psychiatrists can thus be experts in mental illness, substance and alcohol misuse, personality disorders and a range of other miscellaneous conditions such as sexual deviancy. The expertise will differ between psychiatrists, depending on experience and training.\nAlthough psychiatrists have a good understanding of psychological processes and there is considerable overlap with the skills which psychologists have, they approach their work in a different way to psychologists, relying primarily on clinical observation skills. This is absolutely fundamental to an understanding of the way in which they work and often leads to misunderstandings. Although there are some questionnaires which a range of professionals use, the overwhelming majority of psychiatrists are not trained in or qualified to use the specialist psychological tools used by psychologists.\nFor a psychiatrist, like any other doctor, the process by which they view patients or clients is divided into History and Examination. The History is the account of the person’s symptoms, supplemented by a series of questions under agreed headings such as Family and Social History. The Examination for psychiatrists can include a limited Physical Examination but always consists of a Mental State Examination, again under recognised subheadings, such as mood, perception and cognition.\nIt is important to understand two things about the Mental State Examination; firstly, much of it is done concurrently with the taking of the History. Psychiatrists are adept at watching out for both the form and the content of what people are saying. Secondly, although perhaps not as scientific as a blood pressure reading, it represents psychiatry’s take on objectivity – it is not representative of the psychiatrist’s opinion per se.\nPsychiatrists, being doctors, often prescribe medication. This is because their core expertise lies in the area of treating disorders and those which respond to medication – mostly, those disorders termed ‘illnesses’ are usually left to psychiatrists to treat. But psychiatrists are perhaps better thought of as being the leader of the orchestra. Because psychiatrists are trained in diagnosis, they are usually the first person a patient sees for an assessment. They then decide on a treatment plan which will very often include being seen by other members of the broader team, which includes psychologists, nurses and occupational therapists.\nThere are numerous subspecialties in psychiatry which are important in considering expertise. The main differentiation is by age, with child and adolescent, adult and elderly psychiatrists being the main three. However, learning disability psychiatrists specialise in people with low IQ, classically under 70, meaning that unless IQ is known in advance (and this is assessed by psychologists), there can be issues with expertise. Forensic psychiatrists specialise in seeing people involved in the criminal justice system – usually those with more severe offending behaviour. Clearly, there is some overlap between these specialties and the boundaries are sufficiently ‘fuzzy’ for this not to be an issue in many cases, but it is always helpful, if there is doubt, for a psychiatrist to review a case in advance to see whether it might better be dealt with by a colleague from a different specialty.\nOne of the main issues which confuses people is the problem of psychological versus psychiatric injury or distress. Psychiatrists essentially deal with the abnormal and a psychiatric condition, by definition, is one which falls outside the norm. Hence, it is completely possible for someone to be incredibly distressed by something which has happened to them but to have no psychiatric condition at all. This is because, in simple terms, ‘normal people would react in the same way’. The classic example, which people can easily relate to, is bereavement, but there are many other examples which are less intuitively understandable.\nAbout Psychology and Psychologists\nPsychology is a very wide discipline and starts from an academic background which covers many different aspects of human and indeed, animal functioning. In terms of careers, many psychologists will have an undergraduate qualification in psychology with the vast majority having undergone further training, experience and gained postgraduate qualifications in the areas they are expert in.\nPsychologists work in many areas of life, for example, in education, business and therapeutically. Psychologists who work therapeutically are known as clinical psychologists but, even within clinical psychology, there are subspecialties and some psychologists are expert in one or more of one of these. There are child psychologists, forensic psychologists, neuropsychologists and counselling psychologists amongst many other categories.\nFurthermore, other practitioners such as nurses are trained in aspects of psychotherapeutic work so they can do, for example, cognitive behavioural therapy or outcome-focused therapy. To confuse the matter further, there are other people who work in a ‘talking therapy’mode. These include counsellors and psychotherapists. Sometimes, these people are also psychologists, but not always!\nPsychologists, psychotherapists and counsellors will sometimes assess people directly and sometimes receive referrals from psychiatrists. It can be difficult, as a patient, to know whom you need to see and getting a clear ‘diagnosis’ and having treatment options properly explained is vital. The term diagnosis is essentially a medical one so not all practitioners relate to it. Other terms such as formulation are sometimes used, but clearly there has to be some shared understanding of what the problem is before something can be done to help.\nSome psychologists will use ‘tools’. This is a specific term referring to a series of questions which are then expertly interpreted by the psychologist. ‘Raw data’ from these tools can be misleading for the lay person if not properly interpreted by the psychologist. One of the best known types of tool is that for assessing IQ. This is a good example of a complex area which needs a lot of explanation to understand it properly.\nThe majority of people who encounter psychologists in a therapeutic setting will be seeing them for help with a problem which they have identified and/or which has been elucidated by a professional. Treatment is usually multiple, consisting of a number of sessions lasting from 50 to 60 minutes and proceeding on a weekly basis until there has been some agreed resolution to the identified problem. People are mostly expected to practise techniques or reflect on the sessions in between appointments and much of the ‘work’ is done by the person outside the session.\nAbout the limits of expertise\nWhilst you are clearly the experts on the law, we have to be able to delineate our expertise. This applies particularly in the field of psychiatry, where there are many subspecialties. Nowhere is this more important than in the area of intellectual disability, where knowing the IQ in advance can sometimes determine which expert to see.\nWe always encourage you to discuss questions you want answered. In most cases there is no issue but, particularly in some criminal cases there can be a tendency to rely heavily on counsel’s perception of what a psychiatrist can determine. Occasionally this is complimentary but inaccurate. One must always have in mind the fact that psychiatrists derive their expertise from seeing and treating patients. It therefore follows that there are limits to their familiarity with other aspects of your case.\nA particular area of concern is the criminal defence of automatism. This is a very rare finding indeed in clinical practice, yet a very common request from criminal solicitors. If alcohol or drugs are involved we strongly encourage you to discuss this first with the psychiatrist. If a sleep automatism is being considered it is important to understand that if the psychiatrist feels that there is evidence to support this concept, further studies from a sleep specialist (a non-clinician) will almost always be required.\nNeither psychiatrists nor psychologists derive their expertise from looking at artefacts of any kind. It is inherently unlikely that we would be able to consider some written, photographic or video material as primary evidence of mental disorder, though they can always be considered alongside other material.", "label": "No"} {"text": "- 1 What day is Inauguration Day 2020?\n- 2 How do you explain inauguration?\n- 3 What is inauguration day for elementary students?\n- 4 Is Inauguration Day 2021 a federal holiday?\n- 5 How long is the inauguration ceremony?\n- 6 Which president did not use the Bible to take the oath of office?\n- 7 What is the purpose of an inauguration speech?\n- 8 What is the root of the word inauguration?\n- 9 What does inaugural mean?\n- 10 How do you teach students about Inauguration Day?\n- 11 How can I watch the inauguration with my students?\n- 12 What are the 10 paid holidays?\n- 13 Are banks closed on Inauguration Day 2021?\n- 14 What happens if a holiday falls on my day off?\nWhat day is Inauguration Day 2020?\nThe 20th amendment to the Constitution specifies that the term of each elected President of the United States begins at noon on January 20 of the year following the election.\nHow do you explain inauguration?\nIn government and politics, inauguration is the process of swearing a person into office and thus making that person the incumbent. Such an inauguration commonly occurs through a formal ceremony or special event, which may also include an inaugural address by the new official.\nWhat is inauguration day for elementary students?\nEvery four years on January 20, an important event occurs in the United States: A president takes the Oath of Office during an inauguration ceremony. On this page, Education World offers lessons and activities to help students learn about and commemorate this year’s inauguration.\nIs Inauguration Day 2021 a federal holiday?\nInauguration Day is a Federal holiday in Washington D.C. in January every four years. This holiday is designated as ” Inauguration Day ” in section 6103(c) of title 5 of the United States Code, which is the law that specifies holidays for Federal employees.\nHow long is the inauguration ceremony?\nOver the years, various inauguration traditions have arisen that have expanded the event from a simple oath-taking ceremony to a day-long one, including parades, speeches, and balls. In fact, contemporary inaugural celebrations typically span 10 days, from five days before the inauguration to five days after.\nWhich president did not use the Bible to take the oath of office?\nTheodore Roosevelt did not use the Bible when taking the oath in 1901, nor did John Quincy Adams, who swore on a book of law, with the intention that he was swearing on the constitution.\nWhat is the purpose of an inauguration speech?\nMost Presidents use their Inaugural address to present their vision of America and to set forth their goals for the nation.\nWhat is the root of the word inauguration?\nInaugurate comes from the Latin word inaugurare, which was formed by combining in- with augēre, meaning “to increase.” Augēre is likely the origin of augur, spelled the same in Latin and English, though the path of the word’s development isn’t certain.\nWhat does inaugural mean?\n1: of or relating to an inauguration. 2: marking a beginning: first in a projected series. inaugural.\nHow do you teach students about Inauguration Day?\nInauguration Classroom Activities and Lessons\n- I Do Solemnly Swear (Grades K–12) Share the presidential oath of office (see below) with students.\n- Compare the Speeches (Grades 5–12)\n- My Fellow Americans (Grades K–12)\n- Plan a Parade (Grades K–12)\n- Share Your Story (Grades K–12)\nHow can I watch the inauguration with my students?\nFor the first time ever, there will be a special live broadcast of the Inauguration made especially for students and families. You can tune in live at 10am ET on #InaugurationDay. To learn more, go to https://t.co/CcOwVmBgd5. I’ll see you there!\nWhat are the 10 paid holidays?\nFederal Paid Holiday Schedule in the U.S.\n- New Year’s Day,\n- Birthday of Martin Luther King, Jr.,\n- Washington’s Birthday,\n- Memorial Day,\n- Independence Day (July 4),\n- Labor Day,\n- “Columbus Day” (also observed as Indigenous Peoples Day),\n- Veterans Day,\nAre banks closed on Inauguration Day 2021?\nNote: The Board of Governors is closed in observance of Inauguration Day on Jan. 20, 2021. How We Make Money.\n|Federal Reserve System holidays||Thanksgiving|\nWhat happens if a holiday falls on my day off?\nWhile not required by law, many employers give an employee the option of taking off another day if a holiday falls on the employee’s day off. Similarly, many employers observe a holiday on the preceding Friday or the following Monday if a holiday falls on a Saturday or Sunday and the employer is closed on weekends.", "label": "No"} {"text": "Millions of people take opioids for chronic back pain, but many of them get limited relief while experiencing side effects and worrying about the stigma associated with taking them.\nMore than 100 million people in the United States suffer from chronic pain, and those with chronic low back pain are more likely than patients with other types of pain to be prescribed opioids. Unfortunately, these medications are addictive and can cause side effects, ranging from drowsiness to breathing problems.\n“Patients are increasingly aware that opioids are problematic, but don’t know there are alternative treatment options,” said Asokumar Buvanendran, M.D., lead author of the study, director of orthopedic anesthesia and vice chair for research at Rush University, Chicago, and vice chair of the American Society of Anesthesiologists (ASA) Committee on Pain Medicine. “While some patients may benefit from opioids for severe pain for a few days after an injury, physicians need to wean their patients off them and use multi-modal therapies instead.”\nIn the study, 2,030 people with low back pain completed a survey about treatment. Nearly half (941) were currently taking opioids. When asked how successful the opioids were at relieving their pain, only 13 percent said “very successful.” The most common answer — given by 44 percent — was “somewhat successful” and 31 percent said “moderately successful.” Twelve percent said “not successful.”\nSeventy-five percent said they experienced side effects including constipation (65 percent), sleepiness (37 percent), cognitive issues (32 percent) and dependence (29 percent).\nRespondents also had concerns about the stigma associated with taking opioids. Forty-one percent said they felt judged by using opioids. While 68 percent of the patients had also been treated with antidepressants, only 19 percent felt a stigma from using those.\nA major pharmaceutical company recently agreed to disclose in its promotional material that narcotic painkillers carry serious risk of addiction and not to promote opioids for unapproved, “off-label” uses such as long-term back pain. Researchers also note a lack of solid studies on the effectiveness of opioids in treating back pain beyond 12 weeks.\nPatients with chronic low back pain, persistent pain lasting more than three months, should see a pain medicine specialist who uses an approach that combines a variety of treatments that may be more beneficial, said Dr. Buvanendran. These treatments include physical therapy, bracing, interventional procedures such as nerve blocks, nerve ablation techniques or implantable devices, other medications such as anti-inflammatories and alternative therapies such as biofeedback and massage, he said.\nAmerican Society of Anesthesiologists (ASA). “Many back pain patients get limited relief from opioids and worry about taking them, survey shows.” ScienceDaily. ScienceDaily, 23 October 2016.", "label": "No"} {"text": "Although no one wants to receive news of a necessary tooth extraction, at times it can be the best thing for your smile. Extracting a severely infected tooth can save the surrounding teeth from infection. However, sometimes root canal therapy is helpful in saving a tooth from being extracted. A root canal is recommended when the tooth’s infection has spread to the pulp of the tooth.\nRequest More Information\nWhat To Expect During A Root Canal Treatment\nBefore the root canal begins, the area that will be treated is fully numbed. You shouldn’t experience any pain during a root canal, only pressure. Once the area is numbed, your dentist will remove any infection in the tooth. After the infection is removed, your tooth will be sealed by a filling or dental crown. Once treatment is complete, your smile will be restored and all pain from the infection should be gone.\nThe cost of a root canal can vary depending on which tooth is in need of treatment. A tooth has anywhere from one to three roots, so this changes the extent of treatment depending on how much work needs to be done. A consultation with your dentist will allow your tooth to be examined and then costs to be presented.\nDon’t put off a needed root canal! The spread of infection can lead to tooth loss or affect the surrounding teeth. Scheduling a root canal as soon as it is recommended is the best thing you can do to preserve your smile. If you are in need of a root canal in Cook or Kane County, call us today to set up a consultation!", "label": "No"} {"text": "| scalar, denoted by , attributed to any pair of vectors U and V in a vector space by a given bilinear form, with the following properties: |\n- symmetry: ,\nNote 1 to entry: In an n-dimensional space with orthonormal base vectors the scalar product of two vectors U and V is the sum of the products of each coordinate of the vector U and the corresponding coordinate of the vector V:\nNote 2 to entry: For two complex vectors U and V either the scalar product or a Hermitian product may be used depending on the application.\nNote 3 to entry: A scalar product can be similarly defined for a pair consisting of a polar vector and an axial vector and is then a pseudo-scalar, or for a pair of two axial vectors and is then a scalar.\nNote 4 to entry: The scalar product of two vector quantities is the scalar product of the associated unit vectors multiplied by the product of the scalar quantities.\nNote 5 to entry: The scalar product is denoted by a half-high dot (·) between the two symbols representing the vectors.", "label": "No"} {"text": "Pruning is an essential part of garden maintenance; it is necessary to regulate and control growth and to encourage flowering and fruiting on trees and shrubs. It is also one of the most difficult parts of garden maintenance. To prune well, gardeners must have a thorough knowledge and understanding of the attributes, growth, and flowering habits of the plants under their care and of the effects likely to be produced by making the cut.\nLandscapers, arborists, and home gardeners will find all this and more in Essential Pruning Techniques. Tony Kirkham shares decades of knowledge and expertise in this fully illustrated, comprehensive guide. Essential Pruning Techniques offers up- to-date pruning advice for 379 woody plants, step-by-step instruction on the latest techniques and practices, and specific advice for addressing climate challenges.\nFull colour photographs by Andrea Jones illustrate techniques and show examples of correctly pruned trees and shrubs.\nPublisher: - Timber Press - more\nCode: - 9781604692884\nYear: - 2017 03 (Mar)\nAuthors: - Kirkham, Tony", "label": "No"} {"text": "Ancient Italian breed medium-large size Molossus Dog. Sturdy, with a strong skeleton. Muscular and athletic, it moves with considerable ease and elegance. It has always been a property watchdog and hunter of difficult game such as the wild boar.\nMolossus, large, its total length reaches approximately one third of the height at the withers. Planes of the skull and muzzle are slightly convergent; they are not parallel. The circumference of the head measured at the cheekbones is more than twice the total length of the head; skin is firm and smooth.Skull - Viewed from the front, skull is wide and slightly curved; width is equal to the length. From the side, a prominent arch begins above the eyes and then flattens backward toward the occiput. Viewed from the top, it has a square appearance due to the zygomatic arches and powerful muscles swathing it. Stop - Well-defined due to developed and bulging frontal sinuses and prominent arch above the eyes.\nNeck, Topline, Body\nNeck-Slightly arched, flowing smoothly into the shoulders with a small amount of dewlap. The length of the neck is approximately one third the height at the withers. Body - Depth of the ribcage is equal to half the total height of the dog, descending slightly below the elbow. Ribs are long and well sprung. Moderate tuck up. Chest - Broad, well-muscled, strong forefront. Back - Wide, strong, muscular. Highest part of shoulder blade slightly rising above the strong, level back. Loin - Well-muscled, and harmoniously joined to the back. Croup - Long, wide, slightly sloping. Rump should be quite round due to muscling.\nStrong and muscular, well-proportioned to the size of the dog. Straight when viewed from the front or side; height of the limb at the elbow is equal to 50 percent of the height at the withers. Shoulders- Muscular, laid back. Upper arms - Strongly muscled, with good bone, powerful. Elbows - Held parallel to the ribcage, turning neither in nor out. Forelegs - Straight and with good bone, well muscled. Pasterns - Almost straight, strong but flexible. Feet - Round with well-arched toes (catlike). Lean, hard, dark pads and nails, except in the case of white toes. Front dewclaws - Can remain or be removed, if left intact should only be a single dewclaw on each leg.\nAs a whole, they are powerful and strong, in harmony with the forequarters. Straight when viewed from the rear or front. Thighs - Long, wide, angulated and well-muscled. Stifle - Should be moderately angulated, strong. Legs - Strong bone and muscle structure. Hocks - Wide set, thick and clean, let down and parallel when viewed from behind. Rear pastern - straight and parallel. Rear dewclaws - Any rear dewclaws are removed. Hind feet - Slightly more oval-shaped and less-arched toes.\nThe coat is short, stiff, shiny, adherent and dense with a light undercoat that becomes thicker in cold weather.", "label": "No"} {"text": "This series is the perfect project for when you’re stuck indoors. I will be showing you how I make a study in pencil of my own studio. You can either use the reference provided (see below). Or better yet, make a study of the inside of your own home or studio. You can work from a photo or life – whichever you prefer 🙂\nIn this session I will be showing you how to smooth out and darken tones without flattening the paper…\n- You will be using a fine mechanical pencil (or a very sharp wooden pencil) to lightly work your way into the grain of the paper.\n- This is one way to make tone darker in graphite without crushing and damaging the paper.\n- Keep rolling the pencil as you work so that the tip statys sharp.\n- I also recommend working from different angles (below, left, right and above).\n- After multiple passes in this fashion the tone will be a lot darker and smoother without having crushed the paper.\n- Don’t worry of the edges are a bit soft as we will be sharpening things up later.\n- Keep doing this with the rest of the image.\n- Work with the darkest tones first before gradually adding lighter tones – this way you will know what the limit of the darkest tone is before trying to fit lighter tones in.\nThe materials you will need for this course are:\n- Paper (or a sketchbook)\n- Range of pencils (H, HB, B, 2B) – ideally a few mechanical pencils as well as regular ones.\n- Kneadable eraser\n- Sharpener or sanding block\n- Drawing board (if you aren’t using a sketchbook)\nYou can download the source image for the series here:", "label": "No"} {"text": "See also info about:\nWild Dog Information\nThe whole body is randomly colored with a mixture of black, white, brown and yellow blotches, which is why the African wild dog is sometimes called the African Painted Dog. The color pattern is unique to each individual, with no two dogs having the same markings.\nThe wild dog's muzzle is black, with a black line of fur running from the muzzle to a point midway between the ears.\nBehavior: Wild dogs are active during the day because they rely mainly on sight to hunt. They also take advantage of bright moonlight for hunting, and tend to rest in shady areas during the hottest time of the day.\nWild dogs are higly social animals, living in very close-knit packs comprising from two to 50 dogs.\nWild dogs do not have territories but instead have enormous home ranges, covering hundreds of square km, over which they roam and hunt prey. See also Wild Dog Society.\nThey are highly specialised hunters, able to run at speeds up to 65 kph and maintain a pace of 56 kph (35 mph) for several kilometers.\nReproduction: Wild dog pups are born during the dry, winter months (March to July) when the grass is short and the hunting conditions are at their best. Between two to 10 pups are born after a gestation period of 69 to 73 days. Pups are born in abandoned burrows of other animals and stay near their den for the first three months of their lives.\nHunting and Diet: Wild dogs are strictly carnivorous and are specialised hunters of medium sized antelope such as impala and wildebeest, but also catch animals as small as rabbits.\nThe wild dog only kills for its immediate needs. The pack moves slowly towards the prey. A long chase then takes place, sometimes up to several kilometers.\nThe prey either starts to get weary, or weakens after shock or loss of blood and then is overpowered by the pack. Dogs take bites out of the animal while it is still on the move but the victim's death is usually quick. See also Wild Dogs - Efficient Hunters that Kill to Eat.\nFor additional information about the African wild dog, see our gallery of Wild Dog Pictures.\nReturn to Wildlife Info.\nCommentsHave your say or ask any questions in the comment box below.", "label": "No"} {"text": "Some of the most vibrant Jewish neighborhoods in North America exist “South of the Border” in Mexico, where over 40,000 Jews have created a close-knit, distinct community.\nMany of the new territory’s Jews fled to neighboring Peru.\nGovernor de Carvajal himself was arrested on charges of practicing Judaism and died in prison in 1595. “Suspicious” activities that could brand someone a Jew included bathing on a Friday and afterwards putting on clean clothes; draining and disposing of blood after slaughtering a bird to eat; fasting on Yom Kippur; eating tortillas (which are unleavened) during Passover; and circumcising sons.\nAnyone guilty of these “crimes” faced drastic punishments including torture, imprisonment, forced wearing of a sanbenito, a knee-length yellow gown, or a dunce-cap, and execution.\n(The area of Puebla might have been home to a thriving secret Jewish community of its own; see the section on Jewish-Mexican food, below.) Despite this victory, French forces went on to conquer Mexico, and set up the short-lived Second Mexican Empire.\nIn 1864, Emperor Maximilian I declared himself ruler and though he never consolidated his reign over all of Mexico, the short-lived monarch did make one remarkable change in Mexico: he issued an edict of religious tolerance and invited German Jews to settle in Mexico.\nWhen Hernan Cortés first conquered Mexico for Spain in 1521, he did so with a number of secret Jews amongst his men.", "label": "No"} {"text": "Parallel Operation Of Single-Phase Transformer\nIt is required to connect a second transformer in parallel with the first transformer if the load exceeds the rating of the transformer shown in Figure 1.46. The primary windings are connected to the supply bus bars while the secondary windings are connected to the load bus bars. During paralleling of the transformer, similar polarities of the transformers should be connected to the same bus bars shown in Figure 1.46. Otherwise, the two emfs induced in the secondary windings with incorrect polarities will produce the equivalent of a dead short circuit shown in Figure 1.47.\nThe following conditions are important for parallel opera-tion of transformers:\n- The voltage ratings of both the primary and the secondary of the transformers should be identical. Small differences are permissible if the resultant circulating currents can be tolerated.\n- The connections of the transformers should be proper with respect to their polarities.\n- The percentage impedances should be equal in magnitude and the X/R ratio must be the same to avoid circulating current and operation at different power factors.\n- The equivalent impedances must be inversely proportional to the respective kVA ratings.\nThe above conditions must be satisfied by paralleling transformers of identical ratings of the same make/model. With different kVA ratings of even the same make/model, the effects in steps 1, 2 and 3 may appear in undesirable amounts. Step 2 must be carried out satisfactorily even if steps 1, 3 and 4 are slightly modified.\nFigure 1.46 Parallel Operation of Transformers\nFigure 1.47 Parallel Operation of Transformers with Incorrect Polarities", "label": "No"} {"text": "What is Your Color IQ? The Answers\nDid you take the color IQ quiz? If not, try it now at this page before taking at the look at the answers below. The answers to the color quiz which are highlighted in yellow. Further detail about each question and answer is under each question.\n1. To mix a bright spring green, which yellow and blue would you use?\na. A green-yellow with a red-blue\nb. An orange-yellow with a green blue\nc. A green-yellow with a green-blue\nd. All of the above\nIf you chose “a” or “b” your green would be a dull green not a bright green because the mixture contains the color opposite of green, which is red. Having even a little bit of red in the yellow or the blue will dull the final green mixture. (Download my free e-book you see in the upper right hand corner to learn more about mixing greens.) In this blog, I demonstrate how to mix a bright green, “Kermit says, Let’s Mix a Bright Green!”\n2. When mixing the two secondaries orange and purple, the resulting color is:\nb. A burnt sienna\nc. A muddy gray\nd. I have no clue\nIt is important to know the results of mixing two secondaries because they often result in colors you may not want. Experiment mixing orange with purple, purple with green and green with orange. You just might be pleasantly surprised. I use these mixtures knowingly all of the time. By the way, the mixture of two secondaries, is called a tertiary.\n3. When cadmium yellow (orange-yellow) is mixed with ultramarine blue (red-blue), why is the resulting green a warm or olive green?\na. Both tubes of paint have some red in them\nb. Both tubes of paint have some green in them\nc. A & B\nd. I wish I knew\nKnowing the color bias of your primary colors is key to mixing the color you desire. The green mixture will be a muddier or duller green because the color opposite of green, which is red, is in both the cad yellow and the ultramarine blue.\n4. Which of the below describes the attributes of each of the tubes of paint you own?\na. Transparency vs. opacity\nb. A manufacturer’s unique properties, such as fluidity, thickness, etc.\nc. Tintorial strength\ne. All of the above\nAs you know, the attributes/characteristics of each tube of paint is important in mixing, creating textures and layering. In my color class we explore their differences as well as discuss which ones you like given your style, how you like to apply paint and the effects you like to create. To test the transparency and opacity of your tubes of pain, click, “Transparency and Opacity.”\n5. To effectively tone down or de-saturate a bright pink, which color would you use?\nb. A warm green\nc. A cool green\nd. All of the above\nPink is created using a blue-red with some white. Hence, the best green to use to tone it down is to use a blue-green or a green with a blue color bias.\n6. The phenomenon that explains how colors that are adjacent to one another impact/influence each other, is called:\na. Simultaneous contrast\nb. Visual mixing\nc. Perceptual opposites\nd. All of the above\ne. None of the above\nSimultaneous contrast is the reason why you may experience the frustration of mixing the ‘perfect’ color on your palette but when you go to apply it on your painting it doesn’t work because of the colors surrounding it. This is an important and interesting concept to learn about. For more information on simultaneous contrast, please visit, “What Key Color Principle is Often Neglected?”\n7. Almost all of the blues available on the market:\na. Contain a little of red in them\nb. Contain a little of yellow (which makes the blue a green-blue) in them\nc. Manufacturers offer about the same quantity of each – 50% red-blues and 50% green-blues\nNearly all of the blues available today are green-blues. Very few carry a red bias and I wish I knew why this is the case.\n8. When mixing a pair of color opposites, the two colors are always a combination of all three primary colors.\nLet’s use orange and blue as our color opposites. Orange is created by mixing yellow and red. Hence, when you mix orange with blue, you are in fact mixing all three primary colors. The same is true when mixing yellow with purple and red with green.\n9. A tertiary color is:\na. Intermediate color between a primary and secondary color on the color wheel\nb. A mixture of two secondaries\nc. A mixture of three colors\nd. All of the above\nMost popular literature on color has been misleading painters for years. You know that the mixture of two primaries = a secondary color. Hence, the mixture of two secondaries = a tertiary color. The answer is NOT “a.” See question #2. For a thorough explanation, visit my blog post, “What is the Correct Definition of Tertiary Colors?”\n10. If you want to draw attention to a bright blue shape in your painting, what is the most effective strategy or which color would you place next to it?\na. A light color\nb. An intense yellow\nc. A de-saturated orange\nd. A middle gray-blue\nThis question is based on one of the color laws developed by Michel Chevruel in the early 1800’s. You probably know that color opposites vibrate when next to one another. We do not always want this vibration but we may want the blue to attract attention in our painting. Using its de-saturated color opposite does the trick. This is an effective painting approach to experiment with and we do so in my color class.\n11. To create a sense of depth in a painting using color, which of these do you need to execute:\na. Warm or orange reds in the foreground, cool or blue reds in the background\nb. Light and de-saturated colors in the background\nc. Cool colors in the middle to distant background\nd. Warm colors in the foreground\ne. All of the above\nCreating a sense of depth on a 2-D surface can be a challenge. There are several ways to achieve this using color as well as other design elements. More information on how to create depth in a painting is taught in my Craftsy course, “Acrylic Color Mixing Made Easy!” The principles apply for all media.\n12. Why can’t you mix a vibrant purple using cadmium red with a blue?\na. Cadmium red is a blue-red\nb. Cadmium red is a red that carries some yellow in it\nc. It is not possible to mix a vibrant purple with any red and blue\nd. Only purples that come in a tube are vibrant\nIf you are wanting to mix a vibrant purple it is critical that you not use a red that carries a yellow bias, such as cad red because yellow is the color opposite of purple. The resulting color is not vibrant. For more information on mixing purple, visit my blog, “Red and Blue Don’t Make Purple.”\nHow did you do? Let me know and feel free to send me any questions you may have in the comments below.\nWould you like to end your frustration with color? I adore teaching color live and via my Craftsy online video course “Acrylic Color Mixing Made Easy!” Though I use acrylics in this course, oil and watercolor painters have benefited as well. Color theory crosses all media! Here are a few unsolicited testimonials from this online course.\n- 30 years as an art teacher and I’ve never seen a better explanation of color theory as you’ve presented here!\n- Best color class I ever took was with Carol A. McIntyre!\n- Hi Carol, I’ve just discovered you. Your explanations of colour theory are easy to understand and so informative.\n- Thank you very much for a fantastic learning experience! You’re a wonderful teacher.\n- Thank you Carol for teaching me this. I have often been frustrated when mixing a color and it looks dull. Now all I have to do is remember which bias my paints are and then I should be able to deliberately mix a bright or dull colour. Thank you, thank you!\n- Your class is wonderful and I’m loving it. I’ve never painted before in my life and it’s more fun than I ever expected!\nYou now know your color IQ, do you know a painter who would like to take this color quiz? Please share this post using the buttons below.", "label": "No"} {"text": "Native to Central America, bromelia has adapted well to our climate and our apartments. The colors of its beautiful flowers are bright and vibrant. It was Columbus who brought the first bromeliad to Europe, namely the pineapple, immediately afterwards other species of Bromelia, Guzmania, Vriesea and Aechmea arrived. Among the many varieties we can find Bromeliads that adapt to outdoor life, thanks to their resistance to low temperatures.\nThe single Bromeliad plant blooms only once, so once it has faded, it will not give us a new flower, but if we continue to treat it, it can give us new plants, and then new flowers. In fact, after flowering we will notice the appearance of new plants that emerge from the base. Just let them grow for a few weeks, or until they have reached half the height of the mother and then detach them, possibly with the roots, and put them in a jar with some earth. The ideal soil for Bromeliad is composed of sand and a mixture of pine leaves and needles. After about a year they will be ready to give us a new flower. But they will need a little help, put an apple in the middle of the plant and cover it with a plastic bag that will close, leave it for three weeks. In a few months you can admire the results of your work, a beautiful flower!\nHOW TO TAKE CARE OF A\nIf you do not have a green thumb, Bromelia is the plant for you, in fact it is particularly resistant. It needs a lot of light, but you have to protect it from direct sun, the watering must be regular and preferably in the goblet of the plant. During the summer, so in the hot period, Bromelia should be bathed every day, while in winter, it will be enough to give it some water every 25/30 days. These few attentions will be enough for your Bromelia to be happy, it does not need to be fertilized.\nBromelia in nature uses its leaves to get nourishment and water, even in the apartment is not different, so if you want to cuddle on a hot day you just take a spray and spray the leaves, or put a container near the plant with water and let it evaporate, it will thank you by becoming even more beautiful.\nThe only negative is that Bromelia flowers only once, so if we still want to beautify our house with its beautiful flowers we will be forced to buy more, or arm ourselves with patience and continue to treat them.\nThe most frequent diseases of Bromelia are: the cochineal, the red spiders and can rot because of too much water.\nThe existing species of Bromelliaceae are many, and among the many stands out an aerial, grows quietly on the trunks of plants taking the nourishment and the water that needs absorbing them from the leaves and roots, and not from the plant to which it rests. This is a very particular plant, and since it does not need a pot with the earth, it can be placed quietly on a particular piece of wood or in glass containers with a bit of bark. A gift a little special for plant lovers who will make you look great.\nIt could also interest you...", "label": "No"} {"text": "In the Bronx, the winter weather can get extremely cold and dangerous. Once the wind starts kicking in and bringing the temperatures down even further, construction workers can find themselves in a very dangerous situation. The cold weather presents challenges to both contractors and workers, but there are ways of getting construction work done without putting anyone at risk.\nAnother part of the frigid weather conversation deals with contractor obligations. How much protection from the cold does a contractor have to offer and does a worker have legal recourse if they are injured due to the cold weather? These can be difficult questions in an area that sees cold weather six months out of the year. However, it is important for workers to know how to protect themselves and the contractor obligation that comes with the temperatures changing.\nThe Effects Of The Cold On Construction Workers\nThe Occupational Health and Safety Administration (OSHA) has a wide variety of excellent resources construction workers and contractors can use to learn about protection from the cold. As with any health issue, it is important to understand the potential negative effects of frigid temperatures in order to gain a better appreciation as to why it is so important to be vigilant.\nThe Forgotten Effects\nThe cold weather is not just a health hazard to workers, but it can be a financial detriment to contractors as well. Cold weather causes workers to become disoriented and slows down productivity. The cold can also have a negative effect on equipment, which could also become a health risk as equipment unexpectedly malfunctions.\nFor instance, if there are workers who are already impaired by alcohol or drugs, then the cold weather can make that situation even worse. People who are incapacitated by substances already have slower than normal responses to stimulus, and the cold slows down response time even more. Dehydration is an issue with substance abuse, and dehydration also occurs when the cold and dry weather moves in. Contractors should be vigilant about keeping drugs and alcohol out of the workplace all year round, but especially when the weather gets colder.\nWhen you hear the term “cold stress,” it is referring to the more common effects of cold weather. When a worker has been sweating all day and they suddenly get hit by an arctic blast of air, that can cause the worker to become disoriented. Cold stress is also a term used to refer to many of the other conditions you will read in this discussion.\nCold stress is created by the persistent exposure to cold weather without the proper protection, or without the kind of additional resources workers need to battle the weather. For example, having workers dress in layers and having warming areas with hot drinks for workers can be two excellent ways of combating cold stress.\nWhile trench foot can occur in temperatures up to 60 degrees, it is most noticeable during the colder weather. When a worker’s feet are constantly exposed to cold and wet conditions, blisters and sores can start to develop. During the winter, contractors should encourage workers to bring a second pair of socks with them to change into at lunchtime. Keeping their feet warm and dry will help to prevent this painful issue.\nOne of the most common, and most devastating, conditions that occur in the winter is frostbite. This is a condition that occurs when the fluids in the body actually start to freeze, and that starts to kill off cells at skin level and deeper. In some cases, skin affected by frostbite will turn black as the cells in that area of the body start to die. With frostbite, the fluids in the cells also freeze and this prevents the cells from getting the nourishment they need to survive.\nFrostbite is dangerous because if it is not taken care of it can become fatal. It is also possible for a worker to have extremities amputated that have developed extensive frostbite. Contractors need to remind workers that no one gets a medal for working too long in the cold winds and freezing temperatures. Workers need to cover up all exposed skin when they work in the winter, and they need to come in out of the cold on a regular basis.\nAt some point, a worker who is shivering is experiencing more than just cold temperatures. That shivering worker could be experiencing hypothermia, and they need to be moved to a warm place immediately. Hypothermia occurs when the body is losing heat faster than it can create it. During the winter, hypothermia can occur to anyone who is exposed to extremely low temperatures for long periods of time.\nThe most immediate signs of hypothermia are uncontrolled shivering, slurred speech, and a look of disorientation. If these symptoms are ignored, the cold weather could start to affect the worker’s brain. This is why it is important to get any worker with these symptoms to someplace warm as soon as possible.\nThe Contractor’s Obligation During Winter\nOSHA does not have a list of standard rules it uses to determine if contractors are doing enough to keep workers safe during the winter. However, OSHA does make it mandatory for contractors to do everything within reason to make sure workers are safe and have the resources they need to stay healthy when they are on the job site.\nThe OSHA rules can sound a bit ambiguous, but there are things contractors can do to make sure that workers are safe during the cold winter months. The most important task contractors can accomplish is to train workers on how to avoid the cold stress conditions we mentioned and stay healthy throughout the winter. Contractors need to encourage workers to wear layers of clothing, and it would even be a good idea for contractors to give out long-sleeve t-shirts and other inexpensive pieces of clothing that workers can wear to stay warm.\nThe Importance Of Having Winter Weather Policies\nFurthermore, contractors need to have policies in place that make it mandatory for workers to look out for each other during the cold weather. If a worker is experiencing what looks like symptoms of cold stress, then fellow workers need to report the problem to a supervisor immediately. Workers also need to be vigilant and keep an eye out for co-workers who may collapse due to the cold and do what they can to offer aide.\nAll contractors should have cold weather policies in place that involve not working due to strong winds, extreme cold, or snow. If workers are asked to come into work during blizzard conditions, then that puts workers at risk for injury and contractors at risk for lawsuits. Contractors should work with unions and labor groups to allow for Saturday to be a work day during the weeks where the weather forced work to be stopped. The more a contractor can do to keep working conditions safe during the winter, the less chance that contractor will have for OSHA fines and other legal issues.\nThe Bronx is known for its cold winter weather, and contractors working throughout New York City need to be ready when the winter hits. By having strong policies in place about working conditions and winter weather training, contractors can do their part to keep workers safe and healthy. By wearing layers and being aware of the dangers of working in the cold, workers can make sure that they are healthy when it comes time to work in the warm spring weather.", "label": "No"} {"text": "The Indian place-names on Long island and islands adjacent, with their probable significations (1911) by William Wallace Tooker\nPg 206: 331: QUARAPIN: a round swamp in Huntington. The name refers to “where Quarapin, an Indian, formerly planted”.\nPg 216-217 351: RUGUA : a swamp in the town of Babylon, near Copiag Neck. It is found in the Indian deed of the “Baiting Place” purchase, 1698, viz.: “So running eastward to ye head of Rugua Swamp” (H. R.). This is another instance where a swamp takes its name from the aboriginal dweller on its banks. That swamps were frequently chosen by the Indians for their dwelling places is proven frequently in the early records of the town; for instance, a deed of 1698 says: “a parcel of land within the bounds of Huntington by a swampe comonly called ye round swamp where Quarapin formerly planted” (H. R., vol. ii., p. 37). Nearly every swamp in the vicinity of Sag Harbor examined by the writer has a shell-heap on its northern slopes showing Indian sojourners in time past.\nNote from Coni: I believe West Hills is the spot where Quarapin/Checkachoggin had his village and planted – perfect location! Located in Huntington, New York on Round Swamp Rd. Also in this area is Asharoken, New York whom is named after Asharoken – Raseokan whom I’m also a descendant of – He is GGGrandfather to Great James", "label": "No"} {"text": "Now showing items 1-3 of 3\nWhat are Best Practices when Addressing Students Who Have Substance Use Issues?\nResearch shows that progressive discipline creates a positive school culture and supports students who are in violation of school drug and alcohol policies to reach their full potential by pairing inappropriate behaviour ...\n“Don’t Give Me That Red Lego Table!” How the Physical Classroom Environment Impacts Student Learning and Teacher Efficacy\nThis paper was initiated in order to discover how deeply a classroom’s physical design could impact a student’s learning and a teacher’s efficacy. Research is analyzed for evidence of the cumulative effects of lighting, ...\nThe Need For Transformational Leaders In Education During Times of Change in British Columbia\nThe aims of education have evolved to include a focus on educating the whole student, in order to develop responsible citizens who are able to contribute to their community and the world at large in the 21st century. In ...", "label": "No"} {"text": "In Humphrey Carpenter’s biography of J. R. R. Tolkien, we learn that Tolkien was fond of the novels of John Buchan. Like Tolkien, Buchan had formative experiences in South Africa. Tolkien was born there, and Buchan briefly served there as private secretary to Lord Milner, High Commissioner for overseeing reconstruction after the Boer War. Buchan’s most famous character, Richard Hannay, was a mining engineer in South Africa before settling back in England and getting entangled in such adventures as recounted in The Thirty-nine Steps. One of Buchan’s novels, Prester John, deals almost exclusively with South Africa, and it bears re-reading alongside The Hobbit.\nFirst published in 1910, Prester John is a fast-paced boy’s adventure story. As such, it shares elements with H. Rider Haggard’s King Solomon’s Mines (1886) and Robert Louis Stevenson’s Treasure Island (1883): After a frightening encounter with a mysterious stranger, a boy must leave his widowed mother and their home in the British Isles, and he ends up in South Africa on a trek into dangerous mountains in search of fabulous ancient jewels. The intrepid youth finds himself caught up in a savage battle over a rightful inheritance, and against all odds, he lives to return to the familiar routine of tea and scones, his thoughts often going back to his harrowing escapes.\nIn Buchan’s novel, the similarities are clear with stories about Allan Quatermain and Jim Hawkins, but equally clear are parallels found in Tolkien’s “there and back again” tale of Bilbo Baggins. A major difference is Buchan’s hero, David Crawfurd, being in his late teens when he has to leave Scotland for South Africa, whereas Tolkien’s most famous hobbit is fifty when he leaves the Shire for Wilderland.\nAlso, just as critics of Tolkien’s The Hobbit see it in the context of ancient myth, they see Buchan’s Prester John in the context of British imperialism. Mythic heroes leave home on a quest to recover invaluable treasure and return home victorious and transformed. For a Christian, the ultimate fulfillment of this primeval epic is Christ, journeying from His heavenly home with God the Father to Earth and into Hell, conquering death and ascending into Heaven and His seat at the right hand of God. In His divinity, Christ cannot change; in His fully human incarnation, He grew and matured. His victorious quest for lost sheep, for sinful humans, has transformed multitudes. Archetypes aside, modern critics read Buchan’s swashbuckling narrative as another overly masculine example of the sun never setting on a chance for British exploitation of native peoples.\nAlthough Buchan set Prester John in the early twentieth century, he drew upon a medieval legend. According to that story, believed by medieval Christians in the very marrow of their bones, somewhere beyond the eastern limits of Christian civilization lived a valiant Christian king, some said also a priest, hence his name of Prester John. Since that legend’s origins in the twelfth century, Christians in Europe believed that they were obligated to go find and defend Prester John, harried as he was by Muslims. Buchan’s version makes Prester John a charismatic African warlord named Laputa posing as a Protestant minister, waiting his chance to rally his people and lead them back to their historical greatness. Into that geopolitical drama David Crawfurd stumbles.\nHow wide of the author’s mark a book can be read finds a supreme example in an ardent admirer of Buchan and his books, Wilfred Thesiger. Thesiger (1910-2003) was born to wealthy, well-connected British parents stationed in Abyssinia (modern Ethiopia), and as a boy he loved its dusty and rugged terrain and thrilled to its claim to having the Ark of the Covenant. When Thesiger was sent to Eton and Oxford, he regarded England, with its greenery and pavements, as an alien world. Prester John in particular he re-read as a reminder of the wild Africa he longed with aching homesickness to explore.\nIn his autobiography, The Life of My Choice (1987), Thesiger recalled his boyhood love of Prester John. Yet, for him it was not a portal for identifying with and joining vicariously in the cliff-hanging adventures of young David Crawfurd. “This story of Laputa,” Thesiger wrote, “the Zulu leader who died tragically and dramatically while attempting to free his people, made an indelible impression on me.”\nAt Oxford, where he studied history and distinguished himself in boxing, Thesiger mulled over a plan to return to Abyssinia. He joined the Oxford Exploration Club, whose president was John Buchan. Thesiger wrote to Buchan, who lived outside Oxford at an estate called Elsfield Manor, and Buchan had Thesiger to his house several times for tea and talk about Thesiger’s developing proposal for exploring hitherto uncharted regions of eastern Africa.\nMore than fifty years later, Thesiger vividly recollected Buchan, “his sensitive, ascetic face etched with lines of pain but lit by his innate kindness, his lean body in comfortable country tweeds.” Buchan ensconced in his Oxfordshire manor house with his books and his pipes evoked Tolkien’s own cozy home life in suburban Oxford, as well as that of Bilbo Baggins in his hobbit hole. Yet tea and tobacco, not to mention potatoes and port, were British staples because Britain held, in Rudyard Kipling’s phrase in his poem “Recessional” (1897), “Dominion over palm and pine.”\nIt was a pervasive British tension. While some people were content never to stray too far from the safety of hearth and home, others believed that Britain had a duty to peoples beyond the blighted cliffs. The former attitude was dubbed being a Little Englander, and the latter was seen as championing Greater Britain. In Empire (2003), Niall Ferguson noted, “The idea of Greater Britain is nowhere more appealingly expressed than in [John Buchan’s] novels.”\nA recurring British yearning for exotic shores finds voice in Kipling’s poem, “Mandalay” (1892). There a young British soldier has come back to London from the Far East, and he laments the drab constraints of his new civilian life: “Ship me somewheres east of Suez, where the best is like the worst/Where there aren’t no Ten Commandments and a man can raise a thirst.” Both David Crawfurd and Bilbo Baggins were eager to get home, but in time word from the faraway lands where they had risked their lives broke their peace and quiet. Like Kipling’s young soldier, they heard again the call of distant bells and remembered distant dawns.\nDaniel J. Heisey, O. S. B., is a Benedictine monk of Saint Vincent Archabbey, Latrobe, Pennsylvania, where he is known as Brother Bruno. He teaches Church History at Saint Vincent Seminary.", "label": "No"} {"text": "But I have always been impressed with how they stick to their standards while not trying to foist their ideology onto others. If you wish to govern the land, you must make certain that your rewards pass into the right hands; if you do not do so, then unruly men will seek gain. However, Shen still believed that the ruler's most able ministers are his greatest danger, and is convinced that it is impossible to make them loyal without techniques. And this is not your own doing; it is the gift of God, not a result of works, so that no one may boast. The hundred artisans make squares with the set square, circles with the compass, straight lines with the string, vertical lines with the plumb line, and flat surfaces with the level.\nIn this paper I will explore and provide my own insights on the shortcomings of both ideologies; how Legalism was more persuasive in getting people to accept their ideas and more effective as an ideology and how Confucianism lost out in both aspects. In Chinese Thought: An Introduction S. Moreover, to overawe the people, the text advocates inflicting heavy punishments for even petty offenses, as only then will the people be sufficiently scared as to behave properly. You were running the race so well. What can the ruler gain from their settled knowledge? I don't really want a debate over it, but I do want to understand exactly what people are calling legalistic. But I have always been impressed with how they stick to their standards while not trying to foist their ideology onto others. Confucius termed the name Jinzu to mean the ideal person.\nYou will grow in holiness and start wanting more of His Word. Likewise, all documents in the empire had to have recorded the year they were written, the scribe who copied them, and up to the exact hour of delivery. He ate coarse millet and a soup of greens wore deerskin in the winter days and rough fiber robes in summer. For truly, I say to you, until heaven and earth pass away, not an iota, not a dot, will pass from the Law until all is accomplished. According to the Shi Ji, Li Si was responsible for the death of Han Fei. Legalism, to me, is following a man-made law to the detriment of people.\nHumaneness may make one shed tears and be reluctant to apply penalties, but law makes it clear that such penalties must be applied. Smith 2003: 141; Goldin 2011: 89. What mattered to Li Si—as to Han Fei—was not doctrinal unity as such, but the imposition of the state control over intellectual life, as in all other spheres of social activity. Moreover, political duty takes over other duties. Therefore discard both pleasure and hatred and with an empty mind become an abode of the Dao.\nThis relationship is the basis for all other relationships. Within the borders, everyone among the people first devotes himself to tilling and warfare and only then obtains whatever pleases him. The Legalist Concept of Hsing-Ming: An Example of the Contribution of Archaeological Evidence to the Re-Interpretation of Transmitted Texts. The system of law runs the state, rather than the ruler himself. I don't really want a debate over it, but I do want to understand exactly what people are calling legalistic.\nStill contrasted with renzhi or rule of persons , most Chinese wanted to see it implemented in China. Zheng was delighted to receive Han Feizi and probably planned to offer him a high government post. As such, his power is conceived not as the means of personal enjoyment but as the common interest of his subjects. Fa is not partial to the noble, does not exclude ministers, and does not discriminate against the common people. Social cohesion in the legalist state mandated that violators never escape punishment.\nAccording to the eminent sinologist Robin Yates, newly discovered Qin Dynasty legal codes show that officials were required to correctly calculate the exact amount of labor expected of all artisans; if the artisan was ordered to perform either too much work or too little work, the official would be held accountable. I'm guessing the bride had a gazillion bridesmaids and maybe the groom was grasping at straws to wrangle up enough friends! Get away from me, all you evil people. Though he was associated with the school, the political and social upheavals around him caused Xun Zi to develop a pessimistic view of human nature. If the minister does not murder his ruler, it is because the cliques and cabals are not formed. Before unbelievers even stumble at the gospel they stumble at Christianity. Joe helps Fred move, but outspokenly refuses to handle the vintner's crates because they were made to contain alcoholic beverages. The outburst of interest in political issues was not accidental: it took place against the backdrop of a severe systemic crisis.\nHe didn't say that if a woman cuts her hair and wears make-up, she's out. Legalists justified such a radical transformation in the name of historical relativism. A Daoist Theory of Chinese Thought. The Limits of the Rule of Law in China. It is because you believe the message you heard about Christ.", "label": "No"} {"text": "The Trinity Snowman Flannel Board Story (For ages PreK-1st)\nWhen you see a snowman\nThree snowballs round,\nHe is reminding you\nThat in God Three in One are found.\nThe bottom reminds us of God the Father,\nOur strong rock and foundation\nThe Creator of all living things,\nPeople, tribes and nations.\nThe middle shows us God the Son\nWith His arms spread open wide.\nWho died on the cross for each of us\nOur sins Jesus' blood did hide.\nThe head reminds us of God the Holy Spirit\nWho is our counselor and friend,\nHe speaks to our hearts and minds\nTransforming us in the likeness of Him.\nSo when you see a snowman\nIn the midst of all the wintertime fun,\nListen carefully and he'll tell you,\n\"Remember God is Three in One\".\nCopyright 2002 Maureen Spell\n* Added activities during class: Allow the children to\nbuild their own snowman using construction paper and various other\ndecorations such as sequins and fabric. Copy and attach the poem to their\npictures. Or try a game of \"Pin The Nose On The Snowman\" or\nmake marshmallow snowmen for snacks.\nCLICK HERE to email\nyour friends about the Trinity Snowman poem and these fun activities.\nInvite them to visit SundaySchoolnetwork.Com!\nReturn to the Sermons", "label": "No"} {"text": "A study was conducted to clarify the environmental factors causing drink-driving in Japan. A hundred and seventy three drivers were asked to fill out a questionnaire about their experiences of drink-driving over the past two years. The questions included the driver's demographic characteristics, frequencies of drinking alcohol and drink-driving, and the attitude of surrounding people to the possibility of drink-driving. A chi-square test was used to clarify factors inducing drink-driving. The results show that drinking habits are associated with drink-driving, and that low recognition of the danger of drink-driving is a factor resulting in drink-driving. Education for drivers is essential to manage drinking habits and to raise recognition of the danger of drink-driving.\n|ジャーナル||Review of Automotive Engineering|\n|出版ステータス||Published - 2008 12月 1|\nASJC Scopus subject areas", "label": "No"} {"text": "Memory Palaces will help children to memorise our 100 health messages quickly and easily – even if they cannot read!\nClare Hanbury (director of Children for Health) met the Cambridge-based language expert, Aaron Ralby a few years ago. His approach to learning and memory is fascinating and has history that is thousands of years old. Aaron is also working with children who find learning numbers and letters more challenging than most.\nAaron is sure that using his methods, children around the ages of 9/10 years, who are either literate or non-literate, can learn our 100 messages in five hours. The methods involve using visual cures and stories. We wish to work with Aaron to test the methods and film the process. Clare has tested some of the methods in her workshops with teachers in Nigeria and they loved it!\nTo incorporate innovative new memory techniques into the Children for Health methodology for health education.\nWe are keen to test the use of ‘Memory Palaces’ to help children (including illiterate children) to learn and remember our 100 health messages. Working with Cambridge-based memory expert Aaron Ralby we will devise appropriate memory techniques that can be managed by teachers with large groups of children in resource-poor settings.", "label": "No"} {"text": "Insider Knowledge–Influenced Pedagogy\nMetadataShow full item record\nThis article summarizes an approach that enhances adult student engagement and success by consciously incorporating student experiences that relate to topics covered in class. A specific form of didactic exercise is used to incorporate student experience. This approach also provides an opportunity for exploration and discussion of less formal kinds of knowledge that may nevertheless be of value and significance to students and contribute to their engagement in learning. Some implications for the epistemology of learning are discussed.", "label": "No"} {"text": "Extremely frequent bee visits increase pollen deposition but reduce drupelet set in raspberry.\nProduction of many flowering crops often benefits from elevated pollinator diversity and abundance. Nevertheless, the opposite relationship may arise if bees impair fruit or seed production and/or quality by damaging flowers during visitation, despite transferring pollen. We assessed pollination and drupelet set (i.e. the number of drupelets per fruit) in 16 raspberry Rubus idaeus fields along a gradient of bee abundance in north-west Patagonia, Argentina. Using pollen supplementation, we also tested whether drupelet set was pollen limited in a subset of six fields. Managed Apis mellifera and the invasive bumblebee Bombus terrestris accounted for 50% and 45% of all bee visits, respectively, to raspberry flowers. Pollen loads on stigmas increased with visit frequency of all bees combined and particularly with visitation by A. mellifera, but not by B. terrestris. Drupelet set was not pollen limited along the gradient of bee abundance. Instead, drupelet set decreased with the proportion of damaged styles, which varied more strongly with the frequency of visits by B. terrestris than by A. mellifera. In fields with the highest bee frequency of visits (∼300 visits flower-1 day-1), ∼80% of styles were damaged in flowers and these developed into fruits with ∼30% fewer drupelets compared to flowers in fields with the lowest bee visitation rates (∼4 visits flower-1 day-1). Synthesis and applications. Extreme bee visitation, particularly by Bombus terrestris, damaged the styles of raspberry flowers, precluding ovule fertilization by deposited pollen and limiting crop production by reducing drupelet set. Only a few bee visits are required to maximize fruit production in raspberry plants, therefore, pollinator management in north-west Patagonia should focus principally on reducing the abundance of the invasive bumblebee B. terrestris and secondarily controlling the number of honeybee hives in nearby cultivated fields. Although mainstream pollinator management relies on the assumption that more visits enhance fruit set, high bee visitation rates can be detrimental for fruit development and, consequently, for crop yield.", "label": "No"} {"text": "Elementary School Aged Children Living With Anxiety: Raising Awareness, Developing Prevention Strategies, and Providing Intervention\nMetadataShow full item record\nThe purpose of this project is to examine childhood anxiety disorders. Children with anxiety disorders have an excessive amount of worry and fear that interferes with their ability to function. Anxiety has three reactionary components, the physiological symptoms, the behavioural symptoms, and negative distorted cognitions. Childhood anxiety disorders are serious mental health illnesses that require understanding, support and intervention. Childhood anxiety rates are continuing to rise, approximately one in seven elementary aged children are affected. It is significant for parents, educators and counsellors to be aware of the symptoms, the impact anxiety has and the ways that they can support. It is important that children living with anxiety have the opportunity to learn about anxiety and the uncontrollable feelings and reactions that occur. A thorough review of literature on the subject of childhood anxiety and various intervention strategies are presented. This paper offers multiple recommendations to better support children with anxiety at the elementary school level. It is suggested that parents find opportunities to educate themselves in the ways to best support their child. It is suggested that educators create opportunities for increased awareness and acceptance and provide opportunities for the child to be more comfortable and successful in the classroom environment. It is also suggested that counsellors and community agencies offer prevention and intervention programs, such as Taming Worry Dragons and FRIENDS For Life.", "label": "No"} {"text": "How does a ton of gold look like?\nA record coin\nIn 2011, the mint workers of the city of Perth, Australia produced a unique one-million-dollar gold coin. The Australian mint originally came up with an idea of creating such a sophisticating banknote to promote the Kangaroo Gold Bullion coin series. The giant gold bar was named \"1-Tonne Gold Kangaroo Coin \".\nIn the photo:coins of the Australian gold series “Kangaroo Gold Bullion”. In the center on the stand a thousand-kilogram coin is placed. There are coins weighing 1 troy ounce and 1 kilogram in the lower right corner.\nA huge coin weighs 1012 kilograms and contains 99.99% of gold. It was cast in a special heat-resistant form, and then manually refined by craftsmen. Such a coin is the greatest achievement of the Perth Mint since it’s foundation in 1899.\nIn the photo: An additional texture layer gets handcrafted on the surface of the coin.\nThis coin is not only the heaviest one in the world, but also the biggest to date — 80 centimeters in diameter and 12 centimeters in its width. In addition, it has the status of the most valuable coin in the world. Its nominal value is one million Australian dollars, but the real value of 1012 kg of gold is estimated at $39 million dollars.\nIn the photo: Ed Harbuz, CEO of Perth Mint, presents the biggest coin in the world.\nOn the reverse, the artists depicted a red kangaroo, the biggest of Australia's marsupial animals, stylized in the rays of the rising sun. In the circle, designers inscribed \"Australian Kangaroo One Tonne 9999 Gold 2012\". On the obverse, the image of Her Majesty Queen Elizabeth II can be seen. The inscription is as follow: \"Elizabeth II, Australia\", \"$1 million.\"\nIn the photo: The coin with the image of the most popular animal in Australia is estimated at one million dollars.\nThe giant coin is the legal means of payment in accordance with the Australian Monetary Act of 1965.\nIn the photo: The bas-relief of the Queen of Great Britain is placed on the front side of the coin. It is the work of artist Ian Rank-Broadley.\nIn 2012, the \"Kangaroo One Tonne Gold\" coin was awarded the official title of \"The Biggest Coin in the World\" and was listed in the Guinness Book of Records.\nThe monumental coin is on permanent display at the gold exhibition in the Perth Mint.\nStealing the coin will be rather difficult, given its huge weight and security measures. The \"Kangaroo One Tonne Gold\" coin is not for sale either.", "label": "No"} {"text": "Cold Comfort : PhrasesMeaning:\nSlight consolation or encouragement in the face of a reverse.Origin:\nThis dates back to the 14th century. E. E. Allit. includes the line, \"Lorde! colde watz his cumfort.\"\nIt was used in early literature by several authors, notable Chaucer and Shakespeare, who used it several times. For example:\nThe Taming of the Shrew\nAm I but three inches? why, thy horn is a foot; and\nso long am I at the least. But wilt thou make a\nfire, or shall I complain on thee to our mistress,\nwhose hand, she being now at hand, thou shalt soon\nfeel, to thy cold comfort, for being slow in thy hot office?\nPoison'd,--ill fare--dead, forsook, cast off:\nAnd none of you will bid the winter come\nTo thrust his icy fingers in my maw,\nNor let my kingdom's rivers take their course\nThrough my burn'd bosom, nor entreat the north\nTo make his bleak winds kiss my parched lips\nAnd comfort me with cold. I do not ask you much,\nI beg cold comfort; and you are so strait\nAnd so ingrateful, you deny me that.\nStella Gibbons adapted the term for her 1932 parody of the classic rural novels of Hardy and similar authors - Cold Comfort Farm.From Cold Comfort to HOME PAGE", "label": "No"} {"text": "Genesis creation narrative\n|Part of a series on the|\n|Bible book Bible portal|\nThe Genesis creation narrative is the creation myth[a] of both Judaism and Christianity. The narrative is made up of two stories, roughly equivalent to the first two chapters of the Book of Genesis. In the first, Elohim (the Hebrew generic word for God) creates the heavens and the Earth in six days, then rests on, blesses and sanctifies the seventh (i.e. the Biblical Sabbath). In the second story, God, now referred to by the personal name Yahweh, creates Adam, the first man, from dust and places him in the Garden of Eden, where he is given dominion over the animals. Eve, the first woman, is created from Adam and as his companion.\nBorrowing themes from Mesopotamian mythology, but adapting them to the Israelite people's belief in one God, the first major comprehensive draft of the Pentateuch (the series of five books which begins with Genesis and ends with Deuteronomy) was composed in the late 7th or the 6th century BCE (the Jahwist source) and was later expanded by other authors (the Priestly source) into a work very like the one we have today. The two sources can be identified in the creation narrative: Priestly and Jahwistic. The combined narrative is a critique of the Mesopotamian theology of creation: Genesis affirms monotheism and denies polytheism. Robert Alter described the combined narrative as \"compelling in its archetypal character, its adaptation of myth to monotheistic ends\".\nMisunderstanding the genre of the Genesis creation narrative, meaning the intention of the author(s) and the culture within which they wrote, can result in misreadings of the myth as history. This has inspired some believers to promote creationism and deny evolution. As scholar of Jewish studies, Jon D. Levenson, puts it:\nHow much history lies behind the story of Genesis? Because the action of the primeval story is not represented as taking place on the plane of ordinary human history and has so many affinities with ancient mythology, it is very far-fetched to speak of its narratives as historical at all.\"\nAlthough tradition attributes Genesis to Moses, biblical scholars hold that it, together with the following four books (making up what Jews call the Torah and biblical scholars call the Pentateuch), is \"a composite work, the product of many hands and periods.\" A common hypothesis among biblical scholars today is that the first major comprehensive draft of the Pentateuch was composed in the late 7th or the 6th century BCE (the Jahwist source), and that this was later expanded by the addition of various narratives and laws (the Priestly source) into a work very like the one existing today.\nAs for the historical background which led to the creation of the narrative itself, a theory which has gained considerable interest, although still controversial, is \"Persian imperial authorisation\". This proposes that the Persians, after their conquest of Babylon in 538 BCE, agreed to grant Jerusalem a large measure of local autonomy within the empire, but required the local authorities to produce a single law code accepted by the entire community. It further proposes that there were two powerful groups in the community – the priestly families who controlled the Temple, and the landowning families who made up the \"elders\" – and that these two groups were in conflict over many issues, and that each had its own \"history of origins\", but the Persian promise of greatly increased local autonomy for all provided a powerful incentive to cooperate in producing a single text.\nThe creation narrative is made up of two stories, roughly equivalent to the two first chapters of the Book of Genesis (there are no chapter divisions in the original Hebrew text, see Chapters and verses of the Bible). The first account (Genesis 1:1–2:3) employs a repetitious structure of divine fiat and fulfillment, then the statement \"And there was evening and there was morning, the [xth] day,\" for each of the six days of creation. In each of the first three days there is an act of division: day one divides the darkness from light, day two the \"waters above\" from the \"waters below\", and day three the sea from the land. In each of the next three days these divisions are populated: day four populates the darkness and light with Sun, Moon and stars; day five populates seas and skies with fish and fowl; and finally land-based creatures and mankind populate the land.\nConsistency was evidently not seen as essential to storytelling in ancient Near Eastern literature. The overlapping stories of Genesis 1 and 2 are contradictory but also complementary, with the first (the Priestly story) concerned with the creation of the entire cosmos while the second (the Yahwist story) focuses on man as moral agent and cultivator of his environment. The highly regimented seven-day narrative of Genesis 1 features an omnipotent God who creates a god-like humanity, while the one-day creation of Genesis 2 uses a simple linear narrative, a God who can fail as well as succeed, and a humanity which is not god-like but is punished for acts which would lead to their becoming god-like. Even the order and method of creation differs. \"Together, this combination of parallel character and contrasting profile point to the different origin of materials in Genesis 1 and Genesis 2, however elegantly they have now been combined.\"\nThe primary accounts in each chapter are joined by a literary bridge at Genesis 2:4, \"These are the generations of the heavens and of the earth when they were created.\" This echoes the first line of Genesis 1, \"In the beginning God created the heaven and the earth\", and is reversed in the next phrase, \"...in the day that the LORD God made the earth and the heavens\". This verse is one of ten \"generations\" (Hebrew: תולדות toledot) phrases used throughout Genesis, which provide a literary structure to the book. They normally function as headings to what comes after, but the position of this, the first of the series, has been the subject of much debate.\nComparative mythology provides historical and cross-cultural perspectives for Jewish mythology. Both sources behind the Genesis creation narrative borrowed themes from Mesopotamian mythology, but adapted them to their belief in one God, establishing a monotheistic creation in opposition to the polytheistic creation myth of ancient Israel's neighbors.\nGenesis 1–11 as a whole is imbued with Mesopotamian myths. Genesis 1 bears both striking differences from and striking similarities to Babylon's national creation myth, the Enuma Elish. On the side of similarities, both begin from a stage of chaotic waters before anything is created, in both a fixed dome-shaped \"firmament\" divides these waters from the habitable Earth, and both conclude with the creation of a human called \"man\" and the building of a temple for the god (in Genesis 1, this temple is the entire cosmos). On the side of contrasts, Genesis 1 is monotheistic, it makes no attempt to account for the origins of God, and there is no trace of the resistance to the reduction of chaos to order (Greek: theomachy, lit. \"God-fighting\"), all of which mark the Mesopotamian creation accounts. Still, Genesis 1 bears similarities to the Baal Cycle of Israel's neighbor, Ugarit.\nThe Enuma Elish has also left traces on Genesis 2. Both begin with a series of statements of what did not exist at the moment when creation began; the Enuma Elish has a spring (in the sea) as the point where creation begins, paralleling the spring (on the land – Genesis 2 is notable for being a \"dry\" creation story) in Genesis 2:6 that \"watered the whole face of the ground\"; in both myths, Yahweh/the gods first create a man to serve him/them, then animals and vegetation. At the same time, and as with Genesis 1, the Jewish version has drastically changed its Babylonian model: Eve, for example, seems to fill the role of a mother goddess when, in Genesis 4:1, she says that she has \"created a man with Yahweh\", but she is not a divine being like her Babylonian counterpart.\nGenesis 2 has close parallels with a second Mesopotamian myth, the Atra-Hasis epic – parallels that in fact extend throughout Genesis 2–11, from the Creation to the Flood and its aftermath. The two share numerous plot-details (e.g. the divine garden and the role of the first man in the garden, the creation of the man from a mixture of earth and divine substance, the chance of immortality, etc.), and have a similar overall theme: the gradual clarification of man's relationship with God(s) and animals.\nCreation by word and creation by combat\nThe narratives in Genesis 1 and 2 were not the only creation myths in ancient Israel, and the complete biblical evidence suggests two contrasting models. The first is the \"logos\" (meaning speech) model, where a supreme God \"speaks\" dormant matter into existence. The second is the \"agon\" (meaning struggle or combat) model, in which it is God's victory in battle over the monsters of the sea that mark his sovereignty and might. Genesis 1 is an example of creation by speech, while Psalm 74 and Isaiah 51 are examples of the \"agon\" mythology, recalling a Canaanite myth in which God creates the world by vanquishing the water deities: \"Awake, awake! ... It was you that hacked Rahab in pieces, that pierced the Dragon! It was you that dried up the Sea, the waters of the great Deep, that made the abysses of the Sea a road that the redeemed might walk...\"\nThe cosmos created in Genesis 1 bears a striking resemblance to the Tabernacle in Exodus 35–40, which was the prototype of the Temple in Jerusalem and the focus of priestly worship of Yahweh; for this reason, and because other Middle Eastern creation stories also climax with the construction of a temple/house for the creator-god, Genesis 1 can be interpreted as a description of the construction of the cosmos as God's house, for which the Temple in Jerusalem served as the earthly representative.\nThe word bara is translated as \"created\" in English, but the concept it embodied was not the same as the modern term: in the world of the ancient Near East, the gods demonstrated their power over the world not by creating matter but by fixing destinies, so that the essence of the bara which God performs in Genesis concerns bringing \"heaven and earth\" (a set phrase meaning \"everything\") into existence by organising and assigning roles and functions.\nThe use of numbers in ancient texts was often numerological rather than factual – that is, the numbers were used because they held some symbolic value to the author. The number seven, denoting divine completion, permeates Genesis 1: verse 1:1 consists of seven words, verse 1:2 of fourteen, and 2:1–3 has 35 words (5×7); Elohim is mentioned 35 times, \"heaven/firmament\" and \"earth\" 21 times each, and the phrases \"and it was so\" and \"God saw that it was good\" occur 7 times each.\nPre-creation: Genesis 1:1–2\n- 1 In the beginning God created the heaven and the earth.\n- 2 And the earth was without form, and void; and darkness [was] upon the face of the deep. And the Spirit of God moved upon the face of the waters.\n- as a statement that the cosmos had an absolute beginning (\"In the beginning God created the heaven and the earth.\");\n- as a statement describing the condition of the world when God began creating (\"When in the beginning God created the heavens and the earth, the earth was untamed and shapeless.\"); and\n- essentially similar to the second version but taking all of Genesis 1:2 as background information (\"When in the beginning God created the heavens and the earth – the earth being untamed and shapeless... – God said, Let there be light!\").\nThe second seems to be the meaning intended by the original Priestly author: the verb bara is used only of God (people do not engage in bara), and it concerns the assignment of roles, as in the creation of the first people as \"male and female\" (i.e., it allocates them sexes): in other words, the power of God is being shown not by the creation of matter but by the fixing of destinies.\nThe heavens and the earth is a set phrase meaning \"everything\", i.e., the cosmos. This was made up of three levels, the habitable earth in the middle, the heavens above, and an underworld below, all surrounded by a watery \"ocean\" of chaos as the Babylonian Tiamat. The Earth itself was a flat disc, surrounded by mountains or sea. Above it was the firmament, a transparent but solid dome resting on the mountains, allowing men to see the blue of the waters above, with \"windows\" to allow the rain to enter, and containing the Sun, Moon and stars. The waters extended below the Earth, which rested on pillars sunk in the waters, and in the underworld was Sheol, the abode of the dead.\nThe opening of Genesis 1 continues: \"And the earth was formless and void...\" The phrase \"formless and void\" is a translation of the Hebrew tohu wa-bohu, (Hebrew: תֹהוּ וָבֹהוּ), chaos, the condition that bara, ordering, remedies. Tohu by itself means \"emptiness, futility\"; it is used to describe the desert wilderness; bohu has no known meaning and was apparently coined to rhyme with and reinforce tohu. The phrase appears also in Jeremiah 4:23 where the prophet warns Israel that rebellion against God will lead to the return of darkness and chaos, \"as if the earth had been 'uncreated'\".\nThe opening of Genesis 1 concludes with a statement that \"darkness was on the face of the deep\" (Hebrew: תְהוֹם tehôm), [the] \"darkness\" and the \"deep\" being two of the three elements of the chaos represented in tohu wa-bohu (the third is the \"formless earth\"). In the Enuma Elish, the \"deep\" is personified as the goddess Tiamat, the enemy of Marduk; here it is the formless body of primeval water surrounding the habitable world, later to be released during the Deluge, when \"all the fountains of the great deep burst forth\" from the waters beneath the earth and from the \"windows\" of the sky.\nThe Rûach of God moves over the face of the deep before creation begins. Rûach (רוּחַ) has the meanings \"wind, spirit, breath\", and elohim can mean \"great\" as well as \"god\": the ruach elohim may therefore mean the \"wind/breath of God\" (the storm-wind is God's breath in Psalms 18:16 and elsewhere, and the wind of God returns in the Flood story as the means by which God restores the Earth), or God's \"spirit\", a concept which is somewhat vague in the Hebrew Bible, or it may simply signify a great storm-wind.\nSix days of Creation: Genesis 1:3–2:3\nGod's first act was the creation of undifferentiated light; dark and light were then separated into night and day, their order (evening before morning) signifying that this was the liturgical day; and then the Sun, Moon and stars were created to mark the proper times for the festivals of the week and year. Only when this is done does God create man and woman and the means to sustain them (plants and animals). At the end of the sixth day, when creation is complete, the world is a cosmic temple in which the role of humanity is the worship of God. This parallels Mesopotamian myth (the Enuma Elish) and also echoes chapter 38 of the Book of Job, where God recalls how the stars, the \"sons of God\", sang when the corner-stone of creation was laid.\n3 And God said: 'Let there be light.' And there was light. 4 And God saw the light, that it was good; and God divided the light from the darkness. 5 And God called the light Day, and the darkness He called Night. And there was evening and there was morning, one day.\nDay 1 begins with the creation of light. God creates by spoken command and names the elements of the world as he creates them. In the ancient Near East the act of naming was bound up with the act of creating: thus in Egyptian literature the creator god pronounced the names of everything, and the Enûma Elish begins at the point where nothing has yet been named. God's creation by speech also suggests that he is being compared to a king, who has merely to speak for things to happen.\n6 And God said: 'Let there be a firmament in the midst of the waters, and let it divide the waters from the waters.' 7 And God made the firmament, and divided the waters which were under the firmament from the waters which were above the firmament; and it was so. 8 And God called the firmament Heaven. And there was evening and there was morning, a second day.\nRāqîa, the word translated as firmament, is from rāqa', the verb used for the act of beating metal into thin plates. Created on the second day of creation and populated by luminaries on the fourth, it is a solid dome which separates the Earth below from the heavens and their waters above, as in Egyptian and Mesopotamian belief of the same time. In Genesis 1:17 the stars are set in the raqia'; in Babylonian myth the heavens were made of various precious stones (compare Exodus 24:10 where the elders of Israel see God on the sapphire floor of heaven), with the stars engraved in their surface.\nAnd God said: 'Let the waters under the heaven be gathered together unto one place, and let the dry land appear.' And it was so. 10 And God called the dry land Earth, and the gathering together of the waters called He Seas; and God saw that it was good. 11 And God said: 'Let the earth put forth grass, herb yielding seed, and fruit-tree bearing fruit after its kind, wherein is the seed thereof, upon the earth.' And it was so. 12 And the earth brought forth grass, herb yielding seed after its kind, and tree bearing fruit, wherein is the seed thereof, after its kind; and God saw that it was good. 13 And there was evening and there was morning, a third day.\nOn the third day, the waters withdraw, creating a ring of ocean surrounding a single circular continent. By the end of the third day God has created a foundational environment of light, heavens, seas and earth. The three levels of the cosmos are next populated in the same order in which they were created – heavens, sea, earth.\nGod does not create or make trees and plants, but instead commands the earth to produce them. The underlying theological meaning seems to be that God has given the previously barren earth the ability to produce vegetation, and it now does so at his command. \"According to (one's) kind\" appears to look forward to the laws found later in the Pentateuch, which lay great stress on holiness through separation.\n14 And God said: 'Let there be lights in the firmament of the heaven to divide the day from the night; and let them be for signs, and for seasons, and for days and years; 15 and let them be for lights in the firmament of the heaven to give light upon the earth.' And it was so. 16 And God made the two great lights: the greater light to rule the day, and the lesser light to rule the night; and the stars. 17 And God set them in the firmament of the heaven to give light upon the earth, 18 and to rule over the day and over the night, and to divide the light from the darkness; and God saw that it was good. 19 And there was evening and there was morning, a fourth day.\nOn Day Four the language of \"ruling\" is introduced: the heavenly bodies will \"govern\" day and night and mark seasons and years and days (a matter of crucial importance to the Priestly authors, as religious festivals were organised around the cycles of the Sun and Moon); later, man will be created to rule over the whole of creation as God's regent. God puts \"lights\" in the firmament to \"rule over\" the day and the night. Specifically, God creates the \"greater light,\" the \"lesser light,\" and the stars. According to Victor Hamilton, most scholars agree that the choice of \"greater light\" and \"lesser light\", rather than the more explicit \"Sun\" and \"Moon\", is anti-mythological rhetoric intended to contradict widespread contemporary beliefs that the Sun and the Moon were deities themselves.\nAnd God said: 'Let the waters swarm with swarms of living creatures, and let fowl fly above the earth in the open firmament of heaven.' 21 And God created the great sea-monsters, and every living creature that creepeth, wherewith the waters swarmed, after its kind, and every winged fowl after its kind; and God saw that it was good. 22 And God blessed them, saying: 'Be fruitful, and multiply, and fill the waters in the seas, and let fowl multiply in the earth.' 23 And there was evening and there was morning, a fifth day.\nIn the Egyptian and Mesopotamian mythologies, the creator-god has to do battle with the sea-monsters before he can make heaven and earth; in Genesis 1:21, the word tannin, sometimes translated as \"sea monsters\" or \"great creatures\", parallels the named chaos-monsters Rahab and Leviathan from Psalm 74:13, and Isaiah 27:1, and Isaiah 51:9, but there is no hint (in Genesis) of combat, and the tannin are simply creatures created by God.\n24 And God said: 'Let the earth bring forth the living creature after its kind, cattle, and creeping thing, and beast of the earth after its kind.' And it was so. 25 And God made the beast of the earth after its kind, and the cattle after their kind, and every thing that creepeth upon the ground after its kind; and God saw that it was good.\n26 And God said: 'Let us make man in our image, after our likeness; and let them have dominion over the fish of the sea, and over the fowl of the air, and over the cattle, and over all the earth, and over every creeping thing that creepeth upon the earth.' 27 And God created man in His own image, in the image of God created He him; male and female created He them. 28 And God blessed them; and God said unto them: 'Be fruitful, and multiply, and replenish the earth, and subdue it; and have dominion over the fish of the sea, and over the fowl of the air, and over every living thing that creepeth upon the earth.' 29 And God said: 'Behold, I have given you every herb yielding seed, which is upon the face of all the earth, and every tree, in which is the fruit of a tree yielding seed--to you it shall be for food; 30 and to every beast of the earth, and to every fowl of the air, and to every thing that creepeth upon the earth, wherein there is a living soul, [I have given] every green herb for food.' And it was so.31 And God saw every thing that He had made, and, behold, it was very good. And there was evening and there was morning, the sixth day.\nWhen in Genesis 1:26 God says \"Let us make man\", the Hebrew word used is adam; in this form it is a generic noun, \"mankind\", and does not imply that this creation is male. After this first mention the word always appears as ha-adam, \"the man\", but as Genesis 1:27 shows (\"So God created man in his [own] image, in the image of God created he him; male and female created he them.\"), the word is still not exclusively male.\nMan was created in the \"image of God\". The meaning of this is unclear: suggestions include:\n- Having the spiritual qualities of God such as intellect, will, etc.;\n- Having the physical form of God;\n- A combination of these two;\n- Being God's counterpart on Earth and able to enter into a relationship with him;\n- Being God's representative or viceroy on Earth.\nThe fact that God says \"Let us make man...\" has given rise to several theories, of which the two most important are that \"us\" is majestic plural, or that it reflects a setting in a divine council with God enthroned as king and proposing the creation of mankind to the lesser divine beings.\nGod tells the animals and humans that he has given them \"the green plants for food\" – creation is to be vegetarian. Only later, after the Flood, is man given permission to eat flesh. The Priestly author of Genesis appears to look back to an ideal past in which mankind lived at peace both with itself and with the animal kingdom, and which could be re-achieved through a proper sacrificial life in harmony with God.\nUpon completion, God sees that \"every thing that He had made ... was very good\" (Genesis 1:31). This implies that the materials that existed before the Creation (\"tohu wa-bohu,\" \"darkness,\" \"tehom\") were not \"very good.\" Israel Knohl hypothesized that the Priestly source set up this dichotomy to mitigate the problem of evil.\nSeventh day: divine rest\nAnd the heaven and the earth were finished, and all the host of them. 2 And on the seventh day God finished His work which He had made; and He rested on the seventh day from all His work which He had made. 3 And God blessed the seventh day, and hallowed it; because that in it He rested from all His work which God in creating had made.\nCreation is followed by rest. In ancient Near Eastern literature the divine rest is achieved in a temple as a result of having brought order to chaos. Rest is both disengagement, as the work of creation is finished, but also engagement, as the deity is now present in his temple to maintain a secure and ordered cosmos. Compare with Exodus 20:8–20:11: \"Remember the sabbath day, to keep it holy. Six days shalt thou labour, and do all thy work; but the seventh day is a sabbath unto the LORD thy GOD, in it thou shalt not do any manner of work, thou, nor thy son, nor thy daughter, nor thy man-servant, nor thy maid-servant, nor thy cattle, nor thy stranger that is within thy gates; for in six days the LORD made heaven and earth, the sea, and all that in them is, and rested on the seventh day; wherefore the LORD blessed the sabbath day, and hallowed it.\"\nGenesis 2–3, the Garden of Eden story, was probably authored around 500 BCE as \"a discourse on ideals in life, the danger in human glory, and the fundamentally ambiguous nature of humanity – especially human mental faculties\". The Garden in which the action takes place lies on the mythological border between the human and the divine worlds, probably on the far side of the Cosmic ocean near the rim of the world; following a conventional ancient Near Eastern concept, the Eden river first forms that ocean and then divides into four rivers which run from the four corners of the earth towards its centre. It opens \"in the day that the LORD God made the earth and the heavens\", a set introduction similar to those found in Babylonian myths. Before the man is created the earth is a barren waste watered by an ’êḏ (אד); Genesis 2:6 the King James Version translated this as \"mist\", following Jewish practice, but since the mid-20th century Hebraists have generally accepted that the real meaning is \"spring of underground water\".\nIn Genesis 1 the characteristic word for God's activity is bara, \"created\"; in Genesis 2 the word used when he creates the man is yatsar (ייצר yîṣer), meaning \"fashioned\", a word used in contexts such as a potter fashioning a pot from clay. God breathes his own breath into the clay and it becomes nephesh (נֶ֫פֶשׁ), a word meaning \"life\", \"vitality\", \"the living personality\"; man shares nephesh with all creatures, but the text describes this life-giving act by God only in relation to man.\nEden, where God puts his Garden of Eden, comes from a root meaning \"fertility\": the first man is to work in God's miraculously fertile garden. The \"tree of life\" is a motif from Mesopotamian myth: in the Epic of Gilgamesh (c. 1800 BCE) the hero is given a plant whose name is \"man becomes young in old age\", but a serpent steals the plant from him. There has been much scholarly discussion about the type of knowledge given by the second tree. Suggestions include: human qualities, sexual consciousness, ethical knowledge, or universal knowledge; with the last being the most widely accepted. In Eden, mankind has a choice between wisdom and life, and chooses the first, although God intended them for the second.\nThe mythic Eden and its rivers may represent the real Jerusalem, the Temple and the Promised Land. Eden may represent the divine garden on Zion, the mountain of God, which was also Jerusalem; while the real Gihon was a spring outside the city (mirroring the spring which waters Eden); and the imagery of the Garden, with its serpent and cherubs, has been seen as a reflection of the real images of the Solomonic Temple with its copper serpent (the nehushtan) and guardian cherubs. Genesis 2 is the only place in the Bible where Eden appears as a geographic location: elsewhere (notably in the Book of Ezekiel) it is a mythological place located on the holy Mountain of God, with echoes of a Mesopotamian myth of the king as a primordial man placed in a divine garden to guard the tree of life.\n\"Good and evil\" is a merism, in this case meaning simply \"everything\", but it may also have a moral connotation. When God forbids the man to eat from the tree of knowledge he says that if he does so he is \"doomed to die\": the Hebrew behind this is in the form used in the Bible for issuing death sentences.\nThe first woman is created to be ezer kenegdo (עזר כנגדו ‘êzer kəneḡdō) – a term notably difficult to translate – to the man. Kəneḡdō means \"alongside, opposite, a counterpart to him\", and ‘êzer means active intervention on behalf of the other person. God's naming of the elements of the cosmos in Genesis 1 illustrated his authority over creation; now the man's naming of the animals (and of Woman) illustrates Adam's authority within creation.\nThe woman is called ishah (אשה ’iš-šāh), \"Woman\", with an explanation that this is because she was taken from ish (אִישׁ ’îš), meaning \"man\"; the two words are not in fact connected. Later, after the story of the Garden is complete, she receives a name: Ḥawwāh (חוה , Eve). This means \"living\" in Hebrew, from a root that can also mean \"snake\". The word traditionally translated \"rib\" in English can also mean \"side\", \"chamber\", or \"beam\". A long-standing exegetical tradition holds that the use of a rib from man's side emphasizes that both man and woman have equal dignity, for woman was created from the same material as man, shaped and given life by the same processes.\nCreationism and the genre of the creation narrative\n|Part of a series on|\nThe meaning to be derived from the Genesis creation narrative will depend on the reader's understanding of its genre, the literary \"type\" to which it belongs: \"it makes an enormous difference whether the first chapters of Genesis are read as scientific cosmology, creation myth, or historical saga\". Misunderstanding of the genre of the text, meaning the intention of the author/s and the culture within which they wrote, will result in a misreading. Reformed evangelical scholar Bruce Waltke cautions against one such misreading, the \"woodenly literal\" approach which leads to \"creation science\" and such \"implausible interpretations\" as the \"gap theory\", the presumption of a \"young earth\", and the denial of evolution. Another scholar, Conrad Hyers, sums up the same thought in these words: \"A literalist interpretation of the Genesis accounts is inappropriate, misleading, and unworkable [because] it presupposes and insists upon a kind of literature and intention that is not there.\"\nWhatever else it may be, Genesis 1 is \"story\", since it features character and characterisation, a narrator, and dramatic tension expressed through a series of incidents arranged in time. The Priestly author of Genesis 1 had to confront two major difficulties. First, there is the fact that since only God exists at this point, no-one was available to be the narrator; the storyteller solved this by introducing an unobtrusive \"third person narrator\". Second, there was the problem of conflict: conflict is necessary to arouse the reader's interest in the story, yet with nothing else existing, neither a chaos-monster nor another god, there cannot be any conflict. This was solved by creating a very minimal tension: God is opposed by nothingness itself, the blank of the world \"without form and void.\" Telling the story in this way was a deliberate choice: there are a number of creation stories in the Bible, but they tend to be told in the first person, by Wisdom, the instrument by which God created the world; the choice of an omniscient third-person narrator in the Genesis narrative allows the storyteller to create the impression that everything is being told and nothing held back.\nIt can also be regarded as ancient history, \"part of a broader spectrum of originally anonymous, history-like ancient Near Eastern narratives.\" It is frequently called myth in scholarly writings, but there is no agreement on how \"myth\" is to be defined, and so while Brevard Childs famously suggested that the author of Genesis 1–11 \"demythologised\" his narrative, meaning that he removed from his sources (the Babylonian myths) those elements which did not fit with his own faith, others can say it is entirely mythical.\nGenesis 1–2 can be seen as ancient science: in the words of E.A. Speiser, \"on the subject of creation biblical tradition aligned itself with the traditional tenets of Babylonian science.\" The opening words of Genesis 1, \"In the beginning God created the heavens and the earth\", sum up the author(s) belief that Yahweh, the god of Israel, was solely responsible for creation and had no rivals. Later Jewish thinkers, adopting ideas from Greek philosophy, concluded that God's Wisdom, Word and Spirit penetrated all things and gave them unity. Christianity in turn adopted these ideas and identified Jesus with the creative word: \"In the beginning was the Word, and the Word was with God, and the Word was God\" (John 1:1). When the Jews came into contact with Greek thought it led to a major reinterpretation of the underlying cosmology of the Genesis narrative. The biblical authors conceived the cosmos as a flat disc-shaped Earth in the centre, an underworld for the dead below, and heaven above. Below the Earth were the \"waters of chaos\", the cosmic sea, home to mythic monsters defeated and slain by God; in Exodus 20:4, God warns against making an image \"of anything that is in the waters under the earth\". There were also waters above the Earth, and so the raqia (firmament), a solid bowl, was necessary to keep them from flooding the world. During the Hellenistic period this was largely replaced by a more \"scientific\" model as imagined by Greek philosophers, according to which the Earth was a sphere at the centre of concentric shells of celestial spheres containing the Sun, Moon, stars and planets.\nThe idea that God created the world out of nothing (creatio ex nihilo) is central today to Islam, Christianity, and Judaism – indeed, the medieval Jewish philosopher Maimonides felt it was the only concept that the three religions shared – yet it is not found directly in Genesis, nor in the entire Hebrew Bible. The Priestly authors of Genesis 1 were concerned not with the origins of matter (the material which God formed into the habitable cosmos), but with assigning roles so that the Cosmos should function. This was still the situation in the early 2nd century AD, although early Christian scholars were beginning to see a tension between the idea of world-formation and the omnipotence of God; by the beginning of the 3rd century this tension was resolved, world-formation was overcome, and creation ex nihilo had become a fundamental tenet of Christian theology.\n- Anno Mundi\n- Apollo 8 Genesis reading\n- Atra-hasis epic\n- Allegorical interpretations of Genesis\n- Ancient Near Eastern Texts Relating to the Old Testament\n- Babylonian mythology\n- Biblical chronology\n- Biblical cosmology\n- Biblical criticism\n- Christian mythology\n- Creation (disambiguation)\n- Creation mandate\n- Cultural mandate\n- Enûma Eliš\n- Genesis flood narrative\n- Islamic creation narrative\n- Human timeline\n- Jewish mythology\n- Life timeline\n- List of creation myths\n- Mesopotamian mythology\n- Nature timeline\n- Primeval history\n- Religion and mythology\n- Sanamahi creation myth\n- Sumerian creation myth\n- Sumerian literature\n- Tree of the knowledge of good and evil\n- Tree of life\n- The term myth is used here in its academic sense, meaning \"a traditional story consisting of events that are ostensibly historical, though often supernatural, explaining the origins of a cultural practice or natural phenomenon.\" It is not being used to mean \"something that is false\".\n- Leeming & Leeming 2009, p. 113. sfn error: no target: CITEREFLeemingLeeming2009 (help)\n- Sarna 1997, p. 50.\n- Davies 2007, p. 37.\n- Bandstra 2008, p. 37.\n- Wenham 2003b, p. 37.\n- Alter 2004, p. xii.\n- Andersen 1987, p. 142.\n- Waltke 1991, pp. 6–9.\n- Levenson 2004, p. 11.\n- Speiser 1964, p. xxi.\n- Ska 2006, pp. 169, 217–18.\n- Alter 1981, p. 141.\n- Ruiten 2000, pp. 9–10.\n- Levenson 2004, p. 9 \"One aspect of narrative in Genesis that requires special attention is its high tolerance for different versions of the same event, a well-known feature of ancient Near Eastern literature, from earliest times through rabbinic midrash. ... This could not have happened if the existence of variation were seen as a serious defect or if rigid consistency were deemed essential to effective storytelling.\"\n- Carr 1996, pp. 62–64.\n- Carr 1996, p. 64.\n- Cross 1973, pp. 301ff.\n- Thomas 2011, pp. 27–28.\n- Lambert 1965.\n- Levenson 2004, p. 9.\n- Leeming 2004.\n- Smith 2001.\n- Kutsko 2000, p. 62, quoting J. Maxwell Miller.\n- McDermott 2002, pp. 25–27.\n- Mark Smith; Wayne Pitard (24 December 2008). The Ugaritic Baal Cycle: Volume II. Introduction with Text, Translation and Commentary of KTU/CAT 1.3-1.4. BRILL. p. 615. ISBN 978-90-474-4232-5.\n- Van Seters 1992, pp. 122–24.\n- Dolansky 2016.\n- Fishbane 2003, pp. 34–35.\n- Hutton 2007, p. 274.\n- Levenson 2004, p. 13.\n- Walton 2006, p. 183.\n- Hyers 1984, p. 74.\n- Wenham 1987, p. 6.\n- Genesis 1:1–1:2\n- Bandstra 2008, pp. 38–39.\n- Spence 2010, p. 72.\n- Knight 1990, pp. 175–76.\n- Walton 2001.\n- Alter 2004, p. 17.\n- Thompson 1980, p. 230.\n- Wenham 2003a, p. 29.\n- Blenkinsopp 2011, pp. 33–34.\n- Blenkinsopp 2011, pp. 21–22.\n- Genesis 1:3–1:5\n- Walton 2003, p. 158.\n- Bandstra 2008, p. 39.\n- Genesis 1:6–1:8\n- Hamilton 1990, p. 122.\n- Seeley 1991, p. 227.\n- Walton 2003, pp. 158–59.\n- Genesis 1:9–1:13\n- Seeley 1997, p. 236.\n- Bandstra 2008, p. 41.\n- Kissling 2004, p. 106.\n- Genesis 1:14–1:19\n- Bandstra 2008, pp. 41–42.\n- Walsh 2001, p. 37 (fn.5).\n- Hamilton 1990, p. 127.\n- Genesis 1:20–1:23\n- Walton 2003, p. 160.\n- Genesis 1:24–31\n- Alter 2004, pp. 18–19, 21.\n- Kvam et al. 1999, p. 24.\n- Davidson 1973, p. 24.\n- Levenson 2004, p. 14.\n- Rogerson 1991, pp. 19ff.\n- Knohl 2003, p. 13.\n- Genesis 2:1–2:3\n- Walton 2006, pp. 157–58.\n- Stordalen 2000, pp. 473–74.\n- Van Seters 1998, p. 22.\n- Andersen 1987, pp. 137–40.\n- Alter 2004, pp. 20, 22.\n- Davidson 1973, p. 31.\n- Levenson 2004, p. 15.\n- Davidson 1973, p. 29.\n- Levenson 2004, p. 9 \"The story of Adam and Eve's sin in the garden of Eden (2.25–3.24) displays similarities with Gilgamesh, an epic poem that tells how its hero lost the opportunity for immortality and came to terms with his humanity. ... the biblical narrator has adapted the Mesopotamian forerunner to Israelite theology.\"\n- Kooij 2010, p. 17.\n- Propp 1990, p. 193.\n- Stordalen 2000, pp. 307–10.\n- Davidson 1973, p. 33.\n- Alter 2004, p. 21.\n- Alter 2004, p. 22.\n- Turner 2009, p. 20.\n- Hastings 2003, p. 607.\n- Jacobs 2007, p. 37.\n- Hugenberger 1988, p. 184.\n- Wood 1990, pp. 323–24.\n- Hyers 1984, p. 28.\n- Cotter 2003, pp. 5–9.\n- Cotter 2003, p. 7.\n- Cotter 2003, p. 8.\n- Carr 1996, p. 21.\n- Hamilton 1990, pp. 57–58.\n- Seidman 2010, p. 166.\n- Wright 2002, p. 53.\n- Kaiser 1997, p. 28.\n- Parrish 1990, pp. 183–84.\n- Aune 2003, p. 119.\n- Ryken et al 1998, p. 170\n- Soskice 2010, p. 24.\n- Nebe 2002, p. 119.\n- May 2004, p. 179.\n- Alter, Robert (1981). The Art of Biblical narrative. Basic Books. ISBN 9780465004270.CS1 maint: ref=harv (link)\n- Alter, Robert (2004). The Five Books of Moses. W. W. Norton & Company. ISBN 0-393-33393-0.CS1 maint: ref=harv (link)\n- Andersen, Francis I. (1987). \"On Reading Genesis 1–3\". In O'Connor, Michael Patrick; Freedman, David Noel (eds.). Backgrounds for the Bible. Eisenbrauns. ISBN 9780931464300.CS1 maint: ref=harv (link)\n- Aune, David E. (2003). \"Cosmology\". Westminster Dictionary of the New Testament and Early Christian Literature. Westminster John Knox Press. ISBN 9780664219178.CS1 maint: ref=harv (link)\n- Bandstra, Barry L. (2008). Reading the Old Testament: An Introduction to the Hebrew Bible. Wadsworth Publishing Company. p. 576. ISBN 0-495-39105-0.CS1 maint: ref=harv (link)\n- Blenkinsopp, Joseph (2011). Creation, Un-Creation, Re-Creation: A Discursive Commentary on Genesis 1–11. T&T Clarke International. ISBN 9780567372871.CS1 maint: ref=harv (link)\n- Bouteneff, Peter C. (2008). Beginnings: Ancient Christian Readings of the Biblical Creation Narrative. Grand Rapids, Michigan: Baker Academic. ISBN 978-0-8010-3233-2.CS1 maint: ref=harv (link)\n- Brettler, Mark Zvi (2005). How To Read the Bible. Jewish Publication Society. ISBN 9780827610019.CS1 maint: ref=harv (link)\n- Brueggemann, Walter (1982). \"Genesis 1:1–2.4\". Interpretation of Genesis. Westminster John Knox Press. p. 382. ISBN 978-0-8042-3101-5.CS1 maint: ref=harv (link)\n- Carr, David M. (1996). Reading the Fractures in Genesis. Westminster John Knox Press. ISBN 0-664-22071-1.CS1 maint: ref=harv (link)\n- Carr, David M. (2011). \"The Garden of Eden Story\". An Introduction to the Old Testament. John Wiley & Sons. ISBN 9781444356236.CS1 maint: ref=harv (link)\n- Cotter, David W (2003). Genesis. Liturgical Press. ISBN 9780814650400.CS1 maint: ref=harv (link)\n- Cross, Frank Moore (1973). \"The Priestly Work\". Canaanite Myth and Hebrew Epic: Essays in the History of the Religion of Israel. Harvard University Press. p. 394. ISBN 0-674-09176-0.CS1 maint: ref=harv (link)\n- Dalley, Stephanie (2000). Myths from Mesopotamia: Creation, the Flood, Gilgamesh, and Others. Oxford University Press. ISBN 9780192835895.CS1 maint: ref=harv (link)\n- Davidson, Robert (1973). Genesis 1–11. Cambridge University Press. ISBN 9780521097604.CS1 maint: ref=harv (link)\n- Davies, G.I. (2007). \"Introduction to the Pentateuch\". In Barton, John; Muddiman, John (eds.). Oxford Bible Commentary. Oxford University Press. ISBN 9780199277186.CS1 maint: ref=harv (link)\n- Dolansky, Shawna (2016). \"The Multiple Truths of Myths\". Biblical Archaeology Review. 42 (1): 18, 60.\n- Fishbane, Michael (2003). Biblical Myth and Rabbinic Mythmaking. Oxford University Press. ISBN 0-19-826733-9.CS1 maint: ref=harv (link)\n- Friedman, Richard Elliott (2003). The Bible with Sources Revealed. HarperCollins. ISBN 9780061951299.CS1 maint: ref=harv (link)\n- Ginzberg, Louis (1909). The Legends of the Jews (PDF). Jewish Publication Society. p. 695.\n- Graves, Robert; Patai, Raphael (1986). Hebrew Myths: The Book of Genesis. Random House. ISBN 9780795337154.\n- Hamilton, Victor P (1990). The Book of Genesis: Chapters 1–17. New International Commentary on the Old Testament (NICOT). Grand Rapids: William B. Eerdmans Publishing Company. p. 540. ISBN 0-8028-2521-4.CS1 maint: ref=harv (link)\n- Hastings, James (2003). Encyclopedia of Religion and Ethics, Part 10. Kessinger Publishing. ISBN 978-0-7661-3682-3.CS1 maint: ref=harv (link)\n- Heidel, Alexander (1963). Babylonian Genesis (2nd ed.). Chicago University Press. ISBN 0-226-32399-4.CS1 maint: ref=harv (link)\n- Heidel, Alexander (1963). The Gilgamesh Epic and Old Testament Parallels (2nd Revised ed.). Chicago University Press. ISBN 0-226-32398-6.CS1 maint: ref=harv (link)\n- Hugenberger, G.P. (1988). \"Rib\". In Bromiley, Geoffrey W. (ed.). The International Standard Bible Encyclopedia, Volume 4. Eerdmans. ISBN 9780802837844.CS1 maint: ref=harv (link)\n- Hutton, Jeremy (2007). Isaiah 51:9–11 and the Rhetorical Appropriation and Subversion of Hostile Theologies. Journal of Biblical Literature. 126. Society of Biblical Literature. JSTOR 27638435.CS1 maint: ref=harv (link)\n- Hyers, Conrad (1984). The Meaning of Creation: Genesis and Modern Science. Westminster John Knox. ISBN 9780804201254.CS1 maint: ref=harv (link)\n- Jacobs, Mignon R (2007). Gender, Power, and Persuasion: The Genesis Narratives and Contemporary Perspectives. Baker Academic.CS1 maint: ref=harv (link)\n- Janzen, David (2004). The Social Meanings of Sacrifice in the Hebrew Bible: A Study of Four Writings. Walter de Gruyter Publisher. ISBN 978-3-11-018158-6.CS1 maint: ref=harv (link)\n- Kaiser, Christopher B. (1997). Creational Theology and the History of Physical Science. Brill. ISBN 9004106693.CS1 maint: ref=harv (link)\n- Kaplan, Aryeh (2002). \"Hashem/Elokim: Mixing Mercy with Justice\". The Aryeh Kaplan Reader: The Gift He Left Behind. Mesorah Publication, Ltd. p. 224. ISBN 0-89906-173-7. Retrieved 29 December 2010.CS1 maint: ref=harv (link)\n- Keel, Othmar (1997). The Symbolism of the Biblical World. Eisenbrauns. ISBN 9781575060149.CS1 maint: ref=harv (link)\n- King, Leonard (2010). Enuma Elish: The Seven Tablets of Creation; The Babylonian and Assyrian Legends Concerning the Creation of the World and of Mankind. Cosimo Inc.CS1 maint: ref=harv (link)\n- Kissling, Paul (2004). Genesis, Volume 1. College Press. ISBN 9780899008752.CS1 maint: ref=harv (link)\n- Knight, Douglas A (1990). \"Cosmology\". In Watson E. Mills (General Editor) (ed.). Mercer Dictionary of the Bible. Mercer University Press. ISBN 9780865543737.CS1 maint: ref=harv (link)\n- Knohl, Israel (2003). The Divine Symphony: The Bible's Many Voices. Jewish Publication Society. ISBN 9780827610187.CS1 maint: ref=harv (link)\n- Kooij, Arie van der (2010). \"The Story of Paradise in the Light of Mesopotamian Culture and Literature\". In Dell, Katherine J; Davies, Graham; Koh, Yee Von (eds.). Genesis, Isaiah, and Psalms. Brill. ISBN 9004182314.CS1 maint: ref=harv (link)\n- Kramer, Samuel Noah (1956). History Begins at Sumer: Thirty-Nine Firsts in Recorded History.CS1 maint: ref=harv (link)\n- Kugler, Robert; Hartin, Patrick (2009). An Introduction to the Bible. Eerdmans. ISBN 9780802846365.CS1 maint: ref=harv (link)\n- Kutsko, John F. (2000). Between Heaven and Earth: Divine Presence and Absence in the Book of Ezekiel. Eisenbrauns. ISBN 9781575060415.CS1 maint: ref=harv (link)\n- Kvam, Kristen E.; Schearing, Linda S.; Ziegler, Valarie H., eds. (1999). Eve and Adam: Jewish, Christian, and Muslim Readings on Genesis and Gender. Indiana University Press. p. 515. ISBN 0-253-21271-5.\n- Lambert, W. G. (1965). \"A New Look at the Babylonian Background of Genesis\". The Journal of Theological Studies. 16 (2). pp. 287–300. JSTOR 23959032.\n- Leeming, David A. (2010). Creation Myths of the World: An Encyclopedia. 1. ABC-CLIO. ISBN 9781598841749.CS1 maint: ref=harv (link)\n- Leeming, David A. (2004). \"Biblical creation\". The Oxford Companion to World Mythology. Oxford University Press. Retrieved 5 May 2010.CS1 maint: ref=harv (link)\n- Leeming, David A.; Leeming, Margaret (2004). A Dictionary of Creation Myths. Oxford University Press. ISBN 9780195102758.CS1 maint: ref=harv (link)\n- Levenson, Jon D. (2004). \"Genesis: Introduction and Annotations\". In Berlin, Adele; Brettler, Marc Zvi (eds.). The Jewish study Bible. Oxford University Press. ISBN 9780195297515.CS1 maint: ref=harv (link)\n- Louth, Andrew (2001). \"Introduction\". In Andrew Louth (ed.). Genesis 1–11. InterVarsity Press. ISBN 9780830814718.CS1 maint: ref=harv (link)\n- May, Gerhard (2004). Creatio Ex Nihilo (English trans. of 1994 ed.). T&T Clarke International. ISBN 9780567083562.CS1 maint: ref=harv (link)\n- McDermott, John J. (2002). Reading the Pentateuch: A Historical Introduction. Paulist Press. ISBN 9780809140824.CS1 maint: ref=harv (link)\n- McMullin, Ernin (2010). \"Creation Ex Nihilo: Early History\". In Burrell, David B.; Cogliati, Carlo; Soskice, Janet M.; Stoeger, William R. (eds.). Creation and the God of Abraham. Cambridge: Cambridge University Press. ISBN 9781139490788.CS1 maint: ref=harv (link)\n- Nebe, Gottfried (2002). \"Creation in Paul's Theology\". In Hoffman, Yair; Reventlow, Henning Graf (eds.). Creation in Jewish and Christian Tradition. Sheffield Academic Press. ISBN 9780567573933.CS1 maint: ref=harv (link)\n- Parrish, V. Steven (1990). \"Creation\". In Watson E. Mills (General Editor) (ed.). Mercer Dictionary of the Bible. Mercer University Press. ISBN 9780865543737.CS1 maint: ref=harv (link)\n- Penchansky, David (November 2005). Twilight of the Gods: Polytheism in the Hebrew Bible. U.S.: Westminster/John Knox Press. ISBN 0-664-22885-2.CS1 maint: ref=harv (link)\n- Propp, W.H. (1990). \"Eden Sketches\". In Propp, W.H.; Halpern, Baruch; Freedman, D.N. (eds.). The Hebrew Bible and its Interpreters. Eisenbrauns. ISBN 9780931464522.CS1 maint: ref=harv (link)\n- Ruiten, Jacques T. A. G. M. (2000). Primaeval History Interpreted. Brill. ISBN 9004116583.CS1 maint: ref=harv (link)\n- Rogerson, John William (1991). Genesis 1–11. T&T Clark. ISBN 9780567083388.CS1 maint: ref=harv (link)\n- Sarna, Nahum M. (1997). \"The Mists of Time: Genesis I–II\". In Feyerick, Ada (ed.). Genesis: World of Myths and Patriarchs. New York: NYU Press. p. 560. ISBN 0-8147-2668-2.CS1 maint: ref=harv (link)\n- Ryken, Leland; Wilhoit, Jim; Longman, Tremper; Duriez, Colin; Penney, Douglas; Reid, Daniel G., eds. (1998). \"Cosmology\". Dictionary of Biblical Imagery. InterVarsity Press. ISBN 9780830867332.\n- Sawyer, John F.A. (1992). \"The Image of God, the Wisdom of Serpents, and the Knowledge of Good and Evil\". In Paul Morris, Deborah Sawyer (ed.). A Walk in the Garden: Biblical, Iconographical and Literary Images of Eden. Sheffield Academic Press Press. ISBN 9780567024473.CS1 maint: ref=harv (link)\n- Schwartz, Howard; Loebel-Fried, Caren; Ginsburg, Elliot K. (2007). Tree of Souls: The Mythology of Judaism. Oxford University Press. p. 704. ISBN 9780195358704.\n- Seidman, Naomi (2010). \"Translation\". In Ronald Hendel (ed.). Reading Genesis: Ten Methods. Cambridge University Press. ISBN 9780521518611.CS1 maint: ref=harv (link)\n- Seeley, Paul H. (1991). \"The Firmament and the Water Above: The Meaning of Raqia in Genesis 1:6–8\" (PDF). Westminster Theological Journal. Westminster Theological Seminary. 53: 227–40.CS1 maint: ref=harv (link)\n- Seeley, Paul H. (1997). \"The Geographical Meaning of 'Earth' and 'Seas' in Genesis 1:10\" (PDF). Westminster Theological Journal. Westminster Theological Seminary. 59: 231–55.CS1 maint: ref=harv (link)\n- Ska, Jean-Louis (2006). Introduction to Reading the Pentateuch. Eisenbrauns. ISBN 9781575061221.CS1 maint: ref=harv (link)\n- Smith, Mark S. (October 2002). The Early History of God: Yahweh and the Other Deities in Ancient Israel (2nd ed.). William B Eerdmans Publishing Co. ISBN 0-8028-3972-X.\n- Smith, Mark S. (November 2001). The Origins of Biblical Monotheism: Israel's Polytheistic Background and the Ugaritic Texts (New ed.). Oxford University Press USA. ISBN 0-19-516768-6.\n- Soskice, Janet M. (2010). \"Creatio ex nihilo: its Jewish and Christian foundations\". In Burrell, David B.; Cogliati, Carlo; Soskice, Janet M.; Stoeger, William R. (eds.). Creation and the God of Abraham. Cambridge University Press. ISBN 9781139490788.CS1 maint: ref=harv (link)\n- Speiser, Ephraim Avigdor (1964). Genesis. Doubleday.CS1 maint: ref=harv (link)\n- Spence, Lewis (2010) . Myths and Legends of Babylonia and Assyria. Cosimo, Inc. p. 72. ISBN 978-1616404642.CS1 maint: ref=harv (link)\n- Stenhouse, John (2000). \"Genesis and Science\". In Gary B. Ferngren (ed.). The History of Science and Religion in the Western Tradition: An Encyclopedia. New York, London: Garland Publishing, Inc. p. 76. ISBN 0-8153-1656-9.CS1 maint: ref=harv (link)\n- Stagg, Evelyn and Frank (1978). \"Genesis and Science\". Woman in the World of Jesus. Philadelphia, Pennsylvania: Westminster Press. p. 135. ISBN 0-664-24195-6.CS1 maint: ref=harv (link)\n- Stordalen, Terje (2000). Echoes of Eden. Peeters. ISBN 9789042908543.CS1 maint: ref=harv (link)\n- Thomas, Matthew A. (2011). These Are the Generations: Identity, Covenant and the Toledot Formula. T&T Clark (Continuum). ISBN 9780567487643.CS1 maint: ref=harv (link)\n- Thompson, J. A. (1980). Jeremiah. New International Commentary on the Old Testament (2nd ed.). Wm. B. Eerdmans Publishing Company. p. 831. ISBN 0-8028-2530-3.\nJ.A Thompson Jeremiah.CS1 maint: ref=harv (link)\n- Tsumura, David Toshio (2005). Creation And Destruction: A Reappraisal of the Chaoskampf Theory in the Old Testament. Eisenbrauns. ISBN 9781575061061.CS1 maint: ref=harv (link)\n- Turner, Laurence A. (2009). Genesis. Sheffield Phoenix Press. ISBN 9781906055653.CS1 maint: ref=harv (link)\n- Van Seters, John (1998). \"The Pentateuch\". In McKenzie, Steven L.; Graham, M. Patrick (eds.). The Hebrew Bible Today: An Introduction to Critical Issues. Westminster John Knox Press. ISBN 9780664256524.CS1 maint: ref=harv (link)\n- Van Seters, John (1992). Prologue to History: The Yahwist As Historian in Genesis. New International Commentary on the Old Testament. Westminster John Knox Press. ISBN 0-664-22179-3.CS1 maint: ref=harv (link)\n- Walsh, Jerome T. (2001). Style and Structure in Biblical Hebrew Narrative. Liturgical Press. ISBN 9780814658970.CS1 maint: ref=harv (link)\n- Waltke, Bruce (1991). \"The Literary Genre of Genesis, Chapter One\" (PDF). Crux. Westminster Theological Seminary. 27:4. Archived from the original (PDF) on 29 April 2014.CS1 maint: ref=harv (link)\n- Walton, John H. (2006). Ancient Near Eastern Thought and the Old Testament: Introducing the Conceptual World of the Hebrew Bible. Baker Academic. ISBN 0-8010-2750-0.CS1 maint: ref=harv (link)\n- Walton, John H. (2003). \"Creation\". In T. Desmond Alexander, David Weston Baker (ed.). Dictionary of the Old Testament: Pentateuch. InterVarsity Press. ISBN 9780830817818.CS1 maint: ref=harv (link)\n- Walton, John H. (2001). Genesis. Zondervan. ISBN 978-0-310-86620-6.CS1 maint: ref=harv (link)\n- Walton, John H.; Matthews, Victor H.; Chavalas, Mark W. (2000). \"Genesis\". The IVP Bible Background Commentary: Old Testament. InterVarsity Press. ISBN 9780830814190.CS1 maint: ref=harv (link)\n- Wenham, Gordon (2003a). Exploring the Old Testament: A Guide to the Pentateuch. Exploring the Bible Series. 1. IVP Academic. p. 223.CS1 maint: ref=harv (link)\n- Wenham, Gordon (2003b). \"Genesis\". In Dunn, James Douglas Grant; Rogerson, J. John William (eds.). Eerdmans Commentary on the Bible. Eerdmans. ISBN 9780802837110.CS1 maint: ref=harv (link)\n- Wenham, Gordon (1987). Genesis 1–15. 1 and 2. Texas: Word Books. ISBN 0-8499-0200-2.CS1 maint: ref=harv (link)\n- Whybray, R.N (2001). \"Genesis\". In John Barton (ed.). Oxford Bible Commentary. Oxford University Press. ISBN 9780198755005.CS1 maint: ref=harv (link)\n- Wood, Ralpth C (1990). \"Genre, Concept of\". In Watson E. Mills (General Editor) (ed.). Mercer Dictionary of the Bible. Mercer University Press. ISBN 9780865543737.CS1 maint: ref=harv (link)\n- Wright, J. Edward (2002). The Early History of Heaven. Oxford University Press. ISBN 9780195348491.CS1 maint: ref=harv (link)\n- Wylen, Stephen M. (2005). \"Chapter 6 Midrash\". The Seventy Faces of Torah: The Jewish way of Reading the Sacred Scriptures. Paulist Press. p. 256. ISBN 0-8091-4179-5.CS1 maint: ref=harv (link)\n|Wikimedia Commons has media related to Creation according to Genesis.|\n- Chapter 1 Chapter 2 (Hebrew-English text, translated according to the JPS 1917 Edition)\n- Chapter 1 Chapter 2 Chapter 3 (Hebrew-English text, with Rashi's commentary. The translation is the authoritative Judaica Press version, edited by Rabbi A.J. Rosenberg.)\n- Chapter 1 Chapter 2 (New American Bible)\n- Chapter 1 Chapter 2 (King James Version)\n- Chapter 1 Chapter 2 (Revised Standard Version)\n- Chapter 1 Chapter 2 (New Living Translation)\n- Chapter 1 Chapter 2 (New American Standard Bible)\n- Chapter 1 Chapter 2 (New International Version (UK))\n- \"Enuma Elish\", at Encyclopedia of the Orient Summary of Enuma Elish with links to full text.\n- ETCSL—Text and translation of the Eridu Genesis (alternate site) (The Electronic Text Corpus of Sumerian Literature, Oxford)\n- \"Epic of Gilgamesh\" (summary)\n- British Museum: Cuneiform tablet from Sippar with the story of Atra-Hasis", "label": "No"} {"text": "Four Strategies Institutions of Higher Learning Can Leverage to Help Returning College Students Succeed\nMetadataShow full item record\nThis chapter reviews four successful strategies for returning college students. These four strategies include (1) making meaningful connections with one or more teachers (Kennamer & Campbell, 2011), (2) involvement in student peer groups (Zinger & Cohen, 2010), (3) counselor or student advisor support (Smith & Allen, 2014), and (4) access to discrete point learning such as technical assistance or help with accessing library resources (Henson, 2014). The authors will explore how these activities promote student success and how institutions of higher education can more fully incorporate these strategies.", "label": "No"} {"text": "The European adhesives and sealants market accounts for 35% of the global adhesives market. Here Peter Crossen, VP of the Maintenance and Partsmaster Innovation platform of global water, energy and maintenance solutions provider NCH Europe, explores the recent developments in super structural adhesives that are paving the way for better joining methods. The global adhesives market is worth over €13.4bn and growing at four per cent per year.\nMuch of this demand is being driven by the changing use of lightweight materials and smarter processes in the manufacturing, construction and automotive sectors.\nIn September 2006, scientists writing in the Journal of Archaeological Science, reported findings from Italy, which showed the earliest use of glue-type adhesives by early humans in the Middle Pleistocene era around 200,000 years ago. They found stone flakes partially covered with birch-bark tar, thought to be the oldest discovered human use of tar-hafted stones.\nAdhesives have come a long way since then. From tree sap used by cavemen in South Africa and animal glues used by Egyptian pharaohs, to plant-based and synthetic glues developed over the last 70 years, adhesive technology has become stronger and more versatile, offering a cheap and quick method of joining a variety of materials including metal, wood and plastics.\nStructural adhesives, also known as acrylic adhesives, have been used for many years in industrial manufacturing, automotive and transport applications. Here, engineers need to consider the type of material or component being bonded, its size and weight, the strength of the bond and cure times.\nMany applications require the joining of dissimilar materials, for which structural adhesives are ideal — whether it is a new roof facia on a building, an engine cover on a mechanical digger or the polycarbonate passenger car in an elevator. Here the surface of the substrate being joined will need to handle a variety of stresses and strains when in use.\nTo appreciate the stresses placed on a bond, it is important to understand that for an adhesive to bond it needs to effectively wet and penetrate the surface being bonded and produce a chemical reaction that causes cross-linking.\nOnce penetrated, the surface forms small solid blocks, which lock into the surface, creating a secure bond. Think of it like the hook and loop principle used on Velcro fasteners.\nThe forces acting on a bond can cause various stresses such as tensile, shear and peel stress. This can weaken the join and ultimately cause it to fail under prolonged loading and in dynamic loads where moving parts can exert forces from all angles.\nThis is why traditional joining methods including welding, riveting and fastening are still often the preferred choice in manufacturing environments for applications where existing adhesives are perceived to not offer the required bond strength. The cheap, relatively reliable and widely available nature of these traditional methods has served manufacturers well for many years.\nHowever, they are not perfect. While welding creates a permanent join, it can only be used to join metals and requires specialist equipment as well as a skilled hand to perform the join.\nOnce joined, further finishing is needed to remove cosmetic blemishes and weld marks. Similarly, riveting and fastening — using screws and bolts — creates holes in the material, which can create weaknesses and structural stress points.\nThe holes created by riveting and fastening also expose the material to ingress from the elements. This can remove the galvanic coating on many metals like steel, leading to corrosion, which then needs further coating or encapsulation to protect. This method can also add significant weight.\nThis is why NCH Europe has formulated Super Structural Technology. This consists of a range of structural acrylic adhesives that use nano particles to increase the bond area and subsequent bond strength.\nA structural adhesive consists of two parts; a base and activator. When the base and activator are mixed together, it creates a compound that the user can spread onto the surface of the material being joined.\nWhile surfaces like glass, stainless steel and glossy plastic appear smooth to the naked eye, in reality the tiny peaks and troughs that make up the substrate of the material at a microscopic level can cause problems for normal structural adhesives. These adhesives simply sit on the surfaces of the peaks, providing limited surface-area contact.\nWhat we've done with our proprietary Super Structural Technology is introduce nano particles into the compound, which fills the gaps in the microscopic substrate, increasing the surface area and strength of the bond.\nIn industry-standard ASTM D1002 tests, NCH Europe's lead Super Structural Technology solution, Mega Cryl SST, has been shown to increase bond strength by over 40% compared to standard structural adhesives.\nWith the increased bond strength achieved through the use of Super Structural Technology, engineers can now start to consider adhesives for applications where they would have previously relied on more traditional joining methods.\nAs manufacturing, construction and automotive environments become more flexible and adaptable; the old methods of joining are fast becoming obsolete. Take the automotive sector, for example. As cars, buses and caravans move to electric-motor propulsion, automotive manufacturers will look to reduce weight by using lightweight exotic plastic materials.\nThese exotic or low energy plastics such as polypropylene (PP) and high density polyethylene (HDPE) have not been served well by existing structural adhesives and, until now, they have been near impossible to bond, forcing manufacturers to use mechanical fasteners. However, these advances in structural adhesive technology mean that design engineers now have the ability to bond these exotic plastic materials.\nNCH Europe has combined the unique Super Structural Technology with the latest low energy plastic adhesive formulations to create Mega Cryl LE, which produces a high-strength bond with these difficult materials. Tests have shown that the bond is so strong that the substrate fails before the bond breaks.\nThe list of materials suitable for use with these next-generation adhesives is a long one: from aluminium, stainless steel, carbon steel and low energy plastics such as PP and HDPE, to brass, copper, glass reinforced plastic (GRP), glass, nylon, ceramic, ABS and more.\nConsidering the flexibility and strength offered by Super Structural adhesives over traditional adhesive and mechanical joining methods, it's easy to see why many people have predicted rapid growth in the adhesives market. Adhesives have certainly come a long way in 200,000 years.", "label": "No"} {"text": "The Problems of the Press\nThe history of broadcasting in Europe since the Second World War has been concerned with the functioning and growth of monopolies more or less controlled by the state or government, more or less independent of them, but in the last resort answerable to the source of political power. The history of the press in the same period, on the other hand, has been that of a slow and relentless move towards concentration with relatively little governmental interference — concentration due to a variety of factors among which are steadily rising production costs and a declining revenue from sales in spite of repeated rises in the price of newspapers and magazines and the general growth in population. The result has been that the press has become increasingly dependent on advertising not merely for its income but for its very existence; it has had to fight ruthlessly to increase circulations in order to increase the volume of advertising and, with it, advertising rates — this in the face of competition for revenue with commercial television, which has gradually spread to most countries as the broadcasting organisations, faced with the same rising costs as the press, have found themselves increasingly unable to make ends meet out of licence revenue alone.\nKeywordsLarge Circulation Total Circulation Advertising Revenue Licence Revenue Voluntary Liquidation\nUnable to display preview. Download preview PDF.", "label": "No"} {"text": "Flex-fuel vehicles are designed to allow vehicles to run on various gasoline-ethanol mixtures, up to 85 percent ethanol (or E85). Although Finance Minister Flaherty plans to spend $2 billion on biofuels over the next seven years, it is unlikely that there will be sufficient ethanol on the market to meet an E85 demand in most areas of Canada. As a result, most flex-fuel vehicles will probably run on something closer to E0 -- that is, gasoline without any ethanol. Given the environmental and social impacts of widespread ethanol production, coupled with the loss of performance experienced by flex-fuel vehicles running on E85, it is unclear why they are called \"green machines\". If anything, they're green smokescreens.\nPublished Globe and Mail 27 March 2007", "label": "No"} {"text": "How to Engage a Group of Diverse Adult Learners in a Way That Also Raises Rigor and Increases Learning\nTypically, we teach the way we were taught unless we can learn new approaches to pedagogy. The literature on adult learning can guide meaningful, practical pedagogy that catalyzes the process of constructing meaning and the improvement of student learning. Moreover, when the quality of learning opportunities improves, underrepresented populations are more likely to benefit. Transformative change (Mezirow, 2000) in individual learning requires new approaches in thinking in how one can engender growth and learning with adults. This suggests that adults desire active versus passive learning that is also practical. Learners construct new knowledge that builds upon their prior understanding and experiences. Learning can be enhanced by what is termed “sociocentric,” rather than egocentric thinking, when learners share ideas, inquire, and solve problems together and address the constant human need for dialogue (Brookfield, 2003; Garmston, 1997). By implementing simple strategies that create conditions and opportunities for adults to construct meaning, it is quite possible for cognition and understanding to improve significantly.", "label": "No"} {"text": "Kyrgyzstan is the most liberal of the five republics of Central Asia, with greater pluralism and more lenient enforcement of religious restrictions, but general repression of religion has increased since the early 1990s. The leaders of Kyrgyzstan consider any activity outside of state control to be a challenge to their legitimacy and authority, and most perceive all forms of Christianity apart from Russian Orthodoxy to be linked to Western goals of destabilizing political power and therefore suspect. Generally, the repression of religion entails bureaucratic strangulation, such as obstacles to church registration, rather than direct persecution.\nScholarly Analysis: Christian Response to Persecution in Kyrgyzstan\nUzbekistan, Kazakhstan, Kyrgyzstan, Tajikistan, and Turkmenistan\nPanel: Findings from Central Asia, with Rt. Rev. Borys Gudziak, Ukrainian Eparchial Bishop in France, Benelux, and Switzerland\nModerator: Kent Hill, World Vision\nSpeakers: Kathleen Collins, University of Minnesota\nKarrie Koesel, University of Notre Dame\nFenggang Yang, Purdue University\nChristians number about 20 percent of the Kyrgyzstan population of 5.7 million, although it is worth noting that the majority of these are Russian Orthodox who confine religious observance to a few Sundays a year. Small groups of Catholics, Lutherans, and what are referred to as “non-traditional” or “new Christians”—Seventh Day Adventists, Korean Baptists, Pentecostals, Jehovah’s Witnesses, and Mormons, among others—are also present, and conservative estimates suggest that these non-Orthodox Christians comprise anywhere from 1 to 5 percent of the population. Converts from traditional Muslims, however, are harder to estimate, and including them would likely put the number of new Christians much higher. Most of the remaining population is Muslim.\nHistory of the Christian Community\nChristianity spread to Central Asia about the same time as Islam, when followers of the Assyrian Christian Church and Nestorians arrived as missionaries in the seventh and eighth centuries. Russian Orthodoxy arrived in the eighteenth and nineteenth centuries with the growth of the Russian Empire. Catholics and Lutherans fleeing the Russian tsar resettled there as well, along with Catholics deported from Poland and Ukraine during World War II.\nChristians in Central Asia have experienced religious repression for most of the past century. For about 70 years, the five republics of Central Asia—Uzbekistan, Turkmenistan, Tajikistan, Kazakhstan, and Kyrgyzstan—were forcibly incorporated into the Soviet Union, where they faced ongoing Communist Party attempts to eradicate religion. These policies included confiscation of church property, state control of education, the execution of clerics, and discrimination against believers at work, school, and in the party. Repression eased somewhat in the 1970s, but it was not until the Soviet collapse in 1991 that Christians experienced a real reprieve in the persecution.\nCurrent Situation of the Christian Community\nKyrgyzstan is the most liberal of the five republics of Central Asia, with greater pluralism and more lenient enforcement of religious restrictions, but general repression of religion has increased since the early 1990s. The leaders of Kyrgyzstan consider any activity outside of state control to be a challenge to their legitimacy and authority, and an atheist mentality still persists in the government, even though it is no longer an official policy. Most perceive all forms of Christianity apart from Russian Orthodoxy to be linked to Western goals of destabilizing political power and therefore suspect. Though it is not regularly enforced, a repressive 2009 law remains on the books that prohibits the participation of minors in religious organizations, bans the distribution of religious literature, and strictly outlaws proselytism. Generally, the repression of religion entails bureaucratic strangulation, such as obstacles to church registration, rather than direct persecution.\nResponses to Persecution\nChristian groups in Kyrgyzstan have responded to persecution in a variety of ways, although none of their efforts have successfully stopped the regime’s increasing repression. In the early 1990s, after the dissolution of the Soviet Union, Kyrgystan—along with the other countries of Central Asia—enjoyed a religious revival. Hundreds of missions organizations arrived to revive the faith, bringing with them a steady stream of religious literature. Since this time, however, evangelism has largely been forced underground.\nSurvival is the first goal for most Christians in the post-Soviet realm, and some churches see the key to survival in legality. Hence, many Christians have circumscribed their typical activity to comply with the state, avoiding politics and appearing to accept a private role. Other churches attempt community engagement, although such activities are generally view suspiciously. The Catholic Church sponsors a summer youth camp at Lake Issyk-kul, where church volunteers (often from the West) care for about 700 predominately Muslim youth every summer, including many mentally and physically disabled children, which has won them the trust of some local authorities. They are careful to avoid any outward appearance of evangelization, however, and remain nervous about their legal status.\nOther churches have also attempted to build relationships with local government officials through community outreach. Until the past few years, more liberal regulations allowed missionary groups to enter Kyrgyzstan as NGOs pursuing development work such as economic assistance, humanitarian aid, and medical care. Evangelical Protestants in particular used this strategy to gain trust, build relationships with local communities, and at the same time spread Christianity. Since the mid-2000s, however, government media has increasingly portrayed such organization as Western agents pushing an anti-Muslim agenda that threatens local sovereignty. A new “foreign agent law,” modelled on Russia’s, is now under consideration in Kyrgyzstan, which may threaten the existence of these NGOs.\nChristians in Kyrgyzstan have also engaged in limited strategies of association, usually sponsored by Western actors. In 2013 and 2014, the US Institute for Global Engagement organized several religious conferences in both Kyrgyzstan and Kazakhstan to foster religious dialogue and contact, and bring religion into civil society. Additionally, the Interfaith Council in Kyrgyzstan, a forum for dialogue begun with the collaboration of a European religious organization and a local Methodist church, includes representatives of all faiths, including the Russian Orthodox and Muslims.\nDespite the repression they face, most churches in Kyrgyzstan are reluctant to turn to international actors for help. In part this is due to fear of retaliation—even though the consequences of such action are considerably less risky than other parts of Central Asia—but it also hindered by a cultural rift between religious communities and civil society groups, which are general very secular. However, at least some local Christian churches have accepted assistance from international actors, and this has generally helped ameliorate their situation, though such instances remain rare.\nThe Russian Orthodox Church is an exception to the oppression faced by other Christian groups in Kyrgyzstan. Viewing Central Asia as the “canonical territory” of the Orthodox Church, it seeks to further monopolize Christianity in the region and drive out competitors. To achieve these goals, the Orthodox Church has established good relations with the regime in power and with the Muslim Spiritual Board, the state body that organizes and controls an Islamic hierarchy in the country. In large part, their strategies have been successful. The government appears to believe that fostering the spread of Orthodox churches is a means of countering Protestants’ growth, which they associate with pro-Western democratic movements. The result of this has been the return and restoration of many pre-Soviet-era Orthodox buildings, as well as anti-Catholic and anti-Protestant rhetoric in the media.\nMany Christians in Kyrgyzstan have also chosen emigration, although motives for these moves are multi-causal. The vast majority of Russian émigrés, although they are nominally Orthodox Christian, have left for reasons other than religious oppression. Rising nationalism and changing language laws in the late 1980s triggered a wave of out-migration of ethnic Europeans (the majority of Christians) even before the Soviet collapse. Since 1989, the number of ethnic Christians in Kyrgyzstan has dropped from 26 percent of the population to 20 percent.\nThis country profile draws on research by Dr. Kathleen Collins and on the report In Response to Persecution by the Under Caesar's Sword project.", "label": "No"} {"text": "By Joy Roberts, Preschool Administrative Assistant\nThis spring the Purple Room Preschool children are learning about building. And last week they invited me to take part in a story and a special building project!\nAs I came into the classroom, everyone was gathering on the rug eagerly anticipating the story of “The Three Little Pigs”. Excitement was in the air as Kirsten, Purple Room Head Teacher, pulled up her chair, opened the book and began to read:\n“Once upon a time an old sow sent her three little pigs out into the world to seek their fortune. “Now be sure to write,” she said. “And remember that I love you.”\nAs they settled in for the story, a couple of Purple Room friends expressed some concern about the wolf and whether or not he should eat the pigs. After a quick discussion the group decided that in our story, the wolf would not eat any pigs. Whew!\nFrom there it was all tension and excitement! There were houses built of straw, sticks and bricks. There was huffing and puffing and houses blown down! The wolf tried to trick the pigs so he could eat them. But in the end, the big bad wolf… well, you probably know the ending!\nAfter the story, we separated into three groups to see which material would build the strongest house. One table of friends worked on constructing a house of straws, another a house of sticks, and a third built a house of wood bricks. Each group carefully planned and collaborated, working together, each coming up with a house that would stand up to all that huffing and puffing!\nWhen the houses were finished, we all walked around the classroom looking at and admiring each group’s house. The children explained to one another what they built and how well it would protect the pigs from the big bad wolf. All of the houses had chimneys, and one even had a “chomper” at the front door to keep the wolf out. Well done!\n“We believe that children’s play is an expression of intelligence and growth, and that young children learn best through hands-on, concrete experiences. Play is the essential work of childhood and an important part of developing cognitive, social-emotional, and problem-solving skills.” – BFS Preschool Curriculum Overview, 2020-21\nThe Purple Room building project is a wonderful example of young children learning through Play. The imaginary world of the Three Little Pigs and that problematic big bad wolf provided an engaging scenario where the children could immerse themselves in creative problem-solving while having a really good time! As they examined each others’ houses, they had lots of insightful observations as well as praise for their peers’ work and strategies for keeping out the wolf.\nWorking together and collaborating on a fun project is an important part of learning to navigate relationships. Children learn to respect one another as they listen and consider other opinions and strategies. Observing how others choose to solve the same problem sparks the imagination, adding depth and enrichment to this beautiful and organic learning process!", "label": "No"} {"text": "- The effects of inclusion on students with and without special educational needs reviewed\n- Educational Research Review\n- Volume | Issue number\n- 4 | 2\n- Pages (from-to)\n- Document type\n- Faculty of Social and Behavioural Sciences (FMG)\n- Research Institute of Child Development and Education (RICDE)\nThe Kohnstamm Instituut\nIn many countries, education policies are shifting towards inclusive education. Human rights have always been an important argument for this development, but the effects on students should be an important factor when designing policies. In this review, therefore, literature on the effects of inclusion on both students with and without special educational needs is described. The review covers not only effects on cognitive development, but also socio-emotional effects. In general, the results show neutral to positive effects of inclusive education. The academic achievement of students with and without special educational needs seems to be comparable to non-inclusive classes or even better in inclusive classes. However, there may be some differential effects for high- and low-achieving students without special educational needs. Regarding social effects, children with special educational needs seem to have a less favourable social position than children without special educational needs.\n- go to publisher's site\nIf you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library, or send a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible.", "label": "No"} {"text": "The New Birds of Kazakhstan\nThe New Birds of Kazakhstan by Arend Wassink. Published by Arend Wassink, Postweg 64, 1795 De Cocksdorp, Texel, The Netherlands. Pp382. 2015. Sample priceseg WildSounds £42.99 (Post free UK mainland: www.wildsounds.com), direct from publisher €49.50 (Including P&P: www.birdsofkazakhstan.com).\nA personal review\nMore and more of Kazakhstan is becoming accessible to tourists and visitors. It stretches from the northern Caspian Sea 2925km east to the fabled Altai Mountains some 25km from Mongolia (separated here by a short but mountainous border between Russia and China), and from 55.4°N in the boreal forest, or taiga, south to 45.47°N just below the Kyzylkum Desert, through which flows the Syrdarya (Shardara) River north and west to the remnants of Aral Sea, passing near the Baikonur Cosmodrome as it does.\nKazakhstan is vast, its 2.7 million km² comprising six terrestrial biomes:\n- Boreal forest in the far north and around the high mountain ranges of the Altai.\n- Eurasian steppe in a band from the northwest to the southeast.\n- Eurasian desert and semidesert from the Caspian lowlands east across southern regions.\n- Eurasian high montane, comprising the Tien Shan east through Zhungarskiy Alatau and northeast through the Saur Mountains to the Altai.\n- Irano-Turanian montane flora: the Karatau Mountains and the cliff-faces of the Ustyurt Plateau This biome does not appear on the species account maps.\n- Sino-Himalayan forest of the Tien Shan.\nThere are some 15 distinct habitats within and shared across these biomes, which when considered with the assorted river systems and wetlands, provide conditions attractive to a wide variety of breeding, migrant and wintering birds. Before you even look at this book, I urge you to put some of these names into Google Maps, when you can begin to appreciate the scale of and fascination with this amazing land.\nThe book is a successor to the similarly-titled 2007 volume by Arend Wassink and Gerard Oreel which was the first bird book on Kazakhstan widely available to western birdwatchers and ornithologists, and in particular to monoglot English speakers. Like that book, the new tome benefits firstly from the photo-editing talent of René Pop – its additional 100+ pages allow the inclusion of more photos of superb quality – and secondly from masterly copy-editing by Gerard Oreel. The habitat and landscape images in the 26 pages of Introductory Material are in the ‘you could almost be there’ category, but what brings it all to life is the way the explanatory text flows to convey ideas and information with passion and style.\nUp to 10 September 2015, 499 species had been recorded in Kazakhstan: these records all have been assessed by applying current standards of acceptance, an approach not without its detractors. Many older previously accepted records could not be validated because, for example, known specimens had been lost or disposed of during times of political and economic upheaval, or original documentation had likewise been lost or destroyed.\nThe succinct species accounts in the book follow a standard pattern of headings, not all of which are applicable to each account:\n- Status. Where a species’ status is given as Vagrant, the only other heading is ‘Records’.\n- Breeding distribution.\n- Non-breeding distribution.\nThis layout enables quick access to any species’ relevant data.\nEach species (save Slender-billed Curlew Numenius tenuirostris) has its own occurrence map whose background fill comprises the five largest biomes. The method of illustrating species areas of occurrence is simple and effective, though arrived at by eclectic means: green represents residency, red breeding, blue wintering and black migrating. Where lines denote areas, arrows on the lines point towards the distribution. The symbols for specific records, occurrence throughout the country and the possibility of breeding, wintering or migrating use the same set or a subset of these colours. A vast amount of information is thus apparent pictorially.\nThis book is not simply an update of the previous book. Many (all?) earlier accounts have been reviewed and revised. Much more data has been obtained or made available concerning the contents of the previous book, as can be seen from the 29 two-column pages of references in font size 8. Since the first book, the amount of in-country bird survey work, bird recording and simple birding has produced a plethora of data. A perusal of the Acknowledgements section reveals that a wealth of scientific information from many museum collections, from molecular analyses, and from national and regional record-keepers and databases has been absorbed and assessed, and that recent data from knowledgeable authors, photographers, bird tour leaders, independent birders (all from many countries), and especially from Kazakh nationals, has been incorporated.\nIt’s quite obvious that a Handbook could have been produced, but quite sensibly, the most pertinent aspects have been distilled into this book instead. Now from my own, perhaps narrow point of view as the person who compiles the reference lists for the OSME Region List of bird taxa, this book has been invaluable, because a number of the references it cites I had either overlooked or had not been aware of, and these I have been able to obtain either from the WWW or from that marvellous resource, ResearchGate (www.researchgate.net/home). So, The New Birds of Kazakhstan has not only informed the ORL directly as I updated it from all the book’s species accounts, but also indirectly via me playing detective, because the additional references I downloaded led to other pertinent references und so weiter.\nHowever, the sheer pleasure that comes from reading about the 17 new species for Kazakhstan since the first book, from my enhanced ability to picture in my mind where any species may occur in that country, from hugely improving my geographical knowledge of the country, especially the iconic mountain ranges of Central Asia, from my improved acquaintanceship with the kaleidoscopic tapestry of habitats and from the sheer quality of the product (the paper, the covers, the care in the design), has made constructing this review an exercise in what to omit to keep it to a readable length.\nTo whet your appetite, here is a selected and very incomplete list of some of the iconic or more interesting non-vagrant species recorded in Kazakhstan:\n- Himalayan Snowcock Tetraogallus himalayensis, ssp saurensis, scarce resident Saur Mountains, ssp sewerzowi, common resident Tien Shan and Zhungarskiy Alatau.\n- Altai Snowcock T. altaicus very rare resident Southern Altai.\n- Himalayan Vulture Gyps himalayensis very rare resident Zhungarskiy, Zialiskiy and Terskey Alatau.\n- Steppe Eagle Aquila nipalensis common breeding migrant throughout central Kazakhstan from west to east.\n- Golden Eagle Aquila chrysaetos ssp chrysaetos rare resident northeast Kazakhstan, but potentially the far more interesting ssp is canadensis, apparently a rare resident in the southern third of the country. Now IOC6.1 confines this taxon to the New World, but lists homeyeri for Uzbekistan, which adjoins southwest and south Kazakhstan. There are precedents for ‘New World’ taxa being in the eastern Palearctic, eg at least one subspecies each of Barn Swallow Hirundo rustica, American Herring Gull Larus smithsonianus and Northern Grey Shrike Lanius borealis, and given that recent research (Nebel et al 2015) suggests Golden Eagle may be two or more species, (because only one North American sample was analysed, no taxonomic recommendations have been made), if A.c. canadensis is confirmed as being in Kazakhstan, that might be an incipient tick!\n- Shikra Accipter badius ssp cenchroides scarce breeding migrant southern third of Kazakhstan (Shikra taxonomy is complex and closely related to other Accipiter species in places)\n- Upland Buzzard Buteo hemilasius very rare resident or breeding migrant mountains of eastern Kazakhstan.\n- Ibisbill Ibidorhyncus struthersii rare resident foothills and mountains of southeasternmost Kazakhstan.\n- Sociable Lapwing Vanellus gregarius rare breeding migrant overgrazed steppes and semideserts central-northern Kazakhstan.\n- Swinhoe’s Snipe Gallinago megala scarce breeding migrant valleys of the Altai.\n- Relict Gull Ichthyaetus relictus very rare irregular breeding migrant saline steppe lakes lowlands easternmost Kazakhstan, up to 1200bp.\n- Pallas’s Sandgrouse Syrrhaptes paradoxus scarce breeding migrant deserts and semideserts south-central Kazakhstan.\n- Oriental Cuckoo Cuculus optatus, rare breeding migrant coniferous & mixed forests, open woodlands mainly Western Altai.\n- Pacific Swift Apus pacificus ssp pacificus (post-split, only two sspp) very rare breeding migrant forests with cliffs Altai Valleys.\n- Long-tailed Shrike Lanius schach ssp erythronotus common breeding migrant bushy areas in semidesert and steppes southern and southeastern Kazakhstan.\n- Indian Golden Oriole Oriolus kundoo common breeding migrant open deciduous woodlands south and southeastern Kazakhstan.\n- Pander’s Ground Jay Podoces panderi ssp panderi very rare resident deserts with saxaul bushes Kyzylkum Desert, ssp ilensis very rare resident sand deserts & dunes below Lake Balkash.\n- Rufous-naped Tit Periparus rufonuchalis rare resident coniferous 7 juniper forests Western Tien Shan.\n- White-winged Lark Alauda leucoptera common resident & breeding migrant grassy or Artemisia steppes throughout.\n- Pale Martin Riparia diluta ssp diluta abundant breeding migrant steep banks lowlands southeast Kazakhstan, ssp gavrilovi common breeding migrant Altai and Manrak Mountains.\n- White-browed Tit-Warbler Leptopoecile sophiae ssp sophiae rare resident from Tien Shan to Zhungarskiy Alatau 2150-3000m asl.\n- Pallas’s Grasshopper Warbler Locustella certhiola abundant breeding migrant wet areas scattered with bushes Western and Southern Altai.\n- White-tailed Rubythroat Calliope pectoralis ssp bailloni common breeding migrant Tien Shan to Zhungarskiy Alatau 2500-3300m asl.\n- Blue-capped Redstart Phoenicurus coeruleocephala common breeding migrant open & dry coniferous & mixed forests Tien Shan to Saur Mountains 1400-2700m asl\n- Red-mantled Rosefinch Carpodacus rhodochlamys common resident Tien Shan to Saur Mountains 1500-2900m asl.\n- Pallas’s Reed Bunting Emberiza pallasi ssp polaris common breeding migrant Alpine tundras, marshes Southern Altai 2100-2600m asl.\nFor rosefinch aficionados, there are 10 species to track down, but whether or not you want to see a large proportion of the Kazakhstan species list in-country, you’ll have to make numerous visits. The maps in this book should be the basis of your strategy, for many areas are difficult and time-consuming to reach and explore, many locations still having poor roads and tracks – it will take a long time to do justice in achieving your target list in even a small part of the country. An additional problem you may have is that a sizeable proportion of the species occur mainly on migration, and so timing your visit is essential.\nThis book isn’t a field guide. It’s for people who need information, who like data to be up to date and it is of considerable value to those who make conservation decisions or need to supply evidence-based recommendations to conservation issues. …and yet, any self-respecting birder who doesn’t sacrifice baggage allowance to take it to Kazakhstan should be held at the point of entry and politely returned to the flight departure country to obtain a copy before being allowed to return. You see, this book concisely explains where you may find your target species, and reading between the lines, the text lets you assess the odds of finding them…\nNow, those of you who know or might have encountered me, may be puzzled that I haven’t held forth on bird taxonomy as is my wont. The answer is simple. Arend Wassink clearly and simply states that he follows the IOC taxonomy at the time of writing and lists the few exceptions. Where taxonomic differences exist between this book and the OSME Region List, they are easy to compare; Arend has identified the taxa and it’s not a problem that some of these might be regarded as species or subspecies where his view is the reverse. He has provided an audit trail so that any changes in future can easily be linked to past decisions, something that is spectacularly absent from some recent publications.\nThe short version of all the above is that if you interested in Kazakhstan’s birds do get this book and if you’re a human being who possesses a smidgen of empathy, you will enjoy it enormously.\nMike Blair 2 March 2016\nNebel, C, A Gamauf, E Haring, G Segelbacher, A Villers and FE Zachos. 2015. Mitochondrial DNA analysis reveals Holarctic homogeneity and a distinct Mediterranean lineage in the Golden Eagle (Aquila chrysaetos). Biol. J. Linn. Soc. June 2015: 1-13.", "label": "No"} {"text": "Description: Add a new open ring to the geometry.\nInline mode usage:\n- openRing -h: Display a help message.\n- openRing -n name -p centerX centerY centerZ minorRadius majorRadius openingAngle openingDirection: Creates a new open ring.\nInteractive mode usage:\nThe following steps will be needed in order to create a new open ring:\n- Select center [x y z]: Center point of the ring.\n- Minor radius [double]: Inner radius.\n- Major radius [double]: Outer radius.\n- Opening angle [degrees]: Angle, in degrees, that determines how large is the opening.\n- Opening direction [degrees]: Angle, in degrees, that determines the direction the opening is facing in. An angle of zero degrees means that the opening is facing in the direction of the positive Y axis, and larger angles are interpreted as counter-clockwise rotations.\nRemark: The opening angle MUST be between 0 and 360.", "label": "No"} {"text": "We investigate the environmental and economic benefits derived from the adoption of corporate sustainability practices.\nMatthew Khan and Ryan Vaughn\nToday, consumers have the opportunity to purchase a wide variety of environmentally friendly products that include; “green” foods, furniture, vehicles, buildings and electric power. The Toyota Prius stands out as one of the leading examples of this new trend. If consumers purchase such products, then this would encourage for profit firms to develop more of them. At a point in time, who buys these “green” products? More patient people will value the future energy savings from more efficient appliances. People are more likely to seek out “greener” durables when the price of energy inputs is high. Environmentalists are also more likely to purchase such products. This project uses GIS mapping technology and new data sets at the zip code level to provide new facts concerning the geographical distribution of who purchases green products. This project is joint research with Ryan Vaughn. Ryan is a graduate student in UCLA’s Economics Department.Kahn, Matthew E. and Vaughn, Ryan K., Green Market Geography: The Spatial Clustering of Hybrid Vehicle and LEED Registered Buildings.\nJuly 08 2008", "label": "No"} {"text": "What makes a competent engineer?\nIn The Engineer of 2020, the National Academy of Engineering called on engineering societies to help prepare the “engineer of the future” — one who could adapt to rapid changes in technology as well as the social, economic, and cultural forces that would affect engineering.\nIn response to the NAE’s call, NSPE created the Engineering Body of Knowledge, the first concerted effort to provide a common ground to developing the knowledge, skills, and attitudes necessary to practice as a professional engineer across engineering disciplines.\nThe Engineering Body of Knowledge, in turn, paved the way for a new guide for developing the engineering workforce. The Engineering Competency Model, developed by the American Association of Engineering Societies and the Department of Labor’s Employment and Training Administration, provides employers and engineers with guidance on the core competencies and skills necessary to enter the engineering profession.\nNSPE’s EBOK and the Importance of Competency Models (PPTX)\nSubmitted by: Paul Schmidt, P.E., F.NSPE\nIntroduction to the Engineering Body of Knowledge: Check out NSPE's new resource for teaching freshman engineering students about the knowledge, skills, and attitudes necessary for success in the engineering profession. Download here.\nEBOK Exercise Illuminates Profession for Students: Read about how some professors are using the EBOK exercise, and what students are finding surprising. (November/December 2015 PE)\nThe Engineering Body of Knowledge (First Edition, 2013)\nE-book: What Makes a PE? The Attributes and Capabilities of Professional Engineers\nCover Story: What Makes a PE? (January/February 2014 PE)\nThe Engineering Body of Knowledge (Blog Post, November 19, 2013)\nWhat Engineers Need to Know and When They Need to Know It (January/February 2013 PE)", "label": "No"} {"text": "Beryllium copper combines between 0.5-3% of beryllium with a copper alloy. Sometimes it can also be referred too as spring copper or copper beryllium. Beryllium copper is not magnetic and does not spark at all. It is extremely strong too. Not all beryllium copper is the same because sometimes other alloys can be added. Alloy 25 is amongst the strongest base alloys available. Alloy 25 is considered tempered beryllium copper\nThere are several factors that can be attributed to this high strength. One of the main reasons is that the alloy is age hardened. This hardening process is possible after the alloy is formed into intricate shapes and complex forms. Once hardened, it maintains amazing spring properties, while also remaining resistant to corrosion. Enhanced stability, low creep, and better conductivity are possible as well. The only time that more heat is applied to an alloy that has been cold drawn is to relieve minimal amounts of stress. Even though this alloy is extremely strong, it is still ductile enough to be shaped.\nMost beryllium copper alloys that are made to be high strength will have roughly 2.6% of cast beryllium or 2% wrought cobalt. Either age hardening or precipitation hardening makes the alloys. For injection molding industries, they will mostly use cast beryllium.\nYou will find these heavy-duty alloys being used in many different fields. This includes: oil refineries, aerospace gear, and robotic welding. The three above industries have to deal with electricity, and so the alloys neutralize issues of sparking and magnetism. You will find these alloys on down-hole drilling tools.\nThe alloy comes in different shapes, including: strip, rod, wire, tube, or sheet.\nWork with the Experts in Specialty Alloy and Profile Cabling – Flat Wire, Square Wire, Brass Wire, Beryllium Copper Wire, Phosphor Bronze Wire and More from a Supplier You Can Trust\nBeryllium Copper, also referred to as alloy 25, is a copper alloy that is comprised of 0.5% beryllium and other alloying metals.", "label": "No"} {"text": "One of the most famously used software or app called google translate can translate thousands of different languages, it also contains a feature to detect the language which is written and translate it to the intended language. Automation and software evolution has led to the increase reliability of the individuals over these technologies compared to humans.\nSimilarly, a large number of analysts believe that in future google translate could replace the manual or human translation industry around the globe. There are several reasons why this technology cannot replace actual human translation capabilities some of them are discussed below.\nThe first and most significant limitation of google translate is that it works on a set of rules without understanding. Rules may define a certain task can be accomplished but it does not brew understanding. Human languages are filled with rules and many circumstances where these rules become irrelevant and no longer apply, in such cases google translate fails to incorporate the correct translation and ends up doing a literal translation that is far inferior in quality as compared to a human or manually translated document. Google translation is a very good tool to understand the basic sense of what is being communicated but for official translations, transcripts and other translations it fails to achieve the similar results.\nHuman translators are able to discern the expression that an individual is trying to communicate in his piece of writing that is usually absent from machine based translation, due to this phenomenon the machine-based translations failed to incorporate the true intention of the piece of writing and end up going after the literal interpretation of the words that are placed in the software.\nHuman beings are very expressive and have a high level of intellect that enables them to play with words, expressions and meaning of certain sentences. The meaning of a sentence changes with the situation and intention of the speaker, which the google translate fails to incorporate and understand but a human speaker has a clear idea of the situation can discern the intended emotion that the writer wants to communicate very easily and effectively.\nDistributed by NetJumps International\nCompany Name: Textronics\nContact Person: Susanne Pacher\nPhone: (416) 422-5010", "label": "No"} {"text": "Jack Pine Bonsai\nOne Of The Most Accomodating Bonsai Species\nJack Pine Bonsai is the miniature of the Jack pine tree found mainly in Canada and the north eastern regions of United States. Jack pine usually can grow to heights of 72 feet, and grow in rocky or sandy soil.\nIn general pine is referred to as being one of the most bonsai friendly trees. Jack pine responds well to the bonsai techniques. With their impressive appearance and majestic gait the Jack Pine are wonderful plants which would go a long way in adding value to your collection of bonsai plants.\nPine trees with their downward sloping branches and over 100 different species to choose from make a formidable contender for the art of bonsai.\nJack Pine Bonsai is one of the most accommodating varieties of bonsai trees as they are quite hardy and are not very difficult to maintain and grow. This makes Jack Pine the perfect for beginners in the Bonsai world.\nThe fact that Jack pine grows in sandy soil in arid and windy conditions proves the fact that they are quite weather hardy hence you would be saved of a lot of effort in taking care of bonsai. It is more preferable to keep this plant dry rather than wet.\nA general pattern to the bonsai growth is that the new buds generally grow on to become candles which then grow on to become shoots covered with sharp needle like growth.\nPruning Jack Pine\nPruning activities should generally be carried out during the dormancy seasons. In addition to leave pruning you also need to remove the needles of the previous years.\nJack Pine needs to be root pruned in synch with of branch pruning so as to ensure a balanced growth. Generally roots should be cut to 2/3rd of their length. Ensure that you remove all the worn out and dilapidated roots along with very few new roots. Excessive root pruning would be very detrimental to the bonsai growth and would lead to a slugging plant.\nJack pine does not need as frequent watering as the other varieties of the bonsai plants. Since they naturally grow in arid and sandy conditions, they are used to dearth of water supply. Hence Jack Pine requires far less watering cycles as compared to other bonsai plants.\nHope you have fun with Jack Pine Bonsai.\nReturn from Jack Pine Bonsai to Bonsai Hub home", "label": "No"} {"text": "When a report of child abuse or neglect is made, an initial assessment is made to determine if Child Protective Services should become involved. If the report meets the criteria for agency involvement, the case is investigated by a social worker or special investigator. Law enforcement may also investigate if a joint investigation is warranted. If it is determined that a child is unsafe, then a recommendation is made by Child Protective Services or law enforcement to the court regarding what action should be taken regarding the child's safety.\nThe court is ultimately responsible for the decision to remove a child from the home. Removal may require placing the child in foster care or in the care of a relative. When making a recommendation to remove a child, Child Protective Services must weigh the emotional harm to the child of being removed from the home with the likelihood of harm that could occur if the child remains in the home. Information for parents is available Child Protective Services Brochure\nServices may be provided in non-abuse or neglect situations in cases where a child appears to be without proper parental care and control, in cases of truancy and in the cases of runaways. Assessments often result in families being referred to services such as family preservation, foster care or other services available in the community.", "label": "No"} {"text": "Before leaders in technology education are able to identify a theoretical framework upon which a curriculum is to stand, they must first grapple with two opposing views of the purpose of technology education – education for all learners or career/technical education. Dakers (2006) identifies two opposing philosophies that can serve as a framework for technology education, both inspired by ancient Greece, with the works of Descartes and the birth of positivism. Later reappearing in Pascal’s writings of the mathematical mind, and finally with Rousseau in the mid 1700s, the theoretical arguments of academic verses vocational were established in education, and thus concluded that the overall purpose of education was to make a man (human being) or a citizen. This dichotomy of views is referenced here to make explicit the underpinnings of a theoretical framework for technology education. The position that the authors take in this dichotomy of views is one that embraces the best of both views by teaching technology education to all students to foster technological literacy while at the same time addressing the needs of a workforce seeking to compete in a global economy. This rationale will be presented throughout the article.\nTheoretical Perspectives of Technology Education\nEarly in the 1990s, in the midst of the name change from industrial arts to technology education, the Journal of Technology Education (JTE) published a special theme issue dedicated to examining the state of technology education from different theoretical perspectives ( Herschbach, 1992 ). Herschbach (1992) explains that although curriculum development is not an exact science, there are five basic curriculum patterns generally recognized by curriculum theorists. He identified the five patterns as academic rationalist (separate subjects), technical/ utilitarian (competencies), intellectual processes, personal relevance, and social reconstruction.\nThe special 1992 issue of JTE featured five authors from the field of technology education (Erekson, Herschbach, Johnson, Petrina, and Zuga) with each author discussing one of the five theoretical frameworks as they relate to technology education. Today, with the field of technology education on the verge of a new shift in focus, it is appropriate to consider a new theoretical perspective for technology education based upon the needs of today’s learners and upon new knowledge of teaching and learning obtained through recent research.\nThe Archway of Meaningful Learning: A Proposed Theoretical Framework\nThe graphic in Figure 1 illustrates an archway to meaningful learning in technology education. The archway begins with a constructivist approach to learning through a pragmatist or experimental over-arching philosophy as the theoretical foundation upon which all the other learning theories and approaches to learning rest upon. Contextual learning/problem-based instruction and project-based instruction create columns of support for engineering design and systems thinking to provide meaningful learning through a real-world context. Both engineering design and systems thinking become the “drivers” of the learning experience. Systems thinking is above project-based instruction because systems thinking is required for solving open-ended and ill-structured problems that society faces today and such problems are prevalent in engineering design projects. At the top of this archway of meaningful learning is student learning, forming the keystone of the arch, at the heart of why we need to teach from a constructivist approach. Student learning is supported by all other “building blocks.” Throughout the rest of this article, the authors will present their rationale for why technology education should adopt this theoretical framework and describe the benefits of adopting this approach to technology education.\nFigure 1. The Archway to Meaningful Learning in Technology Education.\nPragmatism or Experimentalism\nThe conceptual underpinning of the proposed philosophy of technology education is founded on the ideas supported by the works of Woodward (1894) , Dewey (1916), and Warner, Gray, Gekbracht, Gilbert, Lisack, Kleintjes, et al. (1947), each of whom proposed that technology education is for all learners. That is, they believed that technology education should equip the learner with necessary knowledge, skills, and abilities in the context of technology, and to live, function, and work in today’s technological society. Furthermore, the authors embrace a pragmatist view, also known as experimentalism, which has been promoted through the progressive and reconstruction movement of the late 19th and early 20th centuries. Pragmatism supports the notion that knowledge is gained through problem solving, it places great emphasis on critical thinking and reasoning, and it seeks to solve the world’s problems with an open mind ( Scott & Sarkees-Wircenski, 2001). Moreover, the authors support technology education with an engineering design focus as a vehicle for fostering technological literacy while simultaneously developing the skills needed to work in a global economy. A review of some of the recent commissioned reports on preparing a workforce ready to compete in a global economy uncovers lists of necessary job skills that are also technological literacy skills ( Committee on Prospering in the Global Economy of the 21st Century, 2007; National Center on Education and the Economy, 2006). Developing technological literacy goes far beyond providing vocational skills and making students “technologically savvy”; it is focused on understanding how technology has changed our world and how we live in it. Michael (2006, p. 56) adds that technology education should prepare young people to cope in a rapidly changing technological world; enable them to think and intervene creatively to improve that world; develop skills required to participate responsibly in home, school and community life (citizenship); help them become discriminating consumers and users of products; help them become autonomous, creative problem-solvers; …encourage the ability to consider critically the use, effect, and value dimensions of design and technology (technological awareness or literacy).\nIt is our belief that technology education, with a focus on engineering design, is as beneficial for students who want to become attorneys, physicians, accountants, business managers, clergy, and writers as it is for future engineers. One very important component of each of these occupations is that people working within them function in an environment comprised of ill-structured problems. Educators agree that problem-solving skills are critical for a successful person in today’s world; however, it is important to note that ill-structured problem-solving helps to better prepare students to cope with real-world problems (Jonassen, 1997). Well-structured problems are constrained and usually have one correct answer, while ill-structured problems are not constrained and have multiple possible solution trajectories and final solutions (Jonassen, 1997). Whether a student selects the field of law, business, or medicine to study, they will encounter many ill-structured problems that are domain or context dependent (Bransford, 1994). Engineers have developed an excellent systematic approach to ill-structured problems known as the engineering design process. Engineers have an excellent record of taking a complex and often chaotic problem and using the engineering design process to consider multiple perspectives, and oftentimes break the problem down into manageable sub-problems that can be solved with a set of possible solutions. The skill of managing chaotic and ill-structured problems is useful to all occupations.\nA Constructivist Approach to Engineering Design and Systems Thinking\nDewey captured the general philosophy of a constructivist view of learning when he made the statement:\nWe are given to associating creative mind with persons regarded as rare and unique, like geniuses. But every individual is in his own way unique. Each one experiences life from a different angle than anybody else, and consequently has something distinctive to give others if he can turn his experiences into ideas and pass them on to others (1930, p. 3).\nJacobson and Wilensky (2006) suggest that young learners can handle complex systems thinking even at the middle school level. They suggest using a constructivist approach to learning, a philosophy of learning based upon foundational works of Dewey (1930), Piaget (1985), and Vygotsky (1998). Jacobson and Wilensky wrote: “A central tenet of the constructivist or constructionist learning approach is that a learner is actively constructing new understandings, rather than passively receiving and absorbing ‘facts’” (p.22). They believe that this method of learning can increase students’ understanding of complex systems as well as be more interesting, engaging, and motivating for students when assigned authentic problems studied within cooperative learning environments. Blikstein and Wilensky (2004) have conducted research in this area of systems thinking with results suggesting pedagogical approaches that involve students generating questions, hypotheses, and theories about a particular phenomenon. Students then develop experiments or create conceptual models using multi-agent or qualitative modeling software to confirm or refute their theories. Jacobson and Wilensky (2006) recommended a constructivist approach to teaching systems thinking within a team or group-learning environment.\nWankat (2002) and Becker (2002) agree that a constructivist approach is critical to improving the teaching of engineering and technology education. Reflecting on the work in How People Learn (Bransford, Brown, & Cocking, 2000), Wankat believes that the student, not the teacher, must be in the “driver seat” of learning. Bransford et al. described four critical perspectives of learning environments:\n1. Learner centered – “Teachers must pay close attention to the knowledge, skills, and attitudes that learners bring into the classroom” (p. 23).\n2. Knowledge centered – “Attention must be given to what is taught (information, subject matter), why it is taught (understanding), and what competence or mastery looks like” (p. 24).\n3. Assessment centered – “Formative assessments – ongoing assessments designed to make students’ thinking visible to both teachers and students are essential” (p. 24).\n4. Community centered – “A community-centered approach requires the development of norms for the classroom and school, as well as connections to the outside world, that support core learning values” (p. 25).\nBecker (2002) explained that a constructivist approach is inherent in the Standards for Technological Literacy, and that a shift from behaviorism to constructivism is critical to educate and assess today’s students so that they are prepared for today’s global economy. Wankat warned against the content tyrant, a phenomenon that takes place when the teacher lets the need to cover certain content control the teaching and learning that takes place in the classroom, something that has plagued engineering education for years ( National Academy of Engineering, 2004 ).\nCrawford (2001) suggested that there are five key strategies to actively engaging students in a constructivist approach to teaching. These five strategies are:\n- Relating — learning in the context of one’s life experiences or preexisting knowledge\n- Experiencing — learning by doing, or through exploration, discovery, and invention\n- Applying — learning by putting the concepts to use\n- Cooperating – learning in the context of sharing, responding, and communicating with others\n- Transferring – using knowledge in a new context or novel situation, one that has not been covered in class.\nNotice that the constructivist teaching strategies suggested by Crawford, Wankat, Becker, and Bransford et al. emphasize the critical importance of context for effective teaching and learning. Contextual learning as described by Borko and Putnam (2000) is situated, distributed, and authentic. They suggest that all learning should take place, or be situated, in a specific physical and social context to acquire knowledge that is intimately associated with those settings. Borko and Putnam also advocate that for transfer of learning to occur, students must be provided with multiple similar experiences allowing an abstract mental model to form. Hanson, Burton, and Guam (2006) proposed contextual learning as a key strength for technology and engineering education programs, allowing for transfer of knowledge from core subjects. Additionally, they suggested that contextual learning is a key concept in helping technology education align with No Child Left Behind and providing learning opportunities for students to become prepared to work in a global economy. The context of learning is also essential in designing a solution to an ill-structured problem. Glegg (1972) suggested that the context in which a solution will be applied is not only an important design consideration but also critical to learning design. Teaching engineering design must be done within a context that is authentic. Newmann and Wehlage (1993) suggested that authentic activities have the following dimensions:\n- Involve higher order thinking where students manipulate information and ideas\n- Require a depth of knowledge so students apply what they know and are connected to the world in such a way that they take on personal meaning\n- Require substantial communication among students\n- Support achievement of all through communication and high expectations of everyone contributing to the success of the group.\nHutchinson (2002) suggested that problem-based learning is an additional field of inquiry worthy of consideration. Problem-based learning presents students with a problem situation and then they are asked to determine what is happening. “Problem solving, in this approach, involves a process of a) engagement; b) inquiry and investigation; c) performance; and d) debriefing” ( Hutchinson, 2002, p. 4). Pierce and Jones (2000) suggested that the worlds of contextual learning theory and problem-based instruction can converge to produce highly conceptualized learning focused on questions and problems relating to real-world issues. Problem-based instruction is self-directed and collaborative. Authenticity of problem-based instruction is accomplished by encouraging dialogue with practicing experts and the manipulation of real data. Hutchinson also suggested formative assessments and performance of students before a panel of experts. These methods have been used successfully in engineering to develop critical thinking skills in students ( Woods, Felder, Rugarcia, & Stice, 2000).\nEngineering Design and Systems Thinking: The Ideal Context for Problem and Project Based Instruction\nWicklein (2006) and Daugherty (2005) endorsed engineering design as an ideal platform for addressing the standards for technological literacy ( ITEA 2000/2002 ), while also creating an instructional model that attracts and motivates students from all academic levels. Today’s workforce requires job skills that move beyond excelling in the basic core subjects (Grasso & Martinelli, 2007). A national employer survey identified desired job skills needed in today’s workforce. Today’s jobs “…require a portfolio of skills in addition to academic and technical skills. These include communication skills, analytical skills, problem-solving and creative thinking, interpersonal skills, the ability to negotiate and influence, and self-management ( The National Center on the Educational Quality of the Workforce, 1995, p. 3). Dearing and Daugherty (2004) conducted a study to identify the core engineering-related concepts that also support a standards-based technology education curriculum by surveying 123 professionals in technology education, technology teacher education, and engineering education. The top five ranked concepts were:\n1. Interpersonal skills: teamwork, group skills, attitude, and work ethic\n2. Ability to communicate ideas: verbally, physically, and visually\n3. Ability to work within constraints/ parameters\n4. Experience in brainstorming and generating ideas\n5. Product design assessment: Does a design perform its intended function? (p. 9).\nThe researchers surmised that these concepts, based upon the standards for technological literacy, were ranked high due to the nature of the work environment in today’s society and the need for a growing diverse workforce. Hill (2006) recanted Richard Miller’s words at a University of Georgia engineering conference about the need for engineers who have excellent communication skills, ability to work in teams, skills in social interactions, and good business ethics. Hill suggested that technology education is an ideal program to team up with engineering education to help young people develop these attributes. Roman (2004) considered the needs of an American workforce struggling to survive in a global economy. He wrote: “Thinking globally requires individuals who can think multi-dimensionally, integrating the technical and economic aspects of problem solving with the social, political, environmental, and safety concerns” (p. 22).\nThe Engineer of 2020 indicated that the engineer of the future will need to work in teams to study social issues central to engineering (National Academy of Engineering, 2004). McAlister (2003) observed that four of the twenty Technological Literacy Standards address technology and society, so teaching the social/cultural impacts of design is appropriate. We suggest using a systems thinking approach to engineering design to study technology-related social problems because this platform is an excellent way to foster technological literacy and promote the attitudes, thinking skills, and job skills listed above. However, this approach should not be applied to social engineering ( Weinberg, 2003).\nWhat is Systems Thinking and Why is it Important for Technology Education?\nWhat is systems thinking? Jacobson and Wilensky (2006) wrote:\nComplex systems approaches, in conjunction with rapid advances in computational technologies, enable researchers to study aspects of the real world for which events and actions have multiple causes and consequences, and where order and structure coexist at many different scales of time, space, and organization (Jacobson & Wilensky , p. 12.).\nKay and Foster added: “In short, systems thinking is about synthesizing together all the relevant information we have about an object so that we have a sense of it as a whole” ( Kay & Foster, 1999 , p. 2). Mapping out the complex issues of a system by reducing the system down to its parts and studying the relationships within those various parts is a process that leads to a better understanding of the system. Furthermore, tensions may be identified that will likely emerge when a new approach to the system is taken. Failing to understand that these tensions exist and that the system contains these complex relationships, will likely result in a poor, inappropriate design. It is critical to understand that these relationships impact the entire system and the manipulation of one relationship, in turn, affects the entire system. Biologist Lewis Thomas wrote:\nWhen you are confronted by any complex social system, such as an urban center or a hamster, with things about it that you’re dissatisfied with and anxious to fix, you cannot just step in and set about fixing with the hope of helping. This realization is one of the sore discouragements of our century…You cannot meddle with one part of a complex system from the outside without almost certain risk of setting off disastrous events that you hadn’t counted on in other, remote parts. If you want to fix something you are first obliged to understand…the whole system (Thomas, 1974, p. 90).\nBar-Yam (2002) confirmed this dogma by making the case that the ability of science and technology to expand human performance through design is dependant upon the understanding of systems and not just the components that lie within that system.\nThe insights of complex systems research and its methodologies may become pervasive in guiding what we build, how we build it, and how we use and live with it. Possibly the most visible outcome of these developments will be an improved ability of human beings aided by technology to address complex global social and environmental problems, third world development, poverty in developing countries, war and natural disasters ( Bar-Yam, 2002 , pp.381-382).\nFrank (2005) makes a strong case for a systems approach for technology education. He pointed out that, traditionally, engineering and technology education used a bottom-up instructional approach, one that attempts to determine and deliver all the knowledge and skills needed by compartmentalizing the subjects: a separate math course, a physics course, statistics, etc. Frank proposed a different approach.\nBased on the systems thinking approach, what follows is a proposal for a way to teach technology and instill technological literacy without first teaching the details (for instance, electricity basics and linear circuits for electronics, or calculus and dynamics basics for mechanical engineering) (p. 20).\nThe premise to this approach is that complete systems can be studied conceptually and functionally without needing to know the details, a top-down approach. A top-down approach focuses on characteristics and functionality of the entire system and the interrelating subsystems. This approach to teaching engineering design addresses issues raised by some that suggest teaching engineering design in technology education excludes some students who have not had, or lack, an aptitude for upper level math or science. A top-down approach also provides a feasible solution to high school courses with students enrolled at various stages of learning, for example, freshmen and seniors in the same class. These issues are of great concern when suggesting that technology education with an engineering design focus is for all learners.\nFrank also shares the benefits of project-based learning for technology education that include student engagement, increased motivation, and increased multidisciplinary knowledge, to name a few. Shepherd (1998) found through research that students who experienced project-based learning in a real world setting had significantly higher scores on the Cornell Critical Thinking Test compared to students in traditional instruction. Project-based learning requires students to work in teams to build a product. A misnomer in technology education is that the product created must be tangible, but Frank brings clarity to this issue. He writes:\nThe product may be something tangible (such as a model/prototype, a system or a robot), a computerized product (such as software, a presentation, or a multimedia product), or a written product (such as a report, an evaluation summary or a summary of experimental findings (p.21).\nA common concern in moving technology education toward engineering design is what will happen to the traditional hands-on projects that produce a physical product? We believe that the best answer to that question is to identify and understand appropriate engineering related problems to be explored in technology education. Some problems will lend themselves to tangible products while others will not. Technology educators will need to accept the idea that not every problem solving activity will or should require a physical prototype or artifact.\nWhy Systems Thinking and Engineering Design for Technology Education?\nIf technology education is to be successful in implementing a new program with an engineering design focus, it must be able to articulate the idea that learning engineering design can generate a type of thinking that can be applied to many occupations. With the application of engineering design and systems thinking, students learn how to use critical thinking skills to solve complex, ill-structured problems that are necessary to live and function in the 21st century, regardless of whether the student plans to work in a factory, on a farm, or in a courtroom. No matter what occupation students select, they will encounter many ill-structured problems, none of which can be solved with a single textbook answer. Engineering design and systems thinking provides a systematic approach to solving ill-structured problems which is a vital, universal skill that can transcend all vocations.\nIn an educational field such as technology education that has been accused of poorly communicating a clear mission ( Wicklein, 2006); it appears appropriate to consider a new theoretical foundation for the field. Moreover, as new demands arise for educational programs that will equip the next generation of workers who are trained to survive and thrive in a global economy, a new philosophical framework for technology education may be needed. In this article, the authors have attempted to provide a philosophical framework for technology education that holds true to some pedagogical approaches that are at the heart of the success of technology education (contextual learning, problem-based instruction, and project-based instruction), while at the same time embracing new philosophies of learning and thinking (constructivism, engineering design, and systems thinking). The current literature is clear about the type of workers needed for today’s global economy (Pink, 2005; Friedman, 2005; National Academy of Engineering, 2004; National Academy of Engineering, 2005 ; Woods et al., 2000). If technology educators determine that their purpose is to help prepare students to live and work in this global society, then these educators should consider carefully defining a philosophical framework upon which to build a new curriculum. The authors wish for technology educators to consider the proposed framework as a foundation for technology education as it has much promise in preparing students to function in today’s technological society.\nBar-Yam, Y. (2002). Unifying principles in complex systems. In M. C. Roco & W. S. Bainbridge (Eds.), Converging Technologies for Improving Human Performance: Nanotechnology, Biotechnology, Information Technology and Cognitive Science (NBIC) (pp. 380-409). Boston: Kluwer Academic Publishers.\nBecker, K. (2002) Constructivism and the use of technology. The Technology Teacher, 61(7), 1-8.\nBlikstein, P. & Wilensky, U. (2004). MaterialSim: An agent-based simulation toolkit for material science learning. Paper presented at the International Conference on Engineering Education, Gainesville, FL.\nBorko, H. & Putnam, RR. T. (2000). The role of context in teacher learning and teacher education, In Contextual teaching and learning: Preparing teachers to enhance student success in the workplace and beyond (pp. 34 67). Columbus, OH: ERIC Clearinghouse on Adult, Career and Vocational Education.\nBransford, J., Brown, A., & Cocking, R. (2000). How people learn: Brain, mind, experience, and school. Washington, DC: National Academies Press.\nBransford, J. (1994). Who ya gonna call? Thoughts about teaching problem solving. In P. Hallinger, K. Lithwood, & J. Murphy (Eds.), Cognitive perspectives on educational leadership. New York: Teachers College Press.\nCommittee on Prospering in the Global Economy of the 21st Century (2007). Rising above the gathering storm: Energizing and employing America for a brighter economic future. Washington, DC: National Academies Press.\nCrawford, Michael L. (2001). Teaching contextually: Research, rationale, and techniques for improving student motivation and achievement in mathematics and science. Waco, TX: CCI Publishing, Inc.\nDakers, J. (2006) Towards a philosophy for technology education. In J. Dakers (Ed.) Defining technological literacy: Toward an epistemological framework (pp. 146-158). New York: Palgrave Macmillan.\nDaugherty, M. (2005). A changing role for technology teacher education. Journal of Industrial Teacher Education, 42(1), 41-58.\nDearing, B. M. & Daugherty, M. K. (2004). Delivering engineering content in technology education. The Technology Teacher, 64(3), 8-11.\nDewey, J. (1930). Construction and criticism. New York: Columbia University Press.\nDewey, J. (1916). Democracy and education. New York: Free Press.\nErekson, T. (1992). Technology education from the academic rationalist theoretical perspective. Journal of Technology Education, 3(2), 6-14.\nFrank, M. (2005). A systems approach for developing technological literacy. Journal of Technology Education, 17(1), 19-34.\nFriedman, T. (2005). The world is flat. New York: Farrar, Straus and Giroux.\nGlegg, G. L. (1972). The selection of design. Cambridge: University Press.\nGrasso, D. & Martinelli, D. (2007). Holistic engineering. Chronicle of Higher Education, 53(28), 8-9.\nHanson, D., Burton, D., & Guam, G. (2006). Six Concepts to help you align with NCLB. The Technology Teacher, 65(1), 17-20.\nHerschbach, D.R. (1992). Curriculum change in technology education: Differing theoretical perspectives. Journal of Technology Education, 3(2), 4-5.\nHill, R.B. (2006). New perspectives: Technology teacher education and engineering design. Journal of Industrial Teacher Education, 43(3), 45-63.\nHutchinson, P. (2002). Children designing and engineering: Contextual learning units in primary design and technology. The Journal of Industrial Teacher, 39(3), 122-145.\nInternational Technology Education Association (2000/2002). Standards for technological literacy: Content standards for the study of technology. Reston, Virginia: Author.\nJacobson, M. J. & Wilensky, U. (2006). Complex systems in education: Scientific and educational importance and implications for the learning sciences. Journal of the Learning Sciences, 15(1), 11-34.\nJohnson, S. D. (1992). A framework for technology education curricula which emphasizes intellectual processes. Journal of Technology Education, 3(2), 26-36.\nJonassen, D. H. (1997). Instructional design models for well-structured and ill-structured problem-solving learning outcomes. Educational Technology Research and Development, 45(1), 65-94.\nKay, J. J. & Foster, J. (1999) About teaching systems thinking. In G. Savage & P. Roe (Eds.) Proceedings of the HKK Conference (pp. 165-172), 14-16. June, University of Waterloo, Ontario.\nMcAlister, B. (2003). Teaching social/cultural impacts in technology education. In K. R. Helgeson & A. E. Schwaller (Eds.), Selecting instructional strategies for technology education (pp. 87-100). 52nd Yearbook of the Council on Technology Teacher Education. New York: Glencoe.\nMichael, M. (2006). How to understand mundane technology. In J. Dakers (Ed.), Defining technological literacy: Toward an epistemological framework, (pp. 48-63). New York: Palgrave Macmillan.\nNational Academy of Engineering (2004). The engineer of 2020: Visions of engineering in the new century. Washington, DC: The National Academies Press.\nNational Academy of Engineering (2005). Educating the engineer of 2020: Adapting engineering education to the new century. Washington, DC: The National Academies Press.\nNational Center on Education and the Economy. (2006). Tough choices or tough times: The report on the new commission on the skills of the American workforce. Hoboken, NJ: Jossey-Bass.\nNewmann, F. M., & Wehlage, G. G. (1993). Five standards of authentic instruction. Educational Leadership, 50(7), 8-12.\nPetrina, S. (1992). Curriculum change in technology education: A theoretical perspective on personal relevance curriculum designs. Journal of Technology Education, 3(2), 37-47.\nPiaget, J. (1985) The Equilibrium of Cognitive Structure. Chicago: Chicago University Press.\nPierce, J. W., & Jones, B. F. (2000). Problem-based learning: Learning and teaching in the context of problems. In Contextual teaching and learning: Preparing teachers to enhance student success in the workplace and beyond (pp. 69-95). Columbus, OH: ERIC Clearinghouse on Adult, Career and Vocational Education.\nPink, D. (2005). A whole new mind: Moving from the information age to the conceptual age. New York: Penguin. Roman, H. T. (2004). Blame it on the engineers. The Technology Teacher, 63(6), 21-23.\nScott, J. L. & Sarkees-Wircenski, M. (2001) Overview of career and technical education. Homewood, IL: American Technical Publishers.\nShepherd, N. G. (1998). The Probe Method: A problem-based learning model's affect on critical thinking skills of fourth and fifth grade social studies students (Ed.D. dissertation, North Carolina State University, 1998). Dissertation Abstracts International, 1998, 59, 779A.\nThe National Center on the Educational Quality of the Workforce (1995). First findings from the EQW National Employer Survey, RE01, p. 3.\nThomas, L. (1974). The lives of a cell: Notes of a biology watcher. New York: Viking Press.\nVygotsky, L.S. (1998). R.W. Rieber (ED.), Child psychology: The collected works of L.S. Vygotsky (Vol. 5). New York: Plenum.\nWankat, P. C. (2002). Improving engineering and technology education by applying what is known about how people learn. Journal of SMET Education, 3(1&2), 3-8.\nWarner, W. E., Gray, J. E., Gekbracht, C. J., Gilbert, H. G., Lisack, J. P., Kleintjes, P. J., & Phillips, K. (1947). A curriculum to reflect technology. AIAA Feature Presentation, April 25, 1947. Columbus, OH: Epison Pi Tau.\nWeinberg, A. M. (2003). Can technology replace social engineering? In A. H. Teich (Ed.), Technology and the future. (9th e.d.). Belmont, CA: Wadworth/Thompson Learning.\nWicklein, R. C. (2006). Five good reasons for engineering design as the focus for technology education. The Technology Teacher, 65(7), 25-29.\nWoods, D. R., Felder, R. M., Rugarcia, A., & Stice, J. E. (2000). The future of engineering education III: Developing critical skills. Chemical Engineering Education, 34(2), 108-117.\nWoodward, C. (1894). New demands upon schools by the world’s industries. Proceedings of the International Congress of Education of the World’s Columbian Exposition. New York: National Education Association.\nZuga, K. F. (1992). Social reconstruction curriculum and technology education. Journal of Technology Education, 3(2), 48-58.\nTodd Kelley (email@example.com) is a faculty member in the Department of Industrial Technology at Purdue University , West Lafayette, Indiana and Nadia Kellam ( firstname.lastname@example.org) is a faculty member in the Department of Agricultural and Biological Engineering at the University of Georgia , Athens.", "label": "No"} {"text": "Idioms are used frequently in everyday life by native English speakers, which makes them really useful for English language students who want to sound natural and confident. Idioms are often confusing when translated literally, so make sure you learn the meaning as well as the phrase. Here are some common English idioms which will help you sound like a native.\nIt's a piece of cake – it’s really easy.\n“Don’t worry about the speaking exam, it’s a piece of cake.”\nOnce in a blue moon – very rarely.\n“Once in a blue moon, I’ll exercise instead of watching TV.”\nSnowed under – to be really busy.\n“I can’t make it tonight, I’m snowed under at work.”\nTo see eye to eye – to understand each other.\n“I’ll ask David to talk to Will, they really see eye to eye.”\nCome rain or shine – no matter what.\n“Come rain or shine, I’ll be there!”\nThrough thick and thin – under all circumstances, no matter how difficult.\n“My best friend has supported me through thick and thin.”\nGive someone the cold shoulder – to ignore someone.\n“I think Nilufar is angry at me, she is giving me the cold shoulder.”\nFit as a fiddle – to be perfectly healthy.\n“Don’t worry about Grandpa, he’s as fit as a fiddle.”\nTo sit on the fence - he is undecided.\n“Stop sitting on the fence and decide what you want to do!”\nOn cloud nine – to be ecstatic with happiness!\n“Ava is on cloud nine, Silvia just proposed to her!”\nDo you understand so far? Here are some slightly more tricky English idioms!\nBarking up the wrong tree – to be looking in the wrong place.\n“You’re barking up the wrong tree, I can’t help you.”\nBreak the ice – to make a situation feel more comfortable.\n“Before we begin, let’s break the ice by introducing ourselves and each telling our favourite joke!”\nCosts an arm and a leg – to be extremely expensive.\n“I want to go on holiday but it would cost an arm and a leg.”\nHit the nail on the head – to get something exactly right.\n“You’ve hit the nail on the head there – he is a bit strange.”\nThe best thing since sliced bread – something amazing!\n“I want you to know that I think you’re the best thing since sliced bread.”\nGo down in flames – to fail badly at something.\n“The performance went down in flames after the lead actor forgot his lines.”\nHave your head in the clouds – to not concentrate on something.\n“What are you thinking about? You’ve got your head in the clouds.”\nAdd insult to injury – to make a bad situation worse.\n“His husband left him for another man and to add insult to injury, he took their dog with him.”\nWeather the storm – to get through something difficult.\n“Exam season is always hard but if you can weather the storm, it will all be worth it.”\nThat ship has sailed – that opportunity has gone.\n“I asked for my old job back but they said that ship had sailed.”\nIf you’ve made it this far, you’re definitely ready for some really difficult English idioms!\nThe elephant in the room – a big issue which is being ignored.\n“Let’s address the elephant in the room – Sadie has been fired and will not return to work.”\nIt is always darkest before the dawn – things are bad now but they will get better soon.\n“I know times are hard at the moment but it’s always darkest before the dawn.”\nLike riding a bicycle – something that you never forget how to do.\n“I haven’t been climbing for years but I’m sure I’ll be fine – it’s like riding a bike.”\nYou can't judge a book by its cover – you shouldn’t make a judgement based on appearances.\n“You can’t judge a book by its cover - he may look boring but he’s actually really fun!”\nThere are plenty more fish in the sea – (consoling your friend when their relationship has ended) there are lots of potential partners in the world.\n“I know you loved Kedsaraporn but there are plenty more fish in the sea!”\nA perfect storm – a particularly bad situation due to a combination of circumstances.\n“I was hungover, my alarm didn’t go off and the train was delayed – it was a perfect storm of bad luck.”\nA storm in a teacup – a very big deal made out of a small problem.\n“The argument is nothing to worry about, it’s just a storm in a teacup.”\nIt takes two to tango – both people must have been responsible for something.\n“They argue a lot but it can’t always be Aaron’s fault – it takes two to tango.”\nJump on the bandwagon – to do something because everybody else is doing it.\n“Raheem Sterling is a great player! Anyone saying otherwise is just jumping on the bandwagon.”\nAnd finally, here’s one to celebrate the Wimbledon Tennis Championships…\nThe ball is in your court – it’s your decision.\n“I don’t mind where we go for dinner – the ball is in your court.”\nIf you can learn all of these English idioms, you’ll sound like a native English speaker in no time! What’s your favourite English idiom?", "label": "No"} {"text": "So I am totally copying and pasting this entire article from another site. I really like it and want to remember it and so this is the easiest way to find it. Who's blog am I more obsessed about that my own? Exactly.\n- Venn Diagrams. In addition to using them on paper, you can make big ones on the floor with hula hoops and have kids use labeled index cards or Post Its to fill in the variables.\n- Analogies are great because you can use different criteria and then talk about which criteria was used. For example the analogy: Mountain: Hill : : River : Stream is defined by size while: December : Christmas : : February : Valentine's Day is defined by time. Here is a free Analogy Worksheet.\n- Similes and Metaphors Like Analogies, students can identify what the criteria is for the comparison. Similes may be easier for younger students because the words \"like\" and \"as\" pretty much tell you what the criteria is, while you often have to work a little harder with a metaphor.\n- Would You Rather Questions present a forced choice between two more or less equal options, which can lead to some terrific discussions. Read more about using Would You Rather Questions with your students here.\n- Class Polls, Bar Graphs, and Glyphs Good way compare and contrast student's experiences, opinions, traits etc.\n- Foldables can be used in so many ways for comparing and contrasting! Here are instructions on how to make some of the most common foldables.\n- Rating and Ranking There are so many ways to use this. Students can use numbers to rank brainstormed ideas. They can use a rating scale to evaluate their own work, peer presentations, the usefulness of a particular lesson etc.\n- Comparisons over Time Everyone loves to see improvement. Having students complete a variety of tasks at the start of the year and then doing the same ones at the end is a wonderful way to compare then and now. Do this on a smaller scale with a pretest and post test for any unit of study.\n- T Charts Simple, basic, effective and applicable to so many things. You can put a variable on each side of the chart (eg \"Conductor\" and \"Insulator\") or you could put the words \"Same\" and \"Different\" on each side and put a the things to be compared at the top (eg: \"Mammals\" and \"Reptiles\").\n- Written Essay No one should leave school without being able to write a solid, well-organized compare and contrast essay, complete with examples from life or literature. They will need these skills for the essay portion of the SAT.\nDo you have a tool that has been particularly valuable? Please share!", "label": "No"} {"text": "Find results with:\nWould you know a historically significant site if you saw one? In many cases, you may not. Such oversights can be prevented with a simple marker. In Michigan, the state’s historical commission has been involved with a marker program since 1955.\nIn the Beginning…\nIn 1941, the Michigan legislature authorized the Michigan Historical Commission to begin an historical marking program. This program was abandoned when the United States entered World War II. Finally, in 1953, Willis F. Dunbar led an investigation of Michigan historic sites (Dunbar was a professor at Western Michigan College – now Western Michigan University – and a Michigan Historical Commission member.). Backed by Dunbar’s research, the Commission again asked the legislature for authority to mark historic sites.\nThe marking program officially began in 1955. Fifty-five years ago this month – on October 22, to be precise – the very first Michigan historical marker was dedicated. It was placed at Michigan State University, during that institution’s centennial year.\nFrom then until the present, over 1,600 state historical markers would be erected. Some trends can be noted. In her book Traveling Through Time: A Guide to Michigan’s Historical Markers, Laura Rose Ashlee states that the historians since 1955 have placed more emphasis on “common people” and local history. Thus, she notes that there are now markers recognizing important women, minorities and “lesser known pioneers,” as well as markers recognizing more prominent citizens. Ashlee also explains that the marking program initially focused on pre-twentieth century events but that more recent markers sometimes commemorate events from World War II or even later.\nToday, Michigan has one of the country’s largest privately-funded historical marker programs (Marker applicants pay for the markers’ creations.). The Michigan Historical Commission, the Michigan History Foundation, the Eastern Michigan University Historic Preservation Program and the State Historic Preservation Office all play roles in the marker process.\nThe process begins when someone submits an application to the Michigan History Foundation. If the application pertains to a site not listed on the Michigan State Register of Historic Sites, then the State Historic Preservation Office (SHPO) evaluates it. Once an application has been accepted, graduate students in the Eastern Michigan University Historic Preservation Program work with applicants to prepare marker text. The Commission ultimately approves the text and the placement of the marker.\nFor more information on the marker application process, click How to Apply for a Michigan Historical Marker\nSources consulted for this article:\n- Books and Articles:\n“Michigan’s Historic Marking Program” by George S. May. Michigan History , vol. 40 (1956), pp. 447-450.\nTraveling Through Time: A Guide to Michigan’s Historical Markers by Laura Rose Ashlee\n- Web sites:\nThanks to Andrew MacFarlane of absolutemichigan.com", "label": "No"} {"text": "Recent fieldwork and theoretical reinterpretations have somewhat blurred the distinction between the earlier stage of human development and the stage characterized by domestication of animals and cultivation of grain, but it remains the case that anyone looking backward from the present sees the following picture: A very long period, perhaps 100,000 years or more, during which Homo Sapiens merely reproduces itself, as does any other species, changing little or not at all genetically, so far as the fossil record indicates, followed by a rather brief period of historical time -- time, that is to say, for which we have some sort of record of human doings -- during which ever more rapid, social, intellectual, technological, and political change takes place, bringing us by dint of an explosion of material changes in the past two centuries to our present situation.\nHow did human beings live prior to the Neolithic Revolution? Since that long period of human existence seems lost forever in the mists of time, anthropologists have been forced to carry out a series of extremely elaborate inferences and extrapolations in an attempt to reconstruct some story of early human existence. They have had three bodies of evidence to go on. First of all, homo sapiens is a natural animal species evolving from earlier animal species, as have many of the animal species that are still found on the earth, living and reproducing, presumably, as their species have for many millions of years. So one observes lions, eland, chimpanzees, vervet monkeys, and stoats and tries to extrapolate. Studies of the feeding practices of mammals, coupled with post-mortem examinations of their bones, allows us to make reliable inferences and generalizations concerning the kinds of teeth and jaws that are characteristic of carnivores. herbivores, and omnivores. [I am aware that all of this is virtually baby talk to the sorts of sophisticated readers who might migrate to this blog, but I want you to think about how much observation, experiment, inference, and theoretical reconstruction is required to draw the simple conclusion that early homo sapiens ate a mixed diet of meat and plant foods.]\nThe second body of evidence is the fossilized remains of human bones, analysis of which makes it possible to form tentative conclusions about life expectancy, and even the stresses and strains of getting food. [Just as the discovery a few years ago of a slave graveyard in New York City allowed forensic anthropologists to draw conclusions from the deformations of the bones concerning the extraordinarily stressful work the slaves were forced to engage in.]\nThe third body of evidence is fossilized remains of tools and of firepits and cave sites, together with animal bones that have been [so far as we can tell] deliberately burned or broken, which tells us something about their diet. All of this permits us to conclude that human beings prior to the Neolithic Revolution had a reasonably sophisticated toolkit, consisting of sharp flakes struck from stones, carved ivory, and other fossilizable implements [leading one to wonder what other tools they had that were not susceptible to becoming fossils.]\n[Brief autobiographical aside: During a trip led by a South African anthropologist to a site in the Northern Transvaal called Makapansgat, which was continuously occupied for twenty thousand years until the nineteenth century, I saw a microlith -- a tiny arrow head -- half projecting from an excavated cave wall. I plucked it out and put it in my pocket. This was about six kinds of illegal acts, and I hope the statute of limitations has run on at least some of them.]\nAlthough it may not have occurred to you before in quite this way, this story poses two very difficult questions: First, and most obviously, what explains the rapid change of the past ten millennia, and most particularly of the past two centuries? And Second, equally puzzlingly though not so obviously, what explains the total absence of change in the period ten or fifteen times as long before that?\nNeither of these is a problem for the Christian, Judaic, and Islamic traditions prior to the nineteenth centuries, for whom the creation account in the Old Testament is dispositive [as the lawyers like to say.] Nor were they problems for the Graeco-Roman authors of the classical tradition. But both are very much problems for ethnographers and anthropologists, once all the hard slogging work of digging, interpreting, and so forth has reconstructed the time line I have described. [Note, by the way, that archeological work on New World remains, and the slow appropriation, by European historians, of the Chinese historical traditions, although both complicate the picture somewhat, do not at all change the basic shape of the time line. The Neolithic Revolution stands, pretty much unchallenged, as the point at which unchanging reproduction, millennium after millennium, stops, and what we call historical development begins.]\nThere are, of course, a great many hypotheses to answer this pair of questions, but the most influential in modern methodological ethnographic circles is that of Marx - namely, that the locus of historical change is the class structure of a society. Taking over Hegel's notion of historical periodization [a notion that also played an important role in Tylor's classic work on the stages of religious development], Marx early in his life [in Part One of The German Ideology] put forward the thesis that the story of human history is essentially the story of progressively more advanced division of labor, with the consequent class struggles between those who control, and those who do not control, the means of production. This is, no doubt, a very powerful explanatory hypothesis, with whose use historians can organize a great deal of historical data and work out explanations of a wide variety of important historical events -- the decline and fall of the Roman Empire, the development of medieval feudalism, the English Civil War, the French Revolution, the American Revolution, the American Civil War, and so on.\nBut to an ethnographer interested in the pre-history of the human species, Marx's hypothesis must be construed as implying the claim that human groups -- tribes, bands, clans, or whatever one wished to call them -- exhibited no internal division of labor, nor any class structure based upon differential ownership of the means of production!\nTransparently, Marx's story poses a new question: If division of labor, and the consequent class structure, is the engine of history, and if pre-historic humans therefore exhibited no division of labor or class structure, then what caused division of labor, class structure, and history to start, at the time of the Neolithic Revolution? One possible answer is that with the domestication of animals and the cultivation of grain, a significant productive surplus came into existence, and this provoked disputes over the control of the surplus that became transformed into class divisions.\nHow did human beings survive and reproduce prior to the Neolithic Revolution? The question asks not only by what techniques, or in what physical manner, did humans survive -- what did they eat and drink, what tools, if any, they used, etc. -- but also how we shall conceptualize their condition. What theoretical account shall we give of it?\nOnce again, enter Marx. And once again, the most important texts are early. In the same portion of The German ideology, Marx argues that it is collective, purposeful transformation of nature, or \"production,\" that distinguishes the human species from other animals. Animal species live and reproduce in more or less successful adaptive relation to their environment. As the environment changes -- water becomes more or less available, food sources vary, climate changes -- the species adapts in ways that become encoded in its genetic make-up.\nWhen human history gets going, social structure substitutes for species adaptation as the mediating element between humans and nature. Men and women still spend their time reproducing their conditions of existence, but now one must appeal to the social fact of differential ownership of the means of production to explain how, and how well, they do this. The social comes to interpose itself between the psychological and the natural as a third, autonomous category of existence.\nIn the absence of a social structure internal to the human group that mediates the process of production and reproduction, pre-historic human beings can only be thought of as living in a symbiotic relationship with their environment -- not productively transforming it, but living off it. Small bands of humans, we are asked to believe, hunt wild animals and gather such foods as grow naturally. They are, in short, Hunter-Gatherers.\nAll of this is in the nature of a theoretical reconstruction, buttressed by archeological\nevidence derived from the excavation of campsites, burial grounds, caves, and such like.\nImagine, if you can, the extraordinary excitement that anthropologists experience, when they hear that there are still groups of human beings living TODAY in this same prehistoric fashion! Primitive hunter-gatherers still living out the age-old patterns, far away in remote comers of the world so removed from modern settlements, trade routes, and even voyages of exploration that somehow they have been left behind by history! In the Outback of Australia, in the farthest reaches of the Kalahari, in the depths of the Amazon rain forest, the reports come back of the last remnants of extremely primitive peoples who neither domesticate animals nor farm, but live by ranging over their environment like herds of mammals, hunting and gathering.", "label": "No"} {"text": "Real Statistics Data Analysis Tool: The Real Statistics Resource Pack supplies the Statistical Power and Sample Size data analysis tool to determine the power which results from a statistical test for a specified effect size, sample size and alpha, as well as the sample size required to achieve a specified effect size, power and alpha.\nTo use this tool, press Ctrl-m and select Statistical Power and Sample Size from the resulting menu. The dialog box in Figure 1 will then appear.\nYou can now select one of the specified twelve tests and either the Power or Sample Size options. E.g. if you choose the two-sample t test and the Power options, you will be presented with the dialog box shown on the left side of Figure 2.\nFigure 2 – Power: two-sample t test dialog box\nNext fill in the Input fields, as shown on the right side of Figure 2 (retaining the default values of the # Tails, Alpha and Sum Count fields). After pressing the OK button you will see the results shown in Output area in the dialog box on the right side of the figure.\nWe see that the power of this test is 48.2% (we explain the other output fields elsewhere). To increase the power of the test for the given effect size, you would normally need to change from a two-tailed to a one-tailed test, increase the sample size(s), increase the alpha value or make some combination of these.\nFor this example if you change the # Tails to 2, you would increase Power to 60.8%. If you keep to a two-tailed test, you would need to increase alpha to .28 to obtain power of at least 80%, which is usually not very acceptable. Alternatively you could increase the sample sizes. E.g. to achieve a power of 80% you would need to increase the sample sizes to 176.\nThis can be determined by using the Sample Size option shown in Figure 1. You can do this by first pressing the Cancel button (on the dialog box in Figure 2) or the x in the upper right-hand corner of the dialog box. When the dialog box shown in Figure 1 reappears select the Sample Size option.\nThe dialog box shown on the left side of Figure 3 now appears. You need to insert .3 for the Effect Size and press the OK button. The result is shown on the right side of Figure 3, confirming that samples sizes of 176 are required. Note that the actual power achieved is a little more than 80%.\nFigure 3 – Sample size: two-sample t test dialog box\nNote that the Sample size ratio is set to 1, which means that the ratio n2/n1 = 1 (where n1 = size of sample 1 and n2 = size of sample 2), i.e. the samples are equal. If we wanted the size of the second sample to be twice that of the first sample we would set Sample size ratio to 2.\nWe could also specify that sample 2 has a specific size, say 100, by using a negative value for Sample size ratio, -100 in this case. Note that if we fix n2, then to achieve power of 80% for the above example, we would need a larger sample 1. In particular, we would need sample 1 to have size 695.", "label": "No"} {"text": "Earthquakes are not as predictable as we’d like them to be, so when it comes to being prepared, there’s a limited amount one can do. Nevertheless, it’s better to be as prepared as you can for natural disasters which can be inconvenient at best, and deadly at their worst.\nOne concern after an earthquake is having enough food and potable water – a problem that has to do with a disruption in transportation and related logistics. “It’s not that there isn’t any food, it’s getting food to the damaged area and getting enough there for all the people,” says Karen McHale , an expert in emergency response and the author of Economic Meltdown: A Family Preparedness Plan for Disaster. “There were people after Katrina that did not have food or water for almost a week before they were rescued or could get to a shelter. In northern Japan, there are now no roads, lots of toxic water (full of debris, gas, oil and salt) and the only way in is by boat or helicopter.”\nAnother common problem during earthquakes and similar disasters is lack of communication. Responders don’t know where people are, and are usually engaged in making a road to get into an area, or traveling by boat. This is due to massive amounts of debris blocking their path on the ground. So depending upon the extent of the damage near your home or blocking road access to your area, you could be waiting for help for many days.\nMcHale advises that in preparation for an earthquake, storing food and water is a good idea. This is especially important if you live in an earthquake-prone area, like the West Coast of the U.S. “If you store at a minimum a month of canned food, a manual can opener, and one gallon of water per person per day (30 gallons per person for a month), and you could get to this food after damage to your home , you could then get by until help arrived or survive at a basic level for a month or more,” says McHale. “Cans of meat, fish, fruits and vegetables would be the easiest to store and eat cold. Canned food tends to survive structural and water damage .”\nAdditionally, if you store a camp stove that runs on propane or fuel, you can store bags of rice and beans as well as MREs (ready to eat meals) and enjoy warm beverages, like coffee and tea.\nYou may not know when an earthquake will strike or exactly how severe it will be, but you can think ahead to what you’d need for survival in the event of extensive damage. Keep an accessible stash of food and water – particularly if you live along a fault line – and know you’re doing everything you possibly can.", "label": "No"} {"text": "Fire protection regulation comparison and study between Taiwan and Mainland China\n|關鍵字:||海峽兩岸;消防;法規比較;between Taiwan and Mainland China;Fire protection;regulation comparison|\nThe trading and culture interchange between the Taiwan Straits has been going for over ten years, but not very much in publications related to comparison, research, and study of fire protection standards and technology. Although there are many similarities in culture and thinking of technology, and economic development model between Taiwan and Mainland China, the root of the regulations, system structure, and background are quite different. Therefore, this thesis is to compare and study the differences in the development of regulations, spirit of legislation, and punishment between Taiwan and Mainland China, and to find out their advantages and disadvantages for used as a reference in future law modifications. The methods used by this research include:(1)Collection and analysis of related publications and writings. (2) Interview of people working in the field of fire protection of Taiwan and Mainland China. (3) Analysis of major disasters in recent years, including the disaster statistics from the National Fire Agency and the Insurance Association, and (4) Personal fire protection working experience sharing. The scope of this research can be divided into three parts:(1)Understand the development of Fire Acts of Taiwan and Mainland China from the history:The Fire Act of Taiwan was a subsidiary in the building regulation, and was legislated in 1985. While the Fire Act of Mainland used administrative order or regulation as the authority. The Fire Act had not been legislated until 1998. Both Taiwan and Mainland started to care about the regulation of fire protection and disaster rescue since then.(2)The comparison and study of Fire Acts between the Taiwan Strait:The spirit of legislation of Fire Acts of Taiwan and Mainland China are similar, but there are still some differences in the system and spirit. Only important systems like the administrator, fire prevention manager, building for public use, fire protection plan, and inspection and reporting will be compared and discussed.。(3)The comparison and study of punishment in Fire Acts between Taiwan and Mainland China:Including regulations about criminal responsibility, punishment of uncommitted criminal, and localized administration regulation. The research result shows that Taiwan should declare and establish the spirit and system of fire protection in the Fire Act, such as the honor of rescue, insurance regulation, special regulation required for specific industry characteristics, rating of number of people in public place, these should all be included in Fire Act or related subsidiary regulations. For Fire Act of Mainland China, the compensation of injury or death of voluntary rescuers is clearly written, but not standardized. The applicability of Order No. 61 of the Ministry of Public Security, the fire fighting, and self management of emergency preplanning, major causes of fire, etc. There are still a lot need to be improved in the Fire Acts of Taiwan and Mainland China. More effective regulations is needed in disaster prevention system, law regulation to avoid overlap and waste of law and social resources, and to look for harmonization of disaster rescue resources and long term development of knowledge and economics of Taiwan and Mainland China, and to bring both Taiwan and Mainland to the international leading status in the field of safety and disaster prevention, and create a disaster rescue system with human as the core.\n|Appears in Collections:||Thesis|\nFiles in This Item:", "label": "No"} {"text": "Healthy Eating and a Healthy Attitude\nThe World Health Organization defines health as a state of complete physical, mental, and social well-being. It is a state of well-being that is free of disease and infirmity. But there are many different definitions of what health means. For example, one definition might be “a body that is disease-free and not in need of any treatment.” A different definition may focus on an individual’s attitude or activities.\nHealthy means having good health\nHealthy is a word that can mean a variety of things to different people. It doesn’t necessarily mean being free of sickness, but it does mean doing well in general. The word can also refer to having a positive attitude, having the energy you need to get through the day, and eating a healthy diet.\nAccording to the World Health Organization, health is a comprehensive state of physical, mental, and social well-being. A healthy lifestyle is a life that carries meaning and purpose. It is a state of health that helps you handle stress and enjoy an active lifestyle. It is important to live a healthy lifestyle as it can allow you to cope with the stresses of everyday life.\nThere are many different aspects of living a healthy lifestyle, and some of them are more difficult than others. It can require you to make dietary and exercise changes, and it may even mean giving up some of your favorite foods. The key is to find a balance that allows you to achieve your goals for a healthy lifestyle.\nHealthy means having a healthy attitude\nHaving a healthy attitude can help you respond to life’s circumstances with balance, positivity, and control. It is not only important for your physical health, but it can also benefit others. People naturally gravitate toward positive people. People with positive attitudes tend to be happier, healthier, and more productive in life. In order to maintain a healthy attitude, you must take steps to develop awareness.\nThe first step in developing a positive attitude is to identify negative circumstances. These negative situations sap energy and take away your joy. Try to change these circumstances by requesting help from others or setting up regular accountability checks. Once you realize that your attitude is contributing to your situation, you will be more likely to take responsibility for your actions and to seek help from others when needed.\nHealth attitude is directly related to your perception of your health. Research has shown that people who view their health positively tend to live longer than people who view it negatively. A positive attitude can also serve a defensive function, shielding you from health threats and reinforcing the increasing value of your health as you age.\nIt’s not just about weight\nHealthy eating is a general philosophy that focuses on a balance of nutrients and whole foods, not only to lose weight. It helps promote longevity, improve health and wellbeing, and reduce the risk of disease. Healthy eating does not entail any special diets, and you can eat the foods that you love and still maintain a healthy weight.\nWhen it comes to eating healthy, a wide variety of foods is the key. It provides your body with a variety of nutrients, promotes overall health, reduces your risk of disease, and keeps your meals interesting. Whether you are overweight or not, you should always keep an eye on the food that you consume.\nFortunately, healthy eating isn’t as complicated as it may seem. The most important part of a healthy diet is replacing high-calorie and processed foods with natural and whole foods. Real food is the closest thing to nature’s original design.", "label": "No"} {"text": "Many pedestrian accidents in the Seattle region every year occur when pedestrians are crossing the street. Clearly, pedestrian crossing safety is something that transportation authorities can improve on, and the Seattle Department of Transportation does have a program in place that allows for changes that can improve pedestrian safety.\nThe Seattle Department of Transportation's (DOT) Pedestrian Program makes use of a number of different types of crossing improvements to encourage people to walk safely.\nMarked and Designated Crosswalks\nA marked crosswalk is, without a doubt, the most important feature that can help keep Seattle pedestrians safer. Crosswalks are simple to install, and the shortage of designated crosswalks is one of the reasons why so many pedestrians are killed in accidents every year. Where a crosswalk is not available, a pedestrian simply may choose to cross the road at dangerous areas, increasing the risk of an accident.\nHowever, marked crosswalks are not appropriate for every road and every traffic situation. The Seattle DOT evaluates the existing traffic situation, the number of lanes on the road and other factors before deciding to install a crosswalk.\nReducing the number of lanes can help facilitate safe pedestrian crossing and reduce accidents. Reduction in travel lanes can mean safer pedestrian crossings and safer bicycling if the reduction in lanes accompanies an increase in the number of bike lanes.\nCurb bulbs provide additional space for pedestrians before they cross the street. This can help reduce the speed of turning vehicles and reduce the risk of pedestrians getting struck when they step off the curb and onto the road.\nThe Seattle Department of Transportation uses the \"Stop for Me, It's the Law\" sign to increase motorist awareness of the fact that there are pedestrians around and that they must stop for them. The signs are usually placed near crosswalks and other areas where motorists may not notice pedestrians.\nThe City’s Liability for Pedestrian Accident\nLocal Seattle agencies are responsible for maintaining safe infrastructure that helps keep pedestrians safe. When an accident occurs as a result of a defective roadway design or the lack of a marked crosswalk, plaintiffs possibly could file a claim against the city.\nSpeak to Seattle pedestrian accident lawyer Max Meyers about filing a claim after an accident by calling or fill out the contact form and schedule a consultation.", "label": "No"} {"text": "Let me introduce you some examples first to get to know the real subject later on.\n‘ Stop! Stop! What is wrong with you’, said a caring parent.\n‘Stop! Stop! What is wrong with you’, said a loving child to her parent.\nWhat do you think about the both statements- are the same in nature? No. Certainly No. When a parent says ‘stop’, it is due to his caring nature being a parent; whereas when a child is saying the same thing, it might be due to imitation, ignorance, or might be due to some distress in mind. In any case, both expressions are not conveying the same meanings while having the same alphabetic language.\n‘ Take care, and stay safe’, said a caring parent.\n‘ Take care, and stay safe’, said a loving child to her parent.\nIt is again the same thing. The parent is caring and involved in safety issues with the child and the child is assuming as if she is a grown-up, so pretending to become a caring parent.\n‘ Why are you not listening to me carefully?’, said a loving husband.\n‘Why are you not listening to me carefully?’, said a loving wife.\nHere again husband is a bit aggressive and hyper in mood while arguing with his wife whereas wife is complaining against her husband’s indifferent and neglectful attitude.\n‘ I am happy with your performance today’, said an employer to his employee.\n‘ I am happy with your performance today’, said an employee to his employer.\nIn this example, an employer is happy with his employee’s performance and employer is misbehaving with his boss in a rude manner.\nIn the light of the above examples, one can easily conclude that language varies widely between relationships and would never convey the same meanings for each party involved. Even in friendships, partners speak relative to each others social and emotional status.\nChildren being junior members of your family might exaggerate your angry feelings and would name it a kind of threat to their happiness and safety. They do need a different level of anger from that you use in your office at least!\nFor couples, husbands are by default at the top position, so they must show over caring attitude and nice gestures for being more responsible and energetic as a man. For a wife might name a husband’s little angry mood a kind of emotional abuse, being more tender and subtle human by nature.\nLikewise, every relationship demands different language to speak with. We cannot rule over all people with the same hammer. When we go into the details of the healthy relationships, it is very important to understand that love speaks many languages and that too differs from person to person. We have to consider many other factors indeed in deciding about our way of communication: age, sex, culture, education level, background, personality type, I.Q, E.Q, physical health and the most important is the other person’s status in the relationship with you.\nConclusively, It means while speaking with someone junior to you (in age, position, or status) more respect than you usually give to others, is needed so that he/she should not feel degraded or humiliated due to your slip of the tongue only. It implies on your children, wives, and servants or anybody junior to you in general. Especially when you are in a bad mood, try to show less aggressive attitude as much as possible (lesser than what you usually show to your friends) so that the people who are dependent on you should not feel dejected or neglected due to your sudden rude behavior.", "label": "No"} {"text": "Steven A. Camarota is the Director of Research at the Center for Immigration Studies.\nThis report examines the dramatic decline in summer employment among U.S.-born youths (16 to 24) over the last decade. The decline started before the recession that started at the end of 2007 and is broad, effecting students and non-students, as well as those of every education level and racial background. The fall-off in youth employment is worrisome because research indicates those who do not work when they are young often fail to develop the skills necessary to function in the labor market, creating significant negative consequences for them later in life. At the same time youth employment has declined, the number of immigrants working in the summer has increased significantly as a result of high levels of permanent legal immigration (green cards), illegal immigration, and temporary worker programs.\nAmong the findings:\n- The total number of youths (16 to 24) not working hit a record high of 18.5 million in the summer of 2011, an increase of 7.2 million since 2000.\n- Even before the current downturn that began at the end 2007, the summer employment situation for U.S.-born youths (16 to 24) was deteriorating. Between the summers of 2000 to 2007, the share of U.S.-born youths working declined from 64 percent to 56 percent. In the summer of 2011 it stood at just 48 percent.\n- Although a number of business associations have lobbied for increased immigration to fill seasonal non-agriculture jobs, there is little evidence of a labor shortage at any time in the last decade.\n- The severity of the decline is similar for U.S.-born black, Hispanic, and white youths. In the summer of 2011, only 35 percent of U.S.-born black youths worked; for U.S.-born Hispanic youths it was 38 percent; and for U.S.-born white youths it was 54 percent.\n- The decline in youth summer employment is broad and began before the recession:\n- The share of teenagers (16 to 19) holding a summer job declined from 53 percent in 2000, to 40 percent in 2007, to 30 percent in 2011.\n- The share of older youths (20 to 24) holding a summer job declined from 75 percent in 2000, to 71 percent in 2007, to 63 percent in 2011.\n- The share of youths (16 to 24) enrolled in school holding a summer job declined from 48 percent in 2000, to 40 percent in 2007, to 33 percent in 2011.\n- The share of youths (16 to 24) not enrolled in school holding a summer job declined from 71 percent in 2000, to 66 percent in 2007, to 58 percent in 2011.\n- The share of high school dropouts (19 to 24) holding a summer job declined from 56 percent in 2000, to 53 percent in 2007, to 42 percent in 2011.\n- The share of those with at least a bachelor’s degree (21 to 24) holding a summer job declined from 82 percent in 2000, to 78 percent in 2007, to 73 percent in 2011.\n- Studies by Christopher Smith of the Washington, DC, Federal Reserve, Andrew Sum at North Eastern University, and Steven Camarota at the Center for Immigration Studies indicate that immigration accounts for a significant share of the decline in youth employment in the United States.\n- Although there has been a significant increase the share of youths enrolled in summer school, the fall-off in employment is similar for those in school and those who are not. Thus the overwhelming majority of the decline in work would have occurred regardless of the increased summer school enrollment.\n- From 2000 to 2011, the overall number of immigrants without a college degree working or looking for work in the summer increased by over three million.\n- Since 2000, legal permanent immigration (green cards) averaged one million annually; temporary worker programs for seasonal non-agricultural jobs, such as the H-2B, J-1, and Q-1 expanded significantly; and the illegal immigrant population grew by 2.3 million.\n- One factor that does not explain the decline in youth employment is an increase in unpaid internships:\n- First, high school dropouts show a similar decline to those who attend college — dropouts are very unlikely to be in unpaid internships.\n- Second, 16- and 17-year-olds show a similar decline as older youths, even though younger teens are much less likely to be in internships.\n- Third, according to Princeton Review’s Internship Bible, there are only about 100,000 internships (paid and unpaid) in the country. The number of U.S.-born youths not working in the summer has increased by 7.3 million since 2000.\nWorking in the summer has become less and less common for American youths. As recently as 2000, nearly two-thirds of U.S.-born youths (16 to 24) worked during the summer; by 2011 it was less than half. While the summers from 2008 to 2011 were particularly bad for U.S.-born youths, the deterioration began before the current economic downturn that started at the end of the 2007. The decline in youth employment is worrisome because there is evidence that not working in one’s youth can contribute to significant problems for workers down the road. A number of studies have found that the lack of early labor market experience can have a significant negative impact on employment and wages later in life.\nAt the same time that U.S.-born youths have been working less and less, the number of less-educated immigrants working in the summer has increased insignificantly. Between the summers of 2000 and 2011, the number of immigrants (legal and illegal) who do not have a bachelor’s degree holding a summer job or looking for one increased from 14 million in 2000 to 17.1 million in 2011. The growth in immigrant workers has been driven by high levels of new immigration. One million green cards (permanent immigration) were issued each year on average over this time period. The Department of Homeland Security estimates that the illegal immigrant population was 2.3 million larger in 2010 (the newest estimate available) than in 2000.1 While much smaller in scale than illegal immigration and permanent legal immigrants, programs such as the H-2b, Q-1, and J-1 visa programs that allow foreign temporary workers to take unskilled seasonal jobs outside of agriculture have also expanded significantly.\nIn a new report, Jerry Kammer discusses the growth in the summer work and travel portion of the J-1 visa program and its consequences.2 In many ways the work and travel program is emblematic of a larger problem with the nation’s immigration system. New programs are created and allowed to expand significantly without giving careful consideration to their impact on the labor market or the larger American Society.\nThere is good research that immigrants (legal and illegal) are crowding out U.S.-born teenagers in the labor market.3 There are several possible reasons for this. Employers may perceive immigrants as better workers and therefore discriminate against young Americans. In addition, immigrants typically arrive as adults with labor market experience in their home countries. This may give them a significant advantage over American youths, particularly teenagers. It is also possible that immigrants have more effective social networks for finding employment. Immigrants may also be willing to work for less and be more willing to tolerate unpleasant working conditions. Whatever the reason, there is a long-term decline in work among young people that pre-dates the current economic downturn.\nA number of business associations have for years lobbied congress to increase the number of immigrants allowed into the country. Those employers arguing specifically for an expansion of seasonal guest workers were among the most politically active. The U.S. Chamber of Commerce has been in the forefront of arguing that legal immigration has to be increased because there are not enough workers available. Also the Essential Worker Immigration Coalition (EWIC) was specifically founded to work for legal status for illegal immigrants and to increase legal immigration, including guest worker programs to allow in more unskilled workers. EWIC includes the National Restaurant Association, American Hotel & Lodging Association, American Nursery & Landscape Association, International Association of Amusement Parks and Attractions, International Franchise Association, National Association of Home Builders, National Retail Federation, and the Outdoor Amusement Business Association.4 All of these industries employ large numbers of seasonal workers to perform jobs that require modest levels of formal education. These are the type of jobs traditionally done by young people.\nIt is very difficult to reconcile the perspective of employers who argue there are not enough seasonal workers with the huge decline in youth summer employment. If workers were in short supply, more and more young people should have been drawn into the labor market, the opposite of what actually happened.\nFigure 1 reports the share of U.S.-born youths (16 to 24 years of age) employed in the summers of 2000, 2007, and 2011. It also reports figures for teenagers (16 to 19 year of age) and older youths (20 to 24 years of age) separately. The 2001 recession began in March and the 2007 recession began in December. Thus, 2000 and 2007 should show a similar employment picture as both are the peak summers before the 2001 and 2007 recessions. Despite this fact, the figure shows that a smaller share of American youths were working in 2007 than in 2000. The decline in employment is somewhat more pronounced for teenagers (16 to 19) than older youths (20 to 24 years of age). However, both age groups show a smaller percentage working in 2007 than 2000. Figure 1 indicates that the decline in work began before the current economic downturn. Since 2007 things have deteriorated further, with fewer than half of U.S.-born youths holding a job in the summer of 2011.\nFigure 2 reports the number of U.S.-born teenagers and older youths not working in the summer of 2000, 2007, and 2011. The total number of U.S.-born youths (16 to 24) not working increased by 3.8 million between 2000 and 2007. It increased another 3.5 million between 2007 and 2011. Both teenagers and older youths have seen a significant increase in the number not working. For the period 2000 to 2007, teenagers accounted for about two-thirds of the total increase in the number of youths (16 to 24) not working. But for the 2007 to 2011 period, older youths accounted for 57 percent of the increase in the number of youths not working.\nFigure 3 reports the decline in work for non-Hispanic whites, non-Hispanic blacks, and Hispanic youths. While white youths are much more likely to work in the summer than minority youths, all three groups show a similar decline in summer employment from 2000 to 2011.\nFigure 4 show the decline in summer employment for youths enrolled in school and those not enrolled. Not surprisingly, those not enrolled are more likely to work than those enrolled. However, both groups have experienced a similar decline in work. Over the years there has been a significant increase in the share of youths who are enrolled in summer school. In 2000, 26.8 percent of U.S.-born youths were in summer school; by 2007 it was 37.6 percent and by 2011 it was 40.6 percent. Since those in school are less likely to work than those not enrolled, some of the decline in work might be due to the increase in enrollment.\nThe increase in the share of youths in school does not explain the overall trend of declining summer employment, however. It is possible to estimate the impact of the rise in summer school enrollment by assuming that the share of youths who are students has remained the same (26.8 percent), but the decline in work for students and non-students took place. This type of calculation shows that two-thirds of the decline in youth employment would have occurred from 2000 to 2007 even if there had been no increase in school enrollment. For the period 2007 to 2011, 91 percent of the decline still would have occurred even with the increase in enrollment. For the entire 2000 to 2011 period, 78 percent of the decline would have occurred. Thus the overwhelming majority of the decline in work would have occurred regardless of the increase in enrollment.\nIt is also worth noting that enrollment in school has never precluded students from working, at least part time. In fact, as recently as 2000 nearly half of U.S.-born youths enrolled in summer school also worked. Thus a rise in school attendance in the summer would not necessarily have to reduce work. Moreover, even if it did, the increase in summer school attendance does not explain any of the decline in work shown in Figure 4, in which students and non-students are considered separately. The bottom line is that young people are working less in the summer whether they are in school or not.\nFigure 5 reports employment for different types of youths. The figure shows how broad the decline in work has been for young people. High school dropouts (ages 19 to 25), those with a bachelor’s degree (ages 21 to 24), and young teenagers (ages 16 and 17) all show a significant decline in summer work, even before the current recession. Young teens, high school dropouts, and college graduates are different populations, but they all show a similar decline.\nTables 1 and 2 (available online at http://www.cis.org/sites/cis.org/files/articles/2011/youth-employment-ta...) provide most of the numbers and percentages used in this report. The tables divide the youth population by age, race, education, and school enrollment. For those readers wanting more details, the tables can be used to make additional comparisons.\nWhy Teenage Employment Matters\nThe primary reason to be concerned about the decline in work among youths is the long-term negative consequences for the young people themselves and for society. Research shows that even after controlling for other factors, such as family background, those who work when they are young are more likely to be employed later in life. Those who work as youths also make more money and are employed in higher status occupations. The positive effects of work seem to last for many years.5 Working seems to shape young people in ways that make them much more competitive in the labor market.\nHolding a job instills the habits and values in teenagers during their formative years that are helpful in finding or retaining gainful employment later in life. This may include showing up on time, following a supervisor’s directions, completing tasks, dealing courteously with customers, and working hard. Learning good work habits and values seems to become much less likely without holding a job at a young age. Once a person who has little or no work experience reaches full adulthood, learning these skills seems to become more difficult.\nData and Methodology\nThe data for this study come primarily from the public-use files of the June, July, and August Current Population Surveys (CPS) collected monthly by the Census Bureau for the Bureau of Labor Statistics. Each month the CPS includes about 130,000 respondents, roughly half of whom are in the labor force. The CPS does not include persons in institutions, such as prisons and nursing homes. The government publishes employment statistics that are both seasonally adjusted and unadjusted from the survey. The figures in this report are unadjusted. There is little difference in the seasonally adjusted data compared to the seasonally unadjusted data when the same months are compared over different years as in done in this analysis. Not seasonally adjusting is computationally simpler and it makes it much easier for other researchers to replicate.\nIn this report we use the terms foreign-born and immigrant synonymously. The foreign-born are defined as persons living in the United States who were not U.S. citizens at birth. This includes naturalized American citizens, legal permanent residents (green card holders), illegal immigrants, and people on long-term temporary visas such as students or guest workers. Prior research indicates that Census Bureau data like the CPS captures the overwhelming majority of both legal and illegal immigrants.6\nThe findings of this analysis indicate summer work among U.S.-born youths ages (16 to 24) has declined dramatically over the last decade. This decline pre-dates the current economic downturn. The decline in youth employment may not seem particularly worrisome to some. However, a large and growing body of research indicates that it is as young people that workers develop the skills and habits necessary to function in the labor market. Poor work habits and weak labor force attachment developed in youth can follow a person throughout life. Those who do not work in their youth earn less and work less often later in life than those who were employed when young. This is especially the case for those who do not go on to get more education after high school.\nThe decline in summer employment has impacted youths from every segment of society. The fall-off is similar for white, black, and Hispanic teens. It is similar for teens (16 to 19) and older youth (20 to 24). The decline has impacted high school dropouts and college graduates. The extremely broad nature of the decline has two important implications: First, it is clear that the decline was not due to youths from affluent families no longer working because their parents provide them with everything they need or want. Second, the broad nature of the decline makes it more likely that changes in the U.S. labor market rather than some change in the composition or characteristics of the young themselves has created this phenomenon.\nBusinesses have repeatedly argued that there are not enough seasonal workers. It is very difficult to reconcile the decline in youth employment with the contention that seasonal workers are not available. If seasonal workers are in short supply, as immigration advocates contend, the share of young people working should have increased significantly, not fallen dramatically. Perhaps the needs of seasonal employers have changed in some fundamental way that U.S.-born youths can no longer satisfy. But it is hard to see what changes have taken place since 2000 in the nature of seasonal food service, food perpetration, cleaning, retail, construction, and other service sector jobs that traditionally have employed youths.\nThere is good evidence that immigration accounts for a significant share of the decline in youth summer employment. The decision to allow in large numbers of legal immigrants (temporary and permanent) and to tolerate large scale illegal immigration and turn away from employing U.S.-born youths may be seen as desirable by some businesses. However, this policy choice may have significant long-term consequences for American workers as they enter adulthood, especially those who do not go on to college. As non-work and idleness become more common for more young Americans, there may be significant negative consequences for society. The potential impact of continued large-scale immigration on teenagers is something that should be considered when formulating immigration policy in the future.\n1 Between 1994 and 2008, and average of 914,000 green cards were issued each year. See Table 1 in Yearbook of Immigration Statistics, 2008, at http://www.dhs.gov/xlibrary/assets/statistics/yearbook/2008/ois_yb_2008.pdf. For estimates of the illegal immigrant population from 2000 to 2010, see Table 3 in the DHS publication: “Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2010”, at http://www.dhs.gov/xlibrary/assets/statistics/publications/ois_ill_pe_20....\n2 Responding to the demands of employer pressure groups, in 2005 Congress passed a temporary provision to allow returning H-2B workers to be exempt from the cap from March 2005 to September 2007, allowing the program to significantly exceed the cap originally placed on it.\n3 Christopher Smith, “The Impact of Low-Skilled Immigration on the Youth Labor Market”, Finance and Economics Discussion Series, Federal Reserve Board, Washington, DC, 2010. Also see Sum, Harrington, and Khatiwada, “The Impact of New Immigrants on Young Native-Born Workers, 2000-2005”, Center for Immigration Studies, 2006, http://cis.org/NewImmigrants-NativeBornWorkers.\n4 The Chamber’s position on immigration can be found in “Labor and Immigration Policy Positions and Activities 2011-2012”, at http://www.uschamber.com/reports/labor-and-immigration-policy-positions-.... The policy positions of EWIC can be found at http://www.ewic.org//index.php?option=com_content&task=view&id=15&Itemid=52.\n5 “Educational and Labor Market Outcomes for the Nation’s Teens and Youth Since the Publication of America’s Choice: A Critical Assessment”, National Center on Education and the Economy, Washington, D.C., January 2006, p. 20, http://www.skillscommission.org/wp-content/uploads/2010/05/Education-Lab.... For a more extensive review of many of the problems created by young people not working, see “Confronting the Youth Demographic Challenge: The Labor Market Prospects of At Risk Youth”, Sar Levitan Center for Social Policy Studies, Baltimore, 2000; Lauren M. Rich, “The Long-Run Impact of Teenage Work Experience: A Reexamination”, The Review of Black Political Economy, 25(2), pp. 11-36, 2006; T. Leventhal, J.A. Graber, and J. Brooks-Gunn, “Adolescent Transitions to Young Adulthood: Antecedents, Correlates, and Consequences of Adolescent Employment”, Journal of Research on Adolescence, 11(3), pp. 297-323, 2001; J.T. Mortimer, M. Vuolo, J. Staff, J., S. Wakefield, and W. Xie, “Tracing the Timing of ‘Career’ Acquisition in a Contemporary Youth Cohort”, Work and Occupations, 35(1), pp. 44-84, 2008; R. Carr, J.D. Wright, and C.J. Brody, “Effects if High School Work Experience a Decade Later: Evidence from the National Longitudinal Survey”, Sociology of Education, 69(1), pp. 66-81, 1996.\n6 The Department of Homeland Security (DHS) Office of Immigration Statistics estimates that the undercount in Census Bureau data for immigrants is about 5.5 percent. Most of this undercount is of the illegal immigrant population. The undercount of illegal immigrants specifically is thought by DHS to be 10 percent. See Table 2 in “Estimates of the Unauthorized Immigrant Population Residing in the United States: January 2010”, at http://www.dhs.gov/xlibrary/assets/statistics/publications/ois_ill_pe_20.... DHS estimates use the American Community Survey, which like the Current Population Survey used in this report, is collected by the Census Bureau. The data in both cases are weighted in a similar fashion so the results are similar.", "label": "No"} {"text": "Spiders, thank goodness, haven’t evolved assassin drones. But the specialized hunters of the family Archaeidae can kill at a distance.\nIt’s a distance of only a few millimeters. But that’s substantial for these teensy dramas, and enough space to let a group called pelican spiders bring down their wary and dangerous prey: other spiders.\nThe pelican name comes from their profiles. “They look like little birds,” says Hannah Wood of the University of California, Davis. The spider’s body is about the size of a grain of rice, with a front segment that has evolved into a stretched “neck” with a little round “head” on top. (The mouth is actually at the bottom of the “neck”). And a pair of jawlike fanged projections called chelicerae folds down against the neck, where a pelican would tuck its beak.\nPelican spiders don’t build webs. Instead they creep through foliage, tiptoeing upside down under leaves to hunt. A female will carry her eggs with her, in a silk bag she attaches to one leg in the third of her four pairs. The spiders’ back six legs do the walking while the front two sweep circles in the air feeling for prey. A pelican spider that picks up the silk trail of another spider will spend hours at the edge of that spider’s web, plucking now and then and waiting. Unlike the quick spiders you might see skittering up a garden shed wall, Wood says, stalking pelicans are “slow and deliberate.”\nBut when they strike, it’s fast. The jawlike chelicerae rise 90 degrees and then slam fanged tips into the prey. “Then they pull out one chelicera and leave the other one hanging out there with the spider prey impaled on it,” Wood says.\nNext it’s just a matter of waiting for the venom to work. Thanks to the pelican spider’s long neck and chelicerae, its prey struggles at a harmless distance.\nAttacking at jaw’s length is an ancient trick. Biologists first discovered extinct pelican spiders in fossils before realizing the family still lives (in Madagascar, South Africa and Australia). Today’s species split off on their own trajectory as the supercontinent Pangaea was breaking up some 180 million years ago, Wood and her colleagues reported last year in Systematic Biology.\nNow Wood studies a related family, the trap-jaw spiders (Mecysmaucheniidae), that has evolved the opposite approach to hunting. The spiders have shorter, thicker “necks,” and their superpower is speed. They strike so fast that it’s difficult to see more than a blur even in video recorded at 30,000 frames per second.\nNinjalike as pelican spiders are, they’re not the stuff of nightmares. “I’ve never had one try to bite me,” Wood says. When she reaches to catch them, they just drop to the ground. “They’re very shy.”\nAT ARM'S LENGTH Pelican spiders hunt other spiders, plucking at their webs to lure the prey closer and then using long necks and jaws to hold them at a distance.\nCredit: Hannah Wood", "label": "No"} {"text": "The Financial Assistance Office at WNC supports the Nevada Attorney General's Office with regards to college student loan conduct. Please read the WNC College Student Loan Code of Conduct for more information.\nLoans - Definition\nStudent loans are money that must be repaid. Loans are legal obligations. Students are required to repay ALL Student Loans regardless of whether they didn't like the education received, ability to get a job in a preferred field of study, or financial difficulty.\nBefore taking out a student loan, it is wise to think about the amount of money being borrowed and the amount of money to be repaid over the years, with interest. Loans are legal obligations.\nBe conservative. Only borrow what is absolutely needed.\nTypes of Loans\n- Federal Direct Stafford Loans (Subsidized and Unsubsidized)\n- Direct Subsidized Stafford Loan - This loan is need-based aid (need is determined by FAFSA). Eligibility is determined based on credits taken, degree program declared, and past borrowing. Interest is subsidized while in school attending at least half time.\n- Direct Unsubsidized Stafford Loan - This loan is non-need based aid. Interest begins to accrue immediately from the date the loan is disbursed, like a credit card purchase. You are responsible for the interest that accrues on the loan. Students are encouraged to pay the interest while in college.\nIf you do not pay the interest that is accruing on the Unsubsidized loan while you are in college and when the Unsubsidized loan goes into repayment, your lender will take the principle that you borrowed, all the interest that was not paid, add them together and then determine what your payment will be with interest!\n- Direct Parent Loan for Student (PLUS) - This loan is a low-interest student loan for the parents of dependent students and for graduate/professional degree students. Unlike Subsidized and Unsubsidized loans, this type of loan requires the borrower to pass a credit check. Interest begins to accrue from the date the loan is disbursed, just like a credit card purchase!!\nParents can apply online at: www.studentloans.gov. A Federal PLUS loan Request form and a Student Loan Request form found here., must be submitted.\nAnnual (Yearly) loan limits are regulated by the government and are as follows:\n|Additional Unsubsidized Eligibility\n||$6,000 ($2,000 Dependent Students)\n||30 or more credits\n||$6,000 ($2,000 Dependent Students)\n||60 or more credits\n||$7,000 ($2,000 Dependent Students)\n* Funding only applies to students in the Bachelor of Technology program.\nWhat is an Academic Year?\nA typical academic year is the Fall and Spring semesters. You can use your loan to help pay for the Summer semester, however, if you have borrowed all you are eligible for between the Fall and Spring semesters, you will not have any money left to borrow in the summer.\nHow Much Can I Borrow for a Lifetime?\nAggregate (lifetime) loan amounts are set by the federal government. Undergraduate levels are as follows:\n||$31,000 (of which no more than $23,000 can be subsidized)\n||$57,500 (of which no more than $23,000 can be subsidized)\nThe aggregate amounts are Lifetime limits from earning an Associates and/or Baccalaureate (Bachelor) degree.\nBe careful when Borrowing Loans!!!!! This is all you have to work with!!!!\nInterest Costs and Loan Fees\nSubsidized loan (when you go into repayment)\n|On or after July 1, 2014 and before July 1, 2015\nThe Unsubsidized loan is 4.66% (accruing immediately once loan is disbursed).\nThe PLUS is fixed at 7.21% (accruing immediately once loan is disbursed).\nTHERE IS NO PENALTY FOR PAYING YOUR FEDERAL DIRECT STAFFORD LOAN(S) EARLY!!!\nSteps to Apply for a Federal Direct Stafford Loan\n- Complete and submit the Free Application for Federal Student Aid (FAFSA).\n- Complete your WNC financial aid file.\n- Complete a Master Promissory Note (MPN) at www.studentloans.gov. Sign in with your federal PIN and choose Complete MPN from the menu on the left side of the page.\n- Complete the Entrance counseling at: www.studentloans.gov. Sign in with your federal PIN and choose Complete Entrance Counseling from the menu on the left side of the page. MUST COMPLETE EVERY YEAR.\n- Log on to the National Student Loan Data System (NSLDS) at www.nslds.ed.gov and print a summary report of your financial aid history. You must attach your financial aid history summary to your Loan Request Form. If this is the first time you have requested financial aid, you must attach a printout of the NSLDS web page proving you have accessed your NSLDS account.\n- Complete and submit the Student Loan Request Form.\n- Must complete the Exit counseling at: www.studentloans.gov in the last semester you are in attendance at WNC.\n- If you decide to cancel your loan(s), you need to submit to the Financial Assistance office a completed Loan Revision Request form and/or return the loan funds to your lender. To avoid penalty, you must cancel your loans as soon as possible or no later than 14 days after disbursement of funds.\nFOR MORE INFORMATION ON DIRECT FEDERAL STAFFORD LOANS GO TO: http://www.direct.ed.gov/student.html\nFederal regulations require loans to be disbursed in two equal payments. One in the Fall semester and one in the Spring semester. The first disbursement begins the week prior to the first day of class.\nIF you are a First Time Freshman AND First Time Borrower (that means the borrower has never attended college or does not have transfer credits AND has never borrowed a loan), you will have a 30-day delay on your first disbursement.\nLoans for one semester will still have the two disbursements, one the week prior to the first day of class and the second disbursement midway through the semester.\nThe federal government requires that student borrowers complete Exit Counseling. Exit Counseling is required before you withdraw, graduate or drop below half-time attendance (even if you plan to transfer to another school). This can be completed at: www.studentloans.gov.\nNational Student Loan Data System\n- This is a National data bank that houses every federal stafford loan ever borrowed. You can:\n- Track your loans from disbursement to payoff\n- Track your total student loan indebtedness\n- Track your loan status & interest rate\nLoan Default - Consequences of Default!!!!\n- Full amount of loan is due INCLUDING collection costs and all interest that has accrued\n- You are subject to federal & state offsets\n- Wages and tax refund may be garnished\n- Credit will be tarnished\n- Will Lose deferment & forbearance options\n- Will Lose eligibility for future financial aid\n- May lose eligibility for certain federal or state jobs\n- May lose professional license\nPrivate Education Loan\nThere are several lenders that provide education loans. All private education loans are credit based.\n- Available through private lending institutions.\n- Loans are credit based.\nIt is in the best interest of the borrower to review each lender's interest rates and types to ensure the borrower chooses the best one for his or her needs.", "label": "No"} {"text": "For the past ten years, public faculties have had trouble funding college applications akin to artwork class and music class. The Arts Training Partnership, a center inside Training Commission of the States, is established by means of a cooperative agreement between the National Endowment for the Arts and the U.S. Division of Training. Indigenous Visible Training is an space of focus obtainable to college students with a BA, BFA or another permitted diploma.\nChallenge Zero has been conducting analysis on learning in and thru the arts since 1967, and I invite you to go to the PZ website , when you’ve got further curiosity in this subject. Lately, faculty curricula in the United States have shifted closely toward frequent core subjects of studying and math, but what in regards to the arts?\nOver four hundred artists and 50 ticket distributors can be found to offer applications in your schools and on the many cultural venues in the surrounding space. • The Each Scholar Succeeds Act requires that states present college students with a properly-rounded schooling,†opening the door for larger emphasis on arts and music in faculties.\nWhile the punitive traits of No Child Left Behind largely led to its unpopularity, most nonetheless agree that shining gentle on faculty high quality by means of information led to the widespread recognition of huge gaps in instructional high quality. The arts also train children that there a several paths to take when approaching problems and that each one issues can have more than one answer.\nBoth in schools and community settings, learning in and through the humanities helps to create ethically and aesthetically wealthy environments for dwelling and learning. Students learn in regards to the role expertise has all the time placed in art and its training.", "label": "No"} {"text": "As we get older, food and drink we consume over the years such as tea, coffee and red wine cause our teeth to become discoloured and stained.\nTooth whitening can restore your teeth to a beautiful, pearly white colour through a bleaching process.\nWhitening is a process where the tooth discolouration is ‘whitened’ to a lighter shade by removing the staining through chemical means. It is a safe procedure when carried out under professional supervision. The whitening product contains an active ingredient, usually hydrogen peroxide or carbamide peroxide. As this ingredient is broken down, oxygen enters the enamel, therefore making the tooth colour lighter.\nThere are two common teeth whitening procedures carried out at Purity, Home Whitening and Enlighten.\nHome Whitening –\nThis treatment involves taking an impression of your mouth to create mouth trays and to supply you with the home whitening system. This will allow you to whiten your teeth over a two week period at home.\nThis is a home and chair-side whitening system combined. For this treatment, your dentist will create some trays and provide you with a home whitening system to use at home for 2 weeks. Following this an in-house appointment will be made at the dental practice. At this visit the dentist will apply a higher percentage hydrogen peroxide or carbamide peroxide product to your teeth, using your mouth trays, this will take 40 minutes.\nTeeth can discolour for various reasons. Our dental team will recommend the most ideal method based on your oral condition after an in-office examination to establish the cause and nature of your tooth discolouration, as well as provide you with more information on the various types of whitening procedures available, duration & frequency of treatment.\nThe Home whitening system costs £350 and Enlighten whitening system costs £500", "label": "No"} {"text": "LAB 8: REDUCTION Quiz what is the role of the first 0.5 mL of water that is added in the reduction reaction? To hydrolyze borate ester why is it possible to separate (1R, 2S) - hydrobenzoin from (1R, 2R) - and (1S, 2S)- hydrobenzoin? (be specific) because they are diasteriomers which have different physical propertie why can?t you separate (1R, 2R)-hydrobenzoin from (1S, 2S)-hydrobenzoin? (be specific) because they are enantiomers which have similar physical properties why is it possible to separate (1R, 2S) - hydrobenzoin from (1R, 2R) - and (1S, 2S) - hydrobenzoin? (be specific) because they are diasteriomers which have different physical properties why can?t you separate (1R, 2R)-hydrobenzoin from (1S, 2S)-hydrobenzoin? (be specific) because they are enantiomers which have similar physical properties why are reductions using sodium borohydride run in ethanol or methanol and NOT in ether? it is not soluble in ether In the reduction of benzyl rxn, the major product, meso-hydrobenzoin, is considered achiral even though it has 2 chirality centers, why? It has a plane of symmetry Why are reductions using lithium aluminum hydride run in ether and NOT ethanol or methanol? LiAlH4 reacts violently with protic solvent Why are reductions using sodium borohydride run in ethanol or methanol and NOT in ether? NaBH4 is insoluble in ether what is the role of the 1 mL of hot water, after the 1st addition of .5mL water, added to the clear solution in the reduction rxn? To saturate solution to begin crystallization why is it important to keep the benzyl in ethanol solution in ice when borohydride is added in the reduction rxn? To control rate of rxn or rxn is exothermic List 3 reasons an excess of borohydride is used in the reduction experiment. To ensure reaction goes to completion To account for NaBH4 reacting with solvent To account for decomposition Know the reduction of benzil to hydrobenzoin (R,R) ? Hydrobenzoin cannot be separated from (S,S) hydrobenzoin by recrystallization. Why is that? Enantiomers cannot be separated by recrystallization Why are reductions using sodium borohydrie run in ethanol or methanol and NOT in ether? sodium borohydride is not soluble in ether In the reduction reaction, the hote water and the 95% ethanol act as a solvent pair for the benzil. Which is the better solvent and which is the poorer one? Better: 95% ethanol Poorer: water Why is the hydroxide ion in the dibenalacetone synthesis considered a catalyst? It is not consumed in the reaction and regenerated at the end. Why are reductions using lithium aluminum hydride run in ether and NOT in ethanol or methanol? lithium aluminum hydride has a tendency to react in a volatile manner with alcohols Recrystallization techniques are used to purify meso-hydrobenzoin. What (give names of compounds) are you separating meso ? hydrobenzoin from? you separate the meso ? hydrobenzoin from the borate ester. (R,R) hydrobenzoin (S,S) hydrobenzoin, S-benzoin, and R-benzoin Suggested Questions How reduction is characterized in organic chemistry Increase of bonds to H and/or decrease of bonds to electronegative atoms How oxidation is characterized in organic chemistry Decrease of bonds to hydrogen Increase of bonds to electronegative atoms How to recognize reduction, oxidation and substitution Why NaBH4 used instead of LiAlH4 Milder, more selective in reducing aldehydes and ketones, does not react violently in contact with water or alcohols like LiAlH4 Why was ethanol used as solvent instead of ether in the reaction Unlike LiAlH4, sodum borohydride is insoluble in ether and soluble in methanol and ethanol Why ether must be used as a solvent if LiAlH4 is used Because liALH4 is soluble in ether Why was excess NaBH4 used in the reaction To ensure completeion of the rxn To account for NaBH4 reacting with solvent To account for decomposition of NaNH4 Specific side products and why they form RR or RS hydrobenzoin- carbonyl carbon is sp2 hybridized, attack could occur from above or below R or S benzoin- incomplete rxn Role of each addition of water 1st addition: to hydrolyze borate ester 2nd addition: to saturate solution to start crystallization Role of ice bath To control the reaction- addition of NaBH4 is exothermic Why recrystallization carried out To purify meso hydrobenzoin from its side products (This is possible because it has different physical properties from the major product) Why melting point was carried out Sources of error Loss from transferring of products/crystals (scooping crystals out of test tube, from filter paper) With regards to crystallization: Insufficient drying of crystals, adherence of crystals to filter paper, crystals dissolving during washing process on Hirsch funnel With regards to melting point: Moisture in sample, improperly calibrated thermometer of mel-temp, crystals not finely powdered, sample heated too quickly, more than 2-3 mm in capillary tube How IR, TLC and mixed melting point could be used IR: Can show presence of functional groups, and thus, show whether the product is pure. TLC: To determine the # of components in the product (would show purity) Mixed melting point: Can mix some of the product w/ the compound that the product is supposed to be. If melting point stays the same as that compound, the product is what it is supposed to be. If melting point is depressed and melting range is bigger, indicates presence of impurities Must be able to identify R and S stereochemistry on major and side products Prelab Questions Calculate the theoretical yield of meso-hydrobenzoin if 60 mg sodium borohydride were the limiting reagent. Provide answer to the nearest mg. Show calculations. For each of the following reactions (CLICK ON PDF. LINK BELOW), indicate if they are oxidation, reduction or substitution reactions. Postlab Questions NONE Introduction What is the general structure of a ketone? (Draw structure) What is the specific kind of product that is formed in the reduction of ketones? Secondary alcohols List the two ways reduction is represented in organic chemistry Are as an increase of bonds to hydrogen and decrease of bonds to electronegative atoms What specific kind of molecule (functional group) is benzil and what specific kind of molecule (functional group) is it forming upon reduction? The specific molecule (functional group) that benzyl is a diketone. Upon reaction it forms a diol. Apparatus NONE Reactions\nWant to see the other 4 page(s) in Lab 8.doc?JOIN TODAY FOR FREE!", "label": "No"} {"text": "Imagine A Day Without Water\nPower lines. Linemen. Bucket trucks. Electricity. As a customer, these are probably some of the first things that come to mind when thinking of Santee Cooper. But what about your morning cup of coffee, watering your flowers and those nice, warm showers? Yep, Santee Cooper helps with those, too.\nWe operate two wholesale water systems, one on Lake Moultrie and one on Lake Marion. That very water moves through our water treatment facilities and makes its way into the homes of more than 200,000 residents in the Lowcountry. That’s why we’re getting involved.\nWednesday, Oct. 23, marks the fifth annual Imagine A Day Without Water, a project developed by the Value of Water Campaign to help educate and inspire the nation on the necessity of water. Last year, more than 1,000 organizations signed up to participate in the annual day of advocacy and education. This year, Santee Cooper joins the list of organizations that want to help raise awareness on the value of water.\nFirst, here’s a little background on our water systems. Launched in October 1994, the Santee Cooper Regional Water System was the first regional approach to water distribution in the Lowcountry. This system has the capacity to draw 40 million gallons of water per day (mgd) from Lake Moultrie (to put this in perspective, a good-sized bath holds 40 gallons, so 40 million gallons would be 1,000,000 baths). The Lake Marion Regional Water System came online in 2008 and has the capacity to draw 8 mgd from Lake Marion. Both systems are growing as the population and demand grow.\nBoth water systems (Lakes Marion and Moultrie) have also been honored with the “Best Tasting Water” award from the South Carolina Rural Water Association. If you live in Moncks Corner, Goose Creek, Berkeley County, Summerville, or the Town of Santee… you’re probably drinking it.\nAnother fact you may not know? Within the next three to five years, it is estimated that 50 percent of water and wastewater treatment operators will retire. In efforts to offset the coming shortage, we’re partnering with Berkeley County high schools for Imagine A Day Without Water. On Oct. 23, we’ve invited more than 80 students to visit the Moncks Corner water treatment facility to learn about the water treatment process, and explore what a career in the field looks like.", "label": "No"} {"text": "Amenhotep I (Amenophis I) (about 1525-1504 BC)\nSecond king of the Eighteenth Dynasty. In many respects he completed the work of Ahmose in redeveloping the country. A campaign against Nubia is attested. The building activity of the king concentrated on Thebes (calcite shrine in Karnak), but is also attested at other places such as Abydos and Elkab.\n|Horus name: Kauwaftau\nNebty name: Aaneru\nGolden Falcon name: Wahrenput\nBurial place: Unknown, most probably Thebes\nAttestations in the Petrie Museum:\nfaience cartouche UC 11895\nIn Thebes Amenhotep I and his mother Ahmes-Nefertari were worshipped as local deities.\nstela from Thebes\nCopyright © 2000 University College London. All rights reserved.", "label": "No"} {"text": "What’s the difference between a drawing and a sketch? This can be a little confusing. There is certainly some gray area between the two a lot of confusing art terms surrounding this subject! I think the basic difference between drawing and sketching is one of intention. Are you drawing for the purpose of studying, recording details or simply the sheer enjoyment of putting down line? Is your intent to create a finished piece of art?\nSketching is usually in the observation category; a rough idea quickly captured on paper. It’s mostly used for studying a subject, like a leaf or flower. A sketch is used to capture essential information about size, placement, relationship, and gesture. A sketch is all about getting the essence of what you are seeing. A sketch might be the seeds of an idea for a more finished work. A sketch is for your own personal use, not intended to be a finished work of art. However, many sketches are beautiful in their own right and are indeed works of art!\nIt’s really easy to overthink this one, so I’ve offered a few ways to contrast drawing vs. sketching. It’s not necessarily an exhaustive list but it may give you some clarity and direction when you are approaching your own work.\n1. Loose vs. Accurate\n2. Less Expensive Materials\n3. Small vs. Large\n4. Not a Finished Piece of Art\n5. Sketching is Previous to Drawing\nOne way to distinguish between drawing and sketching is that you first sketch before seriously drawing. Artists don’t usually skip sketching because they want their art to be as accurate as possible.\nWhen you sketch, you press your pencil lightly on the paper, so you can correct mistakes easily whenever you want. Whereas with drawing you’re making a stronger statement and commitment. Every stroke is usually darker, and you apply more strength to it.\nAlthough you will also see many artists skipping sketching, they can only do it because they have drawn the subject so many times they have it stored in their visual library. More experienced artists would start sketching a drawing without circles or lines but instead drawing its contour immediately.\nSketching is especially important when you’re drawing something you have never drawn because you don’t yet understand it deeply. Sketching gives you the chance to experiment and help you see what lines help you create a convincing picture of your subject. The way you sketch or draw very much depends on your overall drawing experience and the subject you’re capturing. Also, different methods lend themselves to different subjects.\n6. Sketches Take Less Time Than Drawings\n7. Sketches don’t have to be perfect\n8. Sketches Use Fewer Tools than Drawings\n9. Sketching Is Studying. Drawing Is Representing\n10. Sketches Are Incomplete – Drawings Are Complete\n11. Sketching is casual. Drawing is serious.\nFinally, I think that both drawing and sketching are foundational for any form of artmaking. It doesn’t matter if you consider yourself to be a painter, printmaker, or sculptor- drawing is part of the process. Therefore, we can all benefit from improving our drawing skills. How your approach drawing and what you hope to accomplish with it, is up to you. Once you’ve spent some time acquiring good skills, the sky is the limit!\nFinally, I think that both drawing and sketching are foundational for any form of artmaking. It doesn’t matter if you consider yourself to be a painter, printmaker, or sculptor, drawing is part of the process. Therefore, we can all benefit from improving our drawing skills. How your approach drawing and what you hope to accomplish with it, is up to you. Once you’ve spent some time acquiring good skills, the sky is the limit!\nHappy Drawing and Painting,", "label": "No"} {"text": "Once you've seen the giant pandas on your China vacation you might fancy a little Chinese history. If so then the perfect place to head for after your Yangtze River Cruise is the Sanxingdui Museum in Chengdu. It's one of the biggest archeological museums in the whole of China and very much worth the short trip from the city center.\nWhat are the Three-Star Piles?\nThe Three-Star Piles are gigantic earth mounds which cover nearly 4.6 square miles of Sichuan countryside. They are relics of the Shu people (the founders of the Sichuan region). Local legend has it that the three-star piles were formed when the Heavenly Emperor threw down earth from the heavens. The truth, whilst no less exciting, is that they were the walls of a truly ancient city. They would have been designed so that soldiers could tour their length and breadth to defend the Shu Emperors of China.\nWhat makes them special?\nLike many of the most exciting discoveries in China the Three-Star Piles were discovered by a farmer who would travel out from his farm each day to dig irrigation ditches for his crop. In 1929 he was digging and found a wonderful piece of jade. There's nothing like an enormously valuable find to bring treasure hunters running to the site and quickly 400 more jade pieces had been found. This brought archeologists from across China to further explore the site.\nExcavations to date have found signs of life from China's Neolithic Period (7-5,000 B.C) and then the Shang Dynasty (1,600-1,100 BC) and the Zhou (1,100 – 711 B.C.) and there is strong evidence that the site might also be the ancient capital of Shu.\nThe site is one of the richest anywhere in the world. In 1986 two pits were unearthed with the clear remains of human sacrifice within. These yielded nearly a 1,000 artifacts of extreme cultural significance included golden statues, bronze masks, and jade necklaces that would have been worn by extremely important members of the Shu people. If you're going to make the trip out to the museum you mustn't forget your camera, the opportunity for some of the most interesting vacation photos in China are here.\nThe site still has enormous potential for further discovery as the dig has barely scratched the surface so far. Many of the items retrieved have yet to be named and when you see them displayed in the museum you may find that you're among the first Westerners ever to witness this culture.\nWhat's in the Museum?\nThe museum is divided into four sections and you'll want to allow plenty of time for your trip as it covers nearly an acre of space in its own right. The first section is based around the Shu culture and tries to recreate the history and cultural achievements of the race. The handicrafts on display are particularly intriguing as the styles are no longer found in China anywhere.\nAs you travel through Section 2 you'll be asked to consider divinity and spirituality in reference to the Shu. This is especially interesting as China would once have ignored this important aspect of their culture.\nThe third section is a major highlight of China tour and focuses solely on the most exquisite finds from the dig. If you're running short of time you really want to rush round the rest of the museum and spend a little longer here.\nThe last section walks you through the excavation on the site including what's already been accomplished and what is planned in the future.\nFinally there's an exhibition center that displays many of the less important signs a little further down the road from museum.\nWhen you're planning your China vacation one thing you probably won't have thought of seeing on your trip is baseball. China's not as new to the game as you might expect and if you're a keen fan you'll almost certainly want to sneak away one evening on your tour and catch a game. We think it's worth taking a look at how baseball is growing in popularity in China and how the game came to travel so far East in the first place.\nEarly Baseball in China\nYou'd probably be surprised to learn that baseball made the trip to China more than a hundred years ago. You'd be even more amazed to find out that it wasn't Americans who brought baseball to China. Instead it was a group of students sponsored by the Qing Dyansty government who'd had to travel to the United States to study engineering that fell in love with the game. They'd been so keen on baseball that they started the Chinese Baseball Team at Yale. When they returned home they couldn't give it up and baseball found a niche in China.\nThe first official Chinese baseball team was founded in 1895. The players were all students at the Huiwen Academy of Classical Learning in the capital which was then known as Peking. The first tournament took a little while longer to organize and it wasn't until the Xiehe Academy (from Tongzhou) formed another team in 1907 that they had their first official game.\nIn 1913 the sport became an official sport of the Far East Games which was mostly attended by China, the Philippines and Japan. The Chinese team seem to have seen these events as nothing more than a vacation and came rank last in every baseball tournament held there.\nUntil 1949 the sport was a featured in the National Games but few teams participated and the quality of competition was abysmal. Following the Cultural Revolution the People's Liberation Army adopted baseball as a sport but in 1961 the sport was removed from the national games of China and wouldn't appear again until the 1970s.\nBaseball in China Today\nBaseball has a powerful new sponsor in China. Leon Xie the former sponsorship director for the Olympic Games in Beijing decided that it was time to make baseball popular in the nation. In 2008 when he took the task on, there were less than 10,000 baseball players in the whole of China. That's out of 1.3 billion people! When the professional teams went on tour they'd attract less of an audience than an escaped chicken according to Mr. Xie.\nIt took less than 4 years for baseball to become one of China's most popular sports. During rush hour travel in Beijing commuters can watch This Week in Baseball in Mandarin. The government now broadcasts baseball on 10 different channels. There's been a connection made between China's Confucian values and the game itself.\nOf course the game itself is still developing. You can find a baseball match in any town during your China vacation (just ask in your hotel and they'll point you in the right direction) but the players are still years behind their American equivalents. One thing's for certain – given the amount of political will for Chinese players to get better, one day there might just be a Chinese team in the world series.\nA China vacation is often an exhilarating experience and you can find that you spend a lot of time on your feet. That's great, you choose a China tour because you want to see as much as you can but… there can be advantages to taking in some more relaxing places as you travel through China. You can take a load of your tired feet and enjoy the company of the people around you. A great place to do this during your China trip would be the Longsheng Hot Springs.\nThe best time to visit the Longsheng Hot Springs is probably after a long day's walking out on the Lognsheng Dragon Rice Terraces. The terraces are spectacular and one of the “must see” items during a China tour but there's a fair amount of trekking to be done to get the best of them and when you're done a rest may be well in order.\nAbout the Longsheng Hot Springs\nThe Longsheng Hot Springs are a short trip in a taxi from the terraces and can be found near the Jiangdi Village to the Northwest. The area itself is a natural wonder and the Chinese government awarded it a AAAA (the highest possible grade) scenic zone status back in 2007. Given that space is often at a premium in China that's an extraordinary accolade to be bestowed on a place and it means that the countryside and spring area really is first-rate.\nThe water is extremely healthy. The National Ministry of Geology and Mineral Resources has confirmed that there are ten elements present in the water which have been shown to benefit human health. That includes; Iron, Zinc, Copper, Lithium and Strontium. The mineral rich water has also been confirmed as safe to drink by China's Ministry of Health. That means you don't have to worry too much about swallowing a little if you decide to jump in and splash around during your tour of the area.\nThe water is very warm. It stays at a temperature of between 48 and 58 degrees centigrade all year round. That's thanks to the dormant volcanic system running underground. It's that heat that pushes the water up through the rocks. As it travels through the rock it becomes purified by multiple layers of rock which acts as a filter and adds the precious mineral content. Visitors come from across China to enjoy bathing in the area.\nThe locals refer to the Longsheng Hot Springs as a “fairyland on earth” and while we're not sure that we'd go quite that far, it is an absolutely lovely place. So while you're wandering around the Longsheng Dragon Terraces during your China vacation you might want to think about taking that well-deserved break from your China tour and soothing your aches and pains away in the beautiful hot water of one of China's most pleasant natural hot springs. You should be aware that swimwear is required to take a dip, so make sure to pack some.\nThere can't be many materials that are so firmly bound up in mystique and sensuality. During your China tour you're bound to come into contact with what was once China's most valuable material; silk. You'll be pleased to know that there's no longer a death sentence for possessing silk (which was the case during the earliest periods of China's history) so feel free to bring some back as a souvenir from your China vacation. As you travel China you'll see so much silk that it's natural to wonder how it came to be so important.\nA History of Silk\nIt is said that the wife of the Yellow Emperor a Goddess known as Lady Hsi-Ling-Shih discovered the properties of the silkworm and invented both the silkworm farm and the loom to process the raw material. There's certainly plenty of evidence to show that silkworms were cultivated in China even earlier than that and there's a recent dig from the Yangtze River area where it's been established that silkworms were farmed nearly 7,000 years ago. Sometimes as you'll probably discover during your China vacation, the truth is even more impressive than the legend.\nThe Silkworm – Not a Worm at All\nIf you visit a silk farm during your China trip, you'll be amazed to learn that silkworms aren't actually worms; they're caterpillars. There are many different silkworms as there are many different silk moths around the world. However, the most productive was only found in China – it's a blind and flightless moth (which might explain why it didn't travel naturally outside of China) with a life span of only a week. During that week it will lay 500 eggs (or sometimes more). These eggs are so tiny that it takes over 100 of them to make a single gram of eggs.\nYou need an ounce of eggs to produce nearly 30,000 worms. Those worms can then consume over a ton of leaves from the mulberry bush. How much silk will that produce? Only 12 pounds. That's after 6,000 years of specialist breeding programs to make the moth's offspring the most productive they can be. This is one of the reasons that silk is as expensive as it is, so don't expect too many bargains on your China tour.\nEach silk worm produces a thread of between 500 and 1,000 meters in length. It takes the threads of up to 8 worms to produce a single thread of silk. During the process the silk worms must be kept at the same temperature throughout and must be protected against both noise and odors.\nSilk in China\nIn the early years of silk production the fabric was reserved for imperial use up until the 6th or 7th century A.D. anyone taking a silkworm egg or cocoon out of China would be executed. When the Han Dynasty came to power silk was considered to be a currency and the Chinese farmer would travel great distances to pay his taxes in silk as well as grain.\nChina lost its monopoly on silk many years ago but even today it is one of the largest silk producing nations on earth alongside Japan. If your China tour gives you the opportunity to visit a silk farm you should go and hear the noise of thousands of silk worms eating mulberry it sounds like rain on a tin roof. Silk provides a great opportunity for you to bridge the gap between modern and ancient China during your vacation.\nWe recently took a look at the opportunity to catch a baseball game during your China vacation; this week we're going to take a look at the chances of catching an NFL game. You might think that it's impossible to see American Football during your China tour but it really does depend where you're going to visit. If your China trip is taking in Shanghai you'll be visiting one of only four places in the world where the NFL has an office outside of the U.S. The sports travels in China haven't always been the easiest but there's no doubt that there's a firm will to bring the game to life here.\nSome dismiss NFL China as an impossibility. They say that if you travel round China the people are too small and the culture to adverse to risk taking for American football to thrive. That's ignoring the fact that 1 in 5 of the world's people is Chinese and that there is huge diversity here. It also fails to recognize that Chinese people are becoming much bigger now that the economic opening up of the country is leading to a better diet for the people here. It is true that team sports haven't always been popular but exposure to international sports on television has encouraged kids to get involved. Sure some will still trip over their feet but that's true everywhere and not just in China.\nThe Truth of the Matter\nIn China's major cities and particularly in Shanghai; American Football is one of the fastest growing sports in the nation. The youth of China is taking a trip to the sports store and kitting themselves out in the pads, cleats, etc. that are necessary to get involved. There are almost 40 university team running games on a weekly basis and the league they're in is sponsored by the NFL. Millions of Chinese families sit around the TV on a weekend and watch the action both locally and in the United States. American expats on their corporate tours of duty are also heavily involved with promoting the game in China and ensuring that real enthusiasm develops at a grass roots level.\nYouth is the Key\nIf you're passing through Shanghai on your China vacation and you'd like to see how the sport is developing here – check out the China Sea Dragons. They're the most successful team in the Chinese youth leagues and they travel throughout the country demonstrating their skills to other children. They say they love the game and it gives them a chance to try something truly exotic. It's nice to be one of the first people to do something even here and there's real enthusiasm for the players about the possibilities of international competition one day.\nYou won't find a big well organized professional game just yet but that's half the fun. You're on vacation in China and that means enjoying the way the country is developing. Catching your favorite sport in action is just an added bonus.\nIf you're heading to Xi'an on your China tour you'll probably be excited about the terracotta warriors. It's worth noting that there are other things to do in Xi'an that might also be worth your time on your China vacation. If you travel to Yan Ta Road; you'll find one of China's largest museums. It's definitely worth the trip as it's housed in an impressive modern take on Tang Dynasty architecture and is considered to be a national treasure of China in its own right.\nAbout the Shaanxi History Museum\nIIn a country which likes to build things big there's no doubt that 60,000 square meters of floor space for a museum is exceptional. If you're going to take a trip out here you'll need to be prepared for some serious walking around the exhibits. The exhibit focuses mainly on China's history through Shaanxi territory.\nIHowever, in the first exhibition hall you'll find 2,700 works of art spread over 2,300 meters of corridors to enjoy. It's not until you move through this that you'll find the Shaanxi relevant exhibition which is spread over three rooms covering nearly 5,000 square meters. Your tour through China's dim and distant past begins with the rise of the Zhou in pre-history and then you travel through the Qin, the Han, the Wei-Jin (both Northern and Southern dynasties), the Sui-Tang before accompanying the more recent dynasties of China's past the Song, the Yuan, the Ming and the Qing.\nIThere are nearly 2,000 objects which illustrate the march of Chinese history and it's perhaps the most complete collection that you'll find on a China vacation. The earliest ceramics are still vibrantly painted; the bronze weaponry and art of the Zhou remain burnished and impressive throughout. It's also really quite amazing to see how the Tang Dynasty prized objects of silver and gold.\nIThere is also a series of temporary exhibits on the Eastern wing of the museum. The paintings taken from the walls of the Tang-tombs are the finest examples of funereal art from this period in the whole country. These paintings are rather more permanent than temporary but the rest of the collection changes at a whim and you never know what the museum's curators will be sharing from month to month. It makes for a pleasant surprise and ensures that your China tour is always different to someone else's.\nYou will also find that there's an enormous “special exhibition hall” and the special exhibitions may draw from any of the collections across China's most famous museums. There are no guarantees that they'll fit the overall theme of the museum as they are designed to keep local people coming back to experience new aspects of China's history. They are always worth a look though.\nIn total there are over 115,000 works in the Shaanxi History Museum which present a complete picture of Chinese history through a single place. So when your China trip passes through Xi'an you might want to take a break from your tour and go and soak up a place that many never get to see in their hurry to the Terracotta Warriors.\nIf you're taking a Yangtze River Cruise as part of your China tour then you'll be visiting Chengdu. Chengdu is one of China's nicest cities and it's home to the panda sanctuary which many people count as the highlight of their China vacation. However, many people have never heard of Chengdu before they make their trip so we thought we'd share a few interesting facts about the city so you can enjoy the thought of going to Chengdu even more.\n- Soon Chengdu will be joined with Chongqing the largest city in Sichuan and the former capital of China by the world's largest industrial developed zone. So getting there today on your Yangtze River Cruise may be a priority as the surrounding area won't be anywhere near as pretty when they've finished the construction of the zone.\n- It's not just holidaymakers who make the trip to Chengdu. Chengdu is a firm favorite with multi-national companies and the city is home to 133 out of 500 of the world's biggest companies. With Microsoft, Ericsson, Sony and Toyota amongst the best known foreign brands who've made Chengdu their home in China.\n- Chengdu was founded in 311 BC and has been the official capital of Sichuan province ever since. Whilst Chonging is technically in Sichuan it's so big that it is considered a separate province from a government perspective.\n- If you've got a bit of money left after souvenir shopping on your Yangtze River Cruise you might spare a thought for the fact that the very first paper money used anywhere in the world was invented in Chengdu and it was the first place that it became widely accepted too.\n- Not one but two breakaway kingdoms in China (the Dashu and Daxi) made Chengdu their capital but both were forced back into the fold quickly.\n- If you'd like a little slice of Americana in Chengdu then there's a fun (but infamously unsafe) theme park, Happy Valley, just a short trip from the city center. We don't recommend that you take any time out of your China tour to visit it though.\n- For a more somber time Chengdu is also home to the museum which commemorates the victims of the worst earthquake in China's recent history. The Winchuan Earthquake Museum remains practically unknown outside the country.\n- There are 10 UNSECO world heritage sites within driving distance of Chengdu including the Dujiangyan Water Project, the Leshan Grand Buddha and the Sanxingdui Ruins.\n- The city's reputation for arts, crafts and business comes from World War 2 when Chengdu became a safe haven from the Japanese. Many academics and traders made the trip across China to hide out in Chengdu and many of them stayed even after the Japanese had been run off.\nChengdu is a truly amazing city and the perfect place to catch your breath after the excitement of a cruise on the Yangtze River. It's justly famed for its hospitality and Sichuan food is amongst the tastiest in all of China. We know you'll enjoy your vacation memories of the people and the sites and we hope that you can't wait to visit because we can't wait to show you round.\nA little while ago we took a trip through the past and examined China's Xia Dynasty. Today we're going to look at the Shang Dynasty. One thing's for certain on a China vacation; you'll be exposed to huge amounts of history. We think it's a good idea to get better acquainted with the backstory before you begin your China tour so that when you travel round China you'll be able to fully appreciate everything you see.\nIntroducing the Shang Dynasty\nIf you'd made your trip to China back in the 16th and 17th centuries BC you'd have found it hard to recognize the place. The Shang dynasty controlled only a small fraction of the country's current area and their capital city would have been found in Anyang (a long way from Beijing). Much of the ancient capital has been excavated and this part of Chinese history is extremely well documented when compared to the Xia. The Shang Dynasty oversaw the development of the written word in China and it is clear that art, medicine and economics were all beginning to be understood during this period.\nA Little History of A Kind\nIt is said that the Shang Dynasty began when the wife of Emperor Ku accidentally ate an egg that was dropped on her by a large black bird. This event is said to have sparked an immaculate conception which led to the birth of Yu the Great who became renowned for his great service to the Xia Dynasty. 13 Generations later his great-great (and a bit more great)-grandson Tang defeated the last Xia Emperor at the Battle of Mingtiao. He would found a great capital which would then travel round China least 5 times during the course of the dynasty until it finally settled in Anyang.\nThe people of the Shang Dynasty almost certainly chose Anyang for its proximity to the Yellow River and during modern scholastic tours of China there has been an enormous amount of evidence to place the Shang Dynasty's holdings along the length of the river. In fact it was a chance encounter during just such a tour in 1899 that led to the discovery of ancient bones being sold in local pharmacies – that led to a huge archaeological dig throughout Henan province that finally proved the existence of the Dynasty once and for all.\nWhat will I see of the Shang Dynasty?\nUnfortunately modern Anyang isn't the most developed of areas and at the moment there are no trips to that part of China. However, in many of the museums in Beijing and Shanghai you can see the bronze working for which the dynasty is famed. Unlike in many Bronze Age societies the Shang didn't use the metal exclusively for weaponry and they also applied their craft to art. The Houmuwu Ding is the largest and most ornate example of this so far excavated in China.\nIf you're really lucky you may see some of the chariots that would have carried China's finest warriors of the time in to battle. There are also many displays around the nation that you may encounter on your China vacation of the ornate axes and armor cast from bronze by the Shang Dynasty. What's really incredible about the Shang Dynasty is that the amount of surviving material from the dynasty dwarfs any other comparable ancient society in the world. There is far more material from this part of China's history than there has been discovered in the Egyptian pyramids for example. You'll definitely encounter some of the finest examples during your journey through China.\nWe've found that many people would like to know more about Chinese culture before their China vacation. They want to fully immerse themselves in China so their tour is a deeper and richer experience. One of the best ways to understand China is to travel with a guide and you can do that when you read Chinese literature without ever having to leave home. Perhaps the finest introduction to China can be made through the greatest living Chinese author you can take a trip through China through his eyes and really appreciate the nation in a very different way.\nAbout Jin Yong\nJin Yong was born on the 6th of February 1924. He wasn't called Jin Yong then because it's actually a pen name. His real name is Louis Cha Leung-Yung. His writing career started at the relatively late age of 35 when he opened his first newspaper in Hong Kong; the Ming Pao. He also began writing fiction at around the same time and his last book was published in 1972. In total Jin Yong wrote 15 novels all of them in the same genre; Wuxia.\nWhat is Wuxia?\nWuxia is a genre that is almost exclusively Chinese. It describes the adventures of martial artists as they travel around China getting into (and out of) scrapes. The heroes are normally from the lowest order of Chinese society and are almost never from the noble classes. They are required to take a tour of China to right wrongs and oppose evil because of their ancient code of chivalry.\nJin Yong's wuxia novels are part of a movement that is known as the “new school” they took the ancient form of wuxia and blended in large chunks of romance and mystery in addition to the original action movie style concepts. The young hero invariably begins his travel thanks to the loss of a loved one and goes on to become part-crime fighter, part-problem solver and all round Chinese good guy.\nMost of the new school's novels aren't really novels at all. Instead these works of fiction were usually serialized in China's media and then compiled as books at a later date. Jin's debut novel was serialized in the New Evening Post and wasn't made into a book for several years. Today; The Book and the Sword is one of the best known works in Chinese literature.\nChen Jialuo, is hired to assist some Islamic Tribesmen who are pursuing a group of evil soldiers who have stolen their copy of the Quran. During his trials and tribulations Chen earns the respect of the tribes-people and the affections of the chieftain's daughter. They travel the length and breadth of China to rescue the holy book. They then return to the Muslim tribe's home but Chen is quickly embroiled in new adventures and has to fight for the woman he loves.\nWe said at the start of this piece that Jin Yong is the best-selling author you've never heard of. It's true too. His work has been translated into many languages and the current estimate is that he's sold 100 million legitimate copies of his work. This means that he's probably out-sold J K Rowling in truth. As you'll discover on your China vacation everything that can be copied will be copied in China. That means his sales figures are drastically under-rated as the vast majority of his sales will have been pirated works. If you'd like to start your China tour with a better appreciation of Chinese culture then Jin Yong's work is the perfect place to start.\nIf your China tour is passing through Beijing then you're guaranteed to visit the Ming Dynasty Tombs. This spectacular UNSECO world heritage site is an integral part of a China vacation in the country's capital. You'll have to travel a little way out from the center as they're 44 kilometers out in the Changping District.\nAbout the Ming Dynasty Tombs\nYour trip begins at Tianshou Mountain which was chosen by China's 33rd Ming Emperor (Yongle). He was also the emperor who chose to move the capital to Beijing from its previous location in Nanjing. He was the brains behind the construction of the original Forbidden City too (something else you won't want to miss during your China travel).\nBefore Yongle died he chose where he would be laid to rest and had his mausoleum constructed on the site of Tianshou Mountain. This started a bit of a trend amongst the Ming Emperors and after each one had finished his tour of duty running China they too would be buried in the same place. There are 13 Ming Emperors in total that chose Tianshou as their final resting place.\nThere is a missing Emperor from the period and that was Jingtai who was deposed by his brother and refused an imperial burial. Instead Jingtai was buried to the West of modern Beijing.\nAs you travel round the site you'll also notice that one of the Ming Rulers has a much smaller mausoleum than the rest. That was the final Ming Emperor; Chongzhen. He actually hung himself on the site and was buried in the tomb of his concubines as a punishment. However, the next Emperor of China; Si Ling decided that it would be deemed an Imperial Tomb after all and it is considered to be one of the official Ming Dyansty tombs now.\nThe tombs are placed over an area of over 40 square kilometers. The valley was chosen according to the principles of feng shui and it was designed to ensure the peace of the Emperors' spirits as they made the trip from the land of the living to the land of the dead. The Sacred Way (Shendao) is a 7 kilometer road along which you will travel to appreciate the majesty of this tribute to China's most famous dynasty.\nYou enter the complex through the gates of one of the largest stone archways in China; the Great Red Gate.\nHead for the Shengong Shengde Stele Pavillion and be certain you don't miss one of the best photo opportunities of your China vacation; there's a tortoise-dragon hybrid bearing a tablet of stone. That's a 50 ton tortoise-dragon hybrid to be precise. Strangely it's not even from the Ming Dynasty but was an addition to the complex made during the Qing Dynasty. On top of the tablet you'll see four columns and each column supports another mythical beast. Along the road there are additional pillars and a further 18 mythical creatures to enjoy.\nYou are then free to explore three of the tombs; Chang Ling, Ding Ling and Zhao Ling. The others have not been excavated as yet. In fact Ding Ling as we shall see in another article is the only one that has been fully excavated and is completely open to the public during your China tour.\nHong Kong often gets all the attention for those looking for a quick break from their China tour. However, there’s much to be said for heading to Macau on your China vacation as well or even instead. A trip to Macau lets you enjoy the unique blend of Cantonese and Portuguese cultures something that you can’t find anywhere else in China. If you time your China travel right you might also be able to get in on a few of the more interesting events that Macau holds each year.\nMacau Arts Festival (May to June)\nMacau comes alive during May as the whole place brings its artistic talents to bear in a long-running celebration of life and art. Galleries around the city open to bring you the best of local and international talents. The focus tends to be on vibrant, modern work and it can be quite a breathtaking experience. Those who’ve made the trip always remark on how vivid the experience and how modern-China’s culture can be much better understood through the works and the chance to speak to some of the Chinese artists.\nIf you can’t travel to China during May and early-June; don’t despair. There are yearlong rehearsals for the event and while they don’t offer quite the volume of displays as the festival itself, they’re well worth checking out.\nMacau Lotus Flower Festival (Late June)\nIf you enjoy floral displays then timing your China tour for the Lotus Flower festival might be the best thing to do. This annual event makes the most of China’s best known symbol from the plant world. There are exhibits throughout the area during this festival and it won’t be hard to stumble upon some of them. It’s a nice laid back affair thanks to the heat of the summer and wandering around outside with an ice cream in hand is thoroughly recommended.\nMacau International Fireworks Festival (September)\nIf there’s anything that the Chinese love more than fireworks we don’t know what it is. This festival isn’t any old fireworks display either – it’s a purely competitive venture. If your China vacation is during September then a visit to Macau will allow you to watch over 100 teams from around the world fighting it out to bring you the definitive pyrotechnic experience. The best place to watch it from is Taipa Island but you can grab a vantage point on the peninsula easily enough too. This is perhaps Macau’s finest hour and if you can you really should take an extra day out of your China tour to enjoy it.\nMacau Food Festival (November)\nIf you’re a foodie then the best time to travel to Macau might be November. China’s richest special administrative region goes mad during this time of year. You’ll be able to enjoy a blend of Mainland, Local, European and pan-Asian dishes everywhere. There are plenty of street stalls and even some tents and booths around to get stuck into the culinary treats. To add to the fun there are beer drinking contests and plenty of live entertainment too. It’s a great way to really enjoy the best food that China has to offer.\nThis is a great question and one we’re often asked when people consider adding Macau as a destination to their China vacation package. They wonder whether Macau will be similar to other places on their China tour or whether their trip to Macau will be completely different? There’s no doubt that if you travel to Macau you’ll see some noticeable differences from China’s Mainland but there are plenty of similarities too. Let’s take a quick look at what you might expect.\nLasting Portuguese Influence\nUnlike Goa (India) where the Portuguese population was slowly assimilated into the local one; the Portuguese culture remains distinct and to some extent separate from the indigenous Chinese culture. This is partly because the Portuguese maintained their presence on Macau until 1974. Most members of the Portuguese military would do a tour of duty in Macau to complete the requirements of their compulsory national service. Once they were there many fell in love with China and chose not to make the trip back home but rather to settle in Macau instead.\nYou’ll spend most of your China vacation in the North of China where everyone speaks Mandarin (Putonghua) in the South of China (excluding Shenzhen) almost everyone speaks Cantonese. This is true in Macau too. Portuguese is an official language and widely spoken too. English speakers are more common in Macau than on the mainland. You may also be able to find a Macanese speaker or two as well; this is a blend of several Asian tongues with a touch of Portuguese thrown into make it even more complex, it’s really interesting to hear.\nWhilst the Catholic Christian influences of Portugal are clear to see throughout your travel in Macau, the main religion is one adopted from mainland China – Buddhism. There’s also a clear sense of the people of Macau slowly shifting their whole culture to more closely mirror that of China. That means you’ll be one of the privileged few to witness this period of cultural transformation and to talk to people about how they feel about the transition. There is also a bit of resistance in the local youth who are now turning to the Protestant faith to counterbalance this change.\nFood in Macau is very different from much of the mainland. It takes Southern (Cantonese) Chinese dishes and adds a touch that’s uniquely Portuguese. The egg-custard tarts may be the best in the world and people talk throughout the region of this sweet dish with awed tones of respect. If you do take some time in Macau from your China tour you should also try the famous; Galinha a Portuguesa which is a sort of chicken and potato (or more unusually rice) curry which is baked in a dish and served with a golden brown crust. It’s absolutely delicious.\nTraditional Chinese Medicine\nIf you’d like to try TCM on your China vacation then you might enjoy doing so in Macau. The region has real ambitions of becoming the heart of TCM from an international perspective and you’ll be able to enjoy the widest range of possible treatments her.\nYour China vacation will often leave you breathless with the pace of life on the Mainland. However, if you fancy something a little more relaxed you might want to take a break from the thrills of your China tour and head to Macau for a day. Coloane village is the perfect place, on a China vacation, to discover traditional village life with a blend of Portuguese and Cantonese heritage.\nAbout Coloane Village\nColoane Village has a dark past. It was once the center of piracy on China's southern coast. The pirates would attack not just rich-merchant vessels but also poor fishermen too. They were amongst the most feared high-seas bandits of all time. When the Portuguese navy finally turned up in force on a tour of China to secure the colony they fought pitched battles with the pirates. The Portuguese finally overcame the threat in 1910 and if you take a look outside the chapel of St. Francis Xavier on your trip you'll be able to find a plaque commemorating the victory.\nThat's quite strange in its own right because the chapel itself wasn't built until 1928, though other chapels have stood on the site before. If you're hoping to get a feel for Christianity in China during your vacation this may be one of the highlights of your trip. It holds some of the most sacred relics in all of China. This includes the remains of 26 priests who were martyred in Nagasaki in the 16th century. There are also remains from Japanese Christians who fell during the Shimabara Rebellion.\nIt is said that the chapel once housed the arm of St. Francis Xavier though this can now be found in the Sacred Art Museum in Macau.\nIf you'd like to take in some Chinese traditional religions; then take a trip down the Avenida de Conce de Outubro in Coloane Village. Here you can find a Daoist Temple which is dedicated to the God of the Seas; Tam Kung. This God was said to have been able to predict the weather in China and ensure that boats which left port would always return. The temple is picturesque. It is also still in use and it's a nice place to learn about Daoism where it's more likely that the monks will speak a little English. It was constructed back in 1862 and is thus one of the older buildings you'll find in Macau.\nIn the same area you'll find another Daoist temple and it's also dedicated to keep seafaring travel as safe as possible. That's the thing with fishing villages in China – life has been very precarious for many of their inhabitants for centuries. It's nice to reflect that life is much safer than it has ever been as your China tour progresses round Coloane.\nThe Tin Hau temple is the only of only three examples of a temple dedicated to Mazu (or Matsu) in Macau. It is also the oldest temple of its type you will see on a China vacation. It was constructed back in 1448 and remains unchanged to this very day.\nAs you travel round Coloane you'll meet many locals who will normally be quite happy to engage in conversation. It's one of the highlights of Macau and a wonderfully peaceful moment compared to the hectic pace of China's mainland life.\nIf you're thinking about joining a China tour to take in Hong Kong then you might want to time your trip carefully. If your China vacation coincides with the dates 21st June to 31st of August 2013 then there's a bit more to see than usual in Hong Kong. The city offers the chance to participate in the Hong Kong Summer Spectacular and travel during this festival is always a little bit more interesting than you might expect. There are interesting events that demonstrate the culture of China's former British colony.\nHong Kong Dragon Boat Carnival\nChina's traditional sport is a reason to travel all on its own. The Hong Kong Dragon Boat Carnival is the largest dragon boat racing event in the world. If you'd like to get caught up in something truly unique on your China vacation this is the place to do it. 400,000 spectators watch 5,000 rowers from over 20 countries compete on the waters of Victoria harbor.\nThe boats are over 10 meters long and each boat is supported by heavy drumming. There are 20 (or sometimes more) oarsmen on board and the fight to the finish line is a grueling one. To make it easier to withstand the fierce summer heat they also hold a San Miguel Beer Festival so you can ensure that your China trip remains a comfortable one with a cold beer in hand for every event.\nThere are several concerts held at the Hong Kong Coliseum during the course of the Summer Spectacular. If you'd like to hear what the latest and greatest sounds are from China's pop artists there's no better time to do it. Tickets are generally cheap as they're subsidized for the event and last year the superstar Taichi was the main event. This year they're keeping the details close to their chests but you can be certain that whichever act is on tour for this – they'll be awesome.\nShop 'Til You Drop and Win Prizes\nThe festival also encourages you to splurge during your China vacation as there's always a shopping promotion on. Normally these promotions guarantee anyone spending a certain amount in participating outlets some gift vouchers or rewards. In addition you also get entered in a free prize draw to win some serious spending money. In 2012 there was also a competitive shopping event which may be repeated this year – Team China drew with Team Thailand to prove who could travel to the most stores and nail the best bargains.\nLan Kwai Fong Beer Festival\nIf you prefer somewhere a bit more relaxed then a trip to Lan Kwai Fong, Hong Kong's party district might be in order. It's a chance to try many of China's finest beers and in fact those from quite a few other countries too. There are normally mini-music festival events here too and you may be able to join in some of the impromptu eating and drinking contests as well. Lan Kwai Fong is very popular with travelers at any time of the year the Summer Spectacular just gives you another great reason to visit.\nIf you're thinking about taking in Hong Kong during your China tour we've got some interesting facts to share that we hope will improve your China vacation experience. Travel to China's former British colony is always fun but a little extra spice never hurts does it?\n- Hong Kong means fragrant harbor and as you might expect it's because it used to be quite stinky in the early years of its' being a port. Don't worry though, your China vacation will be much less fragrant as the island maintains very strict hygiene standards today.\n- Hong Kong is rumored to be the most densely populated place on earth. 7 million people share a tiny area of land. The strange thing is that it doesn't always feel that way with many areas of wide open space which are much less packed than they would be in mainland China. Travel around the city's museums and parks is always pleasant.\n- The city is home to the world's longest suspension bridge and you'll find the Tsing Ma Bridge just outside of the airport. It's worth taking a taxi over it at least once for the spectacular views on either side as well as the view of the bridge itself.\n- People drive on the left in Hong Kong whereas in the rest of China they drive on the right. This is a throwback to its days as a British colony. If you're thinking of renting a car during your trip you'll need to remember this.\n- Hong Kong is the world's leading city for skyscrapers. A skyscraper is officially defined as any building with more than 14 floors. You'll find over 8,000 of them on the island. By comparison New York only has 4,000.\n- If you like a little bit of luxury during your travel then you might want to track down a ride in a Rolls-Royce. There are more Rolls-Royces in this tiny place than there are on mainland China and there are more per capita than anywhere else on earth.\n- They don't speak Mandarin very much in Hong Kong. The first language of Southern China is Cantonese and most Hong Kongers (or Honkies) speak English as a second language.\n- This one's not something you'll really want to think about during your China vacation but one of Hong Kong's premier exports is umm… human waste. It's sold to China as a fertilizer and it ensures that the city's sewer system never becomes overloaded.\n- If you're worried that there's no greenery to see while your China tour is in Hong Kong you should be aware that over 40% of the island is dedicated to parks and nature reserves. You can hike the MacLehose trail for over 100 kilometers without ever seeing a building.\n- Hong Kong is the only place to see pink dolphins in the world. You can join an eco-cruise on the harbor to see them.\n- There is one restaurant per 600 people in Hong Kong. You could literally eat out every night for 3 decades without having to try the same one twice. It's why Hong Kong is a great place for a foodie's tour of all China's menus.\nWe hope you've enjoyed these fun facts about Hong Kong, we hope they make your visit just a little bit more fun.\nIf your China vacation takes you into Hong Kong you might want to try something a little different. Your China tour will give you some time to explore the city and while there are many things to choose from you might want to take a trip to somewhere a little off the beaten path. What could be more appropriate for China travel than a journey into Chinese tea culture?\nAbout the Flagstaff Tea Museum\nYou can find the Flagstaff Tea Museum in the heart of Hong Kong Park. If you’re really lucky you’ll have picked a day when it’s hosting a marriage ceremony. The area is quite lovely and China’s brides like to turn up and have their photographs taken there.\nFlagstaff House itself is one of the oldest colonial remnants in Hong Kong. It’s a strikingly British building and it was once the home of the commander of Britain’s forces in China. He’s taken a trip back to England since the handover but the building is now fully accessible by the public. It was declared a national monument in 1989 for its distinctive architecture.\nUp until 1932 Flagstaff House was called Headquarters House. When it was built back in 1846 it overlooked the British naval barracks that was stationed on Queen’s Road. These barracks are no longer there so don’t waste any time on a trip to find them.\nIt’s a curious truth but no-one knows who designed the building. There are long debates between China’s historians as to whether it was a Scottish Chap called Murdoch Bruce (better known for inspecting rather than designing buildings) or an English Gentleman from the sapper corps of the Army; Lieutenant Bernard Collinson. It’s certain that the first military officer on tour to be stationed in Flagstaff House was Major-General George D’Aguilar who move in before it was complete in 1844.\nWhen the Japanese invaded China the building was repeatedly shelled and both wings took a certain amount of damage from Japanese bombing campaigns. The Japanese commander like Flagstaff House so much that he moved in when his forces took Hong Kong. He wouldn’t remain there long and when they Japanese were expelled from the country the British took up occupancy once more. After the handover to China Flagstaff House was given to the Urban Council of Hong Kong to look after.\nThe tea museum that you’ll find there on your China vacation was installed during 1984. There is a permanent exhibition of tea through the ages which introduces you to China’s obsession with tea and how the plant has been embraced throughout the country to become its national drink. You can also see a temporary exhibition on how tea travels from the farm to every corner of China in a long and fascinating mix of modern and ancient supply chains.\nThe rest of the exhibition is made up of Chinese tea pots and Chinese Ceramics. There is also a slightly out of keeping with the rest of the collection exhibition on stone carving for calligraphy in Hong Kong. That’s probably because it’s the Hong Kong Museum of Art which sponsors all the collections at Flagstaff House.\nFor those taking a China tour that passes through Hong Kong Flagstaff House represents a wonderful chance to connect with the colonial past of the country. No China vacation is complete without enjoying a little tea either – so what better place to find out more?\nWe've seen that sometimes it can be hard to understand the depth of Chinese history during a China tour. You'll visit so many places on your China vacation that you may find that it's awkward to pick out the details from each other. One of the key concepts you'll encounter during your China travel will be the dynasties of China. Each dynasty refers to a specific period in time and the leadership of the country at that point. We'll start introducing them today by taking a trip back in time to China's earliest dynasty the Xia Dynasty.\nXia Dynasty – What We Know\nThe Xia Dynasty was the first ruling family in China and they rose to power in the year 2070 B.C. (or thereabouts) and held on to it until around the year 1600 B.C. The date is given differently in each record so it should be treated as a reasonable estimate and not a hard fact. The little bit we know about them has been handed down through the ages in Chinese historical chronicles. These chronicles all date from 1300 B.C. onwards. In the times of the Xia Dynasty there was no written medium that would have lasted long enough to be reviewed by modern archaeologists.\nThe Dynasty began with a tour of duty. The general “Yu the Great” began a campaign to unite China and established himself as the first emperor of China when the last emperor of the 5 emperors (who ruled the separate states that would soon form ancient China) bent his knee to him and conceded defeat. Interestingly, the 5 emperors were reputed to be wise and honest men.\nWhat We Think Might Have Happened\nYu the Great's father was a man called Gun. He is reputed to have been executed for failing to stop the Yellow River (the Huang He which is the second longest river in Asia after the Yangtze) from flooding the plains around his emperor's home. His son Yu was asked to travel home to witness the execution and to fix the problems that his father had failed to fix. It is said that in order to do this he took a long trip around all the neighboring towns and united the people to help him dig a network of canals that would redirect the flood waters.\nThis further increased has popularity with the people and Yu was credited with the rising influence of the newly prosperous Xia people. Yu rose to a position of leadership and established his military credentials by crushing the Sanmiao tribe who had been raiding the Xia's borders. His emperor was impressed by his courage and when the emperor was dying he named Yu his successor. His dynasty would then continue for nearly 500 years…\nOr Perhaps Not\nAs you'll discover on your China vacation there's plenty of healthy academic debate over Chinese history. The facts above are strongly disputed by many of China's leading historians. They point out that the “documentary evidence” shares little with the reality of archaeological discovery. However, in 2011 an imperial palace was found on the site described in these tales and has been carbon dated to support the story above.\nWhatever the truth it's highly likely that you'll see some pieces from this time period in any one of the many museums you visit during your China tour. A trip through China's history is all the better for a little mystery and this one is interesting enough that they'll probably still be talking about who is right in a hundred years' time.\nThere’s plenty of history to be found on a China vacation. However, if you’d like to take a little diversion when your China tour hits Beijing you can explore the most ancient history of all. The Geological Museum of China lets you travel through the country before any human beings had arrived. As you might expect there are plenty of interesting rocks to be found but there are many other good reasons to take a trip across the city to visit a museum that so many visitors miss out on.\nThe Geological Museum of China – Where is It?\nThe museum can be found in the Xicheng District of China which is relatively easily accessible by taxi and also by Metro. The museum is on the Fujing Culture Street which is also called the Fuchengmen-Jingshan Tourism and Culture Street which doesn’t exactly trip off the tongue easily. It’s a good place to see a whole host of other places too – you’ll find the only example of two Imperial dynasty’s temples side-by-side in the whole of China. There’s also a great Buddhist Temple in the form of Guangji Temple. If you’re a literary expert then the home of Lu Xun is also a Museum to his work and can be found on the same street.\nThe Beijing authorities have spent a lot of money during the Chinese Olympics to make this a nice area and if you travel down the street – you can enjoy the best pavements and walking spaces in China.\nThe Geological Museum of China – What’s There?\nThe museum is one of China’s oldest modern museums and was built in the early 20th century in 1916. Today it has over 200,000 examples of “geological specimens” which sounds less interesting than the reality.\nThe best reason to take the time out of your China tour to visit is the chance to come face-to-face with the “Sinornithosaurus” which is better known as the “Giant Shandong Dinosaur” which would have roamed the land nearly 140 million years ago. Why is it the best reason to come? It’s because it is reputed to be the largest dinosaur fossil in the world and it is also incredibly well preserved. In fact there’s a huge fossil collection in the museum and there are dozens of examples of species that can only be viewed here. We think it’s worth the travel across Beijing just for that.\nIf people are more your thing than dinosaurs then the earliest remains of humanity in China are also in the museum. The teeth of Yuanmou Man are on display alongside Stone Age remnants from sites excavated across China; including the Peak Cave Man site.\nThe rocks themselves are worth a look. The crystal formations are really superb and there’s the world’s largest Cinnabar crystal to enjoy too. Sometimes it’s nice to do something completely unique during a China vacation. Why not take a break from your China tour and be one of the very few visitors to Beijing who enjoy the spectacle of China’s most ancient history?\nLast week we took a look at some of the unique sports you might encounter during your China tour. This week we’ll branch out a bit further and examine some of the aerial sports you might come into contact with on your China vacation. These are performed through the year so you don’t need to travel to China at a particular time to watch them but they are a little unusual so you’ll have to ask your China guide if there’s somewhere to see them during your trip.\nWhat are Aerial sports?\nBy this point you probably have visions of someone flying through the air on some kind of device. That’s pretty much the point though there are no helicopters, planes, etc. involved.\nThe most common aerial sport in China is Dang Qiuqian. It involves the folks involved dangling from ropes a reasonable distance away from the ground and then performing feats of physical dexterity on them. It’s quite breathtaking to watch as the performers are genuinely risking their well-being and if you can catch it you’ll get some of the best photos for your China vacation album possible.\nThe sport is supposed to have originated in the days of the Qing Dynasty (1644 – 1911 A.D.). The story goes something like this; the people of Jia Yi (a Chinese village) had contracted the plague and it was spreading like wildfire. Given the lack of medical facilities back then the usual way to combat the plague was to try and appease the spirits. So the folks of Jia Yi began to build temples to honor their saints who they hoped would intercede in the problem. It appears the solution worked (or at least they stopped dying from the plague).\nThis left the folks of Jia Yi wondering how they could keep the saints on their side for the future. They decided to do this by holding celebrations for each saint on their special day. They’d travel China looking for more and more interesting ways to make these celebrations special for the saint. One local was passing through a village when he spied a little girl playing on a swing. He was so impressed by her skills that he made the trip back to Jia Yi to introduce the game. Dang Quiqian is translated as “to have a swing”.\nToday the best displays of this sport are to be found in the Korean and Bai communities in China. They go all out to decorate the swings and wear their finest clothing to make the display as eye-catching as possible. The ropes are designed to enable participants to swing up into the trees nearby and collect ribbons from the branches – it’s hard to watch this without flinching, as there’s a real risk of a performer smashing into a tree.\nThe other aerial sport to be found during your China tour is called Tioban. The rumor is that it was invented by two young ladies who had been separated from their men because the men had been jailed. There weren’t any visiting hours in China back then so they decided they would have to see over the walls to get a glimpse of their loved ones.\nThey invented a “springboard” with a pivot in the middle. As the players jump up and down they travel higher and higher in the air. The boards themselves are nearly 6 meters long and participants end up 2 or 3 meters above the ground during the game. To keep things interesting, they perform acrobatic feats such as back flips while they’re up there.\nYou can find Tiaoban being practiced throughout China and if you’re there during any major festival on your trip – you’ll see public displays in almost every city you visit.\nWe're often asked; what sports are unique to China? We've found that there are an enormous variety of local sports many of which you might be able to catch during a China vacation. So if you'd like to see some of the Chinese talent embracing their own games during your China tour we've put together a quick guide to some of them. If you're lucky you might even get a chance to take part in some of them on your trip.\nCuju – The Oldest Game of Football in the World\nIf you thought that soccer was a recent invention, you'd be surprised. In fact the earliest form of football known to man was being played back in the days of the Shang Dynasty in China (that's somewhere between 1600 and 1100 B.C.). It would have been hard on the feet as player's used a stone ball and it was designed to toughen up warriors before combat. Back then there were at least 25 different rule sets so it's hard to say precisely what the rules would be.\nThe first Chinese football club was formed in the Song Dynasty (1127 - 1279 A.D.). In that time it was China's number one game and even members of the Royal Court would have been found kicking a ball about. However, it fell out of favor soon after and nearly disappeared until the present day. If you'd like to see Cuju during your China tour you'll have to time your travel to coincide with China's National Games of Minority Nation Sports. That's the only time when the sport is played at a competitive level for spectators.\nDa Tuoluo – Spinning Tops\nThis is another Chinese sport with a long history. There is a top recently excavated in China that was nearly 4,000 years old. It's a simple premise you use a whip to keep the top spinning and then drive your top into the opponent's top to knock it over. There's also a variation where the top is driven through an obstacle course. This game was popular with early Chinese explorers who came across it during their travel and exported it worldwide. Sadly it has fallen out of favor in the rest of the world but can often be seen being played by children in parks in China.\nBahe – The Tug-of-War\nThis sport is easy to find if you time your China trip for the Lantern Festival. It's common to all ethnic groups across China and is especially popular in rural locations. You can also see it at many sporting events for schools and colleges across the country. The rope is often made from bamboo and can be extended to enable a hundred or more participants. This is done by enabling additional branches from the main rope. It's a real test of coordination as well as strength and it's a very good natured event.\nGaoqiao – Stilt Walking\nYou can see this in many places during your China vacation. Legend has it that during the 14th century in Hunnan Province that poor people couldn't raise the money to buy good shoes. Sadly, that province is prone to heavy rainfall and their feet would become soaked and painful. To overcome this they developed stilts from bamboo which they could strap to their legs. Believe it or not despite the fact that they are nearly a meter high – people can (and do) run in them.\nChina has many sports for you to discover during China tour. We've just dipped our toes in the water with a few of the most popular here. Your China vacation can really benefit from a trip to see traditional Chinese games as they're a lot of fun and very much good-natured.\nThe National Art Museum in China is something special. If your China tour passes through Beijing you’ll have the opportunity to go exploring and it’s a place you might want to consider. One of the nice things about visiting this museum on a China vacation is to see how the Chinese react to art from other cultures. If your travel is during the next few months you’ll have the chance to see two new exhibits in China's most famous home of the arts.\nTwo New Exhibitions\nOne thing you’re almost certainly not expecting on a China vacation is an exhibition dedicated to Spanish sculpture. Yet, that’s what you’ll see on a trip to the National Art Museum at the moment. They have an exhibition of nearly 80 sculptures and drawings which capture the essence of Spanish sculpture during the 20th century. You’ll travel through the century from Picasso to the completely different aesthetics of Barcelo.\nThe challenge here both for China locals and foreign visitors is to detach your conceptions of how the human body should be rendered. This show is not about realism but rather expression. The works of Gargallo and Gonzales offer the chance to appreciate how large iron works can display the human form in a variety of ways and how abstract can transform that vision.\nOf course there’s a nod to the surrealist movement and both Dali and Miro are represented in the collection too. The exhibit then moves on to encompass the constructive conceptual and expressionist periods of the 1980s. It’s a unique opportunity to take time out of your China tour and experience something truly different. The nice thing about this exhibit is that each sculpture is accompanied by drawings from the artist that were used to give their vision form.\nThe other new exhibit is Transportation and is a study of modern visual art. Here you’ll find many “made in China” pieces as electronics and green-tech and a certain amount of animation take center stage. Transportation was developed by Tsinghua University (one of China’s top 3 universities equivalent to Harvard or Yale back home perhaps) and it takes guests on a trip through motion and the way it interacts with our own behavior to form new art.\nThis collection includes the work of Tim Hawkinson (an American) whose piece “Gimbaled Klein Basket” has a basket suspended in the air in perpetual motion thanks to the cunning use of electronics. It demonstrates as it travels through the air the idea that action is created even through the slowest of motions.\nMany of the pieces in this exhibition are interactive and there’s a slightly strange piece from Lawrence Malstaf (of Belgium) which leaves you lying (absent your shoes) on a conveyor belt as you travel in the opposite direction of someone else doing exactly the same thing.\nOf course there’s plenty of China’s own art in the Museum and taking a break from your China vacation to check out the exhibits doesn't mean that you should miss out on the greater collection. It can be nice to check in with other cultures as you enjoy China though and this is a great opportunity to do just that.\nWe've looked at many of the religions you may encounter on your China tour already. However, we haven't really checked out Daoism/Taoism yet. On your China vacation you'll find that Daoist beliefs are among the most pervasive in the country. Unlike Buddhism, Daoism didn't travel to China from elsewhere - it began there. That makes it one of the only indigenous beliefs still remaining today.\nThe Origins of Daoism\nBack in the 6th century B.C. a philosopher called Laozi wrote a book called; Dao De Jing. He had no idea that this would transform into a religious text in the centuries following his death. He was only outlining the principles he believed the world and people should live by. These principles would be refined by others over the coming centuries. In particular China's 4th century (B.C. again) philosopher Zhuangzi would describe his travel through his own consciousness in the “Butterfly Dream” and directly connect it to Laozi's teaching.\nBanging Heads with Buddhism\nBuddhism made the trip from India to China during the early centuries AD. Daoism had been established as a formal religion in the year 100 A.D. Zhang Daoling had taken up a hermetic life and spent much of it developing a codified formal version of Daoist principles which would become the basis of the Dao religion.\nMuch is made of the similarities of the two faiths but there is a central difference. Buddhism espouses that life is pain and suffering. Daoism does not. Daoists believe that life should be a generally happy event. They both believe that life should be lived on a path of virtuous balance with nothing taken to excess.\nThis led to a certain healthy conflict between the two initially but disputes became more fractious as each religion attempted to assert itself as China's official religion. The initial trip to the top was won by Daoism, which was later supplanted by Buddhism and finally Daoism won out when Buddhism and other foreign beliefs were (for a time) purged from China by the imperial court.\nThe Principles of Daoism\nOne thing you're certain to encounter during your China vacation is the yin and yang of life. This is a Daoist principle of harmony between opposite forces which is often simplified to male and female forces in literature. The Dao itself is the way that these two forces drive everything in existence. The Dao is considered to be ineffable and to guide even those who do not believe in Daoism.\nDaoism also combines the early ancestor worship of China with the more modern principles of the faith and it is important to recognize the importance of people's spiritual descendants even now in China. The Tomb Sweeping holiday is a reflection of this and a day is devoted to appeasing and pleasing the spirits of those now departed every year. Daoism encompasses reincarnation too and the final point on the Daosit path is immortality.\nWhat's to See?\nDaoism suffered a few setbacks following the Cultural Revolution but it is now back in full force across China. During your China tour you'll be able to see one (or more) of the 1,500 temples of Daoism in the country. It's a unifying faith in that many members are from the ethnic minorities of the country as well as the Han Chinese majority.\nYour China vacation will offer many spiritual opportunities but one of the most unique experiences you have will be when you travel to a Daoist temple. It's China's own religion and unlike Confucianism (which is more of a guiding principle than a faith) it's a vibrant and thriving faith in modern China.\nIt's quite possible to take a tour of China and never connect Islam to the country at all. Many people take a China vacation and leave without ever encountering a Chinese Muslim or seeing a mosque. In fact, China has a reasonable number of Muslims but most of them live in Xinjiang province which is seldom visited by foreigners. However, Islam made the trip to China during the 7th century and one of the most impressive remains of China's Islamic past is the Great Mosque of Xi'an.\nAbout the Mosque\nYou'll need to take a trip up Huajue Lane (past the famous drum tower – Gu Lou) to find it. It's one of China's oldest, biggest and most cared for mosques and it's in absolutely superb condition. It's not immediately apparent from the outside that it is a mosque at all as there are no minarets adorning the grounds.\nThere is a stone tablet that was found within the grounds that suggests the mosque was built during the Tang Dynasty (618 – 907 A.D.) and was either started or completed in 742 A.D. Merchants from central Asia and the Islamic nations of the Far East would travel into China down the old Silk Road. This profitable trade route would have brought Persians and Afghans in particular into China and many of them married Chinese women and chose to retire in the country or set up businesses there. Even today the Old Silk Road offers a unique opportunity for trade with China, though travel along it is difficult for tourists thanks to the difficulties in obtaining visas for all the countries along the route.\nThese merchants and their Muslim descendants played an important part in the unification of China during the later dynasties and many mosques would be constructed as a reward for their faithfulness. However, it is likely that the Great Mosque of Xi'an would have been funded by the Muslim community itself. You'll need to take a little time out from your China tour to explore the mosque properly as it covers an area of nearly 12,000 square meters. There are four courtyards on the grounds and each one is nearly 250 meters by 50 meters. They are well laid out so it's easy to take a trip round the mosque without crossing over your path too often. The architecture is a unique blend of China and Islam and you may never see another mosque like it anywhere in the world.\nThe first courtyard has a wonderful archway that was made out of wood in the 17th century and then coated in glazed tiling. In the next courtyard you'll find a stone archway surrounded by two steles. One of these is covered in the writing of Dong Qichang one of the most famous calligraphers in China during the Ming Dynasty. The other features the writing of a famous Song Dynasty calligrapher – Mi Fu.\nIn the next courtyard there are many steles to enjoy and the entrance to the Xingxin Tower where the prayers are held is here. Please note; you are welcome to explore the whole mosque as long as you are respectful but non-Muslims must not enter the Xingxin tower during prayers. The final courtyard holds the Prayer Hall itself and services often attract 1,000 or more people.\nIf you're at all curious about Islam in China this is the perfect place to stop on your trip. You're guaranteed a warm welcome and you'll be very pleased with the vacation photographs you take here of China's greatest mosque.\nBuddhism is subtly woven into the fabric of China. During your China tour you’ll come across many figures of the Buddha in temples and museums. We’ve found that you can gain a better appreciation of these images on your China vacation if you have a little background on their evolution. So let’s take a quick trip through China’s history and the evolution of the images of Buddha.\nBuddhism Arrives in China\nBuddhism was brought to China from India. People would travel across Asia to share ideas and beliefs and the legend is that it was the Ming Emperor (in A.D. 60) Liu Zhuang of the Eastern Han Dynasty who first accepted the tenets of the faith. He is said to have dreamed of a man in gold who came from a far off land. He demanded that his advisors explain the dream to him. One of his attendants reported that the man must be the Buddha that he had recently heard of. The emperor is then said to have demanded representations of the man so he could compare them. Sadly, these representations are no longer with us and you won’t be able to find any during your China tour.\nIt was during the period of the 5 Dynasties that Buddhism began to take more of a hold in China. Figures from this time are very similar to Indian figures of the Buddha and the only surviving representations are of the whole body of the Buddha – there appear to have been no simple carvings or reliefs of his image from this time.\nDuring the time of the Northern Wei Buddhism began to travel around China and local craftspeople began to add their own interpretations to his image. The most famous example of this can be found in Hebei in the Yungang Grottoes where two golden Buddhas may be found entwined in the same statue.\nAs the years progressed the Western Wei period took hold and the Grotto on the mountain of Majishan was said to hold a cornucopia of highly expressive Buddha carvings.\nAs the Northern Qi dynasty rose to prominence the art of the Buddha took a strong emphasis on character. Buddha began to be represented on colorful backdrops and in group scenes with his family. If you’re lucky enough to see these on your China tour they are perhaps the most striking examples of Chinese influence in Buddhism of any era.\nThe Sui Dynasty changed direction again by concentrating on stone carving rather than more delicate images. You’ll very likely see some examples of this work during your China vacation and the figures tend to be large, imposing and impressive. There’s particular attention paid to his physical gestures and clothing in Sui work.\nThen during the Tang Dynasty the Chinese decided that the form of the Buddha was important. Art from this period focuses on light, thin clothing that enables an image of the body behind it to be projected to the viewer. Subtle curves of the chest and arms give an almost feminine appearance to Buddha images made then.\nThe images made during the Song Dynasty aren’t as good (in general) as those from the Tang Dynasty but there’s a subtle expression of personality and psychology in this era that can’t be found in other periods. The facial features are extremely detailed. Chinese Buddhism offers a wide range of Buddha images and if you look carefully during your China vacation you’ll quickly be able to identify which period an image was made in. Your China tour will certainly take in Buddhist temples and it’s nice to be able to feel involved in the art they offer.", "label": "No"} {"text": "When ranchers Doyle and Brenda Burden of Weeletka purchased their land over two decades ago, they noticed a big area of saltwater erosion from an old abandoned well site. The Burdens worked their way around the hazard and avoided the area as best they could. Years later, Doyle saw a commercial for the Oklahoma Energy Resources Board well site clean up program and decided to give them a call.\n“They came out, and sure enough, there were three oil production sites that had been abandoned decades ago.” Over nine months, the OERB cleaned up the three sites on the Burden’s property, restoring the land back to its original pristine condition—at no cost to the Burdens.\nThe OERB was created in 1993 and is voluntarily funded by the oil and natural gas industry. Oklahoma producers and royalty owners contribute to the program through an assessment on the sale of oil and natural gas with a mission to clean up orphaned and abandoned well sites across the state.\nFor over 20 years, the OERB has restored more than 16,000 abandoned or orphaned well sites in 71 of 77 Oklahoma counties at a cost of nearly $113 million to date. The OERB currently cleans up 2–3 sites a day.\n“I just couldn’t be happier with what the OERB has done. And it was all free. How can you ask for anything more?” asked Doyle.\nTo hear more landowner stories, and to see our progress in action, click here.", "label": "No"} {"text": "The Mexican department comprises 0.7 ha of the Garden. Mexico is a mountainous country, with complex relief, and is distinguished by the interchange of deserts and humid subtropical forests. It is located in south-western part of the Northern American continent. The Mexican seaside climate conditions are not substantially different than the Batumi seaside but our climate it is radically different than the climate of Mexican dry plateaus.\nAccording to inventory data of 2014, the phytogeographic department of Mexico registers 38 species of 23 genera. Of these, 7 species are included into the International Union for Conservation of Nature (IUCN) “red list” of endangered species: Abies religiosa, Cupressus lusitanica, Cupressus guadalupensis, Pinus Montezumae, Pinus oocarpa, Pinus patula and Taxodium mucronatum.\nMexican Stone Garden\nThe succulents of the dry plateaus of Mexico, deserts and semi-deserts are cultivated on the elevated plains of the Garden’s southern slope and a beautiful feature of the phytogeographic department of Mexico.\nAccent plantings of agave, yucca, cereus and prickly pears are found on the succulent hill. A combination of stones, sandy stones and shells contribute an essential element in this garden.\nIn Central America, the alcoholic drink “Pulque” is produced from flower stem and leaves of the agave and sisal rope is produced from its leaves.\n13 species, 7 genera, 4 families are in the collection on the succulent hill, in particular Agave americana, Agave americana v. variegata, Yucca gloriosa, Yucca aloifolia, Yucca elephantipes, Beshorneria yuccoides, Cereus peruvianus, Opuntia ficus-indica, Dasylirion wheelerii and other species forming a rare and attractive display.", "label": "No"} {"text": "This collection contains 617 photographs in 8 albums documenting Los Angeles plague outbreaks in 1924-1925. The first album\ncontains an index, which covers all 8 albums. The index headings have been used in the container listing to group the photographs.\nSome headings have been supplied for the container list. Included in all 8 albums are views of buildings, alleys, restaurants,\nand city dumps where infected rats were found or where human cases were reported. Some images show preventative measures taken\nby the State Department of Public Health to stop the spread of disease, including the destruction of buildings. Many of the\nstructures pictured are shacks and other low income residences. Captions identify a \"Mexican Village,\" \"Chinatown,\" and \"negro\ndwellings\" in various locations. Some photographs in the first album show trapped rats and squirrels. The photographer or\nphotographers are unknown, but the collection was possibly photographed by the California Department of Public Health. Typewritten\ncaptions are found below the photographs, and are reprinted in the container listing.\nCopyright has not been assigned to The Bancroft Library. All requests for permission to publish photographs must be submitted\nin writing to the Curator of Pictorial Collections. Permission for publication is given on behalf of The Bancroft Library\nas the owner of the physical items and is not intended to include or imply permission of the copyright holder, which must\nalso be obtained by the reader.", "label": "No"} {"text": "- Certificate of Proficiency in Pipe Welding\n- Certificate of Proficiency in Welding\n- Technical Certificate\nGraduates are employed as:\n- Pipeline construction\n- Metal fabrication\n- Manufacturing firms\n- Industrial companies for equipment repair\n- Students should be advised that welding may ruin outer garments. Students should plan on purchasing several sets of long-sleeved shirts and jeans.\n- Welding is one of the more physically demanding programs at UACCM.\n- Manual dexterity, good eyesight, and good eye-hand coordination are assets. Welders should be able to concentrate on detailed work for long periods.\n- The welding program provides instruction in Shielded Metal Arc Welding (SMAW), Gas Metal Arc Welding (GMAW), and Gas Tungsten Arc Welding (GTAW), as well as blueprint reading and layout techniques. Certificates of Proficiency are offered for SMAW and Pipe Welding. Students may also complete requirements for a Technical Certificate in Welding Technology.\n- Students required to take remedial courses must follow the UACCM Student Success Plan.", "label": "No"} {"text": "Little do most people know, however, that there is a far lesser known North American berry about to stake it’s claim as a truly remarkable super berry: Aronia.\nOff the Charts Antioxidant Power!\nAronia berries are rich in anthocyanins, the substance that gives this fruit its deep shade of purple. Anthocyanins have been shown to reduce systemic inflammation and levels of C-reactive protein, a byproduct of inflammation. If left unchecked, inflammation is the spark to many chronic and life-threatening diseases, including cancer.\nAronia berries are also high in plant-based super-antioxidants called proanthocyanidins that help boost circulation by strengthening capillary walls and act as an overall tonic for the cardiovascular system.\nProanthocyanins also suppress enzyme breakdown of collagen and alleviate allergies.\nFull-Body Health Benefits\nThe aronia berry also possesses extreme anti-bacterial, anti-viral and anti-diabetic properties… This fights arterial plague formation… reduces serum cholesterol, shields the liver and kidneys from toxins, lowers blood sugar and balances insulin production. Enriched with flavonoids, the aronia berry also protects against peptic ulcers, eye inflammation and urinary infection.\nThe aronia berry has shown exciting promise as an anti-cancer agent. Research suggests aronia berries may help defend against tumor formation in the bladder, breasts, colon, lungs, ovaries, and skin. Preliminary studies indicate that the berry may even slow the progression of glioblastona, a lethal form of brain cancer.\nNew Berry on the Block!\nAronia has been commercially cultivated in Russia since the 1940s and in Europe since the 1950s. But it wasn’t until 2009 that the Midwest Aronia Association formed in Iowa in order to provide information and other resources to those interested in growing this super-healthy berry. Now, the Association has members in California, Illinois, Iowa, Michigan, Minnesota, Mississippi, Missouri, Nebraska, New York, North Dakota, South Dakota, Wisconsin and Ontario, Canada. This means that if you don’t already have aronia products available on your local store shelves, you should soon (and in the meantime, you can also look online for internet retailers).\nWhen it comes to choosing a quality product, you’ll be glad to know that aronia berries are naturally pest-resistance and need no agricultural toxins. That said, you should still look for bushels stamped with the USDA organic certification label to make sure you’re benefitting from 100% pure antioxidant advantage.\nNative to Asia, shiitake mushrooms are packed with vitamins and minerals and have been cultivated for thousands of years for culinary and medicinal purposes. The latest research published April 11 in the Journal of the American College of Nutrition confirms that shiitake mushrooms boost immunity.\nStrengthen Your Immune System with Shiitake\nResearchers from the University of Florida gave 52 healthy adults between the ages of 21 and 42 a four-week supply of dried shiitake mushrooms. Participants then ate one 4-ounce serving of shiitake mushrooms every day for four straight weeks. Researchers controlled for several variables:\n- No vegans are vegetarians were studied\n- Subjects could not drink tea or take antioxidant vitamins or probiotics before the study\n- Participants were instructed to limit alcohol to 14 or fewer glasses per week so that immune-enhancing activity wasn’t adversely impacted\n- Volunteers were allowed no more than 7 servings of fruits and vegetables per day\nAt the end of four weeks participants displayed better gamma delta T-cells and fewer inflammatory proteins.\nLead researcher Sue Percival explains: “If you eat a shiitake mushroom every day, you could see changes in their immune system that are beneficial. We’re enhancing the immune system, but we’re also reducing the inflammation that the immune system produces.”\nFight Cancer with Shiitake\nShiitake mushrooms are also celebrated for their cancer-fighting properties. They are rich in the polysaccharide lentinan, which scientists have isolated and used to treat various cancers, including stomach cancer. In addition to its anti-tumor properties, lentinan has also been shown to protect the liver, alleviate stomach problems like gallstones and ulcers, and help treat anemia. In fact, shiitake mushrooms are one of the most bioavailable sources of iron.\nIn short, shiitake mushrooms are an antiviral, antibacterial, and antifungal powerhouse that can even help protect against atherosclerosis and coronary artery disease when eaten regularly. An easy way to start adding shiitake to your diet is to use it to create a base for soups or stocks for making rice or quinoa. Add in some nuts, peppers, chicken, or tofu, along with your favorite seasonings\nThe bark, leaves, flowers, fruits, and seeds of the pomegranate (Punica Granatum) have a long history of use as a medicine, particularly in the Middle East, India, and China. The Chinese and South Africans use it to treat inflammation, rheumatism, irregular uterine bleeding and hemorrhaging, and abdominal pain.\nIn Unani medicine (a traditional practice of medicine in south-Asian countries and the Middle East), pomegranate is prescribed as a food supplement to treat diabetes. Due to its potent antimicrobial properties, pomegranate has even been used to treat intestinal worms.\nNow, research is revealing the extract’s promising antioxidant and anti-cancer potential.\nSay “No” to Aging with Antioxidants\nWithout enough antioxidants, your body can’t fight off free radical damage, and becomes vulnerable to aging and disease. Pomegranate delivers a powerhouse helping of antioxidants when consumed internally as well as applied topically. Pomegranate’s antioxidant activity is fueled by ellagitannin compounds (punicalagins and punicalins being the standouts). It’s also packed with vitamin C—40% of the recommended daily value, in fact! These antioxidants, along with gallic acid and catechin, help accelerate wound healing, as well as repair sun-damaged, aging skin.\nExperts have discovered that pomegranate increases the longevity of fibroblasts (cells responsible for collagen and elastin production). Collagen and elastin work together to give strength and support to your skin. A Medical College of Virginia study showed that the oil from pomegranate seed extract helps boost collagen production, thereby thickening both the outer and inner layers of the skin.\nOther studies suggest that pomegranate seed extract may demonstrate a prohibitive influence on some forms of skin cancer. Snacking on pomegranate seeds is one way to benefit, but if you’re interested in the skin-saving benefits, seek out pomegranate seed extract oil in stand-alone form, or as an added ingredient in your skin care products.\nShow No Mercy to Cancer Cells\nAn anti-inflammatory compound in pomegranate and pomegranate seed extract called punicic acid has been shown not only to reduce the inflammation that causes joint pain and arthritis, but also to fight cancer. A 2002 study published in Breast Cancer Research and Treatment showed that pomegranate seed extract suppressed the growth of estrogen-dependent cancer cells in culture. It also inhibited the ability of cancer cells to cross barriers and spread, and even increased apoptosis (cancer cell self-destruction).\nA 2010 study in the International Journal of Oncology confirmed pomegranate’s influence on cancer cells, showing that cancer cell cultures treated with punicic acid experienced apoptosis at rates 91% higher than untreated cancer cells. Research has shown that pomegranate seed extract effects prostate cancer in the same manner. Pomegranate seed extract, along with pomegranate flower extract and pomegranate juice, has also shown promise in the treatment of colon cancer and leukemia.\nNew research reveals that women who consume foods containing flavonols and flavanones (two forms of dietary flavonoids) cut their risk of developing epithelial ovarian cancer. This is amazingly good news for women, because ovarian cancer is currently the 5th leading cause of cancer death among women. About 20,000 women in the U.S. are diagnosed with ovarian cancer each year.\nAn Extremely Deadly Cancer\nOvarian cancer is one of the deadliest of all cancers affecting women. One of the reasons this type of cancer is so terribly dangerous is that it is nearly impossible to detect early. Only about 19% of ovarian cancer is diagnosed before the cancer has spread, after which point treatment is usually not effective.\nMaking matters worse is the fact that the ovaries are tiny organs located deep within the abdominal cavity. This makes it extremely difficult to pinpoint symptoms specific to the ovaries. Sadly, such symptoms are all too often mistaken for other far less serious health issues until it is simply too late.\nThe good news is that there are choices you or your loved ones can make to lower ovarian cancer risk. Most recently, scientists at the University of East Anglia (UEA) discovered that tea and citrus fruits and juices can lower ovarian cancer risk.\nHow Tea and Citrus Prevent Ovarian Cancer\nThe UEA study followed the dietary habits of 171,940 women between the ages of 25 and 55 for more than three decades. The research team found that those who consumed food and drinks high in flavonols were less likely to develop ovarian cancer.\nFlavonols are found in…\n- Red wine\nConsumption of flavanones was also associated with lower incidence of ovarian cancer.\nFlavanones are found in …\n- Citrus fruits\n- Citrus juices\n|Two Cups A Day\nThe consumption of just two cups of black tea every day was associated with a whopping 31% reduction in ovarian cancer risk. Black tea also slashes your risk of diabetes. A study of elderly people living in the Mediterranean islands showed that people who consumed 1-2 cups of black tea a day had a 70% lower chance of having or developing Type 2 diabetes.\nA Groundbreaking Study\nThe UEA study was the first large-scale study to examine how the substances in black tea and citrus fruits and juices affect the risk of ovarian cancer. The study’s authors concluded that very simple and inexpensive changes in food intake could have a drastic effect on reducing ovarian cancer risk.\nWhat’s the second most common cancer in men worldwide? Prostate cancer… and it’s much more prevalent in developed countries. Experts believe that higher rates of prostate cancer in industrialized nations are partially due to the Western diet and lifestyle. Researchers from the Universities of Bristol, Cambridge, and Oxford recently identified three dietary components that may help slash your risk for prostate cancer.\nLycopene, an antioxidant found in tomatoes, stood out as the all-star prostate cancer-fighting nutrient.\n10 Tomatoes a Week Keep the Doctor Away!\nThe study, published in Cancer, Epidemiology, Biomarkers and Prevention, is the first “dietary index” to track dietary components and their effects on prostate cancer. Researchers compared the diets and lifestyle behaviors of 1,806 prostate cancer patients between the ages of 50 and 69 with 12,005 cancer-free men. They discovered that selenium, calcium, and lycopene effectively reduced prostate cancer risk, with lycopene showing the most influence.\n|FACT: Men who consumed 10 portions a week of tomatoes or tomato products (like baked beans or tomato juice) had an 18% reduced risk for developing prostate cancer!|\nLead researcher Vanessa Er, from the School of Social and Community Medicine at the University of Bristol and Bristol Nutrition BRU, explains: “Our findings suggest that tomatoes may be important in prostate cancer prevention. However, further studies need to be conducted to confirm our findings, especially through human trials. Men should still eat a wide variety of fruits and vegetables, maintain a healthy weight and stay active.”\nResearchers also analyzed lifestyle factors, particularly the anti-cancer lifestyle recommendations for diet, physical activity, and body weight set forth by the World Cancer Research Fund (WCRF) and the American Institute for Cancer Research (AICR). While the suggestions of these two organizations are pertinent to overall cancer prevention, they aren’t targeted at prostate cancer prevention, and researchers determined that only dietary recommendations lowered prostate cancer risk. This study confirms that a high intake of fruits, vegetables, and fiber helps lower your odds of a prostate cancer diagnosis.\nThe Anti-Cancer Effects of Lycopene\nLycopene is a carotenoid found in fruits such as the tomato, apricot, guava, and watermelon. It has been shown to shield against toxins that damage DNA and cells. Previous studies have shown that lycopene suppresses androgen receptor expression in prostate cancer cells in vitro, and decreases prostate cancer cell proliferation. Lycopene has also been shown to protect against cardiovascular disease and macular degeneration (the primary cause of vision loss in people over 60).\nTo increase your lycopene consumption, add some tomatoes, grapefruit, asparagus, parsley, and carrots to your diet. You’ll notice the results from the inside out, as lycopene also helps your skin maintain a radiant, healthy glow.", "label": "No"} {"text": "The German government is proposing a measure to make measles vaccinations mandatory for children and employees of kindergartens and schools.\nChancellor Angela Merkel’s Cabinet approved the plan Wednesday, noting the number of measles infections has risen significantly in recent years. Lawmakers in parliament, where Merkel’s governing coalition holds a majority, are expected to approve the law.\nIn the phased-in program beginning in March, parents of school-aged children, starting at kindergarten, will have to provide proof of vaccination.\nNon-compliance means children will be refused admittance to kindergarten and their parents possibly fined. Parents of older students will be fined up to 2,500 euros ($2,803).\nThe German news agency dpa reports that while 543 cases of measles were registered in Germany last year, there have been more than 400 cases this year already.", "label": "No"} {"text": "Cognitive Development, Ages 12 to 24 Months\nThe brain grows dramatically through the second year of life. Around 12 months, toddlers develop a new ability to remember experiences that occurred a few hours or even a day earlier. Toddlers often demonstrate this new ability by repeating a recalled experience, such as throwing a ball or stacking blocks, at a later time. Changes in the brain allow a toddler between 18 and 24 months of age to think in more complex ways, such as recalling events that occurred days earlier. The older toddler begins playing pretend. For example, he or she may give a teddy bear a \"drink\" from a cup or let the bear \"talk\" on the phone. These toddlers are also beginning to understand symbols (for example, that words can stand for objects).\nToddlers also begin to see connections between events. For example, when they open a music box, they know they will hear a song. Or when they throw a ball, they know it will bounce. They'll probably throw their dolls, food, and many other objects to see if they'll bounce too.\nAt 18 months, toddlers have developed a greater understanding of the world outside of home. Toddlers begin to develop a sense of self, the ability to see themselves as separate from others. They can now imagine a threat and often go through a period of clinging to parents and being fearful of strangers.\nCurrent as ofDecember 12, 2018\nAuthor: Healthwise Staff\nMedical Review: Susan C. Kim, MD - Pediatrics\nKathleen Romito, MD - Family Medicine\nLouis Pellegrino, MD - Developmental Pediatrics", "label": "No"} {"text": "Examining fuel poverty\nThe aim of the Fuel Poverty Task Force was to raise the profile of fuel poverty and provide a means of enhancing knowledge and understanding, while creating a forum for the exchange of ideas and solutions.\nThe Task Force commissioned Professor Catherine Waddams to conduct a research project designed to survey low income households, with a disproportionately high number supplied via a prepayment meter. Representatives from external groups covering Ofgem, energywatch, DTI, Eaga, NEA and energy suppliers were invited to participate in the research steering group under the chairmanship of Tony Jackson of SEEBOARD.\nThe project objectives were:\n- To identify and analyse the pattern of gas and electricity consumption in households vulnerable to fuel poverty and to provide independent information on the impact of different payment methods and policies towards debt recovery.\n- To identify patterns of self-disconnection amongst prepayment meter users.\n- To identify patterns of self-rationing (if any) amongst credit consumers with the same socio-economic and demographic characteristics as prepayment users.\n- To assess the likely effects of a range of tariff differentials on consumption patterns.\n- To identify the benefits and costs to consumers of different metering and payment schemes and attitudes to their current payment scheme.\n- To identify and assess company policies and practices toward social action and payment methods.\nMore than 3,400 low income consumers throughout the UK and over 40 managers from electricity and gas suppliers were interviewed in the spring and summer of 2000. The project was completed in January 2001.\n- The vast majority of low income households taking their electricity or gas supplies (or both) from a prepayment meter were happy with their payment method.\n- Almost 90% of prepayment meter customers would choose to use a prepayment meter, with only 3% saying they would choose to pay by direct debit.\n- Prepayment meters are popular with low income households because they allow for financial control.\n- Around 50% of those interviewed could think of no disadvantages. Of those that did, the main drawback was that the meters could run out of credit.\nAnalysis and comment\nSatisfaction with prepayment was highest among low income households, suggesting the importance of the budgeting element. The lowest level of satisfaction was for standard quarterly credit payments for one or both fuels, particularly when prepayment was used for the other fuel. Managers in energy supply companies recognised that consumers liked prepayment meters, while acknowledging that this preference may conflict with the regulator's desire to see fewer such meters being installed.\nMost prepayment consumers realised that this method was more expensive than others, but still preferred it to the alternatives. Most consumers found that the location of charging points was convenient; of the few who did not, a high proportion were pensioners or had children or a disabled person in the family.\n- Self-disconnection is not a problem for the majority of households with a prepayment meter.\n- For those that did self-disconnect – about one in four households – most did so unintentionally and were off-supply only for short periods.\n- Less than 10% of households self- disconnected as a result of poverty in general.\n- Where self-disconnection was for financial reasons, the household often included at least one unemployed adult, or children.\n- Households with occupants receiving a state pension or disability benefit disconnected the least.\n- Most customers were aware of the emergency credit facility and how to use it, but pensioners were least aware.\nAnalysis and comment\nOnly a minority of prepayment meter users had self-disconnected in the past year – just under 25% of electricity consumers, and just over 25% of gas consumers, had self-disconnected at least once. Most self-disconnections were for less than seven hours.\nUse of the emergency credit facility was much more common than self-disconnection. Nearly 75% of electricity and over 60% of gas prepayment consumers had used emergency credit during the previous 12 months, usually because of forgetting to charge the card.\nRATIONING AND ECONOMISING\n- Most households surveyed try to economise on energy in some manner. More than one in ten turned down the heating lower than they would like.\n- Around 80% of households surveyed (both prepayment meter and credit meter) reported no adverse results with self-rationing.\n- There is, however, a small group of customers (one in 12) for whom self-rationing is causing significant comfort/ environmental problems.\nAnalysis and comment\nMost consumers economise on their fuel. For gas, more prepayment than credit consumers tried to economise; for electricity the position was slightly reversed. Turning off the heating is more common among households with prepayment meters, for both types of fuel. Pensioners did not say they could not afford fuel to any greater extent than the other low income households in the survey.\nConsumers were asked how their spending might change in response to hypothetical changes in the price of energy and their weekly income. 17% of electricity consumers and 20% of gas users said they would increase their consumption if the price were to fall, rising to more than 25% among gas prepayment consumers. However, much smaller numbers said they would increase their use of gas and electricity if incomes were to rise, sugg-esting other priorities. A higher proportion of households would increase consumption of the fuel for which they are using prepayment meters than for the group as a whole.\nSWITCHING ENERGY SUPPLIER AND COST SAVINGS\n- Households that had switched supplier reported saving money as the main reason for switching.\n- The main reason for not switching was lack of confidence in alternative suppliers.\n- Prepayment meter customers were the least likely to switch.\n- Pensioners and those in receipt of disability benefit were also less likely to switch.\n- Some people who did not switch supplier achieved savings by changing payment method.\n- Few customers believed they could not switch (for whatever reason).\nAnalysis and comment\nThe survey showed that 17% of the sample had switched electricity supplier and 28% gas supplier, about the national average at the time of the interviews. However, switching rates were much lower for prepayment meter users for both fuels. Those with prepayment electricity meters showed about an average rate for switching gas suppliers.\nCompanies supported evidence from the consumer survey that the ability of suppliers to prevent switching among consumers who are in debt was not a major obstacle to the development of competition. Further, the removal of debt blocking would not be enough to encourage switching. Here, both company and consumer evidence indicated that the lack of attractive offers in the market represented a barrier for prepayment meter users and that regulatory action was the appropriate remedy.\nENERGY INDUSTRY PERSPECTIVES\n- Energy suppliers see their social responsibilities as both an appropriate and necessary consequence of activity in the supply market.\n- Whilst social welfare is primarily for governments to manage, energy suppliers understand the need to discharge their social responsibilities and to strengthen customer relationships.\n- Suppliers realise that for certain people a prepayment meter is the preferred method of payment and there is a desire to continue to provide that service.\n- Companies are working to serve all customer segments as far as the constraints of the competitive market will allow.\nAnalysis and comment\nCompanies had varied responses to the social agenda. Overall four different templates were identified:\n- ‘Embracing' social initiatives\n- Business as usual\n- Management deliberation\n- Commercial conflict.\nThere was no suggestion that any of these approaches was better than any other. It was expected and natural to see a variety of approaches in a developing market of this kind. Examination of the effect of company culture and history on management attitudes proved inconclusive.\nCONCLUSIONS AND STEERING GROUP RECOMMENDATIONS\nRestricting the number of prepayment meters would curtail the options available to a group whose choices are already severely income-constrained. There clearly remains an issue about meeting the full costs of such devices, which presents itself (amongst other places) in the competitive market.\nSince most prepayment meter customers prefer this method of payment, alternative methods need to provide financial control and a means to budget in order to be attractive. Energy suppliers should continue efforts to keep the extra costs of prepayment meters as low as possible, but suppliers believe they should not be required to restrict their use where these meters are preferred for budgeting purposes.\nSelf-disconnection and self-rationing\nMeasures to prevent self-disconnection and self-rationing need to be carefully directed at the minority of low income users for whom these are a (sometimes major) problem, in order to avoid restricting choices for the majority who perceive little difficulty.\nThe problems of self-disconnection affecting households in financial difficulty should not be treated by adopting blanket policies for the whole prepayment meter population. Policies which seek to reduce the number of prepayment meters may not be welcomed by most users. More specific help is needed for households experiencing self-disconnection for reasons of poverty.\nSwitching energy supplier and cost savings\nCaps on incumbents' prepayment prices have dampened the scope for competitive offers, which deter consumers from switching because of the poor savings opportunities open to them. The removal of caps from prepayment gas prices should alleviate this, although the pro-competitive effect will be dampened by the temporary link between prepay and direct debit prices. Increasing competitiveness in the prepayment market seems inevitably to involve higher prices in the short term, to counteract the effect of particularly close regulation in this market in the recent past.\nAll parties (suppliers, Ofgem and energywatch) should consider how the benefits of switching supplier can be promoted. Various products have been introduced which can benefit certain groups of less advantaged customers.\nEnergy industry perspectives\nThe government and regulator should give clearer guidance to companies about the nature and scope of their social obligations if they want to develop a well targeted and consistent policy across the nation.\nThe problems of fuel poverty are broad and complex. Actions by suppliers, and the collaborative efforts of the EA Fuel Poverty Task Force, have resulted in the introduction of a wide range of initiatives for tackling fuel poverty. However, suppliers cannot be expected to provide all the solutions for its elimination. There is a broader social agenda, which needs to recognise that these poverty issues should be dealt with through a range of welfare, taxation and incomes policies.\nDefinitions & Abbreviations:\nDTI - Department of Trade & Industry\nEaga - Energy Action Grants Agency energywatch - the trading name of the Gas and Electricity Consumer Council\nFuel poverty - describes those who spend, or need to spend, 10% or more of their income on energy\nNEA - National Energy Action\nOfgem - Office of Gas and Electricity Markets\nThe full text of the report Affording Gas and Electricity: Self Disconnection and Rationing by Prepayment and Low Income Credit Consumers and Company Attitudes to Social Action can be found on the Electricity Association's website at www.electricity.org.uk", "label": "No"} {"text": "The United Nations is an embodiment of a continually evolving international order and UN peace operations are the physical manifestation of that order. Though there is no international consensus as to what peace and security mean, the prevailing understanding of these ideas is modeled by what peace operations do and how they do it. So what do current peace operations tell us about how the world understands peace and security? Has the recent global focus on terrorism changed what we think peace and security really means?\nShannon Zimmerman is a peacemaker specializing in understanding how ideas of peace and security interact. She is currently a PhD researcher at the Asia Pacific Centre for the Responsibility to Protect based at the University of Queensland in Brisbane, Australia. Her research focuses on the intersections of the Protection of Civilians (PoC) and counter-terrorism norms within United Nations peacekeeping missions. She specifically looks at how these norms interact with each other at the field level and their impact on the structure and nature of contemporary peacekeeping missions. Shannon holds a Masters in Conflict Resolution from Georgetown University in Washington D.C. Previously, Shannon worked at the United States Institute of Peace and the North American branch of the Stockholm International Peace Research Institute.\nThis talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at http://ted.com/tedx", "label": "No"} {"text": "Integration of religion and spirituality in Psychology has long been an interesting issue. But although there were several studies and dialogues conducted to link spiritual direction and psychotherapy, still very little has been done to associate spiritual direction with specific\npsychotherapy models. At the time spiritual therapy has been introduced, narrative therapy came out as the foremost technique for family therapy (Aponte, 2002). Blanton (2005) cited that the concept behind narrative therapy resonates with that of spirituality; a reason why authors have been interested in inquiring into the benefits of narrative family therapy with spiritual issues. The article provided a comprehensive exploration of how narrative family therapy and spiritual direction can fit together and how they can enrich and strengthen each other’s approach to psychotherapy.\nNarrative family therapy quickly became the primary approach to family therapy because it bravely challenged conventional psychological concepts. As postmodern psychology emphasizes knowledge that surfaces from relationships and the idea of self as developed through language and converted through conversation, it became the foundation for narrative therapy (Blanton, 2005). Spiritual direction, on the other hand, has been an integral part of human living. It has been protected and observed in the liturgical churches where religious orders have been preserved.\nTo compare the two disciples, the article discussed five categories in which to compare narrative therapy and spiritual direction – the problem, therapy goals, focus of therapy, therapeutic tools, and therapeutic relationships (Blanton, 2005). For spiritual direction, issues are mostly related to hindered spiritual growth because of cultural beliefs. For narrative therapy, people tend to adapt problem-saturated stories that lead them to seeing themselves as the source of the problem, although the therapy itself follows the concept of externalization wherein the problems are considered separate and external from the person. The goal of spiritual direction is that of finding the true self while that of narrative therapy is identifying the preferred self. Both disciplines focus on experience and meaning of living and they are somehow alike in the therapeutic tools that they follow. Spiritual direction and narrative theory both use dialogues, questions, and listening as therapeutic approaches. Narrative therapy is much more collaborative and concerned with relationships; it involves processing of the information the client provides but without the therapist posing questions to confirm and verify. Spiritual direction, on the other hand, works the same way only that it is more contemplative; this collaborative-contemplative approach entails helping the clients find their way toward God (Evans, 2005).\nApparently, the similarities make the two disciplines somehow complementary. The narrative therapy can incorporate spiritual direction in the therapeutic process by opening to the clients the idea of God as a participant in their lives. Spirituality could be an important element to narrative family therapy as it opens and enables clients to hear or see God and use the messages to resolve the issues.\nNarrative family therapy and spiritual direction seem to have more similarities than differences. Both disciplines share the same belief in conducting therapy and the desired outcome. Spiritual direction and narrative therapy both sees dialogue as an instrument of change; that through the elicited and shared stories and experiences, one is able to understand self and life. Both therapist and director do not see themselves as the primary agent of change and as they both adhere to establishing a collaborative relationship.\nThe two disciplines may not be a perfect fit but the parallel ideas make them mutually beneficial when applied together.\nAponte, H.J. (2002). Spirituality: The heart of therapy. Spirituality and family therapy. New York: The Haworth Press, Inc\nGregg, P.G. (2005). Narrative Family Therapy and Spiritual Direction: Do They Fit? Journal of Psychology and Christianity, 24, 68-79.", "label": "No"} {"text": "By Ariana Assaf, Daily Staff Reporter\nPublished February 20, 2014\nBad weather has a knack for getting people down. But when sad leads to SAD, there’s more that students can do beside counting the days until summer.\nMore like this\nSeasonal affective disorder — known as SAD — is a form of depression that is most prevalent in regions of the country such as the Midwest, where it is particularly cold and dark between mid-October and mid-March.\nThough many students tend to experience what is known as “winter blues,” Victoria Hays, associate director at the University’s Counseling and Psychology Services, said being formally diagnosed with SAD does not happen as frequently.\nOften, people who have already experienced some depression come to realize that it worsens in the winter after consulting with a healthcare professional.\n“It’s not as common to get someone coming in who’s never had difficulties with depression before and whose first diagnosis is SAD,” Hays said.\nInformation on the University Health System’s website explains that SAD is most common in women and in people between 15 and 55 years old.\nAccording to a research report by John Greden, professor of psychiatry and clinical neurosciences, 4 to 6 percent of people have “full-blown” SAD and 10 to 20 percent of Americans exhibit some symptoms. Greden serves as the executive director of the University’s Comprehensive Depression Center.\nPeople suffering from SAD often report feeling sluggish, slow or unmotivated. Other symptoms include drowsiness, weight gain and craving carbohydrates as a way to increase energy.\nHays said SAD is primarily trigged by diminished exposure to sunlight, not cold temperatures.\n“Some people are particularly sensitive to changes in the amount of sunlight, so when there’s less sunlight people feel a lot worse,” she said.\nShe added that the times of year when SAD tends to take hold and then taper off — mid-October and mid-March, respectively — are also high-stress times for students, which can make it hard to pinpoint exactly what contributes to the seasonal change in mood.\nLight therapy is the most effective way to combat depression caused by a lack of natural sunlight. At the University, light boxes are available for use in the CAPS Wellness Zone and can also be purchased for personal use.\nPeople who are susceptible to bipolar disorder should refrain from exposing themselves to too much light late in the day, as this can lead to hypomania or interruptive sleep. Generally, using a light box for 20 minutes in the morning three or four times a week is recommended.\nAnother common treatment is using a dawn simulator, an alarm clock that mimics the rising sun.\nGreden also cited antidepressant medication and exercise as a treatment for SAD. Because limited amounts of sunlight can slow down biological clocks and delay sleep and hormone cycles, a combination of light therapy and prescribed medications can be particularly effective in some cases.\nHays said students who think they might be affected by SAD can go online to see if their symptoms meet the criteria and explore treatment options.\n“Some of the initial treatment recommendations can be done without seeing a mental health professional, but you won’t know whether or not you actually have SAD without somebody giving the proper diagnosis.”\nBecause CAPS is a free service for students, it generally does not diagnose specific mental conditions and therefore does not track numbers of students who report being affected by specific conditions. However, the number one reason students seek assistance at Counseling and Psychological Services is for issues with anxiety. Depression is second.\nThe University’s Comprehensive Depression Center is located in the Rachel Upjohn Building at 4250 Plymouth Road. The center can be reached at 1-800-475-6424 or 734-936-4400.", "label": "No"} {"text": "Ask The Question\nJul 10, 2019, 2:23:50 AM\nIf you do not recognize the name of a journal or magazine, you should not use it as a source. true or false\nJul 10, 2019, 4:21:03 AM\nthis is false it can still be a good source\nIf you do not recognize the name of a journal or magazine, you should not use it as a source. tru...\nHelp? QUESTION 12 Not all primary sources are reliable. True False QUESTION 13 If you d...\nIf you do not recall the exact date of an event, it is okay to use a general time reference inste...\nIf you must use an outline for an essay answer, you do not need to use complete thoughts. True ...\nAs a police officer, you can use psychological coercion but not physical coercion. true or false\nYou do not need a tutor unless you are in danger of failing the class. True or false\ntrue/false If you do not recall the exact date of an event, it is okay to use a general time refe...\nYou have the choice to use either the title or the author's last name to credit a source in a par...\nTrue or False: When dealing with lengthy information, it is best to summarize the information. ...\nIt is normal to not understand a concept or idea that you are learning the first few times. True ...", "label": "No"} {"text": "When your child leaves home for college, you worry about losing contact. She will be living at college, and perhaps not returning home for several weeks or months, so you worry. However, with some effort on your part, your communication with your student may become even more meaningful than when she was home.\nThis post is the second in a series of five posts that may give you food for thought about how you communicate with your college student. We’re posting one of these articles each week for five weeks. Some of our suggestions may be common sense reminders, and some may be new ideas for you. Obviously, communication skills are interrelated, so please consider all of these suggestions together. Our first post concerned how you listen to your student. In this post we’ll consider nonverbal communication and the signals that you send and interpret. In future posts we discuss how to check perceptions to make sure you understand what your student is really saying, how to ask helpful questions, and how to frame some of your messages so your student may be willing to listen. We hope that thinking about how you listen and talk to your student may help you to keep all of your communication doors wide open.\nMost of us think of nonverbal communication as body language, and it is. However, there are more facets to nonverbal communication than many of us might imagine, even though we use these aspects of communication daily to help us understand people. So, as we discuss nonverbal communication, let’s begin by broadening our definition. Nonverbal communication is anything that helps to get a message from one person to another without using the meaning of the words. With this definition, nonverbal communication includes not only body language, but also tone of voice, appearance, timing, facial expressions, and even the atmosphere in which we choose to have a conversation.\nNonverbal messages can often tell us even more than the words that someone is saying (some researchers have suggested that as much as 93% of our understanding may come from nonverbal cues) – and nonverbal messages can be very easily misinterpreted. Much of nonverbal communication also seems like common sense, however we often forget just how much power nonverbal communication can have. Some conscious thought about both the nonverbal messages that you receive from your college student and that you send to your college student, may help improve your communication.\n- Watch for body language signals from your student. Does she seem uncomfortable? Does she seem much more confident in the way she carries herself? Is she making eye contact? (Be careful about jumping to conclusions if she’s not. This could mean many things.) Does her body language reinforce or contradict what her words are telling you?\n- Think about the messages your body may be sending. Are you tense or disinterested? Do you stop what you’re doing and give your student your full attention? Do you stand and tower over your student or sit down next to him? Are you facing your student across a table or sitting next to him on the sofa? Which position seems most appropriate for the tone of the conversation you are having? Does your facial expression give away your thoughts or mask what you are truly feeling? Do your physical messages match your words?\n- Listen carefully to your student’s tone of voice. Think carefully about your own tone of voice. Obviously, raised voices often reflect anger, but they may also reflect fear. Tone of voice may be one of the first forms of communication to reveal emotion. Listen carefully and you may hear much more than words.\n- Appearance is a powerful form of communication. Are there changes in your student’s physical appearance? Before you make judgments or jump to conclusions, think about what your student may be saying. Is she asserting her independence? Demonstrating a new direction for her life? Revealing an underlying health or emotional issue? Your student may be communicating through her clothing, hairstyle, new tattoos or piercings, or other aspects of the way that she chooses to look. Look for clues and take your cue about how to respond.\n- Think of time as a source of communication. When and where you talk with your student can make a difference. Respect your student’s schedule and needs, but also let him know that you need some time from him as well. Think about when and where you choose to communicate. Make an appointment to have a serious conversation. When you both set aside some time to talk, you send each other a message about the importance of the conversation.\n- Place, or space, is yet another form of nonverbal communication. If you need to have a serious talk with your student, you may want to meet at the kitchen table, or even choose a more neutral location such as a coffee shop. Think about whether you want your conversation to be public or whether it should occur at home. Some topics may be better handled at the kitchen table (more businesslike?) and some may be better suited to sitting together on the sofa in front of the fire (more personal?). Choosing your location, if you have control over it, can help to set the tone for the interaction.\nOne of the factors that makes our nonverbal communication so powerful is that it is often unconscious. Bringing some awareness and conscious effort to the way that we receive and send our messages can help us to interpret those messages more accurately and fully. Whether we communicate with our student in person, by phone, through skype, or in some other fashion, watching for the cues from him – and thinking about the cues that we send – can make those moments of contact even more meaningful.\nOnce we think we have received nonverbal (or verbal) messages, we can improve our communication even more by checking to see whether our interpretations are accurate. Our next “Communicating With Your College Student” post will address how to use perception checking techniques to test your accuracy at interpreting messages.", "label": "No"} {"text": "Book-Length Study (1)\nFisher, Susan R. Boys and Girls in No Man’s Land: English-Canadian Children and the First World War. Toronto: University of Toronto Press, 2011. See esp. chapter 7, “But What Can a Girl Do?” 183–216; chapter 8, “A War for Modern Readers,” 217–45.\nBook Chapters (2)\nFisher, Susan. “‘Watchman, What of the Night?’: L.M. Montgomery’s Poems of War.” In L.M. Montgomery and War, edited by Andrea McKenzie and Jane Ledwell, 94–109. Montreal and Kingston: McGill-Queen’s University Press, 2017.\nFisher, Susan. “Canada and the Great War.” In The Cambridge History of Canadian Literature, edited by Coral Ann Howells and Eva-Marie Kröller, 224–43. Cambridge: Cambridge University Press, 2009.", "label": "No"} {"text": "Bertrand Piccard squeezes himself into the narrow cockpit of his solar-powered plane and feels like a prisoner. There’s not a lot of room in there. He can barely move. An engineer has to climb up to him to hook him up to an on-board computer.\nPiccard, 54, is wearing a life jacket over insulated overalls to protect him from the cold. He has a parachute on his back. On the wing above him, 10,748 solar cells soak up the evening sunlight.\nPiccard’s plane, codename HB-SIA, has a wingspan of 208 feet, the same as an Airbus A340. Yet he is huddled in a cockpit half the size of a telephone box. “You can’t see the wings at all,” he says of his pilot’s view. “You’re sitting in there like a horse wearing blinders.”\nFive assistants push the plane into position with their bare hands. At 3,500 pounds, the highest-performance solar-powered plane in the world weighs the same as a medium-sized car. When the pilot gets in the cockpit, the carbon-fiber wings tremble all the way to their tips.\nThe nearby Payerne weather station is reporting winds of four knots (4.6 mph), a light breeze wafting over this military base 30 miles southwest of Bern in Switzerland. Piccard looks out onto the horizon through his rimless glasses. The fire brigade position their fire engines on the edge of the runway. This is his third Solar Impulse test flight this year.\n\"If we can fly around the world without using a drop of kerosene, we can also do without fossil fuels on our roads.”\nThe day before the test flight, Piccard is sitting on a white sofa in the hangar in Payerne. His most striking facial feature is the steely blue eyes he fixes on everyone he talks to. He is a third-generation adventurer. In 1931, his grandfather, Auguste, became the first man to reach the stratosphere in a balloon, and in 1960 his father, Jacques, was the first man to descend almost seven miles into the Mariana Trench. The film director James Cameron was the last person to do so, in March 2012.\n“I was raised to be curious,” Piccard says. In 1999, he became the first person to circumnavigate the globe nonstop in a hot-air balloon. He needed three attempts before finally landing in the Sahara after flying a distance of 26,600 miles. On his first attempt he fell into the Mediterranean. On his second attempt he had to come down in Burma. “I realized then how dependent [humans] are on liquefied petroleum gas,” he says.\nThe Swiss native hopes that his Solar Impulse project will make a statement against mankind’s fuel consumption, but without wagging fingers. “No one wants to give up their comfortable lifestyle. But why would we have to? Clean technologies already exist and have huge potential. If we can fly around the world without using a drop of kerosene, we can also do without fossil fuels on our roads.”\nThe first circumnavigation of the globe by solar-powered plane, in a five-stage flight, is planned for 2014. In Dübendorf, near Zurich, Solar Impulse engineers are currently poring over the successor to HB-SIA. The electronic components need to be better protected against the rain. The wingspan will increase by 26 feet and provide room for yet more solar cells.\nThe HB-SIA plane can already remain airborne night and day thanks to its ingenious storage technology. While the sun is shining, lithium polymer batteries collect energy that can be used for flying at night. The clock starts ticking when it gets dark. You have to be able to fly until sunrise, which is when the batteries go flat. Pilots must fly in an energy-efficient way at night, which means as much gliding and as little propeller use as possible.\nSolar Impulse can carry only one pilot, and it will take between 25 and 30 days to fly around the world. As no single person could last that long, Piccard will be swapping places in the cockpit with Swiss countryman André Borschberg. With his short hair and lively eyes, the gangly, 59-year-old Borschberg looks about 10 years younger than he actually is. You can imagine him as a flight-school instructor, standing in the classroom in his aviator sunglasses explaining maneuvers to the wannabe daredevils. Borschberg got his pilot’s license when he was only 17, before ever laying a finger on the steering wheel of a car. After that he flew fighter jets for the Swiss army for 20 years and then set up his own technology firm.\nThe project has no contingency plan for an emergency landing on water. The light aircraft would smash to pieces on contact.\nPiccard says Borschberg is a workaholic. Borschberg says Piccard is a visionary who sees things differently from most of the people around him. What would make a former fighter pilot who flew at Mach 1 for decades take an interest in flying around the world at 40 mph?\n“It’s a completely new type of flying,” says Borschberg. “In an F/A-18 [jet fighter], it’s like you’re flying two kilometers [approx. 1.25 miles] behind the jet. The controls react so quickly that you really have to keep up with the distance in your head. In the Solar Impulse cockpit, on the other hand, it’s all about patience. You steer to the right and at first nothing happens, and then you turn.”\nBorschberg also wants this round-the-world flight to promote solar technology. “When I flew from Switzerland to Belgium last year, I had more energy in the battery at landing than at takeoff. We could have dispensed with some of it. It was mind-blowing.”\nBorschberg set three records for solar-powered planes on board the HB-SIA in 2010: the longest flight (26 hours, 10 minutes) with the highest absolute flying altitude (30,298 feet) and the greatest height gain (28,687 feet). Yet both pilots know that the greatest challenge facing them is a mental one.\nIf Piccard and Borschberg are to cross the oceans, they will have to remain in the air for 150 hours nonstop. In that time, you could fly from Paris to New York around 16 times in a passenger plane. The Solar Impulse pilots have to get through the marathon stage over the Atlantic without a break. In a mini-cockpit. In a plane that steers like an oversized paraglider.\nThe project has no contingency plan for an emergency landing on water. The light aircraft would smash to pieces on contact. “We’ve got parachutes,” Piccard says. If the plane were to go down over the ocean, it’d be a case of bailing out and waiting to be rescued by boat.\nPiccard also says that panicking is often a lot more dangerous than the actual risk: “Too many emotions then come rushing to mind and get in the way of your decision-making.” But pilots are trained to deal with panic.\nThe pilots are allowed to squeeze in “micro-naps” over uninhabited areas. Autopilot takes over during these short sleeping breaks.\nBorschberg, the former military pilot, says he flies every mission in his head at home before going to sleep. He tries to visualize every maneuver in the plane. He demonstrated his stamina at the project’s research facility in Dübendorf in February of this year, when he completed a long test in the flight simulator.\nHis mission was a 72-hour virtual test flight, alone in an artificial cockpit. Medics and engineers communicated with him only by radio. Borschberg went on Twitter during the test. His tweets read like building blocks in a personality profile:\nFebruary 21, 17:27: First 10 hours in the cockpit are very fine. Starting to get used to my environment and lonelyness [sic]\nFebruary 22, 15:08: Used for the first time the toilet on board. Needs careful manipulation but it worked... (In case you’re wondering, the pilots use a toilet installed in the seat, otherwise known as a plastic bottle.)\nFebruary 23, 12:12: Getting used to my sleep pattern, think i found the right times to do my micro naps. Full of energy\nFebruary 23, 13:56: No more hot water, no energy to heat up water, i will eat cold today, snacks, dry fruits and right now a taboule [sic]\nBorschberg popped out of the simulator after three days. “There were people in the team who were worried he was going to collapse as soon as we took pictures of him,” says Piccard. “I never doubted André for a second.”\nDuring the simulation, Borschberg did leg exercises to stay active and avoid getting thrombosis in his legs. On 32 occasions he had 20-minute naps. The pilots are allowed to squeeze in “micro-naps” over uninhabited areas. Autopilot takes over during these short sleeping breaks. The alarm goes off after 20 minutes. “Yoga and breathing exercises help you get to sleep exactly when you want to,” Borschberg says. Piccard prefers self-hypnosis.\nWhen things get serious in 2014, the pilots will set off around the world in an easterly direction. One will be in the plane, the other on the ground. They’ll have a radio connection. Piccard will give Borschberg words of encouragement when his partner is sitting in the cockpit at an altitude of 26,000 feet, where outside temperatures are in the region of -40 F, with only heating pads and insulation for protection. When wind gets hold of the plane’s wings, the pilot only has his own strength to fight it: There are no hydraulics, on energy-saving grounds.\nThe first intercontinental flights are penned in for May and June 2012. Solar Impulse is due to take off from Payerne before crossing the Mediterranean and landing in Morocco.\nAt Payerne for the third test flight of 2012, Piccard starts the HB-SIA’s engines. Dozens of curious onlookers stare at the delicate aircraft. It’s 5:30 p.m. and the sun is low. Swiss army fighter jets regularly thunder down this runway, but when the solar-powered plane takes off, there is merely the whir of four 10 hp propellers. Piccard quickly gains height in the first few feet because the plane is so light. It looks like a huge bird hovering in the sky. In a world polluted with noisy, fast-paced living, this means of conveyance seems almost a provocative act; Solar Impulse flies at a leisurely pace. It is quiet and clean. Just over 10 minutes later, Piccard’s plane is nothing but a brushstroke on the horizon.\nWatch test flights live at www.solarimpulse.com.\nCheck out the June 2012 issue of Red Bulletin magazine (on newsstands May 15) for more articles. To read the magazine on your iPad, download the Red Bulletin iPad app.", "label": "No"} {"text": "Nawab or nawaab is an honorific title ratified and bestowed by the reigning Mughal emperor to semi-autonomous Muslim rulers of princely states in South Asia. Nawab usually refers to males, the equivalent is begum or nawab begum. The primary duty of a nawab was to uphold the sovereignty of the Mughal emperor along with the administration of a certain province, in some cases, these titles were accompanied by jagir grants, either in cash revenues and allowances or land-holdings. During the British Raj, some of the chiefs or Sardars of large or important tribes were given the title. The term nawab was originally used for the subahdar or viceroy of a subah or region of the Mughal empire. It is a Hindustani term, used in Urdu, Hindi and many other North-Indian languages, borrowed via Persian from the Arabic, being the plural of naib. In some areas, especially Bengal, the term is pronounced nobab and this variation has entered English and other foreign languages. The term nawbab is often used to refer to any Muslim ruler in north or south India while the term nizam is preferred for a senior official—it literally means governor of region.\nThe Nizam of Hyderabad had several nawabs under him, Nawabs of Cuddapah, Rajahmundry, Chicacole, Nizam was his personal title, awarded by the Mughal Government and based on the term Nazim as meaning senior officer. Nazim is still used for a collector in many parts of India. The term nawab is still technically imprecise, as the title was awarded to Hindus and Sikhs, as well. With the decline of empire, the title, and the powers that went with it. Other former rulers bearing the title, such as the nawabs of Bengal, some princes became Nawab by promotion, e. g. the ruler of Palanpur was diwan until 1910, nawab sahib. Other nawabs were promoted are restyled to another style, or to and back. The style for a queen is begum. Most of the dynasties were male primogenitures, although several ruling Begums of Bhopal were a notable exception. Before the incorporation of the Subcontinent into the British Empire, nawabs ruled the kingdoms of Awadh, Bengal and Bhopal. The title nawab was awarded as a distinction by the paramount power, similarly to a British peerage, to persons\nEast India Company\nThe company ruled the beginnings of the British Empire in India. The company received a Royal Charter from Queen Elizabeth I on 31 December 1600, wealthy merchants and aristocrats owned the Companys shares. Initially the government owned no shares and had only indirect control, during its first century of operation the focus of the Company was trade, not the building of an empire in India. The company eventually came to rule large areas of India with its own armies, exercising military power. Despite frequent government intervention, the company had recurring problems with its finances, the official government machinery of British India had assumed its governmental functions and absorbed its armies. Soon after the defeat of the Spanish Armada in 1588, London merchants presented a petition to Queen Elizabeth I for permission to sail to the Indian Ocean, one of them, Edward Bonventure, sailed around Cape Comorin to the Malay Peninsula and returned to England in 1594. In 1596, three ships sailed east, these were all lost at sea.\nTwo days later, on 24 September, the Adventurers reconvened and resolved to apply to the Queen for support of the project, the Adventurers convened again a year later. For a period of fifteen years the charter awarded the newly formed company a monopoly on trade with all countries east of the Cape of Good Hope and west of the Straits of Magellan. Anybody who traded in breach of the charter without a licence from the Company was liable to forfeiture of their ships and cargo, the governance of the company was in the hands of one governor and 24 directors or committees, who made up the Court of Directors. They, in turn, reported to the Court of Proprietors, ten committees reported to the Court of Directors. According to tradition, business was transacted at the Nags Head Inn, opposite St Botolphs church in Bishopsgate. Sir James Lancaster commanded the first East India Company voyage in 1601, in March 1604 Sir Henry Middleton commanded the second voyage. Early in 1608 Alexander Sharpeigh was appointed captain of the Companys Ascension, thereafter two ships and Union sailed from Woolwich on 14 March 1607–8.\nInitially, the company struggled in the trade because of the competition from the already well-established Dutch East India Company. The company opened a factory in Bantam on the first voyage, the factory in Bantam was closed in 1683. During this time belonging to the company arriving in India docked at Surat. In the next two years, the company established its first factory in south India in the town of Machilipatnam on the Coromandel Coast of the Bay of Bengal\nRaja, is a title for a Monarch or princely ruler in South and Southeast Asia. The female form Rani applies equally to the wife of a Raja, usually as queen consort and occasionally as regent. The title has a history in the Indian subcontinent and South East Asia, being attested from the Rigveda, where a rājan- is a ruler, see for example the dāśarājñá. Sanskrit rājan- is cognate to Latin rēx King, Gaulish rīx, Gaelic rí, etc. originally denoting heads of petty kingdoms and it is believed to be ultimately derived from the Proto-Indo-European *h3rēǵs, a vrddhi formation to the root *h3reǵ- to straighten, to order, to rule. The Sanskrit n-stem is secondary in the title, apparently adapted from the female counterpart rājñī which has an -n- suffix in related languages. Cognates of the word Raja in other Indo-European languages include English reign, rather common, practically equivalent variants in Rajasthani and Hindi, used as equivalent royal style in parts of India include Rana, Raol and rawat and Yuvraj prince heir.\nMaharaja, or great king, is literally a title for more significant rulers in India, hence during the British raj, precedence was rather determined by the gun salute. Raja රජ means King in Sri Lanka, Rajamanthri is the Prince lineage of Kings generation in Sri Lanka. Rajamanthri title is aristocracy of the Kandiyan Kingdom මහනුවර in Sri Lanka, badan Singh was styled Raja Mahendra and founded the city and state Bharatpur, which his dynasty ruled as Maharajas. Raja Sahib was the style in Bansda until its upgrade from c.1829 to higher counterpart Maharaja Sahib. Raja-i Rajgan was notably the royal style of, the former Rajas of Jind from * until their 1911 upgrade to Maharaja, the former Rajas of Kapurthala from 1861 until their 1911 upgrade to Maharaja. Two consecutive rulers of Patiala, the first of which was originally styled Maharaja, Raja Bahadur, and remained the rulers of Raigarh. as 1763 upgrade from the family title Raja Sar Desai in Maratha state Savantvadi. e. Third prince in line for succession, there were many more Rajas among the feudatory states, such as jagirs.\nIn Pakistan, Raja is still used by Muslim Rajput clans as hereditary titles, Raja is used as a given name by Hindus and Sikhs. Most notably Raja is used in Hazara division of Pakistan for the descendants of a Turkic dynasty and these Rajas ruled that part of Pakistan for decades and they still possess huge land in Hazara division of Pakistan and actively participate in the politics of the region. In Sinhalese, the title Raja means King of Sri Lanka, Rajamanthri is the Prince lineage of Kings generation especially Rajamanthri is aristocracy of the Kingdom of Kandy in Sri Lanka history. Indonesian has the word raja for king, leaders of local tribes and old Hindu kingdoms had that title before Indonesia became an independent nation. Various traditional princely states in Indonesia still style their ruler Raja, in the Malay language, the word raja means king\nMary of Teck\nMary of Teck was Queen of the United Kingdom and the British Dominions and Empress of India as the wife of King-Emperor George V. Although technically a princess of Teck, in the Kingdom of Württemberg, she was born and her parents were Francis, Duke of Teck, who was of German extraction, and Princess Mary Adelaide of Cambridge, a granddaughter of King George III. She was informally known as May, after her birth month, the following year, she became engaged to Albert Victors next surviving brother, who subsequently became king. Before her husbands accession, she was successively Duchess of York, Duchess of Cornwall and she supported her second son, who succeeded to the throne as George VI, until his death in 1952. She died the year, during the reign of her granddaughter Queen Elizabeth II. Princess Victoria Mary of Teck was born on 26 May 1867 at Kensington Palace and her father was Prince Francis, Duke of Teck, the son of Duke Alexander of Württemberg by his morganatic wife, Countess Claudine Rhédey von Kis-Rhéde.\nHer mother was Princess Mary Adelaide of Cambridge, the child and younger daughter of Prince Adolphus, Duke of Cambridge. She was baptised in the Chapel Royal of Kensington Palace on 27 July 1867 by Charles Thomas Longley, before she became queen, she was known to her family and the public by the diminutive name of May, after her birth month. Mays upbringing was merry but fairly strict and she was the eldest of four children, the only girl, and learned to exercise her native discretion and tact by resolving her three younger brothers petty boyhood squabbles. They played with their cousins, the children of the Prince of Wales, may was educated at home by her mother and governess. Although her mother was a grandchild of King George III, May was only a member of the British Royal Family. Her father, the Duke of Teck, had no inheritance or wealth, the Duchess of Teck was granted a parliamentary annuity of £5,000 and received about £4,000 a year from her mother, the Duchess of Cambridge. Despite this, the family was deeply in debt and lived abroad from 1883, the Tecks travelled throughout Europe, visiting their various relations.\nThey stayed in Florence, for a time, where May enjoyed visiting the art galleries, churches, in 1885, the Tecks returned to London, and took up residence at White Lodge, in Richmond Park. May was close to her mother, and acted as an secretary, helping to organise parties. She was close to her aunt, the Grand Duchess of Mecklenburg-Strelitz, during the First World War, the Crown Princess of Sweden helped pass letters from May to her aunt, who lived in enemy territory in Germany until her death in 1916. In December 1891, May was engaged to her second cousin once removed, Prince Albert Victor, Duke of Clarence and Avondale, the eldest son of the Prince of Wales. The choice of May as bride for the Duke owed much to Queen Victorias fondness for her, as well as to her strong character, Albert Victor died six weeks later, in a recurrence of the worldwide 1889–90 influenza pandemic\nThe British Empire comprised the dominions, protectorates and other territories ruled or administered by the United Kingdom and its predecessor states. It originated with the possessions and trading posts established by England between the late 16th and early 18th centuries. At its height, it was the largest empire in history and, for over a century, was the foremost global power. By 1913, the British Empire held sway over 412 million people, 23% of the population at the time. As a result, its political, legal and cultural legacy is widespread, during the Age of Discovery in the 15th and 16th centuries and Spain pioneered European exploration of the globe, and in the process established large overseas empires. Envious of the great wealth these empires generated, France, the independence of the Thirteen Colonies in North America in 1783 after the American War of Independence caused Britain to lose some of its oldest and most populous colonies. British attention soon turned towards Asia and the Pacific, after the defeat of France in the Revolutionary and Napoleonic Wars, Britain emerged as the principal naval and imperial power of the 19th century.\nIn the early 19th century, the Industrial Revolution began to transform Britain, the British Empire expanded to include India, large parts of Africa and many other territories throughout the world. In Britain, political attitudes favoured free trade and laissez-faire policies, during the 19th Century, Britains population increased at a dramatic rate, accompanied by rapid urbanisation, which caused significant social and economic stresses. To seek new markets and sources of raw materials, the Conservative Party under Benjamin Disraeli launched a period of imperialist expansion in Egypt, South Africa, Canada and New Zealand became self-governing dominions. By the start of the 20th century and the United States had begun to challenge Britains economic lead, subsequent military and economic tensions between Britain and Germany were major causes of the First World War, during which Britain relied heavily upon its empire. The conflict placed enormous strain on the military and manpower resources of Britain, although the British Empire achieved its largest territorial extent immediately after World War I, Britain was no longer the worlds pre-eminent industrial or military power.\nIn the Second World War, Britains colonies in Southeast Asia were occupied by Imperial Japan, despite the final victory of Britain and its allies, the damage to British prestige helped to accelerate the decline of the empire. India, Britains most valuable and populous possession, achieved independence as part of a larger movement in which Britain granted independence to most territories of the empire. The transfer of Hong Kong to China in 1997 marked for many the end of the British Empire, fourteen overseas territories remain under British sovereignty. After independence, many former British colonies joined the Commonwealth of Nations, the United Kingdom is now one of 16 Commonwealth nations, a grouping known informally as the Commonwealth realms, that share a monarch, Queen Elizabeth II. The foundations of the British Empire were laid when England and Scotland were separate kingdoms. In 1496, King Henry VII of England, following the successes of Spain and Portugal in overseas exploration, Cabot led another voyage to the Americas the following year but nothing was ever heard of his ships again\nDurbar is a Hindi-Urdu word, equally common in all North Indian languages and many other South Asian languages. It was the used for the place where Indian Kings and other rulers had their formal and informal meetings, i. e. in European context. Durbar is a Persian-derived term meaning the kings or rulers noble court or a meeting where the king held all discussions regarding the state. It was used in India and Nepal for a court or feudal levy as the latter came to be ruled. A durbar may be either a state council for administering the affairs of a princely state, or a purely ceremonial gathering. The most famous Durbars belonged to Great Emperors and Kings, in the North, cities like Udaipur, Jodhpur and Agra have palaces that adorn such magnificent halls. The Mughal Emperor Akbar had two halls, one for his ministers and the other for the general public, usually Durbar halls are lavishly decorated with the best possible materials available at the time. In the south of India, the Mysore Palace had a number of halls, especially the Peacock Hall, having colour tinted glasses imported from Belgium.\nThe Durbar Hall in the Khilawat Mubarak, in the city of Hyderabad, beneath the main Dome of the Rastrapati Bhavan is present, the grand Durbar Hall, where many state functions presided by the President of India are held. A durbar could be the council of a native state. There was some overlap between the two groups and this was originally another word for audience room and council, but in India it applies to a privy council and chancery. The practice was started with Lord Lyttons Proclamation Durbar of 1877 celebrating the proclamation of Queen Victoria as the first Empress of India, Durbars continued to be held in years, with increased ceremony and grandeur than their predecessors. In 1903, for instance, the Coronation Durbar was held in Delhi to celebrate the accession of Edward VII to the British throne and this ceremony was presided over by the Viceroy of India, Lord Curzon. The King and Queen attended the Durbar in person and wore their Coronation robes and they were the only British monarchs to visit India during the period of British rule.\nNo durbar was held for British monarchs who were Emperors of India, Edward VIII reigned only a brief time before abdicating. In Malaysian history, the Durbar was the council comprising the four rulers of the Federated Malay States under British protectorate, first held in 1897, it was a platform for the rulers to discuss issues pertaining state policies with British officials. When the Federation of Malaya was formed in 1948, the Durbar transformed into the Conference of Rulers with the inclusion of the states of Malaya. The membership was enlarged with the addition of new states in the formation of Malaysia in 1963\nIndia, officially the Republic of India, is a country in South Asia. It is the seventh-largest country by area, the second-most populous country, and it is bounded by the Indian Ocean on the south, the Arabian Sea on the southwest, and the Bay of Bengal on the southeast. It shares land borders with Pakistan to the west, China and Bhutan to the northeast, in the Indian Ocean, India is in the vicinity of Sri Lanka and the Maldives. Indias Andaman and Nicobar Islands share a border with Thailand. The Indian subcontinent was home to the urban Indus Valley Civilisation of the 3rd millennium BCE, in the following millennium, the oldest scriptures associated with Hinduism began to be composed. Social stratification, based on caste, emerged in the first millennium BCE, early political consolidations took place under the Maurya and Gupta empires, the peninsular Middle Kingdoms influenced cultures as far as southeast Asia. In the medieval era, Zoroastrianism and Islam arrived, much of the north fell to the Delhi sultanate, the south was united under the Vijayanagara Empire.\nThe economy expanded in the 17th century in the Mughal empire, in the mid-18th century, the subcontinent came under British East India Company rule, and in the mid-19th under British crown rule. A nationalist movement emerged in the late 19th century, which later, under Mahatma Gandhi, was noted for nonviolent resistance, in 2015, the Indian economy was the worlds seventh largest by nominal GDP and third largest by purchasing power parity. Following market-based economic reforms in 1991, India became one of the major economies and is considered a newly industrialised country. However, it continues to face the challenges of poverty, malnutrition, a nuclear weapons state and regional power, it has the third largest standing army in the world and ranks sixth in military expenditure among nations. India is a constitutional republic governed under a parliamentary system. It is a pluralistic and multi-ethnic society and is home to a diversity of wildlife in a variety of protected habitats. The name India is derived from Indus, which originates from the Old Persian word Hindu, the latter term stems from the Sanskrit word Sindhu, which was the historical local appellation for the Indus River.\nThe ancient Greeks referred to the Indians as Indoi, which translates as The people of the Indus, the geographical term Bharat, which is recognised by the Constitution of India as an official name for the country, is used by many Indian languages in its variations. Scholars believe it to be named after the Vedic tribe of Bharatas in the second millennium B. C. E and it is traditionally associated with the rule of the legendary emperor Bharata. Gaṇarājya is the Sanskrit/Hindi term for republic dating back to the ancient times, hindustan is a Persian name for India dating back to the 3rd century B. C. E. It was introduced into India by the Mughals and widely used since and its meaning varied, referring to a region that encompassed northern India and Pakistan or India in its entirety\nVictoria was Queen of the United Kingdom of Great Britain and Ireland from 20 June 1837 until her death. From 1 May 1876, she adopted the title of Empress of India. Victoria was the daughter of Prince Edward, Duke of Kent and Strathearn, both the Duke of Kent and King George III died in 1820, and Victoria was raised under close supervision by her German-born mother Princess Victoria of Saxe-Coburg-Saalfeld. She inherited the throne aged 18, after her fathers three brothers had all died, leaving no surviving legitimate children. The United Kingdom was already a constitutional monarchy, in which the sovereign held relatively little direct political power. Privately, Victoria attempted to influence government policy and ministerial appointments, Victoria married her first cousin, Prince Albert of Saxe-Coburg and Gotha, in 1840. Their nine children married into royal and noble families across the continent, tying them together, after Alberts death in 1861, Victoria plunged into deep mourning and avoided public appearances.\nAs a result of her seclusion, republicanism temporarily gained strength and her Golden and Diamond Jubilees were times of public celebration. Her reign of 63 years and seven months is known as the Victorian era and it was a period of industrial, political and military change within the United Kingdom, and was marked by a great expansion of the British Empire. She was the last British monarch of the House of Hanover and her son and successor, Edward VII, belonged to the House of Saxe-Coburg and Gotha, the line of his father. Victorias father was Prince Edward, Duke of Kent and Strathearn, until 1817, Edwards niece, Princess Charlotte of Wales, was the only legitimate grandchild of George III. Her death in 1817 precipitated a crisis that brought pressure on the Duke of Kent. In 1818 he married Princess Victoria of Saxe-Coburg-Saalfeld, a widowed German princess with two children—Carl and Feodora —by her first marriage to the Prince of Leiningen and her brother Leopold was Princess Charlottes widower.\nThe Duke and Duchess of Kents only child, was born at 4.15 a. m. on 24 May 1819 at Kensington Palace in London. Victoria was christened privately by the Archbishop of Canterbury, Charles Manners-Sutton, on 24 June 1819 in the Cupola Room at Kensington Palace and she was baptised Alexandrina, after one of her godparents, Emperor Alexander I of Russia, and Victoria, after her mother. Additional names proposed by her parents—Georgina and Augusta—were dropped on the instructions of the Dukes eldest brother, the Duke of Clarence and the Duke of Kent married on the same day in 1818, but both of Clarences daughters died as infants. Victorias father died in January 1820, when Victoria was less than a year old, a week her grandfather died and was succeeded by his eldest son, George IV. The Duke of York died in 1827, when George IV died in 1830, he was succeeded by his next surviving brother, William IV, and Victoria became heir presumptive\nCinema of India\nThe cinema of India consists of films produced across India. Cinema as a medium has gained popularity in the country. Indian films have come to be followed throughout South Asia. Dadasaheb Phalke is known as the father of Indian cinema, the Dadasaheb Phalke Award, for lifetime contribution to cinema, was instituted in his honour, by the Government of India in 1969, and is the most prestigious and coveted award in Indian cinema. In the 20th century, Indian cinema, along with the Hollywood and Chinese film industries, as of 2013, in terms of annual film output, India ranks first, followed by Nollywood and China. In 2012, India produced 1,602 feature films, the Indian film industry reached overall revenues of $1.86 billion in 2011. This is projected to rise to $3 billion in 2016, in 2015, India had a total box office of US$1.6 billion, the fourth largest in the world outside North America. Enhanced technology paved the way for upgrading from established norms of delivering product. Visual effects based, super hero science fiction, and epic films like Enthiran, Indian cinema found markets in over 90 countries where films from India are screened.\nThe Indian government extended film delegations to countries such as the United States of America. The provision of 100% foreign direct investment has made the Indian film market attractive for foreign enterprises such as 20th Century Fox, Sony Pictures, Walt Disney Pictures, tax incentives to multiplexes have aided the multiplex boom in India. By 2003 as many as 30 film production companies had been listed in the National Stock Exchange of India, the South Indian film industry defines the four film cultures of South India as a single entity. They are the Tamil, the Telugu, the Malayalam and the Kannada industries, although developed independently over a long period, gross exchange of film performers and technicians as well as globalisation helped to shape this new identity. Music in Indian cinema is another substantial revenue generator with the music rights alone accounting for 4–5% of the net revenues generated by a film in India. Following the screening of the Lumière moving pictures in London, cinema became a sensation across Europe, in the next year a film presentation by one Professor Stevenson featured a stage show at Calcuttas Star Theatre.\nWith Stevensons encouragement and camera Hiralal Sen, an Indian photographer, made a film of scenes from that show, the Wrestlers by H. S. Bhatavdekar showing a wrestling match at the Hanging Gardens in Bombay was the first film ever to be shot by an Indian. It was the first Indian documentary film, the first Indian film released in India was Shree Pundalik a silent film in Marathi by Dadasaheb Torne on 18 May 1912 at Coronation Cinematograph, Bombay. The female roles in the film were played by male actors, the film marked a historic benchmark in the film industry in India\nThe dynasty, though ethnically Turco-Mongol, was Persianate in terms of culture. The Mughal empire extended over parts of the Indian subcontinent. The beginning of the empire is conventionally dated to the victory by its founder Babur over Ibrahim Lodi, the Mughal emperors were Central Asian Turco-Mongols belonging to the Timurid dynasty, who claimed direct descent from both Genghis Khan and Timur. During the reign of Humayun, the successor of Babur, the empire was briefly interrupted by the Sur Empire, the classic period of the Mughal Empire started in 1556 with the ascension of Akbar the Great to the throne. Under the rule of Akbar and his son Jahangir, the region enjoyed economic progress as well as harmony. Akbar was a warrior who forged alliances with several Hindu Rajput kingdoms. Some Rajput kingdoms continued to pose a significant threat to the Mughal dominance of northwestern India, the reign of Shah Jahan, the fifth emperor, between 1628 and 1658 was the golden age of Mughal architecture.\nHe erected several monuments, the best known of which is the Taj Mahal at Agra, as well as the Moti Masjid, the Red Fort, the Jama Masjid, Delhi. By the mid-18th century, the Marathas had routed Mughal armies, during the following century Mughal power had become severely limited, and the last emperor, Bahadur Shah II, had authority over only the city of Shahjahanabad. He issued a firman supporting the Indian Rebellion of 1857 and following the defeat was therefore tried by the British East India Company for treason and exiled to Rangoon. Contemporaries referred to the empire founded by Babur as the Timurid empire, which reflected the heritage of his dynasty, another name was Hindustan, which was documented in the Ain-i-Akbari, and which has been described as the closest to an official name for the empire. In the west, the term Mughal was used for the emperor, and by extension, the use of Mughal derived from the Arabic and Persian corruption of Mongol, and it emphasised the Mongol origins of the Timurid dynasty.\nThe term gained currency during the 19th century, but remains disputed by Indologists, similar terms had been used to refer to the empire, including Mogul and Moghul. Nevertheless, Baburs ancestors were sharply distinguished from the classical Mongols insofar as they were oriented towards Persian rather than Turco-Mongol culture, ousted from his ancestral domains in Central Asia, Babur turned to India to satisfy his ambitions. He established himself in Kabul and pushed steadily southward into India from Afghanistan through the Khyber Pass, Baburs forces occupied much of northern India after his victory at Panipat in 1526. The preoccupation with wars and military campaigns, did not allow the new emperor to consolidate the gains he had made in India, the instability of the empire became evident under his son, who was driven out of India and into Persia by rebels. Humayuns exile in Persia established diplomatic ties between the Safavid and Mughal Courts, and led to increasing Persian cultural influence in the Mughal Empire, the restoration of Mughal rule began after Humayuns triumphant return from Persia in 1555, but he died from a fatal accident shortly afterwards.\nHumayuns son, succeeded to the throne under a regent, Bairam Khan, through warfare and diplomacy, Akbar was able to extend the empire in all directions and controlled almost the entire Indian subcontinent north of the Godavari River\nPrince Arthur, Duke of Connaught and Strathearn\nUpon graduation, he was commissioned as a lieutenant in the British Army, where he served for some 40 years, seeing service in various parts of the British Empire. During this time he was created a royal duke, becoming the Duke of Connaught and Strathearn. In 1911, he was appointed as Governor General of Canada and he occupied this post until being succeeded by the Duke of Devonshire in 1916. After the end of his tenure, Arthur returned to the United Kingdom and there, as well as in India, performed various royal duties. Though he retired from life in 1928, he continued to make his presence known in the army well into the Second World War. He was Queen Victorias last surviving son, Arthur was born at Buckingham Palace on 1 May 1850, the seventh child and third son of Queen Victoria and Prince Albert. The prince was baptised by the Archbishop of Canterbury, John Bird Sumner, as with his older brothers, Arthur received his early education from private tutors. It was reported that he became the Queens favourite child, following his arrival at Halifax, Arthur toured the country for eight weeks and made a visit in January 1870 to Washington, D. C.\nwhere he met with President Ulysses S. Grant. Arthur made an impression on many in Canada, as he became the 51st chief on the council, his appointment broke the centuries-old tradition that there should only be 50 chiefs of the Six Nations. Arthur was promoted to the rank of colonel on 14 June 1871, substantive lieutenant-colonel in 1876, colonel on 29 May 1880 and. He gained military experience as Commander-in-Chief of the Bombay Army from December 1886 to March 1890 and he went on to be General Officer Commanding Southern District, at Portsmouth, from September 1890 to 1893. The Prince had hoped to succeed his first cousin once-removed, the elderly Prince George, Duke of Cambridge, as Commander-in-chief of the British Army, upon the latters forced retirement in 1895. But this desire was denied to Arthur, and instead he was given, between 1893 and 1898, command of the Aldershot District Command, the regiment had recently been converted to the infantry role from the 2nd Battalion, 5th British Columbia Regiment of Canadian Artillery.\nWith the Princes agreement the unit was renamed 6th Regiment, Duke of Connaughts Own Rifles on 1 May 1900 and he was subsequently appointed colonel-in-chief of the regiment, known as The British Columbia Regiment, in 1923. He held that appointment until his death, on his mothers birthday in 1874, Arthur was created a royal peer, being titled as the Duke of Connaught and Strathearn and Earl of Sussex. Through his childrens marriages, Arthur became the father-in-law of Crown Prince Gustaf Adolf of Sweden, Princess Alexandra, Duchess of Fife, arthurs first two children predeceased him, Margaret while pregnant with his sixth grandchild. For many years, Arthur maintained a liaison with Leonie, Lady Leslie, sister of Jennie Churchill, alongside his military career, he continued to undertake royal duties beyond, or vaguely associated with, the army. On the return from a posting in India, he again and he toured Canada in 1906\nGentry are well-born and well-bred people of high social class, especially in the past. In the United Kingdom, the term refers to the social class of the landed aristocracy or to the minor aristocracy whose income derives from their large landholdings. The idea of gentry in the sense of noblesse is extinct in common parlance in modern day Britain. Though the untitled nobility in modern day Britain are normally termed gentry, the older sense of nobility is that of a quality identical to gentry. The fundamental social division in most parts of Europe in the Middle Ages was between the nobiles, i. e. the tenants in chivalry, and the ignobles, i. e. the villeins and burgesses. The division into nobles and ignobles in smaller regions of Europe in the Middle Ages was less due to a more rudimentary feudal order. After the Reformation, intermingling between the class and the often hereditary clerical upper class became a distinctive feature in several Nordic countries. Besides the gentry there have been other analogous traditional elites, the Indo-Europeans who settled Europe, Western Asia and the Indian subcontinent conceived their societies to be ordered in a tripartite fashion, the three parts being castes.\nCastes came to be divided, perhaps as a result of greater specialisation. The classic formulation of the system as largely described by Georges Dumézil was that of a priestly or religiously occupied caste, a warrior caste. Dumézil divided the Proto-Indo-Europeans into three categories, sovereignty and productivity and he further subdivided sovereignty into two distinct and complementary sub-parts. One part was formal and priestly, but rooted in this world, the other was powerful and priestly, but rooted in the other, the supernatural and spiritual world. The second main division was connected with the use of force, the military, there was a third group, ruled by the other two, whose role was productivity, herding and crafts. This system of roles can be seen in the castes which flourished on the Indian subcontinent. Emperor Constantine convoked the First Council of Nicaea in 325 whose Nicene Creed included belief in one holy catholic and apostolic Church, emperor Theodosius I made Nicene Christianity the state church of the Roman Empire with the Edict of Thessalonica of 380.\nIn this power vacuum, the Church rose to become the dominant power in the West, the classical heritage flourished throughout the Middle Ages in both the Byzantine Greek East and Latin West. During the Middle Ages it was customary to classify the population of Christendom into laboratores, the last group, though small in number, monopolized the instruments and opportunities of culture, and ruled with almost unlimited sway half of the most powerful continent on the globe. The clergy, like Platos guardians, were placed in authority, in the latter half of the period in which they ruled, the clergy were as free from family cares as even Plato could desire", "label": "No"} {"text": "Figure 1-4.-NAVEDTRACOM casualty category decision tree.\nMESSAGE TEXT STRUCTURE. The text of a\nThe free text set, which consists of a set identifier\nCASREP message is composed of data sets as necessary\nfollowed by a single, unformatted, narrative data field.\nThis type of set is used to explain or amplify formatted\nto report a particular situation. Each data set, in turn, is\ninformation contained in one or more of the linear or\ncomposed of one or more data fields. The fields in each\ncolumnar data sets in a message. Figures 1-5, 1-6, and\nset are grouped according to their relationship. The three\n1-7 are examples of the data sets.\ntypes of data sets used in CASREP messages are as\nThe linear data set, which consists of a set\nidentifier and one or more data fields present in a\nThe following paragraphs will discuss the reporting\ncriteria for each type of CASREP.\nThe columnar data set, which is used to display\nINITIAL CASREP.-- An INITIAL CASREP (fig.\ninformation in tabular form and contains multiple data\n1-8) is used to report the occurrence of a significant\nlines. The first line of the set consists of a set identifier,\nequipment casualty and provides specific information\nthe second line contains column headers, and\nconcerning repair of the casualty. Only one initial\nsubsequent lines contain data fields that are aligned\ncasualty may be submitted per CASREP message. All\nrequired information must be submitted in the INITIAL\nunder the appropriate headings.", "label": "No"} {"text": "You might have seen news articles recently about a study saying SUVS are safer than other vehicles. The study only addressed the safety of people in the SUV, and failed to mention the very troubling fact that passengers in other vehicles hit by SUVs are more likely to die.\nHow much more likely to die? It depends on the information source, but one says sixteen times more likely and another says six times more likely. Additionally, in accidents involving SUVs and other passenger vehicles, nearly 98 percent of those who were killed were in the non-SUVs. Another source says pedestrians hit by SUVs have a 300 percent greater risk of serious injury than pedestrians struck by smaller cars like sedans. (Another study found that in fatal accidents involving SUVS, children inside them were 24 percent more likely to die, than if they were in minivans.)\nSo why do SUVs cause so much extra destruction? For one thing they typically weigh more, or much more. Combine their extra weight with the fact they are taller and have higher bumpers (sometimes also brush guards), and you can see how they function like large, heavy battering rams on wheels. A Hummer weighs over 8,000 pounds! The GMC Yukon four door is 5,500, and the Nissan Armada is 5,300.\nBumpers are designed to impact on the same level as the bumpers on other vehicles, but the higher bumpers and brush guards on SUVs result in hitting smaller vehicles above their bumpers where there is less protection. If you imagine an SUV hitting a mid-size sedan on the side, the SUVs front would be about shoulder and head-high for a person in the smaller vehicle. At this level, a person is more vulnerable to serious injury to the brain, neck, and chest organs such as the heart, lungs, and major arteries. SUVs typically also require more distance to slow down and stop, which makes them less able to avoid accidents.\nGiven the fact that in the U.S., nearly ninety percent of vehicles on the roads are not large vehicles, you can see how vulnerable their occupants are to damage from SUVs.\nSo why would the Institute for Highway Safety fail to not mention that SUVs are actually more dangerous for the the majority of motorists and pedestrians? Who knows exactly, it could have been an honest mistake. Another possible answer lies in the fact the Institute for Highway is funded by the auto insurance companies, and SUVS provide them with more revenue because they cost typically ten to twenty percent more to insure, which might not sound like a huge difference, but if fifteen million people are paying an extra $300 per year, that is $4.5 billion per year. If it was an extra $400 per year, then the total would $6 billion a year.\nThe Institute for Highway Safety definitely seems to have a conflict of interest; financially the auto insurers backing them stand to gain greatly from the public perception that SUVS are a good vehicle for consumers to buy. Just one example, if you buy a new GMC Yukon Denali, insurance for five years would cost nearly $9,000, according to Edmunds.com. (Fuel for the same period – a whopping $18,000). The true cost of ownership, including the sticker price, is $76,000 – and if you hit another vehicle and injure or kill someone else, the costs explode further. Also, imagine what happens to SUV insurance if you have any speeding tickets, accident history, or a DUI.\n“Yes auto rates for SUVs are generally higher than for automobiles. Rates of course correlate to risk – and there are a lot of risk factors with SUVs. Not so much what affects them, but what they do to other vehicles, ” said Loretta L. Worters, vice president of communications for the Insurance Information Institute. (Source: autoinsurancequotes.com)\nWhy would the IIHS release the results of such a study now? It could be with high gas prices, people are shying away from gas guzzlers like SUVS, especially when they see they also have to pay extra for insurance. Also in tough times like these, spending extra is simply unwise. Additionally the growing green trend is likely having some dampening effect on the purchasing of very fuel-inefficient vehicles, when there are more sensible alternatives available like the hybrid Toyota Prius, Honda Civic, Jetta and Golf TDI, and electrics like the Nissan Leaf and new Ford Focus. This article is about the damage SUVS cause to people, but it must also be said they contribute more to climate change, simply due to the fact they require much more gasoline, and produce more CO2.\nImage credit: Brady Holt", "label": "No"} {"text": "The era of industrial growth transformed American society creating a new class of wealthy entrepreneurs and a comfortable middle class. The increase in industry resulted in a growth among the blue collar working class. This labor force was made up of millions of newly arrived immigrants and vast numbers of families migrating from rural areas to cities with the hope of job security and prosperity.\nWith a dream of a better life, rural families relocated to the cities to find work. Sadly, most were disappointed when they arrived and discovered that the truth was not as “rosey” as they had been led to believe. The jobs available required long hours and offered little pay. In most situations, every able family member was needed to work to simply keep the family above the poverty level. Those working included children as young as three.\nYoung children working endured some of the harshest conditions. Workdays would often be 10 to 14 hours with minimal breaks during the shift. Factories employing children were often very dangerous places leading to injuries and even deaths. Machinery often ran so quickly that little fingers, arms and legs could easily get caught. Beyond the equipment, the environment was a threat to children as well as factories put out fumes and toxins. When inhaled by children these most certainly could result in illness, chronic conditions or disease.\nChildren working in rural areas were not faring much better. Harvesting crops in extreme temperatures for long hours was considered normal for these children. Work in agriculture was typically less regulated than factory duties. Farm work was often not considered dangerous or extraneous for children, even though they carried their weight and more in loads of produce and handled dangerous tools.\nIn the United States it took many years to outlaw child labor. By 1899, 28 states had passed laws regulating child labor. Many efforts were made to pass a national child labor law. The U.S. Congress passed two laws, in 1918 and 1922, but the Supreme Court declared both unconstitutional. In 1924, Congress proposed a constitutional amendment prohibiting child labor, but the states did not ratify it. Then, in 1938, Congress passed the Fair Labor Standards Act. It fixed minimum ages of 16 for work during school hours, 14 for certain jobs after school, and 18 for dangerous work. Today all the states and the U.S. government have laws regulating child labor. These laws have cured the worst evils of children working in factories.\n(Photo credit: Lewis Hine / Library of Congress).", "label": "No"} {"text": "This article was originally written as a term paper for an architectural theory course at Princeton University. It has been revised and updated for web publication.\nAn elaborate house of planes and pitched roofs emerges from a green hill in Wisconsin, while a house that resembles a spaceship stands apart in a field in France. The two houses, the first being Frank Lloyd Wright’s estate and studio, Taliesin, and the second, Le Corbusier’s seminal work, the Villa Savoye, could not be more different in their theoretical approaches to architecture. Yet both designs were conceived through the respective architect’s understanding of classical architecture and a desire to adhere to their respective architectural philosophies.\nFrank Lloyd Wright and Le Corbusier were two of the most influential figures of modern architecture, and both architects projected their influence on the profession through their extensive architectural theories and writings. Frank Lloyd Wright was a proponent of “organic” architecture that achieved a synthesis between natural forms and architecture, while Le Corbusier considered architecture a “machine for living” and his work laid the groundwork for much of the functionalist architecture of the 20th century. Le Corbusier’s “five points of architecture,” the characteristics essential to his buildings, included steel “pilotis,” supports that allowed for a “free plan,” an arrangement of rooms and spaces designed independently of each floor, and a “free façade,” where the face of the building was designed independently of structural considerations. Additionally, Le Corbusier considered outdoor patio “roof gardens” and horizontal windows part of his vision.\nWright and Le Corbusier’s design philosophies seem inherently different, but if we consider Sigfried Giedion’s three “space conceptions” of architecture, which serve as an analytical framework that codifies the evolution of classical architecture, we can analyze Taliesin and Villa Savoye and pinpoint the classical origins from which their architectural aspects derive, and which classical aspects have been combined to create innovative, modern effects.\nAccording to Giedion, the first space conception was developed by the ancient Egyptians and Greeks, whose pyramids and Doric Temples directly related the architecture to the landscape on which they were built. The Parthenon demonstrates this relationship through its strategic positioning on the Acropolis, while little attention is paid to the Parthenon’s interior.\nThe second space conception involved the development of vaults and domes by the Romans and their successors. In contrast to the first conception, the second space conception was more focused on the interior’s opening up of space to resemble the cosmos, rather than the exterior space’s relation to landscape. From the interior, the Pantheon’s dome attempted to relate the building’s space to the cosmos by representing the sky with a vaulted ceiling.\nThe third space conception, Giedion said, was the challenge of modern architecture, where new construction techniques allowed the exterior space to relate to nature and the interior to relate to the cosmos, creating a new synthesis between the first two conceptions. Because both Wright and Le Corbusier’s architecture derive in part from classical architecture, looking at Taliesin and the Villa Savoye through the space conception lens allows us to see that both architects adapted the historical narrative to support their own theories and designs, leading both architects to achieve different results from each other. Furthermore, when both their architectural theories were adapted to urbanism, they left legacies that were markedly different from classical architecture, creating forms that helped lead to the rise of suburban sprawl and ineffective housing projects, revealing the implications of arbitrary narrative-building in architectural theory. Thus, we should be suspicious of architects who claim to be the definitive part of a long line and tradition, as classical reinterpretation and architectural theories directly translated to urbanism lend themselves to a variety of problems.\nWright sought to establish an architectural style that was unique to America, one that he described as “Usonian,” a word for “American” he promoted that lacked external cultural influences. While denying the influence of classical precedents, his architectural style appears to rely on them, internalizing aspects of architectural styles as disparate as the Romans, Pre-Columbian peoples and Japanese. Wright’s relationship with classical architecture can be seen through his rationale for Taliesin’s relationship to the natural landscape.\nIn Wright’s essay, “Some Aspects of the Past and Present of Architecture,” Wright claims “the land is the simplest form of architecture” and “in ancient times [the land’s] limitations served to keep [man’s] buildings architecture. Splendid examples: Mayan, Egyptian, Greek, Byzantine, Persian, Indian, Chinese, Japanese.” In these broad strokes, Wright claims all classical architecture adhered to what Giedion called the first space conception—architecture’s relationship to surrounding nature. The sheer variety of examples, however, implies Wright conflated various cultures to support his design philosophy, suggesting he selected a particular narrative of architectural progress to support his theories.\nWhen one considers the context in which Taliesin was built, the classical origin for Taliesin’s design becomes more precise. Wright built the first iteration of Taliesin following a visit to Fiesole, Italy, where he was inspired by Etruscan ruins built into the side of a hill, which commanded an impressive view of the surrounding valley. The Renaissance-era Villa Medici at Fiesole was incorporated into the peak of the hill, a phenomenon that Wright admired and called a “shining brow” for the hill, words he would translate into Welsh to create the name “Taliesin” for his estate.\nIn his autobiography, Wright states “no house should ever be on a hill or on anything. It should be of the hill. Belonging to it.” Indeed, Taliesin is constructed and incorporated into a hill in Spring Green, Wisconsin, overlooking Wright’s property, a scenic green valley. Just like the Pre-Columbian site of Machu Picchu and the Parthenon atop the Acropolis, the house emerges from the natural landscape, clinging to the “brow” of the hill, showcasing Wright’s embrace of the first space conception and continuity with classical architecture. The house wraps around the hill’s “brow” forming a landscaped courtyard at the hill’s natural summit. The house itself follows the hill’s natural contours: “the lines of the hills were the lines of the roofs, the slopes of the hills their slopes,” establishing a continuity between nature and architecture that is stronger than that of classical architecture, which crowned outcrops with more formalized, geometric forms, like in the case of the Acropolis.\nClassical geometric forms were used as justifications for Le Corbusier’s design philosophy, especially in Villa Savoye, the house that is widely considered emblematic of his philosophy. Ironically, it was the approach of comparing classical forms that makes Villa Savoye aloof from the first space conception. In Vers une Architecture, Le Corbusier wrote “Greek, Egyptian, and Roman architecture is an architecture of prisms, cubes, and cylinders, of trihedrons and spheres: the Pyramids, the Temple of Luxor, the Parthenon, the Colosseum, Hadrian’s Villa.” Rather than elevate the situational aspects of these ancient sites, as Giedion and Wright did, Le Corbusier focused on the elemental forms of the buildings, independent of their context.\nAs a result, Villa Savoye stands in a field, apart from nature, as it is composed of the elemental form of a box raised on pilotis. In terms of the first space conception, Villa Savoye is not integrated within in its environment and lacks the unity with nature that Wright’s Taliesin achieves. Even though both Wright and Le Corbusier’s theoretical work both reflects classical architecture, the fact that both take such different approaches toward the first space conception reveals how much of their respective historical narratives as arbitrary. As we shall see, Le Corbusier’s design much more effectively addresses the second space conception and has some similarities in this regard with Taliesin’s design.\nFrank Lloyd Wright’s design for Taliesin has certain characteristics that suggest an effort to address what Giedion called the second space conception, and when combined with the effects of the first, causes Taliesin to approach the third space conception. The interior of Taliesin is made up of a series of rooms and hallways, a collection of interlocking planes that again suggest the contours of the hill. The hallways’ low ceilings influence visitors to reach the next room and not dwell in the hallway. Additionally, the low hallways resemble tunnels in a cave—further relating to the concept that Taliesin is an outgrowth of the hill.\nIn Taliesin’s living room, however, the second space conception is directly addressed. A vaulted, pitched ceiling opens the space up and gives the sense of the cosmic, much like gothic architecture or Roman domes, a conceit Wright depicted as “tent-like,” emphasizing a subservience and allegiance to nature, giving the building a modest, integrative aspect, like camping under the stars. The drywall ceiling is also in conversation with the stonework, as the ceiling’s wooden lines are reminiscent of the sun’s rays. Skylights illuminate the room, while the stonework firmly grounds the building in nature.\nThe second space conception is firmly addressed by the arrangement of the windows in the living room, an arrangement that draws similarities to Le Corbusier’s work. A line of horizontal windows stretches around two walls of the living room, “windows that swung out above the treetops.” The windows frame the valley below in a landscape perspective that limits depth perception, framing a static, pastoral image very similar to what Le Corbusier codified as the horizontal window. Seating exists below the windows, much like in Le Corbusier’s Villa Le Lac on Lake Geneva, but uniquely there is a lower ceiling above the window to persuade visitors to sit underneath the ceiling and look out the window from their seat. The dialogue between the windows and the outside landscape further relates the building to its natural context—not only is it situated within the fabric of the hill, but it looks out on the hill and thereby participates in the landscape. The fact the window seating dictates how the view is observed parallels how the building’s form is dictated by the landscape. Through the interior and exterior’s relation to landscape and the cosmos, Taliesin’s living room transcends the second space conception and approaches the third, but does not quite achieve the extreme possibilities of the third space conception that Le Corbusier does in the Villa Savoye.\nWhile Le Corbusier’s Villa Savoye lacked a strong association with the first space conception, it has elements that lend themselves to the second and third space conceptions. The horizontal window, uniformly wrapped around the free façade on the second floor, reflects the dialogue between interior and exterior space. The horizontal window exists, even if there is no glass between the frame space on the second-floor patio, which is equated with the enclosed half of the house on the other side, giving the two spaces equal importance for living and suggesting that both have the potential to have a conversation with the surrounding nature.\nLe Corbusier’s horizontal window’s ability to cultivate an interior-exterior dialogue is best demonstrated by the photo from the Villa Le Lac in Geneva, in which the long window frames the Swiss mountains and the lake and seating is below the window, a phenomenon similar to Taliesin’s long windows and seating. The effect is an immediate, two-dimensional landscape lacking depth perception, but one that draws the distant landscape in and makes it immediately present from within the building, giving it a sort of “omnipresence,” showcasing a form of the second space conception, but transcending it to deify the natural landscape as an unmovable, all-powerful force—like the sky. Le Corbusier develops this relationship and allows the visitor to ascend through this cosmic landscape, creating a stunning interpretation of the third space conception.\nThe free plan and free façade allow each level of the house to dematerialize through a series of stairs and ramps as part of what Corbusier called the “promenade architectural”. As a result, the experience of ascending through the house to the roof garden is celebrated, and, much like the ascent of the Panathaneic Way to the ancient Acropolis that leads to the Parthenon, the ascent through the house leads inexorably to the sky and cosmos. When one ascends the ramp from the second floor to the roof garden, one approaches a “window” in the roof garden that opens up to a view of the lawn. Like Taliesin’s windows, the roof garden’s “window” is in dialogue with the landscape, and the implicit coaxing of the ramp is similar to Taliesin’s low ceilings in that they conspire to move the visitor. The roof garden’s enclosing walls and open ceiling makes the visitor turn their head to the sky. Thus, a form of the second space conception is transformed into the third—interior space has become transformed into exterior space, the very ceiling of the roof garden being the sky. The roof of the building is a place to be inhabited, a place to be closer to the cosmos. Like the Parthenon’s crowning of the Acropolis, the roof garden is the elemental form that transcends the rest of the building.\nFrank Lloyd Wright and Le Corbusier both incorporated classical architectural narratives into their work, and both used those narratives to justify designs that fulfill different aspects of Giedion’s space conceptions. Frank Lloyd Wright’s Taliesin can be related to Giedion’s first two space conceptions and approaches the third, while Le Corbusier’s Villa Savoye eschews the first in favor of the second and an innovative approach to the third space conception. However, when they applied their theoretical, architectural theories to the logical end point of urban planning, the true arbitrary nature of the narrative they established is revealed, leaving severe implications for 20th century urbanism.\nFrank Lloyd Wright translated his ideal of organic architecture to his plan for Broadacre City, a vision in which each house was granted one acre to itself, which urban historian Tom Martinson considers more of an “enabling methodology than an actual plan.” In Broadacre City, the city is so decentralized by dispersed residential lots and highways that “the [service] station that happens to be naturally located will as naturally grow into a neighborhood distribution center, meeting-place, restaurant, rest room or whatever else is needed.” What Wright is describing resembles the suburbanization of the United States—a process, even if conducted with each house achieving harmony with its one-acre plot, does not entail the sustainable unity with nature for which he argued. Modern urban planners understand the environmental costs and unsustainability of the suburban model created by dispersal, long commutes, and automobile dependency.\nInterestingly, Le Corbusier’s plan for the “Radiant City” also envisioned a suburban landscape, but one that centered around monolithic towers in gigantic park divided by superhighways. The towers are coordinated in relation to each other, but not to a natural landscape.\nLe Corbusier’s philosophy of forms and his plan itself is contrary to Le Corbusier’s attention to classical plan, because in Vers une Architecture, he describes how the Acropolis of Athens is “determined by the famous landscape that extends from Peiraeus [sic] to Mount Pentalikon… the plan is conceived for distant views: the axes line up with the valley…” With the Radiant City, his towers are independent of natural context, leaving harsh implications for society.\nAt odds with the natural landscape, the extrapolation of Le Corbusier’s design philosophy to urbanism inspired “cités” in the suburban Banlieue districts outside central Paris, giant housing projects that had no relation to the landscape and surrounding urbanism and lacked the inspirational public spaces that would have helped build community. In the U.S., similar housing projects inspired by Le Corbusier’s design were also notoriously unsuccessful, leading to demolitions of many of the projects just decades after their construction.\nThe major thrust of this article has been to show how two major architects of the 20th century aligned their theories with a classical narrative, shown through the examples of two of their most famous buildings. The problematic translations of their design philosophies to urbanism simultaneously suggests that some of this narrative-building is arbitrary and suspect, while also cautioning that one level of design magnitude, the building, should be thought of as much different from the greater magnitude of urbanism. It also suggests that even though the two greats developed aspects of what became known as Giedion’s third space conception, both were unable to create a vision of the third space conception that could be successfully translated to urban scale, a task that remains for future architects. As Giedion states, “How the third space conception will proceed cannot be foreseen, but its general directions are apparent.”\n Franklin K. Toker, Fallingwater Rising: Frank Lloyd Wright, E.J. Kaufmann, and America’s Most Extraordinary House (New York: Alfred A. Knopf, 2003), 25.\n Le Corbusier, “Five Points to a New Architecture,” in Programmes and Manifestoes on 20th Century Architecture, ed. Ulrich Conrads, trans. Michael Bullock (London: Lund Humphries, 1970), 99-100, accessed January 7, 2015.\n Le Corbusier, “Five Points to a New Architecture,” in Programmes and Manifestoes on 20th, 99-100.\n Siegfried Giedion, “Three Architectural Space Conceptions,” in The Beginnings of Architecture, by S. Giedion, Bollingen Series 35 (Princeton, NJ: Princeton University Press, 1981), 521.\n Giedion, “Three Architectural Space Conceptions,” in The Beginnings of Architecture, 522-523.\n Ibid., 523.\n Ibid., 523-524.\n Ibid., 523.\n Ibid., 523-524.\n Ibid., 526.\n Jackie Craven, “What is a Usonian? Frank Lloyd Wright’s Answer to the Great Depression,” About, last modified 2015, accessed January 11, 2015, http://architecture.about.com/od/franklloydwright/g/usonian.htm.\n Ruth Anne Philipps, “Stone, Water, and Mortarless Constructions: Frank Lloyd Wright and the Pre-Columbian Inca,” The Latin Americanist 57, no. 4 (December 2013): 97, accessed January 5, 2015, http://onlinelibrary.wiley.com/\n Frank Lloyd Wright, The Future of Architecture (New York: Horizon Press, 1953), 34.\n Ron McCrea, Building Taliesin: Frank Lloyd Wright’s Home of Love and Loss (Madison, WI: Wisconsin Historical Society Press, 2012), 15, 18, 27, accessed January 4, 2015, http://site.ebrary.com/lib/princeton/reader.action?docID=10899628.\n McCrea, Building Taliesin: Frank Lloyd, 15, 27.\n Frank Lloyd Wright, Frank Lloyd Wright, an Autobiography, 5th ed. (New York: Duell, Sloan and Pearce, 1943), 167.\n Wright, Frank Lloyd Wright, an Autobiography, 168.\n Ibid., 171.\n Panayotis Tournikiotis, “Le Corbusier, Giedion, and the Villa Savoye: From Consecration to Preservation of Architecture,” Future Anterior: Journal of Historic Preservation, History, Theory, and Criticism 4, no. 2 (Winter 2007): 4, accessed January 12, 2015, http://www.jstor.org/stable/25835008?seq=5#page_scan_tab_contents.\n Le Corbusier, Toward an Architecture, trans. John Goodman (Los Angeles: Getty Research Institute, 2007), 102-105, originally published as Vers une Architecture (Paris: G. Cres, 1924), accessed January 11, 2015, https://libweb10.princeton.edu/ereserves/\n Kevin D. Murphy, “Villa Savoye and the Modernist Historic Movement,” Journal of the Society of Architectural Historians 61, no. 1 (March 2002): 69, accessed January 12, 2015, http://www.jstor.org/stable/991812?seq=2#page_scan_tab_contents.\n Taliesin Preservation, “House Tour” (lecture, Taliesin, Spring Green, WI, August 2012).\n Wright, Frank Lloyd Wright, an Autobiography, 173.\n Ibid., 173.\n Le Corbusier, “Five Points to a New Architecture,” in Programmes and Manifestoes on 20th, 100.\n Bruno Reichlin, “The Pros and Cons of the Horizontal Window: The Perret – Le Corbusier Controversy,” Daidalos, September 1984, 72, accessed January 4, 2015, https://libweb10.princeton.edu/ereserves/ereserves.aspx?file=arc\\Authors_RS\\REICHLINbruno/ProsAndConsOfTheHorizontalWindow.pdf&auth=1.\n Taliesin Preservation, “House Tour.”\n Murphy, “Villa Savoye and the Modernist,” 69.\n Reichlin, “The Pros and Cons,” 77.\n Ibid., 75.\n Ibid., “The Pros and Cons,” 77.\n Reyner Banham, “Conclusion: Functionalism and Technology,” in Theory and Design in the First Machine Age, 2nd ed. (New York: Praeger Publishers, 1960), 322-324, accessed January 4, 2015, https://libweb10.princeton.edu/ereserves/ereserves.aspx?file=arc/Authors_AB/BANHAMreyner/TheoryAndDesignInTheFirstMachineAge/Conclusion_FunctionalismandTechnology_p320.pdf&auth=1.\n Flora Samuel and Peter Blundell Jones, “The Making of an Architectural Promenade: Villa Savoye and the Schminke House,” Architectural Research Quarterly 16, no. 2 (June 2012): 114, accessed January 12, 2015, http://media.proquest.com/.\n Samuel and Jones, “The Making of an Architectural,” 114.\n Tom Martinson, American Dreamscape: The Pursuit of Happiness in Postwar Suburbia (New York: Carroll & Graf, 2000), 152.\n Wright, The Future of Architecture, 176.\n Andres Duany, Elizabeth Plater-Zyberk, and Jeff Speck, Suburban Nation: The Rise of Sprawl and the Decline of the American Dream, tenth anniversary ed. (2000; repr., New York: North Point Press, 2010), 4.\n James Howard Kunstler, The Geography of Nowhere: The Rise and Decline of America’s Man-Made Landscape (New York: Touchstone, 1993), 78-80.\n Le Corbusier, Toward an Architecture, 121.\n Kunstler, The Geography of Nowhere, 79.\n Giedion, “Three Architectural Space Conceptions,” in The Beginnings of Architecture, 526.\nBanham, Reyner. “Conclusion: Functionalism and Technology.” In Theory and Design in the First Machine Age, 320-30. 2nd ed. New York: Praeger Publishers, 1960. Accessed January 4, 2015.\nCraven, Jackie. “What is a Usonian? Frank Lloyd Wright’s Answer to the Great Depression.” About. Last modified 2015. Accessed January 11, 2015. http://architecture.about.com/od/franklloydwright/g/usonian.htm.\nDuany, Andres, Elizabeth Plater-Zyberk, and Jeff Speck. Suburban Nation: The Rise of Sprawl and the Decline of the American Dream. Tenth Anniversary ed. 2000. Reprint, New York: North Point Press, 2010.\nGiedion, Siegfried. “Three Architectural Space Conceptions.” In The Beginnings of Architecture, by S. Giedion, 521-26. Bollingen Series 35. Princeton, NJ: Princeton University Press, 1981.\nKunstler, James Howard. The Geography of Nowhere: The Rise and Decline of America’s Man-Made Landscape. New York: Touchstone, 1993.\nLe Corbusier. “Five Points to a New Architecture.” In Programmes and Manifestoes on 20th Century Architecture, edited by Ulrich Conrads, 99-101. Translated by Michael Bullock. London: Lund Humphries, 1970.\n———. Toward an Architecture. Translated by John Goodman. Los Angeles: Getty Research Institute, 2007. Originally published as Vers une Architecture (Paris: G. Cres, 1924). Accessed January 11, 2015.\nMartinson, Tom. American Dreamscape: The Pursuit of Happiness in Postwar Suburbia. New York: Carroll & Graf, 2000.\nMcCrea, Ron. Building Taliesin: Frank Lloyd Wright’s Home of Love and Loss. Madison, WI: Wisconsin Historical Society Press, 2012. Accessed January 4, 2015.\nMurphy, Kevin D. “Villa Savoye and the Modernist Historic Movement.” Journal of the Society of Architectural Historians 61, no. 1 (March 2002): 68-89. Accessed January 12, 2015. http://www.jstor.org/\nPhilipps, Ruth Anne. “Stone, Water, and Mortarless Constructions: Frank Lloyd Wright and the Pre-Columbian Inca.” The Latin Americanist 57, no. 4 (December 2013): 97-130. Accessed January 5, 2015.\nReichlin, Bruno. “The Pros and Cons of the Horizontal Window: The Perret – Le Corbusier Controversy.” Daidalos, September 1984, 65-78. Accessed January 4, 2015.\nSahlins, Peter. “Civil Unrest in the French Suburbs, November 2005.” Social Science Research Council. Last modified October 24, 2006. Accessed January 13, 2015. http://riotsfrance.ssrc.org.\nSamuel, Flora, and Peter Blundell Jones. “The Making of an Architectural Promenade: Villa Savoye and the Schminke House.” Architectural Research Quarterly 16, no. 2 (June 2012): 108-24. Accessed January 12, 2015. http://media.proquest.com/.\nSwindale, Ian. “Part 3a, ‘Why the Parthenon Was Designed the Way It Was.'” The Parthenon Marbles. Last modified 2012. Accessed January 13, 2015. http://www.parthenon.newmentor.net/taylor01.htm.\nTaliesin Preservation. “House Tour.” Lecture, Taliesin, Spring Green, WI, August 2012.\nToker, Franklin K. Fallingwater Rising: Frank Lloyd Wright, E.J. Kaufmann, and America’s Most Extraordinary House. New York: Alfred A. Knopf, 2003.\\\nTournikiotis, Panayotis. “Le Corbusier, Giedion, and the Villa Savoye: From Consecration to Preservation of Architecture.” Future Anterior: Journal of Historic Preservation, History, Theory, and Criticism 4, no. 2 (Winter 2007): 1-11. Accessed January 12, 2015. http://www.jstor.org/stable/25835008?seq=5#page_scan_tab_contents.\nWright, Frank Lloyd. Frank Lloyd Wright, an Autobiography. 5th ed. New York: Duell, Sloan and Pearce, 1943.\n———. The Future of Architecture. New York: Horizon Press, 1953.", "label": "No"} {"text": "TIFT COUNTY SCHOOL DISTRICT WELLNESS POLICY ON PHYSICAL ACTIVITY AND NUTRITION\nThe Tift County School District is committed to providing school environments that promote and protect children's health, well-being, and ability to learn by supporting healthy eating and physical activity.\nI. School Health Councils\nThe school district will incorporate school health councils into existing school councils to develop, implement, monitor, and review school nutrition and physical activity policies. The councils also will serve as resources to school sites for implementing those policies.\nII. Nutritional Quality of Foods and Beverages Sold and Served on Campus\nMeals served through the National School Lunch, Breakfast, and Snack Programs will meet nutrition requirements established by local, state, and federal statutes and regulations.\nMeal Times and Scheduling.\n--Schools should provide students with at least 10 minutes to eat after sitting down for breakfast and 20 minutes after sitting down for lunch.\n--Schools should not schedule tutoring, club, or organizational meetings or activities during mealtimes, unless students may eat during such activities.\nThe school nutrition director will approve all food and beverage sales to students in elementary schools from the current list of approved snacks. Given young children's limited nutrition skills, food in elementary schools should be sold as balanced meals. If available, foods and beverages sold individually should be limited to water, low-fat and non-fat flavored milk, fruits, 100% juices, frozen items from approved snack list, and non-fried vegetables.\nAll items sold should be served after lunch.\nAll foods and beverages sold to students outside the reimbursable school meal programs (including those sold through a la carte [snack] lines, vending machines, student stores, or fundraising activities) during the school day, must meet at a minimum, existing Federal and State guidelines for foods of minimal nutritional value, all will comply with \"foods of minimal value\" where school meals are sold or served during meal periods (7 code of Federal Regulations Part 210.11), adhere to Tift County nutrition guidelines, and be approved by school nutrition director.\nTo support children's health and school nutrition-education efforts, school fundraising activities on campus, during the school day should use only foods that meet the nutrition and portion size guidelines for foods and beverages sold individually. Schools will encourage fundraising activities that promote physical activity.\nSchools will limit use of non nutritive foods or beverages as rewards for academic performance or good behavior.\nSchools should limit celebrations that involve food during the school day. The schools will disseminate a list of healthy party ideas to school administration.\nIII. Nutrition and Physical Activity Promotion and Food Marketing\nNutrition Education and Promotion\nTift County School District aims to teach, encourage, and support healthy eating by:\n--State and local health education curriculum will focus on nutrition and health;\n--Is a part of not only health education classes.\n--School nutrition will provide links to school meal programs, other school foods, and nutrition-related community services;\n--Continuing to participate in the National School Lunch and National School Breakfast promotions annually.\n--Establishing Wellness Zones, and promoting healthy eating and physical activity, annually.\n--Conducting taste testing with student focus groups to introduce new products or menu changes.\n--Utilizing community collaboration promoting school nutrition including but not limited to PTA/PTO sponsored events, parent workshops, faith based feeding programs, YMCA programs, Recreation Department sponsored camps, and public library reading programs.\n--Distributing nutrition education resources/newsletters/menus/promotion activities and having them available online access to faculty, students, parents, and community.\n--Promoting innovative initiatives, such as Farm to School, Food For Thought, Healthier US Schools Challenge, Healthier Generation Alliance, and Fuel UP to Play 60.\nIntegrating Physical Activity into the Classroom Setting\nStudents need opportunities for physical activity beyond physical education class. Toward that end:\n--classroom health education will complement physical education by reinforcing the knowledge and self-management skills needed to maintain a physically-active lifestyle and to reduce time spent on sedentary activities, such as watching television;\n--using fitness gram as a measuring component\nTift County School District highly values the health and well being of every staff member. Each school should establish and maintain a staff wellness committee as part of the existing school council. The committee should develop, promote, and oversee a plan to promote staff health and wellness.\nIV. Physical Activity Opportunities and Physical Education\nPhysical Education (P.E.) K-12. All students in grades K-12, including students with disabilities, special health-care needs, and in alternative educational settings, will receive physical education meeting the local, state, and federal guidelines. Students will spend at least 50 percent of physical education class time participating in moderate to vigorous physical activity.\nAll K-5 school students will have at least 10 to 15 minutes a day of supervised recess, preferably outdoors, during which schools should encourage moderate to vigorous physical activity verbally and through the provision of space and equipment.\nSchools should discourage extended periods (i.e., periods of two or more hours) of inactivity. When activities, such as mandatory school-wide testing, make it necessary for students to remain indoors for long periods of time, schools should give students periodic breaks during which they are encouraged to stand and be moderately active.\nV. Monitoring and Policy Review\nThe superintendent or designee will ensure compliance with established district-wide nutrition and physical activity wellness policies. In each school, the principal or designee will ensure compliance with those policies in his/her school and will report on the school's compliance to the school district superintendent or designee.\nSchool food service staff, at the school or district level, will ensure compliance with nutrition policies within school food service areas. All ala carte sales will comply with USDA competitive food nutrient standards and use smart snacks calculator to ensure compliance.\nThe school district will review nutrition and physical activity policies; and will, as necessary, revise the wellness policies and develop work plans to facilitate their implementation.\nIn accordance to the 7 CFR Parts 210, 215, 220 Federal Regulations\nNational School Lunch Program and School Breakfast Program: Nutrition Standards for All foods Sold in School as Required by the Healthy, Hunger-Free Kids Act of 2010; Final Rule\n--A choice of at least two fruits and/or non-fried vegetables will be offered for sale at any location on the school site where multiple food choices are offered (concession and vending sites). Such items could include, but are not limited to, fresh, canned or dried fruits and vegetables; 100% fruit or vegetable juice; fruit-based drinks that are at least 50% fruit juice and that do not contain additional caloric sweeteners.\nThe portion size of a la carte entrees and side dishes, including potatoes, will not be greater than the size of comparable portions offered as part of school meals. Fruits and non-fried vegetables are exempt from portion-size limits.", "label": "No"} {"text": "Getting off and onto the ground is a skill that isn’t practiced by the larger population. We have chairs and beds that are soft and inviting. Babies spend most of their time on the floor, and they seem to have a ball. Older folks attempt to avoid it at all costs, but when they fall (and can’t get up), they regret everything. Dan John attempted to champion the idea a few years back, prioritizing learning to safely get to the ground for football players who often find themselves there. Tumbling, too, is based off being able to interact with the ground, but it’s rarely taught outside the world of gymnastics.\nOne of the easiest (and most telling) tasks to do regarding getting up is getting down. Try both, without using hands, for a quick screen in how someone uses their hips and core.\nDan John uses a more structured protocol, ‘twister’ style, fastening the hands to knees in more specific sequence:\nWhen utilizing load, you can blanket the abilities of a large group by having them “pin the weight to their torso”:\nAnother option would be to “have the weight perpetually float”:\nHaving people think and decide without a given blueprint gives them the freedom to figure out a movement strategy, which is what creative movement is all about. We should encourage autonomous movement more often. In being so quick to correct and streamline things, we miss out on other potential truths. Modifications can always follow, but you can’t undo natural instinct without asking for it first.\nFor those traditionalists, the Turkish Get Up is a prime example of inside-out movement. Like rolling patterns, you’re stiffening one side of the body while rotating the other side around it. Coordinating the shoulder blade with the low obliques, however, is much more brain training than brute force and strength. As such, dynamic neuromuscular stabilization, or developmental reflexive locomotion strategies, can come into play to help synchronize the supportive shoulder with supportive abdominals.\nSetting the shoulder in the frontal plane:\nIt’s important here to pull and keep the “ribs away from the elbow”.\nUsing the obliques to rotate the body off ground:\nThe top leg rolled forward sets the stage for the upper body roll to follow. The front knee acts as an additional fulcrum (other than the upper arm/elbow) for which the body to revolve around.\nUse the hip and shoulder in unison (short lever) to create torso tension in the lift:\nMake sure you get the chest to ground to ‘finish the roll’.\nThe 1/4 and 1/2 Turkish Get Up\nThe most important set piece of turning off the floor is getting to the elbow. This is known as the 1/4 Get Up. Corkscrewing the elbow off the ground through the hand is the 1/2 Get Up. Focusing on the first half of the Turkish Get Up maximizes the efforts of the shoulders and abs.\nAs you pull the ribs from the elbow, the goal is to keep the space the same throughout the movement.\nAvoid using the neck to pull you up and exerting extra effort by turning the neck left and right at each stage. Neck stiffness signals neck work. You should be able to rotate it freely throughout. To ensure the shoulders are in a stable position, add a hip lift/bridge at each section. If the shoulders are wrong in any way (or you’re only putting weight into your supportive elbow versus forearm), the bridge will fail and force an auto-correct.\nThe Turkish Get Up really translates into a torso push. It’s a combination flexion-roll, but flexion should only happen at the hips. Far too often, the shoulder rolls forward to help ‘pull’ the body up off the floor. (This is an example of outside-in or limb driven movement — opposite of what this exercise is intending.) To train keeping the shoulder back, here are three possible variations:\n- Extending the otherwise ‘up’ arm into a diagonal (and holding it there)\n- Wrapping the free arm around the rib cage and locking the shoulder back (shortens lever and strives to make it a part of the torso engine)\n- Retracting a band vertically and keeping it there throughout the movement\n- Getting on and off the ground is a practical, functional skill\n- NOT telling people how to do something can be more informative and useful than laying a strategy out before them\n- The Turkish get up is an extension of rolling patterns\n- The shoulder syncs with the hips through the obliques\n- Keeping the up shoulder in a retracted position helps establish torso-driven movement", "label": "No"} {"text": "MADERA COUNTY (KFSN) --This week's warm break during a wet winter has Mosquito Abatement officials very concerned. It could cause a sudden spike in the mosquito population.\nCalifornia's Vector Control Association said Monday mosquito control is the key to preventing the spread of the Zika virus. The Zika virus has not been found in any Valley patients but a mosquito, which can carry it, continues to thrive here.\nMosquito breeding grounds can be found all over your yard. Everything from flower pots to storm drains. It doesn't take much water to hatch eggs. A black and white mosquito-- Aedes Aegypti-- has federal, state, and local abatement officials on high alert. \"I think mainly because of the temperature. I know this week it's supposed to get up to the mid 70's, that's usually when they start to breed, but then the temperature is supposed to go back to the 60's,\" said Leonard Irby, Madera County Vector Control District Manager.\nIrby said homeowners are already calling about mosquito problems because this aggressive day-biter is back. \"It takes approximately three to four days for them to develop, so, if they empty the water constantly we won't have as many Aedes Aegypti mosquitoes.\"\nThe White House will ask Congress for $1.8 billion to help fight the Zika virus in the US as well as Central America, South America, and the Caribbean-- where the virus is rapidly spreading. \"We don't have the disease yet here in Madera, or in the Central Valley, like Dengue, Chikungunya. The latest is Zika, Zika virus, but they're the number one vectors for these diseases,\" said Irby.\nAnd this is the scenario abatement officials worry about: Someone who becomes infected with the Aika virus in Latin America, or elsewhere, comes to the Valley and gets bitten by a mosquito. That mosquito could then spread the virus to other people.", "label": "No"} {"text": "The river pebble sand making machine is an important piece of equipment for sand and gravel processing in the artificial sand production line, and its sand production efficiency is closely related to the overall benefit of the sand production line. So, what skills can effectively improve the sand production efficiency of the river pebble sand-making machine?\nAlthough the river pebble sand making machine is relatively simple to operate, the output of the river pebble sand-making machine may also be below if the user does not follow the instructions provided for reasonable and standardized operation, or does not install and operate under the manufacturer’s guidance.\nToo much or too little feed will affect the normal operation of the pebble sand-making machine. Too much will cause blockage, increase the load of the host, increase the stress on the bearing, and easily lead to overload.\nProper maintenance can prolong the life of the equipment, and the life of the pebble sand-making machine will also affect its production output and sand production efficiency.\nDry sand making should be used for river pebbles with high water content, otherwise, the materials will stick together and affect the production efficiency of the equipment. Therefore, the selection of a reasonable sand-making plan is also one of the main factors affecting sand-making efficiency.\nThe raw material of machine-made sand is also a major factor. If the raw material contains a large amount of fine powder, this fine powder can easily adhere to the equipment, thus affecting the sand production efficiency of the pebble sand-making machine.\nThe balance of the main shaft is very important to the normal operation of the sand making machine, but the main shaft is easy to wear, so it is necessary to replace the main shaft every once in a while and clean it during the replacement process, and then add lubricant to make the main shaft serve better Sand making machine and auxiliary river pebble sand making machine for high output.\nIf the worn parts are not replaced in time, it will not only delay production, affect the sand production efficiency of the pebble sand-making machine, but also cause great damage to the equipment itself in severe cases. So get into the habit of checking your equipment regularly and replacing worn parts promptly.\nExcessive tension will affect the power transmission of the motor to the river pebble sand making machine, thereby affecting the sand production efficiency of the river pebble sand-making machine. Therefore, pay attention to the tightness of the power transmission belt.\nThe above introduces 5 factors that affect the sand production efficiency of the river pebble sand making machine and 3 techniques to improve the sand production efficiency of the river pebble sand making machine. The river pebble sand-making machine should pay attention to these points in the production process to avoid equipment failure. Affect the normal production of machine-made sand.\nPlease enter your inquiry and contact. We will reply you as soon as possible.", "label": "No"} {"text": "Kyle asks his friend Jane to guess his age and his grandmother’s age. Kyle says his grandmother is not more than 80 years old. He says his grandmother’s age is, at most, 3 years less than 3 times his own age. Jane writes this system of inequalities to represent k, Kyle’s age, and g, Kyle’s grandmother’s age. Inequality 1: g > 80 Inequality 2: g ≤ 3k – 3 Which inequality did Jane write incorrectly, and how could it be corrected?\nnot more tha 80 means g is less than or equal to 80 or g<80 grandmothers age is at most, 3 years less than 3 tmes his age g is equal to or less than 3 years less than 3 times k g<-3+3k we have g<80 and g<3k-3 the first one is incorerct, it is written as g>80 in the question, but it should be g<80", "label": "No"} {"text": "26th (London) Anti-Aircraft Brigade (26 AA Bde) was an Air Defence formation of the British Army during the Second World War. It defended London during the Blitz.\nGerman air raids by Zeppelin airships and Gotha bombers on London and other British cities during the First World War had shown the need for strong anti-aircraft (AA) defences in any future war. When the Territorial Army (TA) was reformed in 1922 it included a number of dedicated AA units of the Royal Artillery (RA) and Royal Engineers (RE). Two formations were organised in London District to command these units, provisionally known as the 2nd and 3rd London Air Defence Brigades, but soon numbered 26th and 27th. Both were based at the Duke of York’s Headquarters in Chelsea, where the units of the 2nd AD Bde were accommodated in buildings used before the First World War by King Edward’s Horse and the Royal Army Service Corps divisional train of the 47th (1/2nd London) Division. Extra buildings erected for the units included gun drill sheds and a store for each battery. Meanwhile, 3rd AD Bde’s units were based at Lytton Grove, Putney, taking over pre-war buildings previously used by the City of London Yeomanry (Rough Riders). The brigades had the following composition:.\n26th (London) Air Defence Brigade\n27th (London) Air Defence Brigade\nAs Britain’s AA defences expanded during the 1930s, higher formations became necessary. 1st AA Division was formed in 1935 at RAF Uxbridge to command the growing number of Territorial Army (TA) anti-aircraft gun and searchlight units covering London and the Home Counties. The 26th AD Bde was reorganised at Chelsea on 16 December 1935 as 26th (London) Anti-Aircraft Group, commanding all the gun and searchlight units of the two former brigades, while the 27th was reformed as 27th (Home Counties) Anti-Aircraft Group at RAF Kenley, to command new AA units in the South London suburbs.\nThe AA Groups took the more usual formation title of Brigades on 1 January 1939 after the Royal Artillery replaced its traditional unit designation ‘Brigade’ by the modern ‘Regiment’.\nThe TA’s AA units were mobilised on 23 September 1938 during the Munich Crisis. The call-out of key parties by telephone and telegram went well, and they assembled at their drill halls within a few hours. Because the units possessed only a small scale of transport, elaborate plans had been made to requisition civilian vehicles, ranging from heavy lorries to buses and private cars. Equipment was drawn from mobilisation stores, and the detachments ferried out to their war stations. Despite some failures and problems, the emergency positions covering London were manned and most of the equipment was in place within 24 hours. The emergency mobilisation lasted nearly three weeks before the TA units were released on 14 October. Brigadier Robert Whittaker, a TA officer who had commanded 53rd (City of London) HAA Rgt, was appointed to command the brigade on 18 January 1939.\nDuring this period of tension the Territorial Army grew enormously, and existing TA infantry battalions continued to be converted to AA regiments. The number of divisions and brigades was expanded, and the whole AA defence of the United Kingdom was taken over by Anti-Aircraft Command on 1 April 1939. A new 38th Light Anti-Aircraft Brigade was formed on 28 September 1938 by duplicating 26 AA Brigade HQ at the Duke of York’s Headquarters. The new brigade took responsibility for searchlight units in the London area, leaving 26 AA Bde as a Heavy AA formation.\nThe further deterioration in international relations during 1939 led to a partial mobilisation in June, and a proportion of TA AA units manned their war stations under a rotation system known as ‘Couverture’. Full mobilisation of AA Command came in August 1939, ahead of the declaration of war on 3 September 1939.\nJust before the outbreak of war, 26 AA Bde moved its headquarters to Brompton Road in South Kensington, where a Piccadilly line underground railway station had been disused since 1934. 1st AA Division established a control centre at Brompton Road, where the tunnels, subways and lift-shafts were adapted to provide bomb-proof accommodation for a Central Operation Room reporting direct to HQ No. 11 Group RAF at Uxbridge, and four Gun Operations Rooms (GORs) subdividing the London Inner Artillery Zone (IAZ). An elaborate network of dedicated telephone lines was laid by the General Post Office and Royal Corps of Signals, linking the AA sites, including many isolated searchlight positions. (The building remained a TA centre after the war, later being known as the Signals Drill Hall. It was sold by the Ministry of Defence in 2014.)\nIt had been intended that 26th AA Brigade would control the whole London IAZ, but it proved too complex for one HQ, and in September 1939 it was divided among three: 26th, 48th and 49th AA Bdes. 26th AA Brigade still had the heaviest concentration of guns, with 34 sites disposed to north and east of London, mainly equipped with static 3.7 and 4.5-inch guns. Its sites were in the process of being increased from four to eight guns each.\nWhen the UK declared war on 3 September 1939, 26 AA Bde had the following composition:\nDuring 1940 the AA Regiments of the RA were redesignated Heavy Anti-Aircraft (HAA) regiments to distinguish them from the newer Light Anti-Aircraft (LAA) regiments.\nWhile the Luftwaffe attacked RAF airfields in south east England during the Battle of Britain, 26 AA Bde was hardly involved, but on 2 September 1940 a raid up the Thames Estuary reached the edge of the London IAZ and was engaged by guns of the brigade. Between 11 and 15 September, massed raids approached London, but running battles with RAF fighters broke up most of the raids before they reached the IAZ.\n221 HAA Battery of 91st HAA Rgt under 39 AA Bde in the Humber Gun Zone had been nominated as a reserve battery with mobile guns. As the London Blitz got under way during September it arrived to reinforce 26 AA Bde (one gunner was killed by a bomb blast). In mid-October, half of 286/91 HAA Bty arrived in London to reinforce 221 Bty. 221 Battery moved from London to Norwich later in October.\nBrigadier Whittaker was promoted to command 1st AA Division on 12 November 1940 was succeeded by Brigadier S.K. Thorburn.\nBy late 1940, at the height of The Blitz, 26 AA Bde was still serving in 1 AA Division covering London, but had the following composition:\nManning AA positions during the Blitz was dangerous and arduous work. A Parachute mine fell on one HAA position of 26 AA Bde in central London, killing three men and wounding 15, yet the position remained in action.\nThe Blitz effectively ended in May 1941, but the organisation of AA Command continued to evolve. From September 1940, rocket projectors (Z Batteries) were introduced, equipped with rocket projectiles, and during 1941 increasing numbers of women of the Auxiliary Territorial Service (ATS) took over roles in AA Command. Where they were integrated into units these were designated ‘Mixed’ (‘M’).\nDuring 1941-42 the following further changes to 26th AA Bde’s order of battle took place:\nOn 1 October 1942 a new organisation came into force in AA Command: corps and divisions were abolished, and brigades came under the command of new regional groups. 26th AA Brigade was subordinated to 1 AA Group covering the London IAZ. At this time its order of battle was as follows:\nThere were only minor changes in the brigade’s composition in 1943-44. 111th HAA Regiment (347, 355, 356 and 389 Btys) joined early in 1943, but left in May 1943 to go to GHQ Reserve, later 21st Army Group, preparing for the invasion of Normandy (Operation Overlord).\nBy October 1944, the brigade’s HQ establishment was 9 officers, 8 male other ranks and 23 members of the ATS, together with a small number of attached drivers, cooks and mess orderlies (male and female). In addition, the brigade had a Mixed Signal Office Section of 1 officer, 5 male other ranks and 19 ATS, which was formally part of the Group signal unit.\nThe Luftwaffe began a new bombing campaign against London in early 1944 (the Baby Blitz). By now the night fighter defences and the London IAZ were well organised and the attackers suffered heavy losses for relatively small results. More significant were the V-1 flying bombs, codenamed ‘Divers’, which began to be launched against London from Northern France soon after D-Day. V-1s (known to Londoners as ‘Doodlebugs’) presented AA Command’s biggest challenge since the Blitz. Defences had been planned against this new form of attack (Operation Diver), but it presented a severe problem for AA guns, and after two weeks’ experience AA Command carried out a major reorganisation, stripping guns from the London IAZ and other parts of the UK and repositioning them along the South Coast to target V-1s coming in over the English Channel, where a ‘downed’ V-1 would cause no damage. As the launching sites were overrun by 21st Army Group, the Luftwaffe switched to air-launching V-1s over the North Sea, so 1 AA Group had to redeploy again to the east of London.\nOnce 21st Army Group had captured Brussels and Antwerp, these cities became targets for V-1s launched from within Germany, and anti-Diver defences had to be established. 132nd and 137th (M) HAA Regiments from 26th AA Bde were among the reinforcements sent to Brussels in January 1945 for this duty.\nAfter VE-day, demobilisation of AA units began promptly. 132nd and 137th (M) HAA regiments were disbanded in Europe (in May and October 1945 respectively) and did not return to 26th AA Bde. By November 1945 the brigade had the following composition:\nAll these regiments were disbanded in January 1947 except 12th HAA Rgt which was retained in the postwar Regular Army.\nBrigade HQ moved to Whetstone on 11 April 1946. When the TA was reformed on 1 January 1947, the brigade’s Regular Army units reformed 6 AA Bde at Grays, Essex, while the TA portion was renumbered as 52 (London) AA Brigade, based at Chingford, Essex, in 1 AA Group. (The wartime 52 AA Bde in Scotland was renumbered as 78 AA Bde in the 1947 reorganisation.) 52 (London) Brigade had the following organisation:\nHowever, the brigade was disbanded in September 1948.", "label": "No"} {"text": "By Joyceann Gray, Sarah Brown, and Monique Hopkins\nJoyceann Gray, Monique Crippen-Hopkins and Sarah Brown are “linked through slavery”. Joyceann and Monique’s ancestors were enslaved by Sarah’s ancestors, the Washington family. When Sarah published her most recent post, about her connection with Monique’s family, Joyceann spoke out about her feelings about the piece. The three of them decided that the Facebook dialogue that followed was important, and would be valuable as a post of its own.\nRead Joyeann’s blog for her full story: https://jgraydiscovery.com/\nRead Monique’s blog for her full story: http://genealogybreakingdownthewalls.blogspot.com/\nJoyceann Gray writes:\nThere are a few who are in a delicate position being a direct descendant of slaveholders and wanting to give what you can of slave history and family connection to descendants of those enslaved by your families. You are in possession of access to all your family papers which affords you a glimpse into your ancestors’ thought processes, emotions, and desires.\nThe descendants of those enslaved, can only guess what our people thought or felt. We are desperate for any tidbit of information about our ancestors. The norm was to account for our people by number, not by name, and it was very rare to find a surname. But we have a responsibility to record what we can find of our ancestors and their histories. To tell their stories and as much as possible ensures that when others write about them the facts and impressions are correct and in keeping with the truth. We have a responsibility to them to never let their pain and struggles be forgotten and to ensure their legacy lives on!\nSarah Brown adds:\nWhen I wrote my last blog piece, Part Two of my series “Redrawing A Community – A Washington Descendant’s Journey ( “People” -The Thompsons), athttp://linkedthroughslavery.com/2015/03/18/redrawing-a-community-a-washington-descendants-journey-part-two-people-the-thompsons/ – I included a photograph of Solomon Thompson that was provided by Monique Crippen-Hopkins, his 3x great-granddaughter. I described what I saw in his expression. As linked descendants, the three of us have been talking to each other through Facebook, and by phone occasionally. Since I was writing Part Two about Monique’s family, I sent her a final draft to review, but Joyceann saw it for the first time on the Bittersweet site.\nJoyceann was troubled by my comments, and sent me some of her own. This started a discussion among the three of us that was sometimes difficult and emotional. In the end we were all glad that Joyceann didn’t shy away from expressing her frustration. Since our talk reflects the difficult work that Coming To The Table is committed to, we decided to edit it slightly and post it here.\nOur dialogue brought home one of the pitfalls of writing about slaveholding as a descendant of slaveholders. Attention must be paid to acknowledging the pain inflicted by our families, in words on the page; assuming that the reader knows that the writer is aware of the specifics of abuse may not be enough. History demands a clear retelling of the dark side of the story, and a missed opportunity to do so can undermine establishing the truth.\nDialogue among Sarah Brown and Joyceann Gray and Monique Crippen-Hopkins\n(Sarah wrote in her post, about the picture of Solomon Thompson:\n“From my contemporary perspective he seems sad or wary, or possibly just unaccustomed to being photographed. His undirected stare might be the common expression of a servant who has learned to be both present and absent, without being able to freely choose either.”\nJoyceann starts a dialogue by commenting on that paragraph.)\nJoyceann: From your perspective you did a good job of guessing, but you didn’t remark on the pain that he had to have felt or the bad he must have seen and endured!! From my understanding of his history, troubles and struggles, all of which were much more than you or I could ever imagine!\nSarah: I guess I thought that was implied – that he had to be both present and absent, which is pretty much impossible. My whole project is an attempt to address the pain inflicted by my family, but what I hear from you is that I should stress the pain endured more clearly.\nJoyceann: Stand on a black rug you really see and feel much differently than standing on a white rug… We feel through the ages what we as a people and in cases individuals felt as they went through their daily struggles, I often have nightmares about the struggle of my Indian heritage, my people and their losses. Not sure what directly; but something bad had to have happen for the dreams are intense.. I have evidence in another part of my family where the husband tried to buy his wife and children, but he was only allowed to buy his wife and a daughter. He had to leave the four boys in slavery.\nWhen he paid the cost for wife and daughter he was forced to leave the state… so can we imagine the pain and agony there??? Nope, as a mother and grandmother I can’t and really don’t want to.\nSarah: It’s a good comment, Joyceann. The next post will have more details also. I’m thinking that the word “servant” should be in quotes, since it was a euphemism.\nJoyceann: Coming from an elite and intellectual standpoint we have to be careful to not assume or think things are implied….We weren’t servants… servants had options. We only had two options in most cases; do as told or suffer dire consequences\nSarah: Of course he wasn’t , although the white families used that term. I shouldn’t assume that readers know the way I’m using it, though. I was saying that he shared a common expression of people regarded as servants – a class thing as well. They had to stand by and pretend to be invisible, and that’s the expression I saw. I don’t see him as only a victim, though – he seems to be conveying a dignity that refuses that classification, although he was robbed of choices in his life.\nJoyceann: But he was a victim through and through caught up in a vicious cycle of horrendous cruelty!\nSarah: It’s not easy to write about the black experience as a white person. I tend to feel that I’m writing about the human experience in general. I don’t want to sound only like an elite intellectual. I do use my own voice, though, since anything else wouldn’t be genuine. I would really like it if you added these comments to the blog page – it’s a good conversation.\nYes, all those enslaved were victims of horrendous cruelty. Gosh – there is no way I’m downplaying that! I’m talking about what I see in his eyes – he’s a complex human being rather than JUST a victim.\nJoyceann: True but I see more pain I think than you do, I see a man that has endured and seen too much! I see a man that has survived and has YET to really live.\nSarah: It’s a great comment, and I see exactly what you mean. I see that pain. But I chose to write about him as transcending that pain as much as possible. I see him as wearing a kind of mask. Truth be told, I never expected to see an actual photograph of someone enslaved by my family. His dignity and cautious expression really stand out to me – to me, he’s masking his pain.\nJoyceann: His eyes are not masking the pain! It is all in the eyes!!\nI really enjoy the fact you are conscious of your heritage and of the pain but we have to tread lightly when your ancestors dealt with my ancestors as if they were cattle or horses… and whenever they spoke of freeing their property there was always a condition that had to be met first. For instance George Washington lamented over freeing the slaves, so he waits until he’s almost dead to say oh yeah free my slaves AFTER I die and only then can they be freed AFTER my wife dies too! Now what kind of mental anguish is that, what a torn and conflicted humanitarian he was…Yes?\nAt least your ancestor Bushrod Washington said flatly; hell no to freeing slaves! Samuel Washington George’s brother didn’t even want to sell Reuben Hatter to his sister-in-law Christian Blackburn!!It took his wife’s badgering him to get him to do it! And even then he made her pay top dollar too!\nSo Sarah what I’m attempting to do is to get you to see another view of all the “Solomons” of those times…have you ever found a photo of a person who’s been enslaved; smiling?!\nSarah: Joyceann, I’m writing about all of that. I hope that you see that what I’m doing is an attempt to address all of these injustices. I’m going to send you a copy of an article I wrote a few years ago. It was supposed to be published in a journal called Race/Ethnicity, but the journal went under before it came out, so it was never published. It’s important to me that you know my personal perspective. We have to get know each other better, I think. I see that you feel I don’t know how these people suffered, and that I’m downplaying that. If that’s the impression I’ve given, then I want to correct it.\nJoyceann: No not downplaying at all. Let me try saying that another way. When looking at old photos of enslaved folks: When you see an uplifted chin you see pride, I see pain with stubborn refusal to give in.\nI see at least I felt you were seeing through ” rose” colored glasses so to speak, you were elevating when in fact we need to stand low? Make sense?\nI’d love to read your work I’ll do that while we’re on our road trip back home!\nSarah: Yes! It’s the stubborn refusal to give in that I see in the foreground.\nJoyceann: Now you got it!!\nSarah: That’s what I was trying to say, but I guess I didn’t say it. Thanks for pointing that out.\nJoyceann: Are you ok with our discussion?\nSarah: Yes! It’s kind of painful, but I love that you’ve told me how you really feel. I understand that I left out the chance to comment on the cruelty of Solomon’s situation. But I do want to know that you hear me, too. And I see that Monique is commenting now – great….\nJoyceann: It’s hard to write someone else’s story.\n(Monique Crippen-Hopkins enters the conversation)\nMonique: Yes, that is true, I’m having a hard time writing my ancestors’ story….I’ve been trying to figure out how to do it to give them the honor they deserve.\nSarah: The only way I can write it is to write what I’m experiencing personally – the journey I’m taking myself. So I write about what I see in the picture, my communication with the two of you, and how I feel about my own family.\nMonique: I’ve just been reading the comments; it’s a lot to take in, because what is being written is about my family that has come alive to me, and a very painful experience at that. Some of it may come across as just a story to others, but that is my family. I can actually feel for these people and for my grandparents!\nI don’t have any real comments…I was just taking it in.\nSarah: Our stories intersect, and I want to honor both of your families without taking over your own stories. I’ve very conscious of my responsibility there.\nJoyceann: True but our intersection is only up to the civil war ending when the Washingtons and other slaveholders were forced to free their slaves. Now did the Washingtons work with their formers slaves to help with their transition? Train them? Give them the land to work? Then till now we didn’t have a relationship. We have come together again now as we try to piece things together and make amends….\nSarah: I’m researching what happened at Claymont after emancipation. I’d like to think that my family tried to help those they enslaved, but I think it was the other way around – some of the Thompsons and others stuck around and worked for what was probably hardly any pay.\n(to Joyceann) I’m thinking about your comment about how hard it is to write someone else’s story. It’s ironic – what I’m trying to do is tell the full story about my family. So many people have written about George and all as patriots, but not as slaveholders. I think my job is to correct that.\nJoyceann: I hear you louder than I’ve been able to express, I do indeed understand also why you are doing this… I’m just playing devil’s advocate here somewhat trying to help you be careful in how you relay others’ history. I am excited to know you are going to tackle writing the hard truth of your ancestors… That will be a bestseller.\nMonique: No, just seeing all of this became a little emotional because it made me see and think about some things I never really thought of before.\nSarah: Yeah….wow. This is such a raw subject and that’s why we have to talk about it. Thanks Joyceann!\nMonique: Thank you Cousin Joyceann! You have a lot of insight.\nJoyceann: So yes it’s a raw discussion but I’m so glad we are not running from it!!\nSarah: When I got the archive with all our wills I felt that someone had to address the wrongs my ancestors had committed. And they were many. Connecting with the two of you allows me to make baby steps toward that goal. You’ve allowed me in – thank you so much!\nJoyceann: And by writing your story SARAH you will indeed be helping a lot of people to heal and move on, someone needs to acknowledge the real story !\nSarah: Can I tell you both that I’ve got tears in my eyes? None of us asked for what our families gave us, and we’re all working on making sense of it. I’m so grateful we can do this, raw or not.\nMonique: Yes, that’s what this is all about…taking those steps, it’s a lot and we can only try to move on, we will never be able to correct what our ancestors did, we can only help some people move on. What’s done can’t be undone we can only try to help others to heal\nGreat job both of you in this conversation!! Thank you because you have given me food for thought.", "label": "No"} {"text": "The Museum’s exhibition Rendering Witness: Holocaust-Era Art as Testimony displays art produced by Jews and other victims of the Nazis during the Holocaust. Each artwork in this exhibition reasserts the artist’s humanity and individuality, qualities too often obscured by iconic Holocaust photographs that were taken by the Nazis or their collaborators. We will highlight artwork from this exhibition in a series of blog posts.\nThe artwork below, Lodz Ghetto Bridge, was made by Vincent Brauner, c. 1940 – 1943. The original is 10 3/4 inches x 14 7/8 inches, made with pen and ink, watercolor, and conté on paper adhered to wood.\nBrauner juxtaposes the crowded, harsh conditions of the Lodz Ghetto with the freedom and unconstrained space of the world outside. The street car and civilian with a small wagon travel uninhibited, the luxury of space theirs for the taking. In contrast, the Lodz Ghetto prisoner on the bottom left strains to pull a cart, while a thicket of Jewish prisoners cross over a bridge that connects parts of the Ghetto while cutting it off from the world outside. While the individual Jews are indistinguishable from one another, the lone soldier standing guard beneath the bridge has his gun, helmet, and uniform coat on clear display.\nA church features prominently to the left, notable because many synagogues in Lodz were destroyed by the Nazis after the German invasion.\nBorn with the first name Yitzhok, Brauner(1887–1944) went by Vincent as an homage to Vincent van Gogh. He was a member of the Jewish avant-garde art group Yung-yidish (active in Lodz, Poland from 1918 -1921) and studied painting in Krakow, Warsaw, and Berlin before World War II. He was deported from the Lodz Ghetto to Auschwitz, where he was murdered in 1944.", "label": "No"} {"text": "Anyone who takes an interest in human rights issues in Iran -- and there are many who do -- probably knows about the Baha'is. They are a small religious minority (perhaps as many as 300,000), but nonetheless the largest in the country. The largest, yet painfully small and the most hated. If Jews and Christians have a rough time in Iran, the Baha'i experience has been worse. Over 200 members of the religion, including many of its leaders (there are no priests) have been executed, and others have been and still are in prison. In 1983, a seventeen-year-old girl, Mona Mahmudinezhad, was hanged in Shiraz along with nine older women, mostly in their 20s. Their crime was, apparently, teaching \"morality lessons\" to Baha'i children who had been expelled from school. All the Baha'i holy places in Iran have been reduced to rubble, including the beautiful House of the Bab, a small treasure of Iranian architecture which the author visited often with its custodian. All Baha'i cemeteries have been dug up and bodies exhumed. No young Baha'i is permitted to enter university. Older Baha'is have had their pensions removed. Jobs are hard to come by. Many linger in prison. There are serious plans to rid the country of the Baha'is altogether.\nThe destruction of a historic Baha'i cemetery in Shiraz, Iran, by the Islamic Revolutionary Guards Corp. (Image source: Baha'i World News Service)\nWhy is there such animus towards a small and entirely inoffensive religion that has at most five or six million followers round the world, most of whom are not Iranians but Westerners, Africans, Latin Americans, Indians, and Pacific Islanders. The Baha'is have a noble range of principles: equality of the sexes, the unity of mankind, a universal language, universal education, opposition to racism and other forms of prejudice, and the goal of world peace — you get my drift. Engaged in good works in many countries, they are forbidden by their own laws to take part in politics or anything remotely \"subversive.\" Above all, they believe in Muhammad as a prophet of God and the Qur'an as the word of God. So, aren't they just a sect of Islam?\nNot really, despite their origins in a sect of Shi'ism. Baha'is consider theirs to be a \"world religion\" (though many might question that on several counts). They recognize Muhammad, but they do not think he was the last of the prophets, as Muslims do. They have two 19th-century prophets of their own who, they say, fulfilled Islamic prophecy. They are, therefore, a threat to Islam. Should large numbers convert to their faith, Islam would be diminished and might eventually die out, and that is something the autocrats of Tehran cannot ever contemplate.\nHow did things get into such a mess? In its conservative versions, Islam cannot contemplate change. There are Muslim reformers, but they are bowed down beneath the heavy weight of tradition. Not even the reformers can accept the possibility of prophets after Muhammad. If God has sent his final prophet and revealed his final book and given mankind his final set of laws and ethics, why should anyone want to leave that behind?\nModern hardliners, called Salafis, take their name and ideation from the Salaf, the first three generations of Muslims, the closest to the prophet. In the classic formulation, kull al-bid'a kufr, \"all innovation is unbelief.\"\nThe Baha'is place their origins in a short-lived religious movement known as Babism, started in 1844 by a young man of 24, Sayyid 'Ali Muhamad, better known as the Bab. Executed in 1850, the Bab claimed divine revelation, introduced a bizarre raft of laws, \"revealed\" some extremely obscure books, and claimed that a new religious era had dawned. Two to three thousand Babis (many of them armed) were killed in clashes with state troops, and the few who remained might have seen their faith descend into permanent obscurity. But this was prevented when a follower of the Bab, an Iranian nobleman called Mirza Husayn-'Ali Nuri, better known as Baha' Allah, founded a new faith on the remnants of Babism, borrowed a few ideas from Western reformism, wrote a short new book of laws, was exiled to the port of Acco in Israel, and died in 1892, the second of the post-Islamic prophets.\nBaha' Allah was succeeded by his eldest son, 'Abbas Effendi 'Abd al-Baha', who made no claims to prophethood or divinity, just infallibility in the interpretation of sacred texts. He made his way to Europe then America (narrowly missing a trip on the Titanic) and became something of a celebrity, an early precursor of the gurus who travelled to the U.S. during the first half of the twentieth century. His teachings were simple, in tune with the times, and won him a loyal band of Western followers until his death in 1921.\nHis grandson, Shoghi Effendi, an intelligent and Westernized man, became the first Guardian of the Baha'i faith, created an international administrative system and a global missionary enterprise. Today, that administrative system has its center on the flanks of Mount Carmel in Haifa, Israel, where exquisite gardens surround marble buildings and a golden-domed shrine that contains the remains of the Bab -- another reason for the Islamic regime in Tehran to hate the Baha'is.\nIn Iran, however, the Baha'is were always persecuted, and a list of martyrs marks their progress through the eras of the Qajar and Pahlavi Shahs, with many more put to death in the days of the Islamic Republic.\nIt is the Baha'is who apparently represent the greatest threat to Islam: people unafraid of innovation and grown bold enough to break away from the Islamic faith. Many Iranian Baha'is were both well educated and westernized -- two more things with which to condemn them.\nBaha'ism is, by and large, a liberal religion, and liberalization is a constant threat to today's Islamists.\nI have known a lot of Baha'is in my time, and I have never found them unfriendly or unenlightened. I have spent a lot of time with them in Iran, and found them thoughtfully balanced between Iranian culture and the values of the West. They are Iran's best hope. They are tolerant of other faiths, including Hinduism and Buddhism. Their women led the movement for emancipation, and many have served as physicians, lawyers, university teachers, and architects (a Baha'i, Husayn Amanat, designed the great Shahyad Monument in the center of Tehran).\nBut in that peculiar longing for self-defeat that segregates Muslim children, calls on Palestinian teenagers to commit suicide, and arrests scientists and human rights activists, the Iranian regime turns on the very people who may still hold the future of their country in their hands, but who would opt for a secular regime in place of the theocratic antiquated bigots who currently rule Iran.\n 'Current Situation of Baha'is in Iran'. See also the present author, A People Apart: The Baha'i Community of Iran in the Twentieth Century, London, School of Oriental and African Studies, Occasional Papers, 1989.\n For the fullest account of the Bab and his movement, see the present author, The Messiah of Shiraz, Studies in Early and Middle Babism, Brill, 2008.\n See Paul Berman, Terror and Liberalism, W. W. Norton, 2004.", "label": "No"} {"text": "As we observe this Memorial Day and commemorate the men and women who died while serving in the American military let’s also remind ourselves to take care of the living. Holidays aren’t always fun and games. They also present ideal opportunities for our loved ones to get hurt. From burning themselves on the barbecue on Memorial Day to sticking themselves with carving knives on Halloween or ingesting sharp decorations on Christmas, holidays it seems are hazardous for health.\nHowever, parents should be wary of both routine and out-of-the-ordinary activities on a holiday weekend. According to a new study published in Pediatrics, children are more likely to suffer injuries from everyday activities, such as playing football, than they are to be victims of holiday-specific pitfalls.\nLabor Day and Memorial Day are the top two holidays for injuries. The study authors from the Center for Injury Research and Policy in Columbus, Ohio, and Ohio State University suggest this is because they are often celebrated outdoors and people are more likely to take part in physical activities.\nThe researchers collected childhood-related injury information from a nationally representative sample of 98 U.S. hospital emergency departments. They looked at records from 1997 through 2006 over eight holidays: New Year’s, Easter, Memorial Day, Fourth of July, Labor Day, Halloween, Thanksgiving and Christmas. They included injuries occurring in a five-day period around each holiday (two days before and two days after, as well as the holiday itself). The thinking was that people don’t always celebrate a holiday on the day itself, or they might hold festivities over multiple days.\nAn estimated 5,710,999 injuries related to holidays occurred over the nine-year period. After Labor Day and Memorial Day, the runners up for the most injuries were the Fourth of July and Halloween. Christmas had the least number of injuries.\nBoys suffered from most of the injuries (62%), followed by children under 5 (29%). The most common injuries were lacerations (29.2%), and the most injured body parts were the face, fingers and hands.\nClose to half of the injuries were sports or recreation related. Only a small portion of injuries were from activities that might be considered specific for the holiday. For instance, just 2.9% of injuries occurring around the Fourth of July were related to fireworks while 8.6% were related to riding bicycles!\nSRxA’s Word on Health wishes all its readers a SAFE and HAPPY holiday.", "label": "No"} {"text": "Electrical Bus bars is the structure which carries a huge amount of power. A bus bar is the most important structure in the substation where power is gathered for further substitution. Depending on the voltage level, reliability and flexibility, a bus bar can be arranged in different configurations. Given below is the list of 8 different types of such connections in which busbars can be arranged.\nSingle bus bar\nThis is most simple and cheapest bus bar arrangement. It comprises a single bus bar to which all incoming and outgoing lines are joined. Such a line requires little maintenance. However, a major problem associated with such system is that its repair is not possible without interrupting whole circuit.\nRelated topic: Single line diagram\nSingle bus bar system with sectionalization\nIn this scheme, a single bus is divided into multiple sections and the load is divided into sections. The sections of bus bars are connected using circuit breaker and isolators. Such a system has many advantages. In case of a fault, one section of the bus can be isolated from other sections.\nDouble bus bar with a single breaker\nIn this system, two bus bars are used. Each of the buses can take entire load. One of these buses is named main and the other one is known as a spare bus. The buses are connected together using bus coupler. Such system is reliable and continuity of supply can be maintained using either of the buses. Usually, the main bus is used, in case of maintenance the spare bus can be employed.\nDouble bus bar with two breakers\nThis scheme comprises two busbars having two breakers for each connection. In this scheme the breakers and isolators can be removed without interrupting supply. The double busbar double breaker scheme is an expensive scheme and is only recommended for very large stations where connection security is important.\nBreakers and half with two Bus Bars\nIn this scheme, three circuit breakers are used for every two circuits. As the name of arrangement indicates the connections involve two buses. This arrangement is an improvement of previous one with the major aim of reducing the number of circuit breakers.\nMain and transfer bus bar\nThis arrangement comprises a main bus that is used under ordinary conditions and a transformer bus for emergency purposes. The major advantage associated with this scheme is the use of single circuit breaker for tieing purposes. Such connection scheme is affordable with the main drawback involving complete shutdown of a substation in case of failure.\nDouble bus bar with bypass isolator\nDouble bus bar with bypass isolator is an economical scheme in which isolators are used for transferring load from bus 1 to bus 2. Such scheme is advantages in terms of economy as well as it provides feasibility to take out any breaker without interruption os supply.\nRing bus scheme is also known as mesh scheme. Such scheme requires only one breaker per circuit, it has a low initial scheme and any breaker can be removed without interrupting supply. However, this scheme has the major disadvantage of complexity and difficulty of reclosing.\nSo that was all about 8 types of connection schemes.\n- Why liquid fuels are preferred over solid fuels\n- Why condenser is used in steam power station\n- Differentiate two types of boilers in thermal power plants\n- Explain the distinguishing feature of nuclear power plant\n- Explain the pros and cons of Nuclear power plant\n- How hydroelectric power plants are classified on the basis of head\n- What is forebay in hydroelectric power plants\n- What is the role of the regenerator in gas power plants\n- Why surge tank is built in close conduit Hydroelectric Power Plants\n- Differentiate base load and peak load power plants", "label": "No"} {"text": "Until I was an adult, I had no idea what the symptoms of ADHD were, much less that I was living with it myself. But as I began exploring the symptoms, I found out that excessive worrying is one of the hallmark symptoms of this disorder.\nAs our children grow, we’ve noticed that some of them are what I would call “physically anxious”. For example, our hyper child actually becomes irritated when he has to sit down for long periods of time. But others are “emotionally anxious”. One of our boys has low energy and can be sluggish, but inside he’s a boiling kettle of emotions, including lots and lots of worries.\nWhat can you do when your ADHD child worries? How can you help them manage these big emotions while they’re still small? Read on to find some tips that are working for us and to pick up a free resource your kids can use to process emotions themselves!\nIf you enjoy this post, don’t miss these pointers for how to show love to a defiant child too!\nImage c/o: londondeposit / depositphotos\nWhen Your ADHD Child Worries\nThis post contains affiliate links. For details, see our Disclosure Policy.\nFirst, try to comfort your child. No one can think clearly when they’re upset, especially not a child. Let him or her know that you are there and ready to help. But make sure that the way you comfort them is geared toward that specific child.\nOne thing that works with my hyper child is physical touch. If I hug him or bring him close, he calms down quite a bit. For my emotionally anxious child, holding his hand seems to work better. He doesn’t respond as well to hugging. If your child doesn’t respond to physical touch at all, just sit nearby and say “I’m here to help” or something similar.\nIt’s important that we make sure our children feel that we value their emotions. If we just hug them or hold their hands and “pooh-pooh” their feelings, we’ll seem patronizing. But when we respect our children’s emotions, we model that behavior for them. They will learn to stop and give their feelings attention, rather than ignoring them or pretending they don’t exist.\nFollow up physical touch or verbal reassurance with active listening. Sit down near your child, give him or her direct eye contact, and then listen to their feelings. Be sure to offer feedback that shows you are taking an interest in their expressions.\nOnce your child expresses his or her worries, show them how to process them and go forward. For example, one of my children worries constantly about how he is viewed by others. He has actually let that fear stop him from speaking up about something he didn’t want to do, which shows that he’s especially susceptible to peer pressure.\nTo help, we talk with him about his feelings privately – away from his siblings. We’ve also found that helping him brainstorm how to talk about his fears has given him a lot more freedom to express himself to us.\nWe also work with him to explore his likes and dislikes, so that he can become more vocal about expressing his interests without fear of rejection. It’s helped him to stabilize his emotions quite a bit.\nSince helping our kids to express their worries has helped us, I thought you’d like to try this free worry journal with your kids! It’s called “My Little Book of Big Worries” and it’s for helping anxious kids to process their feelings and how they can talk about them.\nUse this printable feelings journal for kids to help your children write down their big worries in a pocket-sized printable book! Children can use this journal to write down what makes them feel sad, anxious, or worried and brainstorm how to express these feelings to their moms.\nHere’s a quick look at how to put this printable mini-book together:\nPrint both pages.\nTake the first page (which contains the front and back covers) and fold it in half horizontally. This is the front and back cover half.\nThis is the inside page half.\nFold the first page in half horizontally again to form a small book.\nThen fold the second page in half horizontally also and then place it inside the first “book”. You should end up with an eight-page book. Add a few staples along the front edge to secure it.\nThe assembled book should look like this inside:\nLet the kids use these pages to jot down their biggest concerns and how they can talk about them with you! After all…\nFor a limited time, get your copy of My Little Book of Big Worries free when you subscribe to our newsletter! To sign up, just use the widget below. You’ll receive access to our special password-protected subscribers page in your welcome email. 🙂\nWhat do you do when your ADHD child worries? How do you help them manage their big fears? Share your tips and suggestions in the comments!\nNeed more help to parent your child with ADHD? Don’t miss these posts!\nSee more parenting help for kids with ADHD on my ADHD Tips Pinterest board!", "label": "No"} {"text": "February 14th is when lovers exchange gifts in the name of St. Valentine, but what has a saint got to do with a pagan celebration?\nThe history of St Valentine’s Day and its patron saint is shrouded in mystery, but we do know that February has long been a month of romance.\nSt. Valentine’s Day contains vestiges of both Christian and Roman traditions. For eight hundred years prior to the establishment of St Valentine’s Day, the Romans had celebrated a pagan festival in mid February commemorating a young man’s rite of passage to the god Lupercus.\nThe celebration featured a lottery in which young men would draw the names of teenage girls from a box. The girl assigned to each young man in that manner, would become his sexual companion for that year.\nIn an effort to turn people away from the old pagan rites Pope Gelasius ordered a change in the rules of the Lottery and instead of the names of maidens the names of saints were substituted, women were allowed to enter the draw as well as men and the object was to emulate the ways of the selected saint throughout the year.\nTo replace a pagan god, the church looked for a suitable patron saint of love to take his place and found appropriate Valentine, who in AD 270 had been beheaded by Emperor Claudius II.\nOne legend contends that Valentine was a priest who served during the third century in Rome. Emperor at that time, Claudius II decreed that single men made better warriors and with this thinking, outlawed marriage for young men. The injustice of this ruling forced Valentine to go against his emperor and perform marriages in secret for young soldiers and their sweethearts. The inevitable outcome was discovery and sentence to death.\nAccording to another legend St Valentine sent the first Valentine Card, the story goes that whilst in prison Valentine fell in love with a young girl, thought to be the jailer’s daughter and sent her a letter signed Your Valentine, the traditional greeting still used to this day.\nThe truth or otherwise of the many legends surrounding this enigmatic Saint have faded into insignificance when compared to the need for a recognized symbol of love and a yearly excuse for lovers to express their feelings for each other.\nIn 1835 the remains, or what are believed to be the remains of St Valentine were given to an Irish priest named father John Spratt by Pope Gregory XVI, after Spratt impressed the pope with his passionate preaching during a visit to Rome. The gift, in a black and gold casket, can still be viewed every St Valentine’s Day, at the Whitefriars church in Dublin.\nThe first true valentine card was sent by Charles Duke of Orleans to his wife in 1514, whilst he was imprisoned in the Tower of London. In England Valentine’s Day didn’t become popular until around the seventeenth century, although by the middle of the eighteenth century it had become common for people of all social classes to\nsend some small token of affection to a loved one.\nThese gifts would usually take the form of a hand written note, in which the recipient would be assured of the sincerest intentions of the sender. By the end of the century printed cards began to appear, due to the enormous advances in printing at that time.\nReadymade cards were an easy way for people to express their emotions at a time when strict moral standards made any form of affection difficult.\nToday, somewhere in the region of 4 billion Dollars is spent on Valentine cards and associated gifts every year, proving that romance is still very much alive. So I leave you with the words of Shakespeare; who, after all puts it better than anyone: Sonnet 18 “Shall I compare thee to a summer’s day?”", "label": "No"} {"text": "Main Article Content\nThis study determined the effects of sleep deprivation on the academic performance of 2nd-year education students of the University of Science and Technology of Southern Philippines. Specifically, it sought to answer the following: (1) correlation and comparison of difference between number of hours sleep and academic performances in Eng111 and Educ90; (2) difference on students’ flexibility towards sleep deprivation and demographic profile; and (3) correlation between the number of hours sleep and academic performances in terms of Cognitive, Psychomotor/Physical, and Environmental Factors\nCorrelational-descriptive research design was used in the study. A census was used in the collection of data in which 122 respondents participated. A researcher-made questionnaire was utilized. The analytical design used consisted of statistical procedures such as hypothesis testing, correlation, averages, standard deviations, and T-test.\nThe results showed that as the number of hours of sleep increased, students’ academic performance in Eng111 and Educ 90 get better. Furthermore, a significant difference in both subjects and grades was found. With all the variables taken in this study, it can be inferred that without proper sleep, the brain's function such as the ability to concentrate, store data, and other cognitive activities will be hampered and/or paralyzed..", "label": "No"} {"text": "Paper or plastic?\nLet’s say you go to the grocery store and buy a pineapple. Why are you buying a pineapple? They’re delicious.\nYou get in line to pay for your pineapple. The clerk says, “Paper or plastic?”\nPaper or plastic? Hmmm…\nWhat should you say? What things should you think about before you answer?\nLet’s think about paper first.\nThe paper bag, like most paper, is made from trees. People cut down the trees, grind them up, and make paper from the pulp. We don’t want to cut down too many trees, though, because trees help the environment. They make oxygen that we need to breathe. They provide a place for animals to live. We can plant new trees to replace the ones we cut down, but we still should save as many trees as we can.\nThe paper bag might be made of recycled paper. That’s paper that has been used more than once. That means that we didn’t have to cut down more trees to make it. Recycling paper still requires energy, though. Paper is also quite heavy, which means that moving it around on trucks takes a lot of energy too.\nMaybe we shouldn’t get a paper bag.\nWhat about plastic?\nPlastic is not made from living things like paper is. Plastic is made by people. It never existed before people created it. If we don’t have to cut down any trees to make it, is that better? Not really.\nThe trouble with plastic is that it’s not part of nature. It doesn’t fit into any ecosystem. Nothing can eat it, so when it goes in the trash, it never goes away. Plastics last for hundreds or even thousands of years. And because plastics are lightweight and blow around in the wind easily, a lot of them end up in the ocean.\nMaybe we shouldn’t get a plastic bag either, then.\nWhat should we do?\nThere is another question that the checkout clerk might forget to ask: “Did you bring your own bag?”\nA Reusable Bag!\nThe best way to take your groceries home is in your own bag. You can use it as many times as you like. You never have to throw it away!\nDo you need a bag to bring to the store? You can make one out of an old t-shirt!", "label": "No"} {"text": "Sorry, your browser is not compatible with some of the content on this website. Please update to a newer browser to view this website.\nLaser Welding is a technique widely used in high volume industrial manufacturing as a method of joining metallic materials. By using a laser beam concentrated into a high-intensity focused spot, laser welding offers many advantages over other more conventional welding processes. Advantages include; lower heat input meaning lower distortion and smaller heat affected zones, higher welding speeds which lead to improved production rates and single-side access to the joint area, coupled with fiber optic beam delivery providing easier automation.\nIn the case of thick section stainless steel welding, the power provided to the focused spot on the material surface is of sufficient intensity (1×10-6 W/cm²) to form a keyhole into the workpiece, this keyhole creates a meltpool that can be manipulated along the weld joint, allowing the material to be welded in a single pass, without the need for any filler wire.\nThe example photos show a 6mm stainless steel (316) butt weld using our redPOWER 4.5kW QUBE fiber laser. An inert gas (Argon) shield was used to help maintain a full penetration, repeatable, defect-free joint. The top surface of the weld is consistent, clean and smooth meaning there is no need for any secondary cleaning process.\nWeld requirements such as top bead width, weld interface width, penetration depth and welding speed can all be modified to suit the application by correct selection of the appropriate optical configuration and laser process parameters.\nClick here to download this postcard as a PDF!\nIf you enjoyed reading this article, why not register for future articles?", "label": "No"} {"text": "Blending Chalk, Talk and Accessibility in an Introductory Economics Module\n- Contact: David Kraithman and Steve Bennett\n- University of Hertfordshire\n- Published 6 January 2005\nThis article is a copy of that published by the Business, Management & Accountancy Subject Centre of the Higher Education Academy (formerly the LTSN) in their Newsletter 'Best Practice', March 2004. It is reproduced here with the permission of the Subject Centre and that of the author.\nThe SMIRK multimedia authoring package has been developed to enable academic staff to produce multimedia presentations in the same way they deliver a lecture or conduct a seminar. Presentations produced by the package can be delivered via a managed learning environment (MLE). The design philosophy seeks to embed accessibility features to support the learning experiences of disabled students.\nIn the UK, the most commonly used program for preparing lecture material is PowerPoint. Two separate issues arise from this observation. Firstly, we must consider the role of ICT media in producing media, i.e. does it suffer from the same criticisms of non-interactive transmission of information that could be levelled at the traditional ‘chalk-and-talk’ lecture even if it is delivered asynchronously? Secondly, can PowerPoint be bettered by an application tailored to the needs of lecturing staff?\nA number of development teams perceive that PowerPoint does not mirror the preparation process undertaken by lecturing staff. In particular, there is no easy way in PowerPoint to combine the elements of the ‘face-to-face’ method of the lecture. Furthermore, there are criticisms that can be levelled at standard presentation software. For example, Tufte (2003) rails against PowerPoint for diluting the sensible transfer of ideas between presenter and audience.\nIn many ways, the educational deficiencies of the bulletware approach of PowerPoint and similar programs is magnified if the presentations are loaded onto a managed learning environment, such as Blackboard or WebCT.\nThey tend then to be completely separated from discourse. Of course, many individual academics do realise the shortcomings of PowerPoint and do create richer MLE content that incorporates lecture slides with other materials to the benefit of students.\nSMIRK (Simple Media-Integrating Resource Creator) has been developed at the University of Hertfordshire and attempts to overcome some of the implied criticisms of online presentations by making spoken commentary a natural part of a presentation and easing the incorporation of more detailed information through links to other documents in order to overcome some of Tufte’s criticisms of PowerPoint.\nChalk and Talk1\nThe expression ‘chalk and talk’ is often used disparagingly about non-technological approaches to education, and yet it also articulates a well-used pedagogical method. The traditional face-to-face approach incorporates two important elements.\nThe first element, ‘image-argument synergy,’ involves tying ‘the experience (the image) to the description (the argument)’ (Laurillard 2002). Computer-based media is seen as a means of achieving some of the desired outcomes and much work in this area has been undertaken at Laurillard’s home university, the Open University (UK). Boyle comments, ‘the job of the designer of IMLEs (interactive multimedia learning environments) is to create effective environments for learning’ (2002). We hope to demonstrate that SMIRK has the potential to involve students actively in their learning experience. The second important element comes from what LaRose, Gregg and Eastlin (1998) called ‘teacher immediacy’. Working from previous research that showed a positive correlation between student satisfaction and ‘instructor immediacy’ (as measured in verbal or non-verbal behaviour, the amount of anecdotal asides in lectures, the degree to which the instructor responded to student queries and exchanged observations with them), they showed that the audio presentation of material over the web, even if it lacked the video of the tutor’s presence, could produce a sense of vicarious immediacy. They found that simply recording lectures and replaying them over the web through an audio stream could prove to be a significantly more engaging medium than simple web pages (LaRose et al 1998; Bennett, Hewitt, Kraithman & Britton 2003). In fact, it has been suggested elsewhere that students with cognitive impairments such as dyslexia may benefit from multisensory teaching methods (University of Sheffield; Beacham, Szumko & Alty 2003).\nThere are a number of constraints when trying to produce an online version of a typical ‘talk and chalk’ session. They include the lack of technical skills of the lecturer and the cost of production. Furthermore, there are some real accessibility concerns: namely the difficulty of accessing the material thus produced by those with sensory impairments (hearing and sight). The true challenge of designing universally accessible teaching materials therefore is to both preserve the immediacy of the academic discourse while facilitating its transformation into accessible media (Bennett et al 2003).\nThe Special Educational Needs and Disability Act 2001 (SENDA) establishes legal rights for disabled students not to be discriminated against when enrolled on education courses. Thus, a university has legal responsibilities which include anticipating the needs of a disabled person, not treating a disabled person ‘less favourably’ and making ‘reasonable adjustments’ to ensure that a disabled student is not placed at a substantial disadvantage.\n(In the following discussion, we are only considering delivery over an MLE and thus will not extend our considerations beyond web content.)\nThe Web Content Accessibility Guidelines are published by the World Wide Web and establish very clear minimum standards against which documents can be tested, though some of them can be difficult to implement.\nThe Guidelines establish recommendations under 5 main headings.\n- Perceivability: Content should be perceivable by all users: images should have alternate text descriptions, audio should be complemented by captioning, structure and appearance of documents remains separate.\n- Operability: All interface elements are operable by any users: e.g. duplicating mouse click commands with key strokes.\n- Navigability: Render the structure of the media clear to the users such that they are aware of where they are in the system.\n- Understandability: Write in clear English (or appropriate language).\n- Robustness: Use web technologies that are fully geared to working with accessibility technologies and user agents. (Bennett et al 2003).\nMost universities attempt to meet their responsibilities by providing awareness training for academics and making needs assessments of students. This approach pushes the responsibility for compliance to the level of the individual academic. If accessibility concerns could be incorporated into an authoring tool, a great load could be taken off the author’s shoulders. SMIRK tries to relieve the burden on the lecturer.\nThere are good reasons to incorporate accessibility features into online presentations that go beyond legal compliance. Following Schmetzke, we note that: ‘Technology that is not universally designed, without consideration of the full spectrum of human (dis)abilities, is likely to contain access barriers for people with print difficulties’ and add the observation that the issue is compounded when we include audio and video elements to the delivered output (Schmetzke 2001). Furthermore, Burgstahler (2002) suggests that ‘potential students… may have mobility, visual, hearing, speech, learning and other types of disabilities that could impact their participation in many distance learning classes as they are currently designed’. However, we do not interpret this as meaning a ‘one-size-fits-all’ solution but that ‘[a] much better approach is to integrate accessibility reviews into the earliest stages of design…’ (U.S. Department of Justice 2000, quoted in Burgstahler 2002).\nWe do not attempt in this article to address in depth issues relating to details of technology, disability and learning since these resources exist elsewhere. For example, in the U.K., the Joint Information Systems Committee (JISC) finances a centre, TechDis, based at York University that gives support to staff in further and higher education (http://www.techdis.ac.uk/, and see Phipps, Sutherland & Seale 2002).\nThe SMIRK is in development and new tools are added over time, but here we will discuss some, but not all, of its main features (The following is an updated version of content that appeared in Bennett et al 2003).\nIn terms of its operation and user interface, SMIRK follows the style of a number of current slide presentation authoring tools. However, it is primarily an audio-visual tool, so the recording console has high prominence at the top of the screen. The principle is that the author will produce the slide and then give the narration, so that the visual and audio parts of the slide will be linked thereafter. This gives the user the ability to produce the audio for the slide in more than one ‘take’, allowing them to pause and overwrite already produced audio should it prove unsatisfactory. The SMIRK interface is shown in Figure 1.\nFigure 1: the SMIRK interface\nOn the top left are the typical drawing and typing tools one expects: the rectangle, the ellipse, the arrow, the polygon, the poly-line – particularly useful for drawing diagrams with graphics tablets. In this sense, SMIRK attempts to reproduce something of the annotation of an overhead transparency that might take place during a lecture. Using the poly-line tool the author is able to circle and draw over items of particular interest in the underlying diagram, as well as write notes freehand.\nThere are explicit buttons, ‘New Slide’ and ‘Clone Slide’. The purpose of the latter is again to reproduce a typical OHP strategy: overlaying one slide, or cumulative pen strokes, on the underlying diagram.\nFinally, as one would expect, there are the typical text tools; normal text and rich format text: the latter tool also allows the user to create content in MS Word (where available) and to incorporate OLE objects such as graphs, organisation charts and equations.\nPowerPoint presentations can be imported directly, as can individual graphics, video, Flash and audio files.\nFor those with suitable supporting software there is a speech recognition version of the program and there are two modes of presentation preparation: ‘edit’ mode and ‘live’ mode. The latter can capture a real time lecture for subsequent editing.\nIn the interface, accessibility features are foregrounded from the start. The text box at the bottom for the input of slide notes is permanently visible, and the red and green lights at the side of the slide thumbnails indicate whether accompanying text has been inserted. The caption box has spellchecking support in English (various versions) and several European languages to meet RNIB recommendations: screen readers require accurate spelling. The resulting captions are controllable by the use of CSS stylesheets.\nThe program also allows the user to substitute keyboard commands for mouse clicks in everything but the drawing operations, thus rendering the authoring interface controllable via voice commands and as accessible as possible to the author as well.\nAt the end of the production of a slide sequence the presentation is exported as a sequence of .jpg graphics and .mp3 audio files. The timing and sequencing of these files are then output in two time-dependent forms: SMIL 2.0 optimized for RealPlayer and HTML+SMIL specifically for Internet Explorer 5.5 and above;\nand two time-independent forms:\n- framed HTML with a table of contents in the left frame and the content itself in the right: this allows for the easiest and least burdensome access to material, downloaded only as selected by the user;\n- a single HTML document, containing all the accompanying text and graphics, ready to be printed out, an accessibility feature particularly appreciated by students everywhere.\nThe outputs meet the international accessibility standard of being Bobby 502 compliant, whereas the other outputs cannot be machine validated but we have attempted to adhere to the spirit of accessibility compliance by incorporating access Keys, pause and play functionality, non-time dependent access to all links used in the presentation, and the provision of captions.\nFigure 2: SMIRK accessibility audit screen\nIn addition to the traffic lights at the side of the slide thumbnails, the other principal accessibility facilitator in the interface to the program is the accessibility audit screen (see Figure 2), produced immediately after the export command is triggered. This will check if all the slides have alternative caption text, unique titles and audio commentary. Furthermore, any form of multimedia which involves interactivity during a streaming presentation can produce potential accessibility problems: if a link has a duration of 10 seconds, but a user does not click within its active period, the navigational possibility will be lost, thus severely disadvantaging someone who requires greater time to inspect the material. SMIRK therefore creates a special page of HTML for each presentation containing all the external links shown during the presentation. This allows the user to view it even if they have missed clicking on a link while it was active. We have used this feature for media elements such as Flash files and hyperlinks to simulations on other sites and quizzes.\nUsing the Package in an Introductory Economics Module\nLaurillard (2002) points out that the one-to-one tutorial is rarely possible in current university teaching and we must find other ways of replicating such an experience. She points out that the familiar methods used in higher education can be capable of meeting the requirements of a suitable teaching and learning strategy. The methods she isolates are: ‘acquisition: lectures and reading; practice: exercises and problems; discussion: seminars and tutorials; discovery: field trips and practicals (Laurillard 2002)’. The ‘conversational’ model that she espouses sees education as relying on dialogue between the teacher and the student and is related to earlier work by, inter alia, Paul Ramsden (1992). This approach differs in its underpinnings from other theoretical bases such as constructivism and ISD (instructional systems design).\nAll students in The University of Hertfordshire’s Business School take a core course called Introduction to Microeconomics. In 2003-04, there were 886 registered students. About 20% were international students for whom English was not their first language and about 20 had registered disabilities; mainly dyslexia but including Asperger’s syndrome and muscular dystrophy.\nA blended teaching approach was used. For the first six of the ten weeks with new material, the traditional lecture was replaced by an online multimedia streaming presentation delivered through the University’s own MLE, StudyNet. These lectures were made available to students each week, prior to workshops and seminars. The traditional (two hour) lecture slot was replaced by workshop exercises and there were supporting small(ish) group tutorials. The lectures were prepared in SMIRK and contained graphics, audio and captioning content.\nPositive informal feedback was forthcoming; both the international students and the students with disabilities favoured the idea that they could replay all or part of the lectures from their workstations. The international students claimed that they thought that it would help with their English language acquisition. Owing to a catastrophic loss of computer files, the results of a partial survey undertaken at the half-way stage of the course have been lost. However, we were able to respond to the suggestions made and adapt the system accordingly: a pause mechanism was programmed in and key conceptual points were explained in the timetabled lecture slots immediately prior to the associated workshop exercise. For the last four weeks of the course, the students were given a more traditional approach, i.e. a one hour lecture based on unaugmented PowerPoint slides followed by a one hour workshop. The idea for this switch was so that the students could comment on the differing approaches. Again, a formal survey was not undertaken but informal feedback indicated a preference for the multimedia approach.\nInitial analysis of results indicates an improvement from 33% first time failure in 2003 to 18% in 2004. We posit that the use of teaching presentations created in SMIRK contributed to this improvement.\nSMIRK enables academics to produce accessible multimedia presentations. There is commercial software available, such as Impatica and Macromedia Breeze, that transforms PowerPoint into streaming-friendly outputs but they are not as intuitive as SMIRK, do not produce such fully accessible outputs as SMIRK, can be expensive and are not independent authoring systems. SMIRK can be downloaded from http://smirk.herts.ac.uk/ and there is a discussion forum (http://www.jiscmail.ac.uk/lists/smirk.html)\nSMIRK presentations can be an aid to widening access in higher education both for students with cognitive, physical and sensory impairments and for international students.\nBeacham, N., Szumko, J. & Alty, J. 2003, An initial study of computer-based media effects on learners who have dyslexia, IMPACT Research Group and TechDis. [On-line] Available: http://www.techdis.ac.uk/index.php?p=3_10_9_3\nBennett, S., Hewitt, J., Kraithman, D. & Britton, C. 2003, ‘Making Chalk and Talk Accessible’, Proceedings of the 2003 conference on Universal usability (Vancouver, Canada), ACM Press, New York.\nBoyle, T. 2001, ‘Towards a theoretical base for educational multimedia design,’ Journal of Interactive Media in Education [Special issue of JIME on ‘Theory for Learning Technologies’] [Online] Available: http://www.jime.open.ac.uk/\nBurgstahler, S. 2002, ‘Distance Learning: Universal Design, Universal Access,’ Educational Technology Review, 10, 1, [Online] Available: http://www.aace.org/pubs/etr/issue2/burgstahler.cfm\nLaRose, Gregg & Eastlin 1998, ‘Audiographic Telecourses for the Web: An Experiment’, Journal of Computer-Mediated Communication, 14, 2, [On-line] Available: http://www.ascusc.org/jcmc/vol4/issue2/larose.html\nLaurillard, D. 2002, Rethinking University Teaching: a conversational framework for the effective use of learning technologies, Second edition, Routledge Falmer, London & New York.\nPhipps, L., Sutherland, A. & Seale, J. (Editors) 2002, Access All Areas: Disability, Technology and Learning, [On-line] Available: http://www.techdis.ac.uk/index.php?p=1_1_7_1\nRamsden, P. 1992, Learning to Teach in Higher Education, Routledge, London.\nSchmetzke, A. 2001, ‘Online Distance Education – “Anytime, Anywhere” But Not For Everyone,’ ITD Journal, 7, 2, [On-line] Available: http://www.rit.edu/~easi/itd/itdv07n2/axel.htm\nSENDA 2001, Special Educational Needs and Disability Act, [Online] Available: http://www.hmso.gov.uk/acts/acts2001/010010.htm\nTufte, E. R. 2003, The Cognitive Style of PowerPoint, Graphics Press LLC, Cheshire, Connecticut.\nUniversity of Sheffield (Undated), ‘9: Teaching Strategies’, Teaching Students with Dyslexia, [On-line] Available: http://www.shef.ac.uk/disability/teaching/dyslexia/9_strategies.html\n1See also Bennett et al (2003) for a discussion.", "label": "No"} {"text": "Have you ever wondered why you do what you do? Some decisions are conscious choices, but more than 40 percent of the things we do aren’t. They are habits and routines of behavior that we have developed over time. They are things that we repeate regularly and tend to occur subconsciously. This explains why we snack on unhealthy foods, smoke cigarettes when we don’t want to, spend more than we earn, watch too much TV, or always are late to meetings.\nHow do you stop bad habits and create good habits? It is much harder than it seems, which is why only 8 percent of people reach their New Year’s resolutions.\nAccording to Charles Duhigg, author of The Power of Habit, you can’t change habits by “powering through” them. This is one of the biggest myths out there. Your willpower is like a muscle, and it gets exhausted throughout the day. This explains why at the end of the day it is much harder to keep to your diet than in the morning, when your willpower is fresh.\nMany people make the mistake of trying to change or start the specific habit or behavior. Instead, you first have to understand the overall context of how it is formed and what it is made up of. A habit is not just one action, but a loop. This loop is made up of a cue, a routine and a reward. If you want to change a habit, you need to break the loop that keep the habit going through the cue and routine.\n- Cue: This triggers the habit and behavior. It switches your brain to automatic mode. There are five types of cues:\n- a place\n- a time of day\n- a certain person\n- a certain emotion\n- a ritualized behavior\n- Routine: This is the habit or behavior you find yourself doing unknowingly – it can be physical, mental or emotional. Just like getting in your car in the morning to drive to work, you don’t think of every step or decision you make. The more you do it, the less attention you need and the more automated it becomes. The habit takes over, freeing up mental space and conserving as much willpower as possible.\n- Reward: This is the pleasure you get from the habit. The reward “burns the habit into your memory,” so it becomes the go-to habit the next time the cue takes place.\nIf you want to curb a bad habit, first find the cue that acts as a trigger, and the reward you feel from the habit. Duhigg, from his personal experience, found that he had been eating a cookie every afternoon at 3PM (his cue was “a time of day”) and had gained eight pounds. He thought the reward was to satisfy his sweet tooth, but after experimenting, he found the reward actually was socializing with his peers.\nHe was using the excuse of getting a cookie to talk to his coworkers. After recognizing this, instead of eating cookies, he headed over to a colleague, talked for 10 minutes and then went back to work, eventually losing 12 pounds! It was a matter of teaching his brain to associate a reward with the appropriate habit.\nIf there are any habits you want to change, you have to properly diagnose and then change them. Check out Charles Duhigg’s book The Power of Habit for more information!", "label": "No"} {"text": "COVID-19 has spread to 150 countries worldwide since it was first discovered in China in December 2019. A total of 422,989 cases have been confirmed as of March 25, 2020. As the severity of the epidemic increases, various countries globally have imposed controls on the movement of people, including Italy, France, and the United States. They call on everyone to stay home, students to suspend classes, and employees to work from home.\nIt is proven that older people and people with chronic underlying diseases are more susceptible to COVID-19. Since a large proportion of visually impaired people experienced low vision due to age (e.g. AMD) or other disease (e.g. diabetic retinopathy), some people with low vision are probably at higher risk. It’s important to keep healthy during this special time. For people who are visually impaired, special care is needed due to special eye conditions.\nWith this in mind, Zoomax would like to share some tips to assist visually impaired people with taking better care during the COVID-19 outbreak. Together, we can continue being healthy and safe under changeable circumstances, even with low vision.\nPrepare for staying home\nIf restrictions on movement are implemented in your area, or work/school suspension begins, you will likely stay at home for a while. If your spouse, children, or low vision care provider can’t reach you, you need to think about how to reserve enough food, work remotely, and ensure safety during this time.\nIf you are a student, please pay attention to COVID-19 update. Below are two notifications about the school plan during the pandemic.\nTake care of your eyes\nPlease note, being a respiratory disease does not mean that COVID-19 will be transmitted through respiratory tract only. It’s easy to ignore that the virus can be transmitted through eyes. COVID-19 guidelines for professional ophthalmologists include a reminder about conjunctivitis, as some COVID-19 cases transmitted through the eyes performed very similar to conjunctivitis in the early stage.\n- What Eyecare Providers Need to Know about Coronavirus\n- Alert: Important coronavirus updates for ophthalmologists\nCare for the Elderly\nSeniors make up the largest percentage of people with low vision, since many eye diseases causing low vision, such as cataracts and AMD, are more likely to appear with age. COVID-19 also has a higher fatality rate in older people. If you or a member of your family is an aged person with low vision, please be careful. Here is some useful information.\n- How to protect older people from coronavirus\n- Stores designate shopping time for seniors vulnerable amid coronavirus: Safeway, Whole Foods, Target and more\nIn terms of health care indoors, it’s vital to clean the surfaces touched often as the visually impaired people feel the surrounding through touching often. Alcohol and bleach-based disinfectants are commonly used by Optometrists and Ophthalmologists to disinfect the instruments and office furniture. Below is a list of recommended disinfectants from the Environmental Protection Agency (EPA).\nSome bleach-based disinfectants may fade clothing and leather furniture. If you are concerned that your eye condition won’t work well enough to keep things away from contamination during cleaning, focus instead on plastics, metal and other surface or touchpoints first. Keep them away from sofas and beds when cleaning.\n- Many common household cleaning products can kill the coronavirus if you use them properly\n- Exposing eyes to bleach chemical may cause serious ocular damage\nPay attention to the notice\nLook out for the notices from your low vision community service. These notices usually contain useful information, such as closure time, dos and don’ts if you need to visit, and how to contact them. Some agencies also give advice on how to get help for visually impaired people with flu symptoms or confirmed diagnosis. Some institution notices are as follows:\nEnjoy indoor life\nWhen there is no lockdown or quarantine, staying home is also a great protection for the health. But people are easily bored at home for a long time, no matter whether you have a vision condition or not. There are many things you can do to make your indoor life rich and fun!\n- Yes, Staying at Home Really Makes You Safer During COVID-19 (Infographic)\n- Are you Ready for a Switch?\n- The Wiener Staatsoper is closed, but continues to play daily online\nLots of low vision aids providers also have a series of tools to improve visual independence at home. You can shop online and choose the right products. Some manufacturers offer a 30-day money back guarantee to ensure a better purchase experience.\nZoomax will fight against COVID-19 together with low vision communities as we go along. Please follow our Facebook and other social medias for more anti-epidemic tips on COVID-19.", "label": "No"} {"text": "Change is the only constant, as the old adage goes, but over the last century in Western culture, change has been elevated to a moral imperative, a sociopolitical ideology. The roots of this dramatic change in change are found in Modernism. This is not a loose synonym for contemporary times but, rather, an actual artistic school (c. 1880–1920) that fanned out to influence every nook and cranny of our world. Its battle cry was Ezra Pound’s “Make it new!” “The one thing that all modernists have indisputably in common,” writes Peter Gay in his masterful Modernism: The Lure of Heresy, “was the conviction that the untried is markedly superior to the familiar, the rare to the ordinary, the experimental to the routine” (p. 2). Modernism began in the arts, specifically painting, with Impressionism, which was a turn away from the time-honored technique of realistic painting. Traditional painters knew that there were objective realities in the world, and the best painters were those who painted them most beautifully and accurately. Even the painters who depicted heavenly and hellish realities, angels and demons, understood them to be objectively real. Impressionism, by contrast, launched the artistic “inward turn”: the important thing was not objective reality, but one’s subjective experience of reality, which was soon redefined. This was the consequence in the arts of the German Enlightenment figure Immanuel Kant, whose Copernican revolution in philosophy meant that after him, people no longer saw the things of the world as they are, but rather the things of the world as we are. Impressionism was Kant for canvas. In time, Modernism mutated, reshaping literature, architecture, music, education, dance, theater, politics, and religion, including Christianity (we call it “liberalism”). Objective realities do not change, or change very slowly, but man’s experience of the world changes constantly. Modernism, therefore, in a dramatic reversal, meant that the new is the real. It was quickly discovered that the new itself wore out but quickly, so what was considered new was in constant flux. This meant, quite simply, that life must be a permanent revolution.\nThe Modernists were not the world’s first advocates of permanent revolution (think only of the Anabaptists in the 16th and 17th centuries), but they were the first who envisioned the capacity of their views to reshape all of culture. They have been a spectacular success. In fact, their views have become an ideology, a comprehensive secular program for improving the world, and in this way permanent revolution became the 20th century’s status quo.\nThe Marxists, consummate political Modernists, bulldozed history in the mad quest for permanent revolution. By the early 1960’s, Mao’s revolutionary China (like all other non-Western revolutionaries, Mao learned his ideology from Western sources, not Asian) had murdered millions, but to the aging Mao, this revolution was getting stale. Mao’s teachings unleashed the Cultural Revolution, a bloody upheaval sparked by youth who considered their teachers and other superiors insufficiently revolutionary (“counter-revolutionaries”), so with Mao’s blessing, they tormented, hounded, humiliated, jailed, and killed the older revolutionaries who had launched and solidified the Chinese Communist Revolution in the late 1940’s. There must always be a new revolution in every generation, more drastic, more bizarre, more spectacular than the last.\nHow Playboy Became Conservative\nIn the same decade, here on the other side of the globe, the Cultural Revolution took a different form, but it was animated by the same ever-changing Modernist impulse. In the sexual revolution, bourgeois morality had to go. Premarital sex, recreational contraception, elective abortion, no-fault divorce, ubiquitous pornography, open marriage, homosexuality, bigamy, and pedophilia were new and exciting and just the ticket to replace the tradition of sexual fidelity, that is to say, Christian morality.\nBut the revolution must never stop. In the 1960’s, the revolution had demanded liberation from traditional marriage. Hugh Heffner and Playboy glamorized recreational heterosexual sex, “no strings attached.” By the 1970s, homosexuals were demanding acceptance as a legitimate self-expression, and why not? Playboy’s Brave New World of heterosexual liberation was growing effete. In the 2000’s, “civil unions” for homosexuals were a serious agenda item. Why should only heterosexual couples be afforded privileged legal status? By 2014, however, the revolution had bulldozed civil unions. Same-sex “marriage” had become a reality. To take the position that Barack Obama took in 2008 in favor of civil unions was to be a counterrevolutionary. To support civil unions was, like the I-phone 3G, so 2008. But by by 2015, even legal same-sex “marriage” was not enough. Reluctance to affirm same-sex “marriage” in one’s business was criminalized. The revolution, you see, eventually doesn’t demand merely legal rights; it demands social approval.\nFrom Civil Rights to “Microaggression”\nSimilarly, the civil rights movement, which (correctly) demanded that all races be treated equally under the law, was found over time to be culturally drab. By the 1980’s, racial quotas were installed in the workplace and colleges and universities, demanding that underrepresented races receive preferential treatment. Over the last two years, however, racial quotas entered their dotage, so microaggression, the use of language, gestures and attitudes seemingly benign, came to be interpreted as racist, so much so that United States Army felt obliged recently to delete a tweet that used the time-honored military language of “chinks in the armor” since “chinks” offended some Chinese. The revolution refuses to stop.\nMedicare and Medicaid, implemented in the 1960’s, installed the federal government in the healthcare business, seizing tax funds for the elderly and indigent. At the time, it was advertised as a modest proposal, nothing akin to “government-mandated healthcare.” By 2003, Republican President George W. Bush spearheaded expanded coverage, and the first administration of Barack Obama worked with a democratically controlled Congress to commandeer one sixth of the economy in what everyone now on all sides would acknowledge is government-mandated healthcare. It is not simply the case, as some libertarians suggest, that government is simply “always getting bigger.” Rather, Obamacare is one example within a larger worldview: novelty in national economics is good in itself. The revolution of the increased size and scope of government must be permanent.\nThe Conservative Collaboration\nThe socially and politically conservative reaction to permanent revolution is embodied in William F. Buckley’s famed act to stand athwart history and yell, “Stop!” But history will not stop, and conservatives have done little more than complain about the permanent revolution, while lagging about 10 years behind. Even today, prominent Republicans are quietly abandoning insistence on “family values,” where marriage between one man and one woman is defined as valuable. Conservatives are in permanent opposition to permanent revolution drag right along with it. This is not a recipe for cultural victory.\nWhen Permanent Becomes Temporary\nModernism in its inescapably permanent revolution is a comprehensive worldview. And only comprehensive worldviews can vanquish other comprehensive worldviews. You won’t defeat permanent revolution with a straggler’s de-escalation program. Bad worldviews can only be replaced. Full-orbed Christianity is a worldview. It is more. It is a lived experience. It is a way (to borrow from Heidegger) of being in the world. It believes and lives and breathes the permanent objective reality of the well-ordered cosmos created by the gracious Triune God whose revelation in the Bible is designed to govern all things by the power of the Holy Spirit. It holds that humanity sinned against this loving God, but that the same God sent his own Son, Jesus Christ, to pay the penalty for these sins on the cross, and that all those who cast faith on Him are redeemed and restored to communion with Him. It holds that we live in a God-rigged cosmos, that God gradually restore its virtuous harmony and beauty by the gospel of Jesus Christ and the Word of God. Modernism’s permanent revolution, like all revolutions, will finally burn itself out, gobble itself up from tail to head.\nAnd Christianity in the divinely ordered cosmos will still be standing.\nIt is for this reason that the only cure for permanent revolution is permanent Christianity. The task of Christians in today’s world is to pray and labor for that exclusively permanent permanence.\n Postmodernism is not so much a reaction against modernism as it is the latest iteration of modernism: hypermodernity. See David Harvey, The Condition of Postmodernity (Malden, Massachusetts: Blackwell, 1990), 3–65. Harvey, like most other Marxists, argues that postmodernism grew from the fertile soil of the permanent revolution of commodities and services in “late modernity,” but the fault rests in people’s actions in the free market, not the free market itself, which for two centuries survived quite well without permanent revolution. See Joshua J. Yates, “Late Modernity,” Culture, Spring, 2008, 17.\n It is ironic that every Marxist regime deplored and suppressed artistic modernism but practiced its basic tenets in its sociopolitical ideology.", "label": "No"} {"text": "Fife is a bonnie part of Scotland, but obviously when it’s called the Kingdom of Fife it’s just a way to commemorate the fact that it was a Pictish kingdom many centuries ago. The word “kingdom” thus has a ceremonial meaning in the collocation “Kingdom of Fife”, but a real, current meaning when we say “the United Kingdom of Great Britain and Northern Ireland”.\nThe reason for this brief introduction to the meanings of the word “kingdom” is that I wonder whether something similar is true with regard to Scotland’s status as a country.\nMost Scots — and definitely everybody on the Yes side — see Scotland as a real country, which just happens to have formed a political union with England, Wales and Northern Ireland.\nHowever, I wonder whether some people on the No side mean something completely different when they say that Scotland is their country, for instance when they insist that they love their country just as much as the Yes campaigners. Do they interpret “country” in a ceremonial fashion, just like the meaning “kingdom” has in the “Kingdom of Fife”? So do they actually mean that they love their region (Scotland), presumably as part of a real country (i.e., the UK)?\nThis is important because it relates to the representation Scotland gets in Westminster.\nAs Wings over Scotland put it recently:\nIf you’re claiming “my country” as being Scotland, then it’s a country [that] only gets the government its people vote for around 40% of the time. The argument from the No camp is that Scots have a vote in electing UK governments like everyone else does, and should just shut up and accept it if their wishes get over-ruled by the much larger population of England, because that’s democracy and people in Newcastle get Tory governments they didn’t vote for either.\nBut that only works if you’re saying that your “country” is the UK. The minute you identify Scotland as being a country in its own right, that argument disintegrates. Regions of a country have to accept the overall will. Countries should get the governments they vote for.\nIn other words, if Scotland is a country, then the UK is a union and Scotland should get many more seats in the House of Commons. It’s also logical that Scotland has a parliament, a separate legal system and even its own football team.\nHowever, if Scotland is just a region which is ceremonially called a country, then the current representation in the House of Commons is completely fair, but it’s then a bit strange why Scotland needs a parliament when other regions don’t (in this world view, four regions have parliaments — Scotland, Northern Ireland, Wales and London — but eight don’t: NE England, NW England, Yorkshire and The Humber, East Midlands, West Midlands, East of England, SE England and SW England), and there’s absolutely no justification for Scotland having a separate legal system and its own football team.\nI’d like people from the No campaign to tell me what kind of country they consider Scotland to be.", "label": "No"} {"text": "‘Gods were gods. Men were men,’ explained our tour guide, Spiros.\n‘The ancient Greeks thought there was a difference. Men had to realise they weren’t gods. They couldn’t do the things gods could do. If they tried, it provoked a disaster. The gods got jealous and punished them.’\nWhat has changed?\nThere are still things humans can and can’t do.\nWhen men get too big for their britches, the gods still punish them.\nA dangerous spot\nThe disaster we were looking at had nothing to do with the hubris of mankind. The problem was geological.\nHaving built their city over the fault line between the African and European tectonic plates, the ancient Cycladians were in a dangerous spot. Every few thousand years there were bound to be fireworks.\nAs it turned out, trouble came — big time — in about 1650 B.C. The earth trembled. A huge volcano rose from the sea, near Akrotiri, and blew up.\n‘The people had plenty of warning,’ Spiros went on. ‘There are no human bones in the town. No one was killed by the eruption. They were a seafaring people. They were fishermen. They probably got in their boats and headed for Crete, which you can see from here on a clear day.\n‘These people were not Minoans, like the people of Crete. But they traded with one another and knew one another.’\nThe journey to Akrotiri\nOur cruise ship had entered the crater in the early morning. By 8am, tenders — smaller boats that bring you ashore when the harbor is too small for the cruise ship to enter — were ready to take us to the island. There we boarded a bus for the short drive to Akrotiri.\n‘But I doubt they made it to Crete,’ Spiros went on. ‘Because after the volcano erupted, it collapsed into the lagoon, creating the giant crater we see today. This set off a tidal wave that may have swamped the people of Akrotiri.\n‘When it hit Crete, it probably wiped out the Minoan civilization. Many think this is the origin of the Atlantis story. I don’t know.’\nThere had been people on the island of Santorini for thousands of years before the volcano erupted. They had one of the most advanced civilisations of the time — with indoor plumbing, bronze tools, and professional artists to decorate the inside walls of their houses.\nThey were not an Indo-European people, apparently. Their written language has never been deciphered.\nTraveling the Aegean Sea in a luxury cruise ship is not a bad way to discover ancient history. But we are not here just to learn about the Greeks and the Minoans.\nSailing to Byzantium…or thereabouts\nThe proximate cause of this journey was an invitation from a colleague, Merryn Somerset Webb. Merryn is editor-in-chief of the magazine we publish in London, MoneyWeek.\nWe were bid to join the cruise at Catania and stay aboard until we reach Athens. We are meant to look at modern disasters, not just ancient ones.\nThe lowest rates in 5,000 years\n‘Central bankers never wanted to get down to the “zero bound,”’ explained Merryn yesterday. (The ‘zero bound’ describes the theoretical limit for interest rates — at 0% — that preoccupies so many central bankers these days.)\n‘They are not idiots. They knew it would cause distortions. And they knew they could get stuck there.’\nMerryn showed a group of investors a remarkable chart. Anywhere else, it would have been ridiculously out of place. But since we are visiting 6,000-year-old ruins, it seemed entirely appropriate.\n‘This shows interest rates for the last 5,000 years. How they figured out lending rates that long ago, I don’t know. But what it tells us is that since the building of the Egyptian pyramids — that is to say, forever — interest rates have never been this low.\n‘When you think of any financial decision you make…or when you try to analyse any price…you have to remember that it is in the context of the lowest interest rates in the history of the world.’\nIn general, lower interest rates mean higher asset prices.\nThat’s because the lower interest rates are, the more valuable other assets are by comparison.\nRevenge of the Gods\nBut woe to the price-fixer who fixes the price of money too low…for too long…and then attempts to raise it.\nThat is the jam in which Janet Yellen finds herself. She is damned if she does — for she will wipe out trillions of dollars from the value of stocks and bonds. She is also damned if she doesn’t — for she will only make the situation worse by driving more money into more unsustainable asset price booms.\nThis is fine by us. Yellen deserves to be damned. She has willingly and wittingly attempted to do what only the gods can do: determine the correct price of credit. She should have known better.\nThe rate the market gods would set if left alone could be 2%. It could be 4%. It could be 1%. It could be 4.5%. But it is certainly not zero. An interest rate of zero implies that capital — savings — have no value.\nAnd when Yellen’s predecessor, Ben Bernanke, put it there — lower than it has been for 5,000 years — surely, it must have caused the gods to laugh. Now they seek their revenge.\nHumans can successfully fix cars. They can figure out ways to beat casinos and emissions tests. But they can’t successfully fix interest rates. And they can’t beat the gods.\nToday, the island of Santorini (named after Saint Irene) is once again populated. Donkeys carry large tourists up the cliff face. White houses sit on the rim of the crater like icing on a cake.\nBut the town is so crowded with seasonal visitors it is hard to make your way through the narrow streets. Mobs in shorts follow guides who hold up signs to keep their people headed in the right direction.\n‘Brad Pitt and Angelina Jolie have a house here,’ Spiros announced proudly.\nFor Markets and Money, Australia", "label": "No"} {"text": "Strategies of Confrontation\nStrategies of confrontation are the least common response. They serve to bear witness to the faith, expose and end injustice, mobilize others to oppose injustice, and replace it with religious freedom.\nStrategies of confrontation are the least common, making up 19 percent of all responses. They are exercised in hopes of exposing injustice, mobilizing others to oppose the injustice, and, most of all, stopping the injustice and replacing it with religious freedom.\nThese strategies can be found at all levels of persecution, though there is some variation according to context. In relatively open political systems, confrontation is more likely to take the form of public demonstrations, documenting human rights abuses, or seeking redress through the courts. In six cases—Syria, Iraq, Nigeria, Kenya, Indonesia, and India—confrontation has taken the form of armed resistance, aimed not at the ruling regime itself but rather at militant groups against whom the regime had failed to protect Christian communities.\nStrategies of confrontation are also the most dangerous and likely to incur the repression of the state. This is most true of martyrdom and imprisonment, which can form a strategy (and not simply be a fate) when Christians openly profess their faith or assert their freedom in full acceptance and expectation of these consequences. They do so in order to bear witness. The word martyr derives from the Greek word for “witness,” and such martyrs embody the fullest expression of Christian freedom, testifying with their lives to the ultimate triumph of the God in whom they hope. Like forgiveness, martyrdom is constructive insofar as it points others to a just world. When Chinese Catholic and Protestant leaders accepted decades of imprisonment in punishment for their refusal to join the Communist government’s official church structures, and when Pakistan’s Shahbaz Bhatti stood for persecuted minorities, knowing that a form of martyrdom was their likely fate, they bore witness not only to their God but also to the dignity of all, Christians and non-Christians alike.\nStill, these dramatic, high-profile instances of martyrdom are rare. To be sure, it is not rare for many Christians to be killed for their faith every year; however, it is uncommon to see the sort of martyr who gains a high profile within a country or internationally, or whose martyrdom results in serious pressure against a persecuting government.\nNext Page : Nonviolence", "label": "No"} {"text": "Click here to enroll in the 2016-17 Delaware School Climate Survey!\nWhat does Positive Behavior Support look like in Delaware?\nThe DE-PBS Project is a collaborative project with the Delaware Department of Education, the University of Delaware Center for Disabilities Studies, and Delaware Public Schools. This statewide initiative is designed to build the knowledge and skills of Delaware educators in the concepts and practices of Positive Behavior Supports (PBS).\nA three-tiered approach is utilized to develop positive learning environments and prevent problem behaviors. The first tier, School-wide PBS, uses universal strategies implemented throughout the school to support the positive behavior of all students. The second tier applies additional strategies for students who need more support at this targeted level. For the remaining approximately 5% of students who do not respond to universal and targeted strategies, individualized supports are developed at the third tier.\nThe DE-PBS Project is guided by 10 Key Features.", "label": "No"} {"text": "Context matters: A community-based study of urban minority parents' views on child health.\nAuthorsBolar, Cassandra L\nAkintobi, Tabia Henry\nFerguson, Aneeqah S\nMetadataShow full item record\nAbstractAmong children, there are substantial ethno-racial minority disparities across a broad range of health-related behaviors, experiences, and outcomes. Addressing these disparities is important, as childhood and adolescence establish health trajectories that extend throughout life.\nCitationContext matters: A community-based study of urban minority parents' views on child health. 2016, 5 (3):212-219 J Ga Public Health Assoc\nAffiliationSatcher Health Leadership Institute and Prevention Research Center, Morehouse School of Medicine\n- Family pediatrics: report of the Task Force on the Family.\n- Authors: Schor EL, American Academy of Pediatrics Task Force on the Family.\n- Issue date: 2003 Jun\n- The effectiveness of school-based family asthma educational programs on the quality of life and number of asthma exacerbations of children aged five to 18 years diagnosed with asthma: a systematic review protocol.\n- Authors: Walter H, Sadeque-Iqbal F, Ulysse R, Castillo D, Fitzpatrick A, Singleton J\n- Issue date: 2015 Oct\n- Social determinants of health among African Americans in a rural community in the Deep South: an ecological exploration.\n- Authors: Scott AJ, Wilson RF\n- Issue date: 2011\n- Designing a Mobile App to Enhance Parenting Skills of Latinx Parents: A Community-Based Participatory Approach.\n- Authors: Doty JL, Brady SS, Monardez Popelka J, Rietveld L, Garcia-Huidobro D, Doty MJ, Linares R, Svetaz MV, Allen ML\n- Issue date: 2020 Jan 24", "label": "No"} {"text": "1. The selection of studies reviewed in this central section, as well as the discussion, draw heavily on Carey (2009). This significant work discusses a wide range of important findings in conceptual development (to which Carey has been a major contributor). Carey defends the Nativist view, but argues for a critical role for learning in the conceptual changes that follow.\n2. Chomskyan linguistics was not alone in rejecting the anti-mentalist constraints of Behaviorism. There was interesting work being done along parallel tracks on memory and category learning, and cybernetics and information theory were also beginning to focus attention on internal processes. Chomsky's work had a ‘multiplier effect’ on all these initiatives. Bechtel & Abrahamson 1999 tells the history very well.\n3. Chomsky has varied a good deal of the theoretical apparatus over the years, but the picture here—drawn mainly from the Chomsky 1965—was especially influential. See Cowie 2010 for a thorough (but skeptical) discussion.\n4. This idea was not itself new. Chomsky 1966 discusses a number of earlier attempts to use language learning as evidence for Nativism and a Rationalist conception of mind.\n5. The common dismissal of instincts and reflexes as somehow ‘not counting’ in the Nativist-Empiricist debate is relevant here.\n6. Pinker 2002 explores the cultural and intellectual resistance to Nativism.\n7. In fact, in Darwin it did—especially with regard to the emotional elements of human nature (1998/1872).\n8. Chomsky builds much of his social theory on this idea (see McGilvary 2005 for discussion).\n9. We are talking here about the adoption of influential paradigms and the direction of research, not evidence and argument. All the polemical points we've reviewed remain controversial and debate about their ultimate correctness continues.\n10. The proper characterization of a module is a matter of ongoing debate (see Robbins 2010 for a detailed discussion).\n11. Downes 2010 is a useful summary of the state of the art here.\n12. This immediately raises questions about the relation between the innately based information embodied in these Pleistocene tools, and their truth. For discussion of the possible philosophical ramifications of this evolutionary perspective, see Plantinga 1993, Nagel 1997, and Street 2006.\n13. See Pinker & Bloom 1990 (and the exchanges following the target article).\n14. The resistance to evolutionary explanations in psychology, in a nutshell, is based on the complaint that such explanations have ignored an alternative hypothesis—viz., that larger brains were selected for because they provided a crucial advantage vis-à-vis some challenge x (we will probably never be able to determine what that x was), and that as a side effect of this growth, humans came to have the ability to use language, prove theorems about Hilbert spaces, etc.\n15. See, for instance, Gallistel 2000 and Marler 1991. Burge 2010 discusses such animal systems with an eye to understanding their specific representational content and standing (and this bears directly on Nativist claims). His views also bear on the proper interpretation of many of the findings about infants and young children discussed in section 2.\n16. But there are attempts to model other domains on language—see, for example, the grammar-type model of morality—discussed in Mikhail 2008 and Hauser 2006.\n17. Piaget 1928, 1936/1952, and 1954 are some very important works in this regard, but the output of Piaget and his collaborators is prodigious. For a philosophical discussion of Piaget, see Flanagan 1991.\n18. One significant attempt to bring the Piagetian and Chomskyan paradigms into conversation was not a great success (see Piatelli-Palmarini 1980).\n20. See for example, Laurence & Margolis 2007 and Leslie, Gallistel & Gelman 2007\n21. The system is ‘abstract’ in the sense that it is not a feature of visual perception and/or audition per se, but operates to link the outputs of such systems. See Burge (2010, chapter 10) for further discussion.\n22. Here we ignore the possibility that innate systems of this sort might somehow be deactivated or extinguished.\n23.Wellman et. al. (2001) discusses two decades of false-belief studies and argues that they support the view that children go through a significant conceptual change in coming to understand belief. There is also now a large literature investigating the neural substrate of belief attribution, the role of mental state language and complement syntax, the influence of executive function ability on mental state attribution, the connection of belief attribution and theory of mind to autism and other developmental disorders, etc. Doherty (2009) is a recent study of the research in this area.\n24. Although we don't discuss moral cognition here, these findings bear on the infant's empathy and readiness for moral evaluations.\n25. This argument-schema about the Nativist implications of the Classical computationalist view of mental representation has been controversial from the start—see, for instance, the papers in part II of Hook 1969.\n27. Note that, as with factory settings of artifacts, such settings may be over-ridden. We may be able to learn new priors, and there may be second-order priors that govern such updating. So if there are innate priors, they are just initial settings, and not hard constraints; they need not close us off to the true nature of things.\n28. Here we set aside questions about the ‘psychological reality’ of Bayesian models—e.g., Does the mind/brain actually execute Bayesian $$calculations (or are there heuristics that approximate the results)? Are learners sensitive to the relevant parameters of such calculations? Do they store the right sorts of information? Some of these questions are being addressed; see, for example, Teglas et. al. 2011 for some suggestive findings about infant's sensitivity to probabilities and Xu 2007.\n29. Tenenbaum 2006 provides a useful cross-section of current research.\n30. This will include not just Bayes' theorem but a range of information pertaining to the collection and characterization of the data, including information about how to sample the world, how and what to store, what conditions to consider reliable, relations between samples and populations, etc.", "label": "No"} {"text": "Conversation Barriers Lead to UnderAppreciation of the Importance of Health Schooling\nCommunication hurdles will be the main reason for under-appreciation of the value of health instruction for children at the very first several decades of life\nWithout giving it much consideration, Your children’s bodies may catch disorders from your surroundings. Let’s take sti and health instruction.\nSTI stands for sexually transmitted diseases, like gonorrhea, chlamydia, genital herpes, syphilis, HIV/AIDS along with also others. They can be transmitted by means of contact.\nThe very first health obstacle would be your barrier of your system. The body is not well equipped to fight illness, especially when it has to do with the genitals. The system isn’t completely developed and the system does not cope with the clear presence of viruses, viruses or germs, bacteria.\nIt will take many a long time for the resistance to develop. Individual beings are vulnerable to disorders. Kiddies endure a shorter life span because of lack of proper health education.\nIn children the body is composed of several levels. To begin with there is the mucous liner. This lining will be the initial field of defense and also handles the body’s defense from infection, but in addition delivers a gentle and elastic shell that allows the child to feel relaxed during any contact with other people.\nSubsequent to the mucous lining is compromised the immunity is weakened farther. The human body is able to papers for sale online no longer protect it self from pathogens spread through contact or bodily fluids. Diseases like hepatitis, gonorrhea and HIV/AIDS can disperse among kiddies if their resistance can be jeopardized by an accident, illness or use of contaminated objects.\nWellbeing education commences off at birth. For education is of extreme importance. Education about STIs and proper hygiene may avert the onset of those ailments.\nBilingual health instruction is vital in kids born to mothers with minimal knowledge of the health care issues and the medical care products and services. The parents also must have the ability to understand the risks and demands of their children. There are risk factors which will prevent kids from acquiring health care, all these include low earnings, low literacy rates of training and poor wellness care facilities. Health education tends to make the parents aware of exactly what health concerns their kiddies possess.\nFor there’s the chance of low levels of immunization, which means less protection against STIs and different ailments. https://www.gcu.edu/degree-programs/bachelor-science-justice-studies They don’t have the capacity to talk regarding outward symptoms, since kids act ill lots of the time and that is a hazard issue. Realizing the causes of vomiting will be the real key wwww.samedayessay.com to avoiding the event of STIs as well as other psychiatric diseases.\nAdditionally to this there is that the prospect of a poor lifestyle, which includes eating habits and lack of physical exercise, that affect the body adversely. That was a really higher possibility of child weight problems in this circumstance, which might possibly increase the probability of other communicable disorders and STIs.\nWhen kids grow they will not only need to handle these facets but can strike them . Clearly, they are going to know how to guard themselves from those issues, however it isn’t simple to communicate about such issues with these children. Parents want to truly have the self assurance to talk about subjects.\nChildren have access. It is essential that they understand that which illnesses are and the reason it is important to receive health education in order that they could grow to be a foundation for the remainder of their own lives.", "label": "No"} {"text": "Bath Buildings of Stone\nA look at some of Bath's famous Georgian stone buildings.\nSurrounded by parkland and rolling hills of the Cotswolds, situated on a bend of the River Avon and graced by some of the most beautiful city architecture in Europe, Bath has the unique distinction of being Britain’s only city with World Heritage Site status.\nThe city is also the site of Britain’s only hot springs, around which the Romans built a magnificent temple and bathing complex that gave the city its name and still flows with natural hot water.\nBath has around 5,000 buildings officially goverment listed and protected for their architectural merit, and some of the finest Georgian\narchitecture in Britain is found here - the Royal Crescent, the Circus, the Pump Room, the Assembly Rooms and the Pulteney Bridge are all Georgian masterpieces.\nBath Stone is an Oolitic Limestone comprising granular fragments of calcium carbonate.\nOriginally obtained from the Combe Down and Bathampton Down Mines under Combe Down, Somerset, England. The mines were under the ownership of Ralph Allen just as the building boom started in Bath, and from his quarries came the distinctive \"Bath Stone\" used to build the Georgian city, making Allen a fortune.\nThis fine textured limestone was used by the Romans to build public buildings. The Georgians again revived the use of this stone and many world famous landmarks are constructed in Bath stone. The material naturally weathers to a honey colour and is ideal to form almost any architectural embellishments as well as masonry.\nBath is a city steeped in history and has the only hot spring in Britain.\nThe Spa city has more officially listed (5000) buildings than central London and most originate from the 18th century.\nThe stone's warm honey colouring gives the World Heritage City of Bath its distinctive appearance and significantly adds to its cohesion of Georgian buildings that abound the city.\nAn important feature of Bath Stone is that it is a freestone, that is one that can be sawn or 'squared up' in any direction, unlike other rocks such as slate, which forms distinct layers.\nBath Stone has been used extensively as a building material throughout southern England for churches, houses and public buildings such as railway stations.\nSome of the quarries from which the stone was taken are still in use but the majority have been converted to other purposes or are being filled in.\nArchitects and Builders of Bath\nFew cities have had the advantage of Bath in such uniformity in the laying out of their streets and buildings and in their extensions from time to time.\nFor just a century of work was carried on with extraordinary energy, at first by the humble builders, then by the\ns, Wood and his son, and later still by such men as Baldwin, Attwood and , men who united the business of a builder with that of an even more closely than did the two Woods, and who, towards the close of the century, embarked upon such costly and extensive schemes as frequently led, through the economic troubles of those times, to serious financial loss and bankruptcy.\nIndeed, at the beginning of the 19th century many buildings were left unfinished; but, fortunately, most of them were afterwards completed, and there is scarcely a trace now of the incompleteness and desolation which must have been so apparent in the early part of that century in Bath.\nThe Buildings of Bath Collection Museum\n- The Countess of Huntingdon’s Chapel, The Vineyards, The Paragon, Bath BA1 5NA\nThis unique collection interprets the rich architectural history of Bath and the men who transformed a provincial town into the world famous Georgian Spa. It demonstrates how classical design influenced the buildings and illustrates the construction of a house from the cellars to the rafters.\nThe Building of Bath Museum is located in the historic Countess of Huntingdon’s Chapel, the building is also home to the historic Bath Model, a fully detailed architectural model of the historic city centre, giving a unique insight into the layout of the Georgian City.\nAs well as opening to visitors during the season, the Chapel houses study days and events from February to November for adults and young people, open to all.\nThe Building of Bath Collection also houses the Bath Buildings Record, which can be viewed by appointment. The Bath Buildings Record undertook to record, survey and rescue where possible, details comprising the large number of buildings that were earmarked for clearance as part of Bath’s modernisation in the 1960’s and 1970’s. Many of the images from the Bath Buildings Record have been digitised and are available to view online at Bath in Time.\nDesigned by John Wood the Elder and completed by his son John Wood the Younger in 1764.\nThe three curved crescents of The Circus form a circle nearly 100 metres in diameter (see main pictues above).\nDr David Livingstone the explorer, Lord Clive of India, Thomas Gainsborough the painter, and William Pitt, MP and Prime Minister once lived here.\nThe Royal Crescent\nDesigned by John Wood the Younger and completed between 1767 to 1774.\nThe Royal Crescent (see main pictures above), described as the finest in Europe, consists of a sweeping arc of 30 houses standing behind a flourish of 114 columns and represents the highest point of Palladian architecture in Bath.\nNo.1 Royal Crescent was the first house to be built and originally provided luxury accommodation for the aristocratic visitors who came to take the waters and enjoy the social season. A former distinguished resident was the Duke of York, second son of King George III.\nNowadays No.1 provides visitors to the Crescent with an opportunity to see what life was like for the wealthy in 18th century Bath. Each room is an exquisite example of Georgian interior design with authentic furniture, paintings, textiles and carpets.\nThe superbly appointed Dining Room is set for dessert. Pipes and port are laid out for an evening of cards in the comfortable Gentleman’s Study. Upstairs you can see the elegant Drawing Room, where fashionable visitors took tea, or slip into a delightfully feminine bedroom. Below stairs is a splendidly equipped, bustling Georgian Kitchen. Guides in every room bring the house to life with stories of the past.\nIn 1968 Major Bernard Cayzer, a member of the shipping family, acquired the house and presented it to Bath Preservation Trust who restored the house using only materials available in the 18th century. No.1 is now administered by Bath Preservation Trust.\nMore Georgian Homes\nBath is famous for its crescents and terraces of houses here are some more of important architectural merit.\nLansdown Crescent dates from 1789\nLansdown Crescent is on the left of Lansdown Road, its quite hidden away and is one of the last buildings of grand architecture just on the edge of Bath.\nDesigned by John Palmer (also designed the Pump Room) and constructed by a variety of builders between 1789 and 1793.\nLansdown Crescent comprises 20 houses, each originally having four floors together with servants' quarters in the basement.\nArranged as a crescent, this building has a clear view over central Bath, being sited on Lansdown Hill near to but higher than the Royal Crescent. William Beckford lived in Nos 19 and 20.\nSheep can often be seen grazing on the parkland opposite - something not noted in any other city.\nThe crescent was built between 1815 and 1829 - the architect was John Pinch.\nSituated on the Lansdown slopes just below Lansdown Crescent, Cavendish Crescent is a beautiful example of the the architecture of its time. Due to its size and shape it is often twinned with Somerset Place which is just to the North and equally worthy of a visit.\nThe architect for Camden Crescent was John Eveleigh and it was built during the early 1790's . Unfortunately the land was subject to landslip and so what we now see is not the complete crescent. It was originally designed to have twenty two houses in a gentle curve, flanked by straight ends with five houses. Only the straight end at the west end of the crescent still exists.\nWhen looking at the crescent, one can see that the very grand centre is not in the centre at all, and the centre's pediment is held up by five Corinthian columns (very bad practice regarding classical architecture-there should be an even number of columns).\nAbove the doorways can be seen a single elephant's head, which was a part of the coat of arms of Charles Pratt, Marquis of Camden.\nSomerset Place lies above Cavendish Crescent.\nA crescent in its own right, separated from Lansdown Crescent and Somerset Lane. Designed by John Eveleigh and built in stages between1790 and 1830.\nInitially Eveleigh built two semi-detached houses without curved facades and then added on crescent shaped wings on either side. Hence the reason for the very dominant central feature with the unusual broken pediment on top.\nSomerset Place was badly damaged during the air raids of 1942, and the central houses were gutted by fire - fortunately the facades survived. Look out for the very grotesque looking masks on some of the doorway keystones!\nThe Paragon in the Walcot area of Bath is a street of Georgian houses which have been designated as listed buildings. It was designed by Thomas Warr Attwood. It now forms part of the A4 road system. John Palmer finished the project.\nGreat Pulteney Street\nGreat Pulteney Street (see main picture above) is a grand boulevard that joins Pulteney Bridge to Bathwick in the eastern side of Bath.\nCommissioned by Sir William Pulteney, it was designed by the architect Thomas Baldwin and completed in 1789. The council wanted to expand the boundaries of the City, and Sir William's estate was conveniently situated just over the other side of the River Avon.", "label": "No"} {"text": "W.E.B. Du Bois\nWilliam Edward Burghardt Du Bois (1868–1963) believed that his life acquired its only deep significance through its participation in what he called “the Negro problem,” or, later, “the race problem.” Whether that is true or not, it is difficult to think of anyone, at any time, who examined the race problem in its many aspects more profoundly, extensively, and subtly than W.E.B. Du Bois. Du Bois was an activist and a journalist, a historian and a sociologist, a novelist, a critic, and a philosopher—but it is the race problem that unifies his work in these many domains.\nDu Bois contributes to our specifically philosophical understanding of race and the race problem, because he treats these themes as objects of philosophical consideration—indeed, it is largely through an engagement with Du Bois’s work that many contemporary philosophers have come to appreciate race and race-related concerns as fruitful topics of philosophical reflection. Through his work in social philosophy, political philosophy, and the philosophy of art, Du Bois, for all intents and purposes, invented the field of philosophy and race, thereby unsettling and revising our views of the proper scope and aims of philosophical inquiry.\n- 1. Du Bois’s Life and Major Publications\n- 2. Social Philosophy, The Negro Problem, and Race\n- 3. The Science of Human Action and Social Reform\n- 4. Political Philosophy\n- 5. Philosophy of Art\n- 6. Intellectual History, History of Philosophy, and Du Bois\n- Academic Tools\n- Other Internet Resources\n- Related Entries\n1. Du Bois’s Life and Major Publications\n|1868||Born, William Edward Burghardt Du Bois, Great Barrington, Massachusetts, February 23.|\n|1884||Graduates from Great Barrington High School.|\n|1885||Enters Fisk University, Nashville Tennessee, with sophomore standing.|\n|1888||Receives BA from Fisk. Delivers commencement oration on Otto von Bismarck. Enters Harvard College as a junior.|\n|1889–90||Takes philosophy courses with William James, George Santayana, and F.G. Peabody.|\n|1890||Graduates from Harvard College with a BA, cum laude, in philosophy. Delivers commencement oration on Jefferson Davis.|\n|1892||Awarded a grant from the Slater Fund to study at Friedrich Wilhelm University in Berlin, where he works closely with Gustav von Schmoller, leader of the younger German Historical School.|\n|1893||Slater Fund Grant extended for one year.|\n|1894||Denied further aid from the Slater fund. Unable to fulfill residency requirements for obtaining a doctoral degree from Friedrich Wilhelm University, returns to Great Barrington. Takes an appointment to teach Classics at Wilberforce University in Xenia, Ohio.|\n|1895||Awarded a PhD in History from Harvard, he is the first black to receive a PhD from Harvard.|\n|1896||Published his doctoral dissertation, The Suppression of the African Slave-Trade to the United States of America, 1638–1870, as the first volume of Harvard’s Historical Monograph Series. Hired by the University of Pennsylvania to conduct a sociological study of the black population of Philadelphia’s Seventh Ward.|\n|1897||Joins fellow black intellectuals to found the American Negro Academy, an organization devoted to promoting black scholarly achievement. Appointed professor of history and economics at Atlanta University, where he begins to edit the Atlanta University Studies (1898–1914).|\n|1899||Publishes The Philadelphia Negro.|\n|1903||Publishes The Souls of Black Folk.|\n|1909||Publishes John Brown, a biography.|\n|1910||Appointed director of research and publications for the NAACP. Begins to edit The Crisis, an official publication of the NAACP.|\n|1911||Publishes Quest of the Silver Fleece, his first novel.|\n|1915||Publishes The Negro.|\n|1919||Organizes first Pan-African Conference in Paris.|\n|1920||Publishes Darkwater: Voices from within the Veil|\n|1919||Attends the second, Pan-African Conference in London.|\n|1924||Publishes The Gift of Black Folk: The Negroes in the Making of America.|\n|1928||Publishes a second novel, Dark Princess: A Romance.|\n|1934||Resigns as editor of The Crisis and from the NAACP. Appointed Editor-in-Chief of The Encyclopedia of the Negro.|\n|1935||Publishes Black Reconstruction.|\n|1939||Publishes Black Folk, Then and Now, a revision of The Negro.|\n|1940||Publishes Dusk of Dawn, an autobiography. Founds and begins to edit Phylon, a quarterly journal examining issues of race and culture.|\n|1944||Named the first black member of the National Institute of Arts and Letters. Publishes “My Evolving Program for Negro Freedom” in What the Negro Wants, ed. Rayford Logan.|\n|1945||Attends the fifth Pan-African conference in Manchester, England. PublishesColor and Democracy: Colonies and Peace. In protest of conferences held in segregated hotels, resigns his membership in the American Association of University Professors.|\n|1947||Edits and writes the introduction to “An Appeal to the World: A Statement on the Denial of Human Rights to Minorities in the Case of Citizens of Negro Descent in the United States of America and an Appeal to the United Nations for Redress.” Publishes The World and Africa.|\n|1951||Indicted under the McCormick Act for being an “unregistered foreign agent.” Acquitted after a five-day trial.|\n|1952||Publishes In Battle for Peace, an account of the trial.|\n|1957||Publishes The Ordeal of Mansart, the first volume of the Black Flame trilogy of historical novels.|\n|1959||Publishes Mansart Builds a School, the second volume of the Black Flame trilogy.|\n|1961||Publishes Worlds of Color, the third volume of the Black Flame trilogy. Accepts Kwame Nkrumah’s invitation to move to Ghana.|\n|1963||Becomes a citizen of Ghana. Dies in Accra, Ghana, August 27, on the eve of the March on Washington for Jobs and Freedom. Roy Wilkins announces Du Bois’s death at the March, remarking “that at the dawn of the twentieth century his was the voice that was calling you to gather here today in this cause. If you want to read something that applies to 1963 go back and get a volume The Souls of Black Folk by Du Bois, published in 1903.”|\n|1968||Posthumous publication of The Autobiography of W.E.B. Du Bois.|\n2. Social Philosophy, The Negro Problem, and Race\nOver the course of his career, Du Bois’s social philosophy comprised contributions to social ontology, social theory, the philosophy of the human and social sciences, and the diagnosis of social problems. His analysis of the nature of a social problem and, specifically, his diagnosis of the Negro problem; his social constructionist accounts of race and racial differences; his ongoing reflection on the methods, purposes, and sometimes moral significance of social inquiry; and his elaboration of the claim that the concept of race, operating as a mechanism of power, structures relations of social domination, all played a critical role in what he ultimately came to call his “evolving program for Negro freedom” (1944, 31). The present section bears on Du Bois’s analysis of the Negro problem and his contributions to the philosophy of race. Section 3, below, focuses on his contributions to the philosophy of the social sciences.\n2.1 What is the Negro Problem?\nDu Bois considers the Negro Problem both objectively and subjectively—both from the standpoint of science and from the standpoint of lived experience.\n2.1.1 The Negro Problem Objectively Considered\nIn “The Study of the Negro Problems” (1898), one of his earliest publications, Du Bois responded to then contemporary discussions of America’s “Negro problem” by conceptualizing the problem as an object of social scientific inquiry. Sociology studies social phenomena, and the social phenomena that interest Du Bois are the cluster of social problems affecting American Negroes (the Negro is not a problem, in his view, although problems affect the Negro [see Gordon, 2000]). In the perspective of sociology, the Negro problem just is a cluster of social problems (1898, 77–78). But what is a social problem?\nDu Bois answers this question by defining a social problem as “the failure of an organized social group to realize its group ideals, through the inability to adapt a certain desired line of action to given conditions of life” (1898, 78). One example is the failure to enact the ideal of a luxurious home life due to prevailing marriage customs. Another is the failure to enact the ideal of economic and social development due to crime and lawlessness.\nThe historical evolution of the social problems that Du Bois identifies as Negro problems has been a “baffling adjustment of action and condition which is the essence of progress” (1898, 82). Turning to the present, Du Bois characterizes the then current (circa 1898) Negro problems as so many failures to enact the ideal of incorporating the Negro masses into the group life of the American people. Du Bois attributes these failures to two causes: white racial prejudice towards Negroes and Negro cultural backwardness. Racial prejudice is the conviction “that people of Negro blood should not be admitted into the group life of the nation no matter what their condition may be” (1898, 82). Cultural backwardness is economic disadvantage, ignorance, and deficiency with regard to the art of organized social life. Each of these causes accounts for one of two distinct classes of Negro problems (1898, 82–3).\nDu Bois’s social ontology and causal explanation of Negro problems lay the basis for his research agenda. The study of the Negro as a social group focuses on Negro problems that have arisen independently of racial prejudice in the Negro’s social environment. In turn, the study of the Negro’s social environment considers Negro problems that have resulted from racial prejudice. Du Bois’s program for studying the Negro as a social group includes historical study, statistical investigation, anthropological measurement, and sociological interpretation.\n2.1.2 The Negro Problem Subjectively Considered\nIn Du Bois’s view, the Negro Problem is a subjectively lived and felt social condition, not only an object of social scientific inquiry. In “Strivings of the Negro People” (1897b) and The Souls of Black Folk (1903a), Du Bois adduces the concept of double-consciousness to characterize the subjectively lived and felt experience of the Negro problem. Ascribing double consciousness specifically to the Negro, Du Bois characterizes it as a “sense of always looking at oneself through the eyes of others, of measuring one’s soul by the tape of a world that looks on in amused contempt and pity” (1903a, 3). In Du Bois’s view, double-consciousness obtains when blacks see themselves through the pitying and contemptuous eyes of the racially prejudiced whites whose racial prejudice is one of the causes of the Negro problem.\nThe concept of double-consciousness is the most extensively discussed concept in the humanities and social sciences secondary literature on Du Bois, and it has received substantial attention from philosophers. The present, brief discussion of the concept is intended simply to situate it within the larger context of Du Bois’s social philosophy. For a more detailed account of Du Bois’s understanding of double consciousness and a survey of contemporary philosophical disputes about the content and significance of the concept, see the entry on double consciousness.\n2.2 What is a Negro? What is a Race? What is Whiteness?\nIn “The Study of the Negro Problems,” Du Bois predicates his analysis of Negro problems on his analysis of social problems as such; in another early essay, “The Conservation of Races” (1897a), he similarly predicates his answer to the question, “What is a Negro?” on an answer to a more fundamental question, “What is a race?” Du Bois turns to the human sciences to say what a race is, but also to account for the existence of spiritually distinct races. Du Bois’s historical-sociological definition of race overlaps his historical-sociological explanation of the existence of spiritually distinct races. To put the point more precisely, and in an idiom that is familiar to contemporary philosophers, Du Bois holds that the same sorts of historical and social factors construct race both constitutively and causally.\nWe begin by analyzing Du Bois’s explanation of the distinctiveness of distinct races. We then turn to his definition of race, which he introduces to counter the objection that, because spiritually distinct races cannot be identified as races from the perspective of the natural sciences, they cannot be identified as races at all. After considering contemporary philosophers’ ongoing debates about Du Bois’s definition of race in “Conservation,” we turn to Du Bois’s later treatments of race and the notion of whiteness in Dusk of Dawn (1940), Black Reconstruction (1935), and “The Souls of White Folk” (in Darkwater (1920)).\n2.2.1 Explaining Race\nIn explaining and defining race, Du Bois participates in a turn-of-the-century conversation in German philosophy about the subjects and methods that distinguish the human from the natural sciences—that is, the Geisteswissenschaften from the Naturwissenschaften. Responding to Auguste Comte’s and J.S. Mill’s efforts to reform the human sciences on the model of the natural sciences, German scholars addressed a variety of questions as to the human sciences’ cognitive aims, possible methodological autonomy, and dependence on psychology. When Du Bois arrived in Berlin in 1892, the conversation was well underway and had already benefitted from the significant contributions of Wilhelm Dilthey and Wilhelm Wundt several years earlier. During the 1890s there were further contributions, in particular the writings of Georg Simmel, Wilhelm Windelband, and Heinrich Rickert. Although Du Bois initially presented “The Conservation of Races” as an address to the American Negro Academy, the essay was a significant addition to the German debate, for it marks Du Bois’s turn from the Naturwissenschaften to the Geisteswissenschaften to explain the differences between races and to conceptualize racial identities.\nAlthough Du Bois’s essay acknowledges, as the “final word of science, so far,” that physical differences distinguish “at least two, perhaps three, great families of human beings—the whites and Negroes, possibly the yellow race” (1897a, 52), it more importantly maintains that that there exist eight, spiritually distinct races. It also maintains that each spiritually distinct race, as such, is causally constructed by historical and social factors, for it asserts that each spiritually distinct race causally owes its spiritual distinctiveness (its peculiar message, which dictates its particular historical role) to such factors—specifically, to the common histories, laws, religions, habits of thought, and conscious strivings that have caused it to be the cohesive, spiritually distinct race it is (1897, 54–56).\nDu Bois also holds that the spiritual distinctiveness of a socio-historical race cannot be explained in terms of physical, biological facts. Like Wilhelm Dilthey, whose Introduction to the Human Sciences (1883) had appeared a decade before Du Bois heard him lecture in Berlin, he expressly questions the possibility of causal explanations that reduce spiritual facts and differences to biological facts and differences. Thus, Du Bois rejects the physio-biological reductionism characteristic of nineteenth century racial science: the thesis that physical racial differences causally explain the spiritual and cultural differences between racial groups. Spiritual differences have historical and social causes (law, religion, and so on), which Du Bois takes to be causally independent of biological racial facts (1897a, 54–55).\n2.2.2 Defining Race\nHaving sketched a preliminary account of the “subtle forces” that have causally divided human beings into spiritually distinct races, Du Bois writes that, while these races “perhaps transcend scientific definition, nevertheless, [they] are clearly defined to the eye of the Historian and Sociologist” (1897a, 53).\nThat spiritually distinct groups may not be readily identified as races if one adopts the perspective of the natural sciences does not entail that they cannot be identified as races at all. Reminiscent of Dilthey, again, Du Bois holds that the natural sciences and the human sciences have distinct subject matters (physical facts, on the one hand, spiritual facts on the other), and suggests that the former, because they conceptualize human beings exclusively in physical terms, cannot conceptualize them in terms of social and historical facts, and thus cannot conceptualize them in terms of the social and historical facts that define spiritually distinct groups as races (Du Bois’s reason for claiming that social and historical facts “transcend scientific definition”). If, however, one adopts the perspective of the human sciences; if, in other words, one adopts the conceptual “eyes” of the historian and the sociologist, then one sees these social and historical facts standing “clearly defined” to one’s point of view. From this point of view, Du Bois proposes, it is possible to identify spiritually distinct races as races, and thus to state a definition of race—or, in other words, to specify the historical and social factors that constitute a group of human beings as a race.\nWhat, then, is race? It is a vast family of human beings, generally of common blood and language, always of common history, traditions and impulses, who are both voluntarily and involuntarily striving together for the accomplishment of certain more or less vividly conceived ideals of life (1897a, 53).\nHere, Du Bois’s distinguishes between the factors that generally (usually) characterize a race and the factors that must always characterize a race; that is, the factors that constitute a group of people as a race. Du Bois’s definition proposes that a group of human beings counts as a spiritually distinct race if, and only if, the members of the group have a common history, common traditions and impulses, and common (voluntary and involuntary) strivings; counting as members of a spiritually distinct race does not require a common blood or a common language, however, although the members of a spiritually distinct race may indeed speak the same language or have the same blood coursing through their veins (see Lott, 1992–93; Gooding-Williams, 1996 and 2009; and Sundstrom, 2003). Du Bois’s definition asserts that each spiritually distinct race is, as such, constitutively constructed by the historical and social factors the definition specifies as making a race a race.\nIt has not escaped notice that the list of historical and social factors that Du Bois identifies as causally constructing (as explaining) the existence and cohesiveness of spiritually distinct races—common histories, laws, religions, habits of thought, and conscious strivings—echoes the list of factors he identifies as constitutively constructing (as defining) a group of human beings as a spiritually distinct race—common history, traditions, impulses, and strivings (see Gooding-Williams, 2009, 51). To be sure, the lists are not identical. Still, we can reasonably assume that Du Bois means them to capture the same content, supposing that the traditions and impulses indicated in the second list include legal and religious traditions as well as persistent habits of thought. Du Bois holds not only that historical and social factors constitutively and causally construct spiritually distinct races, but, likewise, that the same kinds of historical and social factors constitutively and causally construct spiritually distinct races.\nWhat, then, is a Negro? To be a Negro, Du Bois replies, is 1) to be a member of one of three biologically distinct races, and 2) to be a member of one of eight constitutively and causally constructed spiritually distinct races. The Negro is spiritually distinguished from other spiritually distinct races by its distinctive message, the content of which, Du Bois argues, is not yet fully articulated (1897, 55–56).\n2.2.3 Debating Du Bois’s Explanation and Definition of Race\nContemporary philosophers have devoted considerable attention to Du Bois’s explanation and definition of race in “The Conservation of Races;” indeed, they have given more attention to Du Bois’s definition than to his treatment of any other philosophical issue. Nearly all that attention can be traced to Kwame Anthony Appiah’s engagement with Du Bois in “The Uncompleted Argument: Du Bois and the Illusion of Race” (Appiah, 1985), an expanded version of which Appiah published as the second chapter (“Illusions of Race”) of In My Father’s House (Appiah, 1992).\nAppiah’s critique of Du Bois (see Appiah, 1985 and Appiah, 1992) argues for three, key claims: 1) that Du Bois’s definition of race fails to state criteria that serve to individuate his eight, spiritually distinct races; 2) that, notwithstanding Du Bois’s intention to conceptualize race in socio-historical terms, the criteria he in fact uses to individuate spiritually distinct races comprise a physical, biological component—specifically, the idea of a common ancestry; and 3) that, notwithstanding his ongoing, post-“Conservation” efforts to substitute “a sociohistorical conception of race for the biological one,” the logic of his argument “leads naturally to the final repudiation of race as a term of difference” (Appiah, 1985, 34–35). Appiah endorses this conclusion, stating that “[t]he truth is that there are no races,” and that “the notion [of race] that Du Bois required, and that underlies the most hateful racisms of the modern era, refers to nothing in the world at all” (Appiah, 1992, 45).\nFor the most part, philosophical criticism of Appiah’s reading of Du Bois has targeted his analysis of Du Bois’s definition and his antirealism about race. In an early response to Appiah, Lucius Outlaw (1996, 28) argues that Du Bois’s definition of race is the articulation of a cluster concept, and not, as Appiah presumes, the statement of a set of conditions individually necessary and jointly sufficient to constitute a group of people as a race. In addition, Outlaw (1996, 21–22, 28) defends, and attributes to Du Bois, a version of racial realism, according to which biological ancestry and physical characteristics play a role in defining race.\nOther critics of Appiah’s reading of Du Bois have been less inclined than Outlaw to defend or to attribute to Du Bois a definition of race involving biological characteristics; rather they have tended to argue that, Appiah’s arguments to the contrary, Du Bois succeeded in advancing a plausible, non-biological, socio-historical definition of race. Paul Taylor (2000), for example, takes issue with Appiah’s claim that Du Bois’s appeal to “common history” as a criterion of individuation is circular, arguing that Appiah misconstrues Du Bois’s understanding of what it means for two individuals to have a history in common. Ronald Sundstrom (2003) also defends Du Bois’s socio-historical definition, arguing that, on a metaphysical pluralist reading, it can do the work of individuation that Appiah says it cannot do. For Taylor and Sundstrom, Du Bois was a racial realist who cogently defended the thesis that race is a social kind.\nMore recently, Chike Jeffers and Robert Bernasconi have productively re-oriented the philosophical discussion of “Conservation” away from debates stemming from Appiah’s interpretation of the essay. On Bernasconi’s account, these debates have tended to anachronism, and so tended to overlook the context-specific intentions animating Du Bois’s essay. In Jeffers’s view, the Appiah-inspired debates have missed a key distinction shaping Du Bois’s social constructionism.\nAccording to Bernasconi, recent philosophical discussions of Du Bois’s explanation and definition of race “have tended to distort its meaning by imposing an alien question on it” (2009, 519). Rather than read “The Conservation of Races” in light of contemporary arguments about racial eliminativism (about whether, in Appiah’s words, race should be repudiated as a term of difference) and the proper referent of the concept of race, Bernasconi places Du Bois’s essay in its immediate political and historical setting. Specifically, he emphasizes Du Bois’s engagements with the thought of Edward Wilmot Blyden, Alexander Crummell and Frederick Douglass and argues that the intended point of the essay was “to give hope to blacks at a time when scientists were questioning their future on the basis of suspicions about the impact of race mixing on their capacity to survive the struggle for existence” (2009, 536). With Bernasconi’s intervention, debate about Du Bois’s 1897 essay has turned to the metaphilosophical question of the relative value of anachronistic (presentist) and antiquarian (historicist) approaches to the study of the history of African American philosophy (see, e.g., Taylor, 2013 and Gooding-Williams, 2017).\nAccording to Jeffers (2013), the Appiah-inspired discussion of Du Bois has ignored the distinction Du Bois draws between political and cultural versions of the thesis that race is constitutively constructed. The political version of the thesis, which Du Bois rejects, Jeffers argues, holds that “‘racialized subordination’…constitutes its [race’s] very existence” (2013, 413). The cultural version, which Du Bois endorses, Jeffers argues, holds that the cultural factors mentioned in Du Bois’s definition (traditions, ideals of life, and so on) constitutively construct races as “distinct cultures” (2013, 411). Jeffers describes the cultural version of socio-historical constructionism that he attributes to Du Bois as Du Bois’s “cultural theory of race.”\nJeffers advances criticisms of Du Bois’s definition of race and, unlike most other philosopher commentators, of his causal explanation of the existence of spiritually and culturally distinct races. Regarding the latter, he questions the reliability of Du Bois’s general, historical account of the genesis of the social factors to which Du Bois attributes the existence of these races (Jeffers, 2013, 417). Regarding the former, he adduces an important conceptual point: namely, that Du Bois neglects to justify the assumption that the historical and social facts that define and distinguish the spiritually distinct groups that the historian and the sociologist identify as races should be thought to constitute (constitutively to construct) those groups as races. Perhaps they serve simply to constitute them as cultural entities, or, as Du Bois himself sometimes writes, as nations (Jeffers, 2013, 416). Absent that assumption, neither the historian nor the sociologist is entitled to identify the clearly defined, spiritually distinct groups he or she observes as races. And, absent that assumption, Du Bois is hardly entitled to present the definition that he bases on what the historian and the sociologist observe as answering the question, “What, then, is a race?”\nNotwithstanding his criticisms of Du Bois, Jeffers, following Outlaw (1996), endorses and defends Du Bois’s “strong commitment to the preservation and cultivation of black cultural difference” (Jeffers, 2013, 419). Jeffers has also shown that Du Bois maintains that commitment throughout his intellectual career (Jeffers, 2017).\n2.2.4 Rethinking Race\nPhilosophers interested in Du Bois’s thinking about race in writings he essayed after the publication of “The Conservation of Races” have tended to focus on Dusk of Dawn (1940). In this connection, both Paul Taylor (2000, 2004a, 2004b, and 2014) and Robert Gooding-Williams (2014) have elaborated detailed accounts of the notion of race that Du Bois sketches in the book he subtitled “An Essay Toward an Autobiography of a Race Concept.” In a related vein, Joel Olson (2004), Shannon Sullivan (2006), and Terrance Macmullen (2009) have examined Du Bois’s conceptualization of whiteness, giving particular attention to Dusk of Dawn but also to Du Bois’s earlier works. Olson reads Dusk of Dawn as advancing an argument Du Bois initiates in Black Reconstruction (1935). Sullivan and Macmullen read it as advancing an argument Du Bois initiates in “The Souls of White Folk” (see Darkwater (1920)).\n18.104.22.168 Riding Jim Crow in Georgia\nIn chapter 6 of Dusk of Dawn, entitled “The White World,” Du Bois imagines a dialogue between himself and a fictional interlocutor, Roger Van Dieman. Near the conclusion of the exchange, Du Bois says that “[r]ace is a cultural, sometimes an historical fact,” to which Van Dieman responds “But what is this group [the black race] and how do you differentiate it” (1940, 77). Du Bois rejoins his interlocutor, remarking that he recognizes “it [the black race] quite easily and with full legal sanction; the black man is a person who must ride Jim Crow in Georgia” (1940, 77).\nHere, Du Bois seems to reject biological concepts of race, and while he asserts that race is a cultural and sometimes an historical fact, his reference to the Jim Crow car suggests that he is no longer conceptualizing the Negro or any race as a group united by a distinct spiritual message. But if the cultural and sometimes historical fact of race is neither a biological nor a spiritual fact, what sort of fact is it?\nOn Taylor’s account, Du Bois means to answer this question by proposing that race is an institutional fact. Following John Searle (1995), Taylor understands institutional facts, like marriage and money, to be ontologically subjective and epistemologically objective (2000, 110; 2004a, 109; 2004b, 91). Realizing that “collective intentionality can bring certain facts into being” (2000, 110), Taylor’s Du Bois, like Searle, understood race to be constitutively constituted by human mental states (2004, 109).\n22.214.171.124 Du Bois, Genealogy, Race\nGooding-Williams interprets Dusk of Dawn as defending a genealogical concept of race. Taking Du Bois’s subtitle as indicative of his larger philosophical aims, he argues that Du Bois’s essay toward the autobiography of a race concept is a mode of conceptual analysis that historicizes the concept of race. Due to the affinity of Du Bois’s philosophical strategy to Friedrich Nietzsche’s approach to the analysis of concepts, Gooding-Williams describes that strategy as “genealogical.”\nNietzsche thought that making sense of the concept of punishment must be a matter of unpacking the dense, synthesis of meanings (purposes, functions) that, over time, have been willfully interpreted into and forcibly imposed on specific procedures for inflicting harm (Nietzsche, 1998, 50–54). More generally, he understood that conceptual analysis can take the form of genealogy—that is, of historical inquiry that separates the distinct meanings that have been joined together and even conflated through episode after episode of reinterpreting one and the same, more or less stable set of phenomena (procedures, complexes of habits, feeling, ways of perceiving, and so forth). In sum, Nietzsche held that historically formed concepts, like our notion of punishment, “are like ropes held together by the intertwining of strands, rather than by a single strand running through the whole thing” (Clark, 1994, 22). To analyze such concepts, he argued, “is not to find necessary and sufficient conditions for their use but to disentangle the various strands that have become so tightly woven together by the process of historical development that they seem inseparable” (Clark, 1994, 22)\nOn Gooding-Williams’s account, Du Bois 1) treats differences in the color of men as the more or less stable set of phenomena undergirding the concept of race, and 2) characterizes the concept of race as an intricate web of manifold and often conflicting interpretations of those differences formed over the course of his lifetime. Autobiography, a narrative form of historical inquiry, is the vehicle through which Du Bois genealogically analyzes that web of interpretations, for to reconstruct the story of his life is, in his view, to disentangle these interpretations, one from the other, in order to show that and how they have been exemplified in his life (Gooding-Williams, 2014, 166–167).\nThus, Du Bois worries that what he has called a “race concept” is not, strictly speaking, a concept, for he sees that it is not the sort of concept that can be defined by specifying a set of non-contradictory and hence logically coherent conditions for its proper application. Contradiction can inhabit the race concept, because Du Bois, like Nietzsche, allows that historically formed concepts may comprise discordant interpretations of the meaning of one and the same set of phenomena. The race concept is “illogical,” but is not for that reason without the efficacy characteristic of “forces,” “facts,” and “tendencies” (Du Bois, 1940, 67). Indeed, the efficacy of the concept is such that, internal inconsistencies notwithstanding, it has dominated Du Bois’s life. Du Bois’s exemplification of the race concept is his subjection to it. Reminiscent, again, of Nietzsche, he holds that historically formed concepts can function as mechanisms of power and control (Gooding-Williams, 2014, 167).\n126.96.36.199 The Power and Moral Psychology of Whiteness\nAccording to Joel Olson (2004), Du Bois’s understanding of whiteness belongs to the political theory of race he begins to sketch in Black Reconstruction. Specifically, Du Bois conceptualizes whiteness as a privileged position of social standing that has 1) afforded white workers a public and psychological wage compensating them for their low economic wages; and 2) formed the basis of a cross-class, political alliance uniting white workers and capitalists against black workers (black slaves included). More generally, he maintains that whiteness has historically functioned as a mechanism of power for recruiting white workers to police and reinforce the economic exploitation of black workers. On Olson’s account, Du Bois explains the “splendid failure” of Reconstruction and the genesis of the American racial order through his analysis of the cross-class political alliance of white workers and capitalists (Olson, 16, 30).\nIn Dusk of Dawn, Du Bois further develops his understanding of whiteness by interpreting racial oppression as, in Olson’s words, “a political problem of dark and white worlds arrayed against each other, with the white world determined to subordinate the dark one” (Olson, 22). Placing the conceptual opposition between white and dark (or non-white) worlds at the center of his analysis, Du Bois especially emphasizes the role whiteness plays in legitimizing the “domination of white Europe over black Africa and yellow Asia” (Du Bois, 1940, 48; see, also, Du Bois, 1940, 85–87; and Olson 26, 155, fn.60).\n“The Souls of White Folk” can be read as Du Bois’s central contribution to the moral psychology of white supremacy; that is, as his account of the affective, motivational, and cognitive dispositions that constitute white supremacism as a morally vicious character trait—including, e.g., the dispositions passionately to hate black folk; to slander and murder black folk; and to believe that white folk are inherently better than black folk. In “The White World” chapter of Dusk of Dawn, Du Bois complicates this earlier psychological portrait of the white supremacist, stressing the deeply ingrained persistence of her or his racist behavior. Du Bois argues, for example, that “the present attitude and action of the white world…is a matter of conditioned reflexes; of long followed habits, customs and folkways; of subconscious trains of reasoning and unconscious nervous reflexes” (Du Bois, 1940, 87). Productively building on Du Bois’s moral psychology, Shannon Sullivan (2006) and Terrance Macmullen (2009) have recently brought Du Bois into conversation with John Dewey to develop pragmatist, habit-centered accounts of the workings of white privilege.\n3. The Science of Human Action and Social Reform\nIn “A Program for a Sociological Society” (ca. 1897), an early essay belonging to the same period as “The Study of the Negro Problems” and “The Conservation of Races,” Du Bois places the emergence of the science of sociology in historical perspective. Prior to the industrial revolution, he argues, there was but one science that studied the phenomenon of human action: namely, political economy. Political economy focused on the production, distribution, and exchange of goods under stable social conditions, but gave no attention to the intensification of problems of crime, disease, poverty, prostitution, and ignorance that came with “the new concentration of industrys [sic], crowded into centers of population.” Sociology addresses these problems, demanding a “wider inquiry into the causes and scope of human action.” More generally, “[s]ociology is…the name given to that vast field of inquiry into human action as manifested in modern organized life.”\nBut what is the point of sociological inquiry—that is, of a sociological science of human action? Du Bois distinguishes between the immediate and the mediate aims of scientific inquiry; that is, between the aims of science itself and the uses of scientific results by “merchants, physicians, men of letters, and philanthropists”—indeed, by “all men” (Du Bois 1897, 89; see also Du Bois, ca.1897, 1–10). For Du Bois, the immediate aim of science is knowledge; the mediate aims may vary, but social reform is the mediate aim upon which Du Bois focuses throughout his career (see Green and Driver, 312–313; Lewis, 1993, 225–26; Reed, 47; and, especially, Bright, 5–7). But how can scientific knowledge advance social reform? Du Bois sketches at least three distinct answers to this question, each of which corresponds to a different conception of the object of social scientific knowledge. Knowledge of social laws and regularities can help the reformer to settle on effective plans of action; knowledge of the scope and limits of chance can help her to hedge her bets—that is, to guard against the possibility that her plans of action will fail; finally, knowledge of moral facts can help the reformer to caution her fellow citizens against the disaster and sorrow that await them should they persist in an immoral course of action.\n3.1 Social Laws and Regularities\nIn an early statement (Du Bois, ca. 1897), Du Bois maintains that the organization of modern society is a function of social laws and regularities that sociology identifies through detailed, statistical research that “generalizes[s]” a “mass of facts,” showing how various social phenomena, including, e.g., the “degree of poverty, the prevalence of suicide, [and] the extent and kinds of crime,” tend “to a certain rhythm and regularity which we call the social group” (ca. 1897, 4). Knowledge of these social rhythms, regularities and, sometimes, laws (sociology studies “human action which by its regularity gives evidence of the presence of laws”) is the “first step” in modern social reform (ca. 1897, 3, 8). Such knowledge can contribute to social reform, Du Bois’s examples suggest, for it enables the reformer to explain causally the conditions she wishes to transform and rationally to chart plans to alter those conditions: e.g., the death rate of children in the slums, the treatment of prisoners, and pauperism (ca. 1897, 9–11). Such knowledge, presumably, empowers Du Bois in his capacity as a social reformer to explain the existence of the Negro problem and rationally to identify means to eradicate the Negro problem (see 2.1 above and 4.1.1 below).\n3.2 The Scope and Limits of Chance\nIn “Sociology Hesitant” (ca. 1905), perhaps his most theoretically rich contribution to the philosophy of the human sciences, Du Bois takes issue with Comte’s and Spencer’s collectivist holism—the thesis that society is a concrete whole (for Du Bois, a “mystical whole”) formed of discrete units—and he again defends the view that society comprises the “deeds of men,” as well as the “law, rule, and rythm” [sic] governing those deeds (ca. 1905, 274). For Du Bois, sociology is the science of human action, not the science of society as such, or the science of society as a whole.\nWhy, Du Bois asks, did Comte “hesitate so strangely” before the prospect of treating human action as the proper object of sociological inquiry? The answer, Du Bois claims, is the “Great Assumption…that in the deeds of men there lies along with rhythm and rule…something incalculable”—an assumption in light of which the prospect of launching a science that “would discover and formulate the exact laws of human action…seemed to be and was preposterous” (ca. 1905, 274). Comte wavered before what Du Bois calls “Paradox:” on one hand, “The evident rhythm of human action;” on the other, “The evident incalculability of human action” (ca. 1905, 275). Where Comte wavers, however, Du Bois sallies forth, writing “[w]hy not…flatly face the Paradox? frankly state the Hypothesis of Law and the Assumption of Chance and seek to determine by study and measurement the limits of each” (ca. 1905, 276).\nHuman conduct is subject to the “primary” rhythms of physical law, as well as to the “secondary” rhythms of social regularities; social regularities exhibit “nearly” the same uniformity as physical law, and they are also “liable to stoppage and change” (ca. 1905, 278). Aspiring to unite the Geisteswissenschaften and the Naturwissenschaften—“the science of man and physical science”—Du Bois characterizes sociology as “assuming the data of physics and studying within these that realm where determinate force is acted on by human wills, by indeterminate force” (ca. 1905, 277–278).\nPhysical laws and social regularities alike limit the scope of chance, which is to say that they limit the scope of “indeterminate” force, or “undetermined” choice, or, as Du Bois likewise puts the point, of “free” and “inexplicable” will (ca. 1905, 276–278). In presupposing chance, sociology presupposes free will. Sociology’s attempt to measure chance and free will is its attempt to measure the degree to which physical and social regularities limit and constrain the range of choice and action that is “undetermined by and independent of actions gone before”(ca. 1905, 278).\nSome forty years after Du Bois wrote “Sociology Hesitant,” he appears to allude to the earlier, then unpublished essay; indeed, he reflects at length on the argument of the essay, suggesting that it marked the beginning of a shift in his “whole attitude towards the social sciences” (1944, 56):\nThen, too, for what Law was I searching? In accord with what unchangeable scientific law was the world of interracial discord around me working? I fell back upon my Royce and James and deserted Schmoller and Weber. I saw the action of physical law in the actions of men; but I saw more than that: I saw rhythms and tendencies; coincidence and probabilities; and I saw that, which for want of another word, I must in accord with strict tenets of Science, call Chance. I went forward to build a sociology, which I conceived as the attempt to measure the element of Chance in human conduct. This was the Jamesian pragmatism, applied not simply to ethics, but to all human action, beyond what seemed to me, increasingly, the distinct limits of physical law.\nMy work assumed from now on a certain tingling challenge of risk; what the “Captain of Industry” of that day was experiencing in “kick,” from money changing, railway consolidation and corporation floating, I was, in what appeared to me on a large scale, essaying in the relations of men of daily life (1944, 57–58).\nDu Bois’s references to Weber, Schmoller, Royce, James, and Jamesian pragmatism tie his earlier critique of Comte to an engagement with what James dubbed “the dilemma of determinism” (James, 1884). Weber was methodologically agnostic with regard to the dispute between metaphysical determinists and indeterminists, arguing that neither position entailed consequences bearing on the research practices of the historical and cultural sciences, and taking Schmoller to task for his profession of faith in metaphysical determinism (see Weber, 1905a, 197–196, 278; Ringer, 1997, 57–58, 91). Thus, Du Bois breaks with both his German teachers in insisting that chance—again, incalculable actions (and choices) undetermined by and independent of actions gone before—exists in the world and in explicitly endorsing “the assumption of chance” as a principle of sociological method. Du Bois’s contention that the individual is free to the extent that her choices escape explanation in terms of physical and social laws and regularities echoes Royce’s argument that, because “the individual as such is never the mere result of law,” no causal explanation can “predetermine” what she “uniquely wills” (Royce, 1899, 467–468). Du Bois misleads, however, when he retrospectively suggests that the argument of “Sociology Hesitant” aligned him with James.\nTo be sure, Du Bois’s language and analysis owe a debt to James’s “The Dilemma of Determinism” (1884) and, in particular, to James’s conceptualization of the will’s independence (its ability to choose courses of action not fixed “by parts of the universe already laid down” (1884, 150)) in terms of the concept of chance—a debt Du Bois acknowledges when he describes his view as “Jamesian pragmatism.” James explains the ethical implications of his indeterminism when he takes issue with Schopenhauer, “who enforces his determinism by the argument that with a given fixed character only one reaction is possible under given circumstances” (1879, 13). Schopenhauer forgets, James argues, that “in these critical ethical moments, what consciously seems to be in question is the very complexion of the character” (1879, 13). As a sociologist, Du Bois’s purports to have applied Jamesian pragmatism beyond the sphere of ethics, to “all human action,” but it is precisely here that he breaks with James; for notwithstanding his defense of indeterminism, James is skeptical of the possibility of measuring the degree to which the will is free (James, 1890, 572). In addition, James insists that the science of psychology must methodologically reject the assumption of chance. Psychology “abstracts from free-will without necessarily denying its existence” (James, 1892, 457).\nDu Bois was no less interested in determining (again, “by study and measurement”) the limits of law than he was in determining the limits of chance. Law, he believed, marked the limit of chance, and chance, he believed, marked the limit of law. Knowledge of social laws and regularities can contribute to social reform by enabling the social reformer causally to explain social problems and rationally to chart plans to solve those problems. Knowledge of the element of chance—or, more exactly, of the scope and limits of chance in organized, modern social life—can contribute to social reform by enabling the reformer to gauge the extent to which implementing his ideas would entail experimenting with (“essaying”) plans of action that, due to the play of chance, carry a significant risk of failure—plans that he could not confidently endorse, despite his knowledge of the social laws and regularities shaping modern social life. Just as knowledge of the scope and limits of chance could provide the “Captain of Industry” who speculates in currency and trades in floated, corporate stock a reason to modify his investment decisions, so too could it provide the reformer a reason to modify his plans of action and similarly to meet the “tingling challenge of risk.”\n3.3 Historical Inquiry and Moral Knowledge\nIn “The Propaganda of History,” the final chapter of Black Reconstruction (1935), Du Bois maintains that “scientific” historiography—that is, historiography that “set[s] down” the record of “human action” with “accuracy and faithfulness of detail”—can serve the ends of social reform; it can be used, he writes, “as a measuring rod and guidepost for the future of nations” (Du Bois, 1935, 584). Du Bois’s argument for this claim proceeds through a defense of four theses: 1) that the study of history, so far as it belongs to the science of human action, cannot model itself exclusively on the natural sciences; 2) that accuracy in chronicling and explaining human action requires that the historian rely on the method of interpretive understanding—what Max Weber called Verstehen; 3) that, contra Weber, accurate, empirically sound historiography reports moral knowledge; and 4) that the knowledge of morality and moral responsibility yielded by the scientific study of human history (by accurate historiography) can contribute to social reform, for the philosopher and the prophet can use that knowledge to guide mankind in the solution of social problems (1935, 591).\nDu Bois criticizes histories that discuss slavery with moral “impartially,” depicting America as helpless and the south as blameless, while explaining the difference in development, North and South, as “a sort of working out of cosmic social and economic law” (1935, 585). An example of this sort of history is Charles and Mary Beard’s The Rise of American Civilization, which treats the clash between north and south as if it were a clash between winds and waters. In the Beard’s “sweeping mechanistic interpretation” of history, Du Bois writes, “there is no room for the real plot of the story, for the clear mistake and guilt of rebuilding a new slavery of the working class in the midst of a fateful experiment in democracy; for the triumph of sheer moral courage and sacrifice in the abolition crusade; and for the hurt and struggle of degraded black millions in their fight for freedom and their attempt to enter democracy. Can all this be omitted and half suppressed in a treatise that calls itself scientific?” (1935, 585).\nAt issue here, again, as in “The Conservation of Races” and “Sociology Hesitant,” is the relation between the human sciences and the natural sciences. For the Du Bois of Black Reconstruction, historians who model their inquiry exclusively on the natural sciences (historians like the Beards) seek to identify the causal uniformities (“cosmic” laws) governing human events, which events they conceptualize by analogy to the behavior of the winds, waters and other forces of nature. The problem here, Du Bois believes, is not with the effort to identify the causal uniformities governing human events. Rather it is with the tendency in that effort to neglect the human meaning of human events, and thus to treat those events as inhuman, natural forces that lend themselves to a purely “mechanistic” explanation—by which Du Bois means explanation in terms that make no reference to the meanings that the human subjects who participate in those events attach to them.\nIf history is to be a science of human action and not to pretend to be a science of nature, then, Du Bois believes, it must take account of the subjective meanings of actions and events. Du Bois implies that the historian cannot truly tell the story of “the mightiest effort of the mightiest century” (the struggle of enslaved blacks to achieve democracy) without taking account of the “psychology” of the agents whose actions sustained that effort—for to take psychology into account is to take subjective meaning into account (1935, 586). More generally, Du Bois insists that the historian of slavery ask: “Just what did [slavery] mean to the owner and the owned”(1935, 585).\nTo understand slavery, knowing what it meant to the owned is no less important than knowing what it meant to the owners. In demanding that the historian of slavery attend to the slaves’ stories about slavery in order to know what slavery meant to the slaves, Du Bois presupposes the fundamental, methodological tenet that the historian’s primary charge is what Max Weber called Verstehen, or “interpretive understanding,” not mechanical explanation. According to Weber, the sciences of human action, including history and sociology, “speak of ‘action’ insofar as the acting individual attaches subjective meaning to his behavior—be it overt or covert” (1922, 38, 41). One of the aims of Verstehen, he argues, is rationally to make sense of the motivation prompting an action by placing that action “in an intelligible and more inclusive context of meaning”—as when, for example, we interpret a woodchopper’s chopping of wood as an act undertaken to secure a wage; or, alternatively, to provide a supply of firewood for the woodchopper’s use (1922, 42).\nDu Bois stresses the importance of interpretive understanding because he is committed to the view that moral judgment is a critical component of historiography. Thus, while Du Bois methodologically aligns himself with Weber in stressing the importance of interpretive understanding to the scientific study of history, he methodologically rejects Weber’s claim that “concern on the part of history to judge of historical actions as responsible before the conscience of history…would suspend its character as empirical science” (Weber, 1905b, 123).\nUnlike Weber, Du Bois is a moral realist who believes that historical inquiry can afford us knowledge of moral facts—knowledge, that is, of the proper distribution of moral responsibility and of the extent to which actions are right or wrong. But to obtain that knowledge, historians must understand human action in terms of subjective meanings, for they require some such understanding of human action to render intelligible their application of the vocabulary of moral evaluation—for Du Bois, a vocabulary that includes the language of “guilt,” of “moral courage and sacrifice,” and of “the degraded black millions.” Du Bois argues that a necessary condition of the possibility of acquiring knowledge of moral facts through the historian’s practice of the science of human action is a Verstehen-centered approach to that practice—or, more exactly, an approach that explains human actions in terms of subjects’ motives. Du Bois sketches a similar line of argument, five years later, in Dusk of Dawn (1940, 70).\nFor Du Bois, the function of the historian, “posing” as a scientist of human action, is “to make clear the facts…to know, as far as possible…the things that actually happened in the world” without regard to her personal desires and wishes (1935, 591). But the function of the philosopher and the prophet, he argues, is “to interpret these facts” —that is, to consider them in the perspective of our desire to guide mankind to undertake the social reforms needed to address social problems (1935, 591).\nA prophet, a Jeremiah, for example, might well adduce facts of moral wrongdoing and guilt to alert his fellow citizens that their actions risk God’s wrath. And a philosopher, a philosopher of history, for example, might adduce those facts in order to instruct them as to the meaning, writ large, of the plot that the historian has chronicled—precisely as Du Bois instructs his fellow citizens that the story of slavery and reconstruction he has chronicled (in his capacity as an historian) exhibits “the clear mistake and guilt” that characterizes the “plot” of Aristotelian tragedy (1935, 585, 595). In both cases, the point would be the same: namely, to use moral knowledge to warn one’s fellow citizens of the fateful consequences (God’s wrath, tragedy) that await them lest they refuse to heed the lessons of the past and change—reform—their ways.\n4. Political Philosophy\nDu Bois’s political philosophy belongs to the Afro-modern tradition of political thought, an impressively rich body of non-ideal political theory that is bound together by certain thematic preoccupations—e.g., the political and social organization of white supremacy, the nature and effects of racial ideology, and the possibilities of black emancipation— and that includes the writings of Ottabah Cugoano, David Walker, Edward Blyden, Martin Delany, Frederick Douglass, and Alexander Crummell (Gooding-Williams, 2009). Du Bois’s most famous book, The Souls of Black Folk (1903a), is his earliest contribution to that tradition. Du Bois’s subsequent contributions to political philosophy and political theory appear in several different places and have been variously taken up by contemporary scholars.\n4.1 Early Du Bois: The Period of The Souls of Black Folk\nSouls is Du Bois’s still influential answer to the question, “What kind of politics should African Americans conduct to counter white supremacy?” Historically rooted in the segregationist era of Jim Crow, Souls authority has reached well beyond its origins, so much so that its compelling ideas and arguments continue to be taken up by contemporary theorists of black politics.\n4.1.1 Uplift and Political Expressivism\nIn Souls, Du Bois contends that a politics fit to respond to the American, Jim Crow version of racial apartheid must satisfy two conditions. The first relates to Du Bois’s description of African Americans as “masses:” to wit, to his characterization of African Americans as an aggregate of uncultured, pre-modern slaves or former slaves. The second relates to his description of African Americans as a “folk:” that is, to his characterization of African Americans as a group united by a collectively shared ethos, or spirit.\nFor Du Bois, a politics suitable to counter Jim Crow had to uplift the black masses—to assimilate them to the constitutive norms of modernity—and to heed the ethos of the black folk. In short, it had to be a politics that embraced and promoted the core values of modern life while expressing the spiritual identity of the folk. Du Bois envisions black elites—the so-called “talented tenth” (1903b)—as deploying a politics of expressive modernization to uplift the black masses. Elite control of black politics can be authoritative and effective, he argues, only if it expresses a collective spirit that unites black people.\nThe young Du Bois’s political philosophy rests on the social philosophy he outlines in “The Conservation of Races” and “The Study of Negro Problems.” In arguing that talented tenth elites could enjoy political legitimacy and efficacy only if their actions expressed a distinctive message that spiritually distinguished the Negro from other spiritually distinct races and that united all African Americans, he presupposes his earlier answer to the question, “What is a Negro?” In arguing that talented tenth elites needed to attack racial prejudice and cultural backwardness alike in order to uplift and modernize the black masses, he presupposes his earlier, causal analysis of Negro problems (Gooding-Williams, 2009, chapter 1).\n4.1.2 The Du Bois-Washington Debate\nDu Bois’s extended critique of Booker T. Washington’s political thought (see Souls, chapter 3) likewise presupposes his earlier, causal analysis of Negro problems. Du Bois’s argument immediately drew attention, for when Du Bois published Souls Washington had securely established himself “as an educational statesman, the primary spokesman of black America, and the leader of a large network of disciples—the ‘Tuskegee Machine’—who edited newspapers, owned businesses, and directed schools modeled on Tuskegee”(Blight and Gooding-Williams, 1997, 16).\nWashington held that if blacks endeavored to help themselves—to discipline their bodies, to cultivate entrepreneurial virtues (e.g. thrift, spirit of industry, and economy), and to acquire the knowledge of a trade—they would thrive in the capitalist market and, due to their business success, bring an end to Jim Crow and win the franchise. In short, he believed that black self-help efforts were sufficient to engender business success, and that business success was sufficient to persuade whites to extend to blacks the civil and political rights they required for incorporation into the mainstream of American society (Washington, 1901).\nContra Washington, Du Bois argued that self-help efforts, while necessary for black social progress, were not sufficient. Assuming that both racial prejudice and cultural backwardness cause Negro problems, Du Bois claims that a self-help politics that attends to the backwardness of the Negro group itself without attacking racial prejudice is doomed to fail. Washington had argued that there was no need to attack prejudice for the present, because self-help efforts that contended with entrepreneurial-economic backwardness (for Du Bois, a form of cultural backwardness) would suffice to defeat it. Du Bois rejects this argument on the grounds that the persistent, prejudice-sustained denial of rights to blacks undermines their self-help efforts and prospects for business success. Washington’s program amounts to a partial, one-sided attack on the Negro problems. In Du Bois’s view, black uplift and social progress required that black political elites attack both prongs of the Negro problem—racial prejudice no less than backwardness. It also required institutions of higher learning to train these elites. Thus, Du Bois takes Washington to task for promoting an educational philosophy that emphasized vocational education at the expense of higher, liberal arts education (Du Bois, 1903a, chapter 3).\n4.1.3 Political Leadership and Double-Consciousness\nIn Souls, Du Bois sketches a biographical portrait of his mentor, Alexander Crummell, and a fictional portrait of a tragic hero, John Jones, to show how double-consciousness can compromise black elite political leadership. Specifically, Du Bois represents double-consciousness as a form of alienation that estranges black elites from their followers, thereby eroding their ability to promote ends expressing the collectively shared spirit of the black folk and undermining their legitimacy and efficacy as leaders (Du Bois, 1903a, chapters 1, 12–13; Gooding-Williams, 2009, chapter 3).\n4.1.4 The Post-Jim Crow Inheritance of the Early Du Bois\nThe early Du Bois’s defense of a black elite-led politics of expressive modernization has exerted considerable influence on post-Jim Crow political philosophical appraisals of black American politics. Indeed, it is all but impossible to grasp the point of those appraisals without taking account of their engagements, both explicit and implicit, with key elements of Du Bois’s early political thought. For extended discussion of the issues central to the post-Jim Crow inheritance of Du Bois’s early political thought, see, especially, Reed, 1999 and Gooding-Williams, 2009, chapter 6.\n4.2 Du Bois’s Political Thought After The Souls of Black Folk\nAs Lawrie Balfour has argued, Du Bois wrote “prolifically” on a broad array of topics, so that his writings can usefully be read as an extended series of essayistic, experimental efforts to address the various issues that engaged him (2011, 17–18). The reception of Du Bois by contemporary political theorists attests to the extraordinary, topical scope of his political thought, especially as it evolved after the publication of Souls.\n4.2.1 Du Bois’s Elitism\nIn several post-Souls writings, Du Bois returns to the theme of black political leadership. In Dusk of Dawn, for example, he reaffirms his belief that “the Talented Tenth” should determine “the present field and demand for racial action and the method by which the masses may be guided along this line” (1940, 159). And several years later, after critically reflecting on his earlier thinking about group leadership, he proposes a “new idea for a Talented Tenth” (1948, 168). Whether or not Du Bois ultimately rejected his earlier conception of elite black leadership (Du Bois, 1903b) is an issue of scholarly dispute. Joy James holds that Du Bois eventually repudiates the idea of a black intelligentsia vanguard (James, 1997). Cornel West contends that Du Bois’s later revisions of his concept of the talented tenth were “piecemeal” (West, 1996, 71). Adolph Reed, by way of a meticulous reading of Du Bois’s later writings and speeches, argues that Du Bois advanced an elite-centered notion of black politics throughout his intellectual and activist career (Reed, 1997). Tommie Shelby and Paul Taylor provide especially nuanced reconstructions of Du Bois’s evolving understanding of black political leadership (Shelby, 2007, chapter 2; Taylor, 2010, 907–910.).\n4.2.2 Marx, Du Bois, and Black Radicalism\nAn important and still underappreciated strand of Du Bois’s post-Souls political thought is his engagement with Marxist social and political theory. A key text, here, is Black Reconstruction (1935), Du Bois’s monumental critique of the Dunning School’s interpretation of Reconstruction. Like Joel Olson (2004; see 188.8.131.52 above), Cedric Robinson (1983) and Anthony Bogues (2003) have argued that Black Reconstruction should be read as historical and political theory, not simply as revisionist historiography. On Robinson’s reading, Du Bois developed “a theory of history, which by its emphasis on mass action was both a critique of the ideologies of American socialist movements and a revision of Marx’s theory of revolution and class struggle” (Robinson, 277). Bogues agrees that Du Bois breaks with Marx and Marxist orthodoxy, and adds that, like other black radical theorists, Du Bois reorients the radical critique of modernity away from “issues of political obligation, sovereign self and citizenship…to questions of domination, oppression, and politics as a practice of freedom” (Bogues, 93). Building on Du Bois and on Robinson’s engagement with Du Bois, the historian, Walter Johnson (2016) has more recently argued that the history of slavery and racial capitalism provides a standpoint from which “to rethink our idea of justice” (Johnson, 29).\n4.2.3 Feminist Theory and Du Bois\nFeminist theorists’ appraisals of Du Bois’s political thought have been mixed, ranging from criticisms of his masculinist failure to regard black women as intellectuals and race leaders (e.g. Carby, 1998 and James, 1997) to praise for his advocacy of women’s equality and his contributions to our understanding of the oppression of black women (e.g., James, 1997 and Griffin, 2000).\nFeminist theorists’ commentary on Du Bois’s political thought has tended to concentrate on chapter 7 of Darkwater (1920), “The Damnation of Women.” Women are damned, Du Bois proposes, for “only at the sacrifice of intelligence and the chance to do their best work can the majority of women bear children” (1920, 78–79). While Farah Griffin interprets “Damnation” in the perspective of a still persistent “politics of protection” that threatens the autonomy of black women, arguing that Du Bois recognized the limits of that politics (2000, 34–36), Lawrie Balfour reads the essay as contributing to a “feminist theory of citizenship” (2011, 99–100). Taking issue with Balfour, Shatema Threadcraft argues that “Damnation” reprises and elaborates Souls’ masculinist treatment of manliness as an appropriate norm of citizenship (2017, 92–94).\nConsidering Du Bois in light of black feminist and more general forms of contemporary intersectionality theory (which considers intersections between race, gender and class), Ange-Marie Hancock examines Souls, Darkwater, and Dusk of Dawn to identify insights in Du Bois’s thinking that link “his political theory with that of today’s intersectionality theorists” (2005, 82). It would be anachronistic to describe Du Bois as an intersectionality theorist, Hancock admits, but she still claims that Du Bois anticipates recent intersectionality theory in arguing “that more than one category of difference should be attacked simultaneously, and, more importantly, that the structures of society operate such that these categories mutually reinforce social stratification for its least empowered inhabitants” (2005, 79).\n4.2.4 Democratic Theory and Du Bois\nHow did Du Bois conceptualize democracy?\nDu Bois mentions democracy just once in Souls, where he states that the “soul of democracy and the safeguard of modern society” is “[h]onest and earnest criticism from those whose interests are most nearly touched,—criticism of writers by readers, of government by those governed, of leaders by those led” (1903a, 23). Du Bois defines democracy in terms of criticism when he attacks Booker T. Washington for “hushing criticism” (1903a, 23). In exploring the implications of Du Bois’s statement for the picture of black politics he defends in Souls, Gooding-Williams raises a question as to whether elite leadership of backwards, black masses not competent to criticize their leaders could both satisfy Du Bois’s definition of democracy and successfully promote an uplift agenda (Gooding-Williams, 2009, chapters 1 and 4.)\nDu Bois’s most thoroughgoing contribution to democratic theory is chapter 6 of Darkwater, “Of The Ruling of Men.” In that essay, Du Bois engages familiar, Tocquevillian worries about the tyranny of the majority; envisions democratic decision making in deliberative democratic terms; and defends not only a broadly inclusive form of political democracy, but the idea that modern industry should be subject to democratic decision making—in essence, the idea of democratic socialism. His argument for inclusiveness, for extending the right of democratic participation to women and blacks, for example, is essentially epistemic: “only the sufferer knows his suffering and…no state can be strong which excludes from its expressed wisdom the knowledge possessed by mothers, wives, and daughters…The same arguments apply to other excluded groups” (1920, 69; see, also, Bright, 2017, 14–15).\nIn Black Reconstruction, no less than in “Of the Ruling of Men,” Du Bois characterizes democracy in economic as well as political terms; that is, as the legitimate transfer of political and economic power from the ruling classes to the working masses. Cornel West interprets Black Reconstruction as promoting a Deweyan notion of creative democracy (West, 1988). Gooding-Williams (1991) disputes that interpretation, arguing that it obscures the connotations of class struggle that attach to Du Bois’s account of black workers’ efforts to reconstruct democracy. In Color and Democracy, which Du Bois published just more than a decade after Black Reconstruction, he writes that “[m]ore important than political democracy is industrial democracy; that is, the voice which the actual worker, whether his work be manual or mental, has in the organization and conduct of industry” (1946, 300).\nThe ongoing importance of Du Bois’s contributions to democratic theory has been well established by the recent work of Lawrie Balfour and Tommie Shelby.\nIn her essays on Darkwater, Dusk of Dawn, and other writings, for example, Balfour subtly brings Du Bois’s political thought into conversation with the work of contemporary political theorists. To reorient democratic theory in dark times, Balfour argues, we would do well to think politically with Du Bois. To that end, she examines the political-theoretical ramifications of Du Bois’s literary choices; his use of history to highlight the implication of America’s slave past in its post-Civil Rights present; his depiction of African American lives as exemplary representatives of democratic possibility; and his globally expansive political imagination, which, Balfour argues, reveals the racial politics of recent defenses of cosmopolitanism and civic nationalism (Balfour, 2010, 2011).\nIn Shelby’s view, Du Bois took African-Americans to be the bearers of a world-historical mission to perfect the ideals of American democracy. Du Bois endorsed black political solidarity, Shelby argues, as a temporary and, possibly, long-term strategy for establishing a multiracial, culturally pluralist American polity that embodied those ideals. Shelby follows Du Bois in maintaining that black political solidarity in the pursuit of a racial justice that is consonant with American democratic and liberal ideals requires a motivational foundation that unites self-interest, moral principle, and racial identification (Shelby, 2007, 6–7, 67, 87).\n4.2.5 Freud, Du Bois, and the Long Siege\nIn chapter 1 of Dusk of Dawn, Du Bois describes his thought regarding the causes of the oppression of the darker races as evolving through three stages—roughly, from thinking that racial oppression was caused by ignorance; to thinking that it was caused by ignorance and ill-will; to thinking that it was caused by ignorance and ill-will and a conjunction of economic motives and unconscious, irrational acts and reactions. Corresponding to each stage, Du Bois tells us, was an increasingly complex account of the political strategies the darker races require to upend racial oppression. Where ignorance is the problem, science and education is needed to fight racial injustice; where ill-will is the issue, the black world must fight for its freedom, relying on truth, boycott, propaganda and mob frenzy as instruments of sudden and immediate assault. Where, finally, economic interest and/or unconscious, irrational motive sustain racial oppression, “not sudden assault but long siege was indicated; careful planning and subtle campaign with the education of growing generations and propaganda” (1940, 2–3).\nPrior to 1940, some consideration of each of these causes of oppression and related strategies of resistance is evident in Du Bois’s writings. Still, Dusk of Dawn is remarkable for the prominence it gives to the role of unconscious and irrational psychological forces in accounting for the existence and perpetuation of racial oppression. Du Bois attributes this new emphasis to the “new psychology” of the “Freudian era.” His “study of psychology under William James” had prepared him for the Freudian turn, he remarks, and its “meaning and implications…had begun slowly to penetrate his thought” (1940, 148).\nContemporary political theorists have, for the most part, tended to ignore Du Bois’s Freud-inspired account of racial oppression. An exception is Shannon Sullivan, for whom Du Bois suggests “a powerful psychoanalytic-pragmatist model for surveying the unconscious operations of white domination” (Sullivan, 2006, 23). A second exception is Ella Myers, who has begun to build on Du Bois’s arguments to reflect on the visceral and affective registers of antiblack racism (Myers, 2017). Robert Gooding-Williams (2011) has adapted Du Bois’s idea of a “long siege” against racial oppression—against what Du Bois also calls “the strongholds of color caste”—to a critical analysis of some recent discussions of racial politics (1940, 148).\n5. Philosophy of Art\nPaul Taylor has persuasively sketched a general framework for understanding Du Bois’s philosophy of art. According to Taylor, Du Bois endorses an expressivist picture of the world, the key to which “is a determination to think of things as determinate but provisional expressions of an evolving world.” On this view, “the world unfolds into new forms the way a seed unfolds into a tree…by clarifying, over time, what was inchoate and implicit: by actualizing in history what formerly existed only in potentia.” Considered in the perspective of Marx’s and Dewey’s revisions of Hegel’s expressivism, Taylor’s Du Bois envisions ethical life as a work-in-progress—that is, as an ongoing project of holistic self-cultivation, of individuals artistically forming themselves by creatively responding to the histories, languages, and economic structures that constrain them (Taylor, 2016, 91–93).\n5.1 High Art and Low Art\nDu Bois’s articulation of his commitment to the ideal of holistic self-cultivation is perhaps most explicit when, in amplifying his criticism of Booker T. Washington, he defends the importance of liberal arts education (Gooding-Williams, 2009, 133–139). Explicitly echoing Matthew Arnold, Du Bois advocated liberal arts education as a means to self-cultivation or, as he sometimes writes, self-development, through “getting to know…the best that has been said and thought in the world” (Arnold, 1869, 5). Self-development through the acquisition of culture is the purpose of the education elites require to uplift the masses. The Negro college, Du Bois writes, “must develop men…Above our modern socialism, and out of the worship of the mass, must persist that higher individualism which centres of culture protect; there must come a loftier respect for the sovereign human souls that seeks to know itself and the world about it; that seeks a freedom for expansion and self-development” (1903a, 52).\nFor the Du Bois of Souls, the art that sovereign souls appreciate is high art—or, in other words, art that shares with the sovereign souls that appreciate it the property of holistic self-development. In “The Sorrow Songs,” the final chapter of Souls, Du Bois represents the group spirit that unites black Americans as clarifying its distinctive message through the medium of the folk song. Considered in historical perspective, the musically embodied spirit of the black folk, as it actualizes itself through time, in folk song after folk song, acquires a spiritually comprehensive breadth that overcomes racial prejudice and provincialism. To these songs, which manifest a developing folk spirit and that constitute an evolving tradition of black musical art, Du Bois contrasts a “mass” of spiritually inert minstrel songs, gospel hymns and coon songs (1903a, 124). In essence, he argues that, no less than Wagner’s operas, which he admired, the spiritually-inspired black folk song belongs to the canon of high art from which the low arts of the minstrel song and the like are excluded.\nOn this view, Du Bois’s early political expressivism is of a piece with his broadly expressivist philosophy of art, for it asserts that, to be legitimate and effective, black political leaders must take their bearing not from the uninspired mass of popular song that the masses might enjoy, but from the spirit and spiritual message embodied in the black folk song (Gooding-Williams, 2009, 139–147).\n5.2 Art, Beauty, and Propaganda\nDu Bois’s essay, “Criteria of Negro Art” (1925), is his most important contribution to the philosophy of art. The essay is Du Bois’s clearest statement of his disagreement with the philosopher and Dean of the Harlem Renaissance, Alain Locke, about the relation between art and propaganda. Against Locke’s view that genius and talent “must choose art and put aside propaganda,” Du Bois held “that all art is propaganda and ever must be” (Locke, 1928, par. 1; Du Bois, 1926, par. 29). At issue in Du Bois’s “great debate” with Locke is the role of the arts “in creating respect for a people suffering from humiliation and self-loathing” (Harris, 15).\nDu Bois claims that artists rely on beauty to communicate truth and goodness (in all its aspects of justice, honor, and right)—in the first case to promote universal understanding, and in the second to gain sympathy and human interest. The “apostle of Beauty,” he writes, “thus becomes the apostle of truth and right not by choice but by inner and outer compulsion. Free he is, but his freedom is ever bounded by Truth and Justice” (par. 28).\nConsidering these claims in the perspective of Du Bois’s expressivism, Taylor plausibly interprets Du Bois as arguing that, because artists “are dialectically enmeshed in wider webs of meaning concerning the true and the just, and must create themselves as individuals by working out their orientation to these networks,” all art is propaganda. On this account, no work of art can reasonably claim to derive its content from “a distinct and inviolate domain of aesthetic value,” for all art derives its content from a public domain of ethico-political value to which the artist must creatively respond. The artist is at once outwardly and inwardly compelled by the webs of meaning that encumber her, for while these webs of meaning impose themselves from “without,” the artist suffers them as parameters constituting her “within” as a subject. The freedom that the apostle of truth and right can claim in relation to these parameters is akin to self-legislation—it is the freedom she enjoys in creatively responding to them, in working out her relationship to them and, in effect, making them her own (Taylor, 2016, 96–99).\nBy exercising her freedom, finally, by creating beautiful works of art that promote the ends of sympathy and universal understanding, the artist may undertake to widen the ethical and cognitive horizons of her intended addressees, and thus to expand their capacity for judgment. In writing a book like Souls, for example, Du Bois undertook to widen his white counterparts’ capacities to sympathize with and evaluate the suffering in the souls of black Americans (Rogers, 2012, 193–198).\nWhat is the nature of beauty such that it can achieve these ends through the communication of truth and goodness? Du Bois never states a clear answer to this question. But he offers clues to an answer in “Of Beauty and Death,” chapter 9 of Darkwater. In that essay, his most sustained reflection on the nature of beauty, Du Bois contrasts beauty to “ugliness and hate and ill…with all their contradiction and illogic;” beauty, he writes, “is fulfillment. It satisfies. It is always new and strange. It is the reasonable thing” (1920, 120). Perhaps Du Bois’s point is an expressivist one: that beauty satisfies by clarifying our ideas of truth (at once consistent and reasonable) and goodness (the opposite of hate and ill); that is, by embodying those ideas in novel and unsettling works of art.\n6. Intellectual History, History of Philosophy, and Du Bois\nWe conclude this entry by noting that an ongoing feature of scholarly debate about Du Bois is sometimes contentious disagreement as to his proper place in intellectual history and/or the history of philosophy. A brief survey of the variety of interpretive orientations that usefully have been brought to bear in appraising Du Bois as a philosopher, or as a thinker, suggests that, in studying his writings, we might do well to heed Nietzsche’s suggestion that the multiplication of perspectives can often enhance our knowledge of the subject matter under consideration (Nietzsche, 1887, 85).\nThe relevant categories tend to be geographic, racial, thematic, or some combination of the three. Du Bois’s philosophical books and essays have been read as contributions to American thought (Zamir, 1995) and to American political thought (Reed, 1997). More narrowly and more broadly, they have been read as statements of Afro-American exceptionalist thought (West, 1982); as key constituents of the black nationalist tradition (Moses, 1978); as important additions to the black natural law tradition (Lloyd, 2016); as a part of the history of African American prophetic political critique (Marshall, 2011); and as critical contributions to Africana and Afro-Modern thought (Gordon, 2008; Gooding-Williams, 2009). Intending to correct the tendency evident in these works to position Du Bois as an American, black American, Africana, and/or Afro-modern thinker, Appiah (2014) has highlighted the late 19th century, German intellectual milieu that shaped Du Bois’s thinking. Contra Appiah, Tommy Curry (2014) has argued that we lose sight of the philosophical substance of Du Bois’s thought if, like Appiah, we scant the influence of other African American writers on his thinking.\nAmong critics wishing to situate Du Bois within a well-defined, western philosophical tradition, the main tendencies have been to characterize Du Bois either as a pragmatist (see West, 1989, Taylor, 2004b, and Kahn, 2009) or as an Hegelian of sorts. Much of the literature following this second line of interpretation has considered Du Bois’s writings, and especially Souls, in the perspective of Hegel’s Phenomenology of Spirit (see, e.g., Gooding-Williams, 1987 and 1991; Zamir, 1995; and, most recently, Shaw, 2013). In this connection, Paul Taylor (2004b) has persuasively argued that we need not choose between an Hegelian Du Bois and a pragmatist Du Bois. More recently, Nahum Chandler has proposed to read Du Bois neither as an Hegelian, nor as a pragmatist, but in parallel to several of his European contemporaries, including Husserl, Weber, Durkheim, Boas and Freud (Chandler, 2014).\nTo be sure, it would be false to claim that all of the above-mentioned interpretive perspectives have yielded genuine insight and illumination. But more have than have not, a fact that primarily attests to the range, depth, and fecundity of Du Bois’s philosophical thought.\nBooks by Du Bois\n|1896||The Suppression of the African Slave Trade to the United States of America: 1638–1870, Oxford: Oxford University Press, 2007.|\n|1899||The Philadelphia Negro, Oxford: Oxford University Press, 2007.|\n|1903a||The Souls of Black Folk, Oxford: Oxford University Press, 2007.|\n|1909||John Brown, Oxford: Oxford University Press, 2007.|\n|1911||The Quest of the Silver Fleece, Oxford: Oxford University Press, 2007.|\n|1915||The Negro, Oxford: Oxford University Press, 2007.|\n|1920||Darkwater, Oxford: Oxford University Press, 2007.|\n|1924||The Gift of Black Folk, Oxford: Oxford University Press, 2007.|\n|1928||The Dark Princess, Oxford: Oxford University Press, 2007.|\n|1930||Africa, Its Geography, People, and Products and Africa—Its Place in Modern History, Oxford: Oxford University Press, 2007.|\n|1935||Black Reconstruction in America, Oxford: Oxford University Press, 2007.|\n|1939||Black Folk Then and Now, Oxford: Oxford University Press, 2007.|\n|1940||Dusk of Dawn, Oxford: Oxford University Press, 2007.|\n|1946||The World and Africa (1946) and Color and Democracy (1946), Oxford: Oxford University Press, 2007.|\n|1952||In Battle for Peace, Oxford: Oxford University Press, 2007.|\n|1957||The Ordeal of Mansart, Oxford: Oxford University Press, 2007.|\n|1959||Mansart Builds a School, Oxford: Oxford University Press, 2007.|\n|1961||Worlds of Color, Oxford: Oxford University Press, 2007.|\n|1968||The Autobiography of W.E.B. Du Bois, Oxford: Oxford University Press, 2007.|\nOther works by Du Bois referred to in the text\n|1897a||“The Conservation of Races” in Nahum Dimitri Chandler (ed.), The Problem of the Color Line At the Turn of the Twentieth Century: The Essential Early Essays, New York: Fordham University Press, 2015, pp. 51–65. Reprint of “The Conservation of Races,” Washington, D.C.: American Negro Academy, 1897.|\n|1897b||“Strivings of the Negro People,” in Nahum Dimitri Chandler (ed.), The Problem of the Color Line At the Turn of the Twentieth Century: The Essential Early Essays, New York: Fordham University Press, 2015, pp. 67–75. Reprint of “Strivings of the Negro People,” The Atlantic Monthly 80, no. 478 (August 1897): 194–198|\n|Ca. 1897||“A Program for a Sociological Society”, a speech given at Atlanta University to the First Sociological Club. [Available Online]|\n|1898||“The Study of the Negro Problems” in Nahum Dimitri Chandler (ed.), The Problem of the Color Line At the Turn of the Twentieth Century: The Essential Early Essays, New York: Fordham University Press, 2015, pp. 77–98. Reprint of “The Study of the Negro Problems,” Annals of the American Academy of Political and Social Science 11, no.1 (January 1898): 1–23.|\n|1903b||“The Talented Tenth” in Nahum Dimitri Chandler (ed.), The Problem of the Color Line At the Turn of the Twentieth Century: The Essential Early Essays, New York: Fordham University Press, 2015.|\n|Ca. 1905||“Sociology Hesitant” in Nahum Dimitri Chandler (ed.), The Problem of the Color Line At the Turn of the Twentieth Century: The Essential Early Essays, New York: Fordham University Press, 2015.|\n|1926||“Criteria of Negro Art,” The Crisis, Vol. 32, October 1926: 290–297, http://www.webdubois.org/dbCriteriaNArt.html|\n|1944||“My Evolving Program for Negro Freedom” in Rayford W. Logan (ed.), What the Negro Wants, Notre Dame: University of Notre Dame Press, 2012, reprint edition, pp. 31–70.|\n|1948||“The Talented Tenth Memorial Address,” in Henry Louis Gates, Jr. and Cornel West, The Future of the Race, New York: Knopf, 1996, pp.159–177.|\n- Anderson, R. Lanier, 2003, “The Debate over the Geisteswisssenschaften in German Philosophy” in Thomas Baldwin (ed.), The Cambridge History of Philosophy 1870–1940, Cambridge: Cambridge University Press, pp.221–234.\n- Appiah, Kwame Anthony, 1985, “The Uncompleted Argument: Du Bois and the Illusion of Race,” Critical Inquiry 12 (1): 21–37.\n- –––, 1992, “Illusions of Race,” in In My Father’s House, Oxford: Oxford University Press.\n- –––, 2014, W. E. B. Du Bois and the Emergence of Identity, Cambridge, MA: Harvard University Press.\n- Arnold, Matthew, 1869, Culture and Anarchy (ed.), Samuel Lipman, New Haven: Yale University Press, 1994.\n- Balfour, Lawrie, 2010, “Darkwater’s Democratic Vision,” Political Theory 38(4): 537–563.\n- –––, 2011, Democracy’s Reconstruction: Thinking Politically with W.E.B. Du Bois, New York: Oxford University Press.\n- Barry, Peter Brian, 2013, Evil and Moral Psychology, New York: Routledge.\n- Bernasconi, Robert, 2009, “W.E.B. Du Bois’s Philosophy of History in Context.” South Atlantic Quarterly, 108 (3): 519–540.\n- Blight, David W. and Gooding-Williams, Robert, 1997, “The Strange Meaning of Being Black: Du Bois’s American Tragedy,” in David W. Blight and Robert Gooding-Williams (ed.), The Souls of Black Folk, Boston: Bedford Books.\n- Bogues, Anthony, 2003, Black Heretics, Black Prophets, NewYork: Routledge.\n- Boxill, Bernard R., 1992, Blacks and Social Justice, rev. ed., Lanham, MD: Rowman & Littlefield.\n- Bright, Liam Kofi, 2017, “Du Bois’ democratic defense of the value free ideal,” Synthese. doi:10.1007/s11229-017-1333-z\n- Carby, Hazel, 1998, Race Men, Cambridge, MA: Harvard University Press.\n- Chandler, Nahum Dimitri, 2014, X—The Problem of the Negro as a Problem of Thought, New York: Fordham.\n- Clark, Maudemarie, 1994, “Nietzsche’s Immoralism and the Concept of Morality” in Richard Schacht (ed.), Nietzsche, Genealogy, Morality: Essays on Nietzsche’s On the Genealogy of Morals, Berkeley, CA: University of California Press, pp. 15–34.\n- Curry, Tommy, 2014, “Empirical or Imperial? Issues in the Manipulation of Du Bois’s Intellectual Historiography in Kwame Anthony Appiah’s Lines of Descent,” Graduate Faculty Philosophy Journal 35 (1–2): 331–351.\n- Descombes, Vincent, 2014, The Institution of Meaning: A Defense of Anthropological Holism, trans. Stephen Adam Schwartz, Cambridge: Harvard University Press.\n- Dilthey, Wilhelm, 1883 Introduction to the Human Sciences, Volume 1, translation of Einleitung in die Geisteswissenschaften, ed. Rudolph Makkreel and Frithjof Rodi, Princeton: Princeton University Press, 1989.\n- Edwards, Barrington S., 2006, “W.E.B. Du Bois between Worlds: Berlin, Empirical Research, and the Race Question,” The Du Bois Review 3 (2): 395–424.\n- Fields, Karen E. and Fields, Barbara J., 2012, “Individuality and the Intellectuals: An Imaginary Conversation Between Emile Durkheim and W.E.B. Du Bois,” in Racecraft: The Soul of Inequality in American Life, London: Verso, pp. 225–260.\n- Fisher, Rebecka Rutledge, 2014, Habitations of The Veil: Metaphor and the Poetics of Black Being in African American Literature, Albany: SUNY Press.\n- Foner, Eric, 1988, Reconstruction: America’s Unfinished Revolution, New York: Harper & Row.\n- Geuss, Raymond, 1994, “Nietzsche and Genealogy,” European Journal of Philosophy, 2 (3): 275–292.\n- Glasgow, Joshua, 2010, “The End of Historical Constructivism: Circularity, Indeterminacy, and Redundancy,” The Monist, 93 (2): 321–335.\n- Gooding-Williams, Robert, 1987, “Philosophy of History and Social Critique in The Souls of Black Folk,” Sur les Sciences Sociales (Social Science Information), 26 (March 1987): 99–114.\n- –––, 1991, “Evading Narrative Myth, Evading Prophetic Pragmatism: Cornel West’s ‘The American Evasion of Philosophy’,” The Massachusetts Review, 32(4): 517–542.\n- –––, 1996, “Outlaw, Appiah, and Du Bois’s ‘The Conservation of Races’,” in Bernard W. Bell, Emily R. Grosholz, and James B. Stewart (ed.), W.E.B. Du Bois on Race and Culture, New York: Routledge, pp. 39–56.\n- –––, 2009, In the Shadow of Du Bois: Afro Modern Political Thought in America, Cambridge, MA: Harvard University Press.\n- –––, 2014, “Autobiography, Political Hope, Racial Justice,” Du Bois Review, 11 (1): 159–175.\n- –––, 2017, “History of African American Political Thought and Antiracist Critical Theory,” in Naomi Zack (ed.), The Oxford Handbook of Philosophy and Race, Oxford: Oxford University Press, pp. 235–245.\n- Gordon, Lewis, 2000, “Du Bois’s Humanistic Philosophy of the Human Sciences,” Annals of the American Academy of Political and Social Science, “The Study of African American Problems: W. E. B. Du Bois’s Agenda, Then and Now,” 568 (March 2000): 265–280.\n- –––, 2008, An Introduction to Africana Philosophy, Cambridge: Cambridge University Press.\n- Gray, David Miguel, 2013, “Racial Norms: A Reinterpretation of Du Bois’ ‘The Conservation of Races’,” The Southern Journal of Philosophy, 51(4): 465–487.\n- Green, Dan S. and Driver, Edwin D., 1976, “W.E.B. Du Bois: A Case in the Sociology of Sociological Negation,” Phylon, 37 (4): 308–333.\n- Griffin, Farah Jasmine, 2000, “Black Feminists and Du Bois: Respectability, Protection, and beyond,” The Annals of the American Academy of Political and Social Science, “The Study of African American Problems: W. E. B. Du Bois’s Agenda, Then and Now,” 568 (March, 2000): 28–40.\n- Hacking, Ian, 1990, The Taming of Chance, Cambridge: Cambridge University Press.\n- Hancock, Ange-Marie, 2005, “W.E.B. Du Bois: Intellectual Forefather of Intersectionality?” Souls, 7:3–4: 74–84.\n- Harris, Leonard, 2004, “The Great Debate: W.E.B. Du Bois vs. Alain Locke on the Aesthetic,” Philosophia Africana, 7 (1): 15–39.\n- Haslanger, Sally, 2012, Resisting Reality: Social Construction and Social Critique, Oxford: Oxford University Press.\n- Jaeggi, Rahel and Celikates, Robin, 2017, Sozialphilosophie: Eine Einführung, M¨nchen: Beck.\n- James, Joy, Transcending the Talented Tenth: Black Leaders and American Intellectuals, New York: Routledge, 1997.\n- James, William, 1879, “Are We Automata,” Mind, 4 (January): 1–22.\n- –––, 1884, “The Dilemma of Determinism,” in The Will to Believe and Other Essays in Popular Morality and Human Immortality, New York: Dover, 1956, pp. 145–183.\n- –––, 1890, The Principles of Psychology, Volume II, New York: Dover, 1950.\n- –––, 1892, Psychology, Briefer Course, New York: Henry Holt, 1923.\n- Jeffers, Chike, 2013, “The Cultural Theory of Race: Yet Another Look at Du Bois’s ‘The Conservation of Races’,” Ethics 123: 403–426.\n- –––, 2017, “W.E.B. Du Bois’s ‘Whither Now and Why,’” in Eric Schliesser (ed.), Ten Neglected Classics of Philosophy, Oxford: Oxford University Press, pp. 222–255.\n- Johnson, Walter, 2016, “To Remake the World: Slavery, Capitalism, and Justice,” Boston Review, Forum 1: 13–31.\n- Judy, Ronald A. T., 2000, “Introduction: On W.E.B. Du Bois and Hyperbolic Thinking,” in Ronald Judy (ed.), Boundary 2, 27(3): 1–35.\n- Lewis, David Levering, 1993, W.E.B. Du Bois: Biography of a Race, 1868–1919, New York: Henry Holt.\n- –––, 2000, W.E.B. Du Bois: The Fight for Equality and the American Century, 1919–1963, New York: Henry Holt.\n- Lloyd, Vincent W., 2016, Black Natural Law, Oxford: Oxford University Press.\n- Lott, Tommy L., 1992–93, “Du Bois on the Invention of Race,” The Philosophical Forum, XXIV, (1–3): 166–187.\n- Locke, Alain, 1928, “Art or Propaganda,” Harlem, I(1): 12–13. [Available online]\n- Macmullen, Terrance, 2009, Habits of Whiteness: A Pragmatist Reconstruction, Bloomington: University of Minnesota Press.\n- Mallon, Ron, 2014, “Naturalistic Approaches to Social Construction”, The Stanford Encyclopedia of Philosophy (Winter 2014 Edition), Edward N. Zalta (ed.), URL = .\n- Marshall, Stephen H., 2011, The City on the Hill from Below: The Crisis of Prophetic Black Politics, Philadelphia: Temple University Press.\n- Mills, Charles W., 1997, The Racial Contract, Ithaca: Cornell University Press.\n- Morris, Aldon, 2015, The Scholar Denied: W.E.B. Du Bois and the Birth of Modern Sociology, Oakland: University of California Press.\n- Moses, Wilson Jeremiah, 1978, The Golden Age of Black Nationalism, 1850–1925, Oxford: Oxford University Press.\n- Myers, Ella, 2017, “Beyond the Wages of Whiteness: Du Bois on the Irrationality of Antiblack Racism,” Items, Social Science Research Council. [Available Online]\n- Nietzsche, Friedrich, 1887, On the Genealogy of Morality, Maudemarie Clark and Alan J. Swenson (trans.), Indianapolis, IN: Hackett Publishing Company, 1998.\n- Olson, Joel, 2004, The Abolition of White Democracy, Minneapolis: University of Minnesota Press.\n- Outlaw, Lucius, 1996, “‘Conserve’ Races?,” in Bernard W. Bell, Emily R. Grosholz, and James B. Stewart (ed.), W.E.B. Du Bois on Race and Culture, New York: Routledge, pp. 15–37.\n- –––, 2000, “W.E.B. Du Bois on the Study of Social Problems,”Annals of the American Academy of Political and Social Science, Vol. 568, “The Study of African American Problems: W. E. B. Du Bois’s Agenda, Then and Now,” 568 (March, 2000): 281–297.\n- Pittman, John P., “Double Consciousness”, The Stanford Encyclopedia of Philosophy (Summer 2016 Edition), Edward N. Zalta (ed.), URL = .\n- Rabaka, Reiland, 2010, Against Epistemic Apartheid: W.E.B. Du Bois and the Disciplinary Decadence of American Sociology, Lanham: Lexington Books.\n- Reed, Adolph, Jr., 1997, W.E.B. Du Bois and American Political Thought: Fabianism and the Color Line, Oxford: Oxford University Press.\n- –––, 1999, Stirrings in the Jug: Black Politics in the Post-Segregation Era, Minneapolis: University of Minnesota Press.\n- Ringer, Fritz, 1997, Max Weber’s Methodology: The Unification of the Cultural and the Social Sciences, Cambridge: Harvard University Press.\n- Robinson, Cedric J., 1983, Black Marxism: The Making of the Black Radical Tradition, London: Zed Books Ltd.\n- Rogers, Melvin L., 2012, “The People, Rhetoric, and Affect: On the Political Force of Du Bois’s The Souls of Black Folk,” American Political Science Review 106 (1):188–203.\n- Royce, Josiah, 1899, The World and the Individual, Volume 1, New York: Macmillan.\n- Searle, John R., 1995, The Construction of Social Reality, New York: Free Press.\n- Shaw, Stephanie J., 2013, W.E.B. Du Bois and The Souls of Black Folk, Chapel Hill: The University of North Carolina Press.\n- Shelby, Tommie, 2007, We Who Are Dark, Cambridge: Harvard University Press.\n- –––, 2016, Dark Ghettoes: Injustice, Dissent, and Reform, Cambridge: Harvard University Press.\n- Sullivan, Shannon, 2006, Revealing Whiteness: The Unconscious Habits of Racial Privilege, Bloomington: Indiana University Press.\n- Sundstrom, Ronald, 2003, “Douglass and Du Bois’s Der Schwarze Volksgeist,” in Race and Racism in Continental Philosophy, ed. Robert Bernasconi, Indiana: Indiana University Press, pp. 32–52.\n- Taylor, Paul C., 2000, “Appiah’s Uncompleted Argument: W.E.B. Du Bois and the Reality of Race,” Social Theory and Practice 26, 1: 103–128.\n- –––, 2004a, “What’s the Use of Calling Du Bois a Pragmatist?,” Metaphilosophy, 35 (1/2): 99–114.\n- –––, 2004b, Race: A Philosophical Introduction, Cambridge: Polity Press.\n- –––, 2010, “W.E.B. Du Bois,” Philosophy Compass 5/11 (2010): 904–915.\n- –––, 2013, “Bare Ontology and Social Death,” Philosophical Papers 42 (3): 369–389.\n- –––, 2014, “Context and Complaint: On Racial Disorientation,” Graduate Faculty Philosophy Journal 35 (1–2): 331–351.\n- –––, 2016, Black is Beautiful: A Philosophy of Black Aesthetics, Malden: Wiley-Blackwell.\n- Thompson, Stephen, 2014, “Alexander Crummell”, The Stanford Encyclopedia of Philosophy (Summer 2014 Edition), Edward N. Zalta (ed.), URL = .\n- Threadcraft, Shatema, 2016, Intimate Justice: The Black Female Body and the Body Politic, New York: Oxford University Press.\n- Viney, Donald Wayne, 1986, “William James on Free-Will and Determinism,” The Journal of Mind and Behavior, 7, 4: pp. 555–565.\n- Washington, Booker T., 1901, Up From Slavery, New York: W. W. Norton & Company; 2nd Revised ed. edition, 1995.\n- Weber, Max, 1905a, “Knies and Irrationalism,” in Max Weber, Roscher and Knies, The Logical Problems of Historical Economics, trans. Guy Oakes, New York: Free Press, pp. 93–207.\n- –––, 1905b, “Critical Studies in the Logic of the Cultural Sciences,” in The Methodology of the Social Sciences, trans. and ed. Edward A. Shils and Henry A. Finch, New York: Free Press, 1949, pp. 113–188.\n- –––, 1922, “Basic Sociological Concepts,” in Understanding and Social Inquiry, (ed.) Fred R. Dallmayr and Thomas A. McCarthy, Notre Dame: Notre Dame University Press, 1977, pp. 38–55.\n- West, Cornel, 1982, Prophecy Deliverance: An Afro-American Revolutionary Christianity, Philadelphia: Westminster Press.\n- –––, 1989, The American Evasion of Philosophy, Madison: University of Wisconsin Press.\n- –––, 1996, “Black Strivings in a Twilight Civilization,” in Henry Louis Gates, Jr. and Cornel West, The Future of the Race, New York: Knopf, pp. 53–112.\n- Wolfenstein, Eugene Victor, 2007, A Gift of the Spirit: Reading The Souls of Black Folk, Ithaca: Cornell University Press.\n- Zamir, Shamoon, 1995, Dark Voices, W.E.B Du Bois and American Thought, 1888–1903, Chicago: University of Chicago Press.\n- Zimmerman, Andrew, 2010, Alabama in Africa: Booker T. Washington, the German Empire, and the Globalization of the New South, Princeton: Princeton University Press.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Internet Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.\nOther Internet Resources\n- Jeffers, et. al, 2013, Discussion of Chike Jeffers’s “The Cultural Theory of Race”\n- W.E.B. Du Bois Papers, 1803–1999, at the University of Massachusetts Amherst Libraries Special Collections & University Archives\n- W.E.B. Du Bois: Online Resources, guide at the Library of Congress\n- W.E.B. Du Bois, resource page maintained by Robert W. Williams", "label": "No"} {"text": "Federalism in Nepal: A country in transition\nNepal transitioned to federalism with the adoption of a new constitution in 2015, bringing a shared sense of hope and optimism to many after more than a decade of political instability, a devastating earthquake and the border blockade between India and Nepal.\nThe transition was built on the campaigning of activists calling for proportional and meaningful participation for marginalised communities in a diverse country that had very limited representation of that diversity within government and the institutions that plan inclusive development and access to basic services.\nMany argued that this change in government was unnecessary for a small country like Nepal, but the decentralisation of power brought about by the federal state system has reduced the gap between the people and their representatives. However, the question still remains – have the marginalised truly felt the dividends of federalism?\nHow have marginalised communities experienced federalism?\nHear the experiences of women who have government positions within federal Nepal in our short documentary.\nSupporting a collaborative transition to federalism\nInternational Alert’s Sundar Shanta Nepal project, funded by the UK’s Foreign, Commonwealth and Development Office, aimed to support the implementation of federalism and inclusive peace processes in Nepal by working with marginalised communities, provincial and local government representatives, civil society and the media, to better understand the evolving forms of marginalisation in the context of federalism. By bringing these groups together to collaborate, we learned how federalism could be delivered more inclusively and also helped to achieve several policy reforms, including improving the education of marginalised children (such as Muslims).\nOur in-depth research suggests that federalism has opened up new political spaces and opportunities for minority groups like the Madhesi Dalits, Muslims and Tharu people of southern Nepal, but these groups share a sense of both optimism and scepticism regarding how meaningful their participation is.\nTokenism or inclusion?\nWe learned that while women from Madhesi Dalits, Muslim and Tharus communities were now being included in decision-making mechanisms, including in provincial and local government bodies, some women representatives and their communities felt the positions were tokenistic with some seats being designated to women from certain communities only. This risks further marginalising women’s voices and concerns in these spheres of governance.\nOur documentary shares experiences of elected representatives being dismissed by their peers. Even women who have been elected to senior positions like Deputy Mayor, have their decisions constantly challenged and questioned. Maya Devi Yadav and Urmila Kori, Ward Members from Kapilvastu Ward 8 told us:\nThe Ward chairperson himself doesn’t give us rights to practice our duties, neither does he give us the information he is supposed to. Now, what can we do? If anything has come to the Ward office, we are not told and come to know from outside sources.\n“They question us and ask why you are so interested, sign the papers, take your allowance, and go home. And, when we don’t sign, we don’t get our allowance.”\n“We at lower-level positions don’t have the power to enforce change. We don’t have the capacity to reach a higher position like Mayor, Deputy Mayor, Parliamentarians. There is no value for those who are at lower levels of governance. My heart is breaking since I can’t do much, I feel like I shouldn’t have done this. At least I wouldn’t have to face torture or be talked down to,” says Rubina Musalman, Women Committee Member, Lumbini.\nDespite this, many also see the evolving federal system of governance as a genuine opportunity to address the long-standing grievances and marginalisation of various groups, regions and genders, and to strengthen good governance and state–citizen relations.\nI am a member of the Provincial Assembly and I am gradually learning my roles and responsibilities as a member. I have learnt a lot but still I need to learn more. When a citizen comes to me with their problems, I usually go with them and solve it.\n“Before, the citizens couldn’t speak with their “mananiya” (elected house members). They would come and go in their vehicles and the citizens didn’t have access to them. Now they can come to my house sit with me and talk about their problems.” Hon. Sunita Kumari Thater, Provincial Assembly Member, Province 5.\nPost-election the peace and conflict context has shifted\nDuring and following the 2017 elections, power has shifted in Nepal from a central government dominated by men and those in the “upper caste” to become decentralised and more inclusive, affecting the nature of decision-making in politics and society. Peace and conflict dynamics in the country have also changed, in relation to the recent elections and the post-election context, which reflects the need for building the capacity and constituency of the elected representatives from marginalised communities.\nThere is fear among these newly elected officials that their inability to perform while in government, or the perception of it, will reinforce the dissenting voices of those not in favour of federalism, which could lead to insecurity and instability within government structures and the country. A dominant conflict issue raised throughout our research has been disputes over jurisdiction and resources between the federal, provincial, and local governments. Interventions are needed to create an environment for sensible cooperation and collaboration in consolidating democracy and peace, and institutionalising federalism.\nThe demand and expectation of the people is high. For 20 years they have felt left behind and now finally, with the elections, with a changing context, it is likely to happen. We have had limited budget and resources, but have tried to fulfil the wishes and needs of the people.\n“We have also been working on forming laws and regulations and there are many more to be made but we have to follow the due process according to the constitution which states that the law is made by the federal level, then at the provincial level, after which we can do so at local level. Therefore, we are waiting for the federal and provincial government to implement the laws. Another challenge is that the administrative staff and elected representatives, are not all well trained regarding this new structure. It has been nearly two years and we ourselves are trying to learn and have had the opportunity to coordinate with municipality and different civic organisations to enhance our skills and participated in trainings.” Prakash Yonjan, Ward Chairperson, Dhangandhimai.\nHow can federalism be supported?\nDonors and development agencies should support local governments and community organisations to promote and institutionalise inclusive and locally responsive legislation-making processes to ensure that elected officials from marginalised communities can meaningfully undertake their legislative roles and functions.\nThey can achieve this by working alongside civil society organisations to build the capacity of elected representatives on public speaking, inclusive policy making, conflict sensitivity training and good governance; by working with the media, activists, women’s club, youth groups, in some cases religious leaders to organise dialogues between service seekers and service providers; and by working with local media and youth groups to amplify voices from the communities.\nThe 2015 Constitution of Nepal has ensured participation from all marginalised communities, be it gender, caste or ethnicity, but the idea of federalism is still new for Nepal. There is still a long road ahead to understand what federalism means for Nepal, its implications and how it can be truly inclusive of all voices, but people are still hopeful as federalism has opened the gate to build a better and more peaceful future for all.", "label": "No"} {"text": "Campus CommunityHonor and Recognition of Indigenous Peoples' DayNo Author ProvidedOctober 12, 2020Invalid ImageNo Image Credit ProvidedNo Caption ProvidedToday, Seattle University marks the significance of Indigenous Peoples’ Day, a day to honor and celebrate Indigenous peoples and to acknowledge the toil of colonization as reflected by the land we occupy as a university. Dear Seattle University Community, Today, Seattle University marks the significance of Indigenous Peoples’ Day, a day to honor and celebrate Indigenous peoples and to acknowledge the toil of colonization as reflected by the land we occupy as a university. We recognize that we reside on occupied Coast Salish lands and Seattle University is on the homelands of the Duwamish people. We pay respect to Coast Salish Elders past and present and extend that respect to their descendants and to all Indigenous people. The origin of Indigenous Peoples’ Day reaches back to 1977 and the first International NGO Conference on Discrimination Against Indigenous Populations in the Americas, and beginning in 1991, many cities began a movement to recognize and celebrate Indigenous Peoples’ Day in place of Columbus Day and as a step toward recognizing the harmful legacies of the doctrine of discovery and North American colonization. In 2014 and as a direct result of community activism, the City of Seattle declared the second Monday in October Indigenous Peoples’ Day, and Seattle University officially adopted Indigenous Peoples’ Day in 2016. We celebrate and recognize that a changing the name of one day cannot fully address historical wrongs or adequately honor the gifts and contributions of Indigenous peoples. Yet, it remains an important step in changing our orientation to our shared history. As an educational institution with a Jesuit Catholic ethos, we are on a journey to understand and reconcile a range of atrocities of colonization and their lasting impacts. Thus, we must embrace a fuller narrative of the history and cultural features that continue to thwart full actualization of Indigenous people and deprive all of us of the rich heritage and gifts that come through full inclusion of students, faculty, and staff of Indigenous descent. We recognize the leadership of Dr. Christina Roberts (Aaniiih and Nakoda), Director of the Indigenous Peoples Institute, and the many ways in which she has elevated the experiences of our Indigenous communities and built avenues for belonging and thriving for our students. Over the years, we have worked to deepen our relationship to Indigenous Peoples by learning about and celebrating the many contributions of Coast Salish peoples. For example, in 2018, we deepened understanding by offering as the university’s common text, Harriette Shelton Dover’s Tulalip, from My Heart, and celebrating Vi Hilbert taqwšǝblu, a revered Upper Skagit woman and the namesake for our shared ethnobotanical garden and the newest residence hall on campus. Each year, the Office of Diversity and Inclusion includes in its inclusive excellence summer reading list texts by talented Indigenous writers as a small way to expose our community to the tapestry of talent and creative works. This year’s offerings included An American Sunrise: Poems by Joy Harjo (the first Native American Poet Laureate, 2019). Significantly, our students recently had an opportunity to attend the first annual IPI-sponsored event, “Honoring Indigenous Voices.” This year’s theme – “Navigating intergenerational trauma on the way home” – and the event was designed and led by a current Indigenous student in the College of Nursing, Misty Louie (Apsaalooke/Ktunaxa, class of 2021). Learn more here. In 2017, Seattle University’s Indigenous Peoples Institute, under the guidance of Dr. Roberts and Fr. Patrick Twohy, S.J., collaborated with Campus Ministry to co-create language that can be used to recognize the history and people, lands and waters of this Duwamish dxʷdəwʔabš aboriginal territory. This statement is often used in our community to open campus events, meetings, classes, and other gatherings. Dr. Roberts recently updated the statement which was shared to open the university’s Celebration of Spirit last month. In the words of Dr. Roberts, the statement offers a way for “our community to recognize this land and our histories; to honor the Indigenous people past and present who belong to these places; and to have common and consistent language for our events and ceremonies that is crafted with care and wisdom.” As we begin [name of event/gathering], I (we) invite us all to respectfully acknowledge that our campus is on occupied Coast Salish land, specifically the homelands of the Duwamish people. To acknowledge this land is to recognize the history and legacy of settler colonialism; it is to recognize these lands, waters, and their significance for the peoples who have thrived in this region despite the consequences of displacement and broken treaties. Let us take a moment to pause and pay our respects to Coast Salish Elders past and present and extend that respect to their descendants and to all Indigenous people. We invite you to continue incorporating this updated acknowledgment throughout the academic year as a beginning practice of paying attention to our shared stories. These efforts cannot change history but offer a small step toward building an honest relationship with our history and lands. We also encourage faculty, staff and students to identify additional ways we can honor, listen, celebrate, receive, share and complicate the stories of this region. Please see the additional information listed below. Sincerely, Natasha Martin, JDVice President for Diversity and InclusionAssociate Professor of Law Christina Roberts, PhDNakoda and Aaniiih NationsDirector, Indigenous Peoples InstituteAssociate Director, Matteo Ricci InstituteAssociate Professor, English and Women and Gender Studies Here are a few opportunities to join the Indigenous Peoples Institute in learning and celebration this academic year: Lushootseed Language Conference: Oct. 17, 2020 IPI Book Club – Tommy Orange’s There There: November 2020 Indigenous Peoples Institute Open House in Xavier: TBD Spring 2020 Indigenous Students Day: Virtual event in Winter Since Time Immemorial Tribal Sovereignty Curriculum in Washington State: http://www.k12.wa.us/IndianEd/TribalSovereignty/ Land-grab universities: Expropriated Indigenous land is the foundation of the land-grant university system.", "label": "No"} {"text": "There are four major differences PONY offers:\n1. Pitching machine for younger ages\n2. Leadoffs and steals for older ages\n3. Increasingly larger field sizes as players move up in age\n4. Division age grouping of 2 years\nThe first key difference is at ages 7-8 (Pinto) -- which is one of the most popular participating ages in all of youth baseball. NCYB (and PONY in general) features a pitching machine for the full season – as opposed to player-pitch as is often the practice in Little League.\nAny player/parent who has seen a Little League game at this age level no doubt has suffered through the walk-filled boredom that results from kids who don’t have the physical ability to either consistently throw or hit live pitching.\nPitchers too often hurt their arms and shatter confidence by pitching at such an early age. Hitters don’t develop because they rarely see hittable balls and are rightly worried about being hit themselves. Base-running skills don’t develop because there are so few base-runners who advance off a hit. And defensive skills don’t improve because the ball is so seldom put into play.\nAll this too often results in a complete lack of on-field action – which ultimately concludes with players and families dropping out of baseball because they consider it too boring.\nBy contrast, Pinto is regarded by many as the most exciting division of PONY because of the fast-paced action, and the dramatic improvement of all players over the course of the season in all phases of the game. This is all due to a consistent ball being pitched by the machine. Many families move from Little League to PONY just for this reason.\nThe second major distinction comes at the next level up with ages 9-10 (Mustang). By this point, players are physically and emotionally mature enough to be introduced to live pitching. Unlike Little League though, PONY allows leadoffs and steals. This introduces additional nuances to the game just as you see in the big leagues.\nFor example, pitchers learn how to pitch from the wind-up and stretch, holding runners on bases. Catchers learn how to throw out potential base stealers. Base-runners learn proper lead-offs and other base running techniques.\nThe third significant difference is that as players move up from one division to the next, the base path distances increase. Little League maintains the same distances not increasing the size of the infield as the players get older and stronger. Therefore the infield never grows larger than 60’ between the bases. For comparison, freshman high school baseball up through the major leagues features 90’ base paths.\nPONY believes in graduating up in field size as players get older.\nThe fourth difference is division age. Little League often has divisions with an age span of 3 years. Pony divisions are comprised of players with a 2 year age difference. With the tighter age grouping in the division, we believe that it is a safer environment for all the players. It also adds more parity to the teams and idividual players. The result is a more consistent competitive environment and this translates to more fun, confidence and enjoyment for the players.", "label": "No"} {"text": "Antonio Rosmini (1797–1855), Italian priest, philosopher, theologian and patriot, and founder of a religious congregation, aimed principally in his philosophical work at re-addressing the balance between reason and religion which had largely been lost as a result of the Enlightenment. To this purpose, he absorbed the tradition of philosophia perennis, read extensively the works of post-Renaissance philosophers, and developed his own views on philosophical fundamentals and many of their applications. Best known in Italy, but a controversial figure there during his life and for a century or more after his death, his philosophical work, centred upon the notion of being and the dignity of the human person, can be summarised under the headings: aims and method, the objectivity of thought and the concept of certainty; the dignity of the human person; morality; human rights; the nature of human society; natural theology; and being. The following article will examine Rosmini’s work under these titles, which are of perennial relevance and broad enough to embrace more particular themes, such as art, politics, education and marriage, which form a constant preoccupation of many of his lesser works, but can only be mentioned in passing here. His theological principles, other than those pertaining to natural theology, are considered only in so far as they throw light on the origin and development of his philosophical tenets.\n- 1. Life and Works\n- 2. Aim and Method\n- 3. The Objectivity of Thought and the Concept of Certainty\n- 4. The Dignity of the Human Person\n- 5. Morality\n- 6. Human Rights\n- 7. The Nature and Purpose of Society\n- 8. Natural theology\n- 9. Being\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nRosmini was born in 1797 at Rovereto, Italy, a staunchly Italian-speaking town, but at the time part of the Austro-Hungarian Empire and ruled from Vienna. The Rosmini family, citizens of Rovereto for several centuries, had become rich through the manufacture of silk, and enjoyed the way of life proper to the lesser aristocracy. Antonio’s primary and secondary education was, however, catered for at the public school, and through his own intensive reading. Tertiary education was completed at the University of Padua. After ordination to the priesthood in 1821, Rosmini studied and wrote at Rovereto until 1826, and from 1826–28 at Milan. Despite his instinctive distaste for the excesses of the French Revolution, which inevitably played a large part in the cultural formation of persons growing to maturity in the first quarter of the 19th century, Rosmini was not afraid to take a stand against State interference in religious affairs. His Panegyric for Pius VII (1823) was considerably censored by the Austrian-Hungarian government and published only in 1831. By this time, Rosmini had founded his religious order (1828), and published at Rome his fundamental philosophical work, A New Essay concerning the Origin of Ideas (1830). As the title suggests, this was intended to supersede Locke’s famous Essay concerning Human Understanding. From then on, a torrent of philosophical and theological works poured out until his death at Stresa. From 1836 until 1855, Rosmini was involved in constant controversy. The approbation of his religious order (1836–38), his work on conscience (1840), theological disputes (1843–48) and his participation in the political events of 1848, occasioned strong debate which led in 1849 to the inclusion of two of his works, The Five Wounds of Holy Church and the Civil Constitution according to Social Justice, in the Index of Prohibited Books. Strengthened by this, Rosmini’s theological and political opponents pressed for an examination of all his works which led, however, to his exoneration (1854), a year before his death at Stresa in northern Italy (1855). Condemnation came posthumously (1888–9) when forty propositions, taken mostly from books published after his death, were included in the decree Post Obitum of Leo XIII. A remarkable swing in ecclesiastical opinion took place in 2001 when a Vatican Note stated: ‘The motives for preoccupation and for doctrinal and prudential difficulties which determined the promulgation of the decree Post Obitum condemning the “Forty Propositions” drawn from the works of Antonio Rosmini can now be considered as surmounted’ (CDF, Osservatore Romano, 1 July 2001).\nRosmini describes his aim and method at some length in his On the Studies of the Author. He sets out to combat error, to systematise the truth, to present a philosophy that can serve as a basis for the various branches of knowledge, and to offer philosophy as an aid to theology. To achieve this, he upholds freedom to philosophise, and sets out to reconcile, whenever possible, apparently contrasting views. His intention throughout is to present an image of knowledge as one, simple and indivisible.\n2.1 Combating error\nNo one, he maintains, would err for the sake of erring. Philosophical tradition in particular provides an object lesson in the movement towards truth, and the elimination of error. Nevertheless, the path forward is not pursued without error because the movement towards higher levels of reflection takes place unevenly. Responses to questions at level A are no longer adequate in form to resolve questions at level B, which inevitably take on new aspects through their application to new circumstances. The role of the philosopher is to distinguish the form of difficulties, which may vary from age to age or generation to generation, and to formulate questions in such a way that it is possible to see both their historical antecedents and the underlying principles to be employed in solving them. The process, however, will never be complete. The same principles will always cry out for application to new cases, and the same struggle to avoid error will ensue.\n2.2 Systematising the truth\nThe negative task of combating error is not, however, sufficient. What is needed in addition, says Rosmini, is a ‘system of truth’, that is, a system which shows clearly how the passage is made from the most general, self-evident principles to more particular levels of knowledge. Knowledge-wise, we move instinctively from the more general to the particular. A mother does not begin by naming roses, carnation and other species for her children; she first indicates them all as ‘flowers’ before calling them by their particular names. So ‘being’, which is the most general of all notions, is the fundamental principle of human knowledge which draws together every aspect of being. When ‘being’ is seen as the supreme principle of unity on which all knowledge depends, truth—‘being as known’—has been systematised and is seen in all its beauty. Since, however, the full application of being is never seen once and for all, it is better to ensure adherence to principle than to grasp at unconnected facts which serve at best as a ragbag of erudition—better to grasp the principle of the wheel, for example, than to know only a number of its applications.\n2.3 Philosophy as a basis for the various branches of knowledge\nPhilosophy as ‘the study of the final reasons’ is thus central to Rosmini’s understanding. For him, the Enlightenment, with its sensistic, subjectivist attitude and devotion to the act of reasoning, rather than to the light of reason, degenerates inevitably into a hotchpotch of negation and ignorance, leading to radical corruption in ethics, and every other branch of philosophical endeavour.\n2.4 Philosophy as an aid to theology\nThe fragmentation of philosophy and its consequent separation from theology is, according to Rosmini, a necessary consequence of sensationalist thinking. There can be no place for revealed doctrine to be expounded as true science unless certain truths are already demonstrated, in the logical order at least, by philosophical reason. On the other hand, theology itself often cannot make progress unless it is prepared to turn to philosophy for assistance. The notions of body, of person and of many other matters essential to theology, cannot be adequately expressed in isolation from philosophical teaching. In its turn, according to Rosmini, divine revelation does not cancel, but completes and ennobles reason, especially by drawing its attention to problems such as the relationship between person and nature which would otherwise escape its attention.\n2.5 Freedom to Philosophise\nError, the antithesis of knowledge, is the only intellectual impediment to free, philosophical thought. From this principle, Rosmini concludes that assent to erroneous prejudices, not assent to prejudice as such, is the principal obstacle to be overcome by philosophers. Their work consists in examining preconceptions and determining their truth in order to provide grounds for rational persuasion about what they know. To maintain, as many do, that the possession of some unproven truth is inimical to philosophical thought is tantamount to requiring nil knowledge in the prospective philosopher. Rather, a person who knows something, but has not yet come to grips with the reasons leading to it, is like a person who knows the answer to a problem, but still has to consider the reason for the answer. In this case, freedom is not constrained. The point at issue, therefore, in the case of religion, is not that Christians, or Buddhists, or Muslims, or any other religious persons, are necessarily hampered by their beliefs, but whether these beliefs are true, and to what extent they are true. It is not sufficient to state simply that only persons who are devoid of any belief are capable of philosophising freely. Rather\ntotal freedom is a necessary condition of the truth of faith. If faith were considered divine although in conflict with reason, it would impose an impossible obligation and totally inhibit our reasoning activity. We would be unable to give our assent to either reason or faith, and would thus remain deprived of truth (IP 39 [All numbers in references to Rosmini’s works are to paragraphs, not to pages]).\nIt is not the case, Rosmini would affirm, that only non-believers have the capacity to enter the world of philosophical enquiry.\n2.6 Reconciliation of Conclusions\nAccording to Rosmini, eclecticism, especially that upheld by Victor Cousin, is not the way to promote reconciliation between conclusions. Philosophical systems are not brought together as a result of arbitrary choice between what they offer. Each system, if it is truly such, will have a principle from which deductions are made, and will be able to be reconciled, despite accidental differences, with every other system sharing the same principle. On the other hand, systems will not be reconcilable, despite their accidental agreement, if their basic principles differ. In the former case, agreement will be possible by working back to the principle, and setting out once more from there; in the second case, apparent agreement will only be skin-deep. Only shared principles allow for effective reconciliation between systems.\nRosmini sets out to establish the nature of thought and certainty in his A New Essay concerning the Origin of Ideas. Faced by the critical philosophy of Kant on the one hand, and by British empiricism on the other, Rosmini reaches back to the pre-Socratics, to Plato and Aristotle, to Augustine, Thomas Aquinas and Bonaventure, in an endeavour to establish the nature of thought and the basis of certainty in human existence. As his guiding principles he takes the following rules:\nIn explaining facts connected with the human spirit, we must not make fewer assumptions than are required to explain them... [nor must we] make more assumptions than are needed to explain the facts (NE, vol. 1, 26–7).\nWith this as his methodological foundation, he places Locke, Condillac, Reid and Dugald Stewart among those whose explanation of the fact of thought is deficient; Plato, Aristotle, Leibniz and Kant are listed amongst those whose explanation is in many ways excessive. In other words, he distinguishes between sensationalists who, according to him, cannot explain the origin of ideas, and idealists who posit in their explanation more ideas or forms than are necessary. For him, however, human thought must depend upon the innate idea of being, without which nothing is intelligible. We cannot think of what is not. At the same time, nothing more is needed than the single idea of being, and its possible determinations, brought about through sensation, to explain all intellectual principles and the ramifications of thought.\nAfter observing the fact of thought, Rosmini concludes that its absolute basis, without which nothing is thought and thought is nothing, must be the knowledge of being. Reflection can remove everything from thought, and still leave it embryonically sound provided the mind is granted the idea of being as its governing light. This idea, which possesses the divine attributes of universality, infinity, necessity and possibility, is not God himself but merely the possibility of things. Moreover, it acts in the mind, but without becoming a subjective part of the mind. As intellectual light, it illuminates, but from outside the mind. And it illuminates without revealing its source, as natural light can be seen without our looking at the sun. It is, as Dante would say, ‘the light connecting intellect and truth’ (Purgatorio 6: 45) and, as such, is the quasi-form of the intellect and the image of truth. Determinations of this idea, all of which possess in some way the characteristics of being, especially its objectivity, are provided through sensations experienced in the animal part of human existence and illuminated, being-wise, through the innate idea in which they are seen. Of themselves, sensations do not constitute knowledge but, when felt in the human subject, provide the matter of knowledge which determines the idea of being, that is, the form of knowledge. Knowledge consists first in the intuition of being, the universal, and then in a subsequent series of judgments, or direct perceptions, through which knowing subjects affirm the actual existence of what they have experienced sensationally. These direct perceptions cannot err, although reflection upon them, and a subsequent series of judgments, may be the source of error. In a word, Rosmini holds that basic knowledge, consisting of the idea of being and its immediate determinations, provides all that is needed for objective thought. Against idealists, he reduces the formal requirements of thought to the intuition of being; against sensationalists, he maintains the per se inadequacy of the senses to provide more than the matter of thought.\nObjectivity, therefore, is essentially a characteristic of what is known. Certainty, in Rosmini’s view, is a characteristic of the person who knows, and can be defined as ‘a firm and reasonable persuasion that conforms to the truth’ (NE, vol. 3, 1044). In other words, we can be certain only of knowledge, not of error, and this because, according to Rosmini, to know and to know the truth is the same thing. The person who does not know the truth, does not know. There is no doubt, of course, that it is possible to be persuaded, and firmly persuaded, of error. But rational persuasion of error arrived at through one’s own reasoning is not possible. In this case, either the premiss is wrong, or the argument is erroneous. On the other hand, the persuasion must be firm. Certainty is not achieved without energy directed into persuasion. Certainty requires that we know something to be true, to be what it is, that we are persuaded that it is what we know it to be, and that we have an adequate reason for our persuasion. And precisely because error attempts to alter the being of things, formal error will not be found rooted in the intellect nor in the senses nor in involuntary reflection. It begins with the will, the only human faculty capable of drawing the reason to invent what it does not see, or to deny what it sees. Under pressure from the will, reason will falsely affirm that being is not, or deny that being is.\nIt is already clear from what has been said that Rosmini, in his solution to the basic problem of knowledge, has offered a perspective which places human dignity on a transcendent level. Human beings are made such, he would maintain, by the intuition of being which accompanies them from the first moment of their existence. Through this intuition, they share in the finality of being itself and in some finite way participate in its infinite characteristics. Nevertheless, the subjective element proper to the human being neither can nor should be denied. Indeed, it has to be examined thoroughly if a rational account is to be rendered of the essential unitary make-up of human nature. This examination was carried out initially in Rosmini’s A New Essay concerning the Origin of Ideas as part of his explanation of what he called ‘impure’ ideas, that is, ideas which, as perceptive (not simply intellective), require for their origin some sense experience. He pursued the investigation in his Anthropology as an Aid to Moral Science and in Psychology where in four volumes entitled The Essence of the Human Soul, The Development of the Human Soul, Laws of Animality and Opinions about the Human Soul, he observed and discussed at length the animal, as well as the intellectual side of human nature.\nThe first fact presented by observation on ourselves is the essential distinction in human beings between that which feels and that which is felt. According to Rosmini, these are quite different and unconfusible elements with opposite characteristics. That which feels is an immaterial principle (soul); that which is felt is the term (body) of this principle. Together feeler and felt constitute feeling, the underlying subject of reflection when attention is concentrated on ‘myself’ and those elements which constitute ‘myself’. The chief action of body is to produce an undetermined, shapeless extension which enables that which feels to experience determined sensations of various kinds. This ‘fundamental feeling’, with its permanent perception of unlimited space, is that in which all other feelings are perceived, and runs parallel, as it were, with the idea of being in which all other ideas are intuited. Reaction to perceived feelings constitutes vital instinct (relative to the fundamental feeling) and sensuous instinct (relative to the adventitious sensations). All feeling and instinct is per se unknown in Rosmini’s view, and comes to be known through the formation in the knowing subject of ideas and perceptions which depend upon the illumination provided by the idea of being. Thus, for Rosmini, the human being is a knowing and feeling subject, having within itself a principle which, formed by the light of being, knows and reacts to what it knows through the faculties of intellect and will, and feels and reacts to what it feels through the faculties of sense and instinct. Within the human subject, the will - which reacts to what is known—is the supreme active principle and as such constitutes ‘person’ in the individual. The dignity of the human being lies within the will as such, in the first place, and then within the will’s choice to second whatever the intellect knows. This is also the foundation of genuine freedom within the human subject. Free to adhere to or reject what is known, human beings cannot be coerced by attempted external pressure or used as a means by others without prejudice to the inviolable truth in which they share innately through their participation in the light of being and which they attain adventitiously through the direct perception that unfolds determined truths to their intellectual gaze.\nRosmini’s ethical philosophy springs directly from the analysis summarised in the previous section. For him, ‘the human being is a knowing and feeling subject whose will, as supreme principle of activity, provides the basis of the incommunicable individuality that constitutes each real human nature as a person’ (Life, p. 26). ‘Person’, as supreme principle, is also the subject of moral activity, and is to be distinguished from all those habits and acts within human beings which take place without the necessary intervention of the person or, at most, effect the person indirectly. For example, a good pianist is not necessarily a good person. Morality deals necessarily with what people do as persons, with what affects themselves as subjects who cannot step aside from the truth they know without violating their adherence to truth. Rosmini deals with ethics, the science of morality, in his Principles of Ethics and in Comparative and Critical History of Systems dealing with the Principle of Morality. The History first offers an overview of systems which throughout history deny morality, or make it impossible, or provide it with a subjective foundation. It then moves on to summarise the objective view expressed by philosophers and developed by Rosmini in Principles of Ethics .\n5.1 Moral Obligation\nThis view, as stated by Rosmini, depends upon what he sees as a self-evident principle that cannot be denied by any sane person. We are bound, he says, to acknowledge (recognise) what we know for what we know it to be. Granted that knowledge, according to Rosmini, is co-terminus with truth, never with error, it is clear that Rosmini’s affirmation depends upon the self-evident need to affirm what one knows. This, in turn, is an act by which the human subject is elevated, at a reflective level, to the level of the truth which, already known in the essential idea of being, is as sublime as being itself. On the other hand, to deny what one knows is equivalent to stepping into non-being, the antithesis of dignity. In more philosophical terms, Rosmini maintains that the principle he enunciates, in which every other moral dictate is implicitly included, may be characterised as follows: it expresses moral essence because it calls for agreement between the intellective act of the will and the ideal and real entities of things known; it is simple and as such able to be participated by every moral activity; it is evident because it is nothing more than an expression of the principle of contradiction; it is universal because all moral effects, denoted through external actions, depend upon it; it is supreme because it offers no possibility of further investigation; it provides the foundation for the recognition of the human subject as an essentially moral being, that is, one who, through the innate presence of the idea of being and the principle of will, is furnished with the object of morality and essential adherence to it. Finally, Rosmini’s distinction between the subject and object of morality opens a way, according to him, between the extremes of ethical theory. On the one hand, the limitation of the human subject provides for the possibility of moral error; on the other, the necessity and immutability of the object, the idea of being, furnish morality with its undeniable sense of obligation. It is a fatal but all too frequent mistake, Rosmini contends, to attribute characteristics proper to the subject (fallibility, error, and so on) to the object, and characteristics of the object (necessity, immutability and so on) to the subject.\n5.2 Moral Good\nA way is now present to describe adequately the nature of moral good as opposed to eudemonological good. That which is good is desirable, but what is desirable may either be desirable in itself, that is, as it stands in the order of being, or simply desirable in so far it is good, or imagined as good, for the individual. Moral good, says Rosmini, is found when the will adheres to what is good according to the order of being; eudemonological or utilitarian good is what is desired as good for the individual, without reference to what is good in itself. Human dignity is preserved only when, through an act of will, individuals adhering in practice to beings as they are in their order, implicitly adhere to the whole of being and to their presence in that order. Immorality, by which entities are appreciated or desired but not in their known order and thus not as they are, implies an essential rebellion against the order of being and thus against being itself. Self-imposed human indignity can go no lower than this.\nHaving dealt with the nature of morality and moral obligation, Rosmini turns his attention to conscience. He himself admits that such a treatise is almost universally neglected by philosophers, and feels himself constrained to justify such a study, which he undertakes with an almost inevitable admixture of religious and theological elements. Nevertheless, it is not difficult to filter the philosophical principles in his work from characteristics proper to the faith he professes. This is especially apparent in his approach to the nature of conscience, an area in which his views first prompted the dissension’s between him and some of his co-religionists that would go on until the end of his life. Rosmini defines conscience as a ‘speculative judgement that a person makes about the morality of his practical judgement’ (C19), that is, a judgement by which individuals come to know the moral value of their actions without necessarily acting upon it.\nSeveral consequences can be drawn from this. First, morality in the individual is prior to conscience, and can be present without conscience; second, conscience can be mistaken (it is possible to form a incorrect notion of the moral value of one’s own action); third, it does not follow that conscience, once formed, will give rise to action in the person who forms it; fourth, conscience, if incorrect in its judgement, must as far as possible be reformed. Conscience, therefore, is only an adequate guide to morality when it provides accurate information of the moral state of a subject’s past, present or future action. In the light of these affirmations, it is possible to see how Rosmini lays the groundwork for overcoming the dilemma posed by the question: must conscience always be followed? While it is certain that the dictates of conscience can never be morally disregarded, it is equally certain that a deliberately misleading act of conscience cannot morally be followed. Sometimes, therefore, it will be morally imperative to correct conscience, which is always possible through proper reflection on the moral value of the human act posited or about to be posited by the individual. Rosmini goes on to distinguish between problems about conscience and problems connected with the formation of conscience. In fact, conscience, according to him, is not present as long as judgement is suspended about the moral value of an individual’s own action. Difficulties at this point are connected with the formation of the judgement, not with the judgement itself.\nRosmini’s view of ‘person’, seen as an inviolable end which can never be reduced to the status of ‘means’, leads spontaneously to what today is seen as paramount in human existence, that is, the question of human rights. These rights are studied at length in The Philosophy of Right, a six-volume treatise in the only extant English translation. The general title of the work shows immediately that for Rosmini all rights are founded in a single element called ‘right’ from which all ‘rights’ emanate, some innate in human beings, others springing from the determined circumstances of individuals or societies. The treatise can be summed up under three heads: the essence of right, individual rights, social rights.\n6.1 The Essence of Right\nThe basis of Rosmini’s teaching on human rights is a consequence of his moral theory, of which he gives a careful synthesis in a preface to The Philosophy of Right. If each person is morally obliged to recognise in practice what is known for what it is known to be, every other human being will be recognised as essentially on a par with the knowing person, and will have to be acknowledged as such. But because each person is obliged to act in accordance with moral propriety, every person is obliged to respect this obligation in the other on pain of violating the moral law itself. Granted this principle as foundation, and ‘right’ as a relationship between one person and others by which a person has a claim to what is his own, Rosmini maintains that ‘person’ is subsistent right. In other words, all rights are founded on that to which persons have a claim in so far as they are acting morally or are at least not acting immorally. Such activity cannot be the object of attack on the part of others without violation of persons as ends. ‘Right’, as he says, ‘is a moral governance or authority to act, or: right is a faculty to do what we please, protected by the moral law which obliges others to respect that faculty’ (ER, vol. 1, 237).\nThe essence of right is, therefore, the activity of a person or persons relative to other persons. This activity, however, can be exercised either by individuals or by persons acting as members of a society.\n6.2 Rights of individuals\nWhen a person’s activity is actuated in a moral way, the object of that activity becomes the person’s own, that is, becomes proper to the person in such a way that it cannot be violated without damage to the person in whose ownership it is. Practical experience of this is found in what Rosmini calls ‘jural resentment’, the injured feeling that occurs on the occasion of violation of some right and gives rise to an instinct for repossession or restitution. Such an experience is obviously not a fact related solely to matter; it is fundamentally a fact of the spirit where alone it can be felt. It is also an indication of the sphere of jural freedom within which a person is and must be left free. More importantly, ‘person’ does not possess right, but—because formed by the light of being—is right itself; does not possess freedom, but is freedom. The divisions of activity give rise to two major kinds of rights in people. If what is possessed is such from the very beginning of existence in a human being (life, for example), the individual possesses innate right(s) which may be called ‘natural’ (pertaining essentially to human nature) or ‘rational’ (the rights are what they are and cannot be otherwise). But rights may also be acquired by human beings during the course of life through adventitious activity. When rights have been established in this way, they too are inviolable although there are circumstances, such as lack of use, which dissolve the relationship of ownership and thus leave the field open to others who may wish to extend their activity to the matter in question. Leaving these circumstances aside, however, individual rights cannot be absorbed by others. The State, for example, cannot absorb the inalienable rights proper to persons, nor can it be considered as more than its individual members in such a way that persons can be sacrificed for the sake of society.\n6.3 Social right\nNevertheless, societies exist within which rights arise from the bonds between intellectual beings. According to Rosmini, these societies fall under three headings: theocratic society, that is, society between God and his creatures; domestic society, which is divided into conjugal and parental society; and civil society, that is, the communion desired by several families who wish to entrust the preservation and the regulation of their rights to a single or collective mind called ‘government’. Rosmini considers at some length the rights arising in these societies. In particular, he ponders the title of rights possessed by the Creator over human beings, the rights proper to husband and wife, and to parents. Of special interest is his description of the State as a society which, while it has the duty to influence for the common good only the modality and exercise of rights in its citizens, has no power to create or destroy human rights. In fact, the general purpose of the State is to arrange the exercise of individual rights in such a way that individuals are better able to enjoy the use of their innate and acquired rights. Thus, although in time of war the exercise of certain rights may be curtailed or even suspended, the rights remain invested in individuals to whose exercise they must be restored in normal circumstances. It is clear that Rosmini’s view of civil society is completely anti-totalitarian. He does not, however, espouse the cause of modern democracy According to him, the principle of democracy is not ‘one person, one vote’, but would depend rather upon the contribution made by citizens to the well-being of the State. Difficult to arrange in practice, the principle is nevertheless important, and can be considered the obverse of ‘No taxation without representation’.\nIt is clear that Rosmini’s view of rights in human society depends to a great extent on his views about the nature of society as such. In fact, his earliest work as a philosopher (1818–1826) was almost totally taken up with a study of society, and was only abandoned when he saw that his ideas would lack a solid foundation unless the problem of knowledge had first been confronted. Eventually (1837), he published his ideas on society in The Philosophy of Politics in which he deals with the principle according to which societies stand or fall, and the end to which societies are directed. . However, despite the universality of the principles examined in this work, their application is restricted to civil society. According to Rosmini, the first rule and criterion for governing any society whatsoever is this: That which constitutes the existence or substance of a society is to be preserved and strengthened even at the cost of neglect to accidental refinement. This is also the first rule of politics. It follows that the greatest errors of government are those by which the government of a society, because of its excessive concern for the society’s accidental progress, loses sight of that which constitutes the substance of the society. The steps taken towards decline, that is, towards the substitution of essential matters by accidental, can be considered on four levels: the periods of founders of societies and basic legislation; of genuine development; of external splendour; of frivolity. Beginning from the first stage, when attention is inevitably fixed on the nature itself of a society, there is a gradual diminution of interest in underlying societal values until weakness, manifested in attention to frivolities and inability to concentrate on weightier matters, undermines the society’s inner cohesion and its ability to withstand external inimical pressures. This would explain the profound truth lying behind Machiavelli’s observation: ‘If a sect or republic is to survive for any length of time, it must return frequently to its beginning’ (quoted in PP, vol. 1, 41)\nFor Rosmini, every society is simply the union of two or more people undertaken with the intention of obtaining a common advantage. ‘All the persons in this union [forming a society] together have the role of end, and the advantage expected from the association is applied equally to all (PP, vol. 2, 39). In other words, there must be in every society a moral element, an element of justice, which affects the behaviour of the members towards one another, even if collectively (as in Plato’s case of a band of robbers) they are unjust towards non-members. Hence the excellence of what Rosmini calls ‘the social bond’; where it is present and actuated, there is no injustice; injustice begins in its absence. In other words, the nature of society requires that those who form it, enjoy within it the personal dignity of end. There is, therefore, a moral element inherent in every society. Using some persons, some members, as means, even for the apparent good of the whole, is repugnant to the very nature of society. In a coherent universal society, such as that described by Cicero—‘This entire world is to be considered simply as a city common to both gods and human beings’ (quoted in PP, vol. 2, 49)—there will inevitably be a tendency to maximum justice. This means, however, that no one in any society can make one person subservient to another. All that is pertinent only to nature can be used as means; all that which is proper to person, or to which persons have extended themselves so that some thing or things have become proper to them, must be respected as end. Here again, though, a distinction must be made between that is proper to a member of a society as a person, and the modality of that which is proper. In certain cases, the government of a society may change the modality of what is proper if this is for the common good. A piece of land required for a road may, for instance, be substituted with an adequate sum of money. But those things which have no modality, such as innocent life, cannot be violated under the pretext of common good. It is clear that these principles must direct the government of every society.\nRosmini also deals with the nature of the good which is the aim or end of society. For him, this good is human good which ‘resides in virtue and the eudemonological appurtenances of virtue, and in general in every good in so far as it is connected with virtue.’ He concludes, therefore, that every society, in so far as it is contrary to virtue, is illegitimate because its aim is contrary to the essence of society. At the same time, every law of society is invalid if, or in so far as, it prevents members from achieving virtue. ‘Without virtue there is no human good, the end for which society is established’ (PP, vol. 2, 189). But while anti-virtue is essentially detrimental to the good of any society, virtue of itself is not the only element forming the good in question. Contentment of spirit, that is, of the whole person, as distinct from passing pleasure confined to parts of human nature, is also included in every society’s essential aim. Anything, therefore, opposed to contentment is inevitably detrimental to society, whatever favour it may have found in public opinion. Rosmini finds support for this affirmation in Hamilton, whom he quotes approvingly (PP, vol. 2, 195).\nWhen occasions present themselves in which the interests of the people are at variance with their inclinations, it is the duty of the persons whom they have appointed to be the guardians of those interests to withstand the temporary delusion in order to give them time and opportunity for more cool and sedate reflection.\nPublic opinion, it would seem, is not an infallible criterion of public good.\nRosmini’s natural theology, in the conventional philosophical sense of natural theology, can be summarised under two headings: proofs for the existence of God, found scattered throughout his philosophical writings, and theodicy, developed at length in a work of that name. But it will also be considered, under the heading ‘Being’ according to the meaning given it by Rosmini.\n8.1 The existence of God\nIn his natural theology, Rosmini offers considerations which are consistent with the basic principles of his philosophical teaching. Although he does not deny the validity of a posteriori proofs of the existence of God, he affirms that an a priori method is more satisfactory because it sets off from the idea of being, the foundation of his philosophy, and argues to the necessity of God’s existence. First, however, he posits a fundamental barrier to the perception of God at a purely natural level of human nature. For Rosmini, what is real can only be perceived through feeling, which indeed is part of human existence but only at a finite level where it cannot be the vehicle of the perception of God’s infinite reality. Ideal being, however, while expressing only the possibility, not the reality of things, is shown on analysis to be characterised by necessity, eternity and immateriality, factors which are intrinsic marks of possibility. The idea of being, therefore, with its divine characteristics serves as a bridge between God and human beings, enabling us to posit proofs of God’s existence without our knowing him through perception, or real contact. One example of the a priori proofs may be given here. If infinite, intelligible being is present to the human mind—and Rosmini would maintain that it is—an infinite mind capable of giving this idea to humans must exist. But such a mind cannot not be God. In this and all similar proofs, there is a common mode of procedure. The existence of God is necessary for the existence of intelligible being; but intelligible being certainly exists; the existence of God is therefore necessary. Having determined the existence of God, Rosmini then makes use of divinely revealed truth as a basis on which to offer some reflections about the nature of what he has proved to exist. These reflections, he would maintain, lie within the scope of philosophy because they depend methodologically solely on reason, and conclude with rational, not authoritative affirmations. Their basis in revelation, however, precludes any examination of them here.\nRosmini provides an exact description of his aim in his work on theodicy. ‘Theodicy (theou dike) means “justice of God”. The intent of this work, therefore, is simply this: to justify God’s equity and goodness in the distribution of good and evil in the world.’ (Theodicy preface).\nHe also provides a clear indication of the method he will follow in the three books composing his Theodicy. The first prescribes the norms to be followed in judging about the disposition of divine providence if error is to be avoided; the second considers the laws of nature, the necessary limitations of what is created and the chain of causes operating in the universe; the third is devoted to the laws according to which God’s action takes place in the world he has created. These laws all spring from a single norm, the law of the least means, which Rosmini, following Aquinas, posits as follows: ‘The wise worker carries out his work in the briefest way possible’ (Sapiens operator perficit opus suum breviori via qua potest. ST, III, q. 4, art. 5, ad 3um). From this law, another ten are deduced whose titles provide a useful indication of their possible application. They are the laws of: excluded superfluity, the permission of evil, excluded equality, unity in the divine work, heroism, antagonism, rapidity in work, accumulation of good, and germ. These laws, according to Rosmini, are concerned with God’s providence relative to universal good. At the same time, but relative to particular good, the law followed is that of: supreme justice, equity, fittingness and conformity to God’s divine attributes. Divine governance consists in acting in such a way that the aspects of universal and particular good are harmonised.\nThe last nine years of Rosmini’s life, with the exception of 1848–9 when he was actively engaged in political affairs, were spent in great part working on his Theosophy (Teosofia). Despite its size (five volumes), this monumental work remained unfinished at Rosmini’s death and was published posthumously. The title itself, despite its obvious etymological implications, is today unhelpful. It would seem to indicate a philosophy ‘professing to achieve a knowledge of God by spiritual ecstasy, direct intuition or special individual relations’ (COD). Rosmini, however, is concerned here only with reasoning about God, and takes the word ‘theosophy’ in its fundamental meaning of ‘wisdom about God’ in so far as God is the supreme Being and the apex of philosophical speculation. Such speculation must sooner or later deal with the problem of the One Being and many beings, with unity and plurality in all their manifestations. In many ways, the book is a direct challenge to Hegel and Schelling with whose philosophy Rosmini had become thoroughly familiar as a result of the great editions of their works published in the 1830s and early 1840s. Kant’s teaching, already challenged in Rosmini’s A New Essay concerning the Origin of Ideas, was now to be opposed in what Rosmini perceived as the delirium and exaggerations of Kant’s Idealist successors.\nWhenever we try to reduce the whole human being to speculation, and substitute the part for the whole, we presume that all human good must lie solely in speculation. As result, we make every effort to turn what is real into an idea; we try to derive from the idea the matter which constitutes the sensible world, together with the Spirit and finally God himself… But although Schelling and Hegel claimed that they had reached such total science, they still needed to teach it publicly not only for the sake of attaining the practice of virtue (which would make it worthwhile), but even to draw a salary. This proves without doubt that their absolute idea did not contain everything. If the world were present in it, as they said it was, wheat, bread and wine would have been there also. My theosophy certainly cannot give the public such magnificent and wonderful promises, but it will explain how the speculative human mind is inclined to find everything in itself. In other words, it will demonstrate that there must be an object which contains effectively within itself the universality of things, and that this object is not the idea in our mind. Nevertheless, the idea which shines in the human mind draws its form as object from that object. Hence, because the idea also is per se object, we easily confuse it, in our speculation, with the complete, subsistent object. A strong desire then arises in us of attributing to the idea which we intuit the attributes of the subsistent object which we know must exist, although we do not intuit it. The tendency to unity, an essential element of every intellect, causes this error and forces us towards an abyss of unseen absurdities in the hope that these will satisfy our desperate purpose. We should acknowledge (and this theosophy will demonstrate) that if being itself has an objective existence, it is per se intelligible, and that if it contains everything (that which is not being is nothing), everything must also be contained in that which is intelligible. Theosophy will also clearly show that, although being must actually have this primal form, human nature cannot intuit the intelligible which contains all. Human nature arrives at this solely by reasoning, which can provide only a formal, negative concept of it. We cannot therefore have either the absolute knowledge which Schelling attributes to us through direct intuition, or the absolute idea which his disciple, George Hegel (who was opposed to all immediacy), promised us by mediate reasoning… (TH, vol. 1, Preface, 9–10)\nBut the main thrust of the work is positive, rather than critical.\nTheosophy will not be wasting time by demonstrating that behind this well-conceived and ingenious error [of Hegel] lies a great truth which those courageous speculative minds [Schelling and Hegel] tried in vain to grasp but could not. This truth is precisely the necessity I spoke of: there must be ‘something intelligible and eternal which contains everything’... Nevertheless, although absolute knowledge is proper to God but not to us, we do have an absolute knowledge relative to form, but not to matter (cf. NE, vol. 1, 325, 474–476). This kind of absoluteness of human knowledge caused errors in the German school, which I have already discussed. Theosophy must speak at length about absolute human knowledge, indeed it must use it and more importantly be it. Theosophy is simply the Theory of Ens (this definition is not to be despised, despite its being only two words). Because ens is first of all infinite and absolute, and only later enclosed and existing within limits as finite, no thought could attain it unless thought itself somehow became absolute. A thought informed by an object which is in some way absolute, is itself in some way made absolute. Plato therefore rightly called the treatise on what is greatest, the treatise about ens. There is nothing in the universe or in our mind antecedent to ens or being. When, in the order of things, we remove being, nothing remains except darkness in the order of cognition. For this reason the doctrine of ens, which I call ‘theosophy’, corresponds to the concept of philosophy in the ancients. According to them, philosophy differs from other sciences in that all other sciences suppose undemonstrated principles. Philosophy, however, which borrows nothing from anywhere, uses its own materials to construct itself. It starts from no gratuitous hypothesis or supposition—on the contrary, it seeks and establishes what is undemonstrable, which gives it an unshakeable basis, and admits only what is necessary (Ibid., 10–12).\nFor Rosmini, the problem of being is finally considered under the three divisions of the science of theosophy: ontology, rational theology and cosmology, each of which must enter into the other if the science is to be complete. In fact, he maintains, it is impossible to speak of being in all its universal essence (ontology), without regard to the infinity and absoluteness of Being (rational theology), just as it is impossible to consider the world philosophically (cosmology) without taking its cause into consideration. Each of the three divisions of theosophy is as essential to the whole as, according to his example, the various vital organs are necessary to the existence of an animal. But the centre and substance of the whole treatise is teaching about God, without which there is no final explanation of the being or the world. Theosophy, therefore, is a single science which, through its division into three parts, is both one and three. Such an affirmation is paradigmatic of the thrust of Rosmini’s theosophy which eventually enables him to confront this rational science with the doctrine of the Trinity.\nOntology, according to Rosmini’s description of it, considers being in all its universality, but only as the object of human thought which puts limited, intellectual beings in contact with the possibility of all that is, not with actuality (it is impossible, for instance, to assuage hunger by thinking about a meal). Thought must, therefore, reach out to absolute reality not through direct perception of God, but by means of concepts. Ontology, dealing with these concepts analytically and synthetically is, as it were, an immense preface to rational theology. Ontology as the theory of being in all its possibility is the necessary propedeutic to theology as the theory of absolute being without which ontology itself is inevitably incomplete, and cannot progress beyond a treatise on categories and on dialectic.\n9.2 Rational theology\nIf, as Rosmini suggests, ontology is the ‘theory of abstract being’, rational theology is the ‘theory of subsistent Being’. These two parts of theosophy cannot, however, can be distinguished only if the same universal concepts, of which both are formed, can in some way be differentiated. This is done by considering that ontology serves to find, review, and describe the nature and relationship of these concepts; theology, in Rosmini’s understanding, synthesises them to form a single concept of the infinite Being. It is true that such a concept remains abstract (the essence contained in the concept is not beheld by the knowing subject), but the ‘theologian’ passes from the concept to affirm subsistent Being, which is therefore no longer a mere concept, but something which must exist in itself. An effort is then made in rational theology to see how the ontological concepts have their truth and their foundation in first subsistent Being. While this takes place, the concepts themselves are identified and become one. Their separation, now considered anew, is seen to be relative not to first subsistent Being, but to the beholding, finite mind. The problem of the One and the many is rooted not in the nature of absolute, subsistent Being, but in being by participation.\nOntology, while a preface to rational theology, is also necessary for knowledge of the intimate nature of finite being and the world. Rosmini posits three reasons for this. First, although finite being is perceived, perception is limited to very few beings. If the essential conditions of this being are to be known, it is necessary to know the common conditions of all finite beings. This cannot be done without recourse to universal principles which enable us to deduce what is lacking to limited experience. Second, the same principles are needed to provide a notion of finite beings in themselves, divested of the sensory phenomena that accompany their perception. Third, subsistent Being, if known, would be intelligible per se. This is not the case with finite beings, which are known through their participation in intellectual light, and consequently remain unknown without some relationship to concepts.\nReferences in this article to Rosmini’s works use the following abbreviations:\n- NE A New Essay concerning the Origin of Ideas\n- IP Introduction to Philosophy\n- PR The Philosophy of Right\n- PP The Philosophy of Politics\n- TH Theosophy\n- Life Antonio Rosmini: Introduction to his Life and Teaching\n- CFD Congregation for the Doctrine of the Faith\n- COD Concise Oxford Dictionary\n- Opere edite e inedite di Antonio Rosmini. Rome-Stresa. 1966–. Città Nuova Editrice (80 projected volumes —including 19 of correspondence — of which approximately 40 have been published )\n- For a complete list of editions of all Rosmini’s published works in Italian or in translations, cf. Bergamaschi, Cirillo. Bibliografia degli scritti editi di Antonio Rosmini Serbati, 1815–1998, 4 vols., Milan-Stresa, 1970–98.\n- Cleary, D., Watson, T., and Murphy, R. (trans.), 2001, A New Essay concerning the Origin of Ideas. 3 vols. Durham: Rosmini House.\n- Cleary, D., and Watson, T. (trans.), Durham: Rosmini House.\n- Principles of Ethics. 1988.\n- Conscience. 1989.\n- Anthropology as an Aid to Moral Science. 1991.\n- The Philosophy of Politics.\n- vol. 1 The Summary Cause for the Stability or Downfall of Human Societies;\n- vol. 2 Society and Its Purpose. 1994.\n- The Philosophy of Right.\n- vol. 1 The Essence of Right. 1993.\n- vol. 2 Rights of the Individual. 1993.\n- vol. 3 Universal Social Right. 1995.\n- vol. 4 Rights in God’s Church. 1995.\n- vol. 5 Rights in the Family. 1995.\n- vol. 6 Rights in Civil Society. 1996.\n- Psychology. 1999.\n- vol. 1 Essence of the Human Soul.\n- vol. 2 Development of the Human Soul.\n- vol. 3 Laws of Animality.\n- vol. 4 Opinions about the Human Soul.\n- Theosophy. 2007.\n- vol. 1 The Problem of Ontology Being-as-one\n- vol. 2 Trine Being\n- vol. 3 Trine Being Continued\n- Grey, M. (trans.), 1887, The ruling Principle of Method applied to Education. Boston.\n- Murphy, R. (trans.), 2004, Introduction to Philosophy, Durham, UK: Rosmini House.\n- Signini, F. (trans.), 1912, Theodicy. 3 vols. London\n- Bergamaschi, Cirillo, 2001, Grande dizionario antologico del pensiero di Antonio Rosmini, (4 vols of explanations of words and phrases from Rosmini’s works in Rosmini’s own words), Rome: Città Nuova Editrice. [CD version available.]\n- Bergamaschi, Cirillo, 1967–96, Bibliografia Rosminiana, 8 vols, Milan-Stresa, (covers Rosminian bibliography in all languages from 1814–1995).\n- Cleary, Denis, 1992, Antonio Rosmini: Introduction to his Life and Teaching. Durham: Rosmini House.\n- Davidson, Thomas, 1882, The Philosophical System of Antonio Rosmini Serbati, London.\n- Pozzo, Riccardo, 1999, The Philosophical Works of Antonio Rosmini in Translation in American Catholic Philosophical Quarterly, LXXIII no. 4.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Internet Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.\nThe SEP editors updated this entry in 2015.", "label": "No"} {"text": "South Cliff Street\nWhen the village of Ansonia was founded in 1844, among its first residential neighborhoods was South Cliff street, located atop a stone-faced cliff extending 60 feet from the street below. The identity of the street seems to have been framed by the impressive houses and mansions that reflected the social standing and prosperity of the affluent families residing on the street.\nThe neighborhood served as the residence for Ansonia's industrialists, business, political and professional citizens, among whom were Arthur H. Bartholmew, first mayor; Charles Durand, Speaker of the CT House of Representatives; John Dearborn, manufacturer of screws and machine parts; George Schneller, President of S.O. & C. Company manufacturers of hoop skirts and shoe and corset laces; William Wallace, head of the Electrical & Supply Company; and Ralph Emerson, publisher of the Evening Sentinel.\nThe Library was opened in 1896.† The structure was designed by George Keller of Hartford, and was built with walls of Longmeadow Freestone.† The original roof of unglazed Red Spanish tiles has undergone a change.†The old clock tower that worked by pulleys and weights now operates electrically.†\nIn line with the clock tower is the crest of the sculpture of Minerva, the Roman Goddess of Wisdom, nestled in the gable above the heavy old oak doors that open to an entrance hall.† On the west wall in the entrance hall is a plaque with a bas relief of Caroline Phelps Stokesí grandfather.†\nFrom the west wall, stone steps lead up to the Ansonia Room.† This room is unique in its wealth of significant history and cultural information. Here, housed in a wooden and glass display case is the transit surveying instrument used in the development of Ansonia.†The water trough and hitching posts which were on the street curb for use of horses drawing carriages of patrons to see the new library, now is an outdoor sculpture scene on the left grounds of the library building. In August of 1985, the library became eligible to be placed on the National Register of Historic places as a site of significance in American history and architecture.", "label": "No"} {"text": "I bear the name of ibn-Khaldun, whose biography appears\nbelow. ``Haldun'' has no recognized meaning in modern Turkish.\nKhaldun comes from the Arabic root ``khalada'' (kh-l-d), meaning to remain\nor last forever, be everlasting; to be immortal, deathless, undying;\nto abide forever; to remain, stay. The noun \"khald\" means infinite duration,\nendless time, perpetuity, eternity (dar el-khald: paradise). Khaldi makes this\nnoun an adjective. Khaldun makes the adjective khaldi plural. Ibn Khaldun\nis a last name which means son of immortals. This is a typical way of\nforming a last name where the adjective refers to a place, an origin\nor an attribute; in this case, immortality. The given male name\nderived from this root is Khalid, which also means everlasting.\nIt is also interesting to note that form IV of the Arabic verb also\nmeans ``to dwell on an idea, an image''. Halit and Haldun are both\nused as male names and Halide is used as a female name in Turkish.\nSo essentially ``Haldun'' means ``of permanence'' or ``eternal,''\nnot a modest pseudonym!\nMy middle name ``Memduh'' was the name of my grandfather; this way of assigning middle names being of common practice. As for its meaning, I am informed that Memduh comes from the Arabic root ``medh'' or the verb ``medeha'' which essentially means to praise someone (``methetmek'' is recognized in Turkish as to mean the same), and memduh is the person being praised.\nI used to think (now I believe wrongly), that ``Memduh'' was a\nvariety of Mehmet, Mehmed, Mahmut, and so on, all based on the Islamic\nprophet Mohammed's name. These are common names in countries with an\nIslamic heritage, just as varieties of Christ's and other prophets\nnames are common in countries with other monotheistic\nheritages. (Incidentally, almost all such names, including Jesus,\nJoseph, Joshua, Solomon, Mary and what not are also common names in\nI was also told that in deriving words from Arabic roots, the order of the\nletters are never interchanged: Memduh which comes from the root m-d-h and\nMehmed which comes from the root h-m-d are not derivatives of each other.\n[I am grateful to Tijani Chahed (Tunisia)\nfor informing me of the Arabic meanings of Halid, Memduh, and Mohammed\nand to Hatice Orun Ozturk for correcting several mistakes in an earlier\nversion and making many suggestions which greatly improved this note.]\nMy last name is a compound. ``Tas'' means ``stone.'' ``Ak''\nmeans ``white.'' There are many people named ``Aktas,'' meaning\n``Whitestone.'' My name has the additional ``Oz'' in front which has\nno direct correspondence in English, neither as a word nor as a\nconcept. As an adjective it may mean ``pure,'' ``real,'' or ``essence\nof.'' As a noun it refers to the inner essence of something, that\nwhich gives it meaning or life or animation. If you pick up a phone\nbook anywhere in the world and look at the names starting with ``Oz,''\nmost will likely be of Turkish origin.\n[Abdurrahman Aktas has pointed out that his last name has a different\nmeaning than ``Whitestone.'' ``Ak'' also means ``flow'' and ``tas''\nalso means ``overflow,'' so ``Aktas'' also means ``Flow-and-overflow,''\nin the sense of a restless and energetic spirit. With this interpretation,\nOzaktas might be taken to refer to the flowing and overflowing of the\ninner essence or spirit.]\nIbn-Khaldun (1332-1406), Arabian historian and sociologist,\nwhose full name was Abu Zayd `Abd-al-Rahman ibn-Muhammad, was born\nin Tunis. Scion of a family of high officials at the courts of the\nsultans of North Africa, he served under the sovereigns of his\ncountry who ruled during his lifetime, as well as under the kings\nof Granada in Spain, as an adviser, a minister, and an ambassador,\nshifting from one master to the other with great ease, in spite of\ntheir rivalry or enmity. He finally retired in 1374, and in 1382\nmoved to Egypt, where until his death he occupied, with\ninterruptions, the position of a supreme judge of the Malikite\nSchool, one of the four systems of law officially admitted in\nFrom his long experience in political affairs ibn-Khaldun\nconceived the plan of writing a universal history arranged\naccording to the different dynasties of sovereigns in Muslim and\nforeign countries. His work, The Book of Examples (Kitab al-`Ibar),\nwhich bears the full title Book of Good Advice Concerning the\nEpochs of the Arabs, the Persians and the Berbers, and the\nSovereigns Who Were Their Contemporaries, and occupies seven thick\nvolumes, is a remarkable achievement in itself, although its author\ndoes not always succeed in sifting his sources critically. Ibn-\nKhaldun was, however, the only Arabian historian aware of the\nexistence of the Roman Republic (all other Arabian historians,\ndepending upon Byzantine sources, began the history of Rome with\nCaesar) and one of the few who ever made use of Latin and Hebrew\nauthors, as they appeared in Arabic translations.\nIbn-Khaldun's amazing penetration and originality appear,\nhowever, in the Introduction, or prolegomena (The Muqaddimah), to\nhis history, which is both a summary of Islamic sciences and a\ntheoretical approach to history. Antedating the European\nphilosophers of history by several centuries, ibn-Khaldun\nconsidered the succession of human events from a purely\nsociological viewpoint, emphasizing the contrast between nomadic\nand sedentary life; tracing the origin and development of social\nand political organization to the need for food, shelter, and\nsecurity; analyzing the racial and national motives that underlie\nthe birth and growth of states; carefully defining the various\nkinds of political establishments; and elucidating the reasons for\ntheir success, decline, and fall. Although attempts to study the\nprinciples of politics had been made in Islam before him, ibn-\nKhaldun's approach was entirely new: without denying God's\nintervention in the deeds and acts of mankind, he ignored it while\ndealing with his subject and proceeded on purely rational\nThe greatness of ibn-Khaldun's thought was recognized in\nEurope only at the beginning of the 19th century; since then much\nhas been written about his philosophy of history, but the subject\nis far from exhausted. His historical work has been translated, the\nhistory of the Berbers being available in French, and in 1958 an\nEnglish translation of the Muqaddimah was published in three\nvolumes in the Bollingen Series.\nG. L. Della Vida\nCopyright 1996 by P.F. Collier, a division of Newfield Publications Inc.\nSource: Collier's Encyclopedia, Item Number: IB01087400", "label": "No"} {"text": "Common names: woolly mullein; common mullein; lungwort; feltwort; torches; Jacob's staff; velvetplant; old man's flannel; miner's candle\nVerbascum thapsus (common mullein, woolly mullein) is a biennial or annual forb (family Scrophulariaceae) that occurs throughout California, but is particularly abundant in dry valleys on the eastern side of the Sierra Nevada. High population densities have been observed in moist meadows and creek drainages near Mono Lake and Owens Valley. Common mullein is a host for insects that are themselves economic pests. Common mullein seeds can survive for 35 years or more in the soil.Cal-IPC Rating: Limited\nPlant Assessment Form - Information gathered by Cal-IPC on the impacts, rate of spread, and distribution of invasive plants in California. Does not include management information.\nWeed RIC Management Notes\n- Management Notes - Information on management techniques and effectiveness from the University of California Cooperative Extension’s Weed Research & Information Center.\nCal-IPC Newsletter Articles\n- Wildland Weed News. Cal-IPC. Vol 23, Issue 2\nCal-IPC Symposium Presentations\nPresentations are linked where available. Where a presentation is not available, find more information by reading the abstract in the Cal-IPC Symposia Archive.\nThere are no Symposium presentations associated with this species yet.\nOther Verbascum thapsus Information\n- CalPhotos - Images of plants taken mostly in California.\n- Calflora - See the distribution of this species on Calflora's map of California.\n- CalWeedMapper - Distribution information with ability to determine regional priorities.\n- Jepson Online Interchange for California Flora - Information on taxonomy, biology, and distribution from UC Berkeley's Jepson Herbarium.\n- USDA PLANTS Database - Federal database with information on identification and distribution, and links to websites in individual states.\n- Bugwood - National database from the Center for Invasive Species and Ecosystem Health at the University of Georgia.", "label": "No"} {"text": "Nitrogen (N), phosphorus (P) and potassium (K) are critical components of a well-fertilized crop. But to achieve yields and more nutritious foods, crops need sulphur (S). This website is an introduction to sulphur and its important role in agriculture.\nSulphur is one of the 17 essential plant nutrients. It is essential for the growth and development of all crops, without exception. Like any essential nutrient, sulphur also has some key functions in plants:\nThe Sulphur Institute has recently increased programming promoting the use and importance of sulphur fertilizers. TSI staff has conducted interviews and developed print materials supporting this message. Click here to read more.\nSulphur deficiency symptoms resemble nitrogen deficiency: the leaves become pale-yellow or light green. Unlike nitrogen, sulphur-deficiency symptoms appear first on the younger leaves, and persist even after nitrogen application. Click here to read more.\nWhile soil tests for sulphur deficiency indicate the likelihood that a crop grown on that soil will benefit from or respond to sulphur application, the real proof is when on such soils, sulphur application actually increases crop yield. Click here to read more.\nMost sulphur-containing fertilizer materials generally can be divided into four groups: 1) fertilizers containing sulphate, 2) fertilizers containing elemental sulphur, 3) fertilizers containing a combination of sulphate and elemental sulphur, and 4) liquid sulphur fertilizers. Click here to read more.", "label": "No"} {"text": "What is a black widow?\nBlack widow spiders, also known by the latin name Latrodectus spp, are eight legged arthropods. They’re characterized by their shiny black color and the distinct red hourglass marking found on their bellies. Black widow spiders’ vary in size between the genders, with males measuring between 3 and 10 mm and females tending toward larger sizes up to 13 mm in length.\nThere are a few other black widow identification characteristics. They tend to be shy in nature and only socialize for the purpose of mating, which makes them particularly susceptible to being startled. They spin large webs with suspended cocoons during the night, as they are nocturnal, and if you see one it’s more likely than not going to be hanging upside down and showing off that tell-tale red hourglass shaped warning sign.\nAre black widows dangerous?\nYes! If provoked, female black widow spiders have been known to attack and possess the most toxic bite of any known spider in the United States. Within the first hour of a bite from a black widow spider, you’ll begin to feel dull muscle pain, swelling of the bitten area, and general discomfort, nausea, and perspiration – if you’ve been bitten and feel these things, go to a doctor to be treated immediately. While their bites are unlikely to be fatal, that does not mean that, if left untreated, they cannot become a serious problem.\nWhy do I have black widows?\nThis variety of spider likes to hide in dark, secluded areas of your home. Crevices, garages, basement corners, cluttered attics, woodpiles, and anywhere they can find that has the right dimness and protection they prefer. If you have piles of leaves, wood, or old boxes in areas of your home that are also dim and dark, then you have the perfect breeding ground for a potential black widow spider infestation.\nHow can I prevent black widow infestations?\nDon’t give them the environments they like to thrive in, including cluttered indoor and outdoor spaces. Keep seals on doors, windows, and all variety of entrance or exit in proper condition. Most importantly, if you ever see any webs or egg sacs in your home, immediately use a vacuum cleaner to remove them before eggs have a chance to hatch and spread infestations further.\nHow can Gregory Pest stop my pest problem?\nAn expert exterminator from Gregory Pest Solutions will be your full-service pest solutions provider. They specialize in the effective removal and prevention of black widows and their webs. All you have to do is give us a call.\nWhen you hire us to evaluate how extensive your home’s pest problem is, one of our pros will be sent to assess the spider situation and then formulate an environmentally friendly plan on how to get rid of the black widow spiders. Once we implement our plan, our experts can make recommendations for sealing any openings that are prime for black widows as well as any other variety of spider so that you and your family can enjoy a lasting pest-free environment.\nWhere can I get help with black widows?\nSometimes black widows find their way into your home or business. If you need help getting them out, Gregory Pest Solutions has you covered. Our pest prevention services are comprehensive and offered in each and every state listed below. Whatever you need, commercial or residential, we’ve got you covered.\nYou can use the form below to get in touch with our team of expert pest removal technicians. Schedule an appointment, give us a call, or request a quote today.", "label": "No"} {"text": "As millions of young Americans return to school, parents may overlook a seemingly simple part of their children’s days. Minors with prescriptions, even for controlled substances (CS) like medication for Attention Deficit Hyperactivity Disorder and prescription painkillers are often given unrestricted access to their medications. This unsupervised access may be tempting for some children, who may be coerced to give pills to friends, or to sell them for money. They may also be tempted to abuse the medication themselves, or be in danger of taking an incorrect dose.\nWhile one survey showed that few parents are concerned about the misuse of prescription pain medication prescribed to their children rates of medication abuse among youth have been cited as a serious concern. For example, a 2011 study showed that nearly 15% of high school students have misused prescription CS drugs.\nParents are encouraged to consult with their family health care providers about the proper storage and use of their children’s medications. AWARXE®, , the National State Boards of Pharmacy, provides information on storage and safe drug disposal on the AWARXE Web site, as well as information on safely administering medications to children on the “Safety Tips for Children” page. These tips can be helpful in ensuring that your children’s medications are stored and administered properly.\nThis also brings to mind another concern. Your medications. Often times children are home earlier than mom or dad and although we don’t like to think this would happen, some children’s drug habits start with their parents or grandparents medication while someone is not looking. Please keep all medications, especially controlled substances, in a secure location so as to discourage easy access. Far too often the worst of drug habits start with a simple curious sample of medication. By following proper tips on medications, proper storage and proper disposal, we can play a greater role in our children’s health, both today and for the future.", "label": "No"} {"text": "Serbia is located in the South-East Europe, on the Balkan Peninsula. Serbia is a landlocked country and therefore surrounded by: Montenegro, Albania and Macedonia in the South, Romania and Bulgaria in the East, Hungary and Croatia in the North and Bosnia and Herzegovina in the West.\nSerbia is the country of one of the most turbulent histories. In the 14th century, Serbian Empire fell under the rule of the Ottoman Empire and remained a part of it for almost 5 centuries. In the 19th century, Serbia regained its independence, but was soon afterwards occupied by the Central Forces (Germany, Austro-Hungarian Empire, Bulgaria and Ottoman Empire) during the First World War. After the First World War, Serbia entered an alliance on the Balkan Peninsula, and thereforeYugoslavia was born. During the Second World War, Serbia lost its independence again, which it regained after the end of the war. After the break off of Yugoslavia, all until 2006, Serbia remained together with Montenegro under the name of Serbia and Montenegro (SCG).\nCapital city: Belgrade (1.2 million inhabitants, wider city area is inhabited by 1.6 million people).\nSurface area: 88,300 km2.\nPopulation: 7.1 million inhabitants.\nCurrency: dinar (RSD).", "label": "No"} {"text": "The government’s plans to have an additional three million apprentices in place by 2020 are falling further behind, with the number of people starting their career as an apprentice dropping in England. Let’s look at the top facts about apprenticeships.\nAn apprenticeship combines classroom study with on-the-job practical training in business. Apprentices are employees. Most are aged under 25, and many work in construction and service industries.\nThe apprenticeship levy\nA radical shake-up to the way apprenticeships are funded was launched in April 2017, with critics saying it discourages some businesses from recruiting apprentices. The levy is a tax on larger employers, measured by payroll bills, with bigger businesses paying more. Payroll bills of £3m+ are charged 0.5 per cent, which goes into a central apprenticeship pot. The estimated £2.8bn the levy could raise in 2018 looks increasingly unrealistic now, as the numbers are down.\nIn the three months between August and October 2017, there were 114.4k apprenticeship starts in England. This was a drop of 30 per cent from the same period the previous year.\nConfusion for employers\nIt was thought that around two per cent of employers would be eligible for the levy, although many employers are not sure whether they have to pay. In reality, a survey by the Chartered Institute of Personnel and Development (CIPD) puts the number currently paying the levy much higher at nearly one in three.\nHealth, care and other public services are the most popular programmes, closely followed by business and law. Many young people are tempted into industry by a route that does not have the academic focus of going to university but will eventually get them to the same place, giving them work experience at the same time.\nEngineering and manufacturing continue to be popular choices, with a similar number of starts in retail and commercial positions.\nWomen are embracing the practical route, with more female than male apprentices starting a new programme every year since 2010. In 2016-7, women accounted for 54 per cent of all new apprentices; however, the gender divide is reversed when it comes to wages, with men earning an average of £7.10 per hour and women just £6.85.\nIn many cases, this is largely industry-related, with fewer women taking on STEM (science, technology, engineering and maths) apprenticeships; STEM industries often have a higher average salary. Groups such as the Young Women’s Trust are calling for more to be done to encourage women into these male-dominated industries and to make them more accessible.\nMore apprentices are completing their programmes than ever before. Despite an overall drop in the number of apprenticeship starts, the number starting a higher-level apprenticeship is growing. ‘Advanced’ apprenticeships are equivalent to two A levels on completion, while ‘higher’ apprenticeships work at foundation degree level – and even bachelor’s – without having to pay the tuition fees that a university route would command.\nOther parts of the UK operate their apprenticeships slightly differently to England, with both Wales and Scotland offering foundation level apprenticeships. In Northern Ireland, anyone with A levels is eligible to start a higher-level apprenticeship, which enables people to work while gaining a degree-equivalent qualification.\nRecruiters love this COMPLETE set of Accredited Recruitment & HR Training – View Training Brochure", "label": "No"} {"text": "Steel consists in the majority of iron but with high levels of carbon e.g. 4% removed and a controlled amount remaining. The amount of carbon in the steel is very important to the way the material behaves after heat treatment. Table 1 gives some indication of these properties.\nVarious additives are used to improve the basic carbon steel properties; for example molybdenum is used to improve the hot strength and hardness, nickel improves toughness and ductility. The different properties required of the steel for different uses (e.g. hammer head, car body) will dictate the type of steel used and the way it is treated by controlled heating and hot and cold rolling. Table 2 gives further details on steel additives.\nMolten iron from the blast furnace is transported in specialized refractory brick lined ‘torpedoes’ on rail cars (varying in capacity from 200-450 tonnes) to the BOS plant where the iron is refined to produce steel of desired quality and composition.\nAt the BOS plant, the iron is treated in two stages; firstly to remove carbon and secondly to receive additives which modify the steel’s properties.\nIn the first stage, the iron is mixed with scrap and fluxes, agitated with inert gas and burned with oxygen until required carbon levels are reached as measured by dip-sampling probes. This oxygen ‘blowing’ process is in large tilting vessels called converters. In the modern steelworks it is typical to see BOS vessels able to convert 350 tonnes of metal in one ‘blow’. A converter vessel itself, see Figure 1, would weigh 650 tonnes. Typically, a BOS plant has two or three converters available for converting iron to steel, with usually one or two in operation at a time and occasional operation of multiple converters simultaneously.\nIn the second stage, the raw steel is mixed with additives in smaller vessels, and receives a short ‘blow’ cycle prior to casting in the CONCAST (CONtinuous CASTing) plant.\nImpurities within the iron due to the powerful reducing conditions of the blast furnace have to be removed by oxidization. Residual carbon and silicon are oxidized with the help of the added basic fluxes.\nBOS is a sequential process centering around the converter positioning and contents processing. Automation of the total process is possible from centrally stored process recipe information to the front end instrumentation, while still allowing manual intervention and re-processing steps.\nThe converter is a vessel that tilts 180° from the upright vertical on the charging side, and over 90° on the tapping side. The converter is tilted to one of several pre-determined angles during the sequence as shown in Figure 2.\nThe converter is rotated to its charging position to be loaded with scrap metal (50 tonnes), molten iron (300 tonnes), lime (15 tonnes) and the ‘basic’ fluxes magnesium and limestone (6 tonnes).\nThe converter returns to the vertical and the main lance lowers, injecting oxygen at high velocity onto the molten metal surface for 15 to 20 minutes.\nAfter injecting a pre-determined quantity of oxygen, the ‘blow’ is complete and the main lance is withdrawn. At 80% and 100% oxygen flows as calculated by a thermochemical model, a sub lance is lowered to measure temperature which is used to calculate carbon arrest.\nAssuming that temperature and sample analysis are acceptable, the converter is rotated from vertical to tapping position.\nAfter tapping, the converter is rotated back to its slag position for emptying occasionally, returned to the vertical for addition of thickeners, then gently rocked for slag-wash prior to emptying which is conducted by taking the converter to the opposite (180°) vertical position.\nPractically, there are other intermediate steps depending on other variables. For example:\nThroughout the cycle, inert gases such as nitrogen and argon (during blow and re-blow) continuously flow to agitate or stir the converter contents, and to keep the converter stirring elements clear for the duration of the converter campaign.\nThe result is steel of very low carbon content. The percentage needed for the type of steel being manufactured will be higher than this, so a controlled amount of carbon is added to meet the specification.\nAfter the metal has been poured, the cycle starts again and if no problems delay the steelmakers, typically 8 ‘blows’ will be achieved in one shift of 8 hours producing nearly 3,000 tonnes of steel.\nTo stir the converter contents, Argon or Nitrogen is injected through a number of cans on the converter base as shown in Figure 3. The total flow and type of gas for each sequence step are pre-determined from the loaded recipe for the current blow. Figure 3 BOS bath agitation control\nThe total flow is divided equally to a number of controllers, one for each can to maintain an even distribution, and becomes the controller remote setpoint. The measured flow is mass-compensated for temperature and pressure for each can and gas type and input to the control module. The 4-20mA control output then modulates the valve position.\nIf the can becomes covered with heavy slag, the downsteam pressure increases. Should it increase beyond a preset limit, control changes from flow control to pressure control and the control valve then responds to a different control algorithm. On reduction of pressure (less a hysteresis value), control reverts to flow control. Changeover between control modes is automatic and bumpless, as the non-active loop tracks the output of the active loop.\nThe converter is positioned to the desired angle by comparing the corresponding absolute desired angle with the absolute actual angle and driving the positioning motors in the correct direction.\nThe positioning motors are driven progressively at increasing and subsequently decreasing speeds according to the error size and time intervals until the position is within the tolerance band set.\nThe BOS process uses expensive gases (Argon, Oxygen and Nitrogen) and the accurate measurement and totalization of these gases assists economic operation and tight quality control by using these values in the generation of spreadsheet reports and logs.", "label": "No"} {"text": "Bleeding hemorrhoids are said to be the most terrible form of hemorrhoids. Hemorrhoids are, however, not the only cause of rectal bleeding. Anyone who has symptoms of rectal bleeding should consult a doctor at the earliest. Depending upon the results of the investigation, the doctor will pronounce whether the hemorrhoid is internal or external. Normally, external hemorrhoids do not lead to bleeding. Symptoms of bleeding hemorrhoids may include irritation, itching, fissures, abscesses, fistulae or other anorectic problems. Remember, bleeding hemorrhoids are likely to be internal.\nWhat is Bleeding Hemorrhoids?\nBleeding hemorrhoids may occur inside or outside the anus caused by increased pressure on venous plexus in the rectal region. While some types of hemorrhoids may be cured through minimally invasive treatment, bleeding hemorrhoids is a chronic condition that requires serious attention. The main signal of bleeding hemorrhoids is the discharge of blood internally or externally. Individuals suffering from this condition usually experience release of blood during bowel movement, find blood in the toilet bowl and on the toilet paper.\nIt is important to get the problem evaluated by a doctor as soon as it occurs. Bleeding hemorrhoids is likely to get worse in case of constipation or diarrhea. This is because sitting for long hours on the toilet seat and straining during bowel movement increase pressure on the veins causing increased bleeding. Bleeding hemorrhoids is a very uncomfortable condition and may also cause pain and itching in the anus.\nTo treat bleeding hemorrhoids, drugs aimed at reducing inflammation are generally prescribed. To avoid discomfort, home remedies can also be tried. Positive lifestyle changes can also bring some relief.\nMedical Treatment for Bleeding Hemorrhoids\nThe treatment of bleeding hemorrhoids must be followed only after a firm diagnosis. Bleeding hemorrhoids generally do not lead to anemia; however, it may be a sign of colon or rectal cancer in some cases. It can be treated using over-the-counter medications like hydrocortisone creams. This may be helpful is preventing the condition from worsening and alleviating itching and swelling in external hemorrhoids. Internal hemorrhoids\ncan be treated using suppositories.\nIt is advisable to not consume aspirin and other anti-inflammatory medications. This is because such medication tends to increase bleeding from the hemorrhoids. There are a number of treatments available that are aimed at treating bleeding hemorrhoids. Some of these are as follows:\n- Injection sclerotherapy, which involves injecting a chemical solution around the blood vessel that leads to the shrinking of the hemorrhoid\n- Laser coagulation\n- Infrared photocoagulation, which is a special device used to burn hemorrhoidal tissue\nBleeding hemorrhoid is often treated through surgery. Rubber band ligation and laser surgery are some common methods of treating bleeding hemorrhoids. The procedure followed during rubber band ligation involves placing a rubber band around the base of the hemorrhoids. It is placed inside the rectum. This results in loss of blood supply to the infected area, causing the hemorrhoid to wither and fall off in a few days. The purpose of laser surgery is also to stop blood supply to the hemorrhoid, causing it to shrivel. Laser surgery is relatively less painful, but more expensive. In case of extensive internal or external hemorrhoids\n, hemorrhoidectomy is the ultimate solution.\nAlternative therapies, such as homoeopathy and herbal treatment, can also be used to treat bleeding hemorrhoids, apart from allopathic treatment. Change in diet and bathroom habits also provide relief from bleeding hemorrhoids. Intake of fibrous diet helps in softening the stool, preventing strain during bowel movement, relieving constipation and ultimately helping with bleeding hemorrhoids.", "label": "No"} {"text": "With the anticipated return of ospreys to the area in the coming weeks, Met-Ed utility personnel partnered with its environmental staff and wildlife officials to proactively remove a large, unoccupied osprey nest from a substation in Upper Mount Bethel Township.\nBirds of prey like ospreys and eagles often seek out tall structures, including electrical substations and utility poles to build their nests, which can measure up to three feet in width. These nesting habits often place the birds near energized electrical equipment – jeopardizing their well-being and potentially causing power outages.\n“Ospreys typically arrive in Pennsylvania in late March and return to the same nesting sites from the year before,” said Amy Ruszala, an environmental scientist and avian expert at Met-Ed’s parent company, FirstEnergy Corp. “That’s why it was important for us to take advantage of their absence in the winter and remove unoccupied nests that are situated on our equipment.”\nThe nest was originally believed to belong to a bald eagle because the bird had been recently perching and hanging around the nest. Because of the tight environmental regulations pertaining to nest removals, the company consulted with the U.S. Fish and Wildlife Service to conduct a 10-day survey of the nest. Their findings were consistent with those of FirstEnergy – the nest was inactive and belonged to an osprey.\n“Had the nest truly been an eagle nest, the pair would likely have begun using it with the start of the current breeding season, since the ospreys were presumably absent,” said Ruszala.\nMet-Ed utility personnel also teamed up with the Pennsylvania Game Commission and Northampton County Parks & Recreation Division to install an osprey nesting platform on top of a 60-ft. pole at Totts Gap Conservation Area in Upper Mount Bethel Township. This structure will help prevent electrical service disruptions by discouraging the birds from nesting on poles with energized equipment.\nWhile the birds were south for the winter, utility personnel from Met-Ed's sister company, Penn Power, also worked closely with FirstEnergy’s environmentalists to install single fiberglass crossarms on utility poles that had nesting issues due to the wooden, double crossarms. Ospreys are a month away from their peak breeding season and will lay their eggs between April and July.", "label": "No"} {"text": "Engine vacuum tests are another great method of pinpointing engine problems as well as determining the overall health of your vehicles power plant. Manifold vacuum is tested with a vacuum gauge.\nThe downward movement of the piston forms vacuum during the intake stroke. If the cylinder is properly sealed a maximum amount of vacuum will be formed. This will also improve the volumetric efficiency and the power created by the engine. Why not make sure you are getting the most out of the intake cycle. You can interpret or identify many engine conditions by monitoring vacuum.\nYou can test for proper valve timing, that works together with the spark or ignition timing to insure proper combustion. If the base timing setting is retarded ( opposite of advanced ) a low steady reading can be observed on the test gauge.\nYou can also verify a free-flowing exhaust system with no clogs or restrictions. This is a great way to pinpoint the problem without having to drop the exhaust. A clogged exhaust will show on the vacuum gauge as a low and steady reading that decreases, with increasing part throttle engine rpm.\nA common restricted exhaust problem would be a collapsed catalytic converter. Ideally, each cylinder of an internal combustion engine will produce the same amount of vacuum. This is why the vacuum gauge readings should be steady and give a reading of at least 18 to 20 at closed throttle.\nIf one or more cylinders produce less vacuum than the others the needle of the tester will fluctuate. When performing the engine vacuum test the intensity of the fluctuation of the needle indicate the severity of the engine problem.\nFor example, if the reading on the vacuum gauge fluctuates between 9 and 19. You should then look at the rhythm of the needle. If it stays at 19 inches of mercury but drops to 9 and then quickly rises we know that reading is probably caused by a problem in one cylinder.\nIf the gauge reads low all the time let's say a reading of 10 inches and has no fluctuation. This would be a good or strong indication of a clogged exhaust system or large vacuum leak.\nThis could be an intake manifold gasket failure or a broken hose. As I touched on above an exhaust malfunction can include problems like clogged converter, restricted muffler a smashed or damaged pipe or even vandalism such as the old banana up the tail pipe trick. If you disconnect the exhaust system in front of the catalytic converter and the vacuum returns to full strength, this would verify a clogged catalytic converter or other parts behind it.\nStuck or burned valves and weak valve springs can cause in proper sealing of the combustion chamber. Therefore providing low test results. If you think this applies to your vehicle I put a page together about the old fashioned valve job.\nUneven compression caused by worn piston rings or damage cylinder walls can also cause a fluctuating vacuum reading. Leaking cylinder head gaskets can also lower the ability of your engine to create vacuum. And of course a manifold vacuum leak will also affect the readings. Engine vacuum testing is a cheap and easy diagnostic step in the right direction.\nitself can be found for less than $20. The tests procedure is basically\njust connecting the gauge to a strong manifold vacuum source. Most\nengines will have a few places where you can pull a vacuum line off the\nmanifold and insert the vacuum tester. I have also used the hose that\ngoes to the power brake booster for a quick test. Just make sure that\nyou reconnect the hose before driving the vehicle.\nBookmark or share this engine vacuum testing procedure resource page.\nIf you need help with your engine troubles consider asking a professional auto mechanic. For more information on this service visit my page about car repair help.\nWhen it comes to learning about automotive engines and how to perform simple inexpensive testing I have some more information that may prove helpful. This next link takes you from engine vacuum tests to engine diagnosis repair.\nIf you would like more information on how to test for engine problems on your specific vehicle take a look at my online car repair manuals page. Here you can see a video of the auto repair program in action.\nLearn more about the car mechanic that built this auto repair website. Also find more information about what is covered on this website that provides automobile repair advice.", "label": "No"} {"text": "In this paper I would like to compare and contrast 3 doctrines in the Chinese tradition. In Chinese history, Taoism and Buddhism are two great philosophical and religious traditions along with Confucianism. Taoism, originated in China around the sixth century B.C.E. and Buddhism, came to China from India around the second century of the Common Era. We can say that together they have shaped Chinese life and thought for nearly twenty-five hundred years.\nEastern society is an enigma to many Westerners. Its cultural and technical traditions vary so greatly from those of western thought. What influences shaped China, the largest eastern civilization? It is said that the basis of western thought stems from the ideas and principles set out by Socrates and Plato and their contemporaries. In a similar vein it can be said that Confucian and Taoist principles are the basis of eastern thinking. Blending with Buddhism these doctrines shaped Chinese culture and traditions along Chinese social and political life.\nIt may not be so evident today, as technology shrinks our world, and western thought, carried on the back of commerce, invades the east, but Confucianism, Taoism and Buddhism are the principle philosophies and belief systems that shaped ancient and dynastic China, both culturally and politically.\nThe original believers, most of whom where Chinese believed that there are three basic dimensions related to the living of life:\n-The search for spirituality in the inner self and its relation to the world that is the province of Buddhism.\n-The right relations with one's neighbor which is the province of Confucianism.\n-The right relations with the cosmos which is the province of the Taoism.\nThese three belief systems are not mutually exclusive so that Taoism deals with one's relations with one's neighbor, and Buddhism deals with one relations with...", "label": "No"} {"text": "A number of insects can cause damage and irritation to horses. These insects include biting flies, nuisance flies, lice, and bots. Occasionally other arthropods such as mites and ticks may cause problems.\nSeveral types of biting flies bother horses. These include mosquitoes, black flies, deer flies, horse flies and stable flies. Of these pests, the stable fly is probably the most important biting fly pest during the summer.\nBoth male and female stable flies feed on blood. They are persistent feeders that cause significant irritation to the host animals. Adults are approximately 1/3 inch long and resemble house flies. Females stable flies deposit clusters of up to 50 off-white coloured eggs at a time. A single female can lay up to a thousand eggs during her lifetime. Stable fly larvae have a typical maggot shape and are similar to those of the house fly. There are three larval stages. The last stage larva is about 2/5 inch long and is a cream/white color. After the third stage larva finishes feeding, it shortens, hardens and darkens in color.\nStable flies will feed on blood from practically any warm blooded animal including horses, humans, pets and other livestock. Peaks of feeding activity commonly occur during the early morning and again in the late afternoon. Stable flies prefer feeding on lower parts of the horse such as the legs and belly. Both male and female flies feed on blood; the female requires blood meals to produce viable eggs. Eggs are deposited into a variety of decaying animal and plant wastes but are rarely found in fresh manure. Larval development requires 11 to 21 days, depending on environmental conditions. Mature larvae then crawl to drier areas to pupate.\nStable flies are active during the summertime and are one of the most important pests of horses and livestock. Stable flies prefer to feed outdoors and rarely are found feeding or resting indoors. These flies are strong fliers and dispersion from one livestock facility to the next is common. They remain active into October. However, larval development slows as autumn temperatures decrease. At temperatures near freezing, larvae can survive but continue to develop slowly in habitats such as manure where fermentation generates heat.\nHorse and Deer Flies\nHorse and deer flies are large biting flies which can inflict painful bites on horses and humans. Several species may become abundant enough to constitute a problem for grazing horses, particularly animals near stream or low wet areas. Further, because the bite is painful, horses may become restless and unmanageable when they attempt to ward of attacks by these flies. Immature larval horse flies are aquatic or semi-aquatic and the last stage lava overwinters. Life cycles are long, most species have only one generation per year and some species may have a two year life cycle. Only female flies feed on blood. Control is difficult; individual animal treatment using repellents or insecticidal sprays may reduce fly bates.\nBlack flies are small, long, humped-backed biting flies which can produce large populations in the spring and early summer, particularly in pasture areas along streams. The immature stages are found in flowing water. Pupation occurs under water and the adults float to the surface, ready for flight, feeding and mating. Adult feeding on horses and other animals can pose serious animal health problems and the irritation caused by black fly bites can make horses unmanageable. Anemia may occur in the vertebrae host as a consequence of black fly feeding on its blood when the black fly population is high. Bites may cause severe reactions such as toxemia and anaphylactic shock; these reactions can result in death. Control is difficult, species which feed in the ears of horses can be controlled using insecticidal applications or by using petroleum jelly in the interior of the horses ear. When possible at-risk horses should be stabled during the day and pastured at night. Black flies only feed during daylight hours and do not usually enter stable areas. Area sprays or general topical applications of insecticides are not very effective.\nBiting gnats can be a serious pest to horses. Blood loss and irritation associated with the feeding of these very small, blood feeding flies can be very significant. Direct treatment of horses with wipes or sprays containing insecticides or repellents may provide relief for the horses.\nThe horn fly is normally a pest of grazing cattle. However, when cattle and horses are pastured together this fly will also feed on horses. Horn flies are about half the size of stable flies. The horn fly usually remains on the host animal almost continually, both day and night. Females lay eggs on fresh cattle droppings. Control of horn flies on cattle using established treatment methods such as self-treating devices provides the best approach to this problem if horses are pastured with the cattle. Sprays or wipes can be used successfully on horses.\nStable Fly Management\nA sound sanitation program is of paramount importance to fly control. Control of stable flies in stables usually incorporates several methods. These methods also apply for the house fly. Chemical control directed at larval and adult stages of both insects is usually required periodically during the fly season.\nSanitation around stable\nThe basic aim of a sanitation program is to reduce or eliminate larval development sites on the yard. A number of areas require attention because of the varied habitats suitable for larval development of these flies. Manure management is essential in limiting fly production. Timely spreading of manure promotes drying and prevents larvae from developing. Even small areas, where manure mixes with straw, are ideal breeding sites for large numbers of both stable and house flies. Wet areas where manure, mud and plant debris accumulate also form ideal breeding habitats for these fly species. Improvement of the drainage systems around stables can eliminate these fly reproduction sites and make chemical control efforts much more successful.\nA variety of chemical control techniques are available to the horse owner. Generally, control of adult flies using residual insecticides as surface treatments and knock-down sprays to kill existing adult flies are the most effective techniques. In stables a combination of residual and space sprays is used, often on an alternative schedule. Treatments applied directly to horses are not as effective for control of stable or house flies as residual surface treatments. In practice, both techniques are usually needed. It is important to always follow the label recommendation for rate and frequency of any pesticide treatment.\nDirect animal applications of sprays and dusts may be used in some situations to protect animals. Products used for direct animal application usually have short residual activity and this type of application is labor intensive.", "label": "No"} {"text": "Event location: WCML\nRuns: From 20th Nov 2015 to 14th Apr 2016\nEvent time: 13:00 to 17:00\nAn exhibition marking the centenary of the introduction of conscription in early 1916.\nThe north-west had a vigorous anti-war movement from 1914 onwards. This exhibition looks at some of those involved, both men and women, who fought for peace. Bill Chadwick from Westhoughton and Hugh Hutchinson from Bolton, whose stories were previously known only to their families, can now take their place amongst more famous names. Documents from the Hyde branch of the No-Conscription Fellowship, a unique collection held by the Library, are also on display. This is an alternative narrative of the war that deserves to be remembered as much as we commemorate those who fought and died.\nExhibition opening times: Wednesdays to Fridays 1-5pm and the first Saturday of the month 10am-4pm.\nThe Library is extremely grateful to the Heritage Lottery Fund for the funding for this project, awarded through HLF’s First World War: then and now programme.\nA specially-written 'Living History' performance, No Power on Earth, will accompany the exhibition thanks to the Heritage Lottery Fund. Based on the true story of Salford man, James Hudson, this monologue tells the story of an ordinary school teacher at the start of the First World War who finds himself at odds with the popular mood. The story, scripted and directed by Sue Reddish, celebrates his courage to stay true to his beliefs despite considerable pressure, and asks the audience to consider what they would do in such a circumstance.\nWe are delighted to announce that Joel Parry (to be found on Twitter at @ will be playing the part of James Hudson.\nThe 30-minute free performance can be seen at the Library on Wednesday 2 March at 1pm and Saturday 5 March at 12.30pm. It will also be put on in Salford schools during February.", "label": "No"} {"text": "Cartesian to Spherical Coordinates Calculator\nCartesian (Rectangular) to Spherical Coordinates System Diagram\nThis spherical coordinates converter/calculator converts the rectangular (or cartesian) coordinates of a unit to its equivalent value in spherical coordinates, according to the formulas shown above.\nRectangular coordinates are depicted by 3 values, (X, Y, Z). When converted into spherical coordinates, the new values will be depicted as (r, θ, φ).\nTo use this calculator, a user just enters in the (X, Y, Z) values of the rectangular coordinates and then clicks the 'Calculate' button, and the spherical coordinates will be automatically computed and shown below.\nThis calculator can be used to convert 2-dimensional (2D) or 3-dimensional rectangular coordinates to its equivalent spherical coordinates. If desired to convert a 2D rectangular coordinate, then the user just enters values into the X and Y form fields and leaves the 3rd field, the Z field, blank. If desired to convert a 3D rectangular coordinate, then the user enters values into all 3 form fields, X, Y, and Z.\nBy default, the calculator will compute the result in degrees. However, by using the drop-down menu, the option can changed to radians, so that the\nresult will be computed in radians.\nExample With Rectangular (Cartesian) Coordinates\nConvert the rectangular coordinates (2, 3, 8) into its equivalent spherical coordinates.\nThis answer is calculated in degrees.\nCartesian (Rectangular) to Cylindrical Coordinates Calculator\nCylindrical to Cartesian Coordinates Calculator\nCylindrical to Spherical Coordinates Calculator\nSpherical to Cartesian Coordinate Calculator\nSpherical to Cylindrical Coordinate Calculator", "label": "No"} {"text": "You may see a mess, but but birds see this.\nSeeds! Food, glorious food!\nMaybe they haven’t gotten around to picking them out, but they will if you let the flower stalks stand.\nHere’s a close up of part of a native plant.\nThat’s the only hint I’m giving for this week’s mystery!\nSee you later!\nDoes this help any?\nOur close up is the seeds of a Common Milkweed, lined up in their pod before the wind and weather have lifted them by the fluff and blown them to a new growing location.\nMonarch butterflies and other insects are lucky enough to have stands of milkweed on the Reston National Golf Course and many other open space meadows in Reston.\nHey there! Got a good one for you this week, something seen quite commonly in our suburbs.\nGive it a guess!\nThis common wildflower is one of the many Goldenrod or Solidago species that claim old field habitats, roadsides or sunny wood edges. It bloomed in late summer and over the fall months, but we just never caught a photo until it dried up. Here’s what you humans will see if you’re rushing by.\nMaybe stop for a closer look next time you see those dried up plants. That’s what Nutmeg is always bugging me to do!", "label": "No"} {"text": "Alain LeRoy Locke\nAlain LeRoy Locke is heralded as the “Father of the Harlem Renaissance” for his publication in 1925 of The New Negro—an anthology of poetry, essays, plays, music and portraiture by white and black artists. Locke is best known as a theorist, critic, and interpreter of African-American literature and art. He was also a creative and systematic philosopher who developed theories of value, pluralism and cultural relativism that informed and were reinforced by his work on aesthetics. Locke saw black aesthetics quite differently than some of the leading Negro intellectuals of his day; most notably W. E. B. Du Bois, with whom he disagreed about the appropriate social function of Negro artistic pursuits. Du Bois thought it was a role and responsibility of the Negro artist to offer a representation of the Negro and black experience which might help in the quest for social uplift. Locke criticized this as “propaganda” (AOP 12) and argued that the primary responsibility and function of the artist is to express his own individuality, and in doing that to communicate something of universal human appeal.\nLocke was a distinguished scholar and educator and during his lifetime an important philosopher of race and culture. Principal among his contributions in these areas was the development of the notion of “ethnic race”, Locke's conception of race as primarily a matter of social and cultural, rather than biological, heredity. Locke was in contemporary parlance a racial revisionist, and held the somewhat controversial and paradoxical view that it was often in the interests of groups to think and act as members of a “race” even while they consciously worked for the destruction or alteration of pernicious racial categories. Racial designations were for Locke incomprehensible apart from an understanding of the specific cultural and historical contexts in which they grew up. A great deal of Locke's philosophical thinking and writing in the areas of pluralism, relativism and democracy are aimed at offering a more lucid understanding of cultural or racial differences and prospects for more functional methods of navigating contacts between different races and cultures.\nLocke, like Du Bois, is often affiliated with the pragmatist philosophical tradition though somewhat surprisingly—surprising because Locke's actual views are closer substantively to pragmatist thinkers Like Dewey, James, and Royce than are Du Bois's—he does not receive as much attention in the writings of contemporary pragmatist philosophers as does Du Bois. Regardless, he is most strongly identified with the pragmatist tradition, but his “critical pragmatism”, and most specifically his value theory, is also influenced by Hugo Münsterberg, F.S.C. Schiller, Alexius Meinong, Frantz Brentano, and Christian von Erhenfels. From early on in his education at Harvard University, Locke had an affinity for the pragmatist tradition in philosophy. Locked developed his mature views on axiology well in advance of many leading pragmatists—e.g., Dewey and James. Among pragmatists, Locke has arguably the most developed and systematic philosophy of value, and offers many critical insights concerning democracy.\n- 1. Chronology\n- 2. Axiology/Value Theory\n- 3. Pluralism\n- 4. Relativism\n- 5. Aesthetics\n- 6. Philosophy of Race\n- Academic Tools\n- Other Internet Resources\n- Related Entries\n|1885||Born Arthur Locke September 13 to Pliny Ishmael Locke and Mary Hawkins Locke in Philadelphia, PA.|\n|1902||Graduated from Central High School in Philadelphia during that same year Locke was afflicted by rheumatic fever, which did permanent damage to his heart.|\n|1904||Graduates with Bachelor of Arts degree from Philadelphia School of Pedagogy first in his class. Publishes “Moral Training in Elementary Schools,” his first known publication.|\n|1904–07||Locke attends Harvard University, earning his second Bachelor of Arts degree and graduating magna cum laude. During his time at Harvard Locke was elected to the Phi Beta Kappa Honor Society and studied under Josiah Royce, George Herbert Palmer, Hugo Münsterberg, and Ralph Barton Perry. Though he was a member of the faculty at the time Locke never actually studied with William James. While at Harvard Locke received the Bowdoin Prize in English for an essay composed on Tennyson entitled “The Prometheus Myth: A Study in Literary Tradition.” It was while at Harvard that Locke first met Horace Kallen, who worked as an instructor.|\n|1907–09||In 1907 Locke was chosen as the first-ever African-American Rhodes Scholar. Even though he held a right to admittance to an Oxford college as a Rhodes Scholar he encountered some difficulty in this regard until he was finally admitted to Hertford College. While at Oxford Locke studied philosophy, Greek, and literature. It was while at Oxford as a Rhodes Scholar that Locke first met and became friends with Pixley Ka Isasha Seme. In 1907 and 1908, Horace Kallen was also at Oxford as a Sheldon Scholar.|\n|1910–11||Following his studies at Oxford University and before returning to Harvard University to complete his PhD, Locke studied at the University of Berlin under the German sociologist Georg Simmel, where he was reacquainted with his Harvard professor Hugo Münsterberg. While at the University of Berlin Locke deepened his interest in value theory, particularly in the work of theorists such as Alexius Meinong, Christian Freiherr von Ehrenfels, and Frantz Brentano.|\n|1912–14||Appointed as assistant professor of English, philosophy, and education to Teachers College at Howard University.|\n|1915||Gives a series of lectures to the Howard chapter of the NAACP on the scientific study of race and race relations entitled “Race Contacts and Interracial Relations: Lectures on the Theory and Practice of Race.”|\n|1917||Doctoral dissertation entitled The Problem of Classification in Theory of Value submitted to adviser Ralph Barton Perry September 17, 1917.|\n|1918||Receives PhD in philosophy from Harvard University.|\n|1925||Fired from Howard University following efforts to achieve pay equity between black and white faculty. December of that year Locke publishes The New Negro: An Interpretation perhaps his most famous work and earns himself recognition as a leading African-American literary critic and aesthete.|\n|1928||Returns to Howard University following the appointment of Mordecai W. Johnson, the university's first African-American president.|\n|1935||Reportedly it was in this year that Locke renewed his interest in writing philosophy as signaled by the publication of “Values and Imperatives,” in American Philosophy, Today and Tomorrow edited by Horace M. Kallen and Sidney Hook.|\n|1942||Publishes two edited volumes and an article: When Peoples Meet: A Study in Race and Culture edited with Bernhard J. Stern, Color: The Unfinished Business of Democracy special volume of Survey Graphic and “Who, and What, Is Negro?”.|\n|1943||Delivers a series of lectures entitled “The Contribution of the Negro to the Culture of the Americas,” under the auspices of the Haitian Ministry of Public Instruction as the Exchange Professor for the Committee for Inter-American Artistic and Intellectual Relations.|\n|1953||Retired from Howard University and moved to New York.|\n|1954||Died June 9 in Mount Sinai Hospital, New York from persistent heart trouble.|\nLocke's seminal essay in value theory, “Values and Imperatives” is as ambitious in its aims as it is pioneering. In it Locke states what he takes to be the central problem for axiology; details the reasons for the failure of American philosophy, particularly pragmatism, to make anything more than a minimal contribution to the development of the philosophical study of values; argues that values are primarily rooted in human attitudes; and provides an elaborate theoretical account of value formation and the functional role of values. A value, according to Locke, is “an emotionally mediated form of experience.” Locke issues the following warning:\n[i]n dethroning our absolutes, we must take care not to exile our imperatives, for after all, we live by them. We must realize more fully that values create these imperatives as well as the more formally super-imposed absolutes, and that norms guide our behavior as well as guide our reasoning. (VI 34)\nValues are an important and necessary part of human experience. Values are an essential part of human existence as all human persons are inherently valuing beings. He writes:\n[t]he common man, in both his individual and group behavior, perpetuates the problem in a very practical way. He sets up personal and private and group norms as standards and principles, and rightly or wrongly hypothesizes them as universals for all conditions, all times and all men. (VI 35)\nValuations of multiple kinds pervade nearly every aspect of our lives; our aesthetic, moral and religious evaluations and judgments.\nOn Locke's estimation,\nthe gravest problem of contemporary philosophy is how to ground some normative principle or criterion of objective validity for values without resort to dogmatism and absolutism on the intellectual plane, and without falling into their corollaries, on the plane of social behavior and action, of intolerance and mass coercion. (VI 36)\nThis is the central and driving question of Locke's axiology and as such it points to some of the crucial aspects of his overall philosophical view, but his theory of value specifically, and importantly his social and political philosophy. On the axiological plane the question is reformulated as whether or not the fundamental value modes automatically or dispositionally set up their end values prior to evaluative judgment. If value modes automatically or dispositionally set up their own ends, then there would exist a more direct approach to the apprehension of values. Moreover, if a connection can be discovered between certain psychological states and particular valuations then that might yield at least one avenue for an objective assessment of values and valuations. On the social and political plane—the practical plane where persons actually form valuations and act on them in myriad ways—the question is formulated in terms of how best to avoid a theory of value that is static, arbitrary and overly formulaic in ways that impede the theory's ability to provide an adequate understanding of value phenomena. To do this, a functional analysis of value norms is required, and normative principles must be the result of the immediate context of valuation. This we will see in the following sections is the major thrust of Locke's value pluralism and relativism.\nLocke begins by considering what he takes to be the most basic feature of values; their emotional character. He writes\nthe value-mode establishes for itself, directly through feeling, a qualitative category which, as discriminated by its appropriate feeling-quality, constitutes an emotionally mediated form of experience. (VI 38)\nThere is a particular feeling or feeling-quality associated with each value-mode. In fact, Locke contends that value-modes differ in virtue of differences in feeling-qualities. The value-mode, or perhaps better, the mode of valuing, refers to the qualitative character of a particular way of experiencing as mediated by a given emotion or attitude which Locke terms the feeling-quality. This has several important implications for the general theory of value: predicating a value to a subject depends on the feeling-quality associated with it; values are immediately recognized through an apprehension of their emotional quality; value-predicates are determined by the affective and volitional influence of the feeling-quality; and the imperatives of a given value are given immediately once the primary feeling-quality has been established.\nLocke claims that there is a necessary connection between the feeling-quality and the value-mode with the former determining the later. The value-mode is normally established as the value is being apprehended. If this were not the case, the value-mode would be indeterminate even while its immediate quality is being felt. The basic categories of value are not rational: one cannot simply reason one's way to an understanding of them. In developing and articulating his axiology, Locke looks for the categories of value in the actual valuations of human beings. Rather than predetermining the categories of valuation and attempting to cram experiences of values into them, his theory begins with our concrete valuations and determines which if any features they have in common. It is then on the basis of the commonalities observed to obtain between particular experiences of values that they are classed together as members of the same class. Locke writes,\n[f]lesh and blood values may not be as universal or objective as logical truth or schematized judgments, but they are not thereby deprived of some relative objectivity and universality of their own. The basic qualities of values…pertain to psychological categories. They are not grounded in types of realms of value, but are rooted in modes or kinds of valuing. (VI 38)\nLocke is aware that it is not easy to demonstrate that the fundamental identity and unity of a value-mode depends on a feeling-quality. It may be that the position thus far articulated is merely hypothetical and speculative and requires an experimental methodology to prove it. Locke notes that the main objections to the position have been addresses by developments in the Gestalt psychology insofar as it has established an empirical basis for a comprehensive perceptual scheme functioning in recognition, comparison and choice. Further circumstantial evidence is offered for the position by the phenomenon of transvaluation (see section 2.3 below).\nOn Locke's view, though the value-mode is determined immediately by the affective character of the value, this is not the final determination of the value. Even after the value-mode has been ascertained, the legitimacy of the value may still be in question, its place in the overall value scheme may be unclear, and particular aspects of the context of valuation may be uncertain. This leads Locke to conclude that the primary normative character of value norms is best sought in their functional role as stereotypes of feeling attitudes and as habitual impulses toward certain choices of actions. This would make them culturally specific, as well as temporally and geographically contingent as values can only be habituated and function with any degree of reliability in specific contexts. Moreover, as in the case of apprehending value-modes, the functionality of a given value is to be discovered experientially; rather than, postulated a priori. Values, then, would only become absolutes—should they become absolute at all—because reason and judgment secondarily re-enforce them as such. In their immediate character and quality values are affective, but they are further mediated by reason and judgment. Value predication depends on reason and judgment; but the predicates themselves are determined by the modal quality of the value. So, the judgment that an object is beautiful or ugly involves reason and judgment, but that the object is experienced as aesthetic depends on its affective apprehension; its being experienced aesthetically.\nCommenting on his own preference for a functional theory of value Locke writes:\nI confess at the outset to a preference for a functional theory of value, but my brief for a functional analysis of value norms is not completely parti pris, but is made rather because a functional approach, even should it lead to a non-functionalist theory of value, of necessity treats the value varieties in terms of their interrelationships, guaranteeing a comparative approach and a more realistic type of value analysis. (FVVU 81)\nMoreover, a functional account of value has the theoretical advantages of being able to account for parallels between values, value interchangeability, and transvaluation. It is perhaps in taking a functional view of values and their associated imperatives where Locke's theory of value is most pragmatic. A functional view of values emphasizes the fact that values are an essential feature of our lived-experiences. At its most basic level value functionality aims to provide a way of understanding how particular values operate as coordinating mechanisms for individual and collective action. Some values have a specific social role; a societal aim or goal that they have been modified and adapted over time to help achieve or maintain. Such values are often codified in the customs and traditions of a culture and can sometimes remain ritualized long after their functional role is obsolete. The importance and usefulness of a functional view of values in Locke's social and political philosophy is further explored in section 3.2 below.\nTransvaluation is a central tenet of Locke's axiology. He writes:\n[t]he further we investigate, the more we discover that there is no fixity of content to values, and the more we are bound, then, to infer that their identity as groups must rest on other elements. (VI 40)\nThe feeling-quality of a given value necessarily establishes the mode of valuation, i.e., the type of value in question (for example, aesthetic, religious, moral etc.) as well as the appropriate value-predicates. However, there is no necessary connection between a given object that serves as the content of a value and any particular emotional response to that object. One and the same object may affect the same person differently at different times, or may at the same time elicit from multiple people different emotional reactions. Transvaluation, then is most simply valuing something in a different way, which requires, at first, having an atypical emotional association with the object of value. There are multifarious potential causes of such transformations in one's affective responses to an object, and those causes can be immediate or unfold over time. “The changed feeling-attitude creates a new value” says Locke “and the type-form of the attitude brings with it its appropriate value category. These modes co-assert their own relevant norms; each sets up a categorical imperative of its own” (VI 41).\nLocke treats transvaluation as inevitable; values are dependent upon social and cultural forces that are always in a state of flux and subject to myriad transformative influences at any given time, hence static values are implausible. Value transformation can take place on the individual level or on the level of widespread social or cultural values. Locke's hope is that this analysis will bring us closer to a practical understanding of value and the mechanism of valuation, which he hopes will bring us closer to understanding the grounds for both agreements among values and value conflict.\nLocke offers a schematization of four traditional values—religious, moral, logical and aesthetic—to demonstrate how his theory classifies values into types according to their characteristic feeling-quality (see the table below) (VI 43). The schema also charts the value-predicates and the positive and negative poles associated with each value-type (type of value). Finally, the schema further divides each value according to its directionality; that is, whether the value is primarily introverted, functioning inwardly on the individual subject, or is extroverted, functioning externally in a social context.\nLocke contends that his position has certain advantages over more logical theories of value. In particular, it is better able to explain certain value phenomena that are troubling for the latter type of theories. Phenomena such as transvaluation, value merging, and value conflict are able to be explained in terms of the basic doctrine that the mode of valuation is determined by the character of a subject's affective response in a value context. Locke claims that logical theories of value have historically had difficulty accounting for phenomena such as the aesthetic appraisal of a logical or mathematical proof; moral commitment to aesthetic production; or aesthetic appreciation of religious practice. In particular, logical theories have struggled to make sense of assigning predicates from one value-type to objects that are traditionally the content of a different value-type as when a proof in logic is deemed beautiful or ugly. Traditional theories treat such value predication as merely metaphorical or analogical.\n|Modal Quality||Value Type||Value Predicates||Value Polarity\n|Exaltation: (Awe Worship)|\n|a. Introverted: Inner Ecstasy||Religious||Holy—Unholy||Holiness||Sin|\n|b. Extroverted: Religious Zeal||Good—Evil||Salvation||Damnation|\n|Tension: (Conflict Choice)|\n|a. Inner Tension of “Conscience”||Ethical||Good—Bad||Conscience||Temptation|\n|b. Outer Tension of Duty||Moral||Right—Wrong||Right||Crime|\n|Acceptance or Agreement: (Curiosity—Intellectual Satisfaction)|\n|a. Inner Agreement in Thought||Logical Truth||Correct—Incorrect||Consistency||Contradiction|\n|b. Outer Agreement in Experience||Scientific Truth||True—False||Certainty||Error|\n|Repose and Equilibrium|\n|a. Consummation in Contemplation||Aesthetic||Beautiful—Ugly||Satisfaction||Disgust|\n|b. Consummation in Creativity||Artistic||Fine—Unsatisfactory||Joy||Distress|\nLocke explains value conflict in terms of a more fundamental psychological incompatibility. Not only does the value-feeling determine the qualitative character of a given value, it also establishes broader categories of value by grouping values according to their common affective quality. As he puts it “[c]hange the attitude, and, irrespective of content, you change the value-type; the appropriate new predicates automatically follow” (VI 44).\nValue attitudes can be psychologically incompatible, and where they are Locke contends that a hierarchical ranking of values will not resolve the incompatibility. In fact, he suggests that people resolve the incommensurability of their various value attitudes by shifting from one mode of valuation to another. This is why a functional account of values that determines the various value-modes on the basis of underlying psychological states is desirable. Such a theory is better able to achieve a reflective equilibrium with our actual value practices. All values have associated with them a set of imperatives. Locke does not have a great deal to say about how imperatives are formed. Presumably, imperatives are determined, at least in part, by the qualitative character of the value in question. People begin by forming a value-attitude based on one's initial affective response to the object of valuation. As a mediating form of experience a value supplies motivational drives toward acting and refraining from acting in certain ways. Values provide normative direction not only for cognition and psychological drives, but also for action. Imperatives are partially in place as soon as the affective quality of the value is apprehended.\nLocke's philosophical worldview is pervaded by a concern for diversity. Locke takes pluralism in all its form—religious, cultural, value etc.—as a basic feature of the world. His primary focus then becomes one of understanding the multiplicity of ways in which peoples meet, and providing some normative guidance concerning how best to act when they do. Values organize, coordinate, mediate and direct experience. In so doing, they serve both a valuable epistemic as well as existential function. Values direct and guide our activity, but more than that they color the nature of our encounters with other persons, and frequently function as a source of conflict between individual persons and groups of human beings. The common mistake among valuers that leads to a “totalizing” of values as “absolutes” or “ultimates” is to forget that any given value encompasses only an aspect of reality and ought not to be treated as transcendent or reducible to that reality. This is a fundamental insight of Locke's philosophy of value as it is applied to social theory. And Locke believes that if he is correct in asserting that “[a]s derivative aspects of the same basic reality, value orders cannot reasonably become competitive and rival realities” that he will have provided the necessary theoretical foundation for a more latitudinarian exchange between diverse human collectives (VI 47). Locke's presentation of his pluralist position proceeds as a response to three obstacles or barriers to pluralism: absolutism, (counter) uniformitarianism, and arbitrary dogmatism. If individual valuers or value groups are able to avoid these three pitfalls, then either may possibly develop a pluralistic value orientation.\nThe first barrier to pluralism is absolutism. Values and their associated imperatives are absolute when they are thought to apply to all human beings, at all times irrespective of social or historical conditions. This is because absolutist conceptions of values are derived from, and ultimately justified by something other than the lived-experiences of human beings, be it God, or human rationality. Whereas pluralism is intended to accommodate a wide array of contending values, absolutism countenances one, and only one set of values universally applicable to all human beings. Locke claims that “absolutism has come forward again in new and formidable guise,” and he warns us to be on guard for “social and political forms of it, with their associated intellectual tyrannies of authoritarian dogmatism and uniformitarian universality” (PID 53). These newer forms of absolutism, Locke claimed, are the products of older ones. When values are held to be absolute there often results a tendency to discount the legitimacy of rival values. Pluralism avoids conceiving of values in absolutist terms. Setting various value conceptions on equal footing is the aim of Locke's pluralism.\nUniformitarianism, the second obstacle to pluralism, is the view that values ought to be uniform within a given community or group. The experiences of members of a given group are filtered through the same forms of mediation to produce value uniformity. Values are ascribed a single form for all members of a group; rather than allowing for a multiplicity of mediated experiences. Value uniformity can be achieved violently, coercively or peacefully, but in all instances it is an attempt to replace diversity with homogeneity. Locke suspects that it is the desire to defend one's own culture and to create consensus among competing value claims that is at the root of the quest for uniformity. Unfortunately, that motivation can easily lapse into an attempt to force one's own value system onto others without justification. Uniformitarianism is a refusal to accommodate the myriad value forms that are essential to pluralism.\nFinally, Locke warns us to avoid the pitfalls of arbitrariness and dogmatism. Value commitments are arbitrary when one forms them—thereby rejecting viable alternatives—in the absence of any justification for choosing them over other available options. One holds her values dogmatically when she takes them to be indisputable and is closed-off to the possibility of taking a critical view of her value commitments that could possibly result in her altering or rejecting them.\nLocke describes pluralism as a functional base, one that can function as a foundation from which to achieve a rapprochement of conflicting values. Pluralism, as Locke envisions it, has the potential to create agreement among competing and conflicting values, through the recognition of common features of various values and value systems. A closer look at Locke's analysis of values; in particular, the three concepts of basic human values, basic equivalence, and functional constancy will illuminate what it means for pluralism to function in this way.\nFirst, is the concept of basic human values, by which Locke means those values that are common to many, or all value systems; values such as belief in god, commitment to one's cultural community, respect for human life, etc. which though they may have multifarious manifestations, are in a more general way common to most, if not all groups. Of course, value communities differ, and no two value communities will be exactly alike, but there does exist substantial overlap of a subset of values across values communities. Basic human values then, are basic and human in virtue of their common expression in a plurality of value contexts and their pertaining to the lives of human beings, and not as a matter of their universal applicability across all of humanity.\nThe next two concepts—basic equivalence and functional constancy—are perhaps best understood as two sides of a distinction between formal and functional equivalence. Basic equivalence refers to a similarity of form and functional constancy refers to a similarity in function. Basic equivalence is a formal resemblance owing to a corresponding value-mode. It is a similarity in the type of value, or better, being particular values of the same type. This notion rests on drawing a distinction between the object of valuation and the way the object is valued. The object may differ where the value mode does not. As a consequence a single object can be valued multiple ways, and many different objects can be valued in the same way. Take for example the institution of marriage as the object of valuation. Marriage is valuable in least two senses, first, it may be valued as the religious union of a man and a woman, and secondly, the marriage ceremony itself could be valued as a ritualized aesthetic experience. In both cases one and the same phenomenon is the content of two different value modes. In the first instance, marriage is valued religiously; the characteristic quality of the value, its form, is spiritual. In the second instance, marriage could be valued because of the elegant décor, grandiose ceremony, and beautiful arrangements that characterize the event. The example goes to illustrate the fact that different ways of valuing can be applied to the same object by the same person or by different people. Valuation works the other way as well, that is, different objects can be valued the same way. As for example, a marriage, a baptism, or a christening can all be valued religiously or aesthetically. One can recognize a similarity in the form of competing values even though their objects may differ, or a difference in form where the object stays the same. Basic equivalence then speaks to an identity of form not of content. It is a conceptual tool that enables persons to recognize that their respective value expressions are species of the same genus. Locke speaks of the objective comparison of basic human values which leads one to think that his claim is that different groups may regard different sets of values as basic to human beings though these may not be identical, but rather, formally equivalent values.\nThe other side of the formal/functional equivalence distinction is the notion of functional constancy. By functional constancy is meant the ability of basic equivalent values to operate as stable features of value processes and activity within various value communities. Locke envisions that what will be found beneath potentially vast differences in content, and beyond a similarity of form, is a comparable utility of various values across contexts. Every value has an attendant function; a role that it plays within a given value community. Values that differ either in form or in content may still be equivalent as regards their function. These functional constants are discovered through comparison of fundamental values found across value groups.\nThus functional equivalence provides a constancy of two sorts: first, the function is constant within a given value community insofar as it plays the same role for different members of the same value group, and second, the function can be a common feature across value groups. Think here again of the example of marriage. Admittedly, there is a wide variety of particular manifestations of such a value, and there can be differences in the form as well as the content of such values. But it is still the case that such variation results in a similar function within a value community. Children are reared, networks of support are maintained, property is held in common and bequeathed to successive generations etc. and these social roles are served by a myriad of expressions of familial ties in the community. Moreover, family values function in this way across cultures. To be sure, there may not be an exact equivalence of function across value communities, or even within them for that matter, but to a large extent this equivalence of function is there to be observed. It may be the case that there exist social functions for a given value in one context that are absent in another: if so, there is no equivalence to be made. All values have a function, but as there is no necessary connection between a given value and a particular function, it does not follow from this that every value function can be found in every culture.\nRelativism, for Locke, begins as a systematic approach to the recognition of the sorts of value equivalence discussed earlier, and is then able to militate against the pernicious forms of valuing that often turn cultural exchanges into intractable problems. The view is termed relativist because it makes a comprehensive and accurate understanding of the values of a given culture dependent—at least in part—on that culture being viewed in relation to other cultures. Moreover, Locke claims that cultural relativism can serve as “a scientifically impartial interpreter of human values, and sometimes even as a referee and mediator among conflicting values” (CRIP 70).\nRelativism, on Locke's view, is not a negative skeptical position that is predicated upon the belief that one is unable to make a satisfactory determination about the relative worth of value communities. Instead, it is a positive and affirmative position concerning the relative worth of distinct value traditions and cultures. Locke formulates his relativism in terms of the three principles of cultural equivalence, cultural reciprocity, and cultural convertibility. He claims that the three principles are derivable from this larger relativist outlook and will enable “a more objective and scientific understanding of human cultures and…more reasonable control of their interrelationships” (CRIP 73).\nThe first of the three principles is:\nThe principle of cultural equivalence, under which we would more wisely press the search for functional similarity in our analyses and comparisons of human cultures; thus offsetting our traditional and excessive emphasis upon cultural differences. Such functional equivalences, which we might term ‘culture-cognates’ or ‘culture-correlates,’ discovered underneath deceptive but superficial institutional divergence, would provide objective but soundly neutral common denominators for intercultural understanding and cooperation. (CRIP 73)\nThe effect of the first principle is to lay bare the fact that the seemingly vast differences between cultures is more a matter of our selective preferences; that is, the habits of mind we have cultivated for being more keenly attuned to difference rather than similarity. The first stage of relativism, then, is to reorient our focus in favor of the similarity to be found across value communities. Cultural cognates and correlates are objective because they are discovered to be real features of multiple value systems. They are in an important sense “there” to be discovered both by internal and external observers of the value group. The reason that these value cognates count as neutral is that they do not, in virtue of their being objective, privilege any value-type or value-content over any other. At this stage they are taken as mere facts of the matter about the values that exist within communities.\nThe second principle of cultural relativism is:\nThe principle of cultural reciprocity, which, by a general recognition of the reciprocal character of all contacts between cultures and of the fact that all modern cultures are highly composite ones, would invalidate the lump estimating of cultures in terms of generalized, en bloc assumptions of superiority and inferiority, substituting scientific, point-by-point comparisons with their correspondingly limited, specific, and objectively verifiable superiorities or inferiorities. (CRIP 73)\nThis aspect of Locke's relativism requires a “beneficent neutrality between divergent positions” (CRIP 70–71). It begins by fostering a disposition toward cultural toleration in the hope that such toleration will lead to mutual respect, which would in turn serve as a foundation upon which to base reciprocal exchanges between cultures. In the most likely case, these initial exchanges will be centered around specific values that form narrowly defined communities of agreement. In the end, if cultural relativism is able to foster reciprocity between value communities to a sufficient degree, then cultural relativism may well establish a foundation of mutual understanding and appreciation to support active cooperation between value groups. The principle of cultural reciprocity restrains the inferences that we are able to make as a result of the principal of cultural equivalence in at least two ways: first, its emphasis on point-by-point comparisons limits the scope of the value cognates that are discovered, and second, it issues an injunction against identifying or connecting specific values with specific cultures or value communities. Relativism is to borrow from an idealized model of scientific practice; a point of view that does not prejudge the results of a given observation before it is carried out. Moreover, it points out that the discovery of cognates and correlates is not likely to be wholesale, but instead, specific and contextualized.\nFinally, we have the principle of cultural convertibility:\nThe principle of limited cultural convertibility, that, since culture elements, though widely interchangeable, are so separable, the institutional forms from their values and the values from their institutional forms, the organic selectivity and assimilative capacity of a borrowing culture becomes a limiting criterion for cultural exchange. Conversely, pressure acculturation and the mass transplanting of culture, the stock procedure of groups with traditions of culture ‘superiority’ and dominance, are counterindicated as against both the interests of cultural efficiency and the natural trends of culture selectivity. (CRIP 73)\nAll value-types are independent of any given value-content; any given value-type can be joined with any value-content. This fact of valuation is what grounds cross-cultural transformation. The extent to which cultures are modified by their interactions with other cultures, is in part a function of how stringently the cultures in question associate their own value-forms with specific value-content. At a higher level, Locke indicates that associations might even be made between a value and its institutional form, by which he seems to mean the manner in which the value is organized into the social structure of a value community. If specific values are correlated with particular institutional forms, a necessary connection may be assumed to exist between them where it does not.\nLocke is perhaps best known for his work in aesthetics, in particular, his role as both an intellectual purveyor of Negro art and literary critic. Locke managed to position himself at the forefront of one of the most significant and important artistic rebirths in American history. His seminal work, The New Negro, was ground-breaking in its presentation of Negro art as thoroughly self-expressive of the individual artist, and not as merely representative of aesthetic, cultural and social possibilities. Locke's publication of The New Negro was in many ways in direct defiance and contradiction of the black intellectual elite of his day, most notably W. E. B. Du Bois, as well as being the advance guard of the aesthetic sentiments of the average Negro of his day. There is evidence of his philosophical views, especially in the areas of axiology, culture, race and ethnicity throughout his writings on aesthetics. Major themes in Locke's aesthetics include: universal human appeal and the relationship of universal and particular; the transition from folk art to high art; the centrality of individual expressivity; and cross-cultural communicability through the aesthetic.\nPrior to the period of individual expression characteristic of the Harlem Renaissance, Negro art in Locke's estimation had as its primary function representation of a Negro type that was socially acceptable and laudably ideal. The aim of much Negro art was to advance presentations of the Negro as civilized, cultured, and capable of making a worthwhile contribution to American society, or to portray blacks in America as a progressive people, needing only to be liberated from slavery or Jim Crow segregation to realize their true potential. In discharging this representative function, Negro art was consumed with the promulgation of stereotypes and counter-stereotypes. It had constantly to react against negative portrayals and stifling social pressures; to attempt to make out of Negro life and experience something worthy of respect, a fitting object of honor and emulation. As Locke put it,\nfor generations in the mind of America, the Negro has been more of a formula than a human being—a something to be argued about, condemned or defended, to be ‘kept down,’ or ‘in his place,’ or ‘helped up,’ to be worried with or worried over, harassed or patronized, a social bogey or a social burden. (NN 3–4)\nThe primary consequence of this social environment on black aesthetics in the United States according to Locke was its Ghettoization. In dealing with this specialized subject matter of social uplift Negro aesthetics segregates itself from the broader American social context and fails to achieve universal human appeal. “The thinking Negro,” by whom Locke seems to have Du Bois primarily in mind, “has been induced to share this same general attitude, to focus his attention on controversial issues, to see himself in the distorted perspective of a social problem” (NN 3–4).\nArt at its best on Locke's view is not propaganda, and though there may be some initial phase in which art is forced to perform such a function that is not the ultimate goal. “Until recently,” Locke comments “lacking self-understanding, we have been almost as much of a problem to ourselves as we still are to others.” Yet as “the thinking few know” as that self-understanding is achieved and worked into artistic expression the result is “that in the reaction the vital inner grip of prejudice has been broken” (NN 4). This is the first significant change in the social environment that produces the “New Negro”; namely, the attitude of young Negro artist to racial segregation.\nAnother change in American society that had a profound impact on the aesthetic advancement of African-Americans at the time of Locke's publication of The New Negro was the Great Migration. One major consequence of “that shifting of the Negro population” was that it “made the Negro problem no longer exclusively or even predominantly Southern” (NN 5). Locke did not however regard the cause of the great migration as chiefly racial; that is, escape from the segregation of the South was not the major motivation behind the mass African-American exodus from the South to the North and Mid-West. Instead,\nThe tide of Negro migration, northward and city-ward, is not to be fully explained as a blind flood started by the demands of war industry coupled with the shutting off of foreign migration, or by the pressure of poor crops coupled with increased social terrorism in certain sections of the South and Southwest…The wash and rush of this human tide on the beach line of the northern city centers is to be explained primarily in terms of a new vision of opportunity, of social and economic freedom, of a spirit to seize, even in the face of an extortionate and heavy toll, a chance for the improvement of conditions. (NN 6)\nThe Great Migration brought with it a need for a plurality of social adjustments as the droves of African-Americans flooded into Northern cities. Principal among this was the realization that the Negro was\nrapidly in process of class differentiation, [and] if it ever was warrantable to regard and treat the Negro en masse it is becoming with every day less possible, more unjust and more ridiculous. (NN 5–6)\nNegro life in America according to Locke is comprised of many diverse elements. The plurality of groups that congregated in places like Detroit, Chicago, Philadelphia and Harlem all with varying motivations and group specific aims constituted some of the largest concentrations of diverse segments of the Negro population. These circumstances coupled with the oppressive effects of prejudice forced myriad sectors of the African-American population to discover and interact with one another. Prior to that Locke claims that\nit must be admitted that the American Negroes have been a race more in name than in fact, or to be exact, more in sentiment than in experience. The chief bond between them has been that of a common condition rather than a common consciousness; a problem in common rather than a life in common. (NN 6–7)\nLocke explains that in part the artistic endeavors of the Negro have failed to achieve universal resonance because the Negro himself has been so poorly understood. He readily admits that “[i]t does not follow that if the Negro were better known, he would be better liked or better treated[,]” and goes on to note that despite this fact “mutual understanding is basic for any subsequent cooperation and adjustment” predicated upon, or in pursuit of an understanding of the universality of Negro experiences as expressed in art. Moreover,\neffort towards this will at least have the effect of remedying in large part what has been the most unsatisfactory feature of our present stage of race relations in America, namely the fact that the more intelligent and representative elements of the two race groups have at so many points got quite out of vital touch with one another (NN 8–9)\nAnd in addressing that crucial fact, such efforts may go a long way towards facilitating an appreciation of Negro art as expressive both of the peculiar racial, ethnic, and cultural experiences of African-Americans, and as expressive of ubiquitous aspects of human experience. It is a mere “fiction…that the life of the races is separate,” and a dangerously divisive one at that, “[t]he fact is that they have touched too closely at the unfavorable and too lightly at the favorable levels” (NN 9). Hence, it is not simply a failure of contact, but a failure of the right sort of contact that accounts for the under appreciation of the aesthetic life of black peoples.\nFor his part, Locke argues, the “New Negro” in recognizing “the necessity for fuller, truer self-expression,…[and] the realization of the unwisdom of allowing discrimination to segregate him mentally, and a counter attitude to cramp and fetter his own living” has played a vital role in demolishing “the ‘spite-wall’ that the intellectuals built over the ‘color-line[.]’” (NN, 9–10). Life for the Negro in the early 1920's was steadily progressing toward the ideals of American democracy. The Negro of the time was also characterized by a new vein; one around which there was a growing consensus primarily of feeling and attitude; rather than opinion or program. As Locke has it:\nUp to the present one may adequately describe the Negro's ‘inner objectives’ as an attempt to repair a damaged group psychology and reshape a warped social perspective. Their realization has acquired a new mentality for the American Negro. And as it matures we begin to see its effects; at first, negative, iconoclastic, and then positive and constructive. In this new group psychology we note the lapse of sentimental appeal, then the development of a more positive self-respect and self-reliance; the repudiation of social dependence, and then the gradual recovery from hyper-sensitiveness and ‘touchy’ nerves, the repudiation of the double standard of judgment with its special philanthropic allowances and in the sturdier desire for objective and scientific appraisal; and finally the rise from social disillusionment to race pride, from the sense of social debt to the responsibilities of social contribution, and offsetting the necessary working commonsense acceptance of restricted conditions, the belief in ultimate esteem and recognition. Therefore, the Negro today wishes to be known for what he is, even in his faults and shortcomings, and scorns a craven and precarious survival at the price of seeming to be what he is not (NN 11).\nLocke ends his exposition of what is characteristic of the New Negro with the observation that the reception of black aesthetic products is an experiment in democracy. As African-American art resists ghettoization and increasingly makes its presence felt in the American artistic mainstream it seeks to establish itself as a subset of American art; rather than, the totality of Negro American art. And since, according to Locke,\n[d]emocracy itself is obstructed and stagnated to the extent that any of its channels are closed…the choice is not between one way for the Negro and another way for the rest, but between American institutions frustrated on the one hand and American ideals progressively fulfilled and realized on the other. (NN 12)\nThe North American Negro artist in being ‘new’ is a living instantiation of the fact that no culture, people, race, or society is a static one. Such entities are always in process of transformation, and always a composite of myriad cultural, ethnic, racial, and social influences. The emergence of the new is at once a presentation of what has been and an indication of what the future may hold. This is a deeply pragmatic current running through Locke's aesthetic philosophy. Locke is later critical of the Harlem Renaissance because it failed to sustain a cyclical process of rebirth. In the years following the height of the Harlem Renaissance he remarked later that that a new Negro must be born every decade or two.\nLocke explains that the aesthetic renaissance that took place in Harlem and elsewhere was primarily a movement of young artists. The youth, Locke claims, speak in distinctive overtones, and “out of a unique experience and with particular representativeness” (NN 47). The experiences of young American Negroes is uniquely representative because\n[a]ll classes of people under social pressure are permeated with a common experience; they are emotionally welded as others cannot be. With them, even ordinary living has epic depth and lyric intensity, and this, their material handicap, is their spiritual advantage. (NN 47)\nHere we find an interesting problem in Lockean exegesis: How is it that the aesthetic contribution is at once characterized by a disavowal of representativeness, while at the same time being uniquely representative? Locke goes on to note that\n[r]acial expression as a conscious motive, it is true, is fading out of our latest art, but just as surely the age of truer, finer group expression is coming in—for race expression does not need to be deliberate to be vital. Indeed, at its best it never is. (NN 47)\nLocke's resolution of the seeming paradox comes by way of recognizing that “[o]ur poets have now stopped speaking for the Negro[;]” the sort of representativeness characteristic of past aesthetic pursuits and instead now “speak as Negroes” (NN 48). The main difference being that “[w]here formally they spoke to others and tried to interpret,” the experiences of African-Americans for white or other nonblack audiences “they now speak to their own and try to express.” “They have” he notes “stopped posing, being nearer the attainment of poise” (NN 48). With this change in the mind of the Negro artist the aim of art is no longer the presentation of an ideal type, or an effective counter-stereotype; instead, it is the expression of the universal truth contained in the particularity of Negro experiences.\nThis is a major theme that runs throughout all of Locke's aesthetic philosophy; the idea that within a particular manifestation of human experience can be found something of universal human significance. Indeed, this is the quintessential marker of “high art” or “classical art”. In the case of the young Negro artist Locke claims “[r]ace for them is but an idiom of experience, a sort of added enriching adventure and discipline, giving subtler overtones to life, making it more beautiful and interesting, even if more poignantly so. When viewed from this more objective attitude and “so experienced, it affords a deepening rather than narrowing of social vision” (NN 48).\nThe youth “constitute a new generation, not because of years only, but because of the new aesthetic and a new philosophy of life” (NN 49). Locke explicates this new aesthetic philosophy by way of comparison to “[t]he elder generation of Negro writers” who were resigned to expressing themselves in “cautious moralism and guarded idealizations” (NN 49). This generation of artists, with\nthe repercussions of prejudice…heavy on its heart…felt art must fight social battles and compensate social wrongs; “Be representative”: put the better foot foremost, was the underlying mood. (NN 50)\nThis hampered both the individual expressivity of the older generation of artists as well as their ability to communicate cross culturally the truth of black experiences. The artist was not free to speak his heart or mind, but had to remain cognizant of the way he presented the Negro yet again. With the youth of the Harlem Renaissance there came a “newer motive,” for the younger generation of American Negro artists the aim “in being racial is to be so purely for the sake of art.” (NN 51) The new artist does not take folksy racial types to be emblematic of anything but the individual artist. Locke sees this manifested in the artist's ability to make of “the racial substance something technically distinctive,” a method of giving expression to a specific type of experience that allows for full expression of that experience across cultural, racial, or ethnic boundaries. In this way techniques that exist as “an idiom of style may become a contribution to general resources of art”; (NN 51) available in the end, not only to those who created, cultivated and refined them, but to any artist who wished to deal with that particular idiom.\nIn Locke's estimation, the spirituals are the quintessential Negro contribution to American art and culture; manifesting as they do so much, not only about the North American Negro and his aesthetic and cultural heritage and evolution, but also in standing as a paragon of processes of aesthetic transition and development.\nThe spirituals are really the most characteristic product of the race genius as yet in America. But the very elements which make them uniquely expressive of the Negro make them at the same time deeply representative of the soil that produced them. Thus, as unique spiritual products of American life, they become nationally as well as racially characteristic. It may not be readily conceded now that the song of the Negro is America's folksong; but if the spirituals are what we think them to be, a classical folk expression, then this is their ultimate destiny. Already they give evidence of this classic quality. Through their immediate and compelling universality of appeal, through their untarnishable beauty, they seem assured of the immortality of those great folk expressions that survive not so much through being typical of a group or representative of a period as by virtue of being fundamentally and everlastingly human. (NN 199)\nThe best evidence, Locke seems to think, in support of the spirituals' claim to universality is that they have withstood the test of time. As an art form they have outlived not only the generations that produced them but the peculiar social environment that enlivened them. Beyond this the spirituals have survived\nthe contempt of the slave owners, the conventionalizations of formal religion, the repressions of Puritanism, the corruptions of sentimental balladry, and the neglect and disdain of second-generation respectability. (NN 199)\nIn short, they have successfully made the transition from folk art to formal music.\nThe spirituals at once exemplify all of the three major themes of Locke's aesthetic philosophy: they are expressive of the individuality of a given artist—think of the distinctiveness of Paul Robeson's baritone renderings of “Swing Low, Sweet Chariot”; they have universal human appeal; and they epitomize the process of transition from a folk art to high or classical art. “In its disingenuous simplicity, folk art is always despised and rejected at first; but generations after, it flowers again and transcends the level of its origin” (NN 199).\nNegro folk music or spirituals contain the raw material for myriad new musical developments. That material was at the time of the publication of The New Negro to Locke's mind underdeveloped, but as Negro artists grew in sophistication and craft Locke saw the potential for them to complete the conversion of so fundamentally American and pedestrian an art form into an avenue for insight into some of the most deeply emotional aspects of humanity.\nLocke credits Du Bois with being among the first to give the spirituals “a serious and proper social interpretation,” with his chapter in The Souls of Black Folks on the Sorrow Songs. “But underneath the broken words, childish imagery, peasant simplicity, lies” Locke notes\nas Dr. Du Bois pointed out, and epic intensity and a tragic profundity of emotional experience, for which the only historical analogy is the spiritual experience of the Jews and the only analogue, the Psalms. (NN 200)\nBut whatever they may lack in terms of poetic form, they more than compensate for in their ability to embody the religious mood. This North American Negro folk form is replete with the spirit of exaltation. The spirituals are remarkable for their ability to transcend the profound tragedy that gives birth to them and offer up a model of enduring hopefulness in this world or the next. “Their words are colloquial,” Locke notes, being the products of unlettered folk “but their mood is epic” giving emotive expression to experiences that exemplify the possibilities of humanity at its best (NN 201). The spirituals “are primitive, but their emotional artistry is perfect” (NN 201).\nHistorically, Negro colleges were the mechanism through which the spirituals were popularized. The travelling choirs of Negro institutions such as Hampton University, Wilberforce University, Fisk University and Tuskegee University performed the spirituals across the country as a means of raising funds for their respective institutions, all the while bringing to black and white audiences in the United States knowledge and appreciation of this indigenous musical form. Many of these university choirs also recorded compilations of Negro spirituals and published them. It was thus, as Locke has it, that the spirituals were able to avoid simply falling out of fashion and failing to survive “that critical period of disfavor in which any folk product is likely to be snuffed out by the false pride of the second-generation” (NN 202). This, by Locke's lights, is not an uncommon situation for folk arts to face, finding it necessary as they often do to resist being disavowed by subsequent generations wishing to distance themselves from the supposedly deficient quality of the folk expression.\nEmotions and attitudes form the very foundation of Locke's philosophy of value: undoubtedly, one reason that Locke was so enamored with the spirituals was that as he understood them their primary artistic virtue was their deeply emotive character. “Emotionally,” he points out, “these songs are far from simple” (NN 205). There is to be found in the spiritual folk music of the American Negro the entire range of human moods and emotions, and within a given spiritual there can be a drastic change in mood from the deepest sorrow to glorious praise, as each and every song is infused with religious sentiment. Surprisingly, when it comes to the problem of classification of the spirituals, Locke does not insist upon the primary mode of classification being the feeling-quality of the song as his value theory might suggest. In fact, Locke argues that\n[i]nteresting and intriguing as was Dr. Du Bois's analysis of their emotional themes, modern interpretation must break with that mode of analysis, and relate these songs to the folk activity that they motivated, classifying them by their respective song-types. (NN 205)\nIn the case of the spirituals Locke is in favor of a different method of classification because contemporary interpreters of the Negro's music tend to mischaracterize, or characterize in a way that is not true to the folk that produced it, the music of the Negro. Locke laments the fact that “at present many a half secularized ballad is mistaken for a ‘spiritual,’ and many a camp-meeting shout for a folk hymn” (NN 205). He believed the folk music of the Negro is best categorized according to the sort of activity they inspired. “From this point of view” Locke claims\nwe have essentially four classes, the almost ritualistic prayer songs for pure spirituals, the freer and more unrestrained evangelical shouts or Meeting songs, the folk ballad so overlaid with the tradition of the spirituals proper that the distinctive type quality has almost been unnoticed until late, and the work and labor songs of strictly secular character. (NN 205)\nHowever, discriminating Negro folk music into types on the basis of the folk activity that underlies them is not necessarily to exclude the emotive content of the song. In fact, it seems that what is really being discriminated is the active expression of the underlying emotional content, i.e., the activity that is most commonly associated with a particular emotion or mood. And here we see perhaps the most direct effect that Locke's axiology has on his assessment of spirituals discriminating them as he does into types in terms of their feeling-quality, but also linking each form with a set of imperatives in this case, a practical imperative understood by the type of activity that each song is used to motivate.\nLocke sees as a major problem with the scholarship on Negro folk music in his day the tendency to overemphasize one of the various distinctive elements of the music over the others. The result was a jaundiced view of Negro music. “Strain out and emphasize the melodic element” Locke informs\nand you get only the sentimental ballad; emphasize the harmonic idiom, and you get a cloying sentimental glee; overemphasize the rhythmic idiom and instantly you secularize the product into syncopated dance elements. (NN 206)\nLurking in the background of all of this talk of the “New Negro” is the assumption that there is something distinctively Negro about at least some American art. As to what that is, or could be, answers are sometimes extremely hard to come by. But, Locke warns\n[s]ooner or later the critic must face the basic issues involved in his use of risky and perhaps untenable terms like ‘Negro art’ and ‘Negro literature’ and answer the much-evaded question unequivocally,—who and what is Negro? (WWN 209)\nBeyond this Locke thinks it a meaningful query to ask whether the racial concept has any place in art at all. Perhaps it would be better to understand art as a cultural or social mode of production that cuts across racial and ethnic divisions.\n5.4.1 Who is Negro\nIn answering the question “Who is Negro?” Locke begins by exposing a common misguided assumption in such queries:\n[t]he fallacy of the ‘new’ as of the ‘older’ thinking is that there is a type Negro who, either qualitatively or quantitatively, is the type symbol of the entire group. (WWN 210)\nLocke sees this as the unfortunate consequence of the past need to proffer counter-stereotypes to combat demeaning stereotypes of Negro persons. Counter-stereotypes may well contain some element of truth, but they fail to convey the whole truth about as diverse a population of human beings as Negroes in the United States, let alone the Americas or Negroes the World over. There is no distinctive singular Negro type. The answer then to the question posed “who is Negro?” is no Negro in particular. The Negro is a dynamic and multifaceted population admitting of myriad cultural and social forms characterized as those are by variegated linguistic, religious and artistic elements. This is important for Locke to note as the Negro of his day was thought to be classless, undifferentiated, and ethnically homogeneous. In fact, Locke himself thought it possible (and actual) for human beings biologically similar in the way that American race thinking presupposes to be members of different races. A full and accurate artistic portrayal of who is Negro would, Locke argued, have to picture the many diverse Negro strands in their own right, weaving together from these diverse threads a multifaceted presentation of Negro experiences.\n5.4.2 What is Negro?\n“Turning to the other basic question,—what is Negro,” Locke begins by narrowing the question to “what makes a work of art Negro, if indeed any such nomenclature is proper,—its authorship, its theme or its idiom?” (WWN 211). In other words, what gives a particular work of art its distinctive, if any, racial character: the racial identity of its author, its treatment of themes characteristic of a particular racial experience in a particular place, or its use of styles and modes of expression peculiar to a given people? Of these three candidates for the foundation of Negro art Locke claims each has had its day depending on the social environment that was prevalent at the time. Locke dismisses nearly out of hand the first option remarking that many a Negro artist has produced the most amateurish works of art due primarily to their poor mastery of Negro idioms, and inadequate treatment of Negro themes. What is more, some white (or at least non-Negro) artist have been quite adept in either their use of characteristically Negro styles, or their dealings with Negro motifs. Of course, it stands to reason that artist steeped in the cultural, ethnic and racial environments that give rise to these idioms and themes are most likely to master their use and expression, and that persons who do so are most likely to be members of these communities, having the same racial, ethnic or cultural identities as other members. However, such communal membership is not a necessary condition for the work of a particular artist to count amongst the works that comprise a racially distinctive body of art such as might be called “Negro art.”\nLocke understood race as primarily a product of social culture. Locke denies as do nearly all contemporary race theorists that races are biologically distinct categories of human beings. Locke maintained that culture and race were distinct, but often overlapping categories. There is no tight causal or otherwise necessary connection between race and culture. The two are mutually exclusive even though they do sometimes vary together or otherwise correspond. Race, for Locke, is not determinative of culture or civilization. Locke's position on race does not deny, as some of his contemporaries concerned with the notion of race and culture did, that there ever is a significant connection between racial and cultural factors, nor does it deny that “race stands for significant social characters and culture-traits or represents in given historical contexts characteristic differentiations of culture-type” (CRASC 188). This is primarily a cautionary observation on Locke's part seeing as how\n[i]t is too early to assume that there is no significant relationship between race and culture because of the manifestly false and arbitrary linkage which has previously been asserted. (CRASC 189)\nLocke has some hesitation about the prudence and possibility of completely eradicating racial categories. He states,\n[i]n some revised and reconstructed form, we may anticipate the continued even if restricted use of these terms as more or less necessary and basic concepts that cannot be eliminated altogether, but that must nevertheless be so safe-guarded in this continued use as not to give further currency to the invalidated assumption concerning them. (CRASC 189)\nLocke attributes the original idea that race is a primary determining factor in culture to the work of Arthur de Gobineau, though he thinks the main scientific justification for the view has been offered by those who seek to interpret culture in evolutionary terms such as the social evolutionism of Herbert Spencer. Positing a fixed link between race and culture was useful for such theorists in developing a step-by-step account of the development of cultures. But even in Locke's day, the supposed scientific foundations of such theoretical positions faced challenges. In light of that Locke thinks it understandable for some to want to correct this misinterpretation of the facts by insisting that there is no connection at all between race and culture. We see here again perhaps some of the influence that pragmatist thinkers, in this case Dewey, may have had on Locke, as Dewey was apt to point out on numerous occasions the shortcomings of Spencer's social Darwinism, and chiefly its attempt to offer a universal account of all aspects of human development. Locke worried that extreme cultural relativism\nleaves an open question as to the association of certain ethnic groups with definite culture traits and culture types under circumstances where there is evidently a greater persistence of certain strains and characteristics in their culture than of other factors.\nIt is “[t]he stability of such factors and their resistance to direct historical modification” Locke thought, which\nmarks out the province of that aspect of the problem of race which is distinctly ethnological and which the revised notion of ethnic race must cover. (CRASC 190)\nLocke held that race was in point of fact a social and cultural category rather than a biological one. For this reason he developed the notion of ethnic race or culture group. By ethnic race, I take Locke to mean a peculiar set of psychological and affective responsive dispositions, expressed or manifested as cultural traits, socially inherited and able to be attributed through historical contextualization to a specifiable group of people. The concept of ethnic race is a way of preserving the demonstrated distinctiveness of various groupings of human beings in terms of characteristic traits, lifestyles, forms of expression; without resulting to the scientifically invalidated notion of biological race. “Race,” Locke argues “would have been regarded as primarily a matter of social [as opposed to biological] heredity,” if only the science of his day had reached a more tenable understanding of the relationship of race to culture which would likely have resulted from focusing more on the ethnic; rather than, anthropological factors. The distinctiveness of a given race would be understood as the result of “the selective psychological “set” of established cultural reactions” (CRASC 191). “The best consensus of opinion” on the basis of Locke's study of the past, and for his day current, sociological, anthropological, and psychological scholarship on the subject of race, was that,\nrace is a fact in the social or ethnic sense, that it has been very erroneously associated with race in the physical sense and is therefore not scientifically commensurate with factors or conditions which explain or have produced physical race characters and differentiation, that it has a vital or significant relation to social culture, and that it must be explained in terms of social and historical causes such as have caused similar differentiations of culture-type as pertain in lesser degree between nations, tribes, classes, and even family strains. Most authorities are now reconciled to two things,—first, the necessity of a thorough-going redefinition of the nature of race, and second, the independent definition of race in the ethnic or social sense together with the independent investigation of its differences and their causes apart from the investigation of the factors and differentiae of physical race. (CRASC 192)\nThe notion of ethnic race is better able to capture the myriad differences between culture groups in terms of the actual social, cultural and historical conditions that give rise to such variation, and without the scientifically indefensible reliance on biological factors. On this view, race is no longer thought to be the progenitor of culture; instead race is understood to be a cultural product. Locke held that the more objective analysis of culture he advocated would likely result in the development over time of distinctive culture-types for which it may prove possible to work out some principle of development or evolution. This he thought might eventually make it possible to develop “a standard of value for relative culture grading” (CRASC 194).\nNearly every culture is highly composite; consisting as most due in the union of various social and historical influences; moreover, every ethnic group in the unique outcome of a specific social history. A more scientific understanding of man replaces the abstract artifice of biological race, and requires that we deal with concrete culture-types which are frequently complex amalgamations of supposed races united principally by entrenchment of customary reactions, standardized practices, traditional forms of expression and interaction, in sum, the specific history of a given people in a particular place. It is noteworthy and perhaps illuminating of Locke's conception of ethnic or social race that the groupings of human persons formerly thought to constitute “races” in the biological sense such as “Negro,” “Caucasian,” or “Asian” are in fact each composed of several different social or ethnic races. On Locke's view there are many so-called “Negro,” “Caucasian,” or “Asian” races. This revised understanding of culture constitutes in Locke's estimation a fundamental paradigm shift in the study of human cultures ”[s]o considerable…[in] emphasis and meaning that at times it does seem that the best procedure would be to substitute the term race the term culture group“ (CRASC 194).\nLocke quickly notes while the notion of race has been invalidated as an explanation of culture groups understood as totalities, race does help to explain various cultural components within a given culture. “Race operates as tradition,” Locke noted, “as preferred traits and values,” changes in these aspects of culture in a distinctive way by a subset of a culture group constitutes “ethnic remoulding” (CRASC 195). Race becomes a term that designates the specific outcome of the “peculiar selective preferences” in favor of some, and against other, culture-traits of a given group. “Such facts” Locke observed\nnullify two of the most prevalent popular and scientific fallacies, the ascription of a total culture to any one ethnic strain, and the interpretation of culture in terms of the intrinsic rather than the fusion of its various constituent elements. (CRASC 195)\n- [AOP] “Art or Propaganda?”(1928)\n- [CRASC] “The Concept of Race as Applied to Social Culture” (1924)\n- [CRIP] “Cultural Relativism and Ideological Peace” (1944)\n- [FVVU] “A Functional View of Value Ultimates” (1945)\n- [PID] “Pluralism and Intellectual Democracy” (1942)\n- [NN] The New Negro (1925)\n- [VI] “Values and Imperatives” (1935)\n- [WWN] “Who and What Is “Negro”?” (1944)\n- Locke, A., 1989. The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press.\n- –––, 1928, “Art or Propaganda?”Harlem, 1(1): 12–13.\n- –––, 1924, “The Concept of Race as Applied to Social Culture,” in The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press, pp. 188–199.\n- –––, 1944, “Cultural Relativism and Ideological Peace,” in The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press, pp. 69–78.\n- –––, 1945, “A Functional View of Value Ultimates,” in The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press, pp. 81–93.\n- –––, 1942, “Pluralism and Intellectual Democracy,” in The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press, pp. 53–66.\n- –––, 1935, “Values and Imperatives,” in The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press, pp. 34–50.\n- –––, “Who and What Is “Negro”?” in The Philosophy of Alain Locke: Harlem Renaissance and Beyond, L. Harris (ed.), Philadelphia: Temple University Press, pp. 209–228.\n- –––, (ed.) The New Negro. New York: Simon & Schuster, 1997.\n- –––, Race Contacts and Interracial Relations. Edited by Jeffrey C. Stewart. Washington, D.C.: Howard University Press, 1992.\n- Locke, A. and Stern, B. J. (eds.), 1946, When Peoples Meet: A Study of Race and Culture Contacts. New York: Hinds, Hayden & Eldredge, Inc.\n- Locke, A. and Brown, S. A., 1930, “Folk Values in a New Medium,” in Folk-Say: A Regional Miscellany, 1930, Botkin, B. A. (ed.), Norman: University of Oklahoma Press, pp. 340–345.\n- Bernasconi, R., 2008, “Ethnic Race: Revisiting Alain Locke's Neglected Proposal,” in Race or Ethnicity?: On Black and Latino Identity, J. Gracia (ed.), Ithaca: Cornell University Press, pp. 123–136.\n- Cain, R. J., 1995, “Alain LeRoy Locke: Crusader and Advocate for the Education of African American Adults,” The Journal of Negro Education, 64 (1): 87–99.\n- Carter, J. A., and Harris, L. (eds.), 2010, Philosophic Values and World Citizenship: Locke to Obama and Beyond, Lanham: Lexington Books.\n- Eze, C., 2005. The Dilemma of Ethnic Identity: Alain Locke's Vision of Transcultural Societies, New York: Mellen Press.\n- Green, J., 1999, Deep Democracy, Lanham: Rowman and Littlefield.\n- –––, 1999, “Alain Locke's Multicultural Philosophy of Value,” in The Critical Pragmatism of Alain Locke: A Reader on Value Theory, Aesthetics, Community, Culture, Race and Education, Harris, L. (ed.), Lanham: Rowman & Littlefield Publishers.\n- Harris, L. (ed.), 1989, The Philosophy of Alain Locke: Harlem Renaissance and Beyond. Philadelphia: Temple University Press.\n- –––, 2004, “The Great Debate: W.E.B. Du Bois vs. Alain Locke on the Aesthetic.” PhilosophiaAfricana, 7 (1): 15–39.\n- –––, 2002, “Universal Human Liberation and Community: Pixley Kaisaka Seme and Alain Leroy Locke,” in Perspectives in African Philosophy, Sumner, C. and Yohannes, S.W. (eds.), Addis Ababa: Addis Ababa University.\n- –––, 1999, The Critical Pragmatism of Alain Locke: A Reader on Value Theory, Aesthetics, Community, Culture, Race, and Education, Lanham: Rowman & Littlefield Publishers.\n- –––, 1997, “Alain Locke: Community and Citizenship,” The Modern Schoolman LXXIV: 337–346.\n- Harris, L. and Molesworth, C., 2009, Alain L. Locke: The Biography of a Philosopher, Chicago: University of Chicago Press.\n- Kallen, H. M., 1957, “Alain Locke and Cultural Pluralism,” Journal of Philosophy, 54 (5): 119–127.\n- Linnemann, R. J., (ed.), 1982, Alain Locke: Reflections On A Modern Renaissance Man, Baton Rouge: Louisiana State University.\n- MacMullan, T., 2005, “Challenges to Cultural Diversity: Absolutism, Democracy, and Alain Locke's Value Relativism,” Journal of Speculative Philosophy, 19 (2): 129–139.\n- Seme, P. K., 1993, “Regeneration of Africa,” in Seme: Founder of the ANC, Rive, R. and Couzens, T. (eds.), New Jersey: Africa World Press.\n- Stewart, J. C. (ed.), 1983, The Critical Temper of Alain Locke: A Selection of His Essays on Art and Culture, New York: Garland.\n- Washington, J., 1986, Alain Locke and Philosophy: A Quest for Cultural Pluralism, Westport: Greenwood Press.\n- Watts, E. K., 2002, “African American Ethos and Hermeneutical Rhetoric: An Exploration of Alain Locke's The New Negro,” Quarterly Journal of Speech 88: 19–32.\n- Zoeller, J., 2007, “Alain Locke at Oxford: Race and the Rhodes Scholarships,” The American Oxonian XCIV (2): 183–224.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.", "label": "No"} {"text": "Additive Manufacturing in the Aerospace Industry\nWith the potential that additive manufacturing offers, aerospace is a key industry which has already taken advantage of the technology and is expected to do so to an even greater degree moving forward.\nThe process offers huge advantages in the creation of Aerospace components, with the ability to not just shorten the design process, but also to form shapes which were previously not possible with conventional methods.\nMany companies in the aerospace industry are already using additive manufacturing in an increasing number of their designs. Here’s a look at their applications and the advantages offered in the field.\nAlthough additive manufacturing is an exciting technology for many fields, the aerospace industry is seen as one of the key growth areas.\nThe ability to create complex shapes within one mould, with intricate internal dimensions and complex geometry, is one of the single biggest benefits.\nAdditive manufacturing allows engineers for the very first time to copy nature, and the strong yet intricate designs which were previously impossible to create have suddenly become a realistic possibility.\nEngines and turbines work well with additive manufacturing processes, as it allows the production of small batches of components at a relatively low cost. Turbine blades, fuel systems and guide vanes or even parts which carry oil and water can be made using metal additive manufacturing techniques, such as metal printing. By comparison to conventional manufacturing, additive methods are very quick, flexible and economical.\nIn addition to the functional parts of an engine, aerospace additive manufacturing used to create a 3D printed turbine additive manufacturing can be used to form the internal parts too. Air conditioning, belt buckles, heating elements and cockpit equipment can all be made using additive manufacturing, and many companies are opting to do some because of the lighter weights that can be achieved with these techniques.\nUnmanned aerial vehicles are one of the most challenges items to produce because of the production costs involved in making prototypes and batches in such small volumes. Additive manufacturing works especially well in smaller quantities, and with the flexibility to change the designs quickly and easily, there’s none of the costs involved that traditional manufacturing invokes.\nThe Advantages of Aerospace Additive Manufacturing\nThere are a number of different advantages that aerospace additive manufacturing offers compared to more traditional types of design, engineering and manufacturing\nThe aerospace industry is a field where experimentation is common and there’s many prototypes constantly being produced and assessed. This results in a great need to be able to create and adapt models easily and quickly.\nDelays in being able to get a model out into the field could result in a lag in getting into the market, and possibly losing a critical advantage against a competitor.\nThe sheer number of different prototypes and the regularity in which they are required means that additive manufacturing has some very real benefits. The design process is significantly shortened, and changing a model doesn’t require weeks of calculations and reconfiguring. Using the 3D computer programme, it’s simple to tweak a design as many times as needed. And with the seamless integration between design and the production, there’s no possibility of errors or misunderstandings occurring.\nNo Joining Required\nOne of the biggest challenges in engineering is how to create complex geometric shapes without compromising any of the strength.\nIf a component needs to be hollowed out inside, the shape typically needs to be made in separate parts and then joined together. Not only is this more time-consuming to create, and there’s more restrictions on what can be made, the end result is usually mot as strong, with weak spots at vulnerable joins.\nThe ability to create a single mould, including components with hollow centres, means that the parts are not just easier to manufacture, but also far stronger overall.\nAerospace additive manufacturing provides the means for parts to be created with different materials; this can result in a significant weight reduction which can go on to reduce costs as well.\nUsing laser sintering processes can result in a total weight reduction of between 40-60%, a very sizeable drop. This reduction in overall weight means that when in use, less fuel will be required, and there will also be a green effect too, with less carbon dioxide produced.\nUsing additive manufacturing means there’s no need to stockpile high quantities of components, or buy in large numbers from suppliers. Companies that have this technology have the ability to produce modified parts and components on an as-required basis, meaning there’s no longer any need for large storage areas.\nAnd as additive manufacturing can be run easily on very low volumes, there’s no problem with producing single components, one at a time.\nAdditive manufacturing will continue to be a sizeable asset to the aerospace industry with increasing uses in the future.\nFÜR NEUIGKEITEN REGISTRIEREN\nIf you enjoyed reading this article, why not register for future articles?", "label": "No"} {"text": "Pancreatitis results from sudden inflammation of the pancreas and is characterized by activation of pancreatic enzymes that can cause the pancreas to begin digesting itself.\nThe cause of pancreatitis is poorly understood. Predisposing causes include obesity, high fat diet, liver disease, infection and recent abdominal surgery. For unknown reasons, miniature schnauzers tend to be predisposed to pancreatitis.\nPancreatitis can range in severity from mild to life-threatening. The body’s reaction to the inflammation often determines the severity and prognosis. Recurrent bouts of pancreatitis can lead to chronic pancreatitis and may contribute to other disorders such as diabetes mellitus or exocrine pancreatic insufficiency.\nDiagnosis and Treatment Notes:\n- Pancreatitis is generally diagnosed by a thorough history, physical examination and bloodwork. Abdominal x-rays and abdominal ultrasound may also be recommended.\n- Treatment depends on the severity of the disease, your individual pet, and your veterinarian. Pets with pancreatitis are treated with fluids, antibiotics, pain medication and a special diet. In some cases, surgery may be necessary. Discuss treatment details when your pet is diagnosed with this condition.\nWhat to Watch for*:\n- Poor appetite\n- Abdominal pain\n*Please notify us if you notice any of the above signs or if you have any questions!", "label": "No"} {"text": "Organisation: Pronatura Noroeste\nLocation: Gulf of California, Mexico\n14 October 2015\nPronatura Noroeste 1 © Abraham González\nSummary: Protected Areas (PAs) are a powerful tool for biodiversity conservation. In Mexico, more than 175 federal PAs protect over 25.6 million hectares of habitats and landscapes. Due to the remote location of many PAs, however, administrative frameworks for their governance and enforcment of regulations is often lacking. Therefore, a conceptual model to support PA enforcement was developed. This model is designed to increase the compliance of regulations and to facilitate the recovery and conservation of fish stocks and biodiversity.", "label": "No"} {"text": "Questions about moral character have recently come to occupy a central place in philosophical discussion. Part of the explanation for this development can be traced to the publication in 1958 of G. E. M. Anscombe's seminal article “Modern Moral Philosophy.” In that paper Anscombe argued that Kantianism and utilitarianism, the two major traditions in western moral philosophy, mistakenly placed the foundation for morality in legalistic notions such as duty and obligation. To do ethics properly, Anscombe argued, one must start with what it is for a human being to flourish or live well. That meant returning to some questions that mattered deeply to the ancient Greek moralists. These questions focussed on the nature of “virtue” (or what we might think of as admirable moral character), of how one becomes virtuous (is it taught? does it arise naturally? are we responsible for its development?), and of what relationships and institutions may be necessary to make becoming virtuous possible. Answers to these ancient questions emerge today in various areas of philosophy, including ethics (especially virtue ethics), feminist ethics, political philosophy, philosophy of education, and philosophy of literature. Interest in virtue and character was also indirectly the result of a more practical turn in political philosophy, inspired by the publication of John Rawls's A Theory of Justice in 1971. Especially in Part III of A Theory of Justice, Rawls provided a picture of how individuals might be brought up in a just state to develop the virtues expected of good citizens. Although his interest was not in moral education per se, his discussion of how individuals acquire a sense of justice and of how they develop what he called self-respect stimulated other philosophers to explore the psychological foundations of virtue and the contributions made by friendship, family, community, and meaningful work to good moral character.\nThis entry provides a brief historical account of some important developments in philosophical approaches to good moral character. Approximately half the entry is on the Greek moralists Socrates, Plato, Aristotle, and the Stoics. Of these, most attention is given to Aristotle's views, since most other philosophical discussions of character are indebted to his analysis. The latter half of the entry explores how other philosophers have responded to the concerns first raised by the Greeks. Some philosophers, such as Hugo Grotius and Immanuel Kant, represent a “modern” approach to character that subordinates it to other moral notions such as duty and obedience to law. Other philosophers, such as David Hume, Karl Marx, and John Stuart Mill, take an interest in the psychology of moral character that is more reminiscent of the Greeks. Finally, this entry indicates the directions taken by some contemporary philosophers in recent work on or related to moral character.\n- 1. Terminology\n- 2. Some ancient Greek views\n- 3. Virtue and moral character after the Greeks\n- 4. Contemporary questions about character\n- 5. Skepticism about character\n- Academic Tools\n- Other Internet Resources\n- Related Entries\nThe English word “character” is derived from the Greek charaktêr, which was originally used of a mark impressed upon a coin. Later and more generally, “character” came to mean a distinctive mark by which one thing was distinguished from others, and then primarily to mean the assemblage of qualities that distinguish one individual from another. In modern usage, this emphasis on distinctiveness or individuality tends to merge “character” with “personality.” We might say, for example, when thinking of a person's idiosyncratic mannerisms, social gestures, or habits of dress, that “he has personality” or that “he's quite a character.”\nAs the Introduction above has suggested, however, the philosophical use of the word “character” has a different linguistic history. At the beginning of Book II of the Nicomachean Ethics, Aristotle tells us that there are two different kinds of human excellences, excellences of thought and excellences of character. His phrase for excellences of character — êthikai aretai — we usually translate as “moral virtue(s)” or “moral excellence(s).” The Greek êthikos (ethical) is the adjective cognate with êthos (character). When we speak of a moral virtue or an excellence of character, the emphasis is not on mere distinctiveness or individuality, but on the combination of qualities that make an individual the sort of ethically admirable person he is.\nThis entry will discuss “moral character” in the Greek sense of having or lacking moral virtue. If someone lacks virtue, she may have any of several moral vices, or she may be characterized by a condition somewhere in between virtue and vice, such as continence or incontinence.\nThe views of moral character held by Socrates, Plato, Aristotle, and the Stoics are the starting point for most other philosophical discussions of character. Although these ancient moralists differed on some issues about virtue, it makes sense to begin with some points of similarity. These points of similarity will show why the Greek moralists thought it was important to discuss character.\nMany of Plato's dialogues (especially the early or so-called “Socratic” dialogues) examine the nature of virtue and the character of a virtuous person. They often begin by having Socrates ask his interlocutors to explain what a particular virtue is. In reply, the interlocutors usually offer behavioral accounts of the virtues. For example, at the beginning of Plato's Laches the character Laches suggests that courage consists of standing one's ground in battle. In the Charmides, Charmides suggests that temperance consists in acting quietly. In the Republic, Cephalus suggests that justice consists in giving back what one has borrowed. In each of these cases, Plato has Socrates reply in the same way. In the Republic Socrates explains that giving back what one has borrowed cannot be what justice is, for there are cases where giving back what one has borrowed would be foolish, and the just person recognizes that it is foolish. If the person from whom you have borrowed a sword goes mad, it would be foolish for you to return the sword, for you are then putting yourself and others in danger. The implication is that the just person can recognize when it is reasonable to return what he has borrowed. Similarly, as Socrates explains in the Laches, standing firm in battle cannot be courage, for sometimes standing firm in battle is simply a foolish endurance that puts oneself and others at needless risk. The courageous person can recognize when it is reasonable to stand his ground in battle and when it isn't.\nThe trouble one encounters in trying to give a purely behavioral account of virtue explains why the Greek moralists turn to character to explain what virtue is. It may be true that most of us can recognize that it would be foolish to risk our lives and the lives of others to secure a trivial benefit, and that most of us can see that it is unjust to harm others to secure power and wealth for our own comfort. We don't have to be virtuous to recognize these things. But the Greek moralists think it takes someone of good moral character to determine with regularity and reliability what actions are appropriate and reasonable in fearful situations and that it takes someone of good moral character to determine with regularity and reliability how and when to secure goods and resources for himself and others. This is why Aristotle states in Nicomachean Ethics II.9 that it is not easy to define in rules which actions deserve moral praise and blame, and that these matters require the judgment of the virtuous person.\nMost of the Greek moralists think that, if we are rational, we aim at living well (eu zên) or happiness (eudaimonia). Living well or happiness is our ultimate end in that a conception of happiness serves to organize our various subordinate ends, by indicating the relative importance of our ends and by indicating how they should fit together into some rational overall scheme. So the Stoics identify happiness with “living coherently” (homologoumenôs zên), and Aristotle says that happiness is “perfect” or “complete” (teleios) and something distinctively human. When we are living well, our life is worthy of imitation and admiration. For, according to the Greek moralists, that we are happy says something about us and about what we have achieved, not simply about the fortunate circumstances in which we find ourselves. So they argue that happiness cannot consist simply in “external goods” or “goods of fortune,” for these goods are external to our own choosing and deciding. Whatever happiness is, it must take account of the fact that a happy life is one lived by rational agents who act and who are not simply victims of their circumstances.\nThe Greek moralists conclude that a happy life must give a prominent place to the exercise of virtue, for virtuous traits of character are stable and enduring and are not products of fortune, but of learning or cultivation. Moreover, virtuous traits of character are excellences of the human being in that they are the best exercise of reason, which is the activity characteristic of human beings. In this way, the Greek philosophers claim, virtuous activity completes or perfects human life.\nAlthough the Greek philosophers agree that happiness requires virtue and hence that a happy person must have virtuous traits of character such as wisdom, bravery, temperance, and justice, they disagree about how to understand these traits. As explained in Section 2.1 above, several of Plato's dialogues criticize the view that virtues are merely tendencies to act in particular ways. Bravery requires more than standing up against threats to oneself and others. Bravery also requires recognizing when standing up to these threats is reasonable and appropriate, and it requires acting on one's recognition. This led the Greek moralists to conclude that virtuous traits of character have two aspects: (a) a behavioral aspect — doing particular kinds of action and (b) a psychological aspect — having the right motives, aims, concerns, and perspective. The Greek philosophers disagree mostly about what (b) involves. In particular, they differ about the role played in virtuous traits of character by cognitive states (e.g., knowledge and belief) on the one hand and affective states (e.g., desires, feelings, and emotions) on the other. Socrates and the Stoics argued that only cognitive states were necessary for virtue, whereas Plato and Aristotle argued that both cognitive and affective states were necessary.\nSocrates (469–399 BCE)\nIn Plato's Protagoras, Socrates seems to identify happiness with pleasure and to explain the various virtues as instrumental means to pleasure. On this view (later revived by Epicurus, 341–271 BCE), having a virtuous character is purely a matter of being knowledgeable of what brings us more pleasure rather than less. In the Protagoras, Socrates recognizes that most people object to this view. The “many” suppose that having a virtuous character requires more than knowledge, because knowledge does not guarantee that one will act on one's knowledge and do the virtuous action. Someone may be overcome by anger, fear, lust, and other desires, and act against what he believes will bring him more pleasure rather than less. He can, in other words, be incontinent or weak-willed. Socrates replies that such cases should be understood differently. When, for example, a cowardly person flees from battle rather than endanger his life, even though he may seem to be pursuing the more pleasant action, he is really just ignorant of the greater pleasure to be achieved by entering battle and acting bravely. In other words, incontinence is not possible, according to Socrates.\nPlato (428–347 BCE)\nThe “many”'s worry about the inadequacy of knowledge to ensure virtuous action suggests that virtuous character includes not only a cognitive element, but also some affective element. Both Plato and Aristotle argue that virtuous character requires a distinctive combination of cognitive and affective elements. In the Republic, Plato divides the soul into three parts and gives to each a different kind of desire (rational, appetitive, or spirited). As types of non-rational desire, appetitive and spirited desires can conflict with our rational desires about what contributes to our overall good, and they will sometimes move us to act in ways we recognize to be against our greater good. When that happens, we are incontinent. To be virtuous, then, we must both understand what contributes to our overall good and have our spirited and appetitive desires educated properly, so that they agree with the guidance provided by the rational part of the soul. Plato describes the education of the non-rational parts of the soul in Books II and III of the Republic. A potentially virtuous person learns when young to love and take pleasure in virtuous actions, but must wait until late in life to develop the understanding that explains why what he loves is good. Once he has learned what the good is, his informed love of the good explains why he acts as he does and why his actions are virtuous.\nAristotle accepts Plato's division of the soul into two basic parts (rational and non-rational) and agrees that both parts contribute to virtuous character. Of all the Greek moralists, Aristotle provides the most psychologically insightful account of virtuous character. Because many modern philosophical treatments of character (see Sections 3 and 4 below) are indebted to Aristotle's analysis, it is best to discuss his position in some detail.\nAristotle's definition of good moral character\nAristotle defines virtuous character in Nicomachean Ethics II.7:\nExcellence [of character], then, is a state concerned with choice, lying in a mean relative to us, this being determined by reason and in the way in which the man of practical wisdom would determine it. Now it is a mean between two vices, that which depends on excess and that which depends on defect. (1106b36–1107a3)\nBy calling excellence of character a state, Aristotle means that it is neither a feeling nor a capacity nor a mere tendency to behave in specific ways. Rather it is the settled condition we are in when we are well off in relation to feelings and actions. We are well off in relation to our feelings and actions when we are in a mean or intermediate state in regard to them. If, on the other hand, we have a vicious character, we are badly off in relation to feelings and actions, and we fail to hit the mean in regard to them.\nVirtue as a mean state\nAristotle emphasizes that the mean state is not an arithmetic mean, but one relative to the situation. The different particular virtues provide illustrations of what Aristotle means. Each virtue is set over or concerned with specific feelings or actions. The virtue of mildness or good temper, for example, is concerned with anger. Aristotle thinks that a mild person ought to be angry about some things (e.g., about injustice and other forms of mistreatment) and should be willing to stand up for himself and those he cares about. Not to do so would, in Aristotle's view, indicate the morally deficient character of the inirascible person. It would also be inappropriate to take offense and get angry if there is nothing worth getting angry about. That response would indicate the morally excessive character of the irascible person. The mild person's reactions are appropriate to the situation. Sometimes intense anger is appropriate; at other times calm detachment is.\nThe psychological unity of the virtuous person and the disunity of non-virtuous conditions\nThat the virtuous person's emotional responses are appropriate to the situation indicates that her emotional responses are in harmony with her correct reasoning about what to do. Aristotle says that the non-rational part of a virtuous person's soul “speaks with the same voice” (homophônei, Nicomachean Ethics 1102b28) as the rational part. That the virtuous person's soul is unified and not torn by conflict distinguishes the state of being virtuous from various non-virtuous conditions such as continence (enkrateia), incontinence (akrasia), and vice (kakia) in general.\nAristotle seems to think that, at bottom, any non-virtuous person is plagued by inner doubt or conflict, even if on the surface she appears to be as psychologically unified as virtuous people. Although a vicious person may appear to be single-minded about her disdain for justice and her pursuit of material goods and power, she must seek out others' company to forget or ignore her own actions. Aristotle seems to have this point in mind when he says of vicious people in Nicomachean Ethics IX.4 that they are at odds with themselves and do not love themselves. Virtuous persons, on the other hand, enjoy who they are and take pleasure in acting virtuously.\nLike the morally vicious person, the continent and incontinent persons are internally conflicted, but they are more aware of their inner turmoil than the morally vicious person. Continence is essentially a kind of self-mastery: the continent person recognizes what she should do and does it, but to do so she must struggle against the pull of recalcitrant feelings. The incontinent person also in some way knows what she should do, but she fails to do it because of recalcitrant feelings.\nAristotle's position on incontinence seems to incorporate both Socratic and Platonic elements. Recall that Socrates had explained apparently incontinent behavior as the result of ignorance of what leads to the good. Since, he thought, everyone desires the good and aims at it in his actions, no one would intentionally choose a course of action believed to yield less good overall. Plato, on the other hand, argued that incontinence can occur when a person's non-rational desires move him to act in ways not endorsed by his rational desire for the greater good. Aristotle seems to agree with Socrates that the cognitive state of the incontinent person is defective at the moment of incontinent behavior, but he also agrees with Plato that a person's non-rational desires cause the incontinent action. This may be what Aristotle means when he writes that “the position that Socrates sought to establish actually seems to result; for it is not what is thought to be knowledge proper that the passion overcomes … but perceptual knowledge” (Nicomachean Ethics, 1147b14–17).\nMoral education and the human function\nBecause Aristotle thinks that virtue is a unified, unconflicted state where emotional responses and rational assessments speak with the same voice, he, like Plato, thinks that the education of our emotional responses is crucial for the development of virtuous character. If our emotional responses are educated properly, we will learn to take pleasure or pain in the right things. Like Plato, Aristotle thinks that we can take a person's pleasures and pains to be a sign of his state of character.\nTo explain what the virtuous person's pleasures are like, Aristotle returns to the idea that virtue is an excellent state of the person. Virtue is the state that makes a human being good and makes him perform his function well. His function (his ergon or characteristic activity), Aristotle says in Nicomachean Ethics I.7, is rational activity, so when we exercise our fully developed rational powers well, we are good (virtuous) human beings and live well (we are happy).\nAccording to Aristotle, human beings can reason in ways that non-human animals cannot. They can deliberate about what to do, about what kind of lives to live, about what sort of persons to be. They can look for reasons to act or live one way rather than another. In other words, they can engage in practical reasoning. They can also think about the nature of the world and why it seems to behave as it does. They can consider scientific and metaphysical truths about the universe. This is to engage in theoretical reasoning (“contemplation” or theôria). There is no agreement among scholars as to whether, and how, these types of reasoning can be distinguished. (For a discussion of theoretical and practical reason in Aristotle, see the related entry on Aristotle's ethics.) But as we shall see when we discuss Aristotle's Politics, we can assume, for the purposes of this discussion, that theoretical and practical rational activity are at least related types of rational activity, in that each involves exercising one's abilities to think and to know and to consider truths that one has figured out.\nHow do one realize these powers fully? Not by becoming adept at every kind of activity in which deliberating and judging on the basis of reason is called for. For then one would have to master every kind of cultural, scientific, and philosophical activity. Rather, Aristotle's idea is that an individual develops these abilities to the extent that he enjoys and values the exercise of his realized rational powers in a wide variety of different and even seemingly unconnected activities. When that happens, his exercise of these abilities is a continuing source of self-esteem and enjoyment. He comes to like his life and himself and is now a genuine self-lover. In Nicomachean Ethics IX.8, Aristotle takes pains to distinguish true self-love, which characterizes the virtuous person, from vulgar self-love, which characterizes morally defective types. Morally defective types love themselves in the sense that they love material goods and advantages. They desire to secure these things even at the expense of other people, and so they act in ways that are morally vicious. Genuine self-lovers, on the other hand, love most the exercise of their developed human activity, which is rational activity. When they enjoy and recognize the value of developing their rational powers, they can use this recognition to guide their decisions and to determine which actions are appropriate in which circumstances. This is the reasoning of those who have practical wisdom (phronêsis). Moreover, because they now take pleasure in the right things (they enjoy most figuring things out rather than the accumulation of wealth or power), they will avoid many of the actions, and will be unattracted to many of the pleasures, associated with the common vices. In other words, they will act as a virtuous person would.\nThe need for relationships and community\nAccording to Aristotle, the full realization of our rational powers is not something we can achieve or maintain on our own. It is hard, he says in Nicomachean Ethics IX.9, for a solitary person to be continuously active, but it is easier with others. To realize our powers fully we need at least a group of companions who share our interests and with whom we can cooperate to achieve our mutually recognized goals. In this kind of cooperative activity, we are parts of a larger enterprise, so that when others act, it is as though we are acting, too. In this way, these activities expand our conception of who “we” are, and they make the use of our powers more continuous and more stable. Examples listed by Aristotle include sailors on a ship, soldiers on an expedition, members of families, business relationships, religious associations, citizens of a political community, and colleagues engaged in contemplative activity. As Aristotle explains in Rhetoric II.4, if we and our cooperative partners do their parts responsibly, each will develop feelings of friendship for the others involved. In this way, successful cooperative activity transforms persons' desires and motivations. Although we may have initiated activity for self-interested reasons, the psychological result is that we come to like our cooperative partners and to develop a concern for their good for their own sakes. This change, Aristotle indicates, is caused to occur in us. It is not chosen. Once bonds of friendship are formed, it is natural for us to exhibit the social virtues Aristotle describes in Nicomachean Ethics IV.6–8, which include generosity, friendliness, and mildness of temper.\nAristotle thinks that, in addition to friendships, wider social relations are required for the full development of our rational powers. He says we are by nature political beings, whose capacities are fully realized in a specific kind of political community (a polis or city-state). Aristotle's ideal political community is led by citizens who recognize the value of living fully active lives and whose aim is to make the best life possible for their fellow citizens. When citizens deliberate and legislate about the community's educational, office-holding, and economic policies, their goal is to determine and promote the conditions under which citizens can fully develop their powers to think and to know.\nThus Aristotle recommends in the Politics VII-VIII that the city provide a system of public education for all citizens, a recommendation that was radical for his time. He envisions that young people will learn not simply to read and write, but also to appreciate the beauty of the world around them and to gain some understanding of how the universe works. If education is successful, young people will want to use their powers in deciding, judging, and discriminating. They will then be well-positioned to take their place as decision-makers in the citizen assembly and, because of sortition and a system of office rotation, as eventual holders of public office. The city's economic policies support the aim of the political and educational institutions. Because Aristotle sees that citizens need material resources if they are to participate fully in public life, he recommends that the state distribute parcels of land to all. Yet there is no need, in his view, to establish economic equality, as long as existing inequalities are not large enough to promote the formation of elite groups or to provoke justified anger or envy. These various policies – educational, political, economic – make it possible for a sense of justice to pervade the city, as they serve to confirm that all citizens are valued as equal practical deliberators and policy-makers.\nAristotle's criticisms of deviant political states take a related line: states that encourage the consumption and accumulation of external goods for their own sake, or states that promote warfare and military supremacy as an end in itself, mistake the nature of the best human life. Citizens of such states will grow up to love most something other than the exercise of realized human rational powers, and as a result they will be prone to such traditional vices as injustice, lack of generosity, and intemperance.\nFor more detailed discussion of the relation between Aristotle's ethical and political views, see Kraut (2002) and Schofield (2006). On Aristotle's discussions of friendship, see Cooper (1980).\nPlato and Aristotle agree that excellent moral character involves more than a Socratic understanding of the good. They think that virtue requires a harmony between cognitive and affective elements of the person. Aristotle tries to explain what this harmony consists in by exploring the psychological foundations of moral character. He thinks that the virtuous person is characterized by a nonstereotypical self-love that he understands as a love of the exercise of fully realized rational activity. Yet this self-love is not an individual achievement. Its development and preservation require (a) friendships in which individuals desire the good of others for others' own sakes and (b) political and economic arrangements that promote the conditions under which self-love and friendship flourish.\nThe Stoic school of philosophy existed for about five centuries, from its founding around 300 BCE to the second century CE. Like Socrates, Plato, and Aristotle, the Stoic philosophers differed on some issues about the virtues, but they seemed also to have shared a common core of views. This section of the entry on character will briefly discuss their common views.\nThe Stoic philosophers have a view of character that is close to Socrates’, but they reach it through agreement with Aristotle. The Stoics assume that the good life for human beings is a life in accord with nature. They agree with Aristotle that the human being's essence is a life in accord with reason. So to find what accords with nature, they look to the development of the human being's rational powers. They think that as a person begins to use reason instrumentally to satisfy and organize his desires and appetites, he comes to value the exercise of reason for its own sake. He realizes that conduct that exhibits a rational order is far more valuable than any of the natural advantages (such as health, friendship, or community) pursued by his individual actions. Human good, after all, as Aristotle argued, should be stable, under our control, and hard to take from us. The Stoics conclude that human good consists in excellent rational activity, for a person can guide his actions by rational choice, no matter what misfortunes he may encounter. The virtuous person becomes the sage (sophos) who has and acts on knowledge of the good. His actions are informed by his insights about the advantages of perfecting one's rationality by acting in agreement with the rational order of nature. Like Socrates, the Stoic view of virtue focuses on the virtuous person's cognitive state: it is his knowledge of the rational order of the universe and his desire to accord with that rational order that leads him to act as he does.\nTo be virtuous, there is no need to develop any capacities other than cognitive capacities, for the Stoics claim against Plato and Aristotle that there is really no non-rational part of the soul. Although the Stoics admit that there are passions such as anger, fear, and so on, they treat them as mistaken judgments about what is good and evil. Since the sage or virtuous person is wise and has no mistaken judgments about the good, he has no passions. So if the sage loses any natural advantages in misfortune, he has no emotion about them. Rather, he views them as “indifferents” (adiaphora). One might wonder, then, how the sage can truly be said to be virtuous. For if he views the health and welfare of himself and others as indifferents, why would he act to secure or protect his or others' welfare, as presumably a virtuous person would? The Stoics reply that natural advantages are still pursued, but only to achieve agreement with nature and to realize fully one's rational powers. They are “preferred indifferents.”\nUnlike Plato and Aristotle, the Stoics did not think virtue was developed and sustained by any particular kind of community. Granted, social relationships and community are among the preferred indifferents in that they are to be preferred to the opposite conditions of hostility, war, and enmity. But they are not necessary for anyone's happiness. If we lose them, it is not a loss of a genuine good. So the Stoic Epictetus (c. 55-c.135), a freed slave, argued that the death of one's family members is no real loss and is no worse than the breaking of a cup. The community that did matter to the Stoics was cosmic. When persons achieve perfect rationality, they accord with the rational order of a universe ruled by divine reason. This shows that all of us, virtuous or not, are ruled by one law and so belong to one universal community. As rational beings, we recognize this for we recognize that we share reason with other human beings. The Stoic Marcus Aurelius (121–180), a Roman emperor, makes the connections in this way: “If this be so [i.e., that reason is shared], then also the reason which enjoins what is to be done or left undone is common. If this be so, law also is common; if this be so, we are citizens; if this be so, we are partakers in one constitution; if this be so, the Universe is a kind of Commonwealth” (Marcus Aurelius, The Meditations, iv.4). The Stoics concluded that, as rational beings, we have no reason not to extend our concern beyond our family, friends, and immediate community to our fellow-citizens of the world community.\nThe Stoics came to represent a way of life according to which someone might strive for the well-being of others, whether friend or stranger, without caring about material rewards or worldly success. Because their view of virtue was independent of any particular social or political structure, their message held an appeal for all sorts of people, Greek or non-Greek, slave or free, rich or poor.\nFor more detailed discussion of Greek views of character, see (Dent 1975), (Irwin 1989, 1996), and (Sherman 1989).\nSince the publication of Anscombe's “Modern Moral Philosophy” in 1958 (see Introduction above), it has become routine to say that virtue and moral character have been neglected topics in the development of western moral philosophy since the Greeks. Rather than thinking about what it is to flourish and live well, moral philosophers, it is argued, became focused on a different set of notions: obligation, duty, and law.\nAnscombe and others have suggested how such a move might have taken place. The Stoic ideas outlined above may have influenced early Christians such as St. Paul to develop the idea of a natural law that applies to all human beings. Once Christianity became more widespread, natural law could be understood in terms of God's directives in the Bible. Still later, after the European political revolutions of the 17th and 18th centuries, there was intellectual room for secularized versions of the same idea to take hold: duty or obligation was understood in terms of obedience to moral law(s) or principles that do not come from God but are devised by human beings. Morally right action was action in accord with moral law(s) or principles. On such a view, where the central focus is on obedience to moral law, the virtues and moral character are secondary to action in accordance with law. Someone who acts rightly may develop standing habits or dispositions of doing so, and these habits then constitute the virtues or good character.\nThis section of the entry on moral character will provide a brief summary of some important developments both in this “modern” approach to moral character and in what appear to be revivals of the pre-Christian Greek interest in the psychological foundations of character.\nIn the writings of the early natural law theorists, Greek views of virtue sometimes came under strong criticism. Hugo Grotius (1583–1645), for example, objected to Aristotle's approach to virtue and especially to his attempts to find a mean in terms of which to understand justice. It does not matter, Grotius complained, what moves someone to act unjustly — the only thing that matters is that unjust action violates the rights of others. Grotius acknowledged that one may develop emotional habits that support right action, but he thought this was a matter of having reason control passions and emotions so that they do not interfere with right action. That reason should control passions indicates that the desired state is for one part of us to rule the other, not for both parts, in Aristotle's words, to speak with the same voice. On this view, moral character is a state closer to what the Greeks considered self-mastery or continence than it is to what they considered virtue.\nEven though the natural law theorists tended to assimilate virtue to continence, they still admitted that that there was an area of moral life in which motive and character mattered. That was the area of “imperfect duty” (as contrasted with “perfect duty”). Under a perfect duty what is owed is specific and legally enforceable by political society or courts; but action in accord with imperfect duty cannot be compelled, and what is owed under an imperfect duty is imprecise. Generosity is an example of the latter, justice of the former. In the case of generosity, one has a duty to be generous, but one cannot be legally compelled to be generous, and when or how generosity is shown is not precisely specifiable. But in the case of generosity, the motive of the agent counts. For if I give money to a poor person I encounter on the street and do so because I want others to think well of me, I have not acted generously and performed my imperfect duty. When I give generously, I must do so out of concern for the good of the person to whom I give the money.\nFor more detailed discussion of Grotius and the natural law theorists, and of the modern developments Anscombe attacked, see (Schneewind 1990, 1998). For a discussion of the persistence of Aristotelian ethics in the early modern period and a response to Schneewind, see (Frede 2013).\nThe tendencies to find room for motive and character in the area of imperfect duty, and to assimilate virtue with continence, resurface in the writings of several moral philosophers of the 17th and 18th centuries. Immanuel Kant (1724–1804) is an illustrative case. In the Metaphysics of Morals, Kant divides moral philosophy into two domains, that of justice or law on the one hand (the Doctrine of Right), and that of ethics or virtue on the other (the Doctrine of Virtue). The duties that form the subject matter of the Doctrine of Right are like the natural law theorists' perfect duties: they are precise, owed to specifiable others, and can be legally enforced. They require that we take or forego certain actions. Other duties (which form the subject matter of the Doctrine of Virtue) are duties to adopt certain ends. Many of them are imperfect, in that they do not specify how, when, or for whom (in the case of duties to others) they should be achieved. Examples are the duty not to let one's talents rust or the duty not to deny help to others. Because we cannot be compelled to adopt ends, but must do so from free choice, these duties are not legally enforceable. They require inner, not outer, legislation, so we must impose them on ourselves. Because, according to Kant, we are always fighting against the impulses and dispositions that oppose the moral law, we need strength of will and self-mastery to fulfill our imperfect duties. This self-mastery Kant calls courage.\nThat virtue is a form of continence for Kant is also suggested by his treatment of other traits such as gratitude and sympathy. Although Kant thinks that feelings cannot be required of anyone, some feelings are nevertheless associated with the moral ends we adopt. If we adopt others' happiness as an end, we will not take malicious pleasure in their downfall. On the contrary, we will naturally feel gratitude for their benevolence and sympathy for their happiness. These feelings will make it easier for us to perform our duties and are a sign that we are disposed to do so. Kant remarks of sympathy that “it is one of the impulses that nature has implanted in us to do what the representation of duty alone would not accomplish” (Kant, Metaphysics of Morals, Ak. 457).\nThus it matters to Kant that we perform the duties of virtue with the properly cultivated emotions. But to do so is not to develop our nature so that the two parts of us, reason and passion, are unified and speak with the same voice. Rather, if we perform our duties of virtue in the right spirit, one part of us, reason, retains control over the other part, passion. Kant writes that virtue “contains a positive command to a man, namely to bring all his capacities and inclinations under his (reason's) control and so to rule over himself … for unless reason holds the reins of government in its own hands, man's feelings and inclinations play the master over him” (Kant, Metaphysics of Morals, Ak. 408).\nFor more detailed discussion of Kant's views on virtue, see (O'Neill 1996).\nYet there are other philosophers for whom an interest in virtue or good character takes a turn more reminiscent of the Greeks. This revival of Greek ideas can be seen in philosophers who show an interest in the psychological foundations of good character.\nDavid Hume (1711–1776) explicitly professes a preference for ancient ethics (Hume, Enquiries, 318), claiming that morals are the one science in which the ancients are not surpassed by the moderns (Hume, Enquiries, 330). Like some of the Greek moralists, Hume thought morality must be rooted in our passional nature. For morality moves us to action whereas reason alone, Hume thought, does not. His preference for ancient ethics is most obviously seen in his focus on the nature of the virtues and in his efforts to explain how virtues arise from our feelings and desires.\nHume divides the virtues into two types: artificial and natural. Artificial virtues include justice, promise-keeping, and allegiance to legitimate government. Natural virtues include courage, magnanimity, ambition, friendship, generosity, fidelity, and gratitude, among many others. Whereas each exercise of the natural virtues normally produces good results, the good of artificial virtues is indirect in that it comes about only as a result of there being an accepted practice of exercising these virtues.\nHume's discussion of justice illustrates how the artificial virtues emerge from our feelings and desires. Hume notes that following the rules of justice does not always produce good results. Consider the judges who “bestow on the dissolute the labour of the industrious; and put into the hands of the vicious the means of harming both themselves and others” (Hume, Treatise, 579). Hume thinks that as persons become aware that stability of possessions is advantageous to each individually, they also realize that stability is not possible unless everyone refrains from disturbing others' possessions. As this awareness becomes more widespread and effective in people's behaviors, there arises a convention to respect the possessions of others. This redirection of self-interest, aided by our natural tendency to sympathize with the feelings of others who benefit from stability of possession, gives rise to our approval of justice. In this way, Hume argues, the virtue of obeying laws arises naturally from our feelings and desires.\nHume's indebtedness to Greek ethics can be seen even more clearly in his discussion of the natural virtues. Of these, one important group (consisting of courage, magnanimity, ambition, and others) is based on, or may even be a form of, self-esteem: “[W]hatever we call heroic virtue, and admire under the character of greatness and elevation of mind, is either nothing but a steady and well-established pride and self-esteem, or partakes largely of that passion. Courage … and all the other shining virtues of that kind, have plainly a strong mixture of self-esteem in them, and derive a great part of their merit from that origin” (Hume, Treatise, 599–600). Yet these virtues based on self-esteem must be tempered by a second group that includes generosity, compassion, fidelity, and friendship; otherwise traits like courage are “fit only to make a tyrant and public robber” (Hume, Treatise, 603). This second group of virtues is based on broadly-based feelings of good will, affection, and concern for others.\nHume acknowledges that his second group of natural virtues owes a debt to the Stoic view that a virtuous person ought to be concerned with the welfare of all human beings, whether they be intimate or stranger; and in describing the first group of natural virtues, Hume looks to Socrates as someone who has achieved a kind of inner calm and self-esteem. In addition, his general approach to the natural virtues, that some are based on self-esteem and others on friendly feelings and good will, is reminiscent of Aristotle's exploration of the psychological foundations of virtue.\nHume believes that we develop self-esteem from what we do well, if what we do well expresses something distinctive and durable about us, and he seems to recognize that realized deliberative abilities are among the most durable features of ourselves. As we gain a facility at deliberation, we come to develop self-esteem and enjoy who we are, like Aristotle's virtuous person who enjoys most the exercise of his developed deliberative powers. Moreover, Hume's recognition that self-esteem must be tempered by benevolence is reflected in Aristotle's argument that the development and preservation of proper self-love requires friendships in which persons come to care for others for others' own sakes.\nIn addition to exploring these psychological foundations of virtue, Hume seems to accord them a role that is reminiscent of the Aristotelian view that virtue is a state in which reason and passion speak with the same voice. Instead of making virtue and good character subordinate to the requirements of reason, as we saw in the natural law theorists and in Kant, Hume appears to give virtue and good character room to guide and constrain the deliberations of agents so as to affect what they determine to be best to do. By doing so, Hume goes some way toward indicating how good character is different from continence.\nHume's account of how we determine what is right and wrong illuminates the role character plays. When Hume's “judicious spectator” determines what is right and wrong, she fixes on some “steady and general” point of view and “loosens” herself from her actual feelings and interests. It appears that someone who has developed an enjoyment in the activities of deliberating and reflecting, and whose self-esteem is based on that enjoyment, will be more likely to take up the point of view of the judicious spectator and to perform the subtle corrections in response that may be necessary to loosen oneself from one's own perspective and specific passions. Someone whose self-esteem is based on an enjoyment taken in deliberation will be attuned to wider complications and will have the wider imaginative powers needed for correct deliberation from a steady and general point of view. Hume's view of the relation between passion and deliberation is reminiscent of the Aristotelian view that someone with proper self-love will also be practically wise, in that his self-love will enable him to size up practical situations correctly and determine correctly what it is best to do.\nFor more detailed discussion of Hume's view of the virtues, see (Baier 1991). On Hume's indebtedness to Greek ethics, see (Homiak 2000).\nAnother illustration of the use of Greek views of character can be found in the writings of Karl Marx (1818–1883) and John Stuart Mill (1806–1873). Although Marx is best known for his virulent criticism of capitalism and Mill for his exposition and defense of liberal utilitarianism, these philosophers are treated together here because their approach to character is at crucial points deeply Aristotelian. Both Marx and Mill accept Aristotle's insight that virtue and good character are based on a self-esteem and self-confidence that arises from a satisfaction taken in the fully realized expression of the rational powers characteristic of human beings. They also accept Aristotle's recognition that the production and preservation of this type of self-esteem require that individuals be part of specific socio-political structures. Aristotle emphasized the need for a special type of political community. Marx attended to smaller democratic workplaces. Mill's focus, still different, was on political equality and equality in the family.\nMarx's early Economic and Philosophic Manuscripts of 1844 is famous for the discussion of how the organization of work under capitalism alienates workers and encourages them to accept the values of capitalist society. Workers who are committed to capitalist values are characterized primarily by self-interested attitudes. They are most interested in material advancement for themselves, they are distrustful of others' seemingly good intentions, and they view others primarily as competitors for scarce positions. Given these attitudes, they are prone to a number of vices, including cowardice, intemperance, and lack of generosity.\nMarx's discussion of alienated labor suggests how work can be re-organized to eliminate alienation, undermine commitment to traditional capitalist values and goals, and produce attitudes more characteristic of Aristotle's virtuous person. The key to this transformation lies in re-organizing the nature of work so that workers can express what Marx calls their “species-being” or those features of the self that are characteristically human. Very much like Aristotle, Marx seems to mean by this an individual's ability to reason, and in particular his powers of choosing, deciding, discriminating, and judging. If work is re-organized to enable workers to express their rational powers, then each worker will perform tasks that are interesting and mentally challenging (no worker will perform strictly monotonous, routine, unskilled tasks). In addition, workers will participate in deliberations about the ends to be achieved by the work they do and how to achieve those ends. And, finally, these deliberations will be organized democratically so that the opinions of each worker are fairly taken into account. When these conditions are put into place, labor is no longer “divided” between skilled and unskilled or between managerial and non-managerial. Marx suggests that if work is reorganized in these ways, it will promote feelings of solidarity and camaraderie among workers and eventually between these workers and those in similar situations elsewhere. For the fact that workers can express their characteristic human powers in action, coupled with the egalitarian conditions in the workplace, can upset competitive feelings and promote respect by removing the bases for inferiority and superiority. Workers then come to exhibit some of the more traditional virtues such as generosity and trustfulness, and avoid some of the more traditional vices such as cowardice, stinginess, and self-indulgence.\nThat Marx's views seem derivative of Aristotle's in important ways is not surprising, for, unlike Hume whose knowledge of Aristotle is not fully known, Marx explicitly drew upon Aristotle's works. For further discussion of the extent to which Marx drew on Aristotle, see (DeGolyer 1985).\nJohn Stuart Mill (1806–1873) defended a version of liberal utilitarianism, but scholars disagree about what kind of utilitarianism that was. We can safely say that, as a utilitarian, Mill thought human conduct should promote the happiness or welfare of those affected. But was Mill an act-utilitarian, who thought that right acts are those that promote as much happiness as can be done on the particular occasion, given the alternatives available to the agent? Or was he a rule-utilitarian, who thought that right conduct was conduct permitted by rules that, when publicly known to be generally accepted or followed, would maximize happiness or welfare? Or was he a motive-utilitarian, who thought that one should act as the person with the motives or virtues most productive of happiness should act? (For a discussion of these interpretive questions, see the related entry on John Stuart Mill.) Although this entry will steer clear of these interpretive hurdles and will concentrate on Mill's discussion of the nature of happiness and of some of the institutional structures that can promote happiness, these questions of interpretation will be relevant to a final assessment of Mill in Section 4, below.\nIn his essay On Liberty Mill claims that his version of utilitarianism rests on a conception of happiness that is appropriate to people as “progressive” beings (Mill, On Liberty, 12). And in Utilitarianism he suggests that this conception is focused on the “higher pleasures” that serve to distinguish humans from animals (Mill, Utilitarianism, 7–11). These higher pleasures turn out to be the activities and pursuits that exercise what in Aristotle's view are our powers of practical deliberation — of choosing, judging, deciding, and discriminating. In On Liberty, Mill writes: “He who lets the world … choose his plan of life for him has no need of any other faculty than the ape-like one of imitation. He who chooses his plan for himself employs all his faculties. He must use observation to see, reasoning and judgment to foresee, activity to gather materials for decision, discrimination to decide, and when he has decided, firmness and self-control to hold his deliberate decision” (Mill, On Liberty, 56). As a person develops his powers of practical deliberation and comes to enjoy their exercise, he gains the self-esteem that is the basis of a virtuous and well-lived life.\nFor further discussion of Mill's view of happiness, see (Brink 1992).\nMill argued that seriously unequal societies, by preventing individuals from developing their deliberative powers, mold individuals' character in unhealthy ways and impede their ability to live virtuous lives. For example, Mill argued, in deep disagreement with the views of his own time, that societies that have systematically subordinated women have harmed both men and women, making it almost impossible for men and women to form relationships of genuine intimacy and understanding. In The Subjection of Women, Mill wrote that the family, as constituted at his time, was a “school of despotism,” which taught those who benefited from it the vices of selfishness, self-indulgence, and injustice. Among working class men, the fact that wives were excessively dependent on their husbands inspired meanness and savagery. In chapter IV of The Subjection of Women, Mill goes so far as to claim that “[a]ll the selfish propensities, the self-worship, the unjust self-preference, which exist among mankind, have their source and root in, and derive their principal nourishment from, the present constitution of the relation between men and women” (Mill, Subjection of Women, 86). Women who have been legally and socially subordinated to men become meek, submissive, self-sacrificing, and manipulative. In brief, men evidence the vices of the slave master, while women evidence the vices of the slave. For moral lives and psychologically healthy relationships to be possible, Mill called for altered marital arrangements, supported by changes in law, that would promote the development and exercise of women's deliberative powers along with men's. Only under such conditions could women and men acquire feelings of real self-esteem rather than feelings of false inferiority and superiority.\nLike Aristotle, Mill recognized the power of political institutions to transform individuals' desires and aims and to improve them morally. In chapter III of Considerations on Representative Government, Mill writes approvingly of the democratic institutions of ancient Athens. He believed that by participating in these institutions, Athenians were called upon to rise above their individual partialities and to consider the general good. By co-operating with others in governing their community, he wrote, each citizen “is made to feel himself one of the public, and whatever is their interest to be his interest” (Mill, Considerations on Representative Government, 79).\nAnd like Marx, Mill recognized the morally disturbing effects of a life limited to routine and unskilled labor. In Principles of Political Economy, he recommended that relations of economic dependence between capitalists and workers be eliminated in favor of cooperatives either of workers with capitalists or of workers alone. In these associations members were to be roughly equal owners of tools, raw materials, and capital. They worked as skilled craftspersons under self-imposed rules. They elected and removed their own managers. By elevating the dignity of labor, Mill thought such cooperatives could convert “each human being's daily occupation into a school of the social sympathies and the practical intelligence” and bring people as close to social justice as could be imagined (Mill, Principles of Political Economy, vol. 2, 295).\nAs indicated in the introduction to this entry, a renewed philosophical interest in questions of virtue and character was indirectly the result of the publication in 1971 of John Rawls's A Theory of Justice. In contrast to many of his contemporaries who focused on meta-ethical questions and the meaning of moral terms, Rawls (1921–2002) moved moral and political philosophy in a practical direction. Although Rawls's profound indebtedness to Kant is clear in A Theory of Justice, it is Rawls's discussion of moral development in Part III that has stimulated modern philosophers to explore the psychological grounding of good moral character.\nEarly in Part II, Rawls makes what he calls a “perfectly obvious” point – that “the social system shapes the wants and aspirations that its citizens come to have. It determines in part the sort of persons they want to be as well as the sort of persons they are” (1999a, 229). Later, in Part III, Rawls notes his agreement with most traditional views of justice in holding that individuals acquire a desire to act justly, and to do so for the right reasons, when they have lived under and benefited from just institutions (1999a, 399). How does the development of this desire take place? Rawls's account is indebted to Aristotle's views in two ways. First, Rawls holds, as Aristotle did, that if proper institutions are in place, then the attitudes and behaviors associated with the desire to act justly will emerge naturally, as a result of psychological tendencies persons experience in ordinary life. For, other things being equal, it is part of human psychology to enjoy most the exercise of one's realized powers (see Rawls's discussion of what he calls the Aristotelian Principle), to enjoy the realization of others' powers (see his discussion of the “companion effect” to the Aristotelian principle), and to form ties of attachment and friendship to persons and institutions who promote one's good. Second, and again like Aristotle, Rawls argues that if citizens are fortunate to live in a community that provides the basic goods they need for realizing their powers and that offers them opportunities to develop and use their abilities in shared activities with others, then they will develop a stable sense of their own value that is based on their own accomplishments and their status as equal citizens, rather than on a position more advantaged relative to others. With a stable sense of their own value and a reasonable hope of achieving their aims, citizens will want to act justly for the right reasons. They will not be prone to rancor, jealousy, and hostile envy, “one of the vices of hating mankind” (1999a, 466).\nOnly a brief discussion of these points of coincidence is possible here. Consider, first, sections 72–75 of A Theory of Justice, where Rawls outlines what he calls the three stages of moral development, governed by three psychological laws. These laws explain how individuals come to have new, non-derivative, final ends as they acquire ties of love, friendship, affection, and trust. As Aristotle recognized, these ties are caused to occur in individuals as they come to recognize others' evident intention to act for their good, and to enjoy what they and others can do.\nAt the first stage of moral development, children come to love their parents as a result of their parents' demonstrating clearly that their children are enjoyed and valued. At the second stage, members of various properly organized and reasonably successful cooperative associations (Rawls's “social unions”) come to enjoy and value their cooperative partners. This happens when members do their parts responsibly, each contributing to a mutually recognized goal, and where all participants display appropriate abilities. Under these conditions, participants come to enjoy their own participation, to enjoy the display of others' skills and abilities, and to form ties of friendship and trust with their cooperative partners. Because the activities are complementary, individuals can see themselves in what others do. In this way, individuals' sense of what they are doing is worthwhile. Their self-love, to use Aristotelian language, becomes a group achievement.\nFinally, at the third stage, as individuals come to realize how the institutions regulated by the principles of justice promote their good and the good of their fellow citizens, they become attached to these principles and develop a desire to apply and to act in accordance with them. Like the major institutions of Aristotle's ideal polis, the institutions regulated by Rawls's two principles of justice have as their aim to promote citizens' good by providing the social bases of individuals' self-worth (Rawls's primary good of “self-respect”). The provision of equal liberties in accordance with the first principle of justice enables citizens to form the associations in which their common aims and ideals can be pursued. As we have seen, these associations are necessary for self-respect to be produced and maintained. The provision of fair equality of opportunity under Rawls's second, distributive, principle of justice prevents excessive accumulation of property and wealth and maintains equal opportunity of education for all, enabling everyone with similar motivation and ability to have roughly equal prospects of culture and achievement (1999a, 63). Taken together, these two principles ensure that persons have reasonable hopes of achieving their aims. Finally, the difference principle serves to ensure everyone a decent standard of living, no matter what individual citizens' social position, natural talents, or fortune may be. The difference principle, Rawls writes, corresponds to the “idea of not wanting to have greater advantages unless this is to the benefit of others who are less well off” (1999a, 90). In these various ways, the two principles, in combination, amount to a publicly acknowledged recognition that each citizen has equal worth.\nMarx, Mill, and Rawls suggest how character can be molded by antecedent circumstances – Marx by economic structures; Mill by paid work, political life, and family relationships; Rawls by the institutions regulated by the two principles of justice. Yet these insights about the effect of institutions on character seem to raise other, more troubling questions: if our character is the result of social and political institutions beyond our control, then perhaps we are not in control of our characters at all and becoming decent is not a real possibility.\nAmong contemporary philosophers, Susan Wolf is one of several who address these worries. In her Freedom Within Reason Wolf argues that almost any morally problematic upbringing could be coercive and could render a person unable to see what he ought morally to do or render him unable to act on that recognition. As examples, Wolf cites ordinary citizens of Nazi Germany, white children of slave owners in the 1850s, and persons brought up to embrace conventional sex roles. Wolf thinks that there is no method for determining which upbringings and influences are consistent with an ability to see what should be done and to act accordingly, and hence she thinks there is always the risk that we are less responsible for our actions than we may hope.\nSuch skepticism may be misplaced. For if good character is based on naturally occurring psychological responses that most people (including persons brought up to embrace racist and sexist beliefs) experience without difficulty, then most people should be able to become better and to be responsible for actions that express (or could express) their character.\nStill, this is not to say that changing one's character is easy, straightforward, or quickly achieved. If character is formed or malformed by the structures of political, economic, and family life, then changing one's character may require access to the appropriate transforming forces, which may not be available. In modern societies, for example, many adults still work at alienating jobs that do not afford opportunity to realize the human powers and to experience the pleasures of self-expression. Women in particular, because of unequal domestic arrangements, nearly total responsibility for childcare, and sex segregation in the workplace, often endure low-paying, dead-end jobs that encourage feelings of self-hatred. In a family where economic, and hence psychological, power is unequal between women and men, affection, as Mill recognized, may harm both parties. Thus many women and men today may not be well-positioned to develop fully the psychological capacities Aristotle, Marx, Mill, and Rawls considered foundational to virtuous character.\nThese considerations indicate why character has become a central issue not only in ethics, but also in feminist philosophy, political philosophy, philosophy of education, and philosophy of literature. If developing good moral character requires being members of a community in which citizens can fully realize their human powers and ties of friendship, then one needs to ask how educational, economic, political, and social institutions should be structured to make that development possible. Some contemporary philosophers are now addressing these issues. For example, Martha Nussbaum uses Aristotelian virtues to outline a democratic ideal in (1990b). In (1996) Andrew Mason explores how capitalist market forces make it difficult for virtues to flourish. Rosalind Hursthouse applies an Aristotelian view of the emotions to an investigation of racist attitudes in (2001). In (2010) Marcia Homiak develops Aristotle's and Mill's views on the transformative power of institutions to explore the possibilities for living virtuously in an imperfect world. Laurence Thomas (1989) uses Aristotle's discussions of self-love and friendship to argue that friendship helps to develop and maintain good moral character. And if one is interested in understanding what the nature of moral character is and the extent to which it can be altered, one will find useful examples of both good and bad moral character in literary writers. For philosophical discussion of literary writers' use of character, see (Taylor 1996) and (Nussbaum 1990a).\nFinally, it might be useful to note that this brief discussion of the history of philosophical views of character indicates that character has played, or can play, an important role in a variety of western ethical traditions, from Greek virtue-centered views to Kantianism to utilitarianism to Marxism. So Anscombe's provocative claim with which this entry began — that the two major traditions in modern moral theory (Kantianism and utilitarianism) have ignored questions of virtue and character to their detriment — does not seem altogether true. Nevertheless, some of the views sureyed here seem to give a more prominent role to character and virtue than do others. It is not easy to explain precisely what this prominence consists in. Although a full treatment of these issues is beyond the scope of this essay, a preliminary indication of how they might be addressed can be provided. (For further discussion of these questions, see Trianosky 1990, Watson 1990, Homiak 1997, and Hursthouse 2001.)\nAs this entry has indicated, Kant's views do provide a role for virtue, for it matters to Kant that we perform our imperfect duties with the right spirit. The virtuous person has the properly cultivated tendencies to feel that make it easier for her to perform her imperfect duties. These feelings support her recognition of what is right and are a sign that she is disposed to perform her duties. Because Kant views the emotions as recalcitrant and in continual need of reason's control, virtue amounts to a kind of self-mastery or continence. One might put this point by saying that, for Kant, virtuous character is subordinate to the claims of practical reason.\nAristotle's view, on the other hand, is usually considered a paradigm example of a “virtue ethics”, an ethical theory that gives priority to virtuous character. To see what this might mean, recall that Aristotle's virtuous person is a genuine self-lover who enjoys most the exercise of her abilities to think and know. This enjoyment guides her practical determinations of what actions are appropriate in what circumstances and renders her unattracted to the pleasures associated with the common vices. Her properly cultivated emotional tendencies are not viewed as recalcitrant aspects of her being that need to be controlled by reason. Rather, her practical decisions are informed and guided by the enjoyment she takes in her rational powers. One might put this point by saying that, in Aristotle's view, practical deliberation is subordinate to character.\nOne might then ask of other ethical views whether they take practical deliberation to be subordinate to character or vice versa. As this entry has indicated, Hume appears to side with Aristotle and to give character priority over practical deliberation. For he suggests that someone with the natural virtues based on self-esteem will have the wider imaginative powers needed for correct deliberation from the standpoint of the judicious spectator. Whether character is subordinate to reason for Mill may depend on what sort of utilitarianism Mill can be shown to espouse. If he is a motive-utilitarian who thinks that one should act as the person with the motives or virtues most productive of happiness would act, then a case could be made for his giving character priority over practical reason. If, on the other hand, he is an act- or rule-utilitarian, he would seem to give character a role that is subordinate to reason. These brief remarks indicate that the question of whether an ethical theorist gives priority to character can only be determined by a thorough analysis of the various critical elements of that philosopher's view.\nThis entry will end with a brief discussion of some recent philosophical work that is skeptical of character. This work relies on results in experimental social psychology to call into question the conceptions of character and virtue that are of concern especially to the ancient Greek moralists and to contemporary philosophers whose work derives from ancient views. Philosophers impressed by this tradition in experimental social psychology--which is often labeled “situationism”--have denied that traits of character are stable, consistent, or evaluatively integrated in the way that ancient or contemporary philosophers suggest. The ancient moralists assumed that virtues are, in John Doris's description, “robust traits: if a person has a robust trait, they [sic] can be confidently expected to display trait-relevant behavior across a wide variety of trait-relevant situations, even where some or all of these situations are not optimally conducive to such behavior” (2002, 18). But Doris and others argue that traits are not robust or “global.” They are not stable or consistent and are wrongly invoked to explain why people act as they do. Rather, these philosophers argue, and as the experimental tradition indicates, much of human behavior is attributable to seemingly trivial features of the situations in which persons find themselves. Hence the appropriateness of the label “situationist” for the philosophers espousing these views. (For variations on this view, see Harman (1999, 2000), Doris (2002), and Vranas (2005).)\nIt is beyond the scope of this entry to discuss this debate in detail. Some summary remarks, however, are in order. (For a detailed discussion, see the entry on moral psychology: empirical approaches, section 4.)\nSkepticism about global traits of character emerges from some famous experiments in social psychology. For example, in one experiment persons who found a dime in a phone booth were far more likely to help a confederate who dropped some papers than were those who did not find a dime. Another experiment involved seminary students who agreed to give a talk on the importance of helping those in need. On the way to the building where their talks were to be given, they encountered a confederate slumped over and groaning. Those who were told they were already late were much less likely to help than those who were told they had time to spare. These experiments are taken to show that minor factors without moral significance (finding a dime, being in a hurry) are strongly correlated with people's helping behavior.\nPerhaps most damning for the robust view of character are the results of the experiments conducted by Stanley Milgram in the 1960s. In these experiments the great majority of subjects, when politely though firmly requested by an experimenter, were willing to administer what they thought were increasingly severe electric shocks to a screaming “victim.” These experiments are taken to show that if subjects did have compassionate tendencies, these tendencies cannot have been of the type that robust traits require.\nPhilosophers influenced by the experimental tradition in social psychology conclude that people do not have the broadly based, stable, consistent traits of character that were of interest to the ancient and modern moralists, or to contemporary philosophers working with some version of those views. Rather, the psychological studies are taken to show that persons generally have only narrow, “local” traits that are not unified with other traits into a wider behavioral pattern. Persons are helpful when in a good mood, say, but not helpful when in a hurry, or they are honest at home but not honest at work.\nThese interpretations of the experiments in social psychology have been challenged by both psychologists and philosophers, especially by philosophers working in the tradition of virtue ethics (see related entry on virtue ethics), who claim that the character traits criticized by situationists have little to do with the conception of character associated with the ancient and modern moralists. The objectors say that the situationists rely on an understanding of character traits as isolated and often non-reflective dispositions to behave in stereotypical ways. They wrongly assume that traits can be determined from a single type of behavior stereotypically associated with that trait.\nConsider again the payphone and seminarian studies. It may seem obvious that one cannot respond to all appeals for help, and it may seem doubtful that any reflective person thinks one should. This suggests that being a helpful person requires some thinking about what is most important in one's life, for calls of help can justifiably go unanswered if the individual believes that responding will interfere with her doing something else that she takes to be of higher moral importance. So we should not expect helping behavior to be wholly consistent, given the complex situations in which persons find themselves. Some of the philosophers discussed in this entry, such as the natural law theorists (in section 3.1) and Kant (in section 3.2), might make this point by reminding us of the distinction between perfect and imperfect duties. Unlike perfect duties, which require that we take or forego certain actions, the duty to assist others in need is imperfect, in that how, when, and whom we assist is not precisely specifiable and so is within the individual's discretion. The general point, on which most of the ancient and modern moralists would agree, is that being helpful cannot be understood in isolation from other values, aims, and traits that the individual has. (For discussion of how values can be unified, see Wolf (2007)).\nOr consider the Milgram experiments. During the experiments, many of the subjects protested even while continuing to obey the experimenter's commands. In post-experiment interviews with subjects, Milgram noted that many were completely convinced of the wrongness of what they were doing. But the presence of conflict need not indicate an absence, or loss, of character. On a traditional conception of character, as examined in this entry, many of Milgram's subjects are best described as incontinent. They have character, but it is neither virtuous nor vicious. Many of us seem to fall into this category. We often recognize what it is right to do but we nevertheless do not do it.\nIn short, the objectors say that the situationists rely on a simplified view of character. They assume that behavior is often sufficient to indicate the presence of a trait of character, and they ignore the other psychological aspects of character (both cognitive and affective) that, for most of the philosophers discussed in this entry, form a more or less consistent and integrated set of beliefs and desires. In particular, the objectors say, the situationists ignore the role of practical deliberation (or, in the case of virtuous character, practical wisdom).\nFor variations on these replies to the situationists, see Kupperman (2001), Kamtekar (2004), Radcliffe (2007), Sabini and Silver (2005), Sreenivasan (2013), and cf. von Wright (1963,136–154).\nSituationists might reply that to emphasize the role of practical wisdom is to make good moral character an ideal that too few of us, if any, can achieve. On some conceptions of moral knowledge, such as that proposed by Plato in the Republic, acquiring the knowledge necessary for virtue takes over 50 years of psychological and intellectual training. On Aristotle's view, as this entry has indicated, the full realization of our rational powers that is required for good moral character is not something that we can achieve on our own. The development and preservation of good moral character requires political institutions that promote the conditions under which self-love and friendship flourish. The situationist might wonder how useful traditional conceptions of good character can be, if acquiring virtuous character is a long and difficult process made possible by social institutions that do not yet exist. The situationist may take these problems as support for his view that we are better off thinking in terms of local traits rather than global traits.\nIn ending, it is appropriate to recall the discussion in section 4, above. On the one hand, on a view of character such as Aristotle's, which relies on ordinary capacities to experience the pleasures of self-expression and to respond with friendly feelings to others' efforts to help, almost everyone is capable of becoming better. On the other hand, if Aristotle and others (such as Marx, Mill, and Rawls) are correct that character is shaped by the institutions of political, economic, and family life, then becoming good will require access to the appropriate institutions. But this is not to suggest that becoming good is out of our reach. It may be helpful here to recall Rawls's description of a “realistic utopia” in The Law of Peoples when, following Rousseau in The Social Contract, he writes that just institutions take “men as they are” and “laws as they might be.” (Rawls, 1999b, 7) Our psychological natures and the institutions that promote good qualities of character are, on his view and on others discussed throughout this entry, congruent.\n- Aristotle, Nicomachean Ethics, and Politics, in The Complete Works of Aristotle, J. Barnes (ed.), 2 vols, Princeton, NJ: Princeton University Press, 1984.\n- Aurelius, M., The Meditations of the Emperor Marcus Antoninus, A. Farquarson (tr.), Oxford: Clarendon Press, 1944.\n- Grotius, H., On the Law of War and Peace, F. Kelsey (tr.), Oxford: Clarendon Press, 1925.\n- Hume, D., Enquiries Concerning Human Understanding and Concerning the Principles of Morals, L. A. Selby-Bigge (ed.), Oxford: Clarendon Press, 1902.\n- –––, A Treatise of Human Nature, L. A. Selby-Bigge (ed.), rev. P. H. Nidditch, Oxford: Clarendon Press, 1978.\n- Kant, Immanuel, The Metaphysics of Morals, M. Gregor (tr.), Cambridge: Cambridge University Press, 1991.\n- Long, A. A. and Sedley, D. N., (eds.), 1987, The Hellenistic Philosophers, Cambridge: Cambridge University Press.\n- Marx, K., Economic and Philosophic Manuscripts of 1844, in The Marx-Engels Reader, R. C. Tucker (ed.), New York: W. W. Norton, 1978.\n- Mill, J.S., Principles of Political Economy, 2 vols., London: Colonial Press, 1900.\n- –––, On Liberty, D. Spitz (ed.), New York: W. W. Norton, 1975.\n- –––, Utilitarianism, G. Sher (ed.), Indianapolis: Hackett, 1979.\n- –––, The Subjection of Women, S. Okin (ed.), Indianapolis: Hackett, 1988.\n- –––, Considerations on Representative Government, Amherst: Prometheus Books, 1991.\n- Plato, Complete Works, J. Cooper (ed.), Indianapolis: Hackett, 1999.\n- Rawls, J., 1999a, A Theory of Justice, Cambridge: Harvard.\n- –––, 1999b, The Law of Peoples, Cambridge: Harvard.\n- Anscombe, G., 1958, “Modern Moral Philosophy”, Philosophy, 33: 1–19.\n- Baier, A., 1991, A Progress of Sentiments, Cambridge: Harvard University Press.\n- Brink, D., 1992, “Mill's Deliberative Utilitarianism”, Philosophy & Public Affairs, 21: 67–103.\n- Cooper, J., 1980, “Aristotle on Friendship”, in Essays on Aristotle's Ethics, A. Rorty (ed.), Berkeley: University of California Press.\n- DeGolyer, M., 1985, Science and Society, Justice and Equality: An Historical Approach to Marx, Ph.D. dissertation, Claremont Graduate School.\n- Dent, N., 1975, The Moral Psychology of the Virtues, Cambridge: Cambridge University Press.\n- Doris, J., 2002, Lack of Character: Personality and Moral Behavior, Cambridge: Cambridge University Press.\n- Frede, D., 2013, “The Historic Decline of Virtue Ethics” in The Cambridge Companion to Virtue Ethics, D. Russell (ed.), Cambridge: Cambridge University Press.\n- Harman, G., 1999, “Moral Philosophy Meets Social Psychology: Virtue Ethics and the Fundamental Attribution Error”, Proceedings of the Aristotelian Society, 99: 315–331.\n- –––, 2000, “The Nonexistence of Character Traits”, Proceedings of the Aristotelian Society, 100: 223–226.\n- Homiak, M., 1997, “Aristotle on the Soul's Conflicts: Toward an Understanding of Virtue Ethics”, in Reclaiming the History of Ethics: Essays for John Rawls, A. Reath, B. Herman, and C. Korsgaard (eds.), Cambridge: Cambridge University Press.\n- –––, 2000, “Hume's Ethics: Ancient or Modern?”, Pacific Philosophical Quarterly, 81: 215–236.\n- –––, 2010, “Yes, We Can Live Reasonably Decently and Flourish in an Imperfect World”, in The Value of Time and Leisure in a World of Work, M. Haney and A. D. Kline, (eds.), Lanham, MD: Lexington Books/Rowman and Littlefield.\n- Hursthouse, R., 2001, On Virtue Ethics, Oxford: Oxford University Press.\n- Irwin, T., 1989, Classical Thought, Oxford: Oxford University Press.\n- –––, 1996, “The Virtues: Theory and Common Sense in Greek Philosophy” in How Should One Live?, R. Crisp (ed.), Oxford: Clarendon Press.\n- Kamtekar, R., 2004, “Situationism and Virtue Ethics on the Content of Our Character”, Ethics, 114: 458–91.\n- Kraut, R., 2002, Aristotle, Oxford: Oxford University Press.\n- Kupperman, J., 2001, “The Indispensability of Character”, Philosophy, 76: 239–50.\n- Mason, A., 1996, “MacIntyre on Modernity and How It Has Marginalized the Virtues”, in How Should One Live?, R. Crisp (ed.), Oxford: Clarendon Press.\n- Nussbaum, M., 1990a, Love“s Knowledge, New York: Oxford University Press.\n- –––, 1990b, ”Aristotelian Social Democracy“, in Liberalism and the Good, R. Douglass, G. Mara, and H. Richardson (eds.), New York: Routledge.\n- O”Neill, O., 1996, “Kant”s Virtues“, in How Should One Live?, R. Crisp (ed.), Oxford: Clarendon Press.\n- Radcliffe, E., 2007, ”Moral Naturalism and the Possibility of Making Ourselves Better“, in Moral Cultivation, B. Wilburn (ed.), Lanham, MD: Lexington Books/Rowman and Littlefield.\n- Schneewind, J. B., 1990, ”The Misfortunes of Virtue“, Ethics 101: 42–63.\n- –––, 1998, The Invention of Autonomy, Cambridge: Cambridge University Press.\n- Sabini, J. and Silver, M., 2005, ”Lack of Character? Situationism Critiqued,“ Ethics, 115: 535–562.\n- Schofield, M., 2006, ”Aristotle's Political Ethics“, in The Blackwell Guide to Aristotle's Nicomachean Ethics, R. Kraut (ed.), Oxford: Blackwell Publishing.\n- Sherman, N., 1989, The Fabric of Character: Aristotle”s Theory of Virtue, Oxford: Clarendon Press.\n- Sreenivasan, G., 2013, “The Situationist Critique of Virtue Ethics” in The Cambridge Companion to Virtue Ethics, D. Russell (ed.), Cambridge: Cambridge University Press.\n- Taylor, G., 1996, “Deadly Vices?”, in How Should One Live?, R. Crisp (ed.), Oxford: Clarendon Press.\n- Thomas, L., 1989, Living Morally: A Psychology of Moral Character, Philadelphia: Temple University Press.\n- Trianosky, G., 1990, “What is Virtue Ethics All About?”, American Philosophical Quarterly, 27:335–344.\n- von Wright, G., 1963, The Varieties of Goodness, London: Routledge & Kegan Paul.\n- Vranas, P., 2005, “The Indeterminacy Paradox: Character Evaluations and Human Psychology”, Noûs 39: 1–42.\n- Watson, G., 1990, “On the Primacy of Character”, in Identity, Character, and Morality: Essays in Moral Psychology, O. Flanagan and A. Rorty (eds.), Cambridge: MIT Press.\n- Wolf, S., 1990, Freedom Within Reason, Oxford: Oxford University Press.\n- –––, 2007, “Moral Psychology and the Unity of the Virtues”, Ratio, 20:145–67.\nHow to cite this entry. Preview the PDF version of this entry at the Friends of the SEP Society. Look up this entry topic at the Indiana Philosophy Ontology Project (InPhO). Enhanced bibliography for this entry at PhilPapers, with links to its database.\n- Ethics Updates, maintained by Larry Hinman, Philosophy Dept., University of San Diego\n- BEARS: Brown Electronic Article Review Service in Moral and Political Philosophy, maintained by James Dreier and David Estlund, Philosophy Dept., Brown Unversity", "label": "No"}