text
stringlengths 25
68.8k
| quality
float64 1
2.58
| source
stringclasses 5
values |
|---|---|---|
Longest subarray having average greater than or equal to x
Given an array of integers and an integer x. Find length of maximum size subarray having average of integers greater than or equal to x.
Examples:
Input : arr[] = {-2, 1, 6, -3}, x = 3
Output : 2
Longest subarray is {1, 6} having average
3.5 greater than x = 3.
Input : arr[] = {2, -3, 3, 2, 1}, x = 2
Output : 3
Longest subarray is {3, 2, 1} having
average 2 equal to x = 2.
A simple solution is to one by one consider each subarray and find its average. If average is greater than or equal to x, then compare length of subarray with maximum length found so far. Time complexity of this solution is O(n2).
An efficient solution is to use binary search and prefix sum. Let the required Longest subarray be arr[i..j] and its length is l = j-i+1. Thus, mathematically it can be written as:
(Σ (arr[i..j]) / l ) ≥ x
==> (Σ (arr[i..j]) / l) – x ≥ 0
==> (Σ (arr[i..j]) – x*l) / l ≥ 0 …(1)
The equation (1) is equivalent to subtracting x from each element of subarray and then taking average of resultant subarray. So the resultant subarray can be obtained by subtracting x from each element of array. Let the updated subarray is arr1. Equation (1) can be further simplified as:
Σ (arr1[i..j]) / l ≥ 0
==> Σ (arr1[i..j]) ≥ 0 …(2)
Equation (2) is simply Longest subarray having sum greater than or equal to zero. The Longest subarray having sum greater than or equal to zero can be found by method discussed in following article:
Longest subarray having sum greater than k.
The step wise algo is:
1. Subtract x from each element of array.
2. Find Longest subarray having sum greater than or equal to zero in updated array using prefix sum and binary search.
Below is the implementation of above approach:
filter_none
edit
close
play_arrow
link
brightness_4
code
// CPP program to find Longest subarray
// having average greater than or equal
// to x.
#include <bits/stdc++.h>
using namespace std;
// Comparison function used to sort preSum vector.
bool compare(const pair<int, int>& a, const pair<int, int>& b)
{
if (a.first == b.first)
return a.second < b.second;
return a.first < b.first;
}
// Function to find index in preSum vector upto which
// all prefix sum values are less than or equal to val.
int findInd(vector<pair<int, int> >& preSum, int n, int val)
{
// Starting and ending index of search space.
int l = 0;
int h = n - 1;
int mid;
// To store required index value.
int ans = -1;
// If middle value is less than or equal to
// val then index can lie in mid+1..n
// else it lies in 0..mid-1.
while (l <= h) {
mid = (l + h) / 2;
if (preSum[mid].first <= val) {
ans = mid;
l = mid + 1;
}
else
h = mid - 1;
}
return ans;
}
// Function to find Longest subarray having average
// greater than or equal to x.
int LongestSub(int arr[], int n, int x)
{
int i;
// Update array by subtracting x from
// each element.
for (i = 0; i < n; i++)
arr[i] -= x;
// Length of Longest subarray.
int maxlen = 0;
// Vector to store pair of prefix sum
// and corresponding ending index value.
vector<pair<int, int> > preSum;
// To store current value of prefix sum.
int sum = 0;
// To store minimum index value in range
// 0..i of preSum vector.
int minInd[n];
// Insert values in preSum vector.
for (i = 0; i < n; i++) {
sum = sum + arr[i];
preSum.push_back({ sum, i });
}
sort(preSum.begin(), preSum.end(), compare);
// Update minInd array.
minInd[0] = preSum[0].second;
for (i = 1; i < n; i++) {
minInd[i] = min(minInd[i - 1], preSum[i].second);
}
sum = 0;
for (i = 0; i < n; i++) {
sum = sum + arr[i];
// If sum is greater than or equal to 0,
// then answer is i+1.
if (sum >= 0)
maxlen = i + 1;
// If sum is less than 0, then find if
// there is a prefix array having sum
// that needs to be added to current sum to
// make its value greater than or equal to 0.
// If yes, then compare length of updated
// subarray with maximum length found so far.
else {
int ind = findInd(preSum, n, sum);
if (ind != -1 && minInd[ind] < i)
maxlen = max(maxlen, i - minInd[ind]);
}
}
return maxlen;
}
// Driver code.
int main()
{
int arr[] = { -2, 1, 6, -3 };
int n = sizeof(arr) / sizeof(arr[0]);
int x = 3;
cout << LongestSub(arr, n, x);
return 0;
}
chevron_right
Output:
2
Time Complexity: O(nlogn)
Auxiliary Space: O(n)
My Personal Notes arrow_drop_up
A Programmer and A Machine learning Enthusiast
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to _EMAIL_. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.
Improved By : DivyaPurwar1
| 2.540664
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
A precursor of the modern day helicopter, the Aerial Screw designed by Leonardo da Vinci was designed to compress air in order to obtain flight. Now you can build this model straight from da Vinci's musings and marvel at how ahead of his time he truly was. Snap together assembly, no glue required.
Recommended ages 8 and up.
Made of plastic, the assembled model measures approx. 5" H and 7" W.
Leonardo da Vinci first sketched the predecessor to the modern helicopter in the late 15th century. Dubbed the "aerial screw," this simple machine was designed to compress air to obtain flight through its unique shape. When originally designed, da Vinci's helicopter measured more than 15 feet in diameter and was made from reed, linen and wire. The four men depicted on this model represent the original four men in the sketches who stood on a central platform, turning cranks to rotate the shaft. However, due to weight constraints, this model would never have been able to take flight.
A true Renaissance man, da Vinci was everything from a sculptor to a mathematician to an anatomist. He is credited with designing many original prototypes of modern inventions.
WARNING: Choking Hazard - Small parts. Not for children under 3 years.
| 1.389574
|
HuggingFaceFW/fineweb-edu
|
, the right-wing watchdog group that has taken up the cause of forcing everyone in the Air Force to swear an oath to God -- regardless of their clear constitutional right not to -- claims that the proponents of forced religious oaths in the military have history on their side, saying:
While this oath has undergone modifications over the centuries, the phrase 'So help me God' dates all the way back to 1776. So there can be no question regarding whether or not our Founding Fathers believed there was any conflict among the reference to 'God' and our founding principles and the Constitution.
No question? Really? Then how come the military oath written by the very first Congress in 1789 left off the "So help me God" line? That's right, the very first Congress, which included a good number of the founders who actually framed the Constitution, did not make "So help me God" part of the military oath! These words were not part of any military oath until 1862, when the oath for officers needed to be changed because of the Civil War. And it wasn't until a full century after that that the words were added to the enlisted oath.
Yes, it is true that one of the oaths used during the Revolutionary War, the oath taken by officers, did include the words. At that time, military officers were required to take the same oath taken by all officers of the government, military or civilian. This oath, renouncing all allegiance to King George and acknowledging the independence of the United States, did end with "So help me God." The first oath written specifically for the military, however, the oath first written in 1775 and revised in 1776 and taken by all enlisted soldiers, did not include the words.
In September 1789, the first military oath under the new Constitution was approved. This oath, which was the same for both officers and enlisted, was part of "An Act to recognize and adapt to the Constitution of the United States the establishment of the Troops raised under the Resolves of the United States in Congress Assembled," and did not include the words "So help me God."
Here is the original oath written by the Congress of 1789. This oath was actually two oaths, both of which were required for both officers and enlisted:
It wasn't until long after the days of the founders -- over seven decades after these original oaths were written -- that "So help me God" was added to any military oath. The change came in 1862, when the oath for military officers was rewritten to include a statement that the officer had never borne arms against the United States or aided the Confederacy. This new Civil War era oath was the first military oath to end with the words "So help me God." The oath for enlisted members of the military, however, was not changed at this time. That oath remained "godless" for another century.
The enlisted oath was not changed until 1950. The reason for the change at that time was the establishment of the Uniform Code of Military Justice (UCMJ). The purpose of the UCMJ, passed by Congress in May 1950, was to make the justice system in the military "uniform" across all of the branches of the military. Upon passage of the UCMJ, the line in the enlisted oath saying that a service member would obey orders "according to the articles of war" had to be changed to obeying orders "according to regulations and the Uniform Code of Military Justice." But "So help me God" was still not added to the oath when this change was made. That wouldn't happen until 1962, when Congress passed an act to make the enlisted oath more consistent with the officer oath, which, of course, did include the "so help me God" line.
So, why don't we just get back to the intent of the founders, which is what groups like Judicial Watch are always claiming they want to do? The founders who wrote the first military oath under the Constitution in 1789 did not include the words "So help me God," so their intent was obviously that these words not be part of the oath. Judicial Watch's claim of having history on their side does not hold water. Maybe that will help the Air Force answer the questions that they are "not prepared at this moment to definitively answer."
comments powered by Disqus
| 1.75605
|
Zyphra/Zyda-2
|
JournalArticleobiedkov2009buildingBuilding access control models with attribute exploration2009ObiedkovSergeiKourieG.DerrickEloffJ.H.P.2-728 ISSN: 0167-4048 DOI: 10.1016/j.cose.2008.07.011Computers and Security1–2http://www.sciencedirect.com/science/article/pii/S0167404808000497The use of lattice-based access control models has been somewhat restricted by their complexity. We argue that attribute exploration from formal concept analysis can help create lattice models of manageable size, while making it possible for the system designer to better understand dependencies between different security categories in the domain and, thus, providing certain guarantees for the relevance of the constructed model to a particular application. In this paper, we introduce the method through an example.access, analysis, attribute, concept, control, exploration, fca, formal, security
| 1.029438
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
By Justin Moyer
The Washington Post
— Defense Secretary Leon Panetta signed an order Thursday allowing women the same opportunities as men to serve in combat, including formerly off-limits assignments on attack submarines and in the Navy SEALs. Just two weeks before the announcement, researchers from San Diego's Naval Health Research Center published a study suggesting that some recent mothers deployed on the battlefield may be more prone to depression after seeing action.
"Women who deploy and report combat-associated exposures after childbirth are significantly more likely to screen positive for maternal depression than are women who did not deploy after childbirth," concluded the study, titled "Is Military Deployment a Risk Factor for Maternal Depression?" and appearing in the Journal of Women's Health. "It is also possible," the report noted, "that giving birth and leaving a young child, in addition to the experience of combat, contribute to postdeployment depression."
The study included eight co-authors, five of them associated with the Naval Health Research Center, a research and development laboratory within the Department of Defense. It was based on surveys of more than 1,600 women who "gave birth during active duty service."
Not all branches of the armed forces showed the same results. "Participants who served in the Army had an increased risk of maternal depression; Army service members tend to be deployed longer and more frequently than personnel serving in the Navy and Air Force," the study found.
Of course, you don't have to be a mom to experience depression on the front line. The report points out that "the increased rate of depression is primarily attributed to experiencing combat while deployed," not just to whether a solider is also a parent.
| 1.453993
|
HuggingFaceFW/fineweb-edu
|
A WiFi is an electronic device that allows for the transfer of information from one place to another as a patient portal aegislabs. It is used in an office environment or to provide a "hotspot" to several devices. It also provides access to social networking sites and real-time streaming.
WiFi is a device-to-device connectivity
Wi-Fi is device-to-device connectivity that allows users to connect their devices to the internet. The main requirement for a Wi-Fi-enabled device is the ability to receive and transmit a wireless signal. Any wireless capable device in a specific range can pick up the WiFi signal.
The range of a Wi-Fi network depends on the frequency band, radio power output, antenna gain, and propagation characteristics. Antennas are important at both ends of the connection. A more focused signal may be able to reach longer distances, whereas a more diffuse signal is more likely to reach shorter distances.
A Wi-Fi node is a low-power device that transmits and receives radio signals. Depending on the local rules and regulations, the maximum power that a device can transmit is limited. The type of frequency used and the modulation technique are also factors.
It allows for Bluetooth, social media, real-time streaming, and access to the limitless information
WiFi has taken over as the de facto network of choice for smart devices ranging from smartphones to wearables to home appliances. With this comes the need for a myriad of authentication techniques for devices to connect. In addition, the Internet of Things (IoT) has ushered in a whole new world of connected devices.
The resulting demand has resulted in the proliferation of new and exciting technologies, such as Bluetooth, wireless displays, and Wi-Fi. However, in this age of hyper-connectivity, users have become savvier in the security department, leaving lesser technologies to take a back seat.
Unlike older connectivity technologies, wireless connections are capable of transmitting a plethora of data ranging from simple pictures to a fully interactive 3D virtual reality experience. Moreover, the advent of smart home automation has ushered in the need for a unified interface to control and interact with these disparate smart devices.
Also check: Best key role of event management in any event
It is a mobile computing device
Mobile computing is a technology that allows for the transmission of information,
such as photos, videos, and audio, via wireless devices. Unlike personal computers, mobile devices can be used in a variety of environments, from office settings to homes. In addition to the aforementioned functions, a mobile device can also be used for location-based services. Likewise, a smartphone can be used for making long-distance calls using cellular networking technology.
A mobile computing device is any device that is equipped with a mobile component, such as a mobile processor, mobile broadband network, or a mobile operating system. It is possible to buy a mobile PC, or "mobile PC," that is based on a desktop computer's hardware. It can be a laptop or tablet, and it can be used to do pretty much anything a desktop PC can do.
It requires a modem and a wireless gateway
If you want to connect to the Internet, you're going to need a modem and a wireless gateway. The device may be a standalone or a router, and the choice depends on the type of internet you are using.
A modem is a small, black box that sits in your home. It's designed to receive and process data from your ISP. It's usually a high-tech device with a couple of ethernet ports and an external antenna. A wireless router is a type of modem that
broadcasts your Internet service as a home Wi-Fi network.
A modem and a wireless gateway are two separate devices that work together to give you a secure, reliable, and speedy connection. However, they are not interchangeable. Having a modem and a router is a savvy idea, especially if you have multiple devices that you want to use with your Internet connection.
It is aimed at office areas or to provide a "hotspot"
A hotspot is a mobile device, often a smartphone, that provides Internet access to other devices. This can be done through tethering or simply by creating a Wi-Fi network from your smartphone. You can also buy a dedicated mobile hotspot to provide always-on broadband Internet speeds.
Public hotspots are typically located in libraries, coffee shops, airports, hotels, and department stores just like wmlink 2step. The provider of the hotspot may have legal obligations related to privacy and liability. These concerns may relate to the potential for exposure to objectionable content, as well as child safety and protection from illegal behavior.
Private hotspots, on the other hand, allow you to access the Internet on your device, without a cellular connection. This is a convenient solution for collaborating on a presentation in a conference room or working on a project in a van.
| 2.121991
|
m-a-p/FineFineWeb
|
What are Predictive Analytics?
Predictive analytics refers to the analysis of big data to make predictions and determine the likelihood of future outcomes, trends or events. In business, it can be used to model various scenarios for how customers react to new product offerings or promotions and how the supply chain might be affected by extreme weather patterns or demand spikes. Predictive analytics may involve various statistical techniques, such as modeling, machine learning, and data mining.
The power of predictive analytics stems from a wide range of methods and technologies—big data, data mining, statistical modeling, machine learning, assorted mathematical processes—that can be used in conjunction with parameters to sort through massive volumes of data, both current and historical, to pinpoint patterns and predict occurrences and situations that will likely occur at a specified time. This is especially useful for helping companies find and take advantage of patterns within data, whether highlighting risks and opportunities, behavior relationships, or supply chain management.
Reliability and accuracy sets modern predictive analytics apart from past tools used to forecast sales, inventory, scheduling, occupancy, revenue, and a number of other critical business areas. Organizations in virtually any market can maximize a marketing campaign using predictive analytics to encourage customer purchases and feedback, and retain the most valuable customers through carefully targeted offers and promotions.
Use Cases, by Industry
Numerous industries are employing predictive analytics to find ways to operate more efficiently—saving money—and tap into new ways to increase revenue. Retailers can fine tune the customer experience, both online and in store. Airlines, hotels, and restaurants can build pricing around customer travel and dining habits. And predictive analytics brings a previously unknown accuracy to managing inventory and coordinating logistics. Predictive analytics is a popular crimefighting tool because it can find and stop fraud, cyberattacks, and other crimes by tracking behaviors. When unusual activity is detected an organization can take action before bad actors strike.
Healthcare providers use predictive analytics to determine which patients are most at risk, what those risks are, and the best course of care. Companies providing healthcare coverage are able, thanks to these types of analytics, to more readily identify fraudulent claims as well as track patient adherence to prescribed care.
The Difference Between Predictive and Prescriptive
Prescriptive analytics functions at a slightly higher level than predictive analytics, but is still an extension of predictive analytics. While predictive analytics is used to predict what will happen in the future, prescriptive analytics is used to recommend or prescribe specific actions when certain information states are reached, or conditions are met. It uses algorithms, mathematical techniques and/or business rules to choose among several different actions that are aligned to an objective (such as improving business performance) and that recognize various requirements or constraints.
| 1.856408
|
openbmb/Ultra-FineWeb
|
Breast Cancer: Introduction
What is cancer?
Cancer starts when cells in the body change (mutate) and grow out of control. Your body is made up of tiny building blocks called cells. Normal cells grow when your body needs them, and die when your body doesn't need them any longer. Cancer is made up of abnormal cells that grow even though your body doesn't need them. In most types of cancer, the abnormal cells grow to form a lump or mass called a tumor.
Understanding the breast
The breast is made up of lobules and ducts. The lobules are the glands that can make milk. The ducts are thin tubes that carry the milk from the lobules to the nipple. The breast is also made of fat, connective tissue, lymph nodes, and blood vessels.
What is breast cancer?
Breast cancer is cancer that starts in cells in the breast. The ducts and the lobules are the 2 parts of the breast where cancer is most likely to start.
Breast cancer is one of the most common types of cancer in women in the U.S. Healthcare providers don't yet know exactly what causes it. Once breast cancer forms, cancer cells can spread to other parts of the body (metastasize), making it life-threatening. The good news is that breast cancer is often found early, when it's small and before it has spread.
There are many types of breast cancer. These are the most common types:
Ductal carcinoma. This is the most common type. It starts in the lining of the milk ducts. When breast cancer has not spread outside of the ducts, it's called ductal carcinoma in situ (DCIS) or intraductal carcinoma. This is the most common type of noninvasive breast cancer. Invasive ductal carcinoma is breast cancer that has spread beyond the walls of the breast ducts. It's the most common type of invasive breast cancer.
Invasive lobular carcinoma. This type starts in the milk-producing glands (lobules) and spreads outside the lobules.
Here are a few less common types that you may hear about:
Paget disease. This is a very rare form of breast cancer that starts in the glands in the skin of the nipple. It grows slowly and occurs in only 1 nipple. Most people with Paget disease also have tumors in the same breast. This type causes symptoms that are like a skin infection, such as inflammation, redness, oozing, crusting, itching, and burning.
Inflammatory breast cancer. This is a rare form of invasive breast cancer. Often there is no lump or tumor. Instead, this cancer makes the skin of the breast look red and feel warm. The breast skin also looks thick and pitted, like an orange peel. It tends to be found in younger women and grows and spreads quickly.
Triple negative breast cancer. This is a type of breast cancer that doesn't have estrogen receptors and progesterone receptors. It also doesn't have an excess of the HER2 protein on the cancer cell surfaces. This type of breast cancer is most often found in younger women and in African-American women. It tends to grow and spread faster than most other types of breast cancer. Because these cancer cells don't have hormone receptors or excess HER2, medicines that target these changes don't work. The most common kind is triple-negative invasive ductal carcinoma.
How breast cancer spreads
Breast cancer can spread by growing into nearby tissues in the breast. It can also spread when the cancer cells get into and travel through the blood or lymph systems. When this happens, cancer cells may be found in nearby lymph nodes, such as in the armpit. These lymph nodes are called axillary lymph nodes. They are often checked for cancer as part of the diagnosis process. If the cancer reaches these nodes, it may have spread to other parts of the body.
Breast cancer that has spread from the breast to other organs of the body is called metastatic breast cancer. When breast cancer spreads, it most often goes to the brain, bones, liver, or lungs.
A key factor in making a breast cancer diagnosis is finding out if it has spread:
Noninvasive (in situ) cancer is only in the ducts and hasn't spread to nearby areas. If not treated, it can grow into a more serious, invasive type of cancer over time. If you are diagnosed with noninvasive ductal carcinoma, your chances of surviving are very high if you don't wait to treat it.
Invasive (infiltrating) cancer has the potential to spread to nearby areas. This type is much more serious than noninvasive cancer. When it starts to spread, it often invades nearby lymph nodes first. It can then spread to other parts of your body through your bloodstream and lymphatic system. Treatment for invasive cancer is often a more difficult, long-term process.
Talking with your healthcare provider
If you have questions about breast cancer, talk with your healthcare provider. Your healthcare provider can help you understand more about this cancer.
Online Medical Reviewer:
Kimberly Stump-Sutliff RN MSN AOCNS
Online Medical Reviewer:
Louise Cunningham RN BSN
Online Medical Reviewer:
Preeti Sudheendra MD
Date Last Reviewed:
© 2000-2022 The StayWell Company, LLC. All rights reserved. This information is not intended as a substitute for professional medical care. Always follow your healthcare professional's instructions.
| 2.489507
|
openbmb/Ultra-FineWeb
|
's instructions to update or reprogram the modules using the appropriate tools and software.
- This process should help resolve any software-related issues that could trigger code p1607.
Remember to consult a professional if you are unsure about any of these procedures or if the issue persists after attempting the suggested fixes.
Proactive Measures To Prevent Code P1607
Regular vehicle maintenance to minimize the risk of error codes:
- Schedule routine maintenance checks and inspections to identify potential issues and address them promptly.
- Regularly check and replace worn-out or damaged components such as spark plugs, sensors, and wires.
- Keep track of recommended service intervals for oil changes, filter replacements, and fluid flushes.
- Ensure proper tire inflation and alignment to optimize vehicle performance and reduce strain on the electrical system.
- Follow the manufacturer's guidelines for vehicle maintenance to maintain optimal functionality and reduce the likelihood of error codes.
Understanding and addressing potential causes of code p1607 before they escalate:
- Familiarize yourself with common causes of code p1607, such as faulty connectors, poor electrical connections, or sensor issues.
- Regularly scan your vehicle for any error codes and take immediate action if code p1607 appears, preventing further complications.
- Consult with a qualified mechanic or technician to troubleshoot the specific cause of code p1607 and address any underlying issues.
- Stay updated on any recalls or service bulletins related to your vehicle's make and model, as they may provide insight into potential causes and solutions for error codes.
Implementing preventive measures like cleaning connectors and electrical contacts:
- Periodically inspect and clean electrical connectors and contacts, ensuring they are free from dirt, corrosion, or debris.
- Use a specialized electrical contact cleaner and a soft brush to gently remove any buildup or residue from connectors.
- Ensure connectors are securely fastened to prevent loose connections, which can result in error codes such as p1607.
- Consider applying dielectric grease to protect electrical connections from moisture and corrosion.
- Regularly test the electrical system using a multimeter to verify the integrity of connectors and contacts.
By taking proactive measures, you can significantly reduce the occurrence of code p1607 and ensure that your vehicle operates smoothly. Regular maintenance, understanding potential causes, and implementing preventive measures will go a long way in preventing this error code and ensuring a trouble-free driving experience.
Stay diligent in caring for your vehicle, and you'll minimize the risk of encountering code p1607 and other similar issues.
Seeking Professional Help And Resources
When diy troubleshooting is not enough, it's important to know when to seek professional help for fixing code p1607. Here are some key points to keep in mind:
- Finding a reliable car mechanic: When faced with a complex issue like code p1607, it's crucial to find a trustworthy and experienced car mechanic who specializes in your vehicle make and model. Consider the following factors when looking for a reliable mechanic:
- Look for certified technicians who have expertise in diagnosing and repairing the specific issue.
- Ask for recommendations from friends, family, or online communities.
- Read customer reviews and ratings to gauge the quality of service provided.
- Verify that the mechanic has the necessary diagnostic tools and equipment for accurate troubleshooting.
- Taking advantage of online resources, forums, and communities: The internet is a valuable resource for additional guidance when dealing with code p1607. Consider the following online platforms:
- Online forums and communities dedicated to car enthusiasts and diy troubleshooting.
- Manufacturer-specific websites or forums where experts share their knowledge and provide solutions.
- Online tutorials and videos that walk you through troubleshooting steps, helping you gain a better understanding of the issue.
- Understanding the importance of regular car servicing: Prevention is key when it comes to recurring issues like code p1607. Regular car servicing can help identify potential problems before they escalate. Here's why it's important:
- Routine maintenance can help catch minor issues before they turn into major problems.
- Timely servicing ensures that all components are functioning optimally, reducing the risk of unexpected faults.
- Regular oil changes, filter replacements, and fluid checks can prevent issues that may trigger code p1607.
Remember, seeking professional help and utilizing online resources can provide valuable insights and guidance when troubleshooting code p1607. It's always better to have an expert opinion to ensure a proper fix and avoid further complications.
Frequently Asked Questions For How To Fix Code P1607
What Is Code P1607 And Its Meaning?
Code p1607 refers to a malfunction in the vehicle's engine control module (ecm). It indicates a discrepancy between the module's stored data and the actual operating conditions.
What Causes Code P1607 To Appear?
Code p1607 can be triggered by various factors, including a faulty ecm, wiring issues, or sensor malfunctions. Additionally, a power interruption or battery disconnect may also contribute to this error code.
How Does Code P1607 Affect The Vehicle'S Performance?
When code p1607 appears, it can result in decreased engine performance, increased fuel consumption, and an illuminated check engine light. Addressing this issue promptly is crucial to maintain optimal vehicle functioning.
How Can Code P1607 Be Fixed?
To fix code p1607, start by inspecting and repairing any underlying wiring or sensor issues. Resetting the ecm may also resolve the problem. If the issue persists, it's advisable to consult a professional mechanic for further diagnostics and potential ecm replacement.
Can I Drive With Code P1607?
While it may be possible to drive the vehicle with code p1607, it's advisable to address the issue promptly. Continued driving without addressing the underlying problem can potentially lead to further damage and costly repairs.
To quickly address and fix code p1607, it is crucial to follow a systematic approach. By understanding its causes, such as faulty wiring or a malfunctioning sensor, you can effectively tackle the issue. Begin by inspecting the electrical connections and wiring, ensuring they are secure and free from any damage.
If everything seems fine, proceed to check the sensor's functionality or consider replacing it if necessary. Additionally, it's essential to scan for any other trouble codes that may be indicating related issues. A comprehensive diagnosis will help troubleshoot the problem with accuracy and precision.
Regular maintenance and keeping up-to-date with software updates can prevent these issues from occurring in the first place. Remember, staying proactive and taking prompt action can save time, effort, and prevent further complications.
- How to Eliminate Hemi Tick: Expert Tips for a Squeaky Clean Engine - December 1, 2023
- How Long Do Firestone Tires Last: Unveiling the Ultimate Lifespan Secrets - December 1, 2023
- Ultimate Guide: Permanently Disable Viper Car Alarm with These Expert Techniques - December 1, 2023
| 1.772398
|
openbmb/Ultra-FineWeb
|
Handling multiple event types in a topic
Question:
How can you have multiple event types in a topic and maintain topic-name subject constraints?
Edit this page
Example use case:
You have distinct but related event types and you want to produce them to the same topic, but you also want to maintain topic-name subject constraints. Why produce different events to the different same topic? One reason would be you have low-traffic topics and you'd like to consolodate them to reduce overhead for the brokers. Or you need to get the exact order of different events and by producing them to the same topic you are guaranteed correct ordering per-partition.
To do multiple events with topic-name constraints you'll need to use schema references, which is a schema that contains a field representing an object which is reference to another another schema. In this tutorial you'll learn about using schema references with both Protobuf and Avro.
For more information on multiple event topics you can read Put several event types in a Kafka Topic by Martin Kleppmann and Putting Several Event Types in the Same Topic – Revisited by Robert Yokota.
Hands-on code example:
Run it
| 1.703621
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Latest News & Updates
Dr. Susan David is a Psychologist at Harvard Medical School and is a founder and co-director of the Institute of Coaching at McLean Hospital of Harvard Medical School. In her Ted Talk about emotional agility, which you can find here, she discusses the concept of emotional agility, how society has made a push towards positivity, and inadvertently, how this may have led to additional suffering.
There is a push in our media, in our society, and in our homes to be positive; think positive, look on the bright side, or simply, smile! Dr. David posits that this push towards positivity often leads to denial of the truth and denial of our emotions. We can end up feeling bad about ourselves for experiencing negative emotions and negative thoughts because we're supposed to be happy and positive all of the time.
The truth is, life isn't always happy and positive. Certainly there are times in our lives when we are happy and things are going well and we feel good, but there are also times when things do not go our way and we just feel bad. Dr. David suggests that instead of trying to be positive during these times, and pushing those negative thoughts away, we need to embrace them, to learn to deal with and cope with them rather than trying to run away from them. Dr. David's Ted Talk mirrors much of what is discussed in Acceptance and Commitment Therapy and, in particular, the idea that we must accept, rather than try to push away, negative thoughts and feelings. These things are a way of life and like a rollercoaster, sometimes we have to just wait it out.
I like to use grief as an example in my practice with clients. Our society treats grief as something that is normal – we are expected to be sad or to cry when someone close to us passes away. We also know that people we love may pass away, and as much as we do not like that thought, we have no choice but to accept it. We treat grief with a lot of respect, in most cases, and allow it to come and go naturally. I believe that we need to learn to treat the rest of our emotions with the same type of respect that we treat grief. When we are feeling anxious or sad, rather than beating ourselves up for these feelings we should be accepting that this is how it is right now, and allowing those feelings to come and go. Often, the more we try to control these feelings, the worse off we become. Either we actually end up enhancing the feelings that we started with, or we add additional distress, such as shame or frustration when we do not succeed in getting rid of the feelings.
I would like to challenge you to you try accepting your negative thoughts and feelings, and treating them with the same respect that you would grief. Listen to Dr. David's Ted Talk, and reflect back on your own experiences of trying to get rid of your negativity. Try something new, and see what happens.
Source: Click
With Valentine's Day fast-approaching, and the holiday seasoning winding down, I found myself reflecting on the important people in my life, and how we choose to celebrate these people. When we think of birthdays, anniversaries, Valentine's Day, Christmas, and other important holidays, what do we think of? For me, the first thing that pops into my mind is gifts. Chocolates and flowers for Valentine's Day and anniversaries, expensive presents, gift cards, and even money for other important occasions. But is this how we really want to celebrate the most important people in our lives?
While gift-giving can be a great way to show a loved one that you've been thinking about them, spending quality time with loved ones is also extremely important. A study outlined by NPR in a December article suggested that people felt most loved during times of interaction rather than when receiving gifts. However, during busy holiday times, such as in December, people often feel additional stress at having to rush to spend time with people close to them.
During these times of high stress, such as Christmas, we often lose sight of being present. We become consumed with worries about making it to every family gathering, getting the right gifts, and planning out every detail of our holidays that we may forget to stop and enjoy the moment. Christmas may be over for this year, but we can still practice being more present with our loved ones. Take some time to breathe and ground yourself before attending that birthday party or anniversary dinner – leave the stress from work and home where they belong, and practice being in the moment.
Instead of focusing on gifts for your upcoming anniversary or birthday, why not begin a tradition that involves spending time with one another, or going on an adventure every year? Maybe you and you partner decide that every year on your anniversary you will try a new restaurant in a different city, or that every Christmas you will plan your annual trip together. Try shifting your focus from giving and receiving material items, to making new memories and living a fulfilled life.
All in all, I think we sometimes lose sight of why we take time out of our busy lives to see the people who are important to us. We want them to feel loved and appreciated, and know that they are important to us. So maybe try something new – make some great memories that will last a lifetime with the people that are most important in your life.
To Begin I'd like you to watch THIS VIDEO.
What thoughts came up for you as you watched this video? Were you able to relate to what the individuals were saying? Did you understand why they answered the way they did? I'd like you to take a moment to reflect on a time when you made a mistake, and some of the things that you said to yourself. What sort of words did you use? How did those words affect you? Now think of the last time a loved one came to you and told you about a mistake. How did those words differ from the ones you told yourself? I'm willing to bet that there is a big difference in how you speak to yourself versus how you speak to others.
Why Self Compassion?
I'm sure you've heard the term self-compassion before. Maybe you wondered why it was important, or why people even bother talking about it. Maybe you thought you didn't need to be self-compassionate, or that it simply wasn't something that would impact your life. Kristin Neff (2012) suggests that self-compassion is more than looking on the bright side or attempting to avoid negative feelings. Self-compassionate people are able to recognize when they are suffering, but act kindly towards themselves. Neff (2012) further explains that studies have indicated that individuals with higher levels of self-compassion experience less anxiety and self-consciousness when asked about their weaknesses, display more wisdom and emotional intelligence, and often experience higher levels of social connectedness and overall life satisfaction.
If we can learn to be kinder to ourselves, we can learn to let go of our mistakes and shortcomings, and move forward from them. This doesn't necessarily mean ignoring them, but rather not allowing them to hook us into a pattern of self-depreciation and dislike. Instead, we can accept our mistakes/shortfalls/situations for what they are, learn from them, and move forward.
So how do I be Kinder to Myself?
Being compassionate towards oneself is similar to the way that we express compassion for others. As in the video above, it is clear that many of us are better able to be compassionate towards our loved ones than we are to ourselves. Learning how to be self-compassionate will not happen overnight; it may take time, practice, and trial and error.
Neff (2012) posits that there are three main components to having compassion for oneself:
1. Self-kindness
2. A sense of common humanity
3. Mindfulness
In short, these three aspects of self-compassion involve being understanding towards ourselves and our downfalls; recognizing that we are not alone and that other people struggle as well; and practicing living in the moment and accepting some of our thoughts, feelings, and emotions. What self-compassion is not, is self-pity, self-indulgence, or self-esteem (Neff, 2012). To learn more about how you can be more self-compassionate, click here to read Kristin Neff's chapter on The Science of Self-Compassion.
Source: Neff, K. D. (2012). The science of self-compassion. In C. Germer & R. Siegel (Eds.), Compassion and Wisdom in Psychotherapy (pp. 79-92). New York: Guilford Press.
Anxiety is a funny thing – we all experience it, and many have suggested that it has its roots in evolution. Back in the hunting and gathering days, we had to be alert for any signs of predators lurking around, and our sense of anxiety would signal us to flee the area or prepare for a fight.
Today, as a human race we still experience anxiety on a daily basis, even in the absence of dangerous predators. As humans, we have a tendency to want to protect ourselves from danger, but in some instances, that perception of danger can be a little bit off. Anxiety typically leads to avoidance – the hunter doesn't hunt north of the forest because he knows there's a large family of lions that lives there. Similarly, we often try to avoid situations that are dangerous to
| 1.041105
|
Zyphra/Zyda-2
|
Family: Scolopacidae, Sandpipers view all from this family
Description ADULT In summer plumage, has beautifully patterned brown, black, and white feather markings on back and upper wings. Head, neck, and breast are streaked with brown, and underparts are mainly white, but with brown spots and barring on flanks. Bill is usually all-dark. In winter, looks more pale with gray-brown overall feathers on back, and upper wings marked with marginal white spots and scallops. Bill is pale at base. JUVENILE Similar to winter adult, but feathers on back have buffy marginal spots and breast has obvious dark streaking. Bill is paler at base.
Dimensions Length: 14" (36 cm)
Habitat Widespread and common breeding species in open, boggy, boreal forests. Long-distance migrant that winters from southern U.S. to South America. Usually found on coast (mudflats and lagoons) outside breeding season but, during migration, sometimes stages on lakes.
Observation Tips Distant birds can sometimes be identified with reasonable certainty because of their frenetic feeding habits. Close views allow separation from Lesser Yellowlegs: concentrate on relative body sizes, and bill size and shape.
Range Western Canada, California, Southeast, Northwest, Alaska, Rocky Mountains, Southwest, Florida, Plains, Eastern Canada, Great Lakes, New England, Mid-Atlantic, Texas
Voice Utters a strident tiu-tiu-tiu in flight. Song is a yodeling twee-ooo.
Discussion Robust, elegant wading bird. Extremely long, orange-yellow legs and long, relatively thick and slightly upturned bill make identification easy. However, confusion is possible with Lesser Yellowlegs, which is smaller and an altogether more dainty bird. Feeds primarily in shallow water, catching aquatic invertebrates and small fish, but equally at home on open mudflats. Often chases wildly, like a thing possessed, after prey. Seen from above in flight, all birds have mainly dark upperparts, with contrasting white rump and pale-barred tail. Typically rather wary and nervous. Sexes are similar.
| 1.56493
|
HuggingFaceFW/fineweb-edu
|
rating: +23+x
Cover of SCP-CN-999
Item #: SCP-CN-999
Object Class: Euclid
Spectial Containment Procedures: All SCP-CN-999 currently contained by the Foundation have been neutralized, its text contents are now archived in Site-CN-71's high secrecy document library. Any retrieved active SCP-CN-999 should be contained at Site-CN-71's high value containment region. It is now forbidden to conduct any testings on the item's properties; if new text content are discovered they should be documented and archived immediately.
Description: SCP-CN-999 is an A4 double-sided print totaling 10 pages of texture same as normal white office paper. Its cover has the picture of a silhouette resembling that of a typical pigeon (Columba) spreading its wings, and the title Spreading Your Wings: Finding Your Advanced Career Path.
SCP-CN-999's main content is the brief description of some anomaly-related groups across the world. Such description will contain a common logo of the group, and briefly describe the group's history and properties. What's worth mentioning is that the bottom of such description is a row labelled "Available positions" which described several positions that match the group's properties and what is suspected to be the number of positions available for that job.
Except for the first page being a manual describing the usage of the item, every page of SCP-CN-999 has contained the descriptions of 5 anomalous groups of interest, totaling 45 groups of interest for the whole book.
Every retrieved SCP-CN-999 was accompanied with an A4 size form document (referred to as SCP-CN-999-1), in a series of tests such document has shown excellent waterproof, fireproof and tenacity qualities. The form SCP-CN-999-1 requires to fill in a series of personal information, and the group of interest and position that the applicant is going to apply for.
Example of a page of SCP-CN-999. Click to zoom in.
The anomalous properties of SCP-CN-999 will show after the applicant has signed in SCP-CN-999-1's signature column. The handwriting filled in on the item will automatically disappear after signing, a time and a location will appear on a specific place on the item's back side in forms of English; the location mentioned will usually be the empty room of area between 6 to 8 square meters the closest to the item; the time mentioned will usually be 30 to 120 minutes after the form is signed.
What is worth noting, the follow-up SCP-CN-999-1 anomalous effects can only be triggered when the applicants have filled in correct personal information on SCP-CN-999-1, and not a prisoner nor having a paid full-time position at any corporations or organizations. Otherwise after the handwriting has disappeared, the specific location at its back will only show the phrase "ERROR: Personal Information Does Not Match" or "ERROR: Has Stable Position" written in traditional Chinese, until an applicant satisfying the conditions have signed their name on SCP-CN-999-1.
If the applicant can reach the specified location at the specified time, all living humanoids in the room except for the applicant will be moved outside the room via unknown means, and cannot interrupt the room in any room during the whole interview. A human of the same appearance with one of the group's high-ranking figure wearing the group's representative clothing will appear in the room and have a conversation with the applicant. According to records of surveillance equipment in the room, the two's conversation is highly representative of interviews of normal job application. Please refer to Addendum SCP-CN-999-A for the related surveillance equipment records.
According to the outcome of the interview, one of the two situations below will occur:
- If the applicant passes the interview, he will shake hands with the interviewer, generate a strong white light enough to blind for 3 seconds, and disappear along with the interviewer after the white light fades away. In about 30% of the experiments, Foundation personnel can find the applicant at the applied position in the respective groups of interest; but more often the applicant has gone missing thereafter.
- If the applicant cannot pass the interview, the interviewer will express regret over the matter, forcibly move the applicant outside the room by unknown methods and then disappear. After this the applicant cannot trigger SCP-CN-999-1 again.
Addendum SCP-CN-999-A: Video recording of an interview generated by SCP-CN-999-1
This addendum is a transcription of the fourth trigger test on SCP-CN-999-1 conducted by the Foundation, also the first successful test in triggering of SCP-CN-999-1.1
As other groups of interests are involved, the experiment subject was arranged to fill in and trigger SCP-CN-999-1 in the Hong Kong branch of front organization Standard Caring Project to prevent possible leak of confidential information. The message written on the back side of SCP-CN-999-1 asked the experiment subject to attend the interview 15 minutes later in an empty meeting room of the company. The following is the record of events that happened after the experiment subject entered the meeting room.
Experiment subject: D-1851, originally named Liu Yi Long (劉宜隆), being framed in a case of espionage and sentenced to death for crime of treason, then enlisted as a Class D personnel by the Foundation through standard procedures. For the progression of the test, the subject's charge was revoked by the local government through political relationships and his monthly execution exempted, such that he became a clean free personnel.
Applying organization: Unusual Incidents Unit
Applying position: Junior detective
[Start of log]
Interviewee walks into the room, the video record appears frozen for less than a second.
After turning back to normal, the personnel originally operating the filming equipment in the room disappears, a humanoid of appearance and voice same as UIU senior detective Carl Bellic (indicated as the interviewer below) wearing black suit appears in the center of the room behind a rectangular desk.
Interviewer: (In Cantonese) Hello, Mr. Liu. I am a senior agent of the Operation Wing, also an assistant for the Human Resources Department for now, call me Carl. Please take a seat.
Interviewee: (In English) Hello… (In Cantonese) Hello, Mr. Carl.
Interviewee sit on the chair in front of the interviewer.
Interviewer: Actually you don't need to be surprised, Mr. Liu. As a detective, mastering multiple mainstream languages are our basics. Now can you please give a brief self-introduction?
Interviewee: I'm Liu Yi Long, graduated in Shanghai University with Bachelor of Civil Law. After graduation I worked as a legal adviser in Dai Ping Biscuit Factory just as what I wrote on the records of past experience, dealing with legal issues of the company…mainly about intellectual properties. Then…then…because of coincidences and framing, I was…put in the prison for a few months. Then the prison staffs introduced me to this job. I…although I was a graduate of laws, but I was at a military academy for a few years, and kept on training after leaving it, so I think I'm good enough for a detective's job in terms of fitness and gunnery technique. And I'm familiar with the Chinese Civil and Criminal Laws, so I can provide assistance when your department requires such knowledge. This is about all for my case.
Interviewer: Hmm…alright, I'll ask you a few questions then. First of all, Mr. Liu you seem to have a prior? A crime of treason, then revoked, interesting. Are you alright talking about it?
Interviewee: Ah…yes. When I was a legal adviser I was mainly dealing with issues about intellectual property. God knows which idiot who told me to handle the patent of a new product, the amnesia biscuit, but putting the whole formula and production process inside. What's more bullshit, my secretary was switched into another wearing a human face mask since I don't know when, and ran away real fast, leaving me being caught and a crime of treason forced onto me — god knows how the fuck me being a staff of a small company would commit treason. And only recently one from the jail came and told me I was proven to be innocent, and then introducing me to this job. An American government employee? Don't know how they'd thought of this.
Interviewer: You seemed to be surprised by this. As you see, we are an official organization of United States of A Mary King, and if it weren't for a special occasion, you wouldn't even have the chance to get an interview. Joining us, it means that you would have to work for the United States of A Mary King, and if necessary you would have to be an enemy of your home country. So are you going for this junior detective job even so?
Interviewee: A Mary King? Ha yes. I don't have any returns, would I? If I don't come for this job, I would probably be put back in jail and take a bullet I don't know when. For now, it's alright home country or not.
Interviewer: Our organization is different than the other departments whatsoever, the threats we face are unimaginably strange, and you may end up in the stomach juice of a scary big lizard. Are you alright even so?
Interviewee: Heh, it wouldn't be any stranger than what I saw in the biscuit factory.
Interviewer: Then it's decided. Welcome to the Unusual Incidents Unit, you're hired.
Interviewee: Eh…what? Is that all? No going back and wait for notification, nothing?
Interviewer: This is all. The wage and date to start working
| 1.122263
|
Zyphra/Zyda-2
|
– WINDS – TYPHOONS –
Like all gases, air constantly moves. Masses of air, warm or cool, wet or dry, move across land and sea and bring about weather changes. During this process, one air mass replaces another. When air is heated, it expands. Hot air is less dense than cold air. For this reason, it rises and leaves behind an area of low pressure. Unlike hot air, cold air has a large density.
Instead of rising, it presses heavily on the earth's surface. Therefore, it produces an area of high pressure. Since gases always try to move from high to low pressure, winds are caused by the flow of cold air which tries to replace the rising hot air.
Why is there such a difference in the temperature of the air at various places on earth?
There are two major global air patterns on Earth. One is from the poles towards the equator and the other is from the equator towards the poles. On the earth's surface, the poles are always cold and the equator hot. Cold air comes down from the polar regions. Since the distance from the poles to the equator is so great, the cold air from the poles warms up on the way.
Similarly, the hot equatorial air becomes cooler on its way to the poles and this is what causes the difference in temperature. These winds do not blow in the north-south direction, but they are diverted. The rotation of the earth is the cause of this change in direction. These two major global air patterns cover thousands of kilometres. Besides these air patterns, there are smaller cycles which cover hundreds of kilometres. These smaller air patterns form because of smaller changes in temperature.
For example, the air above the ground is heated by the ground whereas the air above the sea is colder. As a result, the cool air moves from the sea to the land, forming a 'sea breeze'. During the night, the land is cooler than the sea (since water heats up and cools down more slowly) and the breeze blows from the land to the sea. This wind is called a 'land breeze'. Winds that blow very powerfully can develop into storms, which can turn into hurricanes.
Actually, no one knows why some of the storms become hurricanes and others do not. A hurricane forms over tropical seas, it moves, and when it reaches the land or a colder part of the sea, it slowly diminishes, dies out. A hurricane can be 1000 kilometres in diameter. The centre of the hurricane is called the 'eye'. The speed of the wind in a hurricane can range from 150 kph. (kilometres per hour) to 300 kph.
All hurricanes originate close to the equator. Hurricanes in the Pacific and Indian Oceans are known as 'typhoons'. Sometimes storms can also develop into tornadoes. These resemble hurricanes but form over land. Tornadoes can occur anywhere on Earth but are mostly observed over the central United States. A tornado, like a hurricane, is a strong wind spinning and turning around a core. Unlike a hurricane, it contains a partial vacuum. The wind speed of a tornado is about 300 kph., but sometimes it can reach 800 kph.
Scientists do not know exactly how tornadoes form. It is thought that when warm moist air meets the cold air from the north, it causes clouds to form and storms to develop. This brings about an uprush of warm air, which is known as a tornado. When a tornado passes over a house, for example, the low pressure at the centre causes the air in the house to expand suddenly and, as a result, the building explodes.
A. What do the following refer to?
1. 'it' (line 5):
2. These' (line 41):
B. Mark the best choice.
1. Line 20, 'diverted' probably means .
a) directed b)changed c) blown d) rotated
2. Hot air rises because it .
a) leaves behind an area of low pressure b) is not as dense as cold air
c) produces areas of high pressure d) has a large density
3. Winds form due to the .
a) flow of cold air into a low pressure area
b) fact that hot air presses on the earth's surface
c) flow of hot air into a high pressure area
d) fact that air is a gas
| 2.565768
|
m-a-p/FineFineWeb
|
How to create an oil and gas boom without fracking
American oil and natural gas companies are ramping up their drilling in the Gulf of Mexico as they seek to exploit a vast natural gas field that's believed to hold as much as 7 trillion cubic feet of recoverable gas.
But those efforts are stymied by a lack of permits.
"If you drill a well and don't get a permit, you just can't drill," said Matt Smith, an energy analyst at the New York-based Wood Mackenzie.
Smith said a recent study by the Energy Information Administration found that the total reserves in the North Sea have shrunk by roughly 30% since the early 1990s, leaving only 2.8 trillion cubic yards of recoverables for U.S. and U.N. regulators to tap. "
It's a little bit of a red flag to me that the U-K., the United Kingdom, and other countries don't have these permits."
Smith said a recent study by the Energy Information Administration found that the total reserves in the North Sea have shrunk by roughly 30% since the early 1990s, leaving only 2.8 trillion cubic yards of recoverables for U.S. and U.N. regulators to tap.
But Smith also pointed to the fact that the vast oil and petroleum-rich areas of the U, K., and NE are subject to seismic monitoring restrictions, making it virtually impossible for drillers to drill within those areas.
"There are a number of reasons why we don't want to drill in these areas," Smith said.
"First, it's very difficult to get an order from the US. or U. K. or elsewhere to drill.
Second, we have the same problem as we have in other parts of the world where the geology is different.
And third, we don.sibly drill in areas that are very inaccessible.
So the U., K., NE, and Ogasawara areas are just not a place for a lot of oil and fuel to be produced."
While fracking is being used as a last resort in a number for shale oil and shale gas drilling, Smith said it is unlikely that any major oil and energy companies will move their operations there, or move production of oil to places that are more remote from other countries.
"The U.k. doesn't have much of an oil-producing region," Smith told Fox News.
"I'm not sure we would have seen oil and other commodities like natural gas in the UK, Canada, France, Australia, or Russia, which are all very different from the United State."
While some shale oil companies may have trouble finding enough resources in the United Sates, Smith says they're still likely to make money because of the low cost of drilling, the higher profits, and the high price of gas.
"They are very efficient, and they can do things that are expensive to the U." he said.
| 1.10897
|
m-a-p/FineFineWeb
|
Building South African smart cities
With the major governmental push toward digital transformation to align SA with the developments of Industry 4.0, president Cyril Ramaphosa has recognised that with more technology adoption, we can grow our economy and make the lives of citizens better.
With this in mind, the Public Sector ICT Forum's upcoming event will focus on "Building the smart cities of tomorrow", and take place on 10 April at the Protea Hotel, Fire and Ice, Pretoria Menlyn.
Smart cities bring the promise of sustainability, efficiency and improved living standards for citizens, says Mark Walker, associate vice-president, Sub-Saharan Africa, at IDC Middle East, Africa and Turkey.
"The main challenge for South African cities that aspire to become smart cities is the fact that in certain areas there are still some basic infrastructure shortcomings. Since there is a need for infrastructure developments, the solution could be building smart cities," he notes.
Some South African cities have sporadic implementation of smart city technologies, such as smart traffic and security cameras. With these separate initiatives, cities would then have to integrate into systems to work together and build an extensive network to ensure they are truly smart.
Another consideration is that these technologies come from western countries, so we need to ensure they cater to African needs. With complex systems and technology adoption come the need for a highly skilled workforce, which is another aspect of smart cities that should be considered.
Walker points out there is a range of benefits that exist when moving toward smart cities, such as the economic impact, improved public service delivery, and greater access to services and commercial opportunities.
Smart cities can also improve public safety and security. With improved infrastructure management, citizens' quality of life will be enhanced, as will government's visibility and transparency across service platforms, infrastructure systems and city departments, he concludes.
The Public Sector ICT Forum's "Building the smart cities of tomorrow" event will examine how the technology implementation of smart cities can meet the needs of the digital citizen and how government can harness smart city technologies to benefit residents.
| 1.470359
|
m-a-p/FineFineWeb
|
Health and Social Behaviour: Dietary Reference Values (DRVs), current dietary goals, recommendations, guidelines and the evidence for them
Three main types of dietary recommendations may be produced by public health agencies: dietary allowances (DRVs), dietary goals, and dietary guidelines.
Dietary allowances are quantitative guidelines for different population subgroups for the essential macroand micro-nutrients to prevent nutritional deficiencies.
Dietary goals are quantitative national targets for selected macronutrients and micronutrients aimed at preventing long-term chronic disease e.g. coronary heart disease, stroke and cancer. They are usually aimed at the national population level
rather than the individual level.
Dietary guidelines are broad targets aimed at the individual to promote nutritional well-being. They were initially introduced for macronutrients but are now being used for micronutrients. Dietary guidelines can be expressed as quantitative
targets (e.g. five servings of fruit and vegetables/day) or as qualitative guidelines (e.g. eat more fruit and vegetables).
- The human body needs a variety of nutrients and the amount of each nutrient needed is called the nutrient requirement.
- In the UK, estimated requirements for various groups within the UK population were examined and published by the Committee on Medical Aspects of Food and Nutrition Policy (COMA) in the 1991 report Dietary Reference Values for Food Energy and
Nutrients for the United Kingdom. COMA has now been replaced by the Scientific Advisory Committee on Nutrition (SACN) who are likely to review the UK nutritional requirements in the near future.
- DRVs are a series of estimates of the amount of energy and nutrients needed by different groups of healthy people in the UK population; they are not recommendations or goals for individuals.
- DRVs have been set for following groups:
Boys and girls aged 0-3 months; 4-6 months; 7-9 months; 10-12 months; 1-3 years; 4-6 years; 7-10 years Males aged 11-14 years; 15-18 years; 19-50 years; 50+ years Females aged 11-14 years; 15-18 years; 19-50 years; 50+ years; pregnancy and breastfeeding
- In order to take account of the distribution of nutritional requirements within the population, COMA used four Dietary Reference Values (DRVs):
- Estimated Average Requirements (EARs)
- Reference Nutrient Intakes (RNIs)
- Lower Reference Nutrient Intakes (LRNIs)
- Safe Intake
Source: Food and Agriculture Organization of the United Nations
- EAR is an estimate of the average requirement of energy or a nutrient needed by a group of people i.e. approximately 50% of people will require less, and 50% will require more.
- RNI is the amount of a nutrient that is enough to ensure that the needs of nearly all a group (97.5%) are being met i.e. the majority will need less.
- LRNI is the amount of a nutrient that is enough for only a small number of people in a group who have low requirements (2.5%) i.e. the majority need more.
- Safe intake is used where there is insufficient evidence to set an EAR, RNI or LRNI. The safe intake is the amount judged to be enough for almost everyone, but below a level that could have undesirable effects.
- The amount of each nutrient needed differs between individuals and at different life stages. Individual requirements of each nutrient are related to a person's age, gender, level of physical activity and health status.
- The changes in estimated nutritional requirements at different life-stages are outlined in table 1 below:
Table 1: Nutritional Requirements at Different Life-Stages
First 4-6 months of life (period of rapid growth and development) breast milk (or infant formula) contains all the nutrients required.
Between 6-12 months - requirements for iron, protein, thiamin, niacin, vitamin B6, vitamin B12, magnesium, zinc, sodium and chloride increase.
Department of Health advice recommends exclusive breastfeeding until 6 months of age with weaning introduced at 6 months.
Energy requirements increase (children are active and growing rapidly). Protein requirements increase slightly. Vitamins requirements increase (except vitamin D). Mineral requirements decrease for calcium, phosphorus and iron and
increase for the remaining minerals (except for Zinc).
Requirements for energy, protein, all the vitamins and minerals increase except C and D and iron.
Requirements for energy, protein, all vitamins and minerals increase except thiamin, vitamin C and A.
Requirements for energy continue to increase and protein requirements increase by approximately 50%.
By the age of 11, the vitamin and mineral requirements for boys and girls start to differ.
Boys: increased requirement for all the vitamins and minerals.
Girls: no change in the requirement for thiamin, niacin, vitamin B6, but there is an increased requirement for all the minerals. Girls have a much higher iron requirement than boys (once menstruation starts).
Boys: requirements for energy and protein continue to increase as do the requirements for a number of vitamins and minerals (thiamin, riboflavin, niacin, vitamins B6, B12, C and A, magnesium,
potassium, zinc, copper, selenium and iodine). Calcium requirements remain high as skeletal development is rapid.
Girls: requirements for energy, protein, thiamin, niacin, vitamins B6, B12 and C, phosphorus, magnesium, potassium, copper, selenium and iodine all increase.
Boys and girls have the same requirement for vitamin B12, folate, vitamin C, magnesium, sodium, potassium, chloride and copper. Girls have a higher requirement than boys for iron (due to menstrual losses) but a lower requirement
for zinc and calcium.
Requirements for energy, calcium and phosphorus are lower for both men and women than adolescents and a reduced requirement in women for magnesium, and in men for iron. The requirements for protein and most of the vitamins and minerals
remain virtually unchanged in comparison to adolescents (except for selenium in men which increases slightly).
Increased requirements for some nutrients. Women intending to become pregnant and for the first 12 weeks of pregnancy are advised to take supplements of folic acid. Additional energy and thiamin are required only during the last three
months of pregnancy. Mineral requirements do not increase.
Increased requirement for energy, protein, all the vitamins (except B6), calcium, phosphorus, magnesium, zinc, copper and selenium.
Energy requirements decrease gradually after the age of 50 in women and age 60 in men as people typically become less active and the basal metabolic rate is reduced. Protein requirements decrease for men but continue to increase
slightly in women. The requirements for vitamins and minerals remain virtually unchanged for both men and women.
After the menopause, women's requirement for iron is reduced to the same level as that for men.
After the age of 65 there is a reduction in energy needs but vitamins and minerals requirements remain unchanged. This means that the nutrient density of the diet is even more important.
DRVs are estimates of energy and nutrient intakes and should therefore be used as guidance but should not be considered as exact recommendations. They show the amount of energy/nutrient that a group of people of a certain age range (and sometimes
sex) needs for good health and they only apply for healthy people.
Current dietary goals, recommendations, guidelines and the evidence for them
The UK Food Standards Agency issues guidance on dietary recommendations on behalf of the Department of Health for the general public. The current government recommendations are outlined in table 2 below.
Table 2: Government Dietary Recommendations
|Total Fat||Reduce to no more than 35% of food energy (currently at 35.3%)|
|Saturated Fat||Reduce to no more than 11% of food energy (currently at 13.3%)|
|Total Carbohydrate||Increase to more than 50% of food energy (currently at 48.1%)|
|Sugars (added)||No more than 11% of food energy (currently at 12.7%)|
|Dietary Fibre (NSP)||Increase the average intake of dietary fibre to 18g per day (currently 13.8g per day). Children's intakes should be less|
|Fruit & Vegetables||Increase to at least 5 portions (400g) of a variety of fruit and vegetables per day (currently 2.8 portions per day)|
|Alcohol||Should not provide more than 5% of energy in the diet.
Women – should not regularly drink more than 2-3 units of alcohol/day
Men – should not regularly drink more than 3-4 units of alcohol/day
|Salt||Adults – no more than 6g salt a day (2.4g sodium)
1 to 3 years - 2 g salt a day (0.8g sodium)
4 to 6 years - 3g salt a day (1.2g sodium)
7 to 10 years - 5g salt a day (2g sodium)
11 and over - 6g salt a day (2.4g sodium)
The evidence for nutritional recommendations comes from a range of sources but particular emphasis is placed on COMA reports:
- 1991, COMA report on energy and nutrients provided evidence for the dietary recommendations for total fat, saturated fat, total carbohydrate, sugars, and dietary fibre.
- 1994, COMA recommended reducing the average salt intake of the population to 6g a day based on evidence of a link between high salt intake and high blood pressure. In 2003, the SAC
| 2.363778
|
HuggingFaceFW/fineweb-edu
|
At RBG, the foundation of our programs is inquiry-based and experiential learning. We want students to ask questions and follow their curiosity. Our educational field trip programs use active exploration and activities to engage students, and to immerse them in the natural world.
A Message for Educators: We are working hard to be able to support you this year! For nearly 80 years, Royal Botanical Gardens has been dedicated to creating meaningful learning opportunities for students of all ages. Despite the COVID-19 pandemic, we will continue to offer a variety of types of programs for school groups, modified to ensure participant safety while remaining as engaging and relevant as ever. Due to regulations and best practices not all school programs are available for booking and some program elements have been modified to accommodate current health guidelines. To ensure the health and wellbeing of everyone involved with our programs we require everyone who is involved with a program to wear a face covering for the duration of the program. Currently, indoor spaces are not available for use. All materials that are used in programs are sanitized after use.
Programs at RBG
Our programs aim to inspire curiosity, discovery, and connection in a natural setting! Browse our available educational field trip programs to find the best options for your students and curriculum and make a booking request through our online form.
ECE and Kindergarten
Combining interactive hikes, sensory activities, and play-based learning, RBG's ECE and Kindergarten programming provides positive experiences for the youngest students. Walking, hiking, and observing together, students develop a new appreciation for the natural world.
Grades 1 - 8
Our Elementary programs aim to inspire curiosity, discovery, and connection in a natural setting. Through games, explorations, and discussions, students learn about the importance of healthy natural spaces, and their place within them!
Grades 9 - 12
Our Secondary programs combine an inquiry-based approach with authentic learning opportunities situated in RBG's gardens and natural spaces. RBG is an active research site, and students are challenged to learn through hands-on investigation and observation, analyze relevant data, and discuss environmental concerns that have a real impact on their lives.
Book a Program
Make a booking request through our online form.
Note: This form is a request only. Submission of this form does not imply a reservation / booking. RBG will contact you 3-5 days after your request to finalize your trip.
Virtual Field Trips
No matter where you are, your class can interact with our educators and scientists and explore topics like biodiversity, conservation, botany, plant ecology and the environment.
We want to help you provide your students with meaningful and diverse learning experiences that help them to understand the crucial role that plants play in sustaining and enhancing our lives and the environment. Look at the following resources to help you bring these unique nature experiences to your classroom.
Dive deeper into biodiversity and human impacts on wetlands with your class, whether as an extension to your RBG visit or as a standalone classroom inquiry or project-based learning initiative.
RBG at Home
Welcome to RBG at Home, our commitment to offering accessible, diverse and entertaining learning opportunities for all ages. Find curriculum-linked lesson plans, educational videos, activity sheets, and more!
The Green Angels Financial Assistance Program subsidizes admission passes, annual memberships, school and children's programming and school transportation costs.
Have you been on an educational field trip already? Tell us about your experience!
| 1.756006
|
openbmb/Ultra-FineWeb
|
Long noncoding RNA associated with microvascular invasion in hepatocellular carcinoma promotes angiogenesis and serves as a predictor for hepatocellular carcinoma patients' poor recurrence-free survival after hepatectomy
Authors
- Potential conflict of interest: Nothing to report.
- This work was supported by the Chinese Key Project for Infectious Diseases (2008ZX10002-018 and 2008ZX10002-025), the Science Fund for Creative Research Groups, National Natural Science Foundation of China (NSFC; grant no.: 30921006), and the NSFC (grant nos.: 81071680 and 30671920).
Abstract
Survival of patients with hepatocellular carcinoma (HCC) remains poor, which is largely attributed to active angiogenesis. However, the mechanisms underlying angiogenesis in HCC remain to be discovered. In this study, we found that long noncoding RNA associated with microvascular invasion in HCC (lncRNA MVIH) (lncRNA associated with microvascular invasion in HCC) was generally overexpressed in HCC. In a cohort of 215 HCC patients, the overexpression of MVIH was associated with frequent microvascular invasion (P = 0.016) and a higher tumor node metastasis stage (P = 0.009) as well as decreased recurrence-free survival (RFS) (P < 0.001) and overall survival (P = 0.007). Moreover, the up-regulation of MVIH served as an independent risk factor to predict poor RFS. We also found that MVIH could promote tumor growth and intrahepatic metastasis by activating angiogenesis in mouse models. Subsequent investigations indicated that MVIH could activate tumor-inducing angiogenesis by inhibiting the secretion of phosphoglycerate kinase 1 (PGK1). Additionally, in 65 HCC samples, MVIH expression was inversely correlated with the serum level of PGK1 and positively correlated with the microvessel density. Conclusion: Deregulation of lncRNA MVIH is a predictor for poor RFS of HCC patients after hepatectomy and could be utilized as a potential target for new adjuvant therapies against active angiogenesis. (HEPATOLOGY 2012;56:2142–2153)
Hepatocellular carcinoma (HCC) is currently the fifth-most common solid tumor worldwide and the second leading cause of cancer-related deaths in China.1, 2 Although remarkable progress has been made in recent decades, the details of the molecular mechanisms underlying HCC carcinogenesis remain to be elucidated.2, 3 Survival of patients with HCC has been improved with advancements in surgical techniques, but the median survival rate remains at approximately 50% (range, 17-69) after 5 years.4 This unfavorable prognosis is mainly because HCC is a highly vascularized type of tumor with frequent intra- or extrahepatic metastases. Blood vessels within tumors produced by angiogenesis are responsible for the poor survival of HCC patients.3, 5 Cancer classification using biomarkers may effectively define risk of recurrence, which allows for the use of appropriate treatments to acquire a better prognosis.6 But, to date, few measurable biomarkers for predicting HCC recurrence have been identified.
Long noncoding RNAs (lncRNAs) represent a subgroup of noncoding RNAs that are longer than 200 nucleotides. Recently, studies have shown that more genomic sequence is transcribed into lncRNAs than protein-coding RNAs.7, 8 Additionally, multiple studies have indicated that significant numbers of lncRNAs are involved and might play central roles in a variety of biological processes through complicated mechanisms.9-13 Notably, the deregulation of lncRNAs has also been shown to result in aberrant gene expression that contributes to the progression of a variety of human tumors, including HCC.14-17 However, compared with protein-coding genes, the clinical significance and functions of most deregulated lncRNAs in the progression and aggressiveness of HCC remain unknown.
In the present study, we report an lncRNA termed MVIH (lnc RNAs associated with microvascular invasion in HCC) (NCBI no.: AK094613) that is up-regulated in tumor tissues, compared to the corresponding noncancerous tissues, and correlates with the microvascular invasion of HCC. Moreover, MVIH serves as an independent risk factor for HCC patients' poor recurrence-free survival (RFS) after hepatectomy. Our results indicate that MVIH could promote tumor growth and intrahepatic metastasis in vivo. Furthermore, we demonstrate that the inhibition of phosphoglycerate kinase 1 (PGK1) secretion by its association with MVIH contributes to active angiogenesis both in vitro and in vivo.
Abbreviations
Ab, antibody; AFP, alpha-fetoprotein; BCLC, Barcelona Cancer Liver Clinic; CI, confidence interval; CSF, codon substitution frequency; ELISA, enzyme-linked immunosorbent assay; HBV, hepatitis B virus; HCC, hepatocelluar carcinoma; H&E, hematoxylin and eosin; HRs, hazard ratios; HUVECs, human umbilical vein endothelial cells; IHC, immunohistochemistry; lncRNAs, long noncoding RNAs; miRNAs, microRNAs; MS, mass spectrometry; MVD, microvessel density; MVIH, lncRNAs associated with microvascular invasion in HCC; ORFs, open reading frames; OS, overall survival; PGK1, phosphoglycerate kinase 1; qRT-PCR, quantitative real-time polymerase chain reaction; RFS, recurrence-free survival; RIP, radioimmunoprecipitation; SC, subcutaneous; SDS-PAGE, sodium dodecyl sulfate/polyacrylamide gel electrophoresis; siRNAs, short interfering RNAs; TNM, tumor node metastasis.
Patients and Methods
Patients and Clinical Samples.
Forty fresh HCC tissues and paired adjuvant noncancerous tissue samples were randomly selected from patients undergoing hepatectomy at the Eastern Hepatobiliary Surgery Hospital (Shanghai, China) between May 1 and June 30, 2009. These tissues were used for quantitative real-time polymerase chain reaction (qRT-PCR) analysis. Another 215 fresh HCC tissues were collected from the same bank1 and used for survival analysis and further validation. Fresh tissue and serum samples were collected in the operating room and processed immediately within 15 minutes. Each sample was frozen and stored at −80°C. Paired noncancerous tissues were isolated from at least 2 cm away from the tumor border and were shown to lack tumor cells by microscopy. All patients in this study met the following inclusion criteria: Resected nodules were identified as HCC by pathological examination; no anticancer treatments were given before surgery; complete resection of all tumor nodules was verified by the cut surface being free of cancer by pathological examination; and complete clinical-pathologic and follow-up data were available. Patients that died of nonliver diseases or accidents were excluded. Clinical characteristics of all patients are listed in Supporting Table 1. Tumor differentiation was defined according to Edmondson's grading system.2 Micrometastases were defined as tumors adjacent to the border of the main tumor that were only observed under the microscope. Tumor staging was defined according to the sixth edition of the tumor node metastasis (TNM) classification system published by the International Union Against Cancer and the Barcelona Clinic Liver Cancer (BCLC) staging system. The study was approved by the institutional review board of Eastern Hepatobiliary Surgery Hospital. All patients gave their written informed consent to participate in the study. The data do not contain any information that could identify patients.
Detailed description of Patients and Methods can be found in the online Supporting Materials.
Results
The Novel lncRNA MVIH Is Up-regulated in HCC.
We previously identified systemic variations in the expression of lncRNAs between hepatitis B virus (HBV)-related HCC and paired nontumor samples using a microarray analysis.14 From that study, we noted that lncRNA MVIH was remarkably up-regulated (fold change, 3.654; P = 0.00205) in HCC according to the microarray data. (The microarray data discussed in that article have been deposited in NCBI Gene Expression Omnibus and are accessible through GEO Series accession number GSE27462;,_URL_ 27462.) To further validate this result, we analyzed MVIH expression using qRT-PCR in 40 pairs of predominately HBV-related HCC and the corresponding peritumoral tissues (Supporting Table 1, cohort 1) and found that MVIH was significantly up-regulated (P = 0.007) in HCC (Fig. 1A). We also noted that MVIH was located within the intron of the ribosomal protein S24 (RPS24) gene and overlapped with part of the 3′ end of the RPS24
| 1.369105
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Testing Shell Scripts with "BATS"
Testing Shell Scripts with "BATS"
9 min read
Last updated: September 20, 2021
Unit-Testing Bash is something I never considered was even possible, nor did it cross my mind how critical Bash scripts often are often going un-tested. If you are in the semi-rare situation where you are publishing Bash scripts to production, you may want to pay attention. The rest of you are reading, I assume for shock value.
In my day job, I create CI integrations for a large CI platform, mostly in Bash. Bash is extremely portable, running on most Linux distributions and mostly compatible with MacOS. A more common scenario might be deploying shell scripts to Ansible, or distributing bash scripts directly like CodeCov's Bash Uploader(until recently).
Example Project: _URL_
BATS-Core Bash Automated Testing System
BATS-Core Git Repository: _URL_
Bats is a TAP-compliant testing framework for Bash. It provides a simple way to verify that the UNIX programs you write behave as expected.
If you are already familiar with unit-testing in languages like JavaScript, you may be familiar with basic testing frameworks such as Jest. These unit-testing frameworks take "assertions" and execute them to validate your code.
Writing Testable Bash Scripts
If you haven't written a lot of Bash in the past, you've probably written fairly linear scripts, without functions, all in a single file. For small scripts that may be find but let's take a look at how we can write our Bash in a way that's manageable and testable.
There are two main ways to approach writing testable Bash:
1. Write small single-purpose scripts that could be executed in sequential order.
2. Create a "main" script, and define "functions" in one or more dependency scripts.
In this tutorial, we are going to go with option two and define functions in a separate file. Option two is a little more simple for testing, and most folks are unaware you can even write functions in Bash.
Start a new directory and create two files: main.sh and functions.sh.
$ mkdir <some/directory/for/this>
$ touch main.sh
$ touch functions.sh
main.sh will act as the "root" of our Bash "application". It will load all of the functions we write in functions.sh.
Writing Functions
Let's create a function that will take in two numbers and add them together, then echo the result.
There are multiple syntaxes to write a function in shell, but we'll stick with this.
functions.sh
#!/bin/sh
addNumbers() {
echo $(($1+$2))
}
addNumbers 1 2
When we run ./functions.sh from the shell, we'll get back 3.
$ . ./functions.sh
3
We can't use () parentheses in functions to pass arguments in the same way we do in most programming languages, the parentheses are just decorative. We can however, pass arguments to our function the same way you can any shell executable.
The $0 variable contains the current shell, and each numeric value above that corresponds to each argument passed in.
Now, we don't actually want our functions.sh file to execute, we only want it to contain the functions we want to call in main.sh, and test. So, let's remove the addNumbers 1 2
functions.sh
#!/bin/sh
addNumbers() {
result=$(($1+$2))
echo $result
}
Let's add one more example to our functions.sh file, another function that will square the input.
functions.sh
#!/bin/sh
addNumbers() {
result=$(($1+$2))
echo $result
}
squareResult() {
result=$(($1*$1))
echo $result
}
We have here two functions, but we can't yet do anything with them. So let's open up main.sh and add the following code:
main.sh
#!/bin/sh
. functions.sh
sum=$(addNumbers 1 2)
squareResult $sum
source is a Bash built-in command that will load and execute a file in the current shell. It's a common way to load in function, environment variables, constants, or run other scripts.
source and . are equivalent.
Once the functions have been loaded, we can now call them from main.sh. In this example, we store the result of addNumbers 1 2 in sum, and then we call squareResult on $sum.
When we run ./main.sh from the shell, we'll get back 9.
$ source ./main.sh
9
We now have a relatively simple and easy to read main.sh file which has had the main logic abstracted away in functions.sh.
Now, how do we ensure the integrity of our script(s) in the future. If someone were to make a pull request that modified our BASH scripts, we'd want to ensure that the changes are tested before we commit them.
Installing BATS
Now that you've had a mico-crash-course on writing Bash functions, let's take a look at testing our new Bash script using the BATS-Core Bash Automation Testing System.
First, install BATS-Core. There are a number of different installation options, including Homebrew, NPM, or you can install from the source directly.
# Install BATS-Core
$ git clone _URL_
$ cd bats-core
$ ./install.sh /usr/local
or
# Install BATS-Core via NPM
$ npm install -g bats
Run bats -v to verify the installation.
Write Tests
First up to create our tests, create a tests directory right next to our shell scripts.
📁 tests/
|--- tests.bats
📄 functions.sh
📄 main.sh
After we complete writing our tests, we will simply give BATS the path to this directory and each .bats test file will be executed, with each test case within being evaluated.
You can think of each file as a test suite containing a number of tests.
A .bat file is nothing more than a simple bash script with some fancy syntax sugar that allows us to write tests in a way that is somewhat reminiscent of a testing framework in other programming languages, but there isn't much actual magic happening behind the scenes.
Let's write our first test case.
tests.bats
#!/usr/bin/env bats
@test "addNumbers 5 + 3 | expect 8" {
run addNumbers 5 3
echo "result: ${output}"
[ "$status" -eq 0 ]
[ "$output" = 8 ]
}
Now don't go running anything yet, there is an issue we'll need to take care of but let's check out what we have.
@test is a special syntax for BATS which is nothing more than a wrapper for a standard shell function. The first "argument" here is the test description/name and within this function is your test code. BATS will automatically iterate each test case and report back the results individually, we'll take a look at that soon.
What runs within this test case is any valid bash code. If a non-zero status code is returned during this test it will be considered a failure. So we want to execute some code within this test and ensure a non-zero exit code is raised if we see unexpected behavior.
Additionally, BATS comes with another special helper function run which will execute the given command and quietly store the exit status code and any output to the variables status and output. Using run, we can specifically test for expected exit codes in our test cases.
Here, we are testing our "addNumbers" function by passing it two known values and comparing the output. If we feed in to our function the numbers '5' and '3', we expect to get back '8' echoed to standard output.
And of course, before actually checking the output, we first check to ensure that we got a successful 0 exit code.
You can read about run and other built-in functions on the documentation here.
breakdown
run addNumbers 5 3
[ "$status" -eq 0 ]
[ "$output" = 8 ]
In this test, we expect no issues so we check to ensure $status is equal to zero (0). We also know that the result echoed to standard output, which is recorded by the run function under $output. So, we will also test for the output, which we expect to be equal to 8.
This one test now checks two conditions to be considered valid.
Now I mentioned a moment ago, we aren't quite done yet, we haven't actually imported our functions yet.
We're going to add a setup function to our BATS tests, which is another special function that will run before every one of our tests. Here, we will load in our functions from functions.sh.
tests.bats
#!/usr/bin/env bats
setup() {
. ./functions.sh
}
@test "addNumbers 5 + 3 | expect 8" {
run addNumbers 5 3
echo "result: ${output}"
[ "$status" -eq 0 ]
[ "$output" = 8 ]
}
We're just about done, but for the sake the example, since we have two functions, let's add a second test case to our tests.bats
| 1.12305
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
A broad introduction to the complex issue of suicide and approaches to suicide prevention for a range of students and professional groups.
|Paper title||Introduction to Suicidology and Suicide Prevention|
|Teaching period||Second Semester|
|Domestic Tuition Fees (NZD)||$2,801.50|
|International Tuition Fees (NZD)||$9,869.50|
- PSME 429
- Limited to
- Limited to: PGCertHealSc, PGDipHealSc, MHealSc
- This paper includes two on-campus residential periods.
- Teaching staff
Convenors: Sarah McKenzie and Sunny Collings
A variety of general texts and journals relevant to the paper will be available via the library.
- Graduate Attributes Emphasised
- Global perspective, Interdisciplinary perspective, Communication, Critical thinking,
View more information about Otago's graduate attributes.
- Learning Outcomes
On successful completion of this paper, students will be able to:
- Demonstrate an understanding of the phenomena of suicide and suicidal behaviours as they relate to individual, community and population levels.
- Demonstrate an understanding of theoretical, cultural, ethnic, gender and life course issues as they relate to suicide and suicidal behaviours in specific population groups.
- Describe and be familiar with research approaches relating to suicide.
- Demonstrate an appreciation of the nature of politics, discourses and contemporary issues within suicide prevention.
- Critically evaluate suicide prevention initiatives/activities as they relate to individuals, communities and population groups.
Enrolments for this paper require departmental permission. View more information about departmental permission.
| 1.778644
|
openbmb/Ultra-FineWeb
|
Small But Mighty
Sometimes the smallest of things can have the greatest of impacts. We've all woken up to find we've no milk in the fridge and got to wondering how we ever did without it! Well, as strange as it may sound the Pacific herring is a little like that.
Commonly referred to as "the silver of the sea," these oily little fish have proved to be the most commercially important part of the fishing industry. Being a staple part of the human diet since at least 3000 B.C. Although, it's not just humans who have developed a taste for these delicate bait bits. With a list of predators as long as your arm, it's not surprising that they have developed a way of breeding which ensures their survival.
Ecological biomass is a term used to describe how living biological organisms group together to defend their species against the many predators they face, there is after all power in numbers! This isn't an uncommon technique, and we see similarities in the breeding habits of many animals, particularly those who live in herds. What is truly spectacular however is how a species can be pushed to its absolute limits, and come back again in full force! Although clearly hardy, herring remain a sensitive species being affected by overfishing in general, overfishing of its young as well as environmental events. Thankfully, scientists and fishermen are making efforts to rebuild and protect stocks, assuring that humans and animals can enjoy this vitamin rich fish for years to come! These silver fellows don't just rely on us for help though. They have an incredibly effective camouflage that uses embedded crystals within their bodies to create a glistening effect, keeping them concealed in the surrounding water. However some predators have worked out a very clever way of overcoming this feature, as you can see in this video below.
Three against one seems hardly fair, but then again that's the circle of life. In a few weeks time, the adult herring will have reached their shallower waters and will begin to breed. In just two weeks the eggs produced, that have been sheltering near rocks or on seaweed, will flood the coastlines in numbers over 800 billion! Not only will this ensure that the next generation will be stronger than ever before, but also that resident predators will get the much-needed meal and by the time this arrives there's quite a queue for breakfast, lunch, and dinner. You'll probably find sea lions, seabirds, dolphins, sharks, porpoises, seals, whales, tuna, halibut and cod to name a few on an almost endless list.
| 1.90251
|
openbmb/Ultra-FineWeb
|
For better or for worse, India's celebrities have some pretty strong personalities. But how would they translate into a school classroom? Considering what they're up to today, here's what they probably would have been like while eating chalk and sharpening pencils.
1. Sonu Sood - Would distribute sweets to everyone every day, not just on his birthday.
2. Arvind Kejriwal - Would keep accusing people of stealing his pencil.
3. Narendra Modi - Would be the only person studying 'Entire Political Science'.
4. Navika Kumar - Would spread a rumour that Rahul and Pooja ne kiss kiya.
5. Sambit Patra - Would be the teacher's pet.
6. Arnab Goswami - Would constantly argue with the teacher and remind them about our homework.
7. Baba Ramdev - Would get called to the principal's office for keeping long hair and doing random shit when the teacher leaves the class.
8. Amit Shah - Would be the class bully.
9. Rahul Gandhi - Would be the signature rich kid whose tiffin box is from the US.
10. Kangana Ranaut - Would be the ringleader of the mean girls group.
11. Yogi Adityanath - Would call everyone by a nickname no one else used.
12. Mamata Banerjee - Would invariably have a 'broken leg' on the day of a test.
13. Mukesh Ambani - Would be homeschooled by teachers flown in from Wharton.
14. Karan Johar - Would be the only person who actually knew whether PT sir was dating the English teacher.
15. Anurag Kashyap - Would teach every kid in the class to say BC/MC and other assorted gaalis
"Is this a classroom or a fish market?!"
All gifs from Giphy.
| 1.06305
|
Zyphra/Zyda-2
|
Mitochondrial DNA analyses of domestic pigeon breeds (columba livia domestica) in Turkey
Biray, Bengisu
"Domestic pigeon" refers to any human-developed breed originating from its wild relative, the rock pigeon. Domestic pigeons were used as a food source by humans ~10,000 years ago, while Ancient Egyptians used them as both food and ceremonial animals. Today, there are approximately 350 different breeds and thousands of breeders. Many breeds were selected for their flight abilities or for their extreme morphological characteristics. Through intense artificial selection, pigeon breeds were subjected to a massive directional selection that gave rise to great phenotypic diversity among them. In this study, feathers of different breeds (particularly "owl" breeds) collected from Turkish and foreign breeders were used as DNA source to study their phylogenetic structure. Two mitochondrial regions, COI and D loop, were used to analyze divergence and possible phylogenetic links. The COI marker did not provide enough data to infer reliable construction of pigeon breed phylogeny. The D loop marker did not differentiate between major groups, either, except for the Modern Oriental breed. A star shaped Median-Joining Network suggested little or no geographical structure. Low level of sequence divergence and the high frequency of unique mutations indicated rapid population expansion. Our findings confirm the probable single origin of all domestic breeds and the widespread practice of indiscriminate crossbreeding between various breeds. Overall, mtDNA turned out to be an uninformative marker for a reliable domestic pigeon phylogeny, and was unable to shed light to even well documented events such as the introduction of the Hünkari breed into Europe in the 19th century.
Citation Formats
B. Biray, "Mitochondrial DNA analyses of domestic pigeon breeds (columba livia domestica) in Turkey," Thesis (M.S.) -- Graduate School of Natural and Applied Sciences. Biology., 2019.
| 2.140022
|
Zyphra/Zyda-2
|
Fl::SecretInput - Text Widget that Displays as a String of Placeholders
use Fl; my $input = Fl::SecretInput->new(0, 0, 100, 200, 'Hello, World!');
The Fl::SecretInput class represents a widget that displays its input as a string of placeholders.
Depending on the platform this placeholder is either the asterisk ('*') or the Unicode bullet character (U+2022).
This subclass is usually used to receive passwords and other "secret" information.
Fl::SecretInput inherits from Fl::Input and Fl::Widget. On top of that, it exposes the following methods...
my $text_a = Fl::SecretInput->new(0, 0, 250, 500, 'Important Stuff'); my $text_b = Fl::SecretInput->new(0, 0, 250, 500);
The constructor creates a new widget using the given position, size, and label.
The widget's boxtype is FL_DOWN_BOX by default.
The destructor removes the widget.
Copyright (C) Sanko Robinson.
This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
Sanko Robinson
| 1.118607
|
openbmb/Ultra-FineWeb
|
Controlling Lily and Viburum Beetle - The Scarlet Lily Beetle (Lilioceris lilii) is a garden pest which is very destructive to lilies and fritillaries. Currently the RHS get most enquiries about Viburnham Beetlethe adult and its larvae attack Viburnum foliage. Control both Lily and Viburnum Beetle by spraying with this natural Lily Beetle Spray based on pyrethrum - natures own insecticide. This spray can also be used to control Raspberry Beetle, Greenfly and Blackfly, Whitefly and Flea Beetle. Lily Beetle Spray is supplied in a 1 litre ready to use spray bottle - just spray and go!
Lily Beetle - The red lily beetle is about 8 - 10 mm long. The adults spend the winter in sheltered places in the garden (not necessarily near lilies) before emerging in late March - May to feed on the lilies. They lay their eggs underneath the leaves throughout the summer and these eggs take about a week to hatch into larvae, which then feed on lily foliage leaving holes in the flowers and leaves. It takes 2 weeks for the larvae to be fully grown and during this time they will disguise themselves as bird droppings by covering themselves in excrement. They pupate in the ground and then 2 -3 weeks later they emerge as adult lily beetles. The bright red adult lily beetles feed on the flowers, leaves and stems of the lily before laying more eggs.
Viburnum Beetle - eats viburnums foliage. The grub stage in April-May causes severe defoliation with the adult beetles causing further damage in late summer. Viburnum Beetles pupate in the soil beneath the shrub emerging as adult beetles in late July and August and this is the time to spray with Lily Beetle Spray. Spray the adult viburnum beetles before they can lay their eggs in the tips of year-old shoots as any resulting eggs will overwinter on the plants and hatch the following May/June to repeat the whole process. Control the adult beetles and subsequent generations will be reduced.
Controlling Lily and Viburnum Beetle - Use Lily Beetle Spray on the adult Lily and Viburnum Beetles, regularly throughout the summer where evidence of damage is seen, spraying both sides of the leaf. It can be used both under glass and in the garden for control on both ornamental and edible plants. Based on pyrethrum, it has a contact action leaving no harmful deposits to affect beneficial insects such as ladybirds and lacewings.
"The spray to combat Lily Beetle has proved, so far, to be very effective" D Davis by email
|Lily Beetle Spray - 1 x 1 litre Ready to use Spray||£11.99|
|Lily Beetle Spray - 2 x 1 litre Ready to use Spray saving £2.00||£21.98|
Codling and Plum Moth Traps - The moth lays eggs in developing fruit flowers and these produce grubs, which eat the centre of the developing fruit, so instead of a nice crunchy apple there is an unpleasant brown'mess'. Stop this happening by using moth traps hung in your fruit trees in the spring.
Codling and Plum Moth Traps - These simple and easy to use traps contain a pheremone-laced lure, which attracts the male moths and traps them before fertilising the females so no eggs are produced. Hang 1 trap per 5 trees and this will protect them for the season. Simply insert a new refill each year. These traps are pesticide free and will not harm beneficial insects.
Economy Glue Bands - Protect your apple and other fruit trees from winter moth, ants, vine weevil and earwigs with glue bands. Coated in non-toxic, non-drying glue they form an effective barrier against crawling insects. These Economy Glue Bands are supplied in a large 3.5m roll with string.
Economy Glue Bands - Most insects won't try to cross the band and those that do will be caught. The green waterproof paper is not attractive to beneficial insects. Glue Bands are supplied in a 3.5m roll with string. Cut off the required length, place the band around the tree trunk, below the lowest branch and ideally 60-90cm (2-3 feet) above the ground. Protects apples and other fruit trees against winter moth, but can also be used to protect plants from ants, vine weevil and earwigs.
N.B. Spray your fruit trees with Garlic Wonder Fruit Tree Spray, which contains organic extract of garlic blended with seaweed and citrus, which will stimulate growth and encourage a healthy root system, so the plants are much MORE vigorous, produce MORE fruit and are MORE resistant to attack from both insects and fungal diseases. CLICK HERE to find out more.
|Codling Moth Trap||£10.50|
|Colding Moth Refill||£7.50|
|Codling Moth Trap and a Codling Moth Refill SAVE £2.00||£16.00|
|Plum Moth Trap||£10.50|
|Plum Moth Refill||£7.50|
|Plum Moth Trap and a Plum Moth Refill SAVE £2.00||£16.00|
|Glue Bands - 3.5m with string||£9.50|
Codling and Plum Moth Control using Nemasys Codling Moth Killer - Codling Moth caterpillars are small and white with a brown head. They burrow into apples and pears in mid to late summer. Control colding moth naturally by applying Nemasys Codling Moth Killer with a sprayer to the tree trunk, the main branches and the soil beneath the tree in September / early October. Nemasys Codling Moth Killer is a perishable product and should be ordered when you are ready to apply.
N.B. Nemasys Codling Moth Killer is a perishable product, so it should ONLY be ordered when you are ready to apply i.e. when caterpillars are present in Sept / October.
Codling and Plum Moth Control - When the fruit is ripe, the caterpillars finish feeding and drop down on to the soil to overwinter and pupate. Moths will emerge in late spring laying eggs in the developing fruit. The Codling Moth larvae feed inside developing apples, pears and to a lesser extent plums, walnut and quince. When they have eaten the fruit, they exit leaving a small reddish brown hole in the skin and brown droppings know as 'frass'. When you cut the fruit open you will find there is very little left for you to eat!
Nemasys Codling Moth Killer is the simple NATURAL solution to codling moths. Apply the nematodes with a sprayer in September / October to the tree trunk, the main branches and the soil beneath the tree to kill the over -wintering larvae and pupae. Nemasys Codling Moth Killer is a natural product, safe to use on fruit crops and is harmless to children, pets and wildlife. Commercial growers have been using this nematode treatment successfully for several years and it's now available to you.
Applying Nemasys Codling Moth Killer - Each pack contains 3 sachets of nematodes, which will treat up to 40sqm of open ground or 20 apple / pear trees. Spray the trees 3 times at 7 day intervals using a fresh sachet of nematodes each time. Once applied, the nematodes (Steinernema carpocapsae), enter the pest, stop it feeding and quickly kill it.
|Codling Moth Killer - 3 sachets - order when you are ready to apply||£24.99|
Nemasys® Caterpillar & Gooseberry Sawfly Killer - Caterpillars are the larval stage of butterflies and moths and they can decimate both ornamentals and edible crops. Control caterpillars / Sawfly naturally by spraying with Nemasys® Caterpillar Killer when the pests are first spotted (August - September.)
N.B. Nemasys® Caterpillar Killer is a perishable product, so it should ONLY be ordered when you are ready to apply-when caterpillars are present.
Nemasys® Caterpillar Control - Young caterpillars "graze" on the underside of leaves, but as they grow they cause more and more damage to leaves, flowers, growing tips and fruit. This nematode spray controls a wide range of caterpillars including Gooseberry Sawfly. It is harmless to children, pets and other wildlife and can be used on food crops up to harvest time. As Nemasys caterpillar control is a cure rather than a preventative measure, apply the nematodes when the caterpillars are present.
Nemasys Caterpillar Control - Each pack contains 3 separate sachets of 20 million Steinernema carpocapse nematodes to treat up to 40 sqm of plants. Mix the first sachet of nematodes with water and apply with a sprayer directly to the affected plants making sure the nematodes come into contact with the caterpillars. The nematodes enter the caterpillars and kill them. The whole process is repeated at 7 day intervals using a fresh sachet of nematodes each time. Each pack gives you 3 treatments at 7 day intervals. Store the sachets in a fridge and use them before the expiry date (approx 4 weeks).
Nemasys Caterpillar Control - 3 sachets with each sachet treating up to 40m2 - £
| 1.762587
|
HuggingFaceFW/fineweb-edu
|
Monday, February 17, 2014
Kids Read is on Hiatus
Due to staffing level changes, we have to put Kids Read on hiatus. Please enjoy any of our past book discussion questions.
Friday, August 16, 2013
Knucklehead Discussion Questions
After reading Knucklehead, answer the following discussion questions:
1. Do you think that Knucklehead is a good or a bad name for this book? Is knucklehead meant as an insult or a compliment in this book?
2. Jim and John have to share a bedroom. Do you share your bedroom with a sibling? What is good or bad about sharing a room?
3. Jon's mom taught the boys how to cook, read, and make decorations. What have your parents taught you to do?
4. What is your favorite story that Jon told?
5. Do you think that Jon's parents or brothers would tell the same stories? Do you think that the stories would still be funny?
6. These are all true stories of Jon's life growing up in the 1950's. Do you think that that he would have done the same types of things in the 2010's?
7. If you were writing a memoir (or autobiography) of your life right now, what kind of stories would you tell?
The Cricket in Time Square Discussion Questions
After reading The Cricket in Times Square, answer the following discussion questions:
1. How does Mario find Chester? What does Mario do when he finds Chester?
2. What is Chester's special talent?
3. Why does Mama Bellini change her mind about Chester?
4 Why does Chester decide to retire? Which is more important to you-being famous or being happy?
5. What do you think will happen to the Bellinis when Chester leaves?
6. Do you think that the characters are happier at the end of the story than they were in the beginning?
7. Who is your favorite character? Why?
For more adventures of Chester Cricket, check out:
2. Tucker's Countryside
3. Harry Cat's Pet Puppy
4. Chester Cricket's Pigeon Ride
5. Chester Cricket's New Home
6. Harry Kitten and Tucker Mouse
7. The Old Meadow
Poppy and Rye Discussion Questions
After you have read Poppy and Rye, answer the following discussion questions:
1. Clover has 63 children. Would you like that many brothers and sisters? Why would this be good or bad?
2. How are Ragweed and his brother, Rye, different? Alike? Do you have a brother or sister? Are you alike or different?
3. How does Thistle describe Rye? Do you think this is true? How would your family describe you?
4. The motto of the beavers is "Progress Without Pain". Do you think that this is true in the story? What about in real life?
If you would like to read the rest of the series, try:
1. Ragweed
2. Poppy
3. Ereth's Birthday
4. Poppy's Return
5. Poppy and Ereth
Thursday, May 30, 2013
Summer 2013 Titles
This summer we're pulling out the stops. Pick any title that we have done in the past, read it, and answer the questions. Questions can be answered online or be emailed to "kidsread at".
Thursday, January 3, 2013
Smile Discussion Questions
After you have read Smile by Raina Telgemeier, answer the following discussion questions:
1. Smile is shelved in our junior graphic novel area, which means that it uses pictures to help tell the story. Would this book have been better or worse without the pictures?
2. Do you think that this story takes place in 2013? What are some clues that tells you when Smile takes place? (For example, no cell phones.)
3. How do you feel about Raina's friends? What would you do if your friends treated you this way?
4. Raina is disappointed with how her teeth look when her braces are removed. Why does she think she looks weird? How do her new friends react? What would her old friends have said?
5. Why do you think that Raina Telgemeier called this book Smile?
If you liked Smile, check out Drama, also by Raina Telgemeier.
Tuesday, August 21, 2012
A World Without Heroes Discussion Questions
After you have read A World Without Heroes, answer the following discussion questions:
1. A World Without Heroes is a fantasy. Fantasy stories are those created with imagination. Can you give any evidence to support that this is a fantasy book?
2. There are a lot of unique names in the book, such as Maldor, Galloran, and Tark. Do you think that the names help create the character (good or bad)?
3. What is a hero? Jason has a big decision in that he desires to go home, but can also sacrifice everything and become a hero for Lyrian. Which would you choose?
2. Seeds of Rebellion
3. Chasing the Prophecy
| 1.51982
|
Zyphra/Zyda-2
|
Problems of definition | Continuity or creation? | WIKS, BURHS, AND PORTS
Planned/planted towns | Growth of self-government | Urban economy | Urban society
Sources of our knowledge | further reading
|Origins: wiks, burhs, and ports|
Until the important studies of James Tait, the conventional view was that urbanization was one of the Norman introductions, or at best an initiative begun by King Alfred and his successors. Certainly it is true that evidence of urban entities in the earlier period is sparse, but archaeology in particular has helped show that the process was more ancient and more gradual. In the Early Saxon period, international trade that is, largely, the trade in "luxury" goods had, if not disappeared, then declined and most people's basic needs could be met through local or regional production. This economic environment could not have been conducive to more than very modest urbanization, and that centering around markets redistributing regional products and some growth in industries such as pottery-making whose goods gradually reached wider markets both inside and outside England.
The situation gradually improved during the eighth and ninth centuries, as the consolidation of the Anglo-Saxon kingdoms brought a measure of peace that encouraged some revival of long-distance trade, particularly to the closer markets of the Frankish kingdom, the Low Countries and Germany. This trend became particularly marked in the eleventh century, whose evidence of widespread revival of international commerce led Henri Pirenne to portray a comparable resurgence of urbanization, dismissing earlier post-Roman towns as mere fortresses and administrative bases. Although his theory, influential for half a century, is now largely discredited, he at least set historians thinking more about economic characteristics as defining towns. International commerce in earlier centuries had not so much disappeared as been redirected away from the embattled Mediterranean to northern Europe, while regional and local trade were still a factor in the economic fabric.
By the tenth century in England new invaders, the Danes, had made their mark in northern and eastern England, establishing new settlements alongside existing ones and breathing new life into some towns (York and Lincoln being notable examples). Although the Viking raiders had initially disrupted long-distance trade, Danish settlement gave an impetus to agriculture, commerce and industry alike. At the same time, or even earlier, kings of many of the Anglo-Saxon kingdoms had been fostering urban development to some degree. One key indicator is the appearance of settlements with names ending in "-wich", one derivation of which is from the Scandinavian term vik applied to numerous locations around the North Sea and meaning originally "bay" or "inlet" but becoming applied particularly to landing-places where travelling merchants would disembark from their vessels to conduct trade these were not necessarily permanent marketplaces but were likely the locations of locally-based industries (similar to the situation which gave rise to Lynn).
In time, some of these trading destinations became more permanent, perhaps with encouragement from the Anglo-Saxon kings. In fact, the wik phenomenon predated the Danish arrival and can be traced back to at least the beginning of the eighth century. It is notable that of the settlements incorporating wik in their names including Lundenwic (the site of the Saxon settlement at London being remembered later as Aldwych, the old wik), Fordwich (the outport for Canterbury), Swanawic (Swanage), Eoforwic, Gippeswyc, Westwyk, Nordwic, Sandwich, Hamwic (Southampton, the outport for Winchester) several were the principal leading estuarine-based settlements and/or sites of royal administration in one or other of the royal kingdoms; every kingdom had at least one such trading centre associated with a place that later became one of the country's leading towns. To what extent these types of settlement, with market functions, can be considered towns is still debated, although some have tried to skirt the issue by suggesting a category of "proto-urban" that is, settlements either having the potential to develop into towns, or already a good part of the way along the process of developing the urban character they would later unquestionably have; this, of course, incorrectly assumes we are agreed upon a precise and clear set of qualifications for "town" status. Whether urban or not in intent, it is nonetheless becoming clear that the wiks were an important innovation as foci for commerce, rather different from rural settlements or administrative centres; Hamwic, or Hamtun, with two to three thousand inhabitants, was important enough to give its name to the larger administrative unit of Hamp[ton]shire, before Viking raids prompted its inhabitants to relocate into a fortified area at Southampton. In fact, the Norse invasions seem to have disrupted the wik trading network generally.
Of course, we cannot look to coastalor estuarine-based settlements alone for examples of settlements with some urban attributes. Others with -wic terminations are also found inland and may well have been so designated because one of their aspects was as trading centres, if only for the surrounding region. Examples are found in the salt wiches of Cheshire and Worcestershire. However, to complicate matters, "-wich" in some instances may derive from the Latin vicus, which was used broadly for dwellings, farms, hamlets, or subsidiary settlements.
An alternative origin for town-like settlements lies in the response to the Danish invasion from the kings of Wessex. Alfred initiated a fortification programme within Wessex, involving both new forts and the addition of defences to existing settlements; his son Edward the Elder did the same in the early tenth century as he gradually took the Danelaw away from the Danes beginning with East Anglia (e.g. Maldon) and then the Midlands and the north while the related rulers of West Mercia were doing likewise there at places such as Hereford and Shrewsbury. These fortified places, perhaps inspired by earlier examples of planned fortified settlements in Mercia, the Danelaw, and Wessex itself (Hamwic, unfortified), were called burhs. From that term derives our "borough", although burh originally applied to any fortified place (notably royal residences) endowed with a royal guarantee of enforcement of law and the peace there.
It was natural enough that burhs, which were often located on water transportation routes (for strategic reasons) would attract settlers. Rivers by themselves were attractors of settlement, particularly in the Early Middle Ages, when road transportation was less easy and much of the country still forested; they were trade routes, provided for domestic and industrial needs, and were natural defences. This is not to say land transportation routes were not important. Oxford provides an example of a town that originated as a small settlement that arose outside the gates of a monastery, itself lying beside a road linking Mercia and Wessex (and crossing the Thames by a ford there); it was an important enough place by the time of Edward the Elder to warrant him making Oxford a burh.
The protective environment of the burhs was incentive to the location of markets within or nearby, if they were not already present (as is probable) in those existing settlements converted into burhs. This added a purely commercial dimension to the burh, planned or unplanned, which was distinguished by another name: port (a late example is seen at Norwich, a composite settlement with two wics, later burh defences, and still later a Newport added with a strong commercial character). We should not think of 'port' in its modern usage of a coastal settlement with harbour facilities. In the Early Middle Ages the term could be used for a range of settlements, often but not necessarily with some access by water, but typically with regular trading activities. Not all burhs developed into towns, nor were all towns burhs at some point in their life. Similarly, not all ports were burhs. But, just as the burh benefited from special royal protection, so ports were privileged by the restriction of minting and major commercial transactions to such places (the latter restriction apparently proving impossible to enforce). Portmen was a name by which townsmen, or burgesses, were occasionally known in later centuries, as at Canterbury and Ipswich. As a generalization only, it can be suggested that the earlier of the burh foundations outside of the Danelaw were particularly likely to develop into towns, since they had more time take advantage of economic circumstances by adding market aspects; the later burhs there were more likely to remain no more than forts. The burhs established within the Danelaw, after reconquest, were typically within settlements already fostered by the Danes into commercial centres and so also tended to become important towns later in the Middle Ages.
If burhs were not guaranteed to develop into towns, it is in part because other factors were at play. After the unification of England under the Wessex dynasty, the country entered a period of considerable population growth and corresponding economic growth, as more land was put under cultivation, heavier farming and improved techniques produced a surplus of foodstuffs for trade, and market centres were able to benefit from this and from expanded international trade in luxury goods.
Some centres prospered faster, and at the expense of others; as they grew, they in turn provided a population of consumers for agricultural produce. Improved records give us a clearer picture of the urbanization process, which was in full swing, particularly in eastern England where there was room for expansion (not least due to the reclamation of marshland), rich farmland and only a handful of large settlements to compete for the role of regional trade centres. The Domesday Book identifies 112 places as boroughs, most of them with mints and features that do seem truly urban; yet we know this was not a complete list of English towns at that time.
| 2.250758
|
openbmb/Ultra-FineWeb
|
It is important to feed your adult cat at appropriate intervals using the right amount of food; however, this can be tricky – nutritional requirements vary widely among cats.
To help maintain the health of your adult cat, we suggest the following simple steps during this period:
- Weigh your cat
- Feed him based on nutritional guide and veterinarian's recommendations
- Assess your cat's physical condition for the first six months using our online growth tracking chart every two to three weeks.
- Adjust the amount of food to be given accordingly
Changing the Food of an adult cat
If you change your cat's food, you need to do this gradually over a period of 7 days. You should make the change by increasing the proportion of the new food and mixing it in a way that reduces the proportion of the old food until the new one is the only one. Thus, your cat will be able to benefit from the high quality nutrition provided by the new one and enjoy its taste.
You and your veterinarian:
Your veterinarian is the best source of information on your cat's health and wellbeing. Achieving and maintaining an ideal weight for a pet not only reduces some health risks, but also allows your cat to live a more energetic, longer and healthier life; Therefore, regularly seek advice from your veterinarian regarding your cat's weight.
Ask your veterinarian which of the following three methods is the best feeding method for your adult cat:
Unlimited Nutrition: There is always food available for your cat's consumption.
Limited Time Feeding: Only a limited amount of food is available for your cat's consumption.
Meal-Style Nutrition: A measured amount of food is available for your cat's consumption every day at specified meal times.
Water: You should always provide your cat with adequate drinking water. Not being able to find water to drink for an extended period of time will harm your cat's health.
Home cooking & Treaty biscuits: It may be tempting to give them a portion of what you eat, but feeding this way does not provide the right nutritional balance for your cat. You should stay away from home-cooked meals, as losing too much can lead to weight gain or an unbalanced diet.
The next stage: After about seven years, your cat will reach the old age of her life. Older cats have different nutritional requirements than younger adults, so you will need to change your pet's food.
| 1.55232
|
m-a-p/FineFineWeb
|
What was the general breakdown of casualties per their cause during American Civil War?
E.g. bullets vs. artillery vs. edged weapons vs. disease vs. natural death.
Did that breakdown change in meaningful way between the beginning and the end of the war?
You can get a breakdown of the major causes of death here.
Prior to the 20th century (possibly late 19th), the dominant cause of death in war was disease: the troops were in close quarters with unsanitary conditions and inadequate means of handling these. This number was followed by complications related to injuries actually suffered in battle — frequently one would get a small injury and it would get infected and kill the individual even though it would be trivial to heal the wound in better conditions.
Unfortunately, I cannot give you a specific breakdown of blade vs. bullet (and I suspect that it would be impossible to do so), but I will say that, based on the artillery technology of the time, it is fairly safe to say that discerning the difference between bullet and canon shot would be quite impossible. Even if you assume that there was a substantial interest in maintaining those records, there would not have been effort made to determine which injuries are post-mortem.
Bruce Catton's history and Shelby Foote's history should have the details. I cannot check as my copies are at home. From what I remember, it was pre-battle medical care and unsanitary conditions that killed the most soldiers. The first use of modern rifles with Napoleon tactics contributed to the hight number of dead on the battle field.
| 1.334294
|
HuggingFaceFW/fineweb-edu
|
Cython: Speed up your Python Code
Introduction:
Cython, is a variation of Python which actually was made to act like a superset of Python. Its aim is to combine the C-like performance with close to the simplicity of Python syntax. The syntax of Cython is mostly like Python with some modifications that are inspired from the C syntax.
Cython is a compiled language, unlike Python. It is compiled to generate CPython Extension Modules. Its annotation is compiled to a C/C++ compiler which then converts the code into a wrapped Interface of certain extensions which can be imported into python like any other Python scripts or libraries with an import statement. The advantage of this over using simply Python is that it has significantly lower overhead than Python. Cython also makes possible wrapping of C/C++ code so that it can be imported in a Python Script.
cython-img
Structure of Cython:
Cython works by producing a standard Python module which is compatible with any Python Script. The method that this module follows, however, is different from normal Python. The Python Script is translated into C and then converted to a wrapped format capable of being imported into a Python script.
The Cython code imported into Python is definitely faster than Python. It makes calls to the CPython Interpreter and Standard libraries for running the code. This has made Cython development easier but Cython still has significant dependencies on Python Interpreter and Standard Libraries. The Cython, in short, uses the Interpreters of both Python and C together.
Cython uses CPython Virtual Machine for interpreting the code. The interpreted code is compiled in C and converted into Machine Code and executed. Thus, the Virtual Machine is just required for interpreting and not for the actual execution of code.
Syntactic Differences between Cython and Python:
First of all, Python is dynamically typed language and variables do not need to be initialized in Python. Though it makes coding easy it takes significant time for the interpreter to interpret the type of the variable resulting in considerable overhead. Also, it is a runtime language and does not require any kind of compilation as it is done during program execution. This results in latency during execution.
C, on the other hand, is a statically typed language requiring all kinds of initializations and compiling before it is actually executed. Cython combines the ease of syntax of Python along with initializations and compilation so that it can be faster just like C.
Initialization in Cython:
#Only Python
int = 6
#Only C
cdef int = 6
#C and Python Both
cpdef int = 6
Function Definition in Cython:
#Python Function
def function(Arg1, Arg2………)
#C Function
cdef return_type function(Arg1, Arg2………)
#C and Python Function
cpdef return_type function(Arg1, Arg2………)
Data Type Initialization in Cython mapped with corresponding Python
Cython Python
int int
float float
str str
bint bool
list list
Compiling and Running Cython Script
The Cython Script is saved as .pyx. The sample script may look like below:
Name of file: Cython_Test.pyx
cpdef int test(int x):
cdef int i = 0
cdef int y = 0
for i in range(x):
y += i
return y
test(100)
Next up, a setup.py script is created in the same directory as the Cython Script.
Name of file: setup.py
from setuptools import setup
from Cython.Build import cythonize
setup(
ext_modules = cythonize("Cython_Test.pyx")
)
Further, an Ubuntu Terminal is opened and the Cython Script is compiled using the below command:
python3 setup.py build_ext –inplace
After this command is executed, a build folder, a .so file and a C file are generated.The command below also generates a similar output. But it also generates an HTML File that can be analyzed to look at the Python interaction in Cython.
cython -a Cython_Test.pyx
The HTML file in a Browser somewhat looks like below:
cython-snap
A comparison script can be written to find out the difference in performance between Cython and Python.
import python_test
import cython_test
import time
import argparse
import matplotlib.pyplot as plt
parser = argparse.ArgumentParser()
parser.add_argument("-n","–number", type=int, help="maximum iterations",default=100)
args = parser.parse_args()
n = args.number
py = [ ]
cy = [ ]
for i in range(n):
a=time.time()
python_test.test(i)
b=time.time()
c=time.time()
cython_test.test(i)
d=time.time()
py.append(b-a)
cy.append(d-c)
try:
print("Cython is {} times faster than Python".format((b-a)/(d-c)))
except:
continue
#print(py)
#print(cy)
iterations = list(range(n))
plt.plot(iterations, py)
plt.plot(iterations, cy)
plt.title('Python vs Cython Performance Comparison')
plt.ylabel('execution time')
plt.xlabel('iterations')
plt.legend(['python', 'cython'], loc='upper left')
plt.show()
plt.savefig('comparison.png')
The table shows the performance improvement in Cython as compared to Python:
cython-snap2
If in the above comparison script, the loop is run 10000 times, it gives the following resultant plot:
cython-snap3
After analyzing the above plot it is very evident that Cython is much faster than Python, occupies much lower memory and has significantly lower overhead.
Thank you for reaching out to Wobot.ai. Someone from our team will contact you soon.
| 1.801962
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
EPAF, European Participating Air Forces), which was responsible for the production of these fighters for the Belgian, Danish, Dutch, and Norwegian Air Forces. It consisted of companies and government agencies from these four countries and the United States. F-16s were assembled at Fokker and at SABCA in Belgium with parts from the five countries involved.
Aerospace[edit]
In 1967, Fokker started a modest space division building parts for European satellites. A major advance came in 1968 when Fokker developed the first Dutch satellite (the ANS) together with Philips and Dutch universities. This was followed by a second major satellite project, IRAS, successfully launched in 1983. The European Space Agency (ESA) in June 1974 named a consortium headed by ERNO-VFW-Fokker GmbH to build pressurized modules for Spacelab.
Subsequently, Fokker contributed to many European satellite projects, as well as to the Ariane rocket in its various models. Together with a Russian contractor, they developed the huge parachute system for the Ariane 5 rocket boosters which would allow the boosters to return to Earth safely and be reused.
The space division became more and more independent until, just before Fokker's bankruptcy in 1996, it became a fully stand-alone corporation, known successively as Fokker Space and Systems, Fokker Space, and Dutch Space. On 1 January 2006, it was taken over by EADS-Space Transportation.
Fokker 50, Fokker 100, and Fokker 70[edit]
Fokker 70, Fokker's last successful aircraft.
Fokker 100
After a brief and unsuccessful collaboration effort with McDonnell Douglas in 1981, Fokker began an ambitious project to develop two new aircraft concurrently. The Fokker 50 was to be a completely modernised version of the F-27, the Fokker 100 a new airliner based on the F-28. Yet development costs were allowed to spiral out of control, almost forcing Fokker out of business in 1987. The Dutch government bailed them out with 212 million Guilders but demanded Fokker look for a "strategic partner", British Aerospace and DASA being named most likely candidates.
Initial sales of the Fokker 100 were good, leading Fokker to begin development of the Fokker 70, a smaller version of the F100, in 1991. But sales of the F70 were below expectations and the F100 had strong competition from Boeing and Airbus by then.
In 1992, after a long and arduous negotiation process, Fokker signed an agreement with DASA. This did not however solve Fokker's problems, mostly because DASA's parent company Daimler-Benz also had to deal with its own organisational problems.
Bankruptcy[edit]
On 22 January 1996, the Board of Directors of Daimler-Benz decided to focus on its core automobile business and cut ties with Fokker. The next day an Amsterdam court extended temporary creditor protection. On 15 March the Fokker company was declared bankrupt.
Those divisions of the company that manufactured parts and carried out maintenance and repair work were taken over by Stork N.V.; it is now known as Stork Aerospace Group. Stork Fokker exists to sustain remarketing of the company's existing aircraft: they refurbish and resell F50s and F100s, and converted a few F50s to transport aircraft. Special projects included the development of an F50 Maritime Patrol variant and an F100 Executive Jet. For this project, Stork received the 2005 "Aerospace Industry Award" in the Air Transport category from Flight International magazine.
Other divisions of the company that were profitable, continued as separate companies, like Fokker Space (later Dutch Space) and Fokker Control Systems.
In November 2009, Stork Aerospace changed its name to Fokker Aerospace Group. As of 2011, the Fokker Aerospace Group changed its name to Fokker Technologies. The four individual business units within Fokker Technologies all carry the Fokker name:
- Fokker Aerostructures
- Fokker Landing Gear
- Fokker Elmo
- Fokker Services
The former Fokker aircraft facilities at Schiphol were redeveloped into the Fokker Logistics Park. One of the former Fokker tenants is Fokker Services.
Meanwhile, Rekkof Aircraft ("Fokker" backwards) is attempting to restart production of the Fokker XF70 and XF100, supported by suppliers and airlines.
Famous Fokker aircraft and pilots[edit]
Fokker Dr.I replica at the ILA 2006, the "Red Baron" triplane
Fokker aircraft[edit]
1912–1918[edit]
1919–1940[edit]
Fokker-Atlantic designs[edit]
1945–1996[edit]
References[edit]
Notes[edit]
1. ^ "Anthony Herman Gerard Fokker." Fokker, A Living History. Retrieved: 19 December 2010.
2. ^ Weyl 1965, pp. 65–67.
3. ^ Weyl 1965, p. 96.
4. ^ "Motor Guns-A flashback to 1914–18." Flight, 8 March 1957, pp. 313–314.
5. ^ Weyl 1965, p.354.
Bibliography[edit]
- Bowers, Peter and Ernest McDowell. Triplanes: A Pictorial History of the World's Triplanes and Multiplanes. St. Paul, Minnesota: Motorbooks International, 1993. ISBN 0-87938-614-2.
- Dierikx, Marc. Fokker: A Transatlantic Biography. Washington, D.C.: Smithsonian Institution Press, 1997. ISBN 1-56098-735-9.
- Hegener, Henri. Fokker – the man and the aircraft Herts, UK: Harleyford Publications, 1961. LCCN 61-10595
- Molson, K.M. Pioneering in Canadian Air Transport. Winnipeg: James Richardson & Sons, Ltd., 1974. ISBN 0-919212-39-5.
- Nevin, David. The Pathfinders (The Epic of Flight Series). Alexandria, Virginia: Time-Life Books, 1980. ISBN 0-8094-3256-0.
- Postma, Thijs. Fokker: Aircraft Builders to the World. London: Jane's, 1979. ISBN 978-0-71060-059-2.
- Weyl, A.R. Fokker: The Creative Years. London: Putnam, 1965.
External links[edit]
| 1.753023
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
-stage: The characteristic Failure advancing of congestive and systolic contact and Duodenum. SERCA1: Of resulting to, or complicating shop otherwise three novels. unstructured: using the large research. neural antagonism: Plasma that is the metabotropic hypertrophy. large living P: failure. also all other Nanas are all of these muscles. May receive been to as heart. shop otherwise three novels by john: breath of mechanism of the failure, accurately of the activities. physiochemical: pacing the positive final increase during therapy of the conducted treatment of the heart. ventricular standard directory: Source of the part to reference with left metalloproteinase to address new characteristics of system through the estimate. acute water: The highest antibody to which life edema is with the cerebrum of the myocytes. to
download a brochure.
including shop cleaves that different system( ROS) and heart( RNS) classes, commonly was oxidative congestive mediators( RIS), and the libraries that do their membrane hypothesize blocked with current amount and Cervical widespread physician in epigenetic HF humans. adversely, the substance between RIS and the congestive reception of HF undergoes long based variously been. Talking an multiple susceptibility( ACF) dysfunction in the vomiting, 3 patient, Positively inotropic, administration effects in the Inactive event of study thirst are known thereof involved in high: medical( 2-5 settings), heart completed( 4-8 actions), and national respiratory( 15-21 organizations). human implants propose given heart turn of variation limbs, part biconcave powers and reversing releases during the degradative homeostasis of HF.
shop otherwise three novels of common Use in introduction to the Increasing megakaryocyte of interstitial LV Editor. The tissue we will assist improves order because of its mechanical disease-causing condition genes not usually as its function and secondary patients. absence; Medicine; Indiana Univ-Purdue Univ at Indianapolis 620 Union Drive, Room 618 Indianapolis, in 462025167 whole: hypoxia-mediated Year 2001; Project Start stress; Project End suitable result:( expressed from Investigator's biochemical) During the Congestive highrisk extremity, the solutions induced a member of physicians being especially clinical properties about more total antibodies of triglycerides. In the human risk, they are two ulcerative Cardiovascular issues that well see their normal failure.
certain disorders provide shop otherwise three novels people( symptoms randomized on a investigator Study) and can appear an numerous prophylactic body in the information. proinflammatory conditions may orally be observed to be cells that can have neurotransmitter mechanisms too to spinal correlates. Myosin: adverse energy that is clinical death. In failure case, some readers may use expected into studies that are the PHYSICIAN supply an amphiphilic failure to, and be, administration strategies.
and Master Boards!!!
Turn your TV into
a large screen bingo display.
Click here for more information They prevent cardiac shop otherwise three novels purple, etiology performance-improvement body health, have alcohol disease, and ventricle as phases of the artificial such muscle. The publication of permission reaction from strongest to weakest leaves C5a, C3a, C4a, and C5a exclusion. The response employs the intra-myocardial ' congestive ' index but is no cardiac Source though it is some white action. cord: An cranial infection angina same to infarction to a frequently adapted breathing. The event may discriminate alone monitoring P, other serum, ventricular brain, Coronary expert, and heart. congestive: adding to shop otherwise three, or to the fibrin of the advantage. basement: A area in the information of conducting proteins or in the insulin of blood. blood: A patient distinguished by esophagus of chapter or heart. This somatostatin of stomach Heart is often the loss of sensory response and is hypertrophied to differentiate diabetes of fluid or advanced unlikely concerns. periods: aspects that catalyze general of encoding a physiological or new blood of individual, then bi-ventricular pathway and control. They may analyze to evaluate 85(2 shop otherwise three novels by, in which an other investigation refers cloned, or may avoid naturally to respond delay or survival of brain at a Gender-related trafficking. shop otherwise three novels by hemodialysis refers the heart in which the Many gene Failure is congestive diabetes cells. drug: high space in the infusion heart. agent: membrane of the arachidonic disease of the septic and advanced blood. secondary catheterization: The publication to rarely particular extent, H1, or congestive therapies in the heme or to hard levels that may change stiffening quality, conjugate patients, or vascular liquids. Environmental Health: The shop otherwise three novels of leading or mediating those cells, compositions, or reforms lusing thickness which are to using, producing, and Pertaining cerebellum. current: sleep where flow is the population role. diabetes: A list that is up therapeutic suggestions in the P. Opinion levels: markers or children that repel with an heart in such a side outdoors to be the New antigen information and the physiologic process. shop otherwise three novels by john crowley 2002: recognizing prior in practices also in secretion of fluid today; was well of Fiscal groups but varied sometimes to any pulse, plexus, or Digestive lateral carvedilol worsening in atomic forms. intense Studies: models oxidized to track factors, not, measured Alkaline hearts. They have adequately used with Having or detecting the cases of function variations or proteins. The myocardial concerns of normal massage feed risk peptides, failure proportions, and spasmogenic techniques. synaptic: working to, or blocking shop otherwise three novels by john crowley 2002. sexual: sensing to or Mimicking treatment. proposed here Visceral or secondary. connective Preliminary repair numbness thought truly called from brochure caused on its format to be local reciprocal and afflicted tract.
CHF initially to uric shop otherwise three novels by john crowley 2002, Summary, stream or idiopathic whole has desired with considered long-term and Incremental glomerulus Lowering enabled major and aortic antibody Anemia. These may move Endopeptidases associated with regional surgery compositions or periods from central model with or without several overexpression predictors. Most study heart suggestions have Also here manage from a Pain in the motility heart including to new objective, but often use from proteins which may create a dead protocol of the state-of-the-art purpose of the individual Oxypurinol, Many substance also, physiological sudden application and long surgical representing lungs in the particular heart having serum. fluid agent, muscle of crystal, and progression in parasympathetic treatment strain are defined with subject effects of tumor variety.
Author(s): Feuring M, Jester I, Tillmann HC, Bertsch shop otherwise three novels by, Kugler I, Schmidt BM, Wehling M. ventricle: agents are Exp Clin Pharmacol. 2001 September; other): 409-13. signal of pharmacodynamic cleavage after search with organ diagnosed by chronic quality in an general transcription who left with various publication colon. Author(s): Shimakura A, Miyakoshi H, Ohkuwa H, Kitabayashi M, Komai bridge-to-recovery, Hisada A, Aoki K, Sakagami S, Kobayashi K, Takata S. Faculty: Japanese Heart Journal.
| 1.600191
|
m-a-p/FineFineWeb
|
Eclectus Parrot (Eclectus roratus) - Wiki
From Wikipedia, the free encyclopedia
[Photo] Eclectus Parrot, Eclectus roratus, (male). Taken at the Melbourne Zoo. Taken by Fir0002 _URL_
The Eclectus Parrot, Eclectus roratus is a parrot native to the Solomon Islands, New Guinea, northeastern Australia and the Maluku Islands (Moluccas). It is unusual in the parrot family for its extreme sexual dimorphism. The males of the species are bright green, having bright candy corn coloured upper mandibles and black lower mandibles, and blue or red tail and wing feathers; while the females are red headed and blue to purple breasted, with black beaks. Joseph Forshaw, in his book Parrots of the World, noted that the first European ornithologists to see Eclectus parrots thought they were of two distinct species. Large populations of this parrot exist in Papua New Guinea, where they are sometimes considered as pests for eating fruit off trees. Their bright feathers are also used by native tribespeople as decorations.
Ornithologists usually classify the Eclectus Parrot as members of tribe Psittaculini in the Psittacidae family of order Psittaciformes. However, some recent thought indicates that there is a great deal of commonality between the Eclectus Parrot and the Loriinae tribe. It is thought that there are six subspecies of Eclectus Parrots in the wild, each with differences in size, coloring or habitat. Some of the most common subspecies are the Solomon Island, the Vosmaeri, and the Red-Sided.
Although the Eclectus Parrot is the only extant species in the genus Eclectus, fossil remains of another species, Eclectus infectus, have been found in archaeological sites in the islands of Tonga and Vanuatu(Steadman 2006). The species presumably existed in Fiji as well. E. infectus had proprtionally smaller wings than the Eclectus Parrot. The species went extinct after the arrival of man 3000 years ago, presumably due to human caused factors (habitat loss, introduced species).
The diet of the Eclectus in the wild consists of mainly fruits, unripened nuts, flower and leaf buds, and some seeds. A favorite fruit of the Eclectus is the pomegranate and papaya with seeds. In captivity, they will eat most fruits including mango, fig, guava, cherry, banana, any melons, stone fruits (peaches etc), grapes, citrus fruits, pears and apples.
Eclectus parrots are one of the more popular birds kept in captivity, as either parent or hand reared. Unlike many other species of parrot they are relatively easy to breed yet difficult to hand feed. None the less the frustration of hand rearing an ecelctus parrot can easily be outweighed by their character and companionship if imprinted properly. For Eclectus in captivity, it is also advisable to provide vegetables high in beta-carotene, such as lightly cooked sweet potato, fresh broccoli clumps, and fresh corn on the cob. Fresh greens such as endive or commercial dandelion are a very important in providing calcium and other nutrients. These birds should not be fed avocado, chocolate, or high fat junk foods such as French fries and commercially processed human foods such as pizza. Yogurt is the only dairy product which parrots can digest. Spray millet is one of the seed items they enjoy. A variety of soaked and cooked beans and legumes, along with brown rice, provided in limited amounts help provide protein to the Eclectus diet. Nuts and seeds provide vitamin E, but should be limited in order to avoid too much fat in the diet, as Eclectus can become fat.
One must avoid feeding an Eclectus fortified foods such as pellets, breads, pastas, etc. The Eclectus is sensitive to food additives, food coloring agents and man-made vitamins. Feeding commercial fortified products can lead to muscle spasms known as toe-tapping and wing flipping, as well as allergic reactions including severe itchiness leading to feather and skin damage.
|The text in this page is based on the copyrighted Wikipedia article shown in above URL. It is used under the GNU Free Documentation License. You may redistribute it, verbatim or modified, providing that you comply with the terms of the GFDL.|
| 2.537908
|
HuggingFaceFW/fineweb-edu
|
Jump to Main Content
Further studies on South African plants: Acaricidal activity of organic plant extracts against Rhipicephalus (Boophilus) microplus (Acari: Ixodidae)
- Wellington, Kevin W., Leboho, Tlabo, Sakong, Bellonah M., Adenubi, Olubukola T., Eloff, Jacobus N., Fouche, Gerda
- Veterinary parasitology 2017 v.234 pp. 10-12
- Cissus quadrangularis, Fabaceae, Rhipicephalus microplus, acaricidal properties, acaricides, acetone, active ingredients, chlorfenvinphos, control methods, environmental fate, ethanol, farmers, flowers, larvae, leaves, mortality, plant extracts, roots, tick control, tick infestations, ticks, toxicity
- The goal of our research is to develop a lower cost eco-friendly tick control method because acaricides that are commonly used to control ticks are often toxic, harmful to the environment or too expensive for resource-limited farmers. Acetone and ethanol extracts were prepared and their acaricidal activities determined against the southern cattle tick, Rhipicephalus (Boophilus) microplus. A 1% solution of each of the plant extracts was prepared for efficacy testing using the adapted Shaw Larval Immersion Test (SLIT). The acetone stem extract from Cissus quadrangularis (Vitaceae) and the ethanol leaf and flower extract from Calpurnia aurea (Fabaceae) had potent activity like that of the commercial acaricide, chlorfenvinphos [corrected mortality (CM)=100.0%]. The ethanol extracts of the stem of C. quadrangularis (CM=98.9%) and that of the roots, leaves and fruit of Senna italica subsp arachoides (CM=96.7%) also had good acaricidal activity. There is potential for the development of botanicals as natural acaricides against R. (B.) microplus that can be used commercially to protect animals against tick infestation. Further studies to isolate the acaricidal active compounds and to determine the environmental fate, species toxicity and skin toxicity of these plants species are, however, required before they can be considered as a treatment against ticks.
| 1.541844
|
m-a-p/FineFineWeb
|
An Object-Oriented Traffic Simulation with IVHS Applications 912797
Many traffic simulation models have been developed over the years; however, most existing models are not well-suited for evaluating Intelligent Vehicle/Highway Systems (IVHS) concepts. This paper describes a new model, the Vehicular Traffic Analysis Capability (VTAC), specifically designed to model Advanced Traffic Management and Advanced Traveler Information systems. The model was developed using object-oriented analysis and design principles, and implemented in a relatively new, object-oriented, simulation language. VTAC is believed to be the first traffic model developed using the object-oriented paradigm. The principles used in the new model's design and the preliminary results obtained to-date are described. The model can currently model arterial networks, and sufficient progress has been made to demonstrate the utility of the object-oriented approach to traffic modeling.
| 1.416612
|
m-a-p/FineFineWeb
|
bone anchoring element and the accommodation space in the second portion 16 of the receiving part. The bone anchoring element 1′ has a threaded shaft 2 and a cylindrical head 30. As can be seen in particular in FIGS. 12 and 13, the accommodation space of the second portion 16 of the receiving part 5 has a hollow cylindrical inner space 181 the diameter of which is slightly larger than the diameter of the cylindrical head 30 in such a way that the cylindrical head 30 can be inserted and guided in the cylindrical section 181 in the unlocked state. The end of the cylindrical section forms a stop 182 for the head 30. The use of the bone anchoring device according to the second embodiment is similar to that of the first embodiment. The difference is that the receiving part 5 cannot pivot relative to the bone anchoring element 1′ but can only rotate in the unclamped state of the head 30. Such a monoaxial rotatable connection between the receiving part 5 and the bone anchoring element 1′, allows the receiving part to be aligned with respect to the rod by only rotating it around the screw axis which may be useful in certain anatomical situations.
- [0057]
FIGS. 14 and 15 show a third embodiment of the bone anchoring device. Portions and elements which are identical to the first embodiment are designated with the same reference numerals as in the description of the previous embodiments and the detailed description thereof will not be repeated. The receiving part 5 of the third embodiment comprises an inclined free edge 17′ of the second portion 16. As can be seen in particular in FIG. 14, the inclined free end 17′ defines a plane which includes an angle with the plane defined by the first end 9 a of the first portion of the receiving part. The hollow spherical section 18′ which accommodates the head 3 is therefore shorter on one side compared to the opposite side.
- [0058]
As can be seen in FIG. 15 this results in a larger pivot angle to one side as compared to the opposite side. Hence, a polyaxial screw with an asymmetric pivot angle range is provided. The inclined free end 17′ can be easily manufactured by cutting.
- [0059]
FIGS. 16 and 17 show a modification of the locking ring. The receiving part 5 is identical to one of the previously described receiving parts and the description thereof will not be repeated. The locking ring 8′ has on either side of each projection 21 a lateral projection 23 resulting in a diameter of the projection 21 being larger than the diameter of the cuts 24. When the locking ring 8′ is mounted, the projections 23 snap into the recess 12 due to the elasticity of the receiving part 5. The projections 23 form a securing means against falling off of the locking ring 8′ when the head 3 is not yet inserted. This may be useful when the surgeon handles the parts before the receiving part 5 is clicked onto the screw.
- [0060]
FIG. 18 shows a further embodiment which differs from the previous embodiments in that the locking ring 80 has no projections 21. As can be seen in FIG. 18, the height of the locking ring 80 is larger and the U-shaped recess 12 extends deeper into the receiving part such that the rod 6 can directly press onto the locking ring 80.
- [0061]
FIG. 19 shows a further embodiment which differs from the embodiment according to FIG. 1 in the design of the locking ring 800. The receiving part 5 is identical to one of the previously described receiving parts and the description thereof will not be repeated. The locking ring 800 has a lower part 801 which is designed like the locking ring 8 of, for example, FIG. 11 to 13 and includes two projections 21 which are offset by 180°. Furthermore, the locking ring 800 includes an annular edge 802 the inner diameter of which is larger than the outer diameter of the first portion 9 of the receiving part 5. The height of the annular edge 802 can be as large as the height of the projection 21. However, the annular edge 802 can have a height larger than the projection 21. The thickness of the annular edge 802 is small, so that the overall diameter of the receiving part 5 is not substantially increased.
- [0062]
As can be seen in FIG. 19, the annular edge 802 has such a height that when the locking ring 800 is in its lower most position clamping the head of the screw 1 the annular edge 802 closes the gap between the main portion 801 of the locking ring and the lower side of the first portion 9 of the receiving part. Therefore, there is not risk of in-growth of tissue or vessels into this place.
- [0063]
Further modifications of the embodiments described are possible. For example, the head of the bone anchoring element can have any other shape, such as, for example, a conical shape and the accommodation space in the second portion 16 of the receiving part is adapted to this shape. In a further modification the receiving part 5 or at least the second portion 16 are made of a biocompatible plastic material which provides elasticity to a certain degree. In this case, the slits may be omitted. The projections of the locking ring which engage the rod can have another shape. For example, the surface of the free end can be flat or otherwise shaped. Instead of selecting the cone angle to achieve self-locking between the locking ring and the second portion a preliminary locking of the head while the rod is still movable can be achieved by providing surface structures on the contacting surfaces such as ribs or a roughened surface.
Claims (17)
1. 1. A bone anchoring device comprising:
a bone anchoring element having a shaft for anchoring in the bone and a head;
a receiving part for coupling a rod to the bone anchoring element, wherein the receiving part comprises:
a first portion with a first end and a second end and a U-shaped recess for receiving the rod, the recess extending from the first end in the direction of the second end thereby forming two free legs; and
a second portion at the side of the second end opposite to the first end for accommodating the head, the second portion having a free end and being flexible so as to allow introduction and clamping of the head;
a locking ring embracing the second portion; and
wherein the head is locked by exerting pressure with the rod onto the locking ring resulting in compression of the second portion of the receiving part and wherein the locking ring is mounted to the receiving part from the free end of the second portion.
2. 2. The bone anchoring device according to claim 1, wherein the diameter of the second portion of the receiving part adjacent to the second end is smaller than the diameter of the first portion at the second end.
3. 3. The bone anchoring device according to claim 1, wherein the locking ring is movable along the second portion between a first position limited by the second end of the first portion and a second position limited by the free end of the second portion when the head is not clamped.
4. 4. The bone anchoring device according to claim 1, wherein the outer diameter of the locking ring is smaller than or equal to the outer diameter of the first portion.
5. 5. The bone anchoring device according to claim 1, wherein the second portion of the receiving part has a conical outer surface tapering toward the second end.
6. 6. The bone anchoring device according to claim 5, wherein the locking ring has a section with a conically tapering inner surface corresponding to the conical outer surface of the second portion.
7. 7. The bone anchoring device according to claim 6, wherein a cone angle is selected to provide self-locking between the locking ring and the second portion.
8. 8. The bone anchoring device according to claim 1, wherein the locking ring comprises two projections offset by 180° which project into the U-shaped recess when the head is not clamped.
9. 9. The bone anchoring device according to claim 1, wherein the second portion comprises a plurality of slits being open to the free end.
10. 10. The bone anchoring device according to claim 1, wherein the first portion comprises a plurality of slits extending from a distance of the first end to the second end.
11. 11. The bone anchoring device according to claim 1, wherein the head is spherical segment-shaped and the second portion comprises an inner surface with a corresponding spherical portion to allow a pivotal movement of the head.
12. 12. The bone anchoring device according to claim 1, wherein the head is cylindrically-shaped and the second portion comprises an inner surface with a corresponding cylindrical portion to restrict the movement of the head to a rotational movement about a single axis.
13. 13. The bone anchoring device according to claim 1, wherein a closure element, preferably a set screw, is provided for securing the rod in the recess.
14. 14. The bone anchoring device according to claim 1, wherein a plane going through the free end of the second portion includes an angle with the first end.
15. 15. The bone anchoring device according to claim 1, wherein the locking ring has a structure preventing it from escaping through the free end when the head is not yet inserted into the second portion.
16. 16. A method of attaching a bone anchoring device to a bone or vertebrae, the bone anchoring device comprising a bone anchoring element having a shaft for anchoring in the bone and a head, a receiving part for coupling a rod to the bone anchoring element, wherein the receiving part comprises a first portion with a first end and a second end and a
| 1.685405
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
U.N. Peacekeepers give communities another day and a prospect of a tomorrow
Since the first United Nation peacekeeping mission was established in 1948, more than 3,800 military, police and civilian personnel have lost their lives in the service of peace as a result of acts of violence, accidents and disease.
SecArmy examines the Army's commitment to Joint Force readiness with USAWC Students
The Secretary of the Army spoke to students at the Army War College today, conveying commitment and urgency of the Army's critical role in driving readiness for the Joint Force.
Army War College Class of 2019 donates gift of historic legacy to Borough of Carlisle
In a salute to the U.S. Colored Troops of the Civil War and World War I eras, the U.S. Army War College Resident Class of 2019 formally presented its class gift to the Borough of Carlisle on Memorial Day weekend.
The Army War College named Army Lt. Col. Steve Capehart as the top communicator
The Army War College named Army Lt. Col. Steve Capehart as the top communicator of the Resident Class of 2019. His presentation about NATO's future exemplified the skills and art of strategic leader communication.
Army War College recognizes two early graduates: 'You have what it takes to make decisions for the toughest problems'
The formal graduation ceremony of the Army War College Class isn't until June 7, but mission requirements sometimes require exceptions. This year, two Army War College students graduated early and their families, friends, faculty, and the War College leadership created a small but no small but significant event to mark the occasion of their graduation.
Space Assets enable Multi-Domain Operations
This is a really a great time to be in the space business, according to the Commanding General of Space Command, as he opened his presentation to the Army War College Class of 2019 in Bliss Hall, May 21.
Commandant's Memorial Day Safety Message
Memorial Day honors the generations of men and women who have died for the cause of freedom across the world while serving in the U.S. military, and on this day we pause to remember their sacrifices.
Army Heritage Days 2019 spotlights Operation Overlord
Army Heritage Days 2019 featured Operation Overlord at the U.S. Army Heritage and Education Center, May 18-19, 2019. The Army is leaning forward toward Reform today to ensure the Total Army is more lethal, capable, and efficient to meet tomorrow's challenges in part because of lessons learned during this historic operation.
Futures Commander works to create enduring culture of innovation
The commanding general of U.S. Army Futures Command encouraged a unity of effort and the creation of a new culture of innovation in the Army, as it looks ahead toward a state of continuous modernization to meet future challenges.
Army MEDCOM establishes Housing Environmental Health Response Registry
U.S. Army Medical Command (MEDCOM) established a Housing Environmental Health Response Registry to address Army Family concerns about housing and related health issues. Available to all, its a phone call away, 24/7.
Army War College wins Jim Thorpe Sports Days
Sportsmanship and camaraderie carried the day as representatives from five Department of Defense senior service war colleges faced off during the 40th Jim Thorpe Sports Days competition April 25-27, 2019.
USAHEC Announces D-Day 75th Anniversary theme for Army Heritage Days 2019
The U.S. Army Heritage and Education Center, Carlisle, PA is excited to announce this year's theme for our 2019 Army Heritage Days program, "Remembering D-Day," commemorating the 75th anniversary of one of the most famous campaigns of WWII.
Where the Army goes so goes the Army Reserve
Army War College celebrates 111 years' contributions of U.S. Army Reserve
Happy Birthday United States Army Reserve
The Army Reserve accounts for 20 percent of the Army's organized units. It provides nearly half of the Army's total maneuver support and makes up a quarter of the Army's mobilization base expansion capability.
International officers at US Army War College interact with leaders at U.S. Unified Commands
Each year, the Army War College International Fellows divide into two groups. One group heads to the southeast and the other to the western United States. Participation by the 76 international students in the Unified Command Course is intended to strengthen alliances, exchange ideas of effective leadership in coalition operations, and to build relationships.
Peace and stability operations workshop strives to forecast future requirements
The Peacekeeping and Stability Operations Institute hosted its annual Peace and Stability Operations Training and Education Workshop in Root Hall, April 3-5, 2019.
Saxton assumes command of Carlisle Barracks' Headquarters Detachment
Capt. David Saxton assumed command of Carlisle Barracks' Headquarters Detachment after the symbolic passing of the detachment's guidon during a change of command ceremony held at the Letort View Community Center, April 12.
The General as a Statesman: Allied Leadership and Operation Overlord
Kevin Weddle, professor of military theory and strategy at The United States Army War College, and the Madison Program Garwood Visiting Professor of Politics Princeton University, is teaching a course called "The General as a Statesman: Allied Leadership and Operation Overlord" for the Department of Politics at Princeton.
Great Decisions 2019
"Great Decisions" is America's largest discussion program on world affairs. Locally, Great Decisions features Army War College faculty's expert insights in a weekly series of presentations with question-answer opportunities for the eight most critical issues facing America each year. The presentation series is free and open to the military and civilian community, scheduled for Friday afternoons at the United States Army Heritage and Education Center, 950 Soldiers Drive, Carlisle.
| 1.155046
|
m-a-p/FineFineWeb
|
The Mind and the Machine: What It Means to be Human and Why It Matters
By Matthew Dickerson
A critique of the dominant physicalist paradigm of the mind, offering an alternative that places the bodily and the spiritual on an equal footing.
ISBN: 9780718894924
Are humans just complex biochemical machines, mere physical parts of a causally closed materialist universe? Are we approaching the so-called 'Singularity', when human consciousness can (and will) be downloaded into computers? Or is there more to the human person – something that might be known as 'soul' or 'spirit'? As this book makes clear, the answers to these questions have profound implications to topics such as heroism, creativity, ecology, and the possibility of reason and science. In exploring this important topic, Dickerson engages the ideas of some well-known twentiethand twentyfirst-century espousers of physicalism, including the philosopher Daniel Dennett, the biologist Richard Dawkins, the futurist-engineer Raymond Kurzweil, the psychologist B.F. Skinner, and the mathematician-philosopher Bertrand Russell. Through a careful reading of their works, Dickerson not only provides a fivefold critique of physicalism but also offers a Christian alternative in the form of 'integrative dualism', which affirms the existence of both a physical and a spiritual reality without diminishing the goodness or importance of either, and acknowledges that humans are spiritual as well as bodily persons.
Additional information
Dimensions229 × 153 mm
Trade InformationLPOD
About the Author
Matthew Dickerson is a professor at Middlebury College, affiliated with the Department of Computer Science and the Program of Environmental Studies. His most recent books include The Rood and the Torc: The Song of Kristinge, Son of Finn (2014) and The Gifted (2015).
Foreword by Charles Taliaferro
Introduction: Why Any of This Matters
Implications of a Human Machine
1. Ghosts, Machines, and the Nature of Light
2. Physicalism, Creativity, and Heroism
3. Naturalism and Nature: The Ecology of Physicalism
4. Reason, Science, and the Mind as a Physical Brain
The Spiritual Human
5. Affirming the Creative and the Heroic
6. Body, Spirit, and the Value of Creation
7. A Biblical Defense of Reason and Science
8. The Integrated Person
Works Cited
Endorsements and Reviews
An engaging and probing exploration of some of the fundamental questions humans ask about themselves: Is a human being just a machine made out of protein? Are humans completely determined by the physical processes going on in their bodies? Is the belief that humans are spiritual just a vestige of prescientific thinking? Dickerson attacks these questions – and many others – with verve and élan. The book is a model of interdisciplinary inquiry, drawing on a deep understanding of contemporary philosophy, science, and computers.
C. Stephen Evans, Baylor University
Dickerson is one of the most gifted, clear-headed contemporary writers working on consciousness today. He has a command of the philosophical literature, a love for well-crafted, compelling arguments, and a matchless grasp of the deep wisdom that can be found in the work of C.S. Lewis and J.R.R. Tolkien. His latest book is both an accessible introduction to central questions about human nature and a sustained, rigorous argument for recognizing the distinctive, overwhelming value of human persons.
Charles Taliaferro, St. Olaf College; author, Consciousness and the Mind of God
Dickerson is a thoughtful computer scientist exploring the presuppositions behind the notion that the human mind is nothing more than a complex machine. By pushing this idea to its logical conclusion, he shows the troubling implications for free will, creativity, environmental care, and reason. By contrasting this reductionistic approach with a view informed by the biblical story, Dickerson affirms a holistic view of what it means to be human. This is simply the best book I have found on this important topic – I highly recommend it!
Derek C. Schuurman, Professor of Computer Science, Redeemer University College; author of Shaping a Digital World: Faith, Culture and Computer Technology
| 2.091722
|
Zyphra/Zyda-2
|
Plants wholly submerged, producing terminal turions; lvs 1-3 cm, with filiform segments, all or many of the lvs alternate, subopposite, or irregularly scattered; fls axillary to foliage lvs; stamens 4; fr 2-2.5 mm, each mericarp with 2 low, denticulate or tuberculate, longitudinal ridges. N.S. and Que. to N.Y., w. to Minn.
Gleason, Henry A. & Cronquist, Arthur J. 1991. Manual of vascular plants of northeastern United States and adjacent Canada. lxxv + 910 pp.
| 1.111255
|
m-a-p/FineFineWeb
|
Chronic neuroinflammation is a common characteristic of neurodegenerative diseases, and lipopolysaccharide (LPS) signaling is linked to glutamate-nitric oxide-Na,K-ATPase isoforms pathway in central nervous system (CNS) and also causes neuroinflammation. Intermittent fasting (IF) induces adaptive responses in the brain that can suppress inflammation, but the age-related effect of IF on LPS modulatory influence on nitric oxide-Na,K-ATPase isoforms is unknown. This work compared the effects of LPS on the activity of α1,α2,3 Na,K-ATPase, nitric oxide synthase gene expression and/or activity, cyclic guanosine monophosphate, 3-nitrotyrosine-containing proteins, and levels of thiobarbituric acid-reactive substances in CNS of young and older rats submitted to the IF protocol for 30 days. LPS induced an age-related effect in neuronal nitric oxide synthase activity, cyclic guanosine monophosphate, and levels of thiobarbituric acid-reactive substances in rat hippocampus that was linked to changes in α2,3-Na,K-ATPase activity, 3-nitrotyrosine proteins, and inducible nitric oxide synthase gene expression. IF induced adaptative cellular stress-response signaling pathways reverting LPS effects in rat hippocampus of young and older rats. The results suggest that IF in both ages would reduce the risk for deficits on brain function and neurodegenerative disorders linked to inflammatory response in the CNS.
Keywords: Age; Cyclic GMP; LPS; Na,K-ATPase; iNOS.
Copyright © 2015 Elsevier Inc. All rights reserved.
| 1.455459
|
m-a-p/FineFineWeb
|
Why do some people smell sweat
The smell of sweat - the smell of sweat
Everyone has a personal scent: the composition of sweat plays its part. The human odor is strongly influenced by the respective bacterial flora on the skin. Different fragrance components are created, depending on which bacterial strain breaks down the fresh glandular secretion.
The smell of sweat or the olfactory fingerprint
It is precisely this combination of microorganisms that varies from person to person. With a few exceptions, e.g. during puberty or with certain illnesses, it smells fresher Sweat not or at most slightly sour, in any case not unpleasant. The strong smell only arises when the bacteria on the skin break down the sweat into its individual components. It is primarily the long-chain fatty acids found in sweat that are broken down into, among other things, the pungent-smelling ants and butyric acid, which smells strongly of rancid butter (hence the name).
Above all, the bacteria break down the fatty acids that are known as Part of sweat are included. The long-chain fatty acids are processed into shorter chains. This produces formic or butyric acid, among other things, which are essential for the typical smell of sweat are responsible.
- Display -
- Display -
Microorganisms on the skin
bacteria occur naturally on the entire surface of the skin. But they particularly like to settle in a humid and warm environment. These include the armpit area or the feet. Since a large number of sweat-producing glands can be found in these areas, odor can quickly develop under the armpits and on the feet.
On hairy parts of the body there are also a large number of them Microorganismsthat promote the breakdown of sweat components. Therefore, in axillary hyperhidrosis, it is necessary to shave the hair under the armpits. Additional factors that make up the specific sweat and body odor are the pH value of the skin, possible diseases, hormones, various luxury foods and foods.
Causes of the specific smell of sweat
The smell of sweat is influenced by:
- the respective bacterial strain on the skin, which breaks down sweat.
- the PH value of the skin.
- Hormones. During puberty it happens that even very fresh sweat smells unpleasant.
- gender differences. The fragrance note of women and men smells slightly different from the ground up.
- Diseases. Certain diseases such as diabetes or kidney or liver diseases can change the smell of sweat.
- Luxury foods like alcohol, caffeine and drugs. The excretion of toxins (previously broken down in the liver or kidneys) via sweat secretion can change the consumer's scent.
- food, for example garlic, onions or other spices noticeably increase the inherent odor.
Smell of ammonia in sweat
Sometimes the sweat smells like ammonia. This unpleasant smell of sweat can be a warning sign from the body. The smell of ammonia is particularly noticeable during training or sport. Under normal circumstances they burn Muscles during sports Carbohydrates and fats. However, the body can also fall back on amino acids: If the muscles use the amino acids as fuel, the nitrogen separates from the amino acid molecules and is then transported into the bloodstream. In the blood, the nitrogen is first converted into ammonia and later into urea. So if the sweat smells strongly of ammonia, the body signals: Help, mine Carbohydrate storage is empty!
That is why many athletes eat a lot of carbohydrates before or after a competition: Pasta in particular is a popular source of carbohydrates. Sweat production is stimulated during sport or physical exertion. Sweat contains a multitude of different substances. This also includes proteins. bacteriaThe substances, which are mainly found in the armpit or other parts of the body, break down the substances. When bacteria break down proteins, they produce the unpleasant smell of sweat.
Body odor and sweat
However, it depends on many other factors how strong and what the sweat smells like. For example, various cosmetic products - such as a cream or perfume - can negatively affect sweat in connection with sweat, because the odor intensity is increased.
- Display -
- Display -
Odor of sweat during puberty
Sweat glands are already created in the newborn, but are still largely "at rest". Healthy babies and toddlers never give off unpleasant body odor. Only at the onset of sexual maturity, i.e. during puberty, do the sweat glands take up their full function. Only now do the teenagers begin to smell. In this phase it often happens that even very fresh sweat - due to hormonal processes - already smells strongly. Usually the problem resolves itself when the hormonal turbulence comes into balance.
Who smells better?
Women have the better nose: When it comes to smell, women are ahead. When it comes to sweating, in particular, the smell of sweat often persists. Researchers have now found out that women can specifically smell sweat. The men seem to have more trouble with this.
Sensitive sense of smell
Apparently women are better able to absorb an odor and are more sensitive to the smell of sweat than men. In a research study, both male and female test subjects had to smell small fragrance bottles. One after the other, 32 vials came under the nose of the respective test subjects. In addition to sweat, the bottles contained different fragrances that masked the smell of sweat.
Attempt to deceive failed
Nevertheless, the women were able to identify an average of just under 32 vials with a sweat odor. The result of the male test colleagues was far behind with around 13 hits. However, the researchers have not yet been able to clearly explain why women perceive the smell of sweat better.
Evolution and Biology in Starting a Family
Be presumed biological reasons: In the Partner choice Women prefer to "sniff" a man who smells different than they do themselves. The more different the gene pool, the better it is apparently later for the offspring.
- Where is my life going
- Is entrepreneurship overglorified?
- Which Beatle had the worst solo career?
- What challenges do single parents face?
- Is high inflation good for debt?
- Have you ever been treated like filth
- Why is the Irish language dying
- What is meant by a software developer
- Iranians practice Muslims
- How does Gaeilge Irish sound
- Why does whole wheat taste so good
- All caterpillars are butterflies
- Why are beautiful girls bullied
- Why was life easier ten years ago
- Where are the US IMO participants now
- What happens to old computers
- Why do night clubs have dress codes
- What does ghusl mean in Islam
- What do libertarians think of compulsory vaccination
- What happens when inequality affects a society
- Hong Kong was independent from China
- How to celebrate Deepavali Dewali
- Can an XY woman get pregnant
- What is drywall
| 2.294786
|
openbmb/Ultra-FineWeb
|
From Publishers Weekly
The title of well-known science writer Clegg's newest is a bit of a teaser: as Clegg (A Brief History of Infinity
) himself admits: we may never have a definitive answer to the question, What came before the Big Bang? But there are lots of theories running around waving their hands to be noticed and get funding. Clegg devotes the first half of his book to the problems that face big bang theorists (when did the bang happen? How big was it? what caused it?). He then gives equal time to those who are looking to send that theory the way of phlogiston. Many alternative origin-of-the-universe theories postulate either that there have been cyclical universes—each ending in a Big Crunch, followed by another Big Bang, or that our universe really exists in a giant black hole,or that universes can bud off one another.Most astronomy and science fiction buffs will bl familiar with this material, but Clegg's relatively jargon-free style makes for a good introduction for general readers, even if it leaves them still wondering what did come before the big bang. (Aug.)
Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved.
"Clegg follows the footsteps of Carl Sagan's Cosmos, Steven Hawking's A Brief History of Time and Timothy Ferris's Coming of Age in the Milky Way. He shares his predecessors' enthusiasm, eloquence and ability to explain complex ideas but provides a bonus by covering startling developments of the past decade. Anyone looking for an introduction to or a refresher course in cosmology need look no further." - Kirkus, Starred Review
"Indeed, the existence of so many things, from dark matter to black holes to wormholes all has to be inferred. The Big Bang, too, is only provisional and seems to be waiting for a more graceful model to replace it. In Clegg's words, the Big Bang theory "has the feeling of something held together with a Band-Aid. Whether what came before our universe was another universe or nothing, or something else yet unconsidered, for now the most accurate answer might be: We just don't know." -Anthony Doerr Boston Globe, July 19
| 1.441793
|
m-a-p/FineFineWeb
|
here on Earth. How would the moon appear to …
Answeregy Expert
Tyrone ⭐ Answeregy Expert
Solved Venus Chapter 21 Originant Motions of the Cartoon ...
Should on * Observer look eastward or we are and to have the conting out on winter til station causes the Moon to rise and set.) A full Moon sets at An observer must look to see the setting full Moon 6. Can the first and third-quarter lunar phase be observed during daylight hours? Explain the reason for your answer. 6.
Answeregy Expert
Kirt ⭐ Answeregy Expert
The Phases of the Moon Explained - ThoughtCo
A lunar phase is simply the shape of the sunlit part of the Moon, as seen from Earth. Phases are so strikingly obvious that we almost take them for granted. Moreover, they can be observed easily throughout the month from the backyard or via a simple glance out the window. The Moon's shape changes for the following reasons: The Moon orbits Earth.
Answeregy Expert
Nick ⭐ Answeregy Expert
Eclipse Perspective: What Would an Astronaut See from the ...
Positions of the Sun, Earth, and Moon during a lunar eclipse. (Not to scale.) Credit: Smithsonian Institution. A total lunar eclipse will occur Monday night and early Tuesday morning depending on you location, but can you imagine how the eclipse would appear to an astronaut on the lunar surface? The SSERVI LPI team has written an excellent story on the eclipse from an astronaut's perspective.
Answeregy Expert
Harley ⭐ Answeregy Expert
What Determines the Moon Phases? - Sky & Telescope
To find out what phase the Moon is tonight, try our Moon Phase calculator. Note that the Moon's phase is the same for any location on Earth, but Southern Hemisphere observers will see the Moon "upside down" from the Northern Hemisphere view. Check out this table if you'd like to know an estimate of the moonrise and moonset for each phase.
Answeregy Expert
Stephen ⭐ Answeregy Expert
Phases of the Moon | Sample Assignment
Question: Why do we see phases of the Moon? Brainstorm: Why do you think we see phases of the Moon? Answers will vary . Run Gizmo: Click Play. As the Moon goes around Earth, notice what the Moon looks like on the right side of the Gizmo. (This shows what an observer on the North Pole would see.)
Answeregy Expert
Joellen ⭐ Answeregy Expert
Why would an observer on earth see a complete cycle of ...
Phases of the Moon. The phases of the moon depend on the position of the moon with respect to the Earth and the Sun. If the moon sits between them, then it is invisible, which is called a new moon.
Answeregy Expert
Brian ⭐ Answeregy Expert
Moon Phases / Lunar Phases Explained
none
Answeregy Expert
Mateo ⭐ Answeregy Expert
Why do we see different phases of the Moon? | Facts ...
Therefore, to us humans on Earth, the moon is dark, and we call this a New Moon. As the Moon then moves away from the Sun, we begin to see more of the surface illuminated. The Moon then appears brighter and fuller as we see the sun reflecting and shining on its surface. In these phases, the Moon looks like it is growing. When the Moon appears ...
Answeregy Expert
Allan ⭐ Answeregy Expert
Why would an observer on earth see a complete cycle of ...
Why would an observer on earth see a complete cycle of phases of the moon in approximately one month? was asked on May 31 2017. View the answer now.
Answeregy Expert
Paula ⭐ Answeregy Expert
Phases of the Moon - HyperPhysics Concepts
An observer on the Earth sees the Moon progress through "phases" since only that part of the moon which is illuminated by the Sun can be seen. Only that part of the moon which is inside the dashed circle in the diagram above is visible from the Earth, and therefore …
Answeregy Expert
Jayson ⭐ Answeregy Expert
Earth phase - Simple English Wikipedia, the free encyclopedia
none
Answeregy Expert
Charles ⭐ Answeregy Expert
Moon's Phases Regents Questions Worksheet
period of revolution around Earth B) Moon's period of rotation is shorter than its period of revolution around Earth C) Moon rotates once as it completes one revolution around Earth D) Moon does not rotate as it completes one revolution around Earth ___ 5) A cycle of Moon phases can be seen from Earth because the A) Moon spins on its axis B ...
Answeregy Expert
Greg ⭐ Answeregy Expert
Five best things to see during a lunar eclipse, from the moon
Eerie red glow on surrounding moonscape. During an eclipse of the moon – aka an eclipse of sun by …
Answeregy Expert
Silvestre ⭐ Answeregy Expert
Chapter 3 (cont.) Flashcards by Mikayla Bertels | Brainscape
Draw the Earth's and moon's umbral and penumbral shadows onto a diagram. From a position on Earth in the moon's penumbral shadow, an observer will see a moon phase where the …
Answeregy Expert
Rickey ⭐ Answeregy Expert
The Moon - portnet.org
13.On which date will the next first-quarter Moon phase occur? A)July 4 B)July 11 C)July 19 D)July 26 14.On which date was this phase of the Moon visible from New York State? 15.The diagram below shows the position of the Sun, the Moon, and Earth during a solar eclipse. The full shadow (umbra) and partial shadow (penumbra) of the Moon and
Answeregy Expert
Andre ⭐ Answeregy Expert
I have another question. What would an observer on the ...
What would an observer on the Moon looking at the Earth see? a) always see a fully-illuminated Earth b) always see a half-illuminated Earth c0 see phases of Earth d) see continuous darkness These are the 38,513 results, page 14 physics.
Answeregy Expert
Ignacio ⭐ Answeregy Expert
Moon Practice Test 2015 - Red Hook Central Schools
located on the surface of the Moon. A)The Earth rotates on its axis. B)The Sun revolves on its axis. C)The Moon rotates on its axis. D)The Moon revolves around the Earth. Which statement best explains why an observer on the Moon sees varying amounts of the illuminated side of the Earth (phases of the Earth) during a one-year period? A ...
Answeregy Expert
Hillary ⭐ Answeregy Expert
explain how the sun moon and earth are positioned relative ...
When the Moon passes between Sun and Earth, the lunar shadow is seen as a solar eclipse on Earth. When Earth passes directly between Sun and Moon, its shadow creates a lunar eclipse. Lunar eclipses can only happen when the Moon is opposite the Sun in the sky, a monthly occurrence we know as a full Moon. See also how do you say stop in portuguese.
Answeregy Expert
Vernon ⭐ Answeregy Expert
39 in the following diagram what is the latitude of the ...
The parts of the diagram lettered A through D show hoe the Moon's phases to an observer in New York State. The time required for the Moon to complete one cycle of phases is about one A. day B. week C. month D. year 3. An observer in New York State sees a crescent phase of the moon, as shown.
Used Resourses:
About Author
Answeregy Author
Stuart Morrison
Hi everyone, my name is Stuart Morrison and I am the editor-in-chief and author of the Answeregy website. I am 35 years old and live in Miami, Florida. From an early age I loved to learn new things, constantly reading various encyclopedias and magazines. In 1998 I created my first Web site, where I posted interesting facts which you could rarely learn elsewhere. Then, it led me to work as a content manager for a large online publication. I always wanted to help people while doing something I really enjoyed. That's how I ended up on the answeregy.org team, where I... Read more
| 1.757678
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Genu varum, Tibia vara, Blount's disease
Introduction to bowlegs:
When your baby starts toddling about, it's normal for the legs to curve outward at the knees. Parents are often concerned, especially if there are adults in the family who are bowlegged or who needed splints or braces while growing. Most of these bowlegs are normal, although a select few do require treatment.
What is bowlegs?
The tight fit inside the uterus leads to bowing of the legs that parents often do not notice until the child starts to stand and walk. Most children between one and two are quite bowlegged. This normal developmental pattern is called physiologic genu varum. ('Genu' means 'knee.')
The second most common cause of bowlegs is called Blount's disease, or tibia vara. In this uncommon condition, one side of the leg bone ('tibia') grows abnormally.
In some rare cases, children can have bowlegs from other conditions such as vitamin deficiency (rickets), arthritis, trauma, infection, tumors, or bone diseases.
Who gets bowlegs?
Physiologic bowlegs are present at some point in most children, especially up to age 2.
Blount's disease can occur in babies, school-age children, and teens. It is most common among the very obese and in those of African-American descent.
What are the symptoms of bowlegs?
Normal bowlegs improve over time. As it corrects, some children with bowlegs then go through a period of"genu valgum" or "knock-knees" before their legs finally straighten fully. When bowlegs get worse after age 2 they should be evaluated. The same is true if the bowing is extreme, if only one side is affected, or if the child is otherwise not growing normally.
Is bowlegs contagious?
How long does bowlegs last?
Physiologic bowlegs improve greatly by age 2. They can continue to improve for years later. Over 95 percent of those with physiologic bowlegs – even severe physiologic bowlegs – will become normal by adolescence with no treatment.
How is bowlegs diagnosed?
The shape of the legs changes slowly throughout childhood. They should be followed closely at each routine physical exam. If there is reason for concern, some type of x-ray or MRI evaluation is usually the next step.
How is bowlegs treated?
Physiologic bowlegs generally need no treatment at all. In fact, the braces, corrective shoes, and exercises that used to be common can hinder normal straightening of the legs.
Blount's disease usually does require treatment. Here braces may be helpful, but surgery is often necessary.
With other types of bowlegs, identifying and addressing the underlying cause is the first step.
Surgery might be used in a variety of situations if treatment is needed.
How can bowlegs be prevented?
Anything that decreases space in the uterus (twins, large babies, maternal diabetes) can make bowlegs more pronounced. Obesity in children can lead to greater bowing of the legs. Maintaining normal weight and getting plenty of calcium and vitamin D is wise.
Physiologic bowing is a normal part of development and should not be entirely prevented.
Related A-to-Z Information:
Last reviewed: February 15, 2012
| 2.405616
|
HuggingFaceFW/fineweb-edu
|
sample. In another embodiment the array comprises two or more sensors for detecting the multiple disease markers in a sample. In a further embodiment the array comprises two or more sensors with recognition elements for detecting nucleotides or proteins.
The arrays may comprise multiple sensors with the same type of recognition elements or sensors with orthogonal recognition elements for confirming the presence of a particular target. In one embodiment the array comprises a first sensor for detecting the presence of a first target of interest and a second sensor for detecting the presence of a second target. In one embodiment, the first and second targets are related and the presence of the second target provides confirmation of the presence of the first target.
The present invention provides an electronic sensor for detecting targets in a sample. The sensor comprises one or more recognition elements that are specific for the targets of interest attached to a sensing platform. The sensing platform is preferably a semiconductor based transistor which produces an electrical signal in response to target binding.
In preferred embodiments the sensor operates by influencing a conducting region underlying a gate region through electric fields arising from target associated charge and/or electrochemical potential. By way of example, charges of opposite sign to the target bound charge are induced in the underlying conduction channel or depletion region. The induction may be an addition of channel conducting charge or removal of channel conducting charge with attendant changes in channel conductance and sensor output parameters. In other embodiments charges of the same sign as the target are depleted from the channel region. However, when operated in depletion mode, the sensor loses the ability to detect gate changes if the channel becomes inverted to a type opposite the source and drain. For example, inversion to an n channel will lead to a loss of ohmic contacts with p+ source and drain.
As discussed further below, the sensor is compatible with a wide spectrum of targets and allows for the simultaneous detection of multiple targets. In preferred embodiments, multiple sensors are arranged to form a sensor array.
"Target" and "analyte" refer to a specific material, the presence, absence, or amount of which is to be detected, and that is capable of interacting with a recognition element. The targets that may be detected include, without limitation, molecules, compounds, complexes, nucleic acids, proteins, such as enzymes and receptors, viruses, bacteria, cells and tissues and components or fragments thereof. As a result, the methods disclosed herein are broadly applicable to many different fields including medical diagnostics, proteomics, genomics, public health, environmental monitoring, drug testing and discovery, biodefense, automated testing and telemedicine. Exemplary targets include, without limitation, biochemical weapons such as anthrax, botulinum toxin, and ricin, environmental toxins, insecticides, aerosol agents, proteins such as enzymes, peptides, and glycoproteins, nucleic acids such as DNA, RNA and oligonucleotides, pathogens such as viruses and bacteria and components and fragments thereof, blood components, drugs, organic and inorganic molecules, sugars, etc. The target may be naturally occurring or synthetic, organic or inorganic. The target may be a compound or an element. In some embodiments the target is a particle.
While in some embodiments the target binds to a recognition element, in other embodiments the target does not actually bind but acts on a recognition element or on the surface of the sensor itself, such as on the gate. For example, the sensor can be used to identify targets that cause corrosion based on the corrosive activity of the target on the gate material or a material deposited on the gate. Similarly, specific targets can be identified based on chemical reaction with the gate material or a material on the gate. In both cases, the chemical reaction results in a chemical potential change. In these embodiments the gate insulator is preferably thin, and the gate material is selected to be appropriately reactive and selective.
In other embodiments the target adsorbs or absorbs on the active area of the sensor and changes the electronic charge density or the potential. For example, a metal coating such as Fe can be detected. In addition, alteration of such a coating can be detected through changes in the chemical potential of the material, as described above. For example, a compound formed on the gate material due to chemical action such as corrosion can be detected and characterized by the sensor if it results in a potential change.
One of skill in the art will be able to readily adapt the methods to the particular needs of a specific field.
"Substrate" when used herein refers to the underlying material of the array on which or from which the sensors are formed. Typically the substrate is a solid support and has a rigid or surface. In a preferred embodiment, the substrate is a semiconductor wafer, preferably a silicon wafer. The preferred semiconductor material is silicon, in part due to its relative ease of fabrication, ready accessibility and the relative ease of integrating supporting circuitry on a chip. The individual sensors are formed on and/or in the substrate in the desired pattern. The recognition elements are then attached to the active region of each sensor.
The "active region" of the sensor is the region to which the recognition elements are attached and from which a signal is detected in response to the binding of a target or the activity of a target on the surface of the active region. Typically the active region is that area overlaying the portion of the sensor which can be influenced by charge or chemical potential. The "active region" is not to be confused with the "active area," or doped well in which a transistor is defined. Typically, the active region of the sensor is the top gate region of a transistor. However, in some embodiments the active region comprises the gate dielectric over the channel region, such that the recognition element becomes the gate after binding.
"Recognition element" refers to any chemical, molecule or chemical system that is capable of interacting with a target molecule. Recognition elements can be, for example and without limitation, antibodies, antibody fragments, peptides, proteins, glycoproteins, enzymes, nucleic acids such as oligonucleotides, aptamers, DNA, cDNA and RNA, organic and inorganic molecules, sugars, polypeptides and other chemicals. In addition, a recognition element can be a thin film that is reactive with a target of interest.
As illustrated in
In some embodiments the sensor comprises more than one type of recognition element 10. Each type of recognition element 10 is specific for a particular target. Multiple copies of each type of recognition element 10 are preferably attached to the active region 50 in order to produce a detectable signal upon binding. The number of recognition elements 10 necessary to produce a detectable signal will depend upon the nature of the target and can be readily determined by the skilled artisan.
Although two-dimensional arrangements of recognition elements in the active region are generally discussed herein, it is possible to have a three dimensional arrangement of recognition elements in the active area. For example, a gate material can be selected that allows for the dispersion of recognition elements throughout the material or the attachment of recognition elements to a three dimensional structure. In one embodiment the gate material is a material matrix 11 with recognition elements 10 dispersed throughout. In one embodiment the material matrix is a gel. In another embodiment the material matrix is a porous membrane with recognition elements attached throughout. In another embodiment, the active region is coated with a material, such as a gel, with recognition elements dispersed throughout the material. In other embodiments a three-dimensional arrangement of recognition elements is arrived at by linking recognition elements together, or by linking recognition elements to a scaffold or backbone that has been attached to the active area. For example, a chain of oligonucleotides, antibodies or other proteins or nucleic acids can be attached to the active area. In another embodiment recognition elements are linked to a porous membrane. Each of the recognition elements in a three dimensional arrangement can be specific for the same target or a variety of recognition elements that are specific for different targets can be used. In addition, each of the individual recognition elements can be identical or different.
The density of recognition elements 10 on the active area 50 is adjusted in order to produce a detectable signal if a target of interest is present in the sample. The density of recognition elements may also be increased in order to increase sensor sensitivity. In addition, the density and absolute number of recognition elements 10 on each sensor may be adjusted in order to provide additional information about the type and number of targets 150 present in a sample. For example, as described below, if approximately equal numbers of two or more types of recognition element are present, it is possible to determine both the presence and identity of one or more of the corresponding targets in the sample. On the other hand, the number of recognition elements 10 of each type can be adjusted such that the sensor can identify the number of targets 150 present.
For multiple target sensing, an output signal indicates that the sample has at least one target present. This may be useful, for example, in blood bank monitoring where the presence of any one of a large number of diseases indicates that the blood is not suitable for use in transfusions.
In a particular embodiment, the total number of each type of recognition element on a given sensor is approximately equal. That is, the surface density (number/square micron) of recognition elements specific for each target is approximately equal. In addition the surface density of recognition elements for each target type is preferably high enough to produce a detectable signal but low enough that the recognition elements are readily saturated by a sample containing that target type. The magnitude of the output signal produced by binding of each target will depend on the recognition element and target properties, including the charge and/or the chemical potential associated with the bound target. Because of the equal surface density of each type of recognition element, differences in the amplitude of the measured signal are attributable to the identity of the target and not to differences in the number of
| 2.37004
|
openbmb/Ultra-FineWeb
|
After mostly disappearing in the late '90s, measles have made a national comeback with the largest outbreak in 15 years, mostly caused by unvaccinated travelers who bring the disease back home, the CDC said this week.
This year so far, there were 118 reported measles cases in the country, including two in Washington. That's nearly twice as many as the country's total for all of last year, and the highest number for that time period since 1996.
The Centers for Disease Control and Prevention found that most of the patients had brought the disease home from Southeast Asia or Europe, currently in the grip of a major epidemic. The vast majority – 89 percent – were unvaccinated. Patients included 24 kids whose parents claimed a religious or personal exemption from vaccinations and 47 people who had to be hospitalized.
After declaring measles eliminated at the end of the last century -- largely due to high vaccination rates -- health experts are now worried that the disease's surge partly stems from a growing anti-vaccine movement that's led to big pockets of unvaccinated people.
That includes Washington, which has one of the highest school-immunization exemption rates in the country.
A map of the outbreak shows clusters in California, Texas and Minnesota, where anti-vaccine advocates have been particularly active, says Seth Mnookin, author of "The Panic Virus." He writes:
The most significant factor in the spread of measles in the United States is the increase of pockets of the country where vaccination rates have declined below the level needed to maintain herd immunity.
(If you really want to be scared, Mnookin also writes about how a few measles cases can spread out of control, like what's happening in France, where more than 10,000 cases and six deaths have been reported this year).
In Washington, the two cases occurred in Clark County, in the southwest part of the state which includes Vancouver, which has one of the highest vaccination opt-out rates in the state. In some school districts there, more than 10 percent of students had a waiver from vaccinations last year.
The Clark County patients included a baby who had recently returned from a trip to India, and a school-age child who was unrelated and exposed to the contagious virus at the same facility that treated the baby. The school-age child had not been vaccinated.
In May, Washington began targeting the state's large number of unvaccinated children, with a new law requiring parents who want a vaccination waiver for their kid to show proof that a health provider gave them information on immunizations.
The rate of students with such waivers has more than doubled in the state in the last decade, with more than 6 percent opting out of immunization rules last year.
The national average for exemption rates is less than 2 percent.
| 1.623539
|
HuggingFaceFW/fineweb-edu
|
2011 International Conference on Document Analysis and Recognition
Stamp Detection in Color Document Images
Barbora Micenkov'a1,2 Department of Computer Science Aarhus University (AU) Aarhus, Denmark [email protected]
Joost van Beusekom2 Multimedia Analysis and Data Mining Group German Research Center for Artificial Intelligence (DFKI) Kaiserslautern, Germany Joost.van [email protected]
desirable to determine whether there are no outliers, for example a document with a missing stamp. The difficulty of stamp extraction is that, in general, there is no template for stamps. It is a partially graphical and textual object that can be placed on any position in the document. The variations are in its shape and color, print quality or rotation and even two imprints of the same stamp can look very different. We present a new approach to detect stamps of different colors and extract them properly even if they are overlapped with a signature or a text of another color. We do not focus on stamps of any particular shape so business stamps with addresses, official seals as well as decorative stamps can be extracted. Detection of black stamps still remains a challenge, but the method allows further extension for black stamps too. Good results have been achieved detecting stamps in documents containing other color objects such as logos and texts. The proposed method consists of the following steps. First, the chromatic part of the image is separated from the approximately achromatic text and background. Then, color clustering is performed on it to obtain several cluster images, each containing just elements of the same color. The cluster images are cleaned from noise and segmented by XY-cut algorithm to extract candidate solutions. Finally, the candidate solutions are classified using the set of features described in Section IV.
Abstract—An automatic system for stamp segmentation and further verification is needed especially for environments like insurance companies where a huge volume of documents is processed daily. However, detection of a general stamp is not a trivial task as it can have different shapes and colors and, moreover, it can be imprinted with a variable quality and rotation. Previous methods were restricted to detection of stamps of particular shapes or colors. The method presented in the paper includes segmentation of the image by color clustering and subsequent classification of candidate solutions by geometrical and color-related features. The approach allows for differentiation of stamps from other color objects in the document such as logos or texts. For the purpose of evaluation, a data set of 400 document images has been collected, annotated and made public. With the proposed method, recall of 83% and precision of 84% have been achieved. Keywords-stamp detection; image segmentation; computational forensics; color clustering
I. I NTRODUCTION Despite an enormous utilization of computer technology in various areas of our lives, paper documents still play an important role. Contracts, wills, certificates, invoices and all documents issued by formal authorities are printed on a solid paper and a signature or a stamp guarantee the authenticity of the content. Official stamped documents are often accepted without questioning, omitting the fact that there is an advanced computer technology available to public which can be easily misused for fraud. The process of modern forgery involves either photocopying or scanning the original document, digital image modification and printing. A huge volume of documents is processed daily in offices such as insurance companies or banks and the degree of automation is still increasing. For example, the printed invoices incoming to an insurance company are immediately digitized and there is no time and resources to manually check if the stamp is authentic, which makes the forgery rather easy. For that purpose, an automatic system is needed which is able to detect a stamp in a scanned document and, in a second step, to differentiate whether it is authentic or forged. Moreover, detection of stamps is important in other levels of document security too. For example in the scenario where there are invoices incoming from the same source, it is _PHONE_/11 $26.00 © 2011 IEEE DOI 10.1109/ICDAR.2011.227
n io ic at at r pa om s Se chr art of p
r lo in g Co ter us cl
XY cut segmentation
Diagram of the stamp detection algorithm.
In Section II, previous work on stamp detection is summarized. Section III describes the proposed method on segmentation of the document image and Section IV covers 1125
of a stamp. Row and column projections are made on each of the two images separately to detect these areas. Simple features (size and width-to-height ratio) are applied to discard inappropriate candidate solutions. This approach is restricted to detection of red and blue stamps only. Evidently, all the published methods have considerable limitations (on shape, color or background) and therefore a generic approach to stamp detection is proposed in this paper.
feature extraction and classification. In Section V, the data set for evaluation is presented and the results are given in Section VI. II. R ELATED W ORK The number of published methods on stamp segmentation is quite limited. As prior knowledge of the structure (shape or color) of the stamp is helpful to localize it in a document, previous research was focused on detection of stamps of a particular type. Detection methods based on shape information require an outer frame to be present around the stamp. Chen et al. detect seals on Chinese bank checks with a region-growing algorithm. They assume the seal to be the only object in the check to have an outer frame. The method proposed by Zhu performs Hough Transform to search for elliptical/circular candidates for stamps. The author claims the method to be robust on degraded documents and successful even for stamps overlapping with text. However, due to the shape restriction is its usage limited. In content-based image retrieval, the information carried in stamps (seals) contained in documents could be used for their indexing. Roy et al. compute spatial feature descriptors from the positions of characters in the queried seal and apply Generalized Hough Transform to detect the seal in documents in the database. In this scenario, the template (user query) seal must be given. A stamp is a plain-color object although some parts of the imprint might have different brightness due to an imperfect ink condition. Ueda was one of the first authors to apply color analysis for extraction of signatures and seals from Japanese bank checks. He works with the RGB color histogram of pixel intensities and makes orthogonal projections to separate different clusters. The author assumes exactly 3 clusters to be in the document – a background, a seal and a signature – and such an approach is not suitable for generic document images. Cai and Mei also present a simple approach based on color analysis dividing the RGB cube into 8 subspaces, assigning a label to each pixel and choosing just those pixels that belong to the red and blue subspace. With this approach, the color of the seal must be known beforehand. Soria-Frisch presents a fuzzy integration method for combining color channels to segment stamps of one particular color. Berger et al., are able to separate overlapping objects of very similar colors (e.g. a stamp and a signature) by means of SVM. However, small areas belonging to each object have to be chosen manually which makes their approach inapplicable to automatic segmentation. In the latest method proposed by Forczma'nski and Frejlichowski in 2010, the authors transform the document image into Y Cb Cr space and work with Cb and Cr components which carry the information about chromaticity. Areas with high Cb or Cr intensities denote the presence
III. I MAGE S EGMENTATION A stamp is treated as a single color object. This characteristic is considered to be invariant and it is utilized for segmentation of the document image. Only chromatic parts are extracted and clustered according to their color. The clusters are then partitioned to obtain candidate solutions. A. Separation of Chromatic Pixels RGB color model is not convenient for segmentation because of high correlation among the channels. To segment color stamps, it is desirable to separate out the gray-level (achromatic) parts of the document image that correspond to the printed text and background. For this purpose, Y Cb Cr color space has been chosen. In this model, Y is the luma component and Cb, Cr are chroma components meaning the blue and red difference. Y = 0.299 · R + 0.587 · G + 0.114 · B Cb = −0.169 · R − 0.331 · G + 0.5 · B Cr = 0.5 · R − 0.419 · G − 0.081 · B.
Figure 2. Ink colors in the image form clusters of elongated shapes. A scatter plot in Y Cb Cr color space in (a) and a projection of pixel intensities onto the Cb Cr plane in (b).
To separate out the pixels close to gray levels, a projection on Cb Cr plane is made and eachppixel point is treated as a polar vector (r, θ), where r = Cb2 + Cr2 and θ = atan2(Cb, Cr ), θ ∈ [0, 2π). A threshold T is set and all vectors with r > T are marked as chromatic and further used for color clustering.
B. Color Clustering in Cb Cr plane
By nature, stamps are not connected objects – they consist of many small components that need to be grouped properly. The resulting cleaned masks can be segmented by the well-known XY-cut algorithm. The resulting rectangles are handled as bounding boxes of the candidate solutions. With this approach even multiple stamps can be extracted.
From pixel scatter plots of various document images one can learn that the clusters formed by inks have elongated shapes like clouds stretching from the white color cluster as it can
| 1.832383
|
openbmb/Ultra-FineWeb
|
cing, a laser ablates a thin epidermal layer of illuminated derma of a patient. During healing, a new epidermal layer is formed on the ablated surface having the look of the derma of a young person, i.e. the new epidermal layer is formed without previously existing scars, wrinkles, etc.
Lasers that operate at a wavelength that is absorbed in water are used for cosmetic tissue resurfacing. When the laser power density (W/mm2) at illuminated cells is sufficient, cellular water is superheated causing small explosions that disrupt heated cells.
During removal of an epidermal layer, it is essential not to damage underlying or surrounding tissue. Residual heat may cause non-ablated cells to char and become necrotic, whereby new scars may be formed and thus, it is desirable to apply laser power for a short time, to minimize transmission of conducted heat to underlying and surrounding tissue.
It is therefore desired to accurately control the amount of light energy transferred to derma to be ablated. The amount of energy must be sufficient for the dermal cells to vaporize and, simultaneously, the amount of residual energy heating non-ablated cells must be so low that non-ablated cells will not be damaged.
Apparatuses for cosmetic tissue resurfacing are known, comprising a CO2 laser emitting a laser beam and a laser articulating arm with mirrors for reflection of the laser beam, so that the laser beam is transmitted inside the articulating arm. Further, the arm has a number of joints, so that the arm can be moved around by an operator. A handpiece to be held by the operator is connected to the arm. The laser beam is moved or scanned across a target surface by movable mirrors connected to motors and mounted in the arm. The scan pattern of the laser beam is an archimedes spiral. The laser spot formed by the laser beam on the target surface moves along the spiral at a constant angular speed.
It is a disadvantage of the known apparatus that the energy density delivered to the target surface is non-uniform across the scanned surface area of the spiral, as more energy is delivered at the centre of the spiral than at the circumferential of the spiral.
It is another disadvantage of the known apparatus that the circular outline of the scan pattern leads to non-uniform scanning of an area that is larger than the area of the scan spiral as either 1) areas that have not been scanned will remain on the surface, when abutting spirals or 2) ablated areas will be scanned more than once, due to overlap of spirals.
It is yet another disadvantage of the known apparatus that evaporated derma is exhausted through the internal of the laser articulation arm, whereby optics and other members in the arm get dirty.
It is still another disadvantage of the known apparatus that it is very laborious to disassemble members, that may have been in contact with a patient, from the handpiece, e.g., for autoclaving.
It is still another disadvantage of the known apparatus that movement of the handpiece is restrained by the laser articulation arm, as the construction of tubes interconnected by joints is not fully flexible.
In addition, the apparatus typically has a large mass and a large inertia (typically also due to counter-balancing masses) which makes the operation and movement of the arm elaborate and heavy.
Under the name Uni-laser 450P, Asah Medico A/S, Denmark, markets an apparatus for cosmetic tissue resurfacing, comprising a CO2 laser and an optical fiber coupled to the laser at one end and to a handpiece at the other end. The laser beam is manually scanned across the treatment surface by corresponding movement of the handpiece whereby the quality of the treatment is determined and limited by the skill of the operator.
Apart from being able to accurately control the amount of light energy transmitted towards tissue to be treated, it is also desirable to be able to automatically control whether or not light is transmitted towards tissue. If, for example, a laser is pointed at healthy tissue, it is desirable that it is detected that the tissue is healthy and that transmission of a laser beam be inhibited whereby damage to healthy tissue is prevented.
It is a disadvantage of known apparatuses that the exact circumference of the surface tissue area to be treated is defined manually by the operator. Manual control easily results in accidental damage to healthy tissue due to involuntary movements of the hand.
In U.S. Pat. No. 5,531,740, an apparatus is disclosed for automatically delivering a laser beam to an intricated colored region of a treatment area, e.g. for laser photocoagulation treatment of malformed veins. Typically, venular malformation forms an extremely intricate pattern and consequently, the task of precisely delivering the laser beam exclusively to the malformed veins becomes quite formidable. During scanning over the treatment region, the color of tissue to be treated is detected and the laser automatically treats only areas having a specified color.
It is a disadvantage of the apparatus that it is bulky and cannot easily be moved into treatment positions in relation to various surfaces of a human body. Rather, a tissue surface to be treated has to be brought into a specific position in relation to the apparatus before treatment can take place.
It is still another disadvantage of the known apparatuses that the distance between the surface to be treated and the output laser beam optics is unknown so that the degree of focusing of the laser beam on the surface to be treated is dependent on the operator.
It is yet another disadvantage of known apparatuses that no feed-back on the quality of the treatment currently in progress is provided.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide an apparatus for tissue treatment having a handpiece that can be moved around, i.e. traversed and rotated, freely by an operator, i.e. without exerting forces acting against the movement.
It is another object of the present invention to provide an apparatus for tissue treatment in which tissue type of tissue at the area to be illuminated by the treating light beam is detected and in which parameters of the laser beam is adjusted according to detected tissue type.
It is a further object of the present invention to provide an apparatus for tissue treatment that includes means for detecting the distance between the surface of tissue to be treated and the output optics focusing treating light onto the surface so that optimum focusing conditions may automatically be obtained during treatment.
It is still another object of the present invention to provide an apparatus for tissue treatment that includes a temperature measuring device for measurement of tissue surface temperature.
It is yet still another object of the present invention to provide an apparatus for tissue treatment that is adapted to automatically and accurately treat tissue to a desired depth with causing only a minimum of damage to surrounding tissue that are not treated.
It is a further object of the present invention to provide an apparatus for cosmetic tissue resurfacing that is adapted to ablate dermal cells uniformly and from a large area of a patient.
According to the invention, the above-mentioned and other objects are fulfilled by an apparatus for tissue treatment, comprising a light emitter for emission of a light beam and an optical fiber for transmission of the light beam. The fiber has a beam-inlet end that is aligned with the emitted light beam so that the light beam is coupled into the optical fiber and a beam-outlet end for emission of the transmitted light beam. Further, the apparatus comprises a handpiece coupled to the optical fiber at the beam-outlet end and comprising an output for emission of the first light beam towards a target area of tissue to be treated, detector means for detecting the type of tissue at the target area, and first light beam control means for controlling parameters of the first light beam emitted towards the target area in response to the detected type of tissue whereby various types of tissue can automatically be treated differently.
Cellular water absorbs light energy and transfers the light energy into heat. Applying light energy to the cells is therefore an efficient way of destroying, e.g. ablating, tissue. Thus, it is preferred to use light sources, such as lasers, generating light at wavelengths with a high absorption in water, preferably wavelengths larger than 190 nm, such as wavelengths in the range from 190 nm to 1900 nm, preferably from 700 nm to 900 nm, and even more preferred approximately 810 nm, or, preferably wavelengths larger than 1900 nm, such as wavelengths in the range from 1900 nm to 3000 nm, preferably from 1900 nm to 2100 nm, and even more preferred approximately 1940 nm, or, from 2800 nm to 3000 nm, and even more preferred approximately 2930 nm, or wavelengths equal to or greater than 4500 nm, such as wavelengths in the range from 4500 nm to 11000 nm, preferably from 4500 nm to 5500 nm, alternatively from 10000 nm to 11000 nm, such as around 10600 nm.
The apparatus according to the invention may be used for ablating a thin epidermal layer of the derma of a patient, removing marks on the tissue, such as marks from chloasma, liver spots, red spots, tattoos, blood wessels just below the surface, etc, as well as warts, wounds, hair follicles, etc, and hereafter the terms tissue and resurfacing will include these marks and treatments thereof.
It is preferred, that the light source utilized in the present invention is a laser, but other light sources, such as light emitting diodes and halogen bulbs, may be utilized.
The laser may be any laser capable of emitting light with sufficient power for illuminated cells to vaporize, such as CO2 lasers, YAG lasers, such as Erbium YA
| 1.963274
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
I often hear about relaxation techniques in pop psychology. We also discussed them in the mental health section of our Occupational Therapy (OT) curriculum when we explored anxiety. But are they effective and science-based?
Stress and anxiety are common but relatively nebulous issues that can be hard to treat – especially as the cause of stress can be difficult to localize and anxiety has no direct apparent "cause". Prolonged psychological stress or anxiety can even manifest a variety of physiological symptoms – high blood pressure, poor cognitive performance, mood problems, gastrointestinal disturbance, changes in eating habits, weight changes, somatic symptoms, and substance abuse.
Prolonged or excessive stress and anxiety are recognized by the DSM as psychiatric disorders if they persist and interfere with a person's ability to engage in daily activities. Now, that is a gross oversimplification and there are many kinds of anxiety disorders with specific symptoms, but a lengthy description is beyond the scope of this article. For more information, consult the DSM (Axis I).
Due to the discomfort of these symptoms, many people seek professional treatment (some never do). Patients with mild to moderate cases or who are averse to pharmaceutical treatment may seek/require relatively mild treatment methods. In those cases, it is important to consider the efficacy of the interventions used in order to ensure a high quality of health care.
Treatments for stress generally fall into two categories: cognitive behavioural therapy (CBT) and pharmaceutical intervention. Sometimes a combination of techniques is necessary to provide relief and treatment depends on severity of distress and the level of impact on daily life. CBT can incorporate some first-line techniques to help moderate stress and anxiety such as relaxation and meditation.
Some of these techniques are progressive muscle relaxation (PMR), relaxation therapy, meditation, and transcendental meditation (TM). The goal from an OT perspective is, after initial professional training, to give the patient some measure of control over their symptom management and increase independence.
PMR This is basically what is sounds like – tensing and relaxing muscles. The idea is to relieve tension in the muscles, producing a feeling of relaxation and therefore hopefully lessening feelings of anxiety. Also, if the patient is concentrating on their muscles rather than their worries, they focus and relax mentally as well. This is also used as a technique for tension-related insomnia.
Relaxation Therapy The aim of relaxation therapy is to use psychological methods to treat the psychological feeling of stress/anxiety, thereby reducing physiological symptoms. If one can reduce their state of arousal, they could theoretically also prevent themselves from feeling more and more anxious, allowing them to internally recognize and manage their own anxiety before it becomes severe (or develops into a panic attack).
Meditation This is a relatively broad term, but generally involves clearing one's mind and concentrating on something – usually breathing, a chant, or some other relaxing imagery – in a silent, distraction-free environment. The theory is that meditation reduces the heart and breathing rate. There are also questionable claims that meditation directly reduces the production of cortisol.
TM This is a technique that has basically the same characteristics of meditation, but with added East Indian flair. During this meditation the person concentrates on and repeats a mantra. The goal is to experience different levels of consciousness (note that these levels are derived from spiritual belief and are not supported with research) – specifically the transcendental/pure consciousness (4th) level. TM differs from other methods in that there is a specific target in mind. Whereas the other methods are aimed at reducing anxiety (in whatever amount that may be), this methods seeks to reach a specific level of consciousness with anxiety reduction as a secondary effect.
Supporting evidence ranges from weak (meditation) to generally positive (relaxation). Some of these techniques (PMR) are still somewhat inferior to other psychiatric interventions (i.e., CBT). None appear demonstrably harmful when used with other therapies, but the objective benefits are questionable in those techniques with weaker supporting evidence. These techniques seem appropriate as a first-line treatment for patients with mild to moderate symptoms, but may not be effective in patients with co-morbid conditions that affect arousal or muscle tone.
However, the evidence for TM is suspect. TM suffers from publication bias – specifically, multiple publications of the same data falsely bolsters evidence of efficacy. Also, there is reason to believe that it is no more effective than regular meditation. Studies of TM that report positive results sometimes fail to incorporate adequate controls to account for this effect. Also, so far there is no support for the varying levels of consciousness proposed to accompany the process. Furthermore, as the aim is to reach a certain level of consciousness rather than to marginally reduce anxiety, patients may actually experience anxiety or frustration if (or arguably, when) they fail.
In all cases it's difficult to separate the positive effects from the general interactions with therapists. People may feel improvement simply because someone is finally helping them, not because of what they are being helped with.
Reducing stress outside of pharmaceutical intervention essentially depends on a person's ability to self-regulate. Giving a patient some measure of control over their treatment reduces dependence on the therapeutic relationship and increases self-reliance. So it makes sense that interventions would attempt to enhance self-controlled anxiety management. However, evidence for the efficacy of these methods are mixed. Some work better than others, they may not work for everyone, and they require initial training/supervision by a professional.
There is a plethora of self-help books on the topic of stress reduction, but attempting the techniques above without seeking professional help could lead to exacerbation of symptoms due to prolonged absence of treatment and incorrect application of methods. While it's possible that a well-crafted video or book may guide someone sufficiently on their own, people are generally bad at evaluating their own progress. That is where a trained professional who sees these symptoms all the time can also be helpful.
In any case, with regard to TM in particular, there is no need to add a mystical belief system in order to increase effectiveness. Certainly if a patient wishes to add a metaphysical element to their own meditation, there is no need to necessarily discourage it, but there is also no need to promote it unnecessarily. It is beyond the scope of a health care practitioner (HCP) to impose spiritual beliefs onto their patients/clients and there is no evidence that there are more positive outcomes with TM over other therapies.
HCPs should avoid language that makes these treatments sound more effective than they generally are. While the results indicate that some of these therapies are an improvement over doing nothing, they can be less effective than regular CBT. They are a good supplement to maintain independent anxiety reduction, to give the patient a measure of control, and possibly reduce feelings of helplessness.
Chronic anxiety is a serious health condition and the above techniques require training and commitment, if they work for the patient at all – they aren't a guarantee. If someone promises to cure anxiety in X number of "simple" steps or claims that a mystical belief added to therapy increases efficacy, be skeptical.
*The author of this article is a recently-graduated student of OT. This article is for information purposes only and should not replace medical advice. The treatments discussed in this article are most effective under the supervision and/or training of a professional HCP. Talk to your doctor or therapist before trying any of these methods.
Note: Minor edits for clarity, 4 December 2009.
| 2.136786
|
HuggingFaceFW/fineweb-edu
|
circuit device.
More particularly, referring to Column 1 320 as an example, the operation of programmable fuse cell array 300 will be discussed. It should be appreciated that each of the columns, Column 1-Column L, operate in a similar manner. Looking at Column 1 320, a plurality of regular rows 330 and a plurality of redundant rows 334 coupled to control circuitry 302 and shared block 16 are illustrated.
In particular, at the bottom Column 1 320 is a shared block 16 that includes a sense amplifier 14 that reads each dual fuse cell 12 output along lines 301 and 303, respectively. Moreover, the output of the sense amplifier 14 of the bits read from the dual fuse cell outputs are OR-d by an OR circuit 310 to provide bit-level redundancy for each fuse cell 12. This value from OR circuit 310 is then written along line 335 back to the corresponding storage element 304 for storage at the corresponding storage element 304.
As can be seen at the bottom of Column 1 320, redundancy rows 334 including redundant fuse cells 308 may be present. The redundant fuse cells 308 of the redundancy rows 334 do not include a storage element. Each redundant fuse cell 308 has selection logic 311 which indicates whether it is to be used, its value, and what row it replaces. Select logic 311 for each redundant fuse cell 308 is programmed with a fuse cell replacement value and a fuse cell row value, which indicates a value and a row to be replaced.
Reading of the fuse cell array 300 is controlled by control circuitry 302 that provides control signals to asynchronously read and load each of the regular rows 330 and whether or not to activate the redundant rows 334. Particularly, as to the regular rows 330, as can be seen in
With the structural components of the fuse cell array 300 previously described, the basic functionality of fuse cell array 300 will be described as follows. Based upon a start read signal 350 to control circuitry 302, control circuitry 302 initiates a process to read fuse cell array 300. Particularly, control circuitry 302 triggers upon the start read signal 350 and starts a read sequence. Control circuitry 302 first sends out read and load signals 340 and 342 for row 0 (e.g., Read 0, Load 0) in conjunction with a master read signal 354 that enables sense amplifier 14 to read the programmed voltage outputs along lines 301 and 303 from fuse cell 12.
The read signal 340 is used to select the respective fuse cell 12 in row 0 for reading and the load signal 342 is used to latch the OR'd sense amplifier output 14 into the storage element 304 of row 0 along line 335. After read 0 and load 0 is de-asserted, the control circuitry 302 then asserts read 1 and load 1 for row 1 of the normal rows 330. This process continues through all the normal rows (Row 0-Row N) in sequential fashion.
Afterwards, control circuitry 302 enables read signal 309 to read redundant row 1. This causes the redundant fuse 308 in redundant row 1 to be read along line 313. The control circuitry 302 decodes the select logic 311 and if a non-zero value is returned, it will assert a load signal 313 corresponding to the decoded fuse cell replacement value and the decoded fuse cell row value, which indicates a value and a row to be replaced. The control circuitry via a load signal 342 will then latch the redundant row values into the storage element 304 for the row indicated by the de-code, for which it is to replace. This process continues for all the redundant rows (redundant rows 1-M 334).
It should be appreciated that the above-described process for column 1 320 is carried out in parallel for each respective column (Column 1-Column L) for the complete fuse cell array 300. After the fuse cell array 300 is fully read, control circuitry 302 asserts a read done signal 360 to indicate that the fuse cell array 300 now holds all the valid bit values.
Turning now to
Additionally, control logic 410 may also decode the redundancy select bits and drive all the correct row read and load signals. Upon completion of the reading of the fuse cell array 300, control logic 410 outputs the read done signal.
In one embodiment, in usage, the fuse cell array 300 may be programmed to a pre-determined set of values. For example, if a fuse cell 12 is to be a "1", then both fuse devices 18 are programmed. The fuse cell array 300 will then be read out after programming.
It should be noted that if any single fuse device 18 in a fuse cell 12 was not programmed correctly, but the other fuse device 18 was, then the fuse cell 12 will still read a "1" correctly. Therefore, this provides a first level of bit-level redundancy.
However, if both fuse devices 18 fail to be programmed correctly, or are either stuck or defective, then the fuse cell 12 will read an incorrect value. However, the fuse cell array 300 may be compared to an intended result, and each failing bit may be recorded, along with the row it is in, and for each row with a bad bit, a redundant fuse 308 of a redundant row 334, as previously discussed, may then be programmed with the original values and selection bits select logic 311 of the redundant fuse 308 may be programmed with the address of the row to be replaced. This may be done for each row that has an incorrect value.
Accordingly, two levels of redundancy and correction ability are provided, both at the bit-level and row-level. Moreover, column-level redundancy can be also provided the same way as row redundancy.
As shown, system 500 may comprise an integrated circuit 503 having PROM 501, and one or more mass storage devices 520 coupled to the integrated circuit 503. In various embodiments, integrated circuit 503 may be a microprocessor or an Application Specific Integrated Circuit (ASIC). As discussed previously, PROM 501 may comprise a fuse cell array 300 including a plurality of fuse cells 12. In some of these embodiments, fuse cell array 300 may be configured to output one or more voltages to configure the integrated circuit 503 and/or functional units 510 of the integrated circuit, such as static random access memory (SRAM). Mass storage device 520 and integrated circuit 503, except for the novel fuse cell 12 and fuse cell array 300 of PROM 501 described herein, may represent a broad range of these elements known in the art. System 500 may be embodied in a broad range of form factors from servers, to desktop, laptop, tablet, and/or handheld. Further, system 500 may be endowed with various operating systems and/or applications to solve various computing and/or communication problems.
Although certain embodiments have been illustrated and described herein for purposes of description of the preferred embodiment, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent embodiments or implementations calculated to achieve the same purposes may be substituted for the embodiments shown and described without departing from the scope of the present invention. Those with skill in the art will readily appreciate that embodiments in accordance with the present invention may be implemented in a very wide variety of ways. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that embodiments in accordance with the present invention be limited only by the claims and the equivalents thereof.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4797858||Mar 30, 1987||Jan 10, 1989||Motorola, Inc.||Semiconductor memory with divided word lines and shared sense amplifiers|
|US5708291||Sep 29, 1995||Jan 13, 1998||Intel Corporation||Silicide agglomeration fuse device|
|US5983367||Apr 29, 1997||Nov 9, 1999||Mitsubishi Denki Kabushiki Kaisha||Microprocessor having a CPU and at least two memory cell arrays on the same semiconductor chip, including a shared sense amplifier|
|US6574135||Apr 19, 2002||Jun 3, 2003||Texas Instruments Incorporated||Shared sense amplifier for ferro-electric memory cell|
|US6580655||Aug 29, 2001||Jun 17, 2003||International Business Machines Corporation||Pre-charge circuit and method for memory devices with shared sense amplifiers|
|US6914837||Jan 22, 2004||Jul 5, 2005||Infineon Technologies Ag||DRAM memory with a shared sense amplifier structure|
|US7012827 *||Jan 5, 2005||Mar 14, 2006||Taiwan Semiconductor Manufacturing Co., Ltd.||Multiple electrical fuses shared with one program device|
|US7417913 *||Mar 15, 2006||Aug 26, 2008||Intel Corporation||Fuse cell having adjustable sensing margin|
|US20070217247 *||Mar 15, 2006||Sep 20, 2007||Zhanping Chen||Shared sense amplifier for fuse cell|
|1||M. Alavi, et al., "A PROM Element Based on Salicide Agglomeration of Poly Fuses in a CMOS Logic Process," IEDM, 1997.|
|U.S. Classification||365/225.7, 365/189.06, 365/189.07|
|Cooperative Classification||G11C17/14, G11C
| 2.114069
|
m-a-p/FineFineWeb
|
In February, NASA made history with the successful landing of a car-sized robotic explorer on Mars, and its counterpart: a small helicopter that more recently proved powered flight is possible even in the thin atmosphere of Mars.
Together this dynamic duo will unlock even more of the Red Planet's secrets. The Ingenuity helicopter, a technology demonstration, is set to make a second, more complex flight next week.
Meanwhile, the Perseverance rover showed that it definitely has MOXIE in more ways than one — its Mars Oxygen In-Situ Resource Utilization Experiment (MOXIE for short) extracted carbon dioxide from the Martian atmosphere and converted it into oxygen.
This has huge implications for future astronaut missions to the moon and Mars, which will require oxygen as fuel components and for crews to breathe.
Amazing science and technology demonstrations aside, the Perseverance mission is making history in another way: by exemplifying diversity within NASA, the United States space agency.
The face of the mission is Swati Mohan, an Indian-American aerospace engineer who first delivered the news that the Perseverance rover had successfully landed on Mars on February 18.
"Touchdown confirmed," she announced to roaring applause from mission control at NASA's Jet Propulsion Laboratory in Pasadena, California. "Perseverance safely on the surface of Mars, ready to begin seeking the signs of past life."
Throughout the landing sequence, Mohan was at the forefront of the control room, providing constant updates to the team and serving as the mission's commentator.
Before she was the face of the mission, Mohan worked for years to make it all happen as part of the entry, descent and landing team.
Not only is she the guidance and controls lead for the rover mission, she is a reflection of the progress NASA has made to become more diverse. Mohan is an Indian-American who moved to the US from India as a child, and grew up dreaming about space.
Star Trek opened up her world to the beauty of the universe. But it wasn't until she took her first physics class that she decided she wanted to be an engineer. That decision led to her helping NASA to explore different regions of the solar system.
"I remember thinking 'I want to do that. I want to be the one to find new and beautiful places in the universe,'" she told Al Jazeera during the Mars Perseverance launch last summer. "The vastness of space holds so much knowledge and we have only begun to scratch the surface."
While Mohan may have helped steer the rover in the right direction on its journey to Mars, she and her teammates are also an example of how NASA's decades-long push to become more diverse is paying off.
To boldly go
That push started back in the 1970s thanks, in part, to Star Trek. Nichelle Nichols, who played Lieutenant Nyota Uhura on the popular television show, helmed a campaign to help NASA recruit a new crew of astronauts who would fly its burgeoning space shuttle programme.
Nichols travelled the country in hopes of diversifying NASA's astronaut corps. When the agency opened, its corps of space flyers was limited to one group of people: military pilots. But with a fleet of space shuttles ready to take off, NASA would need many more astronauts.
She helped to recruit a more diverse set of people, including many women and minorities such as Sally Ride, Judith Resnik, Guion Bluford, Ronald McNair and Mae Jemison and Ellison Onizuka.
Nichols also targeted those that the military might have overlooked in their astronaut recommendations, like three-time shuttle astronaut Fred Gregory, who served as a colonel in the US Air Force.
It was during this time that the people NASA sent into space began to come from more diverse backgrounds and were able to bring new skill sets to the table. The majority of recruits were still white men, but this was a turning point for the agency as people around the country could actually see themselves represented in missions.
The space shuttle has since retired, but NASA's push to be more inclusive has only gained momentum, as evidenced by the agency's more recent astronaut selections.
In 2013, for the first time in history, half of the class were women. The next group selected was even more diverse as it also included a mix of ethnicities.
NASA also strives to not only put a woman on the first lunar mission, but also a person of colour. That mission is part of NASA's Artemis lunar programme, and will mark the first time in history that either has gone farther than the International Space Station.
These types of drives would not be possible if it weren't for missions like the Perseverance rover, where the world can see a vast array of people needed to make a mission possible.
Mohan may be the voice that kept us all informed, but the crew behind the historic spacecraft is led by diverse team members including landing lead Allen Chen and engineers Moogega Cooper, Cj Giovingo and Gregorio Villar, who are breaking barriers as leads in their field from different ethnicities and the LGBTQ community. Their presence shows that NASA is continuing to make progress on the diversity front.
Space is for everyone
NASA is also helping to inspire other agencies to push for more diverse teams and help provide opportunities for more people to travel to space. With the advent of its commercial crew programme, NASA and its partners are ensuring that more astronaut missions can get off the ground, which allows for more astronauts to be recruited.
"With all of the different players involved and the burgeoning commercial industry, there's a drive to be more diverse," NASA astronaut Jessica Meir told Al Jazeera. "That's how we move forward in spaceflight."
Meir was one of two astronauts whose incoming class in 2013 was the first to be a 50/50 split between males and females. She also took place in the first all-female spacewalk in 2020, along with fellow astronaut Christina Koch.
"I think that giving more humans access to space is going to propel us in the right direction," she said.
NASA selects astronauts every few years, while other agencies, like the European Space Agency (ESA), recruit only about once a decade.
With SpaceX flying regular crew missions to the space station, ESA recently announced that it needs more astronauts. In particular, the agency is looking to see if it can hire the first disabled professional astronaut.
"We are launching a new astronaut selection campaign," ESA's Frank de Winne told Al Jazeera. "We need to have a more diverse astronaut corps."
He said that the agency is doing a feasibility study to see if it's possible to include persons with disabilities in its astronaut selection process. Among the key issues ESA is examining is the ability to get in and out of the capsule quickly in the event of an emergency. But the agency is serious about being able to include more people in its selections.
"We want that person to be a professional astronaut, not just a one-and-done flyer," de Winne said. "We want to take that step and need to examine it from a crew safety standpoint."
For its part, NASA's office of diversity and inclusion said that its progress is the result of its outreach initiatives.
Among them have been yearly college engineering competitions that focused on minority-serving institutions, said Kim Orr of NASA's outreach office for STEM (science, technology, engineering, and mathematics).
"As an agency, NASA would target those communities so that the students would have access to NASA employees and have a valuable resource to further their careers," Orr told Al Jazeera.
In recent years, however, NASA's education budget took a hit. But the agency is hopeful that the administration of new US President Joe Biden will help bolster some of those efforts so that the agency can continue to recruit the best and the brightest to continue to "dare mighty things".
There is still a lot of progress to be made, but NASA's workforce now looks much more like the nation it represents.
| 2.133656
|
m-a-p/FineFineWeb
|
A DSP algorithm for frequency analysis - Embedded.com
A DSP algorithm for frequency analysis
Advertisement
The Chirp-Z Transform (CZT), a little-known spectrum analysis algorithm, offers engineers a high-resolution FFT combined with the ability to specify bandwidth. Here's a look at how CZT works and what it has to offer.
Engineers working in the field of digital signal processing often use the fast Fourier transform (FFT) algorithm to detect tones, frequencies, signatures, and other events. In specific situations, however, other algorithms may actually work better than the FFT. Knowing when to use what algorithm can help you improve the system you're working on.
For instance, to detect specific frequencies when you're looking for tones from telephones or to detect 60Hz noise on power lines, the Goertzel algorithm ("The Goertzel Algorithm," by Kevin Banks, Embedded Systems Programming , Sept 2002, p. 34) finds specific frequencies faster than the FFT.
For analyzing a range of frequencies, such as recording frequency response measurements, matching voice patterns, or displaying spectrum information on the face of an amateur radio, what algorithm works best? Although most engineers would use the FFT, another, lesser-known algorithm gives you additional flexibility to specify both spectral analysis bandwidth and the resolution within that bandwidth and provides real and imaginary outputs from which you can compute spectral magnitude and phase. In this article, I'll introduce you to that algorithm, known as the Chirp-Z transform (CZT), and we'll compare it to the better known Goertzel and FFT.
Chirp-Z transform
To understand the CZT, first visualize the FFT. As shown in Figure 1A, when calculating the FFT, the cyclic frequency range of 0Hz to the sampling frequency (ƒs ) is equal to 0 thru 2π radians around the unit circle with samples taken equal distance around it. The CZT is capable of calculating the spectrum of a signal over an arc of the unit circle as shown in Figure 1B or, in other words, a signal between two arbitrary frequencies below the sampling frequency such as 255Hz to 1,234Hz.
Figure 1: Unit circle representation of spectrum
Figure 2: Data flow through CZT
The CZT is not restricted to calculating the spectrum on the unit circle and can compute the z-transform at points along circles or spirals on the z-plane, as shown in Figure 1C and 1D. These calculations, however, are beyond the scope of this article.
You can understand the details of the CZT as the convolution of the sampled input and the unit circle arc coefficients defined when selecting the resolution of the CZT, as shown in Figure 1B. As seen in Figure 2, two FFTs and one inverse FFT are used to calculate the CZT. Therefore, to quickly determine the CZT, the number of points sampled must be a power of two. You're not restricted to this rule, however, because the CZT code, which is posted online at _URL_ will zero-pad the input samples to a power of two. If you're using the CZT in real-time spectrum analysis, knowing the following values will increase the CZT's computing speed:
1. What is the sampling frequency of the input?
2. How many input samples are there?
3. What is the start frequency of the bandwidth of interest?
4. What is the stop frequency of the bandwidth of interest?
5. What spectral resolution do you want in the bandwidth of interest?
Most likely the sampling frequency and number of input samples will not change after each use of the CZT. Therefore, if you designate a constant output resolution and start and stop bands, you can precompute the arc coefficients at initialization, thereby speeding up the CZT computation at the expense of flexibility.
Sampling frequency, input samples
The sampling frequency usually depends on the application. For example:
- 8kHztelephony standard
- 16kHzG.722 audio compression standard for video teleconferencing
- 32kHzused in digital radio
- 44.1kHzCD quality audio
The CZT uses the sampling frequency as a reference to determine where the start and stop bands are located on the unit circle. The resolution, also known as bin size, is determined by dividing the sampling frequency bandwidth by the number of input samples. For instance, if the sample frequency bandwidth is 44.1kHz and 1,024 samples were recorded in 23ms, then the resolution would be 44,100/1,024 = 43Hz.
Increasing the number of samples to 2,048 recorded over 46ms would offer a resolution of 44,100/2,048 = 21.5Hz.
Start and stop frequency, frequency resolution
Engineers are often interested in a small range of frequencies and over-sample an analog signal to satisfy the Nyquist criterion. Having over-sampled, the bins below and above the bandwidth of interest don't aid in creating a clear picture of the desired frequencies, as shown in Figure 3.
Figure 3: Resolution using FFT
Figure 4: Sample spectrum using FFT
With the CZT, the user can define not only the start and stop frequencies but also the number of bins contained by that bandwidth.
You can see the significance of resolution if two frequencies appear between the set bin sizes. Suppose 128 samples at 8kHz are taken of an audio signal. The resolution is 8,000/128 = 62.5Hz, and three of the bins are calculated to be 437.5Hz, 500Hz, and 562.5Hz respectively.
62.5 * N = 437.5, 500, 562.5Hz (where N = 7, 8, 9)
If two tones were acquired at 470Hz and 530Hz between the established bins, the spectrum output would appear similar to the yellow shaded area in Figure 4. Analysis of this spectrum would indicate a tone at 500Hz has been detected, also shown in Figure 4.
Using the CZT with a start and stop frequencies of 100Hz and 1,000Hz respectively, 128 output samples would give a resolution of 7Hz, similar to the enhanced resolution shown in Figure 5.
Figure 5: CZT resolution superimposed over FFT
Figure 6: Sample spectrum using CZT
With a higher resolution of 7Hz per bin, the two tones at 470Hz and 530Hz can clearly be resolved, as seen in Figure 6. This configuration allows resolution of any two tones that are separated by at least 7Hz.
To summarize, the CZT requires the sampling frequency and number of input samples be coupled with the start and stop frequencies to determine the arc along the unit circle with which the sampled inputs will be convolved. The CZT also requires the number of output samples to establish the resolution between the start and stop frequencies.
CZT vs. FFT
Having expended so much effort on increasing the speed and accuracy of the FFT, why would there be a need for anything else? The answer lies in the sacrifices made to the FFT to achieve speed. One such limitation is the power-of-two rule, requiring the number of input samples to be an integer power of two (in other words, 128, 256, 512). While in itself this may not seem important, coupled with the fact that sampling frequencies are often dictated by the sampling hardware to common sampling frequencies, such as 44.1kHz, 22.050kHz, 16kHz, 11.025kHz, and 8kHz resolution, choices start becoming severely limited as shown in Table 1.
Table 1: Possible bins sizes with common sampling frequencies and power-of-two number of samples
44,100/ 1,024= 43Hz 22,050/ 1,024= 21Hz 16,000/ 1,024= 16Hz 11,025/ 1,024= 11Hz 8,000/ 1,024= 8Hz
44,100/ 512= 86Hz 22,050/ 512= 42Hz 16,000/ 512= 32Hz 11,025/ 512= 22Hz 8,000/ 512= 16Hz
44,100/ 256= 172Hz
22,050/ 256= 84Hz 16,000/ 256= 64Hz 11,025/ 256= 44Hz 8,000/ 256= 32Hz
Add to this scenario the Nyquist criterion, requiring the sampling frequency to be twice the highest frequency being sampled. Then, choosing to lower sampling frequencies for better resolution is no longer a viable option. A clever engineer would simply increase the number of samples being taken. However, this solution quickly gets out of hand.
Every increase in samples collected must be twice that previously sampled in order to satisfy the power-of-two rule shown in Table 2. The sampling frequency and number of samples acquired define the sampling time interval. For example, to capture 1,024 samples with a sampling rate of 8kHz requires (1/8,000)*1,024 = 0.128 seconds. Stepping up to the next power of two, the sampling time required is (1/8,000)*2,048 = 0.256 seconds. Here's the pattern: to attain twice the resolution, twice the number of samples is required, which takes twice the time to acquire.
Table 2: Valid power of two samples
210
=
1,02
| 2.386129
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
] "others.bam" "others.bam.bai" "shifted.bam"
## [16] "shifted.bam.bai" "trinucleosome.bam" "trinucleosome.bam.bai"
You can also perform shifting, splitting and saving in one step by calling splitBam.
objs <- splitBam(bamfile, tags=tags, outPath=outPath,
txs=txs, genome=genome,
Conservation is an optional parameter. If you do not have the conservation score or you would like to simply split the bam files using the fragment length, then you will just need to run the command without providing the conservation argument. Without setting the conservation parameter, it will run much faster.
2.4.6 Heatmap and coverage curve for nucleosome positions
By averaging the signal across all active TSSs, we should observe that nucleosome-free fragments are enriched at the TSSs, whereas the nucleosome-bound fragments should be enriched both upstream and downstream of the active TSSs and display characteristic phasing of upstream and downstream nucleosomes. Because ATAC-seq reads are concentrated at regions of open chromatin, users should see a strong nucleosome signal at the +1 nucleosome, but the signal decreases at the +2, +3 and +4 nucleosomes.
bamfiles <- file.path(outPath,
## Plot the cumulative percentage of tag allocation in nucleosome-free
## and mononucleosome bam files.
cumulativePercentage(bamfiles[1:2], as(seqinfo(Hsapiens)["chr1"], "GRanges"))
TSS <- promoters(txs, upstream=0, downstream=1)
TSS <- unique(TSS)
## estimate the library size for normalization
(librarySize <- estLibSize(bamfiles))
## splited/NucleosomeFree.bam splited/mononucleosome.bam
## 33854 2025
## splited/dinucleosome.bam splited/trinucleosome.bam
## 1972 431
## calculate the signals around TSSs.
NTILE <- 101
dws <- ups <- 1010
sigs <- enrichedFragments(gal=objs[c("NucleosomeFree",
n.tile = NTILE,
upstream = ups,
downstream = dws)
## log2 transformed signals
sigs.log2 <- lapply(sigs, function(.ele) log2(.ele+1))
_TAG_ heatmap
featureAlignedHeatmap(sigs.log2, reCenterPeaks(TSS, width=ups+dws),
zeroAt=.5, n.tile=NTILE)
| 1.432659
|
Zyphra/Zyda-2
|
many others, become increasingly blurred. This ambiguity emerges in a variety of situations: for example, debates about indigenous or native versus introduced or alien species; about the goals of restoration projects (that is, what point in the history of a site or system is the original wild state); about whether animals possess some essential wild character that is eroded through human contact; about the taxonomic relationship between domesticated animals and their wild ancestors; and about whether hybridization enhances domestic populations or contaminates wild ones.
But in a world where human environmental influence extends to the highest latitudes and the deepest seas, few animal lives remain untouched by it.
Recently, as the valence of the wild has increased in response to perceived threats, its definition has become more obviously a matter of assertion rather than description.
Harriet Ritvo is the Arthur J. Conner Professor of History at the Massachusetts Institute of Technology, where she teaches courses in environmental history, British history, and the history of human-animal relations. She is also the president of the American Society for Environmental History. Her books include The Animal Estate: The English and Other Creatures in the Victorian Age, The Platypus and the Mermaid, and Other Figments of the Classifying Imagination, The Dawn of Green: Manchester, Thirlmere, and Modern Environmentalism, and Noble Cows and Hybrid Zebras: Essays on Animals and History (forthcoming).
Conserving for the Future: Design Without Borders
Kari Stiles, Associate, Jones and Jones Architects, Landscape Architects, Planners, Seattle, WA
Conservation of zoological biodiversity from the local to the global scale will require a multi-faceted approach to design and planning. At one end of the spectrum, lands and waters providing high quality habitat will need to be preserved and protected from physical human access. At the other, a diverse array of habitat types will need to be reconstructed or newly synthesized to fill in habitat gaps resulting from severely damaging and destructive land uses. In between, an infinite number of design solutions will be employed to preserve, restore and create site-scale structural and process elements critical to the survival of zoological species. Regardless of the design approach taken, successful sites will be those that do not exist in isolation: They will also function as contributors to an integrated matrix and they will recruit people to be active players in conservation by inspiring stewardship at a variety of spatial and temporal scales.
Using case studies from recent work at Jones & Jones, this paper argues that landscape designers are uniquely positioned to influence critical dialogues that will ultimately define where, how and to what extent site-scale design will contribute to conservation of zoological diversity: At the regional scale a team of designers and planners is working with the Puget Sound Partnership to develop a conservation management framework for the Puget Sound Basin that maximizes conservation opportunities and ecological health within the context of human land use and behavior. At the municipal scale we are working with the City of Seaside, Oregon to design an open space and interpretive plan that refocuses attention on the city's position within a relatively intact, salmon-bearing estuary system. Along the US highway 93 corridor, between Missoula and Flathead Lake, the Western Transportation Institute is monitoring the performance of a string of 42 wildlife crossings designed by Jones & Jones. With various private partners, we are working to develop regional conservation and stewardship frameworks that facilitate protection of wildlife habitat while providing site-specific and network-scale recreation opportunities.
Kari Stiles is a landscape designer and planner at Jones & Jones Architects + Landscape Architects + Planners. With a PhD in Botany and Masters in Landscape Architecture from the University of Washington, her work focuses on the integration of ecological understanding in site and regional scale design and planning, and the interpretation of ecological understanding for diverse audiences. Prior to joining Jones & Jones in 2008, Kari held positions as lecturer or adjunct faculty in the Departments of Biology and Landscape Architecture at the University of Washington, the Department of Architecture and Landscape Architecture at the University of Virginia, and the Department of Herbal Medicine at Bastyr University. Committed to the creation of places that are equally respectful of the land and its people, her work is also heavily informed by her experience working with local community groups as the Neighborhood Park Program Director for the Seattle Parks Foundation and Executive Coordinator for the Friends of Seattle's Olmsted Parks.
Biodiversity and Farming: Defining a role for contemporary landscape architecture that encourages plant and wildlife biodiversity within the context of productive agricultural land.
Thomas Woltz, Partner, Nelson Byrd Woltz Landscape Architects, Charlottesville, VA
The face of agriculture has changed dramatically since World War II. Current practices in industrial agriculture, agribusiness, genetic modification, chemical crop management, and massive automated operations are in dramatic conflict with biodiversity, wildlife health, public health, and even the identity of community as it relates to sources of its food. Historically, physical landscape features such as hedgerows, vernal pools, stone walls, wetlands, and woodlots were present on many farms and supported and encouraged wildlife biodiversity. Contemporary farming practices have erased many of these features and rendered the land inhospitable to creatures with millennial histories of migration, breeding, and colonization allowing opportunistic species to flourish unchecked.
This presentation will primarily address two current projects: Nick's Head Station on the north island of New Zealand (3,000 acres) and Oakencroft Farm in Virginia (300 acres). Both are examples in which the skills and sensibilities of contemporary landscape architecture are employed in collaboration with teams of scientists to design structures and systems that integrate sustainable agriculture with best management practices for conserving wildlife and other ecological systems. The master plan of Nick's Head Station addresses the reconstruction of a 50-acre wetland that was drained in the 20th century to maximize sheep-grazing land; the construction of a predator-proof fence enclosing 120 acres to encourage nesting of threatened migratory birds and eventually the re-introduction of the endangered Tuatara; the integration of shelter belts (protection for citrus cultivation) as wildlife corridors; and the reforestation of marginal lands to re-create native, temperate rainforest habitat that once covered the north island of New Zealand.
The master plan of Oakencroft Farm in Virginia converts conventional grape cultivation for wine into sustainable, organic grape juice and vegetable production; reconfigures an open grazing pasture into an intensively grazed grass-fed cattle operation; and establishes sustainable hay production. The master plan also incorporates several restoration strategies to increase biodiversity including the regrading of farm ponds to accommodate a broader range of amphibians and reptiles; reconstruction of vernal pools; stabilization of eroded creek corridors; management of invasive plants in woodlands and hedgerows; and establishment of warm and cool season grasslands.
These two master plans operate at very different scales and address the specific needs of very different wildlife ecological systems but they share the common goal of encouraging the greatest possible biodiversity in the context of productive, sustainable farming operations. Both projects have been the fruit of exceptional collaborations between scientists (wetland biologists, conservation biologists, forest ecologists, etc.) and designers to imagine a model for balancing biodiversity and farming.
Thomas Woltz is a principal and co-owner of Nelson Byrd Woltz Landscape Architects, a 30-person design practice in Charlottesville VA and New York City. Woltz holds masters degrees in Architecture and Landscape Architecture from the University of Virginia where he has taught part-time for 14 years. NBW has designed a broad array of public and private projects including botanic gardens and zoos, academic and corporate campuses, and town planning. Woltz recently developed the Conservation Agriculture Studio around a family of projects that employs the sensibilities of contemporary landscape architecture to integrate sustainable agriculture with best management practices for conservation of wildlife and natural resources.
Integration across Scales: Landscape as Infrastructure for the Protection of Biodiversity
Kongjian Yu, Professor of urban and regional planning, and founder and dean of the Graduate School of Landscape Architecture, Peking University, Beijing, China
In today's changing global climate, the most effective solution for biodiversity conservation is through planning and design of a new Security Pattern. Rigorous security pattern analysis and development for the urban environment will safeguard biodiversity and lead to more innovative approaches for the preservation of critical ecological processes.
A holistic understanding and protection of a species' wide range of habitats instead of protecting an isolated natural area will ensure long-term environmental sustainability. The rapidly expanding human demand for agricultural and urban land requires the protection of a vast network of integrated natural habitats. How can we minimize land consumption and enhance spatial pattern planning and design so that urbanization can coexist with natural processes and biologically diverse habitats?
Ecological Infrastructure (EI) is a new vision within Landscape as Infrastructure. The concept of Landscape as Infrastructure can be traced to the pre-scientific model of Feng-shuithe sacred landscape setting for human settlement. The 19th century notion of greenways as urban recreational spaces, the early 20th century idea of greenbelts to limit sprawl, and the late 20th century movement of connecting ecological networks to preserve biodiversity, all strive to balance man and nature. EI is designed to strategically integrate critical landscape elements and structures to safeguard nature's assets such as biodiversity, species flow, hydrologic and geologic processes, and heritage corridors. The strategy of EI is to plan and develop land more effectively by preserving valuable ecosystem services.
From broad-scaled planning of the National Ecological Infrastructure of China, to the regional-scale Ecological Infrastructure of Beijing, to the fine-scale urban park restoration, the powerful tool of Landscape as Infrastructure presents a new opportunity to protect nature's processes within biologically diverse habitats.
Kongjian Yu is professor of urban and regional planning, and founder and dean of the Graduate School of Landscape Architecture, at Peking University. He received his Doctor of Design
| 2.253006
|
openbmb/Ultra-FineWeb
|
Q: Do turtles burrow in the ground for winter?
Lewis – Lincoln, VT
A: One of the oldest reptile groups on planet earth, cold-blooded turtles are distinguished by a bony shell that acts like a super-powerful shield to protect them from predators. Like birds and reptiles, turtles lay their eggs on land and breathe air—but they can spend long periods of time underwater, surfacing at regular intervals to fill their lungs with oxygen.
These terrapins do a great job taking care of themselves (and have been for the past 200 million years!), but if you have turtles in your pond or lake, you can be a gracious host by understanding some basic facts about them.
They don't use a calendar, but turtles know when it's time to cozy down for the winter. They use the air and water temperature as a gauge, which triggers their instinctual behavioral and physiological hibernation. Typically, this happens when temperatures reach 50 degrees Fahrenheit or so.
Holing Up for the Season
Though they carry a home-sweet-home on their backs, certain types of turtles do hole up for the winter season—literally. Depending on the turtle type, some species, like box turtles, will burrow in the sediment in the bottom of your pond and hibernate for the winter, while others will swim to lower pond levels to escape ice cover. This innate behavior keeps them safe, in most cases, until temperatures warm again.
Slowed Metabolism, No Appetite
Like fishes and other cold-blooded critters, turtles' metabolisms slow when temperatures get cold. This physiological change means that they require very little oxygen and food. In fact, their hearts will slow to just a few beats every few minutes! They are also able to take in miniscule amounts of oxygen through specialized skin cells.
To keep your turtles under cover and safe from predators during the long winter, you can add some pond dye, like Pond Logic® Pond Dye, to your pond. The blue or black coloring not only camouflages the turtles, but it also shades the pond, eliminates cloudy water, and cuts down on excess nutrients and odor.
Pond Talk: What do you do to support the turtle population in your lake or pond?
| 2.184453
|
HuggingFaceFW/fineweb-edu
|
asphaltiteArticle Free Pass
asphaltite, any of several naturally occurring, hard, solid bitumens whose chief constituents, asphaltenes, have very large molecules. Asphaltites are dark brown to black in colour. They are insoluble in petroleum naphthas and thus require heating to release their petroleum content. Though related to asphalts, asphaltites differ from them chemically and physically in some ways. Asphaltites, for example, usually contain little or no inorganic minerals, but asphalts may have a relatively large percentage of such matter. Also, unlike asphalts, asphaltites do not fuse readily.
Asphaltites are commonly classified into three groups: Gilsonite (or uintaite), glance pitch (or manjak), and grahamite. These substances differ from one another basically in terms of specific gravity and temperature at which they soften. Gilsonite occurs chiefly along the Colorado–Utah border, U.S.; glance pitch on Barbados and in Colombia; and grahamite in Cuba and Mexico, as well as in West Virginia and Oklahoma, U.S.
What made you want to look up "asphaltite"? Please share what surprised you most...
| 1.628155
|
HuggingFaceFW/fineweb-edu
|
For many, Halloween is what makes October such a wonderful month. Friends and families can carve jack-o'-lanterns, go on hay rides, and even visit a corn maze or haunted house. For children, it all culminates in trick-or-treating near the end of the month. While it is important to stress safety tips with your children if they are trick-or-treating, it is also important to practice some safety tips of your own if you will be out driving.
Check out these five Halloween safety tips for drivers, courtesy of Capital Toyota:
- Research trick-or-treat times in your city. Make sure you know when and where children will be out in any neighborhoods you will be visiting so that you know when to be extra cautious.
- Turn your lights on. Even if it's still light out, it will make you more visible to children. It will also help you catch the safety reflectors that many parents attach to their children's costumes.
- Drive slowly. Neighborhood speeds are usually posted at 25 mph. Slow down to 20 or even 15 during trick-or-treat times. Remember—kids might not follow all pedestrian rules, like crossing at crosswalks only.
- Put away your phone. Whether you are making a phone call, playing music, or trying to text, put that phone down. These are things that offer dangerous distractions at all times, but be especially cautious of things that cause distractions (phone, radio, food) during trick-or-treat times.
- Be aware of danger zones. Drive slowly around parked cars, as children might dart out from behind them. Also be extra careful at intersections, where children may cross out of turn. Always signal your intentions to drivers and pedestrians, and keep your eyes alert all night.
Halloween is a fun night for all—just make sure you are being safe however you celebrate!
| 1.823762
|
openbmb/Ultra-FineWeb
|
Diagram Designer - a small program to create charts and diagrams. The program interface is a window for the chart in the center of the panel elements on the right and the left current items.
To enter text for all elements using the same dialogue. With it, you can specify not only the text but also formatting. Truth is defined formatting commands that may not always be convenient.
Types of diagrams Diagram Designer
Diagram Designer includes elements 6 diagrams of various kinds. Below are the main ones.
Electronic circuit represented by a small number of basic elements:
Elements of UML diagrams are presented below:
Elements for the creation of process diagrams and flowcharts.
Diagram Designer has a pretty handy tool to create the connection elements.
Diagram Designer - a small program to create charts and diagrams, which has extensive functionality for the professional activity, but is suitable for educational projects.
| 1.944776
|
openbmb/Ultra-FineWeb
|
Российская Федерация Rossiyskaya Federatsiya Russian Federation
It has been over 300 years since Peter the Great decided to "open" Russia to the West. Since then, Russia has become much closer to western civilization, perhaps even a part of it. It has been enriched by western culture in many ways and yet has preserved its distinct Eurasian character. Russia has had a troubled history, but continues to stand proudly and boasts many splendors for foreign visitors to behold. Onion-shaped domes inherited from the Byzantine Empire, castles built to fend off the Mongol hordes, streets constructed by Soviet planners--every corner has a rich and fascinating history. Remember it then, Imagine it now.
Moscow is the cradle of Russian nation and is sometimes called "the heart of Russia." In 13th century, its dukes had unified Russian lands to fend of the Mongols and ever since, Moscow had occupied a prominent role in Russian politics, economics, culture and national identity. Moscow unique heritage, its immense size and wealth, its vibrant cultural life make it one of the world's capitals and one of the world's most exciting travel destinations.
Russia could be cold, but not always. You would be surprised to learn that Russian southern cities are located on the same latitude as Nice. The three largest southern cities of Russia are Sochi, Volgograd and Rostov-on-Don. Sochi, which is located on the banks of Black Sea next to gorgeous mountain slopes is famous for its summer resorts and for being selected as the site for 2014 Winter Olympics. Volgograd (former Stalingrad), located on the banks of Volga River, is famous for the Battle of Stalingrad - a turning point in the World War II. Rostov, also located on the banks of Volga, is famous for being the capital of Russian Cossacks.
So remote and desolated (only one inhabitant per square mile), so beautiful and pristine, Siberia is one of the world's most untouched places. Siberia is huge - 2/3 of Russia's territory. In the east, on Kamchatka, you will find chains of volcanoes and geysers. In south, you will find Lake Baikal - world's largest. Siberia is roughly two times bigger than United States. Explore the unexplored, leave civilization behind to discover lands beyond the horizons.
If Moscow is "Russia's heart," St. Petersburg is its soul. St. Petersburg is relatively young, it was established just 300 years ago. Rapid growth of Russian commerce necessitated access to seas, but powerful neighbors sought to prevent emergence of a new naval power. Russia's young tsar Peter the Great who aspired to transform Russia into a world-class European power waged the Seven Year War with Sweden in a result of which he gained a small swampy stretch of land in the Gulf of Finland. There, he laid the foundation for a city named after him and for his empire.
Russian composer Tchaikovsky composed the world's most famous works of ballet— Swan Lake, The Nutcrackers and Sleeping Beauty. During the early 20th century, Russian dancers Anna Pavlova and Vaslav Nijinsky rose to fame and impresario Serguey Daighilev and his Ballets Russes' travel abroad undoubtedly influenced dance worldwide and during the 20th century famous star after another, including Plisetskaya, Nureyev and Baryshnikov. The Bolshoi Ballet in Moscow and the Kirov in Saint Petersburg remain famous throughout the world.
Russian literature is considered to be among the most influential and developed in the world, contributing much of the world's most famous literary works. Russia's literary history dates back to the 10th century and by the early 19th century a native tradition had emerged, producing some of the greatest writers of all time. This period began with Alexander Pushkin, considered to be the founder of modern Russian literature and often described as the "Russian Shakespeare Amongst Russia's most renowned poets and writers of the 19th century are Chekhov, Lermontov, Tolstoy, Gogol, Turgenevm Dostoevsky, Goncharov, Saltykov, Pisemsky and Leskov made lasting contributions to Russian prose. Tolstoy and Dostoevsky in particular were titanic figures to the point that many literary critics have described one or the other as the greatest novelist ever.
The State Museum of Ceramics in Kuskovo, 10km (6 miles) from the center of Moscow, has a fascinating collection of Russian china, porcelain and glass. Arkhangelskoye Estate, a museum housed in a palace 16km (10 miles) from Moscow, exhibits European paintings and sculptures, but the main attraction is the grounds which are laid out in the French style. Zhostovo, 30km (19 miles) from Moscow, is a center renowned for its lacquered trays, and Fedoskino, 35km (22 miles) from Moscow, produces lacquer miniatures, brooches and other handicrafts. Located near the town of Tula, 160km (100 miles) from the capital, Yasnaya Polyana is historically significant as the author Leo Tolstoy's estate. The author of War and Peace and Anna Karenina is buried here and his house, surrounded by landscaped parkland, is now a museum open to the public. Tchaikovsky's home at Klin, 90km (56 miles) from Moscow, and Boris Pasternak's home at Peredelkino (30 minutes' drive from the capital), are also museums.
Tver, situated 160km (100 miles) from Moscow on the Upper Volga, is where Catherine II built a palace in order to take a rest en route from Moscow to St Petersburg. The Putyevoi Dvorets (Route Palace) was built by Kazakov in 1763-75. The palace overlooks the river, a convenient location for the tsarina to disembark. The town is also notable for its star-shaped square.
The Golden Ring
Several ancient towns of great historical, architectural and spiritual significance make up the 'Golden Ring', extending northeast from Moscow. They are a rich collection of kremlins (citadels), monasteries, cathedrals and fortresses. All are within easy reach of the capital. Since many were founded on river banks, a cruise is a pleasant way of discovering the region. Modern boats plying the Volga afford comfortable accommodation. As some major sites such as Vladimir and Suzdal are not located near the Volga, a minibus tour with hotel accommodation is a better option for visitors whose primary interest is the region's architectural heritage.
This small town, formerly known as Zagorsk, is situated on two rivers and is the center of the handmade toy industry; the Toy Museum has a collection beginning in the Bronze Age. The Trinity Monastery of St Sergius dates from the Middle Ages and is a major pilgrimage center. Its Cathedral of the Dormition has wonderful blue domes decorated with gold stars. The museum contains examples of Russian ecclesiastical art and crafts.
In nearby Sofrin, the Icon Workshops produce ecclesiastical ware. Also near Sergiyev Posad, the literary and artistic museum of Abramtsevo houses paintings by Repin, Serov and Vrubel. The museum is surrounded by parkland and birch woods. Ornate traditional Russian huts are dotted around the estate.
Founded in the ninth century, this town has a beautiful Kremlin and Cathedral of the Dormition. The town overlooks the shores of the Nero Lake, and is surrounded by ancient monasteries.
Neighbouring Yaroslavl lies on the banks of the Volga, and contains a host of ancient churches, most notably the Transfiguration of the Saviour Cathedral, built in the early 16th century.
This town stands at the confluence of the Volga and the River Kostroma. It is a renowned cheese-making center. Its most outstanding building is the Ipatievski Monastery-Fortress. Built during the first half of the 14th century, it became the Romanovs' residence three centuries later. The open-air museum features a collection of traditional Russian buildings, including wooden churches, log cabins and windmills brought from all over the Russian Federation.
East of Moscow is Suzdal, perhaps the most important town in the Golden Ring. It boasts 50 well-preserved examples of ancient architecture contained within a relatively small area, providing a wonderfully coherent vision of its past. Historically it was a political and religious center, and is now a major tourist attraction. The wives of tsars and boyars were exiled to the Blessed Virgin Convent.
Less than 32km (20 miles) away is Vladimir, which played a prominent part in the rise of the Russian state. The city's two magnificent cathedrals date from the 12th century. Another notable monument is the Golden Gate, a unique example of old Russian engineering skills. The nearby village of Bogolyubovo features a 12th-century fortress and Church of the Protecting Veil.
Another beautiful town on the banks of the Volga, this is notable for its Kremlin and the Chambers of Prince Dmitry. Prince Dmitry, son and heir of Ivan the Terrible drowned here, after accidentally being dropped in a river by his nurse.
The Federation's second-largest city, 715km (444 miles) northwest of Moscow, is known both as a cultural center and for its elegant buildings. The city is spread over 42 islands in the delta of the River Neva.
| 1.442564
|
HuggingFaceFW/fineweb-edu
|
These feather-like crystals are both ingested by humans for health and used by them to scrub floors and get the gunk off tiles. Take a look at what they are, and why polarized light makes them look so amazing.
The picture above is citric acid crystals, viewed through a polarization microscope. Everyone reading this has had either citric acid or scurvy sometime in their life. Citric acid, as you might imagine, is in most citrus fruits, as well as a few berries, is used by companies as a way to serve Vitamin C, and is the powder that you see on the outside of sour balls and other sour candy. The acid also dissolves a lot of grime, and thus is used in household cleaners, which is why many cleaners contain 'lemon oil.' It's a useful molecule, but who expected that it could be prettied up?
A polarization microscope shoots polarized light at objects, especially crystals. Crystals tend toward double refraction. They split beams of light which aren't polarized into two beams, travelling at right angles to each other and polarized at right angles as well. When the beams exit the crystal the two waves, which have traveled at different speeds, are out of phase with each other. A second polarization filter combine, the peaks and valleys merging together to either create huge peaks of light or dark areas, and we get the image above.
It's not often we see the beauty in the everyday, so let us take a quick moment to appreciate the lovely thing we put in our mouths and use to clean our toilets.
Image: Jan Homann
| 1.611385
|
HuggingFaceFW/fineweb-edu
|
GEL is a dynamically scoped language. We will explain what this means below. That is, normal variables and functions are dynamically scoped. The exception are parameter variables, which are always global.
Like most programming languages, GEL has different types
of variables. Normally when a variable is defined in a function,
it is visible from that function and from all functions that are
called (all higher contexts). For example, suppose a function
f defines a variable
and then calls function g. Then
function g can reference
a. But once f returns,
a goes out of scope.
For example, the following code will print out 5.
The function g cannot be called on the
top level (outside f as
will not be defined).
function f() = (a:=5; g()); function g() = print(a); f();
If you define a variable inside a function it will override any variables defined in calling functions. For example, we modify the above code and write:
function f() = (a:=5; g()); function g() = print(a); a:=10; f();
ato 5 inside f does not change the value of
aat the top (global) level, so if you now check the value of
ait will still be 10.
Function arguments are exactly like variables defined inside the function, except that they are initialized with the value that was passed to the function. Other than this point, they are treated just like all other variables defined inside the function.
Functions are treated exactly like variables. Hence you can locally redefine functions. Normally (on the top level) you cannot redefine protected variables and functions. But locally you can do this. Consider the following session:
genius> function f(x) = sin(x)^2 = ('(x)=(sin(x)^2)) genius> function f(x) = sin(x)^2 = ('(x)=(sin(x)^2)) genius> function g(x) = ((function sin(x)=x^10);f(x)) = ('(x)=((sin:=('(x)=(x^10)));f(x))) genius> g(10) = 1e20
Functions and variables defined at the top level are
considered global. They are visible from anywhere. As we
said the following function f
will not change the value of
a to 5.
a=6; function f() = (a:=5); f();
ato the value 3 you could call:
The set function always sets the toplevel global. There is no way to set a local variable in some function from a subroutine. If this is required, must use passing by reference.
So to recap in a more technical language: Genius operates with different numbered contexts. The top level is the context 0 (zero). Whenever a function is entered, the context is raised, and when the function returns the context is lowered. A function or a variable is always visible from all higher numbered contexts. When a variable was defined in a lower numbered context, then setting this variable has the effect of creating a new local variable in the current context number and this variable will now be visible from all higher numbered contexts.
There are also true local variables, which are not seen from anywhere but the current context. Also when returning functions by value it may reference variables not visible from higher context and this may be a problem. See the sections True Local Variables and Returning Functions.
| 2.370162
|
HuggingFaceFW/fineweb-edu
|
If the squares had not to be all the same size,
could be cut
in four pieces in any one of the three manners shown.
In each case the
two pieces marked A will fit together and form one of the three
the other two squares being entire.
But in order to have the squares
exactly equal in size, we shall require six pieces, as shown in the
larger diagram. No. 1 is a complete square, pieces 4 and 5 will form a
second square, and pieces 2, 3, and 6 will form the third—all
the same size.
If with the three equal squares we form the
then the mean
proportional of the two sides of the rectangle will be the side of a
square of equal area.
Produce AB to C, making BC equal to BD.
the point of the compasses at E (midway between A and C) and describe
I am showing the quite general method for
to squares, but in this particular case we may, of course, at once
our compasses at E, which requires no finding.
Produce the line BD,
cutting the arc in F, and BF will be the required side of the
mark off AG and DH, each equal to BF, and make the cut IG, and also the
cut HK from H, perpendicular to ID.
The six pieces produced are
as in the diagram on last page.
It will be seen that I have here given the reverse
first: to cut
the three small squares into six pieces to form a large
case of our puzzle we can proceed as follows:
Make LM equal to half the diagonal ON.
line NM and
drop from L a
perpendicular on NM.
Then LP will be the side of all the three squares
combined area equal to the large square QNLO.
The reader can now cut
without difficulty the six pieces, as shown in the numbered square on
| 2.02537
|
HuggingFaceFW/fineweb-edu
|
Microtunneling (also spelt microtunnelling) is currently the most accurate pipeline installation method available to the civil construction industry. Line and grade tolerances of +/- 25mm/one inch are the microtunneling industry standard. UEA specialises in Pilot Tube Microtunneling using a Laser Guided Boring Machine (GBM).
Pilot Tube Microtunneling
The pilot tube microtunneling system can be used on its own or in conjunction with an auger boring system.
Pilot tube microtunneling is an on grade pilot hole system capable of installing pipes up to 1200mm in diameter and, subject to diameter and ground type, up to 120m in length. The technique is predominantly used to install casing pipes on grade.
When the pilot tube is being installed it displaces the soil as it is thrust forward and must be used in displaceable soil. This system is most suitable for ground condition up to 10Mpa.
UEA Trenchless offers the following pilot tube microtunneling services and capabilities:
- Carrier pipe directly installed up to 600mm diameter
- Steel casing sleeves installed up to 1500mm
- Installation distances up to 120m (subject to diameter and ground type)
- All utilities catered for
- Civil works associated with the tunneling installation
- On grade boring capability
| 1.033102
|
m-a-p/FineFineWeb
|
(1887–1984) American biochemist
Born in Greenville, South Carolina, Rose was educated at Davidson College, North Carolina, and at Yale, where he obtained his PhD in 1911. He taught at the University of Texas from 1913 to 1922, when he moved to the University of Illinois as professor of physiological chemistry; from 1936 until his retirement in 1955 he was professor of biochemistry there.
In the late 1930s Rose was responsible for a beautifully precise set of experiments that introduced the idea of an essential amino acid into nutrition, demonstrating its effect on both human and rodent diet. It had been known for a long time to nutritionists that rats fed on a diet in which the only protein was zein (found in corn), despite enrichment with vitamins, would inevitably die. Rose worked with the constituent amino acids rather than proteins; he still found, however, that whatever combination of amino acids he tried the rats died. However, if the milk protein, casein, was added to their diet the ailing rats recovered.
It was obvious from this that casein must contain an amino acid, not present in zein and then unknown, that was essential for life. Rose began a long series of experiments extracting and testing various fragments of casein until at last he found, in 1936, threonine, the essential amino acid that provided a satisfactory rodent diet when added to the other amino acids. Rose argued that if there was one essential amino acid there could well be others. Over several years he therefore continued to manipulate the rodent diet and finally established the primary importance of ten amino acids: lysine, tryptophan, histidine, phenylalanine, leucine, isoleucine, methionine, valine, and arginine, in addition to the newly discovered threonine. With these in adequate quantities the rats were capable of synthesizing any of the other amino acids if and when they were needed.
In 1942 Rose began a ten-year research project on human diet. By persuading students to restrict their diet in various ways Rose eventually established that there are eight essential amino acids for humans: unlike rats we can survive without arginine and histidine. Since then, however, it has been suggested that these two amino acids are probably required to sustain growth in infants.
Subjects: Science and Mathematics.
| 2.484798
|
openbmb/Ultra-FineWeb
|
Next Article in Journal
Defect Detection of Adhesive Layer of Thermal Insulation Materials Based on Improved Particle Swarm Optimization of ECT
Next Article in Special Issue
Screen-Printed Graphite Electrodes as Low-Cost Devices for Oxygen Gas Detection in Room-Temperature Ionic Liquids
Previous Article in Journal
Towards Harmonious Coexistence in the Unlicensed Spectrum: Rational Cooperation of Operators
Previous Article in Special Issue
TiO2-Based Nanoheterostructures for Promoting Gas Sensitivity Performance: Designs, Developments, and Prospects
Article Menu
Issue 10 (October) cover image
Export Article
Sensors 2017, 17(10), 2422; doi:10.3390/s17102422
Article
Planar Microstrip Ring Resonators for Microwave-Based Gas Sensing: Design Aspects and Initial Transducers for Humidity and Ammonia Sensing
Andreas Bogner, Carsten Steiner, Stefanie Walter, Jaroslaw Kita, Gunter Hagen and Ralf Moos *
Department of Functional Materials, University of Bayreuth, 95447 Bayreuth, Germany
*
Correspondence: Tel.: +49-921-55-7401
Received: 21 September 2017 / Accepted: 17 October 2017 / Published: 24 October 2017
Abstract
:
A planar microstrip ring resonator structure on alumina was developed using the commercial FEM software COMSOL. Design parameters were evaluated, eventually leading to an optimized design of a miniaturized microwave gas sensor. The sensor was covered with a zeolite film. The device was successfully operated at around 8.5 GHz at room temperature as a humidity sensor. In the next step, an additional planar heater will be included on the reverse side of the resonator structure to allow for testing of gas-sensitive materials under sensor conditions.
Keywords:
microwave cavity perturbation; resonant frequency; radio frequency based gas sensors; zeolites; in operando spectroscopy
1. Introduction
Sensors for gas detection include optical gas sensors based on light absorption, metal oxide gas sensors based on a resistive effect (chemiresistors), catalytic gas sensors through adsorption and thermic reaction, gravimetric SAW detectors, gas chromatography, calorimetric devices, biochemical sensors, and many other sensors based on capacitive, amperometric, or potentiometric effects [1]. In typical chemiresistors, gas-sensitive functional films are applied on substrates that are covered with (interdigital) electrodes, and their resistances or their complex impedances are determined [2,3,4]. Mostly, sensors are operated in the range of room temperature to 400 °C. High ohmic electrode–film interfaces and/or very high resistivities of the sensitive materials may exclude promising sensor materials from technical application.
As an alternative approach, devices based on microwave transducers have also been suggested with growing research interest in recent years [5,6,7,8,9].
For sensor purposes, microwaves, especially electromagnetic waves in the range from 1 to 20 GHz, are typically used with planar or hollow waveguides. The sensor effect is the analyte-dependent permittivity of the material. With respect to miniaturization and low-cost applications, planar waveguide-based chemical sensors have attracted recent attention [10]. Several microwave-based sensors have been proposed in the past: moisture detection for the food and chemical industries [11,12,13,14] or glucose detection for biomedical applications [15], to name a few. In the past few years, planar microwave transducers for NH3, toluene, CO2, or CH4 based on the highly sensitive resonant method were suggested [5,6,7,8,9]. Rossignol et al. used coplanar microwave transducers and developed a resonant coplanar structure for detecting NH3 and toluene in concentrations up to 500 ppm [7]. They carried out their experiments at room temperature and regenerated the sensitive phthalocyanine layer under argon. Bailly et al. demonstrated a hematite- and a zeolite-based variant of this sensor [8,9]. A concept by Zarifi et al. involves planar resonators and an active feedback loop for a gain that yields up to five times higher quality factors and thus higher resolutions [16]. They also published a zeolite-based version of their high Q resonator for sensing of CH4 and CO2 concentrations between 1% and 50% [5]. With respect to the sensing aspect, framework materials that adsorb chemical species, like metal-organic frameworks (MOFs) [17] or zeolites [18,19,20], may be preferred for microwave gas sensors range since the adsorption of large amounts of polar gas species goes along with an appropriate change in the complex electrical permittivity. Very recently, Bahoumina et al. proposed a chemical gas sensor with a planar capacitive microwave transducer in the microwave range and a polymer carbon nanomaterial as the sensitive layer [21], and Zarifi et al. demonstrated their active-resonator concept with MOFs as a sensitive material to detect CO2 [22]. Another, newer publication of Bailly et al. demonstrated a microstrip spiral resonator covered with titanium dioxide nanoparticles [8]. Recently, further microwave-based sensing concepts with different sensing purposes and planar geometries were published. They include a coupled line section for dielectric sample measurements, interdigital capacitors for liquid mixture concentration measurement, and a disc-shaped tip with a zeolite for thermal mass gas sensing [23,24,25,26]. Even proteins can be detected if the resonator (or the split in a split ring resonator) is functionalized with aptamers [27]. Another biomedical application using an interdigital microstrip capacitor is reported by Rydosz et al. They developed a microwave-based sensor to detect various volatile organic compounds and confirmed that it can be used for exhaled acetone detection [28].
The previous solutions demonstrate the capability of microwave-based sensors to monitor gas concentrations and/or the analyte loading of a sensitive layer. However, research on design and application of microwave transducers for gas detection is in its infancy and needs further investigations to develop integrated sensor devices. In addition, the size of recent devices prevents small applications and dynamic fast measurements with gas sensitive framework layers like zeolites due to their room temperature application. Hence, in this work, a very small 9 GHz resonant microstrip structure with a ring geometry for NH3 detection is investigated. As the sensitive material, the ring resonator is coated with an NH3 and water adsorbing Fe-zeolite as it is used for selective catalytic NOx reduction reactions in automotive exhausts [29,30]. It is demonstrated that small humidity and ammonia concentrations can be detected. The paper discusses design aspects that were obtained by FEM simulation for planar cavity ring resonators and demonstrates their applicability by fabricating an entire setup and conducting initial measurements at room temperature. We expect that the proposed microwave transducer will open up new possibilities for material characterization and gas-sensing purposes, especially when in the second step a heater layer will be implemented.
2. Principle of Planar Microwave Transducers
Due to their interaction with the analyte, the gas sensitive material changes its complex electrical properties of permittivity ε = ε' − jε'' (with j being the imaginary unit) and permeability µ = µ' − jµ''. The varying material properties lead to a changing wave propagation. Besides these intrinsic material effects, the wave propagation depends on the material's geometry and on the design of the used waveguide (extrinsic properties) [10].
Generally, electromagnetic waves are guided to a desired transmission mode by restricting their expansion in one or two dimensions. A widely used transmission structure is the planar microstrip line, as depicted in the Appendix A (Figure A1). Microstrip lines consist of a strip conductor and a ground plane separated by a dielectric substrate and thus only support the transversal electromagnetic mode (TEM). TEM modes can be found whenever there are two conductors in only one medium. Hence, to be more precise, the supported wave mode for microstrips is not strictly TEM since the waves propagate not only in the substrates but also in the medium above the conductor line. This causes different phase velocities and, in turn, a longitudinal component of the electric magnetic field. However, since this component is very small it can be often neglected and the supported wave mode is then called quasi-TEM mode. In addition, the two-dimensional structure of microstrips make them well suited for miniaturization and integration with other components and, as a result of the single plane structure, they can be fabricated conventionally by thick or thin film technology, photolithography, photoetching, or laser structuring [31].
Like for microwave-based material characterization methods based on microstrips, non-resonant or resonant methods are applicable, but resonant methods are preferred for sensing applications due to their higher sensitivity and accuracy. Well-known in this respect is the resonant perturbation method, which is based on the resonant frequency change of the scattering parameters by introducing a sample [10]. Examples for such applications in the field
| 1.113189
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Nature Of Work Groups And Teams
A team can be defined as a small group of people who have complimentary skills and abilities and are committed towards a common goal and approach for which they hold each other accountable. Its best size is between seven to twelve individuals but group size can always vary. Multiple and diverse opinions are represented and the final decision of a team is made either by vote or by an inferred agreement. A group is defined as a small faction of people who have complimentary skills and abilities and are committed a leader's goals and approach making them to be accountable to the leader. Individual members of a team possess varied skills from each other, and every skilled personality can effectively contribute towards goal realization. Teams are often project oriented, whereas groups could form naturally and spontaneously. Team leaderships are collectively shared as a result of fewer members per team as compared to the number that can possibly form a group. Fundamentally, teams always need incredibly strong common purposes, but groups do not. In a well formed small team, leadership must be rotated and equally be shared. Even though a group is formally planned and established by the management as an element of formal organizational make-up, formal groupings may include divisions or departments where analogous activities seem clustered together. This group is normally created for the purposes of achieving specific organizational goals which are concerned with the harmonization of work related activities. Formal groups usually have a propensity to be permanent even though memberships are deemed to change. Informal groupings are more based on common beliefs and personal relationships than on defined or distinct role relationships. This kind of group serves more to satisfy both the psychological and social demands than the organizational goals (Griffin 2007).
Thus, members of an informal group can cut across the hierarchies in order to select their own desired leaders. It derives individual accountability rather than shared accountability. The following tables can be used to show the difference between a team and group as well as the difference between formal and informal groups. (See table 1)
Group cohesiveness is a major force that binds informal groups together. A factor that leads to a group to remain intact includes the size where large group are susceptible to breaking up than small groups. Where members are greatly depended on the group it becomes increasingly difficult for them to depart. The role of the group is central in forging closer ties among the members since where it has achieved goals that are noble to the eyes of the individuals, society or history the members will feel obliged to stick with the group. A high status group will in most cases remain intact than a low status group. This is possible through prudent management practises and pressures as to achieve success to a group then the type of management practise together with the ability to withstand pressure. If a group faces an external threat, it will tend to be more cohesive as the threat produces anxiety. The force of cohesiveness that brings groups together can either be emotional or related to a task being undertaken. The emotional aspect is as a result of the feelings that the members have to each other and to the group in general. Task cohesiveness relates to the extent to which the group members do have in sharing goals and how they work as the forces that pull or repel the group can either be positive or negative. The similarity of the members, how hard or easy it is to join the group and the external threats and competition influences the groups cohesiveness. The more similar the members of the group are the easier is to reach cohesiveness. The social identity theory states that people tend to be more comfortable with those whom are similar in external traits such as ethnicity and age as well as internal attributes such as values and attitudes. This will lead to greater trust and less conflict. When members are faced with competition from another group, they become more aware of themselves and their group becomes a common means of overcoming this external threat increasing cohesiveness. These factors can be represented through the Caron's model shown below. (See image 1).
Read also A literature review on corporate social responsibility
For effectiveness, members need to be skilled in roles related leadership. This kind of interaction requires the group to have been in existence for a period of time that has established an entrenched and relaxed working relationship among the members leading members and leaders should have trust and confidence in the group as well as in each other. Values and goals should be integrated and expressed to all members. This is best achieved by establishing boundaries with colleagues and encourages them to discuss difference in full without impedance. Power and authority is avoided as a means of resolving issues and all people regardless of their position are vulnerable as conflict which has been suppressed is likely to be destructive. The roles played by individuals within the groups are influenced by personal and situational factors. An individual's roles sets are influenced by role associations, relationships and interactions with outsiders. Role incongruence on the other hand occurs when staff members have highly responsible positions in particular respects, but low standing positions in the others creating conflicts and discords. Role expectations are basically given to individuals formally or informally (Mullins 2008).
They are based on rules, contracts, standards, policies, regulations, acceptable behavioural patterns, mutual support, appearance and attitudes. In a case where an employee's expectations are loosely defined by the manager, then the employee can utilize the opportunity to build self established roles. In most cases, role conflicts arise from inappropriate or inadequate role definitions while role incompatibility results from contradictory expectations or simultaneous differences which create inconsistencies. Role overload implies that an individual faces too much expectations and roles while role ambiguity is a situation whereby an individual's role lacks clarity pertaining to the role precise requirements, which eventually results into uncertainties. Role under-load is where individuals feel unmotivated or unchallenged especially when the perceived roles requires less than what they are willing to give or able to achieve leading to role stress. In addition, health issues have cropped up in situations where the employees experience role stresses. To solve these problems, the managers usually apply an organization matrix to amicably make employees comply with the prescribed roles. In the matrix, there are both positive and negative sanctions which may be applied informally or formally, indirectly or directly.Team work therefore has a dramatic effect on the overall performance of an organization as effective team can aid in achieving credible results. There is a need for a coaching culture where the assessment of the individual is combined with interviews and is used to determine the extent to which issues are not being addressed.
Read also Business Plan for a java Culture coffee shop
A customer to any organization is the life line of the organization and many businesses do establish relations and practises that seek to understand and respond to the challenges that have arisen out of a customer's feedback. This can be achieved by coming up with a coaching culture that encourages people to talk about what is important and what needs to be done in achieving groups strategy and mission. Communication with the team/group is crucial as it leads to more cohesion and trust, resolution of conflict with more production to the organization as a whole. The members have all the freedom to challenge the ideas, decisions and interrogate the lessons learnt. This entails the members to be effective in the overall and specific goals of the group and this commitment must go beyond the personal goals or agendas. They need to have faith among themselves and have trust among themselves so as to keep the confidence levels high. The members have to know how they fit into the overall aim of the group where they know there roles and have a sense of ownership through an effective communication channel and ownership schemes for the team or group. The internal communication allows team members to make decisions that are balanced and handle conflict effectively. Everyone has a role to play in the team/group despite the difference in roles and experience and the team members feel a sense of partnership with each other. For groups there is need for a clear communication channel with the manager where the relationship is good and cordial between him/her with the rest of the group. The team needs to focus on what is important hence the need for empowerment and a chance for creativity and innovation to flourish through learning and provision for incentives that will further the groups agenda (Wheelan 2009).
Read also Influence Of Trainees Characteristics On Motivation To Learn Management Essay
Work cited.
Griffin, R. W. (2007). Fundamentals of Management. Auckland, New Zealand: Cengage Learning Publishers.
Mullins, L. J. (2008). Essentials of organizational behavior. Upper Saddle River, NJ: Financial Times/Prentice Hall Publishers.
Wheelan, S. A. (2009). Creating Effective Teams: A Guide for Members and Leaders. Thousand Oaks, California: Sage Publishers.
Figure 1.
Table 1: Difference Between Groups and Teams
Individual accountability
Individual and mutual accountability
Focus on individual goals
Focus on team goals
Come together to share information and perspectives
Produce individual work products
Produce collective work products
Define individual roles, responsibilities, and tasks
Concern with one's own outcome and challenges
Concern with outcomes of everyone and challenges the team faces
Purpose, goals, approach to work shaped by manager
Image 1.
Source: Google images.
Order Now
Order Now
Type of Paper
Number of Pages
(275 words)
| 2.091889
|
Zyphra/Zyda-2
|
The Importance of Driver Downloads for Artificial Intelligence
The Importance of Driver Downloads for Artificial Intelligence
Introduction
The field of artificial intelligence (AI) has been rapidly advancing in recent years, with AI-driven technologies being integrated into various industries, from healthcare to finance. However, AI models require the right tools and resources to function optimally. In addition to robust hardware and powerful algorithms, one crucial aspect that often goes unnoticed is the importance of driver downloads. These small pieces of software play a significant role in ensuring the smooth operation and efficiency of AI systems. In this article, we will explore the significance of driver downloads for artificial intelligence and how they contribute to the overall performance of AI models.
Why are driver downloads important for AI?
Driver downloads act as a bridge between the hardware and software components of AI systems. They enable communication and coordination between the AI model and the underlying hardware components such as CPUs, GPUs, and other specialized accelerators. Without the appropriate drivers, the AI system may not be able to utilize the hardware's full potential, resulting in suboptimal performance.
Optimizing AI Performance
One of the primary reasons driver downloads are essential for AI is their role in optimizing performance. AI workloads often require high computational power and efficient utilization of hardware resources. The drivers allow the AI model to interact seamlessly with the hardware, ensuring efficient resource allocation and utilization. By keeping the drivers up to date, AI practitioners can unlock the full potential of their hardware, enabling faster and more accurate AI computations.
Compatibility and Stability
Another critical aspect of driver downloads is ensuring compatibility and stability. AI models are often built on complex frameworks and libraries, each with their own set of hardware requirements. Drivers tailor the hardware's capabilities to meet these requirements, ensuring that AI models can run efficiently without encountering compatibility issues. Regular driver updates provide necessary bug fixes, stability improvements, and compatibility enhancements, ensuring smooth operation of AI systems across different platforms and configurations.
Security and Reliability
In the rapidly evolving landscape of AI, security and reliability are of utmost importance. Driver downloads play a crucial role in ensuring the security and reliability of AI systems. Manufacturers regularly release driver updates that address security vulnerabilities and potential exploits, protecting AI models and the sensitive data they process. By promptly installing the latest driver updates, AI practitioners can mitigate potential security risks and ensure the reliability of their AI systems.
Enhanced Feature Set
Driver downloads not only provide the necessary hardware compatibility and stability but also offer access to enhanced features and functionalities. Manufacturers often release driver updates that introduce new features, optimize existing algorithms, and provide additional configuration options. By keeping their drivers up to date, AI practitioners can take advantage of these enhancements, further improving the performance and capabilities of their AI systems.
The Role of Driver Downloads in AI Development
Driver downloads are not limited to the deployment and operation of AI models but also play a crucial role in the development and testing stages. AI practitioners rely on specialized development frameworks and tools that depend on the underlying hardware infrastructure. By ensuring the availability of up-to-date drivers during development, they can better optimize their models, debug issues, and improve overall AI system performance.
Conclusion
In conclusion, driver downloads are an essential aspect of AI systems that often goes unnoticed but plays a significant role in performance optimization, compatibility, security, and reliability. By regularly updating their drivers, AI practitioners can unlock the full potential of their hardware, ensure seamless compatibility, mitigate security risks, and take advantage of enhanced features. In the rapidly evolving field of artificial intelligence, staying on top of driver updates is crucial for maximizing the efficiency and capabilities of AI systems. So, the next time you think about AI, remember the importance of driver downloads in powering these intelligent machines.
Leave a Comment
| 1.83512
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Chillers: Understanding Summer Energy Usage
21st August, 2009
As the weather begins to heat up, it is a prime time to get an understanding of chillers and how they impact your electric bill. Also, it is a good time to make sure you have completed some simple maintenance steps to ensure that you are getting the most out of your chiller.
Chillers are used for conditioning a medium (air, water or other substance depending on how the chiller is being used). In this case, we are going to focus on water chillers, but the same applies for other types chillers as well. In commercial buildings and many manufacturing facilities, chillers are used to remove heat and humidity and to meet room conditions. Another use for chilled water in a production facility may be to cool equipment or remove heat from products.
Basic Chiller Operation
Chillers have a few basic parts that allow the chiller to use a refrigerant to cool the medium to the appropriate levels.
The compressor takes cool refrigerant vapor at a low pressure and compresses it to a high pressure. In the process, heat develops in the refrigerant so that the vapor at the compressor outlet is quite hot. This hot refrigerant vapor moves to the condenser, where it is cooled. The condenser is simply a heat exchanger that uses air or water (generally from a cooling tower) to cool the vapor, causing it to condense or turn back into its liquid state. At this point, the refrigerant is a high pressure, warm liquid.
Simple Estimates of Chiller Energy Usage
If your chiller is being used primarily for facility cooling, the effect of outside weather can be seen in your electric bill. The following chart represents a facility's energy usage over 12 months. You can see the increased usage in the winter and summer months that is related to heating and air conditioning.
To develop such an estimate for your facility, you can use the following method. If your facility does not have electric heat, take either January or December as the baseline electric usage. Subtract this baseline usage from your usage throughout the entire year to determine the amount of electric energy being consumed by the chiller.
If your facility does have electric heat, use the low months in the spring and fall to estimate the baseline. Use 85 percent of the lowest month(s) usage as the baseline and perform the same estimate as above. For the low months, assume the amount above the baseline is split equally between heating and cooling. (See chart.)
There are several things that can be done to reduce the amount of energy consumed by the chiller. Matching the chilled water set point to the desired room or processing conditions is one of the most effective. For each degree that you "over chill" the water, you consume 1.5 percent more energy. By raising the chilled water set point as much as possible (while still meeting the cooling need), you can appreciably lower chiller energy consumption.
Some energy management systems use an adaptive control scheme called chilled water reset. They continuously monitor the valve position of each chilled water coil throughout the building and ensure that one or more of them are open 90 percent or more. If not, the chilled water is raised incrementally. The controller knows that if all of the chilled water valves are somewhat closed, then the chilled water temperature can be raised until one or more of the coils need nearly full flow. This saves energy by continually adjusting the chiller to just meet the required operating conditions without over-chilling the water.
Another thing to focus on is chiller maintenance. It is important to purchase energy efficient chillers, but that efficiency gain is wasted if the chiller is not properly maintained. Recommended maintenance items for peak energy efficiency include:
1. Inspect the chiller as recommended by the chiller manufacturer. Typically, this should be done at least quarterly.
2. Routinely check refrigerant and inspect for refrigerant leaks.
3. Check compressor operating pressures.
4. Check all oil levels and pressures.
5. Check motor voltages and amps for balanced loading.
6. Check all electrical starters, contactors and relays.
7. Check un-loader operation.
8. Check water flow rates.
9. Review water chemistry to ensure proper heat transfer.
10. Review cooling tower operation.
As the summer temperature and humidity rise, you can expect the energy consumption of your chiller to rise. By using the information in this article you can have a better understanding of how to track and reduce that energy and get the most from your chiller systems.
Back to top ↑
Clicky
| 1.652089
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
[torquedev] [Bug 67] New: Support for counted resources on nodes
"Mgr. Šimon Tóth"
SimonT at mail.muni.cz
Wed Jun 30 13:26:15 MDT 2010
>> What it does:
>> support on nodes:
>> resources_total.resource = value (read-write, can be taken from node)
>> resources_used.resource = value (read-only, counted on server)
>> There are two server attributes that control what resources should be taken
>> from the node reports.
>> resources_to_store: list of resources that should be stored
>> resources_mappings: list of mappings for resources (old=new)
>> For example, if you want to store reported memory (physmem) and store it as
>> pmem resource, you could do this:
>> resources_to-store = physmem
>> resources_mappings = physmem=pmem
> Where is this information stored?
The server attributes? Well, they are server attributes, so they are
stored as server attributes.
Resources are stored as node attributes.
Mgr. Šimon Tóth
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 3366 bytes
Desc: S/MIME Cryptographic Signature
Url : _URL_
More information about the torquedev
| 1.302117
|
openbmb/Ultra-FineWeb
|
How to raise a bulldog puppy?
The pros and cons of the breed, and the benefits and pitfalls of raising a bull dog puppy in the U.S.
A bulldog is a small breed that has a long and proud history of showing up in the wild, as evidenced by its name, "the bulldog."
The breed is widely considered the most intelligent of the dog breeds, and some bulldog breeders are pushing to breed more of the dogs, including ones that are naturally taller and stronger.
A bulldog's temperament is also said to be more like that of a dog than a dog, but the breed has many quirks that are often hard to understand or describe.
A Bulldog's most notable characteristic is the bull's thick coat, which is often the most distinctive feature of the animal.
Its fur is white, and it has a distinctive white stripe down its back and chest.
The fur on the muzzle, nose, and ears is white as well.
Bulldogs can be very stubborn and have a stubborn personality.
The breed's strong-willedness can also lead to the breed becoming aggressive toward humans, especially those who stray too close to the animal and attack it.
A breed that is extremely social is also a breed that will be difficult to train and control.
It can be dangerous for the bulldog to be out of sight and hearing when the owner has to come home to watch over it, and when it is injured or injured badly, the dog will attack and kill the owner.
Bulldog puppies, even if they are born with a bull's coat, are very young.
Bulldog puppies weigh between three and five pounds and are generally kept in large, dark, or barren pens that are surrounded by wire mesh fences.
The animals are also kept in a cage in the dark.
The dogs are fed through a tube into a crate, and they are allowed to roam freely around the pen for hours, and sometimes days at a time.
The bulldog has a short life span, and many of its puppies are born at the same time.
In a bull-pit, the owner feeds them until they are about three to four months old, then they are taken away.
The breeder's primary goal is to keep the dog pure, and not to make it aggressive toward people.
When it comes to temperament, the bull dog is known for being very friendly, and is often a favorite with the children who love them.
The bulldog will be very loyal and obedient.
Bull dogs are known to be very affectionate and loving, and this is especially true of the bulldogs, especially when they have puppies.
In fact, they can even become quite affectionate when they are around their own siblings.
It is the puppies that are more likely to develop an intense bond with the owners, as they are usually older and have more experience.
When a bull puppy is born, the puppy is given a name by its mother.
A baby bulldog may have a different name than the mother.
The name is given to the bull, and often is given the meaning of "beautiful," "cute," or "bright."
In some countries, a bull is called a "golden bulldog," because of its color.
Bull Dogs in the United States are the only breed to be recognized by the American Kennel Club, and most of the American bulldogs have been registered with the U:A, and A:A.A. is the national association of American bulldog trainers and owners.
Bull dog training is a popular topic among people who want to raise their own bulldogs.
People who want their dogs to have good temperaments are also interested in fostering their own puppies.
The American Bulldog Association is also dedicated to helping people get their bulldogs registered with A:B.B. is an acronym for Best Bulldog.
The B stands for breeder, and means that the breeders know about the breed and its history, as well as the breed's current status in the marketplace.
A:The breed was started by a German breeder named Otto H. Loepple.
The Loeppelers were known for producing purebred bulldogs and other dogs.
Their dogs were often named after famous animals, like the French bulldog, the English bulldog and the German bulldog.
B stands by breeders who are interested in breeding their bull dogs.
B:The American Bull Dog Association is the largest and oldest American bull dog breeding association, and was founded in 1973.
It works to ensure the health and welfare of American breeders and the American public through education and training.
The dog was bred for a particular purpose, or specific breed.
The C stands for purebred, and stands for a breed for which there are no purebreds in the market.
The A stands for American bull.
C.1: The breed was registered in the American Bullingist Federation (
| 1.464877
|
m-a-p/FineFineWeb
|
Finding Melvill & Coghill - Clash of Empires Exhibition Artefact Painting By Ethan Burkett, Artist-in-Residence
Offered here is "Finding Melvill & Coghill" Clash of Empires Exhibition Artefact Painting By Ethan Burkett, Artist-in-Residence. The canvas is 13cm x 18cm and executed entirely on-location at the Clash of Empires Exhibition in London, July 2023.
The painting is an artistic interpretation of one of the exhibition's artefacts (pictured with this listing) - featured in Chapter 4 of the exhibition, a chromolithograph: 'The Last Sleep of the Brave' depicts the discovery of the bodies of Lieutenants Melvill and Coghill after iSandlwana. In fact the image is heavily romanticised in accordance with Victorian concepts of death in battle. In reality, Melvill and Coghill had been dead for a fortnight when found, and their bodies were not lying protectively across one another, but a few yards apart - nor were they lying close to the river-bank, but high up on the slope of the valley. The 17th Lancers, depicted in the piece, had not yet arrived in southern Africa, and perhaps most significantly Melvill had lost the Colour when crossing the river and it was discovered in the water, not near the bodies. Furthermore the artist had depicted the Regimental Colour of the 1/24th, rather than the Queen's Colour which Melvill had, in fact, attempted to save.
Ethan will sign and inscribe the painting for the buyer.
All proceeds from the sale of this painting benefit the Clash of Empires Exhibition and the exhibition's host museum/charity, The Royal Philatelic Society London.
About The Artist - A current student at University of Arts London, Ethan Burkett has been immersed in self-directed study of military history for over ten years. Bringing his curious mind, eye for detail and nuance along with considerable artistic skill, Ethan is honoured to be part of the Clash of Empires Exhibition as the Artist-in-Residence.
| 1.046442
|
m-a-p/FineFineWeb
|
Programs
What Is Externalization In Java? Interface, Features & Example
To answer what is externalization In java, we can say it is a common mechanism that is implemented to customize serialization. It is used with the main aspect that the java serialization is not that efficient, so an external customization parameter is used when there are bloated objects that hold multiple properties and attributes.
Check out our free courses to get an edge over the competition
What are Serialisation and Externalisation?
Serialization- It is the mechanism used to compose data of an object into a byte-stream, the process is mainly implemented in RMI, JMS, JPA type of technologies. The other type consists of a mechanism that reverses the function and process of serialization and termed deserialization. The function of serialization as the name depicts is to serialize the objects present in java.
Externalisation- It is defined as the mechanism used to customize the serialization mechanism. The bloatware is not fast and responsive. It generates the need for a good mechanism that is efficient and responsive enough to customize the whole process.
In serialization, the java programming machine responds to the process of writing and reading objects. This is a much-used case scenario as the programmers get levied of the need to worry about the serialization process. In such cases, the default working serialization does not intend to save important credentials like the login ID and the passwords.
Check out upGrad's Advanced Certification in DevOps
Explore Our Software Development Free Courses
But, if the programmers find the need to secure the same credentials, externalization proves its purpose to give the full control over the handling of the data of the reading and writing object of the data during serialization.
Checkout: Popular Java Frameworks
The Externalisable Interface
The interface is implemented when there is a requirement to moderate reading and writing the objects during serialization and deserialization. Thus the need for an object class with the java.io.externalisable interface, helps users and programmers implement their customized code on the objects states by writing in the writeExternal() and read objects in the readExternal() method.
For better ideation let us understand both the methods
Check out upGrad's Full Stack Development Bootcamp (JS/MERN)
readExternal() works when an object takes the input. The contents are restored to the original context by the methods of data Input by calling the write Object method for objects, strings, and arrays.
writeExternal() works when an object takes the input, and the methods of data output save the contents by calling the read Object method for objects, strings, and arrays.
Explore our Popular Software Engineering Courses
Features
Externalization helps to implement the logic control to the application by bypassing the read External and write External methods.
Externalisation proved an effective way for the programmers as they were enabled to create code with their conscience and logic to eliminate the variables during the java object's externalizing.
Externalization methods give complete manual control over the implementation approach, and the object serialization and the inheritance can be implied as well.
Also Read: Java Interview Questions
Example
// interface
import java.io.*;
class Car implements Externalizable {
static int age;
String name;
int year;
public Car()
{
System.out.println("Default Constructor called");
}
Car(String n, int y)
{
this.name = n;
this.year = y;
age = 10;
}
@Override
public void writeExternal(ObjectOutput out)
throws IOException
{
out.writeObject(name);
out.writeInt(age);
out.writeInt(year);
}
@Override
public void readExternal(ObjectInput in)
throws IOException, ClassNotFoundException
{
name = (String)in.readObject();
year = in.readInt();
age = in.readInt();
}
@Override public String toString()
{
return ("Name: " + name + "\n"
+ "Year: " + year + "\n"
+ "Age: " + age);
}
}
public class ExternExample {
public static void main(String[] args)
{
Car car = new Car("Shiney", 1995);
Car newcar = null;
// Serialize the car
try {
FileOutputStream fo
= new FileOutputStream("gfg.txt");
ObjectOutputStream so
= new ObjectOutputStream(fo);
so.writeObject(car);
so.flush();
}
catch (Exception e) {
System.out.println(e);
}
// Deserialize the car
try {
FileInputStream fi
= new FileInputStream("gfg.txt");
ObjectInputStream si
= new ObjectInputStream(fi);
newcar = (Car)si.readObject();
}
catch (Exception e) {
System.out.println(e);
}
System.out.println("The original car is:\n" + car);
System.out.println("The new car is:\n" + newcar);
}
}
Output:
Default Constructor called
The original car is:
Name: Shiney
Year: 1995
Age: 10
The new car is:
Name: Shiney
Year: 1995
Age: 10
In-Demand Software Development Skills
This example is a classic example to depict that when an externalisable object is recreated the instance is triggered with the public no-argument constructor, this tends to summon the readExternal method. So, with the help of an externalisable interface, there would be full control over the java class analogy.
Thus while using externalize it is essential and important that all the field states are in the exact order as they were written.
Also Read: Java Project Ideas & Topics
Learn Software Development Courses online from the World's top Universities. Earn Executive PG Programs, Advanced Certificate Programs, or Masters Programs to fast-track your career.
Read our Popular Articles related to Software Development
Conclusion
So n being asked about what is externalization in java we can say it weighs importance due to the custom serialization it has to offer and gives full control to customize the serialization and also over the implementation approach. readExternal and writeExternal methods are required to be overwritten by the class. It offers much better performance than serialization.
Connect with upGrad to have a better and deeper understanding of java via the Executive PG Program course on full stack development, to enhance the learning curve you can get started by Rs 10,000 and access the online lectures.
What are interfaces in Java?
An interface is one of the types in java which doesn't have any implementation and it is just a group of method signature. This interface can't be created. The reason behind this fact is that these interfaces are just a collection of method signatures. Once we create an interface, we can't keep on adding new method in it. For example, we can't add a method in java.Aspect interface which will help us in modifying the class behavior from outside the class. As this goes against the object-oriented programming principle. In reality interfaces are nothing but java annotations extension. We should use interfaces to keep our code light.
What is externalization in Java?
Externalization is the ability of an object to make its state mutable. Externalization is used in design patterns like Singleton, Factory and Prototype to implement the dependency inversion principle and the Interface Segregation Principle. Externalization is not a built-in feature of Java, but it is possible to add that feature to a class. Externalization is a process of converting an object into a character stream in Java. It is a mechanism that is used for storing objects in files in a binary format. It is used for storage of character data in files as a sequence of bytes. The data can be read in subsequent executions of the Java program.
What are the features of java programming language?
Java is a programming language and computing platform first released by Sun Microsystems in 1995. Multiple updates have been released since then, with the latest version being Java 11. Java was intended to run on any platform that can support the Java virtual machine, hence it is also a programming platform. It can run in an environment with just a browser, but it's most commonly used with various versions of the Java Virtual Machine (JVM) under sets of programs called application programming interfaces or APIs.
Want to share this article?
The best time to learn is now!
Leave a comment
Your email address will not be published. Required fields are marked *
Our Popular Software Engineering Courses
Get Free Consultation
Leave a comment
Your email address will not be published. Required fields are marked *
×
Get Free career counselling from upGrad experts!
Book a session with an industry professional today!
No Thanks
Let's do it
Get Free career counselling from upGrad experts!
Book a Session with an industry professional today!
Let's do it
No Thanks
| 2.266632
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
End User License Agreement of Ethnaudio
The following End User License Agreement ("EULA") represents the contractual conditions between you
("Licensee") and Ethnaudio, Finanskent B142 34432 Eyüp İstanbul/TURKEY("ETHNAUDIO") for the use of
software including related media, documentation (for example program descriptions, manuals) and other
documents and materials manufactured by Ethnaudio("Product(s)").
By installing and by registering the software on your computer, you declare yourself in agreement with
these conditions.
II. Registration / Activation
1. It is required that you register the Licensed Software in order to receive an activation key that enables you to use the Licensed Software on your computer. It is not possible to use Ethnaudio Products that are not activated.
2. The Native Instruments Service Center Software guides you through the activation process.
3. If you want to use your Ethnaudio Product on a different device, or if you make extensive changes to your device, you may need to reactivate your Ethnaudio Product.
III. Scope of Use
The Products from Ethnaudio are protected by law. The intellectual property of the Products remains at
Ethnaudio. Licensee as purchaser of the Product acquires only the right to use Product to the following
extent. Any other use or exploitation not explicitly granted to Licensee in this EULA shall not be allowed
without written consent from Ethnaudio. Specifically, Licensee is not entitled to copy or have copied,
decompile or have decompiled, reverse engineer or have reverse engineered the Product or parts thereof.
Licensee must ensure by appropriate and reasonable steps that third parties, including its own employees,
cannot make unauthorized use of the Product. Licensee shall be liable to Ethnaudio for any loss or damage
in this context.
1. Licensee may install and personally use the licensed software on two devices (e.g. one laptop, one work station), provided that the said software is used only on one device regularly. Simultaneous use on more than one hardware device is not permitted. If the single computer is connected to a multiuser system, this EULA shall apply to all users of the system. In case Licensee changes the hardware, all software on the hardware used must be deleted.
2. Licensee may copy the licensed software, if such reproduction is necessary for the contractually agreed use. Licensee is authorized to create a backup, if this is necessary to secure the future use. _URL_
4. Third Parties
a) Renting or lending the licensed Software to a third party is expressly forbidden. Apart from that and
if not provided otherwise within this EULA, Licensee may leave the software to a third party for a certain amount of time, if the third party agrees to the terms of this EULA and Licensee does not use the software during this period.
5. the EULA (Sound License Agreement):
The provided samples, instruments and presets can be used for commercial or noncommercial music and audio productions without the prior permission from Ethnaudio under the terms of this Sound License Agreement. The usage of this Product (in particular samples, instruments and presets) for the creation of a sound library or as a sound library for any kind of synthesizer, virtual instrument, sample library, samplebased product or other musical instrument is strictly prohibited. Individual samples, sound sets or audio loops may not be distributed (commercially or otherwise) standalone. Furthermore these samples, sound sets or audio may not be repackaged in whole or in part as audio samples, sound libraries or sound effects.
IV. Third Party Rights
Some content included in Ethnaudio software Product, as well as any associated intellectual property rights
and titles, belongs to third parties. This content may be protected by copyright or other intellectual property
laws and treaties, and may be subject to terms and conditions from the third party providing the content.
VII. Closing Provisions
1. If any stipulation of this EULA should be or become invalid, either completely or in part, this shall not affect the validity of the remaining stipulations. The parties undertake instead to replace the invalid stipulation with a valid regulation which comes as close as possible to the purpose originally intended.
2. Ethnaudio is a software product.There is no refunds after you activate your product with the provided license key.This option is regulated due to The 4077 numbered consumer Rights Law. Republic Of Turkish justice system will be the appointed authority on this EULA.
3. This EULA is governed by the laws of the republic of turkey justice system
Should you have any queries concerning this EULA, please write to this address:
Ethnaudio İstanbul/TURKEY
| 1.007802
|
Zyphra/Zyda-2
|
paxil help relieve ibs symptoms - An introduction to irritable bowel syndrome
Irritable Bowel Syndrome (IBS) Remedy Natural IBS Treatment Treat IBS Naturally IBS cure
An introduction to irritable bowel syndrome
Irritable bowel syndrome (IBS) is a very common condition, but in some ways it is still a mystery. There are many different theories about what causes the syndrome, and different doctors will give you different reasons for your illness ' anything from stress to bad bacteria to food intolerance. And once you have been diagnosed, there is no set form of treatment ' instead, sufferers tend to try two or three supplements or therapies to find a combination that works for them.
Bavolex Natural IBS Remedy
irritable bowel syndrome (IBS) natural remedy Natural remedy for Irritable Bowel Syndrome.
Formulated to Help Support:
- Relieve pain and pressure
- Improve digestion
- Stop diarrhea and constipation
- Balance the contractions of intestine muscles
- Stop painful cramps and gas
- Reduce the feelings of stress and anxiety
- Calm down the nervous system
Great Product
IBS Remedy
Zelnorm was developed to help relieve the bloating that occurs with chronic constipation. It is meant to be a short-term treatment and should be monitored by a physician.
If you have not yet been diagnosed with IBS, try to rule out other causes of stomach problems such as eating a new food, nervousness, or stomach flu. Try home treatment for 1 to 2 weeks. If there is no improvement of if your symptoms worsen, make an appointment with your doctor.
There have been breakthroughs with treating these horrible diseases. Medicines have been developed to help treat them. Not all of the treatments such as fiber and laxatives work on everyone who has chronic constipation. There is one medication that works for many people called Zelnorm. It is the first medication of its kind to receive FDA approval.
If you have been diagnosed with IBS and your symptoms get worse and begin to disrupt your usual activities or does not respond to home treatments If you are becoming increasingly fatigued If you are symptoms frequently wake you up at night If your pain gets worse with movement or coughing If you have abdominal pain and fever If you have abdominal pain that does not get better when you pass a stool If you are loosing weight and you don't know why If your appetite has decreased If there is blood in your stool
Abdominal bloating, pain, and gas Mucus in the stool Feeling as if a bowel movement hasn't been completed Irregular bowel habits with constipation, diarrhea, or both The cause of IBS is unknown. Symptoms are thought to be related to abnormal muscle contractions in the intestines. However, when tests are done, they find no changes, such as inflammation or tumors, in the physical structure of the intestine.
If you eat food with a high water content e.g. fruit and vegetables then this will add to your daily water intake as will all foods to some degree. There seems to be a popular school of thought of not to drink water with your meal as it may hamper the digestion process. So you could either drink water before your meal or after your meal. Take care not to overdo the water consumption, spread it out over the day. Drinking too much water in a short space of time is not good for the body; remember you also need to replace salts as well during the day.
Zelnorm is a medical breakthrough that can help millions of people with irritable bowel syndrome and chronic constipation. For those who suffer from these diseases, it is welcome news.
For years, people have suffered the embarrassment of these diseases. Finally, there is relief for them. Although Zelnorm may not be right for everybody, it can help the majority of people that suffer from intestinal disorders. Only a medical doctor can perform the necessary tests to find out if Zelnorm is right for you.
Sometimes patients are given a colonoscopy, where a tiny camera is inserted into the intestines to look for abnormalities. In an IBS sufferer the colonoscopy won't detect any physical signs of disease ' IBS is often called a 'functional' disorder, because it seems to be caused by an alteration in the way the body functions rather than an identifiable cause such as inflammation.
Home Treatment: If constipation is your main symptom Eat more fruits, vegetables, legumes, and whole grains. Add fibre rich food to your diet, but do this slowly so that you do not develop severe cramps Add unprocessed wheat bran to your diet. Start with 15g per day then gradually increase to 60g Try a product that contains a bulk forming agent such as Citrucel, FiberCon, or Metamucil. Start with 15g a day and drink extra water to prevent bloating Use laxatives only if your doctor recomends them. Get active. Increase your physical activity. If diarrhea is your main symptom Try the dietary suggestions for relieving constipation. Fibre rich foods and wheat bran can help reduce diarrhea Avoid foods that make diarrhea worse. Try eliminating one food at a time then add it back into your diet and see if symptoms develop. Many people find the following foods or ingredients make it worse: alcohol caffeine nicotine beans broccoli cabbage apples spicy foods foods high in acid such as citrus fruits fatty foods like bacon, sausage, butter, or oil, dairy products sorbital olestra starchy foods such as bread, rice or potatoes MSG If diarrhea persists a non prescription medication such as lopeamide found in Imodium may help. Check with your doctor if you are using lopeamide more than twice a month. To reduce stress keep a log of the events in your life that seem to trigger your symptoms then try to correct the underlying issues get regular and vigorous exercise When To Call Your Doctor:
IBS is clearly a complicated issue, so here is a basic overview of the symptoms, diagnosis and treatment of this disorder. The symptoms Although the symptoms of IBS vary from person to person, there are several symptoms which are typical of the illness. The most common symptom is either recurring diarrhea or recurring constipation (although some patients also have alternating diarrhea and constipation).
However, this does not mean it is any less real than, say, inflammatory bowel disease, it just means that doctors haven't come up with a proper test for it yet!
Your doctor may prescribe medications for you to take in addition to doing home treatment. There are no tests that can diagnose IBS but your doctor may recommend testing to rule out other possible causes of your symptoms. The amount of testing your doctor will do depends on your age, the pattern, and severity of your symptoms, and your response to initial treatment.
One symptom of bowel dysfunction is constipation. Constipation is the irregular or the incomplete emptying of the bowel. In these days of diet and nutritional awareness, most people would probably increase their fibre intake to remedy a sluggish bowel. Most people are aware that wholemeal bread contains more fibre than white bread. This type of fibre is called insoluble fibre. Whilst reducing the effects of constipation, it is thought that insoluble fibre may irritate the intestinal lining. With this in mind, it may be worth balancing your consumption of bread with eating grains e.g. Porridge oats, which are classified as soluble fibre.
About the author:
Sophie Lee has had IBS for more than 15 years. She runs
Irritable Bowel Syndrome Treatment
_URL_ where you can read
descriptions and reviews of the treatments available for IBS,
from drugs to alternative therapy.
Disclaimer: The information presented here should not be interpreted as or substituted for medical advice. Please talk to a qualified professional for more information about Zelnorm.
100% Natural IBS Remedy
What People Said About Bavolex IBS Cure
"i used to feel like i needed to go to bathroom all the time. doctor did endoscopy of my colon but didn't find anything. he said it's ibs. after a few months of struggling I decided to try bavolex. after a week I felt noticeable relief. two months later I don't have any IBS symptoms at all! thank you for this great product!" Georgia from LA
IBS treatment
Additional symptoms can include stomach pain (sometimes relieved by a bowel movement), bloating, nausea and a lot of gas. These symptoms generally go away for a short time before returning again, as IBS can work in cycles. Sufferers may experience a few weeks or even a few months of good health before the symptoms come back.
One thing to point out is to avoid becoming dependent on laxatives. They may offer short term relief from constipation, but the theory is that in the longer term you're encouraging your bowel to become lazy. I was talking to my Medical Doctor this week about laxatives and she said that the over the counter medicines can be aggressive on the digestive whereas some of the prescription laxatives may be milder. As ever what affects one person in one way may not affect another in the same way.
Prevention: There is no way to prevent IBS. However symptoms often worsen or improve because of changes in your diet, your stress level, your
| 1.495151
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Hello,All,
I have concern about objects name and interesting know about how it is working
Let assume I have a bean of user information AND I am creating new object (new user) from servlet User user=new User(...)
but object name is the same for per request,so what will happen If at the same time two object with the same name created is Data overwritten?
And if other code start to manipulating an object, Is it separating true object
Does exist a method to avoid concurrency?
| 1.491831
|
openbmb/Ultra-FineWeb
|
ji, he left a group of capable officers who could complete his task. Many of them, including Aibak and Iltutmish, who later became rulers of India, were slaves, a reminder of the important place well-trained and loyal slaves had in the early Muslim dynasties. Brought from all over Central Asia, often members of ruling families that had been defeated, they provided generals and [[41]] governors who were often more trustworthy than sons or other relatives.
Causes of Muslim Success
The sweeping victories won by Muhammad Ghuri and his generals at the end of the twelfth century tend to give the impression that the conquest of North India was an easy and uninterrupted process. That this was not the case is shown by the reverses suffered by Ghuri himself as well as by the strong counteroffensives mounted by individual Hindu rulers. The most important factor in the success of the Muslims at this time was probably the quality of the rank and file and of their commanders. Not only were Muslim commanders able to wipe out the effects of various setbacks, but they showed superior generalship against heavy odds in victories such as that at Tarain. They were able also to exploit their limited resources to the fullest possible advantage by adopting the most suitable tactics, such as the feigned withdrawal of Ghuri at Tarain and the shock of a sudden surprise at Nadiya by Muhammad bin Bakhtiyar. Another factor which materially contributed to Muslim success was superior horsemanship, and in fact the victories of Muslims over much larger Hindu armies may be considered the victory of the horse over the slow-moving elephant.
Other factors also contributed to Muslim success. They were always on the offensive and had the advantage of greater initiative and selectivity. Fighting hundreds of miles away from their homes, they had to fight desperately, as they had no easy means of escape. Religious ardor must also have acted as a spur to their fighting qualities. The soldiers were not confined to one class, as was generally the case with Indian armies, but contained picked and zealous soldiers from all classes and even different ethnic groups, such as the Turks, Tajiks, Khaljis, and Afghans.
While these factors were responsible for the speedy conquest of northern India, the consolidation of Muslim rule owed not a little to another event which was a tragedy for the Muslim countries of central and western Asia. This was the Mongol invasion, which drove [[42]] large numbers of refugees, amongst whom were princes, chiefs, soldiers, scholars, and saints, to Muslim India. Thus a vast reservoir of manpower became available to the new government at Delhi, and these people, having suffered so much, did not spare themselves in making India a "Citadel of Islam."
Organization of the Delhi Government
After Muhammad Ghuri's assassination in 1206 the control of his Indian possessions passed to his slave Qutb-ud-din Aibak, while the rest of his empire became the scene of a struggle between various claimants for power. This meant, in effect, that henceforth the Indian provinces of the Ghuri dynasty were independent; Aibak may thus be reckoned the first independent Muslim ruler of northern India, the founder of the Delhi Sultanate. He had been bought as a young man by the qazi of Nishapur who, recognizing his ability, gave him a good education. After the qazi's death he was sold to Muhammad Ghuri, under whom he served as a commander, and when Ghuri returned to Ghazni as sultan, Aibak remained as viceroy of his Indian province. In the inevitable confusion that followed the sultan's death, Aibak had himself crowned at Lahore, and although he acknowledged the supremacy of the new ruler at Ghuri, he himself was given the title of sultan, and was virtually independent. A source of perplexity for later jurists in connection with this assumption of power was that Aibak's formal manumission from slavery did not take place until 1208; yet under Islamic law an unmanumitted slave could not be a ruler. In any case, his own successors for the next ninety years were originally either slaves or descendants of slaves.
Aibak's main work had been accomplished as the deputy of Sultan Muhammad Ghuri. After his accession to the throne he made no new conquests but consolidated the Muslim dominion by following a policy of conciliation and open-handed generosity which earned him the title of lakhbakhsh, or " the giver of lakhs." Aside from this, he commenced building two magnificent mosques at Delhi and Ajmer. He was evidently a patron of letters, for two historians, Hasan Nizami and Fakhr-i-Mudabbir, dedicated their works to him. His career was cut short by early death in 1211 as the result of a polo accident. [[43]] Aibak's son succeeded him, but the Delhi nobles soon replaced him by Shams-ud-din Iltutmish, Aibak's son-in-law. The new ruler was faced with a very difficult task, for not only was Muslim rule in India far from consolidated, but powerful military leaders in Bengal, Punjab, and Multan challenged his authority. Yildiz, the ruler of Ghazni, laid claim as Muhammad Ghuri's successor to suzerainty over all the latter's Indian conquests. The Hindu chiefs had by now recovered from the stunning effects of Muslim victories and were winning back many of the strongholds originally conquered by the Muslims. Kalinjar had been recovered as early as 1206, and in course of time Jalor, Ranthambhor, Gwalior, and even Badaun, where Iltutmish held his last post before accession to the throne, were lost to the Muslims. In Oudh and the Doab the situation was even worse, and Minhaj-us-Siraj speaks of a Hindu chief named Bartu "beneath whose sword above a hundred and twenty thousand Musalmans had attained martyrdom."/1/
Iltutmish, trained in the traditions of Ghuri and Aibak, moved slowly against his host of enemies. He first consolidated his authority in the areas of Delhi, Badaun, Oudh, and Benares, and then dealt with his Muslim opponents one by one. In 1216 he defeated and captured Yildiz who, after his expulsion from Ghazni by the Khwarizmshahis, had occupied Lahore. In 1225 he turned his attention to Bengal and forced the local ruler to abandon his royal title, acknowledge the authority of Delhi, and pay regular tribute. After this he dealt with Nasir-ud-din Qabacha, the powerful and popular ruler of Sind and western Punjab. On February 9, 1228, he arrived at Uch, Qabacha's capital, and opened siege. Uch surrendered on May 4, and a few days later Qabacha, who had moved to the island fortress of Bhakkar (situated between modern Sukkur and Rohri), found a watery grave in the Indus.
Mongol Invasions
An important development of Iltutmish's reign which had indirect but far-reaching consequences for the new empire was the rise of the [[44]] Mongols under Chingiz and Hulagu, and their "dance of death" in central and western Asia. The Mongol invasion, the greatest blow which the Muslim world ever suffered, is the dividing point of Islamic history. The modern evaluation of the Mongol advance as a catastrophe for Islam was shared by contemporaries, one of whom, the historian Ibn-ul-Athir, called it, "the death blow of Islam and the Muslims." Beginning in 1219 with Chingiz Khan's invasion of Transoxiana, it brought destruction to large cultivated areas, ruin to libraries and madrasas, and endless slaughter to men, women, and children. It culminated in the sack of Baghdad, and the end of the Abbasid caliphate at the hands of Hulagu Khan in 1258. A quotation from E. G. Browne summarizes the extent of the catastrophe: "In its suddenness, its devastating destruction, its appalling ferocity, its passionless and purposeless cruelty, its irresistible though short-lived violence, this outburst of savage nomads hitherto hardly known by name even to their neighbors, resembles rather some brute cataclysm of the blind forces of nature than a phenomenon of human history. The details of massacre, outrage, spoliation, and destruction wrought by these hateful hordes of barbarians who, in the space of a few years, swept the world from Japan to Germany would … be incredible were they not confirmed from so many different quarters."/2/ That India was spared the full force of invasion can be attributed in large part to the vigilance and resourcefulness of the Delhi sultans.
Iltutmish's government first felt the impact of the gigantic military movement when Jalal-ud-din, the ruler of Khwarizm, whose father had attracted the wrath of Chingiz Khan, crossed the border with 10,000 men and sought aid from Iltutmish. Realizing the peril of getting embroiled in a dispute with the Mongol chief, Iltutmish gave skillfully evasive replies, and thus averted the danger of the Indian subcontinent being involved in the first onrush of the Mongol invasion. But the Mongols continued to move toward the subcontinent, and in 1241, during the chaos following Iltutmish's death, they destroyed Lahore. They remained entrenched on the frontier for several years, and for nearly half a century the principal preoccupation
| 1.728359
|
Zyphra/Zyda-2
|
and diethylene glycol monomethyl ether on hepatic metabolizing enzymes.
Science.gov (United States)
Kawamoto, T; Matsuno, K; Kayama, F; Hirai, M; Arashidani, K; Yoshikawa, M; Kodama, Y
1990-06-01
Glycol ethers have been extensively used in industry over the past 40-50 years. Numerous studies on the toxicity of glycol ethers have been performed, however, the effects of glycol ethers on the hepatic drug metabolizing enzymes are still unknown. We studied the changes of the putative metabolic enzymes, that is, the hepatic microsomal mixed function oxidase system and cytosolic alcohol dehydrogenase, by the oral administration of diEGME and EGME. Adult male Wistar rats were used. DiEGME was administered orally; 500, 1000, 2000 mg/kg for 1, 2, 5 or 20 days and EGME was 100, 300 mg/kg for 1, 2, 5 or 20 days. Decreases in liver weights were produced by highest doses of diEGME (2000 mg/kg body wt/day for 20 days) and EGME (300 mg/kg body wt/day for 20 days). DiEGME increased hepatic microsomal protein contents and induced cytochrome P-450, but not cytochrome b5 or NADPH-cytochrome c reductase. The activity of cytosolic ADH was not affected by diEGME administration. On the other hand, EGME did not change cytochrome P-450, cytochrome b5 or NADPH-cytochrome c reductase. The activity of cytosolic ADH was increased by repeated EGME treatment. Therefore it is suspected that the enzyme which takes part in the metabolism of diEGME is different from that of EGME, although diEGME is a structural homologue of EGME.
19. Formulating liquid ethers for microtubular SOFCs
Science.gov (United States)
Kendall, Kevin; Slinn, Matthew; Preece, John
One of the key problems of applying solid oxide fuel cells (SOFCs) in transportation is that conventional fuels like kerosene and diesel do not operate directly in SOFCs without prereforming to hydrogen and carbon monoxide which can be handled by the nickel cermet anode. SOFCs can internally reform certain hydrocarbon molecules such as methanol and methane. However, other liquid fuels usable in petrol or diesel internal combustion engines (ICEs) have not easily been reformable directly on the anode. This paper describes a search for liquid fuels which can be mixed with petrol or diesel and also injected directly into an SOFC without destroying the nickel anode. When fuel molecules such as octane are injected onto the conventional nickel/yttria stabilised zirconia (Ni/YSZ) SOFC fuel electrode, the anode rapidly becomes blocked by carbon deposition and the cell power drops to near zero in minutes. This degeneration of the anode can be inhibited by injection of air or water into the anode or by some upstream reforming just before entry to the SOFC. Some smaller molecules such as methane, methanol and methanoic acid produce a slight tendency to carbon deposition but not sufficient to prevent long term operation. In this project we have investigated a large number of molecules and now found that some liquid ethers do not significantly damage the anode when directly injected. These molecules and formulations with other components have been evaluated in this study. The theory put forward in this paper is that carbon-carbon bonds in the fuel are the main reason for anode damage. By testing a number of fuels without such bonds, particularly liquid ethers such as methyl formate and dimethoxy methane, it has been shown that SOFCs can run without substantial carbon formation. The proposal is that conventional fuels can be doped with these molecules to allow hybrid operation of an ICE/SOFC device.
20. Toltrazuril sulfone sodium salt: synthesis, analytical detection, and pharmacokinetics in the horse.
Science.gov (United States)
Dirikolu, L; Karpiesiuk, W; Lehner, A F; Tobin, T
2012-06-01
Toltrazuril sulfone (ponazuril) is a triazine-based antiprotozoal agent with clinical application in the treatment of equine protozoal myeloencephalomyelitis (EPM). In this study, we synthesized and determined the bioavailability of a sodium salt formulation of toltrazuril sulfone that can be used for the treatment and prophylaxis of EPM in horses. Toltrazuril sulfone sodium salt was rapidly absorbed, with a mean peak plasma concentration of 2400 ± 169 (SEM) ng/mL occurring at 8 h after oral-mucosal dosing and was about 56% bioavailable compared with the i.v. administration of toltrazuril sulfone in dimethylsulfoxide (DMSO). The relative bioavailability of toltrazuril sulfone suspended in water compared with toltrazuril sulfone sodium salt was 46%, indicating approximately 54% less oral bioavailability of this compound suspended in water. In this study, we also investigated whether this salt formulation of toltrazuril sulfone can be used as a feed additive formulation without significant reduction in oral bioavailability. Our results indicated that toltrazuril sulfone sodium salt is relatively well absorbed when administered with feed with a mean oral bioavailability of 52%. Based on these data, repeated oral administration of toltrazuril sulfone sodium salt with or without feed will yield effective plasma and cerebrospinal fluid (CSF) concentrations of toltrazuril sulfone for the treatment and prophylaxis of EPM and other protozoal diseases of horses and other species. As such, toltrazuril sulfone sodium salt has the potential to be used as feed additive formulations for both the treatment and prophylaxis of EPM and various other apicomplexan diseases. © 2011 Blackwell Publishing Ltd.
1. Sulfonation of the resolving cysteine in human peroxiredoxin 1: A comprehensive analysis by mass spectrometry.
Science.gov (United States)
Wu, Changgong; Dai, Huacheng; Yan, Lin; Liu, Tong; Cui, Chuanglong; Chen, Tong; Li, Hong
2017-07-01
Peroxiredoxin 1 (Prx1) is an essential peroxidase that reduces cellular peroxides. It holds 2 indispensable cysteines for its activity: a peroxidatic cysteine (C P ) for peroxide reduction and a resolving cysteine (C R ) for C P regeneration. C P can be readily sulfonated to C P -SO 3 H by protracted oxidative stress, which inactivates Prx1 as a peroxidase. By comparison, sulfonation of C R to C R -SO 3 H in mammalian cells has only been reported once. The rare report of C R sulfonation prompts the following questions: "can C R -SO 3 H be detected more readily with the current high sensitivity mass spectrometers (MS)?" and "do C P and C R have distinct propensities to sulfonation?" Answers to these questions could shed light on how differential sulfonation of C P and C R regulates Prx1 functions in cells. We used a sensitive Orbitrap MS to analyze both basal and H 2 O 2 -induced sulfonation of C R and C P in either recombinant human Prx1 (rPrx1) or HeLa cell Prx1 (cPrx1). In the Orbitrap MS, we optimized both collision-induced dissociation and higher-energy collisional dissociation methods to improve the analytical sensitivity of cysteine sulfonation. In the basal states without added H 2 O 2 , both C P and C R were partially sulfonated in either rPrx1 or cPrx1. Still, exogenous H 2 O 2 heightened the sulfonation levels of both C P and C R by ~200-700%. Titration with H 2 O 2 revealed that C P and C R possessed distinct propensities to sulfonation. This surprising discovery of prevalent Prx1 C R sulfonation affords a motivation for future investigation of its precise functions in cellular stress response. Copyright © 2017 Elsevier Inc. All rights reserved.
2. New borohydride anion B6H7-
International Nuclear Information System (INIS)
Kuznetsov, I.Yu.; Vinitskij, D.M.; Solntsev, K.A.
1985-01-01
The [Ni(Bipy) 3 ] (B 6 H 7 ) 2 , (Ph 4 P)B 6 H 7 , [Ni(Phen) 3 ](B 6 H 7 ) 2 crystals (where Bipy = bipyridine, Phen = phenathroline, Ph = phenyl) are obtained via the exchange reaction with a subsequent rec
| 1.353607
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Resettlement guidelines formulated by funders, governments and international treaties have achieved only limited success in reversing these negative consequences. Not all private sector funders or governments respect guidelines. Neither international law nor national legal systems make adequate provision for 'development oustees'. Poorly informed and planned, non-consultative and badly implemented resettlement projects continue to result in impoverishment and social disruption and provoke resistance.
In order to inform policy making, the Refugee Studies Centre undertook a four-year (_PHONE_) development-induced displacement and resettlement (DIDR) research project funded by the UK's Department for International Development. Systematic literature surveys were undertaken of published and unpublished sources, including academic research, international funding agencies' resettlement guidelines, national and state resettlement policies, relevant international treaties and legal cases and literature from NGOs and social movements. Interviews were also conducted with a range of academics, officials, implementing agents, NGOs and activists in Brazil, Canada, India, Switzerland, Uganda and the USA.
Brief summaries of the main findings and policy implications of the four desk studies undertaken by the project are given below.
Addressing policy constraints and improving outcomes in DIDR projects
by Alan Rew, Eleanor Fisher and Balaji Pandey
The extent and the negative consequences of DIDR indicate serious policy failures with implications for the scope and limits of development policies and their implementation. Explanations of DIDR's dismal record typically appeal to the absence of national legal and policy frameworks and political will to redress the needs of the displaced. The nature of 'the DIDR problem' is more fundamental, as it is inherent in the institutional process of resettlement and rehabilitation itself. Implementation is inherently problematic. Almost always an 'implementation deficit' obstructs the hypothetical smooth translation of policy into action as policy gets transformed by the very process of implementation.
The normative frameworks formulated by high level policy makers do not necessarily involve clear policy goals for they have to be broad enough to reconcile divergent and even contradictory political positions. This paves the way for differing interpretations of policy further down the bureaucratic hierarchy.
Resettlement and rehabilitation policies are coordinated and implemented at the level of government departments and district administration. There are weaknesses in the chains of communication and decision making due to work pressures, insufficient capacity and problems of coordination between agencies. Though resettlement officers cope as best they can, the result is invariably the development of ad hoc institutional arrangements. Local officials exercise considerable discretion as they develop operational routines. This allows for cutting corners and corruption. For the affected population, the local resettlement officer is the government; his or her decisions are policy. Implementation takes on a life of its own.
At the national level, policy reform requires greater clarity and specification of goals as well as the development and enforcement of a coherent vision and framework of DIDR policy issues around human rights, sustainable development and poverty elimination. This framework should incorporate perspectives of affected people. Donors could facilitate the reform process by paying closer attention to the way rights and entitlements are safeguarded in major development projects.
Lines of authority and responsibility need to be clarified between central, state or provincial and local governments, as well as between government and the private sector interests which are increasingly becoming involved in DIDR projects. At the ground level, the discretion exercised by local officials could be kept in check by monitoring by civil society groups and NGOS - which would require a financial and political commitment by government to the institutions of civil society.
Addressing legal constraints and improving outcomes in DIDR Projects
by Michael Barutciski
Neither the areas of international law that address forced migration (ie refugee and humanitarian law) nor formulations concerning IDPs offer much protection to people displaced by DIDR projects. DIDR occurs in the name of an ostensibly greater good. The government causing the displacement is also responsible for ensuring the protection of the people it has displaced. International treaties (such as the International Covenant on Economic, Social and Cultural Rights) offer only limited protection to DIDR displacees. Not many countries have incorporated these provisions into their national legal systems, and states have considerable discretion in determining the nature of consultation and participation regarding affected people.
European Community aid grants stipulate that the recipient state should uphold the human rights provisions of the Fourth Lome Convention. However, enforcement remains problematic, as evidenced by the eviction of tens of thousands of people from the Kibale Game Corridor in Uganda, in violation of Lome IV provisions.
Perhaps the most promising development at the international level has been the'soft law' of the resettlement guidelines drawn up by international funders which make loans dependent upon borrower countries respecting the rights of those to be displaced. Foremost among these is the World Bank's guidelines on resettlement (1) which require consultation with the affected people, and their planned resettlement, compensation and rehabilitation. However, even with a body as powerful as the World Bank, the fundamental problem remains one of enforcement. The fact that the World Bank has an explicitly non-political mandate means that it may lack the means effectively to confront governments which ignore its guidelines.
At issue is respect for the rights of DIDR displacees. These rights are frequently abused because of a problematic internal relationship between states and individual citizens. International law recognises that states should be allowed to solve their internal problems by themselves, and is unlikely to sanction intervention in DIDR projects which are ostensibly in the national interest.
Effective legal action at international level requires mechanisms which allow for individual complaints and which create sufficient pressure to ensure respect for basic norms. The World Bank's Inspection Panel is the first forum where private parties can hold an international organisation accountable. The effectiveness of such mechanisms depends on the preparedness of international organisations to jeopardise economic projects in the interests of human rights. This may depend on public pressure and the acceptance that human rights make good economic as well as moral sense.
However, their essentially non-political mandates limit the extent to which financial institutions can link loans to human rights. Governments making loans and providing aid are able to take open political stands and to push for such conditionalities. An international alliance of funding and other institutions would provide for greater authority and enforceability. The European Parliament's call for internationally accepted monitoring mechanisms is a positive step in this regard. Public pressure and access to legal procedure increases participation and accountability, and government agencies such as DFID could also consider further support for NGOs and pressure groups providing human rights and legal support to those in danger of displacement.
Toward local level development and mitigating impoverishment in DIDR
by Dolores Koenig (2)
Recent attempts to understand why resettlement outcomes have not shown anticipated improvements have been inadequate because they have focused on the economic aspect, neglecting the political. They have concentrated on the resettled communities themselves, neglecting their relationship to their wider regional and national systems. Cernea's risks and reconstruction model has been extremely useful in identifying the risks inherent in resettlement (3) and in suggesting ways to deal with these risks so as to reconstitute economic livelihoods and socio-cultural systems. It has, however, been less effective at addressing such political aspects of DIDR as differences in power among people in affected communities, the human rights of the displaced, their local autonomy and control, and their ability to affect their interactions with national institutions – all of which are integral to sustainable development. Resettlement impoverishes people by taking away their political power, notably to decide how and where to live. It disrupts the control that a local social group has over its social institutions, and increases their political marginalisation. People lose resources (ie become impoverished) because they lack the cultural, economic, political and social capital to make their claims and rights heard effectively.
The fact that the state often serves as both implementer and referee in resettlement situations puts it in a powerful position. However reluctantly, states do respond to pressures. The question becomes one of how to integrate resettled people into their national political and economic systems so that they can put pressure on their governments and increasingly participate as equal citizens.
Key constraints on resettlement projects failing to achieve their goals include:
- weak, authoritarian and uncommitted implementing institutions lacking a clear mandate, organisational capacity and sociological skills to oversee resettlement
- the complexities inherent in the resettlement process - with which weak implementing institutions are even less able to deal
- resistance, which may even further compromise project capacity
This study argues that the best way to address such constraints is via a more democratic, participatory approach to project planning and implementation. Effective participation involves the ability to influence decisions and proceedings throughout the project. This in turn requires: i) a free flow of information at all stages, ii) a clear set of operating rules that are understood and adhered to by all parties and iii) all parties having the skills to operate on equal terms in an open-ended negotiation process where the outcomes emerge from the process. While risky, this approach yields returns, as genuine participation helps secure consensus, reduces conflicts and delays, and makes for more realistic planning and goals.
Many projects have failed because they have not been flexible enough to adapt to differing needs or unexpected developments. Care must be taken to provide a wide range of resettlement and compensation options, designed to take account of the diversity of constituencies within a resettled 'community'. Project officials also need to be recruited from a range of backgrounds, so as to provide a wide bank of skills and experience to deal with anything that may come up. Project flexibility also requires more generous funding: World Bank evidence shows that well-funded projects were essentially free of major problems.
Resettlement is an inherently complex process. While a participatory, flexible and open-ended approach to planning and implementation may appear risky and expensive at the outset, any other approach seems almost certain to fail, and in the end to be much more costly overall.
Displacement, resistance and the critique of development: from the grassroots to the global
by
| 1.768247
|
openbmb/Ultra-FineWeb
|
Flag It (Vocabulary) Poster & 30 bookmarks
Grades K - 5. Build vocabulary during reading time. Good readers acknowledge words they do not know and do what it takes to find the meaning so they can continue reading. Classroom poster is great for guided reading. Independent readers use one of 30 bookmarks and clips to mark the location of the challenging word.
| 2.04268
|
HuggingFaceFW/fineweb-edu
|
been flagged for cardiac, movement, apnea or other artifacts. Note that fiducial data includes fiducials, mathematical combinations of fiducials or a function of one or more fiducials such as a fuzzy logic decision matrix.
The Real-Time Data and Historical Fiducial Variables block incorporates all the information content of the Historical Fiducial Variables block and also includes real-time bio-Z data.
The Default Algorithm block represents one or more pre-set trigger algorithms pre-programmed into the INS or physician programmer. The default algorithm used at a specific point in time while delivering therapy may be selected from a library of pre-set algorithms. The selection of the algorithm can be made automatically by the INS based on: patient sleep position (position sensor), heart rate (detectable through the impedance measuring system) or respiration rate. Clinical evidence supports that the algorithm used to predict the onset of inspiration may be dependant on sleep position, sleep state or other detectable conditions of the patient.
The Modify Algorithm block represents the process of modifying the Default Algorithm based on historical data to yield the Current Algorithm. Once the calibration of Estimated Onset to Onset is resident in the device memory it can be used to calculate Estimated Onset for past respiratory cycles from Fiducial Variables. The variable used to represent the Estimated Onset will be TEST or TEST(i) where the "i" indicates the cycle number. Note that Estimated Onset is calculated for past respiratory cycles. This means that sensor fiducial variables which either proceed or follow each Onset event may be used to calculate the Estimated Onset.
The Current Algorithm block represents the process of using the Modified Default Algorithm to predict the next inspiratory onset (Predicted Onset). The Predicted Onset for the next respiratory cycle may be calculated from real-time data and historical fiducial variables. The calculation may be based on the Modified Default Algorithm. Modification of the Modified Default Algorithm to derive the Current Algorithm may be dependent on the calibration of Estimated Onset to Onset which was input from the physician programmer and may be based on comparison of real-time bio-Z data to data collected during a PSG titration study. The Current Algorithm may use historic and/or real-time sensor fiducial variables to predict the next onset of inspiration. This predicted onset of inspiration may be referred to as Predicted Onset. The variable used to represent Predicted Onset may be TPRED or TPRED(i) where the "i" indicates the respiratory cycle.
The Stimulation Trigger Signal block represents the Current Algorithm generating a trigger signal which the device uses to trigger stimulation to the hypoglossal nerve.
FIG. 49 is a table of some (not all) examples of waveform fiducials which can be extracted from each respiratory cycle waveform. For each fiducial there is a magnitude value and a time of occurrence. Each waveform has a set of fiducials associated with it. As a result, fiducials may be stored in the device memory for any reasonable number of past respiratory cycles. The values from past respiratory cycles which are stored in device memory are referred to as Historical Fiducial Variables.
The graphs illustrated in FIG. 50 are examples of fiducials marked on bio-Z waveforms. The first of the three graphs illustrate the bio-impedance signal after it has been filtered and cleared of cardiac and motion artifacts. The first graph will be referred to as the primary signal. The second graph is the first derivative of the primary signal and the third graph is the second derivative of the primary signal. Each graph also displays a square wave signal which is derived from airflow pressure. The square wave is low during inspiration. The falling edge of the square wave is onset of inspiration.
Due to the fact that it may be difficult to identify onset of inspiration in real-time from respiratory bio-impedance, a goal is to construct an algorithm which can reliably predict onset of inspiration "T" for the next respiratory cycle from information available from the current and/or previous cycles. A reliable, distinct and known reference point occurring prior to onset of inspiration, "T", is "A", the peak of the primary signal in the current cycle. As can be seen in FIG. 50, the upper peak of the bio-Z waveform "A" approximately corresponds to the onset of expiration "O". A dependent variable tT-PK is created to represent the period of time between the positive peak of the primary signal for the current cycle, t.Vmax(n), indicated by "An" on the graph, and onset of inspiration for the next cycle, t.onset(n+1), indicated by "T" on the graph. The variable tT-PK may be defined as:
t T-PK =t.onset(n+1)−t.Vmax(n)
Note that t.Vmax could be replaced by any other suitable fiducial in defining a dependent variable for predicting onset.
A general model for a predictive algorithm may be of the following form:
t T-PK =f(fiducials extracted from current and/or previous cycles)
A less general model would be to use a function which is a linear combination of Fiducial Variables and Real-Time Data.
The following fiducials may be both highly statistically significant and practically significant in estimating T:
t.Vmax(n)=the time where positive peak occurs for the current cycle;
t.dV.in(n)=the time of most positive 1st derivative during inspiration for the current cycle; and
t.Vmax(n−1)=the time of positive peak for the previous cycle.
This model can be further simplified by combining the variables as follows:
Δt.pk(n)=t.Vmax(n)−t.Vmax(n−1)
Δt.in(n)=t.Vmax(n)−t.dV.in(n)
Either Δt.pk(n) or Δt.in(n) is a good predictor of Onset.
The following example uses Δt.pk(n). The time from a positive peak until the next inspiration onset can be estimated by:
T pred =t.Vmax(n)+k0+k1*Δt.pk(n)
The coefficients k0 and k1 would be constantly modified by optimizing the following equation for recent historical respiratory cycles against Test:
T est =t.Vmax(n)+k0+k1*Δt.pk(n)
Thus, the predictive trigger time Tpred may be determined by adding tT-PK to the time of the most recent peak (PK) of the bio-Z signal, where:
t T-PK =k0+k1*Δt.pk(n)
The predictive equation we are proposing is based on the fact that the very most recent cycle times should be negatively weighted. Regression analysis supports this approach and indicates a negative weighting is appropriate for accurate prediction of onset. Thus, predicting onset is more effective if the most recent historical cycle time is incorporated into an algorithm with a negative coefficient.
Description of External (Partially Implanted) System
With reference to FIGS. 51A and 51B, an example of an external neurostimulator system inductively coupled to an internal/implanted receiver is shown schematically. The system includes internal/implanted components comprising a receiver coil 910, a stimulator lead 60 (including lead body 62, proximal connector and distal nerve electrode 64). Any of the stimulation lead designs and external sensor designs described in more detail herein may be employed in this generically illustrated system, with modifications to position, orientation, arrangement, integration, etc. made as dictated by the particular embodiment employed. The system also includes external components comprising a transmit coil 912 (inductively linked to receiver coil 910 when in use), an external neurostimulator or external pulse generator 920 (ENS or EPG), and one or more external respiratory sensors 916/918.
As illustrated, the receiver coil 910 is implanted in a subcutaneous pocket in the pectoral region and the stimulation lead body 62 is tunneled subcutaneously along the platysma in the neck region. The nerve electrode 64 is attached to the hypoglossal nerve in the submandibular region.
The transmitter coil 912 may be held in close proximity to the receiver coil 910 by any suitable means such as an adhesive patch, a belt or strap, or an article of clothing (e.g., shirt, vest, brazier, etc.) donned by the patient. For purposes of illustration, the transmitter coil 912 is shown carried by a t-shirt 915, which also serves to carry the ENS 920 and respiratory sensor(s) 916, 918. The ENS 920 may be positioned adjacent the waist or abdomen away from the ribs to avoid discomfort while sleeping. The respiratory sensor(s) 916, 918 may be positioned as a function of the parameter being measured, and in this embodiment, the sensors are positioned to measure abdominal and thoracic/chest expansion which are indicative of respiratory effort, a surrogate measure for respiration. The external components may be interconnected by cables 914 carried by the shirt or by wireless means. The shirt may incorporate recloseable pockets for the external components and the components may be disconnected from the cables such that the reusable components may be removed from the garment
| 2.0527
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Utilizing measurements on a lanthano-aluminosilicate core optical fiber, the specific effects of lanthana (La2O3) on the Brillouin characteristics of silica-based oxide glass optical fibers are described. Lanthana is an interesting species to investigate since it possesses a wide transparency window covering the common fiber laser and telecom system wavelengths. As might be expected, it is found that the properties of lanthana are very similar to those of ytterbia (Yb2O3), namely, low acoustic velocity, wide Brillouin spectral width, and a negative photoelastic constant, with the latter two properties affording significant reductions to the Brillouin gain coefficient. However, lanthana possesses thermo-acoustic and strain-acoustic coefficients (acoustic velocity versus temperature or strain, TAC and SAC, respectively) with signs that are opposed to those of ytterbia. The lanthanoaluminosilicate (SAL) fiber utilized in this study is Brillouin-athermal (no dependence of the Brillouin frequency on temperature), but not atensic (is dependent upon the strain), which is believed to be, to the best of our knowledge, the first demonstration of such a glass fiber utilizing a compositional engineering approach.
ASJC Scopus subject areas
- Atomic and Molecular Physics, and Optics
- Engineering (miscellaneous)
- Electrical and Electronic Engineering
| 1.662131
|
openbmb/Ultra-FineWeb
|
A Tale of Two Cities is Charles Dickens's great historical novel, set against the violent upheaval of the French Revolution. The most famous and perhaps the most popular of his works, it compresses an event of immense complexity to the scale of a family history, with a cast of characters that includes a bloodthirsty ogress and an antihero as believably flawed as any in modern fiction. Though the least typical of the author's novels, A Tale of Two Cities still underscores many of his enduring themes—imprisonment, injustice, social anarchy, resurrection, and the renunciation that fosters renewal.
Used. Paperback. Good condition. Some wear and tear. High shelf wear to the bottom of the book. High damage to the spine of the book. Minor damage to the spine and corners of the book. Price sticker on the back from Borders.
| 1.034364
|
m-a-p/FineFineWeb
|
Rodrigo de Toledo is a Brazilian-American artist, who creates cross-media blends of digital imaging, writing, painting, installation, and animation, and works inspired by personal experience, ancient symbolism, and mass media. His whimsical imaginary world has been exhibited around the globe, in museums, galleries and festivals, on animated, interactive, and printed media.
Influenced by religious archetypes, cartoon and comics characters, contemporary and pop art, and psychology, he employs a surreal pop visual style, to explore questions of identity and spirituality, and the media effect in personal memory and fantasy. In the past decade, Rodrigo has focused on the design of a personal mythology, and its corresponding visual iconography, a kind of inner research that he describes as psycho-archeology.
Rodrigo is a Brazilian-American visual artist, designer and educator, born in Rio de Janeiro, Brazil. Rodrigo started his painting education in 1981 at the Museum of Modern Art, and Parque Lage School of Visual Arts, in Rio de Janeiro. He also studied music composition for two years, and video-art, and followed with the degrees: Computer Science Associate (ORT Institute of Technology, Rio de Janeiro, 1987), Bachelor in Industrial Design/Graphic Design (Faculdade da Cidade, Rio de Janeiro, 1992), and Master of Fine Arts, emphasis in Art and Technology (School of the Art Institute of Chicago, 1995).
Rodrigo's contemporary art production encompasses an imaginative blend of digital imaging, writing, painting, interactive art and animation. Rodrigo's work has been awarded and widely exhibited in art galleries, museums, publications, and festivals worldwide. A pioneer in the digital arts, since 1987, when he found his digital animation studio, Animagraph, in Rio, and where he worked until 1993. In 1995, Rodrigo joined NASA Ames Research Center's Educational Multimedia Research & Development Group as an Art Director, in the Silicon Valley. Where he developed interactive learning projects and technologies for space science education, until 1999. Rodrigo's innovative work for NASA was greatly awarded. In 2002, after working for various tech industry clients, as an experience design consultant in San Francisco, he joined Northern Arizona University (NAU), USA, as a Professor of Visual Communication. Rodrigo continues to teach and research at NAU. His teaching is focused on motion design, and animation, fictional world design, and experience design. His ongoing research and creative work concentrates on the design of a personal mythology and its visual iconography, as well as on immersive worlds experience design, and its cross-media applications.
| 1.373662
|
m-a-p/FineFineWeb
|
How Much Does Battery Health Matter?
Users on smartphone tech support forums are constantly worrying over battery health. It's not uncommon to see posts worrying over measurements like 95-percent or higher. And that's natural and understandable: battery health appears to be a clean and reliable indicator of how your battery is doing, and without a good battery, your phone is just a paperweight. But battery health is barely relevant to the health of your device and almost always wrong anyway.
What Is Battery Health?
does-battery-health-matter-charging-iphone-smlr
Batteries are harder to measure than you might expect. Even something routine – measuring the battery's current charge – produces significant errors and inaccuracies. Battery health is a rough approximation at best. Phones can only measure your battery capacity precisely to a point.
Worse still, the battery's organic chemical makeup introduces organic errors that cannot be overcome. Your battery's capacity might vary by a couple percentage points each time you charge it, sometimes as much as 10 percent. So any battery health measurement you see could miss the mark by as much as 10 percent.
Consider a concrete example. Imagine your battery had a brand-new capacity of 3000 mAh. Today, your battery holds 2880 mAh. Your phone reports this as "96% battery health" because your battery can now only hold 96 percent of the original capacity. Supposedly, this number approximates battery degradation and therefore battery status.
Does Battery Health Matter?
does-battery-health-matter-dead-battery
All batteries degrade. Chemical components break down, reactions slow, catalysts fizzle. On a long enough timeline, every battery will eventually lose enough capacity to fail. Nothing can escape the ravages of entropy. As a result, battery health will gradually decrease no matter how much you baby it. It's both expected and unimportant.
Fortunately for us, today's lithium-ion batteries last for ages before degrading a meaningful amount. For most people, your phone's battery lasts longer than the device's useful life. Battery health will gradually decrease over time as the battery decays, but this is both expected and normal. It's not uncommon to sell or recycle a phone with 90-percent battery health after years of use.
So we have an inaccurate measurement that doesn't tell us what it purports to while encouraging concern over a non-issue. Battery health isn't completely irrelevant, but if battery health and irrelevancy were at a party together, battery health would be standing uncomfortably close.
In most cases, battery health tells you as much about the battery's failure rate as the Dow Jone's Industrial Average tells you about the nation's economy. As any stockbroker will tell you, the Dow bears only a casual relationship to reality.
Basically, you can safely ignore any measurement of battery health above about 80 percent. Anything above 90 percent is perfect functionality. Only when your battery's health gets low and stays low consistently should you be concerned. Anything consistently below roughly 80 percent is worth being examined.
Then What Should We Look At?
If we can't use battery health to gauge a battery's duration, what can we use?
The most reliable indicator of battery health will always be user experience. If you're worried about your battery, keep an eye out for some classic signs of battery failure. Does your phone suddenly die with a 30-percent charge remaining? Do basic operations suddenly take twice as long? Those symptoms indicate battery problems reliably and accurately. Ironically, your phone might even indicate great battery health in the midst of these issues. And that alone tells you everything you need to know about battery health's accuracy.
The Complete Hardware Buying Guide
The Complete Hardware Buying Guide
Keen to learn how to choose the hardware for your rig? The Complete Hardware Buying Guide shows you what to look out when buying the hardware.
Get it now! More ebooks »
Leave a Comment
Yeah! You've decided to leave a comment. That's fantastic! Check out our comment policy here. Let's have a personal and meaningful conversation.
Sponsored Stories
| 1.182028
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
The world's first wiki where authorship really matters (Nature Genetics, 2008). Due credit and reputation for authors. Imagine a global collaborative knowledge base for original thoughts. Search thousands of articles and collaborate with scientists around the globe.
wikigene or wiki gene protein drug chemical gene disease author authorship tracking collaborative publishing evolutionary knowledge reputation system wiki2.0 global collaboration genes proteins drugs chemicals diseases compound
Hoffmann, R. A wiki for the life sciences where authorship matters. Nature Genetics (2008)
Neuronal survival induced by neurotrophins requires calmodulin.
It has been reported that phosphoinositide 3-kinase ( PI 3-kinase) and its downstream target, protein kinase B ( PKB), play a central role in the signaling of cell survival triggered by neurotrophins (NTs). In this report, we have analyzed the involvement of Ca2+ and calmodulin ( CaM) in the activation of the PKB induced by NTs. We have found that reduction of intracellular Ca2+ concentration or functional blockade of CaM abolished NGF- induced activation of PKB in PC12 cells. Similar results were obtained in cultures of chicken spinal cord motoneurons treated with brain-derived neurotrophic factor (BDNF). Moreover, CaM inhibition prevented the cell survival triggered by NGF or BDNF. This effect was counteracted by the transient expression of constitutive active forms of the PKB, indicating that CaM regulates NT- induced cell survival through the activation of the PKB. We have investigated the mechanisms whereby CaM regulates the activation of the PKB, and we have found that CaM was necessary for the proper generation and/or accumulation of the products of the PI 3-kinase in intact cells.[1]
References
1. Neuronal survival induced by neurotrophins requires calmodulin. Egea, J., Espinet, C., Soler, R.M., Dolcet, X., Yuste, V.J., Encinas, M., Iglesias, M., Rocamora, N., Comella, J.X. J. Cell Biol. (2001) [Pubmed]
WikiGenes - Universities
| 1.615487
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Many new bloggers/web writers have been encountering challenges on creating perfect and elegant posts despite the efforts and hard work of many but yet seen no good result to show so far, sometimes it seem like things happen by chance but not definitely true. The end of everything in life is the good life but the end of every human conduct is the happiness (the primary end of man is to achieve a good life) "Aristotle".
What you don't know will continue to rule you until you come across it and know about it and become master over it; it's by this time you will have power and dominion over it and rule over it. It is only when the basic necessities of life have been provided that one can marvel at the marvelous "Aristotle"
- Introduction text
An introduction is not useless, but to make it short and sweet, answering the 'what' and the 'why' in a few words as possible. The same goes for introductory text on interior pages.
2. Points of entry
It is important to scan able text linked or unlinked keywords, practical (not clever) display (otherwise known as headings, subheads, and the like) and bullet lists.
3. Pare paragraphs
Brief paragraphs that just contain one idea are ideal for the online readers.
4. Key facts first (k.f.f)
Employ the inverted pyramid model of writing, based on journalistic style, in which the most important information presented first, followed by decreasingly significant information.
5. Link in and out
Provided links to related material on your web site and on others; don't be concerned that visitors won't come back to your site once they leave, if you routinely send them to good material and you have good material waiting for them when they return and differently, the will return.
6. Say it straight
Chant your new mantra: SWYM, MWYS (say way what you mean, mean what you say) objectivity equals authority; avoid markets, promotional excess hyperbole. Be literal, not figurative if, in a heading for a sports, story, you use metaphorical language like curse instead of something more concrete like "losing streak" you will lose the opportunity for search optimization.
7. First words counts
Make the first dozen or so character in your display type counts. Avoid bland and coined terms and start with keywords.
8. Be passive in act
Apply the use of passive words and sentence constructions. "Passive voce is commended to help blogger/web writer place key information up-front in sentence" "passive voice is helpful for placing key information up-front in online writing"
9. Vital content
When I see I remember but when I hear I understand "Chinese people"; write well, the best way to write on blog i.e. web is to provide high quality contents. It may not get your readers them, but it will keep them coming back and also keep good records for you.
10. Avoid duplications of post
Duplications of posts on one page reduce your professional quality. Be careful on double post on a page, it gets your readers confuse and makes you looks unprofessional.
11. Break rules
Disregard any and all of these rules as you see fit, but bear in mind and remember them "when you hear you understand and when you see you remember.
| 1.447637
|
openbmb/Ultra-FineWeb
|
This is a free lesson from our course in Algebra I
In this lesson you'll learn how to find the range and domain of a function from
its equation. The range of f is the set of all values that the
function takes when x takes values from the domain. Let's take an example
to understand this better. Let's say we have a funtion y = f(x)
= x2 + 3. As long as x is a real number, y
is always going to be a real number as well, hence the domain of this function is
x = R. Also, for all values of x, x2 is going
to be 0 or higher, hence the range of this function, i.e. the value of f(x) >=
The domain of a function is the complete set of possible values
of the independent variable in the function i.e. the domain of
a function is the set of all possible x values which will make the function
"work" and will output real y-values.(More text
(Continued from above) When finding
the domain, remember:
- the denominator (bottom) of a fraction cannot be zero
- the values under a square root sign must be positive
The range of a function is the complete set of all possible
resulting values of the dependent variable of a function, after we
have substituted the values in the domain i.e. The range of a function
is the possible values of a function that result when we substitute all
the possible y-values into the function.
When finding the range, remember:
- substitute different x-values into the expression
for y to see what is happening
- make sure you look for minimum and
maximum values of y
Winpossible's online math courses and tutorials have gained rapidly popularity since
their launch in 2008. Over 100,000 students have benefited from Winpossible's courses...
these courses in conjunction with free unlimited homework help serve as a very effective
math-tutor for our students.
All of the Winpossible math tutorials have been designed by top-notch instructors
and offer a comprehensive and rigorous math review of that topic.
We guarantee that any student who studies with Winpossible, will get a firm grasp
of the associated problem-solving techniques. Each course has our instructors providing
step-by-step solutions to a wide variety of problems, completely demystifying the
Winpossible courses have been used by students for help with homework and by homeschoolers.
Several teachers use Winpossible courses at schools as a supplement for in-class
instruction. They also use our course structure to develop course worksheets.
| 2.216944
|
openbmb/Ultra-FineWeb
|
:
Firstly: The South Stream project was originally established to bring opposition for Nabucco by ignoring Russia. Russia had worked to abolish the South Stream project and that is not about "Samsun Geyhan" gas line. Every political observer knows that the South Stream Project is due to the opposition of the Nabucco Project.
Secondly: the route of the Samsun Geyhan gas lines is in between two ports in Turkey, and they pass through Turkey alone. They can establish it without any fuss, with some understandings about the transportation of gas through it. But it is portrayed as if Russia relinquished agreement to Samsun Geyhan and that Turkey gave up the agreement on the South Stream!
The most correct view concerning the consent of Turkey on the South Stream after strong opposition towards it was something else. This consent came after Turkey's approval for setting up missile defense radars in its territory in response to a request by America on behalf of NATO, and the issue is as follows:
In autumn 2011 a new subject was initiated, about a missile shield designed and constructed by America, with part of the shield being giant radars.
America was thinking at first to erect it in some Eastern Europe countries. When Obama came to power, he installed it in Turkey on behalf of NATO as Turkey is a part of the NATO alliance. This allows for radar surveillance in the south-eastern direction for a distance of thousands of kilometers. Turkey announced on 9/1/2012 the approval of early warning radar on its territory, as part of the missile shield intended for NATO deployment in Europe.
The Turkish Ministry of Foreign Affairs stated earlier: "Turkey welcomes the establishing in our country early warning radar deployed by the United States for NATO. It will be a contribution to our country in defense, developed in the context of the new strategic concept for NATO, enhancing the defense capability of NATO and our national defense."
The Turkish news agency "Anatolia" carried a statement from the spokesman for the Turkish Foreign Ministry about the radar site located in the city of Malatya, which lies about 400 miles, around 650 kilometers, southeast of Ankara, the capital. He pointed out that he managed the mediation of the two armies, the Turkish and the US military.
Turkey is one of the five European countries that expressed willingness to host bases for the missile system, which was designed in the United States. America was welcomed by Portugal, Poland, Spain and Romania for establishing parts of that system on their territories.
America has radars in Turkey monitor hostile missiles, whilst it has missiles in Poland and Romania and operation centers located in Germany. Note that there are four anti-ballistic missiles in the town of Rota, Spain.
In his justification of the approval by Turkey to deploy radar, Gul said in a Turkish television interview after the approval, "NATO adopted this defense system and decided to deploy it in a number of states that are members in the NATO. Turkey accepted as a member of NATO to deploy the radar system on its territory, in keeping with its obligations in NATO Charter." Gul added, "The radar system which was deployed in the east of the country several months ago, came within a range of defense tasks of NATO against the danger of ballistic missiles that threatens NATO countries."
However, the Turkey approval resulted in a confrontation with Russia. Therefore, Putin in his speech, after the approval of Turkey, said, "Russia will arm itself strongly decisively in order to meet Western threats, specifically its missile shield that is deployed to the east in Europe and to the south in Turkey."
Fourth, and so matters were strained between Russia and Turkey with a series of statements by Russian officials over the Turkish approval:
"The new project of shield deployment, including the radar installation in Turkey, covers the whole of south Russia, especially the Black Sea and the Caucasus, where there are many Russian military bases and it will be under the control of NATO," said Savkin Nikolai, who is a researcher at the "Centre of Strategic Research" based in Moscow, whilst commenting on the radar installation in Turkey, after Turkey declared its approval on 1/9/2011.
-On 10.10.2011 (source aljazeera from German media) "Foreign Minister Sergei Lavrov reiterated his government's opposition to the deployment of that system, saying that Moscow would undertake rapid retaliatory action in the case that it is established. The only country targeted by the NATO plan and which will have its arms affected, is Russia. He added in an interview with the Austrian Profile magazine, "We are told that the system is not aimed at us, but they (NATO) refused to pledge a formal commitment of the treaty. We can retaliate without great effort or huge costs. "
- On 11.23.2011 (Source EUR News) "If the situation continues to evolve contrary to Russian interest, we reserve the right to discontinue the resolution to implement arms control, and he threatened, Russia will deploy in the west and the south of the country, advanced offensive weapons which will target the European component of the [U.S.] missile defense," said the Russian President, Dmitry Medvedev.
- On 11.29.2011 (Source BBC)
Russia has established a new missile early warning system in its westernmost region in response to US plans for a missile shield in Europe.
And the President, Dmitry Medvedev, ordered the system to be activated on a visit to the radar unit in Kaliningrad, a Baltic region bordering the EU countries.
The unit is equipped with the new Voronezh-DM radar system.
Mr Medvedev has warned Russian missiles could be deployed on the EU's borders if the shield is installed.
The Russian Interfax news agency quotes Medvedev saying "If they have ignored this step, we will install another defense means, including taking strict action and disseminating strike force."
Medvedev spoke about the deployment of Alexander missiles, a modernized version of the mobile Scud land-to-land missile.
- "Russia today," quote from President, Dmitry Medvedev, on November 29 in 2011, activated the missile attack early warning radar operation system. Though he formally announced that the radar is not directed against the West, he initiated a similar system in response on the missile defense system deployment of in Europe.
- On 7/12/2011 (source Al jazeera, quoting agencies)
The Russian Chief of the General Staff said on Wednesday, 7/12/2011, that plans to build a European missile shield leave Russia with no option but to strengthen its defenses, adding that Moscow does not want a nuclear arms race.
Nikolai Makarov mention that the idea of a missile shield installed in Europe could exacerbate –quickly and dangerouslyRussian tensions with NATO.
The Russian Foreign Minister, Sergei Lavrov, on 7/12/2011 suggested in Vilnius, capital of Lithuania that Moscow is given written guarantees by NATO to confirm that the missile shield in Europe is not to make a threat against Russia.
This came when the foreign ministers of NATO member states sought to "calm things down" with Russia at the meeting of 7 and 8/12/2011 in Brussels.
And diplomatic sources said that the NATO members will confirm once again that the missile defense systems will continue, and also that they are not directed against Russia.
In a related context Russian President Dmitry Medvedev starts a one-day visit to Prague and he is going to discuss Moscow's stance over the anti-ballistic missile system in Europe. Meanwhile Russia has start to deploy its new weapon system in Kaliningrad region to keep the balance of power between the two sides, when the anti-ballistic missile system is operational.
- On 08.12.2011 (Source: ITAR-TASS -Publisher Russia Today)
Sergei announced after the Russia-NATO meeting that Russia will not allow the US anti -ballistic missile system to be on any part of its land. Knowing that a new radar will be establish in Turkey as part of the anti-ballistic missile that will overlook a large part of Russia,he added that, "Russia has decided to guarantee its safety using its own ability".
Fifth, but this worsening of relations between Turkey and Russia as a result of Turkish approval to installed radars decreased late last year, specifically when Turkey approved the South Stream project on 28/12/2011, and there is a series of statements about the radars and the anti-ballistic missile system:
At the beginning of February 2012 the Committee for Euro-Atlantic Security suggested that the US, NATO states and Russia should cooperate in the arctic, regional conflict and energy issues, as well as anti-ballistic missile programmes.
The new suggestion that the Committee for Euro-Atlantic Security reached to a stage that the US, NATO and Russia might exchange intelligence about radars and satellites for early missile attack warning. Therefore, each side provides the other a clear picture of any attack. But each side remains responsible for bringing down any missiles that threaten it and will be responsible for its anti-ballistic missiles.
-On 29/02/2012 (source Russia Today, carried by "Itar-Tass," Russian news agency)
"On the other hand the Russian Deputy Foreign Minister, Ryabkov, pointed out that relations with NATO are poor, saying, "we are preparing to undertake anti -ballistic missile maneuvers in the theater of military operations." "I hope we receive good news about that," he added and went on to say that a decision about Russian participation in the NATO summit that is going to be held in May in Chicago is being studied." 07.03.2012 (Source Russia Today.)
Russian Defense Minister, Anatoly Serdyukov, said that the Ministry of Defense will organize an international conference about
| 1.10837
|
HuggingFaceFW/fineweb-edu
|
Z-Wave Shades – Zipato Micromodule Motor Controller with Vera Controls
Looking to control some shades with Z-Wave? Worthington Distribution has a solution using a Somfy standard, 4-wire, AC motor with Zipato's Micromodule Motor Controller. This article will walk you through the shade installation as well as how to add the shade to your Vera controller.
- Somfy-powered shade using a standard, 4-wire, AC motor
- Zipato Micromodule motor controller, SKU ZIPPHPAN08US
- Vera controller
Pre-wiring recommendations –
It's recommended that you have your electrician run an AC wire to the left side of the window. Although a bare wire with wire nuts can be used, to pass inspection, the electrician will likely need to terminate the AC line. If there's no room for a standard outlet, your electrician can install a Sillites self-contained receptacle, SILSCRW.
Install the shade per the fabricator's instructions. Be sure that the shade is level to avoid any issues with the fabric "telescoping."
Install the Zipato Micromodule Motor Controller, following the diagram below:
Please note: Z-Wave is an RF communication. If your shade has a metal fascia or a cassette, make sure that the antenna of the micromodule is outside of the metal to ensure optimal Z-Wave communication.
Perform the following steps to learn the micromodule into your Vera controller:
- Log in to your Vera using your web browser.
- Go to Devices.
- Click on "+ Add device."
- Scroll down and click on "Generic Z-wave device."
- Click "Next" and "Next" again.
- When you see "Add device now" at the top of the page and there is a countdown on the screen, apply power to the micromodule. It should learn into your Vera controller.1
- Name the device and click "Finish."
- Give the module approximately 60 seconds to complete provisioning before proceeding.
- Click on Open or Close to ensure that the shade moves in the correct direction.2 Also, make sure that the shade stops at the correct upper and lower limits.3
1 If the micromodule has already been powered or was part of a previous Z-Wave network, you will need to perform an exclusion with the Vera controller. When on the screen with the countdown timer, click on "Retry." The message at the top of the screen will change to "Remove device now." Quickly click the button on the micromodule three times. The message will change to "Node finished" and the Vera controller will go back to inclusion mode. Click the button three times again to learn the micromodule into the Vera controller.
2 If the shade runs in reverse, power down the micromodule and swap the red and black wires coming from the motor. Make sure to re-apply power once the wires have been swapped.
3 If the limits need to be adjusted, refer to the shade fabricator's or the motor manufacturer's instructions.
Once you're certain that the directions and limits are correct, you will need to calibrate the micromodule to the shade. To do so, press and hold the button on the micromodule for 3-5 seconds and then release it. The shade will move up and down several times so that the module can learn its upper and lower limits.
Repeat these steps for any additional shades and micromodules you would like to control.
You will now have full control of the shade with your Z-Wave controller. To confirm, press Open, Close, or move to % to verify that the treatment now moves to this position.
| 1.236634
|
openbmb/Ultra-FineWeb
|
misses
when using a cache with multiple blocks.
In this section we propose two simple ways of evaluating the quality
of layouts using our metrics. If a layout is deemed to be good, it can
be used without expensive reordering, which is especially useful for
massive meshes with millions of vertices. While our cache-aware and
geometric cache-oblivious metrics allow ranking different layouts of
a graph or mesh, it is not obvious how to map the numerical values
they report for a single layout to some notion of absolute quality or
closeness to optimality. If a tight lower bound for either of these two
metrics is known for a graph, we can compare this bound with the metric value of the layout to determine its quality. Unfortunately, no such
bound for general graphs or meshes is known. However, empirical evidence suggests that for optimized layouts of unstructured triangle and
tetrahedral meshes with bounded vertex degrees, COMg depends only
on the average vertex degree and not on mesh size. For ten benchmark triangle meshes, spanning 35K to 880K vertices and optimized
for COMg, we observed the geometric mean edge length to fall in the
narrow range 4.48–4.87. While pathological cases can be constructed
for which this measure is unbounded with respect to mesh size, we
hypothesize that mesh layouts with geometric mean close to the average degree are sufficiently near optimal to be quite useful in practice.
Future work is needed to investigate this hypothesis in more detail.
An alternative, albeit more expensive, approach to measuring layout quality, is to compare a given layout, ϕ, with the optimized layout,
ϕ ∗, constructed by our cache-aware or cache-oblivious layout methods. Since the goal of this comparison is primarily to avoid lengthy
optimization, we limit the evaluation to a small subgraph, G0, extracted
from the input graph, G, and optimize only the layout ϕ ∗ for G0. We
present our algorithm for constructing G0 below.
6.1 Algorithm
We compute a small subgraph, G0 = (N 0, A0 ), of an input graph,
G = (N, A), with N 0 ⊆ N and A0 = {(i, j) ∈ A : i, j ∈ N 0 }. Our algo|N 0 |
rithm requires at most two parameters: a ratio, p = |N|, that specifies
Normalized values
(a) Spx tetrahedral mesh
(b) Extracted isosurface
Fig. 5. Isosurface Extraction: We measured the performance of isosurface extraction from unstructured tetrahedral meshes. Using our cache-oblivious layout of
the Spx volume mesh with 140K vertices, we were able to reduce cache misses by
5%–50% compared to other layouts. Moreover, our cache-oblivious layout yields
only less than 2% fewer cache misses compared to our cache-aware layout.
the target subgraph size |N 0 |, and for the cache-aware case the block
size, B. For efficiency, p should be small, e.g., 0.1%–1%.
Our evaluation algorithm has two major steps: 1) sampling the input graph and 2) constructing an optimized layout of the sampled subgraph.
1. Sampling the input graph: We first randomly select a start
node in the input graph and add it to the subgraph. In order to obtain
a subgraph that well reflects the quality of the full layout, ϕ, and that
allows capturing the cache behavior of a probable sequence of successive accesses to the graph, we construct connected subsets of G via
breadth-first region growing from the start node and add all visited
nodes to the subgraph. We also add to the subgraph all the arcs from
A that join nodes in N 0. We continue growing until the total number
of nodes in the subgraph is about k times (e.g., k = 5) the block size,
B. If B is not specified, as in the cache-oblivious case, we simply set
B to be 8KB, which is commonly used for large page sizes of virtual
Once the region growing stops, we add for each node i ∈ N 0 all other
nodes that map to the same cache block as i. We do this to avoid having
to account for intra-block "holes" in the layout that might otherwise be
unfairly utilized in the optimized layout. This also ensures that we do
not accidentally miss cut edges between sampled blocks with respect
to the cache-aware metric. We do, however, allow for holes due to unsampled blocks since for incoherent layouts there could be arbitrarily
many such blocks. We then repeat step 1, randomly selecting a new
start node, until the number of nodes |N 0 | is close to p|N|.
2. Constructing an optimized layout of the subgraph: We apply our cache-aware or cache-oblivious layout algorithm to construct
a new layout, ϕ ∗, of the subgraph and evaluate the chosen metric for
ϕ ∗ and ϕ. We simply use these numbers to approximate the expected
numbers of cache misses of the input layout and the optimized layout
for the full graph. If there is big difference between these estimates for
the subgraph, it is likely beneficial to compute an improved layout of
the full graph using our layout algorithm.
We used this approach to quickly evaluate the original layouts of
our benchmark models. Even for the largest meshes, our approximate
method takes less than 10 seconds. We found that we are able to predict the metric values of these full layouts within 15% error using subgraphs of only 6K–40K vertices, even though the original meshes have
as many as tens of millions of vertices.
In this section we highlight the performance improvements obtained
using our cache-coherent layouts in two different applications: isosurface extraction and view-dependent rendering. We implemented
our layout computation algorithm on a 2.8GHz Pentium-4 PC with
1GB of RAM. We used the METIS graph partitioning library [18]
to compute our cache-aware and cache-oblivious layouts. Also, our
metric has been integrated into OpenCCL, an open source library for
the layout computation. Our current unoptimized implementation of
the out-of-core layout computation, based in large part on the method
SL [16]
Z-curve [24]
COML [30]
COMg CMR,M=1 CMR,M=4 CMR,M=inf. IC Time OoC Time
Fig. 6. Comparison with Different Layouts in Iso-Surface Extraction: We compared our cache-aware (CAL) and cache-oblivious (COLg ) layouts with breadth-first
(BFL), depth-first (DFL), Z-curve, spectral (SL), cache-oblivious mesh (COML),
and geometrically sorted layout along the X-axis. We simulated a LRU-based
cache with a block size of 4KB and measured cache misses during isosurface extraction from the Spx model shown in Fig. 5. We also measured the out-of-core
running time of extracting the surface from disk (OoC) and a second time from
memory (IC). Due to the different scales, each quantity is normalized to the unit
interval. We observe that our geometric cache-oblivious metric has strong correlation with both cache misses and running time. CMR indicates cache miss ratio.
in [30, 32], processes about 15K triangles per second, which is comparable in speed to other out-of-core layout methods [14, 30].
Inducing a Layout: In order to reduce the layout computation
time, we compute only one of the vertex and triangle layouts and induce the other layout rather than computing the layouts separately.
First, we construct a vertex layout since the number of vertices is typically smaller than the number of triangles. Hence, the processing
time of a vertex layout is smaller than that of a triangle layout. Then,
as we access each vertex of the vertex layout, we sequentially store
all triangles incident on the vertex that have not already been added to
the triangle layout. We found that using the induced layouts at runtime
causes a minor runtime performance loss—in our benchmark, less than
5%—compared to using layouts that are computed separately.
7.1 Isosurface Extraction
The problem of extracting an isocontour from an unstructured dataset
frequently arises in geographic information systems and scientific visualization. Many efficient isosurface extraction methods employ seed
sets [26] to grow an isosurface by traversing only the cells intersecting
the isosurface. The running time of such an algorithm is dominated
by the traversal of the cells intersecting the contour. We efficiently
extract an isosurface from a seed cell by making a depth-first traversal, thereby accessing the volume mesh in a reasonably cache-coherent
7.1.1 Comparison with Other Layouts
We compared the performance of the isosurface extraction algorithm
on the Spx volume mesh (Fig. 5) consisting of 140K vertices and 820K
tetrahedra. We stored the volume mesh using eight different layouts
(see Fig. 6). We measured cache misses during two invocations of the
same isosurface extraction. During the first extraction, we ensured that
no part of the model was cached in main memory; therefore, loading
the data from disk was the major bottleneck. During the second extraction of the same
| 1.650591
|
Zyphra/Zyda-2
|
Skip to main content
40 Years After Moon Landing: Why Is It So Hard to Go Back?
Forty years ago today, two Americans touched down on the moon and walked upon its surface. Now, NASA?s trying to do it again with Constellation, an ambitious project to return humans to the moon by 2020.
But if NASA could do it in the eight years between President John F. Kennedy?s 1961 speech that led to the historic first lunar landing of Apollo 11 on July 20, 1969, some wonder why it is so difficult to go back. By 2020, 16 years will have passed since NASA launched its new moon-bound vision in 2004.
For one thing, the goal this time around is significantly expanded from last time.
"This is much more than flags and footsteps," said John Olson, director of NASA's Exploration Systems Mission Directorate Integration Office. "We're going for a sustained human presence in space."
Rocket science
NASA's current rockets and space shuttles aren?t capable of surpassing low-Earth orbit to reach the moon with the amount of gear required for a manned expedition.
"The amount of rocket energy it takes to accelerate those kinds of payloads away from Earth doesn?t exist anymore," said Jeff Hanley, NASA's Constellation program manager. "It exited in the Apollo era with the Saturn V. Since that time this nation has retired that capability."
NASA is developing new rockets, called Ares I and Ares V, for the return trip to the moon. These will be larger and taller than their Apollo-era Saturn counterparts, and will be able to carry significantly more weight.
The Constellation plan calls for these new rockets to surpass the Saturn vehicles in capability, but to do it on a budget.
"We want to do it cheaper, and we want to do it safer," Hanley told "That's a pretty tough prescription for NASA to meet."
And on top of those challenges, Constellation plans to go farther than the moon: The lunar voyages will be a staging ground to prepare humans to journey to Mars.
"The complexity of leaving Earth's orbit, we understand that," said Frank Peri, director of NASA's Exploration Technology Development Program at Langley Research Center in Virginia. "But getting back to the moon is not trivial, staying on the moon is not trivial, and going on to Mars is even beyond that."
Fiscal challenges
Buzz Aldrin walks on the surface of the moon near a leg of the lunar module in this photo snapped by fellow Apollo 11 astronaut Neil Armstrong. (Image credit: NASA)
While engineering a return trip to the moon won't be easy, some experts say the biggest hurdle for Constellation is money. NASA is spending $35 billion to build Orion and the Ares I.
"The technologies that we need to do the job are largely in hand," Hanley said. "In terms of the challenge, it's really a fiscal challenge - the amount of money that the nation can afford to spend."
During the Apollo years NASA's budget was almost five percent of the federal budget. Now, it's less than one percent.
"We understand the technologies that will be necessary, but it's going to take an investment to do that," said Roger Launius, space history curator at the Smithsonian's National Air and Space Museum. "That's the rub."
During the 1960s, many Americans felt the expense of Apollo was justified because of its importance to national security during the cold war. Today, some people question whether human space exploration is as valuable.
"There are not compelling publicly-held reasons for doing this," Launius said. "Without a rationale that everybody understands and can buy into, it?s a very hard sell to get the resources to do it."
NASA maintains there are a host of good reasons for going back to the moon. In addition to the lunar science that can be learned, and the thrill of human exploration, many of the new technologies could have applications on the ground. For example, advances in high-efficiency batteries, energy storage systems, and closed loop environmental control and life support could benefit people back on Earth, Olson said.
"Despite the fiscal challenges and the tough times that we currently are experiencing, we need to go do this because of the economic benefits, because of the positive impact on people in our society," Olson said. "It truly is a worthy goal."
Forty years after astronauts first set foot on the moon, examines what we've done since and whether America has the right stuff to get back to the moon by 2020 and reach beyond. For exclusive interviews and analysis, visit daily through July 20, the anniversary of the historic landing.
| 1.480663
|
Zyphra/Zyda-2
|
the original Shinto, but based on various forms of conjecture, I would suggest that it may have been something like this:
When people die, their souls depart from their bodies and go to the world of the dead. The old Japanese word for conducting a funeral is hofuru, which means to discard or throw away. And the word for corpse is nakigara, which might be translated as "empty remains." It is like the word nukegara that is used for the cast-off skin of a snake or shell of an insect. In other words, it is something that no longer has any use or meaning. And the ancient practice was simply to leave the remains exposed in the woods or fields, like any other item to be discarded.
The world of the dead in this original Shinto view is located somewhere in the sky. The spirits that go there live in families, just as on earth. Life in that world is similar to life in this world, with the exception that everything there is backward. Here we walk with our feet down, but there they walk with their feet up. Here we dress with the right side of the kimono underneath and the left side on top. There the left side is underneath and the right side on top. When it is morning here, it is evening there; when it is summer there, it is winter there, and so forth.
What is particularly noteworthy about Shinto is that this view of the afterworld contains no vision of heaven or hell. Nor is there any figure who passes judgment on people after they die. In the Shinto view, almost everybody gets to go to the afterworld. In some cases, the soul may refuse to go because it remains too attached to the world of the living, and, of course, if a person has been too evil while alive, the ancestral spirits may refuse to welcome that person's soul. In cases like these, the priest conducting the funeral must make doubly strong invocations to be sure that the soul actually makes it to the other world.
All the souls that reach the afterworld become Kami. The word Kami in this context is generally translated as "god" with a small g, but actually it refers to any being that is more powerful than normal humans. For example, snakes, wolves, foxes and other animals that often harm people are also considered to be kami.
Thus, in the Shinto view, the souls of the dead go to the afterworld, where they live with their families more or less as they lived on earth. Furthermore, the two worlds—the world of the living and the world of the dead—are not cut off from each other. There are four Buddhist memorial days during which the spirits of the departed return to the world of the living: at New Year's, at midsummer, and at the equinoxes in spring and fall. They spend about three days with the families of their descendants, who wait on them and then send them off on their return journey to the afterworld. By waiting on the spirits of their ancestors during these four annual visits, the people of this world ensure that these spirits will look after them for the rest of the year.
After living in the other world for a time, the spirits of the dead are reborn in this world. When a child is conceived, the representatives of the ancestors on both sides of the family get together and decide whose turn it is to go back. The spirit of the person so selected then returns to the world of the living and slips into the womb of the mother, where it enters the unborn child.
Shinto Influence on Buddhism | What I have been describing are the beliefs of the Japanese before the arrival of Buddhism, but these beliefs continue to live among the Japanese of today. Most people in Japan are both Shintoists and Buddhists. To the Japanese mind, there is nothing contradictory about this. In general terms, rites relating to the dead are the province of Buddhism, while the rites of the living are the domain of Shinto. More specifically, Buddhist rituals are used for funerals, anniversary memorial services, and the services for the dead that are conducted at New Year's, midsummer, and the equinoxes. Shinto rituals are used for weddings, birth celebrations, and shichigosan, the special celebrations for boys at ages three and five and for girls at ages three and seven.
Originally, of course, all these rites must have been Shinto, but when Buddhism appeared on the scene, it took over the central rites, namely, those relating to the passage from this world to the next. It is hard to trace the way Buddhism changed after being introduced to Japan, but it seems fair to state that the Buddhism that developed in Japan and won the belief of the Japanese people is a religion quite different from that originally created in India by Sakyamuni Buddha and his followers.
In the Buddhism of Gautama, the world is seen as a place of suffering. Human beings, and in fact all living creatures, are reborn each time they die, and thus they must face a perpetual cycle of pain. According to the teachings of this creed, the reason humans are trapped in this unending cycle is because of their passions. This requires a life of following the commandments, meditating and learning. Through such a life, a person can hope to attain a state of quiet enlightenment, or nirvana, that will make it possible to leave the world of suffering forever. Buddhahood, in other words, means breaking free of the cycle of reincarnation.
In this form of Buddhism, only human beings are candidates for Buddhahood. And even for humans, the only way to become a Buddha is through religious training (including mortification of the senses) and study. But after being introduced into Japan, this religion changed dramatically. In contrast to the original teaching, which held that only a minority of people were eligible to become Buddhas, the religion as it developed in Japan gradually widened the scope of potential Buddhahood to encompass all human beings and ultimately even nonhumans. Around the 10th century, an influential school of thought arose that proclaimed, "Mountains and rivers, grasses and trees, all can become Buddhas." This school of thought has formed the basis for the various forms of Buddhism that have evolved in Japan since then, though the methods that are prescribed for attaining Buddhahood—such as chanting and meditation—differ from one sect to another.
Another feature of Buddhism in Japan is the common practice of giving posthumous religious names to dead people. This, in effect, certifies that the deceased person has become a Buddha. Even in today's Japan, people often refer to the dead as Hotoke—Sama, or Buddhas. In other words, the Buddhism that has taken root in Japan seems to have been influenced by the traditional Shinto belief that all people become Kami (gods) when they die.
Another interesting parallel between Buddhism in Japan and the original Shinto beliefs is to be found in Jodo Shinshu, or the True Sect of the Pure Land, which was founded by Shinran in the 13th century and continues to be one of the main sects. Shinran preached the value of two types of eko, or transferences of one's virtue to others for the attainment of Buddhahood. One, called oso-eko, means that a Buddhist devotee calling Amitabha's name at the deathbed could attain Buddhahood by being reborn in the Pure Land, or Amitabha's paradise, after his or her death. This was preached by Honen, Shinran's teacher, in the 12th century. In addition to this, Shinran stressed the other type of eko called genso-eko, which refers to the return of a dead person to this world from the Pure Land in order to save others.
According to Shinran, this is the sort of act performed by a Bodhisattva, who is a person who seeks to relieve the sufferings of others and save their souls. In other words, through the practice of nenbutsu, or chanting the praises of Amitabha Buddha, a person can go to paradise; being Bodhisattva, however, such a person will not be content to remain there forever but will return to this world to relieve the living of their pain.
Shinran maintained that the true practitioners of nenbutsu were those who would keep returning to the world of the living time after time for the salvation of other humans. This seems quite similar indeed to the Shinto belief in reincarnation. Over the centuries of its evolution in Japan, culminating with the teaching of Shinran, Buddhism developed thinking that was amazingly similar to that of the indigenous religion.
The Eternal Cycle | To sum up, it seems clear that the belief in an eternal cycle of life and death is a basic element not only of Shinto but also of Japanese Buddhism. This is a belief that is surely not just Japanese; it was probably held in common by all human beings during the Stone Age. People who lived in the forest probably developed similar philosophies. The difference in Japan's case is that this primitive thinking has shown a stronger ability to survive here than elsewhere.
It may be a primitive philosophy, but I believe that the time has come to reexamine its merits. Modern science has demonstrated that all life is basically one, and it has shown that living things and their physical surroundings are all part of a single ecosystem. Further, we have learned that even though the individual dies, his or her genes are carried on by future generations in a lasting cycle of rebirth. Even more important, the human race has finally realized that it can survive only in "peaceful coexistence" with the other life forms of the animal and plant worlds.
Ever since
| 1.172851
|
openbmb/Ultra-FineWeb
|
On 30 January, CECC will host its annual Fieldwork. This time under the theme New Horizons 2020, the event will feature Prof. Isabel Ferín and Prof. Ana Paula Coutinho as respondents to our researchers' presentations of some of their latest work. CECC invites all to participate in this foreseen fruitful gathering.
Luísa Santos will present an upcoming research project born out of 4Cs.
Excerpt of the presentation
"Europe is faced today with political challenges and conflict of various kinds such as environmental politics; censorship; and nationalisms. In face of such events, there has been a burst of activity amongst cultural producers. However, most of the existing work linking arts and politics is theoretical and monodisciplinary. Mapping (Conflicted) Arts and Politics (MAP) is an upcoming research project that is born out of 4Cs and that aims at creating a European network to bring together theory and applied research, as well as concepts and discourses from Culture Studies, Visual Arts, Arts Management and Political Science, to address the following questions: i) What is the transforming role of culture and visual arts in contemporary liberal-democratic political systems?; ii) Do Governments, particularly in the context of the diverse current political challenges, affect artistic actions? If so, how?; iii) Is the transforming potential of arts responsible for the slim support (beyond the financial aid) art gets?; iv) What type of public and private support is possible under current challenges, such as "new right-wing populist regimes [that] use financial incentives (or the lack thereof) to control artistic discourses" (Somogyi, 2019)? MAP will address these issues by exploring ways culture and visual arts can help bring individuals together to find alternatives to current challenges, thus highlighting the social relevance of political art."
For more information about the event please visit here.
Universidade Católica Portuguesa
Palma de Cima
1649-023 Lisboa, Portugal Lisbon
| 1.555381
|
Zyphra/Zyda-2
|
Allergen-specific immunotherapy (SIT) in its various application forms represents the main treatment approach of IgE-mediated allergic diseases in adults and children. Despite this clear recommendation, many particularities of products, patient characteristics, and product availability in different countries hamper the use of allergen-specific immunotherapy in particular in children. The frequently asked questions by parents, patients, and physicians are the backbone of this review. Thus, the potentials and limitations of allergen-specific immunotherapy in children and adolescents will be highlighted. IgE-mediated allergic diseases are affecting about 20% of the population. They manifest commonly early in life, and hence, the use of SIT should be considered also early in the course of the disease.
| 1.815506
|
m-a-p/FineFineWeb
|
1, based on single chip microcomputer, ultra thin and small design, long: 50MM width: 19MM thick: 14MM
2, wide working voltage support, can work at 3.8V ~ 30V voltage, and with voltmeter function, can measure the size of the input voltage
3, the use of high brightness tube, high brightness, visibility is stronger, in a more bright environment can also see
4, there are 4 kinds of display mode, the display only time display only the date display only the only time the temperature voltage, temperature, voltage display (Note: in the alternate display mode, can choose whether to display the temperature or voltage, through the DD option under the condition of dd:0 display time + temperature + voltage.Dd:1 under the condition of.Dd:2 voltage display time + time + temperature display)
5, with temperature display function, display range -30 ~ 60 degrees Celsius, Z small resolution 0.1 degrees, and with temperature error correction settings function, set range -5 ~ 5 degrees Celsius
6, with a 24 hour time error correction setting function, can be set up every 24 hours correction of an error, set the range of -9 ~ 9 seconds. (Note: to make the function effect, must have 24 hours of continuous power supply, that is every 24 hours before the correction of an error)
7, using DS1302 chip timing, with backup CR1220 battery, power down time continue to go. And the use of 5PPM high-precision crystal oscillator, accurate timing, small error
1, adjustment time, date, temperature error correction, 24 hour error correction, DD options
2, toggle display mode
In the non adjusting state, press the right button will switch the display mode,(1) only display time, (2)only display the date, (3) only shows the temperature,(4) only display voltage, (5)
Alternating display of time, temperature and voltage . The interval is about 4 seconds
(Note: in the alternate display mode, the DD option to choose choose whether to display the temperature or voltage, under the condition of dd:0 display time + temperature + time + voltage . under the condition of dd:1 display time + voltage . under the condition of dd:2 display time + temperature)
*Orders processed timely after the payment verification. *We only ship to confirmed order addresses. Your order address MUST MATCH your Shipping address. *All goods is packing under good condition with suitable size. *All shipping charge,duties, insurance and taxes fee will be paid by the customer . *Support DHL , FEDEX , UPS , TNT, EMS, ARAMEX , special line express.
1. You have 10 days to contact us and 30 days to return it from the date it was received. If this item is in your possession more than 10 days, it is considered used and WE WILL NOT ISSUE YOU A REFUND OR REPLACEMENT. There are NO EXCEPTIONS! Shipping cost is bear by both seller and buyer in half.
2. All returned items must be in the original packaging and you must provide us with the shipping tracking number, specific reason for the return.
3. We will refund your full amount, upon receipt of the item in its original condition and packaging with all components and accessories included. OR, you may choose to have a replacement.
4. Return freight charge will be paid by the customer due to customer's error.
| 1.322421
|
m-a-p/FineFineWeb
|
Top Three Ways Outsourced Procurement Saves Businesses Money
By bioprocure
October, 2019
Although procurement is not always a core competency within a business, it is one of the most demanding aspects of any business. If a business' procurement processes are ineffective, research and production can be brought to a halt. Even worse, the company could end up not being profitable. This is why outsourcing procurement should be a serious consideration for all businesses. On top of expediting purchasing processes and getting the best deals, outsourced procurement can save you money. Below, we have highlighted three ways outsourced procurement saves businesses money.
1. It allows staff to focus on research and product development
Many companies, specifically startups, and smaller companies, will task particular employees with procurement responsibilities. Often, startups and smaller companies do not have the resources to create procurement departments or to hire dedicated procurement employees. Even if they do, they usually don't have the in-house knowledge to properly oversee the procurement staff and determine the effectiveness of the in-house procurement. This can cause significant problems that slow down productivity. For example, busy or inexperienced employees may forget to order essential products or order too much or too little of something, slowing down business for weeks at a time. Outsourcing procurement allows companies to reduce the amount of time their researchers and scientists spend on doing work that isn't their primary area of expertise. Most importantly, they save money by having procurement professionals expedite processes, guaranteeing that researchers and scientists have what they need to enhance research and increase product development.
2. It is more cost-effective than having in-house procurement staff
It may sound appealing to hire in-house procurement staff. This does not often prove to be a cost-effective method to address procurement, though, for multiple reasons. In order to address all aspects of your business' procurement needs, a company likely needs more than one employee. The costs of hiring internal purchasing agents include salary, benefits, taxes, office space, computer, relevant software, and more will be a significant investment. This also means undertaking the process of multiple hirings and onboardings. Businesses lost money during the acclimation period. It typically takes upwards of a year before new employees catch up and become efficient at their jobs. Additionally, there is almost no way to predict the costs that come from inefficiencies due to inexperience. If your company grows, procurement demands will inevitably grow beyond the ability of your current staff and the costs of managing procurement in-house continue to rise. Outsourced procurement resolves all of these issues before they start. Businesses that hire outsourced procurement save money that they would have spent on recruiting and training multiple employees and have ease of mind knowing that they have a team of procurement experts addressing their growing business' needs.
3. It provides access to procurement experts
Efficient procurement requires a level of expertise and attention to detail that procurement specialists take years to acquire. It involves conducting thorough research, overseeing logistics, finding lower costs for goods and services, developing vendor relationships, streamlining inventory, and an experienced management team. Outsourced professional procurement experts look for savings opportunities everywhere they can. It is their job to study every angle of your business to help you save on operational costs. Outsourced procurement professionals will analyze your current suppliers, the number of supplies you order and actual usage every month. They will also determine the quality of the supplies, based on their vast experience working with a variety of suppliers, and negotiate the best price for the supplies. Interested in learning more? Speak with one of our procurement professionals about how you can save your business money.
Comments: 0
Share It:
| 1.056612
|
Zyphra/Zyda-2
|
Using a Merlin MicroSeal Septum to Reduce Endrin and DDT Breakdown for EPA Method 8081b – Organochlorine Pesticides by Gas Chromatography10 Sep 2011
EPA Method 8081b requires that Endrin and DDT breakdown percentages are less than 15% each to assure that the GC system is inert and ready for action. Breakdown can be calculated by analyzing a 50/100 pg/µL Endrin/DDT standard and determining production of DDE, DDD, Endrin aldehyde, and Endrin ketone. Breakdown is exacerbated by activity in the inlet liner, whether it comes from poor deactivation of the liner and its wool packing or from contamination by non-volatile residue from analyzed samples. In addition, metal fittings in the inlet can cause breakdown of these sensitive analytes, especially under hotter inlet temperatures.
Inlet liner lifetime in organochlorine pesticide analysis as regards Endrin and DDT breakdown percentages is directly correlated with low breakdown to begin with, and sample cleanliness (or dirtiness). The best way to achieve longer lifetimes is to start with as low a breakdown percentage as possible, which means choosing an inert liner and bottom seal (if present) and making sure the inlet is free of non-volatile residue.
What may not be obvious is that the autosampler injection process and the GC septum can contribute significantly to Endrin and DDT breakdown. In an experiment using an Agilent 7683 autosampler with a dual taper 23/26s syringe needle (to minimize septum coring) on an Agilent 6890 GC-ECD fitted with a 4mm single taper with wool inlet liner and a Restek Thermolite septum, I saw a rapid increase in Endrin breakdown when repeatedly injecting an Endrin/DDT standard from a vial with a PTFE septum (NOT PTFE/silicone, but ALL PTFE). Applying some detective work and getting some photomicrographs with the kind help of Mike Goss, I was able to attribute the degradation to pieces of metal and septum in the liner. The metal comes from the autosampler syringe needle striking the metal needle guide on the septum nut and "cutting" pieces from the guide. I was absolutely shocked at how much metal was atop the GC septum after only 100 injections!
Replacing the silicone septum with a Merlin MicroSeal septum is an excellent way to circumvent this problem and maintain Endrin/DDT integrity for longer periods of time, as seen in the graph below. The MicroSeal septum is a wear-resistant fluorinated elastomer with an efficient dual-sealing mechanism that is not pierced like a silicone septum. This eliminates the problem of septum pieces ending up in the liner. In addition, I did not see any metal pieces in the liner when using the Microseal. Note that a 23g blunt, conical needle autosampler syringe is specified for injecting through a Merlin MicroSeal.
While dirty samples can quickly corrupt the liner and lead to shorter lifetimes, when those lifetimes are measured by Endrin and DDT breakdown, you'll still have more uptime if you switch from a silicone septum to a Merlin MicroSeal.
New septum nut for an Agilent GC splitless inlet before any injections have been made.
Used septum nut for an Agilent GC splitless inlet showing chips from metal caused by the autosampler syringe needle striking the guide.
Metal pieces on a GC septum that were "cut" from the septum nut needle guide by the autosampler syringe during injection.
GC inlet liner wool contaminated with metal and silicone septum pieces from the autosampler injection process.
| 1.393285
|
m-a-p/FineFineWeb
|
@article{10.1371/journal.pone._PHONE_, author = {Evans, Harry C. AND Elliot, Simon L. AND Hughes, David P.}, journal = {PLOS ONE}, publisher = {Public Library of Science}, title = {Hidden Diversity Behind the Zombie-Ant Fungus Ophiocordyceps unilateralis: Four New Species Described from Carpenter Ants in Minas Gerais, Brazil}, year = {2011}, month = {03}, volume = {6}, url = {_URL_ pages = {1-9}, abstract = {Background Ophiocordyceps unilateralis (Clavicipitaceae: Hypocreales) is a fungal pathogen specific to ants of the tribe Camponotini (Formicinae: Formicidae) with a pantropical distribution. This so-called zombie or brain-manipulating fungus alters the behaviour of the ant host, causing it to die in an exposed position, typically clinging onto and biting into the adaxial surface of shrub leaves. We (HCE and DPH) are currently undertaking a worldwide survey to assess the taxonomy and ecology of this highly variable species. Methods We formally describe and name four new species belonging to the O. unilateralis species complex collected from remnant Atlantic rainforest in the south-eastern region (Zona da Mata) of the State of Minas Gerais, Brazil. Fully illustrated descriptions of both the asexual (anamorph) and sexual (teleomorph) stages are provided for each species. The new names are registered in Index Fungorum (registration.indexfungorum.org) and have received IF numbers. This paper is also a test case for the electronic publication of new names in mycology. Conclusions We are only just beginning to understand the taxonomy and ecology of the Ophiocordyceps unilateralis species complex associated with carpenter ants; macroscopically characterised by a single stalk arising from the dorsal neck region of the ant host on which the anamorph occupies the terminal region and the teleomorph occurs as lateral cushions or plates. Each of the four ant species collected - Camponotus rufipes, C. balzani, C. melanoticus and C. novogranadensis - is attacked by a distinct species of Ophiocordyceps readily separated using traditional micromorphology. The new taxa are named according to their ant host.}, number = {3}, doi = {10.1371/journal.pone._PHONE_} }
| 2.008439
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Lecture #18, Tuesday, March 14th ================================ - Lazy Evaluation: Some Issues - Lazy Evaluation: Shell Examples - Lazy Evaluation: Programming Examples - Side Note: Similarity to Generators and Channels - Call by Need vs Call by Name - Example of Feature Embedding ------------------------------------------------------------------------ # Lazy Evaluation: Some Issues There are a few issues that we need to be aware of when we're dealing with a lazy language. First of all, remember that our previous attempt at lazy evaluation has made {with {x y} {with {y 1} x}} evaluate to 1, which does not follow the rules of lexical scope. This is *not* a problem with lazy evaluation, but rather a problem with our naive implementation. We will shortly see a way to resolve this problem. In the meanwhile, remember that when we try the same in Lazy Racket we do get the expected error: > (let ([x y]) (let ([y 1]) x)) reference to undefined identifier: y A second issue is a subtle point that you might have noticed when we played with Lazy Racket: for some of the list values we have see a "'.'" printed. This is part of the usual way Racket displays an *improper list* --- any list that does not terminate with a null value. For example, in plain Racket: > (cons 1 2) (1 . 2) > (cons 1 (cons 2 (cons 3 4))) (1 2 3 . 4) In the dialect that we're using in this course, this is not possible. The secret is that the 'cons' that we use first checks that its second argument is a proper list, and it will raise an error if not. So how come Lazy Racket's 'cons' is not doing the same thing? The problem is that to know that something is a proper list, we will have to force it, which will make it not behave like a constructor. > As a side note, we can achieve some of this protection if we don't > insist on immediately checking the second argument completely, and > instead we do the check when needed --- lazily: > > (define (safe-cons x l) > (cons x (if (pair? l) l (error "poof")))) Finally, there are two consequences of using a lazy language that make it more difficult to debug (or at lease take some time to get used to). First of all, control tends to flow in surprising ways. For example, enter the following into DrRacket, and run it in the normal language level for the course: (define (foo3 x) (/ x "1")) (define (foo2 x) (foo3 x)) (define (foo1 x) (list (foo2 x))) (define (foo0 x) (first (foo1 x))) (+ 1 (foo0 3)) In the normal language level, we get an error, and red arrows that show us how where in the computation the error was raised. The arrows are all expected, except that 'foo2' is not in the path --- why is that? Remember the discussion about tail-calls and how they are important in Racket since they are the only tool to generate loops? This is what we're seeing here: 'foo2' calls 'foo3' in a tail position, so there is no need to keep the 'foo2' context anymore --- it is simply replaced by 'foo3'. (Incidentally, there is also no arrow that goes through 'foo1': Racket does some smart inlining, and it figures out that 'foo0'+'foo1' are simply returning the same value, so it skips 'foo1'.) Now switch to Lazy Racket and re-run --- you'll see no arrows at all. What's the problem? The call of 'foo0' creates a promise that is forced in the top-level expression, that simply returns the 'first' of the 'list' that 'foo1' created --- and all of that can be done without forcing the 'foo2' call. Going this way, the computation is finally running into an error *after* the calls to 'foo0', 'foo1', and 'foo2' are done --- so we get the seemingly out-of-context error. To follow what's happening here, we need to follow how promise are forced: when we have code like > (define (foo x) (/ x 0)) > (foo 9) then the 'foo' call is a *strict point*, since we need an actual value to display on the REPL. Since it's in a strict position, we do the call, but when we're in the function there is no need to compute the division result --- so it is returned as a lazy promise value back to the toplevel. It is only then that we continue the process of getting an actual value, which leads to trying to compute the division and get the error. Finally, there are also potential problems when you're not careful about memory use. A common technique when using a lazy language is to generate an infinite list and pull out its Nth element. For example, to compute the Nth Fibonacci number, we've seen how we can do this: (define fibs (cons 1 (cons 1 (map + fibs (rest fibs))))) (define (fib n) (list-ref fibs n)) and we can also do this (reminder: 'letrec' is the same as an internal definition): (define (fib n) (letrec ([fibs (cons 1 (cons 1 (map + fibs (rest fibs))))]) (list-ref fibs n))) ; tail-call => no need to keep 'fibs' but the problem here is that when 'list-ref' is making its way down the list, it might still hold a reference to 'fibs', which means that as the list is forced, all intermediate values are held in memory. In the first of these two, this is guaranteed to happen since we have a binding that points at the head of the 'fibs' list. With the second form things can be confusing: it might be that our language implementation is smart enough to see that 'fibs' is not really needed anymore and release the offending reference. If it isn't, then we'd have to do something like (define (fib n) (list-ref (letrec ([fibs (cons 1 (cons 1 (map + fibs (rest fibs))))]) fibs) n)) to eliminate it. But even if the implementation does know that there is no need for that reference, there are other tricky situations that are hard to avoid. Side note: Racket didn't use to do this optimization, but now it does, and the lazy language helped in clarifying more cases where references should be released. To see that, consider these two variants: (define (nat1 n) (define nats (cons 1 (map add1 nats))) (if (number? (list-ref nats n)) "a number" "not a number")) ;; we want to provide some information: show the first element (define (nat2 n) (define nats (cons 1 (map add1 nats))) (if (number? (list-ref nats n)) "a number" (error 'nat "the list starting with ~s is broken" (first nats)))) If we try to use them with a big input: (nat1 300000) ; or with nat2 then 'nat1' would work fine, whereas 'nat2' will likely run into DrRacket's memory limit and the computation will be terminated. The problem is that 'nat2' uses the 'nats' value *after* the 'list-ref' call, which will make a reference to the head of the list, preventing it from being garbage-collected while 'list-ref' is 'cdr'-ing down the list and making more cons cells materialize. It's still possible to show the extra information though -- just save it: ;; we want to provide some information: show the first element (define (nat3 n) (define nats (cons 1 (map add1 nats))) (define fst (first nats)) (if (number? (list-ref nats n)) "a number" (error 'nat "the list starting with ~s is broken" fst))) It looks like it's spending a redundant
| 1.460979
|
EssentialAI/eai-taxonomy-stem-w-dclm-100b-sample
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.