Dataset Viewer
Auto-converted to Parquet
id
stringlengths
1
6
revid
stringlengths
2
7
url
stringlengths
37
42
title
stringlengths
2
252
text
stringlengths
140
1.28M
298879
46022
https://en.wikibooks.org/wiki?curid=298879
Trainz/AM&C/Dealing with Asset Errors
Dealing with Asset Errors. "'Errors, Faults, Faulty assets, Bad Content, Faulty content" are all synonyms in Trainz-speak for the same situation: An asset was distributed with malformed components, a missing component, or has become incompatible with newer software releases despite working in an earlier Trainz version. This later kind of error or fault occurs when the asset needs an tweak to conform to a newer level of asset technology, and are the most prevalent. Assets missing a texture (component) can be 'patched' and made to work, if not with the exact same appearance as used by the content creator. Whatever the flaw, it is frequently something which can be 'fixed' by simple hand edited changes into the files, most often only inside the text ini files of the asset contained in the assets defining folder(s) which one opens using third party tools in the operating system folder. Currently, the best Error fixing advice on these pages is found here at Trainz/AM%26C/Fixing_Assets, which covers the most frequently occurring error messages in a text searchable format, allowing entry of the key phrase in the error message to read up on how to fix it. Necessary tools. The necessary third party software effective in dealing with Trainz assets is virtually all obtainable as . Be familiar with. It is assumed the reader has read through and gained a working understanding of the materials presented on the following pages before proceeding with the below: Goals of this Module. "This module will give the reader a working knowledge of the following Trainz knowledge topics:" Assessing an older model. We're use below unchanged config to give the new Trainzer a tour of asset normal features: What is/is not important. At first glance many engine traincar assets may seem to be very complicated to the new Trainzer hoping to fix a faulty asset. The significance of the trainz-build value is poorly understood, even by many content creators involved in Trainz since it's earliest. A key is to understand Greg Lane and the original programming team evolved the key more complicated data structures of an asset back in 2003–04 and they've changed little since but for extra capabilities.
298883
46022
https://en.wikibooks.org/wiki?curid=298883
Trainz/Beginning
Introduction to Trainz. Trainz simulators, once they've hooked you as an interest, grows to become first and foremost a hobby and, often a passion. Trainz has a large international participation and many sub-communities going back to 1998–99 when Model Railroad Hobby Clubs were consulted by Auran about what they'd want in a product, and early modelers began making content for a game yet to be published. That group of clubs has done nothing but grow from those pre-release Trainz design days when their interest was rewarded with a rare and coveted Trainz 0.9 CDROM version, a Beta Test release several months before the advent of both Microsoft Trains Simulator (MSTS) and the 'Trainz 1' commercial product release. How large and how widespread has the community grown you ask. Last fall a reliable source, counted over 800 '3rd Party' Trainz websites, not counting Auran/N3V's several urls. These sites generally are hosted by and organized by a group of content creators, the talented guys and gals who make digital models the rest of us ooh and aw at that manifest and populate the Trainz Universe we are visiting in the moment. Trainz can become a lifestyle, or a large part of yours, for underneath the simulator fun is also an active friendly community, actually many communities and sub-communities meeting in internet communicated bliss to share common interests. So early on, we recommend you browse the web forums as much or more time as that of when you try to run Trainz. There is no doing but a lot of learning new things—for the forums (plural) will both give you insights and a deeper sense of what can be done, but learn something of persons to whom you might relate and befriend, and broaden your view of the Trainz world that can not be gotten any other way. Finally, finding what areas of interests (again plural) are associated and grouped with others will be of great value to you when you finally get up the nerve to ask a question, or need to go look for an answer to a vexing issue of the moment. Most likely, the wily veterans of the game have seen or done something similar already. And you will have questions—we all do and did, and still do for the Trainz experience is immense and widely varied depending upon what parts of the game you end of settling into most often.   You don't have to be a " to enjoy but to get the most out of the software requires the drive to want to make something, because Trainz has its warts, its confusions, and its faults and flaws. The inspiration of having a vision, a goal that entices you will help you past the rough days as it does us all. You will see your share of griping if you just visit and follow new posts, so no need to sugar coat it. Helping you understand some of the more negative attitudes will take amassing the exposure to the hurly-burly there and all the gems in the rough as well. When all is said and done, Trainz can present a seemingly endless mountain of learning curves to surmount, and this book is all about helping you up those slopes in the least time intensive, least frustrating way possible. Our program is to expose you to skills building by introducing a task, giving a example to follow, then challenge you to repeat what we've shown how to do. In the processes we'll be putting up lots of images, written explanations, and starting all of it with a video series matched to the screenshots you'll see here. It evolves, dude! Trainz is however an ongoing, evolving, ever changing dynamic system of modeling in a 3D real time interactive graphical 'Virtual World' and was one of the first 'game classed' software packages which did a good job of simulation in such a milieu. It is far easier to simulate for example a flight simulator, for by and large, the graphical world demands are far off and indistinct. One of the key and unique features of Trainz is we humans can go anywhere in the virtual world, virtually at any moment, and just look around (letting that Train look after itself) or change things (the junction points of a ladder in a railyard) and experience the world with an intimacy which wasn't generally possible in most games which tightly controlled player placement and views. This is very much still the case even in specialize game virtual environments such as are generated in the play-stations and Nintendos and Xbox game consoles. Just try to run far from the path in Left for Dead -- the game environment scope is designed to channel you, to limit strongly where you can go, so what they have to simulate as an environment. In Trainz a route designer defines the whole world, but you are free to trespass everywhere in it from being underwater (can be weird or annoying) to flying high above (in satellite mode or as a hawk might) and can take on superpowers of sorts and walk through walls--the later case proving no matter how good the illusion, the world is indeed virtual; something made of mathematical constructs called polygon meshes with cladding over virtual surfaces called textures — which together with the game engine are rendered to us as objects we see with our " color and depth in three dimensions (unless we trespass inside, breaking the illusion). In the Trainz graphical worlds one can design and create boats, planes, automotive or truck vehicles and drive them as well as our beloved Trainz with far more cars than could fit on a 'Basement Railroad Empire' physical model railroad--and in Trainz the dynamic operation of that mass of cars (a consist in railroad parlance) changes the dynamic operating behavior of the train. If you load a string of coal cars the train becomes different to drive. If you try to accelerate a loaded train too fast, the wheels will slip and you could well go backwards. This makes Trainz endlessly different, for there is always a new possibility to explore if you are adventurous enough to tinker and customize to suit yourself. And that customization is another strength of Trainz. The software is extensible and expansive enough you can mess around with trial and error and may do things no one else thought possible before. Admittedly after sixteen years development (Trainz software was conceived in 1996 by Greg Lane, began taking shape in 1998 with aid of Model Railroad Clubs, then was first released in beta test in mid-2000 A.D.) the major 'new things' are being done by users with a software bent, for they invariably involve interactive scripting efforts to interact with the virtual world generated in Trainz. Trainz Strengths. Add it all together, and the product longevity and success is understandable. Today's driving experience is much unchanged from the Train UTC (v1.5) improvements added in Trainz second year. Don't like the hotkeys, remap them in their . 's tools, controls and capabilities are still much like the original well planned interface in Trainz 1.0, while today's CM operates with improvements, not jarring changes just like , but for measured improvements. The same can be said for most aspects of operating Trainz—they've gotten better without needing to master new alien aspects so unlike far too many new software releases. Trainz's major strength? Trainz stability over time with gradual user-prompted improvements software upgrade to software upgrade. This is proved beyond doubt in its backward compatibility. Original Trainz assets developed for the Beta version along with a covey of model railroading enthusiasts, still find their way into innumerable routes with amazing regularity. There is much to choose from, and a lot to learn, but losing a favorite and having to unlearn the old operations and relearn new skills is not a likely circumstance a Trainzer needs to worry about. That keeps the users happy as they can focus on creating new and interesting assets, not on how to adapt to the irritating and unnecessary changes in a newest release because someone decided to change an user interface. Trainz Warts. Errors, Faults, Faulty assets, Bad Content, Faulty content are all synonyms in Trainz-speak for the same situation: An asset was always (rare) or "has become somewhat incompatible" with the newer Trainz release preference for , and needs some data adjustments. Some few exist that were uploaded and distributed with malformed components (usually a missing), or assets wherein one or more files got corrupted—often these represent first efforts by young Trainzers eagerly seeking to share and get feedback without the sense to find another way to share the beta-test file. Good News is these won't be found because you downloaded a quality route and they hitch-hiked into the download as dependencies... bad assets wouldn't find such a place! Since 2014, a ongoing DLS clean-up effort has been fixing assets that are actually faulty, and often updating those to newer version status. Similar vocal outcrys and letters to N3V management have spurred a much greater and obvious result in cutting off errors from ever download, by 'Cleaning up Faulty Content' on the Trainz Download Station itself. With over 300,000 assets in late 2014, this process, while long under way, will take a lengthy time. It is still be ongoing now years after the 'TANE Community Edition' was released in November (Beta version) and December 2014 (go fund me bonus package rewards-another Beta release) and the main release finally reached market in May 2015 * It is possible, Ian Woodmore's running on PEV's and Andi06's can cure the matter in the right hands. * If nothing else, someone with enough experience to be sure there is no solution will confirm "your 'this should be discarded' notion". * Always include the asset's kuid and your version, as well as the colloquial 'TS10' or whatever. "The more you help yourself, the more help you'll get and fastest when you ask when stuck. The failures are learning experiences too, and will stand you in good stead by building asset know-how and your confidence."}}
298896
75960
https://en.wikibooks.org/wiki?curid=298896
Solitaire card games/All in a Row
This game is akin to Golf and Tri Peaks. The game's objective is to put the entire deck into the foundation. The cards are dealt to the tableau in columns of four. The foundation (the "row") can be started from any column, and afterwards it is built with cards incremented or decremented from the previous card by one (where kings and aces wrap). Only the top cards of each pile in the tableau are available for play. The game ends if there are no more top cards that can be moved to the Black Hole. The game is won if all of the cards end up in the Black Hole.
298897
75960
https://en.wikibooks.org/wiki?curid=298897
Solitaire card games/Betsy Ross
This game is largely similar to Calculation except that there isn't a tableau, and there is only one waste pile instead of four Play. To begin the game, four cards (regardless of suit) are removed from the deck and placed in a row: an ace, a two, a three, and a four. Another four cards are placed in a row below those four cards: a two, a four, a six, and an eight. The table below shows how this is arranged: The cards on the second row compose the foundations themselves, while the cards on the row above denote how the cards should be built on the foundations. The foundation placed under the ace starts with the two and it is built in ones. The foundation under the two starts with the four and it is built in twos, and so on. The table below shows how the foundations should be built: The game is won when every card from the stock is built on the foundations. The game is lost, however, if it ends with cards still on the wastepile that cannot be transferred to the foundations.
298906
3327574
https://en.wikibooks.org/wiki?curid=298906
A-level Mathematics/AQA/MS2B
Discrete Random Variables. Expected Value. The expected value, shown by E(X) or sometimes referred to as the mean, can be calculated from a given probability distribution. It can be defined as <math>\sum x_ip_i</math> where <math>p_i</math> is the probability for value <math>x_i</math>. For example : A spinner has the probability distribution E(X) can be calculated by summing all the values times their respective probabilities : <math> (1 * 0.2) + (2 * 0.2) + (3 * 0.5) + (4 * 0.1) = 2.5 </math> E(X2) and E(X)2. At times, you will be required to calculate E(X2) and E(X)2 (For use in calculating the variance of a discrete random variable, for example) The value of E(X)2 is simply your value of E(X), squared. Using the same spinner from the previous example, our value of E(X)2 would be <math> 2.5^2 = 6.25 </math> E(X2) is a little more challenging, however. Suppose we are using the same spinner as before when we calculated E(X) and E(X)2. Calculating the expected value of <math>x ^ 2</math> means we must square all out values of <math>x</math> (which is the values the spinner can land on). This gives us the probability distribution From here, we can calculate our value for E(X2) the same as if we were calculating E(X) : <math> (1 * 0.2) + (4 * 0.2) + (9 * 0.5) + (16 * 0.1) = 7.1 </math> Note that our values for E(X2) and E(X)2 are not equal! Expected value for E(kX) and E(X + k), where k is a number. To calculate the value of E(kX), we need to move the value of k outside of the brackets. This leaves us with kE(X). E(X) can now be calculated normally, and then multiply by the value of K. For our spinner example, the value of E(2X) is 2E(X), where E(X) = 2.5. Our value for E(2X) must then be 5. To calculate the value of E(X + k), we need to move the value of k outside of the brackets again. We are left with E(X) + k and can calculate the value normally. For our spinner example, the value of E(X + 3) is E(X) + 3, which is 5.5. Variance. The variance of a discrete random variable is defined as the expectation of square minus the square of expectation or in other words : <math> Var(X) = E(X^2) - E(X)^2 </math>. In turn, the standard deviation(σ - Lower case greek letter sigma) of a discrete random variable is defined as the square root of the variance or : <math>\sqrt{Var(X)}</math> For our spinner example, the value of E(X2) that we calculated was 7.1 and our value for E(X)2 was 6.25. Therefore, our value for the variance of this spinner would be : <math> Var(X) = 7.1 - 6.25 = 0.85 </math> Our value for the standard deviation of the spinner would be : <math> \sqrt{0.85} = 0.9219544457 = 0.9220 (4. sf) </math>
298909
1015207
https://en.wikibooks.org/wiki?curid=298909
Topology/Cohomology
Introduction. "Cohomology" is a strongly related concept to homology, it is a contravariant in the sense of a branch of mathematics known as category theory. In homology theory we study the relationship between mappings going down in dimension from n-dimensional structure to its (n-1)-dimensional border. However, in cohomology the maps are reversed, and instead of chain groups we study groups of mappings from those groups. Although this description may imply that somehow cohomology theory is no more or less powerful than homology theory, this impression would be wrong, as it turns out that the cohomology of a space is often more powerful. Further knowing the homology of a space gives us the cohomology and the cohomology greatly restricts what homology a space can have. Hom(A,B) and Categorical Duals. This construction is at the core of category theory which has been successful in acting as a foundational theory for large parts of algebraic topology. For now what we need is the idea that the dual of a group <math>C</math> is <math>C^*=Hom(C,G)</math> and <math>(C^*)^*=Hom(Hom(C,G),G)</math> Cochain Complex. In homology theory we used the chain complex <math>\cdots C_n \xrightarrow{\partial_n} C_{n-1} \cdots</math> to form our homology groups <math>H_n(X)=Ker(\partial_n) / Im(\partial_{n+1})</math>. Using that as our inspiration, we form <math>\delta^n:C^*_{n-1}\to C^*_n</math> where <math>C^*_n=Hom(C_n,G)</math> for a given group G. Our cochain complex is as follows <math>\cdots Hom(C_n,G) \xrightarrow{\delta^n} Hom(C_{n-1},G) \cdots</math> To find our cohomology groups <math>H^n(X;G)</math> note that this is relative to our chosen group <math>G</math> so for a given method we have to choose <math>G</math> appropriately.
298911
274873
https://en.wikibooks.org/wiki?curid=298911
Topology/History
It could be said that mathematics in general owes its credibility to ancient Greece's Euclid. What is probably his most famous work, "Elements", revolutionized the concepts of geometry and mathematics as a whole through the presentation of a simple logical method. This method is summarized by Leonard Mlodinow: First, make terms explicit by forming precise definitions and so ensure mutual understanding of all words and symbols. Next, make concepts explicit by stating specific axioms or postulates so that no unstated understandings or assumptions may be used. Finally, derive the logical consequences of the system employing only accepted rules of logic, applied to the axioms and to previously proved theorems . Throughout its history, many mathematicians have influenced the development of topology. While Johann Benedict Listing is not credited with a memorable discovery in terms of the field of topology, he is still considered one of the founding fathers. This is because he gave topology its name. While he published very little on topology, he is remembered for "Vorstudien zur Topologie", which was the first document to use the word topologie (English: topology) to describe the field. He is also often credited with discovering the Möbius strip independently of August Ferdinand Möbius . The origins of topology date back to the eighteenth century and the , a problem of relative position without regard to distance . While this problem is often regarded as the birth of graph theory, it also inspired Euler's development of the topology of networks . Königsberg, now Kaliningrad, was founded in 1255 and became a prosperous seaport . The city resides on the banks of the Praegel, now Pregolya, River. Citizens could use seven bridges that crossed the Praegal, but the question of whether or not one could pass through the town and use each bridge exactly once would turn out to be the catalyst in the creation of the mathematical field of topology. Swiss mathematician Leonhard Euler would be the one to discover the answer was no. He determined that the graph defined by the location of the bridge was not what is now called a Eulerian graph . This solution entitled "The Solution of a Problem Related to the Geometry of Position" was submitted to the Academy of Sciences in St. Petersburg in 1735 . Euler is also well known for his research in the combinatorial qualities of polyhedra. He considered the edges (<math>e</math>), which he called "acies", the faces (<math>f</math>), or "hedra", and the vertices (<math>v</math>), called "angulus solidus". Euler realized the importance of these three properties claiming that they "completely determine the solid". His research resulted in the well-known "Polyhedral Formula": <math>v-e+f=2</math>. However, Euler's formula applies only to convex solids . In 1813 Antoine-Jean L'Huilier recognized this limitation of the formula and provided a generalization for a solid with <math>g</math> holes: <math>v-e+f=2-2g</math>. This was the first known result of a topological invariant . August Ferdinand Möbius was one of the main contributors of the topological theory of manifolds. In 1865, Möbius presented an article in which he decomposed several orientations of surfaces in polygonal nets. His most famous example was a non-orientable surface, which is now called the Möbius strip. The Russian born mathematician Georg Ferdinand Ludwig Philipp Cantor, the father of set theory, is another mathematician to whom we owe credit for topology. Concepts of set theory and cardinality are fundamental for the study of topology. Today, Cantor is a truly celebrated mathematician, especially considering that set theory and the idea of infinity do not seem to have a truss of mathematical ideas from which they could have been developed. Sadly, these ideas were not welcomed by a nineteenth century world, and Cantor spent many years of his adult life struggling with public criticism. A German mathematician by the name of David Hilbert described Cantor's discoveries in the infinite domain as an "astonishing product of mathematical thought" . In 1877, Cantor showed that the points on a 2-dimensional square had a one-to-one correspondence with the points on different line segments, and this caused others to begin asking questions about the idea of dimension, leading to the development of dimension theory . In the late 1800s and early 1900s, many mathematicians challenged themselves with more abstract problems. Maurice René Fréchet, a French mathematician, helped these mathematicians considerably in 1906. He explained that if a distance can be defined between two different mathematical entities, then real and complex number concepts can be applied . Fréchet, along with Schoenflies, Hausdorff, and others, would be one of the first to study "general topology" . Fréchet developed the theory of metric spaces, which was based on Cantor's theory of sets . German mathematician Felix Hausdorff followed in Cantor's footsteps with regard to set theory. In fact, Hausdorff was one of the first to teach set theory. In the summer 1901, he had 3 students . The idea that a topology possesses a lattice of open subsets had been around almost as long as the idea of topology itself, but Hausdorff was the first to emphasize the importance of these sets in defining topological concepts . French mathematician and physicist Henri Poincaré discovered his talent at an early age. In fact, he took first place in a national mathematics competition while he was still in school. Poincaré was the first to study Fuchsian groups, dealing mainly with their underlying geometry and topology . Poincaré is most famous for "The Poincaré Conjecture" which states the following: A compact smooth "n"-dimensional manifold that is homotopy equivalent to the "n"-sphere <math>S^n</math> must in fact be homeomorphic to <math>S^n</math>. One can think of a compact manifold as a manifold that lives in a finite region of <math>\mathbb{R}^n</math> for some <math>n</math> and that has no boundary . This conjecture would not be proven until 2003 by Grigory Perelman .
298923
3449386
https://en.wikibooks.org/wiki?curid=298923
Trainz/Driver
About Driver. Trainz Driver is the part of the Trainz program suite that allows you to control trains on a layout and is the" 'really doing things' (missions)" or interactive 'Gameplay' part of the software system, and the part the new Trainzer first becomes comfortable with. For some of us, it was the challenge and difficulty of a difficult task which originally hooked us on the game. Introduction. The Trainz Driver, a is the active gameplay mode of Trainz, and the one New Trainz users will experience first. It may surprise the new user—Driver is probably the least used of the three main Trainz run-time modules by the dedicated Trainz ethusiasts—who are more likely such as: 'World building' that map asset (route), and writing & debugging sessions (and their interactions with that Surveyor map), or researching and digitally modeling it's special assets—like historic landmark buildings and period street styles visible from around the rails proper. Most avid Trainzers are dedicated hobbyists who prefer and enjoy the many seductions of the creative side of the hobby to the entertainment side, not that we don't drive, just not all that often in relative terms. OTOH, there is a strong core of Trainzers with ten years of Trainzing who do nothing but drive. Trainz has the flexibility to satisfy all the shades of grey in between the two extremes. Operations and scenarios. Trainz Operations can be as simple as driving a light engine around a circle of track or as complicated as operating a large , with many different trains arriving for you to manage by giving the apropos commands hopping busily between consists, directing the railyard operations. Driver game play adventures, designed 'scenarios' in the standard sense the word are called as opposed to (the latter sense capitalized herein, an older tech) with titles depending on the technology of how they are constructed. But regardless of their classification and or identifying data base keywords in the , both are the "scripted interactive activities" using a special extensible programming language—making canned activities presenting Driving challenges Most such scenarios, of whichever data class, put you into the cabin of the locomotives and usually require you to "perform to some "task and standard" "(e.g. keep to a schedule, this type of drive is frequently scored, so you can beat your former best) or sort and place traincars in the correct places {{TG|switching|Switching scenarios}}) and many combinations of these in problem solving and skills hurdles. One might think driving a vehicle stuck between two rails with no way to turn to be simple, and perhaps easier than turning a supertanker—"banish the thought", for the Trainz physics model lends realism to the task which increases significantly in difficulty as that loco adds a few cars of a consist, and increases again and again every time more cars are added, or get loaded and changes again when they get unloaded. Trainz will keep you on your toes. Camera location, directional angles from that co-ordinate axis, and zoom are how we see inside the Trainz virtual world—they define a viewpoint from which we observe, all generated by the graphics engine. They place us within the game graphics. Cameras. }} The Mouse, mouse wheel, and keyboard arrow keys {{kpb|↑}}, {{kpb|←}}, {{kpb|→}}, & {{kpb|↓}} are used to position, zoom, and move this camera about including through objects. {{bullR }} Use {{kpb|RMBh}} and drag the tool pointer (cursor) right, left, up or down screen away from screen center to slide the camera around, or rotate the view angle. (Surveyor Options settings dependent, customize to suit self: two controls pan and rotation) {{bullR }} This lets us use {{kpb|LMB}} and clicks using the 'mouse pointer' (tool tip) to operate junctions, turn valves, turn the DCC Mode dial, operate slider controls, and generally toggle or select button options, and like actions. Cameras. There are four main camera modes available in Driver to allow you to enjoy your train from any angle. The external camera and free camera modes also allow tipping of the view—in effect letting you use your "galactic conqueror's anti-gravity belt" to fly and look down at the scene of interest. All but the tracking camera allow zooming using a mouse wheel rotation or key board. The modes are switchable by mouse click or hotkeys;the camera control buttons are situated on the top right of the Driver screen, just below the game time, current speed and speed limit indicators. From left to right and correspond to hotkeys {{kp|1}} to {{kp|4}}, they are, Cab View, External View, Tracking View and Free or Roaming View. Some scenario writers will lock out one or more of these, to increase the driving challenge. Coupling a consist, once you get a little practice from the external mode a bit above and Trainz and Trainz UTC didn't have the Free Camera mode at all. Trainz Controls Modes. In Driver it is possible to control trains in two ways: either DCC mode or Cab mode. When launching a driver session you are often asked which one to use, and then Trainz Driver operates in your chosen mode, what used to be—for the remainder of the session—but it is now possible to use the GUI Options Drop down menu to switch to the other mode (Session writer permitting). Both modes have a set of {{wp|hotkeys}} (cheat links to the page top-right) which allow keyboard control {{col|as well as mouse {{kp|RMBh+drag}} tool-tip|blue}} modes, which are arranged to be very intuitive and so the same key has a similar function in every mode and locomotive type. In fact, the major key controls are a double set—one for left handed and right handed drivers and flipped mouse modes. Driver controls, "and this should be no surprise given a bit of thought", and driver operations will vary somewhat in CAB mode; in particular when in a different locomotive and especially between steam locomotives and diesel-electric classes. Electric locos also have a somewhat modified throttle set-up, having (correctly modeling) real prototype throttles with 32 instead of the 8 throttle settings of a Diesel or diesel-electric. One seemingly, "but in time pressured situations, then not so trivial difference" is British locomotive and railway conventions have the operator on the left side of the cabin, drive with oncoming travel to their right side, and have signals on the left side of the tracks (normally to the outside on double trackage corridors). In contrast, the fast accelerating, quick stopping, short consists result in light rail and commuter locos ("people movers") which often have the operating controls centered, and the North American convention has the operator on the right side of the cabin, the signals right, and oncoming traffic normally passes on the left. Light rail and metro commuter services conventions are more situationally-driven for such railways often have tight turns and constrained track spaces (i.e. in tunneled caverns under cities!) so signalling can be found in such tight quarters any side, and travel directions depend more on the needs of connections with spur lines than on ideal main line practices, but with a nod to the national convention if, and where possible.<br> The British and American conventions were born in the age of Steam locomotives, and each convention also places normal trackage used for express travel to opposite sides and so also the signals relative to the direction of forward travel. DCC Mode. DCC mode is designed to operate with a less realistic physics model than Cab mode, and is useful for people who wish to have a play with a layout or manage a lot of trains without getting too in-depth in operations with one particular locomotive. Route builders will often tour their developing route to spot places which are in need of further attention, to see if that panorama is as stunningly beautiful as they'd intended. The more realistic and more challenging of the two driving modes in Trainz. {{TG|C|CAB Mode}}. Train consists in CAB mode operate very differently for the full physics of each traincar is simulated, as is the delay for the air brakes systems versus train lengths come into play and to begin to have significant effect, as does wheel slippage on the Locos, speed of acceleration, over heating the power plant, having failures and a host of other Real World physical modeling that is one of the attributes of Train simulators where once," 'for a long while,' "Trainz software separated itself ahead of other competing packages. In {{TL|Cab Mode}} the user can operate the driver's controls inside the 3D virtual cab by Click-N-Drag with the mouse, as well as use a superset of the hotkeys that are available in {{TL|DCC mode}}; most of which operate similarly but with a few important differences, and there are a few other differences driving locomotives with Diesel, Diesel-Electric, Electric, and Steam Loco prime mover technologies. Cab mode involves operating locomotives from their cabs and pulling levers and pressing switches for reversers, regulators, brakes and other controls, just like on a real locomotive. Instead of the DCC dial you get the Heads Up Display, which displays useful information such as throttle position, brake position and brake pipe pressure. Driving locomotives in cab mode is discussed in detail elsewhere in this Wikibook. See pages: Managing Multiple Trains. At the bottom left of the Driver screen in TRS2004 and above is a portrait of a man. He is the driver for your train. If you have placed multiple trains with {{TL|AI Driver}}s then you can click above your {{TG|C|consist's}} driver-portrait to expand the left bar to show the drivers for the other locomotives in the session and then double-clicks to select them and their trains. To operate two or more trains simultaneously is relatively straightforward - of course the easiest way is to simply set each locomotive up to run and leave them to it. The problem with this method is that the locomotives will simply travel until either the session ends, you stop them manually or they derail - they will not obey switches, signals or buffers. This is where your drivers come in handy. The most effective way to run multiple trains in a session is to give orders to the drivers. The long rectangular pane at the bottom of the Driver screen shows the orders for the currently selected driver. The symbol closest to the driver's portrait is his current order, with other orders progressing from left to right across the pane. To assign an order to your driver simply right-click in the order pane and choose an order from the menu. The most common orders are 'Drive To', 'Drive to Trackmark', 'Drive Via Trackmark' (In TS2009 and later the word 'Navigate' is used instead of 'Drive'), 'Load' and 'Unload'. When carrying out orders. the drivers will drive the train, keep to the speed limits and obey signals. They will also change switches (turnouts/points), provided that the path is clear and that no other driver is already in control of them. The degree of success to which drivers execute their orders is largely dependent on how effectively the layout is signalled and tracked. Whilst carrying out orders the driver is in control of the train - the DCC control or HUD is inaccessible. To go back to manual control tell your driver to 'stop train'; He will bring the train to a standstill and the DCC control or HUD will reappear. Scenarios and sessions. Driver Scenarios were modular interactive scripted software elements which acted as a adjunct to Trainz Driver, and provided the first game experience offering task challenges, scoring, and switching operations. Crude ability to load and load trains off-camera enabled distribution of cars and then picking up the same during the same gaming session; this involved substituting whole train consists, and was dependent upon the earliest cars equipped with {{TRC|queues}}s and their load sub-containers, as well as the first versions of the script libraries, now so much a part of Trainz. {{TL|Sessions}} supplanted use of scenarios as the {{TG|TrainzScript}} module was not directly integrated into the game, whereas the session editor was part of {{TL|Surveyor}}. Trainz Driver Sessions are scripted Driver activities that create an interactive game play episode with tasks, conditions, and standards set by the {{TL|Session creator}}. Sessions were introduced in {{TL|Trainz 2004}} as a better, easier user friendly replacement for {{TL|scenario}}s. Sessions are written using the {{TL|Session editor}} API in Surveyor, so were integrated into the game with mini-map features visible, and so easier to make than scenarios which used a separate {{TL|TrainzScript}} editor module. "main topic coverage: {{TL|Scenarios}}" Scenarios. Scenarios were available from {{TL|Trainz 1.3}} (Trainz updated to SP3) into {{TL|TS12}}{{efn|Scenarios were available from {{TL|Trainz 1.3}} (Trainz updated to SP3) into {{TL|TS12}}... "but based on personal experience", often older scenarios were unrunnable in newer Trainz releases, (though CM was happy to import them from the DLS then evaluate them with having faults) because of code incompatibilities. Changes (usu. mandatory values checks or defines [variable initializations]) not present in Trainz, Trainz UTC nor TRS2004—so had incurable faults in the eyes of newer {{TL|CM}}'s, since the Trainz Scenarios code was unavailable to tweak and fix). As John Citron would indubitably say of the programmer's: "They fixed it!", while meaning the opposite. Running these, are one reason to keep an older version of Trainz healthy and running. }}, but some older scenarios were sometimes defeated (unrunnable, though CM was happy to import them) by changes (usu. mandatory values checks or defines not present in Trainz, UTC nor TRS2004—so had incurable faults) in the script libraries of newer Trainz releases. Unlike their functional replacement, {{here|Sessions}}, writing a Trainz scenario relied upon the external Auran application {{TL|TrainzScript}}, and relied upon a much higher needed level of programming ability and knowledge. Support for Scenarios will not be continued after {{TL|TS12}}'s service packs. "main topic coverage: {{TL|sessions}}" Sessions. Sessions came about because the Trainz of the day had trouble keeping context when switched back and forth from the Scenario editor and Surveyor modules, where one had to track what was to happen step by step. The solution was to incorporate the necessary scripts as other {{TL|Rules}} configurable in the {{TL|Session Editor}} API added to TRS2004 and up, along with an expansion of the standard script libraries made part of Trainz after Trainz 1.3{{efn|A version by version differential comparison of these using freeware tool kdiff3 shows the script libraries have been astonishingly stable, Trainz release to Trainz release, with at worst, half a dozen script files showing changes. Explorations by computer engineer/author, Fabartus}}. This was not, and is still not an optimal solution, but it beats returning to Trainz Surveyor and only having a black screen displayed, or a disconnected mouse. Other Controls. Switches. Switches (also known as turnouts or points) are controlled by a large set of arrows over them, the current selected path (left or right) is shown by the green arrow. It is possible to have a maximum of 3 diverging tracks from a switch, and in that case there are three arrows. Click the set of arrows to select which path to take. By default, no current version of Trainz uses with animated turnouts with blades due to the way that track is laid in Surveyor. Hpwever third party-created animated turnouts are available from the DLS, although they work in a slightly different way. If you click a switch and the direction does not change, there could be one of three reasons why: Signals. Although not technically a control, signals are of course worth mentioning as a basic feature of Driver. Trainz features two basic types of signal, the modern colour light and the traditional semaphore. Signals are generally placed in 'blocks', but this is covered in more depth elsewhere in this wikibook. A feature of Driver is that if you hover your mouse over a signal aspect, Trainz will explain why the signal is showing that aspect. This is especially useful when a train reaches a signal at 'danger', as you can hover your mouse pointer over the signal to find out why it is at danger. Driver will then say for example, 'block is in use by another train'. If you then click on the red aspect, Driver will take you to the cause of it; for example in this case Driver will focus on the train currently fouling the block. The same system also works of the line is closed - Driver will take you to the closed turnout so that you can change it if required. Couple/Decouple mode. There is no overt control to enable coupling—it is always enabled unless a {{TL|session rule}} has the specific {{TN|traincar}} {{TN|coupler}}s locked. This rule is rarely used, and observed mainly in some older tutorials written by the old Auran Development 'Brew Crew'. Decoupling can be activated by mouse click on the decouple button or more speedily and easily by using the hotkey {{kp|CTRL|D}}. Should one enter decouple mode, using the mouse tooltip near a coupling of a pair of traincars will show that coupler pair in red with an exaggerated red icon; if one changes one's mind, or wishes to recouple some pair just decoupled by mistake, retoggle the coupling mode on, highlight the same coupler pairs and click to restore connections between the two traincars. Basic Driving in DCC Mode. By another name: ("simulated") {{BL|Digital Command Control}}. The simpler of the two driving modes in Trainz. The 'DCC' term comes from the world of model railways where DCC chipsets automate railcar behaviors, but in Trainz, really applies to the "{{BL|dial type controllers}}" used in electric powered Model Railroading, and copied as a mode in the game/simulator. In Trainz, the term refers to a simulated "dial controller" or" the 'power pack' "that will be somewhat familiar to anyone that has played with a typical (non-Lionel) model railroad such as {{wp|H.O. Scale}} trainsets from toy and department stores. This can be moved with {{kb|LMB+drag}} operations to rotate clockwise or anti-clockwise, which with a standard set up speed-up more in the forwards-direction, or speed-up more in the reverse-direction. If the dial is half rotated, or some large rotation, the opposite rotation just slows the train, the top, or twelve-O'clock position corresponding to no throttle, which in DCC will also be 'stop-the-train', as well. In CAB mode ("and assuming a standard {{wp|QWERTY keyboard}} arrangement") the keys in the "four slanted-vertical columns" under the {{kp|1}}—{{kp|4}} keys all have something to contribute to driving a trains Locomotive. In DCC, only those under the {{kp|2}} key, the slanted column {{kp|W}}, {{kp|S}} and {{kp|X}} do anything to control train motion. These have near equivalent throttle effects in CAB mode, so getting the two confused is unlikely. Last but not least, the DCC Mode greatly simplifies the physics of driving a long train, but does not protect you from spastic activities. While juking the dial control to high accelerations may work fine in the tutorials and some "Easy" class scenarios, there are game physics {{TL|Rules}} under the control of the session writer, and quite a few of those look with frowny faces on spastic behaviors which would, in a real train, break couplers or cause a derailment. So long as a session is gamed in an arcade physics level, rapid changes in the accelerations from dial changes are not likely to bite you, however... if you form that "bad habit", be prepared to spend time replaying a scenario you'd almost finished then messed up by such maladroit insensitivity to real train behavior. You've been warned. The surest way to have success with this simulator is to always drive with care, meaning accelerate carefully in small bites—and think two to five steps ahead. Sometimes the later, means working it out on paper first. (My, how old fashioned! "But if you fail to plan, you are planning to fail!") Other Screens. Map View. Map View shows a 2d birds-eye representation of the layout and all consists on it. It can be useful for learning a new layout or navigating a complex one—provided you develop the skills to interpret the symbols, notations, and more usefully, know how to toggle them on and off, so things cluttering the view disappear and stop confusing the view. The Map View button on the bottom right of the Driver screen, but if you're like most of us, will find the hotkeys {{kp|M}} or {{kp|CTRL|M}} far more useful. The keys operate as toggles, so shuts it off as well; the {{kp|CTRL|M}} hotkey opens and closes the mini-map in Surveyor, so using "that" becomes habit for route builders since M has other uses "('Move' something)" in various Surveyor tools and doesn't work there for maps. Key Map controls, all act as toggles: Waybills. In TRS2004 and later, the {{TL|interactive industries}}, when they get below a certain stock level, send a waybill (shipping order) to the waybill menu which can be opened by mouse click in the lower right corner of the screen. These show you where products are most needed, and can be used in free play.
298926
3371989
https://en.wikibooks.org/wiki?curid=298926
Adventist Adventurer Awards and Answers/Sand
Sing a Bible song about sand.. The Wise Man Built His House The wise man built his house upon the rock The wise man built his house upon the rock The wise man built his house upon the rock And the rain came tumbling down Oh, the rain came down And the floods came up The rain came down And the floods came up The rain came down And the floods came up And the wise man's house stood firm. The foolish man built his house upon the sand The foolish man built his house upon the sand The foolish man built his house upon the sand And the rain came tumbling down Oh, the rain came down And the floods came up The rain came down And the floods came up The rain came down And the floods came up And the foolish man's house went "splat!" [clap hands once] So, build your house on the Lord Jesus Christ Build your house on the Lord Jesus Christ Build your house on the Lord Jesus Christ And the blessings will come down Oh, the blessings come down As your prayers go up The blessings come down As your prayers go up The blessings come down As your prayer go up So build your house on the Lord Jesus Christ. Make your own colored sand.. Supplies: Preparation Scoop a little sand into plastic baggies. Add around 10-15 drops of food coloring. Seal the baggie and shake it up. Let the sand dry and have fun playing. We left our sand right in the open baggies and let it dry overnight. If you wanted to play right away, you could spread the sand out on a tray and it would dry much sooner. Create at least 2 sand art projects.. Sand art bottles: Picture frames Pre-glued pictures Make a sand castle Clothespin butterfly
298938
46022
https://en.wikibooks.org/wiki?curid=298938
Python Programming/Idioms
Python is a strongly idiomatic language: there is generally a single optimal way of doing something (a), rather than many ways: “There’s more than one way to do it” is "not" a Python motto. This section starts with some general principles, then goes through the language, highlighting how to idiomatically use operations, data types, and modules in the standard library. Principles. Use exceptions for error-checking, following EAFP (It's Easier to Ask Forgiveness than Permission) instead of LBYL (Look Before You Leap): put an action that may fail inside a <code>try...except</code> block. Use context managers for managing resources, like files. Use <code>finally</code> for ad hoc cleanup, but prefer to write a context manager to encapsulate this. Use properties, not getter/setter methods. Use dictionaries for dynamic records, classes for static records (for simple classes, use collections.namedtuple): if a record always has the same fields, make this explicit in a class; if the fields may vary (be present or not), use a dictionary. Use <code>_</code> for throwaway variables, like discarding a return value when a tuple is returned, or to indicate that a parameter is being ignored (when required for an interface, say). You can use <code>*_, **__</code> to discard positional or keyword arguments passed to a function: these correspond to the usual <code>*args, **kwargs</code> parameters, but explicitly discarded. You can also use these in addition to positional or named parameters (following the ones you use), allowing you to use some and discard any excess ones. Use implicit True/False (truthy/falsy values), except when needing to distinguish between falsy values, like None, 0, and [], in which case use an explicit check like <code>is None</code> or <code>== 0</code>. Use the optional <code>else</code> clause after <code>try, for, while</code> not just <code>if</code>. Imports. For readable and robust code, only import modules, not names (like functions or classes), as this creates a new (name) binding, which is not necessarily in sync with the existing binding. For example, given a module <code>m</code> which defines a function <code>f</code>, importing the function with <code>from m import f</code> means that <code>m.f</code> and <code>f</code> can differ if either is assigned to (creating a new binding). In practice, this is frequently ignored, particularly for small-scale code, as changing a module post-import is rare, so this is rarely a problem, and both classes and functions are imported from modules so they can be referred to without a prefix. However, for robust, large-scale code, this is an important rule, as it risks creating very subtle bugs. For robust code with low typing, one can use a renaming import to abbreviate a long module name: import module_with_very_long_name as vl vl.f # easier than module_with_very_long_name.f, but still robust Note that importing submodules (or subpackages) from a package using <code>from</code> is completely fine: from p import sm # completely fine sm.f Operations. b, a = a, b To access an attribute (esp. to call a method) on a value that might be an object, or might be <code>None</code>, use the boolean shortcircuiting of <code>and</code>: a and a.x a and a.f Particularly useful for regex matches: match and match.group(0) Use <code>in</code> for substring checking. Data types. All sequence types. Use <code>enumerate</code> if you need to keep track of iteration cycles over an iterable: for i, x in enumerate(l): Anti-idiom: for i in range(len(l)): x = l[i] # why did you go from list to numbers back to the list? Python sequences do have an <code>index</code> method, but this returns the index of the first occurrence of a specific value in the sequence. To find the first occurrence of a value that satisfies a condition, instead, use <code>next</code> and a generator expression: try: x = next(i for i, n in enumerate(l) if n > 0) except StopIteration: print('No positive numbers') else: print('The index of the first positive number is', x) If you need the value, not the index of its occurrence, you can get it directly through: try: x = next(n for n in l if n > 0) except StopIteration: print('No positive numbers') else: print('The first positive number is', x) The reason for this construct is twofold: For mutable sequences, use <code>del</code>, instead of reassigning to a slice: del l[j:] del l[:i] Anti-idiom: l = l[:j] l = l[i:] The simplest reason is that <code>del</code> makes your intention clear: you're truncating. More subtly, slicing creates another reference to the same list (because lists are mutable), and then unreachable data can be garbage-collected, but generally this is done later. Deleting instead immediately modifies the list in-place (which is faster than creating a slice and then assigning it to the existing variable), and allows Python to immediately deallocate the deleted elements, instead of waiting for garbage collection. In some cases you "do" want 2 slices of the same list – though this is rare in basic programming, other than iterating once over a slice in a <code>for</code> loop – but it's rare that you'll want to make a slice of a whole list, then replace the original list variable with a slice (but not change the other slice!), as in the following funny-looking code: m = l l = l[i:j] # why not m = l[i:j] ? You can create a sorted list directly from any iterable, without needing to first make a list and then sort it. These include sets and dictionaries (iterate on the keys): l = sorted(s) l = sorted(d) Tuples. Use tuples for constant sequences. This is rarely necessary (primarily when using as keys in a dictionary), but makes intention clear. Strings. Use <code>in</code> for substring checking. However, do "not" use <code>in</code> to check if a string is a single-character match, since it matches substrings and will return spurious matches – instead use a tuple of valid values. For example, the following is wrong: def valid_sign(sign): return sign in '+-' # wrong, returns true for sign == '+-' Instead, use a tuple: def valid_sign(sign): return sign in ('+', '-') To make a long string incrementally, build a list and then join it with <code>"</code> – or with newlines, if building a text file (don't forget the final newline in this case!). This is faster and clearer than appending to a string, which is often "slow." (In principle can be <math>O(nk)</math> in overall length of string and number of additions, which is <math>O(n^2)</math> if pieces are of similar sizes.) However, there are some optimizations in some versions CPython that make simple string appending fast – string appending in CPython 2.5+, and bytestring appending in CPython 3.0+ are fast, but for building Unicode strings (unicode in Python 2, string in Python 3), joining is faster. If doing extensive string manipulation, be aware of this and profile your code. See Performance Tips: String Concatenation and Concatenation Test Code for details. Don't do this: s = " for x in l: # this makes a new string every iteration, because strings are immutable s += x Instead: s = ".join(l) You can even use generator expressions, which are extremely efficient: s = ".join(f(x) for x in l) If you do want a mutable string-like object, you can use <code>StringIO</code>. Dictionaries. To iterate through a dictionary, either keys, values, or both: for k in d: for v in d.values: for v in d.itervalues: for k, v in d.items: for k, v in d.iteritems: Anti-patterns: for k, _ in d.items: # instead: for k in d: for _, v in d.items: # instead: for v in d.values FIXME: <code>dict.get</code> is useful, but using <code>dict.get</code> and then checking if it is <code>None</code> as a way of testing if the key is in the dictionary is an anti-idiom, as <code>None</code> is a potential value, and whether the key is in the dictionary can be checked directly. It's ok to use <code>get</code> and compare with <code>None</code> if this is not a potential value, however. Simple: if 'k' in d: # ... d['k'] Anti-idiom (unless <code>None</code> is not a potential value): v = d.get('k') if v is not None: # ... v Use <code>zip</code> as: <code>dict(zip(keys, values))</code> Modules. re. Match if found, else <code>None</code>: match = re.match(r, s) return match and match.group(0) ...returns <code>None</code> if no match, and the match contents if there is one.
298964
134830
https://en.wikibooks.org/wiki?curid=298964
Introduction to Philosophical Logic/Predicate Calculus
Predicate calculus, also called Logic Of Quantifiers, that part of modern formal or symbolic logic which systematically exhibits the logical relations between sentences that hold purely in virtue of the manner in which predicates or noun expressions are distributed through ranges of subjects by means of quantifiers such as “all” and “some” without regard to the meanings or conceptual contents of any predicates in particular. Such predicates can include both qualities and relations; and, in a higher-order form called the functional calculus, it also includes functions, which are “framework” expressions with one or with several variables that acquire definite truth-values only when the variables are replaced by specific terms. The predicate calculus is to be distinguished from the propositional calculus, which deals with unanalyzed whole propositions related by connectives (such as “and,” “if . . . then,” and “or”). The traditional syllogism is the most well-known sample of predicate logic, though it does not exhaust the subject. In such arguments as “All C are B and no B are A, so no C are A,” the truth of the two premises requires the truth of the conclusion in virtue of the manner in which the predicates B and A are distributed with reference to the classes specified by C and B, respectively. If, for example, the predicate A belonged to only one of the B’s, the conclusion then could possibly be false—some C could be an A. Modern symbolic logic, of which the predicate calculus is a part, does not restrict itself, however, to the traditional syllogistic forms or to their symbolisms, a very large number of which have been devised. The predicate calculus usually builds upon some form of the propositional calculus. It then proceeds to give a classification of the sentence types that it contains or deals with, by reference to the different manners in which predicates may be distributed within sentences. It distinguishes, for example, the following two types of sentences: “All F’s are either G’s or H’s,” and “Some F’s are both G’s and H’s.” The conditions of truth and falsity in the basic sentence types are determined, and then a cross-classification is made that groups the sentences formulable within the calculus into three mutually exclusive classes—(1) those sentences that are true on every possible specification of the meaning of their predicate signs, as with “Everything is F or is not F”; (2) those false on every such specification, as with “Something is F and not F”; and (3) those true on some specifications and false on others, as with “Something is F and is G.” These are, respectively, the tautologous, inconsistent, and contingent sentences of the predicate calculus. Certain tautologous sentence types may be selected as axioms or as the basis for rules for transforming the symbols of the various sentence types; and rather routine and mechanical procedures may then be laid down for deciding whether given sentences are tautologous, inconsistent, or contingent—or whether and how given sentences are logically related to each other. Such procedures can be devised to decide the logical properties and relations of every sentence in any predicate calculus that does not contain predicates (functions) that range over predicates themselves—i.e., in any first-order, or lower, predicate calculus. Calculi that do contain predicates ranging freely over predicates, on the other hand—called higher-order calculi—do not permit the classification of all their sentences by such routine procedures. As was proved by Kurt Gödel, a 20th-century "Moravian-born American mathematical logician", these calculi, if consistent, always contain well-formed formulas such that neither they nor their negations can be derived (shown tautologous) by the rules of the calculus. Such calculi are, in the precise sense, incomplete. Various restricted forms of the higher-order calculi have been shown, however, to be susceptible to routine decision procedures for all of their formulae.
298966
3332924
https://en.wikibooks.org/wiki?curid=298966
Biomedical Engineering Theory And Practice/Biomaterials
Introduction. The United States National Institute of Health Consensus Development Conference defined a biomaterial as ‘‘Any substance (other than a drug) or combination of substances, synthetic or natural in origin, which can be used for any period of time, as a whole or as a part of a system which treats, augments, or replaces any tissue, organ, or function of the body’’ (Boretos and Eden, 1984). Biomaterials area has grown over for 50 years. Biomaterils as a field uses ideas from medicine, biology, chemistry, materials science and engineering. In addition, biomaterials researchers should consider ethics,law and the health care delivery system. Biomaterials can be divided into metals, ceramics, polymers, glasses, carbons, and composite materials. Table 1 shows a few applications for synthetic materials in the body. It contains many materials that are often classified as “biomaterials.” Metals, ceramics, polymers, glasses, carbons, and composite materials are listed in this table. Such materials are used as molded or machined parts, coatings, fibers, films, foams,fabrics, liquid and powder. Table 2 presents the size of the commercial market for biomaterials and medical devices.The global biomaterial market would reach $88.4 billion by 2017 from $44.0 billion in 2012. The biomaterial market grows continually and globally because of increased investiments, funding and grant by government, active collaboration, technology advancement, increasing application of biomaterials and growing number of elderly people. Table 1. Types of Biomaterials, characteristics and applications Table 2. Biomaterials and Healthcare market Reference. A Brief review: Biomaterials and their application, Amogh Tathe et al,Int J Pharm Pharm Sci, Vol 2, Suppl 4, 19­23 Biomaterials by Joon B. Park, Roderic S. Lakes
298970
75960
https://en.wikibooks.org/wiki?curid=298970
Bartending/Title page
Wikibooks Bartending Guide A Collaborative Guide to Bartending That Anyone Can Edit Authors. This book was written by many people, they are too innumerable to list out individually by hand. Each page of this book has a tab in the upper right hand corner labelled "View History". Clicking on that tab will allow you to see a list of every change that has been made to that page and who made the change, effectively allowing you to view a list of all authors.
298986
31195
https://en.wikibooks.org/wiki?curid=298986
Project Management/PRINCE2/Controlling a Stage
Projects under PRINCE2 are divided into "stages", which are logical parts of projects each of which are completed before the next can begin. Controlling a Stage deals with the inputs and outputs of a single stage: construction/receival and issuing of work packages; tracking and reporting progress through the stage; and capturing and acting on issues. The key activities of this process are explained below.
298987
31195
https://en.wikibooks.org/wiki?curid=298987
Project Management/PRINCE2/Glossary
An input or output that is created from a Product Description. A product can be tested, and may be tangible or intangible. The description of a product, defining its characteristics, purpose, and quality criteria. Produced as soon as a requirement for a product is agreed upon.
298988
396820
https://en.wikibooks.org/wiki?curid=298988
Biomedical Engineering Theory And Practice/Biomaterials/4.1. Introduction
The National Institutes of Health Consensus Development Conference defined a biomaterial as ‘‘Any substance (other than a drug) or combination of substances,synthetic or natural in origin, which can be used for any period of time, as a whole or as a part of a system which treats, augments, or replaces any tissue, organ, or function of the body’’ (Boretos and Eden, 1984).
299017
453220
https://en.wikibooks.org/wiki?curid=299017
Crowdsourcing/Gamification/Recognition and badging in Wikipedia
Within Wikipedia, three types of "achievements" can get recognition: Each of these results in badges that users can display publicly, but which are optional. Content that passes a formal quality review (including Good Article, Featured Article, or Featured Picture) reflects well on the users who create or improve it. Users can add badges to their profile to show which quality content they have been involved with. This helps the user’s reputation and credibility within the site. MediaWiki software records many measures of user activity: edits to articles, comments to other users and so on. So Wikipedia "could" have been configured to post a colourful badge on a user’s profile announcing each thousand edits they make, or every hundred vandal edits reverted. Instead, it mostly relies on users voluntarily giving each other badges. Barnstars are informal awards that users can give each other. They reward good work in a particular topic area or good deeds such as reverting a great amount of vandalism. Since Barnstars come from other contributors, not automatically from software, the practice encourages positive interactions between users and a feeling of real appreciation. The positive incentivising effect of barnstars has been confirmed by experiment. It would be technically possible for these barnstars to automatically appear in a trophy cabinet for each user. In reality, the contributor chooses whether or not to show off these awards. This is how differences in intrinsic/extrinsic motivation is handled: those who want to socially signal their achievements can build trophy cabinets; others who are not interested in awards can treat badges as just a personal message of thanks. Contributors with a competitive mindset can be extremely productive, so long as they do not interfere with or discourage others. Then again, a project built exclusively around competition will repel the intrinsically-motivated people. Some of the awards internal to Wikipedia direct competitive instincts towards collaboration with others: this is visible in some Barnstars, such as the Barnstar of Diplomacy or the Teamwork Barnstar. Getting articles or images reviewed is partly an individual achievement but requires working constructively with a reviewer and responding to feedback. Hence many of the badges and awards that are available within Wikipedia, along with other initiatives such as mentorship between users, incentivise friendly co-operation. This is not to say that Wikipedia has the ideal mix, since more could be done to make it friendly and welcoming. Service Awards are badges users can add to their profiles to recognise a total number and duration of edits. Although it is a rough measure of seniority, edit count is largely meaningless as a measure of quality: an individual edit can fix a typo, introduce a typo, or add ten thousand words of excellent encyclopedic text. The service awards include “Experienced editor”, “Veteran editor” and similar, or alternatively “Grognard Mirabilaire”, “Tutnum”, and similar deliberately ludicrous terms. So depending on their attitudes to their edit count, Wikipedians have three options for displaying their experience as editors: collect service awards, ignore them as irrelevant, or collect silly service awards. As of January 2014, about 500 English-language Wikipedians describe themselves as “Veteran Editors” versus about 100 for the equivalent “Tutnum”.
299018
453220
https://en.wikibooks.org/wiki?curid=299018
Crowdsourcing/Gamification/Summing up
While contributors appreciate attribution, and can earn status from the quality or quantity of their work, explicit gamification and badging are not essential to successful crowdsourcing. In fact they are potentially disastrous if enforced when the project’s goal is one that contributors already admire, such as free education or advancing science. Status and badges motivate some people, and creating and awarding badges is an opportunity for creative expression and social interaction. Designed well, badges can direct competitive instincts into collaborative behaviour. Then again, personalities differ: badges that appeal to one contributor might seem offensively infantile to another.
299019
453220
https://en.wikibooks.org/wiki?curid=299019
Crowdsourcing/Gamification
Some computer games have an addictive quality which comes from having many “achievements”, frequently reminding players of their progress. Each new achievement gives a sense of accomplishment for the player, and since the steps are relatively minor, the next reward is just around the corner. The term “gamification” applies when a large task is broken into many relatively minor, achievable goals which are salient in the form of points or trophies. We might ask if successful crowdsourcing requires gamification; for instance, is Wikipedia gamified? The answer is actually not straightforward.
299020
453220
https://en.wikibooks.org/wiki?curid=299020
Crowdsourcing/In practice/Division of labour for a scholarly database
Improving a highly specialised scientific database might seem the sort of task that needs to be kept to experts rather than opened up to the general public. In fact, it fits the earlier description of tasks that benefit from crowdsourcing. It can be broken down into many small, independent steps, each of which can be checked individually, and at least some of the necessary skills are widely available. A crowdsourcing project does not have to leave everything to the public but can invite them to build on something created by professionals. The Pfam protein families database, used extensively by biochemists, has benefitted from a bi-directional linking with Wikipedia. Encyclopedia articles have been populated with information from Pfam and corrections or expansions can be fed back into it. This puts the Pfam data where it will be very easily found and used by researchers, students and other users, with links to the official site for verification. It also puts any errors where they can be seen and acted upon. The Pfam maintainers realise that minor errors can occur in a large database, but they use that as a reason to make the data as visible as possible rather than as an argument against publication. Changes to the Wikipedia articles are not copied immediately into the database, but are collected by a script and manually checked. The Pfam maintainers write: With a more controversial topic (such as current politicians) the proportion of vandal edits would be much higher, but protein families are stable enough that anyone editing an article is at least trying to improve it. So there is a role for the public to play in maintaining a scholarly database. Since “the public” includes highly qualified people, this role is not restricted to low-value contributions. Collaboration between the professional Pfam community and interested members of the public would be impossible to arrange prospectively, but thanks to wiki technology and shared data they can work in parallel.
299026
453220
https://en.wikibooks.org/wiki?curid=299026
Crowdsourcing/In practice
This section looks at some crowdsourcing projects related to research and education and how they illustrate the principles described in earlier sections. The next section will look in more detail at crowdsourcing related to digital media.
299027
793
https://en.wikibooks.org/wiki?curid=299027
Crowdsourcing/Restoration and reuse of images
The educational and research value of images or other digital media can be enhanced by additional work: Image collections often have content and expertise but not the capacity to do this in detail for every one of their images. So it makes sense to work with a community of volunteers who appreciate such images and care about enhancing them. Wikimedia Commons hosts the digital media files that are embedded in Wikipedia and the other Wikimedia sites. Its content is freely reusable, either because its copyright has lapsed or it has been given a relevant free licence. It has reached many millions of files, partly as a result of partnerships with museums, libraries, and other cultural institutions. Its purpose is not just to host media but also to enable crowdsourced improvements.
299028
453220
https://en.wikibooks.org/wiki?curid=299028
Crowdsourcing/Restoration and reuse of images/Keeping everybody happy
Not everybody wants images to be restored. Many who want to use an image in a paper or blog post will prefer a cleaned-up version. On the other hand, some researchers are primarily interested in exactly what is removed by image restoration: the texture of the paper, the degradation of an old photograph. Wikimedia Commons' solution to this trade-off is to allow access to multiple versions. This is an example of non-paternalism: giving choices to the user rather than making them on their behalf. There are two senses in which Commons gives access to multiple versions of a file. A slightly changed file can be uploaded as a new version: the software will show the most recent by default but older versions are still available. , shared by the British Library, has nicely vivid colours as a result of digital restoration. The older, unrestored versions are still linked under "File history". More substantial changes can be uploaded as a separate version with a link back to the original. Freedom to do this comes naturally from the free licences. A major change might be a drastic restoration or it might create a derivative work, for example from a group photo. The Commons page for each file shows where the file is embedded on other Wikimedia sites, including Wikipedia. Daily view statistics for Wikipedia pages are also public. This data is all machine-readable, allowing the creation of software tools that track total views of a batch of images. This is how the British Museum can demonstrate more than 27,000 uses of its images across Wikimedia by the start of 2014 and how the Archivist of the United States was able to announce one billion hits during 2013 on the National Archives’ content shared through Wikimedia.
299029
453220
https://en.wikibooks.org/wiki?curid=299029
Crowdsourcing/Restoration and reuse of images/Image restoration
Restoration can include cropping, fixing colour balance, contrast, orientation and hiding damage. It is achievable with widely available software, including free software such as GIMP. This is an ideal task for crowdsourcing. Volunteers will not work systematically through an entire archive but will pick the images they find interesting or which are most likely to be valued by the wider community. Wikipedia volunteer Durova’s motivation is clear when she writes about restoring a picture of the Wright Brothers’ first flight from an original provided by the US Library of Congress: This may contrast with motivations of professionals, who want to get a whole batch of work finished. The trade-off for professionals is that crowdsourcing might speed up restoration of the whole batch, but working efficiently might require them to concentrate their own effort on the less interesting parts of the collection.
299030
453220
https://en.wikibooks.org/wiki?curid=299030
Crowdsourcing/Restoration and reuse of images/Contextualisation
Getting digital content reused in research and education is partly about giving it a useful context, which could be an article explaining its significance, or a worksheet that describes an educational use. Contextualisation is potentially an enormous amount of work, unless you realise that academics and informal learning communities seek photographs, diagrams and other media for their materials. They will provide the context if the media are suitable and if the barriers to doing so are minimal. Lowering the barriers for these audiences means lowering the legal barrier by giving them permission in advance to copy and reuse: this is what free licensing achieves. It also means putting content where they are looking for it. These are arguments for sharing through Commons in addition to the content holder’s own site. Wikipedia articles are the clearest example of a context that brings digital media to a large audience, and this is a key reason for sharing material via Commons. Just because an image is relevant to a topic does not necessarily mean it can be embedded in the Wikipedia article. This will come down to the consensus of Wikipedians working on that article about how many images are needed and which have sufficient relevance, technical quality, and aesthetic appeal. If you have a portrait of a historical figure whose Wikipedia article lacks a picture, then there will be no problem adding it. On the other hand, if you have an image related to Henry VIII of England, getting it into that already-developed article is going to require discussion with the article's contributors.
299031
453220
https://en.wikibooks.org/wiki?curid=299031
Crowdsourcing/Restoration and reuse of images/Summing up
Restoration and improvement of digital media are ideal applications for crowdsourcing. Wikis and free licensing can connect media collections with remote institutions or hobbyists who want interesting content to work on. Wikimedia Commons offers these benefits as well as the crucial ability to embed media in Wikipedia pages. To get these benefits, content holders need the courage to open up their content and metadata for editing by others.
299032
793
https://en.wikibooks.org/wiki?curid=299032
Crowdsourcing/Restoration and reuse of images/Improving image metadata
Once an image is uploaded to Commons, its description and metadata are open for editing by anyone, just like Wikipedia. Possible changes include: The more discoverable files are on Commons, the more likely they are to be found. So it is strongly advisable to include a full catalogue description and meaningful categories when the files are uploaded. There are Wikimedia noticeboards and mailing lists which can be used to raise awareness of media collections that are being shared. A set of images shared by the US Library of Congress included one from the aftermath of the Wounded Knee Massacre. That image showed "scattered debris" according to the catalogue description. With the image substantially cleaned up by a Commons volunteer, the "debris" was identifiable as four corpses of Sioux people. The Library's description was updated to reflect this, as was the programme of an exhibition featuring the photograph. Other media. Similar restoration and improvement can happen with audio, and free software for editing and clean-up is widely available as it is for images. An example is an interview with British politician Tony Benn which has been cleaned up for use in , fixing the frequency balance and removing pauses. Commons has relatively little audio content and its requirement for unrestricted formats means that OGG and FLAC audio files are used rather than the more familiar (but patent-encumbered) MP3.
299033
453220
https://en.wikibooks.org/wiki?curid=299033
Crowdsourcing/Further reading
Although aimed at biomedical projects, the rules here are abstract enough to be broadly applicable: This article is aimed at experts who want to improve Wikipedia, but many of the points apply to lay contributors and to working with other collaborative communities: There are several books about how to contribute to Wikipedia as an individual user. This one is more about the cultural factors that contribute to Wikipedia’s success: In this popular book, Clay Shirky looks at crowdsourcing in more depth: For specific ideas on how academic and cultural projects can work with Wikimedia projects, see created as part of the Jisc/Wikimedia UK partnership.
299037
134830
https://en.wikibooks.org/wiki?curid=299037
Digital Electronics/Building Circuits with Breadboards
One of the best ways to learn how digital circuits work is to build them with an inexpensive solderless breadboard. They typically come in three sizes
299043
453220
https://en.wikibooks.org/wiki?curid=299043
Professionalism/Medical Ghostwriting
Medical ghostwriting is a covert practice among the medical community by which the authors who significantly contribute to medical literature are not given credit, and the authors listed have not substantially contributed to the paper. Introduction. Medical ghostwriting typically involves the use of hired writers from marketing companies to write research papers based on data provided from pharmaceutical companies. These hired authors are not given actual credit on the paper. Instead, credit is given to a respected researcher or physician in the field who has little or no involvement in the research or writing process. This practice appears to be primarily used by larger pharmaceutical companies seeking to strategically use these published medical papers to promote the use of their products. The Ghostwriting Culture. Ghostwriting's presence in the medical industry can be largely attributed to an ambivalent culture that does little to prevent it. There are four major participants in the ghostwriting industry. Ghostwriters are the true authors behind many medical research papers. Honorary authors are the medical professionals who sign their name to papers despite having minimal participation in the paper's creation. The pharmaceutical industry hires the ghostwriters and recruits the honorary authors for these papers. And ultimately medical journals receive these papers to be published. Ghostwriter's Perspective. The ghostwriters often view themselves as someone who is simply helping a researcher get their papers published quickly and in the best journals. One writer remarks, "I believe I provide a service to those who need assistance presenting their findings to the scientific community. If you have a great study but present it badly you won’t be seeing it anytime soon in NEJM." It is also viewed by some as an honorable job because they can write better than researchers and these papers will eventually be used to help people. Honorary Author's Perspective. Honorary authors are often asked by pharmaceutical companies to simply attach their name to ghostwritten papers, but this is not the only method used. Sometimes these authors are asked to be research consultants, leading to unaware physicians attaching their names to papers they had nothing to do with. Many honorary authors attach their names to ghostwritten papers for authorship credit. In the research community it is very important to have published papers, and in some cases, researchers have a quota of papers they need to reach. As a result, some researchers are willing to attach their names to papers they had little to do with. There is also a lack of strict guidelines on how to handle ghost-authorship in many medical research communities. The ultimate effect is a culture that sees ghostwriting as something common, and accepted. "“The section on ghostwriting in WAME's code of ethics was "fairly thin and not very explicit," ... it was unclear that it would cover this type of authorship. There wasn't anything that specifically addressed the relationship between pharmaceutical industry's medical-education companies and ghost authorship.” -Martha Gerrity, co-editor of the Journal of General Internal Medicine" Pharmaceutical Company's Perspective. Pharmaceutical companies see research papers not just as a tool to disseminate information, but also as a means to advertise a drug they want to sell on the market. Ghostwriters are told to write in a way that favors the company's product, "My job was to draft a monograph that would profile the product's benefits, one of which, according to the client, was that although the bleeding could be severe, it was at least something that women could anticipate." Pharmaceutical companies also frequently attempt to publish many papers about the same research but with different honorary authors, making the case for using their drug even stronger. See Marketing of pharmaceuticalsfor more information. Journal's Perspective. Historically journals have been lax on ghostwriting guidelines, partially leading to ghostwriting's current prevalence. Most medical journals lack specific rules on ghostwriting. However, journals are starting to adopt stricter standards for what they allow and what constitutes ghostwriting. "More than 600 biomedical journals have adopted guidelines for responsible and accountable authorship " Journals that do claim to have strict guidelines on authorship place the blame on the authors. The chief editor of PLoS Medicine, Ginny Barbour, claimed, “we are a journal that has very tough policies, very explicit policies on ghostwriting and contributorship, and I feel that we’ve basically been lied to by authors.” In general, journals treat ghostwriting as a problem of the authors rather than a problem with their own standards. What Makes an Author. The International Committee of Medical Journal Editors (ICMJE) considers authorship based on four criteria: An author should meet all four criteria to have their name placed on the paper, otherwise they should just be acknowledged in the paper. All authors must be able to identify the contributions of each of their co-authors, and should be confident in the integrity of each co-author. Authorship Requirements Among Top Medical Journals. "Science" requires that all authors of a manuscript are listed, and have seen and approved the manuscript, its content and its submission to the journal. Any changes made must be approved by all authors. Also, authors must be able to explain their contributions to the manuscript. "Science" also requires that all funding sources and affiliations of the authors are noted so there is no source of bias. "Nature" journals do not require all authors to sign the letter of submission. Changes to the author list need to be approved by a letter signed by all authors. In the manuscript, authors need to write a statement outlining the contributions of each author. The senior member of the group needs to accept responsibility for the author's contributions, as well as making sure that the data used is preserved and retrievable. The "New England Journal of Medicine" (NEJM) follows the criteria stated by the ICMJE. Authors must sign a statement attesting that they fulfill the requirements. Also, any change in authorship must be approved by all authors. Comparisons to plagiarism. The concept of ghostwriting is essentially plagiarism. Scientists are putting their name on articles they did not write. If students did this it would be considered plagiarism. However, the comparison isn't black and white. Some ghostwriters participate in the entire writing process, researching, writing and editing the paper. Some will only write while some will solely edit. Some ghostwriters do get acknowledged by the authors while others remain completely anonymous. The comparison comes down to what medical journals consider when proper and legal consent was given to leave the ghostwriters name off the manuscript. Case Study: Adriane Fugh-Berman. Adriane Fugh-Berman is an Associate Professor of Pharmacology and Physiology at the Georgetown University Medical Center, and an expert of botanical medicine and dietary supplements. In 2004 she was asked by a medical education and communications company to author a review article about the interactions of warfarin, an anticoagulant, with herbs. The invitation mentioned that the study was funded by a drug company, which to Fugh-Berman had no clear link to the drug or herbal products. She asked for more information about the company, and heard nothing back until August 24, 2004 when she received a completed draft of the article with her name on the cover page. The marketing company requested that she review the article and return any comments or changes she wanted to make. She was also informed that the sponsoring company had a drug that would compete with warfarin, and wanted to prime the market for the arrival of their new drug. The Corporate Coauthor. Fugh-Berman responded to this company's request with an emphatic no, and reminded herself to keep an eye out for this article. However, a few months later the article ended up on her desk again, but this time she was being asked to peer-review it for the "Journal of General Internal Medicine". She immediately notified the journal's editors that this article had been ghostwritten, and urged the editors not to publish it. The journal complied, and instead published an article written by Fugh-Berman, "The Corporate Coauthor". This article was one of the first exposés on the medical ghostwriting culture. It describes her interactions with the marketing company and exposed the process by which honorary authors are asked to be authors of such papers. Fugh-Berman endorses two methods to combat ghostwriting. First, journals should follow the example of the "American Family Physician", which requires authors to fill out a questionnaire with specific situations to determine conflicts of interest. With this system authors have to actively lie to hide an unacknowledged author, "You can lie, but you can't say that you didn't understand the question. And I think that that's important. ... You don't want people deciding for themselves what are relevant conflicts of interest because nobody thinks their conflicts of interest are relevant." Second, Fugh-Berman advocates a public database that contains known conflicts of interest and ethical transgressions of authors. This database could then be used by medical journals when trying to determine if an article is ghostwritten or has a corporate sponsor. Pharmed Out. In 2006 Adriane Fugh-Berman helped to found an advocacy group called "PharmedOut". The mission of this organization is to advance evidence-based prescribing of drugs and to encourage physicians to choose unbiased sources for continued medical education. PharmedOut has published several articles that highlight marketing methods that pharmaceutical companies used to influence prescribing, and hosts an annual concert to discuss the role of the pharmaceutical industry in the medical community. Other Cases of Medical Ghostwriting. Woo Suk Hwang. Dr. Woo Suk Hwang, a South Korean scientist was linked to a paper with fraudulent authorship. In the two papers Hwang published in "Science" it was found that the data had been fabricated and thus the papers were retracted. A coauthor on this paper, Dr. Gerald Schatten, a scientist from the University of Pittsburgh tried to clear his name from this scandal, but was found guilty of "scientific misbehavior." He confirmed that he had helped write the manuscript, but didn't participate in the data collection and was rarely in contact with the other scientists. Investigators concluded that Schatten deserved credit for being an author, however assuming senior authorship was a mistake. By putting his name on this paper, Schatten enhanced his reputation and received substantial personal financial benefit in the short-term. But Schatten neglected his responsibilities of maintaining the integrity of the paper and assuming that all coauthors approved the manuscript for submission, and this came back to hurt him in the long-run. Theory of Beneficial Skepticism. The Theory of Beneficial Skepticism is the general lesson that Adriane Fugh-Berman can teach about what it means to be a professional. It is impossible to prepare for every situation that will occur in a professional setting. Fugh-Berman had never been asked to be an honorary author before the warfarin-herb case in 2004, so she was not familiar with the methods and motivations of the medical education and communications companies. However, when approached she dealt with the situation as a skeptic. She asked for more information about the drug company and their reason for sponsoring the article, and refused to respond until she received a satisfactory response. Fugh-Berman teaches us that approaching unfamiliar situations with skepticism allows us to discern the underlying motivations of participants and to make informed ethical decisions.
299046
3304668
https://en.wikibooks.org/wiki?curid=299046
International Postage Meter Stamp Catalog/Turkey
=Turkey= A – Frank with scalloped single-line frame line B – Frank with simulated-perforation outer frame line and straight inner frame line C – Franks with straight frame lines along all sides D – Frank without outer frame line and with town mark attached E – Frank with frame lines at top and bottom only, top line always with indented semicircles F – Frank with frame lines at top and bottom only, top line always straight G – Frank with complete simulated-perforation outer frame line and no inner frame line NOTE: For more detailed information about the meter stamps of Turkey, see "Die Absender- und Postfreistempel der Türkei", by Otto Gleixner, self-published 1995, Seefeld, Germany. <br> GROUP A: Small upright frank with scalloped single-line outer border. <br> <br> A1. Francotyp “C” (MV), 1937. [$200] Star and Crescent in circle at top, “TÜRK POSTALARI” at bottom. Only about ten examples known. TM: SC V/F: 000 GROUP B: Double frame lines with simulated-perforation outer border and straight-line inner border. <br> SUB-GROUP BA: Star and crescent in field at right center. <br> <br> <br> BA1. Universal “MultiValue” (MV), 1954. Nearly square frank inscribed “KURUS” above boxed “POSTALARI” at bottom. Text in frank is sanserif. Star and crescent face left towards the center of the frank. A. Large crescent, 9 mm tall B. Small crescent, 6.5 mm tall TM: SC, DC V/F: 000(½) 000 0000 00000 <br> BA2. Universal “MultiValue” (MV). As Type BA1B but text in frank with serifs. TM: DC V/F: 000 0000 a. Printed in black <br> BA3. Universal “MultiValue” (MV). ["Scarce"] As Type BA1 but crescent faces right towards the outside of the frank. TM: DC V/F: 00000 BA4. Postalia (MV), 1955. Frank smaller than Types BA1 and 2, and value figures small and narrow. Star and crescent face left towards the center of the frank. A. Wide spacing between TM and frank. Large crescent 9 mm tall. Right frame line stops at star and crescent field B. Wide spacing between TM and frank. Small crescent 6 mm tall. Right frame line turns inward at star and crescent field Ca. Narrow spacing between TM and frank, crescent field 11 x 10.5 mm with 13 lines Cb. As "Ca", crescent field 9 x 10.5 mm with 13 lines Cc. As "Ca" and "Cb", crescent field 9 x 9 mm with 10 or 11 lines TM: DC, SC V/F: 000 0000 <br><br><br><br><br> <br> BA5. Postalia (MV). As Type BA4Cc but the star and crescent face right. TM: DC, BIC V/F: 0000 00000 <br> BA6. Postalia (MV). As Type BA5 “LIRA” at lower left above “POSTALARI” unboxed. Crescent faces right. TM: BIC V/F: 0000 <br> BA7. Postalia (MV). Similar to Types BA5 and BA6 but with narrow field of dashes added left of the value figures. “LIRA” is centered above boxed “POSTALARI”. TM: DC V/F: 0000 BA8. Pitney Bowes-GB “Automax” (MV), 1966. Square frank wider than previous BA types. “KURUS” above boxed “POSTALARI” at bottom. Crescent faces left. M# with “P.B.” prefix below frank. TM: DC V/F: =000 =0000 <br> <br> BA9. Francotyp “Cc” (MV), 1967. “KURUS” above boxed “POSTALARI” at bottom. Crescent faces center of frank. A. Narrow frank, 24 x 30 mm B. Wide frank, 28 x 30 mm TM: DC V/F: 000 ◆000 0000 00000 <br> BA10. Francotyp “Cc” (MV). ["Scarce"] As Type BA9 but Crescent faces right. “LIRA” centered above boxed “POSTALARI” at bottom. TM: DC V/F: ◆000 SUB-GROUP BB: Star and crescent in field at left center. <br> <br> BB1. Postalia (MV). Tall, narrow frank Small crescent faces right into center of frank. A. Wide spacing between TM and frank ("Scarce, not shown") B. Narrow spacing TM: DC V/F: 0000 00000 BB2. Pitney Bowes-GB “Automax” (MV), 1986. Large, square frank. Crescent faces right into center of frank. With “LIRA” above boxed “POSTALARI” at bottom. TM: DC V/F: =000 =0000 SUB-GROUP BC: Star and crescent in field at top right. <br> <br> BC1. Sima (MV), 1971. ["Scarce"] Frank 26 x 29 mm. Wide spacing between TM and frank. TM: DC V/F: 000 <br> BC2. Satas “Rotary” (MV), 1961. Frank similar to Type BC1 but smaller. Medium spacing between TM and frank. Date figures tall or short. A. Frank 23-24 x 25-26 mm B. Frank 25 x 27 mm ["Scarce"] TM: DC V/F: ★00 ★000 a. With hour figure between TM and frank b. With backwards “F” symbol left of value figures BC3. Satas “Baby” (MV), 1965. As Type BC2 but even smaller, 21 x 25 mm. Date figures large. TM: SC V/F: ★00 SUB-GROUP BD: Without star and crescent. <br> <br> BD1. Francotyp-Postalia (MV), 1988. “LIRA” in field at right center. “POSTA” alone at bottom. The size of the frank can vary from somewhat narrow ("shown") to nearly square. TM: DC, BIC V/F: 000 0000 <br> BD2. Francotyp-Postalia (MV), 1986. Similar to Tytpe BD1 but narrow field at right containing only lines. “LIRA” centered above “POSTA” at bottom. TM: DC V/F: 000000 GROUP C: Frank with straight frame lines at all sides. <br> <br> <br> <br> C1. Postalia (MV). Upright frank with large panels at top and bottom. Country name in top panel, "POSTA" in bottom panel. A. Fixed zero and “LIRA” centered in line field at right B. Two fixed zeros above “LIRA” in line field at right TM: DC V/F: 00000 000000 C2. Hasler “Mailmaster” (MV). Very wide frank. "LIRA" imbedded in lines at right of value figures. Without M#. TM: DC V/F: 0000+0 C3. Neopost “Electronic” (MV). Square to slightly wide frank with panels at top and bottom. Side frame lines open opposite top panel. Country name at top, "POSTA" at bottom. A. "LIRA" below one fixed zero at right B. “LIRA” below three fixed zeros at right C. “Kr” at right Without M#. TM: DC V/F: ≋000 (+fixed zeros) C4. Unidentified, probably Neopost (digital). Frank wider than tall. Value figures near bottom of frank with large "Kr" at right. Found in both blue and red. TM: DC a. With time of day above the date inside the town mark. V/F: 0000 C5. Frama "EPS3000" (MV). Frank wider than tall with closely spaced horizontal line fields at the sides. Value figures centered with "Kr" embedded in line field at right. Without meter number but with "F" ("for Frama"?) at bottom left. TM: DC V/F: 0000 GROUP D: Town mark and frank joined, without outer border. <br> D1. Pitney Bowes “R” (MV), 1959 or earlier. ["Rare"] Town mark and value box joined by horizontal line field containing star and crescent. “KURUS at bottom of value box. One machine known, “P.B. 1". TM: SC V/F: ≋00 : NOTE: Proofs are known from 1953. They are more common than postally used examples. The proofs have star and crescent facing right and have dashes at the sides of the meter number. D2. Pitney Bowes “5300” (MV). ["Scarce"] Similar to Type D1 but slightly wider design with larger value box fully enclosed except for space at top containing "KURUS". Country name is not as tall as with C1. M# with “P.B. prefix below star and crescent. TM: SC V/F: ≋.00 ≋00 : GROUP E: Frank with frame lines at top and bottom only, top line always with indented semi-circles. <br> SUB-GROUP EA: Star and crescent at right. <br> EA1. Pitney Bowes-GB “5000” (MV), 1977. ["Scarce"] Value figures are lowered in relation to date figures. Field of horizontal lines between TM and value box with “KURUS”/M# below. Crescent faces left. TM: DC V/F: ≋000 a. Solid bar in place of M# EA2. Pitney Bowes-GB “6500” (MV). Value figures are at same level as date figures. M# with “P.B.A” prefix. “KURUS” below value figures. Crescent faces left. TM: DC, BIC, or SC with box surrounding date V/F: ≋000 EA3. Pitney Bowes-GB “6500” (MV). As Type EA2 but Crescent faces right. “LIRA” below value figures. TM: DC, or SC with box surrounding date V/F: ≋000 SUB-GROUP EB Star and crescent at left. <br> EB1. Pitney Bowes-GB “5000” (MV), 1976. ["Scarce"] Star and crescent facing right between TM and value box. "POSTALARI" below upper panel line. Value figures are lowered in relation to date figures. “KURUS”/M# below. TM: DC V/F: ≋000 a. Solid bar in place of M# EB2. Pitney Bowes-GB “5000” (MV). As Type EB1 but “POSTALARI” breaks upper panel line. “LIRA” alone at lower left. Without M#. TM: DC V/F: ≋000 EB3. Pitney Bowes-GB “6500” (MV). Value figures are at same level as date figures. "POSTALARI" at lower right. Crescent faces right. M# with “P.B.A” prefix. A. Line field at right intact, "KURUS" below value figures ("not shown") B. As A but with fixed zero imbedded in line field at right C. As A but with "LIRA" below value figures TM: DC, SC with box surrounding date V/F: ≋000 ≋0000 SUB-GROUP EC: Without star and crescent. <br> <br> <br> EC1. Pitney Bowes-GB “5000” (MV). Value figures lowered in relation to date figures. Center space between the horizontal line fields is 17 mm wide “POSTA” above value figures. “LIRA” inside line field at right. Without M#. A. Line field at right contains only “LIRA” A B. Line field at right contains fixed zero and “LIRA” C. As B, but “LIRA” lowered with fixed zero above it TM: DC V/F: ≋000 ≋000+0 <br> <br> EC2. Pitney Bowes-GB “5000” (MV). As Type EC1 but center space between the horizontal line fields is wider at 22 mm, and line fields at sides are narrower. Without M#. A. Line field at right contains only “LIRA” B. Line field at right contains two fixed zeroes above “LIRA” C. Line field at left contains "POSTA". Line field at right contains two fixed zeroes. "LIRA" breaks lower frame lines TM: DC, SC V/F: ≋000 ≋000+00 <br> <br> EC3. Pitney Bowes-GB “6500” (MV). Similar to Type EC2 but value figures at same level as date figures. Seven horizontal lines at left below country name. “POSTA” at bottom center. “LIRA” inside line field at right. Without M#. A. “LIRA” alone in line field at right intact B. Fixed zero next to “LIRA” in line field at right C1. Two fixed zeros at right; “LIRA” below zeros with line above and below. No line above “POSTA”. C2. As C1 but no line above “LIRA”. Complete line above “POSTA”. TM: SC with box around date, DC V/F: ≋000 ≋000+0 ≋000+00 EC3.1. Pitney Bowes-GB “6500” (MV). Similar to Type EC3 but nine horizontal lines at left below country name. Fixed zero and “LIRA” in line field at right. TM: SC with box around date V/F: ≋000+0 EC4. Pitney Bowes-GB “6600” (MV). Large frank with widely spaced lines at the sides “POSTA” embedded in line below value figures. “LIRA” left of value figures. Zero imbedded in line field at right. TM: DC V/F: ≋0000 EC5. Pitney Bowes-GB “A900” (MV), 1994. Short frank with narrowly spaced lines at the sides. A. “POSTALARI” below value figures, “LIRA” in line field at left. B. “LIRA” below value figures, “POSTA” in line field at left, fixed zero in line field at right. Value figures large. Without M#. TM: DC V/F: ≋0000 ≋00000 <br><br><br><br><br> EC6. Pitney Bowes-GB “EasyMail” (digital). Two columns of numbers at left of town mark. “POSTA” left of value figures. "LIRA" centered at bottom below value figures. M# with "PB" prefix below "POSTA" TM: DC V/F: ≋000000 GROUP F: Frank with frame lines at top and bottom only, top line always straight. <br> SUB-GROUP FA: Star and crescent at left center. <br> FA1. Hasler “Mailmaster” (MV), 1981. Line field at right 5 mm wide. “KURUS” below value figures. ME with “H” prefix at lower left. TM: DC A. Line field at right intact B. Fixed zero imbedded in line field at right ("not shown") V/F: 00000 00000+0 FA2. Hasler “Mailmaster” (MV). Similar to Type FA1 but wider line field at right (9 mm) with narrower center opening. “LIRA” below value figures. M# with “H” prefix. TM: DC V/F: 0000 00000 SUB-GROUP FB: Without star and crescent. <br> <br> <br> <br> <br> <br> <br> <br> GROUP G: Frank with complete simulated-perforation outer frame line. <br> G1. Pitney Bowes-GB "6900” (MV), 2005 or earlier. Horizontal frank with “TURKIYE CUMHURIYETI” at top and "YKr" at bottom. Hash marks at left contain "POSTA" at center and "PB" at bottom. Narrower hash marks are at right. Without meter number. TM: DC V/F: ≋000 G2. Pitney Bowes (MV), 2010 or earlier. Frank similar in design to Type G1 but with "Kr" at right of value figures and nothing below. Single column of numbers at left of the TM. Meter number with PB prefix at lower left. TM: DC containing time above date V/F: 00000 <br> Return to main catalog → ../ Return to top → Turkey
299089
2712960
https://en.wikibooks.org/wiki?curid=299089
Handbook of Management Scales/Integration
Integration (alpha = 0.80, CR = 0.80). Description. Three relational competencies were identified: communication, cooperation and integration. Definition. Integration refers to the process of combining efforts to integrate supplier and customer information and inputs into internal planning (Swink et al., 2007). Items. To what extent do the statements apply to the relationship of your company with your suppliers and customers? (1 – strongly disagree; 7 – strongly agree): Integration (alpha = 0.90). Description. Based on learning theory and multilevel thinking, measures were developed and validated for four types of team learning processes, as “team learning originates in individual intuition, is amplified through interpretation and integration, and manifests itself at the team level via the codification of collective cognition and action”. Definition. Integration is defined as “the process of developing shared understanding among individuals and of taking coordinated action through mutual adjustment” (Crossan et al., 1999, p. 525).
299095
23543
https://en.wikibooks.org/wiki?curid=299095
Trainz/Overview of Trainz releases
A brief outline of Trainz history. Trainz was developed over 3–4 years beginning about 1996 in consultation and in collaboration with various model railroading clubs by Australian game developer , which had by then established itself as one of the premier gaming companies in Australia under the stewardship of chief programmer Greg Lane, Paul Olsen in graphics development and Graham Edelsten as CEO. The latter two are still officers running the Auran company. Trainz was released nearly three-quarters-a-year after but it was the latter which gained the attention and affections of the long time Railroading hobbiest communities for it allowed what MSTS did not, an ease and power in developing a layout as one liked and desired. It's early releases were a pale shadow of what was to come but when released in late 2001 the input of interested model railroaders quickly lead to a succession of improvements and extended capabilities. Improve and conquer. This became a pattern, accumulate major changes whilst setting up the evolution and making incremental changes and bug fixes through releases, each making a stable code software step. Trainz service packs unlike many commercial packages are free, and so the improvements continued steadily through releases in 2005 and Trainz 2006, which leveraged the stable and hard won game engine and features such as interactive industries being released with a powerful database manager, upload manager and download manager known as , the father of today's CM utility which is little changed but for refinements. MSTS by contrast has barely been updated, and only difficult to develop 3rd party expansions have improved on the base product designed to run on the Pentium cpu processors of the early 2000s. Troubles in Trainzland. In 2005–2007 Auran over extended developing a different computer game (Fury) and Trainz and Auran both survived bankruptcy proceedings but the game now was managed under which renewed Trainz development leading to the "World Builder Edition, and has continued to grow and evolve beating back several competitors over the ensuing decade years. Auran Development Pty Ltd became Auran Holdings Pty Ltd after the bankruptcy reorganization and still retains the rights to the program. The original chief engineer, and indeed most of the professional staff were lost during the dark months, and even the busy web site went dark for five weeks. N3V quickly hired back staff members willing to return, notably chief programmer Chris Bergmann who had joined the company in 2000. Bergmann can be frequently found inteacting on the Auran web board as 'Windwalkr'. (e.g. Google "{{Col|Site:forums.auran.com Windwalkr|blue") Localisation. Multilingual language support has been built into Trainz since Trainz 1.3, increased in the best selling {{TL|TRS2004}} and expanded in the hugely popular {{TL|TRS2006}} (TR06) release in 2005. Next followed a handful of regionally focused releases including three in English based on the TR06 technologies which focused enclosed content featuring "regional routes of interest", albeit with some changes to unimportant graphics (skins) but some incremental alterations of data definitions portending events to come. These differed from TRS2004 and TRS2006 in the philosophy of bundled included content—instead of a potpourri of widely varying routes and their regional assets, the regionally focused routes were {{TG|S|scenery}} and {{TG|T|trackside asset}} biased by their thematic localizations, and tended to include less assets overall but perhaps more or interest to those also developing virtual railways in that same world region. Other TRS2006 spinoffs were European regional releases: ({{TL|TRS2007}} (France & French speaking lands) and {{TL|TRS2007|2008}} (German and Eastern European routes) which expanded the product's language offerings and soon added a rich supply of Europe and Eastern European routes. This same time span saw three English releases known as Trainz Classics ({{TL|TC1&2}} and {{TL|TC3}})—offerings partnered with third party content creators which delivered "professional quality" routes with a bounty of specialty assets and also offered slightly new technologies (V2.7 & V2.8, game engine advancements are usually first included in an English release), when N3v Games assumed control of publication and development. Year 2008 saw and end to 'game stagnation' with the release of {{TL|TS2009|TS2009: World Builders Edition}} sporting improvements mainly in Surveyor, 2009 the evolved dual-mode {{TL|TS2010|TS2010: Engineer's Edition}}, {{TL|TS2012|TS2012: 10th Anniversary Edition}} (aka TS12 or Trainz Simulator 2012) which is the latest Microsoft Windows installment in the franchise and was released in April of 2011 and it's SP1 upgrades in late 2011. In 2012–2013 N3V games released Trainz MAC under the iOS operating system as well as tablet computer versions. Two targeted releases are in development for 2014, the later a full 64bit version with highly upgraded graphics known now as TANE or T:ANE, "Trainz: A New Era" with funding in part supported by a modest amount raised by KickStarter pledges.
299104
46022
https://en.wikibooks.org/wiki?curid=299104
International Postage Meter Stamp Catalog/Uganda
=Uganda= <br> <br> 1. Neopost "Frankmaster" / "305" (MV). [$20] Frank with simulated perforation outer border and inner box surrounding value figure. Leaves at sides of value box. “POST/ PAID” centered at bottom. Spacing variable between TM and frank. M# with “N” prefix. TM: DC V/F: 00·00 <br> 2. National Cash Register (MV). [$150] Post Office stamp. Frameless design printed on orange-yellow labels, never directly to covers. Date at top above “UGANDA” underlined and curved with groups of three arcs at sides. Value figures in center and impression counter number at right. At bottom is ID letter “A” between arcs with “KAMPALA” at bottom. Only Meter “A” known. V/F: –00.00
299114
396820
https://en.wikibooks.org/wiki?curid=299114
Topology/Eilenberg–Steenrod axioms
The Eilenberg–Steenrod axioms are properties that homology theories of topological spaces have in common. The quintessential example of a homology theory satisfying the axioms is singular homology, developed by Samuel Eilenberg and Norman Steenrod, which we have already met. One can define a homology theory as a sequence of functors satisfying the Eilenberg–Steenrod axioms. The axiomatic approach, which was developed in 1945, allows one to prove results, such as the Mayer–Vietoris sequence, that are common to all homology theories satisfying the axioms. If one omits the dimension axiom (described below), then the remaining axioms define what is called an extraordinary homology theory. Extraordinary cohomology theories first arose in K-theory and cobordism theory. Formal definition. The Eilenberg–Steenrod axioms apply to a sequence of functors <math>H_n</math> from the category of pairs ("X", "A") of topological spaces to the category of abelian groups, together with a natural transformation <math>\partial : H_{i}(X, A) \to H_{i-1}(A)</math> called the boundary map (here "H""i" − 1("A") is a shorthand for "H""i" − 1("A",∅)). The axioms are: <math> \cdots \to H_n(A) \to^{\!\!\!\!\!\! i_*} H_n(X) \to^{\!\!\!\!\!\! j_*} H_n (X,A) \to^{\!\!\!\!\!\!\partial_*} H_{n-1}(A) \to \cdots.</math> If "P" is the one point space then "H"0("P") is called the coefficient group. For example, singular homology (taken with integer coefficients, as is most common) has as coefficients the integers. Consequences. Some facts about homology groups can be derived directly from the axioms, such as the fact that homotopically equivalent spaces have isomorphic homology groups. The homology of some relatively simple spaces, such as "n"-spheres, can be calculated directly from the axioms. From this it can be easily shown that the ("n" − 1)-sphere is not a retract of the "n"-disk. This is used in a proof of the Brouwer fixed point theorem. Dimension axiom. A "homology-like" theory satisfying all of the Eilenberg–Steenrod axioms except the dimension axiom is called an extraordinary homology theory (dually, extraordinary cohomology theory). Important examples of these were found in the 1950s, such as topological K-theory and cobordism theory, which are extraordinary "co"homology theories, and come with homology theories dual to them.
299116
75960
https://en.wikibooks.org/wiki?curid=299116
Solitaire card games/Bisley
Gameplay. Here is the method of game play: The game is won when all cards end up in the foundations. It actually does not matter where the ace and king foundations of each suit would meet and how many cards the ace and king foundations of each suit will have. At the end of one game for example, the K♠ is the only one on its foundation while the rest of spade cards are built on the A♠; the A♣ remains unbuilt because all club cards are built on the K♣; the A♥ is built up to 4♥ while the K♥ is built down to 5♥; and the A♦ is built up to 8♦ while the K♦ is built down to 9♦. In fact, the ace and king foundation of a suit can meet anywhere.
299139
396820
https://en.wikibooks.org/wiki?curid=299139
Elementary Spanish/ser estar
Adjectives:. Emotion. happy: alegre / felíz sad: triste mad: enojado/a busy: ocupado/a relaxed: relajado/a nervous: nervioso/a calm: tranquilo/a worried: preocupado/a afraid: asustado/a confused: confundido/a tired: cansado/a shy: timido/a sick: enfermo/a anxious: ansioso/a bored: aburrido/a annoyed: irritado/a overwhelmed: abrumado/a depressed: deprimido/a stressed: estresado/a Physical. tall: alto/a short: bajo/a thin: delgado/a fat: gordo/a intelligent: inteligente smart: listo/a nice: amable good: bueno/a mean: malo/a old: viejo/a young: joven funny: divertido/a funny: gracious/a
299154
520910
https://en.wikibooks.org/wiki?curid=299154
Structured Query Language/Managing Indexes
Indexes are a key feature of all SQL databases. They provide quick access to the data. Therefore almost all implementations support a CREATE INDEX statement. Nevertheless, the CREATE INDEX statement is not part of the SQL standard! The reason for this is unknown. Possibly it is a deliberate decision against all implementation issues. Or it results from the wide range of different syntaxes realized by vendors and the lack of finding a compromise. On this page, we offer some basic ideas concerning indexes and the syntax which is common to a great number of implementations. CREATE [UNIQUE] INDEX <index_name> ON <table_name> (<column_name> [, <column_name>]); The Concept of Indexes. DBMSs offer quick access to data stored in their tables. One might think that such high-speed access is due to the fast hardware of modern computers: millions of CPU cycles per second, I/O rates in the range of milliseconds, access to RAM within micro- or nanoseconds, etc. That is true, but only partly so. Instead, the use of intelligent software algorithms, especially in the case of handling large amounts of data, is the dominant factor. Consider a request to the DBMS to determine, whether or not a person with a certain name can be found in a table with 1 million entries. With a primitive, linear algorithm, the system has to read 500,000 rows (on average) to decide the question. The binary search algorithm implements a more sophisticated strategy that answers the question after reading 20 rows or less. In this case, this choice of algorithm leads to a factor of 25,000 in performance. In order to really grasp the magnitude of this improvement, you may want to multiply your salary by 25,000. Admittedly this comparison between the linear access and the binary search algorithm is a little bit simple. First, DBMS usually read blocks containing multiple rows and not single rows. But this didn't change the situation. If a block contains 100 rows, modify the above example from 1 million to 100 million rows. Second, the binary search algorithm assumes that the data is ordered. This means that during data entry, there is an additional step for sorting the actual input into the existing data. This applies only once and is independent of the number of read accesses. In summary, there is additional work during data entry and much less work during data access. It depends on the typical use of the data whether the additional work is worthwhile. The index is an additional storage holding data that is copied or deducted from the original data in the table. It consists only of redundant data. What parts make up the index? In the common case of a binary search strategy, the index holds the original values of the tables column plus a back-reference to the original row. In most cases, the index is organized as a balanced tree with the column's value as the tree's key and the back-reference as additional information for each key. The binary search algorithm is one of many options for building indexes. The common characteristics of indexes are that they: consist only of redundant information; use additional resources in the sense of CPU cycles, RAM or disc space; and offer better performance for queries on large data sets. In the cases of small tables or tables with many indexes, it is possible that the disadvantages (in performance or resource usage) outweigh the benefits of using an index. Basic Index. If an application retrieves data by a certain criterion - e.g., a person name for a phone book application - and this criterion consists of a tables column, this column should have an index. CREATE INDEX person_lastname_idx ON person(lastname); The index has its own freely selectable name - "person_lastname_idx" in this example - and is built on a certain column of a certain table. The index may be defined and created directly after the CREATE TABLE statement (when there is no data in the table) or after some or a huge number of INSERT commands. After it is created, the DBMS should be in the state to answer questions like the following quicker than before. SELECT count(*) FROM person WHERE lastname = 'Miller'; The index may be used during the evaluation of the WHERE clause. The DBMS has the choice between - on the one hand - reading all "person" rows and counting such where the lastname is 'Miller' or - on the other hand - reading the index (possibly with binary search) and counting all nodes with value 'Miller'. Which strategy is used depends on a lot of decisions. If, for example, the DBMS knows that about 30% of all rows contain 'Miller', it may choose a different strategy than if it knows that only 0.3% contains 'Miller'. A table may have more than one index. CREATE INDEX person_firstname_idx ON person(firstname); What will happen in such a situation to a query like the following one? SELECT count(*) FROM person WHERE lastname = 'Miller' AND firstname = 'Henry'; Again, the DBMS has more than one choice to retrieve the expected result. It may use only one of the two indexes, read the resulting rows and look for the missing other value. Or it reads both indexes and counts the common back-references. Or it ignores both indexes, reads the data and counts such rows where both criteria apply. As mentioned it depends on a lot of decisions. Multiple Columns. If an application typically searches in two columns within one query, e.g. for first- and lastname, it can be useful to build one index for both columns. This strategy is very different from the above example, where we build two independent indexes, one per column. CREATE INDEX person_fullname_idx ON person(lastname, firstname); In this case the key of the balanced tree is the concatenation of last- and firstname. The DBMS can use this index for queries which ask for last- and firstname. It can also use the index for queries for lastname only. But it cannot use the index in queries for firstname only. The firstname can occur at different places within the balanced tree. Therefore it is worthless for such queries. Functional Index. In some cases an existing index cannot be used for queries on the underlying column. Suppose the query to person names should be case-insensitive. To do so the application converts all user-input to upper-case and use the UPPER function to the column in scope. -- Original user input was: 'miller' SELECT count(*) FROM person WHERE UPPER(lastname) = 'MILLER'; As the criterion in the WHERE clause looks only for uppercase characters and the index is built in a case-sensitive way, the key in the balanced tree is worthless: 'miller' is sorted at a very different place than 'Miller'. To overcome the problem, one can define an index, which uses exactly the same strategy as the WHERE criterion. CREATE INDEX person_uppername_idx ON person(UPPER(lastname)); -- not supported by MySQL Now the 'UPPER' query can use this so-called functional index. Unique Index. The Primary Key of every table is unique, which means that no two rows can contain the same value. Sometimes one column or the concatenation of some columns is also unique. To ensure this criterion you can define a UNIQUE CONSTRAINT, or you can define an index with the additional UNIQUE criterion. (Often UNIQUE CONSTRAINTS silently use UNIQUE INDEX in the background.) CREATE UNIQUE INDEX person_lastname_unique_idx ON person(lastname); Unique indexes can only be created on existing data, if the column in scope really has nothing but unique values (which is not the case in our database example). Drop an Index. Indexes can be dropped by the command: DROP INDEX <index_name>;
299155
520910
https://en.wikibooks.org/wiki?curid=299155
Structured Query Language/Managing Rights
For multiuser systems like DBMSs, it is necessary to grant and revoke rights for manipulating its objects. The GRANT command defines which user can manipulate (create, read, change, drop, ...) which object (tables, views, indexes, sequences, triggers, ...). GRANT <privilege_name> ON <object_name> TO [ <user_name> | <role_name> | PUBLIC ] [WITH GRANT OPTION]; The REVOKE statement deprives the granted rights. REVOKE <privilege_name> ON <object_name> FROM [ <user_name> | <role_name> | PUBLIC ]; The example statement grants SELECT and INSERT on table "person" to the user "hibernate". The second statement removes the granted rights. GRANT SELECT, INSERT ON person TO hibernate; REVOKE SELECT, INSERT ON person FROM hibernate; Privileges. Privileges are actions that users can perform. The SQL standard supports only a limited list of privileges, whereas real implementations offer a great bunch of different privileges. The list consists of: SELECT, INSERT, UPDATE, DELETE, CREATE <object_type>, DROP <object_type>, EXECUTE, ... . Object Types. The list of object types, to which privileges may be granted, is short in the SQL standard and long for real implementations. It consists of tables, views, indexes, sequences, triggers, procedures, ... . Roles / Public. If there is a great number of users connecting to the DBMS, it is helpful to group users with identical rights to a role and grant privileges not to the individual users but the role. To do so, the role must be created by a CREATE ROLE statement. Afterward, users are joined with this role. -- Create a role -- (MySQL supports only predefined roles with special semantics). CREATE ROLE department_human_resources; -- Enrich the role with rights GRANT SELECT, INSERT, UPDATE, DELETE ON person TO department_human_resources; GRANT SELECT, INSERT ON hobby TO department_human_resources; GRANT SELECT, INSERT, UPDATE, DELETE ON person_hobby TO department_human_resources; -- Join users with the role GRANT department_human_resources TO user_1; GRANT department_human_resources TO user_2; Instead of individual usernames, the keyword PUBLIC denotes all known users. -- Everybody shall be allowed to read the rows of the 'person' table. GRANT SELECT ON person TO PUBLIC; Grant Option. If a DBA wants to delegate the managing of rights to special users, he can grant privileges to them and extend the statement with the phrase 'WITH GRANT OPTION'. This enables the users to grant the received privileges to any other user. -- User 'hibernate' gets the right to pass the SELECT privilege on table 'person' to any other user. GRANT SELECT ON person TO hibernate WITH GRANT OPTION;
299159
40302
https://en.wikibooks.org/wiki?curid=299159
IB Environmental Systems and Societies/Acid deposition
Topic 5.8: Acid Deposition. Key Vocabulary:. -Acid Deposition: The accumulation of acids or acidic compounds on the surface of the Earth, in lakes or streams, or on objects or vegetation near the Earth’s surface, as a result of their separation from the atmosphere. -Dry Deposition: Emitted from industrial complexes, vehicles and urban areas. -Wet Deposition: Acids that dissolve in cloud droplets, (rain, snow, mist, and hail) that reach the ground. -Acid Rain: rain or any other form of precipitation that is unusually acidic, meaning that it possesses elevated levels of hydrogen ions, can have harmful effects on plants and infrastructure. Assessment Statements:. -5.8.1: Outline the chemistry leading to the formation of acidified precipitations *refer to Figure 5.14 on the back* -5.8.2: Describe three possible effects of acid deposition on soil, water, and living organisms. * (1) increased levels of dissolved metals such as copper, aluminum, zinc, and lead. (2) breaks down lipids in the foliage and damages membranes which can lead to plant death. (3) an impoverished (poor) species structure. -5.8.3: Explain why the effect of acid deposition is regional rather than global. *Acid deposition is regional rather than globally because it is predominantly focused in a certain area. Such as in the 1980s and 1990s it affected Sweden, eastern North America, Germany, Belgium, and Norway amongst others. -5.8.4: Describe and evaluate pollution management strategies for acid deposition. *burn less fossil fuel (this requires a government initiative in order to switch to nuclear or Hydro-power) *allow decomposition of plants to return nutrients to the soil and offset the acidification process. *burn coal in presence of crushed limestone in order to reduce the acidification process *switch to low sulfur fuel (oil/gas plus high-grade coal) Causes of Acidification:. -Human Activities - Acidification is largely related to human activity. Many countries produce the pollutants and they may be deposited many hundreds of kilometers from their point of origin. However, there are variations within areas receiving acid rain. Some storms produce more acid rain than usual; lime-rich soils and rocks are better able to absorb and neutralize the acidity. -Natural Sources/Causes - Bog moss secretes acid, heathers increase soil acidity and conifer plantations acidify soils. Litter from conifers is acidic and not easily broken down – the Sitka spruce is non-native to Britain and specialized decomposing bacteria are absent. This leads to the accumulation of an acid humus layer in the soil. -Volcanoes are also important sources of sulfur dioxide and nitrogen dioxide. For example, before the eruption of the Soufriere volcano in 1995, Montserrat had some of the finest cloud forest in the Caribbean.
299189
2983037
https://en.wikibooks.org/wiki?curid=299189
Professionalism/The Loss of Ocean Ranger
On February 15, 1982, the Ocean Ranger, a mobile offshore drilling platform, sank off the coast of Newfoundland Canada. All 84 lives aboard were lost. It remains the biggest accident in the Canada’s offshore petroleum industry. Post-accident studies showed that it was not a catastrophic technological failure; rather, a result of a combination of a failure of the Ocean Drilling & Exploration Company (ODECO) training policy, the lax safety training of the crew, and the lacking seaworthiness of the lifeboats on board. Due to the sinking of the Ocean Ranger, improvements in safety regulations for offshore drilling companies, technological innovations in survivability, continued escape evacuation and rescue (EER) research, and improved safety training procedure have helped decrease the number of offshore drilling incidents. The Ocean Ranger sinking showed that technological improvements are only as effective as the training and management structures of its users. Ocean Ranger Background. The Ocean ranger was designed by ODECO engineers incorporated for ODECO International of New Orleans, Louisiana, and the Norwegian firm of Fearnley & Eger A/S. It was built at the Hiroshima yard of Mitsubishi Heavy Industries . Structure. The Ocean Ranger rig consisted of two pontoons, eight vertical columns, an upper hull with two decks, and a supporting framework of braces and trusses. The two pontoons each contained 16 tanks that served as storage for ballast water, fuel oil, and drill water. The pontoons were connected to the upper hull by eight watertight vertical columns. Each of the four corner columns contained three chain lockers for storing the anchor chains. There were two upper deck openings that led to each chain locker. Although the American Bureau of Shipping (ABS) designated these openings as the first point of down-flooding, there were no coverings provided for these openings, no drainage system in the chain lockers, no means installed for pumping out water, and no alarm system to indicate flooding. The Ballast control room was considered a dry area, but it was not protected from sea water. There was no protection provided for the console in case of a port light break, and the console was not designed to be watertight. Manual. The Ocean Ranger's safety manual described how to keep the rig level and stable, how to operate it safely during transit, mooring, drilling and storms, and how to handle severe damage. On January 21, 1977, the manual received final ABS approval but ABS disclaimed any responsibility for the adequacy of the instructions contained in the operating manual. The ABS certified only the Ocean Ranger's construction but not its safety design or operation. However, ABS’s official stamp could have led third parties to conclude that the approval applied to the manual as a whole. As a result, the Ocean Ranger’s operating procedures were never thoroughly reviewed. The manual was deficient in several respects : Manning and Operation. Post-accident research showed that the command structure of the Ocean Ranger was deficient. The electrical and mechanical systems on the Ocean Ranger were maintained by two electricians, an electronics technician, two motormen and two mechanics . They shared responsibility for the maintenance of the system, but no single person fully understood the function and operation of the entire system. Thus, no one was able to detect and remedy the situation during a severe accident. The crew structure of the Ocean Ranger reflected a predominant interest in an efficient industrial endeavor. The marine operations which ensured the stability and safety of the rig were relegated to a subordinate role, comparable to that of any other support group. Evidence shows that at the time of the loss, the Ocean ranger was undermanned by a minimum of 3 certificated lifeboatmen and 2 able-bodied seamen . Additionally, in practice, the crew training on the Ocean Ranger was not consistent with ODECO’s stated training program. Three formal employees testified on the public hearing that 80 weeks of training were required. In reality, less than 40 weeks of training were practiced . February 15th 1982. Weather. A series of weather forecasts issued by Newfoundland Oceans Research and Development Corporation (NORDCO) indicated that the weather conditions at the drill site would deteriorate during the early hours of Sunday, February 14th, as a deep low centre approached the area. At 1:30 a.m. on Saturday February 13th, NORDCO forecast that wind speeds of 60 knots and maximum sea heights of 22 feet could be expected at the drill site by mid-afternoon on Sunday . By 7:30 p.m. on Saturday, the forecast was changed to maximum wind speeds of 70 knots and maximum sea heights of 24 feet. Then, at 7:30 a.m. on Sunday, NORDCO revised its forecast predicting potential wind speeds of 90 knots and maximum sea heights of 40 feet by 2:30 p.m, and warned against continued drilling during the storm . Cause of the Incident. The actual sinking of the Ocean Ranger was caused by winds of 68 knots and seas of approximately 50 feet . With the greater sea heights, the large waves and strong winds caused failure to the portlights of the ballast control room. The rough weather caused the windows to break, and this failure allowed seawater to enter the ballast control room . The Ocean Ranger’s ballast control console and communications equipment malfunctioned due to the water entering the room. This control room was used to control the pumps and valves that kept the rig balanced and stable. The susceptibility of this console to water damage was a serious design deficiency for a craft working in a marine environment. Control Room Malfunction. Because of the malfunction of the control panel, employees onboard the Ocean Ranger took matters into their own hands. A rod and bushing, part of the ballast control system, was used to control valves manually in the event of a failure of the automatic controls . Due to the limited knowledge about the operations of the vessel during an emergency, operators wrongly believed that inserting the rod closed the valves to the stability rigs where seawater from the storm was flooding. In fact, this opened the valves, allowing the seawater to flood in. Capsizing of the Ocean Ranger. At approximately 1 a.m. on Monday February 15th, 1982, the Ocean Ranger started emitting distress calls, indicating that they were abandoning the rig . Rescue teams were sent out to aid the MODU, but were not able to get to the rig in time. At 3:00 a.m., the Ocean Ranger capsized and sank into the Atlantic Ocean approximately 166 miles east of St. John’s Newfoundland in about 260 ft of water. All 84 people aboard the Ocean Ranger died. 22 bodies were recovered between February 15th and February 24th 1982, and had died as a result of hypothermia. The remaining 62 bodies of crew-members remain missing. Out of the 84 people, 46 of were Mobil employees, and 38 were contractors from various other service companies. Effect of The Ocean Ranger. Lawsuits and ODECO's Fate. In October of 1983, the families of The Ocean Ranger crew reached settlement with the ODECO Company and its partners. Individual settlements from $25,000 to $270,000 were awarded. The total settlement was approximately $20 million . In 1993 11 years after the loss of the Ocean Ranger, the Diamond M Corporation purchased all outstanding ODECO company stock from Murphy Oil, ODECO’s parent company . Following the Ocean Ranger and EER Research. The flowchart above shows the events that occurred directly following the sinking of the ocean ranger. In 1983, the East Coast Petroleum Operators Association published a report on offshore safety which analyzed the current state of affairs. The Royal Commission on the Ocean Ranger Marine Disaster (RCOMD) published parts I and II of their report on the ocean ranger; this report identified the primary causes of the ocean ranger disaster and the primary action items to prevent such an event from being repeated. In 1985 and 1987 respectively a federal government investigation into the Ocean Ranger disaster occurred and a five year update report on regulatory improvements since the Ocean Ranger was published. Parts I and II of the RCOMD report identified three primary groups involved in the Ocean Ranger sinking: government, industry, and researchers. At the time of the Ocean Ranger sinking, the majority of research into EER was focused on technology. Following the Ocean Ranger sinking, there was a noticeable increase in EER research . Piper Alpha. In July of 1988 the Piper Alpha , an offshore oil drilling platform in the North Sea burned down. This resulted in the deaths of 167 of the 228 crew members onboard. Prior to the fire the Piper Alpha was responsible for 10% of the oil and gas production in the North Sea. The Cullen Report published in 1990 conlculded that there was no technological faul onboard the Piper Alpha platform. The fire was due to the failure of the safety management systems and of the command and control structure responsible for preventing and managing emergencies. This resulted in a shift in focus in EER research, from a mostly technological focus to a combination of technology and systems. . Improvements Since Ocean Ranger. Technology. Individual survivability has been improved through new immersion suits. Evacuation methods from the platforms have been renovated through life boat launch system enhancements and the seaworthiness of evacuation vehicles has also been improved. The reliability and effectiveness of search rescue and recovery has been increased through improved capabilities of the search and rescue aircrafts. Despite these advances, some manufactures of immersion suits and lifeboats refuse to interrupt current production lines to design and develop new equipment for offshore energy industry systems because in maritime, offshore oil drilling companies make up a small percentage of revenue compared to world shipping fleets. Research. Petroleum Research Atlantic Canada (PRAC) was created and has led to the creation of "Communities of Interested" which create specific research areas and prevent redundancies in research. However, due to the "cyclical nature" of the offshore industry some research is lost in the complexity of the operations resulting in inefficiencies and duplication of research. In addition escape, evacuation, and rescue (EER) research follows a "pattern of disaster", it focuses on fixing the element of technological capability found lacking in the last disaster. As a result relatively little EER research breaks new ground. Regulation. New safety regulations in offshore drilling platforms require more frequent equipment checks and safety drills. The survival equation was changed. Safety regulations enacted to respond to specific disasters are appropriate when the regulation is enacted but the regulation quickly becomes irrelevant due to technological advancements. Safety regulations in mobile offshore drilling must add consideration for future advancements in technology. EER Standards & Procedures. Advances in safety equipments and standards address EER problems that existed in the 1990's. However, due to international nature of offshore drilling, some countries refuse to implement EER standards created without their influence. This leads to delay in modernization of certain offshore technological standards. Training. New safety training procedures incorporate recent updates to EER standards. In addition, personnel onboard offshore platforms are required to participate in safety training prior to deployment onboard platforms. Despite these improvements, changes in adult learning theory have not been efficiently applied to employee training. Current training requirements may not fully reflect the needs of a modern learner, making EER training less effective.
299201
3304668
https://en.wikibooks.org/wiki?curid=299201
International Postage Meter Stamp Catalog/Ukraine
=Ukraine= A - Provisional issues without country inscription. B - Frank is octagon C - Frank is rectangle PO - Special stamps generated only in Post Offices NOTE: Town marks for Ukraine are of three types, single circle with bars above and below date, broken inner circle with frame around date, and double circle with inner circle flat on the bottom. These are respectively designated SC, BIC, and DC in this section. <br> GROUP A: Provisional issues without country inscription in the frank. <br><br> <br> <br><br> A1. Kuibyshev (MV). As USSR Type DA3 but with the "K"s removed from the sides. Upright octagon with double-line outer border and “ПОЧТА / CCCP” below value box. A. Star at top of frank is solid containing a negative hammer & sickle B. Star at top of frank is outlined containing a positive hammer & sickle TM: BIC with Soviet markings "CCCP" above hammer & sickle at top V/F: 000 <br> A2. Kuibyshev (MV). [$10] As Type A1 but blank at top and sides and “ПОЧТА” alone at bottom. Value and date figures horizontal. TM: BIC with Soviet markings "CCCP" above hammer & sickle at top V/F: 000 A3. Perm (MV). [$10] As USSR Type DB1 but frank is blank at bottom. Frank with single line outer border and inner box around value figures. Hammer and sickle in star at top. “ПОЧТА” and “CCCP” stacked at sides. Value figures stacked, and date figures vertical. TM: BIC with Soviet markings "CCCP" above hammer & sickle at top V/F: 000 <br> A4. Kuibyshev (MV). [$10] As USSR Type DB2 but frank is blank at bottom. Date and value figures horizontal. TM: BIC with Soviet markings "CCCP" above hammer & sickle at top V/F: 000 <br> A5. Perm (MV). [$10] Upright octagon with single-line outer border and “ПОЧТА” stacked at left. Blank at top, right and bottom. Value figures stacked, and date figures vertical. The country name "УКРАЇНА" appears in the town mark but not in the frank. TM: DC V/F: 000 GROUP B: Frank is upright octagon. <br> <br> <br> B1. Perm (MV). Ukrainian national symbol at top, “ПОШТА” stacked at left, and “УКРАЇНИ” stacked at right. Value figures stacked, and date figures vertical. A. Symbol at top without border B. Symbol at top is within a shield TM: SC, BIC V/F: 000 NOTE: Variations in size and shape of the frank are known. <br> <br> B2. Kuibyshev (MV). As Type B1B but date and value figures are horizontal. A. Large frank with large inscriptions B. Small frank with small inscriptions TM: SC V/F: 000 <br> B3. Perm (MV). As Type B2 but blank at top. Value figures stacked, and date figures vertical. TM: BIC V/F: 000 <br> B4. Perm (MV). As Type B3 but with “ПОШТА” at left and “УКРАЇНА” at right. TM: SC V/F: 000 <br> B5. Perm (MV). Frank with a large dot at top and another at bottom. “ПОШТА” at left and “УКРАЇНИ” at right. Value figures stacked, and date figures vertical. TM: SC V/F: 000 <br> B6. Perm (MV). Post horn at top, “KOП" at bottom. “ПОШТА” at left, and “УКРАЇНИ” stacked at right. Value figures stacked, and date figures vertical. TM: BIC V/F: 000 <br> B7. Perm (MV). As Type B6 but with town name “ЧЕРНIГIВ” at bottom. Value figures stacked, and date figures vertical. TM: SC V/F: 000 <br> B8. Kuibyshev (MV). [$10] Frank with double line frame and without inner box around value figures. Date and value figures horizontal. “ПОШТА” at top, and “УРАЇНИ” at bottom. This appears to be an error, with “K” omitted from “УКРАЇНИ”. Blank at sides. TM: BIC V/F: 000 GROUP C: Frank is rectangle. <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> <br> GROUP PO: Postage stamps generated only by special Post Office meters. <br> <br> PO1. Onega (MV). ["Appears to be rare"] Frameless, text-only frank applied to tape, never directly to cover. Date at top above town line, meter identification, and value figures with transaction number at bottom. Town name “КИЕВ —100” and meter number “KACCA 01” seen. V/F: —0.00 <br> PO2. Uiskra "341" (MV). ["Appears to be scarce"] Frameless design on tape as Type PO1 but without country name, town line and meter identification. Date is right justified at top right. At bottom is one line of data containing a transaction number at left, value figures at center, and an additional number at right. V/F: *****0.00 <br> NOTE: Metal hand stamp impressions that strongly resemble meter stamps are used to frank mail in the Ukraine. They were probably made by the same factory in Perm that manufactured most of the country's meters. These hand stamps are always found without town mark and are nearly always applied on tape or label rather than directly to the cover. Such conditions occasionally apply to true meter stamps (see Type C2) and thus are not a foolproof means of differentiating the meter stamps from the hand stamps. <br> Return to main catalog ⇒ ../ Return to top ⇒ Ukraine
299209
846780
https://en.wikibooks.org/wiki?curid=299209
Professionalism/China Airlines Flight 611
On May 25th 2002, China Airlines Flight 611 (CAL611, Cl611, or Dynasty 611) disintegrated in midair just 20 minutes after takeoff upon reaching the cruising altitude of 35,000 feet over the Taiwan Strait, killing all 209 passengers and 19 crew members on board. Failure to act in a professional manner at both organizational and individual levels might be the root cause of this tragic incident. =Background= Investigation. The investigators used ballistic trajectory analysis to determine which section of the airplane was the first to break off. Columbia STS 107 flight accident investigation team also used this analysis to reveal that the Flight Day 2 (FD2) object became loose during liftoff. The analysis revealed that the breakup initiated from the aft fuselage or the tail section and narrowed the investigation.<br> The investigator focused on the item number 640 which was located precisely where the analysis told them the breakup had started. Unlike other pieces that showed sign of overload fracture, this piece showed sign of fatigue fracture. In other words, the piece number 640 had separated from the body of the airplane gradually overtime, not ripped apart violently and suddenly in midair like any other pieces.<br> This piece also had a doubler plate, which was the equivalence of a patch on a punctured tire. It suggested that this section of the airplane had been repaired before.<br> Tailstrike. When the plane was 6 months old (February 7th, 1980), the tail of the airplane struck the runway while landing at Kai Tak Airport, Hong Kong. This incident is usually referred to as a tailstrike. Maintenance records stated that preliminary inspection found the serious abrasion damage on fuselage tail portion bottom skin. The maintenance crews scheduled a temporary repair replacement with a permanent repair within four months.<br> Maintenance records stated that the permanent repair was accomplished in accordance with the Boeing Structural Repair Manual (SRM) and China Airlines engineering recommendations on May 25th, 1980.<br> The record was as follows:<br> Item number 640 told the investigators a different story. Maintenance records clearly stated that the tail section was removed before the installation of the doubler plate. However, the damaged skin was not removed but instead sanded down. The plate was also 10% less than the recommended size, which was 125 inches long and 23 inches wide. Note that this recommended plate size was meant for a temporary repair. Moreover, the investigators could not obtain any other engineering process records for this permanent repair, i.e. work cards; inspector signoffs; detailed description of the process. The scratch was well hidden underneath the doubler plate from 1980 onward.<br> Overtime, cabin pressurization applied stress to the damaged area. The stress was far beyond the fatigue stress design values, and thus initiated a fatigue crack. The crack continued to grow undetected with every flight cycle. On May 25th, 2002, the crack reached its critical length and transferred the load to an undamaged area, which eventually became overloaded. Consequently, the plane broke off in midair. Mysterious stains. China Airlines came close to preventing this incident. When China Airlines performed the repair assessment program (RAP) on the accident aircraft on November 02, 2001, the inspectors took pictures of all the repaired doublers. Two of those pictures were from the aft lower lobe fuselage. They showed a mysterious dark-brown stains around the doubler plate. The investigator revealed that the dark-brown stains was nicotine stains.<br> Around 1995, China Airlines started to ban smoking on board. Cabin pressurization forced the smoke out through the cracks. Overtime, the smoke left the nicotine stains outside of the plane. These stains were an indication of a possible hidden cracks beneath the doubler plate, which means that the cracks had been there long before 1995. Still, China Airlines was not treating the tailstrike accident as a major repair. =Connections to Professionalism= Structure of Business Organization. During the permanent repair conducted after the temporary repair, China Airlines decided to minimize the cost by disregarding the instructions suggested by the SRM. Consequently, the poor repair led to the accident in 2002. Besides the financial loss, China Airlines also lost the trusts from both the investors and customers. The company shares plummeted by 25%. Its reputation was slaughtered as it became the “least safety airline.” After the accident, Delta Airlines also withdrew its previously proposed partnership. <br> As business organizations maximize their profitability while being obligated to exercise their expertise and judgment that meet their clients’ best interests, they face one important dilemma. Because their clients trust that the business organizations operating professionally, business organizations have freedom to set the balance between profit and ethic responsibility. It is vital that every companies be prudent and focus on the long run benefits. In this China Airlines Flight 611 case, the company chose to cut the cost to gain short run profit, but lost much more in the long term. Sense of responsibility. Another possible cause of China Airlines Flight 611 accident was that China Airlines entrusted the repair to the maintenance team, but the team did not carry on the job properly. The fact that a trailstrike accident rarely caused significant damage suggested that the maintenance team might be affected by the normalization of deviance. In the permanent repair, the damaged areas were not removed and the doubler plate used was smaller than the recommended size. <br> Moreover, there was the diffusion of responsibility involved. Even though, the inspectors discovered the nicotine stains (Figure 2), they did not take any actions as they might have felt that it was not their responsibility and the others would deal with that. All in all, it is evident that the maintenance team did not work meticulously. If they had, they would not have fallen into the status quo trap. They would be alarmed about the nicotine stains, immediately sought the cause of the stain, and eventually discovered the cracks underneath the plate. When the maintenance team conducted the permanent repair, they should have kept in mind that it was their responsibility to ensure the safety of the customers. Integrity. In a business organization, managers’ responsibility is to ensure the company profitability. The technicians, on the other hand, are specialized in technical knowledge, and thus have the duty to carry on the technical tasks properly. They have to identify the potential risks and notify the managers. In the China Airlines Flight 611 case, the maintenance team just followed the order from the managers, conducted the poor permanent repair, and logged the record incorrectly. They also failed as professionals by not dissuading the company from cutting the repair cost. If they held on to their ethics, they would have refused the unethical cost cutting and prevented the accident. Therefore it is important for individual to value integrity and understand when to challenge authority. Mindfulness. Traps in judgment. Flawed repair during the maintenance and failure during subsequent routine inspections may be attributed to the following traps working in isolation/concert: Maintenance. Maintenance technicians might have judged that it was unnecessary to remove the damaged skin having not done so for other tailstrikes due to a combination of status-quo, sunk-cost, and framing traps: Inspection. Inspectors missed the damage mostly because it was covered up and difficult to spot. Arguably, if they had been more thorough in their inspections, they might have spotted the poor maintenance. This slight negligence might be due to confirming-evidence trap, and two of the estimating & forecasting traps: Awareness and Mindfulness are two sides of the same coin; a mindful state of mind results in greater awareness, which "can" eradicate the distortions ingrained into the way our minds work (see Evidence from Neuroscience) through self-knowledge (know thyself). Mindfulness to overcome barriers to self-knowledge. A two-component model of Mindfulness is proposed to overcome these barriers. Improving attention. Mindfulness begins by focusing attention on breadth, other sensations, thoughts, and feelings. Through practice, strong concentration to maintain awareness is developed. Research showed that this sustained attention/vigilance is related to increased attention span, higher memory capacity, reduced stress. Together, these lead to greater awareness of any bias in judgment. Eliminating ego. The second component involves nonevaluative observation about experience. Of the 7 essentials of mindfulness, 5 are directly related to the elimination of ego: Loss of ego leads to lowered reactivity and defensiveness to self-threatening information (even when facing death). Self-verification and self-enhancement motives are reduced, and traps that rely on ego--status-quo, sunk-cost, and over confidence--are overcome. Mindfulness in the world. Several mainstream companies realize the many benefits of mindfulness (its effectiveness in overcoming traps in judgment is just one among many), and the following have implemented mindfulness programs: Google (Search Inside Yourself Leadership Institute), Apple, McKinsey & Company, Deutsche Bank, and General Mills . Influence of Mindfulness has also expanded to schools, universities, and other sectors. For instance, University of Virginia launched the Contemplative Science Center in 2012 with the following goal: =Conclusion= Failure to act in a professional manner at both organizational and individual levels is the root cause of a catastrophe. An organization that focuses on profitability is usually faced with the issues of safety. Such organization frequently considers economic motivations over safety, which might result in the company growth in the short run. This type of an organizational culture might interfere with employees' professionalism, shaping a "two plus two equals five" environment, and thus violate their professional integrity and ethics. However, the fault does not lie wholly with an organization. Individuals have rights and choices to object and remain adamant in their judgements, despite the risk of losing their jobs. Traps in decision making also contribute to the failure. Practicing mindfulness can eradicate the distortions ingrained into the way our minds work through self-knowledge and thereby improve our awareness of these traps. Hence, the risk of a catastrophe can be reduced by conducting ourselves in a professional manner. =Future extension= =References=
299214
98013
https://en.wikibooks.org/wiki?curid=299214
International Postage Meter Stamp Catalog/United Arab Emirates
=United Arab Emirates= A – Stamps generated by machines in private and commercial use PO – Stamps generated by machines in post offices GROUP A: Stamps generated by machines in private use. <br> A1. Pitney Bowes “5000” series (MV). Frank with simulated perforation border, inscribed “U.A.E./POSTAGE PAID” at top. M# with “P.B.” prefix breaks frame line at lower left. Date figures raised in relation to value figures. TM: DC V/F: ≋000 A2. Pitney Bowes “6300” (MV). Similar to Type A1 but “POSTAGE PAID” at bottom. Date and value figures on same level. M# with “P.B.” prefix does not break frame line. TM: DC V/F: ≋000 A3. Pitney Bowes “6900” (MV). Similar to Type A2 but taller frank. M# with “PBE” prefix breaks bottom left frame line. TM: DC, SC V/F: ≋000 A4. Pitney Bowes “6600” (MV). Very similar to Type A3 but wider and value figures are larger. M# with “PB” prefix does not break frame line. TM: DC V/F: ≋000 A5. Pitney Bowes-GB “A900” series (MV). Frank similar to Type A2 but without straight inner border lines, and the curved inscription at top is not in a banner. Value figures large. A. M# with “PB” prefix. B. M# with “PBF” prefix. TM: DC V/F: ≋0000 <br> A6. Postalia “D2/D3” (MV). Frank nearly square. M# with “PA” prefix centered at bottom. TM: DC V/F: 000 0000 A7. Francotyp-Postalia “T-1000” (digital). Frank very similar to Type A6 but M# with “F/PA” prefix. With “BHS” instead of “FILS” at left of value figures. Date figures are taller, and value figures are digital. TM: DC V/F: 00.00 A8. Frama “M/E” (MV). Horizontal frank with simulated perforation border, inscribed “United Arab Emirates” across bottom. M# with small “FR” prefix above at left. Value figures thick. TM: DC V/F: 0000 <br> A9. Hasler “Mailmaster” (MV). Very similar to Type A8 but M# with “H” prefix, and value figures thinner. Frank width can vary, from 35 to 38 mm. TM: DC V/F: 0000 <br> A10. Pitney Bowes (digital). Similar to Type A5 but with two columns of numbers left of the town mark. TM: DC V/F: ≋00000 A11. Hasler "Mailmaster F204” (MV). Horizontal rectangle with Arabic text at top and "UNITED ARAB EMIRATES" above ID number at bottom. At left, post horn logo and stacked "P/P". At right "POSTAGE PAID" in Arabic above English. M# CN 11 seen. TM: unknown, probably DC ("shown is a proof without TM") V/F: "POSTAGE PAID" NOTE: This stamp does not show a postage value, only "POSTAGE PAID". It has the appearance of being from a non-metered bulk mail printer, but it is from a Hasler "Mailmaster" meter. Although no postage amount shows, the postage generated by the machine is metered. Our only knowledge of the stamp is from the Hasler record sheet for the order. It was prepared for the Bahrain Services & Maintenance Company (BASMA B.V.) of Manama in 1987. The stamp shown above is affixed to this sheet. We haver not verified if the stamp was actually placed into use. A12. Secap "Alpha” or "Minipost" (MV), 2000 or earlier. Similar to Type A8 but both country names, Arabic and English, are at the top. The frank is nearly square with "FILS" left of the value figures and nothing to their right. Meter number with "SE" prefix at lower left. TM: DC V/F: 0000 A13. Frama "Sensonic 2" (MV). Similar to Type A8 but the value figures are larger. Meter number with "FR" prefix. TM: DC V/F: 00.00 A14. Satas "Baby" (MV). ["Appears to be rare"] Small square frank with single-line simulated perforation border. "POSTAGE PAID" in Arabic and English read up vertically at left. Meter number without prefix above "United Arab Emirates" at bottom. Meter number 1101 seen. TM: BIC V/F: 0000 GROUP PO: Stamps generated by machines in Post Offices. <br> PO1. Zebra "S4M" (digital). This stamp is a label for registered mail but it includes the postage amount as well as the registration information. Covers found with this label have no other postage indicators and so it is also a postage stamp. Below the bar code are two lines of text: * First line: Registration Number, Date, Value * Second line: Destination, Origin, Weight (g), Payment Type V/F: Amt: (0)(0)0.00Dhs <br><br> PO2. Unknown (digital). Similar to Type PO1, but with narrower barcode and revised text: * First line: Registration Number, Date, Value * Second line: Origin, Destination, Staff ID, Weight (kg) * Third line: Optional line giving type of mailing V/F: Amt: (0)(0)0.00AED
299216
3332924
https://en.wikibooks.org/wiki?curid=299216
Biomedical Engineering Theory And Practice/Biomaterials/Introduction to biomaterials
The United States National Institute of Health Consensus Development Conference defined a biomaterial as ‘‘Any substance (other than a drug) or combination of substances, synthetic or natural in origin, which can be used for any period of time, as a whole or as a part of a system which treats, augments, or replaces any tissue, organ, or function of the body’’ (Boretos and Eden, 1984). Biomaterials area has grown over for 50 years. Biomaterils as a field uses ideas from medicine, biology, chemistry, materials science and engineering. In addition, biomaterials researchers should consider ethics,law and the health care delivery system. Biomaterials can be divided into metals, ceramics, polymers, glasses, carbons, and composite materials. Such materials are used as molded or machined parts, coatings, fibers, films, foams,fabrics, liquid and powder.
299248
40302
https://en.wikibooks.org/wiki?curid=299248
Manx/Resources
Online Resources</br> There is no Manx television network (TV in the Isle of Man is broadcast from the UK and Ireland). Most newspapers and magazines are published in English. However, there are occasionally Manx broadcasts on Manx Radio. In addition there is an excellent animated series in Manx called "Manannan". Manannan is an alternative name for Isle of Man and also the name for the Celtic sea god after whom the island is named.
299348
3388243
https://en.wikibooks.org/wiki?curid=299348
Professionalism/Amy Stroupe and BB&amp;T
Amy Stroupe and BB&T is a professional ethics case that concerns whistleblowing. Amy Stroupe was hired by BB&T on August 1, 2005 as a certified fraud examiner (CFE) in Charlotte, N.C., and her courage as a whistleblower and dedication to encourage transparency within BB&T are tribute to her professionalism. In February, 2007, concerns were raised about a series of suspicious loans made by a BB&T financial center manager in a real estate development, and Stroupe was notified by a retail service officer. In her investigative report, she indicated that a BB&T employee had helped Village of Penland's developer design a $100 million Ponzi scheme. BB&T fired Stroupe soon after a meeting with the FBI, claiming that she had violated company policies during her investigation, though she countered in court that she was fired as punishment for pushing too hard on the investigation. She sued BB&T under Sarbanes-Oxley Act whistleblower provisions, Section 806, and the federal judge in the case ruled that BB&T must reinstate Stroupe with back pay. Professional Career. Early Career. Prior to her career at BB&T, Amy Stroupe worked for the Cleveland County, N.C., Sheriff's Office as a detective. Whistleblowing and BB&T. Stroupe began working for BB&T at their Shelby branch on August 1, 2005, and while employed she excelled at her job as a corporate investigator. In her 90 day review report, her supervisor wrote, “Amy is an asset to the BB&T Corporate Investigations team. Amy has established herself as a consistent contributor to the investigative team.” During her two years with BB&T, she had five positive performance reviews. In February 2007, Stroupe was alerted about suspicious loans with Peerless Development Group. A branch manager named Bryan Drum had approved $20 million in loans for a development called the Villages of Penland. Several suspicious patterns were apparent: all loan applicants were from out of state, the lots were appraised at a higher value than they were worth, all loans had the same appraiser and closing attorney, and Peerless used funds from their account to pay for some customer’s loans. Additionally, Drum was the only employee who worked with the Peerless loans. She first notified her supervisor, Brian Prater, and the Direct Retail division of her findings, but when no action was taken, she notified the Regional Portfolio administrator. Later, Stroupe informed the FBI; Charlie Mattox, Drum’s supervisor; and several other BB&T employees including the Regional President. In one meeting, an employee noted that the case “looks like securities fraud." Upon further investigation, Stroupe found that Drum had been given a $10,000 bonus for the amount of loans he approved, and Drum had developed an incentive program between Peerless and its customers in which Peerless could pay its customer’s loans. She also visited the Villages of Penland and found little development had been done on any of the lots. Despite her findings, Mattox did not immediately terminate Drum; instead he approved three additional Peerless loans that were already in the process of being approved. He contacted Stroupe advising her to work on other investigations and claimed that many parts of her report about Drum were false. In April 2007, Drum was fired, and in retaliation, Mattox moved Stroupe from the Shelby branch to the Charlotte headquarters. On May 22, 2007, a BB&T attorney prevented Stroupe’s report to the FBI from being sent since it contained incriminating information. BB&T would not only be liable for the $20 million they loaned but also for $120 million loaned to Peerless through other banks. The following day, the attorney stopped Stroupe from attending a meeting with FBI officials stating that she would answer any question they asked her. Afterwards it was apparent that BB&T denied any involvement in the scandal and failed to mention Bryan Drum. Despite resistance from upper management, Stroupe continued to investigate the scandal, and in retaliation, BB&T fired her on June 20, 2007 stating that she had wrongfully discussed the details of her investigation with unauthorized personnel. At this time, her boss said, “Amy, it’s become obvious that you cannot conform to a corporate setting; therefore, we are terminating your employment." Aftermath. After termination, Stroupe filed a complaint with OSHA, but after months of investigation, they found that her claims lacked any merit. She appealed under the Sarbanes-Oxley Act and won three years later, winning her job back with back pay plus interest. Her case is notable because it is one of the 3.6% that have won under the SOX act. Whistleblowing. Whistleblowing refers to making a disclosure that evidences illegal or improper government or corporate activities. By disclosing information about corruption, fraud, mismanagement and other wrongdoing, whistleblowers have helped save billions of dollars in public funds while preventing emerging scandals and disasters from worsening. Perception and Protection. Perceptions of whistleblowers tend to vary. While sources such as Time have often praised whistleblowers for their actions, others have accused them of being traitors. Since whistleblowers' broad spectrum of public perception deepens the riskiness of their actions, civil society has played a large role in protecting whistleblowers from public retaliation, legal liability, and cultural barriers. In recent decades, many non-governmental organizations such as Transparency International, Government Accountability Project, Public Concern at Work, and the Open Democracy Advice Centre have arisen to inspire legislative protection for whistleblowers apropos their risks and publicize corruption across international workplaces. Efforts to improve and expand whistleblowing legislation have helped protect whistleblowers from their risks, while also easing detection of corruption and enhancing accountability in corporate and political environments. Though the threshold for whistleblower protection is difficult to define, current principles regarding whistleblowing legislation suggest protection should be granted for disclosures made with a reasonable belief of wrongdoing at the time of disclosure. Though these principles don’t always translate into legislation, they help direct the formulation of new and improvement of current legislation. United States Legislation. Whistleblowing's history is deep. In 1863, the United States False Claims Act allowed citizens to sue on the government's behalf in cases of fraud and collect rewards for doing so. This action is often known as qui tam, a writ originating in Roman times as a law enforcement mechanism. Whistleblowing was modernly campaigned by Ralph Nader in the 1960s when he launched a movement to encourage scientists, engineers, and other professionals to "blow the whistle" on unethical principles by their employers. Following his drive and tragedies like the Challenger disaster of 1986, many whistleblowing laws were passed such as the Whistleblower Protection Act of 1989, which protects government employees from management retaliation and is considered to be among the most important pieces of whistleblower legislation. Scandals have also encouraged more recent legislation. In the 2002, the Enron and Worldcon scandals inspired the adoption of the Sarbanes-Oxley Act, which requires international corporations that are either owned in part by United States companies or traded on United States stock exchanges to adopt whistleblowing procedures. Supporting such federal legislation, the National Conference of State Legislatures has adopted unique laws protecting whistleblowers for different states. BB&T. Organizational Culture. BB&T was part of the financial climate of the mid-to-late 2000s. The estate boom was in full swing, and there was pressure to approve loans without much investigation. According to attorneys of victims of the Village of Penland scheme, it is now hard to support the claim that banks involved conducted any due diligence investigations that the general public would expect. BB&T has maintained that it was a victim of the scheme, citing their loss of $20 million. These losses occurred after the scheme was revealed, however, and BB&T’s prior actions leave doubt regarding it’s innocence. Though Stroupe first alerted her bosses in March, 2007, they dismissed her concerns. She sought out other superiors in the company and even went to the Associated Press, but met with similar results. Even if BB&T was not complicit with the scheme, its culture hindered it’s undoing and reaped the rewards in the meantime. Developer Tony Porter had promised investors returns as high as 10%, but instead of questioning that number, BB&T turned a blind eye. If BB&T was indeed a victim, why were they not concerned by Stroupe’s reports of foul play? According to federal judge Stanley Tureck, BB&T actually aided the fraud. Repercussions. BB&T faced very few consequences after Stroupe revealed the Penland Village ponzi scheme. The court ruling ordered BB&T to pay Stroupe three years salary and rehire her, but they never actually brought Stroupe back to the company. They merely placed her on the payroll without any responsibilities, claiming they had laid off all investigative staff in the region and her position therefore no longer existed. BB&T stated that it intended to appeal the ruling, but after being granted several extensions for their briefing, allowed their appeal to be dismissed. Stroupe returned to her previous job in law enforcement at the Cleveland County Sheriff’s Office. Several people faced trial and were sentenced because of the Penland Village scheme, including the developers Tony Porter, Frank Amelung, and John Foster. No individual from BB&T was accused of any wrongdoing. Most of the attention on BB&T in the aftermath of the ruling was directed towards its other interests and its CEO, Kelly King. The director of N.C. Policy Watch, Rob Schofield expressed concern that the ruling would damage BB&T’s other business components. Several banks sued individual investors to recover their loans, and some have settled. Many of those affected, however, are in financial ruin because of the scheme. Investors were left with monthly payments as high as $9,000 on land that is worth a small fraction of what they paid for. Conclusions. Whistleblower Protection. There are 18 different acts which protect whistleblowers within the United States. The Sarbanes Oxley Act (SOX) is the primary protection act which defends individuals who report financial fraud with “strong and unprecedented anti-retaliation protection for corporate employees.” This act has been unsuccessful in protecting whistleblowers, however, yielding a win rate of 3.6% in initial trials and 6.5% in appeals. The case of Amy Stroupe and BB&T shows that federal reporting of misconduct can be successful under the Sarbanes-Oxley Act, but this result is rare. Other whistleblowing cases such as Nicholas P. Tides & Matthew C. Neumann v. The Boeing Company resulted in failure using SOX. The motion failed because the court ruled that “leaks to the media are not protected” under Sarbanes-Oxley Act. The purpose for excluding media leaks from protection is to protect confidentiality of corporate financial records. Multiple issues arise, though, from prohibiting reports to the media. First, reporting misconduct internally or to federal authorities is less effective because of pressure from agencies. The U.S. Merit Systems Protection Board found that “agencies have the power to influence employees’ decisions about reporting wrongdoing” and around one-third of people who realized misconduct received pressure to not report. Second, reporting of fraud through federal agencies is inherently a much slower and labor intensive process than simply providing information to media outlets. Lastly, a conflict of interest is present for federal agencies that are obligated to protect whistleblowers who harm corporations, even though these agencies receive money from corporations through lobbying. BB&T and Boeing each have given millions of dollars annually to the U.S. government through lobbying. The pressures and problems with financial fraud reporting support the need for inclusion of media leaks in whistleblower protection laws, particularly under the Sarbanes-Oxley Act. Professionalism. The case of Amy Stroupe and BB&T provides multiple possible characteristics that define professional ethics. Stroupe willingly defied her superiors within her company by reporting internal financial fraud. She chose to risk her job to maintain her integrity through reporting the truth, even under pressure to keep quiet. After she realized this risk through her termination, she continued the fight against BB&T in court and won. Her courage to defy, not only in her initial reporting but also in her legal pursuits, is potentially a strong characteristic of professionals in any field. Stroupe’s willingness to risk her job also shows courage, and is another potential characteristic of professionalism. Her victory has set an example for others showing that those that defy their employers to maintain their integrity can still ultimately achieve success. Stroupe stated following her victory in court against BB&T that she has “a lot more courage and confidence” and that “the experience has made [her] as determined as ever to report the truth.” Stroupe’s experience supports the conclusion that professional actions inspire further professional actions, especially if these actions reward the actor. This lesson, if true, motivates the rewarding of professional actions in general. In the case of Amy Stroupe, this lesson validates the argument that whistleblower protections should be improved so that other professionals can be protected just as Stroupe was.
299391
23543
https://en.wikibooks.org/wiki?curid=299391
Trainz/AM&amp;C/Third Party Content
What is 3rd Party Content. Third party content is any Trainz compatible asset made available by private communications or publicly available channels that you have not written the software for (created) yourself nor which is offered by N3V Games as official content in one release or another. "Third party content is the magic in the box", since there are thousands of us contributing to the rich panoply of resources, most of it freeware, that enrich and make the Trainz modeling experience untouchable relative to the occasional short-lived competing product. Other simulators run faster, have less quirks, better graphics, but none offer either the huge asset library that is the Download Station, the community camaraderie nor the world building ease and capabilities of Trainz s toolset in any version since UTC. Using the DLS website. The TRS2004 pre-release days (2003) saw the establishment of the , a shopping cart based website with search tools which many of us still find to be very useful to search out and explore the Content on the Download Station without getting between us and the lists, which are more like typical web-based shopping sites. Auto-ContentManager Downloading. Trainz releases ever since UTC beta tested the nascent DLS have made two or more data ownership entries in the which allow the "via your browser" (which can see the registry) to open and use the installed local computer installation's downloader, the FTP protocol handler parts in post-CMP ContentManager.exe modules. Notes, Footnotes & References. Config.txt files are endemic and ever present in Trainz assets, for no asset can be defined without this type of . The keyword-value_of_key pairing must always be kept in mind in editing or creating Trainz content. The contains values and containers which are most common in asset defining config.txt files. Notes.   Footnotes.
299421
4468995
https://en.wikibooks.org/wiki?curid=299421
Biomedical Engineering Theory And Practice/Oncology
Oncology is a part of medicine which treat Cancer. A medical professional who practices oncology is an oncologist. Overview of Oncology. Oncology is the medical specialty that focuses on the prevention, diagnosis, and treatment of cancer, which is a group of diseases characterized by the uncontrolled growth and spread of abnormal cells in the body. Oncologists are medical doctors who specialize in the field of oncology and play a crucial role in the care of cancer patients. Here's an overview of oncology: Key Aspects of Oncology: Subspecialties of Oncology: Oncology is a dynamic and rapidly evolving field that seeks to improve cancer outcomes, enhance patient quality of life, and advance our understanding of the disease. Advances in research and technology continue to drive innovation in cancer prevention, diagnosis, and treatment. Cancer: Terminology and classification. Cancer is a complex group of diseases characterized by the uncontrolled growth and spread of abnormal cells in the body. Understanding the terminology and classification of cancer is essential for accurate communication and effective treatment. Here are key terms and concepts related to cancer terminology and classification: A neoplasm is an abnormal growth of cells that forms a mass or lump. Neoplasms can be benign (not cancerous) or malignant (cancerous). Malignant tumors, also known as cancers, are composed of cells that can invade nearby tissues and spread to other parts of the body (metastasis). They have the potential to be life-threatening if not treated. Benign tumors are non-cancerous growths that typically do not invade nearby tissues or spread to other parts of the body. They are often not life-threatening and can usually be removed with surgery. Metastasis is the process by which cancer cells spread from the primary tumor to other parts of the body through the bloodstream or lymphatic system. Carcinomas are cancers that originate in epithelial cells, which are found in the skin and the linings of organs. They are the most common type of cancer and include subtypes like adenocarcinoma and squamous cell carcinoma. Sarcomas are cancers that arise from connective tissues such as bone, muscle, cartilage, and fat. They are less common than carcinomas. Leukemias are cancers of the blood-forming tissues, such as bone marrow and the lymphatic system. They result in the abnormal production of blood cells. Lymphomas are cancers that originate in the lymphatic system, which is part of the immune system. They can be classified as Hodgkin lymphoma or non-Hodgkin lymphoma. These tumors originate in the brain or spinal cord and can be either benign or malignant. Staging is a system used to describe the extent of cancer spread. It helps determine prognosis and guide treatment decisions. Stages range from 0 (early, localized cancer) to IV (advanced, metastatic cancer). Grading assesses the degree of abnormality of cancer cells compared to normal cells. It provides information about how aggressive the cancer is likely to be. Grading is often classified as low-grade, intermediate-grade, or high-grade. The original tumor where cancer first develops is called the primary tumor. A secondary tumor, or metastatic tumor, is a tumor that has spread from the primary tumor to other parts of the body. An oncogene is a gene that, when mutated or overexpressed, contributes to the development of cancer. Oncogenes promote cell growth and division. A tumor suppressor gene helps regulate cell division and prevent the formation of tumors. Mutations in these genes can lead to uncontrolled cell growth. Understanding these terms and classifications is essential for healthcare professionals, patients, and caregivers. Proper communication and a clear understanding of cancer terminology contribute to informed decision-making, effective treatment, and improved patient outcomes. Introduction to anti-cancer drugs and side effects. Anti-cancer drugs, also known as anticancer or chemotherapy drugs, are medications designed to target and inhibit the growth of cancer cells. They play a crucial role in cancer treatment by interfering with the processes that allow cancer cells to multiply and spread. While these drugs can be effective in treating various types of cancer, they often come with a range of side effects due to their impact on both cancerous and normal cells in the body. Mechanisms of Action: Anti-cancer drugs work through various mechanisms to halt the growth and division of cancer cells. Some common mechanisms include: Common Side Effects: Anti-cancer drugs can affect both cancerous and normal cells, leading to a range of side effects. The severity of these side effects can vary depending on the specific drug, dosage, treatment duration, and individual patient factors. Some common side effects include: Managing Side Effects: Medical professionals take steps to manage and minimize the impact of side effects, such as adjusting dosages, prescribing supportive medications, and recommending lifestyle changes. Patient education and communication with the healthcare team are essential to effectively manage side effects and maintain the patient's quality of life during treatment. It's important to note that advancements in medical research and technology continue to improve both the effectiveness of anti-cancer drugs and the management of their side effects. Patients undergoing cancer treatment should work closely with their healthcare providers to understand the potential side effects and develop a personalized plan for managing them. Side effects of chemotherapy and radiotherapy. Chemotherapy and radiotherapy are two common approaches to treating cancer. While they can be highly effective in targeting and destroying cancer cells, they can also cause a range of side effects due to their impact on healthy cells and tissues. Here are some of the common side effects associated with chemotherapy and radiotherapy: Chemotherapy Side Effects: Radiotherapy Side Effects: Managing Side Effects: Both chemotherapy and radiotherapy can have a significant impact on a patient's quality of life. Medical professionals work closely with patients to manage and mitigate these side effects. Supportive medications, lifestyle adjustments, and close communication with the healthcare team are crucial for minimizing the impact of side effects and ensuring the patient's well-being during treatment. It's important for patients to report any side effects they experience so that their treatment plan can be adjusted accordingly. Introduction to the major tumor types: breast, lung, colorectal, ovarian, upper GI and prostate cancer and melanoma. Breast Cancer. Breast cancer is a type of cancer that forms in the cells of the breast tissue. It is the most common cancer among women worldwide. The cancer can begin in different parts of the breast, such as the ducts that carry milk (ductal carcinoma) or the glands that produce milk (lobular carcinoma). Early detection through self-exams, mammograms, and other screenings is crucial for successful treatment. Treatment options include surgery, radiation therapy, chemotherapy, targeted therapy, and hormone therapy. Lung Cancer. Lung cancer develops in the cells of the lungs, primarily due to long-term exposure to carcinogens like tobacco smoke. There are two main types: non-small cell lung cancer (NSCLC) and small cell lung cancer (SCLC). Lung cancer is often diagnosed at advanced stages, which makes treatment challenging. Treatment options include surgery, chemotherapy, radiation therapy, targeted therapy, and immunotherapy. Colorectal Cancer. Colorectal cancer refers to cancers that develop in the colon (large intestine) or rectum. It usually starts as small, noncancerous growths called polyps, which can turn cancerous over time. Regular screenings like colonoscopies can help detect and remove polyps before they become cancerous. Treatment includes surgery to remove the tumor, chemotherapy, radiation therapy, and targeted therapy. Ovarian Cancer. Ovarian cancer forms in the ovaries, which are part of the female reproductive system. Symptoms are often vague and can include abdominal discomfort, bloating, and changes in bowel habits. Ovarian cancer is often diagnosed at advanced stages. Treatment involves surgery to remove the tumor and affected tissue, followed by chemotherapy. Upper Gastrointestinal (GI) Cancer. Upper GI cancer includes cancers that affect the esophagus, stomach, liver, pancreas, and gallbladder. These cancers can be challenging to diagnose early due to their location and vague symptoms. Treatment depends on the specific type and stage of cancer but may involve surgery, chemotherapy, radiation therapy, and targeted therapy. Prostate Cancer. Prostate cancer develops in the prostate gland in males. It's a slow-growing cancer that often doesn't cause symptoms in its early stages. Prostate-specific antigen (PSA) testing is used for early detection. Treatment options include active surveillance (closely monitoring the cancer), surgery, radiation therapy, hormone therapy, and chemotherapy. It can be quite challenging since the prostate glands are small and commonly over looked. Melanoma. Melanoma is a type of skin cancer that originates in the cells that produce melanin, the pigment responsible for skin color. It often starts as a mole or other skin growth that undergoes changes in color, size, or shape. Early detection is important for successful treatment. Treatment involves surgery to remove the tumor, as well as targeted therapy, immunotherapy, and chemotherapy for advanced cases. Clinical trial issues in oncology. Clinical trials in oncology (cancer research) play a critical role in advancing understanding of cancer biology, developing new treatments, and improving patient outcomes. However, they also come with various challenges and issues that researchers, patients, and regulatory bodies need to address. Here are some of the key clinical trial issues in oncology: Efforts are ongoing to address these challenges through improved trial designs, enhanced patient engagement, increased collaboration among researchers and institutions, and the development of innovative trial methodologies. As technology and understanding of cancer continue to evolve, these issues are likely to evolve as well, shaping the landscape of oncology clinical trials.
299422
1514312
https://en.wikibooks.org/wiki?curid=299422
Biomedical Engineering Theory And Practice/Health Informatics
Reference. Health Informatics: Practical Guide for Healthcare and Information Technology Professionals (Fifth Edition) by Robert E. Hoyt, Nora Bailey , Ann Yoshihashi Wikipedia, health informatics International Medical informatics Association
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
38