1. 传统的电网中应用的都是static state estimation, 采用WLS。 2. 准稳态假设下,一部分工作是关于 dynamic state estimation 的,但是模型都是简单假设的,不是物理建模的,系统参数也不够准确。模型问题一直是该方法饱受诟病的原因。一般都采用基于kalman filter的EKF, UKF 等算法。 3. 基于电机物理模型的,目前整理的主要是 KTH 的Karl Johansson、Henrik Sandberg group和uscb的Bullo group的研究工作是基于这个模型做的。可追溯到的最早的这方面的文章是: E. Scholtz 的 “Graphical Observer Design Suitable for Large -scale DAE Power Systems”以及其在MIT的博士论文。 而基于这个模型最早的 power systems 的state estimation文章现追溯到是 Decentralized state estimation of Multi-area Interconnected Power Systems. Xue-Bo Chen, ACC 2002. 由于三种模型的不同,后续的分布式滤波、故障诊断、cyber-attack detection等问题的处理方法完全大相径庭。
In a non-binding referendum, Puerto Rico votes in favor of changing its territorial status and requesting to become the 51st state of the United States .
http://www.huffingtonpost.com/2012/07/23/penn-state-ncaa-punishment-fines-vacate-ban_n_1694219.html NCAA Hits Penn State With $60 Million Fine, Postseason Ban, Loss Of Scholarships And Wins
寻正 麻庭光 于2012年6月7日向我公开道歉 ,我在其博文上留言,表明他的道歉需要进一步修改才可能被接受。鉴于此前交往经验,我认为有必要进一步把我的要求讲清楚,免得造成误解。道歉需要诚意,在麻庭光当初一开始向我请求删除博文就这么讲,在我跟他的交流中,我曾经列出过什么样的道歉才算诚恳的道歉。 在2012年5月24日我回复麻庭光信中解释了道歉的五大要素: When I teach my children to apologize, there are several rules: 1) never make up excuses for wrongdoings, take responsibility instead 2) do not say the words until your heart is ready 3) always promise not to repeat the same wrong 4) always offer to reconcile. It could be in the form of punishment of self, or compensating victim, or both 5) ask for forgiveness, not inform the other person of forgiveness you have already assigned to yourself. 当我教训自己的孩子时,有这么几个规矩: 1)从不为不当行为寻找借口,而是要主动承担相应责任 2)在心未预备好之前,不要开口道歉 3)一定要承诺不再犯 4)一定要主动提供和解方案。和解方案可以是对自己的惩罚,或者补偿受害者,或者二者兼有 5)寻求原谅,而不是告诉对方,你已经把原谅给了自己 这五个规则中,第二个规则可能需要进一步阐述,怎样才算是心里预备好了呢?这个规则其实很易懂,人人都明白是怎么回事,但由于内心是看不见的,就给予了人狡辩或者寻找借口的机会。简而言之,一个人是否真心道歉,非常容易判断,直觉就很可靠。如果我们要寻求具体的指标,那么,道歉不是因为环境压力而做出来的算是一个,道歉过程中不攻击导致自己爆光的人算一个,有的人甚至向对方表示感谢,那就是明显的诚心表现。德国总理每到犹太人聚居区,就要道歉。一旦做了错事,就错事而言,永不抬头。 在中国人中,常听见那种说法,我都道歉了,你还要怎么样?这就是缺乏诚意的经典表现。如果德国总理到了犹太人聚居区不再道歉,问及此事说什么已经道歉了,没必要再道歉,就铁定是挨砖的对象。是的,在错事面前,永不抬头,一旦提及错事,就要主动承担责任——什么责任呢?警醒后来者的责任,这样的事情做不得,做了就永远不得抬头。在此之上,道歉是理曲的结果,但不少人道歉得理直气状,那就是典型的口是心非。 麻庭光总是指责我好战,好挑起争斗,言下之意好象自己是和平使者一样。这样的行为本身就不自洽,因为本身就是通过冷嘲热讽在争斗。这种说法引起我的反感,也彰显道歉本身没有诚意。诚恳的道歉,关注是自身的不适当,寻求的是对方与社会的原谅,寻求原谅的方式是通过具体的自己的行为改变,而不是寻找社会借口,好象别人在事后发现你的错误才是道歉的原因一样——尽管的确如此,大多数的道歉是这么逼出来的。对于诚恳的道歉而言,你做了错事是你唯一道歉的原因。 争斗的意思就是无事生非,责任在争斗者身上。麻庭光更大的失误是为了原谅自己,把责任推诿到举报者身上,攻击举报者用心不良(报复论),或者缺乏判断能力(无知论),或者贼喊捉贼(也是这么写出来的论)。这些都属于明显不适当的人身攻击。发现你的剽窃,结果发现者还要承担那么一大堆责任,甚至是你的剽窃爆光后的主要责任,那谁敢揭发剽窃了?这些说法沾上了就是明显的缺乏诚心的标志。同时,也把自己拖入不必要的更多的纠纷中,谁愿意被泼上一身污水不还击的?你本身就站在道歉致低点,还要被站在道歉致高点的人还击,能受得了吗? 攻击举报者的人格是所有剽窃者的惯于技俩。这一招式之所以常用,因为它有效。举报者要有信誉,你打击了举报者的信誉,自然其他人就更多地站在你一边。方舟子被揭发那么多的剽窃,母校的教授公开指责他剽窃,他没有能力在具体问题上自辩,就只有污化指控他的人,所以他宣称Root-Bernstein教授是搞伪科学的。被举报人关心的是群众大众反应,他们在乎的是声誉而非名誉,是后果而非行为本身是否适当。我为什么最初有强烈的倾向准备删文或者修改后改变了主意呢?因为麻庭光随后来信强调是Google把我的爆光文章排在了首页。你关注后果,而非行为本身是否适当,就自然而然地彰显了诚意的缺乏。 麻庭光缺乏诚意的行为导致了我立场的改变。他在乎结果,我在乎行为本身,于是乎鸡同鸭讲,最终演变成了我对麻庭光剽窃的全面爆光。麻庭光一再强调他是和平使者,寻正是好战分子,事实真相如何呢?事实上他比寻正要好战多了,只不过他的攻击没有我的有效而已。麻庭光不惜把多年前的旧事扯出来说明寻正多么不懂消防,被他教训数年后来找场子了。真相如何呢? 麻庭光的拥趸叫嚣着要跟我比人品。麻庭光的人品真的那么高尚?高尚到可以剽窃?那么我不妨旧事重提,看看当年的真相如何吧。首先要申明,我曾于2008年6月18日向一位叫盛(Sheng)陶(Tao)的留美消防专业博士许诺不爆光他跟我隐下交流内容。然而,这位盛陶如今成了麻庭光,甚至还主动重提旧事混淆是非,我既无继续保留该承诺的义务,也有为要说明相关问题的必要,故而,当初承诺不得不在此正式放弃。 在2008年6月8日,我在新语丝发表了 《教育要放弃军管模式》 一文。该文提及军队管理求同划一的模式是校园踩踏的根源之一。随后麻庭光以“班门弄斧”的笔名攻击我及我的观点: “ 行文越来越野”、“忽悠”、“为发议而找论据”、“拉郎配” 等等。他以“专家”的身份教育我中国校园建议要以美国模式为基础,“ 不准建三层楼以上的建筑 ”。这是2008年6月11日。我随后针对“班门弄斧”进行了反驳,写了《班门莫弄斧,踩踏搞清楚》一文,于2008年6月12日发表在自己的博客上,没有出现在新语丝。于是乎这成了麻庭光说我心怀不正,挟私报复性打假的基础,还得意洋洋地宣称,我的稿件新语丝不采用,好象方舟子判他得胜了一样。 方舟子有时把我在别人博客上留言的大片文字都不告而取发表在新语丝上。他甚少拒绝发表我的文章,所以我此前因为记不得当时场景而认为麻庭光在说慌。麻庭光没有说慌,然而为什么方舟子不发表该文则是臆测。实际情况是在2008年6月12日我在新语丝上发表了一篇《已身不正,何以正人》的数千字的长文,首次谈论普世价值。方舟子不可能舍弃那篇正式的长文而发表我反驳“班门弄斧”的一篇随意之作(方舟子基本上不会在同一期连发同一作者多篇文章,除非是他自己的,我只是偶尔才享受了那么一次两次同期发多篇的待遇)。未曾想,麻庭光事后居然有了夸口的本钱。 当时中国在汶川大地震之后,范美忠一跑成名,把网络作者的兴趣吸引去了,我一驳麻庭光之后,就没有兴趣纠缠了。麻庭光随后在2008年6月14日又以“逃生有理”为笔名,发表了《逃生观念大误解》一文,这一篇文章是如此荒谬,我随后用了最严历的语言驳斥他(《无耻得着无知的助阵——逃生之理》2008年6月16日): 新语丝上近期跳出来一位“逃生有理”的家伙,自称是专业救生人员,曾在四处散布逃命第一的谬论,很是自鸣得意,丝毫意味不到自己的专业水平之有限,还好意思对新语丝指责一句“反应迟钝”。……专业人员(现在知道是麻庭光)说,“逃生第一是要自救,指望别人是靠不住的”,TMD,这是什么专业建议?“逃生不可耻,救人不提倡,社会多纵容,国家有希望”,有什么希望?嫌中国人多了。没见过这么无耻无知的专业人员。……整个一个跟火场完全不同的场景,通篇文章就卖弄自已读书学得半通不通的规则到处献宝……卑鄙是卑鄙者的通行证,TMD,这样的救生人员,这样的“学者”,想忽悠谁呢?文化,并不是推托责任与传达无知的通票!对“逃生有理”这样的专业人员,我不禁想问一句,是无知造就了你的无耻呢?还是无耻造就了你的无知? 我当初之所以破口开骂,因为觉得麻庭光的建议完全不可接受,其在专业知识上完全不靠谱,很大程度上怀疑是冒充的专家。 面临我的严批,麻庭光开始跟我接触。于2008年6月17日主动联系我,他用了一个真的假名字——看起来象真的,却是假的名字Sheng Tao(音盛陶)。我如此严批“逃生有理”,当然也不待见写出了这种文字的盛专家,然而,我为人并不苛刻,俗话说,伸手不打笑面人,我没有正义十足到不愿意跟观点有异的人接触。盛陶一见面就骂方舟子: 很不幸,方舟子对我的言论很感冒,经常拒绝我的文章,看他的观点,就是我所批判的道学家,伪君子,鼓吹别人送死的人血馒头售卖者。现请你指正错在哪里。…… 评价几句方舟子。 方为人极为傲气,对宗教/中医/道德听不进去一点意见, 经常篡改我的文章,我也不明白,为时么我国产生的学者学历越高, 脾气越大,越武断?不能百花齐放,中国没有期望。方最喜欢的阿臾之徒,你难道看不出来?美国的优点在有多样化生存,中国习惯于铲除异己,唯我独尊,在新雨丝就有这种现象。如果你感受不到,算我没说。 我那时跟方舟子好,善意地指出麻庭光看法偏颇,他的用语却越来越激烈: 这一篇文章又被方舟子拒了,我说它是伪君子,不幸言中了。他刊登外行的逃生有理,但拒绝内行的分析,不过是为了维护她自己的道德观,不惜破坏别人的科普常识,这就是你所理解的英雄么?心胸狭隘者,难以成气候。 麻庭光有着向别人邮箱塞文章的嗜好,当时一见面,他就给我塞了一大堆文章。我看了之后直率地给出了我的意见: 1. 你的东西并非全无价值,我可以在博客中挂出来,但我会加以评论,可以直言地告诉你,有正面的评论,也会有更多的负面的评论。 2. 用不同的笔名,虚拟不存在的不同的身份是不适当的,我会指出你不同的笔名是一个人。 3. 方舟子不发你的文章,你就有如此负面的评论,显然缺乏公平之心,极度不适当。虽然我不会把私人通信拿来曝光,但还是要奉劝一句,对已要公平,对人也要公平。 4. 我相信方舟子对你的文章的看法跟我对你的文章的看法是一致的,有一定专业知识,但谬误众多,你的文字上需要加工,比如不要显得象是专为干部评反式的,那样就冲进了道德立场,别人就不愿看你究竟想说什么了。 5. 你的文章专业说服力不强,尽管我现在无法指出哪些地方错了。 麻庭光为了改变我的看法,专门把他以前写的一篇赞赏我的文章发给我(《为寻正鼓掌并不要论断别人》)。拿人手短,我一看他以前这么努力捧过我,估计是随后我不再批判“逃生有理”与“班门弄斧”的原因(呵呵)。我看了麻庭光很多文章,也一如从前指出其荒谬与文笔功夫的欠缺来。我在逃生方面就写常识性的东西,看了他这么多文章,我请他看了一篇,叫他给我提意见。他的意见?嗯,“ 看了你的科普文章,只觉得很天真。 ”然后不谈什么具体的我的“天真”在何处,数百文字卖弄自己的学识来了。 跟麻庭光讨论了无数次简单的逃生问题,他不懂常识,我不懂“专业”(哈哈)。我直言不诲地告诉他,他属于专业知识多于常识的人,叫他跟同行交流。他最终同意把他的观点整理成书或者系列的形式,我愿意找救生专业人员阅读他的观点,并为之写序。他叫我等结果,那是最后一封关于“逃生专业”的交流。再之后,是我针对麻庭光剽窃打假,我猜测他就是盛陶,他承认是盛陶。 之所以把此前的交流晒出来,就是为了表明这一点,我不是打假专家,不靠打假吃饭,我没有嫉恶如仇的习惯,麻庭光数年前主动挑衅我,我仍然能跟他交流得上好,以致于他几乎把我当着知已一般,提议要跟我合作写书,我以不是相关专业人员拒绝之。我是一个诚实的基督徒,要嫉恶如仇,自己一关就过不了。我愿意包容,但却不愿放弃原则。 麻庭光或许习惯于批评成仇氛围,但这对我不适用。我在举报他时,一再强调,见了这么大规模的剽窃,我不得不举报,那是我的义务。而我从无要把人怎么样的想法,除非你不以为耻,反以为荣,激发我的正义感,进一步采取行动。我针对OSU的告之义务局限于举报,采不采取行动,采取什么样的行动,我没兴趣追究——剽窃盛行的责任已经不在我了。【按:我曾威胁要向OSU校长质询,事实上却没有那么做,那不表明没有能力那么做,OSU不公开官员的电邮,但大学校长基本上都是学者,会发表论文,找他一篇做了通讯作者的文章应该不是很难,同样的办法查到校长之上的校董会官员通讯地址。】只要你不象方舟子刘菊花,剽窃始终不认账,我就不会向举报刘菊花那样,有持续问责的冲动。【按:还是得点清楚,只要你认错,我就认为难能可贵,不会采取进一步对你不利的影响工作的行动。那不能跟取得我的原谅采取有利于你的行动相混淆。我针对《力学与实践》的举报与之比同——一般而言,我只尽到告之义务,除非受到挑战激发,才会追问结果。】 我也正告麻庭光助教授,人行正道,方有“千万人,吾往矣”的能力与勇气,寻正如果真如你所言要报复你,当年把你任何一封骂方舟子的电邮转给方,你都会变成方舟子追剿的对象,终止你在新语丝发文的希望而眼不见为净,也自然有方舟子这个大杀器打你的假,哪里用得着我这般连举报你都要在内心挣扎三天三夜,咨询了教友还要请教长老的。现在把你的旧事抖出来,一是不得已而为之,你泼了我一身污水,需要自辩;也同时警告你,不要因为小人的鼓动,产生跟寻正比人品的想法,上帝可以作证,比我人品好的多去了,但绝不包括想跟我比的任何一个。自从麻庭光用剽窃科普作品从方舟子手中骗取奖金时,就把方舟子得罪死了,所以公开这样的看法也属于债多不愁,没有后果考量。当然,也满足我在此公开嘲笑方舟子的愿望,打假斗士给剽窃作品发奖,还发给剽窃量最多的一篇,已属于多重讽刺了,现在再添一重(他也债多不愁也,呵呵),他还把奖发给多年前就开始骂他的人! 我是一面镜子,不要真跟我结什么仇,你当初胡乱攻击我,见面贬斥我,要给我转交同行评议的材料,一等就好几年,我都能忘记,只有在你的再次胡乱攻击下不得不回到当年的邮件中查找真相,对于这等“仇怨”,你记得再清楚,我不记得,只会造成你自己的内伤。 好自为之罢。 附:我在麻庭光2012年6月7日公开道歉博文后的留言: 你的这一道歉如果重写可以考虑接受,毕竟我的最初宗旨就是看到不当行为者的真诚道歉。所谓真诚道歉,就是认识到自己的错误,针对错误进行适当处理,不针对指正你的人进行报复性的攻击。你有必要攻击我“我坦白的每一件事都成为对付我的工具”,好象我专门对付你似的,请你搞清楚,在你“坦白”之前,我早就知道你的文章发表于何处了,需要你的坦白才知道你发表在学术杂志上吗?你这种说法无非挑动别人认为我是占着你便宜举报你的,如果你不主动坦白,我没有能力打你的假,你不觉得很荒谬吗?你什么时候坦白过自己在13篇文章中都剽窃过了? 我处处留情,你则得寸进迟,攻击我不惜跟方舟子的肉粉们为伍,你难道不该为这些说法道歉?你攻击我不懂消防,外行批判专业人员,难道我就没有必要证明你不是内行?我让你给我一个台阶,找一个理由不举报你,你做了什么?只要你始终埋怨别人,你的道歉就没有价值,没有诚意,不可能完全被接受。针对剽窃作品进行处理是第一步,但不是全部。 我从不以为你需要停博,不写科普,但不剽窃,你就写错了,都不致于上升到人身攻击的程度。当然,前提是自己不招惹别人,你攻击了别人,就不要怨别人攻击你。我可以停止甚至删除针对你的专辑(这不包括不继续批判你的观点,但那将会是观点之争),但一如从前,我需要看到诚意。我不是方舟子,需要看到把人怎么怎么样。 另外,我的身份从Univ of Iowa的网页上即可证实: http://dnaapps.uiowa.edu/PublicDirectory/ ,键入我的名字即显示我的工作及工作属类,AAP是Faculty的由来,而SFA则是Staff的由来。这里只显示我的主要工作,即我的主要工作是Staff。
游 Bear Mountain State Park 的 Hessian Lake 黄安年文 黄安年的博客 /2011 年 10 月 17 日 ( 美东时间 ) 发布 昨天( 10 月 16 日) 3 : 00-4 : 40PM , 我们全家来到熊山公园( Bear Mountain State Park )漫步, 主要集中在游览了公园中的以娱乐为目的的 Hessian Lake 。有关 Hessian Lake 的基本情况和历史发展请见下列资料。 照片 33 张为即时拍摄的。 Hessian Lake, New York Hessian Lake is on a tributary of Hudson River in Orange County, New York and is used for recreation purposes. It has a normal surface area of 45 acres. It is owned by Nys Parks and Recreation Palisades. Hessian Lake Dam is of earthen construction, rock fill. Its height is 4 feet Its capacity is 722 acre feet. Normal storage is 722 acre feet. It drains an area of 0.31 square miles. http://findlakes.com/hessian_lake_new-york~ny13563.htm !-- if (inwiki == 1){ document.write(' google_ad_client = \"pub-5543793199319685\";google_ad_type = \"text_image\";google_ad_width = 336;google_ad_height = 280;google_ad_format = \"336x280_as\";google_alternate_ad_url = \"http://wikimapia.org/sys/alternativead/?pageName=show_place_ifr_336_1blockSize=336x280\";google_alternate_color=\"FFFFFF\";google_color_border=\"FFFFFF\";google_color_bg=\"FFFFFF\";google_color_link=\"0000FF\";google_color_text=\"222222\";google_color_url=\"0000FF\";google_ad_channel = \"0118397887+0233386298\"; '); } //-- Hessian Lake, formerly known as Highland Lake and also Bloody Lake, lies at the foot of Bear Mountain on a plateau nearly 1,000 feet above the Hudson River. Dunderberg runs along from Jone's Point (Caldwell's Landing), until it merges into Bear Mountain, and the chain is continuous until it culminates in Bald Rock, Mount Independence, Cro' Nest, and Storm King, which form the highest and most nothern part of the Highlands. The Native Americans that inhabited the mountains from Dunderberg to Cro' Nest were part of the Lenni Lenape nation. On the banks of the Sinnipink, as Hessian Lake was then known, the principal village of the Waoranecks was situated. Stephanus Van Cortlandt, who owned a tract of land north of Anthony's Nose, purchased several hundred acres including Sankapagh Creek and Sinnipink Lake, and was secured by patent. The Waoranecks were then fighting the Warranawonkongs, by whom they were subdued. A few years afterward, the entire tribe was scattered throughout Pennsylvania and its identity was forever lost. With the departure of the Waoranecks the Native American history of Sinnipink ended. In 1775, when Forts Montgomery and Clinton were erected to guard and obstruct the Hudson, Highland Lake still retained its Native American name of Sinnipink. The forts commanded both river and lake. Outposts were formed and fortified at intervals along Popolopen Creek and on the shores of Sinnipink. Old earthworks at the north end can still be traced. A clump of cedar trees has ground around them, and few know of their existence today. On October 6, 1777, before dawn 2,000 English, Hessian and Tory troops quietly left Stony Point. Colonel Beverly Robinson, an American Tory, whose house stood until two years prior on the east side of the Hudson and was known as Arnold's headquarters, acted as guide. They marched along the foot of Dunderberg until Bear Mountain was reached. There the force was divided into two parties. One division of 500 British regulars and 400 Hessians, under command of Colonel Campbell, took a route back of Bear Mountain and came out on Popolopen Creek about four miles west of Sinnipink. They advanced rapidly down the creek until Slaughter Hole was reached. This whirlpool was then known as Hell Hole, and the superstitious believed that it was bottomless. Here the Americans had three field pieces mounted on a bank overlooking the narrow ravine. When Campbell's detachment entered the defile a shower of grape and cannister swept the ranks. In a moment the column was thrown into confusion, and the mountaineers followed up their advantage by hurling rocks into the ranks of the panic-stricken soldiers. Colonel Campbell now saw that unless he quickly dislodged the patriots his division would be annihilated. He ordered 300 men to scale the bank and capture the cannon. The Americans numbered hardly fifty, but they fought like heroes, and when compelled to retreat they hurled their field pieces into the bottomless hole and made their escape to the fort. Nearly 200 redcoats found a grave at Slaughter Hole. While this fighting was going on at the north end of Sinnipink, General Vaughn and Sir Henry Clinton, with 1,200 troops, took the old road through Doodletown and up to the east shore. Here the pass is very narrow. The lake washes it on one side and the steep bank of the Hudson lies on the other. At this narrow and dangerous spot there was a strong outpost. The Hessians were in the lead and boldly attempted to carry it. They were repulsed again and again with great slaughter. General Vaughn, seeing this, ordered them to the rear, and the redcoats charged the works, which were quickly carried. Two hundred and fifty Hessians fell in trying to take the outpost. Their bodies were thrown into the lake, which according to witnesses, was red with Hessian blood for several days after. Since that time Sinnipink was known as Bloody, or Hessian Lake. Hessian Lake is in Orange County, New York, and is now used for recreation purposes. It has a normal surface area of 45 acres. It is owned by NYS Parks and Recreation Palisades. Wikipedia article: http://en.wikipedia.org/wiki/Hessian_(soldiers) http://wikimapia.org/5004021/Hessian-Bloody-Lake
哈德逊河畔 Bear Mountain State Park 行 黄安年文 黄安年的博客 /2011 年 10 月 17 日 ( 美东时间 ) 发布 哈德逊河在美国历史文化上具有重要地位 , 是美国“东北佬”的发祥地, 不了解哈德逊河就难以懂得美国历史的发韧 , 哈德逊河畔风景区,景色宜人 , 哈德逊河谷( Hudson Valley )分上下两个地段, 上自 Albany 地区 , 1991-1992 年间 , 我曾在那里度过了一年时光,下至纽约港 , 上下之间的拐点在西点 (West Point) ,哈德逊河谷一线有着许多历史遗迹和名人庄园 ( 如 Kykuit The Rockefeller Estate, F.D. Roosevelt Home 等 ), 每年夏秋节假日,这里云集许多游客, 或旅游团 , 或自家驾车游 , 或小道 Walk ,各取所好。当年我自 Albany 来 NYC 往往取道 9 号公路 , 沿途欣赏哈德逊河谷美景并参观名人庄园。 昨天( 10 月 16 日)下午 1 : 15—6 : 00PM ,我们由 Danbury, CT 前往哈德逊河畔的 Bear Mountain State Park 游,驱车路线经 84 号公路进入 9 号公路沿着 9 号公路著名的风景区及哈德逊河谷南上,欣赏美东北地区典型的秋色风光 , 在阳光照耀下观看那变化中的斑斓树叶 , 由于今日气候转暖 , 估计迎来树叶变化的黄金时刻在 10 月下旬。 3 : 00PM 抵达具有重要战略地位的熊山 (Bear Mountain) 和熊山公园( Bear Mountain State Park )在公园漫步,游 Hessian Lake 和集市自由贸易, 4 : 40PM 离开返回 , 走河谷另一岸并路过西点军校 , 沿着 9 号公路著名的风景区返回家中时 6 : 00PM 。 , 依据介绍 Bear Mountain State Park is situated in rugged mountains rising from the west bank of the Hudson River. The park features a large play field, shaded picnic groves, lake and river fishing access, a swimming pool, a zoo and nature, hiking, biking and cross-country ski trails. An outdoor rink is open to ice skaters from late October through mid-March. The Perkins Memorial Tower atop Bear Mountain affords spectacular views of the park, the Hudson Highlands and Harriman State Park. Perkins Memorial Drive and Tower are open from April through late November, weather permitting. The Merry-Go-Round at Bear Mountain State Park features hand painted scenes of the park an 42 hand carved seats of native animals including black bear, wild turkey, deer, raccoon, skunk, Canada goose, fox, swan, bobcat, rabbit and more. ( http://nysparks.state.ny.us/parks/13/details.aspx ) 照片第 1-2 张取自网上 , 第 3-7 张取自美国地图; 第 8-9 张拍摄自河谷, 第 10-11 张拍摄自过桥处 , 第 12 张拍自 Hessian Lake , 第 13 张拍摄于西点。 ********************** Bear Mountain State Park From Wikipedia, the free encyclopedia Jump to: navigation , search Bear Mountain State Park View of the Hudson River from Bear Mountain Location New York , USA Nearest city Jones Point, New York Coordinates 41°18′46″N 74°00′21″W / 41.31278°N 74.00583°W / 41.31278; -74.00583 Coordinates : 41°18′46″N 74°00′21″W / 41.31278°N 74.00583°W / 41.31278; -74.00583 Area 5,067 acres (20.51 km 2 ) Established 1913 Governing body Palisades Interstate Park Commission Bear Mountain State Park is located on the west side of the Hudson River in Orange and Rockland counties of New York. The 5,067-acre (20.51 km 2 ) park offers biking, hiking, boating, picnicking, swimming, cross-country skiing , cross-country running, sledding and ice skating. It also includes several facilities such as the Perkins Memorial Tower, the Trailside Museum and Zoo, the Bear Mountain Inn , a carousel , pool and skating rink. It is managed by the Palisades Interstate Park Commission . Contents · 1 Geography · 2 History · 3 Facilities o 3.1 Bear Mountain Inn o 3.2 Perkins Memorial Drive o 3.3 Trailside Museums and Zoo · 4 Activities o 4.1 Ski Jumping o 4.2 Hiking o 4.3 Cross Country Running o 4.4 Speed Hiking Record · 5 In popular culture · 6 See also · 7 References · 8 External links Geography The park includes Bear Mountain as well as Dunderberg Mountain and West Mountain. Fort Montgomery is adjacent to the north edge of the park while Iona Island Bird Sanctuary is on the eastern edge in the Hudson River. The park is a separate entity from the adjacent Harriman State Park which runs along the western edge of the park. It lies within the Northeastern coastal forests ecoregion . History View of Bear Mountain Bridge from the Perkins Memorial Drive mountain summit During the American Revolution when control of the Hudson River was viewed by the British as essential to dominating the American territories, the area that was to become the park saw several significant military engagements. In 1777 British troops routed Patriots at Fort Montgomery . Anthony Wayne 's attack of the British fort at Stony Point moved colonial troops to the west of Bear Mountain. In 1908 the State of New York announced plans to relocate Sing Sing Prison to Bear Mountain. Work was begun on the area near Highland Lake (renamed Hessian Lake) and in January 1909, the state purchased the 740-acre (3.0 km 2 ) Bear Mountain tract. Conservationists , inspired by the work of the Palisades Interstate Park Commission lobbied successfully for the creation of the Highlands of the Hudson Forest Preserve. However, the prison project was continued. Mary Averell Harriman , whose husband, Union Pacific Railroad president E. H. Harriman died in September of that year, offered the state another 10,000 acres (40 km 2 ) and one million dollars toward the creation of a state park. George W. Perkins, with whom she had been working, raised another $1.5 million from a dozen wealthy contributors including John D. Rockefeller and J. Pierpont Morgan . New York state appropriated a matching $2.5 million and the state of New Jersey appropriated $500,000 to build the Henry Hudson Drive, (which would be succeeded by the Palisades Interstate Parkway in 1947). Bear Mountain-Harriman State Park became a reality the following year when the prison was demolished and a dock built for steamboat excursion traffic; the following year a new West Shore Railroad station was built near the dock. In 1912, a replica of Henry Hudson 's ship, the Half Moon was built and moored at the dock. Major William A. Welch was hired as Chief Engineer, whose work for the park would win him recognition as the father of the state park movement (and later, the national park movement). The park opened on July 5, 1913. Steamboats alone brought more than 22,000 passengers to the park that year. Camping at Hessian Lake (and later at Lake Stahahe) was immensely popular; the average stay was eight days and was a favorite for Boy Scouts . By 1914 it was estimated that more than a million people a year were coming to the park. In the 1930s the federal government under Franklin D. Roosevelt was developing plans to preserve the environment as part of the Depression -era public works programs; the Civil Works Administration and the Works Progress Administration , spent five years on projects at the park. Pump houses , reservoirs , sewer systems, vacation lodges, bathrooms, homes for park staff, storage buildings and an administration building were all created through these programs. The park continued to grow after its creation. The Palisades Interstate Park Commission purchased nearby Doodletown starting in the 1920s and completed the acquisition with eminent domain in the 1960s. Facilities Bear Mountain Inn Main article: Bear Mountain Inn Originally completed in 1915, the Bear Mountain Inn is an early example of the rustic lodge style influenced by the Adirondak Great Camps and later used extensively in the National Park System . It closed in 2005 for extended renovations. Perkins Memorial Drive The Perkins Memorial Drive is a scenic road to the summit of Bear Mountain. At the summit, the 40 feet (12 m) Perkins Memorial Tower provides a view of four states and the skyline of Manhattan , 40 miles (64 km) to the south. The road and tower were built by the Civilian Conservation Corps between 1932 and 1934. It is named after George Wallbridge Perkins, the first president of the Palisades Interstate Parks Commission. Trailside Museums and Zoo The Trailside Museums and Zoo are located at the former site of Fort Clinton . Its name is a reference to the Appalachian Trail that runs through the complex. The zoo began as a bear den in 1926 and is currently the home of a wide variety of local injured or rehabilitating animals, including bears, otters, deer, bald eagles, and owls. The Reptile and Amphibian House has many species of fish, turtles, snakes and frogs. The Nature Study Museum was formed from the original exhibits created by the American Museum of Natural History for the Boy Scouts facility in the park in 1921. The Geology Museum covers the Hudson Highlands and other local geology. The History Museum has exhibits about colonial and Native American culture. Activities Ski Jumping Ski jumping began in the park in 1928. On February 11, 1962, 35,120 spectators turned out to watch the New York State Junior Ski Jumping Championship. More jump competitions were held at Bear Mountain than at any other ski jump in the United States; however the ski jumps have not been used since 1990. Hiking There are over 50 official trails covering 235 miles (378 km) of trails. They cover a wide range of difficulty and elevation changes. The first section of the Appalachian Trail , taking hikers from Bear Mountain south to the Delaware Water Gap , opened on October 7, 1923 and served as a pattern for the other sections of the trail developed independently by local and regional organizations and later by the federal government. The Bear Mountain Zoo, through which the Appalachian Trail passes, is the lowest elevation on the 2,100-mile (3,400 km) trail. There are 6 miles (9.7 km) of the AT located in the park. In 2010, sections of the AT within the park were rebuilt with stone steps to handle the 500,000 annual hikers. Cross Country Running Bear Mountain also regularly hosts cross country running events during the fall season. High school cross country teams compete on the 3.0-mile (4.8 km) course, which mostly consists of paved walkways. Bear Mountain is the location for the County's Championship race. Speed Hiking Record On July 15, 2011, Avrahom Lewinson set the record for finishing the Mountain Trail in a record time of 29:30, beating his previous record of 30:36. The record attempt can be seen in the log book in Perkins Tower. In popular culture The park is referenced in the Bob Dylan song "Talkin' Bear Mountain Picnic Massacre Blues". Some believe Kate Smith wrote her 1931 theme song “ When the Moon Comes Over the Mountain ” while at the Bear Mountain Inn . If so, the mountain in question might be Anthony's Nose which lies to the east across the Hudson River. See also · List of New York state parks · Bear Mountain Bridge · Dunderberg Mountain References 1. ^ Olson, D. M, E. Dinerstein, et al (2001). "Terrestrial Ecoregions of the World: A New Map of Life on Earth" . BioScience 51 (11): 933–938. doi : 10.1641/0006-3568(2001)051 2.0.CO;2 . http://gis.wwfus.org/wildfinder/ . 2. ^ "Major Welch Dies; Builder of Parks" . New York Times : p. 17. May 5, 1941 . http://select.nytimes.com/gst/abstract.html?res=F20D17F73559167B93C7A9178ED85F458485F9 . Retrieved October 30, 2009 . 3. ^ "Bear Mountain Park, NY" . The Palisades Park Conservancy . http://www.palisadesparksconservancy.org/parks/5/ . Retrieved 13 September 2010 . 4. ^ "About the Trailside Museums" . Trailside Museums and Zoo . http://www.trailsidezoo.org/about/about-the-museums . Retrieved 13 September 2010 . 5. ^ The New York Times , February 12, 1962 6. ^ Applebome, Peter (30 May 2010). "A Jolt of Energy for a Much Trod-Upon Trail" . New York Times . http://www.nytimes.com/2010/05/31/nyregion/31towns.html?_r=1scp=1sq=bear%20mountain%20state%20parkst=cse . Retrieved 12 September 2010 . · Myles, William J., Harriman Trails, A Guide and History , The New York-New Jersey Trail Conference, New York, N.Y., 1999. · 50 Hikes in the Lower Hudson Valley Written by New York-New Jersey Trail Conference members Stella Green and H. Neil Zimmerman - The Countryman Press. 296 pages, 2008, 2nd ed. External links · Bear Mountain State Park · Palisades Park Conservancy · Trailside Museums and Zoo · HarrimanHiker.com - With Many Hikes and Photos of the Area · Bear Mountain Inn · Bear Mountain State Park Railroad photos (November 12, 2005) · Harriman-Bear Mountain State Parks Trail Details and Info · U.S. Geological Survey Geographic Names Information System: Bear Mountain State Park http://en.wikipedia.org/wiki/Bear_Mountain_State_Park
According to Hawaii Foodbank, it provides food to 183,500 different people each year, including 55,000 children. In Hawaii, 1 in 7 people are in need of food assistance. The foodbank is very effective at collecting donations. For example, they print ticket-like coupons of three different face values, and place them at supermarket check-out counters during holiday seasons. When you are purchasing food to feed your loved ones at home, how could you down down a small request, such as $x will provide a child breakfast for a week?
静息态脑成像研究视频推荐 Marcus E. Raichle最近几年来的“布道”视频: 【1】2007年《网络动力学》会议:Spontanous intrinsic network dynamics: an fMRI perspective. 【2】2008年《Klaus Hoffman讲座》:Two views of brain function. 【3】2009年《静息磁共振最新进展》会议:Time. 【4】2010年《认知神经网络》会议:Two views of brain function.
I have been waiting for the coming of the 6th chapter, Enacting Technology: an institutional perspective. After a long depiction of theoretical background, the author has sketched the analytical frame. What theory will be chosen? what new theory will be formulated? What is the relationship between the information technology, organizations, embeddedness, and institutions from an institutional perspective? I can not wait for more aminute. At first, the author summarize a few shadow theories that misinform decisionmaking and clarity of discussion of technology and structure, including technological determinism, rational-actor perspectives, incrementalism, systems analysis, and individual and group perspectives. Technology determinism always neglects the interplay between technology, embeddedness, and behavior and believes that technology acts autonomously upon individuals, social arrangement, and institutions. Rational-actors theories, including functionalism, natural selection and other frameworks, assume that organizations will choose the best technological offerings and learn to use IT in better and better ways while ignoring the role of institutions. Incrementalism is often invoked as a means of avoiding error in the policy process, but it doesnt prevent government actors from moving incrementally in the wrong direction because of path dependence. Criticism on systems perspective is a challenge. The author thinks that this perspective ignores these and other social structural processes while it says institutional lag. The author use the example of the high failure rate of business process engineering as a example to explain the need to attend to social and political structures, organizations, and networks. Because of the enormous scale of government organizations, the integration of new IT is exceedingly difficult. Research results from other individual-level perspective are sometimes weak because they are inconclusive and contradictory. Then contingency theories are analyzed, such as Barleys model which focuses on roles and role relationships but left the examination of organizational mechanisms, such as performance programs and operating procedures, and ignores the political or strategic behavior of actors in the context of new technologies. Technology enactment theory contributes partial answers to some of these unanswered questions. I said at the first edition of the article, enactment is an attractive concept. I have to say, I am obsessed by the theoretical framework of the book. I know something of those theories criticized by the author, but I didnt pay attention to their confines. The author does. On the basis of the theory review, the author puts forward, technology enactment will be an analytical framework. This is the core of the book. Technology enactment is the result of cognitive, cultural, structural, and political embeddedness. Enactment is similar to the definition of the situation, or the subjective representation of a problem that reflects an actors perception and boundedly rational reasoning rather than the situation itself. And then, an analytical frame is given. The analytical framework details the ways that individuals in institutions tend to enact new information systems to reproduce existing rules, routines, norms, and power relations if institutional rules are clear and no salient alternative uses are visible in the environment. The author explains, this conceptual framework illuminates the critical role played by sociostructural mechanisms in organizational and institutional arrangements as public managers struggle to make sense of, design, and use new IT. Individuals often enact existing performance routines and network relationships in the way they design and use web-based information and communication system. ..Knowledgeable actors try to pursue their interests in enacting technology. However, their interests are influenced by their organizational tasks, incentive structure, and ongoing social (network) relations. I have to write down, institutional arrangements mean cognitive, cultural, sociostructural, legal and formal arrangements. Selznick distinguished organizations from institutions, noting the propensity of some organizations to take on a particular character or competence over time. He defined the process of institutionalization as the emergence of orderly, stable, socially integrating patterns out of unstable, loosely organized, or narrowly technical activities...At the micro level, procedures, habits, and cognitive patterns are institutional instruments when they are widely shared and largely taken for granted.So, the behavior of bureaucratic decisionmakers is embedded in four ways, through cognition, culture, social structure, and formal government systems. During periods of stability, institutions are taken for granted. But when environmental shifts occur, institutions are less resistant to change. More recently, institutions and structure have been conceptualized as enablers of, as well as constraints on, behavior. In this sense, institutions can be defined simply as reproduced practices that are both flexible and remarkably stable. even the most enduring of habits, or the most unshakable of social norms, involves continual and detailed reflexive attention. Routinization is of elemental importance in social life; but all routines, all the time, are contingent and potentially fragile accomplishments. A routine may be said to be institutionalized only when departures from the patterns are counteracted in a regulated fashion, by repetitively activated, socially constructed, controls-----that is, by some set of rewards and sanctionsInstitutions are those social patterns that, when chronically reproduced, owe their survival to relatively self-activating social processes. Insights including selective attention and search; limitations of perception; the centrality of scripts, schemas, routines, and performance programs; and the variety of unanticipated consequences of rule-based behavior explain departures from rationality and ironically, departures from institutional constraints as well. The important insights of the Carnegie school that stem from viewing organizations as interdependent and partially consistent production systems complement negotiated order theorys view of the fluidity of structure and the processual nature of scripted behaviors. Formal norms operate explicitly through rules and are reinforced through the monitoring and enforcement efforts of, for example, individual organizations and the state. Informal norms, the rules adopted and adhered to by a group, may be explicit but are often implicit. They are enforced through social mechanisms, including approval, acceptance, disapproval, avoidance, and shunning. Organizational, network, and institutional arrangements----and the embeddedness of behavior in them----play key roles in technology enactment. Enacted technology is the perception, design, and use of objective technologies. The institutions influence and are influenced by enacted IT and predominant organizational forms. Institutions enter the technology enactment framework in the form of cognitive, cultural, sociostructural, and formal embeddedness. The outcomes of technology enactment are therefore multiply, unpredictable, and indeterminate. Outcomes result from technological, rational, social, and political logics. Virtual state is a result of the concrete application of the technology enactment framework. The virtual state denotes a government in which information and communication flow increasingly over the web rather than through bureaucratic and other formal channels. The restructuring of agency services and information in portals sometimes makes it difficult for citizens to know which agency they are dealing with. The organizational and institutional perspective is an interesting challenge for me. The methodology and structure also make me interested. The author teaches me a method to put forward a new concept or theory. Thats valuable. The left parts are practice. The author said, My first objective is to illustrate technology enactment at work. At a more ambitious level, the cases presented in this and the following three chapters are meant to test whether the framework is supported. Enacted technology is a product of design, negotiation, politics, understanding, social construction, entrepreneurship, and leadership. The Internet is used often to reinforce old institutional structures rather than to pen communications. Channel development occurs selectively and is controlled by public managers. ( The end)
Building the Virtual State comprises two parts: theory and practice. In theory part, there are 6 parts in total: Introduction, Leveraging cyberspace to reinvent government, networked computing Bureaucracy, Inter-organizational networks, and Enacting technology:an institutional perspective. The first three partsof the book delineate the exciting emergenceof information technology and the huge changes in state and organizations brought about by it. The Internet is thought as an enabler of virtuality. Information technology will be used to reinvent government. Virtual agencies, or federal interagnecy websites, would enable service integration not possible outside cyberspace, the author brings forward based on an analysis of the case of virtual federal government. What I am interested in most is the institutional perspective of the following three chapters. The institutional analysis of information technology in government makes me curious. In economics, institution and technology are thought as two main impetus of society. However, how do the institution and technology interplay in a bureaucratic organization like government? What will happen to the structure, rules and governance of government while the information technology is used deeply? The third chapterbegins with the discussion ofthe bureaucracy from Max Weber.Fountain concludes characteristics of modern bureaucracy fromWeber's view points. Weber's rational-legal ideal type was meant to indicate how bureaucracy could replace personalistic, patrimonial, patriarchal governance in society and economy. The modern American state is a bureaucratic state. She helps the reader to understand that fundamental concepts of governance follow logically from Weber's conceptualization, including jurisdiction, hierarchy, merit, documentation, and professional training in administration. If bureaucracy is outmoded or deficient, which of these elements has changed? In the third chapter, Fountain goes on toabstract the central elements of bureaucratic structure as : (1)coordination, which includes mutual adjustment, supervision, standardization, and the standardization of people. As for the last point, the author explains that standards may be socialized into people, just as they are into work processes and equipment , through selection methods, traininng and education, appraisal, and incentive systems that reward standard behavior and punish deviations. (2) Bureaucratic functions. Every elementis circumscribed to the impact that information technology will bring on it. at a minimum, this tell us that design and use of the Internet would be a source of negotiation and political contest, the results of which have implications for authority, power, and resource distribution. (3) Bureaucratic flows. Flows of authority, work, control, and staff information circulate in all directions throughout the organization. Indubitably, the author think that bureaucracy is central to modern government today. The last part of the third chapter is Weber Redux. Has jurisdictional disappeared? By no means, although some jurisdictional boundaries have changed character. A comparison between classic elements of bureaucracy with the structural elements and that in the wake of technological changes. A notable result has been the detachment from individuals holding a particular role. To the extent that information is power, this fundamental structural shift has important implications for authority and power in government. In sum, the author thinks that the use of the Internet in bureaucracy is likely to lead to greater rationalization, standardization, and use of rule-based systems. The rules may not be visible because most of them will be hidden in software and hardware. But they will remain and may increase in power. Technology might be enacted to facilitate collaboration, shared information, and enhanced communication. Equally plausible, it may be designed and used coercively to promote conformance and control. At the end of the third chapter, the author said: But bureaucracy, in either rendering, has not diminished in importance. That is her view.
Lecture 2: Classification Schemes for the Elements - Mendeleyev and the Periodic Table - Atomic Structure Donald Sadoway 3_091-2004-L02.pdf elem_biblio.pdf lecture_2.pdf
Lecture 1: Vision Statement, Administrative Details - Introduction - Taxonomy of Chemical Species - Origins of Modern Chemistry Donald Sadoway 3_091-2004-L01.pdf lecture_1.pdf
Paper: Formal semantics of UML state diagram and automatic verification Based on Kripke structure Author: Yefei Zhao, Zongyuan Yang, Jinkui Xie Abstract: If UML is formalized with dynamic semantics, automatic verification can be performed for system model in the early stage of software procedure. It becomes more and more important to apply model checking in UML, such that software architecture can be formalized with dynamic semantics. We explicitly proposed the mapping rules between UML state diagram and Kripke structure semantics. UML state diagram is mapped to the value transition of variable rather than the transition of states, thus the situation in that system finite state automata cant be exhausted can be resolved. Finally, a critical resource competition example is illustrated according to the theory. The mapping rules we proposed are bi-direction, as a result, the theory can be applied in both forward software engineering in design phase and reverse software engineering in implementation phase. Published in Conference: 22nd IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2009)(EI index) Date: May, 2009