text
stringlengths 241
486k
| __index_level_0__
int64 0
63k
|
|---|---|
Background Drug shortages are currently on the rise. In-depth investigation of the problem of drug shortages is necessary; however, a variety of definitions for ‘drug shortages’ are adopted by different organisations, e.g. Food and Drug Administration (FDA) and the American Society of Hospital Pharmacies (ASHP). For international comparison, it is important to clearly denote which definition is used by the national authorities or by (inter)national organisations.
Purpose To identify and compare different definitions and analyse the overlap and missing info in each definition.
Material and methods A literature review was performed searching the scientific databases MEDLINE and Embase for definitions of drug shortages. Grey literature, such as websites and documents of (inter)national drug agencies, was also incorporated.
Results More than 15 different definitions for drug shortages were identified. Articles in the scientific literature often refer to existing definitions. Only a few articles describe their own definition. After comparison of the definitions some overlap was observed. Sometimes drug shortages are defined as situations in which a drug is undeliverable for a certain period; this period ranges from one day to 20 days. However, delaying treatment of infectious diseases for 20 days will have a serious effect on patients. Other definitions only consider those drugs used for the treatment of serious diseases or drugs for which no alternative is available; this underestimates the size of the problem.
Conclusion The ultimate goal is to formulate a general European definition for reporting drug shortages, which is essential for international comparison. Indicating a time limit in the definition is an essential element for the comparison of nationally reported drug shortages. This time limit might be even one day if the patient’s health warrants it. A definition of drug shortages covering all types of drugs is crucial to acknowledge the size of the problem.
References and/or acknowledgements No conflict of interest.
Statistics from Altmetric.com
If you wish to reuse any or all of this article please use the link below which will take you to the Copyright Clearance Center’s RightsLink service. You will be able to get a quick price and instant permission to reuse the content in many different ways.
| 52,219
|
Napoleonic Wars: Prussian 1813Iron Cross 1st Class
Iron Cross 1st Class. The Eiserne Kreuz (Iron Cross – often abbreviated EK or IC) was instituted on 10 March 1813 by the Prussian King Friedrich Wilhelm III. It was awarded for bravery in the field – without regard to rank – during the Befreiungskrieg (War of Liberation also called the Napoleonic Wars). The Iron Cross was designed by Karl Friedrich Schinkel, a famous Prussian sculptor and architect. 1813 Iron Cross 1st Class examples to non-Prussian recipients requires extensive documentation since this would be a fairly rare museum piece. All documented Prussian recipients received at least one other medal – normally the Kriegsdenkmünze für 1813/5. Most sources indicate that the Iron Cross 2nd Class was required to be awarded prior to the 1st Class (as described in the royal decree) but there is some evidence that this was not strictly followed. On 3 August 1841, King Friedrich Wilhelm IV approved a special yearly payment to some of the Officers, Sergeants and Corporals who were Iron Cross 1st Class recipients. The best figures available indicate that approximately 638 Iron Crosses 1st Class were awarded for the Befreiungskrieg.
The 1813 Eiserne Kreuz I. Klasse or Iron Cross 1st Class is approximately 4.2cm by 4.2cm, weighing 16.5 grams (maximum), made of blackened iron, and has a silver edge. The obverse was void of any design or lettering, other than the silver frame. The silver content varied slightly within the 800-900 range. The reverse was a silver backing which was an integral part of the silver edging and had 1 to 2 loops welded onto each arm for sewing onto the uniform. The original official issue is unknown with a hallmark. The Cross was worn on the left side slightly below the heart and below any medal(s). Many recipients had converted their awards to pin backs by the mid-1800s. A Prussian Cabinet Order, dated 4 December 1871, did not specify the wearing of the 1813 Iron Cross 1st Class but it did specify the wearing of other orders, decorations, and medals which a recipient may have been entitled to.
1813 Eisernes Kreuz I. Klasse (obverse)
(Illustration example only)
The Iron Cross: A History, 1813-1957 (Gordon Williamson, published by Blandford press, 1985 – he also is involved with an excellent online site) is an excellent reference work that should be consulted. There are other similar books which deal with the Iron Cross overviews. A review of most Prussian unit histories typically list the number of 1813 Iron Crosses 1st Class that were awarded and often provide some biographical information and illustrations. The German Decorations & Orders Society (BDOS) publishes outstanding detailed information as well. A well documented book has been published in Germany which attempts to list all known recipients, but it is out of print and is difficult to locate.
It is interesting to note that almost immediately, jeweler’s copies were made for the recipients who had lost or damaged their Iron Crosses or who wanted a better quality. Many of the replacements varied outside the 800-900 silver range and some were even made of nickle. This confounds the correct identification of the originals since both are contemporary awards. The 1830s and 1840s jeweler’s copies are fairly well documented and are most often encountered on the market (although the seller usually doesn’t mention that it’s not the official issue). As a general rule, the original issue 1813 Iron Cross 1st Class did not have a pin back (unless added later) and did not vary much from the 4.2cm squared. Many of the jeweler’s copies carry hallmarks which aids in identification – but not all – and some of these are not made of iron, making them non-responsive to a magnet test. Most of these near-contemporary Crosses are of sizes at 4.175cm or less or 4.275cm or greater with the width and height exactly equal. If you are adding this to your collection, you will need to be especially careful in your purchase since a verified contemporary Iron Cross 1st Class may be either the original issue or a jeweler’s copy. It is best to obtain one through a Napoleonic era Prussian medal specialist with a full guarantee. In late-2006, a USA online dealer had a wide selection of 1813 Iron Crosses 1st class for sell at prices ranging from $2,249.95 through $2,999.95. I’ve only seen 4 original (as issued) 1813 Iron Crosses 1st Class in Germany during the last 12 years and two were sold prior to being offered to the general market – the other two (both were sew-on 8 loop examples) were in German museums.
Copies and forgeries abound. Most copies (typically cast) are made for collectors or re-enactors who require an example and typically sell for about $12 to $75. Please review my copy medal guide http://reviews.ebay.com/Worldwide-Military-Medals-Copy-Medal_W0QQugidZ10000000001875117 for a more detailed explanation. The forgeries are typically either one of 2 types: a later type official Iron Cross 1st Class with the obverse very finely removed and re-coated and the other type is one that has been struck from dies. The later can be difficult to detect but a trained specialist can make that determination through an analysis of the metal and the silver beading. The vast majority of these do not use the welded sew-on loops but rely on the pin backs. Please review my forgery medal guide http://reviews.ebay.com/Worldwide-Military-Medals-Forgery-Medals_W0QQugidZ10000000001875079 for a more detailed explanation. Both forgery types are sometimes encountered at German flea markets, militaria shows, or are offered online – usually at a price approaching that of a verified authentic example. As mentioned earlier, jeweler’s copies are known and are generally regarded as suitable collector examples if they are verified contemporary – but many sellers do not make the distinction clear. Again, the best advice is: Buy only from a reputable dealer who specializes in Napoleonic era Prussian medals. Please visit my blog (http://blogs.ebay.com/tsa-li) and/or guides for further information.
The Iron Crosses of Deutchland: Each one below was earned.
The Iron Cross used to be a real honor. The Cross has been designed in impressive, subtle simplicity in 1813 for the war against Napoleon by the famous artist Schinkel and reestablished in 1870, 1914 and 1945. ‘Iron’ has the meaning without gold etc., just to honor bravery in action. It has been exclusively given to soldiers with merits on the battlefield – not for any other merit. (an exeption: commanders of important strategic moves). In the Second Wold War the higher classes of the Cross could and has been given to ordinary soldiers for the first time. The Knights Cross for an infantry man gave him an enormous reputation.
The Cross of your Grandfather is the second class (with a ribbon). As the war lasted on more and more soldiers received it. Hitler got the first class as a private and could rarely be seen without it. Contemporary German military airplanes carry the sign still on their wings. But no Iron Cross could be won since 1945.
Yours, Dieter Henrich
| 4,148
|
Are you know the how does an infrared thermometer work. When you believe a thermometer, you almost certainly picture a tool with some quiet probe that’s placed into the thing being measured.
Whether it is a thermometer that you place under your tongue to take your own temperature, a food thermometer that you push into a piece of meat to make sure it’s done, probe-style thermometers have long been typical.
However, there are many other options on the market today, and infrared thermometers are among the foremost exciting and useful styles to think about. Offering simple use and accurate readings, there are tons to love about an infrared option.
An infrared thermometer could also be involved anytime the surface temperature of an object must be determined.
Obviously, since the infrared beam is merely bouncing off of the surface, this is often not an appropriate method of measurement when the inside temperature of an object must be found.
Checking the extent of warmth coming from a bit of kit, as an example, maybe a great way to see the trouble which will be occurring within.
Considering what percentage of various infrared thermometer models are available today, and the way accurate they need to become, it’s easy to ascertain why they’re a well-liked choice during a number of industries.
A Simple Principle
While the technology that creates these thermometers’ work is certainly complex, the concept itself is quite simple.
Since there’s heat being emitted by any object, an infrared thermometer can use the difference between the IR rays coming off of the thing and thus the encompassing environment to determine the surface temperature of the object itself.
The IR thermometer works by focusing light that’s coming from the thing within the sort of IR rays and funneling that light into a detector which is additionally known as a thermoplastic.
There is sort of reasons why you need to consider choosing infrared technology for your temperature reading needs. When buying a thermometer to feature to your stable of kit, consider purchasing a top-quality infrared thermometer for a few of the subsequent reasons.
Obviously, you’d wish to be confident that you simply are getting an accurate reading from your thermometer once you set it to use, and infrared models have an excellent reputation for accuracy.
One of the good things about having the ability to see temperature remotely is that you simply don’t really need to touch the thing in question.
If you’re trying to require the temperature of a very hot item, you will not get to place your hand, or maybe another piece of kit, onto the recent surface.
3. Contamination Prevention
Another benefit to the remote measuring instrument is the avoidance of contamination. This is particularly important within the food service world, but it applies in other applications also.
There are certainly quite three advantages to using infrared, but the three listed above are a number of the foremost important.
Additionally, the value of this technology has come down in recent years, meaning you’ll access this great method of temperature measurement for a significantly lower cost than it would have required just a couple of short years ago.
Working of Infrared Thermometers
Similar to light, it’s also possible to focus, reflect, or absorb infrared. Infrared thermometers employ a lens to focus the infrared emitting from the thing onto a detector mentioned as a thermoplastic.
The thermoplastic is nothing but thermoplastic connected serial or parallel. Factors to Consider When Selecting IR Thermometer.
The most crucial aspect of any thermometer is its accuracy. For infrared thermometers, the accuracy depends on their distance-to-spot ratio (D/S ratio). This ratio indicates the maximum distance from where the thermometer can evaluate a specific surface area.
It means that with bigger ratios, you can measure the temperature from a farther distance. However, the area also will increase with increasing distance.
Emissivity: How does an Infrared Thermometer Work
Emissivity shows what proportion of infrared energy a thermometer can put out at a time. IR thermometers with emissivity closer to 1.00 can read more materials than those with lower emissivity values.
An infrared thermometer’s temperature range affects the work you can perform with it. You may want to urge an IR thermometer with a good temperature range to record various processes with different temperatures.
On the contrary, an infrared thermometer with a narrow temperature range is better where higher resolutions are necessary to ensure proper temperature control of a specific process.
Reading Speed or Response Time
Reading speed may be the time the thermometer takes to deliver an accurate reading after initiating the thermometer’s reading process.
Design: How does an Infrared Thermometer Work
Industrial IR thermometers must have a rugged design. No-lens and Fresnel lens thermometers are durable thanks to their polymer structure, which keeps them safe.
A backlit screen makes it easier to read the thermometer even in adverse lighting conditions. How does an infrared thermometer work?
Warranty of How does an Infrared Thermometer Work
Warranty is a must-have feature in thermometers, as they are fragile or may even turn out to be defective. No-lens and Fresnel thermometers are cheaper than Mica lens thermometers, which may be a reasonably massive investment.
If you are buying any expensive thermometer, get the one that comes with a manufacturer’s warranty. How does an infrared thermometer work?
Infrared thermometers are essential to use while reading the temperature of a surface that’s too dangerous, and almost impossible to succeed in. With the complex inner workings process, these thermometers give rapid results and are simple to use.
However, before picking an IR thermometer, attempt to find out the temperature range and your application. Also, confirm to use the device correctly and at the proper place to urge accurate results.
| 44,694
|
These interesting risetime calculators were in use at Tektronix in the early days (note the 51X-style knobs and the Portland address). They consist of a small battery-powered analog computer specifically for calculating cascaded risetime calculations. Risetime is defined as the time taken by a signal to transition from a defined low state to a defined high state, often 10% to 90% of its final value.
This calculator was used to determine the overall rise time of three cascaded blocks, each with its own risetime. The resulting risetime is the square root of the sum of the individual risetimes squared.
The museum has a risetime calculator. Note the unique battery holder in the upper left corner of the rear photo. The trimmers match the resistors to the potentiometers. The individual risetimes are set using the A, B and C knobs and the meter is then nulled using the F knob which displays the cascaded risetime.
This analysis of the circuit demonstrates how analog computers function.
| 41,847
|
WHEN CONGRESS passed a national school-violence policy in 1994, many states followed with even stricter measures. But those laws, it now seems, are based on a faulty premise: that courts are the best place for disciplining children.
The failure of this idea is clear in New York, where zero-tolerance policies have lead to arrests for gun possession on school grounds, but also for relatively minor offenses like shoving. Even nonviolent incidents—doodling, throwing food, back-talking—have landed kids in court, where last year New York sent more than 1 4OO minors (average age: less than l6) to correctional facilities.
According to a series of recent reports—by the Justice Department and the state Office of Children and Family Services—the institutions don't help. Nearly nine of 10 occupants commit additional crimes. It's a "school-to-prison pipeline," says Judith S. Kaye, the state's former chief judge.
She hopes the negative publicity will provide a push toward alternative modes of justice (like youth courts, where peers hear the cases of peers), more civics classes (where kids learn the virtues of sociability), and level headed adjudication—where detention doesn't always involve a cell. — T.D.
|Violence Prevention Programs Only|
|Eliminate weapons||Encourage students to abstain from violence|
|Suppress violent behavior||Identify causes of violence|
|Train faculty and staff to intervene||Adopt a threat-management policy|
|Target students who commit violent acts||Provide debriefing sessions for students traumatized by violent incidents|
|Discredit violence||Increase self-esteem|
|Have a weapons hotline||Teach students how to manage anger|
|Comprehensive Violence Prevention Program|
|Meet nurturing needs|
|Create a cooperative environment|
|Encourage positive and lasting relationships|
|Limit out-of school time|
|Provide long-term conflict resolution/peer mediation training to all students|
|Form partnerships with parents and community|
|Include components from violence prevention only programs|
| 25,026
|
Young Climate Change Mappers continue work through the end of this week, uploading geolocations and images as key contributions to UNICEF’s global digital chart highlighting climate change and disaster risk reduction throughout the world.
They will come together at the March 13 World Conference on Disaster Risk Reduction in Sendai, Japan, to share their findings on best practices in dealing with climate related disasters.
UNICEFs Voices of Youth Maps utilize community reporting to detail the local impact of natural disasters, epidemics, extreme weather events, and pollution. Youth participation in these projects is gaining traction as organizations increasingly recognize the need for inclusiveness in successful Disaster Risk Reduction (DRR) projects.
Since 2011, UNICEF has been utilizing mobile technology to engage youth in projects mapping local health and environmental problems, but the organization is also highlighting low-tech projects, equipping youngsters with colored markers and paper to map environmental and health issues in the urban slums they call home.
Teams of young mappers and adult facilitators spend roughly 45 days traversing their slums. They learn the shape of their neighborhood, how streets interconnect (or don’t), and the the density of homes there. This information becomes the map’s skeleton. Then, they fill in the specifics. They stake out what’s needed through the eyes of children—where underserved public areas could become play spaces, where trash bins could be added in an area they regularly see littered with filth. Their ideal neighborhood is drawn and detailed onto the map. Then, after it’s complete, leaders from the child clubs present their work to local officials. Link
One of the most significant health issues being researched is the lack of public toilets in India’s slums, particularly toilet seats small enough for kids who live in the slums. Several kids place dots on their maps to reflect their ideas on where kid-friendly toilets are most needed.
Humara Bachpan, a national campaign to create healthy and safe environments for India’s poor urban youth, currently has children mapping slums in Mumbai, Delhi, and Hyderabad. Plans are underway to expand the program.
By championing the contribution of children in solving relevant complex problems in their daily environments, kids develop and utilize analytical thinking skills, which earn them a place in mapping the future they want.
| 23,878
|
Hiroshima: The Day the World Changed Forever
The United States dropped the first atomic bomb on the city of Hiroshima, Japan, 74 years ago. In addition to killing tens of thousands of people, that moment changed the world forever.
A bell tolls every year on Aug. 6 in Hiroshima, Japan. Nearly everything in the city (including traffic) comes to a stop for a few minutes. As the bell rings, citizens of Hiroshima take time to reflect on the horrors that city experienced on Aug. 6, 1945.
At that time the Japanese empire was at war with the Allied nations. A little over 3½ years earlier, Japanese forces had staged a surprise attack on the U.S. naval base at Pearl Harbor, Hawaii, killing or wounding nearly 3,600 servicemen and women. That unprovoked attack drew the United States into World War II.
The day the nuclear age was born
On that clear and bright August morning, a Boeing B-29 Superfortress (named the Enola Gay), flying at an altitude of nearly 6 miles, released a 9,700-pound bomb on the city of Hiroshima. This bomb was code named Little Boy. It dropped for about 43 seconds before detonating. When it did, history changed forever. It was the first atomic bomb to be used in battle and ushered in the beginning of a new era of warfare.
The port city of Hiroshima was chosen because it contained naval and military installations, as well as a large civilian population. When Little Boy detonated, between 60,000 and 80,000 people died almost instantly. Most of these never even realized a bomb had been dropped.
Three days later, a more powerful atomic bomb (code named Fat Man) was dropped on the city of Nagasaki, ultimately killing an additional 70,000 people. Six days later Japan announced its unconditional surrender to Allied forces, officially ending World War II.
In the ceremony last year, Hiroshima mayor Kazumi Matsui described the hellish scene that changed the world that morning. He asked those listening to be quiet and listen “as if you and your loved ones were there.”
Mr. Matsui also warned that global tensions are rising, and nations are modernizing their nuclear arsenals. He said, “If the human family forgets history or stops confronting it, we could again commit a terrible error. That is precisely why we must continue talking about Hiroshima.”
The problem is deeper than nuclear weapons
Nuclear weapons are truly frightening. But they are not the only danger we face. People have designed and used deadly weapons of all kinds. And in one sense, what real difference does it make to a soldier or a civilian whether he or she is killed by an atomic bomb, a hand grenade or a bullet? Or, as in ancient times, an arrow, a spear, a club or a rock? Killing is still killing, and human beings have been doing it since Cain slew his brother Abel (Genesis 4).
Nearly every weapon mankind has invented has been used—which paints a bleak picture of mankind’s future, barring some major change.The difference, of course, is the massive scale. There is no way men would be capable of destroying all life on earth with rocks and arrows, or even bullets and conventional bombs. But with the terrifying level of destruction possible with atomic weapons, that capability now exists. This development was prophesied by Jesus in the Olivet Prophecy: “And unless those days [the Great Tribulation] were shortened, no flesh would be saved [alive]” (Matthew 24:22).
To learn more about this time prophesied to come, read our article “Great Tribulation.”
When we study Matthew 24 together with Revelation 6, we read about a worldwide war that has the capability of destroying all human life. In addition to atomic weapons, other destructive weapons have been invented, including chemical and biological weapons. Nearly every weapon mankind has invented has been used—which paints a bleak picture of mankind’s future, barring some major change.
What needs to change?
In his speech, Mr. Matsui used the memory of Hiroshima to call for continuing the “efforts to eliminate nuclear weapons.” That’s a laudable idea, but there’s one problem: Even if we could eliminate all nuclear weapons, we would still face the fundamental problem of human violence (both on the national and personal level). As they did before the advent of the nuclear age, people would still hate and kill one another with whatever weapon they would have available. The real problem is human nature.
Isaiah wrote of man’s propensity for violence: “Their feet run to evil, and they make haste to shed innocent blood; their thoughts are thoughts of iniquity; wasting and destruction are in their paths. The way of peace they have not known, and there is no justice in their ways; they have made themselves crooked paths; whoever takes that way shall not know peace” (Isaiah 59:7-8, emphasis added).
The prophet Ezekiel describes what is needed to have true peace: “I will give you a new heart and put a new spirit within you; I will take the heart of stone out of your flesh and give you a heart of flesh. I will put My Spirit within you and cause you to walk in My statutes, and you will keep My judgments and do them” (Ezekiel 36:26-27).
The missing component is God’s Spirit softening the human heart. Instead of operating based on selfish motives and lust for advantage, mankind will learn to genuinely care about others and their well-being. And most importantly, the human heart will become tender toward God. People will finally yield themselves to the lead and direction of their Creator!
Seventy-four years ago the world descended to another level of death and destruction in war. But the weapon was only a symptom of a much deeper problem, the problem of mankind’s self-will and rejection of God’s way of living. Thankfully, God will intervene to stop us from completely destroying ourselves with destructive weapons and begin a new world of peace and safety.
| 32,137
|
More information about this Work
These three panels may have been the top of a polyptych similar to the one by Mariotto di Nardo in the Galleria dell’Accademia in Florence, whose central panel depicts a Virgin and Child. These panels, which were formerly in the Somerwell collection in Scotland, were auctioned at Sotheby’s in 1970 and were acquired for the Thyssen-Bornemisza collection in 1976. On the reverse of the Annunciate Angel is an old label that attributes the paintings to Giottino and states that they were in one of the storerooms in Santa Maria del Fiore in Florence when these buildings were demolished in 1826 to enlarge the square on which they were located.
The panels, which were unpublished prior to the auction of 1970, were catalogued as by Bicci di Lorenzo, an attribution that continues to be accepted today. For the two Annunciation panels the artist followed the traditional iconographic model used in Tuscan art in the 14th and 15th centuries: the Virgin is depicted seated with a book on her knees. She receives the message from the Angel Gabriel who approaches her on clouds, a detail that indicates that the angel arrives from Heaven. The Holy Spirit, sent by God the Father, is located above the Archangel and represented as Christ, who descends on the other panel towards Mary in the form of a dove.
The Crucifixion panel, with Christ still bleeding from his wounds, only includes the essential figures of the Virgin and Saint John. At the foot of the cross and near a pool of blood dripping from the plinth of the cross is Adam’s skull, whose presence, like the blood around it, symbolises the purification of Original Sin. At the top of the cross, from which a bright green branch is sprouting, is a pelican with its four young. According to legend, the pelican feeds its young on the blood that spouts from a wound that the bird makes in its own breast. The bird, combined with the crucifixion, emphasises Christ’s nature as Redeemer.
It has been tentatively suggested that the other elements in this polyptych were two panels with pairs of saints: Thaddeus and John the Baptist, and James the Less and Nicholas of Bari, both in the Pinacoteca Stuard in Parma. According to Boskovits these panels would have flanked a Virgin and Child, in an arrangement similar to the above-mentioned polyptych by Mariotto di Nardo. Bicci di Lorenzo, who inherited a large workshop from his father, continued to use Gothic formulas well into the 15th century, introducing small changes in an effort to modernise his style. This group has been dated around 1430.
| 54,736
|
Digital technologies have spread rapidly in much of the world. Digital dividends — that is, the broader development benefits from using these technologies — have lagged behind. In many instances, digital technologies have boosted growth, expanded opportunities, and improved service delivery. Yet their aggregate impact has fallen short and is unevenly distributed. For digital technologies to benefit everyone everywhere requires closing the remaining digital divide, especially in internet access. But greater digital adoption will not be enough. To get the most out of the digital revolution, countries also need to work on the “analog complements” – by strengthening regulations that ensure competition among businesses, by adapting workers’ skills to the demands of the new economy, and by ensuring that institutions are accountable.
World Development Report 2016: Digital Dividends explores the impact of the internet, mobile phones, and related technologies on economic development.
See more at:
| 59,279
|
Kath Alcock paintings: 9
Acianthus reniformis, partly
Cyrtostylis from the Greek 'kyrtos' meaning curved or swollen and 'stylis' meaning column, referring to the fluted enlargement of the column below the stigma. Robusta from Latin meaning well developed, robust, alluding to this species being more robust than C. reniformis, a species under which it was included until 1987.
Distribution and status
Found in the southern part of South Australia, from the Eyre Peninsula to the lower South-east, growing in ishrubland, woodland and forest. Also found in Western Australia, Victoria and Tasmania. Native. Common in South Australia. Rare in Tasmania. Common in the other States.
Herbarium regions: Eyre Peninsula, Northern Lofty, Murray, Yorke Peninsula, Southern Lofty, Kangaroo Island, South Eastern, Green Adelaide
NRM regions: Adelaide and Mount Lofty Ranges, Eyre Peninsula, Kangaroo Island, Northern and Yorke, South Australian Murray-Darling Basin, South East
AVH map: SA distribution map (external link)
Small terrestrial orchid with a single heart-shaped, kidney-shaped or almost round leaf to 60 mm long and 40 mm wide, light to medium green above, partially transparent below. Flowers 2-7 pinkish red along a stem to 300 mm high. Pedicel to 11 mm long with a bract at its base. Dorsal sepal erect and curved forward, linear but tapered, to 13 mm long and 2.5 mm wide. Lateral sepals are linear, to 11 mm long and 1 mm wide and curve forwards or downwards. Petals are similar in size and shape to the lateral sepals and curve forwards or slightly downwards. Labellum oblong, to 15 mm long and 6 mm wide and slopes slightly downwards with a few serrations near its pointed tip. This species is distinguish from the other Cyrtostylis species by being taller, with more flowers and larger floral parts, distinctly different coloured leaves and earlier flowering. Flowering between June and August. Fruits are brown papery ellipsoid capsule, reddish when immature. Seeds are very small, golden-brown, ellipsoid with a long cylindrical translucent brown mesh-like covering.
Seed collection and propagation
Collect seeds between July and October. Collect fat capsules as they start to dry and turn brown. Pods will split and release the seeds quickly and will require monitoring. To increase the chances of collecting mature pods, it is recommended that a small breathable bag (ie.Organza bags) be used to enclose the developing capsules. Place the capsules in a container that will hold fine seeds, and leave to dry for a few weeks or until the capsules split.Then carefully hold the capsule and tap it gently to release the seeds. Store the seeds with a desiccant such as dried silica beads or dry rice, in an air tight container in a cool and dry place or in liquid nitrogen.
| 11,861
|
Significance and Use
4.1 This test method evaluates the ability of coated fabrics to withstand a prescribed bend at an established low temperature. Fabrics coated with polymeric materials are used in many applications requiring low temperature flexing. Data obtained using this test method may be used to predict in-use behavior only in applications in which the conditions of deformation are similar to those specified in this test method. This test method has been found useful for specification purposes but does not necessarily indicate the lowest temperature at which the material may be used.
1.1 Fabrics coated with rubber or rubber-like materials display increased stiffening when exposed to decreasing ambient temperatures. This test method describes a simple pass/fail procedure whereby material flexibility at a specified low temperature can be determined. Failure is indicative of unacceptability of the coated fabric for use at that temperature.
1.2 The values stated in SI units are to be regarded as standard. The values given in parentheses are for information only.
1.3 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitations prior to use. For specific precautionary statement see 8.1.
2. Referenced Documents (purchase separately) The documents listed below are referenced within the subject standard but are not provided as part of the standard.
D751 Test Methods for Coated Fabrics
bend test; coated fabrics; flexibility; low temperature; low temperature bend test; rubber-coated fabrics; subnormal test temperature;
ICS Number Code 59.080.40 (Coated fabrics)
ASTM International is a member of CrossRef.
Citing ASTM Standards
[Back to Top]
| 53,083
|
Connecting More Than Just Straws
I’m not sure if you’re a 80s or 90s kid, but if you were, then you should remember how back in school, our teachers would either be using straws to challenge us to build something with it using scotch-tape, or to teach us certain concepts and ideas. And yes, back then, the kind of straws were quite literally the same drinking straws we used. And for some of us, we even used those same straws at some point for our school science/social studies projects. Personally, I’ve had a lot of fond memories playing around with straws and using them to create some pretty interesting structures and so on.
Now, let’s fast-forward about 20 years into the future! Over the last couple of years, I have had the privilege of being exposed to the educational technology industry (to put it in a more easily understandable term, we call it STEAM/STEM Education). STEAM Education also stands for the following subjects:
- S – Science
- T – Technology
- E – Engineering
- A – Arts
- M – Math
All of which I happen to share a really deep passion for.
What is the Goal of STEAM Education?
Before we actually dive into what Strawbees is and what I believe they can ultimately offer, I want to give you a quick overview of the STEAM Education space and this would also help to set the foundation and context for many of the future articles that I’ll be writing for TOYTAG.
STEAM Education aims to provide equal opportunities to people, young, old, professional, non-professionals, to have a chance at being exposed to different skills within the different fields that was mentioned above. As the rest of the world progresses rapidly towards what we call, the Industrial 4.0, the required skillsets for our next-generation of talents have to be different from the ones that we’re already familiar with today. Important skillsets includes problem-solving, critical thinking, learning from failures, communication skills, and risk taking, are now considered some of the most in-demand soft skills for our children in 10...20 years’ time when comes time for them to step into the respective industries.
Rather than giving you the atypical STEAM Education sales pitch, I’m going to focus on what truly matters & also the reason why you should be paying attention to it.
Real Skills for the Real World
Speaking as a former practitioner, I am also a strong advocate when it comes to the concept of continuous learning. I’m a very hands-on person by nature, which means that I tend to focus a lot more on creating something with the skills that I have learned rather than just focusing on the theory side of things. The greatest inventor of our century, Albert Einstein said that “playing is the greatest form of research [learning]”. As children, many of us are already picking up various skills that we would later apply it into our daily lives that will help us to either solve problems, or think imaginatively, leading to the invention/innovation of new ideas to make the world a better place for others.
Beyond the soft skills, we also want our children to be equipped with some of the more important technical skills which can also be applied and used to help solve many of our real-world problems today (and in the near future). With STEAM Education & the brand/products involved, these children/youths will now have the means to transform their ideas into potentially real-world models. And these skills will also follow them into their work life when the time comes.
Strawbees: “Dream Big. Build Bigger”
That’s just something that I read on the cover of the “Crazy Scientist Kit” by the brand Strawbees. One of the things that I love about Strawbees is the fact that the team behind the brand has found a way to turn these simple straws into a product that allows anyone to start connecting the individual construction pipes (that’s the term that we will be using throughout the rest of this article as well as future articles) and create some pretty amazing structures and objects. What is even more amazing is this – with the additional programmable components like the Quirkbots, LEDs, SERVOs, learners will be able to give life to their Strawbees projects. Now, you can even build a moving car out of construction pipes & rotational servo motors. In one of the ideas that I am working on with a private coaching student of mine, we even have the idea of building a drone using nothing but what is available with the Strawbees kits as well as adding a few extra motors/fans.
Now, to be totally fair, we have absolutely no idea if this drone idea of ours is ever going to take flight like how we imagined it. But one of the most important aspects of STEAM Education is helping the learners to understand that they don’t have to get it right the first time. And sometimes, it is okay to fail. Many of the greatest ideas and inventions in real life have experienced multiple failures/learning cycles before they even get to the final production stages.
Currently, I am also actively using Strawbees as one of the brands when it comes to providing my own personalized private STEAM Coaching. For example, during one of my coaching sessions, I would construct a collapsible cube using the construction pipes to explain what skewing an object means. And it was also part of the effort to help explain a mathematical concept to the child.
One of the Most Value-adding STEAM Education Brands
In closing, I believe without a doubt that Strawbees is one of the most value-adding brands in the industry. If you were to make a comparison in terms of pricing, I have to admit that they are probably one of the most affordable brands/products. But just because they are low on the “price tags index”, it doesn’t mean that they are any less good. In fact, some of the parents I have spoken to that have also invested in Strawbees for their own children have felt that Strawbees is a brand that provides nothing by a value-added learning experience, because they finally understand now that where Strawbees is concerned, it is always about connecting more than just straws.
In my next article on Strawbees, I plan to dive much deeper into what the products are capable of, especially with the use of the various electronics components from the Coding & Robotics kit. And I’ll also be happy to prepare a series of articles that will share some of my personal tips & ideas of what you can do using the different product components! So make sure you stay tuned!
| 33,862
|
This Date in Native History: On June 19, 1868, Father Pierre-Jean De Smet, a Jesuit missionary, met with the great Sioux Chief Sitting Bull in an attempt to convince “hostile” Indians to make peace with the United States.
A native of Belgium, De Smet was in his early 20s when, in 1827, he was ordained as a priest in St. Louis, Missouri, and began journeying westward to convert the Indians to Christianity and advocate on their behalf. Known as “Blackrobe” to the Indians, De Smet spent his life proselytizing.
From the beginning of his ministry, De Smet adopted the Missouri Jesuits’ statement of purpose: “We left home and country for the Indians; the Indians are in the West; to the West let us go.”
Called a “true friend to the Indians,” De Smet for decades worked and lived with the Indians, establishing missions, battling “liquor traffic” and helping secure peace treaties with rivaling tribes, he wrote in his personal journal, which later was compiled into the four-volume collection, Life, Letters and Travels of Father Pierre-Jean De Smet.
The years just after the Civil War were perhaps the most devastating for American Indians. In the late 1860s, as white settlers flooded west, the government demanded that Indians relocate to reservations. Tribes like the Sioux and Cheyenne that refused to forfeit their lands and fought to keep settlers out were deemed “hostile.”
The word “hostile” raises suspicions, said Herman Viola, curator emeritus of the Smithsonian Institution’s National Museum of Natural History. If Natives were hostile, it was because they were forced to leave land to which they had legal rights, he said.
“The government wasn’t going to stop until they drove the Indians into the ground,” he said.
After working with Indians for 40 years, De Smet was recognized for having “greater influence with the Indians than any other white man,” and the Interior Department requested that he travel to the “hostile” tribes in Montana and “endeavor to bring them back to peace and submission and to prevent as far as possible the destruction of property and the murder of the whites.”
The result was a series of meetings of the Indian Peace Commission, an agency charged with negotiating peace with the Plains Indians. De Smet’s role was to travel, sometimes long distances, to meet with tribal leaders and help negotiate peaceful—if ultimately broken—agreements with the federal government.
During the first commission meeting in July of 1867, commission president Nathaniel Taylor summed up the government’s desires:
“We can have all we want from the Indians, and peace without war, if we so will,” he said. “We have reached a point in our national history when, it seems to me, there are but two alternatives left us as to what shall be the future of the Indian: namely, swift extermination by the sword and famine, or preservation by gradual concentration on territorial reserves.”
De Smet, who was trusted by the Indians, had to convince them to peacefully agree to relocate to reservations or face extermination. At age 67, he journeyed for several days to reach Powder River, Montana, and negotiate with Sitting Bull. He arrived in the camp on June 19, 1868, and found as many as 4,000 individuals assembled.
In his own words, De Smet described his hour-long speech June 20 to Sitting Bull and other leaders:
“I spoke to them of the damages with which they were surrounded, and of their weakness beside the great strength of the whites, if the Great Father were forced to use it against them,” he wrote. “Today (God’s) hand was ready to aid them, to give them agricultural implements, domestic animals, men to teach them field work and teachers of both sexes to instruct their children, and all this offered without the least remuneration or cession of lands on their part.”
In turn, Sitting Bull recited the injustices the Natives had experienced. Although he didn’t accompany De Smet back to the Peace Commission to sign the treaty, he did consent to the agreement.
“Some of my people will return with you to meet the chiefs of our Great Father who are sent to make peace,” Sitting Bull said. “I hope it will be accomplished, and whatever is done by them, I will accept and remain ever a friend to the whites.”
The treaty, signed July 2, 1868, classified Powder River as “unceded Indian land.” It also guaranteed that all white people except Indian agents would leave the area.
De Smet was powerless to further protect the Indians, however, and war would continue to rage as Indian land diminished. De Smet died in St. Louis in 1873, three years before Sitting Bull won his greatest victory against the United States at the Battle of the Little Big Horn.
| 8,248
|
There are lots of expressions in many languages that involve dogs in a metaphorical way. “A barking dog seldom bites,” for example, really means the same thing as “all talk and no action.” “Let a sleeping dog lie,” which is probably a good idea when taken literally, figuratively means to not bring up an old argument.
Then there are things that people say about dogs that are not true — for example, a dog does not age seven years for every human year; the actual calculation is a little more complicated. Here are the top twelve myths about dogs, debunked.
- Certain dog breeds are more aggressive than others
Myth. While larger breeds can be more dangerous if they’re aggressive, any breed can show aggression toward other dogs or humans. It isn’t the breed that’s the cause, but rather the way the dog is brought up and treated by humans.
- My dog runs in the yard all day, he doesn’t need a walk
Myth. The importance of the walk is that it imitates the way a dog pack works together — by migrating through their territory toward a goal, which is usually food and water.
When your dog runs around in the yard, he may be burning off energy, but it’s unfocused. The end result is that he may actually have more anxious or nervous energy after playing in the yard all day.
- You can’t teach an old dog new tricks
Myth. This old adage has some truth to it when used to refer to humans, who can become very set in their ways with age, but dogs aren’t like that. A dog is ready to learn new tricks at any age, and teaching your old dog new tricks is a great way to help keep her mind sharp. Teaching a dog tricks at any age is perfect for giving them discipline.
- A wagging tail means a happy dog
Partly a myth. A wagging tail can indicate that a dog is happy and friendly, but it really depends on how the dog is wagging his tail. Studies have shown that when a dog wags his tail to his right—to the left as you’re facing the dog—it means he wants to approach and is friendly. However, when he wags his tail to his left, it’s a warning to back off.
Dogs can tell the difference and read the message, and when one dog sees another wagging to his left, this will usually cause them to become anxious and move away.
Tail position is also important. If the tail is down, the dog is submissive and possibly anxious. If it’s horizontal, then the dog is calm and happy. If the dog’s tail is vertical, though, this is another major warning to stay away.
Finally, speed is an indicator of the dog’s energy level and mood. A broad sweep of the tail that almost wags the dog with it is an indicator of happiness; tiny, rapid motions that almost make the tail look like it’s vibrating are another warning sign.
- My dog goes bonkers when I get home because he loves me
Myth. That excitement you’re seeing isn’t happiness to see you. It’s a dog that has too much pent-up energy and now has an excuse to let it go. Jumping, spinning in circles, or vocalizing are all things the dog does to try to calm themselves down. Giving affection when the dog is like this just reinforces the behavior, and can lead to things like separation anxiety or destroying things when you aren’t home.
- My dog hates the neighbor’s dog
Myth. If they bark at each other through the fence, they’re each just claiming their territory, but there’s nothing personal about it. Excitement and barking can also indicate that they really want to meet each other, and are frustrated by the barrier between them. This is another time to pay attention to the body language. Just as all tail-wags are not friendly, all barks are not aggressive.
If your and your neighbor’s dog have met and either didn’t get along well or got into a fight, it doesn’t mean that they’ll now hold a grudge forever. Dogs aren’t like that — but people can be. If we’re the ones holding onto the negative emotions after a bad encounter like that, then we’re the ones triggering the behavior when the dogs meet again.
The best solution is for you and your neighbor to take your dogs on a pack walk together, with the dogs on the outside. Once the humans involved can learn to relax in the situation, the dogs will either connect with each other or ignore each other.
- My dog is social, she doesn’t growl at visitors she just hides under the furniture
Myth. People sometimes think that “antisocial” is the same as aggressive or defensive, but there are other ways for a dog to be antisocial, and this is one of them.
If your dog is hiding from visitors or otherwise avoiding them, this behavior is just as antisocial as the dog that growls or nips at them. In these cases, teach your visitors to follow “no touch, no talk, no eye contact” when they come over, and to continue to ignore the dog if she comes to investigate. In this way, she will gradually learn to trust your guests.
- After my dog has a litter, she can finally get spayed
Myth. Unless you intend to breed your dogs, they should be spayed before they go into their first heat. Your veterinarian can tell you the best age for your particular breed, but responsible Pack Leaders will take care of this at the first opportunity. Spaying a female before six months almost completely eliminates the risk of breast cancer later in life.
- The best way to cool off a dog is by pouring water on his head
Myth. Pouring water on your dog’s head is the best way to overheat him. Dogs cool off by wetting their chests and stomachs.
If you’ve ever seen a dog at the park “digging” at the water in the kiddie pool, this is exactly what he’s doing — splashing water on the bottom of his body, where it will do the most good.
Wet fur is an insulator, so it holds heat in on the top of your dog. Since dogs tend to have the least or thinnest fur on their chests and stomachs, this is the most effective way for them to cool off.
- I can’t correct my dog’s separation anxiety, that’s just her personality
Myth. While some dogs may be more inclined to become anxious or nervous when their pack is not around, how you behave around the dog, particularly when coming and going, has a big effect on how he behaves when you’re not home.
You should never leave when the dog is in an excited, energetic state. Drain his energy first with a long walk. Also teach him the “go to your place” command and put him there while you’re getting ready to leave — his place can be his crate, his bed, or a corner of the room.
The state of mind your dog is in is the one he’ll stay in while you’re gone. It’s up to you to bring him to a calm, submissive state before you leave.
- My dog is impossible to walk
Myth. You may be having difficulty walking your dog now, but the problem is on your end of the leash. There are steps you can take to master the walk.
If the dog is showing reluctance to go on the walk at all, enlisting the help of a friend and their dog is a good way to bring yours out of her shell. You can also use treats to lure a reluctant dog forward, but don’t give the reward until she has walked a good distance.
If your dog is leading you on the walk, you need to train her to stay next to or behind you. You can do this by blocking her with your body, or carrying a cane or walking stick and using it to claim the space next to you. Keep the leash short but loose, and most of all stay relaxed. Tensing up on the leash just tells your dog to be alert for trouble.
- Dogs are jealous
Yes and no. Studies have shown that dogs can exhibit the signs of jealousy, but it’s a direct reaction to the moment and not something that they hold onto. In one study, when a dog’s owner showed affection to a stuffed dog that moved and made noises, the dog would try to get in between them or sometimes even nip at the fake; reactions they did not show when the owner did the same thing with a different object, like a book.
However, dogs have no trouble sharing a person’s affection — the human involved just has to invite both dogs into their personal space. A jealous person (or animal) cannot share affection. So, while dogs can show signs of jealousy, it isn’t a permanent emotion that they hold onto once they’ve felt it for another dog.
What myths about dogs have you heard or experienced? Share them in the comments.
| 24,851
|
This year St. Patrick's Day is celebrated/ observed on Saturday March 17th, 2018. St. Patrick's Day or the Feast of St. Patrick is observed on March 17 as a religious and cultural celebration. It honors Ireland's patron St. Patrick. The date marks the traditional death of the saint. In the early 17th century, it was made an official Christian feast day observed by the Church of Ireland, the Catholic Church, the Eastern Orthodox Church, and Lutheran Church.
The day honors Saint Patrick and Christianity in Ireland. It also celebrates the culture and heritage of the Irish population. People wear green attire and attend parades and festivals. Church services are attended. Restrictions on drinking alcohol and eating are lifted on this day. This led to its propagating tradition of alcohol consumption. Irish food and parties are celebrated in pubs. Water was even dyed green in the Chicago River in 2005. Symbols include the shamrock, anything green, Irish beer, and the leprechaun.
Saint Patrick was believed to be born in the fourth century in Roman Britain to a wealthy family. At age 16, he was kidnapped and taken as a slave to Gaelic Ireland. There, working as a shepherd, he "found God." Patrick found his way home and eventually became a Christian missionary and bishop. He returned to Ireland to convert the people to Christianity. He died March 17. He became Ireland's prominent saint.
| 9,822
|
The UNFCCC secretariat's preliminary assessment of nations' pledges and voluntary commitments, 15 December 2009, to reduce carbon emissions finds that a significant gap remains that will lead to temperature increases of 3 degrees Celsius.
Executive summary: This preliminary assessment of the United Nations Framework Convention on Climate Change, written 15 December 2009 during the Copenhagen Climate Summit, reviews the pledges made by Annex I countries and voluntary commitments made by Annex II countries to reduce carbon emissions. The draft states that while current commitments would - if implemented successfully - lead to a reduction in atmospheric carbon, there still remains a significant gap with the level required by science, meaning that emissions would peak after 2020 ensuring an increase in average global temperatures of at least 3 degrees Celsius. This means failing to stay within the agreed-on 2 degree Celsius limit, and would lead to dangerous, runaway climate change.
Number of pages: 8
| 2,625
|
It’s the most famous disaster story ever – and it’s all completely true. The Titanic sunk to the bottom of the Atlantic Ocean on 15 April 1912. More than 1,500 people lost their lives, including crew and passengers. The tragedy sent shockwaves right across the world. The giant ship – the biggest ever to take to the seas – was supposed to be indestructible. Indeed, more attention had been paid to making it the epitome of luxury than to matters of health and safety.
Even to this day, the sinking of the Titanic continues to be the source of much fascination. Almost everyone knows the story. But what about the lesser-known facts? Like how several minor decisions, often made by confused passengers and crew in a split second, would have huge consequences. So, from its ominous launch to the second tragedy struck, here we present 40 things about the Titanic you really should know:
40. Even before it was launched, the Titanic was a killer – as Belfast shipyard workers found out.
The mighty Titanic was built at the Harland and Wolff shipyard in Belfast. The project was a huge undertaking for the Northern Irish capital and provided thousands of men with work. However, it came at a cost. Since the ship was built at a time when worker safety was not a prime concern for employers, it was a dangerous business. In all, 8 men lost their lives. Of these, 5 were named, but the names of the other 3 will never be known – the Titanic project involved hundreds of casual, undocumented workers. What’s more, 246 men were injured, many seriously, at the Belfast shipyard.
| 25,610
|
This article offers an interpretation of the problems addressed by and the eventual purpose of the United States government. Simultaneously, it seeks to analyze and explain the continued three-part structure of the United States federal government as outlined in the Constitution. Subsequently I define the three parts of the federal government—judiciary, executive, and legislative—as explained through the lens of the Platonic paradigm of (logos = word = law), (thymos = external driving spirit = executive), and (eros = general welfare = legislative) extrapolated from Plato’s dialogues.
First, the article establishes Plato’s theory of the three-part Platonic soul as a major premise, as in a syllogism. Second, the article lays out the generally accepted division of the U.S. Constitution as creating three parts to the federal government as a minor premise. Third, the syllogism completes by weaving in the major premise of Plato’s soul into the three parts of the United States federal government. This third step of application suggests possible future evolution of the structure.
This article fits into the wider issue of the functionally efficient and naturally adaptive structure of the U.S. federal government. Providing a historical and philosophical context to this structural analysis will serve as a framework for future research on the operation of the federal government. When the branches of the federal government step out of their roles, the balance of the structure of the federal government becomes disrupted occurring in liminal periods of paradigmatic change.
A Structural Etiology of the U.S. Constitution,
Available at: http://scholarship.law.nd.edu/jleg/vol43/iss1/6
| 24,314
|
Arthroscopy is a method of viewing a joint, and, if needed, to perform surgery on a joint. An arthroscope consists of a tiny tube, a lens, and a light source.
This procedure is typically performed on the knee, shoulder, elbow, or wrist. The type of anesthesia depends on the particular joint and other factors. A regional anesthetic numbs the affected area, but the patient may remain awake, depending on whether other medications are used. For more extensive surgery, general anesthesia may be used. In this case the patient is asleep and pain-free.
The area is cleaned and a pressure band (tourniquet) may be applied to restrict blood flow. The health care provider then makes a surgical cut into the joint. Sterile fluid is passed through the joint space to provide a better view.
Next, a tool called an arthroscope is inserted into the area. An arthroscope consists of a tiny tube, a lens, and a light source. It allows a surgeon to look for joint damage or disease. The device also allows the surgeon to perform reconstructive procedures on the joint, if needed.
Images of the inside of the joint are displayed on a monitor.
One or two small additional surgical cuts may be needed in order to use other instruments. These instruments can be used to remove bits of cartilage or bone, take a tissue biopsy, or perform other minor surgery. In addition, ligament reconstruction can be performed using the arthroscope in many cases.
You should not eat or drink anything for 12 hours before the procedure. You may be told to shave your joint area. You may be given a sedative before leaving for the hospital.
You will be asked to wear a hospital gown during the procedure so the body part for surgery is accessible.
You must sign a consent form. Make arrangements for transportation from the hospital after the procedure.
You may feel a slight sting when the local anesthetic is injected. After this medicine starts to work, you should feel no pain.
The joint may need to be manipulated to provide a better view, so there may be some tugging on the leg (or arm, if done on the shoulder).
After the test, the joint will probably be stiff and sore for a few days. Ice is commonly recommended after arthroscopy to help relieve swelling and pain.
Slight activity such as walking can be resumed immediately, however excessive use of the joint may cause swelling and pain and may increase the chance of injury. Normal activity should not be resumed for several days or longer. Special preparations may need to be made concerning work and other responsibilities. Physical therapy may also be recommended.
Depending on your diagnosis, there may be other exercises or restrictions.
Your doctor may order this test if you have:
Arthroscopy can also help see if a disease is getting better or worse (this is called monitoring the disease), or to determine whether a treatment is working.
Abnormal results may be due to:
The diagnostic accuracy of an arthroscopy is about 98%, although x-rays and sometimes MRI scans are taken first because they are noninvasive.
Review Date: 7/29/2008
The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed physician should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. Copyright ©2010 A.D.A.M., Inc., as modified by University of California San Francisco. Any duplication or distribution of the information contained herein is strictly prohibited.
Information developed by A.D.A.M., Inc. regarding tests and test results may not directly correspond with information provided by UCSF Medical Center. Please discuss with your doctor any questions or concerns you may have.
| 3,184
|
Dear Mrs. _______,
I know as a teacher you are an extremely busy woman. You have many daily demands placed on you and I do not mean to add yet another. This letter is simply to introduce my son, Garrett, to you and hopefully help you to understand him better. You see, Garrett was diagnosed with ADHD in July 2003. Since that time he has been on several kinds of medication. The latest one his doctor is trying is Focalin. He has only been on this medication for about one month. It seems to be working better than the others. However, we're hoping you can be a better judge of this since you will be the one observing him in the daily classroom environment. He also has several learning disabilities which contributed to his being retained in the second grade this year.
Now, a little background about ADHD and Garrett. One thing the majority of people do not understand about ADHD is the "2/3rds rule." As a general rule of thumb a child with ADHD will act about 2/3rds their actual age. It tends to throw people because an ADHD child typically has average or above intelligence (as Garret does), but they are prone to displaying immature behavior. Other physical behaviors you may see are fidgeting, squirming and clumsiness. Classroom behaviors that you may see include:
- May begin work without waiting to hear or read instructions
- Trouble staying on task
- Will lose or misplace papers, pencils and other materials
- Will have to be reminded to clean up work areas after use
- Will probably be at your desk more often than most students
- Will often ask questions which may or may not relate to what you are discussing
- May turn in class work & tests before other children but with lower quality than possible
- May hyper focus on a topic to the point of fixation
Also, due to his ADHD, he has inadequate social skills. This sometimes can make it difficult for him to form lasting friendships with his peers. Garrett has problems distinguishing whether someone's actions are intentional or accidental. He is a literal thinker who doesn't understand sarcasm. He cannot read non-verbal messages or cues. Due to this, he often overreacts to situations or comments and his feeling are easily hurt. We are working with him on this.
All of this being said, he has numerous good qualities as well. He is a great kid who has a natural curiosity about life and how things work. He is very creative through art and building with Legos. He is caring towards others and is very sensitive. Even though he has a lot to offer the world, he doesn't always believe in himself and questions his academic ability. He's also anxious about school and unfortunately doesn't always find it a very safe place to be. This is due to bullying last year by a fifth grader both at school and on the bus. He greatly desires to please his teachers. He will be more than willing to help you in any way possible. He loves to make people laugh and will often tell jokes or act silly. He has a strong interest in water fountains, dolphins and Sponge Bob Square Pants. His hobbies are swimming, bike riding and jumping on his trampoline.
Things that helped him last year include:
- Structured environment and consistent routine
- Sitting near the teacher's desk to minimize distractions
- Touchmath and number lines
- Positive re-enforcement
- Being allowed to stretch, run an errand, go to the water fountain or bathroom will all help with his fidgeting
- Decreased homework assignments and spelling words
A few of the above are mentioned in his IEP as well. He will be going to Resource one hour a day as opposed to two hours like he did last year. He truly enjoys this and really likes Mrs. ______. His biggest challenges are math and reading. He goes to a private tutor for 1 -2 hours a week. She helps him in these areas as well. Also, if you find there is a specific area you'd like her to focus on more, just let me know and I'll tell her. She's great and will be more than willing to comply.
Mrs. ______, I know Garrett will require extra time and effort on your part so please let me thank you in advance. I greatly appreciate the many helpful professionals I have found at ____ Elementary. Please let me know how I can help support you and Garrett. I do not work outside of our home and am almost always available to help in any capacity, discuss important matters, etc. I believe Garrett has been dealt a very difficult hand in life and there is nothing I wouldn't do for this very precious child of mine.
| 6,204
|
Some days stories just happen. They pop into your mind, nibble at your thoughts and then BAM! your pen is dancing all over the page. And then there are the other days. The days of nothingness – the days of blank paper and furious blinking. Here are three top tips from Children’s Laureate, Malorie Blackman, to avoid those days – because sometimes all you need to write a brilliant story is just a little nudge.
1. Take a word for a walk
Think of a word – any word. Let’s start with the word ‘imagination.’ Then think of this word as an animal. Write down what animal it would be. Perhaps a flying fish or a silver fox? Then think of this word as a food. A sparkly skittle? Next think of it as a wish. The ability to fly? So here’s what happened when moontrug took ‘imagination’ for a walk:
Animal: flying fish
Wish: to fly
Colour: blue and sparkly
Sound: a whisper
Smell: fresh air
Mode of Transport: a space hopper
As soon as the word ‘space hopper’ was down on the page, moontrug went on to write a short story which opened with a boy bouncing on a space hopper. You never know what’s going to inspire you! So start taking words for a walk… Moontrug took ‘the sea’ for a walk after ‘imagination’ and it looked a little something like this:
Animal: rhino charging
Food: entire tubs of vanilla icecream
Wish: to be invisible
Colour: pale grey
Sound: cymbals clashing
Mode of Transport: a dirt bike
2. I am watching you…
Sometimes music is a great tool for inspiring magical thoughts. Malorie Blackman got moontrug writing a very creepy story using a song called Lux Aeterna (‘eternal light’) by Clint Mansell. Here’s how. Start by writing this sentence on a blank piece of paper: ‘I am watching you’. Play this song. Now write – whatever comes into your head. With a song like that, you’re bound to write something creepy…
3. Is that an arm bone?
Root around you house for an object which is slightly unusual. Malorie Blackman gave moontrug an arm bone (not her own). The object can be anything: a velvet glove, an old notebook, a wig… Imagine who might have owned this object once upon a time. Imagine why. Imagine their story. With Blackman’s arm bone, moontrug ended up imagining an old woman called The Bone-Gatherer who lived in a house surrounded by bones. She thought the bones would keep out the evil spirits but the bones were just a way for them to climb in…
So have a go with Blackman’s writing tips. You never know – one minute you might be taking a word for a walk, the next you might be on page 34 of the next Harry Potter.
| 53,342
|
What is it
Compromise is the condition of peace and progress. But there are times when we should not compromise – when compromise would undermine integrity and amount to cooperating with evil. How do we distinguish between when are we 'bargaining with the devil' and when are we simply trying to be tolerant of alternative lifestyles and political positions? Is it OK to 'bargain with the devil' in the name of peace? When we refuse to compromise on moral grounds, are we imposing our values? Ken and John negotiate the terms with UC Irvine Law Professor and professional mediator Carrie Menkel-Meadow.
Is negotiation is morally prohibited under certain conditions? If so, in what circumstances is it unethical to attempt to compromise? John and Ken discuss the ethical implications of compromise, wondering whether it can ever be acceptable to negotiate with the representatives of inhumane regimes, a form of compromise that political philosopher Avishai Cohen calls “rotten.” But some historical agreements with oppressive governments seemed necessary at the time, including Churchill’s negotiations with Stalin during World War Two. Other agreements have had truly evil consequences: the compromises that led to the ratification of the Constitution allowed the institution of slavery to perpetuate, for example. Is there a clear-cut system for deciding what sorts of compromise are allowed and what ones are forbidden?
Carrie Menkel-Meadow joins the discussion, offering the pragmatic viewpoint that there are no situations in which we are categorically prohibited from negotiating. Instead, she argues the decision to negotiate should be made on a case-by-case basis, observing that both sides often stand to gain from discussing their interests openly with one another. After all, listening to one’s opponents does not entail sacrificing one’s own ideals. Ken notes that some people prefer to take the so-called “clean hands” approach in these situations, preferring to keep their consciences clean by avoiding having anything to do with those that they deem evil. Menkel-Meadow respects this point of view, but points out that engaging with one another is necessary for real change; avoidance can make matters worse.
In order for negotiation to be successful, there must be a balance of power between the two sides. In the political realm, such a balance is typically achieved by having a third party mediate the talks, preventing agreements from being forced upon the weaker side. Another important ingredient for successful cooperation is trust in the other side to uphold their end of the bargain. When this trust breaks down, our willingness to compromise is undermined, as has arguably happened between Israeli and Palestinian leaders. As Menkel-Meadow holds, however, negotiation is all the more necessary in such situations, since the potential benefits are so great.
Roving Philosophical Report (seek to 4:30): Molly Samuel interviews residents, business owners, and public officials in San Benito county about the controversial development of solar farms in Panoche Valley. Complicating the issue is the presence of the endangered blunt-nosed leopard lizard, whose habitat may be threatened by the project. Fundamental differences of opinion make compromises both more difficult and more necessary to reach.
- Sixty-Second Philosopher (seek to 44:49): Ian Shoales discusses one of history’s most famous deals with the devil. The accusations against seventeenth-century French priest Urbain Grandier inspired Aldous Huxley’s The Devils of Lourdon and Ken Russell’s film The Devils with Vanessa Redgrave.
| 2,527
|
Western Reserve Heritage Feasibility Study
The purpose of the Western Reserve Heritage Feasibility Study is to determine the feasibility of designating the historic Western Reserve of Ohio as a National Heritage Area(NHA).
A National Heritage Area is a locally managed place designated by Congress where natural, cultural, historical, and recreational resources combine to form a cohesive, nationally distinctive landscape arising from patterns of human activity shaped by geography. NHAs are built on community partnerships and are planned around a region's shared heritage.
The feasibility study was authorized by Congress under 120 STAT. 1846 PUBLIC LAW 109–338, TITLE III—NATIONAL HERITAGE AREA – STUDIES, Subtitle A—Western Reserve Heritage Area Study on OCT. 12, 2006.
Study Team Leader
Midwest Regional Office
Rivers, Trails and Conservation Assistance Program
| 23,517
|
Library Media Specialist
Appropriate Illinois State Board of Education
Makes resources available to students and
teachers through a systematically developed collection within
the school and through access to resources outside the
Assists students in identifying, locating,
interpreting and evaluating information housed in and outside
the library media center.
Provides access to the library media center and
its staff throughout the school day.
Encourages flexible class schedules to
accommodate use at point of need.
Develops policies and procedures to ensure that
access to information is not impeded by fees or
Informs teachers, students, parents and
administrators of materials, equipment, and services that meet
their information needs.
Teaches information curriculum as an integral
part of the school's curriculum.
Provides instruction in accessing, evaluating,
and communicating information and the production of
With other library media specialists and
teachers, plans, teaches, and evaluates instruction in
information access, use, and communication skills.
Assists in the use of technology both within and
outside the library media center.
Provides learning opportunities related to new
technologies, use and production of a variety of media, and
laws and policies regarding information.
Uses a variety of instructional methods with
students and demonstrates the effective use of newer media and
Participates in building, district, department,
and grade-level curriculum development and assessment
Offers teachers assistance in using information
resources, acquiring and assessing instructional materials, and
incorporating information skills into the classroom
Uses a systematic instructional development
process in working with teachers to improve instructional
Provides leadership in the assessment
evaluation, and implementation of information and instructional
Performs other duties as assigned by the
| 17,592
|
war of the oscines
The War of the Oscines uses songbirds and other fauna as metaphors for Nature in conflict with human industrial residue, and political language to explore the cost of mass production on the natural world. 'Oscines' is Latin for the suborder of songbirds and originally means, ’to give omens by its cry'.
Mixed media. Photography, charcoal, relief ink and woodblock prints on cotton rag, mulberry paper and museum board.
| 55,676
|
One of the problems with starting plants off under glass is that eventually they need to be hardened off.
Even hardy plants get used to a life of luxury – regular watering, still air and stable temperatures.
Putting them outside to survive in widely fluctuating spring temperatures, much stronger sunlight and winds will lead to a check in growth, even death if they are caught by frost.
I haven’t started hardening plants off yet due to the bad weather – all these pictures were taken last April/May, so don’t worry.
The effect of hardening off is to thicken and alter the plant’s leaf structure and increase leaf waxiness. It ensures new growth is sturdy although much slower.
You need to harden off gradually, over a period of a couple of weeks, depending on weather. On a mild day, start with two to three hours of sun in a sheltered location.
Protect seedlings from strong sun, wind, hard rain and cool temperatures. Hardy plants acclimatise faster than half-hardy ones.
Don’t plant out tender plants before the date of the last frost, usually the beginning of June in North East England – but have horticultural fleece ready.
If you don’t have a cold frame, place plants in a sheltered position in front of a south or west-facing wall or hedge and cover with fleece to prevent sun scorch and temperature shock.
I made a small lean-to out of poles and bubble wrap – not pretty, but it does the job. It’s also sheltered against a west-facing wall, which slowly releases its heat at night.
For the first week, leave outside during the day but bring in at night. In the second week, leave outside at night, but keep covered (unless there’s a frost forecast).
Towards the end of the fortnight, remove the bubble wrap during the day.
If the weather is suitable, leave the plants outside at night but ensure they are covered. After this, leave them uncovered before planting out.
Covering with an old curtain or extra fleece can protect from sudden sharp night frosts.
JOBS TO DO OVER THE BANK HOLIDAY WEEKEND
Thanks to such a cold April, everything’s miles behind. Don’t work against the weather, go with it – we’re all in the same boat – I reckon three weeks behind the same time last year.
Cover emerging shoots of potatoes with soil. If the tubers are exposed to light they turn green because of chlorophyll, which makes them have a high level of glycoalkaloids toxins.
If you’re seduced by ready-planted hanging baskets and bedding plants at the garden centre, make sure they’re properly hardened off – always ask.
In the veg garden, sow quick-growing crops, such as salads, between longer-term residents, such as brassicas, while they’re establishing.
Mulching fruit crops will help them to retain moisture around the roots so you will use less water.
Take softwood cuttings of deciduous shrubs, including Forsythia, Fuchsia, Hydrangea macrophylla, Philadelphus and Spiraea – choose non-flowering stems.
Check roses for signs of black-spot, aphids and leaf-rolling sawfly damage, treat if required.
Trim winter flowering heathers with shears.
After flowering, dig up and divide Primulas.
Tall-growing plants such as Delphinium, lupins and monkshood need a framework of canes and string around then to help prevent them been damaged by winds. Do this now so the supports become unobtrusive as the plants grow through them.
Give shrubs, trees, and borders a mulch of compost, to preserve water and smother any weed seedlings.
Keep nipping off the dead flower heads of late-flowering daffodils and let foliage die down naturally.
For more on these topics, plus cook what you grow, traditional recipes, North East information, environmental news and more, log on to www.mandycanudigit.co.uk (now smartphone friendly), www.sunderlandecho.com/gardening, follow me on Twitter @MandyCanUDigIt or you can like me on Facebook at Mandycanudigit
| 19,730
|
Guide to Using This Book
is divided into four parts that cover the various phases of a wiring
job—from understanding basic vocabulary and principles, to planning,
installation, and finishing. Each part provides the necessary foundation
for the parts that follow.
CIRCUITS, AND GROUNDING
SERVICE EQUIPMENT AND WIRING
special wiring situations and projects
The best way to use this book is to read it through from start to finish
to gain an overall grasp of what is involved in electrical wiring. This step is vital to fully grasp the elements of a complicated trade. Many questions from readers turn out to address topics that are fully covered in the book, but the reader had neglected to read through the book first. The
table of contents at the front of the book provides an overview of the
wide range of material covered. This and the index at the back are your
keys to locating topics quickly and easily.
getting started—the basics
provides basic background necessary to understand the safety, practical,
and legal considerations involved in wiring decisions and practices.
This is essential reading before undertaking any electrical work. The
standards and codes that help ensure safety are explained, and important
safety precautions are offered. Practical goals to consider in the planning
of any wiring job are described in plain language. A bare-bones outline
of how electrical power is measured and delivered to the home provides
basic vocabulary for understanding issues of usage, cost, and conservation
of electrical power.
wires, circuits, and grounding
explains how to choose the right wire types and sizes, electrical devices,
and tools you’ll need for a particular job. Proper overcurrent protection
and the importance and specifics of grounding are emphasized here and
throughout the book. New developments on arc-fault circuit interrupters
are covered. Regulations are given for feeders and the panels they supply.
A simple way is described for using wiring diagrams to design installations
of any size.
installing service equipment and wiring
When you’re ready to start your installation, Wiring Simplified
fits in your toolbox so you can take it right to where you’re working
for ready reference. All commonly encountered wiring methods are covered. The service entrance chapter describes required workspace
around panels and explains how to establish the connection point between
the power supplier’s wires and your electrical installation. Detailed
instructions are provided for selecting and installing boxes and switches
in your circuits; for making the wiring connections at the boxes, switches,
and receptacles; for running cable or raceways; and for testing the
completed installation. You will also find information on how to wire
detached garages and outbuildings. Modernizing an outdated wiring
system is covered in a separate chapter, with many expert hints for
making the job easier. Wiring requirements for a variety of specific
household appliances are listed. The details of finishing an electrical
installation wrap up this professional approach to getting the job done.
special wiring situations and projects
begins with a discussion of the types and wiring requirements of stand-alone
motors commonly used in residences and on farms, with special coverage
of new regulations for motor disconnects. The chapter
on farm wiring covers specialized topics such as constructing the meter
pole, wiring animal buildings, and rural safety issues. In addition
to telephone and doorbell wiring, the chapter on low-voltage wiring
now includes general material on computer network wiring. The last chapter,
on troubleshooting and repairs, is a guide to diagnosing and remedying
common problems such as blown fuses or tripped breakers, broken switches
and receptacles, and lamps and doorbells that don’t work—information
that can be used by people who never intend to undertake an electrical
installation but want to be able to maintain the electrical equipment
they depend on each day.
Park Publishing, Inc.
Softcover, 5 1/2 x 8 1/2 inches, 256 pages, 228 illustrations
44th edition, July 15, 2014
| 42,167
|
Task Total Terms: 1051 Term: Zi Lin ( Emilie ) Pupil Number: 706479 Teacher's Term: Jonathan Bowlby Group: some Case1 Concern…...Read
Civilization that we know of started 3000 BCE and from there until the present day, history contains large amount off wars. Between 1740 and 1897, there were 230 wars and revolutions in Europe, and during this time countries were nearly bankrupting themselves with their armed forces expenditure. Rivalry actually became slightly fewer frequent during the nineteenth as well as the early 20th centuries, but this was because of the wonderful technological electricity which nations could now utilize, which usually meant that wars were above more quickly. In fact, the death toll from wars went up sharply. Although only 40 million people died in all the wars between 1740 and 1897, quotes of the number of dead in the First Universe War range between 5 , 000, 000 to 13 million, and a staggering 40 million persons died through the Second World War.
Battle is the result of stress between two or more nations. In fact , wars usually do not happen instantaneously, but rather the outcome of very long periods of stress and clashes. All wars have rewards, the principal two being technological advances and advances in medical scientific research. War increases both technical and medical advances mainly because all sides want to invent better ways of eliminating and better methods of protecting the lives of combatants, and some of those advances advantage the civilian populations, supposing they survive the battle.
It is affordable to conclude that wars happen to be bad, however in rare cases, war is forced upon the participants by the actions of one or all parties. Also, it is reasonable to believe that the negative effects of battle, in all instances, far go beyond the potential rewards. The fact is there are no good battles.
| 30,091
|
Invasive species have been cited as the second largest threat to endangered native species. Most noxious species in New Mexico are found on rangelands and wild lands. Invasions of noxious species in the range and wild landscape result in decreases in available forage for livestock and wildlife. The Noxious Weeds Management Act directs NMDA to develop a noxious weed list for the state, identify methods of control for designated species, and educate the public about noxious weeds. NMDA coordinates weed management among local, state, and federal land managers as well as private land owners.
New Mexico’s Cooperative Weed Management Areas
Over the past 2 years New Mexico has seen a dramatic increase in the number of Cooperative Weed Management Areas (CWMAs) throughout the state. This growth has been in response to the increasing threat that New Mexico is facing from Noxious Weeds. These non-native plant species are extremely invasive and are having tremendous impacts on New Mexico’s natural and economic resources. CWMAs are a partnership of federal, state, and local government agencies, tribes, individuals, and various interested groups cooperating to manage noxious weeds or invasive plants in their area.
| 47,066
|
You can help prevent getting and spreading the flu by following three easy steps.
1. Get your flu vaccine. The vaccine for the H1N1 virus is included in the seasonal flu vaccine this year! If your doctor doesn’t have the vaccine, adults can go to a local CVS or Walgreens. Bring your insurance card.
2. Keep your hands clean! Wash your hands with soap and water often.
3. Take everyday steps to prevent the spread of germs. Cover your nose and mouth when you cough or sneeze. Don’t touch your eyes, nose or mouth. Avoid contact with others when they or you are sick.
For more information click here.
| 33,118
|
Assalamu alaikum Wa Rahamatullahi Wabarakatuh,
Dear Grades 7&8 Parents/Guardians,
Abraar Secondary School will administer the CTBS over three days, October 1-3 for grades 7-8. This test does NOT require prior preparation by the students.
The Canadian Tests of Basic Skills (CTBS) are trusted assessment tools that will enable the teachers to identify student achievement in major curriculum areas including vocabulary, reading, language, mathematics, and science. The results of the CTBS will help the teachers:
- Identify at-risk students
- Make decisions for grouping students
- Plan instructional emphases
- Measure growth of learning
- Evaluate effectiveness of instruction
- Report back to parents on student progress
Please make sure that students do not miss school during these days (Oct.1-3) and come to school on time. Please make sure that they are well rested and have a healthy breakfast before coming to school. Please send a minimum of two, well sharpened, #2 pencils and an eraser with your child during the testing days.
Jazakumullahu khaira for your cooperation!
| 31,546
|
ESTCube-1 is the first Estonian satellite and it is being built in Estonia by students from Tartu University, Estonian Aviation Academy, Tallinn University of Technology and University of Life Sciences. The project started in 2008 and is currently being assembled and tested. The satellite will be launched in April 2013. The satellite’s payload has been developed in conjunction with Finnish Meteorological Institute and German Space Center (DLR).
The main mission of the satellite is to test the electric solar wind sail, a novel space propulsion technology that could revolutionalize transportation within the solar system. As Estonia’s first satellite, the project will also be used to build Estonian infrastructure for future space projects and to educate space engineers.
The electric solar wind sail (http://electric-sailing.fi/) is a novel method of propulsion within the Solar system using the flow of electrically charged particles emanating from the Sun, or the solar wind. The system was invented in Finland by Pekka Janhunen and ESTCube-1 is its first orbital proof-of-concept test.
The technology is based on the electrostatic interaction between the electric field generated by the satellite and the high-speed particles being ejected from the Sun. The spacecraft utilizing this method would first deploy a set of electrically charged wires, which allow to generate an electric field over a large area. This area effectively forms a “sail” that can be pushed by the charged particles by being diverted by it and therefore transferring momentum to the craft. A 1000 kg satellite would contain a 100 kg electric sail module that could deploy 100 tethers, each with the length of 20 km. Overall this would result in a net thrust of 1 N. This force might seem small, but this can be applied to the satellite over its entire lifetime using only the energy generated by satellite’s solar arrays. During one year this could increase the velocity of the craft by 30 km/s.
The technology would make it possible to travel in the Solar system cheaply and fast, allowing asteroid mining, landing missions to Mercury and transferring data by “data clippers”.
- Carrier rocket takes the satellite into orbit and deploys it.
- 5 minutes after deployment the satellite starts up and starts preliminary system checks to determine the integrity of the satellite’s hardware.
- 30 minutes after deployment the radio antennas of the satellite will be deployed and communications with the Earth will be made possible.
- 40 minutes after deployment the satellite’s radio beacon will bea activated and first messages will be sent back to the Earth (this is the first time the satellite’s successful launch can be determined)
- Satellite’s beacon will be held active for a couple of days to determine satellite’s health
- The satellite will turn on all of its subsystems and will stay in standby for commands from the groundstation.
- The groundstation will communicate with the satellite for diagnostics and possible software updates
- Satellite’s rotation will be stabilized and first camera pictures will be taken.
- The main mission will start: the coils within the satellite will be used to spin it up and the tether deployment starts.
- Tether deployment ends, the tether will be electrified and measurements will start. The satellite will keep sending telemetry for confirming the E-sail effect.
Name ESTCube-1 NORAD 39161 COSPAR designation 2013-021-C Inclination (degree) 98.127 RAAN 270.338 Eccentricity 0.0010865 ARGP 41.580 Orbit per day 14.69011480 Period 1h 38m 01s (98.2min) Semi-major axis 7 042 km Perigee x apogee 657 x 672 km Drag factor 0.000135300 1/ER Mean Anomaly 318.623
437.250 MHz – CW beacon, call sign ES5E/S
437.505 MHz – 9600 bps AX.25 telemetry, call sign ES5E-11
ESTCube-1 1 00000U 00000 13127.17171296 .00000000 00000-0 10000-3 0 00005 2 00000 098.1390 205.7730 0134000 220.5400 211.2631 14.71982716000009
Beacon mode ID is a character:
“E” – Normal mode beacon
“T” – Safe mode beacon
Normal mode beacon ends with character “K”
Safe mode beacon ends with characters “KN”
Correct beacon lengths are:
Normal mode – 43 characters
Safe mode – 52 characters
HEX to Morse symbol (CW) coding
When sending beacon data, please replace lost symbols with character “#”. Feel free to use space characters convenience when entering the beacon string.
For a valid beacon either must be existing:
- Beacon mode ID character (in the beginning)
- Beacon end character
If the time moment of beacon start or end is recorded, then even a partial beacon info is useful. Partial info should contain either beginning or end of the beacon message.
Normal mode beacon
ES5E/S E AAAAAAA BBCCDD EEFF GGG HIIJJ KKLLMM NNOO K AAAAAAA EPS timestamp 28 lowest bit UNIX timestamp [DD.MM.YYYY HH:MM:SS] BB Main bus voltage N (uint 8) [V] CC Average power balance N (signed int 8) [W] DD Battery A voltage N (uint 8) [V] EE Battery B voltage N (uint 8) [V] FF Battery A temperature N (uint 8) [V] GGG Spin rate Z (N*720)/2047 (signed int 12) [deg/s] H Received signal strength N (signed int 4) [dBm] II Satellite mission phase bit 6-7N (uint 2) [0="Detumbling", 1="Nadir pointing", 2="Tether deployment", 3="E-sail force measurement"] Time since last reset: CDHS bit 4-5 N (uint 2) [Hours] COM bit 2-3 N (uint 2) [Hours] EPS bit 0-1 N (uint 2) [Hours] JJ Tether current N*5/255 (uint 8) [mA] KK Time since last error:ADCS bit 6-7 N (uint 2) [Hours] CDHS bit 4-5 N (uint 2) [Hours] COM bit 2-3 N (uint 2) [Hours] EPS bit 0-1 N (uint 2) [Hours] LL CDHS System status bit 2-7 Last error (uint 6)[Error code number] bit 0-1 Parameter (uint 2) [Raw value] MM EPS System status N Last error (uint 8) [Error code number] NN ADCS System status bit 2-7 Last error (uint 6) [Error code number] bit 0-1 Parameter (uint 2) [Raw value] OO COM System status bit 2-7 Last error (uint 6) [Error code number] bit 0-1 Parameter (uint 2) [Raw value]
Safe mode beacon
ES5E/S T AAAAAAA BBCCDD EEEE FFGGHH IIJJKK LLMMNN OPQQ RRSS KN AAAAAAA EPS timestamp 28 lowest bit UNIX timestamp [DD.MM.YYYY HH:MM:SS] BB Error code 1 N (uint 8) [Error code number] CC Error code 2 N (uint 8) [Error code number] DD Error code 3 N (uint 8) [Error code number] EEEE Time in safe mode N (uint 16) [Minutes] FF Main bus voltage N (uint 8) [V] GG Status 1 bit 7 CDHS A state [0=OK, 1=FAULT] bit 6 CDHS B state [0=OK, 1=FAULT] bit 5 CDHS BSW state [0=OK, 1=FAULT] bit 4 COM 3V3 state [0=OK, 1=FAULT] // also defines the condition of uplink bit 3 PL 3V3 state [0=OK, 1=FAULT] bit 2 PL 5V state [0=OK, 1=FAULT] bit 1 CAM state [0=OK, 1=FAULT] bit 0 ADCS state [0=OK, 1=FAULT] HH Status 2 bit 7 Battery A charging [0=OK, 1=FAULT] bit 6 Battery A discharging [0=OK, 1=FAULT] bit 5 Battery B charging [0=OK, 1=FAULT] bit 4 Battery B discharging [0=OK, 1=FAULT] bit 3 TBD [0=?, 1=?] bit 2 TBD [0=?, 1=?] bit 1 TBD [0=?, 1=?] bit 0 TBD [0=?, 1=?] II Status 3 bit 7 SPB A regulator [0=OK, 1=FAULT] bit 6 SPB B regulator [0=OK, 1=FAULT] bit 5 3V3 A regulator [0=OK, 1=FAULT] bit 4 3V3 B regulator [0=OK, 1=FAULT] bit 3 5V A regulator [0=OK, 1=FAULT] bit 2 5V B regulator [0=OK, 1=FAULT] bit 1 12V A regulator [0=OK, 1=FAULT] bit 0 12V B regulator [0=OK, 1=FAULT] JJ Battery A voltage N (uint 8) [V] KK Battery B voltage N (uint 8) [V] LL Battery A temperature N (uint 8) [V] MM Battery B temperature N (uint 8) [V] NN Power balance N (signed int 8) [W] O Firmware version N (uint 4) [Version number] P Crash counter N (uint 4) [Number of crashes] QQ Forwarded RF power N (signed int 8) [dBm] RR Reflected RF power N (signed int 8) [dBm] SS Received signal strength N (signed int 8) [dBm]
ESTcube-1 GNU Radio receiver:
Follow the link and download the gr-ec source and compile it as mentioned on the page. After that create the following GNU radio blocks to decode the data from ESTCube-1. This setup can also be used by other AX25 signals.
Will be launched with a Vega rocket from Kourou French Guiana. Liftoff is scheduled on May 4 at 02:06:31 UTC, separation at 04:07:17 UTC. Beacon should activate 40 minutes after separation. Launched from Kourou in the Caribbean on May 7, 2013 at 0206 UTC on an ESA Vega rocket into a 704 km orbit and Active
Homepage and other references:
Solar-propulsion see www.electric-sailing.fi.
| 41,158
|
In ‘Answering the Question: What is Postmodernism?’, Jean-François Lyotard uses the ideas of Emmanuel Kant as a framework for explaining how postmodernism evolved out of modernism as a more powerful means of challenging the conformist forces of capitalism and government. Postmodernism is paradoxically more logical and more nonsensical as it eludes the elites. The writing parallels this argument, evolving from a logical statement of events to a romantic lauding of masochism.
According to Lyotard, Modernism eluded the forces of industrialisation and consumerism by overturning the two conventions of beauty, established by Kant, which insist upon: 1) communicativeness and 2) subjective coherence. Modernism denied the consumerist need for a coherent message by making the content nonsensical to the public generally, aka ‘unpresentable’. It retained a private coherence for individuals, in other words it was still ‘conceivable’, as it relied on representation and figuration.
Postmodernism took Modernism a step further: It made no sense to the public and it made no sense to individuals subjectively. Postmodernist paintings, as both inconceivable and unpresentable, were so abstract that they made no sense, and unexpressable ideas were represented through this absence of expression.
Postmodernism thereby attains, to a higher degree, the mystical concept of the Kantian sublime: ‘The sublime is, according to Kant, a strong and equivocal emotion: it carries with it both pleasure and pain. Better still, in it pleasure derives from pain.’ Postmodern art is ‘more’ sublime’ as it deprives the viewer any pleasure or usefulness as a communicative tool. Postmodernity ‘Denies itself the solace of good forms,’ and ‘searches for new presentations not to enjoy them, but in order to impart a stronger sense of the unpresentable.’
In his 1983 essay, Lyotard is simultaneously denouncing all attempts at coherency and unity, and extracting a hidden metanarrative which endured the fall of Catholicism, enlightenment, socialism and capitalism (yet remains an element of all three). It has a renaissance in punk and grunge and any number of subcultures. That metanarrative is masochism.
Self-destruction is the only human act compatible with relativism as it apparently serves no cause and follows no logic.
While masochism is absurd and inscrutable, it does describe a teleology when practiced by the human race as a whole. The teleology depicts a culture at the periphery of freedom, where increasing individualism, insularity and egotism are practiced to a degree beyond capitalism: the masochism of silencing art to the point of self-censure.
The task of postmodern art, which as Lyotard says, is to continue experimentation, meeting ‘the challenge of the mass media’ through halting of communication.
With all due respect to the achievements of Kant, the postmodernists and Lyotard, this author believes experimentation which involves self-censure, silence and pain is intrinsically limited. Creativity cannot be authentically linked with the paralysis of self-denial and destruction.
Not only that, masochism is an excessively ‘easy’ solution to relativism precisely because artists don’t have to do anything: They don’t have to think and they don’t have to create. Alternatively, proactive artists could challenge the communicative monopoly of the mass media constructively by inventing new forms of communication.
| 29,154
|
Invasive Plants tells the history of invasives, defines their impact on natural areas and the economy, describes their role in natural systems, and provides a field guide to over 175 of the most common species in North America.
The authors have created this web site as a portal to the world of invasive plants and as a place to explore their importance in the natural environment, current research, public policy, and management methods. We invite questions, comments, and debate.
“It is a practical tool for scientists, weed managers, and for landowners wishing to know more about invasive species and their management … It is a pleasure to skim through and serves its stated purpose well”
C.R. Allen et al. Great Plains Research 18(2):234
Contact us: email@example.com
| 31,741
|
EVALUATION OF SOLAR ENERGY, ITS PRESENT STATUS, POTENTIALS, POLICIES AND THE LATEST DEVELOPMENTS IN TURKEYJournal: International journal of ecosystems and ecology science (IJEES) (Vol.6, No. 3)
Publication Date: 2016-06-30
Authors : Fatma Canka Kilic;
Page : 415-424
Keywords : Renewable energy; solar energy; incentives; Turkey;
Thanks to its perfect geographical position, Turkey has a huge solar energy potential. According to Turkey’s Solar Energy Potential Atlas (SEPA), total sunshine duration is 2738 hours, annually and the quantity of average total incoming solar energy is 1527 kWh/m? year. Today there is great a tendency towards clean, dependable and sustainable renewable energy productions to cover the increasing energy demands in all over the world. Renewable energy productions are subsidized by the governments and besides, these energy productions assure the new employment opportunities. Renewables are accepted as an alternative solution to fossil fuels not only for the generation of clean energy, but also for the protection of the environment and the entire life on earth. In this study, present status of solar energy, its potentials, productions, government incentives and solar energy usage in Turkey have been examined according to the latest developments. In this way, it has been aimed to contribute to the improvements in renewable energies and bring forth people’s awareness to the subject.
Other Latest Articles
Last modified: 2016-07-02 13:44:36
| 43,824
|
Batteries are portable devices that are used to power other electronic devices. Batteries can be rechargeable or non-rechargeable, but the most common of the former would be Lithium-Ion batteries or Li-Ion.
Seeing as the title of the article revolves around Li-Ion tech, we will be focusing more in-depth about them.
History Of Li-Ion Batteries
The first idea of Li-Ion batteries was coined way back in 1912 by G.N. Lewis. However, the first time in history Li-Ion versions came to use was almost 60 years in the future, in 1970. It was this time that the first Li-Ion non-rechargeable battery was put into commercial use and displayed to the wider public. In 1980, scientists had partial success with designing a rechargeable version, however, they failed to notice that these batteries were very unstable during the charging process, causing a thermal runaway due to the charging process.
In 1991, an accident happened in Japan, and it was deemed then that Li-Ion batteries should be handled more carefully, and after a lot of research, Sony managed to create the first unit with new chemistry. This is the Li-Ion battery that we still use to this very day.
Chemistry of Li-Ion Batteries
These batteries run on lithium ions with lithium being a light metal with high energy density. This is the property that allows high energy output even from small units, plus, compared to other options, these are quite lightweight. The higher the energy density, the smaller the battery. Due to its metallic nature, lithium cannot be used as an electrode directly in the batteries, because the metallic nature makes it highly unstable. This is where lithium ions came into play as those manage to have the same property as the metal, but the non-metallic compounds make it safer to use.
According to BellTestChamber, experts in battery safety, the most commonly used Li-Ion battery is the 18650 cells. And that puts us nicely towards our next point which is…
Introduction to Li-Ion Batteries
The typical 18650 Cell, like all batteries, has a voltage and capacity rating. A normal voltage for any lithium cell would be 3.6V; however, the voltage can be run down to around 3.2V. When fully charged, the cells can go as high as 4.2V. Anything below 3.2V or above 4.2V will damage the battery beyond repair, and it might even cause a fire. All of these numbers apply to the most common Li-Ion battery, the 18650 cells.
We’re going to follow up on that and give you some more information about the 18650 cells.
mAh means the capacity of a cell, where mAh means ”Milli Ampere per Hour”. The mAh rating of Li-Ion batteries will vary based on the type of cells. If we buy a battery with a cell of 2000 mAh, which is 2Ah (Ampere/hour) and draw 2A from it, then the battery will only last for one hour. If we draw 1A from it, we can expect it to give energy for two hours. There is a simple equation which calculates how much time a battery will last, and it goes like this:
Run Time (in hours) = Current drawn / mAh Rating
| 849
|
10975 Introduction to Programming - Informator Utbildning
COING - In reality, all modern programmers are polyglot... Facebook
For a white-space-only difference the summary is chequered. into countless different types of codes by countless programmers using different programming av G Gopali · 2018 — This thesis will help the programmers to understand the various coding flaws and attacks, attack types and guidelines for the programmers who are designing, Are you interested in becoming part of the group of statistical programming at Higher academic degree; Expertise in multiple programming software such as R av J Wahlstedt · 2018 — There are lots of different programming languages, each of which has different syntax. to implement a visualization that is adapted to different types of users. Different programming models are introduced for simplifying parallel programming with other types of programming paradigms into a multiparadigm language. Python programmers are actually communists, not fascists. There are of course many different types of computers and yours may not look Få din OCA Java Programmer certifiering dubbelt så snabbt. Understanding the different kinds of errors that can occur and how they are handled in Java This programmers guides explains general modbus informations, implemented modbus registers in M100, detailed description of the implemented Modbus This book will explain the Object Oriented approach to programming and through the use of small exercises, Java 4: Java's type system and collection classes.
These programmers are focused on designing and creating websites. They work on the website itself, and Database developers. As you can imagine, these programmers work behind the scenes, and they are collecting, Computer programmers write programs and rewrite programs until they are free of errors. They use a workflow chart and coding formulas until the desired information is produced. Attention to detail and patience will set you apart in this coding career. Most common programming languages for computer programmers: 1.
DATABASE DEVELOPERS · 3. WEB DEVELOPERS · 4.
Coding Ninjas på Instagram: "What if Bollywood songs were sung by
These developers develop the operating software on which all our programs and processes run on. How to schedule the different processes, switch between two processes, how to manage the file in the operating system and other tasks. Data types are used within type systems, which offer various ways of defining, implementing, and using them.
GK2346 Foundations of C# Programming and the .NET
Codes with best programming conventions, keeps the code nice and clean. Always uses a good code editor and wouldn’t write a line of code in notepad++. 5 types of programmers you should know like software programmer, Web Programmer,System The programming languages depend on the platform, but the usual suspects are Windows, Linux, Mac OSX, Andriod, and iOS.
Multiple alarms on a single output; DC retransmission; Digital Communication; Modbus RTU; Profibus DP network; Devicenet network. Specification. Input Type. security administrators, hardware engineers, and system programmers for other systems in the network. Planning usually begins with a clear idea of the kinds
project planners and programmers working for medium-size and large-scale Industry 4.0 and an overview about the interaction of the various software packages, programming; Standards in automation; TIA Portal Openness and types of
LIBRIS titelinformation: Programming Ruby 1.9 : the pragmatic programmers' guide / Dave Thomas with Chad Fowler and Andy Hunt. IBM Arrow är en världsledande inom utbildningstjänster.
Cnc cam online
Type, Description, Select All. Categories, Development Boards, Kits, Programmers · Evaluation Type, Interface. Function, Multiplexer (MUX). Utilized IC / Part Phpbb test forumYou see, even after 3+ months of regular use, I thought the Ergodox's ortholinear layout didn't make any difference besides making my numpad All the chapters present research that bears on programmers.
2021-01-26 · Date: January 26, 2021 Computer programmers may specialize in updating existing software. There are many different types of computer science jobs to choose from. Deciding on a computer related career can be challenging because of the many choices.
Hur många timmar i veckan är 75
hur många gram är en dl
handbok för vfu i 2 exemplar.
odlas pisum i
- Wennergren postdoc
- Kim svensson hällevik
- Esther its the big one
- Jätte svagt streck gravid
- Vad gäller när du passerat vägmärket huvudled upphör
Chip Programmers & Debuggers RS Components
Different Types Of Computer Software Computer Software is a computer tool that will help computer users interact with the machine or the hardware in a computer. Without computer software's, you will not be able to make the computer run and thus working on computers may not be as easy as it is today. These two types of programmers seem like opposites. They themselves look at the other group and often think exactly that. They have a different way of handling the same problems.
| 46,203
|
View Full Version : Good tutorials for BASIC Stamp Editor
Drew n Matt
02-17-2010, 11:56 PM
I'm in a computer engineering course at my school and our teacher purchased some Boe-Boards (as well as boe-bots). We wanted to use the boe-boards to make a digital alarm clock and were looking for some good tutorials for the BASIC Stamp Editor. If you guys have some sites or maybe a book we could buy that would be helpful.
02-18-2010, 12:08 AM
The "BASIC Stamp Syntax and Reference Manual" has a lot of stuff on using the Stamp Editor. It's not that complicated and the Manual covers everything. Go to the main Parallax webpage and click on Downloads. In the list you'll get, click on "BASIC Stamp Documentation" and you'll see the Manual. Under Downloads, there's also "Stamps in Class Downloads" which is where you'll find various programming tutorials.
02-23-2010, 09:53 AM
I found this to be pretty helpful... http://22.214.171.124/search?q=cache:O8XC4ksSU6wJ:digital.mica.edu/jrouvelle/pcomp/BS2_Tutorial.ppt+BS2+sending+hex+numbers&cd=9&hl=en&ct=clnk&gl=us&client=firefox-a
its easier to look at as a powerpoint, at the top of the page you'll see the link for it.
| 42,353
|
Modern automobiles are more technologically advanced than ever before. That tech isn’t just making driving more comfortable and convenient, but also more safe.
In a recent analysis of motor vehicle accidents, researchers at the International Institute for Highway Safety found that vehicles with blind spot and lane departure warning systems were involved in 11 percent fewer sideswipes and head-on crashes than cars that did not feature such systems. In addition, the IIHS estimates that the number of automobile crashes in the United States could be decreased by 85,000 each year if every vehicle were outfitted with a lane departure warning system.
Driver assistance systems have made driving safer for millions of people across the globe, but one demographic may need some extra help adapting to modern vehicles, and may even need a little extra encouragement to utilize tech that can keep them safe behind the wheel. The Centers for Disease Control and Prevention notes that, in 2018, the United States was home to 45 million licensed drivers aged 65 and over. That marks a 60 percent increase since 2000. Though seniors’ perceived unwillingness or inability to utilize modern technology is often overstated, some aging drivers may need a little extra help as they try to learn how to use assistance technologies in their vehicles.
Learn the tech yourself. Assistance technologies are not all one and the same. Vehicle manufacturers have their own systems and there can be a learning curve when adapting to a new one. If you aspire to teach a senior how to utilize the assistance technologies in his or her vehicle, first learn the tech on your own. If both you and your aging friend or family member own the same brand of car or truck, chances are you already know how to use the tech in your loved one’s vehicle. If you drive cars made by different manufacturers, visit the dealership where your loved one bought his or her car and ask for a quick tutorial on all the safety features in the vehicle. Salespeople demonstrate these features every day, so it shouldn’t take long for them to show you the ropes.
Be patient. Each person adapts to a new technology at his or her own pace. It’s important to remain patient when teaching aging drivers how to use the tech in their vehicles. Old habits die hard, and while some drivers may quickly adapt to tech like backup cameras, others may not be so quick to abandon driving techniques they’ve been safely using for decades. Stay the course, remain patient and allow senior drivers to adapt at their own pace.
Teach one tech at a time. It can be overwhelming for drivers of all ages to adapt overnight to all the tech in their new vehicles. When teaching senior drivers how to utilize various driver assistance technologies, take it one tech at a time. When coupled with your patience, this approach can help seniors avoid being overwhelmed and increases the likelihood that they will embrace the tech in their vehicles.
Many senior drivers utilize driver assistance technologies every day. A patient and methodical approach to showing seniors how their vehicles can help them stay safe behind the wheel can be a road map to helping seniors adapt to life in modern vehicles.
| 26,412
|
The Room of the Satyrs
This tiny and extremely richly decorated room is formed from the dome of the octagonal cupola.
Its name comes from the series of miniature stucco satyrs which sit around the edge of the eye opening up into the lantern above.
There are also three circular windows opening out from the sides of the cupola, which are decorated with stained glass. They are the work of Duilio Cambellotti, although only one is original. The designs show ivy leaves and bunches of grapes.
There is more delicate stucco work along the walls, showing ivy tendrils and snails, while the same motif of ivy leaves is repeated in the mosaics on the floor.
The doors open onto a charming balcony made of carved wood, surmounted by a cupola covered with fine wood work, with a design recalling the stucco work inside. The cupola is supported by columns with capitals in the form of snails.
An elaborate wooden bench used to run along the walls, but only a part of it now survives.
| 14,533
|
The M4 Macro Processor PS1:17-1 The M4 Macro Processor Brian W. Kernighan Dennis M. Ritchie AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT M4 is a macro processor available on UNIX- and GCOS. Its primary use has been as a front end for Rat- for for those cases where parameterless macros are not adequately powerful. It has also been used for languages as disparate as C and Cobol. M4 is particu- larly suited for functional languages like Fortran, PL/I and C since macros are specified in a functional notation. M4 provides features seldom found even in much larger macro processors, including ------------------------- - UNIX is a registered trademark of AT&T Bell Labora- tories in the USA and other countries. PS1:17-2 The M4 Macro Processor + arguments + condition testing + arithmetic capabilities + string and substring functions + file manipulation This paper is a user's manual for M4. Introduction A macro processor is a useful way to enhance a programming language, to make it more palatable or more readable, or to tailor it to a particular application. The #define statement in C and the analogous define in Ratfor are examples of the basic facility provided by any macro processor - replacement of text by other text. The M4 macro processor is an extension of a macro processor called M3 which was written by D. M. Ritchie for the AP-3 mini- computer; M3 was in turn based on a macro processor implemented for . Readers unfamiliar with the basic ideas of macro pro- cessing may wish to read some of the discussion there. M4 is a suitable front end for Ratfor and C, and has also been used successfully with Cobol. Besides the straightforward replacement of one string of text by another, it provides macros The M4 Macro Processor PS1:17-3 with arguments, conditional macro expansion, arithmetic, file manipulation, and some specialized string processing functions. The basic operation of M4 is to copy its input to its out- put. As the input is read, however, each alphanumeric ``token'' (that is, string of letters and digits) is checked. If it is the name of a macro, then the name of the macro is replaced by its defining text, and the resulting string is pushed back onto the input to be rescanned. Macros may be called with arguments, in which case the arguments are collected and substituted into the right places in the defining text before it is rescanned. M4 provides a collection of about twenty built-in macros which perform various useful operations; in addition, the user can define new macros. Built-ins and user-defined macros work exactly the same way, except that some of the built-in macros have side effects on the state of the process. Usage On UNIX, use m4 [files] Each argument file is processed in order; if there are no argu- ments, or if an argument is `-', the standard input is read at that point. The processed text is written on the standard output, which may be captured for subsequent processing with m4 [files] >outputfile PS1:17-4 The M4 Macro Processor On GCOS, usage is identical, but the program is called ./m4. Defining Macros The primary built-in function of M4 is define, which is used to define new macros. The input define(name, stuff) causes the string name to be defined as stuff. All subsequent occurrences of name will be replaced by stuff. name must be alphanumeric and must begin with a letter (the underscore _ counts as a letter). stuff is any text that contains balanced parentheses; it may stretch over multiple lines. Thus, as a typical example, define(N, 100) ... if (i > N) defines N to be 100, and uses this ``symbolic constant'' in a later if statement. The left parenthesis must immediately follow the word define, to signal that define has arguments. If a macro or built-in name is not followed immediately by `(', it is assumed to have no arguments. This is the situation for N above; it is actually a macro with no arguments, and thus when it is used there need be no (...) following it. You should also notice that a macro name is only recognized The M4 Macro Processor PS1:17-5 as such if it appears surrounded by non-alphanumerics. For exam- ple, in define(N, 100) ... if (NNN > 100) the variable NNN is absolutely unrelated to the defined macro N, even though it contains a lot of N's. Things may be defined in terms of other things. For example, define(N, 100) define(M, N) defines both M and N to be 100. What happens if N is redefined? Or, to say it another way, is M defined as N or as 100? In M4, the latter is true - M is 100, so even if N subsequently changes, M does not. This behavior arises because M4 expands macro names into their defining text as soon as it possibly can. Here, that means that when the string N is seen as the arguments of define are being collected, it is immediately replaced by 100; it's just as if you had said define(M, 100) in the first place. If this isn't what you really want, there are two ways out PS1:17-6 The M4 Macro Processor of it. The first, which is specific to this situation, is to interchange the order of the definitions: define(M, N) define(N, 100) Now M is defined to be the string N, so when you ask for M later, you'll always get the value of N at that time (because the M will be replaced by N which will be replaced by 100). Quoting The more general solution is to delay the expansion of the arguments of define by quoting them. Any text surrounded by the single quotes ` and ' is not expanded immediately, but has the quotes stripped off. If you say define(N, 100) define(M, `N') the quotes around the N are stripped off as the argument is being collected, but they have served their purpose, and M is defined as the string N, not 100. The general rule is that M4 always strips off one level of single quotes whenever it evaluates some- thing. This is true even outside of macros. If you want the word define to appear in the output, you have to quote it in the input, as in `define' = 1; As another instance of the same thing, which is a bit more The M4 Macro Processor PS1:17-7 surprising, consider redefining N: define(N, 100) ... define(N, 200) Perhaps regrettably, the N in the second definition is evaluated as soon as it's seen; that is, it is replaced by 100, so it's as if you had written define(100, 200) This statement is ignored by M4, since you can only define things that look like names, but it obviously doesn't have the effect you wanted. To really redefine N, you must delay the evaluation by quoting: define(N, 100) ... define(`N', 200) In M4, it is often wise to quote the first argument of a macro. If ` and ' are not convenient for some reason, the quote characters can be changed with the built-in changequote: changequote([, ]) makes the new quote characters the left and right brackets. You can restore the original characters with just changequote PS1:17-8 The M4 Macro Processor There are two additional built-ins related to define. unde- fine removes the definition of some macro or built-in: undefine(`N') removes the definition of N. (Why are the quotes absolutely necessary?) Built-ins can be removed with undefine, as in undefine(`define') but once you remove one, you can never get it back. The built-in ifdef provides a way to determine if a macro is currently defined. In particular, M4 has pre-defined the names unix and gcos on the corresponding systems, so you can tell which one you're using: ifdef(`unix', `define(wordsize,16)' ) ifdef(`gcos', `define(wordsize,36)' ) makes a definition appropriate for the particular machine. Don't forget the quotes! ifdef actually permits three arguments; if the name is unde- fined, the value of ifdef is then the third argument, as in ifdef(`unix', on UNIX, not on UNIX) Arguments So far we have discussed the simplest form of macro process- ing - replacing one string by another (fixed) string. User- The M4 Macro Processor PS1:17-9 defined macros may also have arguments, so different invocations can have different results. Within the replacement text for a macro (the second argument of its define) any occurrence of $n will be replaced by the nth argument when the macro is actually used. Thus, the macro bump, defined as define(bump, $1 = $1 + 1) generates code to increment its argument by 1: bump(x) is x = x + 1 A macro can have as many arguments as you want, but only the first nine are accessible, through $1 to $9. (The macro name itself is $0, although that is less commonly used.) Arguments that are not supplied are replaced by null strings, so we can define a macro cat which simply concatenates its arguments, like this: define(cat, $1$2$3$4$5$6$7$8$9) Thus cat(x, y, z) is equivalent to xyz PS1:17-10 The M4 Macro Processor $4 through $9 are null, since no corresponding arguments were provided. Leading unquoted blanks, tabs, or newlines that occur during argument collection are discarded. All other white space is retained. Thus define(a, b c) defines a to be b c. Arguments are separated by commas, but parentheses are counted properly, so a comma ``protected'' by parentheses does not terminate an argument. That is, in define(a, (b,c)) there are only two arguments; the second is literally (b,c). And of course a bare comma or parenthesis can be inserted by quoting it. Arithmetic Built-ins M4 provides two built-in functions for doing arithmetic on integers (only). The simplest is incr, which increments its numeric argument by 1. Thus to handle the common programming situation where you want a variable to be defined as ``one more than N'', write define(N, 100) define(N1, `incr(N)') The M4 Macro Processor PS1:17-11 Then N1 is defined as one more than the current value of N. The more general mechanism for arithmetic is a built-in called eval, which is capable of arbitrary arithmetic on integers. It provides the operators (in decreasing order of pre- cedence) unary + and - ** or ^ (exponentiation) * / % (modulus) + - == != < <= > >= ! (not) & or && (logical and) | or || (logical or) Parentheses may be used to group operations where needed. All the operands of an expression given to eval must ultimately be numeric. The numeric value of a true relation (like 1>0) is 1, and false is 0. The precision in eval is 32 bits on UNIX and 36 bits on GCOS. As a simple example, suppose we want M to be 2**N+1. Then define(N, 3) define(M, `eval(2**N+1)') As a matter of principle, it is advisable to quote the defining text for a macro unless it is very simple indeed (say just a number); it usually gives the result you want, and is a good PS1:17-12 The M4 Macro Processor habit to get into. File Manipulation You can include a new file in the input at any time by the built-in function include: include(filename) inserts the contents of filename in place of the include command. The contents of the file is often a set of definitions. The value of include (that is, its replacement text) is the contents of the file; this can be captured in definitions, etc. It is a fatal error if the file named in include cannot be accessed. To get some control over this situation, the alternate form sinclude can be used; sinclude (``silent include'') says nothing and continues if it can't access the file. It is also possible to divert the output of M4 to temporary files during processing, and output the collected material upon command. M4 maintains nine of these diversions, numbered 1 through 9. If you say divert(n) all subsequent output is put onto the end of a temporary file referred to as n. Diverting to this file is stopped by another divert command; in particular, divert or divert(0) resumes the normal output process. Diverted text is normally output all at once at the end of The M4 Macro Processor PS1:17-13 processing, with the diversions output in numeric order. It is possible, however, to bring back diversions at any time, that is, to append them to the current diversion. undivert brings back all diversions in numeric order, and undivert with arguments brings back the selected diversions in the order given. The act of undiverting discards the diverted stuff, as does diverting into a diversion whose number is not between 0 and 9 inclusive. The value of undivert is not the diverted stuff. Further- more, the diverted material is not rescanned for macros. The built-in divnum returns the number of the currently active diversion. This is zero during normal processing. System Command You can run any program in the local operating system with the syscmd built-in. For example, syscmd(date) on UNIX runs the date command. Normally syscmd would be used to create a file for a subsequent include. To facilitate making unique file names, the built-in mak- etemp is provided, with specifications identical to the system function mktemp: a string of XXXXX in the argument is replaced by the process id of the current process. PS1:17-14 The M4 Macro Processor Conditionals There is a built-in called ifelse which enables you to per- form arbitrary conditional testing. In the simplest form, ifelse(a, b, c, d) compares the two strings a and b. If these are identical, ifelse returns the string c; otherwise it returns d. Thus we might define a macro called compare which compares two strings and returns ``yes'' or ``no'' if they are the same or different. define(compare, `ifelse($1, $2, yes, no)') Note the quotes, which prevent too-early evaluation of ifelse. If the fourth argument is missing, it is treated as empty. ifelse can actually have any number of arguments, and thus provides a limited form of multi-way decision capability. In the input ifelse(a, b, c, d, e, f, g) if the string a matches the string b, the result is c. Otherwise, if d is the same as e, the result is f. Otherwise the result is g. If the final argument is omitted, the result is null, so ifelse(a, b, c) is c if a matches b, and null otherwise. The M4 Macro Processor PS1:17-15 String Manipulation The built-in len returns the length of the string that makes up its argument. Thus len(abcdef) is 6, and len((a,b)) is 5. The built-in substr can be used to produce substrings of strings. substr(s, i, n) returns the substring of s that starts at the ith position (origin zero), and is n characters long. If n is omitted, the rest of the string is returned, so substr(`now is the time', 1) is ow is the time If i or n are out of range, various sensible things happen. index(s1, s2) returns the index (position) in s1 where the string s2 occurs, or -1 if it doesn't occur. As with substr, the origin for strings is 0. The built-in translit performs character transliteration. translit(s, f, t) modifies s by replacing any character found in f by the corresponding character of t. That is, PS1:17-16 The M4 Macro Processor translit(s, aeiou, 12345) replaces the vowels by the corresponding digits. If t is shorter than f, characters which don't have an entry in t are deleted; as a limiting case, if t is not present at all, characters from f are deleted from s. So translit(s, aeiou) deletes vowels from s. There is also a built-in called dnl which deletes all char- acters that follow it up to and including the next newline; it is useful mainly for throwing away empty lines that otherwise tend to clutter up M4 output. For example, if you say define(N, 100) define(M, 200) define(L, 300) the newline at the end of each line is not part of the defini- tion, so it is copied into the output, where it may not be wanted. If you add dnl to each of these lines, the newlines will disappear. Another way to achieve this, due to J. E. Weythman, is The M4 Macro Processor PS1:17-17 divert(-1) define(...) ... divert Printing The built-in errprint writes its arguments out on the stan- dard error file. Thus you can say errprint(`fatal error') dumpdef is a debugging aid which dumps the current defini- tions of defined terms. If there are no arguments, you get every- thing; otherwise you get the ones you name as arguments. Don't forget to quote the names! Summary of Built-ins Each entry is preceded by the page number where it is described. PS1:17-18 The M4 Macro Processor 3 changequote(L, R) 1 define(name, replacement) 4 divert(number) 4 divnum 5 dnl 5 dumpdef(`name', `name', ...) 5 errprint(s, s, ...) 4 eval(numeric expression) 3 ifdef(`name', this if true, this if false) 5 ifelse(a, b, c, d) 4 include(file) 3 incr(number) 5 index(s1, s2) 5 len(string) 4 maketemp(...XXXXX...) 4 sinclude(file) 5 substr(string, position, number) 4 syscmd(s) 5 translit(str, from, to) 3 undefine(`name') 4 undivert(number,number,...) Acknowledgements We are indebted to Rick Becker, John Chambers, Doug McIlroy, and especially Jim Weythman, whose pioneering use of M4 has led to several valuable improvements. We are also deeply grateful to The M4 Macro Processor PS1:17-19 Weythman for several substantial contributions to the code. References B. W. Kernighan and P. J. Plauger, Software Tools, Addison- Wesley, Inc., 1976.
Generated on 2013-04-27 00:20:00 by $MirOS: src/scripts/roff2htm,v 1.77 2013/01/01 20:49:09 tg Exp $
These manual pages and other documentation are copyrighted by their respective writers;
their source is available at our CVSweb,
AnonCVS, and other mirrors. The rest is Copyright © 2002‒2013 The MirOS Project, Germany.
This product includes material provided by Thorsten Glaser.
This manual page’s HTML representation is supposed to be valid XHTML/1.1; if not, please send a bug report – diffs preferred.
| 60,708
|
Arts & Crafts
Submitted by: masamom
Demonstrating knowledge of address. Recognizing numbers within an address.
36 - 60 months
1 - 8 tots
- Address (For each child)
- Paper (Assorted colors)
- Markers (Assorted colors)
- Crayons (Assorted Colors)
- Talk to children about what an address is and the different parts of an address.
- Ask each child to draw a picture of his or her house.
- After pictures are drawn, have older children label their house with their correct address. For younger children, write it for them but have them repeat it as you write it.
- Once pictures are complete, ask each child to identify the numbers found in his or her address.
- Cognitive development » Approaches to learning » Persistence & attentiveness
- Cognitive development » Mathematics » Number concepts & quantities
- Fine motor skills
| 46,351
|
Why Use Herbicide?
Invasive species are a big problem for natural areas. An invasive plant is generally defined as any plant that is more aggressive than the high-quality native species and pushes those plants out over time. TLC tries to use any method other than herbiciding whenever possible.
For biennial weeds (those that have a two-year life-cycle), we use mowing, pulling, and burning to help reduce the populations with good success. It typically takes several years of effort to eliminate a biennial invasive plant because there is usually a build up of seeds in the soil that need to be exhausted.
Perennial (effectively permanent) weeds are a different story. Because of their deep root systems, it is almost impossible to eradicate a perennial by digging the plant up. Any method that would kill a perennial, like consistent mowing or using a shade cloth, also damages the native plants. Invasive weeds need consistent, well-timed treatments over several years to successfully eradicate them, and TLC is managing over 200 acres!
This is why we use herbicides, always taking care to use the smallest amount and safest alternative available that will eliminate the weeds.
This year TLC is creating an herbicide alternative plot at the Community Research Forest to look into other methods, and anyone is welcome to help by attending our monthly workday there! We care deeply about the health of this planet, and hope that over time new technology will be available that will reduce our use of herbicides.
| 34,705
|
“Old school” diet lore taught us that fibre “fills you up”, but recent research shows that there is much more to it than that. Dietary fibre has the power to alter the composition of the intestinal microflora, triggering the release of satiety hormones that communicate to the brain that we are full. The message, however, has not yet trickled through to consumers, leaving high fibre foods at the risk of stagnation.
Fibre More Complex than Previously Thought
After general wellbeing, weight management remains by far the most important health and wellness positioning platform. In 2013, the category accrued global value sales of US$156.3 million for thusly positioned packaged food and beverage products.
Fibre has long played a pivotal role in weight management. For decades, pharmacies and health food shops have been selling fibre tablets based on the simple concept that, if taken with enough water, the fibre swells up in the stomach and this is meant to produce a lasting feeling of fullness. In more recent years, various types of dietary fibre have been added to weight management foods and beverages in order to enhance the feeling of satiety produced after consuming these products.
We now know that it is not just a case of “fibre fills you up”. It turns out that there are many complex biochemical pathways involved that cause the brain to register a state of fullness. These mechanisms are gradually being uncovered and officially recognised.
Fibre Alters Gut Flora
The European Food Safety Authority (EFSA), for instance, approved a health claim pertaining to weight loss for glucomannan, a soluble dietary fibre derived from konjac root, which triggers the release of cholecystokinin, a satiety-inducing hormone. Last year, Carmit Candy, a US-based manufacturer of private label health and wellness confectionery, added a glucomannan-fortified chocolate wafer with a weight management positioning to its portfolio.
Recent research provides some more astonishing insight into the wondrous workings of dietary fibre. A small human study published a year ago in Nutrition Journal stipulated that the fibre contained in barley kernels had a profound effect on the study subjects’ gut microbiota, resulting in the release of the satiety hormone GLP-1, which subsequently led to a reduction in energy intake at meal times.
The researchers pointed out that previous investigations had already shown that the intestinal flora of people of normal weight differs quite markedly from that of obese people. Hence, the impact of indigestible fibres on the human digestive system and its implications for weight management are now a major area of scientific research with much promise for exciting future NPD.
In May 2014, the journal Nature Communications published a paper submitted by Imperial College London and the Medical Research Council which had concluded that the acetate molecules that are released when dietary fibre passes through the gut produce a signal in the brain, which tells the person to stop eating.
The researchers made the salient point that the diet of the average European contained just 15g of fibre a day, compared to the 100g that would have been consumed by a human in the Stone Age. Considering that our digestive systems are still on a Stone Age setting, a lack of dietary fibre has many negative implications for our health, including obesity.
Turning Consumers Back on to Fibre
Our data show that naturally healthy (NH) high fibre food achieved global value growth of 7% in 2013, and that while the category had been gaining in dynamism globally and in Western Europe over the 2008-2013 review period, North American growth rates have gradually diminished, lingering at an unexciting annual 2% for the past three years.
A renewed emphasis on weight management benefits could give high fibre food a second wind, and propel it out of the doldrums in the North American region, which was, not so long ago, its most buoyant growth market.
As yet, there is precious very little consumer awareness of how dietary fibre manages to produce weight management benefits, besides the rather simplistic rationale that it provides extra bulk in the stomach. Manufacturers of weight management foods and beverages may want to pay attention in the coming years to providing fresh scientific angles when hammering out their marketing strategies in order to drive it home to consumers that fibre has lost nothing of its relevance.
| 11,860
|
This house is a 255 m2 single family home and it is considered a small dwelling, or actually ‘just the right amount of space’ what was the demand. Its neighboring houses are almost twice as big, just like any “regular” house in Australia. So it seems the neighbors can have a full right to call it THAT house, for breaking with that tradition. Modern life, environment issues, and sustainability awareness are starting to take effect and Australia seems to be fighting a battle with wiser ways of using space, materials and energy. Architects didn’t intend to make a stand or suggest a new prototype, but the house shows great qualities in thinking this direction.
Orientation and windows are set in demands of passive solar gain, also white roof reduces heating. The house has solar panels and a water tank in the ground that collects rainwater which is then used for toilets and watering the garden. Also, local materials were used where possible so the house responds to sustainability at its best.
THAT house is a composition of three long cuboids one placed over the two others that are distanced enough to make a corridor in between. All three are closed with full area windows on end sides so the house appears completely see-through. This is very unusual for Australia where people tend to stay very private inside homes. Setting a new transparency trend in the neighborhood but also respecting the tradition and habits about the privacy, the house features a small “invention” such as upwards blinds, bringing these two demands together.
Name: THAT House
Size: 225 m2
Location: Melbourne, Australia
Architect: Austin Maynard Architects
Image credits: ©Tess Kelly via https://www.archdaily.com/782890/that-house-austin-maynard-architects
| 20,318
|
A Brief the History of the Tea Party
As the Tea Party made its boisterous debut on the national stage in 2009, it energized conservatives, rattled liberals, and confounded reporters in ways rivaled by very few other contemporary movements. In 2009 and 2010, Republican candidates rode a Tea Party wave of anti-Obama sentiment to victory, most significantly in deep blue states.
Early reports regarding the movement, its motivations, and its voters characterized the Tea Party as comprised of energized, disgruntled conservatives railing against the new president’s spending package and bailout bills. But not too long after this sentiment took hold, many in the press pivoted, and began to argue that the Tea Party’s efforts were as much a reaction to George Bush’s second term as they were to Barack Obama’s first.
Even as that new conventional wisdom gained widespread acceptance, another shift in perspective was on the horizon. As the Tea Party movement essentially mainstreamed leading up to and during the 2012 presidential primary, fueled the fires of the Bachmann, Cain, Gingrich, and Santorum presidential campaigns, the press became less concerned with defining the movement in its entirety and began covering the elected officials propelled into office or supported by the new coalition. Those with relatively long political memories will recall that not so long ago, Marco Rubio found electoral success as a frontrunner-primarying Tea Party outsider, and Mitt Romney’s vice presidential selection of Paul Ryan was at the time widely considered to be an olive branch from the GOP establishment to more hard-nosed conservative Tea Party-types.
Despite their inability to pin down the movement’s ideological makeup, the press did eventually settle on a single sentiment about the Tea Party movement, a conventional, underlying truth; there grew a near-unanimous consensus that the movement’s rise and electoral success signified a dawning ‘libertarian moment’ in American politics. Despite the amorphous nature of both the movement and the press’ stabs at defining it, many members of the press were confident that this was surely the case.
The press began pushing this particular narrative with some real muscle around 2012. Ron Paul was taking his second, somewhat more successful presidential lap around the country, and his son had been elected to the U.S. Senate only one election cycle prior; the Paul brand of state-rights flavored conservatism was enjoying some time in the national spotlight.
The echo only grew louder as social conservatives were dealt a narrow loss by the Supreme Court’s decision in the Obergefell case—a loss that the many in the press mistakenly and naively took as signaling the end of the culture wars. With seemingly no cultural battles left to fight, the narrative took hold that the conservative movement would pivot to encompass tenants of the libertarian movement, while also rejecting the seemingly bigger-government “compassionate conservatism” of the Bush years—and the Tea Party was sure to play a prominent role in injecting this new libertarian streak directly into the heart of conservative politics.
Today’s Tea Party and the ‘Libertarian Moment’
The press has gotten plenty about the Tea Party wrong, and a number of reporters have owned up to that fact. But it is this ‘libertarian moment’ concept in which many reporters have had the most confidence, to which they have been the most consistently committed, and whereby they have been most incorrect. Their it’s-just-over-the-horizon forecasting of an American libertarian moment brought on by Tea Party politics may be one of the most botched political stories of the new century; while traditional social conservatism did indeed endure a loss at the hands of the Supreme Court via the Obergefell decision, it quickly passed the mantle to a resurgent, culturally conservative populism, skipping right over ideological libertarianism. Members of the Tea Party may not have envisioned or anticipated this evolutionary hand-off during the early days of the movement, but, especially as of late, they have served as a strong driving force for it.
Conservative voters’ behavior during the 2016 primary provides the best, most relevant insights to how the Tea Party movement has evolved, and to how the press blew the story so badly. During the primary, conservative Tea Party voters broke into two camps: Trump supporters and Trump-resistant, self-identified “conservatarians.”
First, the conservatarians. Both early on and throughout the primary campaign, scores of ideological conservative voters were averse to Donald Trump’s celebrity, seemingly enigmatic ideology, and–probably most of all–his disregard for, or misunderstanding of, certain traditionally conservative principles; this is true even if they still admired his bombast, donor-class-bashing and anti-establishment message. These voters found themselves scattered amongst a plethora of other ‘outsider’ candidates and quickly became too fractured among a buffet of potential conservative alternatives to unite against the New York billionaire.
This “conservatarian” camp is certainly the more ideologically libertarian of the two 2016 Tea Party sub-camps–and clearly, they don’t mind being viewed as somewhat libertarian, given the portmanteau moniker many of them embrace. But in reality, it’s hard to distinguish what distinctly, ideologically libertarian policy ideas this bloc of voters actively champions. It’s true that they don’t, for the most part, get hung up on socially conservative sticking points like gay marriage and legal marijuana; many conservatarians don’t make socially conservative moral arguments against the Obergefell decision or similar policy outcomes from Washington, but rather, point to those federal actions as examples of the federal government over-exerting its authority and violating the 10th Amendment. The argument conservatarians make against socially liberal policy outcomes is less morality-based and more constitutionally-technical than the arguments made by their socially conservative forefathers, but their preferred policy outcomes are, essentially, the same. Given the many socially liberal policy outcomes ideological libertarianism enables or directly champions, it’s possible that these voters may be better understood as “10th Amendment Conservatives,” rather than “conservatatians.”
The Trump supporters—the second, and ultimately victorious, sub-camp of 2016 Tea Party voters—were willing to overlook or embrace Trump’s ideological inconsistencies and imperfections, galvanizing the insurgent mogul’s campaign early on in the primary and blessing him with the holy momentum that most other campaigns spent the 2016 primary only chasing. Trump quickly secured roughly a third of the Republican primary vote, and smashed his way through New Hampshire and South Carolina, putting him on a relatively easy path to the nomination. It’s been called a “hostile takeover,” a “great Republican revolt.” This is language lifted directly from the Tea Party’s rebellious lexicon.
While these two blocks of Tea Party voters backed different candidates, the issues that motivated them and their policy references really aren’t all that different. They think the Supreme Court and the federal government frequently overreach and unconstitutionally expand their power. They think strict immigration policies ought to be enforced; they want the wall built, immigration limited, and illegal immigrants deported. Identifying their leanings on foreign policy is a bit trickier, though it seems that most of them favor a less-interventionist approach to overseas affairs.
When these policy preferences are contrasted with traditional, ideological libertarianism—major strands of which champion nearly unrestricted immigration and government intervention so minimal that social liberalism is, essentially, a guaranteed outcome or at least a permissible, unavoidable conclusion—it becomes hard to avoid the conclusion that the Tea Party isn’t comprised of tomorrow’s libertarians so much as it’s comprised of today’s culturally conservative populists, unifying in a coalition that’s defined more by an anti-liberal and an anti-establishment attitude than libertarian political philosophy or ideology. The conservatarian camp may not be raging directly against cultural issues, like their socially conservative forefathers had, but their championing of the 10th Amendment in response to America’s recent socially leftward jolt is firmly in the constitutionally conservative tradition; yes, it’s a reflection of small government values, but those values are more clearly rooted in traditional conservatism than tomorrow’s libertarianism. Meanwhile, the Trump supporters are raging for the sake of raging—their burn-it-down attitude naturally puts ideological purity and cohesion on the backburner in favor of prioritizing smashing the establishment and disrupting the status quo.
To some conservative thought leaders, it isn’t news that the Tea Party and conservative movement isn’t trending libertarian. “Nationalism and populism have overtaken conservatism in terms of appeal,” Rush Limbaugh announced on his radio show in early 2016. “...It’s not conservatism that’s uniting [voters] or motivating them…[it’s] an absolutely direct opposition to the left, to the Democratic Party, to Obama and everything that’s been going on the last seven years...and they will go anywhere if they are convinced whoever’s telling them they’re gonna stop it is telling the truth.”
All of this is not to say that a truly pure libertarian moment will never be nascent in America politics; as Millennials age and come to dominate American politics, they may grow more fiscally conservative while holding onto their almost universally socially liberal attitudes. That evolution would most likely owe more to the public opinion swings and Supreme Court decisions of the Obama era–as well as the era’s economic shortcomings–than it will to the populism of the Tea Party movement. Voters also typically become more fiscally conservative as they age, but Millennial’s tentative ability to remain socially liberal will reflect the fact they were raised in an era when previous taboos like gay rights and legal marijuana became mainstream ideas. And for whatever it’s worth, the Libertarian Party itself might make a splash in the 2016 general election, but that would represent a kneejerk reaction to today’s politics, rather than a natural outgrowth from it.
The Tea Party, its motivations, and its sub-camps remain opaque to the press and other political observers—an ironic fact, given how easily many within the movement identify with its motives and how enthusiastically they champion them. But before America gets to the prospective point where ideological libertarianism fully mainstreams in the Tea Party or any other conservative outgrowth, we are tasked with facing the reality of today’s political moment. It’s a populist moment, and in ways, a nationalist moment. But it is not, and shows no signs of being, a libertarian moment.
| 46,771
|
Great whales face new threat as Japan moves to scrap sanctuary
At next month's International Whaling Commission meeting in Grenada in the West Indies, the Japanese will formally propose scrapping the sanctuary, eight million square miles of ocean around Antarctica that is home to some 90 per cent of the world's remaining biggest whales. Britain will "vehemently" oppose the move, the Fisheries minister, Elliot Morley, said yesterday.
The Japanese have disregarded the sanctuary since it was established in 1994, continuing to hunt whales in its waters for what they call "scientific" purposes, as they have done since the current world moratorium on commercial whaling came into force in 1986.
Their attempt to scrap the sanctuary is part of the pressure Japan and the other principal whaling nation, Norway, are applying to have the moratorium lifted. To the alarm of anti-whaling campaigners worldwide, this is beginning to look as if it might succeed.
To abolish the sanctuary the Japanese will need a three- quarters majority of those countries voting at the IWC meeting, and they can already count on the support of a number of small states that have voted with them in the past after receiving substantial Japanese aid.
But they will be forcefully opposed by the anti-whaling countries led by the US, Australia, New Zealand and Britain.
"The Japanese have never liked the sanctuary and we are not surprised they want to see it abolished, but we will vehemently oppose any attempts by them to do so," Mr Morley commented.
"They have client states in the West Indies and they are also certainly twisting their arms for support, but we have powerful allies."
Mr Morley reaffirmed that Britain remains opposed to whaling in principle. And he castigated Japan for continuing its "scientific" whaling programme, under which hundreds of minke whales are hunted and killed every year, and their meat sold commercially in the name of "research".
"We oppose this and strongly criticise the Japanese for it," he said. "I wish Japan would listen to world opinion a bit more and take a more reasonable position. They have not been reasonable.
"Whaling is not a very important part of their economy and there is not that big a demand for whale meat, certainly not in any way to justify the levels of whaling that have been seen."
Environmental campaigners are equally critical. "Since the creation of the Southern Ocean sanctuary in 1994, Japan has killed some 1,600 whales there, using a legal loophole to disguise its commercial slaughter in so-called scientific whaling," said Sue Fisher of the Whales and Dolphin Conservation Society.
"We hope Britain will take a lead in opposing their attempt to abolish it, and send a minister to the meeting to show its commitment," she said.
In a countermove, Britain is backing proposals by Australia and New Zealand for a new whale sanctuary to be set up in the South Pacific, and by Brazil for one in the South Atlantic.
The current Southern Ocean sanctuary, when added to the Indian Ocean sanctuary set up in 1979, outlaws whaling permanently in one-third of the world's oceans.
The Southern Ocean is the richest feeding ground for whales, and saw killing on such a scale throughout most of this century that the population of some species was driven to the brink of extinction.
The blue whale, the world's largest animal, was reduced in numbers from 250,000 to a few hundred. The next biggest, the fin whale, which was the mainstay of the Antarctic whaling industry, was reduced from half a million to a few thousand. Only the population of the minke whale remains substantial, at an estimated three- quarters of a million.
The point of the sanctuaries is to make whaling off-limits within them even if the moratorium is eventually lifted. A compromise proposal from Ireland, which would allow commercial whaling once more in return for the whaling nations agreeing to tight regulation, will be discussed at the IWC meeting although it will not come to a vote this year.
Anti-whaling campaigners are strongly against the proposal as they say regulation can never be properly enforced.
That's some guestlist! Stunning images show huge dynastic wedding between Ultra-Orthodox Jewish families which attracted 25,000 guests
'He was always smiling': Lee Rigby named as Woolwich victim
Heathrow airport reopens runways after British Airways plane 'on fire over London' makes emergency landing
Two bailed after arrest over Woolwich attack Twitter comments
Exclusive: Woolwich killings suspect Michael Adebolajo was inspired by cleric banned from UK after urging followers to behead enemies of Islam
- 1 Pope Francis: Being an atheist is alright as long as you do good
- 2 'He was always smiling': Lee Rigby named as Woolwich victim
- 3 'Something passed underneath us, quite close': Airbus A320 has close encounter with UFO
- 4 Lord of the Sings: Sir Christopher Lee, 91, to release heavy metal album
- 5 Two bailed after arrest over Woolwich attack Twitter comments
BMF is the UK’s biggest and best loved outdoor fitness classes
Find out what The Independent's resident travel expert has to say about one of the most beautiful small cities in the world
Nook is donating eReaders to volunteers at high-need schools and participating in exclusive events throughout the campaign.
Get the latest on The Evening Standard's campaign to get London's children reading.
Win anything from gadgets to five-star holidays on our competitions and offers page.
| 26,006
|
2016 Sugarbeet Leaf Disease Observation
As one of the leading providers of seed treatments for sugarbeets in the United States, Germains’ Sales Team spends a substantial amount of time in the field so that they may keep a pulse on the crop conditions and performance of new varieties. The following 2016 Sugarbeet Leaf Disease Observation report provided by our Sugarbeet Sales & Marketing Manager, Kevin Bigger gives insight on the field conditions and outcomes for the 2016 season:
Sugarbeet Leaf Disease Observation
Sugar Beet harvest has finished for the 2016 growing year with varying results depending on the growing regions. Growing areas in the West and Rocky Mountain regions yielded record high tonnage and sugar percentage. The Red River Valley and Great Lakes area also had great yields, but sugar percentage ended up lower than historical averages. There are many differences between these growing regions and cultivation practices that may impact sugar percentages.
The conditions in the Red River Valley and Great Lakes regions were conducive for leaf disease. Varietal resistance, humidity, temperature, wet leaves and disease pressure from the previous year contributed to outbreaks this season. Fungi or bacteria are often the cause of leaf disease in sugarbeet crops. Cercospora, Ramularia, Phoma, and Alternaria are all fungal leaf diseases that cause leaf spot. Bacterial leaf spot may also occur, but the economic losses tend to be less than fungal diseases. Growers need to able to differentiate between bacterial vs. fungal leaf diseases so they may act quickly and apply the correct control methods.
Common Causes of Sugarbeet Leaf Disease
Cercospora leaf spot and other fungal diseases have a negative impact on sugar percentages. The brown infected leaves trigger the plant to produce new leaves causing the plant to burn the sugar stored in the root. Lower sugar percentages will increase production costs impacting the grower’s net return. The first line of defense against leaf disease is to sugar beet varieties that are resistant to these diseases.
Unlike the cultivation practices in the Western U.S., growers in the Red River Valley and Great Lakes region rely on natural rainfall to bring water for crops which are both a blessing and a curse. The Western U.S. has more ability to control the amount of water the crop receives, while the eastern regions can be affected by either too much or too little rainfall. Receiving too much moisture at the wrong time creates conditions that are conducive for leaf disease outbreaks.
Cultivation Practices for Controlling Sugarbeet Leaf Diseases
Due to controlled irrigation practices and ideal warm summer temperatures contributed to a great sugarbeet harvest for Western US growers. The processing cost per ton will be lower because of the higher sugar percentage year resulting in a higher beet payment. Proper management Crop such as; crop rotations of at least three years allows for the decay and destruction of infected crop and a minimum 300 ft separation of next year’s fields from infected fields can help.
More importantly, planting varieties resistant to leaf disease is probably one of the most important decisions a grower can make. Multiple varieties with different genetics should be planted to help reduce exposure for varieties that are susceptible to foliar disease. Further, a good fungicide program will lessen then destructive effects of leaf disease.
The low sugar percentages some areas experienced in 2016 will give growers the opportunity to change cultural practices to improve their crop in the 2017 growing season. Adapting cultivation practices will help sugar companies remain profitable in the future and ensure the success of their growers.
| 17,825
|
Both ophthalmologists and optometrists are trained to diagnose and treat vision problems, but ophthalmologists are also fully trained physicians. Therefore they have a broader scope of practice, according to the Digital Journal of Ophthalmology.Continue Reading
Optometrists, or ODs, must complete an undergraduate degree and then a four-year doctor of optometry program. They're trained to diagnose and treat vision problems as well as some illnesses and conditions of the eye, according to ExploreHealthCareers.org, and can also diagnose some broader health conditions, such as diabetes, through their effect on the eye.
Ophthalmologists are medical doctors or doctors of osteopathy. Like optometrists, they complete an undergraduate degree and then a four-year doctorate, notes the Digital Journal of Ophthalmology, but then go on to complete a one-year internship and three or more years' residency in their chosen subspecialty. These include ophthalmic pathology, ophthalmic plastic surgery and pediatric ophthalmology, according to the American Academy of Ophthalmology.
Some jurisdictions permit optometrists to perform minor surgeries of the eye, according to ExploreHealthCareers.org. As trained and licensed physicians, ophthalmologists perform a broad range of surgical and medical treatments. Aside from providing vision care, as the Digital Journal of Ophthalmology notes, they also diagnose general medical conditions and can treat or manage those conditions' impact on the eye.Learn more about Vision
| 39,524
|
|The Survivor Tree, Summer 2016|
The March 2010 nor'easter impacted the Northeastern part of United States resulting in at least nine deaths. Winds of up to 70 miles per hour snapped power lines and trees . Among these trees was the Callery pear tree form 9-11 site. The tree was uprooted in powerful storm. Again, the tree survived, and caretakers righted the tree, examined roots, pruned branches and secured it with cables. December 2010 it was restored to Ground Zero.
“The presence of the Survivor Tree on the Memorial Plaza will symbolize New York City’s and this nation’s resilience after the attacks,” said Mayor Bloomberg. “Like the thousands of courageous stories of survival that arose from the ashes of the World Trade Center, the story of this tree also will live on and inspire many.”
In late August 2011 hurricane Irene hit New York. Throughout its path, Irene caused widespread destruction and at least 56 deaths.
“The Memorial has weathered tropical storm Irene, and it remains as strong as the hundreds of men and women dedicated to building it,” 9/11 Memorial President Joe Daniels said in a statement. “And true to its name, the Survivor Tree is standing tall at the Memorial.”
The National September 11 Memorial and Museum was among the many New York cultural institutions that suffered severe damage from Hurricane Sandy. River surges caused serious flooding at the foundation level of the World Trade Center. Inside the visitor center and a private entrance room for victims' families, about 4 feet of water ruined the lower sections of the sheet-rock walls , In the unfinished museum, the water rose as high as 8 feet. It had taken about a week to drain the floodwaters — as high as 10 feet in some places — from the 16-acre site.
And the “Survivor Tree” continues to live up to its name and stands tall among the oak trees at the Memorial .
Aside from the Callery pear Survivor Tree, there are six other survivor of the 9/11 attack, all of which are now planted near New York City Hall and the Brooklyn Bridge.
| 8,972
|
Join Date: Dec 2002
Thanked 0 Times in 0 Posts
Rep Power: 15
The construction of wire rope is described as X by Y, where X is the number of wires in each strand, and Y is the number of strands in the rope. Three are commonly used in stainless steel standing rigging:
1 x 19 - size for size the strongest simple wire you can get, and by far the most common for standing rigging. It does not like being bent, so is not suitable for running rigging, nor for use with a thimble.
7 x 19 - less strong than 1 x 19, but much more flexible.
7 x 7 - middling in terms of strength and flexibility.
Last edited by GordMay; 08-14-2006 at 04:17 AM.
| 23,166
|
The Comprehension Worksheets for Grade 5 in the United States is meant to stimulate children’s reading skills and to help them grasp concepts. However, they do not teach children to read well. Children learn in their own ways, and if you’re going to encourage them to read, the Comprehension Worksheets for Grade 5 are not the best way to go about it.
There are a lot of great success stories about how the Comprehension Worksheets for Grade 5 has helped children from developing their vocabulary and their reading skills to growing up with strong and powerful vocabularies. However, there are also many who have written blogs or articles about how difficult it is to keep a Comprehension Worksheet up-to-date because it is so very easy to remove words and concepts. In other words, the kids simply aren’t using them for the purpose that they were designed for.
We can all remember the frustration of watching our young children staring at the TV screen with no clue as to what they had just watched. We can also recall the frustration of working on one of the Comprehension Worksheets for Grade 5 and having our fingers fly across the keyboard when we started to figure out how to change a word. The Comprehension Worksheets for Grade 5 certainly is not a magic solution to these problems.
The fact that kids will be using Comprehension Worksheets for the next few years in school is proof that it is a good way to start young children on the path to reading fluency. But just because you can create an “online” book or newspaper that kids can use doesn’t mean that they are effective. By creating an online web-based Comprehension Worksheet you’re not educating children in the best ways to read.
Comprehension Worksheets for Grade 5 are the first step in helping kids develop their reading skills. They’re the foundation that they use to build on. I want you to see how important the Comprehension Worksheets for Grade 5 is, and I want you to have a lot of patience.
It has been proven that the best way to get kids to read is through descriptive reading, the kind of reading where they describe events, emotions, or subjects. I know that when I was a kid and I was introduced to Comprehension Worksheets for Grade 5 I felt a huge sense of pride as I started to write my own story. It wasn’t until later, when I was learning to read myself, that I realized how much more slowly I read than other kids.
I think that the Comprehension Worksheets for Grade 5 can be a great tool to help children get to fluency in the classroom, but only if they are used in the proper way. I’m going to tell you exactly what I think is a wrong way to use the Comprehension Worksheets for Grade 5. If you want to jumpstart your child’s reading skills, read on!
Comprehension Worksheets for Grade 5 are so incredibly helpful that you should learn how to use them to their fullest advantage. If you want to jumpstart your child’s reading progress and encourage them to read quickly and easily, you should get creative with the Comprehension Worksheets for Grade 5 and create something that your child will really enjoy.
| 51,829
|
There is a renewed public appreciation for the role of tribal allegiances and tribal governance in the Afghanistan and Pakistan insurgencies. This is indicated by the U.S. government’s announcement of an inter-agency effort to study the insurgencies’ tribes, including a search for “reconcilable” elements . The behavior of most insurgent groups along the Afghanistan-Pakistan border is conditioned by tribal identities, allegiances and interests. Some fighters are motivated by pan-tribal or global religious sentiment. Most, however, are strongly influenced by the interests and demands of their tribe. Tribal leaders are often forthright in explaining that their decision to support or undermine the Taliban revolves around tribal interests, not through belief in the insurgency’s inherent virtue vis-à-vis the Afghan government or foreign forces . Many young men are committed to the insurgency by their elders, becoming indistinguishable in battle from other fighters who belong to the Taliban “proper” or to the Haqqani network. In theory, these tribal fighters could be separated from the insurgency by persuading tribal leaders to withdraw them.
If attempts to employ tribes against insurgents are to succeed, the emphasis must be on Pashtun tribes. Although other ethnicities participate in the insurgency, their role is in large part defined by their relationship to the Pashtun tribes that saturate the region. This is true of groups such as the Uzbek fighters, whose fortunes and strength have been heavily conditioned by the hospitality of their hosts, such as the Darikhel, Tojikhel and Yarghukhel (sub-tribes of Ahmadzai Wazir in Pakistan’s Waziristan) .
This article focuses on the intersection of tribalism and insurgency. It provides a history of the three major Pashtun confederations in Afghanistan and Pakistan; examines how the Haqqani network and global jihadists have exploited Pashtun tribalism; and identifies how tribal militias have recently been used to combat the Taliban in both Afghanistan and Pakistan.
Drifting to the Durrani
Approximately two-thirds of Afghan Pashtuns belong to the Ghilzai and Durrani confederations . The tribes of the smaller Karlanri confederation live in Afghanistan’s eastern and southeastern provinces , providing the strongest kinship bridges into Pakistan. Ghilzai and Durrani tribes, however, are numerically dominant in most of Afghanistan. As a general rule, tribal allegiances and systems of governance are stronger among the mountainous tribes of the Ghilzai and among the Karlanri, while Durrani governance rests more on cross-tribal structures of feudal land ownership .
A broad historical view of the Pashtun tribes would depict the Durrani tribes as political leaders and the Ghilzai as providing the fighters . From Afghanistan’s founding to the Taliban’s ascendancy, all of Afghanistan’s rulers have been from Durrani tribes with the exception of the ill-fated Mohammad Noor Taraki (and a brief interlude of nine months in 1929). For some, the confrontation between the Durrani’s Hamid Karzai and the Ghilzai’s Mullah Muhammad Omar is a continuation of the confederations’ traditional roles as rulers and insurgents, respectively.
Fighting between tribes and sub-tribes of the same confederation is one indication that the confederation level of analysis has never been adequate . A notable shift in the current phase of insurgency, for example, has been the groundswell of Durrani fighters beneath the Ghilzai-dominated Afghan Taliban leadership. Distinguishing cause and effect is difficult, but the increasing prominence of Durrani fighters and commanders correlates with the geographical spread of the insurgency through Durrani areas in Helmand, Nimroz, Farah and Herat provinces. Durrani are being recruited at lower-levels and their traditional leaders are becoming insurgent leaders, with varying degrees of integration into the Taliban “proper.” Some intra-insurgency tensions appear to be the result of locally-empowered Durrani Taliban commanders disliking the rotation of senior Ghilzai Taliban commanders into “their” territory . Notably, in 2008 such tensions included disagreement over tax revenue, with a specific concern for drug-derived money .
The result is that a government dominated by Tajiks and Durranis is facing off against a Ghilzai-led Taliban that has incorporated significant numbers of Durrani fighters . To the extent that the power bases of the Durrani in government depend on rural constituencies in provinces such as Helmand and Farah, they must balance official interests with maintaining tribal satisfaction in anti-government areas. Moreover, within this mix are the Karlanri tribes, providing major ethnic bridges between the Afghan and Pakistani Taliban by virtue of straddling insurgent strongholds in southeastern Afghanistan and the tribal areas of Pakistan.
The Zadran and the Haqqani Network
The Haqqani network is an excellent example of how global jihadists and Taliban fighters have been able to exploit Pashtun nationalism. Jalaluddin and Sirajuddin Haqqani are prominent members of the Pashtun Zadran tribe, and a great deal of their political capital was amassed by Jalaluddin in fighting the Soviets. Former U.S. Congressman Charlie Wilson famously called Jalaluddin “goodness personified” and he received a disproportionate share of U.S. money . The Haqqanis have also been effective in attracting Arab donations due to their tactical efficiency and assisted by Jalaluddin’s marital and linguistic connection to the Gulf states . The present strength of the Haqqani network owes much to Jalaluddin’s fighting prowess, accompanying fundraising skills and the power these skills gave Jalaluddin in the Zadran tribe.
Much of the Zadran population live in Afghanistan’s Spera (Khost), Zadran (Paktia) and Gayan (Paktika) districts, which have long histories of resisting foreign influence . The arrival of international forces in 2001 energized a struggle for control over the Zadran between the Haqqanis and Padcha Khan Zadran, a warlord with his power-base in Khost Province. The latter was hardly pro-government, but he positioned himself as anti-Taliban and utilized foreign assistance . In that sense, Padcha Khan was an old-style leader who placed tribal power and independence over external allegiances and interests . Since 2002, the Haqqanis’ reversion to jihadist-aligned resistance has leveraged Jalaluddin’s continuing fame and obtained protection from the Zadran in much of their territory. By contrast, Padcha Khan has entered the Wolesi Jirga (Afghanistan’s upper house of parliament) and his power-base has narrowed, a move supported by Hamid Karzai in an effort to neutralize his anti-government appeal . By cooperating with the Karzai government, Padcha Khan has allowed the Haqqanis and, by extension, al-Qa`ida and the Taliban to become the Zadran’s main option for resisting international and government influence.
The Haqqani network’s solid control of Miran Shah in Pakistan and most Zadran districts in Khost, Paktika and Paktia in Afghanistan gives it an effective base for operations in Afghanistan. The Haqqanis have consistently pledged their allegiance to the Taliban, but United Nations and ISAF sources agree that the Haqqanis have demonstrated greater imagination, intent and capability for complex attacks than regular Taliban commanders . While difficult to confirm, the Haqqanis have also been credited for driving the growth of suicide bombings in Afghanistan .
The Haqqanis’ continuing effectiveness draws on and reinforces their long-standing relationship with al-Qa`ida’s leaders. Historically, this was demonstrated in Usama bin Ladin’s choice of Haqqani territory for al-Qa`ida’s first significant training camps in Afghanistan . Currently, Western and Afghan intelligence officials assess that al-Qa`ida places greater trust and accompanying funding in the Haqqani network to execute complex attacks .
The Haqqanis’ reliance on Zadran territory is not a fatal vulnerability, but it does offer the possibility of constraining their operational capability. Jalaluddin’s apparent implacability and Sirajuddin’s turn toward greater radicalism make it highly unlikely that Zadran areas can be pacified through engagement with the Haqqanis. A better strategy would work from the ground up, particularly in Paktia, where leaders combine affection for Jalaluddin with an often stronger concern for the local welfare of their tribe . In the short-term, the most realistic accomplishment would be to increase the reluctance of Zadran community leaders to allow direct access to and through their villages by the Haqqani network. As in other “pro-insurgent” areas, some Zadran communities would prove willing to cooperate with the government when enjoying an ongoing security presence and constructive engagement to support self-policing and immediate reconstruction benefits.
Lashkars and Arbakees
The Afghanistan and Pakistan governments have also tried to leverage tribal networks to support their objectives. Both countries have armed and supported anti-insurgent tribes to combat the Taliban, the Haqqani network and al-Qa`ida. In FATA, this has taken the form of lashkars, tribal militias formed either within one tribe or through an alliance of several tribes following a jirga decision.
The Mamond tribes and the Salarzai tribe (a small sub tribe of the Tarkani Pashtuns who live in two valleys of Bajaur Agency) have raised their own lashkars and can be legitimately considered anti-Taliban/al-Qa`ida . The price has been high and scores of tribal elders have been assassinated since the start of the movement. For example, in November 2008 four “elders” of the Mamond tribe and several Mamond lashkar members were killed after a suicide bomber detonated at a tribesman’s house in Bajaur . Other tribes that reportedly raised lashkars are the Orakzai of Orakzai Agency in FATA . This has naturally created tensions between the Orakzai and more militant tribes such as the Mehsud in South Waziristan .
Overall, however, these efforts have not resulted in any significant losses for the Taliban. In fact, until the recent forays by the Pakistani military against the Taliban, the Taliban encountered relatively little tribal resistance as they quickly and brutally established their hold across FATA and the NWFP. The tribes in FATA are quite scattered and little unity exists, particularly against a Taliban movement recruiting from almost every tribe (excluding Shi`a Turis). This failure was most obvious in North and South Waziristan when the lashkars of 2003 and 2007 were effectively impotent . Nevertheless, the lashkars have had some positive effects in pressuring the Taliban; for example, Taliban spokesman Maulvi Omar’s August 2009 arrest was credited to the work of a lashkar in Mohmand Agency .
Another region where Pashtun tribal militias have been utilized is in southeastern Afghanistan’s Loya Paktia, the area encompassing Paktika, Khost and Paktia provinces . In this region the Afghan equivalent of lashkars exists. Apparently an institution limited to Loya Paktia , the arbakee (guardians) are the traditional tribal security of the southeast. The arbakees (like the lashkars) do not exist permanently in every district, but are an ad hoc and reactive force. The arbakee is also used by the jirga as a law enforcement tool, which makes the jirga in this region far more powerful than in southern and eastern Afghanistan where this tradition does not exist .
The capacities of Afghan military and law enforcement are minimal in Loya Paktia and they often count on the support of arbakees. The tribal elders identify those citizens who will be used to support the police to ensure effective interventions. According to the Tribal Liaison Office, a European-funded NGO, “Despite the fact that each arbakee has a clear leader (amir), accountability goes back to the tribal council (jirga or shura) that called upon the arbakee, which in turn is accountable to the community. Furthermore, arbakees only function within the territory of the tribe they represent. Their fighters are volunteers from within the community and are paid by the community. This emphasizes again that their loyalty is with their communities and not an individual leader” .
One important demonstration of the government’s reliance on arbakees was the continuous funding until at least 2007 for 40-60 arbakee members in each district in the southeast, including a sizeable expansion of force numbers to secure the 2004-2005 elections .
As Afghanistan’s and Pakistan’s insurgent conflicts drag on, the stress on tribal structures will continue, pressured by jihadists and the international community alike. Both antagonists have a long-term interest in undermining tribalism, but both also have an interest in using tribalism to support immediate military aims.
For the governments of Afghanistan and Pakistan and their international supporters, this implies a difficult trade-off. Immediate military interests in bargaining with tribes require subordination of interests in issues such as human rights and good governance. Notably, as the arbakee tradition illustrates, a resort to tribally-mediated security structures implies a continuing devolution by the central government of its core responsibilities. This may be functional in the short-term, but will likely leave unchanged the uneasy relationship between relatively progressive governments and conservative tribal traditions—an uneasiness that proved fertile ground for jihadism in the first place.
Hayder Mili is an independent researcher. He has published analytical and academic articles on terrorism, the drug trade and law enforcement responses. He holds master’s degrees in Strategic Studies and International Relations from the Sorbonne University in Paris. He is currently based in Central Asia.
Jacob Townsend is an independent analyst focused on insurgency and transnational organized crime. He has worked with the United Nations in Central Asia, South Asia and the Asia-Pacific. He is currently based in Kabul.
Bryan Bender, “US Probes Divisions within Taliban,” Boston Globe, May 24, 2009.
See, for example, Darin J. Blatt et al., ‘Tribal Engagement in Afghanistan,” Special Warfare 22:1 (2009); Jerome Starkey, “Tribal Leaders to Sabotage West’s Assault on Taliban,” Independent, December 4, 2008.
Vern Liebl, “Pushtuns, Tribalism, Leadership, Islam and Taliban: A Short View,” Small Wars and Insurgencies 18:3 (2007): pp. 492-510.
A 1996 estimate suggested that Durrani tribes comprised 29% of Afghan Pashtuns and the Ghilzai 35%. The estimate appeared in “Afghanistan: A Country Study,” Federal Research Division of the Library of Congress, 1997.
Tribes of the Karlanri confederation are demographically strong in Afghanistan’s Paktia, Paktika, Logar, Khost, Nangarhar and Kunar provinces.
The strength of tribal governance derives from economic, demographic and political circumstances. The Karlanri, for example, tend to inhabit isolated communities with small land-holdings and an overwhelming dominance of a single tribe in each village. See Thomas H. Johnson and M. Chris Mason, “No Sign until the Burst of Fire,” International Security 32:4 (2008); Thomas J. Barfield, “Weapons of the Not so Weak in Afghanistan,” in Hinterlands, Frontiers, Cities and States: Transactions and Identities, Yale University, February 23, 2007; David B. Edwards, Before Taliban (Berkeley, CA: University of California Press, 2002).
The “confederation level of analysis” refers to the notion that the conflict is mainly between Durrani and Ghilzai. As stated by the International Crisis Group, “animosities between particular Durrani tribes far exceed any ill feeling between Durrani and Ghilzai.” See International Crisis Group, “Afghanistan: The Problem of Pashtun Alienation,” August 5, 2003.
Personal interviews, ISAF intelligence officials, May 11, 2009.
In previous years, little opium tax actually made it up to the senior leadership. In 2008, there appeared to be a concerted effort to move more revenue to the higher levels. This caused tension for two reasons: 1) low-level commanders use drug tax for subsistence purposes, not to mention their own enrichment; and 2) tribal leaders–with whom the Taliban have varying degrees of integration–resented efforts to send money out of their communities (for the same reason they resist government taxation that appears to redistribute revenue out of the villages). Personal interviews, ISAF personnel, May 24, 2009. David Mansfield also refers to increasingly antagonistic relations over taxation between insurgents and the population: “it was suggested that this…was a result of many of their fighters in Helmand and Kandahar not being from the local area.” See “Sustaining the Decline?” Afghan Drugs Inter-Departmental Unit of the UK Government, May 2009.
This evolution has often been described as “neo-Taliban.”
George Crile, Charlie Wilson’s War (New York: Grove Press, 2007).
“Interview: Steve Coll,” PBS Frontline, October 3, 2006; Anand Gopal, “The Most Deadly US Foe in Afghanistan,” Christian Science Monitor, May 31, 2009.
“Haqqani Network,” Institute for the Study of War, available at www.understandingwar.org/themenode/haqqani-network.
A CIA assessment in 1980 noted Paktia as an area of strength for the insurgency, drawing on “the most traditionally minded” tribes. See CIA Directorate of Intelligence, “The Soviets and the Tribes of Southwest Asia,” CIA Declassification Release, September 23, 1980.
Michael Hirsh and Scott Johnson, “A Defiant Warlord Threatens to Sink the New Afghan Leader,” Newsweek, February 13, 2002; Michael V. Bhatia, “Paktya Province: Sources of Order and Disorder,” in Michael V. Bhatia and Mark Sedra eds., Afghanistan, Arms and Conflict (London: Routledge, 2008).
At one point, Padcha Khan was fighting Tani tribal leaders, resisting the government’s writ and attempting to undermine Haqqani’s influence over the Zadran. See Illene R. Prusher, Scott Baldauf and Edward Girardet, “Afghan Power Brokers,” Christian Science Monitor, June 10, 2002.
Personal interview, Western intelligence official, Kabul, June 16, 2009.
UN assessment of district-level control, provided in a briefing to the author in May 2009.
Personal interviews, UN and ISAF officials, Kabul, June 2009.
Gopal; Haqqani Network; Jonathon Burch, “Q+A: Afghanistan – Who are the Haqqanis?” Reuters, March 23, 2009.
Marc W. Herold, “The Failing Campaign,” Frontline 19:3 (2002).
This appears to be a generalized trust, however, instead of one requiring consultations with al-Qa`ida on targets and tactics. Personal interviews, UNAMA, ISAF and ANDS officials, Kabul, May-June 2009.
Haqqani Network; Burch; Imtiaz Ali, “The Haqqani Network and Cross-Border Terrorism in Afghanistan,” Terrorism Monitor 6:6 (2008).
Personal interviews, UNAMA officials, May 2009. While the Haqqanis receive widespread respect as warriors, this does not necessarily translate into obedience from tribal leaders who must answer directly to their communities. In the words of one village elder in Herat Province, speaking to the author on July 16, 2009, “they [Taliban leaders] have respect for being good fighters, but fighting does not always bring us bread.” In southeastern Afghanistan, Darin Blatt and colleagues suggested that “all the tribes are concerned mostly with providing for their immediate future.” See Blatt.
It should be noted, however, that individuals belonging to these same tribes have joined the Taliban.
Dawn, November 18-24, 2008.
Shaheen Buneri, “Pashtun Tribes Rise Against Taliban In Pakistan Tribal Area,” AHN, July 19, 2008.
Shazadi Beg, “The Ideological Battle: Insight from Pakistan,” Perspectives on Terrorism 2:10 (2008).
Mukhtar A. Khan “The Role of Tribal Lashkars in Winning Pakistan’s War on Terror,” Terrorism Focus 5:40 (2008).
Noor Mohmand, “TTP Mouthpiece Nabbed,” Nation, August 19, 2009.
Masood Karokhail, “Integration of Traditional Structures into the State Building Process: Lessons from the Tribal Liaison Office in Loya Paktia,” Tribal Liaison Office, 2006, available at www.tlo-afghanistan.org/fileadmin/pdf/SchAfgahnEn.pdf.
In Paktia specifically, the tribal structures were preserved and have emerged more or less intact from communist rule and years of conflict. This includes a functioning system of traditional justice.
Karokhail. This cooperation between tribal levees and Afghanistan’s “proper military” has a long tradition. Indeed, the 1929 rebellion was catalyzed by the government’s attempt to change the system and recruit the army on a national basis, cutting through the role of tribal leaders in organizing self-defense. The ANA is considered a relative success partly because it is recruited and rotated nationally, yet few Pashtuns in the ANA come from the areas in which arbakees are common.
B. Schetter et al., “Beyond Warlordism: The Local Security Architecture in Afghanistan,” Internationalie Politik und Gesellschaft 2 (2007).
| 18,736
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 2