text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
Progress on the Sustainable Development Goals: The gender snapshot 2020
The year 2020 was supposed to be momentous—in a good way. Around the globe, world leaders and women’s rights activists had planned to celebrate the anniversaries of key legal and policy innovations that have cemented women’s rights as human rights into international law, including the 25th anniversary of the Beijing Declaration and Platform for Action.
However, the COVID-19 pandemic has disrupted those plans and may reverse many of the hard-won gains of the past two decades. Women and girls are facing acute hardships, including higher rates of poverty, increased care burdens, and greater exposure to violence. Child marriage is also projected to increase.
This year’s edition of “Progress on the Sustainable Development Goals: The gender snapshot” brings together the latest available evidence on gender equality across all 17 Goals, underscoring the progress made, but also the progress interrupted as a result of COVID-19.
Order printed/published version
Languages available: English
Series: Progress on the Sustainable Development Goals: The gender snapshot
UN Women office involved in publication: UN Women Headquarters
Publication year: 2020
Number of pages: 24 | <urn:uuid:04bfd6c6-769e-41ae-a87a-47951521b092> | CC-MAIN-2021-43 | https://www.unwomen.org/en/digital-library/publications/2020/09/progress-on-the-sustainable-development-goals-the-gender-snapshot-2020 | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585178.60/warc/CC-MAIN-20211017144318-20211017174318-00101.warc.gz | en | 0.925132 | 250 | 2.671875 | 3 |
LIKELY, B.C. – Residents of a remote British Columbia community who have been surviving on donations of bottled water since a tailings dam failed and released mine waste into a nearby lake are no longer under a water ban, health officials announced Friday as they partially lifted restrictions on drinking, bathing and swimming.
As many as 300 people were affected by the water ban, which took effect on Monday when 10 million cubic metres of water and 4.5 million cubic metres of silt were released from the tailings pond at Imperial Metals’ Mount Polley gold and copper mine, about 600 kilometres northeast of Vancouver.
Dr. Trevor Corneil of Interior Health said the town of Likely, B.C., which is the closest town to the mine, and points north on the Quesnel River can use their water as they normally would. However, the ban remained in effect for residents and tourists along southern parts of the river and Quesnel Lake, along with Polley Lake and Hazeltine Creek, which are adjacent to the mine.
The water ban was partially rescinded as the provincial Environment Ministry released a second round of test results that showed water in the area was within guidelines for human consumption.
“We do feel comfortable in the context of risk for human health rescinding the order (in those areas),” said Corneil. “It meets the Canadian drinking water standards, as well as standards for potable drinking water in multiple systems.”
The Cariboo Regional District said 100 to 200 residents were still under a ban, though the precise number is difficult to count because so many tourists come and go from the area.
The second round of results were based on samples taken on Tuesday at various spots along Quesnel River.
“Analysis of these samples indicate that none of the chemical and physical parameter concentrations exceeded B.C. or Health Canada drinking water guidelines,” said a memo that was distributed with the results.
All five testing sites had zinc levels above chronic, or long-term, exposure limits for aquatic life, which an accompanying memo said could be a problem if it persists.
“Further samples will be collected to identify whether this concentration remains at this level over a longer period, which would indicate a greater potential impact to the most sensitive aquatic life,” the memo said.
One of the reasons health officials are reluctant to lift the water ban entirely is Polley Lake —which flows into a creek that drains into Quesnel Lake — is currently plugged by tailings debris. The lake’s water level is much higher than normal and officials are worried the debris could break apart and send a dangerous wave of untested water down the creek.
Imperial Metals Corp. (TSX:III) is building a pipe to manually divert the lake’s water, but Environment Minister Mary Polak said water from Polley Lake wouldn’t be allowed to enter Quesnel Lake until it meets drinking water guidelines.
At a community meeting on Thursday night in Likely, several residents objected to sending more contaminated water into Quesnel Lake.
A provincial government news release said material continued to flow out of the tailings pond Friday, though it had “decreased dramatically.”
Imperial Metals is building a temporary berm to prevent water and tailings from leaking out, but it’s not expected to be finished for weeks.
“The construction of the berm to prevent further tailings from flowing into Hazeltine Creek began last night (Thursday) and the company estimates that it will take about three weeks to complete,” said the news release.
The Environment Ministry sent Imperial Metals a pollution abatement order on Tuesday, and the ministry said the company has so far complied with reporting and planning deadlines.
There have been questions about the stability and maintenance of the tailings pond, though the company insists the dam was properly built and maintained and that there were never any problems with the dam before.
A consultant who authored an environmental report in 2011 said this week that the tailings pond water was too high when he examined it, and a former worker has also come forward to say he warned his superiors that the dam wasn’t safe.
Knight Piesold Ltd., an engineering firm that was previously the engineer of record for the tailings facility, issued a statement Friday that said when it ended its relationship with the mine, it sent the company a memo that noted “the embankments and the overall tailings impoundment are getting large and it is extremely important that they be monitored, constructed and operated properly to prevent problems in the future.”
Knight Piesold’s statement said that when it was involved with the mine, the tailings pond was “operated safely and as it was designed.”
The provincial government’s written update on Friday said the company submitted yearly dam inspection reports and that the mine had received 16 geotechnical inspections since 1995. Its most recent inspection last September did not result in any inspection orders. | <urn:uuid:c95dbbb8-5618-47ef-934d-484f69d162a3> | CC-MAIN-2014-49 | http://www.canadianbusiness.com/business-news/there-may-be-a-lucky-break-in-b-c-mount-polley-mine-spill-mines-minister/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010166.36/warc/CC-MAIN-20141125155650-00039-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.975312 | 1,042 | 2.625 | 3 |
Simulating tempering distortions
Tempered glass is generally less flat than standard float glass. Tempering process involves heating and cooling quickly the glass panes moving on rollers, and this causes small wave-like distortions on the glass. The amount of distortion depends highly on glass type and tempering process fine-tuning. On a glass facade, distortions become very visible as other objects with straight lines, such as neighbor buildings, are reflected on the facade. This is illustrated on the picture on the right. We propose here to evaluate the influence of tempering distortions depending on glass type, especially with coated glass.
The test scene
For this study, we used our classical city test scene, mixing modern medium-sized glass buildings with classical stone buildings.
We will observe reflections of the renovated old building visible on the back, on the fully glazed facade of the modern building. It is made of insulating double glazing units windows, while the floor slabs are covered with black enameled spandrel glass. The lower parts of windows, close to floors, are screen-printed with black dot gradients, on the inner side of the outer pane (side 2)
Standard float glass
At first, we try to simulate glass distortions on a standard double glazing unit, made of two float glass panes, with 15mm spacing. For this, we applied a sine wave distortion function to the glass. This wave has a 25cm period, and is oriented along z axis. The orientation of the distortion waves is slightly randomly tilted on a pane-by-pane basis, as glass pane are not perfectly aligned with conveyor rollers when introduced in the glass furnace. We assumed that all panes were mounted on the building with the up-down direction parallel to the conveyor direction during tempering. The amplitude of distortion varies randomly up to 0.2 millimeters. This corresponds to deviations of the surface orientation up to 0.28 degrees, or 17 arc minutes.
We chose to evaluate the effect of each pane independently. Results are shown on the two pictures below, on the left picture, only the outer glass pane was distorted, while the inner pane was distorted on the right picture.
- Horizontal and vertical lines are better preserved than oblique and curved lines. This is due to the orientation of the distortion waves, which are nearly horizontal. This is especially visible around the zinc-covered dome roof.
- The dome looks significantly better with the internal pane distortion than with external pane distortion. However, this is mostly due to the screen-printed gradient : as the black dots are not transparent, they hide the reflections of the back pane. The higher part of the dome, where the black dot density is near zero, looks similar on the two images.
- Internal pane distortions look only slightly better than external pane distortions in the non screen-printed areas. The importance of flatness of both panes is similar, they is no strong reason to have different tolerances on flatness.
This time, we try to observe what happens when the glazing is made of an advanced low-e coated glass. For this, we used a model of double low-e solar control glass, having a blue-green tint. The coating is located on the inner side of the external glass pane.
- Distortions of the coated outer pane are even more visible than with standard glass.
- On the other hand, distortions of the inner pane (right image) is barely noticeable. This can be explained by the low contribution of the inner pane to overall reflection, due to the higher reflection coefficient of the coated glass.
- With reflective coated glass such as this one, special care should be taken in improving the glass flatness. On some projects with strong aesthetical requirements, use of this tempered coated glass on the outer pane may have to be avoided.
This simple study shows that distortion of reflections on glazed buildings may be simulated. Using the appropriate models and tools, building engineers can find solutions to this issue in cases where aesthetic reflections are a requirement. Simulations can assist in choosing different coatings or different shading materials, but also in requiring stronger flatness requirements for the safety glass. Depending on technical feasibility by the glass processor, one could also prescribe the use of laminated glass instead of tempered glass. | <urn:uuid:caef83da-ec41-429c-acd3-cddfebce3a6f> | CC-MAIN-2019-35 | https://www.eclat-digital.com/2013/02/21/138/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315750.62/warc/CC-MAIN-20190821022901-20190821044901-00484.warc.gz | en | 0.935954 | 880 | 3.15625 | 3 |
When Barack Obama takes the oath of office Tuesday, he'll look down the National Mall and toward an echo of a historic landscape that once stood not far from his house on Chicago's South Side: The World's Columbian Exposition of 1893, called "the White City" for its spectacular ensemble of temporary, Beaux-Arts buildings.
The fair, masterminded by Chicago architect Daniel Burnham, was a milestone in the history of urban planning, as well as a reaction to the soot-covered, "Gray City" of skyscrapers that had just arisen in the Loop and drawn criticism for blotting out the sky and clogging streets with traffic.
Around a watery basin, Burnham and his fellow planners drew together large, low-slung exposition halls that shared a common height and classical vocabulary. Flanking one end of the basin was a domed administration building. Rising out of the other end was a colossal gilded statue, "The Republic," meant to symbolize national unity.
If that now-vanished tableau and its dazzling combination of architecture, water features and sculpture sounds like the portion of the National Mall between the Washington Monument and the Lincoln Memorial, it is no coincidence.
The design leaders of the 1893 fair, Burnham and New York City architect Charles McKim, served as advisers to Michigan Senator James McMillan and his Senate Park Commission. It issued the so-called McMillan Plan of 1901-02 that essentially gave us the National Mall as we know it today.
Among the plan's ideas that were carried out: Creating a primary axis down the center of the Mall from the Capitol to a traffic circle along the Potomac River, 2 1/4 miles to the west; building a memorial to Abraham Lincoln, protector of the Union, at the western end; inserting a reflecting pool between the tributes to George Washington and Lincoln; and establishing a secondary north-south axis from the White House to what would become the Jefferson Memorial.
The plan also succeeded in ridding the Mall of a Victorian train station that had been there since 1878, along with its dangerous tracks and eyesore sheds. It did not, however, achieve its aim of ruthlessly editing out all Victorian buildings from the Mall -- the castle-like Smithsonian Institution remained -- and substituting classical replacements.
Lest a Chicago critic be accused of indulging in boosterism about Burnham's influence, let me quote from the 1993 book "Buildings of the District of Columbia," by architectural historians Pamela Scott and Antoinette Lee: "The fundamental truth of Burnham's Mall is contained in the dictum often attributed to him (but which he did not originate): 'Make no little plans' ... [the] grand concept gave Washington its identifiable image as a great city."
As in Chicago's Grant Park, which he would remake with his 1909 Plan of Chicago, Burnham transformed the Mall into a landscape of order, symmetry and power. True, his design has not prevented the Mall from being the setting for an ongoing series of aesthetic battles between modernists and traditionalists over such insertions as the brilliant Vietnam Veterans Memorial and the bombastic National World World II Memorial.
Yet the overall framework of the Mall, which is sure to appear in countless television shots Tuesday, remains unshaken and immutable, firmly rooted in the landscape of Chicago. | <urn:uuid:3390177d-a0ec-4d99-aed4-8197a0c31478> | CC-MAIN-2014-52 | http://articles.chicagotribune.com/2009-01-20/entertainment/0901190415_1_national-mall-mcmillan-plan-lincoln-memorial | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775225.37/warc/CC-MAIN-20141217075255-00048-ip-10-231-17-201.ec2.internal.warc.gz | en | 0.963326 | 684 | 2.9375 | 3 |
The Large Hadron Collider (LHC) is the particle accelerator that just keeps on giving, and recent experiments at the site suggest we've got the first evidence for a mysterious subatomic quasiparticle that, until now, was only a hypothesis.
It already has a name because physicists have been on its theoretical trail for the past 40 years.
Now, they still haven't seen the elusive odderon itself, but researchers have now observed certain effects that hint the quasiparticle really is there.
That would in turn give us new information to feed into the Standard Model of particle physics, the guidebook that all the building blocks of physical matter are thought to follow.
"This doesn't break the Standard Model, but there are very opaque regions of the Standard Model, and this work shines a light on one of those opaque regions," says one of the team, particle physicist Timothy Raben from the University of Kansas.
"These ideas date back to the 70s, but even at that time it quickly became evident we weren't close technologically to being able to see the odderon, so while there are several decades of predictions, the odderon has not been seen."
The reactions studied in this case involve quarks, or electrically charged subatomic particles, and gluons, which act as exchange particles between quarks and enable them to stick together to form protons and neutrons.
In proton collisions where the protons remain intact, up until now scientists have only seen this happen when an even number of gluons are exchanged between different protons. The new research notes, for the first time, these reactions happening with an odd number of gluons.
And it's the way the protons deviate rather than break that's important for this particular area of investigation. It was this phenomena that first led to the idea of a quasiparticle called an odderon, to explain away collisions where protons survived.
"The odderon is one of the possible ways by which protons can interact without breaking, whose manifestations have never been observed .. this could be the first evidence of that," Simone Giani, spokesperson at the TOTEM experiment of which this is a part, told Ryan F. Mandelbaum at Gizmodo.
It's a pretty complex idea to wrap your head around, so the researchers have used a vehicle metaphor to explain what's going on.
"The protons interact like two big semi-trucks that are transporting cars, the kind you see on the highway," explains Raben.
"If those trucks crashed together, after the crash you'd still have the trucks, but the cars would now be outside, no longer aboard the trucks – and also new cars are produced. Energy is transformed into matter."
"Until now, most models were thinking there was a pair of gluons – always an even number… We found measurements that are incompatible with this traditional model of assuming an even number of gluons."
What all of that theoretical physics and subatomic analysis means is that we may have seen evidence of the odderon at work – with the odderon being the total contribution produced from the exchange of an odd number of gluons.
The experiments involved a team of over 100 physicists, colliding billions of proton pairs together every second in the LHC. At its peak, data was being collected at 13 teraelectronvolts (TeV), a new record.
By comparing these high energy tests with results gleaned from other tests run on less powerful hardware, the researchers could reach a new level of accuracy in their proton collision measurements, and that may have revealed the odderon.
Ultimately this kind of super-high energy experiment can feed into all kinds of areas of research, including medicine, water purification, and cosmic ray measuring.
We're still waiting for confirmation that this legendary quasiparticle has in fact been found – or at least that its effects have – and the papers are currently submitted to be published in peer reviewed journals.
But it's definitely a super-exciting time for physicists.
"We expect big results in the coming months or years," says one of the researchers, Christophe Royon from the University of Kansas. | <urn:uuid:d25054eb-8142-4f62-8165-01f8837b463a> | CC-MAIN-2023-50 | https://www.sciencealert.com/lhc-experiments-may-have-confirmed-a-theoretical-subatomic-quasiparticle | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00373.warc.gz | en | 0.963705 | 879 | 3.40625 | 3 |
Surya Global School has a theatre classroom for students to build self-confidence, boost creativity, team building, attentiveness, and much other learning. In theatre art rooms, students can enhance their skills like communication and teamwork while having fun.
Usually, these kinds of activities bring out creativity at its best and children tend to learn the best ways to use their skills. While playing they cultivate the habit of cooperation with the other students and innovative problem-solving skills. Students can improve both verbal and non-verbal methods of conveying their message.There is a saying that “Tell me and I forget; show me and I remember; involve me and I understand” and this is exactly the way theatre arts room works, which needs student’s involvement and participation. | <urn:uuid:3e2a039e-eb65-40ab-aa45-4c200df3a513> | CC-MAIN-2022-27 | https://suryaglobalschool.com/theatre-arts-room/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103334753.21/warc/CC-MAIN-20220627134424-20220627164424-00522.warc.gz | en | 0.965902 | 158 | 3 | 3 |
What does making a house “energy efficient” actually mean? We know it’s important: homes account for around a quarter of total energy consumption, and most of this is used for heating and hot water. So anything you can do to reduce usage will help your bottom line.
Efficiency programmes range from the provision of low energy light bulbs to whole-house retrofitting. As researchers in the field, the one question we are always asked is: “If I do this, how much energy will it save?” To which we give the helpful answer: “It depends”. There is lots of advice out there, after all, and the media, charities and local authorities all provide guidance. But just how much of it is based on real scientific evidence?
A common piece of advice is to turn your thermostat to 21°C to ensure an energy efficient and comfortable home. However, work by my colleagues and I found older thermostats can easily vary by up to 2°C, meaning we could actually be heating our homes to anything between 19°C and 23°C. If we consider the Energy Savings Trust’s advice that reducing home temperature by 1°C could save 10% on heating bills, then this discrepancy has implications.
Often, when a home is made more energy efficient, people simply decide to absorb the savings – in both money and heat – by keeping their houses warmer. Energy consumption may even increase. This is known as the “take back effect”, or Jevons Paradox. In the UK, this effect accounts for an average of 35% of the initial saving, although individual homes may be more extreme. This further confounds the predicted models that the improvements may have been sold on.
Perhaps the most contentious reason for efficiency improvements not performing as designed is simply down to poor design or installation. Wall insulation could be missing, windows could be poorly fitted, or the actual materials used could be different from those dictated in the original design. Research on new build homes has found this “performance gap” can make these buildings less than half as efficient as they were supposed to be.
Turning an entire house into an experiment
To investigate these gaps, paradoxes and myths, colleagues and I established the Salford Energy House. Essentially it’s an entire terraced house, built from brick to traditional British housing standards, but constructed within a climate controlled chamber. This allows us to manipulate the weather to be anything from -12ºC to +30ºC or as rainy and windy as we like.
Given we know exactly how the house was built, how it is “used” (by our researchers), and the “weather” it is exposed to, we can get a very good idea of how efficient it is. When we add curtains, better thermostats or other improvements, we can compare results with those from the original, unimproved house and try to find the difference. Our tests are extensive, detailed and give us data that would be impossible in the field – no actual homeowner would want nearly 300 sensors attached to their house.
And what did we find? We added living room thermostats and thermostatic radiator valves and established energy savings of over 40% when compared to a property with no controls. We identified that curtains reduce heat transfer through the windows by about 30% when closed. When we retrofitted the whole house with floor insulation, solid wall insulation, loft insulation and new glazing, the annual heating costs were reduced by a huge 63%.
However, if we are questioned as to how much a particular action or improvement will make to a homeowner, it still “depends”. This is because every home and family is different: some people are home all day, some people are rarely in; others, such as those who have chronic illnesses, need different internal temperatures to those who don’t.
Closing your curtains may save lots of heat, but the number and type of windows, location of radiators, and when they are opened or closed will greatly influence this saving on an individual home. Houses come in all sorts of sizes, shapes and levels of efficiency, particularly in the UK, where we are fond of our older, energy inefficient housing stock.
We can give guidance based on data, but when it comes down to an individual home there will always be confounding variables that might mean actions or improvements will not perform as expected. Even in our energy house, where we can compare one action or improvement against another to a high level of detail, we are really only able to give a miles-per-gallon perspective – much of it will depend on your car and how you drive. | <urn:uuid:0c5d8430-72ca-44a0-aa77-5c6896d531a5> | CC-MAIN-2020-24 | https://theconversation.com/weve-built-an-entire-house-in-a-lab-to-dispel-common-energy-efficiency-myths-55402 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00425.warc.gz | en | 0.96477 | 968 | 3.375 | 3 |
The Yellow River, regarded as the cradle of Chinese civilization, winds its way more than 5,000 kilometers from the Tibetan Plateau to its mouth in the Bohai Sea. SPIEGEL travelled the course of the river and discovered how quickly the country is pushing forward with its rise to superpower status -- and how ruthlessly.
Qinghai is the end of the world. The remote province between the Tibetan Plateau and the deserts in the north was long considered China's Siberia, where the rulers in Beijing sent their prisoners, both criminal and political.
The region is so remote that many labor camps have since been dismantled and moved to more accessible regions. In China's special form of socialism, even prison camps are expected to make a profit -- a tall order in forbidding Qinghai Province.
Qinghai, meaning "green sea," is named after the large salt lake in the eastern part of the province. But the term could also be used to describe the endless grasslands on which Tibetan nomads graze their herds of yak and sheep. Nowadays, most of the shepherds have traded in their saddles for moped seats.
From the provincial capital Xining, the road climbs steeply up to the roof of the world. Tibetan prayer flags flutter in the wind along the mountain passes, some more than 5,000 meters (16,400 feet) high. The Huang He, or Yellow River, China's "Mother River," has its source in this landscape of myths and mythical creatures, not far from the border with the Tibet Autonomous Region. The river is seen as a symbol of the entire nation, with its inwardly directed culture and a history stretching back thousands of years. "Whoever controls the Yellow River controls China" is a timeless maxim attributed to Yu the Great, the first emperor of the Xia Dynasty. He is believed to have lived around 2,200 B.C. -- if he existed at all.
The Yellow River is to the Chinese what the Nile is to Egyptians, the Mississippi to Americans and the Rhine to Germans. Deeply symbolic monuments, statues of mothers holding babies in their arms, stand along its banks. The ancestors of the present-day Chinese are said to have carved the first characters into turtle shells near its muddy shore. The legendary Yellow Emperor lived near the Huang He, which was viewed with such reverence that a beautiful girl was sacrificed to the river once a year.
The river winds 5,464 kilometers (3,394 miles) through the vast country. The philosopher Confucius, whose concept of an all-encompassing "harmony" has since been turned into a state policy by Beijing's communists, was born near its banks. In 1935, during their war with the then-ruling Kuomintang government, Mao Zedong and his comrades retreated to the river, in the pale-yellow loess landscape of northern China. The liberation of Mao's forces, which had been surrounded by Chinese Nationalist soldiers, has assumed its place in the central heroic mythology of the Communist Party as the "Long March."
China's generals have sometimes even used the river as a weapon. In 1938, General Chiang Kai-shek blew up the dams near the city of Zhengzhou to stop the advance of Japanese troops, causing the deaths by drowning of hundreds of thousands -- friend and foe alike.
A Land of Reinvention
Today, the Yellow River is the most important source of water for 140 million people and thousands of factories. Along its course are vast deposits of mineral resources -- coal, oil, natural gas and rare earths -- which are becoming increasingly important for China's economic boom.
A trip along the Yellow River reveals the enormous costs of China's ascent to the ranks of the most powerful nations on Earth, how ruthlessly its rulers have treated their own people and how recklessly they have been in their over-exploitation of nature. But it also shows the enormous amount of energy with which this country -- like the river -- is flowing forward. A trip along the Yellow River also makes it clear that China has confidently resumed its ancestral position after a century of humiliation at the hands of hostile powers.
The trip to the headwaters of the Yellow River passes through Madoi, a small market town on the Tibetan Plateau 4,300 meters above sea level, where the houses are freshly whitewashed and a new police headquarters building is under construction. The Tibetan nomads from the surrounding region come to Madoi to buy grain, medicine and other essential items.
Migrant workers from other parts of China have also made their way to the region, where the thin air makes breathing difficult and too much physical exertion causes headaches. They include people like Li Bing, 23, from Anhui province in eastern China. For the last five years, he has sewn and sold temple decorations and prayer flags in his tiny shop. There is a simple reason, he says, for the fact that he, a Chinese non-believer, sells Tibetan devotional objects: "The Tibetans don't quite get the professional side of it, with the ordering and logistics," he says.
Li has now brought his wife to Madoi and invested the equivalent of about €20,000 ($25,000) in the business. The couple lives in an alcove above the shop, where Li also keeps the sewing machine he uses to make prayer flags. "Life is cheap here," they say. "We won't return to Anhui until we've saved a million yuan." That would be about €120,000, or enough to make Li and Yu wealthy people in China. It's quite possible that they will achieve their goal. An Eternal but Changing Landscape
Many rivulets stream down from the Bayan Har Mountains in the northeastern corner of the Tibetan Plateau, flow together and then pass through two mountain lakes, Gyaring Lake and Ngoring Lake. On a hill above the lakes, the Communist Party has erected a monument to the river that looks like the stylized horns of a yak. The inscription on a copper plaque describes the importance of the river for China's identity: "The Yellow River is the cradle of the Chinese people. The Yellow River region is the birthplace of the magnificent, ancient Chinese culture. The spirit of the Yellow River is the spirit of the Chinese people."
But even here, in this remote place high in the mountains, the world is no longer what it used to be. "It used to be much colder than it is today," says a national park ranger guarding the road leading to the two lakes. "Sometimes the snow was so high that I couldn't open my door in the morning," he says. "Today, it only reaches my ankles." The unpaved road to the banks of the lakes is currently being repaired because melting permafrost has caused the road's surface to sink.
But the belching smokestacks and car exhaust fumes 4,000 meters below, in the country's interior, are not the only thing to blame for these environmental changes. The Tibetan herdsmen also play a role in the destruction of their region. Owing to strong demand for costly cashmere wool, in recent years, the nomads have been driving bigger and bigger herds across the grasslands. The cashmere goats are particularly aggressive grazers, tearing out stalks of grass with their roots, which causes the ground to become more sandy.
Now fences block access to the nomads' traditional grazing grounds. The government is resettling the herdsmen in other areas, which is creating bad blood with the Tibetans.
The Gesawang Monastery, at the entrance to Madoi, consists of a few stone houses and several nomad tents. It is the religious center of the Yellow River headwaters region. An old monk leads visitors into the main building and tells his story. The Chinese imprisoned him from 1961 to 1980, he says.
Four photos of the Dalai Lama are displayed in the prayer room, one behind an empty bottle of Tuo liquor with artificial red flowers in it. The old man has even set up a symbolic chair for the Dalai Lama, which he has also decorated with a photo.
Displaying photos of the Dalai Lama is strictly forbidden in the Tibet Autonomous Region. But, in neighboring Qinghai, the government rules with a somewhat looser grip, and pictures of the Tibetan monk -- berated by the Chinese government as a "divider" and "traitor" -- can still be displayed. The Dalai Lama, in exile in India since 1959, is also a son of the Yellow River. He was born almost 77 years ago, in the village of Taktser, in Qinghai. Shedding Light on Old Secrets
Lanzhou, the capital of Gansu Province, is about 200 kilometers away. Since the 1950s, the city has grown to become an important center for the oil and chemical industries, and it now has a population of 3.5 million. For a long time, environmental protection was not even a concept here. The city's factories and all of its households simply dumped their sewage and wastewater into the Yellow River. Sewage-treatment plants are only now being built for residential areas.
A cable car takes visitors across the river to the White Pagoda. For his conversation with SPIEGEL, the writer Yang Xianhui, 66, has chosen a nearby teahouse, and not just because of the nice view of the city and the oldest railway bridge across the Yellow River, which German engineers built in the early part of the last century. Yang also feels that he won't be bothered at the teahouse. He has made it his mission to shed light on China's dark past.
Yang wants to document the atrocities of a part of Chinese history that the Communist Party would prefer to keep under wraps even today: Mao's "Great Leap Forward" at the end of the 1950s. At the time, China's leader tried to radically industrialize the country, aiming to catch up economically with the likes of Great Britain "within 15 years." The Communist Party ordered farmers to build small blast furnaces in their fields and make steel. At the same time, it required them to produce more and more grain for the cities. The Great Leap Forward ended in a catastrophe, with up to 45 million Chinese dying of starvation.
Encouraged by Deng Xiaoping, who would later become an economic reformer, the party sent about half a million alleged "right-wing deviants" to re-education camps. The camp inmates, often educated city dwellers, were accused of questioning the policies of the Communist Party. Many did not survive the ordeal.
One of the camps was in the town of Jiabiangou in the Gobi Desert. Yang, the author, tracked down survivors of the camp and published their stories in a small Shanghai literary magazine, whose editors ignored the bans imposed by censors. On this morning, Yang has brought along Chen Zonghai, a spry, 79-year-old former teacher. Of the Jiabiangou labor camp's roughly 3,000 inmates, he was one of only a few to survive.
Chen is bald and wears large glasses. It was his bad luck to have been "too quiet" in the self-criticism meetings that were customary at the time. The party used these meetings to examine the class consciousness of its subjects, and party officials accused Chen of not having denounced anyone. As a result, he was loaded onto a truck on the banks of the Yellow River and taken to Jiabiangou together with other "right-wing deviants."
The insidious thing about this form of detention was that it was not limited by time. "We were expected to work hard, day and night, and to re-educate ourselves," Chen recalls. But the camps developed into death camps, as the already scant food rations became smaller and smaller until there was no food at all. The guards looked on as the prisoners starved to death, one after another.
Chen pulls a blade of grass out of the ground. "This is edible," he says. "I used to dream of sumptuous meals back then. It was the winter of 1959, and more and more of my fellow prisoners were dying." The horrific episode finally ended in 1961, when the authorities released the few remaining survivors.
From Death Camp to Blossoming Oasis The old death camp is near Jiayuguan, an hour's flight from Lanzhou. In this world, the past and the future live side by side near the crumbling Great Wall, built to protect the Chinese from nomadic horsemen. The city is also home to China's nuclear engineers, who work at a laboratory in the desert about 100 kilometers away. Every morning, at 7:40, a train takes engineers and workers to the secret nuclear center. At about 6 p.m., it brings them back to Jiayuguan.
Somewhere along a road that leads from the city to one of China's four space stations is a bumpy dirt road -- the path to the former Jiabiangou hunger camp.
At first glance, there is nothing to remind the visitor of the horrors of the Great Leap Forward. Today, Jiabiangou is a blossoming oasis on which corn, melons and chili peppers are grown. A sign at the entrance warns: "He who does not work properly today can look for a new job tomorrow." Quotations from the speeches of party leaders Mao Zedong, Deng Xiaoping, Jiang Zemin and Hu Jintao are written in chalk next to the sign.
Not a single sign or even memorial stone offers a hint of what happened here. Medical students from Lanzhou collected all the corpses in 1960, and the skeletons were distributed to universities to be used as instructional material.
Mr. Chen, who is not related to the former teacher, runs the government farm.
He doesn't feel comfortable about having to open a dark chapter in China's history to foreign visitors. But since he holds Yang, the author, in high regard, he shows us the graves the prisoners dug and the trees they planted. "More than 1,000 people formed a chain here to transport stones," he says.
Then Chen mentions the "necessary sacrifices" that a country like China has to make in order to enable progress. He also finds a comparison that helps him clear his conscience. The construction of the Great Wall also claimed many lives, he says, "but it united the country."
In the teahouse in Lanzhou, the old teacher gazes across the Yellow River and a sea of buildings. "I don't believe in anything anymore," he says. Although the tea garden is large and almost empty, three men sit down at the next table and listen attentively. Author Yang speaks demonstratively and with a loud voice as he tells the story of Jiabiangou. "These young Stasi guys should hear what happened back then," he says, referring to the dreaded secret police of the former East Germany. An Underground Inferno
The Chinese have yet another name for the great river. They call it "China's Sorrow," because of all the tragedies that have unfolded on its banks. Another 600 kilometers downstream from Lanzhou, China's troubled river seems to flow directly into hell.
There, on the path to Wuda, in Inner Mongolia, the Yellow River winds sluggishly past oases, through steppes and deserts and into a gray, moonlike landscape of dust and debris. There is not a blade of grass growing or an insect crawling here; even the birds have disappeared. The earth is boiling-hot beneath the surface -- so hot, in fact, that it can melt the soles of people's shoes if they stand still for too long. Sometimes the ground opens up and pulls people down into its fiery depths.
An environmental inferno covers an area of several square kilometers. Underground coal deposits have been burning here for more than 50 years. The fire ignited itself, and it keeps flaring up when oxygen enters abandoned mine shafts.
It is difficult to breathe the highly polluted air, and the rain is acidic. Many millions of tons of coal have already been burned at the site, where firefighters are slowly gaining control over the fire with the help of German experts. They are isolating sources of the fire with underground walls and shifting large volumes of earth in an effort to deprive the flames of oxygen.
An Industrial Giant in a Desert
On the edge of the Wuda inferno, workers have just paved a new road with concrete, as if to prove that nature will not get the better of them. New coalmines have already sprung up on the other side of the road, only a few meters from the existing coal fires. "It isn't dangerous here anymore," says Chen Zengfu, manager of the Second Huaying coalmine. "We go down to depths of up to 700 meters (2,300 feet)."
In the 1960s, Mao moved parts of his heavy and arms industry to this wasteland, hoping to protect it from a Soviet attack. The project was called "Third Line." Later on, farmers came to the area -- not always voluntarily -- to cultivate the desert along the Yellow River.
The smoke from these fossils of industry darkens the sky, while heavy trucks wheeze along potholed roads. Prostitutes wait for truckdrivers in bleak, tile-covered buildings. The Zhurong steel mill smolders on the bank of the Yellow River. A few hundred meters down the road, on a square in a village called Red Star, Second Unit, residents are preserving cabbage for the winter. "We can't breathe," they say. "We all have lung problems."
The mill pays the village 80,000 yuan (about €10,000) a year as compensation for the poor air quality. The farmers use the money to buy water from the Yellow River to irrigate their fields.
Modern industrial zones built in recent years, which are even more gigantic than those from the Mao era, line the horizon. Flights landing at the airport in the city of Wuhai pass over countless factories, smokestacks and cooling towers set against the backdrop of the Yellow River glittering in the afternoon sun.
Six-, eight- and 10-lane roads cut through the sand dunes. This is where China casts the concrete for prefabricated buildings in Beijing and Shanghai, molds the plastic for radios and TV sets, and hardens the steel for skyscrapers, bridges, cars and high-speed trains.
The city administration has just built a giant government building, two futuristic-looking stadiums, a university and an opulent party academy. Now it wants to tear down some recently finished apartment buildings because newer, more ambitious plans have replaced the older ones.
On the highest peak of the nearby mountains, workers have begun chiseling a bust of the legendary Mongol ruler Genghis Khan into the rock, just as the Americans did with several of their presidents in the Black Hills of South Dakota. The great conqueror will gaze out across the Yellow River and into the vast regions beyond. China 's Dubai
Party officials in Wuhai are not alone. Their counterparts all along the Yellow River dream of elevating their cities into the ranks of important international metropolises.
Hardly anyone has bigger plans than the party leaders in Ordos, about 80 kilometers south of the Yellow River in Inner Mongolia. Ordos is viewed as China's Dubai. Experts estimate that government-run and privately owned mines have generated more than $35 billion in revenues since 2010. At times, economic growth in the region has been twice as high as in the rest of the country.
And this trend is expected to continue. Engineers have discovered one-sixth of China's coal reserves and a third of its natural gas reserves in Ordos. Each of the city's 1.5 million residents already generates about $20,000 a year in revenue, more than in any other part of China.
The party has built a brand-new district near Ordos, complete with an army headquarters and a university for 8,000 students. The new district, called Kangbashi, is expected to house up to 300,000 people one day, although only a few thousand have moved there so far. Kangbashi is still a ghost town -- and a monument to megalomania on the steppes.
The Coal Barons
A few kilometers south of Kangbashi lies the main source of the region's wealth: coal. The area is dotted with blue-and-white shaft towers and silos. On video screens in a control tower, engineers monitor what happens underground in the state-of-the-art mine.
A narrow inlet in the Yellow River separates modern industrial China from its ugly underbelly. On the other side, private companies have dug tunnels into the ground. Fully loaded trucks struggle out of the gates of these unsafe miniature mines. The trucks are so old and rundown that every trip underground could be their last.
The miners who work at this mine live on a hill above it, in huts with iron stoves in the middle. The stench of communal toilets hangs in the air. The workers pay no rent, but there is only a small cafeteria for the entire settlement.
The owners of mines like these are partly responsible for the construction boom in China's cities. Yellow River coal barons, for example, have bought up entire neighborhoods of new buildings in the capital, Beijing. They usually pay in cash and leave the apartments empty, betting that prices will continue to rise. Barely Getting By Traveling along the lower course of the Yellow River is like being tossed back and forth between the past and the future in a broken time machine. Behind the dikes, there are villages that haven't changed in centuries and towns with Mao-era street names like "Iron and Steel." These places have no village squares, no bars and no cemeteries. The farmers bury the dead in their fields.
Ten years ago, the river became silted up for almost two-thirds of the year east of the provincial capital Jinan, but now the water glistens in the sun once again. The government regulates how much water the individual provinces can extract from the river, and industrial companies are now required to build modern irrigation canals for the region's farmers so that less water evaporates.
Three workers are shoveling away in front of a pumping station. The farmers behind the dike need water from the Yellow River for their corn and cotton fields. They have set off a small fireworks display in front of the dike to drive away the river's evil spirits.
Nearby, migrant workers making little more than €10 a day are stacking stones with their bare hands to reinforce the dike in case the river floods. Stone blocks are neatly stacked everywhere along the lower course of the Yellow River.
"The water is now drinkable," says Wei, a tofu vendor who drives his motorcycle through all of the riverside villages every morning. Fish are swimming in the river again, and the residents are killing and then collecting them by dipping electric cables in the water.
It's market day in a village called "Forge Square," where vendors are selling fruit, vegetables, cheap electronics and clothing. Old Mao caps can be had for the equivalent of €0.57, while other vendors sell traditional enamel bowls with garish floral patterns. "We are doing neither well nor poorly," says one farmer. "We have a few thousand yuan left over at the end of the year."
Duan, a 71-year-old knife-sharpener, sits by the side of the road in a blue jacket. "I make 500 to 600 yuan (€62 to €74) a month," he says. He needs the money because he doesn't want to be a burden on his children. "We farmers receive no pension in China," he says.
The party has lifted one major burden from the shoulders of Duan and his family: He no longer has to pay all of his medical bills himself. Like Duan, all 700 million of China's rural residents are now able to purchase health insurance.
Duan says that the insurance costs him the equivalent of €6 a year. In return, he gets 40 to 70 percent of his medical bills paid, whether he is treated as an outpatient or in a hospital. "I've already had the photo taken for the certificate," he proudly says.
The River's End One hundred kilometers farther east, the Yellow River finally flows into the Bohai Sea, where a giant oil field was discovered about 50 years ago. The field is called "Victory," and today it is dotted with the burning flares of refineries and oil pumps swinging up and down like pendulums.
The government has established a nature reserve at the mouth of the Yellow River. There is also a futuristic-looking tourist center and pleasure boats offering tours into the bay, to the site where the brown water of the river meets the blue waters of the ocean. The skipper has to pay close attention to the depth sounder because, after running its course of more than 5,000 kilometers, the river is now less than half a meter deep.
The boat, the Dragon's Gate 688, has now gotten stuck in the mud with day-trippers on board. Another boat cautiously approaches the vessel to stir up the silt so that the boat will have enough water under its keel again. The maneuver succeeds after about an hour, and both ships chug off into the blood-red evening sun.
A little farther upstream, in the provincial capital Jinan, residents are flying kites between government buildings in the evening sky. Small light bulbs attached to the kites make them twinkle like stars.
Kites have been flown here for centuries. But today's China is no longer content with such traditional amusements.
In one corner of the square, loud music is screeching from a boom box. A group of dancers put on shoes with metal attachments. Then the residents of this city by the Yellow River tap-dance to the strains of Irish folk music. Translated from the German by Christopher Sultan | <urn:uuid:d8244044-6408-403d-88eb-2ee0e8cba913> | CC-MAIN-2017-04 | http://abcnews.go.com/International/china-meet-yellow-river/story?id=16468814&page=8 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00229-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.97012 | 5,392 | 3.4375 | 3 |
Guidelines are designed to support the decision-making processes in patient care . The content of a guideline is based on a systematic review of clinical evidence – the main source for evidence-based care.
Purposes of guidelines
- To describe appropriate care based on the best available scientific evidence and broad consensus;
- To reduce inappropriate variation in practice;
- To provide a more rational basis for referral;
- To provide a focus for continuing education;
- To promote efficient use of resources;
- To Act as focus for quality control, including audit;
- To highlight shortcomings of existing literature and suggest appropriate future research. | <urn:uuid:e4c35e6a-e127-4783-b555-4794e74fdf69> | CC-MAIN-2018-05 | https://ecebm.com/2012/01/09/cpg/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891539.71/warc/CC-MAIN-20180122193259-20180122213259-00387.warc.gz | en | 0.906771 | 127 | 2.828125 | 3 |
Is Your Student (or child) Reading or Word Calling?
by Bill Lauritzen
eading implies understanding.
Many students in our schools today do not read. They simply have
learned to say the sounds of the words without really understanding
the meanings of the words.
Part of the problem may be in the method of teaching called phonics
(sounds). Phonics has been battling for decades with
the whole word and whole language method.
Whats the difference between them? In phonics, the student
learns how to say the sound of th. In the whole word
method, the student learns the whole word thunder
along with its meaning. In the whole language method, the student
is immersed in literature about storms with the hope that he
will absorb some things about thunder.
The advantage of phonics is that by putting sounds together the
student can sound out new words. He knows th
and he knows ink so he reads think. He
is able to read many words that he has heard and understood,
but never seen. And in this age of radio and TV there are
plenty of words like that.
The disadvantage of phonics is that the student also can sound
out words that he has never heard, and doesnt understood.
For example, he sees th, e, ro,
and pod, and bravely reads theropod,
catches his breath, and continues on. The teacher, if not extremely
astute, never bothers to check if he understands what therapod
represents. (A type of dinosaur that stood on its hind legs.)
Soon, you can get a situation in which the whole class is boldly
calling out words, thinking they are reading. The principal of
the school sticks his head in the classroom, and everyone looks
like they are reading and so gives the teacher a good rating.
The superintendent stops by the school and everyone looks like
they are reading, and so he gives the school a good report, and
so on up to the governor, etc., etc. Teachers make this situation
worse when, during the reading-aloud time, they give the correct
pronunciation of a new word without concurrently giving the meaning.
This word calling situation might be termed phonics
So the colleges administer special tests of comprehension called
SATs (Scholastic Aptitude Tests), to see if students really comprehend
what they read, etc. So the parents pay special tutors to help
their kids memorize the type of words and questions on the SATs.
So the colleges revise the SATs to prevent this, etc., etc.
The solution is not to stop teaching phonics. The solution is
to teach phonics (sounds), but also semantics (meanings). Teach
how to link the word to what it stands for.
The solution also is for teachers and students and parents and
superintendents and governors and presidents to be honest. If
they dont know something they should say so. Not try to
put up a false front.
Many people are afraid of losing their jobs or reputations, so
they wont do this. It takes a great deal of courage. However,
if they had the courage to do this, they would be able to look
at themselves in the mirror. One may have to do what I did and
spend some time reviewing his or her education. They could eventually
get their jobs back, this time on a solid footing.
Dont live a life in fear of being found out. By simply
admitting our ignorance, we can open the door to real learning,
real knowledge, and real competence. We can set an example for
our children and our students.
Dont tolerate word calling. It is a poor substitute for
real reading and real understanding. Teach phonics, gently immerse
the kids in literature (dont drown them), and dont
forget to teach semantics. Raise literacy.
Part 2 of a series
on raising literacy by William Lauritzen. He holds a masters degree in
Industrial Psychology/Ergonomics and has studied education for
over 15 years. | <urn:uuid:347a4a35-46ee-4340-8fb3-4be48820d42b> | CC-MAIN-2017-13 | http://www.earth360.com/ed-wordcall.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188924.7/warc/CC-MAIN-20170322212948-00282-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.95176 | 871 | 3.65625 | 4 |
Call or Text 1-833-202-5227
M-F 9:00am - 6:00pm ET
Call or Text
3D printing your food may sound like an old-school sci-fi technique, but with new technology it doesn’t seem so far out. While food 3D printers may not yet have the capabilities of a Star Trek food replicator, they can print some unique and ornamental additions to your cooking and baking. While 3D printed food has ranged from pizza to chocolates, the most commonly seen printed foods are based out of sugar. With highly detailed designs that can be customized, these function well as ornamental decorations as well as unique gifts.
One model carried by Project 3D Printers is the Wiiboox Sweetin Food 3D printer, which has printing compatibility with ingredients such as dark and white chocolate, candy, and jam. It features a food-grade extruder head that can be removed for cleaning and changing of materials. Although many food prints are kept at room temperature, these printheads can heat up to 37 °C for certain foods.
Whether or not the practicality of current food printing technology is up to the food industry standard, it shows the remarkable ability of additive manufacturing to find a home everywhere. Although current food printers may seem limited, just try imagining what foods could be built from the ground up through extrusion; 3D printed meatloaf, anyone?
Leave a comment | <urn:uuid:e6d9833b-6c68-4ab8-b937-8c4d101e7fc1> | CC-MAIN-2023-14 | https://project3dprinters.com/blogs/blog/food-printing-explore-with-project-3d-printers | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00067.warc.gz | en | 0.951537 | 300 | 2.5625 | 3 |
What does it mean for us to say something is wrong but never act on our convictions? A quote from Elie Wiesel challenges people visiting the Civil Rights Museum in Montgomery, Alabama: “We must take sides. Neutrality helps the oppressor, never the victim.”
Elie Wiesel is right; we must take sides. I have seen how nonalignment is in reality vote for the oppressor and exacerbates or prolongs the victim’s suffering. But what side do we choose? Our world has successfully confused us into thinking it’s better to stay neutral on most matters since the issues are all tangled up into a knot of wickedness. Neutrality helps us to avoid misperceptions such as being considered against the Second Amendment just for being in favor of Red Flag laws, or being thought of as “soft on crime” because one is against the death penalty. Neutrality keeps our reputation clean.
While perhaps cleaner, neutrality is not, in my view, an option for Christians. The issues are too important to keep our distance. We must be willing to plunge into the confusion and navigate it with courage. Taking sides is in essence standing up for what we believe is right and just.
Taking sides requires risk—especially when family and friends have planted themselves on the other side of the issue. After my talks about putting our convictions into action, people tell me they are most concerned about creating rifts within their own families and communities. They are right to be worried; Jesus says to his disciples, “No one who puts a hand to the plow and looks back is fit for the kingdom of God” (Luke 9:62). Taking a side may mean releasing our grip on some relationships.
Jesus’ metaphor is a good one. Tilling the land requires intent and focus on the earth ahead. If the person plowing keeps looking back, their work will be haphazard at best and likely damaging. It is the same with our participation in God’s work on earth. We must be steady and keep our eyes on the path forward. Continuous looking back will cause us to lose our way and effectiveness.
So, I ask, where are the Jesus followers? Where are those spending their lives loving God and neighbor with everything they’ve got? Should not our voices be louder, our witness stronger, and our love more powerful?
As Dr. Martin Luther King Jr. said, “Darkness cannot drive out darkness; only light can do that. Hate cannot drive out hate; only love can do that.” Where are we, the Church, shining our light? In a nation slowly disintegrating into poverty, discriminatory educational systems, inadequate healthcare, mass incarceration, rising suicide rates, endless wars, forced migration, and climate change, where is our light?
Taking sides requires us to be resolute in our thinking, direct in our actions, and peaceful in our spirit. We may have to sacrifice valued relationships along the way, but our family loyalty belongs to the family of God. Jesus sought justice. We must choose to be on his side, rejecting the oppression that neutrality sustains. | <urn:uuid:ca3f4800-398e-4867-a7a4-2357aab3040d> | CC-MAIN-2020-10 | https://mennonitewomenusa.org/2019/11/ponder-we-must-take-sides/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00016.warc.gz | en | 0.958206 | 646 | 2.609375 | 3 |
You are here
Traumatic Brain Injury (TBI)
Definition: A child with a Traumatic Brain Injury (TBI) is a child with an acquired injury to the brain caused by an external physical force resulting in total or partial functional disability or psychosocial impairment, or both, which impairment adversely affects the child’s ability to receive reasonable educational benefit from general education. A qualifying Traumatic Brain Injury is an open or closed head injury resulting in impairments in one or more areas, such as cognition; language; memory; attention; reasoning; abstract thinking; judgment; problem-solving; sensory, perceptual, and motor abilities; psychosocial behavior; physical functions; information processing; and speech. The term “traumatic brain injury” under this rule does not apply to brain injuries that are congenital or degenerative, or to brain injuries induced by birth trauma.
The Colorado framework for understanding the brain, how to assess brain processes, and what strategies to use with students for learning and behavior.
BrainSTEPS consulting teams support school teams in the development and implementation of educational plans following acquired brain injury.
- Professional Development
- Online Learning
- CDE Webpages
Join the Brain Injury Listserv
To subscribe to the brain injury listserv:
- Open a new email.
- In the “To” field, type the email address TBIfirstname.lastname@example.org and send the message.
- You will receive a confirmation email. You will not be added until you respond to this email.
- If you have a problem, try using “plain” text or check with the technology people in your district.
To unsubscribe from the Brain Injury listserv:
- Open a new email.
- In the “To” field, type the email address email@example.com and send the message.
- In the body of the message write, “unsubscribe TBI.”
- You will automatically be unsubscribed.
For more information, please contact:
Email Heather Hotchkiss
Find what you were looking for?
If you have problems with broken links or accessing the content on this page, please contact our web content coordinator Amanda Timmerman at Timmerman_A@cde.state.co.us. Please copy the URL link for this page into the email when referencing the problem you are experiencing. | <urn:uuid:61bcc85e-aa38-450b-ba51-180c7b1963f3> | CC-MAIN-2019-43 | http://www.cde.state.co.us/cdesped/sd-tbi | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986700435.69/warc/CC-MAIN-20191019214624-20191020002124-00252.warc.gz | en | 0.870444 | 512 | 3.203125 | 3 |
But, our world renowned Greenbelt is at risk. Today, the Ontario Greenbelt Alliance and Environmental Defence jointly released a new study, Ontario’s Greenbelt at Risk, which outlines four key threats to the Greenbelt:
1. Proposals for infrastructure, such as new mega-highways that would pave over prime farmland, contribute to poorer air quality, and generate more greenhouse gases;
2. Sprawl developments in the Greenbelt that would destroy farmland, forest and wetlands and the animals that live there;
3. An unnecessary airport in the Greenbelt that would eliminate 7,530 hectares of prime farmland and forests, isolate Rouge Park from the Oak Ridges Moraine, spark development along the boundary of the Rouge Park and contribute to climate change;
4. Dumping contaminated soil, which puts water and food sources at risk
The good news is that actions can be taken to reduce each of these threats.
Every 10 years the provincial plans – the Greenbelt Plan, the Oak Ridges Moraine Conservation Plan and the Niagara Escarpment Plan – are reviewed by the province to ensure they’re effective at protecting agricultural lands and nature while maintaining clean water resources and stopping inappropriate sprawl development. And the next review is right around the corner in 2015.
The Greenbelt has been effective at limiting sprawl to protect our farmland and natural spaces, but loopholes in the Greenbelt plan are putting the Greenbelt at risk. The 2015 review is a chance to address these loopholes and strengthen the Greenbelt Plan.
For example, policies currently allow infrastructure like new highways on Greenbelt lands – lands which are supposed to be permanently protected. And, there are plans for at least two mega-highways, the GTA West and Mid-Peninsula, both of which would cut a swath through the Greenbelt. These proposed highways would cost taxpayers $16 billion ($4 billion for the GTA West), destroy thousands of hectares of prime farmland, wildlife habitat, facilitate sprawl and damage water resources.
Instead of paving farmland to build mega-highways that would cause more traffic jams and increase greenhouse gas emissions, the province should invest that same $16 billion in regional rapid transit. That would get more people to their homes and jobs. And it would get people out of their cars, which improves quality of life and reduces congestion, climate change and smog. Not only would strengthening the policies remove the threats to the Greenbelt, it would be consistent with permanently protecting productive farmland and nature.
By identifying these threats, we’re providing the province with an opportunity to strengthen the plans, to make them better, for Ontarians today and for future generations. The 2015 review is the time to build a better Greenbelt, where the policy gaps, problems with plan implementation, and broad issues that impact the protected area can be addressed.
As the 2015 review gets under way, we’ll be sure to let you know other ways to make your voice heard and stand up for Ontario’s Greenbelt. | <urn:uuid:8e288bfe-e030-45de-94ce-0d4cfecadfd1> | CC-MAIN-2020-16 | http://greenbeltalliance.ca/blog/ontario%E2%80%99s-greenbelt-under-threat | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371656216.67/warc/CC-MAIN-20200406164846-20200406195346-00156.warc.gz | en | 0.936815 | 612 | 2.78125 | 3 |
Mar. 5, 2013
By the United Soybean Board
Preserving soil moisture can be hard, but Rob Myers, adjunct associate professor of plant sciences at the University of Missouri, shared these five management techniques that could help alleviate the effects of drought conditions.
Consider cool-season crops.
Adding winter wheat or other cool-seasons to rotations breaks up disease and insect cycles as well as boosts soybean yields. Also, since cool-season crops are planted in the fall, when moisture is more plentiful, and harvested in June before the worst of a drought typically takes place, they avoid the late summer when drought conditions typically peak.
Think yield stability.
Rather than concentrating solely on a single high yielding soybean variety, even one marketed as drought resistant, farmers should consider planting beans from multiple maturity groups that yield well in a variety of environments
Stagger planting dates.
Planting crops early will avoid the late summer when soil is usually driest during a drought. On the flip side, having a portion of the soybean acreage planted a little later was helpful last year for areas that got late rain from Hurricane Isaac, allowing those soybeans to get some additional growth and yield better than the beans that matured earlier. Diversifying planting dates is always a good strategy to deal with unpredictable weather.
Give your soil a blanket.
Practicing no-till leaves a blanket of leaf and stalk residue on top of the soil, keeping it cool and locking in moisture. Tilling itself removes moisture from soil, which is especially bad during a drought year.
Combining cover crops and manure can increase soil’s organic matter, which can help soil retain moisture. A no-till system also helps increase the organic matter content in soil.
For additional information from the United Soybean Board, visit http://www.unitedsoybean.org/.
Link to Southeast Farm Press Article | <urn:uuid:5731816c-82ab-417a-bcd5-76cba53c7fa3> | CC-MAIN-2017-04 | http://www.privatelandownernetwork.org/article/Tips-Help-Lock-in-Soil-Moisture-Protect-soybeans-from-dry-weather/844 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00534-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.939829 | 388 | 3.171875 | 3 |
IDOLATRY-19/Who exactly rested on the Sabbath?
Before we end our study of Genesis Chapter One, let’s ask:
Who, exactly, rested on the Sabbath?
1: The Torah’s Text
"And ELoKiM said let the Earth bring forth creatures, Cattle, creeping things, And ELoKiM made the animals…cattle…and everything creeping And ELoKiM saw that is was good, And ELoKiM created Adam in His Image And ELoKiM blessed them saying be fruitful and multiply And ELoKiM said let us make Adam in our form and our image And EloKiM said behold, I have given you all the grass And ELoHiM saw everything that He had done and behold, it was Very Good, And it was evening, and it was morning, Y om (Day) H ashish (Sixth) .....................Sabbath................... V ayechulu (ended) H ashamayim (Heavens ) and the Earth, and ELKM finished all the work He had done and He ceased on the Seventh Day from all His work and ELKM blessed the Seventh Day and He sanctified it for in it He has ceased all the work that He had done...
2: The Seven Steps of the Sabbath
The verse describes the Sabbath in seven steps:
“And ELoKiM saw everything He had made and behold, it was very good.
And there was evening, and there was morning,
The Sixth Day (was over.)
(1) “And the Heavens and the Earth ended and all their hosts
(2) And ELoKiM finished on the Seventh Day all His work which He had done
(3) And He ceased from all His work that He had done
(4) And ELoKiM blessed the Seventh Day
(5) And He sanctified it
(6) For in it He has ceased from all the work,
(7) Which ELoKiM had done, to make.”
ELoKiM appears 35 times
As we’ve already learned, ELoKiM’s name appears 32 times in the Six Days.
Now we see His Name appearing 3 more times in relation to the Sabbath, altogether 35 times.
This number, 35, is the source for the classical “35 prototypes of works” that are prohibited on the Sabbath. Since they appear in Genesis, there are potentially prohibited on all Mankind. They are not detailed here, but Moses would count them in details later on to Israel, on Sinai. He tied these prohibitions to the building of the Tabernacle. Moses also added 4 more prototypes of prohibitions to Israel, related to the topic of ‘separation.’ Israel is therefore prohibited by “39 prototypes” altogether. In spirit, though, all Mankind should refrain from work on the Sabbath as a remembrance of Genesis. .
Let’s discuss each step of the Sabbath:
Step 1: “And the Heavens and the Earth ended and all their hosts…”
The verse focuses on the work. It has been accomplished according to a ‘master plan.’ No more work was left over.
The massage here is that each person should feel at the end of the week as if all his work has been completed. One should enter the Sabbath with complete rest of his mind.
Step 2: “And ELoKiM finished on the Seventh Day His work that He has done”
Here the verse focuses on the worker rather than on the work. He would not invent any new work ON THE SABBATH even for the next week.
Step 3: “And He CEASED from all His work that He had done”
ELoKiM did NOT ‘rest’ on the Sabbath. He rather actively ‘ceased’ or refrained from any new or old work. He would have liked to work, but He stopped it, actively. The Hebrew for CEASED, shabath, is the source for the name of the Day.
Step 4: “And ELoKiM blessed the Seventh Day….”
The Sabbath is the source of blessing for the entire following week. When we observe the Sabbath we do not lose a thing. We gain more material and spiritual blessings.
Step 5: “And He sanctified it…”
ELoKiM endowed the Sabbath with holiness. Whoever observes the Sabbath feels it. The Sabbath warmth our heart and makes it ready to accept the Kingdom of YHVH with endless joy.
Step 6: “For in it He has ceased from all the work which ELoKiM had done…”
This line is not a repetition of the above. It refers, according to the Talmud, to the act of Judgment. His Court has ceased its work.
Step 7: “To be made….”
This final step hints that the story of Genesis has not ended with Chapter One.
The Eternal Sabbath has to arrive. Our world should enter it.
But this would take a long journey.
The Shechinah of YHVH should enter our world in full.
But this would take time. It would be up to Adam to reach that goal.
Adam would have to invite Her, attract Her, let Her enter his heart
So that She would meet there, in our heart, Her Groom.
It is only in our heart that this meeting can take place. Since no other creature in Nature is capable to perceive Her.
Hence step 7, “to be made” hints for a goal to be reached by Man. From here on, from the end of Chapter One, human history would evolve around this goal and this story: how the Scechnah would enter our world IN FULL. This would happen gradually, as described in the Torah. She would appear in several steps which we will learn in details:
1. First as a shy, modest Acronym into the Sixth Day ,to consolidate the world with ELoKiM and make Adam
2. Then into the Garden of Eden, seen ‘side by side’ with her Groom, as YHVH ELoKiM
3. Then on Earth, seen first time clearly alone as YHVH by Eve after giving birth to her first child.
4. Then ‘descending’ closer to Mankind on Mt Sinai, to give Mankind the Torah.
5. Then She found her rest in our weekly Sabbath
6. Then She came closer to Man in the Holy temple, under the Golden Cherubs
7. From there She would enter Man’s heart.
Each of these steps revealed another aspect of Her. We’ll discuss them one by one in due course.
Oh, so much to learn!
3: Who then rested on the Sabbath?
Having read with the utmost attention the verses, we have NOT seen anywhere a hint the “G-d” has rested on the Sabbath. It says, rather, that ELoKiM CEASED His work. He “invented he ceasing of work,” says Rashi.
In contrast, the Fourth of the Ten Commandments of Sinai says:
“Remember the Sabbath day, to sanctify it,
for in six days YHVH made the Heavens and the Earth and
He/she rested on the seventh day….”
Moses says here clearly that ”YHVH has rested on the Sabbath.” How come?
YHVH and ELoKIM consolidated the world
When ELoKiM ‘invited’ YHVH, so to speak, to make Adam “in Our Form and Our Image,” She came in from Her Domain, the Eternal Sabbath, as shown in the above text of Genesis Chapter One. Together, in Oneness, they CONSOLIDATED the world; henceforth it would not falter.
This story is told by the Levite Choir chanting in the Holy Temple on every sixth day of the week:
“YHVH has reigned, He has garbed Himself with grandeur…
YHVH has also consolidated the world firmly,
so that it shall not falter…” (Psalm 93)
In Her domain, on the Eternal Sabbath, the Attribute of MERCY YHVH does not perform any ‘work,’ nor create or judge.
Her Sabbath is a Day of unconditional Love, void of any trial or tribulation. No birth and no death.
For her, like a spoiled bride, entering the Groom’s home and consolidate it is WORK. She is not used to that sort of living. Now she seeks a niche to REST and express her individuality. That niche is our weekly Sabbath.
Read also: “Genesis Vs. Science, Can They Match?” By Zvi Aviner, at www.smashwords.com | <urn:uuid:5efa7db7-ff18-46ba-a72f-b0690d7670e2> | CC-MAIN-2019-47 | https://noahidesevencommandments.com/torah-classes/i-idolatry/idolatry-19-yhvh-elokimso-who-rested-on-the-sabbath/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669795.59/warc/CC-MAIN-20191118131311-20191118155311-00185.warc.gz | en | 0.959324 | 1,931 | 2.5625 | 3 |
Certain fatty acids give preterm babies improved vision
Preterm babies have a risk of impaired vision, but if they are given supplements of omega-3 and omega-6 fatty acids at the age of two and half years their vision improves. This was demonstrated in a Swedish study that is published in The Lancet Regional Health – Europe. The scientists explain why these fatty acids are so important, not just for eye health but for the brain and for health in general.
Children born before the 37th week of pregnancy are considered preterm. Compared with babies born on time, the organs in preterm babies are less developed, and the babies are also more vulnerable and have an increased risk of acute and lasting complications, including a greater risk of developing premature retinopathy (ROP). This is a disease in the blood vessels of the retina that can lead to retinal scarring and retinal detachment, which can cause loss of vision or blindness. The vision impairment is often linked to neurological disturbances in most preterm babies.
The development of the infant’s eyes, brain, and other organs depends on a sufficient supply of long-chained omega-3 and omega-6 fatty acids. If the baby is born preterm, the supply of these fatty acids from the mother comes to a grinding halt. In the new study, Swedish scientists looked at the effect of giving supplements of the omega-3 fatty acid, DHA (docosahexaenoic acid), and arachidonic acid (an omega-6 fatty acid) to babies who were born extremely early. They wanted to see how it affected their vision. A total of 178 babies born at hospitals in Gothenburg, Lund, and Stockholm participated in the study. The children had been born before week 28 of the pregnancy and weighed 790 grams on average. One group of babies got supplements of omega-3 and omega-6 from the moment they were born and until the time of expected delivery. The other group was not supplemented and served as a control group.
Better vision and brain function
Earlier research has found that supplementation with omega-3 and omega-6 fatty acid halves the risk of premature retinopathy in preterm babies. In the new study, the scientists looked at the eye health and vision in preterm babies two and half years after the time that they were supposed to have been born.
They could see that the children who had been given supplements with the two fatty acids had better vision compared with the control group, regardless of whether they had premature retinopathy. In addition, the improved vision was not only linked to the positive effect on the retinal development. It also looked as if the two supplements had a positive effect on the brain’s ability to interpret different visual impressions.
There is increasing focus on the importance of giving relevant nutrients to preterm babies. Still, guidelines are needed for the role polyunsaturated fatty acids like omega-3 and omega-6. The new Swedish study sheds light on the importance of giving these supplements to babies who are born too early. In the future, scientists want to look closer at how supplements of these two fatty acids affect the cognitive skills and neurological development of preterm babies.
Why are omega-3 and omega-6 fatty acids so important for the child’s development?
Omega-3 and omega-6 fatty acids are essential. They are building blocks in all cell membranes and support countless biochemical processes. These fatty acids are also important for the development of the baby’s retina and brain. They are embedded in the membranes of nerve cells. This is of great importance in the third trimester and in the baby’s first year of life, where the brain undergoes rapid growth and development. The brain contains quite a lot of the omega-3 fatty acid, DHA, and the omega-6 fatty acid, AA (arachidonic acid). It was these two fatty acids that were used in the Swedish study. It is important for expecting mothers to get plenty of omega-3 and omega-6, even if their baby arrives on time. It’s quite easy to get enough AA from dietary sources, but many pregnant and breastfeeding women eat to little oily fish and could easily benefit from taking a high-quality fish oil supplement.
Pia Lundgren et al. Visual outcome at 2,5 years of age in ϖ-3 and ϖ-6 long-chain polyunsaturated fatty acid supplemented preterm infants: a follow-up of a randomized controlled trial. The Lancet Regional Health – Europe. 2023
University of Gothenburg. Preterm babies given certain acids have better vision. ScienceDaily 2023
For tidlig fødsel (præmaturitet) - Patienthåndbogen på sundhed.dk
TIP! See also the related articles
Search for more information...
- Created on . | <urn:uuid:b0970fef-de25-4c58-baa9-87eb91cd6de8> | CC-MAIN-2024-10 | https://healthandscience.eu/en/archive/article-archive/4206-certain-fatty-acids-give-preterm-babies-improved-vision | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474533.12/warc/CC-MAIN-20240224112548-20240224142548-00625.warc.gz | en | 0.954591 | 1,002 | 3.34375 | 3 |
Analysis: Sound Check
We think this poem has an eerie, echoey sound to it. Part of this has to do with the rhyme scheme: each stanza has two end rhyme sounds that repeat. In the first stanza, the rhymes are what we like to call "ober" and "ere" sounds. Here are the "ober" sounds: sober, October, Auber. And the "ere" sounds: sere, year, Weir.
The echoing sound also comes from lines that are almost-but-not-quite repeats of other lines, like a distorted echo. Check out this example from lines 2 and 3:
The leaves they were crispèd and sere—
The leaves they were withering and sere;
The past sounds are repeating, but with slight differences.
That fits the action of poem really well. Just think about it. The poem is about a guy who's sort of repeating his past actions. Though the speaker doesn't quite remember it until the end, he's been "by the dim lake of Auber/ […] In the goul-haunted woodland of Weir" before. Exactly a year ago, in fact. Both times, he ended up at Ulalume's tomb – the first time to bury her. So just like the sounds are repeating, the speaker's actions are repeating too.
The sound is especially cool at the very end of the poem. At line 91, the speaker's memory is rushing back. At this point we get an echo, or repetition, of the description of the lake that we first experienced at the beginning of the poem. In a way, when we read this echo of a previous line, it's as if our own memories were coming back too. Check it out:
It was hard by the dim lake of Auber,
In the misty mid region of Weir—
It was down by the dank tarn of Auber,
In the ghoul-haunted woodland of Weir. (lines 6-9)
Well I know, now, this dim lake of Auber—
This misty mid region of Weir—
Well I know, now, this dank tarn of Auber—
In the ghoul-haunted woodland of Weir." (lines 91-94)
Pretty cool, huh? | <urn:uuid:7328094c-8aa7-460c-9f56-361a583ac3b3> | CC-MAIN-2014-42 | http://www.shmoop.com/ulalume/sound-check.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119649807.55/warc/CC-MAIN-20141024030049-00088-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.965778 | 481 | 3.25 | 3 |
A NOVA show have told the audience that we are live in 3 dimensional world, the world we lived in is compose by 3 element: the energy, matter, space. By the time Einstein have invented the 4-dimensional model including the time element, why no one claim that we actually live in 4-dimensional world
Victor, This is a good question. Probably one of the greatest tragedies surrounding modern science in popular literature is the portrayal of dimensions and our understanding of them.
Many popular shows are inconsistent in when they talk about dimensions, in some cases they refer to the 3 spatial and 1 time dimension that we commonly observe as separate things, and in some cases they talk about the 4-dimensional spacetime that is used in modern physics on a routine basis without any real discussion about what they mean.
Spacetime is a combination of the 3 space dimensions and 1 time dimension, e.g. 3+1 dimensions which equals 4 dimensions.
In the early days of relativistic mechanics, in order to represent the 3 spatial dimensions and 1 time dimension as one entity, they would give the time dimension an imaginary value. So the 4 dimensional spacetime would be represented as:
$$x + y + z + it$$
This covenient, because when one takes the inner product (sometimes called the dot product) of the representation of space time one gets:
$$x^2 + y^2 + z^2 - t^2$$
This sort of representation is convenient because one can begin to understand the relationship between space and time in terms of the Pythagorean theorem.
This is the simplest example of how one can begin to relate the nature of spacetime to geometry. The broader theory of how geometry of spacetime changes as you move in spacetime is Einstein's Theory of General Relativity.
General Relativity assumes that there are 3 dimensions of space and 1 dimension of time that make up the 4-dimensional spacetime that programs sometimes reference.
There are other theories that propose there are more than 3 space dimensions of space and 1 dimension of time. However, these are very speculative still.
protected by Qmechanic♦ Apr 2 '13 at 3:18
Thank you for your interest in this question.
Because it has attracted low-quality answers, posting an answer now requires 10 reputation on this site.
Would you like to answer one of these unanswered questions instead? | <urn:uuid:0d32af55-64f0-4b78-b939-1841d1092577> | CC-MAIN-2015-40 | http://physics.stackexchange.com/questions/35644/do-we-live-in-a-world-with-4-or-more-dimension/35647 | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678409.42/warc/CC-MAIN-20151001215758-00213-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.935579 | 492 | 3.015625 | 3 |
Both of my daughters are excited about the upcoming school year (high school and junior high). They are busy school shopping, selecting classes, and attending athletic two-a-days. Meanwhile, their teachers are busy winding down their much-earned summer of relaxation and are writing curriculum, creating lesson plans, and planning “cool” projects. Yep, it’s that time of the year – back to school time!
This year, why not consider incorporating infographic design into your curriculum? Infographics provide an interesting way to visualize information, knowledge and data. Infographic design is also a great way for students to learn Adobe Illustrator while solving problems in a creative way.
I recommend starting with a topic that interest the students – themselves! For example, why not have the students create an infographic outlining what they did over the summer?
This is a great beginning-of-the-year project, as it allows the students to share about their summer while learning Adobe Illustrator. Because infographics typically consist of a combination of graphs, charts, data, and simple graphics, the instructor can kick-start the course by teaching basic Illustrator skills such as:
- Combining shapes using the Shape Builder Tool
- Pattern Building (Background)
- Building Simple Shapes (rectangle, rounded rectangle, star, ellipse, etc.)
- Strokes and Lines
- Color Selection
For example, the following infographic visually represents my “summer in review”. I selected 4 summer-time events that I wanted to display in a simple, yet effective manner.
The Illustrator tools/skills I incorporated are:
- Shape Builder Tool – The people icons and the sunscreen bottle
- Shape Tool – The sun was made from an ellipse and a star (obviously there are many examples of rectangles)
- Strokes and Lines – I used the Spiral tool for the surfing wave and the line tool to create the vertical divider as well as the swimming pool water.
- Pattern Panel – I created a horizontal striped pattern and applied it to the background.
- Alignment Panel – for aligning the text
- Kuler – to find my color palette
As you can see, these are very basic skills and a great way to introduce your new digital graphics students, communications students, and career and tech students to Adobe Illustrator. Not to mention, it will also get them thinking about how to communicate ideas in a creative way.
Infographic Resources –
- Google Images – Do a search for “Infographics” using Google Images. There are some really wonderful and creative ways people have depicted data.
- Another great idea for a lesson around the holidays – Infographic Holiday Cards (Check out the free icons, however, I would encourage the students to use their Illustrator design-chops to build their own icons).
- What is an infographic?
- How about incorporating infographics into a research project? Some great examples of ways that infographics can support research.
Have a great and creative 2013-2014 school year!
Solutions Consultant, Adobe Inc.
Follow me on Twitter! | <urn:uuid:841556dd-c9e8-4659-8034-68a5ac10081a> | CC-MAIN-2014-42 | http://blogs.adobe.com/edtechatadobe/2013/08/back-to-school-with-adobe-illustrator-and-infographics.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646352.2/warc/CC-MAIN-20141024030046-00304-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.911371 | 645 | 3.234375 | 3 |
AP Biology is an introductory college-level biology course. Students cultivate their understanding of biology through inquiry-based investigations as they explore the following topics: evolution, cellular processes – energy and communication, genetics, information transfer, ecology, and interactions. This course requires that 25 percent of the instructional time will be spent in hands-on laboratory work, with an emphasis on inquiry-based investigations that provide students with opportunities to apply the science practices.
The course is based on four Big Ideas, which encompass core scientific principles, theories, and processes that cut across traditional boundaries and provide a broad way of thinking about living organisms and biological systems. Students establish lines of evidence and use them to develop and refine testable explanations and predictions of natural phenomena.
The Advanced Placement Test designed by Educational Testing Service will be taken by the students in May. Successfully passing the Advanced Placement exam may result in earned college credit for the individual student.
For additional information on AP Biology, please visit the College Board website. | <urn:uuid:73564975-bc3f-4769-94fb-76f06971fc81> | CC-MAIN-2022-21 | https://www.chsd218.org/apps/pages/index.jsp?uREC_ID=443054&type=d&pREC_ID=1110671 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662532032.9/warc/CC-MAIN-20220520124557-20220520154557-00438.warc.gz | en | 0.927272 | 204 | 3.359375 | 3 |
Electric and hydrogen rail: Potential contribution to net zero in the UK
mode - rail, place - europe, technology - alternative fuels, technology - emissions
Trains, Public transport, Hydrogen, Electric, Carbon dioxide emissions
Electric trains (ET) and hydrogen trains (HT) are considered zero emission at the point of use. True emissions are dependent upon non-tailpipe sources, primarily in energy production. We present UK carbon dioxide (CO2) operating emission model outputs for conventionally fuelled trains (CFT), ETs and HTs between 2017 and 2050 under four National Grid electricity generation scenarios.
Comparing four service categories (urban, regional, intercity and high speed) to private conventionally fuelled vehicles (CFV) and electric vehicles considering average distance travelled per trip under different passenger capacity levels (125%, 100%, 75%, 50% and 25%).
Results indicate by 2050 at 100% capacity CFTs produce a fifth of the emissions of CFVs per kilometre per person. Under two degree generation scenario, by 2050 ETs produced 14 times and HTs produced five times less emissions than CFTs. Policymakers should encourage shifts away from private vehicles to public transport powered by low carbon electricity.
Permission to publish the abstract has been given by Elsevier, copyright remains with them.
Logan, K.G., Nelson, J.D., McLellan, B.C., & Hastings, A. (2020). Electric and hydrogen rail: Potential contribution to net zero in the UK. Transportation Research Part D: Transport and Environment, Vol. 87, 102523.
Transportation Research Part D Home Page: | <urn:uuid:789f3a77-8697-4688-94d1-0e0e4fd06e6d> | CC-MAIN-2023-23 | https://www.worldtransitresearch.info/research/8185/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00635.warc.gz | en | 0.831945 | 384 | 2.6875 | 3 |
A multiplication algorithm is an algorithm (or method) to multiply two numbers. Depending on the size of the numbers, different algorithms are used. Efficient multiplication algorithms have existed since the advent of the decimal system.
The grid method (or box method) is an introductory method for multiple-digit multiplication that is often taught to pupils at primary school or elementary school. It has been a standard part of the national primary school mathematics curriculum in England and Wales since the late 1990s.
Both factors are broken up ("partitioned") into their hundreds, tens and units parts, and the products of the parts are then calculated explicitly in a relatively simple multiplication-only stage, before these contributions are then totalled to give the final answer in a separate addition stage.
The calculation 34 × 13, for example, could be computed using the grid:
300 40 90 + 12 ———— 442
followed by addition to obtain 442, either in a single sum (see right), or through forming the row-by-row totals (300 + 40) + (90 + 12) = 340 + 102 = 442.
This calculation approach (though not necessarily with the explicit grid arrangement) is also known as the partial products algorithm. Its essence is the calculation of the simple multiplications separately, with all addition being left to the final gathering-up stage.
The grid method can in principle be applied to factors of any size, although the number of sub-products becomes cumbersome as the number of digits increases. Nevertheless, it is seen as a usefully explicit method to introduce the idea of multiple-digit multiplications; and, in an age when most multiplication calculations are done using a calculator or a spreadsheet, it may in practice be the only multiplication algorithm that some students will ever need.
If a positional numeral system is used, a natural way of multiplying numbers is taught in schools as long multiplication, sometimes called grade-school multiplication, sometimes called Standard Algorithm: multiply the multiplicand by each digit of the multiplier and then add up all the properly shifted results. It requires memorization of the multiplication table for single digits.
This is the usual algorithm for multiplying larger numbers by hand in base 10. Computers initially used a very similar shift and add algorithm in base 2, but modern processors have optimized circuitry for fast multiplications using more efficient algorithms, at the price of a more complex hardware realization. A person doing long multiplication on paper will write down all the products and then add them together; an abacus-user will sum the products as soon as each one is computed.
This example uses long multiplication to multiply 23,958,233 (multiplicand) by 5,830 (multiplier) and arrives at 139,676,498,390 for the result (product).
23958233 × 5830 ——————————————— 00000000 ( = 23,958,233 × 0) 71874699 ( = 23,958,233 × 30) 191665864 ( = 23,958,233 × 800) + 119791165 ( = 23,958,233 × 5,000) ——————————————— 139676498390 ( = 139,676,498,390 )
Below pseudocode describes the process of above multiplication. It keeps only one row to maintain the sum which finally becomes the result. Note that the '+=' operator is used to denote sum to existing value and store operation (akin to languages such as Java and C) for compactness.
multiply(a[1..p], b[1..q], base) // Operands containing rightmost digits at index 1 product = [1..p+q] // Allocate space for result for b_i = 1 to q // for all digits in b carry = 0 for a_i = 1 to p // for all digits in a product[a_i + b_i - 1] += carry + a[a_i] * b[b_i] carry = product[a_i + b_i - 1] / base product[a_i + b_i - 1] = product[a_i + b_i - 1] mod base product[b_i + p] = carry // last digit comes from final carry return product
Optimizing space complexity
Let n be the total number of digits in the two input numbers in base D. If the result must be kept in memory then the space complexity is trivially Θ(n). However, in certain applications, the entire result need not be kept in memory and instead the digits of the result can be streamed out as they are computed (for example, to system console or file). In these scenarios, long multiplication has the advantage that it can easily be formulated as a log space algorithm; that is, an algorithm that only needs working space proportional to the logarithm of the number of digits in the input (Θ(log n)). This is the double logarithm of the numbers being multiplied themselves (log log N). Note that operands themselves still need to be kept in memory and their Θ(n) space is not considered in this analysis.
The method is based on the observation that each digit of the result can be computed from right to left with only knowing the carry from the previous step. Let ai and bi be the i-th digit of the operand, with a and b padded on the left by zeros to be length n, ri be the i-th digit of the result and ci be the carry generated for ri (i=1 is the right most digit) then
A simple inductive argument shows that the carry can never exceed n and the total sum for ri can never exceed D * n: the carry into the first column is zero, and for all other columns, there are at most n digits in the column, and a carry of at most n from the previous column (by the induction hypothesis). The sum is at most D * n, and the carry to the next column is at most D * n / D, or n. Thus both these values can be stored in O(log n) digits.
In pseudocode, the log-space algorithm is:
multiply(a[1..p], b[1..q], base) // Operands containing rightmost digits at index 1 tot = 0 for ri = 1 to p + q - 1 // For each digit of result for bi = MAX(1, ri - p + 1) to MIN(ri, q) // Digits from b that need to be considered ai = ri − bi + 1 // Digits from a follow "symmetry" tot = tot + (a[ai] * b[bi]) product[ri] = tot mod base tot = floor(tot / base) product[p+q] = tot mod base // Last digit of the result comes from last carry return product
Usage in computers
Some chips implement long multiplication, in hardware or in microcode, for various integer and floating-point word sizes. In arbitrary-precision arithmetic, it is common to use long multiplication with the base set to 2w, where w is the number of bits in a word, for multiplying relatively small numbers.
To multiply two numbers with n digits using this method, one needs about n2 operations. More formally: using a natural size metric of number of digits, the time complexity of multiplying two n-digit numbers using long multiplication is Θ(n2).
When implemented in software, long multiplication algorithms must deal with overflow during additions, which can be expensive. A typical solution is to represent the number in a small base, b, such that, for example, 8b is a representable machine integer. Several additions can then be performed before an overflow occurs. When the number becomes too large, we add part of it to the result, or we carry and map the remaining part back to a number that is less than b. This process is called normalization. Richard Brent used this approach in his Fortran package, MP.
Lattice, or sieve, multiplication is algorithmically equivalent to long multiplication. It requires the preparation of a lattice (a grid drawn on paper) which guides the calculation and separates all the multiplications from the additions. It was introduced to Europe in 1202 in Fibonacci's Liber Abaci. Fibonacci described the operation as mental, using his right and left hands to carry the intermediate calculations. Matrakçı Nasuh presented 6 different variants of this method in this 16th-century book, Umdet-ul Hisab. It was widely used in Enderun schools across the Ottoman Empire. Napier's bones, or Napier's rods also used this method, as published by Napier in 1617, the year of his death.
As shown in the example, the multiplicand and multiplier are written above and to the right of a lattice, or a sieve. It is found in Muhammad ibn Musa al-Khwarizmi's "Arithmetic", one of Leonardo's sources mentioned by Sigler, author of "Fibonacci's Liber Abaci", 2002.
- During the multiplication phase, the lattice is filled in with two-digit products of the corresponding digits labeling each row and column: the tens digit goes in the top-left corner.
- During the addition phase, the lattice is summed on the diagonals.
- Finally, if a carry phase is necessary, the answer as shown along the left and bottom sides of the lattice is converted to normal form by carrying ten's digits as in long addition or multiplication.
The pictures on the right show how to calculate 345 × 12 using lattice multiplication. As a more complicated example, consider the picture below displaying the computation of 23,958,233 multiplied by 5,830 (multiplier); the result is 139,676,498,390. Notice 23,958,233 is along the top of the lattice and 5,830 is along the right side. The products fill the lattice and the sum of those products (on the diagonal) are along the left and bottom sides. Then those sums are totaled as shown.
2 3 9 5 8 2 3 3 +---+---+---+---+---+---+---+---+- |1 /|1 /|4 /|2 /|4 /|1 /|1 /|1 /| | / | / | / | / | / | / | / | / | 5 01|/ 0|/ 5|/ 5|/ 5|/ 0|/ 0|/ 5|/ 5| +---+---+---+---+---+---+---+---+- |1 /|2 /|7 /|4 /|6 /|1 /|2 /|2 /| | / | / | / | / | / | / | / | / | 8 02|/ 6|/ 4|/ 2|/ 0|/ 4|/ 6|/ 4|/ 4| +---+---+---+---+---+---+---+---+- |0 /|0 /|2 /|1 /|2 /|0 /|0 /|0 /| | / | / | / | / | / | / | / | / | 3 17|/ 6|/ 9|/ 7|/ 5|/ 4|/ 6|/ 9|/ 9| +---+---+---+---+---+---+---+---+- |0 /|0 /|0 /|0 /|0 /|0 /|0 /|0 /| | / | / | / | / | / | / | / | / | 0 24|/ 0|/ 0|/ 0|/ 0|/ 0|/ 0|/ 0|/ 0| +---+---+---+---+---+---+---+---+- 26 15 13 18 17 13 09 00
01 002 0017 00024 000026 0000015 00000013 000000018 0000000017 00000000013 000000000009 0000000000000 ————————————— 139676498390
Binary or Peasant multiplication
The binary method is also known as peasant multiplication, because it has been widely used by people who are classified as peasants and thus have not memorized the multiplication tables required for long multiplication.[failed verification] The algorithm was in use in ancient Egypt. Its main advantages are that it can be taught quickly, requires no memorization, and can be performed using tokens, such as poker chips, if paper and pencil aren't available. The disadvantage is that it takes more steps than long multiplication, so it can be unwieldy for large numbers.
On paper, write down in one column the numbers you get when you repeatedly halve the multiplier, ignoring the remainder; in a column beside it repeatedly double the multiplicand. Cross out each row in which the last digit of the first number is even, and add the remaining numbers in the second column to obtain the product.
This example uses peasant multiplication to multiply 11 by 3 to arrive at a result of 33.
Decimal: Binary: 11 3 1011 11 5 6 101 110 2
1210 11001 24 1 11000 —— —————— 33 100001
Describing the steps explicitly:
- 11 and 3 are written at the top
- 11 is halved (5.5) and 3 is doubled (6). The fractional portion is discarded (5.5 becomes 5).
- 5 is halved (2.5) and 6 is doubled (12). The fractional portion is discarded (2.5 becomes 2). The figure in the left column (2) is even, so the figure in the right column (12) is discarded.
- 2 is halved (1) and 12 is doubled (24).
- All not-scratched-out values are summed: 3 + 6 + 24 = 33.
The method works because multiplication is distributive, so:
A more complicated example, using the figures from the earlier examples (23,958,233 and 5,830):
Decimal: Binary: 5830
239582331011011000110 10110110110010010110110012915 47916466 101101100011 10110110110010010110110010 1457 95832932 10110110001 101101101100100101101100100 728 1916658641011011000 1011011011001001011011001000364 383331728101101100 10110110110010010110110010000182 76666345610110110 10110110110010010110110010000091 1533326912 1011011 1011011011001001011011001000000 45 3066653824 101101 10110110110010010110110010000000 22 613330764810110 10110110110010010110110010000000011 12266615296 1011 1011011011001001011011001000000000 5 24533230592 101 10110110110010010110110010000000000 2 4906646118410 1011011011001001011011001000000000001 98132922368 1 1011011011001001011011001000000000000 ———————————— 1022143253354344244353353243222210110 (before carry) 139676498390 10000010000101010111100011100111010110
Binary multiplication in computers
This is a variation of peasant multiplication.
In base 2, long multiplication reduces to a nearly trivial operation. For each '1' bit in the multiplier, shift the multiplicand by an appropriate amount, and then sum the shifted values. In some processors, it is faster to use bit shifts and additions rather than multiplication instructions, especially if the multiplier is small or always same.
Shift and add
Historically, computers used a "shift and add" algorithm to multiply small integers. Both base 2 long multiplication and base 2 peasant multiplication reduce to this same algorithm. In base 2, multiplying by the single digit of the multiplier reduces to a simple series of logical AND operations. Each partial product is added to a running sum as soon as each partial product is computed. Most currently available microprocessors implement this or other similar algorithms (such as Booth encoding) for various integer and floating-point sizes in hardware multipliers or in microcode.
On currently available processors, a bit-wise shift instruction is faster than a multiply instruction and can be used to multiply (shift left) and divide (shift right) by powers of two. Multiplication by a constant and division by a constant can be implemented using a sequence of shifts and adds or subtracts. For example, there are several ways to multiply by 10 using only bit-shift and addition.
((x << 2) + x) << 1 # Here 10*x is computed as (x*2^2 + x)*2 (x << 3) + (x << 1) # Here 10*x is computed as x*2^3 + x*2
In some cases such sequences of shifts and adds or subtracts will outperform hardware multipliers and especially dividers. A division by a number of the form or often can be converted to such a short sequence.
These types of sequences have to always be used for computers that do not have a "multiply" instruction, and can also be used by extension to floating point numbers if one replaces the shifts with computation of 2*x as x+x, as these are logically equivalent.
Quarter square multiplication
If one of x+y and x−y is odd, the other is odd too; this means that the fractions, if any, will cancel out, and discarding the remainders does not introduce any error. Below is a lookup table of quarter squares with the remainder discarded for the digits 0 through 18; this allows for the multiplication of numbers up to 9×9.
If, for example, you wanted to multiply 9 by 3, you observe that the sum and difference are 12 and 6 respectively. Looking both those values up on the table yields 36 and 9, the difference of which is 27, which is the product of 9 and 3.
Antoine Voisin published a table of quarter squares from 1 to 1000 in 1817 as an aid in multiplication. A larger table of quarter squares from 1 to 100000 was published by Samuel Laundy in 1856, and a table from 1 to 200000 by Joseph Blater in 1888.
Quarter square multipliers were used in analog computers to form an analog signal that was the product of two analog input signals. In this application, the sum and difference of two input voltages are formed using operational amplifiers. The square of each of these is approximated using piecewise linear circuits. Finally the difference of the two squares is formed and scaled by a factor of one fourth using yet another operational amplifier.
In 1980, Everett L. Johnson proposed using the quarter square method in a digital multiplier. To form the product of two 8-bit integers, for example, the digital device forms the sum and difference, looks both quantities up in a table of squares, takes the difference of the results, and divides by four by shifting two bits to the right. For 8-bit integers the table of quarter squares will have 29-1=511 entries (one entry for the full range 0..510 of possible sums, the differences using only the first 256 entries in range 0..255) or 29-1=511 entries (using for negative differences the technique of 2-complements and 9-bit masking, which avoids testing the sign of differences), each entry being 16-bit wide (the entry values are from (0²/4)=0 to (510²/4)=65025).
Fast multiplication algorithms for large inputs
What is the fastest algorithm for multiplication of two -digit numbers?
Complex multiplication algorithm
Complex multiplication normally involves four multiplications and two additions.
But there is a way of reducing the number of multiplications to three.
The product (a + bi) · (c + di) can be calculated in the following way.
- k1 = c · (a + b)
- k2 = a · (d − c)
- k3 = b · (c + d)
- Real part = k1 − k3
- Imaginary part = k1 + k2.
This algorithm uses only three multiplications, rather than four, and five additions or subtractions rather than two. If a multiply is more expensive than three adds or subtracts, as when calculating by hand, then there is a gain in speed. On modern computers a multiply and an add can take about the same time so there may be no speed gain. There is a trade-off in that there may be some loss of precision when using floating point.
For fast Fourier transforms (FFTs) (or any linear transformation) the complex multiplies are by constant coefficients c + di (called twiddle factors in FFTs), in which case two of the additions (d−c and c+d) can be precomputed. Hence, only three multiplies and three adds are required. However, trading off a multiplication for an addition in this way may no longer be beneficial with modern floating-point units.
For systems that need to multiply numbers in the range of several thousand digits, such as computer algebra systems and bignum libraries, long multiplication is too slow. These systems may employ Karatsuba multiplication, which was discovered in 1960 (published in 1962). The heart of Karatsuba's method lies in the observation that two-digit multiplication can be done with only three rather than the four multiplications classically required. This is an example of what is now called a divide-and-conquer algorithm. Suppose we want to multiply two 2-digit base-m numbers: x1 m + x2 and y1 m + y2:
- compute x1 · y1, call the result F
- compute x2 · y2, call the result G
- compute (x1 + x2) · (y1 + y2), call the result H
- compute H − F − G, call the result K; this number is equal to x1 · y2 + x2 · y1
- compute F · m2 + K · m + G.
To compute these three products of base m numbers, we can employ the same trick again, effectively using recursion. Once the numbers are computed, we need to add them together (steps 4 and 5), which takes about n operations.
Karatsuba multiplication has a time complexity of O(nlog23) ≈ O(n1.585), making this method significantly faster than long multiplication. Because of the overhead of recursion, Karatsuba's multiplication is slower than long multiplication for small values of n; typical implementations therefore switch to long multiplication for small values of n.
Karatsuba's algorithm was the first known algorithm for multiplication that is asymptotically faster than long multiplication, and can thus be viewed as the starting point for the theory of fast multiplications.
In 1963, Peter Ungar suggested setting m to i to obtain a similar reduction in the complex multiplication algorithm. To multiply (a + b i) · (c + d i), follow these steps:
- compute b · d, call the result F
- compute a · c, call the result G
- compute (a + b) · (c + d), call the result H
- the imaginary part of the result is K = H − F − G = a · d + b · c
- the real part of the result is G − F = a · c − b · d
Like the algorithm in the previous section, this requires three multiplications and five additions or subtractions.
Another method of multiplication is called Toom–Cook or Toom-3. The Toom–Cook method splits each number to be multiplied into multiple parts. The Toom–Cook method is one of the generalizations of the Karatsuba method. A three-way Toom–Cook can do a size-3N multiplication for the cost of five size-N multiplications. This accelerates the operation by a factor of 9/5, while the Karatsuba method accelerates it by 4/3.
Although using more and more parts can reduce the time spent on recursive multiplications further, the overhead from additions and digit management also grows. For this reason, the method of Fourier transforms is typically faster for numbers with several thousand digits, and asymptotically faster for even larger numbers.
Fourier transform methods
The basic idea due to Strassen (1968) is to use fast polynomial multiplication to perform fast integer multiplication. The algorithm was made practical and theoretical guarantees were provided in 1971 by Schönhage and Strassen resulting in the Schönhage–Strassen algorithm. The details are the following: We choose the largest integer w that will not cause overflow during the process outlined below. Then we split the two numbers into m groups of w bits as follows
We look at these numbers as polynomials in x, where x = 2w, to get,
Then we can then say that,
Clearly the above setting is realized by polynomial multiplication, of two polynomials a and b. The crucial step now is to use Fast Fourier multiplication of polynomials to realize the multiplications above faster than in naive O(m2) time.
To remain in the modular setting of Fourier transforms, we look for a ring with a (2m)th root of unity. Hence we do multiplication modulo N (and thus in the Z/NZ ring). Further, N must be chosen so that there is no 'wrap around', essentially, no reductions modulo N occur. Thus, the choice of N is crucial. For example, it could be done as,
The ring Z/NZ would thus have a (2m)th root of unity, namely 8. Also, it can be checked that ck < N, and thus no wrap around will occur.
The algorithm has a time complexity of Θ(n log(n) log(log(n))) and is used in practice for numbers with more than 10,000 to 40,000 decimal digits. In 2007 this was improved by Martin Fürer (Fürer's algorithm) to give a time complexity of n log(n) 2Θ(log*(n)) using Fourier transforms over complex numbers. Anindya De, Chandan Saha, Piyush Kurur and Ramprasad Saptharishi gave a similar algorithm using modular arithmetic in 2008 achieving the same running time. In context of the above material, what these latter authors have achieved is to find N much less than 23k + 1, so that Z/NZ has a (2m)th root of unity. This speeds up computation and reduces the time complexity. However, these latter algorithms are only faster than Schönhage–Strassen for impractically large inputs.
Using number-theoretic transforms instead of discrete Fourier transforms avoids rounding error problems by using modular arithmetic instead of floating-point arithmetic. In order to apply the factoring which enables the FFT to work, the length of the transform must be factorable to small primes and must be a factor of N − 1, where N is the field size. In particular, calculation using a Galois field GF(k2), where k is a Mersenne prime, allows the use of a transform sized to a power of 2; e.g. k = 231 − 1 supports transform sizes up to 232.
There is a trivial lower bound of Ω(n) for multiplying two n-bit numbers on a single processor; no matching algorithm (on conventional machines, that is on Turing equivalent machines) nor any sharper lower bound is known. Multiplication lies outside of AC0[p] for any prime p, meaning there is no family of constant-depth, polynomial (or even subexponential) size circuits using AND, OR, NOT, and MODp gates that can compute a product. This follows from a constant-depth reduction of MODq to multiplication. Lower bounds for multiplication are also known for some classes of branching programs.
All the above multiplication algorithms can also be expanded to multiply polynomials. For instance the Strassen algorithm may be used for polynomial multiplication Alternatively the Kronecker substitution technique may be used to convert the problem of multiplying polynomials into a single binary multiplication.
Long multiplication methods can be generalised to allow the multiplication of algebraic formulae:
14ac - 3ab + 2 multiplied by ac - ab + 1
14ac -3ab 2 ac -ab 1 ———————————————————— 14a2c2 -3a2bc 2ac -14a2bc 3 a2b2 -2ab 14ac -3ab 2 ——————————————————————————————————————— 14a2c2 -17a2bc 16ac 3a2b2 -5ab +2 =======================================
As a further example of column based multiplication, consider multiplying 23 long tons (t), 12 hundredweight (cwt) and 2 quarters (qtr) by 47. This example uses avoirdupois measures: 1 t = 20 cwt, 1 cwt = 4 qtr.
t cwt qtr 23 12 2 47 x ———————————————— 141 94 94 940 470 29 23 ———————————————— 1110 587 94 ———————————————— 1110 7 2 ================= Answer: 1110 ton 7 cwt 2 qtr
First multiply the quarters by 47, the result 94 is written into the first workspace. Next, multiply cwt 12*47 = (2 + 10)*47 but don't add up the partial results (94, 470) yet. Likewise multiply 23 by 47 yielding (141, 940). The quarters column is totaled and the result placed in the second workspace (a trivial move in this case). 94 quarters is 23 cwt and 2 qtr, so place the 2 in the answer and put the 23 in the next column left. Now add up the three entries in the cwt column giving 587. This is 29 t 7 cwt, so write the 7 into the answer and the 29 in the column to the left. Now add up the tons column. There is no adjustment to make, so the result is just copied down.
The same layout and methods can be used for any traditional measurements and non-decimal currencies such as the old British £sd system.
- Binary multiplier
- Division algorithm
- Mental calculation
- Slide rule
- Trachtenberg system
- Horner scheme for evaluating of a polynomial
- Residue number system § Multiplication for another fast multiplication algorithm, specially efficient when many operations are done in sequence, such as in linear algebra
- Dadda multiplier
- Wallace tree
- Gary Eason, Back to school for parents, BBC News, 13 February 2000
Rob Eastaway, Why parents can't do maths today, BBC News, 10 September 2010
- Brent, Richard P (March 1978). "A Fortran Multiple-Precision Arithmetic Package". ACM Transactions on Mathematical Software. 4: 57–70. CiteSeerX 10.1.1.117.8425. doi:10.1145/355769.355775. S2CID 8875817.
- Corlu, M. S., Burlbaw, L. M., Capraro, R. M., Corlu, M. A.,& Han, S. (2010). The Ottoman Palace School Enderun and The Man with Multiple Talents, Matrakçı Nasuh. Journal of the Korea Society of Mathematical Education Series D: Research in Mathematical Education. 14(1), pp. 19–31.
- Bogomolny, Alexander. "Peasant Multiplication". www.cut-the-knot.org. Retrieved 2017-11-04.
- D. Wells (1987). The Penguin Dictionary of Curious and Interesting Numbers. Penguin Books. p. 44.
- Cool Multiplication Math Trick, retrieved 2020-03-14
- "Novel Methods of Integer Multiplication and Division" by G. Reichborn-Kjennerud
- McFarland, David (2007), Quarter Tables Revisited: Earlier Tables, Division of Labor in Table Construction, and Later Implementations in Analog Computers, p. 1
- Robson, Eleanor (2008). Mathematics in Ancient Iraq: A Social History. p. 227. ISBN 978-0691091822.
- "Reviews", The Civil Engineer and Architect's Journal: 54–55, 1857.
- Holmes, Neville (2003), "Multiplying with quarter squares", The Mathematical Gazette, 87 (509): 296–299, doi:10.1017/S0025557200172778, JSTOR 3621048.
- Everett L., Johnson (March 1980), "A Digital Quarter Square Multiplier", IEEE Transactions on Computers, Washington, DC, USA: IEEE Computer Society, C-29 (3), pp. 258–261, doi:10.1109/TC.1980.1675558, ISSN 0018-9340, S2CID 24813486
- Putney, Charles (Mar 1986), "Fastest 6502 Multiplication Yet", Apple Assembly Line, 6 (6)
- Knuth, Donald E. (1988), The Art of Computer Programming volume 2: Seminumerical algorithms, Addison-Wesley, pp. 519, 706
- P. Duhamel and M. Vetterli, Fast Fourier transforms: A tutorial review and a state of the art" Archived 2014-05-29 at the Wayback Machine, Signal Processing vol. 19, pp. 259–299 (1990), section 4.1.
- S. G. Johnson and M. Frigo, "A modified split-radix FFT with fewer arithmetic operations," IEEE Trans. Signal Process. vol. 55, pp. 111–119 (2007), section IV.
- D. Knuth, The Art of Computer Programming, vol. 2, sec. 4.3.3 (1998)
- A. Schönhage and V. Strassen, "Schnelle Multiplikation großer Zahlen", Computing 7 (1971), pp. 281–292.
- Fürer, M. (2007). "Faster Integer Multiplication" in Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, June 11–13, 2007, San Diego, California, USA
- Anindya De, Piyush P Kurur, Chandan Saha, Ramprasad Saptharishi. Fast Integer Multiplication Using Modular Arithmetic. Symposium on Theory of Computation (STOC) 2008.
- David Harvey; Joris Van Der Hoeven (2019). Integer multiplication in time O(n log n) (Report). HAL.
- KWRegan (2019-03-29). "Integer Multiplication in NlogN Time". Gödel's Lost Letter and P=NP. Retrieved 2019-05-03.
- Hartnett, Kevin. "Mathematicians Discover the Perfect Way to Multiply". Quanta Magazine. Retrieved 2019-05-03.
- Harvey, David. "Integer multiplication in time O(n log n)".
- Sanjeev Arora and Boaz Barak, Computational Complexity: A Modern Approach, Cambridge University Press, 2009.
- Farid Ablayev and Marek Karpinski, A lower bound for integer multiplication on randomized ordered read-once branching programs, Information and Computation 186 (2003), 78–89.
- "Strassen algorithm for polynomial multiplication". Everything2.
- von zur Gathen, Joachim; Gerhard, Jürgen (1999), Modern Computer Algebra, Cambridge University Press, pp. 243–244, ISBN 978-0-521-64176-0.
- Castle, Frank (1900). Workshop Mathematics. London: MacMillan and Co. p. 74.
- Warren Jr., Henry S. (2013). Hacker's Delight (2 ed.). Addison Wesley - Pearson Education, Inc. ISBN 978-0-321-84268-8.
- Savard, John J. G. (2018) . "Advanced Arithmetic Techniques". quadibloc. Archived from the original on 2018-07-03. Retrieved 2018-07-16.
- The Many Ways of Arithmetic in UCSMP Everyday Mathematics
- A Powerpoint presentation about ancient mathematics
- Lattice Multiplication Flash Video | <urn:uuid:3136c9b2-c5b7-4d32-a83a-2012ad493987> | CC-MAIN-2021-25 | https://wiki-en.twistly.xyz/wiki/Multiplication_algorithm | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488539764.83/warc/CC-MAIN-20210623165014-20210623195014-00333.warc.gz | en | 0.842221 | 7,729 | 4.46875 | 4 |
|Puebla, is one of the 31 states which, with Mexico City, comprise the 32 Federal Entities of Mexico. It is divided into 217 municipalities and its capital is the city of Puebla.
It is located in East-Central Mexico. It is bordered by the states of Veracruz to the north and east, Hidalgo, México, Tlaxcala and Morelos to the west, and Guerrero and Oaxaca to the south.
The origins of the state lie in the city of Puebla, which was founded by the Spanish in this valley in 1531 to secure the trade route between Mexico City and the port of Veracruz.
By the end of the 18th century, the area had become a colonial province with its own governor, which would become the State of Puebla, after the Mexican War of Independence in the early 19th century. Since that time the area, especially around the capital city, has continued to grow economically, mostly through industry, despite being the scene of a number of battles, the most notable of which being the Battle of Puebla. Today, the state is one of the most industrialized in the country, but since most of its development is concentrated in Puebla and other cities, many of its rural areas are very poor, forcing many to migrate away to places such as Mexico City and the United States. | <urn:uuid:c2b046e8-7c06-4867-be95-147bf7336a67> | CC-MAIN-2021-10 | https://itchy-feet-travels.com/the-americas/central-america/mexico-2/puebla/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358064.34/warc/CC-MAIN-20210227024823-20210227054823-00188.warc.gz | en | 0.983275 | 290 | 3.59375 | 4 |
US President Donald Trump signs executive order to mine on the Moon
The signing of this order may end a decades-long debate, that had started with the signing of the Outer Space Treaty of 1967
April 14, 2020 / 09:38 PM IST
Even as the United States grapples with the coronavirus pandemic, President Donald Trump reportedly signed an executive order on April 6 that states that the country has the right to explore and use resources from outer space.
According to BBC, the order stated that the US does not need permission of international agreements to do this since it does not see outer space as a common area for resources.
According to reports, the signing of this order may end a decades-long debate, that had started with the signing of the Outer Space Treaty of 1967, which forms the basis of international space law and commercial activities in outer space.
The signing, experts have said, has to do with the depletion of resources on Earth. According to Benjamin Sovacool, a professor of energy policy at University of Sussex, the planet is "currently depleting the resources we have".
"Metals such as lithium or cobalt - which you need - are mainly in places like China, Russia or Congo. And it's difficult to get them," Sovacool is quoted as saying by Newsbeat, according to BBC.
Because it is difficult to source materials from different suppliers with different rules, countries like the US are looking at the moon, according to Sovacool.
"Mining on the Moon, with one entity, might be easier," he said. | <urn:uuid:855e5c59-89fb-4c60-819d-c763d2668f65> | CC-MAIN-2021-17 | https://www.moneycontrol.com/news/world/us-president-donald-trump-signs-executive-order-to-mine-on-the-moon-5146281.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00480.warc.gz | en | 0.97032 | 323 | 2.515625 | 3 |
Wood boring insect pests can continue their development deep within cut wood. They can emerge from wood left to sit outside to infest new areas.
This October, the Nature Conservancy’s Don’t Move Firewood campaign and Hungry Pests, an initiative from APHIS, are partnering to present the first-ever Firewood Awareness Month. The cooler nights and quickly approaching fall season brings an increase in RV camping, hunting, and home heating. Firewood Awareness Month looks to raise public awareness about the potential danger of firewood movement as a pest and disease pathway at this high-risk time of year.
Tree-killing invasive insects and diseases can lurk both inside, and on the surface, of firewood. While these insects and diseases don’t travel far on their own, transporting firewood allows them to move hundreds of miles and start infestations in new places, explains APHIS Deputy Administrator Osama El-Lissy. Read more »
The streamlined design of Oobinator 2.0 improved the distribution of the wasps—each Oobinator containes 50 wasps that could be positioned at four distinct locations throughout the field site. Stingless wasps disperse in the field to search for EAB eggs that will serve as a host for its offspring.
Emerald ash borer (EAB) beetle is an invasive wood boring beetle, first detected in July 2002 in southeastern Michigan. The pest attacks and kills ash trees and it is responsible for the death and decline of tens of millions of ash in 25 states. EAB lives under the bark and when people move EAB-infested firewood they unknowingly move the pest. During EAB Awareness Week (May 22-28) leave HungryPests behind and don’t move firewood.
Do you remember the eighties television show MacGyver? Science genius turns secret agent. Each week Angus MacGyver—armed with only a pen, aerosol spray can and a Swiss Army knife—successfully disarms the bomb and saves the day! The following week, it’s a shoe horn, jumper cables and a screwdriver…then a thermos, belt buckle….you get the drift. Sixty minutes of ingenious, nail-biting problem-solving.
Although the show’s final episode aired almost 25 years ago, the spirit of Angus lives on at the USDA’s Emerald Ash Borer (EAB) biological control production facility, where USDA is strategically rearing natural enemies to combat this destructive pest. Mass rearing biocontrol agents (stingless wasps) is a delicate process that’s time-sensitive, labor-intensive, and laden with problem-solving opportunities. Read more »
The Insects Invade magazine developed by the U.S. Forest Service in collaboration with Scholastic Inc. was distributed to 25,000 teachers nationwide this year. (U.S. Forest Service)
Our forests are under attack. And the U.S. Forest Service is hoping that the Nation’s fourth and fifth graders can help fight back.
The Forest Service distributed Insects Invade, a teacher’s package to 25,000 teachers nationwide. The teacher’s package includes 30 copies of a 12-page full color magazine called Insects Invade, a teacher’s page that has two lesson plans, as well as a comment card for feedback. The magazine was developed in conjunction with Scholastic Inc., a company that has delivered books, magazines and educational materials to schools and families for 90 years.
The Insects Invade educational product resulted as an idea to build awareness among fourth and fifth graders elementary school children about invasive insects. Read more » | <urn:uuid:c14305e8-2581-490b-8f40-38d7061b3fe4> | CC-MAIN-2017-04 | http://blogs.usda.gov/tag/invasive-insects/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279189.36/warc/CC-MAIN-20170116095119-00061-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.931042 | 766 | 2.796875 | 3 |
A new Columbia University study released this week suggests the U.S. delay in reacting to the COVID-19 pandemic cost the nation tens of thousands of lives.
The study, conducted by three Columbia University researchers, and funded by the U.S. National Institutes of Health and the National Science Foundation, suggests that if control measures designed to control the spread of the coronavirus had begun by March 1 — two weeks earlier than most measures began — 83% of the nation’s deaths by the virus could have been prevented.
The study says even one week earlier would have saved as many as 36,000 lives.
The researchers say the most basic of measures, such as social distancing and restricting individual contact in the early stages of the pandemic in the U.S., would have prevented the spread of the disease in “hot spots” such as New York, New Orleans and other major cities.
The study’s lead researcher, epidemiologist Jeffrey Shaman, told The New York Times that catching the virus in the early “growth” phase is critical in the exponential spread of the disease and in reducing deaths.
The researchers’ estimates are based on how restrictive measures began working to slow the spread of the virus once they were implemented on a large scale in mid-March. They modeled how those restrictions could have affected the spread of the virus if they had been applied sooner.
The study shows that as states reopen in the coming days and weeks, officials must closely monitor confirmed cases, or outbreaks will occur again and get out of control. | <urn:uuid:478e930e-f647-4e68-91bf-080bf654b212> | CC-MAIN-2022-49 | https://www.voanews.com/a/covid-19-pandemic_delayed-us-covid-reaction-cost-lives-new-study-finds/6189681.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710417.25/warc/CC-MAIN-20221127173917-20221127203917-00203.warc.gz | en | 0.977105 | 321 | 3.03125 | 3 |
What is Deposits as per the Companies Act,2013?
Section 2 (31) of Companies Act and Rule 2(1)(v) DEFINITION OF DEPOSIT ‘Deposit’ includes any receipt of money by way of deposit or loan or in any other form, by a company but does not include;
- Any amount received from the CG or a SG, or any amount received from any other source whose repayment is guaranteed by the CG or a SG, or any amount received from a local authority, or any amount received from a statutory authority constituted under an Act of Parliament or a State Legislature;
- Any amount received from Foreign Governments, foreign or international banks, multilateral financial institutions, foreign bodies corporate and foreign citizens, foreign authorities or persons resident outside India subject to the provisions of Foreign Exchange Management Act, 1999 (42 of 1999) and rules and regulations made there under;
- Any amount received as a loan or facility from any Bank or FI;
- Any amount received as a loan or financial assistance from Public Financial Institutions notified by the Central Government in this behalf in consultation with the Reserve Bank of India or any regional financial institutions or Insurance Companies or Scheduled Banks as defined in the Reserve Bank of India Act, 1934
- Any amount received against issue of commercial paper or any other instruments issued under guidelines or notification issued by RBI;
- Any amount received by a company from any other company (Inter-corporate Deposits);
- Any amount received towards subscription to any securities, including share application money or advance towards allotment of securities pending allotment, provided that securities are allotted within 60 days from the date of receipt of money failing which, money should be refunded within 15 days after the expiry of 60 days, otherwise it shall be treated as deposit;
- Any amount received from a person who, at the time of the receipt of the amount, was a director of the company or a relative of the director of the Private company, provided it is not being given out of borrowed funds;
- Any amount raised by the issue of bonds or debentures secured by a first charge or a charge ranking Pari passu with the first charge on any assets referred to in Schedule III of the Act excluding intangible assets of the company or bonds or debentures compulsorily convertible into shares of the company within ten years, provided the amount of borrowing is not more than the market value of such assets assessed by a registered value;
- Any amount raised by issue of non-convertible debenture not constituting a charge on the assets of the company and listed on a recognised stock exchange as per applicable regulations made by Securities and Exchange Board of India
- Any amount received from an employee of the company not exceeding his annual salary under a contract of employment with the company in the nature of non-interest-bearing security deposit;
- Any non-interest-bearing amount received or held in trust;
- Any amount received in the course of, or for the purposes of the business of the company, such as an advance for the supply of goods or provision of services accounted for in any manner whatsoever provided that such advance is appropriated against supply of goods or provision of services within a period of three hundred and sixty five days from the date of acceptance of such advance
Provided that in case of any advance which is subject matter of any legal proceedings before any court of law, the said time limit of three hundred and sixty-five days shall not apply;
- Any amount received in the course of, or for the purposes of the business of the company which are as follows:
- as an advance, accounted for in any manner whatsoever, received in connection with consideration for an immovable property
- as a security deposit for the performance of the contract for supply of goods or provision of services for supply of capital goods
- as an advance towards consideration for providing future services in the form of a warranty or maintenance contract as per written agreement or arrangement, if the period for providing such services does not exceed the period prevalent as per common business practice or five years, from the date of acceptance of such service whichever is less;
- as an advance received and as allowed by any sectoral regulator or in accordance with directions of Central or State Government;
- as an advance for subscription towards publication, whether in print or in electronic to be adjusted against receipt of such publications
Provided that if the aforesaid amount becomes refundable on account of not getting the requisite approval/permission, then the money should be refunded within 15 days from the date it becomes due for refund, otherwise it shall be treated as deposit;
- Any amount brought in by the promoters of the company by way of unsecured loan subject to fulfilment of the following conditions, namely: –
- a) The loan is brought in pursuance of the stipulation imposed by the lending FI or bank on the promoters to contribute such finance;
- b) The loan is provided by the promoters themselves or by their relatives or by both and not by their friends and business associates; and
- c) The exemption shall be available only till the loans of financial institution or bank are repaid and not thereafter.
- Any amount accepted by a Nidhi company in accordance with the rules made under section 406 of the Act.
It may be noted that Sections 73 and 76 and Companies (Acceptance of Deposits) Rules, 2014 do not apply to acceptance of deposits by Banking Companies, NBFCs, Housing Finance Companies and such other class of notified companies. The acceptance of deposits by the aforesaid companies is governed by different norms.
DEPOSITOR RULE 2 (1) (d):
-Any member of the company who has made a deposit with the company u/s 73 of the Companies Act; or
-Any person who has made a deposit with an eligible company u/s 76 of the Companies Act.
ELIGIBLE COMPANY: RULE 2(1)(e)
-A Public company having a net worth of not less than Rs. 100 Cr. or a turnover of not less than Rs. 500 Cr. and which has obtained the prior consent of the company in General Meeting by means of a Special Resolution and filed the said resolution with the ROC and where applicable, with the RBI before making any invitation to the public for acceptance of Deposits;
Provided that an eligible company, which is accepting deposits within the limits specified u/s 180(1)(c), may accept deposits by means of an ordinary resolution.
KINDS OF DEPOSITS:
- Acceptance of deposit from Members: Any company (whether private or public) can accept deposits from its members, subject to the passing of a resolution in general meeting and the commencement of this Act or payment of interest on such deposits. [Section 73].
- Acceptance of deposits from the Public: Only a public company, having a net worth of not less than Rs. 100 Cr. OR a turnover of not less than Rs. 500 Cr., can accept deposits from the Public. Such kind of public company, shall be referred to as ‘Eligible Company.
SECTION 73 PROHIBITION ON ACCEPTANCE OF DEPOSIT FROM PUBLIC:
(1) No company shall invite, accept or renew deposits under this Act from the public except in a manner provided under Chapter V. Exceptions:
-A banking company
-Non-banking financial company as defined in RBI Act, 1934 and
-To such other company as the CG may, after consultation with the Reserve Bank of India, specify in this behalf.
(2) Section 73(2) states that a company may, subject to
-The passing of a resolution in General Meeting and
-Subject to such rules as may be prescribed in consultation with the RBI, accept the deposits from its members on such terms and conditions, including the provisions of security, if any, on such repayment of such deposits with interest , as may be agreed upon between the company and its members, Subject to the fulfilment of the following conditions, namely
a)Issuance of a circular to its members including therein a statement showing the financial position of the company, the credit rating obtained, the total number of depositors and the amount due towards deposits in respect of any previous deposits accepted by the company and such other particulars in such manner as may be prescribed.
- b) Filing a copy of the circular along with such statement with the ROC 30 days before the date of issue of the circular;
- c) Depositing sum not less than 20% of the amount of its deposits maturing during a FY and the FY next following, and kept in a scheduled bank in a separate bank account to be called as Deposit Repayment Reserve Account;
- d) Certifying that the company has not committed any default in the repayment of deposits accepted either before or after the commencement of this act or payment of interest on such deposits and where such default has occurred, the company made good the default and a period of 5 years had lapsed since the date of making good the default.
- e) Providing security, if any for the due repayment of the amount of deposit or the interest thereon including the creation if such charge on the property or assets of the company. In case when a company does not secure the deposits or secures such deposits partially, then, the deposits shall be termed as “unsecured Deposits” and shall be so quoted in every circular, form, advertisement or in any document related to invitation or acceptance of deposits.
(3) Section 73(3) states that every deposit accepted by a company shall be repaid with interest as per terms and conditions of the agreement.
(4) Section 73(4) If a company fails to repay the deposit or part thereof or any interest thereon, the depositor concerned may apply to NCLT for an order directing the company to pay the sum due or for any loss or damage incurred by him as a result of such non-payment and for such other orders as NCLT may deem fit.
(5) Section 73(5) The deposit repayment reserve account shall not be used by the company for any purpose other than repayment of deposits.
SECTION 74 REPAYMENT OF DEPOSITS:
(1) When, in respect of any deposit accepted by a company before the commencement of this Act, the amount of such deposit or part thereof or any interest due thereon remains unpaid on such commencement or becomes due at any time thereafter, the company shall-
-File, within a period of 3 months from such commencement or from the date on which such payments are due, with the ROC a statement of all the deposits accepted by the company and sums remaining unpaid on such amount with the interest payable thereon along with the arrangements made for such repayment, notwithstanding anything contained subject to which the deposit was accepted or any scheme framed under any law; and
-Repay within 3 years from such commencement or on or before expiry of the period for which the deposits were accepted. w.e.f.
Provided that renewal of any such deposits shall be done as per provisions of chapter V and rules made thereunder.
(2) Section 74(2) states that the NCLT may on an application made by the company, after considering the financial condition of the company, the amount of deposit or part thereof and the interest payable thereon and such other matters, allow further time as considered reasonable to the company to repay the deposit.
(3) Sec 74(3) states that if a company fails to repay the deposit or part thereof or any interest thereon within specified time or such further time as may be allowed by NCLT, the company shall be punishable with fine à Rs. 1 Cr. to Rs. 10 Cr and Every officer in default shall be punishable with imprisonment up to 7 years OR with fine minimum Rs. 25 Lakhs and maximum Rs. 2 Cr, OR with both.
SECTION 75: DAMAGES FOR FRAUD:
(1)Section 75 provides that in case the company fails to pay the deposit or any interest thereon within one year from the commencement of the Act or from the date on which such payments becomes due, whichever is earlier, or within such time periods as allowed by the NCLT and it is proved that the deposits had been accepted with intent to defraud the depositors, every officer who was responsible for acceptance of such deposits shall be liable without prejudice to the visions contained under Section 74 and liability for fraud u/s 447, be personally responsible, without any limitation of liability for all losses or damages incurred by the depositors.
(2) For failure to repay the deposits, action may also be taken by any person, group of persons or any association of persons who had incurred any loss as a result such failure.
SECTION 76: ACCEPTANCE OF DEPOSITS FROM PUBLIC BY CERTAIN COMPANIES:
(1) Notwithstanding anything contained in section 73 a public company, having such net worth or turnover as may be prescribed ,may accept deposits from persons other than its members subject to compliance with the requirements provided in sub-section (2) of section 73 and subject to such rules as the Central Government may, in consultation with the Reserve Bank of India, prescribe:
Provided that such a company shall be required to obtain the rating (including its net worth, liquidity and ability to pay its deposits on due date) from a recognised credit rating agency for informing the public the rating given to the company at the time of invitation of deposits from the public which ensures adequate safety and the rating shall be obtained for every year during the tenure of deposits:
Provided further that every company accepting secured deposits from the public shall within thirty days of such acceptance, create a charge on its assets of an amount not less than the amount of deposits accepted in favour of the deposit holders in accordance with such rules as may be prescribed.
(2) The provisions of this Chapter shall, mutatis mutandis, apply to the acceptance of deposits from public under this section.
PENALTY FOR VIOLATION OF THE PROVISION OF DEPOSITS [Section 76A]
(1) Where a company accepts or invites or allows or causes any other person to accept or invite on its behalf any deposit in contravention of the manner or the conditions prescribed under section 73 or section 76 or rules made thereunder or if a company fails to repay the deposit or part thereof or any interest due thereon within the time specified under section 73 or section 76 or rules made thereunder or such further time as may be allowed by the Tribunal under section 73,—
(a) the company shall, in addition to the payment of the amount of deposit or part thereof and the interest due, be punishable with fine which shall not be less than one crore rupees or twice the amount of deposit accepted by the company, whichever is lower rupees but which may extend to ten crore rupees; and
(b) every officer of the company who is in default shall be punishable with imprisonment which may extend to seven years and with fine] which shall not be less than twenty-five lakh rupees but which may extend to two crore rupees.
Provided that if it is proved that the officer of the company who is in default, has contravened such provisions knowingly or wilfully with the intention to deceive the company or its shareholders or depositors or creditors or tax authorities, he shall be liable for action under section 447.
SOME IMPORTANT POINTS TO BE NOTED ABOUT DEPOSITS:
- No company shall accept or renew any deposit, which is repayable on demand; or on notice; or after a period of less than 6 months or more than 36 months from the date of acceptance or renewal of such deposits, as the case maybe.
- For a Company other than an Eligible Company: It may accept or renew any deposit from its members, if the amount of such deposits together with the amount of other deposits outstanding as on the date of acceptance or renewal of such deposits does not exceed 25% of the aggregate of the paid-up share capital and free reserves of the company.
- An Eligible Company, other than a Government Eligible Company, can accept or renew deposits, together with existing deposits, subject to the following ceiling: –
> Deposits from Members: 10% of the aggregate of paid-up share capital and free reserves.
> Any other Deposits: 25% of the aggregate of paid-up share capital and free reserves.
> A Government Eligible Company can accept or renew deposits, together with existing deposits, up to 35% of aggregate of its paid-up capital and free reserves.
- Every Eligible Company intending to invite deposits shall issue a circular in the form of an advertisement in Form DPT-1.
- No company shall issue circular or circular in the form of an advertisement inviting deposits unless, not less than 30 days on before the date of its issue, a copy of the same has been delivered to the Registrar of Companies for registration.
RETURN OF DEPOSITS (DPT-3):
- All the Company having any outstanding loan/amount as on 31st March of every financial year has to furnish details and bifurcation of such outstanding amount irrespective of the fact whether such amount is falling under the definition of deposit.
- On or before 30th June of every year in form DPT-3.
With reference to the above-mentioned information is the full analysis on the definition of deposits and the provisions of deposits comprising of Section 73 to 76A of Companies Act, 2013 and recent amendments if any. | <urn:uuid:ccf8801a-21ed-4bc2-9792-cf016d9c885d> | CC-MAIN-2023-40 | https://blog.finlaw.in/deposits-under-companies-act-2013-deposits-rules/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00402.warc.gz | en | 0.954216 | 3,650 | 2.625 | 3 |
Epoxy materials were widely known around the world from the middle of the last century. But recently the nature of their application has changed significantly.
Traditional use of epoxy resins is carried out in the following areas:
The epoxy blend includes two components. When they mix, the polymerization process occurs. In this case, the curing component is called a hardener epoxy concrete overlay.
With different combinations of resins and hardeners, a variety of epoxy compositions are obtained.
Tertiary amines, phenols and their analogues are used as curtains. The relationship between resins and epoxies and hardeners has wide limits and they depend on their composition.
Epoxy resin is the so-called reactoplastic, that is. The reaction between epoxy resins and resins and hardeners is irreversible. Frozen resin will not dissolve and will not melt like thermoplastic.
Resin and hardener
With an excess or disadvantage of the hardener in the epoxy composition can lead to negative consequences : Reduces strength, as well as resistance to heating and to additives and active chemicals. With insufficient level of hardener, the product can become tacky due to unrelated epoxy. Below the excess level of the free hardener, there is a gradual excretion on the surface of the polymer. In modern compounds, the ratio of 1: 2 or 1: 1 has been increasingly found.
Preparatory work for the application of the epoxy resin
Regardless of the type of surface, when using the epoxy composition, a number of rules for high-quality adhesion should be observed:
Advantages and advantages of epoxy resins
Epoxy resin has great advantages over similar materials:
high strength adhesive compound;
withdrawal of minors;
the minimum permeability of moisture in a harmonious form;
greater stability and wear resistance;
excellent physical-mechanical properties and parameters.
Epoxy adhesive. Its properties and application
Epoxy resin has gained fame as a glue.
Epoxy resins often go to create special protective layers and to bond parts with a non-porous surface.
What can be glued with epoxy glue
In universal glue, special epoxy compositions with high adhesion to different materials are usually used, as a rule.
Epoxy glue is considered a versatile and reliable means, due to the high-quality coupling and strength of the connection. This glue is used in different spheres, starting with shoe workshops and ending with machinery and aircraft. | <urn:uuid:f4d5bd7b-2776-430b-b7fb-0d503a407fff> | CC-MAIN-2024-10 | http://www.emmastearoom.com/2021/general/application-of-epoxy-resin/ | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474669.36/warc/CC-MAIN-20240226225941-20240227015941-00270.warc.gz | en | 0.939011 | 522 | 3.40625 | 3 |
So this book shows that through deceitfulness of two, one can fall Free Essays words 2.
More on the other hand, would not lie no matter what the consequences would be, he would not accept a bribe under any circumstance and he would never go against his morals Research Papers words 5. Thomas More, who is considered to be an honest man, is entangled in the politics of the day and having to decide between his own welfare and his personal conscience.
Bring on the tough stuff. There’s not just one right answer.
Thomas is an absolute saint of the church, but now he had to choose between two different kinds of loyalty. The theme seems to be recurring, regardless of the age or setting. In fact, it is the Common Man who reminds the audience "The 16th century is the century of the common man Free Essays words 3.
Sir Thomas is faced with a moral dilemma that will determine the outcome of his life. More is a man of moral integrity because he refuses to submit to external pressures to sign the oath condoning the Act of Supremacy Research Papers words 1.
The Center for Thomas More Studies: Study Materials: A Man for All Seasons Curriculum Unit
RICH: Well there. There must be something wrong with him. The Dean of St Paul's offers you a post; with a house, a servant and fifty pounds a year. RICH: It's hard. MORE grimly : Be a teacher. This conversation, as well as the previous one, sets up the contrast between Sir Thomas More and Richard Rich which is prevalent throughout the entire play What does he say? What lines strike you in this scene as especially memorable? Cite several and explain them. What three significant incidents does Robert Bolt relate about the execution of More in this scene?
You will prepare a 5 minute oral presentation on the character or event of your choice.
You will need to consult at least three sources to get sufficient background. You will hand in your notes for the presentation and you will need to read at least one book on your topic. The contributions or special concern of your character or event e.
Personal anecdotes—some interesting details of the life or some statistic, some unusual and memorable occurrence s. You have been reading a biography of an interesting character who lived during the Renaissance, either in England or in Europe. Consider now several key points in the life. Finally, explain in detail why you chose each example.
Seven full and complete paragraphs are expected with appropriate headings. T he C enter for T homas M ore S tudies. Review Questions, by act and scene IV. Background on the Renaissance V. Essay topics for A Man for all Seasons It is difficult for an author to portray a good character, yet Robert Bolt in his play, A Man for All Seasons, presents Thomas More as a hero who is at once larger than life yet truly human.
A man for all seasons
In the play, More is faced with not just one but several characters who challenge his viewpoint. One of the most interesting characters in A Man for All Seasons is the common man. Discuss his perspicacious and tantalizing character. Preparation for essay test on A Man for All Seasons 1. Explain the significance of the title as it refers to Sir Thomas More. What is the basic irony prevalent in this scene?
What do both Cromwell and Chapuys want from More? Who is Chapuys? How do Lady Alice and her daughter Margaret get along? Why does the King leave so abruptly? Why is Rich not trusted?
What does The Act of Supremacy state? What does Chapuys discuss with More? How does More treat Chapuys? Why is More afraid? What is Lady Alice afraid of in this scene? Norfolk states his opinion of Thomas More as a judge. What is it? This shows that More is an honest and aware man.
More then offers Richard Rich the cup who gladly accepts it with little hesitation.
- ss o level model essays.
- essay human trafficking short.
- A Man for All Seasons Summary and Characters!
- thesis statement for breast cancer!
- middle school lab report?
Upon giving Rich the cup More asks if he will sell it but he already knows the answer. He knows Rich will sell the cup in turn for money or something else. The first thing Rich says he will buy is, "some decent clothes! More on the other hand knows that respect is earned not bought while Rich believes that " This statement is definitely true for Rich who, when testifying against his " friend" Thomas More, lies to the court about his conversation he had with More.
More says, " In good faith Rich, I am sorrier for your perjury than my peril" p. | <urn:uuid:26b80dd0-0c4a-4c1b-bea7-7bdc5a8fa94f> | CC-MAIN-2020-10 | https://tomilegebo.gq/a-man-for-all-seasons-richard-rich-essay.php | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141653.66/warc/CC-MAIN-20200217030027-20200217060027-00330.warc.gz | en | 0.962687 | 976 | 2.671875 | 3 |
After you register with us to become a green salon, a team of Go Green Salon educators will visit your salon. You will receive invaluable feedback on your operations and how to make them more eco-friendly. Then, you will be able to follow our online module of six lessons on green salon practices. A mini-test will evaluate your understanding of the concept and practices. At the end of the process, you will be awarded certification as a green salon.
It is very important for all of the world to be conscious of the importance of the Environment and how we recycle. Research has shown that in Europe we are still not working to maintain an environment to be sustainable for the long term future.
As educators and part of civilization it is our duty and responsibility to do our best to reuse and recycling everyday waste. This will ensure a sustainable lifestyle, by reusing and putting back into the community.
It is very worrying about the effect we are having on our planet in regard to all the waste we create in the world.
It is therefore vital we all have a much greater understanding of how we can improve this.
With in this lesson you will be able to have a far greater understanding on the recycleable items we use everyday and how we may also look at recycling other recycable items to work towards a greener future.
The environment is necessary for our civilization and must be preserved in order not to mortgage our future; Science has shown that the uses and customs of today would lead to a problem of very difficult solution. Until recently, the company and the environment were confronted. This perspective has begun to change since the introduction of the concept of “sustainable development”.
Both company and environment are bound to understand each other, and this understanding goes through what we now call “eco efficiency” (reduction of the environmental impact in relation to the volume of production obtained). In order to achieve sustainability, we must respect the environment and not demand more raw materials than it can offer, that is why reducing consumption is sustainable but also helps to get benefits from saving, so it is a win-win situation.
In the last few years there has been a notable increase in the amount of attention for eco-friendly furniture in general. Large international companies like IKEA whose primary income is generated through the sale of furniture allocate an increasing part of their efforts towards eco-friendly furniture. You can say that the choice of materials is now an essential part of the palate of choice of the modern consumer.
Carbon footprint is having a significance effect on the environment. Everyone should be concerned about climate change. Carbon foot print is the amount of greenhouse gas emissions which is mainly carbon dioxide. As a society we measure the amount we produce as an individual, Industry country and community. Over the years we have increased the amount of cars electrical appliances.
Within this lesson you will consider ways to reduce your own carbon Footprint.
It is very important for all of the world to be conscious of the importance in following national legislations and requirements when it comes to protecting the environment and recycling.
Within this lesson we will discuss National Legislations and gain a greater understanding of the importance in following these in order to protect the environment. | <urn:uuid:0e974410-cda2-4fe8-953b-599a93be2130> | CC-MAIN-2021-10 | https://gogreensalons.com.mt/education/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178369523.73/warc/CC-MAIN-20210304205238-20210304235238-00373.warc.gz | en | 0.950032 | 654 | 2.546875 | 3 |
Battle Royal Ralph Ellison begins the short story, “Battle Royal”, in some what of a state of confusion. The nameless narrator informs the reader that he has been essentially lost in the early twenty years of his life. The narrator’s grandfather adds to his confusion and the overall purpose of the story. While on his death bed, the grandfather claims to be a traitor and a spy. He charges his family to “overcome ‘em with yeses“(258, paragraph 2) and “undermine ‘em with grins”(258, paragraph 2) as he lays preparing for death.
A point that the narrator subconsciously internalized, the reader sees through the series of actions and point of view of the narrator the use of role playing among blacks. For if this method is followed, blacks are able to refuse internally to accept second class status, protect their own self respect, and avoid betraying themselves or each other. The grandfather’s words had a tremendous effect on the psyche of the narrator. Almost like a puzzle that couldn’t be solved that lay in the back of his mind. At points he found his self resenting his grandfather’s words regardless of the success he obtained.
In spite of this, he still could see his self through his actions carrying out his grandfather’s advice of meekness and humility towards the white man. On the narrator’s graduation day he delivered a speech which showed that “humility was the secret, indeed, the very essence of progress. ”(248, paragraph 3). For this speech, he gained praise from the white men of the town, because he exhibited the attitude that the white man thought to be “desirable conduct”(248, paragraph 3). He was then invited to give the speech on behalf of the town’s leading officials.
Order custom essay Argumentative Essay about Battle Royal with free plagiarism report
Ellison uses the example of the narrator’s speech of humility to show that the white man in that time period can be manipulated. The narrator conveys humbleness in his speech to the white man, without showing any idea of equality to him. In return, the narrator is rewarded and invited to give his speech among more “white men”. This being an achievement that the socially conscious black man pushing for equality would have never accomplished during this time period. Upon arrival at the town meeting to give his speech he quickly realizes that it is not exactly what he had been expecting.
He was then convinced or almost forced to participate in a Battle Royal amongst other black males who were not there to give any type of speech. The Battle Royal included several acts of self degradation towards the narrator and other black males. Through these actions we can see that the white men saw blacks as animals, and that the narrator was no different. Regardless of whether he was there for a speech or not, he was still forced to participate. In this way the white men showed their superior attitude towards the black males, the attitude that his grandfather taught him how to overcome with humility.
As Ellison points out by saying, “They were tough guys who seemed to have no grandfather’s curse worrying their minds…….. In those pre-invisible days I visualized myself as a potential Booker T. Washington”(248- 249, paragraph 4). The narrator not only shows humility in his speech but also through the scenes that take place in Battle Royal. He keeps the thought of his grandfather’s words at the fore front of his mind, as he goes through the harsh acts forced upon him by the white men during the battle royal, in hopes of giving his speech.
In fact, the narrator was abused brutally both mentally and physically to the point where he could barely stand. Yet he still was persistent in wanting to give his speech. Ellison in this scene shows how blacks must be strong minded and willing to become completely humble in the eyes of the white man in order for the method to work. After the battle royal, the narrator was finally able to give his speech among the white men. Notably, after he was already dismissed with the other black males and then told to come back. The narrator relishes at the thought of giving his speech and begins to speak amongst the white men.
It was not until his mouth began to dry and fill up with blood from his wounds, that he realized the white men were still laughing and talking. With thoughts of giving up and leaving in his head, he decided to continue with his speech. As he proceeded, the white men yelled for him to repeat words that were of three or more syllables, mocking him. He made a mistake and yelled social equality as the white men taunted him. The white men quickly put him in his place. Once the narrator was finished, he was presented with a briefcase and scholarship to a negro college. The scene of the final speech demonstrated how even though the white men did not respect him they still granted him with a briefcase and a scholarship. They did this because he exhibited once again humility towards them, making them feel superior. The second he mentioned the word “equality” he was quickly corrected, for they did not believe blacks and whites could be equal. By showing humbleness, the nameless narrator gained exactly what he wanted from the white man without pushing for equality externally but internally.
Cite this Page
Argumentative Essay about Battle Royal. (2018, Sep 25). Retrieved from https://phdessay.com/battle-royal-244728/
Run a free check or have your essay done for you | <urn:uuid:61cbc781-301e-4b9f-8c24-fe5681b490f4> | CC-MAIN-2023-40 | https://phdessay.com/battle-royal-244728/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00252.warc.gz | en | 0.985625 | 1,164 | 2.8125 | 3 |
Today in 1942, Japanese forces invaded tulagi in the first part of Operation Mo. This would eventually result in the battle of the coral sea.
Posts made by Warplayer12
Different plans for the battle of the bulge
I am reading the book The Ardennes: Battle of the Bulge by Hugh M. Cole, In which 5 different plans for the battle of the bulge were mentioned:
1. ¨Operation Holland¨: a single thrust launched from the area around Venlo with the objective of Antwerp
2. ¨Operation Liège-Aachen: a two-pronged attack with the main effort driving northwest from luxembourg, subsequently turning north in order to meet with a second assault launched from the area northwest of Aachen
3. ¨Operation Luxembourg¨: a two-pronged attack launched simultaneously from central luxembourg and metz with the objective of taking Longwy. (not sure which longwy they mean here, there is more then one in France)
4. ¨Operation Lorraine¨: Another double envelopment, launched from Metz and Baccarat who would meet at Nancy
5. ¨Operation Alsace¨: two seperate thrusts, one launched east of Epinal, the other east of Montbéliard. They would meet in the Veosul area.
Could any of these plans have achieved something other then a disaster and the troops learning a little topography?
A Different Zitadelle
What if Operation Habicht or Panther was launched instead of Zitadelle?
For the ones of you not knowing what these operations were, Habicht was the launch of a small offensive across the donets to straighten the frontline of army south, and operation Panther was an extended version of Habicht, with the intension to push the Soviets back a little further.
First of all, I�ll tell what this is for the people who don�t know what this operation was:
It was the second to last major German offensive of the war, launched in mid february 1945. Its objective was to cut off the leading elements of Zhukovs 1st Belorussian front.
The attack was launched as a limited offensive, but Guderian planned it as a major offensive. For this offensive, he wanted to evacuate the courland pocket, remove forces from italy and norway, and use Sepp Dietrich�s 6th SS Panzer army, which was send to hungary to attack around lake balton.
The only thing Guderian did get approved by Hitler was that Walther Wenck directed the operation instead of Heinrich Himmler.
How could the operation have gone if Guderian got the forces he wanted?
RE: Hall of Shame - tales of the worst dice ever
I was playing a game of AAG40 with my friends, and I left holland belgium wide open for the french by mistake.
However, I attacked the 2 inf defending there with 3 tanks.
My tanks did not get a single hit in 2 rounds of dice, and the 4 french inf killed all the tanks. | <urn:uuid:904dc07f-3842-4bcf-a1fb-12008a023152> | CC-MAIN-2020-10 | https://www.axisandallies.org/forums/user/warplayer12 | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144979.91/warc/CC-MAIN-20200220131529-20200220161529-00447.warc.gz | en | 0.952662 | 656 | 2.75 | 3 |
Provided by: freebsd-manpages_8.0-1_all
syscall, __syscall - indirect system call
Standard C Library (libc, -lc)
syscall(int number, ...);
__syscall(quad_t number, ...);
The syscall() function performs the system call whose assembly language
interface has the specified number with the specified arguments.
Symbolic constants for system calls can be found in the header file The
__syscall() form should be used when one or more of the arguments is a
64-bit argument to ensure that argument alignment is correct. This
system call is useful for testing new system calls that do not have
entries in the C library.
The return values are defined by the system call being invoked. In
general, a 0 return value indicates success. A -1 return value indicates
an error, and an error code is stored in errno.
The syscall() function appeared in 4.0BSD.
There is no way to simulate system calls that have multiple return values
such as pipe(2). | <urn:uuid:b7f28a34-a5c5-46c3-bc37-83e35dc83e7e> | CC-MAIN-2013-48 | http://manpages.ubuntu.com/manpages/lucid/man2/syscall.2freebsd.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164050279/warc/CC-MAIN-20131204133410-00071-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.681144 | 235 | 3.078125 | 3 |
Old World Adopting Technology To Improve Services, Cut Consumption, & Save Cash
Monday, June 02, 2014
Article by Clean Technica
Europe may be the Old World, but it seems the continent’s most-storied cities are ahead of the New World – namely, North America – in adopting technology aimed at improving municipal services, reducing consumption and saving money.
That’s according to a recent New York Times story about how investments including neighborhood-wide high-speed Internet, trash collection and electric vehicle charging stations are reshaping Europe’s metropolises as “smart cities.”
According to one research service, there’s big money here, with the smart cities market growing to more than $1.2 trillion annually by 2019.
But what’s a smart city? A lot of things, actually, revolving around a continuum of interconnected intelligent devices – the “Internet of Things” – to save energy, reduce congestion, trim emissions and cut consumption of scarce resources, while arming citizens with information to make good decisions.
Click here to read the full article. | <urn:uuid:6afe5697-aa87-4845-b4d4-968c5c01a4ec> | CC-MAIN-2018-22 | http://www.goldenshovelagency.com/gsa/who-we-helped/recent-work/?item=2751 | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867277.64/warc/CC-MAIN-20180526014543-20180526034543-00628.warc.gz | en | 0.919962 | 231 | 2.53125 | 3 |
In this blog, we will give you an overview of “soundproofing tips” talk about soundproofing materials, how to select the right soundproofing material, methods of soundproofing, and soundproofing materials’ properties.
Let’s talk about some of the critical things you need to keep in mind when soundproofing;
- Consider the origin & type of noise
- Review the properties of insulation materials
- Check the thermal insulation characteristics
- Focus on ease-of-installation and maintenance
- Keep the purpose of soundproofing in mind
- Know different methods of soundproofing
- Explore All The Options
What is Soundproofing?
Soundproofing is the art of adding materials or using techniques to restrict the passage of sound waves. The goal is to reduce the sound intensity being generated from the source before it reaches the destination.
There are several effective ways to curtail sound both at the source or at the destination. Adding mass surely leads the rest as it restricts airborne sounds effectively. Many different soundproofing products provide different levels of insulation yet follow the same principle of mass addition.
There are also sound dampening materials and devices whose function is to dampen the sound intensity. Soundproofing becomes a mere necessity in homes near the freeway or the center of the metropolitan area.
Soundproofing is not solely about restricting the outdoor noise from entering the house. It also involves curtailing indoor sound reverberation. Sound tends to bounce back from solid objects and this creates echo and amplifies the intensity of the sound.
The best way to minimize sound reverberation in a house is by using curtains, blankets, or shades to absorb sound waves. Additionally, carpet and wool rugs also help in absorbing sound waves.
Different Types of Sounds
There are two primary types of sound; Airborne sounds and structure-borne sounds. To know more about soundproofing and choose the right soundproofing material, you need to explore and understand different types of sounds.
Airborne sounds are all normal sounds that travel through the air to travel from source to destination. Sound of speech, TV, music, and machines are all common examples of airborne sounds.
Sound travels in the form of waves and generates vibration in the object on collision. Walls, ceiling, windows, and floorings all vibrate on the collision of sound waves and this is how airborne sounds travel.
On the contrary, impact sounds or structure-borne sounds generates when there is a collision between two objects. This collision also creates vibrations and these vibrations travel through the structure to form sound on the other end.
Examples of structure-borne sounds include bouncing a ball or the impact of a hammer on the wall.
Why Do You Need To Know Types of Sound?
It is important to know the basic sound types as different materials and techniques are used to block different types of sound. Airborne sounds are blocked by mass while structure-borne sounds require multiple layers or foam-filled cavities.
Soundproofing Tips: How To Choose The Right Material?
Selecting the right soundproofing material depends on several factors. It is essential to consider these factors before making the final decision.
The Origin of Noise
Determining the origin of noise or the source from which it is being generated plays a big role in material selection. Besides the source, the distance between the source and destination holds pivotal importance as well.
Soft and minimal noise can easily be blocked by sound-absorbing forms while hard impact noises require advanced insulation materials.
The Type of the Noise
As discussed previously, it is important to determine whether the noise in consideration is airborne or structure-borne. Failing to know the difference often results in buying the wrong materials that may be the perfect sound insulators, but are not suited to your specific insulation need.
Properties of the Materials
It is not only the sound type and intensity that influence the material choice. It is also pivotal to check the properties of soundproofing materials. It is always best to choose eco-friendly soundproofing materials such as mass-loaded vinyl sound barriers.
Thermal Insulation Characteristics
Some materials offer dual insulation both sound insulation and thermal insulation. If you desire to achieve both insulations then it is best to choose a single dual-purpose material. Soundproofing curtains or blackout curtains with three-weave technology are great dual-purpose insulators.
Easy to Install and Maintain
You must also consider the ease of installation and maintenance cost when choosing the right soundproofing material. There is no shortage of highly-effective DIY soundproofing materials and techniques such as soundproofing kits.
On the other hand, some materials provide adequate insulation, yet require professional supervision such as window shutters and inserts.
Purpose of Soundproofing
To choose the right material, you need to have a clear-cut purpose in mind. There is no one-size-fits-all option here and you must know the true purpose before making a decision.
For instance, mass-loaded vinyl is a great soundproofing material to barricade the outdoor noise but is ineffective when it comes to locking the sound in. The same can be said for curtains and blankets whose aim is to stop sound echoing rather than restricting the outdoor noise penetration.
There are some inefficacies in soundproofing techniques that may lead to leakage of sound. You don’t always need to try new insulations techniques sometimes all you need is to cover the loopholes.
Using acoustic sealant and door draft stopper to minimize the leakage of sound are fine extra soundproofing measures.
Methods of Soundproofing
Soundproofing is done through either of these four methods; Sound damping, mass addition, decoupling, and sound absorption.
Sound damping is all about minimizing the sound reverberation to stop the amplification of sound intensity. In open spaces and empty rooms, sound tends to amplify through reverberation.
The sound resonates through diffusion and reflection from objects such as flooring, ceiling, walls, doors, and windows. Sound damping is the idea of dissipating the sound waves before they amplify.
The simplest way to soundproof a structure, object, or space is by adding in extra mass or by increasing its density. Sound penetrates through objects to move from one place to another.
Adding mass to the object halts sound transmission along the tracks and that’s why this technique is used commonly. Various densities, widths, and layers and employed to add extra mass and increase the density of objects, making them soundproof.
Sound is simply vibrational energy and it requires a definite pathway to flow. Breaking the direct connection by adding layers of soundproofing material is called decoupling.
The best way to understand this technique is through tin-can telephones. They use the same technique to transmit sound in the form of vibrations from one end to another. Breaking the pathway or decoupling the string would seize the sound transmission.
Sound amplifies and resonates through cavities and that’s why the best way to regulate and control sound intensity is by filling in the cavities.
Soundproofing Materials and their Properties
Here we have some of the popular soundproofing materials that are commonly used to insulate homes. Each of these materials lies in one of four general categories; Sound-blocking, sound-absorbing, sound dampening, and decoupling.
Acoustic foam is also known as Studio Foam and is easily identifiable by its wedge or pyramid-shaped appearance. These foams can be used in multiple ways. They can be either hanged from the ceiling, attached to the walls, or placed in corners to trap bass and regulate the sound.
These batts are made up of several different composite materials and are available in different types from mineral and rock wool to fiberglass. Their role is to fit in the wall studs to cover up the cavities that amplify the sound.
Proper use of sound-insulating batts can greatly minimize the sound intensity and effectively insulate the room.
Acoustic boards or panels are only an enhancement of acoustic foams. They are more decorative and available in different fabrics, patterns, and colors.
In terms of insulation, they function by absorbing sounds and minimizing the reverberation of sound from solid objects such as walls, doors, and windows.
Acoustic Curtains or Blankets
These materials fall under the category of acoustic fabrics and are thick, heavy, and dense fabrics that function by sound-absorbing technique.
Similar to acoustic panels, they can be placed on the windows, doors, walls, and can also be hanged from the ceiling.
Dense rubber-like coatings commonly Mass-Loaded Vinyl coatings are referred to as acoustic coatings. They function through the technique of sound insulation as the added mass aids in restricting the passage of airborne sounds.
They have many different commercial and home applications and are commonly used to soundproof cars, insulate machinery and appliances, or as an underlayment.
Flooring Insulation or Underlayment
Hardwood floorings are durable, strong, and sturdy, yet a very bad sound insulator. In truth, they make the problem worse by projecting sound back into the room.
To counteract this sound reverberation, floor underlayments are used to decouple the flooring from the subfloor to curtail noise transmission. Polymers, cork rolls, and MLV are all commonly used as floor underlayments.
Structural or Architectural Soundproofing
All the sound insulation materials, objects, and techniques that use modify, or revamp the architecture fall under the category of architectural soundproofing.
These include soundproof walls, soundproof windows, decoupling products, window inserts, etc.
In this blog, we provided an overview of soundproofing and discussed soundproofing materials, how to select the right soundproofing material, methods of soundproofing, and soundproofing materials’ properties.
Frequently Asked Questions (FAQs): What are the Best Soundproofing Tips?
How do I soundproof a room for cheap?
You can soundproof a room for cheap by following these tips:
- Use soundproof curtains or blankets
- Apply window treatments
- Use carpets and wool rugs
- Install acoustic panels
- Add more furniture
- Use White noise machines
What materials can block sound?
Heavy, dense, and thick materials are used to block sound. Airborne sound cannot penetrate through heavy mass and heavy materials are the best to insulate homes and block sounds.
What is the cheapest way to soundproof a wall?
Adding soundproofing blankets, DIY window plugs, and curtains are all cheap and effective ways to soundproof a wall. Not to forget, you also need to seal the cracks and holes in the wall with an inexpensive sealant such as acoustic sealant caulking.
How do you stop outside noise?
Soundproofing or sound insulation is required to stop outside noise from entering your home. First and foremost, you need to fix or seal any holes, crevices, or cracks in your walls, window frames, and doors.
Replacing windows with insulated double or triple-pane windows and hollow-core doors with solid0core doors also helps in insulating the homes. Additionally, insulating walls, ceiling, and flooring also help in soundproofing.
How do I block out loud music?
The best way to block out loud music is to insulate both the source and destination. If the source is not indoors, then you can only soundproof the destination i.e. your home. Many soundproofing techniques can be used to block out loud music sounds including, insulated windows, soundproofing curtains, wall insulation, and white noise machines. | <urn:uuid:ce968f7e-24a9-403c-9d5c-efbdd42a6ef4> | CC-MAIN-2022-21 | https://soundproved.com/soundproofing-tips/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662606992.69/warc/CC-MAIN-20220526131456-20220526161456-00034.warc.gz | en | 0.906648 | 2,502 | 3.046875 | 3 |
By MICHAEL GERSTEIN
Capital News Service
LANSING — Researchers based in Marquette have potentially grave news for Michigan anglers: Hundreds of shallow basins dug into riverbeds to collect trout- and salmon-harming sediment might be more like fish coffins than protectors.
After two reportedly successful experiments in the 1980s, sand traps were constructed worldwide in an attempt to save fish populations hurt by excessive sand in freshwater streams. Michigan has more than 250.
But now, researchers from the Department of Natural Resources (DNR) say they doubt whether these measures have had any benefit. In some cases, sand traps could even harm river ecosystems, experts say.
Popular species like salmon and brook trout need coarse riverbeds of gravel or small pebbles. Too much sand suffocates fish embryos, leading to a decline in the number of fish, and faced with excessive sand, an eventual ecosystem change. That means different species would take up residence, which is bad news for anglers expecting salmon.
“Once the population of the stream is degraded, people will lose interest in fishing there,” said Troy Zorn, who led the new DNR study.
“If they’re not fishing there, they may not buy a license, lures, hotel expenses or gas to get there. It would add up,” Zorn said.
Fast-flowing rivers – like those along the snow-melt-fueled north shore of the Upper Peninsula during the spring – could have destabilized river banks if sand traps were installed, causing “potentially catastrophic effects” on the amount of sediment, Zorn said.
That would mean fewer trout and salmon in the U.P.
Zorn and DNR colleague Todd Wills examined 65 sediment traps. They concluded that it was doubtful that most of them had any positive effect on fish populations.
A 2005 report examining 126 sediment traps dubbed them “successful,” which the new report said was a “subjective” evaluation. That led to the traps’ widespread adaptation, Zorn said.
Jill Leonard, a fish biologist at Northern Michigan University, said she hasn’t seen the newest study but is familiar with the methods used to reduce sediment. She agreed that traps could have a potentially negative impact on sport fishing.
She said many Michigan riverbeds are naturally sandy, but factors like logging, lack of vegetation along the side of a river and “improper land use” all contributed to make rivers even sandier.
“People are really very well-meaning. They want to do something to help,” she said.
“But sometimes these are really long-term commitments. It’s hard to make that judgment in the beginning, and as always, the best way to prevent damage to the stream is to prevent it in the first place.”
Sand traps require a lot of maintenance, she said, and upkeep requires money that isn’t there.
Leonard said the problem with habitat modifications is that they may work in one stream but not in another.
But she said people do want to help river ecosystems. “People are desperate to fix it. It sounds really trite, but it’s the truth.”
Wills, who works at DNR’s Lake St. Clair Research Fisheries Station near Mt. Clemens, said the department has scaled back construction of the traps, and discussions have been held to dissuade nonprofits and public agencies from wasting money on ineffective techniques.
Wills said the more than 250 traps across the state will naturally disappear over time.
“They’re going to eventually fill in, and there won’t ever be any indication that they were ever there.”
By MICHAEL GERSTEIN | <urn:uuid:606d53ef-0cba-47f8-8458-804028c20296> | CC-MAIN-2019-30 | http://news.jrn.msu.edu/2013/04/new-study-questions-river-sand-trap-strategy/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526446.61/warc/CC-MAIN-20190720045157-20190720071157-00077.warc.gz | en | 0.96274 | 796 | 3.265625 | 3 |
This ever-expanding reference list provides background on a diverse spectrum of illustrators across time, cultures, and artistic styles.
Hungarian-born children's book illustrator, commercial illustrator, and animator.
Illustrators and writers of the "Berenstain Bears" book series.
Inventive illustrator of books, advertisements, and animations.
Celebrated political commentator on the contemporary American scene.
Since 1978, Roz Chast has worked as a regular cartoonist for "The New Yorker."
Illustrator, painter, and leader of the American Modernist movement.
Flagg created the iconic World War I poster, "I Want YOU for the U.S. Army."
Creator of the first political cartoon published in an American newspaper.
Illustrator of 20th-century rural America and sporting scenes, namely hunting and fishing.
Known for his comic drawings for "Puck"
William Hanna and Joseph Barbera animated Saturday morning TV for generations of children.
Animator who worked at Disney, Warner Bros., and Hanna-Barbera.
One of "The Eight"
American sports cartoonist famous for his creation of the "Brooklyn Bum."
The most important American political cartoonist and satirist of the late 1800s.
Best known for illustrating theater scenes and images of the streets of New York City.
A highly acclaimed humorous illustrator and animator.
Illustrator, art director, and educator.
Creator of the influential graphic novel memoir, "Maus."
Renowned for comic art that kept America laughing for more than seventy years. | <urn:uuid:372a2fca-1421-4697-9e2b-30f143360515> | CC-MAIN-2017-17 | http://www.illustrationhistory.org/artists/genre/cartooning/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119080.24/warc/CC-MAIN-20170423031159-00181-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.927717 | 336 | 3.109375 | 3 |
These two questions have me quite confused. Can someone showme how to work through these? Thanks in advance, I will ratelifesaver!
1) A solenoid of 200 turns carrying a current of 2 A has alength of 25cm. What is the magnitude of the magnetic fieldat the center of the solenoid?
2) The maximum current in a superconducting solenoid can beas large as 3.53 kA. If the number of turns per meter in sucha solenoid is 2430, what is the magnitude of the magnetic field itproduces? | <urn:uuid:d3f52da6-5f18-47db-915c-db71045e5dfc> | CC-MAIN-2014-35 | http://www.chegg.com/homework-help/questions-and-answers/two-questions-quite-confused-someone-showme-work-thanks-advance-ratelifesaver-1-solenoid-2-q798307 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824445.9/warc/CC-MAIN-20140820021344-00147-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.890483 | 123 | 3.0625 | 3 |
Creation/Application Sponsored by
3 pages available as a PDF download or printed copies mailed to you
Starting at US$9 Buy This Article
Ketones are responsible for many natural flavors and odors. Ketones exist in their precursor form in fresh butter as alkanoic acids. As acids, they may be only marginally important in contributing to the flavor of fresh butter. However, when heated, these acid precursors are converted to different ketones and their total concentration rises above their flavor threshold value. Thus, they are very important in providing flavors associated with heated or cooked foods containing butter. Aliphatic ketones are important flavor components, especially in blue cheeses; Penicillium roqueforti, for instance, produces 2-pentanone, 2-heptanone and 2-nonaone.
This is only an excerpt of the full article that appeared in P&F Magazine, but you can purchase the full-text version. | <urn:uuid:ed284323-a254-46bc-9130-ad8361509e78> | CC-MAIN-2014-23 | http://www.perfumerflavorist.com/flavor/application/multiuse/118370079.html?mobi=y | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510276353.59/warc/CC-MAIN-20140728011756-00473-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.934186 | 200 | 2.71875 | 3 |
Exploring Military Options for Students with Disabilities
Since the inception of the Americans with Disabilities Act (ADA) 1990, more opportunities exist for students with disabilities after they graduate from high school. Numerous individuals with disabilities currently work for, or have worked with, the U.S. Military. Their service may have been as part of the civilian workforce or as enlisted or commissioned personnel. The differences between these three areas and military education programs are addressed in this document.
Some of our more prominent American military leaders had attention deficit disorder and/or learning disabilities, yet perservered to accomplish great things. General Westmoreland served as the U.S. Superintendent of West Point, the commander of the U.S. military advisors in South Vietnam, and the Army’s Chief of Staff. President John F. Kennedy served as a Lieutenant in the U.S. Navy, a U.S. Congressman, a U.S. Senator, and the 35th President of the United States.
The Civilian Workforce
The Army, Navy, Air Force, Marines and Coast Guard all have a civilian workforce (Civil Service). This workforce is composed of civilians who are employed on U.S. military installations; in everything from barbershops and bowling alleys, to engineering, education and nuclear science positions. These civilians also make up a large part of the work force in companies that contract with the U.S. Government. McDonnell-Douglas and Raytheon are examples of companies that hire individuals with disabilities under the protections afforded by the ADA.
A federal mandate states that all U.S. Military bases must have 10% of their civilian workforce composed of individuals with disabilities. The U.S. Navy proudly boasts that they have been ranked # 5 in the nation among all employers—private sector corporations included—who employ individuals with disabilities. Many civilian positions require applicants to be eligible for civil service. There are some civilian positions that require previous military experience. Visit www.federaljobs.net/exams.htm for more information on civil service exams/qualifications.
Enlisted vs. Commissioned
The United States Military requires that all enlisted and commissioned personnel be ready for “active duty.” This means one must at all times be physically, emotionally, and psychologically ready to serve their country. This may mean going to war when called upon to do so. This “moment’s notice” criteria also applies to those serving in the Reserves or in the Army and Air National Guards.
Enlisted men/women can enter the military without a college degree. An enlistee is able to move up the ladder to become a non-commissioned officer with or without a college degree. The military will allow an individual to obtain a college degree after entering, though this can be a difficult task. Often, the enlistee is required to serve fulltime on active duty while taking college courses on the side.
Students who are worried about taking college classes, but are still interested in a military career, can take advantage of the enlisted segment of the armed forces. Students can enter the military and be trained for jobs using hands-on skills. Military Occupational Schools (MOS) are job-specific. They do not require typical core subjects like math, English, or science, which are needed for a college degree. Depending on the specific job or job field that an enlistee chooses, there will be aspects of these subjects included in the school program.
A commissioned officer is an individual who enters the military after obtaining a college degree, or obtains his/her degree after entering the military. In both cases, the person is considered a commissioned officer once they earn a four-year degree. There are programs that provide officer’s training and/or military scholarships to those interested in entering the armed forces after college.
Washington Virtual Academies
Tuition-free online school for Washington students. | <urn:uuid:eedaebe1-5064-45e2-8ddf-514acbb1ee97> | CC-MAIN-2014-10 | http://www.education.com/reference/article/military-options-disability-students/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678706211/warc/CC-MAIN-20140313024506-00032-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.953714 | 801 | 2.828125 | 3 |
A check is a document instructing a bank, mobile wallet, or credit union to pay a specific amount of money to the bearer. The writer or entity who writes the check is the drawer or payor, while the person to whom the check is written is the payee. The financial company on which the check is drawn is called the drawee. But can you deposit someone else’s check in your account?
You will learn about whether you can deposit checks in someone’s bank account shortly, so just hang around. You can deposit or cash a check. When you present a check to the cashier at a bank or any other financial institution, the money is drawn from the payor’s bank account to your bank account. The payor must sign the check properly for the check processing to go through.
It is also helpful to ensure that you have sufficient funds in your account before writing a check. If you write a check with insufficient money in your account, the check usually bounces. The bouncing of checks can be disastrous to your banking history, especially if you write many bouncing checks as you may enter in the ChexSystems. ChexSystem is a body entrusted by the federal government to keep records of people with poor banking practices.
Procedure To Write A Check
Before you write checks, you need to open a checking account. There are checking accounts with no ChexSystems that you can open to get started. Checks are typically written against a checking account. You can also write a check to negotiate funds from a savings account as well.
Writing a check is a straightforward activity. You may be hearing about checks for the first time and thinking that they are complicated documents. Well, that is not the case. The following is the procedure to write a check.
i) Date your check
Start by writing the correct dates on the right-hand corner of the slip. Dating a check is very important as it helps to show the person you are writing the check the exact date you paid them.
ii) Write the name of the person to benefit from the check
On the space written “Pay to the order of,” is where you will write the name of the person, institution, or company you are writing the check for. If you do not know the beneficiary of the check, you can just write “cash,” and you are good to go. Such cases are when you decide to write random checks to help random people in one way or the other.
The only problem with the check that has the “cash” option is that you can lose money if someone else collects it. Anybody can cash out with a check that does not have a specific payee.
iii) Write the payment amount in figures
You will see another field where you should write the amount of money you want the payee to receive in numbers. An example is something like $100.45. When writing your check, you must be specific to ensure that it has the exact amount you wish to pay. If your writings are not clear, then your check processing may not go through.
iv) Write the amount in words
The next step is writing the amount in words. The amount in words should read exactly what you have written in figures. If you do not ensure that the amounts read the same, processing the check becomes impossible. The primary reason why you have to write the amount both in words and in figures is to prevent theft of your money.
v) Write a memo
You can write why you are making the payment. If the check is for the electricity bill, you have to write “Electricity bill” in the space provided. You can as well skip this part since it is optional. However, if your payee requires you to write a memo, then you have to comply.
Service provider companies usually require you to write your account number in the Memo area. Even though you can send money with a checking account number instantly to the account of your service provider, most companies prefer check payment.
vi) Sign your check
You have to sign the check-in space provided at the bottom. Make sure that you use the same signature that you used when opening your account. If the signatures differ, the check may not go through.
Signing your check proves to the bank or any other institution that you allow the withdrawal of the funds. This is the last part before you send the check to the concerned person or company.
Steps To Cash Out A Check
When you receive a check, you have to cash it out to get the exact amount of money in the check. You can either transfer the funds to your bank account or get the cash to carry out various transactions.
You can cash out your check online or at a physical branch. To cash out a check at a bank or credit union’s branch, you should take the check together with your identification document. For easy processing, you have to visit the institution where you opened your account at. You can follow the steps below to cash out a bank account.
- Ask about any fees for cashing your check. If possible, check on the cheapest option for getting your money.
- Sign the back of your check slip to endorse the check.
- Fill out a deposit slip and sign it.
- Show valid identification documents to the teller.
- Get your cash or have it deposited in your bank or credit union account.
Putting money in your bank account is the best way you can keep your funds safe. Even if you lack a bank account, you can open a free online checking account with no opening deposit at most banks. Even if they require a deposit amount, your check will provide a deposit amount to your account if at all the amount is enough.
You can also cash out a check using some mobile money wallets. They include Cash App and NetSpend, among others. You first need to sign the check at the back and then open your application’s camera to take photos of the checks. The system then uploads the checks, and you can wait for the funds to reflect in your account.
Checks usually reflect on the next business day. Some institutions may send you a text message notifying you that your account has entered the amount.
Can You Deposit Someone Else’s Check In Your Account
One may not cash out a check-in person at times due to unavoidable circumstances such as sickness or commitments. In such a case, one may have to present their check to someone else to cash out on their behalf.
Therefore, it is possible to deposit someone else’s check in your account. The owner of the check has to write “Pay to (your full name).” Again, they should sign the back of the check to authorize the withdrawal.
However, it is good to inquire whether your bank or credit union accepts endorsed checks. Wells Fargo, Bank of America, Chase, TD Bank, among others are some financial companies that accept depositing checks from someone else.
There are no legal restrictions preventing people from depositing other people’s checks in your account. As long as you are willing to do so, then you are free to proceed. By the way, the checks written “cash” with no specific payee are easy to cash out even without the recipient’s signature.
When you cash out a check, you indirectly withdraw money from the checking account of the payor. Remember that banks accept checks with the “For Deposit Only” mark.
A check is a written and signed document instructing a bank, mobile wallet, or credit union to pay a specific amount of money to the bearer. When writing a check, you have to include the payee’s name, the amount in words, and figures. If you do not know the recipient of a check, you should write “cash.” ATMs also allow you to deposit checks. | <urn:uuid:9bea22c2-77d2-42dc-a7b2-b6fde66a520f> | CC-MAIN-2023-50 | https://transfermone.com/deposit-someone-elses-check-in-your-account/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00750.warc.gz | en | 0.936353 | 1,640 | 2.9375 | 3 |
The hydronic heating systems parts used in one home will depend greatly upon the design/configuration that is suitable for the property. However, no matter what the design is, hydronic heating systems will share a few common components.
The boiler, or more accurately, the furnace, is responsible for reheating the liquid before it is distributed throughout the house. Boilers are rated using British thermal units per hour or Btu/h for their input and/or output. A suitable furnace should be large enough to provide ample heat and should offset heat loss.
The circulating pump or circulator pushes the water through the boiler and into the piping system using an electronically driven pump. Depending on the configuration of the heating system, more than one circulator may be used for different zones in the home and even for other purposes like domestic hot water.
In some hydronic heating system designs, multiple zones are created. But instead of using different pumps for each zone, one circulator may be used in conjunction with one zone valve for each zone. This allows the residents to control each zone using a thermostat.
Water changes volume depending on the temperature. When hot, water expands, and when cooled, it contracts. The function of the expansion tank is to factor in this change in volume.
Air elimination devices
Air can adversely affect the performance of the hydronic heating system. As such, air elimination devices are used to remove air from the system and put this back to the atmosphere.
Heat distribution devices
Depending on the system design and configuration, a hydronic system in a home can use any or a combination of these: radiant floors and ceilings, kickspace heaters, baseboard convection units, radiators and fan coil units.
The function of this component is to transfer heat to the water or a different type of liquid used in the heating system.
Some hydronic heating system designs require the use of some components which need water that is cooler than the water supplied by the furnace. The role of the mixing valve is to help produce water that is cooler.
Many of today’s radiant heating systems are controlled using electronic thermostats which can be programmed. These are used to control temperature and are often connected to zone valves.
Piping and insulation
Piping, which can be made out of copper, iron, steel, rubber or plastic, is used to distribute hot water. The insulation, on the other hand, helps minimise the loss of heat.
https://www.serviceexperts.com.au/wp-content/uploads/2017/01/logo-300x87.png00Tanya Simonhttps://www.serviceexperts.com.au/wp-content/uploads/2017/01/logo-300x87.pngTanya Simon2015-07-29 01:47:352018-08-10 01:33:40Hydronic Heating Systems Parts
When you call Service Experts for any service, you can relax because we give you a 100% lifetime labour guarantee. That means we guarantee our work will be right first time, every time or we’ll fix it for FREE.
Our On Time Guarantee
We understand that your time is valuable. That’s why we promise to turn up when we say we will. You will even receive a courtesy call when your plumber is on his way. If there is any delay, we pay YOU $5* for every minute we are late up to $300 (*$300 maximum).
No Hidden Charges Guarantee
We have been around long enough to know you want to be certain of how much your job will cost and not 1c more So, we tell you before we begin any work exactly to the cent what your cash outlay will be. Whether it’s a big job or a small one. You approve the price before any work starts.
Our Cleanliness, No-Bum-Crack
Our technician promises to keep your home dirt free by wearing special shoe covers. If we find that your technician has not done this, you won't pay a cent for your service!
Same Day Service Guarantee
We understand that anything can go wrong with your home plumbing at any time of the day. Our vans are fully stocked and can get you out of trouble for virtually any situation. If we can’t get to you within 6 hours of your call, we pay YOU $50 for the inconvenience. | <urn:uuid:ce084fbc-29ef-439f-ad43-fa3810029407> | CC-MAIN-2021-10 | https://www.serviceexperts.com.au/blog/hydronic-heating-systems-parts/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359624.36/warc/CC-MAIN-20210227234501-20210228024501-00406.warc.gz | en | 0.914303 | 911 | 2.9375 | 3 |
May 8, 2014 at 4:20 pm #219
When a browser reads a style sheet, it will format the document according to it.
Three Ways to Insert CSS
There are three ways of inserting a style sheet:
External style sheet
Internal style sheet
External Style Sheet
An external style sheet is ideal when the style is applied to many pages. With an external style sheet, you can change the look of an entire Web site by changing one file. Each page must link to the style sheet using the tag. The tag goes inside the head section:
An external style sheet can be written in any text editor. The file should not contain any html tags. Your style sheet should be saved with a .css extension. An example of a style sheet file is shown below:
Note Do not add a space between the property value and the unit (such as margin-left:20 px). The correct way is: margin-left:20px
Internal Style Sheet
An internal style sheet should be used when a single document has a unique style. You define internal styles in the head section of an HTML page, by using the
An inline style loses many of the advantages of style sheets by mixing content with presentation. Use this method sparingly!
To use inline styles you use the style attribute in the relevant tag. The style attribute can contain any CSS property. The example shows how to change the color and the left margin of a paragraph:
This is a paragraph.
Multiple Style Sheets
If some properties have been set for the same selector in different style sheets, the values will be inherited from the more specific style sheet.
For example, an external style sheet has these properties for the h3 selector:
And an internal style sheet has these properties for the h3 selector:
If the page with the internal style sheet also links to the external style sheet the properties for h3 will be:
The color is inherited from the external style sheet and the text-alignment and the font-size is replaced by the internal style sheet.
Multiple Styles Will Cascade into One
Styles can be specified:
inside an HTML element
inside the head section of an HTML page
in an external CSS file
Tip: Even multiple external style sheets can be referenced inside a single HTML document.
What style will be used when there is more than one style specified for an HTML element?
Generally speaking we can say that all the styles will “cascade” into a new “virtual” style sheet by the following rules, where number four has the highest priority:
External style sheet
Internal style sheet (in the head section)
Inline style (inside an HTML element)
So, an inline style (inside an HTML element) has the highest priority, which means that it will override a style defined inside thetag, or in an external style sheet, or in a browser (a default value).
You must be logged in to reply to this topic. | <urn:uuid:6aa31f38-933a-4652-bd4f-dd7ae5b69c1f> | CC-MAIN-2018-39 | http://sparkle.demo.wpthms.com/forums/topic/css-how-to/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158011.18/warc/CC-MAIN-20180922024918-20180922045318-00487.warc.gz | en | 0.756388 | 613 | 3.171875 | 3 |
I’ve mentioned before the terrific Back East archaeology blog Elfshot, in which Tim Rast documents his journey of “making a living as a 21st century flintknapper”. Flintknapping is all well and good, of course, but the real magic lies with ground stone, which for many years has been marginalized in archaeology as being, well, obvious and uninteresting. I think one paper I read digresses with an anecdote about the author’s toddler son independently inventing the technology! If it is so obvious, though, then why is it only selectively implemented by people in certain environments, at certain times, to certain degrees of intensity?
It is a technological domain that could support a lot more analytical weight than it has to date. That’s especially true on the Northwest Coast, where the appearance of ground stone 3-4,000 years ago coincided with a time period that marks when a lot of archaeologists (not me, by the way) think that things “get interesting.”
Anyway, how can we understand ground stone? Unlike chipped stone technology, there are not usually a large number of waste flakes produced in the manufacturing process which track the decision-making sequences of the crafts-person. Rather, one tends to find finished pieces, grinding stones, and a selection of ambiguous tools also used in the process. Most of the manufacturing traces disappear as rock powder.
If there is a topic on the NW Coast that is as under-studied as grinding stones, I’d like to know about it. Now that it is possible to, for example, extract lipids from Fire Cracked Rock and ground stone, there really is no excuse not to really bear down on ground stone technology, which must be plastered with organic residues. (Incidentally, if you have access, Thoms outlines the problems and prospects in Fire Cracked Rock studies).
But another way to address this technology is to try to understand the constraints and possibilities of manufacturing, via replication and experiment, and this is where Elfshot shines.
In a recent series of posts, Elfshot nicely illustrates making ground slate knifes (a hugely important artifact type on the Northwest coast as well) of the Arctic style, including the use of nephrite drills to make lashing holes through them. Nephrite, or “jade” is also a very important raw material on this coast and it is good to see this experimental program.
I’ve messed around with some experimenting during the course of my day job, and one interesting finding was, generally speaking, ground slate was faster to make stuff from than was ground mussel shell. I never thought of using nephrite drills of course, but we should be on the lookout for stone drills on the NW coast: something is making holes in all those ground stone beads. There’s a short video of Rast using a bow drill on stone at this Elfshot post (scroll down halfway).
So, lots of credit to Tim Rast and Lori White for such a grounded demonstration of interest in this topic. Out here, I can point to 1990s M.A. theses by Darwent and yours truly on ground stone in B.C. More recently Jesse Morin (PDF by subscription on fish cutting; shorter PDF on nephrite circulation) at UBC and Anthony Graesch (PDF download) from UCLA have started to really get to grips with material choice and circulation of those raw materials most suitable for making ground stone artifacts. In a niche where fish processing was arguably so important, the making of specialized fish knives is obviously of massive interest – and choice between, say, the very different operational sequences imposed by ground slate, by mussel shell, or by cortex spall tools has only just begun to be thought about. The same applies to ground slate points and adzes/chisels, etc. In short: why bother? What are the advantages? Be precise. Show your work.
It’s not too hyperbolic, I don’t think, to propose that understanding the daily grind on the NW Coast might end up being one of the most important keys to unlocking the secrets of the late Holocene archaeological record.
And, of course, to return to Elfshot: part of the “making a living” as a flintknapper is to sell your reproductions. Elfshot has a gallery of things for sale. I can think of more than one NW Coast archaeologist who would rather have one of these pieces for an anniversary than some useless trinket, diamond, whatever. | <urn:uuid:2b05adb9-d269-442d-8a91-950a69435738> | CC-MAIN-2018-26 | https://qmackie.com/2010/10/11/elfshot-goes-ground-stone/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00059.warc.gz | en | 0.959495 | 947 | 2.75 | 3 |
New Eiffel–United Kingdom Border
The small European micronation of the Principality of New Eiffel was entirely enclaved within the United Kingdom of Great Britain and Northern Ireland. Sharing a border of some 156 metres (511 feet), the rectangle-shaped principality had four named borders designated by the four cardinal directions (points of the compass), three of which had border barriers for their entire lengths. The longest, the New Eiffel–United Kingdom North and South Borders, were 68.2 metres (224 feet) long and had no border crossings. The East Border (nicknamed the "main border") was the most frequently crossed border, with between 950 and 1,300 documented crossings annually. The West Border ("back border") was the most fortified border, and had only 20 to 45 crossings annually.
The territory which New Eiffel claimed was located in the Greater London administrative area of England, a constitute state of the United Kingdom of Great Britain and Northern Ireland. A predecessor state to the Principality of New Eiffel, the Republic of New Finland, was founded on 31 December 2017 and laid claim to the rectangle-shaped British territory on 4 January 2018. It was succeeded by the Kingdom of New Finland on 4 June and finally by New Eiffel on 11 August. All borders was slightly redefined in a minor territorial change on 8 May 2019. Following New Eiffel's dissolution on 1 November 2020 after a nearly year-long crisis, all borders were dissolved, and the territory succeeded back to the United Kingdom.
Sharing a border of some 156 metres (511 feet) with the United Kingdom, the rectangle-shaped principality had four named borders designated by the four cardinal directions (points of the compass), three of which had border barriers for their entire lengths. The New Eiffel–United Kingdom North and South Borders were the longest, both at 68.2 metres (224 feet). They had ho border crossings due to being adjacent to private property on the British side. Both borders had a hedgerow barrier consisting of bush and trees for 10 metres (33 feet), as well as a wooden fence for 40 metres (131 feet). The barrier for the North Border also consisted of a structure on the British side, as did the South Border; the latter also continued through a wall between the semi-detached Main Building and a house on the British side.
The East Border—nicknamed the "main border" for its prominence—was the most crossed border annually, with between 950 and 1,300 documented crossings. The crossing had no gate, while the barrier was a small brick wall with a metal topper. Fronting the border on the New Eiffelic side were three potted plants and lights for decoration. The West Border—known locally as the "back border"—was the most fortified border, and had only 20 to 45 crossings annually. The barrier, a metal fence with sharp spikes and anti-climb paint, was built to replace the previous rotted wooden border fence in mid-February 2019 following a break-in in the neighbouring house on the British side. The gate, located at the centre and leading to the Main Route 1's ǃkhās Street, was permanently locked and required a key to open. | <urn:uuid:93fea0ef-a260-4141-b992-90403c803e74> | CC-MAIN-2023-50 | https://micronations.wiki/wiki/New_Eiffel%E2%80%93United_Kingdom_Border | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00840.warc.gz | en | 0.980356 | 668 | 3.328125 | 3 |
Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
The Anglo Saxons (450-1066)
Transcript of The Anglo Saxons (450-1066)
What did the Anglo-Saxons value in their heroes?
Prowess in Battle
Strong Moral Code
A long narrative poem telling about the deeds of a great hero and reflecting the values of its society
Elements of the Epic
Types of Epics
Folk Epic: originally passed down through oral tradition and written long after first composed
Opens by stating the subject/purpose followed by an invocation to a spirit, muse, or supernatural force
Plot begins "in medias res"
Serious tone, lofty in style, long
speeches made by characters to suggest formality
Watch the following video and let the movie clips and song inspire you....
What characteristics do our modern heroes have?
Who are our heroes?
What do we consider heroic?
How does that compare to our modern views?
Modern Hero Discussion Questions
When you were a child, was there a fictional character that you considered heroic? Please describe.
Do you have a hero now (in fiction or real life)? Please describe.
Who are three heroes in society today? Why do you think they are heroic?
Some argue that we have no heroes today for out youth to admire. Do you agree or disagree? Please explain.
What are three qualities that American society admires?
What are three qualities that you admire?
How would you feel you if you were idolized as a hero? What could you do that would seem heroic in someone's eyes?
1. Undergo a journey
2. Save someone or something
3. Go through trials, tribulations, and adversity
4. Have super human strength
5. Extremely ethical
6. Has a tragic flaw that leads to his downfall
Long, dangerous journey
Opportunity to prove heroism and win honor
Demonstrate hero's courage, strength, or virtue
Make up action in the narrative
When hero receives aide from a god or other supernatural force
Backdrop of the story based around important events from nation's/culture's mythology or history
Literary Epic: written down drawing on style and convention of folk epic
Vocabulary for Anglo-Saxon Unit
A pronounced pause in a line of poetry, usually near the middle of the line (pregnant pause)
Ex.: “I promise you this:// she’ll find no shelter,” from Beowulf
A brave character who overcomes great trials and embodies the ideals of his society
A serious poem of lament, usually mourning a death or another great loss
In Old English poetry, an imaginative metaphorical phrase used in place of a single noun
Ex.: whale road = sea
A figure of speech that makes a comparison between two unlike things without using like or as.
The repetition of vowel sound in unrhymed, stressed, syllables
Ex: "batter these ramparts"
The repetition of initial consonant sounds in accented syllables
Adjectives the point out specific traits of particular persons or things.
Usually compound adjectives, like "swift footed"
Anglo Saxons (499/500-1066)
What contributions/inventions came from this time?
Modern English, Roads, Cities and Towns
1. What was the religion of the Celts?
Animism- Spirits all around that have to be pleased (Druids)
Christianity from Rome
2. What sites exist that we know were used by the Celtic priest, Druids?
3. How do Celtic Legends differ from Anglo-Saxon ones?
Full of strong women and fantastic animals, passionate love affairs, adventures in enchanted lands, magic, and more imaginative
The Romans: The Great Administrators
1. What enabled the Romans to conquer the Celts?
Established and disciplined legions
2. What evidence of the Roman rule exists today?
Roman camps grew into cities/towns; Road; Written Scholarship; Christianity
3. After the Roman exit, what made the Celts so susceptible to being conquered by the Angles, Saxons, and Jutes?
No central army or government
The Anglo-Saxons Sweep Ashore
Sweep Ashore Continued
1. Who first defeated the Anglo-Saxons?
The Vikings (Danes)
2. What king is credited with unifying the Anglo-Saxons and why?
Alfred the Great
Under his leadership the English adopt Christianity and defeat the Danes
3. Who ultimately defeated the Anglo-Saxons? What is this called and when did it occur?
1. Describe the rights of women in Anglo-Saxon society.
Could inherit and hold property (offered by a man at proposal of marriage)
2. When were these rights curtailed and by whom?
Ended by Norman Conquest led by William the Conqueror
1. What happened to the Celts and their language?
disappeared with the Anglo-Saxon invasion
Celts driven west (Cornwall & Wales); north (Scotland); and to Brittany, France
2. Who was the most famous Celtic Hero?
3. How can Christianity be credited with assisting Alfred in the unification of the tribes?
Provided a common faith and system of morality
1. Since the Early Anglo-Saxons believed in wyrd, inevitable fate, and didn't believe in an afterlife, how did they think they could achieve a type of immortality?
Fame in poetry
2. What did they portray as the protector of treasure and the personification of "death: the devoured"?
3. The Anglo-Saxon religion was concerned with ETHICS. What qualities were deemed most important?
Bravery, Loyalty, Generosity, Friendship
1. What was provided by the communal halls?
Shelter; A place to hold council meetings; A space for storytellers and their audiences
2. Who were the scops?
Bards- Traveling Minstrels
3. In what ways were these scops as important to the Anglo-Saxons as their warriors?
Responsible for telling history, culture, values, and for providing entertainment.
Preserved the glory and fame of heroes, making them immortal
Anglo-Saxon Religion and "Writings"
Use this video to help with the plot of
War: A Way of Life
1. What is a regular part of Anglo-Saxon life?
War and/or the threat of it
2. Why did Kings give riches to their bravest warriors?
to guarantee their loyalty
3. What did swords symbolize for the Anglo-Saxons?
Worthiness of a warrior to a clan
4. Swords were given names and intricately decorated. Beowulf will have four different swords in the epic. Pay attention to what they might symbolize.
Beowulf blends ideas from Paganism and Christianity:
belief that fate (Wyrd) and supernatural controls life; belief that fame guarantees immortality
belief in personal God, afterlife, and asking God for help in defeating evil
Why is Beowulf important?
• 1st English literary masterpiece
• Earliest European epic written in the native language rather than Latin
• Classic story of good versus evil
• Manuscript has survived from 900 A.D.
• Its influence runs through modern day culture: as seen in Lord of the Rings, 13th Warrior, and games like Dungeons and Dragons!
Setting of Beowulf
The Anglo-Saxon Period
• Angles, Saxons, and Jutes invade Britain in 449
• Kingdoms (in what is now England)
• Everyone’s distinct dialects evolved into Old English
Beowulf as an Epic Hero
• Beowulf’s loyalty and genroustiy towards his subjects exemplified the Anglo-Saxon model of leadership
*Also pay attention to how he exemplfies the other Anglo-Saxon values.
Beowulf may be the first English epic hero, but his legend stems from Norse mythology
Good Vs Evil
Herot (Mead Hall)
The Dragon's Lair
These were like a resume.
The hero/warrior will boast/brag about how awesome he is, where he came from, and the great things he has done in the past.
The boast was meant to inspire courage and faith
The boast is in poetic form and has all elements of Anglo-Saxon poetry | <urn:uuid:20c3cbe4-81a6-4322-aade-1ee58cdb1849> | CC-MAIN-2018-34 | https://prezi.com/044ymfg1aq6t/the-anglo-saxons-450-1066/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218899.88/warc/CC-MAIN-20180821191026-20180821211026-00134.warc.gz | en | 0.924179 | 1,854 | 3.84375 | 4 |
VLSM (Variable Length Subnet Mask) is a technique that network administrators employ in order to use their IP subnet(s) in a more effective manner. By using VLSM, a long mask can be used on a network that has a few hosts and a short net mask on subnets that have a large number of hosts. To use VLSM, however, a routing protocol that supports it has to be used. Cisco routers support the concept with the following protocols: Integrated IS-IS (Integrated Intermediate System to Intermediate System), EIGRP (Enhanced Interior Gateway Routing Protocol), RIP v2, Open Shortest Path First (OSPF), and static routing. VLSM also allows more than one subnet mask within the same network address space, which is also referred to as “subnetting a subnet.”
How does VLSM Work?
Historically, routing protocols required that a single network use the same subnet mask. VLSM allows networks to have different subnet masks if the routing protocol on the network on which it is employed supports it. VLSM also breaks convention in that it uses the first and last subnets, which were traditionally reserved to alleviate the confusion caused when the network and subnet had the same address. When this is done, VLSM supports eight usable subnets that can each support 30 hosts.
How is Route Aggregation Accomplished with VLSM?
When VLSM is employed, the subnetwork numbers are normally grouped together in order to allow the network routers using VLSM to aggregate network traffic. For example, if networks 184.108.40.206 and 220.127.116.11 are kept near each other, then the network routers will only have to store a single route for the two using aggregation. When used in conjunction with CIDR (Classless Inter-Domain Routing), VLSM helps prevent address waste and promotes route summarizing or aggregation on the network. In order to do this, however, the network routers have to be using a classless routing protocol such as EIGRP or OSPF. These protocols carry a 32 bit IP address and bit mask in their routing updates. The routers on the network supporting aggregate routes have fewer entries in their routing tables. VLSM allows routes to be summarized and increases the network’s flexibility by basing route summaries on the higher-order bits shred on the left for contiguous and non-contiguous networks.
Where is VLSM Used?
VLSM is often used in a college campus environment. If the network administrator has a Class B block of addresses to use on several campuses, he/she normally uses variable length subnets. The subnets may then be further divided by building and workgroup on the campuses, which would require different numbers of addresses. If fixed subnet masks were used to allocate the same number of IP addresses to the locations, a number of addresses would be wasted. If VLSM is employed, then there is less waste in the allocated address space across all of the campus locations, giving more room for network growth.
Got Something To Say: | <urn:uuid:5659cec3-88f6-4e20-a284-87724f59732a> | CC-MAIN-2023-14 | https://www.tech-faq.com/vlsm.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00499.warc.gz | en | 0.951279 | 649 | 4.0625 | 4 |
- Topeka, KS, USA
- Associated organizations
- National Science Foundation
- Fields of study
A 1974 IEEE Fellow "for contributions to radio science in the polar regions and for leadership of women in engineering," Irene Peden made pioneering strides for women in science research.
Irene was born in Topeka, Kansas, in 1925. She received her bachelor degree from the University of Colorado in 1947, and her master's and Ph.D. in electrical engineering from Stanford University in 1958 and 1962 respectively. She joined the University of Washington faculty after completing graduate studies, staying there until her retirement as Professor Emerita of Electrical Engineering in 1994.
Irene was one of the UW professors participating in the Antarctic program that the university carried out during the 1960s and 1970s. With support from the Office of Polar Programs at the National Science Foundation (NSF), Irene and her research students conducted theoretical studies and developed new methods for measuring the electromagnetic properties of the Antarctic ice sheet and of the physically inaccessible underlying terrain.
At that time, NSF policy dictated that principal investigators of Antarctic research projects should spend time on-site in order to gain a direct understanding of the region and of the extreme difficulties confronting polar experimental work. Scientists had to battle freezing temperatures, spartan accommodations, isolation, long hours, and a monotonous diet of canned, frozen, and dried food. Irene, then a 45-year old associate professor, had worked on the Antarctic grant for several years already, and hence she was long overdue to make the trip. The problem was that women hadn't even been permitted to do research on the Antarctic coast at that time, let alone in the interior, and the Navy barred her participation. Only after the summer of 1969, when a team of four women geochemists were able to do research in the coast, could Irene get permission to make her trip to the interior.
Irene arrived at the McMurdo station in Antarctica in late October 1970. She faced many pressures, in addition to the difficulties of doing polar experimental work. She never received a shipment of crucial equipment needed to carry out her project. Meanwhile, the NSF station chief in McMurdo was radioing to her that the work must be completed on time, and if not, there would not be another woman on the Antarctic continent for a generation. Irene and the station staff managed to improvise a substitute for the missing equipment. They worked on a grueling schedule to make up for lost time, and they were at last able to achieve their objectives. The experiment was a total success, and it served to open the doors for women in science and engineering research in Antarctica for generations to come.
In 1993 Irene was elected to the prestigious National Academy of Engineering with a distinguished record of technical firsts to her name. A rock in the Antarctic named after Peden stands as a small monument to a great triumph for science and for women. | <urn:uuid:d8386fde-cd81-4166-9228-9079f300a3ef> | CC-MAIN-2018-09 | http://ethw.org/Irene_Peden | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812880.33/warc/CC-MAIN-20180220050606-20180220070606-00418.warc.gz | en | 0.969378 | 598 | 2.65625 | 3 |
Information and Communication Technology (ICT) is increasingly utilized by higher education institutions worldwide. ICT is emerging as a part of on-campus delivery as well as open and distance modalities of higher education delivery. UNESCO actions in this area focus on assisting Member States to develop robust policies in ICT and higher education.
ICT in higher education is being used for developing course material; delivering content and sharing content; communication between learners, teachers and the outside world; creation and delivery of presentations and lectures; academic research; administrative support, student enrolment. Higher education institutions in developing countries are on the whole making the most of computers and software available to them even though challenges including insufficient telephone and telecommunication infrastructure, lack of training resources for teachers, and lack of skilled and experienced information technology specialists to assist with development, maintenance and support of ICT usage in higher education institutions (HEIs) remain.
Positive ICT policies and investments are clearly beneficial to HEIs, even though ICT has not replaced classroom-based modes of learning or teaching. Undoubtedly, ICT can provide greater access for different target learners, and has become a vehicle for enriched pedagogical experiences, particularly for distance educators and learners separated by time and space. Coordinated implementation of new or revised policies will likely require the involvement of outside Ministries (such as Telecommunications, Trade, Health) and national private and non-government educational boards and agencies (for accreditation and recognition where applicable). | <urn:uuid:f81f3806-7172-4dd6-8cbf-91b5fa454bbe> | CC-MAIN-2013-48 | http://www.unesco.org/new/en/unesco/themes/icts/lifelong-learning/higher-education/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164013027/warc/CC-MAIN-20131204133333-00089-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.952189 | 293 | 2.6875 | 3 |
Examinations have been made easier physically, not mentally speaking--for both student and instructor by the mechanical marker. It aids the student by eliminating the essay examination. It aids the instructor by grading the examination papers at the rate of 300 to 400 per hour.
Each student uses a graphite pencil and a special examination sheet. All he has to do is to make a pencil mark about a quarter of an inch long in one of the five answer columns accompanying each question. In the grading machine, the examination sheet is pressed against 750 both of electric contacts corresponding to the 750 answer positions on the paper. The pencil mark on any of the answer positions on the sheet closes an electric circuit, and with the graphite acting as the conductor of current, the machine automatically records whether the answers are right or wrong. A dial shows instantly the number of answers the student got right and wrong.
One of the first institutions to install this boon to the academic world was Purdue University where these pictures of the grader in action were taken. | <urn:uuid:8e868735-d2e7-4513-90ee-32e80e8dd5a3> | CC-MAIN-2017-09 | http://www.thecrimson.com/article/1938/4/26/machine-grades-exams-pexaminations-have-been/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172018.95/warc/CC-MAIN-20170219104612-00256-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.943503 | 206 | 2.875 | 3 |
by guest blogger Mike Schade, of the Center for Health, Environment & Justice (CHEJ)
While millions of children across America returned to school this month, many parents were unaware that children's back-to-school products currently on store shelves contain high levels of toxic chemicals called phthalates, used to soften vinyl plastic.
These chemicals are so toxic they've been banned for use in toys in the United States because of adverse health effects like birth defects, asthma, attention deficit hyperactivity disorder (ADHD), and diabetes, among others.
We recently conducted a study, Hidden Hazards: Toxic Chemicals Inside Children's Vinyl Back-to-School Supplies, which found that a whopping 75 percent of the back-to-school products we studied had higher levels of this toxic chemical than is deemed safe and allowable by law in children's toys. And experts at the Centers for Disease Control and Prevention say that children are most at risk from exposure to these chemicals.
United States Senator Charles E. Schumer (D-NY) is, and he and I have joined forces to bring this situation to the light.
Why are these chemicals on children's back-to-school products? Because there are currently no restrictions on their use in children's products like school supplies.
So, as part of an effort to provide greater regulatory control over the use of toxic chemicals in children's products, Senator Schumer called on the White House's Office of Management and Budget (OMB) to finally approve a list of 'chemicals of concern,' including phthalates, which was then submitted by the Environmental Protection Agency (EPA). The EPA is proposing to classify them as chemicals that present or may present an unreasonable risk to people's health, which could be the first step toward regulation of phthalates by the EPA. The plan has been under review for more than two years at the OMB. To date, OMB has not approved the request.
We also need passage of the Safe Chemicals Act, sponsored by Senator Frank Lautenberg (D-NJ) and co-sponsored by Senator Schumer, which would require all chemicals to be evaluated for safety. The legislation would give the EPA new authority to test and restrict the use of chemicals that cannot be proven safe by manufacturers.
Our study found that elevated levels of toxic phthalates were widespread in children's lunchboxes, backpacks, and three-ring binders, including Disney and Spider-Man lunchboxes and backpacks. The study tested 20 popular children's back-to-school products and analyzed for phthalates and heavy metals. Four children's lunchboxes, four children's backpacks, four three-ring binders, four pairs of children's rainboots, and four children's raincoats were purchased and tested. All products were purchased in New York City during the 2012 "back-to-school" shopping season at dollar stores and other retailers. Laboratory tests were conducted by Paradigm Environmental Services in Rochester, NY.
Some results from the study:
- The Dora the Explorer Backpack contained phthalate levels over 69 times the allowable federal limit for toys.
- The Amazing Spider Man Backpack contained phthalate levels over 52 times the allowable federal limit for toys.
- The Disney Princess Lunchbox contained phthalate levels over 29 times the allowable federal limit for toys.
- The Smart Fit Kids Pink Rainboot contained phthalates levels over 20 times the allowable federal limit for toys.
- The Brown Polka Dot/Hot Chocolate 1" Hard Binder contained phthalate levels over 11 times the allowable federal limit for toys.
Back-to-school season has offered some businesses another opportunity to further expose our children to harmful chemicals. It's outrageous! But we can do something about it.
Make sure your Back-To-School Gear is Safe: The CHEJ report, showing which common back-to-school vinyl products contain phthalates, can help you can take necessary steps to protect our families from harmful chemicals. The more we know, the smarter choices we can make. You can also check out the Back-to-School Guide to PVC-free School Supplies, to find safer school supplies in over 40 product categories.
It's time for Congress to move forward and pass the Safe Chemicals Act to protect our children and schools from toxic exposure. Urge Your Representatives to pass The Safe Chemicals Act!
Mike Schade is the Markets Campaign Coordinator with the Center for Health, Environment & Justice (CHEJ), a national environmental health organization. Mike has over a decade of experience working on environmental health and justice issues. He is the author or co-author of numerous reports including: Baby's Toxic Bottle-BPA Leaching From Popular Baby Bottles, No Silver Lining-An Investigation Into BPA in Canned Foods, and Toxic Toys R Us.
For more from Maria Rodale, go to www.mariasfarmcountrykitchen.com
HuffPost Lifestyle is a daily newsletter that will make you happier and healthier — one email at a time. Learn more | <urn:uuid:0b4c7cda-64cb-467a-bb8c-2ac93e6c7e7d> | CC-MAIN-2016-50 | http://www.huffingtonpost.com/maria-rodale/toxic-back-to-school-gear_b_1918669.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542687.37/warc/CC-MAIN-20161202170902-00052-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.954944 | 1,042 | 2.8125 | 3 |
Rugilus subtilis (Erichson, 1840)
This Western Palaearctic species is widespread in Southern and Central Europe, extending north into the Netherlands, UK, Germany and Poland and west into parts of European Russia, to the south it reaches Greece and Turkey and a few sites in north-eastern Spain represent the western limit of the distribution. Throughout most of the range it is very local and scarce; in the UK it is known from a few sites in Kent and Sussex and there are a very few scattered records from the midlands and East Anglia. Here it is often associated with chalk grassland but on the continent it occurs more widely, on open grassland and arable land, damp meadows and woodland, clay and limestone pits as well as wetlands, river margins and ditches etc., it is a mostly lowland species but has been recorded up to 1300m in Turkey. Adults probably occur year-round; they are active from March until October although most records are from the spring and they are only rarely recorded during the summer. They occur among matted vegetation, under debris or among moss and plant roots and specimens have been recorded from a hollow willow trunk on the continent, they rarely seem to be active in the open and are usually recorded by sieving suitable material although they occasionally occur in pitfall traps.
5.6 mm. Body very finely pubescent, rather shiny black or with the elytra reddish towards the apex, mouthparts reddish but for the penultimate maxillary palpomere which is partly darkened, antennae red, legs reddish-brown, usually with the femora darkened apically. Head quadrate with small and weakly convex eyes and continuously-rounded temples, surface densely punctured throughout, confluently so towards the margins and smoothly curved anteriorly, labrum with two small teeth and a median notch. Mandibles long, curved and sharply pointed, internally with strong teeth in the basal two-thirds, three on the left mandible and four on the right. Antennae placed on tubercles in front of the cheeks and outside the margin of the mandibles, 11-segmented with the basal segment the longest and subsequent segments progressively shorter to a pointed terminal segment. Pronotum elongate and distinctly narrower than the head, broadest along a short and almost straight lateral margin and angled to a narrow neck and straight basal margin, surface densely and confluently punctured but for a narrow central strip which is often confined to the basal half. Elytra weakly curved laterally from rounded shoulders to separately recurved apical margins, sutural border depressed, often with a longitudinal sub-lateral depression, otherwise smooth and finely but not densely punctured throughout. Basal abdominal tergites densely punctured, more strongly so across the weakly depressed base, apical tergites more finely and sparsely punctured throughout. Sub-apical abdominal sternite with a strong median notch in males, smoothly curved in females. Legs long and slender, femora unarmed, front tibiae weakly sinuate internally, middle and hind tibiae smooth and hardly broadened from the base. Tarsi 5-segmented and simple; the front tarsi at most only slightly broader than the others. Claws smooth and appendiculate. | <urn:uuid:f756b906-73ab-44d3-bb19-73ab2bd0e5c1> | CC-MAIN-2023-50 | https://www.ukbeetles.co.uk/rugilus-subtilis | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00051.warc.gz | en | 0.953206 | 683 | 2.9375 | 3 |
If you are feeling a little unsure on identifying the equation of a straight line then use this Desmos graph and experiment by changing the gradient, intercept or points marked on the line. The image above shows the line y=2x+1. We can see that the intercept is 1 (where the line crosses the y axis) and the gradient is 2. Looking at the graph we can see that the gradient is positive and you can verify that the gradient is 2 by dividing the difference between the y coordinates (6 in this image) by the difference in the x coordinates (3 in this image). Try moving the points, you will see that this ratio remains constant.
Compare the second image. We can see that the intercept is 1. Looking at the slope, the gradient is positive. The gradient is given by 2÷4 = 0.5. So the equation of the line is y = 0.5x + 1.
In the third example; looking at the slope of the line we can see it is negative. The gradient is given by 6÷2 which is 3 and the line crosses the y axis at 2 giving the equation of the line as y = ─3x + 2
Since writing this post Desmos have taken the page and created a superior version! | <urn:uuid:df0b9565-dbc8-40be-b98f-a6c8d992e271> | CC-MAIN-2022-05 | https://mathematicsforstudents.wordpress.com/2013/11/22/exploring-straight-lines/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305494.6/warc/CC-MAIN-20220128104113-20220128134113-00669.warc.gz | en | 0.924296 | 268 | 4.03125 | 4 |
The New Year has brought an historic wintry blast of cold temperatures to millions of people. There has also been a high number of home fires during the severe cold, and a storm is headed for California which could cause mudslides and debris flows in some of the areas impacted by the recent wildfires. The American Red Cross is busy helping people affected by these situations and has steps people can take to stay safe.
RED CROSS RESPONSE
Almost 100 people spent Sunday night in Red Cross and community shelters. Red Cross workers had shelters open in Massachusetts, New Hampshire, New York, Indiana, Florida, South Carolina and Virginia to help people dealing with the brutal cold.
Home fires are also on the rise. Over the weekend, the Red Cross responded to numerous fires, including some in Georgia, Alabama, Tennessee, New York, Pennsylvania, Louisiana, Florida, South Carolina, Ohio and Texas.
In California, evacuation orders are up in Santa Barbara and Ventura counties where a strong storm could increase the risk of flooding and debris flow in areas now scarred by the recent wildfire. The Red Cross is opening an evacuation center and deploying trained disaster volunteers to assist.
PREVENT HOME FIRES
With cold temperatures there is often a rise in the number of home fires. Follow these tips to help prevent a fire in your home:Have furnaces, chimneys, fireplaces, wood and coal stoves inspected and cleaned before another winter of use. If using a space heater, look for a model that shuts off automatically if the heater falls over. Place the heater on a level, hard and nonflammable surface in the home. Keep all potential sources of fuel like paper, clothing, bedding, curtains or rugs at least three feet away from space heaters, stoves, or fireplaces. Portable heaters and fireplaces should never be left unattended. Turn off space heaters and make sure any embers in the fireplace are extinguished before going to bed or leaving home. Keep children and pets away from space heaters. Cut down on heating costs. Insulate the home by installing storm windows or covering the inside of windows with plastic to keep cold air out.Never use a cooking range or oven to heat your home. Keep fire in your fireplace by using a glass or metal fire screen large enough to catch sparks and rolling logs. Test batteries in smoke and carbon monoxide detectors. Develop a fire escape plan and practice it with everyone who lives in the home.
THAWING FROZEN PIPES
The unusually cold weather is resulting in frozen water pipes for many. If you turn on a faucet and no water or only a trickle comes out, suspect a frozen pipe. Likely places for frozen pipes include against exterior walls or where your water service enters your home through the foundation.Keep the faucet open. As you treat the frozen pipe and the frozen area begins to melt, water will begin to flow through the frozen area. Running water through the pipe will help melt ice in the pipe.Apply heat to the section of pipe using an electric heating pad wrapped around the pipe, an electric hair dryer, a portable space heater (kept away from flammable materials), or by wrapping pipes with towels soaked in hot water. Do not use a blowtorch, kerosene or propane heater, charcoal stove, or other open flame device.Apply heat until full water pressure is restored. If you are unable to locate the frozen area, if the frozen area is not accessible, or if you cannot thaw the pipe, call a licensed plumber.Check all other faucets in your home to find out if you have additional frozen pipes. If one pipe freezes, others may freeze, too.
DOWNLOAD APPS People can download the Red Cross Emergency App for instant access to weather alerts for their area and where loved ones live. Expert medical guidance and a hospital locator are included in the First Aid App in case travelers encounter any mishaps. Both apps are available to download for free in app stores or at redcross.org/apps. | <urn:uuid:b182bb75-1cd0-4443-9521-be2576376195> | CC-MAIN-2020-45 | https://www.redcross.org/about-us/news-and-events/news/2018/Red-Cross-Responds-to-Cold-Home-Fires-California-Storm-Issues-Safety-Steps.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107865665.7/warc/CC-MAIN-20201023204939-20201023234939-00016.warc.gz | en | 0.917928 | 830 | 3.015625 | 3 |
An outbreak of measles is rampaging across Europe, taking a huge toll. In the first six months of 2018, there were 41,000 recorded cases of the easily preventable viral infection.
That six-month period saw nearly double the highest number of cases in a year since 2010 – which was 23,927 in the entire 12 months of 2017 – and lost 37 lives to measles. And according to experts in the US, that’s what America could be facing too if parents don’t vaccinate their children.
“We have a very serious situation,” pediatric doctor Alberto Villani of Bambino Gesù Pediatric Hospital and the president of the Italian Pediatric Society in Italy told NBC.
“People are dying from measles. This was unbelievable five or 10 years ago.”
And, yes, unequivocally, the reason for the severity of the outbreak is the fall in vaccination rates. In order to prevent outbreaks, at least 95 percent of the population needs to be vaccinated with two doses of the measles, mumps and rubella (MMR) vaccine.
In some parts of Europe, according to the World Health Organization (WHO), vaccination coverage is at less than 70 percent.
“It’s the main factor leading to the outbreaks,” Anca Paduraru of the European Commission in Brussels told NBC. “It’s unacceptable to have in the 21st century diseases that should have been and could have been eradicated.”
Measles is already on the rise in the US. Last year saw Minnesota’s worst outbreak in decades, and earlier this year there was an outbreak in New York City. There’s an outbreak underway in Brooklyn right now, with six cases cropping up last week, all of them in unvaccinated children (one too young to have been vaccinated).
Last year, the US Center for Disease Control studied the growing number of measles outbreaks in the US, and found that 70 percent of new cases occur in unvaccinated patients.
As we reported then, the anti-vaccination movement has been growing in recent years, partially thanks to a dishonest (and since retracted) 1998 study by former physician Andrew Wakefield, who was struck off the UK medical register for misconduct.
Wakefield’s study used deliberately falsified results to make the fraudulent claim that there was a link between the MMR vaccine and autism – possibly to eliminate a rival for the alternative measles vaccine he had patented.
Although subsequent research has found that there is absolutely no link between vaccines and autism, never mind a causal one, many still believe it and refuse to vaccinate their children – including the MMR vaccine.
Measles has been eliminated from the US – that is, no new cases originate within the country – but outbreaks occur when it is imported from outside. The NYC outbreak was caused by a tourist, and the current Brooklyn outbreak was the result of an unvaccinated child travelling to an area in Israel currently undergoing a measles outbreak of its own.
“What has been happening in Europe is now happening in the US – on a smaller scale at this point,” said Peter Hotez, director of the Texas Children’s Hospital Center for Vaccine Development at Baylor College of Medicine.
But it could get a lot worse if something isn’t done. A 2014 paper found that the efforts to correct misinformation were woefully inadequate compared to the concerted effort put in by anti-vaccination campaigners, who use the internet to spread their anti-science message.
That message is a lot more dangerous than you might think at first: if just five percent of a community refuses to vaccinate, this can have a disproportionate effect on public health, tripling the annual measles rate.
This, in turn, doesn’t affect only the patients, but has an impact on the entire community – increasing hospital load and costing a conservative estimate of US$2.1 million for the public health sector.
Measles is also insanely infectious – and potentially deadly, particularly for small children. In 2016, there were 89,780 measles deaths globally, most of them in children under the age of 5.
And in the decade prior to the introduction of the MMR vaccine in 1963, there were between 300 and 700 deaths reported annually in the US due to measles.
“People don’t see them and so they forget about them or they think the diseases don’t exist anymore,” said professor of medicine Jeffrey D. Klausner of the University of California, Davis.
“They don’t realise their child is at risk for measles meningitis, encephalitis and permanent brain damage.” | <urn:uuid:e5b55533-a871-411a-ba13-99373d758c44> | CC-MAIN-2018-51 | https://trueviralnews.com/because-of-anti-vaxxers-37-people-in-europe-have-died-of-measles-this-year/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831334.97/warc/CC-MAIN-20181219045716-20181219071716-00303.warc.gz | en | 0.966599 | 972 | 2.953125 | 3 |
Regardless of what you do for a living, public speaking skills can come in handy. Whether you will be addressing customers, coworkers, or your boss, you need to be able to make your point known and persuade the people listening to you. The tips that follow will help you learn how to communicate more effectively when giving a speech.
You cannot give a speech and automatically assume that everyone will follow what you say. You need to work hard if you want their attention, and you need to work harder if you expect to keep it. Since this is technically a performance, you have to work to get the desired results.
Public speaking needs to be taken seriously. You can’t just get up and speak and expect that everyone will hang on to your every word automatically. You have to capture and retain their attention. You can almost liken a speech to giving a dramatic performance.
Being prepared is key to making good public speaking impressions. Know what you’re going to say. Perform research for supporting your statements, if you can. Write down the information you plan to say. Also, remember to memorize your words so you look professional while speaking. The more time you take to be prepared, the more confident you will be while speaking.
If you are prepping, practice a lot and memorize what you need to prior to speech day. After your speech is memorized, then you can start worrying about your actual delivery. With your speech firmly implanted in your mind, it will be much easier to naturally ad lib when you finally give it.
Know your material inside and out. While you will probably practice beforehand to memorize it, you sill need to know any data or facts that you could be asked about that are related to your speech. If you have time, you can add in some of these things throughout your speech as needed. You can use them to answer questions too.
Learn the material as well as possible. Keep to facts and other information that is directly related to your speech. Depending on the type of audience and how receptive they are, you can weave in stories as you go along. You can use them to answer questions too.
Always make sure to look at your audience. Keep your focus on what you are doing and not allow yourself to get distracted. You must command the attention of your audience.
Practice your speech more than once after you memorize it. Rehearse your speech often to make needed corrections. Try to maintain calm breathing during the speech. Make sure there are pauses between key points so that people can react with applause. Practice the speech with any equipment you plan to use.
Understand the audience you are speaking to. If possible, find out some of the individuals that will be in the crowd. If possible, greet them when they arrive. Include some of the people in your speech, and this will give it a much more friendly tone.
Gain an understanding of the audience. If there is a way, find things out about some individuals in the audience. Stand by the door as they come into the room, and try to get to quickly know them. Having a feeling of familiarity with some audience members can make the whole presentation or speech feel more friendly.
Speaking the truth in sort of a story form helps make public speaking less complicated and more effective. Make sure to outline your speech. Your story should sound very credible. Base your story off of real life so your speech is natural and authentic.
Try telling true stories to better your public speaking. Make sure to outline your speech. Your story should have a clear beginning middle and end for better communication of your ideas. Be sure you use true life events in order to sound really authentic.
Deep breathing can help curb your anxiety. Breathing in deeply and exhaling fully prior to starting your speech helps control your nerves. Use your nose to inhale to a count of four, and then exhale with your mouth to at least a count of five. Do this six times, and calm will be yours.
Breathe calmly if you are afraid of public speaking. Taking some deep breaths and then exhaling all the way before giving a speech can reduce nerves. Breath using four-count nasal inhales and five-count mouth exhales. Do this approximately five times to feel a difference in how calm you feel.
Even if the event you’re speaking at is casual, dress nice. The way you looks reflects on your speech. Men should consider wearing a necktie when possible, as it does direct audience eyes to the face and head so they focus on your speaking.
Practice is the only way to make sure that you are aware of what you want to convey. Tweak your speech by recording it and practicing in front of your mirror. You can also include friends and family in the audience.
Try not to drink booze before speaking. Though it may work to loosen you up, that might just be a bad idea. Many great speeches turned bad from too much alcohol; don’t make yours one of them.
To get others to remember your speeches, make memorable endings. While some parts are important in a speech, the ending is usually what is most remembered. If the finish is boring, you speech will soon be forgotten.
Take the time to fully understand your material if you hope to give a great speech. Your topic should be something that you are genuinely interested in and have experience with. Speak in a conversational tone to impress the audience with what you know rather than confusing them with unfamiliar terminology.
Make use of note cards. Having a copy of your speech is a good idea, even when you have the speech memorized. Do not write the whole speech down, but jot down important bullet points.
Before you even give your speech, get your audience on your side. As they come into the area, smile at them and perhaps greet them personally. Doing this will help you feel confident.
When you speak to a large group, it is essential for you to have a voice that is clear and strong. Have a cup of water with you while delivering your speech. Don’t drink dairy or soda immediately prior to your speech. These fluids are saliva-thickening and can even encourage mucous production. A caffeine free tea will ease your tension and relax your voice.
You want your visual aids to be attractive, but not distracting. Visual aids should enhance the information you are giving. You don’t want them to become distracting or overwhelm the message. Utilize visual aids of high quality to drive home important points. Make them colorful and pleasing to the eye while not distracting listeners from paying attention to what you are saying.
Picture what you’re going to say before working on your speech. Visualize yourself delivering the speech and also think about how the audience will react. Watching yourself speak and hearing the listeners react well can help you feel more prepared for the actual event.
Don’t make people wait to ask questions. In fact, waiting until the end may be counterproductive, as some individuals will forget what they wanted to say. Most people will appreciate a time to ask questions when needed.
Don’t make your audience wait to ask questions at the end of the speech. People may likely forget the questions that they had. They’ll feel a lot better if they can ask questions as they have them, so be prepared to answer.
Think positively about your speech. It is generally normal to feel anxious. Almost everyone feels this way. Try to stay as positive as possible before a speech. If you start thinking about failing, chances are you will fail. Instead, know that you will rock it.
Never go into a speech unprepared. This is not a good idea, even if you are an expert at what you are speaking about. You might make a speech that is not the worst ever. But, you may forget some important points.
When you make a public speech, it’s often a good idea to find a connection with those you’re speaking to by relating a story to them at the beginning. Use a hypothetical situation, a topical news event or even a personal experience. Help your audience empathize an understand by adding an appealing human element to the story. Do not make any parts of your speech offensive.
Prior to giving any speech, try to assess the audience. Every group of people has different expectations of you. For instance, colleagues will expect your speech to teach them something. Loved ones want to be entertained. Regardless of your audience, it’s always important to deliver what they are looking for.
Before giving a speech, know your audience. Every audience has different expectations. Businessmen will be expecting to learn something new from you. Family and friends will likely want to be entertained. It does not matter who your audience is as long as you provide what they want.
If you’re nervous, envision yourself sitting among the audience. Are you the kind of person that would chuckle and point out mistakes of the speaker? Would you think the speaker wasn’t good? If an error happens, do not worry.
Moving up in the world is all but impossible without public speaking skills. The goal of speaking in public is to illustrate a point to your audience and to gain their support. Follow these tips to make strong, persuasive speeches.
Don’t tell the audience that you’re nervous about speaking before them. They will regard your speech more highly if you simply deliver it to them without any personal confessions. Though you may believe the audience can see your fears, they can not. It is best to allow the audience to believe that you are fully in command and confident, even if you feel like butterflies are battling it out in your stomach. | <urn:uuid:5c848190-911c-4d99-9752-01104b896833> | CC-MAIN-2018-51 | http://akcept.dk/learn-everything-about-public-speaking-in-this-article-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832559.95/warc/CC-MAIN-20181219151124-20181219173124-00426.warc.gz | en | 0.957415 | 1,997 | 3.015625 | 3 |
Click here to learn more about my youth pitching program.
Are you interested in learning more about a pitcher's fielding responsibilities?
In this article, you'll learn everything you need to know about how pitchers can improve their defensive skills on the field.
You'll also learn pitchers fielding practice drills (pfp drills) and other tips to become more proficient at fielding your position and preventing the other team from advancing bases or scoring.
Let's get to it...
Often overlooked and under utilized, Pitchers' Fielding Practice is an essential part of a pitcher's repertoire and can be a critical factor in winning or losing ball games.
Greg Maddux certainly knew something about that...
Most agree he was the best fielding pitcher of all-time. And he's got 18 Gold Glove Awards over his 23-year career to back the claim.
In fact, Maddux is the only pitcher in Major League history to sweep an entire decade (1990-1999) of Gold Glove Awards.
As Maddux demonstrated time and again throughout his career, a pitcher's fielding responsibilities include fielding ground balls and bunts, turning double plays, backing up bases and holding runners.
Doing these little things well can mean the difference between a run scoring or even winning a game.
The bottom line is this:
Fielding is something every pitcher should be good at; there isn't any reason in the world why a pitcher should not be a good fielder.
Pitching coaches will acknowledge that instinct and athleticism play a role in how well a pitcher is able to field his position, but I also say "situational awareness" in games and repetition through pitchers' fielding practice or PFPs can improve a pitcher's skill and install proper technique.
1. Fielding ground balls
A good fielding pitcher can help himself and his team by getting a few extra outs, stopping runners from advancing on overthrows, minimizing stolen bases, covering for teammates, and starting double plays.
Here are some basic guidelines for pitchers when fielding ground balls:
- The slower the ball is hit, the faster the pitcher must move toward the ball.
- The slower the ball is hit, the more important it is for the pitcher to get his feet and body set to throw the ball.
- The pitcher should use two hands if the ball is moving, and only bare hand if the ball has stopped.
- If the ball has stopped rolling as you reach it on the run, press down before picking it up. It's counter intuitive, I know, but pressing down will actually help you get a firmer grip on the baseball and make it easier to pick it up.
- The key to proper fielding is to be square to the ball as it approaches. This position maximizes the glove area open to the ball, and provides a bigger obstacle for the ball to hit should it prove difficult to handle.
- If you have time, get over and into the path of the ball. Lead with your glove, always keeping it out in front of your body. Do your best to get in front of the ball; but if you can't, then judge the speed and trajectory of the ball to field it on the run.
- Once you're in front of the ball, your glove foot should be slightly ahead of your throwing foot, with your glove wide open very close to the ground. This position allows you to turn, look, step and throwing quickly.
- Remember to extend the glove in front of the body toward the ball. Keep the glove low! You can bring the glove up much quicker than you can move it down.
- Watch the ball all the way into your glove, using both hands trap the ball in the glove, and then to get the ball out of the glove quickly for the throw.
2. Pick off plays to first base
Let's take a closer look at the pick off move to first base. Check out Johnny Cuerto's move...
The pitcher can throw over to first base after he comes to a set position, or as his hands move up or down while getting ready to come to a set position, as long as the first baseman is at the bag holding the runner.
As the pitcher, particularly a right-handed pitcher, is starting his hands up to get into a set position, he may choose to turn and throw over to first.
He may also turn to throw over as his hands move downward to assume the set position. This move is particularly effective if the base runner tries to get an early lead or if the base runner tries suddenly to extend his lead.
Many pitchers, like Royals right-hander James Shields, think the power of a great pick off move lies in a pitcher's ability to make concise movements. Shields said he's always focused on having quick feet and a short arm stroke.
That attention to detail has made him one of the best at picking off base runners. Tallying two pick-offs so far this season, Shields has a total of 26 pick-offs since making his Major League debut in 2006, which is the most by any right-hander in that span.
"For me, it's just identifying and recognizing leads," Shields said. "If you understand how to identify leads at first base, you know when to pick and when not to pick. It's kind of evolved into more of a recognition thing rather than trying to get any better."
The left-handed pitcher is facing the runner. A lefty may also throw to first base before coming to the set position, but he can create more deception by using balance and timing after he comes to the set position.
If the first baseman is holding the runner, the pitcher can turn and throw whenever he’s ready. If the pitcher is right-handed, the catcher can keep an eye on the runner’s lead and can signal the pitcher to throw to first.
If the pitcher is left-handed, he has a good view of first – and the runner will be more careful.
Since your first baseman will move off the bag once the pitcher starts his delivery to the plate, you can use his movement to your advantage.
Many runners will key off the first baseman to now when a left-hander is going to the plate. Develop a signal between your first baseman and pitcher so they’ll know the play is on; then have your first baseman take a quick step off the bag as if he’s getting ready to field his position.
The runner may automatically start to extend his lead, and if the first baseman retreats as the pitcher is throwing to first, you may catch the runner off guard.
When the first baseman plays behind the runner, the pitcher and the first baseman will have to work out a signal to execute the play. The pitcher has to know the intention of the first baseman or he’ll throw the ball away or balk. If he knows the first baseman will move to the bag, a timed pick off can be effective. This can be done by counting or by having the pitcher visually time the movement of the first baseman.
When the first baseman playing behind the bag, a count pick off works well and can surprise the runner. Generally, on a count pick off, the movement toward first base by the first baseman begins when the pitcher turns his head to look toward home plate. The pitcher begins to count one thousand one, one thousand two, and when he reaches the one-thousand-three count, he turns and throws to the first baseman, who should just be reaching the bag to make a tag. That’s just an example – you’ll have to practice the play to determine the right count to use for your players.
You can also use a timed play for bunt situations. If the first baseman holds the runner at first, he has to move off the bag and charge toward home plate for a bunt or when the batter simply squares to bunt. A good planned play calls for the first baseman to leave early on bunt situations. The pitcher waits until the first baseman is ready before throwing to the batter. As the pitcher throws to the plate, the first baseman charges directly towards home.
On the next pitch, the pitcher comes set, and the first baseman charges home before the pitcher delivers. After taking three steps toward the plate, he goes quickly back to first and takes the throw from the pitcher who has timed his movement. Ideally, the ball and the first baseman arrive at first base at the same time. If you run this play you can catch a runner who has gone to a secondary lead too early.
3. Pick off plays to second base
Picking runners off second is tough. At the very least, you’ll need to keep the runner honest and using pick off plays will at least create doubt in the runner’s mind.
The shortstop or second baseman is responsible for keeping the runner close to the bag.
The pitcher should not throw to home plate until the runner at second base is stabilized or forced back toward the bag.
Never allow a walking lead, unless the runner is hesitant and walking a few steps from the bag.
If the infielder is unable to stabilize the runner or minimize his lead, the pitcher should step off the rubber.
4 pick off plays to second base
There are several basic pick off plays you can use. Let’s take a look at them:
- COUNT PLAY
After the middle infielder, usually the shortstop, gives a signal, the pitcher turns his head toward the hitter.
That starts the count for the pitcher and tells the infielder to start moving to the bag.
The pitcher counts, then turns and throws to the bag.
The goal is for the ball and the infielder to arrive at the same time.
To make the play more deceptive, the infielder giving the signal may signal to the pitcher to look back at the plate more than once. The count can begin on the look the infielder calls for.
For example, your infielder could signal the pitcher to count on two—the pitcher looks back to second, looks back again, and starts his count.
That will keep runners from being tipped off when a count play is on.
- DAYLIGHT PLAY
When the shortstop is covering the bag and gets closer to the bag than the runner so that the pitcher can see daylight between the two, the pitcher should turn and throw to the bag.
When the shortstop gets far enough ahead of the runner to show daylight to the pitcher, he should always continue to the bag.
The pitcher must throw to him or step off—if he throws to the plate the shortstop will be way out of position.
To let the pitcher know he’s continuing to the bag, the shortstop can point his glove toward the bag to show he’s definitely going all the way to the bag. That signals the pitcher that a pick off play is on.
If the second baseman is covering the bag, his bare hand should extend toward the bag to tell the pitcher that a pick off play is on.
- FAKE-AND-GO PLAY
Both middle infielders and the pitcher are involved in the fake-and-go play.
After the signal is given, one middle infielder moves quickly to the bag. This action should force the runner to step back toward the base.
After drawing the runner back, the covering middle infielder moves quickly back to his position, causing the runner to move toward third base and re-extend his lead.
As the covering middle infielder starts back to regain his fielding ground, the other middle infielder moves quickly to the base to receive the throw from the pitcher.
The pitcher times the second infielder.
His throw ideally arrives at second base as the second infielder gets to the bag. Either middle infielder may break first and retreat from the base, leaving the other middle infielder responsible to time the action, move in to receive the throw, and make the tag on the runner.
A signal lets the pitcher and infielders know which infielder will fake and which will to take the throw.
- IN-OUT PLAY
The in-out move is a pick off play one infielder executes.
The play starts with the normal process of driving the runner back to the bag. As the shortstop moves toward the bag, he can read the base runner's reaction.
If the runner immediately moves back to take a lead as the shortstop goes back to his fielding position, the in-out can be effective.
To run the in-out, the shortstop moves off the bag in a different angle than normal. The pitcher will need to be able to recognize the difference in the angles.
The shortstop moves off the bag but drifts toward center field so that the pitcher can recognize that a pick off play is on. The runner assumes he’s moving back to his position, extends his lead, and the shortstop heads back to the bag to take the throw from the pitcher.
The shortstop can also indicate the pick off play is on by opening his glove to the pitcher.
This pick off is like the daylight method – it can be done on the fly. The second baseman can use the in-out play as well.
4. Pick off plays to third base
Prearranged pick off plays can be used at third base.
The pitcher and third baseman can use the count method, or the third baseman can break for the bag when the right-handed pitcher is at the top of his leg lift.
The third baseman can also work an effective pick off with the pitcher by pointing with his bare hand toward the base, indicating to the pitcher that he is going to the bag.
The pitcher should time the third baseman and get the ball to the bag as the third baseman arrives.
Not as many pick off attempts are made at third as are made at other bases, yet they should be in my opinion—that's because holding the runner makes it less likely he’ll advance on a passed ball.
Just like with any other base, though, if the runner is taking a cautious lead, keep an eye on him but don’t risk a throw.
5. Pick off plays with the bases loaded
The catcher starts the bases-loaded pick off play, which is most effective when the shortstop covers second.
This planned play requires a signal to the shortstop and the pitcher.
The catcher signals the pitcher should pitch from a wind-up. That will make all runners relax.
Then, the catcher signals the pitcher and the shortstop that a pick off at second is on.
The shortstop breaks for second, and the catcher signals the pitcher when to turn and throw to second.
The catcher will have to time the play so that the shortstop and the ball arrive at the same time, and he is responsible for the timing between the shortstop and the pitcher. The shortstop has to stay alert for the runner at third breaking for home.
This pick off can also be used when runners are at second and third.
6. Pick off plays for first and third situations
With runners on first and third, the pitcher can control of the situation. At a minimum, he can cause the runners to be cautious.
You’ll often hear people say this play doesn’t work.
Does it result in an out?
Not very often…
...but if it freezes a runner or causes him to be hesitant, it’s worked.
And if your pick off moves get a runner out, great! If they don’t, but they cause the runners to be less aggressive, they’re still working, in my opinion.
The right-handed pitcher should make the start of his delivery look normal by lifting his stride leg to its normal height.
He should look home before and during the leg lift.
Because this is prearranged, he can use balance to make it look as though he is going to throw the pitch to home. But instead of striding toward the plate, he sets his stride foot down by using a shorter stride and directing the stride foot toward third base.
After a short stride toward third base, the pitcher releases his push-off foot from the rubber and then quickly pivots and throws to first base. In essence he’s faking to third and throwing to first – just make sure he takes his foot off the rubber before he throws to first.
At the least, this move causes the runner at first to stay closer to the bag. If the runner at first base starts to steal as the pitcher lifts his leg, the runner can be picked off.
This play can also be run the opposite way. The right-handed pitcher should quickly step back off the rubber, fake a throw to first, and then use a full pivot and try to pick off the runner at third base.
The left-handed pitcher can step back off the rubber, fake a throw to first, and then pivot to try a pick off at third. The left-hander can also fake a throw to third, get off the rubber by stepping back, pivot quickly, and throw to first base.
7. Covering first base on balls hit to the right side of the infield
On all weakly hit balls to the right side of the infield, the pitcher should move toward first base.
It should be automatic. Every time the ball is hit to the right side.
If the ball is caught by the first baseman too far from the bag, the pitcher will have to take the throw. Even if the first baseman doesn't catch the ball, and it is caught by the second baseman, often the first baseman finds himself too far from the bag to take the throw, and again the pitcher has to cover.
The best way for a pitcher to cover first base is to run on a straight line toward a point on the foul line about 15 feet from the bag, and then, just as he reaches the line, turn sharply left, running up to the bag, where he can take the throw.
8. Backing up bases
A pitcher’s job isn’t over when he throws to the plate.
On ground balls to the right side (the first base side of the infield), he’s responsible for covering first.
On balls hit to the outfield, he’s the backup for most throws back to the infield.
The key to backing up bases is to know where the play will probably end up.
For example, on a base hit to left field, the pitcher should move to a spot between first and second, in line with the throw to second and out of the way of the base runner. He becomes the back up if the outfielder overthrows second or the ball gets away from the infielder.
If the pitcher will end up in foul territory when backing up a base, he should go as deep as he can. Moving up to get a bad throw is always easier than having to go back – and that way the play will always be in front of him.
With a runner on first and a routine hit to the outfield, the pitcher should back up third. If he’s in doubt, many coaches teach their pitchers to go to a spot closer to than home than third, and then to adjust depending on where the play develops. The reasoning is simple: the left-fielder should be moving to help back up third, so the pitcher’s priority is backing up home.
If the ball gets by the outfielder or is an extra-base hit, the pitcher should back up home and be ready to move to back up third base in case the play shifts to third.
On all plays at the plate, the pitcher should back up the catcher, again about twenty feet behind him in direct line with the incoming throw.
When an extra-base hit occurs with runners on first and second, the pitcher should hustle to a position between home and third base where, and as he sees the play develop, he can adjust to where the throw ultimately goes.
If the ball is hit to the right side, the pitcher will break towards first in case an infielder stops the ball and he needs to cover first. Once the ball goes through the infield, he needs to hustle to be ready to back up third or home.
If the ball is hit to left field with a runner on first, the pitcher can back up third by moving over the third base line into foul territory. If there are runners on second and third, he should move behind home in line with the throw from the outfield. He should be ready to cover home plate as well as get any wild throws.
The goal of backing up bases is simple – if a throw is off target, you can still hold the runner from taking extra bases.
If you have trouble convincing your pitcher to hustle to back up plays, remind him that it’s the best way he can help himself stay out of even worse jams on balls hit to the outfield.
Get my youth pitching program
While there aren't many pitching programs that are age-appropriate and safe for kids 7-14, there is one that provides youth pitchers with effective guidelines for strength training, pitching mechanics, and how to pitch faster in baseball.
What do you think?
Now it's time to hear from you:
Are there any pitcher fielding techniques or tips that I missed?
Or maybe you have an idea of how I can make this list even better.
Either way, leave a comment and let me know.
Before you do, make sure to grab your free PDF version of this checklist that you can print out and use as a reference. It shows you all 8 essential fielding skills for youth pitchers (and get 4 bonus drills not found in this article).
Click below to download the free checklist: | <urn:uuid:e6abcb05-13ff-47d7-9e90-53583a2d70af> | CC-MAIN-2017-13 | http://www.youthpitching.com/fielding.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194600.27/warc/CC-MAIN-20170322212954-00308-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.968046 | 4,497 | 2.953125 | 3 |
Recent news from Australia raises serious concerns about the future development of its domestic uranium industry.
While established players are exiting the market, others are lining up to explore new areas and have made some positive moves.
Open-pit mining operations at Ranger mine were terminated at the end of November 2012. To this date, Ranger mine was one of the largest uranium production centres worldwide with a total cumulative output of more than 100,000 tonnes of uranium oxide.
On Dec. 7, 2012, the operator of Ranger mine, Energy Resources of Australia Ltd. (ERA), announced that work on backfilling the pit had already started, with the first phase to be completed by the end of 2014.
During the first stage of rehabilitation, 30 million tonnes of material will be placed into the pit. This means remaining uranium reserves and resources in-situ attributed to the mine totalled 88,350 tonnes of uranium oxide (as at Dec. 31 2011, excluding stockpiles) with the average uranium grade of roughly 0.12%, will be abandoned.
Just for comparison, the current uranium grade coming out of the Rössing open-pit uranium mine in Namibia amounted to only about 0.03%.
What were the main reasons that ERA was forced to accelerate decommissioning of this still high-profile uranium asset?
In recent years, plans on further development of the Ranger project were changed constantly. ERA considered different options, from life-of-mine expansion until and beyond 2021 to heap leaching and underground mining applications implementation.
The production rate at Ranger mine had declined more than half, from 5,412 tonnes of uranium oxide in 2007 to 2,641 tonnes of uranium oxide in 2011.
Multiple water management problems around the Ranger mine resulted in turbulence for the company.
In the past, heavy monsoonal rains repeatedly flooded Ranger pits in wet seasons restricting access to higher grade ore and provoked the tailings dam to overflow with contaminated water and leak into Kakadu National Park. These problems forced ERA to suspend mining and processing operations at Ranger several times in the last five years.
Finally, under the pressure of accumulated environmental issues, ERA decided to shut down Ranger open-pit mining operations at the end of 2012.
Currently, ERA is examining a Ranger expansion project which consists of possible underground development of the Ranger 3 Deeps ore body. Taking into account early exploration and prefeasibility stage of this project, ERA will spend at least a couple of years understanding its technical and economic viability. Thus, mid-term perspectives of Ranger underground expansion are very vague.
To meet uranium contractual supplies obligations, ERA continues to process high-grade stockpiled ore that is very limited in volume, as well as purchase uranium from the spot market.
Ranger’s low-grade stockpiles, including its lateritic part with a high proportion of clay minerals, contain approximately 27,000 tonnes of uranium oxide. Its treatment, however, causes serious metallurgical challenges.
Fairly estimating the current situation, ERA stated in its 2011 annual report that after the cease of mining operations at Ranger, “ERA’s production will consist of the processing of stockpiled ore which will progressively reduce output, unless and until new production initiatives are implemented.”
Another big move may have significant implications for the Australian uranium industry in the future.
BHP Billiton Ltd. (BHP) has shut its uranium division, responsible for its Olympic Dam copper-gold-uranium mine, to reflect shifting commodity priorities, and has moved management to its base metals group.
This decision follows recent steps by BHP to cuts of its uranium program — from the delay of the uranium production expansion plan at the Olympic Dam project to the selling of a large Yeelirrie deposit located in Western Australia.
Recent Ranger and Olympic Dam issues along with various problems related to notable Australian uranium projects like Angela/Pamela, Kintyre, Oban, Wiluna and Koongarra, amongst others, have also caused concerns about the future development dynamics of the local uranium industry.
According to World Nuclear Association data, uranium production in Australia decreased from 10,145 tonnes of uranium oxide in 2007 to 7,056 tonnes in 2011.
Australia is third in the world for uranium output — behind Kazakhstan and Canada — and is in first place for volume of recoverable uranium resources.
Approval of a fourth uranium mine in July 2009 at the Four Mile project in South Australia, ended Australia’s 25-year-old “three uranium mines” policy, and greenlighted new uranium mine construction.
Since then, Western Australia and Queensland have lifted official uranium bans, and recently announced governmental co-funding of uranium exploration activities in Western Australia.
Thus, despite current issues about its largest uranium mines and projects, Australia has many chances to push forward its domestic uranium industry.
Image: Shutterstock / John Carnemolla | <urn:uuid:d82deaa6-e567-4da5-8f4c-a02361c13fd6> | CC-MAIN-2015-06 | http://www.mining.com/australias-uranium-industry-in-turbulence-16546/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115865010.11/warc/CC-MAIN-20150124161105-00233-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.941051 | 1,001 | 2.78125 | 3 |
Many writers are Wanna-B’s because they have a story or see stories all around them and don’t know where to start writing. In the two writers clubs and writing workshops that I run, I tell Wanna-B’s there is no secret beyond putting fingers to keys. However, I don’t recommend they start on the story until they think through a few basic elements about the project.
First they need to give some thought and type their understandings of the six items below. It is important to actually see the answers on the page, not just assume they have a clear understanding in their minds.
- Decide on your writing goals – Family Record, a book to Gift and Sell Locally, a book to Sell Broadly, including people you’ve never met.
- What is the intended type of story and writing genre – Fiction, Non-Fiction or Creative Non-Fiction, Children’s Book, Family Saga, Mystery, etc?
- Think of at least three stories you might write before you decide on the one you are going to write as your first effort.
- Think through the overall arch of the story? For example, is it an “n”- starts good, goes to pieces, comes back, ends badly, an “r’ – starts good, goes to pieces, comes back to end in a bang, a “w” – starts good goes to pieces, comes back… The idea is that every scene, every word needs to support or forewarn of the overall theme and outcome of the story.
- Most books are written in scenes, especially fiction, so you need to outline the story and list the scenes you will need to tell the story.
- The main characters need to be described along with their goals and emotional state. What do they love? What do they hate? What do they fear? This can keep you consistent on little things like a characters looks as well as important things like his hot buttons and goals.
Now you are ready to write. The preliminary work has allowed you to think through the project and hit the text running. No more excuses! Type and think as fast as you can. Don’t interrupt your thinking to look up a fact. On the first draft don’t worry about the name of a particular street, how far it is to drive from Las Vegas to Dallas, the name of the puddle-jumper airline that flies from Miami to Fort Myers. Leave these items blank for the first draft and look them up later.
We all know how important it is to start the book with a very clever opening, one that draws in the reader and foretells the theme of the story. Forget that for now and bang those keys. Once three or four pages have been typed you will want to establish momentum by setting writing goals such as, writing six hours a week, at your bedroom desk, 2000 words a week. With the average novel somewhere around 75,000 words this schedule will complete the first draft in 38 weeks. If that pace does not meet your goals it can be sped up or slowed down. Of course, you should know the rule of thumb in the industry is that writing takes one third of an author’s time while rewriting, fact checking and editing take about two thirds. At this rate, and adding time for cover design and printing, your book will be ready to come out of the closet in a little more than two years after you hit that first key.
Further, if you answered the initial question with the goal of writing for publication and commercial success you will most likely need to add a couple more years to allow for an agent and publisher to discover and exploit your genius.
Let’s recalibrate for a minute to give better encouragement to Wanna-B’s having trouble typing that first word and that first page. It is not unreasonable to assume that you may have sufficient passion and insight into your story to write 3,000 words a week. At this rate, your first draft, possibly shorter than average, at 60,000 words, could be finished in about 14 months. If you then decide to self publish you can add as little as six weeks.
There you are after all these years, a first time author holding your first book in less than 16 months.
Now quit giving yourself excuse abuse and start writing. It is one of the most enjoyable journeys you will ever take.
More information on Steven Roberts’ writing style for books, short stories and poetry can be found at www.steverroberts.com. | <urn:uuid:dbd46dcd-9735-43bf-b05d-0bad6f4a74da> | CC-MAIN-2020-45 | https://www.sellingbooks.com/excuse-abuse/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880878.30/warc/CC-MAIN-20201023073305-20201023103305-00516.warc.gz | en | 0.962146 | 951 | 2.5625 | 3 |
NEWSLETTER: VOL II, # 4, MARCH 12, 1998
Virtual Field Trips: Just Like Being There
Michael E. Ritter
Department of Geography/Geology, UW- Stevens Point
Field trips are a valuable way of connecting classroom concepts to real-world situations. However, there are times that a field excursion is logistically difficult, too costly, the location too remote or dangerous to visit. As a substitute, we take our students to these places by delivering a narrated slide show, stepping slide by slide, and site to site, describing each place as we move along our journey. We are in a sense creating a virtual field trip with our presentation. Now, computer technology can do the same thing, and greatly expand the nature and interactivity of this virtual experience.
Attributes and Use of Virtual Field Trips
Virtual field experiences, as defined here, use computer technology to guide students on a path through the landscape. A virtual field trip is an online activity in which the user views a series of images with accompanying text. A virtual field study involves active learning experiences where students use observational and analytical techniques similar to those undertaken in an actual field study. The hypermedia environment of the World Wide Web makes it an excellent vehicle to conduct virtual field trips.
Virtual field trips delivered over the World Wide Web have many attributes that make them a useful tool for learning. Hyperlinking allows a user to follow a route predetermined by the designer, or let the user to choose one of their own.
Virtual field trips can be taken at any time, in any weather, and as often as one likes. They overcome the impediment of space and time, allowing the user to examine the landscape from perspectives not otherwise possible on a real field trip. For instance, many different views of the terrain can be presented, such as ground-level pictures, satellite imagery, line drawings, air photographs, or digitized maps. Animations and fly-bys using digital elevation models can take the student to inaccessible places; and more importantly, they are a good substitute for those who are physically handicapped and cannot go on a real field trip . Virtual field trips can be linked together to provide comparisons between places. At the click of a mouse, students taking a virtual field trip through the Rockies can be sent to the Appalachian Mountains to make comparisons between these two landscapes. Hyperlinks can be created from keywords to online dictionaries or other reference materials, which students can access and explore to gain a greater depth of understanding.
Virtual field trips can take students to places that may be too dangerous or remote. The worn torn country of Bosnia is an interesting case study for physical and cultural geography, yet it is nearly impossible to take students there. The Bosnia Virtual Field Trip (http://geog.gmu.edu/projects/bosnia/default.html) created by Jeremy Crampton and Beth Rundstrom of George Mason University leads viewers through the physical, political and cultural landscape of Bosnia Herzegovina, and examine the significance of the physical landscape, the inter-ethnic strife of contemporary Bosnia, the Dayton peace accord, and the important players in the conflict. The authors use the virtual field study to interject lessons in basic geographic concepts like map scale. For example, students are asked to examine maps of Bosnia at different scales and describe what happens to the amount of territory shown as scale increases or decreases.
Virtual field trips can be used to support actual field trips, to substitute for a field trip, and as a vehicle for self-instruction of classroom concepts. The Boulder Creek Virtual Field Study (http://www.colorado.edu/geography/COGA/geogweb/bouldercreek/) written by A. David Hill and Michael Solem of the University of Colorado - Boulder, is a series of on-line activities that complement a real, self-guided field study of Boulder Creek, located in Boulder, Colorado. The "Preview section" introduces the student to the area prior to going out to conduct the actual field study. The "Review section" asks questions based on the observations made in the field. They have incorporated a "Discussion Forum" for students to discuss relevant issues about human use of the environment as well.
Being located in Wisconsin, I cannot take eighty introductory physical geography students to the mountains to learn first hand about mountain environments. Therefore, I created a virtual field trip to the Indian Peaks section of the Colorado Front Range (http://www.uwsp.edu/acaddept/geog/projects/virtdept/ipvft/ipvftmod.html) as a self-paced instructional module for the study of the altitudinal zonation of vegetation and landscapes modified by alpine glaciers. As a self-paced activity, students have more time to thoroughly examine the material than they would during a conventional lecture presentation on the subject. The field trip begins with a short introduction to the physiography, climate and ecosystems of the Front Range, and the materials needed for the "trip". The user can either navigate sequentially from the first through the last site or use an image map to jump to each site in any order they wish. Each site page is composed of an image with a brief text description of the site. "Sensory" language is used in the site page text. For instance, when the user enters the subalpine forest web page, they "notice the air getting cool and damp".
Near the middle of each site page the student is asked to perform an activity. The instruction for the activity is placed in a border-less table that has been color coded to draw the students attention. Most activities have the user seek out information on subsequent pages and enter it into their field journal. These entries may be a description of the site, a sketch, or recording field data "collected" at the site. At the D1 site the user is asked "to follow the ridge until in narrows into an arete, describe its appearance and how it forms." To do so, the user clicks on the hyperlinked text that sends them to a web page describing the formation of the ridge using text, block diagrams, aerial photographs, and topographic maps. At the conclusion of the field trip, the student hands in their field notes and a summary of the data they have collected in text and graphical forms.
Virtual field trips are a useful way of bringing "the real-world" into the classroom. They can introduce new concepts, reinforce actual field experiences, or be useful substitute when you cant get into the field. The Virtual Geography Department Projects (http://www.utexas.edu/depts/grg/virtdept/contents.html) Virtual Field Trips and Studies Working Group is creating a variety of on-line learning modules. You can to link to a number of virtual field trips and studies from their home page (http://www.uwsp.edu/acaddept/geog/projects/virtdept/vfthome.html). Though you can't "stop and smell the roses" on a virtual field trip, you won't get poison ivy on one either! | <urn:uuid:cd97555c-938f-4e4f-924e-902a0eaee775> | CC-MAIN-2014-10 | http://www.uwsa.edu/ttt/tttv2n4.htm | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999638008/warc/CC-MAIN-20140305060718-00083-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.917788 | 1,467 | 3.65625 | 4 |
Unfitted Quotes (3 quotes)
It seems to be considered as a common right to all poets and artists, to live only in the world of their own thoughts, and to be quite unfitted for the world which other men inhabit.
Suppose then I want to give myself a little training in the art of reasoning; suppose I want to get out of the region of conjecture and probability, free myself from the difficult task of weighing evidence, and putting instances together to arrive at general propositions, and simply desire to know how to deal with my general propositions when I get them, and how to deduce right inferences from them; it is clear that I shall obtain this sort of discipline best in those departments of thought in which the first principles are unquestionably true. For in all our thinking, if we come to erroneous conclusions, we come to them either by accepting false premises to start within which case our reasoning, however good, will not save us from error; or by reasoning badly, in which case the data we start from may be perfectly sound, and yet our conclusions may be false. But in the mathematical or pure sciences,geometry, arithmetic, algebra, trigonometry, the calculus of variations or of curves, we know at least that there is not, and cannot be, error in our first principles, and we may therefore fasten our whole attention upon the processes. As mere exercises in logic, therefore, these sciences, based as they all are on primary truths relating to space and number, have always been supposed to furnish the most exact discipline. When Plato wrote over the portal of his school. Let no one ignorant of geometry enter here, he did not mean that questions relating to lines and surfaces would be discussed by his disciples. On the contrary, the topics to which he directed their attention were some of the deepest problems, social, political, moral,on which the mind could exercise itself. Plato and his followers tried to think out together conclusions respecting the being, the duty, and the destiny of man, and the relation in which he stood to the gods and to the unseen world. What had geometry to do with these things? Simply this: That a man whose mind has not undergone a rigorous training in systematic thinking, and in the art of drawing legitimate inferences from premises, was unfitted to enter on the discussion of these high topics; and that the sort of logical discipline which he needed was most likely to be obtained from geometrythe only mathematical science which in Platos time had been formulated and reduced to a system. And we in this country [England] have long acted on the same principle. Our future lawyers, clergy, and statesmen are expected at the University to learn a good deal about curves, and angles, and numbers and proportions; not because these subjects have the smallest relation to the needs of their lives, but because in the very act of learning them they are likely to acquire that habit of steadfast and accurate thinking, which is indispensable to success in all the pursuits of life.
[The famous attack of Sir William Hamilton on the tendency of mathematical studies] affords the most express evidence of those fatal lacunae in the circle of his knowledge, which unfitted him for taking a comprehensive or even an accurate view of the processes of the human mind in the establishment of truth. If there is any pre-requisite which all must see to be indispensable in one who attempts to give laws to the human intellect, it is a thorough acquaintance with the modes by which human intellect has proceeded, in the case where, by universal acknowledgment, grounded on subsequent direct verification, it has succeeded in ascertaining the greatest number of important and recondite truths. This requisite Sir W. Hamilton had not, in any tolerable degree, fulfilled. Even of pure mathematics he apparently knew little but the rudiments. Of mathematics as applied to investigating the laws of physical nature; of the mode in which the properties of number, extension, and figure, are made instrumental to the ascertainment of truths other than arithmetical or geometricalit is too much to say that he had even a superficial knowledge: there is not a line in his works which shows him to have had any knowledge at all. | <urn:uuid:c01ae986-ceaf-4247-b122-8e1728181506> | CC-MAIN-2021-21 | https://todayinsci.com/QuotationsCategories/U_Cat/Unfitted-Quotations.htm | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.87/warc/CC-MAIN-20210510033850-20210510063850-00246.warc.gz | en | 0.975869 | 852 | 2.5625 | 3 |
Wilhelm, B., Arnaud, F., Sabatier, P., Crouzet, C., Brisset, E., Chaumillon, E., Disnar, J.-R., Guiter, F., Malet, E., Reyss, J.-L., Tachikawa, K., Bard, E. and Delannoy, J.-J. 2012. 1400 years of extreme precipitation patterns over the Mediterranean French Alps and possible forcing mechanisms. Quaternary Research 78: 1-12.
The authors write that "mountain-river floods triggered by extreme precipitation events can cause substantial human and economic losses (Gaume et al., 2009)," and they say that "global warming is expected to lead to an increase in the frequency and/or intensity of such events," citing the IPCC (2007), "especially in the Mediterranean region (Giorgi and Lionello, 2008)."
What was done
Working at Lake Allos (44°14'N, 6°42'35" E) - a 1-km-long by 700-m-wide high-altitude lake in the French Alps - Wilhelm et al. carried out a coupled bathymetric and seismic survey of the lake's sediment infill, analyzing three sediment cores for grain size, geochemical composition, total organic carbon content, and pollen content and identity; while small-size vegetal macro-remains (pine needles, buds, twigs and leaves) were sampled at the base of the flood deposits and used for AMS 14C analysis, which was conducted at France's LMC14 carbon-dating laboratory. And although acknowledging the complicating fact that "changes in vegetation and/or land-use can modify soil stability/erodibility," they report that "the size of the coarsest sediment fraction still reflects stream flow velocity," citing Beierle et al. (2002) and Francus et al. (2002).
What was learned
The thirteen French scientists report that some 160 graded layers of sedimentary deposits over the last 1400 years were compared with records of historic floods; and they indicate that these comparisons "support the interpretation of flood deposits and suggest that most recorded flood events are the result of intense meso-scale precipitation events." And they make a point of noting that the temporal history of these deposits reveals "a low flood frequency during the Medieval Warm Period and more frequent and more intense events during the Little Ice Age."
What it means
Once again, we have another example of climate-alarmist (IPCC) contentions widely missing the mark when it comes to predicting which temperature extreme - hot or cold - produces both more frequent and more intense precipitation events, as well as the flooding that accompanies them.
Beierle, B.D., Lamoureux, S.F., Cockburn, J.M.H. and Spooner, I. 2002. A new method for visualizing sediment particle size distributions. Journal of Paleolimnology 27: 279-283.
Francus, P., Bradley, R.S., Abbott, M.B., Patridge, W. and Keimig, F. 2002. Paleoclimate studies of minerogenic sediments using annually resolved textural parameters. Geophysical Research Letters 29: 10.1029/2002GL015082.
Gaume, E., Bain, V., Bernardara, P., Newinger, O., Barbuc, M., Bateman, A., Blaskovicova, L., Bloschl, G., Borga, M., Dumitrescu, A., Daliakopoulos, I., Garcia, J., Irimescu, A., Kohnova, S., Koutroulis, A., Marchi, L., Matreata, S., Medina, V., Preciso, E., Sempere-Torres, D., Stancalie, G., Szolgay, J., Tsanis, I., Velasco, D. and Viglione, A. 2009. A compilation of data on European flash floods. Journal of Hydrology 367: 70-78.
Giorgi, F. and Lionello, P. 2008. Climate change projections for the Mediterranean region. Global and Planetary Change 63: 90-104.
IPCC. 2007. Climate Change 2007: The Physical Science Basis. Solomon, S., Qin, D., Manniing, M., Chen, Z., Marquis, M., Averyt, K.B., Tignor, M. and Miller, H.L. (Eds.), Contribution of Working Group I to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge University Press, Cambridge, United Kingdom.Reviewed 12 December 2012 | <urn:uuid:f4477db0-900d-4194-aeea-edb0db919be9> | CC-MAIN-2016-44 | http://www.co2science.org/articles/V15/N50/C1.php | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00522-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.821989 | 980 | 2.71875 | 3 |
Professional dispositions are defined as the values, commitments, and professional ethics that influence behaviors towards students, families, colleagues, and communities and effect student learning, motivation, and development as well as the educators own professional growth. Dispositions are guided by beliefs and attitudes related values such as caring, fairness, honesty, responsibility, and social justice, For example they might include a belief that all students can learn, a vision of high and challenging standards, or a commitment to a safe and supportive learning environment (NCATE, 2002). Research shows that attributes of the classroom teacher significantly affect how well students learn. Recently it has become clear that the quality of the education of our children receive depends directly upon the quality of the education of the teachers in our schools. Parents, teachers, educators, and researchers agree that effective teaching happens when the teachers thoroughly know their subjects, have significant teaching skills and possess dispositions that foster growth and learning in students (USCA). Teaching involves more than effective planning, instructional knowledge, and teaching, skills. Professional dispositions also play a big part in the scenario. Teacher education programs bear a responsibility to convey, model, and promote positive standards of professional conduct. They also should maintain screening assessment procedures to assure that teacher candidates with negative dispositions are not permitted to continue in teacher education programs (NCATE 2006). At the beginning of my clinical experience I choose specific professional dispositions that would be reflected upon during my first four weeks in the classroom. Those dispositions included: 1.
Believes that students learn in many different ways
Reacts positively to suggestions and opportunities for growth 3.
Please join StudyMode to read the full document | <urn:uuid:5f580272-39b5-4ee2-963e-09d2aa0dabfe> | CC-MAIN-2018-26 | http://www.studymode.com/essays/Professional-Dispositions-324558.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866937.79/warc/CC-MAIN-20180624121927-20180624141927-00618.warc.gz | en | 0.953923 | 333 | 3.5625 | 4 |
- About Us
- AFPMB Business
- AFPMB Directory
- Literature Search
Living Hazards Database
The Living Hazards Database (LHD) is a comprehensive compilation of more than 500 species worldwide, which are reported to cause serious injury or death of humans. The LHD is intended to provide a concise, practical information source for use by medical, paramedical, first-responder personnel and medical planners supporting U.S. military personnel. Information on each species listed includes: description, habitat, behavior, known harmful effects, geographic distribution, taxonomy, and a representative image for most species.
For information about antivenom products, producers or sources, you can go to: http://www.toxinology.com, then search by the scientific name (genus and species) of the snake, spider, or scorpion.
DoD Users: If you need need additional information on venomous animals and plants contact the Information Services Division (ISD).
Quick Cross Reference File - (Developed by 1LT(P) Paula Mischler, U.S. Army)
Venomous Animals by Country | <urn:uuid:3622f2f9-51b0-410b-80b2-6c92ea29bbae> | CC-MAIN-2014-49 | http://www.afpmb.org/content/living-hazards-database | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380948.74/warc/CC-MAIN-20141119123300-00056-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.834221 | 232 | 3 | 3 |
ADVICE FOR PARENTS AND STUDENTS
Performing in a musical is an experience that young people will remember for the rest of their lives, and it is truly our pleasure to work with your child on this exciting project. We want everyone involved to understand both the benefits and responsibilities that go along with being in a musical, so we have detailed some of the basics here.
First off, there are a number of great benefits to being in a musical, including:
Active Participation in the Arts: Participating in the arts provides young people with a chance to explore their creativity and imagination in a structured and safe environment. Musical theatre is specifically remarkable because it is the only art form that combines all areas of the fine arts: acting, singing, dancing, and visual arts.
Improving Literacy Skills: From reading scripts to memorizing lines to learning to tell a story, young people continually improve their literacy skills while rehearsing and performing in a musical.
Becoming a Confident Public Speaker: It takes a lot of guts to stand up and sing or dance in front of your family, peers, and what may seem like the entire community. Experience with public speaking at a young age gives students confidence that will be important to them for the rest of their lives.
Gaining Critical Thinking & Problem Solving Skills: Putting on a musical is a group effort and every member of the team must work together to make it happen. Throughout the rehearsal process, the students will learn to solve challenges as they arise. Students will learn to trust and depend on themselves and their cast mates.
As with any group activity, every participant has responsibilities. Please look over the following items to make sure you and your child feel you can honour the commitment to being a part of a show on a Teenage Stage Summer School.
Attendance: Students are expected to attend all rehearsals they are called for unless prior approval has been given. Failure to do so may result in dismissal from the show unless due to medical reasons or special circumstances.
Rehearsals: Rehearsals will typically last from 10am to 5pm each day and be held at our venue. Students should bring their scripts, a pencil, a snack, and wear appropriate shoes and clothes for movement. Also, please make sure you have arranged for your child or teenager to call during the evening after 6pm.
Homework: Students will have some homework for the show, including memorizing lines and songs, rehearsing their dances, researching their character, etc.
Attitude: The rehearsal room and theatre are safe spaces where young people can take positive risks and be themselves without the fear of being laughed at or alienated. This principle is essential to artistic growth and exploration. Participants are expected to respect these principles and are encouraged to remember it themselves when trying new things.
Volunteering: The most important thing you can do to help us with the musical is make sure your child commits to everything listed above. If they want to volunteer additional time, skills or resources to the production, simply drop us a note with your name, and we will do our best to facilitate. We are still in the process of compiling a list of everything that needs to be done, but don’t worry, when we have tasks that need to be done, we will let you know well in advance.
Finally, please remember that a musical is a living, breathing entity. Things don’t always go exactly as planned, so changes to the plan will most likely be made throughout the rehearsal process. We promise to give your child or teenager as much advance notice as possible on all changes that arise. That said, they are in excellent hands! with many of Ireland's leading theatre practitioners working with your children today.
“Miguel, Patricia and Borja really enjoyed the course and are back in Madrid still buzzing from this experience!, thank you and happy summer" Rosa De las Heras, Parent
"This summer school is creative, fun and exciting, Well thought-through, artistically, educationally and administratively as a joyful learning experience for teenagers! I wish you every possible success with it, as I'm sure it will be! Lucky participants, something to really enjoy and look back on with pleasure and a sense of real achievement"
Dr. Adrian James PhD
Head of Cert H.E. in Theatre Arts (Southend)
East 15 Acting School. University of Essex.
"Elena, 13, was the only Italian girl on Dublin's Teenage Stage 2017 and it was her very first experience abroad by herself.
She got to meet lovely new friends from Ireland and greatly enjoyed both rehearsals and free time.
The final show was just amazing and one cannot help wondering how those kids could prepare it in just one week.
It made us love Sweeney Todd, a musical that we had never properly appreciated."
Gianluca Di Lorenzo, Parent
“Aoife, Marion and I are so grateful for this unique opportunity you provided in putting together this programme and for the detail, attention and most importantly care you have shown Aoife throughout" John McDonagh, Parent, Galway
"Emily had a great time and couldn't stop talking about the camp, rehearsals and her friends. It was a big step sending her away and it was brilliant! We will be interested in next year so please keep us posted. We also enjoyed the show very much, it was great to see all the talents but most of all we are grateful that Emily was part of the group and felt included all the time" Izabela O'Brien, Parent
"Grainne had a brilliant time, made lots of friends and really enjoyed the course. It was very well run. Can you please put her name down for summer 2017 and let us know when application forms are out" Jeanette Kelly, Parent
"Congratulations on a fantastic summer school. My son Harvey had an amazing time and is already talking about coming back next year!" Claire Dolan, Parent
"Andrew made some great friends and talked non stop for the 2 1/2 hours of the car journey back to Dublin so thank you for an excellent course" Niall Murray, Parent
"Natasha had an excellent summer school, it's done her the world of good and the production was brilliant, especially impressive as you only had seven days with them, thank you" Annemarie Walker, Parent
"Thank you for the email and opportunity for early booking. Nyika was so enthusiastic last summer, she really wants to participate again this year. I have sent in the booking form for her. We were equally impressed with the whole organisation, supervision and support of the summer school and have no hesitation to recommend it to friends" Rita, Parent, Carlow
"Cameron really enjoyed the concept of putting on a show in a week and had never done anything like this before! He was thrilled by the experience so thank you to all the very professional and caring team" Iris Campbell, Belfast | <urn:uuid:628209fc-6f9a-4f77-a54f-ee39998a3ef9> | CC-MAIN-2017-30 | http://www.teenagestage.com/faq/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426086.44/warc/CC-MAIN-20170726082204-20170726102204-00420.warc.gz | en | 0.969113 | 1,428 | 3.328125 | 3 |
The “reactive trend” of Cyberthreat monitoring is a very important problem since it demonstrates that the majority of companies dont hunt till the event is determined. They respond merely to intrusion detection systems and occasion warnings. It is pointless to simply construct a SIEM (Security Information and Event Management) and wait until the notifies get here at you. Notice that companies with various environments and security team targets can describe hunting in different methods, for example searching for vulnerabilities or associating threats to culprits. The Cyber Threat Hunting Realistic Model explains danger searching as an effective, analyst-led process in which attacking methods and methods and procedures can be browsed within the area.
What Makes Threat Hunting Different?
Danger searching implies the recognition, looking into, and redefining of the concept that hunters find the risk. Hazards hunting is an ongoing activity, the protective step is important for threat hunting, requires comprehensive knowledge of risks and experience of the IT system of the company within and outside. Although hazard searching approaches are used by the security group to discover dangers, the team is the crucial part of delivery.
CYBER ATTACK ANATOMY
Threat gamers such as cybercrime companies, national-state hackers, and recruitment hackers have various reasons for targeting a company:
Crucial facilities disturbance: Hackers interrupt or jeopardize networks to cause instability, such as energy power generation, supply of water, and transportation systems.
Commercial benefit: Malicious hackers steal info for indirect or direct monetary advantage; hackers, for instance, steal charge card info to benefit economically from it. To get access to personal information and sell it on the dark web, hackers may also jeopardize a corporate database.
Copyright theft: hackers steal details about industrial or military secrets, trade secrets and infringements on products such as airplane, cars and trucks, arms and electronic elements, often planned to spy on opponents.
Political issue: assaulters and “hacktivists” target websites to make a political declaration
Destructive Insiders: A destructive insider is a staff member who exposes private company details and/or exploits business vulnerabilities. Malicious insiders are typically unhappy workers. Users with access to delicate information and networks can inflict comprehensive damage through fortunate misuse and malicious intent.
Common Vector of Specific Attack
DRIVE-BY-DOWNLOADS: Inadvertently downloaded malware from a jeopardized site; generally making the most of bugs in the operating system or a network.
Danger searching indicates the recognition, researching, and redefining of the principle that hunters discover the risk. Risks hunting is an ongoing activity, the protective step is vital for danger hunting, requires substantial understanding of hazards and experience of the IT system of the company inside and outside. Hazard searching methods are utilized by the security team to find risks, the group is the essential part of delivery.
MALWARE: Malicious code that interferes with services, gathers data, or gains access. In infection and proliferation qualities, various malware strains vary.
In order to build meanings based on textual and binary patterns, YARA categorizes malware. The information are then used to evaluate and put a stop to the malwares identity.
Vital Cyber Threat Hunting Tools Types:.
MALVERTISING: Internet advertising owned by cybercriminals. When they click the advertisement, which can be on any site, consisting of well-known sites went to daily, destructive software is downloaded to the users systems.
Notice that organizations with various environments and security team targets can describe hunting in various methods, for instance searching for vulnerabilities or associating hazards to transgressors. The Cyber Threat Hunting Realistic Model explains risk hunting as an effective, analyst-led procedure in which assaulting strategies and strategies and procedures can be searched within the location.
Information by itself does not correspond intelligence, so it would be overkill to just tape-record all of the logs or events that make noisy on your network. What are the systems, information or intellectual residential or commercial property that will cripple the business if compromised?
Driven by Situational Awareness:.
Hazard hunting, powered by intelligence, collects all the info and reporting you currently have on hand and uses it to threat hunting.Examples of intelligence platforms for cyber threats consist of: YARA, CrowdFMS, and BotScout.
Paid tools also exist, including: Sqrrl, Vectra, and InfoCyte, some of the more typical paid threat hunting tools.
DENIAL-OF-SERVICE: An effort to make a device or network not available; it likewise utilizes more computing resources than communication networks can manage or disable.
The AI Engine is an interactive tool which assists to modernize the invasion detection system of your network. Without physical interactions, it can learn and network forensics, network choice, and span detection can be accomplished.
Here are some of the most common methods to exploit and deliver a payload gadget vulnerabilities for cybercriminals.
PHISHING: An email that encourages the recipient to open or click a malicious course to open a contaminated file..
You can follow us on Linkedin, Twitter, Facebook for everyday Cybersecurity, and hacking news updates.
Cuckoo Sandbox is an open-source malware analysis system which allows any suspicious files to be disposed of while collecting comprehensive outcomes up-to-date. In order to better comprehend how to avoid them, Cuckoo Sandbox has the ability to provide you details and analytics about how malicious files work.
WATCHING OF DOMAIN: If a hacker possesses qualifications from the domain registrar, they can add host records to the DNS records of an entity and then reroute users to these destructive IPs.
YETI is an instrument that interacts understanding on hazards through companies. To help keep everybody updated on the most current hazard patterns, organizations can share the information they want from trusted partners.
CrowdFMS is an automatic program that gathers samples from a site that publishes phishing email details and processes them. An alert will be activated if anything crosses through your network that matches a recognized phishing email.
Analytics-Driven: Threat hunting tools powered by analytics utilize behavior analytics and risk searching for machine discovering to produce crucial metrics and other possibilities. The following are examples of analytics tools: Maltego CE, Cuckoo Sandbox, and Automater.
In the “occurrence scoping” procedure of the incident response, searching still plays a significant role, offered that event intelligence is now leading the hunters on where to locate extra jeopardized hosts. This process helps to assess the total variety of systems impacted and to calculate the amount of severity of the violation. They are trying to find suspicious actions that might suggest the presence of harmful activity. Effective hunters of cyber hazards look for indications showing continuous attacks in the system. Hazard hunters then take the hints and hypothesize how the attack might be performed by the hacker.
Automater concentrates on intrusion information. You choose a goal and the findings from common sources are examined by Automater.
The following are some of the kinds of logs that may be suitable to gather in your situation:.
BotScout prevents bots from registering on online forums that contribute to spam, server misuse, and contamination of the database. In order to identify the source and to eliminate bots, IPs are kept track of as well as names and email addresses.
Studying Data for Threat Hunting:.
Zero-Day Vulnerabilities: This is a vulnerability that nobody understands up until the breach occurs (thus the name absolutely no day, as there is no time elapsed in between when the attack occurs, and the vulnerability is revealed). The following attack is known as a zero-day attack if a designer has not released a spot for the zero-day vulnerability prior to a hacker exploits that vulnerability. Having the red team write POC exploits is a way to mitigate zero-day vulnerabilities.
To examine a company or individuals patterns, risk analyses are used.The AI Engine and YETI are examples of situational awareness-driven tools.
It works by recognizing relationships on the web between portions of data from various sources. You will be alerted if these add up to a danger. | <urn:uuid:7ef6d533-ae01-46a4-a175-e976cae79c3e> | CC-MAIN-2021-04 | https://govpeoplesearch.net/catch-the-unknown-cyber-attacks-with-threat-hunting/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704820894.84/warc/CC-MAIN-20210127024104-20210127054104-00798.warc.gz | en | 0.912329 | 1,674 | 2.609375 | 3 |
I heard a trainee journalist talking about his first days on the job.
He was asked to report on a story.
He investigated it, the facts, the people involved, what happened exactly.
He diligently interviewed everyone and carefully crafted the final piece.
It had an intriguing opening, a coherent middle, and a logical end.
When he’d finished, he submitted it to the editor.
Before he’d even got back to his desk the phone was ringing.
It was the editor.
He said “Rewrite it with all the facts at the front”.
The young journalist said “But that would spoil the story”.
The editor said “Kid, we put out an entire newspaper every day, top to bottom.
New stories and updates are coming in all the time.
Everything keeps changing until we go to press.
We sometimes have to cut reports, we may have to cut your piece kid.
When we cut, we cut from the bottom, so make sure all the important stuff, like the facts, are up front”.
And the young journalist had to rewrite his copy.
Because that’s the difference between our media and a book.
A book may take months to write.
That’s okay because people can take weeks to read it, savouring each word.
Our media isn’t like that.
Our media has to compete for attention.
We can’t assume that every word will be pored over, like a book.
That’s what made Ernest Hemingway different as a writer.
Hemingway trained as a journalist.
Before he became a novelist, he worked on The Kansas City Star.
He learned the paper’s style, it became a guide for writing:
“Use short sentences. Use short paragraphs. Use vigorous English.”
He learned to get the most from the least, to prune language.
Later in life Hemingway would call this style “The Iceberg Theory”.
By stating the bare minimum you let the reader’s imagination add the part unsaid, the part below the surface.
In writing classes at universities it’s now known as “The Theory of Omission”.
In 1928, The New York Times wrote of Hemingway’s first novel:
“No amount of analysis can convey the quality of ‘The Sun Also Rises’. It is a truly gripping story, told in lean, hard, athletic, narrative prose that puts more ‘literary’ English to shame”.
Hemingway’s style influenced an entire generation of writers.
In 1952 he won the Pulitzer Prize.
In 1954 he won the Nobel Prize.
The Transatlantic Review said Hemingway “actively trimmed the verbal ‘fat’ off his own style, and flexed his writer’s muscles in assaulting conventional taste”.
Hemingway put it differently, he said “Writing is architecture, not interior decoration.” | <urn:uuid:38e42ec4-104b-419f-a4ba-e37db7ca4537> | CC-MAIN-2019-09 | http://davetrott.co.uk/2014/09/writing-is-editing/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249434065.81/warc/CC-MAIN-20190223021219-20190223043219-00352.warc.gz | en | 0.960096 | 652 | 2.6875 | 3 |
Writing a quality research paper or an essay is not an overnight affair. You have to constantly keep at it and explore different ways to improve your writing. Most importantly, you need to read several books, journals, etc. to get acquainted with authors’ impeccable writing styles. Last but not least, you have to be patient.
If you keep reading, you will get to know various tips that will help you enhance your research and writing skills. Thus, you should:
- Read a Lot of Resources
If you want to enhance your research and writing skills, you have to go through a lot of resources like books, journals, dissertations, etc. You will not only get to see impeccable writing style, but also gain idea and knowledge. This will come in handy when you write academic papers like thesis, research papers, etc. This is because you have to validate your statements.
You will come across plenty of resources on the Internet. You can visit online university libraries, samples section of the academic service providers, or other authentic websites or blog posts. You can pore through newspapers, magazines to acquire important facts. Similarly, if you explore Google Scholar, you will get access to e-books, journals. And if you want real-time updates, you can explore YouTube and social media websites.
- Create a Template Before You Put Pen to Paper
It is important that you create an authentic format before you put pen to paper. For instance, if you are writing an essay, you have to include an introduction (hook, thesis statement and overview). Following this, you have to incorporate various points and subheadings in the body to cover the angles of the topic. Finally, you have to round up the essay with a conclusion.
Similarly, if you are writing a dissertation or thesis, you have to abide by the university guidelines. Creating a template is useful as it helps you structure the content and arrange the points sequentially, especially if you are describing a process. If you cannot create an outline, you should seek English assignment help
from the professional experts.
- Write Regularly to Build Confidence
Students pursuing doctoral or masters degree are encouraged to start writing early. This is because writing takes some of the pressure out of your final year and gives you the opportunity to practice writing and develop your writing technique. This also helps in improving the quality of the write-up. Most importantly, you need to learn to write critically.
Some of the attributes of critical writing are:
- Bold refusal to accept the conclusions of other writers without evaluating the statements or experiments
- A balanced presentation of reasons why the judgments of other authors might or might not be accepted
- Clear presentation of your evidence
- Recognition of the shortcomings in your arguments, evidence, and conclusion
If you want to get further insights, you should read a lot of examples. But, if you still face issues, you should seek English assignment help from the professional experts.
- Keep Your Readers in Mind
Your aim should be to make your text as clear as possible, so that the readers are able to figure out what you wish to convey. You should present your ideas clearly and precisely. However, if you find it difficult to clearly present your ideas, you should stick to the following points.
- Do not use complex words where a simple one will do
- Use punctuation correctly to make sense
- Resort to simple sentence construction
- Use separate paragraphs to break your text
It takes approximately 66 days before a new behavior becomes spontaneous. So, give it time, and you will be rewarded. If you are writing a thesis, you should use signposts. And that would be table of contents, abstract or the introductory section.
- Work on Your Grammar
Next, you need to work on your grammar if you want to write an excellent research paper or an essay. You should go through the eight parts of speech, and solve worksheet on adjectives, nouns, pronouns, adverbs. Moreover, when you write sentences, focus on the subject-verb agreement. This is the area where most students commit mistakes.
In addition to this, you need to master the art of proofreading. You can easily avoid grammatical, spelling mistakes or sentence construction error if you do so. And if you are new to it, you should use online proofreading tools like Grammarly, Paperrrater, etc. Most of the tools are free, and anyone can use it. Or you can opt for robust software like Grammarly (premium version) or Ginger software.
The tips suggested above have been tested and tried before, and the students who stuck with it got instant results. So, there is no reason why the tips won’t help you out.
Denny Fisher is a student counselor and he has helped out a lot of students in the past with career choice advice. At present, he is associated with MyAssignmenthelp.com, where he supervises the English online assignment help
service offered by the experts. | <urn:uuid:a926b6d4-2c7a-48cd-9b0e-57084a819abb> | CC-MAIN-2021-25 | https://www.prfire.co.uk/press_releases/5-pointers-to-consider-for-improving-research-and-writing-skills | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488552937.93/warc/CC-MAIN-20210624075940-20210624105940-00639.warc.gz | en | 0.934476 | 1,027 | 3.15625 | 3 |
The ground on which the United State Capitol now stands was from the earliest moments of English settlement known as the New Troy tract. Granted in 1663 by the Second Lord Baltimore to George Thompson, it was one of three substantial parcels that Thompson would own within the bounds of the future District of Columbia. His holdings encompassed some 1800 acres or slightly more than one-fourth of all the land that would be allotted for the site of the capital city. While the 500 acres that constituted New Troy would change hands six times, it was until 1791 never known by any other name (see Fig. 1). When Daniel Carroll of Duddington finally conveyed this property to the Federal Government, the site for Capitol was still indicated on the official deed as New Troy./ 1 The classical allusion encountered in this name was consistent with other names that other early settlers had assigned to their farms. Thompson's neighbor Francis Pope called his 400-acre farm " Rome" and the stream that flowed along its eastern edge the " Tiber." It was, he must have thought, a much better and more imaginative name than its earlier and more prosaic designation of " Goose Creek." Classical allusions signaled lofty goals and they would prove to be very appealing all across the nation well into the nineteenth century./ 2
Today most guidebooks for Washington, DC describe Capitol Hill as a neighborhood comprising about four square miles with the Capitol building standing at its western edge. In their attempts to be clear about the Capitol's location, the authors of these guides will often add that the site of building is actually called Jenkins Hill. This claim is also encountered on websites posted by various members of Congress, the Library of Congress, the Architect of the Capitol, and the National Park Service. Not one of these authorities specifies who Jenkins was and why his name is so prominently associated with such an important site. Seemingly, the habit of continued repetition and the eminence of those who repeat the claim have combined to make the label credible. A few writers suggest that a Thomas Jenkins once leased a portion of Daniel Carroll's estate near the future location of Capitol in order to pasture his cows and as consequence of this transaction, Jenkins's name became associated with the site./ 3 Given that Christian Hines, the nineteenth-century memorist commonly cited as the authority for the existence of this lease, places two men named Jenkins in the northwestern section of the city between Rhode Island Avenue and New York Avenues, the case for the simultaneous presence of one of these men the site of the Capitol seems rather feeble. Further, John Trumbull, painter of several murals in the Capitol rotunda, reported in 1791 that he found the site to be a "thick woods." It was thus an unlikely place for pasturing livestock of any sort./ 4 After almost a century of speculation on the identity of the Jenkins of Jenkins Hill, the judgment made by local historian Margaret Brent Downing back in 1918 still holds: "the exact reason that the name Jenkins is continually associated with this hallowed spot remains to be explained."/ 5
It is Pierre Charles L'Enfant who first uses the name Jenkins Hill (Figure 2). Offered the commission to design a seat of government for the fledgling American republic in the spring of 1790, he began to search out the best locations for a meeting place for the Congress, a presidential residence, and several other public offices in January of 1791. Stymied at first by poor weather, on March 11, 1791 he wrote to George Washington that he had at last been able to inspect the "gradual rising ground from Carrollsburg toward the ferry road," the land we recognize today as the southern half of Capitol Hill. Nine days later he wrote again to report that he had mapped out more of the territory between the Anacostia River and Tiber Creek "so much as included Jenkin's [sp.] Hill and all the water course from round Carroll point up to the Ferry landing."/ 6 By June 22, 1791, L'Enfants' vision of a future capital city had matured considerably with respect both to building locations and the potent vista that they might collectively present. About the future site of the Capitol, he brags to Washington "for other eligible situations . . . I could not discover one in all respects so advantageous . . . for erecting the Federal Hse. [as] the western end of Jenkin's Heights [which] stands really as a pedestal waiting for a superstructure." / 7
After L'Enfant fixes the name Jenkin's Hill on the Capitol site, both Washington and Jefferson follow his lead. However, because L'Enfant offered alternate renderings of the name -- sometimes as "hill" and other times as "heights" -- it would seem that he was not entirely sure just what the prominent ridge at the western end of Capitol Hill should be called. Further, he was apparently unaware that the site, which had belonged to a branch of the prominent Carroll family since 1758, was already known as New Troy. / 8 In the midst of the public enthusiasm for the emerging capital city only a brief mention that appeared in the Maryland Journal and Baltimore Advertiser on July 5, 1791 recalled the deeper history of the Capitol site: "It appears that the buildings of the Legislature are to be placed on Jenkin's Hill on the land of Daniel Carroll, esq. of Duddington . . .." / 9 This was the last time the name of the property owner who conveyed his land to the federal government would be publicly linked with the Capitol site. While Carroll would serve with distinction as City Commissioner and gain a reputation as both a successful businessman and a committed supporter of Washington City, his connection to the Capitol has been almost completely forgotten (Figure 3). / 10 There is today little public awareness that the ground appropriated as the site for one of our most celebrated symbols of liberty was, in the last analysis, actually Carroll's gift to the nation.
Beyond recognizing a certain irony in the fact that the land that once belonged to Daniel Carroll is now assigned to a mysterious man named Jenkins, one also wonders just how it was that L'Enfant came to choose this particular name. While L'Enfant supplies no explanation, for eight months -- from October 17, 1790 to June 1, 1791 -- a Thomas Jenkins did own fifty-four acres on Capitol Hill. His parcel was located about seven blocks to the east of the Capitol building (See Fig. 1), roughly a mile from the site that is now regularly called Jenkins Hill. Since this was most likely the same Thomas Jenkins who also owned an apple orchard in the northwestern quadrant of Washington, his brief acquisition of an additional small plot in the more sparsely settled part of the District suggests his plan to cut down trees either for building timbers or for firewood. / 11
In the Federal Census of 1800 the household of Thomas Jenkins was recorded as consisting of a white male and four male slaves, a crew sufficient to turn a quick profit on a fifty-four-acre plot. The presence of such a gang of hands is important to the naming of Capitol Hill because the path of the ferry road mentioned by L'Enfant in his letters to Washington ran right over Jenkin's parcel (Fig. 4). Given that there was no other way, at that time, to travel across Capitol Hill, L'Enfant almost certainly encountered Jenkins or one of his slaves. While such a meeting can only be conjectured, it does suggest why, of all the possible labels that one might assign to a relatively untamed wooded plateau, L'Enfant would fasten on the name Jenkins.
The name "Jenkins Hill" moved quickly from L'Enfant to Washington and then to a host of government officials. Since 1791, no alternative label has ever been seriously considered. The legitimacy of Jenkins Hill as the name for the site of the Capitol would also be confirmed by a map created in 1952 at the behest of the Commission on Fine Arts. Drawn by Arthur B. Cutter, then a member of the US Army Corps of Engineers, the map attempts to capture a sense of the style and feeling of late eighteenth-century cartography. Entitled "View of the City of Washington in 1792," the extensive acreages of the original proprietors stand out very prominently (Fig. 5). While Cutter offers no indications of the city's varied topography, at the center of his map he marks the site of the Capitol with a circle of short pen strokes meant perhaps to suggest a raised elevation. Confined within the circle is the name "Jenkin's Hill." Cutter's map, which combines tinges of antiquity with declarative authority, confirms an unquestioned truth about the location of the Capitol; that it stands on prominent high ground that has always been known as Jenkins Hill. When the force of common usage is supported by visual imagery -- when what is heard can also be seen -- then in the public mind there can be no doubt that what one has heard must certainly be true. Given that the site of the Capitol has been called Jenkin's Hill for more than two centuries, it is unlikely that its name can ever be changed to reflect the actual story of the place. We can only recall that in the richness of time there will always be "truths" that merit our careful review.
John Michael Vlach is professor of American Studies and Anthropology and director of the Folklife Program at The George Washington University.
/ 1. Bessie Wilmarth Gahn, Original Patentees of Land at Washington Prior to 1700 (Originally Published, 1936; Baltimore: Genealogical Publishing Co., 1969), p. 26-29, 73-75; Margaret Brent Downing, "Earliest Proprietors of Capitol Hill," Records of the Columbia Historical Society 21 (1918), pp. 1-23, Priscilla McNeil, "Rock Creek Hundred: Land Conveyed for the Federal City," Washington History 30, No. 1 (1991), pp. 36, 44-45.
/ 2 . See Wilbur Zelinsky, "Classical Town Names in the United States: The Historical Geography of an American Idea," Geographical Review, 57, No. 4 (1967), 463-495.
/ 3 . For one example, see Paul Herron, The Story of Capitol Hill (New York: Coward & McCann, 1963), p. 19.
/ 4 . For the earliest description of Thomas Jenkins's farm, see Christian Hines, Early Recollections of Washington City (1866) (Washington: Junior League, 1981), pp. 34-35. For Trumball's description of the Capitol site, see Allen C. Clark, "Sutter's Tavern," Records of the Columbia Historical Society, vols. 42-43 (1942), p. 98.
/ 5 . "Earliest Proprietors of Capitol Hill," p. 20.
/ 6 . Elizabeth S. Kite, L'Enfant and Washington (1791-1792) (Baltimore: Johns Hopkins University Press, 1929), pp. 36-37. Charles O. Paulin, "History of the Site of the Congressional and Folger Libraries," Records of the Columbia Historical Society, Vols. 37-38 (1937), p. 178, n. 4, notes that Capitol Hill was not called Jenkins Hill until after 1790. Federal Hill was alternate name offered by Captain Ignatius Fenwick in a letter to George Washington in 1792; see "George Washington Papers and the Library of Congress, 1741-1799,” Series 4: General Correspondence, Feb. 29, 1792.
/ 7 . Kite, L'Enfant and Washington, p. 55.
/ 8 . Rent Rolls for Prince George's County, Maryland indicate that on August 16, 1758 a transfer of 1800 acres was made from Ann Young to Charles Carroll, Jr. [of Duddington]. This large estate included the "New Troy" tract that today encompasses the site of the Capitol. See Maryland State Archives, Land Office Rent Rolls, Vol. 38 PG, p. 75.
/ 9 . See Allen C. Clark, "Origins of the Federal City," Records of the Columbia Historical Society, Vols. 35-36 (1935), p. 62.
/ 10 . See Allen C. Clark, "Daniel Carroll of Duddington," Records of the Columbia Historical Society, Vol. 39 (1938), pp. 1-48.
/ 11 . See Clark, "Origin of the Federal City," p. 94. On June 1, 1791 Daniel Carroll purchased Jenkins's fifty-four acres, for copies of the deed consult the Daniel Carroll Papers, Manuscript Division, Library of Congress.
|^ Back to Top ^|
Reprinted with the permission of the U.S. Capitol Historical Society. | <urn:uuid:be81105a-60cd-4fc7-ba5a-0c07a5cec5f7> | CC-MAIN-2014-10 | http://www.capitolhillhistory.org/library/04/Jenkins%20Hill.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394026201240/warc/CC-MAIN-20140305133001-00088-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.958085 | 2,651 | 3.21875 | 3 |
Mocha Dick – Inspiration for Moby Dick
Mocha Dick is one of the most famous whales in history. This great bull sperm whale was a true legend of the sea, known for his incredible size, strength, and intelligence. He was both feared and respected by Nantucket whalers, and his exploits inspired many stories and myths over the years. Mocha Dick’s story is one that has captured the imagination of people around the world for centuries and may well have inspired Herman Melville’s antagonist Moby Dick.
Mocha Dick was first encountered in the early 19th century, off the coast of Chile around Mocha Island, hence his unusual name. He was a leviathan, estimated to be over 70 feet long. He was an albino whale which made him easily distinguishable from other sperm whales. American explorer and author Jeremiah N. Reynolds published his account, “Mocha Dick: Or The White Whale of the Pacific: A Leaf from a Manuscript Journal” in 1839. In this account, he describes Mocha Dick to be “as white as wool”. Although docile by nature if attacked or riled he was ferocious and had the ability to outsmart whalers, often attacking their ships in reprisal and evading capture.
Over the years, Mocha Dick became something of a legend among whalers. With his incredible strength and agility came cunning and intelligence. Many sailors believed that he was possessed by a supernatural spirit, which gave him these incredible powers. Others thought that he was simply a creature of exceptional ability and intelligence and that he had learned how to outsmart his human hunters through years of experience. It is believed that Mocha Dick had around 100 encounters with whaling ships. During those encounters, it is said he killed around 30 men and sunk 20 whaleboats.
Mocha Dick was also known for his compassion and his ability to form strong bonds with other whales. He was often seen swimming with pods of other whales, and he would sometimes protect them from whalers and other predators. He was also known to show affection towards humans, and there are stories of him playing with sailors who were stranded at sea.
The date of his demise seems to vary (1838 or 1859) but when the whalers examined his body he had at least 19 rusting harpoons embedded into his blubber. They also extracted 100 barrels of oil from him, the average for a whale at that time would be around 25-40 barrels.
There were many other sitings and killings of white whales in the years after, but none were quite so legendary as Mocha Dick.
Lovesail.com is a worldwide network of single sailing enthusiasts that meet for dating, friendships and crewing opportunities. Visit our friendly sailing community today. | <urn:uuid:4c38f4cd-a355-4cf0-b0f7-544ce17d4852> | CC-MAIN-2023-40 | https://www.lovesail.com/ls-news/2023/03/mocha-dick-inspiration-for-moby-dick/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00514.warc.gz | en | 0.991343 | 583 | 3.140625 | 3 |
The Bridge Party is awkward and unsuccessful. The Indian guests gather together on one side of the tennis lawn, while the English stand at the other. Mrs. Moore and Adela watch the segregation sadly. Mrs. Turton and Ronny discuss the guests, saying that “no one who’s here matters” and making fun of the Indians wearing European clothing.
The party is supposed to make the two societies mingle, but it only ends up highlighting the divisions between the English and the Indians. The English are quite rude and inhospitable, treating their “guests” with condescension.
Some English women arrive and join the English group. They discuss the production of Cousin Kate, and which play they will put on next year. Any kind of art is considered “bad form” to the “Public School attitude” of the expatriates. Mrs. Moore notices how bland and conventional Ronny’s opinions have become. Years earlier he had hated Cousin Kate, but now he praises it in order to not offend anyone.
We see more of Ronny’s negative character development, as in India he has learned to suppress any imagination or unique opinion that might differ from the crowd. The colonial system causes the Anglo-Indians—as an “outpost of Empire” among a somewhat hostile population—to huddle together as a kind of herd.
Mr. Turton arrives and makes his wife go meet the group of gathering Indian women. Mr. Turton looks over the group of men and assumes the various self-serving reasons why each has come to the party. Mrs. Turton takes Adela and Mrs. Moore to visit the Indian women. Mrs. Turton assures the two that they are “superior to every one in India.” She shakes hands with everyone and says a few words in crude Urdu, and then asks Mrs. Moore and Adela if they’re satisfied.
Just as Mahmoud Ali assumed Turton threw the party for political reasons, so Turton attributes to all his guests selfish reasons for coming. Both sides remain suspicious. Mrs. Turton makes her racism explicit, telling Adela that she is superior to the Indians simply because she is English. Mrs. Turton also makes no efforts to understand the people she scorns.
One of the Indian women speaks up in English, and Mrs. Turton is surprised that they know the language. Adela is excited, and tries to have a conversation with the women, but they are too polite and shy to be drawn in. As they are about to leave, Mrs. Moore impulsively asks one of the women, Mrs. Bhattacharya, if she and Adela can visit her at her home. Mrs. Bhattacharya agrees, and they decide to come on Thursday. Mr. Bhattacharya promises to send a carriage for them. It seems possible that the Bhattacharyas are delaying a planned trip to Calcutta for the sake of the visit, but they insist.
This seems to be a successful cross-cultural interaction like the one with Aziz and Mrs. Moore, but it will later lead to confusion and a “muddle.” Mrs. Turton is so unfamiliar with the Indians she hates that she doesn’t even realize that many speak English. Mrs. Moore and Adela stand out from the crowd simply by being hospitable hosts and making an effort to talk to their guests like equals.
Meanwhile Mr. Turton makes his rounds, shaking hands and telling a few jokes, but then he returns to the English side of the lawn. On the Indian side, most of the men are grateful to be invited, but for different reasons. Cyril Fielding is at the party, and he wanders about socializing with the Indians. He even stays on the Indian side of the lawn to eat. He hears about Adela and Mrs. Moore’s friendliness to the Indians and is pleased by it.
Fielding now appears as a more important character. He is the only one to have truly successful interactions with both the Indians and the English, but in doing so he sacrifices the herd mentality of the English and neglects to segregate himself with them. He senses that Mrs. Moore and Adela might be sympathetic allies.
Mr. Fielding finds Adela and tells her that the Indians appreciated her kindness. He invites Adela and Mrs. Moore to tea, and Adela gladly accepts. She says that the whole “Bridge Party” has made her ashamed, as almost all the English have been very rude to the Indians. Fielding offers to invite an old Indian professor at the College to tea as well, as he might sing something. Adela mentions Dr. Aziz, and Fielding says he will invite him too.
The main characters of the novel now start to come together. Adela’s friendliness to the Indians is less intimate and natural than that of Mrs. Moore or Fielding, as she is still trying to “study life” and see the “real India.” She objects to English racism, but not out of any emotional attachment or love for Indians – she is interested in the “idea” of India.
Adela looks out at the Marabar Hills and suddenly starts to dread her future married life with Ronny. She doesn’t want to become like the other English expatriates at the club, socializing only with each other “while the true India slid by unnoticed.”
Adela is basically concerned with herself and her own experience, though she is very honest and just. Marriage becomes an important subject in the novel, as it is a traditional sign of true intimacy between two people—an ideal of humanism.
After the party Adela, Ronny, and Mrs. Moore go to dinner with Miss Derek (an English employee of a local Indian ruler) and the McBrydes (the superintendent of police and his wife). They eat traditional English food, “the food of exiles.” During the meal Adela thinks of the other young expatriates like herself who eventually become as conventional and insensitive as all the rest. She promises herself that she will “never get like that,” but she recognizes that this will be almost impossible unless she has allies. She thinks sympathetically of someone like Fielding. Miss Derek, the dinner guest, works for a Maharaja, a native Indian ruler who is allowed by England to govern his own province.
Miss Derek is looked down upon by many of the English because she works for an Indian Maharaja, which is seen as “cheapening” herself. The English try to recreate their homeland in India through food, performances of traditional plays, and an exclusive club—trying to avoid India itself. Adela, however, wants to experience India as it is, although her idea of the “real India” is still romanticized and exoticized, and doesn’t include friendship with Indians.
After the guests leave and Adela goes to bed, Ronny asks Mrs. Moore about Adela. Mrs. Moore says they’ve mostly just talked about India, and she suggests that Ronny should spend more time alone with Adela. Ronny protests that people would gossip. He explains that it’s different in the English community in India – everyone must strictly follow conventions or else they will be gossiped about and ostracized as not “quite their sort.”
Again Forster shows how the English community in India is very different from the one in England itself. The Anglo-Indians huddle together and try to shut out India, but in their closeness there is also lots of gossip and intrigue. The Indians’ social system often seems like a “muddle,” but the English foster similar complexities and suspicions.
Mrs. Moore says that Adela feels that the English are not pleasant to the Indians. Ronny dismisses this as a “side-issue,” saying that the English are here to uphold peace and justice, not to be pleasant. Mrs. Moore says that the English seem to be posing as gods with this attitude. Ronny then goes on a rant about the difficulties of his position, and how the British have a very hard job to do in India that has no room for pleasantness. The narrator explains that Ronny does have a difficult job, which he does without any expectation of gratitude, and that his intentions are good.
Here Forster starts to illustrate some of the cultural and racial differences he finds between Indians and the English. The English (according to him) value fairness and practicality, but lack imagination or deep emotion. The Indians are imaginative and emotional, but sometimes overly so, to the detriment of fairness or getting things done. Ronny seems harsh in his treatment of the Indians, but Forster grants Ronny the dignity of giving Ronny’s side of the situation.
Mrs. Moore disagrees with Ronny, saying that the English are in India to be pleasant to the Indians, as God demands pleasantness and love between all the peoples of the world. Ronny waits until she has finished talking about religion and decides to forgive her arguments because she is getting old. Ronny approves of religion only “as long as it endorsed the National Anthem.” He goes off to bed. Mrs. Moore regrets bringing God into the conversation, for her Christian God has seemed less powerful to her ever since she came to India.
Mrs. Moore takes the “Indian” side here, valuing kindness over fairness. Mrs. Moore is again associated with religion and unity. She begins as a Christian, but, as part of the novel’s continuing trend, she finds her religion too small to encompass the muddles and mysteries of India. Part of the Anglo-Indian mentality is to avoid any discussion of the supernatural, and to never question the value of the British presence in India. | <urn:uuid:0842bcf8-a38e-497d-b791-937cbc050a2a> | CC-MAIN-2022-40 | https://www.litcharts.com/lit/a-passage-to-india/part-1-chapter-5 | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00527.warc.gz | en | 0.974344 | 2,073 | 2.796875 | 3 |
[Unpublished: written c. 1992]
The computer revolution and local history
Alan Macfarlane, King's College, Cambridge
The first programmable electronic computer was invented in 1943; the first vacuum tube computer in 1946; the first electronic delay storage automatic calculator (EDSAC) in Cambridge in 1949. Modern electronic computers are therefore less than fifty years old. This article describes developments that have occurred over the second half of the 42 years since the first modern computer was invented in Cambridge.
In 1972, Sarah Harrison and I decided to try to put
abstracts of some of the records of two English villages into a computer.
Later this was to be expanded into a project to put complete transcripts of
all of the records of the Essex parish
of Earls Colne, between 1400 and 1750, into the machine. (1) The project was
completed in 1983. It had taken approximately thirty man/woman years to complete,
and was the longest funded project in the history of the SSRC/ESRC. Since
1983 we have built on and extended these methods in a further project to computerize
more recent historical records concerning peoples on the border of
From mainframe to laptop.
When we started, and for some fifteen years, there was no real alternative to working on a large 'mainframe' computer. Powerful enough, such a machine was unavailable to most local historians. Furthermore, the mainframes of the 1970's were cumbersome machines, with poor documentation, difficult user interfaces, liable to collapse, although the 'Phoenix' system and 'Tripos' operating system at Cambridge were among the best in the country. Even on these mainframes there were resource constraints. The Earls Colne data, with the indexes it generated, was originally too large to fit on the Cambridge computer. Only the introduction of the "double density disc pack" in the later 1970's solved this problem. In reality, the mainframe made local history computing the preserve of well‑placed and funded academics.
The development of micro computers in the second half of the 1980's to a point where a machine costing a thousand pounds has as much storage and is nearly as fast as the mainframe we started on, has totally transformed the situation. Since about 1989, the advent of "laptop" computers, which can be taken to the local archive or be worked with anywhere, has changed it again. We would clearly have used such machines to enter data and to interrogate it, if they had been available. A "dedicated" machine to hold one's files makes an enormous difference. The presence of such machines would, alone, have cut by a third the time it took to complete the Earls Colne project.
From punched cards to optical character recognition.
When we started on the project, it was still widely believed that computers were numerical devices; the idea of putting many words into the machine was not widely recognized. Hence most material at that time was put into the machine on punched cards or paper tape. We stared with a "flexiwriter", which nearly broke the taxi in which it was collected through its weight, typed in upper case and had to be put into "Shift" for lower case, and which made such a noise that one had to wear "ear defenders". A great step forward were paper‑tape punching IBM golf‑ball machines ‑ though it took us several months to find a golf‑ball with the right characters. (3) This was all painfully slow. A great advance occurred in the later 1970's when it became possible to type material directly into the computer using a visual display unit (VDU), and to edit it using a very expensive university graphics computer (PDP 11) with a light‑pen.
Yet even when these were invented there was no screen
editor or word‑processing package. Very near the end of the Earls Colne
project Dr Tim King produced an editor (ED) for us, one of the first screen
Two major developments have been and are occurring. The first was the arrival of commercially available word‑processors in the 1980's. We have watched the generations of Wordstar from 1 to 6, the emergence of Word, Word Perfect etc. These make input and cleaning of historical records infinitely easier. We would clearly have used them if they had been available.
A second advance, which is only now under way, is the possibility of optically scanning historical documents into the computer. We are now on the edge of a revolution whereby not only printed and typed material can be scanned in, but even manuscripts. This is potentially of great benefit to the local historian, though there is no way in which optical scanners will be able to make sense of many of the more complex manuscripts. If we were starting now, we would invest in a flat‑bed scanner and see what could be done. Certainly many graphics (including maps and diagrams) can be scanned in very efficiently now.
From sequential searching to probabilistic retrieval
When we started, there were no 'database' systems as we know them now. The only way to find anything in a mass of textual records was to search through them all from start to finish, looking for the 'shape' of a word, just as one does with 'Find' on a word processor. This was quite fast for one word on a mainframe, but what if one wanted to jump about through dozens of records? Here we had to invent our own software.
We started with an "indexed sequential" system written by Charles Jardine, which at least found a word or several words more or less instantaneously. In the later 1970's, the earlier philosophy concerning databases, which was based on "hierarchical" searching was just giving way to a new approach, the "relational" database. There were, however, no relational databases available either commercially or even through academic channels. We therefore collaborated with Dr. Tim King who wrote for us one of the first academic relational databases, the CODD database (COroutine Driven Database). This was very powerful and fast. (4)
Now, of course, relational database systems have become standard and can be bought off the shelf in any computer store. Whether the commercial systems (e.g. DBase, Paradox, Foxbase, ideaList ), or the more specialist academic ones (e.g. 'Clio', AskSam, Ethnograph ), they all provide the local historian with Database Management Systems which were not dreamt of at the start of our project. We were developing the software alongside putting in the data, which often meant re‑inputting very large chunks of the data several time, an enormously time‑consuming task which a contemporary local historian is spared.
Furthermore, we are just on the eve of another major shift from this current generation of 'relational' databases. These find what you know is in the texts and put it out as a set of records. The new systems, including 'probabilistic' databases such as the Cambridge Database System, based on the 'Muscat' system developed by Dr Martin Porter, are more interesting for the historian since they tend not only to confirm what one already knows, but suggest links and connections to what one does not know. Furthermore, the restrictions on size of records and length of fields and amount of text editing are lifted. They are more flexible and intuitive, allowing the historian and computer to inter‑act. (5)
Thus, if we were starting now, we would get hold of the latest database of this probabilistic kind and see how it could deal with our Earls Colne records. We have already tried it on twenty‑five thousand ethno‑historical records concerning the Naga peoples over the period 1850‑1950, where it works excellently. It seems likely that it would be appropriate for earlier historical documents as well.
From book to CDROM
One aim of our project was to make available a version of all the material which we have transcribed, as well as an index to this material. An enormous effort had been put into transcribing the complete records of an English village, something which had never been attempted before, and it seemed a pity if this were not made available to the scholarly community as a whole, not only in this country but abroad.
Yet publishing this raw material in the conventional paper form, as a series of what would be at least thirty volumes of 250 pages each, would make it very expensive and very bulky. It was unlikely to find its way into libraries and hence not likely to find a publisher. At the start of the project there was no obvious way to overcome this problem, but towards the end advances in photographic techniques had made it possible to envisage publish the whole collection of documents as Computer Output Microfiche. This cut the cost by a factor of at least four and the size by a very much greater amount.(6)
Yet microfiche and indexes are still quite difficult and slow to use. If we were starting now, we would think of distributing our original texts and the indexes as both text files and as a database file on an electronic medium. This might be floppy discs, to be put onto people's hard disc, or it may soon be possible to do so on CDROM (Compact Disc Read Only Memory). This is a form of storage which was only invented in 1985, but which will hold over 500 megabytes of information (several thousand books) on one disc like a music Compact Disc. CDROM players will soon be commonplace attachments to computers.
Some form of electronic dissemination would enable other historians and educational institutions to interrogate the records in the form of a set of texts or even a database, rather than somewhat cumbersomely by hand.
From hand flagging to computer indexing.
When we started there was very little experience of text processing. At first we were told to code everything, otherwise the computer would not understand what was put in.(7) The error of this soon became apparent and we decided to make highly selective abstracts. We did this for a while, but it was obvious that many of the facts we would be interested in would be left out of the records. We were then advised to put in all of the original text. This meant re‑doing much of the work, but it was a decision which turned out to be correct. Almost always the historian finds that he or she has left out the very pieces that are most important for later historical research, as well as changed the meaning during the abstracting or coding procedure.
Yet having decided to put the whole text into the machine, we encountered the very considerable task of labelling everything so that the computer could make some sense of the list of symbols which it received. We devised a complex system of nested brackets, which broke up the documents. To a certain extent, we tried to replicate the semantic structure of English language within the machine.
This did allow the possibility of tracing genealogical links, the descent of land‑holdings. But it was an immense job. It was done several times by Sarah Harrison, later with the assistance of Jessica King, as the bracketing system was developed.
If we were starting now, we would use a greatly simplified input structure and use the increasing power and sophistication of the computer to provide the indexes. This change in approach is based not only on the experience of the Earls Colne Project, but also the subsequent project on ethno‑historical records. one.
Previously we divided the texts into records, which were then flagged or coded to indicate complex hierarchical bracket types. The types we used were Person, Name, Kin, Relationship, Land, Land Name, Land Number, Hold, From, To, Goods, Bequest, Verb, Conditional, Date. There were also Back Reference, Composite, Reverse Direction and Data Moving brackets, to deal with the idiosyncrasies of English grammar and the past tense. A relatively simple example of one entry in a rental illustrates what had to be put in:
&(P (P *1 (N Henry Abbott ) ) and (P (N Jone ) (K (1 his ) wife))
(H do claim to hold (L a tenement in Church Street) ) &)
This explains to the computer that there is a person with the name Henry Abbott and his wife Jone, linked by the kinship relation of wife, who have a holding relationship to a piece of land in Church Street.
All this had to be checked by hand from diagnostic output to see that the brackets matched and that the nesting of brackets was right. It can be seen that to deal with some thirty thousand records like this is something that most local historians could not contemplate.
On the basis of our two major projects, we would now simplify the field structure. Originally, the material had to be broken up into many different fields. Now, with more powerful retrieval systems, although a few other fields might be needed for special purposes, most local historical projects could be dealt with by using the following: Date, Field name/number, House name/number, Place name, Person name, Medium (e.g. parish register), Reference (archival reference). There would also be one or more 'free text' fields. Some of these would just contain un‑indexed longer texts, perhaps with an indexed caption, others would have every word indexed. It may even be possible to simplify this still further in the future, putting the records in as they are found and abstracting names, places, dates and other information automatically.
Having set up a template of these fields, which automatically sets the flags or codes, it is relatively easy to put in the material and one does not have to worry about the coding.
From number crunching to multimedia.
At first, computers were regarded as number processing devices. The Earls Colne project developed during the 1970's and early 1980's as it became clearer that computers could be useful in text retrieval. But a certain amount of non‑textual material, maps, diagrams, old photographs, had to be left on one side.
During the 1980's a further revolution occurred as it was realised that computers were 'multimedia' devices. At first this became apparent by linking them to peripherals such as optical discs (videodiscs). The first commercially available videodiscs in this country appeared in 1982 and within a few years the BBC Domesday Project had realised some of their potential for storage of both textual and visual materials. (8) Now it is becoming increasingly obvious that computers themselves can hold digital material of all kinds ‑ texts, sounds, pictures.
Already they can hold a little sound and a few pictures and graphics in digital form, or much more when joined to a compact disc (Compact Disc Interactive). But it is likely that during the next few years new storage devices and data compression will mean that it is possible to input not only texts of the normal historical kind, but also sounds (oral history, folk music etc.), maps and other graphics, photographs and even, as compression improves, video and movie film.
If we were starting again, we would consider whether any of these sources are available or could be generated by the historian and how they could be integrated with the texts. For instance, would a set of local documents be enriched if accompanied by a series of maps and photographs?
Nominal record linkage
Quite early on in the project we became interested in the idea of trying to use the computer to link together records, reconstructing individual lives from disparate records, or as it was technically known "nominal record linkage". At first we believed that the computer would be able to do the record linkage automatically. We knew that it was possible to do this using just the christenings, marriages and burials in parish registers, since the machine could be programmed to obey the rules upon which hand linkage was based. It seemed likely that as more information became available through using all the sources, the links would become firmer and the job easier.
After a great deal of effort, we proved to our own satisfaction that automatic record linkage of multi‑source records was too difficult for the computer. Of course, the computer could easily sort the records into name sets and deal with a certain number of the cases. But we found that whatever strategy we used, many of the links were so complex and required so much historical background knowledge that it was impossible to write a program that would replicate the human mind. (9)
It is possible, of course, that artificial intelligence research into "intelligent" systems has advanced so far in the last ten years that what was then impossible could now be done. But it would require a massive amount of programming to do so. Certainly we were forced to abandon the attempt. Having created a name index automatically with the machine (that is every reference to a name), Sarah Harrison used the hand index in tandem with the machine index to sort these names into historical individuals. Even the human being was occasionally stuck, unable to select between the eight Henry Abbotts, for instance, when allocating a passing reference in a court roll. But on the whole the human being could do what the machine could not.
1. The project and records have been described in Alan Macfarlane et al., Reconstructing Historical Communities(Cambridge Univ. Press, 1977) and Alan Macfarlane, A Guide to English Historical Records (Cambridge Univ. Press, 1983). A short description of the computer aspects is contained in T.J.King, 'The use of computers for storing records in historical research', Historical Methods, vol.14, no.2.Spring 1981, and Alan Macfarlane et al, 'Reconstructing Historical Communities by Computer', Current Anthropology, December 1979. The project was financed by King's College, Cambridge and the Social Science Research Council (later Economic and Social Research Council). The project team over these years consisted of Sarah Harrison, Charles Jardine, Jessica King, Tim King and Alan Macfarlane.
2. The project is described briefly in Alan Macfarlane, 'The Cambridge Experimental Videodisc Project', Anthropology Today, vol. 6, no.1, 1990. For a fuller account of the Nagas, produced alongside the videodisc, museum exhibition and computer database, see Julian Jacobs et al., The Nagas; Hill Peoples of Northeast India (Thames and Hudson, 1990).
3. The world of computing in those days, and even parallel searches for golf‑ball type faces, is amusingly described in Ben Ross Schneider, Jr.,Travels in Computerland (Addison‑Wesley, 1974).
4. A brief description of the system is given in T.J.King and J.K.M.Moody, 'Design and Implementation of CODD', Software‑Practice and Experience, vol.13, 1981.
5. The system is based on the Museum Cataloguing System, MUSCAT, originally written by Dr. Martin Porter and documented in The Muscat Manual (4th edn: 1990) and Introduction of Muscat (2nd edn: 1989), both published by the University of Cambridge Computing Service. This is currently under development as the Cambridge Database System (CDS), enquiries about which should be made to Cambridge Multimedia, St Andrews, North Street, Burwell, Cambridge, CB5 OBB.
6. The records have been published by Chadwyck‑Healey Ltd., Cambridge Place, Hills Road, Cambridge, as 'Records of an English Village; Earls Colne 1400‑1750'.
7. This, for instance, was the advice given in the first popular book on historical computing, Edward Shorter, The Historian and the Computer (Prentice Hall, New Jersey, 1971).
8. The BBC Domesday project is described in Peter Armstrong and Mike Tibbetts, Domesday Video Disc User Guide (BBC Publications, 1986) and in Alan Macfarlane, 'BBC Domesday: The Social Construction of Britain on Videodisc', Society for Visual Anthropology Review, vol. 6, no. 2 (Fall, 1990).
9. Full technical documentation on the Earls Colne Project is contained in 'Reconstructing Historical Communities with a Computer: Final Report to the Social Science Research Council' (1983) by Sarah Harrison et al. which is deposited in the British Lending Library. The difficulties of automatic record linkage are described on pp.28‑30 of the Report. | <urn:uuid:7fd1aacc-996d-46a7-9303-2fc29a62deec> | CC-MAIN-2018-39 | http://www.alanmacfarlane.com/FILES/local.htm | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159193.49/warc/CC-MAIN-20180923095108-20180923115508-00126.warc.gz | en | 0.967037 | 4,201 | 2.8125 | 3 |
Phomopsis Fungal Disease
Michael A. Ellis, Omer Erincik
Department of Plant Pathology
For many years, the Eastern grape industry recognized a disease called “dead-arm,” which was thought to be caused by the fungus Phomopsis viticola. In 1976, researchers demonstrated that the dead-arm disease was actually two different diseases that often occur simultaneously. Phomopsis cane and leaf spot (caused by the fungus Phomopsis viticola) is the new name for the cane- and leaf-spotting phase of what was once known as dead-arm. Eutypa dieback (caused by the fungus Eutypa armeniacae) is the new name for the canker- and shoot-dieback phase of what was once known as dead-arm. We now propose that the name dead-arm be dropped. Growers should remember that Phomopsis cane and leaf spot and Eutypa dieback are distinctly different diseases, and their control recommendations vary greatly.
Disease incidence of Phomopsis cane and leaf spot appears to be increasing in many vineyards throughout the Midwest. Crop losses up to 30% have been reported in some Ohio vineyards in growing seasons with weather conducive to disease development. Phomopsis cane and leaf spot can affect most parts of the grapevine, including canes, leaves, rachises (cluster stems), flowers, tendrils, and berries and can cause vineyard losses by:
|Figure 1. Spotting and cracking of grape cane caused by Phomopsis. These typical cane symptoms are usually present only on the first three to four internodes.|
Weakening canes, which makes them more susceptible to winter injury.
Damaging leaves, which reduces photosynthesis.
Infecting cluster stems, which can result in poor fruit development and premature fruit drop.
Infecting berries resulting in a fruit not near harvest.
Spots or lesions on shoots and leaves are common symptoms of the disease. Small, black spots on the internodes at the base of developing shoots are probably the most common disease symptom. These spots are usually found on the first three to four basal internodes (Figure 1). The spots may develop into elliptical lesions that may grow together to form irregular, black, crusty areas. Under severe conditions, shoots may split and form longitudinal cracks. Although cane lesions often appear to result in little damage to the vines, it is important to remember that these lesions are the primary source of overwintering inoculum for the next growing season.
|Figure 2. Symptoms on young leaves early in the season.|
Leaf infections first appear as small, light-green spots with irregular, occasionally star-shaped, margins (Figure 2). Usually only the lower one to four leaves on a shoot are affected. In time, the spots become larger, turn black, and have a yellow margin (Figure 3). Leaves become distorted and die if large numbers of lesions develop. Infections of leaf petioles may cause leaves to turn yellow and fall off.
|Figure 3. Symptoms on older leaves late in the season.|
All parts of the grape cluster (berries and rachises or cluster stems) are susceptible to infection throughout the growing season; however, most infections appear to occur early in the growing season. Lesions developing on the first one or two cluster stems (rachises) on a shoot may result in premature withering of the cluster stem (Figure 4). Infected clusters that survive until harvest often produce infected or poor-quality fruit.
|Figure 4. Symptoms of rachis infection.|
If not controlled early in the growing season, berry infection can result in serious yield loss under the proper environmental conditions. Berry infections first appear close to harvest as infected berries develop a light-brown color (Figure 5). Black, spore-producing structures of the fungus (pycnidia) then break through the berry skin, and the berry soon shrivels. At this advanced stage, Phomopsis cane and leaf spot can be easily mistaken for black rot. Growers should remember that the black rot fungus only infects green berries and will not infect berries after they start to mature. Berries become resistant to black rot infection by three to four weeks after bloom. Fruit rot symptoms caused by Phomopsis generally do not appear until close to harvest on mature fruit. Severe fruit rot has been observed in several Ohio vineyards.
|Figure 5. Symptoms of fruit infection.|
Research has shown that berry infection can occur throughout the growing season; however, most fruit rot infections probably occur early in the season (pre-bloom to two to four weeks after bloom). Once inside green tissues of the berry, the fungus becomes inactive (latent), and the disease does not continue to develop. Infected berries remain without symptoms until late in the season when the fruit matures. Thus, fruit rot that develops at harvest may be due to infections that occurred during bloom.
|Figure 6. Phomopsis fruiting bodies (pycnidia) in a dormant phase.|
Casual Organism and Disease Cycle
The fungus overwinters in lesions or spots on old canes infected during previous seasons (Figure 6) and requires cool, wet weather for spore release and infection. The fungus produces flask-shaped fruiting bodies called pycnidia in the old diseased wood. These pycnidia release spores in early spring and are spread by splashing rain droplets to developing shoots, leaves, and clusters. In the presence of free water, the spores germinate and cause infection. Shoot infection is most likely during the period from bud break until shoots are six to eight inches long. The optimum temperature for leaf and cane infections is between 60 and 68°F, and a wetness duration of at least six hours is required at these temperatures.
As the wetness duration increases, the opportunity for infection greatly increases. Lesions on leaves appear at seven to 10 days after infection. Fully expanded leaves become resistant to infection. Lesions on canes require three to four weeks to develop. The fungus does not appear to be active during the warm summer months, but it can become active during cool, wet weather later in the growing season. Pycnidia eventually develop in cane lesions and will provide the initial inoculum for infections during the next growing season.
- Select planting sites with direct, all-day sunlight (avoid shade). Good soil drainage and air circulation are also very important. Orient rows to take full advantage of sunlight and wind movement. Cultural practices that increase air circulation and light penetration in the vineyard will reduce wetting periods and should be beneficial for control.
- While dormant pruning, cut out infected canes and destroy them. Select only strong, healthy canes that are uniform in color to produce the next season’s crop.
- Proper timing of early-season fungicide sprays is important for control in commercial vineyards.
|Figure 7. Figure 7. Disease cycle of Phomopsis cane and leaf spot. We wish to thank the New York Agricultural Experiment Station for use of this figure. Figure taken from Grape IPM Disease Identification Sheet No. 6.|
For the most current spray recommendations, commercial growers are referred to Bulletin 506-B2, Ohio Commercial Small Fruit and Grape Spray Guide, and backyard growers are referred to Bulletin 780, Controlling Diseases and Insects in Home Fruit Plantings.
Printed copies of these publications can be obtained from your county Extension agent or the Extension Publications Office, The Ohio State University, 385 Kottman Hall, 2021 Coffey Road, Columbus, Ohio 43210-1044.
More information about plant diseases and online versions of Ohio State University Extension plant disease fact sheets and bulletins, with color figures, are available on the following websites: | <urn:uuid:6e908a78-1b05-465c-b056-be42aff067f4> | CC-MAIN-2021-17 | https://www.dirtdoctor.com/garden/Phomopsis-Fungal-Disease_vq1629.htm | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064898.14/warc/CC-MAIN-20210411174053-20210411204053-00197.warc.gz | en | 0.939378 | 1,613 | 3.390625 | 3 |
The South African Meerkat Radio Telescope is the forerunner of the telescope Square kilometer line (SKA), a giant radio telescope project with multiple interferometric networks in metric and centimetric wavelengths and having a collecting surface area equivalent to one square kilometer. It has made it possible to study the shock wave resulting from the collision of galaxies over 6.5 million light-years away.
As a part of Caused by her At the very beginning of the history of the observable universe, with the collapse of ordinary matter leading to galaxies. These, in turn, and always follow the concentration Will collect in the fibers and inside Contains hundreds or thousands of galaxies.The Mentioned
The Mirgate Network of Radio Telescopes in South Africa enables continuous detection of radio emissions from extraterrestrial civilizations within the framework of the Chetty Project. To get the most accurate French translation, click on the white rectangle in the lower right. English verses should appear later. Then click on the nut to the right of the rectangle, then “Verses” and finally “Auto Translate”. Select “French”. © Berglicetti
Shock waves that indirectly radiate electrons
A few years ago, a new network of radio telescopes was launched in South Africa. This And it consisted of 64 parabolas The individual is 13.5 m in diameter and spreads over an area of 8 km. Today, a team of radio astronomers using data from this instrument reveals that they provide very detailed images of the shock wave, which is comparable to an explosion caused by a collision with an interlectric medium. Two galaxies and a cluster known as Abel 3667 formed about a billion years ago.
The bunch is mentioned in the list of stars of the same type whose constitution was initiatedThe first edition was published in 1958 by the American George Acton Abel. Now there are more than 4,000 in it.
From the images in the radio field, it is clear that the creation of the Abel 3667 was accompanied by a supersonic boom in the intercalactic medium and hot plasma bathing the clusters. The main system observed is approximately 6.5 million.. Remember that the visible disk of our Milky Way galaxy is only 100,000 light years across. One can measure the magnitude of the shock wave by looking at a portion of its X-ray image From synthetic to false above . Details of the researchers’ findings on Abell 3667 are presented in a paper
Francesco de Casparin (University of Hamburg and INAF), Editor-in-Chief of the article, explains in a report about the structures revealed by the Mirgate images. South African Radio Astronomy Laboratory (SARAO) They ” It was full of surprises and more complicated than we initially thought. The It speeds up At close speed . As these fast electrons pass through a magnetic field, they emit the radio waves we see. “. | <urn:uuid:58b82b6c-c521-46c9-abe3-5df812424756> | CC-MAIN-2023-06 | https://presstories.com/2022/03/02/6-5-million-light-years-of-explosion-caused-by-galaxy-collisions/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499470.19/warc/CC-MAIN-20230128023233-20230128053233-00012.warc.gz | en | 0.922614 | 598 | 3.453125 | 3 |
Anorexia nervosa is a potentially life-threatening eating disorder but how do you know if you have anorexia, what are the symptoms and how can you get help?
What is anorexia?
Anorexia is a compulsive mental illness where the sufferer becomes obsessed with losing weight or staying thin. They do this in a number of ways including skipping meals, cutting out certain foods, excessively exercising or sometimes binge-eating and then throwing up. Often they have a distorted view of their body and think they’re heavier than they are.
Why do you get anorexia?
Although anorexia is called an ‘eating disorder’ it’s actually a mental health condition, often troubling people with low self-esteem who find it hard to deal with anxiety and stress. More often than not, people with anorexia have other issues in their lives making them unhappy and use food as a way of feeling more in control.
“It usually starts with just restricting your diet,” says psychotherapist Andrea Scherzer. “Like cutting out carbs, for example. You start losing weight; get a buzz from that, and so start cutting out more food.”
This thinking can then become more and more obsessional until the eating disorder can start to dominate certain parts of your life.
What are the symptoms of anorexia?
Anorexia has physical, psychological and behavioural symptoms.
- Lying about eating
- Cooking food for everyone else
- Obsessively exercising
- Obsessively doing certain things in a certain way (‘ritualistic behaviour’)
- Trying to make everyone happy
- Severe weight loss
- Frequently feeling cold
- Hair falling out or fine hair growing all over your body
- Constipation and stomach pains
- If you’re a girl your periods stop
- Feeling irritable and moody with a difficulty concentrating
- Dizziness and problems sleeping
- Lots of sufferers describe anorexia as having a voice in their head, constantly telling them they’re fat and worthless
- Constantly thinking about food and calories
- Believing that you’ll be ‘happy’ once you reach a certain weight
Help with anorexia
In order to beat anorexia, you need to recognise you need help and want to get better.
Realising you need help – and being open to getting it – is the important first step. Try talking to someone you trust about what’s going on such as a close friend or family member. We know this may be scary if you’ve been keeping it a secret for so long, but you deserve help and support for what you’re going through. If you’re not ready to talk to a close friend or family member we recommend you speak to your GP ASAP as they can refer you to best person to help. Read our article about treatments for eating disorders for more information. There are also plenty of online support groups that offer advice via email and over the phone – Beat (beating eating disorders) has a helpline with a call back service.
What are the long-term risks of anorexia?
Many people recover from anorexia and go on to have a better relationship with food and themselves.
But if left untreated over a long period of time anorexia can severely damage your health. Osteoporosis, where your bones get very brittle and can break easily, is a common side effect and is also irreversible.
If you’re female an eating disorder like anorexia can sometimes permanently affect your fertility.
Anorexia has the highest mortality rate of all eating disorders – another reason to get help if you can. Death is usually from heart failure, caused by the body going into starvation mode.
Given these long-term risks, it is therefore really important to get help as soon as you notice any symptoms by following the steps above.
- Beat help people overcome eating disorders through helplines, online support and self-help groups. Call 0808 801 0677 or, if you're under 18, call their Youthline on 0808 801 0711.
- Men get eating disorders too (MGEDT) run discussion boards for men with eating disorders where you can get peer support.
- Chat about this subject on our Discussion Boards.
- Need help but confused where to go locally? Download our StepFinder iPhone app to find local support services quickly.
Updated on 05-Jul-2016
How to help others during the corona crisis
Want to know how to help your community during the ...
How to cope with a self-harm relapse
Worried that you're self-harming again? Here's our ...
5 tips if someone tells you they’re self-harming
Here's our advice on what to do if someone you know is ...
How to deal with corona-anxiety
A guide to looking after your mental health during the ...
Is anxiety affecting your relationship?
Handling your love life with your anxiety and panic attacks. | <urn:uuid:ad8684da-60e6-46f5-bb53-123c79013a95> | CC-MAIN-2020-29 | https://www.themix.org.uk/mental-health/eating-disorders/anorexia-5880.html | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890157.10/warc/CC-MAIN-20200706073443-20200706103443-00577.warc.gz | en | 0.94513 | 1,066 | 2.859375 | 3 |
Safety signs should be sited in clear view to staff and in appropriate positions to give sufficient warning or time to react. A sign in a warehouse warning of forklift trucks in operation is of little use; if it is only within the trucks operating area. The pictograms used on safety signage must be simple; and bear as straightforward a message as possible, containing only the essential details to avoid misinterpretation.
Safety signs are there to keep workers safe and play an important part in communicating health & safety information. If correctly positioned in clear view and well lit; at all times) they can help in keeping the workforce informed and safe.
Grouping of signs is allowed, but care should be taken to create confusion or contradictions. Here we look at possible inconsistencies of usage.
Here the colour and shape suggest a fire fighting equipment sign; but the message is a hazard warning and therefore should be triangular and yellow and black in colour scheme. The sign has also been defaced (in the right-hand lower corner).
It is not immediately obvious that this is a hazard signboard; it can cause confusion and lead to accidents or a dangerous occurrence.
This example is not so clear cut, but worthy of discussion. This mandatory sign colour and shape does give a positive action, “Keep Clear”.
A Prohibited sign would possibly have been more compliant with the regulations; for the “Keep Clear” instruction; and a two sign option could have been then utilised; instead of one – with Exit from Emergency Escape Route in green livery. | <urn:uuid:23312958-1239-4bea-a16a-d4fb1595eeee> | CC-MAIN-2022-40 | https://www.enable-academy.uk/topic/sign-usage/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337971.74/warc/CC-MAIN-20221007045521-20221007075521-00138.warc.gz | en | 0.936106 | 316 | 2.90625 | 3 |
Here's a Schoolhouse Rock video all about prepositions! The lyrics are below the video. All the prepositional phrases are in bold type.
Like a butterfly or like a bee
Like an ant as busy as can be
These little words we call the busy Ps:
Nine or ten of them do most all of the work…
Of, on, to, with, in, from, by, for, at, over, across--
And many others do their job,
Which is simply to connect
Their noun or pronoun object
To some other word
In the sentence.
Busy Ps, if you please
On the top is where you are
(top relates to “where”)
With a friend you’ll travel far
(With a friend you'll go)
If you try you’ll know that you can fly over the rainbow
(Over the rainbow is where you can fly)
Always on the go
Like a bunch
Of busy bees
Floating pollen on the breeze
Buzzing over the meadows
Beyond the forest, through the trees
Into the beehive--
Busy, busy Ps
Into, beyond, over, on, through!
Busy prepositions always out in front
On the edges, in the crack,
Around the corner, from the back,
In between the action,
Stating clearly to your satisfaction
the location and direction.
Prepositions give specific information.
Though little words they are,
They never stand alone
Gathering words behind him you soon will see
How they have grown into a parade:
A prepositional phrase,
With a noun or at least a pronoun bringing up the rear
A little phrase of 2 or 3 or more words.
Prepositions! Attention! Forward--march!
Busy prepositions, always on the march,
Like a horde
Of soldier ants
Inching bravely forward on the slimmest chance
That they might better their positions.
Busy, busy prepositions,
In the air, on the ground, everywhere--
The sun sank lower in the west.
In the west it sank,
And it will rise in the morning and will bring the light of day.
We say the sun comes up in the east every day.
In the east it rises.
Busy busy busy
On the top is where you are.
(On the top)
If you try you know that you can fly
Over the rainbow. | <urn:uuid:bd7846eb-dffd-4a4c-987b-9d0372ad560f> | CC-MAIN-2018-09 | http://001spr2009.blogspot.com/2009/01/prepositions.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814833.62/warc/CC-MAIN-20180223194145-20180223214145-00294.warc.gz | en | 0.882804 | 535 | 3.203125 | 3 |
These countries include Afghanistan, Iraq, Iran, Kuwait, Kyrgyzstan, Lebanon, Pakistan, Bahrain, Oman, United Arab Emirates, Israel, Qatar, Jordan, Turkey, Syria, Saudi Arabia, Turkmenistan and Uzbekistan Egypt and Sudan are still debatable if they belong to Asia or North Africa. During World War I, many nations especially those in the Middle East suffered political instability, social, and economic imbalance.
Nevertheless, the First World War spurred the technological development in Middle East nations. After the World War I, most of the countries were under colonialism; nevertheless, the departure of colonialists spurred civil wars, ethnic wars, boundary disputes, political uprisings, and subsequent economic decline that many of these nations fight to control.
Changes in the Middle East after the commencement of World War I Power derangement was the worldwide impact of the First World War and Middle East was no exception. Furthermore, according to political analyst the genesis of the political upheavals in the modern day Middle East dates back in 1914 during the world war (Craig et al, 2009, P.20). The Ottoman Empire an influential political identity in the Middle East, which the Arabians defended, was the main target during the war.
Subsequently, after the empire crumbled, the Britain controlled Lebanon, Syria, Iraq, Jordan, and Palestine among other countries in the Middle East (Magnus, 2005, p.40). The involvement in the war by the countries from the Middle East not only led to loss of power but also spurred the economic decline and created social problems.
The second change set in by the First World War was the technology development in the Middle East. Britain, Germany, and France had adopted the use of powerful machines like guns, bombs and nuclear weapons, which the people of Middle East acquired. The forces/ people from Middle East who participated in the war acquired operating and construction skills for the deadly weapons (Wilbur, 1991, p.50).
Consequently, the current technological trend especially in weapons is now on the rise in the Middle East. Therefore, the war led to the acquisition of military personnel, weapons, and fighting strategies in the Middle East.
Get your 100% original paper on any topic done in as little as 3 hours Learn More The third change set by the First World War is the psychological torture and imbalance by the military personnel and citizens of Middle East. Deaths, insecurity, and family loss led to the victims, civilians, and military to undergo psychological trauma.
Moreover, the abrupt change of power from monarchical to colonialism negatively affected the citizens of Middle East. Consequently, the occupation of Middle East by foreigners stimulated anger and frustrations among the citizens.
Lastly, racism and ethnic bias started immediately as the world uprising commenced. The creation of sanctions by Britain and France, the crush of the Ottoman Empire and the occurrence of the Armenian genocide exacerbated racial conflicts and ethnicity in the Middle East (Niall, 2006, p.30). Therefore, the occurrence of the First World War was the genesis of all the social, economic, and political problems as expounded next.
The rise of each Middle East country and historical overview since the end of the World War I Though not fully involved in the First World War, Afghanistan was always in constant conflicts with the Greeks, Persians, British (Anglo-afghan war) and Mongols among others.
The major war that involved Russians in 1980, led to the death and displacement of many Afghanis. Since the end of World War I up to now, Afghanistan has not known peace, civil wars and terrorism have contributed to the poor economic, social, and political stability.
On the contrary, Bahrain, which was a British colony (after the First World War) up to 1971, has experienced an economic boom due to availability of political stability, tourism sector and petroleum industry. Although it contains immense natural resources, Iran is a state that has experienced political instability since the end of the First World War. However, it is currently struggling to implement political, economic, and social reforms.
Likewise, Iraq has experienced both civil and internally wars, but the fall of Saddam Hussein and control of political aggression by the U.S have led to transition.
We will write a custom Essay on Changes in the Middle East After the World War I specifically for you! Get your first paper with 15% OFF Learn More Israel is a state that holds the landmarks of all the three main religions (Christianity, Muslim and Jewish) in the world. Nevertheless, ethnic clashes have led to political upheaval since the end of the first war. On the other hand, Jordan was a colony of Britain (after WWI) but gained independence in 1945, which led to the establishment of international trade and economic reforms.
In the same way, Lebanon became independent but civil wars due to political instability reigned for sometime. Currently, the state is struggling to reinstate political and economic reforms. Like Lebanon, after independence from Britain Pakistan has been in conflicts with the Indians over the Kashmir region but currently the political reforms and international treaties are in place to ensure there is peace.
Besides the Gulf War and colonialism that are now at bay, Kuwait, Oman, Qatar and Kyrgyzstan, are the few nations in the region, which are economically stable due to the presence of petroleum industry, modern infrastructures, and natural gas among others. However, Qatar is the nations with the highest income per capita in the Middle East region.
Turkey is a nation formed by Anatolian remnants after the fall of the Ottoman Empire. The nation has successfully adopted reforms, which have led to economic prowess.
Similarly, Saudi Arabia experiences political instability and economic growth from oil reserves since the end of the First World War. While Tajikistan and Syria after gaining independence from Soviet Union and the French respectively they have adopted economic, political, and social reforms that have led to the nation’s stability.
In addition, the independence of Turkmenistan and U.A.E from Soviet Union and Britain respectively, has led to the establishment of autonomous states with economic stability. Lastly, Yemen and Uzbekistan colonies of British and Soviet Union respectively have gained independence and due to possession of natural resources, their economic power is on the rise.
Conclusion Although most of the countries in the Middle East are lucky to posses’ natural resources like gas, petroleum and minerals, the impact of the First World War I still holds back their economic growth.
Political instability and social problems like racism and ethnicity are some of the vices acquired during the first world, which the states struggle to control decades after the end of the war. However, a few of the states have put in place reforms to control the problems initiated by the First World War.
Not sure if you can write a paper on Changes in the Middle East After the World War I by yourself? We can help you for only $16.05 $11/page Learn More References Craig, A. M., Graham, W. A., Kagan, D., Ozment, S.,
Statuses of Ego Identity Analytical Essay
Nursing Assignment Help Introduction Ego identity may be regarded as the sense of one understanding him or herself as a distinct individual. It is basically an outcome of the identity crisis that is most evident as a person progresses through the adolescent years. A number of psychologists have attempted to explain the process of identity development. James Marcia elaborated on Erikson’s work in order to elucidate identity formation, particularly in adolescents. In his work, he described four statuses that characterize identity development.
Identity Statuses According to Marcia (1996), the two criteria used to determine the identity state of an individual are crisis and commitment. Crisis in this context refers to the adolescent’s period of choosing among meaningful alternatives while commitment refers to the degree of personal investment the individual exhibits (Marcia, 1996). The four identity statuses as defined by Marcia are; identity foreclosure, identity diffusion, identity moratorium and identity achievement.
Identity foreclosure occurs when an adolescent has decided on a commitment but has not undergone an identity crisis. Such an adolescent has not had the opportunity to develop his own ideals and has come up with their identity as a result of what he has learnt from his parents and society, his personality is characterized by a certain rigidity of mind (Marcia, 1996).
According to Marcia (1996), regardless of whether this type of an adolescent has or has not experienced a crisis he or she lacks commitment. In addition to this, the adolescent shows no interest in occupational or ideological choices (Wentzel | <urn:uuid:8d88332f-1fc9-4305-938e-9bd748958f80> | CC-MAIN-2022-21 | https://anyfreeessay.com/changes-in-the-middle-east-after-the-world-war-i-essay/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662564830.55/warc/CC-MAIN-20220524045003-20220524075003-00046.warc.gz | en | 0.952379 | 1,771 | 3.0625 | 3 |
TimeBank 1.2 contains 183 news articles that have been annotated with temporal information, adding events, times and temporal links between events and times. The annotation follows the TimeML 1.2.1 specificationavailable at www.timeml.org.
TimeML aims to capture and represent temporal information. This is accomplished using four primary tag types: TIMEX3 for temporal expressions, EVENT for temporal events, SIGNAL for temporal signals, and LINK for representing relationships. For a detailed description of TimeML, see the TimeML 1.2.1 Specification and Guidelines. Here, we give a summary of each tag.
TIMEX3. This tag is used to capture dates, times, durations, and sets of dates and times. All TIMEX3 tags include a type and a value along with some other possible attributes. The value is given according to the ISO 8601 standard. The TIMEX3 tag allows specification of a tempral anchor. This facilitates the use of temporal functions to calculate the value of an underspecified temporal expression. For example, an article might include a document creation time such as "January 3, 2006." Later in the article, the temporal expression "today" may occur. By anchoring the TIMEX3 for "today" to the document creation time, we can determine the exact value of the TIMEX3.
EVENT. The EVENT tag is used to annotate those elements in a text that mark the semantic events described by it. Any event that can be temporally anchored or ordered is captured with this tag. An EVENT includes a class attribute with values such as occurrence, state, or reporting. The class of an EVENT may indicate what relationships the event participates in. In addition to the EVENT tag, events are also annotated with one or more MAKEINSTANCE tags that include information about a particular instance of the event. This includes part of speech, tense, aspect, modality, and polarity. When an event participates in a relationship, it is actually the event instance that is referenced. This is to allow for statements such as "John taught on Monday but not on Tuesday." Here, there are actually two instances of the teaching-event: one that has a positive polarity and one that is negative. Further, each instance participates in its own temporal relationship with respect to "Monday" and "Tuesday."
SIGNAL. The SIGNAL tag is used to annotate temporal function words such as "after," "during," and "when." These signals are then used in the representation of a temporal relationship.
The following three tags are link tags. They capture temporal, subordination, and aspectual relationships found in the text. These tags do not consume any actual text, but they do relate the three tag types above to each other.
TLINK. Temporal links are represented with a TLINK tag. A TLINK can temporally relate two temporal expressions, two event instances, or a temporal expression and an event instance. Along with an identification marker for each of these two elements, a relation type is given such as before, includes, or ended by. When a signal is present that helps to define the relationship, an ID for the SIGNAL is given as well.
SLINK. This tag is used to capture subordination relationships that involve event modality, evidentiality, and factuality. An SLINK includes an event instance ID for the subordinating event and an event instance ID for the subordinated event. Possible relation types for SLINK include modal, evidential, and factive. An SLINK will typically not include a signal ID unless it has the relation type conditional. Three specific EVENT classes interact with SLINK: reporting, i_state, and i_action.
ALINK. An aspectual connection between two event instances is represented with ALINK. As with SLINK, this tag includes two event instance IDs, one that introduces the ALINK and one that is the event argument to that event. The introducing event has the class aspectual. Some possible relation types for ALINK are initiates, terminates, and continues. TimeBank 1.2 contains 183 articles with just over 61,000 non-punctuation tokens. The count for each TimeML tag is listed below:
|EVENT ||7935 |
|MAKEINSTANCE ||7,940 |
|TIMEX3 ||1,414 |
|SIGNAL ||688 |
|ALINK ||265 |
|SLINK ||2,932 |
|TLINK ||6,418 |
|Total ||27,592 |
Samples For an example of the data in this corpus, please view the following samples.
Portions © 1998 American Broadcasting Corporation, © 1998 The Associated Press, © 1998 Cable News Network, LP, LLLP, © 1987-1989 Dow Jones & Company, Inc., © 1998 New York Times, © 1998 Public Radio International, © 2002-2006 Brandeis University, © 2006 Trustees of the University of Pennsylvania
The World is a co-production of Public Radio International and the British Broadcasting Corporation and is produced at WGBH Boston. | <urn:uuid:a11bcf2d-445e-4b52-b676-5929316d022b> | CC-MAIN-2013-48 | http://catalog.ldc.upenn.edu/LDC2006T08 | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164580801/warc/CC-MAIN-20131204134300-00035-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.91152 | 1,055 | 2.90625 | 3 |
The term “constellation” refers to a region of sky, so the constellation of Cassiopeia technically contains hundreds of stars, but what most people think of as Cassiopeia is the stretched ‘W’ shape made by the five brightest stars.
Alpha Cassiopeiae (α Cas, Schedar) is a cool (4500 K) orange giant star located 229 light-years from Earth. It is the brightest of the stars in Cassiopeia.
Beta Cassiopeiae (β Cas, Caph) is a warm (7100 K) yellow-white giant variable binary star 54.5 light-years from Earth. It is the second brightest of the stars in Cassiopeia and varies in apparent magnitude (brightness) between +2.25 to +2.31.
Gamma Cassiopeiae (γ Cas, Tsih) is a hot (31 000 K) blue subgiant eruptive variable binary star, the prototype of the shell type of variable stars. It is by far the most powerful of the stars in Cassiopeia but only the third brightest* as it is located 613 light-years from Earth. Gus Grissom, an astronaut who took part in Mercury and Gemini missions and who died in the Apollo 1 accident named the star “Navi”, after his middle name backwards, as the star was commonly used as a navigational aid during space missions.
Delta Cassiopeiae (δ Cas, Ruchbah) is a warm (8400 K) blue-white star, part of an eclipsing binary system. It is located 99.4 light-years from Earth.
Epsilon Cassiopeiae (ε Cas, Segin) is a hot (15 200 K) blue-white giant star and is the dimmest of the five, at a distance of 442 light-years from Earth.
Cassiopeia also contains some other interesting stuff: ρ Cassiopeiae and V509 Cassiopeiae are yellow hypergiants and two of the most luminous stars in the Milky Way, with ρ Cas being more than ninety million times the size of the Sun and around half a million times more powerful. Cassiopeia A is a the remnant of a supernova that occurred 300 years ago and the brightest source of radio waves outside of our own Sun. Cassiopeia also contains the Pacman nebula and two Messier objects, M52 and M103, both of which are open clusters visible from Earth with binoculars.
* The brightness of γ Cas varies irregularly but when it is at its brightest, with an apparent magntiude of +3.40, it is the brightest star in Cassiopeia. | <urn:uuid:16b0d623-5e00-4008-9d90-f83510142a6c> | CC-MAIN-2018-51 | http://wordpress.mrreid.org/2012/06/09/cassiopeia/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824180.12/warc/CC-MAIN-20181212225044-20181213010544-00497.warc.gz | en | 0.944426 | 576 | 3.421875 | 3 |
“For there were among them such innumerable horns and trumpets, which were being blown at the same time from all parts of their army, and their cries were so loud and piercing, that the noise seemed to come not from human voices and trumpets, but from the whole countryside at once”.
(Polybius, Histories, II, 29)
The most unique and distinct of barbarian musical instruments was the Celtic carnyx – a type of elongated war trumpet which was usually (but not exclusively) shaped as a boar’s head. The term “carnyx” is derived from the Gaulish root, “carn-” or “cern-” meaning “antler” or “horn,” the same root as in the name of the Celtic god Cernunnos (Delmarre X. (2003) Dictionnaire de la langue gauloise. Paris. p. 106-107). The instruments themselves were of bronze and played upright, as illustrated by their depiction on the Gundestrup cauldron.
Carnyx from the Gaulish sanctuary of Tintignac (Corrèze, Gaul), and examples depicted on the Gundestrup Cauldron
Reconstruction of a Carnyx found at Tintignac. The carnyx was 1.80m. long, and one of 7 found at the site (6 representing a boars head, and one a serpent)
(after Gilbert J., Brasseur E., Dalmont J.P., Maniquet C. Acoustical Evaluation of the Carnyx of Tintignac. In: Proceedings of the acoustics conference, Nantes 2012. p. 3956-3959)
Besides depictions on coins and other artifacts from the period, archaeological evidence of the carnyx has been found at Celtic sites throughout Europe, stretching from the British Isles to the Balkans, illustrating that it was common to the pan-Celtic tribes across the continent.
Celtic carnyx depicted on a Roman gold stater from 48 BC
Serpent headed carnyx from Tintignac
Boar headed carnyx from Deskford, Scotland (mid 1st c. AD)
“Their trumpets again are of a peculiar barbarian kind; they blow into them and produce a harsh sound which suits the tumult of war”
(Diod. Sic. V,30)
Scientific reconstructions of these strange instruments, based on archaeological finds (Gilbert et al 2012), confirm that the carnyx produced a distinctive eerie sound, unlike any other ancient or modern musical instrument, and was therefore ideally suited to the atmosphere of battle, for which it was created.
Carnyx discovered in a ritual pit at the Gaulish sanctuary at Tintignac
In the year 1811, a most spectacular discovery was made in an orchard at the village of Negau (today Ženjak) in Slovenia. The Negau Hoard, consisting of 26 bronze Etruscan helmets, many bearing inscriptions in a Celtic script, represents one of the most important archaeological finds in this part of Europe.
The helmets are of an Etruscan design from circa 500-450 BC called the Vetulonic or Negau type, which are of bronze with a comb-shaped ridge across the skull, and a protruding rim with a groove right above the rim. However, the inscriptions on the helmets are believed to have been added at a much later date (2nd c. BC), and the deposition has been dated to circa 50 BC – i.e. shortly before the Roman conquest of the area.
The Negau B Helmet
As mentioned, the deposition of the Negau Hoard has been dated to circa 50 BC, when such helmets had long been obsolete, having been replaced by more modern equipment such as the Novo Mesto type helmets (below). It appears that after becoming redundant the Negau helmets took on a ceremonial / religious function, as attested to by the Celtic inscriptions on the helmets, which bear the names of priests/druids (see Markey T. (2001) A Tale of Two Helmets: The Negau A and B Inscriptions. In: The Journal of Indo-European Studies, Volume 29, 2001; Must G. (1957) The Problem of the Inscription on Helmet B of Negau. In: Harvard Studies in Classical Philology Vol. 62, (1957), pp. 51-59).
Celtic Novo Mesto type helmet discovered in the river Sava, Croatia (1st c. BC)
Increasing evidence of the use of a Celtic script on the Balkans, based on the Etruscan alphabet, has come to light in recent years, and indicates that this alphabet continued to be used throughout the Roman period (see Celtic Graffiti article with relevant lit.).
Inscriptions in the Celtic script from Grad (A) and Posočje (B), Slovenia
(see Celtic Graffiti article, with cited lit.)
The inscription on the Negau B helmet
The majority of the Celtic inscriptions on the Negau helmets are structured: name + ‘the diviner’, name + ‘astral priest of the troop’, while an inscription on one of the helmets – the so-called Negau B helmet, has attracted particular attention. According to linguistic analysis, it contains the Germanic name *Harigasti(z), which consists of two parts: hari = army, host (found in Old Norse herjan – to make war, to plunder, hernað – warfare; or in German Heer – army) and gasti(z) = guest. The second part of the inscription has been interpreted as *teiwa(z) = god. Thus the inscription would read: “Harigasti, [the priest of] the god” (Markey 2001). If such analysis is correct, this would represent the earliest recorded Germanic inscription.
How a Germanic priest came to be living among the local Celtic population during this period is another question…
Celtic Strymon/Trident Coinage:
The nature of burial rituals practiced by the Iron Age European population makes the task of archaeologists an especially complex one. In particular, the Celtic burial process, which generally included the deliberate ‘killing’ of the artifacts, i.e. the bending, breaking or otherwise deformation of weapons and other objects before being placed on the funeral pyre, and subsequent cremation of the articles along with the body of the deceased, has meant that material from Celtic burials is often rendered unrecognizable to the naked eye.
A good example of this phenomenon is the recently published middle La Têne warrior burial (LT C1/C2) from the Auersperg Palace in Ljubljana (Slovenia), which yielded the cremated bones of the individual along with a rich burial inventory. However, while initial excavation of the burial revealed only an unrecognizable melted conglomerate of iron, bone and ceramic material, subsequent analysis showed that the ‘lump’ actually contained, among other objects, a ritually ‘killed’ middle La Tène sword and shield boss, a shaft-hole axe, as well as human and animal bones.
Particularly interesting is the fact that the human bones included a fragment of the cranial part of the skull with an unfused suture, which belonged to a person under 20 years of age. Thus, it appears that in death, due to nature of the burial rites observed, and subsequent environmental factors, this ‘boy warrior’ literally fused with his weapons.
Auersperg Palace. The conglomerate of the distorted weapons
(Illustrations after Štrajhar M., Gaspari A., Ostanki Dveh Srednjelatehskih Bojevniških Grobov Iz Turjaške Palače v Ljubljani, Pril. Inst. Arheol. Zagrebu, 30/2013, str. 27-43)
A scanned image of the conglomerate
Auersperg Palace. The upper half of a larger vessel from the layer
A further fascinating find from the same deposit / layer, but originating from another (slightly earlier) grave unit, is a ritually ‘killed’ scabbard, typical for the Celtic LT C1b phase. The scabbard is decorated with a unique composite motif of a dragon pair and a snake, combined with vegetative ornamentation. A similar combination of ornaments is most often found on scabbards from the southern border area of the Pannonian Plain, which are discovered in burials from the later part of the LT C1 phase. The complexity of the decoration, which is typical for the latest phase of the Celtic ‘dragon pair’ depictions, thus dates the manufacture of the Auersperg Palace scabbard in the late 3rd century BC (Štrajhar, Gaspari, op cit).
The Auersperg Palace scabbard and detail of decoration
A wealth of Celtic archaeological material, mostly dating to the late La Têne period, has been discovered over the past decades by ‘treasure hunters’ at the Iron Age hillfort at Žerovnišček near Bločice (Notranjska Region) in Slovenia. Perhaps the most fascinating of these artifacts is a bronze statuette of a horned deity which dates to the late La Têne period and, according to archaeologists, depicts the God Mars who also became associated with the Greek God Ares, and was popular in the Celtic world where he was associated with various local deities (Šašel Kos M. (1999) Pre-Roman Divinities of the Eastern Alps and Adriatic. Situla 38).
(after Laharnar B. (2009) The Žerovnišček Iron Age Hillfort near Bločice in the Notranjska Region. In: Arheološki vestnik 60, 2009. P. 97 – 157)
The libation dish (patera) in the extended right hand is an Italico-Etruscan motif characteristic of donor statuettes between the 3-1st c. BC
Most interesting about the Žerovnišček statuette is the fact that the deity is depicted with a horned helmet, which ancient authors mention were worn by the Celts:
“On their heads they put bronze helmets which have large embossed figures standing out from them and give an appearance of great size to those who wear them; for in some cases horns are attached to the helmet so as to form a single piece, in other cases images of the fore-parts of birds or four footed animals”.
Diodorus Siculus (on Celtic helmets) (History V.30.2)
Horned helmets among the Celtic tribes are also well documented in artwork and coins from the period, and archaeological confirmation of the existence of such helmets includes depictions of a warrior on an early La Têne stone slab from Bormio, examples depicted on the Gundestrup cauldron, as well as the horned Waterloo helmet found in the river Thames in London, and another discovered near the village of Bryastovetz in eastern Bulgaria.
The Bryastovetz Horned Helmet from Eastern Bulgaria (3rd/2nd c. BC)
(Sofia Archaeological Museum Inv. # 3454)
A statuette of the Goddess Athena / Minerva with a votive inscription from the middle and late La Têne period settlement at Dornach (Aschheim, Munich) also has a helmet with cattle horns. The statuette was found in a late La Têne well or ritual shaft, in a layer dated to between 80 and 50/30 BC. The statuette is stylistically of Late Hellenistic form (Dietz K. (1999) Die Inschrift auf dem sockel der Dornacher Athene. In: Irlinger, Winghart 1999:144-147).
The Žerovnišček statuette, executed in the Italico-Etruscan tradition (Laharnar op cit), with Celtic iconography interwoven, represents a wonderful example of the synthesis of Italico-Etruscan and Celtic artistic/cultural traditions.
“the mechanism of dreams where things have floating contours and pass into other things”.
The Celtic helmet from Silivaş (Transylvania) was first published in 1925 as part of the inventory of a warrior burial which also included two spearheads, a sword, dagger, brooch and a ‘sickle’ (actually a curved dagger), all of which had previously been in the private collection of Count Teleki Dromokos of Transylvania.
Inventory of the Celtic Burial from ‘Silivaş’, after Róska 1925*
The helmet itself is of a type with neck-guard (eisenhelme mit angesetztem Nackenschutz) common among the Celts at the end of the 4th/beginning of the 3rd c. BC (LT B2). Finds of such helmets are concentrated in the alpine region of western Austria and northern Italy, from where they circulated to the east and west (Rustoiu 2013). The most spectacular examples of such helmets include those from Agris and Amfreville in France, decorated with gold and coral.
The Agris Helmet
Detail of the Ram-Horned Serpent on the Cheek-piece of the Agris Helmet
The Amfreville Helmet
Detail of the decoration on the Amfreville helmet
VEGETAL / WALDALGESHEIM STYLE
The helmet from “Silivaş”* is ornamented on the neck-guard with vegetal elements specific to the so-called Waldalgesheim or Vegetal Style.
The Waldalgesheim Style is named after a princely burial in the middle Rhine, and displays an independence of interpretation and confidence in execution that marks the culmination of achievement of the early La Tène period (Jacobsthal 1944). The descriptive term ‘Vegetal’ has been proposed in place of Jacobsthal’s type-site to denote the new style, reflecting in particular its use of plant-derived tendril motifs, although the style is not characterized exclusively by vegetal motifs, nor are vegetal motifs exclusive to it (Harding 2007:70). The Vegetal Style is often regarded as the high point of La Tène curvilinear ornament because it is in this style that derivative classical motifs are deconstructed and re-emerge with the ‘assured irrationality’ of a vibrant and independent Celtic creation (Harding 265).
The vegetal decorative details on the neck-guard of the helmet from Silivaş belong to the late phase of the aforementioned style, similar to the ornamentation of the helmets from Förker Laas Riegel, in Carinthia, discovered in 1989 (Schaaff 1990).
The neck-guard of the Silivaş helmet. Detail of decoration
A further fine example of the vegetal style decoration on the Balkans is to be observed on the Celtic gold torc from Gorni Tsibar (Montana region) in north-western Bulgaria, which dates from the same period as the Silivaş helmet.
Celtic gold torc decorated in the Vegetal Style, from Gorni Tsibar, northwestern Bulgaria
(late 4th/ early 3rd c. BC)
*In the interest of accuracy, it should be noted that the most recent research on the Silivaş burial has indicated that the helmet and associated material did not in fact originate from Silivaş, but was most probably discovered in a Celtic burial in the Turda area, also in Transylvania, while the brooch and curved dagger came from a Celtic burial either in another part of Transylvania, or from the Scordisci area in today’s northern Bulgaria (for discussion see Rustoiu 2013).
On Eastern Celtic helmets of the Novo Mesto type see:
On Celtic helmets of the Montefortino type in Eastern Europe see:
Harding D.W. (2007) The Archaeology of Celtic Art. Routledge.
Jacobsthal P.F. (1944) Early Celtic Art. Oxford.
Roska M. (1925) Keltisches Grab aus Siebenbürgen. In: PZ, 16, 1925, p. 210-211.
Rustoiu A. (2013) Wandering Warriors. The Celtic Grave from “Silivaş” (Transylvania) and Its History. In: Terra Sebus. Acta Musei Sabesiensis, 5, 2013, p. 211-226
Schaaff U. (1990) Keltische Waffen. Mainz.
Imbolc shona daoibh !
In a world where the average woman was not expected to live beyond her 20’s, and death in childbirth was common (see celtic-death), it is little wonder that one of the most widespread cults in the Celtic (and Gallo-Roman) world was that of the Nutrices – the protectors of maternity and motherhood.
In Britannia and Gaul the Nutrices/Matres are often represented in a triad on votive reliefs such as those from Circencester (Gloucestershire) where the central Goddess is holding the baby in her arms, or Vertault (Côte d’Or) where 3 nursing Goddesses are depicted.
The Aufanian Matronae (detail) from the Gallo-Roman temple site at Görresburg, Nettersheim
(Rheinisches Landesmuseum Bonn)
Left: Terracotta relief of the Matres from the Gallo-Roman settlement of Vertillum (Vertault, Côte d’Or).
(Museum of Châtillon-sur-Seine)
Right: Nursing Mother Goddesses from Cirencester. (Corinium Museum, Cirencester)
Other depictions of the Nutrices are found on white terracotta figurines discovered across Europe, depicting seated Matres wearing a diadem and long garments, feeding 1 or 2 infants at their breast. The Celtic Nutrices should also be related to the Roman Dea Nutrix, who was venerated especially in North Africa, either alone, or together with Saturnus, and is also represented breast-feeding babies, or as protector of children.
Five statuettes in white terracotta of nursing Matres discovered in a well in Auxerre (Yonne).
On the Balkans, the largest center dedicated to the Nutrices was that at Poetovio in Pannonia (Ptuj, eastern Slovenia), where 2 sanctuaries and numerous inscriptions have been discovered. In Poetovio the Nutrices are always venerated in the plural form and, as in the case of sites such as Cirencester (Britannia) and Vertault (Gaul), are often portrayed as a triad.
Representation of the Nutrices from Poetovio
(LIMC, vol. 6.2, p. 620, n°4)
Noteworthy is the fact that, although dating to the Roman period, a significant number of dedicators to the Nutrices/Matres at Poetovio still bear Celtic names (Šašel Kos 1999). This fact, and the use of a separate Celtic alphabet/script in this region as late as the 3rd c. AD, indicates a remarkable continuity of native religious and cultural tradition throughout the Roman period.
Celtic inscription discovered on a beaker at Poetovio (2nd /3rd c. AD)
(after Istenič 2000)
Text = ARTEBUDZ BROGDUI
Translated as ‘Artebudz for Brogdos’. Both names are Celtic, and the vessel was a votive offering to Brogdos – a deity guarding the border between the world of the living and the after-world (Eichner et al 1994:137; Egri 2007).
(see Celtic Graffiti with relevant lit.)
While not directly connected to the core theme of this site, over the past few months a large number of artifacts pertaining to other ancient cultures have been brought to the attention of Balkancelts. These unique objects have been discovered by ‘treasure hunters’, mostly, but not exclusively, in the Republic of Bulgaria, where this phenomenon has reached epidemic proportions.
A combination of pleading and ‘subtle blackmail’ has enabled us to photograph some of these ancient artifacts, and it has been decided to publish them periodically on this site, so that they may be thus recorded before they are sold into private hands, and disappear forever.
This first installment presents a number of ancient Hellenistic and Roman mirrors recently discovered by ‘collectors’ in the area of Plovdiv/ ancient Philippopolis in south-central Bulgaria.
Mirror P1 reverse
Mirror P1 reverse/inscription detail
Mirror P2 reverse
Mirror P 3
Mirror P3 reverse
Mirror P4 reverse
Mirror P4 reverse/detail
Any information / expert opinion on these artifacts (or information on other such unpublished artifacts) would be much appreciated. All correspondence will be treated in the strictest confidence. | <urn:uuid:c353c700-82ef-4775-a35a-9d738faee86d> | CC-MAIN-2014-23 | http://balkancelts.wordpress.com/category/archaeology/page/2/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268660.14/warc/CC-MAIN-20140728011748-00444-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.913926 | 4,590 | 3.421875 | 3 |
Chapter I - Crowd Management
As the Task Force sought information on crowds and public safety, it became increasingly clear that the primary factor in assuring a safe and comfortable environment for large crowds is the planning for their management. There is considerable emphasis in this report on crowd management planning and implementation because the Task Force believes that it is the key to providing safe events in Cincinnati.
Crowd management must take into account all the elements of an event especially the type of event (circus, sporting, theatrical, concert, rally, parade, etc.), characteristics of the facility, size and demeanor of the crowd, methods of entrance, communications, crowd control, and queueing. As in all management, it must include planning, organizing, staffing, directing and evaluating. Particularly critical to crowd management is defining the roles of parties involved in an event, the quality of the advance intelligence, and the effectiveness of the planning process.
2. Crowd Behavior
A. Crowd Actions
To have an effective plan, facility management must be aware of the characteristics of the audience attracted by a particular event. Once the facility operator, police commander and event promotor know their crowd they must plan accordingly. Sociologist Dr. Irving Goldaber has pointed out that the way patrons perceive the environment and the various "sociological signals" they receive at an event whether consciously or unconsciously can escalate or de-escalate patron emotion and influence their behavior. For example, the general attitude of the facility staff and of the interior and exterior security and law enforcement personnel, as well as the promulgation and enforcement of patron house rules combine to produce additional "signals" to influence patron behavior. Other "signals" include reliable door opening policy and truthfulness in communicating about alterations in event programming. When people are informed of changes and delays and the reasons for them, they can more readily accept those delays. While patrons are waiting, the provision of necessary comforts becomes crucial and can diminish discomfort and impatience.
Hundreds of thousands of events are held nationally and few, if any, have problems. But unquestionably, new and unexpected difficulties have been arising. In major cities, for example, some police officers have informally estimated that at any one time anywhere from one half to two percent of the spectators at sporting events are carrying handguns. Dr. Goldaber speaks of four types of conditions that can create crowd management problems: 1) Problems created by a crowd from within; 2) Problems created for a crowd from outside; 3) Environmental catastrophe; and 4) Rumor. These threats must be considered by those responsible for managing crowds.
B. Public Education
Schools, governmental and social service agencies have prepared us to confront many situations which pose serious threats to our personal safety. Fire drills teach effective escape procedures; driver educations courses encourage safe driving; and first aid, saving lives. Yet, there is little to guide the public to anticipate and respond to danger signals in crowds. Education about crowd dynamics and the role of individuals in crowds is sorely needed on a national basis. The consequences of the various modes of individual and groups behavior should be afforded equal importance with other safety programs by governmental, educational, and public services agencies. It is time to include this safety concern with others taught to the public.
The media can also play a significant role in public education by promoting special features, programs, and public service announcements relating to crowd safety and personal and group responsibilities. They can help discourage present safety hazards at large events such as the use of open flames and firecrackers. They can also monitor the crowd management techniques of facilities at indoor and outdoor events for their audiences. Facilities, too, can educate the public by publicizing and enforcing their house rules and by setting a courteous, professional level of conduct for their staff.
3. Drugs and Alcohol Abuse
Drug and alcohol abuse is a national crisis, not just a problem at rock concerts. That recognition does not, however, diminish the problem at rock concerts and at other events where patrons use illegal drugs or abuse alcohol. The complex and overwhelming task of enforcing drug and alcohol laws at major events without violating individuals rights has facilities and law enforcement agencies directing their attention to drug sellers rather than to users. This, in turn, has created a belief among patrons that the illegal use of drugs/alcohol is possible if not acceptable at major events. New and equitable methods of enforcing relevant laws are needed. This is an area where facility operators and law enforcement agencies must cooperate and patrons, regardless of age or social standing, must assume the consequences of breaking the law.
The sale of alcoholic beverages at rock concerts and other events where rowdy audiences are expected or where a high percentage of the audience will be under the legal age for consuming alcohol can have adverse effects. When these conditions exist - rowdiness, high level of excitability - the potential for and detrimental effects of alcohol abuse become very real. Even though a prohibition on alcohol sales may reduce concession profits, many facility operators by such action reflect their concern for the safety of their patrons.
4. Roles and Responsibilities
The role and responsibility of those parties involved in an event should be specified in writing and known to all prior to an event.
There must be a clear understanding by all involved of the chain of command and the duties that each person is to perform. An important aid in this endeavor is an event management plan produced by the facility or promoter with the cooperation of public agencies that specifies names, duties and location of the people at the event; lines of communication; contingency plans; door opening; method of plan implementation; a checklist of personnel, equipment and procedures; expected crowd size and characteristics; and normal and emergency egress/ingress procedures.
Those with a role in planning, organizing and controlling events cooperatively must find ways to: 1) anticipate potential sources of danger in public gatherings, 2) take steps to prevent trouble when and where possible, and 3) be prepared to respond to trouble quickly and effectively when, and if, necessary.
A. Local Government
Through laws and their enforcement, local government influences the character of event management by establishing building and safety codes and by determining facility capacity, seating configurations, and other related items. Government also influences an event by the manner by which it provides such services as police, waste collection and traffic control.
In 1972, an American Bar Association report, The Urban Police Function, noted that police responsibilities are frequently the result of "design and default". Because it is often assumed that police can and will take on all manner of broad responsibilities, they sometimes carry out duties and functions for which there are no written policy directives. While the need for law enforcement remains the paramount duty of the police, there is an ever increasing demand in the other areas of policing. This is especially true where crowd management is required. Generally speaking, the role of police at events is to enforce laws and to manage crowds on or adjoining public property in cooperation and with the necessary support of the facility operator and/or event promoter.
The Fire Division is responsible for making unscheduled and routine inspections of facilities to enforce local fire and building codes. It also has the responsibility of citing a facility operator or patron for violation of safety laws. Their authority to require safe exiting conditions, as well as to enforce capacity and safety regulations, and their relationship to other personnel should be clearly defined in advance. Fire personnel, like other appropriate city personnel, should be involved in the advance planning of an event to assure an acceptable level of compliance with fire and life safety codes.
D. Facility Management
Next to local government, facility management has the most influence on crowd safety and on the activities of promoters and entertainers. No matter how a contract between a facility and promoter is written, local facility management must acknowledge and accept its obligation for the safety of the community that it serves. Facility management has primary responsibility for assuring safe conditions in compliance with applicable statutes and reasonable standards. That responsibility also requires cooperative efforts with law enforcement and other event managers. But that cooperation should not relieve facility management of its accountability for providing resources for safe and successful events. Of course law enforcement officials can take over direction and control in emergencies, but that should not dilute management responsibility for taking all reasonable steps to assure that emergencies don't happen.
The establishment of house rules and the strict enforcement of those rules and local laws determine how the patrons, promoters, and the entertainers will behave.
Many facilities train their crowd management personnel and provide orientation manuals for staff and security. These manuals describe audience characteristics, problem areas, staff functions, house rules, and emergency plans and facility layouts. They deal will types and levels of security and familiarize personnel with management objectives. The use of such manuals underscores the notion that the best crowd management results are obtained when there is active cooperation between facility management and personnel, promoters, and public agencies.
The promoter is the broker between the entertainer and the facility and plays a critical role in preparation of contracts. The promoter obtains the use of the desired facility, prepares appropriate contracts between facility and entertainer, arranges for event promotion and ticket sales, and pays for security requirements. The promoter is also likely to pay the taxes on the entertainers' profits and may even arrange to provide the entertainers' meals and snacks. Promoters are paid by the performers to organize the event and most often work independently of facilities.
The promoter's responsibilities are to coordinate all aspects of an event with facility and government officials to assure that an event complies with local safety laws. Promoters often prepare their own event management plan for an event, listing personnel responsibilities and an event timetable, and usually share this material with the other parties in an event.
Entertainers have varying degrees of influence over the promotion and execution of their performances. The most popular can often demand a certain type of seating, determine the audience size, within the legal capacity of a facility, set ticket prices and promotional arrangements, and stipulate when the doors will be open prior to their show.
Most entertainers realize the influence they maintain over their audiences and do not exploit it. With their support, a facility is better able to discourage open flames, blocking aisles, use of fireworks, drug and alcohol abuse, etc. There are, however, those who will intentionally and irresponsibility incite their audiences to a level of behavior where fighting, vandalism, or rowdyism may occur. If this happens the performers must be held fully accountable for their actions.
G. Private Police
Some private police are commissioned in Cincinnati by the Police Chief and employed by private businesses or individuals. Some private police are hired to perform security functions but are not commissioned. Whether commissioned or not, their authority is limited to the premises of their employer. Although there are similarities between public law enforcement officers and private police, there is a fundamental difference: the law enforcement officer has more extensive authority, responsibility and training.
In additional to seating patrons, an usher's duties include enforcing of house rules, maintaining order, reporting security problems to private police or others, keeping people out of the aisles, and enforcing open flame and smoking regulations. Ushers should remain at their posts until and event is completed.
I. Peer Security
Peer, or Tee-Shirt security is a product of rock concerts. Hired by promoters to protect the stage area, screen patrons for contraband and to do other special assignments, peer security personnel are people of similar age and background to the patrons and, therefore, presumably have good rapport with them. Peer security can also serve as an effective buffer or mediator between uniformed security and patrons in tense situations.
They are usually recognizable by the specially designed tee-shirts that they wear. The Spectrum, in Philadelphia, has departed from this casual look of peer security and supplies specially designed outfits for their own youthful security personnel.
Though a careful and elaborate crowd management plan may be implemented, it cannot be fully effective without patron cooperation. Nor can it protect individuals from self-inflicted harm.
In a crowd, patrons should always be aware of the possible effect of their actions on the safety of the whole group. Pushing, fighting, spreading rumors, the use of firecrackers or projectiles all can cause severe repercussions that the instigator may never have considered. An audience's tolerance of abusive actions further jeopardizes its own safety.
Responsible patrons will acquaint themselves with local laws and facility house rules and should not hesitate to report situations that threaten their safety to the facility management, promoter and/or the media. In many instances, the pressure of public opinion is the best regulator of private industry.
5. Tickets and Queueing
A. Sale of Tickets
Tickets for most events in Cincinnati, including rock concerts, are sold through Ticketron, Inc., a computerized ticket system with outlets in stores and shopping centers. By using computer technology and standardized ticket design, Ticketron can sell tickets to an event at both local and non-local sites for the convenience of its patrons. The elimination of festival seating and restrictions on general admission seating may have unexpected repercussions at ticket outlets, especially for "superstar" performances. While reserved seating largely removes the factors which cause early and overwhelming crowds to gather hours before an event, reserved seating can instead result in the early gathering of large crowds at ticket outlets who have come to purchase tickets for the limited prime seating areas. These factors can cause problems and difficulties for ticket outlets. To help relieve this problem, two options are suggested: 1) The actual date, time and location that the tickets are to go on sale should not be announced prior to the time that tickets are released for sale. 2) When the demand for tickets is expected to exceed the available seating capacity, a mail order system of ticket sales should be implemented.
B. Appearance of Tickets
At present, all Ticketron tickets are similar in color and overall appearance. Hence it may be difficult for ticket takers and others to screen patrons with bogus tickets, especially when the rate of patron flow is high.
A variation in ticket color or format would aid those facility and security officials attempting to prevent patrons with invalid tickets from gaining access to an event at which they do not belong.
A ticket should also state the specified entrance the ticket holder is to enter.
C. Ticket Taking
In determining the number of ticket takers to be employed, most facility operators use a ratio of one ticket taker for about every 1,000 ticket holders. The actual ratio may vary and depends on the actual crowd size, location of contraband searches, type of entertainment and the architectural design of the building. The efficient movement of ticket holders is critical in preventing crowds from gathering outside a facility. Limiting entrances and using fewer doors, or opening and closing doors to control crowd movement are very dangerous practices. They only serve to increase anxiety in a crowd and make it more difficult to manage. It is much more effective to separate people in a crowd by using many entrances, by queueing, and by providing for the proper ratio of ticket takers and doors to patrons. Dispersing entering crowds through multi-entrances is particularly effective in processing people efficiently into a facility.
Whenever large crowds gather for the purpose of peaceably entering an area it is vital that the processing of those people be organized, orderly and disciplined, and, if ticket taking is going to take place, that it be coordinated with the queueing of patrons.
There are two major types of queues, linear and bulk, as described by pedestrian planner Dr. John Fruin in his book entitled Pedestrian Planning and Design. In linear queueing people line up in single file. In a bulk queueing there are no defined lines, but simply a large amorphous mass.
Many facility in cooperation with law enforcement agencies queue their patrons in zig-zag lines, around buildings, and on sidewalks. Often queues are further organized by metering (when sections of a queue enter a facility in a measured and regulated manner). In this way, patrons can claim a particular space, feel less anxious about their ability to enter in an orderly fashion and can judge better the length of time it will take them to enter, as they progress in a line. Using a queue means having control over a large crowd. It also prevents the potential hazard of a mob craze-the sense of urgency causing a rush toward an entry point. This sense of urgency or anxiety is the crucial factor that must be removed. The type of queueing to be used, along with the other procedures, like metering must be planned in order to minimize the potential for crowd disorders outside of a facility.
6. Contraband Screening
Searching patrons for contraband has become increasingly prevalent. Pre-admission screening is a reasonable preventive measure to prohibit or reduce such items as weapons, dangerous objects, alcohol, drugs and other undesirable objects and substances from being introduced on to the premises. City Council should specify by ordinance contraband materials not allowable at major events and also require the contraband prohibition to be posted at the event and on tickets.
Legal considerations suggest that the screening of patrons for contraband is best performed by private security and not public law enforcement officers.
7. Crowd Management Planning
Safety aspects at facilities are routinely inspected by the Fire Division and Building Department to assure their compliance with City regulations. The adherence to numerous City codes is pivotal to providing safe environment for the public. What is needed beyond that is a method for assessing a facility management's or an event promoter's preparedness to accommodate its patrons safety. Having a formal crowd management plan is equally as important as compliance with safety regulations. The City should require crowd management plans of all facilities and/or event promoters contemplating hosting or sponsoring events attracting 2,000 or more people. These plans should be prepared in writing and presented to the City for public filing. Plans could be written for categories of events and, when necessary, for specific events. The format and requirements of a plan should be determined by the City, facility operators, private security, promoters and other concerned parties.
A copy of a facility's crowd management plan should be on file with the City and accessible to the public so they may understand what kind of crowd management to expect. The required filing of a plan will make it difficult for complacency to return to the issue of crowd safety.
This web site: Crowd Management Strategies © 1997 - 2000 . All rights reserved Web site design and graphic arts by VisualFuture
Web site design and graphic arts by VisualFuture | <urn:uuid:49a3ac80-d1d4-431d-b19c-c7dd2a1fc5aa> | CC-MAIN-2015-14 | http://www.crowdsafe.com/taskrpt/chpt1.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296462.22/warc/CC-MAIN-20150323172136-00097-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.950375 | 3,754 | 2.53125 | 3 |
Scientists have churned out genome sequences for everything from fungi to dogs, and they won't be letting up any time soon. However, because a genome sequence is little more than a static list of chemicals--like, say, a parts list for a 747 airplane--scientists are increasingly turning their attention to figuring out how living organisms put their genes to work.
Using yeast as a testing ground, researchers at MIT and the Whitehead Institute for Biomedical Research have for the first time revealed all the "controlling elements" of an entire genome--findings that may soon contribute to a new way of understanding human health and disease.
"This is really the next stage in human genome research," says Richard Young, Whitehead member and MIT professor of biology. Young headed the team of 20 researchers with Whitehead Fellow Ernest Fraenkel and Professor David Gifford of MIT's Department of Electrical Engineering and Computer Science. (Fraenkel is also affiliated with MIT's Computer Science and Artificial Intelligence Lab; Young and Gifford have appointments at the Broad Institute.)
Key to understanding how the genome is controlled are gene regulators, also known as transcription factors. These small molecules intermittently land on a region of DNA, close to a particular gene, and then switch that gene on. They can also influence the amount of protein that the gene will produce. Many diseases, such as diabetes and cancer, are associated with mutated gene regulators, which is one reason why scientists are so interested in them.
The problem is that very few of these regulators have been identified in any organism. Locating their landing sites is essential to identifying their function, and therein lies the rub: gene regulators are hard to find. They typically just land on a small stretch of DNA, do their job, then take off again. And owing to the vastness of the genome, locating just one gene regulator with conventional lab tools can take many years.
The Whitehead/MIT team, in the Sept. 2 issue of the journal Nature, report a method for scanning an entire genome and quickly identifying the precise landing sites for these regulators.
As a result, scientists now can begin to understand how genes and their regulators "talk" to each other. According to Fraenkel, knowing these communication patterns ultimately will have a profound influence on our understanding of everything from infectious disease to cloning.
To eavesdrop on these cellular conversations, graduate student Chris Harbison from Young's lab and postdoctoral researcher Ben Gordon from Fraenkel's lab combined the latest biological tools with new computational methods.
Harbison took yeast cells and subjected them all to a dozen nutritional, chemical and temperature environments. "We tried to come up with different conditions that a yeast cell would encounter in its natural habitat," says Harbison.
Gene regulators come out of hiding and do their job in response to environmental conditions, but they don't all respond to the same kinds of predicaments. Running the cells through a wide spectrum of stimuli was a way of waking up all the regulators--in a sense, shaking the bushes and then nabbing them once they're out.
Next, Harbison placed gene fragments associated with these regulators onto a series of microarrays--small dime-sized silicon or glass chips that contain thousands of pieces of DNA--which allowed him to come up with a list of approximate locations. Gordon and Fraenkel created computer algorithms that fused Harbison's data with data from other yeast species to find the exact landing points.
The next challenge is to scale the platform so it can tackle human cells, something that the researchers are gearing up to do. Even though the yeast genome's 203 regulators are a far cry from the roughly 2,000 in human cells, Young explains, "now we have the technology and the concepts to get started on decoding the human genome."
This work was supported by the National Institutes of Health. | <urn:uuid:81d70f8b-2441-422e-8877-f5241036f71f> | CC-MAIN-2016-30 | http://news.mit.edu/2004/genomecontrol | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257832475.43/warc/CC-MAIN-20160723071032-00011-ip-10-185-27-174.ec2.internal.warc.gz | en | 0.956753 | 787 | 3.484375 | 3 |
In the past few decades, the occurrence of the two shrub forest species Green alder (Alnus viridis) and Dwarf mountain pine (Pinus mugo prostrata) has increased in the Alpine region. This influences the transition to high forest, the effectiveness of protection forests and biodiversity. Thus, up-to-date and area-wide information on their distribution is of interest to various fields of work. Statistical data are provided by the Swiss National Forest Inventory (NFI) and the Swiss 'Arealstatistik'. Due to their sampling scheme on a regular grid, these data are not spatially explicit distribution maps. Remote sensing sensors enable the production of such maps through the acquisition of data with high temporal and spatial resolution. The aim of this project is a robust workflow to produce an up-to-date, wide-area and high-resolution distribution map of the two dominant shrub forest species based on data of the Copernicus missions Sentinel-1/2 and ADS of swisstopo. The project is conducted within the framework of the Swiss National Forest Inventory (NFI).
2020 - 2021 | <urn:uuid:bbcdbaa2-f3f6-4ecd-9116-9489471db30a> | CC-MAIN-2022-49 | https://www.slf.ch/fr/projets/landesweite-gebueschwald-verbreitungskarten-basierend-auf-fernerkundung.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711045.18/warc/CC-MAIN-20221205200634-20221205230634-00664.warc.gz | en | 0.903419 | 234 | 2.609375 | 3 |
In an interview with Open Innovation newsletter this month, Sérgio Borger, leader in human systems and technical strategy for IBM’s research lab in Brazil, speaks on urban mobility, accessibility, citizen engagement through social technology and the power of communities to build a better quality of life for all.
Wenovate - How has technology helped or may help regarding the issue of urban mobility? How is it accessible to citizens?
Sérgio Borger - Urban mobility affects everyone and is one of 3 factors focus on quality of life in a city, the other two are health and education. If you ask people about what most bothered them, they will indicate this as the main factor, because it is directly linked to their quality of life. The great difficulty that we got is to define the concept of urban mobility, because for every person you ask what it is, you will find a different answer. For some people it can be take the driving and get to work without problems, for other is to get in the car and take the children to school, without taking traffic. For others it is not to find holes in their path and for CEAGESP’s driver is transport food and deliver it on time before it spoil. Thus, the urban mobility is something essential and multifaceted, especially in big cities like Sao Paulo. Is linked to environmental conditions and the urgency of each function. The physically handicapped, the blind, the sportsman, the mother who carries the child in the park, all have some kind of need, which makes the debate around this topic quite broad. We also have a great difficulty of identifying clear metrics to say whether improved or not, because there are many demands to monitor. The difficulty is not in running meter, but to know what is the need of the citizen in every moment, since these demands are always changing. Here citizen participation through technology enters strongly, because it is what will give us the mapping of the major areas of urban mobility, and knowing what is most important, we prioritize corrective actions. Resources, usually limited, will always be destined for local users that has more activities that impact the life of society as a whole. The driver’s case we mentioned will affect feeding city, then we need to prioritize. The engagement of citizens using mobile technology (such as the www.rotaacessivel.org) is very important in this regard. A great bigdata system can generate an optimized plan to create the infrastructure necessary to increase the quality of urban life.
Wenovate - Although there is a law that governs the accessibility, we see numerous irregularities in the Brazilian urban spaces, whether in small towns or in big cities like São Paulo. How to pressure authorities regarding surveillance?
Sérgio Borger - There are plenty of available legislation on accessibility, related to sidewalks, simple maintenance and inspection. What happens is that we not have a sufficient number of inspectors and, even if we had resources we could not fix everything immediately and simultaneously. Take for example the university town: is 140 km of roads. In the upper left corner of the USP today where nobody goes, should I make an undercut saw there? We should give priority to the front of the USP residential center? Wich places need repaving? What are the priorities? That’s where we open for the public identify local needs. With these answers, we can create better public management plans and can adapt its processes and systems. The whole process we have today is still very reactive. We must go beyond the occasional complaint, with tax giving penalties or not. In this sense, it is critical citizenship to identify the areas that we would have had more visibility for greater use. And while social technologies are still a relatively new phenomenon, especially mobile, we can see an increasing number of people using them to report all sorts of trouble. I believe that in some years the most modern cities will be those that know how to prioritize resources from this contact with the citizen, who will become the supervisor of his/her space.
Wenovate - Being a researcher on innovative cities, how do you see the issue of the citizen’s engagement with regard to the fight for improvements in their environment? Has it increased? Is it effective?
Sérgio Borger - I still miss seeing people taking more pictures, more reporting on your space, not only on problems but also about positive things happening in town. We are all a mega community and to make it work we have to do our part, complaining, interfering and demanding our rights. There is a pool of collective tasks that we need to understand how our responsibility. If you participate, you will be heard, even if none projects are present in your city yet. I see that even in smaller cities there is still some resistance to the systems or the opening thereof.
A beautiful example of community participation has happened recently in Porto Alegre. The legislature held a public poll with use of mobile. It was awesome to see everyone participating with their phones. People of the committee that would make decisions turned to the audience and gave voting rights, and the system collected the information at the same time. We know there is still a process of inclusion of citizens and exercise their citizenship that does not happen overnight. But the number of systems and its acceptance is growing and soon big cities will assume its role of connecting directly with the citizen. Finally we will know where to invest and our master plans will reflect these needs.
Wenovate - Some political and social trends believe on the empowerment of communities as a way of developing their surroundings. Do you agree with this model? If so, could you cite successful stories?
Sérgio Borger - Undoubtedly, the community organized using the tools available has a great power to transform its space. I can cite a case that is the AACD in Vila Mariana, which annually serves hundreds of thousands of people carrying some type of disability. These people need to come daily to the AACD. It is necessary to predict, so where are the bus stops, car spaces and everything that gives access to the institution. That’s because it is a community with great difficulty to get around. If you climb up to Santa Cruz, Domingos de Moraes region, you will find on your way the Green Cross, APAE, GRAAC, Paulista School of Medicine, among others with great need for access. Based on this, these volunteers have joined authorities, talked with us and created over a weekend, with a single campaign, a mapping (through mobile tecnhology) of 10 factors of importance to the community. They decided what map, generated reports and their leaders are discussing with government agencies. Did the homework and exercised citizenship. Entering the www.rotaacessivel.org with your smartphone, you can access all this information.
Sergio leads the team of human systems and technical strategy for IBM’s research lab in Brazil. He has more than 20 years of experience in innovation, including dozens of projects with clients from different segments of the industry, including distribution, retail, health and education. His creative approach in the area of network management has received the 1st Award of Innovation from Alcatel and UNESCO. His current research project is focused on sentient cities. | <urn:uuid:8b62aee6-0fc6-41a0-9fda-c447b569efed> | CC-MAIN-2017-17 | http://boletim.wenovate.org.br/2014/02/461/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00157-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.960195 | 1,486 | 2.609375 | 3 |
I found these adorable felt eggs and carrots at Target's Dollar Spot. I turned them into literacy centers.
Egg and Chick Center:
I made mini chicks by shrinking chick coloring pages down and adding a photo to each one. Then I colored the chicks. I'm planning on using these during letter 'N' week. So my pictures are of things that start with the letter 'N' and a few that do not. Students will find an egg, pull out the chick and decide how to sort it: words that start with 'N' or words that do not start with 'N'. This is totally customizable to your units and themes.
Bunny and Carrot Center
I made bunnies programmed with letters and numbers. Students will sort them. Is it a letter or is it a number? | <urn:uuid:34476752-e5aa-4562-a18b-62817cd01542> | CC-MAIN-2019-13 | http://preschoolparadisesgb.blogspot.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202326.46/warc/CC-MAIN-20190320105319-20190320131319-00555.warc.gz | en | 0.953983 | 165 | 2.609375 | 3 |
“You see, no matter what your story is or where you are at today, you can make a difference.” -Adam Smith
Global Partnership for Education explains WHY education is so important–especially to those in underdeveloped countries:
“Education is more than reading, writing, and arithmetic. It is one of the most important investments a country can make in its people and its future and is critical to reducing poverty and inequality:
- Education gives people critical skills and tools to help them better provide for themselves and their children
- Education helps people work better and can create opportunities for sustainable and viable economic growth now and into the future
- Education helps fight the spread of HIV/AIDS and other diseases, reduces mother and child mortality and helps improve health
- Education encourages transparency, good governance, stability and helps fight against graft and corruption.
The impact of investment in education is profound: education results in raising income, improving health, promoting gender equality, mitigating climate change, and reducing poverty.”
Restore International seeks to give not only education, but MORE to the children of Uganda through their Restore Leadership Academy. Watch the video below to learn more about their leadership academy!
“The backgrounds of the students vary, but almost all of them grew up in northern Uganda during the civil war. An overwhelming percentage have had one or both of their parents die due to the war or disease. They come from all different backgrounds and circumstances, yet you’ll never meet a happier, energetic, and ambitious bunch. Thanks to Restore Leadership Academy, they are receiving one of the best educations possible in Northern Uganda, and more than that, they are part of a family. We can’t wait to see all that they will accomplish!” (http://www.restoreinternational.org/uganda)
And now YOU have the opportunity to help lay the foundation for a NEW Restore Leadership Academy, and provide a life-changing education to children in Uganda! Check out Adam Smith’s fundraiser below to get involved today! | <urn:uuid:6aca4cb7-2a31-4e26-8799-0f4815609fbc> | CC-MAIN-2023-06 | https://go.purecharity.com/restore-education-uganda/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00845.warc.gz | en | 0.956318 | 418 | 2.703125 | 3 |
What is “muy bien”?
What is “muy bien”?
“Muy bien” is a Spanish phrase that literally translates to “very well.” Some people who use this phrase may also mean “very good.” The latter translation’s roots are based on the fact that “bien” may also be loosely translated into “bueno” which means “good.” Depending on what a person’s intention is or how the phrase is used in a sentence, “muy bien” may mean both “very well” and “very good.”
With the word “bien” used as an adverb as in “very well,” the phrase “muy bien” may be used when somebody is asked about something. Like in the example if a person is asked if he is feeling ill or not, this person may respond with “Estoy muy bien” or “I am very well” when translated into English. This same example could also generate the same “muy bien” response with the person indicating that he/she is also “feeling good” or feeling “very good.”
The phrase “muy bien” is a popular phrase among Spanish-speaking citizens in many parts of the world. This phrase is also often used in conversations and even in movie scripts and songs. With this simple phrase that is spoken in just four syllables, many non-Spanish-speaking people have wondered what it means. Some people also encounter similar phrases when chatting with other friends over the Internet. This phrase is loosely used even by English speakers just to become part of the conversation. As the online world involves people from different countries with different languages, many phrases will be used, and some will be remembered because of their use as a greeting or as a response to a basic question. For “muy bien,” various, simple questions can be answered with this simple phrase making it a common response even from non-Spanish-speaking persons.
Phrases like “muy bien” are also basic phrases that people try to remember when going to Spanish-speaking countries or when being around people that speak the Spanish language. Even for this simple phrase, some people will be able to at least convey the idea that they embrace the language and are open to learning more about it. | <urn:uuid:a77edfb7-efee-4bfa-aa17-931e8abfd9ca> | CC-MAIN-2015-32 | http://www.qwhatis.com/what-is-%E2%80%9Cmuy-bien%E2%80%9D/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988310.3/warc/CC-MAIN-20150728002308-00283-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.959084 | 527 | 2.78125 | 3 |
View Full Version : Lil OT: Mathematics: Point in a triangle...
07-07-2001, 01:54 PM
does someone know how to check if a 2D-point is in a 2D-triangle?
Btw: Does someone know any good maths forums?
07-07-2001, 02:10 PM
Search the forum or maybe the advanced forum, there is a fairly current thread on this very topic in one of them. I believe the title is something like 'Simple geometry question'.
07-07-2001, 09:34 PM
well, I can think of a fairly simple way off hand:
rotate the triangle so one side is along the x axis.
using the point slope formula, generate the equation of the hypotenuse for each other side.
plug in the x value of the point into the slope formulas and compare the y to the height of your point.
if the point is higher than the formula's value, it is above the triangle.
if it is less, but greater than 0, it is inside.
just remember to rotate/translate your point with your rotation. you will need to intersect your sides to find the top vertex of the triangle if you don't know where it is after tranformation. This will distinguish which slope to compare your value you to.
http://www.opengl.org/discussion_boards/ubb/smile.gif Hope this helps.
[This message has been edited by Cardinal (edited 07-07-2001).]
07-08-2001, 01:29 AM
Make vectors from the point to all vertices and add up the angles between all the vectors and check to see if the angle is around 360 degrees.
07-08-2001, 08:23 AM
Come on guys, are there no mathematicians here. Theres one solution that occures to me.
You have a triangle points 1, 2 and 3. And another point, 4.
Create 3 triangles each with point 4 as one vertex. You check the area of each one, but don't get the absolute value. if you use the order as below then if the point lies insdie the trianglge all the signs will be the same for the area, if one is different then the point lies outside the triangle.
Equ1 = (x1-x4)(y2-y4) - (y1-y4)(x2-x4)
Equ2 = (x2-x4)(y3-y4) - (y2-y4)(x2-x4)
Equ3 = (x3-x4)(y1-y4) - (y3-y4)(x1-x4)
the simlest way to check it the signs are the same is to
Equ4 = (Equ1*Equ2)*(Equ2*Equ3)
Note however that if any of them are 0 then the point lies along the infinite line of one of the line segements made by the triangle edges, the easy way out is to say this isn't on the triangle, otherwise its a simpl3 check to see if a point on a 2d line is on a line segement.
07-08-2001, 08:57 AM
And how about a 3D-triangle and a 3D-Point. I know that the point and the triangle are on the same infinite plane...
07-08-2001, 09:05 AM
In that case, change your 3D coordinates to 2D coordinates by first finding a suitable 2D basis. Then use that method mentioned by Zadkiel.
07-08-2001, 11:06 AM
Yep, try the x and y coordinates first, check the area of the triangle they make, if its non zero the those axis will work, if not then try a different combination
the normal method of choosing what 2d plane projection of a triangle to use is to choose the one with the greatest normal
eg if (norm.x > norm.y && norm.x > norm.z )
use the yz plane
07-08-2001, 06:22 PM
nope, I am not a mathematician... http://www.opengl.org/discussion_boards/ubb/smile.gif If I were, I would probably solve it using topology.
07-09-2001, 01:14 AM
[i]the normal method of choosing what 2d plane projection of a triangle to use is to choose the one with the greatest normal[/]
You'd be surprised how similar that method is to mine, however it is slightly bigger and slower. With the area method the plane which gives you the biggest area is also the best, but when dealing with floating point values any plane of projection which gives you nonzero for the area will work.
07-09-2001, 01:40 AM
Triangle vertices x,y,z
Point vertex m
If angle(a,b)+angle(a,c)+angle(b,c)=360° point is in triangle.
a*b=|a|*|b|*cos(a,b) <=> (a*b)/(|a|*|b|)=cos(a,b)
<=> (ax*bx+ay*by+az*bz)²*(cx²+cy²+cz²)+(ax*cx+ay*cy+az *cz)²*(bx²+by²+bz²)+(bx*cx+by*cy+bz*cz)*(ax²+ay²+a z²)=(ax²+ay²+az²)*(bx²+by²+bz²)*(cx²+cy²+cz²)
Or am I wrong?
07-09-2001, 03:06 AM
That statement is invalid in general. It is valid only with certain angles, but not all angles. See:
cos 290 + cos 20 + cos 50 = 1.924 >> 1
[This message has been edited by DFrey (edited 07-09-2001).]
07-09-2001, 03:20 AM
07-09-2001, 03:38 AM
You could reduce other problems from 3D to 2D too by the method of leaving the biggest component of the normal vector.
I'm using this for determining the section of a ray with a convex polygon (including holes). As I only need to know if it cuts (and not the position), I can project it to 2D and then use the standard algorithm for point in polygon.
BTW, I also use the area method for determining point in triangle, and it is the fastest method I've found so far.
Powered by vBulletin® Version 4.2.2 Copyright © 2015 vBulletin Solutions, Inc. All rights reserved. | <urn:uuid:5cf80775-c133-4f3c-a03c-70369c0bcba6> | CC-MAIN-2015-11 | https://www.opengl.org/discussion_boards/archive/index.php/t-135474.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936468536.58/warc/CC-MAIN-20150226074108-00274-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.825883 | 1,469 | 3.109375 | 3 |
Photo Credit: By Redbloodcells.jpg: hematologist derivative work: patient-doc (Redbloodcells.jpg), via Wikimedia Commons
To develop an understanding of cell-to-cell communication.
Research shows that high-school students hold various misconceptions about cells after traditional instruction. For example, students might think that cells are within the human body rather than understanding that the human body is itself composed of cells. An example of when these types of misconceptions can be established occurs when students learn that red and white blood cells flow within arteries and veins. While this is correct, students may not realize that the arteries and veins themselves are composed of cells specialized to form these vascular structures. It is important to clarify these misconceptions prior to this activity.
Students should also have a basic understanding of the endocrine and nervous systems. This lesson necessarily refers to various hormones, neurotransmitters, and body organs and tissues. Thus, this lesson may serve as a good summative activity after students have gained familiarity with the different structures and functions of the endocrine and nervous systems.
By the end of middle school, students should know that all living things, including themselves, are composed of cells. They should have an understanding that all body tissues and organs are made up of different kinds of cells. Each cell, as a living entity, carries out the basic functions of life, such as extracting energy from the environment and removing waste.
This lesson expands upon their basic understanding of the cell as a single unit by considering the cell as part of a larger system or community. Within this community, cells are differentiated, each performing a special function necessary for the survival of the entire community of cells. In order to perform their unique functions effectively, cells must react to situations in their surrounding environment as well as communicate with each other.
This lesson focuses on cell communication. Students will examine two types of cell communication—hormone and nerve signaling. In order to better understand the importance of effective cell-to-cell communication, students will examine various diseases in which faulty cell communication negatively impacts the entire community of cells and in effect, normal total body functioning. Instances of such diseases include diabetes, hypo- and hyperthyroidism, multiple sclerosis, and cancer.
While these diseases can be directly linked in most cases to genetic mutations, this lesson will also examine the impact of environmental factors on cellular communication. Drugs, such as marijuana, opiates, and caffeine, can mimic or block certain hormones and neurotransmitters, thereby altering body functioning. By studying the effects of both genetic and non-genetic (environmental) factors on hormone and nerve signaling, students will learn the importance of cell-to-cell communication.
Because it may help students to understand the interdependency of cells if they think of an organism as a community of cells, each of which has some common tasks and some special jobs, begin by discussing the role of communications in communities.
- Describe a community.
- Explain why all members of a community do not all perform the same function. (For example, ask students why everyone in the world cannot be a doctor or a firefighter or a teacher.)
- How is communication important within a community?
(Answers may vary. Encourage students to explain their answers.)
Relate the importance of communication to students' lives. For example, if most students in the classroom hold working jobs, ask them why communication is important in the workplace community. Ask students to explain how a breakdown in communication would impact the functioning of the business. Students in the classroom may be highly involved in sports activities. Ask them to point out the importance of communication within a team, where each player has a particular function. Have students describe what happens when player communication breaks down or when one player does not pay attention to the roles and actions of other players on the team.
Tell students that our bodies are composed of a community of cells. Ask students:
- What are some of the reasons that cells might communicate with each other?
- How do you think cells communicate with one another? (For example, how do the cells in your brain communicate with the cells in your stomach?)
- Describe what might happen if communication between certain cells failed.
(Answers may vary. Encourage students to explain their answers.)
Review with students that there are two basic types of cellular communication—hormonal and nerve signals. Ask students:
- What are hormones?
- What is the importance of hormones?
- How are hormones produced?
- How are hormones important in cellular communication?
- What are nerve signals?
- What is the importance of nerve signaling?
- How are nerve signals involved in cellular communication?
- What is the difference between hormonal and nerve signaling?
- (Hormones are chemical messengers that travel throughout the body coordinating complex processes like growth, metabolism, and fertility.)
- (They can influence the function of the immune system, and even alter behavior. They guide development of the brain and reproductive system. Hormones are the reason why your arms are the same length, why you can turn food into fuel, and why you changed from head to toe at puberty. )
- (They are produced by organs called ductless glands (endocrines). These include the two adrenal glands, the pituitary gland, the four parathyroid glands, the sex glands, and the thyroid gland.)
- (They are important because they help control certain bodily functions, like: the way the body uses food; growth; sex and reproduction; the regulation of the composition of the blood; the reaction of the body to emergencies; and the control of hormones themselves.)
- (A momentary change in electrical potential on the surface of a cell, especially of a nerve;or muscle cell.)
- (Nerve signaling is important because many functions depend on it, such as: speech, movement, coordination, and vision.)
- (The nerve signal stimulates the vesicles containing serotonin to fuse with the cell membrane and dump serotonin into the synaptic cleft.)
- (Hormonal signaling sends slow, graded messages throughout the body that are read by cells with relevant receptors.. Nerve signaling sends rapid, digitized messages over fixed anatomical connections.)
Review the following with students:
Hormones generally act slowly and are produced in small amounts, often in bursts, influenced by factors in both the environment and within the body. Each hormone has different effects on different tissues, organs, and behaviors and, in general, affects metabolic processes, including the build-up and breakdown of carbohydrates, lipids, and proteins.
Hormones can affect only those cells with receptors that recognize the hormone and alter cell function. Neural communication sends rapid, digitized messages over fixed anatomical connections while hormonal communication sends slow, graded messages throughout the body that are read by cells with relevant receptors. Neural communication is more readily under voluntary control than hormonal communication. Both neurons and endocrine glands produce their transmitters or hormones and store them for later release.
Neurons are stimulated to produce an action potential that causes the release of transmitters into the synapse; endocrine glands are stimulated to secrete hormones into the bloodstream.
To begin this part of the lesson, students should use their Cell Communication student esheet to go to and read the first three paragraphs of the Scientific American article: Cell Communication: The Inside Story, including the introductory illustration. Then, students should read "Getting a Line on Human Diseases," found on page 6 of the PDF. Ask students:
- How are the two cells in the illustration communicating with one another?
- What are the messenger molecules? (e.g. hormones or neurotransmitters)
- Why might one cell need to communicate with another cell?
- How is our normal body functioning dependent upon cellular communication?
- What can happen when cell communication breaks down?
- What types of diseases occur as a result of a breakdown of cellular communication?
- (They are communicating through the use of hormones.)
- (The messenger molecules are hormones.)
- (One cell might need to communicate with another in order to get the cell to perform a certain function.)
Tell students they will examine two diseases in which cellular communication has broken down. Diabetes is a disorder that results in a lack of correct hormonal signaling. Multiple sclerosis is a disease that results in a lack of correct nerve impulse signaling.
Provide each student with the worksheet: Diseases of Faulty Cell Communication. Students should use their esheet to go to and read the following articles and answer questions on the worksheet.
- Neuron Conversations: How Brain Cells Communicate
- About MS (National Multiple Sclerosis Society)
Have students follow the sequence: "What is MS", "What causes MS"...through "Diagnosis"
- Multiple Sclerosis Foundation
Students should go to each of the sections under Learn about MS.
- Normal Regulation of Blood Glucose
- What is Insulin?
- Introduction to Diabetes
- How is MS an example of a disease that results from faulty cellular communication?
- How is diabetes an example of a disease that results from faulty cellular communication?
Provide each student with the worksheet: Factors That Disrupt Cell Communication. Students should use their esheet to go to and read the following articles and answer questions on the worksheet:
- How does heroin interfere with neuronal communication?
- Why do heroin and other opiates affect the "pleasure" system in the brain?
- Why do you think heroin and other opiates become addictive?
- How can addiction be treated?
- How do endocrine disrupters interfere with hormonal signaling?
- What is DES? How has it impacted women?
- Why do you think endocrine disrupter can result in large, detrimental effects in such small concentrations?
- The same level of an endocrine disrupter may have no apparent effect on humans but cause deformities in other animals. Why might this be so?
Working in groups of 3-4, have students research the impact of a genetic disease or external drug on cellular communication. Provide each group with the worksheet: Researching Cell Communication.
The following is a list of possible research topics:
Good starting points for research include:
Each group should be provided 3-5 days to research in groups, using their worksheets as guides. Have groups present their findings to the rest of the class. They must address the questions posed in the Researching Cell Communication student sheet.
Alternatively, students can individually choose a topic, research the topic, and write a short essay. Students can also each draw colorful diagrams or cartoons depicting how hormonal or neural communications are disrupted in a particular disease or with a specific drug.
Have students review current research in cellular communication with special emphasis on disease treatment.
Have students research the different ways in which cells communicate with each other. Students can compare and contrast these situations. A class list of cellular communication can be compiled. This list can include the following types of information:
- Type of cell initiating communication
- Target cell/tissue/organ
- Method of communication
- Purpose of communication
- Other ways to characterize communication, such as are cells close together or far apart
Students can also:
- Draw an example of cell communication from one of the Web resources that have been examined.
- Label each part correctly; draw arrows that indicate the path of communication.
- Write a sentence that summarizes the importance of that communication both to the cell and to the larger organism.
Students can also research the EPA's Endocrine Disruptor Screening Program, its actions, and its initiatives.
The following sites can be used to develop further activities and/or extensions:
- Scientists Reveal Details Of Brain Cell Communication: Implications For Learning & Memory
- PBS: Probe the Brain | <urn:uuid:8abf0697-a8f0-413f-b489-2f4f4eecb9fd> | CC-MAIN-2017-34 | http://sciencenetlinks.com/lessons/cell-communication/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126017.3/warc/CC-MAIN-20170824004740-20170824024740-00515.warc.gz | en | 0.9279 | 2,431 | 3.84375 | 4 |
This French surname of ALESSIO was ultimately from the Greek name ALEXIOS meaning 'to help, to defend'. The name owed its popularity in the Middle Ages to St. Alexius, a shadowy figure, about whom many legends grew. He appears to have been an historical figure venerated as 'a man of God' who lived in the 4th-5th century in Edessa, which was a centre of early Christianity in Syria. His cult was also popular in the Eastern Church, which accounts for the frequency of the Russian given name ALEKSEI. The earliest French hereditary surnames are found in the 12th century, at more or less the same time as they arose in England, but they are by no means common before the 13th century, and it was not until the 15th century that they stabilized to any great extent; before then a surname might be handed down for two or three generations, but then abandoned in favour of another. In the south, many French surnames have come in from Italy over the centuries, and in Northern France, Germanic influence can often be detected. The origin of badges and emblems, are traced to the earliest times, although, Heraldry, in fact, cannot be traced later than the 12th century, or at furthest the 11th century. At first armorial bearings were probably like surnames and assumed by each warrior at his free will and pleasure, his object being to distinguish himself from others. It has long been a matter of doubt when bearing Coats of Arms first became hereditary. It is known that in the reign of Henry V (1413-1422), a proclamation was issued, prohibiting the use of heraldic ensigns to all who could not show an original and valid right, except those 'who had borne arms at Agincourt'. The College of Arms (founded in 1483) is the Royal corporation of heralds who record proved pedigrees and grant armorial bearings. The bulk of European surnames in countries such as England and France were formed in the 13th and 14th centuries. The process started earlier and continued in some places into the 19th century, but the norm is that in the 11th century people did not have surnames, whereas by the 15th century they did.
The associated coat of arms is recorded Rietstaps Armorial General. Registered in France. The name is also spelt ALESSIO.
Orders over $90 qualify for Free Shipping within the U.S. (Use coupon code: FREESHIP). | <urn:uuid:bfec1b0d-ebec-4142-ab5c-b5f18f575f68> | CC-MAIN-2022-49 | https://www.4crests.com/alessio-coat-of-arms.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710808.72/warc/CC-MAIN-20221201085558-20221201115558-00874.warc.gz | en | 0.985106 | 520 | 2.59375 | 3 |
By now many people are aware of the opioid epidemic that has affected most of the United States. Understanding substance use treatment resources and whether individuals are accessing those resources helps in understanding the scope of the problem.
According to the latest National Survey on Drug Use and Health, in 2017 an estimated 20.7 million people in the United States ages 12 or older – 1 in 13, or 7.6% –needed substance use treatment.1Kentucky’s drug overdose deaths climbed to 1,566 in 2017, an increase of 10.3% over 2016.2 In 2017 Kentucky had the fifth highest death rate due to drug overdoses in the nation (37.2 deaths per 100,000 residents).
The 2018 Kentucky Health Issues Poll (KHIP), sponsored by Interact for Health and the Foundation for a Healthy Kentucky, asked Kentucky adults about the impact of substance use on their family and friends.
KHIP asked, “In the past 12 months, has a family member or friend experienced problems as a result of using drugs?” Three in 10 Kentucky adults (31%) said yes. KHIP then asked these adults whether that person had entered treatment. Overall, more than half of these adults (54%) said the person had entered a treatment program. About 2 in 10 reported that the person entered treatment on their own (18%). Nearly 4 in 10 reported that the person entered treatment only because others intervened (36%). More than 4 in 10 reported that the person never entered treatment (44%).
KHIP asked adults whose friend or family member had never entered treatment to name the most important reason why they hadn’t. Respondents could provide any answer. The most frequent response, which was given by more than 3 in 10 of these adults (35%), was that the friend or family member didn’t want to quit using drugs. Two in 10 of these adults (17%) said that the friend or family member did not believe they had a problem. About 1 in 10 of these adults (9%) said that their friend or family member had died. Other answers included “they went to prison,” “can’t afford it,” “other people are a negative influence” and “no treatment available nearby.”
KHIP also asked Kentucky adults if they knew someone with problems due to specific drug use. Three in 10 Kentucky adults (30%) reported that a family member or friend had experienced problems as a result of abusing prescription pain relievers such as OxyContin, Percocet, Vicodin or codeine.3 The percentage of Kentucky adults reporting prescription pain reliever abuse has remained relatively stable since KHIP first asked this question in 2011.
Two in 10 Kentucky adults (20%) reported that a family member or friend had experienced problems as a result of heroin use. This percentage has steadily risen since this question was first asked in 2013.
About 2 in 10 Kentucky adults (22%) reported that a family member or friend had experienced problems as a result of methamphetamine use. This percentage has risen since the question was first asked in 2013. Responses to questions about the use of heroin and methamphetamine varied by
1. Substance Abuse and Mental Health Services Administration (SAMHSA). (2017). 2017 NSDUH Annual Report. Retrieved from https://bit.ly/2zM5uHc.
2. Kentucky Injury Prevention and Research Center. (2018). Drug overdose deaths among Kentucky residents, 1999-2017. Retrieved from https://bit.ly/2t7ha3O.
3. KHIP asked, “Have any of your family members or friends experienced problems as a result of abusing prescription pain relievers such as OxyContin, Vicodin, Percocet or codeine?”
Interact for Health regularly conducts research and collects data in order to monitor and evaluate our region’s health status and to measure public opinions about health policy.
Our Health in Action stories highlight the innovative work our grantees are doing to help reduce tobacco use, address the opioid epidemic and ensure that children can access health care through school-based health centers. We also interview people working on those issues at other organizations across the country to learn what works for them.
The Greater Cincinnati Health Watch is a free biweekly e-mail newsletter published by Interact for Health
Jun 11, 2019
Jun 03, 2019
May 20, 2019
May 21, 2019 | <urn:uuid:860693cd-bc15-406c-b0d5-6ffb57260f5f> | CC-MAIN-2019-26 | https://www.interactforhealth.org/whats-new/194/opioid-methamphetamine-use-and-prescription-drug-misuse-in-kentucky/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999817.30/warc/CC-MAIN-20190625092324-20190625114324-00384.warc.gz | en | 0.968226 | 910 | 2.671875 | 3 |
The purpose of this educational module is to present an overview of wound care for most chronic wounds. This is not meant to be an extensive or all inclusive course which details advanced wound therapies for the wound care specialist. Rather, it is to help the typical nurse or clinician (in any setting) to become more familiar with principles of good wound healing and provide a guide to wound dressings, thereby answering the age old question, what should I put on the wound? This module will also include pain management for wounds - an under-addressed clinical problem.
A Health Technology Assessment (HTA) related to wound care management (Bradley, Cullum, & Sheldon, 1999) estimated the worldwide prevalence of wounds includes 40 to 50 million non-healing surgical wound, 8 to 10 million leg ulcers, 7 to 8 million pressure ulcers, and 7-10 million burn wounds. These numbers reflect that more people throughout the world have chronic, complex or non-healing wounds than the total US population with cardiovascular disease (approximately 15 million), asthma (18 million), or diabetes (10 million) (CDC - 2011 National Estimates - 2011 National Diabetes Fact Sheet - Publications - Diabetes DDT, n.d.). Chronic, complex or non-healing wounds represent a major health problem and a growing economic concern. To improve wound healing outcomes and decrease the number of chronic or non-healing wounds worldwide, evidence-based wound prevention and treatment strategies are necessary.
When an alteration in skin integrity occurs, such as when a teenager falls from a skateboard and scrapes his/her knee, it results in a wound. If the wound extends only through the epidermis and perhaps involves part of the dermis (but does not involve subcutaneous tissue or underlying structures), it is considered a partial thickness wound. We expect this type of wound will heal by re-epithelialization, and likely will not scar. If the wound extends through the epidermis and the dermis, and includes subcutaneous tissue or underlying structures, it is considered a full thickness wound. We expect this type of wound to heal by a complex process resulting in scar tissue formation. The location of the wound determines the depth of tissue loss required to establish if a wound is a partial or full thickness wound. Some parts of the body (over the anterior shin, the knuckles of the hands, bridge of the nose, etc.) have very thin skin and do not have a significant amount of subcutaneous fat/tissue. A shallow wound over these areas would be a full-thickness wound though they may only extend 2mm deep (or less). Alternatively, wounds over the buttocks or fleshy parts of the body may be the same 2mm depth and yet remain partial thickness wounds, because they do not extend into subcutaneous tissue. Areas of the body such as the ears and bridge of the nose have cartilage directly covered by dermis and epidermis. Any wound that involves cartilage is a full thickness wound, even if it appears very superficial.
Wounds are said to be healing by primary intention if a linear wound (such as a surgical incision) is re-approximated (edges pulled together) and sutured, stapled, glued or taped together (without gaps). These wounds will typically form a healing ridge by post-operative day 5 in healthy individuals (Sussman & Bates-Jensen, 2007). This healing ridge is evidence of collagen deposition knitting the two separate wounded edges together resulting in a healed surgical site. In such a case, the skin at the wounded site should have the same tensile strength as surrounding tissue after healing has fully occurred. This point is important to remember as we move on to discuss wounds that heal by secondary intention.
Wounds are described as healing by secondary intention if they are left open to heal or fill in with new granulation tissue and finally close by re-epithelialization. Scar tissue in full thickness wounds that heal by secondary intention (or scar tissue formation) will continue to mature 12-18 months after complete closure of the wound opening. The tensile strength of the resulting scar tissue in the area of a wound healed by secondary intention will never reach more than 80% of the tensile strength of the surrounding tissue. Therefore, this will always be a weak spot, prone to breakdown before the surrounding tissue. Therefore, a full thickness pressure ulcer in a location likely exposed to repeated pressure such as the ischia or coccyx, which healed by secondary intention instead of flap closure, will be at greater risk of recurrence. This is one reason that surgeons prefer to create surgical skin flaps to close certain wounds such as clean, uncomplicated full thickness pressure ulcers in relatively healthy individuals (with the best chance of surgical healing), instead of leaving these wounds open to heal by secondary intention (Bryant & Nix, 2007).
On the other hand, full thickness wounds which are initially sutured closed, then re-opened (or left open at the start) for awhile and finally sutured, stapled, glued or taped closed again, are said to be closed by tertiary closure. These wounds heal by a combination of scar tissue formation and surgical wound healing. Therefore, their suture lines may or may not reach the tensile strength of the surrounding tissue, depending on the amount of scar tissue formation (Bryant & Nix, 2007; Sussman & Bates-Jensen, 2007).
As discussed above, full thickness wounds healing by secondary intention actually heal by scar tissue formation. The wounded human body sets into motion a cascade of processes that results in the production of new collagen to fill the open defect of a full thickness wound in the skin/tissue. If the skateboarder is young and healthy, his/her knee will bleed for a few seconds and clotting factors and fibrin will start clotting the blood. Chemical signals (cytokines) will be initiated which will result in localized edema, redness at the area, slight warmth and pain. The localized pain, edema, warmth and redness will typically resolve in 3-7 days (inflammatory phase of wound healing). If the wound bed is not kept moist, the wound will dry out and a scab will form. Next, the body will produce enzymes (matrix metalloproteinases or MMPs) under the scab to help lift it, especially at the edges. The wound bed under the scab will be moist to promote cellular communication, proliferation and movement (Bryant & Nix, 2007). The skateboarder will likely pick the scab off of the wound, especially if it feels tight or itchy. However, the scab will form again, smaller this time, as the wound contracts. If all goes as expected, the wound will completely close (re-epithelialize) in a few weeks. As described, this is an acute wound. Interestingly, George Winter (Winter, 1962) demonstrated that open wounds (not sutured surgical wounds), which are kept continuously moist actually heal almost 50% faster than those allowed to dry out and scab over. The skateboarders scenario demonstrates uncomplicated acute wound healing. The typical needs of acute wounds versus chronic wounds are described below.
The typical needs of the uncomplicated ACUTE wound are:
In contrast to acute wounds, any wound that does not follow the expected pathway to healing is a chronic wound. Chronic wounds most often get stuck in the inflammatory phase of healing, resulting in delayed wound healing, and often, persistent edema, redness and pain (Baranoski & Ayello, 2004; Bryant & Nix, 2007; Schultz et al., 2003; Sussman & Bates-Jensen, 2007).
Inflammation in chronic wounds typically starts as it does in acute wounds: wounding bleeding → clotting cascade → release of cytokines → edema, warmth, redness, pain. However, unlike acute wounds, in a chronic, complex or recalcitrant wound, the expected pathway to healing stops here and never progresses out of a chronic inflammatory state. The presence of biofilm, or overwhelming infection; malnutrition; immune suppression; certain medications and a variety of other factors can contribute to a wound remaining in a chronic inflammatory state. Chronic wounds get stuck in the inflammatory phase of wound healing.
The typical needs of the CHRONIC wound are similar to the acute wound with one exception:
More advanced chronic wound treatments and adjunctive therapies will be discussed in a future course.
This section seeks to provide specific information to help you approach the wound from a nursing or caregiver perspective, which focuses on the cleansing and dressing of wounds.
Ideally, care of a wound should begin with a game plan. There is no strict recipe that will fit all wounds, but the following are general measures and recommendations (Baranoski & Ayello, 2004; Hess, 2005; Sussman & Bates-Jensen, 2007) that should be considered with all wound care. Typically, the process of wound dressing changes will look something like this:
|Common wound care supplies: gloves (sterile or non-sterile/clean), 4x4 gauze, saline or wound cleanser, paper measuring tape, skin prep wipes, disinfected scissors, primary dressing, secondary or cover dressing (if needed), tape or securing device, biological waste disposal bag, drape(s).|
Now we will attempt to break this down into individual considerations. Gathering supplies, selecting the appropriate materials, setting up your workspace, and making the patient and caregiver comfortable are self-explanatory.
Do not take hand washing for granted! You have heard it said that the most important infection control practice is hand washing. This is true. Proper hand washing prevents infection: Wash with soap under running water for at least 15 seconds. No short cuts. Wearing gloves when you perform wound care is necessary in most cases, unless it is a close family member or the patient is doing wound care for themselves. However, wearing gloves is no substitute for hand washing (CDC, 2012)!
Wound care has advanced tremendously with modern technology. This is good news for patients, but complicates things for health care providers. Forty years ago, there was only a small list of wound care products to choose from and today there are thousands. However, clinicians need not fret about approaching wound care in modern healthcare. Clinicians need only to remember a few basic principles similar to the ABCs of CPR. Think of this as the TIME for wound care. Schultz et al. (Carville, 2006; Schultz et al., 2003, 2004a) wrote a pivotal article on wound bed preparation which describes a systematic approach to addressing specific needs of the wound bed in full thickness open wounds. In their article they describe the anagram T-I-M-E to assist clinicians in performing evidence-based wound care.
Many experts agree it is necessary to cleanse wounds at each dressing change to remove wound exudates, cellular waste, debris, bacteria, etc. However, caution is warranted regarding antimicrobial wound cleansers. Several studies report on the cytotoxicity of various common wound cleansers. Cytotoxicity relates to the substance being toxic to human tissue cells. Cytotoxic wound cleansers will not only kill germs but also kill healthy cells such as the fibroblasts (white cells that manufacture collagen/new tissue) or epidermal keratinocytes (important skin cells). (Baranoski & Ayello, 2004; Krasner, Rodeheaver, Sibbald, & Woo, 2012; Rabenberg, Ingersoll, Sandrey, & Johnson, 2002; Wilson, Mills, Prather, & Dimitrijevich, 2005).
In addition, many of these cleansers are antimitotic (prevent cellular mitosis and regeneration), which is how some chemotherapy agents function to prevent cancer cell growth. While that may be a desirable trait for cancer treatment, it may not be as desirable for a wound cleanser!
Wilson et al. (2005) reported on the cellular toxicity of common skin and wound cleansers such as dilute Acetic acid (0.25% vinegar), Cara-Klens, Dermal Wound Cleanser, Dial Liquid Antimicrobial Soap, Hibiclens, Hydrogen peroxide (3%), diluted Dakins solution (0.025% sodium hypochlorite/bleach), Povidone Iodine (10%), Puriclens, Restore Wound Cleanser, SAF-Clens, Saline (0.9% sodium chloride), Shur-Clens, Biolox, Techni-Care, etc. Their study revealed that only Shur-Clens, SAF-Clens and Saline were non-cytotoxic to fibroblasts (Toxicity index 0) without being diluted. Only Biolox, Shur-Clens and Techni-Care were non-cytotoxic to epidermal keratinocytes (Toxicity index 0) without being diluted. Some cleansers had higher toxicity indices such as 10 (need to dilute 10 times to reach a non-cytotoxic strength), 100, 1000, 10,000 or 100,000 (need to dilute 100,000 times to reach a non-cytotoxic strength). The higher the index, the more cytotoxic the cleanser. The cleansers which had the highest toxicity index against fibroblasts included Hibiclens (10,000), Dial Antibacterial Soap (100,000) and Ivory Liqui-Gel (100,000). The cleansers which had the highest toxicity index (100,000) against epidermal keratinocytes included Hydrogen peroxide, Povidone Iodine, and Dakins Solution.
Many clinicians are badly informed concerning Dakins solution, when to use and not to use, storage, documentation and strengths. Here are some things every clinician should know about Dakins:
Dakins solution is a 0.5% sodium hypochlorite solution and is often diluted because of its high cytotoxic properties. RECORD the correct strength!!!The following is a chart which describes the different dilutions of sodium hypochlorite solution.
|Industry Term||Percent of Sodium Hypochlorite||Active: Total||NaOCl Parts per Million||Dilution of Bleach|
|Dakin's Full Strength *||0.500%||1:200||5,000 ppm||1/10th|
|Dakin's Half Strength *||0.250%||1:400||2,500 ppm||1/20th|
|Dakin's Quarter Strength *||0.125%||1:800||1,250 ppm||1/40th|
|Diluted Sodium Hypochlorite||0.0250%||1:4000||250 ppm||1/200th|
|Di-Dak-Sol *||0.0125%||1:8000||125 ppm||1/400th|
Ohio State University Medical Center (OSUMC) Department of Inpatient Nursing (2002) published a nice patient education pamphlet, How to Make Dakins Solution. This pamphlet describes diluting 3 ounces of common (unscented) household bleach (5.25% sodium hypochlorite solution) with 32 ounces of clean, boiled water (buffered with teaspoon baking soda/sodium bicarbonate) to make a full strength Dakins solution (0.5% sodium Hypochlorite solution).
To make strength Dakins solution (0.25% sodium hypochlorite), use only 3 tablespoons (48ml) bleach mixed with the same amount of water (32 ounces) and baking soda (1/2 tsp.). OSUMC reports tightly sealed jars of these solutions may be stored at room temperature up to one month (in a dark jar), but once opened, any unused solution should be discarded within 48 hours. University of Virginia Health System also created a similar document.
In most cases, wound experts recommend using water or saline to cleanse the wound (Fernandez, Griffiths, & Ussia, 2007). Some articles suggest tap water may be appropriate to cleanse a chronic wound. However, a Cochrane systematic review of research exploring this tap water question concluded, The decision to use tap water to cleanse wounds should take into account the quality of water, nature of wounds and the patients general condition, including the presence of co-morbid conditions (Fernandez et al., 2007). They also point out that for tap water to be considered for wound cleansing, it must be potable. Caution may be warranted for several reasons when considering tap water. Most of the studies in the systematic review were small and did not have adequate sample sizes to determine significant differences between groups. It is not known if the water used for wound cleansing vs. normal saline was tested for bacterial, cysts, fungi or presence of any other contaminants. Tap water if obtained from a well may contain contaminants such as bacteria or other contaminants, undetectable to the human eye. Alternatively, city water is typically chlorinated at around 3 parts per million or 0.3mg/L and also typically contains fluoride (0.5mg/L to 1.0mg/L) - it is unknown what effect this may have on cellular activity in the wound bed, and this was not reported on by the studies included in the Cochrane systematic review. Therefore, the author recommends using primarily saline or a proven non-cytotoxic wound cleanser.
An exception to using cytotoxic wound cleansers is when the benefits outweigh the risks. For instance, in the case of localized bacterial invasion in which the host is unable to overcome the bioburden of the infecting organism(s) with its own immune defenses (such as pseudomona aeruginosa infection resulting in further wound deterioration), the fibroblasts and epidermal keratinocytes are not likely to survive this hostile wound environment anyway. Therefore, it may justify using a short-term application of cytotoxic wound cleanser such as a dilute Dakins solution (sodium hypochlorite) just long enough to eradicate the infecting organisms. Yes, this is likely to impair cellular function temporarily but the infecting organisms would do far worse if you did not address/control them. Once you have cleaned up the wound (perhaps a few weeks), you should return to non-cytotoxic moist wound healing principles for wound care.
Cleansing the wound should not only address washing or rinsing a wound but also includes debridement or addressing removal of non-viable (necrotic) tissue from the wound bed. Necrotic tissue is a breeding ground for bacteria and impairs wound healing (Schultz et al., 2003). Removing this unhealthy tissue (debridement) may be achieved by a variety of means: Sharp debridement, either selective or non-selective (with scalpel, scissors, curette); enzymatic (collagenase ointment or similar); autolytic (promoting the body's own enzymatic activities); mechanical (rough friction or wet-to-dry) and larval debridement (maggots) (Schultz & Dowsett, 2012; Schultz et al., 2003).
Necrotic tissue in the wound bed provides a breeding ground for bacteria, impairs optimal cellular communication and proliferation, and acts as a physiological barrier to new tissue deposition and wound contraction (Schultz & Dowsett, 2012; Schultz et al., 2003; Sussman & Bates-Jensen, 2007). In almost all cases, necrotic tissue should be removed when safely possible. This includes slough (white, yellow, grey chicken fat appearing tissue), fibrin (adherent, white yellow or grey fibrous non-viable tissue), and eschar (typically thick, brown to black, leathery dead tissue). There are a few exceptions to this rule. One very important exception is in the case of intact, hard, black eschar on the heel of the foot. There is no way to determine the depth of tissue damage underneath this eschar, so removing it may expose bone and predispose the patient to infection and osteomyelitis. Intact is the key word here. If this eschar is dry, and NOT soft or boggy or fluctuant, and does not have any lifting at any of the wound edges or drainage, then it may actually be beneficial to leave this eschar alone. Of course, pressure should be off-loaded from the area, and the eschar should be kept clean and dry. Cover the eschar with dry gauze for protection and paint it daily with a small amount of Betadine solution (letting it air dry thoroughly before applying dry gauze for protection and padding). With this tissue in place, it may act as a protective body bandage keeping bacteria and contaminants out of the wound. The wound healing process under this eschar may continue if other wound healing impediments are addressed (offloading pressure, adequate nutrition & blood flow, adequate immune function and tissue perfusion). If the wound under the eschar follows a healing trajectory, the eschar may lift itself after several weeks and display newly epithelialized skin underneath. In some cases, it may lift prematurely at an edge or starts feeling boggy or fluctuant underneath the eschar and may start draining. In this case, it may be best to remove the eschar (Bryant & Nix, 2007).
Typical methods of debridement include sharp debridement, mechanical, autolytic, enzymatic and larval debridement. Sharp debridement is usually performed with a scalpel, curette, and/or scissors. This may occur in a surgical suite by a surgeon or at the bedside by a physician, PA, ARNP, or certified wound specialist if allowed by state board scope of practice limitations. Enzymatic debridement is typically achieved by applying ointment (collagenase) to the wound bed. Mechanical debridement may be accomplished by wet-to-dry dressings, by rubbing/friction while cleansing the wound, or by pulsed water jets & hydrotherapy (pulsed lavage, whirlpool). Autolytic debridement occurs by promoting natural enzymes in wound fluid to degrade non-viable tissues usually by placing an occlusive or semi-occlusive dressing over the non-viable tissue. In addition, autolytic debridement may be accomplished by osmotic wound products such as medical grade honey or gauze saturated with a hypertonic sodium chloride since these products draw fluid from wound bed tissues into the wound product and loosen necrotic tissue. Larval debridement is performed by allowing sterile maggots to remove non-viable tissue (Baranoski & Ayello, 2004; Bradley et al., 1999; Bryant & Nix, 2007; Schultz & Dowsett, 2012; Schultz et al., 2003; Sussman & Bates-Jensen, 2007).
Maggots are the unsung heroes of wound healing. Maggot(s) or larval debridement therapy (MDT or LDT) has been utilized for medical purposes for hundreds or thousands of years. Mayan Native Americans and other ancient cultures have documented reports of maggots being used in certain medical treatments, especially for wound care. Larvae of certain fly species, such as Phaenicia sericata (blow fly); remove only dead tissue while promoting healthy tissue in the wound bed, helping wounds heal faster.
An American Civil War surgeon, Dr. John Zacharias (1837-1901), is one of the first healthcare providers in the US who intentionally utilized maggots in the debridement of wounds. He noted that maggots cleansed opened wounds of necrotic tissue better and more rapidly than any other method at his disposal. In WWI, an orthopedic surgeon named Dr. William Baer recognized the efficacy of maggots to clean up compound fractures and large open flesh wounds when he discovered them in several untended war wounds from the battlefield. Dr. Baer and Dr Zacharias both credited the blow fly larvae with preventing sepsis and saving many soldiers lives in these battlefield cases. Dr Baer was very impressed with the usefulness of fly larvae/maggots as a medical treatment. After the war, Dr. Baer worked as a medical practitioner and researcher at Johns Hopkins Hospital, where he started to conduct research using blow fly larvae in 1929. Initially he used live larvae/maggots he found in the neighborhood or those he grew on a windowsill. One patient died after contracting tetanus from contaminated maggots, so Dr. Baer developed sterile maggot growing procedures. He is well known for his research using sterile maggots in 21 individuals with wounds infected with chronic osteomyelitis not responsive to other treatment. All of these wounds completely healed within six weeks and confirmed that maggots were effective at rapid wound debridement of necrotic tissue as well as reducing the presence of bacteria in wounds. In addition, wounds treated with larval therapy demonstrate reduced wound odor and a wound bed which tends to become more normalized to an alkaline ph environment (Baer, 2011; Schultz & Dowsett, 2012; Sherman, 2009).
Regrettably, with the development of antibiotics in the 1940's and various skin and wound antiseptics, the use of LDT declined. Systemic and topical antibiotics became more a standard of care and more antiseptics were utilized in skin and wound care. Maggot therapy was essentially abandoned in favor of more modern or easier methods, not because they were no longer effective, but largely because of negative reactions of patients, their caregivers and clinicians, who found it distasteful to apply small squirming worms that could crawl out of a wound.
The Food and Drug Administration (FDA) cleared medicinal maggots (Phaenicia or Lucilia sericata) for debriding non-healing necrotic skin and soft tissue wounds in the 1980s, after a renewed interest in larval debridement therapy due to increasing drug sensitivities and the exponential growth of antibiotic resistant organisms. Medical maggots were approved by the FDA as a medical device in the US, and are processed under controlled laboratory conditions. They are germ-free and disease-free as well as unable to reproduce (sterile in both cases). Interestingly, in Europe, Canada and Japan maggots are classified as medicinal drugs. The reason for this is because maggots debride non-viable tissue partly by secreting proteolytic digestive enzymes, which liquefy the necrotic tissue that the larvae then suck up and remove (along with bacteria and biofilm) from the wound bed. In addition, research suggests maggots are very effective at eliminating drug resistant organisms such as MRSA (methicillin resistant staphylococcus aureus), they do not excrete bacteria into the wound, and they are a most efficient way to debride a wound without the typical pain or bleeding associated with other forms of debridement such as sharp debridement (Sherman, 2009).
In many cases, wound inflammation is often mistaken for wound infection, since the signs of inflammation are warmth, edema, pain, and localized redness. Patients with these symptoms are often placed on antimicrobial treatment regimes without the benefit of microbiological studies to guide them (no quantitative tissue cultures from the wound). This may be one contributing factor in the development of drug resistant organisms. There has been much written about wound infection and other authors can address this better than this brief wound care review (Baranoski & Ayello, 2004; Bryant & Nix, 2007; Schultz, Davidson, Kirsner, Bornstein, & Herman, 2011; Schultz & Dowsett, 2012; Sussman & Bates-Jensen, 2007; Wolcott et al., 2010) Nevertheless, it is one of the most requested topics of wound care courses (to know when to treat and when not to treat infection). Therefore, we will quickly summarize some important facts and helpful tips regarding wound infection:
|Levine technique for obtaining swab culture (when a quantitative tissue sample is not an option):
Rinse the wound bed once with sterile saline (non-bacteriostatic and preservative- free). Moisten the sterile culture swab with sterile non-bacteriostatic and preservative-free saline and rotate the swab completely over a 1cm2 area in the wound bed where it is free of necrotic tissue. Press down slightly to illicit fresh wound fluid. Take your time to allow adequate time for fluid collection. Place in appropriate culture media transport tube and take care that the sample does not sit at room temperature longer than the lab recommends (Bryant & Nix, 2007). Note: A wound culture left on the desk overnight will likely need to be repeated. Check your labs policy on this!
As a general rule of thumb, the wound care provider who is ordering the wound care should re-evaluate the wound for progress at least 2 weeks after the initial wound orders are placed. If the wound is stable, the topical wound treatment is performing as anticipated, and the wound is progressing as expected, the wound treatment may be continued and the follow up could be extended to once every 2 to 4 weeks. If the wound has not improved after the initial 2 weeks, but the wound has not worsened, the clinician should make a decision if a change of wound treatment is in order or if there are other factors which need to be addressed which may be impairing wound healing (nutrition, medications, glycemic control, infection, etc.). After addressing these factors, have the patient return to the clinic in another week or two to re-evaluate progress with the current treatment. If no progress is noted, or the wound worsens at all, a change in treatment may be warranted (Baranoski & Ayello, 2004; Bryant & Nix, 2007; Sussman & Bates-Jensen, 2007).
Measuring the wound is an essential component of wound monitoring and documentation. Wounds may be measured using a variety of techniques but the two most common techniques are the clock method and the longest axis method. The measurement method used should be performed consistently by all care providers. Only one method should be used for all wound measurement documentation for the entire facility to minimize confusion and inconsistency in the patients charts. The clock method consists of imagining the top of the patients head to be at the 12 o'clock position of a clock and the soles of the feet to be at the 6 o'clock position of an imaginary clock. All wounds are measured with length being the measure of the wound along the 6 to 12 o'clock axis and the width being the measure of the wound opening along the 3 to 9 o'clock axis. This works well to get the same measures no matter what position the patient is lying or sitting in. The longest axis method consist of taking the wound opening measurements along the longest axis of the wound as the length and the width measurement as the measurement of the wound opening along the perpendicular axis. Wound depth is measured the same way for both of these methods. Using the blunt end of a cotton tipped applicator, hold the stick lightly resting upon the deepest portion of the wound and using a gloved hand, grasp the stick at the wound edge and measure the straight depth of the wound at the deepest portion of the wound and record this as straight depth. Tunnels or tracking in the wound or undermining (lip under the inner aspect of the wound edge) should be measured at most shallow and deepest points. It should also be noted if tunneling or tracking connects two wounds or connects with any joint space or underlying structures (Baranoski & Ayello, 2004; Bryant & Nix, 2007; Sussman & Bates-Jensen, 2007).
Photographing the wound (if desired) as an additional component of wound monitoring includes establishing a routine frequency of photographic documentation, a consistent camera and distance from the wound for all photographs, and a measuring ruler in the frame next to the wound for size reference. It is imperative that you consider who is taking the photos. If another person is taking the pictures, make sure they follow infection control practices and do not touch the patient with the camera or anything in the patients room, especially if they will be taking the camera back to a central work area or other patients room. If it is the same clinician performing the dressing change, care should be taken to follow strict infection control protocols concerning handling the camera and where it is stored during wound care. For example, it should not be laid on the patients bed or bedside table without a clean barrier under it. It should not be handled after touching the patient, the wound dressing or wound care supplies without first washing your hands. Hands should be washed again after handling the camera. The camera should not be in close proximity to the wound during dressing changes if at all possible. During dressing changes, bacteria may be aerosolized and could contaminate the camera. The camera should not be taken from one patients room to another for other photos without first using some kind of disinfecting wipe or changing camera covers if disposable covers are used.
If photographs are to be used in the electronic health record, the author recommends that a photo of the patients ID bracelet be taken, followed by a photo of the wound, then the ID bracelet again, so that this sequence of photos may be uploaded into the appropriate electronic health record, and minimize the chance of the picture being uploaded to the wrong patients chart. In most cases, identifiers such as patient name, initials, date, etc. should not be included in any photo that may be used for educational purposes. However, follow your facility's protocols for taking and uploading wound photographs.
One of the main functions of a wound dressing or wound therapy is moisture management. Specifically, to maintain a moist wound bed while also eliminating excessive wound drainage. Since George Winters seminal work in 1962, demonstrating open wounds treated with dressings which maintained a moist environment healed almost 50% faster than wounds allowed to dry out, no published studies have been able to refute the effectiveness of moist wound healing. In fact, current scientific investigations not only support what has been known about moist wound healing, but serve to further explain the role of a moist wound bed in relation to the local cellular activity associated with wound healing (cytokine signaling, fibroblast cell proliferation, collagen and matrix synthesis, epithelial cell migration, etc).
There are hundreds of commercially available wound care products in the United States. Numerous dressings or topical wound care applications have reported successful wound healing results in clinical trials, yet wet-to-dry dressings are still one of the most frequently ordered wound care modalities in nearly all healthcare settings (Cowan & Stechmiller, 2009; Fleck, 2009). Wet-to-dry dressings are no longer evidenced-based practice for wound care. As the name implies, a wet-to-dry dressing ultimately results in a dry wound bed (even if for limited amounts of time). Research demonstrates these dressings disrupt granulating tissue, impair epithelial cell migration, leaves behind foreign bodies in the wound bed, increase the risk of infection, aerosolize bacteria, and cause severe pain upon removal (Cowan & Stechmiller, 2009; Fleck, 2009). Nevertheless, wet-to-dry dressings have been a standard, traditional or default dressing for decades (Bryant & Nix, 2007; Cowan & Stechmiller, 2009; Mulder, 1995). Modern wet-to-dry dressings are accomplished by moistening sterile cotton gauze with a solution (usually 0.9% normal saline) and placing it in the wound, allowing it to dry, then removing it dry from the wound bed (along with tissue that adheres to it), thus performing mechanical debridement. There are several reasons why this form of debridement may be detrimental to the wound bed, and unnecessary with so many other forms of wound debridement available today. Cost, compliance, pain, increased risk of infection and re-injury to healthy granulating tissue are several of these reasons (Bryant & Nix, 2007; Cowan & Stechmiller, 2009; Mulder, 1995).
It is the authors belief that most health care providers have continued with wet-to-dry dressings more out of misunderstood tradition rather than evidence-based wound care practices. Furthermore, the use of wet-to-dry dressings as a wound care modality may be outdated and used with inappropriate frequency in todays health care arena (Cowan & Stechmiller, 2009).
If not wet-to dry, then what how do you select a moist wound dressing? There are so many to choose from. What dressing has the most evidence supporting it? How often should you change the dressing? Unfortunately, several systematic reviews have failed to produce strong evidence in favor of one specific dressing type for all wounds. Most clinicians who are not very familiar with modern wound products just want to know, if not wet-to-dry, then what one product can safely be used in its place? The answer to this question should be, it depends.
Wound experts now realize the one size fits all approach is not ideal for wound care or dressing product selection. Multiple EBP wound treatment algorithms exist to assist the clinician in selecting wound treatment approaches. Krasner, Sibbald & Woo (2012) developed a Conceptual Framework for Wound Dressing Product Selection. This model reminds health care providers that wound care should be delivered using a Holistic, Interprofessional, and Patient-Centered Approach. This approach should also be in agreement with the principles of evidence based practice (EBP). The principles of EBP affirm that health care should be delivered based on the strongest and most current research evidence + the clinicians experience & expertise + the patients (and familys) preferences and values (Sackett, 1999; Sackett et al., 2000; Titler, 2008).
Before you can determine anything about the wound, you must assess the wound. However, the wound is only one small part of a person. In assessing the wound, dont forget to assess and talk to the person attached to the wound. Assess the person (physically as well as psychosocially). What are the preferences, personal needs, likes, dislikes of the patient (as well as their caregiver)? What are their feelings about the wound/wound care? For a caregiver who gets sick and faints at the sight of blood, asking them to empty bloody drainage from a drainage tube may not be a good choice. As you assess the wound itself, identify the etiology of the wound and co-morbid conditions which may affect wound healing. In Krasner, Sibbald & Woos model (2012), they suggest approaching wound care with one of 3 options or goals in mind.
Probably the most effective and economical substitute for saline moistened gauze (wet-to-dry) dressings are wound gel moistened or impregnated gauze dressings. However, there are now a myriad of evidence-supported wound dressings to address specific needs of various types of wounds. This section is an introduction to some common dressings which have at least moderately strong evidence supporting their use. Please see Table 1 for list of common wound dressings and suggestions for frequency of dressing changes. Resources for all of this information were obtained from 5 main sources: (Baranoski & Ayello, 2004; Bryant & Nix, 2007; Hess, 2005; Krasner et al., 2012; Sussman & Bates-Jensen, 2007). In addition, the Agency for Healthcare Research & Quality (AHRQ) has several evidence synthesis summaries and technical assessments published or currently in progress (such as a review of skin substitutes for chronic wounds) which may be pertinent to wound care.
The ideal dressing should promote the best environment in the wound bed to promote wound healing. In other words, it should maintain a moist wound bed, be thermally insulating, protective to the wound, free of particles that could remain in the wound and become foreign bodies in the wound, be vapor permeable, hypoallergenic, non-toxic, comfortable, and cost effective (Carville, 2006; Hess, 2005; Jones, Grey, & Harding, 2006; Mulder, 1995). Health care providers should consider patient and/or caregiver cognitive and physical limitations/abilities when ordering a wound dressing, if the patient or caregiver will be expected to do the wound care. In addition, if at all possible, the wound dressing should also be aesthetically acceptable to the patient/caregiver (taking their preferences into account) and promote the patient continuing as many activities of daily living as possible (within the limits of his co-morbid conditions) (Krasner et al., 2012). The average health care provider or medical clinic should have at least a familiarity with the following products, and probably have at least one of each type of dressing on hand/in stock:
Gauze comes in a plethora of forms, sizes, shapes, and layered products. The most common gauze products are sterile or aseptic (packaged individually, in packages of 2 or in bulk packages of 50 or 200 cotton, woven, 8 or 12 layered, 4 x 4 or 2 x 2 sizes. Telfa is gauze which is coated with a plastic film to help render it non-adhesive. Gauze also comes in larger bulk dressings such as abdominal dressings. These dressings are commonly made today with bulky absorptive layers of cotton batting and woven gauze in larger sizes such as 5 x 9 or 8 x 10. Gauze dressings are also manufactured in woven gauze of one rolled length (roll gauze) in a variety of widths (such as 2 of 4 or 6 widths). Gauze may be impregnated with other substances such as calamine, petrolatum, wound gels, silver, etc. In addition, combination products may have layers of gauze combined with layers of other wound products such as charcoal, alginates, adhesive backings or borders. Gauze pads are typically latex-free, however, not all gauze rolls are latex-free check packaging!
Whereas, wet to dry dressings are moistened with saline and allowed to dry out, wound gels are a good alternative that effectively maintains a moist wound bed. The clinician may moisten gauze with a wound gel, or use a pre-packaged gel impregnated gauze. Typically, this only needs to be changed once a day instead of 2-3 times per day. Wound gel dressing changes would be less painful than wet-to-dry. Wound gels come in amorphous gels (in tubes) or in sheets of flexible semisolid gel. Wound gels are commonly made of organic polymers that maintain moisture in the wound bed but also swell with water or wound drainage. In addition, wound gel may contain silicone, water, glycerine, polyethylene oxide, alginate or collagen. Common brand names of these wound gels include (this is not meant to be all-inclusive): Saf-Gel, Vigilon, Elastogel, Curasol, Solugel, Intrasite Gel, Purulon Gel, DuoDERM gel, Nu-gel, Stimulen collagen gel, etc. Some gel sheets such as Vigilon come with polyethylene film covers on each side that should be removed before placing gel sheet on wound (this will allow more vapor permeability). Gel products may absorb up to 5 or more times their body weight in wound drainage yet will not dry out or dissolve. Typically the gel product is placed in the wound bed and covered with a secondary dressing to secure in place (such as gauze or foam). These products are normally changed daily, though gel sheets on certain wounds such as superficial wounds and skin tears may be left on for 1 week if the skin tear is clean (non-infected) with a well approximated flap and is not heavily exudating. Wound gel sheets that come with adhesive borders may be changed 3 times per week. Wound gels are appropriate for full thickness, shallow or deep wounds with scant to small amounts of drainage or varying amounts of drainage where the wound bed may dry out at times. Silicone gel sheets may also be useful in preventing or treating wound scarring (keyloids) for up to one year after wound closure.
Care should be taken to manage moisture so that excessive moisture is not allowed to seep out over the surrounding wound edges causing maceration. Skin Barrier wipes, powders or creams may be useful to protect periwound skin from adhesives (barrier wipes) or excessive moisture (barrier creams such as zinc oxide, or dimethicone). These are applied at each dressing change.
Another simple dressing to use is impregnated gauze. Pre-packaged impregnated gauze products are typically impregnated with petrolatum, hydrogel, Bismuth Tribromophenate, hypertonic sodium chloride, zinc, or crystalline iodine compound (iodoform). Common brand names of these dressings include (this is not meant to be all-inclusive): Vaseline Gauze, Adaptic, Xeroform, Curasalt, Mesalt, etc. The most basic and inexpensive of the petrolatum impregnated gauze may average $40 or less per box of 50. These dressings are conforming and may be good choice when filling tunnels or tracking as long as one piece and not multiple pieces are packed loosely into the tunnel. These dressings provide non-drying and moisture retaining wound interface, they conform to the wound bed, and petrolatum impregnated products may help protect periwound skin if they are shallow abrasions, so may be placed on the wound overlapping the edges. Normally these dressings are changed daily, and covered with a secondary dressing such as gauze pads or roll gauze, foam, bandage / wraps.
Hydrocolloid dressings are typically opaque, self adherent patch type dressings made of sodium carboxymethylcellulose, pectin and gelatin mixed with polymers and adhesives. They also have a semipermeable film or foam sheet covering which makes them generally waterproof. However, waterproof does not mean it can be submersed such as in a bathtub or pool. These dressings are flexible wafers of differing sizes, thicknesses and shapes (some may be cut to desired size and shape). They can conform to many areas of the body. Common brand names of these dressings include (this is not meant to be all-inclusive): Restore, DuoDERM, DuoDERM CGF, Tegasorb, Comfeel, Granuflex, and 3M Tegaderm hydrocolloid thin. When exposed to exudate (wound drainage), the polysaccharides & other polymers absorb water and swell but remain contained in the adhesive matrix. Some have marks to tell you when the wound drainage is exceeding the dressing's limit and it is time to change. Most hydrocolloid dressings are Latex-free. Most if cut to size, should be cut larger than wound. These dressings are typically changed every 2-5 days and it is best to use a skin barrier wipe applied to the periwound skin before application of the hydrocolloid.
Alginates are super absorbent fibers typically composed of calcium alginate manufactured from brown seaweed that becomes gel-like when exposed to sodium-rich wound exudates. It resembles angle hair and is manufactured from brown seaweed. They may absorb up to 20 times their weight in wound exudates. This makes them a good choice for highly exudating wounds. However, they are not recommended for dry or only slightly moist wound beds, as they will not remain a gel without the presence of moisture from the wound bed. Thus, they may dehydrate the wound bed, or allow the wound bed to dry out. Alginates may be available as sheets or pads and ropes and also are known for some hemostatic properties, making them a good choice for a wound bed that may be oozing a small amount of blood after sharp debridement. In addition, some alginates may have silver incorporated into the fibers as an antimicrobial agent. Alginates typically require a secondary cover dressing such as gauze or ABD pad and are changed daily or as necessary to manage wound exudates.
Hydrofiber dressings are non-wicking, absorptive primary dressings made of sodium carboxymethyl-cellulose fibers that absorb wound drainage and turn into a gel sheet. They may also keep the wound bed moist if the wound is sometimes dry (you would moisten them with saline or water). Hydrofibers act somewhat like an alginate but will not promote hemostasis like alginates. Some hydrofiber dressings include 1.2% silver as an antimicrobial component (usually delineated by the silver element symbol AG in the hydrofiber name). They are appropriate for full thickness wounds with minimal to moderately amounts of drainage. They are typically changed once every 1 to 3 days and require a secondary cover dressing.
Foam dressings are typically a thick both absorptive and protective. They may be selected to provide conforming padding and may be used in combination with other products (such as alginates or hydrofibers) if needed; Foams may be used as a packing material in large wounds to fill dead space. Not all foam dressings are appropriate for infected wounds. Check manufacturer guidelines if infection is an issue. Some foam dressings are impregnated with silver or other antimicrobial material (such as Methylene Blue and Gentian Violet or polyhexamethylene biguanide/PHMB) or coated with a silicone interface. Some foam dressings may be self-adhesive or have an adhesive border. Most foam dressings are latex-free and made of polyurethane foam coated with a waterproof outer surface. Change frequency may vary from daily to up to every 7 days for some products, depending on wound drainage amounts. Check manufacturer recommendations.
Silver ions may be incorporated in wound gels, woven fabric dressings, foam, rope, alginates or hydrofiber dressings. Most silver fabric dressings are not very absorbant; they are used primarily to deliver silver ions to wound bed for the silvers antimicrobial effects. However, silver alginates, hydrofibers, foams, or composite dressings are absorbent. Silver ions are activated by wound exudates or water; some silver products (Acticoat 3 day or 7 day) should not be moistened with sodium chloride (saline). Most silver products should not be mixed with hydrogen peroxide or sodium hypochlorite (Dakins or DiDaksol) solutions because the ions will inactivate each other. Silver products should not be combined with iodine products for the same reason. Silver dressings may need secondary dressings and may be changed daily up to every 7 days, depending on the product.
In general, povidone iodine should not be used in chronic wound care due to its cytotoxic properties. However, cadexomer iodine is available which is antimicrobial while remaining non-cytotoxic to the wound bed. Cadexomer iodine is available in a wound gel (thick paste) or a flexible pad which is typically applied to the wound bed with a secondary dressing on top and left in the wound bed for 3 days, or until the color changes from a orange-brown to a grey-brown. They are used for antimicrobial effects on infected room and are effective against most bacteria including pseudomonas, staphylococcus aureus and streptococcus as well as fungus.
Compression dressings or bandage wraps are primarily used for lower extremity venous insufficiency. Compression garments are also appropriate for extremities effected by lymphedema (such as after mastectomies with axillary lymph node removal) or burns. Short-stretch compression is typically used for lymphedema (these are NOT ace bandages). Long-stretch compression (multilayer wraps and ace-type bandage) is also the typical treatment venous leg wounds. It is important to verify arterial perfusion to affected limb before applying compression. Compression may be applied in 2 to 4 layers, with a therapeutic layer such as zinc-oxide or calamine impregnated strips applied first, an absorptive layer next, possibly a bandage layer and/or Coban layer on top. These dressings may be applied every few days to weekly, depending upon amount of wound exudates. Once edema is under control and wounds healed, lifelong compression stockings should be worn by the patient (apply daily first thing in the morning before ambulating and remove at night just before retiring to bed).
Composite dressings are combination dressings of various sizes that are made up of two or more separate materials to address unique needs of certain wounds. These dressings tend to be layered with a contact layer (may be non-adhesive), an absorptive layer, and possibly an antimicrobial layer or odor absorbing layer (such as charcoal). They also may have an adhesive border to secure them to the wound site.
Tissue engineered skin substitutes, matrix dressings, collagen products and negative pressure wound therapy are some of the advanced wound therapies to be discussed in a future article.
|Type of product||Examples *Brands/Names||Types of wounds||Action|
|Petrolatum or Hydrogel Impregnated gauze||Vaseline Gauze, Adaptic, Xeroform; Skintegrity, Elta, Restore, Dermagauze, Curafil||Shallow and dry wounds; abrasions, skin tears, etc.||Provides non-drying and moisture retaining wound interface, conforms to the wound bed, petrolatum impregnated products may help protect periwound skin if shallow abrasions. Typically changed daily, though may be left in place over well-approximated, non-infected skin tears up to 1 week.
|Wound Gels/Hydrogels||Saf-Gel, Vigilon, Elastogel, Curasol, Solugel, Intrasite Gel, Purulon Gel, DuoDERM gel, Nu-gel, Stimulen collagen gel||Dry to minimally draining wounds; partial and full thickness depth, 2nd degree burns, exposed tendons||Organic polymers that maintain moisture in the wound bed but also swell with water/drainage (some can absorb up to 5x their own weight in exudate). These gels typically will not dry out or dissolve. May be changed daily, though some gel sheets such as on skin tears may be left on for 1 week if a well approximated flap. Some gel sheets may also be used over scars to reduce hyperkeratosis (keyloid formation).|
|Hydrocolloids||Restore, DuoDERM, DuoDERM CGF, Tegasorb, Comfeel, Granuflex, 3M Tegaderm hydrocolloid thin||Partial and full thickness wounds; minimal to moderate drainage||Typically a flexible wafer of differing sizes, thicknesses and shapes (some may be cut to desired size and shape); forms an Impermeable barrier (most are waterproof); self-adhesive; may contain gelatin, pectin and carboxy-methylcellulose together with other polymers and adhesives. When exposed to exudate (wound drainage), the polysaccharides & other polymers absorb water and swell but remain contained in the adhesive matrix. May be changed every 3-5 days.|
|Transparent films||Op-Site, 3M Tegaderm, PolySkin, Suresite, Blisterfilm, Argomed and Argomed plus TPU films, Mefilm, Uniflex, AcuDerm||Partial thickness or shallow wounds with minimal to small drainage||Most are polyurethane films; provide moisture retention and may provide skin protection. May also assist with autolytic debridement. Most are oxygen or vapor permeable (not 100% occlusive). Sometimes used to "waterproof" a wound|
|Hydrofiber||Aquacel, Aquacel AG||mostly shallow; partial to full thickness; minimal to moderate drainage||Non-wicking, absorptive dressing made of sodium carboxymethyl-cellulose fibers that absorb wound drainage and turn into a gel sheet. They may also keep wound bed moist if wound is sometimes dry (moisten with saline or water). Act somewhat like an alginate but will not promote hemostasis like alginates. Typically changed 1-3 days.|
|Non-adherent polyurethane foam or Silicone interfaced foam;||Optifoam, Mepilex, Mepilex Border, Mepilex Transfer, Allevyn, PolyMem, Lyofoam, Hydrasorb||shallow wounds to those with some depth; partial to full tickness; minimal to heavy drainage||Absorptive & protective - provides conforming padding and may be used in combination with other products (such as alginates or hydrofibers) if needed; Some have self-adhesive borders. Foams that have a silicone contact layer may be useful in reducing hypertrophic (keyloid) scarring. Some have multiple layers (such as polyurethane foam+ polyacrylate fibers + waterproof film in Mepilex). Typically changed 1-3 days.|
|Calcium Alginate||CalciCare, AlgiSite M, Maxsorb||Moderate to heavily draining wounds with no necrotic tissue||Highly absorptive fiber (rope or pad) product made from brown seaweed. Turns to gel when moistened with wound drainage. Change daily.|
|Foams||Optifoam, Mepilex, Hydrasorb||Deeper, full tickness; moderate to heavy drainage||Absorptive and protective - provides conforming padding and may be used in combination with other products (such as alginates or hydrofibers) if needed; Foams may be used as a packing material in large wounds to fill dead space.|
|Silicone||Mepitel, Elastogel, etc.||Dry to exudating wounds or delicate wound beds (exposed tendons, etc.); or over newly closed wounds with high risk of scarring||Some are fenestrated (have holes in them such as Mepitel) and may be applied directly to wound bed under negative pressure wound therapy or other dressing as a non-stick primary dressing. Some are thicker and used over shallow wounds or newly closed wounds to prevent hypertrophic (keyloid) scarring. May be changed every 2-7 days.|
|Roll Gauze||Deeper, full tickness; moderate to heavy drainage||Absorptive and may be used to fill dead space; may also be used in combination with other products (such as alginates or hydrofibers) if needed; Kerlix not recommended due to loose fibers|
|Antimicrobial silver impregnated woven fabric||Acticoat Burn (3day), 7day, flex, surgical site dressings||Not for very dry wounds||Not very absorbant - used primarily to deliver silver ions to wound bed for antimicrobial effects. Silver ions are activated by wound exudates or water; some silver products should not be moistened with sodium chloride (saline) or sodium hypochlorite (Dakins or DiDaksol) solutions because the ions will inactivate each other. Silver products should not be combined with iodine products.|
|Other silver products||silver wound gels; Silver gel sheets (Silvasorb), silver alginate; silver hydrofiber, silver foam||Application varies by type of base product||Use silver gels as you would other wound gels, use silver alginates you would other alginates, silver foams as you would other foam dressings, etc.|
|Compression||Profore, Profore lite, Unna Boots (with zinc oxide or calamine impregnated contact layer) or multilayer (2-4 layer) wraps, ace wraps,||for lower extremity venous wounds||Long-stretch compression (multilayer wraps and ace bandage) is typical treatment of choice for venous insufficiency and venous leg wounds. Verify arterial perfusion to affected limb first!|
|Silver Nitrate sticks||same||see notes||Applied directly to rolled wound edges, hypergranulating tissue in wound bed; chemically cauterizes acute bleeding|
|Collagenase ointment||Santyl||wounds with necrotic tissue in wound bed||only FDA approved active enzymatic ointment to help remove necrotic tissue from wound bed|
|Antifungal skin products||2% miconazole nitrate in powder, spray, cream, lotion, or ointment. Aloe Vesta Antifungal; Monistat 1, Neosporin AF, Baza Antifungal; Carrington Antifungal; Fungoid; Lotrimin AF, etc.||Skin with fungal rash||Generally for fungal rash affecting skin around wound. Typically apply small amount, gently rubbing into skin so it is no longer visible. Powder may be applied with a light dusting, then gently rub onto affected skin (and may blot with skin barrier liquid to seal in, if excessive moisture is present or under ostomy appliance).|
Pain management includes an accurate assessment and documentation of wound pain. The gold standard for an accurate assessment of the patients pain is the patients self reported pain level. Whether a pain scale of 0 (no pain) to 10 (excruciating pain) is used, or smiling faces/grimacing faces, the level of pain should be documented exactly as the patient reports it (Hess, 2005). The quality of pain (stabbing, shooting, throbbing, sharp, dull, constant or intermittent) along with what factors relieve the pain or make the pain worse (walking, standing, elevating the leg, etc.) should be ascertained and documented. Worsening wound pain is one hallmark of a deteriorating wound and may be more indicative of infection than other observable signs such as edema, warmth and erythema surrounding chronic wounds (Baranoski & Ayello, 2004).
Pain with dressing changes may be managed by topical anesthetic products such as 2% or 4% topical Lidocaine Jelly, or EMLA cream, or systemic medications such as NSAIDS or opioids. Topical anesthetics (Lidocaine, Prilocaine, etc.) should be applied with enough time prior to dressing change or debridement for the medication to take effect (approximately 10 min). Similarly, systemic pain medication should also be administered with enough time for pain relief (at least 30 minutes) (Bryant & Nix, 2007; Sussman & Bates-Jensen, 2007).
Addressing the pain when infection is suspected would include addressing the infection. Certain wound products may assist with pain management in specific types of wounds. Matrix applications using small intestine submucosa (SIS) technology (typically porcine) have been successful in relieving some wound pain, particularly over donor sites from split thickness skin grafts. Glycerine or silicone based gel sheets as well as hydrogel sheets (cross-linked polyethylene oxide and water) such as Vigilon may be cool and soothing to partial thickness wounds such as second degree burns and silicone is helpful in reducing scarring after wound closure (Hess, 2005; Sussman & Bates-Jensen, 2007).
Be on the alert for new, different (especially worsening), or persistent pain associated with chronic wounds. Persistent pain in a neuropathic extremity with a chronic wound, as well as may be associated with osteomyelitis (Bryant & Nix, 2007; Krasner et al., 2012; Schultz & Dowsett, 2012).
Baer, W. S. (2011). The classic: The treatment of chronic osteomyelitis with the maggot (larva of the blow fly). 1931. Clinical orthopaedics and related research, 469(4), 920944. doi:10.1007/s11999-010-1416-3
Baranoski, S., & Ayello, E. A. (2004). Wound Care Essentials: Practice Principles. Lippincott Williams & Wilkins.
Bradley, M., Cullum, N., & Sheldon, T. (1999). The debridement of chronic wounds: a systematic review. Core Research.
Bryant, R., & Nix, D. (2007). Acute and Chronic Wounds (3rd ed.). Mosby.
Carville, K. (2006). Which dressing should I use? It all depends on the TIMEING. Australian family physician, 35(7), 486489.
CDC - 2011 National Estimates - 2011 National Diabetes Fact Sheet - Publications - Diabetes DDT. (n.d.). Retrieved January 1, 2013, from (Visit Source).
CDC, C.-C. for D. C. and. (2012). CDC - Hygiene and Handwashing - Water-related Emergencies and Outbreaks - Healthy Water. Prevention. Retrieved January 1, 2013, from (Visit Source).
Century Pharmaceuticals, Inc. (2011) Retrieved 1/3/13 from (Visit Source).
Cowan, L. J., & Stechmiller, J. (2009). Prevalence of wet-to-dry dressings in wound care. Advances in skin & wound care, 22(12), 567573. doi:10.1097/01.ASW.0000363469.25740.74.
Fernandez, R. S., Griffiths, R., & Ussia, C. (2007). Water for wound cleansing. International journal of evidence-based healthcare, 5(3), 305323. doi:10.1111/j.1479-6988.2007.00068.x
Fleck, C. A. (2009). Why Wet to Dry? The Journal of the American College of Certified Wound Specialists, 1(4), 109113. doi:10.1016/j.jcws.2009.09.003
Hess, C. T. (2005). Wound Care: Clinical Guide. Lippincott Williams & Wilkins.
Jones, V., Grey, J. E., & Harding, K. G. (2006). Wound dressings. BMJ (Clinical research ed.), 332(7544), 777780. doi:10.1136/bmj.332.7544.777
Krasner, D. L., Ed, Rodeheaver, G. T., Sibbald, R. G., & Woo, K. Y. (Eds.). (2012). Chronic Wound Care: A Clinical Source Book for Healthcare Professionals (5th ed., Vol. I). Malvern, PA: HMP Communications, LLC.
Mulder, G. D. (1995). Cost-effective managed care: gel versus wet-to-dry for debridement. Ostomy/wound management, 41(2), 6870, 72, 74 passim.
Rabenberg, V. S., Ingersoll, C. D., Sandrey, M. A., & Johnson, M. T. (2002). The Bactericidal And Cytotoxic Effects Of Antimicrobial Wound Cleansers. Journal of Athletic Training, 37(1), 5154.
Schultz, G. S., Barillo, D. J., Mozingo, D. W., & Chin, G. A. (2004a). Wound bed preparation and a brief history of TIME. International wound journal, 1(1), 1932. doi:10.1111/j.1742-481x.2004.00008.x
Schultz, G. S., Barillo, D. J., Mozingo, D. W., & Chin, G. A. (2004b). Wound bed preparation and a brief history of TIME. International Wound Journal, 1(1), 1932. doi:10.1111/j.1742-481x.2004.00008.x
Schultz, G. S., Davidson, J. M., Kirsner, R. S., Bornstein, P., & Herman, I. M. (2011). Dynamic reciprocity in the wound microenvironment. Wound repair and regeneration: official publication of the Wound Healing
Society [and] the European Tissue Repair Society, 19(2), 134148. doi:10.1111/j.1524-475X.2011.00673.x
Schultz, G. S., & Dowsett, C. (2012). Wound bed preparation revisited. Wounds International, 3(1), 2529.
Schultz, G. S., Sibbald, R. G., Falanga, V., Ayello, E. A., Dowsett, C., Harding, K., Vanscheidt, W. (2003). Wound bed preparation: a systematic approach to wound management. Wound repair and regeneration: official publication of the Wound Healing Society [and] the European Tissue Repair Society, 11 Suppl 1, S128.
Sherman, R. A. (2009). Maggot therapy takes us back to the future of wound care: new and improved maggot therapy for the 21st century. Journal of diabetes science and technology, 3(2), 336344.
Sussman, C., & Bates-Jensen, B. M. (2007). Wound Care: A Collaborative Practice Manual. Lippincott Williams & Wilkins.
Wilson, J., Mills, J., Prather, I., & Dimitrijevich, S. D. (2005). A toxicity index of skin and wound cleansers used on in vitro fibroblasts and keratinocytes. Advances in Skin and Wound Care, 18(7), 373378.
Winter, G. D. (1962). Formation of the Scab and the Rate of Epithelization of Superficial Wounds in the Skin of the Young Domestic Pig. , Published online: 20 January 1962; | doi:10.1038/193293a0, 193(4812), 293294. doi:10.1038/193293a0.
Wolcott, R. D., Rumbaugh, K. P., James, G., Schultz, G., Phillips, P., Yang, Q., Dowd, S. E. (2010). Biofilm maturity studies indicate sharp debridement opens a time- dependent therapeutic window. Journal of wound care, 19(8), 320328.
This course is applicable for the following professions:
Advanced Registered Nurse Practitioner (ARNP), Clinical Nurse Specialist (CNS), Licensed Practical Nurse (LPN), Licensed Vocational Nurses (LVN), Registered Nurse (RN)
Advance Practice Nurse Pharmacology Credit, CPD: Practice Effectively, Geriatrics, Wound care | <urn:uuid:f45278f4-fbe9-4065-9110-d7a4766b58b0> | CC-MAIN-2016-22 | https://ceufast.com/course/wound-series-part-2-approaches-to-treating-chronic-wounds | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278091.17/warc/CC-MAIN-20160524002118-00062-ip-10-185-217-139.ec2.internal.warc.gz | en | 0.906516 | 14,959 | 2.890625 | 3 |
FOR IMMEDIATE RELEASE: Dec. 21, 2011
By Katherine H. Crawford, Office of Naval Research
ARLINGTON, Va.—The Department of the Navy continues its move toward renewable energy with an Office of Naval Research (ONR)-funded solar generator that recently entered full production, with several systems already in the field.
The Ground Renewable Expeditionary ENergy System (GREENS) is a portable, 300-watt, hybrid battery generator that uses the sun to produce electric currents. It was developed to provide Marines with continuous power in the field.
“This item significantly reduces the amount of fuel that has to be delivered, minimizing the number of warfighters on the roads, convoys and hazards, as well as the logistics expenses associated with distributing fuel,” said Cliff Anderson, logistics program officer in ONR’s Expeditionary Maneuver Warfare & Combating Terrorism Department. “That was really the objective: to get warfighters out of harm’s way and reduce the cost of transporting fuel.”
The system—which rapidly transitioned from ONR to Marine Corps Systems Command (MCSC) and then into production—provides Marines in remote locations with battery and plug-in power for charging various devices. Several small Marine Corps outposts have successfully used GREENS as their sole energy source. This is notable because transporting fuel to these remote locations is often challenging and expensive.
“Infantry battalions that are far forward do not have immediate access to a wide range of logistics and maintenance equipment; therefore, any source of power that requires no [military-grade fuel], low maintenance and no special skills to operate becomes an instant success,” said Maj Sean Sadlier, a logistics analyst with the Marine Corps Expeditionary Energy Office, who trained users on and tested GREENS in the field with India Company, 3rd Battalion, 5th Marine Regiment. Additionally, “GREENS is modular, portable, rugged and intuitive enough to deploy in a combat environment. Units trained on GREENS as part of pre-deployment training have provided positive feedback.”
GREENS supports the Marine Corps’ objective of generating all power needed for sustainment and command, control, communications, computers and intelligence equipment in place in the field by 2025. This vision, as laid out in the USMC Expeditionary Energy Strategy, aligns with the Marine Corps Vision and Strategy 2025. The goal is to enable Marines to travel more lightly and quickly by reducing the amount of fuel needed.
Naval Surface Warfare Center Carderock Division developed and tested the GREENS prototypes. Naval Air Warfare Center Weapons Division at China Lake assessed the final prototype, subjecting it to continuous power testing in temperatures exceeding 116 degrees Fahrenheit. Even under these conditions, GREENS worked at 85 percent capacity. This result exceeded expectations and led to an MCSC request that the product be rapidly developed and readied for acquisition.
About the Office of Naval Research
The Department of the Navy’s Office of Naval Research (ONR) provides the science and technology necessary to maintain the Navy and Marine Corps' technological advantage. Through its affiliates, ONR is a leader in science and technology with engagement in 50 states, 30 countries, 1,035 institutions of higher learning and more than 900 industry partners. ONR employs approximately 1,065 people, comprising uniformed, civilian and contract personnel, with additional employees at the Naval Research Lab in Washington, D.C. | <urn:uuid:9636b32c-2b13-4b57-8faf-44e768566fba> | CC-MAIN-2015-14 | http://www.onr.navy.mil/en/Media-Center/Press-Releases/2011/GREENS-renewable-energy-solar-power.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131302478.63/warc/CC-MAIN-20150323172142-00176-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.936885 | 707 | 2.703125 | 3 |
A new study has shown metformin—a glucose-lowering drug commonly used to treat diabetes—to be effective at lowering some measures of obesity in children and adolescents. The results of a systematic review and meta-analysis are published in Childhood Obesity.
The article entitled “Metformin Therapy Reduces Obesity Indices in Children and Adolescents: A Systematic Review and Meta-analysis of Randomized Clinical Trials” was coauthored by Alireza Milajerdi, Tehran University of Medical Sciences (Iran) and colleagues from Tehran University of Medical Sciences and University of Utah (Salt Lake City). The researchers searched the medical literature for randomized clinical trials that examined the effects of metformin use on obesity measures in children and adolescents. Overall, they found significant reductions in body mass index (BMI), body weight, waist circumference, and fat mass, but not in lean body mass. However, the reductions in BMI and waist circumference were not significant in the youngsters who were overweight or obese.
Source: Read Full Article | <urn:uuid:c1aad270-26d2-4d00-8c9c-2530cc8ccfa6> | CC-MAIN-2023-14 | https://bajaprogofficial.com/health-news/can-metformin-reduce-obesity-in-children-and-adolescents/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00724.warc.gz | en | 0.936003 | 210 | 3.140625 | 3 |
The commercial crew development (CCDev) programme, on which NASA has pinned its hopes for low Earth orbit (LEO), is entering a crucial period. The resolution required to fund NASA, which includes a specific line item for CCDev, faces continued challenges on the eve of its third and final round of awards.
After a display of sustained scepticism by influential members of the House Committee on Science and Technology on 26 October, the momentum behind CCDev is flagging in the face of budgetary pressures and competing programmes.
The major sticking point, publically at least, is the amount of money dedicated to the third and final round of CCDev, and just what capabilities will result. President Obama's budget request for NASA included $850 million for CCDev. The senate has appropriated only $500 million, and the house a mere $312 million. In contrast, the ill-defined Space Launch System is projected to cost upwards of $30 billion and would be significant overkill on CCDev missions; in any case, its predecessor programmes were cancelled for being far over budget and SLS may not escape that fate.
Buying Soyuz flights from Russia, currently the only method of transporting astronauts to the International Space Station (ISS), costs $450 million annually and requires a waiver from laws sanctioning Russia for trade with Syria and North Korea.
Space programmes, as a general rule, are not known for hewing to projected budgets or timeframes. Participants in CCDev are no exception: budgetary figures are seldom divulged, but each programme is at least two years behind the schedules initially proposed. While no company has suggested it will withdraw for budgetary reasons at the Wednesday hearing - and two companies, SpaceX and Sierra Nevada, have made clear they will press on regardless of government funds - the same cannot be said of other contenders.
Even the most supportive legislators in the 26 October hearing questioned the existence, much less the scale, of a LEO market outside NASA, despite the fact that a key argument in favour of CCDev was that commercial launches will make government launches less expensive. Though numerous studies show there is a market for things like tourism and scientific research, without CCDev money the business case largely evaporates, leaving only idealism.
Elon Musk, founder and CEO of SpaceX, is the most outwardly idealistic of the spacecraft builders - he has committed to build the Falcon series of rockets no matter what. Yet Musk suggested, after the 26 October hearing, that if NASA rules are too strict he may not bid for the third CCDev round.
CCDev now faces its most serious challenge - it must receive little enough money to avoid cancellation by legislators salivating at the chance, yet receive enough to keep companies interested. Both cancellation and lack of competition could result in monopoly, either for Russia or SpaceX. | <urn:uuid:5163b3a0-aba0-4eb4-9e2b-8b72c3198093> | CC-MAIN-2014-35 | http://www.flightglobal.com/news/articles/analysis-ccdev-walks-the-fine-line-363994/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826322.0/warc/CC-MAIN-20140820021346-00238-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.952818 | 576 | 2.640625 | 3 |
Am Sonntag, 8. Dezember 2013 02:28:10 UTC+1 schrieb Virgil:
> Note that for every n in |N there will be infinitely many rationals > > whose first n digits agree with d and only differ later.
Of course. This is a fact since every decimal representation of a number is nothing but the set of FIS. So up to every d_n there is a FIS. And a FIS is a rational number. > > > > So that there can never be any n such that. by digit n. d will differ > > from all rationals.
Simply because d has no complete decimal representation. > > > > Nevertheless any irrational, of which even WM admits there are > > infinitely many, will differ from every rational in infinitely many > > places.
No. It will differ from every "given" rational. But most rationals cannot be given, because only the tiny set of the first rationals is available to supply "given" rationals. Most rationals belong to the inaccessible set beyond any "given" one. | <urn:uuid:030c9b96-3da5-43e9-9aea-8780bb13d2bd> | CC-MAIN-2016-36 | http://mathforum.org/kb/message.jspa?messageID=9338077 | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983026851.98/warc/CC-MAIN-20160823201026-00053-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.921295 | 229 | 2.578125 | 3 |
Colombia's Oil War
The U'wa battle Occidental over "the blood
of Mother Earth"
by Ron Chepesiuk
Toward Freedom magazine, May 2001
In Colombia's northeast Norte de Santander province, the country's
richest oil region, an indigenous people known as the U'wa are
in a life and death struggle with Occidental Petroleum (OXY),
one of the world's largest multinational oil companies. It's been
going on since the early 1990s, when OXY began oil exploration
plans that threaten to destroy the tribe s culture and way of
life. The U'wa oppose oil drilling in their ancestral lands, saying
that oil is "the blood of Mother Earth" and therefore
must not be touched.
It's been an uphill battle for these indigenous people, given
the powerful corporate and government interests aligned against
them. Yet, their future became even more bleak last November,
when the Colombia Supreme Court gave OXY the green light to begin
drilling a long-awaited test well near the tribe's reservation.
The $40 million, 14,300-foot well was to be sunk in the first
half of this year.
While no one knows for sure what the test well will reveal,
OXY estimates that the region contains approximately 1.5 million
barrels of oil. The figure may seem like the makings of a huge
supply of oil, but, as OXY's critics have pointed out, that amount
will fill a mere three months of US oil needs.
Considerable money is at stake, especially for the Colombian
government. For example, Ecopetrel, the state-owned oil company,
is expected to receive as much as $900 million in additional taxes
and royalties annually-if the script goes according to plan. Increasingly
reliant on oil exports, since coffee is declining as a major source
of export earnings, the government doesn't want to lose the OXY
The money at stake has no doubt helped weigh the Colombian
system against the U'wa's interests. As the tribe has argued in
a prepared statement, "For our people, it's ominous and abusive
that the men of Occidental, along with the Colombian government,
program actions that injure and violate the cultural and territorial
principals of the U'wa and of the campesinos ... our brothers
who come with impartiality to support our cause."
The U'wa have played by the rules, seeking justice through
the Colombian judicial system. They've provided records documenting
their claims and showing that they have titles to land from the
Spanish Crown dating from 1661. The records also protect their
rights to subsoil minerals, including oil, they say.
A lower Colombian court decision did halt the oil exploration
on the grounds that the government violated the U'wa's constitutional
rights by not consulting them before granting OXY a license to
drill. However, a higher court overturned that ruling in May 2000.
In a meeting on March 30, 2000, with indigenous leaders and their
supporters, OXY Vice President Larry Meriage admitted that the
tribe wasn't consulted about his company's drilling plans.
The ruling has taken the U'wa back to square one in their
battle for survival. In August 1999, the Colombian government
signed an agreement with the U'wa expanding their borders from
61,000 to 220,000 hectares. But the U'wa have repeatedly maintained
that their sacred ancestral land extends beyond the limits of
the reservation. They oppose oil exploration anywhere within that
Nevertheless, a court ruling said that the Colombian government
didn't have to consult the U'wa before granting OXY a license
to drill, since the exploration was occurring outside the border
of their reserve. Meanwhile, the government has failed to turn
over any of the land that would expand their territory.
The National Indigenous Organization (ONIC), an umbrella group
of Colombian indigenous peoples, announced that it would take
the U'wa case to the country's Supreme
Court and international forums. A "mere legalism,"
responded Armando Valbuena, ONIC's president, when it was pointed
out that the test well was close to-but not in-the U'wa reserve.
"The fact that the Colombian government would allow the oil
well to endanger a people's survival shows that economic interests
prevail over the welfare of the indigenous peoples," Valbuena
Domestic and international support for the U'wa continues
to grow, coming from organizations ranging from US environmental
groups to the Green Party of Europe and guerrilla forces in Colombia.
Last year, in the months leading up to the US presidential election,
candidate A1 Gore became a main target. Gore's family owns stock
in OXY; getting the Gores to sell their shares would have been
a major coup for the U'wa and their supporters. The campaign caused
Gore some embarrassment, but the US media basically ignored it.
Amazon Watch, Rain Forest Action, and Project Underground
ran an ad in the New York Times, asking: "Who is Al Gore.
Environmental Champion or Petroleum Politician?" In July,
activists occupied Gore's campaign headquarters in Knoxville,
Tennessee. Two months later, 200 activists took over his Olympia
office and demanded that he accept responsibility for his role
in the OXY petroleum project.
Gore tried to ignore the heat, as well as a letter from the
U'wa. "We don't want to have to hold you responsible for
the destruction of our culture," they warned. "Your
silence signifies the death of planet Earth and consequently,
the possibility of life upon her."
In September, Stephano Boco, president of the Italian Green
Party, announced that the Green Party of Europe is ready to bring
the U'wa's case before the Hague Tribunal, and that Italian legislators
are prepared to set up a permanent residence in U'wa territory.
Colombia's second largest guerrilla group, the National Liberation
Army (ELN) has publicly expressed support for the U'wa, and has
repeatedly attacked construction and engineering equipment moved
into the test well site. The U'wa reject such actions as only
making their situation worse.
Targeting OXY's major investors has been the most successful
strategy employed so far. Last December, after an aggressive two-month
campaign by Rainforest Action Network, Amazon Watch, and other
environmental groups that focused attention on the Boston-based
Fidelity Investments and its relationship with OXY, the company
sold 60 percent of its OXY holdings, totaling $400 million.
The latest target is the largest institutional investor, the
Sanford Bernstein investment firm, and its parent company Alliance
Management, which owns 53 million shares valued at $1.19 billion.
Last December, U'wa supporters demonstrated outside the company's
San Francisco office, and U'wa leader Roberto Perez hand-delivered
a letter to the company.
Yet, after nearly nine years of struggle, the U'wa aren't
any closer to winning their battle. The tribe has threatened mass
suicide if OXY continues to violate the blood of their land. Its
not an idle threat. In the late 17th century, a group of U'wa
jumped to their deaths from a cliff to avoid submitting to the
authority of Spanish tax collectors and missionaries.
That could happen again. And as things currently stand, only
continued international support, along with intense pressure on
Occidental and the greedy corporate interests that back the multinational,
can help prevent it.
Contributing writer Ron Chepesiuk is a Rock Hill, SC-based
journalist. He is the author of The War on Drugs An International | <urn:uuid:e39cfb9a-33a9-45eb-8eb3-9350054bf2fa> | CC-MAIN-2019-18 | http://www.thirdworldtraveler.com/Oil_watch/Colombias_Oil_War.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578711882.85/warc/CC-MAIN-20190425074144-20190425100144-00069.warc.gz | en | 0.953778 | 1,648 | 2.875 | 3 |
India has 25 million neem trees but uses just five percent of their potential to kill pests. Together with other uses, as for instance, in cosmetics, about 17 percent of neem’s potential is extracted, says Y Ramdev, technical advisor to Renpap-Unido (or the Regional Network on Pesticides for Asia and the Pacific of the United National Industrial Development Organization).
Ramdev says Unido has standardized the traditional usages of neem so it can be taken to farmers who cannot afford to pay cash for chemical pest killers. The organization has promoted neem-based pesticides in ten states including Punjab, Maharashtra, West Bengal and Kerala.
Ramdev says China was woken up to neem and has planted 22 million trees. It has a big project for production and promotion of neem-based products. In Myanmar, up to 40 percent of neem’s potential is being used, Ramdev said. Laos, Cambodia, Malaysia and 12 African countries have taken to the tree. In Thailand it has created a cottage industry.
Though Ramdev is not against chemical pesticides, he says consumers prefer to avoid them in fruits and vegetables and are prepared to pay premium prices for those that have been treated with botanical pesticides.
Farmers can grow the tree for own use. This will bring down their cost of production and make agriculture less taxing on the environment. Ramdev was speaking at a conference on agro-chemicals hosted by Ficci, an industry chamber, in Delhi. | <urn:uuid:96c3cd29-bf6f-4f64-a98e-40c0fa5038b2> | CC-MAIN-2021-10 | https://www.smartindianagriculture.com/india-must-learn-from-china-use-its-25-m-neem-trees-to-control-pests-says-unido-adviser/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178366477.52/warc/CC-MAIN-20210303073439-20210303103439-00631.warc.gz | en | 0.958986 | 309 | 2.90625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.