text stringlengths 222 548k | id stringlengths 47 47 | dump stringclasses 95 values | url stringlengths 14 7.09k | file_path stringlengths 110 155 | language stringclasses 1 value | language_score float64 0.65 1 | token_count int64 53 113k | score float64 2.52 5.03 | int_score int64 3 5 |
|---|---|---|---|---|---|---|---|---|---|
The production of induced pluripotent stem cells (iPSCs) from somatic cells provides a means to create valuable tools for basic research and may also produce a source of patient-matched cells for regenerative therapies. iPSCs may be generated using multiple protocols and derived from multiple cell sources. Once generated, iPSCs are tested using a variety of assays including immunostaining for pluripotency markers, generation of three germ layers in embryoid bodies and teratomas, comparisons of gene expression with embryonic stem cells (ESCs) and production of chimeric mice with or without germline contribution2. Importantly, iPSC lines that pass these tests still vary in their capacity to produce different differentiated cell types2. This has made it difficult to establish which iPSC derivation protocols, donor cell sources or selection methods are most useful for different applications.
The most stringent test of whether a stem cell line has sufficient developmental potential to generate all tissues required for survival of an organism (termed full pluripotency) is tetraploid embryo complementation (TEC)3-5. Technically, TEC involves electrofusion of two-cell embryos to generate tetraploid (4n) one-cell embryos that can be cultured in vitro to the blastocyst stage6. Diploid (2n) pluripotent stem cells (e.g. ESCs or iPSCs) are then injected into the blastocoel cavity of the tetraploid blastocyst and transferred to a recipient female for gestation (see Figure 1). The tetraploid component of the complemented embryo contributes almost exclusively to the extraembryonic tissues (placenta, yolk sac), whereas the diploid cells constitute the embryo proper, resulting in a fetus derived entirely from the injected stem cell line.
Recently, we reported the derivation of iPSC lines that reproducibly generate adult mice via TEC1. These iPSC lines give rise to viable pups with efficiencies of 5-13%, which is comparable to ESCs3,4,7 and higher than that reported for most other iPSC lines8-12. These reports show that direct reprogramming can produce fully pluripotent iPSCs that match ESCs in their developmental potential and efficiency of generating pups in TEC tests. At present, it is not clear what distinguishes between fully pluripotent iPSCs and less potent lines13-15. Nor is it clear which reprogramming methods will produce these lines with the highest efficiency. Here we describe one method that produces fully pluripotent iPSCs and "all- iPSC" mice, which may be helpful for investigators wishing to compare the pluripotency of iPSC lines or establish the equivalence of different reprogramming methods.
20 Related JoVE Articles!
Detection of Neuritic Plaques in Alzheimer's Disease Mouse Model
Institutions: The University of British Columbia.
Alzheimer's disease (AD) is the most common neurodegenerative disorder leading to dementia. Neuritic plaque formation is one of the pathological hallmarks of Alzheimer's disease. The central component of neuritic plaques is a small filamentous protein called amyloid β protein (Aβ)1
, which is derived from sequential proteolytic cleavage of the beta-amyloid precursor protein (APP) by β-secretase and γ-secretase. The amyloid hypothesis entails that Aγ-containing plaques as the underlying toxic mechanism in AD pathology2
. The postmortem analysis of the presence of neuritic plaque confirms the diagnosis of AD. To further our understanding of Aγ neurobiology in AD pathogenesis, various mouse strains expressing AD-related mutations in the human APP genes were generated. Depending on the severity of the disease, these mice will develop neuritic plaques at different ages. These mice serve as invaluable tools for studying the pathogenesis and drug development that could affect the APP processing pathway and neuritic plaque formation. In this protocol, we employ an immunohistochemical method for specific detection of neuritic plaques in AD model mice. We will specifically discuss the preparation from extracting the half brain, paraformaldehyde fixation, cryosectioning, and two methods to detect neurotic plaques in AD transgenic mice: immunohistochemical detection using the ABC and DAB method and fluorescent detection using thiofalvin S staining method.
Neuroscience, Issue 53, Alzheimer’s disease, neuritic plaques, Amyloid β protein, APP, transgenic mouse
Identification of Sleeping Beauty Transposon Insertions in Solid Tumors using Linker-mediated PCR
Institutions: University of Minnesota, Minneapolis, University of Minnesota, Minneapolis.
Genomic, proteomic, transcriptomic, and epigenomic analyses of human tumors indicate that there are thousands of anomalies within each cancer genome compared to matched normal tissue. Based on these analyses it is evident that there are many undiscovered genetic drivers of cancer1
. Unfortunately these drivers are hidden within a much larger number of passenger anomalies in the genome that do not directly contribute to tumor formation. Another aspect of the cancer genome is that there is considerable genetic heterogeneity within similar tumor types. Each tumor can harbor different mutations that provide a selective advantage for tumor formation2
. Performing an unbiased forward genetic screen in mice provides the tools to generate tumors and analyze their genetic composition, while reducing the background of passenger mutations. The Sleeping Beauty
(SB) transposon system is one such method3
. The SB system utilizes mobile vectors (transposons) that can be inserted throughout the genome by the transposase enzyme. Mutations are limited to a specific cell type through the use of a conditional transposase allele that is activated by Cre Recombinase
. Many mouse lines exist that express Cre Recombinase
in specific tissues. By crossing one of these lines to the conditional transposase allele (e.g.
Lox-stop-Lox-SB11), the SB system is activated only in cells that express Cre Recombinase
. The Cre Recombinase
will excise a stop cassette that blocks expression of the transposase allele, thereby activating transposon mutagenesis within the designated cell type. An SB screen is initiated by breeding three strains of transgenic mice so that the experimental mice carry a conditional transposase allele, a concatamer of transposons, and a tissue-specific Cre Recombinase
allele. These mice are allowed to age until tumors form and they become moribund. The mice are then necropsied and genomic DNA is isolated from the tumors. Next, the genomic DNA is subjected to linker-mediated-PCR (LM-PCR) that results in amplification of genomic loci containing an SB transposon. LM-PCR performed on a single tumor will result in hundreds of distinct amplicons representing the hundreds of genomic loci containing transposon insertions in a single tumor4
. The transposon insertions in all tumors are analyzed and common insertion sites (CISs) are identified using an appropriate statistical method5
. Genes within the CIS are highly likely to be oncogenes or tumor suppressor genes, and are considered candidate cancer genes. The advantages of using the SB system to identify candidate cancer genes are: 1) the transposon can easily be located in the genome because its sequence is known, 2) transposition can be directed to almost any cell type and 3) the transposon is capable of introducing both gain- and loss-of-function mutations6
. The following protocol describes how to devise and execute a forward genetic screen using the SB transposon system to identify candidate cancer genes (Figure 1
Genetics, Issue 72, Medicine, Cancer Biology, Biomedical Engineering, Genomics, Mice, Genetic Techniques, life sciences, animal models, Neoplasms, Genetic Phenomena, Forward genetic screen, cancer drivers, mouse models, oncogenes, tumor suppressor genes, Sleeping Beauty transposons, insertions, DNA, PCR, animal model
Dissection of Saccharomyces Cerevisiae Asci
Institutions: Concordia University.
Yeast is a highly tractable model system that is used to study many different cellular processes. The common laboratory strain Saccharomyces cerevisiae
exists in either a haploid or diploid state. The ability to combine alleles from two haploids and the ability to introduce modifications to the genome requires the production and dissection of asci. Asci production from haploid cells begins with the mating of two yeast haploid strains with compatible mating types to produce a diploid strain. This can be accomplished in a number of ways either on solid medium or in liquid. It is advantageous to select for the diploids in medium that selectively promotes their growth compared to either of the haploid strains. The diploids are then allowed to sporulate on nutrient-poor medium to form asci, a bundle of four haploid daughter cells resulting from meiotic reproduction of the diploid. A mixture of vegetative cells and asci is then treated with the enzyme zymolyase to digest away the membrane sac surrounding the ascospores of the asci. Using micromanipulation with a microneedle under a dissection microscope one can pick up individual asci and separate and relocate the four ascopores. Dissected asci are grown for several days and tested for the markers or alleles of interest by replica plating onto appropriate selective media.
Cellular Biology, Issue 27, asci, ascospores, diploid, zygote, sporulation, yeast dissection, micromanipulator
Spheroid Assay to Measure TGF-β-induced Invasion
Institutions: Leiden University Medical Centre.
TGF-β has opposing roles in breast cancer progression by acting as a tumor suppressor in the initial phase, but stimulating invasion and metastasis at later stage1,2
. Moreover, TGF-β is frequently overexpressed in breast cancer and its expression correlates with poor prognosis and metastasis 3,4
. The mechanisms by which TGF-β induces invasion are not well understood.
TGF-β elicits its cellular responses via TGF-β type II (TβRII) and type I (TβRI) receptors. Upon TGF-β-induced heteromeric complex formation, TβRII phosphorylates the TβRI. The activated TβRI initiates its intracellular canonical signaling pathway by phosphorylating receptor Smads (R-Smads), i.e. Smad2 and Smad3. These activated R-Smads form heteromeric complexes with Smad4, which accumulate in the nucleus and regulate the transcription of target genes5
. In addition to the previously described Smad pathway, receptor activation results in activation of several other non-Smad signaling pathways, for example Mitogen Activated Protein Kinase (MAPK) pathways6
To study the role of TGF-β in different stages of breast cancer, we made use of the MCF10A cell system. This system consists of spontaneously immortalized MCF10A1 (M1) breast epithelial cells7
, the H-RAS transformed M1-derivative MCF10AneoT (M2), which produces premalignant lesions in mice8
, and the M2-derivative MCF10CA1a (M4), which was established from M2 xenografts and forms high grade carcinomas with the ability to metastasize to the lung9
. This MCF10A series offers the possibility to study the responses of cells with different grades of malignancy that are not biased by a different genetic background.
For the analysis of TGF-β-induced invasion, we generated homotypic MCF10A spheroid cell cultures embedded in a 3D collagen matrix in vitro
(Fig 1). Such models closely resemble human tumors in vivo
by establishing a gradient of oxygen and nutrients, resulting in active and invasive cells on the outside and quiescent or even necrotic cells in the inside of the spheroid10
. Spheroid based assays have also been shown to better recapitulate drug resistance than monolayer cultures11
. This MCF10 3D model system allowed us to investigate the impact of TGF-β signaling on the invasive properties of breast cells in different stages of malignancy.
Medicine, Issue 57, TGF-β, TGF, breast cancer, assay, invasion, collagen, spheroids, oncology
Isolation of Cellular Lipid Droplets: Two Purification Techniques Starting from Yeast Cells and Human Placentas
Institutions: University of Tennessee, University of Tennessee.
Lipid droplets are dynamic organelles that can be found in most eukaryotic and certain prokaryotic cells. Structurally, the droplets consist of a core of neutral lipids surrounded by a phospholipid monolayer. One of the most useful techniques in determining the cellular roles of droplets has been proteomic identification of bound proteins, which can be isolated along with the droplets. Here, two methods are described to isolate lipid droplets and their bound proteins from two wide-ranging eukaryotes: fission yeast and human placental villous cells. Although both techniques have differences, the main method - density gradient centrifugation - is shared by both preparations. This shows the wide applicability of the presented droplet isolation techniques.
In the first protocol, yeast cells are converted into spheroplasts by enzymatic digestion of their cell walls. The resulting spheroplasts are then gently lysed in a loose-fitting homogenizer. Ficoll is added to the lysate to provide a density gradient, and the mixture is centrifuged three times. After the first spin, the lipid droplets are localized to the white-colored floating layer of the centrifuge tubes along with the endoplasmic reticulum (ER), the plasma membrane, and vacuoles. Two subsequent spins are used to remove these other three organelles. The result is a layer that has only droplets and bound proteins.
In the second protocol, placental villous cells are isolated from human term placentas by enzymatic digestion with trypsin and DNase I. The cells are homogenized in a loose-fitting homogenizer. Low-speed and medium-speed centrifugation steps are used to remove unbroken cells, cellular debris, nuclei, and mitochondria. Sucrose is added to the homogenate to provide a density gradient and the mixture is centrifuged to separate the lipid droplets from the other cellular fractions.
The purity of the lipid droplets in both protocols is confirmed by Western Blot analysis. The droplet fractions from both preps are suitable for subsequent proteomic and lipidomic analysis.
Bioengineering, Issue 86, Lipid droplet, lipid body, fat body, oil body, Yeast, placenta, placental villous cells, isolation, purification, density gradient centrifugation
Competitive Genomic Screens of Barcoded Yeast Libraries
Institutions: University of Toronto, University of Toronto, University of Toronto, National Human Genome Research Institute, NIH, Stanford University , University of Toronto.
By virtue of advances in next generation sequencing technologies, we have access to new genome sequences almost daily. The tempo of these advances is accelerating, promising greater depth and breadth. In light of these extraordinary advances, the need for fast, parallel methods to define gene function becomes ever more important. Collections of genome-wide deletion mutants in yeasts and E. coli
have served as workhorses for functional characterization of gene function, but this approach is not scalable, current gene-deletion approaches require each of the thousands of genes that comprise a genome to be deleted and verified. Only after this work is complete can we pursue high-throughput phenotyping. Over the past decade, our laboratory has refined a portfolio of competitive, miniaturized, high-throughput genome-wide assays that can be performed in parallel. This parallelization is possible because of the inclusion of DNA 'tags', or 'barcodes,' into each mutant, with the barcode serving as a proxy for the mutation and one can measure the barcode abundance to assess mutant fitness. In this study, we seek to fill the gap between DNA sequence and barcoded mutant collections. To accomplish this we introduce a combined transposon disruption-barcoding approach that opens up parallel barcode assays to newly sequenced, but poorly characterized microbes. To illustrate this approach we present a new Candida albicans
barcoded disruption collection and describe how both microarray-based and next generation sequencing-based platforms can be used to collect 10,000 - 1,000,000 gene-gene and drug-gene interactions in a single experiment.
Biochemistry, Issue 54, chemical biology, chemogenomics, chemical probes, barcode microarray, next generation sequencing
Polymerase Chain Reaction: Basic Protocol Plus Troubleshooting and Optimization Strategies
Institutions: University of California, Los Angeles .
In the biological sciences there have been technological advances that catapult the discipline into golden ages of discovery. For example, the field of microbiology was transformed with the advent of Anton van Leeuwenhoek's microscope, which allowed scientists to visualize prokaryotes for the first time. The development of the polymerase chain reaction (PCR) is one of those innovations that changed the course of molecular science with its impact spanning countless subdisciplines in biology. The theoretical process was outlined by Keppe and coworkers in 1971; however, it was another 14 years until the complete PCR procedure was described and experimentally applied by Kary Mullis while at Cetus Corporation in 1985. Automation and refinement of this technique progressed with the introduction of a thermal stable DNA polymerase from the bacterium Thermus aquaticus
, consequently the name Taq
PCR is a powerful amplification technique that can generate an ample supply of a specific segment of DNA (i.e., an amplicon) from only a small amount of starting material (i.e., DNA template or target sequence). While straightforward and generally trouble-free, there are pitfalls that complicate the reaction producing spurious results. When PCR fails it can lead to many non-specific DNA products of varying sizes that appear as a ladder or smear of bands on agarose gels. Sometimes no products form at all. Another potential problem occurs when mutations are unintentionally introduced in the amplicons, resulting in a heterogeneous population of PCR products. PCR failures can become frustrating unless patience and careful troubleshooting are employed to sort out and solve the problem(s). This protocol outlines the basic principles of PCR, provides a methodology that will result in amplification of most target sequences, and presents strategies for optimizing a reaction. By following this PCR guide, students should be able to:
● Set up reactions and thermal cycling conditions for a conventional PCR experiment
● Understand the function of various reaction components and their overall effect on a PCR experiment
● Design and optimize a PCR experiment for any DNA template
● Troubleshoot failed PCR experiments
Basic Protocols, Issue 63, PCR, optimization, primer design, melting temperature, Tm, troubleshooting, additives, enhancers, template DNA quantification, thermal cycler, molecular biology, genetics
Generation of Enterobacter sp. YSU Auxotrophs Using Transposon Mutagenesis
Institutions: Youngstown State University.
Prototrophic bacteria grow on M-9 minimal salts medium supplemented with glucose (M-9 medium), which is used as a carbon and energy source. Auxotrophs can be generated using a transposome. The commercially available, Tn5
-derived transposome used in this protocol consists of a linear segment of DNA containing an R6Kγ
replication origin, a gene for kanamycin resistance and two mosaic sequence ends, which serve as transposase binding sites. The transposome, provided as a DNA/transposase protein complex, is introduced by electroporation into the prototrophic strain, Enterobacter
sp. YSU, and randomly incorporates itself into this host’s genome. Transformants are replica plated onto Luria-Bertani agar plates containing kanamycin, (LB-kan) and onto M-9 medium agar plates containing kanamycin (M-9-kan). The transformants that grow on LB-kan plates but not on M-9-kan plates are considered to be auxotrophs. Purified genomic DNA from an auxotroph is partially digested, ligated and transformed into a pir+ Escherichia coli
) strain. The R6Kγ
replication origin allows the plasmid to replicate in pir+ E. coli
strains, and the kanamycin resistance marker allows for plasmid selection. Each transformant possesses a new plasmid containing the transposon flanked by the interrupted chromosomal region. Sanger sequencing and the Basic Local Alignment Search Tool (BLAST) suggest a putative identity of the interrupted gene. There are three advantages to using this transposome mutagenesis strategy. First, it does not rely on the expression of a transposase gene by the host. Second, the transposome is introduced into the target host by electroporation, rather than by conjugation or by transduction and therefore is more efficient. Third, the R6Kγ
replication origin makes it easy to identify the mutated gene which is partially recovered in a recombinant plasmid. This technique can be used to investigate the genes involved in other characteristics of Enterobacter
sp. YSU or of a wider variety of bacterial strains.
Microbiology, Issue 92, Auxotroph, transposome, transposon, mutagenesis, replica plating, glucose minimal medium, complex medium, Enterobacter
A Restriction Enzyme Based Cloning Method to Assess the In vitro Replication Capacity of HIV-1 Subtype C Gag-MJ4 Chimeric Viruses
Institutions: Emory University, Emory University.
The protective effect of many HLA class I alleles on HIV-1 pathogenesis and disease progression is, in part, attributed to their ability to target conserved portions of the HIV-1 genome that escape with difficulty. Sequence changes attributed to cellular immune pressure arise across the genome during infection, and if found within conserved regions of the genome such as Gag, can affect the ability of the virus to replicate in vitro
. Transmission of HLA-linked polymorphisms in Gag to HLA-mismatched recipients has been associated with reduced set point viral loads. We hypothesized this may be due to a reduced replication capacity of the virus. Here we present a novel method for assessing the in vitro
replication of HIV-1 as influenced by the gag
gene isolated from acute time points from subtype C infected Zambians. This method uses restriction enzyme based cloning to insert the gag
gene into a common subtype C HIV-1 proviral backbone, MJ4. This makes it more appropriate to the study of subtype C sequences than previous recombination based methods that have assessed the in vitro
replication of chronically derived gag-pro
sequences. Nevertheless, the protocol could be readily modified for studies of viruses from other subtypes. Moreover, this protocol details a robust and reproducible method for assessing the replication capacity of the Gag-MJ4 chimeric viruses on a CEM-based T cell line. This method was utilized for the study of Gag-MJ4 chimeric viruses derived from 149 subtype C acutely infected Zambians, and has allowed for the identification of residues in Gag that affect replication. More importantly, the implementation of this technique has facilitated a deeper understanding of how viral replication defines parameters of early HIV-1 pathogenesis such as set point viral load and longitudinal CD4+ T cell decline.
Infectious Diseases, Issue 90, HIV-1, Gag, viral replication, replication capacity, viral fitness, MJ4, CEM, GXR25
A Manual Small Molecule Screen Approaching High-throughput Using Zebrafish Embryos
Institutions: University of Notre Dame.
Zebrafish have become a widely used model organism to investigate the mechanisms that underlie developmental biology and to study human disease pathology due to their considerable degree of genetic conservation with humans. Chemical genetics entails testing the effect that small molecules have on a biological process and is becoming a popular translational research method to identify therapeutic compounds. Zebrafish are specifically appealing to use for chemical genetics because of their ability to produce large clutches of transparent embryos, which are externally fertilized. Furthermore, zebrafish embryos can be easily drug treated by the simple addition of a compound to the embryo media. Using whole-mount in situ
hybridization (WISH), mRNA expression can be clearly visualized within zebrafish embryos. Together, using chemical genetics and WISH, the zebrafish becomes a potent whole organism context in which to determine the cellular and physiological effects of small molecules. Innovative advances have been made in technologies that utilize machine-based screening procedures, however for many labs such options are not accessible or remain cost-prohibitive. The protocol described here explains how to execute a manual high-throughput chemical genetic screen that requires basic resources and can be accomplished by a single individual or small team in an efficient period of time. Thus, this protocol provides a feasible strategy that can be implemented by research groups to perform chemical genetics in zebrafish, which can be useful for gaining fundamental insights into developmental processes, disease mechanisms, and to identify novel compounds and signaling pathways that have medically relevant applications.
Developmental Biology, Issue 93, zebrafish, chemical genetics, chemical screen, in vivo small molecule screen, drug discovery, whole mount in situ hybridization (WISH), high-throughput screening (HTS), high-content screening (HCS)
Morris Water Maze Test for Learning and Memory Deficits in Alzheimer's Disease Model Mice
Institutions: University of British Columbia.
The Morris Water Maze (MWM) was first established by neuroscientist Richard G. Morris in 1981 in order to test hippocampal-dependent learning, including acquisition of spatial memoryand long-term spatial memory 1
. The MWM is a relatively simple procedure typically consisting of six day trials, the main advantage being the differentiation between the spatial (hidden-platform) and non-spatial (visible platform) conditions 2-4
. In addition, the MWM testing environment reduces odor trail interference 5
. This has led the task to be used extensively in the study of the neurobiology and neuropharmacology of spatial learning and memory. The MWM plays an important role in the validation of rodent models for neurocognitive disorders such as Alzheimer’s Disease 6, 7
. In this protocol we discussed the typical procedure of MWM for testing learning and memory and data analysis commonly used in Alzheimer’s disease transgenic model mice.
Neuroscience, Issue 53, Morris Water Maze, spatial memory testing, hippocampal dependent learning, Alzheimer's Disease
Clinical Application of Sleeping Beauty and Artificial Antigen Presenting Cells to Genetically Modify T Cells from Peripheral and Umbilical Cord Blood
Institutions: U.T. MD Anderson Cancer Center, U.T. MD Anderson Cancer Center.
The potency of clinical-grade T cells can be improved by combining gene therapy with immunotherapy to engineer a biologic product with the potential for superior (i) recognition of tumor-associated antigens (TAAs), (ii) persistence after infusion, (iii) potential for migration to tumor sites, and (iv) ability to recycle effector functions within the tumor microenvironment. Most approaches to genetic manipulation of T cells engineered for human application have used retrovirus and lentivirus for the stable expression of CAR1-3
. This approach, although compliant with current good manufacturing practice (GMP), can be expensive as it relies on the manufacture and release of clinical-grade recombinant virus from a limited number of production facilities. The electro-transfer of nonviral plasmids is an appealing alternative to transduction since DNA species can be produced to clinical grade at approximately 1/10th
the cost of recombinant GMP-grade virus. To improve the efficiency of integration we adapted Sleeping Beauty
(SB) transposon and transposase for human application4-8
. Our SB system uses two DNA plasmids that consist of a transposon coding for a gene of interest (e.g.
generation CD19-specific CAR transgene, designated CD19RCD28) and a transposase (e.g.
SB11) which inserts the transgene into TA dinucleotide repeats9-11
. To generate clinically-sufficient numbers of genetically modified T cells we use K562-derived artificial antigen presenting cells (aAPC) (clone #4) modified to express a TAA (e.g.
CD19) as well as the T cell costimulatory molecules CD86, CD137L, a membrane-bound version of interleukin (IL)-15 (peptide fused to modified IgG4 Fc region) and CD64 (Fc-γ receptor 1) for the loading of monoclonal antibodies (mAb)12
. In this report, we demonstrate the procedures that can be undertaken in compliance with cGMP to generate CD19-specific CAR+
T cells suitable for human application. This was achieved by the synchronous electro-transfer of two DNA plasmids, a SB transposon (CD19RCD28) and a SB transposase (SB11) followed by retrieval of stable integrants by the every-7-day additions (stimulation cycle) of γ-irradiated aAPC (clone #4) in the presence of soluble recombinant human IL-2 and IL-2113
. Typically 4 cycles (28 days of continuous culture) are undertaken to generate clinically-appealing numbers of T cells that stably express the CAR. This methodology to manufacturing clinical-grade CD19-specific T cells can be applied to T cells derived from peripheral blood (PB) or umbilical cord blood (UCB). Furthermore, this approach can be harnessed to generate T cells to diverse tumor types by pairing the specificity of the introduced CAR with expression of the TAA, recognized by the CAR, on the aAPC.
Immunology, Issue 72, Cellular Biology, Medicine, Molecular Biology, Cancer Biology, Biomedical Engineering, Hematology, Biochemistry, Genetics, T-Lymphocytes, Antigen-Presenting Cells, Leukemia, Lymphoid, Lymphoma, Antigens, CD19, Immunotherapy, Adoptive, Electroporation, Genetic Engineering, Gene Therapy, Sleeping Beauty, CD19, T cells, Chimeric Antigen Receptor, Artificial Antigen Presenting Cells, Clinical Trial, Peripheral Blood, Umbilical Cord Blood, Cryopreservation, Electroporation
The Green Monster Process for the Generation of Yeast Strains Carrying Multiple Gene Deletions
Institutions: J. Craig Venter Institute, J. Craig Venter Institute, University of Toronto, Mt Sinai Hospital.
Phenotypes for a gene deletion are often revealed only when the mutation is tested in a particular genetic background or environmental condition1,2
. There are examples where many genes need to be deleted to unmask hidden gene functions3,4
. Despite the potential for important discoveries, genetic interactions involving three or more genes are largely unexplored. Exhaustive searches of multi-mutant interactions would be impractical due to the sheer number of possible combinations of deletions. However, studies of selected sets of genes, such as sets of paralogs with a greater a priori
chance of sharing a common function, would be informative.
In the yeast Saccharomyces cerevisiae
, gene knockout is accomplished by replacing a gene with a selectable marker via homologous recombination. Because the number of markers is limited, methods have been developed for removing and reusing the same marker5,6,7,8,9,10
. However, sequentially engineering multiple mutations using these methods is time-consuming because the time required scales linearly with the number of deletions to be generated.
Here we describe the Green Monster method for routinely engineering multiple deletions in yeast11
. In this method, a green fluorescent protein (GFP) reporter integrated into deletions is used to quantitatively label strains according to the number of deletions contained in each strain (Figure 1
). Repeated rounds of assortment of GFP-marked deletions via yeast mating and meiosis coupled with flow-cytometric enrichment of strains carrying more of these deletions lead to the accumulation of deletions in strains (Figure 2
). Performing multiple processes in parallel, with each process incorporating one or more deletions per round, reduces the time required for strain construction.
The first step is to prepare haploid single-mutants termed 'ProMonsters,' each of which carries a GFP reporter in a deleted locus and one of the 'toolkit' loci—either Green Monster GMToolkit-a
or GMToolkit-α at the can1Δ
locus (Figure 3
). Using strains from the yeast deletion collection12
, GFP-marked deletions can be conveniently generated by replacing the common KanMX4
cassette existing in these strains with a universal GFP
fragment. Each GMToolkit contains: either the a
- or α-mating-type-specific haploid selection marker1
and exactly one of the two markers that, when both GMToolkits are present, collectively allow for selection of diploids.
The second step is to carry out the sexual cycling through which deletion loci can be combined within a single cell by the random assortment and/or meiotic recombination that accompanies each cycle of mating and sporulation.
Microbiology, Issue 70, Genetics, Synthetic Biology, Environmental Genomics, Genomics, Bioengineering, Biomedical Engineering, Cellular Biology, Multi-site genomic engineering, genetic interaction, green fluorescent protein, GFP, flow cytometry, Saccharomyces cerevisiae, yeast, Green Monster
Mapping Bacterial Functional Networks and Pathways in Escherichia Coli using Synthetic Genetic Arrays
Institutions: University of Toronto, University of Toronto, University of Regina.
Phenotypes are determined by a complex series of physical (e.g.
protein-protein) and functional (e.g.
gene-gene or genetic) interactions (GI)1
. While physical interactions can indicate which bacterial proteins are associated as complexes, they do not necessarily reveal pathway-level functional relationships1. GI screens, in which the growth of double mutants bearing two deleted or inactivated genes is measured and compared to the corresponding single mutants, can illuminate epistatic dependencies between loci and hence provide a means to query and discover novel functional relationships2
. Large-scale GI maps have been reported for eukaryotic organisms like yeast3-7
, but GI information remains sparse for prokaryotes8
, which hinders the functional annotation of bacterial genomes. To this end, we and others have developed high-throughput quantitative bacterial GI screening methods9, 10
Here, we present the key steps required to perform quantitative E. coli
Synthetic Genetic Array (eSGA) screening procedure on a genome-scale9
, using natural bacterial conjugation and homologous recombination to systemically generate and measure the fitness of large numbers of double mutants in a colony array format.
Briefly, a robot is used to transfer, through conjugation, chloramphenicol (Cm) - marked mutant alleles from engineered Hfr (High frequency of recombination) 'donor strains' into an ordered array of kanamycin (Kan) - marked F- recipient strains. Typically, we use loss-of-function single mutants bearing non-essential gene deletions (e.g.
the 'Keio' collection11
) and essential gene hypomorphic mutations (i.e.
alleles conferring reduced protein expression, stability, or activity9, 12, 13
) to query the functional associations of non-essential and essential genes, respectively. After conjugation and ensuing genetic exchange mediated by homologous recombination, the resulting double mutants are selected on solid medium containing both antibiotics. After outgrowth, the plates are digitally imaged and colony sizes are quantitatively scored using an in-house automated image processing system14
. GIs are revealed when the growth rate of a double mutant is either significantly better or worse than expected9
. Aggravating (or negative) GIs often result between loss-of-function mutations in pairs of genes from compensatory pathways that impinge on the same essential process2
. Here, the loss of a single gene is buffered, such that either single mutant is viable. However, the loss of both pathways is deleterious and results in synthetic lethality or sickness (i.e.
slow growth). Conversely, alleviating (or positive) interactions can occur between genes in the same pathway or protein complex2
as the deletion of either gene alone is often sufficient to perturb the normal function of the pathway or complex such that additional perturbations do not reduce activity, and hence growth, further. Overall, systematically identifying and analyzing GI networks can provide unbiased, global maps of the functional relationships between large numbers of genes, from which pathway-level information missed by other approaches can be inferred9
Genetics, Issue 69, Molecular Biology, Medicine, Biochemistry, Microbiology, Aggravating, alleviating, conjugation, double mutant, Escherichia coli, genetic interaction, Gram-negative bacteria, homologous recombination, network, synthetic lethality or sickness, suppression
Aseptic Laboratory Techniques: Plating Methods
Institutions: University of California, Los Angeles .
Microorganisms are present on all inanimate surfaces creating ubiquitous sources of possible contamination in the laboratory. Experimental success relies on the ability of a scientist to sterilize work surfaces and equipment as well as prevent contact of sterile instruments and solutions with non-sterile surfaces. Here we present the steps for several plating methods routinely used in the laboratory to isolate, propagate, or enumerate microorganisms such as bacteria and phage. All five methods incorporate aseptic technique, or procedures that maintain the sterility of experimental materials. Procedures described include (1) streak-plating bacterial cultures to isolate single colonies, (2) pour-plating and (3) spread-plating to enumerate viable bacterial colonies, (4) soft agar overlays to isolate phage and enumerate plaques, and (5) replica-plating to transfer cells from one plate to another in an identical spatial pattern. These procedures can be performed at the laboratory bench, provided they involve non-pathogenic strains of microorganisms (Biosafety Level 1, BSL-1). If working with BSL-2 organisms, then these manipulations must take place in a biosafety cabinet. Consult the most current edition of the Biosafety in Microbiological and Biomedical Laboratories
(BMBL) as well as Material Safety Data Sheets
(MSDS) for Infectious Substances to determine the biohazard classification as well as the safety precautions and containment facilities required for the microorganism in question. Bacterial strains and phage stocks can be obtained from research investigators, companies, and collections maintained by particular organizations such as the American Type Culture Collection
(ATCC). It is recommended that non-pathogenic strains be used when learning the various plating methods. By following the procedures described in this protocol, students should be able to:
● Perform plating procedures without contaminating media.
● Isolate single bacterial colonies by the streak-plating method.
● Use pour-plating and spread-plating methods to determine the concentration of bacteria.
● Perform soft agar overlays when working with phage.
● Transfer bacterial cells from one plate to another using the replica-plating procedure.
● Given an experimental task, select the appropriate plating method.
Basic Protocols, Issue 63, Streak plates, pour plates, soft agar overlays, spread plates, replica plates, bacteria, colonies, phage, plaques, dilutions
Genetic Manipulation in Δku80 Strains for Functional Genomic Analysis of Toxoplasma gondii
Institutions: The Geisel School of Medicine at Dartmouth.
Targeted genetic manipulation using homologous recombination is the method of choice for functional genomic analysis to obtain a detailed view of gene function and phenotype(s). The development of mutant strains with targeted gene deletions, targeted mutations, complemented gene function, and/or tagged genes provides powerful strategies to address gene function, particularly if these genetic manipulations can be efficiently targeted to the gene locus of interest using integration mediated by double cross over homologous recombination.
Due to very high rates of nonhomologous recombination, functional genomic analysis of Toxoplasma gondii
has been previously limited by the absence of efficient methods for targeting gene deletions and gene replacements to specific genetic loci. Recently, we abolished the major pathway of nonhomologous recombination in type I and type II strains of T. gondii
by deleting the gene encoding the KU80 protein1,2
. The Δku80
strains behave normally during tachyzoite (acute) and bradyzoite (chronic) stages in vitro
and in vivo
and exhibit essentially a 100% frequency of homologous recombination. The Δku80
strains make functional genomic studies feasible on the single gene as well as on the genome scale1-4
Here, we report methods for using type I and type II Δku80Δhxgprt
strains to advance gene targeting approaches in T. gondii
. We outline efficient methods for generating gene deletions, gene replacements, and tagged genes by targeted insertion or deletion of the hypoxanthine-xanthine-guanine phosphoribosyltransferase (HXGPRT
) selectable marker. The described gene targeting protocol can be used in a variety of ways in Δku80
strains to advance functional analysis of the parasite genome and to develop single strains that carry multiple targeted genetic manipulations. The application of this genetic method and subsequent phenotypic assays will reveal fundamental and unique aspects of the biology of T. gondii
and related significant human pathogens that cause malaria (Plasmodium
sp.) and cryptosporidiosis (Cryptosporidium
Infectious Diseases, Issue 77, Genetics, Microbiology, Infection, Medicine, Immunology, Molecular Biology, Cellular Biology, Biomedical Engineering, Bioengineering, Genomics, Parasitology, Pathology, Apicomplexa, Coccidia, Toxoplasma, Genetic Techniques, Gene Targeting, Eukaryota, Toxoplasma gondii, genetic manipulation, gene targeting, gene deletion, gene replacement, gene tagging, homologous recombination, DNA, sequencing
Combining Magnetic Sorting of Mother Cells and Fluctuation Tests to Analyze Genome Instability During Mitotic Cell Aging in Saccharomyces cerevisiae
Institutions: Rensselaer Polytechnic Institute.
has been an excellent model system for examining mechanisms and consequences of genome instability. Information gained from this yeast model is relevant to many organisms, including humans, since DNA repair and DNA damage response factors are well conserved across diverse species. However, S. cerevisiae
has not yet been used to fully address whether the rate of accumulating mutations changes with increasing replicative (mitotic) age due to technical constraints. For instance, measurements of yeast replicative lifespan through micromanipulation involve very small populations of cells, which prohibit detection of rare mutations. Genetic methods to enrich for mother cells in populations by inducing death of daughter cells have been developed, but population sizes are still limited by the frequency with which random mutations that compromise the selection systems occur. The current protocol takes advantage of magnetic sorting of surface-labeled yeast mother cells to obtain large enough populations of aging mother cells to quantify rare mutations through phenotypic selections. Mutation rates, measured through fluctuation tests, and mutation frequencies are first established for young cells and used to predict the frequency of mutations in mother cells of various replicative ages. Mutation frequencies are then determined for sorted mother cells, and the age of the mother cells is determined using flow cytometry by staining with a fluorescent reagent that detects bud scars formed on their cell surfaces during cell division. Comparison of predicted mutation frequencies based on the number of cell divisions to the frequencies experimentally observed for mother cells of a given replicative age can then identify whether there are age-related changes in the rate of accumulating mutations. Variations of this basic protocol provide the means to investigate the influence of alterations in specific gene functions or specific environmental conditions on mutation accumulation to address mechanisms underlying genome instability during replicative aging.
Microbiology, Issue 92, Aging, mutations, genome instability, Saccharomyces cerevisiae, fluctuation test, magnetic sorting, mother cell, replicative aging
Quantitative Live Cell Fluorescence-microscopy Analysis of Fission Yeast
Institutions: University of Uppsala, Swedish University of Agricultural Sciences.
Several microscopy techniques are available today that can detect a specific protein within the cell. During the last decade live cell imaging using fluorochromes like Green Fluorescent Protein (GFP) directly attached to the protein of interest has become increasingly popular 1
. Using GFP and similar fluorochromes the subcellular localisations and movements of proteins can be detected in a fluorescent microscope. Moreover, also the subnuclear localisation of a certain region of a chromosome can be studied using this technique. GFP is fused to the Lac Repressor protein (LacR) and ectopically expressed in the cell where tandem repeats of the lacO
sequence has been inserted into the region of interest on the chromosome2
. The LacR-GFP will bind to the lacO
repeats and that area of the genome will be visible as a green dot in the fluorescence microscope. Yeast is especially suited for this type of manipulation since homologous recombination is very efficient and thereby enables targeted integration of the lacO
repeats and engineered fusion proteins with GFP 3
. Here we describe a quantitative method for live cell analysis of fission yeast. Additional protocols for live cell analysis of fission yeast can be found, for example on how to make a movie of the meiotic chromosomal behaviour 4
. In this particular experiment we focus on subnuclear organisation and how it is affected during gene induction. We have labelled a gene cluster, named Chr1, by the introduction of lacO
binding sites in the vicinity of the genes. The gene cluster is enriched for genes that are induced early during nitrogen starvation of fission yeast 5
. In the strain the nuclear membrane (NM) is labelled by the attachment of mCherry to the NM protein Cut11 giving rise to a red fluorescent signal. The Spindle Pole body (SPB) compound Sid4 is fused to Red Fluorescent Protein (Sid4-mRFP) 6
. In vegetatively growing yeast cells the centromeres are always attached to the SPB that is embedded in the NM 7
. The SPB is identified as a large round structure in the NM. By imaging before and 20 minutes after depletion of the nitrogen source we can determine the distance between the gene cluster (GFP) and the NM/SPB. The mean or median distances before and after nitrogen depletion are compared and we can thus quantify whether or not there is a shift in subcellular localisation of the gene cluster after nitrogen depletion.
Molecular Biology, Issue 59, Fission yeast, fluorescence microscopy, nuclear organisation, chromatin, GFP
High-throughput Functional Screening using a Homemade Dual-glow Luciferase Assay
Institutions: Massachusetts General Hospital.
We present a rapid and inexpensive high-throughput screening protocol to identify transcriptional regulators of alpha-synuclein, a gene associated with Parkinson's disease. 293T cells are transiently transfected with plasmids from an arrayed ORF expression library, together with luciferase reporter plasmids, in a one-gene-per-well microplate format. Firefly luciferase activity is assayed after 48 hr to determine the effects of each library gene upon alpha-synuclein transcription, normalized to expression from an internal control construct (a hCMV promoter directing Renilla
luciferase). This protocol is facilitated by a bench-top robot enclosed in a biosafety cabinet, which performs aseptic liquid handling in 96-well format. Our automated transfection protocol is readily adaptable to high-throughput lentiviral library production or other functional screening protocols requiring triple-transfections of large numbers of unique library plasmids in conjunction with a common set of helper plasmids. We also present an inexpensive and validated alternative to commercially-available, dual luciferase reagents which employs PTC124, EDTA, and pyrophosphate to suppress firefly luciferase activity prior to measurement of Renilla
luciferase. Using these methods, we screened 7,670 human genes and identified 68 regulators of alpha-synuclein. This protocol is easily modifiable to target other genes of interest.
Cellular Biology, Issue 88, Luciferases, Gene Transfer Techniques, Transfection, High-Throughput Screening Assays, Transfections, Robotics
A high-throughput method to globally study the organelle morphology in S. cerevisiae
Institutions: University of British Columbia - UBC.
High-throughput methods to examine protein localization or organelle morphology is an effective tool for studying protein interactions and can help achieve an comprehensive understanding of molecular pathways. In Saccharomyces cerevisiae, with the development of the non-essential gene deletion array, we can globally study the morphology of different organelles like the endoplasmic reticulum (ER) and the mitochondria using GFP (or variant)-markers in different gene backgrounds. However, incorporating GFP markers in each single mutant individually is a labor-intensive process. Here, we describe a procedure that is routinely used in our laboratory. By using a robotic system to handle high-density yeast arrays and drug selection techniques, we can significantly shorten the time required and improve reproducibility. In brief, we cross a GFP-tagged mitochondrial marker (Apc1-GFP) to a high-density array of 4,672 nonessential gene deletion mutants by robotic replica pinning. Through diploid selection, sporulation, germination and dual marker selection, we recover both alleles. As a result, each haploid single mutant contains Apc1-GFP incorporated at its genomic locus. Now, we can study the morphology of mitochondria in all non-essential mutant background. Using this high-throughput approach, we can conveniently study and delineate the pathways and genes involved in the inheritance and the formation of organelles in a genome-wide setting.
Microbiology, Issue 25, High throughput, confocal microscopy, Acp1, mitochondria, endoplasmic reticulum, Saccharomyces cerevisiae | <urn:uuid:114b9330-f9f8-4bca-8db9-5e528d88883c> | CC-MAIN-2017-13 | https://www.jove.com/visualize/abstract/23861937/genome-wide-screening-for-genes-associated-with-valproic-acid | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186895.51/warc/CC-MAIN-20170322212946-00373-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.891356 | 10,838 | 2.828125 | 3 |
Mrs. Weronko's Classroom Blog
The Story of St. Nicholas (for children)
I borrowed this great little inspirational video from Mrs. Ackman's page!
Count by 10s to 100! Psst...this will help you learn to count to 100 by 1s!
Hawaiian Pizza: An original composition with Mr. Andy
Share to Twitter
Share to Facebook
Share to Pinterest
Post a Comment | <urn:uuid:e7f6de8d-ca46-4280-8a98-e2b3a1440428> | CC-MAIN-2017-47 | http://stmarykindergarten2014.blogspot.com/p/favorite-videos.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806447.28/warc/CC-MAIN-20171122012409-20171122032409-00013.warc.gz | en | 0.761938 | 89 | 2.578125 | 3 |
Ant infestation is the most commonly reported pest problem.
These tiny scavengers will enter your home or business looking for moisture and an accessible food source. Rotting or damp wood that is moldy can attract ants. Ants also feed on sugar, cheese, meats, vegetables, grease, peanut butter, and dead insects. Ants often enter a home through cracks around windows or doors, but they can find numerous entrances to your home or building. Once inside, the growing ant colony can become a problem quickly, as ants mature from juveniles to adults within a matter of days.
It is necessary to properly identify the ant species that you have in order to effectively eradicate them. Of the thousands of species of ants, the four listed below are the most commonly found in the United States.
are about five eighths inches long. They tend to burrow in damp wood but have also been known to damage solid wood. They do not eat the wood, but simply remove it in order to build a nest.
Red Imported Fire Ants:
vary in size from one-eighth to three-eighths inches. They construct large mounds for nests and administer painful stings.
are about one-eighth inch long. They generally make their nests in pavement cracks and are also capable of infesting a building.
are about one-sixteenth inch long. These ants are commonly found in hospitals and nursing homes, where they are are capable of transmitting Staphylecoccus and Psuedomonas infections. Pharoah Ants also invade restaurants, apartment buildings and similar dwellings.
Ants with wings can easily be mistaken for termites, which may lead to a wrong treatment. In comparison, ants have a very narrow thorax (mid-section), while termites' bodies are more uniform.
It can be difficult for a homeowner to get rid of an ant infestation without help. Using strong chemical products inside of the home may lead to worse conditions. This is why we can help. We are a team of professionals with experience and understand the most effective ways to eliminate the pest the problem. For a free quote, please call us at 855-475-2832. | <urn:uuid:68f5366a-725d-4964-9c34-e4bd67c48117> | CC-MAIN-2023-40 | https://antbusters.com/ants | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00581.warc.gz | en | 0.956634 | 474 | 2.640625 | 3 |
A Beautiful Mind can be seen in part as both a pathography and a biography in a number of ways. As the film focusses on the progression of the life of John Nash we pathographically see the advancement of his battle with schizophrenia but also explore the personal aspects of his life much as a biography would do. Many of the personal recounts of Nash’s life begin as biographical recounts that turn into a study of how his psychological disorder influences the faucets of his life. These lines overlap as we see John in response to his sickness but also as a husband, father, colleague, and mentor.
Nash is defined apart from his disability in the depiction of the depth of his personal relationships and his mathematical accomplishments. In his initial stage of being a Princeton student, we view him as socially handicapped rather than mentally as we are unaware as viewers of his impending disorder. His time at the school leads to the portrayal of his personal life and the introduction to Alicia who later becomes his wife. In relation to his private life, away from the disease, the feature puts emphasis on details excluding schizophrenia showing that there is much more to him. Putting these details forward before introducing us to the handicap John must live with gives us background to the essence of the man he was before the disease took hold of his mind. The Nobel Prize he receives in the closing scenes invoke the ideal of documenting his life’s greatest achievements over health hinderances.
After we become aware of confirmed mental instability, some events that previously had taken place are looked at afterwards through pathography. Instantly his time at Princeton turns into the induction of his delusions concerning his non-existent roommate, Charles. The biopic takes a turn to then focus on the apparent loss of mind and question the delusions as a direct result of the pressure to create and disprove theories. In the demise of mental stability the spotlight shifts to increased mental episodes and shock treatment leading to the ultimate acceptance of such dishonest delusions. We observe the comfort John finds in his instability in the argument that not taking his medication enables him to complete his work that he believes is for the government. The film does detect the demise of John’s mental health as it is a major part of his being but goes further in extent to which we watch his life before and after control is found. | <urn:uuid:153522cd-ea50-49d5-ac17-4b8d3a40f4c9> | CC-MAIN-2019-30 | http://english201l08.ucalgaryblogs.ca/2016/12/08/a-beautiful-mind-leading-into-a-pathography/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528220.95/warc/CC-MAIN-20190722201122-20190722223122-00386.warc.gz | en | 0.988315 | 470 | 2.515625 | 3 |
Sarah Green, professor of chemistry, was a scientific reviewer on the United Nation’s (UN) Sixth Global Environmental Outlook (GEO-6) report. Green was one of 250 scientists and experts from more than 70 countries who worked on the report. The March 2019 report is a comprehensive and rigorous assessment on the state of the environment completed by the UN in the last five years.
The GEO-6 report shows that a healthy environment is a prerequisite and foundation for economic prosperity, human health, and well-being. It addresses the main challenge of the 2030 Agenda for Sustainable Development, that no one should be left behind, and that all should live healthy, fulfilling lives for the full benefit of all, for present and future generations. “We are not heading that way, however,” says Green. “We have many opportunities to reverse that direction and make a difference on the current trends in climate change, biodiversity loss, pollution, and other pressures to restore planetary and human health.”
The GEO-6 report highlights the fact that the world has the science, technology, and finance it needs to move toward a more sustainable development pathway; although, sufficient support is still missing from public, business, and political leaders who are clinging to outdated production and development models. “The science is clear. The health and prosperity of humanity is directly tied with the state of our environment,” says Joyce Msuya, acting executive director of UN Environment. “This report is
an outlook for humanity. We are at a crossroads. Do we continue on our current path, which will lead to a bleak future for humankind, or do we pivot to a more sustainable development pathway? That is the choice our political leaders must make, now.”
The projection of a future healthy planet with healthy people is based on a new way of thinking where the “grow now, clean up after” model is changed to the goal of a near-zero-waste economy by 2050. According to the Outlook, green investment of two percent of countries’ GDP would deliver long-term growth as high as presently projected but with fewer impacts from climate change, water scarcity, and loss of ecosystems. At present, the world is not on track to meet sustainability goals by 2030 or 2050. Policy interventions that address entire systems—such as energy, food, and waste—rather than individual issues, can be much more effective, according to the authors. “The report shows that policies and technologies already exist to fashion new development pathways that will avoid these risks and lead to health and prosperity for all people,” says Joyeeta Gupta and Paul Ekins, co-chairs of the GEO-6 process. “What is currently lacking is the political will to implement policies and technologies at a sufficient speed and scale. The fourth UN Environment Assembly in Nairobi in March needs to be the occasion when policymakers face up to the challenges and grasp the opportunities of a much brighter future for humanity.” | <urn:uuid:bfc37a0e-cbba-439c-9886-04c3de79ab59> | CC-MAIN-2019-51 | https://blogs.mtu.edu/chemistry/2019/11/chemist-co-authors-united-nations-report-on-the-environment/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541297626.61/warc/CC-MAIN-20191214230830-20191215014830-00169.warc.gz | en | 0.960122 | 615 | 3.0625 | 3 |
Anchorage, Alaska (AP) – New research aims to find out why highly endangered beluga whales in Alaska’s Cook Inlet have failed to recover despite protective measures.
The National Oceanic and Atmospheric Administration has awarded more than $1.3 million to the state for three years of research involving the white whales.
“While we know what we believe caused the initial decline, we’re not sure what’s causing the population to remain suppressed,” said Mandy Keogh, a wildlife physiologist with the Alaska Department of Fish and Game.
A population of 1,300 belugas dwindled steadily through the 1980s and early ’90s.
The decline accelerated when Alaska Natives harvested nearly half the remaining 650 whales between 1994 and 1998. Subsistence hunting ended in 1999 but the population remains at only about 340 animals.
Cook Inlet belugas are one of five beluga populations in U.S. waters. Cook Inlet, named for British explorer Capt. James Cook, stretches 180 miles (290 kilometers) from Anchorage to the Gulf of Alaska.
Belugas feed on salmon, smaller fish, crab, shrimp, squid and clams.
Dubbed “sea canaries,” the whales make a wide range of whistles, grunts and clicks, and use echolocation to navigate under ice and find prey in murky water.
Federal officials declared Cook Inlet belugas endangered in 2008.
The new research will supplement ongoing NOAA Fisheries research and review feeding patterns, social structure of whale pods and the effects of noise.
One new study will focus on beluga prey and habitat. Researcher will analyze teeth collected over the years from hunted or stranded belugas and measure stable isotopes to determine how feeding patterns may have changed during their lives.
“Like tree rings, teeth have annual growth layers,” Mat Wooller, chemical oceanography professor at the University of Alaska Fairbanks, said in a statement. “Measuring isotopes in these growth layers can reveal how whales’ feeding habits have changed over the life of an animal.”
Chemical signatures in teeth, Keogh said, can reveal whether belugas ate fish in the water column or prey along the ocean floor.
Streams within Cook Inlet have unique strontium signatures that carry over to the fish that hatch in them, such as salmon and eulachon, a kind of smelt also known as hooligan.
NOAA researchers last week deployed acoustic equipment to record belugas feeding. The whales emit a specific buzz sound after successfully foraging.
“Right now we don’t know what they’re feeding on in winter,” Keogh said.
Researchers also will listen for sounds of transient killer whales, a possible predator, along with industrial noises that could displace belugas from feeding areas.
Researchers also will study pod social structures and compare it to a growing population of belugas in Alaska’s Bristol Bay, which has been studied for the past decade by researchers from Chicago’s Shedd Aquarium and Atlanta’s Georgia Aquarium in partnership with state, federal and university scientists.
Segments needed for a growing population may be missing in Cook Inlet, Keogh said.
“For example, we don’t know if belugas need one male for every female, or whether they’re more similar to something like a wolf pack, where not all individuals in the group are reproducing,” she said.
NOAA Fisheries manages the animals, but the state has a strong interest in their recovery. Belugas are a tourist draw as they swim in waters along Alaska highways.
Cook Inlet petroleum helps keep the lights on in Anchorage, Alaska’s largest city, and the state wants to lift development restrictions if the measures are not helping belugas.
“If you don’t know the factors that are preventing them from recovering, it’s really hard to appropriately manage them, or to know what factors to try to alleviate,” Keogh said. | <urn:uuid:669adffa-05bf-466a-aa88-2ab482eb2256> | CC-MAIN-2018-43 | http://www.pattayamail.com/science/researchers-want-know-beluga-whales-havent-recovered-188107 | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511744.53/warc/CC-MAIN-20181018063902-20181018085402-00317.warc.gz | en | 0.922837 | 861 | 3.546875 | 4 |
Description: Switchgrass (left) can yield almost twice as much ethanol as corn, estimates geneticist Ken Vogel, who is conducting breeding and genetics research on switchgrass to improve its biomass yield and its ability to recycle carbon as a renewable energy crop.
Image type: Field
Image location: United States
Name: USDA ARS Photo Unit
Organization: USDA Agricultural Research Service
Country: United States | <urn:uuid:d6582cd8-eb1a-46f7-9da2-235381084f00> | CC-MAIN-2014-35 | http://www.invasive.org/browse/detail.cfm?imgnum=1319053 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500833115.44/warc/CC-MAIN-20140820021353-00309-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.883897 | 83 | 2.6875 | 3 |
The Bureau of Land Management is under fire again, but this time it's not about going head-to-head with a Nevada rancher. Instead the issue revolves around selling horses for slaughter.
By: Mead Gruver, Associated Press
The Bureau of Land Management rounded up a horse herd that roamed for decades on federal land in northwest Wyoming and handed the horses over to Wyoming officials. They, in turn, sold the herd to the highest bidder, a Canadian slaughterhouse.
Wild horse advocates are incensed, saying they should have had a chance to intercede in the March roundup and auction. But the BLM says the horses were abandoned — not wild — and that it publicized the sale beforehand.
"It would take very little to do this in a more effective way, so that horses are not just sent off to slaughter indiscriminately," said Paula Todd King of The Cloud Foundation, a Colorado-based advocacy group.
According to the BLM, the Wyoming horses weren't officially wild and protected by the Wild-Free Roaming Horses and Burro Act, the federal law for maintaining many of the horse herds, some of which have roamed free in the West since the days of Spanish explorers more than 300 years ago.
The BLM bans wild horses from being sold for slaughter. Anybody who adopts a wild horse from the BLM must agree to provide it a home.
The horses in the Bighorn Basin's sagebrush hills descended from stray rodeo horses that were owned by Andy Gifford, a rancher and rodeo livestock contractor, in the 1970s, BLM spokeswoman Sarah Beckwith said. Gifford had claimed the horses as his but never rounded them up before he died in 2009. That, plus the fact that the horses never interbred with wild horses, officially classified them as strays.
"Nobody had a permit to have these horses grazing on public lands," Beckwith said.
King questions that policy. "How long does a horse have to live wild and free before it's considered wild?" she said.
Area ranchers and farmers had long complained the herd grazed down pastures and damaged cattle rangeland.
On March 18 and 19, a BLM contractor rounded up the 41 horses and handed them over to Wyoming officials. Within hours, the horses were sold for $1,640 to Bouvry Exports, a slaughterhouse based in Calgary, Alberta.
The BLM follows state laws for handling stray livestock, Beckwith said, and had no option but to hand the horses over to the Wyoming Livestock Board, a state agency. The state took three bids for the horses, state Brand Commissioner Lee Romsa said.
Bouvry Exports shipped the horses out of state, Romsa said. Phone messages for Bouvry Exports weren't immediately returned.
BLM officials had printed notices on the upcoming roundup in local newspapers and posted notices in local post offices.
The roundup wasn't unprecedented. Last summer, a federal judge allowed an American Indian tribe to sell 149 mustangs over the objection of critics who claimed the unbranded animals were federally protected wild horses. The mustangs were among more than 400 on U.S. Forest Service land along the Nevada-Oregon line that the Fort McDermitt Paiute-Shoshone Tribe claimed belonged to them.
In the end, King said, more than 160 were sold to people who planned to take them to slaughterhouses in Canada and Mexico, but local residents and rescue groups raised money to buy 150 of the horses to spare them.
The BLM rounds up stray livestock perhaps three or four times a year in the West. Usually they are cattle or sheep. Impoundments of large numbers of stray horses are far less frequent, said Robert Bolton, a senior rangeland management specialist for the BLM.
"That's a pretty sizeable number and they have been out there a long time," Bolton said of the Wyoming herd. "Normally, most of our impounds have been in the low numbers." | <urn:uuid:5323600b-239e-4137-8767-42204a5b1ac0> | CC-MAIN-2015-06 | http://www.agweb.com/livestock/beef/article/blm_criticized_for_selling_horses_for_slaughter_NAA_Associated_Press/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422121785385.35/warc/CC-MAIN-20150124174945-00040-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.971127 | 820 | 2.78125 | 3 |
A Guide To Nailing Roundabouts
You don’t have to be new to driving to find roundabouts confusing.
Roundabouts. What can we say? Many learner drivers find roundabouts particularly difficult to get to grips with but however much you hate them, there’s no avoiding them. There are 10,000 roundabouts in the UK so you’re more than likely to come across them regularly during your driving lessons.
No getting around them
Unless you live in or near Swindon, you probably won’t have to tackle the dreaded seven circle Magic Roundabout. However, even the single circle roundabouts can be confusing for beginners. The driving test often involves challenging roundabouts in your local area. You might have to tackle anything from small mini roundabouts big multi-lane roundabouts. It’s important to understand the correct procedure for taking roundabouts so here is a guide to help you around.
How do I approach a roundabout?
Roundabouts are just a type of junction so you need to approach them in the same way. When there’s a roundabout ahead remember the MSPL routine, or Mirror, Signal, Position, Speed, Look. Unlike other junctions, most roundabouts are quite open which allows you to assess the traffic flow and adjust your speed and if possible, enter the roundabout without stopping. Some drivers stop at the give way line when it is not necessary, so never assume the car in front of you will enter the roundabout, even when it’s clear.
Here is a diagram to show you the correct procedure for approaching and exiting a standard closed roundabout from each angle.
Turning left at a roundabout
To turn left at a roundabout, make sure you signal left and approach in the left lane. Stay in the left lane and keep signalling until you have left the roundabout.
Going straight ahead at a roundabout
Select the appropriate lane on approach. Unless road marking indicate otherwise, you should use the left lane when going straight ahead. There is no need to signal on approach. Make sure you stay in your lane as you go around the roundabout. When you have passed the exit before the one you need to take, signal left and exit.
Turning right at a roundabout
To turn right, make sure you approach in the right hand lane and signal right. Stay in your lane and signal left after passing the exit before the one you need to take. You may need to change lanes to leave the roundabout so make sure you complete the appropriate observations (Mirror-Signal-Manoeuvre).
You won’t fail your driving test by taking the incorrect exit, as long as you do so safely. The examiner is testing your driving ability, not navigation skills! However, you can fail your test if you forget to cancel your indicator after exiting the roundabout. Doing this can be confusing for other road users.
Watch out for pedestrian crossings! These are often placed just outside of roundabouts. This means there can be queues at the roundabout exit as people wait for pedestrians to cross. Make sure you look ahead to see if the exit you are taking is clear and so you can prepare for traffic if necessary by ensuring you are in the correct lane.
What about mini roundabouts?
Mini roundabouts are also common in the UK, especially in residential areas. The same rules apply at roundabout of all sizes. However, you may find that you’ll have to reduce your speed even further to navigate smaller roundabouts safely. You must pass around the central markings of mini roundabouts unless you are driving (or towing) a vehicle which is too large to do so.
Remember that practice makes perfect! If roundabouts make you nervous, try and get as much exposure before your driving test. If possible, get in as many hours of practice outside of lessons as possible. With our Insurance For Learner Drivers, you can insure yourself on a friend or family member’s car from two hours to 90 days, so you can get as little or as much practice as you need! | <urn:uuid:8cdf0518-ddfd-4b3e-8a79-1a403e0539ee> | CC-MAIN-2020-05 | https://www.veygo.com/guides/roundabout-driving/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251681625.83/warc/CC-MAIN-20200125222506-20200126012506-00399.warc.gz | en | 0.952906 | 847 | 2.5625 | 3 |
Safe Haven Laws: The differences between Georgia and Tennessee
Cries from the woods alerted neighbors to a baby in a plastic bag on the side of a road in Forsyth County, Georgia. This newborn nicknamed "Baby India" could have been surrendered under the Georgia Safe Haven Law with no consequence to the mother.
Sarah Koeppen is the Executive Director of The Hope Box, a Safe Haven Alliance in Georgia. She said this happens too often.
"I can tell you this, we're not reaching enough. In 2017 we had 478 abandonments." said Koeppen.
In Georgia, the Safe Haven Law states that mothers can surrender their babies within 30 days of its birth without fear of prosecution. In Tennessee women only have 72 hours.
Here is Tennessee's Safe Haven Law:
"The Tennessee Safe Haven law allows mothers of newborns to surrender unharmed babies to designated facilities within 72 hours of birth without fear of being prosecuted. As long as the baby is unharmed and the child is surrendered within 72 hours of birth, the mother -- or parents -- will not be prosecuted and is assured of complete confidentiality. The law was enacted to reduce the number of unsafe abandonment of babies."
Here is Georgia's Safe Haven Law:
"This law allows a child's mother to leave her baby, up to 30 days old, with an employee of any medical facility including any hospital, institutional infirmary, health center or birthing center in Georgia without prosecution. This includes Hospitals, Fire Stations and Police Stations."
"The law is in place so that if they need medical assistance after delivering a baby, they can get medical care, and they will not be prosecuted and they can remain anonymous," said Koeppen.
Kayla Ridenour is the Executive Director for a Secret Safe Place for Newborns of Tennessee. She said mothers have to surrender babies to a person at a manned fire station, police department, health department or hospital. Their website has a map with locations a mother can surrender their infant in Tennessee.
"Because what happens to the baby, less than 24 hours after they're surrendered, DCS steps in and they immediately try to get the baby to an adopted family," said Ridenour.
But if the mother changes her mind after the surrender, there is a way to get the child back.
"The child is given a bracelet. The mother is given a bracelet, and the father can have one as well. They have 30 days to change their minds," said Ridenour.
Both Secret Safe Place and Hope Box have helplines for mothers in crisis:
- Secret Safe Place Helpline: 1-866-699-SAFE
- The Hope Box Hotline: (770) 765-6301
Koeppen said a mother can call and they will help with no judgment.
"And we have met girls in parking lots in that position and so we're able to say to them don't abandon your baby there are options and we will help you work through every single option," said Koeppen. | <urn:uuid:d35e9da0-aa50-4933-b4e0-0354d1780595> | CC-MAIN-2019-47 | https://www.wrcbtv.com/story/40718212/safe-haven-laws-the-differences-between-georgia-and-tennessee | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668539.45/warc/CC-MAIN-20191114205415-20191114233415-00263.warc.gz | en | 0.956993 | 636 | 2.53125 | 3 |
Translation work allows you to encounter many beautiful words in different languages, although some do not have an English equivalent. These foreign words are quite descriptive in their original language and if you learn what they mean, you’d wish that there are English words like them, as you know that there will always instances where they would be very fitting.
There are times when you are lost for words to express how you truly feel at that instant. English is a colorful language but sometimes it fails to express something in just one word. In many instances, you have to describe what you’re feeling, which takes several words for a person to fully comprehend what you mean. When it comes to find le mot juste (the right word), you may have to learn a foreign language or two.
Of course we all know that it is not possible to learn a language in an hour or a day, so we have compiled some beautiful words in foreign languages that describe those feelings that are difficult to explain. Although we have to warn you that they also do not have the literal equivalent in English.
In English, you’d say you binge-eat because of some personal reasons. In German, when a person gains excess weight because the individual underwent emotional overeating, they call it kummerspeck.
You are already full yet you cannot stop eating because the food is very delicious or you missed it or you simply think that you must not waste food. You might excuse yourself by saying that you were not aware that you ate everything. The Georgians’ term for it is shemomedjamo.
How many times have you experienced temporary memory loss when introducing someone? That panicky feeling is called tartle in Scottish.
Picture this. You are seated together with your friend or partner and you both realized at the same time that you need or do something and you wish the other person would volunteer to do it. So you exchanged a look but neither of you do not want to stand up and do or get it. It’s called mamihlapinatapai in the Yaghan language, spoken by the indigenous Yagán people in Tierra del Fuego in Chile and Argentina.
Sometimes it cannot be helped that you wish you could just punch a person because of his or her attitude. In German, that feeling is called backpfeifengesicht or a face that badly needs a fist to shut him/her up.
What do you say or do when the food you bit into is still too hot to handle? You either drop the food onto your plate, purse your mouth and blow on the food inside or roll it around your mouth to cool it. Well, if you do the latter, it’s called pelinti by the Buli speakers in Ghana.
In many Asian countries, it’s a norm to be courteous and hospitable. The Thais use the term greng-jai for that feeling a person gets when they do not want another person to do something for them because it would cause them pain.
Tapping someone on the opposite shoulder lightly from behind is a common game among children. Even parents play the harmless trick on their children. While there is no specific term available for it in English, it is called mencolek in Indonesian.
In some cultures, it is all right to whistle to get the attention of a child or a dog. While some people blow air to make the whistling sound, Samoans suck the air through their pursed lips to make a sound that resembles a squeak. They call this action as faamiti.
In the Philippines, the Filipino term gigil is used to define that irresistible urge to squeeze or pinch something that looks very cute.
In Nicaragua, speakers of the Ulwa language use the term, yuputka for that eerie feeling that something is crawling over your skin when you take an evening walk in the woods.
When your teeth are chattering due to extreme rage or because it is extremely cold, the Persians’ term for it is zhaghzhagh.
When you get that feeling to literally jump out and frighten your older brother who is very annoying, it’s called vybafnout in the Czech language.
In the Swedish language, the term lagom means ”just right,” nothing more, nothing less.
Norwegians have a general term for anything that you can put into your sandwich – pålegg.
Filipinos have coined a term for someone who looks good from afar but often a disappointment when seen up close. The term is layogenic that is a combination of ”layo” that means ”far” or ”distant/distance” and ”genic” from photogenic.
In relation to the Filipino word, the Japanese term bakku-shan is a slang used to describe a woman who looks pretty when seen from behind. Seeing the person from the front is another matter.
It is irritating when you cannot find an empty seat in a popular coffee shop because of seigneur-terraces, a term French speakers use for people who occupy tales in a coffee shop from a long time yet do not order much.
You scratch your head when you want to remember something that you have forgotten, such as your keys. The term Hawaiians use for this feeling is pana po’o.
Instead of saying ”day after tomorrow,” Georgian speakers use the term zeg. It’s short and easy to remember. Incidentally, there used to be an archaic English word for this – overmorrow, which in German is übermorgen.
Have you ever experienced the time when you just gaze vacantly into space. The Japanese term for this is boketto.
L’esprit de l’escalier
You’re exchanging some heated words with someone and you want to have the last word, but somehow you were unable to do think of a good retort that would shut the other person. Later you had a L’esprit de l’escalier. It’s a French term that literally means you’ve thought of the right retort, although it’s already too late.
Some people cannot let go of a relationship that has gone south. For someone who keeps on trying to revive a relationship that will no longer work, the Italian term for it is cavoli riscaldati.
In Danish, hygge is the word that aptly describes that comfortable, genial, and pleasant feeling of sitting around a fire with your friends while the winter rages outside.
Bilita Mpash is the Bantu word when you have a truly remarkable dream.
Translation work is definitely fascinating and rewarding as you learn beautiful words every day. For accurate translation from and into over 100 languages, get in touch with our human translators at Day Translations. They are all native speakers and located around the world. Call us at 1-800-969-6853 or Contact us any time. We’re open 24/7. | <urn:uuid:23d6a4e4-e68c-477c-90ae-810b502740e9> | CC-MAIN-2023-40 | https://www.daytranslations.com/blog/25-words-with-no-english-translation/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00366.warc.gz | en | 0.952246 | 1,613 | 2.703125 | 3 |
Rachel Carson and Her Book That Changed the World: Guide for Educators
Reading Is Fundamental
Rachel Carson and Her Book That Changed the World's printable guide for educators provides suggestions for activating student thinking before, during and after reading. Students will focus on questions they would want to ask Racehl Carson that would deepen their understanding of what motivated her research and writings.
7 - 10
2nd - 5th | <urn:uuid:038c9755-cfb6-4346-bea4-7ff1508b65ea> | CC-MAIN-2022-49 | https://rif.org/literacy-central/material/rachel-carson-and-her-book-changed-world-guide-educators | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711417.46/warc/CC-MAIN-20221209144722-20221209174722-00688.warc.gz | en | 0.933071 | 94 | 3.09375 | 3 |
Unless you live in a cave in the wilderness, you are exposed to many electromagnetic fields (EMFs) every day. EMFs are invisible areas of energy produced by anything that runs on electricity. There’s been a lot of interest lately about EMFs and whether or not they are dangerous. Some say EMFs can generate all kinds of unpleasant symptoms and maybe even cause cancer. Is the danger real? If so, what can you do to protect yourself? Let’s find out.
Electromagnetic Fields Are Everywhere
EMFs are everywhere. For example, the Earth has a natural magnetic field that causes a compass needle to point north. Electric fields and magnetic fields are similar, but there are some differences.
An electric field is produced when electricity flows through a wire or cable, like an electric tower power line. The force that pushes electrons through a wire is called the voltage, and the higher the voltage, the stronger the electric field.
A magnetic field is produced by a flowing electrical current. In general, magnetic fields only occur when a device or power source is turned on. Physical barriers like walls or insulation can weaken electric fields easier than magnetic fields.
When combined, electric and magnetic fields are electromagnetic fields, and they are a type of radiation. Now, this is not necessarily bad since even the sun is a source of radiation. Still, if you get too much sunlight, it can be harmful.
High-frequency vs. Low-frequency EMFs
In general, EMFs can be divided into two categories: high and low frequency. Examples of high-frequency EMFs are X-rays and gamma rays. These are very high intensity and known to be dangerous. Exposure to high-frequency EMFs can lead to DNA damage and can cause cancers. This kind of radiation is called ionizing radiation.
The bigger debate surrounds the low-frequency EMFs, like those associated with power lines, cellphone batteries, microwaves and a whole list of other devices. This kind of radiation is called non-ionizing radiation.
Sources of non-ionizing radiation in terms of strength can be ranked like this, with the strongest listed first:
- Smart meters
- TV signals
- Radio signals
- Power lines
Let’s look at some of these sources individually and see what scientists say about the potential danger.
You might be thinking, “Whoa! Microwaves are at the top of the list. Dangerous!” Remember, though, all the action happens behind the microwave oven door. So, yes, if you stuck your head in the microwave and turned it on, it would hurt you. If you have a newer model that’s in good shape though, little to no harmful radiation should leak out.
What about microwaved food? There have been no conclusive studies to show that microwaves make food or drinks harmful. Now, you might not like the texture of microwaved food, but it shouldn’t cause you any health problems.
Even if it’s bad for you, can you live without Wi-Fi? The EMF produced by Wi-Fi runs at a frequency just a bit lower than microwaves, but Wi-Fi works out in the open with no door. Some claim that energy emitted by Wi-Fi can weaken the blood-brain barrier. Even though the radiation itself may not affect you in this case, toxins from your own blood might pass more easily over to your brain.
Other investigators say that Wi-Fi frequencies can even affect the heart. This might lead to symptoms, such as:
- Rapid or irregular heartbeat
- Jittery feeling or anxiety
- Trouble concentrating
- Chest pain or pressure
There are even those that recommend getting rid of Wi-Fi in your home and setting up hard-wired Internet connections instead. A more practical solution might be to place your Wi-Fi router in a place that doesn’t see much human traffic.
This might be one of the hottest areas of debate when it comes to EMFs. The reason is not only that so many people have cellphones but also because we carry them so close to our body. When we use them to talk, we hold cellphones directly to our heads.
There are anecdotal reports of women who carried their cellphones in their bras and then got breast cancer. This is not scientific proof, but it does call our attention. To date, there have been no conclusive studies linking cellphones with cancer, but some associations have appeared. For example, a few studies show a possible link between some brain or ear tumors and cellphone use.
The limitation of the studies partly has to do with time. Cellphones have only been in widespread use for about 20 years. So, if they do cause cancers, we might only begin to see this trend appear now.
Here are some ways to reduce your risk of potential harm from cellphone EMFs:
- Limit the length of calls as much as possible; instead, send voice or text messages
- Keep your cellphone at least an arm’s distance away from your head when you sleep; the farther away, the better
- Use a phone case attached to your belt or carry it in your purse; this increases the distance from your reproductive organs
- Do not charge your phone while it’s close to your body like when sleeping
- Avoid Bluetooth headsets; use a speakerphone or headphones instead
These might be the scariest of all EMF sources. They rise high into the air, and you can even sometimes hear a humming noise from the towers. It just seems like the radiation is oozing out of the lines. Still, unless the line runs right over your home, you’re probably not at any more risk than when using a microwave oven. The reason is that the distance of the lines from your house is almost always far away enough to dissipate any harmful radiation.
Other Ways to Protect Yourself From EMFs
With the increased use of smart devices, the total EMF load is higher than ever before. It might be a pain, but unplugging devices like smart TVs might be your only escape. Even when these devices are off, they could still be emitting energy. In any case, turn off all tablets and appliances when not in use.
You spend more time in your bedroom than anywhere else. Try to eliminate any electric appliance or device from where you sleep. Don’t be afraid to switch back to a phone with a cable instead of wireless. Plus, unplug the Wi-Fi at night and let your body rest completely.
The potential effect on infants, children and adolescents is especially concerning. When human organs are still developing, they may be more vulnerable to damage. So, don’t rush out to buy your young child a cellphone. Also, make sure you teach your children healthy habits when using technology. For example, instead of carrying their cellphone in a pocket, tell them to stow it in their backpack or purse.
Finally, try not to use a laptop on your lap. This direct contact is like having a giant cellphone resting on your body. Instead, work at a desk.
There’s a little-known practice called earthing that some people claim helps offset the effects of EMFs. Remember how EMFs might weaken the blood-brain barrier? Well, this is thought to be partially due to the overall electric load your body carries during the day. This load is increased all day long by different EMF sources.
With earthing, you let your body make direct contact with the ground. This is a way to discharge your body. Some studies have confirmed that this happens. So, when you walk on grass, dirt or the beach, the Earth’s natural electrical system resets you.
Eat Foods That Protect Against EMF Damage
Whether or not EMFs damage your DNA, there are foods that can protect you just in case. These foods carry a high oxygen radical absorbance capacity (ORAC). Some of the foods and herbs in this category are:
Electromagnetic Fields and the Future
Inevitably, EMF levels will keep rising. We live in a tech-heavy and connected world. When you go to buy an appliance, ask yourself, “Can I get away with a basic model that doesn’t emit so much radiation?” While no single device alone might do you harm, the accumulation of EMF damage is not clearly understood. The best protection is prevention. So, keep your body healthy as well as your home.
For your guide to the best foods to heal your body, check out The Best Foods that Rapidly Slim & Heal in 7 Days, here!
Axe, J. (2017, December 12). Electromagnetic Radiation: 5 Ways to Protect Yourself. Retrieved from https://draxe.com/electromagnetic-radiation/
Cellular Phones. (n.d.). Retrieved from https://www.cancer.org/cancer/cancer-causes/radiation-exposure/cellular-phones.html
Electromagnetic Fields and Cancer. (2016, May 27). Retrieved from https://www.cancer.gov/about-cancer/causes-prevention/risk/radiation/electromagnetic-fields-fact-sheet | <urn:uuid:68283f8e-4441-4f57-9aba-2200f9bef5cd> | CC-MAIN-2020-40 | https://exercisesforinjuries.com/what-are-emfs-and-how-to-protect-yourself-from-them/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189264.5/warc/CC-MAIN-20200918221856-20200919011856-00288.warc.gz | en | 0.935555 | 1,907 | 3.265625 | 3 |
The eTriggs effect.
The eTriggs technology is based on physical and chemical effects. We see ourselves as disciplinary in biophysics and not in medicine.
With the eTriggs technology, we have been able to transmit signals to the body cells to start or correct certain processes. We can promote or reduce the production of hormones and thereby initiate desired processes or suppress undesirable ones. For example, we can produce messengers such as serotonin or dopamine (also called happiness hormones) and improve our mood. Other payout such. For example, we can suppress histamine, for example, to avoid becoming seasick. But we also take care of symptoms, such e. g. Overweight often a result of blocked processes.
Each eTriggs application controls different processes and is designed only for the specific application. Our coins are “programmed” with different information. By applying the eTriggs Coin externally to the skin, it transmits the necessary impulses to the body cells. The reaction rate and the intensity are different for each user.
What is common to all eTriggs applications is that we do not supply substances to the body, but that we exclusively use the body’s own processes. The body does not absorb any chemical or biological substances with the eTriggs technology and thus no side effects or interactions can arise. The application is equally possible for adults and children. eTriggs is a technology for modern people. | <urn:uuid:94667ded-6217-467b-a894-d830eb1fb407> | CC-MAIN-2018-26 | https://etriggs.com/en/so-wirkt-etriggs/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864387.54/warc/CC-MAIN-20180622084714-20180622104714-00144.warc.gz | en | 0.912642 | 293 | 2.875 | 3 |
40 Years Ago, Iran Was Hit by the Deadliest Blizzard in History
Blizzard image via Shutterstock
Forty years ago this week, the deadliest blizzard on record ripped through the lower Caucasus and into Iran, where it left 4,000 people dead. The Blizzard of 1972, as this hellish storm has come to be known, wasn’t your run of the mill squall; it wiped entire villages—200 villages, to be exact—off the map.
Coming on the heels of a series of storms in late January, the blizzard of 1972 traveled through western Iran and into Azerbaijan from about February 3 to February 8, dropping up to 26 feet of snow—that’s a two and half story building worth of snowfall—and snapping telephone lines, burying commuter trains, entombing villages, and crushing cars in its wake.
At the height of this blizzard, authorities estimated that a region about the size of Wisconsin, spanning most of western Iran, was entirely buried for more than a week. Those few who survived the -13 degree Fahrenheit temperatures were without water, food, heat and medical aid for days on end at a time when—just in case these poor people didn’t have enough to deal with—a deadly flu virus was also moving through rural Iran.
On February 9, 1972, after nearly a week of constant snowfall, the blizzard broke for a brief, but merciful, 24-hour period, allowing Iranian rescue workers to be transported by helicopter out to what looked essentially like enormous snow drifts—white expanses where villages used to be.
According to Associated Press reports, some rescue workers who’d been dropped on a snow drift burying a village called Sheklab dug for two days straight, burrowing through 8 feet of snow, only to find 18 frozen bodies and no one—not one single person in a population of 100—still alive.
Another blizzard started up again on February 11, forcing rescue workers to abandon their searches. Army helicopters left two tons of bread and dates scattered over the snowdrifts, in hopes that some people could tunnel their way to the surface, but many never did.
The second deadliest blizzard on record tore through Afghanistan in 2008, bringing -30 degree temperatures and killing an estimated 926 people. | <urn:uuid:57c6bb7a-d314-4ef3-acc4-7af2b58e7ca7> | CC-MAIN-2021-10 | https://www.mentalfloss.com/article/29930/40-years-ago-iran-was-hit-deadliest-blizzard-history | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385389.83/warc/CC-MAIN-20210308174330-20210308204330-00328.warc.gz | en | 0.95801 | 471 | 2.578125 | 3 |
Gaston de Foix
Foix, Gaston de (gästôNˈ də fwä) [key], 1489–1512, duc de Nemours, French general in the Italian Wars; nephew of King Louis XII. As commander of the French army in Italy in 1512, he proved his outstanding ability, making his small army highly effective by the use of surprise and forced marches. He relieved Bologna, defeated the Venetians at Isola della Scala and Brescia, and successfully laid siege to Ravenna, where he was killed.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
More on Gaston de Foix from Fact Monster:
See more Encyclopedia articles on: French History: Biographies | <urn:uuid:9df5ab8f-7288-4f25-b8e4-9e2d0f1f1deb> | CC-MAIN-2014-49 | http://www.factmonster.com/encyclopedia/people/foix-gaston-de.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931014329.94/warc/CC-MAIN-20141125155654-00215-ip-10-235-23-156.ec2.internal.warc.gz | en | 0.880544 | 169 | 2.859375 | 3 |
The Meeting between the Participants is Recreated at
a Distance in order to Create Deeper Understanding
Tore Persson1 GAO Shuting2
(1.Institute of International Eucation,Sockholm University,Sweden;
2.Swedish National Council of Adult Education,Sweden)
Abstract:This article is aiming to explain the characteristics of distance education within the special Swedish form of nonformal adult education that is provided by folk high schools and study associations. According to the philosophy within folk high schools and study associations, meetingbased learning is fundamental in a constructive learning process. Especially when the purpose of the studies is not limited to mechanical reproduction of information for a formal exam. Whenever there is a need for analysis, critical discussions etc many students need the group to reach a deeper understanding of the topic. Meetingbased learning has been the distinguishing feature for folk high schools and study associations for about a century. Now this meeting among the course participants is recreated in courses at a distance in order to create more flexible learning situations, deeper learning and good learner support.Gradually folk high school teachers and study circle leaders in Sweden have realized that it is possible to create good learning conditions at a distance with the help of modern ICT. They have also realized that it is possible to create virtual forums where the participants can meet, learn from each other and give each other good support. And it has become more and more clear that learning at a distance does not have to be the second best alternative, but that it has some qualities of its own compared to facetoface courses.
Key words: adult education;nonformal adult education;flexible learning
(1.国家成人教育委员会,瑞典; 2.斯德哥尔摩大学 国际教育研究所,瑞典) | <urn:uuid:c18d13ce-d792-4def-bfcd-948f37115dc9> | CC-MAIN-2019-13 | http://openedu.shtvu.edu.cn/frontsite/series_details.aspx?id=124 | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202131.54/warc/CC-MAIN-20190319203912-20190319225912-00490.warc.gz | en | 0.701902 | 425 | 2.71875 | 3 |
Some osteoarthritis patients refer to pool therapy as a form of "floating traction", allowing them to stretch their spine and loosen and flex joints in a way that would be impossible on a mat.
Anyone who has slipped into the comfort of a warm bath already has some appreciation for the benefits of pool therapy. For people suffering from osteoarthritis - arthritis of the bone - the pain relief felt in the hips, back, and knees while in a warm bath is palpable. Yet, it is also true that exercising the joints is necessary to maintain flexibility, relieve pain and it is increasingly recognized that exercise retards the underlying disease process of osteoarthritis. This leaves osteoarthritis sufferers with a dilemma: how to engage in exercise and remain active while avoiding pain that results from activity?
One answer is pool therapy - also referred to as aqua therapy or water therapy. A pool or tank of warm water provides an ideal environment in which to exercise because its buoyancy counteracts gravity, thereby decreasing the weight placed on painful joints and the spine. In fact, when immersed to neck level, buoyancy supports 90 percent of the body's weight. In waist-depth water, buoyancy can still support 50 percent of body weight. Diminished weight bearing stress is one of many of the advantages of pool therapy for patients with osteoarthritis.
Benefits of Water Therapy
Patients with pain from osteoarthritis are often unable to perform many land-based exercises without exacerbating the pain. However, in a buoyant, gravity-reduced environment like water, gentle movements to improve strength, flexibility, and endurance are often possible. A primary goal of pool therapy is to teach participants new ways of moving, in fact retraining the musculoskeletal system to accommodate the effects of osteoarthritis.
People who have osteoarthritis of the spine, sometimes referred to as spinal arthritis, can benefit greatly from pool therapy. Osteoarthritis results when the cartilage between adjoining facet joints in the back portion of the spine has broken down, causing the joints to become inflamed and generate pain while sitting, standing or walking - any activity that places weight or friction on the spine. Consequently, the buoyancy of the warm water environment of pool therapy relieves the friction on the painful joints, which can be particularly pronounced in the lower back (lumbar spine) and the neck (cervical spine). In fact, some patients refer to pool therapy as a form of "floating traction" allowing them to stretch their spine and loosen and flex joints in a way that would be impossible if they weren’t in water.
In This Article:
While the benefits of buoyancy upon arthritis are substantial, they are far from the only useful effects of aquatic exercise. Immersion also has an effect of decreasing pain that is independent of the joint offloading effects of buoyancy. Aquatic exercise also has very important effects upon the cardiovascular system, actually improving heart function during exercise and allowing improved circulation to the muscles and joints, facilitating recovery and strength-building.
- See our extended article about Water Therapy.
Examples of Pool Therapy Exercises
Many movements that are part of pool therapy for osteoarthritis patients look similar to stretching or resistance exercises conducted on land, with the exception that they use the gentle resistance of water rather than gravity to exercise muscles or joints. A few of the more popular exercises are:
- Stretching, including stretching the hamstrings and lower back by slowly raising knees to chest, or stretching the upper back and neck by standing away from the side of the pool and leaning forward with arms outstretched to grasp the pool edge
- Strengthening, including using foam barbells to complete bicep curls or lateral side raises that work against water resistance
- Water aerobics, including water walking, cross-country skiing movements, or slow jogging in a shallow pool which loosens the lower back and hips
- Ai Chi, a hybrid form of Tai Chi developed specifically for aquatic exercise that develops strength, balance, and joint flexibility through slow gentle movements while focusing upon relaxation and controlled breathing. (See more about Tai Chi for Posture and Back Pain) | <urn:uuid:76b55585-283f-48d8-b241-0c0ae24f106b> | CC-MAIN-2014-35 | http://www.spine-health.com/wellness/exercise/pool-therapy-relieve-osteoarthritis-pain | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829661.96/warc/CC-MAIN-20140820021349-00374-ip-10-180-136-8.ec2.internal.warc.gz | en | 0.945709 | 862 | 2.53125 | 3 |
This St. Patrick’s Day Narrative Writing is part of the March Writing Bundle. Students get to tell about a day they found a four-leaf clover!
Included in the St. Patrick’s Day Narrative Writing: Finding a Four Leaf Clover, you will find:
- student instructions
- elements of narrative writing
- writing templates with two line spacing options
- project printable
- two different poster titles for display
- two graphic organizers
St. Patrick’s Day Narrative Writing can be placed in writing centers and the creative project is great for bulletin boards or writing portfolios. A rubric is included to assist in easy grading. My students enjoyed this activity and I hope yours do as well! | <urn:uuid:3d857926-2438-4bc5-a25e-9dad9f3877cf> | CC-MAIN-2023-14 | https://rockinresources.com/product/st-patricks-day-narrative-writing-finding-a-four-leaf-clover | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00659.warc.gz | en | 0.91819 | 156 | 2.953125 | 3 |
Dinosaur dads played an active role in raising their young and often served as single parents, according to a study published Friday in the journal Science.
The researchers examined bones belonging to eight different dinosaurs that were fossilized in "brooding postures" near clutches of eggs. None of them included medullary bone, a form of bone tissue found in female birds and some female dinosaurs that is mined for calcium when they lay eggs, the researchers reported.
The team, led by paleontologist David J. Varricchio of Montana State University in Bozeman, also looked for signs that calcium or phosphorus had been leached from the bones -- a side effect of the egg-laying process -- and found none.
One of the fossils, belonging to an adult Troodon formosus, was found "in direct contact with an egg clutch," the researchers wrote. Troodon egg clutches can be so large that experts have surmised the dinosaurs formed communal nests. | <urn:uuid:ea140457-aa4c-4b58-9d76-eb4e343f1556> | CC-MAIN-2014-41 | http://articles.latimes.com/2008/dec/20/science/sci-dinos20 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131376.7/warc/CC-MAIN-20140914011211-00129-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.973413 | 199 | 3.09375 | 3 |
This article is reviewed by an expert
Chia seeds are tiny black or white seeds that come from a plant called Salvia Hispanica, which is native to Mexico and Guatemala. They have been embraced by Indians and are now a popular ingredient in many Indian health foods because of their taste as well as their health benefits. These seeds are rich in nutrients, antioxidants and omega-3 fatty acids, making them a good addition to any healthy diet.
Chia Seeds Nutrition
A single serving of chia seeds would be 2.5 tablespoons or 28 grams. This may not sound like much, but it packs quite a punch with its high content of vitamins, minerals, antioxidants and omega-3 fatty acids. A single serving provides you with :
- 11 grams of fibre
- 4 grams of protein
- 9 grams of fat (mostly omega-3s)
- 13% of the daily value (DV) of calcium
- 13% of the daily value (DV) of iron
Health Benefits Of Chia Seeds
Promotes Heart Health
Primary Benefits: Chia seeds are a good source of omega-3 fatty acids, especially alpha-linolenic acid (ALA), which can lower blood pressure, cholesterol, and triglycerides. Omega-3s may also reduce inflammation and improve blood vessel function. A low ratio of omega-6 to omega-3 fatty acids is associated with a lower risk of cardiovascular disease. Chia seeds can help achieve this ratio by providing more omega-3s than omega-6s [2,3].
Blood Sugar Control
Primary Benefits: May improve blood sugar levels. Chia seeds are high in fibre, which can slow down the digestion and absorption of carbohydrates, preventing fluctuations in blood sugar levels. Fibre may also improve insulin sensitivity and lower the risk of type 2 diabetes. Studies have shown that chia seeds can reduce postprandial blood glucose and insulin responses when added to bread or beverages .
Protects Against Free Radical Damage
Primary Benefits: Chia seeds contain various antioxidants that can protect the cells from oxidative stress and inflammation. Some of these antioxidants are caffeic acid, chlorogenic acid, kaempferol, and quercetin . Antioxidants may help prevent or reduce the risk of chronic diseases such as heart disease, cancer, and diabetes. They are also responsible for chia seeds benefits for skin as they protect against age-related damage. Likewise, chia seeds benefits for hair are attributed to the high antioxidant and nutrition of the seeds.
Helps in Weight Management
Secondary Benefits: The use of chia seeds for weight loss has become increasingly popular as they can increase satiety and reduce cravings. The fibre in chia seeds absorbs water and forms a gel-like substance in the stomach, which can make you feel full for longer. The protein in chia seeds can also suppress hunger hormones and boost metabolism. A study confirmed chia seeds benefits for weight loss, showing that their regular consumption reduces body weight and waist circumference within 12 weeks .
Strengthens Bone Health
Secondary Benefits: Chia seeds are a good source of calcium, magnesium, phosphorus, and manganese, which are essential for bone formation and maintenance. Chia seeds also contain boron, a trace mineral that helps the body use calcium and magnesium more efficiently. Eating chia seeds regularly may help prevent osteoporosis and fractures .
How To Consume Chia Seeds
Chia seeds can be used in various ways, such as soaking, sprinkling, grinding, or mixing them with different foods and liquids. They can be prepared as chia pudding, chia jam, chia mousse, chia gel, or chia oats with milk, fruit juices, or sauces. They can also be added to smoothies, cereal, yogurt, soup, muffins, or gravies for extra texture and nutrients. Chia seeds can act as a thickener, an egg replacer, or a breadcrumb swap in some recipes. Chia seeds can be digested whole or ground, but they form a gel when absorbing liquid.
Chia seeds are a nutritious and versatile food that can offer many health benefits. They can be easily incorporated into various dishes and recipes to enhance their flavour and texture. However, suddenly adding a large quantity of the seeds to your diet can be counterproductive and won’t increase chia seeds’ benefits. Stick to a small serving size and make sure to first check with your doctor if you suffer from any pre-existing health condition.
Disclaimer: This article is written from a modern health and lifestyle perspective. There is no relevance to Ayurveda. | <urn:uuid:95c87b28-e5bf-4184-a214-799fd091b14a> | CC-MAIN-2023-23 | https://livayur.com/nutritious-food/food-benefits/chia-seeds-nutrition-health-benefits-how-to-consume-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00365.warc.gz | en | 0.921238 | 1,148 | 2.671875 | 3 |
13 June 1913|
|Died||11 September 1943
Dnieper, Soviet Union
|Alma mater||University of Göttingen|
|Doctoral advisor||Helmut Hasse|
|Known for||Teichmüller mapping
Teichmüller was born in Nordhausen. He grew up in Sankt Andreasberg and earned his Abitur in 1931. In the same year he started studying mathematics at the University of Göttingen. Among his professors were Richard Courant, Hermann Weyl, Otto Neugebauer, Gustav Herglotz, and Edmund Landau. Teichmüller received his doctorate in 1935 under Helmut Hasse.
He joined the Nazi Party in July 1931 and became a member of the Sturmabteilung in August 1931. In 1933 he organized the boycott of his Jewish professor Edmund Landau. In 1936 and 1937 he attended lectures by Nevanlinna, who sympathized with the Third Reich, where he was a guest professor and, like Brouwer, was considered by the Nazis as "politically reliable" (Rudolf Heß was in charge of the assessment). Under the influence of Nevanlinna, Teichmüller specialized in geometric function theory. Upon personal authorisation from the Führer, he joined the Wehrmacht in 1939 and was killed fighting on the Eastern Front.
The theory of Teichmüller spaces (a moduli space theory for Riemann surfaces) was developed by Lars Ahlfors, Lipman Bers and others. The Teichmüller representative or Teichmüller character is a construction with p-adic numbers. The Teichmüller cocycle is associated to a simple algebra.
Much of Teichmüller's work was published in Deutsche Mathematik, a highly ideological journal founded by Ludwig Bieberbach that contained not only scholarly articles but also race propaganda. Teichmüller co-edited the journal since 1938. Because of the nature of the journal, his papers were hard to find in modern libraries before the publication of his collected works.
- Teichmüller, Oswald (1982), Ahlfors, Lars V.; Gehring, Frederick W., eds., Gesammelte Abhandlungen, Berlin, New York: Springer-Verlag, ISBN 978-3-540-10899-3, MR 649778
- Norbert Schappacher and E. Scholz (1992). "Oswald Teichmüller — Leben und Werk" (PDF). Jahresbericht der Deutschen Mathematiker-Vereinigung 94 (1): 1—40.
- " ... he was a genius but as an extreme Nazi shamefully stood out with his agitation against Landau and Courant." (in: Entzifferte Geheimnisse. Methoden und Maximen der Kryptologie. English title: Decrypted Secrets: Methods and Maxims of Cryptology)
- Thomas Huckle. Jüdische Mathematiker im "Dritten Reich" (Jewish Mathematicians in (the) "Third Reich") (in German).
- Lehto, Olli (2001). Korkeat maailmat. Rolf Nevanlinnan elämä [High Worlds. The life of Rolf Nevanlinna] (in Finnish). Otava. 317 pages. OCLC 58345155.
- O'Connor, John J.; Robertson, Edmund F., "Oswald Teichmüller", MacTutor History of Mathematics archive, University of St Andrews.
- Oswald Teichmüller at the Mathematics Genealogy Project
- Papadopoulos, Athanase, ed. (2007), Handbook of Teichmüller theory. Vol. I, IRMA Lectures in Mathematics and Theoretical Physics, 11, European Mathematical Society (EMS), Zürich, doi:10.4171/029, ISBN 978-3-03719-029-6, MR2284826
- Papadopoulos, Athanase, ed. (2009), Handbook of Teichmüller theory. Vol. II, IRMA Lectures in Mathematics and Theoretical Physics, 13, European Mathematical Society (EMS), Zürich, doi:10.4171/055, ISBN 978-3-03719-055-5, MR2524085
- Papadopoulos, Athanase, ed. (2012), Handbook of Teichmüller theory. Vol. III, IRMA Lectures in Mathematics and Theoretical Physics, 17, European Mathematical Society (EMS), Zürich, doi:10.4171/103, ISBN 978-3-03719-103-3
- Papadopoulos, Athanase, ed. (2014), Handbook of Teichmüller theory. Vol. IV, IRMA Lectures in Mathematics and Theoretical Physics, 19, European Mathematical Society (EMS), Zürich, doi:10.4171/117, ISBN 978-3-03719-117-0 | <urn:uuid:91f71120-ca49-43dd-9a5f-09e6a4405289> | CC-MAIN-2015-18 | http://en.wikipedia.org/wiki/Oswald_Teichm%C3%BCller | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430452285957.31/warc/CC-MAIN-20150501035125-00086-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.765906 | 1,085 | 2.640625 | 3 |
Markus Keller has long studied how grapevines respond to water stress, as the Washington wine industry uses deficit irrigation to bring about the complex flavors and quality of wine.
But extreme heat waves throw growers a curveball, and Keller, a Washington State University viticulturist, wants to understand how grapes respond to both heat and water stress.
Shifting climate patterns are increasing the frequency and duration of extreme heat waves in the summer, when grapes are ripening. “We don’t really know if that is a good thing or a bad thing,” Keller said.
Hot temperatures in the summer, typically defined as 95 degrees or higher, can cause sunburn and affect the acid development of fruit, he said.
Keller’s laboratory has three ongoing projects that explore heat effects and how to manage for them.
One, Keller and his colleagues call “The Double Whammy” experiment, because the vineyard management trial aims to study how grapes ripen under both water and heat stress together. The three-year study is funded by the Washington State Wine Commission’s Grape and Wine Research Program; 2021 is Year 2.
Through leaf removal and training, managing vines to expose fruit to morning sunshine is a common industry practice in Washington, especially for red varieties such as Cabernet Sauvignon, to develop pigments and tannins. However, Keller and graduate student Evan Fritzke are learning that too much sunshine — and the temperatures that come with it — has a negative effect on white wine grapes.
“Maybe we’ve been overdoing it,” Keller said.
To explore this in the trials, Fritzke removes leaves and trains shoots up when grapes are about pea-sized in July, exposing clusters to morning sunshine — just like normal industry practice. But come August, at veraison, he drops those shoots to shade the ripening fruit in both Chardonnay and Riesling grapes. Personnel changes prompted by the coronavirus and wildfire smoke have either delayed or skewed some results, but so far, they have found that post-veraison shading maintains higher levels of malic acid, a desired taste attribute in white wines, especially Riesling.
Researchers continue to analyze the sample berries at the university’s Wine Science Center in Richland.
Keller also is working on a project with Amit Dhingra, a plant genomics professor at WSU, to search for the expression of genes that control ripening in Cabernet Sauvignon and Riesling. It’s funded by a Specialty Crop Block Grant. They want to determine whether heat stress causes similar effects as water stress or if they combine for something unique, Keller said.
So far, Keller’s team has discovered that water stress controls canopy growth and other plant responses, so producers can use it as a tool with which they manage fruit qualities. However, the water stress itself does nothing directly to the fruit. Heat stress, on the other hand, drives fruit characteristics.
This debunks some popular wine production beliefs, Keller said.
One important bit of advice he offered for growers: Avoid water stress during heat waves.
Dhingra continues to work on the genetic analysis of the berries from the project.
A third project, Keller’s evaporative cooling trials, funded by the Northwest Center for Small Fruits Research, has shown that it’s possible to use a misting system to cool grapes without watering the soil, which would throw deficit irrigation programs out of whack. Postdoctoral scientist Ben-Min Chang developed the misting system, and, so far, they have determined they can do it without causing diseases. Now they are measuring the effects of evaporative cooling on wine quality, Keller said. Winemakers have speculated it will cause negative effects on flavors.
Climate change is real, and the industry needs to react, said Wade Wolfe, co-owner and winemaker at Thurston Wolfe Winery in Prosser. But he said that Keller’s research would help the wine industry with or without climate change.
“We’re trying to understand how we interact with climate change while we still maintain or even improve the quality of the fruit,” said Wolfe, who also sits on the wine commission’s research advisory committee.
But the benefits go beyond that, he argued. All wine-producing regions need research that aims to understand regional environmental constraints and how to adapt growing and winemaking practices to produce the best quality possible.
“We’re always trying to see what we can do … to optimize the quality of the wines we’re making,” Wolfe said. •
—by Ross Courtney | <urn:uuid:a64b1ec2-5cd6-483e-959e-c32fbd3b7005> | CC-MAIN-2023-40 | https://www.goodfruit.com/how-stressed-are-hot-grapes/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00485.warc.gz | en | 0.938645 | 978 | 3.28125 | 3 |
Asian Longhorned Beetle
The Asian longhorned beetle (Anoplophora glabripennis or ALB) is a large distinctive-looking insect growing to 1.5” long. The body is shiny jet black with irregular white spots. Antennae are typically longer (up to 2 ½ times longer) than the body and banded black and white. It has six legs sometimes with bright blue on the legs and feet.
Larvae are large, light cream-colored and do not have legs or a distinct head. Larvae live entirely within the wood of trees and are the most damaging stage of the beetle.
The Asian longhorned beetle (ALB) is a destructive wood-boring pest of maple and other hardwood species. ALB larvae tunnel deep into the wood of host trees to feed; disrupting water and nutrient transport and compromising the structural integrity of the tree. Trees weaken and die with repeated attacks. ALB hitchhiked to the US from Asia in wood packing material cut from infested wood. It was first detected in 1996 on several trees in Brooklyn, NY. Concern that losses could exceed those caused by Dutch elm disease, chestnut blight and gypsy moth combined prompted an emergency order to mobilize regulatory and control actions at the federal level. The only effective means to eliminate ALB is to remove and destroy infested trees. Early detection and rapid response can protect our forests and urban landscapes but we need your help!
The Asian longhorned beetle first came to the US within wood packing material. Now that it is present in select parts of the country, it can move about on its own and unknowingly by people. This photo shows shipping containers waiting to be inspected at port for possible infestation of ALB and other invasive pests and pathogens. ALB can fly distances greater than a mile to find new host trees but because ALB larvae live deep inside trees most of the year, they can easily and unknowingly be transported to new areas in firewood, live trees or fallen timber. The Asian longhorned beetle is just one of many significant “pests” that can spread to new areas by people. Unwanted pests and plant diseases can move into new areas unknowingly on firewood or live plant material. One way to help limit human assisted spread of these plant pests and pathogens is by burning firewood where you cut it. Learn more about human assisted spread of plant pests and pathogens at http://www.dontmovefirewood.org/
ALB has an impressive host list making it extremely dangerous. Preferred hosts include maples (Acer spp.) like red maple, sugar maple, silver maple and Norway maple; horsechestnut (Aesculus spp.); willows (Salix spp.); American elm (Ulmus americana); birch (Betula spp.); sycamore (Platanus spp.) and other hardwood species. A complete list of host trees in the US has not been determined. ALB only attacks hardwoods, so conifers such as pines, spruces, firs and hemlocks are safe from this insect.
Signs and symptoms include:
- Dead or fallen branches
- Dime-sized, 3/8 inch or greater, perfectly round exit holes
- Egg laying sites in the bark
- Sawdust-like excrement (frass) in branch crotches or at the base of trees
If you suspect a tree could be infested with ALB, contact your local extension office to report it. Find your local extension office here http://nifa.usda.gov/partners-and-extension-map
Think you've spotted this pest?
If you think you've found this pest in your landscape contact your local extension office to see about sending in a sample.
Find your local extension office here. | <urn:uuid:eeaf8cfd-113d-4c69-842f-7b067e06ca1f> | CC-MAIN-2017-47 | http://sentinelplantnetwork.org/asian-longhorned-beetle | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806338.36/warc/CC-MAIN-20171121094039-20171121114039-00144.warc.gz | en | 0.936719 | 800 | 3.765625 | 4 |
General information about Halkidiki
Halkidiki is a peninsula, southeast of the city of Thessaloniki (Greece’s second largest city). With its characteristic three peninsulas (Kassandra, Sithonia, Athos), it resembles a trident piercing the Aegean sea. According to the legend the titans Sython and Athon couldn’t share the beautiful mermaid Pallini and caused the anger of Poseidon. He darted his trident and the three fingers-peninsulas of Halkidiki appeared.
Halkidiki belongs to administrative peripherie of Central Macedonia. The capital of Halkidiki is Poligiros, located in the center of Halkidiki (69 km from Thessaloniki).
Halkidiki is a magnificent natural beauty area with a unique flora with crystal clear sea. The length of the peninsula’s seacoast is 850 km. Sunny, golden sandy beaches, picturesque gulfs, traditional villages and modern tourist resorts, small islands and sheltered bays, pine-clad hills descending to the sea, Mediterranean climate and natural beauty attract people from all over the world. Halkididki is a favorite place of holiday as Greeks so foreign tourists. The population of the peninsula is app. 105 000 inhabitants, but it is increases many times over every summer season due to an inrush of tourists and visitors who own their own homes.
Mediterranean climate is very useful and positive for people’s health. The average summer temperature in Halkidiki is 28°С, in winter 0°С
Every-one can find the ideal holiday place according to his demands: he may choose the noisy and lively tourist villages with a large amount of tourists and active night life or smaller family village’s with less tourists and more lay back life style.
History of Halkidiki
Inhabited approximately 700,000 years ago, as revealed by the foundings from the prehistoric area of Petralona Cave.
Alexander the Great’s teacher and well known philosopher Aristotle was born in Stagira in 384 BC.
Halkidiki took its name from the city of Chalkis, located in Euboa, that was colonized in the 8th and 7th century BC. Kassandra took its name from Kassandros (King of Macedonia) , Sithonia from Sithon, a son of God Poseidon and Athos was named after a giant called Athos. In the 9th century the first monastary communities were established in Athos. Today, the monastic state of Athos (also called “Holly Mountain”), is a shelter of Byzantine monasteries, caves, monks, prayers, a “mountain-church” for the thousand-years Christian Orthodox religion. | <urn:uuid:746f75a9-25ef-4d78-b272-d78b8263a146> | CC-MAIN-2019-30 | http://dionisiou-realestate.com/halkidiki/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528290.72/warc/CC-MAIN-20190722221756-20190723003756-00096.warc.gz | en | 0.941231 | 589 | 2.609375 | 3 |
Is a Hindu temple set on the cliff (situated on the coral reef sordid to sea about 80 meters above the sea level) in the south part of Bali Peninsula Indonesia. It is featured by a small dry forest called Alas Kekeran (interdict forest) which belong to the temple and dwelt by a lot of monkeys. The name “Uluwatu” comes from the word Ulu meaning the head and Watu meaning stone. Therefore Uluwatu Temple means the temple built on the tip of coral reef.
The entrance to the main inner temple
Though a small temple was claimed to have existed beforehand, the structure was significantly expanded by a Javanese sage, Empu Kuturan in the 11th Century. Even more remarkable than the temple is its location perched on a steep cliff about 80 meters above the roaring Indian Ocean waves.
Other pictures of the temple
The temple is inhabited by large number of monkeys, who are extremely adept at snatching visitors' belonging, including bags, cameras and eyeglasses. Keep a very close grip on all your belongings and stow away your eyeglasses if at all possible. If you do have something taken, the monkeys can usually be induced to exchange it for some fruit. Needless to say, rewarding the monkeys like this only encourages them to steal more.
The famous “Kecak and Fire Dance” is presented in the temple’s amphitheater which is also on the cliff.
How to get there? | <urn:uuid:c24ff529-de00-45f0-ba57-ce2e75585ac6> | CC-MAIN-2017-43 | http://angelcent.blogspot.com/2011/09/uluwatu-temple.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824899.43/warc/CC-MAIN-20171021205648-20171021225648-00117.warc.gz | en | 0.953957 | 310 | 2.828125 | 3 |
By: Marvell Sharif Hamadani (Grade 5 student of SD Daqu Kalibata City Jakarta)
Heroes are people who have served beyond their call of regular duties. They sacrifice their time and energy for other people. Many years ago when we gained our independence, heroes are fighters who defended our country from the Dutch colonials and oppressors who wanted to colonize back our motherland.
Now in 2017, 72 years after our independence, heroes can be found everywhere. For example, doctors and nurses. They cure and give people medicine, and they also do surgery.
Without them there would be chaos, especially when many people are sick. Many people are getting ill and they would die from diseases. Nurses take care of people and doctors need nurses to assist them in the hospital. They inform the doctors which patients need a doctor the most and also inform them the disease that a patient is suffering.
A hospital is just a building but it will work with the presence of doctors and nurses. A school also is just a building and it will only work with the presence of teachers and staffs in teaching us as school children. Thank you my teachers! | <urn:uuid:3e150731-df40-4644-8c1a-1b8c9c93434a> | CC-MAIN-2018-47 | https://daqu.sch.id/2017/11/03/the-true-meaning-of-heroes-to-students-november-10-heroes-day/?lang=en | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742117.38/warc/CC-MAIN-20181114150002-20181114172002-00080.warc.gz | en | 0.975912 | 236 | 2.953125 | 3 |
While hunting for volcanic plumes on Io, NASA's Hubble Space Telescope captured these images of the volatile moon sweeping across the giant face of Jupiter. Only a few weeks before these dramatic images were taken, the orbiting telescope snapped a portrait of one of Io's volcanoes spewing sulfur dioxide "snow."
These stunning images of the planetary duo are being released to commemorate the ninth anniversary of the Hubble telescope's launch on April 24, 1990. All of these images were taken with the Wide Field and Planetary Camera 2.
The three overlapping snapshots show in crisp detail Io passing above Jupiter's turbulent clouds. The close-up picture of Io (bottom right) reveal a 120-mile-high (200-kilometer) plume of sulfur dioxide "snow" emanating from Pillan, one of the moon's active volcanoes.
"Other observations have inferred sulfur dioxide 'snow' in Io's plumes, but this image offers direct observational evidence for sulfur dioxide 'snow' in an Io plume," explains John R. Spencer of Lowell Observatory in Flagstaff, Ariz.
A Trip Around Jupiter
The three snapshots of the volcanic moon rounding Jupiter were taken over a 1.8-hour time span. Io is roughly the size of Earth's moon but 2,000 times farther away. In two of the images, Io appears to be skimming Jupiter's cloud tops, but it's actually 310,000 miles (500,000 kilometers) away. Io zips around Jupiter in 1.8 days, whereas the moon circles Earth every 28 days.
The conspicuous black spot on Jupiter is Io's shadow and is about the size of the moon itself (2,262 miles or 3,640 kilometers across). This shadow sails across the face of Jupiter at 38,000 mph (17 kilometers per second). The smallest details visible on Io and Jupiter measure 93 miles (150 kilometers) across, or about the size of Connecticut.
These images were further sharpened through image reconstruction techniques. The view is so crisp that one would have to stand on Io to see this much detail on Jupiter with the naked eye.
The bright patches on Io are regions of sulfur dioxide frost. On Jupiter, the white and brown regions distinguish areas of high-altitude haze and clouds; the blue regions depict relatively clear skies at high altitudes.
These images were taken July 22, 1997, in two wavelengths: 3400 Angstroms (ultraviolet) and 4100 Angstroms (violet). The colors do not correspond closely to what the human eye would see because ultraviolet light is invisible to the eye.
Io: Jupiter's Volcanic Moon
In the close-up picture of Io (bottom right), the mound rising from Io's surface is actually an eruption from Pillan, a volcano that had previously been dormant.
Measurements at two ultraviolet wavelengths indicate that the ejecta consist of sulfur dioxide "snow," making the plume appear green in this false-color image. Astronomers increased the color contrast and added false colors to the image to make the faint plume visible.
Pillan's plume is very hot and its ejecta is moving extremely fast. Based on information from the Galileo spacecraft, Pillan's outburst is at least 2,240 degrees Fahrenheit (1,500 degrees Kelvin). The late bloomer is spewing material at speeds of 1,800 mph (2,880 kilometers per hour). The hot sulfur dioxide gas expelled from the volcano cools rapidly as it expands into space, freezing into snow.
Io is well known for its active volcanoes, many of which blast huge plumes of volcanic debris into space. Astronomers discovered Pillan's volcanic explosion while looking for similar activity from a known active volcano, Pele, about 300 miles (500 kilometers) away from Pillan. But Pele turned out to be peaceful. Io has hundreds of active volcanoes, but only a few, typically eight or nine, have visible plumes at any given time.
Scientists will get a closer look at Io later this year during a pair of close flybys to be performed by NASA's Galileo spacecraft, which has been orbiting Jupiter and its moons for nearly 3-1/2 years.
The first Galileo flyby is scheduled for Oct. 10 at an altitude of 379 miles (610 kilometers), and the other will occur on Nov. 25, when the spacecraft will fly only 186 miles (300 kilometers) above Io's fiery surface. If the spacecraft survives this daring journey into the intense Jovian radiation environment near Io, it will send back images with dramatically higher resolution than any obtained before, according to mission scientists.
The Hubble telescope image of Io's volcanic plume is a composite taken July 5, 1997, in three wavelengths: 2600 Angstroms (ultraviolet), 3400 Angstroms (ultraviolet), and 4100 Angstroms (violet). | <urn:uuid:d0b93bfd-4a34-4a7e-ac4b-2f1cc796e16a> | CC-MAIN-2014-41 | http://photojournal.jpl.nasa.gov/catalog/PIA01540 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131545.81/warc/CC-MAIN-20140914011211-00083-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | en | 0.926763 | 998 | 3.53125 | 4 |
Many children with attention deficit hyperactivity disorder, or ADHD, have problems getting good quality sleep. The disorder makes it difficult for children to fall asleep and then sleep deeply, especially if they are affected by other sleep conditions, such as snoring and sleep apnea.
Studies estimate that between half and three-quarters of children with ADHD experience sleep problems. These problems can include:
- Snoring and sleep apnea. Habitual snoring is three times more common in people with ADHD than in those with other psychiatric disorders. Snoring can also be a sign of sleep apnea, which is when a person stops breathing for very short periods of time while asleep. Sleep apnea disturbs restful sleep, often without the person being aware of it.
- Restless leg syndrome. As many as one in four children with ADHD will experience this condition, in which their legs move and jerk to relieve perceived discomfort.
- Periodic limb movement syndrome. This is a condition similar to restless leg syndrome, but it involves the arms as well as the legs.
- Difficulty falling asleep. In one study, between 71 and 84 percent of children with ADHD had a hard time falling asleep.
- Difficulty staying asleep. In the same study, between 27 and 49 percent of children with ADHD tossed and turned in bed, and between 25 and 36 percent woke frequently during the night.
10 Tips for Better Sleep
Parents can do a lot to help a child with ADHD get a better night’s rest:
- Create a bedtime ritual. Ritualized behavior can send a strong signal to the brain that it is time to go to sleep. Create a simple ritual for your child’s bedtime, so it can be followed even if you’re not around.
- Make calming down part of that ritual. Have your child do a relaxing activity prior to bedtime. “Spend about 20 minutes or half an hour in bed with them, reading to them or listening to music — doing something to soothe the child and help him sleep,” says Constance Wood, PhD, a practicing psychologist in Houston. That old standby, a glass of warm milk, may help.
- Unplug before bedtime. Television and video games can rev up a kid who should be calming down. Turn off all the electronics well before bedtime.
- Create an environment conducive to sleep. Make sure the bedroom is cool, dark, quiet, and free of any distractions that might impede or disturb sleep. Put away toys and dim the lights.
- Reserve the bedroom and the bed mainly for sleeping. Remove most toys, games, and other distractions from your child’s bedroom, and make sure playtime occurs in common areas of your home. Don’t let your child play in bed or spend a lot of time in the bedroom — this reinforces that both are reserved for sleeping.
- Encourage self-soothing. Providing a special blanket or stuffed toy for your child to hold while going to sleep can be soothing. The less a child needs your presence, the more easily she will be able to get back to sleep on her own if she wakes up in the middle of the night.
- Enforce a consistent sleeping and waking schedule. Make sure your child stays awake during the day, so he’ll be sleepy at bedtime. Regular bedtimes and waking times can help a young body establish a rhythm.
- Cut out caffeine and sugar. Caffeine and sugar are in a lot of foods, and both are stimulating and can keep your child up late. Read labels and make sure foods and drinks your child has in the evening are caffeine-free and contain very little sugar.
- Treat medical issues. Consult your doctor regarding medical problems like allergies or asthma that could be contributing to snoring, sleep apnea, or other sleep disorders.
- Praise successful sleep. Give your child praise when she makes it through the night with few or no sleep disturbances. This will help reinforce the importance of sleeping quietly through the night.
Sleeplessness is a common problem for children with ADHD, but not an insurmountable one. Parents involved in their children’s lives should be able to help teach how to successfully nod off night after night. | <urn:uuid:8d622090-15ae-4e67-b466-17a56afc5744> | CC-MAIN-2019-04 | https://www.everydayhealth.com/hs/adhd-and-your-child/sleep-better-with-adhd/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656665.34/warc/CC-MAIN-20190116031807-20190116053807-00251.warc.gz | en | 0.951917 | 874 | 3.09375 | 3 |
Article Published May 10th, 2016
By Jonathan Scott, a Canadian writer currently at Cardiff School of Law and Politics. @J_Scott_
American President Barack Obama recently made headlines arguing against a leave vote in the Brexit referendum. Obama’s remarks were the second time in recent weeks the leave campaign was put on the defensive by a North American’s comments, with the Canadian-born Governor of the Bank of England, Mark Carney, warning in March of ‘poor economic outcomes’ should Britain vote to leave the European Union.
However, as persuasive as commentary from North American individuals might be to British voters, it is Canadian legislation that would have been better able to inform British referendum politics and should be seriously considered in future.
The Canadian Clarity Act 2000, written in response to a Supreme Court reference on the parameters of Québec’s possible secession from the rest of Canada, outlines how a referendum should be adjudicated by Parliament.
Why is this Canadian statute relevant to Britain? While the Act refers to the notion of secession of a province from the Canadian federation, one can argue the democratic principles could be extrapolated to any referenda of sufficient gravity. Certainly the Brexit referendum—which is effectively a question of secession from a supranational organisation—seems an area where a law such as Canada’s could apply. The Scottish independence referendum was an even clearer parallel. Indeed, the Act presents a number of useful touchstones that would have served Britain well in the context of the Brexit referendum and should be examined long before another referendum occurs in this country.
Specifically, the Act suggests, ‘the House of Commons, as the only political institution elected to represent all Canadians, has an important role in identifying what constitutes…a clear majority sufficient for the Government of Canada’. This means, in essence, that the House of Commons has to adjudicate the result of a referendum before preceding to negotiate how to enact the will of the referendum.
The requirement for a ‘clear majority’ in the Act is taken to mean, necessarily, more than 50% +1, a sentiment that reflects the Court’s view and is widely supported by scholars, the Canadian Liberal government and the Conservative opposition (although not by secessionist and some soft-nationalist politicians).
In fact, the Act makes clear that this question as to a ‘clear majority’ is more than simply arithmetic. The Act’s utility in adjudicating a referendum is further outlined in section 6.2 which notes what factors are required to show a clear majority:
‘In considering whether there has been a clear expression of a will by a clear majority of the population…the House of Commons shall take into account
(a) the size of the majority of valid votes cast in favour of the secessionist option;
(b) the percentage of eligible voters voting in the referendum; and
(c) any other matters or circumstances it considers to be relevant.’
These factors are significant, as section 6.4 states there will be no negotiations regarding secession, ‘unless the House of Commons determines…there has been a clear expression of a will by a clear majority of the population’.
It is subsection 6.2(c) of the Canada Clarity Act that is very appealing right now in the UK, with The Financial Times ‘poll of polls’ suggesting Brexit is evenly dividing the country; with 44% on ‘stay’ and 42% on ‘leave’, there needs to be more consideration given to how a ‘clear majority’ is actually calculated in a multinational country such as the United Kingdom.
The idea that the House of Commons should be able to weigh up other ‘relevant’ factors would have gone a long way to assuaging concerns about the integrity of the referendum across the whole of the UK. For instance, Canadian scholars and commentators have suggested such factors might include what to do if whole regions of a province or Indigenous peoples in their traditional territories voted overwhelmingly to stay despite a narrow provincial vote to leave overall. Put in British term: what would be done if the UK overall voted narrowly to leave, but Wales voted overwhelmingly to stay? Or, what’s to be done if only a minority of voters turned up at the polls to vote—should 35% turnout at the polls be enough to instigate economic havoc in leaving the EU for the non-voting majority? What about the unique circumstances faced in North Ireland in terms of sharing a land border with the EU because of the Republic of Ireland? These are all fair questions that ought to be considered, and the touchstones in the Clarity Act enable to occur.
Would that such a piece of legislation as the Clarity Act existed in the UK, given the controversy over how a successful referendum might be calculated. A recent Survation poll found that 60% of Scots believe withdrawal from the EU requires more than a ‘simple majority’ but rather an overall majority vote in each of the four constituent countries of the UK. Nicola Sturgeon, the Scottish first minister, has said it would be ‘democratically indefensible’ if a majority vote in the rest of the UK were to force Scotland to leave the EU. In Wales, Plaid Cymru leader Leanne Wood backed Sturgeon, warning of a ‘constitutional crisis if English voters were to railroad the rest of the United Kingdom into leaving the European Union’, according to The Independent.
Indeed, the worst-case scenario is perhaps not a vote to leave, but rather a vote to leave based upon a high anti-Europe vote in England (or worse still, in the south of England) over the objections of the populations of the smaller constituent countries of Wales, Northern Ireland and Scotland, which are generally perhaps more favourable to the EU.
This is where the Clarity Act would have come in useful. Its notion of a ‘clear majority’ is deliberately unenumerated and leaves it to Parliament to determine with regard for the circumstances whether the threshold has in fact been met. In essence, the Clarity Act makes the referendum the start of the process, not the ‘be all and the end all’.
As the Canadian Supreme Court noted, ‘By requiring broad support in the form of an “enhanced majority” to achieve constitutional change, the Constitution ensures that minority interests must be addressed before proposed changes which would affect them may be enacted.’ In a country formed by four nations, but with England representing far and away the majority of the population, surely there ought to be regard for the minority interests of the smaller countries in the UK?
Indeed, the UK is no longer simply a centralised system. Whereas the Parliament at Westminster has, over the past two decades, devolved power to the Welsh National Assembly in Cardiff, the Scottish Parliament at Holyrood and the Northern Irish Assembly in Belfast, there is arguably an implied understanding that the United Kingdom ought to have regard to not simply a majority vote of the country as a whole but of the votes in its constituent nations (and perhaps even with some regard for the vote in the north of England).
It took Canada two close referenda in the 1980s and 1990s to institute the Clarity Act. It’s evidently too late to enact something like the Clarity Act before the Brexit vote, but it would be foolhardy in the extreme if Parliament did not enact some sort of parameters to clarify the rules of the game before another referendum if it wishes to respect the voices of the four countries that make up this United Kingdom.
Jonathan Scott (@J_Scott_) is a Canadian writer currently at Cardiff School of Law and Politics. | <urn:uuid:bc42d84a-8fec-4cb5-a169-8f178cfc37d2> | CC-MAIN-2020-50 | https://fedtrust.co.uk/lessons-from-canada/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141191692.20/warc/CC-MAIN-20201127103102-20201127133102-00354.warc.gz | en | 0.952833 | 1,581 | 2.78125 | 3 |
Based on a detailed analysis of weather data of the last five years in Leh, scientists have attributed the recent cloudburst in the region to prolonged winters which may be due to climate change.
“After going through the sequence of events of the weather that led to the cloudburst on August 6, it has been reinforced that the catastrophe was due to prolonged winters being witnessed in the region,” a source at the Leh-based Defence Institute for High Altitude Research (DIHAR) told PTI.
The analysis by the research institute under the Defence Ministry was done to look into the reasons that triggered the cloudburst in the Leh region on Ladakh, which is usually considered unnatural because it is a rain shadow area.
On condition of anonymity, the source said at a recent meeting on “Evaluation of climate change in Ladakh sector and causes of Cloudburst in Leh,” the scientists at DIHAR had analysed the weather data of the last five years in terms of monthly temperature, rainfall, humidity and snowfall.
The study indicated that increased temperature and hot summers in the plains lead to increased evaporation and subsequent cloud formation in the hills. “This in turn, led to increased duration of snowfall in Ladakh when compared to previous years.
“The winters in Ladakh were found to be prolonged,” the experts concluded though they felt the phenomenon could not be directly associated with climate change given the short range of data.
The region was witnessing unusual phenomenon of bright sunshine in June and July causing melting of snow and high relative humidity (72 per cent) as compared to previous years (50 per cent), the source said. Tracing the change in weather on the basis of the data available, the source pointed out “since snow absorbed the latent heat also, the monthly maximum and minimum temperature remained low and did not shoot up as compared to previous years (2006).
“The low temperature and high relative humidity lead to formation of dense low clouds in the valley. Since the vapour content in the clouds were high and on trying to cross the glaciers, the vapours further condensed.
“The clouds could not retain the water droplets that lead to the cloudburst. Since the rainfall was absent on August 3, 4 and 5 and was negligible on August 7, 8, and 9, the theory of occurrence of a cloudburst in Leh due to prolonged winters may be reinforced,” the meeting said on the sequence of event.
The cloudburst, which led to flash floods and mudslides, claimed about 180 lives and injured about 400 people besides causing widespread damage to public and private property.
The Defence establishment has also initiated research towards preventing soil erosion in case of heavy rains in the area in future in view of climate change. | <urn:uuid:d03939cb-3de3-4d4c-97f6-2d994cac7cda> | CC-MAIN-2014-42 | http://www.thehindu.com/sci-tech/energy-and-environment/climate-change-behind-leh-cloudburst/article593902.ece?ref=relatedNews | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119660038.53/warc/CC-MAIN-20141024030100-00295-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.963696 | 569 | 3.421875 | 3 |
Scott Carpenter 'set the tone for our nation's pioneering efforts beyond Earth'
Scott Carpenter’s sole mission to space in 1962 made him the fourth American to leave the planet and the second to orbit the Earth.
Scott Carpenter, one of the original Mercury astronauts, died yesterday in Denver.
Cmdr. Carpenter’s sole mission to space in 1962 made him the fourth American to leave the planet and the second to orbit the Earth. It was a mission that established him as one of the pioneers of space travel, at a time when NASA was less than a decade old and when what humans expected to experience in space was saddled with huge unknowns. It was also a mission riddled with problems that for years afterwards would yield vexing questions about where to lay blame.
"As one of the original Mercury 7 astronauts, he was in the first vanguard of our space program — the pioneers who set the tone for our nation's pioneering efforts beyond Earth,” said NASA Administrator Charles Bolden, in a statement.
Carpenter was born on May 1, 1925, in Boulder, Colorado. His parents separated when his mother, Florence Kelso (Noxon) Carpenter, was hospitalized for tuberculosis, and he was sent to live with his maternal grandparents. In 1943, he enrolled in Colorado University, spending just one semester there before joining Navy's V-12a program for aspiring pilots at Colorado College.
But the Navy's flight training program ended with the close of World War II, and Carpenter returned to the University of Colorado as a still un-minted pilot. He then left again, before receiving a degree, to rejoin the Navy (he would be awarded a degree in aeronautical engineering from there in 1962). In 1951, he was assigned to Patrol Squadron 6 based at Barbers Point, Hawaii and for the next seven years was transferred around the US, working both as a test pilot and in surveillance.
In 1959, Carpenter was named as one of the original seven Mercury astronauts for NASA’s first manned space program, Project Mercury, and served as the backup for John Glenn’s flight into space, a trip that would make Glenn the first American to orbit Earth. Carpenter’s own turn in space came as something of a fluke: Donald K. (Deke) Slayton, due to be the second man in orbit, was grounded due to health problems. NASA selected Carpenter as his replacement.
So, on May 24, 1962, Carpenter lifted off aboard the Aurora 7 spacecraft, bound for a what was still a barely explored frontier, some 164 miles above the Earth: “It’s hard to realize this now, but there were so many unknowns in the early days,” he would later say, in an interview 32 years later.
During the three-orbit mission, he was tasked with carrying out a number of experiments that would help NASA lay the groundwork for a future lunar landing. This part of the mission went well. Carpenter achieved “all mission objectives,” NASA would later determine: he completed the experiments, some of which yielded valuable results, and identified the so-called “fireflies” previous astronauts had seen dancing in space as, in a disappointing turn, just wastewater from the space capsule’s sewage system. He also ate the first solid space food: small cubes of chocolate, figs, dates, and high-protein cereals.
But then it came time to return to Earth. That’s when things went wrong.
When he landed, plopping into the Atlantic Ocean, Carpenter received a call from Gus Grissom, the capsule communicator at the Cape Canaveral Control Center: Carpenter had overshot his landing, Grissom said. It would be at least hour on the water before NASA personnel would be able to reach him, he said.
Carpenter, it unfolded, was some 250 nautical miles from his target destination, putting him about 135 miles northeast of Puerto Rico. It was an error that, for a terrifying 40 minutes during his descent, had led NASA to fear that he might have died, as well as one that later led to a series of questions: Was the overshoot Carpenter’s fault? Was it possible that an astronaut, too distracted with the adventure of flying, had lost his focus in the craft?
In piecing together the events in the craft, NASA would find that Carpenter had oriented the small end of the capsule some 25 degrees to the right of where it should have been, a mistake that would put him at least 175 miles off course. He had also fired his retro rockets three seconds too late, a difference that added at least another 15 miles to the overshoot.
The rest of the distance may have owed to a mistake made during the first pass over Australia, when Carpenter had failed to turn off one attitude control system as he switched to another, for a time doubling the fuel expenditure. This meant that he was almost out of fuel when it came time for his descent back to Earth.
NASA also noted that, when the temperature control systems began to malfunction mid-flight, the cabin had warmed to 160 degrees before the situation was managed – a sign, it was said, that Carpenter had been too distracted to manage the craft.
“He wasn’t in the right attitude in the space craft,” said Chris Kraft, flight director at mission control, in a 1994 interview. Mr. Kraft had said after the mission that he planned to ensure that Carpenter did not fly again.
At a press conference after the incident, Carpenter acknowledged the criticisms of his flight: “I will admit to being preoccupied,” he said.
But he would also maintain that, despite the trouble he had encountered, he had kept his cool, managing the situation with adroit levelheadedness.
“I do remember thinking maybe I won’t make it, and this is really tight, but also thinking to myself I ought to be worried about this, but I really am not,” he said, in a 1994 interview.
“I thought at that time, I feel almost like I’m somewhere else, looking at this situation interested but not involved,” he said. “And I thought isn’t that handy.”
But Carpenter never did reach space again. While working with the Navy's SEALAB program in Bermuda, Carpenter badly injured his arm in a motorcycle accident, disqualifying him from space flight. Instead, he continued to work as an aquanaut in the SEALAB program, helping to pioneer underwater zero-gravity training and the development of underwater search-and-rescue technologies and other deep-sea capabilities.
In 1969, Carpenter retired from the navy to found Sea Sciences, Inc., a venture capital corporation oriented toward developing programs to protect ocean resources. His retirement included diving in most of the world’s oceans, including beneath the Arctic ice, working as a consultant to the aerospace, oceanic, and film industries, and writing two novels (both categorized as “underwater techno-thrillers”), as well as a memoir.
His long roster of awards includes the Legion of Merit, NASA’s Distinguished Service Medal, and Navy Astronaut Wings. He is survived by his wife, seven children, two stepchildren, a granddaughter, and five step-grandchildren. | <urn:uuid:c60e809a-aa55-44d0-b56f-fb94cca10c11> | CC-MAIN-2017-09 | http://www.csmonitor.com/Science/2013/1011/Scott-Carpenter-set-the-tone-for-our-nation-s-pioneering-efforts-beyond-Earth | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170614.88/warc/CC-MAIN-20170219104610-00443-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.979774 | 1,522 | 2.546875 | 3 |
FDA Approves First Drug to Treat Fibromyalgia: Lyrica
Millions of people suffer from the mysterious, chronic condition of fibromyalgia. There is no known cause for this syndrome of chronic pain, fatigue and sleeping difficulties - and no definitive treatment. On June 21, 2007, the US Food and Drug Administration (FDA) approved use of Pfizer's Lyrica (pregabalin) to treat fibromyalgia. Lyrica has been found to decrease pain and improve function for people with the condition.
Most fibromyalgia patients are women and researchers believe it may be the result of brain changes in the response to chronic stress that result in chronic pain and fatigue. The most common side effects of Lyrica are dizziness and drowsiness. Some people experience swelling of the hands and feet, blurred vision, weight gain or dry mouth. Lyrica is also used as an anticonvulsant and for treating neuralgia (nerve pain) due to shingles and diabetic neuropathy.
Pfizer is doing further studies to test the safety and effectiveness of Lyrica for children and breastfeeding women with fibromyalgia.
Thank you cameradawktor for use of photo.
Recent Blog Posts | <urn:uuid:5d998116-b39e-4e0d-b45d-c0bec53a2be4> | CC-MAIN-2016-36 | http://www.healthline.com/health-blogs/healthline-connects/fda-approves-first-drug-treat-fibromyalgia-lyrica | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982296020.34/warc/CC-MAIN-20160823195816-00151-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.913432 | 250 | 2.6875 | 3 |
It is hardly surprising that International Tiger Day, today – September 28, has almost passed by without even a purr. Few know about it, still fewer remember. In all likelihood that is what is going to happen to the tiger too – it will disappear sans even a protesting growl. Its howls, when trapped or killed mercilessly, are never heard anyway. For a nation that cannot even remember its own national animal on International Tiger Day, perhaps that is the fate that starkly awaits the royal beast. Our Prime Minister is too busy getting ready to sleep himself cosy with George W Bush in Washington. Our political leaders back home are too busy tarnishing each other with communal brushes. Our media is too busy writing about them. And in this din, the tiger can hardly make its voice heard.
It would be a cliched understatement to say that the tiger in India stands endangered. From roughly 40,000 tigers at the beginning of the 20th century, their number dipped to 4,334 in 1989, dropped to around 3,750 in 1993, and dwindled further down to 1,411 (minus those in the Sunderbans) in 2008. But the way anthropogenic pressures on tiger habitats are multiplying and the rate at which tiger poachers get away with impunity, tigers will disappear from India earlier than estimated to. Look at the dismal scenario in the backdrop of the so-called tribal bill, and you will give it fewer days in the wild.
To save the tiger, you need to both shelter it from poachers and protect its habitat at the same time. Let’s concentrate on the latter for first.
By protecting tiger habitats, you eventually safeguard the catchment areas of rivers and enable recharging of groundwater sources. There are 35 Tiger Reserves (both existing and proposed) in India. These are sources of 20 major Indian rivers, including Tapti, Narmada, Mahanadi and Ramganga. Besides, there are hundreds of streams and rivulets in these wild lands. These rivers cumulatively and individually, directly and indirectly, shore up the livelihoods of millions of people far removed from these protected areas. So when you save tiger habitats, you do more than just maintaining the pristineness of the tiger homelands at face value. Much more.
The other major threat to tigers comes from illegal trade and poaching. The number of poachers who are nabbed are too few for comfort. The conviction rate is abysmal and the kingpins always escape from the arms of the law. Worse still, most of the hunters who are caught often happen to be hapless villagers who are coerced into the occupation because of lack of alternative means of livelihoods around the Tiger Reserves.
The tiger, you have to agree, cannot be saved in isolation. You need the support of communities who live in and around Tiger Reserves. But the so-called tribal bill, in its present form, is not the right way to go about it. It does, in no way, seek to ameliorate human-wildlife conflict; in fact, the forest rights bill will only exacerbate the problem to an extent that at the end of the day we will neither have wildlife left and nor forests. You will have people everywhere. And they will no longer have the natural resources at their disposal that have been providing them with sustenance all these years.
Without the active support of the common people, who have not been able to make a dime while India has been shining, the tiger does not have much of a bright future. They can not only salvage the habitat, they can stave off poachers too. But for that, these people must be made stakeholders in the survival of the tiger. Treating them like pariahs and jettisoning them away from the tiger hinterlands in a country which has a dubious track in rehablitating oustees, would only make matters worse. Declaring the areas around Tiger Reserves as community reserves should be the first and safest way to get started. The Indian government is well within its rights to do that. But what it is doing right now is playing populist politics in the name of tribals and forest-dwellers.
Then again, to save the tiger you need a lot of money. As of now, something like Rs 10 crore are spent by wildlife organisations on tiger conservation. But that is something of a hand-to-mouth existence. You probably need around Rs 25 crore to do a decent and effective job of it. The chances are that you are aware of this. But what you probably don’t know is that something like 90 per cent of this money comes in from outside. Right, non-Indians not living in this country are probably more concerned about saving the tiger for us. The scope for Indian corporations to donate to the tiger cause is phenomenal. Yet, you don’t see that happening. Don’t ask me why.
Every other day, we are told by all and sundry how inordinately rich we are, how many Indians have made it to the different Forbes lists, and all that. The corporate honchos subsequently blabber to us how proud they are to be Indians, and all that. But their nationalistic pride cannot make them spare even a penny for their national animal. The tiger indeed is unfortunate to exist in a country whose high net worth individuals (HNWI) denizens don’t want to pay for its survival. You think I am growling for the hell of it? If you think I am, you can go back to seeing your favourite reality show on TV.
Well, three of the eight sub-species of the tiger are extinct in the ranges that they existed. One totters on the brink of extinction. The Indian one (Bengal tiger –Panthera tigris tigris) too might soon join its non-existent cousins sooner than later. With that last roar that you are equally unlikely to hear. | <urn:uuid:b6a87255-468e-4e56-b792-36869a8bf21f> | CC-MAIN-2014-15 | http://www.write2kill.in/critiques/wildlife/todays-international-tiger-day-did-anyone-tell-you.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609527423.39/warc/CC-MAIN-20140416005207-00116-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.959356 | 1,231 | 2.8125 | 3 |
What is wisdom?
Can you give me some examples of wisdom?
What are some unwise things people do at school?
night while Solomon was in Gibeon, the Lord God appeared to him in a dream and said, “Solomon, ask for
anything you want, and I will give it to you.”
My father David, your servant, was honest and did what you
commanded. You were always loyal to him, and you gave him a son who is now
king. Lord God, I’m your servant, and you’ve
made me king in my father’s place. But I’m very young and know so little about
being a leader. And now I must rule your chosen people, even though
there are too many of them to count.
Please make me wise and teach me the difference between
right and wrong. Then I will know how to rule your people. If you don’t, there
is no way I could rule this great nation of yours.
Solomon, I’m pleased that you asked for this. You could have asked
to live a long time or to be rich. Or you could have asked for your enemies to
be destroyed. Instead, you asked for wisdom to make right decisions. So I’ll make you wiser than anyone
who has ever lived or ever will live.
God gave great wisdom to Solomon. Solomon could
understand many things. His wisdom was as hard to measure as the sand on the
seashore.His wisdom was greater than the wisdom of all the
men in the East. And his wisdom was greater than all the wisdom of the men in
Egypt.He was wiser than any other man on earth.
day two women
came to King Solomon,
and one of them said:
Your Majesty, this woman and I live in the same house. Not long
ago my baby was born at home, and three days later her baby was born. Nobody else was
there with us.
One night while we were all asleep, she rolled over on
her baby, and he died. Then while I was still asleep, she got up and took my
son out of my bed. She put him in her bed, then she put her dead baby next to
In the morning when I got up to feed my son, I saw that
he was dead. But when I looked at him in the light, I knew he wasn’t my son.
I held a
baby doll and invited to girls to come forward, and told the story. I asked each girl would it be a good idea to
cut the baby in half and give each a half.
the other woman shouted. “He was your son. My baby is alive!”
“The dead baby is
yours,” the first woman yelled. “Mine is alive!”
They argued back and
forth in front of Solomon, until finally he said, “Both of you say this live baby is yours. Someone
bring me a sword.”
A sword was brought,
and Solomon ordered, “Cut the baby in half! That way each of you can have part of him.”
If you were the mother what would you do?
don’t kill my son,” the baby’s mother screamed. “Your Majesty, I love him very
much, but give him to her. Just don’t kill him.”
The other woman
shouted, “Go ahead and cut him in half. Then neither of us will have the baby.”
said, “Don’t kill the baby.” Then he pointed to the first woman, “She is his
real mother. Give the baby to her.”
in Israel was amazed when they heard how Solomon had made his decision. They
realized that God had given him wisdom to judge fairly. | <urn:uuid:1afc34a1-506e-47ee-8f78-fb473ad59c16> | CC-MAIN-2018-22 | http://www.trinitybiblefellowshipnazarene.com/Wisdom.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863967.46/warc/CC-MAIN-20180521063331-20180521083331-00084.warc.gz | en | 0.984367 | 839 | 2.546875 | 3 |
By the end of this section, you will be able to do the following:
- Describe the scientific reasons for the success of Mendel’s experimental work
- Describe the expected outcomes of monohybrid crosses involving dominant and recessive alleles
- Apply the sum and product rules to calculate probabilities
Johann Gregor Mendel (1822–1884) (Figure 12.2) was a lifelong learner, teacher, scientist, and man of faith. As a young adult, he joined the Augustinian Abbey of St. Thomas in Brno in what is now the Czech Republic. Supported by the monastery, he taught physics, botany, and natural science courses at the secondary and university levels. In 1856, he began a decade-long research pursuit involving inheritance patterns in honeybees and plants, ultimately settling on pea plants as his primary model system (a system with convenient characteristics used to study a specific biological phenomenon to be applied to other systems). In 1865, Mendel presented the results of his experiments with nearly 30,000 pea plants to the local Natural History Society. He demonstrated that traits are transmitted from parents to offspring independently of other traits and in dominant and recessive patterns. In 1866, he published his work, Experiments in Plant Hybridization,1 in the proceedings of the Natural History Society of Brünn.
Mendel’s work went virtually unnoticed by the scientific community, which believed, incorrectly, that the process of inheritance involved a blending of parental traits that produced an intermediate physical appearance in offspring. The blending theory of inheritance asserted that the original parental traits were lost or absorbed by the blending in the offspring, but we now know that this is not the case. This hypothetical process appeared to be correct because of what we know now as continuous variation. Continuous variation results from the action of many genes to determine a characteristic like human height. Offspring appear to be a “blend” of their parents’ traits.
Instead of continuous characteristics, Mendel worked with traits that were inherited in distinct classes (specifically, violet versus white flowers); this is referred to as discontinuous variation. Mendel’s choice of these kinds of traits allowed him to see experimentally that the traits were not blended in the offspring, nor were they absorbed, but rather that they kept their distinctness and could be passed on. In 1868, Mendel became abbot of the monastery and exchanged his scientific pursuits for his pastoral duties. He was not recognized for his extraordinary scientific contributions during his lifetime. In fact, it was not until 1900 that his work was rediscovered, reproduced, and revitalized by scientists on the brink of discovering the chromosomal basis of heredity.
Mendel’s Model System
Mendel’s seminal work was accomplished using the garden pea, Pisum sativum, to study inheritance. This species naturally self-fertilizes, such that pollen encounters ova within individual flowers. The flower petals remain sealed tightly until after pollination, preventing pollination from other plants. The result is highly inbred, or “true-breeding,” pea plants. These are plants that always produce offspring that look like the parent. By experimenting with true-breeding pea plants, Mendel avoided the appearance of unexpected traits in offspring that might occur if the plants were not true breeding. The garden pea also grows to maturity within one season, meaning that several generations could be evaluated over a relatively short time. Finally, large quantities of garden peas could be cultivated simultaneously, allowing Mendel to conclude that his results did not come about simply by chance.
Mendel performed hybridizations, which involve mating two true-breeding individuals that have different traits. In the pea, which is naturally self-pollinating, this is done by manually transferring pollen from the anther of a mature pea plant of one variety to the stigma of a separate mature pea plant of the second variety. In plants, pollen carries the male gametes (sperm) to the stigma, a sticky organ that traps pollen and allows the sperm to move down the pistil to the female gametes (ova) below. To prevent the pea plant that was receiving pollen from self-fertilizing and confounding his results, Mendel painstakingly removed all of the anthers from the plant’s flowers before they had a chance to mature.
Plants used in first-generation crosses were called P0, or parental generation one (Figure 12.3). After each cross, Mendel collected the seeds belonging to the P0 plants and grew them the following season. These offspring were called the F1, or the first filial (filial = offspring, daughter or son) generation. Once Mendel examined the characteristics in the F1 generation of plants, he allowed them to self-fertilize naturally. He then collected and grew the seeds from the F1 plants to produce the F2, or second filial, generation. Mendel’s experiments extended beyond the F2 generation to the F3 and F4 generations, and so on, but it was the ratio of characteristics in the P0−F1−F2 generations that were the most intriguing and became the basis for Mendel’s postulates.
Garden Pea Characteristics Revealed the Basics of Heredity
In his 1865 publication, Mendel reported the results of his crosses involving seven different characteristics, each with two contrasting traits. A trait is defined as a variation in the physical appearance of a heritable characteristic. The characteristics included plant height, seed texture, seed color, flower color, pea pod size, pea pod color, and flower position. For the characteristic of flower color, for example, the two contrasting traits were white versus violet. To fully examine each characteristic, Mendel generated large numbers of F1 and F2 plants, reporting results from 19,959 F2 plants alone. His findings were consistent.
What results did Mendel find in his crosses for flower color? First, Mendel confirmed that he had plants that bred true for white or violet flower color. Regardless of how many generations Mendel examined, all self-crossed offspring of parents with white flowers had white flowers, and all self-crossed offspring of parents with violet flowers had violet flowers. In addition, Mendel confirmed that, other than flower color, the pea plants were physically identical.
Once these validations were complete, Mendel applied the pollen from a plant with violet flowers to the stigma of a plant with white flowers. After gathering and sowing the seeds that resulted from this cross, Mendel found that 100 percent of the F1 hybrid generation had violet flowers. Conventional wisdom at that time (the blending theory) would have predicted the hybrid flowers to be pale violet or for hybrid plants to have equal numbers of white and violet flowers. In other words, the contrasting parental traits were expected to blend in the offspring. Instead, Mendel’s results demonstrated that the white flower trait in the F1 generation had completely disappeared.
Importantly, Mendel did not stop his experimentation there. He allowed the F1 plants to self-fertilize and found that, of F2-generation plants, 705 had violet flowers and 224 had white flowers. This was a ratio of 3.15 violet flowers per one white flower, or approximately 3:1. When Mendel transferred pollen from a plant with violet flowers to the stigma of a plant with white flowers and vice versa, he obtained about the same ratio regardless of which parent, male or female, contributed which trait. This is called a reciprocal cross—a paired cross in which the respective traits of the male and female in one cross become the respective traits of the female and male in the other cross. For the other six characteristics Mendel examined, the F1 and F2 generations behaved in the same way as they had for flower color. One of the two traits would disappear completely from the F1 generation only to reappear in the F2 generation at a ratio of approximately 3:1 (Table 12.1).
|Characteristic||Contrasting P0 Traits||F1 Offspring Traits||F2 Offspring Traits||F2 Trait Ratios|
|Flower color||Violet vs. white||100 percent violet||
|Flower position||Axial vs. terminal||100 percent axial||
|Plant height||Tall vs. dwarf||100 percent tall||
|Seed texture||Round vs. wrinkled||100 percent round||
|Seed color||Yellow vs. green||100 percent yellow||
|Pea pod texture||Inflated vs. constricted||100 percent inflated||
|Pea pod color||Green vs. yellow||100 percent green||
Upon compiling his results for many thousands of plants, Mendel concluded that the characteristics could be divided into expressed and latent traits. He called these, respectively, dominant and recessive traits. Dominant traits are those that are inherited unchanged in a hybridization. Recessive traits become latent, or disappear, in the offspring of a hybridization. The recessive trait does, however, reappear in the progeny of the hybrid offspring. An example of a dominant trait is the violet-flower trait. For this same characteristic (flower color), white-colored flowers are a recessive trait. The fact that the recessive trait reappeared in the F2 generation meant that the traits remained separate (not blended) in the plants of the F1 generation. Mendel also proposed that plants possessed two copies of the trait for the flower-color characteristic, and that each parent transmitted one of its two copies to its offspring, where they came together. Moreover, the physical observation of a dominant trait could mean that the genetic composition of the organism included two dominant versions of the characteristic or that it included one dominant and one recessive version. Conversely, the observation of a recessive trait meant that the organism lacked any dominant versions of this characteristic.
So why did Mendel repeatedly obtain 3:1 ratios in his crosses? To understand how Mendel deduced the basic mechanisms of inheritance that lead to such ratios, we must first review the laws of probability.
Probabilities are mathematical measures of likelihood. The empirical probability of an event is calculated by dividing the number of times the event occurs by the total number of opportunities for the event to occur. It is also possible to calculate theoretical probabilities by dividing the number of times that an event is expected to occur by the number of times that it could occur. Empirical probabilities come from observations, like those of Mendel. Theoretical probabilities, on the other hand, come from knowing how the events are produced and assuming that the probabilities of individual outcomes are equal. A probability of one for some event indicates that it is guaranteed to occur, whereas a probability of zero indicates that it is guaranteed not to occur. An example of a genetic event is a round seed produced by a pea plant.
In one experiment, Mendel demonstrated that the probability of the event “round seed” occurring was one in the F1 offspring of true-breeding parents, one of which has round seeds and one of which has wrinkled seeds. When the F1 plants were subsequently self-crossed, the probability of any given F2 offspring having round seeds was now three out of four. In other words, in a large population of F2 offspring chosen at random, 75 percent were expected to have round seeds, whereas 25 percent were expected to have wrinkled seeds. Using large numbers of crosses, Mendel was able to calculate probabilities and use these to predict the outcomes of other crosses.
The Product Rule and Sum Rule
Mendel demonstrated that pea plants transmit characteristics as discrete units from parent to offspring. As will be discussed, Mendel also determined that different characteristics, like seed color and seed texture, were transmitted independently of one another and could be considered in separate probability analyses. For instance, performing a cross between a plant with green, wrinkled seeds and a plant with yellow, round seeds still produced offspring that had a 3:1 ratio of yellow:green seeds (ignoring seed texture) and a 3:1 ratio of wrinkled:round seeds (ignoring seed color). The characteristics of color and texture did not influence each other.
The product rule of probability can be applied to this phenomenon of the independent transmission of characteristics. The product rule states that the probability of two independent events occurring together can be calculated by multiplying the individual probabilities of each event occurring alone. To demonstrate the product rule, imagine that you are rolling a six-sided die (D) and flipping a penny (P) at the same time. The die may roll any number from 1–6 (D#), whereas the penny may turn up heads (PH) or tails (PT). The outcome of rolling the die has no effect on the outcome of flipping the penny and vice versa. There are 12 possible outcomes of this action (Table 12.2), and each event is expected to occur with equal probability.
|Rolling Die||Flipping Penny|
Of the 12 possible outcomes, the die has a 2/12 (or 1/6) probability of rolling a two, and the penny has a 6/12 (or 1/2) probability of coming up heads. By the product rule, the probability that you will obtain the combined outcome 2 and heads is: (D2) x (PH) = (1/6) x (1/2) or 1/12 (Table 12.3). Notice the word “and” in the description of the probability. The “and” is a signal to apply the product rule. For example, consider how the product rule is applied to the dihybrid cross: the probability of having both dominant traits (for example, yellow and round) in the F2 progeny is the product of the probabilities of having the dominant trait for each characteristic, as shown here:
On the other hand, the sum rule of probability is applied when considering two mutually exclusive outcomes that can come about by more than one pathway. The sum rule states that the probability of the occurrence of one event or the other event, of two mutually exclusive events, is the sum of their individual probabilities. Notice the word “or” in the description of the probability. The “or” indicates that you should apply the sum rule. In this case, let’s imagine you are flipping a penny (P) and a quarter (Q). What is the probability of one coin coming up heads and one coin coming up tails? This outcome can be achieved by two cases: the penny may be heads (PH) and the quarter may be tails (QT), or the quarter may be heads (QH) and the penny may be tails (PT). Either case fulfills the outcome. By the sum rule, we calculate the probability of obtaining one head and one tail as [(PH) × (QT)] + [(QH) × (PT)] = [(1/2) × (1/2)] + [(1/2) × (1/2)] = 1/2 (Table 12.3). You should also notice that we used the product rule to calculate the probability of PH and QT, and also the probability of PT and QH, before we summed them. Again, the sum rule can be applied to show the probability of having at least one dominant trait in the F2 generation of a dihybrid cross:
|Product Rule||Sum Rule|
|For independent events A and B, the probability (P) of them both occurring (A and B) is (PA × PB)||For mutually exclusive events A and B, the probability (P) that at least one occurs (A or B) is (PA + PB)|
To use probability laws in practice, we must work with large sample sizes because small sample sizes are prone to deviations caused by chance. The large quantities of pea plants that Mendel examined allowed him calculate the probabilities of the traits appearing in his F2 generation. As you will learn, this discovery meant that when parental traits were known, the offspring’s traits could be predicted accurately even before fertilization. | <urn:uuid:79af20eb-a312-4103-a89c-5f434d5766bc> | CC-MAIN-2021-21 | https://openstax.org/books/biology-2e/pages/12-1-mendels-experiments-and-the-laws-of-probability | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990419.12/warc/CC-MAIN-20210511214444-20210512004444-00550.warc.gz | en | 0.955272 | 3,361 | 3.84375 | 4 |
What Is Wireless Securityby Swayam Prakasha
In this Article:
- Basic Security Measures in the 802.11x Standard
- Types of Wireless Network Attacks
- Preventive Measures
- Security Protections for Your Organization
The new standard in wireless networks--802.11g--offers speed, security, and performance. It is also the most widely employed standard in corporate internal wireless LAN networks. You can transfer data at up to 54Mbps using 802.11g (which is five times the speed of older 802.11b wireless networks). And wireless LANs provide some obvious benefits: they always provide on-network connectivity, they do not require a network cable, and they actually prove less expensive than traditional networks. Wireless networks have evolved into more affordable and logistically acceptable alternatives to wired LANs. But to take advantage of these benefits, your wireless LAN needs to be properly secured.
Network security in a wireless LAN environment is a unique challenge. Whereas wired networks send electrical signals or pulses through cables, wireless signals propagate through the air. Because of this, it is much easier to intercept wireless signals. This extra level of security complexity adds to the challenges network administrators already face with traditional wired networks. There are a number of extremely serious risks and dangers if wireless networks are left open and exposed to the outside world. This article covers the types of attacks wireless networks encounter, preventive measures to reduce the chance of attack, guidelines administrators can follow to protect their company's wireless LAN, and an excellent supply of online resources for setting up a secure wireless network.
Let's have a look at some of the security features available in the 802.11x wireless standard.
Service Set Identifier (SSID):
SSID is meant to differentiate one network from another. SSID is the identification string used by the wireless access points by which clients are able to initiate connections. SSID settings on your network should be considered the first level of security, and should be treated as such. In its standards-adherent state, SSID may not offer any protection to who gains access to your network, but configuring your SSID to something not easily guessable can make it harder for intruders to know what exactly they are looking at. For each wireless access point you deploy, it is very important to choose a unique and difficult-to-guess SSID. Also, by default, wireless gateways happily broadcast the SSID to be picked up by any wireless network device for easy configuration. Hiding the SSID by disabling the SSID broadcast makes the life of an intruder tough.
Before a wireless client and an access point start communicating, they are expected to start a dialogue. This process is called associating. When the 802.11x standard came into the picture, IEEE added an extra feature that allows networks to require authentication immediately after a device associates. This authentication can be considered as an extra layer of keyed security. There is a weakness in this, as it involves a clear text transmission. Thus it is possible for an attacker to get hold of the keys.
Wired Equivalent Privacy (WEP):
WEP is a standard method for encrypting traffic over a wireless network. WEP was intended to give wireless users security equivalent to being on a wired network. With WEP turned on, each packet to be transmitted is first encrypted and then passed through a shredding machine called RC4. 128-bit encryption is preferred over 64-bit encryption, as it is lot more difficult to break. A major problem associated with WEP is key management. When we enable WEP according to the wireless standard, we need to visit each wireless device that we use and type in the proper WEP key. If the key is compromised due to some reasons, either you have to change the key or lose all security. Also, if you have hundreds of users on your network, changing the WEP key creates lots of difficulties. Thus, though WEP has several weaknesses, using WEP is better than not using it.
As in wired networks, the basic controls you'll need include a host system that authenticates the user or device attempting to access the network, and encryption that protects the data as it travels from the user device to the access point, whether to ensure confidentiality or to ensure that no one has tampered with the message or changed its content. The wireless networks based on 802.11x have been plagued by some well-publicized security failings. The IEEE 802.11x protocol provides a different approach to security and security management that overcomes the failings of 802.11x Wired Equivalent Privacy (WEP). The following is the list of some of the main known security risks.
The Wireless Equivalent Privacy (WEP) encryption built into 802.11x can be compromised relatively easily. Wireless sniffing programs, such as AirSnort, can implement attacks that exploit these weaknesses. WEP has some known weaknesses in how the encryption is implemented. Keep in mind that using WEP is better than not using anything; it at least stops casual sniffers.
Let's take a closer look at each type of wireless network attack listed above.
Insertion attacks: These occur when you place unauthorized devices on the wireless network without going through a security process and review. This type of attack can happen when an attacker tries to connect a wireless client to an access point without authorization. It is possible to configure the access points so that they require a password for client access. If there is no password, an intruder can connect to the internal network simply by enabling a wireless client to communicate with the access point.
Interception and monitoring of wireless traffic: As in wired networks, it is possible to intercept and monitor the network traffic across a wireless LAN. For this type of attack to take place, the only condition that needs to be satisfied is that he/she needs to be within the range of an access point.
Misconfiguration: Many access points ship in an unsecured configuration so that they can be handled and deployed easily. Unless each unit is configured prior to deployment, these access points will be a high risk for attack or misuse.
Client-to-client attacks: Two wireless clients can communicate with each other, bypassing the access point. Therefore, there is a need for the users to defend the clients not just against an external attack but also against each other.
Jamming: DoS (Denial of Service) attacks are easily applied to the wireless world, where legitimate information cannot reach the clients or access points, mainly because the legitimate traffic overwhelms the frequencies.
By gathering enough "interesting" packets, that is, those that contain weak initialization vectors (starting keys), the sniffers can decrypt WEP-encoded messages by breaking the keys employed by WEP. Some vendors are trying to fix this problem through firmware updates that provide "weak key avoidance."
Pages: 1, 2 | <urn:uuid:c38cc8be-a3e2-4fd9-9294-8a3838aae8d6> | CC-MAIN-2014-10 | http://www.oreillynet.com/pub/a/security/2006/03/30/what-is-wireless-security.html | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010693428/warc/CC-MAIN-20140305091133-00055-ip-10-183-142-35.ec2.internal.warc.gz | en | 0.938173 | 1,406 | 3.09375 | 3 |
Ambitious technologists have claimed for decades that self-driving cars are the future. Yet, looking at recent years, the biggest revolution has come from vehicles on two wheels, not four. Fueled by the pandemic, increased oil prices, climate change and the desire for healthier lifestyles, we are now living in the midst of a bicycle renaissance. But to understand how we got here, it is crucial to look back. When the automobile became more widespread in the early 1900s, it quickly became a symbol of progress along with all it entailed: speed, privatisation and segregation. Adopting a car-centric approach, urban planners had to reorganise entire cities to separate traffic. Cars took over public spaces that used to host dynamic city life and parking lots, highways and gas stations became common landscapes. Pedestrians that once ruled the streets were herded into sidewalks and children relegated to fenced playgrounds. Ironically, cities were being designed for cars (not humans). | <urn:uuid:764775b8-ecb6-41b6-abb7-6126a201245d> | CC-MAIN-2023-06 | https://www.82alliance.com/post/the-future-of-mobility-has-two-wheels-copenhagen-s-bike-friendly-architecture-arch-daily | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00731.warc.gz | en | 0.984075 | 197 | 3.046875 | 3 |
The little spotted cat is a wild cat species found in South America. It is the smallest of the three cats in its genus Leopardus, which includes the ocelot and the margay. Adults weigh only 4 to 8 lbs on average and can only reach up to 25.5 inches long. The tail can reach up to 13 inches long. Males are slightly larger than females. Their coats are typically tan to tawny in color and marked with black-blotchy spots, and there are black rings on the tail. There are also pale markings appearing on the face. The back of the ears are black with a white spot, the fur is thick, soft, and short, and the underparts are white. Although adults have a small frame, they are excellent climbers and hunters.
This species is found in subtropical, humid evergreen and mountain cloud forests. They have also been reported in semi-arid thorn scrub in northeastern Brazil, dry deciduous forests in Venezuela, and also abandoned eucalyptus plantations. They are not commonly seen, and it is believed that they are nocturnal and solitary. Males are territorial and patrol boundaries, and they are even aggressive toward females. Diet consists of small rodents, birds, insects, and reptiles. They have also been observed eating small primates in Brazil. The reproductive behavior of this species is only known through the study of mating pairs in captivity. Females give birth to one to two kittens after a gestation period of 74 to 78 days.
This species is threatened with extinction due to hunting for its fur and deforestation. It is legally protected in several countries, but in others, hunting is still allowed. The habitat of the species is commonly used for coffee plantations, but sightings in deforested areas and abandoned plantations suggest an ability to adjust to human disturbance.
Little Spotted Cat Facts Last Updated: May 9, 2017
To Cite This Page:
Glenn, C. R. 2006. "Earth's Endangered Creatures - Little Spotted Cat Facts" (Online).
Accessed 5/25/2020 at http://earthsendangered.com/profile.asp?sp=65&ID=5.
Need more Little Spotted Cat facts?
The Seven Sea Turtle Species of the World
Sea turtles are graceful saltwater reptiles, well adapted to life at sea. Unlike
turtles on land, sea turtles cannot retract their legs and head. But with streamlined bodies and flipper-like
limbs, they are graceful swimmers able to
navigate across the oceans of the world.
Here, we look at the seven species that can be found today, all of which are said to have been around since the time of the dinosaurs. | <urn:uuid:b3434bac-5067-4832-9de1-ee3f85c2dcc7> | CC-MAIN-2020-24 | http://earthsendangered.com/profile.asp?gr=M&view=c&ID=5&sp=65 | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390448.11/warc/CC-MAIN-20200526050333-20200526080333-00449.warc.gz | en | 0.961965 | 557 | 3.234375 | 3 |
They are sketches by sailors and drawings by priests – lines on paper hundreds of years old that show islands and coastlines whose shapes often look decidedly different from their modern representation.
But across Asia, those centuries-old maps have become objects of modern desire as countries look to the past for ammunition in a battle over ownership rights in waters vital to trade and defence.
On Tuesday, a court in The Hague is expected to rule on a key fight over maritime ownership in the South China Sea between China and the Philippines. The decision by the little-known Permanent Court of Arbitration will form a major international test of the complex and conflicting claims that countries have laid over the region's waters, and in particular China's bid to own most of the South China Sea.
But behind the legal arguments before the arbitration tribunal, Asian nations have been engaged in a high-stakes bid to gather symbolic proof of rightful ownership, which has great value in the court of public opinion. To do that, they have turned to old maps, seeking confirmation from the fading scribblings of mariners, functionaries and scholars – and, in at least one case, a stone inscription nearly a millennium old – of who rightfully owns what.
"There has been a noticeable uptick in interest in European maps that assign certain East Asian islands to one regional group or another," said Kevin Brown, the founder of Geographicus Rare Antique Maps in Brooklyn.
Chinese depictions, too, have become valuable commodities, since it is Beijing's unbending imposition of its claims through the construction of hotly disputed artificial islands that has brought long-standing international arguments to a boil. The priciest map in Mr. Brown's current inventory is the earliest known print of the All-Under-Heaven Complete Map of the Everlasting Unified Qing Empire, listed at $250,000 (U.S.).
Over the last decade, prices for rare Chinese maps have risen five and even 10 times in value, dealers say, mostly because wealthy Chinese have begun to collect.
But the parallel rise in demand for aged portrayals of maritime territory offers a window into the huge effort countries have put into buttressing their claims to islands and waterways that hold natural resources, shipping routes and, for many nations, national pride.
As a visual symbol, little matches a map's potency at showing dominion over land and sea. In 2003, the U.S. Library of Congress paid one of the highest prices ever for a map, spending $10-million to acquire the first-ever document to use the term "America."
For China, "it's about constructing a superpower. They want to show that China is big and powerful. And so every inch of territory you can claim as Chinese is awfully good," said Timothy Brook, a historian at the University of British Columbia who specializes in China.
"They search for maps as though there's some kind of magic proof of a political claim," he said.
The most prominent is a relatively recent one, a 1947 map published by the Republic of China – the government that later fled to Taiwan from Mao's Communists – that placed 11 long dashes in a curving U-shape encompassing virtually the entire South China Sea, a 3.5-million-square-kilometre body of water.
Modern Taiwanese leadership has said the lines (subsequently reduced to nine, then raised to 10) are only meant to show which islands are Chinese. But in 2009, Beijing told the United Nations it also claims the entire surface and seabed contained inside its massive reach.
The race for old maps comes partly in response, as China's neighbours seek counter-evidence – "mostly because historic cartography does not support China's claims," Mr. Brown said.
In the Philippines, a senior Supreme Court justice, Antonio Carpio, conducted a lengthy review of 60 historical maps, some of them stone and silk drawings dating to 1136. Each of the Chinese documents he amassed depicts China extending only as far south as Hainan Island, whose shores lie more than 1,500 kilometres from the farthest point of the country's nine-dashed-line, which Mr. Carpio has called "a gigantic historical fraud."
The government of Vietnam has purchased a copy of the Postal Atlas of China from Mr. Brown. The atlas was printed for several decades in the early 20th century and shows no Chinese authority over islands in the South China Sea.
Other nations are also "looking to buttress the arguments as to who can claim the sea as their territorial waters," said Barry Ruderman, owner of Barry Lawrence Ruderman Antique Maps in La Jolla, Calif.
Several of his clients "are very specifically focused on defining China or its neighbours through maps," he said. "They're definitely asking for specific groups of islands and specific concepts."
China, meanwhile, has sought to marshal its own claims. Later this year, Chinese researchers will publish two books compiling old maps.
"People who are familiar with Chinese documents and maps will know that China had the earliest records of the Diaoyu Islands" – known as the Senkaku Islands in Japan, which also claims them – "and the islands in the South China Sea," said Chen Jiarong, a senior consultant at the China Maritime Navigation History Research Institute, who has worked on the two books.
Still, international law has placed strict limits on the usefulness of maps, which "merely constitute information, and never constitute territorial titles in themselves alone," the International Court of Justice wrote in a 1986 ruling.
That's doubly true in the China-Philippines case now before the Permanent Court of Arbitration, where "the issues do not include sovereignty over land territory [such as islands]. Thus, even official maps showing claims to islands would not be relevant," said Paul Reichler, the lead counsel for the Philippines side, in an e-mailed response. The court will, instead, rule on the Philippines' maritime entitlements, which directly places into question the validity of China's nine-dashed line.
China has rejected the arbitration, and refused to participate. It has instead waged war on modern maps it doesn't like.
At the beginning of this year, it outlawed possession of all maps that don't match its regulations, or which could "harm national honour." Authorities have seized globes that do not conform to China's view of the world from foreigners leaving the country. Beijing's sway is obvious on digital mapping software from Apple and Microsoft, which include the dashed line.
But China has struggled to find support even in the most promising of historical documents. Take the Selden map, a 17th-century depiction of trading routes across the South China Sea. It was brought to England by John Selden, a prominent jurist who made the case that countries can "claim jurisdiction over the ocean – the very claim China now makes over the South China Sea," writes Prof. Brook in Mr. Selden's Map of China, a book about the history of the document.
The hand-drawn map, originally bought from a Chinese merchant, is "the only detailed and geographically specific Chinese depiction of these waters before the nineteenth century," he wrote. When it was discovered in an Oxford University library in 2009, it stoked hope that it could "be the winning card in the diplomatic game China plays with its neighbours."
In reality, it does nothing of the sort. "This is a non-political map of East Asia. The only country that's named is Korea," he said.
That's in keeping with the nature of the waters themselves. "China is making unilateral claims over zones that are very much multilateral and international zones," Prof. Brook said.
The hunt for old maps, meanwhile, has left even the dealers shaking their heads.
"A lot times people come to me and they like a map because it shows this or that island belonging to this or that country. If it's a Western map, the islands are dots. And if the dots happens to be one colour, they buy it. If it happens to be another colour, they don't buy it," said Mr. Brown.
The problem: Those maps were printed in black and white, before being sent to colourists who "weren't scholars," he said. That led to variations in colours used – colours now being interpreted as assigning national ownership – even between different copies of identical maps.
"The notion that a map from 1825 that shows this island or that island belonging to China or to Japan or to Vietnam has any meaning whatsoever is utterly absurd," Mr. Brown said.
With a report from Yu Mei | <urn:uuid:04b5105d-fc0b-4bff-99be-f45ab6d35e8d> | CC-MAIN-2019-39 | https://www.theglobeandmail.com/news/world/asian-nations-seek-historic-items-in-bid-to-prove-maritime-rights/article30847890/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571360.41/warc/CC-MAIN-20190915114318-20190915140318-00030.warc.gz | en | 0.962416 | 1,762 | 2.84375 | 3 |
Can you end a sentence with a preposition?
There are numerous myths relating to grammatical dos and don’ts, many of which were drummed into us at school. The one that stubbornly refuses to budge from my mind is the diktat ‘never start a sentence with a conjunction such as and or but’. Another one is that one cannot end a sentence with a preposition. Let’s try to zap the one – sometimes referred to as stranded prepositions – and lay it to rest once and for all.
A prepositional primer
First, a quick recap of the basics:
- A preposition is a word such as with, by, on, in, at, to, or about.
- Prepositions are a class of word used to express the relationship between the elements of a sentence or clause.
- A preposition connects a verb, noun, or adjective to a noun or pronoun and is typically, but not always, found before the noun or pronoun in a sentence or clause. For example:
- The noun or pronoun that follows the preposition forms a ‘prepositional object’ (or complement). You should therefore use pronouns in the objective (for instance, me, her, him, us) rather than the subjective form (I, she, he, we).
- The relationship between the preposition and the other elements can describe:
– time (we’re meeting him on Tuesday)
– the way in which something is done (I went to Milan by train)
– place or position (the cat was under the table; we met at the station)
– possession (a friend of mine)
– purpose (the operation was done for the best of reasons)
Latin-obsessed 17th century introverts…
Some of these groundless rules (termed ‘fetishes’ by Henry Fowler in 1926) have a long history. Back in the 17th and 18th centuries, some notable writers (aka Latin-obsessed 17thcentury introverts) tried to make English grammar conform to that of Latin – hence the veto on split infinitives as well as the current preposition confusion.
The word ‘preposition’ ultimately derives from Latin prae ‘before’ and ponere ’to place’. In Latin grammar, the rule is that a preposition should always precede the prepositional object that it is linked with: it is never placed after it. According to a number of other authorities, it was the dramatist John Dryden in 1672 who was the first person to criticize a piece of English writing (by Ben Jonson) for placing a preposition at the end of a clause instead of before the noun or pronoun to which it was linked.
This prohibition was taken up by grammarians and teachers in the next two centuries and became very tenacious. English is not Latin, however, and contemporary authorities do not try to shoehorn it into the Latin model. Nevertheless, many people are still taught that ending a sentence or clause with a preposition should be avoided.
This is the sort of English up with which I will not put!
Although Ben Zimmer seems to have laid to rest the myth that the above witticism can be attributed to Winston Churchill, the quote illustrates that trying to avoid a stranded preposition could lead you to get your linguistic knickers in a terrible twist.
In fact, there are four main types of situation in which it is more natural to end a sentence or clause with a preposition:
- passive structures (she enjoys being fussed over)
- relative clauses (they must be convinced of the commitment that they are taking on)
- infinitive structures (Tom had no-one to play with)
- questions beginning with who, where, what, etc. (what music are you interested in?)
Most attempts to avoid stranding or deferring prepositions in the following examples end up sounding over-formal, awkward, or like Yoda in Star Wars:
|Stranded preposition||Preposition before noun or pronoun|
|Gail has much to be happy about.||Gail has much about which to be happy. [over-formal]|
|Martin persuaded Lucy that there was nothing to be frightened of.||Martin persuaded Lucy that there was nothing of which to be frightened. [over-formal]|
|The house hadn’t been paid for, so they had to sell it.||Paid for the house had not been, so they had to sell it. [not good English]|
|Who were you talking to?||To whom were you talking? [over-formal]|
|The tennis match was rained off.||Rained off the tennis match was. [not good English]|
|He wondered where she had come from.||He wondered from where she had come. [over-formal]|
|She often said things that were inappropriate, but think of the pressure she was under.||She often said things that were inappropriate, but she was under a great deal of pressure. [less emphatic]|
To sum up, the deferring of prepositions sounds perfectly natural and is part of standard English. Once you start moving the prepositions to their supposed ‘correct’ positions you find yourself with very stilted or even impossible sentences. Well-established and famous writers over the years, such as George Orwell, Anthony Burgess, and Julian Barnes, have been blithely stranding their prepositions to no ill effect: please feel free to go and end a sentence with a preposition! | <urn:uuid:e7731b83-ba2d-464f-9689-4090e112e255> | CC-MAIN-2019-09 | https://blog.oxforddictionaries.com/2011/11/28/grammar-myths-prepositions/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247496855.63/warc/CC-MAIN-20190220230820-20190221012820-00133.warc.gz | en | 0.965936 | 1,186 | 2.6875 | 3 |
Corporal punishment is best defined as physical punishment. It is meant to cause physical pain to the child being disciplined and is done on purpose. There is nothing accidental about it. For example, a teacher may have a student that is misbehaving in class and acting out. The teacher or principal then uses a paddle of some sort to spank or hit the child. This is supposed to stop the unwanted behavior. Another example would be a parent that strikes their child as a means of discipline. The items used to strike the child may be hangers, belts, hands, sticks etc. Both examples are considered to be corporal punishment. I believe that corporal punishment is abuse. Whenever someone hitís a child, it is physical abuse. Period.
What shocks me is that there are currently thirteen states, within the United States, that still allow corporal punishment at school, as a form of discipline. Before researching this topic, I personally thought that we had come such a long way in the U.S. and that corporal punishment was just not acceptable anymore. Sadly, I was wrong.
Corporal punishment does not bring about respect; instead, it causes children to be fearful. As I said in an earlier article, hitting a child does not bring about respect for the caregiver. Children deserve to be respected. I am well aware that there are some people that will disagree with me. However, I am a firm believer that spanking and hitting brings about the desired behaviors that the caregiver wants, but only because of fear. Children will not necessarily respect their caregiver when they are hit by them. Neither is it a good way to try to bring about changes in behavior. Corporal punishment breeds fear.
I believe that corporal punishment does not only cause physical pain, but mental and emotional anguish as well, for the child. The pain that is inflicted can create inner turmoil for the child being physically disciplined. I would never allow any school administrator to physically hit either of my children. I believe that there are healthier ways to discipline a child. Itís time to end corporal punishment in the schools, as well as in individual homes across the country. | <urn:uuid:23182715-bef6-453f-a793-8c7237a9ad65> | CC-MAIN-2015-14 | http://www.bellaonline.com/ArticlesP/art19348.asp | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300905.36/warc/CC-MAIN-20150323172140-00039-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.972629 | 439 | 2.828125 | 3 |
Gaining timely and efficient access to target biomolecules through cellular lysis is a critical step in bioscience research and development. Researchers at Sandia National Laboratories developed a miniature acoustic lysis system (mALS) that uses high frequency acoustic waves to rapidly disrupt cellular membranes for the release and extraction of DNA, RNA, and proteins without chemicals or additional processing.
The miniature acoustic wave lysis system (mALS) improves on commercially available lysing technologies with its rapid sample processing, minimal sample modification, condensed power and space requirements, and compatibility with high-throughput assays, nano/micro-fluidic and point-of-care devices. The mALS’ versatility and lysing effectiveness hold promise for rapid sample preparation in diverse settings, such as global health and research applications.
This portable system consists of a compact, five channel array of miniature acoustic transducers and a disposable plastic cartridge that processes the cellular samples. The acoustic transducer array eliminates all thermal variation in contact with the plastic cartridges. Each acoustic transducer, fabricated using lithium niobate (LNBO), is driven by a radio frequency (RF) signal at 68 MHz coupled to a small 2W RF amplifier. The acoustic transducer has an area of 5 mm2 where the fluidic processing region scales as 1 channel for every 5.5 cm2 cartridge space.
The system requires no external cooling and can operate under battery power or with a small switching power supply. Each element can efficiently and independently release genomic material or proteins rather than requiring multiple elements to process them. Compared to a bench-top acoustic lysis system, the mALS has been used to lyse E. Coli bacteria with a lysing dose (defined as ATP released per joule) 2.2x greater and with 6.1x more ATP released. An electric field-based nucleic acid purification approach using Nafion films yielded an extraction efficiency of nearly 70% in 10 min for 50 μL samples.
Applications and Industries
- Infectious disease monitoring
- Genetic analysis
- Global health
- High throughput: Nearly 70% extraction efficiency in 10 minutes for 50 μL samples
- Increased effectiveness: Releases 6.1x more ATP than current bench-top acoustic lysis systems
- Integration with nano/microchannel devices
- Improved safety and biohazard containment
- Reduced cost, power, and space requirements | <urn:uuid:f92c5483-0d58-4e37-9499-0da59b310669> | CC-MAIN-2021-31 | https://covid19.labpartnering.org/lab-technologies/52da5bac-d65c-4a07-9f45-469bac7e640a | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.6/warc/CC-MAIN-20210731105716-20210731135716-00283.warc.gz | en | 0.888925 | 492 | 2.921875 | 3 |
An organizational assessment is a process for obtaining accurate and concise information about the performance of a business and the factors that affect an organization's productivity. The report identifies areas of competence, room for improvement, and risks to modify decisions and support investment. It serves as an answer to the question, "How are we doing as an organization?" It demonstrates what you do well and highlights areas with low performances. The report is an internal feedback process to identify a company's strengths and weaknesses. The organizational framework encompasses four areas: external environments, capacity, motivation and performance.
Abstract and Introduction
Write the organizational assessment's title, author name and date on the cover, in addition to the name of the organization. Provide the duration length and overall project budget on the first page.
Identify any assessment donors and write who commissioned the report. Provide an evaluation objective on the first page. Write a two to three sentence summary detailing the report's mission, goals and objectives.
Include an introduction that outlines the organization's history. Discuss the methodology that will be used to evaluate the organization's effectiveness. Cite any previous assessments that have used similar methods.
Meet and interview a variety of stakeholders, including clients, human resources managers, support staff and beneficiaries. Utilize quantitative and qualitative measurements to discuss diversity, interpersonal conflict and employee needs in the report. Observe and record the dynamics among people and their levels of participation.
External Environment and Capacity
Tour relevant facilities including project sites, buildings and information systems. Describe the interior and exterior in great detail. Emphasize technological or structural advancements.
Write how the work paradigm is affected by spaces. Identify relevant equipment, hardware, electricity and lightning.
Assess the formalities under which the organization operates, including the legal framework, intellectual rights and labor rights. Identify the company's norms and values. Provide its mission statement as well as any causes or organizations it supports. Describe the economy, labor market and environmental constraints that affect the organization.
Identify the strengths and weakness of the organization capacity, beginning with leadership within the organization. Uncover how tasks are done, how goals are set and which direction the company wishes to take. Observe the operating expenses and how they are managed by company leaders. Find out who is accountable for finances. Forecast monetary requirements and needs.
Motivation and Performance
Collaborate with the human resources department to determine how recruiting, staffing and training take place. Decide if there are opportunities for career development and staff evaluation. Describe the quality of working life and uncover any issues concerning diversity, health or safety. Identify any inter-organizational linkages such as partnerships, memberships and online networks.
Analyze the organization's history and document its significant awards, achievements and setbacks. Identify changes in leadership and size. Uncover the employees' general attitudes concerning work, colleagues and values. Question opinions on prestige, intellectual freedom and remuneration. Evaluate the mission statement to see how effectively it shapes the organization.
Ensure company sustainability by measuring the effectiveness of its programs, client expectations, services and responsibilities in relation to its mission. View data on staff productivity, including reports or turnover rates and absenteeism. Identify any room for improvement in the financial and managerial reports. Measure the efficiency of work procedures and goals.
Determine whether the organization has kept its relevance over time regarding the stakeholder needs, reputation and sustainability. Review data to see if the organization is financially viable, as well.
Offer recommendations and future courses of action based on what was revealed in the report. Provide specific sources, including appropriate implementations, budgets and key audiences that will benefit from such recommendations.
Use an appendix to cite any sources in a references section. Include biographies for the organizational assessment team, as well.
Conduct a follow-up assessment to determine areas of improvement and, if necessary, areas where additional improvement is needed. Communicate the report in a manner that can be easily understood by everyone.
Nicole Newman is a Dartmouth College associate who works in Tiltfactor Laboratory, Dartmouth's premier game design center. Her research has included investigating the digital humanities through "Writing as a Dimensional Artifact" and "Evolution of the Ghetto: The Decline of America’s Inner Cities," a research initiative on urban design. | <urn:uuid:dd3bfc0a-116b-48d3-b6db-c5fd59d767a8> | CC-MAIN-2021-43 | https://bizfluent.com/how-7183835-write-organizational-assessment-report.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588244.55/warc/CC-MAIN-20211027212831-20211028002831-00057.warc.gz | en | 0.931772 | 880 | 3.046875 | 3 |
St Mary's Lowe House
St Mary’s Lowe House has been dubbed “The Basilica of St Helens” and “The Poor Man’s Cathedral”.
These titles are very apt considering the current church was built using money collected from working class people during the depression.
In 1793 Mrs. Eccleston (whose maiden name was Lowe), the widow of John Gorsuch Eccleston of Eccleston Hall donated a piece of land for a chapel to be built on it. The church which was built was replaced with the current building which was the brain child of Fr. Reginald Riley SJ who was the parish priest from 1912 to 1946.
The current church design has been described as ‘free Romanesque’, that is, Romanesque fused with such Gothic features as the rib vaulting of the nave, aisles and transepts, the flying buttresses and octagonal crossing tower with castellations. The dome is a Renaissance embellishment and is somewhat controversial.
The renowned architectural historian, Nicolaus Pevsner, commented “It would have been better if the dome had never been built”. Be that as it may, the tower and dome of St Mary’s Lowe House continue to dominate the skyline of St Helens.
The impressive dome rises from an equally impressive castellated octagonal tower above the meeting point of the nave, sanctuary and transepts. The copper cross surmounting the dome is 16 feet high. It was given by the wife and daughter of Mr James Yearsley. (Mr Yearsley, with the help of unemployed miners, had laid the foundations of the church before it was taken over by the builders. Three builders of the parish, C J Middlehurst, J Yearsley and A Forbes formed themselves into a company for the construction of the church.
What is a Carillon?
The carillon is an extraordinary musical instrument with a history as rich as it is long. For more than five centuries the carillon has been a voice for the hopes, aspirations and joys of mankind. Few people in St Helens could have failed, at some time or other, to have been stopped in their tracks by the sheer tonal beauty of the bells of St Mary’s, Lowe House, whether they be sounding out the cheerful bells of Christmas, or a splendidly rendered version of some religious or celebratory tune.
Carillons range in size from two to over six octaves, or from a minimum of 23 bells to as many as 77. A range of four to four and one half octaves (47 – 56 bells) is most desirable since almost all carillon music can be played on such an instrument (by comparison a piano has 88 notes, whilst an organ keyboard has 61).
Most contemporary carillon music and much historic music is written for carillons with a range of four or more octaves. The carillon at St Mary’s, Lowe House is one of the largest in the British Isles with 47 bells. The largest bell weighs 4 tons 4cwt. It is known as the “Thanksgiving” Carillon because it was erected in the centenary year of Catholic Emancipation and therefore is a celebration of religious freedom. The bells are played by hand for which purpose a clavier or keyboard is provided, not unlike that of an organ. | <urn:uuid:7083391a-e0e5-45f3-8c54-ab1d3c6d2cbe> | CC-MAIN-2021-25 | https://www.stmaryslowehouse.org/history | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488517820.68/warc/CC-MAIN-20210622124548-20210622154548-00538.warc.gz | en | 0.975413 | 703 | 2.875 | 3 |
Born: ca. 1911, Starachowice, Poland
Rozia was the second-oldest of nine children born to religious Jewish parents in Starachowice, a town in east-central Poland. Their small one-story house served as both the family's residence and their tailor shop. The tailoring was often done in exchange for goods such as firewood or a sack of potatoes. Rozia worked in the shop sewing women's clothing.
1933-39: Rozia married a Jewish tailor from Radom, a large town some 60 miles south of Warsaw. The couple settled in Starachowice, and they ran a tailor shop there. Rozia's two young daughters were born before Germany invaded Poland on September 1, 1939.
1940-45: At 4 a.m. one morning in October 1942, SS guards herded the town's Jews into the marketplace. The guards segregated the "able-bodied" adults--those who could be used as forced laborers--from the children and the elderly. Rather than be separated from her two young daughters, Rozia joined them in their line. By 10 a.m. the selection was over; the column of 4,500 Jews where Rozia, her daughters and her mother stood was marched to waiting cattle cars in the rail yard.
The transport was sent to the Treblinka extermination camp, where Rozia, her daughters and her mother were gassed.
Copyright © United States Holocaust Memorial Museum, Washington, DC | <urn:uuid:a977b6a3-a542-4458-81f4-cf6585c88ba1> | CC-MAIN-2018-22 | https://www.ushmm.org/wlc/en/media_oi.php?ModuleId=10006339&MediaId=4420 | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867254.84/warc/CC-MAIN-20180525235049-20180526015049-00283.warc.gz | en | 0.9864 | 306 | 3.453125 | 3 |
Reading dog behaviors like a book in order to understand the “dog language” is reasonably uncomplicated most of the time. Your dog’s body language is straightforward generally, but he can sometimes fool you.
Your Dog Is Frightened
If he is frightened, for example, rather than friendly or curious, he is likely to bite you. A good indicator of his level of courage is the angle of his tail. If, as you come closer, he keeps his tail high and appears even more aggressive, he probably isn’t bluffing.
If his tail drops and he becomes quiet, he probably would just soon be friends. However, if his hackles stay up, even though his tail goes down, he is still dangerous and you should keep your distance.
Because we sometimes think of our pets as having almost human personalities, we are likely to interpret dog body language in terms of our own likes and dislikes. We can do that up to a point because they’ve learned some of their preferences. Nevertheless, we have our differences.
Your Dog Is Rebellious
Your dog very likely has a few predilections you would never have suspected and probably will never approve. When he is rolling around in some stinky, odorous material, for example, the expression he has on his face could hardly be interpreted as anything but outright rebellion. His lips are pulled back a little in a slight grin (a smirk perhaps), his ears are lowered (because he must feel guilty), and his eyelids are half-closed in an expression of pure defiance.
Your Dog Is Play-acting
There’s another way to make a mistake in reading dog behaviors. Some smart dogs can play-act. An outdoor dog who has once been let in the house because he seems to be shivering on a cold night (in reality, dogs shiver from fear, not from the cold) will attempt to shake violently at the door whenever he feels he has a chance at a cozy evening by the fire.
A dog may play-act when he has accidentally barked at his own master. Nothing is more embarrassing; he will writhe on the ground when he realizes his error. To save face, a quick-witted dog will rush past his master and pretend he was barking at something else. He charges across the yard, furiously barking up the wrong tree, so to speak.
Confusing Dog Language
An ambivalent dog who is growling and wagging his tail widely at the same time is difficult to read. He may feel friendly or inquisitive about you; he may also feel that he must defend his territory.
On the other hand, he may feel aggressive and unfriendly, but afraid he can’t defend himself. And unless you can figure out where these dog behaviors stand, you may do something to get yourself bitten so be careful and pay attention. | <urn:uuid:11b35513-1053-4292-8959-b53a811410c2> | CC-MAIN-2022-27 | https://doggiecube.com/confusing-dog-behaviors/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103945490.54/warc/CC-MAIN-20220701185955-20220701215955-00092.warc.gz | en | 0.983616 | 595 | 2.5625 | 3 |
But a new years-long review from a team of researchers from around the world shows that there are dozens of potentially dangerous substances that may be of concern. Each chemical may not be dangerous on its own, but when they interact, the combined chemicals can become worrisome.
A global task force of 174 scientists from 28 countries looked at 85 chemicals that aren't considered cancer-causing in humans. They reviewed the effects of those chemicals against the mechanisms that are important for cancer development and found that 50 of those chemicals could be combined to trigger changes that could lead to cancer.
"We found definite evidence that chemicals that are unavoidable in the environment can produce a wide range of low-dose effects that are directly related to carcinogenesis. So the way we’ve been testing chemical safety is really quite out-of-date,” said William Goodson III, a senior scientist at the California Pacific Medical Center in San Francisco in a news release. “Every day we are exposed to an environmental ‘chemical soup,’ and we need testing to evaluate the effects of our ongoing exposure to the mixtures in this soup."
The findings were published in the journal Carcinogenesis. The task force was one of two organized by the Canadian nonprofit Getting to Know Cancer, which is searching for answers about the causes of cancer beyond lifestyle and genetics.
“The results are not conclusive but suggest that additional basic science research is extremely important to fully understand how common chemicals, to which we are exposed at very low doses, can have a cumulative effect on cellular and molecular processes that may ultimately increase risk of some types of cancer,” study co-author Rita Nahta, Ph.D., an assistant professor of pharmacology at the Emory University School of Medicine told Yahoo Health.
Among the chemicals noted were the medications acetaminophen and phenobarbital, butyltins (found in some disinfectants) and titanium dioxide (found in some sunscreens).
"We urgently need to focus more resources to research the effect of low-dose exposure to mixtures of chemicals in the food we eat, air we breathe and water we drink," cancer biologist Dr. Hermad Yasaei, of Brunel University in London, told the Daily Mail.
But Yasaei said he didn't want people to be alarmed by the initial research; these 50 chemicals are safe in low doses. However, the research was carried out to highlight "a gap in our knowledge and we hope this will merit further investigation."
Related on MNN:
- 5 easy ways to reduce your risk of skin cancer
- 12 hormone-disrupting chemicals (and how to avoid them)
- Chemical pollution is causing preventable cancer | <urn:uuid:595e346e-0b90-4197-a415-4464b079ca05> | CC-MAIN-2016-44 | http://www.mnn.com/health/fitness-well-being/stories/when-common-chemicals-are-combined-does-your-risk-cancer-go-up | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720615.90/warc/CC-MAIN-20161020183840-00541-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.966549 | 553 | 3.359375 | 3 |
Courtesy: American Public Health Association (APHA)
During the first full week of April each year, the American Public Health Association (APHA) brings together communities across the U.S. to observe National Public Health Week (NPHW) as a time to recognize the contributions of public health and highlight issues that are important to improving our nation’s health.
This year’s theme, Centering and Celebrating Cultures in Health, demonstrates how our nation’s cultures have always shaped our health. We learn from the communities we’re born in, and that we build together. Through these experiences, we learn from one another with humility and openness.
We look to community leaders as our health leaders.
In our families, workplaces, and greater communities, we come together to celebrate the unique and joyful ways different cultures focus on health. Feeling like we belong, being a part of our communities and fostering cultural connections supports our health and the quality of our lives.
We can ALL make our communities healthier, safer and stronger when we support and stay engaged with one another!
As we adjust and adapt to new social norms, we’re focusing not just on what we can do as individuals, but what we can do as communities to protect, prioritize, and influence the future of public health. One of the goals of NPHW is to look at how our cultural connections and intersections affect our health, well-being and the public health system.
This March, A Proclamation on National Public Health Week, 2023 was issued by President Joseph R. Biden, Jr. Read more about our nation’s recognition of NPHW and the proclamation celebrating this annual APHA-led event.
We encourage everyone—public health professionals, students, elected leaders, activists, and the general public—to become part of a growing movement that aims to create the healthiest nation in one generation!
Join us as we celebrate the power of cultural humility and prevention, advocate for healthy and fair policies, share strategies for increasing equity and champion the role of a strong public health system.
Learn more about the science, action, health and celebration of our nation’s public health concerns and share with your family, friends and social network:
Take action to create a healthier America by watching recordings of APHA’s NPHW webinars and this Generation Public Health video—lend your voice and support making an impact in public health!
Source: American Public Health Association (APHA) | <urn:uuid:5253767a-ecca-4b21-8612-79d426a248aa> | CC-MAIN-2023-23 | https://hiprc.org/blog/2023-nphw/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00084.warc.gz | en | 0.938031 | 515 | 2.625 | 3 |
IEEE 802.11 provides platform for new applications
When the concept of the wireless local area network (LAN) was introduced more than 20 years ago, numerous companies tried to implement its applications through the use of spread spectrum, infrared and narrowband microwave technologies based on twisted pair, coaxial cable and optical fiber. When a physical location is not required where a network must be tied down, the system is made more flexible, enabling several machines to be set up remotely anywhere within a building.
Today, the real breakthrough has been seen in the approval of the IEEE 802.11 standard, which gives a platform for new applications and chips already in the marketplace. Wireless LAN applications are best suited for universities, banks, commercial buildings and hospitals.
Spread spectrum is the most popular transmission technique for wireless LANs because it is one of the most secure, does not interfere with other services and carries a large bandwidth of data. Microwave technology’s main use is to interconnect LANs between buildings, using microwave dishes on both ends of the link but the frequency band used requires licensing by the Federal Communications Commission. Infrared LANs, which are desirable because they can carry a high bandwidth but are easily obstructed, can be set up using a point-to-point configuration where the signals are diffused by reflecting them off a surface.
Wireless fidelity (Wi-Fi) is based on an approved IEEE 802.11b High Rate standard, placing wireless LAN technology on an equal footing with 10BaseT Ethernet capabilities. The 2.4 GHz frequency and digital subscriber signaling #2 (DSSS) radio mode is already approved and being used at the 2 Mbps standard. It is important to ensure the wireless LAN products are based on this standard, thus ensuring an end-to-end secure solution. Wi-Fi gives PC users a more flexible way of working, enabling them to communicate with portable computing devices rather than being attached to a wall. It achieves the same performance as a wired 10BaseT LAN connection, offers flexibility with sustained performance in the office, provides a seamless add-on to an Ethernet intranet and gives roaming capabilities for mobile users.
Agere System’s ORiNOCO wireless line of products is one of the most popular in large corporations and university campuses, primarily because it offers both indoor and outdoor wireless communications and networking products.
AMP NETCONNECT Wireless Solutions offers both in-building and wide-area wireless solutions. In-building solutions may be entirely wireless or wireless extensions to existing cabled LANs. Wide-area solutions include buildings where a wired LAN serves most of the offices and cubicles except conference rooms or storage space, which may benefit from wireless connectivity to the rest of the network. The new wireless services will enable customers that need high-speed, short-range communications links to successfully implement wireless connectivity between or within offices.
“One of the most desirable features of wireless LANs is that you can still be at Ethernet speeds but have the ability to be mobile,” said Tom Janning, director of product management for AMP NETCONNECT Wireless Solutions. “It is a cost-effective solution to implement wireless technology in a building. These new wireless communications solutions represent an alternative to underground or overhead cabling or leased lines with recurring monthly fees. We have roam-about software that requires more access points to be added to a building but offers better coverage.”
The major problem with wireless LANs is ensuring that the network is secure from intruders. Since it is difficult to restrict physical access, and radio signals can propagate outside office buildings, it is possible for an intruder to attack a wireless network from an outside location. Without proper security measures in place, remote offices are vulnerable to hackers, viruses and intruders. A denial-of-service attack could be launched against a wireless LAN by deliberately causing interference in the same frequency band as the wireless LAN operates. This would cause availability problems, keeping the authorized users from using the network.
One form of wireless LAN security is authentication management, which involves setting a password at the access point. This ensures that only wireless devices configured with the same series are permitted to join a network through that access point.
Another solution is the addition of a data encryption chip, which prevents the data from being decoded and intercepted. Encryption is the real key to worry-free security in the world of wireless LANs. A wireless network protected by good encryption can be considered as secure as its wired LAN counterparts. EC
SPEED is a freelance writer based in Weymouth, Mass. She can be reached at 617.529.2676 or firstname.lastname@example.org. | <urn:uuid:c2bc3243-98fe-429e-9c48-c3eee9fc6e7d> | CC-MAIN-2016-36 | http://www.ecmag.com/section/systems/wireless-lans-mobility-ethernet-speed | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295383.20/warc/CC-MAIN-20160823195815-00009-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.941958 | 952 | 3.015625 | 3 |
Kialo requires cookies to work correctly.
It is impossible for a simulated universe to be infinite.
There are simple mathematical universes that are infinite, e.g. the set of all natural numbers. These can be simulated using computer if they can nonetheless be described in finite way.
Software design or analysis modelling can be used to model infinite structures. Any finite approximation of such structures can be computed during execution of the program.
A computer can never implement an infinite computation.
Mathematical models are not actual representations of physical phenomena. | <urn:uuid:63670b28-77f2-45cf-9f65-a3572cf34ec2> | CC-MAIN-2019-26 | https://www.kialo.com/there-are-simple-mathematical-universes-that-are-infinite-eg-the-set-of-all-natural-numbers-these-can-be-simulated-using-9306.14?path=9306.0~9306.1-9306.14 | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998291.9/warc/CC-MAIN-20190616182800-20190616204800-00249.warc.gz | en | 0.781581 | 110 | 3.046875 | 3 |
Repairing Fractured Cast Iron Features
- Procedure code:
- Hspg Prepared For Nps - Sero
- Metal Materials
- Last Modified:
- Margot Gayle, David Look, John Waite. Metals in America's Historic Buildings. Washington,DC: National Park Service, 1995.
- L. William Zahner. Architectural Metals. New York: John Wiley & Sons, 1995
- This procedure includes guidance on repairing fractured cast iron elements by joining the fractured sections using one of the following methods:
- Using an epoxy resin cement,
- Brazing with brass rods,
- Welding with "Ni-rods" - special nickel alloy welding rods, or
- Using cold repair techniques.
- See 01100-07-S for general project guidelines to be reviewed along with this procedure. These guidelines cover the following sections:
- Safety Precautions
- Historic Structures Precautions
- Quality Assurance
- Delivery, Storage and Handling
- Project/Site Conditions
- Sequencing and Scheduling
- General Protection (Surface and Surrounding)
These guidelines should be reviewed prior to performing this procedure and should be followed, when applicable, along with recommendations from the Regional Historic Preservation Officer (RHPO).
C. For general information on the characteristics, uses and
problems associated with cast iron, see 05010-04-S.
- Brazing: Brazing is a form of soldering that uses a bronze or brass filler metal.
- Soldering: The joining of metals by fusion using an alloy with a lead or tin base.
- Welding: The joining of metals by heating them with or without the use of filler metal.
- Epoxy resin cement:
- Look for a good quality metal replacement material based on steel particles with an epoxy resin binder.
- Epoxy resin alone has a high thermal expansion which is not compatible with that of the iron. If used without a high proportion of metal filler such as in a thick layer of adhesive, problems with differential expansion may occur.
- Brass rods
- Ni rods (Nickel Alloy welding rods) such as 'Chemtron 99' - a rod with a very high nickel content.
- Nickel-arc rod (or nickel-color wire) is the most common type of welding rod used for welding cast iron.
- It is available in several grades, depending on the nickel content of the rod and the inclusion of other metals. The higher the percentage of nickel, the stronger the weld and the easier the rod is to work with.
NOTE: Mild-steel rods may be used. They produce a strong, hard weld, with the mechanical properties close to those of cast-iron, but they are difficult to work with, in that they must be preheated and they are not machinable.
- Stainless steel or non-ferrous plates or straps, threaded and unthreaded pins or dowels
- Wiping cloths
- Eye and skin protection
- Welding equipment
- Electric drill
- Pneunmatic chisel
- Electric Grinder
- Before proceeding with steps to repair cast-iron features, it is important to first determine the cause and extent of the problem. Determine the age of the features and examine the condition of the entire surface. Inspect for:
- Wearing Surfaces - especially moving parts such as hardware.
- Parts - which have failed or which are unsecured, broken, cracked, missing, distorted, or loose (check screws and bolts).
- Paint - coating failures such as chips, losses, peeling, checks, bubbling, and wear.
- Rust corrosion - caused by moisture, sea water and sea air, deicing salts, acids, soils, gypsum plasters, magnesium oxychloride cements, ashes, clinkers, and sulfur compounds.
- Galvanic action - corrosion caused when iron is exposed to cupro-nickels, aluminum bronzes, gun metals, copper, brasses, lead, soft solders, and some stainless steels and chromium.
- Determine the source of the moisture which causes the deterioration.
- Determine if the feature can be salvaged.
- Measure the dimensions of the various metal parts needing replacement.
- Patching with Epoxy Cement (see 05010-12-R).
- Brazing with Brass Rods (follow procedure for soldering; see 05010-07-R for guidance; use brass rods as filler metal).
NOTE: Brazing of cast iron is very difficult to do in the field. It should be executed only by a skilled welder under careful supervision.
- Welding: Successful welding of cast iron can be a relatively expensive operation and so whenever possible, a cold repair is recommended (see Section 3.03 D. below).
NOTE: Welding of cast iron is very difficult to do in the field. It should be executed only by a skilled welder under careful supervision.
CAUTION: During welding the metal becomes very hot and can undergo tremendous thermal shock. It may recrystallize if excessive heat is applied.
- For large sections, welding should take place off site. The piece must be removed and transported to a workshop where it can be preheated before welding and postheated after welding to ensure a gradual temperature change within the metal.
- Advantages of welding:
- Arc welding produces a strong, durable connection and, if properly executed, is at least as strong as the surrounding metal.
- It is faster and less expensive than threaded connections, which require drilling a pilot and then tapping to accommodate screws or bolts.
- Welding is the most preferred for the attachment of the decorative castings and for other non-structural repairs for economic reasons and because it allows the preservation of the original damaged elements, which otherwise would have to be replaced.
- Disadvantages of welding:
- In cases where the original attachments are bolted, the use of this method may result in internal stresses (welds cannot move with seasonal expansion/ contraction cycles) which may in turn lead to further breaks.
- Welding may leave a 'bead' along the surface some restoration projects, eventhough much of the weld may later be ground down, depending on the location and the welding material.
- Metallic bond (gas) welding is more reliable than fusion (arc) welding in repairing large sections of cast iron, because a lower temperature is used and heat is applied and removed at a slower rate.
- Tapping screws may be visully disfiguring in some significant or decorative castings.
- Cold repair techniques:
NOTE: STAINLESS STEEL OR NON-FERROUS METALS SHOULD BE
USED WHENEVER POSSIBLE.
- Straps: These can often be hidden. The plate should be bedded on a suitable medium to prevent a water trap.
- Threaded studs, screwed into both sides of a fracture.
- Dowels or plain pins, with one or both ends threaded and/or glued into prepared recesses.
- Metal stitching and binding: This system of repair is strong, easy to use on site and introduces virtually no heat into the metal.
NOTE: Metal stitching can be used on all cast iron which is over 1/4 inch (6 mm) thick. It can also be used between cast iron and metal of similar hardness, such as steel.
- Realign the fractured section.
- Drill groups of holes across the metal. Using a pneumatic chisel, cut between the drilled holes to form a series of slots.
- With this method, a 'dumb bell' shaped piece of wrought iron is inserted across a fracture.
- Drive locks of work-hardening nickel alloy into the metal.
- Drill holes along the line of fracture between the nickel alloy locks.
- Tap and fill with studs, each stud interlocking with its neighbor.
- Shear off all excess metal. Ground, prime and paint the surface. | <urn:uuid:f7942977-fdc1-49e9-b5d6-8003b900c37f> | CC-MAIN-2018-39 | https://www.gsa.gov/real-estate/historic-preservation/historic-preservation-policy-tools/preservation-tools-resources/technical-documents?Form_Load=88531 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155817.29/warc/CC-MAIN-20180919024323-20180919044323-00053.warc.gz | en | 0.888471 | 1,677 | 2.6875 | 3 |
Nigeria, the most populous country in Africa, comprises peoples from hundreds of different cultures who were united under common political rule only in 1914. Achieving unity is an ongoing political project, given that Nigerian peoples’ identities as members of particular ethnic groups remain strong. Though use of the English language helps unite an increasingly modern country, Nigerians also speak hundreds of distinct languages and dialects in many of their daily encounters, and work to honor many of the traditional cultural practices of their ancestors.
The religious context of Nigeria varies from place to place. Roughly half of the population is Muslim, and half is Christian. Only a little over a century since Christianity began to be accepted in Nigeria (Islam has a longer presence in the north), just a tiny fraction of the population identifies exclusively or primarily with an indigenous traditional religion. Still, as the articles here show, traditional beliefs continue to shape the practice of Catholicism in Nigeria in distinctive ways.
In the north, among the Hausa-Fulani peoples, Islam is a dominant force, whereas in the south, Christianity is the dominant religio-cultural force. That division creates one of the most troubling fault lines in the country today.
The majority of Christians in Nigeria belong to Protestant and African Independent Churches. Nonetheless, given its huge overall population, Nigeria is home to some 29 million Catholics, the twelfth largest population of Catholics in the world, and the second largest population of Catholics in Africa.
The entries on the Catholics & Cultures site at present explore the religious lives of members of the Igbo ethnic group, particularly those who live in and around the city of Enugu, in south-central Nigeria. Enugu, like the rest of Igboland, is a Catholic stronghold, home to the largest Catholic seminary in the world.
Nigeria is a young country demographically. Its relatively small proportion of elderly people and large proportion of children and young people contribute to the sense of vibrancy that is evident in the Church and in other facets of life. Read more...
These statistics are derived from the Vatican's official publication, Statistical Yearbook of the Church 2020 (Vatican City: Librera Editrice Vaticana, 2022). The numbers may differ from data reported by other sources on this site. | <urn:uuid:ac5545b7-d5a7-4d8e-b160-372a5e904f3d> | CC-MAIN-2023-50 | https://www.catholicsandcultures.org/nigeria | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00181.warc.gz | en | 0.942671 | 464 | 2.953125 | 3 |
Definition Of The Word Meek. Look up any word in the dictionary offline, anytime, anywhere with the oxford advanced learner’s dictionary app. Not easily provoked or orritated;
Webster dictionary (0.00 / 0 votes) rate this definition: Change your default dictionary to american english. Appropriately,humble, in an evangelical sense;
Meek ( Adj.) Humble In Spirit Or Manner;
Enduring injury with patience and without resentment : 147:6, yahweh upholdeth the meek; The positive sense of meek implies that someone is able to remain calm and subdued even when being provoked.
Definition And Synonyms Of Meek From The Online English Dictionary From Macmillan Education.
This word is closely related to humility. Its negative use is perhaps more common, and is intended to indicate that. Submission to the divine will, without murmuring or peevishness;
Submissive, Soft, Yielding, Gentle More Synonyms Of Meek.
Meaning, pronunciation, picture, example sentences, grammar, usage notes, synonyms and more. The above definition refers to christ using the word ‘meek’ to describe himself, indeed it is the meek that will “inherit the earth”. Britannica dictionary definition of meek.
The Word Meek Can Often Come With Negative Connotations.
This is the british english definition of meek.view american english definition of meek. In the first definition we see “ given to forbearance under injuries ” which sticks out to me because of another way i once heard ‘meek’ defined and that was “to bear injury without resentment”. And the meek will he teach his way;
It May Be That People See Being Meek As Being A Doormat, For People To Walk All Over.
Evincing mildness of temper, or patience; 4 min · elias aslaksen. Given to forbearance under injuries. | <urn:uuid:ef6f4f82-a80b-4995-842e-e06a61207546> | CC-MAIN-2023-40 | https://mayang.dilihatya.com/definition-of-the-word-meek/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00566.warc.gz | en | 0.857466 | 423 | 2.953125 | 3 |
Due to the ever increasing concern regarding the provision of future energy and climate change, there is a significant interest in the development of alternative clean energy sources and efficient power generators. According to the World Business Council for Sustainable Development, buildings consume 40% of the world’s primary energy for cooling, heating and power. Most of this energy is in the form of electricity generated at centralised power stations, where at present up to 70% of available energy is lost. The overall system efficiency is low leading to a high waste of energy resources, resulting in considerable CO2 emissions and unnecessarily high running costs. Reducing the energy consumption of buildings can make a substantial contribution towards attaining the European Union’s 20/20/20 targets and at least 80% reduction in its carbon dioxide emissions by 2050. These targets will only be achievable if a decision is made to move from conventional centralised power generation systems to highly-efficient onsite micro-generation technology.
A promising possibility for future onsite energy generation is the solid oxide fuel cell (SOFC), which uses hydrogen from the natural gas stream to generate electricity through chemical reactions in the anodes, with the only by-products being water vapour, heat and a modest amount of carbon dioxide. this form of electrical generation is more efficient than simply combusting the fuel. Technical assessments demonstrate if SOFC technology is used in a combined heat and power (CHP) setting, the total system efficiency can be as high as 90%, leading to reduced operational cost and CO2 emissions.
The project is supported by the European Commission under the Fuel Cell and Hydrogen Joint Undertaking Initiative (FCH-JU) for a “Durable low temperature solid oxide fuel cell Tri-generation system for low carbon buildings” project, agreement No. 303454.
The EU funded undertaking involves seven partners from both academic and industrial backgrounds. The aim is to develop a low-cost durable low temperature (LT) SOFC tri-generation (cooling, heating and power) prototype, based on the breakthroughs in LT-SOFC and desiccant cooling technologies already made by the applicants involved in the project. The project has an acronym of TriSOFC. The concept is illustrated in the figure below.
The proposed system could be used for residential and commercial buildings (e.g. school buildings/offices), providing cooling, heat and power. The TriSOFC system will be tested under a real-life context at The Creative Energy Homes, The University of Nottingham (image below). The Creative Energy Homes are a world leading research and educational showcase of innovative state-of-the-art energy efficient homes.
The environmental sustainability of the prototype will be assessed by means of life cycle assessments studies. The result obtained will be disseminated to industry bodies and research institutions as a proof-of-concept for fuel cell tri-generation systems operating in stationary low carbon building applications.
Stay up to date with TriSOFC project developments by going to the ‘Project News’ tab. | <urn:uuid:989d3e23-7f3f-4ead-918b-6f9c064a639a> | CC-MAIN-2022-40 | http://trisofc.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337504.21/warc/CC-MAIN-20221004121345-20221004151345-00041.warc.gz | en | 0.925554 | 622 | 3.375 | 3 |
What a great visit we had from Mr Willix today. He plays in the Salvation Army band and bought in lots of brass instruments for us to have a look at. Some of us even got to have a go!
In our topic lesson this week we learned how to read a musical score. The children loved writing their own rhythms. They then read their friend's score and played it on a drum!
We have had fun in maths this week comparing the different weights of fruit. We have also estimated the weight of bags of flour and then weighed them using scales.
We have been reading 'The Steadfast Tin Soldier' and doing lots of great drama activities related to the story. Have a look at our freeze frame of the evil Goblin and the tin soldier! | <urn:uuid:cd6dec5f-b188-4a40-82c9-fbecf9d9980e> | CC-MAIN-2018-47 | http://www.earlspencerprimary.org/term-3-beat-band-and-boogie/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743184.39/warc/CC-MAIN-20181116194306-20181116220306-00463.warc.gz | en | 0.982252 | 155 | 2.9375 | 3 |
Leadership has played an important role in the human history since earliest times. The historians have glorified heroes in battle and valued the importance of their deeds for the future generations.
The role of politicians, statesmen and emperors in the development of empires, territories and nations has received considerable attention in the imperial history. In modern society too there is emphasis on leadership.There is continual search for men with leadership qualities.
- The Meaning of Leadership
- Leadership versus Power
- Leadership versus Headship
- Characteristics of Leadership
- The Nature of Leadership
- Functions of Leadership
- Why a Person Assumes Leadership
- Types of Leadership
- Leadership Techniques
The Meaning of Leadership
It is really difficult to attempt a definition of leadership or in other words it is difficult to define what makes certain persons leaders. Leadership is often regarded as the important modifier of organizational behaviour.It is regarded as primarily personal in character as being founded upon individual pre-eminence or accomplishment in a particular field of behaviour.
Thus superior strength ,superior tact, superior intelligence, superior knowledge, superior will power any or all of these may be the means to the attainment of leadership. No one may deny that these personal qualities do pay dividends but leadership is not all personal pre-eminence. It is something more than that and that something more is the essence of leadership. It is the capacity to set new goals to hold forth new and loftier expectations for the group and to show the group its noble potentialities that make man a leader.
Leadership versus Power
The concepts of power and leadership have much in common. Certain people are leaders because they exercise power.It are unthinkable that a leader should not have power. Consequently the exercise of influence is a central part of most definitions of leadership.Accordng to La-Piere, leadership is a behavior that affects the behavior of other people more than their behavior affects that of the leader.Pigor also says leadership is a concept applied to the personality to describe the situation when a personality is so placed in the environment that it directs the feeling and insight and controls others in pursuit of a common cause. According to Allen leadership is the activity of persuading people to cooperate in the achievement of a common objective. Terry defines it as the activity of influencing people to strive willingly for mutual objectives.
Leadership always involves attempts on the part of a leader to affect the behavior of a follower or followers in a situation. Power is not equivalent with influence or with initiating change in another personâs behavior without regard to the situation in which it occurs. A new born infant can influence and change the behavior of his parents but this influence is not equivalent with power in the family.
Leadership versus Headship
Characteristics of Leadership
Leadership denotes a mutual behavior pattern between the leader and his followers. Leadership is a two way affair. The followers influence the behavior of the leader in as much as the leader influences their behavior.
The concept of leadership can be understood only in the context of followers. Without followers there can be no leader. Leadership involves the element of willing and voluntary obedience by the followers. Leadership is based on cooperation and goodwill. Sheer threat and force cannot maintain one a leader for long. Leadership is specific to a specific situation.
The Nature of Leadership
There are two main approaches to leadership- traitist and situationist.In the early times leadership was considered to originate from the personal qualities of the leader and insufficient attention was given to the contribution of the group structure and situation. The early studies focused their attention on certain traits to compare leaders with non leaders.
Gibb remarked that the leader traits are relative to a specific social situation and are not exhibited in isolation. He pointed out that attempts to find a consistent pattern of traits that characterize leaders had failed and said that the attributes of leadership are any or all of those personality characteristics that in any particular situation make it possible for a person either to contribute to achievement of a group goal or to be seen as doing so by other group members. The person who becomes a leader surpasses others in some qualities required by the goal in the particular situation. He writes leadership is both a function of these two interactions.
The situationist approach to leadership provides a corrective to the traitist approach which regarded leaders as uniquely superior individuals who would lead in whatever situation or time they might find themselves. This approach emphasizes that leadership is specific to a specific situation. It is a way of behaving exhibited by individuals in differing degrees in different situations. A leader in one group is not necessarily a leader in another. A leader in the class may not be a leader in the playground. Though leadership may be considered as behavior specific to a given situation yet it does not mean that there is no generality of traits on the basis of which certain persons may be rated leaders.
Carter noted that if leadership is absolutely specific to a given situation then it cannot be a subject of scientific analysis and generalization. Leader is necessarily a part of a group and leadership is status and role in that group. It is obvious that leadership can occur only in relation to other people. No one can be a leader all by himself. The relationships which the leader bears to other individuals are status and role relationships. He is part of the group structure and as such he carries on reciprocal relationship with other members of the group. These relationships define his role in the group. When leadership is viewed as a status in a group structure and a role defined by reciprocal relations with others in the particular structure it is easy to understand why there cannot be a generalization of traits characteristic of leaders.
Functions of Leadership
There is no unanimity of opinion as to what the functions of the leadership are. This is because detailing of functions depends on oneâs general concept of leadership. Leadership functions are related to goal achievement and to the maintenance and strengthening of the group. Functions in the former category, instrumental to achieving the goals of the group include making suggestions for action, evaluating movement towards the goal, preventing activities irrelevant to the goal and offering effective solutions for goal achievement. Functions in the second category include encouraging the members, releasing tension that builds up and giving everyone a chance to express himself. The main functions of leadership are to contribute to the achievement of the group goal and to help hold the group together. The leader by himself alone cannot achieve the group goal and help it maintain its solidarity and strength.
Leadership is not the activity of an individual alone. In a large scale organization it becomes a collective activity for no single individual can meet the tremendous demands of working out the whole organization. This has led to the view that leadership like power is dispersed throughout the organization. No one person has all the leadership functions. The functions of an organization are divided and each individual in his respective position provides leadership in so far as he contributes to the attainment of the group goal and the maintenance of the group cohesiveness. The leadership is provided at several levels in the hierarchy but at the same time individual leadership is important. The leader is the symbolic spokesman, the coordinator supreme, the important participant in decisions as to goals, the primary change content and the example to the organization.
Why a Person Assumes Leadership
Whether a person will assume leadership in a group or not depends upon the reward-cost outcomes expected by him and by his followers. The rewards of leadership are two-fold first are the satisfactions to be gained from successful accomplishment of the tasks. Second are the rewards gained from leadership activity in itself. These include satisfaction of needs for achievement and dominance as well as other social â"emotional needs. Persons who assume leadership incur a number of costs. They have to spend their time and energy. Besides they bear strains, anxiety, rebuffs, loss of status and blame in case of failure. He also faces the cost of losing the friendship of the members who maybe adversely affected in their position and prestige by his having assumed the leadership. He also risks his popularity. He also faces the cost of loneliness since he is often avoided because of his power and because he may also incurred hostility. Among the rewards of the followers is the goal achievement.
The followers follow the leader because they recognize that without leadership the goals of the group would not be achieved. Secondly by following the leader the followers escape the burden of making decisions to meet particular situations facing the group. Thirdly the followers escape the anxiety over the risk of failure and blame when the failure occurs. As to who will assume leadership depends on the rewards and costs arising out of the inter-play between the demands of the situation and the characteristics of the individuals. Those who have the required skills to a high degree can respond at low cost. Varying characteristics of the group members affect their reward cost outcomes differently in different situations.
Types of Leadership
Many attempts have been made to classify leaders. According to H.T Mazumdar there are three kinds of leadership â"traditional, bureaucratic and charismatic. The traditional leader gets his authority through the traditional status ascribed to him. Thus the Brahmin is the traditional leader of Hindu society. The bureaucratic leader gets his authority and power through delegation from election or from appointment. The charismatic leader creates his own authority. He may be a party leader, a religious leader, a social leader or a revolutionary leader.
Bogardus has mentioned the following kinds of leadership. Direct and indirect leadership.Social, executive and mental leadership, partisan and scientific leadership.Prophets, saints, experts and boss.Autocratic, charismatic, paternal and democratic leadership. The three most significant types of leaders today are the administrator, the expert and agitator. With the extension of state activity and political controls the power of government bureaucracy has tremendously increased. The complicated industrial and military systems cannot operate without the expert. The agitator in time of grave economic insecurity and widespread anxiety about the future political order assumes an important role in mass society such as ours.
There are three types of leadership technique- authoritarian, democratic and laissez-faire.Under the authoritarian technique the leader determines the policy procedures and activities in the group. Under the democratic technique the leader encourages participation by members in deciding group matters and behaves in a friendly helpful manner to the members giving technical assistance and suggesting alternative procedures. In the laissez-faire technique the leader allows complete freedom for decisions and activity keeping his own initiative and suggestions to a minimum.
Authoritarian leadership induced greater dependency on the leader, marked inter-member irritability and aggressiveness, low frequencies of suggestions for group action and group policy, dissatisfaction group activities and high quantity but low quality of productivity. Under laissez-faire leadership the group showed little dependency on the leader. Democratic leadership also produced low dependency on the leader. There is no denying the fact that the democratic technique is a human relation approach which is in keeping with democratic values. It increases independence for all group members and hence increases their morale. But it cannot be applied fully. The advantage of democratic leadership depends upon the demands of the situation, the distribution of skills within the group and the groupâs expectations as well as other factors. Gibb notes it is common in our culture at the present time to place negative values on authoritarian leadership. Much of this attitude seems to be due to a prolonged period of ideological opposition to cultures authoritarian organized.
The tendency is to think of authoritarianism in its most extreme form of headship and denounce all forms of individual authority over others. Studies of group action reveal that in certain circumstances authoritarian leadership is highly valued. Under certain situations an authoritarian form of leadership may be more effective. Such situations may of those where the group is faced with a need for emergency action. The leadership techniques have to be related to the attitudes of the membership to the particular form of relation among the members including the leader and functions as a part of the group structure. These are to be reality oriented. Gibb writes it is important that we recognize authoritarianism and democracy as poles of a continuum neither of which is wholly good or wholly bad, but which represent extremes of variable leadership techniques that should be adapted to all the elements of the situation, culture, personality, content, structural, inter-relations and task. | <urn:uuid:47780690-73ac-4734-8e1b-02a0959c836e> | CC-MAIN-2018-30 | http://ncert.servloci.com/2010/01/leadership.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591575.49/warc/CC-MAIN-20180720080634-20180720100634-00488.warc.gz | en | 0.960943 | 2,466 | 3.390625 | 3 |
How Shodan works, the search engine that allows you to find devices connected to the Internet that can be managed remotely. A tool that helps to understand how important it is to secure the local network.
It often happens that you have to clash with the management of a company that wrongly requires that remote access to some devices used internally be made as immediate as possible where, with the adjective “immediate”, we refer to the removal of any authentication procedure.
So here you are leaving open ports on the router and not adequately protecting the device, perhaps leaving the default username and password.
Some believe that simply changing the port used by the remotely accessible service helps protect themselves. Nothing more wrong.
The port scanner ( Port scanner: scan all the public IP ports) are tools that allow you to establish all incoming ports found open on more or less large groups of public IP addresses.
Sooner or later, even if the server component is listening on a port other than the standard one, someone around the world will certainly find out which port you are using.
Activating a filter on remote IPs (allowing only known addresses to connect) is certainly a reasonable move but clients should use a static address, which never changes with each connection.
What if a user needs to connect remotely using his mobile device (not necessarily a smartphone but also a shared data connection via 3G / 4G hotspot or tethering )? There the public IP will always change.
The ideal would be to set up a VPN server within your local network, be it the home, office or company network .
By connecting to the VPN server from any remote device, regardless of the public IP used by it, you can access the devices to be administered – connected to the LAN – without the need to open too many ports (just open the one to connect to the VPN server).
What is Shodan and how it works
By consulting the Shodan service , defined by its author John Matherly as ” the scariest search engine on the net “, you will realize how many devices with server functionality are constantly connected and accessible remotely by anyone.
With a few simple searches on Shodan you can find routers, webcams, NAS and industrial systems that are open and manageable remotely without the need to enter credentials or with predefined authentication data.
Not only. You can come across the administration and control panels of electrical systems, water stations, storage points, industrial installations managed by SCADA and even public systems.
Even in cases where the default password is replaced with a choice of your own, make sure you always use the latest firmware .
It is not uncommon to discover security vulnerabilities that allow remote access by unauthorized parties to devices connected to the Internet. That’s why, as recommended above, setting up a VPN is the best choice .
By using a VPN and making sure that no unnecessary ports are open on your router, you will prevent your IP address and listening services from being published on Shodan and other similar search engines.
Registration on Shodan will also allow you to use filters in any search:
city: Search for devices in a specific city
country: Search for devices in the indicated country
geo: Allows you to pass geographic coordinates
hostname: Search for hosts that match the specified text string
net : Search based on IP or CIDR
os: Search based on OS
port: Search for an open port
before / after:Search results in a particular time window
product: To search for a specific product
The advice is to search Shodan for your public IP addresses (especially if you are using static IPs).
Try to take yourself to this address , then write – in the Shodan search box – net: followed by the public IP taken previously and reported on DNSStuff next to Your IP address.
If Shodan returns any information you will have to immediately activate to avoid exposing ports on the public IP: Port scanner: scan all ports on the public IP .
The search on Shodan can be automated using the IoT Scanner tool while the Hide My Name service helps to discover any ports left open on entry on the router (click on Enter your IP address , choose at least Frequently used ports and press the green Scan button ) .
Is Shodan legal?
From a purely regulatory point of view, the Italian criminal code provides for up to three years’ imprisonment for anyone who illegally enters a computer or telecommunications system protected by security measures or in any case against those who gain access against the express or tacit will. of the operator or owner of the same system.
Connection to unprotected remote systems is therefore not punishable, unless changes are made that could damage the network infrastructure and other people’s equipment.
Indeed, it is precisely those who manage a system accessible remotely who – according to the provisions of the GDPR itself, the European regulation on the protection of personal data – is required to protect it adequately (for example by requiring the insertion of access credentials) . This is precisely because a device connected to the local network and made accessible remotely could be exploited by unauthorized third parties to spy on and steal sensitive data.
Shodan is therefore absolutely not an illegal tool while operations that a subject decides to conduct using the information obtained from the search engine can become punishable.
Shodan also shows the versions of the server component listening on the remote port : thus, a potential attacker immediately knows what vulnerabilities are possibly present in this software and can try to exploit them to do damage.
The advice is therefore to follow the instructions in the article How to make the network safe both in the company and at home by deactivating the unnecessary ports open on the incoming router (including the relative port forwarding) and paying the utmost attention to the correct management of devices connected to the local network, especially from an Internet of Things perspective.
IoT devices, especially if not properly configured, can act as a “bridgehead” to penetrate a corporate or home network.
Using a VPN and periodically updating device firmware are the best ways to avoid taking risks. | <urn:uuid:3d6a0fd2-3b86-490e-b80e-9f8092ff385f> | CC-MAIN-2021-17 | https://techsmartest.com/shodan-what-it-is/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038879374.66/warc/CC-MAIN-20210419111510-20210419141510-00431.warc.gz | en | 0.935154 | 1,249 | 2.65625 | 3 |
Student Learning Targets
- Triangles 1: I can use similarity to define trigonometric ratios as properties of the angles in a triangle.
- Triangles 3: I can apply trigonometric ratios and the Pythagorean Theorem to solving problems involving right triangles.
How long is the hypotenuse of a right triangle with one 67 degree angle and whose shortest leg measures 15?
- Check in Quiz #1 – highest possible grade was a 2.
- Problem Set #3 / debrief notes
- How to use your Capacity Matrix
Work to Do
- The Similar Triangles Project is due today (by 3:30 is fine)
- Trig Problem Set 4 is new. It’s due next Thursday at 3:30 pm.
- Recommended: Practice on Delta Math
Delta Math: Trig Exercises for SLT Triangles 3
- Due Tuesday 2/19 at midnight.
- Complete 85% to earn a 2 on this SLT.
- Complete 100% to earn a 3 on this SLT.
- Complete any of it to practice using trig ratios.
SLT Triangles 1, Check In Quiz #2 at the end of class. | <urn:uuid:ce000876-d387-4d6b-b10b-11cba65b2648> | CC-MAIN-2019-13 | https://validusalgebra2andtrig.wordpress.com/2013/02/15/class-agenda-8-monarchs-supernovas/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202125.41/warc/CC-MAIN-20190319183735-20190319205735-00429.warc.gz | en | 0.845964 | 251 | 3.5625 | 4 |
What You See Ain’t What You Get A Poetry Program Starter by Tiembé Maboola
This collection of poetry is intended to peel back the way assumptions color our interactions; what we see and what we think we see are often very different. Through exploring the emotions of attraction and alienation, each of these poems offer a different perspective on what it means to judge a situation or a person based on looks alone. Acknowledging the limitations of our perceptions is the first step to improving how we understand, relate, and connect to each other. The voices in these poems are intended to showcase different points of view and a variety of cultural and racial backgrounds. The conversation on race is such a volatile subject that one point of view seemed inappropriate. However, if the student prefers to speak from one ethnic vantage point, pronouns may be changed to suit the speaker’s intention. | <urn:uuid:a95074b7-94be-4b66-9f7e-ddbdc1658d48> | CC-MAIN-2020-34 | https://speechgeekmarket.com/collections/2017-18-fresh-interp-scripts/products/what-you-see-ain-t-what-you-get-a-poetry-program-starter-by-tiembe-maboola | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735882.86/warc/CC-MAIN-20200804191142-20200804221142-00177.warc.gz | en | 0.9354 | 178 | 2.9375 | 3 |
Chemistry is a natural science which studies the structure of matter, chemical changes occurring under certain circumstances and the regularities that can be drawn from that.
Muslim scientists have deepened their knowledge in this domain as well. However, rather than learning about their fundamental contributions from scientific databases, their ideas are only to be found in fictional novels. This is due to many people’s incorrect image of the Arabs’ way of doing chemical research.
Chemistry versus Alchemistry
The term ‘alchemistry’ is generally used when talking about the kind of chemistry that was allegedly not yet practiced like we do today.
The ‘Ordinall of Chemistry’ states that chemistry as a science dates back from around the 17th and 18th centuries. Compared to today’s standards, chemistry would not be practiced in a scientific way before then. This means that the chemists of that time did not particularly look for a critical explanation of chemical symptoms. The pre-17th century science was thus called ‘alchemistry’.
Several scientists countered this worldwide opinion. Some facts show that the Muslim scientists did not only contribute to the so-called alchemy. Eric John Holmyard, a famous historian, chemist and Arabist, ascertained that the preposterous claims of scientists like Berthelot (a French chemist) were incorrect.
In ‘Makers of Chemistry’ he elaborates on the evolution of chemistry from the very beginning until modern times. In this work he states that Islamic chemistry is in fact a base for modern chemistry. He talks about several Muslim scientists, including the most acknowledged chemist: Jabir Ibn Hayyan (Geber).
Abu Musa Jabir Ibn Hayyan
Jabir, born around 721 and died around 815 in the village Tus (in today’s Iran), grew up in a family where chemistry was not unknown, as his father was a pharmacist. That would most likely be the cause of his interest in chemistry.
Jabir’s father was later executed due to that time’s political struggles, which forced him to flee to the city of Kufa. This city was then ruled by the Abbasid caliph Harun al-Rashid.
Jabir was able to practice science at the highest level thanks to his connection with the Barmakids (influential Persian families that counselled the first Abbasid caliphs).
Jabir’s focus on experiments
Jabir Ibn Hayyan is without any doubt one of the greatest Muslim scientists. Holmyard legitimately names him ‘The Father of Chemistry’. According to Holmyard, one of the fundamental aspects Jabir brought forward was the development of the practical side of chemistry: performing experiments. Experimenting separates science as practiced by Muslims from the Ancient Greek tradition of speculation. Jabir emphasised the importance of experimenting as follows: ‘The most essential in chemistry is that you should perform practical work and conduct experiments, for he who performs not practical work nor makes experiments will never attain the least degree of mastery.’
Material contributions of Jabir
Jabir’s attention to precision led him to create scales that could weigh with an accuracy of 1/6 of a gram. To him, experimenting with matter meant that he could mix, heat, cool, grind, bake and stir various substances. The traditional image of an ‘alchemistic’ workplace looked a lot like what we would call a chemistry laboratory today.
In order to perform his experiments accurately, he designed different kinds of new vessels like the retort. His experiments with various chemical processes allowed him to trigger reactions like reduction (a reaction that involves the gaining of electrons), calcination (oxidation through heating, e.g. the burning of chalk) and perhaps the most important: distillation.
Using his homemade alembic he created a simple way to distill. An alembic is a simple construction of two bottles connected by a tube. One of the bottles is heated and causes the fluid inside to condensate and drip down through the tube. The alembic was later used to refine mineral oil into kerosene that could be used as lamp oil.
Chemical developments by Jabir
Ten centuries before John Dalton (a British physicist and chemist who became known through his atom theory and molecule theory), Jabir created the image of chemical bonds as a link between elements, in fact small particles invisible to the naked eye. All without losing grasp of their original characteristics.
Jabir also identified many new substances. It is often said he discovered strong acids such as sulphuric acid, hydrochloric acid and nitric acid. These discoveries are proven to be of great significance to modern chemistry, becoming even essential to the chemical industry.
Last but not least: Jabir also laid the groundwork for what is known today as Mendeleev’s periodic table of elements. He tried to create a table to classify the chemical elements, just like Mendeleev. This was based on the Ancient Greek idea of classifying the elements further into groups of metals, non-metals and substances that can be distilled. In that way his table somehow resembled the modern periodic table of elements, in which non-metals and gases can be distinguished. | <urn:uuid:a44bba27-b143-403a-b34d-03ed829ebe97> | CC-MAIN-2020-40 | https://mvslim.com/islam-and-science-jabir-ibn-hayyan-the-father-of-modern-chemistry/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127075.68/warc/CC-MAIN-20200930141310-20200930171310-00422.warc.gz | en | 0.97116 | 1,097 | 2.734375 | 3 |
factors will most likely determine China's future water demand:
With further economic
development, we can almost certainly expect growing water demand in the urban and
industrial sectors. Public water supply for residential use will have to increase
substantially in line with the projected rapid urbanization. Currently, China is still far
behind in this sector. It is estimated that 75% of the cities in China do not have an
adequate potable water supply.
On the other hand, we can
also expect that additional programs for rational and efficient water use will be
implemented. As the agricultural sector is by far the largest water user in China, we
might see only a slight increase in water extraction in this sector due to conservation
measures. Because water efficiency is still rather low in Chinese irrigation (and since
irrigation makes up a large share of water use), improvements in irrigation efficiency
could actually lead to a leveling off or even a decline in agricultural water consumption.
modernization will drive up water demand in urban and industrial sectors, it could also
greatly improve water efficiency in all sectors, especially in agriculture. It is very
difficult to determine which trend might dominate, so the prediction error of China's
future water demand is certainly high. | <urn:uuid:c80f1819-9f82-496a-afc7-e1caaae34c00> | CC-MAIN-2017-13 | http://china-food-security.org/argu/error/err_63.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189474.87/warc/CC-MAIN-20170322212949-00095-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.93244 | 260 | 2.828125 | 3 |
Intro to Theme
Lesson 9 of 14
Objective: SWBAT: identify the theme of our read-aloud, and transfer their knowledge of theme to their independent reading books
To be honest, I wasn't quite sure how much knowledge my 6th graders would have about theme before this lesson, so I prepared for a full introduction. In the Guiding Question, I asked them to "Make an inference about what the theme of Ninth Ward is."
Of course, as kids were walking in, I got a bazillion statements like, "I don't even know what theme is," or "What is a theme?"
I came prepared, though. On the PowerPoint slide, I placed the definition of theme. "There's a hint on the board," was my reply.
By the number of students who asked about theme, I knew that I really needed to take my time with this concept and I even ended up building in a second day of theme instruction--with the understanding that I'll visit it several more times throughout the year.
I rarely use PowerPoints to introduce concepts, relying more on students discovering concepts. But, I thought direct instruction was more appropriate here, as it's something that they will need through their entire academic career.
I found this Theme PowerPoint online and modified it to fit my classroom and my kids. I liked that it had little excerpts of narrative in it and asked students to apply their knowledge. It was interactive, rather than strictly have students take notes.
When we got to the slides where it asks students to identify the themes of the excerpts, I gave them time to talk at their tables to arrive at an answer. Since it was the first time introducing the concept, there were different levels of mastery going on at each table and I wanted kids to feel comfortable sharing their thinking.
For the second half of the mini-lesson, I read aloud from our book, Ninth Ward and stopped at various points to discuss possible themes. I might say something like, "Here Lanesha is bringing up the foster care system again and, since she's brought it up several times...like the fact that Mama YaYa doesn't get any money from the system, I think it might be a theme."
For their work time, I had the students read their own books, and identify some possible themes. I circulated and conferred with kids who generally have a hard time with new concepts. With my Gifted and Talented class, I pushed them to move beyond the obvious and list several themes.
Students really struggled with things like over-explaining what the theme was. This is when it was nice to remind them that the theme was like the bumper sticker--short and sweet! They also were confusing action with theme. For instance, in a conference with one student, he said that the theme in Divergent was that Tris was toughening up, and was making new friends, and was showing how fearless she is. This is true, but he wasn't telling me that the theme might be "Overcoming Fear," or "Choices Change the Course of Your Life." By throwing these out to him, I was able to clear up some misconceptions.
For the Wrap-Up, I had students jot down what they thought the theme of their book was. If I hadn't had a chance to confer with them during their independent reading, their student reflections were especially helpful for me because I could see if they were understanding the concept of theme. | <urn:uuid:79fe169e-b085-48cb-9868-e52a3752b06a> | CC-MAIN-2017-26 | https://betterlesson.com/lesson/526582/intro-to-theme | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320243.11/warc/CC-MAIN-20170624082900-20170624102900-00206.warc.gz | en | 0.985893 | 713 | 3.734375 | 4 |
WEBINAR: On-demand webcast
How to Boost Database Development Productivity on Linux, Docker, and Kubernetes with Microsoft SQL Server 2017 REGISTER >
Figure 1: Imagine such code being legal in VB.
The purpose of this investigation is to enable applications written in VB6 to use function pointers. Other advantages may be discovered, such as embedding native code in VB applications, thus extending the world of possibilities without the need of external DLLs. For the sake of keeping this as brief and concise as possible, other variations of the techniques used have been ignored and the focus have been maintained on detailing the one methodology that handles more common situations. Before reading a comprehensive examination, I'm assuming you'd like to actually see a working sample project (see the download at the end of this article).
Did You Say Function Pointers?
Because pointers in general aren't VB6 specific, it might sound crazy to talk about function pointers in VB6. So, you should first see how you usually get function pointers in VB6. With an AddressOf operator? Yes, but not only! There's also the GetProcAddress Win32 API from kernel32.dll that can be used at runtime to retrieve addresses of functions exported by other DLLs. Again, not only... There're other scenarios! But, why would one use runtime loading when you simply can use a Declare statement? For the same reasons a C/C++ programmer would, for example, by using different DLLs (or versions of the same DLL) depending on the environment in which the application is running. In fact, the whole concept of plugins is based on loading, probably on demand, external components that export the expected functionality. For example, some codecs are even downloaded on demand, and then loaded by the application that uses them. Also, a function pointer might be given by an external module as a callback (aka delegate) and its value may depend on the state of some objects. In OOP, a well-known behavioral pattern called 'Template Method' is characterized by changing control flow at runtime. Using function pointers may considerably reduce the effort put in its implementation by reducing the number of classes that need to be defined.
Using Pointers that Are Not Type Safe
If you ever used EnumWindows API in VB6, you may have noticed that there's nothing that enforced you to pass the address of a function with a correct prototype as a callback. The code will fail at runtime but compile without complaining. Delegates in VB .NET overcome this issue, although their main purpose might have been to ensure availability of code, because CLR may discard compiled code that is not referenced. Although other languages have a way to declare type safe pointers (as typedef in C/C++), in VB6 you can only treat them as signed 4-byte numbers. The developer will be responsible for type checking, without any help from the compiler.
Making the Call
The method of choice for calling addresses stored as Long is replacing entries in the 'Virtual Function Table' (VFT) of a class because it provides enough flexibility, while it is still easy to use. It has the same behaviour in IDE, Native code and P-Code; this helps debugging. A vftable is a mechanism used in programming language implementations to support dynamic polymorphism; in other words, runtime method binding. Where some online resources describe how the VC++ 6.0 compiler creates vftables for classes, I couldn't find anything regarding the VB 6.0 compiler. Typically, a compiler creates a separate vftable for each class and stores its pointer as a hidden member of each base class, often as the first member. The VC++ compiler builds the vftable for each class in a read-only page of the code section in a similar way to string literals.
To modify its contents, one needs to use VirtualProtect API to temporarily change the access rights. The first address in the vftable created by VC++ points to the scalar destructor function of the class, and it is followed by the addresses of virtual functions, in their order of declaration. Although VC++ supports multiple inheritance and handles pure virtual function calls, your objective can be simply achieved by identifying how VB retrieves the address of a public method, given the address of an instance from a class. A visual inspection of a class instance was required to establish the location and content of the vftable. By displaying the memory content from the addresses of two instances of the same class, you should be able to identify which is the pointer to the vftable. Because both instances point to the same vftable, the pointer value must be the same and must belong to your VB module (by default, the starting address is 0x00400000). As you can see, the pointer to the vftable is stored as the first 4 bytes within the class instances.
Figure 2: Two objects sharing the same VFT.
Figure 3: Addresses at offset &H1C belong to your module.
The first seven addresses in the vftable point to code within 'msvbvm60.dll'. Modifying the class definition by adding more public methods will change the vftable content starting with offset &H1C. To consolidate the theory, I wrote an external DLL for breaking into VB calls to methods of an object and reading the disassembly with the VC++ debugger. This is much easier than it sounds. Have a global procedure creating an instance of a VB class, and call its first public method. At runtime, display the address of the global function, the address of the class instance, and the pointer to the vftable. Load the process with the VC++ debugger by pressing F11. Write down the current instruction pointer (eip of the application's entry point) and change it to the address of the global procedure (type it in the Registers window and press Enter). Set a breakpoint at this address. Change the eip to the old value and resume execution. When the breakpoint is reached, step through the code and observe the Registry values until the method of the class is called. The screenshots show how the eax register is getting the address of the object (0x14BE70), from which 4 bytes are copied into the ecx register, representing the address of the VFT (0x4033B8). The instruction at 0x402391 is the call to the first public method of that class and, as you can see, its offset in the vftable is &H1C.
Figure 4: Disassembly showing how to get addresses from vftable.
My investigation continued to see whether private member data or methods affect the location or content of the vftable. The answer was no, but public member variables change the contents of the vftable by inserting accessors and modifiers that will be called when using the member data outside the class. For proof of concept, I wrote the following test:
VERSION 1.0 CLASS Attribute VB_Name = "DynamicVFT" 'Byte offset of first index in Virtual Function Table (VFT). Private Const OffsetToVFT = &H1C 'Swaps the addresses of 2 public methods with the same prototype. Private Sub SwapPlayers() Dim pVFT As Long CopyMemory pVFT, ByVal ObjPtr(Me), 4 'get the VFT address. Dim fnAddress As Long 'get AddressOf Play. CopyMemory fnAddress, ByVal pVFT + OffsetToVFT, 4 CopyMemory ByVal pVFT + OffsetToVFT, _ 'replace Play address with Replay address. ByVal pVFT + OffsetToVFT + 4, 4 'replace Replay address with Play address. CopyMemory ByVal pVFT + OffsetToVFT + 4, fnAddress, 4 End Sub 'Address of this method can be found at first index in the VFT. Public Sub Play() Debug.Print "Dynamic VFT plays: White move." Call SwapPlayers End Sub 'Address of this method can be found at second index in the VFT. Public Sub Replay() Debug.Print "Dynamic VFT plays: Black move." Call SwapPlayers End Sub
Sub Main() 'Phase 1: Making the call. Dim dynObj As New DynamicVFT Dim idx As Long For idx = 0 To 9 dynObj.Play Next idx End Sub
Note: These methods had the same prototype. Swapping the addresses in the vftable worked as expected and the output of the above code is shown below:Dynamic VFT: White move. Dynamic VFT: Black move. Dynamic VFT: White move. Dynamic VFT: Black move. ...
So, changing the values in the VFT of a VB6 class will replace the methods of that class. One more important thing to remember when modifying vftables is that they are shared by all instances of that class. | <urn:uuid:8cb667e3-5e68-4a8a-96dd-05c1eb7f93ab> | CC-MAIN-2017-47 | https://www.codeguru.com/vb/gen/vb_general/errorhandling/article.php/c13883/Compilers-Demystified-Function-Pointers-in-Visual-Basic-60.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806715.73/warc/CC-MAIN-20171123012207-20171123032207-00797.warc.gz | en | 0.905916 | 1,865 | 3.046875 | 3 |
Sadly, it seems, “walking while black” can have dangerous consequences.
That’s because a recent study suggests motorists are less likely to stop for an African American pedestrian in a crosswalk. A black pedestrian’s wait time at the curb was about 32 percent longer than a white person’s. Black pedestrians were about twice as likely as white pedestrians to be passed by multiple vehicles.
The small but provocative study — conducted by researchers at Portland State University in Oregon and the University of Arizona — suggests that biases just outside people’s conscious awareness can make them less likely to yield to minority pedestrians. And that could put those pedestrians at risk, said Kimberly B. Kahn, an assistant professor of social psychology at Portland State University.
Put another way: Not only do black men have to worry about being hassled — and possibly shot — by police for simply being black, they have to worry about being run over by motorists.
Kahn said a follow-up study is underway to see whether drivers also discriminate based on gender and whether crosswalk design and signage might change driver behavior.
But can it change deep-rooted stereotypes? Ralph Ellison devoted a novel to the profound invisibility of African Americans. Researchers have shown the same thing. Taxi drivers roll past black people hailing taxis. Doctors miss telltale signs of critical medical conditions. Teachers fail to see a minority child’s gifts.
Implicit bias describes the way that people may unconsciously be biased toward others based on their race, gender or some other group category even if they are not explicitly racist in their thinking.
Yet those subtle biases can emerge when people encounter a stressful situation or make split-second decisions, such as when driving. A U.S. study found that people in expensive or “high-status” vehicles were the least likely to yield to a pedestrian. An Israeli study found that drivers are more likely to yield to pedestrians in their own age group.
The effect of such subtle biases is complex. But it might cause minority pedestrians to act in ways that put themselves in danger, such as forcing the right-of-way when cars fail to stop for them, Kahn said.
The U.S. Centers for Disease Control and Prevention, citing 10 years of data, says blacks are twice as likely to die in pedestrian accidents than whites, even when controlling for differences such as socioeconomic status and alcohol use.
“We definitely can’t say that the differences in things such as fatality rates can be explained by what we observed,” said Arlie Adkins, an assistant professor at the University of Arizona School of Landscape Architecture and Planning. But Adkins said he believes that over time and with repetition, these slights contribute to risk.
The study — whose findings were published in August by Transportation Research Part F — took place in downtown Portland, a city of about 600,000 that’s 76 percent white and about 6 percent black.
A mid-block crossing without signals was selected so that there would be no doubt the drivers were yielding to a pedestrian, and not slowing for an intersection or to make a turn. The crosswalk was marked with zebra striping. The trials were conducted in daylight, so visibility wasn’t an issue.
The researchers used six young men who were black or white to be pedestrians. All of them were in their 20s. Each had a similar height and build, and they wore identical, nondescript clothing: khakis and a long-sleeve gray shirt. They were coached on how and when to approach the crosswalk, with the same pace and posture. They were told to make eye contact with drivers but otherwise be as neutral as possible in their facial expression.
In 88 trials, a total of 173 drivers passed through the crosswalk, including those who stopped. There was not a huge racial discrepancy in regard to whether the first car to reach the crosswalk would stop for a pedestrians: 55.6 percent stopped for white pedestrians, compared with 48.8 percent for blacks.
What was more striking, however, was that if the first driver failed to stop for a black pedestrian, several others blew by him, too. In fact, black pedestrians were more than twice as likely to be passed by two or more cars, compared with white pedestrians.
The researchers — Adkins, Kahn and Portland State doctoral student Tara Goddard — said their findings were consistent with research on people’s response to antisocial behavior. That is, if you see people acting badly, you’re more likely to do the same.
“I think what’s really important is first recognizing, or having some initial evidence, that drivers are treating pedestrians differently based on their race and physical appearance,” Kahn said.
Whether “stereotypically racialized clothing” — sagging pants? tweed jackets? — enhances the effect of skin color is something that might be the subject of future research, they said. | <urn:uuid:7cfd1407-5898-41ef-88b9-b6dcc6c7a1a5> | CC-MAIN-2017-39 | https://www.washingtonpost.com/news/dr-gridlock/wp/2015/10/26/walking-while-black-can-be-deadly-too-study-finds/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688103.0/warc/CC-MAIN-20170922003402-20170922023402-00247.warc.gz | en | 0.975664 | 1,024 | 3.015625 | 3 |
1 Kings 6-7
The United Kingdom under Solomon, cont’d. 1 Kings 1-11
1 Kings 5:1-:9:9 Solomon’s Temple, cont’d.
1 Kings 6:1-38-The date is 967 B.C. “Ziv” is the second month of the Hebrew calendar year and includes parts of April-May on the modern calendar. Solomon begins building the Temple.
- The normal cubit was 18 inches in length. However, 2 Chronicles 3:3 suggests that the cubit used here may have been 20.9 inches. In either case, the structure was not large…probably measuring 90-105 feet in length, 30-35 feet wide, and 45-52½ feet high.
- It had a triple deck arrangement of rooms along its walls with access by a winding staircase (:8).
- The Holy of Holies occupied one-third of the interior space and the Holy Place occupied two-thirds.
Solomon finished construction of the Temple 7 years later during the month of “Bul” (October-November). This Temple stood until it was destroyed in 586 B.C.
1 Kings 7:1-12-Solomon constructs other buildings including an armory (“the house of the forest of Lebanon”), a throne room, and his own house.
1 Kings 7:13-51-Solomon has all of the furnishings of the Temple made. He sets up two pillars on the steps of the porch of the Temple. He named them “Jachin” (“he establishes”) and “Boaz” (“in him is strength”).
7:23-26 This gigantic laver for the priests’ washing was ten cubits (14½ ft.) across when measured from outside rim to outside rim, but the inside measurement was two handbreaths (6 in.) less (v. 26). This inside measurement was apparently used when calculating the circumference as 30 cubits (52½ ft.). It contained 2,000 baths (a bath was about 5.8 gallons).
Ryrie Study Bible, 1 Kings 7:23 footnote, p. 518
Prayer: Father, every time the Jews would enter the Temple to worship You they would see the two pillars and be reminded that it was You who established them and it is You who keeps them. Please help me to always be mindful of those two inspiring truths when I come to worship You. | <urn:uuid:6d2d9bad-ce42-4dde-a431-9c91e59f7284> | CC-MAIN-2018-05 | https://templeonline.net/read-thru-old-testament-devotional-may-3-2017/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887849.3/warc/CC-MAIN-20180119085553-20180119105553-00618.warc.gz | en | 0.961595 | 528 | 3.40625 | 3 |
Created in 1921, the Executive Board (EB) is the executive organ of the IOC. The Executive Board sees to the management of IOC issues and ensures respect for the Olympic Charter. It is the only body competent to propose Charter modifications to the Session, submit names of persons it recommends for election and appoint the IOC Director General.
Originally composed of five members, the EB of today has 15: the IOC President, four Vice-Presidents and 10 members. The Vice-Presidents and members are elected by the Session in a secret ballot for a term of office of four years.
Click here for more information and for the current composition of the IOC Executive Board
Today, the IOC has 22 commissions which have the function of advising the President, EB and Session. There are also coordination commissions for each edition of the Olympic Games, as well as an evaluation commission for candidate cities. The commissions can be permanent or ad hoc.
The IOC President defines the mission of each commission and appoints its members. These are chosen according to their expertise in the commission’s area of activity. Only IOC members may chair a commission. Some of these commissions are mixed, including IOC members, representatives of the International Olympic Sports Federations and the National Olympic Committees, athletes, technical experts, advisers and sports specialists.
For more information, select the desired commission in the "Olympic Movement Directory" menu on the right-hand side of this page. | <urn:uuid:75dc09d9-48e1-4c32-861f-31238bc422f6> | CC-MAIN-2015-14 | http://www.olympic.org/about-ioc-institution?newstab=calendar&tab=executive-board | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300464.72/warc/CC-MAIN-20150323172140-00203-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.94409 | 291 | 2.71875 | 3 |
Abanindranath Tagore (1871-1951) was a nephew of Rabindranath Tagore. He was born at Jorasanko and was educated at the Sanskrit College, Calcutta. He learnt painting privately under English and Italian instructors. He led the revivalist movement in Bengal in the field of modern Indian paintings with the help of a band of disciples such as Nandlal Bose, A.K. Halder, K.N. Majumdar, S.N. Gupta and a host of others. The first major exponent of Swadeshi values in Indian art, he is known to have founded the Bengal School of Art or Neo-Bengal School. He was also a noted writer and known as Aban Thakur. In the realm of painting, Abanindranath Tagore and Nandalal Bose are known to have expressed the nationalist ethos.
Contribution of Abinandranath Tagore in Indian Paintings:
- He was of the belief that the western art was materialistic in character and India needed to return to its own traditions to recover the spiritual values in the art.
- Abanindranath Tagore’s works reflect the synthesis of Ajanta murals and Mughal painting. Essentially a romantic painter, he delighted in painting the hoary past. He along with his disciples viz. Nandalal Bose and Ashit Kumar Haldar are said to be the Pre-Raphaelites of Bengal. Pre-Raphaelites refer to a group of reformer English painters, poets, and critics, who came together and tried to reform art by rejecting what it considered the mechanistic approach first adopted by Mannerist artists.
- In those times, the Hindu Philosophy was becoming more and more influencing in the west. Taking clue from that, Abanindranath Tagore believed that Indian traditions could be adapted to express these new values, and to promote a progressive Indian national culture.
- The first major work accomplished by him was Arabian Nights series (1930). His later works show the influence of Chinese and Japanese calligraphic traditions.
- Famous paintings are: Bharat Mata, The Passing of Shah Jahan (1900), My Mother (1912–13), Fairyland illustration (1913), Journey’s End (circa 1913)
Abanindranath Tagore portrayed Bhārat Mātā (1905) as a four-armed Hindu goddess wearing saffron-colored robes, holding a book, sheaves of rice, a mala, and a white cloth. The image of Bharatmata was an icon to create nationalist feeling in Indians during the freedom struggle.
The image was imaginative, with Bharatmata standing on green earth and blue sky behind her; feet with four lotuses, four arms meaning divine power; white halo and sincere eyes.
- The historical context, in which Abanindranath painted Bharatmata was the Swadeshi Movement sparked off in 1905 around the partition of Bengal. This image does not incorporate the map of India; instead it had followed the protocols of the emergent “Neo-Bengal” revivalist style of depicting the female form as ethereal and austere.
- She has four arms, which to Indian thinking, denote the divine power. The Shiksha, Diksha, Anna , Bastra, these are the four gifts of the motherland which she has been depicted as offering with her four hands.
- Though, she has been painted as a common Bengali woman, her divine statuture is most obvious from her four arms and the delicate halo that rings her head. The impact of this painting was that Bharatmata became the new deity of the country, even if she was first named “Banga Mata” and later was renamed by him as “Bharat Mata“.
- Bharatmata was used as a mobilizing artefact during the anti-partition processions. The critics appreciated as a new nationalist aesthetic.
Sister Nivedita was such an admirer of this painting that she wanted to publish it in tens of thousands and scatter it all over the land so that there is not a peasant’s cottage is left between Kedarnath to Cape Camorin that had not the presence of Bharatmata somewhere on her walls. | <urn:uuid:d5dac1fe-4fbb-4291-b378-749f05ed2d99> | CC-MAIN-2020-24 | https://www.gktoday.in/gk/abanindranath-tagore/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407001.36/warc/CC-MAIN-20200530005804-20200530035804-00344.warc.gz | en | 0.972706 | 916 | 3.34375 | 3 |
Digital storytelling and students’ self-reports of intellectual engagement
The purpose of this study was to explore the impact of Digital storytelling (DST) on the intellectual engagement of Grade 6/7 students in their language arts classes. The six-week study adopted a pre-test and post-test mixed methods design. Quantitative data was collected before and after measuring intellectual engagement using the same survey used by Willms, Friesen and Milton (2009) in their National study titled What Did You Do In School Today? Qualitative data was also collected to further allow Grade 6/7 students the opportunity to say more about whether they feel what they learn in language arts is relevant to their everyday lives, and whether or not they feel motivated to do well in language arts. The intellectual engagement mean scores were calculated for each of the ten quantitative questions before the DST project resulting in an average mean for the group that was below the cutoff for indicating intellectual engagement. The same survey was given again after the DST project resulting in all mean scores falling above the cut-off signifying that intellectual engagement increased. These findings highlight the important educational value of DST by engaging students intellectually by bridging the gap of what students are doing at home informally to what they could possibly be doing in the language arts classroom. | <urn:uuid:2d6743af-5019-467b-a389-65cfe13eae67> | CC-MAIN-2018-09 | https://viurrspace.ca/handle/10613/2310 | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812327.1/warc/CC-MAIN-20180219032249-20180219052249-00038.warc.gz | en | 0.953162 | 262 | 2.953125 | 3 |
Algeria became independent of France in 1962. French colonial mapping had been carried out by the Institut Géographique National (IGN), Paris, and its predecessor, the Société Géographique de l’Armée. This involvement continued for several years after independence until in 1967, the Institut National de Cartographie, Algiers, was established and took over responsibility for mapping. The current name is Institut National de Cartographie et de Télédétection (INC).
There is a long history of 1:50,000 scale mapping; the oldest version, Type Algérie Tunisie, published from 1897 was on a Bonne projection, but after 1942, the French Type 1922 specification was used, on a Lambert conformal projection. Some sheets were published in a standard edition printed in five colors with 20 m contours, and others appeared in a provisional five-color edition (Edition provisoire). These three versions together provided complementary cover of much of the northern part of the country. Sheets in these series use a consecutive numbering system. In 1987, a new 1:50,000 scale series was launched by INC. This is a six-color edition on the UTM projection, Clarke 1880 ellipsoid, and is intended to produce a national map of consistent quality. Sheet lines and designations follow the International map of the World system. This new cartography has a planned cover of northern Algeria in 507 sheets. These have 10 m or 20 m contours and some sheets are also hill shaded. Publication has continued steadily through the 1990s and about 160 sheets have been issued.
1:25,000 scale mapping began in the coastal areas in 1961, using the specification designated Type 1960. The projection is UTM, Clarke 1880 ellipsoid. The mapping was relaunched in 1987 with sheet lines changed to conform to the IMW system, and each sheet now covers an area of 7′ 30″x7′ 30″. This map is in four colors and has 10 m interval contours. There is a planned cover of about 900 sheets for northern Algeria, and some 365 sheets have been published.
An extensive cover of the country has also been achieved at 1:200,000 scale in a series of 242 sheets. This mapping began by the French as Carte d’Afrique and continued from 1983 by INC as Carte d’Algérie. Another 1:200,000 scale version was published in the Type 1922 specification in the early 1960s by IGN, Paris, and covered much of the north of the country in 37 sheets printed in six colors with 50 m contours and hill shading.
Soviet military topographic mapping exists at the following scales: 1:1,000,000 (19 sheets, complete coverage, published 1975-1988); 1:500,000 (54 sheets, complete coverage, published 1970-1986); 1:200,000 (372 sheets, complete coverage, published 1977-1988); 1:100,000 (232 sheets, primarily coastal coverage, published 1973-1986) and city (1:10,000 to 1:25,000) topographic mapping for the cities of Algiers (El Djazair), Annaba, Constantine and Mers El Kebir, published between 1975 and 1978. These products are available in print, digital raster and digital vector GIS formats from East View Geospatial.
Some 1:100,000 scale mapping was undertaken in the 1950s, and 88 sheets were published in a four-color edition.
A 1:500,000 scale series in 43 sheets, printed in four to seven colors with 100 m contours and relief shading was published between 1961 and 1977. A three-sheet 1:500,000 scale tourist map of northern Algeria has been published by INC. The 1:1,000,000 scale International map of the World coverage is also complete.
Planimetric mapping of urban areas at 1:5,000 and larger was undertaken with assistance from the former Czechoslovakia.
The current objectives of the INC are to proceed with the completion of the 1:50,000 and 1:25,000 scale map series using classic photogrammetric mapping techniques, and to use satellite remote sensing techniques in the revision of 1:200,000 scale mapping.
Earth science mapping is carried out by the Office National de la Recherche Géologique et Minière (ONRGM), established in 1984 within the Ministère de l’Industrie Lourde. Previously, earth science mapping had been undertaken by several different departments within the Ministry, and French agencies had been responsible for geological coverage prior to independence. There is published mapping at a variety of scales, but none gives complete cover. The 1:500,000 scale Carte géologique however, provides cover as far south as 26°N. 1:200,000 scale geological mapping covers part of the north of the country using sheet lines of the Type 1960 topographic series and of earlier series. In the south, mapping undertaken mainly in the 1980s and 1990s is published on the one-degree International map of the World sheet lines. The 1:50,000 scale series sheets are numbered sequentially using the old topographic sheet system. This is an active series with about 115 sheets published so far. There are also numerous local and regional maps and map sets covering smaller and greater regions of the country, such as a 1:500,000 Carte géologique du Sahara: Massif du Hoggar in 12 sheets, published by the French Bureau de Recherches Géologiques et Minières (BRGM) in the early 1960s. An energy map has been published by Petroleum Economist (PE).
Several vegetation maps have been published by the Institut de la Carte Internationale du Tapis Végétal, Toulouse, and are based on the principles of H. Gaussen. They include 1:1,000,000 scale vegetation map of the area around Algiers, a 1:50,000 scale map of Ghardaia and 1:200,000 scale maps of Oran and Guelt-es-Stel-Djelfa. All maps are accompanied by booklets.
Cadastral mapping is the responsibility of the Agence Nationale du Cadastre, while the Office National des Statistiques is responsible for demographic and socioeconomic data.
Small-scale tourist maps are published by INC and by several overseas commercial map publishers, including Michelin, Cartographia, and GEOprojects. | <urn:uuid:7c5954d0-b27f-4a7b-9370-da5c11329311> | CC-MAIN-2021-10 | https://geospatial.com/resources/country-data/algeria/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359082.48/warc/CC-MAIN-20210227174711-20210227204711-00505.warc.gz | en | 0.932914 | 1,364 | 2.890625 | 3 |
Wipro Placement Question Paper 2017.
then the simplified function is
( Capital letters are copliments of corresponding letters
A=compliment of a)
[a] a [b] ab [c] abc [d] a(bc)* [e] mone
(bc)*=compliment of bc
2) A 12 address lines maps to the memory of
[a] 1k bytes [b] 0.5k bytes [c] 2k bytes [d] none
3) In a processor these are 120 instructions . Bits needed to impliment
[a] 6 [b] 7 [c] 10 [d] none
4) In 8085 microprocessor READY signal does.which of the following
is incorrect statements
[a]It is input to the microprocessor
[b] It sequences the instructions
Ans : b
5) Return address will be returned by function to
[a] Pushes to the stack by call
Ans : a
Ans : 3267
7) If A>B then
else B>C then
in this , for 75% times A>B and 25% times B>C then,is 10000 instructions
are there ,then the ratio of F to G
[a] 7500:2500 [b] 7500:625 [c] 7500:625 if a=b=c else
8) In a compiler there is 36 bit for a word and to store a character 8bits are
needed. IN this to store
a character two words are appended .Then for storing a K characters string,
How many words are needed.
[a] 2k/9 [b] (2k+8)/9 [c] (k+8)/9 [d] 2*(k+8)/9 [e] none
9) C program code
int zap(int n)
then the call zap(6) gives the values of zap
[a] 8 [b] 9 [c] 6 [d] 12 [e] 15
10) Virtual memory size depends on
[a] address lines [b] data bus
[c] disc space [d] a & c [e] none
Ans : a
11) Critical section is
[b] statements which are accessing shared resourses
Ans : b
12) load a
then the content in accumulator is
Ans : a**2+b**4
Q13 – Q15. Four questions given on the below data
X,Yand Z are senior engineers. A,B,C,D are junior engineers. Company wants to
select 4 enginers. Two will be senior and two will be juniors. The company wants
these engineers to work in the most productive way so they respect each person’s
Y is not friends with A
Z is not friends with C
B is not friends with A
If B is selected then who will be the remaining 4 members ?
If C is selected, Z and ___ cannot be selected?
D is always selected if ___ is selected?
Q14. A speaks truth 70% of the times, B speaks truth 80% of the times.
What is the probability that both are contradicting each other is ?
Q15. ?((2x-3)/((x2 +x+1)2 )dx is ?
Q16. Ram starts from A walking 2 km North and turns right and walks 4 km and
turns right again and walks 4 km and turns right again and walks 4 km and meets
Radha at Bwalking in the opposite direction to Ram .
a) Which direction does Ram walk after the first turn?
b) Distance between A and B
Q17. If the equation x2 – 3x + a = 0 has the roots (0,1) then value of a is ?
Q18. A and B’s temperature are 10?c and 20?c having same surface , then their ratio
of rate of emmisions is ?
Q19. An atomic particle exists and has a particlular decay rate . It is in a train .
When the train moves, a person observes for whether the decay rate
(c) depend on the directions of movement of train
Q20. Which of the following exchanges positive ions
Q21. After execution of CMP, a instruction in Intel 8085 microprocessor
(a) ZF is set and CY is reset.
(b) ZF is set CY is unchanged
(c) ZF is reset, CY is set
(d) ZF is reset , CY is unchanged .
Ans. ZF is set and CY is reset
Q22. The best tool for editing a graphic image is ?
Q23. Network scheme defines
a.)one to one
b.) many to many
c.) one to ,many ?
Q24. A person wants to measures the length of a rod.First he measures with
standing ideally then he maeasures bymoving parrel to the rod
(a)the length will decrease in second case
(b)length will be same
(c) length will increse in the second case.
Q25. One U-230 nucleus is placed in a train moving by velocity emiting alpha rays
.When the train is at rest the
distance between nucleus and alpha particle is x . One passenger is observing the
particle . When the train is moving
what is the distance between particle and nucleus ?
(b) x + vt
(c) x – vt
Q26. What is the resulting solution when benzene and toluene are mixed ?
Q27. If the word FADENCOMT equals 345687921 then
What is FEAT
Find representation of 2998
Q28. Given 10 alphabets out of which 5 are to be chosen. How many words can be
made with atleast one repetition.
Q29. Arrange by acidic values : phenol, nitrotolouene and o-cresol?
Q30. Find sum of 3 + 5/(1+22) + 7/(1 + 22 + 32) + ……
Ans. 3n/(1 + n)
The following are few sample questions that maybe asked in the software paper.We
haven’t been able to give the values in certain problems ; only the type of questions
have been mentioned.
Q31. What sorting algos have their best and worst case times equal ?
Ans. O(nlogn) for mergesort and heap sort
Q32. What page replacement algo . has minimumn number of page faults ?
Ans. Optimality algorithm
Q33. What is the use of virtual base class in c++
Ans. Multiple lines between derived classes.
Q34. Find the eccentricity of a given node in a directed graph
Q35. Convert the infix to postfix for A-(B+C)*(D/E)
Q36. What is swapping
Q37. Assignment operator targets to
Q38. A byte addressable computer has memory capacity of 2 power m Kbytes and
can perform 2 power n operations an instruction involving three operands and one operator needs maximum of —bits
Ans. 3m + n
Q39. In round robin scheduling, if time quatum is too large then it degenerates to
Q40. What is network schema?
Q41. Packet Burst is ______
Q42. Picard’s method uses _______?
Ans. Successive Differentiation.
Q43. If the letters of the word “rachit” are arranged in all possible ways and these
words are written
out as in a dictionary, what is the rank of the word “rachit”.
Q44. Ravi’s salary was reduced by 25%.Percentage increase to be effected to bring
to the original level is
(c) 33 1/3%
Q45. A and B can finish a piece of work in 20 days .B and C in 30 days and C and A
in 40 days.
In how many days will A alone finish the job
(b) 34 2/7
Q46. How long will a train 100m long travelling at 72kmph take to overtake another
200m long travelling at 54kmph
(c) 1 min 15 sec
(d) 55 sec
Q47. What is the product of the irrational roots of the equation (2x-1)(2x-3)(2x-
? All toffees are chocolates
? Some toffees are not good for health
(a) Some chocolates are not good for health
(b) Some toffees are good for health
(c) No toffees are good for health
(d) Both (a) and (b)
The questions 40-46 are based on the following pattern.The problems below contain
a question and two statements giving certain data. You have to decide whether the
data given in the statements are sufficient for answering the questions.The correct
(A) If statement (I) alone is sufficient but statement (II) alone is not sufficient.
(B) If statement(II) alone is sufficient but statement(I) alone is not sufficient.
(C) If both statements together are sufficient but neither of statements alone is
(D) If both together are not sufficient.
(E) If statements (I) and (II) are not sufficient
Q49. What is the volume of a cubical box in cubic centimetres?
(I) One face of the box has an area of 49 sq.cms.
(II) The longest diagonal of the box is 20 cms.
Q50. Is z positive?
(I) y+z is positive
(II) y-z is positive
Q51. Is x>y ? x, y are real numbers?
(I) 8x = 6y
(II) x = y + 4
Q52. If a ground is rectangular, what is its width?
(I) The ratio of its length to its breadth is 7:2
(II) Perimeter of the playground is 396 mts.
Q53. If the present age of my father is 39 yrs and my present age is x yrs, what is
(I) Next year my mother will be four times as old as i would be.
(II) My brother is 2 years older than I and my father is 4 years older than my
Q54. How many brothers and sisters are there in the family of seven children?
(I) Each boy in the family has as many sisters as brothers
(II) Each of the girl in the family has twice as many brothers as sisters
Q55. x is not equal to 0, is x + y = 0?
(I) x is the reciprocal of y
(II) x is not equal to 1
Following questions are based on letter’s analogy.First pair of letters should
have the same relationship as the second pair of letters or vice versa.
Q56. ? : BGLQ : : YDIN : VAFK
Q57. NLO : RPS : : ? : ZXA
Q58. If “segment” is coded as rffndou, then “ritual” is coded as
Q59. If “football” is “cricket” ,”cricket” is “basketball” ,”basketball” is
“volleyball”,”volleyball” is “khokho” and “khokho” is cricket, which is not a ball game?
Q60. Which of the following is a recursive set of production
(a) S –a|A, A –S
(b) S –a|A, A –b
(c) S –>aA, A–>S
(d) None of these
1.distance D=rt where r & t are +ve and r is constant,as t increses then
ans:D increses irrespective of r & t
2.E=I*I*R what is the effect of E when I becomes I/2
ans:1/4E(E decreses by 4 times)
3.out of 55 eggs 5 are defective. what is % of defective eggs
4.salary is ‘s’ per month,’x’% of salary is given as bonus, if 3 months
salary is s1,s2 & s3 then what is his salary.
ans:s1*x/100 + s2*x/100 + s3*x/100
5.consider expresion ‘ab’ . what happens when ‘a’ is divided by ‘c’ &
multiplied by ‘c’.
ans:value remains same.
6.area of triangle=1/2*b*h base incresed by 4 times & height is devided
2, the net effect of area.
ans:twice the the original area.
7.in base representation for a rupee 100 paise,then base 8
what is rupee value .
8.A>B,B>C,C=D,D>E,then which is greatest
a)A/B b) A/C c) A/E d)none
9.to travel ‘m’ miles the time is ‘h’ hours,then what is the time taken
travel M miles.
10.a sum ‘s’ is divided into 4 parts.second person gets Rs 10 more than
first.3rd person is Rs 10 more than second, 4th is 10 more than 3rd.
how much amount do 1st person get.
11.fridge cost R Rs,cover value is 5,discount d% then its new cost
12.1/8 is divided by ‘s’ , if ‘s’ is incresed by 2 times, what is the
ans:increses two times.
section 2. letter series
1. a c b d f e g i __ ans: h
2. x y z u v w r s t __ ans: Q
3. a c f j o __ ans:u
section 3. numerical ability
2. 31 – 29+2/33=__ ans:64/33
3. 2.904+0.0006=___ ans: 2.9046
4. 55/1000=___ ans:.005
5. 0.799*0.254= 0.202946
7. 842.8 +602=1444.8
8. 5.72% of 418= 23.9096
9. 625% of 7.71=48.1875
10. 25% of 592=148.00
12. 15% of 86.04=12.906
section 4 : DIAGRAMMING
each flowchart contains 5 questions .
in each flow chart,there will be 5 numbered(1,2,3,4&5)
boxes(cells).each cell we have to fill with the conditions given below.
1. 400 employee(not complete question)
different categories based on age,salary,lenth of expereince in years
2. 10 balls,red,black balls.
2 points for red balls etc.. 3 points for a ball
if it is of the same colour as preceeding one..
cell 1-c,cell 3-d,cell 5-d,cell 2-e,cell 4-e.
30 coins. these are divided into 3 groups:A,B,C to find
the only largest weight coin,other 29 coins are of lower weight.
D A C A C.
4. totally there are 100 numbers to find largest(LNUM).smallest(SNUM).
A _ D _ _ _
feed problem to adjust temperature and pressure for
(answer not known exactly.).
5.bag red,black balls,different condition
Please upload more on Wipro Placement Question Paper
Please upload more on Wipro Placement Question Paper | <urn:uuid:865cb396-3b6e-4b27-af36-9c30d851aa60> | CC-MAIN-2018-39 | https://www.oldquestionpapers.net/2010/06/wipro-placement-question-paper.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158001.44/warc/CC-MAIN-20180922005340-20180922025740-00096.warc.gz | en | 0.841469 | 3,511 | 3.1875 | 3 |
|28th President of the United States|
From: March 4, 1913 – March 4, 1921
|Vice President||Thomas R. Marshall|
|Predecessor||William Howard Taft|
|Successor||Warren G. Harding|
|34th Governor of New Jersey|
From: January 17, 1911 – March 1, 1913
|Spouse(s)||Ellen Axson Wilson|
Edith Galt Wilson
Thomas Woodrow Wilson (1856 - 1924), a Democrat, was elected as the 28th President of the United States of America, and reelected in 1916, serving from 1913 to 1921. A Princeton president who became an intellectual leader of the Progressive Movement, Wilson demonstrated his mastery over Congress by creating the Federal Reserve System, lowering the tariff, and revising the antitrust laws in a way that ended most of the "trust-busting" and drew clear lines on what was allowed. In general these policies would be in line with conservative recommendations in 2009. He supported liberal policies such as raising wages of railroad workers when they threatened a nationwide strike in 1916. Trying repeatedly and failing to broker peace during World War I, Wilson in 1917 led the United States into the war. He set up a draft and trained millions of soldiers, sending the American Expeditionary Forces to France under the command of General John J. Pershing. Woodrow Wilson was also known for his racist policies promoting segregation, and promoted eugenics based off of Darwinist theory..
Wilson played a dominant role in ending the war with his Fourteen Points and played the central role at the Versailles Conference that set the peace terms in 1919. He was the idealist who envisioned Wilson advocated a new international order founded on self-determination, unfettered international trade, the end of militarism, and a worldwide organization of states - the League of Nations. He failed to obtain Senate approval for the Versailles treaty because it required American entry into the League of Nations and a possible loss of control over the war-making power. Wilson refused to involve the Republicans in the peace-making, even though they controlled Congress, and refused the GOP compromise that would have allowed American entry into the League without giving up sovereignty.
Wilson was a very complex man filled with paradox. He was a southern conservative--an elitist with a profound distrust of radical ideas and such left-wing populists as William Jennings Bryan, but became the Democratic Party's most effective advocate of advanced progressivism. His progressivism in 2009 terms is a mix of liberal and conservative ideas, with a much deeper religious underpinning than is seen today. He ranks with Theodore Roosevelt, Franklin D. Roosevelt, Lyndon B. Johnson and Ronald Reagan as the nation's most active and dominant chief executives. He ranks with Abraham Lincoln and Reagan as the most articulate spokesman for national values. He was a war president who largely ignored military affairs and focused on very complex diplomatic issues. He won his war, reshaped the world at the peace conference, and saw his nation reject his idealist League of Nations because he refused to work with Republicans on its mechanics.
A rigid, self-exacting personality, whose uncompromising adherence to principles barred agreement on some of his most important political goals, he was a brilliant opportunist who won stunning electoral victories and led controversial laws through Congress. He understood diplomacy and domestic affairs in depth, and was the first to recognize a solution that could satisfy most of the needs of the interested parties. He was willing to negotiate endlessly, usually getting his way in the end, especially when his powerful rhetoric energized his backers. A devout Presbyterian who studied the Bible every day, he elevated a religious style of idealism to the central place in American diplomacy. A lonely intellectual, he had few friends, and broke one-by-one with his closest advisors, until in his last two years in office he was an invalid controlled in large part by his wife.Wilson's idealistic foreign policy, called "Wilsonianism" sought to end militarism as a force in world affairs, vigorously promote national self determination, create international bodies to head off serious disputes, and use American resources to promote democracy. Wilsonianism (and "idealism" generally) is opposed to "realism" in foreign policy, which stresses a concern for American self-interest, especially in economic and military terms. Wilsonianism reshaped the world in the aftermath of the Great War; its values lie at the core of the foreign policy of George W. Bush (2001-2009).
Wilson was the most profoundly Christian political leader in the world in the 20th century. He felt assured that he was following God's guidance. Wilson considered the United States a Christian nation destined to lead the world. He was a prophet and a postmillenarian, and if idealism clashed with reality, he was certain idealism would prevail.
- 1 Family
- 2 Education
- 3 Academic leader
- 4 Reform governor
- 5 Election of 1912
- 6 President: 1913-21
- 6.1 First term
- 6.2 Second term
- 6.3 Entering the war
- 7 Wilson and religion
- 8 Democracy
- 9 Historiography
- 10 Bibliography
- 11 Primary sources
- 12 External links
- 13 See also
- 14 References
Wilson's father Joseph Ruggles Wilson (1822-1903), born in Ohio, was a Presbyterian minister of Scotch Irish descent. Woodrow's mother Jesse was born in Carlisle, England, to a Scottish-born Presbyterian minister; her family moved to Canada in 1835 and to Ohio in 1837. Woodrow's parents moved South in 1851, owned house slaves, and identified themselves with the culture and political values of the South. The father Joseph Wilson was a theologian, defended slavery and soon emerged as a leader of the Southern Presbyterian Church and an avid supporter of the Confederacy.
Wilson's grandfather (Joseph Wilson's father) was James Wilson, who immigrated to the United States from northern Ireland in 1807 and was first an editor of the Jeffersonian Republican newspaper the Aurora in Philadelphia, and later published Whig newspapers in Ohio and Pennsylvania. Since his father had been ostracized by the northern relatives, Woodrow had no contact with his grandfather or uncles, who were active in antislavery Republican politics in Ohio and Pennsylvania.
Woodrow grew up in the South during the Civil War and Reconstruction his father was a chaplain for the Confederate army. Woodrow saw the humiliation, economic ruin and shame that the loser of a war experiences and the hatred that grows from this, as well as the rampant corruption during Reconstruction in Columbia, the capital of South Carolina. A victim of childhood dyslexia, he became an avid reader. His father imparted a love of literature and politics to his son; much family activity revolved around Bible readings, daily prayers, and worship services at the father's church.
In 1885 Wilson married Ellen Louise Axson (1860 – 1914), the daughter of a Presbyterian minister in Savannah, Georgia. She was an accomplished painter and a successful hostess; they had three daughters.
Woodrow studied at Davidson College in North Carolina in 1873-1874 and at Princeton University from 1875 to 1879. He proved a exceptional student, primarily interested in debate and politics. His father always wanted him to be a minister; Wilson greatly admired the British Prime Minister William E. Gladstone, a Christian in politics, and decided to emulate him. Wilson saw politics as a divine vocation--to be a statesman was an expression of Christian service, he believed, a use of power for the sake of principles or moral goals. Wilson saw the "key to success in politics" as "the pursuit of Perfection through hard work and the fulfillment of ideals." Politics would allow him to spread spiritual enlightenment to the American people.
He was an editor of the Princetonian and wrote his senior thesis on "Cabinet Government in the United States;" it was later published. The essay stressed the superior qualities of the British cabinet system and said it ought to be tried in the United States. After graduation in 1879 he studied law at the University of Virginia; he was admitted to the bar and practiced in Atlanta, in 1882. It was too boring. Wilson's scholarship led him in 1883 to enter the new Johns Hopkins University graduate school where he studied government and history, taking a PhD in 1885. Wilson is the only president to have earned a PhD.
In 1885 Wilson was appointed as a history instructor at Bryn Mawr College, an elite Quaker school for women near Philadelphia, at a salary of $1500 a year (which was enough to hire a servant). In 1888 he moved to Wesleyan University, a Methodist college in Connecticut. His reputation as an outstanding leader in political science brought him a professorship of jurisprudence and political economy at Princeton University in 1890. For the next twelve years he taught at Princeton, popular alike with students and faculty; he became the president of the school in 1902.
Henry Wilkinson Bragdon, Woodrow Wilson: The Academic Years (1967)</ref>
Wilson soon emerged as the nation's foremost academic, in heavy demand in elite circle for his brilliant speeches.
At Princeton he created academic departments but otherwise downplayed the Germanic model of the PhD-oriented research university in favor of the "Oxbridge" (Oxford and Cambridge) model of intense small group discussions and one-one-one tutorials. He hired 50 young professors, called preceptors, to meet with students in small conferences, grilling them about their reading. Complaining that Princeton was dominated by "eating clubs" in which students ate with each other and ignored the professors, he sought to build Oxford-style colleges where students and faculty would eat and talk together. He failed--the eating clubs are still there.
Wilson promote the leadership model, whereby the college focused on training a small cadre of undergraduates for national leadership, "the minority who plan, who conceive, who superintend," as he called them in his inaugural address as the university's president. "The college is no less democratic because it is for those who play a special part." He confronted the dean of the graduate school, who had the German research model in mind and outmaneuvered Wilson by obtaining outside funding for a graduate complex for serious scholarship that was well separated from the fun-loving undergraduates.
Wilson made significant contributions to political science. In 1885 he published his influential treatise Congressional Government: A Study in American Politics, based on his PhD dissertation. It set a new standard in analyzing the actual workings of the federal government with striking clarity and thoroughness. Although Wilson had never visited Congress, his emphasis on the centrality of committees in Congress was a major contribution to the study of political science. Noting how the Constitution's separation of powers had been eroded since the Civil War by the increasing power of Congress, he suggested a remedy for this in a cabinet-style government of the variety proposed by Walter Bagehot in Britain. By criticizing the Constitutionalist and Federalist traditions that had characterized American politics for a century, and showing their faults, Wilson sought to open a serious debate on the political changes in the United States in the intervening century and whether the Constitution remained an adequate regulator of these. By the time he wrote Constitutional Government in the United States (1908), Wilson was advocating the need for constitutional reform that would make Congress and president more representative and, above all, the need for a strong president who could influence Congress rather than submit to it.
Wilson originated the notion that political parties, besides running campaigns, need to be responsible for clearly designed public policies, which they present to the electorate for approval. The key to responsibility was the presidency. Hegelian conceptions of monarchy strongly influenced Wilson, and his view of public opinion contrasted sharply with the Madisonian view of factionalism. Consequently Wilson viewed parties as primarily the machinery through which strong leaders interpret and pursue the public will.
- See also: Administrative State
Wilson was a founder of the study of public administration by political scientists. Wilson believed in a strong, active role for the central government and as president succeeded in establishing legislation that significantly enlarged its regulatory powers. With the publication of Congressional Government in 1885, Wilson established himself as a leader of the political reform movement of the day. The book was the first of its kind to analyze policymaking by the central government and to provide recommendations for changing the process. Wilson was one of the three most prominent public administrationists of the 1880s and 1890s. As an academician, he promoted a separate department for the study of public administration and wrote 'The Study of Administration' (1887), the first published essay by a university scholar on the subject, established Wilson as the leading authority in the field. During the next year he inaugurated a course in public administration at Johns Hopkins University, providing three 6-week lecture series arranged in a 3-year cycle. In 1889, Wilson published a textbook, The State, and, in 1891, he began at Hopkins a new 3-year course which was a further significant step in the development of the study of administration. He was one of the first scholars to realize fully that all government was ultimately to be administration.
On November 16th, 1912, President-elect Wilson took a trip to Bermuda. For the trip, he was given a copy of Philip Dru: Administrator by his adviser Edward House for his reading pleasure. Describing the similarities between Woodrow Wilson and Philip Dru, Franklin K. Lane, who served as Secretary of the Interior for seven years, made the following observations:
|“||Colonel House's Book, Philip Dru, favors it, and all that book has said should be, comes about slowly, even woman suffrage. The President comes to Philip Dru in the end. And yet they say that House has no power....||”|
Wilson as president of Princeton, and Theodore Roosevelt as president of the United States, took an intense interest in the controversy over the reform of college football. In the 1890s and early 1900s, college football faced sharp of criticism over injuries and the role of athletics in college life. Roosevelt and Wilson, loyal followers of Harvard and Princeton, had defended football in the 1890s. In the fall of 1905, however, President Roosevelt called a conference of football experts at the White House to discuss brutality and unsportsmanlike conduct. Thereafter, Roosevelt worked behind the scenes to bring about sufficient reform to preserve football and insure that it would continue to be played at Harvard. In the years 1909-10, when college football again faced an injury crisis, Wilson worked with the presidents at Harvard and Yale to make reasonable reforms. Both Roosevelt's and Wilson's approaches were consistent with their strategies for national political change. In the years that followed the reforms on the gridiron, football evolved rapidly into the 'attractive' game that Wilson had advocated and a far less brutal game than the unruly spectacle that Roosevelt had tried to control.
Wilson was the first southerner elected president since Zachary Taylor in 1848, and much of his political base came from young progressives in that region, especially intellectuals, editors and lawyers.
Many Civil War veterans were still alive and Wilson used the memory of the War to build nationalism and to facilitate reunion between the North and the South. In his academic work and public comments, Wilson stressed the theoretical and constitutional causes of the war, devaluing the slavery issue and stressing the moral equality of North and South, all in the interest of lessening sectional animosity. During World War I and the struggle for the League of Nations, Wilson frequently drew comparisons between Lincoln and the Union's sacrifices to save the nation and American soldiers' sacrifices during World War I to save the world. He succeeded in overcoming Southern isolationism by convincing the middle class in the region that God had preserved the Union in the Civil War in order to spread democracy throughout the world. He appealed to Southerners to demonstrate the patriotism that many said they lacked. He was able to convince them that they could wage war for democracy abroad without endangering white supremacy at home.
Wilson drew on Southern conservatism in the development of his political philosophy and identity as a politician from the 1890s to 1921. While Wilson forged a Progressive reformist outlook that encompassed limited government intervention in social and economic matters, he embraced a conservative, organic conception of social change drawn partially from the thought of Edmund Burke and partially from a mythical vision of the Old South as a model of social stability and integration. Deeply alarmed by labor and agrarian radicalism in the 1890s, Wilson resolved to cleanse the Democratic Party of Populist influence. His political vision ultimately sought to adapt American society to the new economic conditions of the 20th century, chiefly defined by the magnification of corporate power, while retaining the race and class hierarchies of tradition. Wilson's vision of Southern conservatism as a regenerative force set the precedent for the conservative ideology that dominated American politics since the 1980s.
As early as 1906 Wilson came under the influence of Colonel George Harvey (1864-1928), a conservative Democrat who owned a publishing empire that included the New York World and Harper's Weekly magazine, reaching the nation's intellectual elite. Harvey, with close ties to Wall Street and J. P. Morgan, saw a future conservative president and promoted Wilson heavily. Wilson became the intellectual leader of the anti-Bryan, anti-Populist wing of the Democratic Party. Harvey helped convince the old-fashioned bosses in New Jersey's cities to make Wilson the Democratic nominee for governor in 1910, explaining this would bring in the middle class vote. Wilson, frustrated at Princeton, made the move and was elected. Wilson then broke with the bosses, and Harvey, denounced Wall Street and the bosses, and electrified the nation with his Progressive reforms in the notoriously corrupt government of New Jersey. Wilson by 1912 had emerged as the cleanest, most religious, best known and most dynamic leader of the Progressive Movement in the Democratic Party.
Election of 1912
William Frank McCombs, a New York lawyer and a a friend from college days, instigated and managed Wilson's campaign for president in 1912. Much of Wilson's support came from the South, especially from young progressive professionals. Wilson managed to maneuver through the complexities of local politics. For example, in Tennessee the Democratic Party was divided on the issue of prohibition. Wilson was progressive and sober, but not a dry, and appealed to both sides. They united behind him to win the presidential election in the state, but divided over state politics and lost the gubernatorial election.
At the convention deadlock went on for over 40 ballots as a two-thirds vote was needed. A leading opponent was House Speaker Champ Clark, a prominent progressive strongest in the border states. Other contenders were Judson Harmon of Ohio, and Oscar Underwood of Alabama. They lacked Wilson's charisma and dynamism. Clark was supported by publisher William Randolph Hearst, a leader of the left-wing of the party. The critical role was played by William Jennings Bryan, the nominee in 1896, 1900 and 1908, who blocked the nomination of any candidate who had the support of 'the financiers of Wall Street.' He finally announced for Wilson, who won on the 46th.
Wilson enjoyed the support of many black leaders including W.E.B. DuBois (a liberal at the time). Wilson's speeches and letters expressed the sentiments of a defender of the underprivileged. However the rejoicing over Wilson's victory was short-lived among blacks as segregationist white Southerners took control of Congress and many executive departments.
In the campaign Wilson promoted the "New Freedom," emphasizing limited federal government and opposition to monopoly powers--positions that he reversed on coming to office.
President William Howard Taft defeated ex-President Theodore Roosevelt in a bitter contest for the Republican nomination, but Roosevelt walked out of the Republican convention and ran as a third party candidate. Wilson's success in the electoral college was assured, despite his 41.8% of the popular vote..
Wilson twice vetoed the Burnett Immigration Restriction Bill, which required a literacy test for immigrants and would have sharply reduced the number of poor immigrants from Poland, Italy and other parts of eastern and southern Europe. As a moderate progressive, Wilson believed southern and eastern European immigrants, though often poor and illiterate, to be capable of assimilation into a homogeneous middle class with other whites. He considered so-called hyphenated immigrants unacceptable because they acted as groups rather than blending into the common population. Indeed he denounced the hyphenates. Wilson sought to achieve American strength through unity, blending together the best characteristics of every nationality to create the ideal citizenry, opposing Henry Cabot Lodge's nativist view that American civilization must be based on an Anglo-Saxon foundation. Immigration from Europe practically ended when the war began, so the issue was postponed ino the 1920s, when a quota system was set up to keep the country's ethnic balance unchanged.
The extremely violent civil war that broke out in Mexico in 1911 drove hundreds of thousands of refugees north across the border, and forced Wilson to intervene. Francisco Madero, an idealistic reformer who came to power in 1911. Madero tried to violently upend the social order in Mexico by destroying the landed aristocracy and the Catholic Church. When Madero was overthrown and murdered by Victoriano Huerta in February 1913, days before Wilson took office, he refused to recognize the new Mexican government. Relations deteriorated between the two countries. After American sailors were arrested in Tampico in April 1914 by Huerta's soldiers, the armed conflict loomed. American soldiers occupied Vera Cruz. In July 1914 Huerta fled to Spain. In 1916 the civil war between warlords Venustiano Carranza and Pancho Villa continued, and in March Villa raided Columbus, New Mexico, killing 20 Americans. Wilson sent Brigadier General John J. Pershing deep into Mexico to capture Villa. Villa escaped the Americans. Despite the demands of outraged senators, Wilson did not declare war on Mexico. He ran for reelection in 1916 on the slogan, "He kept us out of war," meaning out of a war with Mexico.
In the 1910s, suffragists campaigned for the passage of a federal constitutional amendment that would grant women the right to vote. They argued it would purify politics because the new voters would be far less liable to corruption and saloon influences. The movement was led by Protestant northern women, many of whom were active in the prohibition movement at the same time. Wilson, originally opposed to the amendment, was converted through the efforts of women suffragists and became an advocate of critical importance. Both the National American Woman Suffrage Association (NWSA) and the National Women's Party (NWP) used symbolic representations of President Wilson, conferring on him real or symbolic images of presidential power. In practice Wilson hedged, realizing that male Democrats in the big city machines in the North and in the rural South were hostile to woman suffrage. The meaning of democracy was at issue: the NWP portrayed Wilson as a tyrant, the NAWSA depicted him as a champion of freedom. Both organizations played essential roles in the passage of the 19th Amendment. After 1919, the absence of a common goal was a contributing factor to the subsequent divisions within the woman's rights movement, as was the loss of a unique adversary.
Entering the war
Wilson established the Committee on Public Information.
Wilson's commitment to the principle of self-determination affected his decision to intervene in Russia in 1918, as the Bolsheviks (Communists) took power. Unswayed by British, French, and Japanese pressure, Wilson insisted that, unless the Russians invited them, the Allies should not interfere with Russia's internal affairs. In the summer of 1918, the president sent American troops into Siberia with the sole purpose of protecting Czechoslovak soldiers who had broken out of POW camps and were an independent force. Later Wilson realized that the other Allied nations were using the rescue mission as an 'anti-Bolshevik' crusade and for imperialistic motives. As a result, the president ordered US forces to withdraw. Wilson and subsequent presidents until 1933 refused to recognize the new Communist government, and Russia was not invited to the Paris Peace Conference.
In November 1917, Wilson endorsed the pro-Zionist Balfour Declaration issued by Britain. Wilson's aims in this endorsement were both practical and religious. His deep Christian sentiment led him to seek 'a direct governing role in the Near East in the name of peace, democracy and, especially, Christianity. By agreeing to the use of the mandate system by which the transition governments of the Middle East were partially controlled by Britain and France after the war, Wilson was both contradicting and reaffirming his own ideals by allowing only limited self-determination of Middle-Eastern peoples while assuring some respect for property and order.
Paris Peace Conference, 1919
President Wilson was present at the Post-World War I Paris Peace Conference, becoming the first President to ever visit Europe whilst in Office. Along with Prime Ministers David Lloyd George of the United Kingdom and Georges Clemenceau of France, the three were collectively known as the Big Three and met and discussed the peace treaties that would shape post-war Europe. President Wilson pushed for terms that were not too harsh on the already war-crippled Germany, though the British and French leaders pushed for the infamous 'War Guilt Clause' that declared Germany guilty of the war and forced her to pay harsh reparations.
Wilson particularly pushed for the League of Nations to be created, a precursor to today's United Nations.
Fight for the League
Wilson and religion
A Presbyterian of deep religious faith, he appealed to a gospel of service and infused a profound sense of moralism into Wilsonianism.
Link finds that Wilson from his earliest days had imbibed the beliefs of his denomination - in the omnipotence of God, the morality of the Universe, a system of rewards and punishments and the notion that nations, as well as man, transgressed the laws of God at their peril. Blum (1956) argues that he learned from William Gladstone a mystic conviction in the superiority of Anglo-Saxons, in their righteous duty to make the world over in their image. Moral principle, constitutionalism, and faith in God were among the prerequisites for alleviating human strife. While he interpreted international law within such a brittle, moral cast, Wilson remained remarkably insensitive to new and changing social forces and conditions of the 20th century. He expected too much justice in a morally brutal world which disregarded the self-righteous resolutions of parliaments and statesmen like himself. Wilson's triumph was as a teacher of international morality to generations yet unborn. Daniel Patrick Moynihan sees Wilson's vision of world order anticipated humanity prevailing through the "Holy Ghost of Reason," a vision which rested on religious faith.
Wilson was a Presbyterian elder and the son of a leading theologian. He read the Bible daily; he felt 'sorry for the men who do not read the Bible every day.' The Bible, he argued, was 'the one supreme source of revelation of the meaning of life.' Wilson was prone to make explicitly Christian claims about his nation, even excluding the word Judeo from his characterization of the nation's religious heritage. 'America was born a Christian nation,' he explained in a speech on "The Bible and Progress" in 1911: "America was born to exemplify that devotion to the elements of righteousness which derived from the revelations of Holy Scripture."
He held that the Bible "is the one supreme source of revelation, the revelation of the meaning of life, of the nature of God and the spiritual nature and need of men. It is the only guide of life which really leads the spirit in the way of peace and salvation."
God was central in Wilson's life and thought. His profound Presbyterian style of thinking assured him that he was following God's guidance. Wilson personified American optimism and considered the United States a Christian nation destined to lead the world. He was a prophet and a postmillenarian, and if idealism clashed with reality, he was certain idealism would prevail. He saw himself as God's messenger and statesman in a divinely predestined nation; thus he saw himself as God's agent in promoting democracy and world peace. His Fourteen Points and his Covenant of the League of Nations, were, in his view, divinely inspired paths to achieving a new world order.
Wilson’s discussions with Presbyterian missionaries visiting Princeton shaped his diplomacy toward China. Wilson viewed Christianity as a unifying force in the world and the Chinese Revolution of 1911 as the first step toward the spread of Christianity and democracy for China. Wilson gained the admiration of the missionaries and Chinese when he prohibited US participation in a European loan to China. He moved to recognize the government of Yuan Shih-k'ai, hoping that that regime could bring stability to China favorable to the introduction of Christianity. He sought to appoint an ambassador to China who could express Christian values. During World War I, missionaries successfully urged Wilson's opposition to Japanese demands on China. Although the war and its aftermath diverted Wilson from Chinese problems, his foreign policy continued to be influenced by missionaries, particularly Dr. Samuel I. Woodbridge and the Reverend Charles E. Scott.
Wilson advocated a new international order founded on self-determination, democracy, unfettered international commerce, and a worldwide organization of states - the League of Nations. Wilson framed American participation in the war as the first step in ending all wars. Although 'Wilsonian nationalism' has been blamed for the nationalistic emphasis on race and territory in Europe during the 1920's and 1930's, Wilson's policies had actually used ethnic and territorial issues to encourage self-determination and the development of democracy in postwar nations.
Woodrow Wilson's most lasting political philosophy was his view that democracy should be installed around the world. As a major player in setting the terms to end World War I, he helped to break up the Austrian-Hungarian Empire to advance his goal of installing democracy for each ethnic subpopulation. Similar independence was granted with the breakup of the Ottoman Empire. Many of these new nations were receiving self determination for the first time in centuries. Wilson's view of installing democracy worldwide has since been copied by the neoconservatives. Wilson was awarded the 1919 Nobel Peace Prize for his efforts to start the League of Nations.
Historians have been fascinated by Wilson and have vigorously defended him (Link) or attacked him (New Left). Since the collapse of the Communism in Europe in 1989, the mood had shifted in Wilson's favor. Even George Kennan, a harsh critic who favored "realism" against Wilson's idealism. has changed his tune. The New Left attacks represented by Lloyd Gardner's highly critical A Covenant with Power have given way to Thomas Knock's laudatory To End All Wars. The leftist tendency to trace back to Wilson a tradition of economic self-seeking and arrogant interventionism has yielded to a new impulse to see Wilsonian diplomacy as having established "a new American agenda for world affairs," as Akira Iriye writes, built upon "the ideas of economic interdependence and of peaceful settlement of disputes."
- Brands, H. W. Woodrow Wilson 1913-1921 (2003) excerpt and text search 169pp; good short summary by scholar
- Cooper, John Milton. Woodrow Wilson: A Biography (2009), 720 pp. major new biography by leading scholar
- Cooper, John Milton. The Warrior and the Priest: Woodrow Wilson and Theodore Roosevelt (1985), fascinating double biography by leading scholar excerpt and text search
- Hofstadter, Richard. "Woodrow Wilson: The Conservative as Liberal" in The American Political Tradition (1948), ch. 10. influential essay; at ACLS E-books
- Link, Arthur S. "Woodrow Wilson" in Henry F. Graff ed., The Presidents: A Reference History (2002) pp 365-388
- Link, Arthur Stanley. Wilson: The Road to the White House (1947), first volume of standard biography (to 1917); Wilson: The New Freedom (1956); Wilson: The Struggle for Neutrality: 1914-1915 (1960); Wilson: Confusions and Crises: 1915-1916 (1964); Wilson: Campaigns for Progressivism and Peace: 1916-1917 (1965), the last volume of standard biography; online at ACLS E-Books
- Maynard, W. Barksdale. Woodrow Wilson: Princeton to the Presidency (2008) excerpt and text search
- Walworth, Arthur. Woodrow Wilson 2 Vol. (1958); Pulitzer prize winning biography vol 1 online; well-written but old-fashioned (it was written in the 1950s), it has been replaced by Cooper (2009).
Domestic affairs and ideas
- Abrams, Richard M. "Woodrow Wilson and the Southern Congressmen, 1913-1916," Journal of Southern History, Vol. 22, No. 4 (Nov., 1956), pp. 417-437 in JSTOR
- Clements, Kendrick A. The Presidency of Woodrow Wilson (1992), covers domestic and foreign policies; liberal tone
- Cooper, John Milton. Woodrow Wilson: A Biography (2009), 720 pp.
- Cuff, Robert D. "Woodrow Wilson and Business-Government Relations during World War I," Review of Politics, Vol. 31, No. 3 (Jul., 1969), pp. 385-407 in JSTOR
- Curti, Merle. "Woodrow Wilson's Concept of Human Nature," Midwest Journal of Political Science, Vol. 1, No. 1 (May, 1957), pp. 1-19 in JSTOR
- Daniel, Marjorie L. "Woodrow Wilson--Historian," Mississippi Valley Historical Review, Vol. 21, No. 3 (Dec., 1934), pp. 361-374 in JSTOR
- Dimock, Marshall E. "Woodrow Wilson as Legislative Leader," The Journal of Politics, Vol. 19, No. 1 (Feb., 1957), pp. 3-19 in JSTOR
- Link, Arthur S. Woodrow Wilson and the Progressive Era, 1910-1917 (1954), remains the standard history of his first term.
- Link, Arthur S. "Woodrow Wilson: The American as Southerner," Journal of Southern History, Vol. 36, No. 1 (Feb., 1970), pp. 3-17 in JSTOR
- Link, Arthur S. "Woodrow Wilson and the Democratic Party," Review of Politics, Vol. 18, No. 2 (Apr., 1956), pp. 146-156 in JSTOR cover 1913-14
- Livermore, Seward W. Woodrow Wilson and the War Congress, 1916-1918 (1966)
- Macmahon, Arthur W. "Woodrow Wilson as Legislative Leader and Administrator," American Political Science Review, Vol. 50, No. 3 (Sep., 1956), pp. 641-675 in JSTOR
- Malin, James C. The United States after the World War (1930)
- Pestritto, Ronald J. ed. Woodrow Wilson and the roots of modern liberalism (2005) ISBN: 0742515176' argues Wilson subverted the ideas of the Founders by his progressivism
- Pietrusza, David 1920: The Year of the Six Presidents New York: Carroll & Graf, 2007.
- Saunders, Robert M. In Search of Woodrow Wilson: Beliefs and Behavior (1998)
- Turner, Henry A. "Woodrow Wilson and Public Opinion," Public Opinion Quarterly, Vol. 21, No. 4 (Winter, 1957-1958), pp. 505-520 in JSTOR
- Wolgemuth, Kathleen L. "Woodrow Wilson and Federal Segregation," The Journal of Negro History, Vol. 44, No. 2 (Apr., 1959), pp. 158-173 in JSTOR
- Weinstein, Edwin A., James William Anderson and Arthur S. Link. "Woodrow Wilson's Political Personality: A Reappraisal," Political Science Quarterly, Vol. 93, No. 4 (Winter, 1978-1979), pp. 585-598 at JSTOR
- Wolfe, Christopher. "Woodrow Wilson: Interpreting the Constitution," Review of Politics, Vol. 41, No. 1 (Jan., 1979), pp. 121-142 in JSTOR
- Woodward, Carl R. "Woodrow Wilson's Agricultural Philosophy," Agricultural History, Vol. 14, No. 4 (Oct., 1940), pp. 129-142 in JSTOR
- Ambrosius, Lloyd E., “Woodrow Wilson and George W. Bush: Historical Comparisons of Ends and Means in Their Foreign Policies,” Diplomatic History, 30 (June 2006), 509–43.
- Bailey; Thomas A. Wilson and the Peacemakers: Combining Woodrow Wilson and the Lost Peace and Woodrow Wilson and the Great Betrayal (1947)
- Clements, Kendrick, A. Woodrow Wilson: World Statesman (1999)
- Clements, Kendrick A. The Presidency of Woodrow Wilson (1992), covers foreign policy
- Clements, Kendrick A. "Woodrow Wilson and World War I," Presidential Studies Quarterly 34:1 (2004). pp 62+.
- Cooper, John Milton. Woodrow Wilson: A Biography (2009), 720 pp.
- Davis, Donald E. and Eugene P. Trani; The First Cold War: The Legacy of Woodrow Wilson in U.S.-Soviet Relations (2002)
- Greene, Theodore P. ed. Wilson at Versailles (1957)
- Henderson, Peter V. N. "Woodrow Wilson, Victoriano Huerta, and the Recognition Issue in Mexico," The Americas, Vol. 41, No. 2 (Oct., 1984), pp. 151-176 in JSTOR
- Knock, Thomas J. To End All Wars: Woodrow Wilson and the Quest for a New World Order (1995)
- Kimitada, Miwa. "Japanese Opinions on Woodrow Wilson in War and Peace," Monumenta Nipponica, Vol. 22, No. 3/4 (1967), pp. 368-389 in JSTOR
- Levin, Jr., N. Gordon Woodrow Wilson and World Politics: America's Response to War and Revolution (1968)
- Link, Arthur Stanley. Woodrow Wilson and the Progressive Era, 1910-1917 (1972) sumarizes diplomatic history
- Link, Arthur S.; Wilson the Diplomatist: A Look at His Major Foreign Policies (1957)
- Link, Arthur S.; Woodrow Wilson and a Revolutionary World, 1913-1921 (1982)
- Magee, Malcolm D. What the World Should Be: Woodrow Wilson and the Crafting of a Faith-Based Foreign Policy (2008) excerpt and text search
- May, Ernest R. The World War and American Isolation, 1914-1917 (1959)
- Trani, Eugene P. “Woodrow Wilson and the Decision to Intervene in Russia: A Reconsideration.” Journal of Modern History (1976). 48:440—61. in JSTOR
- Walworth, Arthur. Wilson and His Peacemakers: American Diplomacy at the Paris Peace Conference, 1919 online edition
- Clements, Kendrick A. "The Papers of Woodrow Wilson and the Interpretation of the Wilson Era", The History Teacher, Vol. 27, No. 4 (Aug., 1994), pp. 475-489 in JSTOR
- Seltzer, Alan L. "Woodrow Wilson as 'Corporate-Liberal': Toward a Reconsideration of Left Revisionist Historiography," Western Political Quarterly, Vol. 30, No. 2 (Jun., 1977), pp. 183-212 in JSTOR
- Steigerwald, David. The Reclamation of Woodrow Wilson? Diplomatic History; 1999 23(1): 79-99, on foreign policy in EBSCO; notes that New Left revisionism (by William Appleman Williams and N. Gordon Levin, Jr.) claiming that Wilson's Open Door was a facade for the imperialistic extension of American economic advantage, has faded away
- Watson, Jr., Richard L. "Woodrow Wilson and His Interpreters, 1947-1957," Mississippi Valley Historical Review, Vol. 44, No. 2 (Sep., 1957), pp. 207-236 in JSTOR, summarizes different interpretations as of 1957
- Extensive essay on Woodrow Wilson and shorter essays on each member of his cabinet and First Lady from the Miller Center of Public Affairs
- Pestritto, Ronald J. ed. Woodrow Wilson: The Essential Political Writings (2005)
- Link, Arthur S., ed. The Papers of Woodrow Wilson complete in 69 vol, at major academic libraries. Annotated edition of all of WW's letters, speeches and writings plus many letters written to him
- Tumulty, Joseph P. Woodrow Wilson as I Know Him (1921)] memoir by chief of staff [online edition
- Wilson, Woodrow. The New Freedom (1913) 1912 campaign speeches online edition
- Wilson, Woodrow. Why We Are at War (1917) six war messages to Congress, Jan- April 1917
- Wilson, Woodrow. Selected Literary & Political Papers & Addresses of Woodrow Wilson (3 vol 1918 and later editions)
- Wilson, Woodrow. Messages & Papers of Woodrow Wilson 2 vol (ISBN 1-135-19812-8)
- Wilson, Woodrow. The New Democracy. Presidential Messages, Addresses, and Other Papers (1913-1917) 2 vol 1926 (ISBN 0-89875-775-4
- Wilson, Woodrow. President Woodrow Wilson's Fourteen Points (1918).
- full text of Wilson books and messages online
- In the 1880s Joseph Wilson argued at length that evolution was NOT in conflict with the Bible; he was thereupon forced out as head of the Presbyterian seminary in South Carolina. See Fred Kingsley Elder, Woodrow: Apostle of Freedom (1996) online review
- Francis P. Weisenburger, "The Middle Western Antecedents of Woodrow Wilson," Mississippi Valley Historical Review, Vol. 23, No. 3 (Dec., 1936), pp. 375-390 in JSTOR
- See White House biography of Ellen Louise Axson Wilson
- Edward S. Corwin, "Woodrow Wilson and the Presidency," Virginia Law Review, Vol. 42, No. 6 (Oct., 1956), pp. 761-783 in JSTOR. It was published in a journal edited by Henry Cabot Lodge, who became Wilson's bitter enemy in 1919.
- W. Barksdale Maynard, Woodrow Wilson: Princeton to the Presidency (2008)
- Yale and Harvard later did adopt the college model for undergraduates, but not Princeton. W. Barksdale Maynard, Woodrow Wilson: Princeton to the Presidency (2008)
- he also wrote popular history of high quality, including a five-volume history of the United States and a life of George Washington.
- Scot J. Zentner, "President and Party in the Thought of Woodrow Wilson," Presidential Studies Quarterly; 1996 26(3): 666-677, in JSTOR
- Richard J. Stillman, II, "Woodrow Wilson and the Study of Administration: A New Look at an Old Essay," American Political Science Review, Vol. 67, No. 2 (Jun., 1973), pp. 582-588 in JSTOR; Larry Walker, "Woodrow Wilson, Progressive Reform, and Public Administration," Political Science Quarterly, Vol. 104, No. 3 (Autumn, 1989), pp. 509-525 in JSTOR
- (2014) Colonel House: A Biography of Woodrow Wilson's Silent Partner. Oxford University Press, i-ii. ISBN 978-0195045505.
- (2002) Edith and Woodrow: The Wilson White House. Simon and Schuster, 398. ISBN 978-0743211581.
- (2006) Woodrow Wilson's Right Hand: The Life of Colonel Edward M. House. Yale University, 7. ISBN 978-0300137552.
- (2014) Colonel House: A Biography of Woodrow Wilson's Silent Partner. Oxford University Press, 78. ISBN 978-0195045505.
- (1965) Woodrow Wilson. Houghton Mifflin Company, 288.
- (1922) The Letters of Franklin K. Lane, Personal and Political. Houghton Mifflin Company, 297.
- John S. Watterson, III, "Political Football: Theodore Roosevelt, Woodrow Wilson and the Gridiron Reform Movement," Presidential Studies Quarterly 1995 25(3): 555-564 in JSTOR
- Arthur S. Link, "Woodrow Wilson: The American as Southerner," Journal of Southern History, Vol. 36, No. 1 (Feb., 1970), pp. 3-17 in JSTOR Andrew Johnson was not elected; he moved from vice president to president after Lincoln's death in 1865.
- Anthony Gaughan, "Woodrow Wilson and the Legacy of the Civil War," Civil War History 1997 43(3): 225-242; online in Questia; Gaughan, "Woodrow Wilson and the Rise of Militant Interventionism in the South," Journal of Southern History 1999 65(4): 771-808, in JSTOR
- Michael Dennis, "Woodrow Wilson and Southern Reform Conservatism," Southern Studies: An Interdisciplinary Journal of the South 2006 13(3-4): 1-28.
- Arthur S. S. Link, "Democratic Politics and the Presidential Campaign of 1912 in Tennessee," East Tennessee Historical Society's Publications 1979 51: 114-137
- Arthur S. Link, "The Baltimore Convention of 1912," American Historical Review 1945 50(4): 691-713 in JSTOR
- Nancy J. Weiss, "The Negro and the New Freedom: Fighting Wilsonian Segregation," Political Science Quarterly 1969 84(1): 61-79, in JSTOR
- Lewis L. Gould, Four Hats in the Ring: The 1912 Election and the Birth of Modern American Politics, (2008); Link (1947)
- Hans Vought, . Division and Reunion: Woodrow Wilson, Immigration, and the Myth of American Unity. Journal of American Ethnic History; 1994 13(3): 24-50.
- James A. Sandos, "Pancho Villa and American Security: Woodrow Wilson's Mexican Diplomacy Reconsidered," Journal of Latin American Studies, Vol. 13, No. 2 (Nov., 1981), pp. 293-311 in JSTOR
- Christine A. Lunardini, and Thomas J. Knock, Woodrow Wilson and Woman Suffrage: A New Look. Political Science Quarterly; 1980-1981 95(4): 655-671, in JSTOR
- Betty Miller Unterberger, "Woodrow Wilson and the Bolsheviks: the 'Acid Test' of Soviet-American Relations," Diplomatic History 1987 11(2): 71-90,
- Frank W. Brecher, Woodrow Wilson and the Origins of the Arab-Israeli Conflict. American Jewish Archives; 1987 39(1): 23-47,
- John Morton Blum, Woodrow Wilson and the Politics of Morality (1956); Richard M. Gamble, "Savior Nation: Woodrow Wilson and the Gospel of Service," Humanitas Volume: 14. Issue: 1. 2001. pp 4+; Cooper, Woodrow Wilson (2009) p 560.
- Arthur S. Link, "A Portrait of Wilson," Virginia Quarterly Review1956 32(4): 524-541
- John Morton Blum, Woodrow Wilson and the Politics of Morality (1956), p p10, 197-99
- David Steigerwald, Wilsonian Idealism in America (1994) p. 230.
- Arthur S. Link, ed. The Papers of Woodrow Wilson (1977) 23:20, speech on the Bible, in Denver May 7, 1911
- Josephus Daniels, The Life of Woodrow Wilson 1856-1924 (1924) p. 359
- Malcolm D. Magee, What the World Should Be: Woodrow Wilson and the Crafting of a Faith-Based Foreign Policy (2008)
- Eugene P. Trani, "Woodrow Wilson, China, and the Missionaries, 1913-1921," Journal of Presbyterian History 1971 49(4): 328-351,
- see Steigerwald,(1999) | <urn:uuid:c6dd14f1-8ba1-4ec1-8cbf-37317e3d65d9> | CC-MAIN-2015-48 | http://www.conservapedia.com/Wilson_administration | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398467979.1/warc/CC-MAIN-20151124205427-00237-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.943752 | 10,089 | 3.46875 | 3 |
Q2. Solve the problems given in Example 1.
From Example 1 we get:
Solving by factorization method:
Given the quadratic equation:
Hence, the roots of the given quadratic equation are .
Therefore, John and Jivanti have 36 and 9 marbles respectively in the beginning.
Therefore, the number of toys on that day was
Create Your Account | <urn:uuid:2f1792c1-06c9-490e-b685-ac4d7f985ae7> | CC-MAIN-2020-24 | https://learn.careers360.com/ncert/question-solve-the-problems-given-in-example-1x-square-minus-45x-plus-324/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523564.99/warc/CC-MAIN-20200607044626-20200607074626-00580.warc.gz | en | 0.800154 | 84 | 3.515625 | 4 |
Vincent Van Gogh (1853 – 1890) was a Dutch painter whose Post-Impressionist paintings laid the groundwork for Expressionism, influenced the Fauves and greatly affected 20th century art.
The Expressive Vincent van Gogh Pattern Set for SegPlay® PC released (see more details here)
He created more than 2,000 works, including 900 paintings, three of which make up the world’s ten most expensive pieces of art.
Van Gogh was born in 1853 in Groot-Zundert, a village in the southern Netherlands. His father was a minister and three of his uncles were art dealers, two vocations that were to pull Vincent in different directions at various times in his life.
In letters, Vincent has described his youth as “gloomy, cold and barren,” and he left school at 15. With the help of his uncle, he was offered a job with the art dealer Goupil & Cie, and in 1873 was sent to London and from there to Paris. After complaining repeatedly about the commoditisation of art, his job with the art dealership was terminated and Van Gogh returned to England to work as a teacher and minister’s assistant.
In 1879, after failing a course at a Protestant missionary school near Brussels, Van Gogh began a mission in the poor mining district of Borinage in Belgium. Choosing to live in the same poverty-stricken conditions as the local population, he was dismissed for “undermining the dignity of the priesthood” and returned home. His behaviour over the following months led his father to enquire about having Van Gogh committed to an asylum.
Aged 27, Van Gogh eventually took up the suggestion of his brother Theo, now a successful art dealer, to focus on painting. In 1880, he moved to Brussels and studied at the Royal Academy of Art.
Van Gogh’s first major work, The Potato Eaters, was painted in 1885 shortly after his father’s death. Like many of his early works, the painting used sombre colors, especially dark brown, a preference which would make his paintings difficult to sell; buyers’ tastes were now influenced by the bright tones used by the Impressionists.
His palette however, began to change after he moved to Antwerp in 1885. He studied color theory and began using carmine, cobalt and emerald green. But it was while living in Paris from 1886 to 1888, where he met Emile Bernard and Toulouse-Lautrec and came into close contact with Impressionist art, that Van Gogh’s art really began to develop.
He experimented with Pointillism and painted in the sunflower-rich region of Arles with the artist Gauguin. By late 1888 his behavior was becoming difficult however, and fearing that Gauguin was going to abandon him, he stalked the painter with a razor before cutting off his earlobe and giving it to a local prostitute, telling her to “keep this object carefully.” The following year, after suffering from hallucinations and believing that he was being poisoned, Van Gogh was placed in the mental hospital of Saint-Paul-de-Mausole near Arles.
The beginnings of success did nothing to help Van Gogh’s depression though, nor did the intervention of the physician Dr. Paul Gachet. On July 27, 1890, he walked into a field, shot himself in the chest with a revolver and died two days later.
Although there has been much speculation about the nature of Van Gogh’s mental illness, he is now recognized as one of the world’s greatest artists and a bridge between 19th century Impressionism and 20th century art.
You can find a great collection of Vincent Van Gogh patterns to use with SegPlayPC ™ here: https://www.segmation.com/products_pc_patternsets.asp#VVG.
If you liked this Segmation blog post, we know you’ll enjoy:
–Piero della Francesca – Early Renaissance Artist
— Paul Cézanne – Post Impressionist
— Early Cave Art in Spain
— Make Artist Famous with Hole-Punch Portraits
Have fun and relax with beautiful online painting art. So fun and easy to use with no mess but just a mouse!
Be a Artist in 2 minutes with The Expressive Vincent van Gogh from Segmation SegPlay® PC (see more details here) | <urn:uuid:255ce059-3ce1-401f-a043-f3235bf48a57> | CC-MAIN-2019-39 | https://www.segmation.com/blog/the-expressive-vincent-van-gogh-2 | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574084.88/warc/CC-MAIN-20190920221241-20190921003241-00260.warc.gz | en | 0.981201 | 949 | 3.25 | 3 |
Created bySirshendu De
Modeling is essential and imperative for understanding dynamics of a large scale process. One can undertake a large number of virtual experiments based on the model equations of a process to optimize the operating conditions and/or design the system efficiently. In most of the practical processes, model equations involve more than one parameters leading to partial differential equations (PDE). Various solutions techniques are adopted by the process engineers to solve the partial differential equations. Separation of variables is one of the most robust techniques used for analytical solution of PDEs. This technique provides first hand information of process dynamics rendering it amenable for optimization of system performance. This course aims to develop the solutions techniques and hence the skills of the students to solve PDEs for any engineering applications.
Basic knowledge of Mathematics
INDUSTRIES THAT WILL RECOGNIZE THIS COURSE
CSIR Institute & Laboratories.
All process industries and R & D organizations.
Week 1 : Introduction, Definition & Type of PDE; Classification of various boundary condition & PDEs; Application of principle of linear superposition for PDE; Introduction of separations variables methods for solution of PDE.
Week 2 : Solution of parabolic PDE using separations variables methods ; Solution of higher dimensional PDEs.
Week 3 : Solution of Elliptic & Hyperbolic PDE using separations variables methods.
Week 4 : PDE in cylindrical and Spherical coordinate.
To access the content, please enroll in the course.
Course Syllabus & Schedule
Dr. Sirshendu De is a professor of the Department of Chemical Engineering at the Indian Institute of Technology Kharagpur. His research interests include membrane separations, transport processes and flow through micro-channels. He has over 200 international journal publications/peer reviewed articles, over 50 conference presentations (national and international). He is the holder of 15 patents (national and international), has authored 7 books and 4 of his developed technologies have been transferred to the industry. He is the winner of prestigious Shanti Swarup Bhatnagar Prize in Engineering Science and a fellow of Indian National Academy of Engineering and National Academy of Science India. Presently he is the INAE Chair Professor and Head of the Chemical Engineering Department, IIT Kharagpur. | <urn:uuid:cc74d90c-a9a6-42fa-af22-c2b433df92d9> | CC-MAIN-2018-26 | https://swayam.gov.in/courses/1389-partial-differential-equations-pde-for-engineers-solution-by-separa | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864795.68/warc/CC-MAIN-20180622201448-20180622221448-00618.warc.gz | en | 0.872745 | 470 | 2.671875 | 3 |
On July 19, 1935, just 78 years ago and 70 years after slavery was abolished in the United States, Rubin Stacy was lynched in Fort Lauderdale, Florida as young white girls, women and men looked on with smiles.
The lynching of Lige Daniels on August 3, 1920, in Center, Texas with white onlookers, including young boys dressed in their button-down shirts and ties.
Spectators smiling and gazing at the lynching and burning of Jesse Washington on May 16, 1916, in Waco, Texas.
Front and back of a postcard of the lynching of Virgil Jones, Robert Jones, Thomas Jones, and Joseph Riley on July 31, 1908, in Russellville, Logan County, Kentucky.
The Belgians, under orders of King Leopold II (1835-1909), hung thousands of Congolese citizens.
Alice Seeley Harris with a large group of Congolese children in what was the first photo capturing the atrocities in the Congo Free State in 1904.
Courtesy of Anti-Slavery International/ Autograph ABP
Gordon, an enslaved African after being whipped on countless occasions. The photo was taken at Baton Rouge, La., in 1863.
Nairobi, Kenya, 24 April, 1954, British invaders stand with guns over the Kikuyu or Mau Mau people of Kenya who organized to fight British oppression. The Kikuyu anti-colonial soldiers engaged the British army from 1952-1960 in what is known as the Mau Mau Rebellion. It is estimated that over 20,000 Kikuyus were killed fighting against British colonialists.
Photograph: Popperfoto/Popperfoto/Getty Images
Survivors who escaped through the arid Kalahari desert in south west Africa during the Herero genocide caused by German colonial rulers in 1904.
The Good Ol’ Boys Roundup was an annual whites-only event run by agents of the Bureau of Alcohol, Tobacco and Firearms in southern Tennessee from 1980-1996. “N***er hunting licenses” were sold there, according to a report from the New York Times. | <urn:uuid:0818f1d3-e0b6-4200-a9f7-69f759e4f907> | CC-MAIN-2017-39 | http://worldobserveronline.com/2014/01/19/12-real-graphic-disturbing-photos-atrocities-european-imperialismdomination/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689624.87/warc/CC-MAIN-20170923104407-20170923124407-00482.warc.gz | en | 0.949724 | 433 | 3.03125 | 3 |
How do I get rid of tomato plant disease?
A foliar spray containing calcium chloride can prevent blossom end rot from developing on tomatoes mid-season. Apply it early in the morning or late in the day — if sprayed onto leaves midday, it can burn them. Water plants regularly at the same time daily to ensure even application of water.
What are common tomato diseases?
10 Tomato Plant Diseases to Watch For
- Septoria Leaf Spot. Septoria leaf spot is one of the most common tomato plant leaf diseases.
- Fusarium and Verticillium Wilt.
- Early Blight (Alternaria)
- Late Blight.
- Mosaic Virus.
- Blossom Drop.
- Blossom-End Rot.
How do you take care of tomato plants?
Tomato Plant Care
- Water generously the first few days that the tomato seedlings or transplants are in the ground.
- Water well throughout the growing season, about 2 inches per week during the summer.
- Water in the early morning.
- Mulch five weeks after transplanting to retain moisture and to control weeds.
What’s wrong with my tomato plant leaves?
Dark spots on leaves with concentric rings followed by yellowing between spots is a sign of early blight, a tomato disease caused by a fungus. It occurs on lower leaves first; spots can also appear on stems. To prevent disease spread, avoid getting water on leaves and don’t work with plants when they’re wet. | <urn:uuid:99b033b4-9647-47f8-aa68-63c50bbf88bf> | CC-MAIN-2021-17 | https://englewoodcardiacsurgery.com/operations/tomato-plants-diseases-and-cure.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038863420.65/warc/CC-MAIN-20210419015157-20210419045157-00223.warc.gz | en | 0.900767 | 313 | 3.140625 | 3 |
Near this site in 1779, under the leadership of Governor Bernard de Galvez and his aid Oliver Pollock, Spanish regulars, Americans and Louisiana militiamen marched from New Orleans to Baton Rouge to engage the British forces at Fort New Richmond. Their victory destroyed the British hopes of capturing New Orleans and controlling the Mississippi River.
These passages are incorporated into the sculpture:
"What mortal God comes here in His rage, to trouble the peace of my happy banks... To follow me, you left your fields, your loving children and faithful wives...Brave warriors, companions of my glory, it was with your hands, today, that I won my victory."
"The capture of the bluff at Baton Rouge by his Lordship Galvez,"
Julien Poydras, 1779
Speaking of the Battle of Baton Rouge, Bernardo deGalvez bids farewell to the people at the end of his term of office:
"It will always be an incontestable proof of your love for me and a public testimony of my good conduct towards you."
Bernardo de Galvez, 1783
The bronze relief is by Frank Hayden | <urn:uuid:2e47b242-00f9-4133-9659-1845f4ddc478> | CC-MAIN-2019-35 | https://www.historicalmarkerproject.com/markers/HM1LOF_marcha-de-galvez_Baton-Rouge-LA.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316718.64/warc/CC-MAIN-20190822022401-20190822044401-00239.warc.gz | en | 0.925848 | 232 | 2.6875 | 3 |
Take away all of the water, cities, and roads on Earth's surface, and you're left with nothing but patches of lush, lovely green. These are exactly the kinds of pictures that the Suomi NPP satellite from NASA and the NOAA, produce. The satellite tracks only the planet's vegetation, and the video above covers the shift in one full calendar year. It's amazing how much change takes place in such a short period of time.
The dark green is, obviously, areas that are more dense. Particularly in Brazil, you can see how the darker Amazon rainforest teeming with plant life gradually gives way to lighter, more open agricultural land. And for the most part, the cities we call home appear as empty voids, identifiable solely because of the lush green around it.
This data isn't just for our own personal knowledge; there's plenty of practical benefit, too. For example, the video notes that even the slightest change in the pixelation of Africa could be an early warning signal of an approaching draught. Alternatively, when vegetation regrows, global relief organizations know to start preparing for a potential malaria outbreak state. So it's fascinating sure, but projects like this could end up saving thousands of lives. [NOAAVisualizations, Thanks Matt!] | <urn:uuid:75a90741-3108-4013-b5c7-8cfd5a718de5> | CC-MAIN-2015-35 | http://gizmodo.com/watch-how-much-the-earths-vegetation-fades-away-in-a-si-514316454 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645371566.90/warc/CC-MAIN-20150827031611-00006-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.925775 | 258 | 3.375 | 3 |
Ebola Outbreak May 2018Jenny Abercrombie
As you are no doubt aware from the media, there is an outbreak of Ebola in the Democratic Republic of Congo (DRC). There are no cases in the United States or in any country aside from the DRC. The World Health Organization’s Emergency Committee met May 18th and decided that the outbreak should not be considered an International Health Event, at least at this time, but is of concern and will be closely monitored by WHO, CDC & other international agencies and partners. Doctors Without Borders (MSF), the considered experts on identification, confinement, and treatment, are managing all the outbreak sites along with the Health Ministry of the DRC. There are occasional outbreaks of Ebola and other hemorrhagic fevers in one place or another in Africa (they are considered endemic) but are usually small and well controlled and do not make the news in most cases. This outbreak covers several outbreak sites but is still considered small and manageable. As of May 30, there are 51 cases of Ebola with 35 confirmed, 13 probable, and 3 are suspected. Some previously suspected cases have tested negative for Ebola and counts have been adjusted down as that happens.
This outbreak has become notable and does need to be closely monitored for a few reasons:
- Although the outbreak started in two rural areas with limited risk for spread outside those areas, this outbreak also has cases in Mbandaka, a well populated city that is close to the Congo River that provides travel and commerce to other areas in the region. This increases the risk of spread to those other areas.
- There are multiple areas of outbreak that need to be contained.
- A few health care workers have been infected which increases the risk of spread.
However, there is also cause to be optimistic that containment and control of the Ebola virus is possible:
- Many lessons were learned from the 2015 outbreak and are being applied rapidly to this outbreak.
- There has been a rapid response with adequate resources; more will be added as needed.
- There is a Health Ministry and Population of the DRC that is engaged and participating in operations, there are anthropologists and others who are trained to educate the people about the risk of Ebola, how to identify signs and symptoms, the need for isolation and quarantine when indicated, that outsiders and health care workers are there to help and not to be feared, etc. There is a fear to overcome in many residents that the HCWs are bringing the disease to them and also a tradition of taking their sick and dying for help to churches and villages, which increases the risk of spread.
- There is an investigational vaccine that is being administered to HCWs, to contacts of those that have or are suspected to have Ebola. The Minister of Health was one of the first to receive the vaccine.
- The number of confirmed cases continues to decrease as test results come back and suspected cases are found to not have Ebola. This indicates that they are capturing those that are ill and airing on the safe side until lab testing can be completed. There are onsite labs for more rapid testing and monitoring the status of patients.
- The WHO and the CDC agree that no travel restrictions should be in place at this time but have provided info for those traveling to and from the area as well as for HCW who may be seeing them before and after travel.
- WHO, CDC and other partners are providing assistance and monitoring the situation closely and will make changes, if necessary, to prevent the spread of Ebola as well as treat those who are sick.
The CDC is recommending that “interested parties” stay aware of the current status of the Ebola outbreak and monitor for changes to current recommendations. Also, agencies should review and update, as needed, Ebola policies and procedures in place from 2014-15 and integrate new information and recommendations into the guidelines, assess their current stockpiles of PPE, EPA approved Ebola disinfectants (doesn’t have to be just for Ebola but must be certified to KILL Ebola), assure the development and live practice of donning, doffing of PPE with disinfection, and appropriate disinfection of reusable equipment (when unable to use disposables, like monitor/defibrillators) and the transport vehicle. Practicing with a pseudo germ preparation (Glo Germ, Germ Juice, or GlitterBug) that can be visualized only under blacklight should improve employees’ approach to PPE and disinfection for all diseases. With Ebola and a few others, it may save their life(s). Employees should also be reminded of post exposure policies and procedures as should those that are likely to be contacted should one occur. The medical director or a well-educated and experienced infection control practitioner should review the policy for correctness. Consult with local public health authorities for assistance when needed.
The primary document currently available with EMS-specific guidelines is Guidance for Developing a Plan for Interfacility Transport of Persons Under Investigation or Confirmed Patients with Ebola Virus Disease in the United States posted by the CDC on 1/28/16, does provide a lot of guidance and should be used by EMS and Fire/EMS Systems throughout the United States and its Territories to assure the safest environment possible for first responders and all patients. Click this link for access: https://www.cdc.gov/vhf/ebola/clinicians/emergency-services/interfacility-transport.html
Other 911 Dispatch Center and EMS-specific documents, developed and used during the last Ebola global epidemic, are still on the CDC website but a disclaimer states, “The recommendations on this page are no longer in effect and will not be updated.” The same disclaimer appears on the guidelines intended for emergency departments and ED workers. There is no indication if/when the info contained in these documents will be updated and posted.
A resource page, listing links to other Ebola information that may be useful for First Responders and First Responder Agencies will be included as a separate document on the HIP under the Outbreaks/Emerging Diseases category. As of now, they are current but may be superseded or replaced with new information from the CDC, NIOSH, or other governing body, or archived at any time. Notice of changes will generally appear at the top of the affected page. Posting and Last Reviewed dates are found on the last page of documents.
FirstWatch will be monitoring the Ebola situation closely and will post changes in outbreak alerts and recommendations, as well as providing links and updates as more documents are produced by expert organizations, government bodies. | <urn:uuid:51300650-3859-441f-ae81-cb566e96df5a> | CC-MAIN-2018-34 | https://www.firstwatch.net/ebola-outbreak-may-2018/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218899.88/warc/CC-MAIN-20180821191026-20180821211026-00678.warc.gz | en | 0.960325 | 1,342 | 3.171875 | 3 |
In the OFDM example, we have described the OFDM modulation and demodulation, including channel estimation and CP insertion. On the significance of the CP we have already elaborated in another article. However, in all these works, we have assumed that the receiver knows, at which point in time the OFDM symbol is received and hence on which received samples to perform the FFT.
However, in reality this information is not available by default. Instead, the receiver needs to perform a synchronization procedure to obtain the start of the OFDM symbol. When talking about OFDM, the most fundamental work was published by Timothy Schmidl and Donald Cox in their paper Robust Frequency and Timing Synchronization for OFDM. In this notebook, we are going to illustrate their algorithm presented in this paper concerning the estimation of the frame start in the time domain. In addition, the authors propose a method for frequency offset estimation, which we silently ignore in the present description.
So, to summarize, here's the task of synchronization:
Given a received OFDM signal, how can we obtain knowledge about where in the signal the OFDM symbols are located?
In what follows we will describe the proposal by Schmidl&Cox and implement this algorithm for timing synchronization. However, before we dive into the implementation, we need to setup the system model. | <urn:uuid:19cad47f-6c4d-40c4-bbaf-ea3c1a6376e4> | CC-MAIN-2018-43 | https://pythondigest.ru/view/35093/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510019.12/warc/CC-MAIN-20181016051435-20181016072935-00179.warc.gz | en | 0.958016 | 274 | 2.796875 | 3 |
Tlauka, M., Carter, P.J., Malhberg, T. and Wilson, P N (2011) The first-perspective alignment effect: The role of environmental complexity and familiarity with surroundings. The Quarterly Journal of Experimental Psychology A, 64 (11). pp. 2236-2250. ISSN 0272-4987Metadata only available from this repository.
People often remember relatively novel environments from the first perspective encountered or the first direction of travel. This initial perspective can determine a preferred orientation that facilitates the efficiency of spatial judgements at multiple recalled locations. The present study examined this “first-perspective alignment effect” (FPA effect). In three experiments, university students explored three-path routes through computer-simulated spaces presented on a desktop computer screen. Spatial memory was then tested employing a “judgement of relative direction” task. Contrary to the predictions of a previous account, Experiment 1 found a reliable FPA effect in barren and complex environments. Experiment 2 strongly implicated the importance of complete novelty of the space surrounding the route in producing the effect. Experiment 3 found that, while familiarity with the surrounding space greatly attenuated the FPA effect with immediate testing, the effect reemerged following a 7-day delay to testing. The implications for the encoding and retrieval of spatial reference frames are discussed.
|Subjects:||B Philosophy. Psychology. Religion > BF Psychology|
|Schools:||School of Human and Health Sciences|
|Depositing User:||Pelham Carter|
|Date Deposited:||19 Mar 2013 12:33|
|Last Modified:||19 Mar 2013 12:33|
Downloads per month over past year
Repository Staff Only: item control page | <urn:uuid:f7f8dfd9-cc60-4491-8dc4-8499ca13bbcb> | CC-MAIN-2016-50 | http://eprints.hud.ac.uk/16952/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542246.21/warc/CC-MAIN-20161202170902-00470-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.832637 | 365 | 2.671875 | 3 |
It’s all in the name, and it might explain why Laborador Retrievers are so excited to play fetch!
Affectionately known as Labs, Labrador Retrievers hail from 16th century Newfoundland, now part of the Newfoundland and Labrador provinces of Canada, where they were originally used as fishing dogs. They helped fishermen by pulling in nets and chasing and “retrieving” fish that escaped from fishing lines. Over the years, they were crossed with Setters, Spaniels, and other retrievers, and they gradually became efficient “retrievers” of all sorts of game, from birds to rabbits. Today, they’re the most popular breed of dog in the United States, Canada, and the United Kingdom.
Labs are relatively large, athletic dogs, and typically display these physical traits:
- Weight: 60-88 lbs.
- Height: 22-25 in.
- Coat: Smooth, short, dense, straight
- Color: Black, chocolate brown, or yellow
- Lifespan: 10-13 years
The Labrador Retriever can be at risk for laryngeal paralysis.
What are they like?
Labs are great dogs for active families! They are loyal, loving, patient, and are really good around kids. Smart and eager to please, they are easily trainable and are also a popular choice for service dog work. They are very good swimmers and love to play for hours, and they tend to adjust well to new babies or other household changes that occur in families. Labs also get along well with other animals.
As highly active dogs, Labs do well with active people: running, swimming, and hiking are all great activities for Labs. They are durable and athletic and can keep up during relatively intense physical activities.
While Labs are very healthy, they are prone to the following diseases and conditions:
- Bloat, which can lead to gastric dilatation volvulus (GDV)
- Hip dysplasia and elbow dysplasia
- Knee problems, such as a luxating patella
- Eye problems, such as retinal dysplasia
- Canine Exercise Induced Collapse
Right for you?
Labs are the most popular dog breed for a lot of reasons, but that doesn’t mean they are right for everyone. Here are a few things to consider before bringing home a cute and cuddly Lab puppy:
- Exercise, exercise, exercise! Labs are high-energy dogs and a short walk around the block is rarely enough. You and your family will need to exercise your dog daily – fetch and water-based games are best.
- Do you have a fenced-in yard? Labs need a place to romp and play – without a fenced yard, they tend to wander.
- We all love puppies, but Labs tend to stay puppyish longer than most dogs and don’t mature in personality until around 3 years old. Be ready for this; even though they are highly trainable, you’ll need to be patient.
- Shedding. Labs aren’t long-haired dogs, but they do a fair amount of shedding. If you require a dog hair-free house, a lab might not be the best choice.
Overall, Labs can make great family dogs!
If you have any questions or concerns, you should always visit or call your veterinarian – they are your best resource to ensure the health and well-being of your pets. | <urn:uuid:abb85e80-aa2d-48b7-9f10-c16057a4dd27> | CC-MAIN-2022-21 | https://www.pethealthnetwork.com/dog-health/dog-breeds/labrador-retriever | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662532032.9/warc/CC-MAIN-20220520124557-20220520154557-00691.warc.gz | en | 0.962238 | 737 | 2.828125 | 3 |
“Consider the power of your words as you choose what to say, and consider different ways that you can communicate the same message,” says the campaign’s website. “If you are offended by someone's language, engage them in a discussion. Ask them what they really meant by what they said.”
The campaign provides examples of what it views as offensive speech, and then offers alternative terms.
For example, instead of using the phrase “illegal alien,” the campaign encourages students to use “immigrants,” “undocumented immigrants,” or “undocumented citizens.”
Instead of using the phrase “that’s so gay,” to describe something in a negative way, students should use “inappropriate,” “weird,” “strange,” “out of place/order/line,” or “wrong.”
The website includes testimonial videos from students who support the campaign because it makes them feel better.
Robert Shibley, senior vice president for the Foundation for Individual Rights in Education (FIRE), said he doesn’t see anything wrong with encouraging students to avoid speech that some people may find offensive.
“To the extent that the University of Maryland wants to persuade students to use less offensive speech, ultimately that’s an argument for politeness and it’s their prerogative to do so,” Shibley told CNSNews.com.
Shibley say problems occur when a state-funded institution such as the University of Maryland implements speech requirements by way of speech codes, for example.
On its “Resources” page, the Inclusive Language Campaign notes that its goal is not to be the “language police.” The goal, it says is to “educate and create conversations around language and inclusion on campus.”
Links to advocacy organizations are available for students seeking more information on inclusive language. Organizations include but are not limited to: American Civil Liberties Union (ACLU), Southern Poverty Law Center, National Association for the Advancement of Colored People (NAACP), and the Human Rights Campaign (HRC.)
The Inclusive Language Campaign is administered by the Department of Residential Life and Multicultural Involvement and Community Advocacy Office (MICA), and was made possible by a grant from the U-Maryland’s Office of Diversity & Inclusion. | <urn:uuid:f96149a3-5a6f-4e31-827a-2341985ede9b> | CC-MAIN-2015-32 | http://www.cnsnews.com/news/article/u-maryland-spends-15k-politically-correct-inclusive-language-campaign | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042990177.43/warc/CC-MAIN-20150728002310-00268-ip-10-236-191-2.ec2.internal.warc.gz | en | 0.947096 | 515 | 2.875 | 3 |
Mosquitoes testing positive for West Nile Virus have been detected in Richardson County, Emergency Management Specialist Emily Scribner reported Friday.
People can only become infected with West Nile virus after being bitten by an infected mosquito and there is no evidence that people can get the virus from infected animals or people, or that people can transmit the West Nile virus to other animals, birds or people.
People over 50 years of age have the highest risk of developing a severe illness because older bodies have a harder time fighting off disease. People with compromised immune systems are also at increased risk, however, anyone can get the virus.
People with mild infections may experience fever, headache, body aches, skin rash and swollen lymph glands. People with more severe infections may experience high fever, headache, neck stiffness, stupor, disorientation, coma, tremors, occasional convulsions and paralysis. If you have any of these symptoms, contact your doctor.
The best way to prevent West Nile disease or any other mosquito-borne illness is to reduce the number of mosquitoes around your home and to take personal precautions to avoid mosquito bites. Precautions include:
• Reducing exposure, avoid being outdoors when mosquitoes are most active, especially between dusk and dawn.
• – Make sure doors and windows have tight-fitting screens. Repair or replace screens that have tears or other openings. Try to keep doors and windows shut, especially at night.
• – Eliminate all sources of standing water where mosquitoes can breed, including water in bird baths, ponds, flowerpots, wading pools, old tires and any other receptacles.
• When outdoors, wear shoes and socks, long pants and a long-sleeved shirt, and apply insect repellent that contains DEET, picaridin, oil of lemon eucalyptus or IR 3535, according to label instructions. Consult a physician before using repellents on small children. | <urn:uuid:653dd491-3d88-40ce-a883-6e3827627fc5> | CC-MAIN-2018-47 | https://fcjournal.net/2015/07/28/west-nile-makes-its-way-into-richardson-county/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039749054.66/warc/CC-MAIN-20181121153320-20181121175320-00498.warc.gz | en | 0.928208 | 394 | 3.515625 | 4 |
North Carolina Gazetteers
|North Carolina Wiki Topics|
|North Carolina Background|
|Local Research Resources|
Online Gazetteers[edit | edit source]
- FamilySearch Places
- North Carolina Gazetteer - NCPedia
- North Carolina Hometown Locator
- North Carolina Digital Collection
- The formation of the North Carolina counties, 1663-1943 David Leroy Corbitt. The formation of the North Carolina counties, 1663-1943. Digital Publisher FamilySearch International.
- Miniature atlas and gazetteer of the world John George Bartholomew. Miniature Atlas and Gazetteer of the World. New York ; London ; Edinburgh : Thomas Nelson & Sons 1892
- The origin of certain place names in the United States Henry Gannett. The Origin of Certain Place Names in the United States. Washington, Govt. Print. Off. 1905
- The National Gazetteer of the United States US Geological Survey. The National Gazetteer of the United States. Washington : U.S. G.P.O. ; 1990
Print Only Gazetteers[edit | edit source]
- The North Carolina gazetteer William Stevens Powell. The North Carolina Gazetteer. Chapel Hill, North Carolina : University of North Carolina Press, c1968
- The formation of the North Carolina counties, 1663-1943 David Leroy Corbitt. The formation of the North Carolina counties, 1663-1943. Raleigh, North Carolina : North Carolina State Department of Archives and History, 1969
- North Carolina, her counties, her townships, and her towns Joan Colbert Gioe. North Carolina, Her Counties, Her Townships, and Her Towns. Indianapolis, Indiana : Researchers, c1981
- North Carolina, atlas of historical county boundaries Gordon DenBoer. North Carolina, Atlas of Historical County Boundaries : a project of the Dr. William M. Scholl Center for Family and Community History, the Newberry Library. New York, New York : Charles Scribner's Sons, c1998
Why Use Gazetteers[edit | edit source]
A gazetteer is a dictionary of place-names. Gazetteers list or describe towns and villages, parishes, states, populations, rivers and mountains, and other geographical features. They usually include only the names of places that existed at the time the gazetteer was published. Within a specific geographical area, the place-names are listed in alphabetical order, similar to a dictionary. You can use a gazetteer to locate the places where your family lived and to determine the civil and religious jurisdictions over those places.
There are many places within a state with similar or identical place-names. You will need to use a gazetteer to identify the specific town where your ancestor lived, the state the town was or is in, and the jurisdictions where records about the person was kept.
Gazetteer Contents[edit | edit source]
Gazetteers may also provide additional information about towns, such as:
- Different religious denominations
- Schools, colleges, and universities
- Major manufacturers, canals, docks, and railroad stations
- The population size.
- Boundaries of civil jurisdiction.
- Ecclesiastical jurisdiction(s)
- Longitude and latitude.
- Distances and direction from other from cities.
- Schools, colleges, and universities.
- Denominations and number of churches.
- Historical and biographical information on some individuals (usually high-ranking or famous individuals) | <urn:uuid:c3f6887b-37bb-49e4-8ab6-0e029053e875> | CC-MAIN-2021-10 | https://paas-loadb-dhtaff8ujtdt-1826058300.us-east-1.elb.amazonaws.com/wiki/en/index.php?title=North_Carolina_Gazetteers&veaction=edit§ion=1 | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178373241.51/warc/CC-MAIN-20210305183324-20210305213324-00035.warc.gz | en | 0.817265 | 733 | 2.84375 | 3 |
Actinopterygii (ray-finned fishes) > Scorpaeniformes
(Scorpionfishes and flatheads) > Tetrarogidae
Etymology: Ablabys: Greek, ablabie, -es, ablaboos = harmless (Ref. 45335).
Environment / Climate / Range
Marine; reef-associated; depth range 1 - 78 m (Ref. 11897). Tropical; 38°N - 31°S, 90°E - 179°E
Size / Weight / Age
Maturity: Lm ? range ? - ? cm
Max length : 15.0 cm TL male/unsexed; (Ref. 48635)
Eastern Indian Ocean and Western Pacific: Andaman Sea to Fiji, north to Japan, south to Australia. Replaced by Ablabys binotatus in the western Indian Ocean (Ref. 9710).
Inhabits shallow, subtidal areas with sand rubble and weed (Ref. 9710). A strongly compressed fish that can be seen rocking back and forth on the bottom in response to surge. Easily caught with small hand nets. Nocturnal (Ref. 48635). Solitary or in pairs (Ref 90102).
Life cycle and mating behavior
Maturity | Reproduction | Spawning | Eggs | Fecundity | Larvae
Randall, J.E., G.R. Allen and R.C. Steene, 1990. Fishes of the Great Barrier Reef and Coral Sea. University of Hawaii Press, Honolulu, Hawaii. 506 p. (Ref. 2334)
IUCN Red List Status (Ref. 96402)
CITES (Ref. 94142)
Threat to humans
Common namesSynonymsMetabolismPredatorsEcotoxicologyReproductionMaturitySpawningFecundityEggsEgg development
ReferencesAquacultureAquaculture profileStrainsGeneticsAllele frequenciesHeritabilityDiseasesProcessingMass conversion
Estimates of some properties based on models
Phylogenetic diversity index (Ref. 82805
= 0.6250 [Uniqueness, from 0.5 = low to 2.0 = high].
Bayesian length-weight: a=0.01995 (0.00906 - 0.04395), b=3.01 (2.83 - 3.19), based on all LWR estimates for this body shape (Ref. 93245
Trophic Level (Ref. 69278
): 3.2 ±0.3 se; Based on size and trophs of closest relatives
Resilience (Ref. 69278
): Medium, minimum population doubling time 1.4 - 4.4 years (Preliminary K or Fecundity.).
Vulnerability (Ref. 59153
): Moderate vulnerability (35 of 100) . | <urn:uuid:055c885f-06e0-41cd-a697-e9795479629f> | CC-MAIN-2016-07 | http://www.fishbase.us/summary/Ablabys-taenianotus.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00133-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.686624 | 605 | 2.8125 | 3 |
As young people move into college dorms or begin training programs, they will be in environments where disease can easily spread, says the Michigan Department of Community Health.
“Vaccines aren’t just for children,” said Dr. Matthew Davis, chief medical Executive for the health depatment. “Even healthy teens and young adults can benefit from vaccines that protect against serious, life-threatening diseases."
College life can take a toll on the immune system, health officials say, and that can make students more vulnerable to illness. Young people busy with academics, work and a social life often have unhealthy eating and sleep habits and don't get enough exercise.
The health department encourages students to get vaccines - most of which are covered under health insurance plans until age 26.
For information on vaccine recommendations, go to this link.
And stories of young people with vaccine-preventable diseases are available at shotbyshot.org. | <urn:uuid:92f259a1-9247-41af-bb8c-632b6e2937a5> | CC-MAIN-2015-14 | http://www.mlive.com/news/grand-rapids/index.ssf/2013/08/as_college_students_move_into.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298015.2/warc/CC-MAIN-20150323172138-00100-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.947444 | 194 | 3.09375 | 3 |
A pair of flies beginning reproduction in April may ultimately be progenitors of 200,000,000,000,000,000,000 flies by August. Fly Control for Livestock and Poultry is critical!
WHAT IS balEnce?
- balEnce is a Biopesticide. It is not a toxic chemical.
- balEnce is naturally occurring and environmentally friendly
- balEnce is a “host-specific” pathogenic fungus called Beauveria bassiana that targets adult flies and larvae
- balEnce has no harsh chemicals
- balEnce is safe for humans, animals, and beneficial insects
- balEnce is approved for sale by the US EPA, the PMRA, Health Canada, and the US Department of Agriculture National Organic Program
In Which Areas Do You Need Fly Control for Livestock and Poultry?
HOW DOES balEnce WORK?
balEnce Organic Fly Spray is sprayed throughout the house or barn where the Beauveria bassiana spore is picked up by the fly, grows and reproduces inside the fly and kills it.
The Image to the right shows the Beauveria bassiana spores generating “germ tubes”. These germ tubes enable the fungus to grow inside the fly and kill it.
HOW MUCH balEnce DO I NEED?
As the flies die, beneficial insects take over their natural role of killing the fly population at the egg, larval and pupal stages.
- balEnce is designed to be an essential part of your Integrated Insect Management program.
- balEnce is economical — the usual concentration of balEnce Organic Fly Spray for killing adult flies is a bottle (15 ounces) diluted with water. This will treat approximately 40,000 to 50,000 square feet. A higher concentration effectively kills fly larvae (maggots) before they develop into pupae.
- Regular use of balEnce™ Biopesticide maintains control of your fly problems efficiently in terms of both time and cost.
HOW DO I USE balEnce?
The fly You kill today prevents the future emergence of millions of flies.
- Spray balEnce Organic Fly Spray throughout the house or your livestock barn where the Beauveria bassiana spore is picked up by the fly, grows and reproduces inside the fly and kills it.
- Flies die in 36 hours to five days depending on the temperature. balEnce residual stays on surfaces for more than a month. As the flies die, beneficial insects take over their natural role of killing the fly population at the egg, larval and pupal stages.
- Once control is gained, treat only as needed, the beneficial insects will do the rest ─ balEnce is very economical to use. The manure is chemical free ─ in fact, many balEnce users sell their manure at premium prices because it is pesticide free. | <urn:uuid:49acd5ce-1916-4097-ae02-767115b11b49> | CC-MAIN-2018-34 | https://terregena.com/fly-control-for-livestock-and-poultry/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209980.13/warc/CC-MAIN-20180815063517-20180815083517-00488.warc.gz | en | 0.881867 | 601 | 2.96875 | 3 |
The problem with communism is that it imposes standards on human beings that are not biologically backed up. For instance, equality, the basic foundation of communism, is actually just an outcome of human thought and conscience. Human beings are not biologically/naturally geared towards equality. Man\’s desire to excel above his peers betrays his need to be unequal. So, to achieve this inequality, you can either pull yourself up or push others down or do both simultaneously. It doesn\’t help that homogeneity is against nature\’s design.
As opposed to capitalism, which is purely an economic system, communism is an econo-political system. It propounds a way of society, while capitalism just expounds a system for circulating money and value. Capitalism has as its ally, democracy, which is actually the political system that lets capitalism proliferate in the most prudent fashion. Still, because of the overarching nature of communism, the communistic thought has been popular with thinkers and liberal intellectuals over the years.
If humanism is the doing of communism, then human nature has been the undoing of it. When a nation-state is established and governance begins, greed easily overshadows conscience, and misplaced concerns and myopic judgement supplant the basic ethos of communism.
Have you ever wondered how capitalistic consumerism appeals to most of the masses? People may complain about economic inequality, but will sooner indulge in conspicuous/inconspicuous consumerism when they lay their hands on money, than share it with their fellow citizens. \”Have money, will shop!\”
It all boils down to choice. The history of the evolution of the human species is one of overcoming limitations and inventing options; of struggling to find an alternative to what we\’ve been handed down. It is a history of not being satisfied, itching for improvement, finding an easier, better way, working hard to become lazy and taking the long way to find a short cut. Human beings are naturally attuned to bettering their lot, of wanting to have an option, of wanting to express themselves creatively. This is where communism fails. It simply stifles people. The collective smothers the individual. And that just wont do in the long run.
Democracy, on the other hand, lets the collective and the individual coexist in a kind of an uneasy state of truce. It is aided by capitalism in this effort. While democracy maintains the collective decorum, capitalism lets the individual have choices, options and creative outlets. It is only when capitalism starts playing dirty that the truce falters. Therefore, sometimes democracy has to reprimand capitalism and restore the truce.
It is true that given all circumstances, capitalism can succeed only as long as it does not breach the limits of human sensibilities. Greed, among humans, will be tolerated only so much. People may eat meat, but they still love their pets and appreciate wildlife. Excess of anything is bad. But maintaining that state of equilibrium between greed and conscience is a very delicate affair and an extremely difficult one. As of now, democracy is our best bet. But what\’s next? | <urn:uuid:abad6c63-c5f2-4881-8224-6c35b44108c0> | CC-MAIN-2023-06 | https://anupamchoudhury.com/2008/07/19/the-undoing-of-communism/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00743.warc.gz | en | 0.954646 | 647 | 2.921875 | 3 |
Saturday, February 28, 2009
Daffodils Are Blooming - It's Almost Spring!
Daffodils are blooming here in West Tennessee--daffodils and sunflowers are my two favorite flowers. If daffodils are not blooming where you are, paint the picture above and bring an early Spring into your home!
This painting uses a technique that gives the painted picture a batik-look achieved without the traditional batik use of wax.
Batik is a wax resist dyeing technique used on textiles usually found in several countries of West Africa, such as Nigeria, Cameroon, and Mali, and in Asia, India, Sri Lanka, Bangladesh, Iran, Malaysia, and Thailand. In Indonesia it is considered a national art form.
Instructions for painting this picture using this technique:
1. Do not tape down your paper before you sketch. Sketch in the flowers and leaves with little detail. Make the pencil lines dark enough on the flowers to be seen after the crumpling and wetting technique, but do not press hard enough to indent or scratch the paper.
2. Here's the hard part.....crumple the paper up in a ball as though you were going to throw it away. Concentrate on making wrinkles in all ares of the paper without tearing it....crumple it easily.
3. Submerge the paper ball into water making certain it is evenly wet. Remove from the water and unfold carefully. Smooth onto your sketch board and tape along the edges. The tape will not stick well to the wet surface; however, it will hold enough to keep the paper in place.
4. While the paper is still very wet, float in the background of green and blue working around the flowers. Use a large flat brush or mop to place in the background except for working around the flowers. Use a #6 round or similar size brush to work in the background around the flowers.
5. Let this dry COMPLETELY!
6. Once the background is dry, paint in the flowers using a wet-in-wet technique. Some of the blue and green from the background will be found in the wrinkles and creases of the paper and will look like veins in the flower petals. Also the wrinkles and creases will allow the flower colors to bleed into other ares. Don't despair that is what you want to happen and is part of the beauty of this technique.
7. The leaves are painted in only after the flowers are dry. If your leaves have become hidden under the washes, lightly sketch in some leaves. Using a mix of colors: gold, green, and blue - add leaves using deeper colors to indicate shadows. Some of the leaves are simply painted with a wash of water to lift paint and give the appearance of flowers fading into the background.
8. The painting can be matted on top of a mat board with a torn edge in keeping with the batik look.
Enjoy creating an early Spring at your house! | <urn:uuid:12faddc1-dca5-452b-a8a3-98c69b8b81ac> | CC-MAIN-2018-05 | http://brushstrokesbykc.blogspot.com/2009/02/daffodils-are-blooming-its-almost.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889617.56/warc/CC-MAIN-20180120122736-20180120142736-00368.warc.gz | en | 0.940066 | 620 | 2.609375 | 3 |
Chebyshev Approximation – In the earlier section, we have studied that the Butterworth approximation is the best at ω = 0. But as we move towards cut-off frequency, ωc = 1, approximation becomes poorer. It departs from ideal characteristics.
Let us consider an approximation which “ripples” about the normalized magnitude, unity, in the pass band and magnitude decreases very rapidly beyond cut-off frequency in stop band. This Chebyshev approximation is equally good at ω = 0 and ω = 1. So the approximation is also called equal ripple approximation.
Equal ripple property is obtained by using Chebyshev cosine polynomials defined as,
Let us find Chebyshev cosine polynomials for different values of n.
Higher order Chebyshev polynomials are obtained by using recursive formula,
Thus for n = 2, we get C2(ω)
Substituting values of C1(ω) and C0(ω) from equation (4) and (3) respectively, we get
For n = 3, we get C3(ω) as
Substituting values of C1(ω) and C2(ω) from equations (4) and (6) respectively, we get,
The Chebyshev polynomials for different values of n are as given in the Table 9.11.
The behaviour of Chebyshev polynomials with the variation of ω is as shown in Fig. 9.48.
Some important properties of Chebyshev polynomials useful in low-pass filter approximation are as follows :
- From the plots of Chebyshev polynomials, it is clear that the zeros of the polynomials are located in the interval ω = – 1 to ω = 1, that is, |ω| ≤ 1.
- Within the interval from ω = -1 to ω = 1, the magnitude of Chebyshev polynomial is always less than or equal to unity, that is, |Cn(ω)|≤1 for |ω|≤1.
- Outside interval lei |ω|≤1, magnitude of Chebyshev polynomial rapidly increases with increase in ω.
After the summary of few properties of Chebyshev polynomials, let us study how to use Chebyshev polynomials in low-pass filter approximation. Consider the function ε2 C2n(ω) where ε is the real number which is very small compared to unity. As seen from above properties ε2 C2n(ω) will vary between 0 and ε2 is the interval |ω|≤1 as C1(ω) = 1. Let us add 1 to this function making it 1 + ε2 C2n(ω). This new function will vary between 1 and 1+ε2 for |ω|≤1 where (1 + ε2) is slightly greater than 1. Inverting this new function and relating it to the square of the magnitude we get
In the interval fro |ω|≤1 i.e. in the pass band, the square of the magnitude will oscillate or ripple about a unity such that maximum value is 1 while minimum is 1/(1+ε2) Outside interval |ω|≤1 i.e. stop band, C2n(ω) becomes very large such that |M(jω)|2 approaches zero very rapidly with increase in co. Hence it is most suitable for ideal low pass filter characteristics.
The Chebyshev approximation to the ideal low-pass filter is as shown in Fig. 6.49.
Within the pass band 0 ≤ ω ≤ 1, the magnitude M (jω) oscillates or ripples between 1 and √1+ε2. The distance between maximum and minimum in the pass band is called ripple height and it is given by,
In the stop band, that is, for |ω|≥1, as ω increases, ε2C2n(ω) becomes very large as compared to 1 then
In the stop band, the loss or attenuation expressed in dB is given by
But for large ω, Cn(ω) can be expressed as,
Substituting value of Cn(ω) from equation (12) in the expression for loss,
From above expression it is observed that Chebyshev response falls of at the rate of 20 n dB/decade after initial loss of [20 log10 ε + 6 (n —1)] dB.
In most of the applications ε is very small, which gives 20 log ε term negative. Thus it is necessary to compensate this decrease in the loss in the stop band. To achieve this, a filter of sufficiently higher order is selected.
Basically Chebyshev approximation depends upon two variables namely ε and n. These two values can be determined directly from the specifications given for the filter. The value of ε is determined from maximum permissible ripple. Once the value of ε is fixed, value of n can be found from the required attenuation in stop band. | <urn:uuid:4fd09bf5-eaad-4bb5-862b-b4204d245a55> | CC-MAIN-2022-21 | https://www.eeeguide.com/chebyshev-approximation/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662644142.66/warc/CC-MAIN-20220529103854-20220529133854-00390.warc.gz | en | 0.925848 | 1,114 | 2.515625 | 3 |
New Energy's See-Through SolarWindow™ Estimated to Generate Ten-Fold Greater Electrical Energy & Environmental Benefits Over Today's Rooftop Solar
New Energy Technologies, Inc. (OTCQB: NENE), developer of see-through SolarWindow™ coatings capable of generating electricity on glass and flexible plastics, today released first-ever power modeling estimates of its SolarWindow™ prototype modules.
COLUMBIA, Md.--June 3, 2014 --New Energy Technologies, Inc. (OTCQB: NENE), developer of see-through SolarWindow™ coatings capable of generating electricity on glass and flexible plastics, today released first-ever power modeling estimates of its SolarWindow™ prototype modules. Engineers estimate that SolarWindow™ modules could conservatively produce at least ten times the electrical energy of conventional rooftop photovoltaic (PV) systems, and in some instances, exceed power performance by as much as 50-fold. SolarWindow™ modules could also eliminate the equivalent carbon dioxide (CO2) emissions produced by vehicles driving more than 2 million miles per year.
Recently, New Energy's largest, high-performance SolarWindow™ module set a new "certified" record for generating electricity while remaining see-through; SolarWindow™ high-performance prototype produced over 50 percent greater power than prior attempts publicized by others of comparable organic photovoltaic (OPV) prototype device architecture, size and design.
Using the independently tested and certified power production data for its SolarWindow™ modules from the U.S. Department of Energy's National Renewable Energy Laboratory (NREL), Company engineers have since developed a model for estimating the amount of electrical energy and environmental benefits SolarWindow™ prototype modules may provide.
In every instance where New Energy's high-performance prototype SolarWindow™ modules have been modeled for performance against today's typical rooftop solar PV module systems, the modeling estimates show significantly greater generation of electrical energy and multiple-fold environmental benefits.
By way of illustration, the Company model estimates show that when installed on all four sides of a 50-story building in:
* Phoenix, Ariz. – SolarWindow™ modules could generate enough electricity to power 130 homes each year. Today's rooftop systems could only produce enough for 3 to 11 homes per year.
* Amarillo, Texas – SolarWindow™ modules could provide the equivalent of avoiding the CO2 emissions produced by vehicles driving over 2.2 million miles each year. Today's rooftop systems could only avoid the equivalent CO2 emissions produced from 49,000 to 180,000 miles of vehicle miles per year.
* Miami, Floa. - SolarWindow™ modules could generate over 1.3 million kWh (kilowatt hours) of energy. Today's rooftop systems could only generate from 28,000 to 102,000 kWh.
* Denver, Colo. – SolarWindow™ modules could provide the equivalent reductions in CO2 emissions produced by as much as 770 acres of forest sequestering CO2. Today's rooftop systems could only provide the equivalent CO2 reductions produced by 20 to 70 acres of forest sequestering CO2.
(New Energy's summary estimates are rounded. View actual model estimates at: www.newenergytechnologiesinc.com/powermodel.)
"High power output and meaningful environmental benefits are among the most important drivers for our potential commercial customers, strategic partners, and end consumers," explained Mr. John Conklin, President and CEO of New Energy Technologies, Inc. "We now have a model that estimates SolarWindowT module performance in these key areas, and compares these estimates to today's conventional rooftop solar PV module systems."
"Importantly, we've long believed in the electrical power production and environmental benefits of applying our see-through SolarWindowT coatings to the many acres of glass windows on all four sides of commercial tall towers and skyscrapers, rather than relying on limited rooftop space available for today's conventional solar PV rack-mounted systems. Our decision to pursue vast glass surfaces on buildings to create environmentally friendly energy producing power plants shows its benefits in our latest modeled estimates."
Today's modeled estimates were developed exclusively by New Energy Technologies' engineers and researchers. The Company's internal teams modeled their calculations based on results of independent testing and certification of its record-setting SolarWindowT high-performance modules by the NREL Device Performance Measurement Laboratory. The Device Performance group is one of only two laboratories in the world to hold an International Organization for Standardization (ISO) 17025 accreditation for primary reference cell and secondary module calibration, in addition to accreditation for secondary reference cell calibration under American Society for Testing Materials (ASTM) and International Electrotechnical Commission (IEC) standards.
SolarWindowT is currently under development for eventual commercial deployment in the estimated 80 million detached homes in America and more than five million commercial buildings. The technology is the subject of 42 patent filings, and researchers are on track to advance SolarWindowT towards full-scale commercial manufacturability - a near-term goal.
To view photographs of New Energy's latest high performance SolarWindowT modules, click here.
New Energy Technologies' Proprietary Power Production Model (Power Model) uses Photovoltaic (PV) modeling calculations that are consistent with renewable energy practitioner standards for assessing, evaluating and estimating renewable energy for a PV project. The Power Model estimator takes into consideration building geographic location, solar radiation for flat-plate collectors (SolarWindowT irradiance is derated to account for 3600 building orientation and vertical installation), climate zone energy use and generalized skyscraper building characteristics when estimating PV power and energy production, and carbon dioxide (CO2) equivalents. Actual power, energy production and CO2 equivalents modeled may vary based upon building-to-building situational characteristics and varying installation methodologies.
About New Energy Technologies, Inc.
New Energy Technologies, Inc., together with its wholly owned subsidiaries, is a developer of next generation alternative and renewable energy technologies. Among the Company's technologies under development is:
* SolarWindow™ technologies, which generates electricity on see-through glass and flexible plastics with colored tints popular to skyscraper glass. Unlike conventional systems, SolarWindow™ can be applied to all four sides of tall towers, generating electricity using natural and artificial light conditions and even shaded areas. SolarWindow™ uses organic materials, which are dissolved into liquid, ideal for low-cost high-output manufacturing. New Energy's SolarWindow™ is the subject of 42 patent applications.
Through established relationships with universities, research institutions, and commercial partners, we strive to identify technologies and business opportunities on the leading edge of renewable energy innovation. Unique to our business model is the use of established research infrastructure owned by the various institutions we deal with, saving us significant capital which would otherwise be required for such costs as land and building acquisition, equipment and capital equipment purchases, and other start-up expenses. As a result, we are able to benefit from leading edge research while employing significantly less capital than conventional organizations.
For additional information, please visit: www.newenergytechnologiesinc.com. | <urn:uuid:bddece90-5286-4e58-8180-cf3e7eab5e6e> | CC-MAIN-2017-09 | http://www.altenergymag.com/news/2014/06/04/new-energys-see-through-solarwindow-estimated-to-generate-ten-fold-greater-electrical-energy--environmental-benefits-over-todays-rooftop-solar/16900/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171209.83/warc/CC-MAIN-20170219104611-00037-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.895433 | 1,443 | 2.65625 | 3 |
Some quick definitions of random terms used on this site.
The gateway is a server that controls all wireless access on campus. All wireless connections flow through the gateway, and the gateway ensures that all wireless users are authorized to use it.
In order to secure the wireless system here at Williams and to prevent unauthorized users from accessing the Williams Network, we have implemented a gateway server that sits between our users and our network. This server requires users to log in and authenticate themselves as members of the Williams community.
Insecure applications send passwords and data over clear text (unencrypted). Anyone with a wireless card can “sniff” traffic from insecure applications travelling over wireless airwaves and capture passwords/passphrases. Purple Air is the only available wireless network that will make secure the use of insecure applications, such as telnet, POP etc.
Secure applications encrypt at least the authentication information (usernames and passwords/passphrases) and may also encrypt the data itself. This prevents others from capturing your login information.
A Service Set IDentifier. All wireless devices are assigned an SSID (it’s basically a name). The SSID for the Williams Wireless Network is Purple Air. We also others for Guests, and special purposes. | <urn:uuid:94d49199-ab75-43d3-8993-37e4ec8cd7de> | CC-MAIN-2020-10 | https://oit.williams.edu/help-guides/wifi-and-wired-connections/wireless-glossary/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143373.18/warc/CC-MAIN-20200217205657-20200217235657-00377.warc.gz | en | 0.880854 | 258 | 2.515625 | 3 |
The transmission speed of the cable is limited in most cases by the hardware attached to it. The following is the overview of ethernet cable speed of cat5, cat5e, cat6, cat6a, cat7 and cat8.
The cat 5 cable superseded the cat 3 version and for a number of years it became the standard for ethernet.
Cat 5 cable speed distance. Cat 5 doesn't officially support gigabit ethernet, but with a short (e.g., 1 or 2 meter) cat 5 cable that's in good physical condition, you can often get a seemingly reliable gigabit connection anyway 1. Potentially more interference than cat6. The cat5 cable provides a bandwidth of up to 100mhz, and its speed can range from 10mbps to a maximum of 100 mbps.
For information on audio/video cable distance limits, click here. Cat5 cable is typically used for ethernet networks running at 10 or 100 mbps. Basic cat5 cable was designed for characteristics of up to 100 mhz.
Category 5 enhanced cables can deliver gigabit ethernet speeds of up to 1000 mbps. Cat5e provides a bandwidth of 100 mhz performance, though […] The amount of twists per pair is usually unique for each cable manufacturer.
In other words, cat 7 supports 10gigabitethernet, whereas cat5 does. Any experience and advice would be appreciated. Like amazon’s model, this cable offers a maximum speed of 1gbps but improves over cat 5 and cat 5e products with better crosstalk protection and a higher 250mhz bandwidth.
529 2 2 silver badges 5 5 bronze badges it is incredible how the vendors want make you believe that only the cat6 is able to function in 1000mbps at 100 meters. The max speed of cat5e cable at 100mhz is what you should expect. Cat 5 is also used to carry other signals such as telephony and video.
We have a 20 user ethernet network running 10/100 speed over cat 5 cable. Around 2000 or so, cat5 overtook cat3 as the ethernet cable of choice for lan networking. However, the 10 gigabit network on cat 6 cables is limited to 164 ft., including patch cables.
If you have the luxury of trying out short applications you may be able to operate with cable rated at one lower category than the 100 meter rated cable for the required speed. Another possible application is a 30 foot run at 3 gigabit on a cat 5e cable which should work correctly because its such a short run. Using two cable pairs to signal over copper wire, cat5 is now largely archaic and isn’t widely used for ethernet connections.
100 meters for slower network speeds (up to 1,000 mbps) and higher network speeds over short distances. Devices connected by the cable, including switches and routers, should also support the desired data speeds. For gigabit ethernet, 55 meters max, with 33 meters in high crosstalk conditions.
Cat 6 cables support higher bandwidths than cat 5. After that distance, its ultimate speed is the same as cat 5e, i.e. Cat 6 has to meet more stringent specifications for crosstalk and system noise than cat 5 and cat 5e.
The cable standard specifies performance of up to 250 mhz, compared to 100 mhz for cat 5 and cat 5e. Cat 5 crimping errors, from tools that are too cheaply made are the usual cause in our area. Ethernet cables come in a few different varieties:
It should be noted that cat7 cable has harsher distance limits than cat5e, cat6, and cat6a. The cable itself doesn’t affect “performance” of the circuit/link, unless it doesn’t support the link speed required/used or there is damage or external interference in play. Cat 5 is suitable to carry ethernet signals, but also telephony and video.
Category 6 cable (cat 6), is a standardized twisted pair cable for ethernet and other network physical layers that is backward compatible with the category 5/5e and category 3 cable standards. Cat5 is one of the most common cables existing today. Get some of your cables tested at a professional shop.
The recommended maximum length cable run length is 90 meters of cable backbone and 10 meters of patch cables. Within a single cable, each colored pair will also have different twist lengths based on prime numbers so that no two twists ever align. This is not recognised by the tia/eia.
If we upgrade to a 10/100/1000 switch can we run the 1000 speed over cat5 reliably or must we bite the bullet and yank all the cat5 and install cat6? Now back to the performance. Cat 5e is currently the most commonly used cable, mainly due to its low production cost and support for speeds faster than cat 5 cables.
Cat 5, cat 5e and cat 6 are currently in (reasonably) wide use. Cable technology is backward compatible. Category 5 cable has a bandwidth of up to 100 mhz, support 10 or 100 mbps speed.
Cat5 basic cable has been used successfully up to 1 gigabit speed using ethernet. You might try prebuilt a cat5 or cat6 plenum. Cat5 ethernet cable is the oldest type of these cables. | <urn:uuid:70419bb9-15c9-469b-8190-628f36d396d2> | CC-MAIN-2021-43 | https://blueeyesandbluebonnets.com/cat-5-cable-speed-distance/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585768.3/warc/CC-MAIN-20211023193319-20211023223319-00443.warc.gz | en | 0.926313 | 1,107 | 2.75 | 3 |
‘We have become “God’s own people” through the blood of our Redeemer; for in time gone by the people of Israel was redeemed from Egypt by the blood of the lamb.
…The people who were freed by Moses from slavery in Egypt, after the crossing of the Red Sea and the drowning of Pharaoh’s army, sang a hymn of triumph to the Lord; so too, since we have received pardon for our sins in baptism, we should express due thanks for the heavenly grace we have received.
For the Egyptians, who oppressed God’s people, and who stand for darkness and suffering, are an apt symbol for the sins which harass us, but which have been destroyed in baptism.
The liberation of the children of Israel, and the journey by which they were led to the homeland they has long ago been promised, correspond to the mystery of our redemption, through which we make our way to the brightness of our heavenly home, with the grace of Christ as our light and our guide. The light of grace is symbolised by the pillar of cloud and fire which throughout their journey protected them from the darkness of the night, and led them along their secret path to their home in the promised land’.
St Bede the Venerable, 672-735
Fr Lee Kenyon
A Treasure to be Shared
The Acolyte’s Toolbox | <urn:uuid:40757bc2-ce4d-4521-8a31-0e7a98251e12> | CC-MAIN-2020-50 | http://www.victoriaordinariate.com/blog/gods-own-people | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141727627.70/warc/CC-MAIN-20201203094119-20201203124119-00498.warc.gz | en | 0.972963 | 293 | 2.53125 | 3 |
A nuclear or conjugal family
consists of two married parents as opposed to a single parent.
This newly created conjugal family
offers an alternative to the original family for Elizabeth.
Working from Roman funerary texts, Saller and Shaw could show the clear prevalence of the nuclear family, but they emphasised elements of conjugal family
units in composite texts, which Huebner would rather count as evidence of extended or multiple family households.
This resulted in a horizontal social structure that privileged the value of the conjugal family
and increased the importance of the London guild system as members worked to circulate their wealth among themselves by fostering internal remarriages.
Taken together, the authors show us how mid-nineteenth-century literature resists the habitual, be it with respect to the conjugal family
, homosocial fraternity, or heterosexual relations.
Thematically, Mapping the Margins offers twelve essays that consider the normative, conjugal family
(of homemakers and wives and breadwinners and husbands, along with their dependant children), as a marginalizing force, a powerful model that often served to define those living outside of it.
He affirms that "it was primarily through rales of endangered or lost family life that French familial discourse negatively constructed and disseminated new, positive norms of household living" and that "it was as much through the perception of transgression or lack as through idealized scenes of restored family life that cultural narratives produced the desire for the normative conjugal family
This study is the follow up of an earlier study of laws governing relations in the conjugal family
and their impact on the situation of women in West Africa.
Based on experiences of Western Europe and North America, the Goode model predicts that there will be a worldwide convergence from the "traditional" family system toward a westernized conjugal family
system as non-Western and agrarian societies become increasingly industrialized, urbanized and commodified.
His modernization approach maintains that in the "world revolution" of industrialization and urbanization, traditional family forms are converging to the conjugal family
Table 1: Pearson Correlation Coefficients for Pooled Sample Gender Race Security Marital Gender 1.000 Race -.044 1.000 Security .156 .132(*) 1.000 Marital .257(**) .195(**) -.058 1.000 Conjugal .458(**) .107 .045 .599(**) Family .308(**) .105 .030 .573(**) SexBeh -.325(**) -.091 -.049 -.140 Violence .128(*) -.055 -.020 -.132 Conjugal Family
SexBeh Violence Gender Race Security Marital Conjugal 1.000 Family .634(**) 1.000 SexBeh -.147(*) -.090 1.000 Violence .122 .004 .351(**) 1.000 | <urn:uuid:1c044919-4994-455b-8917-2138c90ed29b> | CC-MAIN-2020-24 | https://www.thefreedictionary.com/conjugal+family | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391923.3/warc/CC-MAIN-20200526222359-20200527012359-00298.warc.gz | en | 0.9004 | 609 | 2.96875 | 3 |
Modern English Grammar
This is the first of a two-part sequence (ENG 050/055) designed to prepare students for composition courses. The course content focuses on major grammatical concepts and writing. A grade of 2.0 or better in ENG 050 is necessary to enter ENG 055.
(A requirement that must be completed before taking this course.)
- Minimum placement test score of 10 ACT or 35 CPT.
Upon successful completion of the course, the student should be able to:
- Identify parts of speech correctly: nouns, verbs, adjectives, adverbs, pronouns, prepositions and conjunctions.
- Identify sentence parts correctly: subjects, verbs, phrases and clauses.
- Express complete thoughts using simple, compound, complex and compound/complex sentences.
- Apply conventional punctuation correctly to all types of sentences.
- Use a dictionary and thesaurus to identify word types and build vocabulary.
- Compose well developed paragraphs.
- Revise paragraphs for coherence, accuracy and clarity.
- Edit paragraphs for sentence skills: grammar, spelling, punctuation and word choice.
- Develop critical thinking skills.
- Develop proficiency in modern grammar.
| ||050||121500||Modern English Grammar|| ||3||Hunley E|| ||19/28/0||Open||
| ||050||141500||Modern English Grammar|| ||3||Harden A|| ||27/28/0||Open||
| ||050||141501||Modern English Grammar|| ||3||Maheshwari A|| ||27/28/0||Open||
| ||050||141551||Modern English Grammar|| ||3||Zorn L|| ||31/31/0||Open||
| ||050||246204||Modern English Grammar|| ||3||Harden A|| ||30/31/0||Open|| | <urn:uuid:46ec4285-b5d5-40c9-9742-403ee076841a> | CC-MAIN-2015-14 | http://schoolcraft.cc.mi.us/academics/course-description/ENG/50 | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131302318.44/warc/CC-MAIN-20150323172142-00048-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.69822 | 399 | 3.046875 | 3 |
How can I get a good grade on my test.
Your brain needs to see things multiple times in order to remember. Hearing the teacher say the information helps. Then take notes so you are hearing it and writing it. Reviewing notes and making flash cards always helps too.
How do you know how to find the average of numbers.
First you add all of the numbers together. Then you divide by they amount of numbers you added.
How could you differentiate instruction for students who are at different levels of learning?
First give your students a pre-test to determine where they are at level wise. Next group your students together in high, middle, and low groups. Middle kids are average kids. This is usually the group you teach to. Then you take what you are teaching the middle kids and expand on it for the high kids. Make it more challenging, give them higher order thinking questions. For the low kids you could cut part of the assignment out, because it takes them longer to complete it. | <urn:uuid:9a819de6-9125-4783-a4c7-71f6bcaff14f> | CC-MAIN-2019-09 | https://tutorme.com/tutors/14188/interview/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481832.13/warc/CC-MAIN-20190217091542-20190217113542-00099.warc.gz | en | 0.960889 | 206 | 3.578125 | 4 |
Bible and archaeology news
King has made it clear that this fourth-century “previously unknown gospel” does not imply that Jesus had a wife; instead, if authentic, the text reveals that an early Christian population believed that Jesus was married. King posits that the Coptic fragment is a translation of a late second-century Greek gospel. Interestingly, the earliest extant claim that Jesus was not married was recorded by Clement of Alexandra around 200 C.E.. These nearly contemporaneous yet divergent early Christian texts reveal that the extended debate on Jesus’ wife, his celibacy and Christian behavior dates back to an earlier period than previously believed.
The 1.5 x 3-inch Coptic papyrus fragment contains 8 lines on the front and six on the back. While the newly announced text is shrouded by a sea of unanswered questions—the original provenience is unknown and the owner of the collection has asked to remain anonymous—King consulted scholars from esteemed institutions including the Institute for the Study of the Ancient World, Princeton University, the Harvard Theological Review and the Hebrew University of Jerusalem, who verify the text’s authenticity.
King unveiled the discovery at Tuesday’s 10th International Congress of Coptic Studies in Rome and the announcement immediately attracted the media’s attention, which will undoubtedly lead to further testing. While the faded ink, the grammar and handwriting appear authentic, King plans to conduct spectrometry and further analysis on the papyrus’ date and authenticity.
The passage “Jesus said to them, ‘My wife …’” is not the only revealing text in this Coptic papyrus fragment. Another clause says “she will be able to be my disciple.” Other phrases include “My mother gave to me life” and “Mary is worthy of it.”
King dated the original composition of this “new gospel” by a comparison with similarly phrased Gnostic gospels including the Gospel of Thomas, the Gospel of Mary and the Gospel of Philip. The Gospel of Philip provides some insightful clues into the relationship of Mary and Jesus. In the article “Did Jesus Marry?,”* Birger A. Pearson analyzes Jesus’ relationship with Mary Magdalene in the Gospel of Philip. While Dan Brown used the restored text, “And the companion of the Savior was Mary Magdalene. The Savior loved her more than all the disciples and used to kiss her often on her mouth” to suggest that Jesus and Mary Magdalene were married, Pearson points out that:
More importantly, immediately following the first passage quoted above, Jesus goes on to explain Mary’s special role in terms of her capacity to receive his instruction—and not her sex appeal. When, in the Gospel of Philip, the disciples ask Jesus why he loves Mary more than them, Jesus responds, “Why do I not love you like her?” He then answers his own question: “When a blind man and one who sees are both together in darkness, they are no different from one another. When the light comes, then he who sees will see the light, and he who is blind will remain in darkness.”1 Jesus is suggesting that he favors Mary because she is like a sighted person compared with the dullard male disciples, who are like blind men. Thus, Mary’s “companionship” is spiritual rather than physical.
King’s “new gospel” may provide a more explicit indication that some early Christian communities believed that Jesus was married, and moreover, that Mary Magdalene was his wife. While the fragment’s date several centuries after the life of Jesus precludes contemporaneous evidence of the historical Jesus, the discovery may greatly further our understanding of early Christian perception of marriage and the New Testament.
* Pearson, Birger A. “Did Jesus Marry?” Bible Review, Spring 2005, 32-39, 47.
Sign up to receive our email newsletter and never miss an update.
Send this to a friend | <urn:uuid:4b3705a1-d3bb-48c5-ac71-7b51333cd07a> | CC-MAIN-2019-47 | https://www.biblicalarchaeology.org/daily/news/a-gospel-of-jesus-wife-on-a-coptic-papyrus/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668594.81/warc/CC-MAIN-20191115065903-20191115093903-00380.warc.gz | en | 0.954453 | 841 | 2.65625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.