text
stringlengths 188
632k
|
|---|
Known as a popular framework used for identifying the reusable components of a computer application or program, ActiveX was designed and launched by Microsoft Corporation into the global commercial market in 1996. This program was developed to support the other products offered by the company such as the Object Linking and Embedding application. Most of the programs of Microsoft use this framework like the Windows Media Player, Microsoft Visual Studio, Microsoft Office and the Internet Explorer. Know more about it by learning the different aspects of ActiveX installs. Moreover, it is helpful to learn the steps needed to efficiently install the ActiveX control.
The Proper Way of Configuring the Computer Application in Internet Explorer
When configuring ActiveX in Internet Explorer, the first thing to do is to open the IE browser in a computer system. Afterwards, select the Security option and choose the appropriate Internet zone. Alter the security level of this program using the computer mouse and then choose the security setting individually. Select ok. Close all the windows and restart the PC. After rebooting the computer, launch the Internet Explorer to see if ActiveX has been successfully configured.
The Steps in Installing ActiveX Control for Mozilla Firefox
If a computer user is more familiar with using Mozilla Firefox as a web browser, the steps for installing ActiveX for such program are as follow. First, check if the browser in a PC supports the application. It is highly possible that ActiveX control is not supported by Firefox. If this problem occurs, then the best thing to do is to search for a third party computer application such as the Mozilla ActiveX Plug-In. Afterwards, download this program and install it in the PC. ActiveX control can be configured by following the procedures in configuring it in Internet Explorer.
Additional Information and Other Important Details About Active X Controls
To use this framework easily, Microsoft Corporation has launched several computer applications that use it. Most of these programs are still in use today such as the ActiveX Data Objects, Active Server Pages, Active Streaming Format, Active Scripting, Active Messaging and ActiveMovie. When installing this control, computer users should be cautious and should pay attention to the other programs that being installed in a PC because it is prone to malicious software, malware and viruses. For computer experts who are interested in writing this framework, they can use various computer languages like Borland Delphi, Visual Basic as well as Microsoft Foundation Class Library.
|
Upwelling of Hot Gas
The Deep, Hot Biosphere. Thomas Gold. 235 pp. Copernicus, 1999. $27.
This book's title is Thomas Gold's hypothesis: that most subsurface microbial food chains are based on nonbiological hydrocarbons upwelling from deep in the earth. This hypothesis is not very well defended. Only two of the chapters discuss microbial communities, and these chapters really avoid the topic of subsurface microbial metabolism, the key aspect of the hypothesis. In fact, this theory is at odds with the observation that most known deep microbes are found in fermentative communities that produce hydrocarbons (methane) rather than consume it.
Despite the title, the real focus of this book is the deep-earth gas hypothesis. Gold believes that most recoverable hydrocarbons were derived from space as the earth accreted. These primordial hydrocarbons, the theory goes, reside in the lower crust and upper mantle and slowly charge shallower conventional petroleum accumulations along planes of tectonic weakness. Because chemicals derived exclusively from bacteria are found in oil, Gold calls on subsurface microbial metabolism to contaminate the primordial oil. Most of the book elaborates and presents supporting evidence for this theory to a general audience.
Arguments in favor of the deep-earth gas hypothesis sound quite convincing on the surface to the uninitiated. But those arguments are deceptive. Well documented and theoretically justified criticisms of this hypothesis and explanations for almost all of the proposed inadequacies of the conventional model for petroleum generation have been published in the past decade, yet these criticisms and alternate interpretations are not mentioned or rebutted here. Key issues unexplained in this book are the occurrence of other chemicals in oils (such as steroids), indicative of specific eukaryotic sources, carbon isotopic fractionation patterns observed in normal alkane species inconsistent with an inorganic origin, and the ability of the conventional petroleum-generation model to predict where and how much of a specific oil type will be found in a geological basin.
I do not recommend this book for either its microbiological or geological aspects. The exciting and diverse world of subsurface microbiology is reduced to a pale caricature of itself. Arguments supporting the deep-earth gas hypothesis may have been valid 30 years ago, but we now know too much about the subsurface and about petroleum geochemistry to seriously consider these ideas in the form in which they are presented here. Like all evolving scientific theories, the conventional model of petroleum generation is still subject to modification in its details. But overall, it is alive and well, and the criticisms raised here are not likely to substantially change the model.—Alton Brown, Atlantic Richfield Company, Plano, Texas
Connect With Us:
An early peek at each new issue, with descriptions of feature articles, columns, and more. Issues contain links to everything in the latest issue's table of contents.News of book reviews published in American Scientist and around the web, as well as other noteworthy happenings in the world of science books.
To sign up for automatic emails of the American Scientist Update and Scientists' Nightstand issues, create an online profile, then sign up in the My AmSci area.
Receive notification when new content is posted from the entire website, or choose from the customized feeds available.
JSTOR, the online academic archive, contains complete back issues of American Scientist from 1913 (known then as the Sigma Xi Quarterly) through 2005.
The table of contents for each issue is freely available to all users; those with institutional access can read each complete issue.
View the full collection here.
|
The Development of Cellular Mobile Communication System
THE DEVELOPMENT OF CELLULAR MOBILE
By: Yusuf Kurniawan
Nowadays, to get in touch with someone who is mobile is not a problem any
more. If we could not call him at home we can contact him while he is on the
move. Whether he is in a remote place out of reach of the telephone line or just on
his way to work, we can still give him a ring. The condition at present differs
greatly compared to the 1940s, when the basic cellular concept was developed. 1
The cellular mobile communication system enables the beginning of the wireless
Cellular phones or mobile phones are now widely used by a lot of people in
all over the world. From year to year the number of mobile phones subscribers
increases. For example in the United Kingdom in the end of 1992 there were 1.4
million subscribers, 2 then in 1993 the number became 1.8 million. 3 It is a
tremendous figure in the growing number of cellular phones subscribers. Based on
the data in the International Institute of Communications (IIC), World Bank,
Britain sat in the second position of having the largest cellular phones subscribers
after the United States in 1989. 4 According to the poll conducted during 30 March
– 2 April 2000 half of all Americans own a cellular phone. 5
Central Office of Information, Aspects of Britain. (London:1994).p. 7.
Central Office of Information in Lax, S. Beyond the Horizon.(Luton:1997).p.20.
Central Office of Information, Aspects of Britain. (London:1994).p.8
The development of the cellular mobile communication system recently is
very fast. The network providers of cellular phones are now ubiquitous in every
country in all over the world. The rapid development and diffusion of the cellular
mobile communication system virtually can not be separated from the previous
development of the telecommunication systems, namely electronic telegraphy,
radio and telephone. Even though the result of technological development were
not planned before, it is important to consider the previous communication
devices. Started from the infancy of the telegraph until the maturity of cellular
mobile communication, it is a span of inseparable history. This essay tries to
reveal the historical and technological development of the cellular mobile
communication system since its infancy up to the present time.
The development of cellular mobile communication system can be interpreted
very broadly. This essay is not going to look at the development in a certain
country but in general, since there are several countries take the lead of
developing cellular mobile communication system such as the United States and
Let us have a look at a glance to the development of the electric telegraph
network. The nature of sending a message through a span of wire electronically
inspired Alexander Graham Bell to set up a new telecommunication system called
telephone. There are two versions actually who invented the telephone, Alexander
Graham Bell or Elisha Gray. Because on the same day, 14 February 1876 they
both patented their inventions in Washington. 6 Telephone uses spoken message
instead of written as it is used in the telegraph system. Most of all, the invention
of the telephone has brought the telecommunication advancement one more step
ahead after the telegraphy. The phenomenon of there will be an advanced new
technology in communication has actually been started in 1851 when the Thomas
Crampton’s Submarine Telegraph Company successfully laid a cable across the
sea, from Dover to Calais. 7 The submarine cables which formerly functioned as
the electronic telegraph network then were improved to convey telephone signals.
And the quality of the cables did gradually improved from copper to coaxial
cables and then to optical fibres. Then, by combining the mobile radio system and
a certain band, the cellular mobile communication system could be actualised for
One of the key elements which cause the rapid development of the cellular
mobile communication system is the invention of optical fibres. Optical fibres
which were invented in 1964 are ‘tiny strands of ultra-pure glass which can carry
voice, data, text and images in digital format’. Moreover ‘they also can carry a
large amounts of digital information including thousands of telephone calls on
pulses of light’. 8 Compared to the predecessor, copper and coaxial cables, optical
fibres obviously exceed in all aspects. Optical fibres have many excellence in the
voice clearness, amounts of calls they can carry, very low level of interference,
speed of pulses and many others that copper and coaxial cables do not have like
data and image transfer. The only thing that might be still a consideration for
Flichy, P. Dinamics of Modern Communications. (London:1995).p. 82.
some cellular phones network providers is probably the cost which is much more
expensive compared with coaxial cables.
Cellular mobile communication is also called wireless communication since
it does not need wire to call. The term ‘wireless’ was actually inspired by
Gulielmo Marconi when in 1894 he succeeded to tap out a message in Morse
Code. And as a response to the signal, a bell rang at the other end of the room. It
was because the signal travelled through the air. Then he called it ‘Wireless’. 9
Thus because Bell’s telephone wires could carry the human voice, then scientists
began to search for ways Marconi’s invention could broadcast speech too. And
then in 1906, Reginald Fessenden managed to do it by changing sound waves into
signals through a process called amplitude modulation (AM). In 1935 Edwin
Armstrong, from the United States, introduced FM (frequency modulation) radio
waves. Since FM used less power, and smaller, lighter receivers, wireless was on
the move. 10
II.1. Cellular Background
a. Period of the 1920s – 1950s
The development of cellular mobile communication system had actually been
commenced in the early of the 1920s (exactly in 1921) when mobile radio
communication was used in a vehicle by Detroit Michigan Police Dept. 11
However the channels got overcrowded very quickly since it was operated at a
Headrick, D.R. The Invisible Weapon. (New York:1991).p. 15.
Central Office of Information, Aspects of Britain. (London:1994).p. 33.
frequency of 2 MHz. Then the next event of important development also occurred
in the United States was the inauguration of the first public mobile telephone
system in the US. It had three channels at 150 MHz. 12 But the interference still
happened and the equipment still could not solve the problem because the
technology at that time did not yet exist to overcome the problems that appeared.
Until the 1920s most of the mobile radio communications used Morse-coded on-
off keying. 13 In the early development, mobile telephone handsets were still very
heavy, bulky and noisy. Because they were operated in the lower frequency part
of the VHF band and the range was about ten miles. 14
b. Period of the 1950s – 1960s
During this period there was a large increase in bandwidth and switching
technology used by the workstations and. For instance in 1956 ’12 wire line
channels were added near 450 MHz.’ And the automatic capability was extended
to the 450 MHz band in the late of the 1960s. It was called “Improved Mobile
Telephone System”, and became the standard for mobile telephone service in the
c. Period of the 1970s – 1980s
This was the period of the more advanced cellular mobile communication system.
It was in 1970 when FCC announced a tentative allocation of 75 MHz in the 800
MHz region. 16 And FCC asked some industries to submit their proposals to obtain
Steele, Raymond. Mobile Radio Communications. (London:1992).p. 1
Steele, Raymond. Mobile Radio Communications. (London:1992).p. 1
communication goals and as well as to demonstrate feasibility. One monumental
event occurred when The Illinois Bell Telephone company was awarded a licence
to operate a developmental cellular system in 1977. And between 1974 and 1981
AT&T Bell Labs collaborated with other cellular terminal vendors to develop
their cellular phones so that consumers would be able to use their mobile phone
on the cellular network. 17 And on October 13, 1983 the first call on a commercial
cellular system was built in Chicago. 18
Based on the development of the cellular mobile communication system in
the first three periods, the most fundamental problem that still existed was
bandwidth –the measure of a communication channel.
d. Period of the 1980s – present
During this period the development of cellular mobile communication system has
been diffusing very rapidly. The big mobile phones manufacturers like Ericsson,
Nokia, Siemens, Motorola and NEC began to adopt and applied new technologies
in their products and to maximaze the quality of sending and reception in their
mobile phones. The development achieved by cellular mobile phone companies
during this period showed a great achievement. Especially during the last ten
years the development of cellular mobile communication system has been very
sophisticated. A cell phone now can be combined with internet. We could be E-
mailing from our purses and downloading from our pockets. With WAP (Wireless
Application Protocol) phones a mobile phone subscriber can access information in
the internet from his mobile phone. More than that, with WAP technology even
one can do shopping just from his fingertip.
Also in this period, mobile phones subscribers are excited by the emergence
of SMS (short message service) that makes them able to send and receive
messages to and from other cellular phones. In addition, nowadays there are many
ASP (Application Service Protocol) that provide service to send sms, one can
send short message to other mobile phones in one country or to all over the world
such as www.lycos.co.uk and www.mtnsms.com. Lycos could deliver message to
mobile phones in the whole UK with 130 maximum characters long. While using
mtnsms one could deliver messages to cellular phones to all over the world with
140 characters long. Even, with mtnsms the subscriber who receives a message
could reply it. And the sender would be able to find out the reply message in his
mtnsms account. And all of these services are mostly delivered within under ten
seconds. These advancements in the technology of cellular mobile communication
has enticed more new subscribers to subscribe to cellular phones.
Along with the technological development of the cellular mobile phones
basically they can be divided into two main categories namely analogue and
digital cellular technologies. Each category has its own types. For example in
analogue we have like AMPS (Advanced Mobile Phone System). It was
developed by Bell Labs in the 1970s and first used commercially in the United
States in 1983. It operates in the 800 MHz band and became the world’s largest
cellular standard. 19 However, after the 1980s there are more and more cellular
mobile providers began to shift to digital system. And GSM (Global System for
Mobile) is considered the first digital cellular system. 20 GSM is a digital
communication technology used by some carriers to provide PCS service. And the
other technologies besides GSM and AMPS are CDMA (Code Division Multiple
Access) and TDMA (Time Division Multiple Access).
II.2 The Basic Principles of Cellular Mobile Phone System
The principle used in cellular is called ‘frequency reuse’. 21 It is aimed to increase
the service to mobile phone’s subscribers. What is meant by frequently reuse is
using low powered mobiles and radio equipment in each site of cells, so that it
enables the same radio frequency to be reused in different cells. And it can
multiply the calling capacity without causing interference. It is greatly different
from the earlier mobile systems which used a high powered, centrally located
transmitter. And the frequency used by the mobile phones were not reused over a
wide area. 22
All analogue and digital mobiles use a network of base stations and
antennas to cover a large area. If it is seen on a diagram the small place which is
covered by each base station appears like a cell in a honeycomb. That’s why it is
called cellular. The size of the cell varies from sixth tenths of a mile to thirty
miles in radius for cellular (1km to 50km). 23 In each cell was built radio base
station to handle the incoming signals from other cells.
The Ericsson diagram below shows the macrocells, microcells and piccocells
work. Slow-moving subscribers such as those who are walking are handled within
microcells. While fast-moving subscribers for instance those who are driving or
on the public transports are handled within the macrocells. Piccocells are to
maintain subsribers of cellular phones who are in a building or in a closed place.
The advancement in dividing cells into several kinds has developed the quality of
receiving and sending voice.
Figure 1: Ericksson Diagram of macrocells, microcells and piccocells
Figure 2: Cells
The cells, geographical area where mobile radio communications in cellular radio
happen between a fixed base station (BS) and a number of roaming mobile
The picture above shows how wireless technology work. Cell phones use low-
energy FM radio waves to transmit voice to the nearest antenna (in a cell) with the
local phone network. Then the call will go through either a regular phone line or
by radio signal to another cell phone, depending on whom we are calling. This
technology uses individual radio frequencies by dividing service areas into
different geographic zones. And these zones are called cells. Cells here can be as
small as Leeds University library or as large as London City. Usually there are
more cells in cities than in rural areas, because there are more people in cities than
in rural areas. So, more people, more cells. And each has its own computer,
transmitter, receiver and directional antenna which are linked to MTSO or Mobile
Telephone Switching Offices. 24 The power of the radio equipment in the base
station is fixed so that it covers only the particular cell. When a cellular phone is
switched on, the computer at the nearest base station senses its presence within the
cell and then the phone can transmit and receive messages from that position. 25
When a cell phone’ subscriber moves from one place to another, his/her call is
handed off by MTSO to the next cell site.
II.3 Analogue vs Digital Cellular Phones
Cellular telephone systems can be ‘analogue’ or ‘digital’. Older systems like
AMPS, TACS, NMT are quot;analoguequot; and newer systems such as GSM and PCS
are quot;digitalquot;. 26 The major difference is in how the audio signals, e.g. our voice, is
transmitted between the phone and base station. quot;Analoguequot; and quot;digitalquot; refer to
this transmission mechanism. Probably just as audio cassettes versus CDs - audio
cassettes are analogue and CDs are digital. 27
In either system, the audio at the microphone always starts out as a voltage
level that varies continuously over time. High frequencies (high pitch) cause rapid
changes and low frequencies cause slow changes. With analogue systems, the
audio is modulated directly onto a carrier. It has many similarities with FM radio
where the audio signal is translated to the RF signal. With digital systems, the
audio is converted to digitised samples at about 8000 samples per second or so.
Central Office of Information, Aspects of Britain. (London:1994).p. 49-50.
The digital samples are numbers that represent the time-varying voltage level at
specific points in time. These samples (numbers) are now transmitted as 1s and
0s. 28 At the other end, the samples are converted back to voltage levels and
quot;smoothed outquot; so that you get about the same audio signal. Some maybe lost, but
it may be unnoticeable - depending on how it is done. With analogue
transmissions, interference (RF noise or some other anomaly that affects the
transmitted signal) gets translated directly into the recovered signal - there is no
quot;checkquot; that the signal makes sense. The neat thing about digital is that the 1s and
0s can not be easily confused or distorted during transmission, plus extra data is
typically included in the transmission to help detect and correct any errors. 29
Digital technology offers better quality of sound, service and more security
for the customers and the capability to support services of the next generation. 30
Moreover, digital is more efficient in terms of its achievement in the network. An
operator could fit more information into each transmission. So, no wonder if there
are many cellular phones’ providers are converting their systems to digital now.
II.4 Cellular Equipment
There are three types of cellular handset or cellular phone, namely the car-phone
or mobile, the transportable and hand-portable. 31
The car-phone or mobile is fitted into a vehicle and receives its power supply
directly from the vehicle’s battery. It is hands-free since it is voice-activated. This
Communication and Technology lecture, December 2000.
Technology and Communication lecture, December 2000.
Central Office of Information, Aspects of Britain. (London:1994).p. 53.
enables a caller to use it without holding the handset. However, this device can
only be used in the vehicle.
The transportable phone is the same with the car-phone but it is designed as
an integral unit. It is equipped with detachable battery so that it can be used
outside the vehicle. However, it has a lower output if it is used outside the vehicle.
Hand-portables are the lightest cellular phones because they are equipped
with battery that is integrated with the handset. And the battery is rechargeable.
Therefore, the hand-portables cellular phones can be used inside or outside a
vehicle. Their power output is lower than the car-phones or transportable, so that
they can work best where network coverage is good, like in cities or other built-up
Based on the analysis, it can be concluded that:
- The problem of the previous technology of cellular mobile communication
system was the limited bandwidth. Because bandwidth allows information to
move effortlessly and transparently to where it is needed. The greater the
bandwidth, the richer the information we can move.
- Wireless technology has come along way. And it will go further. With
increased competition, lower rates, smaller phones and larger coverage areas,
wireless service will challenge traditional phone service for our business.
Central Office of Information, Aspects of Britain. (London:1994).p.53
- The invention of cellular mobile communications system has boosted the
development of the ‘wireless technology’. People can get connected any time
and any where.
- The combination of cellular phone and internet enable the cellular mobile
communication system maximaze its function as a wireless communication
device. Moreover with the more advanced technological development, the cost
of communication through cellular phones can be reduced and the size of the
hand set gets smaller, lighter and rich in features. What’s more the coverage
area becomes wider.
Flichy, Patricia (1995), Dynamics of Modern Communication, London: SAGE
Headrick, Daniel R. (1991) The Invisible Weapon: Telecommunications and
International Politics 1851-1945, New York: Oxford University Press.
Lax, Stephen (1997), Beyond the Horizon, Luton: University of Luton Press.
McLernon (2000), Technology and Communications Lecture. Lectured on
Reference Services, Central Office of Information (1994), Aspects of Britain:
Telecommunications, London: HMSO Publications Centre.
Steele, Raymond (1992), Mobile Radio Communications (Ed). London: Pentech
http://www.privateline.com/PCS/HowPCSworks.htm. Accessed on 05/12/00.
http://www.privateline.com/PCS/wirelesstable.htm. Accessed on 05/12/00.
http://www.fcc.gov/wtb/cellular/celfctsh.html. Accessed on 21/11/00.
tm. Accessed on 26/11/00.
http://www.cellularone.com/pages/library/history/html. Accessed on 20/12/00.
http://www.privateline.com/Cellbasics/Cellbasics.html. Accessed on 20/12/00.
http://www.comms.eee.strath.ac.uk/~gozalvez/gsm/gsm.html. Accessed on
http://www.gallup.com/poll/releases/pr000426.asp. Accessed on 19/12/00.
http://www.wirelessadvisor.com/Glossary.cfm. Accessed on 23/12/00.
http://www.wirelessadvisor.com/analogue-cellular.cfm. Accessed on 23/12/00.
|
RubyMine provides the ability to create missing tests in various ways. For example, you can:
create tests from templates
create a test when navigating to it from a test subject
generate tests using Rails generators
Create a test from template
To create a new test from a template, do the following:
- Do one of the following:
In the Project tool window Alt+1, select the directory in which you want to create a new file, and then choose from the main menu.
Right-click the corresponding directory and select New from the context menu.
Select Ruby Test from the list and press Enter.
In the New Ruby Test popup, you need to select the testing framework and specify the class name to be tested. For example, do the following to create a new RSpec test:
Specify the described class name (for example,
User) and press Enter.
RubyMine will create a test file with corresponding initial content and open it in the editor. Here you can add the required code.
If necessary, you can modify predefined templates in Settings/Preferences Ctrl+Alt+S on the page. Learn more at File templates.
Create a test when navigating to it
RubyMine provides the capability to create a test when navigating to it from a class that needs to be tested.
In the editor, open the required class.
From the main menu, select Navigate | Test or press Ctrl+Shift+T.
If the corresponding test doesn't exist, the Create Test popup appears.
In this popup, you can select one of the following:
Create New Test: Create a new test for a class, replicating the directory structure based on the path to the test subject.
Run 'rails generate': Generate a new test for a class using Rails generators.
Choose Create New Test.
In the Choose Destination Directory dialog, choose the required folder and click OK.
In the invoked popup, choose whether to create a test from scratch or use a predefined test template.
Press Enter. The IDE will create the test under the necessary directory, replicating the directory structure based on the path to the test subject.
Generate tests for Rails applications
RubyMine provides several ways to generate missing tests for Rails elements (controllers, models, and so on).
Create tests using Rails generators
You can use Rails generators supplied with a testing framework to create tests. For example, you can create a model test using the
rspec:model generator for RSpec or
minitest:model for Minitest. To do this in RubyMine:
From the main menu, select(Ctrl+Alt+G).
In the invoked popup, start typing the required generator name. For example, to create an RSpec model test start typing rspec:model and then select
rails g rspec:model. Press Enter.
Specify the generator arguments. For example, for the User model we pass
useras an argument. Click OK.
Create tests alongside Rails elements
Rails allows you to generate tests alongside other applications elements such as controllers, models, and so on. Learn how to create Rails application elements in RubyMine from Create Rails application elements.
|
First Orthodontic Evaluation
Although there is no precise age for children to begin orthodontic treatment, the American Association of Orthodontists recommends a visit to the orthodontist around age seven.
We are happy to see a patient as soon as the referring dentist or parent has identified a problem.
By the age of seven, most children have a mix of baby teeth and adult teeth, which makes it easier for an orthodontist to diagnose and correct tooth and jaw problems sooner and without surgery.
Phase I interceptive orthodontic treatment (early orthodontic treatment)
We use scientifically accepted techniques developed during our many years of involvement with specialty orthodontics and education. Some of our techniques aim to improve the growth of the jaws, while others help guide the teeth into better position.
Some of the most direct results of interceptive treatment are:
- Creating room for erupting teeth
- Creating facial symmetry through influencing jaw growth
- Reducing the risk of trauma to protruding front teeth
- Preserving space for unerupted teeth
- Reducing the need for tooth removal
- Reducing treatment time with braces
NEED FOR FURTHER TREATMENT LATER?
Phase I treatment does not always prevent the need for braces, retainers, or other orthodontic treatment in later years. It can, however, minimize the time required for the secondary phase of treatment and correct skeletal discrepancy early.
Phase II Orthodontic Treatment
The goal of Phase II treatment is to position all the permanent teeth to maximize their appearance and function. This is best accomplished with full braces or Invisalign®, and usually takes between 12 and 18 months.
Due to the improvements made in Phase I treatment, Phase II treatment requires less patient participation (no headgear and fewer rubber bands), often avoids extraction of permanent teeth, and reduces the time spent in full braces.
This is especially appreciated by patients as they enter their teenage years!
|
Learn something new every day More Info... by email
Leopard geckos can be successfully bred by pet owners who have properly researched the process. Breeding leopard geckos will require temperature-controlled cages and proper nesting materials. Owners should not attempt breeding leopard geckos until the animals are physically mature and hand tamed. A mature, healthy female, proper cage conditions and good nutrition are essential.
Breeding leopard geckos in captivity can be more difficult than reproduction in the wild. In the wild, leopard geckos breed between February and September. First- time breeders are wise to breed their animals during this period when the geckos are naturally inclined to mate, although more experienced breeders can step outside these boundaries if necessary.
Geckos should be hand-tamed and sufficiently mature prior to mating. Hand-taming is just a matter of allowing the lizards to climb around the owner’s body, sitting them in the open hand, and handling them within the cage. It’s best not to attempt breeding leopard geckos until they are at least eight months old, both because they need to be sufficiently mature to handle the pregnancy and because it’s hard to determine their physical and personality traits before that. Successful breeding means producing geckos that have the kinds of characteristics other owners will want.
Gradually, lowering the cage temperature to 60 degrees Fahrenheit (15.5 degrees Celsius) eight weeks before mating helps the female prepare her body. The colder temperatures should be maintained for about two weeks, during which time she should not be fed. The temperature must slowly be raised back to normal as the female resumes eating greater and greater amounts so she will be able to create healthy eggs.
A male and female should be left alone in a cage during mating. Male geckos can be aggressive and violent during mating. It’s only a problem if the female resists his aggressive flirtation and fights back. In that case, she needs a different male, or at least a break of a few days before a second attempt.
To determine if a female gecko is pregnant, owners can flip the female upside down to see is she is gravid. If so, the eggs will be visible through the thin skin of her underside. If she is pregnant, the leopard gecko will need a suitable nest. The animal's regular hiding box can be transformed into a nest by layering it with dampened peat moss and potting soil.
Once the eggs are laid, it’s necessary to move them for incubation. They must be marked prior to moving in order to know which side should be placed directly on the ground. Boy babies result from heat on the high side, around 88 degrees Fahrenheit (31 degrees Celsius), while females will gnaw their way out of shells that have been kept between 80 and 85 degrees (27-29.5 degrees Celsius). It takes 40 to 60 days from mating to hatching.
One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!
|
A small, slender and cryptically coloured bird, Blyth’s pipit (Anthus godlewskii) is named in honour of the English zoologist, Edward Blyth, a well-known contemporary of the eminent Charles Darwin (3). Blyth’s pipit is grey-brown above with streaks of blackish-brown, and is buff-coloured below, becoming more orange-buff on the flanks, with pronounced dark streaking on the upper breast. There is a creamy stripe that extends from the unmarked, pale area between the eye and the beak, towards the back of the head. A thin black streak extends backwards and downwards from the base of the bill, with a second broad, buff-coloured stripe just below. There is a narrow blackish stripe and patch on the cheeks.
The wing feathers are buff on the edges and tips, and each wing bears two pale, almost indistinct bars. The tail is blackish-brown, tinged reddish on the edges of the central pair of feathers and with the outer two pairs edged and tipped in buff. The legs are pale- or yellowish-pink, and the short, pointed bill is dark grey above and pinker with a darkish grey tip below. Blyth’s pipit produces a variety of calls, including several chup, chep or choop sounds, given in flight and often combined with a longer psheeu note (2).
- Length: 15 - 17 cm (2)
- 17 - 30.5 g (2)
|
A virtual server, sometimes called a virtual host, is an object that allows the same physical server to host multiple Internet domain names. All virtual servers hosted on the same physical server share the Internet Protocol (IP) address of that physical server. A virtual server associates a domain name for a server (such as www.aaa.com) with the particular server on which the Enterprise Server is running.
Do not confuse an Internet domain with the administrative domain of the Enterprise Server.
For instance, assume you want to host these domains on your physical server:
www.aaa.com www.bbb.com www.ccc.com
Assume also that www.aaa.com, www.bbb.com, and www.ccc.com have web modules web1, web2, and web3, respectively, associated with them.
This means that all of these URLs are handled by your physical server:
http://www.aaa.com:8080/web1 http://www.bbb.com:8080/web2 http://www.ccc.com:8080/web3
The first URL is mapped to virtual host www.aaa.com, the second URL is mapped to virtual host www.bbb.com, and the third is mapped to virtual host www.ccc.com.
On the other hand, the following URL results in a 404 return code, because web3 isn’t registered with www.bbb.com:
For this mapping to work, make sure that www.aaa.com, www.bbb.com, and www.ccc.com all resolve to your physical server’s IP address. They need to be registered with the DNS server for your network. In addition, on a UNIX system, add these domains to your /etc/hosts file (if the setting for hosts in your /etc/nsswitch.conf file includes files).
When the Enterprise Server is started, it starts the following virtual servers automatically:
A virtual server named server, which hosts all user-defined web modules
A virtual server named __asadmin, which hosts all administration-related web modules (specifically, the Admin Console). This server is restricted; you cannot deploy web modules to this virtual server.
For development, testing, and deployment of web services in a non-production environment, server is often the only virtual server required. In a production environment, additional virtual servers provide hosting facilities for users and customers so that each appears to have its own web server, even though there is only one physical server.
|
Article by Abby Twyman, M.Ed., BCBA
As with any problem behavior, it is essential to first determine the function of the behavior. This is the WHY. There are two common reasons an individual with autism may elope (defined as the act of leaving an area without permission or notification which usually leads to placing that individual in a potentially dangerous situation): (1) to GET something or somewhere preferred, or (2) to ESCAPE something or somewhere non-preferred. Once you’ve determine why the individual is eloping, there are a few strategies which may be helpful.
Eloping to GET something or somewhere preferred
If an individual is eloping to get something or somewhere preferred it may be that the individual does not have the social communication skills necessary to get permission or notify someone. If this is the case, the person should be taught how to communicate their needs rather than simply leaving. It also may be the case that the person doesn’t know when the next time is they will get access to the item or activity causing them to impulsively leave the area. A solution for this may be to teach the individual to use a schedule and place the desired item/activity or location on the schedule.
Eloping to ESCAPE something or somewhere non-preferred
If an individual is eloping to escape something or somewhere non-preferred, it is likely the individual does not have the social communication skills necessary to voice their needs. They need to be taught to use pro-social behaviors to get their needs met. For instance, if an individual is working and the work becomes too difficult they may elope to get out of that demand. A few strategies may be to modify the workload to make it more manageable and teach the person to self-advocate and tell someone the work is too difficult or that they need a break from the activity. Another reason to leave a location may be because there is something aversive about the environment. Maybe it’s too loud, too hot, too crowded or too boring. In this case the person needs to be taught to self-advocate, communicate their needs effectively and/or engage in some problem solving to replace the elopement behavior.
Additional resources and articles related to elopement
Assessment and treatment of elopement maintained by access to stereotypy
|
Coal seam gas projects in Australia
|This article is part of the FrackSwarm coverage of fracking.|
Coal seam gas (abbreviated "CSG") is formed by the geological process of heating and compressing plant matter to create coal. Over millions of years, methane forms within the coal. The methane is trapped by water in the gaps and cracks between the coal molecules. These gaps are known as cleats. Australia has been found to have many deposits, and is increasingly mining them through hydraulic fracturing, also known as fracking.
CSG is a form of coalbed methane (CBM), or coalbed gas, and is a type of natural gas extracted from coal beds. In recent decades it has become an increasingly used source of energy in Australia, as well as the United States, Canada, and other countries.
- 1 Coal seam gas projects
- 2 Toxic chemicals used in fracking process
- 3 Citizen groups working on coal seam gas issues
- 4 Articles and resources
Coal seam gas projects
In April 2010 the Australian Bureau of Agricultural and Resource Economics (ABARE) released its Minerals and energy: Major development projects listing. The list includes details of major coal mines and coal seam gas projects proposed or under construction around Australia.
The projects ABARE identified were:
- Talinga Coal Seam gas project Stage 2 is proposed by Australia Pacific LNG (APLNG), a 50:50 joint venture between Origin Energy and ConocoPhillips. The project is located 160 km E of Roma, in Queensland. The Stage 2 expansion project is currently under construction will be commissioned in 2010 with the aim of delivering 33PJ per annum. The projected capital cost of the project is $260m.
- Camden Gas Project stage 2 (coal seam gas) is proposed by AGL. The project is located near Camden in New South Wales. The project is an expansion of the existing project and has been granted planning approval. It is projected to provide 12 PJ per annum and cost $35m to build. It is projected to employ 35 people during construction and 3 when operating.
- Camden Gas Project stage 3 (coal seam gas) is proposed by AGL. The project is located near Camden in New South Wales. The project is an expansion of the existing project with planning approval currently being sought. The project is projected to cost $100m and employ 60 people during construction and 10 when operating.
- Casino project is proposed by Metgasco. The project is located near Casino in New South Wales. A feasibility study into the project is currently under way. The project is projected to provide 18 PJ per annum and employ 150 people during construction and 100 when operating.
- Gloucester Coal Seam gas project is proposed by AGL. The project is located in the Hunter Valley in New South Wales. A feasibility study is under way on the project and is expected to be completed in 2010. The project is expected to provide 15-25 PJ per annum and cost $200 million to build. The project is expected to employ between 100-150 people during construction and 30-40 when operating.
- Surat Gas Project is proposed by Arrow Energy, The project is located in the Surat Basin in Queensland. An Environmental Impact Statement is currently being undertaken. The notional commissioning date is 2012. The project is expected to provide 62 PJ per annum. Employment data is not available.
- Walloon coal seam gas field is proposed by the BG Group. The project is located 80 km N of Roma in Queensland. A feasibility study is currently being undertaken. The notional commissioning date for the project is 2013. It is expected that the project will provide 190 PJ per annum and cost $230 million to construct.
October 2010: Two new projects approved
On October 22, 2010, the Australian federal government gave conditional approval to two major coal seam gas projects in central Queensland. Environment Minister Tony Burke announced that his department had given conditional environmental approvals for Gladstone Liquefied Natural Gas (GLNG) - a $16 billion joint venture between Santos, Malaysia's Petronas, and France's Total - and BG Group's Queensland Curtis LNG. The project involves 2650 coal seam gas wells being drilled over 25 years in Queensland's Surat and Bowen Basins, a 435km steel pipeline from the Fairview gas fields to Gladstone, and an liquefied natural gas (LNG) plant and export facility on Curtis Island.
The approvals were delayed earlier in 2010 by Burke's predecessor, Peter Garrett, who was concerned about the projects' potential impact on groundwater and the Great Barrier Reef. It received Queensland Government environmental approval in May 2010, and has entered into 42 agreements with indigenous groups. GLNG has agreements to sell 1.5 million tonnes a year of LNG to Total for 20 years starting in 2014, and 3.5 million tonnes a year of LNG to Petronas over the same period - Australia's largest trade agreement with Malaysia. QGC Pty Limited, a BG Group business, received Queensland Government approval for the Queensland Curtis LNG (QCLNG) project in June 2010. Green groups and farmers have raised concerns about coal seam gas development. The same week as the approval four toxic chemicals - benzene, toluene, ethylbenzene and xylene (BTEX) - were discovered in eight exploration wells owned by the Australia Pacific LNG in the Surat Basin. But the Queensland Government has ruled out a moratorium on the industry.
China investments into coal seam gas exploration
In December 2010, it was announced that Queensland exploration minnow Exoma will receive a $78 million investment by China National Offshore Oil Corporation (CNOOC), China's biggest offshore energy company. If drilling over the next three years is successful, the next step could be a $12 billion infrastructure project that links a new pipeline to an export gas terminal at Abbot Point, about 150km south of Townsville. The deal is CNOOC's first offshore investment in coal seam gas exploration and is part of a multi-trillion dollar project by China's big three state-owned energy groups - Petrochina has two deals in Queensland's coal seam fields, and Sinopec has said it was planning its own coal seam deals in Australia. In March 2010, CNOOC agreed to spend $60bn buying 3.6 million metric tons of syngas a year from BG's proposed export terminal at Gladstone over 20 years, as well as a 5 per cent interest in its assets. CNOOC has also entered a joint venture in Australia with Altona Resources to exploit the Arckaringa Coal-to-Liquids and Power Project in South Australia.
Toxic chemicals used in fracking process
In October 2010, documents obtained by the Sydney Morning Herald showed that Australian mining companies are using highly toxic chemicals to extract coal seam gas during the controversial process known as "fracking." A government list of 36 chemicals used includes hydrochloric and acetic acid, and napthalene - an ingredient once used in napalm as well as more mundane items such as mothballs - and many other hydrocarbons.
The proposed use of fracking near watercourses, including a plan to deploy fracking next to Warragamba Dam, has raised concerns that drinking water could be contaminated. The Australian Petroleum Production and Exploration Association, which represents coal seam gas extraction applicants, said the process has been used for many years and is completely safe. But the Queensland government introduced legislation in mid-October 2010 to ban some chemicals used during fracking, including BTEX, a mixture that contains benzene. Queensland's Department of Environment and Resource Management said coal seam gas operators would be required to disclose all ingredients used in fracking.
Industry and Investment NSW, the New South Wales state government agency that oversees coal seam gas and petroleum exploration, said it knew of no instance where banned chemicals were used in fracking, but the agency was unable to supply a full list of the chemicals used to frack rocks in NSW, though it confirmed that hydrochloric acid has been used. The petroleum association said its members provide details of any chemicals used to regulators. It sent the Herald an indicative list of chemicals used in fracking in Australia, including hydrochloric acid. Some chemicals would be expected to dissolve to safe levels, but others are more persistent. According to Gavin Mudd, an environmental engineer at Monash University: "The large amount of salt, and chemicals like naphthalene, aren't easily biodegradable in the environment. Also, the process of drilling and fracking is making the chemicals more mobile than they normally would be. Often these impacts are cumulative; some of the chemicals can slowly build up in the food chain in the long term."
Benzene found near coal seam gas fracking site
In mid-October 2010, farmers near a coal seam gas "fracking" site in Queensland announced that they will have their water supplies tested for toxic benzene and other chemicals after Origin Energy found contaminated water near drilling sites. The discovery of BTEX - a mixture of benzene, toluene, ethylbenzene and xylene - around eight coal seam gas wells near Miles, west of Brisbane, marks the first time a resources company has admitted to contaminating water at a fracking site. Origin detected the chemicals in mid-October and told the Queensland government, which is legislating to ban the use of BTEX chemicals during coal seam gas drilling. Origin has shut down all 17 of its drilling rigs across a 40-kilometre-wide area while an investigation is carried out.
Fracking, or hydraulic fracturing, involves injecting water, sand and chemicals underground to fracture rock formations and force gas to the surface. The controversial process has fuelled protests from landholders in Australia and the United States, where government tests have detected harmful levels of hydrocarbons, including BTEX, in drinking water wells in areas where fracking is used. Origin refused to disclose the mixture of chemicals used in the fracking fluid that it was using on the site. The US company Halliburton supplied the fluids. Origin's manager of oil and gas operations, Paul Zealand, said BTEX was not being used as a fracking fluid, and that the contamination may have come from diesel fuel or lubricants used on machinery at the gas drilling sites. An engineering consultancy, URS, and the government will investigate.
Citizen groups working on coal seam gas issues
- Western Downs Alliance working on coal seam gas on the Darling Downs in Queensland.
- Basin Sustainability Alliance looking at the coal seam gas industry in Queensland.
Articles and resources
- Jargon Buster. BG Group. Retrieved on 18 July 2010.
- Australian Bureau of Agricultural and Resource Economics, "Minerals and energy: Major development projects", April 2010. (Pdf). The list is also available in Excel format here.)
- "Federal Government approves coal seam gas projects in central Queensland" news.com.au, Oct. 22, 2010.
- Michael Sainsbury, "China giant tips $78m into coal seam gas minnow Exoma" Wall Street Journal, Dec. 9, 2010.
- Joel Tozer and Ben Cubby, "List reveals toxic chemicals used in coal seam mining", Sydney Morning Herald, October 19, 2010.
- Ben Cubby, "Origin stops coal seam gas drilling after chemicals found in water", Sydney Morning Herald, October 21, 2010.
Related SourceWatch articles
- Liz Hayes, "Undermined", Sixty Minutes, NineMSN, May 14, 2010.
|This article is a stub. You can help by expanding it.|
|
On the Sole Government of God is a classic example of a Christian apologist seeking to point people to divine truth through the usage of culturally known pagan texts. It is, in other words, a 2nd century example of contextualization. In this work, Justin is essentially modeling Paul’s approach in Acts 17:28 where Paul quoted the Phaenomena of Aratus in his speech before the Athenians.
Justin is seeking to demonstrate that the great Greek writers and philosophers themselves bore witness to the fact that there is a powerful God above all others, that we are accountable to this God, that we should reject false gods, and that we should seek righteousness.
Thus, to prove the unity of God, Justin appeals to Aeschylus, Sophocles, Philemon, and Orpheus. Concerning the reality of a future judgment, Justin quotes Sophocles. Concerning the need for righteousness, Just appeals to Philemon and Plato. Concerning false gods, he quotes Menander, Hippolytus, Ion, Archelaus, Bellerophon, Piscatores, Fratres, Tibicinae, Phrixus, Philoctetes, and Hecuba. Concerning the need to acknowledge only one God, Justin appeals to Homer.
This is an engaging little work that is basically an anthology of ancient writers addressing theological themes and reality. The most significant element in all of this for our day is the fact that Justin, a Christian, engages his audience with these texts. Of course, he could not do so unless he himself had engaged these texts. If nothing else, Justin’s impressive grasp of pagan writings and the able way that he employs them in his apologetic task should challenge us to escape the Christian ghetto in which only explicitly Christian texts are read. Justin has shown us a better model: careful, critical engagement with a culture’s texts for the purpose of understanding and engaging that culture with the truth of the gospel. It should also be noted that such an approach to such writings does not rule out the simple enjoyment of the writings or the appreciation of them as works of art.
Lastly, it should not be missed that Justin does not actually argue for the reality of Christ in this work, only for the reality of a theism that is consistent with Christian theism. In this we may see the limitations of general revelation. The pagan world, as Paul acknowledged in Romans 1, has a general knowledge of God, but it cannot deduce the gospel from nature or from an observance of the human heart. What it can deduce, however, is what Justin argues for here: the reality and presence of a God above all others before Whom we are accountable. This means that a culture’s texts may include insights that can be used to argue for theism and for some aspects of Christian theism, but explicitly Christian truth will eventually need to be employed if the gospel is going to be advanced.
|
|'Hardy Giant' produces large, dark, sweet fruit that is similar to 'Bing'. It is a late bearer and a good pollinator for 'Lambert'.
Sweet Cherry trees are the most common commercial type for fruit production. The main growing areas in North America include the valleys of Washington, Oregon and British Columbia and in the East, around the Great Lakes. Sweet cherries require a long chilling period in the winter, thus are not suited to warm winter areas. They are also intolerant of deep freezes or intense heat; late frosts or heavy rain can damage the fruit set.
|
All the beautiful pictures and the large format makes “Longleaf as Far as the Eye Can See” look like a coffee table book and it would serve that purpose well. The longleaf pine ecosystem is truly stunning, but read the text too. Text and picture are exceptionally well coordinated to give an understanding of the history, beauty, complexity and future of North America’s most diverse ecosystem.
Let me share a few key points of the book. Longleaf pine ecosystems are so diverse because they combine forest, prairie, marsh and bog components. A mature longleaf forest features widely spaced trees that allow lots of sunlight to reach the ground, where a rich mixture of grasses, forbs and flowers can grow.
Longleaf biomes were dominant along the coasts and into the piedmont from southern Virginia to Texas. Scientist are unsure of the exact range of longleaf, since much of the range was among the first areas to be settled. Jamestown was founded at the northern edge of the longleaf range and the Royal Navy’s need for timber and naval stores from the longleaf forests and their proximity to easily navigable rivers and inlets assured that this resource was exploited very early. When they were cleared, the area formerly occupied by longleaf proved good for cotton and other crops.Large areas of longleaf forests survived, nevertheless, until the 20th Century. It was in the late 19th Century when the forests of the Great Lakes region were timbered out and the country turns south for the wood needed to build the nation. They might have survived this too – after all trees grow back – except for the unfortunate battle against fire. Forest companies, state and Federal authorities almost unanimously agreed the fire was the scourge of forests. They worked hard and effectively to exclude fire. It was a well-coordinated public outreach. They ridiculed the “bad” Southern practice of setting fires in the piney woods and even could point to mass entertainment. Remember the terrifying fire in Walt Disney’s “Bambi.” You can imagine some poor guy trying to explain to his kids why he set fires.
The problem is that the longleaf pine ecosystem is not only fire adapted but fire dependent. The pines need regular fire in order to grow. And, fire really cannot be excluded. The choice is not between fire and no fire. The real choice is between infrequent big and disastrous fires and regular smaller ones that keep the area clean. But the public campaign worked too well. Longleaf did not regenerate because there was no fire.
But it got even worse for longleaf. Loblolly, longleaf, shortleaf, and slash pines are all classified as southern pine for timber purposes. Longleaf produces a better quality wood, but it grows slower at first. If you plan to harvest before around twenty years, i.e. pulp or pellets, there is no distinction between longleaf and loblolly. Loblolly grows faster and it was easier to establish (this is no longer true, BTW, because of developments in planting and nursery techniques.) Slash pine enjoys similar advantages, although over a smaller range. Foresters and landowners turned to these other types of southern pine.
That was then. In recent years, foresters and landowners have come to appreciate that longleaf pines are nearly impervious to drought, much more resistant to pine beetles and other pests and much less likely to break in storms. Scientists have begun better to understand the complex ecosystem and the importance of fire in maintaining it. Institutions such as the Longleaf Alliance, Wild Turkey Federation and the Nature Conservancy are working diligently to restore longleaf on private lands and reserves. And state and Federal authorities have developed programs that encourage the restoration of longleaf ecosystems. Longleaf will never again cover large areas of the American South, as far as the eye can see, but it will be back.
I would like to add a personal takeaway, something the information in this book has inspired me to do. The longleaf pine is not as shade intolerant as loblolly. While they do require significant direct sunlight, longleaf pine can and do grow in mixed age forests. Young longleaf can linger in relative shade for a long time and then they respond well to release if sun gets to them. What is required are relatively large but not massive open areas, in some ways similar to oak regeneration. The book described a method of gradually converting loblolly to longleaf. You start with a deep thinning, leaving only a few loblollies per acre. This provides income needed to justify the experiment and pay for the forestry. Longleaf are planted under the loblolly. The loblollies are spaced widely enough that they do not shade out the longleaf, but they are thick enough to shade out briars and blackberries. They also provide some protection from ice storms. Fire can be introduced into the system. The mature loblollies are big enough not to be killed by the fire, but the fire will eliminate loblolly seedlings and control other woody vegetation. I am planning to thin around 80 acres in 2017. I think I will try this method on that tract. I already have five acres of longleaf there, planted in 2017. It might be interesting to make the whole thing longleaf.
|
Robert Kennedy's United States History Class
Learning Objective V: Discuss social and labor legislation and show how it reflects the new value of society--that business has rights as it always has, but it also now has responsibilities to society.
MANAGEMENT AND GOVERNMENT PRESSURE UNIONS
The more powerful the unions became, the more employers came to fear them. Management refused to recognize unions as representatives of the workers. Many employers forbade union meetings, fired union members, and forced new employees to sign “yellow-dog contracts,” swearing that they would not join a union. Finally, industrial leaders, with the help of the courts, turned the Sherman Antitrust Act against labor. All a company had to do was say that a strike, picket line, or boycott would hurt interstate trade, and the state or federal government would issue an injunction against the labor action. Legal limitations made it more and more difficult for unions to be effective. Despite these pressures, workers—especially those in skilled jobs—continued to view unions as a powerful tool. By 1904, the AFL had about 1,700,000 members in its affiliated unions; by the eve of World War I, AFL membership would climb to over 2 million.
Until the 1930's, American social and labor legislation lagged almost a generation behind that of the more progressive European states like Denmark and Germany. Before the New Deal of the 1930's, labor and social legislation lay for the most part in the domain of the individual states such as Massachusetts, New York, and Oregon. Throughout the 19th century, few authorities contested the right of government to protect society and individuals against anything that threatened the general welfare. However, it was generally felt that the role of government protection was the responsibility of the states, and not the federal government.
But when the more progressive states passed social and labor legislation, the collective impact of these laws was not very impressive. Powerful vested interests such as manufacturers and landlords threw their weight against any kind of social legislation; and since such laws ran counter to the American traditions of individualism and laissez-faire, they often succeeded in either defeating them or making them ineffective. The enemies of state social legislation discovered the 14th Amendment to the Constitution as an effective weapon.
The philosophy which developed here was that if the worker accepted the job , he must also accept the risk of the job. The employer was not responsible for accidents which happened to the employee because of his own negligence or that of a fellow worker. If one lost a hand or an arm, it was tough! Most European nations had workman's compensation by the tum of the century, but the U.S. lagged behind again.
It was not until 1917 when the Supreme Court upheld New York State's Compensation Act that the majority of states could develop their own worker's compensation program. Within a few years, all states, except some southern states, had worker's compensation.
Finally, another area which needed attention was unemployment and retirement. America's early industries provided nothing for workers who had outlived their usefulness. These workers were supposed to fend for themselves or live on the charity of their children.
Again European nations took the lead by providing unemployment and old-age pension programs, even before the tum of the century.
It was not until the Social Security Act of 1935 (New Deal legislation) that our nation took appropriate action.
The overall trend before the New Deal was that business took in the profits and left the social problems which developed as a result of its practices to society to handle and pay for. As a result of the new social legislation, society made business responsible for some of the problems it helped to create. A new value emerged: business had rights AND responsibilities.
|
How Hitler Hijacked World Sport
The World Cup, the Olympics, the Heavyweight Championship and the Grand PrixeBook - 2011
How the Nazi leader made use of sports for his own ends, from his utilization of the 1936 Olympics to showcase the Nazi state, to the political importance given to the Joe Louis and Max Schmeling matches. Adolf Hitler understood the importance of sports, and this book outlines how he exercised his malign and dangerous influence to try to coopt them for the Nazi cause. He intended to own the Olympic movement, housing it permanently in Berlin from 1940 in a stadium seating 450,000 people, while his hijack of the 1936 Games remains one of the sports world's most controversial events. Austria was forced to withdraw from the 1938 soccer World Cup just days before it started because the country no longer existed. The boxing matches between Joe Louis and Max Schmeling in 1936 and 1938 came to represent democracy versus fascism. German technology crushed all comers in Grand Prix racing, as well as the Isle of Man TT. Hitler even set up a government ministry to use physical fitness to prepare the population for war.
Publisher: [Place of publication not identified] : The History Press,
Branch Call Number: 306.483 Hi
Description: 1 online resource (160 pages)
From the critics
|
Raising Digital Savvy Kids: Teaching Children about Online Scam Awareness
In today's rapidly evolving digital landscape, where children are introduced to technology at increasingly younger ages, it's crucial for parents to take an active role in educating their kids about the potential dangers that lurk online. Among these dangers, online scams stand out as a significant threat that can harm both children and their families. By fostering a culture of online scam awareness and imparting healthy online habits, parents can empower their children to navigate the digital world safely and confidently. In this article, we'll explore effective strategies for teaching children about online scam awareness and nurturing their digital savvy skills, while introducing a reliable browser extension designed to provide an extra layer of protection.
The Digital Age and Its Challenges
Children today are growing up in a world that is vastly different from what their parents experienced. The internet is an integral part of their lives, offering access to information, entertainment, and opportunities for social interaction. However, this digital realm also exposes them to potential threats like online scams. Scammers often target children due to their innocence, curiosity, and limited experience in discerning deceptive tactics.
Fostering Online Scam Awareness from an Early Age
As parents, one of the most effective ways to shield your children from online scams is through education. By providing age-appropriate information and guidance, you can instill a sense of awareness and critical thinking skills that will serve them well throughout their digital journey. Here are some strategies to consider:
1. Start Early:
Introduce the concept of online safety as soon as your child begins using digital devices. Discuss the importance of not sharing personal information and clicking on unfamiliar links.
2. Teach Them About Scams:
Explain what scams are and how they work using relatable examples. For younger children, you can use simple language and stories to convey the idea that not everything online is safe.
3. Encourage Questioning:
Foster an environment where your child feels comfortable asking questions about online activities. Encourage them to approach you if something seems unusual or makes them uncomfortable.
4. Promote Critical Thinking:
Teach your child to think critically about online content. Help them identify red flags, such as overly enticing offers, poor grammar in messages, or requests for personal information.
5. Be Open about Risks:
Discuss potential risks associated with sharing personal information online, including the dangers of interacting with strangers. Emphasize that they should never provide personal information without your permission.
6. Set Clear Boundaries:
Establish guidelines for online activities, including the types of websites they can visit and the people they can interact with. Regularly monitor their online behavior to ensure they are adhering to these guidelines.
Nurturing Healthy Online Habits
In addition to teaching children about online scam awareness, it's essential to nurture healthy online habits that will serve as a foundation for their digital experiences. Here are some habits to instill in your children:
Teach your children about the importance of using strong, unique passwords for their online accounts. Explain that passwords should not be shared with anyone, including friends.
2. Privacy Matters:
Help your child understand the concept of privacy and the importance of safeguarding personal information. Teach them to be cautious about sharing details like their full name, address, and school.
3. Think Before Clicking:
Emphasize the significance of thinking before clicking on links or downloading files. Explain that malicious links or attachments can harm their devices or compromise their personal information.
4. Online Etiquette:
Teach your children about appropriate online behavior and treating others with kindness and respect. Discuss the potential consequences of cyberbullying and the importance of empathy.
5. Verify Requests:
Educate your children about verifying requests for personal or financial information. Teach them that legitimate organizations will not ask for sensitive information through unsolicited emails or messages.
The Role of Browser Extensions in Child Online Safety
As parents strive to protect their children from online scams, a browser extension designed to prevent such threats can be a valuable ally. These extensions provide an additional layer of security and awareness, complementing the lessons you've taught your children. Here's how browser extensions enhance child online safety:
1. Real-Time Threat Detection:
Browser extensions equipped with scam prevention features can identify and warn your child about potential threats in real time. This immediate warning can prevent accidental clicks on malicious links.
2. Phishing Protection:
Phishing attacks are a common scam tactic. Browser extensions can detect and block phishing websites, reducing the risk of your child falling victim to these deceptive schemes.
3. Safe Browsing:
Extensions can create a safer browsing environment for your child by blocking access to potentially harmful websites and content. This is particularly important for younger children who may inadvertently stumble upon such sites.
4. User-Friendly Experience:
Most browser extensions are designed with user-friendliness in mind, making them accessible to children of various ages. They seamlessly integrate with web browsers, requiring minimal setup.
Conclusion: Empowering Digital Natives
In a world where technology is intertwined with daily life, it's imperative for parents to equip their children with the skills and knowledge needed to navigate the digital landscape safely. By fostering online scam awareness, teaching healthy online habits, and leveraging the protection of a browser extension, parents can empower their children to be responsible and savvy digital citizens. This proactive approach not only safeguards children from online scams but also cultivates a positive and enriching online experience that will serve them well throughout their lives.
|
Fresh effort to clone extinct animal
- 22 November 2013
- From the section Science & Environment
Scientists in Spain have received funding to test whether an extinct mountain goat can be cloned from preserved cells.
The bucardo became extinct in 2000, but cells from the last animal were frozen in liquid nitrogen.
In 2003, a cloned calf was brought to term but died a few minutes after birth.
Now, the scientists will test the viability of the female bucardo's 14-year-old preserved cells.
The bucardo, or Pyrenean ibex, calf born through cloning was an historic event: the first "de-extinction", in which a lost species or sub-species was resurrected.
The Aragon Hunting Federation signed an agreement with the Centre for Research and Food Technology of Aragon (CITA) in Zaragoza to begin preliminary work on the cells from the last animal, named Celia.
One of the scientists behind the cloning effort, Dr Alberto Fernandez-Arias, told BBC News: "At this moment, we are not initiating a 'bucardo recovery plan', we only want to know if Celia's cells are still alive after having been maintained frozen during 14 years in liquid nitrogen."
In addition to this in vitro work, they will also attempt to clone embryos and implant them in female goats.
"In this process, one or more live female bucardo clones could be obtained. If that is the case, the feasibility of a bucardo recovery plan will be discussed," Dr Fernandez-Arias, who is head of the Aragon Hunting, Fishing and Wetlands Service, explained.
The bucardo (Capra pyrenaica pyrenaica) was a sub-species of ibex, with distinct physical and genetic characteristics to other mountain goats inhabiting the Iberian Peninsula. It was perfectly adapted to life in its mountain habitat, and to survive the extreme cold and snow of winter in the Pyrenees.
However, its population had been declining for years for several reasons, including hunting. In April 1999, researchers captured the last animal, a female named Celia. They obtained skin biopsies and froze the tissue in liquid nitrogen at a temperature of -196C (-321F).
The following year, Celia was killed by a falling tree in the National Park of Ordesa in north-east Spain. But a team including Dr Fernandez-Arias, Jose Folch and others were able to inject nuclei from Celia's preserved cells into goat eggs that had been emptied of their own DNA.
Then they implanted the eggs into surrogates - hybrids between Spanish ibex and domestic goats. Of 57 implantations, seven animals became pregnant and one was carried to term.
The baby bucardo was born in 2003 - the first successful "de-extinction". But the clone of Celia died a few minutes later due to a defect in one of its lungs. Earlier this year, Dr Fernandez-Arias related the story in a TEDx talk, as part of a meeting on de-extinction.
Even if the new effort succeeds in producing healthy clones, any future recovery plan for the bucardo would be fraught with difficulty - especially given the only frozen tissue is from a lone female.
One possible approach for bringing back the bucardo might be to cross a healthy female bucardo clone with a closely related sub-species - such as the Spanish ibex (Capra pyrenaica hispanica) or the Gredos ibex (Capra pyrenaica victoriae) - and then selectively breeding the offspring to enhance traits typical of the bucardo.
Several other possibilities could also be explored. For instance, researchers have been able to reverse the sex of female mouse embryos by introducing a key gene that makes them develop as males.
In addition, George Church, professor of genetics at Harvard University, explained that a technique known as Crispr opened up new opportunities in the field of endangered species conservation and de-extinction. The technique allows researchers to edit genomes with extraordinary precision.
Such "genome editing" techniques could be used to introduce genetic diversity in populations that are so closely related it poses a threat to their survival.
"In some cases, you have a hunch as to what diversity is needed. You might specifically want diversity in the major histocompatibility complex [a large gene family involved in immune responses]," Prof Church told BBC News.
"For example, part of the problem with the Tasmanian devil is that they are so closely related in terms of their immune system that they have problems rejecting the facial tumour cells that they spread by biting each other."
However, he said, such techniques might eventually offer a way to extensively edit the genome of an Asian elephant to make it more like a mammoth, using a genetic sequence from the extinct animals.
Commenting on plans for the bucardo cells, the Aragon Hunting Federation said it wanted to "develop initiatives in the field of ecology in order to defend the natural environment".
The sum provided to fund the research at CITA has not been disclosed.
Paul.Rincon-INTERNET@bbc.co.uk and follow me on Twitter
|
Money Bills originate only in the Lok Sabha. If a dispute arises as to whether a Bill is a Money Bill or not, the decision of the Speaker of Lok Sabha is final. Rajya Sabha has no power to reject a Money Bill. It can only make recommendations, ie, suggestions. The Lok Sabha may accept or reject all or any of the recommendations of the Rajya Sabha.
Ordinary Bills can originate in either House. In case of disagreement between the two Houses, the bill is referred to a joint sitting of both the Houses. It seems that the two houses have been placed on an equal footing in this regard. Really speaking, the Rajya Sabha is in a weaker position in this matter. Since the total membership of Rajya Sabha is less than even half of the total strength of the Lok Sabha, the will of the Lok Sabha would naturally prevail at a joint sitting. Moreover, a joint session is presided over by the Speaker of the Lok Sabha.
Members of both the Houses can put questions to ministers about the work of their departments. They discuss all matters of public importance. But here again, Lok sabha has more power than the Rajya Sabha. The Council of Ministers is responsible only to Lok Sabha. Rajya Sabha has no power to pass a motion expressing No-Confidence in the Council of Ministers.
Constitution puts Rajya Sabha on an equal footing with Lok Sabha in these matters : the election and impeachment of the President, removal of the Judges of the Supreme Court and the High Courts, proclamation of Emergency, promulgation of Ordinances and Constitutional Amendments.
The fact remains that Rajya Sabha is not at par with Lok Sabha. It does not, however, mean that Rajya Sabha has no important role to play in the governmental machinery. Neither House by itself constitutes Parliament. It is the two Houses together that are the parliament in India. Parliament can create new All India Services only if Rajya Sabha passes a resolution to this effect.
Moreover, Rajya Sabha is a ‘Continuing House’, a parliament chamber. it is not subject to dissolution like the Lok Sabha. It has to play a major role during the periods when Lok sabha is dissolved. All this helps to show that Rajya Sabha is an influential and useful body.
Tags :Constitutional Law
|
10 Badass Enemies Of Ancient Rome
Roman civilization grew by destroying hundreds of others. In this process, many brave men and women challenged the almighty Roman army in the name of freedom, and even the Romans expressed their admiration for their deeds and courage. Today, many of these names are still considered a symbol of independence, determination, and national pride.
10 Pyrrhus Of Epirus
In 280 BC, as Rome was conquering Southern Italy, the Greek city of Taras (modern-day Taranto) called for the aid of Pyrrhus (c. 319–272 BC), a Greek commander and king of the city of Epirus in present-day Northwest Greece.
Pyrrhus answered Taras’s call and crossed the Adriatic with his army. His military talent defeated the Romans in two battles. In doing so, Pyrrhus paid a high price, exhausting his military resources.
By 275 BC, Pyrrhus understood that it was pointless to carry on the fight against an enemy with access to a seemingly inexhaustible supply of manpower. Pyrrhus returned home, Rome gained control of Southern Italy, and ever since, the expression “Pyrrhic victory” has been used to refer to a successful accomplishment earned at far too high a cost.
Polybius (Histories, 3.11) tells us that Hamilcar called his son, Hannibal (247–c. 183 BC), “by the hand and lead him to the altar, where he commanded Hannibal [ . . . ] to swear that he would never be a friend of the Romans.” Hamilcar was a Carthaginian commander who fought during the First Punic War. Although the Carthaginians lost that war, they were determined to rebuild their empire.
Hannibal led Carthage’s vengeance against Rome during the Second Punic War. From Carthago Nova (present-day Cartagena), he marched with his army, famous for having many war elephants, north to the Pyrenees and then crossed the Alps, sweeping everything in his path as he entered into Roman territory. Battle after battle, his legendary military campaign threatened the growing Roman republic, but his defeat at Zama (North Africa) in 202 BC by the Roman general Scipio Africanus brought Hannibal’s retaliation to an end.
Hannibal returned to Carthage. He went into exile in 195 BC and died around 183 BC. Ancient sources are contradictory about the time and circumstances of his death.
8 Mithridates VI
Mithridates VI (132–63 BC) ruled a small but wealthy realm on the Black Sea in present-day Turkey. His father was assassinated, and his own mother posed a threat to his life. He went into exile but returned as a grown man several years later. With the support of many tribes, he reclaimed the crown and murdered many members of his family, who had plotted against him.
Between roughly 115 BC and 95 BC, his kingdom tripled its size. Rome and Mithridates fought a “cold war,” confronting each other indirectly through diplomacy, propaganda, and political conspiracies. In 89 BC, the Roman consul Manius Aquillius went to war against Mithridates. The following year, Mithridates coordinated the murder of about 80,000 Roman men, women, and children in about a dozen Asian cities. The war lasted until 63 BC, when Mithridates lost both it and his life not by the sword, but by the betrayal of his own son, Pharnaces.
As the illegitimate son of Masinissa, the king of Numidia (North Africa), Jugurtha (c. 160–104 BC) had to make his way into the throne. In 118 BC, he decapitated one of the heirs to the crown. The other heir, Adherbal, fled to Rome, where he asked the Senate for help.
Jugurtha played the Roman system by bribing everyone he could and buying as much time as he could. He captured the city of Cirta in 112 BC. In 109 BC, Rome sent an army led by Metellus, a fine commander who was also incorruptible and indifferent to Jugurtha’s gold. The Romans, with the aid of the king of Mauritania, finally defeated and captured Jugurtha after six years of war.
Plutarch (Life of Marius, 12) wrote that Jugurtha was pushed naked into the Tullianum, a pit-like dungeon that had formerly been a water cistern. Some versions say he was strangled; others say he died of starvation.
Spartacus (c. 111–71 BC) was a Roman slave of Thracian origin who escaped from a gladiator training camp in 73 BC. He took 78 other slaves with him and profited from the unhealthy inequalities of Roman society by recruiting thousands of other slaves and destitute country folk. Frontinus (Stratagems: 1.5.22) reported that Spartacus’s army would attach dead bodies to stakes outside their camp and equip them with weapons to give the impression that they were more numerous and better organized than they were.
Spartacus’s revolt lasted two years and was crushed by the Roman general Crassus. Plutarch (Life of Crassus, 11) reports that during his last attack, Spartacus launched himself at Crassus and almost killed him: “Through the midst of arms and wounds, he [Spartacus] missed him [Crassus], but killed two centurions who attacked him together.”
Spartacus was killed, but his deeds turned him into a legend. Around 5,000 of his men fled north after the defeat, and over 6,000 were crucified.
Years of brutality perpetrated by Julius Caesar in Gaul persuaded Vercingetorix (c. 82 BC–46 BC) that the Gallic tribes had to either unite against Rome or die trying. He tried to convince the council of his native town to fight the Romans, but he was expelled. He went to the countryside, raised a force against Gergovia, and took the power.
In 52 BC, Vercingetorix took Cenabun (present-day Orleans), where he massacred many Romans and seized all the provisions. Most Gallic tribes joined him, but they were no match for the highly organized Roman army, so Vercingetorix instructed to always fight the Romans from an advantageous land position. If that wasn’t possible, his army would retreat and burn all the land, leaving nothing behind and depriving the Romans of supplies.
His last stand against Rome was during the siege of Alesia. Vercingetorix came to Caesar asking for mercy, hoping to prevent more Gallic casualties. Some Gallic tribes were allowed to leave, but many soldiers were turned into slaves. Vercingetorix was kept in Rome as a prisoner for six years and finally put to death.
Boudicca (c. AD 33–c. 60) was the queen of the Iceni, an eastern Brittonic tribe. When the king died, the Romans tried to seize the kingdom, and the Iceni joined their queen and triggered a rebellion. Some neighboring tribes joined them, and together, they launched an attack against the city of Colchester, where many Romans were massacred.
From there, they marched to London, the heart of Roman commerce in Britain, and burned it to the ground. Cassius Dio (History 62.7) describes the gruesome retribution of Boudicca: Most distinguished women were hung up naked, their breasts cut and sewed to their mouths “in order to make the victims appear to be eating them.”
Boudicca’s rebellion was ended by the Roman general Suetonius in the Battle of Watling Street. Suetonius engaged the rebel force in a narrow field, neutralizing Boudicca’s numerical advantage. Boudicca retired to her homeland, where she finished her life by drinking poison.
3 Shapur I
Shapur I (r. 240–270) was a Sassanid ruler determined to regain the territories that his Persian ancestors had lost, most of which were under Roman control. Shapur captured Syria and its capital Antioch, one of the greatest cities controlled by Rome. The Romans struck back and recaptured some of the lost territories, but they left other battle fronts open.
Emperor Valerian offered terms to Shapur in person, along with his senior officers. Shapur took them all captive, and Sasanian sources claim that Valerian was used as a human mounting block for Shapur to ascend to his horse and then killed. His skin was filled with straw and displayed as a trophy.
Both sides were closely matched, and the result of Shapur’s war against Rome was inconclusive. Shapur died of illness around 270, before Rome could avenge Valerian.
2 Alaric I
In 395, Alaric I (c. 370–410) was named king of the Visigoths, a powerful tribe established in the former Roman province of Dacia (present-day Hungary, Romania, and Slovenia). The Visigoths had been Rome’s allies, but the treatment they got from the Romans made the reconsider their position. Alaric led the Visigoths against Rome, plundering many cities on the way. In 408, they laid siege to the city of Rome itself.
The Romans tried to attack Alaric, and two more sieges followed. During the third siege, someone opened the gates of the city. On August 24, 410, the Visigoths sacked Rome. It was not a violent act; the Visigoths were merely looking for plunder.
Alaric then marched south to Calabria with the intention of invading Africa, the source of the grain supply upon which the Romans depended, but a sudden illness put an end to his life. The course of the Busento River was diverted, and Alaric’s body was buried in the riverbed. The river’s course was restored to protect his resting place.
1 Attila The Hun
When Attila (c. 406–453) became the ruler of the Hunnic people, he doubled the tribute that Rome paid the Huns and imposed several additional conditions that looked more like extortion than a deal. In 447, Attila invaded parts of the eastern empire. Rome bribed one of Attila’s lieutenants to murder his master. The plot failed and upset Attila, who would neither forgive nor forget.
Theodosius died in AD 450, and Attila was informed he would never receive one more penny from Rome. Attila invaded several cities in the western half of the empire. With the support of the Visigoths, Aetius, a Roman general, engaged Attila in the Battle of the Catalunian Plains in 451. Both sides were closely matched: Attila and his force left and marched toward Rome.
Attila’s anticlimactic end came two years later: He was found dead, choked in his own blood after celebrating his wedding.
|
|Skip Navigation Links|
|Exit Print View|
|Oracle Solaris 11.1 Administration: Oracle Solaris Zones, Oracle Solaris 10 Zones, and Resource Management Oracle Solaris 11.1 Information Library|
Assume you have a system with two CPUs running two parallel CPU-bound workloads called A and B, respectively. Each workload is running as a separate project. The projects have been configured so that project A is assigned SA shares, and project B is assigned SB shares.
On average, under the traditional TS scheduler, each of the workloads that is running on the system would be given the same amount of CPU resources. Each workload would get 50 percent of the system's capacity.
When run under the control of the FSS scheduler with SA=SB, these projects are also given approximately the same amounts of CPU resources. However, if the projects are given different numbers of shares, their CPU resource allocations are different.
The next three examples illustrate how shares work in different configurations. These examples show that shares are only mathematically accurate for representing the usage if demand meets or exceeds available resources.
If A and B each have two CPU-bound processes, and SA = 1 and SB = 3, then the total number of shares is 1 + 3 = 4. In this configuration, given sufficient CPU demand, projects A and B are allocated 25 percent and 75 percent of CPU resources, respectively.
If A and B have only one CPU-bound process each, and SA = 1 and SB = 100, then the total number of shares is 101. Each project cannot use more than one CPU because each project has only one running process. Because no competition exists between projects for CPU resources in this configuration, projects A and B are each allocated 50 percent of all CPU resources. In this configuration, CPU share values are irrelevant. The projects' allocations would be the same (50/50), even if both projects were assigned zero shares.
If A and B have two CPU-bound processes each, and project A is given 1 share and project B is given 0 shares, then project B is not allocated any CPU resources and project A is allocated all CPU resources. Processes in B always run at system priority 0, so they will never be able to run because processes in project A always have higher priorities.
|
'4.4m barrels of oil' in Gulf spill
BP's stricken well in the Gulf of Mexico spilled an estimated 4.4 million barrels of oil into the ocean before it was capped, the first objective scientific study of the disaster has concluded.
The quantity of oil which poured from the Deepwater Horizon well for three months was enough to fill 700,000 cubic metres.
The gushing well head was capped in July, but the full impact of the world's worst oil catastrophe is still being unravelled.
Researchers reported the findings of an independent assessment of the size of the spill in the journal Science.
By analysing underwater video images of the leak, they calculated that up to 58,000 barrels of oil - possibly more - escaped daily until the first effective cap was installed on July 15. One barrel of oil is equivalent to 42 gallons.
BP has been strongly criticised over the disaster, which occurred on April 20 when escaping methane triggered an explosion that ripped through the oil platform killing 11 workers and injuring 17 others.
The study divides the flow rate into two periods. The first, from April 22 to June 3, saw 56,000 barrels of oil a day gush from a jagged break in the riser, the pipe extending from the drilling platform to the sea floor.
After June 3, the riser was cut and oil temporarily poured into the ocean unimpeded. At this stage the flow rate of the leak rose to around 68,000 barrels.
The authors subtracted 804,877 barrels collected by BP at the site to come up with their final figure of 4.4 million barrels.
Scientists initially greatly underestimated the extent of the leak and the figures were later revised upwards, but objective data was lacking.
|
Restorative dentistry is one of the basic branches in dentistry and deals with the replacement of hard dental tissues with appropriate dental materials. Various factors can lead to tooth loss. In practice, the most common care is for teeth with carious and non-carious damage of varying degrees, care for fractured tooth crowns, teeth with discolored crowns, care for teeth after tooth root therapy and the like.
Restorative dentistry includes diagnostics, treatment of teeth and replacement of damaged tooth tissue with composite fillings. Modern trends in dentistry require the use of aesthetic adhesive materials that match the color of the teeth in order to fully satisfy the aesthetics and function. At Dentalux, we use the highest quality materials that enable the ideal aesthetic reconstruction of damaged and bad teeth: composites, glass ionomers, compomers.
Tooth cavity is the most common dental problem, and it involves the destruction of hard dental tissues and the creation of a cavity in the tooth. Microorganisms, saliva composition, poor oral hygiene, arrangement and shape of teeth contribute to the development of cavities. Regular visits to the dentist help a lot in the early detection of cavities and its almost painless healing.
|
THE COLOURED “BRIAR ROSE” AND A PURPLE VISION: THE COLOR PURPLE AND “BRIAR ROSE” IN A MODERN BLACK FEMINIST PERSPECTIVE
The phenomenon called literature is always open-ended and under continuous analysis. A scrutiny of it reveals how great works of art draw heavily from pre-literary categories such as ritual, myth and folk tale. Thus Archetypal criticism traces literature to conclude that in spite of temporal and spatial boundaries, great works of art revert to these pre-literary forms. Primordial man tried to explain his experiences, observations and inferences in the form of rituals, legends and folk tales that were orally communicated throughout generations. Orality thus played a significant role in the spreading of the legends and stories:
It is certain that as man began to live in communities, they felt the desire to share their experiences. At first it was merely telling of some personal exploit in hunting or war. . . .Gradually stories came to embody the prowess of the tribal heroes, accounts of battles, the customs and rituals of the people. (Haviland 206)
Being intended for social and moral growth these customs and rituals come under the general term folklore. They were a means for passing down cultural ideas, thoughts and values. Most of them are structured in the form of children’s literature and meant for socializing children.
Every culture has popular tales meant for children in the form of folk tales, legends, myths or ballads. Fairy tales that have been passed down through generations have their roots in old oral folk tales. Many stories that we associate as deriving from European roots can be traced back to some other oral folk culture in ancient times. Many a time the same story can be located in different cultures. Thus, they transcend temporal and spatial boundaries. These tales encompass the culture’s values and morals. Conveyed in the form of stories where the characters are often charming princes, pretty maidens, animals etc., set in the background of a dream world, such tales could imprint traditional and ethical values deep in the child’s psyche. They served as reservoirs of culture and tradition and thus expressed the thoughts and aspirations not of an individual but of a collective psyche. As a result, children’s literature has become the subject of heated critical discourses in the modern scenario.
Women played a major role in the process of socialization. A mother was often regarded as a tradition bearer, a source and channel for passing down communal history and wisdom to the next generation. Most often, this transmission occurred orally through folk narratives. The mothers or grandmothers who told the stories coloured them with their own experiences while giving expression to their aspirations and protests, dreams and demands.
Women’s narratives showed a perfect blending of tradition and creativity. The common feature of an “underlying thread” could be located in them: “women play active or extraordinary roles as protagonists who go beyond prescribed norms of society, overcome adversaries and transform obstacles to their advantage” (Narasamamba 83). The women narrators tried to show their children that women could also perform well in life independent of men, sometimes even better than men could. They suggested that women are never silent when it comes to representing themselves in a world that is often claimed as a man’s land. The storytellers sometimes employed humour and subversion to attack stereotypes of male wisdom and superiority as is evident in Indian numskull tales:” It is interesting to note that many Indian numskull tales . . . present fine examples of tales in which numskulls are characterized as males, such as stupid peasants, weavers, boys, husbands and of course- stupid sons-in-law” (Handoo 36) .
The term Fairy in Fairy Tale is derived from the French word faerie, which referred to the residences of the local fee. The fees were village women who distributed herbs and incantations and often regarded as transmitters of mystical stories. This shows the involvement of women in the propagation of folk fairy tales, asserting their wisdom and power. The tellers of the tales were often the older women, passing on experience to the young by telling tales that outlined social functions. The oral tales, when they are changed into written form acquire new meanings depending on the audience and the time they address. They have the ability to reshape themselves to suit the generational and individual requirements of literature. For example, many of the first folk tales like the Zambian legend “Why People Began to Live in Houses”, the North-American legend “How the Sky Went So High” etc seek explanations for the origin of universe and life. Later writers used myths, folk fables and fairy tales to produce great works with diversity of thought and greater experiments in plot. For example, George Orwell’s Animal Farm that comes under this tradition is a modified beast tale where animals assume the role of humans thereby exposing the noble and absurd human traits.
Down the centuries, fairy tales have acquired psychological, philosophical, anthropological, political, racial as well as feminist overtones. Psychologists like Sigmund Freud find “Thumbelina”, “Little Red Riding Hood” etc., as symbols of the development of female sexuality. The followers of Carl Jung find fairy tales as a psychological quest for self-realization. Anthropologists claim that folk fairy tales can tell a lot about ethnic cultures. In the latter half of the nineteenth century, according to Jack Zipes writers like Oscar Wilde, Charles Kingsley etc., subverted and inverted the tales. He says that their tales were affected by “the development of a strong proletarian class, industrialization, urbanization, educational reform acts, evangelism and the struggles against those forces which caused poverty and exploitation” (Zipes 99). Many writers have subverted these myths, folk tales and fairy tales or have interwoven them into their works to meet the changing social situations. For example, the Black writers incorporated oral forms like sermons, riddles and proverbs to explore such themes like racism, slavery and equality. Chinua Achebe’s The Arrow of God portrays the Igbo tradition through native myths and proverbs, thereby raising voice against colonialism. Wole Soyinka’s play The Road uses the religious myth of Ogun just as Girish Karnad’s Hayavadana uses the native myth of transposed heads to show the existential predicament of modern man.
Black literature employs strategies of orality, parody, lucid imitation, magic and primordial African myths as well as the music of jazz and blues to show the world that there is a rich tradition which keeps alive the vibrancy and dynamism of Black culture. This culture has its roots in the matriarchal tradition of pre-slavery Africa where women enjoyed high social status. The Black women were of “powerful imagination and deep spiritual feeling”. With the intrusion of the colonizers and the subsequent slavery, these women were forced out of their Paradise to the Inferno of the White capitalist society. Being slaves with neither a room of their own in the society nor economic independence, they had to suppress their creative power within themselves. As the Afro-American feminist writer Alice Walker points out in her article “In Search her of Our Mothers’ Gardens”, they were “driven to a numb and bleeding madness by the springs of creativity in them for which there was no release” (Walker 109,105).
With the emergence of the concept of the New Black womanhood, the Black women realized that instead of remaining totally battered and abused by the society, they should develop their identity intellectually, culturally, politically and spiritually to survive with dignity. In literature, they sought to regain their lost voice. They found that in the works of Black male writers the figures of Black women are often shadowy:
They create inauthentic females because in their writings the black women are always subordinate to men and the relationship between black men and women is always exploitative. Women are not fully developed human beings and are treated as victims or sex objects.... The fact that women, too, aspire to achieve their womanhood which is equally important is always ignored. (Puri 7)
Thus in the works of Black women writers we find an attempt to expose the oppression of Black women based on race, class and gender. In order to raise their voice against this triple jeopardy, as well as to show the importance of Black beauty and Black motherhood, the Black women writers rely on the materials readily available to them and which suit their rich oral folk tradition. In addition, they find nothing better than the folk and fairy stories that they have derived from their mothers and grandmothers. Black feminist writers like Toni Morrison and Alice Walker employ subversion as an important technique to give new meanings to traditional folk fairy tales. In Morrison’s Tar Baby, the African folk tale of tar baby is retold as a modern cautionary tale that emphasizes cultural dilemma, racism and sexism. These writers use myths and folk tales to assert the individual’s identity as a Black and as a woman, as Celie states in Walker’s The Color Purple (CP): “I’m Pore, I’m black, I may be ugly and can’t cook, a voice say to everything listening. But I’m here” (Walker, CP 187).
Alice Walker grew up in an oral tradition to be influenced by folk and fairy tales and the impact of oral culture is very much evident in her works. In her article “In Search of Our Mothers’ Gardens”, Walker creates a matriarchal history of Black womanhood. She says that the Black matriarchs are guardian angels of their race and tradition. Black motherhood is seen as not only giving birth and bringing up children, but also as igniting in them the creative spark and transmitting to them a cultural heritage. Walker acknowledges here the influence of the stories told by her mother in her writings:
so many stories that I wrote, that we all write, are my mother’s stories . . . through years of listening to my mother’s stories of her life, I have absorbed not only the stories themselves, but something of the manner in which she spoke, something of the urgency that involves the knowledge that her stories- like her life- must be recorded. (Walker, “In Search” 110)
Walker’s novels are thus her tribute to the rich Black culture, oral tradition and most importantly to the entire Black womanhood. In The Color Purple, Walker explores the issues of race, class and gender through the life of the female protagonist Celie. She employs subversion both at the structural and the thematic levels in order to challenge the unjust notions of the patriarchal Eurocentric society in such a way that Celie’s sexual, artistic and spiritual growth correspond to a princess’s awakening from a long sleep. By subverting the Eurocentric concepts of beauty as well as replacing the role of a male rescue hero with Shug Avery, Walker narrates a story of double subversion and recreates Celie as a Black Briar Rose.
Fairy tales have their origin in prehistoric oral folktales based on matriarchal cultures to be passed down through ages. Women internalized the tradition and values and expressed them in their own lives, never hesitated to externalize them in their creative narratives as well. Naturally, these tales might have been centered on female figures as they were told by women narrators. The mothers and grandmothers used their narratives as tools to challenge the prescribed norms of the society. In their stories, they showed yet another society where women could give shape to their aspirations with a different sensibility.
These matriarchal views and motifs of original oral tales underwent successive stages of patriarchalization. A gradual change happened when these narratives were translated into graphocentric texts. The majority of the people who put the stories into print were male and therefore they exploited the fairytales to reinforce traditional ideologies of male domination. Many among such tales represent White Eurocentric cultural values while upholding male hegemony. Feminist criticism tends to analyze and interpret the images and ideological assumptions in the male produced works in such a way that the very understanding of the text undergoes a change. It has contributed to analysis, interpretation and evaluation of the traditional fairytales like that of Brothers Grimm. Accordingly, these tales have been rewritten countless times with explicit female perspectives.
In her essay “Towards a Feminist Poetics”, Elaine Showalter argues that women characters have always been stereotyped in the works of men. From myths to modern writings, women are characterized either as angels or as witches (Showalter 146-155). In Ramayana, Sita, who conforms herself to the norms of the patriarchal society, who never questions the injustices done to her, is regarded as an angel. At the same time Shurpanakha, who dares to challenge the andocentric norms and openly expresses her desires is labeled as a monster. Thus almost all male texts miss the authentic portrayal of female characters. These characters are marginal and subordinate and introduced only in relation to male characters. The male author imprisons his fictitive creatures in the shackled webs of patriarchy depriving them of autonomy. Women writers tend to subvert these stereotypical characters and create new characters based on genuine female experiences.
Accordingly, there has been a growing awareness of the way in which women are portrayed in fairy tales. One of the stereotyped female figures is that of the damsel in distress. A young woman imprisoned by a monster who requires a hero for her rescue is a recurring image in fairytales:
One of the main attributes of female is to long for male. She dreams of male who performs the role of liberator, who will escape her from the role of subordination. She imagines that under male love she will be able to feel the currents of life. He will provide her a sense of security. (Beauvoir 53)
Feminist critics have challenged the helplessness of the damsel awaiting a male rescuer. Many modern writers like Angela Carter and Jane Yolen have revisited classic fairy tales and subverted them. In order to break the damsel in distress pattern, they reversed the stories by empowering the damsel who in turn rescues the men in distress.
Traditional fairytales like that of Brothers Grimm try to assert that woman’s beauty is her only virtue and that this beauty is akin to her soft brittle nature. The damsels use it to capture the heart of the charming princes whereby they are rescued. On the other hand, ugliness in fairytales is usually considered as the outward manifestation of wickedness. Again, the figure of princesses is always associated with nobility. Thus by the shifting of importance to pretty princesses, these tales tend to ignore ordinary women, especially Black women:
Fairytales focuses on princesses because men prefer younger women: hence the shock when Anne Sexton rewrites some of Grimm’s fairytales from the point of view of ‘a middle-aged witch, me’. (Ruthven 80)
Thus, traditional fairytales tend to instill the child’s mind with the idea that it is impossible to survive without the saving hand of a man and for that, it is necessary to be attractive.
Feminist critics find that like any other docile women characters in literature, the beautiful damsels in traditional fairytales are devoid of individuality. Like what Emily Dickinson says in her poem “What Soft Cherubic Creatures”, such gentle women are “soft” and “brittle” objects with “Dimity Convictions” lacking identity ( Dickinson 866-67). Thus, there have been attempts to subvert these docile heroines in to those who triumph through their spirit, bravery and perseverance. In her work Unprincess Manjula Padmanabhan portrays three heroines who are braver, bolder and resolute than the swooning princesses of traditional fairytales. In the story entitled “The Giant and the Unprincess”, she makes a brilliant remark:
After all, aside from Kavita, all the little girls on the bus were princesses. Being princesses, there was only one thing they could do really well in a crisis. And that was to scream and to cry at the loudest possible volume. So they did so. They could also go red in the face and drum their heels against the floor. They did so. . . .But none of what they did made the slightest difference in the giant. (Padmanabhan 5-6)
Yet another area that has attracted feminist critics is the role of the male rescuer. In fairytales, the rescuer is always presented as a male, usually a charming prince, thus conveying the idea that the rescuer is always a man. Recent feminist studies in fairytales attempt to demythologize this concept of traditional hero. Subsequently, the nature and function of the stereotyped fairytale rescuer has shifted. They tend to prove that not all male figures are competent rescuers as Manjula Padmanabhan writes in Unprincess:
The princesses screamed with renewed vigour, so much so that one or two of the princes looked up from their games. But it was very clear that the situation was still nowhere near being the kind they knew the solution to. So they shrugged, and returned to their buttons on their Game Boys. (9)
Moreover, they argue that in the original version of most of these tales, the rescuer was not a male figure. In The Grandmother’s Tale, the oral version from which Charles Perrault derived the story of “Little Red Riding Hood”, the girl is finally rescued not by a passing woodsman or hunter but by a group of laundresses who drown the wolf in the river. Similarly, the male writer in such a way twists Bluebeard’s tale that the two sisters have to be saved by their brothers from the hands of the cruel husband. On the other hand, the original story relates how the third sister saves herself and her sisters. Similarly, Margaret Atwood’s Bluebeard’s Egg is a subverted form of the traditional outlook. Angela Carter’s“The Bloody Chamber” is also a subversion of the Bluebeard story where her mother finally rescues the heroine: “Without a moment’s hesitation, she raised my father’s gun, took aim and put a single, irreproachable bullet through my husband’s head” (Carter 45). In her collection of stories, Carter substantiates the strength of women by subverting the popular stories to portray strong female characters. Most of the stories in the collection have a female as the protagonist whereas men play insignificant roles. Thus in “The Bloody Chamber”, while the lover figure is blind and passive, Carter makes the heroine’s mother the saviour who comes riding on a horse thus emphasizing the strength of women. In addition, this portrayal of the mother saving the daughter can be traced back to the myth of Demeter, the corn goddess who struggles to save her daughter Persephone from the hands of Pluto. The story of Demeter and Persephone has been regarded as the archetype of female bonding. This shows how these writers subvert the traditional tales so as to substantiate the concept of women bonding.
Female writers have thus retold many fairytales. Perrault’s story of “The Sleeping Beauty” is one among them. After prolonged waiting, a daughter was born to a king and a queen. The king decided to hold a great feast and invited twelve good fairies to bless his daughter. Just as eleven of them had done blessing her, one wicked fairy being angry that she was not invited decided to take revenge. She cursed: “The king’s daughter shall, in her fifteenth year, be wounded by a spindle, and fall down dead” (Grimm 37). Then the twelfth fairy who had not yet given her gift blessed that the spindle wound shall not kill her, instead she should fall asleep for a hundred years. After fifteen years the prophecy was fulfilled and along with the princess, the entire palace fell asleep. After hundred years, a charming prince came and kissed the sleeping princess out of her sleep. Moreover, they lived happily ever after. In Perrault’s version, there is a second part for the tale, of the wicked mother-in-law. Brothers Grimm who retold the story as “Briar Rose” removed this second part.
There have been many subversions of “Briar Rose” as presented by women writers. Feminist theorists focused on Sleeping Beauty’s extreme passivity and the sexual nature of her awakening. Jane Yolen’s Briar Rose retells the story through the female protagonist Gamma and her grandmother. In the story, set against the backdrop of Nazi Germany, the common images of the fairy tale is metamorphed to portray the harsh realities of life under the Nazis. The Spindle is a modern feminist retelling of the story by Carolyn Gage. It is the story of a young lesbian who sets out to redeem the princess out of her curse. Angela Carter in “The Bloody Chamber” and Other Stories gives a postmodern retelling of “Briar Rose”. The story entitled “The Lady of The House of Love” is concerned more with feminist ideals than staying true to the original tale. It is the story of a countess, the queen of vampires, who abhors a meaningful existence between life and death. Carter subverts the concept of beauty when she says, “She is so beautiful she is unnatural; her beauty is an abnormality, a deformity . . . her beauty is a symptom of her disorder, of her soullessness” (Carter 120). The identity of the protagonist is asserted when she chooses death instead of accepting the rescue hand of a male who was planning to change her according to his will:
We shall take her to Zurich, to a clinic. She will be treated for nervous hysteria. Then to an eye specialist, for her photophobia, and to a dentist, to put her teeth into better shape. Any competent manicurist will deal with her claws. We shall turn her into the lovely girl she is. (137)
Thus the story of Briar Rose has been a subject of various retellings. Archetypal criticism views the story as a symbol of the replacement of lunar year by the solar year. The lunar year with thirteen months is represented by the thirteen fairies which are replaced by the twelve good fairies, showing the twelve months of the solar year. From a psychological perspective, the story can be regarded as a transition from unconsciousness to the consciousness of the self. Closely related to this view, feminist criticism analyzes the story as the awakening of the female protagonist towards an awareness of her identity. For this emancipation she might have been guided and supported by an outside agency like mother, father, friend or lover. However, the story can be regarded as a girl’s awakening towards self-consciousness.
In its affinity towards oral tradition as well as in its employment of subversive strategies, Black feminist fiction comes closer to fairytales. As stated before, fairytales have their origin in a matriarchal oral tradition where women were free to compose and recompose their narratives. Similarly, African as well as Afro-American literature has its roots in the African oral tradition rooted in culture that gave great honour to motherhood. However, this female tradition was hindered somewhere in the pages of history and authorship became purely a male activity. Women were forbidden to write for the reason that she lacked phallic power. As Sandra Gilbert says that in the Western patriarchal culture, the author of the text is considered “a father, a progenitor, a procreator, an aesthetic patriarch” and his pen is regarded as “an instrument of generative power” (Literary Paternity 190). Moreover,
Through the construction of cartoon figures like Sheridan’s Mrs. Malaprop and Fielding’s Mrs. Slipslop and Smollett’s Tabhitha Bramble, they implied that language itself was almost literally alien to the female tongue. (Gilbert, “The Mad Women in the Attic” 157)
Therefore, when women started writing, she had to use the oppressor’s language in order to express her feelings and desires. As Virginia Woolf says, it was a language unsuited for women’s use.
In this way, a woman’s writing and women’s language have become the central subjects of feminist critique. Critics like Elaine Showalter argue that woman writes through her brain, which is a “metaphorical womb” (“Feminist Criticism in the Wilderness” 337). They say that the concept of women’s language that appears in folklore and myth is very ancient. It is as a break from patriarchal language that the concept of ecriture feminine was formulated. Accordingly, women writers started using female body as a source of imagery. They used female sexuality as a symbol of women’s victimization as well as resistance.
Feminist theorists thus view much of the fairytales as a symbol of female initiation, maturation and sexual anxieties. Hence, in their subversions they employ sexual imagery. A fairytale is usually characterized by a short sentence structure, direct address to the reader, fantastic setting and a simple diction that is often rhythmic. In “Briar Rose”, too the setting is remote and romantic where the characters are the noble fairies, the pretty princess and the heroic prince. The story starts thus:
A king and a queen once upon a time reigned in a country a great way off, where there were in those days fairies. Now this king and queen had plenty of money, and plenty of fine clothes to wear, and plenty of good things to eat and drink, and a coach to ride out in every day. . . . (Grimm 36)
The later retellings of the story like “The Lady of the House of Love” abound in violent sexual as well as gothic elements. Instead of presenting the marvellous and the fantastic, the writers give gruesome pictures of reality. They also deviate from the ‘once upon a time’ pattern of narration with an omnipotent narrative voice. The retellings thus become authoritative and subjective, revealing the inner thoughts of the characters.
Black women writers use their writings as a liberating tool, a subversive technique and an artistic mode of self-expression. In their use of native myths and authentic language which has the rhythm of blues, jazz etc., they tend to look back to the oral tradition. Alice Malsenior Walker is one of the prominent figures in African American women’s writing, who has written fiction, poetry and essays about race and gender. Greatly inspired by the writings of Zora Neale Hurston, and in her own capacity as an activist of the civil rights movement, Walker’s works depict the struggles of the Blacks, especially the Black women and their lives in a racist, sexist and capitalist society. Her works are also her expression of the role of women of colour in culture and history. Starting with The Third Life of Grange Copeland (1970), she has written fictions like Meridian (1976), Possessing the Secret of Joy (1992), You Can’t Keep a Good Woman Down (1982), The Temple of My Familiar (1989), The Complete Stories (1994), By the Light of My Father’s Smile (1998), Now is the Time to Open Your Heart (2005), We are the One’s we have been Waiting for (2006) etc. Her essays include, In Search of Our Mothers’ Gardens (1983), Living by the Word (1988), Anything We Love can be Saved (1997), Sent by Earth: A Message From the Grandmother’s Spirit (2001) etc. She has also written poems like Once (1968), Her Blue Body Everything We Know (1991) and Absolute Trust in the Goodness of the Earth (2003).
The Color Purple (1982) is Alice Walker’s best known and critically acclaimed novel that uses subversions in the structure of an epistolary novel. Walker uses the epistolary style and the Southern Black vernacular in the novel to subvert the traditional paternal discourse to enhance the theme of Black woman’s independence: “Throughout The Color Purple the authorial voice speaks for subverting a system that promotes both racism and sexism” (Johnson 216).
Epistolary was a form invented by men to write about women, and in a sense for women since they thought that being emotional and weaker, women could express their thoughts and feelings not directly by speaking but through the medium of letters. In the epistles written by men to portray women, again we find women being defined by men. The male writers portrayed women characters as being powerless to articulate their feelings in public who in turn sought the help of letters to communicate their private emotions. “By the twentieth century, the epistolary mode is a matter for self-conscious revival”. This style was revived by women writers to delineate the true self of woman. They used it as a tool to undo the hierarchy of gender. “The two potent elements in the form, it has been suggested, are its impressive instancy and its approach to psychological truth, even to the stream of consciousness” (Watson 37, 31-32).The ninety one letters written by the two sisters in The Color Purple (CP) focus on and document Celie’s progress from sleeping to awakening. Celie’s initial letters to God show her passive resignation: “Her very first letter reveals that the secret that can be told to no one but God has to do with sexuality, with sexual morality, with a male parent’s sexual abuse of a female child” (Berlant 54). Later, when she replaces God with Nettie, her rebellion against patriarchy in general is revealed: “God I been praying and writing to is a man. And act just like all other mens I know. Trifling, forgitful and lowdown” (Walker, CP 173). The letters of Nettie bring into sharp focus the African heritage also. The epistolary narration provides an intimate view of the character without any interference from the author. Walker uses this style to give voice to Black women who have been silenced for long.
The language that Walker employs in the novel is the Black American vernacular as evident in the use of double negatives like “I don’t say nothing”. When Darlene tries to teach her talk in Standard English, Celie says, “Pretty soon it feel like I can’t think. My mind ran upon a thought, git confuse, run back and sort of lay down” (Walker, CP 194). This shows the Black people’s defiance of a language system controlled by the White. There are variations in vocabulary and spellings also. Walker’s protagonist develops a voice despite the constraints of race, class and gender and thereby transforms oral tradition into innovative literary language. The language of the letters in Black American Vernacular and its usage exploits all the possibilities of expression to suit the crises in the character. In this bold act, Walker subverts the dominance of standard language and standardizes the marginalized language to convey the direct message with exact sharpness.
The epistolary form of narration and the true oral language that is employed take the novel closer to the heart of the readers, just like the fairy tales. Celie’s journey towards her self in The Color Purple follows the fairy tale structure of fantasy, recovery, escape and consolation. With a fantastic touch of understanding and affection, the already latent desire in Celie for a good life is accelerated to lead her to a complete recovery and reformation. Under the strong impact of the discovery of her real self with the help of Shug Avery, Celie recovers from her victimized self and starts perceiving her life and surroundings in a new light. This follows her sincere attempts to escape from her largely alienated self and that result in the confrontation of it in new terms, the narration of it in a new vision through a different style. Walker renders her novel in the pattern of a fairytale both from the feminist and structural perspective. Just as the traditional fairytale undergoes thematic and structural inversion, the self of the protagonist undergoes a series of subversions. The mutilated self for a time exists as a silent, lethargic and alienated self devoid of any hope of redeem in the bleak society. After the magic of compassion, it evolves into the final stage of a new awakened active self. In Walker’s novel as well as in the fairy tale, there is the “victory against odds of the unlikeliest people. That is based upon the incurable optimism of human nature” (Haviland 224).The myth of the sleeping beauty thus acquires a feminist interpretation in the novel incorporating the subversion of the Eurocentric values of culture, race and gender in the wider context, and the requirements of Afro-American situation in particular in the modern times.
The feelings of low self-esteem, low self-respect, as well as the traumatic and alienated life of Black women in a White society is a theme handled by Black women writers like Toni Morrison, Maya Angelou and Alice Walker. Forced to live as a Black and as a female in a racist, sexist, patriarchal and capitalist society, Black woman was treated not as a human being but as a subhuman or a mere object. Throughout her novels, short stories and essays, Alice Walker focuses on the issue of the helpless and powerless state of the Southern Black women. Walker’s Womanist parable, The Color Purple (CP) depicts the triumph of one woman’s crusade against racism, sexism and socially imposed traditions. It is the story of an oppressed Black woman’s journey from sexual slavery to freedom.
The Color Purple has been analyzed using many terms such as feminism, racism, spiritualism, existentialism etc. It has also been considered in its various capacities as an epistolary novel, a bildungsroman and a historical novel. Walker has interwoven all these aspects into the myth of Philomela, at the same time subverting the myth by giving Philomela a voice that successfully resists the violent patriarchal inscription into a silent female body. Philomela is raped by her brother-in-law Tereus, who tears out her tongue after it. She is being imprisoned in a castle from where she manages to weave a tapestry depicting Tereus’ actions and sends it to her sister Procene. The mythic narrative, which intertwines rape, silencing and the destruction of female subjectivity, has also a subtext that focuses on how woman can raise her voice against the limits of patriarchal discourse. African-American women’s writings like The Color Purple, The Bluest Eye etc., have allusions to this archetypal rape narrative. However, Alice Walker’s The Color Purple transcends this allusion and grows out to be a bildungsroman where the protagonist achieves sexual, spiritual and creative awakening. Many a time, this awakening in the protagonist Celie is mixed with dramatic coincidences that make us think it to be a fairy story. Therefore, it is suggested that Celie is the awakened sleeping beauty like the princess in the fairy tale “Briar Rose”.
Celie is a young girl of fourteen, ignorant, naïve and vulnerable. To be born as a Black girl in a White patriarchal society itself becomes a curse for her. As any other Black woman cursed to be in a Eurocentric society, Celie too has to suffer a condition of triple oppression. Subjected to severe brutality of racism, classism and sexism by the White patriarchal society, the Black woman was tormented beyond description. Celie is repeatedly raped and forcibly initiated into an incestuous relation with a man whom she believes to be her father but is really her stepfather. She is too innocent to know what is happening to her and hence the cry to God: “I am fourteen years old. I have always been a good girl. Maybe you can give me a sign letting me know what is happening to me” (Walker, CP 3). The guilt of compelled incest torments her mind and she thinks that she is a sinner.
This sense if sin is aggravated by the lack of love and care from her mother. Her mother becomes a silent partner in her victimization by Pa. Celie is aware that her mother realizes what is happening. But she is deprived of comfort and security from the mother, herself a victim of patriarchal oppression. Her mother’s overbearing has ruined her physical health and so she finds it difficult to satisfy Pa physically. This provides a strong justification for the unrefined man to harass the helpless daughter of his wife. Celie says, “He never had a kine word to say to me. Just say you gonna do what your mammy wouldn’t”. The mother is relieved, as her husband is more kind to her now. At the same time, she gets infuriated with Celie who becomes pregnant: “My mama dead. She died screaming and cussing. She scream at me. She cuss at me” (Walker, CP 3, 4). Celie understands that she is living her mother’s life, but the child in her wants her mother’s love. The profound guilt and self-hatred Celie experiences about replacing her mother are augmented by her mother questioning her pregnancy and her cursing Celie from the deathbed. It is a universal fact that a strong relationship with the mother is essential for the growth and maturity of the child especially a girl child. According to Adrienne Rich, the loss of mother-daughter bond is the greatest tragedy in the world. The mother’s awareness of her own feminine selfhood is a pre-requisite for the emergence of a selfhood in the daughter. In the case of Celie, the mother’s self-hatred leads to a stunted psychic growth in the daughter.
The mother’s curse at her deathbed then becomes similar to the wicked fairy’s curse to the young princess. Both the mother and the fairy are humiliated by the society. The mother is a victim of the White patriarchal society whereas the king and the queen consciously ignore the fairy from the feast just because there were only twelve golden dishes. Their curse is thus the result of humiliation, self-hatred and grief. The princess Briar Rose is cursed not for her fault but for the mistake done by the grownup people around her. Celie’s sufferings are also due to the outcome of the failures of the grown up people around her. The inescapable fact of being a Black and a woman haunted her destiny. To top it all, her stepfather takes her two children away and he marries her off, like a chattel, to a man Mr___ who actually needed a mother for his children from a previous marriage. Amidst all these negative experiences, the only happiness to Celie is the presence of her little sister Nettie. She is like the twelfth friendly fairy in the fairytale, who softens the wicked curse and blesses the princess that she “should not really die, but should only fall asleep for a hundred years” (Grimm 37). The love and concern for Nettie used to make Celie bold and thoughtful and it is then we become aware of the inner spark of strength in her. Celie tries the maximum to protect Nettie from Pa and later from Mr___. The two sisters used to love and care for each other and Nettie always tried to instill knowledge and strength into Celie’s mind. So Nettie’s running away from Mr___’s house as well as her supposed death is to Celie the needle prick which puts the princess into the long sleep. Nettie’s disappearance makes Celie believe that the wages of rebellion are death: “I think about Nettie, dead. She fight, she run away. What good it do? I don’t fight, I stay where I’m told. But I’m alive” (Walker, CP 22).
However, the creative core within Celie is not destroyed which is illustrated through her writing of letters to God. There is an inner strength, which Nettie has instilled in her. However, Celie chooses a state of slumber for she needs it in order to forget her sense of sin and guilt. Initially she chooses silence out of shame and fear, for her stepfather has threatened: “You better not never tell nobody but God. It’d kill your mammy” (3). But now, to an extent she is tormented thinking herself as the cause of Nettie’s supposed death. It is because of this torment of the soul that Celie puts her body, mind and soul into a long sleep. Thus, the spirited woman within her is hibernated: “She was not dead, but had only fallen into a deep sleep” (Grimm 38).
What follows is a life of suffering and silence to Celie. Instead of asserting herself, she chooses to say nothing, which in a way adds to her own oppression. She makes herself a drudge looking after Mr___’s rotten children and keeping his house clean. There is an unquestioned submission from her part. In a way, the silence and submission is her particular mode of existence. When like an animal she is often beaten by Mr___, Celie survives by refusing to feel: “He beat me like he beat the children. Cept he don’t never hardly beat them. He say, Celie, git the belt. . . .It all I can do not to cry. I make myself wood. I say to myself, Celie you a tree” (Walker, CP 23). The condition of being merely a housewife can create a sense of emptiness, non-existence and nothingness in women. With no one so intimate to open her heart and share her feelings, she starts to internalize the White patriarchal notions of womanhood. She imagines herself ugly and impotent as told by Pa, “She ugly . . . She ain’t smart either . . . She tell lies”, and by Mr___: “You black, you pore, you ugly, you a woman. Goddam, he say, you nothing at all” (10,187). Her destruction is complete and beyond recovery:
Raped, beaten, silenced and sold into marital slavery by the man she thinks her father, Celie begins to doubt her humanity, and as her debasement continues in the hands of Mr___, she actually entertains thoughts of self-erasure. (Allan 130)
Celie gradually forgets her own potential, forgets that she ever enjoyed the status and dignity of a human being.
Like most of the Black women imprisoned in the Eurocentric world, Celie is also ignorant of the richness of her African culture and tradition. She is unaware of the distinct human status that women enjoyed in pre-slavery Africa. As a result, Celie struggles to fit herself into the feminine roles defined by the White androcentric society: “When a woman marry she spose to keep a decent house and a clean family”. The Black woman in a White society was degraded by the sexual attack of the White man and more profoundly by the men of her own race. Similar is the case of Celie. Because of the extended sexual abuse first by Pa and then by Mr___ Celie thinks herself to be devoid of any sexual desire. She never enjoys having sexual relation with her husband. To her it is as if “he going to the toilet on you” (Walker, CP 20, 74). Her premature menopause, probably induced by the trauma of sexual abuse is read as a symbol of her de-sexing.
Black women’s silence over her racial and sexual oppression, her silence over the crucial issues related to her feminine narcissism represented her negation of the inner erotic power. It even indicated that she possessed a fragmented self. (Kulkarni 83)
Deep in the mind of the Blacks, there is always the thought that the Whites are superior and so they should be treated with respect and reverence. This is illustrated by Walker through Celie’s concept of God: “He big and old and gray bearded and white. He wear white robes and go barefooted” (Walker, CP 175). She believes that in order to be a part of God one has to work for Him and pay regular visits to the church. She seeks comfort by writing letters to God but unfortunately, the God she has in mind is a White patriarch. Thus, Celie, by all means, is silenced by patriarchal abuse. She becomes the sleeping beauty in the woods. Her mind becomes rotten and deserted like the palace in the fairy tale surrounded by thickets: “A large hedge of thorns soon grew around the palace, and every year it became higher and thicker” (Grimm 39). As she has allowed herself to be in sleep, Celie’s innate strength lies dormant and hidden. Carter narrates a similar condition in “The Lady of The House of Love”:
Depredations of rot and fungus everywhere. The unlit chandeliers is so heavy with dust the individual prisms no longer show any shapes; industrious spiders have woven canopies in the corners of this ornate and rotting place, have trapped the porcelain vases on the mantelpiece in soft gray nets. But the mistress of all this disintegration notices nothing. (Carter 120)
With the princess the whole palace- the king and the queen, the entire court, the cook, the butler, the horses, the dogs, the pigeons and even the fire on the hearth- falls asleep. Similarly, Celie enters the world of no reactions. Celie being silent and docile, Mr___ fails to acknowledge her potentials and continues to dominate her. However, with Shug Avery he is quite different a man. As Shug says,
Nobody dance like Albert when he was young . . . Albert was so funny. He kept me laughing. How come he ain’t funny no more? She ast. How come he never hardly laugh? How come he don’t dance? She say. Good God, Celie, she say, what happen to the man I love? (Walker, CP 111)
Not only Mr___ but his son Harpo too tries to dominate his wife Sofia and his lover Mary Agnes. Harpo wants Sofia to do whatever he says, and he believes his father’s words: “Wives is like children. You have to let them know who got the upper hand. Nothing can do that better than a good sound beating” (35). Thus, Celie’s household, which is a microcosm of the society for all practical purposes, is in a sleeping stage. It shows that as long as woman fails to challenge the patriarchal norms, as long as she remains silent, the society will never acknowledge her presence.
Sofia shows courage to challenge the patriarchal as well as racial norms. Celie, whose mind has become a thorny thicket, grows jealous seeing Sofia’s courage and asks Harpo to beat her. This shows the degradation of Celie, but she herself feels guilty of her action: “A little voice say, something you done wrong. Somebody spirit you sin against”. Later she herself confesses to Sofia, “I say it cause I’m a fool, I say. I say it cause I’m jealous of you. I say it cause you do what I can’t” (Walker, CP 38, 39).
So many princes try to break the thicket and enter the palace to rescue the princess. However, all of them fail, to be entangled in the thorns and bushes. Likewise, numerous times other women like Mr___’s sisters tell Celie that she must fight back. In spite of the efforts, all of them fail to wake her up from her sleep. Nettie who has tried to fight with her circumstances, according to Celie, has met with death. Later Sofia, who shows a great courage to hit the White mayor is imprisoned and sentenced to life long slavery. Thus, Celie continues to be silent and submissive until the arrival of Shug Avery who kisses her out of her sleep.
It becomes evident that most of the incidents in The Color Purple correspond to those in the fairy tale “Briar Rose”. Many of the symbols in the novel are similar to those in the fairy story. The rural farm community replaces the palace in the story. It is symbolic of the domestic as well as the universal nature of the theme. Nature is given importance both in Walker’s Womanist novel as well as in Grimm’s tale. Children’s tales usually abound in colours as pink, yellow and blue. The central symbol of the novel is purple colour, which is used to highlight the royalty and strength of the Blacks. It suggests the miracle of the vast capabilities hidden in the Black race. The princess in the fairytale is named Briar Rose. The term rose connects the princess and Celie. As Celie explores her body, it looks to her like “a wet rose”. Later, when Shug explains her concept of God, she is described as “a big rose” (Walker, CP 75,175). Thus, rose becomes the symbol of growth and blossoming whether sexual or religious. The thickets that have covered the palace are equivalent to Celie’s emotional deadness, for many a time she compares herself to a wood. The thickets represent a sign of change, hope and renewal. The twelve friendly fairies stand for the community of women in the novel. Sewing and spinning which has been a main part of women’s labour, are terms often found in fairy tales. Walker uses the same symbols- sewing and quilts- to show women’s creativity. Quilt composed of diverse patterns sewn together signifies Walker’s Womanist concept where men, women and nature exist in unity. The spindle which puts the princess to the long sleep is replaced by the needle, through which Celie attains economic independence.
The basic structure of most of the fairytales like “Briar Rose” has an element of quest. It reflects human wish for knowledge and experience. Similarly, The Color Purple is the record both of a Black girl’s quest for her self and the evolutionary growth that teaches her to face life with a sense of belonging. With the coming of Shug into her miserable life, Celie is initiated to the journey in search of the meaning of existence. Nettie’s letters guide her further in the journey. She reaches her destination at Memphis and successfully returns to her family. It is a journey to continue the quest for her very soul and its hitherto suppressed triumphs. As Virginia Haviland says ,“The true hero in all the folk tales and fairy tales is not the younger son, or the younger daughter, or the stolen princess, or the ugly duckling, but the soul of man” (Haviland 221). In the novel too, Celie’s soul succeeds by gaining identity through the undefeatable survival after the initial inertia. Walker has inverted many ideas in the fairytale, yet The Color Purple acquires the status of a modern retelling of “Briar Rose” and it further expands in its message of transformation, accommodation and progress through the magic of compassion and affection. The chemistry of this message transforms the marginalized contexts of fall, misery and inertia into contexts of women’s declaration of ideology and power.
Women writers have employed various tools both to deconstruct the gender biased myths, folk and fairytales and to reconstruct them focusing on the silences and blanks between their lines. Analyzing this trend and the strategic position, Patricia Klindienst says:
In returning to the ancient myths and opening them from within to the woman’s body, the woman’s mind, and the woman’s voice, contemporary women have felt like thieves of language staging a raid on the treasured icons of a tradition that has required woman’s silence for centuries. (Klindienst 612)
They attempted to invert and retell the events from the eyes of women thereby questioning the established social order with its structures of power, authority and exploitation. Mahasweta Devi’s After Kurukshetra thus looks at the aftermath of the Kurukshetra war from the eyes of marginalized dalit women. In the opening story of the work, she replaces the Panchakanyakas, the five virgins (Sita, Tara, Ahalya and Mandodari) with five tribal women. Similarly, writers like Toni Morrison and Alice Walker subvert oral narratives, traditional folk, and fairy tales to articulate African-American experience. In the same manner, Walker’s The Color Purple (CP) subverts two main concepts embedded in the fairy story “Briar Rose”.
Children’s fairy tales, which emphasize such things as women’s passivity and beauty, are gendered scripts with socially constructed notions. Accordingly, these stories are powerfully responsive to social changes. As a result of colonization, slavery and cultural invasion many of the original folk narratives of Africa were westernized to suit Eurocentric ideals. Walker points out this in The Color Purple through Nettie’s letter: “Olivia feels that, compared to Tashi, she has no good stories to tell. One day she started in on an ‘Uncle Remus’ tale only to discover Tashi had the original version of it” (Walker, CP 149). During the periods of intense racial conflict, Black characters virtually disappeared from children’s books. Most of the popular fairy tales like “Cinderella”, “Snow White and the Seven Dwarfs”, “The Sleeping Beauty” etc, associate what is pretty, beautiful and the fairest with the heroine who is most often described as possessing blue eyes, rosy cheeks and golden locks of hair. Many tales connote goodness, industriousness and beauty with such characters who are often rewarded. The opening sentence of “Mother Holle” says: “Once upon a time there was a widow who had two daughters; one of them was beautiful and industrious, the other ugly and lazy”. When the story ends, the beautiful daughter is rewarded, “ a shower of gold fell upon her, and the gold clung to her, so that she was covered with it from head to foot” but, for the ugly daughter, “instead of the shower of gold, a great bucket full of pitch came, pouring over her” (Grimm 113, 115,117). In this way, beauty becomes associated not only with fairness but also with goodness and economic privilege. Again, most often fairy tales tell the story of princesses and princes, not of ordinary people. Thus, beauty becomes symbolic of race and class. Starting from myths and fairy tales, it has become a universal thing to connect the fair complexion with goodness and the dark complexion with evil. The class-consciousness attributed to children’s literature could be traced back to the past as Haviland says,
Children’s books have always tended to be upper class in outlook. In Victorian days a few moral tales were deliberately aimed at the children of the poor, but stories intended for amusement rather than for edification have almost invariably been written with an upper class background. (Haviland 44)
“Briar Rose” which focuses on Eurocentric notions of beauty incorporates into its fine texture many cultural factors of the past. The princess is described as “so beautiful, and well behaved, and good, and wise, that everyone who knew her loved her”. The description of a friendly fairy as “with a high red cap on her head, and red shoes with high heels on her feet, and a long white wand in her hand” (Grimm 38, 37) is representative in nature since it could properly be assigned to the remaining eleven fairies as well. The white wand that the fairies carry symbolizes the goodness and kindness of the fairies. The wicked fairy is contrasted from the rest by associating her with Black colour. She comes “with a black cap on her head, and black shoes on her feet, and a broomstick in her hand” (37). The white wand and the broomstick they carry differentiate the good and bad fairies. The red attire and the white wand suggest wealth and royalty whereas broomstick is always linked with working class. Moreover, only the twelve fairies are invited for the feast in the palace. Thus, there is a clear differentiation of race and class in “Briar Rose” where the White hegemonic section attains fair treatment. Walker subverts this notion of beauty and emphasizes Black aesthetics in The Color Purple.
Women characters in The Color Purple exist in a world defined by its Blackness but surrounded by the White society that violates and denies it. The Black women, when they encountered the White society, had an irresistible impulse not only for White beauty ideas but also for the White cultural traits. Blackness is a cultural burden and thus in confrontation “with a society attuned to white standards of beauty as the positive marks for humanity, the black women felt ashamed of their black colour as if it was a dead weight or an albatross hanging around their necks” (Kulkarni 67). Fascinated by the Eurocentric culture, the Black women detached themselves from their Blackness and their culture. Jadine in Toni Morrison’s Tar Baby is a character who rejects her native culture. Similarly, Pecola’s craving for pretty blue eyes and her psychic breakdown as described in Morrison’s The Bluest Eye shows the colonizing effects of White female beauty on a Black girl and her community. Pecola thinks that she will be loved and cared by others if she has blue eyes. Morrison brings into sharp focus the universality of the issue when Claudia says, “All the world had agreed that a blue-eyed, yellow-haired, pink-skinned doll was that every child treasured” (The Bluest Eye 14). There are instances in The Color Purple where Walker shows the influence of White beauty ideas. For example, Carrie describes Shug Avery as “black” (Walker, CP 21) as her shoe. Others like Pa and Mr___ also treat Celie as ugly. Again, it is her strong belief that she is not beautiful and attractive that has partly made Celie submissive and docile. The fashionable world, which they saw around them labeled as sophisticated and respectable, made the Black women like Celie think that their culture and complexion were symbols of savagery. Thus, they willfully forgot their African heritage, and together with that failed to respect and recognize their own identity.
The notion of beauty in Black women’s writing is connected with the issue of racism. Black women writers’ novels are an exploration of the colourful patterns of the meaning of their Blackness. They show what it means to be Black in a White society, to believe in an indigenous African culture in a world that endorses only Eurocentric culture and to strive for visibility in a society in which Blackness signifies invisibility. They record the triumph and complexities of the journey of the Black life from the painful past of slavery to the still frustrating racially prejudiced present.
In The Color Purple, Walker demythologizes racial discrimination through characters like Sofia, Nettie and Tashi. Sofia claims her right as a human being when she defends herself from the Mayor and his wife. For hitting back the Mayor, she is brutally beaten, imprisoned and condemned to eternal serfdom. Later Sofia expresses her rebellion against racism through her reaction to Eleanor Jane. When Eleanor Jane asks Sofia an explanation of the love she has for her son Reynolds Stanley Earl, she is in fact asking Sofia to regard her oppressors as her benefactors. It is here that Sofia reacts by denying that she loves the little boy: “I don’t feel nothing about him at all. I don’t love him. I don’t hate him”. She adds that, “I love children . . . But all the coloured women that say they love yours is lying” (Walker, CP 240). Tashi makes another hit on racial discrimination when she refuses to marry Adam. She refuses because she was aware that back in America her culture would be despised and she would be shunned as a savage because of the scarification marks on her cheeks. It was very clear to Tashi “that black people did not truly admire black skinned black people like herself, and especially did not admire black skinned black women. They bleach their faces, she said. They fry their hair. They try to look naked” (252).
Through Nettie’s letters, Walker glorifies African culture and tradition and shows the colonial invasion that has ruined their culture. Nettie’s letters explain how Africa fell into the abyss of slavery and superstition. There is also a subversion of the Biblical myth of Adam and Eve in the reference to the Olinka tribe’s belief that the White people are Black people’s children. To them Adam is not the first man, but the first White man:
They say everybody before Adam was black. Then one day some woman . . . come out with this colorless baby . . . then another one had one and also the women start to have twins. So the people start to put the white babies and the twins to death. So really Adam wasn’t even the first white man. He was just the first one the people didn’t kill. (Walker, CP 247-248)
Nettie says that Christ’s hair was not straight but curly like lamb’s wool. Being aware of the civilization of Africa she wants to awaken her sister too about the achievements of their culture in the past and it makes her tell Celie about Harlem and Egypt.
Walker’s The Color Purple is a statement on racial discrimination that asserts African heritage. Her intention is to substantiate Black pride and Black beauty. As Nettie writes from Senegal,
They are so black, Celie, they shine. Which is something else folks down home like to say about real black folks. But Celie, try to imagine a city full of these shining, blue black people wearing brilliant blue robes with designs like fancy quilt patterns. Tall, thin, with long necks and straight backs. . . . Because the black is so black the eye is simply dazzled, and then there is the shining that seems to come, really from moonlight, it is so luminous, but their skin glows even in the sun. (Walker CP 126)
The use of the central metaphor, the colour purple, is again a pointer to Black beauty. The title The Color Purple is a celebration of beauty and of spiritual and political growth. Purple signifies the royalty and energy of the Black people. It is also related to spiritual strength. It is a symbol of happiness and independence. In the preface to the novel, Walker writes that the purple colour is always a matter of surprise and present everywhere in nature. The purple colour is akin to the rosy cheeks of the princess in “Briar Rose”. By associating Celie with purple flowers and rose she is made a representative of Black beauty. Walker’s idea is reflected exactly in Morrison’s comments on the Black woman in the canary yellow dress in Tar Baby, “that woman’s woman- that mother/sister/she; that unphotographable beauty” (43).
Thus, The Color Purple subverts the concept of beauty as patterned in the fairytale “Briar Rose” and shows how the Black people enjoy their Blackness, take pride in it and display unlimited potential for the assertion of the self and the entire community. It epitomizes the change in the attitude towards the African heritage among African Americans. By substantiating the indigenous existence of the coloured woman, Walker converts the invisible diary of a woman into a visible political document of women’s question and ethnicity.
Yet another idea that Walker subverts is the figure of the hero as the knightly rescuer of the damsels in distress. In “Briar Rose”, the brave and the charming prince comes to awaken the princess from her long sleep. The thorny thickets do not discourage him. He says, “All this shall not frighten me; I will go and see this Briar Rose” (Grimm 39). It was the day on which the hundred years ended and as such, the prince could easily get into the palace. As soon as he sees the sleeping princess, he falls in love with her and kisses her:
The moment he kissed her, she opened her eyes and awoke, and smiled upon him; and they went out together, and soon the king and queen also awoke, and all the court, and gazed on each other with great wonder. (40)
In The Color Purple, Walker substitutes the prince with Shug Avery who is called “Queen Honeybee”. She is introduced as charming as a princely figure: “She got on a red wool dress and chestful of black beads. A shiny black hat with what look like chikinhawk feathers curve down side one cheek, and she carrying a little snakeskin bag, match her shoes” (Walker, CP 42, 44). Shug Avery has proven her bravery by stepping out of the borders defined by the male hegemonic society, which is in a sense a stepping in, an encroachment into the sacrosanct power politics of the male. Celie’s mind that has been already attracted by Shug has transformed itself from thorny thickets to flowering shrubs that Shug could easily enter. The flowering of the plants denotes the changed climate. But unlike the prince in the fairytale, Shug Avery is not all of a sudden enchanted by Celie, it is not an attraction at first sight certainly. In fact, at first she looks at Celie with contempt: “She look me over from head to foot. Then she cackle. Sound like a death rattle. You sure is ugly, she say, like she ain’t believed it”. Their relationship grows through mutual understanding. The attraction that has already started paved the way for Shug’s entrance into the scene of dejection and misery of the soul. The relation with Shug makes drastic changes in the dormant self of Celie. It is with Shug’s help that Celie is awakened to her own sexuality which makes Celie record truthfully: “I thought I had turned into a man”. For Celie, to be able to appreciate her own body is an initiation to the potentials of her own identity. From Shug, she not only obtains the awakened sexuality but also acquires the ability to love herself and others. Until Shug introduces her to the beauty of her body, Celie remains in the wilderness of ignorance devoid of any sense of self-esteem or self-value. Their sexual relation fills Celie with pleasure that she tries to define it in terms familiar to her. Then it is: “Little like sleeping with mama . . . Little like sleeping with Nettie . . . It feel like heaven is what it feel like, not like sleeping with Mr___ at all” (Walker, CP 44, 47,104). Shug becomes a rescue figure of romantic proportions who is bestowed with the capacity to annihilate her totally, or save her forever, ever afterwards. As the fate would have it, the latter course started its influence on Celie so that light entered into the abysmal suffering. Then, Shug becomes every source of encouragement, acceptance and love that she needs in her search for selfhood: “As Celie learns to love Shug, she finds her mother, sister and lost babies within. No longer isolated and full of her remembered relations, Celie begins to experience a sense of wholeness” (Williams 83).
Shug-Celie relationship has been often viewed in a lesbian perspective. According to critics like Nancy Chodorow and Adrienne Rich, lesbian relationships tend to recreate mother-daughter emotions and connections. The first erotic lesbian encounter involves both Shug and Celie in a mutual relationship of trust, sharing and personal enhancement. The unreserved flood of compassion unearths a reciprocal mother-infant relationship that becomes a central part of the sustained relationship between them. Each of them, as Celie says, “act like a little lost baby” (Walker, CP 103). The two women after having mothered each other realize the importance of woman bonding. Feminist psychoanalysts have found that a girl’s identity is similar to her mother’s identity. Showalter in her essay “Feminist Criticism in the Wilderness” says that a girl’s core gender identity is positive and that it is built upon sameness, continuity and identification with the mother. Women “are not required to separate from the mother as they acquire a gender identity; they simply identify with the closest person to them as they grow up, their own mother” (Rivkin 529). With this establishment of mother-daughter relationship, the concept of female bonding has gained momentum in the works of women writers who view the idea as an escape from patriarchy as well. In her relation with Shug, Celie regains the maternal love that had been deprived to her. In breaking the taboo against lesbianism, the two women show an escape from patriarchal law. More than enjoying a lesbian relationship, Celie nurtured an intimacy and affection with Shug and that opens for her a liberated world of the bonding among all women ,and later all human beings to propel her spiritual journey to selfhood.
For Celie, her mother is a metaphor for repressed emotions, memories, wants and desires. Her relation with Shug can be regarded as echoing a desire to return to the ideal mother. This search for the mother leads to Celie’s steady and harmonious spiritual growth that is evolutionary in nature. Shug and Nettie’s interpretations of God serve to demolish the portrait of a paternal God in Celie’s mind and that leads to her introduction to Mother Nature. Through Nettie’s letters Celie realizes how even religion has been thwarted with Eurocentric notions. With the recognition that her belief in God is modeled upon the “white folks white bible”, she starts to have a different notion of God. Shug introduces Celie to the real God, the “It” (Walker, CP 175,176). The awareness of the presence of God inside her, inside others and in the entire Nature leads Celie to the “feeling of being part of everything, not separate at all” (176).This pantheism is also seen in the Olinka tradition of worshiping nature as seen in the roof leaf ceremony.
Apart from her role in Celie’s sexual and spiritual awakening, Shug plays yet another crucial role in Celie’s life by leading her to Nettie. Celie understands the fact that Nettie is alive. Through her further communication with Nettie, Celie comes to know about her lost children Adam and Olivia and learns a more important truth that Pa is not her real father. This knowledge removes the stigma of guilt and incest from Celie’s mind which catalyses her journey to selfhood. Nettie’s letters become the second formative influence on Celie’s life. They help Celie to think of a world beyond her domestic boundary. She gets an awareness of African life and customs. When Nettie writes, “Oh Celie, there are colored people in the world who want us to know! Want us to grow and see the light! They are not all mean like Pa and Albert, or beaten down like ma was”, she is putting on record her optimism and hope. A direct beneficiary of it is Celie as she shares her vision with her. After restoring her self with the help of Shug, Celie could realize outside her domestic world the presence of elements of humanity in the coloured people and the world at large. Celie also comes to know about the oppression women suffer in the Olinka tribe, where “the husband has life and death power on the wife”. The Olinka people cannot accept a wife who knows everything her husband knows and thus women are deprived of education. Nevertheless, there is a sort of relationship among women: “It is in work that the women get to know and care about each other. It was through work that Catherine became friends with her husband’s other wives” (Walker, CP 119,151,150). Thus Nettie’s letters help Celie to have a sense of cultural identity as well as a sense of belongingness to her own community.
Elaine Showalter says that woman’s psyche has always been split into two by her position in the society as the product of a male tradition and at the same time by her desire to be part of a sister’s movement (“Feminist Poetics” 146-55). Women’s culture separates itself from the male tradition and redefines woman’s activities as well as her goals from a woman-centered point of view. The terms Women’s Culture denotes “an assertion of equality and an awareness of sisterhood, the community of women” (Showalter, “Feminist Criticism” 345-46). The concept of a community of women can be dated back to ancient myths and legends. The Graie in Greek mythology are three women who share a common eye. The only eye they possess is the eye of sisterhood that is ultimately stolen for Zeus to get the head of Medusa. Similarly, the nine sister Muses and the three Fates represent women bonding. In India writers like Ashapurna Debi and Lalitambika Antarjanam have emphasized women bonding:
The communities of women which have haunted our literary imagination from the beginning are emblems of female self-suffering which create their own corporate reality, evoking both wishes and fears. (Auerbach 37)
The twelve friendly fairies In “Briar Rose” can be considered as a representation of female community. They “gave all their best gifts to the little princess. One gave her goodness, another beauty, other riches, and so on till she had all that was good in the world” (Grimm 37). Likewise, Celie is empowered by the community of women to which she belongs.
Awareness of her community gained through Shug and Nettie makes Celie love and care the women around her like Sofia, Mary Agnes, Odessa, Henrietta and even Catherine and Tashi. The making of quilt by Celie and Sofia gains significance through its name “Sister’s Choice” (Walker, CP 56). Quilt, which is symbolic of the woman bonding in the novel, becomes a connecting link between Celie and Corrine, the one who adopted Celie’s children. It is through the quilt that Nettie is able to prove her relation to Adam and Olivia, thereby removing Corrine’s suspicion. Through the strength gained through the awareness of her community, Celie is able to attain economic independence through the execution of her creativity. It is Shug, who gives the scissors to Celie introducing her to the new course of life through stitching. Shug takes Celie along with her to Memphis where she is able to start a career as a fashion designer: “With the help of other women she transforms her interest in stitching into a business venture- she stitches pants, wears them, sells them and learns to manage her own life” (Gaur 36)As Celie says, “I am so happy. I got love, I got work, I got money, friends and time” (Walker, CP 194). Within a short span the liberation occurs, within no time the night becomes starlit to break into a new dawn of liberated selfhood.
Thus, the curse that had fallen upon Celie, the thickets that had covered her mind has been removed by the kiss of Shug Avery. Like in the fairytale “Briar Rose”, it is the kiss that literally awakens the sleeping beauty within Celie: “Us kiss and kiss till us can’t hardly kiss no more”. Through an awakening that is sexual, spiritual and creative, Celie is able to identify the beauty and strength within her. The awakening of Celie brings about changes in other women like Sofia and Mary Agnes as well as in the men around, Mr___ and Harpo. They no longer view women as objects, instead they begin to acknowledge women’s equal status as human beings. Later in the novel, when Shug Avery is away, Celie even feels that “Mr___ seem to be the only one understand my feeling”. Mr___ himself says: “I’m satisfied this the first time I ever lived on Earth as a natural man. It feel like a new experience” (Walker, CP 103, 235, 236). Thus, Shug’s influence awakens Celie and like a renaissance it brings the flood of light into the life of every other character, as seen in the awakening of the entire palace in “Briar Rose”. The novel seems to end with the assurance that as the women concerned are contented, everything is all right with the world. The happy family union anticipates many a things to come:
I feel a little peculiar round the children. For one thing, they grown. And I see they think me and Nettie and Shug and Albert and Samuel and Harpo and Sofia and Jack and Odessa real old and don’t know much what going on. But I don’t think us feel old at all. And us so happy. (261)
Through the concept of woman bonding Walker illustrates the truth that in patriarchal culture, women can define themselves only through the kind of female bonding and sympathy developed with other women. She also asserts that the presence of a single emancipated woman can bring about sustained transformations of great significance for the entire community. Ashapurna Debi highlights the same idea in The First Promise:
The shadow-dark waters of a pool in some secluded village overflow in the monsoon to join the river and gush forth in torrents. That same river rushes along, and, one day joins the ocean. We must never forget that initial flowing firth out of the shadows. (Debi 2)
With their mutual love, empathy and shared sense of oppression, the Black women give strength to one another, stand up for one another other and succeed collectively in asserting their own identity in a male dominated capitalist society. The epigraph with which the novel opens, “To the Spirit: / Without whose assistance/Neither this book/ Nor I/ Would have been/ Written” (Walker, CP vii), gains significance in this context. Critics could connect such open statements with the assertions made in the text:
The dedication underlines the fact that the novel, through its women characters, quintessentially represents the collective consciousness of black women- their moments of pain and misery, fear and fortitude, experiences and hopes are cleverly woven into the thematic patterns of the novel. (Gaur 31)
Walker thus gives the story of the sleeping beauty a new dimension by subverting it from a marginalized, and later a magically transformed Black woman’s perspective. The subversion is the real and the only version with reference to a community that largely depends on rewriting or redefining its identity incessantly. Subversion then serves to exist as a quality of defence and attack. It rather sprouts up naturally to women who define themselves unselfconsciously. When women learn to define their proper identity naturally and independently least bothered about the scenario of gender questions, it is time to believe that freedom and equality has been definitely achieved. As it is noted in Celie and Briar Rose, the transformation is so complete, genuine and magical that they are lifted out of the ordinary to accommodate firstly the changes that occurred in them later to move to an inclusive perspective of heightened sensibility.
The novel celebrates Black aesthetics and at the same time openly transacts with the cultural burden of the race that is penalized along with the individual. It is a saga of the sustained transformation of the entire community viewed in a new perspective. In these entire spectra, one could see how brightly Walker’s subversion of “Briar Rose” incessantly focuses on the intense human situation of Celie, her medium in this particular cultural confrontation through the text.
One of the most useful sets of cultural products for establishing cultural motifs and values are children’s stories. According to Jack Zipes, fairy tales are formed in order to civilize the child according to the social order that is prevalent at a particular time. As such, these tales evolve and devolve according to the change in society and social strata. Their significance and function in the society is distorted and redefined so as to suit the needs of the storytellers. In the oral tradition in which they evolved, where the storytellers were matriarchs, the folk fairy tales emphasized the potentials of woman and her community, the equal status that she ought to attain in the society as well as the sexual anxieties in growing girls. When this logocentricism gave way to graphocentricism, where the writers of the text were predominantly men, these tales were thwarted in such a way to reinforce the patriarchal scheme of things. Yet, the subversive codes with which the oral narrators moulded their stories could not be dismantled. Thus, the fairy tales are deconstructed and reconstructed repeatedly in order to meet the changing and challenging needs of the society.
Fairy tales, written down by male writers contain explicit and implicit messages about dominant power structures in the society especially those containing gender race and class. As such, most of these tales reflect the ideals of a royal western androcentric society. It is in such a scenario that the fiction of a Black woman writer like Alice Walker gains its significance. Walker subverts the popular tale of “Briar Rose” in order to challenge the ideals of the White patriarchal society that is capitalist in nature and in turn asserts the identity of her Black woman protagonist:
The Color Purple’s strategy of inversion, represented in its elevation of female experience over great patriarchal events, had indeed aimed to critique the unjust practices of racism and sexism that violate the subject’s complexity reducing her to a generic biological sign. But the model of personal and national identity with which the novel leaves us uses fairy-tale explanations of social relations to represent itself. (Berlant 26)
The story of Briar Rose, the sleeping princess has been subjected to many retellings as in Angela Carter’s “The Lady of The House of Love”, Jane Yolen’s Briar Rose, Carolyn Gage’s The Spindle etc. These writers subverted the fairy tale with diverse intentions such as sexist, political and philosophical. Accordingly, it is interesting to study how the structure and style of the fairy tale have been inverted by the authors to suit their varied needs and goals. The objective linear narration has been replaced by a subjective style, often non-linear, where a juxtaposition of time is brought in through interior monologues. Instead of the idyllic and fascinating world in the fairy story, these writers employ violent, sexual and sometimes gothic imagery in order to bring out the complex social milieu as well as the complex psychic state of the characters. With a subversion of the traditional fairy tale, Alice Walker intends to subvert the capitalist, racist and sexist power structures.
Celie’s transformation from a naïve, ignorant and victimized Black girl to an experienced, independent and active Black woman parallels the princess’ awakening from her long sleep to find fulfillment in love leading to a bright future. In both cases, the awakening is towards self-esteem and an increased awareness of the world, its powerful possibilities. Apart from the many symbols and incidents they share, both The Color Purple and “Briar Rose” have the basic archetypal quest element that leads to a successful conclusion and the assertion of optimistic thoughts. Celie and Briar Rose are in a journey to discover their true self until which they are in a state of slumber, unaware of their potential. The passivity of Briar Rose and the sexual nature of her awakening have corresponding echoes in Celie. The princess is redeemed of her curse with the prince’s loving kiss as Shug Avery’s kiss awakens Celie out of her lethargic state. After placing Celie’s awakening to her identity in parallel to the sleeping beauty’s awakening Walker subverts the important concepts with which Brothers Grimm articulates “Briar Rose”.
Firstly, Walker employs the epistolary form as a means to carry out the subversion to unfold Celie’s inner thoughts and feelings. Walker uses the epistolary form to portray not merely the domestic, personal and romantic life of Celie. In addition, Nettie’s letters take the novel to a more common realm that focuses on the history and tradition of Africa. The epistolary form of narration though it departs from the objective nature of the fairy tale and in itself is a challenge with its medium of vernacular, retains the orality with which fairy tales are narrated. Walker’s subversion of the White man’s standard language with Afro-American vernacular is a bold statement of her creative striving for the expression superiority as well.
Jack Zipes says that due to the Nazi influence, the works of Brothers Grimm became icons of racial purity and excellence. Thus, “Briar Rose” has undertones that assert racial superiority hidden in the deceptively simple content and style. The White beauty concept is a manifestation of the Western prejudices of race and gender reflective of an inner ugliness, a spiritual and moral failure. Walker subverts the Eurocentric beauty concept through the portrayal of the rich African culture, which she claims is far superior to the European culture. By associating Celie with purple flowers, rose etc., she is viewed as a Black beauty and it marks the reorientation of her self in relation to her altered position. The concept of Black beauty itself is a subverted notion in its reference to the Eurocentric norms. Reassuring Celie of her merit and her right, Walker centralizes the African woman and her indigenous existence. Thus, Walker makes a firm statement that Celie is the Black sleeping beauty, a representative of the beauty in the individual woman of colour and the Afro-American race.
Another major aspect that Walker subverts is the figure of the prince charming. Celie is awakened to her sexuality, creativity and identity, not with the guidance of any man but with her intense relationship with Shug Avery, a woman. Shug is substituted as the male rescue hero in The Color Purple. Moreover, the community of women in the novel plays a vital role in Celie’s sexual, artistic and spiritual awakening. The mutual love and respect help every woman character in the novel to realize their potential that in turn gains them a space in the patriarchal society. Through Shug, Celie is empowered which inspires other women to actualize their potential thereby gaining acceptance in a patriarchal society. Shug’s kiss thus awakens not only the sleeping Celie, Celie’s reformation in turn affects the entire community including the men who were blissfully blind to the potentials of women. Thus, by subverting a male rescue figure, Walker points to a universal truth that the presence of a single emancipated woman could bring about self-awareness in other women and this consciousness could in turn create changes in the entire society.
Alice Walker’s tradition of oral narratives, folk and fairy tales has contributed much to the weaving of The Color Purple in the pattern of “Briar Rose”. The strategy of subversion liberates the shackled values and the miserable characters. The modern authors often retrospect on the past with the view to rewrite it in order to explain their message in different terms. Protest could be a marked intention especially in the case of subversion. Then in deceptively simple narrative style, they could connect the past and the present. The author in modern situation thus makes use of the tradition of orality, regenerates a fairy tale to suit his purpose of narrating Celie, Shug Avery and everyone in the marginalized and miserable human situations. Just like the children, the readers could read the fairy tale, to feel a sense of affinity towards the characters and the settings. The Color Purple as a Black feminist retelling of “Briar Rose” acquires more readership since it places the general human situation at the centre. Moreover, the princess and prince are Celie and Shug Avery in the modern Black feminist situation of protest, fight and emergence.
With the thread of a Western fairy story, The Color Purple subverts the Eurocentric concept of beauty, hierarchy of gender, role of the male rescue hero, the expressive authority of the standard language, the ideologically implied meanings, method of narration and the position of indigenous culture in relation to the dominant power structures. The Black Feminist retelling of “Briar Rose” is a bold statement that accommodates all these strains, at the same time a literature of resistance that compromises in the end with an optimistic perspective. The Color Purple is the “Briar Rose’’ regenerated with a purple vision, where sharing the crises of the characters Walker makes it clear that the writer should have definite position and ideology in order to assure freedom to every single human being.
Grimm, Jacob, and Wilhelm Grimm. Grimms’ Fairy Tales. DehraDun: Maple, 2010. Print.
Walker, Alice. The Color Purple.1983. London: Phoenix, 2004. Print.
Allan, Tuzyline Jita. “The Color Purple: A Study of Walker’s Womanist Gospel”. Bloom 119-37. Print.
Auerbach, Nina. “The Communal Eye”. Introduction. Communities of Women: An Idea in Fiction. England: Harvard U P, 1978. Print.
Beauvoir, Simone de. “Myth and Reality of Woman as a Psychoanalytic Being”. Garden of Eve: Feminist Literary Theory and Sigmund Freud. Ed.Poonam Srivastava. Delhi: Adhyayan, 2004.42-71.Print.
Berlant, Lauren. “Race, Gender and Nation in The Color Purple”. Bloom 3-27. Print.
Bloom, Harold, ed. Alice Walker’s The Color Purple: Modern Critical Interpretations. Delhi: Worldview, 2003. Print.
Carter, Angela. The Bloody Chamber. New York: Harper and Row, 1979. Print.
Debi, Ashapurna. The First Promise. [Pratham Pratisruti].Trans.Indira Chowdhury. 1995. New Delhi: Orient Longman, 2004. Print.
Dickinson, Emily. “What Soft Cherubic Creatures”. The Norton Anthology of Literature by Women: The Tradition in English. Eds. Sandra.M.Gilbert and Susan Gubar. New York: Norton, 1996. 866-67. Print.
Gaur, Rashmi. Women’s Writing: Some Facets. New Delhi: Sarup and Sons, 2003. Print.
Gilbert, Sandra, and Susan Gubar. “The Mad Women in the Attic”. Rice and Waugh 155-63. Print.
Gilbert, Sandra. Literary Paternity. 1980.
Handoo, Lalita. “The Son-in-law Story: Gender and Genre”. Prasad 26-37.Print.
Haviland, Virginia. Children and Literature: Views and Reviews. London: Bodley Head, 1974. Print.
Johnson, Yvonne. “Alice Walker’s The Color Purple”. Bloom 205-29. Print.
Klindienst, Patricia. “The Voice of the Shuttle is Ours”. Rivkin and Ryan 612-29. Print.
Kulkarni, Harihar. Black Feminist Fiction. New Delhi: Creative, 1997.
Morrison, Toni. Tar Baby. G B: Vintage, 1997. Print.
---. The Bluest Eye. GB: Vintage, 1999. Print.
Narasamamba, Lakshmi K.V. S. “Voiced Worlds: Heroines and Healers in Muslim Women’s Narratives”. Prasad 70-85. Print.
Padmanabhan, Manjula. Unprincess. New Delhi: Puffin, 2005. Print.
Prasad, Leela, Ruth B Bottigheimer, and Lalita Handoo, eds. Gender and Story in South India. Albany: State U of New York, 2006. Print.
Puri, Usha. Towards New Womanhood: A Study of Black Women Writers. Jaipur: Print well, 1999. Print.
Rice, Philip, and Patricia Waugh, eds. Modern Literary Theory. 1989. 4th edn. London: Arnold, 2002. 146-55. Print.
Rivkin, Julie, and Michael Ryan. “Feminist Paradigms”. Introduction. Rivkin and Ryan 527-32. Print.
---, eds. Literary Theory: An Anthology. 1998. UK: Blackwell, 2002. Print.
Ruthven, K.K. Feminist Literary Studies: An Introduction. GB: CUP, 1984. Print.
Showalter, Elaine. “Feminist Criticism in the Wilderness”. Modern Criticism and Theory.Ed. David Lodge. England: Longman, 1988.330-51. Print.
---. “Towards a Feminist Poetics”. Rice and Waugh 146-55. Print.
Walker, Alice. “In Search of Our Mothers’ Gardens”. Subjects/Strategies: A WRITER’S READER. Paul Eschholz and Alfred Rosa. Boston: Bedford/ St. Martin’s, 1999.103-15. Print.
Watson, George. The Story of the Novel. London: Macmillan, 1979. Print.
Williams, Carolyn, “The Revision of Epistolary Address in The Color Purple”. Bloom 77-88. Print.
Zipes, Jack. Fairy Tales and The art of Subversion: The Classical Genre for Children and The Process of Civilization. London: Heinmann, 1983. Print.
|
In my 15 years of home educating, we have invariably taken at least one trip per year that includes Field Experience. We always plan it on “off months” when most school kids are in school during the day, making the most of time without crowds.
First, what is Field Experience? For most professions, Field Experience is practical application of what a student has learned in the classroom. For us, Field Experience is similar: we study something in the classroom, and then find a way to add a hands-on experience in the field.
Here are some things to consider when planning your field experience:
- Check for school breaks! Look up the school systems in your destination city/area and check for scheduled breaks such as a fall break (some areas have incorporated this break recently), spring break, or any holiday break or teacher inservice day. If your goal is to travel when there won’t be excessive crowds, it is imperative you confirm the local schools will be in session.
- Check your destination; if it is a zoo, museum, etc. make sure they don’t have what are called “free days.” If you happen to hit a location on a free day (like our local zoos and museums are known for) it will be a very busy day. The website will list those free days, but sometimes you really have to click through to find it. Conversely, you might find it rather helpful to visit on a free day (if it applies to out-of-state residents).
- Some historical sites and museums can become rather busy with school groups when in session. We have found afternoons to be the most advantageous, when school groups generally return to the school (2 p.m. and on). We tend to go after lunch and stay later until closing.
- If you plan ahead, you can often be classified as a “field trip” and get the same pricing. Call the museum and ask about home educator pricing.
- PRE-PLAN your lessons. A little preparation goes a long way. The National Parks Service (nps.gov) has an “Education” section for each historical site which includes a “curriculum” section. They sort the lessons by age and grade level, which is very useful. Many museums and zoos also have an education and curriculum section, so take the time to explore the websites and seek out help with curriculum.
- GEOGRAPHY: the best way to learn geography is to visit different places! When we go on road trips, or even a plane trip, we bring blank maps and the students color in the states and write in landmarks. Each of our children also has a book with a page for every state to write notes, and a blank USA map where they color in the state they are visiting. Our children are up to 35 states so far. In addition, when we visit a new state we learn the state flag, motto, bird, flower, Capitol and anything that makes the state unique.
- AUDIO BOOKS: You have a captive audience for 2-10 hours per day; make the best of it and listen to a book together. For our Civil War trip, we are listening to a book about Lincoln, as well as Uncle Tom’s Cabin and Across Five Aprils (though we won’t likely finish them all).
- JOURNAL: Every trip, each of my children get a 3 ring folder with three sections: curriculum, car games, and journal. I have found the less complicated the journal page, the better. The idea is to get children to write, record, and debrief their day. This is a good example of a simple journal page that encourages children to journal: example
- CAR GAMES: Printable car games are the best! We always include battleship, dots, a license plate game, hangman, and some sort of scavenger hunt.
- Always schedule fun! Even though learning is often the goal of our trip, we always incorporate plain fun. For us this includes amusement parks, water parks, and the occasional sweet treat.
- Always remember that each student is learning at a different level. Just BEING at an historical site is enough for the 10 and under crowd, don’t make the visit too much about “school” (they will learn! even if it doesn’t seem like it). For the older crowd, ask questions, get them thinking about what you are learning, and have them write a few things down they enjoyed. The journal section is a great place to write these down.
I will update my tips any time I think of something new. The most important part is the planning, so once you are there, it all just falls into place.
When we visited the Civil War Battlefields near Kansas City, our first day was rainy and dreary. It was the PERFECT backdrop to learn how solemn and difficult the war was, all while learning the facts about the battles at specific sites. Don’t underestimate the impact of just being present on location for your children!
|
We are committed to providing learning environments that promote positive behaviour and relationships where children and adults treat each other with care and respect.
What is Positive Behaviour Support (PBS)?
Positive Behavioural Support (PBS) is person-centred way of working that aims to improve a person’s quality of life. It is a way of working and supporting the person who may at times display behaviours of concern that could challenge others or limit their own opportunities.
Behaviours that challenge always happen for a reason and might be the only way a person can communicate – it can arise for differing reasons that are personal to the individual.
It is important that all are supported to have the right skills and knowledge to use this approach and we hope that these resources will help people to understand the benefits of using Positive Behavioural Support.
PBS Animation – A six-minute animation that summarises PBS
For an ‘introduction to PBS’ video from the British Institute of Learning Disabilities (BILD) click here http://www.bild.org.uk/capbs/pbsinformation/introduction-to-pbs/
- understanding the reasons for behaviours which challenge
- assessing the broad social and physical context in which the behaviour occurs – including the person’s life history, physical and mental health, and the impact of any traumatic life events
- planning and implementing ways of supporting the person which enhance quality of life for both the person themselves and their carers.
It focuses on creating physical and social environments that are supportive and capable of meeting people’s needs, and teaching people new skills to replace the behaviours that challenge.
Plymouth PBS Network provides resources, training and informative links plus offers support and regular meetings. The Devon PBS Network is in its infancy and the aim is to merge with Plymouth PBS to become the South West PBS.
Everyone responsible for, or working with, children and young people in any setting across Devon should review their setting against the ‘Positive Behaviour Support Guidance’ and ensure that they are complying with statutory regulations.
The guidance refers specifically to residential children homes (including homes for children with additional needs), secure children’s homes, alternative providers and special schools (including Independent Specialist Providers), but the principles will apply to all settings whether the provision is in-house to Devon County Council or externally commissioned. It refers to children and young people under the age of 18 years old as defined in the Children Act 1989 and to a person aged 18 or over if they are accommodated in a children’s home as defined in Children Homes (England) Regulations 2015.
Help us improve
Don’t include personal information.
"*" indicates required fields
|
"Dietary calcium and/or supplements have little effect on bone density in regards to increase fracture occurrence". This is awesome news because it means the body regulates the calcium you get to protect you from frail bones and potential fractures but padding down the matrix of your bones over years and years. The British Medical Journal (BMJ) articles concludes that, "Increasing calcium intake from dietary sources or by taking calcium supplements produces small non- progressive increases in bone mineral density, which are unlikely to lead to a clinically significant reduction in risk of fracture." And "Dietary calcium intake is not associated with risk of fracture, and there is no clinical trial evidence that increasing calcium intake from dietary sources prevents fractures. Evidence that calcium supplements prevent fractures is weak and inconsistent."
So if you have a "normal diet, you don’t need to worry about your calcium intake.”? What makes up a normal diet to make sure you have at least the requirements for calcium?... Dairy, we're told over and over again is a good source, but incorporating some dark leafy vegetables that are dense in calcium can be a good way to variety.
Some dark leafy green you can throw into some meals this week: collards, kale, parsley, spinach, beet leaves, & swiss chard.
The other major part of healthy bone density is exercise, specifically weight training. Creating time for at least 1-2 weight-based workouts a week could substantially increase your bone mineral density due to the tug and contractile forces that muscles have on bony attachments. All in all, exercise is a great way to maintain good and healthy bones!
|
Can the song of a small bird provide valuable insights into human stuttering and speech-related disorders and conditions, including autism and stroke? New research by UCLA life scientists and colleagues provides reason for optimism.
The scientists discovered that some 2,000 genes in a region of the male zebra finch's brain known as "Area X" are significantly linked to singing. More than 1,500 genes in this region, a critical part of the bird's song circuitry, are being reported for the first time. Previously, a group of scientists including the UCLA team had identified some 400 genes in Area X. All the genes' levels of expression change when the bird sings.
"We did not know before that all of these genes are regulated by singing," said Stephanie White, a UCLA associate professor of integrative biology and physiology and senior author of the new study. She believes the 2,000 genes at least some of which she believes are also shared by humans are likely important for human speech.
The research is published in the online edition of the journal Neuron, a leading neuroscience journal, and will appear in an upcoming print edition.
"A method that (UCLA co-author) Steve Horvath developed lets us see what genes are changing together and, therefore, which genes are linked in a network," White said. "We can see which are the hub genes that are the most connected to other genes, as in a social network the popular kids. We can also identify the genetic equivalent of the lonely kids. Steve's analysis lets us group the genes together and see who is interacting with whom."
Many more genes are involved in vocalization than scientists had previously known. While language is uniquely human, it has components such as the ability to create new sounds that songbirds and other animals share with us. The zebra finch may create new sounds using the same genes as humans, said White, who is also a member of UCLA's Brain Research Institute.
Male zebra finches learn to sing a courtship song between 35 days and 100 days after hatching, at which point they are sexually mature. Area X is located in the male finch's basal ganglia, beneath the brain's cortex. Only males have the full set of circuitry that allows them to mimic sounds. Female zebra finches don't learn the courtship song and don't have a brain region similar to Area X. Humans don't have an Area X either.
"In your brain, I know that the basal ganglia is involved in your speech, but I don't know exactly which cells," White said. "If I knew which cells, I could see what the genes are. We can't do that in humans, but we can in zebra finches and we have."
Two genes that seem to be especially important are FoxP2, a "master gene" that directs many other genes to turn on and off and which is critical for both human speech and birdsong, and reelin, a gene that is suspected of causing autism susceptibility in humans. Autistic children often have language difficulties. Both reelin and FoxP2 may play a critical role in human speech and speech disorders.
"No one had ever thought that reelin has a role in vocalization," White said. "We have now found that it is likely important for vocal learning."
A study published in 2001 revealed a single mutation in FoxP2 in each member of a family in England with a severe speech disorder. Over four generations, half the members of this family had the speech and language disorder, and each of these family members had the mutation. Those family members without the disorder didn't have the mutation.
Recent neuroscience research has provided insights into the connection between the brain and our behavior, including the ways in which our behavior can influence gene expression.
"Everybody knows the brain controls our behavior, but in neuroscience, more recently, we have been learning that our behaviors also control our brain and change the way our brain operates," White said. "If you're a professional pianist, for example, you actually expand the territory in your brain that is devoted to playing the piano. When you practice the piano, a suite of genes gets turned on. When you practice hitting a tennis serve or a baseball, a suite of genes gets turned on. Our findings suggest different suites of genes get activated for different behaviors.
"How does behavior change the brain? One way is by changing the expression of genes. A specific behavior can activate many, many genes. How we behave can, over time, actually change genes in our brain and affect how we subsequently behave."
White's laboratory showed in earlier research that when adult male zebra finches sing, there is a dramatic decrease in the amount of FoxP2 in Area X.
In the current study, Julie Miller, a UCLA assistant researcher in integrative biology and physiology who conducts research in White's laboratory, let 27 male zebra finches sing as much as they wanted (18 of them sang) for two hours in the morning an activity that reduces FoxP2.
She then removed Area X from the zebra finches' basal ganglia. She also removed the tissue next to Area X, which is still part of the basal ganglia and contains the same genes but is not important for singing; this tissue is involved in movements such as flying and perching.
Miller and Austin Hilliard, a graduate student in UCLA's neuroscience interdepartmental program who also conduct research in White's lab, then studied whether the same genes were changing in Area X and in the other tissue. Genes can be "on" or "off," but there are degrees, like with a light dimmer, White noted.
"You ask, 'Is it the same suite of molecules going up and down when the bird sings as when the bird hops?' The answer is no; they are very different," White said. "We know exactly what neurons are controlling this behavior. We can isolate them."
Overall, the scientists studied 20,000 genes in Area X (to determine which genes are involved in song) and outside of Area X (to learn which genes are involved in flying and perching).
"When we looked across the two parts of the basal ganglia Area X, which is important for song, and just outside of Area X, which is important for other behaviors we saw surprisingly similar overall levels of gene expression," White said. "There was no significant difference. It was just how those genes are changing relative to one another that was different."
There are approximately 9,000 species of birds, approximately half of which are songbirds. Dolphins, elephants and some bat species also mimic vocalizations, White said.
There are important similarities between the human brain and the songbird's brain.
"I'm very interested in human behavior," White said, "but humans are too complicated to study rigorously at the cellular and synaptic level. To study problems of speech, we need a model that specializes in learned sounds, like the songbird."
In future research, White's laboratory will study the role of reelin in the zebra finch and in mice. She and her colleagues will also continue to study FoxP2. She also plans to study hundreds of genes that move together.
|Contact: Stuart Wolpert|
University of California - Los Angeles
|
Chocolate is an indigenous South American food. Traditionally, the bean of the cacao tree was brewed with hot water, producing a bitter drink often mixed with dried chili peppers. Adding sugar to create the hot chocolate that is drunk today, and adding fats to create chocolate candy, occurred in Europe in the 16th and 17th centuries. Chocolate can create a sensation of well-being and alertness, but it can also cause migraine headaches in some people.
Video of the Day
Tyramine and Phenylalanine
Dark chocolate contains the chemical tyramine, which has been found to trigger migraine headaches in the majority of migraine-prone subjects tested in some studies, according to the Clemson University Extension. Phenylalanine, another component of chocolate, has been shown to trigger migraines in about half the migraine-prone subjects in another field study, according to the University of California Nutrition Bytes. Additional studies on both of these chemicals have yielded variant, inconclusive results. Keeping a food diary to determine personal migraine triggers may be a more effective strategy than simply eliminating foods like chocolate from consumption, according to Harvard Health Publications editor Christine Junge, as triggers seem to vary considerably from person to person.
Over-consumption of caffeine may trigger migraine headaches in some individuals, according to MedlinePlus. Chocolate does contain caffeine, as well as the stimulant thobromine, but only in very small amounts. One ounce of milk chocolate has approximately the same quantity of caffeine as a single cup of decaffeinated coffee, according to the California Academy of Sciences. A person would have to eat more than 12 chocolate bars to consume the same quantity of caffeine as in a single cup of coffee, according to the University of Washington Neuroscience for Kids project. For caffeine sensitive individuals, this small amount of caffeine might trigger a headache, while regular consumers of caffeine might experience a headache if they miss their regular doses of coffee or chocolate.
Eating chocolate triggers the brain to release natural opiates that dull pain and produce a happy feeling of well being, according to the Washington State University Neuroscience for Kids project. Anandamide, also a chemical component of chocolate, encourages the release of dopamine, another naturally occurring substance in the body that creates feelings of happiness. Chocolate also increases the brain's serotonin and endorphin levels. Although these chemicals are only present in very small amounts in an ordinary serving of chocolate, the positive sensations caused by dopamine and opiates released from eating chocolate may actually bring relief from minor headaches, especially those caused by tension and anxiety.
Chocolate is one of the richest food sources of antioxidants, nutritional compounds that help the body fight off free radicals that damage cells. Cocoa powder and dark chocolate contain more antioxidants per serving that fruit, green tea or red wine, according to the Clemson University Extension. Eating small amounts of dark chocolate can lower high blood pressure, increase blood vessel elasticity, and help to regulate blood sugar. While most chocolate candy contains high amounts of fat and sugar, which are detrimental to consume in large quantities, consuming dark chocolate, which is lower in fat and sugar, in modest amounts can be beneficial to cardiovascular disorders that may also contribute to headaches.
- University of Washington Neuroscience for Kids: Discovering the Sweet Mysteries of Chocolate; Ellen Kuwana; October 1, 2010
- Clemson University Extension: When It Comes to Chocolate, Choose Dark; Janice G. Hunter et al.; April 2008
- California Academy of Sciences: Chocolate Health Facts
- MedlinePlus: Managing Migraines at Home
- Institute for Quality and Efficiency in Health Care:; Fact Sheet: Migraine Information for Children and Teenagers; December 17, 2008
- Harvard Medical School Health Publications: Food and Migraine: A Personal Connection; Christine Junge; April 5, 2011
- University of California Nutrition Bytes; The Dietary Migraine: How Food Can Cause Headaches
|
Most civil and criminal decisions of a state or federal trial court (as well as administrative decisions by agencies) are subject to review by an appeals court. Whether the appeal concerns a judge's order or a jury's verdict, an appeals court reviews what happened in prior proceedings for any errors of law. This means losing parties can't appeal a case just because they're unhappy with the outcome; they may only challenge decisions that may have resulted from errors, such as a misinterpretation of legal precedent or reliance on evidence that should have been excluded.
If you're appealing a court decision or judgment, you'll want to get a handle on how the process works. The following is an overview of court appeals.
The Basics of Appealing a Court Decision
If the court finds an error that contributed to the trial court's decision, the appeals court will reverse that decision. The lawyers for the parties submit briefs to the court and may be granted oral argument. Once an appeals court has made its decision, the opportunity for further appeals is limited. As the number of parties filing appeals has risen substantially, the state and federal court systems have implemented changes in an effort to keep up.
Trials vs. Appeals
A trial and an appeal have a few similarities, but also many important differences.
Trials at a Glance:
At trial, the parties present their cases, calling witnesses for testimony and presenting other pieces of evidence, such as documents, photographs, reports, surveys, diaries, blueprints, etc. The jury weighs this evidence and determines the facts of the case, that is, what they believe actually happened. A jury is therefore sometimes referred to as the "finder of fact."
The judge controls the activities in the courtroom and makes all the legal decisions, such as ruling on motions and on objections raised by the attorneys. The judge is often called the "finder of law." If the parties have chosen a bench trial, rather than a jury trial, the judge will make both findings of fact and findings of law.
Appeals at a Glance:
An appeal is a review of the trial court's application of the law. There is no jury in an appeal, nor do the lawyers present witnesses or, typically, other forms of evidence. The court will accept the facts as they were revealed in the trial court, unless a factual finding is clearly against the weight of the evidence.
Another difference between a trial and an appeal is the number of judges involved. A single judge presides over a trial. An appeal, however, is heard by several judges at once. How many depends on the jurisdiction. At the initial appeals court level, courts may have from three to a few dozen judges.
Yet on the larger courts, the full number of judges seldom hear claims together. Instead, appeals are typically heard by panels, often comprised of three judges. In rare instances, the full court may decide to grant a motion for rehearing "en banc," when all the judges on the appeals court hear the case together and issue a new decision. Supreme Courts, at the state and federal level, have from five to nine judges, referred to as justices.
The main form of persuasion on appeal is the written appellate brief, filed by counsel for each party. With this brief, the party that lost in the trial court will argue that the trial judge incorrectly applied the law. The party that won below will argue that the trial court's decision was correct. Both parties will support their positions with reference to applicable case law and statutes.
An appeal is a more scholarly proceeding than a trial. Whereas the litigator must be an active strategist in the courtroom, calling witnesses, cross-examining, and making motions or objections, the appellate lawyer builds his or her case in the brief, before the appeal is heard. Appeals often include a short period for oral argument, but the judges often consume this period with questions for the attorney, prompted by the briefs.
The "Record" on Appeal
Appeals court decisions turn on the record, which documents what happened in the trial court. The record contains the pleadings (plaintiff's complaint and defendant's answer), pre-trial motions, a transcript of what occurred during trial, the exhibits put into evidence, post-trial motions, and any discussion with the judge that did not take place "off the record." The success of an appeal therefore depends on what occurred at trial. If an attorney failed to get critical, available evidence into the record, or to object to something prejudicial, the opportunity to do so is lost.
After Appealing a Court Decision
The party that loses in a state or federal appeals court may appeal to the state Supreme Court or the U.S. Supreme Court. (Most states call their highest court "Supreme Court," though Maryland and New York call theirs the "Court of Appeals.") Review in these courts, however, is discretionary with the court. Because these courts receive many more requests for review than they can handle, they typically grant review only to cases involving unsettled questions of law.
Also, the U.S. Supreme Court can only review cases that raise some federal or constitutional issue; cases that concern state law exclusively are beyond its jurisdiction. At this point, the parties have already had the case reviewed once, reducing their tendency to see the decisions as biased or contrary to law.
Get Professional Help Appealing a Court Decision or Judgment
The appeals process is very complex and requires the expertise of an attorney specializing in filing and arguing appeals. Even if you've worked with an attorney for your trial, you'll want to contact a specialist for your appeal. Get started today and contact a litigation and appeals attorney near you.
|
Homegrown: Green Peas
More recipes: Recipes with Fresh Peas
While still awaiting New England’s leafy greens and brimming farmers’ markets, you can taste the season’s warmth with the arrival of crisp and crunchy spring peas.
You can plant this fast-growing, cool-weather legume (Pisum sativum) as soon as the soil is workable.
The young plants will start popping up in late May in Connecticut and will make their way to Maine by late June to early July. “Peas are one of the earlier spring crops, a harbinger of the good foods to come,” says chef Jonathan Rapp, owner of River Tavern in Chester, Connecticut (860-526-9417; rivertavernchester.net).
Three major types grow well in our part of the country: garden (a.k.a. “green,” “English,” or “shell”) peas (long, thin, tough, typically inedible pods, hiding the round, firm globes inside); snow peas (with thin, edible pods); and sugar snap peas (a cross between the other two, with thick, sweet, crunchy pods that are edible before they mature). The best way to enjoy them is right off the vine. For cooking, Rapp recommends “fresh peas–if they’re not fresh, they can be too starchy.”
Wild peas likely originated in the Middle East or Central Asia before 9000 b.c. and then migrated east toward China; soon they were cultivated, and by the Middle Ages they were also grown extensively throughout Europe. They most likely made their way to New England with the original colonists. Rich in vitamins (including A, B complex, C, and K) and minerals (such as manganese, phosphorus, magnesium, copper, and iron), peas are also a great source of protein, making them a delicious substitute for meat in many vegetarian dishes.
Best of all, fresh peas are remarkably easy to prepare. Shelled garden peas can be steamed, blanched, or pureed. “English peas are great served with gently poached fish, such as flounder, or in a lemon cream sauce for pasta, or pureed as soup with tarragon,” Rapp notes. “Fresh pureed peas are also especially good as a sauce with chicken and tarragon.” Snap peas are a filling snack, either raw or steamed, while snow peas work well in stir fries. Both are excellent in salads, too. Just the thing to banish the chill and welcome spring’s renewal.
How to Shop for fresh Peas
Because they start losing flavor as soon as they’re picked, you want peas to be as fresh from the vine as possible. At your local market, ask for a taste; look for a sweet, crisp bite. Keep an eye out for yellow pods, which indicate peas that are past maturity.
Please Note: This information was accurate at the time of publication. When planning a trip, please confirm details by directly contacting any company or establishment you intend to visit.
|
In a radical nephrectomy, the whole kidney is removed. In a partial nephrectomy, only the diseased piece of the kidney is removed.
Reasons for Procedure
Kidney removal may need to be done because of:
- Birth defects
- Injuries to the kidney
- Kidney cancer
- Kidney donation for a transplant
Problems from the procedure are rare, but all procedures have some risk. Your doctor will review potential problems, like:
- Blood clots
- Damage to nearby organs
- Reactions to the anesthesia
- Leakage of urine from the remaining kidney tissue, if only part of the kidney is removed
Long-term complications from decreased kidney function may include:
Before your procedure, talk to your doctor about ways to manage factors that may increase your risk of complications, such as:
What to Expect
Prior to Procedure
Your blood type is checked. This is done in case a blood transfusion is needed before or after surgery.
Talk to your doctor about your medications. You may be asked to stop taking some medications up to one week before the procedure.
Do not eat or drink after midnight before the procedure. You may need to take medication to cleanse your bowels.
General anesthesia will be used. You will be asleep during the procedure.
Description of Procedure
A tube called a catheter will be inserted into your bladder. An incision will be made in the abdomen or side of the abdomen. A rib may need to be removed to access the kidney. The tube from the kidney to the bladder is known as the ureter. If the whole kidney is being removed, the ureter and blood vessels will be cut before kidney will then be removed. If only part of the kidney is removed the ureter and blood vessels will be kept. The incision will be closed.
Laparoscopic surgery may also be used for a nephrectomy. The abdominal cavity will be inflated with gas. Several keyhole incisions are made in the area. A laparoscope, a long tool with a camera on the end, will be inserted through one of the holes. This allows the doctor to see inside you. Tools will be inserted through the other holes to perform the surgery. The same steps will be used to detach the kidney. A small incision will be made to remove the kidney.
How Long Will It Take?
Between 2-4 hours
How Much Will It Hurt?
Anesthesia will prevent pain during surgery. Pain and discomfort after the procedure can be managed with medications.
Average Hospital Stay
The typical hospital stay after a nephrectomy is 2-7 days. The exact length depends on the type of surgery. Your doctor may choose to keep you longer if complications occur.
IV fluids and pain medication will be given after surgery. Blood pressure, electrolytes, and fluid balance will all be carefully monitored to evaluate kidney function. A urinary catheter is often needed for a short time following surgery.
You will be encouraged to move around and be cautiously active as symptoms allow.
During your stay, the hospital staff will take steps to reduce your chance of infection, such as:
- Washing their hands
- Wearing gloves or masks
- Keeping your incisions covered
There are also steps you can take to reduce your chance of infection, such as:
- Washing your hands often and reminding your healthcare providers to do the same
- Reminding your healthcare providers to wear gloves or masks
- Not allowing others to touch your incision
Call Your Doctor
Contact your doctor if your recovery is not progressing as expected or you develop complications, such as:
- Signs of infection, including fever or chills
- Redness, swelling, increasing pain, excessive bleeding, or discharge from the incision site
- Persistent nausea and/or vomiting
- Pain that you cannot control with the medications you were given
- Difficulty urinating
- Sudden weakness
If you think you have an emergency, call for medical help right away.
- Reviewer: Donald Buck, MD
- Review Date: 03/2016 -
- Update Date: 01/23/2014 -
|
National Liberation Army
To avoid involvement in the war, the National Liberation Army, the military wing of the People's Mojahedin, evacuated its bases in north and south Iraq and moved all its forces to Diyala Province, in the east central area. The Mojahedin also halted its radio and television broadcasts and stopped all publications.
Iran's mullahs eagerly watched events unfold from the sidelines, as two of their main enemies, the United States and Iraq, prepared for war.
When Saddam refused to withdraw his troops from Kuwait by January 15, 1991, Coalition Forces launched an aggressive air campaign. Weeks later, armored divisions based in Saudi Arabia thrust into Iraq while other forces charged into Kuwait to liberate the country.
Iraqi troops were overwhelmed by the massive show of force and superior coalition military technology. Saddam's troops in Kuwait abandoned their positions and retreated to Iraq. The withdrawing convoy was caught in the open and destroyed by air attacks. Coalition armored divisions continued their push toward Badhdad, reaching about 150 miles from the capital city, when a halt was called to further fighting and Kuwait declared liberated.
NLA's strategy to avoid involvement in the war proved successful. Its forces remained undisturbed and never engaged in any fighting. When Kurdish factions began to rebel in early March, the Mojahedin dispatched messages to the Kurds that it sought to avoid any hostilities and would remain inactive unless attacked. Their only aim, they reiterated, was the overthrow of Iran's mullahs.
The Mojahedin announced publicly on March 14 that it had obtained intelligence on members of the Iranian Revolutionary Guards Corp (IRGC) amassing along the border of Iraq in preparation for an attack.1 Days earlier, Iran's President Hashemi Rafsanjani had visited the area to inspect the military operations.
Soon thereafter, the IRGC infiltrated Iraq and killed a member of the NLA, and wounded several other soldiers The NLA mounted a counterattack in response.3
In the next engagement, the NLA defended against strikes by Revolutionary Guards in Jalula, Iraq, about 80 miles northeast of Baghdad, and at Kirfi, to the north.4 Iranian forces attacked with Katyusha rockets and, at one point, surrounded an NLA base.
The following day, Iranian Guards crossed into Iraq in at least 14 separate locations along the border.5 In numerous skirmishes, 20 NLA soldiers were wounded and eight were killed.6 In an attack on the 23 of March there were 40 NLA casualties and three comrades went missing in action.7
The Revolutionary Guards launched another offensive against the NLA on March 25. Fighting stretched from Khaneqin, an Iraqi border town, to Kifri.8 The NLA counterattacked, successfully reclaiming lost ground.9 Worried the NLA might break through its lines, the Revolutionary Guards mobilized the 73rd Kashan Brigade from Tehran for reinforcements.
The next battle began at 6:00 pm on March 31. Revolutionary Guards slipped into Iraq near Qasr-Shirin and then attacked the NLA at 1:30 am along four axes. Hostilities lasted for 18 hours, with NLA forces smashing the offensive.10 Iran's Pasdaran suffered many casualties and the following day retreated, licking their wounds.
During the attacks by the Revolutionary Guards, the NLA captured six Iranian soldiers who "wore Kurdish dress."11 The NLA handed them over to the International Commitee of the Red Cross, which confirmed the "Iranian regime was trying to recruit Kurds to fight the NLA."12 A later investigation by the United Nations also concluded the mullahs "sought to hire Iraqi Kurds to fight against the NLA."13
A small group of NLA soldiers evacuating a military base was attacked on March 11 near Tuz, a city south of Kirkuk, by Iraqi Kurds under the leadership of Jalal Talebani, the head of the Patriotic Union of Kurdistan (PUK). In the skirmish, NLA commander Reza Karamali was killed and several others wounded. Later two other NLA members were ambushed near their base by forces loyal to Talebani.
At the time, Iran's mulllahs were giving support to the PUK, providing weapons and financial assistance.14 The mullahs also supported the rebels in south Iraq during the uprising, hoping the insurrections would topple Saddam, opening the way for the establishment of a fundamentalist Islamic republic.
While the NLA was engaged in defending against the IRGC's offensive of 25 March, a platoon of 19 NLA members, traveling in four armored vehicles, lost contact with the main force. "The group lost its way in the unfamiliar terrain, and mistakenly advanced several kilometers toward the city of Kelar, where they were captured by members of the Talebani group and Kurdish Hezbollah (a proxy group of the Iranian regime."15 Seventeen of the NLA soldiers were executed by the Talebani and two others - Hassan Zolfaqari and Beshar Shabibi - were handed over to Iran's mullahs and later also murdered.
Talebani claimed in a press release on March 25 that "More than 5,000 mercenaries of the Mojahedin are being prepared and supplied with tanks to lead a ground war" to retake Kirkuk.16 The Mojahedin issued a statement declaring the allegation by Talebani to be a "blatant lie."17 At the time, the NLA was fully engaged in defending against attacks by Iran's Revolutionary Guards.
Close Relations With Kurds
The Mojahedin have long had close relations with the Kurds in Iraq and Iran. Talebani expressed his support for the Mojahedin in a 1984 letter to Massoud Rajavi, the head ofthe PMOI. Talebani stated:
"Honorable and dear brother Massoud Rajavi, on behalf of the Patriotic Union of Iraqi Kurdistan (PUK) politburo, I would like to express my greeting and very best wishes to you and other Mujahedin brothers in your struggle against the reactionary zealots who rule in Iran....We are therefore always ready to strengthen our good relationship with the People's Mujahedin Organization of Iran."18
The Mojahedin enjoyed close relations with the Kurdish Democratic Party (KDP), the other major Kurdish party in northern Iraq led by Massoud Barzani, and Kurds in Iran, who were persecuted by the mullahs and allowed the Mojahedin to set up bases in the north western area. In 1983, the PMOI formally adopted a plan supporting autonomy for Kurds in Iran.
Given its longstanding relations with the Kurds, the Mojahedin would not have attacked them. The Mojahedin was fully aware the PUK skirmishes - and false propaganda - were carried out at the direction of the mullahs as a requirement to obtain continued support. The PUK later recanted its allegations. (See Kurdish Democratic Party on the site's menu.)
On March 29, while the NLA was involved in battles with the Iranian Revolutionary Guards, Saddam's forces retook Kirkuk.
1) "Saddam's Forces Reportedly Set Kirkuk Oil Wells on Fire," UPI, March 14, 1991.
2) "What Lurks in the Middle East," Christian Science Monitor, March 21, 1991.
3) "Mojahedin-e Khalq Claims 100 Members of the IRGC Killed in Western Iran Attack," BBC Summary of World Broadcasts, Voice of the America in Persian (March 14, 1991), March 16, 1991.
4) "Iraqi Troops Reportedly Retake Towns, Heavy Fighting Continues," UPI, March 17, 1991.
5) "Army Offensive Repelled, Iraqi Opposition Says," Washington Post, March 19, 1991.
6) "Iranian Rebel Group Levels Charges at its Government,"UPI, March 21, 1991.
7) "Opposition Trains on Plains of Iraq to Topple Iranian Rulers," Associated Press, May 8, 1991.
8) "Saddam's Forces Use Planes, Helicopters to Attack Kirkuk," UPI, March 25, 1991.
9) Iranian Mojahedin-e Khalq Claims 'Large-Scale' Retaliation for Iranian Attack," BBC Summary of World Broadcasts, Hashimite Kingdom of Jordan Radio (March 15, 1991), March 27, 1991.
10) "Iranian Opposition Describes Battle in Iraq," Associated Press, April 4, 1991.
11) "Written Statement Submitted by International Educational Developments, a Non-Governmental Organization on the Roster," Economic and Social Council, Commission on Human Rights, United Nations. Document E/CN.4/Sub.2/1995/NGO/55, August 22, 1995.
14) "Iranian Rebel Group Levels Charges at its Government," UPI, March 21, 1991.
15) "Democracy Betrayed; A Response to U.S. State Department Report on the Mojahedin and the Iranian Resistance," National Council of Resistance, Foreign Affairs Committee, March 15, 1995.
16) "UN Allies Urged to Save Rebels," The Guardian, March 26, 1991.
17) "Kurdish Leader Returns; Vows Fight to Free All Iraq," Associated Press, March 26, 1991.
18) "Enemies of the Ayatollahs," by Mohamad Mohaddessin, Zed Books, London, New York, 2004.
|
Los Angeles, Calif., May 22, 2011Some men of African descent may have a higher genetic risk of developing prostate cancer, according to research conducted at the Keck School of Medicine of the University of Southern California (USC).
The genome-wide association study, published in the journal Nature Genetics on May 22, determined a marker of risk for prostate cancer in men of African descent, who tend to more susceptible to prostate cancer than men of non-African descent. The research team was led by Christopher Haiman, ScD., at the USC Norris Comprehensive Cancer Center and Hospital, part of the Keck School.
"This is a novel risk locus for prostate cancer, and the first study of its kind conducted in men of African ancestry," said Haiman, associate professor in the Keck School Department of Preventive Medicine. "We have been trying to figure out why African American men have a greater risk for prostate cancer. These findings may help us better understand if there is a genetic contribution to disparities in risk for this common cancer."
The research looked at common risk alleles for prostate cancer in men of African descent to determine a possible reason for the high incidence of prostate cancer in this population. The research focused on approximately one million single nucleotide polymorphism (SNP) markers across the genome of 3,425 African-American men with prostate cancer and 3,290 African-American male controls. The research turned up a novel risk variant on chromosome 17q21. The frequency of this marker is 5 percent in men of African ancestry but is rare in other populations.
The discovery builds on findings several years ago by Haiman's team of a risk region on chromosome 8q24, which also contains clues as to why more men in this population are likely to develop prostate cancer.
The findings support the need for additional genome-wide investigations to locate risk markers that are common or rare, which may play a role in racial and ethnic disease disparities, Haiman said.
|Contact: Leslie Ridgeway|
University of Southern California
|
Within a climate context was last October just an average October and, to coin a phrase, there was nothing to write home about, or is it another data point in the ongoing climate change story?
We now have some data we can get our teeth into.
In the US
We don’t get the full national October data from NOAA until 12th November, and their global October data is still also being crunched, but we do now have some preliminary insights …
This is the summary …
The average temperature for October across the contiguous U.S. was 52.3 degrees F (1.8 degrees below the 20th-century average), making it the coolest October since 2009. It ranked in the lowest third of the 125-year record.
… and so that’s it then, Climate change is over and we are back to normal.
Oh but wait …
Alaska had an average October temperature that ranked in the warmest third of the historical record. Below-average temperatures were present from the High Plains to the Pacific Coast, while above-average temperatures blanketed the eastern third of the country.
The average precipitation last month across the contiguous U.S. was 3.14 inches (0.98 of an inch above average) and ranked as the eighth wettest October on record.
Year to date | January through October 2019
The bigger picture, obtained by taking a data sample for the entire year and then comparing that to all of the recorded data yields this insight …
The average U.S. temperature for the year to date (January through October) was 55.5 degrees F, (0.5 of a degree above the 20th-century average), ranking in the warmest third of the record.
Yes indeed, it is win win win, the US is in the top 3 … except of course that’s not exactly a win is it.
We should also not forget that this is going on.
Fires blaze across California: Large and lethal wildfires scorched parts of Northern and Southern California during October and some remained active at the beginning of November.
On A Global Scale
While NOAA might still be crunching their data, ECMWF (the European Center for Medium Range Forecasting) have published their October global insights.
Globally, October was 0.69°C warmer than the average October from 1981-2010, making it by a narrow margin the warmest October in this data record. Europe generally saw above-average temperatures, with the exception of most of the north and north-west of the continent. Temperatures were much above average in large parts of the Arctic, while much of western USA and Canada experienced much below average temperatures.
Here is an illustration of this global picture for October. The blue bits are below average and the orange/red bits are above average …
If you lived in a blue bit then you might indeed think climate change was done and dusted.
If you had a specific conclusion, such as the idea that climate change is a Chinese hoax or similar and you were a card carrying member of the GOP hence such a belief is part of your identity, then it is possibly to cherry pick bits of data to backup that conclusion.
The problem with that approach is that all you have done is to delude yourself. For any explanation of an observation, you need to be able to explain all of the data, and not simply the bits you take a fancy to.
The CO2 400 ppm Minimum
Not too long ago we breached the 400 ppm for CO2 within our atmosphere. Today that 400 ppm measurement is gone and not even visible within our rear view mirror.
The bottom line is this.
As long as CO2 levels continue upwards like this …
Then it is inevitable that global temperatures will also continue upwards like this…
Some might indeed argue about this.
Their argument is not with the scientific community but rather is with the laws of physics.
That’s not an argument they can ever win because the brick wall of reality is not fooled by cherry-picked data.
|
(Science: zoology) a small European rodent (Cricetus frumentarius). It is remarkable for having a pouch on each side of the jaw, under the skin, and for its migrations.
a common Name used to describe a subfamily of the muridae. Four of the more common genera are cricetus, cricetulus, mesocricetus, and phodopus.
All hamsters are seed and plant feeders, store food, hibernate in winter, and breed throughout the year under laboratory conditions.
Origin: g. Hamster.
|
(3) 1. GREGORIO (?-741)
Birth. (No date found), of Syrian origin. Son of Iohanne. He probably belonged to one of the families which had gone to Rome from the East following the occupation of the provinces of the Byzantine Empire by the Arabs.
Education. He knew both Latin and Greek and his knowledge of the psalms and his ability of the liturgical celebrations was praised in his biography in the Liber pontificalis. Two sources say that he was a Benedictine monk (1).
Priesthood. He was probably ordained in Rome for the church of S. Crisogono, to which he devoted particular attention when he became pope.
Cardinalate. Presbyter cardinalis of the title of S. Crisogono in 726.
Papacy. His election, unanimous, took place by a spontaneous initiative of the nobility and the Roman people, while he was paying homage to the coffin of his predecessor. He was consecrated on March 18, 731. Took the name Gregory III. The new pope was elected at a time when the conflict with the Byzantine emperor Leo III because of the question of image worship was very much alive. Emperor Leo III immediately gave his approval and hoped to have to deal with a more conciliatory pope than his predecessor Pope Gregory II. The new pope instead responded with very precise letters confirming his adherence to the conduct of his predecessor and in a tone so sharp that the nuncio in charge of delivering them, the priest George, did not dare to fulfill his mission and returned to Rome trembling with letters not delivered; and when, threatened with deposition by the pope, the legate undertook the journey to Constantinople, he was held in Sicily by the imperial officials, who seized the papal letters; the papal legate remained in prison for a year and when released, he was ordered to return to Rome.The pope then called a council which took place on November 1, 731 in St. Peter's basilica. In addition to the Roman clergy, Patriarch Antonio of Grado Antonio and Archbishop Giovanni of Ravenna, that is the highest prelates of the Byzantine provinces in Italy, took part with other ninety-three bishops from the "parts of Esperia", a term in papal documents of those years which meant the West in general. The council sanctioned, it appears for the first time in canonical form, the orthodoxy and the antiquity of the worship of images of Christ, the Virgin and all the apostles and saints, decreeing excommunication and expulsion from the universal Church for anyone who destroyed, desecrated or insulted the sacred images. The synodal constitutions were sent to Constantinople by the pope, but again the messenger, this time defensor urbis Costantino, was arrested in Sicily and the documents seized, as were seized the petitions sent by all peoples of the Byzantine provinces in Italy to Emperors Leo III and Constantine V, his son, asking for the restoration of image worship. Emperor Leo III did not want messages and messengers on religious matters, because he realized that could they could discredit him in the eyes of his subjects as a faithful Christian and therefore as emperor. The pope, however, managed to have exhortative letters defining the orthodox faith and urging the restoration of icons reach Constantinople. Meanwhile, Pope Gregory III took another initiative of great symbolic significance, by building inside the basilica of St. Peter an oratory in honor of the Savior, the Mother of God, of all the martyrs and confessors, in which he instituted a liturgical office. The intention of the pope was the foundation be a shrine of the cult of saints in opposition to the Byzantine emperor's impiety. Gregory made special provisions for the liturgy of this holy place, and entrusted it to three monasteries located in the area of St. Peter's (Giovanni e Paolo, S. Stefano Maggiore and S. Martino) by a synod held in Rome on April 12, 732, which deliberations were recorded on three slabs of marble and placed in the oratory. Particularly significant was the fact that the acts of the synod were not dated with the years of the reigning emperor, as would have been the usual protocol, thus expressing the excommunication of the monarch. The determination with which Gregory proceeded to condemn iconoclasm is new in comparison to the behavior of his predecessor, Pope Gregory II, who had complained about the heretic character of the destruction of images and repeatedly warned Leo III to renounce it, though without ever reaching excommunication. The Eastern origin of Pope Gregory III may have made him particularly sensitive to the religious and devotional aspects of the matter; it is true hat the pontiff certainly promoted the worship of images in Rome also having made numerous images of Christ, the Virgin and the saints, often coated with precious metals, which he placed in the major basilicas.
For the emperor, what was ruled from Rome had to be ignored in the East: his iconoclastic policy was not to be disturbed. If the policy had not secured the conversion of the Jews, it made conciliatory relations with the Arabs. And then there was always the unfinished business with the Church of tax payments. Emperor Leo III resolved the issue with a coup, confiscating all ecclesiastical estates in Sicily and Calabria, which brought in annually 35,000 pieces of gold. Severely damaged, the Church sought to recuperated by buying elsewhere in the Roman Tuscia Castel Gallese, which was annexed to the sancta res publica, which could mean both the duchy of Rome, which the pope began to claim as a patrimony of St. Peter, or the Sacrum Romanum Imperium. The cession of Gallese, which provided the link between Rome and Ravenna, was the result of secret negotiations between Gregory III and Duke Trasamondo of Spoleto, who, like Godescalco, duke of Benevento, tried to assert his independence from Lombard King Liutprando , benefiting from the political turmoil in Italy, but in the end, this benefitted only the pope. King Liutprando understood that he not only had been betrayed by the Lombard dukes, but that the pope was playing a dangerous double game, The king left Pavia, the capital of his kingdom, in 730 and went to central Italy, primarily to punish Trasamondo. Spoleto was taken with ease, but the duke had taken refuge in Rome under the protection of the pope, who refused to deliver him to King Liutprando. The Lombard king then vented his anger with broad strokes in the Campagna, robbing, killing and capturing also the important castles of Ameria, Orte, Bomarzo and Blera, where he settled military garrisons threatening Rome, for a possible attack, and then returned to Pavia. Duke Trasamondo, refused to reconquer Spoleto and also refused to help the pope to free the four castles from the monarch. Rome was left facing the nightmare of a siege. Pope Gregory III decided to turn to France, where Charles Martel had inherited his father Pepin the Short's authority as the only master of the palace, strengthening his position with the victory at the Battle of Poitiers in 732, which had slowed the Arab advanced in Europe. In 739, the pope sent an embassy with rich gifts, which goal was to get a real military help against the Lombards. The ambassadors were received with full honors, but the specific request made to them was not even considered. Charles Martel had personal and political reasons that kept him from intervening in the Italian situation, apart from his poor health, he had no intention to renounce his friendship with the Lombards , who were related to his family. The pope and his duchy, therefore, remained under the Lombard nightmare, and for the time being those papal efforts were in vain. If the pope's urgent initiative to Charles Martel had not been successful, it still demonstrated the honor and merit of Pope Gregory III for having the crucial vision of the serious consequences of a union between the papacy the kingdom of the Franks, which not long after was realized.
Moreover, Pope Gregory III continued the missionary work of his predecessor, entrusting Boniface, the apostle of Germany, increasingly specific assignments that led to organization of the church in Bavaria. In 738, Boniface was given full powers of vicar apostolic in Germany. All this occurred because of Charles Martel, who facilitated safe conducts and financial support for the work of Boniface. This way, Charles Martel made it clear to the pope that although he could not help him militarily, for political reasons, he was willing to cooperate fully with any initiative of a religious nature. In 741, Pope Gregory III sent a second embassy to Charles Martel with the keys of St. Peter and the offer of the title of consul, according to which Rome would be placed entirely under Martel's military jurisdiction. The pope, who was in desperate need for assistance, called on Martel as a defender of the Church, but in practice gave him the lordship of a city which was in effect under the imperial court. For Martel to accept such an appointment would have meant also the enmity of Byzantium, and that of the Lombards, therefore, the answer could only be negative. When this answer arrived in Rome, Pope Gregory III had already died and Charles Martel would die a month later.
Death. November 28, 741, Rome. Buried in the oratory that he had built and dedicated to the Blessed Virgin Mary in St. Peter's basilica. The mosaic that decorated his tomb was damaged in the 11th century when the body of Pope Eugenius III was placed there. His tomb was destroyed during the demolition of the old basilica and the construction of the new one in the 16 and 17th centuries (2).
Sainthood. Inscribed in the Roman Martyrology, his feast is celebrated on December 10; and on November 28 pro clero Romano.
Bibliography. Cardella, Lorenzo. Memorie storiche de' cardinali della Santa Romana Chiesa. Rome : Stamperia Pagliarini, 1792, I, pt. 1, 32 and 33-34; Chacón, Alfonso. Vitæ, et res gestæ Pontificum Romanorum : et S.R.E. Cardinalium ab initio nascentis Ecclesiae usque ad Clementem IX P. O. M. Alphonsi Ciaconii Ord. Praed. & aliorum opera descriptæ : cum uberrimis notis. Ab Augustino Oldoino, Soc. Jesu recognitae, et ad quatuor tomos ingenti ubique rerum accessione productae. Additis Pontificum recentiorum imaginibus, & Cardinalium insignibus, plurimisque aeneis figuris, cum indicibus locupletissimis. Romæ : P. et A. De Rubeis, 1677, I, col. 511-516; Cristofori, Francesco. Cronotasi dei cardinali di Santa Romana Chiesa. Rome : Tipografia de Propaganda Fide, 1888, p. XXXVIII and 265; Delogu, Paolo. "Gregorio III, santo." Enciclopedia dei papi. 3 vols. Roma : Istituto della Enciclopedia italiana, 2000, I, 651-656; "Essai de liste générale des cardinaux. Les cardinaux des 10 premiers siècles". Annuaire Pontifical Catholique 1926. Paris : Maison de la Bonne Presse, 1927, p. 146, no. 2; Gregorovius, Ferdinando. Le tombe dei papi.. Roma : Edizioni del Centauro, 1931. Seconda edizione italiana riveduta e ampliata da C. Huelsen, p. 26*, no. 26; Kelly, John Norman Davidson. The Oxford Dictionary of Popes. Oxford ; New York : Oxford University Press, 1986, p. 88-89; Le Liber pontificalis. Paris : E. de Boccard, 1981, 1955. 3 v. : facsims. (Bibliothèque des Écoles françaises d'Athènes et de Rome). Notes: Reprint of the 1955 edition./ Includes indexes./ Vol. 3: "Additions et corrections de L. Duchesne publiées par Cyrille Vogel ... avec L'Histoire du Liber pontificalis dupuis l'édition de L. Duchesne une bibliographie et des tables générales, I, 415-425; Montini, Renzo Uberto. Le tombe dei papi. Roma : Angelo Belardetti, 1957. Note: At head of title: Instituto di studi romani, p. 130, no. 90; Petruzzi, Caterina. "Gregorio III, papa, santo." Mondo vaticano. Passato e presente. Città del Vaticano : Libreria Editrice Vaticana, 1995, p. 568-569; Reardon, Wendy J. The deaths of the popes : comprehensive accounts, including funerals, burial places and epitaphs. Jefferson, N.C. : McFarland & Co., Publishers, 2004, p. 58; Regesta pontificum Romanorum ab conditio Ecclesia. Ad annum post Christum natum MCXCVIII. Graz : Akademische Druck- u. Verlagsanstalt, 1956. 2 v. Reprint. Originally published : Lipsiae : Veit et comp., 1885-1888. Original t.p. included : Regesta pontificum Romanorum ab condita ecclesia : ad annum post Christum natum MCXCVIII. Editionem secundam correctam et auctam edidit Philippus Jaffè ; auspiciis Gulielmi Wattenbach; curaverunt S. Loewenfeld, F. Kaltenbrunner, P. Ewald, I, 257-262.
Links. Biography, in English, The Catholic Encyclopedia; biography, in English, (Britannica); his effigy on a medal and biography, in English; biography, in English, Popes through the Ages by Joseph Brusher S.J.; images and biography, in Italian; biography by Paul Delogu, Enciclopedia dei papai, Treccani; biography, in Italian, Dizionario biografico degli italiani, Treccani; his image and biography, in Italian, Santi e beati; biography by Friedrich Wilhelm Bautz, in German, Biographisch-Bibliographischen Kirchenlexikons; his engraving and biography, in German, Ökumenisches Heiligenlexikon; biography, in Norwegian, Den katolske kirke; his image and biography by Domenico Agasso Jr., in English, Vatican Insider; his engraving, Fondazione Marco Besso, Rome; his image, Biblioteca comunale dell'Archiginnasio, Bologna; his image, Adalar - Sippe; his engraving, Bildarchiv Austria. Die Bildplattform der Österreichischen Nationalbibliothek; his engraving, Bildarchiv Austria. Die Bildplattform der Österreichischen Nationalbibliothek; his engraving, Bildarchiv Austria. Die Bildplattform der Österreichischen Nationalbibliothek; his engraving, Bildarchiv Austria. Die Bildplattform der Österreichischen Nationalbibliothek; and another engraving from the same source.
(1) They are Cristofori, Cronotasi dei cardinali di Santa Romana Chiesa, p. 265; and "Essai de liste générale des cardinaux. Les cardinaux des 10 premiers siècles". Annuaire Pontifical Catholique 1926, p. 146, no. 2. None of the other sources consulted mention it.
(2) This is according to Reardon, The deaths of the popes : comprehensive accounts, including funerals, burial places and epitaphs, p. 58, who adds that copies were made of the simple inscription on his tomb, which reads:
©1998-2014 Salvador Miranda.
|
Cause: They are caused by sun damage and irritation. They can affect lighter colour individuals more than the darker ones.
Exam: Pinguecula and Pterygium can be found by Optometrist during routine eye exams. If size, colour and thickness changes significantly over a short period of time, make sure to follow up with an Optometrist to see if it might become malignant.
Treatment: Surgical removal can be used if pinguecula or Pterygium threatens the line of sight, affecting the cornea covering the pupil. It may grow back after removal. It's always best to prevent it by seeing your Optometrist for routine eye exams yearly and wearing UV protection or sunglasses.
Dr. Yan L. Liang, OD
Contact Warden Optometry to book your appointment today.
|
A fascination with darkness and the unseen haunts the work of London-based French photographer Chrystel Lebas (b. 1966). Using a panoramic camera with long exposure times ranging from two to six hours, Lebas creates sweeping, mesmerizing landscapes, which explore photography’s relationship with time and movement. Panoramic photography is a form of photography that uses special equipment and software that captures an elongated view of the subject too. as I can see in this photograph by Lebas it is horizontally very long and vertically rather thin. She took this approach with her photography and always focused on natural landscapes.
The photograph included in her work 'Etudes' French for 'Studies' shows a landscape of a lake as the main focus and trees also included. it was taken in 2009, it could have been taken from any time from the early 20th century to now because of technological advances involving panoramic cameras. This has clearly been taken on professional equipment because of the perfection in its development, supporting Lebas as an established photographer. it doesn't link with anything politically or worldwide happening, in fact it sits very well on its own, distanced from the normal world. It could link to history and time in a sense that it has been there forever, this is because everything included is natural, at this specific time (I am guessing early evening, after sunset) this landscape has looked like this for centuries. Because of the stillness of it I can tell a very fast shutter speed must have been used. Lebas's interest in darkness and unseen relates to this because of the element that as this time the dark is creeping in, but isn’t quite there yet, also the dark shadows on the water from the silhouette-like trees show a cover up of the unseen, what is under water? It is involved in the photograph but still hidden. Although Lebas didn't belong to an art movement, this photographs atmosphere would be suitable to for an artist such as Van Gogh to paint. This photograph was not taken for any particular purpose, it was taken as Lebas's personal approach and style to photography.
I think that Lebas chose to work from this sources because of the composition, the lake is what is seen first and takes up the majority of space in the picture, but so it isn’t too plain the trees that pear in on the side work perfectly well to fill up the space, and both these natural elements fit together because of their contrast and differences. The lake focuses on tones and pattern because of the ripples and reflection a more surreal view of the landscape above is shown, whereas the trees are solid black silhouettes looking smooth is texture because of the dark lines. because of their bold statement and the water with very few ripples, no movement is created in this photo. the photo could feel like an illusion because of this, as if it is too quiet and still to be real, something should happen but it doesn't, silence is just left there.
The untitled photo helps to suggest more mystery, perhaps the atmosphere looking in the middle of nowhere helps us to relate no title to it. The theme is definitely time and space, which was Lebas's aim, the space is still and so is time it seems. I don't think there is a particular story here but perhaps just a sense of a story of nothing, just a still landscape that has been there forever, nature being a narrator. Because of the nature being important we don’t think of people or any living specie being involved, there isn't even a sign of any birds, meaning Lebas's attempt to present time seems even more powerful because time seeming paused is supported by no movement even to creatures in the sky, hey are non-existent in this photograph.
My first reaction to the work is that I like it because of the contrast in the cold looking blues and whites on the water surface to the sharp blackness of the trees, i am drawn to the lake first but see the trees almost as stencils even though they are real. The sense of silence is felt and also coldness due to the lack of sunny colours, it must have been winter when this was taken. It reminds me of a photograph I once took on a digital camera of a lake with trees reflected in it, although this was late evening in spring (shown below).
|
Yesterday, the FDA released a Drug Safety Communication warning about a possible risk of increased fractures with acid blocking medications called proton pump inhibitors or PPI's.
PPI's have been a major advance in medical science. Prior to these and ealier medications, the treatment for severe gastroesophageal reflux disease (GERD) was major surgery. PPI's are now commonly prescribed for GERD and less serious heart burn, many are generic, and some are now sold over the counter. The popular PPI's include Nexium (esomeprazole), Prilosec (omeprazole), Prevacid (lansoprazole), and Protonix (pantoprazole) which are available by prescription. Prilosec OTC and Prevacid 24HR are sold over-the-counter (OTC). Given the use and popularity of these medications, this warning may cause great concern among patients who rely on these medications.
What did the FDA find?
The FDA analyzed the data from several epidemiologic studies in thousands of patients studied for several years and in 6/7 studies found a greater risk for certain kinds of fractures when patients took PPI's. These risks seemed to be the greatest when patients were taking the medications regularly, for a long time, and at a high dose.
So is this a real problem?
Maybe. It is important to know that the gold standard of studies is the randomized clinical trial (RCT). Only RCT's can prove a cause and effect. None of the RCT's with PPI's thus far have shown and increase fracture risk with PPI's. The problem with RCT's is that they are hard to do and are usually limited in time (6 months) and have fewer patients. So a rare but serious side effect is unlikely to be picked up in an RCT. The epidemiologic studies are useful, but have limitations (which the FDA readily points out). These studies are case-control, meaning they look for people who had fractures, find similar people who didn't have fractures, and then see how common PPI use was in each group. Though the studies show that people with fractures were more likely to take PPI's than people without fractures, this doesn't mean that PPI's cause fractures. Maybe the folks who took PPI's had stomach troubles and were less likely to take things that prevent fractures like Calcium or Bisphosphates (drugs which prevent fractures but are relatively contraindicated in those patients with GERD). In addition, these studies use claims databases. This means that to get the data, doctors never examined or interviewed patients, rather the investigators looked at insurance claims for fractures, medication use, etc. For example, we don't know what the bone density scores (DEXA) were for the patients in this study. It is very possible (and even likely) that the patients in the fracture group had lower DEXA scores, and this more than the PPI use accounted for fracture. Also, if you have ever received a bill or claim notification from your insurance company, you problem know that the information they contain is not always 100% accurate. That said, the number of patients studied and the consistency of this relationship suggests that there may indeed be a cause and effect.
What should you do?
It is unlikely that short term use of PPI's substantially increase risk of fractures. So if you need an occasional Prilosec OTC (like after a big barbecue this Memorial Day weekend), this is probably fine. If you need to take PPI's, either prescription or over the counter, on a daily basis and have symptoms when you do not take them regularly, this could be a sign of more serious disease and should be investigated by a physician (regardless of a fracture risk). For those patients who have had an extensive medical work up for a stomach condition and told by a physician that taking a PPI on a daily basis for years to come is the recommended treatment, then they should discuss the risks and benefits of PPI's as it relates to fractures. This would be particularly important if you have an increased risk for fracture such as a previous fracture, family history of osteoporosis, or low bone density.
|
When using Sketch Engine, every now and then the user comes across the word attribute and its values: words, tags, lemmas, lempos, lowercase and some others depending on the corpus and language. This blog post explains how these positional attributes, to use the correct terminology, work in Sketch Engine and how the user can benefit from them.
Attributes – versions of a corpus
As soon as some text is uploaded to Sketch Engine, it is divided into tokens, i.e. tokenized. A token is the smallest part of a corpus. Each word or punctuation is a token. Hello is one token. Hello! is two tokens. The next step is to convert the original text into additional versions. Each version has its name taken from the attribute into which the original corpus is converted.
Each token will immediately become part of the corpus version called word which is short for word form. Word represents each token exactly as it was written in the original sentence. It is not modified by Sketch Engine in any way. The first word in the sentence will keep its capital letter, contractions such as n’t in don’t will stay as n’t. This is what a sentence will look like when it is tokenized.
see also word form
The sentence is presented in the format of a vertical text, i.e. one token per line. This is the standard format of storing corpora in Sketch Engine. This format allows adding more attributes (columns) to each token easily.
word (lowercase) or lc
Word (lowercase), sometimes displayed as lc, is next version of the corpus, i.e. the next positional attribute. To generate this attribute, all tokens in the corpus are converted to lowercase including proper nouns (London⇢london, Peter⇢peter, WiFi⇢wifi, WIFI⇢wifi). Using this attribute (column) for searching will make the search case insensitive. Searching for cook, will find both Cook and cook. Searching for Cook will find nothing.
When generating frequency lists using this attribute, lowercase and upper case variants of the word will be treated as the same words. To get a separate frequency for WiFi, WIFI and wifi, use the word attribute.
lc is added as an additional column to the vertical text. Logically, the lc attribute is only present if the script distinguishes between lowercase and upper case. No lc for Chinese or corpora in Indian scripts.
see also lc
Please study this vertical text and compare the frequency lists generated on the word and word (lowercase) attributes. The lc list will always be shorter, it will contain a smaller variety of items because the distinction between upper case and lowercase is lost.
The lemma is the form of the word found in dictionaries, sometimes called the base form. Introducing lemmas makes it possible to treat different word forms of the word as the same word. This is especially useful with morhpologically rich languages, i.e. languges where lemmas can have many differet word forms (Spanish, French, Polish, Japanese, Turkish, Russian etc.).
The existence of the lemma makes it possible to type go and find go, goes, going, gone and went automatically. A wordlist generated on the lemma attribute will count the frequencies of go, goes, going, gone and went together and display them as one item: go. To find their individual frequencies, the lc attribue should be used.
The lemma preserves the original capitalization but, typically, the first word of a sentence will be lowercased.
In most languages (German is one of the exceptions), when a capitalized word is found in the middle of the sentence, the lemmatizer identifies it as unusual usage, possibly a brand name or proper noun, and will assign a lemma which is identical to the word form. Compare islands ⇢ island but Islands ⇢ Islands.
see also lemma
Compare these frequency lists generated on the word and lemma attributes. The lemma itself does not differentiate between parts of speech, therefore landed and land are counted as the same lemma despite being a verb and a noun. The Sketch Engine interface, however, features functionality to take the part of speech into account if needed.
tag or POS tag or part-of-speech tag
The tag attribute contains POS tags with information about the part of speech of each token and usually also other grammatical or morphological information such as number, gender, tense etc. Tags are assigned automatically by a tagger.
Using the tag for searching makes it possible to find all words with the same part of speech. Combining the tag with other attributes makes it possible to only find words when used (or not used) as a specific part of speech.
A frequency list of tags will provide information about how frequent each part of speech is in the corpus.
see also POS tag
lempos and lempos_lc
The lempos attribute was introduced mainly to make the computation of the word sketch and thesaurus possible. Lempos stands for lemma + POS. It is a combination of lemma and a one-word abbreviation of the part of speech. Parts of speech not supported by the word sketch all use the same suffix -x.
The lempos_lc or lempos (lowercase) is the lowercase version of lempos.
How to display attributes
Attributes can be viewed easily in the concordance. The concordance can be generated:
- from scratch using a concordance search,
- by jumping to the concordance via the local menu next to each result in other tools.
In the concordance, the view options offer the complete selection of attributes.
|
Nearly half of all IBAs lack legal protection. Some 2,400 IBAs with little or no protection have significant populations of one or more globally threatened bird species, and 10 are key sites for an exceptional 11 or more such species. These sites are therefore priorities for appropriate forms of statutory recognition and protection.
BirdLife International (2013) A high proportion of IBAs have no legal recognition or protection. Presented as part of the BirdLife State of the world's birds website. Available from: http://www.birdlife.org/datazone/sowb/casestudy/544. Checked: 27/08/2016
|Key message: Protected area networks are vital for conservation, but have many gaps|
|
Academic Enrichment Grant 2009-2010 Project Summary
Water Quality: A Roadmap to Understanding • Natick, Massachusetts
Students will “do” science, thinking, investigating and reporting by using scientific methodology, designing and conducting experiments, collecting and analyzing data and drawing conclusions. Students will contribute their results to a worldwide water monitoring effort with the goal of building public awareness and involvement to protect water resources. Students will research historical data and watershed maps, seeking explanations for their observations. Through this research and experimentation, the student-scientist will learn how the choices they make today influence the water they have tomorrow. Students will create posters and present their findings at a school-wide poster session, similar to those at scientific symposia, for students, staff and community members interested in the town’s water quality. Technology will be integrated into the project in a variety of ways including using Internet resources to conduct site research, digital media to photograph sites, and computers to analyze data. In a series of presentations and field trips, scientists and engineers, regulators and litigators, entrepreneurs and farmers working in the water quality field will share stories and experiences dealing with water quality issues to provide a beyond-the-classroom perspective to students.
Back to Project Summaries
|
The rubber beam is vulcanized and bonded by a multi-layer rubber sheet and a thin steel plate. It has sufficient vertical steel to reliably transmit the reaction force of the upper structure to the abutment; it has good elasticity to adapt to the beam end. Rotation, and greater shear deformation ability to meet the horizontal displacement of the upper structure.
In addition to the PTFE plate on the surface of the above-mentioned plate rubber bearing, it can be made into a PTFE sliding plate rubber bearing. In addition to vertical steel and elastic deformation, it can withstand vertical loads and adapt to beam end rotation. In addition, due to the low friction coefficient of the PTFE plate, the beam end can slide freely on the surface of the PTFE plate, and the horizontal displacement is not limited. It is especially suitable for bridges with medium and small loads and large displacement.
The rubber beam not only has excellent technical performance, but also has the characteristics of simple structure, low price, easy maintenance and replacement of buffer isolation and low building height. Therefore, it is popular in the bridge industry and is widely used.
Ordinary rubber beams are suitable for bridges with a span of less than 30 m and a small displacement. Different plane shapes are suitable for different bridge span structures, rectangular supports for orthogonal bridges; curved bridges, oblique bridges and circular piers for circular bridges Shape support.
The PTFE plate rubber beam is suitable for large displacement bridges with large span, multi-span continuous and simply supported beam continuous plates. It can also be used as a slider for continuous beam pushing and T-beam traverse. Rectangular and round PTFE plate rubber bearings are used in the same way as rectangular and round plain plate rubber bearings.
It is made of multi-layer rubber sheet and thin steel plate inlaid and bonded. There is enough vertical steel to bear the vertical load, and the reaction force of the upper structure can be transmitted to the abutment; it has good elasticity to adapt to the rotation of the beam end, and has large shear deformation to meet the upper structure. Horizontal displacement.
GJZ Rectangular GYZ Round Rubber Beam Features: This product has been widely used in bridge construction, hydropower engineering, and earthquake-resistant buildings. Compared with the original steel support, it has simple structure and convenient installation; saves steel and is inexpensive; It is easy to change, easy to change, etc., and the building height of this product is low, which is beneficial to bridge design and cost reduction; it has good isolation effect, which can reduce the impact of live load and seismic force on buildings.
3.Rubber beam parameters requirement
(1) the compressive strength, compressive strength, compressive strength) code sigma BC, refers to the strength of the external forces applied pressure limit. To understand the characteristics of stone and whether it is suitable in engineering, the mechanical strength test of rock must be done first.
(2) young's modulus of elasticity:
Young's modulus of elasticity is one of the bases for selecting the materials of mechanical parts.
(3) poisson coefficient
In solid mechanics, the lateral deformation coefficient of materials is known as poisson's ratio, also known as poisson's coefficient.
When a material is compressed in one direction, it will extend in two other directions perpendicular to that direction. This is the poisson phenomenon. Poisson ratio is a dimensionless physical quantity used to reflect the phenomenon of cypress pine.
4. Determining the bearing capacity of rubber beams
The bearing capacity of a bridge rubber bearing depends on the following three conditions:
(1) The rubber itself is crushed or cut;
(2) The rubber produces more than the permitted compression deformation and shear deformation;
(3) When the support is under pressure (concrete, steel plate or the like), the contact surface of the support and the rubber slips off when the horizontal shearing force of the rubber is broken by the outward shearing force of the rubber.
Through a large number of experiments, it is proved that the rubber on the surface of the bridge rubber bearing has compressive strength and shear strength, and is rarely directly crushed or cut. Here, the rubber material of the rubber bearing is artificial synthetic neoprene (also known as Nat rubber) and vulcanized natural rubber. There are also butyl rubber and rubber compounds. When calculating the rubber bearing strength, the allowable stress is determined by the bearing capacity in the cases of (2) and (3).
|Natural rubber||High strength reclaimed rubber||
|Rubber vulcanization accelerator||Carbon black||Stearic acid||
Eternal Bliss Alloy Casting & Forging Co, Ltd.
what’s app: 0086-13093023772
Contact Person: Ms. Juliet Zhu
|
Slow-Motion Microbes Still Living Off Dinosaur-Era “Lunch Box”
Buried under the seafloor for 86 million years, a bacterial community lives so slowly it’s still surviving on a “lunch box” from dinosaur days, a new study says. It’s been known since the 1990s that microbes can live trapped in ocean sediments for millions of years, but until now it’s been a mystery how these organisms make a living. Study leader Hans Røy, a geomicrobiologist at Aarhus University in Denmark, found that the deep-sediment bacteria are consuming oxygen at extremely sluggish rates. What’s more, the team discovered the microbes are living off the same supply of organic carbon that got trapped along with them.
“They left the surface world when the dinosaurs walked the planet—and they are still eating the same lunch box that they got back then,” Røy said. And they’re not alone: Such microbes may be the most common organisms on the planet, making up about 90 percent of Earth’s single-celled life, recent research suggests. Because the organisms are so deprived, they’ve also adapted to reproduce very slowly, unlike other bacterial species, many of which multiply by the millions within a few days.
|
Introduction to Stone Tools (Lithics)
Lithic artefactshave been widely neglected in Egyptology until fairly recently.1 The reason for this state of affairs has its roots in nineteenth-century practices, but there are two modern culprits to be aware of. Firstly, we tend to think of stone tools as obsolete in the face of the development of metallic ‘Ages’. Although they seem definitive, broad stroke categories of study, such as the ‘Bronze Age’ (roughly 3300-1200 BC), are rather less well defined on closer inspection than they initially appear.2 Secondly, compared to decorative ornaments, papyri, or monumental structures, lithics are, to be blunt, much less sexy. Yet, without lithics there would be no tools to carve the first delicate ornaments, to harvest the reeds or pulp the paper, nor understanding of the attributes of various geologic materials for monumental sculpture and architecture. The body of specialized knowledge represented by lithic technologies (and the generational communication of that knowledge) is but one of the aspects of ancient Egyptian communication which deserves further study. During their active use, the objects conveyed social status within both local and national spheres. This communication was accomplished by material type and origin, technique of manufacture, and purpose of use (where that can be discerned). This essay will attempt to relate a few basic observations that can be made by an archaeologist such as myself, who, while not being an Egyptologist, was trained in Southern California where lithic technology essentially was the technology until Western contact. The main aim of this paper, however, is to spark interest in the minds of burgeoning scholars, so that the lithics in the Eton Myers collection may receive the attention they so richly deserve.
The majority of the lithics in the Eton Myers Collection are flint objects collected in the nineteenth century by Heywood Walter Seton-Karr (1859-1938).3 Seton-Karr ‘discovered’ extensive flint mines in the eastern desert of Egypt, near the Wadi el-Sheik district.4 Several of the objects in the Eton Myers collection are identified as having been found across the Nile, in the Fayum.5
Flint is widely available throughout Egypt, but the Wadi el-Sheik mines contain nodes of a very high quality compared to aboveground sources. Findings from the shafts and galleries have been carbon dated to c. 3,300 – 2,800BC, making these some of the oldest known underground flint mines in the world.6 Archaeological evidence shows that the mines were a major source of flint from the Pre-dynastic Period through to the New Kingdom, but were most heavily exploited during the Middle Kingdom (1980 – 1760 BC).7 Some sections of the galleries and tunnels have been cut using metal tools, showing a significant economic investment in these mines.8
Located at or near the mouth of the mines are heaps of debris, including limestone fragments from which the flint was extracted. Certain areas among the debris have been designated ‘workshops’ where the flint was initially processed, most likely by apprentices. Although the nodes of flint were not manufactured into finished products here, the piles of broken stone reveal a high level of organization.9 Each ‘workshop’ area was responsible for the manufacture of different stone blanks. In other words, the basic shaping done in each ‘workshop’ area shows that fresh nodes were selected for making specific tools (arrowheads, blades, knives, ritual implements, etc.) straight out of the mines, minimally shaped by type on site, and then taken to standard workshops in nearby settlements for finishing by master craftsmen.10
Social Groups and Communication
This basic information gives modern investigators a wealth of informative data. It reveals details about spatial and social organization, technological advances, continuity and change through time. But this exhibition is about communication in the context of the ancient world, so what does this data reveal in that context? To some degree it illuminates an intricate relationship between at least three distinct social groups: miners, flint-knapping specialists, and an elite owner/consumer group.11
When the subsistence strategy was primarily of a hunter gatherer type, widespread knowledge of flint-knapping techniques for the manufacture of hunting weapons can be assumed. And while sedentary farmers of the Neolithic were reliant on lithic technology, the food surpluses they generated lead to a new type of economic organization with a concomitant increase in specialist manufacturing indicated by a decided shift in the tool repertoire. This point represents the birth of the separate social groups mentioned above. The time and effort expended digging deep into the earth to harvest preferred materials, and years needed to learn the art of tool making and fine working of an easy to shatter material would be justified economically by the growing demands of the nascent Egyptian state.
These emerging social groups were integrated into the wider society and connected by common needs and cultural ideals. Miners retrieved high quality flint from beneath the earth. The nodules were divided by their suitability for a particularobject type and minimally shaped at the mouth of the mine. Next semi-worked items were delivered to masters craftsmen. Workshops then produced objects for a variety of uses and markets. The final shape was influenced by the consumer and society as a whole. Thus, the demand of the consumer was linked to idea of ‘what X looks like’ in that specific cultural time and place. Elite consumers acquired objects of beauty, display, ritual, etc., to assist in practices that ‘justify’ political power.12 Direct investment in the mining community is evidenced by the expenditure on metal tools, mentioned earlier. During the dynastic period Pharaohs were the sole ‘owner’ of mines this may indicate an interesting link between the elites and craftsmen.13
In this socioeconomic system, the role played by each group evokes the notion of distance. Ethnographic data has revealed that kinship groups often monopolize economic niches through craft specialisation. In these cases clan and/or tribal affiliation determines vocation and the special rites/rituals attached to technical knowledge.14 Separation between these groups would be evident in daily routines, training experiences, rituals and social foci.
There are far more objects in the Eton Myers collection than are included in this essay, and each deserves to be examined. It has been exceptionally difficult to select which items to include. Rather than discuss each one, I have chosen a few which best illustrate ancient forms of communication and/or point towards lines of future research.
Communicating Specialized Knowledge
The best way to illustrate the skill of the flint-knappers and miners of ancient Egypt is to examine the objects and their method of manufacture. There are numerous flint-knapping demonstrations available online, but two that are especially informative can be found at http://www.youtube.com/watch?v=NQ3ExnCv_dc&feature=relmfu and http://www.youtube.com/watch?v=Sim6tAFqvvU. The instructors are careful to explain the calculations that go into each strike, the uses/purposes of different tools and the importance of geological knowledge.
The Eton Myers collection contains an excellent ‘blade core’ (fig. 1).15 It was once a flint nodule, assessed and shaped as discussed above. Part of the process would include knocking off unsuitable angles, developing a ‘striking platform’, (which can be seen in the foreground of the image), and removing the ‘cortex’ or rough exterior of the node. At the workshop of the master craftsmen, long thin blades were removed in a circular pattern.16 These blades were quite sharp and could be used at this stage, but were often retouched, indicating that there was an ideal shape and ‘look’ to the finished product. ECM4700 (fig. 2) is a uni-facial blade, meaning that it was only worked on one side. The ruffling along the edge shows that it was sharpened by removing tiny pieces. I chose to show this piece due to the unusual curvature of the body. Both removal of this shape from the core and retouching required significant skill because the arc is awkward to handle and could have easily been snapped during the process.
Projectile points, such as arrow or spear heads, are demonstrative of the way in which basic principles of stone working evolved into complex educational systems. Even though the initial shaping process is quite similar to that discussed above, the following stages are much more complex and take years of experience to master. Projectile points must be sturdy, aerodynamic, and possess the culturally approved shape for their purpose. The final product was the outcome of innumerable generations and rooted in tradition. In this respect every object was a cumulative work. In another respect, projectile points were revolutionary, the advanced frontiers of technology. They slowly explained the physics of the surrounding world as new shapes and sizes were developed for specialized game, warfare and display. Technological innovations, socio-cultural changes, religious meaning and even simple fashions, shaped the body of knowledge being endowed.17 Communication of these principles to the next generation was a vitally important, but far from static operation.
Beauty and Symbolism
The type of tools used by an individual will necessarily be associated with their status and social role. For example, a farmer’s needs differ from those of a member of the scribal elite. A foot soldier and a general may have similar equipment, but there will also be significant differences. An archer or infantryman does not need to be differentiated from his fellows in the way that a military leader does. Objects that are of rare, difficult to acquire and/or beautiful material and those that require the most expertise or longest amount of time to make will generally be the most ‘expensive’.18 Looking at the following items, we should bear these points in mind.
Letting Lithics Speak
Lithics are largely discussed in terms of functionality, but they can also posses a certain beauty, as is exemplified by ECM1218 (fig. 3).19 The purpose of the long, delicate tangs of this type of arrowhead has been questioned, as they are likely to snap off after impact. This means that they are likely a single use item, but it also has implications for hunting and warfare. The shattered ends could embed in the flesh, doubling the damage to the target. But can more be read? Projectile points are all bi-facial objects, worked on both sides that must be roughly symmetrical. This creates a special challenge for this shape, as the wing-like tangs must remain in the same plane and have the same length and width, as the deep central hollow is created. Examining the body, we can see that it is covered with minute ‘scars’ or grooves where stone has been carefully taken off by pressure flaking. The extreme length of the tangs in relation to body size represents a time-consuming choice, rather than a necessity. The shape may then reflect a culturally important or aesthetically pleasing shape. A final factor to consider is colour. Recent research suggests that black flint is uncommon in the archaeological record, and that ‘the colours of black and white, but also multicoloured and green, were important to the ancient Egyptians’.20 Thus, it may be possible to argue that functional benefits (impact fracture) were entwined with prestige factors (time and material quality) and perhaps aesthetic qualities (colour and shaping details).
The smallest object in the lithics collection is ECM1159 (fig. 4), which is 1cm wide by 2.8cm long (from point to tail).21 While the shape is a common form utilized from the First Dynasty through to the New Kingdom (c. 2900 – 1100BC),22 the material and minuscule size make it a spectacular piece. Flint can be translucent and luminous when polished, but this may be an instance where chalcedony or a uniquely coloured chert has been identified as flint.23 What this and several other pieces show is the variety of lustres/luminosity achieved by the Egyptian craftsmen.24 The ‘glow’ of a lithic tool added to its value,25 as can be seen in ancient textual references to flint as a prestige commodity.26 Possession of such a heavily modified, elegant projectile point should be viewed as an investment (of time, material, expertise) meant, in part, for personal display.27
Without further study the role played in Egyptian society by lithics, such as those found in the Eton Myers collection, cannot be fully explored. At this point there are few dates assigned to the objects, but it may be possible to assign more, given the recent growth of Egyptian lithic typologies. The provenance of the lithics in this collection are usually recorded as either Eastern Desert or Fayum, but a petrological analysis,28 could determine the original flint source, providing a greater understanding of organization and distribution patterns. One recent study suggests that there was an ideological orientation that associated all flint with the east, which itself was ‘associated with danger and difficulty, as well as solar creation, and is the birthplace of minerals’.29 It is my sincere hope that future researchers will either challenge or champion some portion of this essay, and thereby expand the realm of knowledge for Egyptian lithics. For, as we have seen, there are several lines of enquiry which could uncover ways in which Egyptians communicated to each other through stone tools.
- Weisgerber 1987: 166. Egyptology is not alone in this respect. Nearly every sector of post-Neolithic Mediterranean archaeology can be accused of the same thing. Fortunately there has been a shift in the approach to archaeology in the last twenty years and now many previously neglected categories are helping to create a more inclusive view of the ancient world. Recent interest in ancient Egyptian settlements has been productive for the study of lithic technology. Well stratified sites have given us very good information about lithics.
- Bard 1999: 311, relates that farming implements were among the last items to be produced in metal. Common iron tools do not begin to appear regularly until fate the 7th century BC and the sickle blade is the final tool to be translated into a metallic medium during the 4th century BC.
- Bierbrier 1995.
- Seton-Karr 1898: 90; Barket & Yohe 2011: 27, ‘these impressive quarries extend for several kilometres in the northern portion of the wadi’ and provide a good exemplar for flint processing in the Egyptian Middle Kingdom.
- Several of the objects in the Eton Myers collection are identified as having been found in the Fayum. The archaeological location of these objects in the Fayum does not necessitate their origin or place of manufacture. An intensive study is needed to determine if these could be products of the Eastern dessert mines.
- Aston, Harrell, & Shaw 2000: 5, 28.
- Weisgerber 1987: 169; Bard 1999: 311; Hornung, Krauss, & Warburton 2006: 490-495.
- Bard 1999: 311, Egypt is copper poor, and metals remained expensive and accessible only in the realm of the elite until well into the Iron Age.
- Barket & Yohe 2011: 27; Rosen 1996: 129-31.
- Bard 1999: 311; Pawlik 2005: 194-195, identifies the Pharaonic site Kom al-Ahmar (Red Hill) by Wadi el-Sheikh as a specialist village associated with the mines.
- Because of the quality of the flint and effort gone to procure it, the flint from this type of mine would not be of common usage. For everyday usage, local flint could be procured from riverbeds and above ground sources. For these reasons, and others discussed below, we may assume the consumer to be of an elite status.
- Graves-Brown 2010: 129, Flint can no longer be viewed as the material of poverty as recent research shows ‘the equation of flint with poverty may be questioned…as value is socially ascribed’. Access to raw materials and manufacture of tools may have been deliberately manipulated to artificially increase ‘effort expenditure and rarity’; Gero 1989: 94, 100–101 suggests the durability and ‘eternality’ of stone made flint ideal for encoding social messages.
- Weisgerber 1987: 169, finds little evidence that miners of Wadi el-Sheikh were a slave population.
- Babel 1997: 168, ‘technical, magical and religious spheres were closely connected with one another, and were handed down within specific social groups’.
- ECM1145 is listed as a ‘Discarded core of fawn coloured flint, with conchoidal fracture on one side which had made it useless for striking more blades’. It was donated by Seton-Karr, but the exact location of its discovery is unrecorded.
- This is far from the only pattern that flakes can be removed in and some flint nodes are never reduced to a core, but are worked directly into larger objects.
- Odell 1996: 225, ‘All lithics, but especially projectile points are shaped with great care and therefore the products of a multitude of manufacturing decisions and an impressive amount of human effort…[these decisions] can be directly translated into cultural information’.
- For an excellent overview of the specifics involved with the transmission of lithic production knowledge and its implications for cognitive archaeology see Babel 1997.
- ECM1218 is listed as ‘Hollow based and tanged arrow head of dark brown flint, carefully worked and with waxy polish’. Fagan 1996: 190; Hikade 2010: 7, this shape (the “Fayum point” )was common in the Fayum, from the Neolithic (5300 BC) up until the time of the unification of Upper and Lower Egypt (c. 3100 BC).
- Graves-Brown 2010: 139-142. The multicoloured blade ECM4652, is an excellent example of an interesting interplay between colour patterns on a finished object.
- ECM1159 is listed as ‘Slender leaf shaped arrow head of honey coloured flint, squared shoulders, broad tang, finely worked’.
- Graves-Brown 2010: 556-7; Hornung, Krauss, & Warburton 2006: 490-495.
- Aston, Harrell, & Shaw 2000: 6-8, flint and chert are often used interchangeably by archaeologists as they can be difficult to distinguish. Generally chert is lighter and more varied in colour.
- ECM1138, is a honey coloured flint with little reflectivity, but more lustrous than ECM4645. Projectile points ECM1152, ECM1179, ECM1218 and ‘fish shaped blade’ ECM4652 illustrate a variety of reflective properties.
- Graves-Brown 2010: 142- 143, suggests that ‘luminosity is related [to] the notion of the multicoloured, as both may be considered dazzling’ and that polishing of lithics was especially prevalent in the Pre- and Early Dynastic periods. This theoretically links objects such as ECM4652 and ECM1159.
- Aston, Harrell, & Shaw 2000: 29.
- Gero: 1989, 93–94; Graves-Brown 2010: 152-156.
- Weisgerber 1987: 176, suggests that the lithics of each area are distinctive and easily differentiated from other regions. Considering the advancement of petrological fingerprinting and increasing knowledge of Egyptian lithics since the 1980s it is entirely feasible that such a study could be very successful.
- Graves-Brown 2010: 148.
Aston, B. G., J. A., Harrell, I. Shaw, 2000. ‘Stone’ in P. Nicholson & I. Shaw (eds), Ancient Egyptian Materials and Technology, 5-77, Cambridge.
Babel, J. 1997. ‘Teaching Flint Knapping Skills in Neolithic Mining Societies’, In R. Schild & Z. Sulgostowska (eds), Man and Flint. Proceedings of the VIIth International Flint Symposium Warszawa - Ostrowiec Swietokrzyski 1995, 167–169, Warsaw.
Bard, K. A. (ed). 1999. Encyclopedia of the Archaeology of Ancient Egypt, London; New York, NY.
Barket, T.M., R.M. Yohe, 2011. ‘A Technological Evaluation of the Flint Blade-Core
Reduction Sequence at Wadi El-Sheikh, Middle Egypt’, Lithic Technology 36, 27-38.
Bierbrier, M. 1995. Who Was Who in Egyptology. London.
Gero, J. M. 1989, 'Assessing Social Information in Material Objects: How Well do Lithics Measure Up?' in R. Torrence (ed), Time, Energy, and Stone Tools, 92-105, Cambridge.
Graves-Brown, C. A., 2010. The Ideological Significance of Flint in Dynastic Egypt
(Volume 1), Thesis Submitted to University College London for the Degree of
Doctor of Philosophy, Institute of Archaeology, University College London.
Hikade, T., 2010, ‘Stone Tool Production’, in W. Wendrich (ed), UCLA Encyclopedia of Egyptology, Los Angeles, CA. http://digital2.library.ucla.edu/viewItem.do?ark=21198/zz0025h6kk
Nicholson, P., I. Shaw, (eds). 2000. Ancient Egyptian Materials and Technology. Cambridge.
Pawlik, A. F. 2005. ‘The Lithic Industry of the Pharaonic Site Kom al-Ahmar in Middle
Egypt and its Relationship to the Flint Mines of the Wadi al-Sheikh’, Stone Age - Mining Age – Der Anschnitt, Beiheft 19, 193- 209.
Rosen, S. A. 1996. 'The Decline and Fall of Flint', in G. H. Odell (ed), Stone Tools:
Theoretical Insights into Human Prehistory, 129-155. New York, NY.
Seton-Karr, H. W., 1898. ‘Discovery of the Lost Flint Mines of Egypt’, The Journal of the Anthropological Institute of Great Britain and Ireland 27, 90-92.
Seton-Karr, H. W. 1906. Flint Implements of the Fayum, Egypt. Washington.
Weisgerber, W. 1987. ‘The Ancient Flint Mines at Wadi el-Sheikh (Egypt)’, in G. de
Sieveking and M. H. Newcomer (eds). The Human Uses of Flint and Chert: Flint Symposium, Brighton, 1983. Cambridg
|
What is the Primary Years Programme?
The IB Primary Years Programme (PYP) is a curriculum framework designed for students aged 3 to 12. It focuses on the development of the whole child as an inquirer, both in the classroom and in the world outside. It is defined by six transdisciplinary themes of global significance, explored using knowledge and skills derived from six subject areas, with a powerful emphasis on inquiry-based learning.
The PYP is flexible enough to accommodate the demands of most national or local curriculums and provides the best preparation for students to engage in the IB Middle Years Programme.
The IB Primary Years Programme
- addresses students’ academic, social and emotional well-being
- encourages students to develop independence and to take responsibility for their own learning
- supports students’ efforts to gain understanding of the world and to function comfortably within it
- helps students establish personal values as a foundation upon which international-mindedness will develop and flourish.
An aim of the PYP is to create a transdisciplinary curriculum that is engaging, relevant, challenging and significant for learners in the 3-12 age range.
Find out more about the IBO by visiting their site:
|
For individuals in recovery from alcohol or drug use, compulsive eating, or other addictive behaviors
Mindfulness-Based Relapse Prevention (MBRP) is a novel treatment approach developed at the University of Washington. Mindfulness practices increase awareness of triggers, habitual patterns, and automatic reactions. These practices cultivate the ability to pause, observe present experience, and bring awareness to the range of choices before us in each moment.
MBRP (Bowen, Chawla and Marlatt, 2010) is a novel treatment approach developed at the Addictive Behaviors Research Center at the University of Washington, for individuals in recovery from addictive behaviors.
The program is designed to bring practices of mindful awareness to individuals who have suffered from the addictive trappings and tendencies of the mind. MBRP practices are intended to foster increased awareness of triggers, destructive habitual patterns, and “automatic” reactions that seem to control many of our lives. The mindfulness practices in MBRP are designed to help us pause, observe present experience, and bring awareness to the range of choices before each of us in every moment. We learn to respond in ways that serves us, rather than react in ways that are detrimental to our health and happiness. Ultimately, we are working towards freedom from deeply ingrained and often catastrophic habits.
Similar to Mindfulness-Based Cognitive Therapy for depression, MBRP is designed as an aftercare program integrating mindfulness practices and principles with cognitive-behavioral relapse prevention. In our experience, MBRP is best suited to individuals who have undergone initial treatment and wish to maintain their treatment gains and develop a lifestyle that supports their well-being and recovery.
The primary goals of MBRP are:
1. Develop awareness of personal triggers and habitual reactions, and learn ways to create a pause in this seemingly automatic process.
2. Change our relationship to discomfort, learning to recognize challenging emotional and physical experiences and responding to them in skillful ways.
3. Foster a nonjudgmental, compassionate approach toward ourselves and our experiences.
4. Build a lifestyle that supports both mindfulness practice and recovery.
|
Definition of alga
: a plant or plantlike organism of any of several phyla, divisions, or classes of chiefly aquatic usually chlorophyll-containing nonvascular organisms of polyphyletic origin that usually include the green, yellow-green, brown, and red algae in the eukaryotes and especially formerly the cyanobacteria in the prokaryotes
Love words? Need even more definitions?Merriam-Webster unabridged
Words at Play
Ask the Editors
Ending a Sentence with a Preposition
An old-fashioned rule we can no longer put up with.
'All Intensive Purposes' or 'All Intents and Purposes'?
We're intent on clearing it up
'Mispronunciations' That May Be Fine
'Mischievous,' 'nuclear,' and other words to pron...
Why Did Yankee Doodle Call a Feather 'Macaroni'?
What's with his feathered cap?
|
Human papillomavirus, or HPV, is linked to nearly all cervical cancers in women and to several other cancers in both sexes. Of the nearly 34,000 HPV-associated cancers that are diagnosed each year, two-thirds occur in women. In this podcast, Dr. Meg Watson discusses HPV prevention. Created: 5/10/2012 by MMWR.
Date Released: 5/10/2012. Series Name: A Cup of Health with CDC.
A CUP OF HEALTH WITH CDC
Human Papillomavirus-Associated Cancers — United States, 2004–2008
Recorded: May 8, 2012; posted: May 10, 2012
[Announcer] This program is presented by the Centers for Disease Control and Prevention.
[Dr. Gaynes] Welcome to A Cup of Health with CDC, a weekly feature of the MMWR, the Morbidity and Mortality Weekly Report. I'm your host, Dr. Robert Gaynes.
Human papillomavirus, or HPV, is linked to nearly all cervical cancers in women and to several other cancers in both sexes. Of the nearly 34,000 HPV-associated cancers that are diagnosed each year, two-thirds occur in women.
Meg Watson is a researcher with CDC's Division of Cancer Prevention and Control. She's joining us today to discuss how to prevent HPV. Welcome to the show, Meg.
[Ms. Watson] Thanks for having me.
[Dr. Gaynes] Meg, how is HPV transmitted?
[Ms. Watson] Genital HPV is very common and it's usually transmitted through sexual contact.
[Dr. Gaynes] Does HPV infection always lead to some form of cancer?
[Ms. Watson] No. HPV infection usually goes away on its own. If it doesn't, it can cause cancer over time. There's no treatment for HPV infection. The most common disease resulting from the infection is cervical abnormalities, possibly leading to cancer. Those abnormalities can be found and treated through cervical screening, or Pap testing. Since the infection is so common, screening is recommended for women every three years, starting at age 21, trough age 65. Women age 30 and older have the option to get the HPV test, along with the Pap test, and extend screening intervals to five years.
[Dr. Gaynes] How can HPV infection be prevented?
[Ms. Watson] Condom use and limiting sexual partners can help reduce, but not eliminate, the risk of HPV infection. An HPV vaccine can help prevent infection with the types that most commonly cause cancer, but the vaccine is most effective when given before beginning sexual activity.
[Dr. Gaynes] Well, who should receive the HPV vaccine?
[Ms. Watson] A series of three doses is recommended for girls and boys, age 11 to 12, and can be given as young as nine. Those who haven't already received the vaccine can get catch-up vaccination up to age 26 for women and 21 for men.
[Dr. Gaynes] Where can listeners get more information about HPV?
[Dr. Gaynes] Thanks, Meg. I've been talking today with CDC's Meg Watson about ways to prevent HPV infection.
Remember, HPV vaccines help prevent infection. Both boys and girls aged 11 and 12 years old should receive three doses of the vaccine. A catch-up vaccine is recommended for women through the age of 26 and for men through the age of 21 who have never completed the series.
Until next time, be well. This is Dr. Robert Gaynes for A Cup of Health with CDC.
[Announcer] For the most accurate health information, visit www.cdc.gov or call 1-800-CDC-INFO.
|
Late astronaut Neil Armstrong's historic 1969 moonwalk put dreams of spaceflight in the heads of countless kids around the world — including one Canadian nine-year-old who would grow up to become his nation's first International Space Station commander.
Chris Hadfield is slated to assume control of the huge orbiting laboratory in March 2013, something no Canadian has ever done. And he said watching Armstrong — who was memorialized in a public ceremony today (Sept. 13) in Washington, D.C. — take that famous "one small step" inspired him to work toward becoming an astronaut, despite some pretty steep odds.
"When I was a kid, it was impossible to be an astronaut. It wasn't just hard — it was impossible. There was no Canadian astronaut program," Hadfield told SPACE.com.
"But I thought, as a nine-year-old Canadian kid, 'Well, shoot. We just landed on the moon for the first time, and nobody ever did that before,'" Hadfield added. "'So maybe things will change, and even though it's impossible now, I'm going to start getting ready.'"
Hadfield is scheduled to launch toward the station aboard a Russian Soyuz spacecraft on Dec. 5. He and two fellow spaceflyers — NASA astronaut Tom Marshburn and Russian cosmonaut Roman Romanenko — will round out the orbiting lab's six-person Expedition 34 when they get there.
NASA astronaut Kevin Ford will command Expedition 34. But Hadfield will take charge of Expedition 35, which begins when Ford and Russian cosmonauts Oleg Novitskiy and Evgeny Tarelkin depart the station in March.
Hadfield has spent a total of 20 days in space on two space shuttle missions — STS-74 in 1995, which helped build Russia's Mir space station, and STS-100 in 2001, an International Space Station assembly flight. He said he's thrilled that he'll get to live on orbit for a five-month stretch this time around, and honored to be selected as commander.
"It is hugely exciting and a great honor to be asked to be the commander of the International Space Station," Hadfield said today during a press briefing to preview Expeditions 34 and 35. "It's just a dream come true."
Neil Armstrong vaulted to icon status on July 20, 1969, when he became the first person ever to set foot on another world. The words he uttered upon stepping onto the moon — "That's one small step for [a] man, one giant leap for mankind," are among the most famous ever spoken.
Armstrong died Aug. 25 following complications from a recent heart surgery. He was memorialized first in a private ceremony in Cincinnati on Aug. 31, then in a public service today at Washington National Cathedral. The former Navy pilot is scheduled to be buried at sea Friday (Sept. 14).
|
The emotional bond between mother and child plays a powerful role in emotional health and well-being as children grow into adults, but can it have an effect on whether they develop heart problems? An intriguing new study by a team of researchers at the University of Minnesota suggests that it can. The study, which was recently published in the journal Health Psychology, uses data taken from the National Longitudinal Study of Adolescents to Adult Health (also known as Add Health to determine the impact of a strong maternal bond on whether or not participants develop cardiovascular problems later in life.
Add Health is a longitudinal study which follows thousands of participants beginning in early adolescence and continuing through to middle adulthood. Along with data on emotional and physical well-being, the research also looks at factors such as family relationships, romantic relationships, and ties to the community. Conducted in a series of "waves" starting with the 1994-1995 school year and continuing through to the latest wave in 2016 to 2018, the Add Health research project has already led to hundreds of research articles on a wide range of different topics relating to how emotional and physical health changes across the lifespan.
In this latest study, lead researcher Jenalee Doom of the University of Minnesota's Institute of Child Development and her co-researchers used Add Health data to assess how maternal warmth during adolescence affected later health. They focused on cardiovascular disease (CVD) since it is now the leading cause of death for men and women. Not only does it account for over two thousand deaths a day in the United States alone, but 40.5 percent of all Americans are expected to have some form of CVD by 2030. This makes identifying those factors that can increase or decrease risk of CVD more critical than ever.
But why would maternal warmth during childhood help protect against heart disease later in life? Research studies have already found a range of biomarkers associated with CVD that appear to be influenced by a strong maternal bond in childhood. These include blood pressure, heart rate, cortisol, cholesterol, glucose, and insulin levels. Adults who experienced secure attachments to their mothers as infants were also less likely to experience inflammation-linked conditions such as hypertension, stroke, diabetes, and heart disease than their counterparts who were insecurely attached as infants. A 35-year follow-up study by Gary Schwartz and Linda Russek found that 91 percent of men without a warm relationship with their mother during early adulthood developed chronic disease (heart disease, hypertension, alcoholism) later in life. For those men who did have a warm relationship, only 45 percent suffered from chronic illness decades later.
To read more, check out my new Psychology Today blog post.
|
In today’s world it seems like anything can fall victim to a cyber attack. We all know that a computer, wireless network, server, (etc.) can be compromised. Now imagine that you’re at work and you see a ransomware message on your coffee machine’s screen. That’s right… a COFFEE MACHINE. This may sound ridiculous but it did happen and could happen to any workplace. Bet you didn’t know ransomware is now a part of the new continental breakfast.
A chemical engineer with a degree in computer science posted this instance on Reddit and explained exactly what happened that led to this attack on their workplace coffee machine. It all began when a factory worker encountered a ransomware message on his computer, he then called the help desk to get the issue resolved and stepped out to grab a cup of coffee. The worker then noticed the same message on the coffee machine’s screen. Now, this ransomware did not just shut down the employee coffee supply and hold it for ransom (which, that would be a whole other nightmare),this ransomware spread throughout the factory and shut down factory systems. So how did this all happen?
Coffee machines are supposed to be connected to their own isolated WiFi network, the person who was installing the network made the mistake of connecting it to the internal control room network, when they noticed the coffee machine still wasn’t getting internet they then connected it to the isolated WiFi network. While a hacker was poking around in their systems they noticed that huge security fall and managed to squirm their way into the system and gridlock the entire factory network.
A coffee machine is not the only issue, practically any computer- implemented or computer enabled device can be compromised, this then leads to a wild search for what else is connected to that same network that could also become infected? Network vulnerability is like a screen door. If you do not pay attention and their is the tiniest hole in the screen somehow at least one fly will manage its way through and get into your home.
Being proactive and making sure your systems are always being monitored for any issues is very important. Implementing the right security precautions and making sure your network is sealed tight is the only way to prevent malware from grid locking your network. Finally, please make sure your office coffee machine is installed properly!
|
Yesterday was the International Day for Elimination of Violence Against Women—is the glass half empty of half full?
It is clear that this day calling for the elimination of violence against women is still necessary—in fact, it is crucial. Despite notable advances, many millions of women still suffer victimization and gender-based violence—physical, sexual, emotional, and psychological. Female genital mutilation, child marriage, marital rape, and other forms of gender-based violence (GBV) remain epidemic and have serious psychological, emotional, and economic consequences.
Skepticism about reports of sexual violence is still with us. Few rapes are reported and only a small proportion of these cases lead to arrest and prosecution. Indeed we still live in a “rape culture” where tales of sexual assault are dismissed as “locker room talk” and perpetrators are not held accountable for their behavior. Yes, there have been countless and pronounced steps forward in the past 40 years (which is when I started my work in this area.) United Nations (U.N.) and governmental proclamations against violence against women (VAW) have proliferated and much research on prevention and consequences of GBV has been funded and has resulted in evidence-based practice. We have witnessed reform of laws against sexual and domestic violence, new policy and practice as it pertains to prevention and intervention, and new and much more widespread services for survivors.
Not long ago sexual assault and domestic violence were hidden behind closed doors or kept secret as shameful and somehow the fault of the woman or girl. Today, while such misguided opinions and judgmental attitudes still exist, we have witnessed significant changes in the U.S. and in many countries around the world. Violence against women is a topic that is no longer hidden. Attention is focused on GBV across the globe, in war zones and in the aftermath of conflict or disaster. We can note the successes of the Violence Against Women Act, the U.S. Department of Justice Office on Violence Against Women, and the more recent White House Task Force to Protect Students from Sexual Assault. Also there are efforts to curb and eliminate domestic sex trafficking and human trafficking in the U.S. and around the globe. Social media also keeps this issue in the forefront and no longer hidden, we are counting dead women and we #sayhername aloud recognizing the intersections of gender, race, and violence.
We must celebrate the achievements and thank those who have worked so hard to make these advances… but we must not lose sight of the fact that there is much work to be done. It is clear today that while the governmental and international organizations have done and can do much to support changes to eliminate violence against women, this work has always needed the work of many hands. And in our future, there is likely continued fluctuation in support of the elimination of all forms of VAW. As always, we need to assure, pledge, and guarantee continued support and funding of this work—support that will come from many donors-- individuals, centers, working groups, and private foundations. Today we must re-double our efforts to encourage support for the elimination of violence against women from everyone—every woman and every man.
Linda M. Williams, Ph.D. is a senior research scientist and the director of the Justice and Gender-Based Violence Research initiative at the Wellesley Centers for Women at Wellesley College.
|
Linear Stepper Motor Drivers: What You Need to Know
Stepper motors are widely used in various industries and applications that require precise and controlled movements. Linear stepper motors, in particular, have gained popularity due to their unique characteristics and advantages. In this article, we will delve into the world of linear stepper motor drivers, exploring everything you need to know about their functioning, features, applications, and more.
Understanding Linear Stepper Motors
A linear stepper motor is a type of stepper motor that converts rotational motion into linear motion. Unlike traditional stepper motors, which rotate a shaft or spindle, linear stepper motors move along a linear path. This makes them ideal for applications that demand precise positioning and accurate control over linear movements.
Working Principle of Linear Stepper Motors
To comprehend the functioning of linear stepper motor drivers, it is essential to understand their working principle. A linear stepper motor typically consists of a rotor, a stator, and a lead screw. The rotor is a permanent magnet, while the stator contains multiple electromagnetic coils. The coils are energized in a specific sequence, generating a magnetic field that interacts with the rotor magnet. This force causes the rotor to move along the lead screw, resulting in linear motion.
Advantages of Linear Stepper Motor Drivers
Linear stepper motor drivers offer several advantages over other motion control technologies. Let's explore some of the key benefits:
1. Precise Positioning: Linear stepper motor drivers can achieve highly accurate positioning due to their inherent step-by-step motion. This capability is crucial for applications such as robotics, 3D printing, CNC machines, and industrial automation.
2. Speed Control: These drivers facilitate excellent speed control, allowing for smooth and consistent motion with minimal vibration. The ability to fine-tune speed is beneficial in applications requiring increased precision or variable speeds.
3. High Torque: Linear stepper motors deliver high torque even at low speeds, making them ideal for applications that demand both strength and accuracy. This characteristic enables them to handle heavy loads and perform tasks that traditional motors may struggle with.
4. Direct Drive: Linear stepper motors are typically designed for direct drive applications, eliminating the need for mechanical components such as gears or belts. This direct coupling enhances efficiency, reduces backlash, and simplifies the overall system design.
5. Easy to Use: Linear stepper motor drivers are relatively straightforward to implement and control. With the right driver and software, even beginners can quickly get their systems up and running. This ease of use also extends to maintenance and troubleshooting, minimizing downtime and expenses.
Applications of Linear Stepper Motors
The versatility of linear stepper motors enables their utilization in a wide range of fields. Here are a few notable applications where linear stepper motor drivers are commonly employed:
1. Medical and Laboratory Equipment: Linear stepper motors find extensive use in medical and laboratory equipment, such as infusion pumps, syringe dispensers, DNA sequencers, and sample handling systems. These applications rely on precise movement and positioning for accurate results and reliable operation.
2. Packaging and Material Handling: In industries like packaging and logistics, linear stepper motors ensure efficient material handling, sorting, and packaging. They can precisely control conveyor belts, robotic arms, and other equipment involved in packaging processes.
3. 3D Printing and CNC Machining: Linear stepper motors are crucial components in 3D printers and computer numerical control (CNC) machines. They enable precise control over the movement of print heads and machining tools, resulting in highly detailed and accurate output.
4. Textile Machinery: Textile machinery, such as looms and embroidery machines, rely on linear stepper motors for guiding threads, controlling needle movements, and precise fabric positioning. These motors play a vital role in achieving intricate patterns and designs in the textile industry.
5. Semiconductor Manufacturing: Linear stepper motors are widely used in semiconductor manufacturing equipment, which requires extreme precision and nanometer-scale positioning. They contribute to the production of microchips, ensuring flawless fabrication processes and enhancing overall efficiency.
Choosing the Right Linear Stepper Motor Driver
Selecting an appropriate linear stepper motor driver is vital to ensure optimal performance and compatibility with your application. Here are a few factors to consider:
1. Power and Voltage Ratings: Determine the power and voltage requirements of your specific motor and application. Ensure that the driver you choose can provide sufficient power supply and meet the voltage specifications.
2. Microstepping Capability: Microstepping allows for smoother and more precise motion control by dividing each step into smaller increments. Evaluate the microstepping options provided by different drivers and choose one that suits your application's level of accuracy.
3. Current Limiting: Linear stepper motors require a specific amount of current to function correctly. Look for a motor driver that offers adjustable current limiting to protect the motor from overheating and ensure efficient performance.
4. Communication Interface: Check the available communication interfaces provided by the driver, such as USB, RS-232, or Ethernet. Select a driver that is compatible with your system and offers an interface that suits your connectivity needs.
Linear stepper motor drivers play a crucial role in achieving precise and controlled linear motion in various industries. Understanding their working principles, advantages, and applications ensures that you can make informed decisions while selecting the appropriate driver for your specific requirements. By leveraging the unique capabilities of linear stepper motor drivers, you can unlock a world of possibilities for your motion control applications..Smooth Motors is a professional Linear Stepper Motor supplier and manufacturer in China, with more than 10 years of manufacturing experience, which can provide high quality and direct factory price, welcome to contact us!
|
Every lock requires a unique key. Similarly, every individual's brain is different and requires a different approach to leading a mentally fit lifestyle. Allied Therapy for mental health solutions might seem alienated, but it has been used for a while now. The need for integrated mental health and social care services in community settings is increasing, requiring the inclusion of allied therapies. The definition of allied health varies due to differing perspectives and medical occupations that may or may not identify as allied health. Recognizing and incorporating allied therapies is essential to ensure comprehensive care in community-based settings. Following are the types of Allied Therapy and their benefits.
Types of Allied Therapy
Various types of Allied Therapies can be used in the mental disorders of an individual according to their stimuli. Here are some common types of Allied Therapy frequently suggested to the masses.
- Art Therapy: Art therapy uses creative processes and art materials to help individuals explore their emotions and experiences in a safe and supportive environment. It can benefit individuals who have difficulty expressing themselves verbally or have experienced trauma.
- Yoga: Yoga involves the practice of physical postures, breath control, and meditation to promote relaxation, reduce stress, and improve physical and mental well-being. It has been found to be a significant contributor to reducing symptoms of anxiety and depression.
- Meditation: Meditation focuses on one's attention to achieve a calm and relaxed state of mind. It has been found effective in reducing symptoms of anxiety, depression, and stress.
- Mindfulness: Mindfulness involves giving attention to the present moment in a non-judgmental way. It has a significant impact on reducing symptoms of anxiety and depression, improving cognitive functioning, and enhancing well-being.
- Dance Therapy: Dance therapy involves movement and dance to facilitate emotional, cognitive, and physical integration and healing. It can help individuals express their emotions, improve body awareness, and reduce symptoms of depression and anxiety.
- Tarot Card: Tarot readings can be helpful for individuals experiencing anxiety or depression, as the cards can provide guidance and clarity. Additionally, focusing on the cards and their meanings may help reduce feelings of stress and overwhelm by promoting relaxation and introspection.
If this blog has piqued your interest in any of the above Therapy and you want to know more about it, then you can visit Solh Wellness, where we have more than 30 professionals available to guide you.
Benefits of the Allied Therapy
Along with helping to overcome certain mental health disorders like depression and anxiety, there are other benefits of Allied Therapy.
These alternative therapies can empower individuals and provide a safe and supportive environment to explore their emotions and experiences. While the definition of allied health varies, and certain occupations may or may not identify as allied health, it is crucial to recognize and include allied therapies in mental health care to ensure that individuals receive holistic and personalized care.
Integrating Allied Therapy into Mental Health Treatment Plans
Incorporating allied therapies into community-based mental health and social care services can enhance the comprehensiveness and effectiveness of mental health care. Including allied Therapy in mental health treatment plans has shown to be a beneficial approach to improving mental health outcomes. Allied Therapy, such as art therapy, dance therapy, yoga, and meditation, can provide individuals with a supportive environment to explore their emotions, increase self-awareness, and reduce stress and anxiety. Incorporating these therapies into mental health treatment plans can enhance the overall effectiveness of treatment and promote holistic and individualized care.
Allied Therapy is a holistic approach to mental health treatment. This can have a long-lasting effect on the individual and has no side effects or repercussions like the therapeutic approach.
If you've been struggling with mental health disorders for a while and want a personalized approach, connect with Solh Wellness. With Allied Therapy programs, we strive to remove the stigma around mental health and give them the best treatment at affordable rates. Download the Solh App and take a first towards your better mental health.
|
Generators may offer some conveniences during periods of long-term power outages, but they can also be dangerous and even deadly if they are not used or installed correctly.
Portable generator safety
- Never plug a portable generator into a wall outlet or connect directly to a home's wiring. This can back-feed and energize power lines which creates a life threatening situation for linemen working on power lines.
- Read and follow all manufacturer operating instructions to properly ground the generator.
- Test the ground fault circuit interrupter, commonly known as a GFCI, on the generator every time you fire up the engine.
- Maintain adequate ventilation. Generators emit carbon monoxide. Do not operate a generator in your home, garage, or other enclosed building.
- Keep children and pets away from generators at all times.
- Use proper extension cords. Use only safety-tested, shop-type electrical cords designed and rated for heavier, outdoor use to connect appliances.
- Turn off the generator and allow it to cool before refueling.
- Before shutting down a generator, turn off and unplug all appliances and equipment being powered by the generator.
Contact an electrician to determine the best equipment for your situation or needs. A professional electrician will know the existing safety codes and the Cooperative's safety requirements.
|
At some point in your life, you’ll accidentally drop something into the sink. If it’s small and of little value, like a grape, it may not be an issue. You let the water run and flush it through. But if your kid slips a big piece of Lego down the drain, you’re going to have some bigger problems when it gets stuck in your pipes.
That’s kind of like what happens during a sickle cell crisis. Red blood cells are usually round and have some give to them -- their shape lets them move easily throughout your body. But when you have sickle cell disease (SCD), some cells are curved -- like a sickle--and hard. They don’t flow as easily, and they can get stuck in the small blood vessels of your chest, belly, and joints. That’s when you have a sickle cell crisis.
The stuck cells slow or even totally block blood flow, so some parts of your body don’t get the oxygen they need. That can cause intense pain that lasts anywhere from a few hours to a few weeks. But you can take steps to lower your chances of a crisis. And even when one comes on, you may be able to care for yourself at home.
The most common sign is pain that might be dull, stabbing, throbbing, or sharp, and seems to come out of nowhere. How severe it is and how long it lasts varies with different people and different crises. Some people have crises here and there, while others may have them every month.
You might feel the pain anywhere in your body and in more than one place, but it’s often in your:
- Arms and legs
- Hands and feet (more typical in young children)
- Lower back
You may also have:
Typically, you won’t know why you had a crisis, and there may be more than one cause. Possible triggers include:
- Being at high altitudes (mountain climbing, for example)
- Changes in temperature, like if you go from a warm house into a cold winter day and you haven’t bundled up
- Not having enough to drink (dehydration)
Two drugs have shown promise. The drug called L-glutamine oral powder (Endari) has proven to help prevent these crises from occurring and thus preventing hospitalizations. Hydroxyurea (Droxia, Hydrea, Silkos) prevents abnormal red blood cells from forming. This reduces the number of painful crises from sickling blood cells.
Your doctor can help you come up with a plan for how to handle a crisis. If you need to go to the hospital for treatment, make sure to take your plan with you.
Often, you can treat the pain at home. When a crisis first starts, your doctor will likely suggest you drink plenty of liquids and take an over-the-counter pain medicine, such as ibuprofen or acetaminophen. Talk to your doctor to see what’s safe for you. For example, if you have a kidney problem, acetaminophen might be the better choice. For more severe pain, your doctor may give you a stronger medicine.
You can also try a heating pad, hot bath, or a massage. Physical therapy may provide some relief, too. And don’t forget to tend to your mind. Counseling, relaxation methods like meditation, and seeking support from family and friends are key steps in keeping yourself well.
If you can’t manage the pain at home, go to an emergency room, where they can give you stronger pain medicine. You may need to stay in the hospital until the pain is under control.
How Can I Prevent a Crisis?
There’s no sure way, but you can lower your odds:
- Avoid swimming in cold water.
- Dress in warm clothes when it’s cold out or when you’re in air-conditioned buildings.
- Drink plenty of water.
- Fly only on commercial airlines. Planes that don’t control air pressure could cause you problems.
- Limit how much alcohol you drink.
- Manage your stress.
It also helps to keep yourself as healthy as possible:
- Avoid being around people who are sick.
- Don’t smoke.
- Exercise, but drink plenty of liquids and don’t push too hard. Activities like intense weight training may put too much stress on your body.
- Get prenatal care right away if you’re pregnant or you’re planning on it.
- Manage any other health conditions you may have, like diabetes, with your doctor’s help.
- Stay up to date on your shots and vaccines.
- Tell your doctor if you have any sleep problems, like snoring.
- Wash your hands often.
|
Ethical theories enable us to contemplate issues and make rational decisions about the proper action to take. They assist us to be moral agents with a conscience by pointing out one's duties in such occasions. These theories also guide the choices we make in particular cases. Examples of these ethical theories are the big three theories of Utilitarianism, Kantianism and virtue ethics.
In this case, an intelligent Grade 13 high school student faces a situation, which requires careful assessment to make a rational decision. The student always tops his class and this time around, for his final exam, he must submit an essay. He is also in line for a major scholarship opportunity to one of the best universities. Failure to pass this essay automatically disqualifies him for the scholarship even though no one else qualifies for it but him. The boy’s mother, a single mother, is very sick and being the eldest child, it is his responsibility to take care of his younger siblings.
These circumstances make it difficult for him to put efficient effort in preparation of his essay. He thinks of purchasing an essay from one of the commercial services that write essays for students. After all, his fellow students use it, as well. As an added advantage, the cost sounds quite fair given that the essay guarantees him success. The chances of being caught are also very little or even none at all. He decides to seek the counsel of a few friends; most of whom think there is nothing wrong with buying the essay.
Utilitarianism theory involves consideration of the actions to perform and thinking about the aftermath. The action to take is that from which we derive the greatest amount of pleasure and which causes the least amount of suffering to the largest number of people. There are various types of Utilitarianism. One of them is Act Utilitarianism. It advises that the actions to take are those that cause the most amount of happiness to the largest population of people. Another type is Rule Utilitarianism. It involves adhering to the rules adopted by one’s society assuming that this leads to the production of the most good for the majority. People’s actions are, therefore, right if and only if they conform to the moral codes that lead to the production of the general welfare.
a) What aspects of the case would each theory draw owe attention to?
The ethical theory of utilitarianism directs ones attention to the aspect of punishment in the case. Should the boy plagiarize someone else’s work, what are the consequences to face? According to this ethical theory, the sole purpose of an action, punishment included, is to bring about good consequences. Failure of the achievement of a corrective reason deems the punishment useless. Consequences are vital hence; the student should receive punishment if he engages in the act of plagiarism and not get the scholarship to the university. The boy too should confine himself to the real dilemma that he faces and carefully think about the penalty that his actions might attract. Moreover, the boy should see whether his actions would benefit others. Obviously, here, they would not because if he fails to make it to the university, he might not be able to cater for his family in the future. He would also forego the great chance of getting quality tertiary education and might have to settle for a simple institution, if he is not completely expelled from school.
The next significant ethical theory is that of Kantianism. Kantianism primarily involves asking oneself whether the actions undertaken are right or wrong. It differs from Utilitarianism in that Kantianism focuses on goodwill whereas utilitarianism bases its focus on happiness. In Kantianism, the essential thing is the performance if the right actions for the correct reasons. Intelligence, as in the case of the student, is only valuable if sound will accompanies it. Even if the good will accomplishes nothing, it remains good. One of the key issues in Kant’s theory is reason. The will to act in accordance to the provided, reasonable set of rules is what makes a good will good. Reason gives guidance on what to do. Any given moral rule (e.g. Plagiarism is wrong) is a discovery of reason and total admission of no exceptions.
The other main factor in Kantianism is duty. A good will is good if done for the sake of duty i.e. the undertaking of an action should be for the sake of the law. Therefore, it would be wrong for the student to buy the essay as this means lack of conformity to the law. At times, things done in good faith are not as sound as those undertaken for duty’s sake. This is because these actions are simply contingent. If there were different inclinations, reactions might also be different. Acting based on inclinations is not very advisable. This could lead us to behaving unfavorably towards others hence duty is crucial in ensuring adherence to moral rules.
Kant goes on to provide a test through which all actions must go to ascertain that they are moral. This test is the Categorical Imperative (C. I). Generally, imperatives tell an individual what he or she ought to do. Categorical imperatives tell one to do something regardless of its consequences, as that action is a moral requirement. The C. I. is primarily a test of logic. It requires that none of one’s actions contradict them. This means that if one is in a situation requiring moral decision-making, one should not make one that brings about some contradiction to them.
The student is to receive the scholarship if he passes by doing his own genuine work and not plagiarizing. He would be contradicting himself by buying the essay and presenting it as his own just so that he attains the scholarship, given that he is intelligent and is probably conversant with the rules.
The third major theory is Virtue Ethics. The question to ask here is: What kind of person should an individual be? Virtue ethics has its emphasis on whole life. This only means that individuals ought to work to be virtuous. Secondly, the theory connects actions to an agent and to the character. What a person did is not what is necessary, but the character revealed. The role of virtue ethics is to mold the development of that character in coming days. The theory also provides a reason to be virtuous in that having virtues means proper living, which brings us joy. Aside from all this, virtue ethics helps give foundation to the considerations of ethics in professions.
Virtue ethics, in this case, therefore, directs attentions to what the student should be. It is advisable that he be sincere in his pursuit of the scholarship even if it means having to fail. The virtue in focus here is honesty; academic honesty. By bearing this principle, the boy can be a better person even in the future. If he chooses to go down the road of plagiarism, he might face tough consequences and never get another chance to try out for the scholarship again. However, if he decides to do his own work even if it means failing, the school authority might be lenient enough to understand the situation at home and provide him another opportunity.
b) What would each theory suggest as a solution to the ethical dilemma in the case? (To answer this part, you must clearly set out how you perceive the ethical dilemma).
The ethical dilemma is whether the student should buy the essay and present it as his own to gain success and obtain the scholarship or do his own genuine work even if it means failure. Utilitarianism theory suggests that should the boy present someone else’s work as his very own he must accept the consequences.
Kantianism states that such actions as cheating contradict themselves in a way. If made universal, they would undermine their fundamental practices. For instance, while this student was to get away with plagiarism on his essay if all students committed the act of plagiarism, the entire purpose of setting exams breaks down. The purpose of the essay is to grade students and test their knowledge to reward the successful ones e.g. with the scholarship. If the intelligent student fails, then like the rest of his fellows, he should not receive that scholarship.
Lastly, Virtue ethics suggests that individual should develop a character of virtuousness. The student, therefore, must strive to be honest in his work and hand in only his own genuine paper.
c) Which resolution do you think best and why?
It is best that the student displays academic honesty and not present the bought essay as his own original work since this could lead to dire consequences. He might be forced to redo the essay and miss the chance of attaining the scholarship at that time or fail it overall. He could even get a reduced grade in his course and receive a grade showing he failed with academic dishonesty. This could ruin his reputation among his teachers as well as his peers. In addition, he would become a disappointment to his family, especially his younger siblings who look up to him. The boy also risks dismissal from the school with a record of academic dishonesty, which taints him.
The wise thing to do is to sit down and carefully think things through before undertaking any action. This means carefully analyzing the situation and pondering about the consequences that each act can attract and how the act might affect those around him. It is also advisable to uphold the virtue of academic honesty as this helps one grow into a better individual even in the future. This means developing one’s own knowledge and skills by themselves and not sourcing for help that will otherwise make them believe they have acquired the knowledge and skills. It also attracts less severe consequences if any are to be present at all.
Beauchamp, T. L., & Bowie, N. E. (1993). Ethical theory and business. Englewood Cliffs, NJ: Prentice Hall.
French, P. A., Uehling, T. E., & Wettstein, H. K. (1988). Ethical theory: Character and virtue. Notre Dame, IN: University of Notre Dame Press.
Dewey, J., & Tufts, J. H. (1932). Ethics. New York: H. Holt and Company.
Beauchamp, T. L., & Childress, J. F. (1994). Principles of biomedical ethics. New York: Oxford University Press.
|
What are some exercises in laughter therapy?
Yoga of Laughter
Tips for beginners
- One laughing man is beautiful, two is better, three is better. Dr. Kataria believes that classes in the group are more effective than individual practice. Because they allow all members of the group to “get infected” with laughter from each other, thanks to which there is a so-called. hysterical laughter, which is most useful for health.
- It is very important that a person has a desire to laugh, which helps with joy to perform the exercises of Hasya Yoga.
- You do not need to monitor your laughter, evaluate its quality, melody or attractiveness of your face during laughter. The purpose of the classes is not to create a beautiful laugh, but to gain health benefits.
- Develop a child’s playfulness and carelessness. Children laugh with their whole body, and adults with reason, so children laugh 400-500 times a day, and adults hardly 10-15 times.
- To develop the habit of laughing, one should practice laughing yoga daily for 40 days. It does not matter whether you are going to group lessons all this time or whether you will laugh yourself – it is important that the 40-day formula works.
- Hassia Yoga classes should last 15 minutes. You can start with less time, trying to gradually increase the time. The best time for classes is the morning. During the day, you need to give a few more minutes of laughter to get a positive charge.
Yoga exercises of laughter
Stand up straight, close your eyes, completely relax. Think of something good that can make you smile (not laughter). As soon as a warm feeling appears inside you – smile at him. Feel the joy within you grow, fill and overwhelm you. As the joyous feeling grows, your smile should grow wider and wider until, finally, you do not want to laugh in your voice. Smile, continue to grow a sense of joy in yourself, laugh louder and louder until you start laughing. Laugh as much as you want. When you are free, relax. Repeat 3 times.
Stand up straight, close your eyes, completely relax, stretch your arms in front of you and inhale through your nose and exhale through your mouth noisily. Then take a breath while inhaling, and laugh at the exhalation. Do this exercise for 10 minutes.
The task of the exercise is to laugh, imitating some animal.
Sit down, legs are slightly apart, hands are laid back. Your laughter should look like a happy cackle (“ho-ho-ho”).
Smile of a lion
Bend your elbows forward, spread your fingers. Yawn as broadly as possible, sticking out the language “ha-ah-ah.” Repeat 3-5 times at a slow pace.
Take a wooden stick in your teeth, squeeze it as hard as you can, stretching your lips in a smile, hold on for 20 seconds, then gradually loosen the grip and finally relax completely without releasing a stick from your mouth. Repeat the exercise 5-6 times.
Exercise is very simple – you have to try to laugh so that laughter turns into a grunt. If you do not immediately get a natural grunting laughter – just grunt and laugh.
Laughter of the monkey
Draw a monkey in front of the mirror. Jump up and laugh “hoo-hoo-hoo”.
Throw your head back, screw up your eyes, wrinkle your nose, stretch out your lips and laugh as thinly as a mouse: “hee-hee-hee.”
Laughter of the Elephant
Arrange legs and arms, draw air into the chest and laugh with a low good-humored elephant laugh “ho-ho-ho” or “ha-ha-ha”.
You can try to portray the laughter of other animals as you imagine it. If you are in a group, try to make someone laugh with your idea. If it succeeds, laugh as freely as you want.
Laughing on the phone
Bring your hand to your ear, as if you have a phone in your hand. Pretend that someone is calling you and telling something hilarious. Laugh as much as possible infectious and more fun. If you are in a group, during a “telephone conversation” try to establish eye contact with someone from the audience. If it succeeds, imagine what it is you are talking on the phone, and laugh together.
Imagine that you are a motor boat and someone is trying to get you. From the bottom of your chest (the area of the diaphragm) there should be “clockwork” sounds – first low, quiet and slow “ho-ho-ho”, then faster and higher, louder and more active “ha-ha-ha.” And so a few minutes until the “boat” finally starts. Give it a few seconds, then relax.
Dance with an inflatable ball
This exercise can only be performed in a group. Two participants without arms try to keep the inflatable ball, sandwiched between their chest cells. In this case, the partners perform dance movements like a waltz – they move in a circle and still circle around the ball. You can laugh and laugh at the time of this exercise, serious concentration on the precise execution of the exercise is useless, but we must try not to drop the ball, do as many dance circles as possible. As mutual understanding between partners grows, you can complicate the task and dance, for example, tango with a ball or cha-cha-cha.
|
Radio waves produced during solar flare eruptions on the Sun can cripple the Global Positioning System (GPS) and other communication technologies here on Earth, scientists say.
The finding, announced today at the first Space Weather Enterprise Forum in Washington D.C., was confirmed during an exceptionally strong solar eruption last December that produced 20,000 times more radio emissions than the Sun does normally.
During solar flares, high-energy electrons are injected into the Sun's upper atmosphere. Radio waves are produced during this process and some of them propagate toward Earth. The solar radio waves, which cover a broad frequency range, act like noise that interferes with frequencies used by GPS and other navigational systems.
On December 6, 2006, a solar flare created the most intense solar radio burst ever recorded. Using equipment built at Cornell University, scientists made the first quantitative measurements of how solar radio bursts affect GPS receivers.
"This solar radio bursts occurred during the solar minimum, yet produced as much as 10 times more radio noise than the previous record," said Dale Gary, a physicist at the New Jersey Institute of Technology. "This was enough to swamp GPS receivers over the entire sunlit side of Earth."
The scientists predict that larger solar radio bursts, expected during heightened periods of solar activity, called the solar maximum, will disrupt GPS receiver operations even further.
"The size and timing of this burst were completely unexpected and the largest ever detected," said Anthea Coster of the MIT Haystack Observatory. "We do not know how often we can expect solar radio bursts of this size or even larger."
- Image Gallery: HOT STUFF: Solar Flares
- Sun's Activity Increased in Past Century, Study Confirms
- Solar Flare Hits Earth and Mars
|
Stepping in to the COP23 climate talks in Bonn, Germany, is like wandering through an alternative reality. At no point in these vast cavernous rooms are you confronted with the sheer urgency or the scale of transformation required to reduce the risk of a fossil-fueled catastrophe.
Meanwhile, back on Earth the Global Carbon Project announced on Monday that greenhouse gas emissions from fossil fuels are expected to grow approximately 2% this year. This comes as startling news after three years of virtually no growth in global emissions.
Two years after nations signed the historic Paris Agreement, carbon dioxide in the atmosphere is rising faster than expected and the international community lacks essential leadership to tackle this crisis. The US, the world’s largest economy and second largest emitter, is rolling back on regulations that will curb emissions and save lives by reducing air pollution. China’s emissions, by far the world’s largest, are expected to rise 3.5%, despite heavy investment in clean energy.
These trends are concerning. But what is most alarming is that we continue down this treacherous path despite having the scientific and technological tools needed to transform humanity to a healthy and prosperous society.
How do we bridge the growing chasm between the geopolitical world and the geophysical world, commonly known as Earth? To put the current negotiations in context, we have just published a 10-point statement to walk through the narrative of this latest chapter in human history.
Evidence from many lines of inquiry shows Earth has entered a new geologic epoch —called the Anthropocene. The rate of change in the Earth's system is accelerating as a result of our impact on the planet’s biology, chemistry, and physics. Earth’s climate has been remarkably stable since before the dawn of civilization. This stability is at risk.
The worry is that Earth is approaching critical “tipping points”. By crossing these thresholds, the planet may see abrupt, and possibly irreversible, shifts in the workings of the Amazon rainforest, ocean currents and El Nino. Even within the 2°C upper limit mandated in the 2015 United Nations Paris Agreement, Arctic summer sea-ice could disappear, parts of the Greenland and West Antarctic ice sheets could collapse, and most coral reefs could vanish.
The record-breaking 2017 Atlantic hurricane season provides a glimpse at the increased risks of extreme weather events that the planet may experience in the future. These events include severe flooding, heat waves and droughts.
Changes are occurring quickly in the ocean, with accelerating sea-level rise and ocean acidification.
The economic costs of climate change are already being felt, and the some of the world’s poorest nations are bearing the heaviest burden.
Climate change will have a profound impact on human health by placing new pressures on the food and water security in nations around the world.
It is also likely to exacerbate migration, civil unrest and even conflict. In 2015, more than 19 million people globally were displaced by natural disasters and extreme weather events, and climate change will likely cause that number to grow.
A road-map to prosperity
The world needs to act fast: if humans continue to emit greenhouse gases at current rates, the remaining carbon budget to reduce risk of exceeding the 2°C target will be exhausted in around 20 years. Emissions should peak by 2020 and approach zero by around 2050 if the world is serious about reducing risk. As a simple rule of thumb, this means halving global emissions every decade, which can act as a golden rule.
This golden rule is a road-map to prosperity. A fossil-fuel free society is economically attractive: renewable energy sources increasingly compete with fossil fuels, even when these are priced at historic lows. Moreover, the estimated costs of inaction range from 2-10% of GDP by 2100 by some estimates, to a final invoice equivalent to a 23% collapse in global productivity.
And there is a simple shortcut to the roadmap to global prosperity. Do you want to know the secret? Put a price on carbon and remove perverse subsidies for fossil fuels which the International Monetary Fund estimates cost the global economy a staggering $5 trillion a year.
The extreme events that beset Puerto Rico, Portugal, Houston and Bangladesh in recent months show that even if the world meets the Paris Agreement targets, communities across the globe will still need to build resilience and adapt to the changes already under way.
The world can afford to become free of fossil fuels. It cannot afford to fail. We have the tools to do the job. All we need is the political will and the right road-map.
|
Researchers think biofilms may be a result of shared piping between sinks and toilets or that the flush plume contaminates nearby sinks.
Infection Control Today (ICT) recently reported on new research published in the American Journal of Infection Control that found a “high prevalence of Klebsiella pneumoniae carbapenemase (KPC) positivity in sink drains located next to toilets.”
How high? According to the research, 87 percent of patient sinks located next to toilets tested positive for KPC, while only about 22 percent of sinks situated farther away from the toilets tested positive.
The study authors, Blake Buchan and Silvia Munoz-Price are quoted saying, “This study, if validated, could have major implications for infection control.” They go on to say that if sinks next to the toilets are the problem, hand hygiene practices and sink disinfection protocols may be needed. For help dealing specifically with biofilms, ICT published an in-depth article on the topic back in 2007 and is still worth a read today.
We agree that promoting better washing and disinfecting is never a bad idea, but it’s not enough. Tracking the cause of HAIs is difficult, as is finding a definitive way of stopping them altogether. Because of that uncertainty, hospitals should do everything they can think of and hope that something they are doing, or some combination of tactics will be useful in reducing HAIs.
The ICT KPC article does point out that the research is not clear on how the contamination occurs, just that it does happen. Buchan and Munoz-Price think it is possible that the biofilms are a result of shared piping between sinks and toilets, or that flushing generates contaminated drops that reach the sink drains.
Sink design has an important role to play in helping to reduce the spread of harmful bacteria. Offset drains, deep basins that allow for adequate washing, an internal slope to reduce backsplash, little to no counter space to discourage users from placing objects on the sink, and an added layer of protection in the form of durable antimicrobial solid surface material all help in infection prevention efforts.
Another option to consider is vacuum plumbing. In an independent study, AcornVac’s vacuum system, paired with Whitehall Manufacturing toilets, was tested side-by-side with your run of the mill gravity flush toilets to compare the presence of a flush plume. NSF International reported that AcornVac’s vacuum toilets produced no detectable levels of bacteria on the toilet seat or area surrounding the toilet, whereas the gravity flush toilets had detectable levels of bacteria on the toilet seat and the area surrounding the toilet.
We are not claiming that vacuum toilets or better sink design would end the KPC issue or eliminate the spread of HAIs. But we do believe the right fixtures can play an essential role in your infection prevention toolkit.
You can learn more about Whitehall Manufacturing’s Infection Prevention Sinks here.
You can learn more about the benefits AcornVac delivers to healthcare facilities here.
|
There is now little question among economists—and, I expect, most people also— that the economy is in a coronavirus-induced recession.
The definition of a recession is actually rather simple. It means the economy takes steps backward rather than steps forward. In other words, the economy contracts, or shrinks, rather than grows and expands. Signs of a recession are increased unemployment, reduced household incomes, and lower sales and revenues for businesses.
The fact we’re now in a recession shouldn’t be surprising. Mandating that a significant portion of the economy shuts down, and that people restrict their travel in order to curtail the spread of the virus, was sure to send the economy into a nosedive. Our economy runs on human interactions and trade. When, for health reasons, those can’t occur, our economy doesn’t work.
We hope to return to normal soon. But, what will ‘normal’ be after the virus crisis? Will the economy simply pick up where it left off? Will jobs, incomes, sales, and stock values come back as quickly as they went away? Or, will we be in for a long period of modest improvements, with years passing before we fully recover?
Economists see four possible paths that any post-recessionary period can take. They are described in the form of letters.
An ‘L’ shaped recovery is what we don’t want. Here the economy improves very, very slowly – if at all – once the recession ends. It may take several years or even decades for the lost jobs, incomes, and sales to be recovered. Because the recovery is so slow, people and businesses feel as if they’re in a never-ending economic hole. Japan experienced an L shaped recovery in the 1990s.
We also don’t want a ‘W’ shaped recovery. In this situation there is a recession followed by a recovery, but then a second recession hits followed by a second recovery. In other words, the economy goes through a doubledip recession with a recovery at the end of each dip. An example is the two recessions in the early 1980s. Today some experts worry that after being contained sometime this summer, the coronavirus could reemerge in the fall and cause a second round of shutdowns and a second recession.
A ‘V’ shaped recovery is ideal. This kind of economic rebound is quick and strong. Jobs, incomes, and sales return to their pre-recession levels within months rather than years. The recessions of the early 1990s and 2000s had V-shaped recoveries. Those who see the virus being quickly beaten and the economy returning to normal by the fall are expecting a ‘V’ kind of economic boost.
The last possibility is a ‘U’ type of recovery. Like the ‘V’ recovery, the economy does get out of the recession, but it isn’t immediate. Instead, a U-shaped recovery can take months or possibly several years. The recovery from the Great Recession of 2007-2009 was of a ‘U’ shape.
While most hope for a V-shaped recovery, many economists think a U-shape is more likely for several reasons. First, while the just passed multi-trillion-dollar federal stimulus package is designed to save businesses and keep them intact until after the virus crisis passes, unfortunately I don’t think this well-intentioned effort will be totally successful. There will be some business bankruptcies and closures, meaning unemployment will stay elevated for some time.
There will also be some restructuring in the economy after it gets back on its feet. Many businesses will have innovated and changed their way of operating during the virus crisis. For example, home delivery may continue to replace some in-person dining and shopping even after the virus is gone.
These changes will create some winners but also some losers. Many workers may experience extended unemployment until they reconsider how their skills can be used in the post-virus economy.
There will be changes from, what I call, the re-adjustment factor. Just as with the Great Recession, the virus crisis will have lasting effects on our views and behaviors for decades. Some form of social distancing will continue, resulting in reductions for large gatherings at sports and entertainment venues. People may purposefully shy away from any gathering of, say, more than 50 people.
Last, we may be in for a period of extended societal fear: fear of whether the virus lingers, fear of the possibility it or a new virus will return, and fear and anxiety over all the changes the virus has caused in our lives. One economic consequence of fear is often a reluctance to take risks or commit to large purchases. Hence, one casualty of the virus could be homebuying and big-ticket items like vehicles and furniture.
The conclusion is we may be living with the impacts of the coronavirus for many years. Once the virus is eliminated, the first question is which letter of the alphabet the economic recovery will follow. You decide.
Walden is a William Neal Reynolds Distinguished Professor in the Department of Agricultural and Resource Economics at North Carolina State University who teaches and writes on personal finance, economic outlook, and public policy.
|
Whole grains contain a starchy endosperm; a nutrient-rich germ; and an outer fiber layer called bran. A whole grain product will contain all three of these elements, while refined flours have the germ and bran removed. Wheat bran and oat bran are each available as segregated food products that can be used as cereal or incorporated into baked goods and entrees. Wheat bran and oat bran both have a variety of nutritional benefits.
Soluble fiber is a soft type of dietary fiber that absorbs water as it moves through the digestive tract. This softens stool, making it easier to pass and reducing the risk of constipation, hemorrhoids and anal fissures. Soluble fiber helps to lower LDL cholesterol and moderates blood glucose levels. Oat bran is high in soluble fiber, according to Leslie Beck, RD. Beta-lucan, a specific type of soluble fiber found in oat bran, may also boost immune function. Soluble fiber may lower blood pressure and help to reduce inflammation, helping to protect cardiovascular health.
Wheat bran is high in insoluble fiber. Insoluble fiber bulks up stool and passes through the body in a mostly undigested state. This extra bulk helps move food through the digestive tract more swiftly. Eating insoluble fiber helps you to feel full while consuming fewer calories, and helps your bowel movements to stay regular. High-fiber foods are also usually low in calories relative to their volume. Unlike soluble fiber, insoluble fiber is not associated with lower cholesterol. Wheat bran is beneficial to digestive health, but lacks the cardiovascular, blood glucose and immune system boosts associated with the insoluble fiber found in oat bran.
Uses and Nutrition
Both oat bran and wheat bran can be eaten as hot or cold cereal or sprinkled on yogurt, salads or fruit. Either bran can substitute for breadcrumbs in breading fish or meat. They can add bulk and nutrition to a meat loaf or casserole, and can be used as topping for baked fruit crisps. Bran muffins are a nutritious way to start the day that also aid in ensuring bowel regularity. Wheat bran provides iron, Vitamin C and Vitamin A, while oat bran supplies protein, calcium, and vitamins B-1 and B-2. Both brans have similar texture and only slightly different flavor, but complementary nutritional profiles. Choosing them both, in separate dishes or mixed together, maximizes the nutritional benefits of eating bran.
Many commercial baked goods that are claimed to contain oat or wheat bran have too little bran to have a substantive positive impact on health, and may be high in fat and salt, according to the American Heart Association. Read labels carefully and opt for whole grains or 100 percent bran eaten as cereal or incorporated into home cooking. Rapidly increasing the amount of fiber in your diet may cause gas and bloating, so increase fiber slowly and drink plenty of water whenever you eat more fiber. Too much fiber may also interfere with the absorption of necessary minerals or with prescription medications, according to the Colorado State University Extension, so consult a physician before making a significant change in your fiber consumption.
- Colorado State University; Dietary Fiber; J. Anderson et al.; December 2010
- Connecticut State Department of Education; Nutrition Policies and Guidance for the Child and Adult Care Food Program; June 2010
- University of Nebraska Lincoln Extension: Bran Flakes
- Oregon State University Linus Pauling Institute; Fiber; Jane Higdon PhD; December 2005
- American Heart Association: Cholesterol, Fiber and Oat Bran
- Leslie Beck, RD: Oat Bran, January 2009's Featured Food
- Comstock/Comstock/Getty Images
This article reflects the views of the writer and does not necessarily reflect the views of Jillian Michaels or JillianMichaels.com.
|
English planters & merchants: William Croydon
William Croydon owned property in Essequibo from at least as early as 1762 and was held in high regard by the governor, Storm van ‘s Gravesande:
Mr Clarke in Demerara and W. Croydon in Essequibo are honest, upright men, of much profit and advantage to the Colony, the welfare of which they have at heart. [van 's Gravesande, The Rise of British Guiana]
William Croydon's plantation on Wakenaam Island, Essequibo, can be seen in this detail from: Map of the Essequibo Colony, 1779 or 1780; Probably by A. Siraut - Destouches, Colonial Surveyor [David Rumset Map Collection].
In 1790 Croydon wrote to Thomas King of the slave trading company Camden, Calvert & King in London stating that ‘he has lost upwards of 70 capital slaves and has only 30 more goods’ [Hull Museums KINCM:2006.6923.34]. He also dealt with the Lascelles & Maxwell.
He had a 'coloured daughter' Sophia Maria Croyden, who married Jacob Belgrave in the late 1780s [The Journal of the Barbados Museum and Historical Society, Volumes 46-48].
|
> Academics > Course
Descriptions > Undergraduate
COMA 3303 (3-3-0) Small Group Communication
Students will study three small group functioning patterns used in American culture. Corporations and organizations accomplish tasks, make decisions, and solve problems through small group effort. Educators facilitate learning in classroom small groups. Churches and other non-profit organizations find community in small group interactions. Exams and papers will augment in-class small group practice sessions. Fall, Spring, Summer, Online.
|
Updated August 25, 2023
Introduction to Distortion Effect Photoshop
Photoshop is a graphics editing software that was developed by Adobe systems as its image editing software. We can make different types of effects on our image with the help of different features of this software. Distortion is one of the effects through which you can make a creative distortion work on your image and get benefit from it. This article will discuss different parameters of the distort effect and get introduced to the different steps of how to apply this effect on your image and get the best result from it. So let us start our discussion about the dissertation topic of Photoshop software.
How to Use Distortion Effect in Photoshop?
We can apply the distortion effect on our image in Photoshop by using some steps of this feature in a very simple manner. But before starting, let us get introduced to the user interface of this software so that we can understand this topic better and have good knowledge of this topic without any problem.
Step 1: At the top of the working screen, we have a bar which is called the Menu bar. This bar has some Menus, which helps us in the management of different parameters of this software. Below this bar, we have another bar which we called Property bar. This bar shows you the parameters of the active tool of this software during your work. Below this property bar, we have some sections in this software in which at the left side we have tool panel which has some tool for making our work easy, at the center we have display window for seeing our current work in it, at the right side we have some tabs such as color tab, layer panel and some other different tabs those helps in our work during our project work. You can adjust them according to your requirement at any place in the user screen of this software.
Step 2: Let us have an image in this software for our learning about this topic. For placing an image in Photoshop, just open the folder of your personal computer of your saved image, pick your desired image from that folder, then go to the display window of Photoshop software and release the mouse button to place it here.
Step 3: Now, make adjustments to the size of your image according to your requirement by adjusting the width and height of your image. Once you have done the adjustment, click on the commit option or tick mark option of the property bar of this image of your software. You can also press the Enter button on the keyboard for applying your settings. Rename this image according to you. I will name it as My Pic. For naming your image, make double click on the name area of your image.
Step 4: Go to the layer panel of this software, which is at the right side of the working area and click on this image layer for selecting this image with mouse left click. Now press Ctrl + J button from the keyboard for making a copy of this image.
Step 5: Go to the Tool panel of this software, which is on the left side, and make click on the Quick Selection tool with the mouse left button for having this tool active.
Step 6: Now select Copy of My Pic image layer in layer panel by click on it, then make a selection around the lady of the image with the help of this Quick selection tool.
Step 7: Once you made the proper selection, press Ctrl + J from the keyboard for separating this lady from the original image.
Step 8: Now again, go to Copy of My Pic image layer and make right-click with the mouse button on this image in the display window area. A pop list will be open. Choose the Select Inverse option for inversing your selection from the list.
Step 9: Again, press the Ctrl + J button from the keyboard for separating the background of this image from the original image.
Step 10: Place the separator image of the lady (named as Layer 2 ) above to this background layer and then select this separated background layer (Layer 1 copy) by click on it.
Step 11: Go to the Filter Menu of Menu bar of this software and click on it. Once you click on the Filter menu, a popup list will be open, go to the Distort option of the list, and click on the Ripple option of the new drop-down list. You can choose any one of the options of Distort effect from the list. I will explain to you distortion by using this ripple option of the Distort effect of Photoshop software.
Step 12: Now, a dialog box of the Ripple effect will be open like this. Adjust the amount of ripple by increasing or decreasing its value on the slider of the Amount option. You can input any value directly by using the keyboard entry method. Once you are done, click on the Ok button of this box.
Step 13: Once you click on the Ok button, this type of effect will create with this distort option.
Step 14: Again, go to the tool panel of this software and click on the Clone Stamp tool of the list of tools with the mouse left button.
Step 15: Set the size of the clone tool by the property bar of this clone tool according to you. I will set its size as 18 px.
Step 16: Now copy the area of the image with which you want to cover unwanted areas of your image by holding the Alt button of the keyboard. I want to remove the unwanted area around the lady, so I will copy the area nearby this by holding the Alt button of the keyboard and clone it around the edge of the lady.
Step 17: Once I did all the cloning around the edge of the lady of the image, it will look like portray.
In this way, you can make different types of creative editing in your image by using the distortion effect of this software.
Now, after this article, you can understand what distortion effect is in the Photoshop software and how you can handle its parameters for getting distortion effect on your image. You can have a good command of an application with the option of the Distort effect of Photoshop by practicing on them one by one.
This is a guide to Distortion Effect Photoshop. Here we discuss an introduction, how to use the Distortion Effect in Photoshop in a step by step manner. You can also go through our other related articles to learn more –
|
Meet Sunshine, Rainbow, Flower, and Sparkles who are our chickens. They all hatched here at St Peter's and are all female chickens, called hens.
The chickens live in a large coop in a special enclosure on our school field. Every class has a special day when it is their turn to check on the chickens, top up their food and collect the eggs which we often use for cooking in school - they are delicious!
More interesting chicken facts:
- Chickens are related to the Tyrannosaurus Rex dinosaur.
- There are more chickens in the world than any other species of bird.
- A healthy chicken lays about 265 eggs each year.
- Chickens cluck after they lay an egg.
- As a chicken gets older the eggs they lay become bigger but fewer eggs are laid.
- Chickens will be less nervous if you walk backwards when entering the coop.
- Most chickens swallow gravel to help mash food.
- Chickens have excellent hearing and memory.
- There are well over 300 breeds of chickens.
(Adapted from: https://easyscienceforkids.com/all-about-chickens)
|
One way that we can invest and engage with our community is by volunteering our time, skills, and/or finances. We might usually think of this as an adult activity, but kids can love their neighbours and volunteer too! It’s great to teach them early about the importance of giving back to those who are less fortunate; they learn to value the things they have, to consider what needs exist around them and have compassion. Volunteering can create opportunities for discussing issues that we see in our neighbourhoods, city, country and world, such as homelessness, loneliness, sickness, racism or climate change.
Age-appropriate volunteering activities might include: pet walking, raking leaves or shoveling snow, raising money for local charities through bake sales or lemonade stands, visiting with isolated or shut-in neighbours, picking up garbage, and so on. Some activities may need to be altered to ensure safety in terms of COVID, but there are many opportunities when you look for them!
We are called to care for those around us, so when you see a need and are able to respond, be sure to include your kids as you talk about the issues and respond with action.
How will you serve your community with your kids this season?
|
Tradition Versus Alternative Methods of Production in the Fertilizer and the Chloralkali Industry:
ISSUE BEING ADDRESSED:
It has been said that the uses of traditional methods of production have a greater negative impact on the environment than alternative methods, which are seen to be greener. The issue at hand is the validity of this claim and if alternative methods are indeed greener and more advantageous than traditional ones.
ISSUES TO BE INVESTIGATED:
- What are the environmental disadvantages of the alternative production methods used in the fertilizer and chloralkali industry?
- What is the variation of cost between the alternative and the traditional methods?
- What are the problems existing methods entail?
- What negative effects do traditional methods have on humans as well as the environment?
- What are the environmental benefits of alternative methods?
- What is the practicality of using alternative methods instead of traditional ones?
- What resources are available for the alternative methods compared to the traditional methods in both industries?
- How reliable are the alternative methods compared to traditional ones?
- In the fertilizer industry, which method renders itself to be easily transported?
- What are the long term effects compared to the short ones and which is more beneficial to the environment and business in both industries.
Alternative methods in the chloralkali industry as well as in the fertilizer industry are less detrimental to the environment and humans, more sustainable, and the long-term effects outweigh those of the traditional production methods, but, the short-term effects of the traditional production methods are what make money for the people in the industry and it has practical benefits, with regards to distribution and price, that out-weight those of the alternative methods. But, after the weighing up of all the factors involved in both the traditional production methods as well...
|
Imagine for a moment a saxophone without tone holes.
Just mouthpiece and body.
All you can play on it is the lowest note (the fundamental) and its overtones (the partials).
You can make an objective statement about its sound and how it speaks.
How well does the instrument's shape and material support the forming of an oscillating air column?
Now the amazing thing is that this air column still forms even if there are 24 holes punched into the body which are then extended cylindrically and capped of with pads made from felt and leather. Not to speak of random curves in the body.
What I'd like you to understand is this:
The aircolumn forms despite the irregularity that comes with tone hole chimneys and pads not because of it.
The tone holes are only there to lengthen and shorten the air column, not to change or improve the sound.
That brings us straight to tone holes, keys, pads and so called resonators.
welcome to my world...
So called resonators are discs made from different materials and cover the pad where it is exposed to the inside of the body .
Most saxophone players believe that resonators resonate.
As a result of that they attribute a certain sound to the actual key that they press.
• The resonator has no metallic connection to the body and is therefore not involved in its vibration.
• The vibration of the body is the result of the particular waveform of any oscillating air column.
• The toneholes and keys are the technical means to lengthen and shorten that air column.
They have no "sound" and aren't supposed to have one.
This understanding of the instrument led me to the following and simple conclusion:
Resonators are in actuality reflectors.
Maximum reflection is achieved by a smooth and rigid surface.
That's why you want to cover as much of the pads' leather and felt surface as possible.
If you do so you bring out every saxophone's own true sound.
Maximum size reflectors aren't supposed to make an instrument sound darker or brighter.
They make it speak well and even.
|
Craig Feinstein <email@example.com> wrote in news:firstname.lastname@example.org:
> Let's say I have a drawer of an infinite number of identical socks at > time zero. I take out one of the socks at time one. Then the contents > of the drawer at time zero is identical to the contents of the drawer > at time one, since all of the socks are identical and there are still > an infinite number of them in the drawer at both times. But the > contents of the drawer at time zero is also identical to the contents > of the drawer at time one plus the sock that was taken out, since they > are exactly the same material. So we have the equations: > > Contents of drawer at time 0 = Contents of drawer at time 1 > Contents of drawer at time 0 = (Contents of drawer at time 1) plus > (sock taken out of drawer). > > Subtracting the equations, we get > > Nothing = sock taken out of drawer. > > This is false, so infinity cannot exist. > > How does modern mathematics resolve this paradox? >
By means of limits. Infinity minus infinity is an indeterminate form, and no said that the rules of finite arithmetic apply to non-finite things. We invented limits to deal with non-finite things.
|
Wealth of Africa:
4,000 years of money and trade
20 January – 26 June 2005
This exhibition is now closed
Part of Africa '05 season
Africa has a long and rich history, spanning ancient kingdoms, colonialism and independence. This exhibition takes you on a tour of this dynamic continent through its money, from coins to copper ingots, raffia cloth and cowrie shells.
The story begins with the use of weighed metal in Ancient Egypt, and with Africa's earliest coins in Cyrenaica (modern-day Libya) in the sixth century BC. The wealth of Mali, Zimbabwe, and the Swahili Coast show Africa's power and influence before the arrival of European colonisers and slave traders, whose legacy still lingers.
Links between money and identity are explored through changes to the coinage during the spread of Christianity and Islam, and the designing of currencies in the twentieth century for newly-independent African countries.
Brass manilla (bracelet). Europe, probably 19th century AD
|
Unless, in May 2011, the Catalan parliament does not pass the modification of the 2003 animal protection law (la Ley de Protección de los Animales) article, which prohibits their torture except in the case of bulls from 1 January 2012, they will no longer be celebrating bullfights in Catalonia. Until this date arrives, the battle between those that support what is known as a ‘fiesta’ and those that wish for its prohibition to be enforced will be fierce. The former have already created the table of the bull. On 1 August, they presented a manifesto in all of bullrings, including those of France and Portugal.
Eduardo Martín Peñate, the rancher and managing director of table of the bull, explained the essence of the document on the same day on Spanish national radio (RNE). 'This manifesto hopes to protest for the liberty of the right to work and have a business. Also, we demand that our festival is not used in politics and that everyone remembers what the running of the bulls means to the world of art and culture.'
Nationalism against bullfighting
Due to the current political context, the Catalan parliament's decision has been interpreted in many circles as something more than a pass in favour of the protection of animals. After four years of reflection the constitutional tribunal presented its determination about the statute of Catalonia in July. Various changes in the document are recognised that had been approved before by the autonomous community parliament, the citizens in referendum and by the general state courts of Spain. One of the most controversial aspects is the conclusion that the constitution 'does not recognise any other than the Spanish nation'. The Catalans responded by protesting on 10 July in Barcelona. Between one million protestors (according to police figures) and one and a half million (according to the organisers) held up banners such as 'Catalonia is a nation' or 'We decide'. More than 100 foreign correspondents came to Barcelona to learn more about the result.
'The theme of Catalan identity has provoked this surge forward. The decision of the statute, that has not satisfied those that produced it, has also been used as support for the demands for autonomy. Politicians have not duly considered this. They have simply used opportunism to take a swipe at the most important symbol of the country, the bull. We shouldn’t forget that when you train a bull, in whatever latitude of the world, it's an image which is identified with Spain. This is a small scale of revenge that the Catalan people have used against the Spanish nation,' continues Martín Peñate in his RNE speech on the possible influence between the ruling of the statute and the vote.
Businesses in the sector
The valuation of the economic loss for businesses in the bullfighting sector, in the decline of the autonomous community in recent years, according to the Platform for the Diffusion of the Fiesta is 300 million euros. This includes the value of the monumental de Barcelona bullring and which will cease to charge for entrance. The Catalan ranchers will not be seen to be especially affected given that their cattle are used chiefly for the bull runs (‘los correbous’ in Catalan). Precisely, Platform Prou! (‘Enough!’ in Catalan) also has as one of their objectives the prohibition of popular fiestas in the south of Catalonia, in which the bulls have to run with balls of fire on their horns or are dragged through the streets with cords attached to their horns. The finality of these acts, equal to the running of the bulls, is the delight of the spectators. .
The convergence and union party (CiU) promoted a law to regulate the practice of the bull run, which would limit its celebration to traditional and would place limits on the maltreatment of bulls. The regulation was to be voted on 28 July, the same day that the abolition of the running of the bulls was voted on. Without doubt, the Popular Party brought it to the statutory rights council, the Catalan consultive body, to ask for their constitutionality. As a consequence, this proposal is, for the moment, paralysed.
Images: main (cc) pmorgan; in-text (cc) Alexandra Guerson/ courtesy of Flickr
|
IVF is a fertility treatment in which the female eggs and male sperm are fertilized or combined outside the body in a lab.
This method is used for people who have difficulty achieving pregnancy.
IVF is one of the most effective forms of assisted reproductive technology (ART), which involves a complex process.
The process involves collecting eggs from ovaries manually and combining them with sperm in a laboratory environment for fertilization. These fertilized eggs (called an embryo) are then placed inside a uterus to get pregnant.
When and Why is an IVF Performed?
(In Vitro Fertilization)
IVF is suggested for people for many reasons, which include-
- Infertility Issues
- Genetic Issues
- Any existing health condition in one partner
- Age >40 years
Some people opt for IVF if other fertility methods have failed. IVF is also an option for couples with same-sex or for people who want to have a baby without a partner.
(In Vitro Fertilization)
IVF is a complex process that involves many steps that last for about 4-6 weeks. This includes a process of collecting eggs from ovaries, combining them with sperm in a laboratory environment for fertilization, and placing these fertilized eggs inside a uterus until they are tested for pregnancy.
Is IVF a Common Procedure?
(In Vitro Fertilization)
About 5% of couples who face issues with infertility will opt for IVF.
It is one of the most effective assisted reproductive technologies (ART), and on average more than 8 million babies are born through IVF.
IVF and IUI: What is the Difference?
|IUI (Intrauterine Insemination)||IVF (In vitro Fertilization)|
|Fertilization occurs in a person’s body||Fertilization occurs in a lab|
|Less Expensive||More Expensive|
|Less Invasive||Complex process|
|Low success rate||High success rate|
|High-quality sperm are directly inserted into your uterus||Sperm and egg are fertilized in a lab and placed in your uterus as an embryo|
Process or Steps of IVF Treatment
Sept 1: Medications (Birth control pills or Estrogen)
Before treatment, the doctor may prescribe some birth control pills or estrogen to control the development of ovarian cysts and the menstrual cycle.
Step 2: Ovarian Stimulation
As a natural cycle in a healthy person, a group of eggs mature each month, but only one egg becomes mature to ovulate.
During your IVF process, an injectable hormone medication is given to help all eggs mature simultaneously and fully.
Step 3: Egg Retrieval
Your doctor uses an ultrasound with a suction device to pull your mature eggs out and place them in a controlled environment.
Step 4: Fertilization
In this step, the sperm is injected into each mature egg and made to fertilize. On average, about 70% of mature eggs will fertilize.
Step 5: Embryo Development
In the next 5-6 days, the embryo development is carefully monitored, and those suitable for transfer will be frozen.
Step 6: Embryo Transfer
There are two kinds of embryo transfers:
- Fresh embryo transfer
- Frozen embryo transfer
Both follow the same transfer process.
The embryo transfer is a simple procedure and does not require anesthesia. It feels like a pelvic exam or Pap smear. The procedure usually takes less than 10 minutes.
Step 7: Pregnancy
Pregnancy occurs when the embryo grows itself into the lining of your uterus. Approximately 9-14 days after embryo transfer, your doctor will order a blood test to determine if you are pregnant.
Many factors are to be considered before starting IVF treatment. To get a better understanding of the IVF process and what to expect, consult with your doctor.
How To Prepare for IVF Treatment?
Before starting IVF, you will need a thorough medical examination and fertility tests for you and your partner.
• A uterine exam
• Pap test and mammogram (if >40 years)
• A semen analysis
• Screening for sexually transmitted infections (STIs) and other infectious diseases
• Ovarian reserve testing
• Blood and urine tests
• Genetic carrier screening
• Uterine cavity evaluation (hysteroscopy or saline-infused sonography)
Your doctor will prescribe folic acid supplements for at least 3 months before embryo transfer.
What To Expect After IVF Treatment?
You may experience some mild symptoms after embryo transfer.
• Mild bloating and cramping
• Breast tenderness
People can return to their normal activities. Around 9-14 days after the embryo transfer, you will need a checkup to test for pregnancy.
- Helps people who cannot conceive
- High success rate with a safe track record
- Useful for single women and same-sex couples
- help to diagnose fertilization problems
- Decreased chances of Miscarriage
- No barriers or limitations
- Multiple births (twins or triplets)
- Premature delivery
- Ectopic pregnancy (a condition where the fertilized egg grows outside the uterus)
- Ovarian hyperstimulation syndrome (OHSS): A rare condition that causes stomach pain, nausea, vomiting, diarrhea, sudden weight gain, bloating, shortness of breath, and inability to urinate.
• Nausea and vomiting.
• Hot flashes
• Enlargement of ovaries
• Abdominal pain
• Bruising from injections
After embryo transfer, you can resume your normal activities. However, your ovaries will be enlarged, and some discomfort may occur.
How Long Do You Need to Wait After a Failed IVF procedure?
It is recommended to complete one menstrual cycle between IVF processes, i.e., an average wait of 4-6 weeks. This break is usually advised for health as well as emotional reasons.
When to Call the Doctor?
• Fever >100.5 degrees Fahrenheit
• Blood in your urine
• Heavy bleeding from your vagina
• Severe pelvic pain
Can IVF Cause Birth Defects?
It is not completely known if IVF alone is responsible for birth defects. However, some studies show a slightly higher risk of birth defects for babies born through IVF. This could be due to delayed conception or due to any underlying cause of infertility.
Safety Precautions for IVF Procedure (In Vitro Fertilization)
- Avoid Having Intercourse
- Avoid Heavy Lifting
- Avoid Heavy Exercise
- Avoid Smoking, Alcohol, and Caffeine
- Take Medications as Prescribed by Doctor
- Keep Away from Heat and Harmful Chemicals
- Eat a Well-balanced Diet
|
In January 2001, Bush was sworn in as the 43rd president of America. This was a period when America’s security was threatened and vulnerable to attacks by terrorists. This was after America openly declared its war against terror.
This was also a period when the fundamental rights and freedom of most Americans hung on the balance due to social inequalities and injustices. However, the situation was quite different then and Bush had little to worry about in his speech as compared to Obama. In his speech, Bush was more inclined towards re-assuring American citizens and the world that America was still a great nation whose influence, wealth and power could not, under any circumstances be undermined. He spoke of democracy, justice and equality among American citizens.
Kindly order term papers, essays, research papers, dissertations, thesis, book reports from the order page.
|
Each of Morrie's lessons contributes to a larger, all-encompassing message that each individual, Mitch especially, should reject popular cultural values, and instead develop his own. As Morrie sees it, popular culture is a dictator under which the human community must suffer. In his own life, Morrie has fled this cultural dictatorship in favor of creating his own culture founded on love, acceptance, and open communication. He develops his own culture as a revolt against the media-driven greed, violence and superficiality which has tarnished the mores promoted by popular culture. Morrie encourages Mitch to free himself of this corrupt, dictatorial culture in favor of his own, and it is only when he does that he begins to reassess his life and rediscover fulfillment.
Morrie recites a quote by his favorite poet, W. H. Auden, to encompass one of his most important lessons to Mitch: in the absence of love, there is a void that can be filled only by loving human relationships. When love abounds, Morrie says, a person can experience no higher sense of fulfillment. Throughout his fourteen Tuesday lessons with Mitch, Morrie divulges that love is the essence of every person, and every relationship, and that to live without it, as Auden says, is to live with nothing. The importance of love in his life is especially clear to Morrie as he nears his final days, for without the meticulous care of those he loves, and who love him, he would perish. Morrie clings to life not because he is afraid of dying or because he fears what will become of him in the afterlife, but because his greatest dying wish is to share his story with Mitch so that he may share it with the world. Morrie clings just long enough to divulge the essence of his story, then releases himself to death, leaving Mitch and his audience with the message that love brings meaning to experience, and that without it, one may as well be dead.
In his quest to accept his impending death, Morrie consciously "detaches himself from the experience" when he suffers his violent coughing spells, all of which come loaded with the possibility of his last breath. Morrie derives his method of detachment from the Buddhist philosophy that one should not cling to things, as everything that exists is impermanent. In detaching, Morrie is able to step out of his tangible surroundings and into his own state of consciousness, namely for the sake of gaining perspective and composure in a stressful situation. Morrie does not intend to stop feeling or experiencing in his detachment, but instead, wants to experience wholly, for it is only then that he is able to let go, to detach from a life-threatening experience which renders him fearful and tense. He does not want to die feeling upset, and in these frightening moments, detaches so that he may accept the impermanence of his life and embrace his death, which he knows may come at any moment.
The media is continually portrayed in Tuesdays With Morrie as being inherently evil, sucking Mitch dry of his passion and ambition, and feeding the public stories of murder and hatred that have ravaged the goodness of the world's general community. Mitch, who is out of work due to a unionized strike at the Detroit newspaper he writes for, continually notices the horrific events reported by the media he for a long time has been a part of. He reads about homicides, torture, theft, and a dozen other gruesome crimes that serve to juxtapose the evil of the popular culture with the goodness of the world Morrie has created for himself. The O.J. Simpson murder trial also makes multiple appearances throughout the book, and provides Mitch with evidence to support his claim that the the general populous has become dependent on, and somewhat addicted to, media coverage of relatively meaningless stories, stories that contribute nothing to personal development or goodness as a human being.
Reincarnation and renewal are presented as facets of both life and death; in life, Morrie teaches that a person is ever-changing, and in death, looks forward to some form of new life with the natural progression of the life cycle. With Morrie as his mentor, Mitch is able to reincarnate himself in life, transforming a man who was once motivated by material wealth into a man who is motivated by a passion to love, and to emulate the man who has so touched his life. Morrie reveals that despite his old age, he is still changing, as every person does until their dying day.
Each Tuesday, Mitch brings with him a bag of food from the grocery store for Morrie to enjoy, as he knows that his professor's favorite hobby, second to dancing, is eating. Morrie can no longer dance, and soon, he can no longer eat the food that Mitch brings him, either, as his health and strength have deteriorated so much, he can no longer ingest solids. The food that he brings for Morrie serves as a reminder for Mitch of the days he and his professor would eat together in the cafeteria at Brandeis, when he had been young and passionate, and Morrie energetic and in good health. Now, Mitch has been corrupted by commercial wealth, and Morrie by his illness. Although he knows that Morrie can no longer eat solids, Mitch continues to bring food each week because he so fears Morrie's fast-approaching death. The food Mitch brings him acts as a means by which to cling to Morrie and the fond memories Mitch has of his favorite professor. Mitch also feels that food is the only gift he can give to Morrie, and feels helpless as to how to soothe him any other way.
As Morrie's body deteriorates, so does the condition of the hibiscus plant. The plant's pink petals wither and fall as Morrie grows increasingly dependent on his aides and on oxygen. As his death approaches, so does the death of the plant. It is continually used as a metaphor for Morrie's life and for life itself. Like the plant, humans, Morrie in particular, experience a natural life cycle, which inevitably ends in death. Morrie must accept this inevitable fate, as must Mitch.
Morrie recounts a story he had heard about a small wave seeing the waves ahead of him crash on the shore, disappearing into nothingness. He suddenly brims with fear upon the realization that he too will soon 'crash on the shore' and, die as the wave fears he will. This little wave confides his fear in another wave who comforts him with the news that he will not crash and die, but will instead return to become a small part of the larger ocean. This small wave is symbolic of Morrie, as he too is on the brink of crashing into a theoretical shore, a symbolic embodiment of his death. Like the wave, Morrie is comforted by the knowledge that he will soon return to something larger in the afterlife. Morrie's affinity for the parable denotes his belief in a form of reincarnation, which he understands as intrinsic part of the natural life cycle.
Morrie's aphorism, "When you're in bed, you're dead," eventually comes true. Throughout Morrie's struggle with ALS, he refuses to stay in bed, as he sees it as a form of surrender, and instead opts to rest in the chair in his study. Morrie intends to live his last days as fully as he can, and knows that if he is to remain in bed, he will surrender himself to death by forfeiting the simple enjoyment he gets from lying in his study. In his study, photographs of loved ones, and the books he has collected in his lifetime surround Morrie. There, he can look outside of his window, and though he cannot go outside, he admires the beauty of the seasons and the plant and animal life outdoors. It is not until Morrie's final days that he does stay in bed, when he has at last accepted and readied himself for death.
|
This week’s baby steps are in the same vein as last week: getting your garden ready to plant. Here are three more things you’ll want to know before you start planting.
- Know when to start planting.This great page from Mother Earth News will give you a list of vegetables you can start in April (and other months), and separated by region. What a great resource! First select your region, the month, and then scroll down to see the lists of what to plant.
- Learn a little bit about soil. Knowing what kind of soil you have is important because you may need to “tweak” the soil to provide your plants the most fertile growing possible. Read this article to learn about 10 types of soil and when to use each. Here’s a brief article with photos from HGTV about soil types and soil acidity.
- Observe how much sunlight falls on your growing area. Knowing which areas get the most light (or the most shade) will help you know where to put specific plants. That’ll guarantee your vegetables are situated to grow their best. Read slides 7 and 8 of this article. Here’s a general tip about sunlight. “Vegetables that produce fruit (tomatoes, peppers, eggplant, squash) need full sun.” Leaf and root veggies are ok in the shade. Click here to read more.
Take these three baby steps and soon your garden will be off to a great start! In case you missed last week’s Baby Steps, click here to read about finding your climate zone, knowing what to grow, and buying seeds.
|
PARIS (AFP) - Mankind's first-ever probe of a comet found traces of organic molecules and a surface much harder than imagined, scientists said on Tuesday of initial sample data from robot laboratory Philae.
Philae fell asleep on comet 67P/Churyumov-Gerasimenko on Saturday, having run out of onboard battery power after 60 hours of prodding and probing an object zipping towards the Sun at 18km per second.
The lander control centre in Cologne, operated by German Aerospace Centre (DLR), said Philae had uncovered much about the comet in spite of a rough touchdown in a less-than-perfect spot.
"We are well on our way to achieving a greater understanding of comets," Dr Ekkehard Kuhrt, project scientific director, said in a statement.
"Their surface properties appear to be quite different than was previously thought."
Philae landed on "67P" last Wednesday after a nail-biting seven-hour, 20km descent from Rosetta, its orbiting mothership which had travelled more than a decade and 6.5 billion kilometres to meet up with the comet in August this year.
The touchdown 510 million km from Earth did not go entirely as planned, when Philae's duo of anchoring harpoons failed to deploy and it bounced twice before ending up in a crevice, its solar panels shadowed from battery-boosting sunlight.
Among the most anticipated data from Philae had been chemical analysis of a drill sample which scientists hoped would shed light on the origins of the Solar System 4.6 billion years ago, and maybe even life on Earth.
The DLR said the MUPUS probe, one of Philae's 10 onboard science instruments, hammered into the comet to discover it was "a tough nut to crack".
"Although the power of the hammer was gradually increased, we were not able to go deep into the surface," said research team leader Tilman Spohn.
Electric and acoustic experiments confirmed the comet was "not nearly as soft and fluffy as it was believed to be" underneath a surface layer of dust.
Despite its imperfect footing, Philae managed to deploy a drill, but it was not clear whether any soil sample had been examined onboard.
Yet the team said Philae's COSAC gas analyser managed to "sniff" the atmosphere and detect the first organic molecules shortly after landing.
Some astrophysicists theorise that comets "seeded" our fledgling planet with the beginnings of life-giving water and organic molecules, and hoped that analysis of "67P" would prove this.
"Analysis of the spectra and the identification of the molecules are continuing," said the statement.
Project manager Stephan Ulamec said he was confident Philae would make contact later "and that we will be able to operate the instruments again" as the comet moves closer to the Sun.
By spring of 2015 (about March-May in the northern hemisphere), it is hoped that Philae will communicate with its mothership and by summer "it might be possible that temperatures on the comet will allow Philae's battery to be recharged."
Rosetta will continue orbiting the comet to receive any signals from Philae, if it were to wake up from hibernation.
|
Late yesterday, a federal court in Oregon formally struck down a Bush-era plan that abandoned scientific protections for federal public lands in western Oregon and would have opened up those lands to outdated boom-and-bust logging.
WOPR would have dramatically increased logging on about 2.6 million acres of federal public forests in Oregon.
The plan, called the Western Oregon Plan Revision (known as WOPR and pronounced “whopper”) would have dramatically increased logging on about 2.6 million acres of federal public forests in Oregon managed by the Bureau of Land Management (BLM).
The ruling came in response to a lawsuit filed by Earthjustice and Western Environmental Law Center on behalf of nine conservation and commercial fishing organizations.
“This ruling is the final nail in WOPR’s coffin,” said Kristen Boyles, an attorney with Earthjustice. She continued, “These public forests protect our climate, provide us with clean water, and sustain world class salmon runs and recreational opportunities that contribute to Oregon’s diverse economy. Now they will no longer be haunted by an outdated, unbalanced plan.”
The court decision coincided with the recent announcement that the Obama administration intends to develop its own plan for these federal lands. The Obama BLM has asked for public input into the new plan.
“Together we defeated WOPR because BLM scorned the best science,” said Joseph Vaile of Klamath-Siskiyou Wildlands Center. “Now its time for us to be part of the solution, helping shape how our public forests will be managed for years to come.”
The ruling by U.S. District Judge Anna Brown found that WOPR was finalized without the required evaluation of federal fish and wildlife scientists on its impacts on threatened and endangered species. Judge Brown vacated WOPR and reinstated the protective standards and requirements of the Northwest Forest Plan.
Judge Brown’s ruling confirms a September 2011 recommendation by U.S. Magistrate Judge Hubel that WOPR be found illegal and vacated.
Earthjustice and Western Environmental Law Center represent Pacific Rivers Council, Oregon Wild, Klamath-Siskiyou Wildlands Center, The Wilderness Society, Cascadia Wildlands, Center for Biological Diversity, Pacific Coast Federation of Fishermen’s Associations, Institute for Fisheries Resources, and Umpqua Watersheds as plaintiffs in this case.
Kristen Boyles, Earthjustice, (206) 343-7340, ext. 1033
Susan Jane Brown, Western Environmental Law Center, (503) 914-1323
Joseph Vaile, Klamath-Siskiyou Wildlands Center, (541) 488-5789
Earthjustice is the premier nonprofit environmental law organization. We wield the power of law and the strength of partnership to protect people’s health, to preserve magnificent places and wildlife, to advance clean energy, and to combat climate change. We are here because the earth needs a good lawyer.
|
Three ultra-ancient artifacts — 4,000 to 7,000 years old — have been found by the University of Washington’s botany greenhouse, the university announced Monday.
One piece is a stone projectile point — a type of spearhead or arrowhead.
The other two are fragments of stone tools.
UW freshman Ellen Van Wyk, who is also a botany greenhouse volunteer, found the projectile point buried by the greenhouse on Oct. 22.
The greenhouse staff told the Burke Museum about the discovery. The museum staff then dug three test pits in that area and found the two tool fragments.
“This (stone) point is exciting because we know exactly where it was found. Other points in our collection have a vague provenance, such as ‘near the fountain.’ We can now add to the history of the landscape on which the UW was built,” said Julie Stein, the museum’s director.
The discovery site is near a documented Native American trail.
The museum has contacted area tribes about the discovery, said university spokeswoman MaryAnn Barron Wagner.
The discovery area has been registered with the Washington Department of Archaeology and Historic Preservation.
The university plans to check out the discovery area more and to survey other parts of campus with pending construction projects for potential artifact sites.
People stumbling across a potential artifact site are encouraged to call the museum’s archaeology department at 206-685-3849.
|
The heat source for our planet is the sun. Energy from the sun is transferred through space and through the earth's atmosphere to the earth's surface. Since this energy warms the earth's surface and atmosphere, some of it is or becomes heat energy. There are three ways heat is transferred into and through the atmosphere:
If you have stood in front of a fireplace or near a campfire, you have felt the heat transfer known as radiation. The side of you nearest the fire warms, while your other side remains unaffected by the heat. Although you are surrounded by air, the air has nothing to do with this transfer of heat. Heat lamps, that keep food warm, work in the same way. Radiation is the transfer of heat energy through space by electromagnetic radiation.
Most of the electromagnetic radiation that comes to the earth from the sun is in the form of visible light. Light is made of waves of different frequencies. The frequency is the number of instances that a repeated event occurs, over a set time. In electromagnetic radiation, the frequency is the number of times an electromagnetic wave moves past a point each second.
Our brains interpret these different frequencies into colors, including red, orange, yellow, green, blue, indigo, and violet. When the eye views all these different colors at the same time, it is interpreted as white. Waves from the sun which we cannot see are infrared, which have lower frequencies than red, and ultraviolet, which have higher frequencies than violet light. [more on electromagnetic radiation]
Most of the solar radiation is absorbed by the atmosphere and much of what reaches the earth's surface is radiated back into the atmosphere to become heat energy. Dark colored objects such as asphalt absorb more of the radiant energy and warm faster that light colored objects. Dark objects also radiate their energy faster than lighter colored objects.
Learning Lesson: Melts in your bag, not in your hand
Conduction is the transfer of heat energy from one substance to another or within a substance. Have you ever left a metal spoon in a pot of soup being heated on a stove? After a short time the handle of the spoon will become hot.
This is due to transfer of heat energy from molecule to molecule or from atom to atom. Also, when objects are welded together, the metal becomes hot (the orange-red glow) by the transfer of heat from an arc. This is called conduction and is a very effective method of heat transfer in metals. However, air conducts heat poorly.
Convection is the transfer of heat energy in a fluid. This type of heating is most commonly seen in the kitchen when you see liquid boiling.
Air in the atmosphere acts as a fluid. The sun's radiation strikes the ground, thus warming the rocks. As the rock's temperature rises due to conduction, heat energy is released into the atmosphere, forming a bubble of air which is warmer than the surrounding air. This bubble of air rises into the atmosphere. As it rises, the bubble cools with the heat contained in the bubble moving into the atmosphere.
As the hot air mass rises, the air is replaced by the surrounding cooler, more dense air, what we feel as wind. These movements of air masses can be small in a certain region, such as local cumulus clouds, or large cycles in the troposphere, covering large sections of the earth. Convection currents are responsible for many weather patterns in the troposphere.
|
Mitochondrial DNA can react with certain chemicals in the body to produce compounds that trigger genetic mutations — and the mutations can lead to mitochondrial disease, a study reports.
The research at the Vanderbilt University School of Medicine dealt with mitochondrial DNA’s interaction with oxygen-containing chemicals called reactive oxygen species. Mitochondria are the cell components that generate energy.
When levels of reactive oxygen species are normal, they contribute to many cell functions. But an over-abundance can lead to interactions that produce tissue-damaging toxins.
An example is a toxin known as M1dG, which occurs when reactive oxygen species interact with DNA molecules or lipids — fats, oils or waxes. M1dG poses a danger because it can trigger genetic mutations, changing the fate of cells.
The Vanderbilt study showed that M1dG can play an important role in mitochondria regulation and metabolism — or the production of energy.
Their research, “Oxidative stress increases M1dG, a major peroxidation-derived DNA adduct, in mitochondrial DNA,” appeared in Nuclei Acids Research.
The team compared levels of M1dG generated by interactions between two types of DNA and reactive oxygen species in several types of human cells. One set of interactions was between mitochondrial DNA and reactive oxygen species, and the other set was between cell nucleus DNA and the oxygen species.
The key finding was that the interaction between mitochondrial DNA and reactive oxygen species generated 50 to 100 times more M1dG than the interaction between nucleus DNA and the oxygen species.
At that point, the researchers exposed the cells to a drug that prevents the normal functioning of mitochondria’s electron transport chain — the process by which mitochondria produce energy.
This led to an over-abundance of reactive oxygen species that tripled the levels of M1dG in mitochondrial DNA but left levels in nucleus DNA unchanged.
When the team used another drug to prevent an over-accumulation of reactive oxygen species, levels of M1dG in mitochondrial DNA fell by 65 percent.
The results showed that the production of M1dG in mitochondria depends on reactive oxygen levels and cell stress, the team said.
Interestingly, a DNA sequencing analysis revealed that M1dG was not targeting specific parts of DNA but was found throughout DNA molecules. This suggested that M1dG could have a broad effect on a genome, including generating mutations.
Previous studies had linked BMPR2 dysfunction and PAH to faulty mitochondria, oxidative stress, and mitochondrial DNA damage — all mechanisms that M1dG can participate in. Oxidative stress results from an imbalance between the production of reactive oxygen species and the body’s ability to absorb them.
The team found that M1dG levels were twice as high in mice with PAH than in healthy animals. This further supported the notion that M1dG could play a role in mitochondrial dysfunction and disease.
“As the levels of M1dG in mtDNA [mitochondrial DNA] appear to be constant over time, it might serve as a biomarker for disease states, especially those associated with mitochondrial oxidative stress,” the researchers said.
|
Sun Pyramid was the axis mundi for Teotihuacan culture, a space from which celestial and underworld levels were accessed symbolically. The four directions of the universe parted from here as well, and this scheme was adopted later by Tolteca and Mexica societies when drafting their ceremonial centers.
The later was informed by archaeologist Eduardo Matos Moctezuma during his participation at “Teotihuacan, identity and heritage of Mexico” master conference series, taking place in the National Museum of Anthropology (MNA) as part of the 70th anniversary of the National Institute of Anthropology and History (INAH) celebrations.
For the INAH emeritus professor that collaborated with the Teotihuacan Project (1962-1964) and directed a special archaeological initiative there in the early 1990’s, there are several elements that confirm the sacredness of the Sun Pyramid. “These axis mundi buildings face east, present evidence of human sacrifices, are related to water and fertility, are linked to death-life duality, and are surrounded by great platforms that prevent direct entrance to them”.
During the archaeological explorations where he participated, it was confirmed that access was restricted: the only entrance was through the Dead Roadway and the frontal staircase, which points out to its sacredness. “We think the Sun Pyramid was the first center of Teotihuacan city. Towards 250 AD, it would be moved to the south, at La Ciudadela and the Feathered Serpent Temple, where the axis mundi patron repeated” declared the Colegio Nacional Member.
Teotihuacan was the largest and populated city in America during Prehispanic age, extending for 23 square kilometers and lodging 250,000 persons. This city had a great development from 200 BC to 650 AD.
Regarding the Sun Pyramid sacred connection, Eduardo Matos mentioned there is a 102 meters cave under it, a natural element with important symbolism as a duality sample: a womb that gives birth to people as well as an entrance to the underworld. “Channels were found in the cave, bringing in the water and fertility elements”.
This conception is found in other places as Tula, where “platforms that ended at the great ballgame court were found. The ceremonial center restricted access model was repeated there, where observatory, zompantli, ballgame court and another important building all face orient”.
Tenochtitlan adopted previous elements such as dividing the city in 4 quadrants as in Teotihuacan; it was limited by an enormous platform with 78 buildings inside, which, according to Sahagun, was their sacred space. Tlatelolco, its twin city, repeated the same scheme, and is where most rests of the surrounding platform have been located, informed Matos Moctezuma.
|
It’s hard to believe that a tree could save a democracy, but according to legend, that’s exactly what happened when Sir Edmund Andros arrived in the Connecticut colony in 1687 to collect the royal charter given to the Puritan settlers by King Charles II in 1662.
Why was this particular piece of parchment so important? When the Puritan settlers traveled from Massachusetts to create a colony in the wilderness along the Connecticut River in 1636, they had no official authorization to do so. Under the leadership of Rev. Thomas Hooker, they established a General Court that bound the settlements of Hartford, Windsor, and Wethersfield together to keep order, but it was not a formal document. In 1639, they created the Fundamental Orders, a written covenant based on the consent of the governed. It began with a preamble, followed by eleven orders that gave all governing power to the General Court (one of the reasons Connecticut is so litigious), with the right to elect deputies and magistrates given to the freemen or electors.
Many of us feel that this is the first written constitution, conceived and executed before John Locke even went to school. Connecticut is the Constitution State because of the Fundamental Orders. They allowed the colony to govern itself without interference from the crown.
The colony had been established during the reign of Charles I, who was usurped by Puritan Oliver Cromwell and his forces, naturally pleasing Puritan leaders in the colonies. When the monarchy was restored under Charles II, Connecticut sent John Winthrop Jr. to England to smooth things over and negotiate a charter. The charter, known as the Warwick Patent, consolidated the New Haven colony with Connecticut, extended the boundary of the colony to the Pacific, and gave the colony a considerable amount of freedom.
When James II followed his brother Charles II, Sir Edmund Andros was sent to create the Dominion of New England under greater control of the crown. Andros began collecting all the colonial charters, which is where the story of the Charter Oak comes into play. Remarkably, Andros arrived at the colonial meeting house in Hartford on Meeting House Square on Halloween, October 31, 1687. During that “negotiation,” wrangling apparently went on all day into the evening when candles were needed, but, according to legend, all the candles were snuffed at the same time. When the lights were relit, the charter was gone.
The story continues that Captain Joseph Wadsworth absconded with the charter and carried it off to the tree. By 1687, this great white oak had seen centuries of life go by from its perch overlooking the Connecticut River. It’s distinctive position on the Wyllys estate made it a standout on the landscape, a short ride from the meeting house in the village. Who would suspect a tree would be used as a hideaway for the most important document in the colony?
The Charter Oak was a magnificent white oak. Connecticut’s main forest tree is the oak, divided into the red oaks and the white oaks, the reds having pointed leaves and the white having lobed. When Andros arrived, most of the leaves on other trees were probably gone from their branches, but oaks hang onto theirs into the spring of the following year—a bane to those who like a well-kept yard—but important ecologically for all the critters that rely on the oak. This leaf-holding phenomenon is known as marcescence; beeches are also marcescent.
Still having all those leaves provided extra cover for the crevice where the charter would be nestled until it was safe for it to mysteriously reappear. The other twelve colonies were not so lucky, making Connecticut’s the only extant colonial charter in existence! More than a hundred yeas older than the Declaration of Independence.
In appreciation of the job the Charter Oak performed, the tree became hallowed ground, beloved across the new state for the rest of its existence and down to present day. The city grew around it, but it was set off in a vacant lot on the South side of Charter Street not far from Main Street. The grand old tree stood for almost two hundred more years before she was blown over on August 21, 1856, during a severe storm.
The entire state mourned her loss, coming to visit the giant fallen relic, probably the most important warrior for independence in the land. The Colt Armory Band came to play, and church bells all over the city tolled for the savior of freedom.
To memorialize her passing, every part of the fallen giant was gathered up, cataloged, stored for the future, some of it at the Connecticut Historical Society. Fortunately, she had already set fruit, leaving a mass of acorns to assure her progeny. Chairs were made, one for the president of the state senate. An ornate frame was carved to house forever the Charter she cradled so long ago, which you can see at the State Museum of Connecticut History in Hartford. The Wadsworth Atheneum also has items from the tree on exhibit.
The Charter Oak was apparently so important to Lydia Sigourney, known as the “Sweet Singer of Hartford,” that she published a ballad in the 1840s where she described the massive oak as “ancient and fair.” She again memorialized the Charter Oak with a poem when the grand old monarch fell. There are at least five paintings of the Charter Oak, including one by native son Frederic Church, but the one by Charles De Wolf Brownell appears to be the one used for the 1935 Connecticut commemorative half dollar, as well as the tercentenary stamp. The tree was again memorialized on the 1999 Connecticut quarter of the 50 States Series.
The Charter Oak’s legacy lives on. Over the years, there have been the Charter Oak lawn mower, the Charter Oak Bridge, Charter Oak Park, Charter Oak State College, Charter Oak Federal Credit Union, and now Charter Oak Brewing.
Twenty-three towns claim the honor of scions of the Charter Oak. Since its demise, many seedlings grown from the collected acorns were dispersed for special celebrations. Or as in my town, East Haddam, the acorns were acquired and grown by individuals. According to the sign between the Nathan Hale Schoolhouse and the tree, William H. Scoville, a former state representative from town, brought them home to his mother in 1899, who raised one tree to sapling size and planted it in 1902.
When I teach children about nature, I always talk about oak trees and especially the Charter Oak. I ask them to make a circle to show them just how big the Charter Oak was. They are always impressed, even more so when I tell them we could all fit inside. She was estimated to be at least twenty-one feet in circumference and nearly a thousand years old.
There are only a handful of famous trees around the world: Isaac Newton’s apple, the 9/11 Survivor Tree, the Boston Liberty Tree, Daniel Boone’s Council Tree, the Charter Oak. While many no longer survive, the Charter Oak is the only one with a monument to mark its resting place. In 1905, a stone column reminiscent of a tree trunk was erected at the corner of Charter Oak Avenue and Charter Oak Place near the site where the mighty oak stood for all those centuries.
Alison C. Guinness is a resident of East Haddam, CT, where she researches the local earthquake phenomenon called the Moodus Noises. She is an historian and naturalist with interest in Portland brownstone and other quarrying in the Connecticut River Valley. She has curated exhibits at the Connecticut River Museum on brownstone, Connecticut River fish and wildlife, and boat building. She is currently studying Connecticut’s Cultural Stone Landscapes.
|
Today, Charles Bridge is Prague’s most iconic location, featuring on almost every tourist souvenir imaginable, most of which can be found atop the bridge itself. However, whilst it may draw millions of visitors a year for its splendour, many people fail to acknowledge its less than picturesque past.
Charles Bridge was constructed between the 1357 – 1402 and, though King Charles IV never lived to see its completion, it has since become the crowning jewel his imperial legacy.
Charles Bridge has witnessed a number of historic events and disasters during its lifetime and is also host to many Czech legends. It is said that King Charles IV laid the first stone himself in 1357 on the 9th July at 5:31 am. This precise time was apparently chosen because the pattern forms a numerical bridge 135797531, which Charles believed would reinforce the bridge’s strength. Whilst the story cannot be confirmed, the bridge’s structure still holds firm to this day, despite an onslaught from both history and the elements.
Charles Bridge has survived floods and wars and has provided a stark reminder to those who opposed power in the region. On June 21st, 1621, a year after the battle of White Mountian, the severed heads of 27 anti-Habsburg revolutionaries were displayed atop the Old Town bridge tower.
27 years later, Charles Bridge was the site of one of the bloodiest battles of the Thirty Years’ War, as the Swedish army, who were occupying the West bank of the Vltava attempted to push their forces across the river into the Old Town. During the battle, part of the Old Town tower was damaged, the effects of which are still visible to this day, with a lack of gothic detail on the West facing wall of the tower.
The Statues of Charles Bridge
All of the statues which now adorn the sides of Charles Bridge are replicas of originals which were installed in the late 17th and early 18th and 19th centuries and depict important people and saints in Czech history. The list of statues in order of their original dates of installation are as follows:
Calvary, Holy Crucifix – Exact date unknown, however, the original was the decoration to be placed on the bridge during the reign of Charles IV.
The Bearded man The Bearded Man is one of the oldest public sculptures in Prague. It acted as an old Bohemian watermark warning of potential floods. If the water level reached the eyes and nose of the Bearded Man then Prague was set to flood.
St. John of Nepomuk – sculpted by Jan Brokoff, 1683
St. Anna – sculpted by Matěj Václav Jäckel, 1707
St. Barbara, Margaret and Elisabeth – sculpted by Jan Brokoff and his son Ferdinand Maxmilián, 1707
St. Anthony of Padua – sculpted by Jan Oldřich Mayer, 1707
Madonna, St. Dominic and St. Thomas Aquinas – sculpted by Matěj Václav Jäckel, 1708
St. Jude Thaddeus – sculpted by Jan Oldřich Mayer, 1708
St. Nicholas of Tolentino (Mikuláš Tolentinský) – sculpted by Jeroným Kohl, 1708
St. Augustine – sculpted by Jeroným Kohl, 1708
Madonna and St. Bernard – made by Matěj Václav Jäckel, 1709
St. Adalbert/Vojtěch – sculpted by Michal Jan Josef Brokoff, 1709
St. Cajetan – sculpted by Ferdinand Maxmilián Brokoff, 1709
St. Cosmas a Damian with Salvatore – sculpted by Jan Oldřich Mayer, 1709
St. Francis Borgia – made by Ferdinand Maxmilián Brokoff, 1710
St. Luthgard or The Dream of St. Luthgard –** sculpted by Matyáš Bernard Braun, 1710
St. Francis Xaverius –** made by Ferdinand Maxmilián Brokoff, 1711
St. Ivo – made by Matyáš Bernard Braun, 1711
St. Vincent of Ferrer and St. Prokop –** made by Ferdinand Maxmilián Brokoff, 1712
St. Philip Benitius – sculpted by Michal Bernard Mandel, 1714
St. Vitus – sculpted by Ferdinand Maxmilián Brokoff, 1714
St. John of Matha, Felix of Valois and Ivan – sculpted by Ferdinand Maxmilián Brokoff, 1714
St. Ludmila with little Vaclav – made by Matyáš Bernard Braun, after 1720
St. Norbert, Václav and Sigismund – sculpted by Josef Max, 1853
St. Joseph with baby Jesus – made by Josef Max, 1854
St. John the Baptist – sculpted by Josef Max, 1855
St. Francis of Seraphim – made by Emanuel Max, 1855
St. Christopher – made by Emanuel Max, 1857
St. Václav – sculpted by Josef Kamil Böhm, 1859
Pieta (Bewailing of Christ) – made by Emanuel Max, 1859
Bruncvík – Ludvík Šimek, 1884
St. Cyril and Methodius – sculpted by prof. Karel Dvořák, 1928 – 38
There is one more plaque on Charles Bridge which is not mentioned in the list above. This is the plaque commemorating the death of John of Nepomuk at the hands of King Wenceslas IV.
During the reign of King Wenceslas IV, Europe experienced religious turmoil under the Great Schism of 1378. King Wenceslas supported the Pope of Avignon whilst the Archbishop of Prague remained loyal to the pope in Rome. When it came time to appoint an abbot to the abbey of Kladruby in 1393, following the death of the abbot Rarek, King Wenceslas demanded that no new abbot be appointed but rather the abbey be turned into a cathedral. However, it was John of Nepomuk’s job to confirm the Archbishop of Prague’s candidate and upon hearing the decision that had been made, King Wenceslas IV ordered that John of Nepomuk be tortured and executed.
Rather than be a simple bystander at the torture of John of Nepomuk, King Wenceslas IV took on an active role, with one mural inside Prague castle depicting Wenceslas IV holding a burning torch to his victim’s side. Once Wenceslas had finished, he ordered that John be taken to Charles Bridge, bound in chains, with a piece of wood to gag him. Once there, he was thrown into the river and left to drown. The spot from which he was thrown is now commemorated by a brass plaque and cross.
John of Nepomuk was canonised on March 19, 1729, by Pope Benedict XIII and is now a saint said to protect people against floods and drowning.
|
A new program, developed at a college of education in Israel, seeking to train kindergarten teachers. Target population comprises kindergarten teaching assistants and auxiliary personnel, to provide them with an employment horizon and social mobility, by improving their social status through academic education, which in the past was difficult for them to access. The article presents this program and its uniqueness against traditional kindergarten teachers' training programs. While the latter are based on four years of academic study followed by full integration into work in the field, this program recognizes participants’ practical experience in the field. It allows for the learning environment to be adapted to their lifestyle as family members and employees, to gain experience in guided practical work parallel to their studies throughout their training period, to apply their academic and pedagogic knowledge on a day-to-day basis, and to customize studies and empower students. This article presents the program in comparison to the concept of "On-The-Job" training (OJT), common in other occupations. Faced with a severe shortage of quality kindergarten teachers, education systems need to encourage kindergarten teaching assistants to work, learn and gain experience all at the same time, and help them cope with academic load. Change is needed in a field to attract more applicants and contribute to their sense of coherence, self-efficacy and future orientation. Program contribution will be studied in a PhD research.
Keywords: Sense of Coherenceprofessional developmentsecond careeron-the-job training
Australia, Israel, the United States, Britain and other countries in Europe face a recruitment crisis of educators, kindergarten teachers and schoolteachers. In fact, there is a crisis in personnel in which there is a lack of quality educators to replace the outgoing generation and establish innovative approaches to teaching that are appropriate for technological developments in the 21st century (Richardson & Watt, 2005). Both the lack of incoming manpower and the need to change teaching methods to align with 21st century needs are increasing in their urgency. In addition, lack of proper compensation for educators and their image in society do not attract young people to fulfil their mission in education and shaping future generations. In Australia and Israel, efforts have been made to recruit people from the business and other fields to join the teaching profession. In Israel, teacher training institutions opened courses for academic graduates, as well as unique programs for integrating high-tech professionals as teachers, but this has not solved the problem completely.
Early Childhood education situation
In early childhood education, the situation has remained the same and there is a steep decline in the number of applicants to early childhood training courses. There is a large shortage of professional women in early childhood education and educational systems often compromise on non-professional personnel to carry out their activities. Women who care for young children do not envision themselves entering full training programs that require them to study for four or five days a week. Most of these women need vocational training but also need to maintain their earning capacity and thus cannot give up their jobs. Considering this, training programs are required to understand the needs of these women and still provide them with a professional solution for development and training. This situation raises the need for new creative possibilities.
New kindergarten teachers training program
A new program, developed at a college of education in Israel, whose purpose is to train kindergarten teachers targeting a population of kindergarten teaching assistants and auxiliary personnel, to provide them with an employment horizon and social mobility, by improving their social status through academic education, which in the past was difficult for them to access. It is a unique program and does not follow traditional kindergarten teachers' training programs. While the latter are based on four years of academic study followed by full integration into work in the field, this program recognizes participants’ practical experience in the field. It allows for the learning environment to be adapted to students’ lifestyles as family members and employees, to gain experience in guided practical work parallel to their studies throughout their training period, to apply their academic and pedagogic knowledge on a day-to-day basis, and to customize studies and empower students.
The main purpose of this paper is to review traditional kindergarten teachers training programs and draw keynotes of the new kindergarten teachers training program by reviewing key concepts revealed on literature review chapter and discuss later on conclusion and discussion chapter the advantages and disadvantages of the new training program.
There are many studies about academic second career retraining focusing on preschool age teaching as well, but in the literary review conducted so far, no studies were found about students without an academic background choosing preschool teaching as a second career.
Training program around the world and in Israel
Many studies have demonstrated the contribution of daily interaction between teachers and children to improve their learning processes. These studies have presented improvement and development of training processes for academic teachers, based on this interaction and a growth in alternative programs qualified to do this (Fridman, 2010; Nemser & Ben-Peretz, 2017; Olson, 2000).
These findings establish the essential for adjusting training program to the altering needs of education systems and public education policies. One can conclude that quality education, professional and well trained personnel is necessary response to the of 21th century learners requirements (Crossley, 2009; Darling - Hammond, 2017).
Training programs in Israel
There are numerous teacher training programs in Israel. Traditional routes of 4 and 5- years duration including the M-Teach routes for those without academic education. In addition, alternative training programs for people with academic degrees retrained for a second career in teaching (Feigin et al., 2017).
Kindergarten training programs in Israel
There are two programs for kindergarten teachers. The traditional program to graduate with academic degree and teaching certificate for birth to six. This is a 4-year program intended for non- academic students and includes 4 weeks of practical work per year, during the first three years and an apprenticeship year in the fourth year. Additionally, there is an academic retraining (conversion) program, one or two years with same 4 weeks of practical work per year, differs between training institutions.
Training programs in United States of America
The ‘No Child Left Behind’ (NCLB) reform from the start of the current century, determined fundamental principles with regard to teacher training. To close gaps and response to educational needs, policy leaders must recruit quality professionals to teaching and train them accordingly, build a variety of training programs and bridge the gap in trainees’ abilities to match the learning to the field. On the other hand, difficulties passing licensing tests have led to adaptations complicating the selection procedures and determining standards for improvement and professionalization in teaching (Darling - Hammond, 2017; Field et al., 2003).
There are two training programs in the U.S.A., traditional alongside an alternative program for academic conversion (Shperling, 2017). Most students undertake the traditional training program to become teachers. The number of teacher training institutions currently stands at almost 2,700, less than half of whom offer training programs with a graduate degree. The trend, established today, is more concentrated on training processes in the field. Most attention has passed to the field, to execution of practical teaching and thus to reduce the gap between theoretical teaching and necessary practical skills (Darling - Hammond, 2012; Shperling, 2017).
Kindergarten training programs in U.S.A
There are approximately one hundred programs in the U.S.A. for undergraduate and postgraduate degrees in kindergarten teacher training (Shperling, 2017). These programs are spread over approximately 30 states. Existing data shows the quality of training programs and the absence of an appropriate response to needs in the field. The data reveals that training does not address the professional knowledge required to work with young children (birth to 3 years old), not enough training is provided on child development, its nature and course. The programs focused on teaching the sciences and mathematics and less on recognizing social and emotional skills required by young children (Putman, Moorer, & Walsh, 2016; Shperling, 2017) and not enough practical experience exposing students to the daily difficulties they would encounter as teachers.
Training programs in Finland
Finland is known for the quality of its education. Its success in the field of education starts with the quality of those applying to teach and cultural view of a highly valued professions (Sahlberg, 2015). In recent years teacher training programs have been adapted to changing educational needs. Research and educational personnel, students and teachers are involved in change processes, with a shared responsibility and commitment to the improvement and success of educational processes and encouraging research. Training programs last for 5 to 7 years and include advanced degrees. Training processes are spiral and based on theoretical knowledge, professionalism in the field and developing research in teaching. About a quarter of the training program is dedicated to practical experience, both in academia through skills training with colleagues and practical experience in the field.
Kindergarten training programs in Finland
Training programs in Singapore
Singapore has carried out many reforms in recent years, to develop a quality workforce, to meet the needs of a global competitive market. These reforms have contributed much and in international comparative tests, Singapore hold the first place in student achievements in mathematics (Shperling, 2017; Tan, 2005). Change processes included departure from traditional teaching methods and adapting new ones to the technological revolution in a changing global world (Goodwin, 2012; Taylor, Low, Lim, & Hui, 2012) The training program merge 16 months study and 14 months practical experience.
Kindergarten training programs in Singapore
Most applicants for teacher training have undergraduate degrees. To teach preschool or elementary classes, there is a four-year training course for a teaching license and diploma from the Institute for Education and Teaching.
Training programs in England
Training in England is carried out in teacher training agencies and not institutes of higher education. The government supervises these agencies and focuses on practical and applied based training programs. There are three training programs, the first is based on training at schools where daily experience in teaching is taught. It lasts approximately one year and upon completion, a teaching license is issued. The second one is based on pedagogic training, acquired at an academic institution. It lasts up to two years, as part of undergraduate or graduate degree studies with a practical experience program of about 18 weeks for elementary classes and 24 weeks for secondary classes. The third is a training program for academics, experienced teachers or military personnel (Shperling, 2017). In recent years changes have been made to training programs and the emphasis placed on practical experience and abilities (Ross & Hutchings, 2003).
Training programs in Canada
Canada has experienced changes to teacher training programs as part of its great demand for teaching personnel versus recruitment challenges and dropping out of the profession. Each province has its own training program. Programs are targeted at undergraduates or those without any degree, some at university institutions and some in the community, mainly online. Training for a teaching certificate and undergraduate degree lasts about four years. Practical experience occurs in the fourth year (Shperling, 2017).
Kindergarten training programs in Canada
For kindergarten teachers, there is a graduate degree training program at the University of Toronto. Teaching staff come from the department of psychology, with an emphasis on child development and behavior, by analyzing observations and practical experiences in the area. The program has professionalization and research horizons, in topics linked to child development and education (University of Toronto OISE, 2017).
Training programs in The Netherlands
The Netherlands is undergoing significant demographic changes, directly affecting its education system and teacher training programs. As a result of high dropout levels and teacher retirement, there are initiatives to recruit personnel to teaching using incentives and alternative rapid teacher training programs for academics. Most programs last one to four years and practical experience is integrated into the program from the start (Hammerness, van Tartwijk, & Snoek, 2012).
Kindergarten training programs in The Netherlands
Acceptance conditions for this training program are not high. Candidates with basic education can be accepted to a four-year program carried out in universities.
Training programs in New Zealand
Education reform in New Zealand passed most responsibility to schools and teacher training institutions, creating a structural change in training institutions and changes to programs themselves. Teaching licenses are received after continuous work, work assessment and participation in a mentoring program, supported by the state. Alongside these changes, applied programs of practical experience were building, integrated throughout training programs (Alcorn, 2014; Ell, 2011).
Kindergarten training programs in New Zealand
Various subjects are learned in these programs that last approximately a year. The programs are accompanied by at least 14 weeks practical training. In Auckland, there are kindergarten teachers training programs where a license is awarded after a number of credits are achieved, at every stage of training, including the practical program. Candidates have undergraduate, graduate or no academic degrees.
Alternative training program around the world and in Israel
Alternative programs for teacher training are aimed at those with an academic degree without formal knowledge in education and teaching (Berkovich & Shalev-Vigiser, 2010). Students in these programs are more mature, with acquaintance and experience in the labour market, but without acquaintance with the education discipline. Overall, these students receive short-term training at teacher training institutions and immediately after, integrate into school and kindergartens. These programs are based on training during practical work in the field.
These programs have multiplied in recent years as a respond to the demand for quality personnel to integrate into teaching and to the shortage in personnel (Kee, 2012). Such shortages sometimes come from reforms and systemic changes deriving from public policy. For example, in Israel, a number of weeks before the commencement of the formal educational year (September 1st) the Trachtenberg Report was approved, extending the Free Education Law to age 3 (previously was age 4) and all kindergartens for 3-4 year olds would be given an additional assistant, who would help absorb younger children into the supervised educational framework. Every kindergarten would have a manager-teacher and two assistants, who would support organizational and educational work. This reform created a need to integrate professional and available personnel immediately and accelerated student applications to alternative training programs.
How these training programs are defined differs between Israel and the world. These programs are not always state supervised. In the United States, programs are defined as alternative programs and as their name says are an alternative to traditional programs. In Israel, the tendency is to define them as unique programs. According to the Ministry of Education, responsible for training teaching personnel, there are no alternative programs, all meet ministry policy outlines and the difference is how curricula are distributed. In traditional programs, all academic studies and training take place before entering teaching whereas in the unique programs, training commences before and continues during work (Feigin et al., 2015).
As mentioned, alternative and special training programs in Israel and around the world refer primarily to students with undergraduate degrees. There are few special programs to train teachers/kindergarten teachers without academic degrees, with practical experience and knowledge accumulated through many years of work in education systems. These unique programs signify an interesting change in the field.
A systematic review of the relevant literature was done.
Conclusion and Discussion
Trends in teacher training programs shows policies, in most countries, promoting academic training and academic progress routes, as part of overall training programs. These indicate high acceptance conditions, encouraging professionalism and research-based training, taking place, mainly in academic institutions (New Zealand, Finland and Canada).
There is a trend to transfer training to the field, in schools and designated institutions (England and U.S.A.).
There is comprehensive agreement that practical knowledge and experience are significant in training and must be widely integrated into programs. Teachers must learn how to teach – that is their meaningful and true learning. The more training programs are based on practical knowledge and experience, the gap between academic institutions and reality, in the field, will be closed.
In most programs, the practical are at the end of the training program, with the exception of a few programs that integrate experience throughout training programs (Canada and the Netherlands).
From the review of alternative teacher training programs in Israel and around the world, it emerged that they are intended for students with academic degrees and that there are no programs awarding an academic degree and teaching certificate to those with professional preschool age experience. In Israel, for assistants with many years’ experience and basic education or kindergarten teachers in birth to three, yearning to progress personally and professionally, there are programs to train crèche managers, whose acceptance conditions and public administration requirements require them to have a professional certificate in the field. Today, in Israel, there is a unique program for educational workers enabling academic qualification in students’ working place during their work. The program is based on a layout delineated by the Israeli Ministry of Education, lasts 4 years and combines academic studies at college alongside practical work in the field. The program is unique and suits the lifestyle of those applying to this route, in the sense of age and professional identity. The whole purpose of this program is to promote women in education and the research topic that examines the effect of studying on this program on future orientation of students, their self-efficacy ability and their self of coherence.
This literature review shows that early childhood development, at birth to 6, is the basis for normal development, mainly the interaction is of utmost importance. Still, there is a large gap in most of the training programs in the world for this important issue. The training programs generally address the older ages while early childhood practitioners, remain inadequate training. Only turning the pyramid upside down, focusing the most attention on improving preschool educators' professionalism, through training programs that combine work and learning, will lead to this upheaval.
- Alcorn, N. (2014). Teacher education in New Zealand 1974-2014. Journal of Education for Teaching, 40(5), 447-460.
- Berkovich, I., & Shalev-Vigiser, Y. (2010). Alternative Teacher Training in Israel: Background, Mapping and Analysis Conceptual. Background document for the 2010 Van Leer Conference on Education: Teacher Policy and Teaching. Jerusalem: Van Lear Institute.
- Chambers, D. (2002). The real world and the classroom:The Seconed-Carrer teachers. The Clearing House: A Journal of Educational Strategies, Issues and Ideas, 75(4), 212-217.
- Crossley, M. (2009). Rethinking context in comparative education. In R. Cowen & A. M. Kazamias (Eds.), International handbook of comparative education (pp. 1173–1188). Springer.
- Darling - Hammond, L. (2012). Teacher preparation and development in the United States: A changing policy landscape. In L. Darling-Hammond & A. Lieberman (Eds.), Teacher education around the world: Changing Policies and Practices (pp. 30-150). New York: Routledge Chapman Hall.
- Darling - Hammond, L. (2017). Teacher education around the world: What can we learn fron international practice. European Journal of Teacher Education, 291-309.
- Ell, F. (2011). Teacher education in New Zealand. Journal of Educational for Teaching, 37(4), 433-440.
- Feigin, N., Fresco, B., Tal, P., Talmor, R., Feldman-levi, I., & Coppermintz, H. (2017). Alternative Teacher Training Programs in Israel:The characteristics of their students and their integration into the education system. Tel-Aviv.
- Feigin, N., Tal, P., Talmor, R., Levi-Feldman, I., Fresko, B., & Kupermintz, H. (2015). Alternative programs In teacher training in Israel. Research Report. Tel-Aviv: Mofet institute.
- Field, l., Gayle-Evans, G., Michael, D., Lang, S., Hewitt, M., & Micklo, S. (2003). A comparison of content: Florida's certification examination and Florida's educator accomplished practice. ERS Spectrum, 21(1), 32-39.
- Fridman, I. (2010). Who are you the "right teacher"? Components in the shape of the teacher who deserve to be part of educational philosophies. Education and its surroundings, 32, 87-104.
- Goodwin, A. L. (2012). Quality teachers, Singapore style. In L. Darling-Hammond & A. Lieberman (Eds.), Teacher education around the world: Changing Policies and Practices (pp. 22-43). New York: Routledge Chapman Hall.
- Haggard, C., Slostad, F., & Winterton, S. (2006). Transition to the school as Workplace: Challenges of Second career teachers. Teaching Education, 17(4), 317-327.
- Hammerness, K., van Tartwijk, J., & Snoek, M. (2012). Teacher preparation in the Netherlands: Shared visions and common features. In L. Darling-Hammond & A. Lieberman (Eds.), Teacher education around the world. In Teacher education around the world (pp. 44-65). London & New York: Routledge.
- Helppie-McFall, B., & Sonnega, A. (2017). Characteristics of Second-career Occupations: A Review and Synthesis. Michigan Retirement Research Center Research Paper.
- Jacobs, R. L. (2003). Structured on-the-job training: Unleashing employee expertise in the workplace. Berrett-Koehler Publishers.
- Kee, A. N. (2012). Feelings of preparedness among alternatively certified teachers: What is the role of program features? Journal of Teacher Education, 63(1), 23-38.
- Ministry of Education and Culture Finland (2017b). Teacher education development programme. Retrieved from http://www.minedu.fi/export/sites/default/osaaminenjakoulutus/peruskouluuudistus/opettajankoulutusfoorumi/liitteet/teacher-education-development-programme.pdf
- Nemser, S. F., & Ben-Peretz, M. (Eds.). (2017). Getting Tehchers we need International Perspectives on Teacher Education. Rowman & Littlefield.
- Novak, D., & Knowles, J. (1992). Life Histories and the Transition to Teaching as a Second Career. Ann Arbor, MI: The University on Michigan, Program in Educational Studies.
- Olson, L. (2000). Finding and keeping competent teachers. Education week, 19, 12-18.
- Powers, F. W. (2002). Second-Career teachers: Perceptions and mission in their new careers. International Studies in Sociology of Education, 12(3).
- Putman, H., Moorer, A., & Walsh, K. (2016). Some assembly required: Piercing together the preparation preschool teachers need. National Council on Teacher Quality. Retrieved from http://www.nctq.org/dmsView/Preschool
- Richardson, P. W., & Watt, H. M. (2005). ‘I’ve decided to become a teacher’: Influences on career change. Teaching and Teacher Education, 21, 475–489.
- Ross, A., & Hutchings, M. (2003). Attracting, developing and retaining effective teachers in the United Kingdom of Great Britian and Noethern Ireland. Institute for Policy Studies in Education. Retrieved from http://www.oecd.org/education/school/2635748.pdf
- Sahlberg, P. (2015). Finnish lessons 2.0: What can the world learn from educational change. N.Y.: Teachers College.
- Shperling, D. (2017). Review information on teacher education training programs worldwide. Tel Aviv: Mofet Institute.
- Tan, C. (2005). Driven by pragmatism: Issues and challenges in an ability-driven education. Shaping Singapore’s future: Thinking schools, learning nation, 5-21.
- Taylor, P. G., Low, E. L., Lim, K. M., & Hui, C. (2012). Making learning visible in initial teacher education: A pedagogical characterisation scheme. Educational Research, 12, 193-209.
- University of Toronto OISE. (2017). Master of arts in child study and education program. Retrieved from http://www.oise.utoronto.ca/ics/M.A._Program/MACSE_Program_Welcome/index.html
- van der Klink, M. R., & Streumer, J. N. (2002). Effectiveness of on-the-job training. Journal of European Industrial Training, 26, 196-199.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
About this article
17 June 2020
Print ISBN (optional)
Teacher, teacher training, teaching skills, teaching techniques, special education, children with special needs
Cite this article as:
Zaidel, M., & Stan, C. (2020). Training Program For Kindergarten Teachers In Israel Professional Development As Second Career. In V. Chis (Ed.), Education, Reflection, Development – ERD 2019, vol 85. European Proceedings of Social and Behavioural Sciences (pp. 102-111). European Publisher. https://doi.org/10.15405/epsbs.2020.06.11
|
Origin of indefatigableMiddle French indéfatigable from Classical Latin indefatigabilis from in-, not + defatigare, to tire out, weary: see de- and fatigue
Someone who keeps trying and trying to learn a skill and who never gives up is an example of a person who would be described as indefatigable.
Origin of indefatigableObsolete French indéfatigable from Latin indēfatīgābilis in- not ; see in- 1. dēfatīgāre to tire out ( dē- intensive pref. ; see de- . ) ( fatīgāre to weary )
(comparative more indefatigable, superlative most indefatigable)
- defatigable (much less common)
From Middle French, from Latin indēfatīgābilis (“untiring”), from in- (“not”) + de- (“away”) + fatīgō (“I tire”).
- Moreover Frederick, who had proved by his wars the importance which he attached to Silesia, was indefatigable in times of peace in his attempts to justify his usurpation.
- He had courage, a vivid sense of duty, an indefatigable love of work, and all the inquisitive zeal and inventive energy of a born reformer.
- The energies of the indefatigable parson knew no bounds.
- But through all situations of his life he preserved his equanimity, his keen interest in science, and his indefatigable zeal for the instruction of others.
- A few days later the indefatigable Sheridan won the last great victory of the war at Five Forks.
|
New Clues to the Processing of Memories
PASADENA, Calif.- Quick! Memorize this sentence: The temporoammonic (TA) pathway is a entorhinal cortex (EC) input that consists of axons from layer III EC neurons that make synaptic contacts on the distal dendrites of CA1 neurons.
If by chance you can't memorize this, say two researchers from the California Institute of Technology, it may be due to this very TA pathway that is modulating what your brain remembers.
In another clue toward understanding the processing of memories, graduate student Miguel Remondes and Erin M. Schuman, an associate professor of biology at Caltech and an assistant investigator of the Howard Hughes Medical Institute, have now gleaned two possible roles for the TA pathway that until now were not known. The research is reported in the April 18 issue of the journal Nature.
Using rat hippocampal slices, they've found that this pathway may be part of the brain's decision-making process about whether to keep a particular input and form a memory, or reject it.
Input from the senses—an odor, a sight, or a sound, say, is first received by the brain's cortex. Then, via a specific pathway of nerve fibers long known to scientists, the signals are sent on to the hippocampus. That organ processes the signals, then sends them back to the cortex, probably for long-term storage.
Scientists have also known about the TA pathway, but not its function. Now Remondes and Schuman report that the TA pathway may serve as a memory gatekeeper that can either enhance or diminish the signals of the specific set of neurons that form a memory. Further, they've shown that this pathway may also provide the hippocampus with the information it needs to form so-called place-selective cells; that is, cells that help animals to know where they are in their environments.
The hippocampal formation comprises several structures in the brain and includes the seahorse-shaped hippocampus and a second organ called the dentate gyrus. The formation is involved in saving and retrieving long-term memories. Scientists divide the hippocampus into four divisions, from CA1 to CA4. CA1 and CA3 play major roles in processing memory.
In their quest to understand how communication between neurons contributes to memory, scientists have focused on the "trisynaptic circuit." When input from the senses reaches the cortex, it's sent on to the dentate gyrus, then on to the hippocampus. There, the signals are serially processed by synapses in areas CA3 and CA1 of the hippocampus (synapses are gaps between two neurons that function as the site of information transfer from one neuron to another). Finally, the hippocampus sends a signal back to the cortex. That's the trisynaptic circuit.
Remondes and Schuman found that the TA pathway also sends signals. But its input comes from a different part of the cortex and goes directly to the CA1 section of the hippocampus. The TA pathway reacts depending on how close in time the synaptic signals from the hippocampus are from the original signal sent by the trisynaptic circuit. If it is close, within 40 milliseconds, the TA pathway will act as a signal (and thus a memory) enhancer; that is, it will allocate a stronger synaptic signal from the hippocampus. If it is far, more than 400 milliseconds, it will inhibit the signal.
"So the brain sends the information to the hippocampus," says Remondes, "and instead of just collecting the result of its activity, the hippocampus may very well perform 'quality control' on the potential memory. And it may be doing this by using the direct cortical input from the TA pathway." Perhaps, then, this is a further clue to how memories are stored—or forgotten.
In addition, although the scientists have not done any specific spatial memory experiments, their work may have relevance to how the brain forms place-selective cells. Since other studies previously established that the trisynaptic circuit is not necessary for spatial memory, some of the important information entering the hippocampus may actually be provided by the TA pathway.
"The TA pathway has been briefly described in the past, but not really acknowledged as a 'player' in the memory debate," says Remondes. "Hopefully, these findings will bring new insight into how we form, or don't form, memories."
|
K-Factor formula for fire sprinklers
- Category: Hydraulic calculation for fire protection engineers
When we start any hydraulic calculation for a water based fire protection systems such as fire sprinklers, water mist, hose reel and deluge systems the k-factor formula is one formula which all fire protection engineers must know and understand. It allows us to calculate the discharge flow from any type of nozzle (fire sprinkler, water mist or a deluge nozzle) for which we have a k-factor. We can also calculate the k-factor for any nozzle if we have not been given one, however you must check with the manufacture that this is acceptable.
The k-factor formula is the start of all hydraulic calculation for fire protection systems for both manual and computerized calculations and is also required for the checking of both types.
The discharge from a sprinkler head or nozzle can be calculated from the formula bellow:
q = kp0.5
when q = flow in L/min
k = nozzle discharge coefficient or k-factor for head in Lpm/bar0.5
p = pressure in bar
This formula can be rewritten to give us:
k = q / p0.5 and p = ( q / k )2
Our Hcalc Hydraulic Calculator will allow you to explore the K Factor formula in more detail and will allow you to calculate the flow, pressure or find the k factor for a nozzle or fire sprinkler. You can freely download and use our Hcalc software.
For standard type sprinkler heads the many design standards specify standard k-factors and minimum pressure, which can be used for different Hazard classifications and design densities. For all other types of sprinkler heads the manufactures data sheet should be referred to for the k-factor and minimum head pressure.
We also use K-factors for many other applications in fire hydraulics such as flow from a fire hydrant, wet riser outlet, hose reel or foam monitor. In fact the list is almost endless and this is why it is important to be familiar with the above formulas.
Often K-factors are given as an imperial value in gpm/psi½ this value cannot be entered into FHC without first converting to its metric equivalent Lpm/bar½. To convert gpm/psi½ to Lpm/bar½ we need to multiply by 14.4 (Approximate)
Example: A sprinkler head has a discharge coefficient of 4.2 gpm/psi½ what is its metric equivalent valve. 4.2 x 14.4 = 60.48 Lpm/bar½.
We only need to use K-factors to one decimal place so 60.48 becomes 60.5 Lpm/bar½.
|
No matter the type of economic system practiced in a society, it will bring about some advantages and disadvantages to the populace. The free market economy is not exempt from this as it offers certain advantages to countries that practice this economic system. The free market economy is one where commercial activities are mainly regulated through private measures. Hence, the market is driven by competitive bidding for goods and services and voluntary contracts. The price of goods and services is also determined by the extent of demand and supply rather than being fixed by the government.
In a free market economy, private property rights are in play instead of the communal ownership of property. People also have the freedom to determine the kinds of businesses they get involved in as well as who they do business with. The government’s role in a free economy is also often restricted to being an unbiased umpire to ensure that contracts are kept and that the prices of goods and services, especially necessities such as food, water, and clothing do not get bludgeoned beyond what citizens can afford. Here, the advantages of free market economy shall be discussed.
Advantages of free market economy
- Aids efficient allocation of resources
- Encourages competition
- Stimulates economic growth
- Alternatives abound for consumers
- Economic freedom
- Limited government presence
- Encourages innovation
- Consumers drive the market
- Promotes equality
- Encourages entrepreneurship
Aids efficient allocation of resources
One advantage of the free market economy is that it aids the efficient allocation of resources by companies operating within the society. They will have to allocate resources to products or services that bring the most benefits to the company with the aim of increasing the effective use of their capital and human resources. Companies that are into the manufacturing of various products or the rendering of services, will have to ascertain which product or products, or service or services bring more sales to the company. By so doing, they can determine which product or service to dedicate more resources to and which product or service to reduce resources from or stop allocating resources altogether.
Moreso, since most companies exist for-profit, they often create better production techniques that will reduce their production cost and increase their profits. Hence, in a free market economy, inefficiencies are prevented through the efficient allocation of resources in the production process as businesses adapt adequately to efficiently use the resources at their disposal.
A major advantage of a free economy is that it stifles monopoly by encouraging competition between the various producers that are present in the market. There is often a proliferation of businesses that offer similar products and services in this kind of economy. This makes the various companies employ several methods of marketing such as identity-based marketing in order to focus their marketing efforts on a particular group of consumers.
Organizations also focus their resources on making products and services that meet the exact needs of their targeted demographics. This is done to ensure that their products and services stand out among those that other producers within the same industry offer. For instance, in order to meet the need of customers who are dieting but still want to have a drink of Coca-Cola, the company produces diet Coke to meet that need. Additionally, since the company operates in a free economy, other soda producers such as Pepsi also have a similar product available to dieting customers, diet Pepsi. Hence the free market encourages competition and is clearly an advantage of a free economy.
Stimulates economic growth
A study by the Heritage Foundation found that countries that are economically free tend to have greater per capita wealth when compared to countries that practice other economic systems such as the command economy which is often associated with communism. Since the companies in existence in the free market have the growth of their business as a top priority, it further goes to stimulate the overall economic growth of the society in which they operate. As companies produce goods and services to meet varying demands and needs within society, the populace also spends money on purchases.
Whether the sales made by companies are cash or credit sales, the bottom line is that at the end of the accounting season, it will culminate into an increase in the company’s revenue irrespective of whether it is revenue from the sales of products or revenue from the services rendered to consumers by the company. As money keeps changing hands from consumers to manufacturers, economic activities receive a boost. The employees of the company also get paid their salaries. Thus, it becomes a cycle of increasing wealth throughout the economy. Therefore, practicing the free economic system brings the advantage of economic growth to society.
Alternatives abound for consumers
One of the advantages of the free market system is that it provides consumers with a lot of alternatives when it comes to buying products or services. This is made possible because of the key characteristics of the free economy whereby competition is prevalent among the producers and the fact that there are limited restrictions imposed on consumers or producers by the government. Since several companies operate in a free market with a lot of them operating within the same sector, there is an availability of diverse products to the consumers.
For instance, when consumers want to buy toothpaste, they have the option of choosing from a wide range of toothpaste that are made available by different producers such as Crest, Colgate, Sensodyne, Aim, Close-Up, Pepsodent, etc.
Another advantage of the free market economy is that producers and consumers enjoy economic freedom. Economic freedom means that business owners are free to choose and decide how they will operate such as choosing their business terms, rules and regulations, operating hours, prices, products, and services to offer. Consumers are also free to choose what products or services to buy and from whichever vendor they want to buy from.
Furthermore, all citizens are allowed to choose their career path and can seek and get employed anywhere within society. They can further decide to quit their job if they so desire. No one dictates how individuals living in a free market economy should spend their money or the kinds of jobs they should take. In simple terms, a free market economy offers all citizens the advantage of having freedoms that allow them to be themselves, make personal choices, and utilize their resources in any way they deem fit.
Limited government presence
A major advantage that both business owners and consumers enjoy in a free economy is that the government does not interfere in daily business activities. This means that business owners have the freedom of operating their businesses in ways that are most profitable to them. The government’s limited presence in the market means that sales and purchases can be easily carried out without long and unnecessary bureaucracy. This further increases productivity and reduces administrative costs to companies which in turn serves in keeping the prices of goods and services affordable to the populace.
A free market economy is often self-regulated, demand and supply generally drive the market. This means that the choices made by the private sector which includes the producers and consumers enable the functioning of the economy. More often than not, manufacturers produce goods and provide services that are in demand. Consumers on the other hand make purchases from companies that best meet their demands. The government often only serves to ensure that products and services meet the required standards and that contracts that are initiated get completed by the parties involved.
Additionally, all businesses that do not serve the best interest of society such as human trafficking, sales, and purchases of hard drugs, arms, and ammunition, etc. are considered illegal. A free economy cannot exist if people’s choices are tampered with, hence countries like the United States have enshrined concepts such as freedom of speech and other freedoms into their Bill of rights and Constitution to protect the existing concepts of capitalism and curtail unexpected shifts in economic conditions that will be a disadvantage to its citizens.
Another advantage of a free market economy is that it encourages innovation by service providers and goods manufacturers. Since the government does not dictate what products or services businesses can offer to the populace, it gives companies the freedom to come up with new ideas that will result in new or improved products and services. Generally, businesses that exist in a free market constantly make research to keep up with customer needs and demands as well as popular trends within society. The presence of several products and service providers further drives innovation since competition is often stiff between companies that produce similar products.
These companies continually try to provide better products and services to consumers so as to outdo their competitors in the industry. This often leads to consumers being offered good value for their money as the companies know that if they do not offer quality products or services, their competitors will get better patronage than them. For instance, the iPhone manufacturer, Apple, constantly upgrades their phone’s features to meet up with customer demands and also remain a leading brand in the market among other phone producers.
Consumers drive the market
An advantage of a free market economy to consumers is that they drive the market because they are the ones who ultimately decide which products and services succeed and which ones fail. This is so because they consumers are constantly presented with diverse products and service offerings and are left to decide which products to spend their money on. Although the manufacturers and service providers price their goods how they deem fit and in a way that will bring profit to them, they usually have to consider their target customers when pricing products and services.
This is due to the fact that when the price of a good or service is considered expensive by consumers, it often translates to little or no purchase of the expensive product or service. Customers are therefore the judge and the jury of products and services in this economic system. The products and services they purchase will thrive while those they do not purchase will not. Hence, consumers determine which companies will continue existing in the market and which ones will fail and exit the market.
When the market in a given society is free, it naturally promotes equality among the members of the society. This is so because there is no undue advantage to any individual or corporate entity. All citizens of the society are presented with equal opportunities when it comes to taking part in the buying and selling that goes on in the free market. Anyone irrespective of their background, religion, social class, or status can achieve any level of success they want based on their ability to utilize the resources at their disposal and to engage the market in a way that brings the maximum benefit to them.
One of the advantages of a free market is that it encourages entrepreneurship. Since there is usually no restriction on who can start a business, anyone who has ideas on how to meet the needs of people in the society can translate their ideas into products or services that will meet those needs. Economic freedom which is a basic part of the market also aids entrepreneurship since individuals can invest their monies into any business that they want without coercion or pressure from the government.
The regular emergence of new companies further ensures that the products and services that thrive in the market are of increasingly high quality. Low-quality products and services will generally not survive the increasing competition made prevalent through the improved products and services that new entrepreneurs constantly offer. This is made possible by the ease of starting or closing a business in a free economy.
Read about: Crony Capitalism
The advantages offered by a free market economy are numerous as we have discussed above. The competition present in such markets usually makes the products and services offered to be of high quality and at affordable prices. The limited government interference and economic freedom boost innovation, encourage entrepreneurship and give a level playing ground for all citizens to be able to implement their ideas and create products or services that meet the needs of their target customers.
Demand, supply, and the prices of goods and services also have a close relationship in a free economy. As the demand for certain products increases, it usually results in an increase in price whereas a fall in demand often results in a decrease in price. In addition to the business models employed by business owners and their efficient use of resources to sustain profitability, consumers also play a big role in determining businesses that succeed and those that fail. They do so by their purchasing power; businesses that get patronized survive while those that are not patronized usually fail.Last Updated on November 3, 2023 by Nansel Nanzip Bongdap
Blessing's experience lies in business, finance, literature, and marketing. She enjoys writing or editing in these fields, reflecting her experiences and expertise in all the content that she writes.
|
The word “sprite” derives from the old 8-bit days where bitmaps were moved around the screen in games. They were called sprites and a common technique was to gather them all into a grid on a large image, where the code could pull out the desired one by their respective coordinates.
So instead if loading a lot of small images, we just load one big image. This will reduce the number of HTTP requests, which in turn improves page loading speed and may reduce undesired flickering effects.
CSS Sprites are used on many high-traffic sites today. For instance, have a look at the grid image used by Google:
How to implement this? The trick is clever use of the CSS property “background-position”. Have a look at this simple example markup:
And the following CSS:
Where nav.gif contains a grid of different images. In short, the background position is shifted to use various image positions in the grid image. The code above is very simplified, but you get the main idea. Read Dave Sheas article for a detailed description of the technique.
There are also other ways to use it. Douglas Bowman wrote an article in 2003 entitled Sliding Doors of CSS where he created flexible CSS tabs. This can be combined with CSS sprites, have a look at Sliding Doors Meets CSS Sprites. You can also create CSS-based image maps.
As always, apply common sense since the technique is not always an improvement. Some images may be difficult to combine in a grid and be careful with variable-width elements such as input fields. If the grid image is very large, it could cause a long download time as well as wasting browser memory while decompressing. It can also be a pain to make it work in every browser and it may increase complexity in your web project.
|
Origin of tweeback-formation from tweet, in same sense from child's pronunciation of sweet
Origin of tweeAlteration of tweet baby-talk alteration of sweet
(comparative more twee, superlative most twee)
From a childish pronunciation of sweet. The Oxford English Dictionary records the first use in 1905 in Punch.
|
- 1 How is Hindustani music written?
- 2 Which is the most important note in classical music?
- 3 How do you write a Sargam?
- 4 How do you write notation in Indian music?
- 5 Which is older Carnatic or Hindustani?
- 6 How many types of Jati are there in music?
- 7 What is the most pleasing musical note?
- 8 What is the most used note in music?
- 9 What is the most common note in music?
- 10 What are the 7 musical notes?
- 11 What are the 12 musical notes?
- 12 What is the beat in Indian music called?
- 13 How many notes are there in Indian music system?
- 14 What is Raag in Indian music?
How is Hindustani music written?
The traditional system of notation uses the Devanagari ( Hindi ) script, but it is easier to romanize for digitization. The words to the composition are written out under the title line in a way that makes them easy to understand for those who know the language.
Which is the most important note in classical music?
Da-da-da Daaah! It must be the most iconic motif to be found in the entire literature of western classical music. When Beethoven first started composing his Fifth Symphony in 1804, Europe was in a state of relative calm.
How do you write a Sargam?
How to read SARGAM notations
- CAPITAL LETTERS = Shuddh Swars (Pure Notes)
- small letters = Komal Swars (Flat Notes)
- A Note with # [hash] = Tivra Swar.
- Letter/Alphabet ONLY = Medium Pitch/Normal blow on flute.
- Letter/Alphabet PRECEDED BY a ”. ” [
How do you write notation in Indian music?
In Hindi, notation is called ‘Svaralipi. ‘ This is formed of two words ‘Svara’, which is note and ‘Lipi’, which means script or the written form of any language. Thus, Page 2 34 Hindustani Music Notes Notation System of Hindustani Music Svaralipi is the script of notes.
Which is older Carnatic or Hindustani?
Differences. (i) Origin of Hindustani music is earlier than Carnatic music. It synthesizes with Vedic chants, Islamic traditions and Persian Musiqu-e-Assil style. Carnatic is Comparatively pure and was developed in 15th 16th century during Bhakti movement and also get boost in 19th -20th century.
How many types of Jati are there in music?
Dattilam categorizes melodic structure into 18 groups called jati, which are the fundamental melodic structures similar to the raga.
What is the most pleasing musical note?
Since the time of the ancient Greeks, we have known that two tones whose frequencies were related by a simple ratio like 2:1 (an octave) or 3:2 (a perfect fifth) produce the most pleasing, or consonant, musical intervals.
What is the most used note in music?
The reason is that the most commonly used scale in Western music is the major scale, and the sequence C–D–E–F–G–A–B–C (the C major scale) is the simplest example of a major scale.
What is the most common note in music?
Ning notes that the most popular key of all — G major — also happens to be among the easiest ones to play on both a guitar or piano, saying: E is convenient for guitar, but not piano. C is convenient for piano, but not guitar. G is convenient for both guitar and piano.
What are the 7 musical notes?
Most musicians use a standard called the chromatic scale. In the chromatic scale there are 7 main musical notes called A, B, C, D, E, F, and G. They each represent a different frequency or pitch.
What are the 12 musical notes?
In Western music, there are a total of twelve notes per octave, named A, A#, B, C, C#, D, D#, E, F, F#, G and G#. The sharp notes, or ‘accidentals’, fall on the black keys, while the regular or ‘natural’ notes fall on the white keys. As well as sharps, the black keys can also be flats – ie, Bb, Db, Eb, Gb, and Ab.
What is the beat in Indian music called?
In Indian classical music, a Matra is a beat, the smallest rhythmic sub-unit of a tala – the musical meter. It is one of the three levels of structure for tala along with Vibhag (measure) and Avartan (cycle). The significance of beats depends on their occurrence in a cycle.
How many notes are there in Indian music system?
Indian music also has an octave divided into twelve notes. These twelve notes are called swaras; they are not tuned like the notes of the chromatic scale (please see below). Also similarly to Western music, only seven notes are available for any given piece of music.
What is Raag in Indian music?
Raga, also spelled rag (in northern India ) or ragam (in southern India ), (from Sanskrit, meaning “colour” or “passion”), in the classical music of India, Bangladesh, and Pakistan, a melodic framework for improvisation and composition.
|
Allergy fighting foods to include in your diet
What you eat can make a big difference to how you look, think and feel. This is also the case when it comes to allergies.
Every spring when flowers bloom, pollen is released into the atmosphere. Usually this is a slow and gradual process, but following a cold, harsh winter, this year it has been more sudden.
As a result we have been bombarded with high levels of pollen, and many will be facing a springtime of heavy sneezing, watery eyes and an itchy throat.
If you are sensitive to pollen and dreading a flare up of symptoms, we have a little guide to keep your allergies under control through your diet.
Here are five nutrients to give your immune system a much-needed boost:
Magnesium – According to Mitchell Gaynor – MD and clinical assistant professor of medicine at NYC’s Weill-Cornell Medical College – magnesium helps to “open up your airways”. It is also considered beneficial for reducing inflammation.
Gaynor recommends including more magnesium-rich foods in your diet, such as kale, spinach, avocado, flaxseed and sunflower seeds. Nuts are another great source, so stock up on almonds, Brazil nuts, cashews and pine nuts.
Probiotics – Your gut health is closely related to your immune system. As a result, foods that benefit your gut will also be of benefit to your sinuses. You may want to consider taking a probiotic supplement, but you can enjoy natural sources such as Greek yoghurt, miso soup, Kefir (a fermented dairy product) and pickles.
Vitamin C – Citrus fruits are highly recommended if you feel a cold coming on, but vitamin C can also be useful for alleviating allergy symptoms.
Dr Gaynor explains: “When you have allergies, histamine levels are high. The vitamin C in citrus like oranges, bell peppers, tomatoes and peas helps lower the release of histamine and breaks it down quicker.”
Bioflavonoids – Brussels Sprouts, garlic, green tea and mangoes are packed-full of healthy plant-based antioxidants that help to reduce the amount of histamine produced by the body.
Quercetin – According to Dr Gaynor, “this nutrient helps suppress the part of the immune system that causes allergies.” This is because it helps to reduce histamines. Quercetin is commonly found in apples (especially Granny Smith), as well as parsley, onions and sage.
|
Cell phones have become a vital part of our everyday lives, but there are still times when we find ourselves in areas with poor signal or no reception at all. Weak signals not only affect our ability to communicate but also have a significant impact on public safety. Discover how cell phone boosters improve public safety by enhancing communication, enabling access to emergency services, and much more.
Enhancing Communication in Rural Areas
Cell phone boosters play an essential role in enhancing communication in rural areas. These regions often face network issues due to their distance from cell towers and the presence of natural barriers like mountains or forests. A cell phone booster works by capturing the weak signal, amplifying it, and then redistributing the strengthened signal within a specific area. This ensures consistent network access, enabling residents to make clear voice calls, send text messages, and use data services without interruption. Thus, cell phone boosters transform rural areas from communication dead zones into zones of clarity, allowing residents to stay connected with the rest of the world.
The enhancement of communication in rural areas through cell phone boosters goes beyond just enabling voice calls and texts; it significantly elevates the quality of life for rural residents. In this digital age, reliable internet access has become a necessity. Think about online education, telecommuting, telemedicine, and staying connected with distant friends and family. By strengthening weak signals, cell phone boosters ensure that rural residents can reliably access these services, breaking down the digital divide between urban and rural areas. Moreover, the improved communication methods encourage local businesses by enabling them to reach a broader customer base through digital platforms. Consequently, cell phone boosters contribute to the socio-economic development of rural communities.
Providing Access to Emergency Services
Cell phone boosters play a crucial role during emergencies, as they can ensure clear voice calls to emergency service operators. With a stronger signal, your call will have less chance of being dropped, and you can relay important information to emergency services without interruption. This is especially critical in situations where every second counts and clear communication can make all the difference. Additionally, cell phone boosters allow emergency services to stay connected with their dispatch centers and access vital information in real time, improving their response times and overall efficiency. This can prove to be lifesaving in situations involving natural disasters, accidents, or medical emergencies.
Improving GPS Tracking
In cases of emergencies or even for personal safety concerns, GPS tracking can be a lifesaver. Poor cell signals can hinder accurate GPS tracking, but with a cell phone booster, your GPS system can relay your location with much higher accuracy, ultimately increasing public safety. This is particularly useful in situations concerning lost hikers, missing persons, or even tracking the location of emergency responders. It also allows for better fleet management and monitoring of public transportation vehicles, ensuring their safety and timely response.
Supporting First Responders
The importance of communication for first responders cannot be overstated. Cell phone boosters improve public safety by providing reliable and efficient communication for police, firefighters, and emergency medical services, even in more remote areas. This allows personnel to stay connected with their departments and access crucial information like maps, blueprints, or instructions from superiors in real time. It also enables them to communicate with each other seamlessly, improving coordination and response times during emergencies. With stronger signals, first responders can use their mobile devices to access necessary resources, such as weather updates, traffic conditions, or hazardous material information, making their jobs safer and more effective.
Reducing Distracted Driving
Trying to maintain a conversation on the phone in areas with weak signals can lead to distractions and unsafe driving. Cell phone boosters help reduce distracted driving by ensuring clear and consistent call audio, allowing drivers to focus on the road. This can prevent accidents and improve overall road safety. Additionally, with a strong signal, drivers can also use their phones for hands-free navigation, accessing traffic updates and weather information without having to take their eyes off the road. This ultimately leads to a safer driving experience for all.
Enabling Disaster Relief
During natural disasters like hurricanes, earthquakes, and wildfires, communication infrastructure can become damaged, leading to poor or nonexistent cell signals. Cell phone boosters can improve public safety during these times by enabling essential communication among rescue teams, government agencies, and affected individuals. With a cell phone booster, people in disaster-stricken areas can still reach out for help and access emergency services, while first responders can stay connected with their departments and coordinate relief efforts efficiently. This not only improves the safety of those affected but also aids in the timely response and recovery from these disasters.
Ensuring Business Continuity
In the event of an emergency, businesses need to communicate quickly and efficiently to ensure the safety of their employees and customers. Cell phone boosters aid in safeguarding employees by enabling effective communication between staff and emergency services. It also allows businesses to stay connected with their customers, keeping them informed and updated during emergency situations. This not only improves public safety but also helps in maintaining business continuity.
Boosting Safety and Connectivity in Schools
Cell phone boosters also play a vital role in enhancing safety and connectivity within schools. In today’s digital age, reliable cellular connectivity is not just a convenience but a necessity in educational environments. School administrators, teachers, students, and parents rely heavily on cellular communication for seamless and efficient operations.
With cell phone boosters, schools can significantly improve their communication networks, enabling quick and reliable communication between staff, students, and parents. This becomes particularly crucial during emergency situations, where swift communication is necessary for the safety of the students and staff. For instance, cell phone boosters can ensure that calls to emergency services are not dropped and that vital information can be relayed without interruption.
Moreover, stronger cell signals facilitated by boosters can enhance the reliability of technology-based learning tools. This ensures that students can efficiently access online resources and participate in digital learning, which is particularly important in our increasingly digital educational landscape.
Weak cell phone signals can hinder your safety and productivity. Join the thousands who have experienced the transformative impact of SureCall Boosters. Whether you’re seeking to enhance connectivity in your rural home, improve GPS tracking, reduce distracted driving, or ensure business continuity, SureCall has a solution tailored for you. We’ve developed state-of-the-art home cell boosters for Canada that provide superior signal amplification to keep you connected when it matters most. Don’t wait—take action today to improve your connectivity and safety because a better signal means a safer, more connected world. Contact us anytime via email at Sales@SureCallBoosters.ca.
|
'EARLY ENGLISH' BY JOHN W. CLARK : The Norton Library, New York, 1964
I have a small interest in languages and linguistics in general. Not that I could claim to be even moderately expert on the subject, but I've always found the field fascinating. The history of language is a field to itself, and this book makes a claim to introduce the reader to the development of the English language from Anglo-Saxon/Old English Middle English and on to Early Modern English. I hardly think I am an expert judge, but I think the author did a competent job.
He begins in the middle so to speak with some selections of English texts from various periods. The Bible is always convenient for this sort of thing, and the author tabulates Latin, Old English, Middle English and Modern English versions of a selection from the Vulgate New Testament. The similarities, differences and development are presented, and he sets to work analyzing the changes.
After this brief plunge in the waters he returns to the beginning, setting English amongst its relatives in the Indo-European language family and its Germanic branch. He uses this to introduce theories of how languages develop across geographic distances. Then it's on to an introduction to phonetics. I have to admit that I found this part somewhat hard going though I hope that at least a part of the classification of sounds into voiced/unvoiced, frictive/non-frictive, front, middle and back, high, central and low, diphthongs or not, nasal or not, palatal or not, the presence or absence of 'stops' and so on. He end this section with a chart that I must admit I didn't find as clear as I would have liked. This basic introduction, however, is central to linguists in general and to his presentation of the history of the English in particular.
From there it's into the meat of the subject; how did old English sound and how was it spelt. As to the latter he admits that most of the documentary evidence is from one dialect of Old English ie West Saxon. There is enough evidence, however, to infer the existence of other dialects, their difference from the 'standard' and at least some of the details of their pronunciation and writing. As an interesting little gemmule for those of us who have read and appreciated versions of Beowulf he mentions that OE poetry hardly ever uses rhyme. There is extensive discussion of how OE was spelt, how it was influenced by other languages and its regional variations. The author also presents many interesting items on how OE manuscripts actually physically looked. Just that is novel and fascinating in its own right.
Word forms, dialects and 'literature' (as opposed to didactic works) each receive their own treatment, and the changes English underwent before the Norman invasion are tracked, or at least speculated on. The basics of phonetics that the author previously presented are invaluable for this project, and this rather specialized treatment of one language was something of a revelation to me about the general methods of linguistics which had always seemed rather opaque before.
The discussion of Middle English and its evolution is shorter than that of OE even though the sources are far more numerous than in the earlier period. The influences of French which hardly began with the invasion and Latin are discussed as well as the 'survivals' from OE, and the reappearance of colloquial speech in written texts. The sounds of the language during this period are analysed as well as the appearance of another influence, loan words from Scandinavia.
The Middle English language was the language of Chaucer, but Chaucer was only a small part of what has survived, a corpus far greater than that from OE. Piers Plowman is frequently mentioned, and it reminded me that this work is one that I have never read even though I have seen it mentioned very often. Once more the author goes through the dialects, the development, sounds and physical appearance of the language during its changes into Early Modern English. The section on medieval manuscripts and publishing are fascinating on their on. What was important then differs vastly from what is considered noteworthy today. Attribution for instance.
All told I enjoyed this book immensely even if I am modest about how much of the technical details I actually fully comprehended. One nice little item I did take away - when people use "ye" in imitation of past English it is actually a common mistake. The letter that people misinterpret as a "y" in older manuscripts was actually pronounced "th". Thus (Yus ?) 'Ye Olde Curiosity Shoppe' was actually 'The Olde Curiosity Shoppe'. The "e"s at the end of the words have their own story as well.
|
This is another post in my series, Reader’s Guide to Amos. It works(or at least, I’d like it to) as something between a commentary and a Bible Study. Go read the text. Keep that window open. Read through it once to get a broad view of what is happening. Then come back and read through my notes. I’d suggest going back to the text one more time, read through it and when you get to a word or idea you are unsure of, come back and see if there is something in my Reader’s Guide that helps. You can read my original series introduction and the original posts that cover the text up to this point.
1-3 – The fourth judgement vision. The for summer fruit sounds like the word for end. We have a play on words that can either mean that Israel is ripe for judgement (summer fruit being fruit that would ripen in the summer) or that it was during the end of the season for the fruit, as is the coming end of Israel. The joyful singing will turn to wailing and mourning. There will be so many dead bodies, the scene so disturbing that the only response is to yell for silence.
4-14 – An oracle of woe for those whom oppress the poor. They are so obsessed with money that they cry out “when will this religious day or feast be over, so that we can get back to work” The observed the law, not engaging in business, but their man focus was still greed. They longed for the worship days to be over, that they can go back to their dishonest gain.
Ephah was the contained used to measure the grain (by volume)
Shekel was the standard weight – 2/5s an ounce
So they want to make the grain smaller than it appears and the weighing mechanism to appear heavier than it is.
Likely not referring to an earthquake, but instead the trembling is in fear. Fear that Yahweh will not forget their deeds and will bring punishment.
Yahweh will bring floods and darkness.
Everyone will be involved in lamentation. All happiness and goodness will be turned into wailing.
Sackcloth and shaving of the head were signs of mourning.
The coming day will be like that of mourning over the death of an only son.
The lord will then send hunger and thirst throughout the land.
Guilt of Samaria is in contrast to the ‘pride of Jacob’ from v.7. Israel swore to false gods, this is their shame and guilt. The word for guilt here refers to their idolatry. References to Dan and Beersheba may represent how wide spread the idolatry was, as they stand at opposite ends of the land from each other. The formula used in verse 14 sounds like those of swearing allegiance to those gods.
Amos, Obadiah, Jonah: An Exegetical and Theological Exposition of Holy Scripture (The New American Commentary)
Joel and Amos (Tyndale Old Testament Commentaries)
Hosea-Jonah, Volume 31 (Word Biblical Commentary)
|
This wooden Alphabet Sound Puzzle "pronounces" the name of each letter and a corresponding object beginning with that letter when such letter is placed correctly. Julia loved to chew on wooden letters first (as you can see), then she enjoyed manipulating them as pieces are slightly raised above the puzzle board for easy grasping, and eventually, at 19 months, she was able to independently assemble the entire alphabet puzzle, inserting letters into the correct slots. I do not think I could have presented a Three-Period-Lesson to her on ABCs 🙂 but she was very familiar with this particular puzzle, and practice makes anything possible 🙂 Adrian at 19 months, was able to complete about 2/3 of this puzzle independently. His first success was when he was 20 months.
It is amazing, but he still enjoys it. He is pretty fast though with it:)
Just A Note: the letter-sound trigger is light-sensitive, so any change in lighting or shade would trigger the pronunciation of that letter is left "open". So, what we do, when the puzzle is not assembled, and the letters are not inserted into their respective slots, we turn the puzzle face down as to not trigger the sensors.
|
The Shieldaig Sea Trout Project
Mature sea trout caught at Shieldaig Trap
What is the Shieldaig Sea Trout Project?
The Shieldaig Sea Trout Project is a fisheries project run by the Scottish Executive's fisheries research agency, FRS, and arose from widespread concerns about declining stocks of sea trout and some salmon populations in the West Highlands and Outer Islands .
The sea trout is a sea going or anadromous form of the brown trout. Like salmon the fish spends its juvenile stages in freshwater and migrates to sea to feed before returning to over winter as finnock or breed as mature adults. The runs of returning adults and finnock have supported locally economically important fisheries in NW Scotland. The decline in sea trout numbers has led to a substantial drop in the numbers of visiting anglers, with serious consequences for many rural areas.
The aim of the Shieldaig Sea Trout Project is to examine why there has been a collapse in sea trout and to find ways to help restore them to their former abundance. The Shieldaig Sea Trout Project provides for the first time in West Highland river secure information on a sea trout population by examining stocks passing through a two-way trap situated near the River Shieldaig estuary.
What has happened so far?
The Shieldaig trap
The Shieldaig trap has been in operation since the spring of 1999. Each spring we capture and tag approximately 1500 sea trout smolts .This allows us to make estimates of marine survival when the surviving fish return at the end of the summer. A restocking programme has been in place since 1997. Currently we stock the Shieldaig River with eggs from captive native Shieldaig brood fish, supplemented with ova from fish from a neighbouring catchment. The trap forms an integral part of monitoring the success of any restoration methods. Much of the work centres on the relationship between sea trout and a marine parasite called the salmon louse. This louse is a common parasite of both wild and farmed salmonids. Biologists work very closely with local wild fishery proprietors and fish farming companies through the Torridon Area Management Group to ensure that the health and survival of wild fish are maximised. Recent years have demonstrated that minimising planktonic sea lice levels leads to a considerable improvement in marine survival of sea trout smolts. However increases in planktonic lice levels and a consequent decrease in marine survival in summer 2007 has demonstrated the fragility of the situation.
Sea Trout Project biologists collecting early returning sea trout smolts. Spring 2007
The work at Shieldaig has contributed much to our knowledge of natural and abiotic factors affecting sea trout populations, particularly the close relationship between fish farm lice levels and shoreline densities of infective juvenile lice. Shieldaig has become the focus of a number of FRS scientific studies researching various elements of sea louse biology. The future focus of the Sea Trout Project will be mainly restoration whilst maintaining ongoing lice studies and monitoring of juvenile fish populations.
In April 2000, an interpretation centre was opened as part of the project. The centre describes the sea trout life history and the recent population decline in western Scotland . In addition, the display boards explain the nature of the Shieldaig Sea Trout Project and the scientific work used to study sea trout and to examine ways of restoring their numbers at Shieldaig. There are also interactive displays for young children that teach them about the life cycle of the sea trout, their predators and prey, through a series of games. You can also find up to date information about the project and other local environmental issues such as seals and sea lice. Publications regarding Scottish fishery issues and reports from fishery trusts are available for reference.
Please pop in to the visitor centre if you can and browse. It is important that people appreciate the rich biodiversity of our rivers and lochs and how the sea trout fits in. Staff will be posting information on our activities and latest data from the trap throughout the summer. If the staff are available they will be happy to answer any questions, listen to your comments and hear any news you may have on sea trout elsewhere. If you see us at work in the Glen we will be happy to explain what we're up to.
An annual project report outlining the progress of the Shieldaig project is available from the visitor centre. If you cannot get to see us please download our annual report (details below).
Where to find the project:
The Shieldaig Sea Trout Visitor Centre is located approximately one mile from Shieldaig village. The entrance is sign-posted on the minor road to Applecross about 100m from the junction with the Shieldaig/Lochcarron road. There is visitor parking in front of the Centre.
09.30 – 16.30 Mon-Fri. April – October. Other times by arrangement. Contact Jim Raffell on 01520 722304
Who to contact:
The project biologist is Jim Raffell (firstname.lastname@example.org), FRS Shieldaig Field Station, Shieldaig, Wester Ross , IV54 8XJ . Tel/Fax: 01520 722304. Project manager: David Hay (email@example.com) FRS Freshwater Laboratory, Pitlochry, Perthshire , Scotland . PH16 5LB. Tel: 01796 472060 Fax: 01796 473523. Download our annual reports from www.marlab.ac.uk
|