text
stringlengths 188
632k
|
|---|
A Rose for the Crown
A KING MISUNDERSTOOD BY HISTORY,
A LOVE STORY THAT HAS NEVER BEEN TOLD
In A Rose for the Crown, we meet one of history's alleged villains through the eyes of a captivating new heroine -- the woman who was the mother of his illegitimate children, a woman who loved him for who he really was, no matter what the cost to herself.
As Kate Haute moves from her peasant roots to the luxurious palaces of England, her path is inextricably intertwined with that of Richard, Duke of Gloucester, later King Richard III. Although they could never marry, their young passion grows into a love that sustains them through war, personal tragedy, and the dangerous heights of political triumph.
Anne Easter Smith's impeccable research provides the backbone of an engrossing and vibrant debut from a major new historical novelist.
To download a file to your computer right-click on the link and choose 'save file as'
High Resolution Images
Book Cover Image (jpg): A Rose for the Crown
Author Photo (jpg): Anne Easter Smith
Photograph by Nancy Hayes(0.1 MB)
Any use of an author photo must include its respective photo credit
Reading Group Guide
Questions & Topics for Discussion
- The Prologue contains significant details about Kate and her two sons, one of whom dies tragically in these opening pages. Did having this information up front influence your reading of the story? Why do you suppose Anne Easter Smith chose to reveal these facts in the Prologue?
- When Kate is ten years old, her father tells her the story of how he came into possession of an ecu, a French coin, in order to help her understand the concept of loyalty. Loyalty is "when you stand by someone you love or honor and do not desert them even in the bad times," he says. What impact does this conversation have on Kate? How does the idea of loyalty play out in the story? Why does Kate give Richard the ecu to wear when it comes into her possession?
- When Kate's parents decide to accept Richard Haute's offer to have Kate join their household, John Bywood says to him, "As much as it do sadden us to see her go, we are obliged to do what is best for Kate." Even ten-year-old Kate acknowledges that "the thrill of a new life at the Mote must outweigh the loss." How do these same statements apply to Kate and her own children many years later?
- Kate is reluctant to marry her first husband, Thomas Draper, a man much older than she. But in what ways does Kate's marriage to Thomas come to benefit her? Why is Kate, a smart woman, then
|
A.1 Aspell Suggestion Strategy
The magic behind my spell checker comes from merging Lawrence Philips
excellent metaphone algorithm and Ispell's near miss strategy which is
inserting a space or hyphen, interchanging two adjacent letters,
changing one letter, deleting a letter, or adding a letter.
The process goes something like this.
- Convert the misspelled word to its soundslike equivalent (its
metaphone for English words).
- Find all words that have a soundslike within one or two edit distances
from the original word's soundslike. The edit distance is the total
number of deletions, insertions, exchanges, or adjacent swaps needed
to make one string equivalent to the other. When set to only look for
soundslikes within one edit distance it tries all possible soundslike
combinations and checks if each one is in the dictionary. When set to
find all soundslike within two edit distances it scans through the
entire dictionary and quickly scores each soundslike. The scoring is
quick because it will give up if the two soundslikes are more than two
edit distances apart.
- Find misspelled words that have a correctly spelled replacement by the
same criteria of step number 2 and 3. That is the misspelled word in
the word pair (such as “teh -> the”) would appear in the suggestions
list as if it was a correct spelling.
- Score the result list and return the words with the lowest score. The
score is roughly the weighed average of the weighed edit distance of
the word to the misspelled word and the soundslike equivalent of the
two words. The weighted edit distance is like the edit distance
except that the various edits have weights attached to them.
- Replace the misspelled words that have correctly spelled replacements
with their replacements and remove any duplicates that might arise
because of this.
Please note that the soundslike equivalent is a rough approximation of
how the words sounds. It is not the phoneme of the word by any means.
For more details about exactly how each step is performed please see
the file suggest.cc. For more information on the metaphone
algorithm please see the data file english_phonet.dat.
|
We’re drowning in plastic bottles. New statistics released by The Guardian reveal that humans purchase one million plastic bottles every minute. And that adds up to nearly 500 billion bottles a year.
480 billion plastic bottles in one year will increase to 583 billion by 2021
In 2016 humans bought over 480 billion plastic water bottles. But that’s only the beginning of the bad news. Less than half of those 480 billion bottles were collected for recycling. And a mere seven percent of those found a second life as new bottles.
Read also: The surprising solution to ocean plastic
Surfers Against Sewage chief executive Hugo Tagholm told The Guardian, “The plastic pollution crisis rivals the threat of climate change. Current science shows that plastics cannot be usefully assimilated into the food chain. Where they are ingested they carry toxins that work their way on to our dinner plates.”
Want to know more about plastic in our oceans? Check this documentary:
Plastic is already showing up in our food, according to recent studies. Scientists at Belgium’s Ghent University found people who eat seafood unwittingly consume 11,000 tiny plastic pieces yearly. Researchers at Plymouth University in England discovered plastic in one third of fish caught in the United Kingdom.
According to The Guardian, plastic was first popularized in the 1940’s – but much of the material manufactured then is still around today because plastic takes hundreds of years at best to break down.
These bottles could be comprised of 100 percent recycled plastic, but many brands haven’t made the switch because they prefer the shiny look of traditional plastic. And many companies have fought against a tax on single-use bottles.
Via The Guardian
|
Flowers add colour to the landscape and attract butterflies, hummingbirds and other wildlife. There are also several flowers that draw what are called beneficial insects to your garden. Beneficial insects such as ladybugs, lacewings, ground beetles,flower flies and mini-wasp are among a group of insects that feed on other insects that are bad for your plants.
Insects feed on nectar for carbohydrates and pollen for protein and this provides tehm with the energy they need to search for prey and to reproduce. A selection of flowers that draw beneficial insects have a much better sources of nectar and pollen that sustain beneficial insects. In addition to getting rid of the insects you don’t want, many beneficial insects will also pollinate your fruit and vegetable crops.
The following decorative flowers that draw beneficial insects to your garden are also very easy to grow in our hardiness zone 3 here in Calgary.
Bachelor’s Buttons or Cornflower (Centaurea cyanus)
This beautiful blue wildflower has extrafloral nectaries, which means the plant’s leaves release nectar even when the flowers are not blooming. Bachelor button nectar has a very high sugar content which is very attractive to flower flies, ladybugs, lacewings, and beneficial wasps. Sow the bachelor’s buttons seeds directly in the garden in fall or early spring. These flowers that draw beneficial insects to your garden will usually reseed themselves.
Cup Plant (Silphium perfoliatum)
The unique feature of this 6 to 8 foot tall native perennial is that it’s leaves wrap all the way around the stems, forming a deep cup that collects dew and rainwater making them flowers that draw beneficial insects and small birds who can easily use the leaves as landing pads, then drink from the cups. Cup plant has large attractive leaves and clusters of yellow flowers in mid to late summer.
Fennel (Foeniculum vulgare)
Long-lasting fennel flowers are extremely attractive to all nectar-feeding beneficial insects, and the feathery green or purple foliage looks wonderful in spring and early summer. These flowers that draw beneficial insects are also a host plant for the caterpillars of the anise swallowtail butterfly. The plants grow about 5 feet high.
Golden Marguerite (Anthemis tinctoria)
Ladybugs, lacewings, flower flies, tachinid flies and mini-wasps are all attracted to this long-blooming perennial with bright yellow 2 inch daisies. Golden marguerite are popular flowers that draw beneficial insects because they thrives in poor soils, growing 2 to 3 feet high and wide.
Pussy Willows (Salix species)
Willows are especially valuable because they produce pollen very early in the spring, when most beneficial insects are just emerging. They are very easy to grow and the cut flower are great additions to flower arrangements. You can use cuttings from a neighbours’ shrub to re-root in water and plant in your own garden as wild flowers that draw beneficial insects.
|
The Hunchback of Notre-Dame
|Name:||The Hunchback of Notre-Dame (French: Notre-Dame de Paris)|
|Date(s):||1831, 1996 (Disney)|
|Medium:||novels, animation, films, television, musicals, ballet, radio, theatre|
|Country of Origin:||France|
|Click here for related articles on Fanlore.|
The Hunchback of Notre-Dame is a French Romantic/Gothic novel by Victor Hugo published in 1831. The title refers to the Notre Dame Cathedral in Paris, on which the story is centered, and the true protagonist of the story Esméralda.
The story of the Hunchback of Notre-Dame has been adapted in various formats: films, animation, television, musicals, ballet, radio and theatres.
Some of the more popular ones are:
- The Hunchback of Notre Dame (1939 film) starred Charles Laughton as Quasimodo and Maureen O'Hara as Esmeralda
- The Hunchback of Notre Dame (1996), Disney film
- The Hunchback of Notre Dame (1999), a German musical based on the Disney film, which premiered in English in 2014.
Most of the fandom revolves around the Disney 1996 animated film.
Archives & Fannish Links
- Notre-Dame de Paris - All Media Types works at AO3
|
Marylanders drive 151 million miles a day and account for 30 percent of the emissions that contribute to the poor air quality in this region. Drivers can help reduce these harmful emissions by keeping their cars properly maintained. Even small measures, such as proper tire inflation and replacing air filters, can have a huge impact.
In an effort to educate the public on the benefits of keeping a vehicle well maintained, The Maryland Department of the Environment (MDE) implemented a Clean Car Clinic program in 2005. These free clinics provided motorists with the opportunity to have their vehicles inspected by an accredited automotive technician. Motorists learned ways to maintain their cars to keep them running cleanly, thereby reducing costly repairs and extending the life of the vehicle.
MDE worked with the Environmental Finance Center (EFC) and Motor Transportation Services (MTS) at the University of Maryland (EFC) to expand the reach of the Clean Car Clinics. The clinic was a free service funded by MDE. A certified automotive technician from the University of Maryland Motor Transportation Services division conducted a non-invasive inspection, which included checking the tire pressure, belts and hoses, fluid levels, gas cap and other parts of the vehicle that could affect how efficiently it runs. The technicians did not make any repairs, but the vehicle owner was provided with a copy of the completed inspection form.
Maryland Department of the Environment & UMD Motor Transportation Services
Maryland Department of the Environment
|
See also the
Dr. Math FAQ:
Browse High School Triangles and Other Polygons
Stars indicate particularly interesting answers or
good places to begin browsing.
Selected answers to common questions:
Area of an irregular shape.
Pythagorean theorem proofs.
- Maximum Number of Acute Angles in a 2001-gon [05/29/2002]
What is the largest possible number of acute angles a 2001-gon can
have if no two sides cross each other?
- Maximum Rectangle within a Quadrilateral [10/25/2001]
I need to extract from a quadrilateral the maximum area rectangle inside
- Maximum Surface Area [07/03/2003]
Within a rectangle x by y, I wish to draw a shape that is no more than
x across in any direction, but which has the largest possible surface
area within the confines of the rectangle.
- Measures of Interior and Exterior Angles of Polygons [07/07/2005]
A question about star polygons leads to a discussion about calculating
interior and exterior angles of polygons.
- Measuring by Shadows [05/22/2001]
How can I measure a tree using its shadow and mine?
- Measuring the Height of a Building Using Shadows [05/24/2000]
What time of day is best to use a shadow to measure the height of a
building by using triangles?
- Median and Altitude Constructions [07/16/2003]
How to draw a median and an altitude from the three sides of a
- Medians of a Triangle [02/16/1999]
Prove that the 3 medians of a triangle divide themselves up into a ratio
- Medians of Triangles Proof [05/29/2000]
Prove that in any triangle, the sum of the medians is more than 3/4 of
its perimeter, but less than the whole perimeter.
- Menelaus's Theorem [01/25/1999]
A straight line intersects sides AB, BC and the extension of side AC of a
triangle ABC at points D, E and F respectively. Prove that the midpoints
of the line segments DC, AE and BF lies on a straight line.
- Mid-segment Theorem [02/02/1999]
Can you help me prove the Mid-Segment Theorem?
- Minimal Distances to a Point in a Triangle [01/05/2001]
How can I prove that the smallest value of PA + PB + PC occurs when angle
APB = angle BPC = angle CPA = 120 degrees, for a triangle ABC and a point
- Minimum Angle Proof [07/05/2001]
Label the point of intersection of the angle bisectors of triangle ABC as
Q. Let M be the midpoint of side BC. Given that MQ = QA, find the minimum
value of angle MQA.
- Miquel Circles [09/17/2003]
Given an acute triangle ABC, consider all equilateral triangles XYZ, where points A, B and C lie on segments XZ, XY, YZ. Prove that all centers of gravity of all these triangles XYZ lie on one circle.
- Mixtilinear Incircle Proof [12/11/2000]
In triangle ABC, AB = AC. A circle is tangent internally to the
circumcircle of triangle ABC and also to sides AB and AC at points P and
Q, respectively. How can I prove that the midpoint of the segment PQ is
the center of the mixtilinear incircle of triangle ABC?
- Nagel Point [04/15/2001]
What relation does the Nagel Point have to the incenter, centroid, and
Spieker point of a triangle?
- Naming Corresponding Parts of Congruent Figures [04/23/2003]
Given triangle OPS congruent to triangle TQR, name the corresponding
sides and angles of the two triangles.
- Naming the Isosceles Triangle [09/23/1998]
How did the isosceles triangle receive its name?
- The Napoleon Point and More [09/04/1998]
How do you prove that the Napoleon point will always exist, given the
proper conditions? Is there a stronger theorem?
- Napoleon's Triangle [08/10/1999]
What is Napoleon's triangle?
- Nine-Sided Polygon [06/11/1997]
Can you construct a regular 9-sided polygon inside a circle using only a
compass and straight-edge?
- Nonagon or Enneagon? [02/06/2003]
Is 'enneagon' really the correct name for a 9-sided polygon?
- Non-Congruent Triangles [12/12/2001]
Construct and prove that there can be two non-congruent triangles in
which five parts of one triangle are equal to five parts of another.
- Nonconvex Polygon Angle Measure [02/03/1999]
What is the formula to find the interior angle measurements of a
- Number of Lines of Symmetry in a Regular Polygon [03/12/1998]
In a regular polygon, is the number of lines of symmetry the same as the
number of lines or angles of that polygon?
- Number of Points in a Star [7/16/1996]
Is there a way to predict the number of points in a star given only the
internal angle of the corners?
- Octagon Construction Using Compass Only [02/22/2002]
Construct the vertices of a regular octagon using just a compass. The
only thing you know about the octagon is the circumradius.
- Octagon Formula [07/30/1997]
If you're building an octagon on a 12-foot radius, what is the length of
- Octagon Side Lengths [08/22/2001]
If I know that the dimension of an octagon from one side to the other is
8 feet, how can I find the lengths of a side?
- One- and Two-sided Polygons [12/07/1999]
Can you explain what a monogon and a digon are?
- Order of a 3D Triangle [08/29/2001]
If I visit the vertices of a 3D triangle in order going from a to b to c,
am I going clockwise or anticlockwise?
- Origami Equilateral Triangle [04/26/2001]
How can I create an equilateral triangle from a piece of paper using only
- Orthic Triangle [04/09/1999]
How do you find the angles of the triangle ABC, similar to triangle
A1B1C1, where AA1, BB1, and CC1 are the altitudes of triangle ABC?
- Overlapping right triangle problem [09/14/1997]
Given right triangles ABC and DCB with rt angles at B and C, triangle
ABC's hypotenuse 20 and triangle DCB's hypotenuse 30. The hypotenuses
intersect at point E, a distance of 10 from BC. Find the length of BC.
- Parallelogram Perimeter [10/01/1997]
The diagonals of a parallelogram are 10 and 24 in length. If one side of
the paralellogram is 13, what is the perimeter?
- Parallelogram Side Length [08/12/2003]
In a parallelogram ABCD, K is a point on AB such that angle DKC = 90
degrees and AD = AK. If AD = 10cm, find the length of AB.
- Pascal's Theorem [10/07/1998]
Can you explain Pascal's Theorem? How does it relate to conic sections?
- Pedan Trapezium [05/23/2000]
How can I prove that a isosceles trapezium whose parallel side lengths
are 7 and 4 respectively, and whose slant sides have length 6, is a Pedan
- Pentagon Area Using No Trig [05/14/2001]
Where I am stumped is finding the area of one of the five triangles.
- Perimeter Equals Area in a Triangle [4/2/1996]
When will the area and perimeter of a right triangle be numerically
|
What is Beta Testing (Example Included)
February 22, 2022 Edwin Kooistra
Testing forms a very critical part of product design because it helps in making the product or service free of possible bugs, which helps in gaining the customer’s trust. Throughout the product development and design cycle, different types of testing are conducted for quality assurance and product validation.
What is Beta Testing?
Beta testing means or outlines one of the acceptance tests, where the intended end-user uses the product and rates it based on its reliability, usability, functionality, and delivery of value proposition.
The feedback that the end-user provides under beta testing helps in improving the product quality, features, services which of course is critical to any business’s success and growth.
It also helps the product team or the decision-makers in deciding whether to invest more into the product or change or redirect the efforts accordingly.
Beta testing is also one of the customer validations tools where it is analyzed what levels of customer satisfaction would this product be able to deliver. Beta testing also means the last round of testing after which the product is released for public use.
The main objective of beta testing is to identify issues with the product end have them corrected. Beta testing is done at the last stage of the product development cycle to uncover as many as possible issues that a product may have in a controlled environment.
Beta users or beta testers are real users who conduct their tests or usage of the product or service in the final production environment using the same software, hardware, etc. that is to be a part of the final version. Beta testing plays a vital role in making the product marketing strategy a success.
Beta testing is of two types one is open beta testing and the other one is called closed beta testing. In the open beta testing, anyone can access and use the product or service, while messages are displayed to inform that the version that they are using is the beta version.
When taking part in the open beta testing the users are required to submit feedback at the end of the testing duration via a pre-specified method.
In closed beta testing, only a certain set of customers, specifically selected individuals or testers are given access to the beta version of the product or service and sometimes they’re also paid.
In certain cases, a percentage of the users are directed towards the beta version of the product while the rest are allowed to use the released version.
Why Does Beta Testing Matter?
Beta testing is done at the last stages of the product development cycle where according to the developers the product is ready for customer use.
The main reason that is also the biggest benefit of doing beta testing, especially for software is that it put your product in front of the real world where it will be used.
Individuals who will be the end-users of the product and have the knowledge and information relevant to it will be using it, not only will they be able to provide genuine feedback, but they would also be able to recognize any shortcomings, bugs, or issues with the product itself.
Another advantage and a major reason that beta testing is done are that it helps software companies or developers to know whether the end-user would like a certain feature or specification in a product or not.
For this purpose, instead of launching the product on a massive level with access available for everyone, they develop that feature and allow beta testing. Product validation through beta tests is an important aspect of product marketing as a whole.
Not only does it help in reducing costs, but feedback is also provided alongside and thus decision can be made whether the feature or option added is good enough to be taken public or needs further improvement or maybe needs to be removed altogether.
Difference Between Beta Testing and Alpha Testing
In the industry beta testing is conducted alongside alpha or sometimes as a standalone. It all depends on the kind of product or service the organization is developing as well as the nature of the target market.
Let us now look at these differences between Alpha and Beta Testing.
Beta testing is done to understand how the application or product will work in the real world, while alpha testing is done to ensure that the application or software is working as it is intended to do so.
For beta testing, the users or testers are usually end-customers that are chosen randomly or even via invite. For alpha testing, the users are the internal employees or team members who can be possible end-users as well.
In beta testing, the users are just generally interacting with the software and are not required to perform defined actions. Whereas in alpha testing, the testers are well aware of why are they testing the product or service and what is their objective?
Framework and Guidelines
In beta testing, the users or testers are given a free hand and they’re only required to submit feedback that is only if they wish to do so. Whereas, in alpha testing everything is structured, and guidelines are provided with a step-by-step actionable approach.
In beta testing, the users look at reliability and performance. On the other hand, in alpha testing the users are only concerned with functionality and not how the user experience or back-end operations work.
Beta testing usually lasts for a few weeks, but they have been instances where beta tests have run for years. While alpha testing is a long rigorous process, many suggest that the duration is kept to a minimum as possible to avoid delays in product release.
Actions Taken After Tests
In beta testing, major bugs are fixed and A/B testing can also be conducted based on the feedback of the beta testers. The feedback of the beta testers is also used to develop and enhance possible upcoming versions of the product. In alpha testing, identified bugs are fixed and minor changes might be made based on feedback.
Example of a Tech Product Beta Testing
One of the most notable examples of a tech product’s beta testing is that of Microsoft Windows 8. Microsoft conducted one of the largest beta testings in the history of tech products and software for the release of its Windows 8.
The version of the windows was offered worldwide for beta testing to users belonging to all age groups and professions. This testing on such a massive platform helped Microsoft in collecting customer feedback that became critical to Windows 8.1 success and helped Microsoft recover from the failure of Windows 8.
|
One of the most compelling passages from James Hansen’s Storms of My Grandchildren seeks to trace back responsibility for biodiversity lost to climate change to the facilities that caused the warming:
If we continue business-as-usual fossil fuel use, a conservative estimate is that by the end of the century we will have committed to extinction at least 20 percent of the Earth’s species, that is, about two million species. Based on the proportion of twenty-first-century carbon dioxide emissions provided by one large coal-fired power plant over its lifetime, I conclude that a single power plant could be assigned responsibility for exterminating about four hundred species, even though of course we cannot assign specific species to a specific power plant… Those coal trains are death trains. The railroad cars may as well be loaded with the species themselves, carrying them to their extermination.
This grim assessment is even worse when you think about how we have gone about cataloging species. The bigger and cuddlier something is, the more likely it is that humans will have investigated it and given it a taxonomical categorization. There are innumerable smaller creatures (most of them unicellular) that we haven’t gotten around to calling species, but which may play important or even critical roles in some ecosystems. Hansen is talking about the number of species we already know about that are in danger of being wiped out.
|
One of the critical parts of recycling is creating a value for the finished product. While some plastics cannot be recycled yet, turning them back to oil could help solve the problem.
Recycling Technologies is setting up an assembly facility in Swindon to build up to 200 machines per year to meet anticipated demand for plastic recycling. Image: Recycling Technologies via chinadialogue The world produces 400 million tonnes of plastic every year but only 10 per cent is recycled. Much of it seeps in to the ocean, causing at least US$13 billion (89 billion yuan) worth of economic damage to marine ecosystems annually. Alarming statistics on the impact of plastics on our environment are piling up almost as fast as the material itself. A transformation of the global recycling system is needed, however, not all regularly used plastics can be processed. This means that even if all consumers and businesses recycled everything they could, a large proportion would still go to waste. The majority of plastics that do get recycled undergo a mechanical process that breaks them down into pellets. They’re then reused in the manufacture of new plastic products, such as packaging, seats or in clothing (polyesters). However, this process cannot be used on plastic film, pouches and other laminated plastics, and these materials are typically sent to landfill or incinerated. What can be done with all these hard-to-recycle plastics, […]
|
Copyright November 2000, Robert W. Scott
The story of George Ash is the story that good movies are made of–a European child kidnaped by Indians, who fought against whites, and who returned to European society after abandoning an Indian wife; a man who built the oldest house that stands on the northern side of the Ohio between Cincinnati and Louisville; a man perhaps alternately reviled and accepted by his neighbors. Depending on some hard-to-document claims, he was the first or second settler of Switzerland County, and he was definitely the first land owner in Jefferson County.
Ash’s story comes from two major sources: an interview that was printed in a Cincinnati newspaper in 1829 and has been relayed second hand and another with different details that was published in the Feb. 24, 1830 edition of the Indiana Republican newspaper. The story was also summarized–with still different details revealed–in a History of Milton Township, written sometime after 1908, probably by William E. Ryker, at one time president of the Jefferson County Historical Society.
Ash gave the following account: His father John Ash settled early near Bardstown, Nelson Co., Ky. Facts condensed from an undated newspaper clipping claim this occurred in 1777. This may be near land the elder Ash later owned on Ash's Creek, purchased on Sept. 10, 1788. (Nelson Co. Deed Book 2 p. 28) In March 1780, ten-year-old Ash, and an unstated number of brothers, and a younger sister were captured by Shawnee Indians. The attack reportedly occurred after Ash, his wife, and infant son Henry, went on a trip to Clarksville, Kentucky (now Louisville), leaving the other children at the stockade. The Indians set fire to the stockade and captured George and a little sister, who had hid under a brush pile.
The size of the family is not known. But it included a brother John Ash Jr., whose will, dated Oct. 29, 1782 in Jefferson County., Kentucky, specifies "if any of my brothers that are now in captivity should return .. they should have an equal part of my estate." (Jefferson Co., Ky., Minute Book A page 56) It has been reported that John was wounded in the attack and died of his wounds, although the will dates do not coincide with the March 1780 capture date. The identities of the Ash captives seem to be given in the August 13,1783 Pennsylvania Gazette, which gives a list of Indian captives as reported by Captain Dalton, the Superintendent of Indian Affairs. He lists Silvester, George, Henry, Abraham, and Isaac Ash as captives in Canada. (This citation was made available on the Web by Bob Francis in July 1998) The 1829 interview says the Indians carried GeorgeÂ’s sister for two to three days, but they scalped her and left her because she cried and gave them trouble. The other children were transported separately.
After capture, Ash lived on the Big Miami, twenty miles north of Dayton, until General Clark attacked the Indians and burnt the town. The tribe then moved to St. MaryÂ’s and lived there for two years. Ash participated on the Indian side in battles against General St. Clair (November 1791) and Anthony Wayne (1794). His account places Ash at the site of the most critical Indian-United States battles fought in the Northwestern Territory. St. ClairÂ’s defeat was a major one for the Americans because 1,100 Americans died, while there were only 35 Indian casualties. WayneÂ’s victory ended much of the Indian threat in Ohio, and gave the United States its first land claims in Indiana following the Greenville treaty.
Ash returned to the white settlement after Wayne's victory, found his father at an unspecified location, but probably in Nelson County, and in dramatic fashion revealed himself. AshÂ’s father had married again and the stepmother wanted no part of George. So after the meeting, Ash crossed the Ohio and pitched a tent opposite the mouth of the Kentucky River between 1795 and 1800, dates given by the Milton Township history. (But the newspaper interview gives no date.)
He traveled to Philadelphia as a member of an Indian deputation and met the president (name not given). The Indians granted Ash a tract as a reward for his services, which he describes as running opposite the mouth of the Kentucky River, four miles in length, and one mile in back, or four square miles. Another accounts says the land stretched from a point opposite the mouth of the Kentucky River to a point opposite the Little Kentucky. Ash's interview suggests that the Indians gave him this land before the Greenville treaty in 1795. He states that when Indian land was ceded to the United States by that treaty the Indians, “neglected to reserve my grant.” Historically, the presidential visit occurred before 1800 while the Capitol was in Philadelphia, so it took place either during the administrations of George Washington or John Adams (who took office in 1797).
In the 1829 interview, Ash says that after his capture in March 1780, he spent 17 summers with the Indians. It was at this point that he headed for Fort Pitt and found one of his brothers there, who reported their father was still living in Kentucky. He travelled to Detroit as a guide in the winter (1796?) but before reaching Detroit, he spent the winter with his wife She Bear. In the following spring (1797?), he visited his father and was rejected. The Historical Society account covers much of the same ground. But its style is so appealing, it bears repeating verbatim, starting after Ash met his brother in Pittsburgh.
“A few months later he proceeded thence, arriving at the home at midnight, and despite his Indian apparel and his very broken English, he was admitted & made welcome by the unsuspecting brother [sic, must mean father], who affirmed that he had yet to refuse lodging to any man. The two sat before a log fire for some time in silence, when the visitor finally drew the old gentleman into conversation, asking vaguely if he had a son George who had been taken by the Indians many years previously. Dazed by the inquiry, the old man replied ‘Yes, and he was killed in St. Clair's defeat,’ whereupon the son revealed himself to his aged father and daylight dawned before the latter could be convinced of the truth of the circumstances, to further prove which he conceived of the idea of going for his elder son, Henry in the distant neighborhood, first asking George if he would know his brother Henry if he should see him. George with tearful eyes and trembling voice admitted that he probably would not after the lapse of so many years. His father had accumulated a small fortune & was in possession of several negroes, some fine horses and a wife, George's step-mother, which latter however valuable to the father, proved a stumbling block to the son, whose exit followed upon the heels of his arrival.”
The newspaper account says Ash then crossed river near the confluence of the Kentucky and Ohio Rivers and made camp. That summer, he traveled to Washington and met the president. Upon his return, he set up his camp near what is now Lamb and proceeded to build a brick home with the aid of Mr. Lamb and an Indian friend.
If you add the 17 years he spent with the Indians to his 1780 capture, you come up with a 1798 construction date for his house. Was the house built in 1798? Possibly, although dates of this area are always tricky and AshÂ’s age is uncertain. There is no doubt that the house is the oldest on the north shore of the Ohio in Southern Indiana between Louisville and Cincinnati. According to its current owner, the houseÂ’s federal style is similar to the Masterson house across the river in Carrollton. If it was built in 1798, he built it before he married Hannah Combs, because George and HannahÂ’s marriage is recorded in Nelson County, Kentucky, on December. 20, 1800. (This may be the bond date, not the marriage date. Other researchers have placed the marriage date in January 1801.)
An independent source verifies the buildingÂ’s existence in 1820. According to the Historical SocietyÂ’s History of Milton Township, J.H.B. Nowland, the chronicler of early Indianapolis, whose family emigrated from Kentucky in 1820, crossed the Ohio via Ash's ferry and says of the ferryman that "he could scarcely speak a word of English, wore rings in his ears and nose, and dressed in Indian style. 'Although he had a very good house, he had not a chair or bedstead in it, and lived in every way like a savage.Â’"
This history further describes Ash as having a mutilated nose and ears to accommodate ornaments such as silver crosses and "half Moons" with which he lavishly adorned himself.
Two stories reflect the reported hostility against Ash. The History of Milton Township (which does not site its source) continues that, “There existed among the settlers a strong prejudice against Ash and a prevailing suspicion that he had participated in the activities against the whites, some believing that he had been indirectly concerned in the Pigeon Roost Massacre. “A story is told of a fight in which he was surprised and gotten the better of by a much older man. He, with a Mr. Mount and another man were passing the mouth of a certain creek, which empties into the Ohio ‘This is where I called a boat in for the Indians by pretending to be in distress.’ ‘What became of them, asked Mount. ‘All went to hell, for all I know,' said Ash, whereupon Mount sprang upon him, bellowing ‘I’ll send you after them’ and beat him until his companion interceded and saved his life.’”
Another account is equally dramatic and is attributed to a Jane Foster, who lived 1823 to 1916. A family was crossing Ash’s Ferry to Kentucky when suddenly the wife screamed, “This is the man who scalped me.” The husband grabbed a boat hook and rushed George, who jumped overboard and laid low until his passengers had gone on their way.
Whatever his Indian habits, Ash acted like a European. For all the Indian adornment that has been reported, he took a very civilized step in petitioning Congress to get the land the Indians had granted him. Congress denied the petition, first reported in 1802, but said Ash deserved payment for his captivity and granted him a preemption right for 640 acres in 1807. That meant he had the right to stake a claim to the land and pay for it at the prevailing rate. The preemption right basically meant he got the right of first refusal on any unpatented plot he wanted.
He patented 435.62 acres in Section 17 Twp. 3N Range 12E and Section 16, along with fractional section 21 on April 1808. Robert McKay patented the same fractional Section 17 later that year. Since Ash sold land in the section, it seems perhaps he and McKay reached an accommodation (or the reports of the patents are wrong). It is sometimes reported that Congress did not grant his request. However, a deed from Ash and wife Hannah cites the Act of Congress when they sold 200 acres to Isaac Miles on July 19, 1814. (Jefferson Co. Deed Book A p. 41) Another deed shows the AshesÂ’ land spanned the county lines. They sold 190.5 acres to Levi Craig on Dec. 1, 1815. (Jefferson Co. Deed Book A p. 41) This land was in Section 17 and fractional section 20 (both in Jefferson Co.) and fractional section 21 (in Switzerland Co.) Twp. 3N Range 12E.
Ash operated a ferry, which could have been used by the first settlers, although his ferry did not get official approval before Charles Kilgore was granted a license between Port William (now Carrollton) and Indiana early in 1805. The earliest evidence of Ash's ferry comes on April 13, 1811 (Ash had a license 1809 in Clark Co., according to researcher Ginny Reeves who was unable to give the exact citation) when he was taxed in Jefferson County.
In his heart, was Ash European or Indian? Contemporary accounts say he dressed and spoke like an Indian. Nevertheless, he was European enough to petition Congress, and use official documents. And he became a Methodist who deeded land for the Spring Branch Baptist Church. Although some settlers bore him ill will, blaming him for attacks by Indians, the Indiana Republican interviewer wrote that “His neighbors, however, informed me that these prejudices and suspicions have died away.” In many ways, Ash’s behavior resembles that of immigrants who Anglicize their names and adopt American customs in order to be accepted. He left his Indian wife and married a European one, and was intent on finding his family. The conclusion that he copied the style of the Masterson house–to prove himself European–is hard to resist.
As with many pioneers, AshÂ’s age remains a mystery. His account that he was 10 when he was captured in 1780, places his birth at 1769 or 1770. His tombstone shows that he died on Oct. 31, 1850 at the age of 95, which puts his birth around 1755. The 1850 census of Switzerland County appears to put his age at 99, and the variance is no worse than for many other settlers of the same era. His wife Hannah died in 1837 in the 63rd year of her life. Their two children are also buried in the family cemetery, Eliza Norman Ash, who lived 1810 to 1817 and drowned in the river, and son George Colonel Ash, who lived 1812 to 1872. George C.'s wife Caroline Ash, (1816-1888) is also buried in the family cemetery. His will in Switzerland Co. names his son as the only heir. AshÂ’s will names only his son George C. Ash. However, there was an Evan Ash, born in 1802, who owned land only three or four miles to the north of GeorgeÂ’s property. It seems possible Evan was a son not mentioned in the will, but there is no proof.
(I owe a great debt to Steve Huffman, current owner of the Ash house for providing me the 1829 account and information on the Ash cemetery. The Indiana Republican interview is available on microfilm at the Madison Public Library. The History of Milton Township is available in the library files and I have also transcribed in on my computer.)
|
Filene Research Fellow
W. Geoff Beattie
Chair in Corporate Law
University of Western Ontario
Report Number 370
The traditional business corporation has been the dominant form of organization for big business for more than a century. Could that be changing? The Enron and WorldCom accounting scandals followed by the great recession of 2008 have led to growing public disillusionment with unrestrained for- profit business enterprises. Yet, the legal mandate of traditional corporations and the powerful influence of activist share-holders can make pursuit of corporate social responsibility by traditional corporations highly challenging. Enter the benefit corporation.
The legal form a business chooses has tax implications, but it is important for many other reasons. On the surface, the legal structure of a business serves as the backbone to support its operations. Businesses operate in many legal forms—sole proprietorships, partnerships, corporations, mutuals, business trusts, or cooperatives, to name some of the most well known. Dig deeper and you’ll begin to understand how the legal, organizational form of a business often correlates directly with its values, goals, and strategic vision.
Where do financial institutions—particularly credit unions—fit into this equation? The cooperative form itself was one of the earliest and most important forms of enterprise aimed at addressing the shortcomings of the traditional business corporation and “baking into” business charters goals beyond profit or share-holder wealth maximization. Very early on, the cooperative business model emerged to address consumer and employee needs in contexts where the business corporation seemed to fall short.
Filene thanks its generous partners for making this important research possible.
|
You are here
Charleston abounds with images of the pineapple—in art, architecture, even notepaper and handmade jewelry. While the city isn’t responsible for making the tropical fruit a symbol of hospitality, its mannerly residents certainly embraced the custom early on and carry it forward today. Here, learn some sweet facts to spout the next time a visitor asks you to snap their photo in front of the iconic Pineapple Fountain at Waterfront Park
Paradise Found Christopher Columbus is credited with introducing the pineapple to Europeans. In 1493, he and his men came across an Indian village on the Caribbean island of Guadeloupe. The natives had disappeared into the jungle, leaving the makings of a feast, including a fruit so delicious they called it “anana,” or “excellent fruit.” Columbus named it “Pine of the Indies” for its resemblance to a pinecone.
Hospitality Sweet The fruit became a sensation in the American colonies. Since fresh pineapple was hard to procure, the hostess who offered it was making a statement of hospitality and affluence. Brokers even rented out fruits for use in decorative centerpieces.
Sea Faring Early New England sea captains returning from trading voyages began spearing a pineapple atop a stick at their home’s entrance. This signified the successful completion of a venture and said, “My door is open to visitors!”
The Real Deal Ananas comosus is an edible member of the bromeliad family. Fruits develop from purple or red flowers growing amidst waxy leaves.
Gate Keeper Perhaps the most notable example of Charleston’s historic pineapple architecture is at the Simmons-Edwards House at 14 Legare Street. Built in 1816, “The Pineapple Gates” welcome visitors with stone fruits atop the pillars.
Bearing Fruit Colonial artisans and architects began using the pineapple as a decorative motif. You’ll find it on bedpost finials, carved into fireplace mantels, and sculpted into doorway lintels.
Still Makin’ A Splash Hospitality’s been at the heart of Waterfront Park since its May 1990 opening, thanks to the bronze and stone Pineapple Fountain that a team led by Stuart O. Dawson of Boston’s Sasaki Associates incorporated into the public space.
Honorable Mention Since its 1985 establishment, the Charleston Area Convention and Visitors Bureau has presented annual Golden Pineapple Awards to individuals and organizations who promote positive growth in tourism. Among the 2013 winners: the Cooper River Bridge Run and Isle of Palms Mayor Dick Cronin.
|
See also the
Dr. Math FAQ:
why study math?
3D and higher
Browse Middle School About Math
Stars indicate particularly interesting answers or
good places to begin browsing.
Selected answers to common questions:
Art and mathematics.
Law and mathematics.
Medicine and mathematics.
Music and mathematics.
Poetry and mathematics.
What is mathematics?
Was math invented or discovered?
- About Basic Geometry [10/14/1998]
Who developed basic geometry? What is it used for? Who uses it?
- Art and Mathematics [2/8/1996]
Do you know ways that art can be linked to mathematics?
- Definition of Opposite Sides [01/18/2001]
What is the formal definition of 'opposite sides' of a polygon? Does a
regular pentagon have opposite sides? Does a concave polygon have
opposite sides? How can we define it consistent with our intuition?
- Difference Between Math and Arithmetic [11/06/2001]
My students haven't heard the word arithmetic. No one seems to be able to
tell the difference, if there is one, between arithmetic and mathematics.
Is there a difference, and what is it?
- How Can Math Be Made More Interesting? [08/30/2001]
What can I do to help me be more interested in math?
- Mathematics in the Applied Sciences [02/24/1997]
How do civil engineers and others use math in their work?
- The Number e [6/3/1996]
Is "e" a number like Pi? How does "e" relate to continued fractions?
- Numbers: Cardinal, Ordinal, Nominal? [10/25/1999]
Which group of numbers - cardinal, ordinal or nominal - does "time" fit
into? Are there other types of numbers as well?
- Purpose of Algebra [10/15/1996]
What is the purpose of algebra and who came up with the idea?
- Ten Commandments of Math [07/05/1997]
What are the Ten Commandments of Math?
- The Third Millennium [01/23/2000]
When does the Third Millennium begin? Are there any inherent predictions
or unverifiable assumptions within math?
- What is Calculus? [05/06/1997]
What is calculus and how does it work?
- Why Does Math Need Proofs? [03/24/2000]
Why does math need to have proofs?
- Why Is Math Important? [01/02/2002]
Some of it we don't need to know in the real world, so why do they teach
us things we won't need to know?
- Why Study Practical Geometry? [04/26/1997]
What can I do to help my students to see just how important Geometry and
all Math is?
- Why There are 12 Tones in a Scale [12/28/2000]
Why are there 12 tones in an octave? Can you explain the significance or
the equation r^n = 2^m? Also, what's so special about a fifth? Why should
the scale be based on the fraction 3/2?
- Wording Division Problems [08/10/1998]
How would you clarify the wording of division problems like "divide into"
or "divide by"?
- Year 2000 (Y2K) Problem [07/26/1998]
Can you explain the Year 2000 problem in layman's terms? Why is it so
hard to fix?
- 1, 2, 3, ... as Varied as Arabic, Roman, ... Yoruban? [10/08/2011]
A researcher familiar with an African language's words for its counting numbers wants
to know what symbols its native speakers use to write them. Through analogies to Latin and French -- and English etymologies -- which show the distinction between speech and writing, Doctor Peterson explains why a numbering system unique to the Yoruban language likely does not exist.
- Are Calculators Smart? [06/02/2001]
How come calculators are so smart?
- Are Math Symbols Universal? [05/22/2004]
Do Russian math students use the same math symbols that Americans do?
For example, do they use '+' for addition?
- Are Subtraction and Division Commutative and Associative Operations? [05/15/2008]
I don't agree that subtraction and division are not commutative
operations. If we define a - b as a + (-b), then it commutes correctly
into (-b) + a. So why does everyone say subtraction is not commutative?
- Avoiding Careless Mistakes [01/30/2002]
How can I avoid careless mistakes?
- Careless Mistakes [02/04/2002]
When it asked me for the range, domain, and inverse of ordered pairs, I
just put the inverse because I misread the question...
- Checking Your Work [9/9/1996]
I've had problems keeping myself from making little mistakes like not
putting commas in, putting the decimal point in the wrong place, and
writing down the wrong number... How can I stop doing this?
- Chefs and Algebra [02/05/2002]
I hope to become a chef someday, and I would like to know how algebra
(specifically polynomials, the quadratic formula, factoring, etc.) could
possibly relate to my future career and my life beyond high school.
- Connecting Algebra and Geometry [07/11/2002]
What are the mathematical connections between algebra and geometry?
- Decimals Versus Fractions: Pluses and Minuses [08/19/2011]
We already have fraction notation, so what's the point of decimals? A new teacher
relaying this question from her middle schoolers wonders if, like other formal
representations in math, decimals just amount to another "shorthand." Comparing
notational systems to tools, Doctor Ian responds with the various computational
advantages and disadvantages of fractions and decimals, before concluding that
different tools suit jobs differently.
- The Difference between Science and Mathematics [09/18/2006]
Is there any difference between a science project and a math project?
We have a science fair coming up and I wanted to do some math, but my
friend says that the scientific process is very different from math.
- Doctors and Math [10/27/1998]
How do doctors use math?
- Don't Use Calculators [12/18/2000]
When children should not use calculators to do math.
- Do We Really Need to Learn Math? [11/19/2002]
Why do we need to know math if we can have a calculator do it?
- Estimation in 3rd Grade [12/16/1996]
How do you learn to estimate? What is its importance?
- Etymology of the Word Mathematics [12/10/2001]
Why do you call maths maths?
- The Fairness of Democracy [09/16/1998]
What are some ideas to think about with regard to the fairness of
- Forgetting and Remembering, Re-inventing and Explaining [02/19/2011]
A student has a knack for learning math easily -- and then forgetting it just as quickly.
To improve her recall, Doctor Ian offers two analogies to skills from his own life, then
two strategies for deepening understanding, and in the process reveals why many
other math doctors volunteer with Ask Dr. Math.
- Help in Studying for Math [08/17/1999]
I was wondering if you had any suggestions or comments that might help me
out a little bit.
- How Do I Learn Basic Math as an Adult? [08/02/2004]
I'm an adult hoping to take a statistics course, but I haven't thought
about math in 20 years and was never very good at it. How can I learn
all those basic things I missed back then?
- How Do Lawyers Use Math? [01/26/2001]
I have to write a two-page paper on how lawyers use math.
- How Many Formulas? [11/25/2002]
How many formulas do you actually have to learn?
|
Common terms for commercial fishing, aquaculture, seafood processing, and buying:
The Hawaiian name for both yellowfin and bigeye tuna.
Any fish migrating from the sea into freshwater rivers and lakes to spawn (e.g. salmon, striped bass, shad, and alewife). Fish that migrate in the reverse direction, from freshwater to the sea, are called catadromous.
The farming of aquatic species, such as fish and shellfish, in salt, brackish, or freshwater. About half of the seafood produced globally is from aquaculture operators.
A condition where the bones of the belly wall separate from the flesh and a sign of poor handling. Left too long before gutting, digestive enzymes break down flesh adjacent to the intestines.
The community of marine life inhabiting the sea floor.
Pelagic fish whose upper jaws are prolonged into a spear or sword, e.g. swordfish.
This is the total weight of a number of organisms or population of a species.
Process in which fish are bled while alive by severing an artery. The highest quality fish are bled.
Seafood that has been frozen in a plate freezer under hydraulic pressure. Fillet blocks, which are normally 16.5 pounds, are sawed into pieces and used to make a variety of breaded and battered products such as fish sticks. Raw, shell-on shrimp are often frozen in 2-kilo or 5-pound blocks, as is crabmeat.
A fillet that has all the bones removed.
The practice of freezing seafood by immersion in liquid brine, usually at temperatures of about 5ºF. King, snow and Dungeness crab are usually brine frozen.
A term used to describe a finfish that has had its head, guts, and tail removed. Most often used with mahi-mahi or farmed sturgeon.
(Or "Burnt") A metabolic change to the flesh of a fish, most associated with tuna. When tuna are caught by troll or handline, they can struggle during capture. Since tuna are warm-blooded, they can literally cook or burn their flesh due to metabolic changes. Burned tuna will have a lighter color, a softer texture, and a reduced shelf life.
A unit of measure equal to 32 quarts or 8 gallons. Most often used when selling live mollusks like clams, oysters, and mussels.
Fish and other marine life that are incidentally caught while fishing for the target species. Bycatch is generally discarded dead while at sea and can include seabirds, turtles, marine mammals, juveniles of the target species, or targeted fish from other fisheries. Reduction of bycatch is an ongoing effort in many fisheries and is a common criterion in wild seafood sustainability ratings and criteria in assessing the overall sustainability evaluation.
A shipping term which means the cost of freight is included in the quoted price. Also called a delivered price.
Nets usually cast from shore or a boat that catch fish by falling on top of them and then closing, typically restricted to shallow waters.
Species spawn at sea and then their young migrate to fresh or brackish water to grow and mature, e.g. American eel; opposite of anadromous.
The total number of fish and marine life taken by fishers from an area or a given period of time, including bycatch.
Legally, in the U.S. only salted sturgeon eggs can be labeled simply caviar. Eggs or roe from other species must be labeled to include the species of fish, i.e. salmon caviar, paddlefish roe.
Packages or block-shaped wraps of frozen fillets (traditionally from North Atlantic groundfish species like cod and haddock) wrapped in plastic cellophane or polyethylene film, typically packed six packages to a 5-pound box. Each package is graded by the number of fillets per wrap, i.e. 1/3 cellos contain 1 to 3 fillets per wrap.
A type of potentially fatal poisoning associated with reef fish that ingest the ciguatoxin. It is not a function of poor handling.
Fish fillets that have been exposed to carbon monoxide, which is used to retain or enhance red color.
A large group of small crustaceans and an important food source for larger species such as fish, seabirds, and baleen whales.
In the U.S., the name associated with small, lobster-like crustaceans, which are also known as crawfish. Overseas, the name is sometimes used to describe spiny, or rock lobsters.
Invertebrates characterized by a segmented body (with limbs that are paired and jointed) and exoskeleton; e.g. lobsters, crabs, and shrimp.
The extremely cold freezing process, usually using liquid nitrogen or carbon dioxide. Because of its higher cost, most often used to freeze higher-value seafood like shrimp and lobster.
Refers to fish living close to the bottom of a body of water, such as cod or flounder. Synonymous with groundfish or bottomfish.
A term for a trawler, a boat that tows a large net behind it.
A heavy mesh gear that sucks up everything from the seafloor, used primarily to target shellfish. The impacts of dredge gear on benthos habitats is an environmental concern.
Fish that has been gutted and had the entrails removed.
A large gillnet suspended vertically by floats that drift in the open ocean. Drift nets are banned in international waters due to the indiscriminate nature of catch and are limited to 1.5 miles in length in U.S. waters.
A reference to a product that has not had had water added it to by using STP.
The waste stream and material from an aquaculture facility as a byproduct of the aquaculture operation usually consisting of fecal matter, nutrients and chemicals such as pesticides and antibiotics.
The water and substrate necessary for fish to reproduce, feed, and grow to maturity as defined by the U.S. Congress in the 1996 Sustainable Fisheries Act.
An ecosystem defined as the intersection of a freshwater river and a saltwater body (oceans) that serve as nurseries for juvenile fish and provide other ecosystem services.
The price that a fisherman receives for his catch at the dock.
The typically 200-nautical mile zone from a country's coastal border that gives that country exclusive fishing rights as established by the international Law of the Sea.
A large fishing boat that processes and freezes its catch on board in a processing factory. The level of processing may vary from simply heading and gutting fish to producing skinless, boneless fillets.
Abbreviation for frozen-at-sea.
The rate of offspring production which generally increases with fish/shellfish as they mature and increase in size.
In aquaculture, this term is generally the ratio of how much food is used to produce the fish species, or more specifically the ratio of the amount of feed necessary to the gain in wet body weight of fish produced. The lower the ratio the better the situation as wild seafood protein is often fed to grow farmed fish, resulting in a net loss of fish.
A strip of flesh from the side of a fish, cut away from the backbone. Fillets can be skin-on or skinless, bone-in or boneless. If the bones are removed by cutting out a strip of flesh, the fillet is v-cut. If the nape and bones are removed, it is a j-cut.
The process of removing sharks' fins and discarding the rest of the body, primarily used for soups in Asian markets and a practice banned in the United States in 2000.
Fish or shellfish that is manipulated by drying, cooking, pressing and/or grinding fish or shellfish as a protein source used primarily in aquaculture operations for carnivorous fish.
The taking or removal of one or more species of fish from an aquatic environment using a type of fishing technology (gear) by one or more fishers, with the primary focus being on the human aspects of fishing and the resulting activities involved.
Eight regional councils in the U.S. responsible for developing Fishery Management Plans (FMPs) for fisheries that occur in federal waters.
Free on board; a location usually follows, indicating the point at which any additional shipping charges are the buyers responsibility (i.e., FOB Dutch Harbor).
Dry, white crumbly spots on frozen seafood caused by dehydration. A sign that either the fish has been in the freezer a long time, or was not properly protected prior to freezing.
Head-on finfish that has been gilled and gutted. Typically done with higher-value species like red snapper, grouper and king salmon.
Separation of fish flesh, usually a sign of soft flesh and an indicator of poor handling.
A net where the fishes head passes through the mesh opening but the fish is caught by its gills and cannot escape. Many states have banned their use in coastal waters due to bycatch, but regulations on mesh size, net location, and timing of when nets are in the water are increasingly common to reduce bycatch.
A protective coating of ice on frozen seafood to protect it from dehydration and oxidation during cold storage. Drained weight is a measure of frozen seafood after the glaze has been removed.
Size measurements by which seafood is often sold. Increments are most often either counts per pound (i.e., 21/25 shrimp) or by graded weights (i.e., 4-6 lb. H&G salmon or 2/4 oz. pollock fillets).
A term used to describe raw, frozen shellfish, i.e., green, headless shrimp. Can also be used to describe the weight of seafood before it is processed, i.e., green weight.
A generic term to describe the different types of finfish that live on or near the seafloor such as cod, flounder, and rockfish.
A term used to describe fish that have had the heads and guts removed.
A fishing line principally managed by hand as opposed to the use of a rod to manage the line.
The fishing practice of retaining the most valuable target species being harvested and discarding the lesser valuable target species, often due to the species characteristics such as size and color.
The designation is given to the area of the ocean that is not governed by any single country and where much fishing takes place.
Chemicals produced by the decomposition of flesh in scombroid species (e.g. tuna, mahi-mahi, mackerels) when fish are not adequately refrigerated. Rarely fatal, but can cause severe illness.
A fishing method that uses natural or artificial bait placed on a hook fixed to the end of a line in both single and multiple units; often confused with longlines.
Individually Quick Frozen. Seafood that is IQF is normally protected with a glaze to prevent dehydration.
Individual Transferable Quota/Individual Vessel Quota. These are quotas that give fishermen ownership to harvest a specified amount of fish or shellfish. In most cases, they can be bought, sold or leased.
An abbreviation for "Illegal, Unreported, Unregulated" as it pertains to fishing that is conducted accordingly. Often referred to as 'pirate' fishing, IUU fishing is a major threat to the sustainability of seafood as there is very little way to account for how much seafood is being taken from the overall system and undermines the integrity of management and legitimate fishers to harvest seafood responsibly.
A method of trimming a fillet that removes both the nape and bones. J-cuts are the most expensive cut because the yield is lower. In the case of H&G fish, a j-cut means the nape is removed.
A method of fishing that uses actively fished vertical lines onto which baited hooks are attached.
The quantity of fish/shellfish brought ashore for sale, not including possible bycatch caught and discarded at sea.
A carton of fillets that are packed in layers with each layer being separated by a sheet of polyethylene.
The thickest part of a fillet, above the belly cavity. Also used to describe boneless quarters from large fish like tuna and swordfish.
A fishing method that uses several short lines with baited hooks attached to the main line that is dragged through the water. Longlines can contain thousands of hooks and extend for several miles and often result in high levels of bycatch depending on the number of hooks, when the lines in the water, and where they are being fished.
The maximum amount of a species that can be removed from its environment without diminishing the long-term health of the overall population; a term that is often used by scientists and fishery managers when making recommendations or establishing fishing limits.
Meat from the leg section of a crab nearest to the shoulder.
The thinnest part of a fish, near the front, around the belly.
A term for a pack of ungraded, random weight products.
The scenario where there are more fishermen, vessels, and/or gear ('capacity') in a fishery then is necessary to catch the available volume of target species, and often leads to overfishing.
The scenario where the amount of fish taken in a fishery is greater than the amount of the remaining fish population can reproduce to the same or greater level; a net loss in fish.
Acronym for pinbones out / pinbones in.
Fish that live above the sea floor, often near the surface. Many pelagic species such as mahi-mahi, tuna, and swordfish are also highly migratory.
Fine bones which are often found along the midline of a fillet. Most often used when describing salmon or trout bones.
Small plant (phytoplankton) and animal (zooplankton) species that spend some or all of their lives near the sea surface. Many marine species are planktonic in their life stages (e.g. cod, Dungeness crab) and they are the basis of the marine food web providing food for such species as whale sharks and blue whales.
A fishing method where fish are attracted to bait placed in the water and then hooked with a line on the end of a pole and 'poled' out of the water; used to capture surface swimming fish such as yellowfin and skipjack tuna.
An aquaculture facility, either natural or man-made, with differing impacts on the environment based on how the discharge from the pond is handled. Many catfish, carp, and tilapia are produced in ponds.
A.K.A. "trap," a cage or basket usually placed on the seafloor connected by ropes to floating buoys on the sea surface.
The principle that puts the burden of proof that there is no damage being done by fishing to the target population or the associated ecosystem rather than proving that damage is being done by fishing.
A net that encompasses a school of fish and then is drawn closed at the bottom in the form of a purse.
The term describes both the larger type of aquaculture system in which water is diverted from nearby streams or pumped from wells into concrete troughs where fish are held and then the water is usually treated and discharged and the troughs themselves, known as raceways.
Eggs from a fish or shellfish.
Temporary stiffening of muscles following death. Fish should be processed either pre- or post-rigor, as handling during rigor can cause gaping of the flesh.
Thinly sliced prices of fish or shellfish that are eaten raw. Also used (both accurately and inaccurately) to indicate a fish of premium or sashimi quality.
A cooked crab portion that contains one half of a cleaned crab, including legs, claw, and shoulder.
A carton of frozen fillets similar to a layerpack, but layers are separated by a continuous interleaved polyethylene sheet. Individual fillets can be separated by dropping or shattering the carton.
A product that has had water added to it by using STP.
A distinct sub-population of a larger group of species that is reproductively isolated to some extent from other populations; in fishery management, the term can be used to describe one or more subpopulations of one or more species.
Acronym for sodium tripolyphosphate, a widely used food additive. Although it is designed to prevent drip loss, in practice STP is used by processors to increase yields by adding water to a seafood product. In some cases, such as scallops, STP can allow a processor to gain 10 or 15 percent additional weight.
In smaller fish such as salmon and halibut, a cross-section of a fish, containing the backbone. In larger fish such as tuna and swordfish, steaks are boneless portions cut from a loin.
Short for a brand name (Styrofoam®) of a box that is made from extruded polystyrene foam. Widely used to ship higher value fresh seafood such as farmed salmon and live shellfish.
Raw extruded flesh from lower-value finfish like pollock and hake that is frozen in blocks and later used to make seafood analogs.
The thin, tapered portion of a fillet that normally does not contain bones.
A patented process that uses scrubbers to remove odor and taste components from a wood-generated smoke. Like treating with CO, it is used to retain red color in fish such as tuna at normal cold storage temperatures. Also used in fish like mahi-mahi, swordfish, and tilapia to turn brown bloodlines a more attractive reddish color.
A common unit of measurement. A metric ton contains 2,205 pounds, while a short ton contains 2,000 pounds.
A fishery management term that defines the total amount of a target species that can be taken in a given time period, usually based on a fishing season or annual basis.
A large container used to hold fish or shellfish. Fresh seafood is iced and held in plastic totes until processing. Fiber totes are used to ship loose frozen H&G fish such as salmon and halibut to avoid the added cost of boxing fish.
A fishing method that uses a device, usually a cage or pot, that catch fish/shellfish within the device; typically baited with the cage designed for a specific species and often very little bycatch.
A fishing method using a net with a wide mouth that tapers to a small end towed behind a fishing vessel at various depths of the sea including the bottom and mid-water levels. There are both habitat impact and bycatch concerns with trawl fishing because of the indiscriminate nature of the gear.
A type of hook-and-line fishing method where one line or multiple unconnected lines, each with baited hooks, are towed behind a fishing vessel.
A cut that removes pinbones by making a V-shaped incision along both sides of the bone strip, leaving most of the nape.
A wax impregnated, waterproof cardboard box that is widely used to ship fresh fish.
|
The Monty Hall Problem has struck again, and this time it’s not merely embarrassing mathematicians. If the calculations of a Yale economist are correct, there’s a sneaky logical fallacy in some of the most famous experiments in psychology.
The economist, M. Keith Chen, has challenged research into cognitive dissonance, including the 1956 experiment that first identified a remarkable ability of people to rationalize their choices. Dr. Chen says that choice rationalization could still turn out to be a real phenomenon, but he maintains that there’s a fatal flaw in the classic 1956 experiment and hundreds of similar ones. He says researchers have fallen for a version of what mathematicians call the Monty Hall Problem, in honor of the host of the old television show, “Let’s Make a Deal.”
Here’s how Monty’s deal works, in the math problem, anyway. (On the real show it was a bit messier.) He shows you three closed doors, with a car behind one and a goat behind each of the others. If you open the one with the car, you win it. You start by picking a door, but before it’s opened Monty will always open another door to reveal a goat. Then he’ll let you open either remaining door.
Suppose you start by picking Door 1, and Monty opens Door 3 to reveal a goat. Now what should you do? Stick with Door 1 or switch to Door 2?
... try a few rounds of the game, which you can do by playing an online version of the game. Play enough rounds and the best strategy will become clear: You should switch doors.
This answer goes against our intuition that, with two unopened doors left, the odds are 50-50 that the car is behind one of them. But when you stick with Door 1, you’ll win only if your original choice was correct, which happens only 1 in 3 times on average. If you switch, you’ll win whenever your original choice was wrong, which happens 2 out of 3 times.
Now, for anyone still reading instead of playing the Monty Hall game, let me try to explain what this has to do with cognitive dissonance.
For half a century, experimenters have been using what’s called the free-choice paradigm to test our tendency to rationalize decisions. This tendency has been reported hundreds of times and detected even in animals. Last year I wrote a column about an experiment at Yale involving monkeys and M&Ms.
The Yale psychologists first measured monkeys’ preferences by observing how quickly each monkey sought out different colors of M&Ms. After identifying three colors preferred about equally by a monkey — say, red, blue and green — the researchers gave the monkey a choice between two of them.
If the monkey chose, say, red over blue, it was next given a choice between blue and green. Nearly two-thirds of the time it rejected blue in favor of green, which seemed to jibe with the theory of choice rationalization: Once we reject something, we tell ourselves we never liked it anyway (and thereby spare ourselves the painfully dissonant thought that we made the wrong choice).
But Dr. Chen says that the monkey’s distaste for blue can be completely explained with statistics alone. He says the psychologists wrongly assumed that the monkey began by valuing all three colors equally.
Dr. Chen remains convinced it’s a broad problem. He acknowledges that other forms of cognitive-dissonance effects have been demonstrated in different kinds of experiments, but he says the hundreds of choice-rationalization experiments since 1956 are flawed.
Even when the experimenters use more elaborate methods of measuring preferences — like asking a subject to rate items on a scale before choosing between two similarly-ranked items — Dr. Chen says the results are still suspect because researchers haven’t recognized that the choice during the experiment changes the odds. (For more of Dr. Chen’s explanation, see TierneyLab.)
“I don’t know that there’s clean evidence that merely being asked to choose between two objects will make you devalue what you didn’t choose,” Dr. Chen says. “I wouldn’t be completely surprised if this effect exists, but I’ve never seen it measured correctly. The whole literature suffers from this basic problem of acting as if Monty’s choice means nothing.”
|
Located in Eastern Siberia, Yakutia – a federal subject of the Russian Federation – has gigantic reserves of oil, gas and diamonds. But Dmitry (alias), from the Yakut ethnic group, talks of the dire economic situation outside the cities and amongst the indigenous communities. “There is no way to make a living here apart from hunting and fishing. And we cannot even fish without a licence now. But, there is kost’!”
Kost’ means “bone” in Russian and Dmitry is referring to mammoth ivory. Harvesting and selling it for export has given the local people a chance to earn much-needed cash. Until recently, Dmitry had a trading company that imported mammoth ivory into mainland China and Hong Kong.
Global action against trade in elephant ivory has affected those in the mammoth ivory business like Dmitry, causing mammoth ivory price to crash as trade dried up.
David Olson, director of conservation at WWF Hong Kong, explains the difference between the two ivories: “Whole tusks of mammoth are readily distinguished from the tusks of modern elephants. A cross section of mammoth tusk also has sharp growth patterns compared to that of recent ivory. At times, mammoth ivory has inclusions of a particular mineral that fluoresces under violet light. But, when cut into smaller pieces and trinkets, it can be difficult to tell.”
Alexander, a professional ivory carver from Yakutia, who produces souvenirs and gifts, such as USB sticks and cufflinks in the form of miniature stormtrooper helmets, says that even though mammoth and elephant ivories are very different, high-quality mammoth ivory from the very core of the tusk can be passed off for elephant, unless experts are involved.
Still, conservationists remain concerned that the long-extinct mammoths may push their living elephant cousins closer to extinction.
‘Mining’ mammoth ivory
The last woolly mammoths on the territory of today’s Russian Federation died out less than 5,000 years ago after their main habitat – the vast northern steppe also known as mammoth steppe – disappeared because of climate change. Similar in size to African elephants, mammoths often had much longer tusks that twisted like a corkscrew – thought to be handy snow-clearing devices when feeding in winter during an ice age.
Over hundreds of thousands of years, mammoth herds in Siberia left behind a vast quantity of tusks, locked in permafrost – the ice layer below the topsoil.
Global warming is now thawing out the permafrost and mammoth tusks are floating up to the surface. People are also digging into the permafrost to find them.
The majority of the world’s mammoth ivory comes from Yakutia. According to the Russian media, before 2018 more than 100 tonnes were exported each year. Of that, 90% is destined for China because of the sheer size of the market and the ancient tradition of ivory and bone carving. Russia regulates the harvesting and exports of mammoth ivory, but a third of the trade is thought to break the law somehow.
For years, the enthusiasm for mammoth ivory export, fuelled by Chinese demand, ran so high in Russia that in 2012 there was an official proposal to classify the country’s mammoth ivory reserves together with those of oil and gas.
Eager to lock the burgeoning Chinese business into one official channel, in 2018 the government of Yakutia announced plans to create a Russian–Chinese monopoly on harvesting and export. Nothing has so far come of these plans.
According to Russian law, only ivory that is already on the surface can be collected but the Siberian seekers of mammoth ivory pay no heed to this. They use powerful water pumps to smash and thaw the permafrost and unlock the ivory inside.
“Conservationists complain, they say it pollutes rivers. But the damage done is not even worth mentioning when compared to what gas and oil people do here!” says Dmitry. Yakutia is a major producer of hydrocarbons, for export around the world. Many ivory harvesters, Dmitry adds, get into heavy debt to buy the fuel and equipment necessary for a season of harvesting ivory, then fail to find enough and lose everything they have.
Once the tusks are collected the harvesters sell the ivory to traders. The Russian-language internet is full of trading company sites that offer legal export of mammoth ivory from Russia to anywhere in the world.
At the end of summer, Chinese traders travel deep into Siberia, says Dmitry, to meet with brigadas – teams of workers harvesting ivory. Brigada will by then have done months of back-breaking work in the wilderness.
“They would tell a Chinese trader – one kilo of our best kost’ is, say, 40,000 roubles (US$540). The trader says: I will buy it all for 15,000 – right now! Brigadas often need money desperately to cover their expenses, and they sell in bulk, on the spot, for cheap.”
Then comes the main hurdle – getting the ivory out of Russia.
“There are no elephants in Russia” chuckles Dmitry, “but you must get a certificate that the ivory is from a mamont (mammoth) and not from a slon (elephant).”
“Before it can be exported, it must undergo expert examination to determine that it does not have cultural heritage or scientific value. You must also declare the exact place where it was collected, the vehicle it was transported out of the forest on, what flight it then was on… The whole process, for one shipment, takes about two months.”
The controls are getting stricter and stricter, he adds. In November 2020, four tons of mammoth ivory were confiscated by Russian customs for incorrect paperwork. The exporters had under-reported the high quality of the ivory, which made it of cultural value.
Quality can vary greatly, because every mammoth tusk has a unique history of several millennia in the ground.
He explains: “Ivory is classified as A, B, C, and D. D is rotten stuff. In Russia, it is now about 20-25,000 roubles (US$260-330) per kilo for A, and 10-15,000 roubles for B. Intact tusks, with no cracks, are very valuable, but a pair of tusks from the same mammoth is the most valuable. These are auctioned off.”
Dmitry had to close his own mammoth ivory business in Hong Kong when the demand for mammoth ivory nosedived after China’s elephant ivory trade ban in 2018. The ban was strictly enforced. Outlets trading in ivory and carving workshops where shut down in a nationwide crackdown, driving down both elephant ivory prices and the enthusiasm of Chinese buyers.
The ban also affected the mammoth ivory trade, explains Dmitry. “In China, this trade is under a microscope now and people are worried about buying mamont ivory. When we were selling it on Taobao, customers would ask us – can I be sure this is not from an elephant? Will I get in trouble for buying this?”
According to CITES, top quality mammoth ivory reached a peak price in 2014 of US$1,900 per kilo in China. Now, a kilo costs US$300-460, says Dmitry.
According to Dmitry, the first fall in price after the peak was due to oversupply driven by Chinese traders travelling to Yakutia to buy ivory in bulk.
Some expected that, with elephant ivory bans in place, legal mammoth ivory would become a substitute for illegal elephant ivory, soaking up pent-up demand and driving prices back up. Dmitry dismisses the idea, saying that mammoth ivory simply does not have the same appeal:
“This is a fengshui sort of thing – mamont went extinct, so it carries a kind of bad vibe. Slon ivory is beautifully white, but mamont is always a little yellowish. When mammoth ivory is worked, it can even smell like rotten teeth! While there are still slon around, people will buy slon. Mamont ivory is only for those who are into it – aficionados.”
In more bad news for the mammoth ivory traders, the taps on the supply of Siberian mammoth ivory are closing. In October last year, the government of Yakutia announced a sweeping new law: from 2021, mammoth tusks, including those from an animal that was over 100kg, any intact tusk, or one of more than 3 metres long, will be considered of cultural and scientific value and not allowed to be exported. Ivory harvesters bitterly complain that practically all ivory worth exporting falls under this law.
Conservation and resurrection
Restricting mammoth ivory supply may be good news for elephant conservation.
Olson said: “We know of cases where doctored shipments of legal mammoth ivory are used to transport illegal ivory from recently killed African elephants. We are trying to gauge how much this illegal practice might increase as ivory bans are applied.”
The permafrost is releasing not only tusks and bones, but occasionally woolly mammoths nearly in their entirety. Some are so well preserved that the idea of resurrecting the species from the DNA is not entirely in the realm of science fiction. Several scientists have been working on bringing the species back through cloning.
Last year, woolly mammoth – Mammuthus primigenius – came close to joining the living species again, at least on the pages of CITES Appendix II. Because of growing concerns about mammoth ivory being used for laundering elephant ivory, a formal proposal was made by Israel to include the woolly mammoth.
The proposal failed to pass. The CITES committee judged that there was insufficient evidence of elephant ivory being laundered as mammoth, adding that the inclusion of mammoth would result in smuggling of mammoth ivory, creating an “enforcement issue where there previously was none”, and “taking resources” away from efforts to save living elephants.
Had the proposal succeeded, Mammuthus primigenius would have become the first ever endangered extinct species, which says a lot about the state of the natural world today.
|
See also the
Dr. Math FAQ:
3D and higher
Browse Middle School Word Problems
Stars indicate particularly interesting answers or
good places to begin browsing.
Selected answers to common questions:
- 100 Percent of Daily Allowance of Iron [09/30/2001]
A common foodstuff is found to contain .00125% iron. The serving size is
87.0 grams. If the recommended daily allowance is 18mg of iron, how many
servings would a person have to eat to get 100% of the daily allowance of
- Acid Concentration, Heating Bill [7/6/1996]
1) A pharmacist has 8 liters of a 15 percent solution of acid. How much
distilled water must she add.... 2) By installing a $120 thermostat, a
family hopes to cut its annual heating bill...
- Age and Money [12/13/1994]
Frank is eight years older than his sister. In three years he will be
twice as old as she is. How old are they now? (and other similar
- Backward Through the Steps [5/20/1996]
Can you show strategies for solving this baseball card word problem?
- Blending Seed [09/27/1998]
How much of $0.65/lb seed does a dealer need to combine with 200 lbs of
$0.45/lb seed to make a $0.55/lb blend?
- Calculating Income vs. Sales [3/26/1996]
A factory owner knows that some of her expenses are going to occur
regardless of how many items she makes. These are fixed costs and total
$3000 per week...
- Conversions [3/17/1995]
Nancy ran a distance of 3.8km in 55 min. Calculate her speed in
kilometers per hour and metres per second.
- Cost of Cleaning a Building [07/03/2003]
If I clean a 3200 square foot building five nights per week for a sum
of $575.00 per month, what is the cost per square foot?
- Derfs and Enajs: Algebra and Venn Diagrams [03/09/2003]
All Derfs are Enajs. One-third of all Enajs are Derfs. Half of all Sivads are Enajs. One Sivad is a Derf. Eight Sivads are Enajs. The number of Enajs is 90. How many Enajs are neither Derfs nor Sivads?
- Diesel or Gasoline Engine? [10/16/1996]
You can buy a car with a diesel engine for $427.65 more than the same car
with a gasoline engine...
- Dimensional Analysis [10/06/2001]
Mr. R wants to give all of his chemistry students enough chocolate to
make them goofy for the rest of the day. It's a known fact that it takes
47 chocolate chips to make a student goofy...
- Employee Pay Schedule [07/12/2003]
For a particular job, Moe should get 40% of the gross pay, Larry
should get 30%, and Curly should get 30%, assuming they all work the
same number of hours. But how should the money be divided if they
work different numbers of hours?
- Equations from Word Problems, and Units [05/19/2003]
In 2 1/4 hours the temperature dropped 13 1/9 degrees. How many
degrees did the temperature drop per hour? How do I convert this
from words into an equation?
- Factoring Problems [8/14/1996]
What is the width of an uniform border surrounding a rectangle?
- Farmer Crossing a River [09/24/2001]
A farmer is taking his prize lettuce, lion, llama, and pet leviathan (a
unique creature that eats llamas and lions unless a lettuce is present)
- Finding One Coin of 12 in 3 Steps [8/6/1996]
Given a pile of twelve coins of equal size with one of a different
weight, in three weighings find the unequal coin...
- Finding Sally's Hourly Wage [11/7/1994]
Sally works at a grocery store. In one week she earned $390 for working
47 hours, of which 7 hours were overtime.The next week she earned $416
for working 50 hours, of which 8 hours were overtime. What is Sally's
- Finding the Ages of the Farmer's Daughters [12/21/1995]
A man has three daughters. The product of their ages is 72, the sum of
their ages is his house number, and the oldest loves chocolate. What are
the daughters' ages?
- Guessing Your Way to Algebra: On Rates, Remainders, Relationships, and Restraint [09/08/2013]
John spent 2/5 of his money on exercise books, and 1/3 of the remainder on three
ballpoint pens, which cost eight times as much per. Doctor Ian steps through this word
problem by using numeric guesses as placeholders before declaring variables
— and making a key insight.
- How Many Boxes? A Diagram [03/20/2003]
There were juice boxes in a cooler. Jared took 1/6 of them. Sara took
1/4 of what was left. Now there are 15 boxes. How many boxes were
there to start with?
- How Many Chickens and Ducks? [8/16/1996]
A man bought 20 chickens and ducks, with a $2 discount per chicken and 50
cent discount per duck...
- How Many Stools? How Many Tables? [12/13/2002]
In their spare time, the Buffalo Bills operations staff members build
3-legged stools and 4-legged tables. Last month they used 72 legs to
build 3 more stools than tables.
- How much is the dagger worth? [10/12/1996]
A sword and dagger are together worth 300 copper pieces. The sword is
worth 200 copper pieces more than the dagger. How much is the dagger
- How Much Money is Left? [5/1/1995]
A lady has a certain number of dollar bills in her purse. She has no
other money. She spends half the money on a hat and gives $1 to a beggar
outside the store. She spends half the remaining dollars for lunch and
tips the waiter $2. She then spends half the remaining dollars for a
book, and just before she goes home she spends $3 on a hot fudge sundae.
She now has $1 left. How many dollars did she begin with?
- How Old are Ben and Kris? [10/17/1999]
Five years ago Ben was 2/3 as old as Kris. Ten years from now he will be
5/6 as old as Kris. How old are they now?
- How Old is Chris Now? [12/26/2001]
Pat is twice as old as Chris was when Pat was as old as Chris is now. If
Pat is 24 now, how old is Chris now?
- How to Turn Word Problems into Algebra Equations [6/6/1996]
Where do you put the letters and numbers when setting up algebra
equations from word problems?
- Least Common Multiple Word Problem [12/10/1996]
Each of three businesses receives different sized cartons of glasses. If
all three receive the same number of glasses and none of them receive
more than a thousand glasses, how many glasses and cartons are in each
- Least Number of Marbles [2/20/1995]
After a successful game of marbles with three friends, Joe said, "If only
I had one more marble, ...." What is the least number of marbles Joe
could have had?
- Markups and Discounts [02/12/2002]
What is the correct way to mark up or discount a product?
- Math Age Word Problem [03/20/2001]
Bob is as old as John will be when Bob is twice as old as John was when
Bob's age was half the sum of their present ages...
- Math Logic [6/5/1996]
Sally, Ron, Jim, and Meghan are President, VP, Treasurer, and Captain of
the cheerleading squad, but not necessarily in that order. Who is what?
- Mixing Alcohol, Cable TV Pricing [8/2/1996]
What amounts of 9 percent and 12 percent alcohol do you mix to get
300,000 gallons of 10 percent alcohol? For each 5-cent increase in the
monthly subscription price, 4 people will decide not to subscribe to
- Mixing Milk and Butterfat [09/04/2001]
Milk that has 5% butterfat is mixed with milk that has 2% butterfat. How
much of each is needed to obtain 60 gallons of milk that has 3%
- Number of Quarters [9/11/1996]
Tony has eleven more nickels than quarters. How many quarters does he
have if the total value of his coins is $2.65?
- Number Puzzle Solved with and without Algebra [12/10/2001]
I am a number. Add 25 to me. Divide the sum by 2. You end with 75. What
number am I?
- Pencil Costs, Dividing Property [6/25/1996]
1) Drawing pencils cost 8 cents each and colored pencils cost 11 cents
each. Two dozen assorted pencils cost $2.16. How many colored pencils are
there? 2) A man died, leaving 23 cows to his three children; the eldest
child should have 1/2 of the cows...
- Radius of a Pizza [8/27/1996]
If a pizza has an area of 30 inches, what is its radius?
- Rate of Travel [05/15/2003]
A passenger on a train traveling at 135km/h walks toward the back of
the train at a rate of 7km/h. What is the passenger's rate of travel
with respect to the ground?
- Rates and Proportion [7/11/1996]
If 10 men can build 2 boats in 4 days, how many men are needed to build 5
boats in 2 days?
|
anyone can suggest in practical real life about system of equations involving x and y.....a motivation and examples where my classmate be able to understand it will when it involve x and y....
please do help me in my report....thanks in advance
A mother has $5.80 to buy some fruit for her extended family.
She needs at least 9 pieces of fruit, in this case apples and pears are preffered.
When going to the market she notes apples are worth $0.60 each while pears are $0.70 each.
Let X be the number of apples and Y be the number of pears. How many of each can she buy for this amount of money given the costs of each?
Solve the system
|
Overweight Pregnancy Can Have Long-Term Health Consequences For Children
SOUTHFIELD (WWJ) - Too much weight before and during pregnancy can have serious health consequences not only for the mother, but for her child’s health for many years, new research shows.
“While it’s pretty well-known a healthy weight is crucial to a healthy and long life, new research is showing that if a woman is overweight while pregnant, her baby is more likely to be overweight,” Alan Fleischman, March of Dimes medical director, said in a statement.
Those health risks continue into childhood, with a higher risk of developing insulin resistance, high blood pressure and high cholesterol, all of which can lead to heart disease and diabetes.
“We realize that weight is a sensitive subject for many women and that some health care professionals are uncomfortable discussing it, but weight is a risk factor that can be modified. If a woman starts pregnancy at a healthy weight, it can not only lower the risk of preterm birth and birth defects, but can give her baby a healthier start that can have life-long benefits,” said Fleischman.
The March of Dimes recommends that women who are planning a pregnancy should get a preconception health check-up.
During the visit, the health care provider can identify and treat health conditions that can pose a risk in pregnancy, such as high blood pressure, diabetes or certain infections and provide information on nutrition, weight, smoking, drinking alcohol and occupational exposures that can pose pregnancy risks.
Anna Maria Siega-Riz, professor of Epidemiology and Nutrition at the University of North Carolina Gillings School of Global Public Health, said eating nutritious foods, being physically active, and having emotional balance sets the pregnancy off to the best start possible.
For more information, visit marchofdimes.com/overweight.
|
Mid-air collisions between wildlife and military aircraft can lead to costly and potentially fatal accidents, with birds posing the biggest threat to helicopters operated by the U.S. Army, Navy and Air Force, a new study finds.
A team of scientists led by Brian Washburn, a research biologist at the National Wildlife Research Center in Sandusky, Ohio, combed through records from the U.S. Army, Navy, Air Force and Coast Guard from 1979 to 2011 (although information across all years was not necessarily available for each branch of the military, Washburn told Live Science). Washburn and his colleagues found that birds are particularly problematic for military helicopters, which include Apache attack helicopters and huge Chinook vehicles that transport troops, supplies and artillery to and from the battlefield.
The researchers documented 2,511 wildlife strikes across all branches of the military. Whereas the accidental collisions occurred in almost every state, Florida had the highest number of incidents, with 617 recorded wildlife strikes. New Mexico and Georgia followed, with 204 and 192 strikes recorded in the respective states. [Supersonic! The 10 Fastest Military Airplanes]
For 812 of the military's recorded incidents, the type of animal that smashed into the helicopter was also described. Birds were the culprits in 91 percent of the cases, but the species differed according to the type of military service, since the Air Force, Navy, Army and Coast Guard operate their aircraft over different habitats, the researchers said. Other animals that struck military craft were bats.
Air Force helicopters were commonly struck by warblers (16.8 percent) and perching birds (12 percent). Naval vehicles tended to be hit by gulls (18.2 percent), seabirds (14.9 percent), shorebirds (13.4 percent) and raptors and vultures (12.6 percent), according to the study.
Furthermore, almost 42 percent of the recorded wildlife strikes occurred between the months of September and November, making that period the most prevalent for the accidental collisions. The months of December and February were less hazardous, with 10.4 percent of wildlife strikes occurring in those months, the researchers said.
These types of accidents can be costly for the military, with damages that range from $12,000 to $337,000, according to the researchers. In some cases, wildlife strikes can also be fatal for those onboard the helicopter. Based on the military's records, wildlife strikes caused eight injuries — mostly cuts, lacerations or bruising when birds crashed through the windscreen of the aircraft — from 1993 to 2008, and two deaths in the United States so far.
"The two fatalities occurred in 2011 when a red-tailed hawk struck a U.S. Marine Corps 'Super Cobra' at Marine Corps Air Station in Pendleton in California," Washburn told Live Science in an email. "This resulted in a crash — costing the life of the pilot and co-pilot — and the total loss of a $24.5 million aircraft."
Washburn and his colleagues dedicated their study to the Marines who died in the 2011 bird strike.
Within the entire aviation industry, wildlife strikes cost an estimated $1.2 billion worldwide each year, they added.
"Findings from this research are being used by the U.S. Department of Defense to increase the awareness of this issue, mitigate the problem, and increase the safety of pilots and aircrews," Washburn said in a statement.
The findings were published online Feb. 23 in the journal Wildlife Society Bulletin.
|
Flow Control (or a similar mod that adds high-speed pumps) is required. Reactors need a lot of water.
Reactors adds nuclear reactors, uranium and plutonium, along with recipes and technologies to make use of them. Each reactor produces 26 MW, enough to run 50 steam engines or 2 steam turbines (the turbine is a compact shortcut for 25 steam engines, it's no more or less efficient except in terms of space).
Turbines come in two types, base load (primary priority) and peak load (secondary priority).
Atomic Locomotives adds a heavy, powerful locomotive that's filled with plutonium at the factory and needs no further refuelling.
Initially, an inefficient simple fission cycle produces power, marginally-useful byproducts and also waste. Subsequent research provides for reprocessing this waste into byproducts so it can at least be used rather than merely stored. Further research allows recycling of byproducts to fuel, and finally a breeder cycle that can be used (along with fission) to re-enrich processed waste and result in a zero-residue fuel cycle. Or you might deliberately run a surplus of one or more byproducts.
Reactors have a 500-unit fluid tank, and when they are active (with a recipe set) they heat fluid in this tank, which you can use to power steam engines/turbines. Reactors produce up to 26 MW (slightly more than needed to run 50 steam engines or 2 turbines).
Reactors will attempt to maintain an internal temperature of 150°C by increasing/decreasing their power production. Water in the core is heated to a maximum of 100°C, cooling the core in the process. Thus the more hot water you're using, the more power the reactor will have to produce to maintain its temperature. Reactors will not reduce power below 20%.
If a reactor core's temperature rises above 200°C, it will enter emergency shutdown mode. In this mode, power output is set to 0, and will not be enabled again until the core temperature has been reduced to 16°C (through water cooling).
Cooling towers can protect your reactor from overheating. They accept water of any temperature, and output (slightly less) water at 15°C. Using pumps and circuit conditions, you can set up your cooling towers to only activate when the reactor is beginning to overheat (or is in emergency shutdown). I prefer to set mine to activate at 160°C.
IMPORTANT: If your reactor is full of fluid, your cooling towers will not be able to push their cold water back in. For this reason I set my water intake pumps to only turn on if the reactor is <80% full.
All signals are emitted/read from the circuit interface on the front of the reactor.
Reactor core temperature
Reactor coolant temperature - the temperature of the fluid in the heat exchanger
Reactor power output - as a percentage
Reactor shutting down - emitted while the reactor is throttling down after receiving a shutdown command, sending this signal to the reactor has no effect
Reactor overheated - this signal will be output while the reactor is in its emergency shutdown state, sending this signal to the reactor has no effect
Reactor target output (percentage) - Overrides automatic throttle if this signal is greater than zero. Does not remove minimum throttle of 20%. The main use of this signal is to force a reactor to run at max speed for faster production.
Shut down reactor - If the reactor receives this signal it will reduce power to zero and halt operation. It will continue shutting down even if the signal is removed, until its output reaches zero.
A reactor using the fission cycle produces only half as much plutonium (via waste reprocessing) as it needs to re-enrich its fuel. A reactor using the breeder cycle produces twice its own plutonium needs. If you use only basic fission, you will produce large amounts of depleted uranium. If you only use breeders, you will run a slow but steady plutonium surplus.
Note that reactors don't have to be used to produce power - you might find it simpler to produce all your power from basic fission, and have a breeder reactor forced to run at full speed through the attachment of two actively-pumped cooling towers.
Sometimes you may notice your reactor is not outputting water at 100°C. This is due to the order in which pipes, tanks and pumps update their volume and temperature.
To get reliably hot output, make sure your reactor and its pumps are within the same chunk (use the F4 menu to show tile grid, and note the thicker black lines), and build your output pumps (i.e. pumps sending hot water to the engines) before the input pumps (i.e. cold water intake) and reactor.
|
The Codex Theodosianus (Eng. Theodosian Code) was a compilation of the laws of the Roman Empire under the Christian emperors since 312. A commission was established by Theodosius II and his co-emperor Valentinian III on 26 March 429 and the compilation was published by a constitution of 15 February 438. It went into force in the eastern and western parts of the empire on 1 January 439.
On March 26, 429, Emperor Theodosius II announced to the senate of Constantinople his intentions to form a committee to codify all of the laws (leges, singular lex) from the reign of Constantine up to Theodosius II and Valentinian III. Twenty-two scholars, working in two teams, worked for nine years starting in 429 to assemble what was to become the Theodosian Code. The chief overseer of the work was Antiochus Chuzon, a lawyer and a Prefect and Consul from Antioch.
Their product was a collection of 16 books containing more than 2,500 constitutions issued between 313 and 437. John F. Matthews illustrates the importance of Theodosius' Code when he said, "the Theodosian Code was the first occasion since the Twelve Tables on which a Roman government had attempted by public authority to collect and publish its leges." The code covers political, socioeconomic, cultural and religious subjects of the 4th and 5th century in the Roman Empire.
A collection of imperial enactments called the Codex Gregorianus had been written in c. 291-4 and the Codex Hermogenianus, a limited collection of rescripts from c. 295, was published. Theodosius desired to create a code that would provide greater insight into law during the later Empire (321-429). According to Peter Stein, "Theodosius was perturbed at the low state of legal skill in his empire of the East." He apparently started a school of law at Constantinople. In 429 he assigned a commission to collect all imperial constitutions since the time of Constantine. The laws in the code span from 312-438, so by 438 the "volume of imperial law had become unmanageable".
During the process of gathering the vast amount of material, often editors would have multiple copies of the same law. In addition to this, the source material the editors were drawing upon changed over time. Clifford Ando notes that according to Matthews, the editors "displayed a reliance on western provincial sources through the late 4th century and on central, eastern archives thereafter."
After six years an initial version was finished in 435, but it was not published, instead it was improved upon and expanded and finally finished in 438 and taken to the Senate in Rome and Constantinople. Matthews believes that the two attempts are not a result of a failed first attempt, but instead the second attempt shows "reiteration and refinement of the original goals at a new stage in the editorial process." Others have put forth alternate theories to explain the lengthy editorial process and two different commissions. Boudewijn Sirks believes that "the code was compiled from imperial copy books found at Constantinople, Rome, or Ravenna, supplemented by material at a few private collections, and that the delays were caused by such problems as verifying the accuracy of the text and improving the legal coherence of the work."
The Code was written in Latin and referred explicitly to the two capitals of Constantinople (Constantinopolitana) and Rome (Roma). It was also concerned with the imposition of orthodoxy - the Arian controversy was ongoing - within the Christian religion and contains 65 decrees directed at heretics.
Originally, Theodosius had attempted to commission leges generales beginning with Constantine to be used as a supplement for the Codex Gregorianus and the Codex Hermogenianus. He intended to supplement the legal codes with the opinions and writings of ancient Roman Jurists, much like the Digest found later in Justinian's Code. But the task proved to be too great, and in 435 it was decided to concentrate solely on the laws from Constantine to the time of writing. This decision defined the greatest difference between the Theodosian Code and Justinian's later Corpus Juris Civilis.
John F. Matthews observes, "The Theodosian Code does, however, differ from the work of Justinian (except the Novellae), in that it was largely based not on existing juristic writings and collections of texts, but on primary sources that had never before been brought together." Justinian’s Code, published about 100 years later, comprised both ius, "law as an interpretive discipline", and leges, "the primary legislation upon which the interpretation was based." While the first part, or Codex, of Justinian’s Corpus Civilis Juris contained 12 books of constitutions, or imperial laws, the second and third parts, the Digest and the Institutiones, contained the ius of Classical Roman jurists and the Institutes of Gaius.
While the Theodosian Code may seem to lack a personal facet due to the absence of judicial reviews, upon further review the legal code gives insight into Theodosius' motives behind the codification. Lenski quotes Matthews as noting that the "imperial constitutions represented not only prescriptive legal formulas but also descriptive pronouncements of an emperor’s moral and ideological principles."
Apart from clearing up confusion and creating a single, simplified and supercedent code, Theodosius II was also attempting to solidify Christianity as the official religion of the Empire, after it had been decriminalised under Galerius' rule and promoted under Constantine's. In his City of God, St. Augustine praised Theodosius the Great, Theodosius II's grandfather, who shared his faith and devotion to its establishment, as "a Christian ruler whose piety was expressed by the laws he had issued in favor of the Catholic Church."
The Codex Theodosianus, is, for example, explicit in ordering that all actions at law should cease during Holy Week, and the doors of all courts of law be closed during those 15 days (1. ii. tit. viii.).
Books 1-5 lack the level of manuscript support available for books 6-16. The first five books of the surviving Codex draw largely from two other manuscripts. The Turin manuscript, also known as "T," consists of 43, largely discontinuous folios. The second manuscript is the Breviary of Alaric, and a good part of the Breviarium that is included in book 1 actually contains the original text of the respective part of the original codex.
The latter part of the Codex, books 6-16, drew largely from two texts as well. Books 6-8 of the Codex were preserved in the text of a document known as Parsinus 9643. The document circulated early medieval French libraries, as well as the other formative document for the latter part of the code, a document held in the Vatican (Vat. Reg. 886), also known as "V". Scholars consider this section to have been transmitted completely.
- "Codex Theodosianus" in The Oxford Dictionary of Byzantium, Oxford University Press, New York & Oxford, 1991, p. 475. ISBN 0195046528
- LacusCurtius • Roman Law — Theodosian Code (Smith's Dictionary, 1875)
- Lenski, pg. 337-340
- "Antiochus Chuzon" in The Oxford Classical Dictionary. Online edition. Oxford University Press, 2012. Retrieved 15 November 2013.
- Matthews, p. 17
- Matthews, pg. 10-18
- Peter Stein, pp. 37-38
- Susan Martin, p. 510
- Clifford Ando, p. 200
- Michael Alexander, p. 191
- Michael Alexander, p. 191-193
- Cameron, A. (1998) "Education and literary culture" in Cameron, A. and Garnsey, P. (eds.) The Cambridge ancient history: Vol. XIII The late empire, A.D. 337-425. Cambridge: Cambridge University Press, p. 683.
- Tituli Ex Corpore Codici Theodosiani
- Mango, Cyril, (2002) Oxford History of Byzantium. Oxford: Oxford University Press, p. 105
- Matthews, p. 12
- Matthews, pp. 10-12
- Lenski, pg. 331
- Matthew, p. 8
- Matthews, pp. 87
- Matthews, pp. 86
- Clyde Pharr (in collaboration with Theresa S. Davidson and Mary B. Pharr), The Theodosian Code and Novels and the Sirmondian Constitutions, a Translation with a Commentary, Glossary and Bibliography (1952). For a description of how this project was carried out, see Linda Jones Hall, "Clyde Pharr, the Women of Vanderbilt, and the Wyoming Judge: the Story behind the Translation of the Theodosian Code in Mid-Century America, 8 Roman Legal Tradition 1, 3 (2012), available at . See also Timothy Kearley, "Justice Fred Blume and the Translation of Justinian's Code," 99 Law Library Journal 525, 536-545 (2007), available at .
- ACTI. Auxilium in Codices Theodosianum Iustinianumque investigandos, Iole Fargnoli (cur.), LED Edizioni Universitarie, Milano 2009, ISBN 978-88-7916-403-0
- Alexander, Michael C. (Spring 1995). "Review: The Theodosian Code by Jill Harries; Ian Wood". Law and History Review. University of Illinois Press. 13 (1): 190–192. doi:10.2307/743979.
- Buckland, W. W. (1993). A Textbook of Roman Law from Augustus to Justinian. Cambridge: Cambridge University Press. pp. 37–38.
- Lenski, Noel (February–March 2003). "Review: Laying Down the Law. A Study of the Theodosian Code by John Matthews". The Classical Journal. The Classical Association of the Middle West and South, Inc. 98 (3): 337–340.
- Martin, Susan D. (October 1995). "Review: The Theodosian Code by Jill Harries; Ian Wood". The American Journal of Legal History. Temple University. 39 (4): 510–511.
- Matthews, John F. (2000). Laying Down the Law: A Study of the Theodosian Code. New York, NY: Yale University Press.
- Tellegen-Couperus, Olga (1993). A Short History of Roman Law. New York, NY: Routledge. pp. 138–141.
- Codex Theodosianus. Liber V - Le Code Théodosien, Livre V. Texte latin d'après l'édition de Th. Mommsen. Traduction française, introduction et notes. Éd. par Sylvie Crogiez, Pierre Jaillette, Jean-Michel Poinsotte. Turnout, Brepols, 2009 (Codex Theodosianus - Le Code Théodosien (CTH), vol. 5).
- Primary sources:
- Codex Theodosianus (Latin), ancientrome.ru.
- Codex Theodosianus (Latin) Ed. Mommsen, Meyer, & Krueger (Latin). Website upmf-grenoble.fr.
- (in English) A list of imperial laws of 311 until 431 contains summaries of many laws involving religion from the Theodosian code and other sources, in chronological order.
- (in English) Codex Theodosianus XI-7-13; XV-5-1, -12-1; XVI-1-2, -5-1, -5-3, -7-1, -10-4 (on Religion), English translation Oliver J. Thatcher e.a., 1907. Website fordham.edu.
- Secondary sources:
- Codex Theodosianus by George Long in A Dictionary of Greek and Roman Antiquities, John Murray, London, 1875.
- Codex Theodosianus Information on the code and its manuscript tradition on the Bibliotheca legum regni Francorum manuscripta website. A database on Carolingian secular law texts (Karl Ubl, Cologne University, Germany).
|
By Andrew Hawk
In most states, school personnel complete annual training about bullying and bullying prevention. Anyone who has completed one of these trainings knows that students with disabilities are at a higher risk of being bullied.
However, new information released recently in the journal Children & Schools describes the findings of the Technology Harassment Victimization study. This study was conducted by having young people ages 10–20 complete a phone survey. The researchers looked at how students with various disabilities, mental health diagnoses, and special education services experience peer harassment victimization (PHV), with a particular focus on whether they experience it in person, online, or both.
Here are some findings from the study and some strategies that may help if you know a young person who is being bullied.
When compared to all students with disabilities, students with learning disabilities are more likely to experience in-person bullying.
Students with learning disabilities spend most of their time with their age peers. They often visit a special education classroom for small-group instruction for a certain amount of time each day, but they don’t receive one-on-one assistance from a teaching assistant. This is in contrast to students with physical disabilities, who may have a one-on-one teaching assistant or another adult assisting them throughout the day. Students are not likely to engage in acts of bullying while an adult is present.
How to Help
Teach bullying-prevention skills. Give students some direct instruction on what bullying is and how to appropriately respond to it in different settings. For example, on the playground, students may be able to walk away from altercations, but what should they do in the cafeteria? In many elementary school cafeterias, students are not allowed to leave their tables without permission. This causes a problem for a student who needs to avoid bullying but who also does not feel comfortable telling on a peer.
In the cafeteria at my school, we have group and individual tables. While students do not have a choice in where they sit at the group tables, they are allowed to relocate themselves to an individual table. If a student moves to one of these tables, a staff member goes and checks on the student, which brings us to the next point.
Help adults become safe people. Not every student is going to be ready to tell any adult about being bullied. Aside from not wanting to be a tattletale, students may feel embarrassed or may think that the adults around them will not do anything to help the situation.
School personnel often feel frustrated when they receive phone calls from angry parents describing incidents of bullying that were not reported to a staff member. To combat this, find ways to help all staff members become safe people in the eyes of students. How to accomplish this will vary depending on staff members’ jobs and personalities.
In general, students will find staff members more approachable if they have some familiarity with them. You can accomplish this by trying to find creative ways for staff members to spend time with students. This can be a challenge in schools with large student populations. I encourage my lunch and recess supervisors to mingle with students in the course of completing their duties.
Help students build peer relationships. Having even one friend greatly reduces the chances of a student being bullied. If you notice that any students have trouble making friends, consider ways you can assist them. It is also a good idea to reach out to colleagues for ideas.
Students with physical disabilities are at a greater risk of experiencing bullying online than other students with disabilities are.
This finding is in contrast to the past belief that all students are at an equal risk of being bullied online. The “why” is a little more difficult to determine in this case. In my opinion, students with physical disabilities are at a greater risk of being bullied in general. As previously mentioned, the risk factor is decreased for in-person bullying because there are often extra adults present to assist these students. This safeguard is not in place on the internet.
How to Help
Promote digital citizenship. Sometimes it feels like those of us who work with young people are always telling them to behave, be kind, be good. It is easy to become frustrated with having to repeat things that feel like common sense. But we must always keep in mind that we are dealing with the constant impulsiveness of the not-fully-developed adolescent brain. Repeatedly telling students the same information can be tedious, but it also can help students stop and consider their actions in decision-making moments. Remind students to be kind online, conduct digital citizenship activities to promote positive online behavior, and consider giving character education lessons as well.
Check in with students. I am not saying that you have to watch everything a young person does online (though that is a tempting thought). I am just suggesting that you check in with young people. Ask them if there is anything they have been looking at that they can show you. Ask them if everything is okay. Encourage students to come to you if something is bothering them (even if it isn’t about something on the internet).
Get others involved. Find out if your school’s policy covers online interactions outside of school. The policy at my school does. If yours does, get the school involved when problems arise. You can also consider filing complaints with the social networking sites. While they cannot monitor every interaction, many of these sites do have proper use policies in place. It is probably a good idea to keep young people off any site that lacks a proper use policy.
Andrew Hawk has worked in public education for eighteen years. He started as a teaching assistant in a special education classroom. He completed his bachelor’s degree in elementary education at Indiana University East in Richmond, Indiana. Andrew has taught first, second, and fifth grades as a classroom teacher. In 2011, he earned his master’s degree in special education from Western Governor’s University. Andrew has worked as a resource room teacher and also has taught in a self-contained classroom for students on the autism spectrum. In 2017, he earned a master’s degree in educational leadership, also from Western Governor’s University. This is Andrew’s first year as a building principal. He is the principal of an elementary school that houses kindergarten through fifth grades. When Andrew is not preparing for school, he enjoys spending time with this wife and two daughters.
We welcome your comments and suggestions. Share your comments, stories, and ideas below, or contact us. All comments will be approved before posting, and are subject to our comment and privacy policies.
|
It is crucial to encrypt or password protect folders and files on your computer or on flash drives. For example, when you service your computer, you want to be sure that some of the important documents are not compromised in any way. In case you lose your notebook, tablet, USB drive, or external hard disk you want to be sure that important data is always safe. The cost of sensitive information therein can outweigh the cost of the equipment. Here is a quick way to protect the files and directories:
How to Easily Encrypt and Password Protect your Files and Folders
Simply right-click the file or folder you wish to secure and choose add to archive option of your favorite compression software like WinZip, WinRar or 7-Zip. You can choose appropriate encryption options and enter a password when prompted.
Now whenever you access these folders or files, you need to enter the same password that you set while creating the archive. If you choose the Encrypt File Names option as well, you will be asked for password only while opening the archive. You wont be asked for password again and again for opening files or folders inside the archive. If you don’t choose the option, you are required to enter the password for opening every file in the archive. So I would recommend choosing the Encrypt File Names option.
Now that you have your secure archive file created, whenever you wish to secure any file, simply drag and drop the file or directory in the archive and it will be added to archive after you provide the correct password.
You can safely carry these archive files in your mobile media like flash drives, portable hard disk drives, or notebooks without worrying about losing important information.
A Word of Caution Before You Encrypt or Password Protect Any Files and Folders
- There are hacking tools and software utilities that can break into protected files. So use high grade encryption like 256-bit encryption. This will make it nearly impossible for anyone to crack your password.
- If you forget the password all your file data might be lost. There is no way to recover this data unless you recall the password or somehow break into the file. So password protect only those files which are absolutely necessary or have a way to remember your passwords.
- Although your file or folder is password protected it still can be deleted. Always backup all your files, even those protected by passwords.
It is always better to be safe than sorry. So, keeping these words of caution in mind, go ahead and password protect your important data.
|
What is alpha-lipoic acid (ALA)? - the key facts first
Most scientists and researchers now agree that ageing and most civilisation diseases – such as atherosclerosis, cardiovascular disease and stroke (one in two people dies as a result of these!), cancer (one in four dies as a result of cancer; taking bitter apricot kernels could prevent the disease!), diabetes, arthritis, Alzheimer's, respiratory diseases, blood vessel diseases, cystic fibrosis, inflammation, hepatitis, Down’s syndrome and many others – are largely due to cell oxidation, that is, the destruction of our body cells by so-called ‘free radicals’.
One must imagine iron, which begins to rust when left unprotected to the effects of oxygen and water and is gradually destroyed; rust = oxidation! The genetic material (DNA) of each of our body cells is exposed to oxidative attacks by free radicals, and our body cells are gradually destroyed, just like the iron that is consumed by rust.
These are exactly the mechanisms that are reflected in the form of ageing signs, and are those that age our body and lead to the aforementioned diseases! While protective mechanisms such as galvanising, priming and painting are applied to iron, as human beings, we have only one way to protect ourselves from oxidation and thus the destruction and premature ageing of our body: with the help of so-called antioxidants, also called ‘free radical scavengers’, which can only be obtained through diet. So, antioxidants are, for our body cells, what rust protection, primer and paint are for the metal on our car!
Incidentally, scientists have found that human DNA has the potential to reach the age of about 120 years. If one succeeded in stopping cell oxidation, one could live to 120 years old! Of course, antioxidants play a key role as they are the only ones that protect the cells from oxidation!
Can a healthy person really reach 120 years of age?
Our genetic plan, at least, allows for this, and the regular intake of effective antioxidants, such as alpha-lipoic acid (or ALA for short), could make this dream come true!
In the following chapters, read more about one of the most important, if not THE most important, antioxidant, as described by Prof. Dr. Lester Packer, one of the world's leading antioxidant researchers and Professor of Molecular Cell Biology at the renowned Berkeley University. Lipoic acid is one of the most powerful antioxidants known to man. Find out more about the amazing health benefits that Mother Nature provides with the gift of alpha-lipoic acid!
Did you know, that...
· ... most civilisation diseases (cancer, diabetes, Alzheimer's, Parkinson's, etc.) are due to the oxidation of the body cells?
· ... according to scientific findings, humans could become 120 years old if the body cells did not oxidise?
· ... there is one sole means of protection against oxidation (free radicals) of the cells, namely the absorption of so-called antioxidants?
· ... unlike the other antioxidants, alpha-lipoic acid protects our entire body including the brain, which is why it's also called a ‘universal antioxidant’?
· ... in addition, alpha-lipoic acid (ALA) has the ability to regenerate other antioxidants in the fight against voracious free radicals?
· ... alpha-lipoic acid enhances the effects of vitamins like vitamin C, E and coenzyme Q10?
· ... alpha-lipoic acid protects us very successfully against heavy metal contamination and poisoning?
· ... alpha-lipoic acid can be effective against mushroom poisoning?
· ... alpha-lipoic acid very efficiently dissipates radioactivity from our bodies?
· ... alpha-lipoic acid helps to bring sugar into the energy cycle more efficiently, which is of fundamental importance for diabetics, overweight people and athletes?
· ... alpha-lipoic acid protects against diabetes and diabetes-induced nerve damage?
· ... thanks to alpha-lipoic acid, smokers are better protected?
· ... alpha-lipoic acid regenerates, rejuvenates, smoothens wrinkles and even removes acne scars by up to 70-80 %?
· ... alpha-lipoic acid is used therapeutically, for diabetes, liver cirrhosis, heart disease, heavy metal poisoning, skin diseases, opacity of the eye lens, Parkinson's disease and Alzheimer's disease?
· ... our food contains very little alpha-lipoic acid and vegetarians could be especially lacking in it?
· ... you can enhance your diet with alpha-lipoic acid conveniently and inexpensively in the form of nutritional supplements?
You will find all of this in detail in the following chapters, underpinned by the appropriate representative studies.
Alpha-lipoic acid - what exactly is it?
Alpha-lipoic acid was discovered in 1951 when scientists realised that it plays a key role in the transformation of food into energy within our mitochondria (the power plants of our cells). Gradually, research shed light on further advantages of alpha-lipoic acid. Above all, it has emerged that alpha-lipoic acid possesses three abilities, which have been honed to perfection:
a) protection against free radicals (against cell ageing and cell destruction)
b) detoxification of heavy metals, radioactivity and toxins
c) energy conversion
a) Alpha-lipoic acid as protection against free radicals
As mentioned in the preface, free radicals are not only responsible for ageing, but also for many diseases, some of them fatal, including atherosclerosis, cardiovascular diseases, stroke, cancer, arthritis, diabetes, Alzheimer's, respiratory diseases, blood vessel diseases, cystic fibrosis, inflammation, hepatitis, Down’s syndrome and more.
Alpha-lipoic acid, like no other antioxidant, can protect us against these destructive free radicals (oxidants) and has three unique abilities in this regard:
1) Our body consists of aqueous and fatty forms of tissue. In contrast to the other antioxidants (for example, vitamin C is water-soluble and functions merely as a protector of aqueous tissue forms, while vitamin E is fat-soluble and protects the fatty tissue in the body), alpha-lipoic acid is able to penetrate both aqueous and fatty tissues in our body and protect against voracious free radicals. Thus, it protects all tissue forms of our body, which is why it is often referred to as a ‘universal antioxidant’.
2) Alpha-lipoic acid, unlike most other antioxidants, can even pass through the blood-brain barrier and protect our brain cells due to its small molecular size (see also, under ‘Effect’, the study relating to increased intelligence due to alpha-lipoic acid).
3) Furthermore, alpha-lipoic acid can regenerate other antioxidants so that they do not become exhausted in the fight against free radicals.
b) Alpha-lipoic acid detoxifies us from heavy metals and radioactive rays
In studies, alpha-lipoic acid showed it could remove heavy metals, such as amalgam, from the body and counteract radioactivity, as experiments on irradiated children in Chernobyl impressively demonstrated (see ‘Effect’).
c) Alpha-lipoic acid as an energy converter
Alpha-lipoic acid plays a central role in the energy transformation of dietary sugar into energy within the mitochondria. Here, it acts as a coenzyme in numerous energy-transforming enzyme complexes and can convert food sugars (and dietary fats) into energy, a property that should be very interesting, especially for diabetics, slimmers and athletes!
For diabetics, this results in an insulin-saving effect, slimmers do not store as much sugar in the form of body fat, and athletes simply have more power! Alpha-lipoic acid is an endogenous chemical that converts the mitochondria into a powerful antioxidant, provided there is enough lipoic acid in the body.
|
Not a great week if you happen to be a COX-2 drug. Not only do they cause the very thing they were designed not to do, it could be they also cause heart failure.
A study of the COX-2 drug Vioxx (rofecoxib) has found that it may dramatically increase the risk of congestive heart failure, and by an alarming 80 per cent. The good news, if any can be gleaned from such a finding, is that COX patients with normal, healthy hearts had nothing to worry about. In other words, the drug exacerbates a preexisting condition.
The findings were based on a trial among 45,000 elderly patients in Ontario (those Canadians again), half of whom took Vioxx or another pain reliever, while the rest didn’t take any drug therapy.
After a year, researchers discovered that those who took Vioxx had an 80 per cent increased tendency for developing heart failure, while those on ibuprofen saw their risk increase by 40 per cent. Celebrex was the only pain reliever that wasn’t linked to an increased risk.
(Source: Toronto Star, May 28, 2004).
|
Scientists are increasingly interested in what happens when the shampoos, soaps, gels, conditioners, and shampoos we use wash down the drain. Many ingredients in these personal care products are considered emerging contaminants because standard water-treatment plants aren't able to filter out the tens of thousands of chemicals found in popular, everyday products.
The latest culprit? A powerful anti-fungal chemical used in many popular dandruff shampoos. The new study, published in the journal Environmental Toxicology and Chemistry, found that—even in very tiny doses—dandruff-fighting shampoos containing the active ingredient climbazole are throwing off waterway health.
The fungicides killed off algae and impacted the germination rate, stem size, seed production, and leaf color of certain water plants. Scientists classified it as very toxic to important water plants like algae and Lemna, part of the duckweed family, toxic to fish, and harmful to daphnia, small crustaceans that serve as food for many other water creatures.
Scientists are concerned about dandruff-fighting fungicides that remain in water after it's treated and released back into rivers and other waterways, but also its impact on land. The nasty chemicals can stay behind in the solids left behind at water-treatment plants—sewage sludge that's often then sold back to farmers to apply to crop fields.
In soils containing climbazole-laced sewage sludge, crops like turnips and oats suffered damaged growth patterns, even when the anti-fungal chemical was present in only tiny doses.
Read More: Is Your Shampoo Loaded with This Cancer Causer?
But we get it. Nobody wants to deal with those embarrassing flakey hitchikers. So we reached for our trusty copy of The Green Pharmacy Guide to Healing Foods to pinpoint some natural dandruff remedies that will keep your scalp in check without messing with the streams and rivers we love:
Get sugar smart. In The Green Pharmacy Guide to Healing Foods, author and medicinal plant expert James A. Duke suggests cutting added sugars from your diet. In the 1960s, British researchers noticed that people living with seborrheic dermatitis, one cause of dandruff, ate significantly more sugar than people who didn't have it. (There are plenty of other reasons to cut back on hidden, added sugars. Read 11 Weird Things Sugar's Doing to Your Body for more info.)
Try this sweet treatment. A United Arab Emirates study found that honey can halt the itching and scaling of dandruff. Participants diluted raw honey slightly with warm water (9 parts honey to 1 part water) and applied the mixture to their scalps every other day for four weeks. They gently rubbed the honey into the scalp for two to three minutes, leaving the mixture on for three hours, and then rinsed with warm water. The patients' itching and scaling eased up, and—get this additional benefit—they experienced less hair loss, too.
Aim for a proper pH. Your scalp is naturally acidic, but sometimes hair care products and the natural oils in your scalp make it too alkaline. To remedy this, try massaging a few tablespoons of fresh lemon juice into your scalp, and rinse with water. Repeat this once a day until your dandruff is gone. If you're not a citrus fan, apple cider vinegar can have the same acidic effect. Warm the vinegar in the microwave or in a saucepan on the stove, then soak a small towel in it and lay it on your hair for one hour. After that, wash it out well with a mild shampoo.
Get your zinc on. Researchers have discovered that a zinc deficiency can lead to dandruff, so try adding barley, oysters, kidney beans, and other zinc-rich foods to your diet. A side benefit? These will also bolster your immune system heading into flu season.
Try this yogurt trick. An old folk remedy calls for coating your scalp with plain yogurt, then covering it with a towel for 20 minutes before rinsing the yogurt away with warm water. This home remedy is said to ease the itching and flakiness associated with dandruff. We recommend using organic yogurt—you'll bypass pesticides and other nasty ingredients.
|
Sprouts are a commonly consumed food that can come from beans or other plants, like grains, nuts, seeds and vegetables. Although they can come from a variety of different sources, sprouts are all essentially young plants that can be eaten raw or cooked. Bean sprouts are a particularly good source of plant-based protein and contain a variety of vitamins and minerals.
Bean Sprouts Nutrition
Bean shoots nutrition is somewhat complex because there are so many types and each one is different. Many different bean sprouts are popularly consumed, including pinto bean sprouts, mung bean sprouts, soybean sprouts and lentil sprouts. All bean sprouts are generally considered to be nutritious foods. Obviously, bean sprouts nutrition varies between types, but sprouts are typically thought to be more nutritious than unsprouted variants of the same plants, with protein in particular increasing with the germination process.
Since bean sprouts can come in a variety of types (and consequently different shapes and sizes), a standard cup-sized serving can range from as little as 75 grams to more than twice that much at about 200 grams. In general, bean sprouts tend to be low in calories, a good source of plant-based protein and contain a wide range of vitamins and minerals. One hundred grams of one of the most popular types of bean sprouts, mung bean sprouts, contains:
- 6 percent of the recommended daily amount (RDA) of protein
- 7 percent of the RDA of fiber
- 22 percent of the RDA of vitamin C
- 41 percent of the RDA of vitamin K
- 6 percent of the RDA of thiamin (vitamin B1)
- 7 percent of the RDA of riboflavin (vitamin B2)
- 15 percent of the RDA of folate (vitamin B12)
- 5 percent of the RDA of iron
- 5 percent of the RDA of magnesium
- 5 percent of the RDA of phosphorus
- 8 percent of the RDA of copper
- 9 percent of the RDA of manganese
Mung bean sprouts also contain small amounts of vitamin E, niacin (vitamin B3), pantothenic acid (vitamin B5), vitamin B6, calcium, potassium, zinc and selenium. Like all bean sprouts, mung bean sprouts have few calories, with about 30 calories per 100 grams (which is roughly the size of the average cup-sized serving).
Bean Sprouts Pros and Cons
Bean sprouts are extremely nutritious foods that can be easily integrated into all sorts of meals, including salads, sandwiches and stir-fries. These foods are not only rich in nutrients, but contain a variety of healthy antioxidants and fatty acids. Given the variety of beneficial nutrients found in bean sprouts, it should come as no surprise that these foods have been linked to a variety of different health benefits.
For instance, mung bean sprouts have been historically used in China to help with gastrointestinal problems, heat stroke and inflammation (swelling), as well as many other health issues. These beans are thought to have anti-inflammatory, anti-diabetic, anti-tumor and anti-microbial effects. They're also thought to help prevent a variety of different heart problems, as well as diabetes. Other types of bean sprouts, like cow peas and soybean sprouts, have nutrients and antioxidants that have been tied to similar health benefits.
There is one main downside to sprouts. These plants and their seeds have been tied to many different cases of food poisoning. This is because sprouts are essentially all young plants. Since they are grown in humid, wet environments or even directly in water, they can carry disease-causing bacteria when not cooked thoroughly. Fortunately, bean sprouts consumed raw or lightly cooked are most likely to carry such bacteria, so thoroughly cooking them should remove disease-causing microbes.
Safe Consumption of Bean Sprouts
Bean sprouts are consumed around the world and have been for many years. Although you may be most familiar with them from their use in sandwiches, salads or as a garnish, these foods are traditionally used in a variety of cuisines. Bean sprouts are particularly popular in various Chinese, Indian and Korean dishes and are becoming increasingly popular in Brazilian cuisine.
Many types of bean sprouts, especially those involving the fully grown versions, are integrated into hot dishes. These sprouts, which are often sautéed, steamed or blanched, are typically cooked thoroughly. However, the younger the plant, the less likely that it will be cooked as it's already so tender. This means that salads or garnishes involving bean sprouts are more likely to cause health problems.
Like all fruits and vegetables, bean sprouts should be washed prior to eating them raw. However, consuming raw sprouts doesn't remove bacteria like E. coli, Salmonella, Staphylococcus and Listeria. It's bacteria like these that cause the food poisoning associated with bean sprouts. Unfortunately, mung bean sprouts, which are one of the most commonly consumed type of sprout, are often eaten raw or lightly cooked.
Should Everyone Eat Bean Sprouts?
The health benefits of bean sprouts are a part of their wide appear. Although they've been used as a component of Asian foods for a long time, they're increasingly popping up elsewhere. Almost everyone can benefit from eating bean sprouts because they are so nutritious. However, since the conditions used to grow these plants result in an increased likelihood of bacterial contamination, they may not be an ideal food for everyone.
People with compromised immune systems, pregnant women, children and older adults may want to swap bean sprouts for another healthy source of protein and nutrients. You could also choose to remove the seed part of the sprout, as this is the part of the plant that is usually tied to disease outbreaks.
If you're a member of one of these groups and choose to consume bean sprouts, you should always wash them thoroughly, although washing won't remove the bacteria. The Food and Drug Administration recommends always cooking sprouts to reduce the risk of food-related illnesses. You should also avoid eating sprouts that have browned or otherwise changed color.
- Foodsafety.gov: Sprouts: What You Should Know
- National Health Service: Eat Well: Sprouted Seeds Safety Advice
- Food Research International: Glycine max (L.) Merr., Vigna radiata L. and Medicago sativa L. Sprouts: A Natural Source of Bioactive Compounds
- Journal of Food Protection: Salmonella Internalization in Mung Bean Sprouts and Pre- and Postharvest Intervention Methods in a Hydroponic System
- Revista de Nutrição: Total Phenolics and Antioxidant Activity of the Aqueous Extract of Mung Bean Sprout (Vigna radiata L.)
- Food and Drug Administration: Sprout Safety: Letter to Seed Suppliers, Distributors, and Sprouters
- Current Pharmaceutical Design: Total Polyphenols and Bioactivity of Seeds and Sprouts in Several Legumes
- Chemistry Central Journal: A Review of Phytochemistry, Metabolite Changes, and Medicinal Uses of the Common Food Mung Bean and Its Sprouts (Vigna radiata)
- LWT - Food Science and Technology: Impact of Germination on Flour, Protein and Starch Characteristics of Lentil (Lens culinari) and Horsegram (Macrotyloma uniflorum L.) Lines
- International Journal of Food Science and Technology: Dynamic Changes in Phytochemical Composition and Antioxidant Capacity in Green and Black Mung Bean (Vigna radiata) Sprouts
- SELFNutritionData: Beans, Pinto, Mature Seeds, Sprouted, Raw
- SELFNutritionData: Mung Beans, Mature Seeds, Sprouted, Raw
- SELFNutritionData: Lentils, Sprouted, Raw
|
One of the mysteries of the English language finally explained.
A soft conical cap with the top bent forward, worn in ancient times and identified with the Roman cap of liberty.
- ‘In the beginning, she was the sublime leader of liberty with the Phrygian cap recalling not so much antiquity as the French Revolution.’
- ‘The ornate pommel is of Phrygian cap form, made in two parts riveted together at the top.’
- ‘Mithras is portrayed as a young man wearing a Phrygian cap, usually crouched on the back of a bull which he is killing by a thrust to the neck with a short sword.’
- ‘Statues and images have portrayed Marianne as wearing a helmet and at other times the Phrygian bonnet; during the Third Republic, she began to be seen wearing a crown of ripe wheat.’
- ‘One is dressed in a cloak and is interpreted as a German tribesman, whilst the other, wearing a Phrygian cap, trousers or leggings, and a short cloak, is believed to be a Parthian, from the eastern boundaries of the Empire.’
Phrygian cap/ˈfrijēən kap/
Top tips for CV writingRead more
In this article we explore how to impress employers with a spot-on CV.
|
Cortisol is a steroid hormone produced in the adrenal glands in response to stress. The purpose of cortisol is to provide immediate blood glucose to fuel a “fight or flight” encounter. Under short-term stressful events including exercise, cortisol is a friendly hormone that aids your body’s adaption. The negative results from elevated cortisol levels occur under chronically stressful conditions. Because cortisol suppresses the body’s response to insulin in order to increase blood glucose, long-term elevation can lead to various chronic health conditions including weight gain, obesity, and increased risk for Type II Diabetes. Additionally, cortisol increases production and maturity of visceral fat cells which also contain cortisol receptors, compounding its effects. And, because muscle cells receive less glucose when blood levels remain high, appetite and food cravings increase with elevation of cortisol.
Cortisol has many other physiological effects on the body. With elevated levels, digestion is impaired, absorption of nutrients is diminished, and inflammatory bowel conditions are increased. A common name for stress-related IBS is a “nervous stomach.” Due to vascular changes, specifically constriction of blood vessels, chronic suppression of cortisol can also lead to high blood pressure, atherosclerosis, and fertility disruption in males and females. Another culprit to high cortisol levels is inflammation. Therefore, poor diet and lifestyle habits, such as smoking, that increase inflammation can lead to elevated cortisol and a weakened immune system.
Lifestyle strategies to modulate cortisol levels include anti-inflammatory diets, healthy sleep cycles, stress management, moderate exercise, and rhythmic meal timing. The most widely accepted anti-inflammatory diet is the Mediterranean Lifestyle Plan which includes stress-reducing modes of eating such as dining while seated. This plan also reduces trans and saturated fats, refined sugars, and caffeine. Additionally, it promotes healthy fats from fish, avocados, and nuts as well as high fiber intake from fruits, vegetables, and whole grains.
Another dietary modality to lowering cortisol and increasing the body’s ability to utilize stored fat for fuel is intermittent fasting, or implementing a strict rhythm to the timing of meals. Emerging findings from studies of animal models and human subjects suggest that intermittent energy restriction periods of as little as 16 h can improve health indicators and counteract disease processes. The mechanisms involve a metabolic shift to fat metabolism and ketone production, and stimulation of adaptive cellular stress responses that decrease damage from inflammation, a cortisol-raising stress response.
Our human ancestors practiced circadian rhythms naturally as they were limited to natural periods of daylight and darkness. In addition, food supply was not continual. They naturally practiced shortened periods of eating, long periods of fasting, and much more physical labor during the eating phase. Industrialization has brought devastating consequences to our health and epidemic rates of obesity. The advancements of artificial light, modern agriculture, and technology have resulted in disturbed sleep patterns, over-feeding, nutritionally void processed foods, and sedentary lifestyles. Combined, these upregulate stress, inflammation, and weight gain.
Interestingly, circadian rhythms are cellularly mediated. This hints to our body’s need for patterns to include regular periods of activity with eating, and rest with fasting. When this pattern is disturbed by humans sleeping within fewer and eating within longer hours, cellular changes and gene expressions occur which increase the risk of chronic disease. Studies reveal that disruption of the sleep/wake and fasting/feeding cycle while maintaining an isocaloric diet, still reduced glucose tolerance, increased blood pressure, and decreased the satiety hormone leptin.
Major benefits of intermittent fasting include a better adaptive stress response, improved endocrine function with insulin sensitivity, reduction of age-related neurodegenerative disease processes such as Alzheimer’s, reduced risk of cancer, and reduced inflammatory conditions such as cardiovascular disease, arthritis, and asthma. The reduction in inflammatory markers and free-radical production is attributed both to better mitochondrial function and weight loss. Intermittent fasting may also lessen symptoms related to auto-immune disorders.
Healthy recommendations for intermittent dietary practices include not over-restricting without medical supervision. A modified approach suggests 8-12-hour windows for healthy intake and 12-16 hours for fasting. In addition, the diet should be comprised mostly from the anti-inflammatory guidelines in the Mediterranean Lifestyle Plan. Proper nutritional supplementation can be considered to meet the recommended vitamin and mineral values. And, healthy practices such as ample water intake, daily exercise, and 7-8 hours of quality sleep are necessary for optimal outcomes.
|
The name Irish: Árd-Carna "Ardcarn" is derived from Old Irish. Irish: 'Árd' means "height" or "high" (as in "of land"). Irish: 'Carn' broadly refers to natural phenomenon such as a "hill", "mound", "natural stone pile", but also artificial features such as "stone piles", sepulchral monuments, and Megalithic tombs.
A Topographical Dictionary of Ireland (1840) describes Ardcarn thus:
An abbey of Regular canons was founded here, probably in the early part of the 6th century, of which, according to the Annals of the Four Masters, Beaidh died bishop in 523 : its possessions were granted, in the 89th of Elizabeth, to the Provost and Fellows of Trinity College, Dublin. Here was also a Benedictine nunnery, a cell to the abbey of Kilcreunata, in the county Galway ; and at Knockvicar. Knockvicar was a monastery of the third order of Franciscans which at the suppression was granted with other possessions on lease to Richard Kendlemarch. The parish is situated on the shores of Lough Key: it is partly bounded by the Shannon on the east, and comprises 460 statute acres, as applotted under the tithe act.
The land is principally under an improving system of tillage; there is a considerable extent of reclaimable bog, and part of the plains of Boyle is included within the parish, Limestone and freestone of the best description for architectural purposes abound; indications of coal have been discovered on the lands of Ballyfermoyle, the property of W. Mulloy, Esq, where shafts have been sunk, but the operations are discontinued. The Boyle River runs through the parish, and a project is in contemplation to render it navigable from its junction with the Shannon, near Carrick, to Lough Gara. This river is crossed by a bridge at Knockvicar, where its banks are adorned with some pleasing scenery.
Qakport house the seat of the rushforth family since 1880 it was a large manor house with veiws of qakport lake and wood sited in 1,200 acres of land. The Rushforth family came from england in 1880 they were anglo irish with strong unionist and British ideas. The last of the Rushforth family to die was in 1970 Fredrick Rushforth who is buried in the ancestrol plot in Ardcarne church of ireland
Rockingham House, the elegant mansion of Viscount Lorton, is beautifully situated on the south-east side of Lough Key, in a gently undulating and well-wooded demesne of about 2000 statute acres, tastefully laid out in lawns and groves descending to the water's edge: it is of Grecian Ionic architecture, built externally of marble, with a portico of six Ionic columns forming the principal entrance, on each side of which are corresponding pillars ornamenting the facade, and on the north side is a colonnade supported by six Ionic columns: adjoining the house is an extensive orangery, and numerous improvements have been made in the grounds by the present noble proprietor.
Oakport, the seat of W. Mulloy, Esq., is a large edifice in the ancient or Gothic style of architecture, occupying a beautiful situation on the margin of a large expanse of water formed by the Boyle river: the demesne comprises about 1200 statute acres, beautifully wooded, and from the inequality of its surface presents many picturesque and commanding views.
The other seats are Knockvicar, the residence of C. J. Peyton, Esq., and Mount Francis, of W. Lloyd O'Brien, Esq.
Petty sessions are held every Tuesday at Cootehall. That place was formerly called Urtaheera, or O'Mulloy's Hall, and was, early in the 17th century, together with the manor attached to it, the property of William, styled "the Great O'Mulloy"; but in the war of 1641 it came into the possession of the Hon. Chidley Coote, nephew of the first Earl of Mountrath, and from that family took its present name.
The parish is in the diocese of Elphin, and the rectory forms part of the union of Killuken: the tithes amount to £280. The church is an ancient structure, which was enlarged by a grant of £600 from the late Board of First Fruits, and the Ecclesiastical Commissioners have lately granted £234 for its further repair. The glebe-house was built by aid of a gift of £100 and a loan of £300 from the same Board, in 1807: the glebe comprises 20 acres (81,000 m2), subject to a rent of £8.
In the Roman Catholic divisions the parish is also called Crosna, and comprises the parish of Ardcarne and part or that of Tumna, containing two chapels, situated at Cootehall and Crosna.
The parochial free school is supported by Lord Lorton, who built the school house at an expense of £120; and a school for girls is supported by Lady Lorton, and is remarkably well conducted: At Derrygra is a school aided by the Elphin Diocesan Society, to which the bishop gave a house and an acre of ground; and three Sunday schools are held in the parish, two under the patronage of Lady Lorton, and one under that of the Misses Mulloy, of Oakport.
A dispensary is maintained by Lord Lorton for the benefit of his tenantry; and another has been lately established at Cootehall, by the exertions of the Messrs. Mulloy, by whom and the other principal landed proprietors it is supported.
As stated above, the only bishop of the monastic centre whose name is known is Irish: Beo-Aedh "Beaidh" (lit. Aedus Vivus), who died circa 518AD-523AD. Before the 12th century, the territory under the monastery's pastoral care was incorporated into the diocese of Elphin.
Notes and references
- Ardcarn civil parish (Roscommon) on logainm.
- Leitrim-Roscommon Genealogy.
- Ardcarn townland (Roscommon) on logainm.
- Ordnance Survey Ireland, Ardcarn (Roscommon).
- National Monuments Service, Roscommon 2009.
- A topographical dictionary of Ireland 1840, p.43
- Kelly 1909.
- Ó Donnabháin 1828, pp. 180.
- Vatican 2013, pp. 837.
- Ó Donnabháin, Sean (1828). Book of Fenagh, Translation and Copious Notes (PDF). Fenagh, Leitrim, Ireland: Maolmhordha Mac Dubhghoill Uí Raghailligh. Retrieved 20 August 2016.
- Hogan, Edmund (1910). "Onomasticon Goedelicum, locorum et tribuum Hiberniae et Scotiae, An index, with identifications, to the Gaelic names of places and tribes, A". University College Cork, Documents of Ireland. Edmund Hogan, SJ. Retrieved 20 August 2016.
- Ardcarn civil parish (Roscommon) on logainm. "Placenames Database of Ireland (logainm) - Ardcarn civil parish, Roscommon.". Retrieved 22 October 2013.
- Ardcarn townland (Roscommon) on logainm. "Placenames Database of Ireland (logainm) - Ardcarn townland, Roscommon.". Fiontar,. Retrieved 20 August 2016.
- National Monuments Service, Roscommon (2009). "National Monuments in State Care: Ownership & Guardianship, Roscommon" (PDF). National Monuments Service. Retrieved 20 August 2016.
- "Ordnance Survey Ireland, Ardcarn (Roscommon)". Retrieved 20 October 2013.
- Leitrim-Roscommon Genealogy. "Map of the civil parish of Ardcarn". Retrieved 20 October 2013.
|
Speeding: societal vs. individual consequences
The negative road safety outcomes of high speed are evident at an aggregate level. At the level of the individual driver, the risk of an accident is very small; at higher speeds the risk is higher, but still very small. Hence, an individual driver will hardly ever experience the safety consequences of excess speed. More or less the same applies for the environmental effects of speeding. These are also noticeable at an aggregate level, but hardly at the individual level (possibly with the exception of fuel consumption).
Contrary to the disadvantages, the advantages of higher speeds are experienced at the individual level. Individual advantages include just reaching traffic lights while still green, (subjectively) shorter journey times, thrill and enjoyment of speed or speeding.
This contradiction between societal and individual consequences makes persuading drivers of the value of speed management a difficult mission.
|
by Chelsea Myers, Educator, Hilltop Children’s Center
“For children to truly become builders of the future, it’s imperative that they themselves experience classrooms as meaningful communities…our classroom communities must be models of the kind of communities we want our students to nurture throughout their lives.”
-Karen Engels, “What’s Love Got to Do With It?”
“Reflective practice” has a fuzzy, abstract reputation. Even so, it is an invaluable aspect of teaching and learning. For myself, it is the tool that helps me be a responsive, truly helpful educator. It is how we build connections with our students. It is how we give them a sense of belonging, a feeling that they are in a safe place to play, and a knowing that they are valued for exactly who they are. It is how we are able to understand and then extend their learning. All of this is needed for them to be confident, successful learners.
Asking & Answering Questions
It may sound like a no-brainer, but the meat of reflective practice is asking yourself questions. If that doesn’t feel quite natural to you, imagine a three-year old living in your brain constantly asking “Why?”. Implementing a reflective practice means that everything is up for questioning.
- Why am I putting out this activity? What learning goal does it serve? What will attract the children? Repel them?
- Why am I saying “No” to this? What do I need to know/change to make it a “Yes?”
- What helped that transition go so smoothly?
This kind of wondering approach is important when it comes to interrupting our assumptions. In order to respond to our students’ needs, we have to take time to see things through their many perspectives.
“If the child is off-task…maybe the problem is not the child…maybe it’s the task.”
Answering those questions is difficult without relationships with our students and families. Professionally, it can feel like a teeter-totter of demands. On one hand, we spend our days with emotional beings who we love, support, and guide. They ask us for love. On the other, there are many cultural norms that influence our views on teacher/student relationships that ask us for hierarchy and “professionalism.” My own reflective practice inspires a lean towards egalitarian relationships with my students and families. I have found that I can hold the expertise in child development and how my students are doing in the classroom and still apologize when I regret how I handled something or take a new approach when my first attempt flames out. Also, I am modeling to my students how I want them to handle conflict, failure, and growth.
“When basic physical and security needs are met in an accepting environment, children are able to risk growth and experience success. When love and belonging needs are met, the children are able to develop competence and self-acceptance.”
-Nancy Weber, “Patience or Understanding?”
There is an emotional and a research investment needed to build authentic relationships with children and families. We give hugs and we take notes. We play dinosaurs and we schedule conferences. We celebrate birthdays and we observe. We open our hearts and we collect data. Eventually, we create our image of the child and their family. This image leads us back to those questions and we can continue to help them move forward.
All of this requires us to be a bit vulnerable, a bit self-aware, and a lot flexible. There needs to be a willingness to be wrong and a willingness to right that wrong. Reflective practice also asks us to be willing to try something new as well to let go – let go of “we’ve always done it that way,” let go of assumptions, let go of pride.
These moments of risk-taking are when I lean on my co-teachers and colleagues the most. We all have ideas and forgiveness to offer each other. We can also be the ones asking questions to support reflective habits.
Building a Reflective Practice
In breaking down some of the bigger components of my own reflective practice, I hope you have found some jumping off points to deepen your own. Do you see a value in reflective practice? It has been worth it to me because I have seen my understanding of my students and their learning expand. I am better able to respond to their questions, their needs, their interests because of reflective practice. How could it influence your work? How does it already impact your teaching? What else would you add as a component of reflective practice?
|
Driven by desperation, riding in anything they could make seaworthy, they came to South Florida — many to Miami — to start new lives.
A new initiative by HistoryMiami and the Smithsonian’s National Museum of American History is aiming to capture the experiences of both Cuban balseros, or rafters, as well as those of Cuban exiles in general: How they traveled here and what they found upon arrival.
In an event timed to coincide with the 20th anniversary of the 1994 exodus, the two institutions are soliciting contributions to the project from 10 a.m. to 5 p.m. Saturday at HistoryMiami in the Miami-Dade Cultural Center.
Part open house, part space for donations, the organizers are encouraging both physical donations — anything brought on the journey from Cuba to the United States, along with photographs and documents from life in America — as well as individual stories, which will be preserved as oral histories that will be saved at the Smithsonian and may be used in future exhibitions.
The two institutions’ collaboration will produce an exhibit in honor of the 20th anniversary of the balsero crisis, titled, Exiles in South Florida: Collecting Cuban Migration History.
“The journeys of many Cubans to Miami are extraordinary migration stories seldom told within a national context. They provide an avenue to discuss Hispanic and Cuban culture and the migrant experience in the United States,” Steve Velasquez, associate curator at the Smithsonian Institution, said in a statement. “This project allows for the museum to work with Florida partners in documenting how this migration experience has shaped the individual, the community, and the nation.”
HistoryMiami will follow up the exhibit with a 3,000-square-foot exhibitiion in summer 2015 called Operation Pedro Pan. A collaboration with Operation Pedro Pan Group Inc., it will focus on the stories of unaccompanied Cuban minors sent to the United States in the early 1960s.
If you go
Here are several community events tied to the 20th anniversary of the 1994 balsero exodus:
Exiles in South Florida: Collecting Cuban Migration History: HistoryMiami and the Smithsonian Institution invite anyone who fled Cuba to share their stories, photographs and other objects from 10 a.m. to 5 p.m. Saturday at HistoryMiami, 101 W. Flagler St.
Revisiting the Balsero Crisis and Its Aftermath, Twenty Years After: Florida International University’s Cuban Research Institute will host a symposium featuring scholars, artists and others at 2 p.m. Sept. 4 at FIU’s South campus, Graham Center 150, 11200 SW Eighth St.
Guantánamo: Kept At Bay exhibit opening, 6 to 9 p.m. Sept. 10, the Frost Art Museum at Florida International University, 10975 SW 17th St. The exhibit will be on view through Oct. 19.
Guantánamo Public Memory Project: traveling exhibit opening, Sept. 22 at the University of Miami’s College of Arts and Sciences Gallery, 1210 Stanford Dr., Coral Gables. On view through Oct. 31.
|
This one is half-life I know but I cannot figure out how to go through it, it isn't finding the amount so none of the examples my teacher gave me can show how to move things around...any help is appreciated.
The half-life of sulfur-138 is 4 days. After 12 days,a sample of this radioactive material has been reduced to a mass of 0.64g.
a) What is the initial mass?
b) What is the mass after 2 days?
Also if it wouldn't hurt could someone could walk through it, if not then just show all the steps to solve it.
FormulŠ for half-life in exponential decay
Main article: Exponential decay
An exponential decay process can be described by any of the following three equivalent formulae:
Nt = N0e − t / τ Nt = N0e − λt where
You've got , and
- N0 is the initial quantity of the thing that will decay (this quantity may be measured in grams, moles, number of atoms, etc.),
- Nt is the quantity that still remains and has not yet decayed after a time t,
- t1 / 2 is the half-life of the decaying quantity,
- τ is a positive number called the mean lifetime of the decaying quantity,
- λ is a positive number called the decay constant of the decaying quantity.
What's eight times 0.64?
|
Russian marines take on more than 30 obstacles in a course that exceeds 10 kilometers.
Russian Military 30-ton ATV Doing 40 km/h
By the early 1960s, USSR increased need for a more advanced ATV was becoming obvious as the single-unit tracked snow and swamp-going vehicles in operation at that time could not carry payloads in excess of 5 tonnes. To fill the need for such vehicles, a specialized design bureau was established with the task of developing articulated tracked vehicles.Also military vehicle able to operate on USSR northern borders was deemed necessary. In February 1971,first two ATVs,designated DT-LP and DT-L,were produced for the State trials. Three types operational today (DT-10P,DT-20P and DT-30 ATVs) entered service in 1980s.
|
As a responsible pet owner, you want to ensure that your furry friend receives the best possible care. Part of this care involves keeping track of your dog’s medical records, including vaccinations, medications, and treatment histories. In our increasingly digital age, securing and organizing these records through private text has become easier than ever. One effective method is the use of encrypted notes and file sharing.
The Importance of Keeping Medical Records
Before delving into the benefits of encrypted notes and file sharing, let’s emphasize why maintaining your dog’s medical records is crucial.
- Continuity of Care: Accurate medical records ensure that your veterinarian can provide the best care for your dog. They help in diagnosing illnesses, tracking treatment effectiveness, and identifying potential allergies or reactions to medications.
- Emergency Situations: In case of emergencies or when visiting a new veterinarian, having readily accessible medical records can be a lifesaver. This is especially true when your primary veterinarian is unavailable.
- Vaccination Records: For activities like travel, doggy daycares, or boarding, you often need to provide vaccination records. Keeping these documents organized is essential for your dog’s participation in various activities.
- Preventive Care: Regular check-ups and preventive treatments, such as flea and tick control or heartworm prevention, are essential for your dog’s health. Accurate records help you stay on top of these important appointments.
The Role of Encrypted Notes
With the increasing prevalence of digital record-keeping, pet owners can leverage technology to secure their dog’s medical history. Encrypted notes apps and software provide a secure and convenient way to organize this information.
- Security: Encrypted notes offer a higher level of security for sensitive medical information. These apps use encryption algorithms to protect your data from unauthorized access, ensuring that your dog’s health information remains private.
- Organization: Digital notes allow you to organize your dog’s records systematically. You can categorize information by vaccination history, allergies, medications, and more. This structure simplifies record retrieval when needed.
- Accessibility: With encrypted note apps, you can access your dog’s medical records from your smartphone, tablet, or computer, no matter where you are. This accessibility is invaluable during emergencies or when traveling.
- Backup and Recovery: Most encrypted notes applications provide backup options, ensuring that your data is safe even if you lose your device. It’s a layer of protection that paper records can’t offer.
The Benefits of File Sharing
In addition to using encrypted notes, you can further enhance the security and accessibility of your dog’s medical records through file sharing solutions.
- Collaboration: File sharing platforms allow you to share your dog’s records with your veterinarian or other relevant parties securely. This can facilitate discussions and decision-making regarding your pet’s health.
- Emergency Access: In urgent situations, you can grant access to your dog’s medical records to an emergency caregiver. This ensures that they have all the necessary information to provide immediate care.
- Multiple Backups: File sharing often includes automatic cloud backup, providing redundancy to safeguard your dog’s records in case of device loss or failure.
- Remote Consultations: When consulting with a specialist or seeking a second opinion, sharing your dog’s records digitally can streamline the process. This can be invaluable for complex medical cases.
Keeping your dog’s medical records secure and accessible is vital for their well-being. Encrypted notes and file sharing offer modern, practical solutions that not only enhance security but also streamline the management of your dog’s healthcare. This digital approach ensures that your beloved canine companion receives the best possible care throughout their life.
|
The planned Square Kilometre Array telescope, a radio telescope to span two continents, could be instrumental in finding intelligent alien civilisations within our lifetimes, according to Dr Seth Shostak, senior astronomer at the US-based Search for Extra Terrestrial Intelligence (SETI) Institute. Dr Shostak was a speaker at the EU's Innovation Convention in March 2014.
What can Europe contribute to the search for alien civilisations?
‘Europe is building the Square Kilometre Array. The Europeans are already considering the fact that it ought to be outfitted with the right kind of equipment to do searches, and they would be the most sensitive searches ever.
What difference would the Square Kilometre Array make to the search for alien civilisations?
‘To me this is a numbers game, you are looking for something that you think is there, you’re looking for a needle in a haystack. So, instead of going through the haystack with a teaspoon, if you can go through with a shovel then success will happen a lot quicker.’
Can you apply a numerical value to the chances of finding alien civilisations?
Dr Seth Shostak. ©EC
‘Yes you can, it depends on how many societies you think are out there broadcasting signals that are going through our bodies as we stand here in downtown Brussels. Nobody knows the answer to that. Carl Sagan (a NASA astronomer who wrote the book on which the 1997 movie Contact was based) thought a few million, Frank Drake (a pioneer of SETI) says maybe 10 000.
‘If any of those numbers are even approximately correct, then what that implies is that, in order to succeed, you have to look at millions of star systems, millions. So far in the entire history of the search for alien civilisations we’ve looked carefully at only a few thousand, so that’s far short of the mark. It’s very early days, but technology is speeding up the search all the time. The Square Kilometre Array would not only increase the search speed, it would increase the sensitivity, so if there is a needle in that haystack, it will find it more quickly.’
How much will the increased speed and sensitivity of the Square Kilometre Array influence our chances of finding an alien civilisation?
‘Instead of going through the haystack with a teaspoon, if you can go through with a shovel then success will happen a lot quicker.’
Dr Seth Shostak, senior astronomer at SETI
‘Well it depends on how much time they spend doing it, but the Square Kilometre Array obviously has a sensitivity that is 10 to 100 times better than the kind of experiments that have been done before. It’s 10 times the collecting area of Arecibo (a radio telescope located in Puerto Rico). It has receivers that allow it to look at a wide range of the radio dial all at once. The other thing it’ll be able to do is maybe look at a big chunk of the sky at once instead of one star at a time like we used to do at Arecibo. If they can map a big chunk of the sky at once, obviously that’s a good thing, it’s impossible to think of a way in which it’s not better.’
In terms of the percentage improvement, what will it contribute?
‘Well, it’s orders of magnitude, but SETI has been getting better. Compared to what was done in 1960, it has been estimated that today’s experiments are hundreds of trillion times more effective, whatever that number means. But, of course there is this improvement all the time, and that’s why I remain optimistic. If we were still doing the same experiment today that we were doing 20 years ago, I might not be so optimistic.’
Optimistic of what exactly?
‘I’m optimistic that we will find a signal within the lifetime of the people standing around here. I’m optimistic of that, I could be wrong.’
Radio waves from space constantly bombard our planet, and cause the static we can see and hear between TV channels and commercial radio stations. The Square Kilometre Array will span two continents and be the world’s most sensitive telescope listening to these radio waves.
The Square Kilometre Array, located in South Africa and Australia, will consist of three types of sensors which when combined can cover a square kilometre of collecting area, hence its name. This will make it 50 times more sensitive and 10 000 times faster than anything currently in use.
Construction is scheduled to begin in 2016, for initial observations by 2019, and the installation is expected to be up and running by 2024. At the core of the initiative are 11 member countries, while close to 100 organisations from around 20 countries have participated in the design and development of the telescope.
The EU has spent over EUR 15 million on research projects preparing for the Square Kilometre Array, and the initiative is backed by the European Strategy Forum on Research Infrastructures.
It may be that life is lurking out there on other planets. But stuck here on Earth, how can we ever know for sure? A good place to start is by looking for the compounds on other worlds that are known to be the key ingredients of life as we know it.
Twenty-four years ago, Swiss astronomers Michel Mayor and Didier Queloz discovered the first planet orbiting a sun-like star outside our solar system – a milestone recognised by this year’s Nobel prize in physics. Today we know of thousands more ‘exoplanets’, and researchers are now trying to understand when and how they form.
Europe changed dramatically during the Bronze Age, with huge population shifts generally ascribed to the rise of new metal technologies, trading and climate change. But scientists believe that there may have been another reason for this social upheaval – the plague, possibly transported by, or on the back of, newly domesticated horses.
Drugs that activate or block the body’s oxygen-sensing machinery to treat conditions such as anaemia in patients with chronic kidney disease and cancer are being made possible because we now understand the way that cells respond to oxygen deprivation, according to Sir Peter Ratcliffe, one of three winners of this year’s Nobel prize in physiology or medicine.
Newly domesticated horses may have increased the spread of disease.
Sir Peter Ratcliffe on why hypoxia matters.
Dr Michaël Gillon on what's next for exoplanet science.
|
Infographic by the Centers for Disease Control and Prevention
Even if you don’t get any flu-like symptoms after getting the coronavirus vaccine, you are still protected from the virus, Peter Loftus reports for The Wall Street Journal.
“I don’t think someone should correlate the extent of their reactions to the vaccine with protection from infection,” H. Cody Meissner, chief of the pediatric infectious diseases division at Tufts University School of Medicine in Boston, told Loftus. “We know that people who don’t respond to a vaccine in terms of the side effects still are well protected. The vaccines work even if you don’t have fatigue and headache and fever and muscle pain and joint pain.”
At the same time, other experts told Loftus that more research is needed about the side effects of vaccines.
One such study at the University of Pennsylvania found that people who had greater side effects after receiving either the two-dose Pfizer-BioNTech or Moderna vaccine had slightly higher antibody levels. However, all people in the study who got the vaccine had a good immune response, co-author E. John Wherry, director of the Penn Institute for Immunology, told Loftus.
Loftus reports: “A Pfizer spokeswoman said the side effects don’t indicate the level of immunity conferred by its vaccine. It wouldn’t be able to demonstrate such high efficacy, if the only people protected were the ones with symptoms, she said.”
The Cleveland Clinic also offers a short question and answer on this topic, saying that the statistics from the Pfizer and Moderna trials show that a little over half of vaccinated people had no side effects, but were still 94% protected, “so you don’t need to worry if you don’t have any symptoms after your Covid-19 vaccinations.”
Loftus talked to experts about why people’s immune systems react in different ways to a vaccine. They noted that general health, age, gender, and heredity all play a role in how one reacts. He reports that side effects are generally more pronounced after the second dose of two-dose coronavirus vaccines, and people who have had the virus have had more pronounced side effects after the first dose.
|
Newspaper Page Text
The Confederates First Proved Thei
Value in Modern Warfare.
.AVE BEEN GREATLY IMPROVE]
They Were Invented by Captain Ar
thur F. Maury, oi' Virnia
an O1uicer in the C o u
1 erate :A : y.
Te trp co, who se c:Yeets has bcei
ampydenmostrated by the JapalneCs
in their engagements with the Rus
sians in the harbor of Port Arthur
first came into use in the civil war
and was the invention of Capt. Ar
thur F. Maury. of Fredericksburg
Va.. unu ctlicer in the Confederati
army. There was at first much pre
judice against the use of the torpedo
but after a time the idea was acopte<
and the report of the United State,
Secretary of the Navy. made in 1865
showed that the Union cause los
more ships from that source that
from all others combined, the tota
number being fifty-eight.
Capt. Maury evolved the torpedo a
a means of defence of the navigabl
rivers of the Southern States. ;any
especially those of Virginia. Ther
was little means for experimenting
and at tirst his tests were all carries
on with minute charges of powdei
submerged and exploded in a wast
tub of water in a chamber in the
house of a cousin. It was early in
the first year of the war that the first
working experiment was made. It
occurred in the James River at Rich
mond, where the torpedo, a barrel
tilled with ordinary powder, was care
fuily lowered to the bottom. The
contrivance was fired by means of
a trigger, whicia was pulled from a
distance with a lanyard. The hammer
was much like the hammer of the old
army musket, and of course it had te
be raised before the torpedo was
placed in position. The success of
the invention was immediately seen.
A column of water was thrown into
the air twenty feet and it was but a
minute or so before many fish came
to the surface dead. The test was
conducted in the presence of a number
of otficials of the Confederate Govern
ment who, though beforehand they
had been free to express their doubts
as to the success of the invention im
mediately gave it their warmest ap
proval and the mining of the river
was at once begun. These torpedoes
were made to explode by contact.
Floating torpedoes were made in
pairs, connected with a rope 500 feet
long. This rope-or span, as it was
-called-had its purpcse. It was toat
ed on the surface by means of corks,
and the 'torpedoes themselves hung
suspended from it at a depth of twenty
feet. They were kept at that depth
by empty barrels painted a dull color
so as not to be easily discernible.
The idea was to set the ..orpedoes
afloat at the approach of a hostile ves
sel and trust to the span becoming
entangle~d with the hull in such a
way that the torpedoes would be
drawn against the side of the vessel,
where they were to be fired by the
mere tightness of the rope which con
nected them. Several attempts were
made to get these to work, but with
In the natural, development of the
torpedo idea it soon became evident
that submerged powder could not ai
ways be trusted to explode, especially
where there was a chance of contact
with water through triggers and such
contrivances. The electric wire then
was suggested. For some time it was
impossible to get any insulated wire
as there was no factory for its manu
facture except in the North, but at
last an abandoned cable which the
Unionists had endeavored to lay
across the Chesapeake Bay to Fortress
Monroe fell into the hands of the in
ventor. From this standpoint the find
was a providential one. By its aid he
was enabled to mine the mouth of the
James River with electric torpedoes,
and for some time every Federal
vessel that tried to pass was destroy
ed and the entire fleet kept at bay.
The torpedo idea spread to all parts
of the South and it was not long ere
every Southern harbor was mined. In
all waters where Union vesse~s ap
peared beer kegs full of powder were
set afloat having percussion attach
ments supposed to explode on co atact.
Not many of these did the work hoped
for them. Then a Confederate officei
thought out the spar torpedo-i. e., a
torpedo set at the end of a long spax
to be rigged at the bow of a small
boat to be exploded by impact against
a vessel's side. Soon a submarine
boat with' a torpedo attachment was
evolved, but its first attack brught
death to its entire crew, though they
took the Federal steamship Housato
nic to the bottom with them.
When it was seen that the torpedc
was capable of doing great damage.
Capt. Maury was sent to England tc
develop the idea and to keep the Con
federacy posted upon his researches.
Advancement was rapid, and it was
not long ere the Unionists, who at
first denounced the torpedo as a bar
barous engine of war, were fairly
driven to use the same means in theii
own defence The close of the war
found Capt. Maury the acknowledged
head of torpedoilearning of the world,
and by requset of the several Govern
ments he instructed naval otticers of
-Engiand, France, Russia, Holland
and Germany in the use of the new
weanon. All of these countries im
mediately adopted the idea and it has
formed a large part of their defence,
with our own, over since.
The modern torpedo is as unlike
the old affair as can be imagined.
Nowaday we shoot torpedoes into the
water where, by the prcpulsion 01
their own inside mechanism, they
dart through the water toward the
ship attacked. Ingenious attchments
make the torpedo almost sure to gC
in a straight line, and it is not at al:
a difficult matter to hit the object
aimed at. A description of the in
ternal arrangements of a torpedc
would be understood only by the
initiater. so it will not be attempted.
The t.:i edo itself is divided into five
compartment~ s.. At the nose-t he
front of the thing, which would come
trst into c'ntact with the side of s
vsse--is the eharge of 2o0 pounds o1
gun cotton. which is exploded by
impact. Just behind this chamber iu
the air chamber then the buoyance
chamber: and then the engine room.
The propellers are operated with com
nressed air and the radius of eliective
ness is said to be about !.000 yards:
that is to say, the torpeco can be
driven in a straight line that distance
before the compressed air gives out
and the propeller stops.
On somue of the bi; battle ships anc
cruisers thjere are submergea torpedi
tubes fr- ;jf which tis terribie deatL:
engine can be sent out without expos
ureto the enemy. The torpedo boat!
have their tubes on deck and the O r
pedo takes a leap over the side before
striking the water. On some vessels
there is a chain protection that can
be lowered all about the ship and
which catches and holds torpedoes
without exploding them. This chain
is hung from booms at a sutlicient
distance from the ship's side to insure
complete safety. In the hands of 1
ignorant or careless persons the tor
pedo is extremely dangerous, but if
rightly handled there are rearly 1
ever accident.-Talbot Stanley in
CAN E GROWERS' CONVENTION.
Delegates from this State to Attend
the Meeting in Jacksonville.
The State says there has been a
growing interest in the production of ]
sugar cane in this State. Indeed there
is on foot a movement among the i
farmers of South Carolina, Georgia
and Florida to plant cane enough to !
guarantee the operation of a big
refinery at some central point. r
There will be a convention of cane r
growers at Jacksonville on the 6th and J
7th of Nay, and on account of the in
terest in this crop Gov. Heyward has
appointed the following delegates
from South Carolina: t
Abbeville-J. E. Brownlee, Brown
lee: R. Sonly, Abbeville.
Anderson-A. M. Carpenter, Ander- r
son; Prof. J. S. Newman, Clemson e
Aiken-Maj. Harry Hammond,
Beech Island; D. W. Crosland, Ellen- c
Barnwell-L. H. Ulme, Fairfax; S. s
B. Moseley, Barnwell.
Beaufort-Thcs. G. White, Beau
fort; S. C. Cunningham, Beaufort. t
Berkeley-R. R. Lindsay, Pinopolis;
Jno. C. Porcher, Oakley. g
Bamberg-E. T. LaFitte, Denmark; s
F. H. McCrae, Denmark. a
Charleston-Dr. C. U. Shepard 1]
Summerville; E. M. Seabrook, Edisto I
Clarendon-J. E. Tindal, Packs
ville Henry B. Richardson; Marning.
Chester-T. J. Cunn i n g Li a m,
Clowney; J. B. Wylie, Richburg.
Chesterfield-R. M. P e g u e a,
Cheraw; W. A. Evans, Hornsboro.
Cherokee-R. O. Bellinger, Gaffney;
E. H. DeCamp, Gaffney.
Colleton-Campbell Sanders, Rit- e
ters; Norman Blitch, Meggetts.
I)arlington-E. Fuller Howle, Dar
lington, R. F. D.; E. Mclve Williams
Dorchester-W. C. Pearcy, Harley
Ville; J. M. Gavin, St. Georges.
Edgefield-Wm. P. Calhoun, Edge- d
field; Mark Toney, Johnston.
Fairfield-J. G. Mobley, Winnsboro; e
J. G. Wolling; Wolling.
Florence-W. L. Gibson; Winona;
Hartwell M. Ayer, Florence.
Greenville-M. L. Donal d s o n,
Greenville; T. B. Goldsmith, Simpson
Greenwood-J. H. Brooks, Ninety
Six; W. Fraser, Ninety-Six.
Georgetown-S. T. Donald s o *,
Georgetown; Win. C. White, Waverlezy
Hampton--Capt. Jno. Law t o n,
Scotia; A. M. Ruth, Hampton.
Horry-- A. Spivey, Conway; J.
H. Rice, Jr., Conway.
Kershaw-B. H. Boykin, Camden; J
J. Pope Sanders, Boykin. . c
Lancaster-T. K. Cunningha m, o
Lancaster; W. S. Heath, Kershaw. t
Lexington--D. F. Efird, Lexington;f
D. S. Griffith, Columbia.3
Laurens-J. D. W. Watts, Laurens; r
J. H. Wharton, Walterlon.
Marion-R. P. Hamer, Jr., Hamers; t
A. T. Harlee, Hamers.~ I
Marlboro-W. D. Evans, Bennetts- 3
ville; C. F. Moore, Bennettsville.
Newberry -T. C. Poole, Newberry; s
H. C. Moseley, Prosperity.r
Oconee-W. M. Brown, Jocasse; t
IB. R. Moss, Walhalla. s
Orangeburg-J. A. Peterkin, Fort'! a
Motte: J. A. Banks, St. Matthews.
Pckens--D. F. Brantley, Pickens;:
R. F. Smith, Easley.a
Richland-Thos. Taylor, Jr., Co- i
lumbia; Richard Singleton, Acton. v
Spartanburg-T. J. Moore, Moore's; c
. D. Leonard, Spartanburg.t
Saluda-B. L. Caughman, Column- s
bia; R. B. Watson, Ridge Spring. t
Sumter-E. E. Aycock, Wedgefield; t
W. S. Wheelee, Mayesville.
Union-J. T. Douglass, Union, J. t
L. Browning, Sedalia.
Williamsburg--J. Davis Cart e r, t
Leo; F Rhame, Rhames.a
York-S. B. White, Fort Mill: Geo.a
T. Schorb, Yorkville.
Finds His Daughter.
After a search of more than f ortyc
years, J. S. Box, a citizen of Union'E
county, has succeeded in finding hist
long lost daughter, from whom he
was separated when the civil wart
broke out. Mr. Box is a native oft
northwest Alabama, and when the 1
civil strife was declared he came tot
Mississippi and enlisted in the twen. e
ty-sixth infantry of this state, leaving
behind him in the Alabama mountains l
a wife and bright little girl 4 years t
old. While the war was in progresst
the wife died and the child was taken
in charge by a kind-hearted familyt
and cared for. Before the war closed d
the family moved away from the old t
neighborhood, taking the child with
them. Mr. Box searched vainly for 1
some clew as to their whereabouts,
and year after year he continued the i
search without receiving the slightest I
tangible clew. With patience and r
persistence he wrote letters, made
personal inquiries, traveled through t
the counties of north Alabama, and a
few days since he found his daughter,.
now grown to be a mature, micdle- v
aged woman, and happily married. I
living in Cullman county, Alabama.!5
Mr. Box identified his daughter by a
tiny scar on her forehead. Hundredst
of neighbors were called in to partici
pate in the joyous reunion, and the
celebrration was a Lappy event, last-r
ing an entire day.
The Cat Came Back.
A letter from Salt Lake City, Utah,
to the Chicago Tribune says: A cat
belonging to John M. WVest three .I
weeks ago stole a flounder from the
kthntable. West put the animal I
inabgand concealed it under the
seat in a day coach on the San Pedro,
Lcs Angeles and Salt Lake road. The
cat was taken to Calients, Nevada,'
before it was discovered and turned
loose. Friday, week all emaciated.
after a journey of 3:37 miles it appear
ed at the West house and begged for I
'food. .it got it.
The house on Wednesday refused to '
provide for a committee to in vestigate
the charge that Bourke Cockran had 'C
accepted pay for advocating the elec-s
tion of McKinley in 18%t-Cockran 1
having asked for such a committee.
Wild dogs are becomning a nuisance
end danger in the jungles of India.
Even the tiger and panther slink away I
OME HOT FIGHTING
ixteen Hu dred Japanese and Rus
sian Soldiers Killed in Five Days.
.USSIANS FALL BACK IN ORDE]
'o Entrenched Position Which th
J apan&esC Cannot Carry With
out Hard Fighting and
H avy Loss.
A dispatch from Tokio, Japar
inder date of May 1, says: After fly
says of tighting. largely with artillery
he Japanese army under Genera
Euroki. has forced a crossing of the
alu river and Sunday with a gallan
ofantry charge covering a frontag
)f four miles, it drove the Russian
rom Chiutiencheng and the height
n the right bank of the Iho or Aid
iver. which enters the Yalu from th
forth almost opposite Wiju. Th
apanese turned the left fank of tb
tussian position and in the battle c
unday they swept away the new fron
nterpcsed by the Russians to checl
heir onward movement.
The present position of the Japanes
s a dominating one, and they ma:
orce the abandon ment of the defense
rected by the Russians at Antun
.nd other point s lower down the river
eneral Kuroki began the movemen
a Tuesday by ordering a detachmen
f the imperial guards division ti
ize the island of Kurito, which is ii
he Yalu above Wiju and a detach
ent of the Second division to seizi
le island of Kinteito, which is helov
iju. The detachment of the imperia
uards met some resistance, but i
ucceeded in clearing the enemy ul
nd occupied Kurito island. Th
ussians abandoned the island o
Cinteito when attacked by the de
achment of the Second division.
LOSES ON BOTH SIDES.
Another dispatch from Tokio unde
ate of May 2 says: The Japanes
>sses on the Yaiu Sunday were abou
00 killed and wounded. The Rus
ians lost over 28 quick-firing guns
0 officers and $00 men. The Japan
se captured many men. The Rus
ias made two stands. A supple
ental report from General Kuroki
overing Sunday's fighting says: "Th
ussians made two stands. The ene
i's strength included all of the Thin
ivision, two regiment of the Sixtl
ivision, one cavalry brigade, abou
rty quick-firing guns and eight ma
hine guns. We have taken twenty
ight quick-diring guns, many rifles
ouch ammunition, more than twent:
f cers and many non-commissioner
ficers and men as prisoners. I an
aformed that Major Kashtalinsky
ommander of the Third East Siber
tn riules brigade and Lieutenant Gen
ral Zassalltch, commander of the
econd Siberian army corps, wer
-ounded. Our casualties number 701
.nd the Russian loss is more than 80i
WHAT THE RUSSIANS SAY.
A dispatch from St. Petersburi
nder date of May 2, says: The firs
apanese army, under General Kuroki
nsisting of the guards and the Sec
d arid Twelfth divisions, according
oticial and private advices from thi
ont, crossed the Yalu Sunday abou
0 miles, above the mouth of the
iver near Kiulientse, where the rive:
ends abruptly to the eastward. Fo:
ree days less than five thousant
ussians under Generals Sassulitch
isthenko and Kashtalinsky havy
een strung along the Manchurial
ide of the river and have been - har
ssing and impeding the crossing o
e Japanese very successfully, de
pite their hopeless inferiority in mel
On Friday the Japanese who hat
cupiedi the heights near Litzavei
d Khussan, above Antung, were dis
dged and driven back to the rivger
ith considerable loss. They werf
mpelled to dismount their pontoor
ridge in order to 'save it from de
ruction. Saturday a gunboat fio
ila at the mouth of the river and al
e field guns posted on the Coreai
ank opened a bombardment and scat
eed the Russian positions on th4
anchuian border. In two days
ghting the Russians lost two ottieer:
nd five men killed and six officer
nd thirty-six men wounded.
SUFFERED GREAT LOsS.
On the morning of May 1, it be
ame apparent that the bombard
aent of Satuday was preliminary t<
e crossing on Sunday, when thi
apanese opened again with thei:
atteries pouring an intense fire int<
e Russian lines, which caused grea
sses. The Russians had no inten
ion of trying to prevent the Japanesi
rossing, their sole object being to re
ard and emabarass as much as possi
le the crossing. With a compara
ively insignificant force, this having
een accomplished, General Sassulitct
aenaced by the overwhelming force o
e Japanese, retired in perfect or
er to his second position a short dis
ce away, which the Japanese im
aediatey attacked and where fight
ng is now in progress.
The Russians believe that it will re
ire another week to get Genera
~uroki's army completely across ant
eady to advance on the Pekin road.
The fact that the Russians have re
reated to positions back of Turenchen
here there is more fighting, show;
aat they bave built entrenchment:
hich the Japanese are under th<
ecessity of taking before they car
ush on. Consequently continuou!
.ghting and skirmishing will occur
e plan of the Russians being tn
ang on the flanks of the enemy an<
naoy and worry them to the utter
nost. .Nothing really decisive, how
ver, is expected until the Japanesc
,dvance shall encounter the Rtussiai
osition ini the mountain passes o
It is even cot:sidJered possible tha1
he Japanese may be able to turn the
tussian position -there, but all this is
rovided for in General Kuropatkin':
M1a:,y People Hurt.
Charles Schumacher, a candy sales
on of Lancaster, 0., was killed an<
ve other passengers injured in
reck on the Norfolk and Westeri
ear IHayesville Wednesday. Thi
orst. injured are: Mrs. Saran Jessui
f Dkytonl, 0., who sustaincd con
ssion of the brain and will probabl:
le, J. W. Wright, Hutitington, W
a., who was rupturned internall:
ud seiu' injured. The woman's
ach and day coach ran oif into
iding while the train was passin;
ver a switch and they overturned.
Heard Umieruround Noises.
A t llatesburg. S. C.. on Friday sub
erraaru noises like the r~ ar of a dis
at tr-ain were heard by many relia.
le people. There was no shaking ol
HE IS A HERO.
A Colored Man Saves a Little Boa
- from Drowning.
But for the presence of mind of a
negro, Allen Young, the 12-year-ok
son of Mr. and Mrs. C. Young, of 114i
L Campbell street, would have lost hi:
life in the canal back of the Davidsor
Grammar school Friday afternoon.
Allen is a scholar of the Davidsor
Grammar school, and, after school bad
turned out, started home by a narrow
path on the canal bank, in the rear o1
the school. He was trotting aiong
when the wind blew his hat in the
water and he learned forward to pick
a it up. The path is only two or three
feet wide and slants towards the canal
i and as Allen, reached out for hi:
hat slipped and fell in and was born(
t by the swift current to the gates just
a below the point where he fell in.
s John Benyan, a negro nearby, wh(
s was bitching a horse belonging to Mr
. Pierce, saw the lad fall in the wate]
e and at once plunged in after him
e Benyan is a good swimer and in
short while laid Allan on the bani
f unconscious and apparently lifeless
L The negro, with great presence o:
c mind, rolled the boy on the ground
and in that way got part of the water
a out of his body. He then rubbed somt
r camphor on his chest.
Mr. Pierce came up at that time
and carried the boy home to his par
ents, and Dr. C. I. Bryans was sum
moned. Dr. Bryans worked ove
& Allan for about twenty minutes befor
he showed signs of returning c )nsci
i ousness, and he was soon all right
with the exception of the shock and
the quantity of water that he nac
swallowed. His leg was badly bruis
L ed and scratched when he fell in th
If the boy had reached the gates
before being rescued he would un
doubtedly have drowned as he was al
ready. unconscious and could have
made no effort to save himself. Ever
if he had been in full possession of hi:
senses he could hardly have saves
himself for he would not have beer
strong enough to resist the swift cur
rent, tired as he would have been be
fore the gates were reached.
Benyan certainly did a noble deed,
one which deserves unstinted praise
for at the risk of his own life he res
cued that of another. Mr. and Mrs
Young are very grateful to the negr<
and their thanks took a substantia
form, as he was handsomely reward
RROKE OPEN HER LETTERS.
A Too Eager Lover Will Have to ge
In the United States court E. H.
Holland, a young white man living
near Spartanburg, was tried and con
victed on an indictment charging hit:
with breaking open a letter addressed
to another party. Holland did no1
appear in court, the trial being con
ducted in his absence. His accusei
was Miss Shehan, a fair young wo
man, who is said to be an employe o:
one of the cotton mills near Sapar
It seems that Hollaand ws greatly
interested in her love affairs and dic
not like the idea of Miss Shehan re
ceiving letters from an unknown
-source in a bold and masculine hand
writing. He determined to find out
- from whom these missives came and
-their contents. One. day, when hE
calculated that one of these letters
must be due, he called at the post
office for gliss Shehan's mail and one
of the letters he so longed to read was
. handed him by the postmaster. lHe
Sis alleged to have broken the seal and
. gazed upon the contents, which must
have turned his countenance green
with jealous rage. It was a red-hot
love letter, pure and simple, and it
showed very plainly that the writei
-was the favored suitor.
While Miss Shehan was testifying,
Judge Brawley, in order to fmnd a
motive for the alleged crime, asked
the witness whether or not Holland
. was an admirer of hers, and she an
swerd that she did not know. The
judge then asked if they had ever
gone out walking together and if he
had ever said those little meaningless
things young people call love-making.
Here the witness answered, "Yes,
sir." "The other fellow," the man
who wrote the letter, was also present
in the court room and testified that
be had written the letter and duly
stamped and posted it. Sentence will
not be pronounced against Holland
until he is brought into court.
)Why His Marriage was a Failure.
He regarded children as a nuisance.
He did all his courting before mar
He never owned a home of his own.
He never talked over his affairs with
He never had time to go anywhere
with his wife.
Hie doled out money to his wife as
if to a beggar.
He looked down upon his wife as
an inferior being.
He thought of his wife only for
what she could bring to him.
He never dreamed that there were
two sides to marriage.
lie never dreamed that a wife needs
praise or compliments.
lHe had one set of manners for home
and another for society.
Hie paid no attention to his persona]
appearance after marriage.
He married an ideal and was dis
appointed to find is had flaws.
Hie thought his wife should spend
all her time doing housework.
He treated his wife as he would not
have dared to treat another woman.
lHe never dreamed that his wife
needed a vacation, recreation or
He never made concessions to his
wife's judgment, even in unimpor
He thought the marriage vow had
made him his wife's master, instead
of her partner.
lHe took all the little attentions
lavished on him by his wife as his by
"divine right," and not as favors.
lie always carried his business
trobles home with him, instead of
locking them in his store or office
when he closed.
> George Lee Warren and Frank
Warren were sentenced at Yorkville
on Tuesday to ten and five years re
spetively for shooting into a train
last Ja'nuary and wounding Conductor
Ross. George died the first night he
was on the chaingang and Frank
came neary dying. It is suspected
they took poison.
The Virginia Navigation Company's
steamer Pocahontas, plying between
Richmond and Norfolk. was burned
up at Richmond Saturday night. She
BOARD OF EDUCATIO
Appointed by Gov. Heyward on Re,
ommendation of Supt. Martin.
ONE OLD MEMBER RETAINEI
The New Board Is Composed of Wel
Known Educators. Most of
Those Appointed Are
The new members of the Stal
board of education were appointe
last week by Gov. Heyward. TI
State says announcing the above al
pointments Gov. Heyward stated the
in making the selections of membe:
of the board he had given careful cot
sideration to the wishes of Superib
tendent O. B. Martin, the head <
the department of education, in tt
matter of its personnel, with due re
erence to the best interests of ti
public school system of the State.
have deemed this not a matter fC
personal consideration," he said to
reporter, "but a matter of person;
development of the school systen
and for this reason have thought :
wise to give regard to the recommei
dations of the superintendent of edi
cation, 'as I believe that the superi
tendent and the board should work i
perfect harmony with no antagonise
The members of the new board art
Prof. W. K. Tate, of Charleston; Pro
J. E. Boland of Langley; Prof. D. V
Daniel of Clemson college; Prof. A. (
Rembert, Wofford college; Prof. .
R. Banks of Lancaster; Prof. B.
Wells, of Conway; Prof. A. J. Thacl
ston of Orangeburg. Sketches of tI
appointees as given out are as follow
First district, W. K. Tate,
Charleston. Prof. W. K. Tate is
graduate of the Peabody Normal co
lege of Nashville, Tenn.: he has ha
several years' experience as a teach'
in this and other southern State
For several years he has- been princ
pal of the Memminger Normal scho
of Charleston. About 300 young h
dies are in regular attendance upo
this school and many improvemeni
have been made upon the buildir
and in the school during Mr. Tate
administration of its affairs. M
Tate has done successful work i
the State and county summer school
and is held in very high esteem t
the teachers of the State. He is c
the faculty of the Summer School <
the South at Knoxville, Tenn., fi
the coming summer.
Second district, J. E. Boland, Lank
ley. Mr. J. E. Boland is a gradual
of Newberry college and is one of tt
rising young schocl men of the Stat
He has had experience as a teacher <
country schools and is now principi
of the school at Langley, which schoi
is now larger than it has ever bee
before; he increased the attendant
by a house-to-house canvass amon
the mill people. He has made
special study of the peculiar problen
of the schools of the mill distric1
and will make ,a valuable member
the board. His address before th
city superintendents, at their meetin
in Columbia last winter, receive
very favorable comment from those i
attendance because he showed a ver
accurate knowledge of his special cot
ditions and work.
Third district, D. W. Daniel, Clen
son college. Prof D. W. Daniel is af
sociate professor of English in Clen
son college. His experience covers
considerable amount of vauluabl
work in the public schools in bo~t
city and town districts. He 'was prit
cipal of the school at Batesburg hi
tore he was elected at Clemsan; b
has done successful work in the farn
ers' institutes and was much in de
mand in the educational campaig
work during the past summer. Bi
lectures upon "Industrial Education
was one of the principal featureC
the large farmers' institute at Clen
son college last summer.
Fourth district, A. G. Remberi
Prof. A. G. Rembert is one of tb
most useful members of the Wo:
ford faculty. He, too, has been muc
in demand for educational speeche
and summer school work. He is or
of the most active members of th
State Teachers' association and is a
present a member of its executiv
committee. He has worked his wa
up to his present position throug:
successful experience in schools ali
mentary and secondary grades and b~
will also make a very strong and use
ful member of the State board of edt
Fifth district, A. R. Banks, Lat
caster. Mr. A. R. Banks is a vetera:
school man and is at present superir
tendent of the city schools of Lancas
ter. He is a graduate and trustee (
Davidson college and has been engas
ed in public and private school wor:
in the fifth district for several yearn
Col. Banks has had experience as;
member of the State board of educa
tion and is thoroughly identified witi
the school interests, both in this towi
Sixth district, B. J. Wells, Conway
Mr. B. J. Wells is a recent graduat
of the South Carolina college, andi
one of the younger generation of edt
cators who are making themselves fel
in the development of the educationa
system of the State. Mr. Wellsi
superintendent of the Burrcugh
Graded school in the town of Conway
He has been there several years an
has made his impress upon the tow3
and county. His town had alread
voted a special tax and last week the
voted unanimously to issue bonds an
build a new school house. There is
great deal of new life in school wor]
as well as in industrial developmen
in the "Independent Republic c
Horry;" and Mr. Wells will use his ir
1uence as a member of the Stat
board of education to advance thi
Seventh district, A. J. Thackston
Orangeburg. Mr. Thackston has bee1
the superintendent of tbe city school
of Orangeburg for ten years, and be
fore he became superintendent he hai
various experience in school work, be
ginning with public schools in tb
country. He is a graduate of Furmai
university, through which institutio1
he worked his way by teaching coun
try schools. He has made the Or
angeburg schools one of the best sys
tems in the State and is held in th
highest esteem by the Orangeburi
people. He is. a member of the OI
angeburng ccunty board and is thor
oughly identified with the publi
The old board -consisted of W. A
Brown, Marion; H. P. Archer, Char
leston; A. R. Banks, Lancaster; J.]I
McC.iin, Due West; H. T. Cooki
Greenville. G. L. Knight, Granite
ville; J. B. O'Neal Holloway, Elloree
Eskimos Killed Out
All the Eskimos in the Mackenzi
Basin except ten families have beel
killed by measles. Before the epidemi
there were forty or fifty families witl
a total population of nearly two hut
THE REVOLUTIOARY ROLLS. 4
Names of Heroes Who Served Under D
Marion, Sumter and Pickens. I
Names of some of the heroes who
fought under Marion, Sumter and
Pickens as published by the State:
Alex Dove, Capt. Anderson Thomas'
William Downes, Capt. Walters' ]
Hugh Donaldson, Col. Brandon's
d Daniel Donaho.
e John Donaho.
. John Dominck, Col. Waters' regi
s Thomas Dolton.
- Jacob Dominick, Col. Waters regi
)f William Doeby, sergeant.
e John Dods, with Williamson's bri
f- gade near Augusta, 1779; later Col.
e Brandon's regiment.
I James Dodds.
r William Dodd, Brandon's regiment.
a Hugh Dods.
.i James Dobbins, Waters' regiment;
1, Capt. Rosamond's company.
it Fortunatus Dobbs.
- John Dobbs.
1- William Dobey, sergeant, Pickens.
1- Thomas Dalton, Pickens.
n Matthew Dalton, Pickens.
n Jacob Dominick, Col. Waters' regi
: David Donaho.
t. John Donaho.
T. Matthew Donaldson, Capt. Jos.
. Pickens' company.
L. Peter Doney.
f. Allen Dondle.
;- Alexander Donald (and sons).
e James Dondle.
s: Hugh Dondleson. before fall of Char
)f leston under Col. Brandon.
a James Donald, "drayer," Col. Ia
1- ham's legion.
d James Donald, Marion.
r John Donald, Col. Maham.
. Moses Donald, Marion.
i- James Donnam.
1 Matthews Dolson (?)
,- James Doogan.
n Robert Doogan lieutenant.
s Thomas Doogan, captain.
g Peter Dorst, Pickens.
's John Dorch, Sumter.
r. Nathan Dorth, Capt. 1obertson,
n Capt. Craig and Lieut.-Mitchell of
;. Taylor's regimeut.
y William Dorch.
n James Desmond, on ship "Iago de
r Joel Doss.
Jack Doss under Capt. Jos. Pickens
- and Capt. William Strain.
e Jeremiah Dolton, Roebnck's regi
. James Dougherty, Waters regiment.
)f John Dougherty, Capt James Gore.
.l William Dougherty, Pickens.
)l Alex Douglass.
n Hugh Douglass, Capt. John Irwin.
e Jesse Douglass.
g ' John Douglass.
a Joshua Douglass.
s Caleb Doud, waganer.
s William Doud.
f Jacob Dove, Capt. Anderson
g Robert Dowie, porbably Capt. Kirk
d patrick; later quartermaster sergeant
n under Maj. Ross, Bratton's regiment.
y Josiah Downen, Capt. John Wilson;
- was in detachment of Pickens' brigade
under Col. Hayes, was overtaken by
- enemy and struck down.
- Joshua Downer, 001. Leroy Ham
- mond, Pickens.
aJohn Dozer, lost blooded mare in ac
ii John Drafts.
-William Drake, IPickens; probably
- killed; widow, Martha.
e James Draper, Col Brandon.
- Thomas Drayton, lieutenant, 001.
- Maham's cavalry; killed.
ri John Dreenen, ,Capt. Jos. Pickens.
s John Dreenen, captain, Maj. Craw
'ford's regiment of horse.
f Thomas Dreenen.
- William Dreenen, commissary of is-'
sues, detachment of Col. Reed of
, "Pearch Island"; later Capt. Joseph
e Pickens' company.
- De'brix Driggers, South Carolina
1 continental line.
5 Julius Driggers.
e William Driggers, Lieut. Allen,
t Johan Drury, Capt. Benjamin Xil
y Andrew DuBose, captain.
i Daniel DuBose.
e Isaac DuBose, lieutenant, Maham's
- Isaiah DuBose, captian, 0 o 1 .]
- Peter DuBose, captain.1
a Samuel DuBose, adjutant, Col. Mc- 1
- Donald's regiment.
-Jacob Duicket, Pickens.
f Joseph Ducket.
-Jean Baptist DuCoin, armorer, frig
E ate South Carolina.<
.Thomas Dudley, in Granville donn
a ty malitia.
a William Duff, 0ol. Brandon's regi-1
a ment, Capt. Daniel McKay's com
. Jesse Duesto, Capt. John Cressett's
company, Marion's brigade.
5 Anthony Duffield, continental.
-Samuel Duffleld, surgeon mate, c
frigate South Carolina.t
.1 Richard Duggens.
s Thomas Durgan, captain; paid for
service of his brothers, James and
.Robert, deceased; in command of com
i pany stationed on Reedy river in i
177$; was in Pickens' brigade.f
r Major Dukes, Col. Brandon.
r Benjamin Dukes, saddler for Co!- t
i Peter Horry's cavalry..
.Edmund Dukes. -
tRobert Duke, Capt. Goodwin's com- a
fpany, Taylor's regiment.
- Poll Tax Payment.
SAssistant Attorney General Town
send Friday gave the comptroller gen
eral an important opinion on the col
lection of poll taxes and isdisposi- ~
tion in the school fund. The opinion
which explains itself is as follows:
S1. That where a person is prose-r
cuted before a magistrate for non- C
payment of poll tax; the fine collected ~
by the magistrate is paid over by
him with other fines to the county
treasurer and reported to the clerk of
court as a fine.
2. The money so collected by the
magistrate goes into the fines belong
ing to the county, and is not a part of
the poll tax belonging to the school
S3. The county treasurer is not en-b
titled to any costs for swearing out s
the warrant against the defaulting ~
tax payer, nor are any costs to be ,
paid him out of the moneys collected
by the magistrate as fines. He is nots
entitled to be paid fifty cents for is- a
suing execution against the default
ing tax payer, unless the taxes ;andd
such costs are collected and execution c
issued by the treasurer to the sheriff,t
and not through the magistrate.b
a A fight between Greeks and Bul- c
- garians occurred April 25. Twenty /i
iNERALS FROM THIS STATE
Ir. Garlington Will publish Theil
.ikeness on the Confederate Roiji
The State says Mr. J. C. Garlingto
>f Spartanburg, who has charge a
ompilling the Confederate rolls to b
>rinted by the job office of The Stat
ompany, appeared before the Wad
lampton chapter of the Daughters c
he Confederacy Wednesday to con
uilt with them in reference to,. L
ublication and to secure their aid i
vetting photographs of all of the get
rals from South Carolina who fougt
n the Confederate service.
There seems to be considerable cot
roversy as to the men from th
state who actually attained the ran
>f general in the Confederate wa
ome being commissioned who did nc
o into actual command. It is pr
,osed to print the pictures of the gel
rals, from brigadiers up, on the
polls of the regiments. The Daughte
f the Confederacy heartily comment
d the work and promised the loan (
she pictures in the relic room at tb
State house that may be needet
Photographs of nearly all-of the get
rals and colonels have been placed i
:his relic room, but many are poi
ictures and some have faded. It
,roposed to make half-tone cuts c
;hose available, to be used in adore
ng the regimental rolls, scon to b
The list of photographs desired
1s follows: R. H. Anderson, Stephe
D. Lee, Wade Hampton, Benjami
Huger, James B. Kershaw, M. C
Butler, James W. Connor, N. (
Evans, Stephen Elliott; S. R. Gis
Eartin W. Gary. Johnston Hagooc
L. M. Manigault, John S. Preston
as. H. Trapier, C. H. Steven
Kaxcy Gregg, Micah Jenkins, Abae
errin. J. F. Gilmer, Barnard I
Bee, Ellison Capers, Thomas, I
Drayton, John Dunavant, Roswell R
Ripley, Wmn. P. Shingler, J. 1
lillepigue, M. L. Bonham, John Bra
on, John D. Kennedy, T. M. Logai
W. H. Wallace.
It is hoped that if any of tI
riends or relatives of these gallar
eroes have photographs that the
will be sent in. Also that correction
is to rank will be made before th
olls are finally priented. The photo
graphs will be carefully preserved at
returned within 10 days and will b
ised merely to make plates fro
which engravings may be had.
The Wade Hampton chapter a
pointed a committee to cooperate wil
A r. Garlington in getting up the.
pictures and it is hoped that a cop
Af the regiment roll can be made :
rime for the coming reunion in Cha
From time immemorial the que
tion of how late a young man mig]
with propriety and safety stay at ti
house of his sweetheart when callii
n her has been relegated to.the pa
ties in interest, the suitor, the gi
and the parent, with occasional pa
bicipation in the case by the fami
watch dog. The law, however, h
ever until now ventured to take
and In the settlement of such ni,
ssues of social relationship. It ha
f course,- recognized that a man
bouse is his castle, and it has consen
ad from time to time to bear light
2pon the conduct of an irate parez
soward one whom pie regarded as
;respasser. But it has remained fi
1. St. Louis judge- to lay'down a ru
if conduct for all lovelorn callers.
ertain young woman of the mor
sity took umbrage at the manner:j
which her father behaved toward hi
wooer. The young man had in~son
way, not detailed, incurred ti
~nmity of the parent, a by no meai
mcommon happening in the course 4
,rue love, and on one occasion at leai
ae had been ejected by force In a wi
o' wound his physical feelings and 1
fiict great mental suffering upon h
ady love. Whereupon this aggressi'
oung woman haled her father 1
ourt of a complaint of assault, at
he case was heard in all its fullnes
wd at the ckcse the presiding justii
uled that "eleven o'clock at night
ong enough for any bean to stay wit
as sweetheart." Reports of the cal
ius far in hand are deplorably de:
~ient. It does not appear whethi
he St. Louis gallant is by his rulir
riven license to call until 11 o'cloc)
)r is still subject to the despotic ru:
)f the father, who 'retains the vel
,ower. Presumably the court bok
his issue in reserve, and the assum]
ion is that every man calls on hi
,eloved at his own risk, and has abst
utely no rights in the premises afte
.. Of course, the St. Louis court
lecision does not of Itself affect th
,uitors of other cities. But the pre
edent laid down by it will undoub1
dly have an effect upon parents ever3
here the news is carried. It woul
iot be surprising to find a concerte
novement in progress, at the instanc
f the Amalgamated FathersC
retty Girls, to secure the enactmer
if curfew laws covering this partiet
ar point. Nor would it be wonde3
ul if some genius, inspired by thi
ecision, were to mnvent an automs
ic ejector on the alarm clock princ
A writer in the Chicago Tribun
as compiled some very interestin
gues upon the subject of suicidt
e shows that during the last thiu
een years 77,617 people have cost
itted suicide In this country. I
902 fifty cities furnished 2,500 case
f self-destruction, out of a total c
,132 for the entire country. Of th
7,637 suicides in the thirteen-yea
eriod, 57,317 were males and 20,40
males. The greatest ratio of in
rease is among young women unde
wentyfive years of age. There ha
lso been a large irncrease in the nurn
er of children who killed themselves
Ir. Upton's figures are undoubtedl;
liable for the purpose of study an'
mparison, but they are probabl;
duort by many thousands of the acttua
umber of deaths induced by self-in
icted violence or other means. Be
>re the year 1894, says the Tribune
ae method of committing suicid
lost in vogue was by shooting. I:
e later years the poison route to th
ereafter has become the favorite
arbolic acid is the favorite brand o
oison used. Carbolic acid is cheap
ut it produces an extremely painfu
>rt of a death. It is very dif~icul
account for the preference for car
olic, except on the grounds that
urge proportion of those who comnmi'
uicide are "dead broke" and canno1
lord the less painful sorts of poison
'he number of people who hang anc
rown themselves is also on the in
rease, as is the number who throm
emselves before locomotives. NC
ss than 800 have committed suicide
y this latter method in the timc
>vered by the Tribune's statistics,
.nother popular method is that furn
hedl by the gast jet.
The Speaker Was Complimented by
the Minority for Impartiality.
WAS RECEIVED WITH C
e Mr. Wiliams Presents the
tions to the Speaker in a Sleech
Full of Humor and 'm
3 mon Sen
Q The closin ay of the second
session' of the house of thefifty-eighth
congress was made notable by the
. demonstration which was evoked by a -
is resolution offered by Mr. Williams,
k the minority leader, testifying to. the
courtesy and fair and impartial man
ner in which Speaker Cannon had
1 presided over the house. -
e The resolution was not of the per
rs functory kind but was expressive of
t- the kindly feeling which men in the
>f house of all parties entertained to:
ie ward him. In a graceful speech the
lt speaker declared his appreciation of
i the resolution. Many conference re
n ports were agreed to on bills which
>r had been in dispute between the two.
is houses including that on- the bill for
)f the government of the canal zone.
i- The only debate of any importance
e was on the bill providing for the res
toration to the naval academy of'
is three cadets who had been dismissedT
n for hazing, the house voting over
n whelmingly against it.
. When the resolution for adjourn
. ment was presented, Mr. Williams,
, the minority leader, remarked that.:
, wh'le the Democrats personally would
, feel very glad to get back to their.
;, homes they would regret for a long
r time "the non-action of the majority;
. of the house that seems anxious to
. leave the pcst of duty and leave a
. situation bristling with. legislation
. that ought to be considered." " r
- Mr. Payne said that he felt assured
, "that after seven years of uniuter
rupted Republican rule this country.
e will say that every important inter=
it est'has been carefully guarded by the
y Republican party by the legislation f
s those seven years."
5 RESOLUTIONS PRESENTED.
The time was within five' minutes
d of the hour set for adjournment when
i Mr. Williams, amid impressive silence,
was recognized.to present a resolution
expressive of the appreciation of the
} house for the fair and impartial manW
h ner in which the speaker had presid
e ed over that body. The resolution
y refers to the sturdy common sense
in and genial good humor which have
r- been displayed by the speaker
which have induced the membersf,
the-house itself in a degreealmostuu
precedented, in- imitation of him, to ;
it display the same sterling Ameria
characteristIis in their deliberatio s
ie and mvtual dealings."
Mr. Williams said that it waa,.
great thing to be a speaker of the'
house of commons of the American
rrepublic, but that it was a rae~~
Sthing "not to permit the fact of pre.
a motion to that place, one of themoV
aexalted in the world, to turne
head In the slightest degree or de.c
one from the course hitherto pursued,.$
of being ,a plain American citizen
wy~ith extraordinary common sense an
a remarkable fund of that mostchr'
acteristic of all American qulte'4
Sgenial good humor."
>r This ,utterance provokedvoeru<
e applause from both sides of thehos
and the galleries. -Mr. Wilmsa e
nconvulsed the house by rbfering to6a
conversation he once had with the
rspeaker, in the course of .which he
e sad: 'Mr. Speaker, Iwill always
think that you are as fair as I-be~eve<
~you will be." xi
The speaker, he said, reied
S"John, I amgoing to be as fair-asi
can consistently with the exigencies
Sof American politics."
e -FEANNEss HIs CHAltA oTEBISTIC.
0 Mr. Williams declared that ti"
d speaker did himself Injustice we
, he put that limitation upon his stae
e ment, "but" Mr. Williams said,-it
is was characteristic of the -frakes
I and candor of the man to putinth
e limitation." The resolution was a ~
i- animously adopted on a rising eot&'
ir and the speaker was escorted toth
g rostrum amid frantic applause. He
E, was visibly affected when he thanked
e the house for the resoultion, saylg,
that it touclied him more thans h
a could express. He said among other >
s "In the nature of things the con
-tests'on the hustings and in the ha4l
r of the house are spirited and earnesto~
s I would be less than h-irna did Io.
e say that while for the timie b~g
-cooperate with the majority, r
- all the minority has a function to"
- perform almost equal in importance:
to the function of the- majority, and -
it is a matter of gratification no~
e only to me, but as I recolect it at
if the clese of the various congresses of *
t which I have been a member,.that
.when the heat of contest has died -
-away there ever remains respect upon
each side for the other, for the efforts
-of intelligent, patriotic, brave men
-who represent their constituents an- -
cording - to their .respective judg- ,
The speaker at 2:10 adjourned the
e house and' was given one of the grea
et demonstrations oif regard eve r
witnessed in the house of representa
- As to aman the members rose and
i sang "America," the occupants of -tte
s galleries .joining in. Speaker Cannon
f took a position near the lobby door on
the Republican side and the members ...
r filed past and bade him "good-bye"'
) all the while singing, "He's a jiolly
-Good FKellow," with a refrain "So say -
r we all of us," to the tune of
"America;" closing. with "God Be
-With You Till We Meet Again."
-A Little Girl Drowned
The Charleston correspondent. -of
The State says little Katie Belle'
N eeley, the 10-year-old daughter -of
Mr. Nick N'eeley, who lives on the
Hampton place, lost her life by drown
ing in Hampton pond Wednesday
night. She and her father were fish
ing at the time. Before her father
knew it she was struggling- in the
water and before he could get her out
she had drowned. Mr. Neeley recov
ered the body promptly, but all efforts
[to resusciate her failed. The informa
tion that reached the city aboutth
affair is to the effect that the gir
who was of an extremely nervous t
perament, jumped into toe pondo
being startled in some unaccouab
way. She was a handsome child and
a great favorite among her neighbors,'
and her tragic death has caused great
sorrow in that community...
They Are Coming.
State Immigration Commissioner
Watson has placed three German im
migrants. They are farmers and wil
go to the Pee Dee section of the state.
|
Popular Science Monthly/Volume 19/June 1881/Editor's Table
THERE is urgent need for more general and efficient association for popular scientific improvement. In politics, in religion, in philanthropy, in reform, and in the original extension of science, the key of influence and the secret of success are cooperation; and this is the agency to which we must look for the popular cultivation of science. The best form of associative action for the promotion of self-education in science is, undoubtedly, the field club, and we are gratified to observe that these excellent organizations are multiplying and doing admirable work. We called attention some months since to the proceedings of the Ottawa Club, and are glad now to be able to report the successful organization of a similar club in Buffalo. It is an outgrowth of the botany and geology classes in the Central High School of that city. These classes have for several years made excursions into the country surrounding Buffalo, under the direction of their able instructor. Professor Charles Linden. The working Field Club was organized in the spring of 1880, with over forty members, and proved successful from the beginning. Professor Linden, the director, is an ardent student and a skillful instructor, and seems to have imbued the members with much of his own enthusiasm for science. The field meetings have been attended on all occasions by a majority of the members. In order to systematize their work, the club is organized into sections in botany, geology, and entomology, and they are now busy in providing cases to arrange and preserve whatever has been collected in the field. Several members have nearly complete collections of the local flora and of geological specimens representing the formations of the vicinity; the entomological branch, which begins work this spring under the direction of Professor Kellicott, of the State Normal School, will no doubt make rapid progress during the coming season and contribute to the increasing success of the club.
Experience has shown that these organizations are only too often ephemeral, and are generally weakened by the prolonged interruption of winter when the excitement passes off, and they need to be freshly stimulated every spring. But there is interesting winter work as well as summer work in science. The Buffalo club has therefore held its meetings all along during the winter in the spacious library of the Society of Natural Sciences. At these semi-monthly meetings papers have been read before the club, followed by their discussion, and an exhibition of specimens necessary to illustrate all the main points upon which beginners are in relative ignorance. When needed, the calcium light and screen have been used to enhance the interest pf illustration. The meetings have been well attended by the members, their friends, and local scientists; they have been profitable for instruction, and have kept up an unbroken solicitude for the success of the association.
The twelve papers read at the semi-monthly meetings in the past season were published in the Buffalo "Daily Courier," and were well worthy of being laid before the public. We have been favored with the reports, and have read them all with interest. They are, of course, not of equal merit, nor equally relevant to the strict objects of the club; but, as a whole and as a first trial, they are admirable. Perhaps the best of the essays are those on "The Gorge of the Niagara," "Alaska," "The Catskill Mountains," "Coal," and "The Tulip-Tree." As the club grows older, the thought of its members will no doubt be more concentrated upon objects within their immediate field of observation, and these will become the subjects of exposition at the winter meetings. It would be well, indeed, if members would take up lines of observation to be pursued during the summer, with special reference to their discussion at the winter gatherings of the club. By taking notes and reading up on the subject chosen, and doing the literary part at convenient intervals, the work would be deliberately and carefully done, and, while the student carried on his own self-instruction, the club would be a gainer by improving the standard of its winter performances.
The students of Harvard University have been canvassed to ascertain their religious opinions. It has been suspected that this institution, so long the headquarters of Unitarian liberalism, has become pervaded by atheism and agnosticism. But it is now found that the believers in these doctrines are virtually nowhere in this great establishment, and that in fact it is drifting away from rationalistic Unitarianism in the direction of pronounced orthodoxy.
There is a great propensity in this country to count up and see who is ahead. Next to the prime national question, "How many dollars?" the American soul yearns to know "How many votes?" Wherever two or three are gathered together, just before election, they are sure to count noses on the nominations. That there should also be a curiosity to know who is losing, who is gaining, and who leads, in the sphere of religious rivalry, is not surprising, for with our people, next after money-getting and politics, sectarian concernments have the most urgent claims. So the Harvard students were questioned as to their spiritual preferences, with the following results: "College and Law School, 972 men; agnostics, 26; atheists, 7; Baptists, 42; Chinese, 1; Christians, 2; Dutch Reformers, 2; Episcopalians, 275; Hebrews, 10; Lutheran,!; Methodists, 16; nonsectarian, 97; orthodox Congregational, 173; Presbyterians, 27; Quakers, 2; Roman Catholics, 33; Swedenborgians, 20; Unitarians, 214; Universalists, 18; not seen, 6." There has been a great deal of comment and no little congratulation on these unexpected results, but there is one aspect of the matter that we have not seen noticed.
From the point of view of agnosticism there are but two parties in the college, the 26 adherents to that view, and the 940 who do not accept it. The agnostic ground is that religion, in so far as it is supernatural, transcends human intelligence, so that man can really know nothing beyond the phenomenal and the finite. He may imagine much, and believe much, and fancy that he knows, but strictly tested it turns out that his conjectures are not knowledge in the true and proper sense. The position of the agnostic, in short, in regard to other worlds or spheres of existence beyond time, space, and the course of nature, is briefly this: "I know nothing and you know nothing, we neither of us can know anything, and we had better modestly confine our thoughts to the universe which we can know."
Now, as there are only 26 that take this ground, it is only fair to suppose that the other 940 take other and opposite ground; that is, they claim to know in regard to the religious matters of which they profess belief—claim, indeed, that their religious knowledge is the most clear and certain of all their knowledge.
The Harvard agnostic replies: "The condition and course of things in our university do not look like it. Let us test your claim by reference to that religious doctrine which is here regarded as of leading importance. The lowest and most rudimentary form of intelligence undoubtedly relates to numbers. No human beings have ever been found so incapable that they could not count a little, if no more than three or four fingers. At the very dawn of intelligence there must arise a perception of the difference between one object and two or three objects. Knowledge may be said to begin here, and, as it agrees with all experience, it is beyond all other knowledge exact, fundamental, and sure. Now, when you undertake to rise above nature and experience, and pass into the realm beyond, what success have you in the application of your primary numerical ideas? Is the infinite object of worship one, two, three, or twenty? Our students are divided over the question; and the fluctuations that are observed in regard to it do not favor the notion that it rests on real knowledge. The mass of our students are not agnostics. They say they know. But, while 214 of them declare that the Divine Being is a unit, 589 of the rest deny this simple proposition, and say that the Divine Being is three or something like it. Since the third century the Church has been quarreling over the application of the most elementary arithmetic to the object of divine worship, and the swaying of opinion now indicated in Harvard University shows that the question is just as unsettled as ever. But if men can not agree in applying the very first and simplest steps of numeration in the transcendental sphere, can they be said to have any real 'knowledge' of it, and how can they succeed better in the application of higher ideas?"
But our Harvard agnostic pushes the case still further. He can say: "We have among us 275 Episcopalians, who, with the other orthodox students, make up 589 professed Trinitarians. They are not agnostics, because they 'know' about this matter; and they are not Unitarians, because they are certain that hypothesis implies a false application of primary arithmetic in the premises. They reject the idea of unity applied to the Deity as false, and condemn it as wicked, and maintain that the true hypothesis is that of tri-personality, or of three Divine persons in the Godhead. But when any one of the '589' is pushed a little to explain himself, and make his alleged 'knowledge' clear, he says, 'Forbear! it is a great mystery, above poor human reason,' and that we are not required to understand it. But that is rank agnosticism! A mystery is simply that which can not be known. So our Trinitarians, who begin by declaring their 'knowledge' of the Divine nature, when cross-questioned, take a ready refuge in the unknowable."
The great movement of the century to modernize education, and make it conform to the progress of knowledge, is most conspicuously illustrated in England. An old, vigorous, advancing nation, leading in the multifarious work of civilization, and at the same time dominated by conservative habits, and maintaining two ancient, rich, and powerful universities, rooted in the most venerable traditions, England has been well situated for the display of those important changes in which educational progress consists. The tendency of the old universities was to check the growth of thought by a slavish devotion to the learning of antiquity. The spirit of the modern study of nature penetrated them but slowly. Bacon protested against scholastic verbalism, and called men back from the study of words to the study of things. The progress was outside of England's great seats of learning; and, when it had become palpable that they were behind the age and would not do the work demanded, other universities had to be established more in harmony with the state of knowledge. Various institutions were organized, notably the University of London, which accepted more modern standards of scholarship, and gradually recognized the claims of science as a means of education and a basis of university honors. The conflict between ancient and modern studies has continued and is still rife, but there is no doubt as to how the battle is going. We gave an account not long ago of the newly-organized Mason College, in which the comprehensive educational scheme is based upon science, and the old learning is passed by. We observe that another important step is taken in the same direction by the reorganization of Owens College, which is now known as Victoria University. The students of this college have hitherto mostly taken their degrees at the London University. But the right to confer degrees is now granted to the new university, and in drawing up their plans of study the governing body have been guided by the most liberal and enlightened views of education. They have openly repudiated the old superstition that all minds are alike and ought to pursue the same studies, and they proceed, in the language of the Vice-Chancellor, Dr. Greenwood, "upon the fundamental notion that a man of capacity ought to be encouraged to devote himself with a certain amount of concentration to some particular or definite branch of arts or science study." Of course, students can come to Victoria University and take its best degrees without knowing Latin and Greek. There are various courses, and the standard of attainment is to be high and thorough, but Latin and Greek are no longer indispensable to the acquisition of university honors. We have been a long time arriving at the very common-sense view expressed by Mr. Jacob Bright in a discussion on the policy of the university in respect to classics, that "it seemed to him extraordinary if the whole field of science and learning of various kinds apart from Latin and Greek were not enough to form the basis of a sound education."
On Tuesday evening, April 5th, Professor Helmholtz, of the University of Berlin, gave the Faraday Lecture before the Chemical Society at the Royal Institution. As might have been expected, he was greeted by a distinguished audience. Professor Roscoe presided, and, before introducing the eminent German physicist, presented him with the Faraday Medal. The address, notes of which were furnished by Professor Helmholtz to the London press, is reproduced in our pages, and will be carefully read by all interested in chemical physics. It is, perhaps, the most weighty and significant tribute to the genius of Faraday that has yet been made; and at the same time it is itself no slight contribution to physico-chemical theory. It was stated that Faraday, although not a mathematician, had anticipated with great sagacity the results of electro-chemical research by the trained mathematicians of the present generation. Professor Helmholtz's original speculations were thus referred to by Dr. Roscoe: "Upon Faraday's well known law of electrolysis he has founded a new electro-chemical theory which reveals to us chemists conclusions of the utmost importance. He tells us, as the result of the application of the modern theory of electricity to Faraday's great experimental law, that the atom of every chemical element is always united with a definite, unvarying quantity of electricity. Moreover—and this is most important—that this definite amount of electricity attached to each atom stands in close connection with the combining power of the atom which modern chemistry terms quantivalence. For, if the amount of electricity belonging to the monad atom be taken as a unit, then that of the dyad atom is two, of the triad atom, three, and so on. Hence, then, thanks first to Faraday and now to Helmholtz, chemists have now a new and unlooked-for confirmation of one of their most important doctrines from the science of electricity."
|
In this example we are going to compare two date objects in Java programming language. For comparing the date objects we can use after() method of the java.util.Date class. The after() method returns boolean value according to date objects.
In CompareDateAfter class we have defined firstDate object and then we used the Thread.Sleep(1000) method to make thread sleep for 1 second. After one second we have created another object of date class called secondDate. Now in the program we have used after() method to compare the dates.
Here is the full example code of CompareDateAfter class as follows:
FirstDate:=Wed Oct 08 18:01:14 GMT+05:30 2008
SecondDate:=Wed Oct 08 18:01:15 GMT+05:30 2008
Second Date is initialized after First Date
Posted on: October 11, 2008 If you enjoyed this post then why not add us on Google+? Add us to your Circles
|
The last fifteen years of Carl Jung’s life were lived against the backdrop of the Cold War—that time in our global history when most of the nations of the world were aligned either with the “West” or with the “Communist bloc.” Intermittently throughout this time the people of the world held their breath as they watched confrontations between the United States and the Soviet Union heat up. During one such tense time members of the Psychological Club in Zurich asked Jung if he thought there would be an atomic war. Barbara Hannah recalled his reply:
“I think it depends on how many people can stand the tension of the opposites in themselves. If enough can do so, I think the situation will just hold, and we shall be able to creep around innumerable threats and thus avoid the worst catastrophe of all: the final clash of opposites in an atomic war. But if there are not enough and such a war should break out, I am afraid it would inevitably mean the end of our civilization as so many civilizations have ended in the past but on a smaller scale.”
“…I had learned that all the greatest and most important problems of life are fundamentally insoluble…. They can never be solved, but only outgrown.”
Excerpt from 2013 Article in Jungian Center for the Spiritual Sciences: Jung’s Challenge to Us: “Holding the Tension of the Opposites”
Marion Woodman is Jungian analyst from Ontario, Canada, born in 1928. This is a talk from 1991.
|
In this example we are going to make a program in which we will find the session id which was generated by the container.
HttpSession session = request.getSession(); Inside the service method we ask for the session and every thing gets automatically, like the creation of the HttpSession object. There is no need to generate the unique session id. There is no need to make a new Cookie object. Everything happens automatically behind the scenes.
As soon as call the method getSession() of the request object a new object of the session gets created by the container and a unique session id generated to maintain the session. This session id is transmitted back to the response object so that whenever the client makes any request then it should also attach the session id with the requsest object so that the container can identify the session.
The code of the program is given below:
web.xml file for this program:
The output of the program is given below:
Posted on: July 17, 2007 If you enjoyed this post then why not add us on Google+? Add us to your Circles
|
Basic Book Design/Leading
Keep Out of Trouble Rules
- When using book-length lines (65-70 characters per line, including spaces), don't use single-spaced or double-spaced settings. Instead, use "At Least" settings.
- When using book-length lines, use two or three points of leading, e.g., 15 points leading with a 12-point font.
- When using wider lines, e.g., in a letter, use wider leading. Use double-spacing or one-and-a-half spacing.
Leading (pronounced like lead, the metal, not lead, what your dog does when walking you) is the space between lines of text. It's also called spacing, as in single-spaced, double-spaced, etc.
Fonts and leading are referred to as two numbers. E.g., "12/13" or "12 on 13 points" is a 12-point font with 13 points of leading.
Single-spaced can be the same as the font size (called solid), e.g., a 12-point font on 12-point leading. Or it can be the font size plus one point, e.g., a 12-point font on 13 points of leading is single-spaced. Check what your word processor does.
A 12-point font with one-and-a-half spacing is 18 points of leading, or 12/18.
A 12-point font with double spacing is 24 points of leading, or 12/24. Use two or three points of leading. E.g., 11/13, or 12/15. This is easier to read than single-spaced (one point of leading).
More than three points of leading is usually unnecessary. Your book will be longer, increasing printing costs. Readers will have to move their eyes more, and turn more pages.
|
Thursday, June 19, 2014
Baptist Cardiovascular Surgeon William Harris, MD, performed Mississippi’s first endoscopic robotic mitral valve repair surgery at Baptist Medical Center in Jackson, Miss. The first patient elected to have the surgery performed using the da Vinci robot on June 5, 2014.
Unlike traditional open-heart surgery requiring a 10 to 12 inch incision in the chest, robotic endoscopic mitral valve repair only requires five pencil size holes made between the ribs on the right side of the chest to provide access to the heart. Robotic tools allow a magnified, three-dimensional view of the mitral valve and other structures, while dramatically limiting the physical impact to the patient. This results in less pain, faster recovery and fewer post-operative complications for patients.
“The most important benefit offered using the robot is an enhanced ability to visualize the heart valves as well as greatly improved ‘dexterity’ facilitated by the ‘wrists’ of the robotic instruments which mimic (and are controlled by) my hand motions,” added Dr. Harris. “These factors help to contribute to not only the possibility for a more accurate repair of the heart valve but also may actually increase the number of valves that can be repaired rather than replaced. The medical literature has long recognized that patients who have a repaired mitral valve (rather than a replacement) have better long-term outcomes.”
Mitral valve repairs are the most common type of minimally invasive surgery on the heart. The mitral valve controls blood flow through the heart. With each heartbeat, it opens to allow blood to flow into the heart’s main pumping chamber—the left ventricle. When the left ventricle contracts to push blood through the body, the mitral valve then closes to prevent blood from flowing back into the heart toward the lungs. An abnormal or damaged mitral valve cannot completely seal the heart’s left ventricle resulting in poor blood flow. In some cases, a mitral valve can be repaired with surgery that rebuilds the tissue of the “leaky” valve with the help of an artificial band that provides stability.
Click here to view the video interview.
Baptist Medical Center continues to be on the cutting-edge of cardiovascular services. Baptist was the first to perform coronary artery bypass grafting (CABG) and the first private hospital in Mississippi to perform open heart surgery. In 2012, Baptist was the first and is still the only hospital in Jackson, Miss. to perform the transcatheter aortic valve replacement (TAVR) technology case for the treatment of aortic stenosis in selected patients.
ABOUT THE VALVE CENTER AT BAPTIST
The Valve Center at Baptist Cardiovascular Surgery Clinic in Jackson, Miss. brings together a team of experienced cardiovascular surgeons, cardiologists, a nurse practitioner and physicians’ assistant. They offer the most comprehensive care in Mississippi for valvular heart disease. The center is backed with the full resources of Baptist Health Systems, an integrated healthcare delivery system serving Mississippi with a full complement of tertiary services. From its beginnings in 1911, its foundation has been built on a Christian healing ministry. For more information call 601.969.0312 or visit www.mbhs.org/valves.
What can we help you find?close ×
|
The information provided here is meant to give you a general idea about each of the medications listed below. Only the most general side effects are included. Ask your doctor if you need to take any special safety measures. Use each of these medications as recommended by your doctor or according to the instructions provided. If you have further questions about usage or side effects, contact your doctor.
Studies have shown that certain medications can help to ease symptoms of anxiety , depression , and insomnia in people with PTSD. More research is being done on drugs that target the biological changes of PTSD.
Common names include:
SSRIs affect the concentration of serotonin, a neurotransmitter. This is a brain chemical that plays a role in depression and anxiety. SSRIs have been used to treat depression and anxiety. They are often considered the first-line medication to treat PTSD. Paroxetine and Sertraline have been approved by the FDA to treat PTSD. Improvement is usually seen in four to six weeks after beginning treatment.
Possible side effects include:
Common names include:
Alpha and beta-blockers are heart medications that treat blood pressure. They are sometimes used to treat symptoms of anxiety like sweating and trembling. Prazosin has also been effective for treating nightmares associated with PTSD. Possible side effects include:
- Cold hands
- Low blood pressure
The following medications have shown some benefit for those with PTSD:
- Venlafaxine (a selective norandrenergic reputake inhibitor)
- Risperidone (an antipsychotic medication)
If medication is helpful, most people with acute PTSD (less than 3 months) will continue to take it for 6-12 months. People with chronic PTSD usually take medication from 12-24 months. They are slowly taken off medication. If symptoms return after medication is stopped, your doctor may recommend that you resume taking the medication for a longer period of time.
If your child is taking medication, follow these general guidelines:
- Give your child the medication as directed. Do not change the amount or schedule.
- Use the measuring device that came with the medication. If you need to use a spoon, cup, or syringe, make sure it has the units that match your child’s prescription. For example, if the medication is given in milliliters (mL), the device should have mL on it.
- Ask what side effects could occur. Report them to your child’s doctor.
- Talk to your child’s doctor before stopping any prescription medication.
- Plan ahead for refills if your child needs them.
- Do not share your child’s prescription medication with anyone.
Contact your doctor if:
- You have any side effects that bother you
- You feel that you are not getting results from your medications after the normal “waiting period”
- You have further questions about usage or side effects
Call for emergency help if you have any thoughts of self-injury or suicide
- Reviewer: Adrian Preda, MD
- Review Date: 12/2015 -
- Update Date: 12/20/2014 -
|
Very basically membrane theory is related to string theory. It is the idea of a possible way of explaining how the the 4 forces ( gravity, electromagnetism, strong and weak forces) in the universe might be unified.
One key feature of Membrane theory is related to something called Membrane (brane) cosmology. Our universe basically is part of a 'bulk' of branes (ie an infinite kind of membrane bulk). Gravity is the difficult one to unify into the others. The thought is that gravity is a force that 'leaks' through all the bulk and so appears quite weak in our universe.
In this theory it is thought that the Big Bang is the result of two branes touching each other producing the laws of nature and constants we see around us.
An advantage with this approach is that it can be tested with experiments to determine if the strength of gravity for example gets stronger at sub millimetre scales.
|
Numerous studies have linked nutritional factors with a risk for developing several types of cancer, and as a risk for recurrence and likelihood of survival when someone has developed cancer. The cancers most strongly associated with nutritional factors include cancer of the breast, prostate, colon and rectum, oral cavity, lung, endometrium, and cervix.
Nutritional factors include:
- Relative body weight
- Essential nutrients, including protein, vitamins, and minerals
- Other compounds in foods that are not nutrients but have biological effects
Scientists agree that current evidence supports the following basic nutritional guidelines, as summarized by the American Cancer Society:
Achieve and maintain a healthy weight throughout life
- Be as lean as possible throughout life, without being underweight.
- Avoid excessive weight gain at all ages. For those who are overweight or obese, losing even a small amount of weight has health benefits and is a good place to start.
- Get regular physical activity and limit intake of high-calorie food and drinks as keys to help maintain a healthy weight.
Adopt a physically active lifestyle
- Adults: Get at least 150 minutes of moderate activity or 75 minutes of vigorous physical activity each week, preferably spread throughout the week.
- Children and teens: Get at least one hour of moderate or vigorous physical activity each day, with vigorous activity on at least 5 days a week.
- Limit sedentary behavior such as sitting, lying down, watching TV, and other forms of screen-based entertainment.
Eat a healthy diet, with an emphasis on plant sources
- Choose food and drinks in amounts that achieve and maintain a healthy weight.
- Limit how much processed meat and red meat you eat.
- Eat at least 2.5 cups of vegetables and fruits each day.
- Choose whole grains instead of refined grains.
- If you drink alcohol, consume no more than 1 drink per day for women and 2 drinks per day for men.
|
At the close of the UN Climate Change Conference in Durban (COP17), government delegates from around the world agreed to adopt a universal legal agreement on climate change known as the “Durban Platform,” with implementation to begin as soon as possible but no later than 2015. Work on this future agreement will begin immediately under a new group called the Ad Hoc Working Group on the Durban Platform for Enhanced Action.
Leaders also agreed on a second commitment period of the Kyoto Protocol, to begin January 1, 2013. 35 industrialized countries that are Parties to this second period will turn their economy-wide targets into quantified emission limitation or reduction objectives and submit them for review by May 1, 2012. The Durban agreement includes the launch of the Green Climate Fund as well as the establishment of an Adaptation Committee and a Technology Mechanism, which are to become fully operational in 2012.
At the conclusion of the conference, the UNFCCC Executive Secretary Christiana Figueres stated, “While it is clear that these deadlines must be met, countries, citizens and businesses who have been behind the rising global wave of climate action can now push ahead confidently, knowing that Durban has lit up a broader highway to a low-emission, climate resilient future.”
The decision to move toward a unified system, with all countries having some form of legal commitments, offers an opportunity for the US to play a more participatory and constructive role in the future.
However, the climate deal in Durban is not ambitious enough to prevent the severe impacts of climate change on health, nutrition security, and human well being. The objective of keeping the rise in global average temperatures below 2ºC would be only achievable if there is an immediate and drastic reduction of emissions; currently, a 3-4ºC rise appears to be the most likely outcome. This will have a significant negative impact on health and nutrition security around the world. We need to act.
PHI’s Center for Public Health and Climate Change actively participated at the COP17, providing background papers, organizing events and raising awareness of the urgency to ensure that health, nutrition security, gender and risk reduction issues are properly addressed in the climate negotiations.
The Center partnered with the World Food Programme (WFP), the UN Standing Committee on Nutrition (UNSCN) and Action Against Hunger (ACF) to co-sponsor a high level event, “Nutrition and Climate Change: Making the Connection to Enhance Livelihood Resilience, Health and Women’s Empowerment,” where we launched the paper,“Enhancing women’s leadership to address the challenges of climate change on nutrition security and health” (produced by PHI, WFP, UNSCN and ACF). This paper was widely distributed at the COP17 including to the UNFCCC executive secretary Figueres; the chair of the Intergovernmental Panel for Climate Change (IPCC) Rajendra Pachauri; and the president of the COP17 Maite Nkoana-Mashabane.
The Center also contributed to the panel on co-benefits at the first global Climate and Health Summit, at which 30 leading health NGOs and organizations from around the world including PHI co-signed and released a Declaration and a Global Call to Actioncalling for “bold and substantive action to reduce global greenhouse gas emissions in order to protect and promote public health.” Read more about the Summit.
In addition, the Center participated at the WEDO/CARE event “Addressing the gender dimension of vulnerability: An adaptation framework that works for everyone,” contributing to a round table discussion on the complexities of health and nutrition, and wasinterviewed by CC TV as part of COP17’s Gender Day.
A PHI statement released at the start of COP17 urged nations to collaborate and to give greater attention to health in the COP17 negotiations. Read more about the Center’s activities in Durban..
While the Durban climate conference has avoided total failure and faster catastrophic destruction of the planet, the decisions adopted there fall well short of what is needed to protect human health and the most vulnerable communities at home and worldwide. Now it is up to us to work together across sectors to promote the co-benefits for climate, health and equity of sustainable development, sustainable production, sustainable consumption and waste reduction.
Education, global solidarity, and an embrace of our responsibility as citizens of the world are the only ways to create a climate for health.
|
Researchers claim to have calculated for the first time, the upper safe limit of vitamin D levels, above which the associated risk for cardiovascular events or death raises significantly, according to a recent study accepted for publication in The Endocrine Society's Journal of Clinical Endocrinology & Metabolism (JCEM).
There is increasing evidence that vitamin D plays a pivotal role in human physiology. Vitamin D deficiency has been linked to cardiovascular events and mortality, but previous studies have found supplementation fails to decrease mortality or cardiovascular events, while other studies found only minor positive effects.
"The unpredictable results from previous studies may be due to the misconception that 'the higher the better,'" said Yosef Dror, PhD, of Hebrew University in Rehovot, Israel, and lead author of the study. "Although our study did not directly test the impact of vitamin D supplementation, we believe our results suggest it may be possible that only moderate supplementation within a narrow range of serum calcidiol (the main vitamin D fraction in the blood) will be associated with the most positive results."
Researchers conducted a study of 422,000 people aged 45 years or older, who underwent vitamin D blood assays. They found for the first time that the safe range of vitamin D levels with respect to coronary morbidity lies between 20 to 36 ng/mL. Vitamin D levels below and above this range adjusted rates of increased mortality and morbidity significantly.
More than 60 percent of the tested population had insufficient blood levels of vitamin D. Half of these subjects had severely low vitamin D levels which was associated with a 1.5 times increased risk of acute coronary morbidity or mortality. Three percent of those tested had elevated vitamin D levels above 36 ng/mL, which was associated with a 1.13 times elevated risk of coronary morbidity or death.
"Supplementing the entire population may jeopardize those found within the upper-normal range, shifting them to levels that are beyond the range associated with the lowest morbidity rates," said Dror. "Although we could not assess the impact of Vitamin D supplementation, our results may suggest that such supplementation to increase vitamin D blood levels, with strict monitoring to avoid overload, may have a significant influence on public health. This hypothesis still needs to be assessed in intervention trials."
Explore further: Vitamin D deficiency common in cancer patients
The article, "Vitamin D Levels for Preventing Acute Coronary Syndrome and Mortality: Evidence of a Non-Linear Association," appears in the May 2013 issue of JCEM.
|
From Wikibooks, open books for an open world
- Introduction to the course
- The Alphabet — Pronunciation of the Mongolian alphabet
- Before You Begin — Simple grammar points
- Greetings, Introductions, Goodbyes
- Classroom Orientation
- General terms
Mongolian Language Related Wiki
|Turkic: Azerbaijani | Turkish | Turkmen | Uzbek|
|Buyeo: * Japanese* | Korean*|
|*The inclusion of Japanese and Korean in Altaic
and the existence of Buyeo is controversial.
See Altaic languages for more information on this dispute.
|
On December 5, 1967, two battalions of Viet Cong systematically killed 252 civilians in a "vengeance" attack on the hamlet of Đắk Sơn, home to over 2,000 Montagnards, known for their fierce opposition to the Viet Cong. The Vietcong believed that the hamlet had at one point given aid to refugees fleeing Viet Cong forces.
Over 600 troops marched into the village, using flamethrowers to destroy the shelters and kill the men, women, and children who lived there. As the Viet Cong fired their weapons, people were incinerated inside their own homes, and some who had managed to escape into foxholes in their homes died of smoke inhalation. The homes that were not destroyed by flamethrowers were destroyed with grenades, and on the way out patches of the main town were set afire. Just before they left the village, the Viet Cong shot 60 of the 160 survivors. Most of the remaining villagers were taken hostage.
|
Sporting shiny black wings with white spots and long black-and-white banded antennae, the Asian longhorned beetle could be coming soon to trees in your neighborhood. Imported accidentally from China in wood packing material, it has been found by vigilant members of the public in Illinois, New York, New Jersey and Massachusetts. The beetle is about 1 - 1 ½ inches long and is most likely to be spotted in summer to early fall. Often it even has blue feet.
Image courtesy of Melody Keena, USDA Forest Service, Bugwood.org
The female adults lay their eggs in oval depressions chewed into the bark of host trees. Although they favor maples, they also choose birch, willow, elm, locust, horsechestnut and several other types of trees. When the eggs hatch the larvae burrow under the bark and eventually kill the tree by eating the tissues that conduct water and nutrients from the roots and leaves of the tree.
Photo courtesy of Thomas B. Denholm, New Jersey Department of Agriculture, Bugwood.org
Other telltale signs of Asian longhorned beetle activity are the exit holes where the new adults chew their way out of the tree. The exit holes are round and greater than ¼ inch in diameter, or about the size of a pencil eraser. As the beetle chews, it pushes out sawdust. The sawdust collects at the base of the tree when infestations are heavy.
Photo courtesy of Dennis Haugen, USDA Forest Service, Bugwood.org
There are a two other beetles native to the eastern United States that could be confused with the Asian longhorned beetle. The cottonwood borer is about the same size as the Asian longhorned beetle, but its antennae are all black and the white marks on its body form stripes rather than distinct spots. The white spotted pine sawyer feeds on dying or dead conifer trees. The female white spotted sawyer looks most like the Asian longhorned beetle. Its antennae are faintly banded with gray rather than white and the body has small patches of white rather than distinct spots.
So far more than 7,000 trees have been cut down in New York and Illinois alone as federal, state and local governments attempt to eradicate introductions of the Asian longhorned beetle. To keep the beetles from spreading to new areas, it is very important not to move firewood or trees potentially hosting the beetle larvae outside of quarantined areas. Because the Asian longhorned beetle can kill so many types of trees, if it spreads further it could devastate forests, street trees and trees in parks. You can help by learning what the Asian longhorned beetle looks like and reporting it to your local cooperative extension office or through one of the web sites listed below.
Photo courtesy of Michael Bohne, Bugwood.org
For More Information:
University of Vermont
USDA Animal Plant Health Inspection Service
Don't Move Firewood
Article by Sylvan Kaufman. Dr. Kaufman is a writer of popular scientific and gardening articles. She is also an ecological consultant.
|
10.5 cm Leichtgeschütz 40
|10.5 cm Leichtgeschütz 40|
The 10.5 cm LG 40 demonstrated by Fallschirmjäger
|Place of origin||Nazi Germany|
|Used by||Nazi Germany|
|Wars||World War II|
|Variants||LG 40-1, LG 40-2|
|Weight||388 kg (855 lbs)|
|Length||1.902 m (6 ft 3 in)|
|Barrel length||1.38 m (4 ft 6 in) L/13|
|Shell||105×155 mm. R|
|Caliber||105 mm (4.13 in)|
|Elevation||- 15° to + 40° 30'|
|Muzzle velocity||335 m/s (1,099 ft/s)|
|Effective firing range||7,950 m (8,695 yds)|
After the success of Rheinmetall's 7.5 cm LG 40 during the Battle of Crete in 1941, the Germans were spurred to continue development of recoilless guns in larger calibres. Both Krupp and competitor Rheinmetall developed guns in 10.5 cm, but the LG 40 got into service first.
Krupp's LG 40 was basically an enlarged and improved version of their unsuccessful competitor to Rheinmetall's 75 mm recoilless gun. It retained the earlier model's side-swinging breech and large pneumatic tires. It incorporated torque vanes in the jet nozzle to counteract the torque forces imparted by the round engaging the rifling and any clogged or eroded nozzles. It also used the improved priming mechanism developed after the problems with the smaller weapon became apparent. Like all the German 10.5 cm recoilless rifles it shared shells with the 10.5 cm leFH 18 (light Field Howitzer). The LG 40-1 version was built using an aluminium/magnesium alloy mounting, but the LG 40-2 replaced it with ordinary steel as light alloys became too valuable later in the war. Both versions could be broken down into 5 loads for parachute operations or they could be air-dropped fully assembled in a special shock-absorbing crate.
Both 105 mm recoilless guns, unlike the 75 mm LG 40, equipped independent artillery batteries and battalions. These include Batteries 423–426, 429, 433, and 443, most of which were later incorporated into Leichtgeschütze-Abt. (Light Gun Battalion) 423 and 424. These units served in both the Arctic under 20th Mountain Army and in central Russia under Heeresgruppe Mitte (Army Group Center).
- Engelmann, Joachim and Scheibert, Horst. Deutsche Artillerie 1934-1945: Eine Dokumentation in Text, Skizzen und Bildern: Ausrüstung, Gliederung, Ausbildung, Führung, Einsatz. Limburg/Lahn, Germany: C. A. Starke, 1974
- Hogg, Ian V. German Artillery of World War Two. 2nd corrected edition. Mechanicsville, PA: Stackpole Books, 1997 ISBN 1-85367-480-X
|
When I read the other day, in a media advisory from the Mississippi River Fund, about a couple of volunteer events to plant cottonwood trees in the river corridor, I admit my first reaction was to chortle:
Really? Those blizzards of seed-bearing fluff aren’t getting the job done without human intervention?
Not everywhere, they’re not. In floodplain portions of the river’s metro reaches, the trees haven’t been reproducing for perhaps 20 years or more. Because they play some highly important ecological roles, a support program is being tested and deployed.
The problem was first quantified in a 2011 survey of floodplain vegetation by the National Park Service, which coordinates a range of environmental programming and management within the Mississippi National River and Recreation Area, a nontraditional “park” unit made up of lands owned mostly by other entities in the stretch between, roughly, Dayton and Hastings.
Next Wednesday, after many months of research and preparation, Maria DeLaundreau will lead her first team of 25 volunteers in planting more than 2,000 cottonwoods. Her project will not only address the problem along the metro portion of the river, but will also try to determine the best way of cultivating cottonwoods in similar circumstances elsewhere.
Much remains to be learned about cultivating cottonwoods, which up to now have not seemed worth the trouble.
DeLaundreau, who finished a degree in biology and environmental studies at Wisconsin’s Lawrence University last June, is a Minnesota GreenCorps participant hosted by the Mississippi River Fund.
She knows her cottonwoods, and was kind enough to educate me in a telephone interview on Wednesday. Excerpts from her comments follow:
Cottonwoods are important in the floodplain because they do a lot of really fantastic things. There’s a certain synergy: They are the preferred nesting tree for bald eagles, they help honeybees stay healthy, they improve fish habitat, they reduce erosion both directly – with their own roots – and indirectly by facilitating the growth of other floodplain plants.
Floodplains are very harsh on plants. There’s very often full sun in areas that have been highly disturbed by flooding. There can be a lot of scouring by floodwaters, and sediment deposits. The cottonwoods come in, providing shade, and there’s one less stressor on plants in those areas.
The shade can be good for fish, too. And while the roots of all trees hold down erosion along the banks, the large roots of cottonwoods – after some of the soil is washed away from them – provide another fish habitat.
* * *
Bald eagles prefer them because of their exceptional height. Most of the trees in a forest end up topping out at about the same level. Every now and then you’ll see one that just jumps up out of the canopy – these are called super-canopy trees – and cottonwoods are in this group.
Because eagles are so big, they don’t have the ability to maneuver in a tight space, so they really like that when they come to a cottonwood tree, there’s easy access to get inside where they can build a nest.
Cottonwoods are also very strong, which is important because eagle nests get so heavy.
Yes, you could say that they get the penthouse location. The view is also pretty great, because they like scavenging for fish, and you can’t get any closer to the river’s edge.
They’ll hunt for live fish, too, but they prefer to find fish that are already dead, or that they can take away from other animals.
* * *
When cottonwoods are forming their buds, there’s a protective of layer of resin around them. Honeybees, and other bees, will collect that resin and bring it back to their hives and just plaster the inside of the hives with it.
It works almost like a caulk, sealing up cracks, but it also has a lot of antimicrobial properties. So it kills off fungal and bacterial pathogens that might make a colony sick.
* * *
When the National Park Service conducted its inventorying and monitoring survey in 2011, they couldn’t find any cottonwoods that had a diameter smaller than 15 centimeters.
This tells us that the cottonwoods aren’t regenerating, that young cottonwoods are not germinating and joining the forest, and haven’t been for a couple of decades, probably. It’s hard to be exact.
It’s actually hard to know how old cottonwoods are, often, because they hollow out and that makes it hard to count tree rings.
We don’t know exactly why failure to regenerate is happening. We know a lot of different factors that could be behind it:
- Invasive species, like reed canary grass, coming into some areas and just shading out the cottonwoods when they’re really young.
- Changes in hydrology – cottonwoods rely on periods of flooding, and then of water receding, in the right way, over a period of several years. You don’t expect to get new trees every year, but maybe only one in seven years, because you need the hydrology to be good in that year and then the next couple of years. We’re thinking maybe the lock and dam system could be having an influence.
- Another factor could be climate change. Right now we’re looking at a couple of sites that would seem to be really good for cottonwoods to grow in, but instead of the water going down before the seeds are released, the seeds are coming down when the water’s still so high that it’s covering the soil.
This is an area of active research.
* * *
We’re trying to determine the best places for the restoration plantings – whether it’s an old field in the floodplain, or in a mature forest, or on a ridge along the river.
We have a test site at Lilydale Regional Park, in St. Paul, and another on National Park Service Island 108, which is in Minneapolis, directly below the Camp Coldwater Spring area.
We’re also still working on finding the best way to plant them by hand, for restoration: whether it’s better to plant seeds, or transplant seedlings, or use cuttings. Cottonwoods are kind of unique in that you can take a cutting from a sapling, or a twig, and put it in the ground and it will form roots and become its own tree.
You would think that somebody would have figured this out a hundred years ago, such an important and basic thing, but cottonwood trees are not particularly valuable economically. Species like maple, or oak, there’s been a lot more research into the best way to grow them.
Cottonwoods are only just beginning to get that attention, as we come to understand more about their functions in the floodplain.
* * *
Next Wednesday, at Lilydale, we’re going to plant about 2,000 seeds — I mean, exactly 2,000 seeds. I’ve been counting them, by hand. Quite the process.
We’ll also have 40 plots for livestake cuttings, a total of 200 cuttings, each about two feet long. And we’ll be planting 300 seedlings as well.
We were going to plant this Saturday, too, at Island 108, but unfortunately we just made the decision today to postpone that. The water level is too high now. We’ll be setting a new date later.
* * *
We’re very excited to be working with St. Paul’s parks and recreation department on this, too. It all got started with the National Park Service, with the Mississippi National River and Recreation Area, which is a partnership park: The park service owns very little land, and most of their management is through partnerships.
As we’re doing this experiment, and determining the best way to plant, we’re really being conscious of how, if we want to replicate this, to be doing things that other city and county governments can see and do themselves.
* * *
|
Have No Idea How to Feed and Care for Your Newborn? No Need to Panic! I've Got You Covered.
New little humans have their own, ever-changing playbook!
I can prepare you with the most current understanding of babies. You will learn what their capabilities and biologic needs are so that you can provide responsive, loving care that will lay the foundation for a strong family bond.
Parents find these classes are a good addition to any childbirth class.
Topics We Will Explore:
- Newborn appearance, capabilities and needs at birth
- Early bonding
- What the needs of families are during the 4th trimester
Understanding babies' behavior
- Newborn hospital procedures
- Common feeding patterns within the early days to months
- Positions and techniques for burping
- Sleep patterns; Safe sleep environment; Ways to enourage sleep
- Soothing-Using the 5 S’s to calm your baby can work like magic!
- Safety-Holding, swaddling, checking temperature, warning signs
- Hygeine including bathing, skin care, nail care, umbilical cord care, diapering
"In the presence of a supportive environment, an attached primary caregiver, and a healthy diet, the brain typically thrives." - American Academy of Pediatrics Statement on the First One Thousand Days
I frequently hear new moms say "I must be doing it wrong". But, let's appreciate that neither you or your newborn have done this before.
Topics We Will Explore:
- Optimizing the Golden Hour to encourage breast seeking behaviors
- Feeding frequency in the first several days and why this is important for baby and for milk supply
- Ways to get off to the best start with breastfeeding and promoting a good milk supply
- Actions to take to manage possible bumps along the way: sleepy baby, engorgement, sore nipples, delayed milk
- How it works-how breast milk is made and how some medical conditions and habits can affect your supply
- Positioning to optimize for a deep latch-it really is that important!
- Feeding and sleeping patterns of newborns
- Recognizing hunger and satiation cues
- How partners can help
- Some common breastfeeding tools that may help in certain situations
- When to start pumping
- Breastfeeding nutrition guidelines
"A newborn baby has only three demands. They are warmth in the arms of its mother, food from her breasts, and security in the knowledge of her presence. Breastfeeding satisfies all three." ~Grantly Dick-Read, MD
I offer these classes each month. Click on the Learn More Buttons above or the class links below to see available dates. If you don't see a date that works for you, contact me with any questions you may have.
|
The prostate gland is normally a walnut-sized organ located at the base of the urinary bladder, directly in front of the lower rectum. It surrounds the urethra, or urinary tube, and is just beneath the skin in front of the anus. The prostate is part of the male reproductive system. Women do not have a prostate gland.
The prostate is one of the few organs that continue to grow throughout life. The prostate sometimes grows large enough to bother you. If it does, it will impede the flow of urine. Prostatism and benign prostatic hyperplasia (BPH) are the dominant terms for this nonmalignant enlargement, but they are being replaced by the terms "lower urinary tract symptoms" (LUTS) and "benign prostatic obstruction" (BPO).
BPH is one of the most prevalent health problems among aging men, affecting 6 million men in the United States over the age of 50 and an additional estimated 17 million men world-wide. By the age of 85, 90 percent of men have enlarged prostates, as assessed by autopsy criteria.
Growth of prostate tissue is stimulated by dihydrotestosterone, a male hormone. If the prostate tissue continues to enlarge, it may begin to squeeze your urethra and make it harder to pass urine. To compensate, your bladder muscle gets bigger and stronger, but the prostate will eventually continue to enlarge.
When the passing of urine is obstructed, some urine will remain in the bladder. This residual urine may lead to complications. The urine may become infected, and the infection can be difficult to cure until the bladder can empty completely. This is uncommon and usually occurs in elderly men. Resistant bacterial infections sometimes develop and may spread to cause serious illness. Retained urine can also back up into the kidneys and lead to chronic kidney disease or even kidney failure, which can be fatal.What are the risk factors for benign prostatic hyperplasia?What are the symptoms of benign prostatic hyperplasia?How is benign prostatic hyperplasia diagnosed?What are the treatments for benign prostatic hyperplasia?Are there screening tests for benign prostatic hyperplasia?How can I reduce my risk of benign prostatic hyperplasia?What questions should I ask my healthcare provider?What is it like to live with benign prostatic hyperplasia?Where can I get more information about benign prostatic hyperplasia?
- Reviewer: Adrienne Carmack, MD
- Review Date: 09/2015 -
- Update Date: 09/17/2014 -
|
What does the employment landscape look like for financial controllers?
A controller, by definition, oversees an organization’s day-to-day financial operations and serves a crucial role in company reporting processes. But controllers can occupy multiple specialty areas.
Here are some of the most common types of controllers and how prevalent these positions are in the United States.
A corporate controller oversees the accounting and financial processes at a company. They’re responsible for developing and implementing policies that guide the company’s financial decisions. A corporate controller also analyzes and interprets key financial documents, including balance sheets, income statements, cash flow, and liabilities.
While a chief financial officer (CFO) is usually responsible for implementing the corporate vision, the corporate controller focuses on the company’s internal financial processes.
Corporate Controller: Salary Range
The base salary of a corporate controller ranges from $138,166 to $181,225, with an average salary of $157,283.
How Many Corporate Controllers are in the United States?
As of 2021, there were 233,381 corporate controllers in the United States.
A financial controller (or finance controller) is in charge of a company’s accounting and regulatory compliance. They’re heavily involved in a company’s bookkeeping processes, with special attention given to tax planning and reporting, auditing, insurance, and the implementation of information technology.
Financial controllers are detail-oriented and often oversee teams to ensure the proper management of financial data.
Beyond these day-to-day needs, financial controllers frequently oversee special projects and may also work in other areas like project management or compliance.
Financial Controller: Salary Range
In the United States, financial controllers make $199,200 to $284,100 a year, and the average financial controller earns $239,400.
How Many Financial Controllers are in the United States?
There are currently 203,174 financial controllers employed in the United States.
A plant controller oversees the administrative and operational needs of a factory. As such, a plant controller ensures that the factory adheres to its budget, schedule, and any local or industry regulations. Plant controllers also organize and maintain financial data, preparing statements and reports as necessary.
Typically, a plant controller will also have other duties that overlap with human resources. These duties may include staffing and operational issues as well as overseeing a smooth implementation of company policies.
Plant Controller: Salary Range
On average, plant controllers make $109,105 to $141,123 each year, with an average salary of $123,196.
How Many Plant Controllers are in the United States?
At present, there are roughly 108,892 plant controllers working in the U.S.
As the name implies, an assistant controller is responsible for providing support to the controller. Most often, this means assisting with managing, auditing, budgeting, and other detail-related tasks, all while working under the supervision of the company’s full-time controller.
Depending on the size of the organization, the assistant controller may oversee other members of the team.
The specific day-to-day responsibilities of the assistant controller depend on the individual’s level of experience and are at the discretion of the company and senior controller.
Assistant Controller: Salary Range
The average assistant controller earns $155,530, though the actual salary can range from $136,458 to $179,022.
How Many Assistant Controllers are in the United States?
Across the United States, there are 295,295 assistant controllers working under the authority of corporate, financial, or other types of controllers.
A comptroller fulfills many of the responsibilities of a CFO, though most comptrollers are found working for the government, nonprofits, or educational organizations.
Like other financial employees, comptrollers are responsible for financial planning, accounting, budgeting, risk management, and developing a financial growth plan.
Comptrollers also help ensure regulatory compliance, depending on the nature of the organization. They may also implement checks and controls to guide internal processes and mitigate risk.
Comptroller: Salary Range
A typical comptroller will earn $82,351, though as of 2022, a comptroller’s salary can range from $73,625 to $92,560.
How Many Comptrollers are in the United States?
Controller Salaries by Geography
As might be expected, controller salaries vary based on geography. As a general rule, urban areas pay higher salaries than suburban or rural areas.
Below are a few reference points that provide an understanding of the current controller salary landscape:
- U.S. (East Coast): $100,000
- U.S. (New York): $121,130
- U.S. (New England): $110,000
- U.S. (Texas): $90,395
- U.S. (Midwest): $80,000
- U.S. (West Coast): $100,000
To be clear, the ranges given for broad regions (e.g., “West Coast”) are averages, and states like California offer salaries that exceed the regional average. As you can see, higher salaries are available in coastal regions, and the highest salaries are in the New England area.
Unity and Diversity in the Financial Field
Controllers play an important role in many organizations and can also provide a lucrative career path for motivated individuals. Diversity exists within this field as well, which may encourage people of all backgrounds to consider how they might serve in one of these professions.
|
Decoctions of bronchitis.
1. The following remedy helps in getting rid of sputum produced by a smoker: a cedar cone is placed to a liter of milk poured into an enameled container. Bring to a boil over high heat, then boil for two hours. Then the bump is taken out. Milk is taken in seven large spoons every few hours. Treatment is required short — only two days.
2. A teaspoon of dried sage is crushed, added to a glass of milk and brought to a boil. Remove from heat, allow to cool and boil again. Filter. They drink ten to fifteen milliliters three times with chronic bronchitis.
3. Two handfuls of crushed celandine in 2.5 cups of boiling water are brought to a boil and left under a lid to cool. Take ½ cup twice on an empty stomach. Thus, the asthmatic form of the disease is treated.
Since the plant is poisonous, ingestion can cause poor health and lead to poisoning.
4. The acute form of the disease, accompanied by severe cough, is treated with wild acacia. Two large pods with leaves are placed in a pan, poured with three liters of water and boiled. After straining, sugar is added. Drink warm, replacing tea.
Taking this medicine may cause nausea, diarrhea, and dizziness.
5. Two tbsp. l dry crushed raspberry stalks in two circles of water are boiled ten minutes after boiling. Use hot, drinking volume in a few hours.
Decoctions of bronchitis.
6. Half a liter of red homemade wine is brought to a boil. Sent in a container of 50 g of dry plantain and again brought to a boil, stirring constantly. Use in the form of heat in half a cup twice no longer than two weeks.
7. At home, knead a glass of viburnum berries. In a liter of water, boil for about fifteen minutes after boiling. Filter and inject three large spoons of natural honey. Drink twice a day in a glass. Relieves fever.
8. In a glass of village milk boil a couple of fruits of fresh figs. The fruits are eaten, and the broth is divided into several doses and drunk per day. A good recipe for those who do not know how to get rid of cough with bronchitis.
In inflammatory diseases of the gastrointestinal tract, use is unacceptable.
9. An acute type of disease is treated with a decoction of tangerine peel. Take one hundred grams, divided into two equal parts. One is placed in a pan, poured with a liter of water and boiled for one hour. Allow to cool slightly, after which the second part of the zest is introduced. After a couple of hours, they are filtered. Drink in the morning (two glasses) and during the day (three tbsp. L. Three times).
10. Chinovaya meadow in the amount of ten grams is added to 0.3 l of water and boil after boiling for no longer than ten minutes. After cooling, drink a third of the cup, repeating three times.
11. Boil 15 g of the crushed root of the medicinal soapwort in a glass of water for five minutes. Allow to cool under a lid and divide the volume into three portions. Drink per day. The recipe helps remove sputum.
May cause poisoning, accompanied by nausea and diarrhea. In this case, a taste of bitterness appears in the mouth.
12. Add 100 g of raisins chopped in a meat grinder to a glass of water and boil for ten minutes. Squeeze. Volume is consumed per day, provided coughing and difficulty in sputum discharge.
13. To a glass of milk poured into an enamel container, add a teaspoon of chopped Icelandic moss. Boil for thirty minutes. Drink the entire volume before bedtime.
|
Aquarium Lighting Supplies
One of the most important components of Building an Ocean Aquarium is the lighting. Whether it's T5 lighting, metal halide lighting, power compacts lighting, VHO lighting, or any combination of other top technology lighting systems, you will see the differences in your corals and plant life success based on their specific needs.
What we really do is replicate the sunís spectrum to provide your ocean and its eco system with the newest lighting technologies available today. We can now produce light that simulates the sunís rays and the spectrum of light necessary to penetrate water and produce life and food sources necessary for life. These light groups are called: Metal Halide, Power Compact Lighting or Compact Fluorescent, and VHO lighting.
When light passes through a prism, it separates into the colors that make it up. White light changes into a swath of colors. This rainbow is called a spectrum. You can make spectra in many ways: with a prism, reflectors, or with water, as you see during the formation of a real rainbow! In your aquarium, different spectrums are necessary for the survival of diverse groups of corals and life!
Nanometer: Electro magnetic energy in the wavelengths from 400 to 700 nanometers (nm) stimulate the perceptions of color in the human eye.
Par: Par is an acronym referring to Parabolic Aluminized Reflector, which describes its mirror configuration. PAR lights resemble car headlights. They possess a lens, but the lens is an integral part of the lamp and its position is relative to the filament canno.
Kelvin: Kelvin is used to define the heat or energy output of a bulb, i.e., 10K rated, 15K rated or 20K rated bulbs.
Metal Halide Lighting: Metal Halide is the most powerful source of lighting used in aquariums today. It enables you to produce the best configuration of Kelvin and wattage for corals, whether they are softies such as LPS or hard corals (stonies) such as SPS and clams. The presence of more Kelvin and PAR prompts SPS and clams to open and feed almost 24 hours a day. All combinations are available from 5500K - 10,000K to 15,000K - 20,000K and in wattage from 150 watt - 175 watt to 250 watt - 400 watt.
Power Compact Fluorescent: Also known as Power Compacts, these bulbs are a very good source of lighting, and they provide two application solutions. Power compacts can work by themselves as full spectrum lighting or as a second application with Metal Halide lighting or VHO lighting. Since they are a lower investment solution than the others, Power Compacts can be a great option when it comes to the budget. All power compact lighting is available in 28 watt, 36 watt, 55 watt, 96 watt and are available in both German style and Japanese style pin configurations.
VHO Ė Very High Output: VHO fluorescent lighting is a well-known and long-lasting light source that has been very successful as a reef aquarium lighting solution. These bulbs operate from an electronic ballast system which provides the capability to run high wattage bulbs at a lower cost than traditional Tar ballast technology. VHO is capable of a wide spectrum since it has built-in reflectors in the fluorescent tube. It also drives from 36 watts to 160 watts, depending on the bulb chosen. Bulb choices available are Super Actinic, which is 100% blue spectrum, and 400 Nano. Next is the Actinic White, which is the 50/50 combination spectrum of tri-band and Actinic phosphors and a white / actinic combo. Last is the Aqua Sun, which provides pure daylight with a tri-band spectrum. Most hobbyists who use VHO run a combination of these bulbs to obtain the look they want and the appropriate depth of light in the aquarium for their corals.
|
The K2 to P1 Thematic English Vocabulary book is a great tool for pre-schoolers who are building their foundation in English and preparing for primary school. The book emphasizes fundamental skills and concepts that children can learn and apply in their daily lives.
The book offers a range of intriguing and stimulating questions that encourage pre-schoolers to think critically and logically. This resource allows children to expand their English vocabulary in a fun and interactive way, equipping them with the necessary tools for academic success.
By incorporating interesting and relevant themes, pre-schoolers can learn new words and phrases that are applicable to their daily lives, encouraging them to take an interest in the English language. This approach helps children to develop their communication and language skills, which will be useful in all aspects of their lives, from academic to personal interactions.
In addition to developing language skills, the book provides a seamless transition from pre-school to primary school. The focus on basic skills that are necessary for primary school sets pre-schoolers on a path for success in their future academic careers.
Overall, the K2 to P1 Thematic English Vocabulary book is an invaluable resource for pre-schoolers. With its intriguing and engaging questions, pre-schoolers can learn fundamental language skills in a fun and interactive manner. The book provides a strong foundation for the children, enabling them to excel in their future academic pursuits.
Click here to view a brief flip-through of the book.
|
Creating a personal learning journey
We know that children learn better—and faster—when teachers have a clear picture of what each student knows and what they are ready to learn next.
That’s why our assessments react to each student’s answers. In the testing world, this makes our tests “adaptive,” or personalized to measure the needs of every student.
- If your child answers a question correctly, the test follows up with a more challenging question.
- If your child answers incorrectly, the test follows up with an easier question.
In the simplest terms, growth is change over time. To study growth, we measure a thing repeatedly on successive occasions and draw conclusions about how it has changed.
Most people are familiar with physical growth and some of the ways in which it is measured. For example, one of the things doctors do with new babies is to weigh them and measure their length. Height and weight measurements are continued as the child matures. The change in these measurements over time tells us about the growth in height and weight of the individual, which in turn gives us clues about the child’s general health and well-being.
Measuring reading ability is more like measuring temperature. Although we can see a person’s height or weight, we cannot directly observe the temperature of an object. We can see evidence of temperature by observing the height of a column of mercury in a thermometer. Similarly, we cannot see a person’s reading ability. However, we can see evidence of a person’s reading ability by asking them to respond to questions about textual matter they have read.
What is “typical” growth?
When we ask, “What is typical?” whether it pertains to performance, height, reading ability, or growth in these attributes, we generally assume that we can make a judgment about what occurs most frequently in the general population of individuals. Usually this is accomplished by gathering information about the general population so that we have a frame of reference (data) against which to make comparisons. This data is gathered at a particular time in the school year and represents an approximation of what the student performed on that day. When using data it is important to look at those numbers over time. We may look at them over one year, but this type of data shows a much clearer picture when looked at over the course of several years.
Adapted from: What is Expected Growth? A white paper from MetaMetrics® , Inc. by Gary L. Williamson, Ph.D.
|
Seismic hazard is defined in terms of the probability of exceeding a certain ground motion in a specific area, and is typically discussed in terms of Peak Ground Acceleration (PGA). Predicted PGA values for specific regions are commonly reported in national seismic building codes and therefore PGA is used extensively in earthquake engineering practice throughout the world. A new method to constrain expected earthquake PGA values, by back analysis of finite block displacements in historic masonry structures, is presented here. To demonstrate the new approach two archeological masonry structures that exhibit seismogenic damage are used as illustrative examples: 1) a 2000 year old Nabatean (Roman Period) arch in which the keystone slid downward during an earthquake of an uncertain date (Fig. 16.1a), and 2) a 1400 year old Byzantine church in which a series of parallel granite and marble columns toppled down in the same direction, most probably due to an earthquake that struck the region in 749 AD (Fig. 16.1b). Both sites are located along the seismically active Dead Sea rift system.
|Title of host publication||Advances in Rock Dynamics and Applications|
|Number of pages||34|
|State||Published - 1 Jan 2011|
ASJC Scopus subject areas
- Engineering (all)
|
Astrocaryum vulgare (common names Tucum or Tucumã-do-Pará in Brazil, Aouara in French Guiana, Wara awara in Guyana, awarra in Suriname, Chontilla in Ecuador) is a palm native to Amazon Rainforest vegetation, typical of the Pará state in Brazil. This plant has edible fruit, which are also used for biodiesel production. This plant is cited in Flora Brasiliensis by Carl Friedrich Philipp von Martius.
The tucum ring
The seed in the fruit is notably used by indigenous Amazonians to make black rings. In the 1800s, this ring was used as a symbol of marriage for the slaves and natives, who could not afford to purchase gold. In addition, the ring was also a symbol of friendship and of resistance to the established order – the freedom fighters. Now these rings are worn by Catholic missionaries as a symbol of solidarity with the poor and support in the struggle for equality, social justice and human rights.
- Story of the Tucum ring « Brazil
- 'O Anel De Tucum' (1994) Conrado Berning, 70 mins in Português,Verbo Filmes
- Eneida Duarte Gaspar 'O Caminho da cruz' 2001 (ISBN 8534702969)
- en.tucum.org - Ceará’s Community Tourism Network receives the To Do! Award in Berlin
- our ring
- Schultes, Richard E. (1974). Palms and religion in the northwest Amazon. Principes 18 (1): 3-21.
- (Portuguese) Freitas, C. O.; Silva, M. M., Silva, I. Q., Rodrigues, A. M. C. Características Físicas da Oleaginosa Tucumã (Astrocaryum vulgare Mart.)
- Astrocaryum vulgare photo of fruit
- Astrocaryum vulgare
- (Portuguese) Flora Brasiliensis: Astrocaryum vulgare
|This fruit tree-related article is a stub. You can help Wikipedia by expanding it.|
|This palm-related article is a stub. You can help Wikipedia by expanding it.|
|
Worldschooling lesson plan ~ China & Japan
Here’s a peek at how our homeschool club used Day of the Dragon King and Night of the Ninjas to visit China and Japan. Our club meets for two hours once a week. We have a variety of ages ranging from 3 years up to 9 years. The majority sit in the 6-8yr range and that’s where these activities are geared. We spread these activities over 5 weeks and truly we could have kept going. I have provided links to the websites we used as well as links to the products I created (posted in my TpT store Explore Time).
Our club decided to read two books (there are more) to explore China and Japan. We read Day of the Dragon King (China) and Night of the Ninjas (Japan).
For every book we read we spend one lesson on discussion. The emphasis of our book discussions are not fill-in-the-blank or true and false type activities. I’m not concerned that every detail of the book is retained. Instead we focus on the story elements (beginning, rising action, climax, falling action, resolution) of every story and how they work together to create an adventure.
Day of the Dragon King transports the reader into a period of Chinese history when the first emperor conquered and consolidated the land into what we now call China. This adventure highlights a well-known Chinese legend, The Silk Weaver and the Cowherd. It also mentions bamboo books, the famous Teracotta soldiers, as well as, the infamous book burning incident. Though not emphasized in the book, this emperor was also responsible for the initial construction of The Great Wall, therefore it was also added to the lesson.
Night of the Ninja transports the reader into historical Japan where ninjas and samurai feud. This book has a strong emphasis on nature and respect, however it is light on historical and cultural events.
Below is a list (with links) to the activities we completed in our exploration of China and Japan.
Activities for China
- Rice hats (craft)
- Pandas lapbook
- Legend of the Silk Weaver
- Terracotta Warriors
- create warriors (animal/human/other) out of clay
- provide historical facts on these warriors
- introduce a discussion of symbolism (strength/protection…etc)
- Lapbook for China
- Books Burning lesson (mini lesson and worksheets)
- introduce a discussion on censorship
- ask students to name all the places they have books or read books
- Great Wall lesson (mini lesson and worksheets)
- introduce a discussion on forced labor (see this resource)
- construct a wall using items such as sugar cubes, blocks, foam etc.
- Bamboo books (craft)
- introduce a discussion on paper (a Chinese invention) and pre-paper
- Paint a Character
- introduce a discussion on the differences between our Roman alphabet and a character based alphabet (also in Japanese)
Activities for Japan
- Ninja face (activity)
- introduce a discussion on who the ninja (and samurai) were
- the book emphasizes nature and respect, incorporate those elements (be a log, be a rock etc.)
- Ninja moves (Create movements based on these principles. For example walking like a fox on the tips of your fingers.)
- Create a Haiku
- Kimono (craft)
- introduce a discussion on cultural dress
- Create a Carp kite
- share facts about Koinobori (carp) Day
- Music (utilize the internet or local library)
- compare the sound or style of music to what the students commonly listen to
- Tea and Sushi Party
- introduce Japanese customs (take off shoes, bow, sit on floor, use chopsticks….)
- Wild China documentary
- You Wouldn’t Want to be a Great Wall Laborer (book)
- Child Just Like Me (a must have book)
- Explore Time Store on TPT
Follow Me On Facebook
|
In the late 18th century, these elements are discovered as oxidized materials – hence “earths”, they are called Rare Earths. They are just actually metals and aren’t rare; just all over the place. A cupful of dirt from a backyard might contain an iota, maybe a few parts per million. The comparison of the rarest rare earth is around 200 times more abundant than gold but deposits large and concentrated enough to be worth mining are indeed rare.
RARE EARTHS - WHERE ARE THEY?
In the late 18th century, these elements are discovered as oxidized materials – hence “earths”, they are called Rare Earths. They are just actually metals and aren’t rare; just all over the place. A cupful of dirt from a backyard might contain an iota, maybe a few parts per million. The comparison of the rarest rare earth is around 200 times more abundant than gold but deposits large and concentrated enough to be worth mining are indeed rare.
To find the things that contain rare earths is almost infinite. Magnets with them are powerful than the regular magnets and it is paper-weight; that is one cause so many varieties of electronic devices have gotten smaller and thinner. Hybrid cars and wind turbines carries rare earth including “green machines.” The battery in a single car houses around 20 pounds of the rare earth element lanthanum (the name comes from Greek word “lanthano” meaning to be hidden). Lanthanum is Periodic Element#57 with symbol La, uses: Military/Energy/Transportation/Consumer/Products. The magnet in a huge wind turbine can contain more or less 500 pounds of neodymium. Military equipments like night-vision, goggles, even cruise missiles and other weapons need rare earths.
Karl Gschneidner, a senior metallurgist with the Department of Energy’s Ames Laboratory in Ames, Iowa who has studied rare earth elements for more than 50 years tells that the phosphors in every TV, LCD or LED – the red color comes from the element called Europium (Eu – Periodic Element#63 – Uses: Medical/Energy/Consumer Products). The catalytic converter on every exhaust system contains lanthanum and cerium. Cerium is Periodic Element#58 with symbol Ce, uses: Energy/Transportation/Consumer Products.
“They are all around us,” says Karl Gschneidner, “They are hidden unless you know about them, so people do not worry about them as long as they could keep buying them.”
U.S. military depends on rare earths, mainly from Chinese mines. Night-Vision goggles contain lanthanum, yttrium and gadolinium. (Yttrium is Periodic Element#39 with Y symbol and uses: Medical/Military/Energy/Consumer Products; Gadolinium is Periodic Elements#64 with symbol Gd and uses: Energy/Medical/Consumer Products) Samarium magnets can stands intense heat helps control Tomahawk cruise missiles. (Samarium is Periodic Element#62 with Sm symbol and uses: Military/Energy/Transportation/Consumer Products)
Medical scans contain Gadolinium that is use as contrast agent in MRI (magnetic resonance imaging) delivering surgeons to distinguish diseased tissue from healthy tissues. While hybrid cars or the “green machines” can not operate without the rare earth element – lanthanum for their batteries and neodymium, a rare earth magnet for electric motors. Neodymium is Periodic Element#60 with symbol Nd and uses: Military/Medical/Energy/Transportation/Consumer Products.
Wind Turbines comprises hundreds of pounds of neodymium. Consumer products: a compact fluorescent light bulb contains minimum amounts of yttrium and terbium (Terbium is Periodic Element#65 with symbol Tb and uses: Military/Medical/Energy/Transportation/Consumer Products); praseodymium, erbium, neodymium tint sunglasses for protecting eyes; cerium in dark wine-bottle glass promotes absorption of UV light. Some portable power tools depend on neodymium or dysprosium magnets to reduce their motors.
Rare earths aid phones emit sounds and light, including mp3 players. Neodymium magnets intensify speakers, vibrating motors and the tiny earphones. LCD and LED screen colors are developed by europium (reds) and terbium (greens).
Rare earths are 17 essential metals that cluster together on the periodic table – 15 of them, from lanthanum to lutetium, form a successive series and in mineral deposits too. Malleable, reactive, refractive and magnetic they are small ingredients of many big things.
Scandium is Periodic Element#21 with Sc symbol - uses: Transportation/Consumer Products.
Praseodymium is Periodic Element#59 with Pr symbol - uses: Medical/Energy/Transportation/Consumer Products
Promethium is Periofic Element#61 with Pm symbol - PRODUCED BY NUCLEAR FISSION, NOT MINED
Terbium is Periodic Element#65 with Tb symbol - uses: Energy/Medical/Military/Transportation/Consumer Products
Dysprosium is Periodic Element#66 with Dy symbol - uses: Medical/Energy/Transportation/Consumer Products
Holmium is Periodic Element#67 with Ho symbol - uses: Military/Energy
Erbium is Periodic Element#68 with Er symbol - uses: Consumer Products
Thulium is Periodic Element#69 with Tm symbol - uses: Military/Medical
Lutetium is Periodic Element#71 with Lu symbol - uses: Medical/Energy
China supplies the superiority percentage of the world’s rare earth needs. In 2010, the global world markets were rattled when China cuts off shipments to Japan for a month due to diplomatic disputes. It will be much a scarce over the next decade, China is expected to steadily reduce rare earth exports in order to protect the supplies of their own rapidly growing industries.
China had been developing the technology of separating rare earth which is hard to endure because they’re chemically so identical. With the support of the government, cheap labor and non-existence of environmental ordinance, China’s rare earth industries undersell all competitors.
When the Mountain Pass mine closed in 2002, Baotou, a city in Inner Mongolia becomes the new rare earth capital. But Chen Zhangheng, director of the Chinese Society of Rare Earths, academic department in Beijing says that Baotou’s mines hold about 80 percent of china’s rare earth.
Baotou has paid an immerse amount for its supremacy. Some of these high-tech products rules out to have very nasty origins. Rare earth mines usually contain radioactive compounds such as uranium and thorium. Residents near Baotou reportedly have been relocated because water and crops have been contaminated with mining wastes. Yearly the mines near Baotou produce about ten million tons of wastewater, highly acidic or radioactive and left untreated.
National Geographic June 2011 p.136 to p.145
Primary Image: wikipedia
|
1 Matching Annotations
- Jan 2014
Creating an atlas is more encompassing than image acquisition and analysis. It requires a clear understanding of the biological questions to be addressed. Then appropriate labeling, sample preparation, imaging, image analysis, visualization, and data management methods must be selected (Figure 2). An interdisciplinary team is required that collectively possess the needed expertise. Generating useful atlases is still in its infancy. Which methods to use at each step along the pipeline will depend greatly on what analysis is required. There is currently no ‘magic toolbox’ that scientists can use to apply to their specific task. Each step has to be tailored to suit the experiment.
Atlases are more than just image acquisition and analysis.
An interdisciplinary team is required that collectively possesses the needed expertise.
There is no "magic toolbox"
|
A risk factor is something that increases your chances of developing cancer. Some risk factors cannot be changed, such as family history or genetics. Fortunately, many other risk factors can be modified.
Know Your Family History
Colorectal cancer tends run in families because of its genetic components. If more than one close relative has developed colon cancer before age 60, you may be at increased risk. You may also be at risk if anyone in your family has been diagnosed with familial adenomatous polyposis (FAP) or Lynch syndrome.
If you have a strong family history of the disease, your doctor may recommend that you have an early colonoscopy. Depending on the results, you may need to have testing on a more frequent basis.
Manage Polyps with Regular Screening
Some people are more likely to develop polyps. Not all polyps will turn into cancer but it is important to have a screening and treatment plans in those with history of polyps. The removal of the polyps significantly reduces the risk of colon cancer.
Eat a Healthful Diet
Eating a high-fiber diet has been associated with lower risk of colorectal and other cancers. Fiber is found in all plant foods, including fruits, vegetables, whole grains, and legumes. High consumption of red meat is also linked to an increased risk of colon cancer. Substituting red meat with fish, chicken, or pork may decrease the risk.
Specific foods may also help to lower the risk of colorectal cancer. These foods include onions, garlic, and cruciferous vegetables like kale, cabbage, broccoli, Brussel sprouts, cauliflower, and radishes.
Good nutrition also supports your body's immune system which can help decrease your risk of any cancer.
Regular exercise has been shown to reduce the risk of developing colorectal cancer. Aim for 30 minutes per day on most days of the week. Exercise will also help you lose and/or maintain weight, and boost your immune system.
Talk to your doctor before starting any exercise program. Start out slowly, then increase your activity level a little at a time. If you need help with an exercise program, consider joining a gym with a certified trainer.
Lose Excess Weight
Obesity is linked to a higher risk of colorectal cancer. Weight loss takes time and there is no quick fix. Give yourself time to make adjustments to your diet. Portion control, combined with healthy food choices, will get you started on the right track. You can also increase your calorie loss by increasing your physical activity level. Regular exercise will help you meet your weight loss goals. If you need to lose weight, talk to your doctor or a registered dietitian who can help you do so slowly and safely.
Smoking introduces a variety of harmful chemicals into your body. Quitting smoking is an important step in preventing colorectal and other cancers. The sooner smoking is stopped, the sooner your body can start to heal. Talk to your doctor about the options available to help you successfully quit.
Drink Alcohol Only in Moderation
Excess alcohol intake is associated with an increased risk for colorectal cancer. Drink alcohol in moderation, which is one drink or less per day for women and two drinks or less per day for men.
Talk to Your Doctor About the Benefits of Aspirin
Some studies have found a link between aspirin use and reduced rates of colorectal cancer. Since taking aspirin can have side effects, including gastrointestinal bleeding, talk to your doctor before starting any aspirin therapy.
- Reviewer: Mohei Abouzied, MD
- Review Date: 05/2015 -
- Update Date: 12/04/2015 -
|
Metabolic syndrome is a combination of conditions associated with obesity that may include high blood pressure, elevated blood lipids, and high fasting blood sugar.
Metabolic syndrome puts a person at risk for:
Metabolic syndrome may be characterized by:
- Central obesity—high amount of fat around the waist
- Low levels of high density lipoprotein (HDL or good) cholesterol
- High levels of triglycerides—type of fat measured in the blood
- Elevated blood pressure
- Elevated fasting glucose level due to lower sensitivity to insulin
The exact cause of metabolic syndrome is not known. It believed to be due to a combination of factors, such as:
- Genetic factors
- Lack of physical activity
- Poor diet
Metabolic syndrome is more common in people who are Hispanic, Caucasian, or African American. Factors that may increase your chance of metabolic syndrome include:
- Having disorders or conditions associated with metabolic disorder such as:
- History of gestational diabetes
- Family history of the disorders listed above
- Physical inactivity
- Poor diet
- Unhealthy habits, such as smoking
- Certain medications, such as atypical antipsychotics
Symptoms may include:
- Frequent urination, and excessive thirst and hunger due to high blood sugars
- Dark, velvety skin discoloration seen with obesity
You may be diagnosed with metabolic syndrome if you have:
- Waist measurement—greater than 40 inches in Caucasian men (35 inches in Asian men) or 35 inches in Caucasian women (30 inches in Asian women)
- At least 2 of the following:
- Fasting glucose level—greater than or equal to 100 mg/dL* (5.55 mmol/L)
- Triglyceride level—greater than or equal to 150 mg/dL (1.7 mmol/L)
- HDL cholesterol—less than 40 mg/dL (1.0 mmol/L) in men and less than 50 mg/dL (1.3 mmol/L) in women
- Blood pressure—greater than or equal to 130/85 millimeters of mercury (mm Hg)
*mg/dL = milligrams per deciliter of blood, mmol/L = millimoles per liter of blood
The treatment of metabolic syndrome involves:
- Treatment of underlying causes, usually by diet and exercise
- Treatment of specific metabolic abnormality
Gastric bypass or other weight loss surgery may be helpful to treat metabolic syndrome if obesity is severe. Talk to your doctor to learn if this is an option for you.
Treatment of Underlying Causes
- Reducing excess weight by at least 10% in the next 6-12 months
- Increasing physical activity to 30-60 minutes of moderate aerobic exercise four or more days per week as approved by your doctor
- Lowering blood pressure to below 130/85 mmHg with diet, exercise, and possibly medication
- Improving triglyceride and HDL cholesterol levels through diet, exercise, and possibly medication
Treatment of Specific Metabolic Abnormality
- High blood pressure—treated with anti-hypertensive medication and lifestyle changes
- Insulin resistance—treated with diabetes medications and lifestyle changes
- High cholesterol—treated with cholesterol-lowering medications called statins and lifestyle changes
- Clotting tendency—treated with low-dose aspirin , especially in those with moderate to high cardiovascular risk
To help reduce your chances of metabolic syndrome:
- If you smoke, talk to your doctor about how to successfully quit.
- Achieve and maintain a healthy weight by eating a balanced diet that includes plenty of fruits, vegetables, and whole grains.
- Talk to your doctor how to increase your intake of specific minerals, such as magnesium.
- Work up to 30 minutes of moderate aerobic exercise most days of the week.
- Drink alcohol in moderation. This means no more than 2 drinks daily for men, 1 drink daily for women.
- Reviewer: Kim Carmichael, MD
- Review Date: 02/2016 -
- Update Date: 07/15/2015 -
|
The 마사지 traditional Japanese work culture is well-known for its emphasis on hard work and long working hours. This culture has been deeply ingrained in the Japanese society, with many office workers expected to work overtime and put in extra effort to achieve success. In fact, it is not uncommon for employees to stay at work until late at night or even sleep at their desks.
Moreover, there is a strong sense of loyalty towards one’s company in Japan, and this often leads to employees prioritizing their work over their personal lives. This has resulted in a significant imbalance between work and family life for many Japanese office workers. In addition, the hierarchical structure of Japanese companies often makes it difficult for employees to take time off or voice their concerns about the workload.
There is also a cultural expectation that women should prioritize their family responsibilities over their careers, which further exacerbates the issue of work-family balance.
Japanese office workers face numerous challenges in achieving work-family balance due to the intense work culture prevalent in the country. The expectation of long working hours and dedication to the job often leads to a lack of time for personal and family life. Many workers are expected to work overtime, and taking time off is seen as a sign of weakness or lack of commitment.
This pressure can lead to stress, burnout, and even health problems. Additionally, the traditional gender roles in Japan place a heavy burden on women to take care of household duties and childcare, making it difficult for them to balance work and family responsibilities. The high cost of childcare services also adds to this challenge. Furthermore, some companies do not provide sufficient support for working parents, such as flexible working hours or parental leave policies.
These challenges make it difficult for Japanese office workers to achieve a healthy work-family balance.
The Japanese government has been actively promoting work-life balance for office workers to address the issue of overwork and its negative effects on employees’ health and productivity. One of their initiatives is the introduction of a law in 2019 that requires companies with more than 100 employees to set limits on overtime work hours and promote paid leave usage. The government also launched a campaign called “Premium Friday,” which encourages workers to leave the office early on the last Friday of every month.
Additionally, the government has established counseling services for employees who are struggling with work-related stress or mental health issues. They have also implemented programs that support working parents, such as providing subsidies for childcare facilities and promoting telecommuting as an alternative work style. These initiatives have been aimed at creating a healthier and more productive workforce in Japan, as well as improving overall quality of life for employees.
In recent years, many Japanese companies have implemented policies and practices to support work-family balance for their employees. One common policy is the introduction of flexible working hours, which allows employees to adjust their schedules to better suit their family responsibilities. Some companies also offer telecommuting options, which allow employees to work from home or other remote locations. Parental leave is another important policy that supports work-family balance.
In Japan, both mothers and fathers are entitled to parental leave, and many companies offer additional paid leave beyond the legally required amount. Some companies also provide childcare facilities or subsidies for employees with young children. Employee support programs such as counseling services, stress management workshops, and wellness initiatives are also becoming more common in Japanese workplaces. Additionally, some companies are experimenting with shorter working hours or reduced workloads to help alleviate stress and improve overall quality of life for their workers.
The traditional Japanese work culture has long been characterized by long working hours and a strong emphasis on dedication to one’s job. However, in recent years, there has been a growing recognition of the importance of achieving a better balance between work and family responsibilities. This shift in attitude is partly driven by demographic changes, as more women enter the workforce and aging populations require more care at home.
Additionally, younger generations are placing greater value on personal fulfillment and quality of life. As a result, many companies are implementing policies that support work-family balance, such as flexible working hours or remote work options. The government is also taking steps to promote this shift, such as expanding childcare services and offering incentives for companies that prioritize work-life balance. While these changes are still in their early stages, they represent an important step towards creating a healthier and more sustainable approach to work in Japan.
The COVID-19 pandemic has had a significant impact on work-family balance for Japanese office workers. With many companies implementing remote work policies, employees have found themselves juggling the demands of their jobs with the needs of their families at home. Working from home has blurred the lines between work and personal life, making it difficult for individuals to maintain a healthy balance between the two.
Parents with young children have been particularly affected, as they are now responsible for childcare while also trying to meet job expectations. Additionally, the closure of schools and daycare centers has made it challenging for parents to manage their work responsibilities while providing care for their children. This has led to increased stress and burnout among workers. Moreover, many employees are now working longer hours due to reduced commuting time and increased workload.
The lack of clear boundaries between work and personal life can lead to exhaustion and decreased productivity in the long run.
The future outlook for work-family balance in Japan looks promising, with the government and companies taking measures to promote a better work-life balance. In 2018, the Japanese government passed a law requiring companies with more than 300 employees to set targets for reducing overtime and improving the work environment. This law has been effective in reducing working hours and encouraging employees to take paid leave.
Additionally, some companies have implemented flexible working arrangements such as telecommuting and compressed workweeks to allow employees to better manage their time between work and family responsibilities. However, there is still room for improvement as many workers are hesitant to take advantage of these options due to workplace culture that values long hours at the office. Overall, there is growing awareness about the importance of work-life balance in Japan, and it is likely that more companies will adopt policies that prioritize employee well-being in the future.
|
open a help page
?topic or ?topic,subtopic or
help(topic) or help(topic,subtopic) or
??topic or ??topic,subtopic or
???topic or ???topic,subtopic or
information on the Worksheet Interface
list of all help categories
list of help files on specific topics
explanation of a specific topic
explanation of a subtopic under a topic
Subtopics can be two, three, or more levels deep (as in ?topic,subtopic,subsubtopic,subsubsubtopic).
For a package export, both ?topic:-subtopic and ?topic[subtopic] can be used and invoke the same help as ?topic,subtopic.
Note: The recommended way to invoke help is to use the question mark.
When invoking help with the function call syntax help(topic), Maple keywords (reserved words) must be enclosed in backquotes or double quotes. For example, help(quit) causes a syntax error. Use help(`quit`) or help("quit") instead.
When using the question mark syntax for help, no quotes are required.
Commands entered in 1-D math, such as help, must end with a semicolon. You can enter multiple commands on one line, separated by semicolons or colons.
When using the question mark syntax, no semicolon is required, and there can be only one command on each line.
In contrast to the question mark syntax, help evaluates its arguments. For example, a:=int: help(a); opens the help page for 'int'. Use '' or "" quotes to prevent evaluation.
The double question mark (??) and triple question mark syntax (???) are for use in Command-line Maple. Using the double question mark syntax (??) causes the topic to display only the calling sequence and parameters. Using the triple question mark syntax (???) causes the topic to display only the Examples section.
Download Help Document
|
We'll go to the first principle.
Eagles fly alone at high altitude and not with sparrows or other small birds. No other bird go to the height of the eagle.
1. The 'Standing Out' Principle
1. The 'Standing Out' Principle
- Stay away from sparrows and ravens. Eagles fly with eagles.
2. The 'Vision' PrincipleEagles have strong visions. They have the ability to focus on objects up to five kilometres away. When an eagle sites its prey, it narrows its focus on the prey and sets out to get it.
No matter the obstacles, the eagle will not move its focus from the prey in view until it gets hold of the target
3. Eating PrincipleEagles do not eat dead things. They feed only on fresh prey. Vultures eat dead animals, but eagles will not.
- Be careful with what you feed your eyes and ears with, especially in a movies and on TV.
- Stay clear of outdated information.
- Always keep yourself updated and do your research well.
4. The 'Flying principle'Eagles love the storm. When clouds gather, the eagle get excited. The eagle uses the storm's wind to lift itself higher. Once it finds the wind of the storm, the eagle uses the raging storm to lift itself above the clouds.
This gives the eagle the opportunity to glide and rest its wings. In the meantime, all the other birds hide in the leaves and branches of the trees.
- We can use the storms of life to rise to greater heights.
- Achievers relish challenges and use them profitably.
5. Participation And Preparation PrincipleThe eagle prepares for changes: when ready to lay eggs, the female and male eagle identify a place high on a cliff where no predators can reach.
The male flies to the earth and pick thorns and lay them on the crevice of the cliff, then flies to earth again to collect twigs which it lays in the intended nest.
He flies back to the earth and picks thorns laying them on top of the twigs. He flies back to the earth and picks soft grass to cover the thorns.
When this first layering is complete, the male eagle flies back to the earth and picks more thorns, lays them on the nest; flies back to get it on top of the thorns, then plucks its feathers to complete the nest
The thorns on the outside of the nest protect it from possible intruders. Both male and female eagles participate in raising the eagle family. The female lays the eggs and protect them. The male builds the nest and hunts.
During the time of training the young ones to fly, the mother eagle throws the eaglets out of the nest. Because the young eagles are scared, they jump into the nest again. The mother eagle throws them out and then takes off the soft layers of the nest, leaving the thorns to bare.
When the scared eaglets jump into the nest again, they are pricked by thorns. Shrieking and bleeding, they jump out again wondering why the mother and father who love them so much are torturing them.
Next, mother eagle pushes them off the cliff into the air. As they shriek in fear, father eagle flies out and catches them up on his back before they fall and brings them back to the cliff. This goes on for sometime until they start flapping their wings. They get excited at this new found knowledge that they can fly.
- The preparation of the nest teaches us to prepare for changes.
- The preparation for family teaches us that active participation of both partners leads to success.
- The pricking by the thorns tells us that sometimes being too comfortable where we are may result in us not experiencing life, not progressing and not learning at all.
- The thorns of life come to teach us that we need to grow, get out of the nest and live on.
- The people who love us do let us languish in sloth but push us hard to grow and prosper. Even in their seemingly bad actions, they have good intentions.
6. Shedding Principle.
- We occasionally need to shed off old habits and vain glory that ensnare us rather than adding values to our lives.
Over to you What do you think about this principles. Are they all valid? Do you have any contrary opinion? Let me know via your comment below.
|
|1st Northern Pretender|
|Born||August 1, 1313|
|Died||August 5, 1364 (aged 51)|
Emperor Kōgon (光厳天皇 Kōgon-tennō) (August 1, 1313 – August 5, 1364) was the first of the Ashikaga Pretenders during the Period of the Northern and Southern Courts in Japan. According to pre-Meiji scholars, his reign spanned the years from 1332 through 1334.
Before his ascension to the Nanboku-chō throne, his personal name (his imina) was Kazuhito-shinnō (量仁親王). He was the third son of Emperor Go-Fushimi of the Jimyōin line. His mother was Kōgimon'in Neishi (広義門院寧子). He was adopted by his uncle, Emperor Hanazono. His family included:
- Empress: Imperial Princess Yoshiko (懽子内親王) (First daughter of Emperor Go-Daigo)
- Imperial Princess Mitsuko (光子内親王)
- Consort: Imperial Princess Hisako (寿子内親王) (Daughter of Emperor Hanazono)
- Lady-in-waiting: Sanjō Shūshi (三条秀子) Empress Dowager Yōroku (陽禄門院)
- Consort: Unknown
- Imperial Prince Sonchō (尊朝親王)
- Egon (恵厳)
Events of Kōgon's life
In his own lifetime, Kōgon and those around him believed that he occupied the Chrysanthemum Throne from October 22, 1331 until July 7, 1333. Kazuhito-shinnō was named Crown Prince and heir to Emperor Go-Daigo of the Daikakuji line in 1326. At this time in Japanese history, by decision of the Kamakura shogunate, the throne would alternate between the Daikakuji and Jimyōin lines every ten years. However, Go-Daigo did not comply with this negotiated agreement.
In 1331, when Go-Daigo's second attempt to overthrow the shogunate became public, the Shogunate seized him, exiled him to Oki island and enthroned Kōgon on October 22. Emperor Go-Daigo used the 17 petal chrysanthemum mon during his exile. He escaped Oki in 1333, with the help of Nawa Nagatoshi and his family, and raised an army at Funagami Mountain in Hōki Province (the modern town of Kotoura in Tōhaku District, Tottori Prefecture). Meanwhile, Ashikaga Takauji (足利 尊氏), the chief general of the Hōjō family, turned against the Hōjō and fought for Emperor Go-Daigo in the hopes of being named shogun. Takauji attacked Hōjō Nakatomi and Hōjō Tokimasu, the Rokuhara Tandai, or chiefs of the Kamakura shogunate in Kyoto. They both fled to the east, but were captured in Ōmi Province. On July 7, 1333, Go-Daigo seized the throne from Emperor Kōgon and attempted to re-established Imperial control in what is referred to as the Kemmu Restoration (1333–1336). Go-Daigo's attempt failed, however, after Ashikaga Takauji turned against him.
In 1336, Takauji installed Kōgon's younger brother on the throne as Emperor Kōmyō. Go-Daigo fled to Yoshino, in Yamato Province and continued to lay proper claim to the throne, establishing what would come to be known as the Southern Court. Kōmyō's court remained in Kyoto and would come to be known as the Northern Dynasty. This marked the beginning of the Northern and Southern Courts Period of Japanese history, which lasted until 1392.
In 1352, taking advantage of a family feud in the Ashikaga clan known as the Kan'ō Disturbance, Emperor Go-Murakami of the Southern Court entered Kyōto, captured it and carried away Kōgon along with Emperor Kōmyō, Emperor Sukō and the Crown Prince. Following this, Kōgon was held under house arrest for the remainder of his life. In his final years, he converted to Zen Buddhism, and died on August 5, 1364.
Eras of Kōgon's reign
- Pre-Naboku-chō period
- Naboku-chō Southern court
- Eras as reckoned by legitimate Court (as determined by Meiji rescript)'
- Naboku-chō Northern court
- Eras as reckoned by pretender Court (as determined by Meiji rescript)
- Shōkei (1332–1338)
Southern Court Rivals
- Titsingh, Isaac. (1834). Annales des empereurs du japon, pp. 286–289.
- Titsingh, p. 286.
- The twentieth day of the ninth month of the third year of Gentoku, according to the traditional lunisolar calendar
- The twenty-fifth day of the fifth month of the second year of Shōkei, according to the traditional lunisolar calendar
- Titsingh, p. 286.
- Ponsonby-Fane, Richard Arthur Brabazon. (1959). The Imperial House of Japan. Kyoto: Ponsonby Memorial Society. OCLC 194887
- Titsingh, Isaac, ed. (1834). [Siyun-sai Rin-siyo/Hayashi Gahō, 1652], Nipon o daï itsi ran; ou, Annales des empereurs du Japon. Paris: Oriental Translation Fund of Great Britain and Ireland.
|
Analysis: Sound Check
The best way—actually, the only way—to get the full force of "Ariel" is to read it aloud. Seriously. Read it aloud to yourself right now. Don't worry. We'll wait right here while you do.
Back? Great. Do you hear all those repeated sounds? The long I rhyme of "cry" (21) and "I" (23)? The S sound consonance of "Stasis in darkness" (1)? The beginning B alliteration in "Black sweet blood mouthfuls" (13)? Sonic repetitions like these are all over the poem.
So much repetition can be found here, in fact, that reading "Ariel" aloud is like being in an echo chamber. The sounds of the poem don't let go of you—they repeat, disappear, return with a vengeance. And this is particularly interesting because "Ariel" is written in free verse, which means that it doesn't have a regular rhyme scheme. The rhymes in "Ariel" are frequent, but not regular, which means that they are unpredictable. You never know when a sound is gonna creep up again in the poem. The repetitions in Plath's poem can catch you off-guard, and draw you deep into its dense web. In this way, the form of the poem echoes its content perfectly; as Ariel takes our speaker on a wild ride, so the poem "Ariel" takes its readers off on a gallop.
Think we're exaggerating? Listen to Plath's recording of "Ariel." You'll be lucky to make it out of this recording on solid ground.
|
It's as if she's saying, "I'm here World!" And that is very good news, as this animal is severely threatened.
Last month, in the Kaziranga Forest Trail at the Dublin Zoo, blackbuck parents Honey and Basil welcomed this lively little female - their first offspring. She's also the first ever blackbuck newborn at the Zoo. Team leader Ciaran McMahon said, “We are thrilled with the arrival of our first blackbuck calf. We hope to grow the herd to approximately seven or eight, and the new calf is a great start. The youngster is fit and nimble but still quite shy; however she can be seen bouncing around the elephant habitat between 1:30 p.m. and 3:00 p.m. every day.”
Contrary to what their name suggests, the coloring of female calves like this one is a light tan shade. In adulthood, male bucks have striking black and white fur, and two long, twisted horns (they can be as long as 31 inches, or 46 cm), while females are fawn colored and without horns.
The blackbuck is a species of the antelope and one of the fastest terrestrial animals in the world, reaching speeds of up to 50 miles per hour (80 km/hr). In India, their country of origin, blackbucks live side by side with elephants and at the Dublin Zo, blackbucks also co-habit with their herd of Asian elephants.
Often called the Indian antelope, due to their native range being in Indian subcontinent (which includes Pakistan and Nepal), dramatically decreased, as it was the most hunted animal in the country. Though now Indian laws prohib it hunting the blackbuck to protect this endangered species, there are still incidents of poaching, because it's flesh and skin get quite a high price in the markets. In addition, man continues to encroach upon its habitat, mostly turning it into grazing areas for cattle -- and those cattle also have spread bovine diseases to the blackbuck. In 2008 the population estimate in the wild was estimated to be a startlingly low 184 antelope.
|
Location of Fredonia, Kentucky
|• Total||0.6 sq mi (1.6 km2)|
|• Land||0.6 sq mi (1.6 km2)|
|• Water||0.0 sq mi (0.0 km2)|
|Elevation||427 ft (130 m)|
|• Density||646/sq mi (249.3/km2)|
|Time zone||Central (CST) (UTC-6)|
|• Summer (DST)||CDT (UTC-5)|
|Area code(s)||270 & 364|
|GNIS feature ID||0492485|
Fredonia is located in western Caldwell County at U.S. Route 641 passes through the city, leading north 9 miles (14 km) to Marion and south 9 miles (14 km) to Eddyville near Interstates 24 and 69.(37.209111, -88.058850).
The town is said to have been laid out in 1836. The name Fredonia was a popular one in America in the early 19th century after its use was popularized by Samuel L. Mitchill of New York, but local tradition holds that the Kentucky town was named for the daughter of town founder Harvey W. Bigham. It was formally incorporated by the state assembly in 1869.
As of the census of 2000, there were 420 people, 177 households, and 132 families residing in the city. The population density was 642.5 people per square mile (249.5/km²). There were 206 housing units at an average density of 315.1 per square mile (122.4/km²). The racial makeup of the city was 96.19% White, 3.57% African American, and 0.24% from two or more races. Hispanics or Latinos of any race were 0.48% of the population.
There were 177 households out of which 28.8% had children under the age of 18 living with them, 62.1% were married couples living together, 10.2% had a female householder with no husband present, and 25.4% were non-families. 24.9% of all households were made up of individuals and 13.0% had someone living alone who was 65 years of age or older. The average household size was 2.37 and the average family size was 2.80.
The age distribution was 21.4% under the age of 18, 6.4% from 18 to 24, 31.2% from 25 to 44, 24.3% from 45 to 64, and 16.7% who were 65 years of age or older. The median age was 39 years. For every 100 females there were 94.4 males. For every 100 females age 18 and over, there were 90.8 males.
The median income for a household in the city was $35,893, and the median income for a family was $41,250. Males had a median income of $35,000 versus $21,429 for females. The per capita income for the city was $14,865. About 9.2% of families and 13.0% of the population were below the poverty line, including 19.4% of those under age 18 and 9.7% of those age 65 or over.
- "Geographic Identifiers: 2010 Demographic Profile Data (G001): Fredonia city, Kentucky". U.S. Census Bureau, American Factfinder. Retrieved August 5, 2014.
- "US Gazetteer files: 2010, 2000, and 1990". United States Census Bureau. 2011-02-12. Retrieved 2011-04-23.
- Rennick, Robert M. (1987). Kentucky Place Names. University Press of Kentucky. p. 109. Retrieved 28 Apr 2013.
- Commonwealth of Kentucky. Office of the Secretary of State. Land Office. "Fredonia, Kentucky". Accessed 26 Jul 2013.
- "American FactFinder". United States Census Bureau. Retrieved 2008-01-31.
|
|Part of a series on|
|Lesbian, gay, bisexual, and transgender (LGBT) people|
|Prejudice / Violence|
|Academic fields and
Heteronormativity is the belief that people fall into distinct and complementary genders (man and woman) with natural roles in life. It asserts that heterosexuality is the only sexual orientation or only norm, and states that sexual and marital relations are most (or only) fitting between people of opposite sexes. Consequently, a "heteronormative" view is one that involves alignment of biological sex, sexuality, gender identity and gender roles. Heteronormativity is often linked to heterosexism and homophobia.
Origin of the term
Michael Warner popularized the term in 1991, in one of the first major works of queer theory. The concept's roots are in Gayle Rubin's notion of the "sex/gender system" and Adrienne Rich's notion of compulsory heterosexuality.
In a series of articles, Samuel A. Chambers calls for an understanding of heteronormativity as a concept that reveals the expectations, demands, and constraints produced when heterosexuality is taken as normative within a society. Originally conceived to describe the norms against which non-heterosexuals struggle, "heteronormativity" quickly became incorporated into both the gender and the transgender debate.
Critics of heteronormative attitudes, such as Cathy J. Cohen, Michael Warner, and Lauren Berlant, argue that they are oppressive, stigmatizing, marginalizing of perceived deviant forms of sexuality and gender, and make self-expression more difficult when that expression does not conform to the norm. This includes lesbian, gay, bisexual, intersex, transgender (LGBTQ) people, as well as others such as racial minorities. Heteronormative culture "privileges heterosexuality as normal and natural" and fosters a climate where LGBTQ are discriminated against in marriage, tax codes, and employment.
Against gay, lesbian, and bisexual individuals
According to cultural anthropologist Gayle Rubin, heteronormativity in mainstream society creates a "sex hierarchy" that gradates sexual practices from morally "good sex" to "bad sex." The hierarchy places reproductive, monogamous sex between committed heterosexuals as "good" and places any sexual acts and individuals who fall short of this standard lower until they fall into "bad sex." Specifically, this places long-term committed gay couples and promiscuous gays in between the two poles. Patrick McCreery, lecturer at New York University, views this hierarchy as partially explanatory for the stigmatization of gay people for socially "deviant" sexual practices that are often practiced by straight people as well, such as consumption of pornography or sex in public places.
McCreery states that this heteronormative hierarchy carries over to the workplace, where gay, lesbian and bisexual individuals face discrimination such as anti-homosexual hiring policies or workplace discrimination that often leaves "lowest hierarchy" individuals such as transsexuals vulnerable to the most overt discrimination and unable to find work.
Applicants and current employees can be legally passed over or fired for being non-heterosexual or perceived as non-heterosexual in many countries, such as the case with chain restaurant Cracker Barrel, which garnered national attention in 1991 after they fired an employee for being openly lesbian, citing their policy that employees with "sexual preferences that fail to demonstrate normal heterosexual values were inconsistent with traditional American values." Workers such as the fired employee and others, such as effeminate male waiters (allegedly described as the true targets), were legally fired by work policies "transgressing" against "normal" heteronormative culture.
Analysing the interconnectivity of heteronormativity and sexual employment discrimination, Mustafa Bilgehan Ozturk traces the impact of patriarchal practices and institutions on the workplace experiences of lesbian, gay and bisexual employees in a variety of contexts in Turkey, demonstrating further the specific historicities and localised power/knowledge formations that give rise to physical, professional and psycho-emotive acts of prejudice against sexual minorities.
Relation to marriage and the nuclear family
Modern family structures in the past and present vary from what was typical of the 1950s nuclear family. The families of the second half of the 19th century and early 20th century in the United States were characterized by the death of one or both parents for many American children. In 1985, the United States is estimated to have been home to approximately 2.5 million post-divorce, stepfamily households containing children. During the late 80s, almost 20% of families with children headed by a married couple were stepfamilies.
Over the past three decades rates of divorce, single parenting, and cohabitation have risen precipitously. Nontraditional families (which diverge from "a middle-class family with a bread-winning father and a stay-at-home mother, married to each other and raising their biological children") constitute the majority of families in the United States today. Shared Earning/Shared Parenting Marriage (also known as Peer Marriage) where two heterosexual parents are both providers of resources and nurturers to children has become popular. Modern families may also have single-parent headed families caused by divorce, separation or death, families who have two parents who are not married but have children, or families with same-sex parents. With artificial insemination, surrogate mothers, and adoption, families do not have to be formed by the heteronormative biological union of a male and a female.
The consequences of these changes for the adults and children involved are heavily debated. In a 2009 Massachusetts spousal benefits case, developmental psychologist Michael Lamb testified that parental sexual orientation does not negatively affect childhood development. "Since the end of the 1980s... it has been well established that children and adolescents can adjust just as well in nontraditional settings as in traditional settings," he argued. However, columnist Maggie Gallagher argues that heteronormative social structures are beneficial to society because they are optimal for the raising of children. Australian-Canadian ethicist Margaret Somerville argues that "giving same-sex couples the right to found a family unlinks parenthood from biology".
|Wikinews has related news: Dr. Joseph Merlino on sexuality, insanity, Freud, fetishes and apathy|
Intersex people have biological characteristics that are ambiguously either male or female. If such a condition is detected, intersex people in most present-day societies are almost always assigned a normative sex shortly after birth. Surgery (usually involving modification to the genitalia) is often performed in an attempt to produce an unambiguously male or female body, with the parents'—rather than the individual's—consent. The child is then usually raised and enculturated as a cisgender member of the assigned sex, which may or may not match their emergent gender identity throughout life or some remaining sex characteristics (for example, chromosomes, genes or internal sex organs).
The transgender people who seek sex reassignment therapy fall under the transsexual demographic underneath the 'transgender umbrella'. They may not develop a gender identity that corresponds to their body or a gender identity that is plainly male or female. Transgender people may not behave according to the gender role imposed by society. Some societies consider transgender behavior a crime worthy of capital punishment, including Saudi Arabia and many other nations.
In some cases homosexuals were forced to undergo sex change treatments to "fix" their sex or gender: in some European countries during the 20th century, and in South Africa in the 1970s and 1980s.
In some countries, including North American and European countries, certain forms of violence against transgender people may be tacitly endorsed when prosecutors and juries refuse to investigate, prosecute, or convict those who perform the murders and beatings (currently, in some parts of North America and Europe). Other societies have considered transgender behavior as a psychiatric illness serious enough to justify institutionalization.
In medical communities with these restrictions, patients have the option of either suppressing transsexual behavior and conforming to the norms of their birth sex (which may be necessary to avoid social stigma or even violence) or by adhering strictly to the norms of their "new" sex in order to qualify for sex reassignment surgery and hormonal treatments. Attempts to achieve an ambiguous or "alternative" gender identity would not be supported or allowed. Sometimes sex reassignment surgery is a requirement for an official gender change, and often "male" and "female" are the only choices available, even for intersex and transgender people. For governments which allow only heterosexual marriages, official gender changes can have implications for related rights and privileges, such as child custody, inheritance, and medical decision-making.
Homonormativity is the assimilation of heteronormative ideals and constructs into LGBTQ culture and individual identity. The term was used prominently by Lisa Duggan in 2003, although transgender studies scholar Susan Stryker has noted that it was also used by transgender activists in the 1990s in reference to the imposition of gay/lesbian norms over the concerns of trans people. According to Penny Griffin, Politics and International Relations lecturer at the University of New South Wales, homonormativity upholds neoliberalism rather than critiquing monogamy, procreation, and binary gender roles as heterosexist and racist. Duggan asserts that homonormativity fragments LGBTQ communities into hierarchies of worthiness. LGBTQ people that come the closest to mimicking heteronormative standards of gender identity are deemed most worthy of receiving rights. LGBTQ individuals at the bottom of the hierarchy (bi/pan spectrum people, binary trans people, non-binary people, people of non-Western genders, intersex people) are seen as an impediment to this elite class of homonormative individuals receiving their rights. For example, one empirical study found that in the Netherlands, transgender people and other gender non-conforming LGBTQ people are often looked down upon within their communities for not acting "normal." Those who do assimilate often become invisible in society and experience constant fear and shame about the non-conformers within their communities.
- Lovaas, Karen, and Mercilee M. Jenkins. "Charting a Path through the 'Desert of Nothing.'" Sexualities and Communication in Everyday Life: A Reader. 8 July 2006. Sage Publications Inc. 5 May 2008
- Warner, Michael (1991), "Introduction: Fear of a Queer Planet". Social Text; 9 (4 ): 3–17
- Adrienne Rich, 'Compulsory Heterosexuality and Lesbian Existence' Signs: Journal of Women in Culture and Society, 5:631-60, 1980.
- Samuel A. Chambers, "Telepistemology of the Closet; Or, the Queer Politics of Six Feet Under". Journal of American Culture 26.1: 24–41, 2003
- Samuel A. Chambers, "Revisiting the Closet: Reading Sexuality in Six Feet Under, in Reading Six Feet Under. McCabe and Akass, eds. IB Taurus, 2005.
- Weiss, Jillian Todd (2001). "The Gender Caste System: Identity, Privacy and Heteronormativity" (PDF). Tulane Law School. Retrieved 2007-02-25.
- Krupat, Kitty (2001). Out at Work: Building a Gay-Labor Alliance. U of Minnesota Press. p. 268. ISBN 0-8166-3741-5.
- Rubin, Gayle. Thinking Sex: Notes for a Radical Theory of the Politics of Sexuality, in Vance, Carole. Pleasure and Danger: Exploring Female Sexuality (1993)
- Ozturk, Mustafa Bilgehan. "Sexual Orientation Discrimination: Exploring the Experiences of Lesbian, Gay and Bisexual Employees in Turkey, Human Relations, August 2011, 64(8), 1099-1118
- Coontz, S. (1992)
- Coleman, M., Ganong, L. H., & Goodwin, C. (1994). "The presentation of stepfamilies in marriage and family textbooks: A reexamination". Family Relations 45, 289–297.
- Coleman, Ganong, & Goodwin, 1994.
- Benfer, Amy. The Nuclear Family Takes a Hit, Salon.com. June 7, 2001
- Michael Lamb, Ph.D.: Affidavit – United States District Court for the District of Massachusetts (2009)
- Maggie Gallagher (2003-09-04). "Why Marriage Matters: The Case for Normal Marriage. Testimony before the U.S. Senate Subcommittee on the Constitution, Civil Rights, and Property Rights Hearing: "What is needed to defend the Bipartisan Defense of Marriage Act of 1996?"". Institute for Marriage and Public Policy. Retrieved 2012-05-22.
- Margaret Somerville – In Conversation
- Fausto-Sterling, Anne. 2000. Sexing the Body: Gender Politics and the Construction of Sexuality. New York: Basic Books.
- Butler, Judith. 2004. Undoing Gender. New York: Routledge.
- Wilchins, Riki. 2002. 'A certain kind of freedom: power and the truth of bodies – four essays on gender.' In GenderQueer: Voices from beyond the sexual binary. Los Angeles: Alyson Books 23–66.
- Saudis Arrest 5 Pakistani TGs
- The Unkindest Cut | The science and ethics of castration
- Turing, Alan (1912–1954)
- Gays tell of mutilation by apartheid army
- Frye, Phyllis (Fall 2000). "The International Bill of Gender Rights vs. The Cide House Rules: Transgender people struggle with the courts over what clothing they are allowed to wear on the job, which restroom they are allowed to use on the job, their right to marry, and the very definition of their sex". William and Mary Journal of Women and the Law 7: 139–145.
- "OUTfront! Lesbian, Gay, Bisexual & Transgendered Human Rights:"Battybwoys affi dead" Action against homophobia in Jamaica". AmnestyUSA.org. May 7, 2004. Retrieved 4 June 2010.
- SPLCenter.org: 'Disposable People'
- Sydney Morning Herald, March 18, 2010, Chi Tranter, "Norrie's 'ungendered' status withdrawn", http://news.smh.com.au/breaking-news-national/norries-ungendered-status-withdrawn-20100318-qhw5.html
- Duggan, Lisa. The Twilight of Equality?: Neoliberalism, Cultural Politics, and the Attack On Democracy. Beacon Press, 2003.
- Stryker, Susan. 2008. "Transgender History, Homonormativity, and Disciplinarity". Radical History Review. (100): 145-157.
- Griffin, Penny. "Sexing the Economy in a Neo-liberal World Order: Neo-liberal Discourse and the (Re)Production of Heteronormative Heterosexuality." British Journal of Politics and International Relations 9.2 (2007): 220–238. Academic Search Premier. EBSCO. MCTC LIBRARY. 30 June 2009.
- Robinson, Brandon Andrew. 2012. "Is This What Equality Looks Like?: How Assimilation Marginalizes the Dutch LGBT Community." Sexuality Research & Social Policy 9(4): 327-336. DOI: 10.1007/s13178-012-0084-3
- Benfer, Amy. "The Nuclear Family Takes a Hit." Salon.com 7 June 2001. 5 May 2008 .
- Dreyer,Yolanda. "Hegemony and the Internalisation of Homophobia Caused by Heteronormativity." Department of Practical Theology. 2007. University of Pretoria.5 May 2008 .
- Gray, Brandon."'Brokeback Mountain' most impressive of Tepid 2005."Box Office Mojo, LLC. 25 February 2006. 7 May 2008. .
- Lovaas, Karen, and Mercilee M. Jenkins. "Charting a Path through the 'Desert of Nothing.'" Sexualities and Communication in Everyday Life: A Reader. 8 July 2006. Sage Publications Inc. 5 May 2008 .
- Peele, Thomas. Composition Studies, Heteronormativity, and Popular Culture. 2001 Boise State University. 5 May 2008. .
- The Pew Forum on Religion and Public Life. "U.S. Religious Landscape Survey." 7 May 2008. 7 May 2008. .
- Judith Butler, Bodies That Matter
- Judith Butler, Gender Trouble
- Dag Øistein Endsjø, Sex and Religion. Teachings and Taboos in the History of World Faiths. Reaktion Books 2011.
- Michel Foucault, History of Sexuality
- Chrys Ingraham: The Heterosexual Imaginary: Feminist Sociology and Theories of Gender: Sociological Theory: July 1994
- Michael Warner, ed. Fear of a Queer Planet. Minneapolis MN: University of Minnesota Press, 1993.
- Jillian Todd Weiss: The Gender Caste System – Identity, Privacy, and Heteronormativity
- Recent academic article on legal challenges that have been made to the heteronormativity of marriage
- "Heteronormativity and the European Court of Human Rights" examines heteronormativity in the context of human rights and judicial decision making
|
Topic: The table shows the percentage of journeys made by different forms of transport in four countries, The bar graph shows the results of a survey into car use.
Summarise the information by selecting and reporting the main features, and make comparisons where relevant.
- Sample Essay for Academic IELTS Writing Task 1 Topic 08 – Table
- Sample Essay for Academic IELTS Writing Task 1 Topic 24 – Graph
- Sample Essay for Academic IELTS Writing Task 1 Topic 23 – Bar Graph
- Sample Essay for Academic IELTS Writing Task 1 Topic 22 – Bar Chart
- Sample Essay for Academic IELTS Writing Task 1 Topic 21 – Pie Chart
Write at least 150 words.
|Journeys made by||Canada||Belgium||Germany||Netherland|
The table compares modes of transport used in four countries: Canada, Belgium, Germany and the Netherlands. Percentage of journeys made by car, bicycle, public transport and on foot are given. The bar chart shows the results of a survey into reasons people in the Canada travel to work by car.
As can be seen from the table, cars were the most frequently used from of transport in all four countries. However, the proportion of journeys made by car ranged from a low of 47 per cent in the Netherlands to a high of 90 per cent in the Canada. Figures for the other forms of transport also varied considerably. Not surprisingly, in the Netherlands, a high proportion of trips were made by bicycle (26%) and on foot (18%). The highest rate of public transport use was in Germany, where nearly one in five journeys was made by public transport.
The bar chart provides information that may help explain why car use in the Canada. The most frequently cited reason was lack of any other alternative (38%). Although a sizeable percentage said it was more convenient (12%), the other factors listed appeared to relate more to need than preference, e.g. working night shift.
Overall, the figures show considerable variation in modes of transport used, though the car continues to dominate in most contexts.
THIS TEST IS COLLECTED & IMPLEMENTED BY IELTSMATERIAL.COM
( Free IELTS Practice Tests – Reading, Listening, Writing, Speaking Test|
IELTS Exam Preparation – Free IELTS material and resources.
p style=”text-align: right;”>Download IELTS Preparation Material & Tips)
Latest posts by IELTS Material (see all)
- IELTS Speaking Part 1 Topics 2019 (Sep 2019 – April 2020) & Sample Answers - August 20, 2019
- Cambridge Practice Tests for IELTS Series (1 – 14) Student’s Book with Answers with Audio - May 4, 2019
- All Useful IELTS Writing Lessons & Websites - February 27, 2019
Main IELTS Pages:
This website is to develop your IELTS skills with tips, model answers, lessons, free books, and more. Each section (Listening, Speaking, Writing, Reading) has a complete collection of lessons to help you improve your IELTS skills.
Subscribe for free IELTS lessons/Books/Tips/Sample Answers/Advice from our IELTS experts. We help millions of IELTS learners maximize their IELTS scores!
|
We use the Outer Gap model to explain the spectrum and the energy dependent light curves of the X-ray and soft gamma-ray radiations of the spin-down powered pulsar PSR B1509. In the outer gap, on the two sides of the null charge surface, the particles with different signs move in opposite directions. The particles moving outwards from null charge surface to the light cylinder are accelerated by the strong electric field, and convert the potential drop of the gap to the GeV curvature photons.
On the other hand, the incoming particles can gain energy near the null charge surface, after that, their energy losses caused by the curvature radiation cannot be compensated by the weak electric field. The curvature photons emitted by these incoming particles go pass by the stellar surface and become pairs via the magnetic pair creation. The soft gamma-ray radiation of PSR B1509 is explained as the synchrotron radiation of these pairs, and the outgoing GeV photons, which are observed in other spin-down powered pulsars, are missed by the small viewing angle. The magnetic pair creation requires a large pitch angle, which makes the pulse profile of the synchrotron radiation distinct with that of the curvature radiation.
We use a new method to simulate the pulse profile of the synchrotron radiation with a large pitch angle, and we find that the differences between the light curves of different energy bands are due to the different pitch angles of the secondary pairs, and the second peak that appears when $E>10$MeV originates from the curvature photons emitted closer to the stellar surface, where the stronger magnetic field allows the pair creation to happen under a smaller pitch angle of the photon.
|
Alejandra Echeverri, Jeffrey R. Smith, Dylan MacArthur-Waltz, Katherine S. Lauck, Christopher B. Anderson, Rafael Monge Vargas, Irene Alvarado Quesada, Spencer A. Wood, Rebecca Chaplin-Kramer, Gretchen C. Daily
Nature-based tourism has potential to sustain biodiversity and economic development, yet the degree to which biodiversity drives tourism patterns, especially relative to infrastructure, is poorly understood. Here, we examine relationships between different types of biodiversity and different types of tourism in Costa Rica to address three questions. First, what is the contribution of species richness in explaining patterns of tourism in protected areas and country-wide in Costa Rica? Second, how similar are the patterns for birdwatching tourism compared to those of overall tourism? Third, where in the country is biodiversity contributing more than other factors to birdwatching tourism and to overall tourism? We integrated environmental data and species occurrence records to build species distribution models for 66 species of amphibians, reptiles, and mammals, and for 699 bird species. We used built infrastructure variables (hotel density and distance to roads), protected area size, distance to protected areas, and distance to water as covariates to evaluate the relative importance of biodiversity in predicting birdwatching tourism (via eBird checklists) and overall tourism (via Flickr photographs) within Costa Rica. We found that while the role of infrastructure is larger than any other variable, it alone is not sufficient to explain birdwatching and tourism patterns. Including biodiversity adds predictive power and alters spatial patterns of predicted tourism. Our results suggest that investments in infrastructure must be paired with successful biodiversity conservation for tourism to generate the economic revenue that countries like Costa Rica derive from it, now and into the future.
|
Create a budget
To spend, save, and give to what's important
Here at Goodbudget, we believe the way we spend, save, and give money reflects what we value and what we call important -- for better or for worse. We also believe that it's possible to live a life of generosity while staying within our means, and still make room for our needs and wants. To do that, we have to identify what's truly important so that our money choices accurately reflect that truth.
In this series, we'll introduce you to a budgeting process we believe can help you create a budget that works toward your values. We’ll cover five steps to show how to make that possible. The Budget with a Why process seeks to help you reflect on past money habits, make active decisions to create change, and then live that out in future choices that reflect your values.
Are you ready to get started? Check out Step 1 below.
Step 1: Look in the Mirror
Take a look in the mirror to see your current spending, saving and giving habits. What do you see? Take a look in your mirror.
Step 2: Reflect
Reflect on what your spending, saving and giving decisions say about you. Start your reflection now.
Step 3: Meet your Money Map
Your money map helps direct your spending, saving, and giving decisions toward what’s truly important. Draw your money map.
Step 4: Plan your Route
Get down to the nitty-gritty and plan a budget that reflects what you want to be important. What route will you take?
Step 5: Start your Journey
Make one spending, saving, or giving decision today that's in line with your priorities. That's the first step in living out a budget that works. Get started on your journey!
|
A critical analysis is a form of evaluative writing that aims to analyze and evaluate a work, such as a text, film, artwork, or speech. It involves breaking down the work and examining its various parts, with the goal of understanding how these parts contribute to the whole.
The introduction of a critical analysis serves several important functions. First, it provides background information on the work being analyzed and its context, including the author's purpose and intended audience. This helps the reader understand the work in the context in which it was created, and can also provide useful context for evaluating the work.
Next, the introduction should state the writer's main thesis or argument, which should be based on the analysis of the work. This thesis should be clearly stated and should be supported by evidence from the work itself.
Finally, the introduction should provide an overview of the structure and organization of the critical analysis. This helps the reader understand how the analysis will be organized and what to expect in the subsequent sections of the essay.
In conclusion, the introduction to a critical analysis serves several important functions, including providing context, stating the writer's main thesis, and outlining the structure of the essay. By following these guidelines, the writer can effectively introduce their analysis and set the stage for a thoughtful and insightful evaluation of the work.
Definition and Examples of Critical Analyses
This unwanted and undeserving restrictions made Kamala Das a rebel in her life. MLA format only requires mention of the author and the page number. Conclusion of an essay should be brief аnd concise. Both are equally important when writing a critical analysis essay. STARTING POINT FOR THE PROCEDURES: Once the class procedures are running smoothly, the first author initiates this critical analysis procedure with a handout about Clever HANS, a horse with a supposed math ability, among other skills. It is an age which needs love and freedom.
Ideas of Critical Analysis Essay Example for College Student
Counter-arguments are a crucial part of the causal analysis. Make sure your opinions are not offensive to anyone who might read your essay and make sure that you take the different backgrounds and experiences people might have into consideration. Every context will have different ways that are standard for critical analysis of situations, data, and problems. An analysis is a detailed examination of the evidence that uncovers something new. Now it is very difficult to make a gap between them because the lover has fully surrendered himself to the beloved and vice-versa.
What Is a Critical Analysis Essay? Simple Guide With Examples
After the confession, the man becomes fully prepared for surrendering his self to the Almighty and thereby he gets the relization of the soul. The students see supposed psychic feats at the beginning of class. Use this outline to structure your essay and to ensure your arguments are related to your thesis. A critique of literature has the same characteristics as other types of critical essays. Wadsworth Cengage, 2009 Critically Analyzing Video Games "When dealing with a game's significance, one could analyze the critical analysis.
Choose a debatable thesis so you can back it up with evidence from your sources and anchor your entire paper around it. This ensures you stay focused and on topic and also ensures your analysis has a clear and logical flow of ideas and a defined structure. In other words, in the first part of the poem, we get restrictions, constrains, chains and walls. Accessed 17 October 2019. Read: Benefits of Critical Path Analysis It is more efficient to schedule tasks and projects when critical and noncritical tasks are separated.
Critical Analysis Essay: Full Writing Guide with Examples
Two to four body paragraphs are common, but you may have more or fewer paragraphs depending on any writing guidelines you have received. It suggests a cosmic and eternal love. Evaluating the appeal of the work to a particular audience The Layout of Your Paper Like all other essays, your critical analysis essay should include an introduction, a body, and a conclusion. Their relationship had a rough start, but both of them could get their happy ending by breaking out of old beliefs and habits. In each section, write a few bullet points, including the information you want to cover.
The Critical Analysis Essay: An Introduction and Topic Resources
These events sowed doubt about global technologies and fear in the systems and infrastructure designed to care for us. Hesford and Wendy Kozol open their introduction with a critical analysis of a documentary based on a picture: the photograph of an unknown Afghan girl taken by Steve McCurry and gracing the cover of National Geographic in 1985. You can also have a colleague, friend, family member, or professional editor proofread your work as well. It should involve who, what, where, when, why and how. She cut her hair short and ignored the womanliness. Typically, critical analyses include an introduction, two to three body paragraphs, and a conclusion.
Writing a critical analysis requires lots of essential reading, as authors always use rhetorical techniques to gain your trust. Do not write in the style of someone else but try to get comfortable with your style. Even if they are understood, they may not resonate as deeply with the reader as more modern words would. If you have the freedom to choose the topic, select one of your interests, something you are passionate about, and you have an idea already formed based on your knowledge and life experience. Thanks for stopping by! Write a section that introduces your audience to the work you're analyzing and your opinions about it.
How To Write a Critical Analysis (With Examples and Tips)
And now, the poetess has got what she wanted. Techniques that Sir Ken Robinson to emotionally appeal to the viewer in his TED talk Do Schools Kill Creativity? The conclusion is very important to bе able to summarize the main points in your essay аnd not repeat information that yоu have already stated. Discover new ways to engage with what you read, watch, experience, or listen to using our helpful tips for writing a critical analysis essay. Now Kamala Das recalls her adolescent age when she in on the threshold of puberty, neither child nor young enough to be married. It can be an analysis of any type of work, such as a piece of literature, a TV program, a film, a business process, or an academic report. A critical review is generally one to four pages in length and has a structure similar to the one given here.
It reminds us of the famous statement of Manusmiriti which says that a woman is never free. In other words, in the domain of art and literature, manner is more important than matter. This guide will help you with the whole writing process, so read on to learn more. This is just one way to structure a critical analysis essay, so feel free to experiment with other outlines as you try to determine what works best for you. Planning the analysis should commence with bullet points of the key points you want to make about the work. A critical analysis examples essay is one in which you evaluate a topic, step back from it, and look at it critically.
For example, there is some suspension of disbelief that even young children of the 1980s would find coolness in pretending to be attacked by a dog or playing the air piano. On the other hand, a critical analysis essay explains the significance of that subject and your personal viewpoint on the matter. Conclusion This last section is where you remind the readers of your thesis and make closing remarks to wrap up your essay. Students often pick controversial statements, articles, or events, because they lend themselves easily to critical analysis. Critical Essay Outline: Conclusion The final stage of essay writing is to ensure you have proven your arguments.
|
Lotteries are games of chance where you choose a set of numbers and hope to match them with the numbers drawn. You can win small prizes or even huge cash prizes. Typically, a lottery is a form of gambling run by a state or city.
Lotteries have a long history. In the Roman Empire, they were a popular form of entertainment. They were also used by emperors to give away property, including slaves.
Lotteries have also been tolerated in some countries. During the Renaissance, some towns held public lotteries to raise money for poor citizens and town fortifications.
Several American colonies used lotteries to finance local militias. During the American Revolution, the Continental Congress passed a lottery scheme. This failed after 30 years, however.
Lotteries were introduced to the United States by British colonists. They were not banned until the 1840s. There were about 420 lotteries in eight states by the 1832 census.
The earliest European lottery dates back to the first half of the 15th century. It is recorded that the first modern European lottery was held in the Italian city-state of Modena.
Lotteries were used to raise funds for various public purposes, including bridges, libraries and roads. They were also used for financing colleges and fortifications.
Most lotteries now use computers to record the bets and winning numbers. A computer can generate random numbers and can store a large number of tickets.
Some lotteries are organized by a hierarchy of sales agents who pass the ticket proceeds through an organization. These organizations then divide the pool among the winners.
|
Parents often worry about children’s activities and how much time child should be allowed to play or do the homework during school day. Education experts as well as pediatricians has recommendations on child’s school day activity time that could help parents to understand how much time should be allotted for various activities of a child.
- Physical activity: According to American Association of Pediatrics, everyday 60 minutes physical activity helps children to be fit and healthy. In the 60 minutes children can play in the play ground, play in school football / soccer team, play with friends and classmates or take a karate class. Any sort of physical activity that helps to build strength in child is recommended everyday for 60 minutes.
- Outdoor time spending: To get benefit of Sun and nature, children must spend time outside. Sitting and bound to indoor for long hours results in loneliness and affects social behavior, can lead to vision problem and obesity related to overweight. Outdoor walking or playing at least 60 minutes a day in the green nature is good for children health. This outdoor activity can be unstructured and children can play or read sitting on bench.
- Socializing time: Having friends will help children to build social skills. They will understand the nature of living together, will learn to listen, share and help others. Friendship will help them to control and handle the emotions. Half an hour to couple of hours spending time with friends is recommended. If parents feel that their child need to mingle and socialize more to learn certain skills or to overcome shyness then, they can decide how much time their child should spend in socializing based on child’s behavior.
- Spending time with parents: Daily encourage and spend some time with child. If parent is stressed out and push themselves to spend time with children will have negative effect on children’s growth. Parents need to make sure that while talking and spending time with young minds a positive conversation will boost child’s morality. Don’t stress on spending time with children. If both parents and children have common time to spend together, everyday then child should get benefit from positive attention. Pediatricians recommend a quality time of 6 hours per week with children.
- Sleep time: According to child’s age recommended sleep time for children
a) 14 to 19 – At least 9 hours sleep
b) 6-13-year-old need 9-11 hours of sleep
c) 5 year kindergarten child need 11-13 hours sleep
o Time in school classroom: Children go to school most part of the year. Once they are inside the classroom they need to concentrate on learning and studies. On an average recommended timing in the class room for a child is 6.7 hrs. per day in an academic year (PS -The number of school days might vary in different schools). This time is enough for child to sit and listen and learn the subjects that are allotted for the year.
o Homework time: Based on the grade of the children homework time varies. Recommended time to do homework everyday for a kindergarten child is 10 minutes per evening. Frist grade and second grade children – 30 minutes, Fourth and fifth grade – 50 minutes. Sixth grade – 15 minutes per academic class, Seventh and eighth – 20 minutes per subject, Ninth and 10 the grades = 25 minutes ;per subject, 11th and 12th -30 minutes per subject. However, parents must also understand that time spending on homework depends on child’s ability to learn and practice skills. If homework is more then expect child to spend little more time on each subject or it depends on the requirement of an assignment or type of coursework. If you feel your child is spending too much time on homework and getting less sleep – talk to child to know more about homework policy or any issues that child might be facing.
Electronic screen: Everyday 20 mins to half an hour time should be sufficient for a child to play with smart phone. The negative impact of playing with smart phone is more. In fact, children below age 10 should not be encouraged to handle smart phones. Watching TV for entertainment is an hour to 2 hrs per day.
- Image credit: Photo by Yogendra Singh on Unsplash (Free for commercial use)
Author: Sumana Rao | Posted on: August 19, 2019
|
David Ivory argues the variation in energy received from the sun has a much greater effect on global temperature balance than the effect of greenhouse gases.
The scientific and public debate on what causes global warming has been very one-sided.
The claim the so-called greenhouse gases (chiefly the natural biological products, carbon dioxide, methane and nitrous oxide) are the cause of global warming is only a theory.
It is not fact or an unequivocal truth, even though the proponents of the theory would want to claim the science behind their theory is beyond debate and supported by an overwhelming majority of scientists.
The reality is the scientists associated with climate change groupings represent only a small proportion of the total physical and biological scientists around the world, but collectively they have had an inordinately large influence on governments and policy makers.
In addition, they have adopted a condescending tactic to rebut criticism by disparaging or questioning the integrity or knowledge of those who oppose their point of view by labelling them deniers and sceptics and to claim the majority of scientists accept the so-called science of greenhouse gas-induced global warming.
|
The first demonstration of proton-driven plasma wakefield acceleration is reported online this week in Nature. The results represent a step towards the development of future high-energy particle accelerators.
High-energy particle accelerators have been crucial in providing a deeper understanding of fundamental particles, and plasma wakefield acceleration has the potential to usher in a generation of more powerful, smaller particle accelerators. Ordinarily, the technique delivers high-energy acceleration by using an intense laser pulse or a bunch of electrons to create a plasma wave (wakefield) that particles such as electrons can ride in order to achieve large acceleration and high energy gains.
The AWAKE Collaboration presents the first demonstration of proton-driven plasma wakefield acceleration - where it is bunches of protons that drive the wakefield into which electrons are injected. The use of protons can result in electron acceleration to higher energies in a single accelerating stage, rather than the multiple stages required by other plasma wakefield acceleration techniques. The authors measured electrons accelerated up to 2 gigaelectronvolts (GeV) in ten metres of plasma.
Although still in the early stages of research, the results from this inaugural test of proton-driven plasma acceleration are highly encouraging.
|
Human mortality from H5N1
Human mortality from H5N1 or the human fatality ratio from H5N1 or the case-fatality rate of H5N1 refer to the ratio of the number of confirmed human deaths resulting from confirmed cases of transmission and infection of H5N1 to the number of those confirmed cases. For example, if there are 100 confirmed cases of humans infected with H5N1 and 10 die, then there is a 10% human fatality ratio (or mortality rate). H5N1 flu is a concern due to the global spread of H5N1 that constitutes a pandemic threat. The majority of H5N1 flu cases have been reported in southeast and east Asia. The case-fatality rate is central to pandemic planning. While estimates of case-fatality (CF) rates for past influenza pandemics have ranged from about 0.1% (1957 and 1968 pandemics) to 2.5% (1918 pandemic); the official World Health Organization estimate for the current outbreak of H5N1 avian influenza to date is around 60%. While the real H5N1 CF rate (what it would be if we had perfect knowledge) could be lower (one study suggests that the real H5N1 CF rate is closer to 14–33%); it is unlikely that, if it becomes a pandemic, it will go to the 0.1–0.4% level currently embraced by many pandemic plans.
H5N1 infections in humans are generally caused by bird to human transmission of the virus. Until May 2006, the WHO estimate of the number of human to human transmission had been "two or three cases". On May 24, 2006, Dr. Julie L. Gerberding, director of the United States Centers for Disease Control and Prevention in Atlanta, estimated that there had been "at least three." On May 30, Maria Cheng, a WHO spokeswoman, said there were "probably about half a dozen," but that no one "has got a solid number." The cases of suspected human to human transmission that continue to be found have been isolated and contained, and include transmission among members of a family in Sumatra, Indonesia in June 2006 as well as earlier and later instances arising in other countries. However, no pandemic strain of H5N1 has yet been found. The key point is that, at present, "the virus is not spreading efficiently or sustainably among humans."
H5N1 vaccines for chickens exist and are sometimes used, although there are many difficulties that make it especially difficult to decide whether vaccination will do more harm than good. In the U.S. H5N1 pre-pandemic vaccines exist in quantities sufficient to inoculate a few million people and might be useful for priming to "boost the immune response to a different H5N1 vaccine tailor-made years later to thwart an emerging pandemic". Japan has inoculated 6,000 health care workers with a pre-pandemic vaccine, and is planning how to proceed with widespread vaccinations, particularly workers who would provide utilities during an outbreak. Switzerland is also considering preemptive vaccination to protect the general public. H5N1 pandemic vaccines and the technologies to rapidly create them are in the H5N1 clinical trials stage but cannot be verified as useful until after a pandemic strain emerges. Efforts to identify the changes that might result in a human-communicable strain have resulted in laboratory-generated H5N1 with substantially greater affinity for human cellular receptors after a change of just two of the H5 surface proteins. Significantly, mouse antibodies were 10 times less potent against the mutants than against the pre-mutated viruses.
H5N1 cases in humans
A graphic exhibiting total cases and mortality incidence is kept current by the WHO at http://www.wpro.who.int/NR/rdonlyres/7549914F-5C83-4418-8C20-007ADCC07C61/0/s3.jpg and complements the country-specific information shown below.
Country-specific totals of cases and deaths kept current by the WHO may be viewed by clicking through the links provided at http://www.who.int/csr/disease/avian_influenza/country/en/ Epidemic and Pandemic Alert and Response (EPR) Confirmed Human Cases of Avian Influenza A(H5N1)
Source: World Health Organization Human Animal Interface)
A strain of H5N1 killed chickens in 1959 in Scotland and turkeys in 1991 in England. This strain was "highly pathogenic" (deadly to birds) but caused neither illness nor death in humans. "The precursor of the H5N1 influenza virus that spread to humans in 1997 was first detected in Guangdong, China, in 1996, when it caused a moderate number of deaths in geese and attracted very little attention." In 1997, in Hong Kong, 18 humans were infected and 6 died in the first known case of H5N1 infecting humans. H5N1 had evolved from a zero mortality rate to a 33% mortality rate.
The first report, in the current wave of HPAI A(H5N1) outbreaks, was of an outbreak that began December 10, 2003 in the Republic of Korea and continued for fourteen weeks. This strain caused asymptomatic infections in humans and may have died out, like the 1959 strain, so that its low mortality level would have little value for predicting the mortality rate of a pandemic evolving from existing HPAI A(H5N1) strains. The apparently extinct strain that caused human deaths from H5N1 in the Northern part of Vietnam in 2003, 2004 and 2005 also had a much lower case mortality rate than the currently existing strains. Changes are occurring in H5N1 that are increasing its pathogenicity in mammals.
From inception through 2007, the total number of WHO-confirmed cases was 349, with 216 of those fatalities (as reported by the U.N. on January 15, 2008, confirming earlier deaths) reflecting a 62% fatality rate among WHO-confirmed cases through 2007. These overall figures fail to bring forward fluctuations that have appeared from year to year and in particular geographic areas. In 2005, when a markedly less-lethal strain in Northern Vietnam was responsible for most of the cases reported worldwide, only 42 of 97 people confirmed by the WHO to be infected with H5N1 died — a 43% fatality rate. In 2006, the case fatality ratio was higher among the WHO-confirmed cases, with 79 deaths among 114 confirmed cases.— or 69%. In 2007, 59 of the 86 WHO-confirmed cases ended in death, again a 69% fatality rate. And 24 of the first 31 cases of 2008 (to April 30, 2008) have been fatal, or 77%.
The higher total case fatality ratio after the end of 2005 may reflect the widespread circulation in Vietnam of a less-lethal clade of H5N1 in 2005, which was subsequently brought under control. The change was nonetheless interpreted by some as indicating that the virus itself was becoming more deadly over time. In fact, when less-virulent strains die off, the surviving strains are the more virulent. Such difficulties in interpretation underscore that the global case fatality ratio can serve as but a crude and imperfect summary of the current complex situation with its many contributing factors, and not a clear or reliable predictive tool. If and when an influenza pandemic arises from one of the currently circulating pre-pandemic strains of Asian lineage HPAI A(H5N1), the mortality rates for the resulting human adapted pandemic strain cannot be predicted with any confidence.
Existing pre-pandemic global case fatality ratio
The global case fatality ratio looks only to the official tally of cases confirmed by the WHO. It takes no account of other cases, such as those appearing in press reports. Nor does it reflect any estimate of the global extent of mild, asymptomatic, or other cases which are undiagnosed, unreported by national governments to the WHO, or for any reason cannot be confirmed by the WHO. While the WHO's case count is clearly the most authoritative, these unavoidable limitations result in an unknown number of cases being omitted from it. The problem of overlooked but genuine cases is emphasized by occasional reports in which later serology reveals antibodies to the H5N1 infection in the blood of persons who were never known to have bird flu, and who then are confirmed by the WHO only retroactively as "cases." Press reports of such cases, often poultry handlers, have appeared in various countries. The largest number of asymptomatic cases was confirmed in 2006 among Korean workers who had assisted in massive culls of H5N1-infected poultry. This relatively benign Korean strain of H5N1 has died out, and the remaining strains of H5N1 have a higher case fatality rate in humans.
Unconfirmed cases have a potentially huge impact on the case fatality ratio. This mathematical impact is well-understood by epidemiologists, and is easy to see in theory. For example, if for each confirmed case reported by the WHO we assume that there has been another mild and unreported case, the actual global number of cases would be double the current number of WHO-confirmed cases. The fatality ratio for H5N1 infections would then be calculated as the same number of deaths, but divided by a doubled number for total cases, resulting in a hypothetical death ratio of half the currently reported fatality ratio. Such a result would indicate to epidemiologists that the world was confronting an H5N1 virus that is less-lethal than currently assumed, although possibly one that was more contagious and difficult to track.
A case-fatality ratio based on an accurate and all-inclusive count of cases would be invaluable, but unfortunately it is impossible to attain. The ability to diagnose every case of H5N1 as it arises does not exist. A few small reported studies have attempted to gather preliminary data on this crucial statistic, by carrying out systematic blood testing of neighbors and contacts of fatal cases in villages where there had been confirmed H5N1 fatalities. In most cases, this testing failed to turn up any overlooked mild cases, though in at least one study mild overlooked cases were identified. These methodical studies of contacts provide significant evidence that the high death rate among confirmed cases in the villages where these studies were carried out cannot be simply attributed to a wholesale failure to detect mild cases. Unfortunately, these studies are likely to remain too few and sketchy to define the complex situation worldwide regarding the lethality of the varying H5N1 clades. The testing and reporting necessary for mass serology studies to determine the incidence of overlooked cases for each existing clade and strain of H5N1 worldwide would be prohibitively costly.
Hence the precise allocation of infections by the various H5N1 clades across the spectrum including lethal, serious, mild, and asymptomatic cases is likely to remain unknown in both humans and the hundreds of other species it can infect. Scientists are very concerned about what we do know about H5N1; but even more concerned about the vast amount of important data that we don't know about H5N1 and its future mutations.
Review of patient ages and outcomes reveals that H5N1 attacks are especially lethal in pre-adults and young adults, while older victims tend to have milder attacks and to survive. This is consistent with the frequent development of a cytokine storm in the afflicted. Few persons over 50 years of age seem to have become infected by H5N1, and very few have died after suffering an H5N1 attack. Instead, the age-fatality curve of H5N1 influenza attacks in humans resembles that of the 1918 Spanish pandemic flu, and is the opposite of the mortality curve of seasonal flu strains, since seasonal influenza preferentially kills the elderly and does not kill by cytokine storm. An additional factor which may be active is that H1N1 was the predominate human flu circulating from 1918 until 1957 when the H2N2 strain emerged. Hence those over 50 years old have had the opportunity to be exposed to H1N1, and to develop some immune response to the N1 group contained in that human form of flu. Likewise, annual flu vaccination includes inoculation against a type-A human H1N1 flu, leading to the possibility that the annual flu shot or Flumist inoculation might confer some immunity against H5N1 bird flu infection, and indeed testing the blood of volunteers to look for immune response to H5N1 found that some blood samples showed immunity, but more of the blood samples of persons who had received the flu shot showed an immune response.
Another factor complicating any attempt to predict lethality of an eventual pandemic strain is the variability of the resistance of human victims to the pathogen. Many human victims of the current H5N1 influenza have been blood relatives (but rarely spouses) of other victims. Though this observation seemed to suggest that a familial genetic susceptibility might have played a role in human infection, a study by researchers at the Harvard School of public health noted no significant familial pattern of infection. Clearly, those whose immune systems are best able to fight off the virus are the most likely to survive a pandemic. Those with impairment of the needed immune function, whether from familial genetics or from AIDS, have poorer chances. Moreover, the health care system is generally expected to be overwhelmed throughout a pandemic. Persons needing access to medical care, whether for influenza or for unrelated serious maladies, are unlikely to receive the accustomed care, and without it their survival chances will be reduced.
Predicting pandemic mortality rate
Although the actual rate of mortality during a pandemic is unknowable in advance, it is pressing to predict the possible ranges for that lethality responsibly in advance. The pre-pandemic case fatality ratio of over 50% provides a grim backdrop for the fact that the currently circulating H5N1 strains have certain genetic similarities with the Spanish Influenza pandemic virus. In that pandemic, 50 million to 100 million people worldwide were killed during about a year in 1918 and 1919. The highly lethal second and third waves of the 1918 Spanish flu evolved through time into a less virulent and more transmissible human form. Although the overall fatality rate for the Spanish Flu was at most 1% to 2% of the population, the lethal waves of the Spanish Flu are not reported to have emerged with anything like the over-50% case fatality ratio observed to date in human H5N1 infection. Studies indicating that an H5N1 pandemic may be more pathogenic than was the Spanish Flu include a mouse study in which the H5N1 virus elicited significantly higher levels of pro-inflammatory cytokines in the lungs.
Unfortunately, a human H5N1 pandemic might emerge with initial lethality resembling that over-50% case fatality now observed in pre-pandemic H5N1 human cases, rather than with the still-high 1-2% seen with the Spanish Flu or with the lower rates seen in the two more recent influenza pandemics. As a WHO working group noted,
Determinants of virulence and transmissibility.
- ... One especially important question is whether the H5N1 virus is likely to retain its present high lethality should it acquire an ability to spread easily from person to person, and thus start a pandemic. Should the virus improve its transmissibility by acquiring, through a reassortment event, internal human genes, then the lethality of the virus would most likely be reduced. However, should the virus improve its transmissibility through adaptation as a wholly avian virus, then the present high lethality could be maintained during a pandemic.
- ... We cannot afford simply to hope that human-to-human spread of H5N1 will not happen and that, if it does, the pathogenicity of the virus will attenuate. Notably, the precursor of the severe acute respiratory syndrome (SARS)–associated coronavirus (31) repeatedly crossed species barriers, probably for many years, before it finally acquired the capacity for human-to-human transmission, and its pathogenicity to humans was not attenuated. We cannot wait and allow nature to take its course. SARS was interrupted by early case detection and isolation, but influenza is transmissible early in the course of the disease and cannot be controlled by similar means.
Although some mammalian adaptations have been noted, H5N1 remains better adapted for infecting birds than mammallian hosts, which is why the disease it causes is called a bird flu. No pandemic strain of H5N1 has yet been found. The precise nature and extent of the genetic alterations that might change one of the currently circulating avian influenza strains into a human flu strain cannot be known in advance.
While many of the current H5N1 strains circulating in birds can generate a dangerous cytokine storm in healthy adult humans, the ultimate pandemic strain might arise from a less-lethal strain, or its current level of lethality might be lost in the adaptation to a human host.
If H5N1 mutates so that it can jump from human to human, while maintaining a relatively high level of mortality, how many people could die? Risk communication analysts Peter M. Sandman and Jody Lanard give a round-up of the various estimates:
Worldwide mortality estimates range all the way from 2-7.4 million deaths (the “conservatively low” pandemic influenza calculation of a flu modeling expert at the U.S. Centers for Disease Control and Prevention) to 1000 million deaths (the bird flu pandemic prediction of one Russian virologist). The estimates of most H5N1 experts range less widely but still widely. In an H5N1 pandemic, the experts guess that somewhere between a quarter of us and half of us would get sick, and somewhere between one percent and five percent of those who got sick would die — the young and hale as well as the old and frail. If it's a quarter and one percent, that's 16 million dead; if it's a half and five percent, it's 160 million dead. Either way it's a big number.
The renowned virus expert Robert G. Webster provided perhaps the most extreme estimate when he acknowledged in March 2003 that H5N1 has the theoretical capacity to mutate into a form that could kill one half of the human population, stating, "Society just can't accept the idea that 50 percent of the population could die. And I think we have to face that possibility".
H5N1 may cause more than one influenza pandemic as it is expected to continue mutating in birds regardless of whether humans develop herd immunity to a future pandemic strain. Influenza pandemics from its genetic offspring may include influenza A virus subtypes other than H5N1. While genetic analysis of the H5N1 virus shows that influenza pandemics from its genetic offspring can easily be far more lethal than the Spanish Flu pandemic, planning for a future influenza pandemic is based on what can be done and there is no higher Pandemic Severity Index level than a Category 5 pandemic which, roughly speaking, is any pandemic as bad the Spanish flu or worse; and for which all intervention measures are to be used.
There "is evidence of at least three independent virulence factors connected with three different genes. It is highly unlikely that all of the high-virulence alleles will simultaneously mutate and disappear if and when the haemagglutinin gene changes so as to make the haemagglutinin molecule better adapted for the human-type (alpha-2,6-linked) receptor (which is a necessary prerequisite in order that a pandemic with H5N1 virus may start). It is more probable that evolutionary adaptation of the haemagglutinin of H5N1 viruses to the human-type receptor will happen without any simultaneous change in those other genetic properties that now are important for explaining the exceptionally high virulence of certain strains of avian-adapted H5N1 influenza virus. The change of the haemagglutinin molecule from avian adaptation to human adaptation must be expected to act as an additional virulence factor because it will enhance the total number of cells that can be infected (per host organism), increase the total rate of virus replication and potentiate the effects of the other virulence factors already present." The H5N1 genes work together in ways we don't yet understand. Influenza research is continuing. The genetic factors that make H5N1 so deadly are only partly understood. Known factors involve the surface antigen encoding gene segments H (hemagglutinin) and N (neuraminidase) genes (causing it to be H5N1 for example), as well as the matrix M2 gene, and the polymerase genes.
- "In order to cause a pandemic, H5N1 viruses will have to acquire the ability to transmit efficiently from person to person. The H5 hemagglutinin (HA) is found in influenza viruses that typically infect avian species, so efficient person-to-person spread could happen if the H5N1 virus reassorts, or exchanges genes, with circulating human influenza viruses giving rise to a virus with the H5 HA (to which the population is not immune) in a gene constellation that confers the property of transmissibility. Alternatively, efficient person-to-person spread could occur if the H5N1 virus evolves and adapts to more efficient replication and transmissibility in the human population."
A change of just two genes identified in laboratory testing appears to substantially increase the affinity of H5N1 for binding with human cell surface receptors.
Neuraminidase is an antigenic glycoprotein enzyme found on the surface of the influenza viruses. It helps the release of progeny viruses from infected cells. Flu drugs Tamiflu and Relenza work by inhibiting some strains of neuraminidase. They were developed based on N2 and N9. "In the N1 form of the protein, a small segment called the 150-loop is inverted, creating a hollow pocket that does not exist in the N2 and N9 proteins. [...] When the researchers looked at how existing drugs interacted with the N1 protein, they found that, in the presence of neuraminidase inhibitors, the loop changed its conformation to one similar to that in the N2 and N9 proteins."
The amino acid substitution (Ser31Asn) in the M2 gene in some H5N1 genotypes is associated with amantadine resistance which increases lethality. However the pathogenicity of H5N1/97 was related to the nonstructural (NS) gene. NS codes for two nonstructural proteins (NS1 and NEP). The NS1 gene of the highly pathogenic avian H5N1 viruses circulating in poultry and waterfowl in Southeast Asia is believed to be responsible for an enhanced proinflammatory cytokine response (especially TNFa) induced by these viruses in human macrophages. H5N1 NS1 is characterized by a single amino acid change at position 92. By changing the amino acid from glutamic acid to aspartic acid, researchers were able to abrogate the effect of the H5N1 NS1. This single amino acid change in the NS1 gene greatly increased the pathogenicity of the H5N1 influenza virus. This is one genetic factor in why H5N1 is so deadly.
Polymerase encoding gene segments are also implicated in why H5N1 is so deadly. PA genes code for the PA protein, which is a critical component of the viral polymerase. The PB1 gene codes for the PB1 protein and the PB1-F2 protein. The PB1-F2 protein probably contributes to viral pathogenicity and might have an important role in determining the severity of pandemic influenza. Until H5N1, all known avian influenza viruses had a Glu at position 627, while all human influenza viruses had a lysine. Recently, some 75% of H5N1 human virus isolates identified in Vietnam had a mutation consisting of Lysine at residue 627 in the PB2 protein; a change believed associated with high levels of virulence.
Areas of research
Areas of research to identify the likelihood of rapid or slow evolution to human contagion, or for predicting the greater or lesser likelihood of a rather lethal human-adapted influenza include:
- bird species susceptibility
- bird migration paths
- cell based vaccine development
- adjuvant testing
- human vaccine clinical trials
- bird vaccine testing and use
- computer simulations of pandemic spread patterns (e.g. will grounding flights help?)
- detailed shape and gene code analysis of each of the RNA strands for as many flu virus strains as possible and making them available on a database for study
- wild bird testing for flu viruses
- testing humans for asymptomatic H5N1 infection
- training exercises in case of a pandemic
Computer simulations and direct gene manipulation have yielded inconclusive results.
Scientific advances may attenuate probable lethality. The genetic lethality potential of the initial flu pandemic strain is only one important factor in determining the ultimate outcome in number of human lives lost. Another factor that grows potentially more important with the passage of time is human preparation. For example, no influenza vaccine specific to H5N1 could be produced when it emerged in Hong Kong in 1997, because it was lethal to eggs. Reverse DNA techniques have since made a vaccine possible, and several H5N1 vaccines have been tested and are in production in at least limited quantities. Vaccine development and production facilities are being ramped up, and possible pre-pandemic vaccines are being produced and studied. If a human pandemic does not emerge in the next few years, its eventual emergence may become almost a non-event if a very-effective pre-pandemic vaccine has prepared the population with sufficient herd immunity to blunt its lethality. Indeed, if there is sufficient immunity to stop it at the source, it will not become pandemic.
As long as the likelihood of protecting the population continues to rise with the passage of time, that likelihood becomes an increasingly important factor in predicting the loss of lives and the amount of economic dislocation that will ultimately occur. In light of human potential to develop herd immunity via vaccination in advance of a pandemic strain, the time that it allows us to do so before it evolves may become as crucial or more crucial to the measure of damage it causes than its own lethality and contagiousness.
Among the more attractive alternatives available for reducing mortality is vaccine stockpiling and prepandemic vaccination. "Human H5N1 vaccines are currently available and can induce heterotypic immunity. WHO and governments should give urgent consideration to the use of these vaccines for the priming of individuals or communities who would be at greatest risk of infection if an H5N1 influenza pandemic were to emerge." Death associated with influenza A viruses "is usually mediated by superinfection with bacteria, mainly Streptococcus pneumoniae.", suggesting that lethality may be reduced by vaccination against pneumonia.
Among others, the Secretary of the United States Department of Health and Human Services (HHS) has repeatedly pointed out the key role of preparation in reducing pandemic mortality, including as examples research in cell- and DNA-based vaccines, as well as stockpiling available vaccines and antivirals and increasing vaccine manufacturing capacity.
Governments and other organizations at many levels and in many places have produced "planning" reports that, among other things, have offered speculation on the mortality rate of an eventual H5N1 pandemic. That speculation has varied widely. One such report stated that "over half a million Americans could die and over 2.3 million could be hospitalized if a moderately severe strain of a pandemic flu virus hits the U.S.". No one knew if "moderately severe" was an accurate guess or not. A report entitled A Killer Flu? projected that, with an assumed (guessed) contraction rate of just 25%, and with a severity rate as low as that of the two lowest severity flu pandemics of the 1900s, a modern influenza A pandemic would cause 180 thousand deaths in the US, while a pandemic equaling the 1918 Spanish Flu in level of lethality would cause one million deaths in the US. Again, the report offered no evidence that an emerging H5N1 flu pandemic would be between these figures.
The current avian flu, in humans, is fatal in over 50% of confirmed cases. Yet early projections like those above have assumed that such a lethal avian strain would surely lose genes contributing to its lethality in humans as it made the adaptations necessary for ready transmission in the human population. This optimistic assumption cannot be relied on. As the WHO reported in November 2006, initial outbreaks of an H5N1 pandemic could rival the current lethality of over 50%. Further information necessary to make an accurate projection of initial lethality of an H5N1 pandemic does not exist, as no data was collected that could show the pre-pandemic virulence in any potential flu strain until after the last pandemic of the 20th Century. There is no basis for assuming that an H5N1 pandemic will emerge with only the far lower 1-2% lethality rate of the Spanish Flu, once assumed to be a worst-case scenario. There exists no reliable prediction of the mortality rate of an H5N1 pandemic, and it would be irresponsible to confine planning to only optimistic assumptions out of step with the currently observed case fatality ratio.
Although marred by unrealistically low ranges of assumed mortality, the earlier planning reports nevertheless show convincingly that we are not prepared even for a pandemic as severe as the milder pandemics of the past century., let alone the much higher case fatality ratios seen more recently.
Sources and notes
- Li FC, Choi BC, Sly T, Pak AW (June 2008). "Finding the real case-fatality rate of H5N1 avian influenza". J Epidemiol Community Health 62 (6): 555–9. doi:10.1136/jech.2007.064030. PMID 18477756.
- Donald G. McNeil Jr. (June 4, 2006). "Human Flu Transfers May Exceed Reports". New York Times.
- "Seven Indonesian Bird Flu Cases Linked to Patients". Bloomberg. May 23, 2006.
- "WHO confirms human transmission< in Indonesian bird flu cluster".
- "Avian influenza – situation in Indonesia – update 17". WHO. June 6, 2006.
- "HHS has enough H5N1 vaccine for 4 million people". CIDRAP. July 5, 2006.
- "Study supports concept of 2-stage H5N1 vaccination". CIDRAP. October 13, 2006.
- Pre-pandemic bird flu shots eyed / Health ministry to urge study of potential early vaccination recipients | (Daily Yomiuri Online + AP -- Apr. 25, 2009) http://www.yomiuri.co.jp/dy/national/20090425TDY03103.htm
- Japan to vaccinate medical workers for bird flu | Reuters May 15, 2008 | http://news.yahoo.com/s/nm/20080415/hl_nm/birdflu_japan_dc
- Measures against flu needed / Govt urged to set up framework to fight new influenza outbreak Apr. 24, 2008 http://www.yomiuri.co.jp/dy/features/science/20080424TDY04302.htm
- Vaccinations for new flu strains eyed for public (Apr. 17, 2008) http://www.yomiuri.co.jp/dy/national/20080417TDY02301.htm
- http://www.cidrap.umn.edu/cidrap/content/influenza/avianflu/news/aug1007mutant.html Researchers create H5N1 mutations to pave way for new vaccines and treatments Aug 10, 2007 (CIDRAP News) "Focusing on genetic changes to one portion of the H5 protein, called the receptor binding domain, [the researchers] found that as few as two mutations could enhance the ability of H5N1 to recognize human cells, according to the press release."
Yang ZY, Wei CJ, Kong WP, et al. (August 2007). "Immunization by avian H5 influenza hemagglutinin mutants with altered receptor binding specificity". Science 317 (5839): 825–8. doi:10.1126/science.1135165. PMC 2367145. PMID 17690300.
- Dennis J. Alexander*. "A review of avian influenza in different bird species" (PDF). Avian Virology, VLA Weybridge, Addlestone, Surrey KT15 3NB, UK.
- "Situation (poultry) in Asia: need for a long-term response, comparison with previous outbreaks". Disease Outbreak News: Avian influenza A(H5N1) (WHO). March 2, 2004. Retrieved 2006-10-27.
- Webster RG, Peiris M, Chen H, Guan Y (January 2006). "H5N1 outbreaks and enzootic influenza". Emerging Infect. Dis. 12 (1): 3–8. doi:10.3201/eid1201.051024. PMC 3291402. PMID 16494709.
- WHO (October 28, 2005). "H5N1 avian influenza: timeline" (PDF).
- Tan Ee Lyn (February 1, 2007). "Don't ignore less virulent bird flu strains: experts" (– Scholar search). Scientific American.[dead link]
- South Korea raises H5N1 culling target to 5.3 million Lisa Schnirring * Staff Writer Apr 21, 2008 (CIDRAP News)http://www.cidrap.umn.edu/cidrap/content/influenza/avianflu/news/apr2108culling(2).html
- "Five Koreans had H5N1 virus but no illness". CIDRAP. September 21, 2006.
- WHO (August 18, 2006). "Antigenic and genetic characteristics of H5N1 viruses and candidate H5N1 vaccine viruses developed for potential use as pre-pandemic vaccines" (PDF). Contains latest Evolutionary "Tree of Life" for H5N1
- Chen H, Deng G, Li Z, Tian G, Li Y, Jiao P, Zhang L, Liu Z, Webster RG, Yu K. (2004). "The evolution of H5N1 influenza viruses in ducks in southern China". Proc. Natl. Acad. Sci. U.S.A. 101 (28): 10452–7. doi:10.1073/pnas.0403212101. PMC 478602. PMID 15235128.
- http://www.cidrap.umn.edu/cidrap/content/influenza/avianflu/news/oct0507avian.html H5N1 mutation that could help spark pandemic identified "The change promotes better viral replication at the lower temperatures found in the upper airways of mammals..." Additionally, discussing the same mutation, one of the researchers points out that the mutated strain is in wide circulation:
"The viruses that are circulating in Africa and Europe are the ones closest to becoming a human virus," Kawaoka said. But he pointed out that one mutation is not sufficient to turn H5N1 into a major threat to humans.
- http://www.who.int/csr/disease/avian_influenza/country/cases_table_2008_01_15/en/index.html Cumulative Number of Confirmed Human Cases of Avian Influenza A/(H5N1) Reported to WHO / 15 January 2008 For possible later updates by the WHO, see links at http://www.who.int/csr/disease/avian_influenza/country/en/
- "Cumulative Number of Confirmed Human Cases of Avian Influenza A/(H5N1) Reported to WHO". WHO. December 29, 2006.
- (including cases reported to and confirmed by the WHO up to January 24, 2008) http://www.who.int/csr/disease/avian_influenza/country/cases_table_2008_01_24/en/index.html Cumulative Number of Confirmed Human Cases of Avian Influenza A/(H5N1) Reported to WHO / 24 January 2008 | For later updates by the WHO, see http://www.who.int/csr/disease/avian_influenza/country/en/
- http://www.who.int/csr/disease/avian_influenza/country/cases_table_2008_04_30/en/index.html Cumulative Number of Confirmed Human Cases of Avian Influenza A/(H5N1) Reported to WHO 30 April 2008. For later totals as the WHO provides updates, click through links at http://www.who.int/csr/disease/avian_influenza/country/en/ Epidemic and Pandemic Alert and Response (EPR) Confirmed Human Cases of Avian Influenza A(H5N1)
- "H5N1 Getting Deadlier". based on the article "Bird Flu Fatality Rate in Humans Climbs to 64% as Virus Spreads". Bloomberg. May 20, 2006.
- The tally may be obtained by clicking a link to the most current date shown by the UN on the WHO's web page entitled Epidemic and Pandemic Alert and Response (EPR) http://www.who.int/csr/disease/avian_influenza/country/en/
- http://www.medpagetoday.com/InfectiousDisease/URItheFlu/tb/5964 Options For Influenza Control VI (Conference, Toronto Canada, June 18, 2007) Even those who were in close contact with both infected birds and infected people showed no sign of ever having been infected, Dr. Dejpichai and colleagues found. The study is consistent with findings in Hong Kong, China, and Cambodia, which showed viral seroprevalence of no more than 10% among poultry workers and people living in villages where H5N1 outbreaks occurred, she said. But it contradicts a population-based study in Vietnam, published last year, that concluded that mild cases of the virus were likely to be common. (see Mild Avian Flu Transmission May Be Common) http://www.medpagetoday.com/InfectiousDisease/URItheFlu/tb/2450 Primary source: Archives of Internal Medicine Source reference: Thorson A, Petzold M, Nguyen TK, Ekdahl K (January 2006). "Is exposure to sick or dead poultry associated with flulike illness?: a population-based study from a rural area in Vietnam with outbreaks of highly pathogenic avian influenza". Arch. Intern. Med. 166 (1): 119–23. doi:10.1001/archinte.166.1.119. PMID 16401820.
"... 45 478 randomly selected (cluster sampling) inhabitants. Household representatives were asked screening questions about exposure to poultry and flulike illness ...
... A dose-response relationship between poultry exposure and flulike illness was noted: poultry in the household (odds ratio, 1.04; 95% confidence interval, 0.96-1.12), sick or dead poultry in the household but with no direct contact (odds ratio, 1.14; 95% confidence interval, 1.06-1.23), and direct contact with sick poultry (odds ratio, 1.73; 95% confidence interval, 1.58-1.89). The flulike illness attributed to direct contact with sick or dead poultry was estimated to be 650 to 750 cases.
CONCLUSIONS: Our epidemiological data are consistent with transmission of mild, highly pathogenic avian influenza to humans and suggest that transmission could be more common than anticipated, though close contact seems required. Further microbiological studies are needed to validate these findings."
But note the discussion and critique New Study of Bird Flu Raises Important Issues January 9, 2006 http://www.acsh.org/factsfears/newsID.685/news_detail.asp
"Are the conclusions of this one study enough to warrant rethinking the current bird-flu paradigm and considering this threat similar to that posed by the similar "Asian Flu," as opposed to the deadly "Spanish Flu" pandemic? (The Asian Flu pandemic occurred in 1957-8, and caused millions of cases but much lower mortality than the global "Spanish flu" of 1918-9, which killed over 20 million.) Unfortunately, no. While, on its surface, the new study seems to point in that direction, a closer analysis of the study reveals several weaknesses, the most important of which is that no blood samples were taken. As a result, no data on antibody status could be collected, nor could there be any confirmation of a specific viral cause of the reported ailments.
Indeed, it is just as likely that the illnesses sustained by the rural Vietnamese were caused by some other virus, not a bird-type flu at all — or that if their ailments were due to bird contact, that the cause was any number of bird flu variants, rather than the lethal H5N1 strain being studied intensively now. ... "
- "Five Koreans had H5N1 virus but no illness (21 September 2006)". CIDRAP. Retrieved 2006-08-23.
- http://www.recombinomics.com/News/10030701/H5N1_Jakarta_Cluster.html H5N1 Cluster Raises Surveillance Concerns In Indonesia Recombinomics Commentary October 3, 2007 (Suggests Indonesian cases may be less lethal than feared, but more prevalent due to various undersampling errors.) (Note: This reference needs to be replaced with a better one. Recombinomics and Henry L Niman are not credible sources according to the UN experts on bird flu.)
- "Cambodian study hints at subclinical H5N1 cases". CIDRAP. January 25, 2008.
- "Mild H5N1 cases weren’t found missed in Cambodian outbreak study". CIDRAP. March 27, 2006.
- "Cambodian study suggests mild H5N1 cases are rare". CIDRAP. September 7, 2006.
- "Epidemiology of WHO-confirmed human cases of avian influenza A(H5N1) infection". Wkly. Epidemiol. Rec. 81 (26): 249–57. June 2006. PMID 16812929.
The median age of confirmed cases was 20 years. The age of cases ranged from 3 months to 75 years (n = 202). Half of the cases occurred among people aged <20 years; 90% occurred among those aged <40 years (Fig. 2). Among cases aged <10 years, 21 children were aged <5 years and 32 children were aged between 5 years and 9 years.
- "Human Avian Influenza A(H5N1) Cases by Age Group and Country".
- Smallman-Raynor M, Cliff AD (March 2007). "Avian influenza A (H5N1) age distribution in humans". Emerging Infect. Dis. 13 (3): 510–2. doi:10.3201/eid1303.060849. PMC 2141519. PMID 17552119.
- McNeil Jr, Donald G. (September 11, 2006). "Immediate Treatment Needed for Bird Flu Cases, Study Says". New York Times. Retrieved May 4, 2010.
- U.N. chart, "Human Avian Influenza (H5N1) Cases by Age Group and Outcome" http://www.wpro.who.int/NR/rdonlyres/FD4AC2FD-B7C8-4A13-A32C-6CF328A0C036/0/Slide4.jpg
- Gioia C, Castilletti C, Tempestilli M, et al. (January 2008). "Cross-subtype immunity against avian influenza in persons recently vaccinated for influenza". Emerging Infect. Dis. 14 (1): 121–8. doi:10.3201/eid1401.061283. PMC 2600140. PMID 18258091.
We also observed that seasonal vaccination is able to raise neutralizing immunity against influenza (H5N1) in a large number of donors.
- Olsen SJ, Ungchusak K, Sovann L, et al. (November 2005). "Family clustering of avian influenza A (H5N1)". Emerging Infect. Dis. 11 (11): 1799–1801. doi:10.3201/eid1111.050646. PMID 16422010.
listed 15 family clusters, in which three included a husband and wife pair. (Only two of these pairs had all four members actually confirmed as H5N1 positive.) The "blood relative theory" is, so far, too weak to be called a theory. It is an observation, with some reasoning that could support it as a hypothesis (the genetic tendency possibility, for instance).
- I. Nyoman Kandun et al. (November 23, 2006). "Three Indonesian Clusters of H5N1 Virus Infection in 2005". NEJM 355 (21): 2186–94. doi:10.1056/NEJMoa060930. PMID 17124016.
- Pitzer VE, Olsen SJ, Bergstrom CT, Dowell SF, Lipsitch M (July 2007). "Little evidence for genetic susceptibility to influenza A (H5N1) from family clustering data". Emerging Infect. Dis. 13 (7): 1074–6. doi:10.3201/eid1307.061538. PMC 2878232. PMID 18214184.
Abstract The apparent clustering of human cases of influenza A (H5N1) among blood relatives has been considered as evidence of genetic variation in susceptibility. We show that, by chance alone, a high proportion of clusters are expected to be limited to blood relatives when infection is a rare event.
- "The Threat of Pandemic Influenza: Are We Ready? Workshop Summary (2005)". NAP. Retrieved 2006-08-21.
- Lucy A. Perrone, Julie K. Plowden, Adolfo García-Sastre, Jacqueline M. Katz, Terrence M. Tumpey. "H5N1 and 1918 Pandemic Influenza Virus Infection Results in Early and Excessive Infiltration of Macrophages and Neutrophils in the Lungs of Mice". PLOS. Retrieved 2008-08-06.
- CBC CIDRAP WHO PDF
- Influenza research at the human and animal interface Report of a WHO working group Geneva, Switzerland 21–22 September 2006 Numbered page 15, (19th page including non-numbered introductory page) (emphasis original) http://www.who.int/csr/resources/publications/influenza/WHO_CDS_EPR_GIP_2006_3C.pdf
- Yen HL, Lipatov AS, Ilyushina NA, et al. (July 2007). "Inefficient transmission of H5N1 influenza viruses in a ferret contact model". J. Virol. 81 (13): 6890–8. doi:10.1128/JVI.00170-07. PMC 1933302. PMID 17459930.
Our results suggest that despite their receptor binding affinity, circulating H5N1 viruses retain molecular determinants that restrict their spread among mammalian species.
- WHO working group on influenza research at the human and animal interface (November 2, 2006). "Influenza research at the human and animal interface" (PDF). World Health Organization. p. 15. (alternate version)
- "Clinical study points to cytokine storm in H5N1 cases". CIDRAP News. September 11, 2006.
- Menno D de Jong et al. (September 10, 2006). "Fatal outcome of human influenza A (H5N1) is associated with high viral load and hypercytokinemia" (– Scholar search). Nature 12 (10): 1203–7. doi:10.1038/nm1477. PMID 16964257.[dead link] Published online.
- http://www.cidrap.umn.edu/cidrap/content/influenza/avianflu/news/jul1607cytokine.html Study: Inhibiting cytokine response might not reverse H5N1 infections
- Peter M. Sandman, Jody Lanard (December 4, 2004). "Pandemic Influenza Risk Communication: The Teachable Moment". Retrieved 2006-10-08.
- Robert G. Webster, Elizabeth Jane Walker (March–April 2003). "The world is teetering on the edge of a pandemic that could kill a large fraction of the human population". American Scientist 91 (2): 122. doi:10.1511/2003.2.122. Retrieved 2006-10-08.
- "Renowned Bird Flu Expert Warns: Be Prepared". ABC News. March 14, 2006. Retrieved 2006-10-08.
- Robert G. Webster, Ph.D., and Elena A. Govorkova, M.D., Ph.D. (November 23, 2006). "H5N1 Influenza — Continuing Evolution and Spread". NEJM 355 (21): 2174–2177. doi:10.1056/NEJMp068205. PMID 17124014.
- Taubenberger JK, Morens DM (January 2006). "1918 Influenza: the mother of all pandemics". Emerging Infect. Dis. 12 (1): 15–22. doi:10.3201/eid1201.050979. PMC 3291398. PMID 16494711.
- Informaworld article Why is the world so poorly prepared for a pandemic of hypervirulent avian influenza? published December 2006
- Roos, Robert; Lisa Schnirring (February 1, 2007). "HHS ties pandemic mitigation advice to severity". University of Minnesota Center for Infectious Disease Research and Policy (CIDRAP). Retrieved 2007-02-03.
- Maines TR, Chen LM, Matsuoka Y, et al. (August 2006). "Lack of transmission of H5N1 avian-human reassortant influenza viruses in a ferret model". Proc Natl Acad Sci USA. 103 (32): 12121–6. doi:10.1073/pnas.0605134103. PMC 1567706. PMID 16880383.
- Tumpey TM, Maines TR, Van Hoeven N, et al. (February 2007). "A two-amino acid change in the hemagglutinin of the 1918 influenza virus abolishes transmission". Science 315 (5812): 655–9. doi:10.1126/science.1136212. PMID 17272724.
- Subbarao K, Luke C (March 2007). "H5N1 viruses and vaccines". PLoS Pathog. 3 (3): e40. doi:10.1371/journal.ppat.0030040. PMC 1808069. PMID 17335350.
- Scidev.net News article Bird flu protein's 'pocket' could inspire better drugs published August 16, 2006
- Jennings LC, Monto AS, Chan PK, Szucs TD, Nicholson KG (October 2008). "Stockpiling prepandemic influenza vaccines: a new cornerstone of pandemic preparedness plans". Lancet Infect Dis 8 (10): 650–8. doi:10.1016/S1473-3099(08)70232-9. PMID 18922487.
- Stegemann, Dahlberg, Kröger, Gereke, Bruder, Henriques-Normark, Increased Susceptibility for Superinfection with Streptococcus pneumoniae during Influenza Virus Infection Is Not Caused by TLR7-Mediated Lymphopenia http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0004840
- Pandemic Planning Update VI
- CBN Report: Severe Pandemic Planning Assumptions May Be Too Low
- "Pandemic Flu Projection Says More Than Half Million Could Die in U.S.". Senior Journal. June 24, 2005.
- "Healthy Americans Flu 2005 report PDF" (PDF).
- Jennifer Barrett (May 3, 2006). "A Dramatic Disconnect". Newsweek. Archived from the original on 2006-12-10. Retrieved 2006-12-11. estimates two million dead in the US, for example
- Dr. Martin Meltzer of the Centers for Disease Control, an expert on the societal impact of diseases, warns that "There is no healthcare system anywhere in the world that can cope with even a mild pandemic like the one in 1968" Meltzer MI, Lancet Asia Forum, Singapore, May 2006
|
The ASCII DXF file format is a complete representation of an AutoCAD drawing in ASCII text form, and is easily processed by other programs. In addition, AutoCAD can produce or read a binary form of the full DXF file and accept limited input in another binary file format.
The SAVE and SAVEAS commands provide a Binary option that writes binary DXF files. Such a file contains all the information present in an ASCII DXF file but in a more compact form that takes about 25 percent less file space. It can be read and written more quickly (typically, five times faster) by AutoCAD. Unlike ASCII DXF files, which entail a trade-off between size and floating-point accuracy, binary DXF files preserve the accuracy in the drawing database. (AutoCAD Release 10 was the first version to support this form of DXF file; it cannot be read by earlier releases.)
A binary DXF file begins with a 22-byte sentinel consisting of the following:
AutoCAD Binary DXF<CR><LF><SUB><NULL>
Following the sentinel are data pairs (group, value) which are the same as those in an ASCII DXF file except they are represented in binary form. The group code is a 2-byte integer value (1 byte in DXF files prior to AutoCAD Release 14) with the least significant byte first. Each group code is followed by its assigned value which can be one of the following:
The type of data following a group is determined from the group code by the same rules used in decoding ASCII DXF files. Translation of angles to degrees and dates to fractional Julian date representation is performed for binary files as well as for ASCII DXF files. The comment group, 999, is not used in binary DXF files.
Extended data group codes are represented in binary DXF as a single byte with the value 255, followed by a 2-byte integer value (least significant byte first) containing the actual group code, followed by the actual value.
Extended data values are represented in the same way as those in an ASCII DXF file. For example, for an extended data long group, the following values would appear, occupying 1, 2, and 4 bytes respectively.
255Escape group code1071True group code999999Value for the 1071 group code
SAVEAS writes binary DXF files with the same file type (.dxf) as for ASCII DXF files. The OPEN and INSERT commands automatically recognize a binary file by means of its sentinel string. The file doesn't need to be identified as a binary file.
If the OPEN and INSERT commands encounter an error in a binary DXF file, AutoCAD reports the byte address within the file where the error was detected.
|
Superficial thrombophlebitis is inflammation of a vein close to the surface of the skin. It occurs most often in the leg. The condition is easily treatable, though it sometimes leads to more serious health concerns.
Superficial thrombophlebitis is caused by a blood clot in a vein that is close to the surface of the skin.
Factors that increase your chance of developing superficial thrombophlebitis include:
- Trauma, especially to the lower leg
- Blood clotting disorder
- Sitting for long periods of time, such as riding in a car or on an airplane
- Prolonged bed rest
- Prior episodes of phlebitis
- Certain cancers
- Paralysis, which may be caused by a stroke
- Family history of blood clotting disorders
Superficial thrombophlebitis may cause:
- A visible, cord-like vein that is tender and sensitive to pressure; this visibility may develop over several hours to days
- Redness and warmth surrounding the vein
- Swelling around the vein
A complication of superficial thrombophlebitis is a condition called deep vein thrombosis (DVT). This is a blood clot in the deeper veins that causes obstruction of blood flow. This can lead to pulmonary embolism, a serious situation that occurs when the blood clot breaks free and gets lodged in the lungs.
You will be asked about your symptoms and medical history. A physical exam will be done.
Your bodily fluids may be tested. This can be done with blood tests.
Images may be taken of your bodily structures. This can be done with:
- Venogram in which dye or contrast is injected
In most cases, superficial thrombophlebitis goes away on its own after a few weeks. Treatment can be done at home with the following:
- Nonsteroidal anti-inflammatory drugs (NSAIDs), such as ibuprofen
- Compression stockings
- Warm compress on the inflamed vein
In some cases, the following treatment may be needed:
- Blood thinning medication
- Procedures to remove the blood clot
To help reduce your chances of superficial thrombophlebitis, take these steps:
- If you fly for long periods of time, walk around the cabin and stretch your limbs every hour or so.
- If you drive for long periods of time, pull over every hour or so and stretch your limbs.
- Avoid wearing tight clothing around your waist.
- Drink plenty of fluids to avoid dehydration.
- Reviewer: Michael J. Fucci, DO
- Review Date: 06/2015 -
- Update Date: 05/04/2015 -
|
Costa Rica Geography
Costa Rica, with 51,100 sq. km, is the second smallest Central American country. This mountainous country is located between the Caribbean Sea to the East and the Pacific Ocean to the West. Positioned on the Central American Isthmus 10˚ North of the Equator and 84˚ West of the Prime Meridian. It borders Nicaragua to the north and Panama to the south and is therefore situated in the midst of the Tropics.
Costa Rica has close to 1,300 km (800 mi) of coastline. The Pacific Coastline with more of a mountainous terrain makes up roughly 80% of the total coastline. Caribbean Coastal Areas are characterized by long sand beaches, humid, lower ocean tide variations, and often times swamps and mangroves. The Pacific Coastline on the other hand is characterized by lagoons and hills to high cliffs reaching into the sea, large tidal variations, rain forest to dry forest to the north which are due mainly to the Papagayo Winds. The Pacific Coast is distinguished by two large peninsulas reaching out into the sea. The northern and larger peninsula is called Peninsula de Nicoya and is home to the dry forest. The southern and smaller peninsula is called Peninsula de Osa and is home to the Corcovado National Park and rain forest.
Through time Costa Rica evolved from volcanoes growing out of the ocean creating a natural bridge between North and South America. This is one of the major reasons Costa Rica enjoys the greatest density of species in the world.
Costa Rica dedicated close to one quarter of its total land mass to . Thanks to Costa Rica's geography, it is able to supply the majority of its electricity demand by hydro generation in places like the largest and man made Arenal Lake.
The large mountain ranges are mainly formed through volcanic activity triggered by the tectonic plates pushing against the Western seaboard of the Americas and run mostly northwest to southeast throughout the country.
The most northwestern mountain range is called the Cordillera de Guanacaste, consisting of a spectacular chain of volcanoes that can be appreciated by the traveler heading south from the Nicaraguan border along the Pan-American Highway (Interamericana). Among the most popular from north to south are:
Farther to the southeast is the Cordillera de Tilaran, with popular destinations such as:
Arenal Volcano and National Park (Costa Rica's most active).
The Cordillera de Tilaran runs into the Cordillera Central, which includes:
Volcano & National Park Poas (2704m)
Volcano & National Park Irazu (3432m)
The southeastern-most mountains are associated with the Cordillera de Talamanca, which is higher and more remote and rugged terrain. At least 15 separate mountain peaks are around 3,000 m. above sea level. Hikers should not miss the opportunity to visit:
Cerro Chirripo Peak (3820m) (12,532 ft) & National Park, the highest peak in Costa Rica
The mountain ranges have many different altitudes that determine the geology, climate and ecosystem variations. The mountain ranges surround the central plain and form the Central Valley in the center of the highlands (1,000 -1,500 m). Over half the population resides in the Central Valley and is home to four out of the six most populated cities: Alajuela, Cartago, Heredia, and San Jose.
Costa Rica is also home to several islands such as:
Calero Island (largest)
Isla del Cano.
Source: CIA country report
|
Donald Trump’s recent description of Caribbean and African countries as shitholes has created a shitstorm in the translation world, with translators and censors struggling to find words to convey Trump’s meaning. The need for a German language translation of the term has seen the media popularise the term Drecksloch, a previously little used noun, which denotes literally a hole of, or for, muck. Technically Dreck does not exclusively refer to excrement, as it may also describe dirt, mud, rubbish, and manure. Interestingly, Drecksloch was previously recognised by dictionaries Dict.cc and Leo.org but not yet by the authoritative Duden.
The word shithole is used colloquially in English to convey an undesirable place, usually squalid or run-down. Simply describing a place as a hole or a pit has a similar effect, as does describing somewhere as a hellhole, with the addition of shit strengthening the image. This also makes the speaker’s language cross the vulgarity boundary into the use of expletives and taboo language, a known Trump phenomenon.
So does Trump’s term refer to a hole from which excrement is emitted, for example from the human body, or is it a hole which receives or accumulates such effluent? That would be the difference between the anus and, on the other hand a latrine, outhouse, sewer, sewage pit, cesspool, cesspit, slurry pit, or manure pit, none of them remotely attractive to Trump’s audiences; interestingly, though, Roman toilet holes could apparently be attractive shared social spaces!
The Translator’s Dilemma
Donald Trump isn’t just redefining the political landscape. His use of language presents challenges for translators too. There has been a huge amount of technical translation debate since Donald Trump was elected President of the United States on 8 November 2016. The HE Translations team has been both fascinated, and maybe a little perturbed, by the style of language he uses and most interested in the discussion which has taken place around it. We’ve heard translators and interpreters complaining bitterly about the difficulty of translating his Tweets and speeches into other languages, and translating to German is no exception.
So what’s the problem? Surely short, highly emotive phrases should be easy to translate? In part, the issue is that his use of language falls outside the usual political norms and at times crosses the line into taboo or profane speech, with derogatory intent. His speeches often appear to be unscripted, which can lead to an abrupt shift in tone or subject matter, allowing him to conclude on an emotional and rhetorical high or low. He often defies logic and is prone to exaggeration, which might cause some to wonder about the accuracy or tone of a translation. As interpreters, we like people who give us balanced grammatical sentences, so our frustration with Trump often lies in his habit of breaking off mid-sentence or simply concluding a message with a single explosive word, for example, ‘Sad!’
Even native speakers of English can occasionally struggle to grasp Trump’s meaning, particularly when he uses sarcasm in a way that invites misinterpretation. Siavash Ardalan, a journalist and translator for the BBC Persian service, suggests that body language could be a useful indicator for translators. By mimicking the President’s gestures you can gain an understanding of the meaning and context of his utterances.
Discerning the intent of a piece of speech is even more difficult when the speaker is known to disown promptly, or deny, meanings of their own recent statements. As with sign language interpreters of live news broadcasts, we might need body language experts to read his gestures in real time and provide subtitles giving the true meaning conveyed.
So where does one train to be a Trumpterpreter? In Russia? Actually algorithms are emerging which can detect the sentiment of speech in video, but would translators of written text need to supply hyperlinks to the source video of the actual speech?
We are accustomed to polished political language, but Trump employs phrases which are attractive to his putative core support base in the working class, though psephologists find his support to be greater in the educated but reticent middle class. His many colloquialisms appealing to working class American voters are at risk of being lost in translation when rendered into a foreign language, creating dilemmas for accurate reporting to a foreign language audience.
Professional translators are often afraid of sounding too colloquial, and therefore unprofessional. However, translating Trump could mean having to let go of the compulsion to regularise his speech, as well as abandoning any attempt to tidy it up into more conventional grammar, which observes the target language’s technical standards of correctness. Translators can also face painful dilemmas when dealing with a text that conflicts with their own values or feelings. This point is well discussed in an article at The Conversation, which even reports professional translation services in Russia making Donald Trump’s language sound like Vladimir Putin’s.
There is a huge amount of pressure on us to convey Trump’s meaning correctly as his speeches are scrutinised across the globe. Many translators worry that their professional reputation will be compromised if the translation sounds awkward or the language used is illogical, ungrammatical or contains too much humour. Although Trump’s linguistic tics are now well known, we still worry that an accurate translation of his messages may leave our audience wondering if we’ve got it wrong.
The ‘evil losers’ phrase will be familiar to anyone who followed the coverage of the terror attacks in Manchester. This attempt at demonising the attacker is nothing new. Characterising your opponent as somehow less than human has been a feature of political speeches in wartime since reporting began. The phrase has been criticised as more hollow rhetoric but it presents us with a particular challenge. The concept of evil is a difficult one to translate in German and is fraught with nuance. Interpreting Trump succinctly, whilst retaining the meaning, is far from easy.
Whilst the phraseology is different, Trump’s use of ‘evil loser’ could also extend to his political opponents. His Twitter feed is a stream of allegations against ‘Crooked’ Hillary and the Obama administration. His use of colloquial language extends to slang, particularly where he describes the previous administration as: ‘…people running our country who didn’t know what the hell they were doing, didn’t know what they were doing.’
Interestingly, whilst he has justified his withdrawal from the Paris Climate Accord by referring to the ‘onerous burden’ placed on the USA, he has not reacted to the international condemnation this provoked. He describes his love for both coal miners and the environment. His criticism is levelled at those who entered into the agreement in the first place.
We, as translators, should continue in our efforts to translate Trump accurately. His language, whilst frustrating at times, is key to understanding his approach. To his supporters he is a man of the people, both because he continues to use his Twitter feed unmediated and because his language is simple to understand – even though the meaning may not be! Commentators and politicians across the globe are also getting used to a less than conventional President. We need to meet the challenge of ensuring that his message doesn’t get lost or distorted in translation.
|
Sahndara was the primary of the Sahndara planetary system. In this system, there was an inhabited planet. The planet, Sahndara, was the homeworld for a warp capable species. Before Sahndara went nova around 400 BC, a group of thirty-eight refugees traveled to Earth where they settled during the time of Plato.
After the time of Plato passed, the settlers, who called themselves Platonians, moved on to another planet which they named Platonius. Here they continued to follow the teachings of Plato, but soon they discovered that they had developed psychokinetic powers, attributed to the planet's kironide-rich food. (TOS: "Plato's Stepchildren")
|
Self-diagnosing using the internet and perceived symptoms is a notoriously error-laden pursuit. Alzheimer’s disease, however, may be an exception. In some cases, patients self-diagnose years before doctors confirm their symptoms as indications that Alzheimer’s has set in, according to research presented at the Alzheimer’s Association International Conference in Boston. Here’s NBC:
Not to scare anyone – especially the 1 in 8 baby boomers who report memory problems, according to a recent report – but patients’ own concerns may predate clinical changes in the brain and in cognitive functions that may indicate disease, the findings suggest. In other words, people who think they have Alzheimer’s disease just might be right.
In a study of around 200 people in their 70s and 80s, researchers found that those who reported the most memory problems also had the highest levels of beta amyloid—the tell-tale protein build up that is associated with Alzheimer’s disease—in their brains.
The researchers emphasize that everyone has the occasional lapse of memory—misplacing a set of keys, forgetting the name of a co-worker’s spouse—and that those small memory glitches alone should not trigger an alarm. But if those memory lapses become a weekly or daily occurrence, it’s worth taking a closer look at the early detection signs of the disease and bringing those concerns, insistently, to a doctor.
More from Smithsonian.com:
|
Sometimes our best ideas come when we least expect them. For Greek mathematician Archimedes, this happened during a trip to the local baths. The king of Syracuse had put him in charge of finding out how to detect fraud in the manufacture of a golden crown. The king suspected his goldsmith was leaving out some of the gold and substituting it with silver.
The Apollo program was a series of space flights with the goal of landing a man on the moon. This was finally accomplished in 1969 during the Apollo 11 mission when Neil Armstrong stepped onto the moon’s surface. As he did so, he famously said, “That’s one small step for man, one giant leap for mankind.” While the Apollo 11 space mission is the most well known, it was the Apollo 17 mission that brought home the most reproduced photograph of all time.
James Harrison has saved the lives of over 2,000,000 babies. His blood contains a very rare antibody called Anti-D, which has been used to create a vaccine for Rhesus Disease. This condition causes the antibodies in the mother’s blood to attack the red blood cells in the unborn baby’s cells. Rhesus Disease was fatal for thousands of babies a year until the Anti-D vaccine was discovered using James’ blood.
We all know someone who has benefitted from the advances of modern medicine: a child who has received a life saving vaccine; a cancer patient who has received chemotherapy; a baby born through in vitro fertilization. But what most of us don’t know is that all of these medical advances have come to us courtesy of one woman’s cells.
The English expression ‘to fall in love’ suggests that love is something that you can’t control. Love consumes us, overcomes us, and renders us powerless. Like gravity, we can’t resist it. And sometimes, we even ‘fall head over heels in love’ when we meet that special someone.
Birds aren’t usually the first animal that people think about when they think about smart animals. In English, calling someone birdbrained means that they are stupid. And saying something is ‘for the birds’ means that it’s trivial or worthless. However, these expressions couldn’t be more off base. Some birds, particularly crows, can be amazingly smart. In fact, their problem-solving abilities are as good as those of a seven-year-old child.
Sleep is not optional. After a long enough period of being awake, our brain starts to produce signals that we are tired. As these signals increase in strength, our brain becomes impaired. We all know what it’s like to feel tired to the point of exhaustion. We are less aware, unfocused, and more likely to have accidents. If we become too exhausted, we may even fall asleep on the spot.
|
Friday 6-4-2012 Seder night...... Pesach night : explanation
. Friday Night is Seder Night
by T. Gedalya and R. Sylvetsky
The Holy One, Blessed be He, passed over the homes of the Israelites as he smote the firstborn of the Egyptians, from the son of Pharaoh to the son of the servants. Pharaoh was spared to see how G-d delivered His Chosen People from the hands of those who would destroy them, as He does in every generation. And the joyous holiday of Passover, in which we relive that redemption and sing "Next year in rebuilt Jerusalem", begins Friday night.
Arutz Sheva brings you a summary of the main aspects of the holiday in Jewish law and practice. For details on koshering a kitchen for Passover, click here and for Torah thoughts for the holiday from well known rabbis and religious scholars, click here and continue to read our Judaism section.
Passover (Pesach), called the Holiday of Our Freedom, will take place in Israel this year between sunset on Friday, April 6, (15th of Nisan) and Friday night, April 13th, but because of the Sabbath, will effectively end on Saturday night April 14th.
The first and seventh days are always marked as Sabbath-like holy days (Yom Tov) in which work is forbidden.Since this year, the holiday in Israel ends as the Sabbath begins, there are two holy days at the end of the holiday.
Jews outside of Israel observe an additional holy day in both the beginning and end of Pesach, which lasts eight days for them. Jews visiting Israel only for the holiday should refrain, on the eighth day, from activities not allowed on holy days, but do not have to perform specific commandments related to the holiday, such as extra prayers. There are differing halakhic decisions on the issue, with some rabbis saying that that visitors must keep the additional days as if they were in the Diaspora, including having a second Seder.
Jews are commanded to tell the story of leaving Egypt at the Seder as if it had happened to them personally and not as a mere historical event. This is in order to emphasize the importance of the hard-won and precious freedom that, due to G-d's deliverance, allowed the Jewish nation to be born.
In the time of the Holy Temple, every Jew came to Jerusalem on the 14th of Nisan and at dusk, each family offered a lamb or kid to G-d in remembrance of their forefathers' deliverance from bondage, then joyously ate of the offering together. Today, statistics show that almost every Jew in Israel attends a seder. There are communal seders in many communities. At the start of the Seder, those who are in need are invited to enter and join.
It is the custome to say "Have a kosher and happy holiday" about Pesach, due to the many laws concerning the prohibition of leavened foods on the holiday.
The government of Israel sells its “chametz,” leavened products, to an Arab before the holiday in order not to transgress the commandment of not owning any chametz during the holiday. This includes any food product that contains leavened wheat, oat, barley, rye, or spelt products.
So do Jews who observe the holiday. Houses are thoroughly cleaned before Pesach and utensils and food containing chametz are sold to a non-Jew. After a search for remaining chametz in houses Thursday night, before which a special blessing is said, Jews burn it the following morning, several hours before Pesach begins. Both at night and in the morning they proclaim that any chametz left in their possession should be considered as dust - they have sold the rest.
Consult your local rabbi or an appropriate internet site for the time chametz should be burned, for the last minute one can eat chametz on Friday and when one can use it.
Dishes are changed for the holiday unless they have been made kosher for Passover through a procedure which depends on the material of which they are made. Not all materials can be made useable for Pesach.
In the absence of leaven, Jews will eat specially prepared unleavened bread, or matzah, on Pesach, as was done at the Exodus, when the Jews did not have enough time to wait for dough to rise before leaving Egypt. During their bondage, they ate matzah as well, called the "bread of affliction".
First-born males over 13 are required to fast on the day before Passover – in commemoration of the fact that first-born Jewish males were spared when first-born Egyptian males were killed during the tenth plague – but may be released of this obligation by participating in a halakhically mandated festive meal, like the ones that accompany the conclusion of study of a tractate of the Talmud or a circumcision, on the morning before Passover.
The traditional Seder is held Friday night this year – Friday and Saturday nights for Jews outside of Israel. The guide for the Seder is detailed in the Haggadah, literally "narration," which relates the story of the Exodus from Egypt, and which has many commentaries, points of discussion and rousing songs that make for a lively evening..
A plate placed on the Seder table contains several special foods: a roasted egg, symbolizing the special holiday sacrifices which were brought in the Temple; a roasted shank bone, recalling the special Passover lamb offered and eaten in Temple times; a mixture of chopped apples, nuts, wine and cinnamon known as charoset, symbolizing the mortar that the Hebrew slaves in Egypt used to make bricks; sprigs of parsley and lettuce, symbolizing spring; a bitter herb symbolizing the bitterness of slavery; and nearby, a bowl of salt water, recalling the tears shed by the Hebrew slaves in Egypt.
Four cups of wine (or most of each cup) are drunk at the Seder, each symbolizing a specific verb used by G-d in the Exodus story; a fifth cup, symbolizing a fifth verb, is filled for Elijah the Prophet, harbinger of the Messiah in the hope that he will arrive at the Seder.
Three whole pieces of matza mark the division of the Jewish people into priests (Kohenim), Levites and the general population are also placed on the table. There are also other explanations for this custom, as there are for almost all of the customs.
During the course of the Seder, the Ten Plagues are recalled. When each of the Plagues is mentioned, each participant dips a finger into his/her cup of wine and removes a drop; even though the Jews were oppressed in Egypt, we are reminded that we must not rejoice over the Egyptians' suffering. Our cups of wine cannot thus be full.
One of the more popular Seder customs for children is the asking of the Four Questions, the reaction of a child who wonders at a totally different kind of evening than what he is used to seeing during holidays. Another concerns the afikoman, a special piece of matza that is the last food eaten during the Seder. The head of the household customarily hides the afikoman somewhere in the house, and the children then search for it. Once found, the afikoman is "ransomed," since the Seder cannot continue until the afikoman is eaten. This helps to keep the children focused on the Seder and to pique their curiosity regarding the entire Passover epic.
The Seven Day Celebration, the Counting of the Omer, Maimouna:
On the morning of Tuesday 19 April, festive prayers, including a prayer for dew during the spring and summer, and special readings, will figure prominently in synagogue services.
During the intermediate days, between the first and last days, special prayers also are recited in synagogue. In Israel, all of Pesach is an official holiday for schools and most government offices. The roads in Israel are clogged, as the entire country takes to wheels - and this year, lovely spring weather is forecast. In the Torah, the Jewish people are told: " Today you are leaving [Egypt], in the month of Spring".
Jewish tradition maintains that the parting of the Red Sea and the destruction of the Egyptian army occurred on the seventh day of Passover, but even though Passover celebrates the Exodus from Egypt, Jews nevertheless do not rejoice over the death of the Egyptians in the sea and only an abridged version of Hallel (Psalms 113-118) – a holiday prayer – is recited after the first day of Passover.
On the Sabbath that marks the first day of Pesach, the day's special readings will include the Song of Songs.
From the evening of Saturday night, April 7th, Jews will keep a nightly count of the 49 days (seven weeks), until Friday evening, May 25th, one day before the holiday of Shavuot. This count commemorates the Temple offering of the omer, or sheaf of new grain, in keeping with the Biblical injunction of Leviticus 23:15-16.
Maimouna – an informal, yet widely celebrated holiday which originated among the Jews of North Africa, particularly those from Morocco, and is believed to be in honor of Maimonides, the great Torah luminary who lived in Egypt – will be celebrated Saturday night, Arpil 14th. According to custom, families prepare elaborate tables with various sweets and baked goods, and host friends and family members. Whole neighborhoods often close as celebrations spill out into the streets and parks.
For an in depth look at different aspects of the holiday, see A7's Judaism section.
Chag kasher vesameach - have a kosher and happy holiday!
|
“Remembering the atrocities of the Emergency” Anniversary Seminar in Allahabad point to an eerie similarity with Present Times.
26 June 2018
Remembering the atrocities of the Emergency, this darkest chapter of Indian history, The PUCL assembles each year hundreds of courageous activists, human rights victims and students from across the country. This year event is organised under the Allahabad Chapter of the PUCL in which attendees spoke about the Emergency in today’s context. In this serious discussion that lasted for three hours, people have said that the current Fascism is benefiting from the same failures of the past Emergency period: late recognition, underestimation, political indifference and rule above the law. 1970’s India imposed a series of escalating steps of oppression, including demonization, discrimination and isolation of vulnerable communities that evoke what we are seeing today.
It has been 43 years today since the 1975 Emergency declaration by the then Prime Minister Indira Gandhi. The Indian Emergency of 25th June 1975 to 21st March 1977 was a 21 month period, when President Fakhruddin Ali Ahmed, upon advice by Prime Minister Indira Gandhi, declared a state of emergency under Article 352 of the Constitution of India, effectively bestowing on her the power to rule by decree, suspending elections and civil liberties. The democracy was brought to a grinding halt and all the fundamental rights and legal remedies protected by the Constitution of The Republic of India were suspended. Nevertheless, her emergency rule faced immense criticism and is undoubtedly one of the most controversial periods of the political history of Independent India.
Several commentators have claimed that the current situation in India in several ways mirrors those dark days of Emergency. They have drawn parallels between Indira Gandhi and Modi, as well as alleging that our country is turning into a republic of fear and violence, where mob-lynching is a common occurrence. The neutral and critical pieces of reports are rare and major media houses show the tone of appeasement and impaired by paid and fake news. The judiciary is being denigrated, both internally and by external agencies, including political parties. The Opposition parties are seeking an impeachment of the Chief Justice itself. All institutions of democracy, including the Judiciary, the RBI, the Election Commission and the Free Press stressfully defending the reluctant clutches of state power. The agrarian distress and economic discontent is growing. Making matters worse is the surge of violence against minorities and the Dalit lower castes. The assault on civil liberties and freedoms has intensified.
OD Singh, former Secretary-General of PUCL Upra, who presided over the seminar, said that there have been emergencies like situation in different places before and after the Emergency announcement in our country, such as Tebhaga, the movement of Telangana, The current situation in Kashmir etc. He said that PUCL was born in the Emergency and today it is more dangerous than before and in these turbulent times, PUCL like organizations are more important than ever and need to be more robust and active.
Keeping the seminar alive, Advocate KK Roy narrated about the extraordinarily dangerous times we are living with where all columns of democracy filling with fascist elements. Despite constitutional and legislative prohibitions of any kind of discrimination, Marginalised communities continue to suffer violence. Today’s Dalit and Minorities are on the target of the state itself, Recent examples are numerous atrocities against minority communities and other vulnerable groups especially Dalits. Constant suppression is the new norm like the Bhima-Koregaon arrests in which activists and lawyers have been booked under the Unlawful Activities (Prevention) Act (UAPA). The draconian UAPA was imposed to keep citizens incarcerated for long periods of time, on vague charges, and without affording them an opportunity to answer their accusers in a swift and fair trial. On the other hand people like Chandrashekhar Azad Ravan have been booked with National Security Act (NSA). But the real perpetrators of violence roam freely. Impunity, or the fact that perpetrators of crimes granted immunity or be exempted from punishment, has been one of the serious impediments to justice and is the new social order we are facing.
Human Rights Activist, Ansar Indori of NCHRO, highlighted the ‘Politics of Ban’. The practice of ban continues to expand in India’s political firmament, with the increasing aggression of the Hindutva brigade and a political regime driven by its ideology. Banning was an important tool in Government’s suppression. Efforts to limit critical voices through the cancellation or suspension of registration of thousands of NGOs, including groups advocating for human rights and even public health groups are on the rise. Recently two mass organizations Mazdoor Sangathan Samiti (MSS) and Popular Front of India (PFI) were banned in the state of Jharkhand. MSS and PFI have been working for the downtrodden for years, fight in the public sphere for equality. The ‘politics of ban’ aims to divert the public discourse away from the government’s failure and to silence opposition to the government’s anti-people policies. He also narrated the extrajudicial executions and targeted killings of vulnerable communities in Uttar Pradesh where the police playing the role of secret judge, jury and executioner. Fake encounters are essentially the execution of disarmed or unarmed men, under the Yogi Sarkar is in large scale which raises many important questions for the rule of law and criminal justice system in our country.
Comrade Harishchand Dwivedi associated with Trade Union and Working class ,said Only in the election time rulers remember poor, For Indira Gandhi it was “Garibi Hatao” (eliminate poverty). At this time, Modi is also presenting himself as Messiah of Poor. But in reality Our rank of 100 in the ‘Hunger list’ is a matter of shame. The people should never let any government forget that nearly 22 per cent of India’s population is still poor and they also have the right to a life of dignity. Now Modi government is trying hard to remove its tag of anti-poor, anti-farmer and pro-corporate before election as usual.
PUCL’s Allahabad unit president, Suneet Singh also addressed the Seminar.
Ashish Mittal of CPI ML New Democracy added that the fascism of this time is not fascism of the time of Hitler Mussolini, where elections and civil rights were abrogated. Today’s fascism has molded the elections and the media in its favor. It can be resisted only by peaceful mass people struggles.
Ram Kailash of AIKMS, while mentioning the incident of forced disappearance of the Dalits from the pond land in Kondhiaara Block of Allahabad, said that dissenters being branded as anti-national and Maoists. The feeling of insecurity and fear enforced disappearance generates is not limited to the close relatives of the disappeared, but also affects communities and society as a whole. The slogan “Jai Shri Ram” is used for communal mobilisation and the amalgamation of religion and politics proved to be extremely beneficial for BJP.
Anand Malviya and Prakrash from CFD raised concern over the trees being cut in the name of development. Anand Malviya added that the protector of trees and environment is being described as “anti-development” as a whole. Vishwajej, the convener of the anti-fascist movement, said that tribals are fighting the real battle to save the environment, who are being driven out of the forest branding Maoists. There has been no development for the tribal. The land, the forests, the rivers have been exploited for resources. At the behest of the mining corporations, the government takes away the land and the forests of the tribal people and thereby their livelihoods away from them. We must have the courage to speak out against human rights violations, and the courage to act. With this courage, with energy and with good will, we can overcome this crisis.
Rithesh from Inklabi Student Front said that the roots of today’s fascism are present in the emergency which cannot be defeated by only elections. To counter the growing force of Sangh Parivar Fascism it will require a broad coalition of people of all backgrounds, unite and form a sustainable and nuanced coalition. Bahadur Ram and RP Kaithal of LIC Trade Union attending the seminar said, indeed there is a provision for emergency in our Constitution, but Indira Gandhi misused it for evil than good.
According to Seema Azad, Vice President, PUCL Allahabad Unit, we should keep doing this kind of open forum, because we are showing the whole country that we haven’t forgotten the day of Emergency; the day that so many people sacrificed themselves for freedom and democracy and for a better life for the next generations in our country. When there is no authority to question abuse of power, no mechanism to control it and no institution to make it accountable then that is the easy road to tyranny.
The seminar began with a song by Inklabi Student Front. The seminar adjourns with a conclusion note by PUCL’s Subedar Singh. A large number of people participated in the seminar, which lasted for 3 hours, concluded with a strong message to uphold the values of democracy, justice, peace and harmony.
|
Mechanical insulation is the insulating and jacketing of mechanical systems. It is used to cover pipes, ducts, tanks, and equipment in commercial or industrial environments and is typically relied upon to control temperature for a much broader range of variances than that of a typical home.
Residential insulation is typically found in the exterior walls and attics and is used to keep the environment a consistent, comfortable living temperature. The temperature differential in a home insulation environment is in most cases far less than that of a typical commercial or industrial application.
Mechanical insulation is primarily used to limit heat gain or loss from surfaces operating at temperatures above or below ambient temperature. The opportunities to limit that gain or loss are far greater in the commercial and industrial sectors versus the residential sector.
Mechanical Insulation is a simple technology providing significant results. A properly designed, installed, and maintained mechanical insulation system brings many benefits that could not be realized in any other way.
Mechanical insulation saves energy and reduces costs, reduces greenhouse gas emissions, provides personnel safety, enhances the performance of mechanical systems, and most importantly increases end-users’ short and long-term Return-On-Investment (ROI).
|
Manusia dalam bidang keilmuan disebut dengan istilah homo sapiens, karena memiliki kemampuan mental, intellegence, yang sangat penting untuk menopang kehidupan sehari-hari. In 1957 two vigorous advocates of symbolic AI—Allen Newell, a researcher on the RAND Corporation , Santa Monica , California, and Herbert Simon , a psychologist and pc scientist at Carnegie Mellon University , Pittsburgh, Pennsylvania—summed up the top-down method in what they known as the bodily image system speculation This speculation states that processing constructions of symbols is ample, in precept, to supply synthetic intelligence in a digital laptop and that, furthermore, human intelligence is the results of the identical sort of symbolic manipulations.
Certainly, removed from being regarded as indispensable to rational thought, ardour traditionally has been thought antithetical to it. Alternately – if emotions are by some means crucial to enabling common human degree intelligence – perhaps machines might be artificially endowed with these: if not with subjective qualia (beneath) at the least with their practical equivalents.
The doings of many machines – some much simpler than computers – encourage us to describe them in mental terms generally reserved for animals. Such techniques have discovered a number of applications from sport applications whose play improves with expertise to information mining (discovering patterns and regularities in our bodies of knowledge).
Within the Forties and Nineteen Fifties, plenty of researchers explored the connection between neurology , info principle , and cybernetics A few of them constructed machines that used digital networks to exhibit rudimentary intelligence, resembling W. Gray Walter ‘s turtles and the Johns Hopkins Beast Many of those researchers gathered for conferences of the Teleological Society at Princeton College and the Ratio Membership in England.
In the present day we most commonly discover that such purposes as search engines on the Internet, autonomous operation and interactive eLearning techniques, as well as recognition software for speech, facial options, finger prints, spell checkers, voice, anti-spam packages or algorithms which scan databases to search out anomalies.…Read more
|