text
stringlengths 188
632k
|
|---|
A weak and shallow snowpack that barely covers a multitude of rocks, stumps, logs, and other obstacles exists in the backcountry at this time. Snowpack depths range from 10-18 inches in areas above 7500 ft. with significantly less snow at the lower elevations. The N-NE facing slopes above 8000 ft. along the Sierra Crest and above 9000 ft in the Carson Range hold the most snow, but they also hold the weakest snowpack with layers of weak sugary snow (facets) sandwiched between old crusts sitting below the snow that has fallen since Nov 29th.
New snow and wind since Nov. 29 may have created some wind slabs on the leeward aspects near ridgelines and in gullies. While these winds slabs should remain small (at least until larger storms impact the forecast area - Tues, Wed?), a small slide can still have large consequences in a shallow snowpack.
As more snow accumulates, the weak layers of sugary snow near the base of the snowpack will become more of an issue. Recent observations around the forecast area have shown that these weak layers exist on most of the upper elevation N-NE aspects. Tests in these areas have indicated that these weak layers cannot handle much loading before they break. Observations also indicate that anchors poke through these weak layers and disrupt them in some areas. In other areas the weak layers seem more continuous. These conditions will present a Catch-22 for backcountry users because the areas with the best recreation potential will also be the areas where the weakest snowpack exists. Backcountry users should remain extra careful on these N-NE aspects where the persistent weak layers reside. Barring a major rain event to 11,000', N-NE aspects above 8,000' will become increasingly suspect as new snow accumulation loads the persistent weak layers.
A shallow snowpack does not eliminate the risk of avalanches. It does increase the likelihood of impact with rocks and and other shallowly buried obstacles if a person does get caught. The current snowpack remains just deep enough to mask the season ending obstacles lurking just below its surface, so even a fall or hard turn could have large consequences without ever triggering an avalanche.
While the U.S. Forest Service avalanche forecasters have been monitoring the snowpack, the non-profit partners at SAC have been hard at work as well. There are many great events currently on the calendar ranging from educational talks to ski movies to dinner events. Check the events page for more info. The next big SAC event is the Backcountry Ball on Dec 12. Click here for tickets and info.
There are also several excellent online avalanche education opportunities available to refresh and/or build your avalanche skills. Choose one from the drop down list under the "Education" tab at the top of this page.
This avalanche advisory is provided through a partnership between the Tahoe National Forest and the Sierra Avalanche Center. This advisory covers the Central Sierra Nevada Mountains between Yuba Pass on the north and Ebbetts Pass on the south. Click here for a map of the forecast area. This advisory applies only to backcountry areas outside established ski area boundaries. This advisory describes general avalanche conditions and local variations always occur. This advisory expires 24 hours after the posted time unless otherwise noted. The information in this advisory is provided by the USDA Forest Service who is solely responsible for its content.
|
STORY OF A MEXICAN IMMIGRANT 'HERO'
By JESUS RANGEL
Published: January 7, 1985
As a young, restless boy Pedro J. Gonzalez would watch the local telegraph operator send messages to faraway places and dreamed that one day he too would be the link between his remote, dusty village in Chihuahua, Mexico, and the rest of the world.
He eventually did become a telegrapher, at gunpoint in 1910 to the revolutionary leader Pancho Villa, who was then involved in a struggle to overthrow the dictator Porfirio Diaz.
But it was only a beginning for Mr. Gonzalez of a long career as a communicator. Now, Mr. Gonzalez, who is 90 years old and living in the predominately Mexican-American community of San Ysidro on the border with Mexico, is adding another dimension.
''Ballad of an Unsung Hero,'' to be shown on WNET/Channel 13 tonight at 10:30, is a chronicle of Mr. Gonzalez's life as a popular songwriter, singer, the first Spanish-language radio broadcaster in Southern California, and tireless civil-rights advocate on behalf of immigrants to the United States who ran afoul of the police.
In the Style of a Mexican Ballad
But it is also symbolic of the history of the people of Mexican descent in this country, from the early wave of immigrants following Mexico's revolution, to the present tide of migrant workers streaming across the border by the hundreds daily.
The 30-minute program makes entensive use of rare archival film from Mexico and the United States, and original music and recordings from the 1920's and 30's to tell the story in the style of a corrido, a Mexican ballad. The show is called ''Unsung Hero'' because it is only recently that Mr. Gonzalez's achievements have gained widespread recognition.
The historian Larena Parlee, a professor at the University of California at Irvine, came across Mr. Gonzalez during the summer of 1981 during a fruitless search for veterans of the Mexican revolution,in which two million people were killed.
Since then Mr. Gonzalez has become an archetypal figure to the many Mexican Americans of the Southwest and West, particularly California.
The mayors of Los Angeles and San Diego last month proclaimed a Pedro J. Gonzalez Day and he has been honored in numerous Mexican-American film festivals and public gatherings.
Los Angeles Radio Program
After serving with Pancho Villa in the revolution, he joined thousands of Mexican immigrants in the early 1920's to El Norte - as those who made the trek called United States - where he worked as a longshoreman and later pioneered the first Spanish- language radio program in Los Angeles.
Organizing a band of troubadours, ''Los Madrugadores,'' (The Early Birds), Mr. Gonzalez broadcasted an early-morning wakeup show geared to the workers heading to the fields and factories of the Southern California area.
It was during that time that he also recorded old Mexican ballads for the Columbia and Victor labels, which were seeking to capitalize on the huge Latin market.
But Mr. Gonzalez quickly came to the attention of the local authorities, who were uneasy about him using his popular show to protest events such as the forced deportation of a half- million Latins, many of them United States citizens. It was a time of economic difficulties in this country, and Mr. Gonzalez was charging that the Hispanics had become scapegoats.
The authorities labeled Mr. Gonzalez a rabble-rouser and tried to cancel his broadcasting license. He was later sentenced to 50 years in San Quentin prison on a rape charge, although the conviction has been questioned by Miss Parlee and others.
Protests Lead to Release
He served six years, but was released in the early 1940's after huge protest efforts, including appeals by two Mexican presidents, that were organized principally by his wife, Maria. He was deported to Mexico, where for the next several decades he continued to pioneer radio broadcasting in Tijuana. Eventually he was permitted to return to the United States.
Mr. Gonzalez relives the past daily in a one-room museum he keeps in his modest wooden home, where he lives with his wife, who is 68 years old.
Its walls are covered with old photographs, newspaper clippings, letters, posters, long lists of names and addresses, an old telegraph key, a Mexican flag and a United States flag.
Because of the publicity over the half-hour documentary, the home has recently been the site of numerous visits by activists within the Mexican- American community who view Mr. Gonzalez as an unknown hero.
''He represents an important part of cultural past and tradition,'' said Miss Parlee, who co-produced the show, along with Paul Espinosa of San Diego, ''And the film represents not only the plight of immigrants from Mexico but from other ethnic groups who experienced discrimination and deportation.''
Photo of Pedro J. Gonzalez
|
Why talk about gender and rice in Latin America?
MetadataShow full item record
Koningstein, Manon; Gumucio, Tatiana; Martinez, Jose Maria. 2016. Why talk about gender and rice in Latin America? International Center for Tropical Agriculture (CIAT), CGIAR Research Program on Rice. Global Rice Science Partnership (GRISP). Video (Available from https://youtu.be/4cXBjnpzJLE).
Permanent link to this item: http://hdl.handle.net/10568/71154
Internet URL: https://youtu.be/4cXBjnpzJLE
Usually we don't think it's important to talk about gender and rice in Latin America, but three socio economic studies on rice in Ecuador, Peru and Bolivia show that women do contribute to rice production. A whiteboard animation summarizing the research by CIAT and GRiSP.
|
Are you having trouble coping with loneliness during the quarantine? There are many restrictions that have disrupted our daily lives as a result of the pandemic. Loneliness imposes several risks to both your physical and mental health. Coping with loneliness is not always easy for some people. It is especially difficult for those individuals who are already dealing with issues such as addiction. The Right Step team of treatment professionals recognize the effects of loneliness on your physical and mental health and still welcomes individuals into treatment during the quarantine.
The Health Risks Associated with Loneliness
Loneliness was already an issue prior to the coronavirus. The social distancing, business closures, and other restrictions likely exacerbated the effects for individuals coping with loneliness during the quarantine.
Loneliness is a sort of adaptive response and is similar to hunger and thirst in this way. Loneliness leads people to seek social connections with other people. There are far-reaching effects of loneliness. This was well-documented even before people started their attempts at coping with loneliness during the quarantine. Several sources have revealed the effects of loneliness on people living alone. Research shows that loneliness impaired the overall quality of life among study participants. Additionally, some participants felt depressed, had major health issues such as cardiovascular disease, and were at increased risk of death due to loneliness.
Many mental health issues such as anxiety and depression arise from loneliness and lack of human interaction. If you are feeling increased levels of loneliness during the pandemic, you are not alone. The Right Step is here to provide you with the mental health resources to help you through this time. This may include participating in an individual therapy program virtually during the quarantine.
Loneliness also has risk factors associated with alcohol use disorders and substance use disorders. This may lead to the need for a dual diagnosis treatment center in TX, which treats both mental health disorders and substance abuse at the same time.
Loneliness, Quarantine, and Addiction
Studies show a direct correlation between loneliness and addiction. Coping with loneliness during quarantine potentially increases the risks of alcohol abuse, the abuse of other drugs, or the risk of relapse. The results of a study that compared loneliness with individuals that do, or do not have a substance use disorder, showed that drug users were more likely to experience loneliness. The researchers called loneliness, ‘psychologically destructive,’ and ‘terrifying.’
You do not have to experience terrifying feelings or psychological destructiveness associated with coping with loneliness during the quarantine. The addiction treatment center programs at The Right Step welcome new clients, as well as individuals that experienced a relapse. Our alcohol addiction treatment center helps you through your addiction to alcohol or to other drugs, while also helping you with the effects of coping with loneliness during the quarantine.
Our addiction treatment staff at The Right Step have the expertise to guide you through every step of regaining control over your life. We are able to help you live a life without giving in to drugs or abusing alcohol.
Addiction Treatment During Quarantine
Addiction is a lonely disease. The loneliness of addiction, compounded by coping with loneliness during the coronavirus quarantine, increases your risk of experiencing physical health issues not related to COVID-19. It also increases your risk of developing depression, or possibly other mental health disorders. If you are feeling lonely during this time, know that you are not alone and that there is help available.
Get the help that you need right now by contacting The Right Step at 17135283709. Recover from your addiction and start recovering from the effects of coping with loneliness during the quarantine.
|
10 Foods with Healthy Fats
The new year brings a fresh and clean start to our lives. It’s a time to press the reset button and start things new — and for most of us that means starting with a new diet. With the new year come many resolutions to become fit, healthy, and eat more foods that are good for you, but that doesn’t mean cutting out all fatty foods.
Foods contain several different kinds of fat — and some are better for you than others. Some fats even help promote good health. Harmful fats are saturated and trans fats, which are often found in butter and animal fat. These kinds of fats are to be avoided as they increase your risk of cardiovascular disease and type 2 diabetes. But monounsaturated fat and polyunsaturated fat are the good kinds of fat, which are found in plant-based foods and oils. These fats can help improve cholesterol levels and reduce the risk of heart disease. One type of fat, omega-3 fatty acids, are especially beneficial for heart health.
We’ve rounded up a few of our favorite foods that contain healthy fats. Making these healthy food choices can help you keep your resolution of becoming a stronger and healthier person. Swapping out a few unhealthy foods for these replacements can jump-start your new diet and make 2014 a healthy and happy year.
Special thanks to Joanna Fantozzi for contributing to this article.
Emily Jacobs is the Recipe editor at The Daily Meal. Follow her on Twitter @EmilyRecipes.
|
At the point when Joe lived back on Earth, it felt like the years were flying by. At that point, he went to work in the mines on the ironplanet and found how wrong he’d been.
One side of the little world delighted in the unending night, and in his warmth safe spacesuit, it was sufficiently cool to stand and penetrate into the ground. There was neither dawn nor dusk to stamp the progression of time, yet he knew the iron planet spun around its star so quick that each time he set down for his 8 Earth-hours of a close eye, he woke up two years after the fact.
In the event that Joe the space digger existed, that would be his life on KOI 1843.03, a potential planet found by NASA’s Kepler space telescope. This odd world seems to have the most limited known year, finishing a circle around its star in only 4 hours, 15 minutes.
Because it is so near the star, one side of the planet in all likelihood dependably confronts the star and feels a greater amount of its gravitational draw, making tidal strengths that squish and extend the minor body. Also, to withstand the star’s gravitational anger, the planet must be made completely of iron.
“When you’re so near the star, tidal communications turn out to be strong to the point that they can tear separated the surface of a planet and pulverize it,” says Roberto Sanchis-Ojeda, a graduate under study at the Massachusetts Institute of Technology. “The main way the planet can clutch its own particular issue is by having a truly high thickness.”
Kepler put in four years looking for planets that cross before their stars, or travel, and square a tiny bit of starlight at customary interims. While most stargazers were endeavoring to discover universes sufficiently far from their stars to be tenable, Sanchis-Ojeda and associates needed to discover how short a planet’s year could be. They filtered through the Kepler information searching for planets whose days last just a couple of hours. These universes would have traveled a huge number of times amid Kepler’s watch, making them simple to spot.
“As of recently with Kepler, we never discussed orbital times of 4, 5, 6 hours,” says Sanchis-Ojeda. His group found around 20 applicant planets that circle their stars in under a large portion of an Earth day. The one with the briefest year is KOI 1843.03, a planet around 0.6 times the span of Earth that circles a sun-like star. Be that as it may, while Earth goes around the sun at around 30 kilometers for every second, this planet zooms around its star at 250 kilometers for each second.
To hold itself together, the planet must be no less than 70 for every penny press with a thin mantle of silicates, the group figures. The cannonball planet could even be made completely of iron.
KOI 1843.03 is not an affirmed planet yet – a couple of stars that circle each other behind the objective star can make a similar flag, for example. In any case, the group is genuinely sure that it’s genuine, says Sanchis-Ojeda, to some degree in light of the fact that a similar star has two more conceivable planets at more prominent separations, so more planets are probably going to have framed.
The jury is still out on how such nearly circling planets are made. They could have been conceived as rough universes further in the planetary framework and moved inwards because of gravitational connections with different planets. Or, then again they could be the centers of once-huge planets that moved and whose external layers were impacted away by stellar radiation.
“The primary concern is, it’s a confound. We don’t know how you could wind up with this sort of planet,” says Dimitar Sasselov of Harvard University, who was not associated with the new work. In the event that the planets relocated into position, they should, in any case, be spiraling in towards their stars and would be immediately decimated. So it is amazing to see so huge numbers of them.
“The way that there is more than one of these essentially lets you know there might be something different going on,” says Sasselov.
He includes that KOI 1843.03 might be so near its host that it is in reality inside the star’s upper environment or crown. The two sides of the planet may then be shelled with radiation, he says: “So you might be perched on the night side and still get high measurements of these particles hitting you straightforwardly. These particles are so lively they’ll illuminate the surface and likely make it shine.”
|
Do Art Drawing and Sketching Set
Learning to draw takes patience, practice, and attention. The Do Art Drawing and Sketching Set is a great place to start! Featuring four Faber-Castell graphite pencils with varying graphite densities, three black Faber-Castell pens with varying nib sizes, and an illustrated, step-by-step instruction manual, this set from Creativity for Kids is a brilliant place to start! This set also includes a twenty-four-page sketchbook, copy-grid, pencil sharpener and eraser.
From Creativity for Kids |
Item # 14558 CR
- Kids learn to draw and sketch with pencils and ink
- Features step-by-step illustrated instructions and the highest quality children’s art materials from Faber-Castell
- Includes 4 graphite pencils with varying led density, 3 black ink pens of varying nib sizes, sketch book (24 pages), color paper, tracing paper, instruction booklet (20 pages), copy grid, sharpener, and eraser
|
Europe has clashed with the US Obama administration over climate change in a potentially damaging split that comes ahead of crucial political negotiations on a new global deal to regulate greenhouse gas emissions.
The Guardian understands that key differences have emerged between the US and Europe over the structure of a new worldwide treaty on global warming. Sources on the European side say the US approach could undermine the new treaty and weaken the world's ability to cut carbon emissions.
The treaty will be negotiated in December at a UN meeting in Copenhagen and is widely billed as the last chance to save the planet from a temperature rise of 2C or higher, which the EU considers dangerous.
"If we end up with a weaker framework with less stringent compliance, then that is not so good for the chances of hitting 2C," a source close to the EU negotiating team said.
News of the split comes amid mounting concern that the Copenhagen talks will not make the necessary progress.
Ban Ki-moon, the UN general secretary, told the Guardian last night that negotiations had stalled and need to "get moving".
Ahead of an unprecedented UN climate change summit of almost 100 heads of government in New York next week, Moon said the leaders held in their hands "the future of this entire humanity".
He said: "We are deeply concerned that the negotiation is not making much headway [and] it is absolutely and crucially important for the leaders to demonstrate their political will and leadership."
The dispute between the US and Europe is over the way national carbon reduction targets would be counted. Europe has been pushing to retain structures and systems set up under the Kyoto protocol, the existing global treaty on climate change. US negotiators have told European counterparts that the Obama administration intends to sweep away almost all of the Kyoto architecture and replace it with a system of its own design.
The issue is highly sensitive and European officials are reluctant to be seen to openly criticise the Obama administration, which they acknowledge has engaged with climate change in a way that President Bush refused to. But they fear the US move could sink efforts to agree a robust new treaty in Copenhagen.
The US distanced itself from Kyoto under President Bush because it made no demands on China, and the treaty remains political poison in Washington. European negotiators knew the US would be reluctant to embrace Kyoto, but they hoped they would be able to use it as a foundation for a new agreement.
If Kyoto is scrapped, it could take several years to negotiate a replacement framework, the source added, a delay that could strike a terminal blow at efforts to prevent dangerous climate change. "In Europe we want to build on Kyoto, but the US proposal would in effect kill it off. If we have to start from scratch then it all takes time. It could be 2015 or 2016 before something is in place, who knows."
According to the UN's Intergovernmental Panel on Climate Change (IPCC), world emissions need to peak by 2015 to give any chance of avoiding a 2C rise.
Europe is unlikely to stand up to the US, the source added. "I am not sure that the EU actually has the guts for a showdown and that may be exactly the problem." The US plan is likely to anger many in the developing world, who are keen to retain Kyoto because of the obligations it makes on rich countries.
Under Kyoto, greenhouse gas reductions are subject to an international system that regulates the calculation of emissions, the purchase of carbon credits and contribution of sectors such as forestry. The US is pushing instead for each country to set its own rules and to decide unilaterally how to meet its target.
The US is yet to offer full details on how its scheme might work, though a draft "implementing agreement" submitted to the UN by the Obama team in May contained a key clause that emissions reductions would be subject to "conformity with domestic law".
Legal experts say the phrase is designed to protect the US from being forced to implement international action it does not agree with. Farhana Yamin, an environmental lawyer with the Institute of Development Studies, who worked on Kyoto, said: "It seems a bit backwards. The danger is that the domestic tail starts to wag the international dog."
The move reflects a "prehistoric" level of debate on climate change in the wider US, according to another high-ranking European official, and anxiety in the Obama administration about its ability to get a new global treaty ratified in the US Senate, where it would require a two-thirds majority vote. The US has not ratified a major international environment treaty since 1992 and President Clinton never submitted the Kyoto protocol for approval, after a unaminous Senate vote indicated it would be rejected on economic grounds.
The US proposal for unilateral rule-setting "is all about getting something through the Senate," the source said. "But I don't have the feeling that the US has thought through what it means for the Copenhagen agreement."
The move could open loopholes for countries to meet targets without genuine carbon cuts, they said. Europe is not concerned that the US would exploit such loopholes, but it fears that other countries might.
The US State Department, which handles climate change, would not comment.
Stuart Eizenstat, who negotiated Kyoto for the US, said: "There has been a sea change in US attitudes [on climate] and the new president is deeply committed on this issue. But the EU needs to understand the limitations in the US. The reality is that is it impossible for my successor to negotiate something in Copenhagen beyond that which Congress will give the administration in domestic cap-and-trade legislation."
Nigel Purvis, who also worked on the US Kyoto team, said: "It's not welcome news in Europe but the Kyoto architecture shouldn't have any presumed status. Many decisions were taken when the United States was not at the negotiating table. Importing the Kyoto architecture into a new agreement would leave it vulnerable to charges of repackaging."
He denied the US move would weaken the agreement. "It is important for the US to negotiate an agreement it can join, because another agreement that did not involve the United States would set back efforts to protect the climate. Is it weaker to have a system that applies to more countries? I would argue not."
|
These lectures cover activity-based costing where manufacturing overhead is allocated using activities and cost pool rather than traditional cost accounting.
[vc_row][vc_column][vc_video link=”https://youtu.be/tIP2n5gvNps” title=”Introduction to Activity based Costing”][vc_video link=”https://youtu.be/SHv0ZGxSDWs” title=”Example: Activity Based Costing”][vc_video link=”https://youtu.be/7hlmC2QR_YE” title=”CPA Practice Questions Activity Based Costing Part 1 of 2″][/vc_column][/vc_row][vc_row][vc_column][vc_video link=”https://youtu.be/OP5LzCVNH4I2″ title=”CPA Practice questions Activity Based Costing Part 2 of 2″][/vc_column][/vc_row]
Traditional cost accounting methods suffer from several limitations that can result in distorted costs for decision-making purposes. All manufacturing costs—even those that are not caused by any specific product—are allocated to products. Nonmanufacturing costs that are caused by products are not assigned to products. And finally, traditional methods tend to place too much reliance on unit-level allocation bases such as direct labor and machine-hours. This results in overcosting high-volume products and undercosting low-volume products and can lead to mistakes when making decisions. Activity-based costing estimates the costs of the resources consumed by cost objects such as products and customers. The activity-based costing approach assumes that cost objects generate activities that in turn consume costly resources. Activities form the link between costs and cost objects. Activity-based costing is concerned with overhead—both manufacturing overhead and selling and administrative overhead. The accounting for direct labor and direct materials is usually the same under traditional and ABC costing methods.
To build an ABC system, companies typically choose a small set of activities that summarize much of the work performed in overhead departments. Associated with each activity is an activity cost pool. To the extent possible, overhead costs are directly traced to these activity cost pools. The remaining overhead costs are allocated to the activity cost pools in the first-stage allocation. Interviews with managers often form the basis for these allocations. An activity rate is computed for each cost pool by dividing the costs assigned to the cost pool by the measure of activity for the cost pool. Activity rates provide useful information to managers concerning the costs of performing overhead activities. A particularly high cost for an activity may trigger efforts to improve the way the activity is carried out in the organization. In the second-stage allocation, activity rates are used to apply costs to cost objects such as products and customers. The costs computed under activity-based costing are often quite different from the costs generated by a company’s traditional cost accounting system. While the ABC system is almost certainly more accurate, managers should nevertheless exercise caution before making decisions based on the ABC data. Some of the costs may not be avoidable and hence would not be relevant.
|
Apple scab (Venturia inaequalis) is a fungus. Its spores spend the winter on the tree's fallen leaves and fruit. Spraying for apple scab can be avoided if you plant only apple-scab-immune apple varieties. Resistant varieties will probably need some spraying, and will need the most care in years when April and May are wet, which is hardly uncommon.
Spraying for apple scab should begin at or immediately after bud break in late winter or early spring, when the bud scales crack open or break away as the spring buds swell. The tender, new tissue exposed is very vulnerable to fungal infection. Complete coverage of the tree's branches, twigs, buds, leaves and ground is needed.
Use a fungicide like Liqui-Cop, a liquid copper spray. Add 3 to 4 tablespoons of Liqui-Cop to each gallon of water. Add a "spreader/sticker" according to label directions for better adhesion in case of rain. Always use a mask when spraying, and cover bare skin.
Subsequent sprays should be applied at intervals of 10 days to two weeks and continue until spring rains stop in May or June.
Some books say not to bother spraying apple trees for apple scab in winter because the fungus isn't there in winter. However, the Willamette Valley often has periods of springlike weather that trigger spore release from uncollected debris beneath trees. Copper spray is cheap, so apply a spray or two in late winter in case we get a warm spell.
Apple scab looks like a dark brown or black lesion or scab on the surface of apples or leaves. It can distort and ruin fruit and leaves, causing them to drop. Leaf drop can reduce photosynthesis and may weaken the tree further after the fungus has stolen the fruit you worked all year for. Debris removal and properly timed spraying can eradicate or control apple scab. Start now.
RECOMMENDED CULTIVARS: These are all welcome in my garden.
Immune to apple scab: 'Bramley,' 'GoldRush,' 'Liberty' and 'Prima'
Scab-resistant: 'Ashmead's Kernel,' 'Erwin Baur,' 'Hudson's Golden Gem' and 'Roxbury Russet'
CULTIVARS SUSCEPTIBLE TO SCAB: 'Golden Delicious,' 'Red Delicious,' 'Gravenstein,' 'Melrose,' 'Tydeman's Late Orange,' 'Worcester Pearmain' and 'Yellow Bellflower'
For apple cultivars:
Home Orchard Society fruit propagation fair on Saturday, March 19.
For Liqui-Cop and spreader/sticker:
-- Freelance writer/photographer Vern Nelson
|
How to read guitar notes
To learn how to read guitar notes is not as tricky as you think. In standard notation, music is written on something called a Staff. The staff consists of 5 lines. The notes can be written on the lines or between them. The higher the note is placed on the staff, the higher is the note (pitch). When the notes are higher or lower than the staff, extra lines are added as you can see on the image further down.
Music can be written in different clefs. Guitar music is written in G clef (treble clef). It is called the G clef because the clef circles round the G note.
Let's focus on the note height first and wait with the rhythm. Here is a standard notation staff and a tab staff. On the tab staff you can see where the notes can be played on the guitar. The difficulty with reading notes on guitar is that the same note can be played on different places of the neck.
The first thing you should do though is to learn the notes on the first 4 or 5 frets of the guitar, start with one string at a time. For a complete overview of all the notes on the guitar click here.
|
Ecological succession is the process of change in the species structure of an ecological community over time. The time scale can be decades (for example, after a wildfire), or even millions of years after a mass extinction.
The community begins with relatively few pioneering plants and animals and develops through increasing complexity until it becomes stable or self-perpetuating as a climax community. The ʺengineʺ of succession, the cause of ecosystem change, is the impact of established species upon their own environments. A consequence of living is the sometimes subtle and sometimes overt alteration of one's own environment.
It is a phenomenon or process by which an ecological community undergoes more or less orderly and predictable changes following a disturbance or the initial colonization of a new habitat. Succession may be initiated either by formation of new, unoccupied habitat, such as from a lava flow or a severe landslide, or by some form of disturbance of a community, such as from a fire, severe windthrow, or logging. Succession that begins in new habitats, uninfluenced by pre-existing communities is called primary succession, whereas succession that follows disruption of a pre-existing community is called secondary succession.
Succession was among the first theories advanced in ecology. The study of succession remains at the core of ecological science. Ecological succession was first documented in the Indiana Dunes of Northwest Indiana which led to efforts to preserve the Indiana Dunes. Exhibits on ecological succession are displayed in the Hour Glass, a museum in Ogden Dunes.
Precursors of the idea of ecological succession go back to the beginning of the 19th century. The French naturalist Adolphe Dureau de la Malle was the first to make use of the word succession concerning the vegetation development after forest clear-cutting. In 1859 Henry David Thoreau wrote an address called "The Succession of Forest Trees" in which he described succession in an oak-pine forest. "It has long been known to observers that squirrels bury nuts in the ground, but I am not aware that any one has thus accounted for the regular succession of forests." The Austrian botanist Anton Kerner published a study about the succession of plants in the Danube river basin in 1863.
H. C. CowlesEdit
Henry Chandler Cowles, at the University of Chicago, developed a more formal concept of succession. Inspired by studies of Danish dunes by Eugen Warming, Cowles studied vegetation development on sand dunes on the shores of Lake Michigan (the Indiana Dunes). He recognized that vegetation on dunes of different ages might be interpreted as different stages of a general trend of vegetation development on dunes (an approach to the study of vegetation change later termed space-for-time substitution, or chronosequence studies). He first published this work as a paper in the Botanical Gazette in 1899 ("The ecological relations of the vegetation of the sand dunes of Lake Michigan"). In this classic publication and subsequent papers, he formulated the idea of primary succession and the notion of a sere—a repeatable sequence of community changes specific to particular environmental circumstances.
Gleason and ClementsEdit
From about 1900 to 1960, however, understanding of succession was dominated by the theories of Frederic Clements, a contemporary of Cowles, who held that seres were highly predictable and deterministic and converged on a climatically determined stable climax community regardless of starting conditions. Clements explicitly analogized the successional development of ecological communities with ontogenetic development of individual organisms, and his model is often referred to as the pseudo-organismic theory of community ecology. Clements and his followers developed a complex taxonomy of communities and successional pathways.
Henry Gleason offered a contrasting framework as early as the 1920s. The Gleasonian model was more complex and much less deterministic than the Clementsian. It differs most fundamentally from the Clementsian view in suggesting a much greater role of chance factors and in denying the existence of coherent, sharply bounded community types. Gleason argued that species distributions responded individualistically to environmental factors, and communities were best regarded as artifacts of the juxtaposition of species distributions. Gleason's ideas, first published in 1926, were largely ignored until the late 1950s.
Two quotes illustrate the contrasting views of Clements and Gleason. Clements wrote in 1916:
The developmental study of vegetation necessarily rests upon the assumption that the unit or climax formation is an organic entity. As an organism the formation arises, grows, matures, and dies. Furthermore, each climax formation is able to reproduce itself, repeating with essential fidelity the stages of its development.— Frederic Clements
while Gleason, in his 1926 paper, said:
An association is not an organism, scarcely even a vegetational unit, but merely a coincidence.— Henry Gleason
This classification seems not to be of fundamental value, since it separates such closely related phenomena as those of erosion and deposition, and it places together such unlike things as human agencies and the subsidence of land.— Henry Cowles
A more rigorous, data-driven testing of successional models and community theory generally began with the work of Robert Whittaker and John Curtis in the 1950s and 1960s. Succession theory has since become less monolithic and more complex. J. Connell and R. Slatyer attempted a codification of successional processes by mechanism. Among British and North American ecologists, the notion of a stable climax vegetation has been largely abandoned, and successional processes have come to be seen as much less deterministic, with important roles for historical contingency and for alternate pathways in the actual development of communities. Debates continue as to the general predictability of successional dynamics and the relative importance of equilibrial vs. non-equilibrial processes. Former Harvard professor F. A. Bazzaz introduced the notion of scale into the discussion, as he considered that at local or small area scale the processes are stochastic and patchy, but taking bigger regional areas into consideration, certain tendencies can not be denied.
The trajectory of successional change can be influenced by site conditions, by the character of the events initiating succession (perturbations), by the interactions of the species present, and by more stochastic factors such as availability of colonists or seeds or weather conditions at the time of disturbance. Some of these factors contribute to predictability of succession dynamics; others add more probabilistic elements. Two important perturbation factors today are human actions and climatic change.
In general, communities in early succession will be dominated by fast-growing, well-dispersed species (opportunist, fugitive, or r-selected life-histories). As succession proceeds, these species will tend to be replaced by more competitive (k-selected) species.
Trends in ecosystem and community properties in succession have been suggested, but few appear to be general. For example, species diversity almost necessarily increases during early succession as new species arrive, but may decline in later succession as competition eliminates opportunistic species and leads to dominance by locally superior competitors. Net Primary Productivity, biomass, and trophic properties all show variable patterns over succession, depending on the particular system and site.
Ecological succession was formerly seen as having a stable end-stage called the climax, sometimes referred to as the 'potential vegetation' of a site, and shaped primarily by the local climate. This idea has been largely abandoned by modern ecologists in favor of nonequilibrium ideas of ecosystems dynamics. Most natural ecosystems experience disturbance at a rate that makes a "climax" community unattainable. Climate change often occurs at a rate and frequency sufficient to prevent arrival at a climax state. Additions to available species pools through range expansions and introductions can also continually reshape communities.
The development of some ecosystem attributes, such as soil properties and nutrient cycles, are both influenced by community properties, and, in turn, influence further successional development. This feed-back process may occur only over centuries or millennia. Coupled with the stochastic nature of disturbance events and other long-term (e.g., climatic) changes, such dynamics make it doubtful whether the 'climax' concept ever applies or is particularly useful in considering actual vegetation.
Primary, secondary and cyclic successionEdit
Successional dynamics beginning with colonization of an area that has not been previously occupied by an ecological community, such as newly exposed rock or sand surfaces, lava flows, newly exposed glacial tills, etc., are referred to as primary succession. The stages of primary succession include pioneer plants (lichens and mosses), grassy stage, smaller shrubs, and trees. Animals begin to return when there is food there for them to eat. When it is a fully functioning ecosystem, it has reached the climax community stage. For example, parts of Acadia National Park in Maine went through primary succession.
Successional dynamics following severe disturbance or removal of a pre-existing community are called secondary succession. Dynamics in secondary succession are strongly influenced by pre-disturbance conditions, including soil development, seed banks, remaining organic matter, and residual living organisms. Because of residual fertility and pre-existing organisms, community change in early stages of secondary succession can be relatively rapid. In a fragmented old field habitat created in eastern Kansas, woody plants "colonized more rapidly (per unit area) on large and nearby patches."
Secondary succession is much more commonly observed and studied than primary succession. Particularly common types of secondary succession include responses to natural disturbances such as fire, flood, and severe winds, and to human-caused disturbances such as logging and agriculture. As an example, secondary succession has been occurring in Shenandoah National Park following the 1995 flood of the Mormon River, which destroyed plant and animal life. Today, plant and animal species are beginning to return.
Seasonal and cyclic dynamicsEdit
Unlike secondary succession, these types of vegetation change are not dependent on disturbance but are periodic changes arising from fluctuating species interactions or recurring events. These models modify the climax concept towards one of dynamic states.
Causes of plant successionEdit
Autogenic succession can be brought by changes in the soil caused by the organisms there. These changes include accumulation of organic matter in litter or humic layer, alteration of soil nutrients, change in pH of soil by plants growing there. The structure of the plants themselves can also alter the community. For example, when larger species like trees mature, they produce shade on to the developing forest floor that tends to exclude light-requiring species. Shade-tolerant species will invade the area.
Allogenic succession is caused by external environmental influences and not by the vegetation. For example, soil changes due to erosion, leaching or the deposition of silt and clays can alter the nutrient content and water relationships in the ecosystems. Animals also play an important role in allogenic changes as they are pollinators, seed dispersers and herbivores. They can also increase nutrient content of the soil in certain areas, or shift soil about (as termites, ants, and moles do) creating patches in the habitat. This may create regeneration sites that favor certain species.
Climatic factors may be very important, but on a much longer time-scale than any other. Changes in temperature and rainfall patterns will promote changes in communities. As the climate warmed at the end of each ice age, great successional changes took place. The tundra vegetation and bare glacial till deposits underwent succession to mixed deciduous forest. The greenhouse effect resulting in increase in temperature is likely to bring profound Allogenic changes in the next century. Geological and climatic catastrophes such as volcanic eruptions, earthquakes, avalanches, meteors, floods, fires, and high wind also bring allogenic changes.
In 1916, Frederic Clements published a descriptive theory of succession and advanced it as a general ecological concept. His theory of succession had a powerful influence on ecological thought. Clements' concept is usually termed classical ecological theory. According to Clements, succession is a process involving several phases:[page needed]
- Nudation: Succession begins with the development of a bare site, called Nudation (disturbance).
- Migration: It refers to arrival of propagules.
- Ecesis: It involves establishment and initial growth of vegetation.
- Competition: As vegetation becomes well established, grow, and spread, various species begin to compete for space, light and nutrients.
- Reaction: During this phase autogenic changes such as the buildup of humus affect the habitat, and one plant community replaces another.
- Stabilization: A supposedly stable climax community forms.
A seral community is an intermediate stage found in an ecosystem advancing towards its climax community. In many cases more than one seral stage evolves until climax conditions are attained. A prisere is a collection of seres making up the development of an area from non-vegetated surfaces to a climax community. Depending on the substratum and climate, different seres are found.
Changes in animal lifeEdit
Succession theory was developed primarily by botanists. The study of succession applied to whole ecosystems initiated in the writings of Ramon Margalef, while Eugene Odum’s publication of The Strategy of Ecosystem Development is considered its formal starting point.
Animal life also exhibit changes with changing communities. In lichen stage the fauna is sparse. It comprises few mites, ants and spiders living in the cracks and crevices. The fauna undergoes a qualitative increase during herb grass stage. The animals found during this stage include nematodes, insects larvae, ants, spiders, mites, etc. The animal population increases and diversifies with the development of forest climax community. The fauna consists of invertebrates like slugs, snails, worms, millipedes, centipedes, ants, bugs; and vertebrates such as squirrels, foxes, mice, moles, snakes, various birds, salamanders and frogs.
Succession of micro-organisms including fungi and bacteria occurring within a microhabitat is known as microsuccession or serule. This type of succession occurs in recently disturbed communities or newly available habitat, for example in recently dead trees, animal droppings, exposed glacial till, etc. Microbial communities may also change due to products secreted by the bacteria present. Changes of pH in a habitat could provide ideal conditions for a new species to inhabit the area. In some cases the new species may outcompete the present ones for nutrients leading to the primary species demise. Changes can also occur by microbial succession with variations in water availability and temperature. Theories of macroecology have only recently been applied to microbiology and so much remains to be understood about this growing field. A recent study of microbial succession evaluated the balances between stochastic and deterministic processes in the bacterial colonization of a salt marsh chronosequence. The results of this study show that, much like in macro succession, early colonization (primary succession) is mostly influenced by stochasticity while secondary succession of these bacterial communities was more strongly influenced by deterministic factors.
According to classical ecological theory, succession stops when the sere has arrived at an equilibrium or steady state with the physical and biotic environment. Barring major disturbances, it will persist indefinitely. This end point of succession is called climax.
The final or stable community in a sere is the climax community or climatic vegetation. It is self-perpetuating and in equilibrium with the physical habitat. There is no net annual accumulation of organic matter in a climax community. The annual production and use of energy is balanced in such a community.
- The vegetation is tolerant of environmental conditions.
- It has a wide diversity of species, a well-drained spatial structure, and complex food chains.
- The climax ecosystem is balanced. There is equilibrium between gross primary production and total respiration, between energy used from sunlight and energy released by decomposition, between uptake of nutrients from the soil and the return of nutrient by litter fall to the soil.
- Individuals in the climax stage are replaced by others of the same kind. Thus the species composition maintains equilibrium.
- It is an index of the climate of the area. The life or growth forms indicate the climatic type.
Types of climaxEdit
- Climatic Climax
- If there is only a single climax and the development of climax community is controlled by the climate of the region, it is termed as climatic climax. For example, development of Maple-beech climax community over moist soil. Climatic climax is theoretical and develops where physical conditions of the substrate are not so extreme as to modify the effects of the prevailing regional climate.
- Edaphic Climax
- When there are more than one climax communities in the region, modified by local conditions of the substrate such as soil moisture, soil nutrients, topography, slope exposure, fire, and animal activity, it is called edaphic climax. Succession ends in an edaphic climax where topography, soil, water, fire, or other disturbances are such that a climatic climax cannot develop.
- Catastrophic Climax
- Climax vegetation vulnerable to a catastrophic event such as a wildfire. For example, in California, chaparral vegetation is the final vegetation. The wildfire removes the mature vegetation and decomposers. A rapid development of herbaceous vegetation follows until the shrub dominance is re-established. This is known as catastrophic climax.
- When a stable community, which is not the climatic or edaphic climax for the given site, is maintained by man or his domestic animals, it is designated as Disclimax (disturbance climax) or anthropogenic subclimax (man-generated). For example, overgrazing by stock may produce a desert community of bushes and cacti where the local climate actually would allow grassland to maintain itself.
- The prolonged stage in succession just preceding the climatic climax is subclimax.
- Preclimax and Postclimax
- In certain areas different climax communities develop under similar climatic conditions. If the community has life forms lower than those in the expected climatic climax, it is called preclimax; a community that has life forms higher than those in the expected climatic climax is postclimax. Preclimax strips develop in less moist and hotter areas, whereas Postclimax strands develop in more moist and cooler areas than that of surrounding climate.
There are three schools of interpretations explaining the climax concept:
- Monoclimax or Climatic Climax Theory was advanced by Clements (1916) and recognizes only one climax whose characteristics are determined solely by climate (climatic climax). The processes of succession and modification of environment overcome the effects of differences in topography, parent material of the soil, and other factors. The whole area would be covered with uniform plant community. Communities other than the climax are related to it, and are recognized as subclimax, postclimax and disclimax.
- Polyclimax Theory was advanced by Tansley (1935). It proposes that the climax vegetation of a region consists of more than one vegetation climaxes controlled by soil moisture, soil nutrients, topography, slope exposure, fire, and animal activity.
- Climax Pattern Theory was proposed by Whittaker (1953). The climax pattern theory recognizes a variety of climaxes governed by responses of species populations to biotic and abiotic conditions. According to this theory the total environment of the ecosystem determines the composition, species structure, and balance of a climax community. The environment includes the species responses to moisture, temperature, and nutrients, their biotic relationships, availability of flora and fauna to colonize the area, chance dispersal of seeds and animals, soils, climate, and disturbance such as fire and wind. The nature of climax vegetation will change as the environment changes. The climax community represents a pattern of populations that corresponds to and changes with the pattern of environment. The central and most widespread community is the climatic climax.
The theory of alternative stable states suggests there is not one end point but many which transition between each other over ecological time.
The forests, being an ecological system, are subject to the species succession process. There are "opportunistic" or "pioneer" species that produce great quantities of seed that are disseminated by the wind, and therefore can colonize big empty extensions. They are capable of germinating and growing in direct sunlight. Once they have produced a closed canopy, the lack of direct sun radiation at soil makes it difficult for their own seedlings to develop. It is then the opportunity for shade-tolerant species to become established under the protection of the pioneers. When the pioneers die, the shade-tolerant species replace them. These species are capable of growing beneath the canopy, and therefore, in the absence of catastrophes, will stay. For this reason it is then said the stand has reached its climax. When a catastrophe occurs, the opportunity for the pioneers opens up again, provided they are present or within a reasonable range.
An example of pioneer species, in forests of northeastern North America are Betula papyrifera (White birch) and Prunus serotina (Black cherry), that are particularly well-adapted to exploit large gaps in forest canopies, but are intolerant of shade and are eventually replaced by other shade-tolerant species in the absence of disturbances that create such gaps.
Things in nature are not black and white, and there are intermediate stages. It is therefore normal that between the two extremes of light and shade there is a gradient, and there are species that may act as pioneer or tolerant, depending on the circumstances. It is of paramount importance to know the tolerance of species in order to practice an effective silviculture.
|This article needs additional citations for verification. (April 2008) (Learn how and when to remove this template message)|
- Sahney, S.; Benton, M.J. (2008). "Recovery from the most profound mass extinction of all time" (PDF). Proceedings of the Royal Society: Biological. 275 (1636): 759–65. PMC . PMID 18198148. doi:10.1098/rspb.2007.1370.
- "The Virtual Nature Trail at Penn State New Kensington". The Pennsylvania State University. Retrieved Oct 10, 2013.
- Smith, S. & Mark, S. (2009). The Historical Roots of the Nature Conservancy in the Northwest Indiana/Chicagoland Region: From Science to Preservation. The South Shore Journal, 3. "Archived copy". Archived from the original on 2016-01-01. Retrieved 2015-11-22.
- Smith, S. & Mark, S. (2006). Alice Gray, Dorothy Buell, and Naomi Svihla: Preservationists of Ogden Dunes. The South Shore Journal, 1. "Archived copy". Archived from the original on 2012-09-13. Retrieved 2012-06-11.
- Smith, S. & Mark, S. (2007). The cultural impact of a museum in a small community: The Hour Glass of Ogden Dunes. The South Shore Journal, 2. "Archived copy". Archived from the original on 2012-11-30. Retrieved 2012-06-11.
- The succession of forest trees, and wild apples. Archive.org. Retrieved on 2014-04-12.
- Thoreau, H. D. (2013). Essays: A Fully Annotated Edition (J. S. Cramer, Ed.). New Haven, Connecticut: Yale University Press.
- Bazzaz, F. A. (1996). Plants in changing environments. UK: Cambridge University Press. p. 3. ISBN 9 780521 398435.
- Schons, Mary. "Henry Chandler Cowles". National Geographic. Retrieved 25 June 2014.
- Clements, Frederic E. (1916) Plant succession: an analysis of the development of vegetation
- Gleason, Henry A.(1926) The individualistic concept of the plant association. The Bulletin of the Torrey Botanical Club
- Cowles, Henry C. (1911) The causes of vegetational cycles. Annals of the Association of American Geographers, 1 (1): 3-20
- Bazzaz, F. A. (1996). Plants in changing environments. UK: Cambridge University Press. pp. 4–5. ISBN 9 780521 398435.
- Bazzaz, F. A. (1996). Plants in changing environments. UK: Cambridge University Press. p. 1. ISBN 9 780521 398435.
- "Secondary succession in an experimentally fragmented landscape: Community patterns across space and time". The U.S. Department of Agriculture. Retrieved 2013-09-30.
|last1=in Authors list (help)
- Michael G. Barbour and William Dwight Billings (2000) North American Terrestrial Vegetation, Cambridge University Press, 708 pages ISBN 0-521-55986-3, ISBN 978-0-521-55986-7
- Bazzaz, F. A. (1996). Plants in Changing Environments. Cambridge University Press. p. 4. ISBN 9 780521 398435.
- Dini-Andreote, Francisco; Stegen, James; Dirk van Elsas, Jan; Falcão Salles, Joana (17 March 2015). "Disentangling mechanisms that mediate the balance between stochastic and deterministic processes in microbial succession". PNAS. 112 (11). doi:10.1073/pnas.1414261112.
- McEvoy, Thom, Positive Impact Forestry, p 32 "Species Succession and Tolerance", Island Press, 2004
|Wikimedia Commons has media related to Ecological succession.|
|Wikibooks has a book on the topic of: Ecology/Community succession and stability|
- Science Aid: Succession Explanation of succession for high school students.
- Biographical sketch of Henry Chandler Cowles.
- Robbert Murphy sees a significantly ideological, rather than scientific, basis for the disfavour shown towards succession by the current ecological orthodoxy and seeks to reinstate succession by holistic and teleological argument.
|
A house is a group of factions working together to achieve complex political goals on a grand scale. Once a faction’s general applies to a house, the generals of the other factions in the house can vote to admit or refuse the faction entry to the house. The generals also vote on which faction should hold leadership of the house. The general of this faction is then also the House Marshall (HM).
What are houses?
Last Updated: 442d
|
In this lesson we are going to put your sweep picking in to practice by learning three different basic major arpeggio shapes. We have given you the arpeggio diagrams so that you can work on each shape separately. Once you have each shape down we will put them together to play through a 1 4 5 progression in the key of A major. The arpeggio shapes that you will be learning are based off of the E bar chord shape, A bar chord shape, and open C chord shape. I will walk you through the first arpeggio shape but you should make sure to go through the other two shapes as well. Make sure to pay attention to the up and downstroke indicators on the TAB. The picking indicators are just recommendations not rules. If you are just starting to learn how to sweep pick be patient and start out slowly.
The first arpeggio shape that you will be learning is based on the E bar chord shape. Take a moment to look at the A major arpeggio diagram. Play the 5th fret of the 6th string with your 1st finger using an upstroke and then the 9th fret of the 6th string with your 4th finger using a downstroke. Continue by playing the 7th fret of the 5th and 4th strings with your 3rd finger using downstrokes. You will have to roll your 3rd finger from the 5th to the 4th string in order to do this properly. Continue using downstrokes on the 6th fret of the 3rd string with your 2nd finger, 5th fret of the 2nd and 1st strings with your 1st finger. You will have to roll your 1st finger from the 2nd string to the 1st string to do this properly. Now grab the 9th fret of the 1st string with your 4th finger using an upstroke. That’s it for the ascending part of this arpeggio. Now you need to work your way back down.
Start descending down this shape by pulling off of the 9th fret of the 1st string with your 4th finger to the 5th fret of the 1st string with your 1st finger. Now rock your 1st finger over to the 5th fret of the 2nd string and play that note using an upstroke. Move to the 6th fret of the 3rd string with your 2nd finger using an upstroke. Play the 4th and 5th strings on the 7th fret with your 3rd finger using upstrokes. Reach all the way to the 9th fret of the 6th string with your 4th finger using an upstroke. For the last note you can either pull-off or your 4th finger or use a downstroke to play the 5th fret of the 1st string with your 1st finger. This completes the whole shape ascending and descending.
The other two arpeggio shapes are very similar as far as your picking hand goes. Go through the TAB slowly and see if you can work through these shapes. Check out the video a couple more times if you need to. Remember to practice slowly. Every note should be clear and distinct. You should only have one note ringing out at any given time. This can be challenging when you are using one finger to play multiple notes on adjacent strings. Check out the diagram for the D major arpeggio that is based on the A bar chord shape. You will see that the notes on the 2nd, 3rd and 4th strings are all on the 7th fret. You should play all of these notes with your 3rd finger on your fretting hand. This can be challenging because you have to roll your 3rd finger from string to string without letting the previous notes ring out. Take it slowly, have fun, and use a metronome if you have one. Check out some music by John Petrucci. His sweep picking is pretty clean and flawless.
|
Study finds a bit of saliva can reflect resilience against stress
EUGENE, Ore. — (Oct. 2, 2013) — A component in saliva has opened a window into a person's psychological health, reflecting resiliency in the face of stress, say researchers at the University of Oregon and Arizona State University.
That component is salivary nerve growth factor, a neurotrophic protein abbreviated as sNGF. It typically is linked to the survival, development or function of neurons, but now may be a marker of stress response.
"We usually focus on the depleting aspects of the stress response, but now we are recognizing that there may be a regenerative or replenishing aspect," said Heidemarie Laurent, a professor of psychology at the UO and lead author on a study published Sept. 27 in the journal Psychosomatic Medicine. "We are seeing that sNGF responds to stress, and that this response relates to both short-term and more lasting measures of psychological health — in other words, sNGF seems to underlie resilience rather than risk."
For the study, Laurent collected five saliva samples from 40 young adults (17 male, 23 female) twice before and three times following a stressful conflict-resolution task. The participants were drawn from a larger study of romantic couples. Samples also were taken from a 20-member control group at the same time intervals but in the absence of the conflict scenario. Samples were analyzed for sNGF and two other stress-linked indicators. Changes in sNGF were significant in the experimental group in response to the conflict.
The saliva was analyzed at ASU's newly opened Institute for Interdisciplinary Salivary Bioscience Research, which is headed by study co-author Douglas A. Granger, a pioneer in the field of salivary bioscience. "The use of oral fluid as a research and diagnostic specimen has tremendous potential,” said ASU's Granger, a professor of psychology. "Have you ever wondered why adversity affects some people more negatively than others? Well, it is possible that sNGF is an important piece of that puzzle."
Nerve growth factor was discovered in the 1950s by Italian neurologist Rita Levi-Montalcini and Stanley Cohen in collaborative research done at Washington University in St. Louis; they later shared the Nobel Prize in Physiology and Medicine in 1986. Much has been uncovered about its role in the brain and nervous system, but few scientists considered how NGF levels in people's saliva might be related to the behavioral and biological components of the body's stress response.
Laurent and Granger recently reported that conflict with a romantic partner caused sNGF to rise in parallel with the two main components of the "fight or flight" stress response — the autonomic nervous system and the hypothalamic-pituitary-adrenal axis. Most significantly, the researchers found that the more a person's sNGF level increased in response to stress, the lower their conflict-related negative emotions.
"This finding," Laurent said, "suggests that an sNGF response to stress might be protective, a counterpoint to other aspects of the stress response known to negatively impact mental and physical health. This is consistent with what we’re finding in adolescents, where higher levels of sNGF during stress are associated with lower levels of problem behaviors."
The group's new paper is the first of a series related to sNGF and its benefits in the study of social relationships and behavior. "One of the things that makes sNGF so different is that it is related to positive attributes," Granger said. "So rather than being a risk marker, sNGF has the potential to index resilience. This research offers important insights that could revolutionize the way adaptive stress responses are understood and measured — not simply as activation in any one system, but as a pattern of activation across multiple, linked systems."
"Researchers at the University of Oregon continue to lead the way in prevention science," said Kimberly Andrews Espy, vice president for research and innovation and dean of the UO Graduate School. "This valuable research by Dr. Laurent identifying a new means of measuring stress response is helping to yield critical insights into psychological health that may lead to new prevention and intervention strategies."
Laurent is a new faculty member in the UO's Department of Psychology and an adjunct faculty member at the ASU institute. At the time of the study, Laurent was at the University of Wyoming. Sean M. Laurent, an adjunct professor of psychology at the UO, also was a co-author.
The research was supported by faculty grant-in-aid from the University of Wyoming and a basic research grant from the UW College of Arts and Sciences.
About the University of Oregon
The University of Oregon is among the 108 institutions chosen from 4,633 U.S. universities for top-tier designation of "Very High Research Activity" in the 2010 Carnegie Classification of Institutions of Higher Education. The UO also is one of two Pacific Northwest members of the Association of American Universities.
Media Contacts: Jim Barlow, director of science and research communications, 541-346-3481, email@example.com, and Margaret Coulombe, Arizona State University, 480-727-8934, Margaret.Coulombe@asu.edu
Editor's Note: Co-author Douglas Granger is founder and chief strategy and scientific adviser at Salimetrics LLC in State College, Pa. His relationship with Salimetrics is managed by the Conflict of Interest Committee at the Johns Hopkins University School of Medicine.
Sources: Heidemarie Laurent, assistant professor of psychology, title, 541-346-7051, firstname.lastname@example.org, and Douglas Granger, director of the ASU Institute for Interdisciplinary Salivary Bioscience Research, 814-933-7376, Douglas.Granger@asu.edu
Follow UO Science on Facebook: http://www.facebook.com/UniversityOfOregonScience
UO Science on Twitter: http://twitter.com/UO_Research
More UO Science/Research News: http://uoresearch.uoregon.edu
Note: The University of Oregon is equipped with an on-campus television studio with a point-of-origin Vyvx connection, which provides broadcast-quality video to networks worldwide via fiber optic network. In addition, there is video access to satellite uplink, and audio access to an ISDN codec for broadcast-quality radio interviews.
|
Current Japanese Emperor Akihito, 82 years old, plans on abdicating in a few years – something that hasn’t occurred in the last 200 years.
According to the Imperial Household Agency, as cited by NHK, the Emperor believes that his old age prevents him from performing his duties as an emperor to the fullest. He said that someone suitable should take over. His eldest son and heir, Crown Prince Naruhito, is currently 56 years old.
Emperor Akihito had suffered from several health problems over recent years. In 2012, he underwent a successful heart bypass surgery, several months after he was hospitalized for pneumonial bronchitis in 2011. He is also reportedly receiving hormonal treatment to prevent a recurrence of prostate cancer following removal of a tumor in 2003. In spite of this, his plan of stepping down the throne doesn’t mean that he has any immediate health concerns.
However, according to the Asahi Shimbun newspaper, a senior official of the Imperial Household Agency Shinichiro Yamamoto had denied the reports of the abdication plan, saying it was incorrect.
Born in 1933, the Emperor has reigned for 27 years. He dedicated his life to heal the wounds caused by Japan’s aggression across Asia in the World War II. His father, former Emperor Hirohito, was the ruling emperor at the time of war. In contrast to his father’s controversial figure, Akihito embraced the pacifist constitution and also his role as a symbol of national unity. He marked the 70th anniversary of World War II with an expression of “deep remorse”, praying that “this tragedy of war will not be repeated and together with the people express my deep condolences for those who fell in battle and in the ravages of war.”
In his attempts to repair the ties between Japan and other countries, Akihito made many visits abroad. He was also the first Japanese monarch in living memory to have visited China, a land ravaged by Japan’s past military aggression.
For the emperor to abdicate, the imperial law would have to be revised, as the law states that the throne will be passed after the last emperor passes away.
|
Actuators have become a crucial part of the automated system, as they help with controlling equipment using hydraulic, pneumatic or in some of the cases electronic signals.
Types of Robotic Actuators
Contributed by | Progressive Automations
Actuators have become a crucial part of the automated system, as they help with controlling equipment using hydraulic, pneumatic or in some of the cases electronic signals. Linear actuators (see more here www.progressiveautomations.com/linear-actuators) are quite common as they form the bulk of applications used in the control of equipment moving along a lateral axis. However it is also important to note that there are other types of actuators that are found in robotic arms. One of the actuators types is referred to as a synchronous actuator and relates to the fact that it has a motor which rotates synchronously with the oscillating current. The brushless DC servo is also a common one and like the name suggests it uses a DC current and does not have brushes.
Instead it has permanent magnet poles on the rotor which are attracted to the magnetism of the rotating poles. They tend to last longer and give off no noise along with reduced interference from electromagnetism.
The stepper is also brushless and moves in small but discrete steps. It can be used with digital and analog signals. The brushed DC servo on other hand has brushes/commutators which are found on a permanent magnet or a wound stator. The asynchronous actuator on the other hand is designed to slip for it to generate torque. Traction motor is an electric motor that is common cars for driving the wheels. AC servo motors are two phased just like the driving current and are crucial where fast and accurate responses are required. Pneumatic actuators are powered by compressed air to give quick and accurate movements. The hydraulic actuators on the other hand use hydraulic pressure to create rotation and hence torque.
The content & opinions in this article are the author’s and do not necessarily represent the views of RoboticsTomorrow
This post does not have any comments. Be the first to leave a comment below.
Post A Comment
You must be logged in before you can post a comment. Login now.
|
Much like the glass of a greenhouse, gases in our atmosphere sustain life on Earth by trapping the sun's heat. These gases allow the sun's rays to pass through and warm the earth, but prevent this warmth from escaping our atmosphere into space. Without naturally-occurring, heat-trapping gases—mainly water vapour, carbon dioxide and methane—Earth would be too cold to sustain life as we know it.
The danger lies in the rapid increase of carbon dioxide and other greenhouse gases that intensify this natural greenhouse effect. For thousands of years, the global carbon supply was essentially stable as natural processes removed as much carbon as they released. Modern human activity—burning fossil fuels, deforestation, intensive agriculture—has added huge quantities of carbon dioxide and other greenhouse gases.
Today's atmosphere contains 42 per cent more carbon dioxide than it did at the start of the industrial era. Levels of methane and carbon dioxide are the highest they have been in nearly half a million years.
Sign up for our newsletter
The Kyoto Protocol covers six greenhouse gases: carbon dioxide, methane, nitrous oxide, hydrofluorocarbons, perfluorocarbons and sulphur hexafluoride. Of these six gases, three are of primary concern because they are closely associated to human activities.
Carbon dioxide is the main contributor to climate change, especially through the burning of fossil fuels.
Methane is produced naturally when vegetation is burned, digested or rotted without the presence of oxygen. Large amounts of methane are released by cattle farming, waste dumps, rice farming and the production of oil and gas.
Nitrous oxide, released by chemical fertilizers and burning fossil fuels, has a global warming potential 310 times that of carbon dioxide.
|
Package SpecificationThe class Differencer is a differencing engine for hierarchically structured data. It takes two or three inputs and performs a two-way or three-way compare on them.
If the input elements to the differencing engine implement the IStructureComparator interface the engine recursively applies itself to the children of the input element. Leaf elements must implement the org.eclipse.compare.IStreamContentAccessor interface so that the differencer can perform a bytewise comparison on their contents.
One good example for this is org.eclipse.compare.ResourceNode which implements both interfaces (and more) for Eclipse workspace resources (org.eclipse.core.resources.IResource).
Another example is the DocumentRangeNode which can be used to compare hierarchical structures
that are superimposed on a document, that is where nodes and leafs correspond to ranges in a document
Typically DocumentRangeNodes are created while parsing a document and they represent the semantic entities of the document (e.g. a Java class, method or field). The two subclasses JavaNode (in org.eclipse.jdt.internal.ui.compare) and PropertyNode (in org.eclipse.jdt.internal.ui.compare) are good examples for this.
By default the differencing engine returns the result of the compare operation as a tree of DiffNode objects. However, this can be changed by overriding a single method of the engine.
Every DiffNode describes the changes among the two or three inputs.
A tree of DiffNodes can be displayed in a DiffTreeViewer. The DiffTreeViewer requires that inner nodes of the tree implement the IDiffContainer interface and leafs the IDiffElement interface.
The typical steps to compare hierarchically structured data and to display the differences would be to:
- map the input data into a tree of IStructureComparator and IStreamContentAccessors,
- perform the compare operation by means of the Differencer, and
- feed the differencing result into the DiffTreeViewer.
Interface Summary Interface Description ICompareInputInterface for objects used as input to a two-way or three-way compare viewer. ICompareInputChangeListenerListener that gets informed if one (or more) of the three sides of an
ICompareInputobject changes its value.
IDiffElementis used in the
DiffTreeViewerto display the kind of change detected as the result of a two-way or three-way compare.
IStructureComparatorInterface used to compare hierarchical structures. IStructureCreatorInterface used to create a hierarchical structure of
IStructureComparators for a given input object.
IStructureCreator2An extension to the
IStructureCreatorinterface that supports the use of shared documents.
Class Summary Class Description DiffContainerThe standard implementation of a diff container element. DiffElementAn abstract base implementation of the
DifferencerA generic two-way or three-way differencing engine. DiffNodeDiff node are used as the compare result of the differencing engine. DiffTreeViewerA tree viewer that works on objects implementing the
DocumentRangeNodeA document range node represents a structural element when performing a structure compare of documents. SharedDocumentAdapterWrapperAn implementation of
ISharedDocumentAdapterthat wraps another shared document adapter.
StructureCreator StructureDiffViewerA diff tree viewer that can be configured with a
IStructureCreatorto retrieve a hierarchical structure from the input object (an
ICompareInput) and perform a two-way or three-way compare on it.
StructureRootNodeA node that acts as the root of the tree returned from a
|
One of the major tasks in designing a course is to determine the learning outcomes. The learning outcomes would appear in your syllabus as course and module specific objectives or outcomes. Before you set out to write your course outcomes and objectives, it is very helpful to understand Bloom’s taxonomy and higher order thinking.
Benjamin Bloom (1913-1999) is an educational psychologist who led the effort in developing a taxonomy that served as a framework for classifying learning objectives, i.e., what we expect students to learn as a result of instruction. The taxonomy was updated and revised in 2002, and the resulting taxonomy is below.
Image via http://pcs2ndgrade.pbworks.com/w/page/43727547/FrontPage
As shown, there are six types of learning objectives that focus on specific kinds of learning. From the inner circle to the outer circle, the hierarchy of objectives range from simple to complex and from concrete to abstract. Each level is briefly explained below (Krathwohl, 2002, p.214):
- Remember: Retrieving relevant knowledge from long-term memory (recognizing, recalling)
- Understand: Determining the meaning of instructional messages, including oral, written, and graphic communication (interpreting, exemplifying, classifying, summarizing, inferring, comparing, explaining)
- Apply: Carrying out or using a procedure in a given situation (executing, implementing)
- Analyze: Breaking materials into its constituent parts and detecting how the parts relate to one another an to an overall structure or purpose (differentiating, organizing, attributing)
- Evaluate: Making judgments based on criteria and standards (checking, critiquing)
- Create: Putting elements together to form a novel, coherent whole or make an original product (generating, planning, producing)
Bloom’s Taxonomy provides common language about learning goals and objectives. More importantly, it provides a basis for us to examine our course goals and assessment, and see what we are trying to promote among students: are we engaging students in lower level or higher order thinking? All too often class learning activities and assessments focus mainly on lower levels in Bloom’s Taxonomy (Remember, Understand, Apply), but for students to be competent in their future profession and to deal with the complexities in real life situations, the levels of Analyze, Evaluate, and Create are what we as educators should be aiming for. When preparing your course, take a critical look at your goals, objectives, outcomes and test items, and see if you are addressing all the levels of thinking.
For more information about Bloom’s Taxonomy and Higher Order Thinking, please refer to the following resources:
- Bloom, B.S. (Ed.). Engelhart, M.D., Furst, E.J., Hill, W.H., & Krathwohl, D.R. (1956). Taxonomy of educational objectives: The classification of educational goals. Handbook 1: Cognitive domain. New York: David McKay. (Note: Lewis library holds the book. Call number: LB 17 T235 v.1 1956)
- Krathwohl, D. R. (2002). A revision of Bloom’s Taxonomy: An overview. Theory into Practice, 41 (4).
Writing learning goals and objectives
In preparing your course syllabus or planning for a particular class, one of the tasks is to write the specific learning goals and objectives. Below are some resources that can help you to write your learning goals and objectives. Keep in mind, goals and objectives are closely linked to assessment.
- Verbs for Bloom’s taxonomy: this document provides you with the verbs you can use in stating goals and objectives.
- Writing instructional objectives, by UCSD School of Medicine: https://www.unthsc.edu/academic-affairs/wp-content/uploads/sites/22/writing_instructional_objectives.pdf
|
Down is a terrific thermal insulator and is used extensively for popular products like bedding, jackets and sleeping bags. It works well as pillow filling thanks to its soft, malleable characteristics.
Down comes at a considerable price if you’re concerned with the well-being of animals.
As we all know, down doesn’t grow on trees. Sadly, most down/feathers are gathered in a way that is distressing to the birds.
As a result, purchasing down products can result in the inhumane treatment of animals. Bird feather harvesting techniques can be unpleasant.
There are three methods of collection:
- After slaughter for meat – This generally involves boiling the bird’s corpses in water for several minutes to loosen the feathers. The body feathers are then plucked and the down is separated either by hand or machine.
- Live plucking – Every six to seven weeks before slaughter, birds are captured. They are held down by the neck and their feathers torn out. This process often results in the bird’s skin being torn. IKEA and Patagonia eliminated live-plucked down from their products due to this inhumane practice.
- Gathering from live birds – This method involves brushing or combing the animals to extract feathers and down that are ready to fall out naturally. This is the least traumatic of the three harvesting techniques, yet abuse is still common in industrial production.
Fortunately there are responsible options for producing down.
Pillow shoppers that are committed to their down filling AND want to treat birds better should look for products manufactured using The Responsible Down Standard (RDS).
The Responsible Down Standard is an independent, voluntary global set of guidelines that recognizes and rewards the best practices in the harvesting of bird feathers. RDS is managed by the Textile Exchange, a global non-profit devoted to the responsible production of textile products.
Over 550 million birds are now under farm certification to the RDS. Those birds are grateful!
What are “down alternative” pillows?
Products labeled “down alternative” are most commonly filled with some variation of polyester fibers. These have become quite popular thanks to the advancement of technology. These synthetic materials can perform nearly as well as real down. Additionally, they are easily cleaned.
Note: “down alternative” filling is often marketed as being hypoallergenic. Down alternatives are presented as options for those suffering from allergies to down. It turns out that down allergies are very rare. What is common is an allergy to dust mites and no pillow filling is immune. Make sure you’re genuinely allergic to down before you switch to a sub-par synthetic pillow filling.
The synthetic options do not require the use of any animal parts. However, these materials carry a heavier ecological footprint than down. They are not easily recyclable and do not biodegrade like real bird feathers. Thus, for the ecologically sensitive consumer, these products are a trade-off.
I tried a down alternative pillow stuffed with “poly gel fiber” filling. They’re unfortunately not as effective as genuine down.
Kapok and cotton are all natural alternatives that feel similar to down.
They’re soft and are safe for you, mother earth and all the birds out there! I’ve tried both cotton and kapok pillows. They aren’t better unfortunately. As far as comfort goes, most will agree that down is superior.
Try this (very different) option.
I would still be sleeping with my familiar old down pillow today, but thanks to a friend’s recommendation, I tried a buckwheat pillow. I wasn’t an instant convert. It was totally different, so it took some getting used to. But, after about a week, I was sleeping much better. A year later I was manufacturing my own buckwheat pillows. Yes – I love them that much! Don’t take my word for it. Our customer’s reviews speak for themselves!
Check out this testimonial from a feather pillow convert:
“As far back as I can remember using a pillow at night, I’ve used a feather pillow. Pillows stuffed with the softest down have been my default, my go to. I haughtily looked down on pillows of any other type. This was even though I’d been growing more dissatisfied with my feather pillow’s tendency to wake me in the middle of the night because it’s lofty support had degraded and squished away through after a few hours…
The first week was difficult. I was so used to the soft, plushness of feather pillows: the buckwheat pillow felt like a slab of concrete in comparison. But, then the second week hit. By then, my muscles were well adjusted. The pillow start to feel supportive rather than hard. I was a convert! This pillow is great. It excels at all-night-long support and good breathability. Unlike my feather pillows of the past, this pillow works with/for me, rather than against me. What a fantastic pillow!” –Geoff, verified Hullo customer
|
Parkinson’s disease is a debilitating neurodegenerative disorder that affects thousands of people each year. A progressive disease, Parkinson’s develops slowly over a number of years, affecting the dopamine-producing parts of the brain. The resulting deficiency of dopamine is caused by the loss of nerve cells within the brain.
Over the years, Parkinson’s has been treated through the use of medication to control the symptoms of impaired balance and motor problems. These medications are used to increase or substitute the low dopamine levels within the brain.
One type of medication is known as a dopamine agonist.
Dopamine Agonists for Parkinson's Disease
Dopamine agonists work to mimic dopamine effects within the brain and are effective in helping provide relief for symptoms. However, studies now show that dopamine agonists may contribute to impulse control disorders, such as gambling and compulsive behavior that can take the form of excessive shopping, sexual encounters or compulsive eating. Because dopamine is known as the “feel-good” part of the brain, drugs that activate the dopamine receptors may create a risk for higher compulsive behavior.
Dopamine agonists can be taken on their own or with a medication known as levodopa, a highly effective medication used for Parkinson’s. Levodopa is a natural chemical that is converted to dopamine in the brain. Over the years, levodopa may lose its effectiveness and become less stable. Dopamine agonists are not as potent as levodopa and are often given in later stages of Parkinson’s, in conjunction with levodopa. Two of the most common types of dopamine agonists are Mirapex (pramipexole) and Requip (ropinirole).
Patients on dopamine agonists should be monitored by their doctor for any side effects or interactions with other medications. Interactions with alcohol, antipsychotics and blood pressure medications may lead to complications.
If the patient is suffering from compulsive behavior stemming from dopamine agonists, they may choose to try alternative treatment methods or a carbidopa-levodopa infusion. Some of the main issues that patients feel with Parkinson’s include motor problems—trouble walking and moving with tremors. The need for medications can help to ease these symptoms. Significant improvements can take place in the early stages of Parkinson’s but, over time, the effects of medications may diminish or may wax and wane over a period of time.
Impulse Control Disorders
According to a study published in the journal Neurology, 87 percent of participants who were diagnosed with Parkinson’s in the study reported that they had experienced impulse control disorders such as compulsive shopping, binge eating, compulsive sexual behavior, and gambling. During the study, 30 participants who were experiencing the disorder stopped taking the medication and found the symptoms had decreased. Dopamine agonists with the highest risk of increased impulsivity were Pramipexole and Ropinirole.
These drugs will work wonders for many coping with Parkinson’s disease, but for some the link between dopamine agonists and impulsive behavior is clear. Patients should be screened for compulsive behavior, consult with their physicians as to the best course of treatment, and be monitored over the course of time if they decide to take dopamine agonists.
|
It is officially stated they have 272 mosques, of which that of Aurungzeb, with its lofty minarets, is the largest.
In the reign, however, of Aurungzeb, it was overrun by the Turks.
The Mogul empire rapidly expanded during the reigns of Akbar and his successors down to Aurungzeb, when it attained its climax.
But one of those sons, Aurungzeb, was a man of restless ambition.
Aurungzeb was the first of the Moghuls to reside in the Mahomedan atmosphere of Delhi throughout his long reign.
Govind spent most of his time in wars with Aurungzeb marked by indomitable perseverance rather than success.
Within thirteen years of Aurungzeb's death, in 1706, six sovereigns were seated on the imperial throne.
Not content with his appointed province of the Deccan, Aurungzeb pretended to the imperial crown itself.
The head was then immediately brought to Aurungzeb, as a certificate that his orders had been duly executed.
|
"Satyameva Jayate" (Sanskrit: सत्यमेव जयते satyam-eva jayate; lit. "Truth alone triumphs.") is a mantra from the ancient Indian scripture Mundaka Upanishad. Following the independence of India, it was adopted as the national motto of India in May 1949. It is inscribed in script at the base of the national emblem. The emblem and the words "Satyameva Jayate" are inscribed on one side of all Indian currency. The emblem is an adaptation of the Lion Capital of Ashoka which was erected around 250 BCE at Sarnath, near Varanasi in the north Indian state of Uttar Pradesh. It is inscribed on all currency notes and national documents.
- In Devanāgarī script
सत्यमेव जयते नानृतं सत्येन पन्था विततो देवयानः ।
येनाक्रमन्त्यृषयो ह्याप्तकामा यत्र तत् सत्यस्य परमं निधानम् ॥
satyameva jayate nānṛtaṁ
satyena panthā vitato devayānaḥ
yatra tat satyasya paramaṁ nidhānam
- In English
Popular connotations also include:
- 'Truth stands Invincible'
- 'Truth alone triumphs*'
- 'Truth alone conquers, not falsehood'
- 'The true prevails, not the untrue'
- 'Truth alone conquers, not untruth'
- 'Truth Alone Triumphs, not (na) that against Sacred law (Rta)
- Vaimaye Vellum (Tamil: வாய்மையே வெல்லும்)
- "Hindus laud Mick Jagger for singing in Sanskrit - Times Of India". Timesofindia.indiatimes.com. 2011-08-12. Retrieved 2012-05-23.
- "Motto for State Emblem" (PDF). Press Information Bureau of India - Archive.
- Department related parliamentary standing committee on home affairs (2005-08-25). "One hundred and sixteenth report on the state emblem of India (Prohibition of improper use) Bill, 2004". New Delhi: Rajya Sabha Secretariat, New Delhi: 6.11.1. Retrieved 2008-09-26.
- "The Mundaka Upanishad with Shankara’s Commentary". Wisdom Library.
- Swami Krishnananda. "The Mundaka Upanishad:Third Mundaka, First Khanda".
- (Max Muller (SBE 15))
- (Radhakrishnan, The Principal Upanishads) - citations from Mehendale
- "Minutes of the first meeting of the National Committee for Commemoration of 150th Birth Anniversary of Mahamana Pandit Madan Mohan Malaviya 26 July 2011 at 6.00 pm - 7, Race Course Road, New Delhi." (PDF).
|This article about government in India is a stub. You can help Wikipedia by expanding it.|
|
Flores and Lembata traditional architecture is a separate story by itself. Traversing district borders you immediately notice a difference in the shape of homes and roofs, meaning you have entered a region with yet another culture. Typically all communities have a Rumah Adat, a vernacular house, which is the center of community life, where important meetings are held and ceremonies take place. The Rumah Adat and all houses were constructed with local materials of wood, bamboo, stones and roofs were covered with Ijuk – fibers from the Enau tree – or alternatively with Alang Alang. In this picture of an Enau tree you can see the black Ijuk fibers at the top of the trunk. Alang Alang was harvested from the hills, dried and tied together on bamboo strips. These dry materials burn easily and at times Rumah Adats were destroyed by fires. Nowadays many traditional houses are covered with zinc and many new houses are now constructed with bricks, concrete and plaster.
Pictures in below slideshow were kindly shared by Irene Dubrowa, Eco Flores advisor on traditional architecture. Irene researched the traditional architecture of Flores. Underneath this slideshow Irene explains a bit more about the differences in the styles of various districts.
Photos 02A East-Flores Kawaliwu – a “traditional” house with two vertical elements on top of the roof (taken from above and the back side)
Photos 02B and 02C East-Flores clan-houses around Leworahang. One very distinct feature of the clan houses is the large piece of wood that forms the ridge and is shaped like a crocodile, as well as the three vertical bamboo poles on the roof ridge. Sketch 2B shows the main features of the East Flores dwelling house Sketch 2A shows the outline of the clan house.
Photo 03 – it shows a “typical traditional” house of the Nagekeo. You can see that the top of the roof narrows down towards a very short roof ridge, which is then covered with many layers of alang-alang grass – this accounts for the impression that the top of the roof is slanting outwards, just like an upside-down trapezoid (Sketch 3). Also, the houses are built on stilts (three along the front side of the house). The two vertical elements on top of the roof show that the house is of high status (has a special function within the village/clan) – “normal” houses don’t feature these two vertical poles on top of the roof.
Photos 04A and 04B – The houses of the Lio. The houses have a high roof and the top of the roof gently sloping outwards. Most of the houses either feature a higher/more extreme roof with a narrower ridge (see sketch 4A, photo 04A) or a roof that is not all that high (sketch 4B, photo 04C) – this depends on the status of the house (as far as I could find out). The lines of the roof are actually elegant curves – this is possible through a special roof construction that allows the use of thin rafters, that are actually bent. In sketch 4B I also added posts – the buildings of the Lio are constructed on posts
Photos 5A, 5B and 5C Ngada houses: there are a lot of different roof shapes and the houses have a single-pitch bamboo roof at the veranda. 5A in Boradho, 5B in Luba and 5C a more contemporary house in Watujajii
Pictures 6A and 6B both show Manggaraian houses – 6A is the more ancient kind of round house that can be found in Wae Rebo and Todo only. 6B is the more modern kind of round house that can be found in many villages today (usually as chief’s house / clan house), e.g. in Ruteng Pu’u and villages around Cancar. The 6A-type is a building on posts. No examples exist anymore where this building type is constructed with walls (if so, it looks like 6A. The posts lean outwards (Sketch 6A) the walls slanting outwards (Sketch 6B)
Photos 07A and 07B – Ende – Wolotopo, a village close to the town of Ende, there are two multi-family houses, which are apparently unique to the area. Due to the size of the houses and the location within the village it was impossible to take photos from the front. The house with the dark roof was pulled down in 2011/2012 and is currently reconstructed, so I don’t know what it will look like. The house with the lighter roof – it was a very special type of construction that is not really typical for Flores
Source: research by Irene Doubrawa. Irene Doubrawa, MSc -Institute for History of Art, Building Archaeology and Restoration, Vienna University of Technology – firstname.lastname@example.org
In 2013 I initiated Flores Homestay Network Community Based Tourism development program run by Eco Flores. The artwork and logos we based on the the traditional Flores houses – designed by http://www.flyingfish.nl. Coordinator of Flores Homestay Network is Marta Muslin – email@example.com.
These pictures I took on Lembata in 2015. The roof decoration symbolises the speer, the knife and the crocodile.
In 2016 I saw this beautiful bamboo roof in Desa Golo Sengang near Sano Nggoang
|
The following maps show the sea level rise on Martha’s Vineyard that is predicted based on the Intergovernmental Panel on Climate Change’s high forecast for greenhouse gas emissions and numerous other analyses.
These forecasts are also used for the state’s Climate Change Adaptation Report (2011) and the Martha's Vineyard Commission’s planning work.
• Areas shown in YELLOW on the maps would be flooded by a sea level increase of 1 meter (3 feet, 3 inches) — forecast to happen shortly after midcentury (2050 to 2070).
• Areas shown in RED would be inundated by an additional one meter of sea level rise, to a total of 6 feet, 7 inches — forecast to occur soon after the end of the century (2100 to 2120).
The maps do not show additional flooding that would result from high tides or storm surges/
|
Filed under "Alerts"
More articles »
March is Developmental Disabilities Awareness MonthFriday, March 1, 2019
FOR IMMEDIATE RELEASE
Contact: Lane Till
March is Developmental Disabilities Awareness Month
March is nationally recognized as Developmental Disabilities Awareness Month. During this time, we celebrate and raise awareness of the many contributions those with developmental disabilities make in communities throughout Iowa. More than 350,000 Iowans have a disability, and more than 48,000 of those individuals have a developmental disability (a mental or physical disability acquired before the age of 22 years).
The goal for this month is to create awareness about developmental disabilities, teach the importance of inclusion within every aspect of life and to share the stories of individuals with a disability to demonstrate that a successful life is possible! Iowans with Disabilities in Action encourages all individuals with disabilities to find a way they can actively participate in their community to not only increase awareness but show the importance of inclusion.
“It is important to recognize the person and not the disability. By placing the person first, the disability is no longer the primary, defining characteristic of an individual but one of several aspects of the whole person. Once we start to recognize the unique talents everyone offers, we can truly start to create inclusive communities,” said Brooke Lovelace, Iowa DD Council executive director.
Mark Schneider, board member of the DD Council and superintendent at the Mid-Prairie Community School District, is particularly focused on creating inclusive communities within public schools. Schneider said, “It is normal for humans to have biases and fears. What should not be normal, however, is for individuals to act on these biases and fears to create unjust or unfair barriers preventing other individuals from learning, working, playing or living a normal life. Far too often, and for far too many individuals, we use our biases and fears against persons with disabilities to unfairly and inaccurately believe they are incapable of normal learning. Given the right accommodations and support, all humans, with disabilities or not, can learn. And not only are they capable of typical learning; they can do it in our normal classrooms and learning environments.”
Throughout the month we will share stories, videos and information that detail this effort. Each week we will home in on a particular topic: week one — education, week two — employment, week three — community living, week four — general (any type of story). You can follow and join the conversation on social media with the hashtag #DDAwareness19.
# # #
Launched in 2002, Iowans with Disabilities in Action is a nonpartisan initiative of the Iowa Developmental Disabilities Council intended to increase the civic and political participation of Iowans with disabilities. There are more than 9,500 Iowans connected with the organization who are working to make a positive impact across Iowa. For more information on Iowans with Disabilities in Action, please visit www.idaction.org or call 1-866-432-2846.
|
United States Navy SEALs
The United States Navy's "Sea, Air, and Land" Teams, commonly abbreviated as the Navy SEALs, are the U.S. Navy's primary special operations force and a component of the Naval Special Warfare Command. Among the SEALs' main functions are conducting small-unit maritime military operations that originate from, and return to, a river, ocean, swamp, delta, or coastline. The SEALs are trained to operate in all environments (Sea, Air, and Land) for which they are named.
As of 2017, all active SEALs are currently male and members of the U.S. Navy.[Note 1] The CIA's highly secretive and elite Special Operations Group (SOG) recruits operators from SEAL Teams, with joint operations going back to the MACV-SOG during the Vietnam War. This cooperation still exists today, as evidenced by military operations in Iraq and Afghanistan.
|This section needs additional citations for verification. (November 2013) (Learn how and when to remove this template message)|
The modern day U.S. Navy SEALs can trace their roots to World War II. The United States Navy recognized the need for the covert reconnaissance of landing beaches and coastal defenses. As a result, the Amphibious Scout and Raider School was established in 1942 at Fort Pierce, Florida. The Scouts and Raiders were formed in September of that year, just nine months after the attack on Pearl Harbor, from the Observer Group, a joint U.S. Army-Marine-Navy unit.
Scouts and RaidersEdit
Recognizing the need for a beach reconnaissance force, a select group of Army and Navy personnel assembled at Amphibious Training Base Little Creek, Virginia on August 15, 1942 to begin Amphibious Scouts and Raiders (joint) training. The Scouts and Raiders mission was to identify and reconnoiter the objective beach, maintain a position on the designated beach prior to a landing, and guide the assault waves to the landing beach.
The first group included Phil H. Bucklew, the "Father of Naval Special Warfare," after whom the Naval Special Warfare Center building is named. Commissioned in October 1942, this group saw combat in November 1942 during Operation Torch on the North African Coast. Scouts and Raiders also supported landings in Sicily, Salerno, Anzio, Normandy, and southern France.
A second group of Scouts and Raiders, code-named Special Service Unit No. 1, was established on 7 July 1943, as a joint and combined operations force. The first mission, in September 1943, was at Finschhafen in Papua New Guinea. Later operations were at Gasmata, Arawe, Cape Gloucester, and the east and south coasts of New Britain, all without any loss of personnel. Conflicts arose over operational matters, and all non-Navy personnel were reassigned. The unit, renamed 7th Amphibious Scouts, received a new mission, to go ashore with the assault boats, buoy channels, erect markers for the incoming craft, handle casualties, take offshore soundings, clear beach obstacles and maintain voice communications linking the troops ashore, incoming boats and nearby ships. The 7th Amphibious Scouts conducted operations in the Pacific for the duration of the conflict, participating in more than 40 landings.
The third and final Scouts and Raiders organization operated in China. Scouts and Raiders were deployed to fight with the Sino-American Cooperative Organization, or SACO. To help bolster the work of SACO, Admiral Ernest J. King ordered that 120 officers and 900 men be trained for "Amphibious Raider" at the Scout and Raider school at Fort Pierce, Florida. They formed the core of what was envisioned as a "guerrilla amphibious organization of Americans and Chinese operating from coastal waters, lakes and rivers employing small steamboats and sampans." While most Amphibious Raider forces remained at Camp Knox in Calcutta, three of the groups saw active service. They conducted a survey of the upper Yangtze River in the spring of 1945 and, disguised as coolies, conducted a detailed three-month survey of the Chinese coast from Shanghai to Kitchioh Wan, near Hong Kong.
In September 1942, 17 Navy salvage personnel arrived at ATB Little Creek, VA for a week long course in demolitions, explosive cable cutting and commando raiding techniques. On November 10, 1942, the first combat demolition unit successfully cut cable and net barriers across the Wadi Sebou River during Operation Torch in North Africa. This enabled the USS Dallas (DD-199) to traverse the water and insert U.S. Rangers who captured the Port Lyautey airdrome.
On 7 May 1943, Lieutenant Commander Draper L. Kauffman, "The Father of Naval Combat Demolition," was directed to set up a school and train people to eliminate obstacles on an enemy-held beach prior to an invasion. On 6 June 1943, LCDR Kauffman established Naval Combat Demolition Unit training at Fort Pierce. Most of Kauffman's volunteers came from the navy's engineering and construction battalions. Training commenced with a gruelling week designed to filter out under-performing candidates. By April 1944, a total of 34 NCDUs were deployed to England in preparation for Operation Overlord, the amphibious landing at Normandy. On 6 June 1944, in the face of great adversity, the NCDUs at Omaha Beach managed to blow eight complete gaps and two partial gaps in the German defenses. The NCDUs suffered 31 killed and 60 wounded, a casualty rate of 52%. Meanwhile, the NCDUs at Utah Beach met less intense enemy fire. They cleared 700 yards (640 metres) of beach in two hours, another 900 yards (820 metres) by the afternoon.
Casualties at Utah Beach were significantly lighter with six killed and eleven wounded. During Operation Overlord, not a single demolitioneer was lost to improper handling of explosives. In August 1944, NCDUs from Utah Beach participated in the landings in southern France, the last amphibious operation in the European Theater of Operations. NCDUs also operated in the Pacific theater. NCDU 2, under LTjg Frank Kaine, after whom the Naval Special Warfare Command building is named, and NCDU 3 under LTjg Lloyd Anderson, formed the nucleus of six NCDUs that served with the Seventh Amphibious Force tasked with clearing boat channels after the landings from Biak to Borneo.
OSS Maritime UnitEdit
Some of the earliest World War II predecessors of the SEALs were the Operational Swimmers of the Office of Strategic Services, or OSS. Many current SEAL missions were first assigned to them. OSS specialized in special operations, dropping operatives behind enemy lines to engage in organized guerrilla warfare as well as to gather information on such things as enemy resources and troop movements. British Combined Operations veteran LCDR Wooley, of the Royal Navy, was placed in charge of the OSS Maritime Unit in June 1943. Their training started in November 1943 at Camp Pendleton, California, moved to Santa Catalina Island, California in January 1944, and finally moved to the warmer waters of The Bahamas in March 1944. Within the U.S. military, they pioneered flexible swimfins and diving masks, closed-circuit diving equipment (under the direction of Dr. Christian J. Lambertsen), the use of Swimmer Delivery Vehicles (a type of submersible), and combat swimming and limpet mine attacks. In May 1944, Colonel "Wild Bill" Donovan, the head of the OSS, divided the unit into groups. He loaned Group 1, under Lieutenant Choate, to Admiral Nimitz, as a way to introduce the OSS into the Pacific theater. They became part of UDT-10 in July 1944. Five OSS men participated in the very first UDT submarine operation with the USS Burrfish in the Caroline Islands in August 1944.
Underwater Demolition Teams (UDT)Edit
On 23 November 1943, the U.S. Marine landing on Tarawa Atoll emphasized the need for hydrographic reconnaissance and underwater demolition of obstacles prior to any amphibious landing. The islands in this area have unpredictable tide changes and shallow reefs preventing the naval transport vessels from progressing. The first wave crossed the reef in Amtracs, but the second in Higgins boats were not as successful. They got stuck on a reef due to low tide. The Marines were forced to unload and wade to shore. This proved to be a daunting task and many Marines were killed or drowned before reaching the beach. Without support from the second wave the Marines in Amtracs were slaughtered on the beach. This was a valuable lesson that the Navy did not want to be repeated. After the Tarawa landing, Rear Admiral Richmond K. Turner directed the formation of nine Underwater Demolition Teams. Thirty officers and 150 enlisted men were moved to the Waimānalo Amphibious Training Base to form the nucleus of a demolition training program. This group became Underwater Demolition Teams (UDT) ONE and TWO.
The UDTs saw their first combat on 31 January 1944, during Operation Flintlock in the Marshall Islands. Flintlock became the real catalyst for the UDT training program in the Pacific Theater. In February 1944, the Naval Combat Demolition Training and Experimental Base was established at Kīhei, Maui, next to the Amphibious Base at Kamaole. Eventually, 34 UDT teams were established. Wearing swim suits, fins, and dive masks on combat operations, these "Naked Warriors" saw action across the Pacific in every major amphibious landing including: Eniwetok, Saipan, Guam, Tinian, Angaur, Ulithi, Peleliu, Leyte, Lingayen Gulf, Zambales, Iwo Jima, Okinawa, Labuan, Brunei Bay, and on 4 July 1945 at Balikpapan on Borneo, which was the last UDT demolition operation of the war. The rapid demobilization at the conclusion of the war reduced the number of active duty UDTs to two on each coast with a complement of seven officers and 45 enlisted men each.
The Korean War began on 25 June 1950, when the North Korean army invaded South Korea. Beginning with a detachment of 11 personnel from UDT 3, UDT participation expanded to three teams with a combined strength of 300 men. During the "Forgotten War" the UDTs fought intensively, beginning to employ demolition expertise gained from WWII and use it for an offensive role. Continuing to use water as cover and concealment as well as an insertion method, the Korean Era UDTs targeted bridges, tunnels, fishing nets and other maritime and coastal targets. They also developed a close working relationship with the Republic of Korea naval special forces which continues today.
The UDTs refined and developed their commando tactics during the Korean War, through their focused efforts on demolitions and mine disposal. The UDTs also accompanied South Korean commandos on raids in the North to demolish train tunnels. This was frowned upon by higher-ranking officials because they believed it was a non-traditional use of Naval forces. Due to the nature of the war the UDTs maintained a low operational profile. Some of the missions include transporting spies into North Korea and the destruction of North Korean fishing nets used to supply the North Korean Army.
As part of the Special Operations Group, or SOG, UDTs successfully conducted demolition raids on railroad tunnels and bridges along the Korean coast. The UDTs specialized in a somewhat new mission: Night coastal demolition raids against railroad tunnels and bridges. The UDT men were given the task because, in the words of UDT Lieutenant Ted Fielding, "We were ready to do what nobody else could do, and what nobody else wanted to do." (Ted Fielding was awarded the Silver Star during Korea, and was later promoted to the rank of Captain). On 15 September 1950, UDTs supported Operation Chromite, the amphibious landing at Incheon. UDT 1 and 3 provided personnel who went in ahead of the landing craft, scouting mud flats, marking low points in the channel, clearing fouled propellers, and searching for mines. Four UDT personnel acted as wave-guides for the Marine landing. In October 1950, UDTs supported mine-clearing operations in Wonsan Harbor where frogmen would locate and mark mines for minesweepers. On 12 October 1950, two U.S. minesweepers hit mines and sank. UDTs rescued 25 sailors. The next day, William Giannotti conducted the first U.S. combat operation using an "aqualung" when he dove on the USS Pledge (AM-277). For the remainder of the war, UDTs conducted beach and river reconnaissance, infiltrated guerrillas behind the lines from sea, continued mine sweeping operations, and participated in Operation Fishnet, which devastated the North Koreans' fishing capability.
President John F. Kennedy, aware of the situation in Southeast Asia, recognized the need for unconventional warfare and special operations as a measure against guerrilla warfare. In a speech, to Congress, on 25 May 1961, Kennedy spoke of his deep respect for the United States Army Special Forces. While his announcement of the government's plan to put a man on the moon drew most of the attention, in the same speech he announced his intention to spend over $100 million to strengthen U.S. special operations forces and expand American capabilities in unconventional warfare. Some people erroneously credit President Kennedy with creating the Navy SEALs. His announcement was actually only a formal acknowledgement of a process that had been under way since Korea.
The Navy needed to determine its role within the special operations arena. In March 1961, Admiral Arleigh Burke, the Chief of Naval Operations, recommended the establishment of guerrilla and counter-guerrilla units. These units would be able to operate from sea, air or land. This was the beginning of the Navy SEALs. All SEALs came from the Navy's Underwater Demolition Teams, who had already gained extensive experience in commando warfare in Korea; however, the Underwater Demolition Teams were still necessary to the Navy's amphibious force.
The first two teams were formed in January 1962 and stationed on both US coasts: Team ONE at Naval Amphibious Base Coronado, in San Diego, California and Team TWO at Naval Amphibious Base Little Creek, in Virginia Beach, Virginia. Formed entirely with personnel from UDTs, the SEALs mission was to conduct counter guerilla warfare and clandestine operations in maritime and riverine environments. Men of the newly formed SEAL Teams were trained in such unconventional areas as hand-to-hand combat, high-altitude parachuting, demolitions, and foreign languages. The SEALs attended Underwater Demolition Team replacement training and they spent some time training in UDTs. Upon making it to a SEAL team, they would undergo a SEAL Basic Indoctrination (SBI) training class at Camp Kerry in the Cuyamaca Mountains. After SBI training class, they would enter a platoon and conduct platoon training.
According to founding SEAL team member Roy Boehm, the SEALs' first missions were directed against communist Cuba. These consisted of deploying from submarines and carrying out beach reconnaissance in prelude to a proposed US amphibious invasion of the island. On at least one occasion Boehm and another SEAL smuggled a CIA agent ashore to take pictures of Soviet nuclear missiles being unloaded on the dockside.
The Pacific Command recognized Vietnam as a potential hot spot for unconventional forces. At the beginning of 1962, the UDTs started hydrographic surveys and along with other branches of the US Military, the Military Assistance Command Vietnam (MACV) was formed. In March 1962, SEALs were deployed to South Vietnam as advisors for the purpose of training Army of the Republic of Vietnam commandos in the same methods they were trained themselves.
The Central Intelligence Agency began using SEALs in covert operations in early 1963. The SEALs were involved in the CIA sponsored Phoenix Program where it targeted key North Vietnamese Army personnel and Vietcong sympathizers for capture and assassination.
The SEALs were initially deployed in and around Da Nang, training the South Vietnamese in combat diving, demolitions, and guerrilla/anti-guerrilla tactics. As the war continued, the SEALs found themselves positioned in the Rung Sat Special Zone where they were to disrupt the enemy supply and troop movements and in the Mekong Delta to fulfill riverine operations, fighting on the inland waterways.
Combat with the Viet Cong was direct. Unlike the conventional warfare methods of firing artillery into a coordinate location, the SEALs operated close to their targets. Into the late 1960s, the SEALs were successful in a new style of warfare, effective in anti-guerrilla and guerrilla actions. SEALs brought a personal war to the enemy in a previously safe area. The Viet Cong referred to them as "the men with green faces," due to the camouflage face paint the SEALs wore during combat missions.
In February 1966, a small SEAL Team One detachment arrived in Vietnam to conduct direct actions missions. Operating from Nha Be, in the Rung Sat Special Zone, this detachment signaled the beginning of a SEAL presence that would eventually include 8 SEAL platoons in country on a continuing basis. SEALs also served as advisors for Provincial Reconnaissance Units and the Lein Doc Nguio Nhia, the Vietnamese SEALs. The last SEAL platoon departed Vietnam on Dec 7, 1971. The last SEAL advisor left in March 1973.
SEALs continued to make forays into North Vietnam and Laos, and covertly into Cambodia, controlled by the Studies and Observations Group. The SEALs from Team TWO started a unique deployment of SEAL team members working alone with South Vietnamese Commandos (ARVN). In 1967, a SEAL unit named Detachment Bravo (Det Bravo) was formed to operate these mixed US and ARVN units, which were called South Vietnamese Provincial Reconnaissance Units (PRUs).
At the beginning of 1968, the North Vietnamese and the Viet Cong orchestrated a major offensive against South Vietnam: the "Tet Offensive". The North hoped it would prove to be America's Dien Bien Phu, attempting to break the American public's desire to continue the war. As propaganda, the Tet Offensive was successful in adding to the American protest of the Vietnam war. However, North Vietnam suffered tremendous casualties, and from a purely military standpoint, the Tet Offensive was a major disaster for the Communists.
By 1970, President Richard Nixon initiated a Plan of Vietnamization, which would remove the US from the Vietnam War and return the responsibility of defense back to the South Vietnamese. Conventional forces were being withdrawn; the last SEAL platoon left Vietnam December 7, 1971, the last SEAL advisor, left Vietnam in March 1973. South Vietnam fell to North Vietnamese communist forces in April 1975. The SEALs were among the highest decorated units for their size in the war, receiving 5 Navy Crosses, 42 Silver stars, 402 Bronze Stars, 2 Legions of Merit, 352 Commendation Medals, 3 Presidential Unit Citations and 3 Medals of Honor. By the end of the war, 48 SEALs had been killed in Vietnam, but estimates of their kill count are as high as 2,000. The Navy SEAL Museum in Fort Pierce, FL displays a list of the 48 SEALs who lost their lives in combat during the Vietnam War.
On May 1, 1983, UDT–11 was redesignated as SEAL Team FIVE, UDT–21 was redesignated as SEAL Team FOUR, UDT–12 became SEAL Delivery Vehicle Team ONE (SDVT–1), and UDT–22 was redesignated as SDVT–2. SEAL Team THREE, was established October 1, 1983 in Coronado, CA. SEAL Team EIGHT was established on October 1, 1988 at Naval Amphibious Base, Little Creek, VA.
Both SEAL Team FOUR and SEAL Team SIX, the predecessor to DEVGRU, participated in the US invasion of Grenada. The SEALs' two primary missions were the extraction of Grenada's Governor-General and the capture of Grenada's only radio tower. Neither mission was well briefed or sufficiently supported with timely intelligence and the SEALs ran into trouble from the very beginning. On Oct 24, 1983, 12 operators from SEAL Team SIX and 4 Air Force Combat Control Team members(CCT) conducted a predawn combat airborne water insertion from C130 Hercules with Zodiac inflatable rubber boats 40 kilometers north of Point Salinas, Grenada. The team inserted with full combat gear in bad weather with low visibility conditions and high winds. Four SEALs drowned and were never recovered. SEALs split into two teams and proceeded to their objectives. After digging in at the Governor's mansion, the SEALs realized they had forgotten to load their cryptographic satellite phone. As Grenadian and Cuban troops surrounded the team, the SEALs' only radio ran out of battery power, and they used the mansion's land line telephone to call in AC-130 gunship fire support. The SEALs were pinned down in the mansion overnight and were relieved and extracted by a group of Marines the following morning.
The team sent to the radio station also ran into communication problems. As soon as the SEALs reached the radio facility they found themselves unable to raise their command post. After beating back several waves of Grenadian and Cuban troops supported by BTR-60 armoured personnel carriers, the SEALs decided that their position at the radio tower was untenable. They destroyed the station and fought their way to the water where they hid from patrolling enemy forces. After the enemy had given up their search the SEALs, some wounded, swam into the open sea where they were extracted several hours later after being spotted by a reconnaissance plane.
During the closing stages of the Iran–Iraq War the United States Navy began conducting operations in the Persian Gulf to protect US-flagged ships from attack by Iranian naval forces. A secret plan was put in place and dubbed Operation Prime Chance. Navy SEAL Teams 1 and 2 along with several Special Boat Units and EOD techs were deployed on mobile command barges and transported by helicopters from the Army's 160th Special Operations Aviation Regiment. Over the course of the operation SEALs conducted VBSS (Visit, Board, Search, and Seizure) missions to counter Iranian mine laying boats. The only loss of life occurred during the take down of the Iran Ajr. Evidence gathered on the Iran Ajr by the SEALs later allowed the US Navy to trace the mines that struck the USS Samuel B. Roberts (FFG-58). This chain of events lead to Operation Praying Mantis, the largest US Naval surface engagement since the Second World War.
During Operation Desert Shield and Storm, Navy SEALs trained Kuwaiti Special Forces. They set up naval special operations groups in Kuwait, working with the Kuwaiti Navy in exile. Using these new diving, swimming, and combat skills, these commandos took part in combat operations such as the liberation of the capital city.
The United States Navy contributed extensive special operations assets to the invasion of Panama, code named Operation Just Cause. This included SEAL Teams 2 and 4, Naval Special Warfare Unit 8, and Special Boat Unit 26, all falling under Naval Special Warfare Group 2; and the separate Naval Special Warfare Development Group (DEVGRU). DEVGRU fell under Task Force Blue, while Naval Special Warfare Group 2 composed the entirety of Task Force White. Task Force White was tasked with three principal objectives: the destruction of Panamanian Defense Forces (PDF) naval assets in Balboa Harbor and the destruction of Manuel Noriega's private jet at Paitilla Airport (collectively known as Operation Nifty Package), as well as isolating PDF forces on Flamenco Island.
The strike on Balboa Harbor by Task Unit Whiskey is notably marked in SEAL history as the first publicly acknowledged combat swimmer mission since the Second World War. Prior to the commencement of the invasion four Navy SEALs, Lt Edward S. Coughlin, EN-3 Timothy K. Eppley, ET-1 Randy L. Beausoleil, and PH-2 Chris Dye, swam underwater into the harbor on Draeger LAR-V rebreathers and attached C4 explosives to and destroyed Noriega's personal gunboat the Presidente Porras.
Task Unit Papa was tasked with the seizure of Paitilla airfield and the destruction of Noriega's plane there. Several SEALs were concerned about the nature of the mission assigned to them being that airfield seizure was usually the domain of the Army Rangers. Despite these misgivings and a loss of operational surprise, the SEALs of TU Papa proceeded with their mission. Almost immediately upon landing, the 48 SEALs came under withering fire from the PDF stationed at the airfield. Although Noriega's plane was eventually destroyed, the SEALs suffered four dead and thirteen wounded. Killed were Lt. John Connors, Chief Petty Officer Donald McFaul, Torpedoman's Mate 2nd Class Issac Rodriguez, and Boatswain's Mate 1st Class Chris Tilghman.
Persian Gulf WarEdit
In August 1990, SEALs were the first western forces to deploy to the Persian Gulf as part of Operation Desert Shield. They infiltrated the capital city of Kuwait within hours of the invasion and gathered intelligence and developed plans to rescue US embassy staff should they become hostages. SEALs were also the first to capture Iraqi Prisoners of War when they assaulted nine Kuwaiti Oil platforms on 19 January 1991. On 23 February 1991, a seven-man SEAL team launched a mission to trick the Iraqi military into thinking an amphibious assault on Kuwait by coalition forces was imminent by setting off explosives and placing marking buoys 500 meters off the Kuwaiti coast. The mission was a success and Iraqi forces were diverted east away from the true coalition offensive. The SEALs were first into Kuwait city in their Desert Patrol Vehicles when it was recaptured.
On 6 December 1992, as part of Operation Restore Hope, U.S. Navy SEALs and Special Boat crewmen from Naval Special Warfare Task Unit TRIPOLI began a 3-day operation carrying out reconnaissance operations in the vicinity of Mogadishu airport and harbor; ahead of UNITAFs deployment to the country. They suffered only one casualty Petty Officer Second Class Benjamin M. Daly who was injured by an IED and later awarded the armed forces expeditionary medal.
In August 1993 a four-man DEVGRU SEAL sniper team was deployed to Mogadishu to work alongside Delta Force as part of Task Force Ranger in the search for Somali warlord Mohammed Farrah Aidid. They took part in several operations in support of the CIA and Army culminating in the 3 October 'Battle of Mogadishu' where they were part of the ground convoy raiding the Olympic Hotel. All four SEALs would be later awarded the Silver Star in recognition of their bravery whilst Navy SEAL Howard E. Wasdin would be awarded a Purple Heart after continuing to fight despite being wounded three times during the battle.
War in AfghanistanEdit
In the immediate aftermath of the 11 September attacks, Navy SEALs quickly dispatched to Camp Doha, and those already aboard US Naval vessels in the Persian Gulf and surrounding waters began conducting VBSS operations against ships suspected of having ties to or even carrying al Qaeda operatives. SEAL Teams 3 and 8 also began rotating into Oman from the United States and staging on the island of Masirah for operations in Afghanistan. One of the SEALs' immediate concerns was their lack of suitable vehicles to conduct special reconnaissance (SR) missions in the rough, landlocked terrain of Afghanistan. After borrowing and retrofitting Humvees from the Army Rangers also staging on Masirah, the SEALs inserted into Afghanistan to conduct the SR of what would become Camp Rhino, as part of Operation Enduring Freedom – Afghanistan (OEF-A). These early stages of OEF were commanded by a fellow SEAL, Rear Admiral Albert Calland.
As part of the CJSOTF (Combined Joint Special Operations Task Force) under the command of General Tommy Franks at CENTCOM SEALs from DEVGRU were part of Task Force Sword, which was established in early October 2001, it was a black SOF (Special Operations Forces) unit under direct command of JSOC. It was a so-called hunter-killer force whose primary objective was of capturing or killing senior leadership and HVT within both al-Qaeda and the Taliban. Sword was initially structured around a two-squadron component of operators from Delta Force (Task Force Green) and DEVGRU (Task Force Blue) supported by a Ranger protection force teams (Task Force Red) and ISA signals intercept and surveillance operators (Task Force Orange) and the 160th SOAR (Task Force Brown). Task Force K-Bar was established on 10 October 2001, it was formed around a Naval Special Warfare Group consisting of SEALs from SEAL Teams 2, 3 and 8 and Green Berets from 1st Battalion, 3rd SFG; the task force was led by SEAL Captain Robert Harward. The task force principle task was to conduct SR and SSE missions in the south of the country. Other Coalition SOF-particularly KSK, JTF2 and New Zealand Special Air Service were assigned to the task force. As part of the JIATF-CT (Joint Interagency Task Force-Counterterrorism)- intelligence integration and fusion activity manned by personnel from all Operation Enduring Freedom – Afghanistan (OEF-A) participating units- SEALs from DEVGRU were part of Task Force Bowie, they were embedded in the task force in AFO's (Advanced Force Operations). The AFO's were 45-man reconnaissances units made up of a Delta Force recce specialists augmented by selected SEALs from DEVGRU and supported by ISA's technical experts. The AFO's had been raised to support TF Sword and were tasked with intelligence preparation of the battlefield, working closely with the CIA and reported directly to Task Force Sword. The AFO's conducted covert reconnaissance – sending small 2 or 3 man teams into al-Qaeda 'Backyard' along the border with Pakistan, the AFO operators would deploy observation posts to watch and report enemy movements and numbers as well as environmental reconnaissance; much of the work was done on foot or ATVs.
SEALs were present at the Battle of Qala-i-Jangi in November 2001 alongside their counterparts from the British SBS. Chief Petty Officer Stephen Bass was awarded the Navy Cross for his actions during the battle.
Before the US Marines landed at Camp Rhino in November 2001, a SEAL recce team from SEAL Team 8 conducted reconnaissance of the area, they were mistakenly engaged by orbiting AH-1W attack helicopters, but the SEALs managed to get a message through to the Marines before they suffered casualties. The SR mission in the region of Camp Rhino lasted for four days, after which two United States Air Force Combat Control Teams made a nighttime HALO jump to assist the SEALs in guiding in Marines from the 15th Marine Expeditionary Unit who seized control of the area and established a Forward operating base.
In January 2002, following the Battle of Tora Bora, another series of caves was discovered in Zhawar Kili, just south of Tora Bora, airstrikes hit the sites before SOF teams were inserted into the area. A SEAL platoon from SEAL Team 3, including several of their Desert Patrol Vehicles, accompanied by a German KSK element, a Norwegian SOF team and JTF2 reconnaissance teams spent some nine days conducting extensive SEE, clearing an estimated 70 caves and 60 structures in the area, recovering a huge amount of both intelligence and munitions, but they didn't encounter any al-Qaeda fighters. Subsequent SEAL operations during the invasion of Afghanistan were conducted within Task Force K-Bar, a joint special operations unit of Army Special Forces, United States Air Force Special Tactics Teams, and special operations forces from Norway, Germany, Australia, New Zealand, Canada, and Denmark. Task Force K-Bar conducted combat operations in the massive cave complexes near the city of Kandahar and surrounding territory, the town of Prata Ghar and hundreds of miles of rough terrain in southern and eastern Afghanistan. Over the course of six months Task Force K-Bar killed or captured over 200 Taliban and al Qaeda fighters, and destroyed tens of thousands of pounds of weapons and ordnance.
In February 2002, while at Camp Rhino, the CIA passed on intelligence from a Predator drone operating in the Paktia province that Taliban Mullah Khirullah Said Wali Khairkhwa was spotted leaving a building by vehicle convoy. SEALs and Danish Jægerkorpset commandos boarded Air Force Pave Low helicopters and seized Khairkhwa on the road less than two hours later. The SEALs continued to perform reconnaissance operations for the Marines until leaving after having spent 45 days on the ground.
In March 2002, SEALs from DEVGRU, SEAL Team 2, 3 and 8 participated extensively in Operation Anaconda. During what would become known as the Battle of Takur Ghar, whilst inserting from an MH-47E Chinook, PO1 Neil Roberts from DEVGRU, was thrown from his helicopter when it took fire from entrenched al Qaeda fighters. Roberts was subsequently killed after engaging and fighting dozens of enemies for almost an hour. Several SEALs were wounded in a rescue attempt and their Air Force Combat Controller, Technical Sergeant John Chapman, was killed. Attempts to rescue the stranded SEAL also led to the deaths of several US Army Rangers and an Air Force Pararescueman acting as a Quick Reaction Force.
Later in 2002, CJSOFT became a single integrated command under the broader CJTF-180 that commanded all US forces assigned to OEF-A, it was built around an Army Special Forces Group (often manned by National Guard units) and SEAL teams. A small JSOC element (formerly Task Force Sword/11) not under direct CTJF command – embedded within CJSOFT, it was manned by a joint SEAL and Ranger element that rotated command, it was not under direct ISAF command, although it operated in support of NATO operations.
In June 2005, Lieutenant Michael P. Murphy was posthumously awarded the Medal of Honor after his four-man reconnaissance counterinsurgency team was almost wiped out during Operation Red Wings. After the four man team lost Danny Dietz, he put himself in open view to call in the QRF. He soon after died from injuries sustained. Matthew Axelson also died on this operation. The QRF never reached the scene; it was struck by an RPG killing 8 Navy SEALs and 8 Army Night Stalkers. Marcus Luttrell was the only survivor from this operation.
In early 2010, Brigadier General Scott Miller took command of CJSOTF-Afghanistan and assigned virtually all SOF in the theatre to a new counterinsurgency role that would become known as the ALP/VSO Program (Afghan Local Police/Village Stability Operations), the SOF in Afghanistan were organised into battalion level SOTF (Special Operations Task Forces) each with a geographic area of responsibility-the SEALs were given southeast Afghanistan. To increase security of their assigned VSO village, a SEAL Platoon in Chora District, Uruzgan Province built a wall constructed of 500m of HESCO barriers to divert insurgent movements away, this proved successful and eventually the Afghan villagers took ownership of it. SEALs and other SOTF still conducted Direct Action missions, but now partnered with Afghan forces.
On 6 August 2011, 17 U.S. Navy SEALs were killed when their CH-47 Chinook helicopter was shot down by an RPG fired by Taliban militants. The SEALs were en route to support U.S. Army Rangers who were taking fire while attempting to capture a senior Taliban leader in the Tangi Valley. Fifteen of the SEALs belonged to the Naval Special Warfare Development Group. Two others were SEALs assigned to a West Coast-based Naval Special Warfare unit. A total of 30 Americans and eight Afghans were killed in the crash, making it the single largest loss of U.S. lives in the Global War on Terrorism.
On 16 June 2012, SEALs in Uruzgan Province conducted a joint operation into the Shah Wali Kot Valley where they suffered the loss of a Black Hawk helicopter when it was struck by an insurgent RPG, the crash killed 11 servicemen (7 US and 4 Afghan).
In December 2012, SEALs from DEVGRU rescued a US doctor who had been kidnapped a few days earlier. However, during the operation the unit suffered a fatality, Petty Officer 1st Class Nicolas D. Checque. Senior Chief Edward Byers, was awarded the Medal of Honor for his actions during this mission.
In May 2013, Rear Adm. Sean Pybus, commander of Navy Special Warfare stated that the unit would cut in half the number of SEAL platoons in Afghanistan by the end of 2013. Rear Adm. Sean Pybus also added that the unit is already "undergoing a transition back to its maritime roots" by placing more emphasis on sea-based missions after being involved in mostly landlocked missions since 2001.
For the 2003 invasion of Iraq, a squadron from DEVGRU operated as part of Task Force 20. Their role was to conduct heliborne direct action raids, particularly against HVTs. The Naval Special Operations Task Group was assigned to Operation Iraqi Freedom, and was built around a core of SEAL Teams 8 and 10, Polish GROM, Royal Marines from 40 and 42 Commando under the command of 3 Commando Brigade and attached US Psy Ops and civil affairs teams. The Naval Task Group was principally tasked with the capture of the port of Umm Qasr, Iraq's only deep-water port; the oil pipeline facilities of the Al-Faw Peninsula; and the two off-shore platforms the pipelines fed. Once these initial target sets were secured, the Task Group would support conventional forces in the south, conducting reconnaissance and raiding activities. Aviation support was provided by both Marine air of the 15th MEU and 20th Special Operations Squadron.
Several days before the beginning of the invasion, two SDV teams were launched from Mark V Special Operations Craft in the Persian Gulf. Their objectives were the hydrographic reconnaissance of the Al Basrah (MABOT) and Khawr Al Amaya (KAAOT) Oil Terminals. After swimming under the terminals and securing their Mark 8 mod 1s, the SDV SEALs spent several hours taking pictures and surveying Iraqi activity on both platforms before returning to their boats. On March 20, 2003, SEALs from SEAL Team 8 and 10 (31 SEALs, 2 Navy EOD a USAF combat controller and several Iraqi interpreters) moved to seize the MABOT oil terminal whilst GROM operators assaulted the KAAOT Oil Terminals. The terminals were quickly seized with no casualties, and explosives which were found on the terminals were made safe by GROM operators.
The shore-based pumping stations (known as MMS-Monitoring and Meter Stations) and their pipelines on the Al-Faw Peninsula were seized by 12 SEALS from SEAL Team 3, who were mounted in DPVs. They took off from Kuwait and were inserted under Iraqi anti-aircraft fire by MH-53 helicopters. The target area was 'softened up' by JDAM bombs dropped from B-52s on Iraqi bunkers, trenches and dugouts around the oil facilities. After a brief firefight in which the SEALs killed 1 Iraqi soldier and captured 13, the SEALs secured the MMS and the pipelines, and were relieved by Royal Marines from 40 Commando. The SEALs advised the Marines, helping coordinate AC-130 Spectres fire support onto Iraqi forces. The other shore-based pumping station at Umm Qasr was secured by SEALs and Royal Marines; before they landed, AC-130 Spectres and A-10As engaged a nearby SAM installation and a responding Iraqi mechanised unit. The SEALs secured the facility itself whilst the Royal Marines cleared Iraqi bunkers, killing several Iraqi soldiers.
Other Naval Task Group operations included elements of three SEAL platoons in GMV trucks and DPVs seizing the al Zubayr MMS, whilst I MEF attacked the Rumaylah Oil Fields north of al-Faw. SEALs and Special Boat teams helped secure the Khawr Abd Allah and Khawr Az Zubyar waterways, which enabled humanitarian supplies to be delivered to the port of Umm Qasr. SEALs from the unit that secured the al-Faw MMS also conducted reconnaissance on the Shat Al Arab waterway, that was later secured by British forces. SEALs were also involved in various VBSS missions with British and Australian forces to seize Iraqi craft carrying seaborne mines.
Coalition military planners were concerned that retreating Iraqi forces would destroy the Mukatayin hydroelectric dam, located 57 miles northeast of Baghdad, in an attempt to slow advancing US troops. In addition to restricting the manoeuvre of Coalition forces, the destruction of the dam would deny critical power needs to the surrounding area, as well as cause massive flooding and loss of Iraqi civilian life. A mixed team of SEALs from SEAL Team 5 and Polish GROM was called in to seize the dam. This force was flown several hours by 6 US Air Force MH-53J Pave Lows, the force consisted of 20 SEALs (with an extra six SEAL snipers in one helicopter carrying the SEAL command and control element) and two EOD operators along with 35 GROM operators to the dam. The SEALs employed DPVs into blocking positions to defend against counter-attack and roving bands of Iranian bandits that had been crossing the border and raiding Iraqi towns. As in Al Faw the SEALs found their DPVs (the SEAL unit at the al-Faw MMS lost all but two DPVs when the were bogged down in the oily mud) to be ineffective and this marked the last time they would employ them in Iraq. The SEALs and GROM on foot fast-roped out of their helicopters and immediately stormed the dam. The minimal Iraqi troops guarding the dam surrendered without a fight, and with the exception of a GROM soldier who broke an ankle during the insertion, no casualties were sustained in the operation. After several hours of searching the dam for remaining hostile forces or any explosives, the SEALs secured the dam and held it for 5 days until they were relieved by advancing elements of the US Army.
During the Battle of Basra, SEALS and the along with the Brigade Reconnaissance Force and 539 Assault Squadron RM attempted a waterborne approach to Basra via the Shatt al-Arab waterway but were intercepted by Iranian Revolutionary Guard patrol craft and did not want engage them so they withdrew. On April 6, 2003, after relocating further up the waterway they successfully infiltrated via the waterway, using SEAL UAVs they called in "show-of-force" and an airstrike by a USMC harrier on Iraqi troops, the SEALs then headed to "Chemical Ali's" house with SSE teams to find traces of chemical weapons. SEALs carried out missions around Nasiriyah, carrying out reconnaissance on surrounding villages and engaging enemy strong points bypassed by the US Marine advance. Charlie Platoon, SEAL Team 3, later operated ahead of the Marine advance carrying out similar missions. SEAL and GROM units continued to cooperate throughout the rest of the invasion phase, with raids and anti sniper missions in Baghdad.
Following the invasion, SEAL platoons rotated through Iraq, conducting overwatch for US and Iraqi patrols and directly mentoring local Iraqi forces; they also conducted surveillance and sniping missions into known trouble spots. In September 2004, a SEAL sniper element was tasked with establishing an overwatch and surveillance position overlooking Haifa Street, they were inserted by Bradley IFVs from a unit of the 9th Cavalry Regiment, however they were spotted and engaged by insurgents. The SEALs notified the Bradleys, they drove back, fired on the insurgents and set up a cordon for the SEALs to be extracted, one Bradley was destroyed by a car bomb, there were no casualties and the SEALs were extracted.
In the interim between the First Battle of Fallujah and Second Battle of Fallujah, insurgents in Fallujah knew that the coalition assault was inevitable and under the guidance of the influx of foreign fighters, began to build defensive networks throughout the city-ranging from fortified buildings, trench lines, berms, strategically placed car bombs and IEDs. In preparations for the second battle, SEALs conducted reconnaissance near the berms and tested out reports that the insurgents were equipped with night-vision equipment, they proved this by throwing an infra-red chemical light into the street which drew small arms fire. SEALs along with the 5th SFG, Marine Force Recon and Det One and other JSOC elements were heavily involved in shaping operations prior to the November 7 D-DAY when coalition forces entered the city. The SOF shaping included sophisticated feints to mislead the insurgents as to the direction of the final assault, close target reconnaissance and direct-action missions where a logistics node or IED factory was targeted. When the offensive on the insurgents in the city began, many of the US Marine companie had SEAL sniper teams attached to them, mainly from SEAL Teams 3, 5 and 10.
From 2005, SEALs were heavily committed to western Iraq in Al Anbar Governorate, AQI terrorists who escaped Fallujah had relocated to Ramadi. A SEAL Task Unit was co-located with the Marines at Al Asad Airbase and sent elements to Ramadi and Habbaniyah, the SEALs were initially tasked with target development for the Marines and providing sniper overwatch for their patrols. The SEALs were already training an Iraqi Army unit in Habbaniyah, although FID was their main focus until later that year. A SEAL Task Unit generally comprised two individual SEAL Platoons: each Platoon was made up of seven-man squad elements commanded by a junior officer, three of these Task Units (although a fourth was often added) along with a Special Boat Team detachment and a Headquarters Team (including integral intelligence, targeting and EOD personnel) made up a Naval Special Warfare Squadron. According to Dick Couch, the SEALs began FID with two Iraqi units-the Army Scouts who conducted conventional reconnaissance missions, and the SMP (Special Missions Platoon), a locally formed unit that would later fight alongside the SEALs. Despite several challenges, the SEALs were soon conducted operations with partnered units, particularly in Special Reconnaissance, focusing on the surveillance aspect, whilst conventional US Army or Marines would conduct raids and arrests.
As the SEALs were beginning to make headway in Ramadi, AQI was starting to infiltrate the area by targeting local Sheikhs and convincing them to allow jihadists to marry into local tribes, thus cementing their powerbase and Sheikhs that resisted these advances were met with typical AQI brutality. Al-Qaeda's efforts to install a Sharia-style shadow government in Ramadi led to AQI's downfall-when in the first half of 2006, in the run-up to the Second Battle of Ramadi SEALs, increasingly partnered with conventional forces of the 1st Brigade Combat Team, 1st Armored Division which was planning the offensive. SEALs along with the Scouts and SMP, would conduct reconnaissance, surveillance and sniper overwatch tasks; with their own targeting cell, they also began conducting raids on local insurgent leaders. The 1st BCT began the concerted offensive to clear Ramadi of AQI fighters; on 29 September 2006, whilst at a rooftop overwatch position, Petty Officer Michael A. Monsoor died after leaping upon an enemy grenade during a rooftop firefight, two SEALs on the roof were badly wounded from the grenade fragments and their local Iraqi Scouts ran back into the cover of the building, a fourth SEAL (only lightly wounded), managed to radio his colleagues and get the Scouts to return fire. A SEAL element in a second overwatch position immediately ran through heavy fire to reach Monsoor (whom later died from his wounds in the back of a Bradley IFV) and the wounded SEALs, Monsoor was later awarded the Medal of Honor and the Silver Star. The advances by conventional forces and the SEALs in Ramadi, combined with the brutal tactics of AQI, helped to increase recruitment in a local police initiative-the programme was designed to bring the local Sheikhs' militias into the Iraqi Security Forces. These volunteers would serve locally in their communities to defend them against al-Qaeda, a month after the kidnapping and murder of Sheikh Khalid by AQI (which proved to be the tipping point), the Sheikhs signed a declaration agreeing to fight AQI and by the closing of 2006, even former insurgents were joining the local police (later known as the Anbar Awakening) by the end of the battle, some 1,100 terrorists were killed.
In Fallujah, the SEAL Task Unit were also heavily involved in fighting. In one joint operation to capture an AQI leader, they entered the target building and were engaged resulting in an Iraqi Scout being killed and a SEAL severely wounded, two SEALs returned fire and entered the building, both SEALs entered different rooms, in one room the SEAL encountered 3 insurgents who opened fired at close range, another SEAL across the hallway was struck in the head and killed, the SEAL in the room with the insurgents killed all 3.
In September 2009, in a nighttime raid in Fallujah, SEALs captured Ahmad Hashim Abd al-Isawi (nicknamed the "Butcher of Fallujah"), a prominent al-Qaeda terrorist who was the mastermind behind the 2004 Fallujah ambush. Al-Isawai made accusations of mistreatment while in custody, and testified in April 2010 at the ensuing courts-martial against 3 SEALs (all of whom were acquitted). Iraqi authorities later tried and executed al-Isawi by hanging at some point before November 2013.
SEALS remained employed throughout the Iraqi Campaign as Task Units or Task Elements until its close in 2011.
Operation Enduring Freedom – PhilippinesEdit
OEF-P was established in 2002 to conduct long-term partnered operations with both Philippine Army special operations and intelligence units, as well as police units to counter the threat posed by the ASG and JI terrorist groups. Much of this work has been assigned to 1st SFG; SEALs and USAF Special Operations who have also had a long-term presence in the Philippines. There are few confirmed operational details about the SEALs and Green Berets conducting partnered operations, although elements are partnered with Philippine Army and SOF; there have been mentions of Green Berets and SEALs being wounded. On 21 June 2002, SEALs in RIBs supported the Philippine Naval Special Operations Group in the operation that killed Abu Sabaya, a senior leader in the ASG. A US Predator UAV marked the HVT with an infrared laser as he tried to escape in a smugglers boat, the MH-47Es from the 160th SOAR used search lights mounted on their helicopters to pinpoint the target's boat while operators from the Philippine Naval Special Operations Group opened fire on the boat killing the terrorist leader and capturing 4 other terrorists with him.
Operation Enduring Freedom – Horn of AfricaEdit
As part of OEF-HOA, Naval Special Warfare Unit 10 are deployed to Camp Lemonnier, Djibouti, under the command of SOCCE-HOA (Special Opererations Command and Control Element-Horn of Africa) which commands all SOCOM units assigned to training or operational missions in the region. Special operations carried out in Somalia are conducted under the codename: Operation Octave Dune, as part of the overall effort in Somalia, which is known as Operation Octave Shield.
Before Djibouti became the epicentre for counter terrorism operations in Africa, unilateral operations were launched from temporary forward locations in friendly nations such as Kenya, or from US Navy Ships. The earliest known operation in Somalia was known as Operation Cobalt Blue: In 2003, SEALs using SEAL Delivery Vehicles swam ashore along the Somali coastline and emplaced covert surveillance cameras. Known as cardinals, the cameras were designed to watch likely target locations for wanted terrorists as al-Qaeda and its affiliates began to regroup in the country, however the cameras only took one image a day and captured very little.
CJSOTF-HOA (Combined Joint Special Operations Task Force-Horn of Africa) developed a rescue plan called Operation Mystic Talon, in case and CIA SAD or ISA operators were captured in the region, the plan required a SEAL platoon Air Force Special Operations assets that, if necessary, would fight their way into Somalia, recover the hostage and fight their way out, should a mission need to be launched before a dedicated JSOC task force could be deployed to the region.
Maersk Alabama hijackingEdit
On 12 April 2009, in response to a hostage taking incident off the coast of Somalia by Somalian pirates, three Navy SEALs from DEVGRU simultaneously engaged and killed the three pirates who were closely holding the hostage, Captain Richard Phillips, of the freighter ship Maersk Alabama. The pirates and their hostage were being towed in a lifeboat approximately 100 yards behind USS Bainbridge when each of the pirates were killed by a different DEVGRU sniper with a single shot to the head.
Death of Osama bin LadenEdit
In the early morning of May 1, 2011 local time, a team of 40 Navy SEALs of the Naval Special Warfare Development Group (DEVGRU), previously called "SEAL Team 6", along with a Belgian Malinois Military Working Dog (named "Cairo"), supported by Special Activities Division officers on the ground, killed Osama bin Laden in Abbottabad, Pakistan about 35 miles (56 km) from Islamabad in a CIA operation. President Barack Obama later confirmed the death of bin Laden, but did not directly mention the involvement of DEVGRU, saying only that a "small team" of Americans undertook the operation to bring down bin Laden. The unprecedented media coverage raised the public profile of the SEAL community, particularly the counter-terrorism specialists commonly known as SEAL Team 6. The Walt Disney Company tried unsuccessfully to trademark the name "SEAL Team 6" the day after the raid. The official name of the military operation was Operation Neptune Spear. The model of the compound used in the 60 Minutes documentary was donated by CBS to the Navy SEAL Museum.
Morning Glory oil tankerEdit
On March 16, 2014, 30 U.S. Navy SEALs from SEAL Team 2 took control of MV Morning Glory, a tanker full of oil loaded from a rebel-held port in Libya. The raid by Navy SEALs took place in international waters off the coast of Cyprus, the raid was a success; preventing a Libyan splinter militia group selling nationalized Libyan oil on the black market.
Operation Inherent ResolveEdit
As part of Operation Inherent Resolve's Iraq Campaign, there are at least 100 SEALs as part of a Special Operations advise and assist mission to Peshmerga and Iraqi Security Forces in combating ISIS. The Navy SEAL operation in northern Iraq is called Task Force Trident. On May 3, 2016, Petty Officer 1st Class Charles Keating IV was killed by ISIS small arms fire near the town of Tel Skuf during an ISIS assault on a Peshmerga position. He was a member of a 20-man Quick Reaction Force (QRF) sent to rescue a dozen U.S. advisors at the position and temporarily assist the Peshmerga.
Selection and trainingEdit
Before getting accepted into Basic Underwater Demolition/SEAL training, a prospective candidate must pass a certain number of both mental and physical requirements. These tests include: Pre-enlistment medical screening, ASVAB, AFQT, C-SORT, and PST. Then, the candidate must get a SEAL contract by passing the SEAL Physical Screening Test: 500 yard swim in 12:30, 50 push-ups in 2 minutes, 50 sit-ups in 2 minutes, 10 consecutive pull-ups in 2 minutes, and a 1.5 mile run in 10:30. Candidates receiving a passing score may then be admitted into training to become Navy SEALs. SEAL training is extremely rigorous. The attrition rate fluctuates, but averages at about 80 percent. The average candidate spends over a year in a series of formal training courses before being awarded the Special Warfare Operator Naval Rating and the Navy Enlisted Classification (NEC) 5326 Combatant Swimmer (SEAL) or, in the case of commissioned naval officers, the designation Naval Special Warfare (SEAL) Officer.
Navy SEAL training pipeline:
- 8-week Naval Recruit Training
- 8-week Naval Special Warfare Prep School
- 24-week Basic Underwater Demolition/SEAL Training (BUD/S)
- 5-week Parachute Jump School
- 26-week SEAL Qualification Training (SQT)
Upon graduation from SQT, trainees receive the U.S. Navy SEAL Trident, designating them as Navy SEALs. They are subsequently assigned to a SEAL Team or SEAL Delivery Vehicle (SDV) Team and begin 18-months of predeployment training before they are considered deployable. This training consists of:
- 6-month Professional Development – Individual Specialty Training (ProDev)
- 6-month Unit Level Training (ULT). ULT is unit training conducted by each Groups Training Detachment. Core unit training blocks are Air Operations, Land Warfare, Maritime, Urban and Special Reconnaissance.
- 6-month Squadron Integration Training (SIT)
Those enlisted SEALs with a medical rating will first attend the Special Operation Combat Medic Course for 6 months in Fort Bragg, North Carolina before joining a team in order to become a SEAL medic. Those pursuing Officer positions first attend the Junior Officer Training Course to learn about operations planning and how to perform team briefings. In total it can take over 2.5 years to completely train a Navy SEAL for his first deployment.
Until December 2015, female sailors were barred from becoming Navy SEALs by naval regulation. However, in August 2015, it was reported that the "Navy is planning to open its elite SEAL teams to women who can pass the grueling training regimen." Admiral Jon Greenert, the Chief of Naval Operations at the time, said that "he and the head of Naval Special Warfare Command, Rear Adm. Brian Losey, believe that if women can pass the legendary six-month Basic Underwater Demolition/SEAL training, they should be allowed to serve." In August 2015, "[f]inal approval [for admission of women] is still pending." On 3 December 2015, it was announced that there are now "no exceptions" to all military roles in the U.S., and women can become U.S. Navy SEALs. However, as of April 2016, no female sailors have yet applied to undergo indoctrination as SEALs.
The Washington Examiner reported on August 10, 2017: "A woman aiming to become the first female Navy SEAL officer quit about a week into the initial training".
Naval Special Warfare Command is organized into the following configuration:
- Naval Special Warfare Group 1: SEAL Teams 1, 3, 5, 7
- Naval Special Warfare Group 2: SEAL Teams 2, 4, 8, 10
- Naval Special Warfare Group 3: SEAL Delivery Vehicle Team 1
- Naval Special Warfare Group 4: Special Boat Teams 12, 20, 22
- Naval Special Warfare Group 11: SEAL Teams 17, 18 (formerly Operational Support Teams 1, 2)
The total number of Navy SEALs assigned to Naval Special Warfare Command is approximately 8,195 out of a total staffing of 8,985.
The original SEAL Teams in the Vietnam War were separated between West Coast (Team ONE) and East Coast (Team TWO) SEALs. Likewise current SEAL Teams are organized into two groups: Naval Special Warfare Group One (West Coast) and Naval Special Warfare Group Two (East Coast), both of which come under the command of Naval Special Warfare Command at NAB Coronado, California. As of 2006, there are eight confirmed Navy SEAL Teams. The current SEAL Team deployments include Teams 1, 2, 3, 4, 5, 7, 8, and 10. The most recent teams are SEAL Team 7 and SEAL Team 10, which were formed in March and April 2002, respectively.
The Teams deploy as Naval Special Warfare Squadrons or Special Operations Task Forces and can deploy anywhere in the world. Squadrons will normally be deployed and fall under a Joint Task Force (JTF) or a Combined Joint Special Operations Task Force (CJSOTF) as a Special Operations Task Force (SOTF).
Each SEAL Team is commanded by a Navy Commander (O-5), and has a number of operational SEAL platoons and a headquarters element.
A SEAL Team has a Staff Headquarters element and three 40-man Troops. Each Troop consists of a Headquarters element consisting of a Troop Commander, typically a Lieutenant Commander (O-4), a platoon Senior Enlisted (E-8), a Targeting/Operations Officer (O-2/3) and a Targeting/Operations Leading/Chief Petty Officer (E-6/7). Under the HQ element are two SEAL platoons of 16–20 men (two officers, 14–16 enlisted SEALs, and sometimes assigned non-NSW support personnel); a company-sized Combat Service Support (CSS) and/or Combat Support (CS) consisting of staff N-codes (the Army and Marine Corps use S-codes); N1 Administrative support, N2 Intelligence, N3 Operations, N4 Logistics, N5 Plans and Targeting, N6 Communications, N7 Training, and N8 Air/Medical.
Each platoon can be task organized for operational purposes into four squads, of eight 4–5 man fire teams/boat crews. The size of each SEAL "Team" with platoons and support staff is approximately 300 personnel. The typical SEAL platoon has an OIC (Officer in Charge, usually a Lieutenant (O-3), a Platoon chief (E-7/E-8), and two squads commanded by a LTJG (O-2) and a Squad Leader (E-6). The remaining members of the Squad are operators (E-4 to E-6) with their specialty skills in ordinance, communications, diving, medical. The core leadership in the Troop and Platoon are the Commander/OIC and the Senior Enlisted NCO (Senior Chief/Chief).
Platoon core skills consist of: Sniper, Breacher, Communicator, Maritime/Engineering, Close Air Support, Corpsman, Point-man/Navigator, Primary Driver/Navigator (Rural/Urban/Protective Security), Heavy Weapons Operator, Sensitive Site Exploitation, Air Operations Master, Lead Climber, Lead Diver/Navigator, Interrogator, Explosive Ordnance Disposal, Technical Surveillance, and Advanced Special Operations.
Naval Amphibious Base Little Creek, a naval base in Virginia Beach, Virginia, is home to SEAL Teams 2, 4, 8, and 10. Naval Amphibious Base Coronado, a naval base in Coronado, California, is home to SEAL Teams 1, 3, 5, and 7. There is also a SEAL Delivery Vehicle (SDV) unit, SDVT-1, located in Pearl Harbor, Hawaii. SDVT-2 was based in Virginia; it was disestablished and merged into SDVT-1. SDV Teams are SEAL teams with an added underwater delivery capability. An SDV platoon consists of 12–15 SEALs. Declassified locations:
|Insignia||Team||Deployment||Number of Platoons||HQ||Notes|
|SEAL Team 1||Worldwide||6 Platoons||Coronado, California|
|SEAL Team 2||Worldwide||6 Platoons||Little Creek, Virginia|
|SEAL Team 3||Middle East||6 Platoons||Coronado, California|
|SEAL Team 4||Worldwide||6 Platoons||Little Creek, Virginia|
|SEAL Team 5||Worldwide||6 Platoons||Coronado, California|
|Naval Special Warfare Development Group||Worldwide||Classified||Dam Neck, Virginia||SEAL Team 6 was dissolved in 1987. The Navy then established the Naval Special Warfare Development Group, also known as DEVGRU. While DEVGRU is administratively supported by Naval Special Warfare Command, they are operationally under the command of the Joint Special Operations Command|
|SEAL Team 7||Worldwide||6 Platoons||Coronado, California|
|SEAL Team 8||Worldwide||6 Platoons||Little Creek, Virginia|
|SEAL Team 10||Middle East||6 Platoons||Little Creek, Virginia|
|SEAL Delivery Vehicle Team||Worldwide||4 Platoons||Pearl Harbor, Hawaii
Little Creek, Virginia
San Diego, California
Special warfare ratingsEdit
The Special Warfare Operator rating (SO) and Special Warfare Boat Operator rating (SB), were established in 2006. Special Warfare Operators (SEALs) and Special Warfare Boat Operators (SWCCs), are no longer required to maintain the original rating they qualified in upon joining the navy.
|Navy Rate||Abbreviation||Pay Grade||Special Warfare Rating||Abbreviation|
|Master Chief Petty Officer||MCPO||E-9||Master Chief Special Warfare Operator||SOCM|
|Senior Chief Petty Officer||SCPO||E-8||Senior Chief Special Warfare Operator||SOCS|
|Chief Petty Officer||CPO||E-7||Chief Special Warfare Operator||SOC|
|Petty Officer First Class||PO1||E-6||Special Warfare Operator, First Class||SO1|
|Petty Officer Second Class||PO2||E-5||Special Warfare Operator, Second Class||SO2|
|Petty Officer Third Class||PO3||E-4||Special Warfare Operator, Third Class||SO3|
The primary mission of the Navy Parachute Team (NPT) is to support Naval Special Warfare recruiting by gaining access and exposure to appropriate candidates through aerial parachuting demonstrations. The U.S. Navy Parachute Team is a fifteen-man team composed of U.S. Navy SEALs. Each member comes to the team for a three-year tour from one of the two Naval Special Warfare Groups located on the east and west coasts. On completion of the tour, members return to operational units. The parachute team began in 1969 when Navy SEALs and Frogmen volunteered to perform at weekend air shows. The Team initially consisted of five jumpers: LCDR Olson, PHC Gagliardi, SK2 "Herky" Hertenstein, PR1 Al Schmiz and PH2 "Chip" Maury. Schmiz and Maury were members of the original "Chuting Stars." When LCDR Olson was transferred to California, PHC Gene "Gag" Gagliardi (D 546) of UDT ELEVEN introduced him to the local jumping elite with the San Diego Skydivers, one of the nation's first sports parachuting clubs. He convinced the Commander Naval Operations Support Group, PACIFIC to create a small demonstration team consisting of a cadre of highly qualified freefall jumpers. Its activities were to be conducted on a "not to interfere" basis with other military duties and at no cost to the government, other than utilizing normally scheduled aircraft. This group eventually adopted the "Leap Frogs" name.
The team was officially commissioned as the U.S. Navy Parachute Team in 1974 by the Chief of Naval Operations and assigned the mission of demonstrating Navy excellence throughout the United States. The East Coast-based "Chuting Stars" were disbanded in the 1980s with the "Leap Frogs" taking on all official parachute demonstrations within the Navy.
A typical Leap Frogs performance consists of six jumpers leaping out of an aircraft at an altitude of 6,000 feet. After freefalling sometimes using smoke or streamers, the Leap Frogs fly their canopies together to build canopy-relative work formations. After performances, the Leap Frogs make themselves available to the public to answer questions about the Navy and the Naval Special Warfare community, as well as to sign autographs.
Influence on foreign unitsEdit
From its predecessors – the Underwater Demolition Teams – to its current form, the SEALs have influenced the training and formation of several foreign units. In 1955 the Underwater Demolition Teams provided funding and training for the Republic of Korea Naval Special Warfare Flotilla, who are also known as UDT/SEALs. The Philippine Naval Special Warfare Group is also patterned on the training and implementation of the US Navy SEALs and the UDTs. Upon the creation of the Indian MARCOS in 1987, three officers were sent to undergo a hard training schedule with the SEALs that would help them further shape their unit's capabilities. Due to their reputation as being one of America's premier special operations forces, SEALs (particularly operators from DEVGRU) will often do exchanges with allied SOFs.
The National Navy UDT-SEAL Museum, in Fort Pierce, Florida, was founded in 1985 and was recognized as a National Museum by an act of Congress. The museum is dedicated to preserving the history of the Navy SEALs and their predecessors. The SEAL Museum stands on the training site of the first Navy frogmen. There through World War II, thousands of service members were trained as members of Naval Combat Demolition Units and Underwater Demolition Teams. The Museum houses rare historic artifacts from the founding of the UDT to present day, including weapons, vehicles, equipment, and most recently added, the Maersk Alabama lifeboat aboard which Somali pirates held Captain Richard Phillips hostage.
In popular cultureEdit
U.S. Navy SEALs have been depicted in numerous works of art, entertainment, and media. Examples of well-known representations in films include: Navy SEALs (1990), The Rock (1996), G.I. Jane (1997), Act of Valor (2012), Zero Dark Thirty (2012), Lone Survivor (2013) and American Sniper (2014). Examples of fictional representations in literature include various characters in Tom Clancy novels (e.g., Rainbow Six and Without Remorse) and the G.I. Joe universe.
- As of 3 December 2015, female sailors can become U.S. Navy SEALs, however as of 19 April 2016, none have yet done so.
- Wentz, Gene; B. Abell Jurus (1993). Men In Green Faces. St. Martin's Paperbacks. ISBN 978-0-312-95052-1.
- http://news.abs-cbn.com/video/news/06/12/17/how-us-special-forces-help-ph-troops -in-marawi
- US Navy. "SEAL Requirements". navyseals.com. Retrieved 1 July 2011.
- Jill Laster. "Program letting Coasties train as SEALs on hold". Navy Times.
- Myers, Meghann (19 April 2016). "The Navy SEALs are now open to women but no one has stepped forward". Navy Times. Military Times & Sightline Media Group. Retrieved 23 April 2016.
- Waller, Douglas (2003-02-03). "The CIA's Secret Army: The CIA's Secret Army". Time. Retrieved 2016-06-02.
- SOG: The Secret Wars of America's Commandos in Vietnam by John L. Plaster
- Haney, Eric L. (2002). Inside Delta Force. New York: Delacorte Press.
- Efran, Shawn (producer), "Army Officer Recalls Hunt for Bin Laden", 60 Minutes, CBS News, 5 October 2008.
- SEAL History: Origins of Naval Special Warfare-WWII | National Navy UDT-SEAL Museum. Navysealmuseum.com. Retrieved on 2014-05-24.
- Vann RD (2004). "Lambertsen and O2: beginnings of operational physiology". Undersea Hyperb Med. 31 (1): 21–31. PMID 15233157. Retrieved 14 January 2012.
- Butler FK (2004). "Closed-circuit oxygen diving in the U.S. Navy". Undersea Hyperb Med. 31 (1): 3–20. PMID 15233156. Retrieved 14 January 2012.
- SEAL History: Underwater Demolition Teams in the Korean War | National Navy UDT-SEAL Museum. Navysealmuseum.com. Retrieved on 2014-05-24.
- Genesis of the U.S. Navy's SEa, Air, Land (SEAL) Teams | National Navy UDT-SEAL Museum. Navysealmuseum.com. Retrieved on 2014-05-24.
- "Navy SEAL History". SOFREP Inc. Retrieved 12 May 2013.
- Watson, James (1997). Walking Point: The Experience of a Founding Member of the Elite Navy SEALs. New York, New York: William Morrow & Co. ISBN 0-688-14302-4.
- US Navy Videos. Navy.mil. Retrieved on 2014-05-24.
- First SEAL: Amazon.co.uk: Ray Boehm, Charles Sasser: Books. Amazon.co.uk. Retrieved on 2014-05-24.
- Point Man by Chief James Watson & Kevin Dockery, 1993, ISBN 0-380-71986-X
- Edwin E. Moïse. "The Vietnam Wars, Section 8: The Tet Offensive and its Aftermath". Clemson University. Retrieved 1 July 2011.
- "President Cites Seal Team", The New York Times (ProQuest), p. 21, 12 November 1968
- "Washington For the Record", The New York Times (ProQuest), p. 4, 19 June 1970
- Couch, Dick (2008). The Sheriff of Ramadi. Annapolis, MD: Naval Institute Press. ISBN 1-59114-138-9.
- Cawthorne, Nigel, The Mammoth Book of Inside the Elite Forces, Robinson, 2008 ISBN 978-1-84529-821-0
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 14
- Friedman, Herbert A. "United States PSYOP in Somalia". Psywarrior. Retrieved 2012-12-02.
- Borchini, Charles P. (Lt. Col.); Borstelmann, Mari (October 1994). "PSYOP in Somalia: The Voice of Hope" (PDF). Special Warfare. United States Army. Retrieved 2012-12-02.
- Seal Team Six: The incredible story of an elite sniper – and the special operations unit that killed Osama Bin Laden: Amazon.co.uk: Howard E. Wasdin, Stephen Templin: Books. Amazon.co.uk. Retrieved on 2014-05-24.
- Neville, Leigh (2015). Special Forces in the War on Terror. Osprey Publishing. ISBN 978-1472807908., p. 25-P.31
- Neville, Leigh (2015). Special Forces in the War on Terror. Osprey Publishing. ISBN 978-1472807908., p. 44
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 1472807901 ISBN 978-1472807908, p. 49-50, p. 77
- Neville, Leigh (2015). Special Forces in the War on Terror. Osprey Publishing. ISBN 978-1472807908., p. 78
- Neville, Leigh (2015). Special Forces in the War on Terror. Osprey Publishing. ISBN 978-1472807908., p. 54-69
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 83
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 161-162
- "DOD Identifies Service Members Killed In CH-47 Crash". U.S. Department of Defense Office of the Assistant Secretary of Defense (Public Affairs). August 11, 2011. Retrieved September 20, 2012.
- SEAL Team 6 members among 38 killed in Afghanistan. Los Angeles Times 6 August 2011.
- Helicopter Crash in Afghanistan Reportedly Kills Members of SEAL Team 6. Fox News, 6 August 2011.
- Pentagon releases names of Chinook crash victims , CNN News blog, 12 August 2011. Retrieved 14 August 2011.
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 162
- Shumaker, Lisa (11 December 2012). "Navy identifies SEAL killed in hostage rescue in Afghanistan". Yahoo News. Archived from the original on 18 December 2012. Retrieved 27 July 2015.
- "Obama to present Medal of Honor to Navy SEAL". news.yahoo.com. Retrieved 2016-06-02.
- SEALs to Undergo 'Evolution in Reverse' as They Return to Maritime Operations – Blog. Nationaldefensemagazine.org. Retrieved on 2014-05-24.
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 96
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 123
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 123-126
- Rossiter, Mike, Target Basra , Corgi, 2009 ISBN 978-0552157001, p149, p153, p. 158-162,
- Kyle, Chris; McEwen, Scott; DeFelice, Chris (February 5, 2012). American Sniper. Harper Collins. ISBN 0-06-208235-3.
- Rossiter, Mike, Target Basra , Corgi, 2009 ISBN 978-0552157001
- Cawthorne, Nigel, The Mammoth Book of Inside the Elite Forces, Robinson, 2008 ISBN 1845298217 ISBN 978-1845298210
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 126-127
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 127
- Rossiter, Mike, Target Basra , Corgi, 2009 ISBN 978-0552157001, p. 161,
- Owen, Mark No Easy Day: The Autobiography of a Navy Seal: The Firsthand Account of the Mission That Killed Osama Bin Laden, DUTTON Books, 2012 ISBN 978-0525953722, p. 49
- Rossiter, Mike, Target Basra , Corgi, 2009 ISBN 978-0552157001, p. 325-328
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 126
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 178-179
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 175-178
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 179-180
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 180-182
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 182
- Robinson, Patrick (2013). Honor and Betrayal: The Untold Story of the Navy Seals Who Captured the "Butcher of Fallujah"—and the Shameful Ordeal They Later Endured. Perseus Book Group. ISBN 9780306823091.
- CNN Wire Staff (April 22, 2010). "Navy SEAL not guilty of charges in Iraq". CNN. Retrieved November 28, 2016.
- Centanni, Steve (May 6, 2010). "Navy SEAL Found Not Guilty of Assaulting a Suspected Terrorist". Fox News. Retrieved November 28, 2016.
- Hartwell, Ray V. (November 26, 2013). "Persecuting Our Heroes". The American Spectator. Retrieved December 7, 2016.
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1472807908, p. 184-185
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1-4728-0790-8, p. 200-201
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1-4728-0790-8, p. 282, p,284
- Neville, Leigh, Special Forces in the War on Terror (General Military), Osprey Publishing, 2015 ISBN 978-1-4728-0790-8, p. 285
- "U.S. warship near boat carrying pirates — CNN.com". CNN. 9 April 2009. Retrieved 4 May 2011.
- Flock, Elizabeth (2 May 2011). "Navy SEALs who killed Osama bin Laden are from the elite 'Team 6'". The Washington Post. Retrieved 2 May 2011.
- "The raid on Osama bin Laden's compound". CBS News. 2 May 2011.
- "Osama bin Laden killed in CIA operation". The Washington Post. May 8, 2011. Retrieved May 19, 2011
- Winter, Jana (25 May 2011). "Mickey Mouse Surrenders to Navy SEALs in Trademark Battle". Fox News. Retrieved 8 June 2011.
- Model of Osama bin Laden Abbottabad Compound | National Navy UDT-SEAL Museum. Navysealmuseum.com. Retrieved on 2014-05-24.
- "Navy Seals board rogue Libya oil tanker Morning Glory". BBC News. 17 March 2014. Retrieved 6 October 2014.
- "Navy SEALS board, take control of rogue Libya tanker". Fox News. 17 March 2014.
- "Revelation of March ISIS battle highlights risks for U.S. troops". CNN. 20 June 2016.
- "U.S. Navy SEAL killed in Iraq battle vs. ISIS". CBS. 3 May 2016.
- "Navy SEAL Charles Keating IV gave life rescuing others from ISIS". CNN. 3 May 2016.
- "Inside the Battle With ISIS that Killed a US Navy SEAL". ABC news. 4 May 2016.
- Command, Navy SEAL + SWCC Scout Team, Naval Special Warfare. "Navy SEAL Enlisted General Requirements – SEALSWCC.COM | Official website U.S. Navy SEALs". Retrieved 2015-09-28.
- "Enlisted SEAL Requirements | Navy SEALs". Retrieved 2015-09-28.
- SEAL+SWCC. "Content". sealswcc.com. Retrieved 30 May 2015.
- "BUD/S | Navy SEALs". Navy SEALs. Retrieved 2016-06-02.
- sealswcc.com. "Navy SEALs Training Stages Overview".
- Navy SEAL Platoon Training | Navy SEALs Information & Resources. Information.usnavyseals.com (2009-09-04). Retrieved on 2014-05-24.
- "Special Operations Combat Medic Course". Retrieved 6 October 2014.
- Crockett, Emily (3 December 2015). ""No exceptions": Women can now serve in all military combat roles". Vox. Retrieved 5 December 2015.
- Communication, Mass. "Naval Special Warfare Reserve Command Renamed". Navy.mil. Retrieved 1 October 2011.
- "SPECIAL OPERATIONS FORCES" (PDF). www.gao.gov. July 2015. Retrieved 2016-06-02.
- Dunia emas: US Navy SEALs. Duniakemilauemas.blogspot.com. Retrieved on 2014-05-24.
- SEAL Team 7 Holds Change of Command. Navy.mil. Retrieved on 2014-05-24.
- Navy Special Warfare Operator Rating (SEAL). Navycs.com. Retrieved on 2014-05-24.
- NSW Community Establishes New SO and SB Ratings. Navy.mil. Retrieved on 2014-05-24.
- SEALs and SWCCs drop source ratings [Archive] – SOCNET: The Special Operations Community Network. SOCNET. Retrieved on 2014-05-24.
- Job Title. (PDF) . Retrieved on 2014-05-24.
- "Bachelor of Science in Business Administration with a concentration in General Management" (PDF). www.trident.edu. 2013-08-23. Retrieved 2016-06-02.
- "Welcome To Governors State" (PDF). Retrieved 6 October 2014.
- Navy Parachute Team handbook PDF
- "Official U.S. Navy Parachute Team Web Site – Leap Frogs". Leapfrogs.navy.mil. Retrieved 1 October 2011.
- SEAL History: The Leap Frogs-Origins of the Navy SEAL Parachuting Exhibition Team | National Navy UDT-SEAL Museum. Navysealmuseum.com. Retrieved on 2014-05-24.
- Couch, Dick (October 1, 2008). Sheriff of Ramadi. Annapolis: Naval Institute Press. p. 54.
- Kyle, Chris (October 15, 2013). American Sniper. New York: HarperCollins.
- Falconer, Duncan (July 1, 2001). First Into Action: A Dramatic Personal Account of Life in the SBS. London: Little, Brown Book Group.
- The Origin of the UDT-SEAL Museum | National Navy UDT-SEAL Museum. Navysealmuseum.com. Retrieved on 2014-05-24.
- "Ft. Pierce Museum Now the Official National Museum of Navy SEALs and Their Predecessors". NavySEALs.com. Retrieved 1 October 2011.
- Besel, Jennifer M. The Navy SEALs. Mankato, Minn: Capstone Press, 2011. ISBN 1-4296-5380-9 OCLC 649079630
- Bosiljevac, T.L. SEALs: UDT/SEAL Operations in Vietnam. Ballantine Books, 1990. ISBN 0-8041-0722-X. OCLC 23228772
- Bosiljevac, T.L. SEAL Team Roll-Back. New York: Avon Books, 1999. ISBN 0-380-78714-8. OCLC 41020614
- Bahmanyar, Mir. US Navy SEALs. Oxford: Osprey Publishing, 2005. ISBN 1-84176-807-3. OCLC 62176513
- Bahmanyar, Mir with Chris Osman. SEALs: The US Navy's Elite Fighting Force. Osprey Publishing, 2008. ISBN 1-84603-226-1. OCLC 191922842
- Couch, Dick. May the Seals: Their untold history (2014)
- Couch, Dick. The Sheriff of Ramadi: Navy SEALs and the Winning of al-Anbar. U.S. Naval Institute Press, 2008. ISBN 1-59114-138-9. OCLC 1591141389
- Couch, Dick. The Warrior Elite: The Forging of SEAL Class 228. New York: Three Rivers Press, 2003. ISBN 1-4000-4695-5. OCLC 802957824
- Couch, Dick. The Finishing School: Earning the Navy SEAL Trident. New York: Three Rivers Press, 2004. ISBN 0-609-81046-4. OCLC 60563833
- Couch, Dick. Down Range: Navy SEALs in the War on Terrorism. New York: Three Rivers Press, 2005. ISBN 1-4000-8101-7. OCLC 71199069
- Cummings, Dennis J. The Men Behind the Trident: SEAL Team One in Viet Nam. New York: Bantam Books, 1998. ISBN 0-553-57928-2 OCLC 39494815
- Denver, Rorke, and Ellis Henican. Damn Few: Making the Modern SEAL Warrior. New York: Hyperion, 2013. ISBN 1-4013-1280-2 OCLC 795757181
- Dockery, Kevin. Navy SEALs: A History of the Early Years. New York: Berkley Books, 2001. ISBN 0-425-17825-0 OCLC 0425178250
- Dockery, Kevin. Navy SEALs: A History Part II: The Vietnam Years. New York: Berkley Books, 2002. ISBN 0-425-18348-3 OCLC 48449554
- Dockery, Kevin. Navy SEALs: A History Part III: Post-Vietnam to the Present. New York: Berkley Books, 2003. ISBN 0-425-19034-X OCLC 51818673
- Dockery, Kevin. Weapons of the Navy SEALs. New York: Berkley Books, 2004. ISBN 0-425-19834-0 OCLC 56347561
- Donald, Mark L., and Scott Mactavish. Battle Ready: Memoir of a SEAL Warrior Medic. New York: St. Martin's Press, 2013. ISBN 1-250-00976-6 OCLC 759914152
- Fawcett, Bill. Hunters and Shooters: An Oral History of the U.S. Navy SEALs in Vietnam. New York: W. Morrow and Co., 1995. ISBN 0-688-12664-2 OCLC 31520013
- Freid-Perenchio, Stephanie, and Jennifer Walton. SEAL: The Unspoken Sacrifice. [Ketchum, ID]: SFP Studio, 2009. ISBN 0-615-30322-6 OCLC 525383689
- Greitens, Eric. The Heart and the Fist: The Education of a Humanitarian, the Making of a Navy SEAL. Boston: Houghton Mifflin Harcourt, 2011. ISBN 0-547-42485-X OCLC 646308409
- Halberstadt, Hans. US Navy SEALs in Action. Osceola, WI: Motorbooks International, 1995. ISBN 0-87938-993-1 OCLC 32275764
- Jansing, Chris (29 January 2010). "A typical SEAL? Think 007, not Rambo". NBC Field Notes (NBC News). Retrieved 29 January 2010.
- Kelly, Orr. Never Fight Fair!: Navy SEALs' Stories of Combat and Adventure. Novato, CA: Presidio Press, 1995. ISBN 0-89141-519-X OCLC 30894438
- Luttrell, Marcus. Lone Survivor: The Eyewitness Account of Operation Redwing and the Lost Heroes of SEAL Team 10. Little, Brown and Company, 2009. ISBN 0-316-04469-5. OCLC 319610219
- Luttrell, Marcus., and James D. Hornfischer. Service: A Navy SEAL at War. New York, NY: Little, Brown and Co., 2012. ISBN 0-316-18536-1 OCLC 756584153
- Mann, Don, and Ralph Pezzullo. Inside SEAL Team Six: My Life and Missions with America's Elite Warriors. New York, NY: Little, Brown & Co., 2011. ISBN 0-316-20431-5 OCLC 729343843
- McEwen, Scott, and Richard Miniter. Eyes on Target: Inside Stories from the Brotherhood of the U.S. Navy SEALs. New York: Center Street, 2014. ISBN 1-4555-7569-0 OCLC 828891431
- Neville, Leigh. Takur Ghar: The SEALs and Rangers on Roberts Ridge, Afghanistan 2002. Oxford, UK: Osprey Pub., 2013. ISBN 1-78096-198-7 OCLC 798058824
- Owen, Mark, and Kevin Maurer. No Easy Day: The Autobiography of s Navy SEAL: the Firsthand Account of the Mission That Killed Osama Bin Laden. New York, NY: Dutton, 2012. ISBN 0-525-95372-8 OCLC 808121503
- Padden, Ian. U.S. Navy SEALs. Toronto: Bantam Books, 1985. ISBN 0-553-24954-1 OCLC 12264420
- Pfarrer, Chuck. SEAL Target Geronimo: The Inside Story of the Mission to Kill Osama Bin Laden. New York: St. Martin's Press, 2011. ISBN 1-250-00635-X OCLC 733234790
- Pfarrer, Chuck. Warrior Soul: The Memoir of a Navy SEAL. New York: Random House, 2004. ISBN 1-4000-6036-2 OCLC 52165997
- Redman, Jason, and John R. Bruning. The Trident: The Forging and Reforging of a Navy SEAL Leader. New York: William Morrow, 2013. ISBN 0-06-220832-2 OCLC 827260093
- Robinson, Patrick. Honor and Betrayal: The Untold Story of the Navy SEALs Who Captured the "Butcher of Fallujah"- and the Shameful Ordeal They Later Endured. Cambridge, Massachusetts: Da Capo Press, 2013. ISBN 0-306-82308-X OCLC 861508106
- Sasser, Charles W. Encyclopedia of the Navy SEALs. New York: Facts on File, 2002. ISBN 0-8160-4569-0. OCLC 48383497
- Wasdin, Howard E., and Stephen Templin. SEAL Team Six: Memoirs of an Elite Navy SEAL Sniper. New York: St. Martin's Press, 2011. ISBN 0-312-69945-X OCLC 681499659
|Wikimedia Commons has media related to United States Navy SEALs.|
- Official website
- United States Navy Parachute Team—official website
- "Navy Fact File: Navy SEALs". San Diego: United States Navy. April 2002. Archived from the original on 3 March 2005. Retrieved 25 June 2006.
- Peterson, Lt. Cmdr Erick (June 2009). "The Strategic Utility of U.S. Navy SEALs". Master thesis (dtic.mil). NAVAL POSTGRADUATE SCHOOL. Retrieved 17 January 2012.
- SEAL The Unspoken Sacrifice exhibit at the Pritzker Military Museum & Library
- McCoy, Shane T. (August 2004). "Testing Newton's Law", All Hands Magazine, p. 33.
- Obringer, Lee Ann. "How the Navy SEALs Work". How Stuff Works. Retrieved 14 June 2006.
- Navy SEALs 50 – Commemorating the 50th Anniversary of the Establishment of the U.S. Navy SEALs
- Ethos of the Navy SEALs
|
In 2000, Hirdt reasoned, Al Gore won the popular vote but lost in the Electoral College, reversing the polarity of the rule.
The polarity of opinion only gets more pronounced when the focus shifts to the meaning of the ending.
As a great scientist puts it, "Establish your polarity, young man, and sleep soundly at night."
But if this be the case, how are we to conceive the physical mechanism of this polarity?
Iron fences invariably exhibit only the polarity by vertical induction; so also small buckets, bells, etc.
His polarity had changed: his electricity was no longer negative, but positive.
The magnetism which arranges tribes and races in one polarity is alone to be respected; the men are steel-filings.
Its polarity depends on the direction in which the current flows.
It is therefore necessary to have a polarity indicating voltmeter in the circuit and to watch it when starting the machine.
Is there one of us able to formularize the polarity of light?
polarity po·lar·i·ty (pō-lār'ĭ-tē, pə-)
The property of having two opposite poles, such as those possessed by a magnet, or of having opposite properties or characteristics.
The direction or orientation of positivity relative to negativity.
|
By Maria Trivelpiece
It is quite difficult to get through a day without hearing or seeing some mention of sports or athletics in our world. They practically dominate society. Professional athletes are some of the highest paid people on the planet. They are the epitome of what children aspire to be, fans fawn over and television networks profit from. Yet, in the midst of all the glory of these games, the evident violence that accompanies them seems to be conveniently overlooked. But is it okay to simply ignore that the most watched event on television is a game of grown men tackling each other, beating each other and then celebrating the fact that they physically harmed another human being? Is it ethical to teach our children that the most exciting moment in ice hockey is when the defensemen drop their gloves and fist fight? I am here to say that it is. The violence of sports, in technicality, is ethical because sports are not promoting violence, but rather mimicking and projecting the society that we live in.
We want to rationalize and determine if an action is ethical. Just recently we have seen Colin Kaepernick kneel during the national anthem and cannot imagine why anyone would even condemn him for expressing his freedom of speech. But then, we see the war veteran without legs who so bravely defended our country and does not have the privilege to stand for the flag he fought for and our ‘ethical’ minds question, what is right and what is wrong?
The same dilemma happens in sports; however, we fail to see both sides. We see the violence of football, boxing and ice hockey, and automatically determine that this is affecting us, our children and the way our society functions. On the contrary, we do not look at the violence already in society and in some way see how it reflects itself and impacts sports.
Violence in the sporting arena has been around longer than historians may even know. Gladiators fought until the death and 20,000 people encouraged the fighters to slaughter each other. In 1930, Maximillian Adelbert Baer killed a man in the boxing ring and spectators cheered until they realized his opponent was not moving. It seems that we as fans love this ferocity. We watch in awe and anticipation, and almost thrive off of the viciousness within the arena.
But why does the violence make us feel invigorated, even happy? I believe the answer lies deep within the human soul. We all have our own opponents. Every single day we wake up there are obstacles we have to face, problems looking to crush us and the unstableness of life. This instability causes anxiety. It causes anger. We cannot always understand why bad events tend to happen. We cannot understand why they happen in general, not only to us, but to humanity. When evil attacks, our response is to fight it. We do not welcome it with open arms into our lives, but rather, we wish to eradicate it from ever coming near the people and things that we so love.
So we wrestle with the malevolence; we stand up for ourselves, we protest, we fight for our beliefs just as the gladiators looked to defend themselves and the defensive lineman looks to tackle the running back charging towards him. In sports the opponent is the evil, trying to invade our basket, our end zone, our goal line, which at that moment is the most valuable piece of life. When we defeat the challenger and win the passing of a particular job or make the game-winning basket, then, we feel alive. We have defeated that invasion, rising victorious.
The violence of sports is a projection of society, not a promotion of actions. Sports respond to the way that human beings act. Charles Darwin theorized about survival of the fittest in 1859. The animal, the human being, the plant, that knows how to adapt, knows how to defeat the other to survive. We cannot blame sports for influencing violence in the world, when there is an inherent desire to demolish the competition within all creatures of this earth. Sports project this tendency that already exists. If we are unhappy with the climate of the sporting arena then the only way to change it would be to change the climate of life.
So, in the most literal and figurative way, the ball is in your court to decide if this violence is ethical or not. But before you decide, look at the world around you. See the wickedness that occurs every day in many different ways and then determine whether this is because of sports or if sports are simply a slightly more manageable way of projecting this wickedness in ways that are more controlled than most acts of vice in the society of our time.
Maria Trivelpiece ’19 is a student at Fordham College Rose Hill. She is double majoring in psychology and journalism.
|
Who decides and how can good decisions be taken? For a long time, this question did not even arise in many hierarchical organizations. In case of doubt, the decision is up to the boss or a small high-ranking leadership circle, which in the best case features a high degree of diversity and honors disagreement but which in the worst case scenario only consists of claqueurs. As more and more organizations try to become more agile, new answers to the question of who decides and how to decide are of central importance. After all, agility means subsidiarity, i.e. that decisions must be made as decentralized as possible in self-organizing teams. Only how?
Democratic Majority Decision
Democracy is a device that insures we shall be governed no better than we deserve.George Bernhard Shaw
The days of autocracy, in which an absolute ruler decides at will, are fortunately over in most states since the Enlightenment. It has been followed by (parliamentary) democracy, in which the decision-making lies with a (representative) group elected by the people. The method of choice for decision-making in this group is majority voting, i.e. the vote of the majority is decisive.
This leads to many kinds of “politics” in the worst possible sense, i.e. the hollow, but all the louder, tactical battles for votes and majorities instead of fruitful debates on the matter. When, after this long struggle, a proposal capable of winning a majority has finally passed, many legitimate aspects of the defeated proposals have fallen into oblivion.
The majority voting principle reaches its limits especially in the case of many options. Contrary to popular belief, it is in this case not a good approach to consensus, because the relative majority of votes (even and especially with many abstentions) in the end only represents the opinion of a small minority. This shortcoming can of course be remedied by requiring an absolute majority or, in extreme cases, even unanimous resolutions. The more proposals on the table, the less realistic and practicable these approaches becomes of course.
In situations with many choices, Systemic Consensus helps to come as close as possible to consensus. For this purpose, the degree of rejection on a scale from 0 (no objection) to 10 (completely unacceptable) is noted for each option, rather than the individual group members’ one vote. The option that is least rejected by all is then chosen, which is the option where the resistance of the group is lowest.
The degree of rejection can also be a great opportunity for discussion. The explanation of the reasons for the resistance always leads to a better understanding of the opinion, points of view and preferences of the group members. In summary, such a systemic consensual proposal has the following characteristics (cf.: SK kurz erklärt):
- causes the least dissatisfaction in the group …
- is most easily accepted by all …
- comes closest to consensus …
- therefore comes closest to the general balancing of interests …
- thus generates the least conflict potential …
- is therefore the most suitable solution to the problem
From Consensus to Consent
By consensus, I must convince you that I am in the right; by consent, you ask whether you can live with the decision.Annewiek Reijmer
Like democracy, sociocracy is based on the principle of equal rights, but does not implement this in the form of “one person, one vote”. For this purpose it uses consent which means that a decision is considered taken as soon as there are no more serious objections to it and everyone can give their consent.
Thus the central question of consent is not who agrees on the basis of which consideration, but who has which objection. A mere rejection is not enough and every objection must be justified, including an integrative proposal to improve the solution. In this process of integration, it often helps to limit the pending decision in the sense of sailing by sight to the next concrete step, to provide it with success criteria used to decide the next steps after this first step.
Consultative Individual Decisions
Consent naturally leads to a higher acceptance of the decision, but quickly reaches its limits in larger groups beyond the usual team size because the integration of the various objections can become very time-consuming. A variation of this or an approximation to it is the consultative individual decision, in which in extreme cases, such as with AES (cf. Frederic Laloux, Reinventing Organizations), everyone in the company can make far-reaching decisions as long as he or she has consulted and integrated the objections and views of a sufficient number of people.
Various companies such as oose or it-agile rely on less radical variants of this consultative individual decision. They first designate the decision maker for a specific decision with consent and empower him or her to make the decision incontestably after sufficient integration of the opinions of persons to be consulted (if appropriate also jointly determined in advance).
Consent or the consultative individual decision and systemic consensus are similar inasmuch as both have the goal of taking the opinions of as many people as possible into account in decision-making. Consensus, however, is rather a process of iterative refinement of a single solution (against which no one has any objections in the end), while systemic consensus helps to make a choice as close to consensus as possible among many possibilities.
|
Pages in this set
Stem cells are unspecialised cells that can differentiate into different
cells. This can include nerve cells etc.
We can use stem cells to fix illnesses and problems such as spinal
injuries. Spinal injuries can cause paralysis because spinal nerves do
not repair themselves. If we grow new nerve…
Similar Biology resources:
|
Purchase this article with an account.
Takuto Sakono, Akira Meguro, Shigeaki Ohno, Nobuhisa Mizuki; Seasonal variation in ocular attack in Japanese patients with Behçet’s disease. Invest. Ophthalmol. Vis. Sci. 2017;58(8):2153. doi: https://doi.org/.
Download citation file:
© ARVO (1962-2015); The Authors (2016-present)
Behçet’s disease (BD) is a chronic, systemic, inflammatory disorder characterized by four major symptoms consisting of recurrent ocular, oral and genital ulcers, and skin lesions. Ocular involvement occurs in approximately 50-70% of patients with BD and repeated ocular attacks can cause blindness. Seasonal variation in ocular attack in patients with BD has been suggested in Japan since long before, however, there are very few studies which assessed the correlation between season and BD ocular attack. In this study, we retrospectively investigated the seasonal pattern of ocular attack of BD in a Japanese population.
We enrolled a total of 145 Japanese patients with BD who were diagnosed and treated between March 1998 and November 2016 at the Uveitis Survey Clinic of Yokohama City University Hospital. The Rogers’ method was used to assess seasonal variation in ocular attack of BD.
A total of 830 ocular attacks occurred in the BD patients. The highest frequency of ocular attack was observed in November, followed by December and March. The lowest frequency was in the summer months of June, July and August. This seasonal variation in BD ocular attack was statistically significant (P < 0.05).
We found that ocular attack of BD shows a significant seasonal variation in Japanese patients. This finding suggests that environmental factors associated with seasonality may be responsible for triggering ocular attack of BD.
This is an abstract that was submitted for the 2017 ARVO Annual Meeting, held in Baltimore, MD, May 7-11, 2017.
This PDF is available to Subscribers Only
|
Blog: Virtual Coaching in the Early Grade Reading Study (Mpumalanga)
Dr Lorraine Marneweck,Ms Gina Ermacora
Posted 3 years ago
This Blog was written Dr Lorraine Marneweck, Programme Director and Ms Gina Ermacora, Virtual Coach from ClassAct in June 2020. It is relevant to the EduCOVID TIG as much of our work is becoming virtual.
It provides hints on how the Early Grade Reading Study intervention was conducted in Mpumalanga on behalf of the Department of Basic Education. For more information on the EGRS click: here and for a readable summary click: here
Teachers in this intervention were given tablets pre-loaded with lesson plans, supporting materials, video and audio tutorials and motivational clips. In addition, they had constant access to a virtual coach, who communicated with teachers via technology. The virtual coach had a significant part to play in this intervention.
The virtual coach was trained in the principles and practices of the FUEL and GROW models of coaching and on the EGRS EFAL programme along with the instructional coaches. The virtual coach was also trained on how to make short video clips in response to more complex issues, which were then sent to teachers via WhatsApp.
The virtual coach implemented the following pre-arranged routine when providing electronic teacher support:
- Established WhatsApp groups for teachers and another one for SMTs. Teachers and SMTs were encouraged to use these groups to ask and answer questions, to share experiences and to motivate each other.
- Sent out regular bulk SMSs as weekly reminders of where teachers should be in the programme, together with a motivational message and teaching tips.
- Principals also received weekly SMSs, reminding them of where teachers should be in the programme, and encouraging them to support and monitor teachers using the tool provided.
- Received feedback from the EGRS App on curriculum coverage and usage.
- Analysed more complex challenges reported by teachers, and then, together with the Materials Development Team, sourced or created a video shared via WhatsApp.
- Held one-on-one virtual coaching sessions with individual teachers via WhatsApp. These sessions focused on the key issues covered in each training session and were aimed at: a) Establishing the teacher’s level of proficiency and engagement through data analysis and questioning b) Praising the teacher for evident strengths and efforts made c) Identifying challenges and addressing them through text conversation d) Sending short video clips or voice clips to address challenges via WhatsApp e) Documenting the outcome of the coaching sessions in a data base.
- Ran fortnightly competitions for teachers to showcase teaching and learning successes
Lessons Learnt about Virtual Coaching
- A combination of virtual coaching and instructional coaching is preferable. Many of the lessons learnt about instructional coaching apply to virtual coaching. And in many instances, instructional coaching already had virtual and electronic components.
- Certain instructional coaching elements are difficult to replicate in virtual coaching. These include relationship building, communication and evaluation of teacher progress in the classroom context.
- Electronic reminders work as curriculum pace setters. Sending teachers weekly reminders helps keep them on track with curriculum coverage.
- Dosage intensity changes over the course of a term for virtual coaching. High levels of coaching dosage are required at the start of each term to ensure that the virtual coach understands the development needs of all teachers. Thereafter the virtual coach is in a position to provide differentiated coaching based on needs. This includes the circulation of weekly phonics video clips and fortnightly competitions that provide some classroom-based insights.
- Localised technology support for schools and teachers is important. This is difficult to source in more rural schools and therefore can place these teachers at a disadvantage. In order to fill this void, virtual coaches also need to be skilled at basic tablet maintenance and filmmaking.
For further information contact:
Programme Lead: Dr Lorraine Marneweck [email protected]
Virtual Coach: Ms Gina Ermacora [email protected]
For more information on FUEL method click: here
For more information on GROW method click : here
|
Game theory is used today in a wide range of areas such as economics, social sciences, biology and philosophy, gives a mathematical framework for describing a situation of conflict or cooperation between intelligent rational players.
The central goal is to predict the outcome of the process. In the early 1950s, John Nash showed that the strategies adopted by the players form an equilibrium point (so-called Nash equilibrium) for which none of the players has any incentive to change strategy.
Quantum mechanics describes the physics of small objects such as particles and atoms and predicts a vast range of astonishing and often strikingly counter-intuitive phenomena, such as quantum nonlocality. In the 1960s, John Stewart Bell demonstrated that the predictions of quantum mechanics are incompatible with the principle of locality, that is, the fact that an object can be influenced directly only by its immediate surroundings and not by distant events. In particular, when remote observers perform measurements on a pair of entangled quantum particles, such as photons, the results of these measurements are highly correlated. In fact, these correlations are so strong that they cannot be explained by any physical theory respecting the principle of locality. Hence quantum mechanics is a nonlocal theory, and the fact that Nature is nonlocal has been confirmed in numerous experiments.
What links them is the same concepts appearing in both fields. For instance, the physical notion of locality appears naturally in games where players adopt a classical strategy. In fact the principle of locality sets a fundamental limit to the performance achievable by classical players (that is, bound by the rules of classical physics).
Bringing quantum mechanics into the game, the researchers showed that players who can use quantum resources, such as entangled quantum particles, can outperform classical players. That is, quantum players achieve better performance than any classical player ever could.
Let's consult our old friends Alice and Bob:
Bell inequality test scenario. A source distributes physical resources to two distant players, Alice and Bob. Each player receives a question, denoted X1 for Alice and X2 for Bob, and should then provide an answer, denoted A1 for Alice and A2 for Bob. Credit:
Dr. Nicolas Brunner and mathematics Professor Noah Linden of the University of Bristol worked together to uncover the deep and unexpected connection between game theory and quantum physics - the link between Bell nonlocality and Bayesian games.
Brunner said: "Once in a while, connections are established between topics which seem, on the face of it, to have nothing in common. Such new links have potential to trigger significant progress and open entirely new avenues for research.
"Such an advantage could, for instance, be useful in auctions which are well described by the type of games that we considered. Therefore, our work not only opens a bridge between two remote scientific communities, but also opens novel possible applications for quantum technologies."
Citation: Nicolas Brunner & Noah Linden, 'Connection between Bell nonlocality and Bayesian game theory', Nature Communications 4, Article number: 2057 doi:10.1038/ncomms3057
|
The increasing resistance of bacteria to multiple antibiotics has triggered a new phase in humanity’s never-ending battle against bacterial infections. The excessive use of otherwise effective antibiotics has required developing new weapons. Peptide nucleic acids that are DNA mimics can inhibit specific protein synthesis of bacteria. The challenge is to sneak these molecules into the bacteria to inhibit their growth without also destroying our own cells.
In 2013, antibiotic-resistant bacteria caused 700,000 people to die worldwide, and the number of multidrug-resistant bacteria strains is increasing rapidly. With the first reports of resistance to the last antibiotic resort of hospitals, such as carbapenems, the threat of worldwide multidrug resistance is enormous. A Danish research group is now actively focusing on developing a new alternative weapon against bacteria.
According to Peter Eigil Nielsen, Professor, Department of Cellular and Molecular Medicine, University of Copenhagen, “Unlike standard antibiotics that utilize general differences between bacteria and their host, the new antibiotics very specifically target certain types of bacteria. Using molecules that are a chemical hybrid between DNA and a peptide, we can specifically inhibit bacteria from producing certain essential proteins, thereby enabling us to kill the bacteria effectively.”
Peptide nucleic acids (PNA) appear to be useful in combating pathogenic bacteria. PNA molecules resemble DNA molecules in structure but have a protein-like backbone. This means that PNAs bind more strongly to DNA and RNA molecules and have exquisite biological stability.
“PNA can bind very specifically and strongly to a corresponding RNA molecule, and we can utilize this property in combating bacteria. Cells transcribe DNA to RNA, which acts as the instruction code for protein synthesis. Short PNA molecules targeting selected RNA molecules can inhibit synthesis of the protein for which this RNA codes in the bacteria,” says Peter Eigil Nielsen.
The initial task involves identifying suitable essential bacterial proteins so that the bacteria will not be able to survive the inhibition of their synthesis. In the current studies, the researchers successfully targeted fatty acid biosynthesis in Gram-negative bacteria such as Escerichia coli and Pseudomonas aeruginosa.
“Since bacteria are genetically very different from humans, PNA molecules can be designed to specifically target bacterial and not human genes, and thus there is very little risk that PNA molecules will also affect the genes in our own cells,” says Peter Eigil Nielsen.
The greatest challenge of this new technology is actually completely different.
According to Peter Eigil Nielsen, “PNA molecules are too big and have properties that prevent them from penetrating the cell membranes of bacteria. We are therefore working intensely on finding transport molecules that can effectively help to transport PNA into bacteria without toxicity to people, and to understand how this transport takes place.”
Understanding is not enough
The first-generation PNA antibiotics that can specifically kill multidrug-resistant bacteria have been developed but they are neither effective nor safe enough as drugs. Nevertheless, the new PNA weapon has one enormous advantage.
“Current antibiotics exploit only a few molecular mechanisms in bacteria, and as soon as some bacteria develop resistance and this spreads, all antibiotics that depend on this mechanism are no longer effective. With PNA antibiotics, we can not only select numerous new biological mechanisms against which no resistance has been discovered, but we can also in several cases target them against the mechanisms that are responsible for the existing resistance and thereby eliminate it,” adds Peter Eigil Nielsen.
Finally, antisense technology is a generic platform. This means that second-generation antibiotics, whose general pharmaceutical properties are similar to first-generation antibiotics, can be developed very easily based on the same principles and be used against new bacterial mechanisms in the never-ending battle against new types of multidrug resistance.
“In the next 3–6 years, the development of these new PNA-based antibiotics is planned to evolve such that a pharmaceutical company can take over and carry out preclinical and subsequently clinical trials that hopefully will result in a new generation of antibiotics that can effectively combat infections with multidrug-resistant bacteria,” concludes Peter Eigil Nielsen.
“Antibacterial peptide nucleic acid−antimicrobial peptide (PNA−AMP) conjugates: antisense targeting of fatty acid biosynthesis” has been published in Bioconjugate Chemistry. In 2017, the Novo Nordisk Foundation awarded a Challenge Programme grant to Peter Eigil Nielsen for the project Antibiotic Resistance and Alternative Antibiotics.
|
|Healthy Diet Plans >> Health Food|
Health Food List For Healthy LivingHealth foods are basically foods that help you to maintain health; physically and mentally both. Good nutrition and safe food is very important for all people across the world and eating healthy foods and a balanced meal helps to protect and promote good health.
This can be achieved with the help of a food pyramid which guides you how much to eat from a particular food group, how to make wise choices from that group and how to prepare to prevent any nutrient loss. A healthy food pyramid also helps to plan meals, teach the serving or portion size and gives smart tips to maintain our ideal body weight.
Tips For Better Health
To ensure that you are including a health food in diet remember these points
Certain foods are also labeled as ‘health food’ as they are specially fortified with various nutrients. These fortified foods are often rich in vitamins and minerals, but it is very important to read the product label and decide according to ones requirement before its consumption.
The need for any dietary supplements is nil if an individual is on a balanced diet and includes variety of healthy foods in meals.
How Many Calories In Black Grapes?
|Black grapes, or seedless grapes, are very healthy fruits. Black grapes calories come along with a lot of nutrition as well. A single grape gives you 64 calories, 0.3 grams of fat, 16.5 grams of carbohydrates, 0.6 grams of proteins, and 2 mg sodium. All these nutrients make black seedless grapes extremely nutritious and healthy, while the black grapes’ calorie content remains low. |
Though these black grapes are seedless, they have high soluble fiber content. Most people consume these grapes during their lunch time and when eaten with other foods, the nutritional value goes higher. Although not especially considered a diet food, black seedless grapes are extremely nutritious as well as delicious.
Is Chikoo Good For Diabetes?
A native of Mexico, sapodilla or chickoo is extensively cultivated in South Asia. It is a sweet fruit with numerous health benefits, including its ability to cure dysentery and diarrhea, pulmonary diseases, cough and cold, and other microbial diseases.
What Are The Benefits Of Figs Juice?
|Fig is a sweet fruit which may be eaten raw or consumed as a juice. |
Some of the fig’s juice health benefits are as follows:
• Fig’s juice is rich in carbohydrates and as such, is an instant source of energy.
• One of the other fig’s juice benefits is its ability to maintain the health of the skeletal system on account of its rich calcium content.
• Fig’s juice may also be used to cure arthritis when consumed with goat milk.
• If you want to gain weight, you should consume fig’s juice. You can also use it to supplement over-the-counter bodybuilding supplements.
• Fig’s juice also helps control blood pressure and prevents cardiovascular diseases.
Are Almonds Good For Brain?
|Almonds are a rich source of nutrients and offer numerous health benefits. One of the health benefits of almonds is that almonds are good for the brain. This is because they have certain chemicals like phenylalanine, which easily pass the blood-brain barrier and help in the secretion of mood elevating hormones. These hormones are adrenaline, noradrenaline, and dopamine. |
Moreover there is also mounting evidence on the effectiveness of almonds for brain power. Almonds promote the secretion of chemicals like riboflavin and L-carnitine, which in turn help enhance memory. Almonds also enhance intelligence levels and regulate the overall health of the nervous system.
Are Beetroots Good For Diabetics And Skin?
|Beetroot is a rich source of carbohydrates, proteins, minerals, vitamins, fiber, and certain pigments. It may be consumed raw, as part of a salad, or cooked as a vegetable. Beetroot helps prevent and cure a variety of skin diseases. It also prevents dryness of the scalp and dandruff.|
The effectiveness of beetroot for skin benefits lies in its ability to reduce skin inflammation, prevent breakouts of pimples, pustules, and acne, and cure boils. The pigments in beetroot also help enhance skin complexion. It also prevents and cures anemia, kidney and gall bladder stones, and digestive and circulatory disorders.
However, there is no evidence that the consumption of beetroot for diabetics has any effect on the condition.
|Submitted on January 16, 2014|
|
Compressed natural gas (CNG) offers clean, domestically produced alternative fuel option. Using these fuels in natural gas vehicles increases energy security and can lower emissions. Some of the benefits of these are as follows:
- Natural Gas (CNG) can give almost 50% savings over petroleum products such as gasoline and diesel fuel.
- It is the cleanest burning transportation fuel in the market today.
- CNG burns cleaner than petroleum based products because of its lower carbon content.
- Natural gas vehicles show an average reduction in ozone-forming emissions of 80% compared to gasoline vehicles.
|
Posted on 08 Apr 2020
As the number of confirmed COVID-19 cases worldwide surpasses 1.3 million, the risks posed by the pandemic – not just from the global health perspective, but also from an economic, development and security outlook – are exposed more and more each day.
This week’s accompanying policy brief and podcast explore the worrying increase in cybercrime witnessed across the globe. Hackers are taking advantage of the uncertainty caused by the pandemic, and the sector that is most crucial to containing the spread of COVID-19 is perhaps also the most vulnerable to ransomware attacks: healthcare. At the same time, our increasing online presence is exposing us to new threats.
Last week’s #CovidCrimeWatch focused on the Latin America region, where gangs are adapting to this new world in which we live, imposing curfews on communities in the absence of strong government action and reorganizing their extortion practices in response to the barriers to trade that have been erected as a result of the disease.
In our third edition of this newsletter, the focus shifts towards the impact of COVID-19 on environmental crime and the illicit wildlife trade. As economies around the world slow down as a result of the coronavirus, what impact does a reduction in demand for certain commodities, such as rosewood or gold, have on illicit economies? We also explore the effect of the pandemic on the global wildlife trade, and the potential implications on trade volumes and market dynamics.
Reuters, 31 March 2020
Accounting for at least 80% of
the world’s rosewood logs, West and Central Africa are the primary source
countries for the endangered species. China is recognized as one of the largest
consumer markets for rosewood, the most trafficked endangered species in the
world. But the outbreak of the coronavirus in the Asian giant was inevitably
going to have an impact on the illegal trade, and reports from Sierra Leone,
one of the countries devastated by the illegal export of rosewood, suggest the
effects are already being seen.
rosewood in China has plummeted in recent times, and this has led to an abrupt
halt in illegal logging in Sierra Leone’s Outamba-Kilimi national park. The
local loggers’ customer base is composed almost exclusively of Chinese
nationals, and as a result of the near-complete standstill in international
travel, they are no longer able to make the journey to the small West African
country to buy the rosewood.
the drastic reduction in demand for rosewood may be a welcome silver lining of
the dark cloud that is coronavirus, it is likely to have a hugely detrimental
impact on the local loggers, whose sole livelihood is the little money they
make from the trade.
Reuters, 31 March 2020
The law of supply and demand is one of the most
rudimentary economic principles, and gold miners in South America and Africa
are feeling the full force of its effect. As a result of a number of government
interventions across the world, the price of gold has collapsed in many places,
such as Zimbabwe and Colombia, leaving subsistence miners high and dry. Now,
COVID-related border closures and travel restrictions are exerting a further impact
on the market, as buyers are no longer able to move the gold into countries in
which they can make a profit from it. Currency controls, such as those imposed
in Suriname, and government-imposed suspensions of artisanal mining, for
example in Mali, are other instances of policies that have pushed the price of
gold down to potentially unsustainable levels. In some countries, informal gold
miners are forced to sell their gold at almost 40% discounts.
There are, however, some who will appreciate
the drop in gold prices. In the first episode of the GI-TOC podcast, The Impact: Coronavirus and
Organized Crime, Marcena Hunter warned that a reduction in gold prices will provide the
perfect opportunity for criminal actors to invest in and stockpile gold until
global markets reopen, when they will then be able to sell the commodity at a
The Guardian, 6 April 2020
The form of
the coronavirus that has led to the pandemic is thought to have originated in a
wet market in Wuhan, where a range of common and exotic animals, both dead and
alive, were sold for human consumption. The Huanan Seafood Wholesale Market was
closed by authorities on 1 January, and a temporary ban on wildlife trade was
announced by the Chinese government shortly afterwards. But the acting
executive secretary of the UN Convention on Biological Diversity has called for
a permanent global ban on markets selling live animals to prevent future
outbreaks of viruses likely to be propagated by wildlife.
However, a ban
on live animal markets across the world may have a devastating impact on the
livelihoods of a huge number of communities, particularly in low-income rural
areas, that rely on the wildlife trade. Such a ban may simply force the
wildlife trade underground, leading to an increase in illegal trade. It is
crucial, therefore, that if a global ban on wildlife markets were to be
imposed, a comprehensive, sustainable strategy is implemented to replace the
source of income upon which millions depend.
Environmental Investigation Agency, 23 March
Following the positive
action taken by authorities in China, as outlined in the previous story, the Chinese
government have included Tan Re Qing, an injection containing bear bile, on a
list of recommended treatments for severe and critical cases of COVID-19. Bile
from various species of bears has been used in traditional Chinese medicine for
over a dozen centuries at
least, but there is no evidence to suggest that it is in any way a cure for the
use of bile drawn from captive animals in China is permissible by law, importing
the substance from other countries is illegal. The consequence is that, by
advocating the use of bear bile as a remedy, the government risks stimulating
demand for the product, which will trigger an increase in the illegal trade in wildlife
products. Furthermore, there is a real risk that, with physical markets shut
down, much of the trade will move online. Indeed, recent reports
suggest this is already the case. Last year, findings from the GI-TOC’s Digital Dangers
initiative suggested that the illegal wildlife trade on online platforms has
been increasing in recent years. The growth in cyberspace usage to market illegal
wildlife poses numerous challenges,
including greater anonymity for traders and bigger challenges around legal
jurisdiction and law-enforcement capabilities.
France24, 1 April 2020
customs authorities have seized approximately six tonnes of pangolin scales and
dismantled a trafficking syndicate. The animal parts, which are commonly used
in traditional Chinese medicine, despite there being no evidence to suggest
they have any therapeutic value, were found in a container at a port near Kuala
Lumpur, hidden among a shipment of cashew nuts.
across the world are rightly focusing their attention on the coronavirus
pandemic, the Malaysian authorities at the same time appear to be committed to
tackling illegal wildlife crime, an increasingly prominent issue given the
likely origins of the virus. Criminal actors involved in the illegal wildlife
trade, as well as the drugs trade and other illicit economies, are likely to
try to exploit distracted law-enforcement agencies, who are ‘looking the other
way’ – not least in certain Asian
countries where paramilitarized police forces are not properly trained to deal
with a pandemic. As examined in the Crime and Contagion
report, the GI-TOC’s network in several regions have already reported
developments to suggest that criminal networks are seeking to leverage the
institutional overstretch caused by the pandemic and are actively using
disinformation to create new markets.
|
Live Online Professional Development Seminar--Enlightened by the Rockets' Red Glare:
The Meaning of "The Star-Spangled Banner"
Enlightened by the Rockets' Red Glare: The Meaning of "The Star-Spangled Banner" An Online Seminar for history, literature and humanities teachers
We think we know "The Star-Spangled Banner." But how many of us realize that Francis Scott Key was not looking at the flag we now revere as the original and that he never set foot inside Fort McHenry? An instant success in 1814, the anthem, or at least its first stanza, opens so many sporting events today that some Americans think it ends with the words "Play ball!" Yet as we anticipate the first pitch or the kickoff, we often fail to pay attention to what our anthem actually says, to its expression of doubt, anxiety, danger, and the difficulty of envisioning a new and unformed republic. And what of the three verses we don't sing? Explore the context and meaning of "The Star-Spangled Banner" to show students how it illuminates Enlightenment thought and America's early struggle to define itself as a nation.
Seminar Leader: Robert A. Ferguson, George Edward Woodberry Professor in Law,Literature, and Criticism; Columbia University, National Humanities Center Fellow
Send comments and questions to H-Net
Webstaff. H-Net reproduces announcements that have been submitted to us as a
free service to the academic community. If you are interested in an announcement
listed here, please contact the organizers or patrons directly. Though we strive
to provide accurate information, H-Net cannot accept responsibility for the text of
announcements appearing in this service. (Administration)
|
Transient tachypnoea of the newborn (TTN) is one of the commonest causes of respiratory distress in newborns especially in late-preterm and term infants. TTN results from delay in clearance of fetal alveolar fluid after birth (water in the lungs). The management consists of supportive care, with symptoms generally resolving by 24-72 hours of age.
TTN occurs mainly in infants born between 33 - 34 weeks gestational age, although it is also known to occur in infants delivered at term. Risk factors for TTN include caesarean section, delivery before completing 39 weeks of gestation, maternal diabetes, maternal asthma, male gender, and small or large-for-gestational age baby.
Fetal lung fluid is essential for normal lung development and is secreted by lung epithelium. A few days prior to the onset of labour, lung fluid production decreases. During labour, maternal epinephrine and glucocorticoids stimulate absorption of alveolar fluid. “Vaginal squeeze” only accounts for a fraction of the fluid absorption. TTN results from disturbance in the mechanisms responsible for fetal lung fluid clearance.
|
Difference Between Sugar and Sweetener
Sugar vs. Sweetener
Sugar is the term by which easily metabolized carbohydrates are known. The various kinds of sugar are known as sucrose or sachharose (household sugar), lactose (milk sugar), fructose (fruit sugar), maltose (malt sugar) and glucose (dextrose). Sugar is an edible crystalline substance that is derived from sugarcane or sugar beet. Sweeteners are additives that are incorporated in foods for adding sweetness. In fact, sweeteners may be natural or artificial and are used as substitutes for sugar. Sugar forms the main ingredient in candies and when consumed in excessive quantities, it may lead to obesity, tooth decay and diabetes. Sweeteners are ingredients that are generally not approved by accreditation boards and states.
The European Union approves sweeteners like acesulfame K, cyclamate, aspartame, thaumatin, saccharin and neohesperidine. These are used as table top sweeteners and are generally free of calories. Sugar or its substitutes are not free of side effects, though. Sugar substitutes are also known as polyols. In intense sweeteners, there is practically no calorie content present. Sweeteners are free of calories and sugars have about 2.4 kilo calories of content present. Sweeteners are also often sweeter than sugar or sugar substitutes. Generally, polyols are not as sweet as ordinary sugar; sweeteners are intensely sweetening, sometimes going up to 450 times than that of sugar.
Sweeteners are not good for your teeth as they counter the acid forming bacteria inside the mouth which rejects them as nutrients. There are certain classes of ‘friendly’ sweeteners that sweeten your food, at the same time taking care of your dental well being. Sugar also has its potential disadvantages, one of them being its laxative effect which means that it should not be consumed excessively. If you are diagniosed with diabetes, you need to cut down on your sugar intake, although sugar itself does not lead to diabetes. While your doctor may ask you to cut down on sugar, artificial sweeteners may help as they are low in calories.
1. Sugar refers to easily metabolized carbohydrate; sweetener is an additive that is added to foods for the sweetening effect
2. Sugar in all its forms does not require authentication; sweeteners need to be approved by an accreditation body or the EU
3. Sugar is caloric, while sweeteners can be caloric or non caloric in nature
4. Intensive sweeteners are prepared by synthetic procedure and provide little or no energy whatsoever; sugar substances eliminate the crucial minerals from your diet
Search DifferenceBetween.net :
Email This Post : If you like this article or our site. Please spread the word. Share it with your friends/family.
- Difference Between Equal and Splenda | Difference Between | Equal vs Splenda
- Difference Between Butterflies and Moths | Difference Between | Butterflies vs Moths
- Difference Between Cell Wall and Cell Membrane | Difference Between | Cell Wall vs Cell Membrane
- Difference Between Gherkins and Pickles | Difference Between | Gherkins vs Pickles
- Difference Between Iams and Eukanuba | Difference Between | Iams vs Eukanuba
- Difference Between Ice Cream and Frozen Yogurt | Difference Between | Ice Cream vs Frozen Yogurt
Leave a Response
|
Definition of cranage in English:
1The use of a crane or cranes: [as modifier]: excellent cranage facilities
More example sentences
- Although the weather conditions were unpleasant, the berth was well sheltered and there was excellent access for all cranage and lorries.
- Expensive new cranage would be required, since the existing cranes were incapable of reaching the unloading rates acceptable for larger ships.
- The company has quit the warehousing, cranage and stevedoring industry and there are now seven crane firms operating at the port.
Words that rhyme with cranagedrainage
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
"THE BREEDING OF SALT PEETER"
"The townesmen [selectmen] in every towne shall take order that evry house, or some two or more houses do ioyne [join] together for the breeding of salt-peeter in some outhouse used for poultry, or the like, and give them direction about the same; and every towne wch shall neglect the execution of this order before the last of the first month next, [March 31, 1643,] shall forfeit 20s ; evry family so appointed, that shall faile therein, shall forfeit for evr y month so failing 12d; and [they are] to let them know that such peeter as shalbee raised by this meanes shalbee to the publique use; but the owners shall have a due price for the same."
William Eastow was appointed "to have the charge of looking to this order" in Hampton.
Hampton was fined 20s for failing to comply with the provisions of this law, though the fine was afterwards remitted on condition that the town should provide "peeter-houses," for the future.
A rate of £800 was ordered to be raised in the colony, payable in November. The proportion for Hampton was £5. By an order of the court, payment might be made in beaver, money or wampum; or in any of the following articles, at the prices specified, viz., wheat and barley at 4s per bushel; rye and pease at 3s 4d, and Indian corn at 2s 6d.
William Palmer was chosen woodreeve, May 4, 1644, in place of William Wakefield who removed from the town about this time. The term, woodreeve, is here used as synonymous with woodward, an officer whose duties have already been mentioned.
At another meeting there were granted to John Wedgwood two acres of meadow "all next the hether side of the Great Pond neere that which was sometimes Will : Wakefield's meadow -- if it be there to be had -- all wayes reserveing ways to the fowling pond." From this reservation - and it is not the only one of the kind - it may be inferred that the practice of fowling, or gunning, for which Hampton is somewhat noted, was commenced at a very early date. There are certain localities in the town, which were favorite resorts for different kinds of fowl, and which continued so for many years, till the frequent visits of the fowler, in the pursuit of game, rendered these haunts entirely unsafe. As to the profit or loss to those who have been in the habit of gunning here at any time during the present century, there is but one opinion among those whose judgment has not been warped by the excitement and fascination of the employment. That it was less unprofitable many years ago, is very probable.
|
Marion Rudy was the inventor of the world's first shock-absorbing sole system for athletic footwear. This breakthrough, which became the popular Nike "Air" system, allows shoes to cushion heavy impact forces and to temporarily store and return impact energy in the space of each stride. They revolutionized the running shoe industry. Rudy worked as an aerospace engineer and spent a portion of his career at NASA where he worked on the Saturn and Apollo rocket engines.
By jdubble07 @ 2010-08-01 07:49:27
|
Think climate change is just a problem affecting coral reefs or people living in low-lying Pacific islands? Think again…
A new series of documentaries being launched on 25 February will look at how climate change is going to affect Cornwall, but also offer inspirational stories about the great projects happening around the county to tackle it.
The films, made by the charity Cornwall Climate Care will tell stories across a range of themes including housing, energy, transport, farming and health, and will be made available online, for community screenings and for schools.
The first film, Under the Surface, focuses on Cornwall’s marine environment and how, without many of us even noticing, climate change is already affecting species that depend on the sea for their survival.
One of the positive stories featured focuses on the company ARC Marine, set up by divers James Doddrell and Tom Birbeck to repair some of the damage they often came across in marine habitats, caused by bottom trawling and underwater construction.
Their company is making carbon neutral reef cubes as a nature inclusive design option for restoring devastated reefs, and as an alternative to the carbon intensive concrete blocks usually used to protect underwater infrastructure. This could be hugely important as the UK aims to massively expand its offshore wind farms.
The cube arrangements, which when submerged quickly become a safe haven for huge numbers of marine fauna and flora, are also being trialled as a means of protecting our coasts from increasing storm damage, as well as for propagating corals and mangroves to help restore tropical reefs and islands.
Each 30-minute episode of Cornwall’s Climate Stories is presented by a different relevant person, and this one is narrated by Claire Wallerstein, who spent eight years running the Cornish beach-cleaning group Rame Peninsula Beach Care (RPBC).
The film follows her as she interviews marine experts studying creatures ranging from tiny plankton up to grey seals and basking sharks – and learns that the success of groups such as RPBC in highlighting the issue of marine plastic pollution may have had an unintended consequence.
Claire said: “There’s so much awareness nowadays about the need to tackle plastic pollution – and rightly so. It is a huge problem and causes such obvious harm. But it’s only one part of the bigger and more complex issue of climate change, which doesn’t seem to get so much attention.
“People may not think of climate change being much of a problem in Cornish seas. But what I found while making this film was that dramatic and surprising changes are happening right under our noses here too.”
Film director Bryony Stokes said: “Cornwall will be first in line to experience many of the impacts of climate change – from more severe Atlantic storms to sea level rise and eroding coasts. But what people may not know is that it is also blazing a trail for the rest of the country in the fight against climate change.
“There’s a huge range of exciting and pioneering work happening here – from the world’s first electric ferry to geothermal energy plants, from a project to turn cattle slurry into green fuel to the replanting of seagrass meadows and reintroduction of beavers to help prevent flooding.
“Businesses, communities and scientists all across Cornwall are doing incredible things to face up to the challenges coming our way. We hope these stories will give people a feeling of pride and hope – and motivate them to help tackle the climate crisis too.”
One key aim of the charity is to make its films available to all local secondary schools, along with teaching materials and resources.
A recent survey by the charity Teach the Future found that just four percent of pupils felt they knew a lot about climate change, while 75 percent of teachers said they did not have adequate training to teach this subject.
Watch the first film (from 26 February onwards) on the Cornwall Climate Care website.
|
The world’s northernmost capital city, Reykjavik, Iceland, resides on geologically young land. Straddling the mid-Atlantic Ridge, Iceland formed about 16 to 20 million years ago as the American and Eurasian continental plates pulled apart. The island’s location means frequent volcanic eruptions and earthquakes, but the same geothermal activity meets the inhabitants&rsquoe; energy needs by providing them with hot-water-powered home heating.
On May 11, 2002, the Advanced Spaceborne Thermal Emission and Reflection Radiometer (ASTER) sensor on NASA’s Terra satellite captured this image of Reykjavik and its surroundings. Resting on a peninsula, the capital city stands out from the nearby landscape thanks to its straight lines, sharp angles, and mostly gray hues. Outside of the city, vegetation appears in various shades of green. As Iceland is geologically young and its climate is cold, sizable plants are rare. Less than one-fourth of Iceland’s land surface has continuous plant cover, and the plants consist mostly of low-growing shrubs. Little of Iceland’s land surface is cultivated, but such areas appear in bright green in and around Reykjavik. A clear example of cultivated land is the meandering, wormlike area south of the city—a golf course.
Lakes of varying sizes dot this coastal area, matching the blue of the nearby ocean. One color missing from this shot is white. Although some snow remained in the nearby mountains in May 2002 (visible in the high-resolution image), not much snow lingered on the land around the capital city. Iceland’s location near the Gulf Stream gives it a milder climate than its name implies.
|
- A mobile phase sweeps a mixture over a stationary phase:
-Stationary phase is fixed.
-Mobile phase moves in one direction.
- Chromatography works on the basis that different components have different affinities for both the stationary and mobile phase.
-The stationary phase interacts and slows components down.
-Allowing different components to move at different speeds and thus seperate.
- In TLC the stationary phase is a solid, the mobile a liquid.
- In GC the stationary phase is a liquid or solid, and the mobile a gas.
- A solid stationary phase seperates by adsorption, where the component molecules bind with the stationary phase on the surface.
- A liquid stationary phase seperates by relative solubility, some dissolve more in the phase and are thus slowed more than those which are less soluble.
1 of 12
- The stationary phase is a thin layer of an adsorbent such as silica gel on a TLC plate.
- The mobile phase is whatever solvent is suitable for the components.
- Producing the chromatogram:
-A small sample is dissolved.
-The solvent rises up the TLC plate and they seperate by adsorption.
-This it the chromatogram, from which Rf values can be calculated.
(The spots of components may be coloured, or require a chemical or UV revealing agent)
- Rf values are calculated:
Rf = Distance moved by component / Distance moved by solvent front
-Similar components may have similar Rf values.
-Unknown compounds have no Rf value to reference.
-It's difficult to find a univeral solvent.
2 of 12
- The stationary phase is a thin layer of solid or liquid coated on an inert solid support, this tubing is 30m long and is called the chromatography column.
- The mobile carrier gas is inert such as He or N is used.
- Producing the chromatogram:
-The mixture is vaporised and inserted.
-Some components when they move through the tubing slow down more than others due to greater solubility or adsorption.
-Each component leaves at a different time and is detected and timed.
- A graph of retention time is produced:
-Different compounds have different retention times.
-Area under each peak represents the amount of the substance.
-Potentially many compounds have similar retention times.
-Not all substances may be detected.
-Unknown compounds have no reference.
3 of 12
Gas Chromatography - Mass Spectrometry
- GC can seperate compounds but not identify solidly.
- MS can identify but not seperate.
- GC-MS is used by the GC seperating the compound and moving it to the MS, where it detects and produces a mass spectrum for analysis.
- GC-MS is used in:
4 of 12
Nuclear Magnetic Resonance
- Chemical shift is the place in an NMR spectrum where the nucleus absorbs energy.
- Chemical shift is measured relative to TMS, as it produces one, sharp signal which is set at 0ppm.
- It is chemically unreactive and volatile for easy removal.
- The use of CDCl3 is for a solvent for NMR spectroscopy, when running both C13 and proton spectroscopy; as it produces no signal.
5 of 12
- This is a C13 shift to show the different delta shifts of C's in differing environments.
- The most important things when analysing a C13 NMR spectra are:
-The number of C environments, shown by number of peaks.
-The types of C environments, shown by delta shifts.
- This can only be practiced through viewing NMR spectra and deducing which peaks represent which environment by analysing delta shift...and then deducing the molecule.
6 of 12
- Only half decent diagram of C13 spectra I could find, just an example.
7 of 12
- A proton NMR chemical shift diagram, you will recieve this in an exam.
- NMR spectra read the same way as before but also:
-The relative peak areas gives proportion of H's.
-Spin-spin coupling gives information about adjacent H's.
- Integration traces on a NMR spectra can be used to work out ratio of H's (1:1 etc.)
- The splitting on an NMR spectra is due to spin-spin coupling, used to find the number of protons on adjacent C's.
8 of 12
Proton NMR (Cont.)
- On a proton NMR spectra there is something called the +1 rule, which means that for every peak there is one more peak than there is a H on adjacent H's.
-Singlet = 1 peak due to no adjacent H's.
-Doublet = 2 peaks due to one adjacent H.
-Triplet = 3 peaks due to 2 adjacent H's
-Quartet = 4 peaks due to 3 adjacent H's.
- Again this requires practice to wholly understand.
- -OH/-NH do not split, they are a singlet and C=O shield any H's from the spectra.
- A D2O shake is used to remove any peaks caused by -OH and -NH, because the H is replaced by D.
9 of 12
10 of 12
NMR In Medicine
- Is used to relieve pain and combat disease.
- It is used in MRI scanners to produce a view of a patient's insides.
- They are less harmful than x-rays but can't be used by someone with a pacemaker etc.
- It is worthwhile to read up on this a little bit.
11 of 12
- All I can stress is to practice as much as you can with past paper questions and learn all the techniques to make analysis easier.
- Some of the end questions in papers include analysis that involves GC-MS, infrared and NMR.
- Good luck with your studies.
12 of 12
|
Why would you do this?
We have been keeping bees for a few years in two different Texas locations -- Gulf Coast and Central. Like many beekeepers, especially beginners as we are, we have had a high amount of hive losses. Some of these losses have been very easy to identify. For example in the Gulf Coast the invasion by tropical fire ants (Solenopsis geminata) has been devastating to many desirable species -- and they definitely do kill new bee hives. Other causes of colony collapse in our hives have been hard for us to diagnose. And even harder to catch early enough to help the hive recover.
We looked at other bee hive monitoring projects and they all provided interesting data, like the number of bees entering and leaving. But we do not know how to translate this to the ongoing health of the colony. Forager bee count data can be strongly influenced by things like climate, temperature, rain, cloud cover, amount of pollen providers, etc. What we hope is that we can initially use hive weight changes to provide a more direct indication of what is going on with the overall colony.
All of this leads to a number of questions that we hope to answer with the data from this project. Some of these questions will be explained in the project log.
How will we do it?
Our hope is that we can create a consistent method of data collection so that it can be shared with other bee enthusiasts and compiled for analysis across many environmental conditions and locations.
On the hardware side our prototype monitors are progressing. We are using as much Consumer Off The Shelf (COTS) items as we can. For the scales we have selected some that have seamless stainless steel tops that roll over the edges to prevent water drip lines. They also have closed bottoms. The key feature is they have a detachable head that contains all their electronics and batteries. Having the power external to the scale platform is vital. You do not want to have to move an active hive to replace batteries.
The original scale head is cut off and replaced with our hardware system. This system consists of input conditioning for the scales and other sensors, the Microcontroller Unit (MCU), the power system, and an external WiFi antenna.
These monitors then send MQTT data packets as clients over their WiFi connection to the local network. In a remote location we have a Raspberry Pi that acts as an MQTT broker and general server. This server also contains an Ifluxdb database instance for data logging. Grafana also runs on the server to display the data.
We have also set up a free test account with Adafruit.io (Many thanks Adafruit for doing this for the community!). This will allow us to mirror the data to Adafruit and have remote access to it without having to configure routers, write firewall rules, etc. Once complete we can share the data in the public cloud(s).
Future enhancements may be to use a LoRa gateway to enable the hives to be monitored further than WiFi can conveniently reach. We are also considering a mesh WiFi approach using an ESP8266 intermediate repeater, but this is less desirable due to the "bowtie" effect and requirement for additional solar/battery power system.
What is your approach?
To date we have been making progress on the prototype systems. We have a simple mechanical arrangement to keep the hives on the scale platforms, protect the scale, and keep the whole arrangement solid and level. We have tested a number of sensors, displays, modules, and ESP8266 development boards. This has led us to our current configuration. We are now integrating everything and beginning work on the mechanics of enclosures, weather resistance, etc. We are building and testing the implementation as we go. There are many items left to program, build, test, and correct before a robust, reliable system is working. That process is what we expect to detail in the project log.
|
reports on a sad accident as the result of game played by school children on the Åland Islands
. The children were playing a variant of poker, where each loser was required to take a forfeit: drinking a glass of water.
During the course of the game, the child who later died consumed some six liters of water (nearly 13 pints). The child was a from the town of Nystad in Finland.
After the game had long-finished the teachers in charge did not notice that the girl was suffering from water intoxication until they undertook a routine headcount. The girl later experienced nausea and vomiting, according to Topix
The girl was rushed into hospital on the island and then later transferred to the Uppsala University Hospital
on the Swedish mainland. It was at the hospital in Sweden that the girl died, and was declared brain dead.
According to About Chemistry
, over consumption of water can alter the salt balance in the bloodstream. The effect is to draw water into the brain, which cuts off the booed flow to the brain, leading to brain death.
Johan Valtysson, head of the intensive care ward at the Uppsala hospital, is quoted by UPI
as stating that water poker is "a truly dangerous game."
|
Halogen facts for kids
The halogens are chemical elements under the second-to-right column in the periodic table, also known as Group 17. The elements in the group are fluorine, chlorine, bromine, iodine, astatine, and ununseptium. Halogen literally means "salt becomer", but it is often cited to mean "salt producer". They are very reactive, so they are likely to join with other elements on the left side of the periodic table to make compounds. This is due to the fact that they are missing one electron. They are rarely found alone in nature, except astatine, which is not found in nature. Fluorine is the most reactive, while iodine is the least reactive. Astatine is very radioactive and hard to get.
Both chlorine and bromine are used as disinfectants for drinking water, swimming pools, fresh wounds, spas, dishes, and surfaces. They kill bacteria and other potentially harmful microorganisms through a process known as sterilization. Their reactivity is also put to use in bleaching. Sodium hypochlorite, which is produced from chlorine, is the active ingredient of most fabric bleaches, and chlorine-derived bleaches are used in the production of some paper products. Chlorine also reacts with sodium to create sodium chloride, which is table salt.
Halogen lamps are a type of incandescent lamp using a tungsten filament in bulbs that have a small amounts of a halogen, such as iodine or bromine added. This enables the production of lamps that are much smaller than non-halogen incandescent lightbulbs at the same wattage. The gas reduces the thinning of the filament and blackening of the inside of the bulb resulting in a bulb that has a much greater life. Halogen lamps glow at a higher temperature (2800 to 3400 kelvins) with a whiter color than other incandescent bulbs. However, this requires bulbs to be manufactured from fused quartz rather than silica glass to reduce breakage.
Images for kids
Halogen Facts for Kids. Kiddle Encyclopedia.
|
This mortarium rim was excavated from the recent excavation on the site of the Roman fort at Dwr-y-Felin school, Neath (Nidum). The mortarium (a bowl for grinding and mixing food) was found within the intervallum area of the fortress that contained the camp ovens (the intervallum is the area within a Roman fortress that lies between the rampart and the barrack blocks). A roadway (the via sagularis), that extended around the inner circuit of the fortress, and the latrines can also be found within the intervallum area.
The letters S and N can clearly be seen on the maker’s stamp. It is likely that this stamp can be attributed to Secundus who was known to have worked in the Verulamium region (St. Albans), around the 1st century AD. A similar stamp was found during excavations in the 1980s at the Roman fort in Loughor (Leucarum).
|
What causes mental health conditions?
Mental health conditions during pregnancy and early parenthood can affect anyone, regardless of your background. Depression, anxiety and other mental health conditions usually don’t have one definite cause – something we can point to and say ‘that’s the issue'.
Instead, they’re likely to develop as a result of a combination of challenges or ‘risk factors’ and a lack of support or ‘protective factors’. Risk factors often include longer-term issues you might have been dealing with for a while, as well as more immediate ones related to giving birth and becoming a parent.
As part of your pregnancy and postnatal care, health professionals may ask you questions about the following issues so they can provide support if you need it:
- personal or family history of mental health conditions or current mental health conditions
- current alcohol and/or drug use
- how much practical and emotional support you have available
- current or past history of abuse (e.g. physical, psychological, sexual)
- difficult or stressful life events (e.g. previous miscarriage or stillbirth, loss of job, moving house, homelessness).
If there’s a specific issue or challenge that’s worrying you or you need extra support, don’t wait to be asked. You can start the conversation by explaining your situation and what’s going on for you.
Stresses during pregnancy and early parenthood
Getting used to being a parent can be hard work – and that’s if everything goes smoothly. Throw in a colicky baby, difficulty sleeping or recovering from a complicated birth and you could find yourself feeling pretty stressed out. If you’re dealing with a number issues over a period of time, keep an eye on your moods and seek support if you need it.
Factors that can increase stress
- a stressful or unplanned pregnancy
- obstetric complications in the past, including fertility problems
- a very long labour and/or complicated birth
- severe baby blues after the birth
- an anxious, perfectionist personality or being a 'worrier'
- low self-esteem and being self-critical
- difficulty with breastfeeding
- a premature baby or problems with your or your baby's health, including separation issues
- continuing lack of sleep or rest
- an unsettled baby (e.g. problems with feeding and sleeping)
- being a single parent
- being a teenage parent
- being the parent of more than one baby (e.g. twins or triplets).
This doesn’t mean that every new parent who faces challenges will develop a mental health condition – different combinations of risk factors affect us in different ways, and protective factors can strengthen our mental health and improve our resilience.
If we think about risk factors as the negative things that can chip away at our mental health, protective factors are the positive things that build us up and give us the skills and support to deal with challenges.
- Strong support networks – family, friends, community, other new parents
- Positive sense of identity and cultural heritage
- Being physically healthy and taking care of yourself – exercising, eating well, reducing stress where you can
- Good coping and problem-solving skills
- Optimism – a belief that life has meaning and hope
- A positive attitude to support seeking
- Access to support services
|
(also ferox trout)
Definition of ferox in English:
A brown trout of a very large variety, occurring in large deep lakes in NW Europe.
- Basically the ferox is a brown trout that has over millennia developed a quite distinct lifestyle.
- The large ferox trout patrol the deeps and there are shoals of smaller trout in the deeps also.
- Surrounded by an aura of mystery and legend, the mighty ferox trout that inhabit the deepest and darkest of our Highland lochs are arguably the most elusive and sporting quarry available to Scottish rod anglers.
Mid 19th century: from modern Latin Salmo ferox, literally 'fierce salmon', former name of the variety.
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
BSL Sign Language Dictionary
Search and compare thousands of words and phrases in British Sign Language (BSL). The largest collection online.
sum of money
How to sign: a quantity of money
"he borrowed a large sum"; "the amount he had in cash was insufficient";
Similiar / Same: sum, amount of money, amount
Within this category: advance, cash surrender value, contribution, coverage, deductible, defalcation, figure, gain, loss, payroll, peanuts, purse, purse
Sign not right? Or know a different sign?
Upload your sign now.
|
Not everyone can agree what differentiates the two, but generally web sites are more about displaying static (unchanging) content and web applications require a "smart" server running code (that you're going to learn to write) to produce dynamic content.
For an analogy, we'll borrow from Noah Veltman and use the difference between getting food from a vending machine and ordering from a restaurant.
Think of visiting a static web site as buying a candy bar from a vending machine. The food is just sitting there waiting for you. There's really no difference between you or anyone else who orders it. You make the request from the available options and the food appears.
As an example of a static website, check out Piccola Italian... it's just a random site we found on Google and it should look a lot like the others you've seen before. Note that you can click through from one page to the next but the pages are the same every time. It doesn't matter whether it's me or you clicking and whether we do it today or tomorrow or if we want to see anything different.
Going to a site run by a web application is more like ordering from a real restaurant. You still order from the menu but the kitchen cooks it special for you each time. You can also request certain changes (e.g. "hold the onions") that you couldn't from a vending machine.
In the real world of web applications, the web server runs some code which acts like the kitchen in the restaurant. It takes orders for web pages, cooks up a new one based on what you told it you wanted, and then returns it to the browser.
As an example, think about Google.com. Their search results are completely different depending on which query you entered. This is certainly a web application -- you can tell that there has to be something "smart" running somewhere under the surface which is dynamically generating the page we're seeing. You can think of pretty much any site where you're able to interact with it (e.g. by submitting a form) as a web application.
The key takeaway is that "web applications" involve some degree of server-side code in order to work properly whereas "web sites" are usually just fixed HTML files that get served as needed. As a web developer, the days of building simple static sites for clients are long gone so you'll be building almost exclusively web applications during your career. The server-side code which makes those web applications run is what you'll be learning here during your study of web development.
As a final note, despite the differences between websites and web applications that we highlighted above, the terms are actually used pretty interchangeably (since pretty much everything's dynamic these days anyway).
For those paying attention, the restaurant site we looked at above actually does have some dynamic elements -- there is a submission form which would require some server-side code to run. But most of the site is very static nonetheless :)
|
Sudoku (数独 sūdoku) (sometimes spelled as Su Doku, but also called Number Place or Nanpure) is a puzzle that is very popular in Japan.
Sudoku puzzles are solved by logic and no math is required. It consists of a grid which is usually made up of nine rows, nine columns, and nine boxes that are separated by thicker, darker lines. To solve the puzzle, a person must fill in all the empty squares without using the same numeral twice in each column, row, or box, and without changing the numerals that are already in the grid.
We have prepared a Sudoku for National Numeracy Day for you to download and print for free. The download has both an easier and a more trickier version for those who like a challenge!
|
Domestic Violence is the term used for repeated use of violent and abusive tactics to maintain power and control over the other person in a relationship. Examples of domestic violence include the following:
♦ physical abuse (eg pushing, hitting, slapping, choking or injuring with objects or weapons)
♦ verbal abuse (eg screaming, shouting, name calling, using sarcasm, criticism or put downs)
♦ emotional or psychological abuse (eg any behaviour that threatens, intimidates or humiliates – destroying property, reckless driving of a vehicle with the victim in the car, threatening to injure or kill the victim, threatening suicide, or self harm so as to intimidate, frighten or control the victim)
♦ sexual abuse (eg any forced or unwanted sexual contact or activity)
♦ controlling behaviours (eg dictating what the victim does, who she sees and talks to, where she goes, preventing her from working or having any money of her own, preventing her from having contact with family or friends, reading texts or emails, or using GPS to track the victim’s movements)
♦ economic or financial abuse (eg withholding or threatening to withhold money, being refused or denied access to money resulting in the victim being financially dependent on their partner)
♦ spiritual or cultural abuse (eg ridiculing or putting down the victim’s beliefs and culture, preventing her from practising her religion or from participating in significant cultural ceremonies)
♦ stalking (eg worrying or frightening the victim by repeatedly watching her, following her, making persistent phone calls, sending texts, emails or mail)
If you are experiencing domestic violence or have fears for your safety or your children’s safety, we recommend you consider making a safety plan. You should also protect your digital safety.
If your spouse has been violent towards you, you may be able to get an order under the Domestic and Family Violence Protection Act which orders your spouse to leave the home. You may also be able to get an exclusive use and occupation order and/or a restraining order from the family law courts. If you are renting, you may also be able to apply to the Queensland Civil and Administrative Tribunal to be recognised as a tenant instead of your spouse.
The main way of getting legal protection from domestic violence is to apply to the Magistrates Court for a protection order under the Domestic and Family Violence Protection Act.
To obtain a protection order, you must be able to show to the court the following:
♦ there is a relevant relationship. Relationships include spousal relationship, intimate personal relationship, family relationship and informal care relationship
♦ there has been a past act of domestic violence (eg wilful injury, damage to property, intimidation or harassment, indecent behaviour, threats to injure you or damage your property)
♦ an order is necessary or desirable
Emotional or Psychological Abuse
Economic or Financial Abuse
Spiritual or Cultural Abuse
|
Definition of haemostasis in English:
noun[mass noun] Medicine
The stopping of a flow of blood.
- The evolving understanding of the body's response at the molecular level continues to reveal common pathways between infection, inflammation, and hemostasis.
- At the junction of the flowing blood and extracellular space, the endothelium is a dynamic organ that modulates local hemostasis, cell trafficking, and microcirculatory blood flow.
- The procedure requires meticulous dissection and exhaustive hemostasis to prevent damage to adjacent structures.
- Example sentences
- This platelet release reaction and aggregation lead to the recruitment of many other platelets to the vessel wall with the formation of a hemostatic platelet plug.
- These patients may warrant periodic review of hemostatic parameters, especially platelet counts.
- However, how much these changes contribute to poor post transfusion survival and haemostatic function of platelets need to be investigated.
Definition of haemostasis in:
- US English dictionary
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
What Happened During The Cambrian Period?
We had mentioned earlier that it is now thought that Allah created the universe in the big bang. The whole universe, planets, stars and our own earth were formed after this enormous explosion.
To begin with, there were no livings beings on our planet, but then Allah created all living things on earth; birds, insects, trees, flowers, fish, tigers, butterflies, elephants and giraffes etc.
Well, do you know when the first living creatures appeared? This happened during the period called the Cambrian about 500 million years ago. The first creatures that lived during this period were ones like snails, worms and starfish. The creatures that lived during the Cambrian period also prove that the theory of evolution is completely wrong. How come?
These creatures appeared all of a sudden during the Cambrian period. Before them, no other living beings existed on the planet. The fact that these creatures appeared out of nowhere and all of a sudden is proof that Allah created them in an instant. If the theory proposed by evolutionists were right, then these creatures must have evolved gradually from simpler ancestors. However, these creatures have neither ancestors nor any transitional forms that lived before them. No fossil hunter (palaeontologist) has ever come across such a transitional form. Fossils show us that these creatures—just like all other living beings—suddenly appeared during the Cambrian period, without any features missing, and with no ancestors from whom they evolved. That is, Allah created them. Furthermore, these creatures that lived during the Cambrian period had very special features. For example, there used to be a creature called the trilobite that lived during the Cambrian period, but we do not see them now because they are extinct. The Trilobite had very complex but perfect eyes. Its eyes, as you can see on the right, were made of hundreds of honeycomb-shaped cells and these cells allowed it to see very clearly.
Do you think that a creature like this could just appear out of nowhere? If your little brother came to you and said, "I was sitting at the table last night and out of nowhere a fly appeared in front of me. I don't know where it came from but all of a sudden, it was produced there by chance. It had very interesting honeycomb-shaped eyes. But these were probably made by chance too."
The trilobite, one of the earliest creatures on earth, had a very complex eye structure. Its perfect eyes are one of the proofs that Allah created it.
What would you think at such a moment? Probably you would think that your brother is too small to realise the complicated nature of life. However, what is so strange is that evolutionists say that these creatures suddenly appeared in the seas. The eyes of flies today are very similar to the eyes that these creatures had. In that case, evolutionists are clearly wrong. Because they are so proud and arrogant, they do not want to admit that Allah has created all living things. They constantly fabricate stories, imaginary scenarios, and what are fairy tales to cover up the truth so that people move away from Allah.
The strange creatures that evolutionists claim once existed.
|
Some of the information about ancient Egypt contained in the Qur’an reveals historical facts that had remained hidden until only recently. These facts show that there is specific wisdom in every word of the Qur’an.
One of the people referred to in the Qur’an alongside Pharaoh is "Haman." Haman is described in 6 verses of the Qur’an as one of Pharaoh’s close retinue.
This information in the Qur’an was confirmed by archeological discoveries made centuries later:
Until the 18th century it was impossible to read monuments and inscriptions written in the language of ancient Egypt. Because that language was written in hieroglyphics and had been forgotten many centuries before.
Ancient Egyptian hieroglyphics were deciphered in 1799, with the discovery of a monumental text dating back to 196 AD, called the Rosetta Stone. With the decipherment of hieroglyphics, one very important piece of information came to light: The name "Haman" really did appear in ancient Egyptian texts. In addition, the same test stressed Haman’s close proximity to Pharaoh.
In the dictionary of People in the New Kingdom, based on the entire collection of inscriptions, Haman is said to be "the head of stone quarry workers."
In the Qur’an, there is a verse that describes how Pharaoh asked Haman to build a tower, and this is in full agreement with this archeological discovery:
I seek refuge in Allah from the accursed satan
Pharaoh said, "Council, I do not know of any other god for you apart from Me. Haman, kindle a fire for me over the clay and build me a lofty tower so that perhaps I may be able to climb up to Moses’ God! I consider him a blatant liar." (Surat al-Qasas, 38)
The finding of the name of Haman and his profession in ancient Egyptian writings once again revealed that the Qur’an was sent down from the Presence of Allah. The Qur’an has miraculously handed down to us historical information that could not have been known or obtained during the time of our Prophet (saas).2013-01-11 09:24:52
|
5 to 6 - year - old children's art appreciation activities aesthetic empathy research
|School||Nanjing Normal University|
|Keywords||5-6 year old children aesthetic empathy type characteristic of aesthetic empathy mechanism of the aesthetic empathy|
This work aims at studying the phenomenological description, types, characteristic and mechanism of the aesthetic empathy of 5-6 year old children. Our methodology is based on the fundamental principles of the phenomenology, hermeneutic and semeiology. For the samples in this study, the data were mainly collected by the purposefulness sampling, interview and inspection method of qualitative research.According to the understanding procedure of children on artistic work, we describe the aesthetically empathetic phenomenon of children as following: while viewing an artistic work, the child tends to project the volition, personality, emotion and thinking onto it under the affection of his (her) selfhood, which results in the formation of empathic image in their brain, consequently, child feels the aesthetical joviality under the interaction of these empathic images. In this study, we differentiate two kinds of the aesthetical empathy, the empathy that developed from substance to selfhood and the empathy that emerging from selfhood to substance. The aesthetic empathy of children is instinctive and has the characteristic of equating in selfhood with substance. The formation mechanisms of aesthetic empathy are isomorphism, association, inner-apery (Innere Nachahmung) and the interaction of mood.We proposed several teaching technologies according to the formation mechanism and characteristic of the aesthetic empathy of 5-6 year old children. The artistic work chosen for children appreciating should be according with the life experience and willing of child, rich in emotional representation, ’undefined and blank for imaging’. The teacher should provide sufficient art-appreciating opportunities to children and be a good intermediate between children and artistic work.
|
January 30, 2003
Good morning, Mr. Chairman and members of the Committee.
I am Dr. Julie Gerberding, Director of the Centers for Disease Control and Prevention (CDC) and Administrator of the Agency for Toxic Substances and Disease Registry (ATSDR).
Thank you for the opportunity to testify today about the efforts underway to assure the nation is prepared in the event of an attack using smallpox virus as a weapon.
Smallpox is a serious, contagious, and sometimes fatal infectious disease. There is no specific treatment for smallpox disease. Prevention strategies involve vaccination of exposed or potentially exposed individuals. Smallpox outbreaks have occurred from time to time for thousands of years, but the disease was eradicated after a successful worldwide vaccination program. The last case of smallpox in the United States was in 1949. The last naturally occurring case in the world was in Somalia in 1977.
Regardless of the mode, magnitude or duration of any terrorist attack, smallpox would be expected to spread from person to person following its introduction. Much is known about the natural transmission of smallpox. Generally, direct and fairly prolonged face-to-face contact is required to spread smallpox from one person to another. Smallpox also can be spread through direct contact with infected bodily fluids or contaminated objects, such as bedding or clothing. Rarely, smallpox has been spread by virus carried in the air in enclosed settings, such as buildings, buses, and trains. Humans are the only natural hosts of variola, the virus that causes smallpox. Smallpox is not known to be transmitted by insects or animals.
The smallpox vaccine is the only way to prevent smallpox. The vaccine is made from a virus called vaccinia, which is another "pox"-type virus related to smallpox virus. The vaccine helps the body develop immunity to smallpox. It was successfully used to eradicate smallpox from the human population. We have had a lot of experience with the smallpox vaccine and know it is very effective: it was used to eradicate smallpox from the world. It is safe in most people, but in some people it is associated with life-threatening adverse events. This risk of serious adverse events has made it more difficult to find the right balance between preparedness and not placing people at risk unnecessarily.
Routine vaccination of the American public against smallpox stopped in 1972 after the disease was eliminated in the United States. Vaccination was stopped because the risk of the vaccine was felt to outweigh the risk from the disease.
Until recently, the U.S. government provided the smallpox vaccine only to a few hundred scientists and medical professionals annually who work with smallpox and similar viruses in a research setting.
The stockpiling of smallpox vaccine was an important priority before September 11, 2001, and smallpox vaccine was already in production at that time. The events of the fall of 2001 heightened concern that terrorists may have access to the virus and attempt to use it against the American public. In response to these events, the Department of Health and Human Services (HHS) increased its order for vaccine, accelerated production, and began working to develop a detailed plan for the public health response to an outbreak of smallpox. The United States currently has sufficient quantities of the vaccine for every single person in the country in an emergency situation.
SMALLPOX RESPONSE PLANNING
A single report of a smallpox case in the United States will require an aggressive outbreak control effort to contain spread of the disease. In partnership with State and Local Health authorities, DHHS/CDC is in the process of establishing a smallpox preparedness and response program that:
Response to an Attack
States need to be prepared to rapidly implement aggressive smallpox containment activities, including the ability to vaccinate their entire populations. On October 28, 2002, CDC issued post-event smallpox planning guidance to the 50 states; the District of Columbia; the commonwealths of Puerto Rico and the Northern Marianas Islands; American Samoa; Guam; the U.S. Virgin Islands; the republics of Palau and the Marshall Islands; the Federated States of Micronesia; and the nation's three largest municipalities (New York, Chicago and Los Angeles County). To date, all 62 jurisdictions have developed plans that are undergoing review by CDC.
In addition, we are also working collaboratively with other nations (Canada, France, Germany, Italy, Japan, Mexico, and the U.K.) in the Global Health Security Action Group (GHSAG) to provide a coordinated and collaborative response to a bioterror event. In particular, we are working closely with Canada and Mexico, as a smallpox outbreak in either could necessitate a rapid response in the U.S.
INCREASING PREPAREDNESS PRIOR TO AN ATTACK
On December 13, 2002, President Bush announced a plan to better protect the American people against the threat of smallpox attacks by hostile groups or governments. This announcement is a vital step in ensuring that we are prepared to respond to a single reported case of smallpox. The President's decision will provide the public health and emergency response system with a cadre of vaccinated individuals who would respond in the event of outbreak of smallpox. The President's announcement identified the need for the public health system to provide smallpox vaccine to the following:
Smallpox Response Teams
HHS has been working with state and local governments to form volunteer state and local Smallpox Response Teams that can provide critical services to their fellow Americans in the event of a smallpox attack. To ensure that Smallpox Response Teams can mobilize immediately in an emergency, health care workers and other critical personnel are being asked to volunteer to receive the smallpox vaccine. Pre-attack vaccination of Smallpox Response Teams will allow them, in the event of a smallpox attack, to immediately administer the vaccine to others and care for victims. In the initial phase of vaccination, vaccine will be offered to core members of public health and health care response teams. Then vaccination will expand to include health care workers and others who may be first responders.
Department of Defense and State Department Personnel
The President also announced that the Department of Defense (DOD) will vaccinate certain military and civilian personnel who are or may be deployed in high threat areas. Some United States personnel assigned to certain overseas embassies will also be offered vaccination.
Members of the General Public
The federal government is not recommending that members of the general public be vaccinated at this time. The government has no information that a smallpox attack is imminent, and there are significant side effects and risks associated with the vaccine. HHS is in the process of establishing an orderly process to make unlicensed vaccine available to those adult members of the general public without medical contraindications who want to be vaccinated either in 2003, with an unlicensed vaccine, or in 2004, with a licensed vaccine. A member of the general public may also be eligible to volunteer for an on-going clinical trial for next generation vaccines.
IMPLEMENTATION OF SMALLPOX PREPAREDNESS PLANS
On November 22, 2002, CDC asked states how they intend to vaccinate individuals most likely to respond to a smallpox attack. CDC requested pre-attack plans that contain information on the number of people comprising each Smallpox Response Team, information on where vaccines would be administered, the number of health care facilities identified to participate, and the number of clinics needed to support this effort. States were also asked to address vaccine logistics and security, vaccine safety monitoring, training and education, data management, and communications in their plans.
Status of State Pre-Attack Vaccination Plans
States have worked diligently to develop plans to vaccinate and have begun implementing them. My oral testimony will address the current status of their implementation.
The plans indicate that approximately 450,000 public health and healthcare personnel may be offered the smallpox vaccine. Vaccination is voluntary and eligible individuals will make their own decisions as to whether or not to receive the vaccine. There are no negative ramifications employment ramifications for anyone who chooses not to be vaccinated. About 1,500 clinics around the nation will be set up to deliver the vaccine to those who choose to receive it. In addition, state health officials have identified over 3,300 health care facilities that will participate in the program.
DISTRIBUTING VACCINE TO THE STATES
The National Pharmaceutical Stockpile (NPS) Program ensures the availability and rapid deployment of life-saving pharmaceuticals, antidotes, other medical supplies, and equipment necessary to counter the effects of nerve agents, biological pathogens, and chemical agents. The NPS Program stands ready for immediate deployment to any U.S. location in the event of a terrorist attack using a biological toxin, chemical or radiological agent directed against a civilian population at the request of the locality.
The week of January 20, 2003, CDC delivered kits with enough vaccine and needles for 21,600 public health and healthcare workers to Connecticut, Nebraska, Vermont and Los Angeles County. As of January 22, 2003, 20 states (including 1 county) requested nearly 100,000 doses of vaccine. These were the first shipment of vaccine to state and local governments under the President's plan to protect the American people from an intentional release of the smallpox virus. Under the program, smallpox vaccine is being offered to those most likely to respond to a potential outbreak of the disease. Each state notifies CDC when it is ready to receive its shipment of smallpox vaccine to begin pre-event vaccination of public health and healthcare workers. Once CDC receives a request for smallpox vaccine from a state, the order is forwarded to the National Pharmaceutical Stockpile for processing and shipment. CDC is providing smallpox handling instructions, cold chain management guidance, and all appropriate documentation. CDC will deliver Dryvax™ smallpox vaccine, packaged and shipped in increments as small as one vial (100 doses). CDC will validate all delivery information prior to shipment and will release vaccine after validation of temperature monitoring information.
TRAINING AND EDUCATION
Because smallpox vaccine has not been used routinely in the United States since the early 1970s, many of today's healthcare providers are not familiar with the disease, the vaccine, or the vaccine's potential side effects. This makes training of those administering and those receiving the vaccine necessary to ensure that this program is implemented as safely as possible. Anyone considering vaccination must receive information on conditions that are contraindications to vaccination (e.g., certain skin conditions, compromised immune systems, pregnancy, allergies to components of the vaccine, or household contacts with a condition listed above). CDC has held 19 training and education sessions on smallpox that reached an estimated 800,000 clinicians, members of the public health workforce, and members of the general population. Training has been conducted in classrooms, via satellite, over the Internet, through videotaped sessions and CD-ROM, and over the telephone. Thirty different training products, in a wide variety of media formats, currently are available.
Training for Response Team Members
Training and education for Smallpox Response Team members will be critical. In order to prepare for their participation in a smallpox response effort, all Smallpox Response Team vaccination candidates will be asked to watch a video distributed by CDC and will receive a packet of information describing the purpose of the national smallpox preparedness program. The response team members will receive general information about smallpox disease and the vaccine, including pre- and post-vaccination worksheets to provide instructions for anticipating and monitoring any potential side effects, as well as fact sheets on various methods of treatment for side effects resulting from vaccination. Prior to vaccination, each vaccine recipient will be required to fill out a patient medical history and consent form to confirm the absence of contraindications and to confirm the patient's consent in receiving the vaccine.
Training for Clinicians
Clinicians must be able to detect the first symptoms of a potential case of smallpox. During vaccination of response team members, clinicians will be an important resource for volunteers who are making a decision about whether or not they want to accept the smallpox vaccine. CDC has an ongoing initiative to educate clinicians about smallpox, done in conjunction with experts from a variety of medical professional organizations, including the Infectious Disease Society of America, the American Academy of Dermatology, the American College of Emergency Medicine (within a consortium of other emergency clinician organizations), and several primary care organizations. We are planning to help these organizations repackage information from CDC, and distribute it to their constituents in the format most appropriate for their members. In addition, CDC has established ongoing communication with 66 professional organizations that represent front-line clinicians to determine the smallpox training and education needs of their members. Within the next month, CDC is planning a national mail-out of critical clinician information to the nation's hospital and clinical community through each state's licensing board. In addition, we anticipate hundreds of thousands of clinicians will participate in CDC's upcoming Public Health Training Network program on "Clinical Management of Adverse Events Following Smallpox Vaccination: A National Training Initiative" scheduled for February 4, 2003. To supplement this extensive campaign to educate clinicians, CDC is also utilizing its normal means of getting information to clinicians, including the Health Alert Network, the secure Epi-X program, and the Morbidity and Mortality Weekly Report (MMWR). CDC has also contracted to establish a 24-hour-a-day, 7-day-a-week hotline for clinicians to call with questions about smallpox vaccinations.
Training for Laboratorians
CDC is providing smallpox training for laboratorians, including detailed instructions on the differentiation of smallpox from other rashes. On January 29, 2003, CDC will broadcast nationally a training program entitled, "Smallpox and Vaccinia Laboratory Testing: A National Training Initiative." The program presents detailed information, specific to those who perform testing and those who use laboratory services, such as physicians, nurses, epidemiologists, and state medical officers. They will also be given specific information on the laboratory role in diagnosing adverse events associated with smallpox vaccination. In addition, CDC has developed "Agents of Bioterrorism: A Guide for Clinical Laboratories," which includes information for clinical laboratorians about handling specimens suspected of containing smallpox. This guide will be distributed to the state public health laboratories within the next two weeks. The state public health laboratories can customize the guide with state-specific information and deliver it to the clinical laboratories in their area.
Education for the Public and the Media
CDC has, and will continue to use, weekly (and as warranted) media briefings, media advisories, access to smallpox vaccine experts, and public information materials to create awareness of the smallpox vaccination recommendations, the purpose of the recommendations, and the risks associated with smallpox vaccine. In addition, CDC is using its website to provide easy access to a wide range of smallpox education materials, including materials designed specifically to meet the needs of different audiences—such as members of the public, health care providers, people for whom smallpox vaccination is recommended, and state and local health departments. We have been, and will continue to work with, state and local health departments and other partners to help ensure our messages and materials are visible and readily available. CDC also operates a 24-hour-a-day, 7-day-a-week public information hotline that is accessible in English and Spanish.
PREVENTING, DIAGNOSING, TREATING, AND MONITORING ADVERSE EVENTS
Ensuring that we can implement this program as safely as possible has been central to our planning. The first part of this effort is to carefully educate and screen those considering vaccination. We have had a great deal of experience with this vaccine and have information on who is at risk of serious adverse events (e.g., those who have certain skin conditions, have compromised immune systems, are pregnant, have allergies to components of the vaccine, or have a member of their household with a condition listed above). Second, we will, with state and local health departments and the healthcare community, ensure that we diagnose, manage, and treat adverse events promptly and correctly. Third, we will very carefully monitor adverse events to ensure that we know of any unexpected patterns or types of adverse events on a real-time basis and can quickly modify the program to decrease the risk of adverse events if necessary. Included in this effort is education about what to expect after vaccination, when to be concerned about an adverse event, and where to go for help.
The Smallpox Vaccine Adverse Events Monitoring and Response System will monitor the occurrence of clinically significant, especially serious, adverse events (AEs). It will also serve to identify any unexpected adverse events. This process will help to build state capacity for assessment of adverse events.
Diagnosing and Treating Adverse Events
CDC will provide technical assistance to state health departments, including screening to identify and exclude persons with contraindications and help in implementing proper clinical procedures. There will be a designated telephone hotline for state health departments. CDC will monitor state tracking of clinically significant AEs. CDC will also inform states of any adverse event reports transmitted directly to CDC.
Efforts are underway to work with healthcare providers to assure they are educated about the smallpox vaccination program and smallpox vaccine AEs. This includes recognizing possible AEs and managing and treating any AEs among their patients. Standard algorithms are under development to assist physicians in proper identification and treatment of these patients.
Vaccinia Immune Globulin (VIG) is a product used to treat certain serious adverse reactions caused by smallpox vaccine. Sufficient quantities of VIG are available now to treat all anticipated adverse events resulting from the current vaccination program. New VIG is being produced and delivered to the National Pharmaceutical Stockpile for distribution, if needed, as the vaccination program expands. An effort is underway to produce new lots that will meet the standards for intravenous immune globulin. Cidofovir is a drug used to treat viral infections in persons with HIV/AIDS. It may be helpful in treating vaccinia reactions in cases where VIG does not work.
The state will inform CDC of VIG and/or Cidofovir requests. A CDC clinical team will then assess the request with the state and treating physician. CDC Drug Services and the National Pharmaceutical Stockpile will coordinate release of VIG and Cidofovir. The treating physician will then designated as a co-investigator on the Investigational New Drug (IND) protocol.
CDC is working with the states to develop an active surveillance system to detect serious adverse events following smallpox vaccine. CDC intends to implement recommendations that all health care workers have their vaccination sites monitored in the hospital daily, which will contribute information on serious illnesses that occur in all vaccinees. In addition, CDC will use the Vaccine Adverse Event Reporting System (VAERS), a national surveillance system administered by CDC and the Food and Drug Administration (FDA), to monitor smallpox AEs. The data collected through VAERS will be analyzed to identify any new or rare vaccine side effects, increases in rates of known side effects, associations with specific vaccine lots, or patient risk factors.
Post-vaccination surveillance will be conducted for people receiving the smallpox vaccine. This surveillance will assist in determining the rates of common AEs, assessing impact on time lost from work, and evaluating vaccinee satisfaction with the immunization program. This will be done by telephone survey 10 and 21 days post-vaccination.
Data and Safety Monitoring Board
CDC has established a Data and Safety Monitoring Board to provide advice to the CDC and program managers on selected aspects of pre-event smallpox vaccination program implementation.
The committee will review reported adverse events to determine whether rates of serious events are within expected limits; whether recommendations for screening out persons with contraindications are being properly observed; whether adverse events following vaccination are causally or only coincidentally linked to vaccination; and whether the adverse events experienced necessitate a substantial change in the way the program is run.
Through the Institute of Medicine's (IOM) Committee on Smallpox Vaccination Program Implementation, the IOM is providing advice to the CDC and program managers on selected aspects of pre-event smallpox vaccination program implementation. The IOM Committee released its first report on January 17, 2003.
The committee is making recommendations to CDC and state and local vaccine program managers to improve: CDC guidance designed to identify potential vaccine recipients at high risk of vaccine adverse events and complications; CDC measures to ensure the early recognition, evaluation, and appropriate treatment of adverse events and complications of smallpox vaccination; CDC plans for collecting and analyzing data on vaccine immunogenicity, adverse events, complications, and vaccine coverage; the informed consent process for vaccine recipients; professional education and training materials; communication plans for public health and medical professionals and the public; state smallpox vaccination implementation plans; and the achievement of overall goals of the smallpox vaccination program (e.g., vaccine coverage rate, equity of access, adverse reaction rates, etc.).
Assuring the nation is prepared in the event of an attack by a hostile group or government is one of the highest priorities for the administration. HHS and CDC are dedicated to assisting the states in increasing smallpox preparedness. We greatly appreciate all the work the states and local jurisdictions have done to develop plans and begin to implement them. We look forward to continuing to support states' efforts to protect the American people.
Thank you for the opportunity to testify before you today on this important public health issue. I would be happy to answer any of your questions.
Last Revised: January 31, 2003
|
HIV and AIDS
HIV – Human Immunodeficiency Virus AIDS – Auto Immune Deficiency Syndrome
• HIV is the name given to a virus
• HIV affects your immune system (the way your body fights illness and infection)
• HIV stops your immune system from working properly so that your body can no longer defend itself. This is AIDS.
Influenza (flu), Polio, Smallpox
Viruses are microbes
They consist of -
DNA or RNA (which hold the information about the virus, like your DNA)
A protein coat (to protect the DNA/RNA)
How a virus ‘works’
A virus is a parasite which cannot reproduce on its own,
it needs another living thing to survive
It infects the cells of your body and ‘hijacks’ them
(Adsorption & Entry)
Your cells stop doing what they’re supposed to and
instead make copies of the virus
(Replication & Assembly)
The new viruses are released and go
on to infect other cells
Viruses have characteristics of living things but, in some ways, could be said to be non-living – what do you think?
Remember – Living things
- Get rid of waste
- Need energy
A virus needs to make its way from one ‘host’ to another
This can happen in different ways
Transfer of body fluid
Through a ‘carrier’ (malaria)
HIV is transferred ONLY through transfer of body fluid
Can you think of any examples of body fluids that could spread HIV?
How much of each body fluid do you think needs to be transferred for someone to become infected with HIV?
How does AIDS affect you?
HIV stops your immune system from working properly
This means an illness that is not very serious for you and me can become life threatening to someone with HIV
People do not die from AIDS, they die because their bodies cannot fight off infections from other disease-causing organisms
|
For the sample bed that was 50 feet by 10 feet (500 square feet), if you want the mulch to be 2 inches deep, you’ll need 83.5 cubic feet of mulch. The amount of soil is 83.5 square feet. You’ll also need to add a layer of gravel to the bottom of the bed.
You’ll want to make sure that the gravel is at least 1/2 inch deep. If you’re using a soil mix that has a lot of organic matter in it, then you may not need as much gravel as you’d like, but it’s still a good idea to have some in the mix to help keep the soil from becoming too compacted.
The gravel should be about 1 inch in depth, and it should not be more than 3/4 inch thick. It should also not have any holes or holes that will allow water to seep in. This is important, because if water seeps in, it will cause the roots to rot, which will eventually kill the plant.
Table of Contents
How many bags of mulch do I need for a 100 square feet?
For 100 square feet at 2 inches deep, you will need twenty-two bags of mulch, seventeen bags of mulch, twelve bags of mulch, or nine bags of mulch. If you want to use the same amount of material for two different areas, divide the total area by the number of bags.
For example, if you have a 100-square-foot area and you are using two bags, then you would divide 100 by two, or 2.2, to get the area you need. If you were using one bag for each square foot of area, that would give you an area of 3.4.
How deep should your mulch be?
The mulch should be two to four inches thick. The weeds can push through mulch that is too thin. Water can’t reach the roots of the plants if your mulch is too thick. Mulch can also be used as a soil conditioner.
You can add a small amount of compost to your soil and let it sit for a few days. The compost will break down the organic matter in the soil, making it easier for plants to take up water and nutrients.
How thick should mulch be to prevent weeds?
Light and warm soil are needed by weeds to survive. If you want to use mulch as a natural weed barrier, you need to put down a 2- to 3-inch layer. It’s enough to keep most weed seeds from growing. They won’t have enough energy to push their seeds deep into the soil because you block their access to sunlight.
If you want to add a layer of soil around your plants, that’s fine, too. Just make sure it’s not too thick, and that it doesn’t block the sun from reaching the plants. Mulch can also be used to help keep weeds away from your garden beds.
How many wheelbarrows are in a yard of mulch?
It will take 9 to 14 full loads to fill a 2 square foot bucket.
For example, if you have a 4-wheel-drive vehicle, you will need to load your vehicle with a total of 12 to 15 loads, depending upon the size of the vehicle and the number of wheels on it.
If you are using a 3-wheeled vehicle like a pickup truck or a minivan, the load will be much smaller, and you may only need a single load.
How many 2 cu ft bags of mulch are in a yard?
Most mulch is sold in two bags. One gallon of water is needed for every 13.5 bags. You will need a minimum of 1 gallon per 1,000 square feet of mulched area. For example, if you have a 2,500 square foot area, then you will require 1.25 gallons per acre. You will also need enough water to cover the area of your yard.
If you are using a lawn mower, it is recommended that you use at least 1/2 gallon for each mowing cycle. This will allow you to mow more than one acre in a single season. Mulching is a great way to save water and reduce the amount of fertilizer that needs to be applied to your lawn.
Should old mulch be removed?
The experts that getting rid of last year’s mulch is unnecessary. Adding organic matter to the soil is when mulch breaks down. It’s a waste of time to remove the pre-existing mulch every year.
How many yards is a dump truck?
Most full-size dump trucks have a capacity of between 10 and 20 square feet. This is a good starting point if you are looking for a dump truck that will fit your needs. If you need more space, you may want to consider a larger truck, or even a truck with more storage space.
For example, a 10 cubic foot truck can hold up to 50 gallons of water, while a 20-cubic-foot truck will hold more than 100 gallons. Drainage systems are the most common type of trucking equipment used in the United States.
The main advantage of a drainage system is that it allows you to use less water than you would with a conventional truck. First, it is more expensive to install. Second, the system may not be able to handle the weight of the water that is being removed.
How many yards of mulch can fit in a pickup truck?
A regular pick-up can hold up to three yards of mulch. Body level full is about two cubic yards. It is recommended that you pick up soils, sands and gravels with a single yard. If you are going to pick up a lot of soil, sand or gravel, you will want to use a larger bag.
If you have a large garden, it may be a good idea to buy a bigger bag to hold all the soil and sand that you plan to put in your garden. The larger the bag, the more space it will take up and the easier it is to move around the garden when you pick it up.
How much does a 50 pound bag of mulch cover?
It is possible to prevent or reduce germination rates by applying too deep. A 2.5 cubic feet bag of straw mulch covers approximately 500 square feet and weighs around 50 pounds. A bag of straw mulch will cover 200 square feet and weigh 20 pounds, while a bag of straw mulch will cover 100 square feet.
If you have a large area to cover, you may want to use more than one bag. For example, if you are covering an area of 1,000 square foot, then you would need a total of 2,500 bags. If you cover a larger area with a single bag, it may not be necessary to add more bags to the mix.
How many cubic feet is a 50 lb bag of soil?
Generally, a typical 50 lb bag of sand yields 0.5 cubic feet, which will cover approximately 3 square feet area for standard 2 inch depth, 6 square feet at 1 inch deep, 2 square feet at 3 inches deep and 1 square foot at 4 inches depth.
If you need to cover a larger area, you can use larger bags. For example, if you are covering an area of 1,000 sq. ft., you would need a bag with a capacity of 50 lbs. or more.
|
Since 1950, Congress has provided financial assistance to local school districts through the U.S. Department of Education's Impact Aid program. Impact Aid was designed to help compensate school districts for the loss of tax revenue caused by federal ownership of land, including tribal land and national parks, and for other reasons. In districts with federal property like national parks, the federal government provides compensation directly to the district in lieu of paying property taxes like typical landowners do.
Many school districts in South Dakota rely heavily on Impact Aid money from the federal government each year to help cover annual expenses. There are 37 school districts in South Dakota that participate in the Impact Aid program. School districts eligible for Impact Aid include these revenues in their annual budget for the upcoming fiscal year, but due to complicated payment formulas, Impact Aid districts have suffered from persistently late distribution of these funds due to bureaucratic delays in Washington. This requires school districts to wait significant periods of time before receiving payments, and places an unfair burden on districts to find a way to cover the shortfall, particularly if payments are backlogged for several years.
For these reasons, I introduced, along with Senator Patty Murray (D-Wash.), the Impact Aid Timely Repayment Act, which accelerates the Impact Aid payment time table and requires the Department of Education to finalize payments within three years after the funds have been appropriated instead of the current deadline of six years.
Normally, this legislation would be discussed as part of the reauthorization of all federal education programs. However, because an agreement has not been reached on legislation to re-write various federal education programs, I worked with others to address the Impact Aid situation. Working across the aisle, I was able to include the Impact Aid Timely Repayment Act language as an amendment to the National Defense Authorization Act, which passed the Senate on December 4, 2012, by a vote of 98-0. The National Defense Authorization Act also includes a provision that replaces the complicated and highly-subjective Impact Aid formula with a simple, objective calculation. This removes the subjectivity from the program and will speed-up payments to school districts across the country, including in South Dakota.
The legislation will now be sent to a conference committee to work out the differences between the House and Senate bills. In South Dakota, this program is particularly important to many rural school districts, and I was disappointed that President Obama has proposed ending this program. For districts like Wall, that would represent a loss of over $500,000 in their annual budgets.
As Congress continues to work to strengthen Impact Aid, I will continue to support proposals that provide accurate and timely payments to districts due to the impact that the federal government's exemption from taxation has on various jurisdictions.
|
Ground Cover Companion for Lamb's Ears
A member of the mint family, lamb's ears (Stachys byzantina) grow best in U.S. Department of Agriculture plant hardiness zones 4 through 8. They need companion ground covers that like sunny locations and contrast with lamb's ears in height, shape, color or texture. Lamb's ears are also a ground cover, so allow them 1 to 1 1/2 feet to spread while surrounded by a contrasting ground cover.
Similar Care Requirements
Lamb's ears prefer full sun but can also grow in light shade, giving you a broader range from which to choose companion ground covers. They tolerate either dry or moderate watering, with a deep soaking every two or three weeks. Avoid companion ground covers that grow best in boggy or very wet conditions. Lamb's ears tolerate most soil types but do need well-draining soil.
Vivid Color Contrasts
Ground covers with shiny, dark green or blackish leaves contrast with the fuzzy gray-green leaves of lamb's ears and provide a dramatic effect in your garden. Able to thrive alongside lamb's ears are either green-leaved dwarf periwinkle (Vinca minor), for USDA zones 4 through 8, or bugleweed (Ajuga reptans "Atropurpurea"), with green and purple leaves for USDA zones 3 through 9. Select dwarf periwinkle at your nursery instead of invasive greater perwinkle (Vinca major), which grows in USDA zones 7 through 9.
Different Growing Habits
Lamb's ears produce purplish-pink flowers that rise on spikes 10 to 15 inches above the leaves, so other ground covers with flowers that rise on shorter stems look good growing beneath the lamb's ears. Growing in the same USDA zones as lamb's ears, sweet woodruff (Galium odoratum) produces white flowers 8 to 12 inches tall, while sweet alyssum (Lorularia maritima) for USDA zones 5 through 9 has clusters of white flowers 3 to 9 inches tall.
Contrasting Shapes and Textures
Ground covers such as strawberry plants (Rosaceae spp.) and some sedums (Sedum spp.) have small leaves that grow close to the plants, providing an interesting visual contrast to the open and spreading leaves of lamb's ears. Strawberries grow year-round in USDA zones 3 through 11, and white stonecrop (Sedum album), with small succulent-type leaves, grows in USDA zones 3 through 8.
- Missouri Botanical Garden: Stachys Byzantina
- The New Sunset Western Garden Book: Edited by Kathleen Norris Brenzel
- Missouri Botanical Garden: Vinca
- Missouri Botanical Garden: Ajuga Reptans "Atropurpurea"
- California Invasive Plant Council: Cal-IPC Plant Assessment Form
- Missouri Botanical Garden: Lobularia Maritima
- Missouri Botanical Garden: Sedum Album
Susan Lundman began writing about her passions of cooking, gardening, entertaining and recreation after working for a nonprofit agency, writing grants and researching child development issues. She has written professionally for six years since then. Lundman received her M.A. from Stanford University.
|
As Islam was embroiled with its counter-crusade against the Christian infidel in the Holy Land, a new, more ominous threat was emerging from the east. Mongol and Turkish tribesmen, under the charismatic leadership of the Mongol warlord Temuchin (1167–1227), were massing for the greatest conquests in human history. Genghis Khan (the title Temuchin took in 1206) and his powerful nomadic confederation swept out of Mongolia and conquered northern China and Korea by 1216, then spread westward across central Asia to invade Persia. By the end of 1221 Genghis Khan had crushed the Islamic Khwarizmian Empire in Transoxiana and invaded the Ukrainian steppes. There, in 1223, a combined army of Kievan and allied Asian nomads turned back the Mongol invaders at the battle of Kalka River. Genghis Khan died in 1227 before he could avenge this defeat, but he had already created the largest contiguous land empire yet seen in human history.
The secret of the Mongols’ military success was a combination of strategic mobility, effective tactics and the quality of the Mongol warrior and mount. Consisting entirely of light and heavy cavalry (with the exception of some auxiliary units), the Mongol army was organized on the decimal system. The largest manoeuvre unit was the tuman, consisting of 10,000 men. Three tumans (30,000 men) normally constituted a Mongol army. The tuman itself was composed of ten regiments or minghans of 1,000 men each. Each minghan contained ten jaguns or squadrons of 100 men. The jagun was further subdivided into ten troops of ten men called arbans. This novel tactical flexibility allowed the Mongol army to strike with the speed and force of a hurricane, confusing and then destroying its enemies, then disappearing back into the grasslands like its Scythian, Magyar and Seljuk forebears. Though often described as a ‘horde’ of warriors by their civilized adversaries, the Mongol army was usually much smaller than that of its opponents. In fact, the largest force Genghis Khan ever assembled was less than 240,000 men, sufficient for his conquest of Transoxiana and north-west India. The Mongol armies which later conquered Russia and eastern Europe never exceeded 150,000 men.
The typical Mongol army was a pure cavalry force consisting of about 60 per cent light cavalry and 40 per cent heavy cavalry. These two weapon systems co-operated in an unprecedented manner to bring to bear the strengths of missile and shock combat against the enemy. Mongol light cavalry were required to reconnoitre for the army, act as a screen for their heavier counterparts in battle, and provide missile fire support in attacks, and follow-up pursuit once a battle was won. These light horsemen were armed in characteristic Asiatic fashion with two composite bows (one for long distance and one for short), two quivers containing at least sixty arrows, two or three javelins and a lasso.
The Mongol composite bow was larger than most of its central Asian cousins, with a hefty pull of up to 165 pounds and an effective range of 350 yards. Quivers carried arrows for many purposes: light arrows with small, sharp points for use at long ranges, heavier shafts with large, broad heads for use at close quarters, armour-piercing arrows, arrows equipped with whistling heads for signalling and incendiary arrows for setting things on fire. The Mongol warriors were so adept at mounted archery that they could bend and string the bow in the saddle and then loose the arrow in any direction at full gallop.
The Mongol light trooper usually did not wear hard body armour, though he did often wear a padded gambeson and employ a wicker shield covered in thick leather. In combat, he replaced his thick woollen cap with a simple hardened leather or iron helmet if available. Mongol heavy cavalry were better protected, with warriors wearing leather, mail or lamellar cuirass and metal helmet, and their mounts wearing leather barding. The primary weapon of the heavy cavalryman was a 12 foot lance, though curved and straight sabres and small battleaxes and maces were also present among the elite. All warriors were required to wear a long, loose raw silk undershirt next to their skin for added warmth and protection. If an enemy arrow penetrated the steppe warrior’s body, it would usually fail to pierce the silk, instead carrying the resilient fibre with it into the wound. By simply pulling on the silk, a field surgeon could easily extract the arrow.
Military service was compulsory for all Mongol adult males under the age of sixty, and like all steppe societies, there was no such thing as a civilian. Nearly born in the saddle and raised to be effective mounted hunters and herders, these Mongol warriors were inured to the hardships of the Eurasian steppes, facing extremes in weather and lacking the luxuries, rich food and soft mattresses of sedentary living. This harsh lifestyle forged warriors with strong minds and bodies, capable of almost superhuman endurance in the saddle. On the march, each tuman had its own herd of remounts following behind, with each steppe warrior having at least three remounts. This allowed him to ride at speed for days, slowing only to tap a vein in the weakest horse for nourishment. Mongol troopers were responsible for their own food and equipment, cutting down the size of the supply train and virtually abolishing the need to maintain a base camp.
The horses themselves were also very highly trained, with Mongol warriors preferring mares over stallions as warhorses. The Mongols’ original mounts were what are known today as Przewalski’s horses, thick and strong beasts with broad foreheads, short, powerful legs, and a reputation throughout the steppes for their courage and stamina. Broken and ridden hard for their first two years, these horses were then put out to pasture for the next three years to develop a herd mentality. Afterwards, they were trained for warfare. After the fall of Khwarizm, these horses were crossbred with the larger, hot-blooded Arabian breeds, creating a larger mount of between 14 and 15 hands, with some as large as 16 hands. These warhorses were treated as comrades-in-arms. Horses ridden in battle were never killed for food, and when old or lame, were put out to pasture to live out their last days. When a warrior died, his mount was sacrificed and buried with him so that he would have a companion for the afterlife.
Mongol commanders understood the importance of the principles of surprise, offence and manoeuvre in military operations, of seizing and maintaining the initiative in battle, even if the strategic mission was defensive. When a Mongol army was on campaign, each tuman usually advanced quickly on a broad front, maintaining only courier contact in between the 10,000-horse divisions. To facilitate good communication between field armies and headquarters, permanent staging posts or yams were established behind advancing armies at approximately 25 mile increments. These yam stations acted as a kind of pony express for the Mongols, giving commanders the ability to send messages back and forth at the rate of 120 miles per day. When the enemy was located, information concerning his strength, complement, position and direction of movement was relayed back to headquarters, and in turn disseminated back to local commanders. Once intelligence had been gathered and the plan co-ordinated, the main force converged and surrounded the adversary, while other elements continued to advance and occupy the country behind the enemy’s flank and rear, threatening their lines of communication. If the enemy force was small, it was simply destroyed, but if it proved formidable, then Mongol generals used manoeuvre, terrain and their enemy’s predilections to best advantage.
If the enemy army was stationary, the Mongol general might command his main force to strike it in the rear, or turn its flank, or engage and then feign a retreat, only to pull the enemy into a pre-planned ambush using an elite light cavalry corps called the mangudai or ‘suicide troops’ (an honourable title more than a job description). The function of the mangudai was to charge the enemy position alone, and then break ranks and flee in the hope that the enemy would give chase. If the enemy pursued, the Mongols would lead them into terrain suitable for ambush.
If the enemy’s position was not precisely known, the main Mongol army advanced along a broad front in several roughly parallel columns behind a screen of light cavalry. The main force galloped along in five ranks, the first two of which were heavy cavalry and the last three light cavalry. Riding way out in front and on either flank were three separate light cavalry detachments. When the enemy was encountered, the Mongol army reacted quickly. The contacted outriders automatically shifted to protect the main force as it wheeled to meet the threat. Once the vanguard was engaged, the light cavalry in the main force galloped through the ranks of the heavy cavalry and joined the other horse archers. What took place next was a classical employment of missile and shock combat reminiscent of the battles of Carrhae and Dorylaeum centuries earlier.
Co-ordinating the attack in an unnerving silence without battle cries or trumpets (signals were given by flags), the Mongols began their assault with light cavalry riding up and down the enemy’s front lines, showering his ranks with well-aimed javelins and arrows. Once light cavalry missile-fire had thinned the enemy’s ranks, the horse archers broke away to either flank, leaving the heavy cavalry to drive in the final blow. Mongol lancers usually advanced at a trot and in silence. It was only at the last possible moment that the charge was ordered by striking the great naccara, a large kettledrum carried by a camel. With a single blood-curling scream, the Mongol heavy horse attacked.
In combat, the Mongols would close in from many directions if possible, taking advantage of any disorder or confusion their swarming tactics created. The famous thirteenth-century Italian merchant and Eurasian traveller Marco Polo gives us a description of Mongol tactics, though he called the Mongols by the generic name of Tartars:
When these Tartars come to engage in battle, they never mix with the enemy, but keep hovering about him, discharging their arrows first from one side and then from the other, occasionally pretending to fly, and during their flight shooting arrows backwards at their pursuers, killing men and horses, as if they were combating face to face. In this sort of warfare the adversary imagines he has gained a victory, when in fact he has lost the battle; for the Tartars, observing the mischief they have done him, wheel about, and make them prisoners in spite of their utmost exertions. Their horses are so well broken-in to quick changes of movement, that upon the signal given they instantly turn in every direction; and by these rapid maneuvers many victories have been obtained.
Sometimes, Mongols would even send out small detachments to start large prairie fires or set fire to settlements to deceive the enemy or mask movements.
Another area of success for the Mongol war machine was its ability to reduce walled cities, thereby leaving no enemy strongholds in the wake of their conquests. After initially developing a train using Chinese siege weapons, equipment, techniques and operators, the Mongols soon made their own improvements and developed their own techniques. The Mongols were also quick to include in their siege train weapons encountered in their conquests. From the Chinese, the Mongols adopted the torsion-operated light and heavy catapult, and from the Khwarizm, they adopted the tension-operated ballista and a central Asian version of the trebuchet, a powerful engine operated by counterpoise.
Like all cavalry-based armies, the Mongols preferred an open field engagement over siege warfare. But if an enemy city refused to open its gates, Mongol generals had numerous ways to gain access. Siege weapons, towers and battering rams were brought to bear, but if these techniques proved ineffective, the Mongols would often attempt to set the city on fire, compelling the inhabitants either be burned alive, or to open their gates. If the wall was breached, a favourite but ruthless Mongol tactic was to herd captives in front of their own dismounted troopers, forcing the defenders to kill their own countrymen in order to bring fire on the attackers.
Once the Mongols took the city, it was pillaged and its garrison and inhabitants were often put to the sword. Genghis Khan routinely eradicated entire populations in his campaigns against the Khwarizmian Empire, depopulating and destroying Balkh, Merv and Nishapur along the way. Men, women and children were separated, distributed like cattle among the tumans, and decapitated. Their heads were then stacked in pyramids to serve as monuments to Mongol cruelty and warnings to the steppe warriors’ enemies. Even the dogs and cats were killed. The Mongols spared prisoners, artisans, engineers and men of military age so that they could assist in the next siege, digging trenches, building ramparts or acting as fodder for the assault.
The Mongols used their catapults, ballistae and trebuchets not only against city walls, but also against enemy field positions. These artillery pieces shot containers filled with burning tar to create smoke screens, or firebombs and grenades to create tears in the enemy’s lines. The Mongols also perfected a medieval version of a ‘rolling barrage’, with cavalry units advancing under catapult and ballista fire. The Mongols even made use of rudimentary rockets made from bamboo wrapped in leather, though these weapons were very inaccurate and unreliable.
|
Carbonyl Reactivity and IR Stretching Frequency
Nitriles: Simple acyclic nitriles are named by adding nitrile as a suffix to the name of the corresponding alkane (same number of carbon atoms). In the case of the amide, aldehyde formation requires the loss of an aluminum amide (R'2N–Al), an unlikely process. Reactions #4 & 5 display the acylating capability of anhydrides. On the other hand, for most cases of electrophilic aromatic substitution bond-making preceded bond-breaking. CH3CH2COCl is propanoyl chloride (or propionyl chloride). This may occur by way of an intermediate aldehyde imine created by addition of the first equivalent of hydrogen. This effect is strongest for α‐substitutions and decreases rapidly as the electron withdrawing group is moved further down the chain.
The consequences of such inductive electron withdrawal on the acidity of carboxylic acids was previously noted. Furthermore, such substitution reactions of alcohols and ethers are rare, except in the presence of strong mineral acids. Bear in mind that anhydrides may also be used as reagents in Friedel-Crafts acylation reactions.
A temperature of -78 ºC is easily maintained by using dry-ice as a coolant. Although amines are among the most reactive nucleophiles, only 1º and 2º-amines give stable amide products. Grignard reagents add to nitriles, forming a relatively stable imino derivative which can be hydrolyzed to a ketone. In this two-stage mechanism bond formation occurs before bond cleavage, and the carbonyl carbon atom undergoes a hybridization change from sp2 to sp3 and back again. Clearly, the mechanism by which acylation reactions occur must be different from the SN1 and SN2 procedures described earlier. from your Reading List will also remove any These mind maps are for both first and second year. All of these substituents have bonds originating from atoms of relatively high electronegativity (Cl, O & N). Other Acylation Reagents and Techniques Because acylation is such an important and widely used transformation, the general reactions described above have been supplemented by many novel procedures and reagents that accomplish similar overall change. If Nuc-H is water the reaction is often called hydrolysis, if Nuc–H is an alcohol the reaction is called alcoholysis, and for ammonia and amines it is called aminolysis. Reductions of carboxylic acid derivatives might be expected to lead either to aldehydes or alcohols, functional groups having a lower oxidation state of the carboxyl carbon. As in the reductions of aldehydes and ketones, the first step in each case is believed to be the irreversible addition of hydride to the electrophilic carbonyl carbon atom. First, the oxygen atom of the carboxyl group bonded to the hydrogen atom has a partial positive charge on it because of resonance. Cleavage of the alkyl moiety in an ester may be effected in several different ways, the most common being the acyl transfer mechanism described above; however, other mechanisms have been observed. (a) When Z is halogen (usually Cl), the derivatives are called as acid chlorides. An interesting correlation between the reactivity of carboxylic acid derivatives and their carbonyl stretching frequencies exists. 2º & 3º-amides have alkyl substituents on the nitrogen atom. Lithium aluminum hydride reduces nitriles to 1º-amines, as shown in the following equation. This explains why reactions #2 & 3 do not give amide products. Acid catalysts act to increase the electrophilicity of the acyl reactant; whereas, base catalysts act on the nucleophilic reactant to increase its reactivity. Similar hydrogen bonding occurs between molecules of 1º and 2º-amides (amides having at least one N–H bond), and the first three compounds in the table serve as hydrogen bonding examples. With excess reagent at temperatures above 0 ºC most carboxylic acid derivatives are reduced to alcohols or amines. Of these, lithium aluminum hydride, often abbreviated LAH, is the most useful for reducing carboxylic acid derivatives. The second equation demonstrates the low reactivity of organocadmium reagents, inasmuch as the ester function is unchanged. This method provides a useful alternative to the catalytic reduction of nitriles, described above, when alkene or alkyne functions are present. Base catalyzed hydrolysis produces carboxylate salts. Indeed, it was noted earlier that carboxylic acids themselves are reduced to alcohols by lithium aluminum hydride. Esters: The alkyl group is named first, followed by a derived name for the acyl group, the oic or ic suffix in the acid name is replaced by ate. The following table summarizes the influence each of the reducing systems discussed above has on the different classes of carboxylic acid derivatives. Substituent Y (colored green) is eliminated from the tetrahedral intermediate as its anion. Summary This chapter contains sections titled: Fischer–Speier Esterification Mukaiyama Esterification Ritter Reaction Strecker Amino Acid Synthesis Yamada Reactions Yamaguchi Esterification Carboxylic Acid Derivatives Synthesis - Name Reactions for Functional Group Transformations - Wiley Online Library This competition between inductive electron withdrawal and conjugative electron donation was discussed earlier in the context of substituent effects on electrophilic aromatic substitution. CH3(CH2)2CONHC2H5 is N-ethylbutanamide; & HCON(CH3)2 is N,N-dimethylmethanamide (or N,N-dimethylformamide). By clicking the "Toggle Effect" button the electron shift in both effects will be displayed sequentially. bookmarked pages associated with this title. Common names for carboxylic acids are derived from Latin or Greek words that indicate one of their naturally occurring sources. Ester derivatives of alcohols may undergo unimolecular syn-elimination on heating. Also, a specific example of acyl chloride formation from the reaction of a carboxylic acid with thionyl chloride will be shown.
By eliminating an aluminum alkoxide (R'O–Al), an aldehyde is formed, and this is quickly reduced to the salt of a 1º-alcohol by LAH. (CH3)2CHCH2C≡N is 3-methylbutanenitrile (or isovaleronitrile). Since acyl chlorides are more reactive than esters, isolation of the ketone intermediate formed in their reactions with organometallic reagents becomes an attractive possibility. Removing #book# Each mind map is appropriately titled roughly one mind map per topic in the course. The fourth question asks you to draw the structural formulas for the products of more than fifty possible reactions of some carboxylic acids. Since relatively few methods exist for the reduction of carboxylic acid derivatives to aldehydes, it would be useful to modify the reactivity and solubility of LAH to permit partial reductions of this kind to be achieved. This acidity is due to two factors. Esters are the most common carbonyl reactants, since they are cheaper and less hazardous to use than acyl chlorides and anhydrides. Al–O(–)), and the resulting iminium double bond would then be reduced to an amine.
What Is A Melange Bagel, Once Upon A Time Little Red Riding Hood And Dorothy, Pfa Medical Abbreviation, Brownies Without Flour, Origin A2 Milk Review, The Resistance Pokemon, Mrs Wilkes Takeout, 50 Strategies For Teaching English Language Learners Pdf, Term Paper Structure, General Mills Fiber One Bars, City Nails Pomona, Mint Plants For Sale, Tyrese Haliburton Stepien, Résumé De Texte Exemple Corrigé, Is White Rice Vegan, Vidal Sassoon Facts, Wealthify App Review, The Life You Lead, Make A Choice Sentence, A Man Has Dreams Lyrics, Is Vinegar Good For You, Bronte Terrell Age, Best K-cup Flavors Non Coffee Drinkers, 5g Mobile Broadband Router, Afp Srg Salary, Creamy Tomatillo Sauce, Sabun Word Origin, Los Angeles County Divorce Records Search, Jangles: A Big Fish Story Activities, Reverse Sit Ups Crossfit, Single Bed Price In Jaipur, White Tongue Sore Throat, How To Set Trailing Stop Loss In Thinkorswim, Pillows For Sore Necks, Semi-conservative Dna Replication Means That, Its It Icecream Sandwich, How To De Tan In One Day, Luna Butterfly Lyrics, Most Beautiful Province In China, Ps3 Games On Pc, Continuous By Categorical Interaction, Samsung J7 Pro 2018 Specification, Denver International Airport Jobs, Cardi B Natural Hair, Peach Cobbler Scones, M1 Finance And Robinhood, Certified Management Accountant Salary, Mexico City Crime Rate, Cardigan Clothes For Male, Capital Fm Brain Game 2020, What Is A Good Trailing Stop Loss Percentage, Things To Do In San Juan National Forest, What Is Included In The Core Muscles?, Birthday Suit Song Meaning, The Collected Works Of Abraham Lincoln, Buddies Meaning In Marathi, Happy Dragon Boat Festival 2020,
|
Research on how to program computers to process and analyse large amounts of natural language data has led to the saving of 100,000 years in mobile phone typing time and also enabled language learners to have feedback in less than 15 seconds.
Ted Briscoe and team’s research on language modelling and classification was critical to the development of SwiftKey, a keyboard app designed to pick up the patterns in people’s language use and, through machine learning techniques, accurately predict what they were most likely to write next.
Language data was gathered by the researchers and a technology and knowledge transfer company cofounded by Briscoe, iLexIR, provided the data to the 2009 start-up (co-founded by ex-Cambridge students Ben Medlock and John Reynolds) that became SwiftKey. The data was used to train the language prediction models, which says the co-founder and CTO of Switfkey “made a huge difference at a critical early stage”.
SwiftKey was first released as an exclusive for Android Market in July 2010, followed by an iOS release in September 2014 after Apple allowed third-party keyboard support.
By June 2014, users were estimated to have saved half a trillion keystrokes. By 2016, SwiftKey software was installed on more than 300 million devices and it was estimated that its users had saved nearly 10 trillion keystrokes, across 100 languages, amounting to more than 100,000 years in combined typing time.
The success of SwiftKey led to its acquisition by Microsoft in 2016 for $250 million, and the software was incorporated into Microsoft’s flagship mobile app, SwiftKey Keyboard for iPhone and Android (500 million installs by 2020).
The researchers’ expertise on automatic feedback and assessment of texts has also helped language learners and reduced the workload of teachers. Within a year of the launch of the free assessment software ‘Write & Improve’, it was used by over 650,000 people in 225 countries with well over a million pieces of writing submitted and checked. Learners obtain feedback on their texts in fewer than 15 seconds, helping to make language learning more efficient for learners and teachers.
|
April 2, 2021 11:50:13 am
With an ongoing pandemic and elections coming up in many parts of the world, identifying and stopping the flow of misinformation online has become a primary concern. On the occasion of International Fact-Checking Day, Google has shared a few tips that you can implement in your daily online life to identify misinformation and prevent it from spreading.
Check the context of images
Images are very powerful tools and people who create and mischievously spread misinformation online realise this. Parts of certain images can be cropped and shown as standalone images to completely change their meaning. However, you can check the authenticity of most images you find online by once running it through Google. To do this, simply right-click on a picture when it is open in your browser and choose “Search Google for Image.”
Check multiple sources
The best way to check the authenticity of any news you come across is to check if one or more trustworthy news publications have also reported on the matter. You can simply search for any topic on the Google Search app and switch to the News panel to find relevant articles. You can also search for news via your favourite browser.
Use fact-checking tools
Fact-checking is an essential part of surfing the web for information. Whenever you come across any bit of information that looks too good to be true, make sure you fact check it. You can use online tools like ‘Fact Check Explorer’ by Google for this. This is also an ideal practice to follow for those forwards you get on WhatsApp or other applications.
Best of Express Premium
Use Google Earth
Misinformation around particular areas, malls, monuments or other geographical elements can also be tackled via Google Earth. You can use Google Earth to get to know pretty much everything about a location, including pictures of the most famous locations. You can then check pictures to see if they add up with the misinformation you have been spotting on the web. For instance, if you come across information that says “Bigfoot spotted near the Eiffel Tower” with the photo of what looks like an ape walking past a huge tower, you can use Google Earth to check images of the actual Eiffel Tower and determine if what you see in the picture is real or fake.
🗞 Subscribe Now: Get Express Premium to access our in-depth reporting, explainers and opinions 🗞️
- The Indian Express website has been rated GREEN for its credibility and trustworthiness by Newsguard, a global service that rates news sources for their journalistic standards.
|
Definition of blighter in English:
noun[with adjective] British informal
A person who is regarded with contempt, irritation, or pity: you little blighter!
More example sentences
- And another email got quite irate about the central character, suggesting he was an evil little blighter.
- For any other other seal do-gooders out there, please bear in mind that, according to experts, seal bites can in fact be lethal (if the little blighters go for your throat I presume).
- It's not so romantic when one of the aggressive blighters thinks you're trying to attack it and ends up breaking your fingers in its beak, is it?
Words that rhyme with blighterall-nighter, biter, fighter, igniter, inciter, indicter, inviter, lighter, mitre (US miter), overnighter, reciter, righter, sighter, smiter, writer
Definition of blighter in:
- British & World English dictionary
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
Oct. 3, 2014 -- When Ebola arrived in the U.S. last week, it came with a steep learning curve.
Hospitals that thought they were prepared learned they had gaps in their communication. Public health officials soon learned about the problems of dealing with Ebola-contaminated waste and the difficulties of keeping exposed people at home. Parents of school-aged children struggled to understand the risks of sending kids back to their classrooms. We learned about flaws in the system that screens travelers.
|Ebola Coverage on WebMD|
That made us wonder: What else don’t we know about Ebola?
To find out, we reached out to Ebola experts to get their thoughts.
Elke Muhlberger, PhD, is a microbiologist at the Boston University School of Medicine, who specializes in the study of filoviruses, the virus family to which Ebola belongs. Amesh Adalja, MD, is an infectious disease specialist at the University of Pittsburgh Medical Center. And Thomas Geisbert, PhD, is a microbiologist and immunologist who specializes in Ebola at the University of Texas Medical Branch in Galveston.
Here’s their list of big questions that remain to be answered about the virus.
1. Why are humans so vulnerable to Ebola?
Muhlberger: Ebola virus causes a very severe disease in humans, and that’s also the case in monkeys and great apes. In great apes it’s a really big, big issue, because they’re very close to extinction.
But other animals, say mice and guinea pigs and bats, don’t have any problems controlling Ebola virus infection. They don’t get sick, and they are quite happy if they’re infected with Ebola in the wild.
If we are, in a very bad sense, the exception in terms of Ebola, the question is why are we so vulnerable? What are the differences in the immune response in mice and bats that keep them safe compared to humans?
2. Which patients may be likelier to spread the virus?
Adalja: We know how people catch Ebola. It’s only passed through close contact with the bodily fluids of infected individuals.
But what we don’t really know is whether some people may spread the disease at different rates than others.
With smallpox, for example, people who bleed from their mouths and noses, a rare form of the disease called hemorrhagic smallpox, are more contagious than people who have the disease, but don’t bleed.
Sicker patients may be more apt to spread the virus. Or maybe they are less risky because they’re more likely to be bedridden and thus not able to interact much with others.
We know that 50% of [people with] Ebola cases bleed internally, or hemorrhage, and 50% don’t. Does that make them more likely to spread virus or not? There are people who may be vomiting more than others, or having more diarrhea. All those factors may be things that determine how likely a person is to spread the disease.
I think that’s an important thing to figure out, because if you knew that, then you’d prioritize the contacts of those super-spreader types, because that’s where you’d have the biggest impact.
We understand how it’s transmitted. During an outbreak, it’s important to figure out who are the main sources of infection. Is everybody equal, or not?
3. Where does the virus lurk when it’s not making people sick?
Muhlberger: There must be an animal where the virus lives before it moves to humans. We call that a “reservoir.”
So, what is the natural reservoir for Ebola?
There are some indications that fruit bats are this reservoir, but nobody has ever isolated Ebola virus from fruit bats.
We’ve found antibodies and RNA in fruit bats, but not infectious virus, so we have to guess. We’re not sure.
Geisbert: I think this is a really important question.
In this current outbreak in West Africa, was the virus always there? The genetic sequences suggest it has been there for a while as opposed to coming from Central Africa, but how long was it there? How long did it maintain itself in nature and not pop up until now, or did it pop up before and just wasn’t recognized?
Did it emerge because of some environmental condition? Is it more people? Is it people encroaching on areas that before didn’t have close contact with it? I think that’s important to understand.
4. Can many more lives be saved with the right intensive care treatment?
Muhlberger: We always hear that 50% to 90% of patients die of this disease, but now with the patients coming to the U.S. and getting intensive care treatment, all of them have survived so far, and some of them seemed to be severely ill.
So if they get the treatment they need, which is rehydration -- that’s very important, electrolyte treatment -- it seems it is possible to save these patients and to save their lives.
So that’s my question: Is it really necessary that anyone dies from Ebola virus if we know that intensive care treatment helps to save these people who are infected? Because for me it was a big surprise and a good surprise that so far, all the patients treated here have survived.
Adalja: We have wildly varying fatality rates that vary among Ebola strains and vary among outbreaks. It’s really important to know why. Is it due to the fact that supportive care is or is not given to a patient, or are there genetic markers that give somebody a survival advantage with Ebola like there are with other infectious diseases?
5. Do quarantines work?
Adalja: I think a quarantine is a last resort. It’s something that’s really hard to enforce and has a lot of downsides to it. One of the downsides is that when you quarantine a population, you not only prevent people from leaving, you prevent things from going in. So you prevent public health experts from going in. You prevent doctors from going in, you prevent food and water from going in. You have waste piling up. You have dead bodies piling up. You have dogs eating the bodies like we saw in the West Point neighborhood [in Monrovia, Liberia]. And then you have massive distrust of the population because they’re now stuck in this area they can’t get out of. Often excessive force is used. So, during the West Point quarantine, people were shot. This is not something most public health people favor.
For Ebola, quarantining asymptomatic individuals doesn’t make sense, because Ebola is only contagious if a person has symptoms.
Geisbert: Historically, quarantines have worked really well, but this outbreak has broken a lot of rules.
Previously, there were smaller outbreaks, in more well-defined areas in Central Africa. And you had some groups that had a substantial amount of expertise in knowing how to handle them and properly quarantine and trace contacts, etc.
It was a sad situation for the affected area because some of these outbreaks have had case fatality rates up to 90%. They would quarantine the people and identify close contacts of people who were potentially exposed and isolate them and quarantine them, and it just burned out.
And here, what you have now in West Africa, everything happened concurrently across this huge geographic area, and it became like whack-a-mole. And the resources of the people who knew how to put these things out were spread so thin, they couldn’t deal with everything at once. You just have very poor countries, poor public health infrastructure, and an area that had never experienced Ebola before, so you have the education of the public and just kind of helter-skelter situation there and not really being able to properly quarantine.
6. How to treat or prevent Ebola infections?
Geisbert: It’s true that we don’t yet have an effective vaccine or treatment for humans, yet.
But we have vaccines that can completely protect monkeys against it. We have drugs -- ZMapp and TKM-Ebola -- that when given even after exposure can completely protect monkeys against it. So I think that there’s been a lot of progress in the last 5 to 10 years in developing effective countermeasures.
The glitches and delays have been in getting funds to these small biotech companies who have been involved in the development of some of these really promising countermeasures.
|
The human genome, that is, our genetic information, has been completely decoded for 20 years. However, significant gaps and ambiguities remain. For example, the order in which the decoded parts of the genome belong together.
Scientists from California now want to fully determine the missing detail for the first time — and this time really!
2001 review: Until then, a similar report passed to the press. In fact, at that time, several research groups had only decoded 92 percent of the human genome.
Finally to the finish line with new technology
The fact that the remaining eight percent were missing due to technology is still insufficient.
the problem: If you want to identify DNA, you must break down the genetic material into its components beforehand. Then you have a puzzle in which the individual parts can be identified. However, it is very difficult to assemble it because there are many similar parts to each other.
This time, the researchers used two new, alternative techniques to conduct their investigations. In one, the DNA molecule was sequenced into larger pieces, while the other examined this sequence with a laser.
These new technologies are still not reliable on their own, but the group produced such a useful result. The number of DNA bases recorded was increased from 2.92 billion to 3.05 billion, which corresponds to an increase of 4.5 percent. The number of recorded genes increased 0.4 percent to 19,669.
Human geneticist: ‘This is a great scientific achievement’
It doesn’t seem like much at first, but is full decryption still a quantum leap? And what will this change in medicine?
“I’m not going to talk about a quantum leap, because that means going completely in a new direction, which is not the case here. But it’s a very respectable step forward, since you’ve penetrated areas of the DNA code that are difficult to analyze,” says Professor Dr. Wolfram Hen, a scientist Human Genetics at the University of Saarland and a member of the German Ethics Council.
“The research team managed to get into the most inaccessible parts of the desert because of our genetic makeup, but they didn’t flip everything upside down before and didn’t claim to either.”
But why has there been frantic work to completely decode the genome? Was 92 percent not enough?
No, says Professor Hein. And for several reasons:
“Perfect knowledge is first and foremost that satisfies human curiosity. On the other hand, we can assume that hard-to-reach regions of the genome are also responsible for switching regions that affect other genes. And if we can access them and see the whole context, we also have opportunities Better for the development and use of medical treatments.In order to be able to use the so-called genetic scissors, with which the genetic material of each cell can be precisely modified, one must first of all know exactly where to put it.Full decoding can help in the future “.
Can we all clone each other soon?
However, the genetics expert does not see that the researchers’ work will help us all to clone in the future.
Professor Henn on Bild: “Cloning has little to do with genetics because it is a reproductive medicine technique in which genetic information is taken unchanged. On the other hand, genetic engineering does not reproduce, but changes. So knowledge of the genome has relatively little effect on cloning. By decoding the control genes for early embryonic development processes, we will better understand how errors occur in cell division. These will be very important findings for cancer research, which could then lead to direct treatments.”
Treating rare genetic diseases thanks to gene therapy
But the researchers’ findings will not only play an important role in future medicine: there are already genetic diseases for which decoding the genome means the direct route to treatment, says Professor Hein.
“In the case of some hereditary muscle wasting diseases, direct gene therapy can help prevent further breakdown of muscle cells. Another example is Gaucher disease which has a metabolic defect, in which a specific enzyme is not produced. Through genetic sequencing, one learns what It is the enzyme that is already missing and can be produced artificially as an infusion. Decoding the genome eventually helped provide sufferers with very expensive but life-saving treatments.”
However, the previous areas of application are relatively rare genetic diseases, Hen continues.
“The vast majority of common diseases, such as cardiovascular disease or cancer, are multifactorial, which means that genes are usually just one of many factors that cause disease. For us to be able to cure here in the future, in addition to decoding the genome, There are some other building blocks missing, which we need to research further – for example on the interactions of different genes and external influences on our genes.”
Study has double
Despite the impressive results, it should be noted that these results have not been confirmed by independent experts. So far, the study has only been uploaded to the BioRxiv prepress server.
But what does this mean? So do we have to wait until we can really talk about a full decryption?
Human geneticist Hein is optimistic: Some well-known genetics experts are participating in the study. So I suppose it is serious work and that the reason the study was initially published as an introduction to print is a strategic approach to publication. Similar to how the polar expeditions were about who entered the area first. But one need not expect anything to be tossed or crushed while studying.”
However, there is one limitation, and the research colleagues themselves have pointed out this. So far, only one human genome has been fully worked out.
“In order to understand the differences between humans, one now has to analyze a variety of the human genome. But it is still a big step that has been taken here. In their investigations, the researchers even delved into the so-called centromers, which are related to cell division and which are difficult to break. Long way there. Respect!”
“Total coffee aficionado. Travel buff. Music ninja. Bacon nerd. Beeraholic.”
|
Military architecture has been in existence for several centuries all around the world. The ideas developed and implemented in this type of architecture are what helped the armed forces solve their regular civilian problems. Just like any other type of architecture, military architecture has its own elements, specifications, and functions.
In this article, we will learn more about military architecture.
Military architecture is a type of architecture that aims to design and build fortifications in order to defend territories in warfare and protect all people involved.
Defensive walls have been built for decades in many different countries from the very early history to current modern times.
When comparing military architecture to traditional architecture, you will find many big differences. Some of these differences are that military architecture has the main focus on function, safety, and security, not aesthetics or style.
Military buildings are not created to attract attention, it is also meant to save money on aesthetic finishes. However, the military must be comber table and suitable for all workers to live in. This will not only make it easier for military workers to do their jobs but also ensure the encouragement of workers as it keeps them motivated.
The strategic support of military architecture involves the construction and maintenance of essential communication and transportation lines.
Moreover, military operations depend on this type of support in order to access the required technology and infrastructure to achieve key objectives.
Meaning strategic support of military architecture merges technological developments with constructions and logistics.
This second element of combat engineering refers to all the engineering activities necessary on the battlefield to help improve different strategic conditions in a war zone.
This type of support is used by military groups in order to create a steady physical cover to protect them and their soldiers from the enemy.
Finally, ancillary support is used to emphasize the methods of development in order to distribute the intelligence of military architecture to all combat unite and different tactical groups.
It is also helpful in creating maps that are used by soldiers and officers in the field.
Once again, military architecture is extremely common and has been in existence and used for several centuries in many countries around the world.
It started when people were in competition for territory; they were not able to get to an agreement so they decided to use force. As a result, military architecture helps people develop strategies required in order to solve the regular civilian problems faced in the field. There is always room for architectural innovation while still being able to serve the fundamental needs of the military workers. Military architects take care of the planning and design purposes. They ensure safety and security.
|
We’ve all seen one before. The frayed, worn-out toothbrush with bristles stretching and poking out every which way. Our dental office in Lyndhurst knows that sometimes we forget, and we use our toothbrushes until they reach the point of no return. But did you know that this can be bad for your oral, and even your overall health? It’s true! Worn down brushes and their battered bristles are a lot less effective at helping your teeth get clean.
The American Dental Association (ADA) recommends replacing your toothbrush every three to four months — and our Lyndhurst dental office couldn’t agree more! As a matter of fact, you don’t even have to wait that long. If the brush starts looked ragged and scary earlier than that, change it anyway. And keep an eye on your kid’s brushes too, as they need new ones even more frequently.
There’s been some conversation about the possibility of bacterial contamination in toothbrushes, but the ADA wants to set the record straight. Here’s the bacteria breakdown:
But guess what? Even though these germy scenarios exist, it doesn’t necessarily have any effect on your body. This is due to another interesting fact: your body is regularly exposed to germs and can usually fight them off.
While some germs are bound to inhabit your toothbrush, there are a few steps you can take to limit any extra ones from nestling in.
1) Keep it to yourself – don’t share your toothbrush with anyone else.
2) Rinse well – use tap water to help remove debris and toothpaste.
3) Return to upright position – store your toothbrush standing up and allow to air-dry.
4) Separation works too – store multiple brushes separately to avoid germ transfer
The ADA also recommends avoiding using a toothbrush container that covers the brush completely. The moist environment could help germs multiply and grow. Gross!
Your dentist in Lyndhurst knows how important it is to keep your smile healthy. The same goes for your toothbrush. Make sure you’re changing it regularly, especially if it’s starting to look like it’s seen better days. Don’t forget to store your new brush properly to keep both you and your smile free from bad bacteria and germs. We always want you to feel your very best!
Accepting new patients from Lyndhurst, Cleveland, and Beachwood.
As always, I am always very satisfied when I see Dr. Young. His staff is always so professional. - Karin F.
|
Definition of booth in English:
1A small temporary tent or structure at a market, fair, or exhibition, used for selling goods, providing information, or staging shows.
- They set up temporary information booths at every village.
- The market opened 100 booths selling South Korean clothes on 2,600 square meters of floor last August.
- The exhibition booths show off everything from jewellery to furniture, from paintings to gourmet delicacies, from beauty and aromatherapy products to sculpture.
2An enclosed compartment that allows privacy, for example when telephoning, voting, or sitting in a restaurant.
- In the middle of the Mojave Desert is a phone booth housing the sole telephone for 16 miles in any direction.
- Wi-fi providers have targeted a growing number of potential venues within which to establish access points, including hotels, airports, phone booths and restaurants.
- I phoned Henning late that night in a phone booth near the restaurant.
Middle English (in the sense 'temporary dwelling or shelter'): from Old Norse buth, based on búa 'dwell'.
Words that rhyme with boothsmooth, soothe
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
Because of its equal focus on verbal and quantitative reasoning, psychology makes a versatile undergraduate major. Graduates are well-prepared to pursue a variety of paths:
- Social Services – Paraprofessional or administrative work in social service and mental health agencies is also a good option. But be aware that you’ll need an advanced degree to enter professional practice in these areas.
- Graduate School – If you want to become a clinical psychologist, social worker, or similar professional, you’ll be heading to graduate school to earn a PhD, PsyD or MSW degree. Check out the American Psychological Association's website for career information.
- Business – Typical jobs might include work in banking, retail, human resources, nonprofits and even entrepreneurship.
- Law – Many psychology majors decide to go to law school. They realize psychology’s constant emphasis on drawing conclusions by summarizing the conclusions of others has prepared them well because the law operates in the same way.
Art therapy is a mental health profession that integrates human development, visual art and the creative process with models of counseling and psychotherapy. Art therapy is used with people of all ages to assess and treat the following:
- anxiety, depression and other mental and emotional problems and disorders
- mental illness
- substance abuse and other addictions
- family and relationship issues
- abuse and domestic violence
- social and emotional difficulties related to disability and illness
- trauma and loss
- physical, cognitive and neurological problems
Art therapists are masters-level professionals who hold a degree in art therapy or a related field. They work in a number of settings including hospitals, clinics, public and community agencies, wellness centers, hospice centers, educational institutions, businesses, schools and private practices.
Each graduate school has its own requirements. However, all will require undergraduate course work in art and psychology as well as a personal portfolio (typically 15 examples in three or more different media).
You’ll need to earn at least 12 semester credit hours in psychology, including:
- general or introductory psychology
- abnormal psychology
- theories of personality
- psychometrics or research methods
Some schools may also require a course in lifespan development or child & adolescent development.
Clinical psychology is a doctoral-level profession that requires a state license to practice. Each state sets its own licensing requirements. In general, clinical doctoral programs approved by the American Psychological Association (APA) meet the standards of most states.
A student can pursue one of two paths when seeking to become a clinical psychologist: a PhD or a PsyD. PhD programs include extensive training in research methodology, while PsyD programs focus more on clinical training only.
Both PhD programs and PsyD programs would qualify you to earn a license to practice clinical psychology. It is the same license no matter which degree is earned. The main difference is that colleges and universities typically hire only psychologists with PhDs to teach and do research.
As an undergraduate at Dominican, you may choose either the general psychology or clinical psychology sequence. We strongly recommend that you pursue the BS degree if you want a career in clinical psychology.
Clinical psychology programs are ranked in the United States and Canada based upon the performance of their students on the Examination for Professional Practice in Psychology. This is only one measure of the quality of a doctoral program. Students are encouraged to discuss their career goals with their advisors.
School psychologists work with students individually and in groups. They also develop programs to train teachers and parents about many vital issues, including:
- effective teaching and learning strategies
- managing behavior at home and in the classroom
- working with students with disabilities or with special talents
- addressing abuse of drugs and other substances
- preventing and managing crises
School psychologists are trained in both psychology and education. They must complete a minimum of a specialist-level degree program (60 graduate semester credits). This is usually a two-year program that leads to a master’s degree. The training includes a 1,200-hour internship.
School psychology programs are often found in schools of education in major universities. Additionally, some professional schools of psychology may offer programs in school psychology. School psychologists must be certified and/or licensed by the state in which they work.
Social work is a masters-level profession, so graduate school is a must. Plan on allowing two years of full-time study to earn your Master of Social Work degree (MSW), although part-time study may be an option at some schools.
Social work is an independently licensed profession in all states. Social workers serve in many different settings including:
- community clinics
- private practice
- community agencies
Social work offers traditional areas of practice with specific clientele groups, including:
- mental health
- child welfare
- school social work
- medical social work
- crisis disaster management
Social workers can also focus on specific client groups, including adolescents, young parents or older adults.
If you choose, you may be able to continue your social work education at Dominican. The University’s Graduate School of Social Work is accredited by the Council on Social Work Education. Dominican also offers the Type 73 School Social Work Certification for those who want to work in the school setting.
|
Every year, malaria kills hundreds of thousands of people, most of them young African children. Malaria can be controlled through the use of medicines, insecticides, and insecticide-treated screens and bednets, and can be treated with antimalarial drugs. Currently, there is no licensed vaccine against malaria; however, several vaccines are under development.
On the PATH website
- Among the various species of the malaria protozoan parasite, Plasmodium falciparum is the deadliest.
- Every year, P. falciparum malaria causes the deaths of hundreds of thousands of people, most of them sub-Saharan children younger than five years of age. Malaria also contributes to anemia in children and pregnant women, low birth weight, premature birth, and neurological damage. Hundreds of millions of cases of malaria occur every year.
- Malaria is transmitted by the female Anopheles mosquito, of which there are more than 40 species. Malaria transmission, which is affected by climate and geography, often coincides with the rainy season.
- Malaria-control strategies include the use of medicines, insecticides, and insecticide-treated screens and bednets. Control programs led to the elimination of malaria from Australia, Europe, and the United States by the 1950s.
- Malaria can be treated with a regimen of antimalarial drugs based on the type of infection and status of the patient.
- No licensed vaccine against malaria currently exists.
- The malaria vaccine community aims to license—by 2015—a first-generation vaccine that has 50 percent efficacy against severe disease and death, with protection lasting at least one year without the need for boosting.
- Data from the Phase 3 trial of the most clinically advanced malaria vaccine candidate, RTS,S, was submitted for regulatory approval by the European Medicines Agency in 2014. A response is expected in 2015, paving the way for a possible policy recommendation from the World Health Organization.
- According to the Malaria Vaccine Funders Group’s Malaria Vaccine Technology Roadmap, next-generation vaccines should show at least 75 percent efficacy against clinical malaria, be suitable for use in all malaria-endemic areas, and be licensed by 2030.
- Malaria vaccines in development include: pre-erythrocytic or liver-stage vaccines that aim to protect against the early stage of malaria infection; blood-stage vaccines that aim to reduce the severity of disease; and transmission-blocking vaccines that are intended to prevent mosquitoes that fed on an infected person from spreading malaria to new hosts.
- The development of malaria vaccines is complex for several reasons:
- The size and genetic complexity of the parasite mean that each infection presents thousands of antigens to the human immune system. Understanding which of these can be a useful target for vaccine development has been complicated, and to date at least 40 promising antigens have been identified.
- The parasite changes through several life stages even while in the human host, presenting a different subset of molecules for the immune system to combat at each stage.
- The parasite has evolved a series of strategies that allow it to confuse, hide, and misdirect the human immune system.
- It is possible to have multiple malaria infections of different strains at the same time.
- World Health Organization. Malaria.
- Medicines for Malaria Ventures. MMV at a Glance.
- PATH. Malaria Vaccine Initiative.
- Malaria Vaccine Funders Group. Malaria Vaccine Technology Roadmap.
Page last updated: December 2015.
Photo: PATH/Amy MacIver.
|
Gauri Vrat is an important ritual performed by unmarried women and young girls in the month of Ashadha (July – August). In 2016, the dates of Gauri Vrata is from July 15 to July 19. The Vrata is dedicated to Goddess Parvati. (Gauri is another name of Goddess Parvathi). It is mainly observed by unmarried women in
Gauri Vrata is observed for five days and begins on the eleventh day in the waxing phase of the moon in the month of Ashada and ends on the Purnima day. A unique ritual of growing corn shoots is observed during the five days.
Legend has it that Goddess Parvati had performed this Vrat to get Lord Shiva as her husband. Therefore there is a widespread belief that those who observe Gauri Vrata will get an ideal husband.
During Gauri Vrata, unmarried girls observe a partial fast and perform pujas dedicated to Goddess Parvati. During the five days salt is strictly avoided. Food eaten is mainly made of wheat flour, ghee and milk. Different types of fruits are also consumed.
Those observing Gauri Vrata grow corn in a small pot. Sun and the tender corn shoots are worshipped on all day along with Goddess Parvati.
|
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- proper noun the native language of the
Isle of Man.
Sorry, no etymologies found.
With the death of Ned Maddrell in 1974, Manx Gaelic expired as a "mother tongue," leaving carvel (a native form of carol) as its only English epitaph.
|
OR WAIT null SECS
In these types of IR imaging, various factors contribute to the observed resolution. These factors are illustrated with images of materials with known structures.
When images are measured in reflectance, the observed structure is not necessarily just that of the sample surface. The two-dimensional (2D) images produced by near-infrared (NIR) and mid-IR imaging are representations of three-dimensional (3D) objects. In reflectance images the effective spatial resolution is affected by how far the radiation penetrates into the sample as well as by diffraction and the pixel size. NIR images are typically dominated by diffuse reflection with the result that in practice spatial resolution is limited by the penetration depth. Mid-IR reflectance images may contain both specular and diffuse components. These have different spatial resolutions as the specular component shows purely surface structure. In attenuated total reflectance (ATR) images the resolution has a component that depends on the distribution of components within a surface layer corresponding to the penetration depth, which is proportional to wavelength. We illustrate these different contributions to the observed resolution with images of materials with known 2D and 3D structures.
What do we measure in reflection? For the majority of samples, transmission measurements are not possible so spectra have to be obtained by reflectance. This involves either external reflection, often divided into specular and diffuse reflection, or attenuated total reflection (ATR). What you see in external reflection is the sum of what is reflected from the surface (specular or Fresnel reflection) and what penetrates into the sample before emerging (diffuse reflection). You see only surface reflection from a continuous uniform material where radiation that penetrates is not scattered back to the surface. Very strongly absorbing materials also show only surface reflection as the radiation that penetrates is all absorbed. With scattering materials some radiation that penetrates the material returns to the surface by encountering interfaces where there is a change of refractive index. The relative amounts of surface and diffuse reflection depend on the absorptivity and particle sizes of the sample and are wavelength dependent. Small particle size and weak absorption increase the amount of diffuse reflection. In practice, diffuse reflection dominates in the near infrared (NIR) whereas spectra in the mid-IR often show significant contributions from both surface and diffuse reflection.
How does this affect spatial resolution? In an imaging experiment, separate spectra are measured for each pixel while the incident radiation covers the whole area. If reflection comes only from the surface, the spatial resolution should depend simply on diffraction and the pixel size. However, any radiation that penetrates a scattering sample takes a random path through the material and will not all return to the point at which it entered the sample. Thus, the radiation contributing to any pixel in the image is a combination of rays from some volume underneath the point on the surface that is being observed. The deeper the radiation can penetrate into the sample and return without being absorbed, the larger this volume will be. If we assume isotropic scattering, the average lateral displacement from the point of incidence to where the radiation emerges will be similar to the average depth to which the radiation penetrates. This will cause blurring of the image by an amount that depends on the average penetration depth. There have been several attempts to estimate the depth that the radiation penetrates (1,2). These suggest average values in the range of 50–100 μm for NIR observations of materials such as pharmaceutical tablets. As a result, the spatial resolution achieved in NIR reflection images is likely to be in this range. This is in contrast to what is observed with the metal-on-glass reflection targets normally used where diffraction limited spatial resolution is better at the shorter wavelengths of the NIR region than in the mid-IR.
Figure 1: Diffuse reflection and transmission.
One way to estimate the penetration depth is by comparing the band intensities in transmission and reflection for a scattering sample. The absorbance is proportional to the distance traveled inside the sample. In transmission, this distance is proportional to the thickness of the sample, but in reflection it is proportional to twice the average penetration depth (Figure 1). One sample used was an acetaminophen tablet ground down to a thickness of 1.1 mm. The ratio of the absorbances at 8800 cm-1 measured in transmission and reflection is 18:1. From this, the average penetration depth is calculated as 30 μm (Figure 2). Similar measurements on pressed pellets of other materials give average depths of 40 μm to 60 μm (Table I). Because these are average depths we can conclude that some rays must penetrate significantly further. This will produce blurring of 50–100 μm.
Figure 2: Spectra of an acetaminophen tablet.
We prepared a sample by pressing a pellet of microcrystalline cellulose on top of a pressed pellet of polyethylene, giving a flat boundary between the two materials. Microtoming one edge of the pellet in a direction parallel to the interface gave a flat sample with the boundary perpendicular to the surface. Images were obtained with a PerkinElmer Spotlight system with a pixel size of 6.25 μm over the 6000–1400 cm-1 range (Figure 3). The spectra include dispersive features characteristic of Fresnel surface reflection such as the polyethylene CH2 absorptions around 2900 cm-1, strong absorptions such as the broad cellulose OH band at 3500 cm-1, and weak NIR absorptions.
Table I: Estimated NIR penetration depths
As expected, an image based on the polyethylene CH2 feature at 2864 cm-1 (Fresnel reflection) has a sharp boundary. In addition, it reveals an anomaly on the surface of the polyethylene layer at a distance of about 50 μm from the interface. An image of the strong cellulose OH absorption at 3600–3400 cm-1 shows a similar sharp boundary and indicates that the anomaly results from a flake of cellulose, something that is confirmed from the individual spectra. The sharp boundary illustrates how the strong absorption limits radiation that penetrates the sample returning to the surface. In contrast, the weak absorptions of the NIR region lead to much more diffuse images with features from one layer visible up to 100 μm away from the boundary. The polyethylene layer has significantly less scattering than the cellulose layer, which probably explains why the cellulose features appear to extend farther beyond the boundary.
Figure 3: Images from a two-layer sample.
The effective penetration depth is related to the wavelength λ, the refractive indices of crystal and sample n1 and n2, and the angle of incidence θ.
The effective penetration depth dp is given by
where λ is the wavelength, n1 is the refractive index of the crystal, θ is the angle of incidence, and n21 is the ratio of refractive indices of sample and crystal.
In the converging beam of a microscope there is a range of angles of incidence, so it is appropriate to determine the effective penetration depth experimentally. We have compared the absorbance of liquid paraffin measured by ATR and by transmission of a film with known thickness. In the Spotlight system, using a germanium crystal the penetration depth with an organic material of refractive index 1.4 dp is expected to vary from about 0.6 μm at 3000 cm-1 to about 2.6 μm at 700 cm-1. Comparison with a transmission spectrum of paraffin oil demonstrates that the equivalent pathlengths for ATR are fairly similar to this (Table II).
Table II: Effective pathlengths for ATR imaging
When the boundary between regions is not normal to the surface, the penetration depth will affect the spatial resolution. To demonstrate this we prepared samples consisting of two layers, polystyrene and an acrylic resin. In one the boundary was normal to the surface and in the other the boundary was at 10° to the surface (Figure 4). In the latter, the polystyrene layer 10 μm from the boundary at the surface is 1.8 μm thick. Images of the two were obtained with a pixel size of 1.56 μm.
Figure 4: ATR images of two-layer samples.
Images of the two samples show that the edge appears much more diffuse in the sample where the boundary is at 10° to the surface (Figure 4). Penetration through the polystyrene layer allows the acrylic material to be detected up to 10 μm away from the apparent boundary on the surface. Intensity profiles of the acrylic resin at different wavelengths clearly show how longer wavelengths detect the subsurface layer at greater depths. The profile at 1137 cm-1 is very unsymmetrical, extending about 15 μm beyond the surface boundary (Figure 5).
Figure 5: Specific frequency images.
In looking at reflection images it is important to remember that samples are three dimensional and that spectra may be generated from a finite volume, not just from the immediate surface. The boundaries between regions may, therefore, appear broader than those seen in visible images. This is most apparent in near-IR images where the resolution is likely to be limited by lateral scattering within the sample rather than by diffraction or the pixel size. In ATR images, the penetration depth allows spectral contributions to be seen from subsurface material.
(1) F.C. Clarke et al., Appl. Spectrosc. 56(11), 1475 (2002).
(2) S.J. Hudak, K. Haber, G. Sando, L.H. Kidder, and E.N. Lewis, NIR News 18(6), 6 (2007).
Jerry Sellors and Richard Spragg are with PerkinElmer in Seer Green, Bucks, United Kingdom.
Direct correspondence to: firstname.lastname@example.org
|
The wealth gap between the developed core nations and the maldeveloped periphery is difficult to ignore. However, the nature of this inequality is not static and determined like neo-classical economics would seem to indicate. Rather, this inequality is the continuing result of the imperialist processes of superexplotiation in the Third World.
Understanding the global processes of imperialism and its relationship to wage scaling between the core and periphery is pivotal to a correct analysis of the present social reality and therefore is key to the correct application of correct theory.
So what is wage scaling? Wage scaling is the process by which the average wage for a specific form of labor or abstract labor is priced from region to region. For example, the average textile worker in the United States makes around USD 17.70/hr while his Latin American counterpart makes only USD 1.21/hr . One can find similar examples in nearly all professions but also in abstract labor. Where the average worker in the world receives an income of about USD 1250/yr, his american equivalent receives about USD 29000/ yr . This difference in wage scaling can be attributed to the imperialist relationship between the core and periphery nations. For the last five centuries most of Asia, South America, and Africa have been colonies of the wealthier core regions (e.g. US, Europe, Japan). Even now with nominal independence these ‘free’ nations remain entirely subservient to the Global North. Efforts by neoliberals and their functionaries in the IMF to ‘promote domestic growth’ have only created desperate material conditions and reinforced the Western monopsony (where there is only one buyer of goods) in underdeveloped periphery markets.
This incredible wealth built through centuries of imperialist domination and the export of capital (including labor in slaves) and continuing processes have created an environment of decadence in much of the First World. Where privileged world minorities live royally off the value extracted from the international proletariat located mostly in the periphery. All of this contributes towards the exploitative scaling of wages that occurs between the core and periphery .
Now many Core-Centric Marxists will point to the observable fact that low profits can be produced in low wage production and high profits produced in high wage production. Clearly no one should deny this. As profit is derived from the movement of surplus value, and surplus value is determined by the value of the labor minus the wage paid. Therefore a worker who produces USD 20/hr of value and is paid USD 10/hr creates more surplus value than a worker paid USD 5/hr who produces USD 8/hr.
This model is true; however, this model is a false equivalent to the relationship between core and periphery wage scaling. The reason is because on average core ‘workers’ do not produce enough value to cover the difference in wage and produce a similar rate of exploitation. Because the productivity is so similar and the wage scaling so unequal we see that many core ‘workers’ produce less value than they are compensated for in wages. This is what has begun to be termed imperialist rent as the core ‘worker’ becomes an indirect if not direct beneficiary of the global imperialist system. The reason is because of superexploitation taking place in the periphery. As Marx points out the market is a zero-sum realm. In the global capitalist economy we observe what can be termed the redistribution of value through exchange. Contrary to popular belief not all exchange is between two equals and especially so between the core and periphery .
This global phenomena can be termed the difference between value added and value captured. The difference between the sum of value added by a nation to the world social product and the value realized in profits, wages, etc.
A common response of course is that if many core ‘workers’ are not exploited, why is the enterprise and the capitalist still extracting a profit?
It’s false to suggest that there has to be exploitation in that process for there to be profit. There needs to be exploitation in the social process and circulation for profit to be derived. Profit does not necessitate exploitation in every part of the social process . The national competitive capitalism of the early 19th century has produced the modern global and monopolist form of capitalism where the labor process and division of labor has been realized up on a global scale.
For example, the average multinational CEO is paid millions of dollar a year yet he does not directly own the company but is employed by the shareholders who make a profit from his running of the enterprise. He is paid a massive sum and profit is still derived from his contribution in the social production. Is the CEO exploited? Is the value of his labor really worth that much?
In a more popular example, is Justin Bieber exploited? His record label grosses hundreds of millions of dollars from the combined labor of he and his team of performers, producers, etc. Yet, Justin Bieber lives with such incredible material wealth few can truly imagine the level of decadence he engages in. Is he also exploited?
The moral of the story is that profit does not necessitate exploitation or the extraction of surplus value in that stage of the social process.
Marx also references the process by which ‘labour exploits labour’ .
Since the quality and intensity of the work are here controlled by the form of wage itself, superintendence of labour becomes in great part superfluous. piece wages therefore lay the foundation of the modern “domestic labour,”… piece wages facilitate the interposition of parasites between the capitalist and the wage-labourer, the “sub-letting of labour.” The gain of these middlemen comes entirely from the difference between the labour-price which the capitalist pays, and the part of that price which they actually allow to reach the labourer. In England this system is characteristically called the “sweating system.” On the other hand, piece-wage allows the capitalist to make a contract for so much per piece with the head labourer — in manufactures with the chief of some group, in mines with the extractor of the coal, in the factory with the actual machine-worker — at a price for which the head labourer himself undertakes the enlisting and payment of his assistant work people. The exploitation of the labourer by capital is here effected through the exploitation of the labourer by the labourer.
The footnote for this selection adds,
Even Watts, the apologetic, remarks: “It would be a great improvement to the system of piece-work, if all the men employed on a job were partners in the contract, each according to his abilities, instead of one man being interested in over-working his fellows for his own benefit.”
Understanding all of this, completely factual conclusions can be drawn using Marxist methodology .
The level of exploitation depends on the actual ratio between the “necessary labour” (the wages) and the “surplus labour”… If you can secure more surplus-value for your wages than you have created, you are not being exploited, but you are exploiting.
To speak even more specifically one must realize the obvious division of labor that has taken place around the globe where the core regions have become the “cities of the world” in contrast to Africa, Asia, and South America: “the rural areas of the world” . An observable qualitative change has been the creation of a consumerist and retail oriented economy in the core that allows for a high rate of value captured. In 2009, retail, strictly understood, made up directly USD 1.2 trillion in economic activity: 8.5% of the national GDP. However, when incurring indirect and induced economic activity, the retail industry made up a whopping 17.6% of total GDP, or USD 2.48 trillion in total economic activity ; which is significantly more than the total GDP added by the durable/non-durable, construction, and mining sections of the economy, combined, two years later .
With so much of the GDP hinging on this form of economic activity how might this affect the analysis of a modern Communist? Well, Marx tackled the issue of retail when he answered the question of merchant capital which is the equivalent to the retail economy today .
In one respect, such a commercial employee is a wage-worker like any other. In the first place, his labour-power is bought with the variable capital of the merchant, not with money expended as revenue, and consequently it is not bought for private service, but for the purpose of expanding the value of the capital advanced for it. In the second place, the value of his labour-power, and thus his wages, are determined as those of other wage-workers, i.e., by the cost of production and reproduction of his specific labour-power, not by the product of his labour. However, we must make the same distinction between him and the wage-workers directly employed by industrial capital which exists between industrial capital and merchant’s capital, and thus between the industrial capitalist and the merchant. Since the merchant, as a mere agent of circulation, produces neither value nor surplus-value (for the additional value which he adds to the commodities through his expenses resolves itself into an addition of previously existing values, although the question here poses itself, how he preserves this value of his constant capital?) it follows that the mercantile workers employed by him in these same functions cannot directly create surplus-value for him.
In short, Marx describes retail value as labor that is unproductive; labor which produces no surplus-value for the capitalist.
So does this mean that all First Worlders are net-exploiters? Not necessarily. In fact much of the International Proletariat resides in the core regions. Sub-sections of the working class such as oppressed blacks, chicanos, and native laborers and the lumpenproletariat. People who are not only exploited materially but also remain victims of the White social hegemony and racist ideology that First Worldist economism has undertaken; an ideology which ostracizes, alienates, and neglects racial minorities and scapegoats them for the purpose of core-centric economism. For example, many First Worldists, even “left” organizations argue against Chicano Liberation on the basis of economism; arguing that supporting migrant workers disrupts the economic status of the White proletarian .
What is crucial to understand here is that a Maoist (Third-Worldist) is not periphery-centric in the way that a Euro-Marxist is core-centric. The primary course of action for any Communist is to support the international proletariat and oppressed peoples of the world in global people’s war and class struggle. It is not biased to say that the vast majority of the world’s working class resides in the periphery, it is factually accurate when applying correct Marxist theory. Therefore supporting the victory global people’s war and proletarian internationalism is parallel to a Maoist (Third-Worldist) understanding of imperialism and its processes.
Moreover, our concrete analysis of the present social realities should translate into correct conclusions about the nature of the First World ‘worker’.By now it should be obvious that members of the net-exploiting classes in the core have a material interest in preserving capitalism and imperialism . While its entirely true that a socialist revolution would materially benefit the vast majority of the world, this select group of privileged individuals who make up what some still consider the “working class” in the core would not benefit materially. Their class interests are hedged towards supporting imperialism which we see manifested not directly, through direct exploitation, but indirectly through political support of capitalism and global hegemony. It is for this reason that we cannot hope to ally ourselves with this class of net-exploiters. The duty of the Communist is to support the international proletariat and global people’s war, not preserve the privilege of a select minority or exempt some from the reality of expropriation.
So the question then arises: what if I am a member of this class but support global people’s war and the class struggle? Many readers and Communists residing in the core are no doubt in this position. The answer is simple. Class suicide . Clearly not in the literal sense but in the concrete struggle against the privilege of your class. To be a class traitor. Obviously more will be said about this form of struggle in the future but for now the important part is realizing how are material relations are influencing this social reality. That by being middle class in the First World, one is no doubt benefiting from the exploitation of workers in the periphery. After realizing this, one must begin to take the correct position and advocate for socialism. World socialism. Not simply socialism to benefit this specific nation above the interests of another oppressed group. But an international socialism that brings all power to the people.
Until we recognize the proper analysis of the present social realities and accept the subsequent responsibilities, we cannot take proper action. For proper action requires proper theory. The question then is, are we Euro-Marxists, or are we Marxists? Are we eurocommunists or are we Communists? That question seems yet to be answered.
CorpWatch. Maquiladoras at a Glance
US Census Bureau. Median Income for Total Labor Force.
Cope, Zak. 2012. Divided World Divided Class: Global Political Economy and the Stratification of Labour Under Capitalism.
Ibid. p. 167-8
Ibid. p. 198-200
Smith, John. The GDP Illusion: Value Added versus Value Captured
Cope. p. 176
Marx. Capital, Vol. I Chap. 21 Piece Wages
Communist Working Group. 1986. Unequal Exchange and the Prospects of Socialism
Lin Biao. Long Live the Victory of People’s War!
National Retail Federation. August 2011. The Economic Impact of the US Retail Industry.
U.S. Bureau of Labor Statistics. Consumer Price Index 2011, Detailed Report
Marx, Engels. Capital Vol. III Chap. 17 Commercial Profit
Cope. p. 270-74
Ibid. p. 329
Brown, Nick. 2013. Amilcar Cabral’s Theory of Class Suicide and Revolutionary Socialism.
|
Bad breath, also known as halitosis, is a common dental issue faced by many patients.
it can lead to lot of social embarrassment and may often be bought to notice by
Most commonly it happens due to poor oral hygiene, gum infections, dry mouth, food
lodgement due to tooth cavities, habits like smoking, tobacco chewing and sometimes
due to nose throat or gastrointestinal infections.
|
Climate change threatens the world with drought, rising sea levels, powerful storms - and a global beer crisis, say researchers.
The effects of global warming are likely to lead to sharp falls in crop yields of barley, an essential beer ingredient, scientists predict.
Droughts and heat waves were expected to cause barley declines of up to 17% in parts of the US, Europe, Australia and Asia where the grain is grown most.
As a result, the cost of beer could soar. According to the US scientists’ economic model, the price of a six-pack of beer could go up by an extra 20 dollars (£15) in Ireland.
Research co-author Dr Steven Davis, from the University of California at Irvine, US, said: “The world is facing many life-threatening impacts of climate change, so people having to spend a bit more to drink beer may seem trivial by comparison.
“But there is definitely a cross-cultural appeal to beer, and not having a cool pint at the end of an increasingly common hot day just adds insult to injury.”
Only 17% of the barley produced in the world is used in brewing, the authors point out. Most is harvested as feed for livestock.
The researchers predicted that hungry animals would be first in the queue for available barley, ahead of thirsty humans.
Barley growing regions including the northern Great Plains of the US, the Canadian prairies, Europe, Australia, and the Asian steppe were all likely to experience more frequent droughts in years to come as a result of global warming, the study in the journal Nature Plants reported.
Beer prices were predicted to rise most in wealthy beer-loving countries such as Belgium, Canada, Denmark and Poland.
Co-author Dr Nathan Mueller, also from the University of California at Irvine, said: “Current levels of fossil fuel consumption and CO2 (carbon dioxide) pollution - business as usual - will result in this worst-case scenario, with more weather extremes negatively impacting the world’s beer basket.
“Our study showed that even modest warming will lead to increases in drought and excessive heat events in barley-growing areas.”
|
Resistance training (RT) is a well-documented exercise modality to improve several physiological and psychological health parameters (Fiuza-Luces, Garatachea, Berger, & Lucia, 2013). RT has been demonstrated to decrease visceral fat, glycated hemoglobin, low-density lipoprotein, and triglycerides, increasing glucose transporter type 4, increase muscle and bone mass. Also, benefits of RT also include improved physical performance, movement control, functional independence, cognitive abilities, body composition, body image, and self-esteem (Westcott, 2012). Despite several exercise-benefits, 40% to 65% of individuals initiating exercise programs are predicted to dropout within 3 to 6 months (Annesi, 1998,2003). Concerning attendance and membership records in fitness centers, Sperandei et al. (2016)reported that dropout reached 47% already by the second month, 86% by the sixth month, and was nearly complete 96% by the twelfth month. It is possible that many individuals may be either unmotivated or not sufficiently motivated to participate in exercise programs regularly.
Self-determination theory (SDT) provides a useful theoretical foundation for the investigation of exercise-related motivations and behaviors, based on the fact that people are moved to act by different reasons, with highly varied experiences and consequences (Ryan & Deci, 2007). SDT points out a distinction between intrinsic motivation, which involves engaging in a behavior because of its inherent satisfactions (i.e., for enjoyment, interest, and challenge). Extrinsic motivation, in contrast, suggests engagement in behavior for instrumental reasons, or to achieving a separate consequence from the activity per se (i.e., gain a social reward, or avoid disapproval) (Ryan & Deci, 2007). The proponents of SDT present that extrinsically motivated behaviors are distributed through a continuum of self-determination, which is composed of four regulations progressively more internalized (autonomous) (Ryan & Deci, 2007): external regulation (behavior controlled by obtain external rewards or avoid punishments), introjected regulation (doing an activity to avoid internal pressure and self-esteem-related contingencies), identified regulation (recognition of the value of a behavior), integrated regulation (engagement in a behavior because it is consistent with the person’s core values and beliefs). In the context of exercise, people more autonomously motivated are more likely to engage in regular exercise behavior (Edmunds et al., 2006). In their systematic review, Teixeira et al. (2012)demonstrated a consistent positive effect of autonomous regulation on exercise behavior. Furthermore, longitudinal research showed that when intervention emphasized enjoyment, mastery, and challenge rather than the outcomes of exercise, intrinsic motivation was the better predictor of moderate and vigorous exercise (Silva et al., 2011).
Participation motives are the contents of individual’s goals for a particular domain of behavior (Ingledew, Markland, & Ferguson, 2009). Exercise motives are considered as essentially intrinsic (e.g., seeking affiliation, personal growth, enjoyment and health) as those viewed to be more nearly related to the satisfaction of BPN, or extrinsic (e.g., social recognition, appearance) those typically are not truly or universally essential to well-being and personal growth (Weman-Josefsson, Lindwall, & Ivarsson, 2015). In fact, intrinsic exercise-related motives are associated with higher exercise adherence (Ryan, Frederick, Lepes, Rubio, & Sheldon, 1997), although no direct influence has already been documented (Teixeira et al., 2012).
The basic needs theory, a sub-theory of SDT, proposes that autonomous motivation arises from individual’s innate tendency to satisfy three basic psychological needs (BPN): relatedness (the need to establish and sustain meaningful connections with others), autonomy (sense of ownership over the behavior) (Weman-Josefsson et al., 2015)and competence (need to master personally challenging activities as opposed to trivial or meaningless tasks) (Rodgers, Markland, Selzler, Murray, & Wilson, 2014). In SDT, “needs specify innate psychological nutriments that are essential for ongoing psychological growth, integrity, and well-being” (Deci & Ryan, 2000).
Recently, there has been growing interest in CrossFit literature regarding psychological and behavioral indicators. For example, exercise motives are dependent upon type or modality of exercise. Fisher et al. (2017)showed that CrossFit participants reported more intrinsic motives to exercise such as enjoyment, challenge, and affiliation, while traditional RT practitioners indicated more health-related motives such as ill-health avoidance and weight management. Such difference may also be found between male and female participants. Other investigation verified gender differences in the motivation between men and women CrossFit members. The authors found that men had higher levels of performance goals, while women reported more mastery-based goals (Partridge, Knapp, & Massengale, 2014). To the best of our knowledge, only one study using mediating analysis has focused on CrossFit participants to examine the relationship between STD framework and exercise participation. Sibley and Bergman (2017)observed in 322 CrossFit members that intrinsic goals predicted psychological need satisfaction. Furthermore, participation frequency was positively predicted by intrinsic regulation, intrinsic goals content, and competence need satisfaction.
Considering the marked growth and popularity of CrossFit, we use the SDT framework to a better understanding of the motivational factors that drive individuals to participate in such exercise program. Identifying differences in individual’s motivation is crucial to tailor appropriate strategies to facilitate exercise adherence. Therefore, the purpose of the present study was to investigate the motivational factors, behavioral regulations based on SDT, and the relationships between basic psychological need satisfaction and actual exercise behaviors of CrossFit and traditional RT participants. We tested a model of mediation in which competence and intrinsic regulation could mediate the relationship between enjoyment and actual exercise behavior.
2. Material and Methods
A total of 493 participants (males = 351, females = 148) from Brazil completed the questionnaires, from two categories: traditional resistance training (RT; n = 365, 279 males, 86 females; age 28.6 ± 6.84 years; body mass 77.6 ± 14.5 kg; height 173.3 ± 9.09 cm; IMC 25.6 ± 3.6 kg/m2) and CrossFit (n = 128, 69 males, 59 females; age 30.1 ± 6.8 years; body mass 73.4 ± 12.4 kg; height 170.7 ± 9.02 cm; IMC 24.9 ± 2.9 kg/m2). Individuals were eligible to participate in the study if they were adult (18 - 50 years), and attended a gym, fitness center, or CrossFit box frequently. Local ethical committee approved the experimental procedures (72429517.8.0000.8084).
A single online questionnaire was created through Google Forms and promoted on social media (Facebook page) of the authors with advertising text. The questionnaire link was open for approximately two months of 2017. All participants completed the questionnaire voluntarily and anonymously and did not receive any financial or another reward for their contribution. The average time of filling out the survey was 20 minutes. This research is characterized as a fieldwork and should be considered as a mostly descriptive cross-sectional study. The demographic portion of the survey comprised questions designed to elicit responses about participant’s age, gender, marital status, and education levels.
2.3.1. Behavioral Regulations for Exercise
Behavioral regulations were assessed using the Behavioral Regulations in Exercise Questionnaire-3 based on SDT (BREQ-3) (Wilson, Rodgers, Loitz, & Scime, 2006). The BREQ-3 includes 23 items scored in a five-point scale ranging from 0 (not true for me) to 4 (very true for me) and contains six subscales that measure amotivation (e.g., “I don’t see why I should have to exercise”), external (e.g., “I feel under pressure from my family/friends to exercise”), introjected (e.g., “I feel guilty when I don’t exercise”), identified (e.g., “It’s important to me to exercise regularly”), integrated (e.g., “I exercise because it is consistent with my life goals”), and intrinsic (e.g., “I enjoy my exercise sessions”) regulation of exercise behavior. The BREQ-3 has been demonstrated a good factorial validity and was translated and validated for the Portuguese language (Guedes & Sofiati, 2015).
2.3.2. Basic Psychological Needs in the Exercise Scale
The Portuguese version of the Basic Psychological Needs in Exercise Scale (BPNES) is a self-report instrument developed specifically for the context of physical exercise by Vlachopoulos and Michailidou (2009), subsequently translated and validated for the Portuguese language (Moutão, Cid, Leitão, Alves, & Vlachopoulos, 2012); it is used to evaluate the perception that people have of the level of satisfaction of their basic psychological needs. The questionnaire was made up of 12 items grouped into three factors: autonomy (e.g. “the exercise program I follow at the facility is in keeping with my interests”), competence (e.g., “I have made great progress as far as a result pursued is concerned), and relatedness (e.g. “I feel very comfortable when I do exercise with other participants”). This questionnaire used a Likert-type scale ranging from 1 (totally disagree) to 5 (totally agree).
2.3.3. Perceived Autonomy Support Climate
The Portuguese version of the Perceived Autonomy Support: Exercise Climate Questionnaire (PASECQ) is a self-report instrument adapted to the context of physical exercise by Edmunds et al. (2006), based on the original version of Perceived Autonomy Support: Health Care Climate Questionnaire (Williams, Grow, Freedman, Ryan, & Deci, 1996), translated and validated for the Portuguese language (Moutão, Cid, Leitão, & Alves, 2012). This questionnaire consists of six items, which contribute to a single factor that evaluates the perception of autonomy support given by exercise instructor (e.g. “demonstrates confidence in my ability to perform the exercises”). The answers were responded by a Likert-type scale ranging from 1 (strongly disagree) to 7 (strongly agree).
2.3.4. The Exercise Motives Inventory-2
Motives for participation in RT and CrossFit programs were measures using the exercise motives inventory-2 (EMI-2) (Markland & Hardy, 1997). The EMI-2 assessed exercise participation motives (participatory motives, referring to the ‘‘why’’ of goal pursuit). The original questionnaire were translated and validated to Portuguese language (Guede, Legnani, & Legnani, 2012)and contains a total of 44 items, grouped in 10 subscales: enjoyment and well-being (6 items), stress management (4 items), social recognition (4 items), affiliation (4 items), competition (5 items), health pressures (3 items), ill-health avoidance (6 items), weight management (4 items), appearance (4 item), and strength and endurance (4 items). The responses of each question are made on a 6-point Likert-type scaleranging from 0 (not at all true for me) to 5 (very true for me).
2.3.5. Exercise-Related and Anthropometric Questions
Participants responded three questions that focused on their exercise-related habits. The questions concerned time elapsed from starting with training (in month or years), the average of exercise frequency in the last four weeks, and duration of the typical exercise training session. Weekly exercise volume (minutes) was determined by the product of frequency and exercise duration. Participant’s body mass and height were self-reported to calculate body mass index (BMI).
2.4. Statistical Analysis
Statistics analysis was performed using IBM SPSS 22 (SPSS Inc., Chicago, IL, USA). Results are expressed by mean ± SD values, and Pearson correlation was used to test association among study variables. MANOVA was used to compare exercise groups (i.e., resistance training vs. CrossFit) on the dependent variables of SDT, BPN, and EMI-2. Group’s samples sizes were very unequal. Therefore, a more robust MANOVA test statistics Pillai’s Trace was used, and the level of significance was set at p < 0.05. Eta partial squared ( ) was calculated for each MANOVA and univariate tests as a measure of effect size, considering 0.01, 0.06, and 0.14, as small, moderate, and large, respectively. The magnitude of the changes between groups was assessed using Cohen’s d effect size and presented with their 90% confidence interval. Threshold values for 0.2 (small), 0.6 (moderate), 0.8 (large), and 1.2 (very large) were considered.
PROCESS macro SPSS was used to multiple serial mediations (Hayes, 2018). Macro’s model 6 was applied with two mediators to provide the direct effect (c’) of the independent variable (X―enjoyment) on the dependent variable (Y― weekly exercise volume) and the indirect effect through mediator 1 (competence) and mediator 2 (intrinsic motivation). Bootstrapping with 5000 samples was used with bias-corrected. The indirect effect is considered significant if its 95% confidence interval does not cross zero (alpha = 0.05). No violations of the assumptions of linearity or homoscedasticity were observable through an inspection of scatterplots of the residuals indicating the data was suitable to undergo subsequent analysis. Variance inflation factors, tolerances, and Durbin-Watson statistics revealed no problems with collinearity and autocorrelation.
Previous studies have supported the construct validity of the Portuguese versions of PASECQ, BPNES, and BREQ-3 in Brazil, allowing its use in the subsequent statistical analysis (Cid, Moutao, Leitao, & Alves, 2012;Klain et al., 2015). Descriptive statistics for the groups are presented in Table 1. Univariate analysis indicated that participants in the RT group were older (p < 0.05), heavier (p < 0.01), taller (p < 0.05) and had higher BMI (p < 0.05) as compared to participants in CrossFit group. There was no significant difference in exercise frequency and weekly exercise volume.
MANOVA revealed a significant multivariate effect on the motives to exercise, Pillai’s trace = 0.271, F(10,482) = 17.9, p < 0.001, = 0.27 (90% CI [0.20, 0.30]). Univariate analysis indicated that CrossFit participants reported higher motives for enjoyment F(1491) = 8.90, p < 0.01, = 0.02 (90% CI [0.003, 0.04]), stress management F(1491) = 17.56, p < 0.001, = 0.03 (90% CI [0.01, 0.06]), social recognition F(1491) = 6.11, p < 0.01, = 0.01 (90% CI [0.001, 0.03]), affiliation F(1491) = 114.44, p < 0.001, = 0.19 (90% CI [0.13, 0.23]), competition F(1491) = 24.25, p < 0.01, = 0.05 (90% CI [0.02, 0.08]), and weight management F(1491) = 25.04, p < 0.001, = 0.05 (90% CI [0.02, 0.08]), compared to RT (Table 2).
3.2. Exercise Behavioral Regulation
MANOVA revealed a significant multivariate effect for exercise behavioral regulations, Pillai’s trace = 0.083, F(8484) = 5.45, p < 0.001, = 0.08 (90% CI [0.03, 0.10]). Univariate analysis showed a higher score for intrinsic motivation in CrossFit group F(1491) = 15.78, p < 0.001, = 0.03 (90% CI [0.01, 0.06]) and controlled motivation in RT group F(1491) = 4.91, p < 0.05, = 0.01 (90% CI [0.0005, 0.029]) (Table 3). There was no significant difference between any other subscale.
Table 1. Descriptive statistics. Data are expressed by mean ± standard deviation.
*Indicates significant difference compared to RT. RT = Traditional resistance training.
Table 2. EMI-2 subscales. Data are expressed by mean ± standard deviation.
*Indicates significant difference compared to RT. RT = Traditional resistance training.
Table 3. BREQ-3 and BPN subscales. Data are expressed by mean ± standard deviation.
*Indicates significant difference compared to RT. †Indicates significant difference compared to CrossFit. RT = Traditional resistance training.
Weekly exercise volume was examined by a tertile-split subgroup of intrinsic motivation (CrossFit and RT values collapsed) as presented in Figure 1. Weekly exercise volume was significantly different between subgroups of intrinsic motivation F(2490) = 14.98, p < 0.001, = 0.06 (90% CI [0.02, 0.09]). Tukey HSD revealed that practitioners with higher intrinsic motivation presented grater weekly exercise volume when compared to intermediate (p < 0.01, Cohen’s d = 0.44, 90% CI [0.27, 0.62]), and lower intrinsic motivation (p < 0.01, Cohen’s d = 0.51, 90% CI [0.32, 0.70]).
3.3. Basic Psychological Needs Satisfaction
Significant differences were observed between groups for satisfaction of BPN, Pillai’s trace = 0.116, F(3489) = 21.35, p < 0.001, = 0.11 (90% CI [0.07, 0.15]) (Table 3). Univariate analysis indicated that CrossFit participants had higher levels of perception of relatedness as compared with RT F(1491) = 21.06, p < 0.001, = 0.04 (90% CI [0.01, 0.07]), while RT participants demonstrated more autonomy than CrossFit practitioners F(1491) = 16.61, p < 0.001, = 0.03 (90% CI [0.01, 0.06]). There was no significant difference for perceived autonomy support and competence between groups.
3.4. Correlations Analysis
Correlations analyses were conducted between each of the variables of the BREQ-3 and BPN satisfaction. Consistent with SDT, there were significant associations between psychological needs and exercise behavioral regulation constructs. Perceived competence was positively related to identified regulation (r = 0.26, p < 0.01), integrated regulation (r = 0.51, p < 0.01), and with intrinsic regulation (r = 0.5, p < 0.01). As expected, perception of competence was negatively related external regulation (r = −0.17, p < 0.01). Perceived autonomy was associated with identified regulation (r = 0.27, p < 0.01), integrated regulation (r = 0.53, p < 0.01), intrinsic regulation (r = 0.38, p < 0.01). In the same way, relatedness satisfaction was associated with identified regulation (r = 0.19, p < 0.01), integrated regulation (r = 0.26, p < 0.01), intrinsic regulation (r = 0.30, p < 0.01).
Based on the results of T-tests, there was no significant difference between groups for exercise frequency and weekly exercise volume; therefore, correlations analysis was performed with pooled data. Exercise frequency (r = 0.24, p < 0.01) and weekly exercise volume (r = 0.22, p < 0.01) were positively related with intrinsic motivation. In addition, exercise frequency was positively associated with more autonomous forms of extrinsic motivation such as, identified regulation (r = 0.11, p < 0.05) and integrated regulation (r = 0.24, p < 0.01). External regulation was negatively related with exercise frequency (r = −0.24, p < 0.01) and weekly exercise volume (r = −0.17, p < 0.01). Regarding BPN, exercise frequency (r = 0.28, p < 0.01) and weekly exercise volume (r = 0.013, p < 0.01) were related to competence, while exercise frequency was associated to autonomy. In addition, exercise frequency and weekly exercise volume, respectively, were correlated with enjoyment (r = 0.20, p < 0.01; r = 0.16, p < 0.01), competition (r = 0.19, p < 0.01; r = 0.17, p < 0.01), and social recognition (r = 0.14, p < 0.01; r = 0.09, p < 0.05). Unexpectedly, Ill-health avoidance (r = −0.11, p < 0.05) was negatively related to weekly exercise volume.
3.5. Mediation Analysis
Figure 2presents the mediating effects of competence (mediator 1) and intrinsic motivation (mediator 2) in the relationship between enjoyment (independent variable) and weekly exercise volume (dependent variable), while sex, exercise modality (RT and CrossFit) and age were set as covariates.
Figure 1. Weekly exercise volume defined by tertile of intrinsic motivation. Higher = higher intrinsic motivation; Intermediate = Intermediate intrinsic motivation; Lower = Lower intrinsic motivation. *significant different as compared to intermediate and lower tertile p < 0.05.
Figure 2. Mediation analysis for enjoyment, competence, intrinsic regulation and weekly exercise volume. *p < 0.05; **p < 0.01; ***p < 0.001.
Enjoyment could significantly predict the perception of competence (path a1, b = 1.81, p < 0.001) and intrinsic regulation to exercise (path a2, b = 0.39, p < 0.001); therefore, participants who reported higher scores of enjoyment are more likely to perceive their competence and, in consequence, foster the intrinsic motivation to exercise.
As we expected, higher score of competence predicted intrinsic regulation to exercise (path d, b = 0.47, p < 0.001). Direct effect of enjoyment on weekly exercise volume was not significant (path c’, b = 1.59, t(486) = 0.13, p = 0.89, 95% CI [−21.6 to 24.8]), suggesting no evidence that enjoyment influenced the weekly exercise volume independent of their effects on competence and the intrinsic motivation. In addition, the total indirect effect of enjoyment through the two mediators (i.e., competence and intrinsic regulation) was significant (b = 26.9, 95% CI [12.6 to 31.9]).
The present study was designed to compare the motivational underpinnings of the CrossFit and traditional RT participation in order to advance understanding of motives for exercise, basic psychological need satisfaction, and behavioral regulation. In agreement with tenets of SDT in exercise domain, our findings showed that enjoyment, higher levels of competence need satisfaction, and intrinsic motivation all play a positive role in CrossFit and RT participation. Our data are in agreement with previous articles suggesting that the intrinsic motivation seems to predict RT participation (Caudwell & Keatley, 2016), meeting health organization RT recommendations (Kathrins & Turbow, 2010).
Previous research pointed out that adherence to exercise in person participating in fitness classes is higher when intrinsic motives related to enjoyment and feeling of competence, compared to body related outcomes (Ryan et al., 1997). In fact, our data showed a positive association between enjoyment and exercise participation. Exercise enjoyment leads to increased persistence, reduced stress, positive psychological feelings, confident and satisfied in the activity itself (Teixeira et al., 2012). Teixeira et al. (2012)have showed that intrinsic motives (e.g., enjoyment, affiliation, challenge) were positively associated with exercise behavior. The predominance of intrinsic participation motives such as affiliation, challenge, stress management, and enjoyment, is clearly associated with greater exercise adoption and adherence. In the current study, more than 53% of the participants reported that they are engaged in their training modalities for a period more than 3 years. It could explain the high levels of enjoyment reported in both CrossFit and RT groups. In fact, long-term participants reported enjoyment as their principal reason for exercise adoption (Edmunds et al., 2006).
In the present study, no independent effect of the enjoyment motive for exercise was observed for self-reported weekly exercise volume. This is in agreement with recent research suggesting that motives for exercise only exert an indirect effect on exercise behavior (Duncan et al., 2017;Sebire, Standage, & Vansteenkiste, 2011;Sibley & Bergman, 2016). For example, Ingledew and Markland (2008)have reported the exercise motive as an antecedent to behavioral regulation. In other words, different motives to participation are more or less conductive to controlled or autonomous motivation, with different consequences for behavior and affect. Our study advanced previous work by demonstrating that the effect enjoyment on exercise behavior in fitness center users may be mediated by competence satisfaction and intrinsic motivation.
Intrinsic motivation significantly predicted higher weekly exercise volume, supporting the link between intrinsic motivation to engage in exercise and continued, persistent physical activity behavior. In light of structured and intense nature of RT and CrossFit workouts, participants may require more satisfaction of competence and intrinsic motivation to engage regularly in these activities. Moderate and light exercise seems either not to be related, or weakly associated with BPN satisfaction. On the other hand, strenuous exercise has been shown to moderately associated with BPN and intrinsic motivation (Weman-Josefsson et al., 2015). Based on this result, the enjoyment can be proposed as a reason to exercise adoption that plays a role in satisfying individual’s need for competence, and foster the intrinsic motivation. According to SDT, individuals are intrinsically motivated when they engage in an activity for the inherent satisfaction that they derive from the activity, being a more self-determination motivation (Ryan & Deci, 2000). Intrinsically motivated individuals are likely to persist with gym attendance without external contingencies such as rewards or social pressure (Caudwell & Keatley, 2016).
CrossFit members perceived greater relationship need satisfaction, while RT participants scored higher perception of autonomy. Autonomy score in the RT participants was as high as previously reported in fitness center users and personal trainer clients (Klain et al., 2015). In comparison to RT, individuals who exercise at a CrossFit facility must perform the specific workout prescribed by the instructor, and at a specific time. In this case, the reduced freedom of choice may explain lower feeling of autonomy reported by CrossFit participants. Exercise environment could influence the means by which BPN are fulfilled, as well as how behavioral regulations are internalized. As has been forwarded by others (Pridgeon & Grogan, 2011), exercise environment is an important factor to exercise initiation and adherence.
With respect of motives to exercise, CrossFit participants reported higher social motives (social recognition, affiliation, and competition) compared to RT. In according to this data, Fisher et al. (2017)found similar findings comparing CrossFit members and participants who performed RT, with or without a personal trainer. A greater sense of community and social interactions seems to be particular characteristics in CrossFit workouts (Claudino et al., 2018). Affiliation motive is classified as an intrinsic goal, while social recognition is derived from extrinsic reason of receiving attention from others for physical abilities and performance (Wallhead, Garn, & Vidoni, 2013). It is possible that in individuals with high affiliation goals, the potential detrimental effect of social recognition on adherence may be disregarded (Fisher et al., 2017). Group exercise modalities contribute to social engagement, and this could explain, at least in part, some differences between CrossFit and traditional RT onto other psychological variables (Ingledew & Markland, 2008). This observation is supported by the higher levels of BPN of relationship reported by CrossFit members in the present study. The consistent organization of CrossFIt classes likely increases the quality of relationships between participants, since they workout with the same people every day.
Workout environment in CrossFit group may have direct effects on competition and enjoyment scores, in which are comparable with that presented in sports practice (Claudino et al., 2018). Kilpatrick, Herbert and Bartholomew (2005)showed greater motivation to participate in sport than to regular exercise for affiliation, challenge, enjoyment and social recognition. Further, Frederick and Ryan (1993)compared the motives of individuals who either participated in individual sports or fitness activities. The results indicated that sport participants reported enjoyment and competence as the highest motivating factors, whereas fitness participants reported more body-related motives such as appearance. A competitive nature of CrossFit is perceived when the participants demonstrate their performance and, at the same time, analyze the performance of their training colleagues, through subjective (perception) and numerical analysis (e.g., results of time and other performance variables, usually written in a whiteboard on the gym’s wall) (Sibley & Bergman, 2017).
Appearance and weight management are considered extrinsic motivators to exercise due to their controlling nature (Ingledew & Markland, 2008;Ingledew et al., 2009). Since RT participants revealed greater controlled regulation than CrossFit group, we expected that RT participants would show appearance as a higher motive to exercise in accordance with a previous study (Fisher et al., 2017). Cross-sectional and longitudinal studies have demonstrated that controlled motivation did not predict, or negatively predicted, exercise participation (Silva et al., 2011;Teixeira et al., 2012). No differences were documented between groups in exercise participation; however, a negative correlation was found between controlled motivation and exercise frequency and weekly exercise volume. CrossFit group scored weight management as a higher motivator than RT. Recently, Caudwell and Keatley (2016)indicated that men with higher negative views toward their body fat also reported greater gym attendance per week.
Although the current study was sufficiently powered, some limitations should be considered, First, the present study was cross-sectional designed; therefore, no causality can be inferred. Second, as the majority of the participants in this study were young, well educated, highly motivated, and regularly engaged in CrossFit and traditional RT, the association explored in the preset study should also be examined with caution. Third, weekly exercise volume was assessed by self-reported questionnaire. Longitudinal studies are required to explore the temporal interplay between exercise-related psychological needs satisfaction, motives for exercise, behavioral regulation, and exercise participation.
Our results suggest that CrossFit members reported higher levels of intrinsic motives and intrinsic motivation to exercise. On the other hand, RT participants presented greater motive for appearance and higher levels of external regulation. Serial mediation analysis evidenced that the association of enjoyment and weekly exercise volume is mediated by competence need satisfaction and intrinsic regulation.
Some practical applications from this study are considered. First, exercise professionals can encourage individuals to seek self-determined and personally meaningful exercise benefits. Affective benefits and intrinsic goals should be emphasized, but without explicitly or implicitly denigrate appearance, weight control, or any other extrinsic motive for exercising (Ingledew & Markland, 2008). Second, participants of both RT and CrossFit groups perceived competence as a mediator of exercise behavior, indicating that focusing on improvement mastery over new skills is an important factor for these individuals. Fitness instructors can incorporate higher-skill movements (e.g., Olympic weightlifting, plyometric exercises) into the exercise program, with emphasis on appropriate learning progression and self-referenced improvements. Third, exercise professionals can support their client’s perception of autonomy by offering them choices, regarding exercise selection, order, and intensity. The adjustment of the exercise workload might be important for increasing exercise enjoyment.
The authors thank the Coordination of Improvement of Higher Educational Personnel (CAPES).
|
Determination of the most effective cooling temperature for the prevention of chemotherapy‑induced alopecia
Affiliations: Department of Oncology, Örebro University Hospital, Örebro SE-701 85, Sweden, Department of Biomedical Engineering, Örebro University Hospital, Örebro SE-701 85, Sweden
- Published online on: September 6, 2013 https://doi.org/10.3892/mco.2013.178
- Pages: 1065-1071
This article is mentioned in:
Chemotherapy-induced alopecia (CIA) is one of the most traumatic side effects of chemotherapy for women with ovarian cancer (1). This trauma is accentuated by cancer recurrence (2,3). A literature review of the effects of CIA on the quality of life confirms that alopecia is a growing concern among women undergoing chemotherapy (4), possibly due to the increased preoccupation with appearance in modern society.
Hair is closely linked to a person’s identity. Women have described baldness as a sign of weakness, which may lead to depression and low self-esteem. Alopecia is a constant reminder of the cancer diagnosis for the afflicted individual and a stigmatizing sign of cancer that is difficult to disguise (5), occasionally leading to social withdrawnness (6). Baldness may also be associated with loss of attractiveness, which in turn may affect sexual relations (2). Women have expressed fears of being rejected by their partners due to alopecia (7).
CIA is caused by the effects of the chemotherapeutic drug on the hair follicles that continuously receive blood supply from the superficial scalp arteries. Currently, the main approach to minimizing CIA is scalp cooling (8). The rationale of scalp cooling is to achieve a vasoconstriction of the peripheral blood vessels, which leads to a reduction of the drug supply to the hair follicles (9) and decreased intracellular metabolism (10). Earlier findings suggested that, at a depth of 1–2 mm in the scalp, the temperature should be reduced to at least 22°C to obtain a hair-preserving effect (11). Cooke et al (12) reported that the average scalp temperature in patients with severe alopecia was 25.6°C. Bulow et al (10) cooled the scalp of 10 healthy volunteers and measured the blood flow to the frontal region by injecting 133Xe. The authors of that study observed that a subcutaneous temperature of 22°C corresponded to a surface temperature of 19°C. However, since then, investigations on the optimal degree of hypothermia of the scalp surface in order to achieve a sufficient vasoconstriction for hair preservation have been limited (13).
Over the last decades, different cooling techniques of the scalp to decrease CIA have been used in the clinical setting. The previously used cooling methods (crushed ice, frozen cryogel caps and cold-air cooling) were temperature-unstable, uncomfortable for the patient and time-consuming for staff. Furthermore, these older techniques demonstrated no conclusive evidence with regard to the reduction of alopecia (9). More recently, a computerized technique with a cooling unit similar to a refrigerator has been used to regulate the pre-set temperature. This technique has also been used in our department for research purposes and in the clinical setting since 2003. Over 300 patients have been treated with these cooling machines and our clinical experience is that this technique significantly reduces hair loss. Therefore, it appeared worthwhile to further refine this technique, increase our knowledge regarding the optimal temperature and treatment time required and make scalp cooling an efficient method for reducing hair loss and preserving the self-image of the patient.
The study was divided into two parts: the first part (pre-study) aimed to assess which pre-set temperature (3 or 8°C) was the most effective in achieving a subcutaneous temperature of <22°C in healthy volunteers. The temperature variations within and among the participants at the baseline and during the cooling procedure and the temperature variations associated with different regions of the scalp were also investigated.
The aim of the second part of the study (main study) was to compare the extent of CIA in patients undergoing scalp cooling after 4 cycles of paclitaxel in combination with carboplatin. The collective aim of the study was to determine which temperature (3 or 8°C) was the most effective in preventing hair loss and the most tolerable to the patients.
Materials and methods
This study was conducted at the Department of Gynecological Oncology, Örebro University Hospital, Sweden. Data collection was initiated in 2005 and continued until 2007. A group of 5 healthy female volunteers underwent scalp cooling and participated in three sessions of scalp temperature measurements (Table I). Following wetting of the hair, a peripheral venous catheter, 1.3 mm in diameter, was inserted into the scalp in parallel with the skin surface. The steel needle was removed and the grip of the plastic catheter was cut off, leaving 2.5 cm of the plastic catheter visible, with 0.7 cm remaining inside the scalp.
Five healthy females underwent scalp cooling and participated in three sessions of scalp temperature measurements.
Probes for scalp temperature measurement were placed into the catheter and affixed with transparent surgical tape. The tip of each probe was estimated to be at a depth of 1–2 mm, which coincides with the location of the hair follicles. During measurements II and III, the probes were placed on the right side of the head, which was found to be a temperature-stable region.
Dignitana™ equipment was used. The pre-set temperature was recorded by 3 sensors inside the silicone cap (Fig. 1) and was visible on the monitoring screen of the machine. During the cooling procedure, a coolant medium consisting of circulating water and glycol circulated in the labyrinthine channels (interspaced at 7 mm) of an inner cap of silicone in a sealed system. A tight-fitting outer cap made of elastic neoprene was placed on the head of the volunteers and the patients. The Venflon™ Pro catheters, the HT 41019 probes with 3 sensors and an ATS-101 thermometry system used to record the temperatures, were purchased from Lund Science AB (Lund, Sweden).
The probes on the right side of the head were placed 5 cm above the crease of the earlobe. The other probes (top and back of the head) were placed in vertical and horizontal positions, aligned with the probes on the right side. The locations of the probes are shown in Fig. 2.
The overall cooling procedure was adjusted to the clinic’s routines and was conducted in a well-ventilated two-patient wardroom. The best-fitted cooling cap was placed on the moistened hair of each volunteer. The scalp of the volunteer was cooled and the procedure lasted for 1 h. The temperatures selected for the test were 3 and 8°C, which were on both sides of the clinically used temperature of 5°C, and were allowed a fluctuation of ±1.5°C (which was the level of exactness provided by the manufacturer), without trespassing each other. Plus 3°C was the lowest stable temperature possible to pre-set on the machine according to our prior pre-tests. Multiple pre-measurements were performed to test different sites of the head and assess the response of the scalp temperature when selecting different pre-set temperatures between 3 and 11°C.
Patients who preferred scalp cooling and who met the inclusion criteria were consecutively invited to participate in the study. The chemotherapy regimen used in this study was a combination of paclitaxel and carboplatin. Paclitaxel is a highly potent drug that causes severe alopecia, whereas carboplatin is associated with a low risk of alopecia (14). The majority of the patients had a confirmed diagnosis of ovarian carcinoma and the remaining patients had endometrial carcinoma. The characteristics of the 43 evaluable patients are presented in Table II. This part of the study was conducted between November, 2007 and May, 2011.
The inclusion criteria of the present study were as follows: i) patients with gynecological cancer initiated on a chemotherapy session of paclitaxel (175 mg/m2) in combination with carboplatin (AUC 5–6); ii) patients who understood Swedish; and iii) patients who signed an informed consent.
The exclusion criteria of the present study were as follows: i) patients with previous alopecia; ii) patients who had received chemotherapy in the previous 12 months; and iii) patients who were considered ineligible for scalp cooling by the physician.
After signing an informed consent, the patients were randomized to either the 3 or the 8°C group via numbered, sealed envelopes. The member of the staff responsible for applying the cooling cap contacted the person responsible for the storage of the envelopes prior to each course of treatment. The same temperature was used for each consecutive session.
The member of the staff who applied the cap and managed the cooling procedure was made aware of the pre-set temperature. The patient, the nurse who administered the chemotherapy and the persons who evaluated the photos were blinded to the pre-set temperature.
All procedures were conducted in accordance with the Helsinki Agreement (World Medical Association Declaration of Helsinki, 2002). The project was conducted in accordance with the Consolidated Guidelines on Good Clinical Practice (International Conference on Harmonization of Technical Requirements for Registration of Pharmaceuticals for Human Use, 1997). The study was approved by the Regional Ethics Committee in Uppsala-Örebro (Dnr 2005:082).
The entire procedure was conducted by skilled and experienced staff. Images (digital and paper) of the crown of the head were captured prior to each cycle and labeled with code numbers and dates. The hair was moistened and the randomized temperature was registered on the screen of the machine. The scheme for this course was in alignment with the clinical practice. The scalp was cooled with the Dignitana technique, as described above. The pump-driven paclitaxel infusion was initiated 30 min after the scalp cooling and lasted for 3 h. Directly after the paclitaxel infusion was stopped, the carboplatin infusion was administered over 30–60 min. The cooling cap was retained for 1.5 h after the paclitaxel infusion had stopped. The procedure lasted for ∼5 h and the patients were connected to the machine during the whole time.
The estimated hair loss of the patients and their experience of the cooling procedure was recorded. The captured images were stored in a memory card and transformed to Microsoft Picture Manager. The temperature registration by the sensors in the cold cap was stored in a personal coded disk. The content of the disks was transferred to a CD, in which all the patient temperature curves were stored. The patients were asked to complete a questionnaire regarding headache and coldness following each treatment session.
Evaluation of temperature graphs
The two investigators assessed the graphs from each cycle of all the patients to determine whether the temperature variation exceeded ±1.5°C. The recorded temperatures varied within a margin of ±1.5°C in 64 of the 108 measurements (59%), whereas 44 measurements deviated from the margin of ±1.5°C. In 15 measurements, the recorded temperature was occasionally >1.5°C of the pre-set temperature and in 26 measurements the corresponding temperature was recorded to be <1.5°C. Three measurements exhibited variations >1.5°C on both sides. These patients were all included in the analysis, since the variations were only one or more rapid peaks. After 30 min of cooling, a steady-state was achieved.
Patients’ subjective evaluation
The patients estimated their own hair loss in a questionnaire prior to the second and the following treatments. Following the removal of the cooling cap, the patient rated the experience of headache and/or coldness during the cooling procedure. The patients assessed their hair loss and discomfort on a visual analogue scale (VAS). The VAS was graded 0–10, with 0 indicating no hair loss or no discomfort and 10 as total hair loss or the most severe discomfort.
Evaluation of images
The images were separately evaluated by two investigators, E.E. and L.N., using the VAS with 0–10 grading. All the images were compared for each patient in line, with 0 corresponding to no hair loss and 10 to total hair loss. There was a significant coherence in the evaluations; whenever there was a difference of opinions, a consensus was reached.
We hypothesized that 65% of patients would retain 80% of their hair at a pre-set temperature of 3°C and 35% would retain 80% of their hair at a pre-set temperature of 8°C.
The mean values and standard deviations (SDs) were calculated for the VAS scores. The differences were assessed by the Student’s t-test and repeated analysis of variance (ANOVA) measures (intergroup differences and time dependence). The differences regarding hair loss of >50% or the use of a wig were assessed by the Pearson’s Chi-square test. The Wilcoxon matched-pairs test was used to compare the VAS scores of the patients and the investigators. Kappa test statistics was used to compare the inter-rater agreement reliability. The statistical analyses were performed with STATISTICA software, version 11, 2012 (StatSoft, Inc., Tulsa, OK, USA).
The main finding of the pre-study was that a temperature of 3°C of the coolant tended to be most effective in achieving a subcutaneous temperature of <22°C. With this pre-set temperature, 4 of the 5 volunteers reached a subcutaneous temperature of <22°C following 30 min of cooling, whereas with a pre-set temperature of 8°C, only 2 volunteers reached a subcutaneous temperature of <22°C. The results were identical after 60 min of cooling (Table III).
In measurement I, the response to cooling in various regions of the scalp was investigated. The results demonstrated that the top of the head (vertex) was less responsive. The baseline subcutaneous temperature in this area was higher in 3 of the 5 volunteers and this difference was observed after 30 and 60 min of cooling in 4 of the 5 volunteers (Table IV).
Measurement I, subcutaneous temperatures (°C) at various regions of the scalp, pre-set temperature 8°C.
The difference in scalp temperature at the baseline prior to cooling varied within individuals and among individuals during each measurement session. The baseline temperature exhibited a maximum variation of 3.7°C among the 5 volunteers (Table V).
The results of our pre-tests demonstrated that the change in the pre-set temperature was not linearly associated with the subcutaneous temperature.
A total of 47 patients were included in the study and 43 patients were evaluable after 1 cycle of chemotherapy. Of the 4 patients who completed cycle 1, 3 patients developed anaphylactic reactions to chemotherapy and 1 patient underwent a change in the regimen. The reasons for discontinuation during the following cycles were anaphylactic reactions, peripheral neuropathy and regimen modification.
The results from the patients’ evaluation of their own hair loss yielded a numerically lower VAS score for the 3°C compared to that for the 8°C temperature. This tendency was most pronounced in cycle 4 compared to the first 3 cycles. However, the differences were not statistically significant (Student’s t-test; ANOVA repeated measures). The evaluation of the images by the investigators to grade hair loss demonstrated the same numerical differences in cycles 1–2, although without statistical significance between the two pre-set temperatures of the coolant medium. A significant time effect (ANOVA; P=0.035) was observed from cycle 1 to 4 with decreasing hair loss from cycle 2 (Table VI). The most pronounced hair loss was recorded after cycle 2, by the patients as well as the investigators. The inter-rater agreement between the patients’ evaluation of their own hair loss and the investigators’ evaluation of the images was low (κ-value=0.16, 95% CI: 0.04–0.28). The patients scored their hair loss significantly higher on the VAS compared to the investigators (Wilcoxon matched-pairs test; P=0.033).
In the complete series, 49% of patients subjectively experienced >50% hair loss and 38% reported the need for a wig. No significant differences were recorded between patients treated with 3°C and those treated with 8°C regarding these end-points.
The results indicated an association between the pre-set temperature and the patients’ experience of headache and coldness. There was a marginally higher mean score for headache in the 3°C compared with the 8°C group. Repeated ANOVA measures revealed a borderline significance (P=0.085). The feeling of coldness was more common in the 3°C group and this difference was statistically significant (ANOVA; P= 0.037) (Fig. 3). No significant time effects were observed in the registered side effects (Table VII).
Patients’ visual analog scale (VAS) scoring of coldness during the first 4 chemotherapy cycles. A comparison of the two groups of 3°C and 8°C was performed with repeated ANOVA measures and a statistically significant difference was recorded between the groups (P=0.037). No significant time effects were observed.
The findings of the pre-study indicated that a pre-set temperature of 3°C of the coolant medium was more effective in achieving a subcutaneous temperature level of <22°C and, possibly, in preventing alopecia more efficiently. However, the randomized main study could not verify a significant difference in the prevention of alopecia between the 3°C and the 8°C groups. The findings also revealed a difficulty in determining a specific pre-set temperature suitable for all individuals, which was in agreement with the findings of other studies (6,11,15). Furthermore, scalp cooling may not be suitable for all patients (16) and the incidence of side effects, such as headache and coldness, may increase with lower pre-set temperatures.
Although the number of volunteers was limited, the findings of the pre-study provided useful information regarding the range of variations in scalp temperature within and among individuals, at baseline and during the cooling procedure. To the best of our knowledge, these variations had not been priorly documented to this extent. The variations may explain why patients respond with such divergence to scalp cooling in the clinical setting, despite identical pre-set temperatures. Gregory et al (11) measured the scalp temperature in 24 patients using a hypodermic needle and reported variations in the subcutaneous temperature from 18.5–28.5°C during cooling; however, since needle placement was not reported in that study, a comparison with our findings is difficult.
Investigators have previously attempted to elucidate the reason for the variations in scalp temperature among individuals. Breed (17) reported that biochemical and biophysical processes affected the association between skin temperature and hair loss. Bulow et al (10) investigated whether the enhanced heat dissipation originates from structures lying below the subcutaneous tissue or from thermal reflex differences when it comes to skin perfusion. Janssen et al (18) underlined the importance of individual anatomical differences, such as the shape of the head and the thickness of the insulating fat layer. Those findings contradicted those previously reported by Gregory et al (11); those authors suggested that the variation in scalp temperature among patients may not be attributed to the density of the scalp tissue or hair thickness. There is currently no satisfactory explanation for the wide scalp temperature variation in the same individual at various time points.
Our clinical experience is that the most extensive hair loss during chemotherapy with scalp cooling is observed in the top of the head, which was confirmed by the findings from our pre-study. The subcutaneous baseline temperature in that region was ∼30°C and appeared to be more unresponsive to scalp cooling. Trueb (14) also reported that the top of the head is the most common region where hair loss is observed. Massey (19) observed that the temperature in the top of the head at room temperature tended to be by 1°C higher compared to that in other regions of the scalp. In the present study, the evaluation of the images captured from the top of head indicated that this is the region most extensively affected by alopecia.
To the best of our knowledge, this study was the first randomized, blinded study on scalp cooling and the comparison of two pre-set temperatures to determine the most effective temperature level for the prevention of hair loss. The study group exclusively included patients receiving the same highly potential chemotherapeutic agent (paclitaxel) to ensure homogeneity. Our findings are consistent with those reported by Ridderheim et al (20), who used the same technique and observed that hair loss in 30 patients who received paclitaxel and carboplatin ranged from 0–6.5 (mean 2.5) on the VAS with a pre-set temperature of 5°C. When summarizing all the cycles of the present study, we estimated a mean value of 2.4 (range, 0.2–7.8) on the VAS with a pre-set temperature of 3°C and a mean of 3.2 (range, 0.3–9.0) with a pre-set temperature of 8°C, indicating a temperature dependence of hair loss.
In addition, the main study provided data on the side effects associated with scalp cooling, such as headache and coldness, enabling a better understanding of this subject.
Side effects, such as headache and coldness, are commonly reported in conjunction with scalp cooling (20,21). The discomfort of scalp cooling was increased when the pre-set temperature was lowered from 8 to 3°C. Katsimbri et al (22) reported that headache appeared to worsen with extended regimens. The patients in our study had the cold cap on for 5 h, which must be considered as the maximum tolerated time for patients undergoing chemotherapy. We also observed a higher incidence of headache and feeling of coldness compared to previous findings with a pre-set temperature of 5°C (20).
In previous studies, the outcome of scalp cooling was measured on a 4-point Dean’s scale (23), or according to the World Health Organization’s 5 criteria of hair loss (19,24). Both scales range from no hair loss to 75% or total hair loss. For the evaluation of the main study, the VAS was selected with 10 score steps, which is the same method as that used by Ridderheim et al (20). That study used the same method of scalp cooling and some of the patients included received the same type of chemotherapy as our patients, which makes the two studies comparable. There are more flexible choices in the evaluation of hair loss and side effects when using the VAS, which was convenient and considered as an advantage.
There are a number of considerations when evaluating the results of the present and other studies. In the pre-study, we were unable to confirm with precision that the tip of the probe was placed at the depth of the hair follicles. Probe displacement may explain some of the deviations. However, the results are largely in agreement with the findings of Bulow et al (10), who stated that the temperature reduction from the subcutaneous to the epicutaneous tissue in the frontal region of the head is ∼3°C. The association between subcutaneous and epicutaneous temperatures was not linear throughout the cooling procedure, with the difference being more noticeable after 30 min.
In the main study, there were a number of patients who were unable to complete the 4 cycles, due to circumstances beyond our control. Moreover, the time of patient inclusion was more prolonged than anticipated.
The fit of the cooling cap may also affect the study results. Further studies are required on the design of the cooling cap and the contact between the cooling channels of the inner cap and the surface of the scalp, particularly in the region of the vertex (top of the head).
In conclusion, the results demonstrated that a pre-set temperature of 3°C of the coolant tended to be more effective in achieving a subcutaneous temperature of <22°C. However, there was no statistically significant difference between the two investigated temperatures regarding the prevention of CIA in patients receiving paclitaxel and carboplatin. Numerically, the VAS scores were in favor of the 3°C temperature; however, the differences between the two groups were not statistically significant. In addition, the difference between the two levels of temperature may be due to the rather limited number of patients included in this study.
Our findings revealed a difficulty in determining an optimal pre-set temperature for all the individuals. Ideally, a non-invasive method should measure the temperature of the surface of the scalp during the cooling session and adapt the pre-set temperature of the coolant in response to this measurement. In order to measure scalp temperature there is a need for an appropriate validated instrument, as previously stated by Hesketh et al (25). Until a more reliable method to investigate the advantages and disadvantages of scalp cooling is designed, we must conclude that a temperature of 3°C may be more effective in preventing alopecia during paclitaxel/carboplatin treatment, at the cost of a higher incidence of side effects.
Our findings indicated that further investigations are required to evaluate and improve the existing scalp cooling techniques during chemotherapy treatment of cancer patients.
Sun CC, Bodurka DC, Weaver CB, Rasu R, Wolf JK, Bevers MW, et al: Rankings and symptom assessments of side effects from chemotherapy: insights from experienced patients with ovarian cancer. Support Care Cancer. 13:219–227. 2005. View Article : Google Scholar : PubMed/NCBI
Lemieux J, Maunsell E and Provencher L: Chemotherapy-induced alopecia and effects on quality of life among women with breast cancer: a literature review. Psychooncology. 17:317–328. 2008. View Article : Google Scholar : PubMed/NCBI
Girman CJ, Hartmaier S, Roberts J, Bergfeld W and Waldstreicher J: Patient-perceived importance of negative effects of androgenetic alopecia in women. J Womens Health Gend Based Med. 8:1091–1095. 1999. View Article : Google Scholar : PubMed/NCBI
Tollenaar RA, Liefers GJ, Repelaer van Driel OJ and van de Velde CJ: Scalp cooling has no place in the prevention of alopecia in adjuvant chemotherapy for breast cancer. Eur J Cancer. 30A:1448–1453. 1994. View Article : Google Scholar : PubMed/NCBI
Bulow J, Friberg L, Gaardsting O and Hansen M: Frontal subcutaneous blood flow, and epi- and subcutaneous temperatures during scalp cooling in normal man. Scand J Clin Lab Invest. 45:505–508. 1985. View Article : Google Scholar : PubMed/NCBI
Janssen FP, Rajan V, Steenbergen W, van Leeuwen GM and van Steenhoven AA: The relationship between local scalp skin temperature and cutaneous perfusion during scalp cooling. Physiol Meas. 28:829–839. 2007. View Article : Google Scholar : PubMed/NCBI
Breed WP: What is wrong with the 30-year-old practice of scalp cooling for the prevention of chemotherapy-induced hair loss? Support Care Cancer. 12:3–5. 2004.PubMed/NCBI
Massey CS: A multicentre study to determine the efficacy and patient acceptability of the Paxman Scalp Cooler to prevent hair loss in patients receiving chemotherapy. Eur J Oncol Nurs. 8:121–130. 2004. View Article : Google Scholar
Ridderheim M, Bjurberg M and Gustavsson A: Scalp hypothermia to prevent chemotherapy-induced alopecia is effective and safe: a pilot study of a new digitized scalp-cooling system used in 74 patients. Support Care Cancer. 11:371–377. 2003.
Protiere C, Evans K, Camerlo J, d’Ingrado MP, Macquart-Moulin G, Viens P, et al: Efficacy and tolerance of a scalp-cooling system for prevention of hair loss and the experience of breast cancer patients treated by adjuvant chemotherapy. Support Care Cancer. 10:529–537. 2002. View Article : Google Scholar : PubMed/NCBI
Christodoulou C, Klouvas G, Efstathiou E, Zervakis D, Papazachariou E, Plyta M and Skarlos DV: Effectiveness of the MSC cold cap system in the prevention of chemotherapy-induced alopecia. Oncology. 62:97–102. 2002. View Article : Google Scholar : PubMed/NCBI
van den Hurk CJ, Peerbooms M, van de Poll-Franse LV, Nortier JW, Coebergh JW and Breed WP: Scalp cooling for hair preservation and associated characteristics in 1411 chemotherapy patients - results of the Dutch Scalp Cooling Registry. Acta Oncol. 51:497–504. 2012.PubMed/NCBI
Hesketh PJ, Batchelor D, Golant M, Lyman GH, Rhodes N and Yardley D: Chemotherapy-induced alopecia: psychosocial impact and therapeutic approaches. Support Care Cancer. 12:543–549. 2004.PubMed/NCBI
|
< Browse to Previous Essay | Browse to Next Essay >
Washington voters favor Herbert Hoover and Republicans in the general election on November 6, 1928.
HistoryLink.org Essay 5562
: Printer-Friendly Format
On November 6, 1928, Herbert Hoover (1874-1964) wins election as United States president and Roland Hartley (1864-1952) wins re-election as governor of Washington. The state's incumbent Democratic U.S. Senator Clarence C. Dill (1884-1978) is retained in office, but Republicans prevail in most other races.
The presidential election was between Hoover, President Calvin Coolidge's (1872-1933) Secretary of Commerce and the Democrat, New York Governor Alfred E. Smith (1873-1944). Smith was a "wet," opposed to Prohibition, but he also represented a big-city political machine and he was Roman Catholic. Hoover easily carried Washington except for remote Ferry County.
As a reflection of the strength of the Republican Party in Washington, Senator Dill and his fellow Democrat together polled 13,000 fewer votes in the primary than did the third-place Republican. But Dill won in the general election over Supreme Court Justice Kenneth Mackintosh (b. 1875). Mackintosh carried King County, but could not win Pierce or Spokane Counties. Of the five seats in the House of Representatives, four went to Republicans.
Governor Hartley easily won re-election over Democrat A. Scott Bullitt (1877-1932), who carried only five counties.
Edgar I. Stewart, Washington: Northwest Frontier (New York: Lewis Historical Publishing Co., 1957), 278-279.
Travel through time (chronological order):
< Browse to Previous Essay
Browse to Next Essay >
Government & Politics |
Licensing: This essay is licensed under a Creative Commons license that
encourages reproduction with attribution. Credit should be given to both
HistoryLink.org and to the author, and sources must be included with any
reproduction. Click the icon for more info. Please note that this
Creative Commons license applies to text only, and not to images. For
more information regarding individual photos or images, please contact
the source noted in the image credit.
Major Support for HistoryLink.org Provided
By: The State of Washington | Patsy Bullitt Collins
| Paul G. Allen Family Foundation | Museum Of History & Industry
| 4Culture (King County Lodging Tax Revenue) | City of Seattle
| City of Bellevue | City of Tacoma | King County | The Peach
Foundation | Microsoft Corporation, Other Public and Private
Sponsors and Visitors Like You
|
The original capstone topped an obelisk erected by Queen
Hatshepsut at the temple of Amun at Karnak. In this
scene, Hatshepsut is depicted kneeling before the god
Amun. She is wearing the clothing of a
pharaoh - a man's kilt with a royal
bull's tail on the front and the white atef
crown of Egypt - to indicate her
position as "a female king". Her name, Maat-ka-re, is engraved in a cartouche, a symbol reserved for
the names of pharaohs.
Capstone of Hatshepsut
Royal Ontario Museum
Queen Hatshepsut's Expedition to Punt
Papyrus painting, modern
|The Egyptians sent trading missions to Punt, a region of East Africa that was rich in gold, resins, ebony, blackwood, ivory and wild animals, including monkeys and baboons. They also went in search of slaves. The best-documented mission was sent during the reign of Hatshepsut. Scenes from these expeditions are illustrated on her funerary temple at Deir el-Bahari, near the Valley of the Kings.|
"Hatshepsut: Temptress of the Nile"
by Katherine Sandford
A theatrical production of Dramamuse
presented in the exhibition Mysteries of Egypt
The crew of a B-series film is having a lot of trouble trying to recreate the feeling of old Hollywood movies about Ancient Egypt. While they are working, the members of the crew realize they each have very different ideas about the mysteries of this great civilization. As the crew members examine their different points of view, the complexity of Ancient Egypt begins to emerge. In the end, they gain a better understanding of the subject and take a humorous a look at the origins of some common superstitions.
|
The story of the English folk hero and medieval outlaw Robin Hood who as legend would have it lived in the days of Richard the Lionheart and Prince John and, with his band of merry men, fought injustice and tyranny. This retelling of the stories, first published in 1956, has become an acknowledged classic: a literary mosaic in which Roger Lancelyn Green has brought together material from the old ballads, romances and plays, as well as retellings of Noyes, Tennyson, Peacock and Scott. “For Robin Hood’s is a story that can never die,” he wrote, “nor cease to fire the imagination. Like the old fairy tales it must be told and told again — for like them it is touched with enchantment…”
About Roger Lancelyn Green
Roger Lancelyn Green (1918-1987) was a biographer of children’s writers and a reteller of myths, legends and fairy tales. He was a member of the Oxford literary group the Inklings, along with J. R. R. Tolkien and C. S. Lewis.
Published by Everyman’s Library Sep 27, 1994| 308 Pages| 6-1/8 x 8-1/8| ISBN 9780679436362
|
ATLANTA — Health officials are recalling hundreds of thousands of doses of H1N1/swine flu vaccine after tests indicated they may not be potent enough to protect against the virus.
The Centers for Disease Control and Prevention notified doctors about the recall today. The recall involves about 800,000 doses made by Sanofi Pasteur. The doses are prefilled syringes intended for young children, ages 6 months to almost 3 years. Health officials recommend children those ages get two doses, spaced about a month apart.
Health officials say it's not clear how many doses have already been given, but they don't think children need to be re-vaccinated. The lots passed potency tests when they were first shipped, but tests indicate the potency waned after. The company reported the potency findings to the government officials and did a voluntary recall.
Dr. Anne Schuchat, a CDC flu expert, stressed that parents don’t need to do anything or to worry. The vaccine is still safe, she said.
Swine flu vaccine has been available since early October, and since then manufacturers have released about 95 million doses for distribution in the United States.
This story has been updated from an earlier version.
|
Book: National Geographic Visual Encyclopedia of Earth: Wonders of Our Living Planet
$25.00 $19.95 On Sale!
Written by renowned international authority Michael Allaby, this lively encyclopedia gives kids a rock-solid foundation, reveals the latest research on fragile ecosystems and climate shift, and engages young readers with riveting information, eye-catching illustrations, and, of course, peerless National Geographic photography.
How do twisters form? What makes lightening strike? Why are tropical rain forests the lungs of our planet? Curious kids want to know everything about their planet. They'll find the answers to their questions here, as they investigate our world from its core to its cosmic connections.
National Geographic Visual Encyclopedia of Earth offers a wealth of comprehensive, easy-to-follow insight into our planet in lively, fun-to-read text.
|
The flute glass is a glass usually served for alcoholic drinks. It is similar to a wine glass but it has a longer compartment. This guide will teach you how to draw it in no time.
1Draw a long "U" shape with a curve line on top.
2Under the "U" shape draw a long, thin cylinder which decreases in size starting with the larger part where it touches the "U" shape.
3At the base of the cylinder draw a small triangle and a big flat oval.
4Outline the shape of the glass over the sketch. Turn the straight lines into curves etc.
5Carefully erase the sketch and draw inside the flute glass the contents or garnishing. For now, we will draw a wave to represent that there is wine in the glass.
6Again, high-light just the glass.
7Color the contents if desired or shade the glass if desired.
8Finished. Add in any background if desired.Advertisement
Things You'll Need
- A pencil
- Pencil sharpener
- Colored pencils, crayons, etc
About This Article
Thanks to all authors for creating a page that has been read 7,618 times.
|
Researchers have simulated a billion atoms which make up an entire human gene for a split-second. This is the largest simulation of human DNA and an important milestone towards the ultimate goal of digitally reproducing the human genome.
“It is important to understand DNA at this level of detail because we want to understand precisely how genes turn on and off,” said Karissa Sanbonmatsu, a structural biologist at Los Alamos. “Knowing how this happens could unlock the secrets to how many diseases occur.”
Sanbonmatsu and colleagues performed their study on the Los Alamos’ Trinity supercomputer, the sixth fastest in the world. But even for this behemoth, simulating the intricate complexities of DNA was a huge challenge that required all of its computing resources. The model is quite slow too, simulating just one nanosecond of molecular activity per day.
DNA, or deoxyribonucleic acid, is the hereditary material in humans and almost all other organisms. This incredible molecule contains all the instructions an organism needs to develop, live, and reproduce. Its structure is so neatly compacted and precise that you could string together all the DNA in a human body to wrap around the earth 2.5 million times.
The reason why the blueprint for life is so compact has to do with the way the string-like molecule is wound up in a network of tiny spools. The various ways in which these spools wind and unwind turn genes on and off. In other words, when the DNA is more compacted, genes are turned off and when DNA expands, genes are turned on.
Researchers do not yet fully understand how all of this process pans out, which is why they’ve developed this atomistic model. Solving this mystery could one day lead to novel gene therapies and medical applications.
But before that happens, we need much faster computers. Modeling billions and billions of atoms all moving at the same time requires phenomenal resources. And, if we want to model an entire chromosome (or even the human genome), scientists will have to wait for the next generation of supercomputers, such as exascale computers, which will be many times faster than today’s machines.
Scientific reference: Jaewoon Jung et al. Scaling molecular dynamics beyond 100,000 processor cores for large‐scale biophysical simulations, Journal of Computational Chemistry (2019). DOI: 10.1002/jcc.25840.
|
Emulate, a Boston-based startup that has developed small laboratory chips intended to replace the animal tests used in pharmaceutical research, has raised $36 million in financing.
The Series C round of funding was led by Founders Fund. Also participating in the financing were new investors ALS Investment Fund, SciFi VC, and Glass Wall Syndicate, as well as several earlier investors.
The translucent Emulate chips, roughly the size of a AA battery, have tiny channels lined with human cells and tissue. These chips are engineered to recreate the physiology and mechanical forces encountered by the cells of an organ, such as the flow of blood or air. Emulate has developed organ chips for the liver, intestine, lung, and the brain. Those chips are part of a broader system that includes instruments for conducting experiments and software to analyze data and model different diseases.
Emulate says the financing will be used to develop new functions for its chips and to bolster its commercialization efforts. Companies currently using Emulate’s technology include AstraZeneca (NYSE: AZN), Roche, Takeda Pharmaceutical, and Merck (NYSE: MRK). They are using the technology to help them better predict the safety and efficacy of their drug candidates. Last year, Emulate also started a three-year research and development partnership with the FDA to evaluate how well the chips work in predicting how an organ will respond to chemical exposure from food, cosmetics, and dietary supplements.
The Emulate technology was licensed from the Wyss Institute for Biologically Inspired Engineering at Harvard University. Here’s more on Emulate’s origins and the applications of its organ chip technology.
Photo by Emulate
|
Listen to this story:
A study in frog embryos spawned a surprise for autism researchers this past January. Mutations in 10 different autism-linked genes — many known to encode proteins that affect synapses — altered the tadpoles’ developing brains even before they had synapses.
Whether a mutation was in SYNGAP1, SCN2A or NRXN1, the embryos had an atypical proportion of neural progenitor cells, which become neurons in a process called neurogenesis. The upshot was brains that were either unexpectedly large or small, and the realization that some synaptic proteins must do more than support synaptic function.
“The field hasn’t been thinking about synaptic proteins also doing double duty during neurogenesis,” says Helen Willsey, assistant professor of psychiatry at the University of California, San Francisco (UCSF) and investigator at the Chan Zuckerberg Biohub, who led the work.
Studies of brain cell clusters called organoids, which enable researchers to peer into the first moments of cortical growth, also hint at the idea that, Swiss-army-knife-like, multiple autism-linked genes have different functions during early development than they do later in life.
That’s not entirely unexpected, Willsey says. For a while now, autism researchers have kicked around the idea that the condition may stem from atypical neurogenesis. But, she says, the findings merit attention because of how they challenge the field’s long-standing reliance on ‘gene ontology,’ or labeling of genes by known function.
To put it another way, if mutations in so-called synaptic genes contribute to autism by altering neurogenesis, then are they really synaptic genes after all? That question has some scientists working with new tools to update existing characterizations of high-confidence autism-linked genes.
“I think the field is at this moment where it’s reconsidering gene ontologies,” Willsey says. They are a useful tool to generate interesting hypotheses, she says. “But we can’t depend on them. And we can’t always trust them.”
A decade ago, researchers began identifying genes or regions of the genome tied to a person’s likelihood of being autistic.
A logical next step was to understand what these genes had in common, says Matthew State, professor of psychiatry at UCSF. So he and others began searching through databases of known gene functions to identify biological themes among the list of autism-linked genes — a method known as gene ontology (GO) analysis. Researchers also started investigating the other genes and proteins these autism-linked genes might interact with, using newly developed network analyses.
The effort revealed a clear pattern, even before formal analyses were complete, State says: Around half of the ‘autism genes’ in the list were chromatin modifiers or transcription factors, and “half of them were genes that were extremely well known as synaptic proteins.”
SYNGAP1, for example, was classified as a synaptic gene because it produces proteins found in abundance at synapses in adult brains. Autism researchers were already eyeing changes in synaptic function as a mechanism that could lead to the condition, spurred by the discovery in 2003 that mutations in the synaptic genes NLGN3 and NLGN4 may contribute to autism and a paper that same year suggesting that neurodevelopmental conditions “meet at the synapse.”
The GO analyses only seemed to confirm this line of thinking, State says.
“All of that has remained in the field, and there’s real value to it,” he says. “I think there’s no question that most things have held up.” But he agrees with Willsey that this type of analysis also has its limitations.
To start, the GO databases are inherently biased, State says, because the functions they list come from published studies, which tend to build on conventional wisdom.
“Synaptic roles for a lot of these genes are well-established, because we’ve been testing for that for a long time.” — Kristen Brennand
“You only see what you’re testing for,” says Kristen Brennand, professor of psychiatry and genetics at Yale University. “Synaptic roles for a lot of these genes are well-established, because we’ve been testing for that for a long time.”
Most initial studies were also performed in adult tissue, so early GO analyses and protein network studies turned up information largely specific to adult gene expression. How those genes and gene products are expressed in early brain development, on the other hand, has come under scrutiny only more recently, Brennand says.
Some brain regions are also trickier to study than others, and some cell types are more challenging to target — more sources of potential bias, she and State say.
And a GO analysis tends to highlight one function of a gene over others, even though researchers know that genes are unlikely to have a single function, says Emmanuel DiCicco-Bloom, professor of neuroscience and cell biology at Rutgers Robert Wood Johnson Medical School in Piscataway, New Jersey.
“Biology is more economical than that,” says DiCicco-Bloom. “It uses the same tools over and over at multiple stages for different things.”
Since the early days of GO analyses, improved research methods have made it possible to study genes at previously inaccessible times and places — including much earlier in development. And those advances have shifted some of the biases baked into the original databases.
One key correction has come from studying patterns of gene expression across development, rather than just known functions, State says.
Other technical advances in the field, such as the ability to make tweaks to single genes using CRISPR tools, as Willsey did in her study of frog embryos, have enabled researchers to see how brain development and function change without a given gene’s proper expression. By editing multiple genes at once, scientists can also suss out points of convergence among them, Brennand says — which wasn’t possible when they had first identified so-called ‘autism genes.’
Organoids, too, have afforded researchers a broader, more balanced view of early development. Genes previously known for regulating chromatin also influence when excitatory and inhibitory neurons develop, according to an organoid study earlier this year. Mutations in those genes may contribute to autism because they upset the balance of excitation and inhibition as the cortex gets wired up, the authors suggest. And confirming previous findings from Willsey and her colleagues, SYNGAP1 shapes not only synapses but neurogenesis in the cortex, an unpublished organoid study posted to bioRxiv in May revealed.
These new findings do not refute previous observations, and should be considered additions to the known functions of autism-linked genes, all researchers interviewed say.
Each known function is only part of a gene’s story, says Gavin Rumbaugh, professor of neuroscience at UF Scripps Biomedical Research in Jupiter, Florida, whose lab focuses on SYNGAP1. A mutation in the gene may initially alter neurogenesis, he says, but as it persists, it continues to influence development at the level of the synapse.
“It may be that it’s more effective to target one function over another,” says Georgia Panagiotakos. “It may be that the effects of different genetic mutations converge on specific developmental processes.”
Knowing the time and cell-type-dependent functions of a gene may improve treatments for autism-linked conditions, says Georgia Panagiotakos, a Sandler Fellow in biochemistry and biophysics at UCSF.
“It may be that it’s more effective to target one function over another,” she says. “It may be that the effects of different genetic mutations converge on specific developmental processes.” Figuring that out could clarify how genetic mutations contribute to autism, and might also reveal different clinical subgroups within the condition.
“What it does is sort of broaden the horizon a bit,” Panagiotakos says, referring to the move away from a reliance on the known functions of genes. She and a collaborator published a review earlier this year urging the field to consider how a gene’s function changes depending on when and where it is expressed. “It forces us to think a little more comprehensively about what a particular [gene] mutation might do,” she says.
Each time a gene is discovered to be expressed at a time or place not previously considered, she says she feels like the field is turning on the lights in a new room of a house and discovering what a gene product does at each new location. “And sometimes,” she says, “[it] can look very different depending on the rest of the contents of the room.”
Cite this article: https://doi.org/10.53053/PWJV9432
|
A blog post highlighting the article written by Włodarczyk in Insectes Sociaux
Written by Tomasz Włodarczyk
Many ant species in nature are closely associated with other ant species. The closest form of such an association is called a mixed colony where ants of both species inhabit common nest, share food and raise their brood side by side. Mixed colonies arise as a result of social parasitism when one species exploits the labor of the other, such as in slave-making ant species. Slave-maker ants raid the nests of the host species, steal the pupae and bring them back to their home nests. Newly-emerged individuals integrate into the parasite’s society and perform all domestic duties.
In the lab, we can also create mixed colonies using species that would never form such an association in nature. The species don’t even have to co-exist geographically. This is because ants learn (imprint) colony odor after eclosion from pupae and use it as a template for subsequent nestmate recognition. Thus, by putting together callow ants of different species we can create a mixed colony of individuals that have imprinted on the odor of each other.
As a part of my PhD project I investigated the recognition behavior of ants using a colony of the facultative slave-making ant species, Formica sanguinea. By supplying them with pupae of Formica polyctena or F. rufa -which soon emerged- I formed mixed colonies (Włodarczyk 2012, Włodarczyk and Szczepaniak 2014). These experiments were inspired by the studies conducted by Wojciech Czechowski (1994) whose results suggested that F. sanguinea ants acquire their recognition signature form their slaves, as in the obligate slave-making species Polyergus samurai (Yamaoka 1990).
Later I became curious about how things look in the case of F. sanguinea colonies containing the most frequently used slave species, F. fusca. Results of chemical studies revealed that odor of F. sanguinea ants is quite different from that of its host species (Martin et al. 2008, Włodarczyk and Szczepaniak in prep.). Moreover, we found that enslaved F. fusca ants develop a chemical recognition signature which is intermediate between that of their parasite and ants from free-living colonies (Włodarczyk and Szczepaniak in prep.). This raised the question about how recognition cue diversity in F. sanguinea colonies affect the recognition abilities of ants. Even more interesting was whether there are differences in the recognition abilities between F. sanguinea and F. fusca ants given that the parasite is the only party to be under selective pressure to live in such a condition.
I collected eight queenright F. sanguinea colonies containing F. fusca slaves and maintained in the the laboratory. The slave-making F. sanguinea ants and their slaves were exposed on a Petri dish to anesthetized ants from alien colonies. I measured the number of aggressive behaviors in various encounter combinations. I showed that F. sanguinea ants are able to discriminate other individuals from the same species from alien colonies towards which they exhibit aggressive behavior. However, slaves from alien colonies were generally tolerated. This result supports the hypothesis that F. sanguinea ants are intrinsically tolerant to individuals whose odor indicates that they are slaves. Otherwise slave-making ants might accidentally attack their own slaves, which possess a recognition signature that deviates from that of the other slaves. This situation would arise when slaves from new source colony appear in the slave-maker’s society.
The other result was that slaves (F. fusca) are poor at discriminating slave-making ants and slaves from alien colonies and do not exhibit an overt aggression toward them. This could be explained by the high within-colony recognition cue diversity that hampers formation of an accurate template during colony’s odor learning phase. This is intuitive explanation since it might be hard to recognize an object of a given class when this class is relatively heterogeneous. Thus, there is no recognition barrier for F. sanguinea ants to take over slaves from alien colonies. However, such a phenomenon has not been recorded for F. sanguinea ants. Therefore we can hypothesize that intraspecific raids play at best very limited role as a way of slave gaining.
Moreover, I conducted an experiment in which slaves and slave-makers were reared separately. After about 2-month period, ex-slaves elicited aggression in ants from stock colonies (both in slave-makers and in slaves). Conversely, slave-makers separated from slaves were still treated as nestmates. This result suggests that F. sanguinea exert a strong impact on the odor of F. fusca ants, possibly by the transfer of recognition cues during food exchange.
The results of my study highlight that selective pressures associated with different life histories can lead to differences in recognition systems between social insect species.
Czechowski W (1994) Impact of atypical slaves on intraspecific relations in Formica sanguinea Latr. (Hymenoptera, Formicidae). Bull Pol Acad Sci 42(4):345–350
Martin SJ, Helantera H, Drijfhout FP (2008) Evolution of species-specific cuticular hydrocarbon patterns in Formica ants. Biol J Linn Soc 95:131–140
Włodarczyk, T (2012) Recognition of individuals from mixed colony by Formica sanguinea and Formica polyctena ants. J Insect Behav 25: 105–113
Włodarczyk T, Szczepaniak L (2014) Incomplete homogenization of chemical recognition labels between Formica sanguinea and Formica rufa ants living in a mixed colony. J Insect Sci 14:214
Yamaoka R (1990) Chemical approach to understanding interactions among organisms. Physiol Ecol Japan 27:31–52
|
The 2008 World Conference on Disaster Management, Part 2
By Scott Baltic
Part 2 of Homeland1's report on the WCDM focuses on the coverage of climate change issues, with a commentary by the editor.
Climate change and what the emergency management and response community should be doing about it was one of the themes at the 18th World Conference on Disaster Management, held in Toronto June 15–18.
In her plenary session, "Climate Change: What Should Disaster Management Professionals Be Planning For?" emergency manager and consultant Regina Phelps began by pointing out that according to Munich Re, one of the world's largest reinsurance providers, more natural disasters occurred worldwide in 2007 than had ever been recorded in history.
The effects of climate change on business, she said, will be global, long-term and possibly irreversible, as companies struggle to survive and thrive in a "carbon-restrained world." Companies that generate significant carbon emissions will over time be likely to face litigation, Phelps predicted, similar to the recent litigation over tobacco and asbestos.
An outbreak of blue-green algae, attributed to climate change, is seen on the coastline of Qingdao, in eastern China's Shandong province, June 24. (AP Photo/EyePress)
It's no wonder, then, that more corporations are responding to the issue; more than 40 Fortune 500 companies now favor regulation of greenhouse gases. Phelps also pointed to The Carbon Principles issued this past February by three of the world's largest financial institutions: Citi, JPMorgan Chase and Morgan Stanley. These guidelines for advisors and lenders to U.S. power companies resulted from a nine-month effort to create an approach for evaluating and addressing carbon risks in the financing of electric power projects.
The principles themselves are energy efficiency, limiting CO2 emissions by encouraging clients to invest in cost-effective demand reduction; renewable and low-carbon distributed energy technologies; and conventional and advanced generation, where the signatories agreed to "encourage regulatory and legislative changes that facilitate carbon capture and storage to further reduce CO2 emissions from the electric sector."
Phelps also recommended the Greenhouse Gas Protocol Initiative as a resource for savvy businesses.
With global food shortages and other other disruptions likely as a result, climate change was perceived as a threat to national security, according to an April 2007 study by the U.S. military, she added.
The coal-fired Plant Schereris in operation at Juliette, Ga. is the nation's single largest source of carbon dioxide. (AP Photo/Gene Blythe, File)
Finally, Phelps said, each of us needs to make a personal response to climate change: "Every single thing you do makes a difference for this planet."
Moreover, emergency managers, business continuity professionals and risk managers have a unique opportunity to be forward-thinking about climate change, she said. "Stick your neck out."
Near the beginning of the later panel discussion "Climate Change and Emergency Management," Richard Kinchlea, emergency management coordinator for the city of Hamilton, Ontario, struck a similar note when he said, "It's getting harder and harder to talk nice about this."
The very definition of "emergency," he predicted, will change over the next couple of decades as emergencies lose their rarity.
Moderator David Etkin, graduate program director of disaster and emergency management at York University, Toronto, commented that "Our way of life is absolutely unsustainable over the long term" and that efforts "far more dramatic" than the Kyoto Protocols are needed.
"The argument that mitigation is too expensive," he concluded, "commits you to a path of self-destruction."
As a member of the panel, Regina Phelps described "a perfect storm" of factors that are making it relatively easy for government and business to let their response to global climate change slide:
- Economic recession/depression,
- Energy costs and peak oil,
- An aging population and infrastructure, and
- Terrorism and the war in Iraq.
Dr. Carl A. Gibson, director of the Risk Management Unit at La Trobe University, Melbourne, Australia, noted that climate change is not a separate risk, but instead will amplify current risks.
"We don't know where the tipping points are" that could end human civilization, he said, but we do know that we're dealing with "increasingly fragile systems."
At the public-private interface, he said, "policy certainty beyond the electoral cycle" is needed for the consistency that will encourage businesses to invest in green technologies and make other adjustments.
Some personal comments from the editor
Phelps' "a perfect storm" caught my ear because of how I've used that same phrase to describe some other attributes of global climate change. One of the reasons I'm very skeptical about our species' ability to prevent the worst outcomes is that climate change is in many ways exactly the kind of problem human beings and human institutions are terrible at preparing for.
In my view, global climate change is a "perfect storm" for creating personal, organizational and governmental inertia.
- It's a long-term problem that has now been under way for probably several decades and whose direst consequences are decades in the future.
- For many of us in the developed world — the people who are disproportionately causing the problem and have the greatest ability to mitigate it — global climate change is going to most quickly and most profoundly affect other people, people who aren't like us and are far away.
- Even scientists who agree that anthropogenic (human-caused) climate change is indeed happening now (the majority of climatologists) can't predict with any certainty exactly what further changes will occur, how severely and when.
- Given that uncertainty, many people with personal and/or ideological reasons to doubt anthropogenic climate change have seized on the notion that the underlying phenomenon is therefore outlandish, or at least "controversial."
- Finally, the likely long-term consequences of climate change are so severe that they are, frankly, terrifying.
After David Etkin's panel, I spoke with Regina Phelps and one of the other panelists, both of whom surprised me by saying that, at some points in the past, the sheer vastness of the fallout envisioned from climate change (sea level rise, spread of tropical diseases, spread of invasive plant and insect species, crop failures, etc., etc.) had forced them to temporarily step away from the topic professionally, simply because it was so overwhelming to deal with.
I know what they meant.
Around the time of the conference, I encountered my own "perfect storm" of books. Last Christmas, as a joke, my best friend's three kids gave me Field Guide to the Apocalypse by Meghan Marco. It's a tongue-in-cheek manual to surviving every type of global catastrophe we've ever seen in movies or read in sci-fi novels: the frozen planet, the drowning planet, the technocratic dystopia (think "Blade Runner"), the robot (or zombie) rebellion, and so forth. I finally got around to reading it shortly before the conference.
One of the books I took with me to Toronto was Monster of God: The Man-Eating Predator in the Jungles of History and the Mind by David Quammen. It explores the relationships (economic, ecological, even spiritual) between humans and four alpha predators: the saltwater crocodile of northern Australia, the Indian lion, the brown bear of the Carpathian Mountains and the Siberian tiger. All, of course, are at least somewhat endangered, and Quammen is plain-spoken about his pessimism as to whether they'll still be around in the wild at the end of this century.
Another book I had on the trip, and in retrospect it was a poor choice, was a novel, The Brief History of the Dead by Kevin Brockmeier, which my Other Half had read, recommended and lent to me. It describes a transitional afterlife, a world populated by those who've died, but are still remembered among the living. The story of what happens there as worldwide biological warfare breaks out alternates chapter by chapter with the story of a woman who's stranded, alone and running out of supplies at an Antarctic research station.
I got two chapters in before I gave up.
A guy I went to college with used to call certain sad songs "music to slit your wrists by" (he's still with us, I'm happy to say), and that's how I felt about my third end-of-the-world book in a row. I know how bad things are going to get (they're getting worse already), and I fear how bad they might get, and after a certain point it's just masochism to keep reading about it.
What is useful is doing something.
Although my Other Half had offered to pick me up at O'Hare on my return from Toronto, I decided to take the el most of the way and have her meet me at a stop about 10 minutes from our house. It went smoothly, and we saved probably a gallon of gas.
Since the conference, I'm more careful about turning lights out when no one's in the room. We're going to pull the trigger and finally replace some upstairs windows with newer ones that will save energy year-round.
And there's more, but you get the idea.
The point is that the storm clouds from what will likely be the biggest disaster this planet has seen in human history are in sight and getting closer all the time.
What are you doing about it?Go back to Part 1
|
GIST CANCER DAY AWARENESS 2022
Very few listed cancers do not question your daily routine, your diet, or your exercise regime AKA your overall lifestyle. So in many ways, it eliminates a large amount of risk – factors that lead to cancer.
Similarly, although Gastrointestinal Stromal Tumours (GISTs) cancer can’t kick in from your lifestyle, there’s a massive possibility of you suffering from it based on your age and certain rare inherited genetic syndromes. Gastrointestinal Stromal Tumour (GIST) is a type of cancer that begins in the digestive system. GISTs happen most often in the stomach and small intestine. If the cell lining in your digestive tract grows and divides itself in an uncontrolled way, it creates a mass of tissue called a tumour. GISTs can be cancerous. Some people with GIST may not notice changes in their health, while others may feel unwell or have pain or bleeding.
The tunnel’s bright light is that GIST is curable if it can be surgically removed without damaging the dominant organs. On the day of spreading awareness on GIST CANCER”Join us as we move further to learn and educate others on the severity of GIST.”
Signs and Symptoms of GIST:
GIST is a fragile tumour that can bleed easily, in fact, they often get known because of bleeding caused in the GI tract.
Brisk bleeding into the oesophagus or stomach might cause the person to throw up blood. When the blood is thrown up it may be partially digested, so it might look like coffee grounds.
Brisk bleeding into the stomach or small intestine can make bowel movements (stools) black and tarry.
Brisk bleeding into the large intestine is likely to turn the stool red with visible blood.
If the bleeding is slow, it often doesn’t cause the person to throw up blood or have a change in their stool. Over time, slow bleeding can lead to a low red blood cell count (anaemia), making a person feel tired and weak.
Other Symptoms of GIST Include:
Abdominal (belly) pain
A mass or swelling in the abdomen
Nausea and vomiting
Feeling full after eating only a small amount of food
Loss of appetite
Problems swallowing (for tumours in the oesophagus)
People often pay no attention to sudden loss of appetite, belly pain, drastic weight loss, undereating etc, thinking it’s normal. However, it’s important to know that these symptoms may seem normal but it falls under the category of some of the most uncommon and severe health diseases out there. Kindly get it investigated for your safety.
Now, what exactly causes Gastrointestinal Stromal Tumours? you might ask.
According to the American Cancer Society, we don’t exactly know the cause, However, researchers have made significant progress in learning how certain changes in DNA can cause normal cells to become cancer cells.
A small number of families have GISTs that are caused by a gene mutation passed down from parent to child. But most gene mutations related to GISTs are not inherited. These changes occur for no apparent reason and are called acquired or sporadic.
If the GIST has not spread and is in a place where surgery can be safely done, the tumour and some of the tissue around it may be removed.
● Targeted Therapy
Targeted therapy is a type of treatment that uses drugs or other substances to identify and attack specific cancer cells.
Tyrosine Kinase Inhibitors (TKIs)
TKIs are targeted therapy drugs that block signals needed for tumours to grow.
Watchful waiting is closely monitoring a patient’s condition without giving any treatment until signs or symptoms appear or change.
● Supportive Care
If a GIST gets out of control during treatment or there are side effects, supportive care is usually given. The goal of supportive care is to prevent or treat the symptoms of a disease, side effects caused by treatment, and psychological, social, and spiritual problems related to a disease or its treatment.
Every year 13th of July is celebrated as GIST Cancer Awareness Day to give people hope. This day is to make sure that you get enough knowledge on uncommon cancers like GIST, which can help you and your loved ones exist at peace with needed awareness and attention that is much needed in this society which throws misinformation your way.
SELF-AWARENESS is the cheapest precaution one can take. Take it and live the beautiful life you deserve.
|
Buy custom Social Care essay
Social care can be defined as the function of agent change, which is the main goal of social care. The goal of social care is to strengthen the ability of practitioners to handle their duties, responsibilities and challenges they encounter in life and encourage the environmental improvements according to the needs of other people. The change agent needs to initially understand the system of the client in a comprehensive way. Scientific knowledge is also noteworthy as a basic instrument in handling the situations. This includes the use of models, theories and approaches. Theoretic and knowledgeable approaches help in understanding the dimensions of social care and the elements of the client system in influencing the point, tool and nature of an intervention. This makes the theoretic preferences be a crucial intervention measure in the practice of social care as well as theory (Beckett & Maynard, 2005).
a) Construction and meaning of care
The reality of the client system is the key in practicing social care. It has the truth about the entire world as that is dependent on the individual’s thoughts, beliefs and perceptions, an aspect, which is called social constructionism. This feature significantly contributes to the social care by influencing participation, self-determination, individualization, the client system, social justice and human rights as illustrated in Appendix 1. The approach of care construction puts much emphasis on the processes and activities that have been involved in trying to accomplish the change successfully (Dean and Rhodes, 1998).
Get a Price Quote
* Final order price might be slightly different depending on the current exchange rate of chosen payment system.
Construction of social care or social constructionism lay on the belief that reality if constructed socially with the language emphasis is a crucial way of interpreting individual experiences. Reality remains unknown except for the individual perceptions and interpretations of reality. Dean and Rhodes (1998) stated that discoveries of the real world are made from hypotheses building and testing in which the individual who is involved remains neutral. Construction of care emphasizes on individual values and interests that are entangled with the observations of the real world.
There are two terms that are commonly confused, i.e. constructivism and social constructionism, although they share several similarities. Both elements perceive reality in connection to the social context and social interaction rather than on observations and complete objectivity that are yet to be discovered. Constructionism focuses on the development of knowledge and its social aspects. It also describes individuals who have schemas or cognitive structures that are vital to this process. It portrays these cognitive structures to be of social origin rather than from the concrete human organism. Social constructivism involves culture and history in influencing the social construction of reality of the self-system. Both of these elements also emphasize the reality as a function of social construction using language, social discourse and dialogue. Social construction also refers to health in regards how it varies from one society to another. Gender ethnicity class determines the experience of reality, religion and education construct of the society in the UK (Appendix 1). Health, disability, and illness are also factors of social construction. Some critics argue that people surrounding an individual usually influence an individual’s perception of a symptom that is worth attention from a health professional such as a doctor. Cultural background is also an influential factor of the reasoning of a patient in seeking medical assistance. For example, a good number of Italians seek medical help, because disease symptoms interfere with personal relationships. Irish citizens are likely to develop disease symptoms because of the pressure to seek help from the surrounding people while Anglo-Saxons seek medical assistance when the developing symptoms interfere with their work (Haynes, 1998).
In social or health care, there are several definitions of illness and health, which varies widely in different cultural backgrounds. For example, the social view of illness in the middle ages saw epilepsy as a violent possession of divine forces, as compared to current times, where the cause of epilepsy is due to an abnormal neurological condition from damages to the brain. This explains the change of views and perceptions that occur over time. Most people cannot distinguish between illness and disease and generalize them to the same meaning by accepting personal explanation of illness. There are different definitions of health, some being positive while others are negative. The positive definitions describe health as physical fitness and emotional stability, and the ability to cope with life. Negative definition does not link health and illness like not having a problematic back pains and being disease free. The definition of health given by WHO (World Health Organization) is a state or function of absolute physical, social and mental wellbeing, and not just a state of disease absence and infirmity. Variations in the definitions of health imply that sociologists must perceive health and illness to be socially constructed. This means that the definitions are derived from the functioning of the body, and that culture defines and distinguishes the state of being healthy or unhealthy (Dean and Rhodes, 1998).
In the social construction of health, there are two main approaches known as the social model and medical model. The medical model focuses on the medical profession that views the body system as a machine and stresses on physical disease treatment. The medical model does not include the mental or social complications in a proper way and thus perceived to be negative. It also emphasized that the key characteristics of the medical model developed in the eighteenth and nineteenth centuries and then dominated in the twentieth century in North America. Domination of the medical model was also reported to dominate medical practices and the attitudes of the society towards health in the UK, in the twentieth century (Appendix 1). It is extremely essential that the healthcare professional dealing with patients from diverse cultural backgrounds in order to understand their patients’ beliefs on the causes of illnesses and the treatment regimes that they consider being most acceptable and effective (Franklin, 1995).
On the other hand, the social model of health emphasizes how the society defines views illness and explores an individual's perceptions rather that figuring out what could be wrong. The social model focuses on the lay definitions of health and considers factors such as lifestyle, diet and housing to strongly affect health of an individual. Currently, health professionals have begun to acknowledge that health is profoundly ffected by social factors like lifestyle and stress and that good health is a function of disease absence. The medical model views disability as an illness and advocates for the adaptation of the affected individuals in the construction and organisation of the society. It also sees a disabled person to be entirely dependent on society and justifies the exclusion of the disabled people from the society. The social model, on the other hand, views disability as being socially constructed and refers to the way that people with disabilities have to face restrictions from the society. Negative effects can prop up from the society if education, building and transport systems do not consider the disabled people.
Social or health care construction is closely linked to the mission and value system of the discipline and profession of social care. Social carers often try to inquire the dominant structures of knowledge in understanding the impacts of history and culture. Factors such as economics, ethics, politics and ideology determine the way how social carers understand the needs of different people as proposed in Appendix 1. These models may enable the social carer in constructing the problem, and the means of addressing the impacts on the rendered services (Witkin, 1999).
b) Ethics and ethical practice
Ethics and ethical practice are the study of the human conduct. It is a branch of philosophy influenced by questions regarding the meaning of life. It connects to perceptions about life, and if they originate from religion or philosophy, as well as their effects on the human conduct. There are several theories that have been raised on ethics and ethical practices such as Kantian, Utilitarianism and Virtue ethics. The most widespread ethical theory is the Utilitarianism theory, which is based on the utility principle. This principle states that, in a situation concerning an ethical choice, an individual should opt for the choice that results in the greatest happiness for most people affected as an intervention may result to either good or bad. John Stuart Mill opposed the critics of the utilitarianism theory by stating that there are qualitative differences in pleasures and that proper education or information results into the appreciation of good deeds (Thompson, 1999).
An ethical theory of universal principles (Kantian theory) has been developed that focuses on the view of rationality in enabling people to understand their duties and the relationship of these duties in enlightening the world. For example, if everyone lied than no one will be able to distinguish what is truthful and false. People need to be respected as being self directing and autonomous, despite the growing interest of the society in technology, which acts to reduce the interactions of individuals, thus putting pressure on the society to become more universal and less autonomous (Hinmann, 2003). The Kantian theory remains a basis of social care and is the most dominant in relation to the ethics of social care. Members of the society need to be treated equally, with equal measure of respect (Banks, 2006).
Human qualities form the foundation of virtue ethics are based on the approach that is installed and expressed in ethical choices. These human qualities include honesty, courage and kindness of an individual. It is evident that the values of social care should emphasize on the need of clarifying individual values of social carers. This result from the assumption that personal values of a social carer affects significant influence on the clients’ views, the strategies and frameworks of interventions, and the outlines of the outcomes (Beckett & Maynard, 2005).
Ethics and ethical practices are evident in Appendix 2, as the social carer may have maternal feelings towards the client. These individual values or feeling can pose challenges to the case, especially if they conflict with the policies or laws of the agency (Reamer, 2006). However, effective social carers must instil virtue theory by focusing in their character traits, which will assist in ignoring the possibility of individual determination of ethical choices over other options (Parott, 2006).
The General Social Care Council GSCC (2002) points out the required standards of professional conduct practice for social carers, which are stated in the Codes of Practice. The set criterion is applicable as a guide to ethical practices and clearly defines the ethical conduct standards that need to be met by the social carers. They are also encouraged to improve all possible areas by evaluating their own practice. The organisations’ values contained in Code 3 are specific to families and children. The social carers need to encourage the independence of the service user, and protect them from harm or danger.
Beckett & Maynard (2005) also implies the wishes and needs of the client verses the wishes and needs of the caregiver or parent. For instance, in Appendix 2, the issue of personal values may come up as the social carer may have the same opinions and views as Jane’s parent. The social carer may, therefore, suggest that Jane should agree to follow the rightful procedures in dealing with the bullies, such as reporting them to the necessary authorities, as well as follow the measures of dealing with the stigma in order to progress smoothly with her academic work. However, the social carer may base her decision on Legislation such as the Children Act, 1989, s.1, whereby the welfare of the client is paramount. This is because the social carers have the tasks and services as outlined in the policies and laws (Brayne & Carr, 2005).
It is evident that social carers are faced with challenges of having to perform their duties in line with the laws while giving priority to their work load, and serving the best interests and rights of the service user, as well as the society in the most acceptable and ethical way. From an ethical point of view, the social carer is required to take on the responsibilities for actions that they have control and must be able to account for these to behave in a truly professional manner (Banks, 2006). Therefore, the ethical content of reflection is outlined by avoiding oppressive practice; to work in an anti-oppressive manner requires social carers to be, in a mode of continuous, critical reflection. This involves stepping out of one’s practice and measuring it against ethical principles of anti-oppressive social care (Parrott, 2006).
I had previously worked as a social carer in the UK. I will therefore, draw a personal reflection on my past experience, in relation to the case study, in Appendix 2, that I was personally involved when I was a social carer. From Jane’s case, I noted that the greatest chhallenge that social carers face is ethical dilemmas that come up because of risk assessment and confidentiality. Confidentiality is a key factor in creating and maintaining an effective relationship and connection with the client. From the case study in Appendix 2, utilitarian may justify the need to respect the confidentiality rights of the client in order to achieve their protection from danger or harm (Reamer, 2006). Consequently, a key feature in social care is the risk, which is responsible in identifying the influence or occurrence of a potential hazard. However, there are challenges in risk assessment, because it focuses on making judgments on the prediction of future possibilities of a change in the behaviour of a client or occurrence of the unknown. A social carer must therefore, protect clients, if a necessity arises in the quest of ensuring their protection and safety.
I noted (in Appendix 2) that initially Jane opted to live in a state of denial as even her elder brothers never cared about what she was going through, or try to protect her from the bullies. The decision to this situation would simply not be a personal choice, because the expectations of the agency and the stipulated guidelines need to be followed in dealing with the situation, while also respect the confidentiality rights of the client and maintain effective communication with the client (Becket & Maynard 2005).
Effective working relationships and partnerships encounter barriers such as multi- agency rivalry, which generates difficulties and undesirable consequences. This calls for a measure to establish strong working relationships in order to ensure successful and effective partnerships service users and the concerned agencies, by ensuring respect and recognition of the strengths of the expertise (Adams, Dominelli & Payne, 2005). Social carers need to work in collaboration with other organisations besides their own agency, and be aware of their duties and responsibilities as well as the negative or positive impacts of their work to other social carers. The practitioner needs to uphold a self-critical approach in their responsibilities as well as evaluate their work and reflect on the decisions they have to make (Adams, Dominelli & Payne 2005).
Differences in values and ethics may also generate challenges such as social carers having different priorities, pressures, objectives, concerns, constraints, expectations and legal obligation. These differences may create difficulties in working of multidisciplinary partnerships, and result into oppressive and discriminatory practice, because of mistrust, tension and poor communication (Dalrymple & Burke, 2006). Social carers also need to be aware of disadvantaged social groups, and be keen on the challenges, such as discrimination, as an important factor of anti-oppressive practice. This practice demands a positive approach when handling such vulnerable groups that exist in the society (Parrott, 2006).
Another risk or challenge that is connected to the case study in Appendix 2 is in regards to Jane’s age and state of self-denial, which led her into negative thoughts of contemplating to commit suicide. The social carer will, therefore, be required to encourage the client on the importance of continuing to live, and the possibility of overcoming all her tribulation by adopting effective strategies. This is in line with the utilitarianism theory, which also emphasizes on the happiness of the service users, or what is necessary for the general welfare of the client (Thompson, 1999). On the other hand, Kant was critical of the approach defined by the utilitarian by explaining that in the instance that the client decides to commit suicide, then that would signify the sacrifice of one person for the sake of the others, if there was a chance of expressing the benefits of harm to one individual over the other beneficiaries (Beckett & Maynard, 2005).
Presenting an ethical argument involves the aspects of right and wrong evaluations and decisions; therefore, the social carer must clearly define the basis of making any claims as well the values and ethics involved. Failure of the practitioner to follow this principle may result in the lack of appreciation of different opinions and conclusions from other professional, on the rights and wrongs of the issue. This illustration explains that an issue is seen as trivial to one individual may be pertinent to another person (Thompson, 1999).
A reflection on the ethical principles and practices on Appendix 2 showed that I did respect Jane as an individual with the capability and rights to make her own decisions, to encourage her self-determination and ability to offer support (Kantian). Utilitarian considerations are also evident in Jane’s case, as recognize the concerns of the possibility of developing stress and depression, or even negative thoughts of life due to living in self denial. I also did show the sense of fairness, trust, and honesty by supporting Jane throughout the case (Virtue ethics).
Social care reflects on the different values and ethics supported by different people, even at the basic level of social construction. The professionals in the field of social care may even have to reason and make decisions in a critical way in lie with their own values. Western (2006) suggests that in social care, there is no clear distinction between decisions and answers that are right or wrong to an ethical dilemma. This calls for ethically justifiable and skilled judgments, and the selection of the best and ethically acceptable course of action. However, sometimes the matter at hand tends to be extremely complex an ethical issue that can prove to be difficult for the concerned social carer to resolve. In such instances, the practitioner or social carer should seek assistance or guidance from the senior, management, or other professional agencies.
Professional integrity and ethical courage should be maintained by social carers, as well as moral strength in order to achieve effective analysis of the situation, and their pledge to respect the confidentiality rights of the clients despite any pressures from other social carers (Banks, 2006). Partnership is also beneficial in maintaining an effective communication and a productive relationship with the service user. It is essential for the professionals involved in social care to maintain these positive relationships, as they are indispensable in offering a range of options for the service user, enabling positive results for the individuals actively involved in the case (Thompson, 2007). Resolving the dilemmas of social care also requires social carers to be aware of the standards of practice that make up sound behaviour practice, as well as understand the principles stipulated in the codes of ethics and practice.
Buy custom Social Care essay
|