text
stringlengths
144
682k
Indium Blog What the Off-Eutectic? When we talk about off-eutectic alloys, we must take a step back and talk about what makes a eutectic alloy. Each solder alloy has both a solidus (not melted) and liquidus (completely melted) temperature. When these temperatures are the same, the alloy is eutectic. For example, 80Au20Sn is a eutectic alloy with a melting temperature of 280°C. When these temperatures are different, the alloy is off-eutectic, or non-eutectic. Going back to the AuSn example, when we slightly change the composition of the 80Au20Sn to 79Au21Sn, 78Au22Sn, or even 75Au25Sn, these alloys will have different solidus and liquidus temperatures. This creates a plastic, pasty, or I’ve even heard it called molten, range. The way it was first described to me from a colleague was to think about if you put some ice cubes in a glass and set it outside on a sunny day. The glass starts out having solely ice in it, then there will be both ice and water coexisting in the glass, until finally, the glass will be completely water. The mixture of ice and water would be considered the plastic range of an off-eutectic alloy! With Gallium Nitride (GaN) dies becoming popular in high frequency, high power, high-reliability RF power amplifier devices for 5G and other critical military and aerospace wireless communications, Indium Corporation was presented with some challenges. Some GaN dies have a thick gold plating to prevent oxidation. It’s extremely crucial that the solder joint maintain the eutectic composition of 80Au20Sn to benefit from all the unique properties of the alloy, mainly the high joint strength. However, if an 80Au20Sn preform were used as the soldering material, the solder would begin to absorb some of the gold from the plating during reflow, skewing the final solder joint composition away from 80Au20Sn and directly weakening the solder joint strength. This is where developing an off-eutectic alloy provided us with some great opportunities in GaN die-attach applications! By lowering the gold content in the AuSn alloy, there is room for the solder to absorb some of the gold from the plating, and end up with a final joint composition of the eutectic 80Au20Sn. The thicker the gold plating on the die, the lower the gold content the AuSn solder preform must be, and voilà: back to a strong and reliable solder joint! Indium Corporation’s off-eutectic preforms ensure strong solder joints in a plethora of device and package hardware. Our off-eutectic AuSn preforms are currently available now in 79/21, 78/22, and 75/25 compositions, with a wide range of X, Y, and Z dimensions available, unique to any die size. For clarity, H2O is not a metal alloy and therefore cannot have eutectic/off-eutectic properties. It was used as an example only
Nobel prize in chemistry goes to developers of lithium-ion batteries Technology 9 October 2019 New Scientist Default Image Niklas Elmehed The 2019 Nobel prize in Chemistry has been awarded to John Goodenough, Stanley Whittingham and Akira Yoshino for the development of lithium-ion batteries. Lithium-ion batteries are found in everything from mobile phones to laptops and electric cars. They have revolutionised our lives, and laid the foundation for a wireless, fossil fuel-free society, says the Royal Swedish Academy of Sciences. “We can see an enormous, dramatic effect on society because of this fantastic battery,” said Olof Ramström, a member of the Nobel Committee. During the oil crisis in the 1970s, Stanley Whittingham, now at Binghamton University in the US, developed the first ever lithium battery. The positive electrode, or cathode, consisted of titanium disulphide containing lithium ions. Lithium is the lightest metal, so using lithium ions makes batteries lighter. However, the negative electrode, or anode, consisted partly of metallic lithium, which is highly reactive. As the battery was recharged, slivers of metallic lithium grew out from the anode. When they touched the cathode they short-circuited the battery, sometimes resulting in an explosion. John Goodenough, now at the University of Texas at Austin, predicted that replacing the titanium disulphide cathode with a metal oxide would make it more powerful. In 1980, he created a battery in which the lithium ions were contained in a cathode of cobalt oxide. This doubled the voltage, or power, of the battery, but did not solve the safety issue. Akira Yoshino of the Asahi Kasei Corporation in Tokyo, Japan, managed to eliminate the metallic lithium from the anode. He developed an anode made of petroleum coke containing lithium ions. In 1985, Yoshino created a safer battery that could be recharged hundreds of times – the first viable lithium-ion battery. In 1991, the lithium-ion batteries were launched commercially. Because they were lighter and more powerful than other kinds of rechargeable batteries, they made it possible to develop more powerful and portable electronic devices – such as mobile phones. The technology is still being improved. Modern lithium-ion batteries have iron phosphate cathodes developed by Goodenough, which is more environmentally friendly than cobalt oxide. More on these topics: Chang'e 5 landing site Rocks gathered by Chang'e 5 rover show magma once spewed from the moon Benjamin List and David W.C. MacMillan. The Nobel Prize in Chemistry 2021. Chemistry Nobel awarded for technique to produce mirror molecules Syukuro Manabe, Klaus Hasselmann and Giorgio Parisi Physics Nobel awarded for work on chaotic systems such as the climate Knee osteoarthritis Lubricating arthritic knees with synthetic fluid may help tissue heal
War in Taranaki 1860-63 Page 2 – Pressure on Māori land As the Pākehā population of New Zealand increased during the 1850s, Māori faced growing pressure to sell their land. By the late 1850s the entire South Island was in settler hands. In the North Island, where the great majority of Māori lived, meeting settler demand for land was proving much harder. In his first term as governor, George Grey had overseen sizeable purchases in Porirua, Rangitīkei, Wairarapa and Hawke’s Bay. His successor from 1855, Thomas Gore Browne, achieved few significant land purchases in the North Island. Māori became more reluctant to sell land in the North Island in the early 1850s. The idea of a Māori king was suggested. It was hoped that a king would have sufficient mana for land to be placed under his protection, thwarting the ‘divide and conquer’ approach to buying it. Belich on the King Movement Historian James Belich argues that the emergence of the Kīngitanga did not represent a radical change. Rather, the profile of Māori independence was raised from a level which the British disliked but tolerated to a level which they found unacceptable. In 1858 the Waikato leader Pōtatau Te Wherowhero was installed as the first Māori king. He set up a boundary separating his area of authority from that of the British Crown. Several major iwi did not join the Kīngitanga. Nevertheless, there were fears that the Māori king posed a direct challenge to British authority. The settler community viewed the Kīngitanga as an anti-land-selling league that should be ‘nipped in the bud’. Having achieved political and numerical supremacy (the non-Māori population exceeded that of Māori for the first time in 1858), the settlers expected more to be done to free up Māori land for settlement. Particular pressure points were Auckland and New Plymouth, which were surrounded by large Maori populations reluctant to sell land. Tensions in New Plymouth The European settlement of New Plymouth had been plagued from the outset by the unavailability of sufficient land. In 1848 it remained confined to just 3500 acres (1400 ha). Grey had secured an additional 32,000 acres (13,000 ha) by 1853, but this was not enough to satisfy settler demand. A few local Te Ātiawa leaders, including Rāwiri Waiaua, Ihaia Kirikumara and Te Teira Mānuka, were willing to sell land, but they faced strong opposition from chiefs such as Te Waitere Katatore and Wiremu Kīngi Te Rangitāke. Te Ātiawa politics had been complicated by the return to northern Taranaki of many of those who had migrated south a generation before, following the Waikato invasion of Taranaki. In 1848 Wiremu Kīngi and nearly 600 of his people returned from Waikanae and established a new base on the south bank of the Waitara River. As he consolidated his authority, tensions with Te Teira began to emerge. The Puketapu feud In August 1854 the disagreement within Te Ātiawa came to a head. Rāwiri Waiaua, his brother Pāora and three other members of his Puketapu hapu were killed in a dispute over a block of land Rāwiri wished to sell. The killings were carried out by a group of fellow Puketapu men acting on behalf of Katatore. New Plymouth braced itself for a backlash. There were fears for the long-term prospects of the town if other ‘friendlies’ should fall victim to the ‘anti-land-selling league’. The first New Zealand Parliament was only a few months old and the country was between governors (Grey’s replacement, Thomas Gore Browne, did not arrive until September 1855). Donald McLean, the chief land purchase commissioner, was sent to New Plymouth to deal with the matter. Rāwiri’s people were told that as this was a ‘quarrel between natives’, the government would not get involved. These events were overtaken in early 1855 by the fallout from another killing. Rimene of the south Taranaki iwi Ngāti Ruanui was murdered for allegedly having had an affair with the wife of Ihaia Kirikumara, an ally of the recently slain Rāwiri. Around a dozen Māori were killed in the conflict that followed. Wiremu Kīngi initially refused to take sides in the Puketapu feud. When it appeared that land at Waitara might get caught up in this dispute, he threw his support behind Katatore. He and his wife, Hēni, tried to bring the feud to an end in 1856 by visiting a number of local pā. These efforts appeared to be working. But in January 1858, Katatore was ambushed and killed near Bell Block on the instructions of Ihaia. Fresh panic gripped Māori and settlers alike. How to cite this page 'Pressure on Māori land', URL: https://nzhistory.govt.nz/war/taranaki-wars/pressure-on-maori-land, (Ministry for Culture and Heritage), updated 20-Oct-2021
Machine Learning What is Machine Learning? In this Fortune article, What is the Difference Between Artificial Intelligence and Machine Learning, the author clearly describes the difference between AI and Machine Learning: “AI is the broader concept of machines being able to carry out tasks in a way that we would consider smart,” while machine learning is “a current application of AI based around the idea that we should really just be able to give machines access to data and let them learn for themselves.” How Does Machine Learning Work? Two Machine Learning Modes: Supervised and Unsupervised When software is used to tell the algorithm specifically what we want to discover, it is called supervised ML. The machine learning algorithms use a ‘target’ variable or attribute to ‘train’ a model based on the data in the target variable. Unsupervised ML is when the machine can learn to identify complex processes and patterns without a human to provide guidance along the way. It uses clustering as an application, where the dataset records are automatically segmented into groups. Those groups are similar to records in their own group and dissimilar to records in other groups. Machine Learning has two learning modes: supervised and unsupervised What are Applications of Machine Learning? Almost every business industry can benefit from machine learning, including applications such as forecasting, fraud detection and human resources. • Forecasting When it comes to demand forecasting, machine learning algorithms can be especially helpful in complex scenarios. Machines can do a much better job of forecasting difficult situations than humans. They leverage the knowledge, experience and skills of planners, and other experts in a highly efficient and effective way across a broad range of data. • Fraud Detection Many financial companies have taken steps using AI tools to detect suspicious activity and separate false alarms from true fraud. The goal is not only to reduce the number of false alarms, but also to avoid blocking the accounts of legitimate customers as well. If the same account has been accessed by five internet protocol addresses within five days, traditional analytics software sees a pattern and flags that as suspicious. But with machine learning, a system can look at each case more closely and see that the user is an executive buying gifts for his family while on the job. And thereby avoid blocking the executive’s transactions that were completely legitimate. • Human Resources Artificial intelligence helps HR managers and directors make decisions with greater confidence. The technology helps with better management of data-heavy tasks, spotting top talent in unlikely places, and even improving employee satisfaction to reduce turnover rates. Machine learning algorithms can assess candidates to find the best vacancy for them. Machines can detect patterns faster and with a greater degree of accuracy than HR departments can. Programs can determine where they might fit best in the company by correlating candidate’s’ past experiences and relevant skills. Desktop, laptop, tablet and mobile devices showing various data visualizations acquired through Machine Learning. What Skills Are Required for a Career in Machine Learning? If you are considering a career in machine learning, here are some of the skills that will help you excel in this growing field. • Statistics: Tools and tables are essential in machine learning to create models from data. Statistics and its branches such as analysis of variance and hypothesis testing are crucial for building algorithms. And machine learning algorithms are built upon statistical models. So it is vital to gain knowledge on statistical tools to accelerate your career in machine learning. • Probability: Probability helps in predicting future consequences, and most of the algorithms in machine learning work based on uncertain conditions, yet they must make reliable decisions. Mathematical equations in probability such as derivative techniques, Bayes Nets and Markov decisions would help machine learning in predicting the future. • Data Modeling: The critical task of machine learning is to analyze unstructured data models, which requires the science of data modeling. Data modelling helps identify the underlying data structures, finding the patterns, and filling the gaps between the places where data is nonexistent. Having explicit knowledge of data modeling concepts would help in creating efficient algorithms. • Programming Skills: Since machine learning mostly depends on algorithms, it’s important to have a sound knowledge of programming languages. Dealing with machine concepts is entirely different from handling smaller tasks such as creating simple applications or scripting web pages. It demands extra knowledge and skill of programming. Below are skills that will help you become a professional in machine learning. Below are skills that will help you become a professional in machine learning: • Programming Fundamentals and Computer Science: Machine learning involves computation on large data sets so it’s important to have strong fundamental skills in areas such as computer architecture, algorithms, and data structures. • Applying ML Libraries & Algorithms: As a machine learning engineer, you don’t need to start from scratch; you can take advantage of algorithms and libraries that are developed by other developers and organizations. You can choose from a wide variety of API packages and libraries such as Microsoft Azure ML Studio, Apache Spark MLlib, and Google TensorFlow. • Software Design: Machine learning requires integration so you’ll need to develop algorithms and systems that can easily integrate and communicate with existing technologies. Strong skills working with APIs such as web APIs and dynamic and static libraries will be extremely valuable.
Silas Marner George Eliot Contributed by Harvey Landy Character Analysis Silas Marner  Silas is a young man when we get our first glimpse of him in the town of his birth, Lantern Yard. He is renowned there for his great piety, which is evidenced in a notorious fit that he falls into while at church one day. After fainting, the townspeople revere him for what must have been his religious visions. But his close friend, William Dane, suspects the faint to have been caused by satanic -- not divine -- forces. William accuses Silas of stealing money from a dying deacon that the two had volunteered to look after, and the town finds Silas guilty. He leaves in disgrace for Raveloe. He spends his first fifteen years in this new town living a hermit-like existence, weaving day and night, and stockpiling the gold he gets in return for his wares. Silas’s life revolves around his gold, and he takes it out each evening to admire. One evening while he’s out on an errand, however, a young man named Dunstan Cass, who is the son of Squire Cass -- one of the best-respected and most seemingly well-off men in the community -- stumbles by and steals Silas’s money in the hopes of paying off a debt to his father and brother. When Silas discovers his money gone, he’s thrown into a deep depression that isn’t lifted until an unusual event happens. In his fifteenth year at Raveloe, Silas finds a young child sitting in front of his fire one evening. She is the daughter of Godfrey Cass (Dunstan’s brother), who wed a woman named Molly, fathered her child, and has kept these two secret from the rest of the community. The child has wandered away from Molly, an opium addict who died in the snow outside Silas’s house. Silas names the girl Eppie, and his life is instantly changed. He becomes well-liked by the townspeople, who respect him for taking in an orphan (no one knows that Eppie is actually Godfrey’s daughter, of course). The novel jumps sixteen years, and Silas is a man of fifty-five, living a delightful existence with Eppie. The two remain devoted to each other until the end of the novel, living together in Silas’s small cottage. Eppie Marner She’s only a small child when she makes her entrance in the novel. She’s a toddler in her mother’s arms one night, being carried to the Cass’s New Year’s Eve party, where the two are most emphatically not expected. When her mother, Molly, passes out in an opium-induced haze, she wanders off into Silas’s house. She lives with him after that, and she grows up to be a boisterous, vibrant girl with flowing brown curls. She is absolutely grateful to Silas and deeply attached to him. She marries Aaron Winthrop. Godfrey Cass Godfrey is the eldest son of the Cass family. He doesn’t get along well with his younger brother Dunstan, and this may be partially to do with the fact that Dunstan knows a secret about Godfrey that no one else knows, and that he constantly threatens to bring to light. Godfrey has married a woman named Molly and fathered her child. He does not associate with either of them, and wishes to keep it that way, since he is in love with Nancy Lammeter. He eventually marries Nancy, however, once it becomes clear that Molly has died. Dunstan Cass The bad seed of the Cass family, Dunstan is a hard-drinking, money-blowing, irresponsible young man. He borrows money from Godfrey early in the novel, and in order to pay it back, steals Godfrey’s favorite horse, Wildfire, and sells him. Before making the trade, however, Dunstan gets Wildfire killed in a hunting accident. On his way home from the accident, Dunstan passes by Silas’s house, finds his gold, and steals it. He isn’t heard from again in the novel, and it later turns out that he fell (or threw himself -- no one’s quite sure) into the stone-pits near Silas’s house and died there. Squire Cass Dunstan and Godfrey’s father. He lives in a mansion in the center of town referred to as the Red House. He hosts parties and keeps a bountiful kitchen, perhaps as a way of overcompensating for the absence of his wife, who has left him widowed. Red House appears to be a quite prosperous place, but all is not as it seems. The Cass’s are less well-off than the townspeople think, and it is for this reason that Squire Cass is eager to see Godfrey married to Nancy Lammeter, whose family is quite rich. Nancy Lammeter Godfrey’s love interest is capable of being quite cold to him. She’s turned down his marriage proposal once before, and when the novel opens they’re only capable of the most awkward interactions. She marries Godfrey eventually, and they have a marriage that she’s quite happy with, although she worries that he’s frustrated with their lack of children.  Priscilla Lammeter The most relevant thing we learn about Nancy’s sister is that she never marries and instead takes the place of her deceased mother, tending to the Lammeter farm and household.  Dolly Winthrop Dolly is one of Silas’s closest friends in Raveloe. They become close after Silas’s money is stolen, and she comes over at Christmastime to bring him lardcakes. The two are fond of discussing and debating religion, and Dolly is somewhat forceful with Silas that he accept her version of faith.  Aaron Winthrop Dolly’s son grows up to court Eppie and ask for her hand in marriage, which she accepts. He is devoted to her and dedicates himself to building her a garden. Molly, Godfrey’s first wife We don’t know much about Molly. She only has one scene, and in it she is carrying her daughter through the evening streets of Raveloe, determined to crash the Cass New Year’s Eve party and force Godfrey to own up to his relationship with her. After imbibing some opium, however, she lies down in the snow outside Silas’s house and dies. William Dane Silas’s first and closest friend betrays him early on in the novel, when Silas lived in Lantern Yard. He steals money from a dying deacon and frames Silas, then steals his fiancee, Sarah, and marries her. Have study documents to share about Silas Marner? Upload them to earn free Studypool credits!
suomi-englanti sanakirja pilot englannista suomeksi 1. koejakso, pilotti 2. lentäjä 3. karja-aura 4. luotsi, perämies 5. luotsata 6. sytytysliekki 7. ohjata 8. esiotos 1. Substantiivi 2. lentäjä, pilotti 3. ruorimies 4. luotsi 5. koejakso 6. koe-, pilotti- 7. merkki- 8. Verbi 9. ohjata 10. luotsata 11. kokeilla, testata, pilotoida, demonstroida pilot englanniksi 1. A person who steers a ship, a helmsman. 2. 1697, John Dryden, ''The Works of Virgil'', The ''Aeneid'' Book One 3. They scud before the wind, and sail in open sea. Ahead of all the master pilot steers; And, as he leads, the following navy veers. 4. A person who knows well the depths and currents of a harbor or coastal area, who is hired by a vessel to help navigate the harbor or coast. 5. A book for maritime navigation. 6. An instrument for detecting the compass error. 7. A vehicle. 8. A person authorised to drive such a vehicle during an escort. 9. A guide or escort through an unknown or dangerous area. 10. 1834, Crockett|David Crockett, ''A Narrative of the Life of David Crockett'', E. L. Cary and A. Hart, page 43: 11. So we mounted our horses, and put out for that town, under the direction of two friendly Creeks we had taken for pilots. 12. Something serving as a test or trial. 13. (quote-book) 14. (ux) 15. The heading or excavation of relatively small dimensions, first made in the driving of a larger tunnel. 16. A person who is in charge of the controls of an aircraft. 17. A sample episode of a proposed TV series produced to decide if it should be made or not. If approved, typically the first episode of an actual TV series. 18. A cowcatcher. 19. A light. 20. One who flies a kite. 21. A short plug, sometimes made interchangeable, at the end of a counterbore to guide the tool. 22. Made or used as a test or demonstration of capability. 23. ''a pilot run of the new factory'' ''The pilot plant showed the need for major process changes.'' 24. Used to control or activate another device. 25. ''a pilot light'' 26. Being a vehicle to warn other road users of the presence of an oversize vehicle/combination. 27. ''a pilot vehicle'' 28. To control (an aircraft or watercraft). 29. To guide (a vessel) through coastal waters. 30. To test or have a preliminary trial of (an idea, a new product, etc.) 31. To serve as the leading locomotive on a double-headed train. 32. (quote-journal) 33. (l) 34. (l), warning light 35. (l) (gloss) 36. (lv-inflection of) 37. (qualifier)'' (lv-inflection of) 38. (lv-participle of) 39. stake (pole designed to be pushed into the ground) 40. (l) (''controller of an aircraft'') 41. control
clock menu more-arrow no yes Filed under: Google is helping build a giant database for understanding autism New, 48 comments Database of sequenced genomes planned to be the largest ever Autism Speaks is teaming up with Google to create what it says will become the largest database of sequenced genomes from people with autism and members of their family. Autism Speaks, the research and advocacy group, plans for the database to include genomes from 10,000 people, 1,000 of which it's already completed sequencing of. The group's hope is that the database, which it says will be an "open resource," will facilitate research into the causes of autism spectrum disorder, as well as subtypes of it, treatments, and diagnosis. "Modern biology has become a data-limited science. Modern computing can remove those limits." "The [Autism Speaks Ten Thousand Genomes Program] holds the potential to radically transform our understanding of autism and redefine the future of medical care for those affected by the disorder," Rob Ring, Autism Speaks' chief science officer, says in a statement. "Working with Google is a game-changer in this story." Autism Speaks is turning to Google for help storing and managing the database, given its large size. Google has a genomics platform for this very purpose, and it's meant to let researchers focus on their work and not have to deal with computer and storage issues. Similar databases of genomes have existed for a while now, but this new one should achieve a far larger scale with regard to information on autism. "Modern biology has become a data-limited science," David Glazer, Google Genomics' engineering director, says in a statement. "Modern computing can remove those limits." There's no date on when the database might be complete, but Autism Speaks say that it already has its next nearly 2,000 samples, which will bring the database up to 3,000 genomes once they're ready. Though Autism Speaks has garnered controversy over its approach to autism, if its new database is in fact open to any interested researcher, that should allow for a diverse approach to further research into this huge set of data.
All posts by bmattison No to Child Jockeys Yes to Robots Countries such as The United Arab Emirates, Saudi Arabia, Qatar, and Egypt (just to name a few) have banned child camel jockeys in the traditional Bedouin sport because human rights groups said that children were getting injured, abducted, or even sold by their families. The U.S government reported that “each year, children as young as 2 are trafficked from countries such as Bangladesh, Pakistan, and Sudan for use as jockeys in the Persian Gulf States’ camel racing industry.” Good camel jockeys are small and light and this is why very young children are targeted. Often these boys come from poor families. Mr. Burney explains how children are brought into this work, “he says in some cases kidnappers grab the boys off the street, then smuggle them out of the country. Other times, well-dressed men approach poor families offering them charity.’And he will say I am a rich man and I want to sponsor some of the children,’ said Ansar Burney. ‘I want to give them education and a good future.’ But in this case, Mr. Burney says a good education means learning how to race camels.”  Child camel jockeys are often sexually and physically abused. These children do not live in safe or healthy conditions and get strapped onto the camel in order to stay on. Camels can approach speeds of up to 40 kilometers an hour, so accidents are common. This results in boys often getting broken bones and some even trampled. A long term effect caused by all the constant friction and bouncing is kidney damage. Reporter Tom Phillips wrote that “these children were widely reported to suffer human rights abuses, and several countries – including the United Arab Emirates and Qatar – have banned human jockeys outright.”  The Trafficking Victims Protection Act of 2000 was a tool for the U.S. to combat human trafficking. The Gulf States and the United States then worked together to try to end child trafficking. June Kunigi “says the UAE has also agreed with UNICEF to establish two rehabilitation centers for former child jockeys. Doctors and social workers will help the children recover until they can be repatriated and reunited with their families.” Since the children are so young and separated from their family, living overseas, they rely on their captors to survive.  The young jockeys, children from the ages of about 6 to 13 are actually defending the traditional ways. They claim that they are better riders than the robots. They have nothing else and need to make money for their families and this need explains why they may feel this way. Eid Hamdan Hassan, head of the Egyptian Camel Federation, believes that soon there will be no human camel jockeys. Part of the allure to camel racing is that when a camel wins their value goes up. Now with the robots, races can still happen without harming young children. The development of these robots started in 2001 ”when Qatari authorities approached Swiss robotics manufacturer K-Team about creating an alternative to human jockeys in anticipation of a ban.” The first models of robots came out in 2003 and were awkward and heavy, the camels didn’t like them and they were hard to get. The Swiss version of the robot made its debut in 2004 and has become more widespread in the Arab world. Now the robots are more streamlined and owners can even find clothes for them to make them look like tiny jockeys. A generic model of a robot costs about $500. The use of child jockeys was banned in 2005 and it has not been completely eradicated, but the robots are a good alternative.  When racing with robots the owners and trainers have a bit more control over the camels unlike when the children were the jockeys. The owners or trainers of the camels drive along next to the track and into a walkie-talkie they will make a throaty nose to coax the camels along. Sam Borden, author of The New York Times article “Sprinting Over the Dirt, With a Robot on the Hump” gives a detailed description of the mechanics behind the robots:  “The Dewalt power drill is the heart and lungs of the modern robot jockey; shop workers like Raheem and Jameel order the drills in bulk and use them, and their rechargeable batteries, to construct the core of each robot. Remote-entry clickers (the kind used for cars) combine with long ribbons of plastic wrapped in cotton to make a spinning whip that can be activated from afar, and walkie-talkies allow the owner to speak to the camel from a trailing S.U.V.”   These jockeys have been an attractive substitute to children, but there is some question as to whether or not there is some resistance and if the camels are treated well. To own a camel is expensive but the owners take pride in them and take good care of them as Mr. Borden explained, “owning a camel is an honor in many Gulf countries, and there are laws about how much tax a camel owner must pay (it depends, in part, on how many camels he or she owns). Camels can also be used to pay a woman’s dowry — prices vary — or as collateral in a trade of goods or services.” The safety and health of the camels is clearly a priority. As for the children Mr. Borden continues to say that “some owners said quietly that they still might prefer to have human jockeys, though none would say so publicly.  But a majority, perhaps recognizing the troubling perception of having children ride animals that stand 6 feet tall and can run up to 40 miles per hour, unabashedly praised the technology now widely used instead: robots.”  It seems that this solution to a human’s right issue has been well-received and accepted by all parties. If there are people that do not like this change it appears that they are a minority and, therefore, are not speaking out against it. The camels are treated well and the children have started to be returned to their families. Hopefully the robots will continue the good work.
Linda is a young girl who absolutely adores dogs. She owns a golden retriever named Matthew, a chihuahua named Mark, and a Siberian husky named Luke. Every weekend she takes her dogs to the dog park where they love to run, play catch, and meet other dogs. When Linda took her pets to the park last Saturday, she almost lost poor little Mark. She was playing catch with Luke when she lost sight of Mark. In a panic, she started shouting his name and asked other dog owners if they saw her little chihuahua. After 30 minutes of searching and with the help of one dog owner, she finally found him at the entrance of the dog park near a small store that sells Mark’s favorite treats. Linda was delighted when she found him and bought all three of her dogs their favorite treats. 1. WHO is the girl? 2. WHAT three activities do the dogs love to do? 3. WHEN and WHERE does this story take place? 4. WHY did Linda panic?
Asked by: Shamsher Jadan asked in category: General Last Updated: 6th April, 2020 What is the sella turcica in sphenoid bone? The sella turcica (Latin for Turkish seat) is a saddle-shaped depression in the body of the sphenoid bone of the human skull and of the skulls of other hominids including chimpanzees, orangutans and gorillas. It serves as a cephalometric landmark. Click to see full answer. Hereof, what is the function of the sphenoid bone? Secondly, what does the sella turcica contain? The sella turcica is a midline depression in the sphenoid bone which contains the pituitary gland and distal portion of the pituitary stalk. The sella is covered by a dural reflection (i.e., diaphragma sellae) above which lies the suprasellar cistern. Similarly one may ask, what kind of bone is the sphenoid? What passes through the sphenoid bone? The blood vessels pass through the foramina present in the wings of the sphenoid bone. The ophthalmic artery passes through the optic canal to enter the orbit. The ophthalmic veins pass out of the orbit through the superior orbital fissure. 35 Related Question Answers Found Why does my sphenoid bone hurt? What muscles attach to the sphenoid bone? What is the sphenoid process? What are the main features of the sphenoid bone? Are there two sphenoid bones? What is the function of the sphenoid sinus? Where can you palpate the sphenoid bone? Is the sphenoid bone a facial bone? Is there a bone in your nose? Are Ribs long bones? What kind of bone is the clavicle? Where is the pituitary gland located in the sphenoid bone?
Internet-of-Things Gateway Internet-of-Things Gateway IoT Gateway In an IoT context, a gateway is a device that communicates both with applications on the internet, and with Things on a local network (fog-devices). There are many good hardware devices to choose from. For prototyping we recommend the infamous Raspberry Pi, and for industrial environments we recommend Option CloudGate. We did not build our own gateway hardware. We considered it, but concluded that there are already so many good ones available in the market and that the market doesn’t need another one. Instead we focused on the software to be installed on the gateways. This software that we built is open source and available for free on our github repository. You can also learn how it works by following the video on our YouTube channel. We even provide it on an MIT license, because we want you to succeed with it commercially. Features of our free opensource IoT Gateway • Talaiot REST API implementation • Fetching/reading data from serial connections • Presuming unstable internet connection(s) to secure all data • C++ (Qt) and/or Python utilization As explained in the Gateway-Hardware Article, a gateway must be able to collect the data locally and send it over the cloud solution. In order to do that a tailored software is required. This software may change a little based on the hardware configuration used in the gateway. For example ,reading sensor data from a RS232 serial ports require different code from reading data from a modbus device. So here we can explain what are in short, the actions that a gateway software must do. At very least it must: 1. At the FIRST STARTUP must store the token (password). This token can be inserted manually by the user or the device can automatically fetch it from the website by using our APIs. In order to get a token, the device must be registered on our website with its MAC (or other ID). After this one time setting the gateway is ready to send data by: 2. Read the sensor data (from file or from serial,  etc). 3. Send data over the Cloud solution by issuing a HTTP POST request. The HTTP post uses Basic Authentication using as username the device MAC (or the choosen ID) and as password the token. The communication with server is encrypted by SSL.   The data PAYLOAD must be in JSON format.  An example of valid data can be seen here: Example of Json data We already prepared several version of the Gateway in different languages available on our page and released under MIT license!. Please notice that our version (expecially the Python version) may seems really complex but is not. The reason why is relative long, is because error recovery. Indeed the PyGateway software is meant to be used in enviroment where the internet connection is not reliable, and thus it locally store the data if it fails to send it. From time to time will then try to resend the stored data to the cloud (and if is successfull it will delete it). It also include a complete logger, and handles the position, automatic token fetching and relative errors (for example if the user reset/revoke the token of the device from the website). Those things are not required in a minimal gateway version! If you need help to use/modify our code, or develop a new version in another language, We will be happy to help you out! So, just contact us! The purpose of a Gateway device consist on collecting sensor data locally and forwarding to the Talaiot cloud solution. Any device capable of doing that is by definition a gateway. There are no special hardware requirements. As far as can connect to the internet and push some data over it, can be (at some extend) considered a gateway. Normally Gateways have two “interfaces”; One interface is needed for communicating with the Cloud Layer. Ethernet port (LAN), Wi-Fi interface or GSM/3G modules are normally used to accomplish this. The second interface is needed to collect data locally. Serial ports, USB ports, USB Dongles, ZigBee, or other local communication systems are good example of this. Since each of the two interfaces can have multiple faces, a gateway configuration can vary from application to applicaitons. For example in some applications where security is important, all the trasmissions may be wired, using ethernet ports for internet connection and RS232/485 on the sensors side. In other applications, where security is not the main concern, a different configuration may be preferred, for example using standard Wi-Fi card for the internet access and a zig-bee for the sensor network. For same applications, even your phone can be considered a gateway, since is able to connect to sensor side and Cloud side. One question that may rise at this point is why use gateway at all? would be possible to only use sensor board to push data direcly on the internet skipping the gateway middle part? The short answer is no. Sensor boards are in general low costs, running on a tiny Microcontroller without any O.S. They are not powerfull and are optimized for low power consumption. This makes those systems unable to properly handles all the communications with the cloud. Authentications, encryption, network certificates are some of the issues that a gateway can handle but a sensor board cannot. Also a sensor board may be running on battery and sleeping mostly of the time, reporting for example the temperature reading once per hour. A complex sensor network can have hundred of those sensors. So instead of making each of them communicating with the Cloud, is better to make it communicate locally to one more powerfull and complex device (gateway) capable of filtering data, authenticating to the server and handling SSL and other encryption mecchanisms. There are thousands of gateways avaialable in the market, with different interfaces, reliability etc. If you want to start with something easy and cheap, we reccomand to start with the Raspberry Pi. This is a perfect startup point, and extremely easy to work with. If a more rubust and reliable solution is required, we reccomend to use the Cloudgate from Option. This is more complex (and more expensive) system made for real industrial application. Are you in dubt on which gateway to use? Feel Free to contact us… we will be happy to assist you! Leave A Comment
Can termites live without a queen? Can termites live without a queen? Can termites reproduce without a queen? Yes, termites can live without a queen. When a queen or king dies, worker termites can develop into reproductive females or males without going through the winged stage. They are referred to as secondary reproductives. Nymphs can also become secondary reproductives without going through the flying phase, if necessary. What happens when you kill the queen termite? Kill the Termite Queen, Kill the Colony Effective termite elimination includes terminating the queen. In doing so, the workers and soldiers will only survive for a few more weeks. The loss of the queen is also the loss of all reproduction and pheromones, which are used to maintain colony control. Do termites follow a queen? When it comes to termites, kings exist, but they do not determine the actions and goals of the colony; instead, this great responsibility is accorded to queen termites. Queen termites live longer than the kings, but queens are constantly occupied with the needs of the colony during their long lives. Can termites live without a queen? – Additional Questions Can I spray for termites myself? Do It Yourself Termite Control Can termites bite humans? Essentially, termites definitely bite wood and do attack other insects, but they do not bite people. Although homeowners experiencing an infestation should not be concerned about receiving bites from termites, professional extermination methods should be sought and implemented to protect the structure of your home. Do termites multiply? What do termites hate? Why do termites kill their queen? By eliminating the queen, a matricidal worker allows other workers and herself to lay male eggs.” Workers do all the tasks of raising the brood. They forage for food, feed the offspring and the queen, build the nest and defend it. Why do people eat termite queen? A Malaysian man has claimed that eating queen termites before intercourse could boost the sexual prowess for men. According to Metro Ahad, Abdul Rahim Abu Bakar, who is involved in the pest control business, said queen termites had special properties similar to that of viagra, reports Star Online. What is the largest termite in the world? Macrotermes bellicosus Termite Termites (Macrotermes bellicosus) are usually small, measuring between 4 and 15 mm in length. It is the largest termite known, with queens measuring about 4.2 in. (110 mm) long, workers about 1.4 in. (36 mm), and soldiers are slightly larger. What do termites turn into? Basically, all termites start as eggs, and all eggs are capable of developing into any caste. The eggs hatch into larvae, and through a series of molts, the larvae develop into workers. The workers can undergo a two-stage molt and become soldiers. Do termites eat drywall? Can I prevent termites myself? Do DIY termite treatments really work? The simple answer to this is no. There are a number of different DIY treatments available on the market at the moment, but they all use the same form of repellent chemical base. Repellents, unlike termiticides are designed to deter termites rather than kill them. How do you make homemade termite killer? What is the life span of a termite? Long live the queen For some African species of termites, a queen’s life span may be up to 50 years, while in other species, such as drywood termites, the queens live only 10 to 12 years. In general, worker termites live about two years. Do queen termites fly? A winged termite may be the king or queen of a colony – or a swarmer (alate) launched to create a new colony. Flying termites have poor eyes, whereas worker, soldier and secondary reproductive termites are blind. Flying termites are visible when their colony swarms. What is the life cycle of a termite? What is the life cycle of a termite? Can termites get in your bed? Although this species of termite is confined to warmer or more tropical climates in states such as Florida and California, they can wreak havoc on wooden furniture such as beds, chairs, and more. Drywood termites can slip into crevices of wood furniture and other nearly invisible cracks and feed on the wood. Do termites crawl on you? Subterranean termites are a billion-dollar problem in the United States. The reason they are so destructive is connected to the way they do damage. Termites don’t crawl all over your walls and eat your home in front of you. Do termites come out at night? Swarmers (flying termites ) Do termites spread quickly? Termites take a very short time to spread. Within a few days, they can multiply to what’s considered an infestation. Homeowners need to take every percaussion possible, and be sure to act quickly in order to protect their homes. What scent do termites don’t like? Another effective way is to apply catnip essential oils onto the affected areas. Mint is another natural pesticide that could repel termites. Mints release a strong scent, and termites are overwhelmed by mints and will retreat from them. What scent repels termites? Cinnamon, Other Essential Oils Leave a Comment
What is the role of the primers in PCR? What is the role of the primers in PCR? A primer is a short, single-stranded DNA sequence used in the polymerase chain reaction (PCR) technique. In the PCR method, a pair of primers is used to hybridize with the sample DNA and define the region of the DNA that will be amplified. What is the role of primers in PCR quizlet? What is the function of the primers in PCR? They polymerize free nucleotides to form the new DNA strands. They are the monomer building blocks from which the DNA strand is synthesized. They provide a 3′ end for the DNA polymerase. What is the role of a primer? A primer is a short single strand of RNA or DNA (generally about 18-22 bases) that serves as a starting point for DNA synthesis. It is required for DNA replication because the enzymes that catalyze this process, DNA polymerases, can only add new nucleotides to an existing strand of DNA. What is the role of primers in PCR Class 12? Role of primers : Primers are complementary to the regions of DNA. They anneal to botJ the strands of DNA which are then extended using nucleotides. (b) DNA polymerase used in PCR is thermostable and is called Taq polymerase. It is obtained form the bacterium Thermus aquaticus. What is the role of the primers in PCR? – Related Questions What are four important PCR applications? What is needed for PCR quizlet? What components do you need to perform PCR? All that is required is at least one DNA template strand, DNA polymerase, two DNA primers, and four nucleotides building blocks of DNA – A, G, T, and C. You just studied 8 terms! What is primer give example? The definition of a primer is a coating that is applied to prepare a surface before the actual paint color is applied, or a textbook that is given to students to help them learn how to read. A sizing that is applied to a wall to prepare the surface for paint is an example of a primer. What is PCR used for? Why are two primers needed for PCR? Two primers are used in each PCR reaction, and they are designed so that they flank the target region (region that should be copied). That is, they are given sequences that will make them bind to opposite strands of the template DNA, just at the edges of the region to be copied. What is the principle of RT PCR? RT–PCR is a variation of PCR, or polymerase chain reaction. The two techniques use the same process except that RT–PCR has an added step of reverse transcription of RNA to DNA, or RT, to allow for amplification. What is the basic principle of PCR? Its principle is based on the use of DNA polymerase which is an in vitro replication of specific DNA sequences. This method can generate tens of billions of copies of a particular DNA fragment (the sequence of interest, DNA of interest, or target DNA) from a DNA extract (DNA template). What are the steps involved in PCR? PCR is based on three simple steps required for any DNA synthesis reaction: (1) denaturation of the template into single strands; (2) annealing of primers to each original strand for new strand synthesis; and (3) extension of the new DNA strands from the primers. What are three important PCR applications? We present a survey of the following applications of PCR: 1) The amplification of gene fragments as fast alternative of cloning. 2) The modification of DNA fragments. 3) The sensitive detection of pathogenic microorganisms, if desired followed by an accurate genotyping. 4) DNA analysis of arachaeological specimens. What is PCR and why is it important? PCR is very important for the identification of criminals and the collection of organic crime scene evidence such as blood, hair, pollen, semen and soil. PCR allows DNA to be identified from tiny samples – a single molecule of DNA can be enough for PCR amplification. What is needed for PCR? The various components required for PCR include a DNA sample, DNA primers, free nucleotides called ddNTPs, and DNA polymerase. The various components required for PCR include a DNA sample, DNA primers, free nucleotides called ddNTPs, and DNA polymerase. What is in the master mix for PCR? What does a successful PCR require quizlet? PCR requires complete knowledge of the DNA sequence that will be analyzed. PCR is often used to construct plasmids. Not all the molecules produced in a PCR reaction have the same length. PCR requires complete knowledge of the DNA sequence that will be analyzed. What is not included in the PCR mixture? The PCR reaction mixture does not include: DNA ligase. They cut DNA only within sites of specific palindromic nucleotide sequences. What is a one page primer? What is a CIRCL Primer? A CIRCL primer is a concise, brief summary of a big idea in the field of cyberlearning. Primers are used to build capacity in the field and to give people a sense of cyberlearning’s main themes. Are primers necessary? What diseases can PCR detect? Detecting infectious agents How many types of PCR are there? Long-range PCR – longer ranges of DNA are formed by using a mixture of polymerases. Assembly PCR – longer DNA fragments are aplified by using overlapping primers. Asymmetric PCR – only one strand of the target DNA is amplified. In situ PCR – PCR that takes place in cells, or in fixed tissue on a slide. What are the two types of primers? Types of Primers. There are three basic types of primers: oil-based, latex and pigmented shellac primer. Each has its strengths and weaknesses and works best on certain surfaces and in particular circumstances. Do primers denature? It is said that the annealing temperature for primers to anneal to the DNA strand must be ~5C below the lowest melting temperature of all the primers. The extension temperature is higher than the melting temperature now – so technically, it should denature. What is the difference between RT-PCR and QRT PCR? QPCR and RT-PCR are both terms used in biotechnology and utilized for the production of multiple copies of DNA. RT-PCR is used to amplify the reversed transcription of the DNA code; QPCR measures the amplification. 3. RT-PCR is for amplification, while qPCR is for quantification.
COVID-19: researchers show that ozone is effective in disinfecting office spaces Published: Tuesday, 23 February 2021 17:26 Researchers from Tel Aviv University, Bar Ilan University, and Azrieli College have demonstrated that ozone can effectively be used to disinfect surfaces which have been contaminated with the COVID-19 virus, SARS-CoV-2. Ozone is a strong oxidant and disinfectant, often employed in water and wastewater treatment schemes. Within the study framework, the research team decided to adapt the mechanisms whereby ozone is used to break down organic pollutants from contaminated waters and demonstrated the efficacy of ozone in neutralizing SARS-CoV-2. Ozone gas is generated by electrical discharge (the breakdown of chemical compounds into their elements using electric current), in the course of which oxygen molecules are reconstructed in the form of ozone molecules. In the course of their study, the researchers demonstrated that gaseous Ozone disinfected surfaces, even in hard-to-reach locations. A high level of disinfection was achieved within minutes, even on surfaces not typically disinfected with manually-applied liquid disinfectants. The method involves inexpensive and readily available technologies, which could be utilized to disinfect hospitals, schools, offices, hotels, and even aircraft and entertainment halls.
Print Friendly, PDF & Email ETHICS CASE STUDY: You are the head of the Human Resources department of an organisation. Topic:  Ethical concerns and dilemmas in government and private institutions; 7) You are the head of the Human Resources department of an organisation. One of the workers, while trying to molest his co-worker, is pushed away from her towards a heavy machine – which instantly kills him. The witnesses claim that it was his fault and the woman didn’t push him with an intention to harm him. She did so in self-defence. His family is demanding compensation from you and has filed complaint against you. Family doesn’t know that it’s the woman who has pushed him. They are told by other employees that it’s an accident. The chairman of the company has asked you to end the issue from your side. He has warned you not to complicate the issue. What options you have in this situation? Discuss their merits and demerits.  Ethics Case Study Why this question? There will be six case studies. The given case study is a slightly modified case study of that appeared in CSM-2017.  Key demand of the question: You should write various options available to you (maximum 4, minimum 3) and discuss their merits and demerits.    Directive Word: Discuss: You should consider all dimensions(stakeholders and consequences) and evaluate merits and demerits.  Structure of Answer: There should be general introduction before starting main answer. In the introduction, in one or two paragraph, write about mains issues you are facing in the case, important facts and all the stakeholders affected by these ethical issues. Also mention values that are affected (positively or negatively). All in paragraph format.  In the body, divide answer into 3-4 parts based on number of options that you choose. Start from least suitable to most appropriate option. In each option in 2-3 separate paragraphs, discuss merits and demerits. Start with merits.  In first 2 options there should be more demerits. Consider all stakeholders while writing merits and demerits. Mention which value is affected.  The last option, even though not asked, should be the one that you pursue. here, you need to provide justifications why you will choose this option.  It’s ok to shoot word limit. Quality of arguments is more important than word limit in Ethics paper. Conclusion is naturally drawn from justification part. Highlight in 1-2 sentence how your actions will help most of the stakeholders. (go by utilitarianism approach)
+ ~ - Report an Error string of jewels. Finally, at the Paris Exhibition of 1855, Queen Victoria displayed some magnificent pearls. On the same occasion, the Emperor of the French exhibited a collection of four hundred and eight pearls, each weighing over nine pennyweights, and all of perfect form and the finest water. Pearls from mussels are less generally known produced, however, not by marine, but by fresh-water species. For the best of these, we must go to Scotland. Linnæus, who was acquainted with the origin of pearls in general, was aware of the possibility of producing them artificially from various mollusks. He suggested the collection of a number of mussels, piercing holes in their shells with an augur to produce a wound, and afterwards "parking" them for five or six years to give the pearls time to form. The Swedish Government consented to try the experiment, and long did so secretly. Pearls were produced, but they were of no value, and the enterprise was abandoned as Scotch pearls were much celebrated in the middle ages. Between the years 1761 and 1784 pearls to the value of ten thousand pounds were sent to London from the rivers Tay and Isla; "and the trade hitherto carried on in the corresponding years of the present century," says Mr. Bertram, "is more than double that amount. The pearl fisheries of Scotland," he adds, "may become a source of wealth to the people living on the large rivers, if prudently conducted." Mr. Unger, a dealer in gems in Edinburgh, having discerned the capabilities of the Scotch pearl, has established a scale of prices, which he gives according to their size and quality; and it is now a fact that the beautiful pink-hued pearls of our Scottish streams are admired beyond the orient pearl. Empresses, queens, and royal and noble ladies, have made large purchases of these gems; and Mr. Unger estimates the sum paid to pearl- finders in the summer of 1864 at ten thousand pounds. The localities successfully fished have been the Forth, the Tay, the Spey, the Isla, and most of the Highland rivers of note. Passing from the mussels to the pholades, we have a family who not merely bury themselves in sand, like cockles and razor-fish, but who are able in some mysterious way to excavate for themselves a dwelling in argillaceous rocks and even in harder stone. Our wonder is increased on finding their shell not stouter than paper. One species, indeed, is called Pholas papyracea. Besides this faculty of boring and burrowing, they possess another curious property phosphorescence. The bodies of many mollusks shine in the dark, but none emit a more brilliant light than the pholades. Those who should eat them in the dark in an uncooked stateand they are well-flavoured and delicatewould seem to be swallowing phosphorus. Most Italian tourists have beheld the evidence, furnished by pholades, of geological disturbance. On the shore of Pozzuolo, is a ruin called the Temple of Serapis, but probably a thermal establishment for the use of its mineral waters. All that is now left, are three marble columns, each about forty feet high. These three columns, at about ten feet from their base, are riddled with holes, and full of cavities bored deep into the marble. The borings occupy a space of three feet on each column. There is no doubt about the cause of the perforations. In some of the cavities, the shell of the operator is still found, and naturalists seem agreed that it is a species of To enable the stone-boring mollusks, which live only in the sea, to excavate this marble, the temple and its columns must have been sunk in sea water. Only under these conditions could the borers have worked upon the marble. But since the traces of perforation are now visible ten feet above the surface, it follows that, after being long immersed in water, the columns have been elevated to their present position. The temple has been raised again, carrying with it, engraved in marble, ineffaceable proofs of its immersion. After the pholades, come the teredos or shipwormsmarine creatures with an irresistible propensity for perforating submerged wood. The galleries bored by these unsuspected miners, riddle the whole interior of a piece of wood; destroying it entirely, without any external indication of their ravages. By a strange kind of instinct, however multiplied may be their furrows or tubes in the same log of wood, they never minglethere is never any communication between them. The wood is thus attacked at a thousand different points, until its entire substance is destroyed. Ships thus silently and secretly mined, have suddenly gone down with their crews, solely through the ravages of these relentless enemies. At the beginning of the eighteenth century, half the coast of Holland was threatened with destruction, because the piles which support its dikes and sea-walls were attacked by the teredo. Hundreds of thousands of pounds were expended in order to avert the danger. Fortunately a closer attention to the habits of the mollusk has brought a remedy against a formidable evil. The teredo has an invincible antipathy to rust, and timber impregnated with oxide of iron is safe from its ravages. The creature's aversion being known, all that is necessary, is, to sink the timber to be submerged, in a tank of prepared oxide of ironto clothe it, in short, in a thick coating of iron rust. Ships' timber may be so protected; but the copper with which ships' bottoms are usually sheathed serves the same purpose even better. Respecting the cephalopods (cuttle-fish, sepias, and other creatures with eight or ten arms round their heads), it is hard to say whether the facts concerning them, or the fictions, are the stranger. There exists a fearful fragment, a beak nearly two feet in length, which belonged to a great sucker or cuttle-fish. This monster, if the other parts of its body were large in proportion, must have been enormous, with arms Profile Information Application afterLoad: 0.000 seconds, 0.28 MB Application afterInitialise: 0.018 seconds, 1.00 MB Application afterRoute: 0.023 seconds, 2.05 MB Application afterDispatch: 0.077 seconds, 3.65 MB Application afterRender: 0.117 seconds, 3.99 MB Memory Usage 21 queries logged 1. SELECT *   FROM jos_session   WHERE session_id = '0a069e4e276caa7211a752e5a040348f'   FROM jos_session   WHERE ( TIME < '1634857365' ) 3. SELECT *   FROM jos_session   WHERE session_id = '0a069e4e276caa7211a752e5a040348f'   VALUES ( '0a069e4e276caa7211a752e5a040348f','1634859165','','0','1','0' ) 5. SELECT *   FROM jos_components   WHERE parent = 0 6. SELECT folder AS TYPE, element AS name, params   FROM jos_plugins   WHERE published >= 1   AND access <= 0   ORDER BY ordering 7. SELECT id   FROM jos_toc_pages   WHERE alias = 'page-9' 8. SELECT id   FROM jos_toc_pages   WHERE alias = 'page-9' 9. SELECT *   FROM jos_toc_pages   WHERE id = '70' 10. UPDATE jos_toc_pages   SET hits = ( hits + 1 )   WHERE id='70' 11. SELECT template   FROM jos_templates_menu   WHERE client_id = 0   AND (menuid = 0 OR menuid = 118)   ORDER BY menuid DESC   LIMIT 0, 1 12. SELECT *   FROM jos_toc_pages   WHERE alias = 'page-9'   AND id_volume = 39 13. SELECT *   FROM jos_toc_volumes   WHERE id = '39' 14. SELECT *   FROM jos_toc_magazines   WHERE id = '1031' 15. SELECT id, title,alias   FROM jos_toc_pages   WHERE  id_volume = 39   ORDER BY ordering ASC 16. SELECT id, DATE, id_page   FROM jos_toc_magazines   WHERE  id_volume = 39   ORDER BY ordering ASC 17. SELECT *   FROM jos_toc_parameter   WHERE `group` = 'voice' 18. SELECT *   FROM jos_toc_parameter   WHERE `group` = 'voice' 19. SELECT id, title,alias   FROM jos_toc_pages   WHERE id_volume = 39   AND ordering > 19   ORDER BY ordering ASC   LIMIT 1 20. SELECT id, title,alias   FROM jos_toc_pages   WHERE id_volume = 39   AND ordering < 19   ORDER BY ordering DESC   LIMIT 1   FROM jos_modules AS m   LEFT JOIN jos_modules_menu AS mm   ON mm.moduleid = m.id   WHERE m.published = 1   AND m.access <= 0   AND m.client_id = 0   AND ( mm.menuid = 118 OR mm.menuid = 0 )   ORDER BY POSITION, ordering Language Files Loaded Untranslated Strings Diagnostic Untranslated Strings Designer
9 ways to save your brain from disease-causing particles We know that exposure to small particulate matter from air pollution, especially from vehicle exhaust, changes the brain. Small particulate matter, those tiny particles of metal and other contaminants that live unseen in heavily polluted air, enters your brain through your nose and triggers an inflammatory response. Brain inflammation plays a big role in Alzheimer’s, so one more inflammation-causing agent could be the tipping point that sends your cognitive health into a downward spiral. A study from researchers at the University of Southern California found that older women who live in areas where particulate matter air pollution is higher than the U.S. Environmental Protection Agency’s standard are 92 percent more likely to develop Alzheimer’s or dementia. Now, we also know that pollution is linked to Parkinson’s and motor neuron disease and that the damage begins a lot earlier in life than we’d thought…     Air pollution lodges in the brain at an early age Mexico City, a city of over 20 million people, has been plagued by dangerous levels of air pollution for decades. I remember a trip there some 40 years ago, and even then, people were wearing masks on high-pollution days. Researchers from Lancaster University in England examined the brainstems of 186 young Mexico City residents between the ages of 11 months and 27 years. They found markers (predictors) not only of Alzheimer’s disease but also of Parkinson’s and motor neuron disease (MND). “Not only did the brainstems of the young people in the study show the ‘neuropathological hallmarks’ of Alzheimer’s, Parkinson’s and MND,” says Professor Barbara Maher of Lancaster University, “they also had high concentrations of iron-, aluminum-, and titanium-rich nanoparticles in the brainstem — specifically in the substantia nigra and the cerebellum.” Brain changes caused by nanoparticles The ‘“neuropathological hallmarks” that Professor Maher mentions include nerve cell growths, as well as plaques and tangles caused by misfolded proteins in the brain, a hallmark of Alzheimer’s disease. These were found even in infants as young as 11 months old. And it appears that these tiny metallic particles can reach the brain stem either through inhalation or by swallowing. They are associated in particular with damage to the substantia nigra, an area of the brainstem in charge of initiating and inhibiting our motor neurons, thus controlling our ability to execute movements smoothly. Not surprisingly, damage to the substantia nigra is directly linked with the development of Parkinson’s disease later in life. Peak Chelation+ Resveratrol™ Promotes a Healthy Heart and Circulatory System! How to protect your brain from pollution Professor Maher says, “Different people will have different levels of vulnerability to such particulate exposure, but our new findings indicate that what air pollutants you are exposed to, what you are inhaling and swallowing, are really significant in development of neurological damage.” So, how do you become one of the less vulnerable people? How do you protect your children and grandchildren from developing these debilitating conditions when they grow up? Here are 9 good first steps: 1. Eat broccoli sprouts and other foods that help your liver do the work of detoxifying your body. 2. Eat fish, particularly those with high omega-3 content, like rainbow trout, wild Alaskan salmon, sardines and albacore tuna. Omega-3 fatty acids have been shown to fight brain inflammation and prevent some of the brain damage caused by neurotoxins like lead and mercury. 3. Take B vitamins. A Columbia University study showed that supplementing with Vitamins B6, B12 and folic acid dramatically reduced the negative impact of air pollution on DNA. 4. Supplement alpha-lipoic acid. A powerful antioxidant, this naturally occurring compound possesses metal-chelating activity. Both fat- and water-soluble, it is readily absorbed from the gut and crosses cellular and blood-brain membrane barriers. 5. Consider phosphatidylserine — one of the most tested nutrients for brain health and memory. This nutrient is a key building block for brain cells. 6. Eat plenty of antioxidant-rich foods like blueberries, dark chocolate, kidney beans and cherries to combat the oxidative stress behind cognitive decline. 7. Boost your master antioxidant. As you age, your body produces less glutathione, which you need to protect you from the oxidative stress brought on by air pollution. Cruciferous vegetables and other foods can boost your glutathione levels. 8. Supplement with CoQ10 and PQQ. Together, these two enzymes help protect the brain’s neuron cells (the cells that pollution particles hitch a ride on to get directly to your cerebellum) by boosting mitochondria and reducing oxidative stress. 9. Consider EDTA chelation. Chelation uses a binding agent to “grab on” to harmful contaminants and eliminate them. Evidence of Alzheimer’s, Parkinson’s & MND in Brains of Young People Exposed to Dirty Air — Neuroscience News Taking B Vitamins May Reduce Epigenetic Effects of Air Pollution — publichealth.columbia.edu Chelation: Harnessing and Enhancing Heavy Metal Detoxification—A Review — NCBI Substantia Nigra — human-memory.net Joyce Hollman By Joyce Hollman
Colleges and universities in the US use an average of 18.9 kilowatt-hours (kWh) of electricity and 17 cubic feet of natural gas per square foot (ft2) of floorspace each year. Typical US higher-education buildings sized around 50,000 ft2 consume more than $100,000 worth of energy each year. Lighting, ventilation, and cooling equipment consume the most electricity, and space heating accounts for the majority of natural gas use (figure 1). As a result, these technologies are among the best targets for finding energy savings. Many colleges and universities can cut their energy bills by 30% or more by implementing cost-effective energy-efficiency measures. Average energy-use data Figure 1: Energy consumption in US higher-education facilities by end use According to the US Energy Information Administration, more than half of the electricity used in higher-ed facilities goes toward ventilation, computer equipment, and lighting. Space heating accounts for more than 60% of natural gas usage. A pie chart showing electricity end uses for colleges and universities in the US Census division: ventilation, 21%; miscellaneous, 21%; computing, 19%; lighting, 18%; cooling, 10%; refrigeration, 6%; and other, 5%. The Other category includes office equipment, heating, cooking, and water heating.A pie chart showing natural gas end uses for colleges and universities in the US Census division: heating, 64%; water heating, 23%; miscellaneous, 10%; and other, 4%. The Other category includes cooling, and cooking. When you understand your facility’s energy consumption, you can better control costs. Utilities can provide monthly usage data for your analysis, and some utilities will also assist with the analysis. In general, utilities charge commercial buildings for their natural gas based on the amount of fuel delivered. But they charge for electricity based on two measures: consumption and demand. The consumption component of the bill is based on the amount of electricity, in kilowatt-hours, that the building consumes during a month. The demand component is the peak demand, in kilowatts, that occurs within the month. Monthly demand charges range from just a few dollars to nearly $20 per kilowatt and can be based on the highest peak recorded in the previous 12 months. This charge can be a considerable percentage of your bill, so reduce peak demand whenever possible. Figure 2 shows a sample daily load profile. Figure 2: Load profile for a typical college building in California Hourly energy-consumption data show that lighting, cooling, and ventilation present some of the largest opportunities for reducing peak demand charges in college buildings. Area chart showing daily load rising in the morning and remaining high later into the evening, with lighting and cooling contributing substantially. As you read the following recommendations to manage energy costs, keep in mind how each will affect consumption and demand. These conservation measures will save money and enhance both the aesthetics and the learning environment of your campus. You can find more information and other strategies in these resources: Quick fixes Many colleges and universities have tight operating budgets, so it’s especially important to find low- or no-cost ways to reduce energy expenses. Engaging students and faculty in energy conservation can also save on campus energy bills. Students are often the biggest advocates for energy efficiency and are likely to respond enthusiastically to educational initiatives and conservation pledge campaigns. Turn things off This simple advice may not seem like it will make a significant difference, but remember that every 1,000 megawatt-hours saved by shutting off equipment and appliances takes $120,000 off your institution’s utility bill annually (assuming electricity costs of $0.12/kWh). Computers and monitorsComputers and other electronic equipment are abundant in campus buildings and contribute considerably to overall energy consumption and cost per square foot. You can save energy by activating computer power management settings on individual computers and monitors, setting them to enter sleep mode after a specified period of inactivity. Effective power management settings can cut a computer’s electricity use in half, saving up to $75 annually per computer. Although most computers now come with some sort of power management settings enabled, users or internal IT staff might disable them. Be sure they’re enabled and set to maximize energy savings. For detailed instructions, see the ENERGY STAR page The Business Case for Power Management. Some users may think that enabling power management settings will block automatic software updates, but that’s not the case. Updates will download automatically when the computer awakens from sleep mode. Other plug loadsDevices such as printers and faxes also have energy-reduction settings. Be sure these settings are enabled, and use smart power strips to shut off plugged-in devices such as printers, monitors, other computer peripherals, water coolers, and coffeemakers when not in use. LightsMany people forget this simple step, but turn off lights when they’re not being used. To ensure that switches are off whenever possible, install occupancy sensors or recruit staff to serve as “energy monitors” in each building. Place energy conservation–themed posters and stickers around campus. They’re effective reminders, especially when designed as part of a larger energy-awareness campaign. Laboratory vent hoodsVent hoods are among the most energy-intensive equipment on college campuses and should be kept off unless they’re needed for experiments or appropriate material storage. Prewash sprayers in kitchensKitchen staff use prewash sprayers to remove food from dishes, utensils, pots, and pans before placing them in a dishwasher. Sprayers can use up to 5.0 gallons per minute (gpm), but low-flow sprayers limit the flow rate to 1.6 gpm. Given the minimal cost of installing low-flow valves, the payback period for this upgrade is typically less than two months when you consider both water and water-heating savings. Chilled-water drinking fountainsYou can turn off the cooling systems in many drinking fountains because they generally don’t need to provide ice-cold water 24 hours a day (unless it’s required for health reasons). Turn things down Building automation systemsMake sure temperature setbacks are coordinated with building occupancy patterns each quarter or semester. Facility engineers should coordinate with campus staff to align the HVAC schedules in the building automation system (BAS) with expected occupancy to optimize energy usage. Identify buildings that aren’t used at night, on weekends, or for long periods of time (such as semester breaks), and adjust temperature settings in those locations. Also, check that HVAC systems aren’t set to overcool or overheat buildings. For facilities with regular occupancy schedules but without a BAS, use programmable or cloud thermostats to plan temperature setbacks. Water heatersReduce setpoint temperatures of water heaters in buildings that don’t have laboratory or cooking facilities while still adhering to health requirements. You may also find that the water temperature is set higher than necessary in residential buildings. A setpoint of 120° Fahrenheit (F) measured at the furthest hot water fixture from the water heater is usually sufficient. Vending machinesRefrigerated vending machines typically operate 24-7, using 2,500 to 4,400 kWh per year and giving off heat, which increases the need for cooling in the surrounding area. Timers or occupancy sensors can yield significant savings because they allow the machines to turn on only when a customer is present or when the compressor must run to maintain the desired temperature. When it’s time to replace or add vending machines in your facilities, look for ENERGY STAR–qualified models. Each one can save over $150 annually on utility bills. HVAC operations and maintenance Performing regularly scheduled maintenance and periodic tune-ups saves energy and extends the useful life of your HVAC equipment. Create a preventive maintenance plan that includes cleaning, calibration, component replacement, and general inspections. Be sure information on setpoints and operating schedules is available to technicians when they check or recalibrate the equipment. Check the economizerMany air-conditioning systems (other than those in hot and humid climates) use a dampered vent called an economizer to reduce the need for mechanically cooled air by drawing cool outside air into the building. But if the economizer isn’t checked regularly, the linkage on the damper can seize up or break, keeping the airway open. An economizer that’s stuck open can add as much as 50% to a building’s annual energy bill by allowing hot air in during the air-conditioning season and cold air in during the heating season. About once a year, have a licensed technician check, clean, and lubricate economizers and repair them if necessary. Calibrate the controls at this time too. Check air-conditioning temperaturesWith a thermometer, check the temperature of the return air going to your air conditioner and then check the temperature of the air coming out of the register that’s nearest the air-conditioning unit. If the temperature difference is less than 14°F or more than 22°F, have a licensed technician inspect your air-conditioning unit. Optimize temperatures in peripheral roomsMake sure that HVAC settings in stockrooms and other rarely used rooms are at minimum comfort settings. Use window shades and blindsIn warm weather, lower blinds to block direct sunlight and reduce cooling needs. When it’s cold, open the blinds on south-facing windows to let in sunlight and help heat the space. Clean condenser coilsCheck condenser coils quarterly because debris can collect in them. At the beginning and end of the cooling season, thoroughly wash the coils. Change filtersChange air filters every one to six months, depending on the level of pollutants and dust in the indoor and outdoor air. In systems that use economizers, change filters more often because outdoor air is usually dirtier than indoor air. Check cabinet panelsOn a quarterly basis (or after you change the filters), make sure the panels to your packaged rooftop air-conditioning unit are fully attached, with all screws in place and all gaskets intact so that no air leaks out of the cabinet. Chilled-air leaks can cost $100 in wasted energy per rooftop unit per year. Follow a steam trap inspection and maintenance planSteam traps remove water from the steam distribution system once it has cooled and condensed in radiators or other heat exchangers. Mechanical steam traps can become stuck open, which wastes heat. A single failed trap can waste more than $50 per month, and a university might have thousands of steam traps on campus. Optimize chiller sequencingOperators often run too many chillers for a given load, which wastes energy and degrades chiller equipment. Verify your full- and part-load requirements and sequence your chiller systems to only operate within their most efficient performance range. Operate multiple cooling towers to save fan powerMost chilled-water plants have excess capacity, and during low-load hours, at least one cooling tower won’t be operating. To make the most of your existing cooling towers, run condenser water over as many towers as possible, at the lowest-possible fan speed, and as often as possible. Encourage energy-saving behavior Several colleges and universities successfully use no- and low-cost public-awareness campaigns to reduce energy use on campus. One popular and effective program is the “Dorm Energy Challenge,” in which residence halls compete against one another to make the largest energy reductions or simply to improve their own energy performance. Other popular programs include “Green Crib Certified” awards for students with eco-friendly dorm rooms and “Eco Reps” programs to encourage peer-to-peer sustainable behavior in residence halls. For more information on these kinds of programs, see the AASHE’s Resources page. Longer-term solutions Although the conservation measures covered in this section require more involvement and expense, they’re worthwhile investments. Most won’t only save money but will also enhance the learning environment and the comfort of campus buildings. Ask your local utility representative for more information about initiating these projects. Commissioning or recommissioning Commissioning is the process of inspecting and testing that ensures systems are designed, installed, and able to operate and be maintained according to the owner’s needs. Commissioning can provide quality assurance and systematically improve the efficiency and operation of building energy systems (particularly HVAC and air-distribution systems). For a typical 50,000-ft2 university building, commissioning can often uncover $17,000 or more in annual savings, yielding simple payback periods of just a year or two. Besides providing energy savings, commissioning often increases comfort for occupants. When you commission an existing building that hasn’t been commissioned before, it’s called retrocommissioning. When a building has been commissioned before, it’s called recommissioning. Recommissioning should happen every three to five years to maintain top levels of building performance. In another type of commissioning—ongoing commissioning—energy managers leave monitoring equipment in place to perform diagnostics continually. For more information, see the Lawrence Berkeley National Laboratory (LBNL) report Building Commissioning: A Golden Opportunity for Reducing Energy Costs and Greenhouse-Gas Emissions. Lighting upgrades Fluorescent lampsIf your facility still uses T12 fluorescent lamps or commodity-grade T8 lamps, relamping with high-performance T8 lamps and electronic ballasts can reduce your lighting energy consumption by 35% or more. Add specular reflectors, new lenses, and occupancy sensors or timers and the savings may double. Payback periods of one to three years are common. Install LEDs—in the form of replacement tubes, retrofit kits, or new fixtures—to save considerable energy even when compared to the best fluorescent options. Products vary in performance, so select them carefully. DaylightingIn classrooms and administration buildings, take advantage of daylighting where possible to reduce the need for electric light and improve the ambience of the space. Dimming ballasts and daylighting controls can reduce the amount of electric light used when daylight is present. Solar light tubes can also often be a cost-effective retrofit. However, be careful to employ proper design when implementing daylighting to avoid glare and overheating. LEDsLEDs offer several advantages over conventional light sources, including high efficiency, long life, and superior control. These characteristics and falling prices have made LEDs a viable solution for a growing number of office-building applications, including exit signs, task lighting, recessed downlighting, and ambient lighting. LED troffers offer promising benefits in the right applications. Fluorescent troffers are the most common type of lighting fixture found in US commercial facilities, accounting for 50% of existing units. The best LED troffer products outperform their fluorescent cousins, but at a first-cost premium. You can replace fluorescent troffers with new LED troffers, via LED retrofit kits, or by replacing the fluorescent tubes with tubular LED products. Replacing fluorescent or incandescent task lamps with LED versions can also save significant amounts of energy. The directional nature of LEDs allows users to illuminate only the working area without wasting energy by using a reflector or lighting unused areas. You can save even more by delamping (removing or disabling) unnecessary overhead lighting and using occupancy sensors, which dim or turn off lamps at unoccupied desks. When buying LED products, ask for performance data based on standard tests performed by accredited laboratories. When comparing LEDs to other options, be sure to include in the total calculation the cost savings from reduced lighting maintenance due to LEDs’ long lifetimes. Make sure that the LED solution will provide the quantity and quality of light you need by starting with a small test case. Smart lighting design in parking lotsIn parking lots, an average of 1 foot-candle of light or less is usually sufficient. But lots are often overlit, which means there’s potential to save energy by delamping, adding dimming controls, or adding occupancy sensors. Overlit parking areas not only waste energy but can actually be dangerous if drivers have trouble adjusting their eyes between highly lit and dark areas. It’s important to find a balance to prevent safety concerns involved with underlighting. The most common lamps used for outdoor lighting are high-intensity discharge (HID) sources—metal halide (MH) and high-pressure sodium (HPS). Fluorescent lamps, induction lamps, and LEDs are also viable sources for outdoor lighting, offering good color quality and better control than HID sources. LEDs are an especially good choice for parking and streetlighting applications because LED fixtures perform well in the cooler conditions that are typically found outside at night. LEDs also reduce light pollution and work better with controls than HID products. Field testing of bi-level LED lighting combined with occupancy sensing at a parking garage on the California State University campus in Sacramento revealed energy savings of 78% between the hours of midnight and 6:00 a.m. because the majority of fixtures were operating in low-capacity mode. The project report, Bi-level LED Parking Garage Luminaires (PDF), prepared by the California Lighting Technology Center, also noted 24-hour energy savings of 68% compared to the incumbent HPS lighting system. Stadium and arena lightingUsing LEDs to light stadiums and sports arenas can yield massive energy savings—roughly 75% over the commonly used MH lamps. LEDs also reduce maintenance costs via the bulbs’ longer lamp life and lower lumen depreciation rates. Unlike MH lamps, LEDs offer instant-on and instant-restrike capabilities. The latest LED fixtures also provide light of sufficient quality for high-definition broadcasts. The dramatic energy and maintenance savings deliver a simple payback period of two to three years. LEDs can also be used at sports and entertainment venues for lighting façades, concourses, suites, bathrooms, locker rooms, and video boards. See the Natural Resources Defense Council report Game Changer: How the Sports Industry Is Saving the Environment (PDF) for examples of how to use LEDs in nonfield lighting applications. HVAC improvements High-efficiency HVAC unitsA high-efficiency packaged HVAC unit can reduce cooling energy consumption by 10% or more over a standard-efficiency, commercial packaged unit. Select equipment that has multiple levels of capacity (compressor stages) with good part-load efficiency. Demand-controlled ventilationIn spaces that have large swings in occupancy (such as auditoriums, gyms, classrooms, and cafeterias), save energy by decreasing the amount of ventilation supplied by the HVAC system during low-occupancy hours. A demand-controlled ventilation system senses the level of carbon dioxide in the return airstream, uses it as an indication of occupancy, and decreases supply air when carbon dioxide levels are low. Reflective roof coatingsIf facility roofs need recoating or painting, consider white or some other highly reflective color to minimize the amount of heat the building absorbs. Cool roofs can reduce peak cooling demand by 10% to 15%. For a list of suitable reflective roof coating products, see the ENERGY STAR Roof Products page. Water use and heating systems Conserve water and the energy used to heat it in recreational buildings by installing low-flow faucets and showerheads as well as sink and shower controllers that automatically shut off. In dorms and recreation facilities, use tankless water heaters instead of traditional tank-type water heaters. Gray-water heat-recovery systems can save 50% to 60% of water-heating energy when installed in shower drains, resulting in short payback periods (especially in buildings with substantial hot water usage, such as rec centers and dorms). Drainpipe heat exchangers also double or triple the first-hour capacity of water heaters. The equipment consists of a replacement section of pipe that diverts incoming cold water to a coil wrapped around the drain through which hot wastewater flows, heating the fresh intake water. These systems are only effective when hot water is needed at the same time that heated wastewater is generated—as is the case for showers, laundry machines, and dishwashers. Appliances and office equipment When buying or replacing appliances like refrigerators, washers, dryers, and vending machines, look for ENERGY STAR–certified models that maintain higher levels of energy efficiency. See the ENERGY STAR Office Equipment page for ways to cut energy use from monitors, printers, scanners, copiers, fax machines, and power adapters. High-efficiency kitchen equipment Cooking equipment, coolers, and dishwashers are energy hogs in kitchens—high-efficiency cooking equipment can be 15% to 30% more energy-efficient than standard equipment. The benefits of purchasing an energy-efficient model go beyond energy savings. The same measures that make the units more efficient can also lead to better performance. For a list of ENERGY STAR–qualified products and an online calculator that can help you determine savings for your particular upgrade, visit the ENERGY STAR Commercial Food Service Equipment page. Boiler retrofits Boiler retrofit projects can provide substantial savings. Newer boilers feature a variety of efficiency improvements that justify the replacement of older boilers before failure. Improvements include condensing heat exchangers, sealed combustion, electric ignition, and fan-assisted combustion. Smaller boilers are more efficient than large ones. And grouping multiple smaller boilers allows staged operation of each unit at its highest efficiency. Grouping boilers also provides redundancy. If a larger boiler isn’t ready to be retired, you can add a smaller boiler to serve the base heating load, reserving the larger boiler for additional heating as needed. Laboratory air filtration As filters accumulate dust, the airflow through them lessens, causing drops in air pressure. More energy is then required to push air through the filter. Choosing filters rated for the lowest-possible pressure drop will cost more up front, but it usually ensures lower energy costs because there’s less resistance in the ventilation system. You can also save energy and lengthen the functional life of filters by “under-rating” your system. That is, if you force less air through the filter than the maximum amount it’s rated to handle, it will last longer and use less energy. For more information, see the air filtration section of A Design Guide for Energy-Efficient Research Laboratories by LBNL. Life-cycle costs for equipment procurement Identify who’s responsible for setting equipment procurement policies for your campus. Is it the board of regents or the state? Or is it individual schools and departments? Encourage those in charge to include energy costs and life-cycle costs in the procurement rules.
How the Internet Has Impacted the World for 50 Years Kisling, Nestico & Redick The internet recently turned 50 years old. If you listen in on conversations, you’ll find those that express delight over such a transformational innovation and those that bemoan its influence. One thing is for sure, the internet has enabled human beings to communicate with an ease that few thought possible. When you eliminate the varied opinions about how the internet has changed the world, you’re forced to look at the facts of the matter. In no uncertain terms, the internet enables seamless communication around the world. You have opportunities to connect with people from all walks of life. A common thread of innovations for centuries has been improved means for connecting with other human beings. At it’s core, the internet allows us to communicate without limitations of space and time. When you consider the ways in which humans are dependent upon the internet today, it’s hard to believe there was ever a time when it didn’t exist. Imagine a scenario where you couldn’t hop online to conduct a quick Google search to either locate a business or buy a product. Imagine a world where the internet never existed. It’s unfathomable. This exercise doesn’t mean you have to ignore the challenges presented and experienced by such an expansive amount of social connectedness. It simply requires you to consider the pervasive way in which this technology has enriched the world. To consider what the internet has given us is too overwhelming a task. It touches just about every aspect of our personal and professional lives in some way or another. It has changed the way we live, love, work, play and everything in between. You can find a job, buy a car, get an education, perform banking functions, buy groceries, stream movies, meet your significant other, run a business and so much more. It would be unbalanced to not mention the fact that a person’s reputation and livelihood can be destroyed online. The internet is also where hackers lurk, searching for weaknesses in data security. There are all kinds of exploitation and corruption, more than you can ever imagine. The dark side of the internet is pervasive and frightening. When you consider the good, the bad and the ugly, there are still few people who want to live without the internet. It will be interesting to see what the next 50 years will bring. Please enter your comment! Please enter your name here
Interview: 3D Printing Keys Applied To Training Spanish version available here. Marina Portabella believes that 3D printing has multiple applications in training careers such as architecture, medicine, or mathematics. Q: Tell us how was the emergence of your project and how you apply it to training. A: The project grew out of a course that I received about 3D printing; I was struck by the number of chances you have now and in the near future, so before the end of the course, I was circling the project. As I give training, I saw another possible outputs: Providing courses and telling everything related to 3D. Q: So what is a 3D printer exactly? A: A printer that creates 3-dimensional objects, rather than being flat as seen in the printers we have at home. Let’s say it draws all faces of the object including its height. Once you know its operation, it is very simple. Q: What applications does it have? What is something printed in 3D? A: Applications… everything you can think of can be printed: We think about sectors as design, architecture, engineering, automotive, fashion, medicine, dentistry, etc. Home appliances, parts that are no longer found, broken objects… A 3D object can be a decorative or functional piece. In medicine, for example, they scan the patient to practice before an operation; The same printer is supplied with printed pieces. Q: How do you think this 3D printing can be applied to training? In a training process, in school, in college, in a training center, in a business school, how would you use this to apply it to training? A: Inside the printing field, training is a very important part: If you do not know what it is or how a printer works, you  are not going to be able to use it. Where this training applies? In schools: It is easier to teach a child with an object than with a drawing on paper. For example, in English, it is easier to learn vocabulary viewing some parts, in math, the formulas… In the end, they are three-dimensional objects. In college, students also should know printers, as they help them both in their work and in their studies. In training centers, as well as they are providing training on certain materials, printing also has a place. Stores that sell printers also have to get to know the product. Q: If someone wants to pursue this professionally, what do you really need to know? A: You should start with a course, have a printer to practice and practice. Q: What projects have you come from? What request did you have from companies that need this for their training within the company, or business schools or universities that have told you “Hey, we need you to teach us or that you use this with our students”? A: The type of project is very varied: People who come to print, companies that request us any parts, printers rental for events, printers selling for a training center, several tidbits by now. At universities we are doing presentations to let them know about us. Q: What future do you see to 3D printing? In Spain, in the Spanish situation, what use is being given? A: 3D printing is little known in Spain, although in some TV programs they are giving some reports. Future? This is starting; Until the usefulness of the machines get to be seen, it won’t be implemented. The good news is that when you count the multiple applications of a printer, is when people start thinking about what they can do with it. 3D objects Q: Any recommendations for people who are interested in this sector? A: The first thing is to have a good base through training: We offer introductory workshops to printing, to know the machine, its possible faults and how to fix them, some program design, etc. These courses are hold throughout the year. Q: What does it cost for someone starting from scratch? A: The workshops are affordable for anyone, we meliorate the courses for workers and printers are well priced; we do a promotion every month. Q: Are you planning to provide online training to reach all countries? A: Yes, yes, we have some courses placed on the platform indeed, so anyone from anywhere can approach it and it is also subsidized. Written by Leticia Lafuente López for Learning One thought on “Interview: 3D Printing Keys Applied To Training Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
Quick Answer: What is female genitourinary cancer? What is genitourinary cancer? Genitourinary cancer is a term that encompasses cancers of the urinary tract or the male reproductive tract. It includes: Urethral cancer. Testicular cancer. What is the most common genitourinary cancer? Prostate cancer is by far the most common of genitourinary malignancies; it is characterized by relatively indolent behavior, propensity for bone metastases and reliance on the androgen receptor pathway that is exploited therapeutically with considerable success. What are the types of female cancers? Is bladder cancer a genitourinary cancer? Genitourinary cancers is a specialised field focusing on cancers found in the urinary system and the male reproductive system. These include prostate cancer, kidney cancer, bladder cancer, testicular cancer and cancers of the penis. What are genitourinary problems? Urogenital disorders are problems that affect the urinary and genital tracts (reproductive organs). Before birth, development of the urinary tract and genital tract are closely linked. The parts of the urinary tract are located near or run through parts of the genital tract. IT IS INTERESTING:  Question: Why is gene therapy good for cancer? Can you have bladder cancer for years and not know it? Even after reporting the problem to their doctors, blood in the urine may be initially misdiagnosed. It may be seen as a symptom of post-menopausal bleeding, simple cystitis or as a urinary tract infection. As a result, a bladder cancer diagnosis can be overlooked for a year or more. What does it mean if cancer has spread? The process by which cancer cells spread to other parts of the body is called metastasis. When observed under a microscope and tested in other ways, metastatic cancer cells have features like that of the primary cancer and not like the cells in the place where the metastatic cancer is found. What does a genitourinary doctor do? Doctors in genitourinary medicine (GUM) diagnose and treat sexually transmitted infections (STIs), including HIV. This page provides useful information on the nature of the work, the common procedures/interventions, sub-specialties and other roles that may interest you. What are the early symptoms of female reproductive cancers? Here are 10 cancer symptoms that every woman should be on the lookout for. • Abnormal vaginal bleeding. … • Unexplained weight loss. … • Vaginal discharge colored with blood. … • Constant fatigue. … • Loss of appetite or feeling full all the time. … • Pain in the pelvis or abdominal area. … • Changes in your bathroom habits. How are female cancers diagnosed? Doctors might perform a biopsy of the lesion, in which they take a sample and observe it under a microscope to look for abnormal cells. So far, only cervical cancer has a routinescreening test (the Pap smear). IT IS INTERESTING:  Are deep lipomas cancerous? How fast do gynecological cancers grow?
Google’s Laws For Robots Google’s AI Researchers are writing their own set of “RULES” or guidelines to be best described on how robots should act. In a new paper called “Concrete Problems in AI Safety,” Google Brain—Google’s deep learning AI division—lays out five problems that need to be solved if robots are going to be a day-to-day help to mankind, and gives suggestions on how to solve them. Most of the discussion to date has, argues Olah, been ‘very hypothetical and speculative,’ so the team wanted to examine the real-life challenges. It came up with five issues. Fastcodesign present them in a concise and easy to understand way. 1. Robots should not make things worse. 2. Robots shouldn’t cheat. 3. Robots should look to humans as mentors. 4. Robots should only play where it’s safe. 5. Robots should know they’re stupid. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
In The Studio: Barnacles Often mistaken for another group of animals and originally classified as mollusks, barnacles are arthropods, which means they have jointed legs. By Susan Knight Welcome to the studio of the great outdoors. I’d like to discuss an animal not typically considered as sexy as some of the larger marine animals, but you may soon agree that barnacles could actually be considered one of the sexiest. There are many different barnacle species that live underwater, in the intertidal zone, or on whales and other animals. Often mistaken for another group of animals and originally classified as mollusks, they are arthropods, which means they have jointed legs. Arthropods also have exoskeletons made of chiton, segmented bodies, bilateral symmetry and an open circulatory system. They are related to insects, spiders, crabs and lobsters. Let’s look at the intertidal zone, the place between low tide and high tide, where we can easily study barnacles. It’s a place where many divers begin their journey to explore the underwater world, hiking the shoreline to dive sites. The barnacle and other animals that live here are very specialized and sturdy. Because they are sometimes submerged and sometimes exposed, they have special challenges to overcome. They have to deal with extraordinary ranges in temperature, sun exposure, wind, fresh water (rain), intense wave action and land predators. They must also spend enough time underwater in order to have enough time to do important things like eat. If you look closely, you’ll find that specific species live in clearly separated zones; where they live depends on various factors. The top zone is mostly limited by how well particular animals can withstand the stresses of extended periods out of the water. The bottom zone is determined more by predatory factors. In other words, if you live higher, you will be exposed to some of your sub-tidal predators for a shorter time. Hard shells, super-strong glue or threads to keep you attached to rocks also help keep you protected in such an environment. Barnacles close up and hold a tiny droplet of salt water in their shell to keep hydrated at low tide. Barnacles actually start life free-floating in the water with plankton. After a time, they find a substrate, such as a rock, and settle down. This is where it gets interesting. They plant their heads upside down on the substrate and attach with super-strong glue and then begin creating a hard shell made of several plates. Living at the top of the intertidal zone, they spend the longest time exposed as the tide recedes. When underwater, they feed on plankton by continuously reaching their feathery jointed legs out of their shell, and then pull those legs in to bring the food down to their mouth. Reproduction is required for species continuity, so how easy is sex when you’re attached to your home? This is where it gets really interesting. Most barnacles are hermaphrodites and can fertilize themselves if required, although it’s far better for species diversity if another barnacle does the fertilizing. The barnacle’s claim to fame is their fantastically long penis, about 20 times their body length — a penis-to-body ratio record in the animal world. I have seen a barnacle penis (patience pays off) unfold and reach out to creep into another shell for some fertilization action. It felt all around the surrounding area, much like when you’re fumbling for the light switch in the dark. It finally inserted itself into a nearby shell so the tube could deliver barnacle sperm. A successful strategy, it seems, to create more barnacles. I encourage you to check for low tide in your area sometime and enjoy a compelling barnacle safari. You can also discover many subtidal barnacles on dives. You may be amazed what at occurs before you, if you simply stay in one place and observe. Remember, on your dives, that relocating animals can be detrimental to their health. The intertidal area is so diverse that moving an animal (“Oh, no, this poor sea star will die up here, I will save it by tossing it into the sea”) can be like plucking someone from Florida in their shorts and T-shirt and dropping them in Alaska. These are totally different environments, and that sea star is there for a reason. Susan Knight is a dive instructor, tour guide and marine biologist who has spent the last 20 years traveling, teaching and writing about the oceans in the Pacific Northwest, Hawaii and the Caribbean. She has transitioned mostly to freediving and become know for her work with large marine animals such as whales, dolphins, sharks and elusive mermaids. Her studio has always been in the great outdoors. You can see her work and video projects at
Cast iron detail Before SoHo Was SoHo Our Visible Past The work of the destroyers has always been made easier for them by the nature of our history: A country that is founded on a revolution is not likely to show undue reverence for its predecessors. -Brendan Gill, "Preserving the Visible Past" The New York Times, September 28, 1975 Although cast iron architecture enjoyed short-lived popularity as an architectural style, being replaced by steel-skeleton construction with high speed elevators by the 1880's, the buildings of SoHo are considered the protoypes or precursors to the skyscraper and therefore hold much historic significance in the development of New York City. First put forth in the 1930's, the idea for the Lower Manhattan Expressway, or LOMEX as it was known, which was to run the length of Broome Street, gained support in the 1950's and 1960's and would have razed most of what is now SoHo and Little Italy.  However, community opposition to the proposed highway connecting New Jersey and Brooklyn (via some of the most historically significant areas of New York City) killed the project, and the highway was never built (see my post on LOMEX and Robert Moses here). Overlapping the plans for LOMEX, the historic buildings of SoHo were also slated to be demolished to make way for new housing construction.  A group called the City Club put out a study in 1962 called "The Wastelands of New York City" that recommended that a large part of what is now SoHo be razed, as "there are no buildings worth saving." But then Chester Rapkin, a city planning commissioner, came out with a report that same year titled "The South Houston Industrial Area" (also known as the "Rapkin Report"), which stated that, although the number of businesses in the area had declined over the years, the old buildings still housed small industries that employed many low-income and minority workers and were also a still-viable tax revenue source for the city. In the end, it was also a simple matter of the city's financial health that saved SoHo from the wrecking ball.  Of the minority group of people in power who preferred preservation to novelty in New York City, Brendan Gill, writer, critic, and  one time chairman of the board of the Landmarks Conservancy of New York writes: Brendan Gill Their unwitting allies in perserving certain remnants of the past were the poor, for if eccentricity has always been a good friend of preservation, poverty has been an even better friend.  Much of the most admired architecture of older New York—the SoHo district, for example, and scores of square blocks in Greenwich Village and Little Italy—have survived because, at a critical moment, the city didn't have enough money to pay for knocking them down. -Brendan Gill, "Preserving the Visible Past" The buildings, thus, remained intact, and, as mentioned above, the neighborhood was given landmark status in 1973 and was protected from any further demolition plans.  Thanks to a variety of forces coming together in the 1960's and early 70's, the Rapkin Report, the tireless work of preservation activists, and a serendipitous lack of funds, SoHo has remained and will continue to be for the foreseeable future an architecturally and aesthetically significant part of New York's "visible past."
The Roaring 20s: A Time of Massive Economic Expansion Remembering the Roaring 20s - A Skeptic’s View of American History Episode 16 The Roaring 20s Reconsidered Mark Stoler PhD Film Review In one of Stoler’s better lectures, he describes the 1920s as a time of major economic expansion. During this period, the US experienced an explosion in industrial productivity, thanks to “scientific” factory management, a consolidation of commercial enterprises (eg creation of grocery and department store chains) and a shift from heavy industry to consumer goods (thanks to an expanding electrical grid). Henry Ford made the automobile a consumer item, using an assembly line to cut the cost of production and enabling workers to buy their own Fords by paying them an unprecedented $5 a day. The explosion of new consumer products was accompanied by a surge in advertising that played on people’s psychological desires to get them to purchase products they couldn’t afford and didn’t need. (See about Edward Bernays, the father of the public relations industry. According to Stoler the car became a focal point of the US economy, leading to a surge in demand for steel, rubber, electronics, concrete and roadside restaurants. A crisis in agriculture also led to a rise in urbanization, with city dwellers outnumbering rural residents for the first time in US history.The industrialization of farming created a food surplus and drop in income for individual farmers. The new mass media (radio and motion pictures) helped spread the new culture of urbanization. Stoler mainly examines the presidency of Warren G Harding, who only served two years between 1921-23,* with only a brief glance at Coolidge and Hoover, who succeeded him. All three were Republicans. Harding, who is remembered as one of the second most corrupt presidents owing to the Teapot Dome scandal, is also remembered as the first president to present Congress with a coherent federal budget. Significant treaties and legislation approved during this period include • The National Origins Act, which (until the 1960s) totally excluded Asia immigration, and set severe quotas for eastern and southern European immigrants.** • The Dawes Plan (1924), which ended the diplomatic crisis with Germany (which had defaulted on its reparations payments) by arranging for private loans to the German government and negotiating a new reparations schedule. • The Kellogg-Briand Pact (1928) outlawed war as an instrument of US of foreign policy. • The London Naval Arms Limitation Treaty (1930) The 1920s also witnessed • The rise of a new Klu Klux Klan, attracting 3-5 million members (including many Northerners) in response to the migration of Southern blacks to Northern industrial cities. The new KKK would focus their attacks on Jews, Catholics and immigrants, as well as African Americans. • The start of Prohibition (the 18th Amendment approved in 1919 outlawed the production and sale of alcohol) • The granting of women’s voting rights ( in 1920 via the 19th Amendment) • The framing and execution of Italian immigrants Sacco and Vanzetti (1921-27) *Stoler defines cities as towns of over 2,500 people. **Teapot Dome, which was the second biggest presidential scandal after Watergate, involved the secret leasing by the Harding administration of federal oil reserves at Elk Hills, California, and Teapot Dome, Wyoming. The film can be viewed free on Kanopy. The History of Advertising Sell and Spin: A History of Advertising Produced by Rob Blumenstein (1999) Film Review Sell and Spin details the history of advertising, which apparently dates back 3,000 years to a wine ad painted on a wall in ancient Babylon. The documentary’s only weakness is its omission of the important role Edward Bernays, the father of the public relations industry played in incorporating psychological persuasion into advertising (see Edward Bernays: The Father of Water Fluoridation). In Europe, advertising took a giant leap forward with the invention of the Guttenberg printing press in 1548 and a significant increase in literacy. The first printed ad appeared in 1580 – to promote the sale of books. Newspapers, the first mass media, contained no ads when they first appeared in England in the early seventeenth century. The first newspaper ads appeared in 1625, alerting readers to the availability of various advertisers’ products. In the US, the first newspaper ad in appeared in the Boston News-Letter in 1704. In 1728, Benjamin Franklin was the first publisher to use images in newspaper ads in the Philadelphia Gazette. Volney E Palmer created the first advertising agency in 1842. He worked solely for newspaper publishers, helping them find advertisers. Magazines first accepted advertising after the Civil War. In 1883 the Ladies Home Journal was created as a vehicle for ads aimed at housewives. In 1869 Wayland Ayer created the first full service advertising agency, writing copy as well as selling ads. Before long, “every orifice of the body was taken over by advertising,” as corporations invented fictitious illnesses and products to cure them. BO (body odor) was invented in 1919 to sell Odorono and halitosis in the 1920s to sell Listerine. The first radio program was broadcast in 1920, announcing that Harding had won the US presidency. Although most European governments assumed responsibility for broadcasting in the public interest, in the US the private corporations Westinghouse (CBS) and General Electric (NBC) controlled the first radio networks. The first radio ad appeared in 1922. In 1946, the first TV program was broadcast, and by 1951 there were more than 5 million TVs around the world. Beginning in the early sixties, advertising agencies began incorporating sophisticated psychological persuasion techniques in their TV ads. According to the filmmakers, this was mainly under the influence of George Gallup, the father of the public opinion poll. Gallup, whose primary focus was the science of persuasion, was ultimately responsible for the major role focus groups and other forms of market research play in product development. When this documentary was filmed in 1999, Internet advertising was only five years old. Yet advertisers were already tracking us with “cookies” monitoring which websites we visited and to targeting us with specific ads. War is a Racket war is a racket War is a Racket by Major General Smedley Butler (1933) Book Review Published in 1933 by retired Marine Major General Smedley Butler, War is a Racket is a historic expose of the role of Wall Street profiteering in instigating war. The book begins with the startling statistic that World War I created 21,000 new millionaires and billionaires. President Woodrow Wilson borrowed (from Wall Street banks) the $50+ billion to pay for World War I, increasing the national debt from $1 billion to $52 billion. Of this amount, $16 billion was pure profit. Butler lists specific companies, starting with Du Pont and US Steel, and the obscene profits they made from World War I. He also deplores the systematic inefficiency and fraud that caused the War Department to pay two to three times the retail charge for equipment such as saddles and mosquito nets that had no possible use in a modern European war. This was on top of millions spent on poorly crafted wooden ships that sank when put to sea and airplanes that were technologically obsolete by the time they were delivered. Wilson had been elected to his second term based on a campaign promise to keep the US out of the Great War. War is a Racket also discusses his secret White House meeting with a European commission that caused him to reverse himself. After informing Wilson the allies were losing the war, they warned that they couldn’t repay the $5-6 billion they owed American bankers, manufacturers and munitions makers if they were defeated. Butler maintains the real reason the US entered the war was to protect these Wall Street interests. Obviously this isn’t what Wilson and his Committee on Public Information (run by Edward Bernays, the father of public relations) told the American people. They would be barraged with incessant propaganda about the Germans being monstrous barbarians and the Great War being the war to end all wars because it would make the world safe for democracy. War is a Racket: free PDF Major General Smedley Butler is best known for foiling the 1933 Bankers’ Putsch. This was a failed military coup, instigated by America’s leading bankers and industrialists, to remove Roosevelt from office and replace him with a Mussolini-style dictatorship. Butler, who was recruited to lead the coup, blew the whistle to the House McCormick-Dirkson Committee. They responded by launching a cover-up. Details of the Bankers’ Putsch only became public knowledge in 1967, when journalist John Spivac uncovered the committee’s secret notes. Marketing Politicians Through Social Engineering The Century of the Self BBC Documentary (2005) Film Review Link to Part 1 and 2 The Politics of Self Students Opt for Self-Liberation Values and Lifestyle Marketing The Politics of Self Animal Domestication and Capitalism factory farm In the past I have tended to dismiss the animal welfare movement as another “feel good” liberal cause that does little to redress human oppression and exploitation. I was wrong. A recent lecture by sociologist David Nibert from Wittenberg University has opened my eyes to the historical role of animal domestication in imperialistic wars, colonialism, genocide, and wealth inequality. Even more scary is the rapid spread of the meat-laden “western” diet, an invention of the public relations industry, to the developing world. There it continues to fuel untold violence and cruelty against the poor and disadvantaged, resource wars, and systematic degradation of the complex ecosystems that support human existence. The title of Nibert’s talk, carried on Alternative Radio, is “The Animal Industrial Complex.” He isn’t being cute. This powerful institution has even more control over our daily lives than either the military or prison industrial complex. Replacing Our Ancestors with Sheep After reminding us of the plant-based, “original affluent” society that characterized most of human existence, Nibert traces the rise of the “western” meat-based diet across 10,000 years of human history. After causing thousands of years of European warfare, exploitation, and slavery in the 15th century animal domestication was foisted on the other continents. In South America it destroyed some of the world’ most advanced societies. Back in Europe, the need to provide sheep pasture was the chief rationale for the 18th century Enclosure Acts that drove most of our ancestors off their communal lands (see my review of Fred Harrison’s The Traumatised Society). According to Nibert, this massive expansion of “animal domesecration” was just as important as fossil fuels in the rise of the capitalist economic system. The drive to clear new pasture to produce meat for global elites led to genocidal wars against native peoples in North and South America, Australia, and New Zealand. The Socially Engineered Demand for Meat In the 20th century Edward Bernays, the father of public relations, assisted the food industry in artificially inflating public demand for meat. After World War II, it culminated in what Nibert refers to as the “hamburger culture.” In the sixties and seventies, corporate demand for new pasture led to US collaboration with right wing Central and South American dictatorships that systematically drove peasant farmers from their lands. Those who resisted were violently suppressed by US-trained troops and death squads, with US supplied bombers, gunships, and guns. Animal Domestication and Influenza Aside from the obesity, heart disease, cancer, and diabetes, animal domesecration poses an enormous public health threat, even for vegans and vegetarians who don’t eat meat. This stems from viral “zoonotic” illnesses that have spread to humans from chickens and pigs. Nibert reminds us that the 2009 H1N1 outbreak that killed nearly 285,000 people originated in factory farms in North Carolina. During the 20th century influenza pandemics (originating mainly from chickens and pigs) killed more than 50 million people. Meanwhile, despite the major health and environmental problems caused by the western meat-based diet, demand for new pasture continues to force thousands of peasants from their land in Africa and South America. While desertification and water scarcity (caused by overgrazing) make food commodities and and shares in water companies the primo investment for banks and hedge fund managers. Nibert finishes the interview with a critique of leftists who think they’re being political correct by only consuming local, free-range animal products: “I applaud my friends for eating local plant-based foods but have to argue to them that the continued consumption of animal products is more harmful than they know. The reduction in ‘food miles’ from consuming local animal products is overshadowed by the energy and resources necessary for their production and refrigeration. And while the more affluent among us can afford the more expensive grass-fed products and thus avoid eating domesecrated animals plied with pesticides, antibiotics and hormones, the vast majority of people will continue to eat the cheapest fare that the Animal Industrial Complex can produce. And even if the world were more equitable, moral and environmental issues aside there simply is not enough land or water to “free range” the tens of billions of domesecrated animals necessary to meet the growing, socially engineered demand.” The full presentation can be downloaded from Alternative Radio. A transcript is $3, an MP3 file $5. Until Oct 25, you can listen to the interview free on line at KEXP 90.3 FM. Go to and click on “LAUNCH  PLAYER” photo credit: Socially Responsible Agricultural Project via photopin cc
Agile methodologies assist participants to be able to adjust their activities in response to any changes which arise during a given project. Agile methodology refers to a group of software, which involves iterative development. One of these methodologies is called scrum. Scrum on is a framework that is used in completing the most complex projects. Basics on scrum Scrum has some three roles in any project. These include the owner of the product, scrum master as well as the team. A product owner is a person who represents a given company. The master is the individual who is controls and measures the process as the sole manager. The team refers to the people who will execute every process in that project. Project sprints on the other side; refer to the steps to be followed during the execution of that project. This also refers to every day meeting held during the project. The artifacts are the products required for the implementation of such a project, which includes a task list for implementing the desired product features. The burndown chart indicates the amount of work remaining during the usage of the products towards completion. How the process works The project owner has the mandate to compile the backlog along with the requirement of such a project. The planning team works on the priority issues on that particular backlog as desired. However, the team works under instruction and on a specific deadline. The daily meetings ensure that the manager understands the progress of that assigned team. It also helps in guiding the team on the key things to undertake during that specific work. A review done on a completed sprint is done before the next sprint. Any next process also has its requirements and priority items. The process continues until the deadline or until the completion of any assigned work. Benefits of scrum This agile methodology has several benefits which include the following; • Scrum ensures efficient use of resources and times. The delivery system ensures that the time to the market is minimal and also maximizes the revenue. This is because each sprint has its new release of products. • The most complex projects can also be divided into some small manageable sprints thus easy to manage. • Every development process is coded as well as tested in every sprint review process thus minimal errors. • The methodology also perform incredibly in fast-moving projects • The assigned team can define its vision through the project meetings and different programs. • As an agile process, scrum allows feedback from clients as well as stakeholders. Some demerits of scrum • The consistent meeting could sometimes frustrate the team. • The framework is mostly successful with well competent and experienced members. • It is also not easy to adopt the framework, especially in large groups. Initially, scrum methodology was formalized for various software development works. However, it can also be employed on the most innovative, complex kind of work. Due to its flexibility to fit in different kinds of work, many consider scrum as the best responsive project management tool.
Although there are many types of antacids and other medications that you can take to help relieve acid reflux symptoms, did you also know that correct posture can have a positive impact on the way you digest food, thus preventing reflux from occurring? acid? That’s right, the postures you adopt while eating food and directly after eating are important, because they can make digesting food easy or difficult for your body. For example, sitting in a hunched-forward position while eating and lying down directly after a meal puts extra pressure on the stomach and can promote indigestion or heartburn. Also, wearing something tight around the waist (belts, tight pants, corset, etc.) while eating puts pressure on the stomach. Tight clothing prevents your belly from expanding and moving freely, which is a natural process during feeding and digestion. When you put excessive pressure on your stomach, it takes longer for your stomach to digest food. The longer it takes for your stomach to digest food, the greater your chances of developing indigestion and / or acid reflux. Therefore, improving posture during and after meals can help or prevent heartburn symptoms. Proper posture that promotes good digestion. Sit down at meals: When you eat, you should be sitting at a table. You should not eat while standing, walking, lying down, or while driving. Sit down – don’t hunch over or hunch over the table to eat your food. Sit near the table and bring the utensil to your mouth, rather than your mouth to the utensil. To ensure proper posture while sitting, follow these tips: o Sit in a chair that supports your back (i.e. high back, firm cushions, etc.) o Keep your knees level with your hips and sit as far back in the chair as possible. To keep your knees level, your feet must be flat on the ground. Note: If your lower back is bothersome when sitting, place a round cushion or towel between the chair and your lower back for support. Take your time and eat – don’t rush to eat. Eating too fast also causes digestion problems. You must give your stomach time to register the food you have eaten. Do not lie down: Although you should allow your body to rest after eating, make sure you are sitting or standing. Do not lie down as this slows down digestion. How can I improve my posture? 1. Exercise: Regular back and abdominal exercises (eg yoga, Pilates, etc.) will strengthen your muscles and help you maintain good posture without causing discomfort. 2. Firm mattress and sleeping position: Sleep on a firm mattress that supports your back well. Sleep on your back and keep your legs straight or put a pillow under your knees, or if you sleep on your side, keep your legs slightly bent and make sure the upper leg is straighter than the lower leg. Don’t sleep on your stomach. 3. Constant awareness – Always be aware of how you are sitting or standing. That way, you can correct your posture if your body falls into its familiar bad habits. Good posture improves your health and your overall appearance. When you stop slouching, you will find that this will not only aid digestion, but will also help alleviate and prevent other problems that may occur involving the neck, shoulders, and back. Straightening and strengthening your back muscles does wonders for your well-being. Give it a try! By admin Leave a Reply
Keoni CBD Gummies-How does rheumatoid arthritis affect the immune system? by fiona basil (26.07.2021) Email Reply Rheumatoid arthritis is an autoimmune rheumatic disease in which structures such as joints are attacked, causing a very characteristic form of arthritis due to its deforming character. The manifestations that accompany this disease are not limited to the joints. This type of arthritis can lead to the development of lesions in other organs and systems, which are its extra-articular manifestations. These are present in approximately 50% of patients with rheumatoid arthritis. Main extra-articular manifestations of rheumatoid arthritis This rheumatic disease is accompanied by a large number of manifestations at the systemic level. They are due to the activity of autoantibodies caused by a failure in the immune system that recognizes various components of the tissue as foreign. These manifestations are more frequent in patients who have elevated levels of rheumatoid factor in the blood, which reflects greater activity of the disease. These manifestations generally warrant specific treatment. Cardiovascular conditions The heart and blood vessels are one of the most affected organs in people with rheumatoid arthritis. It is common for these patients to present an inflammatory process located inside the small caliber arteries, this is known as vasculitis and it leads to them becoming obstructed, thus compromising the passage of blood inside them, which produces small infarcts in the tissues irrigated by them. Vasculitis can cause peripheral nerve disorders, manifesting primarily as paralysis, loss of sensation, or pain. The heart, on the other hand, is usually affected by lesions in the valves that separate the atria from the ventricles and in those that are located at the origin of the pulmonary arteries and aorta. This favors the appearance of arrhythmias and heart failure. Hematological conditions Chronic diseases can lead to various adaptive changes in the body, including anemia. In addition to red blood cells, another blood cell series that is frequently affected by this disease is platelets. This is mainly related to malfunctions in the spleen that lead to this organ accumulating them inside, thus reducing its blood levels, which favors the development of bleeding. Finally, the immune response can lead to a decrease in white blood cells, or it favors the development of infections. Pulmonary conditions One of the most common extra-articular manifestations of rheumatoid arthritis is the appearance of nodular lesions in the lungs. In addition to these injuries, the lungs can be affected by the development of fibrosis that limits their ability to expand during inspiration. Another associated problem is the development of dilatations of the intrapulmonary bronchi called bronchiectasis, these are due to the destruction of the cartilage of the bronchial wall, which favors the accumulation of secretions that constitute a factor that increases the risk of suffering from infectious processes such as pneumonia. Membrane disorders Antibodies often produce inflammatory processes that can stimulate the exudation of fluids in virtual spaces located between the membranes that line the heart, lungs and intestines, known as the pericardium, pleura and mesentery respectively. Eye conditions Rheumatic diseases are usually accompanied by eye lesions that cause manifestations such as redness and eye pain. These are generally due to involvement of the white part of the eyeball known as the sclera. In the case of rheumatoid arthritis, the main manifestation is dry eyes. Subcutaneous tissue disorders It is estimated that about 30% of people with rheumatoid arthritis have nodular lesions that are soft and painful to the touch, located under the skin at the level of the forearms and legs. These injuries are known as rheumatic nodules. They are due to localized activation of the immune system on necrotic collagen fibers, probably due to a vasculitis-type process. Nodules are rarely infected or ruptured, necessitating their removal. Muscle conditions People with rheumatoid arthritis can develop atrophy of the muscles near the most compromised joints. This disorder is related to the necrosis of muscle fibers, which produces a decrease in muscle mass that gives rise to manifestations such as weakness. Bone conditions In addition to the bone destruction typical of the disease activity, this form of arthritis predisposes to a decrease in bone mineral density, producing osteoporosis. This is usually aggravated as a result of the adverse effect of medications such as steroids. Increased risk of developing tumors Rheumatoid arthritis increases the risk of developing tumors such as lymphomas, especially in patients with active disease with persistent inflammation. This website uses cookies About Cookies
RezFree Work The use of pesticides and chemicals to enhance the growth of crops is, in fact, damaging and destroying the land, soil and health. The UN report says that 200,000 people die each year due to pesticide poisoning. Along with human health, it has a significant effect on the land and soil. These chemicals are a massive threat to the environment. Hence, to avoid any further damage, companies are opting for biotechnology. The biotechnology companies are inventing environment-friendly natural fertilizer that produces quality crops and prevents health damage.  What is RezFree? RezFree is the blend of all things organic. It consists of enzymes, peptides, amino acids, oligosaccharides, and organic matter. It cures as well as prevents critical agricultural problems. How Does RezFree Work? RezFree is loaded with rich and diverse components. It is beneficial for plants, soil, water, and the environment. It imparts healthy and high-quality crops. Also, it makes sure that soil and land are fertile, free of chemicals, and encourages fine ecosystems to balance the growth. There are many issues faced during the growing cycle, and to solve them, here is how RezFree works:  It Eliminates Chemical Residue: The latest version of chemicals and pesticides are strenuous to remove from the food and plants. Despite washing and cleaning the chemicals, they are not removed entirely. This leads to fatal health issues, like cancer, birth defects, allergies, etc. RezFree degenerates and removes the chemical residue entirely. It is applied to food and soil to remove the accumulated dirt and chemicals, eventually increasing the lifespan. Reduces the Soil Salinity: Due to excesses of salt, the nutrients and crops can be negatively impacted, resulting in losses and degradation of soil and health. RezFree reduces the soil salinity, saving massive investments of time and money.  Enhances Microbial Activity: RezFree’s rich enzyme content enhances the microbial activity in the rhizosphere. This increases the nutrient uptake of the crops and improves soil fertility. Boosts Immune System: Plants are prone to many diseases, and to prevent them, growers have to make massive investments. The best solution is RezFree. RezFree’s organic components boost the immunity of the plants, improve the quality of soil, prevent underground water from chemical residue, and enhance the developing capacity of seeds.    Growers have to invest a great deal of money and time in growing crops, and any minor oversight can negatively impact the crops, leading to massive losses. Additionally, the chemicals, pesticides and plant maintenance costs are very high. Therefore, to avoid chemical residues, protect land and soil, grow healthy crops, and minimize costs, purchase RezFree. AgroBiome is making this earth a better place by providing environmentally friendly products. They sell RezFree at affordable prices, making your lives healthy.
We investigated how our digestive system works using a sealable bag (stomach), a pair of tights (small intestine), biscuits, bananas, orange juice and water. The Circulation Game The Sea Lions enjoyed an interactive, scientific morning, learning how the circulatory system works. They worked in teams to read the instructions, to create the games and to learn more about the functions of the heart, blood vessels and blood. Breaking News… Introducing… our Science TV reporters. The results are in! It is 3 days since our healthy teeth science investigation began… and here are some of our findings. We have set up a three-day long investigation to see how sugar and acid reacts with our teeth. We have logged our predictions and will record the results later in the week. Super Science! The Butterflies took part in a Pirate Density Investigation. We learnt that oil is less dense than water, meaning that the oil rose to the top! Badgers’ Trip to Chester Zoo We had an amazing time exploring Chester Zoo and loved learning about all the different animals we saw. Have a look at our little video to see what we got up to. Thank you for our amazing trip Mrs. Allen! The Leopards investigated the effects of refraction: how refraction alters the direction of light. The children first predicted what they thought might happen. Then, they conducted an experiment and recorded the results. Finally, they discussed their conclusions as a class. Today, the Leopards looked at how the sun and shade affect their shadows. They considered shape and direction. They thought about time and the seasons, and about how their shadows change. Washing Our Hands The Sunflowers and Daffodils really enjoyed learning all about germs and how to wash their hands correctly. They put some ‘pretend germs’ on their hands and looked at them under a UV light box. They then washed them and looked at them again to make sure they had done a good job! Thank you to Jenny Baker from the Ward Alliance for teaching our children this important life skill so well. Goldilocks and the Three Bears  The children in Nursery have been reading this traditional tale. They have been retelling the story and joining in with the repeated refrains. They talked about how the three bears must have felt when they found Goldilocks in their house. They helped to make some porridge and talked about their likes and dislikes. They were super stars!
Website review by Emily Pohlonski, Common Sense Education | Updated September 2019 That Quiz Simple design, customizable quizzes make test practice tolerable Learning rating Flagged for privacy concerns Community rating Flagged for privacy concerns Privacy rating 0%| Fail Expert evaluation by Common Sense Subjects & Skills Math, Science, World Languages, Critical Thinking Take a look inside 5 images Pros: Teachers will love how easy it is to create and grade multiple versions of the same test. Cons: It's pretty basic; you definitely don't have as many options as with other educational platforms or quiz tools. Bottom Line: It's free, easy to use for both teachers and students, and, although basic, a pretty solid way to gather classroom data. That Quiz can be a useful tool for learning because it immediately lets kids see their score, what they got wrong, and the correct answer. It also makes it easy for teachers to give kids another chance and provide a new version of an assessment. All they have to do is press Regenerate, and an entirely new test appears that addresses the exact same concepts. Features like that have the potential to save a ton of time! And if you're using standards-based grading or working in competency-based classrooms, you'll be extra grateful for this automated test generation. That Quiz can be very helpful for differentiation, remediation, and providing alternative forms of an assessment. Its many options make it a versatile tool; you can import tests created by other teachers or make your own. Shorter quizzes could be merged later to produce a larger final exam. Continue reading Show less That Quiz is a website featuring multiple-choice, matching, and short-answer tests on a variety of core subjects. Most of its content is math-oriented, with quizzes on arithmetic to calculus, but it also includes tests on science, geography, and four languages. Click on a quiz like "Shapes," and you're presented with the image of a rectangle and four multiple-choice options. Guess correctly, and your right answer will be recorded in the upper right corner. You can also choose which shapes you'd like to be quizzed on, whether you want the quiz to be timed, and a handful of other options. Each assessment is graded by the site, and kids get immediate feedback. Kids can access their tests by having a test code, a link to their class home page, or an email notification. A teacher account gives teachers the ability to design and assign tests. It also lets teachers view grade reports for each student on each quiz. Some standout quizzes: • African Geography Test: Identify all the countries in Africa. • Graphs Test: Answer questions about pictograms, bar graphs, box plots, and any other graph you choose. • Elements Test: Pick the location of elements such as sodium on the periodic table. Creating tests is easy and quick with That Quiz. It's not super slick, but the levels of customization make up for the slightly boring interface. Kids can learn about almost anything; there are tons of math quizzes and a reasonable amount of content in other areas. Math questions range from basic arithmetic to calculus, and vocabulary quizzes are available for people learning English, French, Spanish, or German. Kids will also find science practice on cells, anatomy, elements, and conversions. Note: Testing security is always a concern with online tests, and certain precautions should be taken to preserve the integrity of the quizzes you create. Unless it's a practice test, don't assign it until your actual class period. Students should also protect their passwords to prevent others from taking tests using their name. Overall Rating The design is about as simple as can be, but that guarantees no distractions. Kids should have fun playing for speed and beating their scores; other than that, quiz-taking is pretty straightforward. The depth of knowledge assessed depends on the type of questions selected for each test. There's a lot of memorization but also the option to do some complex thinking with, for example, higher math quizzes. It's available in 12 languages, and quizzes can be modified for kids at different levels. Common Sense reviewer Emily Pohlonski Classroom teacher Community Rating Featured review by Meagan B. , Classroom teacher Classroom teacher West Jordan High School West Jordan , United States I love the idea of this teaching tool. I would love it if it would be available to more specific subject areas. It would help my students be able to look at other people signing the signs I do in the classroom & could create their own online flashcards. Read full review Privacy Rating 0% Fail
Adding Refutation and Counter-Argument to Your Essay Home » Essay Examples » Adding Refutation and Counter-Argument to Your Essay Without refutation and counter-argument, your persuasive or argumentative essays would be incomplete. Moreover, you will be considered a biased writer, with a narrow mind, who is unable to acknowledge the opposing point of view. Therefore, to maintain your impartiality you should acknowledge the aspects of the opponents’ point of view and then decently invalidate them by providing substantive refutation. What is a counter-argument? Any argument that challenges the thesis statement of your essay, completely or a part of it, is termed as a counter-argument. It represents the views of the skeptics who do not agree with your thesis. Why should you add counterargument and refutation to your essay? No matter how good arguments you have presented in your essay, to prove your thesis, it would be considered incomplete if you had not presented and refuted the counterarguments. Counter-arguments not only show the reader that the essay writer is impartial and open to looking at the opposing point of view. But it also adds to the strength of the thesis by showing the reader that the opposing point of view is faulty and less-realistic. What refutation should do? The refutation in your essay should uncover the faultiness in the counter-argument. It should explain why and where the opposing point of view is falling short and how your thesis is addressing all the lacunas and is better than the position of the opposition. Where to put the counter-argument? There is no hard and fast rule about the exact position of the counter-argument in your essays. However, you can add a counter-argument at these locations in your essay: • In the introduction: You can place a counter-argument in the introduction of your essay, just before the thesis statement. • After the introduction: One can also add it after the introduction in a separate paragraph. • Within a body paragraph: You can also present a counter-argument in any of the body paragraphs. • Before the conclusion: After presenting your arguments, you can add a refutation and counter-argument in a paragraph, before concluding your essay. If you are confused about it, consult the best essay writing service now. How to present a counter-argument? A counter-argument in your essay would have two parts. In the first, you will act as a skeptic and provide a logical argument challenging your thesis statement. In the second part, you will rebut this counter-argument by providing substantial evidence and logical reasoning. • Think like a skeptic reader: Put yourself in the shoe of any reader who you think might disagree with your position. If your thesis is supporting a vegetarian diet, you should put yourself in the shoe or stomach of a meat lover. You can start as “Critics would disagree…” or “some might say that… • Cite a credible source or any group of people against your proposition i.e. environmentalists would argue that… After presenting the counter-argument and citing some resources to support it, you should build a case against your point. Now it’s time to refute the counter-argument. Sighing already? You still have to rebut the counter-argument. Does it seem like too much work? Well, you can always hire a legit ‘ write my essay for me’ service to add counter-argument and refutation in your essay or to write a complete essay for you. How to rebut the counter-argument? Here you would acknowledge that there is or might be some truth to the claims of the opposition but they are built on either cherry-picked evidence or the claims are exaggerated. You should cite a credible source form the relevant field. You can also invalidate the counter-argument by providing research data that denies any credibility to the claims of the opposition. After you are done with the counterargument and refutation, you should briefly explain why your claims are better and more realistic than that of your opposition. This complete guide will help you add counter arguments in your essay effectively. However, if you are still confused, hire an essay writer service now. About us Why us? • 100+ subject matter experts. • 100% original writing (zero plagiarism, ever). • Short deadline service. • Love our work or don’t pay (satisfaction guaranteed). Paper Due? Why Suffer? That's our Job assignment helpassignment helperassignment expertsassignment writing services
_My Employees You can’t pay just any amount you want when it comes to setting the salaries or wages of your employees. There’s a minimum wage law that you must follow. Employers must understand the minimum wage to comply with labor laws. It’s essential to note, however, that you might have differing local, state, and federal minimum wage rates, depending on the location of your business. So, what’s a minimum wage?  More on it below. Minimum Wage: What Is It? The most important thing to remember about the minimum wage is that you can pay more than it, but you can’t pay less than the set amount. It’s the lowest amount an employer can pay to their specific employee per hour of work. As already mentioned, the minimum wage may vary on the federal, state, and local levels.  How Much Is The Federal Minimum Wage? The federal minimum wage rate hasn’t increased since 2009, although it’s actually subject to change. It was raised to $7.25 in 2007 (made effective in July 2009) through The Fair Minimum Wage Act. All nonexempt employees must be paid by this rate for each hour of work up to and including 40 hours in a calendar workweek. A time-and-half calculation is going to be made for overtime pay. It covers any time beyond 40 hours. It works out to a minimum of $10.88 per hour. The FLSA or Fair Labor Standards Act regulates the federal minimum wage. It’s enforced by the United States Department of Labor. The minimum wage doesn’t only apply to hourly workers. That said, even if you actually don’t pay the employees of your company on an hourly basis, the federal minimum wage law still applies to you. Even if the law states that the minimum wage should be paid for every hour worked, it doesn’t require employers to pay their employees on an hourly basis. What happens is that you’ll be required to pay all covered employees for a workweek with an amount of money that’s at least equal to what the minimum wage is. All you need is to multiply the minimum wage by the total hours of work. As long as the minimum requirement of $7.25 is followed, an employee may be paid on piecework, through a monthly salary, or on an hourly basis. How Much Is the State Minimum Wage? The United States Department of Labor has an overview of minimum wage requirements for every state. All you need is to visit their website or look for the most up-to-date state minimum wage requirements online. Many states across the US maintain the federal’s minimum wage, which is $7.25. Utah, Idaho, and Texas are some of the states that do it. States like Oregon and California are on the other end of the spectrum. They require a higher minimum wage of $11.25 and $11, respectively. Of all the states, New York currently sets the highest in the whole country at $13. It’s essential to note that a city may require employers to pay a higher minimum wage amount than the state requires. You’ll commonly encounter it in big cities where there’s a much higher cost of living compared to others. A good example is the state of Washington, which requires just $11.50. However, one of its cities, Seattle, has a minimum wage requirement of $15.45. Minimum wage requirements for every state are helpful because they give employers a non-negotiable place where they can start determining their employees’ pay scale. Also, ensuring that you’re offering the right minimum wage and other benefits to your staff is one way of showing your employees you care. Local Minimum Wage As already mentioned, aside from federal and state minimum wage requirements, your city may also create a local minimum wage. Bigger cities often have local base wages. The minimum pay rate in your city can be greater than both the federal and state minimum wage requirements. For example, San Francisco’s minimum wage of $15.59 is higher than California’s. It’s also more than double the federal requirement of $7.25. So, what happens if your city’s minimum wage is higher than the federal and state minimums?  Learn what you should do below. Federal Vs. State Vs. Local Minimum Wage What happens if the local wage is higher than the federal one?  What about if the state’s minimum wage is higher than the federal requirement?  If the state minimum wage is higher than the federal wage, employers must pay their employees at least the state rate. Similarly, if the local rate is higher than the federal, you must pay the minimum wage set by your city. That means you’ll have to pay your employees whichever is the higher minimum wage rate. It’s of utmost importance that employers comply with the minimum wage rates set by both the federal and state governments. Under federal law, a minimum wage should be established as required by the Fair Labor Standards Act (FLSA). Generally, all employees who aren’t exempted from the law should receive that minimum wage. Please enter your comment! Please enter your name here
What Is The Derivative Of Sinh 2x What is the derivative of log 2x? So, the derivative of $log 2x$ with respect to x is $dfrac{1}{x}$. via What is the derivative of sin2x? Answer: The derivative of sin2(x) is sin(2x). via How do you find the derivative of Sinh? (video) What is Tanhx? Defining f(x) = tanhx We shall now look at the hyperbolic function tanhx. In speech, this function is pronounced as. 'tansh', or sometimes as 'than'. The function is defined by the formula. tanhx = sinh x cosh x . via What is the derivative of log 3x? Calculus Examples The derivative of log3(x) log 3 ( x ) with respect to x is 1xln(3) 1 x ln ( 3 ) . via How do you integrate log 2x? Integrate by parts using the formula ∫udv=uv−∫vdu ∫ u d v = u v - ∫ v d u , where u=log(2x) u = log ( 2 x ) and dv=1 d v = 1 . Simplify. Combine x x and 1xln(10) 1 x ln ( 10 ) . via What is the differentiation of sin 3x? Answer: The value when we differentiate sin3x is 3 sin2x cosx. via What is Sinh 1x? The hyperbolic sine function, sinhx, is one-to-one, and therefore has a well-defined inverse, sinh−1x, shown in blue in the figure. In order to invert the hyperbolic cosine function, however, we need (as with square root) to restrict its domain. via What does Sinh mean in math? Sinh is the hyperbolic sine function, which is the hyperbolic analogue of the Sin circular function used throughout trigonometry. It is defined for real numbers by letting be twice the area between the axis and a ray through the origin intersecting the unit hyperbola . via Is tanh odd or even? One can easily show, that tanh (x),csch(x), and coth (x) are odd functions. Next, we derive an identity for the hyperbolic functions similar to the Pythagorean identity for the trigonometric functions. via What is sinh on a calculator? Calculates the hyperbolic sine of a value. The hyperbolic trig functions sinh(, cosh(, and tanh( are an analog of normal trig functions, but for a hyperbola, rather than a circle. They can be expressed in terms of real powers of e, and don't depend on the Degree or Radian mode setting. via Leave a Comment
What DOes HRM Stands For?  HRM Stands For Human Resource Management. What is HRM Introduction and Definition?  Human resource management is basically towards human management, and it's a core subject of management sciences it relates to the human being. It simply means that it manages the people of an organization. What is the Definition  HRM? Human resources, management is basically a management function that tries to match an organization ned to the skills and ability of the employer who works for an organization.  to manage the right person to the right job at the right time accordingly.   whare they look at the personal skills and knowledge of the person is he or she is effective or not for the specific positions.this is the Appropriate definition of human resource management. HRM- Stands For Human Resource Management What are the  Components Of HRM : Basically, it has three components such as, • Human • Resource • Management These three components are very important factors to cover it. and make a complete sense of human resource management.  The words humans mean social animals are humans beings here the big difference between social animals and machines. to know this social animal and machine for that purpose we design human resource management to take benefits from this. Every organization has there some resources and they achieve the objective accordingly. The resources that are used by a human being. Resources can be technology, it could be money which we can utilize to accomplish our requirements. Management is a process of (POLC)  which means planning, Organizing, Leading, and Controlling the organization sets these to achieve the objective and get the benefit in an efficient manner that's simply called management.   HRM Function? Human resource management can be classified in the following three categories. • Managerial Function • operative Function  • Advisory Function the sub-function of managerial function is,  1- Plaining  2- Organizing  3- Leading  4- Controlling  The Operative function of Human resource management is. • Recruitment and selection • Training and Development  • performance Appraisal • Salary and compensation • Employee Welfare  • Personal research • personal Record • Job Analysis These are the Operative function of human resource management where Hr professionals do before hiring the employees of the organization. they planned for the recruitment of employees for the organization. And arrange Training and development for those employees who are new in the organization. Whenever a new employee hired for the job the HR arranges training foe develop their skills and confidence. and Also decide a salary package for them and make a strategy on how to compensate the employee as well. Advisory function: The Advisory function of human resource management is as follows. Human resource management can offer advice. • Advice to the management  • Advice to the Head of departmental  The personnel manager advises the top management and also advises the head of various departments. Importance Of HRM? Human resource management is really significant for every organization. human resource management helps an organization to achieve the objective from time to time by creat a positive attitude in the workplace and make maximum use of resources. And also facilitate professional growth and better relationship in, management. human resources are the backbone of any department where it helps to hire a better person for the right time. which work for organizations to achieve organizational goals. human resource plays a vital role in an organization and everywhere.
Medical Dictionary banner Medical Dictionary - Dictionary of Medicine and Human Biology Medical Dictionary birth (berth) 1. Passage of the offspring from the uterus to the outside world; the act of being born. 2. Specifically, in the human, complete expulsion or extraction from its mother of a fetus, irrespective of gestational age, and regardless of whether or not the umbilical cord has been cut or whether or not the placenta is attached. b. certificate official, legal document recording details of a live b., usually comprising name, date, place, identity of parents, and sometimes additional information such as b. weight. premature b. b. of an infant that has achieved a gestation of at least 20 weeks or b. weight of at least 500 g, but before 37 weeks. birthing (bir′thing) Parturition; the act of giving birth. birthmark (berth′mark) A persistent visible lesion, usually on the skin, identified at or near birth; commonly a nevus or hemangioma. See nevus (1) . strawberry b. SYN: strawberry nevus. 1. Prefix signifying two or twice. 2. In chemistry, used to denote the presence of two identical but separated complex groups in one molecule. Cf.:bi-, di-. [L.] bisacodyl (bis-ak′o-dil) A laxative used orally or rectally for constipation. Same class as phenolphthalein. bisacromial (bis′a-kro′me-al) Relating to both acromion processes. bisalbuminemia (bis′al-bu′mi-ne′me-a) The concurrence of having two kinds of serum albumin that differ in mobility on electrophoresis: normal albumin (albumin A) and any one of several variant types that migrate at other speeds; individuals are heterozygous for the gene for albumin A and the gene for the variant albumin type. SEE ALSO: inherited albumin variants, under variant. bisaxillary (bis-ak′si-lar-e) Relating to both axillae. bisbenzylisoquinoline alkaloids (bis-ben′zil-i-so-kwin′o-lin al-ka-loids) A group of alkaloids whose base structure is two fused isoquinoline rings, e.g., curare alkaloids. 2,5-bis(5-t-butylbenzoxazol-2-yl)thiophene (BBOT) A scintillator used in radioactivity measurements by scintillation counting. W., 20th century German neurosurgeon. See B. myelotomy. biscuit (bis′kit) A term associated with the firing of porcelain, and applied to the fired article before glazing. May be any stage after the fluxes have flowed enough to provide rigidity to the structure up to the stage where shrinkage is complete. Referred to as low, medium or high b., depending on the completeness of vitrification, also as hard or soft b.. The initial bake(s) given fusing porcelain at lower than glazing temperature to control shrinkage during the process of building up the dental restoration. SYN: biscuit-firing. SYN: biscuit-bake. bisdequalinium chloride (bis′de-kwa-lin′e-um) An antiseptic. bis in die (b.i.d.) (bis in de′a) Twice a day. [L.] bisexual (bi-seks′u-al) 1. Having gonads of both sexes. SEE ALSO: hermaphroditism. 2. Denoting an individual who engages in both heterosexual and homosexual relations. bisferient (bis-fer′e-ent) SYN: bisferious. bisferious (bis-fer′e-us) Striking twice; said of the pulse. SYN: bisferient. [L. bis, twice, + ferio, to strike] Louis F., U.S. physician, 1864–1941. See B. sphygmoscope. bishydroxycoumarin (bis-hi-drox′e-koo′ma-rin) SYN: dicumarol. bisiliac (bis-il′e-ak) Relating to any two corresponding iliac parts or structures, as the iliac bones or iliac fossae. Bismarck brown R [C.I. 21010] A diazo dye similar to Bismarck brown Y. Bismarck brown Y [C.I. 21000] A diazo dye used for staining mucin and cartilage in histologic sections, in the Papanicolaou technique for vaginal smears, and as one of Kasten Schiff-type reagents in the PAS and Feulgen stains. SYN: vesuvin. [Ger. bismarckbraun, after Otto von Bismarck, Ger. chancellor] bismuth (Bi) (biz′muth) A trivalent metallic element; atomic no. 83, atomic wt. 20.98037. Several of its salts are used in medicine; some contain BiO+, rather than Bi3+, and are called subsalts. [Ger. Wismut, weisse Masse, white mass] b. aluminate a gastric antacid. SYN: aluminum b. oxide. b. ammonium citrate ammoniocitrate of b.; an intestinal astringent. b. carbonate SYN: b. subcarbonate. b. chloride oxide SYN: b. oxychloride. b. citrate used in the making of b. and ammonium citrate. b. hydroxide used in detecting reducing sugars. b. iodide BiI3;used in electron microscopy to reveal synapses. SYN: b. triiodide. b. oxide used for the same purposes as the subnitrate. b. oxycarbonate SYN: b. subcarbonate. b. oxychloride basic b. chloride, used for the same purposes as the subnitrate. SYN: b. chloride oxide, bismuthyl chloride. b. oxynitrate SYN: b. subnitrate. b. salicylate b. subsalicylate. b. sodium tartrate a basic sodium b. tartrate; an antisyphilitic agent. b. sodium triglycollamate sodium b. complex of nitrilotriacetic acid. b. subcarbonate used for the same purposes as b. subnitrate, but has lower toxicity. SYN: b. carbonate, b. oxycarbonate, bismuthyl carbonate. b. subgallate used internally in diarrhea and externally as an astringent and protective dusting powder. b. subnitrate a basic salt, the composition of which varies with the conditions of preparation; used internally as an intestinal astringent and externally as a mild astringent and antiseptic; the metal is used as an electron microscope stain for nucleic acids. SYN: b. oxynitrate. b. subsalicylate used as an intestinal antiseptic. b. tribromophenate, b. tribromophenol used externally as an antiseptic. b. trichloride BiCl3;addition of water results in formation of b. oxychloride. SYN: butter of b.. b. triiodide SYN: b. iodide. bismuthosis (bis-mu-tho′sis) Chronic bismuth poisoning. bismuthyl (biz′mu-thil) The group, BiO+, that behaves chemically as the ion of a univalent metal; its salts are subsalts of bismuth. b. carbonate SYN: bismuth subcarbonate. b. chloride SYN: bismuth oxychloride. bisoxatin acetate (bis-ok′sa-tin) A laxative. A liquid scintillation agent used in radioisotope measurement. 1,3-bisphosphoglycerate (1,3-P2Gri) (di-fos′fo-glis′er-at) An intermediate in glycolysis which enzymatically reacts with ADP to generate ATP and 3-phosphoglycerate. 2,3-bisphosphoglycerate (2,3-P2Gri) An intermediate in the Rapoport-Luebering shunt, formed between 1,3-bisphosphoglycerate and 3-phosphoglycerate; an important regulator of the affinity of hemoglobin for oxygen; an intermediate of phosphoglycerate mutase. b. mutase an enzyme of the Rapoport-Luebering shunt; it catalyzes the reversible interconversion of 1,3-bisphosphoglycerate to b.; it also has a phosphatase activity, converting b. to orthophosphate and 3-phosphoglycerate; a deficiency of b. mutase can result in mild erythrocytosis. bisphosphonates (bis-fos′fo-nats) Synthetic pyrophosphate analogs that inhibit osteoclast resorption of bone. bistephanic (bi′ste-fan′ik) Relating to both stephanions; denoting particularly the b. width of the cranium, or b. diameter, the shortest distance from one stephanion to the other. bisteroid (bi-ster′oyd) A molecule composed of two molecules of a given steroid joined together by a carbon-to-carbon bond. bistoury (bis′too-re) A long, narrow-bladed knife, with a straight or curved edge and sharp or blunt point (probe-point); used for opening or slitting cavities or hollow structures. [Fr. bistouri, fr. It. dialect bistori, perh. fr. Pistoia, Italy] bistratal (bi-stra′tal) Having two strata or layers. bisulfate (bi-sul′fat) A salt containing HSO4−. SYN: acid sulfate. bisulfide (bi-sul′fid) A compound of the anion HS−; an acid sulfide. bisulfite (bi-sul′fit) A salt or ion of HSO3−. 1. The smallest unit of digital information expressed in the binary system of notation (either 0 or 1). 2. The electrical signal used in electronic computers. SYN: binary digit. bitartrate (bi-tar′trat) A salt or anion resulting from the neutralization of one of tartaric acid's two acid groups. A female dog of breeding age. [O.E. bicche] bite (bit) 1. To incise or seize with the teeth. 2. The act of incision or seizure with the teeth. 3. A morsel of food held between the teeth. 4. Term used to denote the amount of pressure developed in closing the jaws. 5. Undesirable jargon for terms such as interocclusal record, maxillomandibular registration, denture space, and interarch distance. 6. A wound or puncture of the skin made by animal or insect. [A.S. bitan] balanced b. SYN: balanced occlusion. biscuit b. SYN: maxillomandibular record. close b. SYN: small interarch distance. closed b. reduced vertical interarch distance with excessive vertical overlap of the anterior teeth. deep b. an abnormally large vertical overlap of anterior teeth in centric occlusion. edge-to-edge b. SYN: edge-to-edge occlusion. end-to-end b. SYN: edge-to-edge occlusion. jumping the b. an orthodontic technique for correcting a crossbite, usually anterior. locked b. an occlusion in which the cusp arrangement restricts lateral excursions. normal b. SYN: normal occlusion (1) . open b. 1. SYN: large interarch distance. 2. SYN: apertognathia. rest b. a misnomer for physiologic rest position of the mandible. working b. SYN: working contacts, under contact. bitemporal (bi-tem′po-ral) Relating to both temples or temporal bones. biteplate, biteplane (bit′plat, bit′plan) A removable appliance that incorporates a plane of acrylic designed to occlude with the opposing teeth. bitewing (bit′wing) See b. radiograph. bithionol (bi-thi′o-nol) An antiparasitic agent used for treatment of the human lungworm, Paragonimus westermani, and the Oriental liver fluke, Clonorchis sinensis; also used as a bacteriostat in soaps and detergents; sodium bithionate is used as a topical bactericide and fungicide. bitolterol mesylate (bi-tol′ter-ol) A sympathomimetic bronchodilator used in the prophylaxis and treatment of bronchial asthma and reversible bronchospasm. Pierre A., French physician, 1822–1888. See B. spots, under spot. bitrochanteric (bi-tro-kan-ter′ik) Relating to two trochanters, either to the two trochanters of one femur or to both greater trochanters. bitropic (bi-trop′ik) Having a dual affinity, as in tissues or organisms. [bi- + G. trope, a turning] bitter apple SYN: colocynth. 1. An alcoholic liquor in which bitter vegetable substances ( e.g., quinine, gentian) have been steeped. 2. Bitter vegetable drugs ( e.g., quassia, gentian, cinchona), usually used as tonics. SYN: amara. aromatic b. b. with a pleasant aromatic flavor. John J., U.S. oncologist, 1904–1961. See B. agent, B. milk factor. Alexander, German physician, 1876–1949. See B. reaction. biuret (bi-oo-ret′) A derivative of urea obtained by heating, eliminating one NH3 between two ureas. Used in protein determinations. SYN: carbamoylurea. bivalence, bivalency (bi-va′lens, bi-va′len-se) A combining power (valence) of 2. SYN: divalence, divalency. bivalent (bi-va′lent, biv′a-lent) 1. Having a combining power (valence) of 2. SYN: divalent. 2. In cytology, a structure consisting of two paired homologous chromosomes, each split into two sister chromatids, as seen during the pachytene stage of prophase in meiosis. SEE ALSO: tetrad. biventer (bi-ven′ter) Two-bellied; denoting two-bellied muscles. [bi- + L. venter, belly] b. cervicis SYN: spinalis capitis (muscle). b. mandibulae SYN: digastric (muscle) (1) . biventral (bi-ven′tral) SYN: digastric (1) . biventricular (bi′ven-trik′oo-lar) Pertaining to both right and left ventricles. bixin (bik′sin) A monomethyl ester of a 24-carbon branched unsaturated dicarboxylic acid; a carotenoid (a carotene-dioic acid); the orange-red coloring matter from seeds of Bixa orellana; the ethyl ester is used as a food and drug colorant. SEE ALSO: annotto. bizygomatic (bi′zi-go-mat′ik) Relating to both zygomatic bones or arches. Giulio, Italian physician, 1846–1901. See B. corpuscle. Jannik P., Danish ophthalmologist, 1851–1920. See B. scotoma, B. screen, B. sign. V. O., 20th century Swedish cardiothoracic surgeon. See B.-Shiley valve. R., 20th century Scandinavian dermatologist. See B. syndrome. Symbol for berkelium. Douglas A.K., Scottish physician, *1909. See B. formula. Greene V., U.S. dentist, 1836–1915. See B. classification. Kenneth D., U.S. physician, 1883–1941. See Diamond-B. anemia, Diamond-B. syndrome. blackout (blak′owt) 1. Temporary loss of consciousness due to decreased blood flow to the brain. 2. Momentary loss of consciousness, as in absence. 3. Temporary loss of vision, without alteration of consciousness, due to positive g (gravity) forces; caused by temporary decreased blood flow in the central retinal artery, and seen mostly in aviators. 4. A transient episode that occurs during a state of intense intoxication (alcoholic b.) for which the person has no recall, although not unconscious (as observed by others). visual b. amaurosis fugax. black root SYN: leptandra. bladder (blad′er) [TA] 1. A distensible musculomembranous organ serving as a receptacle for fluid, as the urinary or gallbladder or urinary b.. See detrusor. 2. SYN: urinary b.. [A.S. blaedre] air b. a two-chambered gas-filled sac that is present in most fish and functions as a hydrostatic organ; it is located beneath the vertebral column, and is connected with the esophagus in some fish. SYN: swim b.. allantoic b. a type of b. formed as an outgrowth of the cloaca. atonic b. a large, dilated, and nonemptying urinary b.; usually due to disturbance of innervation or to chronic obstruction. autonomic neurogenic b. malfunctioning urinary b., secondary to low spinal cord lesions. gall b. SYN: gallbladder. hyperreflexic b. a b. exhibiting detrusor instability. hypertonic b. a b. with poor compliance. ileal b. SYN: ileal conduit. neurogenic b. SYN: neuropathic b.. neuropathic b. any defective functioning of b. due to impaired innervation, e.g., cord b., neuropathic b.. SYN: neurogenic b.. nonneurogenic neurogenic b. detrusor-sphincter incoordination with urinary incontinence, constipation, UTI, upper tract changes. SYN: Hinman syndrome, pseudoneurogenic b.. poorly compliant b. a b. that has high pressure at low volumes in the absence of detrusor activity. pseudoneurogenic b. SYN: nonneurogenic neurogenic b.. reflex neurogenic b. an abnormal condition of urinary b. function whereby the b. is cut off from upper motor neuron control, but the lower motor neuron arc is still intact. swim b. SYN: air b.. trabeculated b. characterized by thick wall and hypertrophied muscle bundles. Typically seen in instances of chronic obstruction. uninhibited neurogenic b. a condition, either congenital or acquired, of abnormal urinary b. function whereby normal inhibitory control of detrusor function by the central nervous system is impaired or underdeveloped, resulting in urgency or enuresis. unstable b. characterized by uninhibited detrusor contractions. urinary b. [TA] a musculomembranous elastic bag serving as a storage place for the urine. SYN: b. (2) [TA] , vesica urinaria [TA] , vesica (1) [TA] , cystis urinaria, urocyst, urocystis. . . . Feedback
Human Food You should Never Feed your Dog Many pet owners let their dogs eat from their plates and left-overs. Let us tell you that this is very wrong! Allowing your pet to eat the food you consume isn’t only harmful but also life-threatening to them. The food we commonly eat on a daily basis consists of fats, cholesterol, and natural chemicals that are prone to a dog’s health. Xylitol, a naturally obtained chemical mixed in chocolates to make it sweet, can cause insulin levels to rise and damage your dog’s liver. There are many food items, raw or cooked, that we consume on a daily basis which can create troubles for your pet. As a precautionary measure, you should stop feeding pet your of your kitchen. And, put your trash away from the reach of your nosy-friends who often dive into the trash can to scavenge for food scraps. 10 Human Foods to Avoid Feeding your Dog Urban Pet Hospital & Resort, the best doggy daycare has compiled a list of food items that are harmful and useful for dogs. The list is also recommended by the ASPCA Animal Poison Control Center of food harmful for dogs. Yeast Dough Yeast dough is harmful to dogs mainly because the yeast begins to rise once it gets into your dog’s digestive system. As it swells inside, the dough can stretch their abdomen, bloat their stomach or even twist it, making it a lot painful to them. In many cases, consuming a large amount of yeast dough can become a life-threatening emergency. The yeast produces a chemical ‘ethanol’ as a by-product which leads to alcohol poisoning in dogs. Xylitol is a naturally originating chemical found in many plants and trees. It is used as a sweetener in many food items such as chewing gum, candy, baked goods, and toothpaste. Ingesting xylitol leads to the release of insulin in dogs. The excessive increase in insulin can lead to hypoglycemia (lowered sugar levels) and can trigger vomiting, lethargy, and loss of coordination. If not treated within a few days, it can lead to elevated liver enzymes and liver failure in dogs. Carefully dispose away of the candy and gums, and keep the trash can away from your dog’s reach. Salty Food Most fast food items eaten by people including Pizza, burger, fries, Lasagna, pop-corn, and Pasta consist of a large amount of salt (sodium). Large amounts of salt intake can produce excessive thirst and urination in dogs. In many cases, the continuous intake of sodium can even lead to sodium ion poisoning in pets. There are tell-tale signs of sodium poisoning such as vomiting and diarrhea. Severe symptoms include depression, tremors, elevated body temperature, and seizures. Onion, Garlic, and Chives We often use onion, garlic, and chives in our meal to make it delicious. The problem with these natural root-items is that they can cause gastrointestinal irritation in dogs and cats. It is less troubling if consumed in a small amount. However, if your dog consumes a large portion at once, it can lead to red blood cell damage or anemia. The tell-tale signs include weakness, vomiting, and breathing problems. Toxicity is normally diagnosed through history, clinical signs, and microscopic confirmation of Heinz bodies. You should keep onions and garlic -- powdered, raw, cooked, or dehydrated -- away from your dog.  Do not let your dog nibble on fast foods found at fests, carnivals, and beaches Milk and Dairy Milk and dairy products can be harmful to dogs mainly because they do not possess significant amounts of lactase, the enzyme that breaks down lactose in milk. Consuming a large amount of milk and other dairy-based products can lead to diarrhea or other digestive upset in dogs. They can also trigger food allergies, which can cause her to itch. Unlike popular belief, milk is harmful to cats. Instead of sharing your ice cream with your dog, instead, give them some cold water. Grapes and Raisins Popular fruits like grapes and raisins consist of unknown toxins that can lead to kidney failure in dogs. Although the actual toxic compound is unknown, many instances and research have led to the belief that consuming grapes and raisins can cause kidney failure. Even small amounts of grapes and raisins can be troublesome for your dog. Signs of ingestion include vomiting, tremors, lethargy, and dehydration. Chocolate and Caffeine Do not let your dog nibble on chocolates and caffeine-based food products. Chocolate contains a substance called methylxanthines which are commonly found in Cacao seeds. Ingestion of methylxanthines leads to vomiting and diarrhea, panting, excessive thirst and urination, hyperactivity, abnormal heart rhythm, tremors, and seizures. In a severe case, death is common too. The dark chocolate is more dangerous than milk chocolate because it contains more methylxanthines and caffeine. Prevent your dog from slurping coffee and tea from the cup or floor. Alcohol causes ethanol poisoning in dogs. They shouldn’t consume it even the smallest bit of amount. The tell-tale signs of ethanol poisoning include a lack of coordination, diarrhea, seizures, and vomiting. In many cases, it leads to central nervous system depression, tremors, and abnormal blood acidity in dogs. Contact your pet hospital in Urbandale as soon as you notice these signs. Coconut and Coconut Oil When ingested in small amounts, coconut or coconut-based products do not pose problems to dogs. However, the flesh and milk of fresh coconuts contain oils that may cause stomach upset, loose stools, or diarrhea in dogs. Coconut water is mainly avoided for pets because it contains a high amount of potassium. Citrus fruits are commonly found around many gardens, parks, and forests. Beware if your dog starts nibbling on these small fruits. The stems, leaves, peels, fruit, and seeds of citrus plants contain varying amounts of citric acid, essential oils that can lead to bowel irritation and central nervous system depression. A small amount doesn’t necessarily hurt your dog, however, if ingested in a significant amount it can lead to many problems. Here are some of the food items and fruits that you can consider feeding your dog. However, you must remember to use moderation when introducing these food items. • Blueberries • Pineapples • Strawberries • Salmon • Peanut Butter • Bananas • Cheese • Cooked eggs (Never feed raw eggs) • Oranges • Carrots Urban Pet Hospital & Resort offers some of the best-certified veterinarians in Urbandale. Get in touch with us to find out about the best ways to take care of your pet. Add comment
User Tools Site Tools Exercise - Accessing struct fields using pointers • Better understand call by reference when passing parameters • Use pointer variables and the operator to access fields in a struct • Feel free to refer to Dive Into Systems Section 2.7 for, uh, “pointers” In this section you'll complete a program that creates and initializes two struct variables, one a regular struct variable and the other dynamically allocated through a pointer. As written the code initializes the first struct but the second is left for you to do. Also, there is a print_student function that takes a pointer to struct studentT as an argument (is this call by value or call by reference?) but this function is incomplete. 1. Download the program ptr-struct.c from the webserver 2. Give it a quick read to get the idea 3. The places to add code are marked by a comment saying …add code here… and I recommend completing the initialization of the second struct (using a pointer), in the main function, first. Fill in any values you like for each field of the struct. 4. Now complete code for the print_student function. 5. Compile and test. When you have it working, demonstrate to the instructor As always, if you run out of time or are working remotely, send me an e-mail containing screenshots of the working programs by the end of the day for full credit. cs270/ptr2struct.txt · Last modified: 2021/09/20 17:16 by scarl
The Normans The Normans in Britain by Mandy Barrow Search our websites  YOU ARE HERE :Homework Index > History > The Normans WW ll Roamn Britain Saxon Britain Viking Britain Norman Britain Tudor Britain Victorian Britain World War Two 500 BC AD 43 An Introduction to the Invaders. Who were the Normans? The Normans were people who lived in Normandy in Northern France. They were originally Vikings from Scandinavia. (The name Normandy comes from the French normand, meaning Norsemen and Normans) (The photographs below and throughout the following page were taken from the Battle of Hastings re-enactment in October 2006) (After invading Britain they also built castles - to defend their new kingdom) Norman houses There were no supermarkets or shops to buy food so the celts ate what food they could grow or hunt. Vegetables e.g. leeks, onions, turnips, parsnips and carrots. Wild nuts e.g. hazelnuts and walnuts. Berries e.g. gooseberries, blackberries and blueberries. Grains to make bread and also porridge Herbs e.g. fennel, common sorrel, wild garlic, parsley Leaves e.g. nettles and spinach Wild animals e.g. deer, wild boar, fox, beaver, and bear. Fish e.g. trout, mackerel, and salmon. Domesticated animals e.g. chicken, goat, sheep and pigs. Eggs from hens and wild birds eggs. Honey from bees Their clothes were made from animals. They travelled by boat, horseback or on carts pulled by cattle. The Norman Invasion of England - introduction The battle of Stamford Bridge Who was the leader of the Normans? Who were the Normans? Houses, clothes, food Where did William fight Harold for the English Throne? The Battle of Hastings What happened at the Battle of Hastings? Who died with an arrow in his eye? William becomes King - plus Domesday Book info The Bayeux Tapestry - introduction What is the Bayeux Tapestry about? Questions and answers about the Bayeux Tapestry Part one Questions and answers about the Bayeux Tapestry Part two Horses | Armour | Shields | Helmets | Weapons Other websites email© Copyright - please read ©Copyright Mandy Barrow 2013 Follow me on Twitter @mbarrow
以家人之名免费观看西瓜最新章节目录_以家人之名免费观看 以家人之名免费观看西瓜最新章节目录_以家人之名免费观看 ,秋霞电影高清无码中文最新章节免费阅读_秋霞电影高清无码 秋霞电影高清无码中文最新章节免费阅读_秋霞电影高清无码 Purpose of Normalization Normalization is the process of structuring and handling the relationship between data to minimize redundancy in the relational table and avoid the unnecessary anomalies properties from the database like insertion, update and delete. It helps to divide large database tables into smaller tables and make a relationship between them. It can remove the redundant data and ease to add, manipulate or delete table fields. A normalization defines rules for the relational table as to whether it satisfies the normal form. A normal form is a process that evaluates each relation against defined criteria and removes the multivalued, joins, functional and trivial dependency from a relation. If any data is updated, deleted or inserted, it does not cause any problem for database tables and help to improve the relational table' integrity and efficiency. Objective of Normalization 1. It is used to remove the duplicate data and database anomalies from the relational table. 2. Normalization helps to reduce redundancy and complexity by examining new data types used in the table. 3. It is helpful to divide the large database table into smaller tables and link them using relationship. 4. It avoids duplicate data or no repeating groups into a table. 5. It reduces the chances for anomalies to occur in a database. Types of Anomalies Following are the types of anomalies that make the table inconsistency, loss of integrity, and redundant data. 1. Data redundancy occurs in a relational database when two or more rows or columns have the same value or repetitive value leading to unnecessary utilization of the memory. Student Table: StudRegistration CourseID StudName Address Course 205 6204 James Los Angeles Economics 205 6247 James Los Angeles Economics 224 6247 Trent Bolt New York Mathematics 230 6204 Ritchie Rich Egypt Computer 230 6208 Ritchie Rich Egypt Accounts There are two students in the above table, 'James' and 'Ritchie Rich', whose records are repetitive when we enter a new CourseID. Hence it repeats the studRegistration, StudName and address attributes. 2. Insert Anomaly: An insert anomaly occurs in the relational database when some attributes or data items are to be inserted into the database without existence of other attributes. For example, In the Student table, if we want to insert a new courseID, we need to wait until the student enrolled in a course. In this way, it is difficult to insert new record in the table. Hence, it is called insertion anomalies. 3. Update Anomalies: The anomaly occurs when duplicate data is updated only in one place and not in all instances. Hence, it makes our data or table inconsistent state. For example, suppose there is a student 'James' who belongs to Student table. If we want to update the course in the Student, we need to update the same in the course table; otherwise, the data can be inconsistent. And it reflects the changes in a table with updated values where some of them will not. 4. Delete Anomalies: An anomaly occurs in a database table when some records are lost or deleted from the database table due to the deletion of other records. For example, if we want to remove Trent Bolt from the Student table, it also removes his address, course and other details from the Student table. Therefore, we can say that deleting some attributes can remove other attributes of the database table. So, we need to avoid these types of anomalies from the tables and maintain the integrity, accuracy of the database table. Therefore, we use the normalization concept in the database management system. Types of Normalization 1. First Normal Form (1NF) 2. Second Normal Form (2NF) 3. Third Normal Form (3NF) 4. Boyce and Codd Normal Form (BCNF) 5. Fourth Normal Form (4NF) 6. Fifth Normal Form (5NF) First Normal Form (1NF): The table will be in First Normal Form (1NF) if all the attributes of the table contain only atomic values. We can also say that if a table holds the multivalued data items in attributes or composite values, the relation cannot be in the first normal form. So, we need to make it first normal form by making the entries of the table atomic. Second Normal Form (2NF): A Relation will be in 2NF if it follows the following condition: 1. The table or relation should be in 1NF or First Normal Form. 2. All the non-prime attributes should be fully functionally dependent on the candidate key. 3. The table should not contain any partial dependency. Third Normal Form (3NF): The table will be in Third Normal Form (3NF) if it follows the given conditions: 1. The table or relation should be in 2NF. 2. It should not contain any transitive dependency. A Transitive Dependency is that any non-prime attribute determines or depends on the other non-prime attribute. A relation is in 3NF if FD X determines Y ('X' -> 'Y') satisfies one of the following condition: 1. If X -> Y is a trivial FD, i.e., Y is a subset of X. 2. If X -> Y, where X is a Super key. 3. If X -> Y, (Y - X) is a prime attribute. Note: A table should be in a 3 NF, if the Left-Hand Side (LHS) of all Functional dependency (FD) must be a Candidate Key (CK) / Super Key, Or the Right-hand side should be Prime attribute. BCNF: It stands for Boyce Codd Normal form, which is the next version of 3NF. Sometimes, it is also pronounced as 3.5 NF. A normal form is said to be in BCNF if it follows the given conditions: 1. A table or relation must be in 3NF. 2. If a relation R has functional dependencies (FD) and if A determines B, where A is a super Key, the relation is in BCNF. Note: There should be one candidate/Super key on the left-hand side for each functional dependency for BCNF. Fourth Normal Form (4 NF): A relation is said to be Fourth Normal Form (4NF) if it follows the given conditions: 1. A table must be in BCNF. 2. There should be no multivalued dependency in the table. For example, if the dependency A -> B, for a single value of A, more than one value of B exists. Then the relation is said to be a multivalued dependency. Following is the condition for being multivalued dependency: 1. For a multivalued dependency A -> B, for a single value of A, there are multiple values of B. 2. If a table has at least three columns, they have a multivalued dependency. 3. For a relation with A, B and C columns, where B and C should be independent. Fifth Normal Form (5 NF): A relation is said to be 5NF if it follows the given conditions: 1. The table should be in 4NF. 2. There should not be Join Dependency or further non-loss decomposed. It is also known as Project Join Normal Form (PJNF). Join dependency: A relation (R) is said to be a Join dependency if the relation (R) schema can be divided into smaller sets of tables R1, R2 … Rn that can be redesigned by joining multiple tables to the original table (R). Youtube For Videos Join Our Youtube Channel: Join Now Help Others, Please Share facebook twitter pinterest Learn Latest Tutorials Trending Technologies B.Tech / MCA
Turkish / Year 9 and 10 / Communicating / Reflecting View on Australian Curriculum website Australian Curriculum, Assessment and Reporting Authority Curriculum content descriptions Reflect on their own and others’ language choices when interacting in bilingual/bicultural situations, identifying adjustments they make and strategies they adopt to assist in intercultural communication [Key concepts: interculturality, response, reflection, reciprocity; Key processes: reflecting, monitoring, comparing, discussing] • drawing on their own bilingual/multilingual experience to identify elements of successful intercultural communication, for example, noticing differences in expectations, recognising and responding to signals of misunderstanding, switching strategically between Turkish and English • providing examples of interactions that ‘work’ better in Turkish than they do in English, for example, talking to their grandparents, participating in cultural events, joking between themselves, and discussing why this might be the case • keeping a journal of memorable experiences associated with learning and using Turkish in and out of school, noting personal reactions and reflections over time and insights gained into themselves as language users, for example, how they choose to use either English or Turkish in different contexts and situations • considering the idea of shared responsibility in relation to intercultural communication, considering how effective interaction involves elements of noticing, analysing, reflecting, responding and adjusting • comparing ‘repair and recovery strategies’ they use to respond to miscommunication between speakers from different language and cultural backgrounds, for example, self-correction, rephrasing, apology, requests for repetition or clarification • reflecting on choices they make when interacting with friends who also speak both Turkish and English, identifying instances when they move between languages for practical or cultural reasons General capabilities • Literacy Literacy • Intercultural understanding Intercultural understanding • Personal and social capability Personal and social capability ScOT terms Turkish language Search results Refine by topic Related topic
People who received their first shot of the Pfizer COVID vaccine will now have to wait six weeks before returning for the second jab. (TheFocalProject, Flickr) • South Africa has doubled the interval between the first and second dose of the Pfizer vaccine, from 21 days to 42 days. • A preprint study found that people who got their jabs 12 weeks apart had more than triple (3.5 times) as many antibodies in their blood than those who were immunised three weeks apart. • Countries such as the United Kingdom and Canada also extended dosing intervals for the jab. In South Africa, people who received their first shot of the Pfizer COVID vaccine will now have to wait six weeks before returning for the second jab. This follows updated guidance issued by the national health department a month ago, in light of new data showing a longer delay between doses could offer more protection. Until last week, the Pfizer vaccines were the main jabs being rolled out in South Africa — with just over 1.5-million people receiving their first shot. On Thursday, 300 000 Johnson & Johnson jabs arrived and this week Aspen Pharmacare will release an additional 1-million doses.  This follows delays in getting Johnson & Johnson jabs into the country, after some consignments were unusable because of low production standards. As a result, there is more pressure to increase the use South Africa gets out of the remaining vaccines in its arsenal.  We look at the evidence behind the three-week extension between doses, what this means for your follow-up appointment and how it could help alleviate the pressure on the country’s vaccine supply. What changed? The Pfizer vaccine was designed as a two-dose shot. The manufacturer recommended the jabs be spaced three weeks apart. When the vaccine was being tested in a clinical trial, the doses were given at this interval (the time between the shots). This means that the trials results — of 95% efficacy in preventing disease — only applied to the shots when used in this way. In fact, in a statement issued in March, Pfizer re-emphasised that its vaccine had not been studied using an extended dosing interval (or the time between the two shots) despite some governments deciding to recommend alternative spacing for the shots. But in light of restricted vaccine supplies and growing evidence to support a longer delay between doses, South Africa has opted to double the wait time between shots. This way, the country is able to give as many people as possible first doses straight away, so that they get at least partial protection against COVID. In a notice shared on 19 May by the health department’s director-general Sandile Buthelezi, the elongated time frame was attributed to “emerging evidence to support a 42-day interval between the first and second doses”. This also followed a recommendation from the ministerial advisory committee on COVID vaccines that the time between doses be extended if there was a shortage of jabs.  The new time frame applies to everyone who has received the shot — so even if you were vaccinated before 19 May (the day on which the circular was issued), your original follow-up appointment will be shifted by three weeks. People who were previously told to return for their second dose after 21 days, will receive an electronic vaccination data system (EVDS) notification in the form of an SMS about the new timeline. Messages with the date of appointments for second doses are, however, only sent out three days in advance. Waiting to give people the details for their appointment allows for more vaccination sites to come online, which means people can then be allocated to places that require less travel and can reduce the time it takes to get your jab, explains Milani Wolmarans, acting chief operating officer in the health department. South Africa began phase two of its national vaccine roll-out on 17 May, so the first people will return to be fully immunised with the second shot of the Pfizer jab on 28 June. A gamble that paid off: Why some countries changed policy without science Despite the vaccine only being formally tested with a 21-day gap between doses, some countries decided to deviate from this plan. Although not as extreme as other countries in their approach, the United States Centres for Disease Control and Prevention (CDC) has made allowance for the doses to be given a maximum of 42 days apart. This aligns with the updated guidance from South Africa’s health department. Given the limited evidence available, the CDC recommends that the doses be given “as close to the recommended interval of three weeks as possible”. But when it is not possible for someone to receive their second dose within 21 days, the guidance allows for a delay of up to six weeks. On the other hand, in December last year the United Kingdom began giving people their second Pfizer jab after 84 days. There was no data to back up the change in the Pfizer dosing interval at the time. The chief executives of the United Kingdom’s National Health Service (NHS) gave this explanation for their decision in a December 2020 letter to NHS staff: “Prioritising the first doses of vaccine for as many people as possible on the priority list will protect the greatest number of at risk people overall in the shortest possible time and will have the greatest impact on reducing mortality, severe disease and hospitalisations and in protecting the NHS and equivalent health services.” Six months later, Northern Ireland, a constituent of the United Kingdom, recommended the two jabs be given a maximum of eight weeks apart instead of 12 weeks. The country’s health department says the recommendation to shorten the dosing interval is a move to help protect more people from the virus, especially in light of rising infections caused by the Delta variant (first identified in India). The United Kingdom is not alone in its decision. Canada, similarly, opted to delay the roll-out of second doses so that more people can get their first dose while more vaccines are on the way. Canada’s national advisory committee on immunisation recommended the dosing interval be extended to four months between shots. What does the research say? A May preprint study was the first research to directly compare the strength of people’s immune responses after receiving the second dose of Pfizer after three weeks and after 12 weeks (84 days).  Participants on the extended dosing interval had a much stronger immune response than those on the standard three-week interval. Those who got their jabs 12 weeks apart had more than triple (3.5 times) as many antibodies in their blood than those who were immunised three weeks apart. Antibodies are proteins that help the body fight harmful pathogens such as viruses.  The small study included 172 participants all over the age of 80.  Ninety-nine participants got their second jab at three weeks, while the remaining 73 participants received their second shot 12 weeks later.  An earlier paper, published in Plos Biology in April found that delaying the second dose of the Pfizer vaccine to 12 weeks prevented more hospitalisations and deaths when compared with a three-week interval. Although the paper points out that when compared to the Moderna — the other mRNA COVID vaccine — a shorter delay of between six to 12 weeks between Pfizer doses can yield greater results in terms of reducing hospitalisations and deaths. This finding, however, relies on how long immunity lasts after the first dose.  The researchers studied two hypothetical scenarios, one in which immunity drops before the second dose, and one in which it doesn’t.  In the best case scenario where immunity doesn’t wane before the second dose, there were fewer infections, hospitalisations and deaths. In the worst case scenario, the benefit of delaying the second dose was far lower since fewer infections, hospitalisations and deaths were prevented.  The decrease in hospitalisations and deaths were based on the assumption that every day, 30 people were being vaccinated for every 10 000 people in the population. The researchers argue that as immunisation programmes speed up and more people get the jab each day, the same reduction of deaths and hospitalisation would be achieved with a shorter interval. Similar mathematical modelling done in Canada in an April preprint study compared dosing intervals of three and four months to a baseline of six weeks between jabs. The paper found that by extending the time between shots up to four months, there was a greater reduction in severe disease. Ultimately, the projections showed that for older people (those above 75) the ideal gap between doses was 16 weeks (four months). While a longer time frame of six months was actually able to offer more protection for people between the ages of 20 and 74 years old. This paper echoes the Plos Biology study in that it also found that it was more beneficial to extend the gap between doses when there is limited access to vaccines, because it allows for more people to be at least partially immunised over a shorter period of time. + posts Aisha Abdool Karim is a senior health reporter at Bhekisisa. + posts Joan van Dyk is a senior health journalist at Bhekisisa.
What is the Limit to a Black Hole’s Size? There is no known limit. It is possible that in trillions of years when we don’t exist, there will be a merger of millions of super massive black holes that reaches some physical limit and they “super nova” or make a new “big bang” or something. But logically, the gravity of a black hole is such that no other forces can do anything but comply. As gravity grows stronger it really just becomes gravity and matter-energy that are relevant. All the other forces can bugger off for all a black hole cares. Which is weird since gravity is technically the weakest force of them all. But, what is the limit to this run-away gravitational phenomenon? It’s unknown. Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
The charge and colour upon a shield is the same for all descendants of the original bearer, but crests and mottoes have varied with different branches of the same family. An armigerous person, or one entitled to bear arms, can adopt any crest or motto he chooses without a grant from his sovereign. But a shield used without a grant comes under the head of those " bogus arms " which excite the derision of all heralds. The laws of heraldry are slightly different in different countries. Thus, in England all the descendants of an armigerous person are entitled to bear his arms; whereas in Scotland his eldest son alone is presumed to do so, and his younger sons must have a fresh grant, or as it is called, " matriculate their arms," at the Lyon Office. Comparatively few Scottish families take the trouble to do this, and therefore a great majority of the arms used by Scotsmen must, however, reluctantly be characterised as " bogus." A bachelor bears his father's arms covering the whole shield. A married man divides his shield in half, and bears on one side of the line his own arms, and on the other side the arms of his wife, which is called impaling. If he has had more than one wife, he has to place their arms one above the other on their half of his shield; or, if he chooses, he can use as many shields as he has had wives, each with a separate wife's arms impaled with his; but this is very cumbersome.
Love thy neighbor A lesson from Martin Luther King Jr. Stephen M., Staff Writer Martin Luther King Jr., one of the most influential and inspiring members of the Civil Rights Movement in America during the 1950s and 60s, was able to persevere through perhaps some of the darkest times in the United States by meeting chaos with peace, and spite with love. The entirety of the past year can be summed up in one word: turmoil. America has seen anger, uncertainty, and above all, spite.  With a new administration taking power in the White House, the constant debate over politics, and protests that shook the nation for months on end, it seems as though America has never been this divided before. However, even with this turmoil, everyone in this country can still unify as a nation and start anew with a path in which Americans stand united. After all, that is the first word in our country’s name. Although, not everyone is that open to this idea, whether it be the pride some people feel or the unwillingness to accept new ideas. Regardless,  it is vital that Americans lend their ears to one another and maintain an open mind. It was recently that Martin Luther King Jr.’s day passed. Americans must take inspiration from his life’s work.   Through the toughest and darkest of times, Dr. King was able to strive for reconciliation in a time in which spite in America was at an all-time high. Through conveying dignity towards the people that disagreed with him, and having the power to listen to the opinions of others respectfully, Dr. King was able to strive for love while others decided to strive for hatred. Anyone can take these lessons, learn from them, and unify in a way just like he did. Thus, this is one of the most important factors to consider as all Americans try to bind our nation’s wounds and start seeing eye to eye again. The ability to listen to one another with respect and an open mind can have an extraordinary impact on not only our country but our families, our communities, and so many other areas.  “I think that it starts with listening to one another. We need to listen to the ideas, the opinions, and the experiences of people that are different from ourselves. We need to listen to the ideas that we do not necessarily agree with, and not listen to them so that we can look to refute them, but listen to them so that we can understand what their context is and why people feel the way that they do,” said social studies teacher Richard Suchopar.  As stated, Americans must maintain an open mind and try our hardest to put ourselves in the other person’s shoes to understand the other person’s feelings. With this, everyone in America can hopefully unite together, just as Dr. King did over half a century ago.  These ideas of division in our country and community, and the hatred that one side feels towards the other harm the nation as a whole.  Please think of the United States of America as a house. As Abraham Lincoln once said, “ a house divided against itself cannot stand.” Therefore, no matter the difficulty or ease America may experience, everyone in this country must welcome one another and listen to each other. If all Americans do this, there is no telling the unity that our families, our community, and our country can experience. Even if all is not okay right now, and our country is shrouded in uncertainty, it is a great comfort to know that, in the end, there is light in the darkness. Perhaps everyone in the United States, united as one people, can be that light and overcome said darkness that our country is submerged in. 🔳
Monday, Jan. 07, 1991 Helmut Kohl Dreams, like revolutions, have the power to galvanize wildly disparate forces. The dream of a unified Germany, so long as it seemed unattainable, commanded the West's official support for decades. But when the Berlin Wall crashed down in November 1989, NATO's decades of pro forma unanimity also tumbled — into confusion, hesitancy and doubt. Of all the European leaders, one man read the moment and seized it. Helmut Kohl, the consistently underestimated master of German domestic politics, knew instinctively that the communist regime in East Berlin was kaput. He saw that unification of Germany and the mending of Europe were now within reach. He set to work, overcame every objection and obstacle, and in December's all-German election became, literally, the unification Chancellor. At first his obstacles included not only anxieties in Britain, France and the Soviet Union but the mood in East Germany as well. The peaceful revolution had been led mostly by intellectuals, members of the clergy and students who believed their state should become democratic but remain socialist and separate from West Germany. As an initial response, Kohl proposed a federation of the two German states. That was his only stab at a go-slow approach, and events quickly swept it aside. East Germans demonstrated their rejection of half measures by surging into West Germany: 340,000 in 1989 and more than 300,000 in 1990. Kohl headed the other way, wading into East German politics with a clear-cut promise: a vote for his Christian Democratic Union was a vote for unification. In March his conservative coalition won by a landslide in East Germany's first free elections. While Kohl was still viewed by many as a provincial politician, he proved to be a diplomatic whiz. His biggest problem of all remained Moscow. The Soviets, who make a cult of memorializing World War II, resolutely opposed German unity. After a visit from Kohl in February, however, President Mikhail Gorbachev modified his position, conceding that unification was Germany's right, but not immediately and not inside the NATO alliance. Unperturbed, Kohl flew back to the Soviet Union in mid-July and went hiking in the Caucasus with Gorbachev. The two leaders were downright jovial as they announced that the united Germany would enjoy full sovereignty, including the right to join NATO. Kohl had not depended entirely on persuasion to bring Gorbachev around; he also agreed to pay most of the tab for a package of joint projects. Now that Kohl's triumph is complete and he has won a new four-year mandate as Chancellor of the united Germany, he still cannot sit back and enjoy it. Like most visionary projects, German unification will cost much more than the original estimates, requiring hundreds of billions of deutsche marks to modernize the five states newly added to Germany. This means increasing budget deficits and possibly new taxes. Germany also feels it must support the economic and political development of Central and Eastern Europe, which remain perilously unstable. That task, far too big for Germany alone, will require a major effort from the whole European Community. By bringing Western Europe to the aid of the East, Kohl continues to help the Continent mend its divisions.
The perception of pain is a significant one. It will alert you of a possible disease or accident that needs to be treated.  Understanding And Increasing: The Mechanism Of Pain Tolerance When you experience discomfort, nearby nerves relay impulses to your brain through the spinal cord. This signal is interpreted by the brain as a symptom of discomfort and may trigger defensive reflexes. For e.g., when you hit something very hot, your brain receives pain signals. As a result, you can instinctively pull your hand away without even trying. Understanding And Increasing: The Mechanism Of Pain Tolerance Pain threshold and tolerance Pain can manifest itself through a variety of stimuli, such as a fire, joint ache, or throbbing headache. The highest level of pain you can tolerate is referred to as the pain threshold. This is not the same as pain tolerance.  Pain tolerance is the lowest point at which anything causes you pain, such as pressure or fire. Someone with lower pain tolerance, for example, can experience pain even though only light pressure is applied to a part of their body. Factors responsible for high pain threshold  The tolerance and threshold for pain vary from person to person. Both rely on intricate connections between the nerves and the brain.  Many factors may have an effect on the intricate mechanism of connectivity between the brain and body. • Genetics- The study in genetics. According to research, your genes will influence how you feel pain. Your biology can also have an impact on how you respond to pain drugs.  • Age – is a factor. The pain tolerance of the elderly can be greater. More analysis is needed to determine why.  • Gender – Females experience longer-lasting and more intense pain thresholds than males do for unexplained reasons. • Comorbidity – Illness that lasts. A chronic disease, such as migraines or fibromyalgia, can alter the pain threshold over time.  • Psychiatric illness – Illness of the mind. People suffering from depression or panic disorder are more likely to experience pain.  • Anxiety – Pain will become more serious when you are under a lot of stress.  • Isolation from others – Social isolation can amplify your pain perception and reduce your pain tolerance. • Previous experience – Your pain threshold can be influenced by your past pain perceptions. People who are frequently subject to severe temperatures, for example, can have a greater pain threshold than others. People who have had a poor experience at the dentist, on the other hand, can have a high pain reaction to very mild operations on subsequent visits. • Assumptions – Your childhood and acquired coping skills will influence how you feel and respond to a traumatic experience. Assessing the pain threshold • Dolorimetry: To measure pain threshold and pain perception, dolorimetry employs a device known as a dolorimeter. There are several varieties of instruments based on the type of stimuli used. Most dolorimeters stimulate different areas of the body with heat, vibration, or electrical stimulation as you report your pain level. • Cold pressor test: One of the most common methods of measuring pain resistance is the cold pressor test. It entails immersing your hand in an ice-cold bucket of water. When you begin to experience discomfort, you will notify whoever is conducting the test. The period of time between the start of the exam and your initial report of pain determines your pain tolerance.  • You should withdraw your hand if the discomfort becomes intense. The time elapsed between the start of the exam and the removal of your hand is used to calculate your pain threshold. • Questionnaires: Doctors often use written questionnaires or scales to help them consider someone’s pain level and how effective those pain medications are going. They can also be used to monitor how a person’s pain threshold evolves over time. 1. McGill Pain Questionnaire  2. Brief Pain Inventory questionnaire 3. Oswestry Disability Index questionnaire  4. Wong-Baker FACES pain rating scale  5. Visual analog scale Methods – Increasing Pain tolerance. • Yoga: Yoga combines physical postures with breathing movements, meditation, and mental conditioning. According to a 2014 report, people who frequently practice yoga can bear more pain than someone who does not. Yoga practitioners also tended to have more grey matter in areas of the brain associated with pain perception, pain control, and concentration. • Aerobic activity: Physical activity, especially aerobic exercise, can also improve pain tolerance and reduce pain perception. A mild to intensive cycling regimen, for example, was found to greatly improve pain resistance in one study. It has little effect on the pain threshold, however. • Being vocal: When you’re in agony, just saying “ouch” will have a significant impact on how you feel. Participants in a 2015 analysis were subjected to a cold pressor examination. Some were told to say “oww” when submerging their side, while others were told to do nothing. Those who expressed their discomfort verbally seemed to have a greater pain threshold. • Visualization: You can even see yourself in a relaxing, warm bath. Visualize the body calming. To get the most out of the imagery, try to be as detailed as possible. • Biofeedback: this is a form of therapy that lets you become more conscious of how the body reacts to stressors and other stimuli. This requires discomfort. A psychiatrist will show you how to use relaxation methods, breathing exercises, and behavioral exercises to override the body’s reaction to discomfort or pain during a biofeedback session.
The US has left the Paris Climate Agreement, while other countries have strengthened their commitments On November 4th, a day after Election day, the US has officially withdrawn from the Paris Climate Agreement, as promised by President Trump since the beginning of its mandate. This act comes after the Trump administration has rolled back nearly 100 environmental commitments and regulations during the last four years. Contrarily to the United States, China, Japan, South Korea and the European Union have recently strengthened their commitments in the fight against climate change. Donald Trump announces that the US will withdraw from the Paris Agreement, June 1, 2017. (Reuters / Kevin Lamarque) On November 4, 2020, the United States has officially quit the Paris Agreement on Climate Change, exactly a year after the Trump administration started the withdrawal process from the accord. The formal withdrawal from the Paris Agreement comes in line with President Trump’s clear intentions to remove the US from the agreement, as he has been declaring since the beginning of his mandate in 2017. He has, in fact, defined the global climate accord as “job-killing” and that it “punishes the American people while enriching foreign polluters”. However, this act has not come in isolation, during the last four years the Trump administration has dismantled nearly 100 environmental commitments and regulations (as we have discussed in this previous post: Currently, of the 195 countries that signed the Paris Agreement, 189 went on to formally adopt the accord. Among those that have not formally adopted the agreement, now together with the US, there are Angola, Eritrea, Iran, Iraq, South Sudan, Turkey and Yemen. While the US now represents around 15% of carbon emissions globally, it is the world’s biggest and most powerful economy, meaning that by withdrawing from this global agreement, it creates trust issues and might induce other countries to do the same. Contrarily to the US, which is become the first country to ever formally quit the global agreement, other countries have stepped up their commitment to fighting climate change. China committed to becoming carbon neutral by 2060, and South Korea and Japan both declared committing to reach carbon neutrality by 2050. The European Union last month committed to cut carbon emissions by 60% by 2030 and to make all member states carbon neutral by 2050 (read this post to find out more: According to Carbon Brief, a climate analysis site, these commitments only put nearly half of the world’s carbon dioxide emissions under net-zero emissions targets. The withdrawal from the Paris Agreement is not final, in the future the United States can opt back in. However, that will definitely depend on the results of the present 2020 Presidential election. At the moment, the United States is almost halfway in reaching, by 2025, a cut in emissions of 28% below 2005 levels, as set by former President Obama in Paris. Therefore, the country would have to set an emissions-cutting target even more ambitious than that in case it rejoins the Paris Agreement. For further information, see the following links:
Propaganda Summary: 10 Best Lessons from Edward Bernays Quick Summary: Propaganda is controlling how the public SEES a business, group or idea. Edward Bernays says understanding propaganda will help you better understand democracy and human nature. And you'll learn to USE propaganda to spread your ideas and build a professional reputation to attract more business. In 1928 when this book was written, most people didn’t understand human psychology. One man who did understand it was Sigmund Freud. You’ve probably heard his name before. Freud was the creator of modern psychology. His ideas about people’s deepest motivations, fears, and desires shook the world and still echo today. And guess what? The author of this book was Sigmund Freud’s nephew! I’m sure this is no coincidence. Edward Bernays took his uncle’s deep understanding of human nature and made it practical. Edward Bernays is now known as the father of public relations. Public relations (or PR) is about creating understanding between the public and an idea, group or business. Today, we all know that large companies have a PR department. We know that politicians fight a war of propaganda every election. And today, you will learn some of the hidden secrets to creating both effective propaganda and public relations. 1. What is Propaganda? When you hear the word “propaganda,” what do you think of? I bet you think of World War 2 and the posters that were used by Hitler to spread evil ideas. The Nazis in Germany wanted to spread the idea that Jewish people were inferior and parasites on society. So they designed posters that presented Jewish people as sneaky and rat-like or sick-looking fat bankers. Nazi propaganda about Jewish people On the other hand, other posters showed an ideal person in the eyes of the Nazis. Someone with blond hair, blue eyes, vibrant, strong and healthy. This is what Hitler called the “Aryans” or the “Master Race.” (It’s ironic that Hitler himself did not measure up to this perfect image, seeing as he had black hair and brown eyes.) But it wasn’t just the Nazis who used propaganda. The communists in Russia and Fascists in Italy were using it, too. And across the sea, American posters were also being painted. These posters sparked patriotic emotions inside American hearts and stirred hatred of the enemy. They painted images of good vs evil, with America as good. For example, this poster shows an American eagle attacking a snake which represents Japan. We’ll talk more about why this is effective propaganda in a moment… american japanese propaganda Edward Bernays defines public relations as an organized effort to create understanding between the public and some business, idea or group. And… The mother of public relations is propaganda. Propaganda is about creating images in the minds of millions of people at the same time. How do you do that? Well, first you must deeply understand how people work. 2. Mass Reactions: If Human Reactions Can Be Predicted, They Can Be Manipulated People’s reactions and emotions are often predictableThis means if you put the right stimulus in front of millions of people, most of them will have the same reaction. Here’s one simple example… People are disgusted by rats and bugs. They always have been and they probably always will be. It’s just built into our biology. Rats and bugs can carry diseases so we need to stay away from them. This also means that people will automatically feel disgusted if they see an image of a rat or bug in propaganda. And the Nazis used these images very effectively. They painted Jews beside rats or Jews as rat-like humans so that people would start to associate disgust with Jewish people. In his speeches, when Hitler was talking about Jewish people, he always used words related to bugs, pests, and parasites to describe them… something that crawls over your skin and infects you from the inside. You can read this excellent article about Hitler and disgust or watch the short video below from psychology professor Jordan Peterson: Another example… People naturally hate snakes. We are afraid of them and want to get rid of them. That’s why snakes are used so often to represent the enemy. In the Bible, the ultimate enemy Satan shows up as a snake. That’s no accident. The lesson from all this is clear… If you want to produce a mass reactions in people’s minds, then you must take advantage of their existing emotional habits and mental cliches. If you want people to see someone as powerful, strong and visionary, then use a symbol people already associate with those qualities like an eagle or a lion. 3. The Invisible Government Democracy is a strange new invention. Think about it. Anybody and everybody can decide how to manage the country. Doesn’t it seem strange that millions of people who have never opened an economics book will decide how to manage the economy? The fact is, every country is a machine that is too complicated for the average person to understand. The average person simply doesn’t have time to study economic, political and ethical issues in depth. So we need someone else to highlight the most important issues for us. This makes the voting decision much easier. Edward Bernays calls the people who bring issues to the public attention The Invisible Government. Here’s another quote: That quote may sound shocking and the idea of an “Invisible Government” may be scary, but Bernays is simply describing how any democracy works. There are a group of people who direct the minds of most of the public. These are the politicians, journalists, religious leaders, and other influencers. Every election is a free and open competition of ideas. This means the real people in power are those who know how to get public acceptance for their ideas. The invisible government shows people which issues are important and which direction is right. 4. How Public Relations Started Edward Bernays knew the same propaganda techniques used by governments in World War 2 could also be used by businesses. He knew a business with a good public relationship and reputation would be more successful. But the word “propaganda” was way too negative, even back then, so Bernays created the term “public relations.” Public relations has grown because life is more and more complex. When you walk into a store today to buy toothpaste, you have dozens of choices. How do you know which one is good? That’s where public relations can help you choose. So what would be a good public relations strategy for a toothpaste company? Well, it’s all about creating understanding. If you sell the best toothpaste, then you have to educate the public as to WHY your toothpaste is the best: • Maybe you can teach them what toothpaste ingredients are important for healthy teeth. • Maybe you can share the fact that most dentists recommend a certain brand of toothpaste. If you do have the product that is best for people, then this type of education will create more customers for you. And this propaganda can be spread not just through advertising, but also through dental clinics, schools, etc. Public relations is important because life is more complex than ever. Again, by public relations, we mean creating understanding between the public and some business, group or idea. It’s not about deceiving people, but educating them WHY your product is best. 5. Sell What You Stand For Today, it’s not enough to sell your product to the public. Almost every product has dozens or hundreds of competitors. This is especially true online. To stand out from the competition, a business now must also sell itself to the public and all the things it stands for. People are more likely to buy from a company when they see it matches their own values. That’s why you now see so many big brands being environmentally friendly and giving back to the community by sponsoring charities and events. A few years ago, Nike had a scandal that exposed the bad conditions at some of their factories. People protested and wrote bad articles about Nike in the press. The word “Nike” started to be connected with the word “sweatshop” in people’s minds. Sales dipped because most people don’t want to be associated with a company that uses sweatshops. But the scandal had a positive outcome, it caused Nike to make changes to improve the conditions in many of their factories. (To learn more about the Nike success story, see my notes on the book Shoe Dog, written by the founder of Nike.) With hundreds of choices at the store today, customers are becoming more and more selective. They don’t just want to buy a quality product, they want to do business with ethical companies who share their values. 6. High-Spotting: Focus People’s Attention on your Best Product or Feature Bernays says there are two methods for effective public relations. The first method he calls continuous interpretation, which is trying to control every detail the public sees about your company. The second method he calls high-spotting and here is how he describes it: High-spotting […] vividly seizes the attention of the public and fixes it upon some detail or aspect which is typical of the entire enterprise. When a real estate corporation which is erecting a tall office building makes it ten feet taller than the highest skyscraper in existence, that is dramatization. (emphasis added) Donald Trump experienced the power of high-spotting first-hand when he announced a new development of his in the 1980’s that included the world’s tallest building. Trump’s project included a lot of other impressive buildings and features, but all people wanted to talk about was the world’s tallest building. It was a powerful symbol that gave the project a mystique that captivated people. Here’s another example of high-spotting… Blendtec makes a very powerful blender. And to highlight the strength of their blenders, they created a series of Youtube videos called “Will it Blend?” In these videos, they blend everything from iPhones to DVDs to golf balls. People watch the videos because of curiosity, but they leave with the impression that Blendtec makes powerful products. After all, they can blend anything! And the proof is in the results. Since launching this video series, sales at Blendtec have gone up 700%! You can read more about Blendtec’s marketing story in my note on the great book Contagious. The Halo Effect in marketing Have you ever heard of the Halo Effect? It means that one good quality about a person can cast a “halo” around the whole person. For example, studies have shown that people usually judge attractive people as more intelligent. Their good looks cast a halo and people assume they have other positive qualities, too. I’m sure it’s clear how “High-Spotting” and “The Halo Effect” are almost the same idea. Here’s how the Halo Effect also applies to marketing your products… Apple became a huge success because of its breakthrough the iPod. When the iPod became a hit about 10 years ago it captured 73.9% market share. A staggering piece of the digital music pie. Nobody could even remember who was second place. Well, a surprising thing happened. The incredible success of their iPod also caused Apple’s computer sales to increase dramatically. In 2005 alone computer sales jumped 68% from the last year. And Apple had spent almost no money advertising their computers! Their marketing budget was all spent on their iPods. The marketing expert Al Ries says this is an example of “The Halo Effect” in action. People love Apple’s iPods. iPods are cool, new, modern and sexy. So People started to see Apple’s computers in a more positive way also. Al Ries says if you have one product that is a big hit, then it makes sense to “put your money on your best horse” so to speak. Spread the message about your best product far and wide, and your other products will benefit as well. “High Spotting” or “The Halo Effect” is a powerful way to spread a positive impression of your products. Choose your most popular product and market the hell out of it like Apple. Or find one feature that is really good, and create a dramatic demonstration to fix people’s attention on that feature like Blendtec. 7. The Age of Followers: To Influence Someone, Find Their Leader Three hundred years ago, people lived in villages and they exchanged ideas by talking to each other. Communities were local and geographic. The leader of the community may have been the local priest. Today ideas can be exchanged over any distance. There are magazines, newspapers, and TV shows. Most importantly, the internet now means you can exchange ideas with other people instantly. This means today people can be part of the same community or group even if they live far apart. Bernays says to create effective propaganda, you must think of society not only as individuals. You have to see it as a collection of overlapping groups. Each individual is a loyal member or follower of a few social groups. He may belong to a political organization, a religious organization, a professional organization related to his career. His groups can also include the people who share his important hobbies and interests. People are similar to fellow group members Why is understanding groups important? Because although every person is an individual, they are also very similar to their fellow group members. For example, people who go to the same church will share many of the same political positions and beliefs about what it means to be a good person and live a good life. So when you understand the values, motivations, and feelings of one member of a social group, then you will better understand every member of the group. You will know where their sensitive spots and hot buttons. You will be able to connect with them on a deep level. You will also know who their leader is Each social group has a leader at the top. Two psychologists called Trotter and Le Bon found that when people are in a group, their first impulse is to follow the example of a trusted leader. Every country has a president or prime minister. Every state or province has a leader. Every city has a mayor. The Catholic Church has the Pope. Tibetan Buddhists have the Dalai Lama. And each individual church and temple has their own local leader, too. Christian priests, Jewish Rabbis, Muslim Imams and Hindu Archakas. Every sports team has a captain. Every office has a boss. Every company has a CEO. It’s almost like people can’t create a group without at the same time creating a leader. And this is important because the leader of a group holds the key to influencing the entire group. As Bernays puts it: “Influencer Marketing” Have you heard of the term “influencer marketing.” A lot of popular social media experts talk about this as if it is a new idea. But in this 100-year-old book, Edward Bernays is talking about the same idea! In a nutshell, influencer marketing is about finding people who have a large audience and getting them to recommend a product to their audience. For example, Oprah Winfrey has one of the most popular TV talk shows. She also has a book club that her biggest fans join. And when Oprah recommends a book to her book club, it is guaranteed to become a bestseller. That is how strong her influence is with the tens of millions of women who watch her show daily. Now with the internet, anyone who can build an audience is an influencer. The internet has made the cost of building and reaching an audience free. Youtube, Facebook, and blogging are all free. Some girls who start Youtube channels about makeup tutorials can get millions of views. And a makeup company can pay the girl to try or recommend their product. Here are a few successful examples of this kind of marketing. But influencers have existed for a long time before the internet. For example, there was a popular actress at the time called Irene Castle. And when she suddenly cut her hair short, many women around the world followed because they were admirers and followers of the actress. Or, if you want to sell more bacon, don’t tell people how great bacon is. Instead, ask yourself, “who already influences the eating habits of people?” And you’d probably think of doctors. So the real challenge is how to get doctors to publicly recommend eating bacon. Edward Bernays said selling is not convincing people your product is the best, but finding out who already influences the group you want to reach, then getting that leader to use or recommend your product. 100 years ago he called this “the new salesmanship.” Now it is called “influencer marketing.” 8. How Design, Fashion & Aesthetics Give Modern Companies an Unfair Advantage A hundred years ago, a product could get national recognition just by getting onto store shelves. The real challenge was convincing retailers to display your products on store shelves, which is why most manufacturers had squads of traveling salesmen. But today getting recognition is much more difficult. Today a business doesn’t just need to get a product on store shelves, it needs to convince people to choose the product instead of a dozen competitors. And there’s so much advertising and noise out there. So the real challenge is… How can you make people desire your product more than your competitor’s product? One way to increase demand is by making your product cheaper, but that can soon put you out of business because your profit margins become razor thin. Bernays says a better way to stand out is to build aesthetics, style or fashion into your product. Small differences in a product can become very important if it is seen as a matter of style. A small difference in the cut or color of a dress will decide if it sells well this year. Let’s take another look at Apple. They didn’t create more powerful computers or cheaper phones. They created devices that win at design. They are beautiful to look at and hold, which is why I’m writing this on a MacBook Pro right now. These aesthetic qualities of their products set them apart from the competition. Their competition who until recently always created ugly, boxy electronics. It’s the same reason people buy one car brand over another or one pair of shoes over another. Here’s a very important quote that you should take a moment to let it sink in: A thing may be desired not for its intrinsic worth or usefulness but because (someone) has unconsciously come to see in it a symbol of something else, the desire for which he is ashamed to admit to himself. Building style or beauty into your products will help you stand out from the competition. And propaganda can help people understand what is and is not beautiful. That’s exactly what fashion critics or taste leaders do. 9. How Is Propaganda Spread? When most of us hear “Propaganda,” we probably think of those WW2 posters from the beginning of this article, but Bernays says that any form of communication can be used for propaganda. He says 100 years ago, the best place to spread propaganda was in a public meeting. These were very popular with local communities. But people stopped going to these meetings after the automobile, radio, and newspaper became popular. They would rather get their news from the radio or newspaper. Magazines were, and still are, very effective at spreading ideas because they are focused. Each magazine is dedicated to promoting some idea, whether that is health, women’s fashion or philosophy. Magazines deliberately selecting only material that promotes a specific idea. Bernays also says movies are a powerful and sneaky form of propaganda: Movies are powerful because they tell stories. A story has a hero, who is somebody people admire and unconsciously follow. So whenever possible use storytelling in your marketing. Propaganda is always an organized attempt to spread a particular idea or belief. The channels through which it is spread are constantly changing with technology. 10. Good Propaganda: Is There Such a Thing? Edward Bernays makes it clear that propaganda is not just evil brainwashing. He says: Propaganda is often used to educate people and improve society. There are many examples you will see daily: • When kids are learning about healthy eating in school, that’s propaganda. • When a TV ad is raising awareness and acceptance of mental health issues, that’s propaganda. • And long before women got the right to vote, people had to make the idea acceptable. Again, it’s a type of propaganda. Almost any movement for social progress tries to educate or enlighten the public mind, which is a type of propaganda. Edward Bernays was alive when propaganda was born. And he has carefully studied what makes propaganda effective, turning it into the new practice of public relations. We’ve shined a light on many of his best ideas, including: • How propaganda turned into public relations, • How people’s emotional reactions to things like rats and snakes were manipulated by the Nazis, • How an invisible government truly controls democracies, • Why you need to sell what you stand for, • Why influencer marketing is not a new thing and • How to beat competitors through aesthetics. Finally, we talked about how propaganda does not have to be evil. Any movement for social progress must educate people somehow and therefore use a type of propaganda. If you enjoyed this note, then I know you’ll also enjoy my note on the book “Contagious.” That book explains why some ideas become contagious and spread like a virus. It’s written by two top professors and I really recommend you check it out next. Photo Credit: Bundesarchiv, Bild 102-12407 / CC-BY-SA 3.0 [CC BY-SA 3.0 de], via Wikimedia Commons Share this: Sorry, some features are only for GrowthPLUS Members! Try 1 month for $1
How to Multiply Chinese Magnolia Chinese magnolia (Magnolia x soulangiana), also known as Saucer magnolia or Japanese magnolia, is a deciduous ornamental tree with multiple trunks that produces fragrant, attractive purple, pink or white flowers. Thriving in U.S. Department of Agriculture cold hardiness zones 5 through 9, Chinese magnolia trees can grow between 25 and 30 feet tall and live between 50 and 150 years. This variety of magnolia is named for its creator, Etiene Soulange-Boudin, who crossed parent variety Yulan magnolia (Magnolia heptapeta) with Magnolia liliiflora. Like other magnolia trees, Chinese magnolia can be propagated through softwood cuttings. Water the parent magnolia plant the night before taking cuttings to reduce stress on the plant. Clip 3 to 6 inch sections of softwood branch tips after flowering has finished. Strip the leaves from the bottom half of each section. Prepare 10 inch planting pots with coarse sand or vermiculite. Water the pots thoroughly before planting. Prepare the clipped end of each cutting by snipping away another small piece, creating a fresh surface. Immediately dip the cut end into hormone rooting powder. Plant the cuttings in the pots, at least 1 inch deep. Do not let the leaves touch the soil surface, or they may rot. Cover each pot with a large plastic zip bag to create a humid environment. Secure the bag with an elastic band and place the pots in indirect sunlight. Water the plants daily by removing the bags and misting the plants with a plastic spray bottle. Check for root growth after 5 to 6 weeks by tugging on the stems. Resistance indicates root growth. Remove the plastic bags once roots appear and transplant the cuttings into larger containers filled with potting soil. Transplant magnolias outdoors in the fall. Gradually acclimate them to the weather, leaving the plants outdoors for a few hours, for a few weeks before a permanent transplant.
Formal analysis of elizabeth murrays back Murray at work, Even this austere puritan, it turned out, respected the pizzazz of American culture. Formal analysis of elizabeth murrays back It ex- tends from 42 degrees of nortb latitude, to 54 degrees and 40 minutes, and from the Pacific eastward, five or six hundred miles, to tbe ridges of the Rocky or Oregon mountains. The name is taken from the river which, long before its actual discovery, had been supposed to exist beyond tbe mountains, and which was first called the Oregon by Jonathan Carver of Connecticut, who travelled in the interi- or of the continent in How he got the name, or whether he invented it himself, it is impossible, at the present day, to determine. The stream was not actually seen tillmany persons until then believing it to be fabulous. The name, however, remained, and is now not only applied to the country from which its waters are gathered, but, as the name of the river itself, is in Married to immortal verse, The continuous woods Where rolls the Oregon, and hears no sound, Save his own dashings. This country is traversed by ridges of lofty mountains. The shores are bold and high; in many parts, moun- tains rising immediately from the sea. Up to the 48th parallel there are few inlets, or islands, but further north there are thousands of islands, and a net-work of bays and peninsulas. The valleys of the interior are generally narrow. The climate is drier and milder by many degrees than on the Atlantic side in the same latitudes. Of the soil, different accounts have been given, some repre- senting it as fertile, and others as of little value. The most valuable portion of it undoubtedly lies south of the river, though by far the best part of the territory, for its harbors and maritime advantages, lies around the strait of Fuca. To us as a trading power on the Pacific, these are invaluable. Until within a few years there have been but scanty settlements ; a few trading posts and missionary stations. But the tide of American emigration has lately set in that direction, and no- thing but some fatal misstep on our part, can prevent its habitable portions being occupied in a few years by our country- men, and a vast trade thence carried on over all the Pacific. That the discovery of a river is and other nations. That all treaties and engagements late declarations of the English minis- between governments, of an executory try, there remains no arbitrament but nature, are annulled by a subsequent the sword. It is difficult, however, to war. Formal analysis of elizabeth murrays back The first their pretensions to the extent of a war, settlements in the new world were all while we are confident that our gov- made on its eastern shores. The Pacific eminent, in maintaining the rights ocean was discovered by Balboa at of America, will see the proprie- Panama in No person, however, ty of discussing them with moderation ventured to the north west coast as far as well as firmness, doing no act to as Oregon tillwhen Ferrelo, a pilot provoke, and sedulously abstaining from in the service of Spain, penetrated to even the appearance of disregarding the the latitude of Thirty-six years obligation of treaties. But while it afterwards, Drake made his famous does this, it has also a duty to perform voyage round the world, and it is main- to Americans. It is time that the inso- tamed by the English government that lence of Englishmen, now become he sailed as high on this coast as 48; but almost habitual, were rebuked. Let us while one account of his voyage has it indeed be just; let us appear just; and 48, the other has it 43; and there is good let England and consequences take reason to think that this last account is care of themselves, the true one. The discrepancy in the That we may present a concise as two accounts destroys their value as well as a just view of the real merits of evidence, and no reasonable person this question of the Oregon, we shall en- would think of resting any title upon deavor to condense into as small a space them. Drake did not land on any as possible the grounds, both of fact, part of this coast, and from that and of public law, on which our rights period for about two hundred years no are founded. In doing this we shall Englishman visited it. Formal analysis of elizabeth murrays back In that 1. That in respect to newly discov- great navigator sailed along the coast, ered countries, the first discoverer has particularly examining the upper parts the prior right to occupy, provided he near the 47th and 48th parallels,and stop- does so within a reasonable time. Afterwards the What is a reasonable time depends coast was frequently visited by the vessels upon the nature of the country, the of the different maritime nations. The uses to which it may be applied, and riverremained undiscovered. Vancouver the wants of mankind in respect to it. Gray, an American, in the not rightfully prevent other nations from American ship Columbia, however, dis- occupying and cultivating it if he did not covered it on the 11th of May,and see fit soon to do so himself. If on the sailed into it a considerable distance. That if the first discoverer does in run along the shore, and on the not occupy within this reasonable time, 15th of August, at six in the evening, he is deemed to have abandoned his arrived opposite a bay in the latitude of right, and the next discoverer stands as 46 degrees 17 minutes, where the if he had been the first, and so on currents and eddies were so strong that. Sign up with e-mail These eddies and currents caused him to believe that the place is the mouth of some great river or of some passage to another sea. Notwithstanding the great difference between the position of this bay and that mentioned by De Fuca, he had little difficulty in con- cluding they might be the same. He found it difficult on the following morn- ing to enter, and continued his voyage towards the south. This does not appear to us to be a discovery of the river, or what was equivalent to it. The other remarkable places on the coast are the Strait of Fuca, and Nootka Sound. The former was discovered by De Fuca, a Greek pilot, in the service of Spain, in The first visits to this country, overland, were made, one by McKenzie, in the English service, from Canada, crossing the Rocky mountains to the north of the head waters of the Columbia, inand passing to the sea in the parallel ofthe other by Lewis and Clarke, in the American service, who traversed the greater part of the Oregon region inand explored the river from its source to its mouth.The go-to-hell prep kids later got their original idea from golf clubs and their humorously decorated/colored pants, which by the mid ’s was a common sight (and something Jimmy had . Elizabeth Murray was born in Chicago, Illinois in She was a well known artist and painter as well. She studied at the Art Institute of Chicago. Famous for her extraordinary creativity and intelligence in the field of painting and sculpture, her works have been exhibited in major museums in the United States. Find the latest shows, biography, and artworks for sale by Elizabeth Murray. Inspired by Abstract Expressionist Jackson Pollock’s work, as well as Pablo Pica Nationality: American. [July, needed to beat back the impious heresies which began to show themselves. The support which Plato gave to Moses and to Christ was enough to convince the more pious and en- lightened minds. But the unity of the Church was, even thus early, marred by schism. repeats a formal element such as line, shape, or color throughout a composition What aspect of Elizabeth Murray's "Just in Time" contributes to the sense of stylistic coherence? rounded lines run throughout the piece. An analysis of scale in Do-Ho Suh's "Public Figures" would be most likely to . July | | Camissa People
IASbaba’s TLP GS Mains 2017 [13th July]: Day 4 • July 13, 2017 • 0 IASbaba's Think Learn and Perform 2017, UPSC Mains Answer Writing Print Friendly, PDF & Email IASbaba’s TLP GS Mains 2017 [13th July]: Day 4 1. What are thunderstorms and tornadoes? How do they form? Explain. 2. Discuss the onset, progress and retreat of monsoon in India. Why there are breaks in monsoon? Why do they occur? 3. Vegetation of a region adapt to its climatic conditions. Illustrate with the help of suitable examples. 4. Discuss the advantages of GST. How does GST help in unifying the market in the country? Explain. 5. Youth radicalisation in the Kashmir valley is a serious national security threat. Comment. Search now.....
Coexistence of IEEE 802.11 and 802.15.4 ======================================= Goals ----- Different wireless technologies sometimes operate in the same frequency range. For example, both IEEE 802.11 and IEEE 802.15.4 have versions that use the 2.4 GHz ISM band. As such, the signals of the two protocols can interfere. This is called cross-technology interference, or CTI. INET has support for simulating CTI between any of its wireless protocol models. Simulation can be used to examine how the different protocols interact and affect each other's operation. This showcase demonstrates the coexistence of INET's 802.11 and 802.15.4 models. | INET version: ``4.2`` | Source files location: `inet/showcases/wireless/coexistence `__ The Model --------- We'll examine how CTI can be simulated, see if two interfering wireless technology models can cooperate, and if their cooperation is balanced. We'll run the example simulation with both 802.11 and 802.15.4 models present, and measure their performance. Also, to get a baseline of their performance, we'll run the simulation with both models, with just one of them present at a time. Then, we can compare the baseline performance of both models to their concurrent performance. The example simulation features a Wifi (802.11) and a WPAN (802.15.4) network close to each other. All nodes communicate in the 2.4 GHz band. The signals for the two wireless protocols have different center frequencies and bandwidths, but the signal spectra can overlap. In this showcase, we will configure the two networks to actually use overlapping channels. The channel spectra for both technologies are shown on the following image: .. figure:: media/channels.png :width: 100% :align: center For the WPAN, we'll use INET's 802.15.4 narrowband version, in which transmissions have a 2450 MHz carrier frequency and a 2.8 MHz bandwidth by default. For the Wifi, we'll use 802.11g, in which transmissions have a 20 MHz bandwidth. We'll leave the frequency and bandwidth of 802.15.4 on default, and we'll use Wifi Channel 9 (center frequency of 2452 MHz) so that the Wifi and WPAN transmission spectra overlap: .. figure:: media/channels8.png :width: 30% :align: center In INET, a radio signal, as a physical phenomenon, is represented by the analog model while it is being transmitted, propagated, and received. As the signal center frequencies and bandwidths of the 802.11 and 802.15.4 models are not identical, the dimensional analog model needs to be used, instead of the scalar analog model. The scalar analog model represents signals with a scalar signal power, and a constant center frequency and bandwidth. The scalar model can only handle situations when the spectra of two concurrent signals are identical or don't overlap at all. When using the dimensional analog model, signal power can change in both time and frequency; more realistic signal shapes can be specified. This model is also able to calculate the interference of signals whose spectra partially overlap. In order for the signals of Wifi and WPAN to interfere, the two networks have to share a radio medium module instance. The radio medium module keeps track of transmitters, receivers, transmissions and noise on the network, and computes signal and noise power at reception. The radio medium module has several submodules, such as signal propagation, path loss, background noise, and analog signal representation modules. (For more information, read the :doc:`corresponding section ` in the INET User's Guide.) The standard radio medium module in INET is :ned:`RadioMedium`. Wireless protocols in INET (such as 802.11 or 802.15.4) often have their own radio medium module types (e.g. :ned:`Ieee80211DimensionalRadioMedium`), but these modules are actually :ned:`RadioMedium`, just with different default parameterizations (each parameterized for its typical use case). For example, they might have different defaults for path loss type, background noise power, or analog signal representation type. However, setting these radio medium parameters are not required for the simulation to work. Most of the time, one could just use RadioMedium with its default parameters (with the exception of setting the analog signal representation type to dimensional when simulating CTI). For our simulation, we'll use :ned:`RadioMedium`. Since we'll have two different protocols, the analog model and the background noise of the radio medium and the protocol specific radios need to match (they need to be dimensional). We'll set just these two parameters, and leave the others on default. In INET, different types of radio modules (e.g. 802.11 and 802.15.4) can detect each other's transmissions, but can only receive transmissions of their own type. Transmissions belonging to the other technology appear to receivers as noise. However, this noise can be strong enough to make a node defer from transmitting. As such, the fact that a radio treats transmissions it cannot receive as noise is the mechanism that allows any wireless protocol models to interfere with each other. In reality and INET, both 802.11 and 802.15.4 employ the Clear Channel Assessment (CCA) technique (they listen to the channel to make sure there are no ongoing transmissions before starting to transmit) and defer from transmitting for the duration of a backoff period when the channel is busy. The use of CCA and backoff enables the two technologies to coexist cooperatively (both of them can communicate successfully), as opposed to destructively (they ruin each other's communication). In our case, the nodes of the different technologies sense when the other kind is transmitting, and tend not to interrupt each other. Here are some duration values in the example simulation, for both 802.11 and 802.15.4 (sending 1000B application packets with 24 Mbps, and 88B application packets with 250 kbps, respectively): +--------------+----------+-----------+ | | 802.11 | 802.15.4 | +==============+==========+===========+ | Data | 382 us | 4192 us | +--------------+----------+-----------+ | SIFS | 10 us | 192 us | +--------------+----------+-----------+ | ACK | 34 us | 352 us | +--------------+----------+-----------+ | Backoff (avg)| 600 us | 1200 us | +--------------+----------+-----------+ An 802.15.4 data frame transmission takes about ten times more than an 802.11 one, even though the payload is about ten times smaller. The SIFS and ack together are also about ten times longer in 802.15.4. The relative duration of transmissions of the Wifi and the WPAN is illustrated with the sequence chart below. The chart shows a packet transmission and ACK, first for the Wifi and then for the WPAN. The scale is linear. .. figure:: media/seqchart.png :width: 100% :align: center Transmissions are protected within a particular wireless technology, i.e. nodes receiving a data frame can infer how long the transmission of the data frame and the subsequent ACK will be, from the data frame's MAC header. They assume the channel is busy for the duration of the DATA + SIFS + ACK (thus they don't start transmitting during the SIFS). However, this protection mechanism doesn't work with the transmissions of other technologies, since nodes cannot receive and make sense of the MAC header. They just detect some signal power in the channel that makes them defer for the duration of a backoff period (but this duration is independent of the actual duration of the ongoing transmission). Also, neither technology performs CCA before sending an ACK. Thus they are susceptible for transmitting into each others' ACKs, which can lead to more retransmissions. Also, the hidden node protection mechanism in 802.11 relies on the successful reception of RTS and CTS frames, so hidden node protection might not work in a multi-technology wireless environment. Configuration ~~~~~~~~~~~~~ The simulation uses the ``CoexistenceShowcase`` network, defined in :download:`CoexistenceShowcase.ned <../CoexistenceShowcase.ned>`: .. figure:: media/network2.png :width: 100% :align: center The network contains four :ned:`AdhocHost`'s. Two of the hosts, ``wifiHost1`` and ``wifiHost2``, communicate via 802.11, in ad hoc mode. The other two hosts, ``wpanHost1`` and ``wpanHost2``, communicate via 802.15.4. The four hosts are arranged in a rectangle, and all of them are in communication range with each other (corresponding hosts are 20 meters apart). One host in each host pair sends frames to the other (``wifiHost1`` to ``wifiHost2``, and ``wpanHost1`` to ``wpanHost2``). The simulation is defined in the ``Coexistence`` configuration in :download:`omnetpp.ini <../omnetpp.ini>`. The radio medium module in the network is a :ned:`RadioMedium`. It is configured to use the :ned:`DimensionalAnalogModel`. The background noise type is set to :ned:`IsotropicDimensionalBackgroundNoise`, with a power of -110 dBm. Here is the radio medium configuration in :download:`omnetpp.ini <../omnetpp.ini>`: .. literalinclude:: ../omnetpp.ini :start-at: radioMedium.analogModel.typename :end-at: radioMedium.backgroundNoise.power :language: ini The Wifi hosts are configured to have :ned:`Ieee80211DimensionalRadio`. The default ``timeGains`` parameter is not changed in the transmitter, so the radio uses a flat signal in time. In frequency, instead of the default flat signal, we configure a more realistic shape. We'll use the 802.11 OFDM spectral mask, as in the standard: .. figure:: media/spectralmask_wifi.png :width: 100% :align: center Here is the ``frequencyGains`` parameter value specifying this spectrum: .. literalinclude:: ../omnetpp.ini :start-at: wifiHost*.wlan[*].radio.transmitter.frequencyGains :end-at: wifiHost*.wlan[*].radio.transmitter.frequencyGains :language: ini Briefly about the syntax: - The parameter uses frequency and gain pairs to define points on the frequency/gain graph. ``c`` is the center frequency and ``b`` is the bandwidth. These values are properties of the transmission, i.e. the receiver listens on the frequency band defined by the center frequency and bandwidth. However, the signal can have radio energy outside of this range, which can cause interference. - Between these points, the interpolation mode can be specified, e.g. ``left`` (take value of the left point), ``greater`` (take the greater of the two points), ``linear``, etc. - The ``-inf Hz/-inf dB`` and the ``+inf Hz/+inf dB`` points are implicit (hence the ``frequencyGains`` string starts with an interpolation mode). For more on the syntax, see :ned:`DimensionalTransmitterBase`. Also we set the :par:`snirThresholdMode` parameter in the radio's receiver module, and the :par:`snirMode` parameter in the error model to ``mean``: .. literalinclude:: ../omnetpp.ini :start-at: snirThresholdMode :end-at: snirMode :language: ini In the receiver module, reception of frames under the SNIR threshold is not attempted (they're discarded). The :par:`snirThresholdMode` specifies how the SNIR threshold is calculated. The parameter's value is either ``mean`` or ``min``, i.e. either take the `minimum` or the `mean` of the SNIR during the reception. The SNIR is important for calculating reception; the error model uses it to decide if the reception was successful. In the error model, the :par:`snirMode` parameter specifies how the SNIR is computed when the receiver attempts to receive a frame; also either ``min`` or ``mean``. When calculating with the minimum of the SNIR during the reception, a short spike in the interfering signal might ruin the reception, as it can decrease the SNIR substantially. Inversely, when two signals overlap substantially but not entirely (in either time or frequency), the mean SNIR might not be low enough to ruin the reception (when in this case it would be more realistic if it did). We set the :par:`snirMode` to ``mean`` because concurrent Wifi and WPAN signals don't overlap significantly in the time-frequency space. That is, the WPAN frame's spectrum is much smaller than the Wifi's; similarly, the Wifi frame is much shorter than the WPAN. The Wifi channel is set to Channel 9 (center frequency of 2452MHz) to ensure that the Wifi transmissions overlap with the 802.15.4 transmissions in frequency. Here is the configuration for the Wifi host radios in :download:`omnetpp.ini <../omnetpp.ini>`: .. literalinclude:: ../omnetpp.ini :start-at: Ieee80211DimensionalRadio :end-at: channelNumber :language: ini .. note:: The channel number is set to 8 because in INET's 802.11 model, the channels are numbered from 0, so that this setting corresponds to Wifi Channel 9. The WPAN hosts are configured to have an :ned:`Ieee802154NarrowbandInterface`, with a :ned:`Ieee802154NarrowbandDimensionalRadio`. As in the case of the Wifi hosts, the default flat signal shape is used in time. In frequency, we'll use a more realistic shape, based on the modulated spectrum of the CC2420 Zigbee transmitter: .. figure:: media/spectrum_wpan.png :width: 100% :align: center We'll use the approximation indicated with red. Here is the ``frequencyGains`` parameter value specifying this spectrum: .. literalinclude:: ../omnetpp.ini :start-at: wpanHost*.wlan[*].radio.transmitter.frequencyGains = "left c-5MHz :end-at: wpanHost*.wlan[*].radio.transmitter.frequencyGains = "left c-5MHz :language: ini The default carrier frequency (2450 MHz) and bandwidth (2.8 MHz) is not changed. Here is the configuration for the WPAN host radios in :download:`omnetpp.ini <../omnetpp.ini>`: .. literalinclude:: ../omnetpp.ini :start-at: Ieee802154NarrowbandInterface :end-at: Ieee802154NarrowbandDimensionalRadio :language: ini The transmission power parameters for both technologies are left on default (20 mW for the Wifi and 2.24 mW for the WPAN). The Wifi hosts operate in the default 802.11g mode and use the default data bitrate of 24 Mbps. The WPAN hosts use the default bitrate of 250 kbps (specified in :ned:`Ieee802154Mac`). ``wifiHost1`` is configured to send a 1000-byte UDP packet to ``wifiHost2`` every 0.4 milliseconds, corresponding to about 20 Mbps traffic, saturating the Wifi channel. Here is the Wifi traffic configuration in :download:`omnetpp.ini <../omnetpp.ini>`: .. literalinclude:: ../omnetpp.ini :start-at: wifiHost1.numApps = 1 :end-at:[*].localPort = 5000 :language: ini ``wpanHost1`` is configured to send an 88-byte UDP packet to ``wpanHost2`` every 0.1 seconds, which is about 7 Kbps of traffic (the packet size is set to 88 bytes in order not to exceed the default maximum transfer unit in 802.15.4). Here is the WPAN traffic configuration in :download:`omnetpp.ini <../omnetpp.ini>`: .. literalinclude:: ../omnetpp.ini :start-at: wpanHost1.numApps = 1 :end-at:[0].localPort = 5000 :language: ini The independent performance data can be obtained by running the ``WifiOnly`` and the ``WpanOnly`` configurations in :download:`omnetpp.ini <../omnetpp.ini>`. These configurations extend the ``Coexistence`` configuration, and disable either the Wifi or the WPAN host communication by setting the number of applications to 0: .. literalinclude:: ../omnetpp.ini :start-at: WifiOnly :end-at: wifiHost1.numApps :language: ini In all configurations, the simulations are run for five seconds and repeated eight times. Results ------- There is contention between the Wifi and WPAN hosts so that it is expected that they will be able to coexist cooperatively. However, protection mechanisms don't work between the two technologies, so it is likely that they'll transmit into each other's transmissions, and the performance of both will be degraded. The Wifi host waits less than the WPAN host before accessing the channel, so it is expected that the Wifi host will gain channel access most of the time. The Wifi might even starve the WPAN. WPAN transmissions are significantly longer than Wifi transmissions, thus, when the WPAN host does gain channel access, it'll take lots of air time from the Wifi host during the transmission of a single 802.15.4 frame. However, the WPAN host sends frames much less frequently than the Wifi host, so it can afford to wait for channel access; its performance might be mostly unaffected. Also, the Wifi host's transmission power is significantly greater than the WPAN host's, so that when the two transmit concurrently, the Wifi transmission might be correctly receivable but the WPAN transmission might be corrupted. The simulation can be run by choosing the ``Coexistence`` configuration from omnepp.ini. It looks like the following when the simulation is run: .. video:: media/coexistence9.mp4 :width: 100% :align: center The Wifi hosts have the MAC contention state, and the WPAN hosts have the MAC state displayed above them, using :ned:`InfoVisualizer`. The spectrum and power of received signals is visualized with a spectrum figure (part of :ned:`MediumVisualizer`) at all hosts. The spectrum figure displays the sum of all signals present at the receiving node. Signals not being received are indicated with blue. When receiving a signal, the received signal is indicated with green; the sum of interfering signals are indicated with red. Note that the spectrum figure configures its scale automatically based on the signals displayed; also, all spectrum figures use the same scale so that the signal spectra and power levels can be compared. The Wifi and WPAN hosts detect each others' transmissions (but cannot receive them), and this causes them to defer from transmitting. Sometimes they transmit at the same time, and the transmissions interfere. However, the interference doesn't ruin the receptions. The reason is that the overlap in the time-frequency space is not large. The two transmissions overlap in frequency, but it is not substantial from the perspective of the Wifi (the WPAN transmission's spectrum is small compared to the Wifi's). Similarly, the transmissions overlap in time, but the overlap is not substantial from the perspective of the WPAN (the Wifi transmission's duration is small compared to the WPAN's). (Despite the low time-frequency space overlap, if the signal power for one of the transmissions were significantly higher than the other, the lower power transmission might not be correctly receivable.) In the video, ``wifiHost1`` and ``wpanHost1`` transmit concurrently. The Wifi transmission is correctly received and successfuly ACKED. Then, ``wifiHost2`` senses the ongoing WPAN transmission, and defers from transmitting. The WPAN tranmission is correctly received by ``wpanHost2``. When the transmission is over, ``wifiHost1`` sends its next frame; since ACKs are not protected by CCA, ``wpanHost2`` sends the ACK concurrently with the Wifi frame (and also the Wifi ACK). All frames are correctly received; ``wifiHost1`` waited for the remainder of the WPAN transmission, during which it could have sent multiple frames. We examine the performance of the two technologies by looking at the number of received UDP packets at ``wifiHost2`` and ``wpanHost2``. We look at the independent performance of the Wifi and WPAN hosts (i.e. when there is just one of the host pairs communicating), and see how their performance changes when both of them communicate concurrently. Here are the performance results: .. figure:: media/wifiperformance.png :width: 70% :align: center .. figure:: media/wpanperformance.png :width: 70% :align: center In this particular scenario, the performance of Wifi is decreased by about 5 percent compared to the base performance. The performance of WPAN didn't decrease, because it had packets to send infrequently; it could send them all despite the Wifi traffic. Note that the fractional number of packets is due to the averaging of the repetitions. In this scenario, the transmissions of both technologies could be received correctly when interfering with each other. The decrease in performance comes from the fact that hosts defer from transmitting when they detect ongoing transmissions. Sources: :download:`omnetpp.ini <../omnetpp.ini>`, :download:`CoexistenceShowcase.ned <../CoexistenceShowcase.ned>` Discussion ---------- Use `this `__ page in the GitHub issue tracker for commenting on this showcase.
.. _ug:cha:physicallayer: The Physical Layer ================== .. _ug:sec:phy:overview: Overview -------- Wireless network interfaces contain a radio model component, which is responsible for modeling the physical layer (PHY). [1]_ The radio model describes the physical device that is capable of transmitting and receiving signals on the medium. Conceptually, a radio model relies on several sub-models: - antenna model - transmitter model - receiver model - error model (as part of the receiver model) - energy consumption model The antenna model is shared between the transmitter model and the receiver model. The separation of the transmitter model and the receiver model allows asymmetric configurations. The energy consumer model is optional, and it is only used when the simulation of energy consumption is necessary. .. _ug:sec:phy:generic-radio: Generic Radio ------------- In INET, radio models implement the :ned:`IRadio` module interface. A generic, often used implementation of :ned:`IRadio` is the :ned:`Radio` NED type. :ned:`Radio` is an active compound module, that is, it has an associated C++ class that encapsulates the computations. :ned:`Radio` contains its antenna, transmitter, receiver and energy consumer models as submodules with parametric types: .. code-block:: ned antenna: like IAntenna; transmitter: <> like ITransmitter; receiver: <> like IReceiver; energyConsumer: like IEnergyConsumer if typename != ""; The following sections describe the parts of the radio model. .. _ug:sec:phy:components-of-a-radio: Components of a Radio --------------------- .. _ug:sec:phy:antenna-models: Antenna Models ~~~~~~~~~~~~~~ The antenna model describes the effects of the physical device which converts electric signals into radio waves, and vice versa. This model captures the antenna characteristics that heavily affect the quality of the communication channel. For example, various antenna shapes, antenna size and geometry, antenna arrays, and antenna orientation causes different directional or frequency selectivity. The antenna model provides a position and an orientation using a mobility model that defaults to the mobility of the node. The main purpose of this model is to compute the antenna gain based on the specific antenna characteristics and the direction of the signal. The signal direction is computed by the medium from the position and the orientation of the transmitter and the receiver. The following list provides some examples: - :ned:`IsotropicAntenna`: antenna gain is exactly 1 in any direction - :ned:`ConstantGainAntenna`: antenna gain is a constant determined by a parameter - :ned:`DipoleAntenna`: antenna gain depends on the direction according to the dipole antenna characteristics - :ned:`InterpolatingAntenna`: antenna gain is computed by linear interpolation according to a table indexed by the direction angles .. _ug:sec:phy:transmitter-models: Transmitter Models ~~~~~~~~~~~~~~~~~~ The transmitter model describes the physical process which converts packets into electric signals. In other words, this model converts an L2 frame into a signal that is transmitted on the medium. The conversion process and the representation of the signal depends on the level of detail and the physical characteristics of the implemented protocol. There are two main levels of detail (or modeling depths): - In the *flat model*, the transmitter model skips the symbol domain and the sample domain representations, and it directly creates the analog domain representation. The bit domain representation is reduced to the bit length of the packet, and the actual bits are ignored. - In the *layered model*, the conversion process involves various processing steps such as packet serialization, forward error correction encoding, scrambling, interleaving, and modulation. This transmitter model requires significantly more computation, but it produces accurate bit domain, symbol domain, and sample domain representations. Some of the transmitter types available in INET: - :ned:`UnitDiskTransmitter` - :ned:`ApskScalarTransmitter` - :ned:`ApskDimensionalTransmitter` - :ned:`ApskLayeredTransmitter` - :ned:`Ieee80211ScalarTransmitter` - :ned:`Ieee80211DimensionalTransmitter` .. _ug:sec:phy:receiver-models: Receiver Models ~~~~~~~~~~~~~~~ The receiver model describes the physical process which converts electric signals into packets. In other words, this model converts a reception, along with an interference computed by the medium model, into a MAC packet and a reception indication. For a packet to be received successfully, reception must be *possible* (based on reception power, bandwidth, modulation scheme and other characteristics), it must be *attempted* (i.e. the receiver must synchronize itself on the preamble and start receiving), and it must be *successful* (as determined by the error model and the simulated part of the signal decoding). In the *flat model*, the receiver model skips the sample domain, the symbol domain, and the bit domain representations, and it directly creates the packet domain representation by copying the packet from the transmission. It uses the error model to decide whether the reception is successful. In the *layered model*, the conversion process involves various processing steps such as demodulation, descrambling, deinterleaving, forward error correction decoding, and deserialization. This reception model requires much more computation than the flat model, but it produces accurate sample domain, symbol domain, and bit domain representations. Some of the receiver types available in INET: - :ned:`UnitDiskReceiver` - :ned:`ApskScalarReceiver` - :ned:`ApskDimensionalReceiver` - :ned:`ApskLayeredReceiver` - :ned:`Ieee80211ScalarReceiver` - :ned:`Ieee80211DimensionalReceiver` .. _ug:sec:phy:error-models: Error Models ~~~~~~~~~~~~ Determining reception errors is a crucial part of the reception process. There are often several different statistical error models in the literature even for a particular physical layer. In order to support this diversity, the error model is a separate replaceable component of the receiver. The error model describes how the signal to noise ratio affects the amount of errors at the receiver. The main purpose of this model is to determine whether the received packet has errors or not. It also computes various physical layer indications for higher layers such as packet error rate, bit error rate, and symbol error rate. For the layered reception model it needs to compute the erroneous bits, symbols, or samples depending on the lowest simulated physical domain where the real decoding starts. The error model is optional (if omitted, all receptions are considered successful.) The following list provides some examples: - :ned:`StochasticErrorModel`: simplistic error model with constant symbol/bit/packet error rates as parameters; suitable for testing. - :ned:`ApskErrorModel` - :ned:`Ieee80211NistErrorModel`, :ned:`Ieee80211YansErrorModel`, :ned:`Ieee80211BerTableErrorModel`: various error models for IEEE 802.11 network interfaces. .. _ug:sec:phy:power-consumption-models: Power Consumption Models ~~~~~~~~~~~~~~~~~~~~~~~~ A substantial part of the energy consumption of communication devices comes from transmitting and receiving signals. The energy consumer model describes how the radio consumes energy depending on its activity. This model is optional (if omitted, energy consumption is ignored.) The following list provides some examples: - :ned:`StateBasedEpEnergyConsumer`: power consumption is determined by the radio state (a combination of radio mode, transmitter state and receiver state), and specified in parameters like :par:`receiverIdlePowerConsumption` and :par:`receiverReceivingDataPowerConsumption`, in watts. - :ned:`StateBasedCcEnergyConsumer`: similar to the previous one, but consumption is given in ampères. .. _ug:sec:phy:layered-radio-models: Layered Radio Models -------------------- In layered radio models, the transmitter and receiver models are split to several stages to allow more fine-grained modeling. For transmission, processing steps such as packet serialization, forward error correction (FEC) encoding, scrambling, interleaving, and modulation are explicitly modeled. Reception involves the inverse operations: demodulation, descrambling, deinterleaving, FEC decoding, and deserialization. In layered radio models, these processing steps are encapsulated in four stages, represented as four submodules in both the transmitter and receiver model: #. *Encoding and Decoding* describe how the packet domain signal representation is converted into the bit domain, and vice versa. #. *Modulation and Demodulation* describe how the bit domain signal representation is converted into the symbol domain, and vice versa. #. *Pulse Shaping and Pulse Filtering* describe how the symbol domain signal representation is converted into the sample domain, and vice versa. #. *Digital Analog and Analog Digital Conversion* describe how the sample domain signal representation is converted into the analog domain, and vice versa. In layered radio transmitters and receivers such as :ned:`ApskLayeredTransmitter` and :ned:`ApskLayeredReceiver`, these submodules have parametric types to make them replaceable. This provides immense freedom for experimentation. .. _ug:sec:phy:notable-radio-models: Notable Radio Models -------------------- The :ned:`Radio` module has several specialized versions derived from it, where certain submodule types and parameters are set to fixed values. This section describes some of the frequently used ones. The radio can be replaced in wireless network interfaces by setting the :par:`typename` parameter of the radio submodule, like in the following ini file fragment. .. code-block:: ini **.wlan[*].radio.typename = "UnitDiskRadio" However, be aware that not all MAC protocols can be used with all radio models, and that some radio models require a matching transmission medium module. .. _ug:sec:phy:unitdiskradio: UnitDiskRadio ~~~~~~~~~~~~~ :ned:`UnitDiskRadio` provides a very simple but fast and predictable physical layer model. It is the implementation (with some extensions) of the *Unit Disk Graph* model, which is widely used for the study of wireless ad-hoc networks. :ned:`UnitDiskRadio` is applicable if network nodes need to have a finite communication range, but physical effects of signal propagation are to be ignored. :ned:`UnitDiskRadio` allows three radii to be given as parameters, instead of the usual one: communication range, interference range, and detection range. One can also turn off interference modeling (meaning that signals colliding at a receiver will all be received correctly), which is sometimes a useful abstraction. :ned:`UnitDiskRadio` needs to be used together with a special physical medium model, :ned:`UnitDiskRadioMedium`. The following ini file fragment shows an example configuration. .. code-block:: ini *.radioMedium.typename = "UnitDiskRadioMedium" *.host[*].wlan[*].radio.typename = "UnitDiskRadio" *.host[*].wlan[*].radio.transmitter.bitrate = 2Mbps *.host[*].wlan[*].radio.transmitter.preambleDuration = 0s *.host[*].wlan[*].radio.transmitter.headerLength = 96b *.host[*].wlan[*].radio.transmitter.communicationRange = 100m *.host[*].wlan[*].radio.transmitter.interferenceRange = 0m *.host[*].wlan[*].radio.transmitter.detectionRange = 0m *.host[*].wlan[*].radio.receiver.ignoreInterference = true As a side note, if modeling full connectivity and ignoring interference is required, then :ned:`ShortcutInterface` provides an even simpler and faster alternative. .. _ug:sec:phy:apsk-radio: APSK Radio ~~~~~~~~~~ APSK radio models provide a hypothetical radio that simulates one of the well-known ASP, PSK and QAM modulations. (APSK stands for Amplitude and Phase-Shift Keying.) APSK radio has scalar/dimensional, and flat/layered variants. The flat variants, :ned:`ApskScalarRadio` and :ned:`ApskDimensionalRadio` model frame transmissons in the selected modulation scheme but without utilizing other techniques such as forward error correction (FEC), interleaving, spreading, etc. These radios require matching medium models, :ned:`ApskScalarRadioMedium` and :ned:`ApskDimensionalRadioMedium`. The layered versions, :ned:`ApskLayeredScalarRadio` and :ned:`ApskLayeredDimensionalRadio` can not only model the processing steps missing from their simpler counterparts, they also feature configurable level of detail: the transmitter and receiver modules have :par:`levelOfDetail` parameters that control which domains are actually simulated. These radio models must be used in conjuction with :ned:`ApskLayeredScalarRadioMedium` and :ned:`ApskLayeredDimensionalRadioMedium`, respectively. .. [1] Wired network interfaces could similarly contain an explicit PHY model. The reason they do not is that wired links normally have very low error rates and simple observable behavior, and there is usually not much to be gained from modeling the physical layer in detail.
atlantis morocco atlantis morocco Where is the lost city of Atlantis? Is Morocco in Atlantis? According to Michael Hübner, Atlantis core region was located in South-West Morocco at the Atlantic Ocean. In his papers an approach to the analysis of Plato’s dialogues Timaeus and Critias is described. How big did Plato say Atlantis was? Plato asserted that the Egyptians described Atlantis as an island consisting mostly of mountains in the northern portions and along the shore and encompassing a great plain in an oblong shape in the south “extending in one direction three thousand stadia [about 555 km; 345 mi], but across the center inland it was two What did the Atlanteans look like? They were tan in complexion but tall in stature and tended to be fair haired. These characteristics lend themselves to a rich mythology, which I propose the Atlanteans capitalized on. How did the lost city of Atlantis get underwater? In one cataclysmic night, the gods sent a battalion of fire and earthquakes so intense that the Utopian kingdom of Atlantis sank deep into the ocean, never to be found again. What did Plato say about Atlantis? You might be interested:  famous mosque in morocco Where is the country Morocco? Was Ireland Atlantis? But now a geographer has claimed that Atlantis , first described by the Greek philosopher Plato as sinking under a tidal wave 12,000 years ago, was actually Ireland . “Just like Atlantis , Ireland is 300 miles long, 200 miles wide, and widest over the middle,” he said. When did Atlantis take place? Who is Plato and what did he do? Plato was a philosopher during the 5th century BCE. He was a student of Socrates and later taught Aristotle. He founded the Academy, an academic program which many consider to be the first Western university. Plato wrote many philosophical texts—at least 25. What race are Atlanteans? Subraces of the Atlantean root race The descendants of the Atlanteans according to traditional Theosophy include those of the Mongolian race , the Malayan race, and the American Indian race as well as some people of what in the late 19th and early 20th centuries was called the “olive-skinned” Mediterranean race . Is Aquaman real? Aquaman (Arthur Curry) is a fictional superhero appearing in American comic books published by DC Comics. During the late 1950s’ and 1960s’ superhero-revival period known as the Silver Age, he was a founding member of the Justice League. What language was spoken in Atlantis? Atlantean language Tom Smith leave a comment Create Account Log In Your Account
Is Payor Different Means? What is a payor in health care? An insurance company is the most common type of payer. A payer is responsible for processing patient eligibility, enrollment, claims, and payment.. What does change of payor mean? Use the Authorization to Change Payor when you are transferring payment responsibility to another person. The new payor will be responsible for paying premiums. How much life insurance do we need? A general rule of thumb is you should be covered for at least 10 times your annual income, so if you earn $70,000, you’d be looking at $700,000 in coverage. But every individual situation is different and should be examined as such. Who is payor check? What is a payor mix? Payor mix refers to the percentage of hospital revenue coming from private insurance companies versus government insurance programs versus self-paying patients. … Below are the top hospitals with the highest and lowest payor mixes for Medicaid and Medicare, as well as net patient revenue. Who are payers and providers in healthcare? The payer to a health care provider is the organization that negotiates or sets rates for provider services, collects revenue through premium payments or tax dollars, processes provider claims for service, and pays provider claims using collected premium or tax revenues. What is a drawer? A drawer is a sliding compartment that fits into a dresser and is used for storage. … Dressers have drawers, and so do other pieces of furniture, including desks, bureaus, and kitchen cabinets. Is payor a word? What’s the difference between payer and payor? As nouns the difference between payor and payer is that payor is (healthcare|medical insurance) the maker of a payment while payer is one who pays; specifically, the person by whom a bill or note has been, or should be, paid. Who is the largest payer in healthcare? Centers for Medicare & Medicaid ServicesThe Centers for Medicare & Medicaid Services (CMS) is the single largest payer for health care in the United States. Nearly 90 million Americans rely on health care benefits through Medicare, Medicaid, and the State Children’s Health Insurance Program (SCHIP). Is payor a Scrabble word? PAYOR is a valid scrabble word. Is payer a Scrabble word? PAYER is a valid scrabble word. What is a children’s term rider? The Children’s Term Insurance Rider, if added to a policy, pays a benefit upon the death of a child of the insured including biological children, stepchildren, and legally adopted children of the insured who are at least 15 days old and are named in the application. What is the purpose of settlement options? The primary objective of settlement option is to generate regular streams of income for the insured. Description: Under settlement option, the insured receives a regular flow of income from the insurer post the maturity of the policy. What is the meaning of pyre? : a combustible heap for burning a dead body as a funeral rite broadly : a pile of material to be burned a pyre of dead leaves. What is a payor? What is a payor benefit? Payor Benefit. Payor Benefit is another supplementary benefit which you can add to the policy where your child is the life insured. It waives future premiums under the policy if the payor of this supplementary benefit becomes unable to pay the premiums as a result of his/her total disability or death. What does child support payor mean? Payee. Person or organization in whose name child support money is paid. Payor. Person who makes a payment, usually non-custodial parents or someone acting on their behalf, or a custodial party who is repaying a receivable. Which health insurance company has the most members? UnitedHealthcare GroupHealth insurance company rankings by revenueRankCompanyRevenue ($bn)1UnitedHealthcare Group$201.002Anthem$90.003Aetna$60.604Humana$53.704 more rows What is the purpose of a copay? Copays are a form of cost sharing. Insurance companies use them as a way for customers to split the cost of paying for health care. Copays for a particular insurance plan are set by the insurer. Regardless of what your doctor charges for a visit, your copay won’t change.
What are Bhimbetka caves famous for? What are Bhimbetka caves famous for? The Bhimbetka rock shelters are an archaeological site in central India that spans the prehistoric Paleolithic and Mesolithic periods, as well as the historic period. It exhibits the earliest traces of human life in India and evidence of Stone Age starting at the site in Acheulian times. What were the factors responsible for choosing a place by the hunter-gatherers to live in? Aside from the ability to clear large areas of land, fire was favored because of its ability to increase nutrient cycles in the soil. However, the major impact humans had on the environment came through hunting. With their technological advancements, hunter-gatherers were able to over-hunt many species. What are the different ways in which hunter-gatherers used fire? Answer: Hunter-gatherers used the fire as a source of light, to cook meat, and to scare away animals. What dangers did hunter-gatherers face? Before doing research, I believed the main causes of Hunter-gatherer deaths were disease, violence, and starvation. Why do we use fire today? Answer: Today, we use fire for the following use: (i) to cook food; (ii) to heat the water; (iii) for making steam from coal and water; {iv) for moulding metals; and many more. What challenges did hunter-gatherers face daily? Hunter-gatherers have faced numerous challenges in the twentieth century. They have struggled for survival in the face of expansion of state systems, multinational corporations, and individuals who were anxious to exploit their lands, labor, and resources (Burch and Ellanna 1994; Burger 1987; Leacock and Lee 1982). How often did hunter-gatherers eat meat? The real Paleolithic diet, though, wasn't all meat and marrow. It's true that hunter-gatherers around the world crave meat more than any other food and usually get around 30 percent of their annual calories from animals. But most also endure lean times when they eat less than a handful of meat each week. Did our ancestors eat one meal a day? Breakfast as we know it didn't exist for large parts of history. The Romans didn't really eat it, usually consuming only one meal a day around noon, says food historian Caroline Yeldham. In fact, breakfast was actively frowned upon. "The Romans believed it was healthier to eat only one meal a day," she says. What type of meat did hunter gatherers eat? Are human teeth designed to eat meat? One common fallacy is that humans are by nature not meat eaters – it is claimed that we do not have the jaw and teeth structure of carnivores. It is true that humans are not designed to eat raw meat, but that is because our jaws have evolved to eat cooked meat, which is considerably softer and much easier to chew. What animal will eat a human? Should humans be vegetarians? Vegan diet conferred a significant reduced risk (15 percent) of incidence from total cancer.” Vegetarian diets are also tied to a lower risk of metabolic syndrome, diabetes, cancer (again), and lower blood pressure, and they may fend off childhood obesity. Do humans need meat to survive? There is no nutritional need for humans to eat any animal products; all of our dietary needs, even as infants and children, are best supplied by an animal-free diet. ... A South African study found not a single case of rheumatoid arthritis in a community of 800 people who ate no meat or dairy products.
I believe the answer is: c. Sam’s assets increased by more than his liabilities. You are watching: Over the period of a year, sam’s net worth increased. which of the following could be true? A net worth represent the amount of financial value that a person have after removing all of his/her debt out of the equation. A net worth is calculated by counting total assets - Total liabilities. For a net worth to be increased, the only way possible is to increase the assets more than the liabilities. im not fully sure of it but i would assume B because the net worth increase so shouldn"t the assets and liabilities increase as well Sam"s assets increased by more than his liabilities ( C ) Sam"s net worth increased because his assets increased more than his liabilities because the more assets you have the more your net worth and also the less liabilities you have the more your net worth as well. alternatively if your assets and liabilities are growing at the same rate your net worth won"t change. An asset is any property or product weather tangible or not been owned by anybody or entity that produces a positive economy value is an asset. generally assets appreciate with time. example of an Asset is owning a block of flats ( real estate ) A liability is any property or product that produces or incurs a negative economy value to a person or corporation example of a liability is owning a luxury car or a Jet Answer from: zoey1223 The correct answer is c. Sam’s assets increased by more than his liabilities. Taking into account the basic accounting equation (Assets - liabilities = equity), a greater variation on the side of the assets will always mean an increase in equity as long as the liabilities have a contrary behavior. The theory of charge and credit refers to the effect that commercial transactions have on the equity equation. Each transaction affects the balance, changes the values in the equity without altering the balance of the opposition. The theory of charge and credit is the set of rules that, based on the laws of equity, allow the registration of capital and other accounting facts through a system of accounts. In each of these transactions, at least two accounts act. Answer from: blue5488 C. sams assests increased by more than his liabilities. Other questions on the subject: Mathematics Mathematics, 21.06.2019 13:00, lilpetals #12 find the value of x. #13 find the value of the variable. Answers: 3 Mathematics, 21.06.2019 15:30, gabrielolivas59 Solve the given system of equations. 2a + 8c = 94 –8a = –88 5b + 7c = 3 a a = –11, b = –12, c = 9 b a = 11, b = –12, c = 9 c a = 9, b = 11, c = –12 d a = 11, b = 9, c = –12 Answers: 2 Mathematics, 21.06.2019 20:30, marahkotelman Find the nonpermissible replacement for binthis expression. b2/5b +5​ Answers: 1 Mathematics, 21.06.2019 22:20, dontworry48 Which graph represents the given linear function 4x+2y=3​ Answers: 1 You know the right answer? Over the period of a year, sam"s net worth increased. which of the following could be true? a... Questions in other subjects: "the ratio of selfies to scenery pictures you take on your trip is 7:3 if you take 21 scenery pictures, how many selfies did you take"... Write an objective summary of the article. Be sure to provide the overall central idea and three supporting details. Check your work for grammatical errors. The book is, How do you do this only if you know please??... guys I"m in a deep pickle. how do you guys let go of toxic friends? I am friends with this girl Synthia and she is sooo mean. Even since 2nd grade she one time said to wipe up this... Please help ill give brainliest ive already failed this and had to re do it pleasee answer correctly Mia also drew path FG that goes through (12, 2) on her map and is parallel to path AC. Write an equation for path FG.​... How would bivariate data best be displayed? .on a scatter plot with a linear relationship between price and timeon a scatter plot with an exponential relationship using ti... 4. What is the central idea of "Checking Caffeine in Popular Drinks?"5. What is the central idea of the entire article? Provide 3 pieces of evidence tosupport the central... Jika satuan kecepatan adalah m/s maka dimensinya adalah ​... What is the circumference? 16 yd... More questions: MathematicsAnother questions See results (0) The answer is not found? Ask an expert a question Join now Your question Log inForgot your password? Too short question Log in Join nowForgot your password? Invalid login or password Log in You are registered.Access to your account will be opened after verification and publication of the question. See more: Watch Hedwig And The Angry Inch Free Online Hd, Watch Hedwig And The Angry Inch Online Password recovery New password sent to your email Ask your question to an expert Your name Pick a subject Pick a subjectMathematicsHistoryEnglishBiologyChemistryPhysicsSocial StudiesAdvanced Placement (AP)SATGeographyHealthArtsBusinessComputers and TechnologyFrenchGermanSpanishWorld Languages Your question is too short Add photoSend Question sent to expert. You will receive an answer to the email. Instant access to the answer in our app And millions of other answers 4U without ads Be smarter, download now! View a few ads and unblock the answer on the site You can only ask a question in the app Be smarter, download now!
Guide to the Naqareh Naqareh, also known as Naqqara and Nagada, is a pair of Middle Eastern percussion instrument that has a rounded back and a head made out of a hide. The rounded section of this instrument is made out of baked clay. Meanwhile, its flat side is an animal skin fastened around using a string that is tightened over the back of the instrument. Its name, naqareh or nagara, literally means “beat” or ‘strike’ in Arabic. When this instrument was adopted in Europe, it becomes notably known as ‘naccaire’ or ‘naker.’ Since this instrument is a type of drum, it is typically struck using a short wooden stick that is bent outward at its upper end called damka. Additionally, the naqareh produces a low pitch beat called ‘nar.’ Aside from that, it can also be played in a high-pitch register. There are several types of naqareh that are existing in several parts of the world like in Iran, India, Azerbaijan, Turkey, Uzbekistan, Europe, and Georgia. In some regions of Iran, several sizes of naqareh were presented. Some of these were the Naqare-ye Shomal, Desarkutan, Fars Naqqare, Sanandaji, and Naqqarekhan. A photo of an Indian Nagara Naqare-ye Shomal: The Naqare-ye Shomal, also known as the northern naqqare, is usually played in the northern part of Iran. This type of naqareh was also called ‘desakurtan’ in the province of Mazandaran. The desarkutan is a pair of small drums which is made out of clay. Its structure is similar to a bowl. Although this type is played in pairs, one drum is larger than the other. The larger drum is called bam (bass), while the smaller one is called zil (treble). The larger drum measures about twenty-two centimeters, while the smaller one is about sixteen centimeters. Their sizes may be different from each other but these two are both covered with a cowhide or boarhide. In playing this instrument, the desarkutan is struck using a stick that is 25-27 centimeters long, while its diameter is about 1 to 1.5 centimeter. Additionally, a thicker drumstick is used in playing the larger drum or the ‘bam.’ Most commonly, this naqareh is played during festive ceremonies like sports, wedding ceremonies, and others. However, it is important to note that the desarkutan is not used as a solo instrument. Fars Naqqare: The Fars Naqqare is a type of naqareh played in the Fars province of Iran. This type of naqare is a little larger than a regular naqareh. Sanandaji naqqare: It is a type of naraqeh that is usually played in the Sanandaj City, Iran. Naqqarekhan: In Iran, the word ‘khane; literally means ‘home’ or ‘house.’ This type of naqareh is used for announcing important news through playing a kettle drum during a victory, the rising of the sun, mourning, or even during the birth of a male baby. Furthermore, the naqareh can also be found in India, where it was pronounced as ‘nagara’ or ‘nagada.’ Like the Iranian naqareh, the Indian’s nagara were also a pair of kettledrums. In India, this pair of drums were used in the ‘naubat’ or ‘nine things,’ a traditional ensemble of nine instruments. As well as that, the nagara is also played using sticks. Nowadays, this instrument is commonly played alongside the shehnai or the Indian oboe, a necessary instrument in every Indian wedding. Meanwhile, in Azerbaijan and Turkey, the naqareh is also referred to as naqara or nakkare, which means a small kettledrum struck using the hands or a pair of sticks. The popularity of the naqareh had also reached the Uzbekistan. In there, it is called nagora or naqara. Some variations were named ‘dulnaqara,’ a large kettledrum that produces a loud yet low sound. Another one is called ‘koshnaqara,’ a small pair of kettledrums made out of clay pots and goatskin tops. From the middle east, the naqareh had made its way to Europe during the 13th century Crusades. It was after the contact with the Arab musicians called the Saracens who played the said instrument. At that time, it had also spread out in France, Italy, and some other parts of England. Variations of the name had emerged because of this and the instrument was then known or called nacaires, naccheroni, and nakers.
Urinary Symptoms of Neuropathy Your bladder and urinary system are controlled by nerves that send signals to and from the brain. If you suffer from neuropathy with urinary symptoms, your nerves may fail to communicate properly between your brain and bladder, causing a variety of urinary problems.  At Advantage Spinal Dynamics & Innovative Medicine in Meridian, Idaho, we offer a number of treatment options for people suffering from neuropathy, including cases with urinary symptoms.  What is neuropathy? Neuropathy is a general term that refers to damage that affects the nerves and can lead to loss of sensation, changes in sensation, or even pain.  Unlike normal pain where nerves communicate issues with other parts of your body, neuropathy is caused by issues with the nerves themselves. This means that the uncomfortable sensations and pain caused by neuropathy are redundant and not alerting you to any underlying injury.  Neuropathy can occur in almost any area of your body and lead to symptoms such as burning, stabbing or shooting pain, numbness and tingling, muscle weakness, and urinary problems. What are urinary symptoms of neuropathy? When neuropathy affects the bladder and urinary system, it can cause changes in your bladder function, leading to an overactive or underactive bladder. Overactive bladder Sometimes, damaged nerves send phantom signals that can make it feel like your bladder is full even if it isn’t. This is known as overactive bladder and can cause symptoms such as: Underactive bladder An underactive bladder refers to when nerves are unable to communicate when the bladder is full. It can cause symptoms such as: Disrupted urinary function can be uncomfortable, inconvenient, and even embarrassing, but it can also cause serious complications if untreated. These include excess stress on the bladder that leads to urinary tract infections, which can further lead to kidney damage or kidney failure. What causes neuropathy? Neuropathy can be caused by nerve injuries, medications, and chronic conditions such as thyroid problems, kidney failure, lupus, rheumatoid arthritis, Celiac disease, Guillain-Barré syndrome, and Charcot-Marie-Tooth disease.  The most common cause of neuropathy, however, is diabetic neuropathy, which occurs when excess blood sugar damages the tiny blood vessels that feed your nerves. If you have diabetes and are experiencing incontinence or other urinary problems, it’s important to speak with our office to find out whether it might be a sign of neuropathy.  Neuropathy treatment  Neuropathy itself can’t be reversed but there are ways to treat the symptoms:  Laser therapy Laser therapy is a popular treatment for neuropathy because it’s thought to stimulate blood circulation around neuropathic areas. This, in turn, can improve the blood supply to damaged nerves, allowing them to repair and heal.  Thanks to low-intensity “cold” lasers, there’s minimal discomfort during your procedure. Platelet-rich plasma (PRP) injections Your blood contains platelets that help your body heal through special substances called growth factors. During a platelet-rich plasma procedure, your provider takes a sample of your blood, concentrates the platelets into a serum, and then injects it back into the neuropathic area.  Regenerative medicine  Regenerative medicine uses mesenchymal stem cells from donor cord tissue that, when injected, can transform into new, specialized cells based on your body’s needs.  If you’re suffering from urinary problems or other signs of neuropathy, we can help. Call us at 208-225-4358 or book your appointment online today. You Might Also Enjoy... Recovering from an Accident: Can CBP Help? Accidents can leave you aching long after the initial injuries. Chiropractic biophysics can realign and rehabilitate your spine and put it back in sync with the rest of your body so you can heal. Trigger Point Massage: What to Expect If you’ve never received a trigger point massage, you might be hesitant about your first appointment. Here’s everything you need to know before your massage therapy begins. How to Know if You’ve Slipped a Disc If you’ve never slipped a disc before, you might be surprised when you’re suddenly ambushed by intense back pain. Here’s how to recognize the symptoms of a herniated disc. The Importance of Spinal Alignment Many people wait until they’re in pain to seek help with their spinal alignment, but getting preemptive chiropractic care can actually prevent future discomfort. Feel a little twinge? Seek help now.
Exploring the Yoruba Culture Aduwo Ayodele Aduwo Ayodele September 2020 | Nigeria Exploring the Yoruba Culture This piece explores the social background of the Yoruba traditional group in Nigeria. It gives analysis to the material items and non-material practices of this sub-Saharan, African ethnic group. By implication, this piece is a conceptual clarification on the features of Yoruba ethnic group, in the 21st century. The Yoruba ethnic group is geographically located in the southwestern states of Nigeria, predominated by ancient migrants. But as a result of mutual interpersonal relationship with folks in other parts of Nigeria and in diaspora, the Yoruba ethnic group, with a close mark population of 80 million altogether, is widely spread over lands and overseas. Commonly known, the Yoruba people mythology, either as a phylum of settlement or as individuals in diaspora, believe that the Yoruba foremen and descendants fundamentally evolved from two partly known stories. In the first version, a group of migrants according to oral tradition is narrated to have moved from the east region of Nigeria into the present-day Ile-Ife. They were said to have been led by Oduduwa, who bore sons who founded neighboring Yoruba towns and Kingdoms. The second narration speaks defensively on how the whole world was created in Ile–Ife by a divination oracle under the leadership and supervision of Obatala. Despite these claims, archaeology findings done through radio-carbon dating suggests that Ile-Ife was a settlement between the 9th century and 12th century.  Meaning that what is known today as 'Yoruba land' in the Federal Republic of Nigeria have been dominated since the medieval period. The Yoruba ethnic group has her own practices. The way of life of the Yorubas is multifaceted. In practice, coming in contact with a any typical Yoruba person is identifiable as cultural elements are ever evident. There are abstract and concrete characteristics of the Yoruba people in aspects which include religion, festivity, dance, music, food, clothing, language and in cultural value or belief. On Language Till today, there are diverse dialects still professed under the canopy of the Yoruba tribe. Across settlements in Yoruba lands—under the Southwest region of Nigeria—there are dialects seeming to be very similar, but each representing Yoruba sub-tribes. While considered to have diversified settlement,  leadership and historical analysis depend on locality. Language which is the motherboard of liberal art, according to Yoruba tradition, encompasses on and into poetry, proverbial sayings, and how folktales are orally told from generations to generation. Poetry which trans-literarily in Yoruba language is called "ewì" is established to function in several ways, for several purpose. While some are designed compellingly to entertain, some are essential to perform social functions. Like during burials where dirge relatively is performed, called “rárà.” Or, for royal functions, where “epic poems” succinctly are performed. Folktales, which set seal on the Yoruba ethnic groups’ conscious effort in building valuable individuals and societies, is a mainstream practice of story telling from times of the past. Folktales can be fictional and non-fictional stories narrated with the aim of impacting moral lessons, particularly to young minds. On Evolving Political Structure The Yoruba people who occupy Oyo, Osun, Lagos, Ondo, Ekiti and featurable parts of Kwara, Edo and Kogi States of Nigeria, in past times was formed into having political territories, exercised under the principle of monarchial rule.  There are Kings or monarchs called the “Obas” featured across towns. They are single individuals with supreme power. And at grouped community levels there are community ambassadors called the “BÁÁLÈs,” who act as district supervisors. Working with the ‘Oba’ being paramount rulers, there are Chiefs who partake, under the influence of the Obas’ royalty, in decision making, plan or idea suggestion, activation and supervision.  In view of the concentrated monarchial practice which solely exercise judgmental and legislative functions in the past, there have been a touching effect in Yoruba Political Institution ever since the pre-colonial era. Monarchs today in their geographical locations, towns and villages work towards social development under the democratic grace of the Federal Republic of Nigeria, as constituted till today. On Art In Yoruba land, it is mind-boggling to see how societies have developed art greatly into several suggestive and sky-high innovations. In Yoruba practical use of art, there are fine artists, who traditionally engage in making drawings, painting and sculpture representation to express ideas, histories, or values. In the making of basic home utensils, the Yorubas are largely good in the production and designing of fabrics, and also in the creation of house-hold items like plates, mug, and more. Pot making or pottery is one of the major craft which the indigenous people of Yoruba are devoted to, determined by locality. Yoruba art has grown continually in the practice of crafts which include cloth weaving, mat weaving, beadwork, leather work, woodcarving, calabash decorations, smitting, dyeing or batik making. Music production of the Yoruba genre accords to itself a thriving balance. It has been observed that music intrigues and has propagated the Yoruba population. People from other ethnic cities, because of the arresting music practice of the Yorubas, have been noted to be foreign residents in southwest Nigeria. Yoruba music practice depicts judgement across emotions. Music of the Southwestern Nigeria background usually are composed to depict recent or ongoing occurences, or presages of things that might happen. The Yorubas originally objectify music. There are genuine innovations of musical instrumentals like dundun, iya ilu, agidigbo, sekere, bembe, akuba, omele ako, omele abo, sakara, bata drum, ashiko, agbe, gudugugu, saworo and many more. (Indigenous musical instruments). On Mode of Dressing Yoruba Ethnic group has distinguished and indigenous wears and adornment, patterned to exhibit the full beauty of her people. Inherently, careful attention is given to outfits, because the Yoruba people believe that the way one dresses determines how one would be addressed. There are established styles for males, different to what females wear. While males are attributed to wears like buba, esiki, sapara, dandogo, agbada, kembe, sooro, kamu, sokoto elemu, all of which are males native wears, females are traditionally portrayed in wears like iro, buba (similar to skirts and blouse) and heagears, natively called ‘gele’. On Food Iyán called pounded yam has been noted to be the revered meal  of the Yorubas. This traditional meal is well prepared and eaten with styles of soup like any well steamed vegetables.Other traditional foods indigenously prepared by the Yorubas include amala, eba, pupuru, ogi, egbo ati ewa, momoi (Ppudding bean) and more. On Religion and Festivals The Yoruba homeland ever since antiquity has based her cultural belief alongside cosmology. There are diviners and divinations. The Yorubas believe in the existence of the supernatural called “Olodumare.” Olodumare is believed to be the overseer of the world, and can be relatively called God. In furtherance, the Yoruba ethnic group traditionally consults Ifá, a system of divination to make inquiry into the fate of a man or source resolution to any conflicting issue happening within or around the Yoruba Society. When consulting Ifa, being an oracle, traditional priests requests and make findings on vague issues through Orunmila. Orunmila, a deity, according to popular belief in the Yoruba Cultural system is said to be a god who was well involved in creation of the whole world. Basic festivals in Yoruba tradition includes Masqurades displays, Osun osogbo festival, Odunde festival, eyo festival and more. In many of these festivals, foreign tourists and sociologists visit. Final Reservation The Yoruba people are bonded together through an amazing culture and can be found in Southwest Nigeria. By extension, there are the Igbohos, Ede, Ikoyi Igbo, Iresa and others under the Yoruba dynasty. The Yoruba people are steadily growing in population. Some groups of the Yorubas can be found in neighboring countries like Togo, Benin and part of Ghana. UCLan MA Social Policy How to contribute to Applied Worldwide Learn sociology with applied worldwide explore society with applied worldwide teach socially with applied worldwide
Kobe Bryant summary Select Citation Style Below is the article summary. For the full article, see Kobe Bryant. Kobe Bryant, (born Aug. 23, 1978, Philadelphia, Pa., U.S.—died Jan. 26, 2020, Calabasas, Calif.), U.S. basketball player. Bryant, whose father also played professional basketball, entered the NBA draft straight from high school. He was picked by the Charlotte Hornets in 1996 but was soon traded to the Los Angeles Lakers. When the 1996–97 season opened, he was the second youngest NBA player in history. Bryant, a shooting guard, helped the Lakers win five championships (2000–02; 2009–10). In 2008 he was named the league’s Most Valuable Player. He retired following the 2015–16 NBA season. In addition to his professional accomplishments, Bryant was a member of the Olympic gold medal-winning U.S. men’s basketball teams in 2008 and 2012. In 2015 he wrote the poem “Dear Basketball,” which served as the basis for a short film (2017) that he narrated. The work won an Academy Award for best animated short film. In 2020 Bryant died in a helicopter crash.
What is Sikhism Religion all About?🥇History of Sikh Dharm What is Sikhism?| History of Sikhism This is the Hari Mandir, the world’s largest free kitchen. It serves free vegetarian food to about 100,000 people every day. It’s also the holiest site in Sikhism. The 5th largest and youngest of the world religions. A religion that preaches about love, peace, and the equality of humankind, but also asks its followers to carry swords. So who is the Sikh’s, what do they believe, and why does everyone confuse them for Muslims? Well, Let’s Find Out. Read it in Hindi सिख धर्म क्या है ? 🙂 Sikhism originated in the Punjab area of India and Pakistan, 500 years ago. Punjab, the land of five rivers, is one of the most historically and culturally dense areas on Earth. This was the home of one of the world’s earliest civilisations, the Indus Valley Civilisation. Persians, Greeks, Central Asians, Muggles, the British, and others have invaded here…. I meant Mughals, Mughals invaded here. Hinduism, Buddhism, Islam, Jainism, and a handful of other faiths have all left their mark on the region. The diverse culture of Punjab has heavily influenced the Sikhs. Today there are about 25 million Sikhs. They make up about 2% of India’s population but about 60% of Punjab’s. The Sikh diaspora is spread out across the world with concentrations in the UK, Canada, The US, East Africa, Australia, and Malaysia. Sikhs interestingly enough make up almost 1.5% of Canada’s population which is second only to India. The word Sikh simply means learner. Sikhs called their religion ‘Sikhi’, ‘Gursikhi’, and ‘Gurmat’. You can’t really understand the Sikhs without understanding their relationship with Gurus. The word guru means a teacher or spiritual guide. The Guru teaches and the Sikh learns. The Sikhs follow the teaching of 10 succeeding Gurus that shaped Sikhism. The first and most important Guru is Guru Nanak. The founder of Sikhism. Born in 1469 CE near what is today Lahore Pakistan. Nanak was seen as special even as a child. As a baby, he was said to have had the laugh of an adult man. As a teen, he preferred to listen to Hindu Saints and Sufi Muslim preachers than follow his parent’s orders. As an adult Nanak would settle in Sultanpur where he worked for the government. The actions of his fellow government officials and the rich and powerful disgusted him as they exploited ordinary people and he hated the caste divisions that he saw all around him. One day while bathing in a river near Sultanpur Nanak had a miraculous experience. He was swept up into God’s court where God spoke to him. Nanak reappeared three days later declaring: “There is no Hindu and there is no Muslim.” There was only God. This was a message inspired by his experience with God, one that spoke in favour of the equality of humankind and against caste, ethnic, and religious divisions. Nanak would later say: Accept all humans as your equals And let them be your only sect. Nine human gurus followed Nanak all preaching the same message of One God and the equality of humankind. Two fundamental events that shaped Sikh history was the martyrdom of two The First was the fifth Guru, Guru Arjan who was roasted alive by the Mughal Emperor Jahangir. The next martyr would be the ninth Guru, Guru Tegh Bahadur. He was beheaded by the Mughals while attempting to defend the religious rights of Hindus. His son Guru Gobind Rai the tenth and final human Guru started a new Sikh community called the Khalsa and ended the line of human Gurus by making the Guru Granth Sahib, the Sikh Holy Book the last living Guru. We’ll look at both of these in a bit. So with that brief history out of the way, let’s look at the core beliefs of Sikhism. What is Sikhism?| History of Sikhism One God The Sikh holy book, the Guru Granth Sahib’s opening sentence is just two words. Ik Onkar – “The is only one God” Nanak made sure it was clear that the focus was on “one”. Ik doesn’t just mean one, it is literary the numeral 1. One God is by far the most important belief in Sikhism. This may not be the kind of God you’re used to though. Sikhs believe in a formless, genderless, universal god, beyond description. This God is all of reality, it is within everything. They believe no idol or image could ever represent this being, so they use the sacred symbol of Ik Oankar to represent it instead. Many Sikhs refer to this one God by the name Waheguru, Wondrous Lord. Guru Nanak and his followers constantly emphasized that this one could be understood in many different ways. No religion had a monopoly on the Truth. Nanak’s One God could be known as Vishnu, Allah, the Tao, Yahweh, The Algorithm, or any other name or belief. There was no need to fight over whose god was the true God, as they were all the same One. Recognize all mankind, whether Muslim or Hindu as one. The same God is the Creator and Nourisher of all; Recognize no distinctions among them. The temple and mosque are the same; So are the Hindu worship and Muslim prayer. Human beings are all one. – Guru Gobind Singh The lack of gender for this One God means that there is no difference between men and women in Sikhism. Sikhism was among the first major world religions to make the radical suggestion that maybe women are human beings too. Women in Sikhism have fought in battles, led religious services, and even acted as some of the longest-reigning leaders of the entire community. Sikhism isn’t based on doing things to get into some heaven or hell. Hell is just life on Earth, which your soul is constantly reborn into after you die. Which is ehhh…pretty dark. You see, Sikhs believe in reincarnation and karma, similar to Buddhists, Hindus, and Jains. But. Sikhs believe that karma is modified by God. As in karma might decide what life your born into but God makes sure that everyone can become a good person in their lifetime if they try. The goal of Sikh life is to break free from the cycle of rebirth by merging their soul back into God’s soul. One does this by releasing that you are already a part of god, you just need to let go of your ego. When your soul remerges back into God’s this is called Mukti, which is similar to Hinduism’s moksha and means liberation. When you remerge your soul is released from the cycle of rebirth and death and becomes infinite, timeless, and blissful. This is the closest thing Sikhs have to heaven. Sikhs believe that God is real, God is the universe that we exist in. But we forget this because humans are distracted by illusion or Maya, which is anything that takes your mind off God. Read Hindi History Blog  🙂 Read English History Blog  🙂 Read   हिन्दू धर्म क्या है🙂 Read   What is Hindu Religion all About  🙂 Read इस्लाम धर्म क्या है? 🙂 Read what is islam religion all about  🙂 Maya keeps people trapped in the cycle of rebirth and death. Guru Nanak thought that Maya built a wall between people and God. The wall of Maya is built with the 5 Thieves: 1. Lust (Kham), 2. Anger (Krodh), 3. Greed (Lobh), 4. Attachment (Moh), 5. and Pride (ahankar). It is the duty of all Sikhs to avoid these thieves. The five thieves are caused by humans, literally I-Myself. Haumai makes people say I am this I am that, it separates you from others. Which blocks you from realising your oneness with God. This ego causes people to live only for themselves, to spew negativity, and to crave power and wealth. Such a person is called manmukh, facing towards desires. Guru Nanak saw the world’s problems as the negative effects of ego. Hindu v Muslim, Israeli v Palestinian, Sitting down wipers v Standing up wipers. All these conflicts are caused by Ego and Maya. The Guru Granth Sahib said it is not a religion or race but ‘it is wealth that divides brothers’ (GG: 417). But Guru Nanak taught that there was another direction people could face. By being a spiritual person practicing Compassion (Daya), Truth (Sat), Contentment (Santokh), Humility (Nimrata), and Love (Pyar) and meditating on God you could instead become Gurmukh, facing towards the Guru. How does one become Gurmukh and egoless? Well, Sikhism offers a path to follow that can help, called the Three Pillars. Three Pillars The Three Pillars are: Naam Japo: Meditation on God and the reciting and chanting of God’s Name—Waheguru. This is normally done in the morning and before bed. This isn’t supposed to just be some mindless ritual either, Sikhs are supposed to genuinely reflect on the qualities of God as they do this. What is Sikhism?| History of Sikhism Kirat Karni: – Working hard and making an honest living. Guru Nanak said, “Only he who earns his living by the sweat of his brow and shares his earnings with others has discovered the path of righteousness.” Wand chhakna: – Sharing the fruits of your labour with others, providing free food, and donating to the community. The Sikh tradition of a communal meal (langar) at the gurdwaras is part of Wand Chhakna. The langar or communal free kitchen inside a Sikh gurdwara, which is their equivalent of a church or mosque, is open to all who visit. Regardless of caste, faith, or gender. These serve vegetarian food to all, not because Sikhs have to be vegetarian but simply because that means all people of all diets can partake. So if you want a taste of typical Punjabi food just visit a gurdwara. In Guru Nanak’s time, the idea of different castes sitting together on the floor and eating side by side was a revolutionary act. Famously the Mughal Emperor Akbar visited Guru Arjan and the Guru would not meet him until he partook in the langar. Which the Emperor did, sitting side by side with peasants. Guru Nanak claimed an enlightened person are ‘those who view everyone equally, like the air touching king and beggar alike’ (GG: 272). Another vital part of Sikhism that isn’t one of the Three Pillars is Seva – selfless service. Through service to their community, Sikhs can become more humble and overcome their ego. Seva can include cleaning up the gurdwara, preparing food, or cleaning dishes in the langar or it can include volunteering, building things for your community, or subscribing and ringing the notification bell on educational Youtube channels. Through remembering God’s name, honest work, and sharing, selfless service, and avoiding the Five Thieves a person can rid themselves of egoism and be released from the cycle of rebirth and death. The Khalsa Guru Gobind Rai was the son of the ninth Guru, Tegh Bahadur, who was beheaded by the Mughals and his body was abandoned by his Sikh entourage. They fled easily because no one could recognise them. So Guru Gobind decided the give Sikhs a distinct look from now on so that they would be compelled to always uphold Sikh values. In 1699 Guru Gobind brought his Sikhs together at Anandpur. After their morning prayer, he stood in front of the huge crowd and demanded a human sacrifice. The shocked crowd was silent for a while before one Sikh rose up and entered the Guru’s tent. The Guru followed them in. What is Sikhism?| History of Sikhism And then…… The guru comes out with blood on his sword. He demands another sacrifice, another Sikh offers themselves and enters the tent….. Again only the Guru comes back out of the tent, bloody sword in hand… again another sacrifice….and again… until finally after the 5th sacrifice the Guru reemerges with the 5 Sikhs all wearing saffron-colored robes The Guru declares these to be the panj pyarey, the five beloved ones. They would form the centre of a new Sikh community called the Khalsa. He offered them Amrit, a bowl of sweetened holy water. All five, who belong to different caste groups, drank the Amrit from the same bowl, which would have been a huge deal back then. This signified that they had joined a new, casteless family, the Khalsa. Each of the volunteers had to leave behind their old surnames or caste names and adopt the same surname, Singh. Which comes from the Sanskrit word Simba, meaning lion… I KNOW RIGHT! It has no relation to the Bantu word Simba which also means lion, it’s just a weird coincidence. The Guru then begged the Five Beloved ones to let him join their Khalsa. They offered him the Amrit and the Guru became Guru Gobind Singh. Women were admitted to the Khalsa, the same way as men. After drinking the Amrit they received the surname Kaur, which means princess. The Khalsa gave the Sikhs a new unified identity. Tied together as one family, with one name, without caste with the goal of defending the weak and promoting justice. Today many Sikhs still undergo the Amrit ceremony and take the surnames, Singh and Kaur. The Khalsa were also given new rules to follow which include the wearing of the panj kakaar or the Five K’s. kes – Uncut hair to represent discipline kargha – A small comb in the hair kirpan – A sword to uphold justice and protect the weak, nowadays it’s usually a small sword. It is not an offensive weapon and the Sikh Code of Conduct claims it can only be used to “destroy tyrants and oppressors. It must not be used for anything else” kachhahira – A kind of loose-fitting boxer shorts, to represent sexual restraint and kara – A steel bracelet, its circular shape represents the infinity of God Interestingly the turban is not one of the Five K’s. Instead, it’s worn to cover the Sikh’s long uncut hair, the kes. Turbans have become essential to Sikh identity and hold very special significance to them. If you see someone wearing a turban that vast majority of the time it will be a Sikh, not a Muslim. What is Sikhism?| History of Sikhism Guru Granth Sahib The Guru Granth Sahib is the Holy Book of the Sikhs. It contains the teachings of the Gurus and acts as a spiritual guide for Sikhs around the world. It is probably one of the only Holy Books that contains not only the writing of the religious founders, written by themselves, rather than after their death. But also the writing of people from other faiths. The writings of Muslims and Hindus can be found throughout along with references to Judaism, Buddhism, and Christianity. Before his death in 1708, the tenth Guru Gobind Singh ended the line of human gurus by bestowing guruship on the Adi Granth, turning it into the Guru Granth Sahib, making it similar to both the Bible or Koran and a living Prophet at the same time. Guru means Guru, Granth means book and Sahib means lord. Since that moment, the Guru Granth Sahib has been revered as the current living guru. It is treated with extreme care and respect. The Granth is not only read but sung, it’s made up of thousands of hymns. Sikhs don’t have mass or service but a kirtan, meaning communal singing. Normally these are set to classical Indian music. Gurdwara Sikhs gather at gurdwaras, a word meaning ‘doorway to the Guru’. A gurdwara is only a gurdwara because it has a copy of the Guru Granth Sahib in it. Men and women of all castes and social standing gather there to join in prayer, singing, and eating. This is where you will find the langar. Anyone can visit a Gurdwara and partake in the service and meal. You only need to follow basic etiquette. Cover your head, remove your shoes, wash your hands as you enter, and don’t bring any tobacco or drugs inside. The most important Gurdwara in the world is the Hari Mandir or Golden Temple located in Amritsar, India. In 1604 Guru Arjan completed work on the Golden Temple and had the Guru Granth Sahib installed in it. As a gesture of religious tolerance, Guru Arjan invited a Muslim, Mian Mir, to lay the foundation stone of the Golden Temple. The Temple has four doors opening on all four sides, to show an openness to all cultures and peoples. But on the inside only one door leads to the inner sanctum, indicating that all paths and beliefs eventually lead to the One God. The Langar at the Golden Temple serves a free meal to about 100,000 people each day, making it the world’s largest free serving kitchen. All run and staffed by volunteers. The waiting list to volunteer in the Golden Temple has hundreds of thousands of names on it. Thanks a lot for reading. Please do comment. Share This AUTHORNishant Chandravanshi Nishant Chandravanshi is the founder of The Magadha Times & Chandravanshi. Nishant Chandravanshi is Youtuber, Social Activist & Political Commentator. Wordpress (1) • comment-avatar […] Read it in English What is Sikhism Religion all About  […] • Disqus (0 ) %d bloggers like this:
Obama’s Green Coal It was at the onset of the Nazi era that coal-to-liquid technology came to the forefront of modern energy science. In the latter part of the 1920s, German researchers Franz Fischer and Hans Tropsch developed the initial processes to liquify the dark rock into fuel. The procedure was utilized throughout World War II by both Germany and Japan. In fact, coal-to-liquid technology largely fueled Hitler’s bloody campaigns, as Germany had little petroleum reserves but held vast amounts of coal deposits throughout the country. Not too unlike the United States’ fossil fuel status today. By 1930 Fischer and Tropsch had applied for several U.S. patents, but it wasn’t until earlier this summer that the first U.S. coal-to-liquid plant had been slated to be constructed in West Virginia. But while liquid coal may help replace petroleum based fossil fuels, it is certainly not an answer to climate change. The price of oil per barrel has risen dramatically in the past year, and the U.S.’s dependency on foreign crude has become less stable as tensions in the Middle East have escalated with the ongoing war in Iraq and the potential confrontation with Iran. The major presidential candidates have laid out their plan of attack to dealing with the crisis, echoing many old solutions to our 21st century environmental troubles. Sen. John McCain, for example, wants to drill off the coast of California, build dozens of nuclear plants from Oregon to Florida, and slightly increase fuel efficiency of automobiles. Similarly, Sen. Barack Obama supports an array of neoliberal strategies to deal with the country’s volatile energy situation. He is not opposed to the prospect of nuclear power, endorses capping-and-trading the coal industry’s pollution output, and supports liquefied coal. Well, that’s a maybe on the latter. You did not just read a lofty proclamation from a change agent, but a well-crafted rationale meant to appease green voters. Meanwhile, back in the Senate, Obama’s record relays a much different position on the subject. It was only six months before the aforementioned email that Republican Senator Jim Bunning and Obama introduced the Coal-to-Liquid Fuel Promotion Act of 2007. The bill, introduced in January 2007, was referred to the Senate committee on finance and, if passed, would ultimately amend the Energy Policy Act of 2005 as well as the Energy Policy and Conservation Act to evaluate the feasibility of including coal-to-oil fuels in the Strategic Petroleum Reserve and provide incentives for research and plant construction. Has Obama had a change of heart, or has he just flip-flopped around like a suffocating fish for political leverage? The answer to that question may reside along the nuanced path we are getting all too used to seeing candidate Obama traverse these days. As his campaign website reads: The apartheid government of South Africa was the first to use liquid coal for motor vehicles, and it seems, despite the “low carbon coal” rhetoric, that Obama may be poised to carry on the dirty legacy of liquid coal. Sen. McCain, for what’s its worth, has also announced support for “clean coal” technology. As a result of our consumptive lifestyles, the mountaintops of Appalachia, from Tennessee up to the heart of West Virginia, are being ravaged by the coal industry — an industry that cares little about the welfare of people or the land that it is adversely affecting with its mining operations. The debris from the holes, often 500 feet deep, produce toxic debris that is then dumped in nearby valleys, polluting rivers and poisoning local communities downstream. There has been little to no oversight of the wholesale destruction of these mountains and Obama and McCain have not addressed the ruin in any of their bullet point policy papers on “clean coal.” No state or federal agencies are tracking the cumulative effect of the aptly named “mountaintop removal,” where entire peaks are being blown apart, only to expose tiny seams of the black rock. Any “clean coal” technology, whether it be liquidification or otherwise, would surely rely on the continuation of such brutal methods of extraction, and carbon output would still be significant. Like his Republican opponent, Obama has stayed silent on the issue of mountaintop removal. McCain’s ignorance may be for a reason, however, as the presumptive Republican nominee has received over $49,000 from the coal industry this election cycle compared to Obama’s meager $12,000, which makes Obama’s green coal embrace all the more bewildering. Sen. Obama may receive high marks from the League of Conservation Voters and be touted by the Sierra Club for being marginally better than John McCain on the environment, but when it comes to his position on the U.S.’s coal extracting future, the senator’s position is not only wrong, it is absolutely disastrous.
Forgot Password? Or login with Facebook Defense Visual Information Distribution Service Logo Museum Audio Tour 15: Modern Flight Gallery: Korean War ANG/AFRES Advanced Embed Example Audio by NMUSAF PA  National Museum of the U.S. Air Force When North Korea invaded in June 1950, the U.S. Air Force was, in the words of Chief of Staff Gen Hoyt Vandenberg, a “shoestring air force.” In the Far East, the U.S. Air Force was equipped for the air defense of Japan, but had inadequate resources for combat on the nearby Korean peninsula. To increase its strength, the Air Force mobilized its only available resource—thousands of Air Force Reserve and Air National Guard Airmen. Most were WW II veterans, and their training and experience proved invaluable to the war effort. The sudden emergency in Korea needed a quick response, but leaders worried about using Guard and Reserve forces outside the US. The Korean War’s unique character as a “UN police action” forced questions about how reserve components should operate. The Cold War’s needs for huge amounts of people and equipment at bases worldwide complicated the roles of the Guard, the Reserve, and regular forces. Inefficiency and dissatisfaction with the Korea call-ups led to legislation during the war to untangle the situation, including making all men between 18 ½ and 20 liable for military training and service. Those up to age 26 had to register under the Selective Service System, and the young men could be drafted during war or peace. This was a response to frustrated WW II veterans who had to go back to war in Korea because there was no time to call anyone else. The government first called for volunteers, and then began involuntary mobilization. From the Guard and Reserve, the Air Force needed not just pilots, but people in every specialty. Between 1950 and 1953, the Air Force called up 146,683 Air Force Reservists and 46,413 National Guardsmen to fight the war in Korea and fill Cold War needs by increasing forces around the world. This number was about equally divided between officers and enlisted members. Reserve and Guard Airmen filled roles in every part of the Air Force during the war, from combat flying in bomber, fighter, airlift, and rescue units, to all manner of ground support jobs at forward and rear bases in the Far East and elsewhere. Mobilization for Korea led to greater equality and cooperation among active duty and reserve forces because Guard and Reserve Airmen played an essential part in the young U.S. Air Force’s success as a combat-tested service. Date Taken: 12.31.1969 Date Posted: 09.02.2015 12:12 Category: Newscasts Audio ID: 41914 Filename: 1509/DOD_102704071.mp3 Length: 00:02:52 Album Museum Audio Tour Track # 15 Location: DAYTON, OH, US  Web Views: 4 Downloads: 0 High-Res. Downloads: 0
Learning On How to Start Your Own Company Participantes en "DepoEmprende na Escola" Thinking like a real business person is a long shot for some people but that should be encouraged as soon as possible to achieve good results. Beyond getting to becoming acquainted with the tools which one will be able to count on to face the task of starting a business, what make a difference between an entrepreneur and the average business person is to have an open mind and an attitude towards curiosity, which leads them to not be afraid to venture into unknown territory to develop a business idea. Promoting these skills from an early age is fundamental for society to end up benefiting from the wealth and employment generated by this type of people. Alumnos mostrando os produtos da súa cooperativa Alumnos mostrando os produtos da súa cooperativa DepoEmprende na Escola is an ambitious project that tries to implant in the schools the basic ideas that can allow the children of today become the entrepreneurs of tomorrow. And if they do not succeed or simply look for another path, at least they will have a set of tools that will help them achieve their goals in other aspects of their personal and professional life. Among the objectives of the program are the following: -To Develop the ability for children to form an adjusted image of their own person, their characteristics and possibilities in relation to their socio-professional environment and carry out activities that promote knowledge of their own interests and motivations. -To Develop creative capabilities, initiative and entrepreneurial spirit in the development and development of personal training and professionalization strategies, based on knowledge of their own characteristics and potential. -To Develop the ability to make responsible decisions, resulting from the contrast between self-knowledge, observation and basic understanding of the socio-economic environment. -To Develop an attitude of inquiry and curiosity regarding the characteristics and demands of the local and regional socioeconomic environment. In addition to encouraging interest in participating and intervening in the development of this environment with autonomy and a sense of initiative. -To Develop the ability to obtain, select and interpret information, and use it autonomously and critically according to the purpose pursued and to be able to communicate it to others in an organized manner. -To Know the rules of group operation and develop habits of entrepreneurial awareness, referred to the company or another type of association. -To Start in the identification and knowledge of the elements and basic principles of the implementation of a project. These objectives will be accomplished with the creation of cooperatives by the 5th and 6th grade Primary and Special Education students from different schools in the region. During the 2016-17 academic year, a total of 11 cooperatives have been created and the participants in the project have been able so far to showcase their products in a final event that took place in the capital of Pontevedra at the end of the school term. Please enter your comment! Please enter your name here
Happy birthday, PIXEL You are 56 today and you don’t look a day over one Posted: By Jon Peddie 09.25.21  Image credit, JVC Creative Commons On a cool early autumn day in Bellingham, WA, in 1965. The Society of Photo-Optical Instrumentation Engineers—SPIE staff were still in the glow of celebrating their 15th anniversary when they published Frederic Billingsley’s paper, Digital Video Processing at JPL. They didn’t know it at the time, but it was a landmark publication and firmly established the name and characteristic of The Pixel.[l] The larger part of the job of digital picture processing turns out to be the necessary bookkeeping involved in getting a picture of, say, 600,000 picture elements (pixels) processed in a system having only 65,000 bytes of core. (A pixel is a sample of the picture such that the highest spatial frequency contained in the picture is sampled with two pixels. The system is designed such that intensity levels may be defined to one part in 256 and thus be described by 8 bits. A pixel and a byte are therefore synonymous in this usage.) —F. C. Billingsley, “Digital Video Processing at JPL,” SPIE, Vol. 0003, 1965 Forty years later, in 2006, SPIE published Richard Lyon’s extraordinarily researched essay on A Brief History of ‘Pixel’ — the birth of the name Pixel by Billingsley.[ii]  Frederic Crockett Billingsley at JPL (Source: Richard Lyon) Not that the doughty pixel didn’t have competition. IBM and Bell Labs preferred to use pel, picture element, as the smallest addressable element in a raster image. Lyon’s paper traces the competition between the use of pel by IBM and Bell Labs and the use of pixel. Pel is more logical and easier to use, but pixel is just more fun. The pixel had plenty of competition, such as points, point array, spot, raster elements, picture points, and others. Adopted by the International System of Units (si), the pixel, abbreviated as px, is used for measurement in graphic and web design (and before that, typography), it is equivalent to roughly 1/96th of an inch (0.26 mm). Developers used it to make sure a given element will display as the same size no matter what screen resolution views it. In 2013 Google had the audacity to try and co-op the name pixel and applied to their smartphone. And then, in August 2021, cofounder of Pixar, Alvy Ray Smith, published his book, A Biography of the PIXEL.[iii] Alvy says that the bit became the universal medium, and the pixel—a special packaging of bits—conquered the world. Once we enter the digital world, says Alvy, almost every picture in the world is constructed of pixels—images on a smartphone, Mars Rover transmissions, app interfaces, book illustrations, and videogames. Alvy says that the pixel is the organizing principle of most modern media, and he presents some uncomplicated but insightful ideas that combine the dazzling varieties of digital image-making. In his book, Alvy starts his story of the pixel’s development with Fourier waves, follows that through Turing machines, and arrives at the first digital movies from Pixar, DreamWorks, and Blue Sky. Today, says Alvy, almost all the pictures we meet are digital—facilitated by the pixel and separated irretrievably from their media; museums and kindergartens are two of the last outposts of the analog. Alvy is a great storyteller. In the book, he charmingly and invitingly explains how pictures that are composed of invisible stuff like data become visible—that is, how digital pixels convert to analog display elements. Taking the particular case of digital movies to represent all Digital Light (his term for pictures constructed of pixels) and drawing on his decades of work in the field, Alvy tells the story from multiple angles—art, technology, entertainment, business, and history. A Biography of the Pixel is a wonderful read for anyone who has played a videogame, seen a movie, or watched a video on a smartphone and wondered about where and how it came to be. But what IS a pixel? Wikipedia says: a pixel, pel,[iv]; or picture element[v]; is the smallest addressable element in a raster image or the smallest addressable element in an all-points-addressable display device; so, it is the smallest controllable element of a picture represented on the screen. But a pixel can be subdivided and theoretically infinitely. And the subdivisions are controllable, although they may not be visible to the naked eye; Epic’s epic Nanite demo proved that. Subdivided pixels—this is what 20-million triangles look like at 4k—each color represents a different triangle (Source: Epic Games). And, referring to Alvy Ray’s book, pixels are not little squares, even though they are frequently represented that way. The word pixelation particularly irks him because it has institutionalized the misconception of what a pixel is. (Side note—pixelation is a term popularized by animators, including Norman McLaren and Grant Munro, for stop-motion animation.[vi]; and is not the same thing as pixElation)  Seurat’s Parade de cirque, 1889 (Source Metropolitan Museum of Art, Public Domain) Alvy says pixels have no shape and are just samples taken (hopefully) at a regular interval, like a grid. They have no dimension, no width, weight, or even color; in fact, you can’t even see them; they are a mathematical construct. They have a weighting, a number that can represent a color or shade of gray. And they can be assigned a location (x, y) in real-world dimensions, computer dimensions, or screen dimensions.  This writer has yet another definition of the pixel: It is the point of contact in the man-machine interface where information is transferred. A pixel can be thought of as a letter or punctuation mark, and the screen it is buried in as a book. Individually or in concert with its companion pixels, it conveys meaning and purpose. It can be transient or permanent. It can be personal in the form of an AR retail impingement or communal in the form of a video wall and every imaginable manifestation in between. Pixels can even be simulated in the brain for the blind with an implant in the visual cortex.[vii] Pixels have been with us since the first reproductions, which can be traced to cave drawings and epitomized by Georges Seurat and Paul Signac. They became digital in the 1950s as part of the missile defense system in North America, NORAD, and today we literally could not live without them. I’ve been chasing pixels since the 1960s. I’ve loved many I’ve seen, been scared by others, and questioned the creators’ s motivation on still others. In the most extreme sense, you could say the Sun is a pixel in the universe’s canvas. May the pixels be with you. [l] F. C. Billingsley, Digital Video Processing at JPL, (1965) in Eugene B. Turner (ed.), Electronic Imaging Techniques I, Proceedings of SPIE, Vol. 0003, pp. XV-1–19 [ii] Lyon, R. "A brief history of 'pixel, (10 February 2006)Proc. SPIE 6069, Digital Photography II, 606901;  [iii] Smith, A. (Aug 03, 2021), A biography of the PIXEL, The MIT Press, 560 Pages, ISBN 9780262542456, [vi] Gasek, T. (January 17, 2013). Frame by Frame Stop Motion: NonTraditional Approaches to Stop Motion Animation, Taylor & Francis. p. 2. [vii] Juskalian, R. (February 6, 2020), A new implant for blind people jacks directly into the brain: Researchers have successfully bypassed the eyes with a brain implant that allows rudimentary vision, MIT Technology Review,
Readers ask: What Is Environmental Manipulation In Social Work? What is a manipulation technique? The act of influencing and convincing others to embrace beliefs or behaviors that advance the interests of the manipulator, while coming at a cost for the manipulator’s target(s) In this article, we explore: Manipulation techniques. Practical examples of manipulation. Manipulative strategies for personal success. What is role manipulation? What is positive manipulation? An attempt to strategically influence a situation doesn’t have to be labeled manipulative if it’s not done for personal gain. A positive manipulation could also be known as a “contrivance.” What are signs of manipulation? Signs of Manipulation • They know your weaknesses and how to exploit them. • They use your insecurities against you. What are examples of manipulation? Examples of Manipulative Behavior • Passive-aggressive behavior. • Implicit threats. • Dishonesty. • Withholding information. • Isolating a person from loved ones. • Gaslighting. • Verbal abuse. • Use of sex to achieve goals. You might be interested:  FAQ: What Is The Definition Of A Physical Therapy Manipulation? How do you outsmart a manipulator? How To Outsmart A Master Manipulator 1. Avoid contact with a master manipulator. 2. Say no to being manipulated. 3. Ignore the would be manipulator. 4. Set personal boundaries. 6. Assume responsibility for what you do. Is manipulation ever good? No one likes being manipulated. Whether it’s in our personal or professional lives, the idea of manipulation is generally considered to be a bad thing. Most of us associate it with negative connotations, such as people trying to take advantage of us or push us into doing something we don’t really want to do. What are signs of manipulation in a relationship? 5 Warning Signs of Manipulation in Relationships • They force their insecurities on you. • They make you doubt yourself. • They make you responsible for their emotions. • They make you believe that you want what they want. What is a nice word for manipulation? What is another word for manipulative? cunning calculating shrewd sly wily artful designing guileful Machiavellian unscrupulous What are examples of emotional manipulation? Some of the most common include: • Using intense emotional connection to control another person’s behavior. • Playing on a person’s insecurities. • Lying and denial. • Hyperbole and generalization. • Changing the subject. • Moving the goalposts. • Using fear to control another person. Are manipulators intelligent? You might be interested:  Quick Answer: What Is Shoulder Manipulation In Therapy? What are the signs of a manipulative man? • You feel fear, obligation and guilt. • You’re questioning yourself. • There are strings attached. • What to do if you think you’re being manipulated. What are the signs of Gaslighting? Signs of gaslighting • no longer feeling like the person you used to be. • being more anxious and less confident than you used to be. • often wondering if you’re being too sensitive. • feeling like everything you do is wrong. • always thinking it’s your fault when things go wrong. • apologizing often. What are the signs of a manipulative woman? People who are manipulative want things their way and proving them wrong about something just fires up their emotions. Such people find it very hard to admit their mistakes or apologise for them. Also when caught in an unfavourable situation, they “play dumb” and start playing the victim card. Leave a Reply Related Post
What Is Governance, Risk, and Compliance (GRC) and Why Do You Need It? what is governance risk and compliance grc As your business grows, the operations you get used to will inevitably change and become more difficult to manage. As things progress, the spread of your company will prove to be complex and tough to hold in line with your standards and the standards of the market. Governance, risk, and compliance (GRC) is a term that is commonly used to describe the general process of managing a company, responding to legitimate risks, and operating in line with the law.  We're going to talk about GRC in this article, giving you some insight into how to do it well, and the potential risks involved with mismanagement.  What Is Governance, Risk, and Compliance? We'll explore each term individually, then discuss the importance of handling these issues in a unified way. Let's get going on GRC. The "G" in GRC refers to the way that senior executives and owners handle the management structure of the business. When the chain of command or the structure of your workforce is in good order, things are prone to operate more smoothly.  Additionally, adherence to codes and the transfer of information become much more effective under a successful management approach. As a company expands, managing these processes becomes more and more difficult, placing more responsibility on executives.  Risk Management The "R" in GRC captures how a company responds to the risks it's experiencing. Any obstacle that can get in the way of a business' objectives can be considered a significant risk.  The response to risk as well as the search for risk are both significant here. That means having a smooth way to communicate information across different layers of your business and the ability to identify what is risky and how to respond.  An element of risk management is also implementing procedures that aim to eliminate risk before it arises. Compliance is the process of working your business to achieve the expectations and regulations placed on your business by governmental or municipal entities. This requires management to understand regulations and have the skills and procedures in place to ensure that the workforce meets those expectations. It's a tough thing to do, but it's absolutely essential if you don't want to be subjected to fines and penalties. The Importance of Overlap It's very important to note that all three of these concepts have a significant amount of overlap with each other. That's why they're lumped together into "GRC." Any effort to handle all of the responsibilities listed above should account for the unity of these concepts. If you try to handle governance, risk management, and compliance separately, you will end up losing significant amounts of money and time.  Sometimes, it's essential to use the help of GRC software like security weaver to streamline these processes. If you can manage to unite your efforts to improve GRC, you'll be able to save countless hours and boost your bottom line.  Want to Learn More? Running a growing business is exciting but tricky. There are a lot of things that you have to keep an eye out for as you move forward. Keep compliance and reduce risks!  Whether you're reworking your governance, risk, and compliance approach or trying to hire the most effective staff, we're here to help. Explore our site to learn more about how to do business the right way. Visit the Legal and Politics sections of our website right now!
Two-dimensional Liquid Helium System 31 Jan 2019 Nicoletta Lanese The Quantum Dynamics Unit traps a 2-D layer of electrons in liquid helium, held inside a sealed chamber and cooled to nearly absolute zero. Inside the chamber, a metal plate and spherical mirror on the top reflect microwave light (the red beam), and thus form a microwave cavity (resonator). The trapped microwaves interact with the electrons floating on the liquid helium. Download full-resolution image
Cookies on this website Understanding the molecular subtype of a cancer is becoming an importance part of the diagnostic process as it helps a doctor better understand a patient’s prognosis, determine the best course of action for treatment and helps researchers devise new, more-efficient, precision therapies. Image information can be used to predict the molecular classification of patient tumour samples in colour, using state-of-the-art deep learning models in pathology © S:CORT Colorectal cancer (CRC) currently has four known molecular subtypes which are identified on the basis of its RNA expression profile, using RNA analysis. But the process of RNA analysis is costly, technically challenging and it requires a specialist to interpret data to determine the subtype. In order to more efficiently and cheaply determine the molecular subtype of a patient’s CRC, there is a need to use more easily-acquired data on a tumour and categorise its subtype based on an automated technique. One prevalent source of data in cancer diagnostics is images, such as histological images of the microscopic anatomy of a cancer. Almost all CRC patients already have a sample of their tumour inspected by a pathologist as part of their standard care. A new paper published by Dr Korsuk Sirinukunwattana, Dr Enric Domingo, Prof Viktor H Koelzer & Prof Jens Rittscher from the Stratification in Colorectal Cancer consortium (S:CORT), has demonstrated the potential for using these images to determine molecular subtype. Through the training of a deep-learning neural network, using over 1,000 tumour samples, the team discovered that AI could be trained to distinguish between the four molecular subtypes using images alone. Usually, histological images are a modest indicator of how colorectal cancers have progressed, and there is currently no way to determine the molecular subtype of a tumour by the human eye alone, without doing a gene profile on tumour samples. However, this new study demonstrates that technology can be trained to identify the minute morpho-molecular differences between molecular subtypes. This new concept, called Image-based Consensus Molecular Subtyping (imCMS), will allow images to be interpreted through association of tile-level predictions with morphology, molecular features and outcome data. Furthermore, this study also demonstrated that AI is able to classify the molecular subtype of samples that were previously unclassifiable by the standard process of RNA expression profiling. It also provides information for the spatial distribution of each subtype within a tumour. This AI technology will have huge implications on the standardisation of classifying molecular subtypes of CRC. More details can be found on the CRUK Oxford Centre website Similar stories Oxford cancer clinical trials unit receives acclaimed nursing award The nursing team at the Early Phase Clinical Trials Unit has been awarded the Excellence in Cancer Research Nursing Award 2021. Anti-cancer drug derived from fungus shows promise in clinical trials A new industry-academic partnership between the University of Oxford and biopharmaceutical company NuCana has found that chemotherapy drug NUC-7738, derived from a Himalayan fungus, has 40 times greater potency for killing cancer cells than its parent compound. Further funding secured to hunt out cancer using innovative radiotherapy techniques Reprogramming tumour cells using an antimalarial drug
the development and practical applications of artificial neural networks by:Rocket PCB     2019-09-12 The biological aspect of stimulating the development of artificial neural networks can be said that the study of artificial neural networks began in 1943 with McCulloch and Pitts. Their work is based on the desire to understand the function of the biological brain, and they propose a \"computational element\" model called McCulloch- Pitts neurons, which weights and sums the inputs of these elements, and then performs threshold logic operations. The features of biological neurons that inspire artificial neurons are summarized as follows: cell body (soma) : Perform the central function of the neuron. Equivalents in artificial neurons are the total and threshold parts of the model. Branch Crystal: Branch Crystal Like the structure of receiving input signals processed by soma. These are represented by weighted inputs from artificial neurons. Axon: carries the output signal from the cell. In artificial neurons, this is the output of the threshold function. Compared to electronic digital computers, the biological brain is by far the best \"computer\" we know \". Nevertheless, both have their pros and cons. For example, the brain is not very good at doing arithmetic, and the digital computer is good at this task. On the other hand, the brain is very good at tasks such as face recognition, and the digital computer did not successfully complete this task until 1993. More and more people are asking digital computers to solve complex problems that their biological peers can easily solve. This trend has always been the driving force for the development of neural networks. It is important to understand that unlike biological networks, artificial neural networks are not physical entities, but one or more algorithms implemented in computer programs. In order to realize the visualization of artificial neural network, some graphical conventions are adopted. The following figure shows a single artificial neuron with the above basic elements, I . E. e. , Weighted input, Total and threshold parts, and output. Credit: Chris de villierscre: Chris de villierstring of the artificial neural network compared to so- Known as an expert system containing knowledge (data) There is no database for artificial neural networks. They need to be trained with data suitable for a given problem in order to best adjust the weight and achieve the desired performance. A kind of training is called supervision training. In supervised training, the data set in the question considered is used to train the network. These data contain certain parameters or variables (inputs) Causing certain conditions or States (outputs). A subset of available data, usually 70% for training the network. This is an iterative process in which each input vector and its associated output or target ( It\'s usually a single number, but it can be a vector) , Presented to the network. Then adjust the input weight according to the appropriate algorithm (e. g. Rules of perceptual learning To minimize mistakes, I. e. , The difference between network output and target. The process is repeated before an acceptable error level is obtained. After that, the remaining 30% of the data is used to validate the network. If the verification is successful, the network is applied to the problem; If not, re-train it with a different data set. In this case, different network structures may also need to be selected, such as more or less nodes, hidden layers, etc. Practical application examples of artificial neural network has been applied in a variety of problem-solving applications, and with the discovery of new applications, this field is expanding. The following examples illustrate various practical or potential neural network applications. Stereo vision has been shown in the background of stereo vision, although the operating principles of biological vision and vision are very different. The \"vision\" of the neural network, the behavior of the two methods is similar. In this study, the neural network consists of several sub-networks, each consisting of three input neurons, each connected to a continuous two layers of nine hidden nodes, and finally to an output neuron. It is important that the neural network is trained to detect the features of stereo vision rather than mimic its biological features. The results show that both the neural network and its biological network have a strong response to the edges of vertical strips and light. Fault Detection of power lines in transmission lines Distance protection is to protect the power system from transmission line faults by isolating fault lines. The fault condition is the line-to-line and line-to-ground faults. It has been proved that the neural network solution is better than the traditional method of isolating faulty lines using sensing relays, but it takes a long time of training, and the software implementation is inefficient in calculation, resulting in slow response. An efficient fault detection system requires a decision to be made within a power cycle, which is 20 ms in the case of a 50 hz system. Another hardware implementation of the neural network allows fast, real-time Time Distance protection. Quality management in the different inspection techniques used in the quality inspection of finished products, is a way to capture the image of the item, enlarge the image and visually inspect it. In the PCB assembly plant, the embedded automatic detection system based on artificial neural network is found to be superior to the traditional method. 1974 The Ministry of Environment of Malaysia has adopted a Water Quality Index (WQI) The level of river pollution in Malaysia is graded. WQI is based on the weighted values of dissolved oxygen, biochemical oxygen demand, chemical oxygen demand, pH, ammonia nitrogen and suspended solids. Getting WQI requires converting raw data to subdata The pollutant index before WQI manual calculation. A neural network solution was then implemented that uses raw data from the past and present to predict WQI. The accuracy of this method was found to be between 92. 4% and 99. 96 percent. Conclusion artificial neural networks are more and more applied to solve practical problems. life problems. As more and more powerful computers become readily available on the one hand, and on the other, powerful microprocessor devices enter embedded applications, applications of artificial neural networks may become common if we do not realize them. Last position of Var = 0; Minimum distance between Ads var = 1200; Minimum distance from var at the bottom = 300; Var adsToPlace = 20; for(var i = 1; \"Article \") \"Article \") \"I \"); $ (this). position(). top; SpotFound = true; return false; }}); Custom message Chat Online 编辑模式下无法使用 Chat Online inputting...
Earth Science - Other Can Science Save the Planet Wanderer's image for: "Can Science Save the Planet" Image by:  Should Science Save the Planet? We have a choice about saving the planet with Science. When we talk about Science, it is not devoid of human opinion and error. Science is an entity that we created to interpret the behavior of our world. Are we taking on superhuman powers when we attempt to correct our mistakes? In this year of 2007 we are more aware of a change in the climate of the earth than ever. We do not know if the changes in temperature or weather are a short term or longer term phenomenon or part of the natural climate cycle of the earth. Should this be happening? The abnormal patterns raise a red flag. What should we do about it? Do we (a) sit by and let nature take its course, realizing that our messing with the global climate may either fix the problems or tip the balance the wrong way even more. Or do we (b) take action to correct the global climate? Climatologists call this climate forcing, an appropriate term. Let's examine the two options. Letting Nature Take its Course We have a choice to do nothing. We can use computer models to try to predict the future but it is hard to say exactly what may happen. The media tends to over dramatize the climate outcome, but it is hard not to buy in to what is happening after watching a show like "Planet in Peril," which aired on CNN in late October 2007. In this special report three reporters traveled the globe to report on climate change. They visited 14 countries around the earth, making the story very convincing. A few of the stories were a sinking, disappearing island in New Guinea, a lake that was drying up in Africa and polar bear problems. These animals are swimming more and more due to more water and less ice, drowning and cannibalizing themselves due to lack of food. Polar bears are shrinking in size. In order to survive, they may need to adapt and evolve to a smaller size. If we leave things alone we will probably have a world that changes from one extreme to another or is the opposite of what we expect. In general, it seems it will be hotter, more humid, with more water in the oceans and less ice. Ice will melt more quickly in the arctic. Some freshwater lakes may decrease. We may have trouble growing crops due to drought or poorer growing conditions. Deforestation of the rain forest will continue by slash and burn methods. The biodiversity of animals will decrease. In addition to all the climate problems, we will have a larger population of humans. And if we don't solve the energy issues we will have very little energy to actually cool us down in the summer when it is blazing hot. In short, the climate and world will not be the way we want it to be. Change the Climate with Science Solutions Let's talk about a few of the solutions proposed: 1. Getting rid of carbon dioxide and greenhouse gases with carbon sequestration 2. Cooling the planet down by planting more trees, putting particles in the air 3. Alternative renewable energy: biofuel, solar power, wind power It's fairly obvious by now that burning fossil fuels has created a lot of carbon dioxide in the atmosphere which traps heat. How do we get rid of CO2? One solution is to bury it in the ground, carbon sequestration. This will take a lot of research and is definitely worth a try. It sounds like a good idea. However, even if we get rid of a lot of CO2 we may still have a hot planet. How do we cool it down without causing other problems? Recently the New York Times Op Ed Section published an article by a climate professor at Carnegie Mellon University. He stated that a way to cool down the earth was to spray sulfate particles in the atmosphere. The logic was that volcanoes erupt and give off sulfate thereby cooling the atmosphere and therefore why can't we use the same technique. The issue most chemists would have with that is that sulfate causes acid rain. How much would we have to pump up into the atmosphere? How much would it cool things down? Do we have to keep putting sulfate in the air all the time? Putting more particulates in the air could cause lung problems. This solution does not seem like the healthiest. At this point, I have not heard of a good method for cooling things down. One way to cool it down is to plant more trees, but it is not enough. We need to find other events that soak up heat. There are devices that are known to convert heat to electricity, thermo electronic devices. However their efficiencies are 15-20%. There are also options discussed in New York Times ( One solution that makes sense and sounds the most mild and natural is the idea of cloud enhancement ( Two scientists have found a way to spray ocean water in fine particles from a special vessel into marine stratocumulus clouds. These clouds are the same type of clouds that cause fog in the San Francisco bay and cool temperatures down. They are very reflective, especially when the salt from ocean water spray is injected in to them. As the ocean mist approaches the clouds the water evaporates and very fine salt spray remains. The salt particles attract the cloud water droplets and make larger reflective particles. Larger particles scatter light in a way that is non linear. Scattering increases by a million times as the radius of a particle increases. That is how clouds can be made more reflective to block the sun. And this can be done in areas that need it specifically. As the scientists mention, if it seems detrimental it can be stopped quickly. A third way to alter the detrimental effects of climate warming is to find sources of energy that are good for our planet. Fossil fuels are not helping us fight the battle. Due to the warmer temperatures we will have increasing demand for energy to cool us in the hot summers. We have to fight the war with a multitude of renewable solutions: solar, wind, water and others. A recent NOVA on PBS discussed the many uses of solar energy. The debate was very convincing, but the price tag was not! The least expensive price was $12,000 for solar panels. Most families cannot afford that upfront price even if the electric bill is reduced by 1/2. The energy solution should be a local one. In South Dakota windmills are being built in windy areas. Energy has to travel to our houses. If we can find local sources we are saving energy as well. In the end it will be investors and entrepreneurs that will lead the way. Google is one company that is installing solar panels at their work site. Perhaps when these energy entrepreneurs lead the way the government, and then the consumer may follow. Most of us want to help with controlling the global thermostat, but we don't have the political power or finances to do it. The best we can do is hope that someone else fights the good fight. There is a lot of research going on. We need to determine which science solutions make the most sense and don't throw the climate off even more. However, when all is said and done, I am not convinced that on a cold January or February day that we really want the world to be COLDER. Wherever I am everyone says they like it warm and the hate the cold. Perhaps we have subconsciously selected to have a warm planet. It might seem politically incorrect to say we like it warm. We like what global warming is doing short term to the weather day to day. But we worry about the future and its uncertainty. More about this author: Wanderer From Around the Web
Koala is a symbol of Australia Koala is a symbol of Australia Koalas (Phascolarctos cinereus) are mammals of the marsupial group that live in Australia. They spend most of their time on trees, in places rich in eucalyptus species, their main food. Herbivorous animals eat eucalyptus leaves and sometimes leaves of other plants. It is from the eucalyptus that the koala derives its nutrients and water necessary for its survival. They weigh between 5 and 13 kg and are between 60 and 85 cm in length. Like all mammals, they have fur, which is thick, short and dense. Hair color varies, with light to dark brown hairs on the back, as well as brown, white or yellow hairs on the belly. The fur of these animals are excellent thermal insulators. They are usually solitary and have a habit of twilight at night. They spend most of their lives in trees. They also have claw-friendly hands and feet that help them climb, and a pair of functional incisors in the lower jaw. Koalas are considered vulnerable to extinction (they are only one rank above endangered animals), mainly due to the fires that devastated their habitats. (from the newsroom) See also  This is when Baldur's Gate 3 is unlocked on PC today About the author: Cory Weinberg Related Posts Leave a Reply
An official website of the United States government ‘Let’s All Go Green’ April 16, 2015 Woman sitting with small animal on her left knee (Courtesy of Mavis Nduchwa) Mavis Nduchwa enjoys one of her “wow moments” of appreciating the view in the Makgadikgadi salt pans. A meerkat, common in the deserts of Botswana, perches on her knee. (Courtesy of Mavis Nduchwa) One evening in Botswana’s Okavango Delta, YALI Network member Mavis Nduchwa attended a dinner with the late South African conservation pioneer Ian Player. The founder of the Wilderness Foundation in South Africa and the United Kingdom, and of the WILD Foundation in the United States, “made me realize the important role I can play in helping to conserve nature,” Nduchwa recalls. Now a manager of Planet Baobab, a travel lodge at the edge of Botswana’s Makgadikgadi salt pans southeast of the delta, Nduchwa helps guests appreciate and protect their surroundings. “I cannot imagine my life without wildlife,” she says. Linking conservation with her livelihood, she stresses that her park job has allowed her to build a house and to send her nieces and nephews to school. The Makgadikgadi pans, in the middle of northeastern Botswana’s dry savanna, are the remains of an enormous lake that once covered an area larger than Switzerland. The area makes up one of the largest salt flats in the world. During the harsh dry season, the salty desert has little plant life. But following the rainy season, the pans become a critical habitat for migrating animals, including wildebeest, zebra, white pelicans and greater flamingos. While the government of Botswana is addressing threats to the environment like deforestation, erosion, and illegal hunting, Nduchwa feels more can be done. She suggests training educators about conservation so they can teach the public about what everyone can do to use natural resources carefully. She says conservation outreach to people who live in rural areas and don’t have access to radio messaging is particularly needed. “People should understand that it is our responsibility to look after our environment,” Nduchwa believes. “They should understand why they should not walk past a plastic bag or a can in the wild. With the right knowledge of the damage that does to the environment, individuals can do a lot. We need to empower them with knowledge.” Woman leaning against table holding glass (Mavis Nduchwa) Mavis Nduchwa takes a break from managing the Planet Baobab lodge in Botswana’s Makgadikgadi salt pans.(Mavis Nduchwa) Nduchwa is doing her own part. She volunteers at local schools, helping students understand “the importance of looking after our environment.” And she teaches local women about farming methods that are safe for the environment, like using crop stems to feed pigs and chicken manure instead of chemicals to fertilize gardens. Nduchwa adds that businesses, too, can partner with communities to help conserve natural resources and protect wildlife. Planet Baobab, for example, has adopted conservation practices like having guests and employees refill their plastic water bottles instead of disposing of them when they are empty. Nduchwa says that using environment-friendly practices can be good for businesses’ bottom lines. “More companies and individuals would want to associate themselves with such businesses,” she notes, adding that she prefers to buy from businesses that sell products made from recycled materials like paper and plastic. That recycling also generates jobs, she notes, pointing to the women weavers who make and sell hats, mats and even greeting cards out of recycled materials. “I always like to see a clean environment around us,” Nduchwa says, adding that her village won an award for being the country’s “most clean village.” Nduchwa suggests that teachers can get young people involved in conservation by organizing them to collect discarded cans and bottles for recycling or for use in their school science projects. “Make the experience as fun as possible,” she suggests. “Let’s teach our kids to conserve while they are still young,” she says. “Let’s all go green.”
John Beaufort, 1st Duke of Somerset John Beaufort, 1st Duke of Somerset KG (c. 1403 – 27 May 1444) was an English nobleman and military commander[1] during the Hundred Years' War. John Beaufort Duke of Somerset Drawing of his tomb effigy Earl of Somerset PredecessorHenry Beaufort, 2nd Earl SuccessorEdmund Beaufort, 4th Earl Baptised25 March 1404 Died27 May 1444 (aged 40) BuriedWimborne Minster church FamilyHouse of Beaufort SpouseMargaret Beauchamp of Bletso FatherJohn Beaufort, 1st Earl of Somerset MotherMargaret Holland Baptised on 25 March 1404, he was the second son of John Beaufort, 1st Earl of Somerset, and Margaret Holland, and succeeded his childless elder brother Henry Beaufort, 2nd Earl of Somerset, to become the 3rd Earl of Somerset in 1418. He was also the 1st Earl of Kendal. French Campaign The young earl fought in his cousin Henry V's 1419 campaigns in France. In 1421, he accompanied the king's younger brother (also John's step-father) Thomas of Lancaster, Duke of Clarence, to the fighting in Anjou. Thomas was killed at the Battle of Baugé, while Somerset and his younger brother were captured. On 25 March 1425, Somerset came into his majority, but the estates of his father had to be managed by his mother for the next thirteen years until he was released from imprisonment. He remained imprisoned until 1438, and after being ransomed, became one of the leading English commanders in France.[2] Duke of Somerset: a soldier In 1443, John was created Duke of Somerset and Earl of Kendal, made a Knight of the Garter, and appointed Captain-General of Guyenne. He married Margaret Beauchamp of Bletso in 1439. He presided over a period during which England lost much territory in France, and he proved a poor commander. Humphrey, 1st Duke of Gloucester, the regent for the young King Henry VI, was unable to control the administration of justice and finance, which led to widespread lawlessness. At the beginning of the second protectorate of Richard, Duke of York, Gloucester declined the post of Lieutenant-Governor, which was offered instead to Somerset. From this post, he drew a salary of 600 pounds and was Lieutenant-General for war even after York's appointment on 2 July 1440. Somerset was appointed Admiral of the Sea to Lord Talbot's army command.[4] Talbot besieged Harfleur from August 1440, which for five months had been in French hands. King Charles VII of France sent a large army under Richemont. The English dug a double ditch rampart with only 1000 men, while Somerset's squadron prevented a French landing by sea, using archers to pick off the enemy at short range. Frustrated, the French withdrew to Paris, lifting the siege. The town surrendered to the English and was re-occupied. York was incensed that John's uncle, Cardinal Henry Beaufort, should advise the king to sue for peace. Somerset advised King Henry that peace was humanitarian and that the king of France was determined to seize Pontoise.[5] When York arrived in Normandy in 1441 to campaign, Somerset had resigned. But the fall of Pontoise to the Duke of Orléans in September 1441 weakened English garrisons, and in Gascony, the situation was even worse.[6] The Beauforts sent Sir Edward Hull, who arrived at Bordeaux on 22 October 1442 to inform York that a huge army would arrive commanded by Somerset. York was ordered to fortify Rouen; just as the king and Dauphin of France were threatening Bordeaux and Aquitaine and seized the town of Dax. Somerset dithered; York was held back as Guyenne was being lost. Meanwhile, the Duke of York, fighting alongside the tactician Lord Talbot, had been appointed Lieutenant for all France. With the Duke of Gloucester's wife Eleanor charged with treason, Somerset took the opportunity in April 1443 to declare himself Lieutenant of Aquitaine and Captain-General of Guyenne. By then, the negotiations Somerset had started as Captain-General of Calais had failed. These two factors turned York against the Beauforts. But the last straw was the payment of £25,000 to Somerset while York remained heavily in debt. Furthermore, Guyenne was consuming precious resources otherwise destined for Normandy.[7] In August 1443, Somerset led 7,000 men to Cherbourg and marched south to Gascony; the duke was ill. He blundered into Guerche, a Breton town with which England had signed a peace treaty. But Somerset set all prisoners free, accepting money from the Duke of Brittany. Marching aimlessly through Maine, he returned that winter to England.[8] His death in 1444 may have been suicide.[1][9] His death, and that of his uncle the cardinal, marked the end of Beaufort influence, and left the door open for William de la Pole, 1st Duke of Suffolk, to dominate government.[10] But the lasting effect of these events was burning resentment between the House of York and the remaining members of the Beaufort family. Titles and styles Illegitimate children of John Beaufort: 1. Tacine of Somerset. Being foreign born, she was made a denizen of England 20 June 1443. She married before 29 Sept. 1447 Reynold (or Reginald) Grey, 7th Lord Grey of Wilton. He was born about 1421 (aged 21 in 1442). They had one son, John, Knt. [8th Lord Grey of Wilton]. 2. John of Somerset (c. 1444–1453) Child of John Beaufort and Margaret Beauchamp of Bletso: 1. Lady Margaret Beaufort (31 May 1443 – 29 June 1509), mother of Henry VII 1. Tipping 1885. 2. Harriss, G.L. (1988). Cardinal Beaufort: A Study of Lancastrian Ascendancy and Decline. Oxford: Clarendon Press. 3. Planché, J.R. (1852). Pursuivant of Arms. p. xx. 4. Burne 2005, p. 422. 5. Burne 2005, p. 426. 6. Jacob 1961, p. 470. 7. Jacob 1961, p. 468. 8. Burne 2005, p. 435–6. 9. Harriss 2004. 10. Burne 2005, p. 438. 11. Cokayne 1953, p. 47. 12. Cokayne 1953, p. 45. 13. Weir 2008, p. 92. 14. Weir 2008, p. 232. 15. Brown 2004. 16. Weir 2008, p. 93. 17. Weir 2007, p. 6. 18. Marshall 2003, p. 50. 19. Browning 1898, p. 288. 20. Weir 2008, p. 125. 21. Weir 2008, pp. 94–95. 22. Weir 2008, pp. 97, 104. 23. Weir 2008, pp. 94, 125. 24. Weir 2008, p. 77. Peerage of England New creation Duke of Somerset 1st creation Earl of Kendal Preceded by Henry Beaufort Earl of Somerset Succeeded by Edmund Beaufort
Module Catalogues Design for Engineers Module Title Design for Engineers Module Level Level 1 Module Credits 5.00 Academic Year 2021/22 Semester SEM1 Aims and Fit of Module This module aims to 1. Introduce students to the design process and the principles of CDIO (conceive, design, implement and operate) standards. 2. Provide students with manual and computer-aided visualisation and drawing and sketching skills. 3. Provide students with hands-on experience and group working experience. 4. Introduce students to the principles of total design, safety and sustainability. Learning outcomes A. Understand member strength and design load of the structure by testing and model analysis; B. Design and build structure models for assigned load and factor of safety; C. Interpret orthographic drawings and learn manual drawing and sketches of the built environment; D. Learn and use computer-aided design software (AutoCAD) for engineering drawing; E. Demonstrate project, team, and time management skill; F. Experience and enhance communication and IT skills. Method of teaching and learning Briefing lectures followed by practical, hands-on active learning
Visual Language Tuesday 6pm-8pm 4 weeks Monday Evening 6pm to 8pm Tutorial style course examining all concepts 8 in stock Tutorial style course examining concepts such as Line, Form, Tone, Colour, Symbols, Metaphors, Narrative, Context, Content & Artists Intent. Classes involve group discussions and exercises 4 classes for $180 What is visual language? Visual language can be defined as a system that communicates through visual elements. It is perceived by our eyes and interpreted by our brain, which receives the signal and transforms into sensations, emotions, actions, and thoughts. Some of the earliest visual records discovered are preserved on cave walls in Northern Australia and Lascaux in France. These cave paintings display images of hunters, animals, gods and people. Some of these images became so commonly used they formed the basis of our alphabet. Visual language has a set of codes and conventions that influence the way we interpret different images. There are two types of images: still images and moving images. Tone is the lightness or darkness of a color. It is used in art to suggest form or to create a dramatic atmosphere. A visual narrative is a story told primarily through the use of visual media. The story may be told using still photography, illustration, or video, and can be enhanced with graphics, music, voice and other audio.
Skip to main content Microsatellite resources of Eucalyptus: current status and future perspectives Eucalyptus is the premier paper pulp, short rotation plantation species grown all over the world. Genetic improvement programs integrating molecular marker tools are in progress in many parts of the globe to increase the productivity. Whole genome sequence and expressed sequence tags (ESTs) of the eucalypts paved way for introduction of molecular genetics and breeding in this genus. Different molecular characterization approaches have been used simultaneously in eucalypts, however, microsatellites or simple sequence repeats (SSRs) with their prolific characteristics could occupy a special niche in Eucalyptus genetic improvement. Further, highly informative SSRs were used for the clonal identity, genetic fidelity and in certification of breeder’s rights. Eucalyptus genetic linkage maps generated with microsatellite loci were used successfully to identify quantitative trait loci (QTLs) for various economically important traits. Progressively more numbers of microsatellites are being linked to genes associated with adaptive and functional variations, therefore making their utility broader in genetic applications. Availability of common SSR markers across the species provides an opportunity to validate the expression of QTLs across variable genetic backgrounds and accurately compare the position of QTLs in other species. Recent evidences suggest that the presence of SSRs in micro RNAs of plant species play a role in the quantitative trait expression. Similar studies in eucalypts may provide new insights into the genetic architecture of transcript-level variations and post transcriptional gene regulation. This review on eucalypts microsatellites, highlights the availability and characteristics of genomic and eSSRs and their potential in genetic analysis of natural and breeding populations and also discusses the future prospects in population genetics and marker assisted selection. Eucalyptus is the world’s leading industrial plantation species due to its fast growth, wider adaptability and multipurpose utility. Until lately, most of the Eucalyptus plantations all over the world were destined for paper production, however, presently these plantations are looking forth to support solid wood industry including veneer production (Luo et al. [2013]). Research and development inputs on eucalypts have quadrupled the plantation productivity with the current norm of 40 m3/ha/yr (ABRAF [2013]), and unleashed possibilities up to 100 m3/ha/yr with intensive management (Evans and Turnbull [2004]). Efficient breeding and clonal deployment strategies have been employed for improved planting stock development. Efforts on molecular breeding and molecular genetic analysis are underway in eucalypts to accelerate breeding and conservation. Different kinds of DNA markers have been employed for a variety of purposes, including population genetics and marker assisted selection (MAS). One of the most frequently used DNA markers in eucalypts since 1996 are microsatellites or simple sequence repeats (SSRs) (Byrne et al. [1996]). SSRs possess characteristics such as ubiquitous distribution in genome, locus specificity, co-dominance, multi allelism, high mutation rate, heterozygous, transferability across species and associated with the gene expression and function. Hence, these markers are considered to be ideal for conservation genetics, genetic diversity assessment, variety protection, and construction of high-resolution genetic maps to link phenotypic and genotypic variation. The importance of microsatellites for plant genome analysis has been highlighted on several occasions (Varshney et al. [2005]; Kalia et al. [2011]). Earlier, genomic SSRs (gSSRs) were developed by isolating and sequencing clones containing putative SSR regions, which are costly and time consuming. Subsequently, development of online databases like GenBank led to the generation of Expressed Sequence Tag (EST) derived-SSRs (eSSRs) which are present in transcribed regions of the genome. However, in recent times, tremendous data on gSSRs and eSSRs are made available through next generation sequencing (NGS) methods (Zalapa et al. [2012]; Kudapa et al. [2014]) which can readily be used in population genetics and breeding applications. In eucalypts, primarily genomic SSRs were developed for very few commercially important species like E. urophylla, E. grandis, E. globulus and E. nitens. However, high synteny of genome existing across eucalypt species has benefited many DNA data deficient eucalypts taxa, thus excellent SSR transferability was witnessed across species (da Silva et al. [2009]; Acuna et al. [2012a]). SSRs were used in eucalypts for multiple purposes such as species identification, phylogeny, hybrid authenticity, genetic diversity studies, genetic mapping and Quantitative trait loci (QTL) localization (Myburg et al. [2007]; Grattapaglia et al. [2012]). SSRs also offer a much higher level of automation which is crucial to manage with the great number of individuals generally handled in eucalypt breeding. These markers have advantages over high throughput SNP markers, because the majority of SNPs is bi-allelic and information (heterozygosity) generated is low, whereas SSR mutational rates are a lot higher and the DNA slippage process creates a number of new alleles leading to the generation of maximal information (Ellegren [2004]). Many studies on the comparison between SSRs and SNPs have proven that large numbers of SNP loci were required to replace highly polymorphic SSRs in studies of diversity and relatedness (Hamblin et al. [2007]; Yang et al. [2011]). Further, SSR markers were always preferred as framework markers for developing consensus linkage map, composite integrated linkage map and comparative map between the species (Garcia et al. [2011]; Hudson et al. [2012]). Microsatellite resources in eucalypts Based on the published literature, till date, a total of 505 genomic SSRs (gSSRs) and 758 validated EST-SSRs (eSSRs), 35 chloroplast SSRs (cpSSRS) and 8 gene based SSRs (CG-SS1Rs) have been applied in different species of Eucalyptus. The details on SSR marker code, source species and number of SSRs developed are given in the Table 1. A largest collection of both gSSRs and eSSRs (~300 SSRs) was developed from E. grandis and E. urophylla with the prefix as Embra (Brondani et al. [1998], [2002], [2006]; Faria et al. [2010], [2011]). Other major resources include the SSRs with the prefix Emcrc (40 SSRs) developed from E. globulus (12 loci; Steane et al. [2001]), Corymbia variegata (14 loci; Jones et al. [2001]) and Corymbia citriodora subsp variegata (14 loci; Shepherd et al. [2006]). The SSRs with prefixes En, Es, Eg and El were developed from species such as E. nitens (8 SSRs), E. sieberi (8 SSRs), E. globulus (26 SSRs) and E. leucoxylon (13 SSRs) respectively (Byrne et al. [1996]; Glaubitz et al. [2001]; Ottewell et al. [2005]). A set of 35 chloroplast DNA microsatellites was developed based on the full cp-DNA sequence of E. globulus (Steane et al. [2005]). The ISSR-enrichment technique was exploited for the development of five SSR loci in E. grandis (Van der Nest et al. [2000]). Very few SSR loci were developed from E. urophylla and E. pilularis (Payn et al. [2008]; Sexton et al. [2010]). NGS methods such as 454 sequencing was applied to isolate ten SSRs from E. victrix (Nevill et al. [2013]). A recent study in Eucalyptus found that microsatellites occupy approximately 0.6 percent of the overall genome (Ranade et al. [2014]). Table 1 List of genomic and chloroplast SSRs developed in Eucalyptus Whole-genome sequencing of E. camaldulensis and E. grandis have been completed by the Kazusa DNA Research Institute, Japan and DOE Joint Genome Institute (JGI), USA in collaboration with members of the Eucalyptus Genome Network (EUCAGEN) respectively (Hirakawa et al. [2011]; Myburg et al. [2014]). Additionally, transcriptome resources were generated from various tissues including xylem, phloem, root, shoot, leaf and reproductive tissues from species such as E. grandis, E. gunnii, E. globulus, E. camaldulensis and E. tereticornis (Mizrachi et al. [2010];;; Healey et al. [2014]). All these transcriptome resources have promoted the development of SSR markers in silico and many of which were used for diverse purposes across eucalypt species (Ceresini et al. [2005]; Rabello et al. [2005]; Yasodha et al. [2008]; Rengel et al. [2009]; He et al. [2012]; Zhou et al. [2014]). Recently, gene specific microsatellites were developed from E. grandis, E. globulus and E. gomphocephala (Acuna et al. [2012b]; Bradbury et al. [2013a]). Table 2 provides the list of EST-SSRs developed in various species of eucalypts. Table 2 List of EST- SSRs developed in Eucalyptus The frequency of occurrence of microsatellites had varied in different databases of Eucalyptus for example, 12.9% in NCBI database (Yasodha et al. [2008]) 13.3% in EUCAWOOD (Rengel et al. [2009]), 25.5% and 29% in FORESTs database (Rabello et al. [2005]; Ceresini et al. [2005]). The type of SSRs found in the ESTs varied among the transcriptome analyzed. In general, amongst the SSR motifs, the dimeric and trimeric were most abundant followed by other types. This is in consonance with many other plant species belonging to monocots as well as dicots. The most represented di-nucleotide was AG/TC (72.5%) motif followed by the trimeric CCG/GGC, AAG/TTC, and AGA/TCT (12.81%) (Ceresini et al. [2005]; Rabello et al. [2005]; Yasodha et al. [2008]; Rengel et al. [2009]; Ranade et al. [2014]). The details on different types of motifs are shown in Table 3. These motifs have also been found to be predominant dinucleotide repeats and trinucleotide repeats respectively in many plant species (Zhou et al. [2014]). The BAC clones of eucalypts had comparatively less numbers of SSR frequency (Paiva et al. [2011]). Most of the SSRs isolated from genomic libraries were targeted for simple dinucleotide repeats, particularly AG/TC motifs except a few had compound, interrupted and trinucleotide motifs (Glaubitz et al. [2001]; Ottewell et al. [2005]; Brondani et al. [2006]). Unique in silico methods were developed to extract and transfer the highly conserved orthologus genic SSR regions from E. globulus to E. camaldulensis, a species with less genomic information, and such novel SSRs were useful for parentage analysis, confirmation of interspecific hybrid and genotyping of seedling seed orchard (Nagabhushana et al. [2011]). A study to mine SSRs in silico from 22298 EST sequences of eucalypts revealed that primers could be designed for 1244 microsatellites, of which 182 were selected for characterization based on polymorphism status among species (Grattapaglia et al. [2014]). Table 3 Types of SSR motifs in Eucalyptus species Cross-species transferability Microsatellite markers are generally transferable across related genera and the genetic distance among the species limits the percent transferability. The cross species transferability provides a potential source of codominant markers for many related species and facilitates evolutionary, ecological, and conservation studies across the species. Since the display of cross-species transferability of microsatellite markers is high in eucalypts, attempts have been made to identify a useful number of primer sets of high utility in a wide range of species. Details of the SSR source species and the species in which the SSRs cross amplified are given in the Table 4. The cross species transferability of genomic SSR markers was comparatively higher among the species of Eucalyptus and the transferability rate dropped down in the species of Corymbia and Angophora (Steane et al. [2001]). Initially, Byrne et al. ([1996]) tested transferability of four nuclear microsatellite markers from E. nitens and found that they were transferable (50%) to sub genera Symphyomyrtus and Monocalyptus but not to the genus Corymbia. However, modifications in the PCR amplification protocols could improve the transfer rate across genera (Shepherd et al. [2006]). Many of the SSR loci isolated from E. grandis and E. urophylla were cross amplified in different species like E. globulus, E. nitens, E. pilularis, E. urophylla, E. pyrocarpa, E. camaldulensis and E. tereticornis (Bundock et al. [2000]; Glaubitz et al. [2001]; Steane et al. [2001]; Agrama et al. [2002]; Ottewell et al. [2005]; Arumugasundaram et al. [2011]; Subashini et al. [2013]). Similarly, the eSSRs were successfully cross amplified in several species like E. grandis, E. saligna, E. dunnii, E. viminalis, E. camaldulensis, E. urophylla and E. tereticornis (Neves et al. [2011]; Faria et al. [2010], [2011]; Acuna et al. [2012b]; Hudson et al. [2012]; Petroli et al. [2012]; Breed et al. [2012]; He et al. [2012]; Bradbury et al. [2013a], [b]; Bradbury and Krauss [2013]). Recently, gene-homologous eSSRs designed for E. gomphocephala were transferred to E. marginata, E. camaldulensis, and E. victrix (Bradbury et al. [2013a]). Table 4 Details on the Eucalyptus species used for SSR development and species showed cross transferability Genotyping of SSRs and allele variations in eucalypts Genotyping studies with microsatellites generally preferred dinucleotide repeats because they bring off high polymorphism and display more variation among individuals. In certain occasions the dinucleotide repeats based allelic variation results in shadow bands or stutter bands during electrophoresis thus leading to genotyping errors (Hoffman and Amos [2005]). Hence, the genotyping applications requiring high precision like clonal certification, microsatellite markers with tetra and penta nucleotide motifs were recommended (Faria et al. [2010]). Loci with higher length repeats provided an advantage of accurate allele calling due to their larger allele size difference. In eucalypts, presence of tetra, penta and hexanucleotide allowed easy allele calling which was challenging when di and trinucleotide motif SSRs were used (Faria et al. [2010]). Presence of null allele, i.e., a microsatellite locus that consistently fails to amplify to detected levels via the polymerase chain reaction (PCR) is not uncommon in eucalypts (Glaubitz et al. [2001]). In general, microsatellite null alleles at low frequencies are unlikely to introduce serious biases into population genetic analysis (Dakin and Avise [2004]). Nevertheless, microsatellite null alleles can cause egregious errors when they are used for genetic mapping experiments at family level. There are methods and software packages available to handle the null alleles and heterozygote deficiency in various genetic analyses (Chapuis and Estoup [2007]; Chybicki and Burczyk [2009]). In a genetic mapping study, it was found that 20 out of 241 segregating SSR loci were observed to have null alleles (Brondani et al. [2006]). Increased occurrence of null alleles have been observed when attempting to transfer microsatellites across related species (Faria et al. [2010]; Bradbury et al. [2013a], [b]; Bradbury and Krauss [2013]) and appropriate strategies need to be used in handling such data. Genotyping with microsatellites markers on large scale using DNA sequencing instruments demonstrated very high accuracy of allele sizing and binning to avoid the scoring errors. Although various methods of primer labeling and SSR allele detection in eucalypts was reported (Ottewell et al. [2005]; Missiaggia and Grattapaglia [2006]; Faria et al. [2011]; Subashini et al. [2013]), difficulties in accuracy of allele sizing continue to exist. Allele sizes generated by the microsatellites loci have larger implications on genotyping of the individuals. Allele sizes generated by the eucalypt microsatellite loci were highly varying, as low as 50 bp was detected in E. camaldulensis (da Silva et al. [2009]). Very high levels of allelic variability were observed at different levels of populations. A pioneering study on analysis of 15 SSR loci in 32 F1 individuals of E. grandis × E. urophylla generated 9 to 26 alleles per locus with an average of 16.3 × 4.8 (Brondani et al. [1998]). Similarly, a breeding population of E. grandis with 192 selected individuals produced a total of 119 alleles with 6 SSR loci, yielding a minimum of 6 (Embra11) and a maximum of 33 alleles (Embra16), with an average of 19.8 × 9.2 alleles per locus (Kirst et al. [2005a]). Compared to gSSRs, eSSR loci were known for low levels of polymorphism, Faria et al. ([2010]) analyzed 10 eSSRs in 6 eucalypt species wherein the number of alleles were in the range of 7–15 (E. grandis), 5–12 (E. globulus), 4–10 (E. urophylla), 6–14 (E. camaldulensis), 5–9 (E. dunnii) and 4–14 (E. saligna). Allele size variations favored multiplexing of fluorescent based automated DNA genotyping applications, wherein upto 18 loci were analyzed in a single run with 5 dye format (Faria et al. [2010]). Eucalyptus microsatellites are usually highly informative as revealed through the statistics of polymorphic information content (PIC) and heterozygosity (He) (Table 5). The most widely used SSRs such as Embra, generated maximum heterozygosity value of 0.95 (Holman et al. [2003]; Jones et al. [2008]), Emcrc markers showed highest heterozygosity of 0.92, Es, En and El series loci produced 0.95, 0.91 and 0.93 (Byrne and Hines [2004]; Glaubitz et al. [2001]; Ottewell et al. [2005]). Accordingly the PIC values were also very high (0.933) in most of the studies so far reported (Kirst et al. [2004]). Because of these characteristics of microsatellites, they were used for various purposes in plant genome analysis (Figure 1). Table 5 Characteristics of major eucalypt SSR loci applied in population genetic studies Figure 1 Areas of research and applications of microsatellites in Eucalyptus . Applications of microsatellite markers in eucalypts The stupendous and multifaceted applications of microsatellites in tree genome analysis are shown in the Figure 1. The ubiquitous nature of microsatellites in tree genome (present in nuclear, EST, mitochondria and chloroplast genome sequences) make them the most suitable DNA markers for analysis of population genetics, phylogeny and species evolution, studies on conservation and ecology and marker assisted selection/breeding (Porth and El-Kassaby [2014]). Highly informative SSR markers generate multiple alleles, thus favoring germplasm/clonal identification, genetic integrity determination during propagation and controlled breeding, seed orchard diversity, mating system and outcrossing rate analysis (Falahati-Anbaran et al. [2007]). The multilocus nature and even distribution of microsatellites over the plant genome benefit the establishment of taxonomic identity of species and phylogeny reconstruction (Ochieng et al. [2007]). Microsatellites are ideal for conservation genetics and genetic resource management because of their selectively neutral characteristics (van Zonneveld et al. [2014]) and evolutionary processes of interest to conservation geneticists (Wang et al. [2009]). Characterization of germplasm and individual identification Microsatellites information on genotype is essential for effective utilization of germplasm accessions for genetic improvement for pulp yield, adventitious rooting, frost and salt tolerance, resistance to pests and diseases, efforts have continuously been made to characterize and evaluate germplasm accessions. Large amount of such germplasm and clonal accessions are maintained in tree breeding programs and clonal deployment activities of eucalypts. The high degree of polymorphism and the clear and simple co-dominant Mendelian inheritance of the SSRs has proven to be an extremely powerful system for the unique identification of Eucalyptus individuals for fingerprinting purposes and parentage testing (Kirst et al. [2005b]). Accordingly, SSR markers have been widely used for characterization of germplasm resources including clone fingerprinting, hybrid validation in controlled crosses, inter-individual genetic distance estimation, species distinction, and assignment of hybrid individuals to their most likely parent species (Stokoe et al. [2001]; Smith et al. [2003]; Grattapaglia et al. [2004]a; Kirst et al. [2005b]; Ochieng et al. [2007]; Grosser et al. [2008]; Jones et al. [2008]; Payn et al. [2008]; Rao et al. [2008]; Sampson and Byrne [2008]; Butcher et al. [2009]; Barbour et al. [2010]; Faria et al. [2010]; Shepherd et al. [2010]; Ribeiro et al. [2011]; Arumugasundaram et al. [2011]; Subashini et al. [2013]; Wheeler et al. [2013]) Clonal fingerprinting generally requires larger allele size differences for multiplexing, precise and stable allele sizing for deployment across laboratories. Hence, SSR markers with high motif length provided possibilities for greater utilization towards individual identification (Faria et al. [2011]). SSR markers play an important role in designing breeding populations and function as decision support tool in genetic conservation programs. Use of SSR markers in germplasm characterization of Jatropha curcus showed that the germplasm has limited diversity and the necessity of additional collections for species improvement (Alves et al. [2011]). Similarly, SSRs are the most sought after DNA markers for germplasm characterization in several tree species like avocado (Gross-German and Viruel [2013]), Psidium guajava (Sitther et al. [2014]), Olive (Trujillo et al. [2014]), Tamarix (Terzoli et al. [2014]) and Prunus (Khadivi-Khub et al. [2014]). Parentage testing and gene flow studies Seed orchards of eucalypt species are established with individuals having high genetic diversity and low levels of inbreeding to achieve the high genetic gain in progenies. Microsatellite markers played a major role in attaining these goals by displaying mating system, degree of contamination, variation in outcrossing rates, gene flow pattern and paternal contribution in the seed orchard. The Table 6 provides the information of SSR loci used for parentage analysis and gene flow studies. Parentage assignments based on microsatellite allele information could lead to the identification of appropriate parents contributing for potential progeny (Grattapaglia et al. [2004]a). Microsatellite diversity was considered for the designing of seed orchard in E. dunnii (Zelener et al. [2005]) and E. globulus (Dini et al. [2011]) thus reducing the risks of inbreeding. Eucalyptus has predominantly outcrossing breeding system, nevertheless the rate of outcrossing varies among the species and populations. E. grandis seed orchard in exotic conditions showed the maximum outcrossing rate of 96.7% however, the pollen contamination in the seed orchard was 39.2% (Chaix et al. [2003]). Similarly, another study on E. grandis seed orchard in Brazil analyzed with 14 SSR markers had 8.3% selfing and 29% pollen contamination (Grattapaglia [2004]b). In native locations, E. grandis seed orchard populations showed a selfing rate of 14% and the paternity analysis showed that 46% seeds were due to contamination (Jones et al. [2008]). On contrary, a well isolated clonal seed orchard of E. nitens had an outcrossing rate of 0.85% with relatively low pollen contamination of 4.5% (Grosser et al. [2008]). A small breeding arboretum of E. globulus in Australia was analyzed with four highly polymorphic SSRs revealed 47.9% outcrosssing rate and 17.6% contamination rate (Rao et al. [2008]). These results indicate that microsatellites are the best tools for predicting the seed orchard performance and revealing the importance of strategies to arrest outside pollen like flowering asynchrony and isolation distance of adjacent populations. Recently, Correia et al. ([2011]) showed that tetra-, penta- and hexa nucleotide microsatellites were more informative than the di and tri nucleotide markers and specific SNPs employed for assessment of parentage and individual identification. Thus, construction of a panel of markers to assess parentage would allow considerable inputs for designing of seed orchards consequently increased productivity from half-sib eucalypt populations. Table 6 Parentage testing and gene flow studies in eucalypts The natural populations of eucalypts were subjected to microsatellite based genetic analysis for gene flow estimation and population differentiation. The E. camaldulensis species complex in its natural range was assessed for its genetic structure with 15 microsatellite loci and concluded that the populations belongs to several subspecies with intergrade zones and breeding programs should not treat the species as a single genetic entity (Butcher et al. [2009]). Similarly, E. globulus species complex was surveyed with 9 microsatellite loci displayed the existence of intergrade populations and the possibilities of 4 subspecies were identified (Jones et al. [2013]). The presence of spatial genetic differentiation and large breeding zones in E. globulus populations in its native range revealed a distant pollen movement (Steane et al. [2006]; Yeoh et al. [2012]). Whereas, in E. urophylla populations of Indonesian islands, low levels of genetic differentiation across populations with high levels of gene diversity within populations were recorded (Payn et al. [2008]). Such information will have large implications in breeding of these economically important plantation species. Eucalyptus species with regional distribution were analyzed for their pollen flow and pattern of genetic diversity. These studies involve microsatellite allele diversity largely indicated that in remnant and fragmented populations of E. curtisii (Smith et al. [2003]), E. leucoxylon (Ottewell et al. [2005]), E. wandoo (Byrne et al. [2008]), E. benthamii (Butcher et al. [2005]), E. gomphocephala (Bradbury et al. [2013a], [b]; Bradbury and Krauss [2013]), E. incrassata (Breed et al. [2012]) and E. loxophleba (Sampson and Byrne [2008]) the genetic differentiation were high across the locations and pollen based gene flow is well maintained. On the other hand, fragmentation led to high degree of clonality and inbreeding in few of the species (Smith et al. [2003]; Butcher et al. [2005]). Further, pollen being the main mode of gene flow, genetic differentiation in quantitative traits was maintained by natural selection (Bloomfield et al. [2011]). Nuclear and chloroplast microsatellite markers were deployed to examine the spatial distribution of genetic diversity in E. pauciflora in Tasmania and the results revealed the route of seed and pollen dispersal and population migration pattern (Gauli et al. [2014]). Effective pollen movement and spatial proximity of different species of eucalypts, which has limited reproduction barriers provides sufficient information for distances required for buffer zone in seed orchards and to maintain genetic integrity of breeding populations in exotic and natural locations. These distinctive features revealed by the microsatellite markers have a high significance in sourcing of seeds and designing breeding and conservation programs (Bacles et al. [2009]; Barbour et al. [2010]; Shepherd and Raymond [2010]). Linkage map and QTL identification Microsatellite markers are regarded to be the tools in marker assisted selection and they are widely utilized for genetic mapping in many forest trees and they are extremely suitable for QTL localization and comparative mapping purposes. Detailed information on the genetic maps developed till date was reviewed by Grattapaglia et al. ([2012]). Most of the genetic mapping studies in eucalypts targeted the commercially important species such as E. grandis, E. urophylla, E. grandis, E. globulus, E. camaldulensis and E. nitens (Bundock et al. [2000]). The Additional file 1: Table S1 shows the SSR markers mapped in genetic linkage maps of different species. In eucalypt inter-specific hybrids, the first genetic map was developed with dominant RAPD markers using pseudotestcross approach (Grattapaglia and Sederoff [1994]). Immediately after the development of genetic maps, QTL localization for growth, adventitious rooting and wood properties were carried out rapidly. Microsatellite linkage mapping was possible only in 1998 for the Eucalyptus grandis × E. urophylla interspecific cross with 20 highly informative Embra SSR loci (Brondani et al. [1998]). Congruity of genetic linkage maps of different eucalypt species had an advantage of consolidating linkage groups across species and quantitative trait loci influencing the traits of interest. The marker correspondence across linkage grouping and position of the SSR loci across genetic maps of eucalypt species was almost similar with few exceptions (See Additional file 1 for linkage group information). The first QTL study involving SSR loci in Eucalyptus for a series of wood properties was reported by Thamarus et al. ([2002]). Vegetative propagation traits were located on homeologous linkage groups of E. grandis, E. urophylla, E. tereticornis and E. globulus (Marques et al. [2002]). Further, integrated linkage maps with different types of DNA markers were developed for many species of eucalypts. The pure species genetic map for E. camaldulensis was developed with RAPDs, RFLPs and SSRs by selecting highly divergent parent trees for mapping population generation (Agrama et al. [2002]). With the development of new SSR markers, Brondani et al. ([2006]) could generate a comprehensive consensus linkage map by including SSR loci information from various eucalypts species. In the recent years, along with the next generation markers like SNPs, SFPs and DArT markers, SSRs are used as framework markers to confirm the linkage groups and position of markers. The SSR markers were used to estimate linkage disequilibrium in eucalypts but reported to be lasting very fast with every 200 bp approximately (Arumugasundaram et al. [2011]). However, in several instances SSR loci were found to be in close association with quantitative traits. For example, in E. grandis breeding population Embra125 and Embra1071 were found to be in linkage equilibrium with rust resistance loci Ppr 1 at 9.5 and 7 recombination, respectively (Mamani et al. [2010]). Embra125 loci was found to be closely linked with rust resistance in E. grandis [(E. grandis) × (E. urophylla × E. grandis)] explaining 42% of the phenotypic variation (Rosado et al. [2010]). Recently, between eSSR markers Embra1656 and Embra1071 (16.4 and 1.4 cM away, respectively) the QTLs governing moderate proportion of the genetic variation (11.5%) for rust resistance was identified (Alves et al. [2011]). In E. globulus putative QTL for Mycosphaerella cryptica resistance was closely associated with microsatellite marker Embra48 (Freeman et al. [2008b]). Similarly, Embra12 was in closely linked to foliar concentrations of terpenes and formylated phloroglucinol compounds in E. nitens and E. globulus (Henery et al. [2007]; Freeman et al. [2008a]). Embra173 alone explained 53.8% variation for formylated phloroglucinols in the foliage of E. globulus (Freeman et al. [2008b]). In another study by Freeman et al. ([2009]) in E. globulus several Embra SSR loci were linked to wood properties and growth traits. Additive and dominant QTLs were found in tight linkage with SSR markers tested for drought tolerance in E. grandis × E. urophylla hybrid clones (Teixeira et al. [2011]). The presence of generic genomic regions was validated through SSR markers, which enabled the identification of orthologous QTL regions for wood properties in E. nitens and E. globulus (Thumma et al. [2010]) and E. urophylla and E. grandis (Gion et al. [2011]). Genic SSRs were found to be largely associated with economically important traits in many plant species. Eucalyptus transcriptome sequencing projects led to the development of many eSSR loci and many were used in genetic maps (Faria et al. [2011]). Eucalyptus species have valuable SSR resources for comparative genomic studies and they also serve as framework markers for construction of a consensus map across species. Addition of fully informative microsatellites on the framework map permits linkage map homology, QTL and candidate gene positions across different eucalypt species (Freeman et al. [2009]). Eucalyptus SSRs were proved again for their colinearity across different species and linkage to physical correspondence on the reference genome sequence (Grattapaglia et al. [2014]). Future prospects Microsatellites have major roles to play in various spheres of eucalypts genetics and improvement. They are one of the three major classes of genetic variations along with SNPs (single nucleotide polymorphisms) and CNVs (copy number variations) and have many important biological functions (Gemayel et al. [2010]). Recent evidences suggest that variations in microsatellites may lead to phenotypic changes (Joy and Soniya [2012]) and adaptive evolution (Fidalgo et al. [2006]). The available genome sequence of the eucalypts genome does not diminish the importance of microsatellites, as these markers will extend annotated genome resources of sequenced Eucalyptus species to genetic study/breeding in different eucalypt species. Genomic SSRs have a broad range of applications, and in particular being neutral markers, which are not linked to any particular trait, but most probably offer a representation of the underlying genetic diversity in wild populations and to target populations for conservation (van Zonneveld et al. [2012]). Further, microsatellites enable the rapid identification of cryptic species and have been used successfully to identify species hybrids in many tree species including eucalypts. They contribute to a better understanding of the processes involved in the development of contemporary patterns of variation, including the regional contraction and expansion of populations and refugia (Nevill et al. [2014]). Several reports confirmed the presence of SSRs in transcription factors and promoters of genes for facilitating transcriptional plasticity. Hence, identification of new gSSRs and eSSRs would pave way for better understanding of the Eucalyptus genome. Genic SSR markers could represent the new class of functional markers, finding use in evolutionary studies, comparative mapping, candidate gene association mapping, gene discovery and molecular breeding (Shi et al. [2014]). In silico SSR polymorphism analysis, a novel access to selecting polymorphic markers is currently advocated to reduce the cost and to increase the efficiency of SSR development. Further, enough care should be exercised while handling null alleles, imperfect repeats, and allelic dropout, equally they can lead to an overestimation of observable alleles, a decrease in observed heterozygosity, and an increase in the apparent level of inbreeding. On the basis of microsatellite analysis, spatial genetic structure (SGS) can be estimated to delineate provenances of eucalypts. In addition, non-denaturing FISH (ND-FISH) can be used to compare the distribution of SSRs to determine whether the range of molecular diversity shown by these highly polymorphic sequences is reflected at the chromosome level. They are also ideally used as anchor markers in molecular linkage maps and in generation of consensus maps across species and that can be highly saturated with DArT and SNP/genotyping by sequencing markers (GBS). Development of a high-density consensus genetic map with SSRs in an important chromosomal interval provides eucalypt molecular breeding programs with a better choice regarding the quality of markers and a higher probability of polymorphic markers. They play a major role in aligning linkage map due to their high transferability and have a functional role in trait variation and to see the conservation and diversification of gene order across the species of eucalypts. Microsatellite markers play a major role in eucalypts at different levels of genetic improvement. The inherent potentiality of these marks to distinguish closely related individuals is increasingly encouraging for the mining of more and more SSRs for placing on linkage groups and other genetic studies. Microsatellites containing DNA sequences and their functional role in the eucalypt genome were investigated and detected linkage-to-physical position for a large number of microsatellites. Recently, two hundred and twenty three new microsatellite markers were surveyed for allelic diversity and added to the existing eucalypt SSR map, bringing the total number of genetically mapped SSR loci to >400 and strengthening the comparative genome mapping (Grattapaglia et al. [2014]). Additionally, the miRNA-SSR markers, i.e., presence of SSRs in precursors of miRNA candidates (Joy et al. [2013]) brought a new biological significance to microsatellites, wherein the microRNAs (miRNAs) play a major role in post transcriptional gene silencing. The length variation of the SSRs in salt responsive miRNA genes provided sensitivity to salinity adaptation of Oryza sativa (Mondal and Ganie [2014]). Any prosperous utilization in tree breeding, SSRs is required in greater numbers. Therefore, recognition of such miRNA-SSRs in eucalypts would lead to better understanding of their role in post-transcriptional gene regulations and phenotypic variations. Additional file 1. 1. Statistical yearbook. Brazilian Association of Forest Plantation Producers, Brasilia DF; 2013. 2. 2. Acuna C, Villalba P, Garcia M, Hopp E, Marcucci S: Functional markers development and genetic diversity analysis in Eucalyptus globulus with emphasis in wood quality candidate genes. BMC Proc 2011, 5(l 7):154. Google Scholar  3. 3. Acuna CV, Fernandez P, Villalba PV, García MN, Hopp E, Poltri SNM: Discovery, validation, and in silico functional characterization of EST-SSR markers in Eucalyptus globulus . Tree Genet Genomes 2012, 8: 289–301. Google Scholar  4. 4. Acuna CV, Villalba PV, Garcia M, Pathauer P, Hopp HE, Marcucci Poltri SN: Microsatellite markers in candidate genes for wood properties and its application in functional diversity assessment in Eucalyptus globulus . Electron J Biotechnol 2012, 15(2):1–17. Google Scholar  5. 5. Agrama H, George TL, Salah SF: Construction of genome map for Eucalyptus camaldulensis DEHN. Silvae Genet 2002, 51(5–6):201–206. Google Scholar  6. 6. Alves AA, Rosado CCG, Faria DA, Da Silva Guimaraes LM, Lau D, Brommonschenkel SH, Alfenas AC: Genetic mapping provides evidence for the role of additive and non-additive QTLs in the response of inter-specific hybrids of Eucalyptus to Puccinia psidii rust infection. Euphytica 2011, 183(1):27–38. Google Scholar  7. 7. Arumugasundaram S, Ghosh M, Veerasamy S, Ramasamy Y: Species discrimination, population structure and linkage disequilibrium in Eucalyptus camaldulensis and Eucalyptus tereticornis using SSR markers. Plos One 2011, 6(12):e28252. CAS  PubMed  PubMed Central  Google Scholar  8. 8. Bacles CF, Brooks J, Lee DJ, Schenk PM, Lowe AJ, Kremer A: Reproductive biology of Corymbia citriodora subsp. variegata and effective pollination across its native range in Queensland, Australia. Southern Forests: J Forest Sci 2009, 71(2):125–132. Google Scholar  9. 9. Barbour RC, Wise SL, McKinnon GE, Vaillancourt RE, Williamson GJ, Potts BM: The potential for gene flow from exotic eucalypt plantations into Australia’s rare native eucalypts. For Ecol Manag 2010, 260(12):2079–2208. Google Scholar  10. 10. Bartholome J, Salmon F, Vigneron P, Bouvet JM, Plomion C, Gion JM: Plasticity of primary and secondary growth dynamics in Eucalyptus hybrids: a quantitative genetics and QTL mapping perspective. BMC Plant Biol 2013, 13(1):1–14. Google Scholar  11. 11. Bloomfield JA, Nevill P, Potts BM, Vaillancourt RE, Steane DA: Molecular genetic variation in a widespread forest tree species Eucalyptus obliqua Myrtaceae on the island of Tasmania. Aust J Bot 2011, 59(3):226–237. Google Scholar  12. 12. Bradbury D, Krauss SL: Limited impact of fragmentation and disturbance on the mating system of tuart Eucalyptus gomphocephala , Myrtaceae: implications for seed- source quality in ecological restoration. Aust J Bot 2013, 61(2):148–160. Google Scholar  13. 13. Bradbury D, Smithson A, Krauss SL (2013a) Development and testing of new gene- homologous EST-SSRs for Eucalyptus gomphocephala Myrtaceae. Appl Plant Sci 1(8). , [] Bradbury D, Smithson A, Krauss SL (2013a) Development and testing of new gene- homologous EST-SSRs for Eucalyptus gomphocephala Myrtaceae. Appl Plant Sci 1(8). 14. 14. Bradbury D, Smithson A, Krauss SL: Signatures of diversifying selection at EST-SSR loci and association with climate in natural Eucalyptus populations. Mol Ecol 2013, 22(20):5112–5129. CAS  PubMed  Google Scholar  15. 15. Breed MF, Ottewell KM, Gardner MG, Marklund MHK, Stead MG, Harris JBC, Lowe AJ (2012) Mating system and early viability resistance to habitat fragmentation in a bird- pollinated eucalypt. Heredity. doi:10.1038/hdy.2012.72 Breed MF, Ottewell KM, Gardner MG, Marklund MHK, Stead MG, Harris JBC, Lowe AJ (2012) Mating system and early viability resistance to habitat fragmentation in a bird- pollinated eucalypt. Heredity. doi:10.1038/hdy.2012.72 16. 16. Brondani RPV, Brondani C, Tarchini R, Grattapaglia D: Development, characterization and mapping of microsatellite markers in Eucalyptus grandis and E. urophylla . Theor Appl Genet 1998, 97(5–6):816–827. CAS  Google Scholar  17. 17. Brondani RPV, Brondani C, Grattapaglia D: Towards a genus-wide reference linkage map for Eucalyptus based exclusively on highly informative microsatellite markers. Mol Genet Genom 2002, 267(3):338–347. CAS  Google Scholar  18. 18. Brondani RPV, Williams ER, Brondani C, Grattapaglia D: A microsatellite-based consensus linkage map for species of Eucalyptus and a novel set of 230 microsatellite markers for the genus. BMC Plant Biol 2006, 6(1):20. PubMed  PubMed Central  Google Scholar  19. 19. Bundock PC, Hayden M, Vaillancourt RE: Linkage maps of Eucalyptus globulus using RAPD and microsatellite markers. Silvae Genet 2000, 49: 223–232. Google Scholar  20. 20. Butcher PA, Skinner AK, Gardiner CA: Increased inbreeding and inter-species gene flow in remnant populations of the rare Eucalyptus benthamii . Conserv Genet 2005, 6(2):213–226. Google Scholar  21. 21. Butcher PA, Mc Donald MW, Bell JC: Congruence between environmental parameters, morphology and genetic structure in Australia’s most widely distributed eucalypt, Eucalyptus camaldulensis . Tree Genet Genomes 2009, 5(1):189–210. Google Scholar  22. 22. Byrne M, Hines B: Phylogeographical analysis of cpDNA variation in Eucalyptus loxophleba Myrtaceae. Aust J Bot 2004, 52(4):459–470. CAS  Google Scholar  23. 23. Byrne M, Garcia MMI, Uren T, Smith DS, Moran GF: Conservation and genetic diversity of microsatellite loci in the genus Eucalyptus . Austr J Bot 1996, 44: 331–341. CAS  Google Scholar  24. 24. Byrne M, Elliott CP, Yates CJ, Coates DJ: Maintenance of high pollen dispersal in Eucalyptus wandoo , a dominant tree of the fragmented agricultural region in Western Australia. Conserv Genet 2008, 9(1):97–105. Google Scholar  25. 25. Ceresini PC, Silva PCLS, Missio RF, Souza EC, Fischer CN, Guillherme IR, Gregorio I, Da Silva EHT, Cicarelli RMB, Da Silva MTA: Satellyptus: analysis and database of microsatellites from ESTs of Eucalyptus . Genet Mol Biol 2005, 28(3):589–600. CAS  Google Scholar  26. 26. Chaix G, Gerber S, Razafimaharo V, Vigneron P, Verhaegen D, Hamon S: Gene flow estimation with microsatellites in a Malagasy seed orchard of Eucalyptus grandis . Theor Appl Genet 2003, 107(4):705–712. CAS  PubMed  Google Scholar  27. 27. Chapuis MP, Estoup A: Microsatellite null alleles and estimation of population differentiation. Mol Bio Evol 2007, 24(3):621–631. CAS  Google Scholar  28. 28. Chybicki IJ, Burczyk J: Simultaneous estimation of null alleles and inbreeding coefficients. J Hered 2009, 100(1):106–113. CAS  PubMed  Google Scholar  29. 29. Correia L, Faria D, Grattapaglia D: Comparative assessment of SNPs and microsatellites for fingerprinting, parentage and assignment testing in species of Eucalyptus . BMC Proc 2011, 5: 41. Google Scholar  30. 30. da Silva JM, De Sousa ACB, De Souza AP, Mori ES, Freitas MLM, Sebbenn AM, De Moraes MLT: Development and characterization of 14 microsatellite loci from an enriched genomic library of Eucalyptus camaldulensis Dehnh. Conserv Genet Resou 2009, 1(1):465–469. Google Scholar  31. 31. Dakin EE, Avise JC: Microsatellite null alleles in parentage analysis. Heredity 2004, 93(5):504–509. CAS  PubMed  Google Scholar  32. 32. Dini TD, Bennadji Z, Cabrera M, Centurion C, Resquin F, Balmelli G: Use of SSR- tools for clone certification in Uruguayan Eucalyptus grandis and Eucalyptus dunnii breeding programs. BMC Proc 2011, 5: 58. Google Scholar  33. 33. Ellegren H: Microsatellites: simple sequences with complex evolution. Nat Rev Genet 2004, 5(6):435–445. CAS  PubMed  Google Scholar  34. 34. Evans J, Turnbull JW: Plantation forestry in the tropics. Oxford University Press, Oxford, UK; 2004. Google Scholar  35. 35. Falahati-Anbaran M, Habashi AA, Esfahany M, Mohammadi SA, Ghareyazie B: Population genetic structure based on SSR markers in alfalfa ( Medigaco sativa L.) from various regions contiguous to the centres of origin of the species. J Genet 2007, 86(1):59–63. CAS  PubMed  Google Scholar  36. 36. Faria DA, Mamani EM, Pappas MR, Pappas GJ, Grattapaglia DA: Selected set of EST-derived microsatellites, polymorphic and transferable across 6 species of Eucalyptus . J Hered 2010, 101(4):512–520. CAS  PubMed  Google Scholar  37. 37. Faria DA, Mamani EMC, Pappas GJ, Grattapaglia D: Genotyping systems for Eucalyptus based on tetra-, penta- and hexanucleotide repeat EST microsatellites and their use for individual fingerprinting and assignment tests. Tree Genet Genomes 2011, 7(1):63–77. Google Scholar  38. 38. Fidalgo M, Barrales RR, Ibeas JI, Jimenez J: Adaptive evolution by mutations in the FLO11 gene. Proc Natl Acad Sci 2006, 103(30):11228–11233. CAS  PubMed  PubMed Central  Google Scholar  39. 39. Field DL, Ayre DJ, Whelan RJ, Young AG: Patterns of hybridization and asymmetrical gene flow in hybrid zones of the rare Eucalyptus aggregate and common E.rubida . Heredity 2010, 106(5):841–853. PubMed  PubMed Central  Google Scholar  40. 40. Foster SA, McKinnon GE, Steane DA, Potts BM, Vaillancourt RE: Parallel evolution of dwarf ecotypes in the forest tree Eucalyptus globulus . New Phytol 2007, 175(2):370–380. PubMed  Google Scholar  41. 41. Freeman JS, Potts BM, Shepherd M, Vaillancourt RE: Parental and consensus linkage maps of Eucalyptus globulus using AFLP and microsatellite markers. Silvae Genet 2006, 55(4–5):202–217. Google Scholar  42. 42. Freeman JS, Marques CM, Carocha V, Borralho N, Potts BM, Vaillancourt RE: Origins and diversity of the Portuguese Landrace of Eucalyptus globules . Ann Forest Sci 2007, 64(6):639–647. Google Scholar  43. 43. Freeman JS, O’Reilly-Wapstra M, Vaillancourt RE, Wiggins N, Potts BM: Quantitative trait loci for key defensive compounds affecting herbivory of eucalypts in Australia. New Phytol 2008, 178(4):846–851. CAS  PubMed  Google Scholar  44. 44. Freeman JS, Potts BM, Vaillancourt RE: Few Mendelian genes underlie the quantitative response of a forest tree, Eucalyptus globulus , to a natural fungal epidemic. Genetics 2008, 178(1):563–571. PubMed  PubMed Central  Google Scholar  45. 45. Freeman JS, Whittock SP, Potts BM, Vaillancourt RE: QTL influencing growth and wood properties in Eucalyptus globulus . Tree Genet Genomes 2009, 5(4):713–722. Google Scholar  46. 46. Freeman JS, Potts BM, Downes GM, Pilbeam D, Thavamanikumar S, Vaillancourt RE: Stability of quantitative trait loci for growth and wood properties across multiple pedigrees and environments in Eucalyptus globulus. New Phytol 2013, 198(4):1121–1134. CAS  PubMed  Google Scholar  47. 47. Garcia M, Villalba P, Acuna C, Oberschelp J, Harrand L, Surenciski M, Poltri SM: A genetic linkage map for a full sib population of Eucalyptus grandis using SSR, DArT, CG-SSR and EST-SSR markers. BMC Proc 2011, 5: 26. Google Scholar  48. 48. Gauli A, Steane D, Vaillancourt R, Potts B: Molecular genetic diversity and population structure in Eucalyptus pauciflora ssp. pauciflora (Myrtaceae) on the island of Tasmania. Aust J Bot 2014, 62(3):175–188. CAS  Google Scholar  49. 49. Gemayel R, Vinces MD, Legendre M, Verstrepen KJ: Variable tandem repeats accelerate evolution of coding and regulatory sequences. Ann Rev Genet 2010, 44: 445–477. CAS  PubMed  Google Scholar  50. 50. Gion JM, Carouche A, Deweer S, Bedon F, Pichavant F, Charpentier JP, Bailleres H, Rozenberg P, Carocha V, Ognouabi N, Verhaegen D, Grima-pettenati J, Vigneron P, Plomion C: Comprehensive genetic dissection of wood properties in a widely- grown tropical tree: Eucalyptus . BMC Genomics 2011, 12(1):301. PubMed  PubMed Central  Google Scholar  51. 51. Glaubitz JC, Emebiri LC, Moran GF: Dinucleotide microsatellites from Eucalyptus sieberi : inheritance, diversity, and improved scoring of single-base differences. Genome 2001, 44(6):1041–1045. CAS  PubMed  Google Scholar  52. 52. Glaubitz JC, Murrell JC, Moran GF: Effects of native forest regeneration practices on genetic diversity in Eucalyptus consideniana . Theor Appl Genet 2003, 107(3):422–431. PubMed  Google Scholar  53. 53. Grattapaglia D: Integrating genomics into Eucalyptus breeding. Genet Mol Res 2004, 3(3):369–379. CAS  PubMed  Google Scholar  54. 54. Grattapaglia D, Sederoff R: Genetic linkage maps of Eucalyptus grandis and Eucalyptus urophylla using a pseudo-testcross: mapping strategy and RAPD markers. Genetics 1994, 137(4):1121–1137. CAS  PubMed  PubMed Central  Google Scholar  55. 55. Grattapaglia D, Ribeiro VJ, Rezende GDS: Retrospective selection of elite parent trees using paternity testing with microsatellite markers: an alternative short term breeding tactic for Eucalyptus . Theor Appl Genet 2004, 109(1):192–199. CAS  PubMed  Google Scholar  56. 56. Grattapaglia D, Vaillancourt RE, Shepherd M, Thumma BR, Foley W, Kulheim C, Myburg AA: Progress in Myrtaceae genetics and genomics: Eucalyptus as the pivotal genus. Tree Genet Genomes 2012, 8(3):463–508. Google Scholar  57. 57. Grattapaglia D, Mamani E, Silva-Junior OB, Faria DA (2014) A novel genome-wide microsatellite resource for species of Eucalyptus with linkage-to-physical correspondence on the reference genome sequence. Mol Ecol Resour. doi: 10.1111/1755–0998.12317 Grattapaglia D, Mamani E, Silva-Junior OB, Faria DA (2014) A novel genome-wide microsatellite resource for species of Eucalyptus with linkage-to-physical correspondence on the reference genome sequence. Mol Ecol Resour. doi: 10.1111/1755-0998.12317 58. 58. Grosser C, Potts BM, Vaillancourt RE: Microsatellite based paternity analysis in a clonal Eucalyptus nitens seed orchard. Silvae Genet 2008, 59: 57–62. Google Scholar  59. 59. Gross-German E, Viruel MA: Molecular characterization of avocado germplasm with a new set of SSR and EST-SSR markers: genetic diversity, population structure, and identification of race-specific markers in a group of cultivated genotypes. Tree Genet Genomes 2013, 9(2):539–555. Google Scholar  60. 60. Hamblin MT, Warburton ML, Buckler ES: Empirical comparison of simple sequence repeats and single nucleotide polymorphisms in assessment of maize diversity and relatedness. PLoS One 2007, 2(12):e1367. PubMed  PubMed Central  Google Scholar  61. 61. He X, Wang Y, Li F, Weng Q, Li M, Xu LA, Gan S: Development of 198 novels EST- derived microsatellites in Eucalyptus Myrtaceae. Am J Bot 2012, 99(4):134–148. Google Scholar  62. 62. Healey A, Furtado A, Henry RJ: Structural genomics of eucalypts. In Genetics, genomics and breeding of eucalypts. Edited by: Henry R, Kole C. CRC Press, Boca Raton, FL; 2014:103–120. Google Scholar  63. 63. Henery ML, Moran GF, Wallis IR, Foley WJ: Identification of quantitative trait loci influencing foliar concentrations of terpenes and formylated phloroglucinol compounds in Eucalyptus nitens . New Phytol 2007, 176(1):82–95. CAS  PubMed  Google Scholar  64. 64. Hirakawa H, Nakamura Y, Kaneko T, Isobe S, Sakai H, Kato T, Hibino T, Sasamoto S, Watanabe A, Yamada M, Nakayama S, Fujishiro T, Kishida Y, Kohara M, Tabata S, Sato S: Survey of the genetic information carried in the genome of Eucalyptus camaldulensis . Plant Biotech 2011, 28: 471–480. CAS  Google Scholar  65. 65. Hoffman JI, Amos W: Microsatellite genotyping errors: detection approaches, common sources and consequences for paternal exclusion. Mol Ecol 2005, 14(2):599–612. CAS  PubMed  Google Scholar  66. 66. Holman JE, Hughes JM, Fensham RJ: A morphological cline in Eucalyptus : a genetic perspective. Mol Ecol 2003, 12(11):3013–3025. PubMed  Google Scholar  67. 67. Hudson CJ, Freeman JS, Kullan AR, Petroli CD, Sansaloni CP, Kilian A, Vaillancourt RE: A reference linkage map for Eucalyptus . BMC Genomics 2012, 13(1):240. CAS  PubMed  PubMed Central  Google Scholar  68. 68. Jones ME, Stokoe RL, Cross MJ, Scott LJ, Maguire TL, Shepherd M: Isolation of microsatellite loci from spotted gum Corymbia variegate and cross-species amplification in Corymbia and Eucalyptus . Mol Ecol Notes 2001, 1(4):276–278. CAS  Google Scholar  69. 69. Jones RC, Steane DA, Potts BM, Vaillancourt RE: Microsatellite and morphological analysis of Eucalyptus globulus populations. Can J Forest Res 2002, 32(1):59–66. Google Scholar  70. 70. Jones TH, Steane DA, Jones RC, Pilbeam D, Vaillancourt RE, Potts BM: Effects of domestication on genetic diversity in Eucalyptus globulus . For Ecol Manag 2006, 234(1):78–84. Google Scholar  71. 71. Jones TH, Vaillancourt RE, Potts BM: Detection and visualization of spatial genetic structure in continuous Eucalyptus globulus forest. Mol Ecol 2007, 16(4):697–707. CAS  PubMed  Google Scholar  72. 72. Jones ME, Shepherd M, Henry R, Delves A: Pollenflow in Eucalyptus grandis determined by paternity analysis using microsatellite markers. Tree Genet Genomes 2008, 4(1):37–47. Google Scholar  73. 73. Jones RC, Steane DA, Lavery M, Vaillancourt RE, Potts BM: Multiple evolutionary processes drive the patterns of genetic differentiation in a forest tree species complex. Ecol Evol 2013, 3(1):1–17. PubMed Central  Google Scholar  74. 74. Joy N, Soniya EV: Identification of an miRNA candidate reflects the possible significance of transcribed microsatellites in the hairpin precursors of black pepper. Funct Integr Genom 2012, 12(2):387–395. CAS  Google Scholar  75. 75. Joy N, Asha S, Mallika Vand Soniya EV: De novo transcriptome sequencing reveals a considerable bias in the incidence of simple sequence repeats towards the downstream of `pre-miRNAs’ of black pepper. PLoS One 2013, 8(3):e56694. CAS  PubMed  PubMed Central  Google Scholar  76. 76. Kalia RK, Rai MK, Kalia S, Singh R, Dhawan AK: Microsatellite markers: an overview of the recent progress in plants. Euphytica 2011, 177(3):309–334. CAS  Google Scholar  77. 77. Khadivi-Khub A, Zamani Z, Fattahi R, Wünsch A: Genetic variation in wild Prunus L. subgen. Cerasus germplasm from Iran characterized by nuclear and chloroplast SSR markers. Trees 2014, 28(2):471–485. CAS  Google Scholar  78. 78. Kirst M, Myburg AA, De Leon JP, Kirst ME, Scott J, Sederoff R: Coordinated genetic regulation of growth and lignin revealed by quantitative trait locus analysis of cDNA microarray data in an interspecific backcross of Eucalyptus . Plant Physiol 2004, 135(4):2368–2378. CAS  PubMed  PubMed Central  Google Scholar  79. 79. Kirst M, Basten CJ, Myburg AA, Zeng ZB, Sederoff RR: Genetic architecture of transcript-level variation in differentiating xylem of a Eucalyptus hybrid. Genetics 2005, 169(4):2295–2303. CAS  PubMed  PubMed Central  Google Scholar  80. 80. Kirst M, Cordeiro CM, Rezende G, Grattapaglia D: Power of microsatellite markers for fingerprinting and parentage analysis in Eucalyptus grandis breeding populations. J Heredity 2005, 96(2):161–166. CAS  Google Scholar  81. 81. Kudapa H, Azam S, Sharpe AG, Taran B, Li R, Deonovic B, Varshney RK: Comprehensive transcriptome assembly of chickpea Cicer arietinum L . Using Sanger and next generation sequencing platforms: development and applications. PLoS One 2014, 9(1):e86039. PubMed  PubMed Central  Google Scholar  82. 82. Kullan ARK, Van Dyk MM, Jones N, Kanzler A, Bayley A, Myburg AA: High - density genetic linkage maps with over 2,400 sequence-anchored DArT markers for genetic dissection in an F2 pseudo-backcross of Eucalyptus grandis × E. urophylla . Tree Genet Genomes 2011, 8(1):163–175. Google Scholar  83. 83. Kullan ARK, Van Dyk MM, Hefer CA, Jones N, Kanzler A, Myburg AA: Genetic dissection of growth, wood basicdensity and gene expression in interspecific backcrosses of Eucalyptus grandis and E. urophylla . BMC Genet 2012, 13(1):60. CAS  PubMed  PubMed Central  Google Scholar  84. 84. Luo J, Arnold R, Ren S, Jiang Y, Lu W, Peng Y, Xie Y: Veneer grades, recoveries and values from 5-year old eucalypt clones. Ann For Sci 2013, 70(4):417–428. Google Scholar  85. 85. Mamaghani MS, Shojaei TR, Matinizadeh M, Forootan M: Microsatellite loci and peroxidase alleles correlation in somaclonal variation of Eucalyptus microtheca F. Muell Afr J Biotechnol 2010, 9(29):4521–4528. CAS  Google Scholar  86. 86. Mamani EM, Bueno NW, Faria DA, Guimaraes LM, Lau D, Alfenas AC, Grattapaglia D: Positioning of the major locus for Puccinia psidii rust resistance Ppr1 on the Eucalyptus reference map and its validation across unrelated pedigrees. Tree Genet Genomes 2010, 6(6):953–962. Google Scholar  87. 87. Marques CM, Brondani RPV, Grattapaglia D, Sederoff R: Conservation and synteny of SSR loci and QTLs for vegetative propagation in four Eucalyptus species. Theor Appl Genet 2002, 105(2–3):474–478. CAS  PubMed  Google Scholar  88. 88. Missiaggia A, Grattapaglia D: Plant microsatellite genotyping with 4-color fluorescent detection using multiple-tailed primers. Genet Mol Res 2006, 5(1):72–78. CAS  PubMed  Google Scholar  89. 89. Missiaggia AA, Piacezzi AL, Grattapaglia D: Genetic mapping of Eef1, a major effect QTL for early flowering in Eucalyptus grandis . Tree Genet Genomes 2005, 1(2):79–84. Google Scholar  90. 90. Mizrachi E, Hefer C, Ranik M, Joubert F, Myburg AA: De novo assembled expressed gene catalog of a fast-growing Eucalyptus plantation tree produced by Illumina mRNA- seq. BMC Genomics 2010, 11(1):681. CAS  PubMed  PubMed Central  Google Scholar  91. 91. Mondal TK, Ganie SA: Identification and characterization of salt responsive miRNA- SR markers in rice ( Oryza sativa ). Gene 2014, 535(2):204–209. CAS  PubMed  Google Scholar  92. 92. Myburg AA, Potts BM, Marques CM, Kirst M, Gion JM, Grattapaglia D, Grima-Pettenati J: Eucalyptus. In Genome mapping and molecular breeding in plants. Edited by: Kole C. Springer, NY; 2007:115–160. Google Scholar  93. 93. Myburg AA, Grattapaglia D, Tuskan GA, Hellsten U, Hayes RD, Grimwood J, Jenkins J, Lindquist E, Tice H, Bauer D, Goodstein DM, Dubchak I, Poliakov A, Mizrachi E, Kullan ARK, Hussey SG, Pinard D, van der Merwe K, Singh P, van Jaarsveld I, Silva-Junior OB, Togawa RC, Pappas MR, Faria DA, Sansaloni CP, Petroli CD, Yang X, Priya R, Tschaplinski TJ, Chu-Yu Y, et al.: The genome of Eucalyptus grandis . Nature 2014, 510(7505):356–362. CAS  PubMed  Google Scholar  94. 94. Nagabhushana K, Hendre PS, Sharma N, Rathinavelu R: Novel design and deployment of orthologous genic SSR markers in Eucalyptus camaldulensis Dehnh. BMC Proc 2011, 5(Suppl 7):51. Google Scholar  95. 95. Neves LG, Mamani EM, Alfenas AC, Kirst M, Grattapaglia D: A high-density transcript linkage map with 1,845 expressed genes positioned by microarray-based Single Feature Polymorphisms SFP in Eucalyptus . BMC Genomics 2011, 12(1):189. CAS  PubMed  PubMed Central  Google Scholar  96. 96. Nevill PG, Reed A, Bossinger G, Vaillancourt RE, Larcombe M, Ades PK: Cross-species amplification of Eucalyptus microsatellite loci. Mol Ecol Res 2008, 8(6):1277–1280. CAS  Google Scholar  97. 97. Nevill PG, Bossinger G, Ades PK: Phylogeography of the world’s tallest angiosperm, Eucalyptus regnans : evidence for multiple isolated Quaternary refugia. J Biogeogr 2010, 37(1):179–192. Google Scholar  98. 98. Nevill PG, Bradbury D, Jorgensen T, Krauss S, Samaraweera S, Gardner MG (2013) Microsatellite primers identified by 454 sequencing in the floodplain tree species Eucalyptus victrix (Myrtaceae). Appl Plant Sci 1(5):, [] Nevill PG, Bradbury D, Jorgensen T, Krauss S, Samaraweera S, Gardner MG (2013) Microsatellite primers identified by 454 sequencing in the floodplain tree species Eucalyptus victrix (Myrtaceae). Appl Plant Sci 1(5):, 99. 99. Nevill PG, Bradbury D, Williams A, Tomlinson S, Krauss SL: Genetic and palaeo- climatic evidence for widespread persistence of the coastal tree species Eucalyptus gomphocephala (Myrtaceae) during the last glacial maximum. Ann Bot 2014, 113(1):55–67. PubMed  Google Scholar  100. 100. Ochieng J, Steane DA, Ladiges PY, Baverstock PR, Henry RJ, Shepherd M: Microsatellites retain phylogenetic signals across genera in eucalypts (Myrtaceae). Genet Mol Biol 2007, 30(4):1125–1134. CAS  Google Scholar  101. 101. Ottewell KM, Donnellan SC, Moran GF, Paton DC: Multiplexed microsatellite markers for the genetic analysis of Eucalyptus leucoxylon Myrtaceae and their utility for ecological and breeding studies in other Eucalyptus species. J Heredity 2005, 96(4):445–451. CAS  Google Scholar  102. 102. Paiva JA, Prat E, Vautrin S, Santos MD, Clemente SH, Brommonschenkel S, Grima- Pettenati J: Advancing Eucalyptus genomics: identification and sequencing of lignin biosynthesis genes from deep-coverage BAC libraries. BMC Genomics 2011, 12(1):137. CAS  PubMed  PubMed Central  Google Scholar  103. 103. Patterson B, Vaillancourt RE, Pilbeam DJ, Potts BM: Factors affecting variation in outcrossing rate in Eucalyptus globulus . Aust J Bot 2004, 52(6):773–780. Google Scholar  104. 104. Payn KG, Dvorak WS, Janse BJH, Myburg AA: Microsatellite diversity and genetic structure of the commercially important tropical tree species Eucalyptus urophylla , endemic to seven islands in eastern Indonesia. Tree Genet Genomes 2008, 4(3):519–530. Google Scholar  105. 105. Petroli CD, Sansaloni CP, Carling J, Steane DA, Vaillancourt RE, Myburg AA, Grattapaglia D: Genomic characterization of DArT markers based on high- density linkage analysis and physical mapping to the Eucalyptus genome. PLoS One 2012, 7(9):e44684. CAS  PubMed  PubMed Central  Google Scholar  106. 106. Poltri SM, Zelener N, Traverso JR, Gelid P, Hopp HE: Selection of a seed orchard of Eucalyptus dunnii based on genetic diversity criteria calculated using molecular markers. Tree Physiol 2003, 23(9):625–632. Google Scholar  107. 107. Porth I, El-Kassaby YA: Assessment of the genetic diversity in forest tree populations using molecular markers. Diversity 2014, 6(2):283–295. Google Scholar  108. 108. Rabello E, Souza NDA, Saito D, Tsai MS: In silico characterisation of microsatellites in Eucalyptus spp.: abundance, length variation and transposon associations. Genet Molar Biol 2005, 28(3):582–588. CAS  Google Scholar  109. 109. Ranade SS, Lin YC, Zuccolo A, Van de Peer Y, García-Gil MR: Comparative in silico analysis of EST-SSRs in angiosperm and gymnosperm tree genera. BMC Plant Biol 2014, 14(1):220. PubMed  PubMed Central  Google Scholar  110. 110. Rao HX, Patterson B, Potts B, Vaillancourt R: A microsatellite study on outcrossing rates and contamination in an Eucalyptus globulus breeding arboretum. J For Res 2008, 19(2):136–140. CAS  Google Scholar  111. 111. Rathbone DA, McKinnon GE, Potts BM, Steane DA, Vaillancourt RE: Microsatellite and cpDNA variation in island and mainland populations of a regionally rare eucalypt, Eucalyptus perriniana Myrtaceae. Aust J Bot 2007, 55(5):513–520. CAS  Google Scholar  112. 112. Rengel D, Clemente HS, Servant F, Ladouce N, Paux E, Wincker P, Couloux A, Sivadon P, Grima-Pettenati J: A new Eucalyptus genomic resource dedicated to wood formation: a comprehensive survey. BMC Plant Biol 2009, 9(1):36. PubMed  PubMed Central  Google Scholar  113. 113. Ribeiro MM, Sanchez L, Ribeiro C, Cunha F, Araujo J, Borralho NM, Marques C: A case study of Eucalyptus globulus fingerprinting for breeding. A Forest Science 2011, 68(4):701–714. Google Scholar  114. 114. Rosado TB, Tomaz RS, Ribeiro Junior MF, Rosado AM, Guimaraes LMDS, Araujo EFD, Cruz CD: Detection of QTL associated with rust resistance using IBD-based methodologies in exogamic Eucalyptus spp. populations. Crop Breed Appl Biotechnol 2010, 10(4):321–328. Google Scholar  115. 115. Sampson JF, Byrne M: Outcrossing between an agroforestry plantation and remnant native populations of Eucalyptus loxophleba . Mol Ecol 2008, 17(11):2769–2781. PubMed  Google Scholar  116. 116. Sexton TR, Henry RJ, McManus LJ, Bowen S, Shepherd M: Capture of assay template by multiplex PCR of long amplicons for genotyping SNPs and InDels with MALDI-TOF mass spectrometry. Mol Breed 2010, 25(3):471–480. CAS  Google Scholar  117. 117. Shepherd M, Raymond CA: Species delineation and gene flow in the Blackbutts genus Eucalyptus subgenus Eucalyptus section Pseudophloius. Conserv Genet 2010, 11(5):1965–1978. Google Scholar  118. 118. Shepherd M, Kasem S, Lee D, Henry R: Construction of microsatellite linkage maps for Corymbia . Silvae Genet 2006, 55(4–5):228–237. Google Scholar  119. 119. Shepherd M, Kasem S, Lee DJ, Henry R: Mapping species differences for adventitious rooting in a Corymbia torelliana × Corymbia citriodora subspecies variegata hybrid. Tree Genet Genomes 2008, 4(4):715–725. Google Scholar  120. 120. Shepherd M, Sexton TR, Thomas D, Henson M, Henry RJ: Geographical and historical determinants of microsatellite variation in Eucalyptus pilularis . Can J Forest Res 2010, 40(6):1051–1063. CAS  Google Scholar  121. 121. Shi L, Lv X, Weng J, Zhu H, Liu C, Hao Z, Zhang S: Genetic characterization and linkage disequilibrium mapping of resistance to gray leaf spot in maize ( Zea mays L). The Crop Journal 2014, 2(2):132–143. Google Scholar  122. 122. Sitther V, Zhang D, Harris DL, Yadav AK, Zee FT, Meinhardt LW, Dhekney SA: Genetic characterization of guava ( Psidium guajava L.) germplasm in the United States using microsatellite markers. Genetic Resour Crop Evol 2014, 61(4):829–839. CAS  Google Scholar  123. 123. Smith S, Hughes J, Wardell-Johnson G: High population differentiation and extensive clonality in a rare mallee eucalypt: Eucalyptus curtisii - conservation genetics of a rare mallee eucalypt. Conserv Genet 2003, 4: 289–300. CAS  Google Scholar  124. 124. Steane D, Vaillancourt R, Russell J, Powell W, Marshall D, Potts B: Development and characterisation of microsatellite loci in Eucalyptus globulus Myrtaceae. Silvae Genet 2001, 50(2):89–92. Google Scholar  125. 125. Steane DA, Jones RC, Vaillancourt RE: A set of chloroplast microsatellite primers for Eucalyptus Myrtaceae. Mol Ecol Notes 2005, 5(3):538–541. CAS  Google Scholar  126. 126. Steane DA, Conod N, Jones RC, Vaillancourt RE, Potts BM: A comparative analysis of population structure of a forest tree, Eucalyptus globulus Myrtaceae, using microsatellite markers and quantitative traits. Tree Genet Genomes 2006, 2(1):30–38. Google Scholar  127. 127. Stokoe RL, Shepherd M, Lee D, Nikles DG, Henry RJ: Natural interspecific hybridization between Eucalyptus acmenoides Schauer and E. cloeziana F. Muell Myrtaceae. Ann Bot 2001, 88(4):563–570. Google Scholar  128. 128. Subashini V, Shanmugapriya A, Yasodha R: Hybrid purity assessment in Eucalyptus F1hybrids using microsatellite markers. 3 Biotech 2013, 4(4):367–373. PubMed Central  Google Scholar  129. 129. Teixeira J, Missiaggia A, Dias D, Scarpinati E, Viana J, Paula N, Paula R, Bonine C: QTL analyses of drought tolerance in Eucalyptus under two contrasting water regimes. BMC Proc 2011, 5: 40. Google Scholar  130. 130. Terzoli S, Abbruzzese G, Beritognolo I, Sabatti M, Valentini R, Kuzminsky E: Genetic characterization of a Tamarix spp. germplasm collection in Italy. Botany 2014, 92(5):360–369. Google Scholar  131. 131. Thamarus K, Groom K, Murrell J, Byrne M, Moran G: A genetic linkage map for Eucalyptus globulus with candidate loci for wood, fibre and floral traits. Theor Appl Genet 2002, 104(2–3):379–387. CAS  PubMed  Google Scholar  132. 132. Thumma BR, Southerton SG, Bell JC, Owen JV, Henery ML, Moran GF: Quantitative trait locus QTL analysis of wood quality traits in Eucalyptus nitens . Tree Genet Genomes 2010, 6(2):305–317. Google Scholar  133. 133. Tripiana V, Bourgeois M, Verhaegen D, Vigneron P, Bouvet JM: Combining microsatellites, growth, and adaptive traits for managing in situ genetic resources of Eucalyptus urophylla . Can J For Res 2007, 37(4):773–785. Google Scholar  134. 134. Trujillo I, Ojeda MA, Urdiroz NM, Potter D, Barranco D, Rallo L, Diez CM: Identification of the Worldwide Olive Germplasm Bank of Córdoba (Spain) using SSR and morphological markers. Tree Genet Genomes 2014, 10(1):141–155. Google Scholar  135. 135. Van Der Nest MA, Steenkamp ET, Wingfield BD, Wingfield MJ: Development of simple sequence repeat SSR markers in Eucalyptus from amplified inter-simple sequence repeats ISSR. Plant Breed 2000, 119(5):433–436. CAS  Google Scholar  136. 136. van Zonneveld M, Scheldeman X, Escribano P, Viruel MA, Van Damme P, Garcia W, Tapia C, Romero J, Sigueñas M, Hormaza JH: Mapping genetic diversity of cherimoya ( Annona cherimola Mill.): Application of spatial analysis for conservation and use of plant genetic resources. Plos One 2012, 7: e29845. CAS  PubMed Central  Google Scholar  137. 137. van Zonneveld M, Dawson I, Thomas E, Scheldeman X, van Etten J, Loo J, Hormaza JI: Application of molecular markers in spatial analysis to optimize in situ conservation of plant genetic resources. Genomics of plant genetic resources. Springer, Netherlands; 2014. Google Scholar  138. 138. Varshney RK, Graner A, Sorrells ME: Genic microsatellite markers in plants: features and applications. Trends in Biotech 2005, 23: 48–55. CAS  Google Scholar  139. 139. Wang ML, Barkley NA, Jenkins TM: Microsatellite markers in plants and insects. Part I applications of biotechnology. Genes Genomes Genomics 2009, 3(1):54–67. Google Scholar  140. 140. Wheeler R, Nevill PG, Renton M, Krauss SL: Interspecific hybridisation in tuart Eucalyptus gomphocephala , Myrtaceae: a conservation management issue? Aust J Bot 2013, 61(6):455–464. Google Scholar  141. 141. Yang X, Xu Y, Shah T, Li H, Yan J: Comparison of SSRs and SNPs in assessment of genetic relatedness in maize. Genetica 2011, 139(8):1045–1054. CAS  PubMed  Google Scholar  142. 142. Yasodha R, Sumathi R, Chezhian P, Kavitha S, Ghosh M: Eucalyptus microsatellites mined in silico: survey and evaluation. J Genet 2008, 87(1):21–25. CAS  PubMed  Google Scholar  143. 143. Yeoh SH, Bell JC, Foley WJ, Wallis IR, Moran GF: Estimating population boundaries using regional and local-scale spatial genetic structure: an example in Eucalyptus globules . Tree Genet Genomes 2012, 8(4):695–708. Google Scholar  144. 144. Zalapa JE, Cuevas H, Zhu H, Steffan S, Senalik D, Zeldin E, Simon P: Using next- generation sequencing approaches to isolate simple sequence repeat SSR loci in the plant sciences. Am J Bot 2012, 99(2):193–208. CAS  PubMed  Google Scholar  145. 145. Zelener N, Poltri SN, Bartoloni N, Lopez CR, Hopp HE: Selection strategy for a seedling seed orchard design based on trait selection index and genomic analysis by molecular markers: a case study for Eucalyptus dunnii . Tree Physiol 2005, 25(11):1457–1467. CAS  PubMed  Google Scholar  146. 146. Zhou C, Li F, Weng Q, Yu X, Li M, Gan S: Comparison between direct sequencing and pool-cloning-based sequencing of PCR products in EST-SSR marker development in Eucalyptus . Mol Plant Breed 2010, 8: e1. doi:10.5376/ doi:10.5376/ Google Scholar  147. 147. Zhou C, He X, Li F, Weng Q, Yu X, Wang Y, Gan S: Development of 240 novel EST- SSRs in Eucalyptus L’Herit.. Mol Breed 2014, 33(1):221–225. Google Scholar  Download references The first author acknowledges the Junior Research Fellowship from the Department of Biotechnology, Government of India. Author information Corresponding author Correspondence to Ramasamy Yasodha. Additional information Competing interests The authors declare that they have no competing interests. Authors’ contributions MS surveyed the literature and drafted the manuscript. RY provided guidence for the review, modified and prepared the final version of the manuscript. Both the authors read and approved the final manuscript. Electronic supplementary material Authors’ original submitted files for images Authors’ original file for figure 1 Authors’ original file for figure 2 Rights and permissions Reprints and Permissions About this article Verify currency and authenticity via CrossMark Cite this article Sumathi, M., Yasodha, R. Microsatellite resources of Eucalyptus: current status and future perspectives. Bot Stud 55, 73 (2014). Download citation • Eucalyptus • Microsatellites • EST-SSRs • miRNA-SSRs • Genotyping • Population genetics • Marker assisted selection
You asked: Are babies with Turner syndrome smaller? Almost all girls with Turner syndrome will grow up to be shorter than average, with underdeveloped ovaries. Girls with Turner syndrome also have distinctive features and associated health conditions, some of which may be apparent from birth. Are Turner syndrome babies born small? Turner’s syndrome (TS) is one of the most frequent diseases accompanied by growth deficiency. Though developmental disorders have been observed in the fetal period, there has been disagreement as to whether short stature is frequent in newborn girls with Turner’s syndrome. Is Turner syndrome noticeable at birth? Diagnosis of Turner’s syndrome before birth (prenatally) – usually if an amniocentesis has been performed or abnormalities are seen during an ultrasound. at birth – due to certain physical features. in childhood – when the young girl doesn’t grow at a similar rate to her peers. How long is the average lifespan of a person with Turner syndrome? What is the long-term outlook for people with Turner syndrome? The long-term outlook ( prognosis ) for people with Turner syndrome is typically good. Life expectancy is slightly shorter than average but may be improved by addressing and treating associated chronic illnesses, such as obesity and hypertension . THIS IS INTERESTING:  Where are chromosomes found GCSE? Is Turner syndrome like Down syndrome? Down syndrome, Turner syndrome, and Klinefelter syndrome constitute the most common chromosomal abnormalities encountered by primary care physicians. Down syndrome typically is recognized at birth, Turner syndrome often is not recognized until adolescence,and many men with Klinefelter syndrome are never diagnosed. Does Turner syndrome come from Mom or Dad? Turner syndrome is not caused by anything the parents did or did not do. The disorder is a random error in cell division that happens when a parent’s reproductive cells are being formed. Girls born with the X condition in only some of their cells have mosaic Turner syndrome. What race is Turner syndrome most common in? During 2012-2016 (average) in North Carolina, Turner syndrome was highest for American Indian infants (5.1 in 10,000 live female births), followed by whites (2.3 in 10,000 live female births), Hispanics (1.8 in 10,000 live female births), blacks (1.1 in 10,000 live female births) and Asians (0.8 in 10,000 live female … Is there a cure coming soon for Turner syndrome? There is no cure for Turner syndrome, but therapies have been developed that can improve physical development. With proper medical care, females with Turner syndrome should be able to lead full, productive lives. The primary therapies for affected individuals are growth hormone therapy and estrogen therapy. What is the difference between Down syndrome and Turner syndrome? Turner syndrome is caused by an absence in one or part of the sex(X) chromosome. Down syndrome is the most common genetic cause of learning disabilities in children. Turner syndrome is the dysgenesis in the female gonads, while Klinefelter syndrome is the male hypogonadism. THIS IS INTERESTING:  What is the probability that parents with the genotype AaBbCc and AaBbCc will produce offspring that is AaBbCc? What age do girls with Turner syndrome stop growing? 15 years of age or so, growth plates of the bones fuse together and physical growth stops. Most with TS have a delayed bone age, meaning the bones grow slower than others the same age, thus increasing the potential to grow for a longer period of time. Can a boy have Turner syndrome? Turner syndrome, characterized by the presence of a monosomy X cell line, is a common chromosomal dis- order. Patients with Turner syndrome are usually phenotypically female, and male cases are rarely reported. Why do females with Turner syndrome have color blindness? Colorblindness appears to be an X-linked recessive disorder. That means that the woman with Turner syndrome had to have obtained her sole X from her mother. She did not obtain a sex chromosome from her father, which indicates that nondisjunction occurred in him. All about hereditary diseases
The Role of Certified Financial Advisors (CFA) Financial Advisors The Role of Certified Financial Advisors (CFA) A financial advisor or financial planner is someone who gives advice to customers based on his/her understanding of the financial consequences of various actions. In most countries, financial advisors have to complete certain formal training and be registered under a regulatory body to give advice to consumers. Financial advisers work for private individuals, large organisations and corporations. They help people plan their savings and investment portfolios and help them manage their money by providing advice on how to save and spend their money. The term ‘fiduciary’ refers to a relationship between an advisor and a client. In Canada, financial advisors are required to hold a regulated professional licence, which can be obtained after three years of training from a qualified individual. In the United States, there is no regulatory requirement to hold a licence but most professional advisors hold at least CPA status. In both countries, an advisor must also comply with applicable laws, including the Rules of Conduct adopted by the American Bar Association and Rules of Securities Regulation adopted by the Securities and Exchange Commission. To become a registered professional financial advisor in Canada, one needs to obtain a non-accredited diploma from an educational institution approved by the provincial securities commissions. An investment advisor can be a principal, a manager, a global financial planner or a self-employed consultant. In the United States, the only licenses required are those issued by the states and then only for six months. Principal financial planners work for firms or individuals on their own, managing and advising clients on how to invest their money. Global financial planners are generally employed by multinational companies and help them devise strategies to reduce their taxes by structuring their businesses so that they benefit primarily from tax breaks available to them. Self-employed financial planners do not work for any company, but help individuals and organisations plan and manage their finances. A wide range of people get help from financial advisors. Business owners need help to organise their ventures. Investors, too, need someone to advise them on where to invest. Family planners help couples establish a tax-efficient estate planning strategy and help them keep track of their assets and liabilities. Insurance agents also commonly hire financial planners to help them create an estate plan and manage their investments. Public accountants work with individuals and corporations to help them get the best return on their investments. The role of a financial advisor has changed over time. Prior to the age of television, the typical advisor was a real-estate agent who helped clients organise their finances. Today, many people rely on financial advisors because the internet has made it possible for virtually anyone to access investment advice and make informed decisions about their finances. Today’s economic environment has caused many people to have impairments on their personal and business finances. The role of a financial advisor has changed, as well, and has adapted to suit the needs of all sorts of people. Under the law, financial advisors are required to have a fiduciary standard, which means they must act in the best interests of their clients. In the past, these professionals simply took the fees they recommended and in many cases did not do anything to help the client. However, the new regulations have forced certified financial planners and independent financial advisors to be more diligent in helping their clients to manage their money. Therefore, many certified financial planners and self-directed IRA providers are now being required to register with the Department of Labor and the SEC to maintain regulated status. This ensures that these professionals are following rules that are in line with the wishes of the government. This is important for anyone who wants to ensure that they are getting high quality advice that will benefit their future.
What is the danger of lack of sleep? How does sleep deprivation influence us? What are the consequences of not having enough sleep? Not getting enough sleep can cause severe health problems. If we talk about chronic insomnia, then it is dangerous and even fatal. Already after a week without sleep, a person begins to be overwhelmed by paranoia, hallucinations; mind confusion manifests itself, the person’s memory suffers, the symptoms of lack of sleep are similar to Alzheimer's disease. According to experts, a person lacks an average of eight to 16 hours of sleep per week. Even if there are no problems with the quality of night rest, in the future, lack of sleep can threaten with a whole bunch of serious diseases. After already 4 days of sleep deprivation, irreversible processes begin in the body. Too little rest also affects our physical and mental health. Among mental disorders caused by fatigue, the most common are depression, panic attacks, and unreasonable fear. Physiological it is much more serious. The hormonal background is first to suffer from lack of sleep, so often people in need of rest suffer from excess weight, thyroid diseases, diabetes. Further, the work of internal organs worsens, in particular, the lack of rest negatively affects the work of the heart and blood vessels, there are problems with pressure, headaches, migraines. Prolonged sleep deprivation greatly wears out the body, the process of premature aging begins, wrinkles and hair loss appear faster. This happens due to the fact that the body does not consider it necessary to spend its precious forces in such an intense mode on the restoration of secondary areas. Damaged DNA In 2018, researchers from the University of Hong Kong, China, monitored 49 volunteers for four months. They were all doctors, and some regularly went on long shifts, during which they managed to sleep at best twice for three hours. The researchers behind this study wanted to understand how persistent sleep deprivation affects human health. Blood samples were taken regularly from the subjects, including after night shifts. Sample analysis showed that sleep deprivation increases the amount of oxidative damage to DNA and decreases the ability of cells to repair chemical damage and breaks in it. This, in turn, can lead to the development of cardiovascular disease and diabetes. Inadequate and dangerous The sleep rate for an adult is at least seven hours a day. Elderly people need six hours to get enough sleep. Anyone who neglects overnight recharging risks becoming a psychiatrist patient in the future. As neuroscientists at the University of California, Berkeley have found, the lack of sleep distorts the perception of emotions and intentions. In other words, sleepy people are unable to distinguish a neutral or benevolent facial expression from a threatening one. Moreover, they tend to perceive any mimic expression of emotions as dangerous and see everyone as enemies. People who suffer from insufficient amount of sleeping cannot make quick and correct decisions in critical situations because they cannot adapt to changing circumstances and take the incoming feedback into account adequately. "Due to lack of sleep, concentration of attention is impaired and the number of errors increases. This is very important for adults whose work is connected with the need to maintain a sufficient level of attention: drivers, operators of various machines. Moreover, it has been shown that the longer a person limits himself to sleep, the more his attention functions are impaired. From a certain moment - after about a week of such restriction - the person himself no longer notices that his abilities have deteriorated. He believes that he is doing everything the same way as before, and cannot assess his condition critically. This is doubly dangerous, because such people tend to underestimate the risks, "- the scientists believe. The heart hurts, the sugar level goes off scale Chronic sleep deficit may be associated with Alzheimer's disease, scientists from the University of California at Berkeley believe. During sleeping, the maximum removal of toxic metabolic products from the brain occurs - including the protein beta-amyloid. If you don't get enough sleep regularly, these substances can accumulate in the brain and contribute to the development of the disease. Even if older people who do not sleep well do not have the disease develop, they still experience memory, attention, and other cognitive impairments faster than their sleep problem-free peers. In addition, sleep-deprived people tend to choose unhealthy foods and eat a lot of sweets. According to the work of researchers from the University of Chicago, the lack of sleep causes the increase of the level of endocannabinoids in the blood – the substances that affect the pleasure of absorbing food. That is why those who sleep poorly tend to suffer from excess weight, scientists are sure. If you want to avoid all these problems, preserve health and youth, you should adhere to the rules of healthy sleep, they will save you from many problems in the future. Sergii Haranenko You are welcome to share your dream here Welcome to CheckMyDream Joining our website you accept Checkmydream's Privacy Policy
A “tumor” is simply a swelling. There are many different causes of swellings. Abscesses, insect bites, allergic reactions, and cancer are just some of the causes. Your pet’s veterinarian can distinguish between these causes by a physical exam, history and sometimes other diagnostic tests. Each cause has its own individual treatment. Tumors caused by cancer can be benign or malignant. Benign tumors do not spread to other parts of the body. Malignant tumors usually carry a worse prognosis and have the potential to spread to other parts of the body. Tumors can arise from any type of tissue including bone, skin, internal organs, and even nerve sheaths. Clinical signs of tumors include a swelling. You may feel a swelling under your pet’s skin, or see one in their mouth or ear. The only way to diagnose whether the tumor is benign or malignant, and what type of cell it came from (which dictates prognosis and treatment options), is to obtain cells from the tumor and look at them under a microscope. Your veterinarian might obtain cells by inserting a needle into the tumor (called a “fine needle aspirate”) or by obtaining a chunk of cells, or a biopsy. Fine needle aspirates provide a diagnosis about 70% of the time. Biopsies provide diagnosis almost 100% of the time, but are more invasive, usually more expensive, and may require sedation or general anesthesia to obtain. Treatment and prognosis depend on what the cells or tissue look like under the microscope and what tissue they arose from. Sometimes surgery can be curative, however some tumors require additional surgery, radiation therapy, or chemotherapy.
Sonoluminescence is the emission of light from imploding bubbles in a liquid when excited by sound. Single-bubble sonoluminescence – a single, cavitating bubble. The sonoluminescence effect was first discovered at the University of Cologne in 1934 as a result of work on sonar.[1] Hermann Frenzel and H. Schultes put an ultrasound transducer in a tank of photographic developer fluid. They hoped to speed up the development process. Instead, they noticed tiny dots on the film after developing and realized that the bubbles in the fluid were emitting light with the ultrasound turned on.[2] It was too difficult to analyze the effect in early experiments because of the complex environment of a large number of short-lived bubbles. This phenomenon is now referred to as multi-bubble sonoluminescence (MBSL). In 1960 Peter Jarman from Imperial College of London proposed the most reliable theory of sonoluminescence phenomenon. He concluded that sonoluminescence is basically thermal in origin and that it might possibly arise from microshocks with the collapsing cavities.[3] In 1989 an experimental advance was introduced which produced stable single-bubble sonoluminescence (SBSL).[citation needed] In single-bubble sonoluminescence, a single bubble trapped in an acoustic standing wave emits a pulse of light with each compression of the bubble within the standing wave. This technique allowed a more systematic study of the phenomenon, because it isolated the complex effects into one stable, predictable bubble. It was realized that the temperature inside the bubble was hot enough to melt steel, as seen in an experiment done in 2012; the temperature inside the bubble as it collapsed reached about 12,000 kelvins.[4] Interest in sonoluminescence was renewed when an inner temperature of such a bubble well above one million kelvins was postulated.[5] This temperature is thus far not conclusively proven; rather, recent experiments indicate temperatures around 20,000 K (19,700 °C; 35,500 °F).[6] Some facts about sonoluminescence:[citation needed] • The light that flashes from the bubbles last between 35 and a few hundred picoseconds long, with peak intensities of the order of 1–10 mW. Spectral measurements have given bubble temperatures in the range from 2300 K to 5100 K, the exact temperatures depending on experimental conditions including the composition of the liquid and gas.[7] Detection of very high bubble temperatures by spectral methods is limited due to the opacity of liquids to short wavelength light characteristic of very high temperatures. A study describes a method of determining temperatures based on the formation of plasmas. Using argon bubbles in sulfuric acid, the data shows the presence of ionized molecular oxygen O2+, sulfur monoxide, and atomic argon populating high-energy excited states, which confirms a hypothesis that the bubbles have a hot plasma core.[8] The ionization and excitation energy of dioxygenyl cations, which they observed, is 18 electronvolts. From this they conclude the core temperatures reach at least 20,000 kelvins[6]—hotter than the surface of the sun. Rayleigh–Plesset equationEdit The dynamics of the motion of the bubble is characterized to a first approximation by the Rayleigh–Plesset equation (named after Lord Rayleigh and Milton Plesset): This is an approximate equation that is derived from the Navier–Stokes equations (written in spherical coordinate system) and describes the motion of the radius of the bubble R as a function of time t. Here, μ is the viscosity, p the pressure, and γ the surface tension. The over-dots represent time derivatives. This equation, though approximate, has been shown to give good estimates on the motion of the bubble under the acoustically driven field except during the final stages of collapse. Both simulation and experimental measurement show that during the critical final stages of collapse, the bubble wall velocity exceeds the speed of sound of the gas inside the bubble.[9] Thus a more detailed analysis of the bubble's motion is needed beyond Rayleigh–Plesset to explore the additional energy focusing that an internally formed shock wave might produce. Mechanism of phenomenonEdit The mechanism of the phenomenon of sonoluminescence is unknown. Hypotheses include: hotspot, bremsstrahlung radiation, collision-induced radiation and corona discharges, nonclassical light, proton tunneling, electrodynamic jets and fractoluminescent jets (now largely discredited due to contrary experimental evidence).[citation needed] From left to right: apparition of bubble, slow expansion, quick and sudden contraction, emission of light In 2002, M. Brenner, S. Hilgenfeldt, and D. Lohse published a 60-page review that contains a detailed explanation of the mechanism.[10] An important factor is that the bubble contains mainly inert noble gas such as argon or xenon (air contains about 1% argon, and the amount dissolved in water is too great; for sonoluminescence to occur, the concentration must be reduced to 20–40% of its equilibrium value) and varying amounts of water vapor. Chemical reactions cause nitrogen and oxygen to be removed from the bubble after about one hundred expansion-collapse cycles. The bubble will then begin to emit light.[11] The light emission of highly compressed noble gas is exploited technologically in the argon flash devices. Computations based on the theory presented in the review produce radiation parameters (intensity and duration time versus wavelength) that match experimental results[citation needed] with errors no larger than expected due to some simplifications (e.g., assuming a uniform temperature in the entire bubble), so it seems the phenomenon of sonoluminescence is at least roughly explained, although some details of the process remain obscure. Any discussion of sonoluminescence must include a detailed analysis of metastability. Sonoluminescence in this respect is what is physically termed a bounded phenomenon meaning that the sonoluminescence exists in a bounded region of parameter space for the bubble; a coupled magnetic field being one such parameter. The magnetic aspects of sonoluminescence are very well documented.[12] Other proposalsEdit Quantum explanationsEdit An unusually exotic hypothesis of sonoluminescence, which has received much popular attention, is the Casimir energy hypothesis suggested by noted physicist Julian Schwinger[13] and more thoroughly considered in a paper by Claudia Eberlein[14] of the University of Sussex. Eberlein's paper suggests that the light in sonoluminescence is generated by the vacuum within the bubble in a process similar to Hawking radiation, the radiation generated at the event horizon of black holes. According to this vacuum energy explanation, since quantum theory holds that vacuum contains virtual particles, the rapidly moving interface between water and gas converts virtual photons into real photons. This is related to the Unruh effect or the Casimir effect. The argument has been made that sonoluminescence releases too large an amount of energy and releases the energy on too short a time scale to be consistent with the vacuum energy explanation,[15] although other credible sources argue the vacuum energy explanation might yet prove to be correct.[16] Nuclear reactionsEdit Some have argued that the Rayleigh–Plesset equation described above is unreliable for predicting bubble temperatures and that actual temperatures in sonoluminescing systems can be far higher than 20,000 kelvins. Some research claims to have measured temperatures as high as 100,000 kelvins, and speculates temperatures could reach into the millions of kelvins.[17] Temperatures this high could cause thermonuclear fusion. This possibility is sometimes referred to as bubble fusion and is likened to the implosion design used in the fusion component of thermonuclear weapons. On January 27, 2006, researchers at Rensselaer Polytechnic Institute claimed to have produced fusion in sonoluminescence experiments.[18][19] Experiments in 2002 and 2005 by R. P. Taleyarkhan using deuterated acetone showed measurements of tritium and neutron output consistent with fusion. However, the papers were considered low quality and there were doubts cast by a report about the author's scientific misconduct. This made the report lose credibility among the scientific community.[20][21][22] Biological sonoluminescenceEdit Pistol shrimp (also called snapping shrimp) produce a type of cavitation luminescence from a collapsing bubble caused by quickly snapping its claw. The animal snaps a specialized claw shut to create a cavitation bubble that generates acoustic pressures of up to 80 kPa at a distance of 4 cm from the claw. As it extends out from the claw, the bubble reaches speeds of 60 miles per hour (97 km/h) and releases a sound reaching 218 decibels. The pressure is strong enough to kill small fish. The light produced is of lower intensity than the light produced by typical sonoluminescence and is not visible to the naked eye. The light and heat produced may have no direct significance, as it is the shockwave produced by the rapidly collapsing bubble which these shrimp use to stun or kill prey. However, it is the first known instance of an animal producing light by this effect and was whimsically dubbed "shrimpoluminescence" upon its discovery in 2001.[23] It has subsequently been discovered that another group of crustaceans, the mantis shrimp, contains species whose club-like forelimbs can strike so quickly and with such force as to induce sonoluminescent cavitation bubbles upon impact.[24] A mechanical device with 3D printed snapper claw at five times the actual size was also reported to emit light in a similar fashion,[25] this bioinspired design was based on the snapping shrimp snapper claw molt shed from an Alpheus formosus, the striped snapping shrimp.[26] See alsoEdit 1. ^ Farley J, Hough S (2003). "Single Bubble Sonoluminsescence". APS Northwest Section Meeting Abstracts: D1.007. Bibcode:2003APS..NWS.D1007F. 2. ^ H. Frenzel and H. Schultes, Luminescenz im ultraschallbeschickten Wasser Zeitschrift für Physikalische Chemie International journal of research in physical chemistry and chemical physics, Published Online: 2017-01-12 | DOI: 3. ^ Jarman, Peter (1960-11-01). "Sonoluminescence: A Discussion". The Journal of the Acoustical Society of America. 32 (11): 1459–1462. Bibcode:1960ASAJ...32.1459J. doi:10.1121/1.1907940. ISSN 0001-4966. 4. ^ Ndiaye AA, Pflieger R, Siboulet B, Molina J, Dufrêche JF, Nikitenko SI (May 2012). "Nonequilibrium vibrational excitation of OH radicals generated during multibubble cavitation in water". The Journal of Physical Chemistry A. 116 (20): 4860–7. Bibcode:2012JPCA..116.4860N. doi:10.1021/jp301989b. PMID 22559729. 5. ^ Moss, William C.; Clarke, Douglas B.; White, John W.; Young, David A. (September 1994). "Hydrodynamic simulations of bubble collapse and picosecond sonoluminescence". Physics of Fluids. 6 (9): 2979–2985. Bibcode:1994PhFl....6.2979M. doi:10.1063/1.868124. ISSN 1070-6631. 6. ^ a b "Temperature inside collapsing bubble four times that of sun | Archives | News Bureau | University of Illinois". 2005-02-03. Retrieved 2012-11-14. 7. ^ Didenko YT, McNamara WB, Suslick KS (January 2000). "Effect of noble gases on sonoluminescence temperatures during multibubble cavitation". Physical Review Letters. 84 (4): 777–80. Bibcode:2000PhRvL..84..777D. doi:10.1103/PhysRevLett.84.777. PMID 11017370. 8. ^ Flannigan DJ, Suslick KS (March 2005). "Plasma formation and temperature measurement during single-bubble cavitation". Nature. 434 (7029): 52–5. Bibcode:2005Natur.434...52F. doi:10.1038/nature03361. PMID 15744295. S2CID 4318225. 9. ^ Barber BP, Putterman SJ (December 1992). "Light scattering measurements of the repetitive supersonic implosion of a sonoluminescing bubble". Physical Review Letters. 69 (26): 3839–3842. Bibcode:1992PhRvL..69.3839B. doi:10.1103/PhysRevLett.69.3839. PMID 10046927. 10. ^ Brenner MP, Hilgenfeldt S, Lohse D (May 2002). "Single-bubble sonoluminescence". Reviews of Modern Physics. 74 (2): 425–484. Bibcode:2002RvMP...74..425B. doi:10.1103/RevModPhys.74.425. 11. ^ Matula TJ, Crum LA (January 1998). "Evidence for gas exchange in single-bubble sonoluminescence". Physical Review Letters. 80 (4): 865–868. Bibcode:1998PhRvL..80..865M. doi:10.1103/PhysRevLett.80.865. 12. ^ Young JB, Schmiedel T, Kang W (December 1996). "Sonoluminescence in high magnetic fields". Physical Review Letters. 77 (23): 4816–4819. Bibcode:1996PhRvL..77.4816Y. doi:10.1103/PhysRevLett.77.4816. PMID 10062638. 13. ^ Schwinger J (1989-03-23). "Cold Fusion: A History of Mine". Retrieved 2012-11-14. 14. ^ Eberlein C (April 1996). "Theory of quantum radiation observed as sonoluminescence" (PDF). Physical Review A. 53 (4): 2772–2787. arXiv:quant-ph/9506024. Bibcode:1996PhRvA..53.2772E. doi:10.1103/PhysRevA.53.2772. PMID 9913192. S2CID 10902274. Archived from the original (PDF) on 2019-03-23. 15. ^ Milton KA (September 2000). "Dimensional and Dynamical Aspects of the Casimir Effect: Understanding the Reality and Significance of Vacuum Energy". p. preprint hep-th/0009173. arXiv:hep-th/0009173. 16. ^ Liberati S, Belgiorno F, Visser M (2000). "Comment on "Dimensional and dynamical aspects of the Casimir effect: understanding the reality and significance of vacuum energy"". p. hep-th/0010140v1. arXiv:hep-th/0010140. 17. ^ Chen W, Huang W, Liang Y, Gao X, Cui W (September 2008). "Time-resolved spectra of single-bubble sonoluminescence in sulfuric acid with a streak camera". Physical Review E. 78 (3 Pt 2): 035301. Bibcode:2008PhRvE..78c5301C. doi:10.1103/PhysRevE.78.035301. PMID 18851095. Lay summaryNature China. 18. ^ "RPI: News & Events – New Sonofusion Experiment Produces Results Without External Neutron Source". 2006-01-27. Retrieved 2012-11-14. 19. ^ "Using Sound Waves To Induce Nuclear Fusion With No External Neutron Source". 2006-01-31. Retrieved 2012-11-14. 21. ^ Jayaraman KS (2008). "Bubble fusion discoverer says his science is vindicated". Nature India. doi:10.1038/nindia.2008.271. 23. ^ Lohse D, Schmitz B, Versluis M (October 2001). "Snapping shrimp make flashing bubbles". Nature. 413 (6855): 477–8. Bibcode:2001Natur.413..477L. doi:10.1038/35097152. PMID 11586346. S2CID 4429684. 24. ^ Patek SN, Caldwell RL (October 2005). "Extreme impact and cavitation forces of a biological hammer: strike forces of the peacock mantis shrimp Odontodactylus scyllarus". The Journal of Experimental Biology. 208 (Pt 19): 3655–64. doi:10.1242/jeb.01831. PMID 16169943. 25. ^ Conover E (15 March 2019). "Some shrimp make plasma with their claws. Now a 3-D printed claw can too". ScienceNews. 26. ^ Tang X, Staack D (March 2019). "Bioinspired mechanical device generates plasma in water via cavitation". Science Advances. 5 (3): eaau7765. Bibcode:2019SciA....5.7765T. doi:10.1126/sciadv.aau7765. PMC 6420313. PMID 30899783. Further readingEdit External linksEdit
Author`s name Alex Naumov Mysterious alien guest visits Earth’s orbit Last Thursday three observatories in the US spotted an unidentified object, designated 2007 VN84, heading Earth's way. This prompted the Minor Planet Center at the Harvard Smithsonian Center for Astrophysics in Cambridge, Massachusetts, US, which co-ordinates the search of near-Earth objects, to issue a potential near-miss warning. The warning was later retracted after Moscow-based astronomer Denis Denisenko noticed that the object's trajectory closely matched Rosetta's. The mix-up generated a few red faces, but also points to some important lessons. "The system is there to try to accurately assess an object," says Mark Bailey, director of the Armagh Observatory in Northern Ireland. It is designed to spot objects moving towards Earth, determine their trajectory, and to disseminate necessary information as quickly as possible so that others can make measurements. "If it's going to hit, you need to work out when and where as quickly as possible. You don't want them sitting on the data wondering whether it's an asteroid or not," Bailey told New Scientist. But the incident raises questions about how well the warning system works. The Minor Planet Center complains that, "this incident highlights the deplorable state of availability of positional information on distant artificial objects". This lack of a centralised database makes checking incoming objects against known space probes difficult. Bailey says that, while a good idea, it is unclear who should compile, maintain, and pay for such a database. "That's a very tricky question," he adds. Others argue that the Rosetta approach has proven the robustness of the system. "It shows that the telescopes are picking these objects up," says Robert Massey, a spokesperson for the Royal Astronomical Society in the UK. "For them it's just a moving point of light that is not easy to identify as a spacecraft." He concedes that a lack of coordination may have contributed to the error, but believes the fly-by has been a good test of the alerting system. "The alert was not particularly alarmist, the spacecraft was identified, and no major announcement was made," he says. Bailey agrees. "We can live with red faces once in a while," he says. Space junk from Apollo moon missions has been mistaken for an asteroid before, said Peter Brown, a meteor expert at the University of Western Ontario. "This is the first time that by accident a spacecraft with a well-determined orbit has been picked up" by computer programs that constantly scan for unexplained moving objects, he said. It shows how hard it is to make an instant judgment about what is or isn't a killer asteroid, based on a single point of light, reports. But also shows the search programs don't miss anything: "Far be it from any alien race to want to put any spacecraft in orbit. The current search programs are pretty good at getting these things." Sources: agencies
Interesting facts about Swaziland 17 Spectacular Facts about Swaziland Looking to boost your knowledge of the world? Why not start with these 17 interesting facts about Swaziland! 1. Swaziland is a small landlocked monarchy in Southern Africa and happens to be the smallest country in Africa. 2. In 2018, to mark the country’s 50th birthday, King Mswati III declared that Swaziland would now be known as the Kingdom of eSwatini. 3. It is bordered by Mozambique to the east and South Africa to the south-east, south, west and north. 4. The coordinates for the Kingdom of eSwatimi are 26.3167° S, 31.1333° Facts of Eswatini Flag of Eswatini 1. The terrain here is mostly mountainous and hilly with a few sloping plains. Lovely! 2. The total land area of Eswatini is 6,704 square miles (17,363 square kilometres). 3. Residents here enjoy a tropical to near temperate climate. Sounds perfect to us! 4. Swaziland’s population was only 1.136 million in 2018. 1. Rather unusually, Swaziland has two capitals! They are Mbabane (administrative) and Lobamba (royal and legislative) and have a population of 282,734 and 25,968 respectively. 2. The average life span here is 58.32 years (2017). 3. Swaziland is one of the few remaining absolute monarchies, meaning it does not have any political parties and is ruled by one person – King Mswati III. 4. The official language of Swaziland is Swazi; but fear not, because English is also widely spoken! facts about Eswatini Swaziland National Park, Eswatini 1. Lilangeni is the official currency here which is equal to the South African Rand. 2. Swaziland grows sugarcane, corn, tobacco and cotton and rears cattle. 3. Its industry consists of wood pulp, coal mining, sugar and soft drink concentrates. 4. Swaziland exports soft drink concentrates, sugar, cotton yarn and wood pulp. 5. The international dialling code for this African country is +268. Do you know any fun or interesting facts about Eswatini you’d like to share here?  Let us know in the comments section below! Leave a Reply This page was last modified on November 24, 2020. Suggest an edit Related 'Africa' Facts
Mobile Menu A new era of space omics Omics technologies have made possible cost-efficient, high-throughput analysis of biologic molecules. Recent advances can be attributed to innovative breakthroughs in genome sequencing, bioinformatics and analytics tools (e.g., mass spectrometry) as well as high-throughput technologies. These technologies have provided crucial insights into biological processes and helped to unravel the complexity of human diseases. We are entering a new era of human space exploration, with both NASA and other international and private organisations planning to return to the Moon and send the first humans to Mars. With these big plans, there has been a demand for the development of new and rigorous international standards for space research. Astronauts from all over the world undertake experiments in microgravity aboard the International Space Station, ISS. However, due to a lack of standardised methods, external scientists find it difficult to utilise the data generated within their own research. To address this, the International Standards for Space Omics Processing (ISSOP) was established. ISSOP is an international consortium of scientists who aim to enhance standard guidelines between space biologists at a global level. In this blog, we will explore the challenges related to spaceflight omics and the benefits that this consortium will bring in preparing for the upcoming era of space life science. Effects of spaceflight Radiation, microgravity, altered atmospheric gas composition, isolation and diet changes are just some of the known stressors affecting humans in the space environment. With extended mission durations and distances outside of Earth’s orbit these factors are expected to increase. There are several adverse human health effects associated with spaceflight including bone demineralisation, skeletal muscle atrophy, cardiovascular deconditioning, vestibular control, immune system suppression and neuro-ocular ailments. It is critical to understand how spaceflight factors affect human health in order to develop safe and effective countermeasures. The NASA Twin Study catalysed the need for more comprehensive, consortium-based approaches to study the long-term effects of spaceflight on humans. Here, nine research groups studied a single data type in detail whilst another group performed multi-omics synthesis to determine the whole-body changes. The study identified alterations in numerous data types, including telomere length, gene regulation, gut microbiome composition, body weight, carotid artery dimensions and serum metabolite profiles. On the other hand, the vast majority of space biology experiments and datasets are generated using model organisms. In all cases, space biologists are increasingly harnessing omics approaches in order to maximise the knowledge gained from rare spaceflight experiments. International Standards for Space Omics Processing While omics technologies can generate vast quantities of data, optimal extraction of actionable scientific insights from these complex datasets can only occur with improved standardisation and communication at an international level. Conducting biological research in spaceflight presents unique technical and biological challenges. In order to ensure its success, these challenges will need to be specifically addressed by the international space biology community. In response, ISSOP consortium was formed. Members include scientists who conduct space omics experiments funded by multiple space agencies in Japan (JAXA), Europe (including delegates from the European Space Agency [ESA] Space Omics Topical Team) and the United States (NASA). They bring expertise related to the processing of space omics samples, the implementation of multi-omics and systems biology approaches and the normalisation of spaceflight metadata. The consortium is also informed with the latest developments across government, industry and academia. Their mission is to develop, share and encourage sample-processing standardisation and metadata normalisation of spaceflight omics experiments. This will allow for better harmonisation of data and increased gain of knowledge. Lessons learned from previous space omics studies A series of 29 studies were recently published by the consortium in the journal Cell. In the first publication, A New Era for Space Life Science: International Standards for Space Omics Processing, the authors addressed some of the unique technical and biological challenges during each stage of space omics experiments. Some of these challenges are summarised below: • Limitations in space, time and finances: Firstly, capacity limitations on orbiting platforms limit the number of experimental replicates and variables. Secondly, crew time is exceptionally limited for experimental procedures in spaceflight. Third, repeating unsuccessful experiments is both difficult due to the logistical and financial constraints and also results in longer waiting times compared to experiments on the ground. • Hardware and Housing: Biological experiments in space are rarely performed using standard ground equipment. Developing special hardware and housing technology that can operate in spaceflight conditions is an ongoing challenge. Communication will be increasingly crucial between the academic, government, and industry sectors developing and improving upon hardware designs. • Sample collection: There are often inconsistencies in how samples are obtained for analysis, in part due to limitations in crew time and finances. • Sample preservation: Adequate preservation of samples aboard the ISS is a continuing challenge and a hindrance to capturing unchanged biological responses. • Data curation and distribution: The space omics community need to construct a database unique to characteristics of space omics data. NASA GeneLab is the first comprehensive space omics database. It aims to optimise scientific return from spaceflight and ground simulation experiments. The repository currently contains more than 300 transcriptomic, epigenomic, proteomic, metabolomic, and metagenomic datasets from plant, animal, and microbial space experiments. • Data sharing: Sample-sharing schemes must be harnessed to maximise discoverability and reproducibility between researchers in the space omics discipline. For example, sharing a common biobank and sample-processing facility would be ideal. Space omics-sharing schemes are already implemented in Japan and the United States. Future directions ISSOP aims to provide concrete solutions to some of these challenges described in order to reduce confounding factors and promote harmonisation and interoperability between space omics datasets. This in turn will increase the accuracy of space omics studies. In the future, ISSOP aim to develop space omics recommendations across individual omics assays. They also hope to create guidelines for promising molecular biology laboratory techniques. An important component of future experiments and project sharing will be digitisation of sample handling using advanced robots. ISSOP can leverage lessons learned and develop an informed framework that can maximise scientific discovery while minimising ethical problems that may arise. Standardisation of space omics data through ISSOP could pave the way for cell space atlases and precision spaceflight medicine, which will improve the safety of humans travelling through space. Join us during our rabbit hole sessions at the Festival of Genomics and Biodata, where we will have a series of exciting talks from NASA, including Erik Antonsen (Assistant Director, Human System Risk Management), Jennifer Fogarty (Chief Scientist, NASA Human Research Centre), Rebekah Reed (Assistant Director, Human Health and Performance Directorate) and Afshin Beheshti (Bioinformatician and Principal Investigator). Register here. Image credit: Background vector created by tartila – More on these topics Festival of Genomics / Multi-omics / Space Share this article
Does playing basketball help build muscle? Playing basketball is excellent cardiovascular exercise, which means it can help strengthen the most important muscle in your body — the heart. The sport also burns plenty of calories and helps you develop endurance, particularly if you play the standard game on a 94-foot court. Is basketball bad for building muscle? Basketball does not build muscle. Basketball is a cardio sport that helps burn fat. … Playing basketball can’t build muscles, but it can help improve your muscle strength. However, there will be a time where your strength level up, and you will need to lift some heavier weights to get stronger. Can you get in shape just by playing basketball? Playing full court or by yourself is a great way to start getting active. Even if you are not cut out for full curt or there just isn’t any game being played on your court, no sweat. Shooting hoops is a great cardio exercise that will help you get your heart rate up and burning those calories. Does playing basketball make your legs bigger? Playing basketball will not make your legs bigger because basketball is more of a cardio exercise than a weight training exercise. It will make your legs smaller than bigger. However, if you will add some weight training to your routine, your legs may get bigger. THIS IS INTERESTING:  When did NBA start 3 referees? What are the 13 rules in basketball? Dr. James Naismith’s Original 13 Rules of Basketball • A player cannot run with the ball. Does playing basketball give you abs? To develop basketball abs you’ll need to do more than hit the court; specific exercises help you build athletic and powerful basketball abs. … In basketball in particular, a strong core keeps a player on his feet and helps him assume a stronger defensive position. Does basketball count as leg day? Unless you’re adding some serious weight training to your routine, basketball will not bulk up your leg muscles, but they will be strong. Is running or basketball better? Running fast and hard will torch more calories than heading to the court for a pickup game, but playing basketball is a better way to work your muscles. The more lean mass you have, the higher your caloric expenditure at rest. … Whether you prefer basketball or running, make exercise a habit and stick to your workouts. How fast can you get in basketball shape? Even ACE recommends people give their bodies at least four to six weeks to adapt to a new exercise routine. If you are in good shape already, you may not need that long, but if you’ve never played a sport before or are new to basketball, give yourself at least that long to get yourself basketball-ready. Playing basketball
What is Insulin and What it is Used For? Dr. Richard Bebb, MD, ABIM, FRCPC, discusses insulin. Loading the player... Video transcript Duration: 1 minute, 43 seconds Other than gestational diabetes, there are two main types of diabetes: type 1 diabetes and type 2. Patients with type 1 diabetes have run out of insulin, and will generally early on in the disease require to be on insulin - pills don’t work for them. Type 2 patients, patients with type 2 diabetes, initially can be treated with pills. But for many of them, after having the disease for many, many, many years, your body’s production of insulin tends to decrease and you too will also require insulin. Insulin is a hormone. It has a number of functions, but the primary one is lowering of blood sugar in the blood. Your body produces other hormones which elevate blood sugar. So what’s happening continuously is it’s like the gas and the brake on a car, it’s being adjusted continuously. If you’re healthy, and you don’t have diabetes, and you eat food, your body automatically produces insulin to prevent the sugar you’ve eaten from making your blood sugar shoot up too high. If you have diabetes, that’s not going to occur, and you have to anticipate the food intake and make sure you’ve got insulin in your body at the time to prevent very high sugars. Insulin comes in a number of different formulations, and it’s important to discuss your particular situation with your pharmacist or health care provider in terms of how it impacts your health and may have an impact on other medications you’re taking. Presenter: Dr. Richard Bebb, Endocrinologist, Victoria, BC Local Practitioners: Endocrinologist QA Chat Ask us a health question on diagnosis/treatment options...
[email protected] Coal Mill Explosion Study Pulverizer design explosion proof safety requirement Oct 07, 2010 case study 2: raymond shallow bowl mill size 923. grinding mill fire or explosion in a coal pipe or pulverizer is possible if you don’t pay attention to all of the coal particle velocities and sizing in grinding mill.Raw coal is conveyed from the storehouse by a belt conveyer. then it is lifted to the entrance level of a vertical cylindrical mill by a bucket elevator, and an electromagnet is used to remove iron objects from the raw coal. the raw coal is pulverized in the vertical cylindrical mill, and the pulverized coal is lifted to a powder separator by. Anatomy of a float coal dust explosion coal combustion front underlying rock dust dispersion lags behind the combustion front and unable to quench combustion front surface coal dust disperses first layered dust float coal dust 0.24 mm or 0.01 in rock dust 25.4 mm or 1.0 in grinding mill.In order to effectively prevent coal mine accidents, we selected the most serious type of accident in coal mines—gas explosions—as the research object. based on the accident causation model 24model, we propose an action path and analysis steps of accidents caused by different employees in the organization. a gas explosion coal mine accident was analyzed using the 24model and the proposed grinding mill.Coal mill explosion study. coal mill explosion study egypt to greece, the first recorded dust explosion occurred in an italian flour mill in 1785.posts related to hazop study for coal dust explosion hazard in cement plantdust grinding mill explosion vents coal mills, coal mill explosion assessment. machine in iron grinding mill read more.Explosion galleries and in an experimental coal mine. the data and results obtained from the tests showed that finely pulverized coal dust has a lower explosive limit of 0.035 to 0.08 ounces per cubic foot. although formation of coal dust is not possible to prevent, its.Fire and explosion hazards in bag filters can arise due to any of the following factors: spontaneous combustion, dust explosion, static electricity, and high temperature materials passing through the filters. bag filters used for the coal mill rank as one of the highest fire and explosion hazards in cement plants, due to the small particle size grinding mill. Tration of coal in air below which an explosion does not occur, but do not have an upper explosive limit as long as the coal/ air mixture can be considered a cloud. in practice, a fire occurring during normal pulverizer operation does not result in an explosion. the rich coal/ air grinding mill.Nov 01, 1995 11.1.1995. explosion protection for low-sulfur coal. by bill copelin and ralph foiles, fike metal products. the 1990 clean air act amendments caaa grinding mill. Mitigating coal dust explosions in modern underground coal mines marcia l. harris1, 1. the national institute for occupational safety and health, p.o. box 18070, 626 cochrans mill rd., pittsburgh, pa 15236, email: mharriscdc.gov . 3 kenneth l. cashdollar. 2, 2. the national institute for occupational safety and health, p.o. box 18070 grinding mill.During 1981 the electric power research institute epri began a research project to study pulverized coal fires and explosions in the u.s. utility industry via an industry wide survey and explosion experiments. the survey indicates that explosion events are occurring at a rate of approximately one every three years for each boiler.Atex mill sampling coal power plant. cement separator process coal mill video. coal mill in cement industry samac - againdia vibrating sieve separator. coal mill drive fan cement plant coal mill explosion video samac. ball mill coal plant - podpolanka.pl. youtube 21 06 2018 this is the of thermal power plant. fossil plant requires either or oil pumps and draught plant, e.g.ball tube coal mill grinding mill. Coal mill safet Explosion chambers.4,21-31 other scholars investigated the minimum initiation energy of the coal dust,32-35 and the mait of a coal dust layer.36-41 the mait for a coal dust cloud, from a hot surface source, has been investigated in the past decades by many researchers. in a study conducted by cao,42 the mait of a coal dust cloud was investi grinding mill. Case study of existing coal ball grinding mill. may , exploring ball size distribution in coal grinding mills author links open overlay panel mm bwalya a in a later paper a value of was used for a specific case, but due to lack of sufficient kj ried, cj restarickcontinuous grinding in a small wet ball mill part a study of the influence of ball diameter powder technol. Coal mill safety - explosion and fire protection consultancy. coal mill safety. explosion and fire protection consultancy. evaluation specification assistance system layout recommendations. coal mill safety interview. with global cement. Supplier ball mill explosion. ball mill explosion june ball mill explosion sep 15 2015nbsp018332in sealed vessels an extreme increase in heat and pressure may occur resulting in vessel rupture or explosionmixing aluminum powder with a fluorinated solvent was a root cause of the explosion of the ball mill similar reactions could occur with these families of materials remove ball mill.A fire. if the mill is restarted without first removing the hot coal, an explosion can occur when particles are suspended and exposed to the air. even when a mill is shut down routinely, there is a danger that any residual coal left within the mill will oxidise, which can explode as the mill is restarted. to prevent a coal fire, the mills. Explosion disk coal mill With your non-inert coal grinding system you will have to have rigourous explosion protection designed into the equipment. the mill, raw coal feeder and ductwork must be capable to withstand a pressure of 9 bar. the dust filter, any cyclones and fine coal hoppers, must be fitted with explosion grinding mill.Power generation typically involves direct firing systems. there is an air swept mill with direct pneumatic conveying through to the burners. the risk of explosions is more or less reduced to an explosion inside the mill, which therefore needs to be explosion, pressure, and shock-resistant. nfpa requires coal mills to be good for 50 psi. Ball and tube mills bbd4772 case study - moribito.in. explosion bbd coal in bbd4772 ball mills for coal 8 may 2014 coal what is the reason for frequently explosion in coal mill bbd 4772 ball tube explosion in bbd4772 ball mills for coal improving coal pulverizer performance and,pall corporation explosion in bbd4772 ball mills for coal,of the grinding mill.Having left the mill at the top, the final product continues with the gas to the filter or cyclone , where it is collected. tailor-made layout the layout of your coal grinding system must take into account the available heat sources for drying the raw coal as well as the fire and explosion hazards of coal and coal dust. the entire grinding.Pulverizer design explosion proof safety requirements. pulverizer design explosion proof safety requirements explosion coal in the mill pulverizer explosion suppression systems a case study more explosion study on coal pulverizing system of explosionproof is a obviously important issue for cal pulverizing system of thenrial power is was made on explosive mechanism get price.Mar 08, 2013 explosion coal in the mill. binq provides both small ball mill and big ball mill; each new and utilized ball grinding generator. grinding mill pulverizer explosion suppression systems, a case studygrinding mill. Boiler performance and mill outlet temperatur Dust explotion coal crushermc world. causes of explosion in coal mill. coal mill explosion hengelsportvandermeer. coal mill explosion root causes emergencyplumbereu coal mill explosion root causes coal mill explosion vent power plant in nigeria gold ore crusher ts the root causes of these fires and explosions will more fire and. dust explosion wikipedia. 15 rows a dust explosion is the grinding mill.Nov 11, 2009 this is mainly done to avoid mill fire and mill explosion. while all these are regarding the mill performance, the coal fineness and mill out let temperature also affect the boiler performance. the coal fineness has an effect on the combustion performance like the bottom ash percentage combustibles when the plus 50 mesh percentage goes up. Boiler performance and mill outlet temperature Coal dust explosions in the cement industry544 кб. history in the 1960s a large number of cement and electric utility power plants converted from coal as their primary fuel to either fuel oil or natural gas.explosion date: 16 oct. 1979--montana a coal dust explosion occurred inside no. 1 mill grinding mill. Jun 26, 2013 coal processing 1 – es-toolkit. fugitive coal dust emissions can be reduced by plant design to reduce the grinding mill of portland cement, road base and sub-base aggregate, or as structural fill grinding mill [ hazid], hazard and operability study [hazop], or a scenario-based risk grinding mill explosion hazard in coal storage and handling facilities where coal dust clouds may be grinding mill.Mar 02, 2021 coal mill explosion study - explosion bbd coal mill - midnaporelawcollegeorg coal mill explosion study pakistan crusher,stone crusher explosion in tube and ball milling of thermal plant risk grinding mill get price coal mill explosion study - sabt.org. a new model-based approach for power plant tube-ball mill grinding mill. What is coal mills explosion in coal mill bbd mayukhportfoliocoin ball mill explosion case study youtube feb 18 2014 ball mill explosion case study what is the reason for frequently explosion in coal mill bbd 4772 ball live chat ball mill wikipedia bbd ball and tube mill lub oil system. more details explosion in coal mill in thermal plant. Coal pulverization system: explosion prevention an If the mill is restarted without first removing the hot coal, an explosion can occur when particles are suspended and exposed to the in-rushing combustion air. even in routine mill shutdowns, there is a danger that any residual coal left within the mill will oxidise, and may explode as the mill is restarted. Coal handling safety Coal moisture: explosion frequency remains unchanged with an increase in moisture of the as received coal. overall, there is a connection between moisture and pulverizer age. the newer units have a trend toward using higher moisture coals. figure 2e coal ash: explosion frequency is higher for medium ash coals than for low and high ash coals. Coal has been difficult, frustrating, and in a few cases, very costly. this study deals mainly with coal safety requirements in the cement industry which accounts for a very small percentage of coal usage in pulverized coal firing systems. grinding mill phenomena of a coal dust explosion grinding mill mill may produce sufficient heat and sparks to initiate a fire grinding mill.To summarize the coal mill controls, they may be divided basically into two major categories:. 1. to control the quality of coal being sent to the burners located on the furnace walls. the word quality here means the temperature and fineness of the pf. the set temperature values are dependent on the percentage of volatile matter that exists in the main fuel. This study was established to survey foreign utility experience with p.c. fires and explosions and to relate this to us experience. sources of foreign p.c. technology were located and visits made to japan, australia, england, france, germany, and switzerland. pulverized coal mill manufacturers, operators, researchers and regulators were visited.Jun 07, 2018 an understanding of what causes mill fires and explosions is required for safe operation and optimal results with any type of system that inhibit mill fires or explosions. it is important to remember that a mill fire, whether it be flaming, smoking or smoldering coal inside the mill means a mill explosion could be occur at any time. Fire and explosion prevention in coal pulverizin Retrofit of coal mill exhaust fan – study of fan performance and erosion david r. grupp director of research robinson industries, inc. 400 robinson drive zelienople, pa 16063 abstract coal pulverizer mills are utilized in many coal fired power generation facilities across the country and around the world. Part two. on february 4, 2009, six people were injured during an explosion and fire at the oak creek power plant owned by wisconsin energy we. the explosion occurred at a plant silo used to collect dust after coal is dumped into the hopper. all of the people hurt were contractors working in grinding mill.Sun what is a ball mill puff explosion . ball mill puff explosion. ball mill explosion case study hotelzintonio.it. explosion in bbd4772 ball mills for coal. bbd 4772 coal mill ppt grinding mill equipment. coal mill bbd 4772 explosion bbd mill ppt in south africa crusher south africa tube mills for coal plants alstom ball mill for direct firing systems get chat coal mill bbd 4772 what is the grinding mill.Pulverizer housing or burner lines are glowing red. mill fires require immediate attention to prevent damage to the pulverizer and more damaging mill puffs. explosions in a pulverized coal system are normally called puffs.. a mill puff is an explosion in the mill system caused by an explosive combination of coal, air and temperature. Pulverizer fire and explosions Oct 28, 2020 the major hazards involved in this type of power plant are fire and explosion hazards. if the boiler is not maintained properly or any deviation of operation from the original process occurred, then there might be risk of explosion [8, 9].one of the best examples of boiler explosion is which happened at ntpc unchahar coal-fired power plant on november 1, 2017, which was a newly commissioned grinding mill. From "Proindustry Mining Machinery", link: https://howtoplayvampirewars.org/news/grinding-mill/1174.html .If you need to reprint, please indicate the source, otherwise you will be investigated for legal responsibility.
Speak To The World About English to Romanian Interpreters Romanian interpreters transform spoken Romanian language assertions to English or another language. Interpreting in Romanian comprises of listening to, comprehending and memorising article content in Romanian language, then re-creating statements, questions and speeches in English or possibly a different language. This is certainly completed in just one direction, normally into the interpreter’s native language, but also may very well be on a two-way basis. Learn More Romanian interpreters aid in rapid interaction amongst consumers within the following adjustments: Romanian Language Words Learn Romanian Language Online • large Formal meetings and romanian conferences • Romanian business functions which include smaller meetings, exhibitions and product launches • Romanian community based events and assignments within the education, health and community services sectors. Standard Work Activities of an English to Romanian Interpreters Interpreting in Romanian can be carried out in various methods:. • by means of video conferencing and internet-based solutions. Certainly there are many sorts of interpreting carried out by English to Romanian Interpreters:. Simultaneous Romanian interpretation (SI). Simultaneous Romanian interpretation consists of doing work in a group at a forum or big meeting. The Romanian interpreter is seated in a soundproof cubicle and instantly converts what is being stated, so listeners hear the interpretation using an ear piece while the speaker is still speaking. A variation of this is whispering where the interpreter sits near someone or a small group of people and whispers the interpretation as the speaker continues. Consecutive Romanian interpretation (CI). Consecutive interpretation is actually a lot more common in smaller sized meetings and discussions. The speaker may pause immediately after each sentence and wait even though the Romanian interpreter translates what is being said into English or another appropriate language. Romanian Liaison interpretation. This is usually known as ad hoc and relay, is a form of two-way interpreting of Romanian language where the Romanian interpreter translates every few Romanian sentences while the speaker stops briefly. This is common in telephone interpreting as well as in legal and health circumstances. The Romanian interpreter supports individuals who are not well-versed in the language being used to ensure their understanding. The following work activities are likely in any interpreting setting:. Recent Comments
Cunto de li cunti : egy népszerû 16. századi dal története 129. - 145. o Büky Virág abstract Cunto de li cunti The History of a Popular Song in the 16th Century Virág Büky The earliest sources of popular Italian vocal music make their appearance at the end of the 15th century. Within this repertoire, there is a group that is always well distinguished by its special dramatic character. These songs include short scenes, dialogues and monologues performed by stock characters familiar from the commedia dell’ arte. During the 16th century this special songs type, variously designated as greghesca, tedesca, mascherata or moresca, finds its way into collections under the general title of Canzoni villanesce alla napolitana. Among the various genres published in these collections the vocal moresca was perhaps the most important. The term moresca was known as early as the 14th century, and was used to mark a dance of exotic character, which often took the form of a stylized battle between Moors and Christians. Later, in the course of the 15-16th centuries the dance was performed in intermedii between the acts of courtly dramatic entertainments. Similarly, the Moors, Lucia and Giorgia or Martina, are the protagonists the vocal moresca, of the topic of this article. Both its text and its music were significantly influenced by various other genres. The text, in which an amorous dialogue between Giorgia and Lucia takes place, has a language, which is a peculiar mixture of dialectal words derived from the lower, popular genres and learned idioms of courtly poetry. In a similar way, the music is a mixture of the elements coming from the villanesca, canzonetta and the peculiarities of the dance songs. First, the present article lists all the genres, which has made their influence on either the text or the music of the vocal moresca. After this, an attempt is made to answer the intriguing question whether, beyond the similarity of the characters, there are other possible links between the moresca dance and the vocal moresca? Finally, striking similarities between Cunto de li cunti, a tale by Giambattista Basile (1634-1636), alluded to in the title, and the song type are discussed. Johann Georg Lickl (1769-1843) vonósnégyesei 147. - 162. o Kusz Veronika abstract The String-quartets of Johann Georg Lickl (1769-1843) Veronika Kusz The composer Johann Georg Lickl, who was Austrian by origin, served as a chorus master in the cathedral of Pécs from 1807 to his death. As a versatile musician and a productive composer of sacred music he must be considered as one of the most outstanding figures of the Hungarian history of music of the early 19th century. Evaluating his oeuvre, however, it should not be forgotten, that before his arrival to Pécs he had been a famous and popular composer of chamber music and opera in Vienna. This study presents his three string quartets (Trois quatuor concertans, composed c.1799), which are composed with good sense of musical form, with consciousness and with much adaptability of a well-trained master. Unfortunately, after 1807 he completely lost his relationship with the Viennese musical life, and did not compose operas and pieces of chamber music any more. Saul a négyzeten : Muszorgszkij saját átdolgozásairól - egy korai dal ürügyén 163. - 173. o Papp Márta abstract Saul Squared On Musorgsky Own Revisions – in Relation to an Early Song Márta Papp Modest Musorgsky had a predilection for revising earlier works. King Saul, a remarkable song from his Youthful Years collection, is a case in point. The revisions Saul underwent mirrors those, on a much larger scale of course, of Boris Godunov. Indeed, the ominous intuitions of Byron’s King and Pushkin’s Boris also demonstrate similarities. Saul is the first of his compositions where Musorgsky recreates the peeling of bells, and among the first to use the characteristic “Musorgsky chord”: this time is an unusual form. In the first version of the song, it appears in the postlude only. In the second revised version, it provides the basic material. A ritmus autonómiájának kérdései Bartók írásaiban 175. - 190. o Pintér Csilla Mária abstract Questions of the Autonomy of Rhythm in Bartók’s Writings Csilla Mária Pintér Studying Bartók’s writings focusing on new music and his essays on folk music side by side, it is astonishing how different are the proportions and emphasis of the presence of the main components of music in the two types of the writings appear. This difference is particularly significant from the point of view of rhythm. In the writings on folk music the description of rhythmical and metrical structures have a privileged place; in his other articles and interviews he hardly spoke about rhythm and metre. Nevertheless, in sprite of the fact, that the rhythmic aspect of his composition had never been analized in detail in the essays and lectures, his studies show that for him basic features of rhythm and the most important rhythmical procedures were the freedom and variety, the changing metre, the polyrhythm and ostinato. These phenomena are closely connected with the appearance of the autonomous rhythmical structures at the beginning of the 20th century. As a result of this examination of Bartók’s writings it becomes obvious that for Bartók the rhythm was not an entirely independent component of music, nevertheless his thoughts sheds light on the significant role of rhythm in the composer’s compositional thinking and on it’s important place in his self-definition as a composer. „Folklorisztikus nemzeti klasszicizmus” - egy fogalom elméleti forrásairól 191. - 199. o Dalos Anna abstract Folkloristic National Classicism – About the Theoretical Sources of a Concept Anna Dalos The stylistic mainstream of Hungarian music from the late 1930’s to the 1950’s was defined from the 1960’s by Hungarian musicology as folkloristic national classicism. The present study makes an attempt to explore the sources of the concept’s formation. Though from the 1960’s it was connected with Zoltán Kodály’s name and compositions, it seems probable from his essays written in the 1930’s that he took a dim view of the stylistic concept. Most likely it was Bence Szabolcsi, Aladár Tóth, Antal Molnár and András Szõllõsy, the first theorists of Kodály’s music, who, referring to Ferruccio Busoni’s Junge Klassizität from 1920, shaped the concept. The most important role in its formation was played by Antal Molnár, who devoted seven studies and books to the interpretation of the new music between 1917 and 1947. In his writings he argued that this kind of classicism would be born in the future, and regarded Bartók and Kodály as the forerunners of the new style. The main features of Molnár’s folkloristic national classicism are diatonic harmony, melodic style, new counterpoint and ethics. A „szovjet zene” Magyarországon: Ilja Golovin Budapestre érkezik 201. - 212. o Péteri Lóránt abstract “Soviet Music” in Hungary. Ilya Golovin Reaches Budapest Lóránt Péteri Based on archival sources, this paper offers an examination of the reception of “Soviet Music” as a discoursive construct in Hungary after 1948. The Soviet music resolution 1948, by criticizing the foremost Soviet musicians and by demanding classicizing, folkloristic aesthetic tendencies in music, had a dysfunctional effect on Hungary and reinforced a feeling of superiority in Hungarian music. These developments were hardly the happiest way to prepare for a Soviet musical expansion into Hungary a few months later. Advocates of a cultural bloc underlined how Soviet institutions in their current form summarized the experience of socialist generations. To many, the music resolution appeared radical, a blank slate, which had to be fitted into this curious organic fiction. One of the attempts to place the Soviet music resolution in a new context, was through the curious medium of a theatratical performance. The play Ilya Golovin, by Sergei Mihalkov was staged in Budapest in 1950, the year of its world premiere in the Soviet Union. It is set in the Soviet Union at the and of the 1940s. The protagonist is a celebrated Soviet composer, whose music has become formalist. Because of a criticism in Pravda Golovin sinks into a creative crisis. A year after he returns to the society. This paper analyses the subject matter of the play as a socialist-realist rite of passage comparing it with that of The Magic Flute. When the play reached Budapest, some Hungarian composers were taken by their experience and interpretation of it along a path similar to Golovin’s, and bore witness to this. So the conference on the production of Ilya Golovin organized by the Hungarian Composers’ Association and the Hungarian Drama and Cinema Association can be interpreted here as a secondary theatrical-ritual act. Egy Hölderin-toposz útja : vándormotívumok Kurtág György mûveiben 213. - 235. o Farkas Zoltán abstract The Path of a Hölderin Topos Wandering Ideas in Kurtág’s Compositions Zoltán Farkas A kalotadámosi korálkönyv (1838) 237. - 249. o László Ferenc
How did the Mayans build cities? How did the Mayans build cities? Why did the Maya abandon their cities? Scholars have suggested a number of potential reasons for the downfall of Maya civilization in the southern lowlands, including overpopulation, environmental degradation, warfare, shifting trade routes and extended drought. It's likely that a complex combination of factors was behind the collapse. How did the Maya built their temples? Like many Maya buildings, Maya temples were built of stone, with platforms on the top where wooden and thatch structures could be built. Temples tended to be pyramids, with steep stone steps leading to the top, where important ceremonies and sacrifices took place. Where did the Mayan city develop? What was the purpose of Mayan pyramids? Who ruled the Mayan civilization? How did the Mayans make money? The ancient Maya never used coins as money. ... Instead, like many early civilizations, they were thought to mostly barter, trading items such as tobacco, maize, and clothing. Who was the most famous Mayan king? K'inich Janaab Pakal What age did Pacal die? 80 years (603 AD–683 AD) Where is Pakal buried? Zona Arqueológica Palenque, Mexico Who was the first leader of the Mayans? K'inich Yax K'uk Mo What was Pakal biggest creation? Also known as Pacal (which means 'shield') and Pacal the Great, he is most famous for raising the city of Palenque (known as B'aakal) from relative obscurity to a great power, his building projects in the city (especially the Temple of the Inscriptions), and his elaborately carved sarcophagus lid which has been ... Who were the Mayan elites? The elites were the ones who ruled the government and waged war. But their responsibilities also included religious and intellectual pursuits, like serving as priests, studying astronomy, and maintaining the Mayan calendar. Below the Mayan nobles were commoners. Who is the Mayan rain god? Who is the most powerful Mayan god? Which God has a name that means feathered serpent? Who is the Mayan god of death?
timaeus and critias atlantis As soon as we arrived yesterday at the guest-chamber of Critias, with whom we are staying, or rather on our way thither, we talked the matter over, (20d) and he told us an ancient tradition, which I wish, Critias, that you would repeat to Socrates, so that he may help us to judge whether it will satisfy his requirements or not. (120a) When therefore, after slaying the bull in the accustomed manner, they had burnt its limbs, they filled a bowl of wine and cast in a clot of blood for each of them; the rest of the victim they put in the fire, after having purified the column all round. Apparently in response to a prior talk by Socrates about ideal societies, Timeaus and Critias agree to entertain Socrates with a tale that is "not a fiction but a true story." Many great deluges have taken place during the nine thousand years, for that is the number of years which have elapsed since the time of which I am speaking; (111b) and during all this time and through so many changes, there has never been any considerable accumulation of the soil coming down from the mountains, as in other places, but the earth has fallen away all round and sunk out of sight. And this was unknown to you, because, for many generations, the survivors of that destruction died, leaving no written word. And the king was not to have the power of life and death over any of his kinsmen unless he had the assent of the majority of the ten. On the north side they had dwellings in common and had erected halls for dining in winter, and had all the buildings which they needed (112c) for their common life, besides temples, but there was no adorning of them with gold and silver, for they made no use of these for any purpose; they took a middle course between meanness and ostentation, and built modest houses in which they and their children's children grew old, and they handed them down to others who were like themselves, always the same. Thither also they brought year by year from all the ten allotments their seasonable offerings to do sacrifice to each of those princes. (26a) For a long time had elapsed, and I had forgotten too much; I thought that I must first of all run over the narrative in my own mind, and then I would speak. Listen then, Socrates, to a tale which, though passing strange, is yet wholly true, as Solon, (20e) the wisest of the Seven, once upon a time declared. Considered as the sequel to the Republic, “Timaeus” speculates about cosmology, where the universe as a whole is divine and ruled by mathematical truths. RIT. Estimations date Pavlopetri to around 2,800 BCE and 1,100 BCE during the Bronze Age. CRITIAS    I will tell an old-world story which I heard from an aged man; (21b) for Critias, at the time of telling it, was as he said, nearly ninety years of age, and I was about ten. About the greatest action which the Athenians ever did, and which ought to have been the most famous, but, through the lapse of time and the destruction of the actors, it has not come down to us. Wherefore, Socrates, we must consider whether this story is to our mind, or (26e) we have still to look for some other to take its place. The problem so far with claiming Pavlopetri to be the Atlantis Plato spoke of, is that the structures and landscape found do not resemble those described clearly in the dialogues. And herein, Critias and Hermocrates, (19d) I am conscious of my own inability ever to magnify sufficiently our citizens and our State. In this fashion, then, they dwelt, acting as guardians of their own citizens and as leaders, by their own consent, of the rest of the Greeks and they watched carefully that their own numbers, of both men and women, who were neither too young nor too old to fight, should remain for all time as nearly as possible the same, namely, about 20,000. for all wives and children were to be in common, to the intent that no one should ever know his own child, (18d) but they were to imagine that they were all one family; those who were within a suitable limit of age were to be brothers and sisters, those who were of an elder generation parents and grandparents, and those of a younger children and grandchildren. The island is described having a very fertile plain and "not very high mountain" in the center. SOCRATES    It was stated that this city of ours was in command of the one side and fought through the whole of the war, and in command of the other side were the kings of the island of Atlantis, which we said was an island larger than Libya and Asia once upon a time, but now lies sunk by earthquakes and has created a barrier of impassable mud (109a) which prevents those who are sailing out from here to the ocean beyond from proceeding further. The whole of this wall had numerous houses built on to it, set close together; while the sea-way and the largest harbor were filled with ships and merchants coming from all quarters, which by reason of their multitude caused clamor and tumult of every description and an unceasing din night and day. Though only briefly mentioned in the Timaeus dialogue, Critias talks of Poseidon possessing the island of Atlantis. And the priest replied, �You are young in soul, every one of you. And of the inhabitants of the mountains and of the rest of the country there was also a vast multitude, which was distributed among the lots and had leaders assigned to them according to their districts and villages. And of its goodness a strong proof is this: what is now left of our soil rivals any other in being all-productive and abundant in crops and rich in pasturage for all kinds of cattle; (111a) and at that period, in addition to their fine quality it produced these things in vast quantity. All that is said by any of us can only be imitation and representation. And there you dwelt, having such laws as these and still better ones, (24e) and excelled all mankind in all virtue, as became the children and disciples of the gods. So this host, being all gathered together, made an attempt one time to enslave by one single onslaught both your country and ours and the whole of the territory within the Straits. CRITIAS    And it was said, I believe, that the men thus trained should never regard silver or gold or anything else as their own private property; but as auxiliaries, who in return for their guard-work receive from those whom they protect such a moderate wage as suffices temperate men, they should spend their wage in common and live together in fellowship one with another, devoting themselves unceasingly to virtue, but keeping free from all other pursuits. These people profess to be great lovers of Athens and in a measure akin to our people here. For unknown reasons, Plato never completed Critias. And then it was, Solon, that the manhood of your State showed itself conspicuous for valor and might in the sight of all the world. (118e) and by them they brought down the wood from the mountains to the city, and conveyed the fruits of the earth in ships, cutting transverse passages from one canal into another, and to the city. CRITIAS    Let me proceed to explain to you, Socrates, the order in which we have arranged our entertainment. But one of them exceeds all the rest in greatness and valour. The Critias, the second part of Plato's work, comprises an account of the rise and fall of Atlantis, an ancient, mighty, and prosperous empire ruled by the descendants of Poseidon, which ultimately sank into the sea. And this island, (116a) wherein stood the royal palace, was of five stades in diameter. It is because I wish to remind you of these facts, (108a) and crave a greater rather than a less measure of indulgence for what I am about to say, that I have made all these observations, Socrates. Marvellous, indeed, is the way in which the lessons of one's childhood �grip the mind,� as the saying is. Moreover, the land reaped the benefit of the annual rainfall, (111d) not as now losing the water which flows off the bare earth into the sea, but, having an abundant supply in all places, and receiving it into herself and treasuring it up in the close clay soil, it let off into the hollows the streams which it absorbed from the heights, providing everywhere abundant fountains and rivers, of which there may still be observed sacred memorials in places where fountains once existed; and this proves the truth of what I am saying. Written in the 4th century BC, "Timaeus & Critias" are two of Plato’s more famous stories. when darkness came on, and the fire about the sacrifice was cool, all of them put on most beautiful azure robes, and, sitting on the ground, at night, over the embers of the sacrifices by which they had sworn, (120c) and extinguishing all the fire about the temple, they received and gave judgment, if any of them had an accusation to bring against any one; and when they given judgment, at daybreak they wrote down their sentences on a golden tablet, and dedicated it together with their robes to be a memorial. As for the southward parts, when they vacated their gardens and gymnasia and mess-rooms as was natural in summer, they used them for these purposes. SOCRATES    Such were the ancient Athenians, and after this manner they righteously administered their own land and the rest of Hellas; they were renowned all over Europe and Asia for the beauty of their persons and for the many virtues of their souls, and of all men who lived in those days they were the most illustrious. One kind was white, another black, and a third red, and as they quarried, they at the same time hollowed out double docks, having roofs formed out of the native rock. and amusement. The two springs fed aqueducts along the bridges to the outer zones, distributing water along the way. They constructed buildings about them and planted suitable trees, (117b) also they made cisterns, some open to the heavens, others roofed over, to be used in winter as warm baths; there were the kings' baths, and the baths of private persons, which were kept apart; and there were separate baths for women, and for horses and cattle, and to each of them they gave as much adornment as was suitable. TIMAEUS    (23d) Solon marvelled at his words, and earnestly requested the priests to inform him exactly and in order about these former citizens. To get a view of their laws, look at the laws here; for you will find existing here at the present time many examples of the laws which then existed in your city. Of the second pair of twins he called one Ampheres, and the other Evaemon. Moreover, the habit and figure of the goddess indicate that in the case of all animals, (110c) male and female, that herd together, every species is naturally capable of practising as a whole and in common its own proper excellence. (113a) But before I begin my account, there is still a small point which I ought to explain, lest you should be surprised at frequently hearing Greek names given to barbarians. So it was that, as Hermocrates has said, the moment I left your place yesterday I began to relate to them the story as I recollected it, (26b) and after I parted from them I pondered it over during the night and recovered, as I may say, the whole story. For verily at one time, Solon, before the greatest destruction by water, what is now the Athenian State was the bravest in war and supremely well organized also in all other respects. The city of Pavlopetri off the shore of Laconia, Greece is believed by some as Plato's inspiration for his dialogues speaking of Atlantis. In the dialogues, Critias and Timaeus entertain Socrates with a story that is "not a fiction, but true." In two of Plato’s great works, the Timaeus and the Critias, Plato describes an Athenian civilization in dialogues between Critias, Socrates, Timaeus and Hermocrates.Plato’s Critias recounts the story of the mighty island kingdom Atlantis and its attempt to conquer Athens, which failed due to the ordered society of the Athenians. The dialogues are conversations between Socrates, Hermocrates, Timeaus, and Critias. For indeed at that time, as he said himself, (21b) Critias was already close upon ninety years of age, while I was somewhere about ten; and it chanced to be that day of the Apaturia which is called �Cureotis.� The ceremony for boys which was always customary at the feast was held also on that occasion, our fathers arranging contests in recitation. It's believed the city was home to Greek royalty, gods and heroes from evidence uncovered throughout the 30,000 square mile site. Now in this island of Atlantis there was a great and wonderful empire which had rule over the whole island and several others, and over parts of the continent, and, furthermore, the men of Atlantis had subjected (25b) the parts of Libya within the columns of Heracles as far as Egypt, and of Europe as far as Tyrrhenia. (116d) And the temple of Poseidon himself was a stade in length, three plethra in breadth, and of a height which appeared symmetrical therewith; and there was something of the barbaric in its appearance. And Poseidon, who received for his lot the island of Atlantis, had children with a mortal woman, and settled them in a part of the island . �Its subject,� replied Critias, �was a very great exploit, worthy indeed to be accounted the most notable of all exploits, which was performed by this city, although the record of it has not endured until now owing to lapse of time and the destruction of those who wrought it.�, �Tell us from the beginning,� said Amynander, �what Solon related and how, and who were the informants who vouched for its truth.�. So all these, themselves and their descendants, dwelt for many generations bearing rule over many other islands throughout the sea, and holding sway besides, as was previously stated, over the Mediterranean peoples as far as Egypt and Tuscany. But in summer-time they left their gardens and gymnasia and dining halls, and then the southern side of the hill was made use of by them for the same purpose. Timaeus and Critias Quotes Showing 1-8 of 8 “But afterwards there occurred violent earthquakes and floods; and in a single day and night of misfortune all your warlike men in a body sank into the earth, and the island of Atlantis in like manner disappeared in the depths of the sea.” SOCRATES    For many generations, (120e) so long as the inherited nature of the God remained strong in them, they were submissive to the laws and kindly disposed to their divine kindred. I had then the greatest pleasure and amusement in hearing it, (26c) and the old man was eager to tell me, since I kept questioning him repeatedly, so that the story is stamped firmly on my mind like the encaustic designs of an indelible painting. Available English translations of Plato's Timaeus and Critias: Persons of the Dialogue: Socrates, Critias, Timaeus, Hermocrates. And of the buildings some they framed of one simple color, in others they wove a pattern of many colors by blending the stones for the sake of ornament so as to confer upon the buildings a natural charm. Timaios, pronounced [tǐːmai̯os]) is one of Plato's dialogues, mostly in the form of a long monologue given by the title character Timaeus of Locri, written c. 360 BC.The work puts forward speculation on the nature of the physical world and human beings and is followed by the dialogue Critias. But what I must somehow endeavor to show is that the discourse now to be delivered calls for greater indulgence because of its greater difficulty. May we say then that we have now gone through our discourse of yesterday, so far as is requisite in a summary review; or is there any point omitted, my dear, which we should like to see added? So though they gladly passed on these names (109e) to their descendants, concerning the mighty deeds and the laws of their predecessors they had no knowledge, save for some invariably obscure reports; and since, moreover, they and their children for many generations were themselves in want of the necessaries of life, their attention was given to their own needs (110a) and all their talk was about them; and in consequence they paid no regard to the happenings of bygone ages. Such was the vast power which the god settled in the lost island of Atlantis; and this he afterwards directed against our land for the following reasons, as tradition tells: (120e) For many generations, as long as the divine nature lasted in them, they were obedient to the laws, and well-affectioned towards the god, whose seed they were; for they possessed true and in every way great spirits, uniting gentleness with wisdom in the various chances of life, and in their intercourse with one another. And they placed therein golden statues, one being that of the God standing on a chariot and driving six (116e) winged steeds, his own figure so tall as to touch the ridge of the roof, and round about him a hundred Nereids on dolphins (for that was the number of them as men then believed); and it contained also many other images, the votive offerings of private men. (109b) Once upon a time the gods were taking over by lot the whole earth according to its regions,�not according to the results of strife: for it would not be reasonable to suppose that the gods were ignorant of their own several rights, nor yet that they attempted to obtain for themselves by means of strife a possession to which others, as they knew, had a better claim. NB: The borders of these paragraphs cannot be exactly reflected in a translation, e.g. The citizens have a deity for their foundress; she is called in the Egyptian tongue Neith, and is asserted by them to be the same whom the Hellenes call Athene; they are great lovers of the Athenians, and say that they are in some way related to them. The whole country was said by him to be very lofty and precipitous on the side of the sea, but the country immediately about and surrounding the city was a level plain, itself surrounded by mountains which descended towards the sea; it was smooth and even, and of an oblong shape, extending in one direction three thousand stadia, but across the centre inland it was two thousand stadia. Critias is the second of a projected trilogy of dialogues, preceded by Timaeus and followed by Hermocrates. And now, friend Critias, I will announce to you the judgment of the theatre. Thus there remains only that class which is of your complexion� (20a) a class which, alike by nature and nurture, shares the qualities of both the others. But in primitive times the hill of the Acropolis extended to the Eridanus and Ilissus, and included the Pnyx on one side, and the Lycabettus as a boundary on the opposite side to the Pnyx, and was all well covered with soil, and level at the top, except in one or two places. For practically all the most important part of our speech depends upon this goddess; for if I can sufficiently remember and report the tale once told by the priests and brought hither by Solon, I am wellnigh convinced that I shall appear to the present audience to have fulfilled my task adequately. Wherefore the goddess, who was a lover both of war and of wisdom, selected and first of all settled that spot which was the most likely to produce men likest herself. Now, therefore,�and this is the purpose of all that I have been saying,�I am ready to tell my tale, not in summary outline only but in full detail just as I heard it. Now different gods had their allotments in different places which they set in order. It received the streams which came down from the mountains and after circling round the plain, and coming towards the city on this side and on that, it discharged them thereabouts into the sea. That too was stated as you say. Then, in accordance with the word and law of Solon, I am to bring these before ourselves, as before a court of judges, and make them citizens of this State of ours, regarding them as Athenians of that bygone age whose existence, so long forgotten, has been revealed to us by the record of the sacred writings; and thenceforward I am to proceed with my discourse as if I were speaking of men who already are citizens and men of Athens. CRITIAS    good laws, things went well. I have before remarked in speaking of the allotments of the gods, that they distributed the whole earth into portions differing in extent, (113c) and made for themselves temples and instituted sacrifices. Many, in truth, and great are the achievements of your State, which are a marvel to men as they are here recorded; but there is one which stands out above all (24e) both for magnitude and for nobleness. (112b) And its outer parts, under its slopes, were inhabited by the craftsmen and by such of the husbandmen as had their farms close by; but on the topmost part only the military class by itself had its dwellings round about the temple of Athene and Hephaestus, surrounding themselves with a single ring-fence, which formed, as it were, the enclosure of a single dwelling. And I will tell you why. So it was ordained that each such leader should provide for war the sixth part of a war-chariots equipment, so as to make up 10,000 chariots in all, together with two horses and mounted men; (119b) also a pair of horses without a car, and attached thereto a combatant with a small shield and for charioteer the rider who springs from horse to horse; and two hoplites; and archers and slingers, two of each; and light-armed slingers and javelin-men, three of each; and four sailors towards the manning of twelve hundred ships. The old man, as I very well remember, brightened up at hearing this and said, smiling: Yes, Amynander, if Solon had only, like other poets, made poetry the business of his life, and had completed the tale which he brought with him from Egypt, and had not been compelled, by reason of the factions and troubles which he found stirring in his own country when he came home, (21d) to attend to other matters, in my opinion he would have been as famous as Homer or Hesiod, or any poet. The greatest of the circles into which a boring was made for the sea was three stades in breadth, and the circle of land next to it was of equal breadth; and of the second pair of circles that of water was two stades in breadth and that of dry land equal again to the preceding one of water; and the circle which ran round the central island itself was of a stade's breadth. TIMAEUS    He has been taken ill, Socrates; for he would not willingly have been absent from this gathering. But at that epoch the country was unimpaired, and for its mountains it had (111c) high arable hills, and in place of the �moorlands,� as they are now called, it contained plains full of rich soil; and it had much forestland in its mountains, of which there are visible signs even to this day; for there are some mountains which now have nothing but food for bees, but they had trees no very long time ago, and the rafters from those felled there to roof the largest buildings are still sound. As soon as the day broke, I rehearsed them as he spoke them to my companions, that they, as well as myself, might have something to say. And whatever happened either in your country or in ours, or in any other region of which we are informed-if there were any actions noble or great or in any other way remarkable, they have all been written down by us of old, and are preserved in our temples. The city and citizens, which you yesterday described to us in fiction, we will now transfer to the world of reality. HERMOCRATES    (117c) And there they had constructed many temples for gods, and many gardens and many exercising grounds, some for men and some set apart for horses, in each of the circular belts of island; and besides the rest they had in the center of the large island a racecourse laid out for horses, which was a stade in width, while as to length, a strip which ran round the whole circumference was reserved for equestrian contests. The consequence is, that in comparison of what then was, there are remaining only the bones of the wasted body, as they may be called, as in the case of small islands, all the richer and softer parts of the soil having fallen away, and the mere skeleton of the land being left. The leader was required to furnish for the war the sixth portion of a war-chariot, so as to make up a total of ten thousand chariots; also two horses and riders for them, (119b) and a pair of chariot-horses without a seat, accompanied by a horseman who could fight on foot carrying a small shield, and having a charioteer who stood behind the man-at-arms to guide the two horses; also, he was bound to furnish two heavy armed soldiers, two slingers, three stone-shooters and three javelin-men, who were light-armed, and four sailors to make up the complement of twelve hundred ships. For these histories tell of a mighty power which unprovoked made an expedition against the whole of Europe and Asia, and to which your city put an end. After him I am to follow, taking over from him mankind, already as it were created by his speech, and taking over from you (27b) a select number of men superlatively well trained. SOCRATES    Then have I now given you all the heads of our yesterday's discussion? And you, after consulting together among yourselves, (20c) agreed to pay me back today with a feast of words; so here I am, ready for that feast in festal garb, and eager above all men to begin. SOCRATES    We said, if I am not mistaken, that the guardians should be gifted with a temperament in a high degree both passionate and philosophical; and that then they would be as they ought to be, gentle to their friends and fierce with their enemies. Like as we previously stated concerning the allotments of the Gods, that they portioned out the whole earth, here into larger allotments and there into smaller, and provided for themselves (113c) shrines and sacrifices, even so Poseidon took for his allotment the island of Atlantis and settled therein the children whom he had begotten of a mortal woman in a region of the island of the following description. I will tell you the reason of this: Solon, who was intending to use the tale for his poem, enquired into the meaning of the names, and found that the early Egyptians in writing them down had translated them into their own language, and he recovered the meaning of the several names and when copying them out again translated them into our language. SOCRATES    Did we not begin by separating the husbandmen and the artisans from the class of defenders of the State? As to the population, (119a) each of the lots in the plain had to find a leader for the men who were fit for military service, and the size of a lot was a square of ten stadia each way, and the total number of all the lots was sixty thousand. Around the temple were golden statues of the 10 kings and their wives. Moreover, it was enriched by the yearly rains from Zeus, (111d) which were not lost to it, as now, by flowing from the bare land into the sea; but the soil; it had was deep, and therein it received the water, storing it up in the retentive loamy soil and by drawing off into the hollows from the heights the water that was there absorbed, it provided all the various districts with abundant supplies of springwaters and streams, whereof the shrines which still remain even now, at the spots where the fountains formerly existed, are signs which testify that our present description of the land is true. And these very writings were in the possession of my grandfather and are actually now in mine, and when I was a child I learnt them all by heart. Taking the form of dialogues between Socrates, Timaeus, Critias and Hermocrates, these two works are among Plato's final writings. So while many poems of many poets were declaimed, since the poems of Solon were at that time new, many of us children chanted them. Wherefore if at the moment of speaking I cannot suitably express my meaning, (107e) you must excuse me, considering that to form approved likenesses of human things is the reverse of easy. For as it is now, the action of a single night of extraordinary rain has crumbled it away and made it bare of soil, when earthquakes occurred simultaneously with the third of the disastrous floods which preceded the destructive deluge in the time of Deucalion. To this city came Solon, and was received there with great honour; (22a) he asked the priests who were most skilful in such matters, about antiquity, and made the discovery that neither he nor any other Hellene knew anything worth mentioning about the times of old. Strongest Material In The World 2019, Kim Bora Boyfriend, Mount Saint Mary Portal, Acreages For Sale Near Wolfville, Nova Scotia, Cerebellar Hypoplasia Cats Seizures, Leopold Bugs Bunny, Greek Orthodox Gift Shop, Mo Dao Zu Shi Novel English Translation Wattpad, Hurricane Bianca Cast,
Articles | Volume 6, issue 4 The Cryosphere, 6, 763–770, 2012 The Cryosphere, 6, 763–770, 2012 Research article 12 Jul 2012 Research article | 12 Jul 2012 Significant contribution to total mass from very small glaciers D. B. Bahr2,1 and V. Radić3 D. B. Bahr and V. Radić • 1Institute of Arctic and Alpine Research, UCB 450, University of Colorado at Boulder, Boulder, CO, USA • 2Department of Physics and Computational Science, Regis University, Denver, CO, USA • 3Department of Earth and Ocean Sciences, University of British Columbia, Vancouver, Canada Abstract. A single large glacier can contain tens of millions of times the mass of a small glacier. Nevertheless, very small glaciers (with area ≤1 km2) are so numerous that their contribution to the world's total ice volume is significant and may be a notable source of error if excluded. With current glacier inventories, total global volume errors on the order of 10% are possible. However, to reduce errors to below 1% requires the inclusion of glaciers that are smaller than those recorded in most inventories. At the global scale, 1% accuracy requires a list of all glaciers and ice caps (GIC, exclusive of the ice sheets) larger than 1 km2, and for regional estimates requires a complete list of all glaciers down to the smallest possible size. For this reason, sea-level rise estimates and other total mass and total volume analyses should not omit the world's smallest glaciers. In particular, upscaling GIC inventories has been common practice in sea level estimates, but downscaling may also be necessary to include the smallest glaciers.
Articles | Volume 7, issue 5 The Cryosphere, 7, 1557–1564, 2013 The Cryosphere, 7, 1557–1564, 2013 Research article 27 Sep 2013 Research article | 27 Sep 2013 A note on the water budget of temperate glaciers J. Oerlemans J. Oerlemans Abstract. In this note, the total dissipative melting in temperate glaciers is studied. The analysis is based on the notion that the dissipation is determined by the loss of potential energy due to the downward motion of mass (ice, snow, meltwater and rain). A mathematical formulation of the dissipation is developed and applied to a simple glacier geometry. In the next step, meltwater production resulting from enhanced ice motion during a glacier surge is calculated. The amount of melt energy available follows directly from the lowering of the centre of gravity of the glacier. To illustrate the concept, schematic calculations are presented for a number of glaciers with different geometric characteristics. Typical dissipative melt rates, expressed as water-layer depth averaged over the glacier, range from a few centimetres per year for smaller glaciers to half a metre per year for Franz Josef Glacier, one of the most active glaciers in the world (in terms of mass turnover). The total generation of meltwater during a surge is typically half a metre. For Variegated Glacier a value of 70 cm is found, for Kongsvegen 20 cm. These values refer to water layer depth averaged over the entire glacier. The melt \textit{rate} depends on the duration of the surge. It is generally an order of magnitude greater than water production by `normal' dissipation. On the other hand, the additional basal melt rate during a surge is comparable in magnitude with the water input from meltwater and precipitation. This suggests that enhanced melting during a surge does not grossly change the total water budget of a glacier. Basal water generated by enhanced sliding is an important ingredient in many theories of glacier surges. It provides a positive feedback mechanism that actually makes the surge happen. The results found here suggest that this can only work if water generated by enhanced sliding accumulates in a part of the glacier base where surface meltwater and rain have no or very limited access. This finding seems compatible with the fact that, on many glaciers, surges are initiated in the lower accumulation zone.
Virtual Reality: A lot of speculation happens about how Artificial intelligence will impact the world, how it’s going to change the future and the technologies related to the future. A peek into the “techy” future already started with self-driving cars but here we are going to discuss another technology fusing with the field of artificial intelligence. What is Virtual Reality? Imagine being a counter-terrorist in CS: GO. That is exactly the experience Virtual Reality gives you. It makes you feel a part of the computer-generated scenarios. Current VR technology most commonly uses virtual reality headsets or multi-projected environments, sometimes in combination with physical environments or props, to generate realistic images, sounds and other sensations that simulate a user’s physical presence in a virtual or imaginary environment. A person using virtual reality equipment is able to “look around” the artificial world, move around in it, and interact with virtual features or items. The effect is commonly created by VR headsets consisting of a head-mounted display with a small screen in front of the eyes. Virtual Reality:Headset Applying VR to AI By applying Virtual Reality to Artificial Intelligence, not only will it change the AI interface but also would help feel VR more natural. Healthcare and education will undoubtedly see a real game-changing benefit, allowing medical students to undertake risk-free surgical training, or philosophy students to learn remotely in an immersive and meaningful digital environment. In healthcare, It would help in stimulating the possible environment during a surgery and with the help of artificial intelligence, would come up with possible solutions to surgical issues. In Education, students can learn from almost-lifelike experiences. This would give them a chance to come out of their academic shells. Again with Machine learning aiding in learning, it will challenge the students to come out of their comfort zones. Meanwhile, the retail industry appears ready to move with the rapidly changing times. Having already embraced smart mirrors in dressing rooms, there seems to be a willingness to take the lead on AI. Virtual Reality CEO Mark Zuckerberg is of the belief that by utilizing both of these emerging technologies, his company will offer a more compelling social experience beyond the run-of-the-mill status updates and photo sharing. His vision for the future of Facebook will include contextual news updates and 360-degree videos. The platform will also integrate AI so that it can explain objects in an image or understand speech. And shared virtual environments will help take social media platforms, such as the one Zuckerberg founded in his Harvard dorm room all those years ago (2004!), to another level. Just imagine pulling on a VR headset and playing a few games of pool with an old college friend, all without leaving the comfort of your own home. Only time will tell us how Virtual Reality is going to change the future which is already guided by the realms of artificial intelligence. For all the latest trends, tech news, & reviews follow us on Instagram, TwitterFacebook
The history of civilisation is the history of great stories. Great stories have been told to humans for hundreds of years. For example, the divine sanction of the monarchy crafted the myth of the political supremacy of kings and queens throughout the medieval period. The story of The Enlightenment glorified the need for rationality and reason as the fundamental virtues underpinning human existence. The nihilism of the 20th century fractured the foundations of certainty that had governed human thinking, exposing us to the insecurities of our own selves.  Clearly, as humans have evolved over space and time, the hegemony of narratives in conditioning life has been paramount. But, standing in the current era of the 21st century–a period of sweeping developments in science and culture–we have been left in the darkness with regard to a philosophical theory of knowledge to help explain the world we inhabit today. Standing in this millennium, we have been deprived of our narrative agency and face a crisis of comprehension, a crisis of philosophical bankruptcy. The problem with the present is not the absence of stories, but the lack of the right ones. The predominant story of modern times is the story of liberal democracy, a highly successful narrative that not only triumphed over its communist counterpart in the late 20th century, but managed to create a world which is the safest and most productive in the history of our species. Photograph courtesy of John Jackson on Unsplash The issue with the story of liberal democracy though–manifested in the ideals of accountability, freedom, independence, and the abundance of choice–is that it is an outdated one. Premised on liberal thinkers like John Locke, Immanuel Kant, and John Stuart Mill, among others, this is a tale rooted in the needs and demands of the 19th century. It has been co-opted with the supple concept of the free market, to construct a scaffolding for the complications of contemporary life. Some of these complications arise in the form of manufactured emotions through relentless advertising, the commodification of basic human instincts, the “hustle” culture swamping the youth, and the inability to identify meaning and purpose in an existence premised not on organic dreams but artificial ambitions.   Life in the 21st Century The defining traits of the 21st century are surveillance capitalism and the rise of artificial intelligence. The former is associated with generating false choices among consumers, giving them the illusion of control all the while perpetuating a business model that Shoshana Zuboff, author of The Age of Surveillance Capitalism, believes “unilaterally claims human experience as free raw material for translation into behavioural data.” On the other hand, artificial intelligence- while normatively neutral as a concept- has a variety of insidious applications, including undercutting our free will and tailoring our emotional selves to suit oligarchic interests through intricate algorithms that can predict and condition our behaviour. Given that both surveillance capitalism and artificial intelligence fundamentally encroach upon human agency (as we have come to appreciate it through the ages), neither of these can be adequately entertained within the classical framework of liberal democracy, which is shaped by the agency that animates individualism. “A 19th-Century Vision of the Year 2000” | Source Surveillance capitalism–a marketplace for data–has fostered the idea that corporations and governments now know us better than we know ourselves. As Yuval Noah Harari, one of the world’s leading thinkers, puts it, human beings are now being hacked. It was only last week that I was astounded to find advertisements for polka-dotted suits (despite having never searched for one online) on Facebook, minutes after getting off a WhatsApp call with a friend to whom I had mentioned my fancy for buying one someday. My knee-jerk reaction was to assume that my supposedly encrypted calls on WhatsApp are anything but, and that Zuckerberg & Co have been snooping in on my private conversations to curate my newsfeed. This is not true, but the truth is scarier still. Today, a Facebook or an Amazon need not eavesdrop on what we tell our friends, for they know our desires before we become aware of such wishes ourselves.  Tristan Harris, a tech-ethicist, has a simple explanation for the way social media works. Imagine driving on the road and seeing a car accident. Most, if not all of us, would be distracted by it, and many urged by our conscience to inquire or help. Now imagine driving down the same road and watching social workers serve free juice at a traffic signal. This activity would also distract us, but for entirely different reasons. The danger with social media algorithms is that these computer programmes cannot distinguish between differences in the nature of distractions, they can only tell what occupies our attention, without being able to detect whether that attention is instigated by negative or positive emotions.  What is the net result of such a system? It is a virtual laboratory where demands and needs are constantly curated and our emotions are calibrated to suit commercial interests. Although big data knows us better than our best friend, even big data’s understanding of the self can be superficial, and incapable of penetrating the larger complexities of human consciousness.  The second instrumental feature of our age is artificial intelligence. The fascinating possibilities of AI are no longer ensconced in fantasy novels, but have already started taking hold in the real world too. From the information sector to law, from policing to sports, AI is fast becoming omnipresent and is set to develop exponentially in the future. Besides the obvious question of what happens to employment sectors once the AI revolution is complete–think of truck drivers, house-helpers, and millions of others occupying the unorganised sector where physical labour is still operational–there is the dystopian prospect of an informational imbalance too. As the coronavirus pandemic ravages the world, authorities in China have doubled down on autocratic measures to survey citizens and check the spread of the disease. While the end (in this case) is a beneficial one, the means adopted to do so sets a dangerous precedent. With the help of advanced AI, governments are increasingly likely to know exactly what we are doing and, in certain cases, exactly what we are going to do.   One of the reasons why autocracy could not overwhelm democracy in the 20th century was the inverse relationship between centralisation of information and efficiency. If the KGB wanted to track the movements of everyone inside the USSR, it would have required thousands more who could be trained to do so. Multiplying its workforce substantially would have been a thankless task for an organisation as specialised in its methods as the KGB. However, if the KGB were to exist today, a bunch of devices deploying high-tech AI can eliminate the need for cohorts of human experts and achieve the same task of mass monitoring in ways the naïve citizen can never imagine. The relationship paradigm between information and efficiency has been altered through the emergence of AI, which could signal a resurgence of autocratic politics in countries that have not faced it for decades besides amplifying it in places where such tendencies already exist. Writing a New Story So, what does this mean in the grand scheme of things? How can we possibly forge a new story that helps us adjust to the world as it unfolds?  The first step is to acknowledge that there is no simple answer. Stories that shape civilisations cannot be stitched overnight. No single messiah can conjure them up and no Twitter hashtag can set it trending. If a new story is to arise, it has to be the culmination of a rigorous overhaul in our political and cultural understanding of the systems around us.  To begin with, data must be integrated into mainstream discourse, from media reportage to academic curricula to election manifestos. Social movements across the planet–from those tackling climate change to those challenging social hierarchies–must adapt to incorporate technology in their battles. If the government can hoodwink us by keeping tabs on us, is there a way we can use the same avenues of technology to hold the powers that be to account? If billion-dollar companies can hijack our emotional selves to distort our free will, how can the common human being take back control? Should ethical learning and application be made compulsory for coders and programmers so as to establish a framework of values that creates moral accountability within individuals instead of whitewashing their role in the construction of a pernicious system? The path to crafting a new story for the 21st century is fraught with danger, but if we are to chart more glorious chapters of human progress, it is incumbent on us–as responsible citizens–to stop believing in the old fodder of the liberal democratic order that has been fed to our thoughts. The reality has shifted, the challenges are new, the storybook of yesterday’s life is obsolete. It is about time we collectively turned the page. Featured image: Space Colony Art from the 1970s (CC0) — “In the 1970s the Princeton physicist Gerard O’Neill, with the help of NASA Ames Research Center and Stanford University, held a series of space colony summer studies which explored the possibilities of humans living in giant orbiting spaceships. Colonies housing about 10,000 people were designed and a number of artistic renderings of the concepts were made.” Please enter your comment! Please enter your name here
4 minutes read Haskell makes the task that is normally difficult and expensive a little less daunting. Functional programming like Haskell is the less expensive alternative to other programs. Even with large projects, Haskell makes them have fewer mistakes and makes the process smoother. It provides polymorphic typing and a lazy evaluation and high order functions. Haskell is a functional coding language. It is used for programming.
Vesta: Asteroid of Spirituality While our modern Gregorian calendar begins on January 1, ancient Rome celebrated the new year near the Spring Equinox in March. In this timeline, February was dedicated to new year preparation and rituals that included purification, prayer, and cleansing—especially those related to fire. Eventually, the month became associated with the goddess Vesta, the goddess of hearth and home, and an ancient symbol of the sacred flame. As one of the three virgin goddesses, Vesta reminds us of our holiness, wholeness, and the power inherent in our own life force energies separate from others—particularly romantic partners.  In Greek translations, the word virgin meant “one unto herself,” as it referred to an unmarried maiden rather than the purely sexual connotation of our language today. However, this also explains Vesta’s claim to fame as a goddess who refused to marry powerful gods Apollo or Poseidon—though may have taken them as lovers, we can’t be sure. Vesta became even more of a “household” name in ancient Roman times with the cult of the Vestal Virgins. These women kept the sacred fires burning that protected the city from strife and honored Vesta through their chastity. However, if any of them were caught having sex during their 30-year term, they were buried alive outside the gates of Rome, as the blood of Vestal Virgins was considered sacred and couldn’t be spilled. After their service to Rome, Vestal Virgins received a rare social status including the choice to marry—or not, though according to Britannica, many chose not to wed.  Astrologically, Vesta was discovered in 1807, and is officially classified as a dwarf planet even though it orbits in the asteroid belt between Mars and Jupiter. In our birth charts, Vesta represents what is most sacred to us. In Asteroid Goddesses, Demetra George describes the four major asteroids (Ceres, Juno, Vesta, and Pallas Athena) as expressing different expressions of sexual energy: Vesta represents the sacred dimension of our sexuality and how our inner flame of desire translates into spiritual yearning. Vesta reminds us of our devotion to a spiritual path and where the profane meets the sacred in our lives. Through connecting with Vesta, we discover our dedication to personal ceremonies or rituals and the magic inherent in the human experience. It also expresses itself through the ways we channel sexual energy and potential. Read me: Ceres Is All About Self-Care and Summertime A blocked Vesta energy may reveal itself in unrealized sexual potential or denial of sexuality and passion—perhaps expressed in very traditional religious views. An unintegrated Vesta may also show up as the Freudian virgin-whore complex and the compartmentalizing of sexuality and spirituality as if they are incompatible. Utilizing sacred sexuality practices—alone or with others—grounds the two together instead of keeping them separate. The Meaning of Asteroid Vesta in the Natal Chart by Sign and Aspect Understanding the placement of asteroid Vesta in our natal chart presences us to the power of our own sacred flame and reveals what we tend to ritualize and hold as holy. Below are different ideas on how life force energy may become channeled or utilized: Vesta in Aries or in aspect to Mars: Energy and motivation may move through ambition. Notice how self-fulfillment can become fueled by alienation and instead move it towards purpose or movement. Vesta in Taurus or in aspect to Venus: Let pleasure and comfort be your guiding light. Explore sensuality through practices such as Tantra that unites the sacred aspects of Vesta with the down-to-earth qualities of connecting. Vesta in Gemini or in aspect to Mercury: Intellectual pursuits can be a devotion of sorts and treating knowledge as sacred. Continuous learning or writing may be the key to uncovering your spiritual path. Vesta in Cancer or in aspect to the moon: Feeling and honoring your feeling is a divine act—perhaps even creating daily or monthly rituals to bridge your inner and outer worlds of emotion. Vesta in Leo or in aspect to the sun: Sacred space for creating and even revering yourself in some way can allow energy to move through in more a self-expressed rather than dominating motion. Vesta in Virgo or in aspect to Mercury: True to the idea of virginity, this placement craves service to others and a higher source. Volunteering or daily acts of kindness support the higher calling of Virgo. Vesta in Libra or in aspect to Venus: Fairness and justice are a noble pursuit for the balance Libra energy craves. When channeled through Vesta, it operates in the realm of beauty, design, and aesthetics. Vesta in Scorpio or in aspect to Pluto: The fiery nature of Vesta and the water sign placement soften the focus and call for sexual healing and depth.  Diving deeply into taboo themes or shadow work may unveil the numinous. Vesta in Sagittarius or in aspect to Jupiter: Morality and religion may be a way this placement channel sexual energy or life force. Traveling and humanitarian work can offer new outlets for exploration. Vesta in Capricorn or in aspect to Saturn: Like the dedication of the Vestal Virgins, this placement may experience the divine through hard work. Instead of repressing the erotic aspect of energy, find passion and beauty through commitment. Vesta in Aquarius or in aspect to Uranus: Vesta craves ideas and shifting perspectives in this placement. Change and creativity ignite the fires of desire and dedicating one’s flame towards a social cause can be a beautiful way to honor the divine spark. Vesta in Pisces or in aspect to Neptune: Pisces and Neptune embody the spiritual urge and path. However, understand your energetic boundaries with sexuality and steer clear of spaces or situations where they may not be honored. Asteroid Vesta Astrological Themes & Keywords Virginity & Vesta: Holiness & wholeness Sacred sexuality and spirituality Virginity & sacred sexuality Spiritual and sacred Mundane into magic Spiritual, sacred, sexuality Virgin and sacred prostitute Finding heaven, hearth, and home Vesta helps us find our sacred and profane