text
stringlengths
144
682k
Open Access Proteomics of radiation resistance • Wim D'Haeze Genome Biology20023:reports0061 Received: 30 September 2002 Published: 27 November 2002 An extensive proteome analysis will help understand how D. radioduranssurvives under extreme conditions Significance and context Deinococcus radiodurans, a Gram-negative, non-motile, red-pigmented, non-pathogenic bacterium, was first isolated in 1956 from a can of ground beef that had been radiation-sterilized but had spoiled nonetheless. Probably because D. radioduranshas the capacity to efficiently repair radiation breakage to its DNA, it can endure 1.5 million rad, a radiation dose 3,000 times higher than would kill most other organisms - from microbes to humans. Moreover, it can withstand both acute and chronic exposure to high levels of radiation. D. radioduransis believed to be suitable for bioremediation programs, to clean up mixed-waste sites contaminated with toxic chemicals as well as radiation. Research is ongoing to alter the genetic content of D. radioduransin order to detoxify the most common chemical contaminants at such sites. It is proposed that the underlying mechanism for its exceptional resistance to radiation may be a combination of a complex array of interacting proteins and many subtle structural peculiarities of proteins and DNA. Lipton et al. have developed a new method of efficient high-throughput identification of peptides by mass spectroscopy using accurate mass tags (AMTs) for each of the proteins expressed by the given organism. Proteins are digested to yield a mixture of polypeptides that are analyzed to create a collection of AMTs, which in turn serve as biomarkers for the parent protein. This new method was applied to analyze the D. radioduransproteome. Key results In the current analysis, the 3,116 predicted open reading frames (ORFs) were taken into account. The measurements identified 6,997 AMTs with high confidence, corresponding to 1,910 ORFs, covering about 61 % of the predicted ORFs. Proteins were prepared from D. radioduranscultures harvested at different time points (mid log phase or late log phase) or grown under different conditions, including defined media, rich media, heat or cold shock, hydrogen peroxide shock and toluene shock. Lipton et al.found that two classes of stress proteins with a role in detoxification processes are catalases and superoxide dismutases. The RecA protein is pivotal for the recombinational repair of double-strand breaks in DNA that are caused by radiation. Five different RecA AMTs covering 34% of the sequence were identified in cells exposed to radiation. The entire genome sequence of D. radioduranscan be accessed at The%20Institute%20for%20Genomic%20Research:%20Deinococcus%20radioduransR1 website and at the NCBI:%20summary%20sequence page. Reporter's comments Lipton et al. have developed a new high-throughput technique to analyze the proteome of virtually any organism with a high efficiency and precision. The technique has been applied to the proteome of D. radioduransin the first instance. The analysis of the production of an extended set of proteins under different stress conditions provides insights into the molecular mechanisms by which this bacterium copes with extreme stress such as severe radiation, and thus how it can be engineered to be used in bioremediation programs. The technique can be applied to obtain insights into the eukaryote proteomes, such as that of humans, which will be accessible for study in the near future. Table of links 1. Lipton MS, Pasa-Tolic L, Anderson GA, Anderson DJ, Auberry DL, Battista JR, Daly MJ, Fredrickson J, Hixson KK, Kostandarithes H, et al: Global analysis of the Deinococcus radioduransproteome by using accurate mass tags. Proc Natl Acad Sci USA. 2002, 99: 11049-11054.PubMedPubMed CentralView ArticleGoogle Scholar © BioMed Central Ltd 2002
, , , , , As bird photographers, we are often told to focus on the bird eyes and make sure they are not only visible but also stand out. Chickadees are quite common in our area, at any time of the year. Up to now in most of the photos I took of them, their black eyes blend in and are indistinguishable from their black cap. Recently, at sunset, one of them posed long enough with its head turned to the sun, and revealed its bright eyes. Carolina Chickadee. The female Ruddy Duck has brown eyes, usually lost in its brown cap, until the sun shines on them. Female Ruddy Duck. Sparrows have brown eyes which are more visible, but a ray of sunlight also helped to bring them out. White-throated Sparrow. On the other hand Red-breasted Mergansers have devilish red eyes that cannot be missed. Red-breasted Mergansers.
Dismiss Notice Join Physics Forums Today! Ebb and Flow effects 1. Dec 17, 2012 #1 User Avatar OK, so the moon has a rather large mass (I found somewhere a comparison with earth which gave a value of about 75 billion trillion Kg/M3), but the spacecrafts Ebb and Flow are travelling rather fast with quite alot of momentum(132KG each, 6050km/s = around 800000Kg m/s). So what sort of things might happen when Ebb and Flow hit the Moon? I'm fairly sure that someone at NASA has already worked this out, but While my confidence in natural laws is high, my confidence in human beings is not as complete and it occurs to me that what NASA thinks will happen might be a little different to what does happen. While I'm sure any miscalculations or oversights will be very small, what are the implications of such an impact going wrong? could debris from the impact return to earth? if it does will it be spectacular, or terrifying? could the moon be rotated enough that we could see new areas with a telescope, or might it even begin to have a rotation like the earths? I can imagine a whole host of possibilities, but I'm afraid my astrophysics is very limited and am curious as to what more learned minds might postulate. 2. jcsd 3. Dec 17, 2012 #2 User Avatar Science Advisor You've got that number wrong by the factor of 3600. In other words, it's per hour, not per second. but even if it was 6000km/s, the kinetic energy of the impactor would be ~2,5*10^15J, or the equivalent of a ~600 kiloton nuclear explosion(most warheads today have higher yelds, I believe). The actual speed they're going to hit the Moon at is ~4 times less than the escape velocity of Earth. For comparison, a typical meteor hits the atmosphere(or the Moon for that matter) at ~108000km/h(i.e.Earth's orbital speed). Last edited: Dec 17, 2012 4. Dec 17, 2012 #3 User Avatar Thanks. heh, After expecting it to be 6050km/s , 6050km/hr seems so slow! Ah well, still very interesting. (not as interesting as putting people there though) Similar Discussions: Ebb and Flow effects 1. Shapiro Effect (Replies: 0) 2. Gravitational effects (Replies: 3)
What Is Reactive Airway Disease? When Your Wheezing Can't Be Explained Quite Yet Show Article Table of Contents woman with doctor having trouble breathing Your doctor may diagnose you or your child with reactive airway disease the first time you wheeze. Some doctors use the term as a synonym or catch phrase for asthma. Others use it as a term before an exact diagnosis is made so that you are not inappropriately labeled. An exact definition of reactive airway disease does not really exist. While it may help explain asthma to a patient or parent, the term is not really all that helpful clinically because there is no accepted or precise meaning. There are many children, especially infants, who will wheeze and never develop asthma. In fact, only about a third of wheezing infants will ever be diagnosed with it. Whether respiratory syncytial virus (RSV) or some other virus, it's important to remember that all wheezes are not related to asthma. You could be said to have a reactive airway disease if you are experiencing any of the following symptoms: Furthermore, three primary changes are taking place in your lungs in reactive airway disease: 1. Increased mucus. Your airways become irritated and inflamed, causing the cells in your airways to produce mucus. The thick mucus produced can clog the airways of your lung, making it difficult to breathe. 2. Inflammation and swelling. Just as your arm swells from the irritation of being stung by a bee or wasp, airways of your lungs swell and become inflamed during an episode. 1. Muscle tightening. The smooth muscles in the airways of your lungs tighten and the airways become smaller, making it more difficult to breathe. The narrowing of the airways and subsequent symptoms may occur suddenly or may develop more gradually. The symptoms of reactive airway disease range from very mild to very severe. Pediatricians and general practitioners have used the term "reactive airway disease" to be able to tell parents that their child is wheezing, but does not have asthma. Some doctors are using the term to refer another condition known as "reactive airways dysfunction syndrome," or RADS.  RADS refers to wheezing, coughing, and shortness of breath in someone with lung damage after exposure to toxic chemicals contained in vapors, fumes, or smoke. RADS often mimics asthma but is not asthma per se. While your doctor will surely consider asthma if you are showing symptoms of reactive airway disease, a number of other diagnoses will also be considered. Your doctor will talk to you about your symptoms and possibly do lab or other tests. Other diseases that may produce reactive airway disease symptoms include: Depending on your symptoms and what your doctor believes your diagnosis to be, there are a number of different potential treatments. These could include:  Fahy JV, O'Bryne PM. Reactive Airways Disease - A Lazy Term of Uncertain Meaning That Should Be Abandoned. American Journal of Respiratory and Critical Care Medicine;163(4):822-823. Allergy/Asthma Information Association.  A Patient's Guide to Asthma Care. Brooks SM. Then and Now Reactive Airways Dysfunction Syndrome. Journal of Occupational and Environmental Medicine. 2016;58(6):636-7. Continue Reading
Birth registration opens the door for a newborn child to enter into a permanent identity and death registration relives one from all such records. A birth certificate is considered a ticket to citizenship, without which an individual does not officially exist and therefore lacks legal access to the privileges and protection of a nation1. On the other hand, a death certificate is a mandatory proof for relieving a person from the entire social, legal and financial obligation A birth certificate as a government document supports an individual to enjoy the rights and protection of the nation. While a death certificate supports his family members on enjoying the property rights and schemes like policy benefits and other entitled privileges. In a nutshell, a birth certificate is a supportive document for the survival of an individual and a death certificate is a document to serve his family members. The registration of birth not only provides acknowledgment but also gives legal status to one's existence. It opens the door for accessing other fundamental rights including education, health care and protection. Apart from the proof of identity and entitlement for different services, birth registration to a larger extent helps the government to determine some important basic concerns like doses of immunization vaccine to be supplied, educational and other childcare facilities to be provided in the country. The registration of death is also important for the government to analyse the life expectancy, population of the country and other information related to the services to be provided. A poor registration system can lead to the poor calculation of birth and death rate. Indeed an effective birth and death registration system is elementary to the sensible operation of polity in the new era of local self-governance.
Sunday, December 27, 2009 lunar eclipse on new years eve! the last eclipse of 2009 will occur on new years eve! everyone around the world will see a full moon that night, and it will be a blue moon - the second full moon occurring in a month. look to the east, in the constellation gemini. image from earth sky. on new years eve, the earth will float almost directly between the sun and the moon, causing a partial lunar eclipse. the greatest eclipse occurs at 19:23 UT, when the edge of the moon passes thru the earth's shadow. this eclipse will be visible to people in europe, africa, asia, india, and some of australia - too bad americas! but you will have this view during the first few nights of 2010, as the moon passes close by mars on january 2nd! the above map comes from sky and telescope, who state that "the Moon is plotted for North America; in Europe, move each Moon symbol a quarter for the way toward the one for the previous date." Ho66es said... "on new years eve, the sun will float almost directly between the sun and the moon" thats gonna be a cool trick :D Misty said... This will give you more of the science of lunar eclipses Ho66es said... the science was never in question, I was being a tad cheeky (ok a lot) pointing out that the sun would have problems placing itself between itself and the moon. I could have just pointed out that earth had been misspelt as sun. That'll teach me to try and be smart. astropixie said... i must have read that sentence 10 times before i realized something was wrong. proofreading fail.
15 December 2007 Santa Claus Introduction to How Santa Claus Works When Virginia O'Hanlon, an 8-year-old girl from New York City, sent a letter addressed to the newspaper The Sun in 1897, she asked a very simple question: "Please tell me the truth; is there a Santa Claus?" In what must have been a surprise to her, the question was answered quite frankly. After calling out Virginia's "little friends" for doubting the existence of Santa Claus and being clouded by an age of skepticism, the writer of the article, Francis Pharcellus Church, gave his straightforward reply, "Yes, Virginia, there is a Santa Claus." Christmas Tree Image Gallery A sample letter to Santa Claus Timothy A. Clary/AFP/Getty Images A sample of a letter received by the United States Postal Service is put on display at a news conference at the James A. Farley Post Office in New York. (See Christmas tree images.) Today, children all over the world are still asking the same question as Virginia did. So who exactly is this Santa Claus guy, and why would he cause so much skepticism among boys and girls? Is he some kind of magical figure? How could one person cause so much excitement, doubt and even concern? Ho, Ho, Ho More Christmas-related articles ­How Christmas Works ­How Santa's Elves Work How Santa's Sleigh Work ­Christmas Channel This Santa Claus guy appears to be pretty secretive about his operations. Along with Mrs. Claus, elves and a certain reindeer with a glowing, red nose, Santa is reputed to live at the North Pole, an impressive feat since the temperature almost never rises above freezing. Because the North Pole isn't the most hospitable place for people to visit, it would be difficult for most people to withstand the harsh weather and rough terrain in order to gain any serious intel on Santa. And although no one may ever know for sure just how Santa operates, we at HowStuffWorks have what we think are the most logical explanations for how the big guy accomplishes all that he does: science and technology. To find out more about Santa, the gear he might use and his possible connection to mall Santas, read on. Video Gallery: Year-round Santa Watch this video about "Santa House," a place where Filipino children can visit Santa year-round. Naughty or Nice? Santa Claus is one of the most popular and recognizable figures on Earth. He's been depicted in dozens of holiday-themed shows, from the 1947 film "Miracle on 34th Street" to the 1964 television special "Rudolph the Red-nosed Reindeer" to more recent films like "Elf" in 2003. Many countries have different names for him -- although he's Santa Claus in North America, he goes by Father Christmas in the United Kingdom, Père Noël in France, Babbo Natale in Italy and Sinterklaas in Holland, where he's associated with the Dec. 6 St. Nicholas Day celebration. Santa waves as he water-skis on the Potomac River in Washington, DC. Karen Bleier/AFP/Getty Images Santa waves as he water-skis on the Potomac River in Washington, D.C. Whether you call him St. Nicholas, St. Nick or Santa Claus, though, the man represents the same thing to nearly everyone who celebrates Christmas and the holiday season -- he's known as a benevolent soul, a giver of gifts and a spreader of Christmas cheer. According to Christmas folklore, Santa's main concern is making toys and distributing them in a timely and orderly fashion to children all over the world. This has garnered him quite a following. After all, children like toys, and Santa gives toys away -- therefore, children like Santa Claus. Santa not only gives toys away, but he does it in style, too. He rides in his very own sleigh led by a team of reindeer, but it isn't just any old sleigh -- this one flies and rumor has it that it can make it around the world in just one night. It's also thought by some that Santa doesn't simply pass by your house and leave a few presents on your doorstep -- he lands on top of your roof, climbs down your chimney and puts presents both in your stockings and around your Christmas tree. But where does Santa get all of these toys? Certainly one couldn't make or buy all of that merchandise by himself. That's where Santa's elves come in. It's possible that these little workers possess a drive and energy even the smallest of nanorobots couldn't match, so Santa would never have to worry too much about being behind in production. There's a catch to Santa's good will, however. According to the classic Christmas song "Santa Claus is Coming to Town," Santa's always watching: "He's making a list / he's checking it twice / he's gonna find out who's naughty or nice." A big part of his job is to keep an eye on your behavior over the course of the year -- if you've behaved well, there's a good chance you'll get what you want for Christmas. If your behavior was less than satisfactory, however, you risk getting nothing but a lump of coal in your stocking. How does he do this? Our best bet is that he's using something similar to Google Earth. Think of that, then fast-forward into the future a few hundred years. In the next section, we'll explore what Santa might look like in person and we'll ponder some of the special gadgets and technologies he might use. Santa's Appearance and Santa Gear If you've ever paid attention to the floats during the Macy's Thanksgiving Day Parade, you'll notice one constant from year to year -- Santa Claus is always the big finale, the last one to pass through the streets of New York City. We'd have to assume that this is his only major official public appearance during the year, since he would be incredibly busy organizing wish lists and keeping tabs on elf productivity. Santa Claus scales a building. Getty Images Santa Claus scales a building to deliver presents. That brief glimpse, however, is enough to let us know that all those songs, poems, stories and movies about Santa Claus could be fairly accurate in their visual representations. Whether Santa is portrayed on film in live-action or in stop-motion animation, Hollywood has his image down pretty well -- he's a large, rather plump older man with white hair and a long, white beard, and most of the time he's wearing his trademark red suit and red stocking cap. His cheeks are almost always a rose-colored hue, and it may not be because he's been drinking too much eggnog. As we mentioned earlier, the weather is very cold in the North Pole, so his skin could become easily chapped. Our best estimations are that Santa must use some serious gear to deliver presents: • The Sleigh - In addition to being outfitted with flying reindeer, Santa's sleigh must be a highly advanced flying machine that performs faster and more efficiently than any spaceship currently used by NASA. The vehicle would have to be equipped with a special Antimatter Propulsion Unit that allows Santa to skip from one roof to the next in less than 24 hours and make it home to the North Pole in time for a nap and Christmas dinner. The sleigh would probably be outfitted with an iPod player and a hot cocoa maker, allowing maximum comfort during Santa's trip around the Earth. • The Suit - The traditional red suit Santa wears would have to be a bit more complex than it looks. First, it would be made out of a protective, lead-free material that blocks any radiation from Santa's engine -- antimatter rockets produce dangerous gamma radiation, so it's important for Santa to keep safe up in the sky. Second, the suit would also be threaded with carbon nanotubes, allowing the suit to shrink with Santa if he ever changes his size. • The Belt - For climbing up and down chimneys, Santa would need a little support. We assume he's taken some rock climbing lessons, and his belt comes with all the necessary hooks, grapples, bells and whistles to get him in and out of your living room before you even have a chance to spot him. In the next section, we'll examine whether there's any connection to Santa and the mall Santas you might spy while you do your holiday shopping. What's on Santa's Playlist? The staff at HowStuffWorks would like to think that Santa's iPod, has a pretty eclectic Christmas playlist. Here's what we like to imagine him listening to as he cruises through the sky: • "Santa Baby" - Eartha Kitt • "Santa Claus Is Coming to Town" - Bruce Springsteen • "Have Yourself a Merry Little Christmas" - Judy Garland • "Sleigh Ride" - Ella Fitzgerald • "Skating" - Vince Guaraldi Trio • "Deck the Halls" - John Denver and The Muppets • "Little Saint Nick" - The Beach Boys • "The Christmas Song (Chestnuts Roasting on an Open Fire)" - Nat King Cole • "Get Behind Me, Santa!" - Sufjan Stevens • "White Christmas" - Bing Crosby • "Baby It's Cold Outside" - Ella Fitzgerald and Louis Jordan • "Christmas Time Is Here" - Vince Guaraldi Trio Mall Santas and Letters to Santa If you're ever strolling through your local mall after Thanksgiving, you might notice Santa Claus in the middle of the mall. There's probably an unbearably long line of children waiting for the chance to talk to Santa and tell him what they really want this year for Christmas presents. Perhaps you smile and wave, and Santa will smile and wave right back, laughing his deep, trademark "Ho, ho, ho!" and you'll move on. Father Christmas school Peter Macdiarmid/Getty Images Professional Father Christmas performers gather for an annual Santa School in London. Shortly thereafter, you might mosey on over to the other local mall, the one that's across the street. Wandering around from store to store, you might notice yet another Santa Claus, slightly different from the one you just saw at the other mall. How could this be? Is the mall some kind of portal between parallel universes? Is one the real Santa and the other a fake? Or are they both impostors? First things first: These Santas probably don't consider themselves to be "fake," and they may not appreciate the word "impostor." If anything, you might call them "messengers." Like Santa's elves, we believe that the most logical explanation is that they're an extension of the Santa's Helpers Alliance, aka, mall Santas. Mall Santas are people just like you and me, but they must pass a few specifications in order to carry out their seasonal duties. They must be of similar build to Santa Claus. They must be in the appropriate age range of 50 to 60 years old, and they must sport an acceptable beard. Mall Santas must also graduate from a special Santa School, where they'll learn to laugh like Santa, eat like Santa and keep a snow-white beard like Santa [source: LA Times]. Could it be that Santa drew up the curriculum himself? Letters addressed to Santa Clause Alexander Hassenstein/Getty Images Letters addressed to Santa Claus at the post office in Lapland, Finland. A mall Santa's job is simple -- he must ask children want they want for Christmas, make sure they've behaved this year, and then send detailed e-mail reports back to Santa Claus. A mall Santa's work accounts for about 33 percent of all gift requests, making them an important part of Santa's team -- the other 67 percent of Christmas wishes are sent directly to the North Pole by mail, of course. Nearly 100,000 letters make it out every holiday season to Santa's address at the North Pole. Why would Santa need an alliance of Mall Santas? Even though he might make it around the world in one night, he couldn't be in lots of different places all at the same time. We'll have to assume that he's not quite there yet with the technology. For the moment, he has to settle with a complex but efficient way of collecting Christmas wish information. Read More...... 03 December 2007 Flash Memory Works Introduction to How Flash Memory Works Sony memory stick A Sony memory stick. See more flash memory pictures. Electronic memory comes in a variety of forms to serve a variety of purposes. Flash memory is used for easy and fast information storage in such devices as digital cameras and home video game consoles. It is used more as a hard drive than as RAM. In fact, Flash memory is considered a solid state storage device. Solid state means that there are no moving parts -- everything is electronic instead of mechanical. Here are a few examples of Flash memory: • Your computer's BIOS chip • CompactFlash (most often found in digital cameras) • SmartMedia (most often found in digital cameras) • Memory Stick (most often found in digital cameras) • Memory cards for video game consoles Flash Memory Basics We discussed the underlying technology of Flash memory in How ROM Works, but here's a quick review: Flash memory is a type of EEPROM chip. It has a grid of columns and rows with a cell that has two transistors at each intersection (see image below). Flash Memory: Tunneling and Erasing Tunneling is used to alter the placement of electrons in the floating gate. An electrical charge, usually 10 to 13 volts, is applied to the floating gate. The charge comes from the column, or bitline, enters the floating gate and drains to a ground. This charge causes the floating-gate transistor to act like an electron gun. The excited electrons are pushed through and trapped on other side of the thin oxide layer, giving it a negative charge. These negatively charged electrons act as a barrier between the control gate and the floating gate. A special device called a cell sensor monitors the level of the charge passing through the floating gate. If the flow through the gate is greater than 50 percent of the charge, it has a value of 1. When the charge passing through drops below the 50-percent threshold, the value changes to 0. A blank EEPROM has all of the gates fully open, giving each cell a value of 1. The electrons in the cells of a Flash-memory chip can be returned to normal ("1") by the application of an electric field, a higher-voltage charge. Flash memory uses in-circuit wiring to apply the electric field either to the entire chip or to predetermined sections known as blocks. This erases the targeted area of the chip, which can then be rewritten. Flash memory works much faster than traditional EEPROMs because instead of erasing one byte at a time, it erases a block or the entire chip, and then rewrites it. You may think that your car radio has Flash memory, since you are able to program the presets and the radio remembers them. But it is actually using Flash RAM. The difference is that Flash RAM has to have some power to maintain its contents, while Flash memory will maintain its data without any external source of power. Even though you have turned the power off, the car radio is pulling a tiny amount of current to preserve the data in the Flash RAM. That is why the radio will lose its presets if your car battery dies or the wires are disconnected. Removable Flash Memory Cards While your computer's BIOS chip is the most common form of Flash memory, removable solid-state storage devices are becoming increasingly popular. SmartMedia and CompactFlash cards are both well-known, especially as "electronic film" for digital cameras. Other removable Flash memory products include Sony's Memory Stick, PCMCIA memory cards, and memory cards for video game systems such as Nintendo's N64, Sega's Dreamcast and Sony's PlayStation. We will focus on SmartMedia and CompactFlash, but the essential idea is the same for all of these products. Every one of them is simply a form of Flash memory. There are several reasons to use Flash memory instead of a hard disk: • Flash memory is noiseless. • It allows faster access. • It is smaller in size. • It is lighter. • It has no moving parts. So why don't we just use Flash memory for everything? Because the cost per megabyte for a hard disk is drastically cheaper, and the capacity is substantially more. smart media flash card SmartMedia card The solid-state floppy-disk card (SSFDC), better known as SmartMedia, was originally developed by Toshiba. SmartMedia cards are available in capacities ranging from 2 MB to 128 MB. The card itself is quite small, approximately 45 mm long, 37 mm wide and less than 1 mm thick. This is amazing when you consider what is packed into such a tiny package! As shown below, SmartMedia cards are elegant in their simplicity. A plane electrode is connected to the Flash-memory chip by bonding wires. The Flash-memory chip, plane electrode and bonding wires are embedded in a resin using a technique called over-molded thin package (OMTP). This allows everything to be integrated into a single package without the need for soldering. diagram of smart media card The OMTP module is glued to a base card to create the actual card. Power and data is carried by the electrode to the Flash-memory chip when the card is inserted into a device. A notched corner indicates the power requirements of the SmartMedia card. Looking at the card with the electrode facing up, if the notch is on the left side, the card needs 5 volts. If the notch is on the right side, it requires 3.3 volts. SmartMedia cards erase, write and read memory in small blocks (256- or 512-byte increments). This approach means that they are capable of fast, reliable performance while allowing you to specify which data you wish to keep. They are small, lightweight and easy to use. They are less rugged than other forms of removable solid-state storage, so you should be very careful when handling and storing them. CompactFlash cards were developed by Sandisk in 1994, and they are different from SmartMedia cards in two important ways: • They are thicker. • They utilize a controller chip. CompactFlash consists of a small circuit board with Flash-memory chips and a dedicated controller chip, all encased in a rugged shell that is several times thicker than a SmartMedia card. As shown below, CompactFlash cards are 43 mm wide and 36 mm long, and come in two thicknesses: Type I cards are 3.3 mm thick, and Type II cards are 5.5 mm thick. Compact Flash card CompactFlash card CompactFlash cards support dual voltage and will operate at either 3.3 volts or 5 volts. The increased thickness of the card allows for greater storage capacity than SmartMedia cards. CompactFlash sizes range from 8 MB to 6GB. The onboard controller can increase performance, particularly on devices that have slow processors. The case and controller chip add size, weight and complexity to the CompactFlash card when compared to the SmartMedia card. Memory Standards Both SmartMedia and CompactFlash, as well as PCMCIA Type I and Type II memory cards, adhere to standards developed by the Personal Computer Memory Card International Association (PCMCIA). Because of these standards, it is easy to use CompactFlash and SmartMedia products in a variety of devices. You can also buy adapters that allow you to access these cards through a standard floppy drive, USB port or PCMCIA card slot (like the one you find on a laptop computer). Sony's Memory Stick is available in a large array of products offered by Sony, and is now showing up in products from other manufacturers as well. Although standards are flourishing, there are many Flash-memory products that are completely proprietary in nature, such as the memory cards in video game systems. But it is good to know that as electronic components become increasingly interchangeable and learn to communicate with each other (by way of technologies such as Bluetooth), standardized removable memory will allow you to keep your world close at hand. In September 2006, Samsung announced the development of PRAM -- Phase-change Random Access Memory. This new type of memory is supposed to combine the fast processing speed of RAM with the non-volatile features of Flash memory, leading some to nickname it "Perfect RAM." PRAM is supposed to have be 30 times faster than conventional Flash memory and have 10 times the lifespan. Samsung plans to make the first PRAM chips commercially available in 2010, with a capacity of 512 Mb. They will probably be used in cell phones and other mobile devices. More Memory! Read More...... 02 December 2007 How Hummers Work Introduction to How Hummers Work In 1979, the U.S. Army issued a request for a new vehicle design that could meet demanding standards, including the ability to modify the base vehicle for different missions. Chrysler Defense, Teledyne Continental and AM General submitted design proposals, and after extensive tests and revisions, the Army awarded AM General a $1.2 billion contract to produce their High Mobility Multi-purpose Wheeled Vehicle (HMMWV), better known as the Humvee or Hummer. Hummer base model Photo courtesy AM General The Humvee Base Model. See more hummer pictures. The Hummer plays an integral role in the Army's vehicle fleet. The U.S. Marines, Navy and Air Force also use Hummers in various military operations. AM General first offered a civilian version of the Hummer in 1992. In 1999, GM purchased the right to produce vehicles using the Hummer name, so now there are two lines of Hummers in production -- AM General's military vehicles and GM's civilian Hummers. Hummers have made a huge impact on both military applications and civilian lifestyles. This versatile vehicle seems to embody complex -- and sometimes contradictory -- ideals, from utilitarian workhorse to the ultimate expression of machismo. Even as the military looks to replace HMMWVs as part of its Future Tactical Truck Systems (FTTS) program, the Hummer continues to be a symbol of the U.S. military's presence in combat zones around the world. Video Gallery: Robotic Hummers and Special Perks Manually driving a robotic Hummer to the gas station turns a few heads, including a police officer's. Learn how to get attention at a gas station in this NOVA segment from PBS. Automakers often claim that their vehicles can do more than just get you from point A to point B, and drivers often wish they can push the speedometer on that shiny new sports car over a hundred, but few of them ever get the opportunity -- until now. See how automakers are offering exotic perks in this video from MediaLink. In this article, we'll look at the basic military Hummer and its amazing configurations. We'll examine the civilian models -- officially known as Hummers -- currently on the market. We'll also explore the cultural impact of the Hummer. In the next section, we'll look at the basic military Hummer. Hummer Specs By the 1970s, Army officials were convinced that they needed to upgrade their fleet of ground vehicles. The Jeep, which was the Army's previous general-purpose vehicle, had outlived its versatility and usefulness in the field. They needed a new, adaptable vehicle that could handle the demands of the evolving nature of combat environments. The basic Hummer vehicle is 6 feet tall, 7 feet wide, 15 feet long and weighs 5,200 pounds (2,340 kilograms). AM General used a steel frame with five cross members to support the weight of a vehicle with a payload of up to 2,500 pounds (1,125 kilograms), allowing a gross vehicle weight (GVW) -- the weight of the vehicle, passengers and maximum payload -- of 7,700 pounds (3,465 kilograms). In order to keep the vehicle's total weight at a manageable level, AM General used aluminum to construct the body of the car. The aluminum is strong enough to support heavy armaments or carry troops, yet is able to flex when the Hummer travels over rough ground. carrying troops Joe Raedle/Getty Images Some military Humvees are used as troop transport vehicles. A double A-arm independent suspension in the front and rear with hydraulic shock absorbers allow the Hummer to tackle unforgiving terrain. It also has torque-biasing differentials and four-wheel disc brakes, which give the Hummer the ability to continue moving even when some of the wheels lose contact with the ground. The Hummer is a fully four-wheel drive vehicle -- the engine powers all four wheels at all times. It also has open-differential gears with Torsen differentials. When one wheel begins to slip, it loses torque. The Torsen differential system senses the loss of torque and increases torque to the other wheels. Coupled with the brake traction control system, the Humvee's Torsen differentials give the vehicle incredible off-road capabilities. AM General outfitted the Hummer with military tires, and some Hummers included a central tire inflation system (CTIS). With this system, a driver can adjust tire pressure without leaving his seat. By lowering the pressure in the tires, the driver could increase the Hummer's grip on rough surfaces, which can be handy if you're trying to drive up a steep hill covered in rocks. Higher pressure is better when driving on even surfaces -- it helps maintain a smooth ride. Hummers have a 25-gallon (95-liter) fuel tank and can go about 300 miles (480 kilometers) before needing to refuel -- meaning a basic Hummer gets about 12 miles to the gallon, though heavier Hummer variations are somewhat less efficient. As per the Army's request, all military Hummers run on diesel fuel and have an automatic transmission -- the Army wanted all its vehicles to run on the same fuel system and felt that automatic transmissions would be easier for new trainees to learn quickly. When It Has To Be There Overnight AM General designed Hummers for rapid deployment, including dropping them from low-flying aircraft. A C-130 Hercules transport aircraft can carry three Hummers. The C-5A Galaxy aircraft can carry up to 15. Helicopters can even carry them and deliver the vehicle using a Low Altitude Parachute Extraction System. In theory, the Army can rapidly deploy a fully equipped Hummer to men in the field in a matter of hours. The Hummer has power steering and includes a 12/24-volt electrical system. Either two or four soldiers can sit inside the cab of the vehicle, depending on the variant. According to AM General, the location of the seats on either side of the drive train helps give the Hummer a low center of gravity. The vehicles have powerful combat locks on each of the doors to help keep soldiers safe. Unfortunately, some soldiers have found it impossible to open the doors if the locks are damaged out in the field. To fix this problem, AM General now includes a D-ring on all Hummer doors. The D-ring is a loop of metal attached to the outside of the Hummer's doors and functions as a place to attach a cable or chain. A winch or similar device can pull the cable, forcing the door open and letting soldiers out of the vehicle. That's the lowdown on the basic Hummer. Using this as a starting platform, AM General produced 15 different HMMWV variants. They designed 44 interchangeable Hummer parts, allowing the Army to modify, maintain and repair vehicles with incredible efficiency, economy and flexibility. In the next section, we'll look at some of the variants of the military Hummer. Hummer Models The 15 variations on the basic Hummer model allow the Army to use the same vehicle as a troop or cargo transport, weapons carrier, shelter carrier (a vehicle designed to transport electronic equipment) or ambulance. Some variations look almost identical, while others seem to be completely unrelated. All use the same frame, drive train geometry, suspension and lower body. He Ain't Heavy, He's My Hummer You may recall from the previous section that the basic Hummer weighs a hefty 5,200 pounds (2,340 kilograms) -- that's almost 600 pounds more than a 2007 Ford F-150. Even so, it's a lightweight compared to the monster known as the M1151A1 with B1 armor, a Hummer designed as an armament carrier complete with armor designed to protect the vehicle from ballistic attacks and landmines. This little baby weighs in at a lean 10,300 pounds (4,635 kilograms), but when carrying its full payload, the GVW reaches an incredible 12,100 pounds (5,445 kilograms) -- more than 6 tons! The current 15 variations fall into two different broad categories -- the A2 model series and the Expanded Capacity Vehicle (ECV) models. Nine models are in the A2 series, including the M1097A2 Cargo/Troop Carrier, the M1097A2 Shelter Carrier, the M997A2 Maxi-Ambulance with Basic Armor and the M1045A2 Armament/TOW Missile Carrier with Supplemental Armor. The TOW missile is a tube-launched, optically tracked, wire-guided missile designed to neutralize enemy tanks and aircraft. helicopter carrying hummer Photo courtesy AM General Helicopters can airlift Humvees and transport them into the field. The Army has lots of options when it comes to arming A2 Hummers. Some of the weapons you might find on one include: • A .50 caliber M2HB Machine Gun • The MK 19 40 mm Grenade Machine Gun • A 106mm Recoilless Rife • A Giat 30, M781 Cannon • TOW and TOW II Anti-Aircraft Missile Systems • Milan Anti-Armor Missile System The Army also wanted some vehicles that could carry heavier payloads without a detrimental effect on the cars' mobility. AM General's response was the ECV series. The M1113 ECV is used in special operations missions and as a communications shelter carrier. The M1114 has upgraded ballistic protection and is used in military police and explosive disposal missions. The M1151 is an armament carrier and the M1152 can either be used as a troop carrier or shelter carrier. The M1165 is used as a command and control vehicle. The M1116 is the U.S. Air Force's variation on the Hummer, with a larger cargo area and turret gunner armor. Just like a commercial vehicle, there's some optional equipment you can get on a military Hummer. The options available to both the Hummer and civilian vehicles are air conditioning, special paints, a hard top, central tire inflation system and a winch. Here are a few of the options the military can include that are definitely not available on your average set of wheels: • Troop seats for up to eight soldiers • A deep water (up to 5 feet) fording kit with snorkel • An Arctic kit • A desert filtration package • Pedestal weapons mount • Special Ops configuration International Hummers AM General partners with international defense contractors to develop Hummer-based vehicles like the Eagle and the Cobra for other nations. The Eagle modification is used in surveillance, reconnaissance, escort and police missions. The Cobra is a heavily armored vehicle that can carry up to 11 crewmembers depending on the variant. Both the Eagle and the Cobra can have manually or remotely operated weapons turrets. Photo courtesy AM General The Eagle Photo courtesy AM General The Cobra In the next section, we'll look at how the Hummer invaded the civilian automobile market. Civilian Hummers The American public's awareness of the Hummer really blossomed in 1991 as Operation Desert Storm dominated daily headlines and newscasts. For most Americans, it was the first chance to see the Army's Hummer in action. Many were intrigued by its wide, powerful design, and before long people began to ask AM General if it planned to produce a commercial version of the Hummer. AM General's answer was "yes." H2 hummer Daniel T. Yara, morguefile An H2 Hummer In 1992, AM General began to produce a four-wheel drive vehicle based off the military Hummer. They marketed it as "the world's most serious 4x4." The Hummer shared many of its military cousin’s features, including the brake traction control system that gives the Hummer the ability to adjust torque even when a wheel is completely off the ground. Off-road enthusiasts were overjoyed at the prospect of getting behind the wheel of a car that could tackle courses that would scare a Jeep driver. The car's safety rankings were very high -- but you'd probably expect that from a car originally designed for combat missions. Come With Me If You Want to Live One person who was particularly interested in Hummers was future California governor and former Terminator, Arnold Schwarzenegger. Schwarzenegger's fascination with the vehicle made the news when he first asked AM General to sell him a Hummer. AM General refused to sell a military vehicle to a civilian, but eventually conceded by designing and producing the Hummer. In 1992, Schwarzenegger became the first owner of the civilian Hummer. Civilian Hummers use the same chassis as the military Hummer, and AM General even uses the same manufacturing facilities to build them. From 1992 to 1995, the Hummer used a diesel engine (either a 6.2 or 6.5-liter engine, depending on the year). From 1995 to 1997, AM General experimented by producing a model that used a 5.7-liter gasoline V-8 engine. Unfortunately, the Hummer just weighed too much -- early Hummers weighed in at around 7,000 pounds (3,150 kilograms) -- and AM General went back to using diesel engines after 1997. In 1999, General Motors purchased the right to produce vehicles under the Hummer brand name. AM General would continue to produce the original Hummer, renamed as the H1, under the GM brand name. GM named later models the H2 and H3. Although GM designed the H2, AM General builds the cars in its facilities. General Motors manufactures the Hummer H3 using its own facilities. Hummer Options The Hummer H2 is longer than, but not as wide as the H1, and the H3 is the smallest vehicle under the brand name so far. Even so, you can't describe the H3 as dainty -- it's 85.5 inches (7.1 feet) wide and 186.7 inches (15.6 feet) long. Drivers who love the series find the size empowering, while other drivers often feel intimidated when they encounter such gargantuan vehicles. The Hummer line is not known for its fuel efficiency. Various models of the Hummer H1 reportedly averaged at around 10 miles per gallon [source: Shortnews.com]. Peter Ternes, Hummer's director of global product communications, said that the H2 got 12 miles to the gallon [source: AOL Autos]. The H3 fares the best with 15 mpg city/19 mpg highway. There's also the experimental H2H, a hydrogen-powered Hummer, but because there's no hydrogen fuel infrastructure in the United States, it's not likely to be commercially available soon. Holyfield's hummer Vince Bucci/Getty Images Evander Holyfield's Hummer As the Hummer brand has evolved over the last few years, General Motors has introduced more options catering to customer comfort. The earliest commercial Hummer vehicles were only a little more comfortable than their military Hummer counterparts were. The appeal of the vehicle was in its off-road capabilities, not its style or amenities. The biggest concession to customer comfort was air conditioning, something many military Hummers lack. Current Hummer vehicles have more appealing options like chrome finishing, leather seating, heated windshields, remote keyless entry, power windows and cruise control. You can buy an H3 Hummer with satellite radio and heated seats if you like. Other options cater to rugged outdoorsy types -- winches, off-road hardware, tool kits and trailer hitches are available. As amenities have increased, the price of Hummers has actually gone down. The original Hummer's price was more than $100,000. The first H2 vehicles were also expensive, though now a 2008 H2 Hummer will cost you about $55,500. The H3 is the most affordable model -- a 2008 H3 is priced between $30,000 and $39,000. In the next section, we'll look at how Hummers have impacted our culture. Hummer's Cultural Impact enhancing a hummer Spc. L.B.Edgar, U.S. Army A soldier makes alterations to a Humvee to improve safety conditions . Images and video of Hummers appear nearly every day in reports on the United State's presence in foreign countries like Iraq and Afghanistan. Ever since Desert Storm, the Hummer has been a symbol of the U.S. military. In some cases, critics have pointed out perceived shortcomings in the Hummer's design, mainly focusing on its armor. AM General points out that the Army never demanded extensive armor for its Hummers. AM General does offer basic and supplemental armor for several Hummer models, though these packages only provided limited protection. A direct shot from a relatively powerful rifle could still pierce the armor. Reports of the Hummer's armor limitations give rise to accusations that the equipment sent to our troops overseas isn't sufficient. Many military outfits up-armor their equipment, installing armor plating directly to the vehicle once they receive it. Adding armor to a Hummer increases its weight, which in turn can affect its performance. In some cases, a Hummer may be better armored but less maneuverable, making it a more likely target for enemy fire. Because of these limitations, critics say the Army should focus on other vehicle options like the Stryker vehicle. On the civilian Hummer front, there are other issues. Drivers who enjoy challenging their skills and pushing a vehicle to its limits in off-road courses tend to love Hummer vehicles. A Hummer can scale hills that are insurmountable to most other cars. They can go up steep slopes, drive over objects that would obstruct other vehicles and even plow through up to 30 inches of water without a problem. While Hummers might traverse a difficult obstacle course with relative ease, they face a much more daunting roadblock when it comes to environmentalists and other critics. The Hummers' infamous fuel efficiency -- or lack thereof -- is enough to turn a green-minded person bright red. In California, a state where environmental concerns are prominent in the minds of its citizens, Gov. Schwarzenegger faced criticism for his unabashed love of the vehicles. His involvement during the publicity tour of the H2H hybrid vehicle did little to calm his critics. Schwarzenegger fuels up David McNew/Getty Images California governor and Humvee fan Arnold Schwarzenegger fuels up a hydrogen-powered Hummer. Others see the Hummer as a symbol of American excess and gluttony. A few go so far as to place the blame of the country's foreign policy on the owners of Hummers and other SUVs, claiming that we're involved in conflicts in the Middle East due to our enormous rate of oil consumption. Some people just feel the cars are large, ugly, unwieldy and scary to encounter on the road. A few people even take action: Hundreds of people protested at Hummer dealerships on November 15, 2003 -- a day activists called "National Protest Day Against Hummers" in a fit of creative genius [source: CommonDreams.org]. It seems that growing numbers of Americans are trying to be environmentally conscious. In that environment, the Hummer line of vehicles faces its toughest road yet -- there may come a day when Hummer owners face more than just the scorn of critics. It's ironic that the same vehicle that was a symbol of American heroism, determination and unity in purpose in 1991 has become a divisive symbol both at home and overseas today. Read More...... 01 December 2007 7 Disappearances in the Bermuda Triangle Technorati Profile The Bermuda Triangle, also known as the Devil's Triangle, is an infamous stretch of the Atlantic Ocean bordered by Florida, Bermuda, and Puerto Rico that has been the location of strange disappearances throughout history. The Coast Guard does not recognize the Bermuda Triangle or the supernatural explanations for the mysterious disappearances in its midst. There are some probable explanations for the missing vessels, including hurricanes, undersea earthquakes, and magnetic fields that interfere with compasses and other positioning devices. But it's much more interesting to think the following vessels got sucked into another dimension, abducted by aliens, or simply vanished into thin air. 1. Flight 19 On the afternoon of December 5, 1945, five Avenger torpedo bombers left the Naval Air Station at Fort Lauderdale, Florida, with Lt. Charles Taylor in command of a crew of 13 student pilots. About an hour and a half into the flight, Taylor radioed the base to say that his compasses weren't working, but he figured he was somewhere over the Florida Keys. The lieutenant who received the signal told Taylor to fly north toward Miami, as long as he was sure he was actually over the Keys. Although he was an experienced pilot, Taylor got horribly turned around, and the more he tried to get out of the Keys, the further out to sea he and his crew traveled. Many unexplained disappearances are attributed to strange forces within the Bermuda Triangle. The Bermuda Triangle, located off the US east coast, is the location of many unexplained disappearances. As night fell, radio signals worsened, until, finally, there was nothing at all from Flight 19. A U.S. Navy investigation reported that Taylor's confusion caused the disaster, but his mother convinced them to change the official report to read that the planes went down for "causes unknown." The planes have never been recovered. 2. Flight 201 This Cessna left Fort Lauderdale on March 31, 1984, en route for Bimini Island in the Bahamas, but it never made it. Not quite midway to its destination, the plane slowed its airspeed significantly, but no radio signals were made from the plane to indicate distress. Suddenly, the plane dropped from the air into the water, completely vanishing from the radar. A woman on Bimini Island swore she saw a plane plunge into the sea about a mile offshore, but no wreckage has ever been found. Airplanes flying from the US, Great Britain and Bermuda have all fallen somewhere in the Bermuda Triangle. Read on to find out more about these fateful flights. These ill-fated flights have fallen victim to the mysterious powers of the Bermuda Triangle. Find out how these planes were never heard from again. 3. USS Cyclops As World War I heated up, America went to battle. The Cyclops, commanded by Lt. G. W. Worley, stayed mostly on the East Coast of the United States until 1918 when it was sent to Brazil to refuel Allied ships. With 309 people onboard, the ship left Rio de Janeiro in February and reached Barbados in March. After that, the Cyclops was never heard from again. The Navy says in its official statement, "The disappearance of this ship has been one of the most baffling mysteries in the annals of the Navy, all attempts to locate her having proved unsuccessful. There were no enemy submarines in the western Atlantic at that time, and in December 1918 every effort was made to obtain from German sources information regarding the disappearance of the vessel." 4. Star Tiger The Star Tiger, commanded by Capt. B. W. McMillan, was flying from England to Bermuda in January 1948. On January 30, McMillan said he expected to arrive in Bermuda at 5:00 a.m., but neither he nor any of the 31 people onboard the Star Tiger were ever heard from again. When the Civil Air Ministry launched a search and investigation, they learned that the S.S. Troubadour had reported seeing a low-flying aircraft halfway between Bermuda and the entrance to Delaware Bay. If that aircraft was the Star Tiger, it was drastically off course. According to the Civil Air Ministry, the fate of the Star Tiger remains an unsolved mystery. 5. Star Ariel A Tudor IV aircraft like the Star Tiger left Bermuda on January 17, 1949, with 7 crew members and 13 passengers en route to Jamaica. That morning, Capt. J. C. McPhee reported that the flight was going smoothly. Shortly afterward, another more cryptic message came from the captain, when he reported that he was changing his frequency, and then nothing more was heard, ever. More than 60 aircraft and 13,000 men were deployed to look for the Star Ariel, but not even a hint of debris or wreckage was ever found. After the Ariel disappeared, Tudor IVs were no longer produced. 6. The Spray Joshua Slocum, the first man to sail solo around the world, never should have been lost at sea, but it appears that's exactly what happened. In 1909, the Spray left the East Coast of the United States for Venezuela via the Caribbean Sea. Slocum was never heard from or seen again and was declared dead in 1924. The ship was solid and Slocum was a pro, so nobody knows what happened. Perhaps he was felled by a larger ship or maybe he was taken down by pirates. No one knows for sure that Slocum disappeared within Triangle waters, but Bermuda buffs claim Slocum's story as part of the legacy of the Devil's Triangle. 7. Teignmouth Electron Who said that the Bermuda Triangle only swallows up ships and planes? Who's to say it can't make a man go mad, too? Perhaps that's what happened on the Teignmouth Electron in 1969. The Sunday Times Golden Globe Race of 1968 left England on October 31 and required each contestant to sail his ship solo. Donald Crowhurst was one of the entrants, but he never made it to the finish line. The Electron was found abandoned in the middle of the Bermuda Triangle in July 1969. Logbooks recovered from the ship reveal that Crowhurst was deceiving organizers about his position in the race and going a little nutty out there in the big blue ocean. The last entry of his log was dated June 29 -- it is believed that Crowhurst jumped overboard and drowned himself in the Triangle. Read More...... 30 November 2007 How Bluetooth Works Technorati Profile Introduction to How Bluetooth Works Photo courtesy DealTime Jabra FreeSpeak BT250 Bluetooth headset. Check out our mobile technology image gallery. There are lots of different ways that electronic devices can connect to one another. For example: • Component cables • Electrical wires • Ethernet cables • WiFi • Infrared signals When you use computers, entertainment systems or telephones, the various pieces and parts of the systems make up a community of electronic devices. These devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams, and an even greater variety of connectors, plugs and protocols. The art of connecting things is becoming more and more complex every day. In this article, we will look at a method of connecting devices, called Bluetooth, that can streamline the process. A Bluetooth connection is wireless and automatic, and it has a number of interesting features that can simplify our daily lives. How Bluetooth Creates a Connection Bluetooth takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to save battery power. Picture this: You're on your Bluetooth-enabled cell phone, standing outside the door to your house. You tell the person on the other end of the line to call you back in five minutes so you can get in the house and put your stuff away. As soon as you walk in the house, the map you received on your cell phone from your car's Bluetooth-enabled GPS system is automatically sent to your Bluetooth-enabled computer, because your cell phone picked up a Bluetooth signal from your PC and automatically sent the data you designated for transfer. Five minutes later, when your friend calls you back, your Bluetooth-enabled home phone rings instead of your cell phone. The person called the same number, but your home phone picked up the Bluetooth signal from your cell phone and automatically re-routed the call because it realized you were home. And each transmission signal to and from your cell phone consumes just 1 milliwatt of power, so your cell phone charge is virtually unaffected by all of this activity. Bluetooth is essentially a networking standard that works at two levels: • It provides agreement at the physical level -- Bluetooth is a radio-frequency standard. • It provides agreement at the protocol level, where products have to agree on when bits are sent, how many will be sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message sent. Photo courtesy Bluetooth SIG Bluetooth wireless PC card The big draws of Bluetooth are that it is wireless, inexpensive and automatic. There are other ways to get around using wires, including infrared communication. Infrared (IR) refers to light waves of a lower frequency than human eyes can receive and interpret. Infrared is used in most television remote control systems. Infrared communications are fairly reliable and don't cost very much to build into a device, but there are a couple of drawbacks. First, infrared is a "line of sight" technology. For example, you have to point the remote control at the television or DVD player to make things happen. The second drawback is that infrared is almost always a "one to one" technology. You can send data between your desktop computer and your laptop computer, but not your laptop computer and your PDA at the same time. (See How Remote Controls Work to learn more about infrared communication.) These two qualities of infrared are actually advantageous in some regards. Because infrared transmitters and receivers have to be lined up with each other, interference between devices is uncommon. The one-to-one nature of infrared communications is useful in that you can make sure a message goes only to the intended recipient, even in a room full of infrared receivers. Bluetooth is intended to get around the problems that come with infrared systems. The older Bluetooth 1.0 standard has a maximum transfer speed of 1 megabit per second (Mbps), while Bluetooth 2.0 can manage up to 3 Mbps. Bluetooth 2.0 is backward-compatible with 1.0 devices. Let's find out how Bluetooth networking works. How Bluetooth Operates Bluetooth networking transmits data via low-power radio waves. It communicates on a frequency of 2.45 gigahertz (actually between 2.402 GHz and 2.480 GHz, to be exact). This frequency band has been set aside by international agreement for the use of industrial, scientific and medical devices (ISM). A number of devices that you may already use take advantage of this same radio-frequency band. Baby monitors, garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. Making sure that Bluetooth and these other devices don't interfere with one another has been a crucial part of the design process. One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of about 1 milliwatt. By comparison, the most powerful cell phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth device to about 10 meters (32 feet), cutting the chances of interference between your computer system and your portable telephone or television. Even with the low power, Bluetooth doesn't require line of sight between communicating devices. The walls in your house won't stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms. Bluetooth can connect up to eight devices simultaneously. With all of those devices in the same 10-meter (32-foot) radius, you might think they'd interfere with one another, but it's unlikely. Bluetooth uses a technique called spread-spectrum frequency hopping that makes it rare for more than one device to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it’s unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second. When Bluetooth-capable devices come within range of one another, an electronic conversation takes place to determine whether they have data to share or whether one needs to control the other. The user doesn't have to press a button or give a command -- the electronic conversation happens automatically. Once the conversation has occurred, the devices -- whether they're part of a computer system or a stereo -- form a network. Bluetooth systems create a personal-area network (PAN), or piconet, that may fill a room or may encompass no more distance than that between the cell phone on a belt-clip and the headset on your head. Once a piconet is established, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that may be operating in the same room. Let's check out an example of a Bluetooth-connected system. Bluetooth Piconets Let’s say you have a typical modern living room with typical modern stuff inside. There’s an entertainment system with a stereo, a DVD player, a satellite TV receiver and a television; there's also a cordless telephone and a personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral. The cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer has programmed each unit with an address that falls into a range of addresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a particular range. Since the handset has an address in the range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since it’s not from within the network. The computer and entertainment system go through similar routines, establishing networks among addresses in ranges established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the piconets are completely separated from one another. Now the living room has three separate networks established, each one made up of devices that know the address of transmitters it should listen to and the address of receivers it should talk to. Since each network is changing the frequency of its operation thousands of times a second, it’s unlikely that any two networks will be on the same frequency at the same time. If it turns out that they are, then the resulting confusion will only cover a tiny fraction of a second, and software designed to correct for such errors weeds out the confusing information and gets on with the network’s business. Flexible Transmission Most of the time, a network or communications method either works in one direction at a time, called half-duplex communication, or in both directions simultaneously, called full-duplex communication. A speakerphone that lets you either listen or talk, but not both, is an example of half-duplex communication, while a regular telephone handset is a full-duplex device. Because Bluetooth is designed to work in a number of different circumstances, it can be either half-duplex or full-duplex. The cordless telephone is an example of a use that will call for a full-duplex (two-way) link, and Bluetooth can send data at more than 64 kilobits per second (Kbps) in a full-duplex link -- a rate high enough to support several voice conversations. If a particular use calls for a half-duplex link -- connecting to a computer printer, for example -- Bluetooth can transmit up to 721 Kbps in one direction, with 57.6 Kbps in the other. If the use calls for the same speed in both directions, Bluetooth can establish a link with 432.6-Kbps capacity in each direction. Bluetooth Security In any wireless networking setup, security is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals aren't intercepted. Bluetooth technology is no different -- it's wireless and therefore susceptible to spying and remote access, just like WiFi is susceptible if the network isn't secure. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission. Bluetooth offers several security modes, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget. In almost all cases, Bluetooth users can establish "trusted devices" that can exchange data without asking permission. When any other device tries to establish a connection to the user's gadget, the user has to decide to allow it. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use of Bluetooth services to the registered user and require that users make a conscious decision to open a file or accept a data transfer. As long as these measures are enabled on the user's phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to "non-discoverable" and avoid connecting with other Bluetooth devices entirely. If a user makes use of the Bluetooth network primarily for synching devices at home, this might be a good way to avoid any chance of a security breach while in public. Still, early cell-phone virus writers have taken advantage of Bluetooth's automated connection process to send out infected files. However, since most cell phones use a secure Bluetooth connection that requires authorization and authentication before accepting data from an unknown device, the infected file typically doesn't get very far. When the virus arrives in the user's cell phone, the user has to agree to open it and then agree to install it. This has, so far, stopped most cell-phone viruses from doing much damage. See How Cell-phone Viruses Work to learn more. Other problems like "bluejacking," "bluebugging" and "Car Whisperer" have turned up as Bluetooth-specific security issues. Bluejacking involves Bluetooth users sending a business card (just a text message, really) to other Bluetooth users within a 10-meter (32-foot) radius. If the user doesn't realize what the message is, he might allow the contact to be added to his address book, and the contact can send him messages that might be automatically opened because they're coming from a known contact. Bluebugging is more of a problem, because it allows hackers to remotely access a user's phone and use its features, including placing calls and sending text messages, and the user doesn't realize it's happening. The Car Whisperer is a piece of software that allows hackers to send audio to and receive audio from a Bluetooth-enabled car stereo. Like a computer security hole, these vulnerabilities are an inevitable result of technological innovation, and device manufacturers are releasing firmware upgrades that address new problems as they arise. To learn more about Bluetooth security issues and solutions, see Bluetooth.com: Wireless Security. The World Blogger Read More...... Can't Robots Get a Break? Science fiction author Isaac Asimov created the three laws of robotics in his short story "Runaround." But these are mainly aimed at protecting humans from robots. Do robots have rights, too? Asimov's Three Laws of Robotics But what happens if robots become a large part of society? How will people treat them? Will humans hold themselves superior to their creations? Will they balk at the idea of robots taking the place of one of the partners in a romantic relationship? Many roboticists believe that now is the time to begin thinking about the moral and ethical questions posed by humanity's development of robots. South Korea, after all, plans to have a robot in every house by 2020. This is a far cry from the chicken in every pot envisioned by Herbert Hoover's campaign during the 1928 United States presidential election. It's a good thing, then, that South Korea is at the forefront of thinking about robot ethics. In fact, the country announced in March 2007 that it had assembled a panel to develop a Robot Ethics Charter, a set of guidelines for future robotic programming. It will deal with the human aspects of human-robot interaction -- like safeguards against addiction to robot sex -- as well as explore ways to protect humans and robots from suffering abuse at the hands of one another [source: National Geographic]. Human and robot counterpart Courtesy Yoshikazu Tsuno/AFP/Getty Images As robots become more life-like, the challenges of integrating them into human society are expected to increase. The South Koreans aren't the only ones who are thinking about robots' rights. In 2006, future robot issues were brought up as part of a conference on the future commissioned by the British government. Among the issues discussed were the potential need for government-subsidized healthcare and housing for robots, as well as robots' role in the military [source: BBC]. These considerations do not need to be addressed immediately, but as robots become increasingly life-like, these issues will almost certainly come into play. Designers are already working on robotic skin that can produce life-like facial expressions. Others are developing robots that can hold conversations and mimic human emotions. It may be very difficult for many people to overcome the idea of a human-robot couple. In 1970, Dr. Masahiro Mori wrote an article for Energy magazine in which he describes the "uncanny valley," a phenomenon where people grow uncomfortable with technological beings the more human-like they become. People build robots that have human qualities to help them complete human tasks, but once these robots start to look and act like humans, people start to be turned off by them [source: Mori]. With these and other features, robots of the future will present a great many challenges as they integrate into human society. And in the face of such challenges, perhaps the idea of human-robot marriages isn't so scandalous after all. That is, if the robot is just as willing to get married as the human. Read More......
Building successful technology clusters Even if you’ve never heard the term “technology cluster” before, you are most likely already familiar with the most influential cluster in the United States: Silicon Valley. If you’re familiar with the Oregon startup scene, the influence of Silicon Valley is fairly obvious: Portland’s “Silicon Forest” and Eugene’s “Silicon Shire” are clear attempts to mimic the success of that region of the country. But what made that region so successful? Can it be replicated somewhere else? Silicon Valley is a famous demonstration of the cluster effect: a few companies specializing in computer hardware and software were founded in close proximity to each other. As they grew, they began attracting additional companies and talent to the region. Soon, investment capital followed, which quickly attracted new companies and then more talent to the area. What we forget, though, is that Silicon Valley didn’t exist at one point. Independent entrepreneurs founded the area, and, through their work, it grew it the economic force it is today. What are technology clusters? Technology clusters, also referred to as industry or innovation clusters, are an important part of organizing and understanding the economic activity in a region. A regional technology cluster represents a geographic concentration of interconnected companies and institutions in a particular field. Common components include a variety of small or startup companies, a few mid-sized firms, one or two large companies, and often research universities and other governmental organizations. Although we often thing of them in terms of “high tech” software or computing, the term “technology cluster” can refer to any group of companies working on the leading edge of their field and competing using the most sophisticated tools available.  Tech clusters can form in industries ranging from food production and brewing to game development and biotechnology. Key components of a successful technology cluster Let’s take a look at five important components needed to develop a successful cluster. 1) Entrepreneurial density A successful cluster needs to reach a critical mass of interconnected companies, entrepreneurs, and expertise in a particular field before it can begin attracting outside talent and investment. Reaching this critical mass takes time: entrepreneurs must understand the advantages of choosing your region over national clusters (Silicon Valley and New York City) and over other regional clusters (Portland or Seattle). 2) A local university Almost every successful technology cluster has access to a local university that can provide research, workforce training, and resources to support the needs of the growing clusters. In Eugene, we are fortunate to have both the University of Oregon and the Lane Community College system as resources to support technical and entrepreneurial education in our community. 3) Resident early-stage seed funding Growing companies need access to seed funding to survive. Without it, startups will either move away or die shortly after they launch. Most importantly, this funding must come from angel networks and investors within the community before outside firms will start to consider investing in local companies. 4) Local entrepreneurial community events The entrepreneurial community must be active and involved in supporting the growth of new startups in the region. Part of this activity should include events geared towards entrepreneurial education to help build resident entrepreneurial expertise. Local events like Startup Weekend Eugene, SmartUps, and the ID8 Incubator Program help train entrepreneurs. Other important community events, including networking sessions, informal meetups, and events like the recent HP Hackathon and the Eugene Indie Game Conference help entrepreneurs connect with each other and develop new collaborations. 5) Community Support and Vision Arguably both the simplest and most difficult to achieve, the entire community must begin to recognize its strengths and areas where it can compete on a global market. Just like evaluating your company’s business model, the region must start to identify and refine its value proposition to the rest of the country. Building for the future As we look ahead to the new year, it is time for us to begin considering areas of opportunity in Eugene. What resources do we have? What makes the city a unique place to build and launch a company? How can we build organized clusters that will attract new entrepreneurs and investments to the region? Share your ideas and comments below, or join us on twitter: @eugenerain.
Selene was the former Titaness of the Moon, Night, and Radiance. She was essentially the moon personified as a divine being (like Helios for the sun). Her Roman counterpart was Luna. First Titan War and Typhon Selene and Helios remained neutral during the Titanomachy as long as they got to retain their positions no matter the outcome. For this reason, they were among the few Titans not to be banished to Tartarus.[1] Typhon, whom Selene battled with her moon chariot When the monster Typhon rose to destroy Mount Olympus and the gods, Selene rode into battle with her moon chariot and fought bravely against the storm giant. Ultimately, her attempts were unsuccessful. According to the myths, her wounds in the battle are seen as the craters on the moon to this day.[2] Artemis, Selene's successor When western civilization shifted to Rome, the worship of Helios and Selene was neglected. As a result, the Titan twins faded. While Apollo inherited Helios' duties as god of the sun, his sister Artemis in turn received the moon chariot and became goddess of the moon in Selene's absence. Percy Jackson and the Olympians The Titan's Curse Helios was the first sun god, and Selene was the first moon goddess. Apollo claimed that due to the the Romans neglecting them, Helios and Selene were forced to give up their roles. and pass them on to Apollo and his sister Artemis. Helios and Selene faded, and Artemis and Apollo took their roles as the Moon and Sun respectively. Unlike her brother Helios, Selene was not as "flashy" and mostly kept to herself as she drove the moon chariot across the sky at night.[3] • She possessed the standard powers of a Titan. • Prowess in Battle: Selene bravely fought against Typhon, though - like the other gods - she was ultimately defeated. • Photokinesis: As the Titaness of the Moon, she had divine authority and absolute control over light. • Selene is also seen as a goddess of the night, radiance, childbirth and insanity. • According to some sources, Selene and Endymion were the parents of the famed Narcissus, the very handsome youth who spurned the affections of those who were attracted to him and was cursed to fall in love with his reflection. • The chemical element selenium is named after her. • The term "lunacy" was named after her Roman incarnation Luna, since it was thought that a full moon rendered people insane. • Selene, a species of fish, is named after her. • In modern times, Selene is the root of "selenology", the study of the geology of the moon. • The meaning of her name is uncertain but some believe that means "brightness." • The dog, hen, bull, and rooster were her sacred animals. • The name of her Roman form, Luna, literally means "moon" in Latin. • The famous Cleopatra VII named her only daughter after Selene: Cleopatra Selene. • Selene has a lot in common with Artemis. The only major differences are that Artemis is a goddess and Selene was a Titaness and that Artemis is a virgin goddess while Selene was not. According to Greek Mythology Selene was the mother of three daughters by Zeus; Pandeia, Herse, and Nemea. To Endymion, Selene bore fifty daughters called the Menae symbolizing the fifty lunar months in an Olympiad. 1. Percy Jackson's Greek Gods: The Olympians Bash Some Heads 2. Percy Jackson's Greek Gods: Zeus Kills Everyone 3. Percy Jackson's Greek Gods: The Golden Age of Cannibalism
Home > Virtual Memory > Virtuale Memory Virtuale Memory If you don’t want Windows to automatically manage the page file, you have the following options: You can move the page file to a different volume if you have more than You can see the page file in a Windows Explorer win¬dow if you configure Windows to show hidden and system files; look for Pagefile.sys in the root of your system drive. In addition, privileged code can temporarily make an address space unswappable With a SYSEVENT Supervisor Call instruction (SVC); certain changes[21] in the address space properties require that the OS swap it Yükleniyor... Çalışıyor... his comment is here Swapping (also called paging) is the process the OS uses to move data between RAM and virtual memory. That is, it's first byte must be at an address divisible by 2k. Page Tables How is an address translated from virtual to physical? If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. https://en.wikipedia.org/wiki/Virtual_memory Virtual Memory In Operating System Every program uses a range of addressed called the address space. Hyper-convergence meets private cloud platform requirements SearchDisasterRecovery A guide to a better cloud disaster recovery plan Disaster recovery as a service has fast become an ideal way for enterprises to tap Oturum aç Paylaş Daha fazla Bildir Videoyu bildirmeniz mi gerekiyor? Set it free! In IBM's operating systems for System/370 and successor systems, the term is "fixed", and such pages may be long-term fixed, or may be short-term fixed, or may be unfixed (i.e., pageable). All Rights Reserved. Memory is the computer's workspace, and since there is often a hundred times more disk space than memory space, virtual memory dramatically increases the computer's capacity to do work. Virtual Memory Tutorial Oturum aç Çeviri Yazısı 82.663 görüntüleme 635 Bu videoyu beğendiniz mi? This extra memory is actually called virtual memory and it is a section of a hard disk that's set up to emulate the computer's RAM. Kapat Evet, kalsın. If the valid bit is 0, the page is not in RAM, and the 20 bit physical page is meaningless. History In the 1940s and 1950s, all larger programs had to contain logic for managing primary and secondary storage, such as overlaying. core A processing unit within a CPU. Virtual Memory Paging This address space can be changed dynamically. bit The smallest unit of data in computing represented by a 1 in binary. By default, Windows creates a single page file and manages its size. How Virtual Memory Works If, for example, you have a single hard disk that contains volumes C, D, and E, splitting the page file over two or more of these volumes, might actually make your http://www.bbc.co.uk/education/guides/zmb9mp3/revision/8 See also: transparent page sharing, memory ballooning This was last updated in August 2014 Continue Reading About virtual memory Find virtual memory management techniques in this guide How virtual memory allocation Virtual Memory In Operating System Of course, RAM doesn't distinguish between the two kinds of addresses. Virtual Memory In Computer Architecture The default maximum size is three times the amount of RAM, regardless of how much physical RAM is installed. ISBN0-86720-474-5. ^ Sayre, D. (1969). "Is automatic "folding" of programs efficient enough to displace manual?". this content However, some CPU designers make larger TLBs that are direct mapped or set associative. Personal computers in the 1980s did not use virtual memory. MIT Press. Virtual Memory Example Unsourced material may be challenged and removed. (December 2010) (Learn how and when to remove this template message) Nearly all implementations of virtual memory divide a virtual address space into pages, ISBN0-262-15012-3. ^ The most important requirement is that the program be APF authorized. ^ E.g., requesting use of preferred memory ^ "Control swapping (DONTSWAP, OKSWAP, TRANSWAP)". Address translation hardware in the CPU, often referred to as a memory management unit or MMU, automatically translates virtual addresses to physical addresses. http://wppluginmarket.com/virtual-memory/virtual-memory-off.html The first Atlas was commissioned in 1962 but working prototypes of paging had been developed by 1959.[3](p2)[6][7] In 1961, the Burroughs Corporation independently released the first commercial computer with virtual memory, Yes No Do you like the page design? Why Is Virtual Memory Needed The Currently Allocated num¬ber near the bottom of the dialog box shows how large the file is. There should be, at most, one match. Thus, address tranlation is occuring all the time. Write the new page in the frame of free pool, mark the page table and restart the process. There may be issues of synchronization to handle, but that's a topic that's best left to a course in operating systems. Advantages Of Virtual Memory Multics used the term "wired". An inverted page table takes longer to access because you may have collisions, but it takes up a lot less memory. In computing, virtual memory is a memory management technique that is implemented using both hardware and software. David Black-Schaffer 33.540 görüntüleme 6:31 14 video Tümünü oynat Virtual MemoryDavid Black-Schaffer Introduction to cache memory - Süre: 14:10. http://wppluginmarket.com/virtual-memory/virtual-memory-pc.html In this video tutorial, Mike Callahan explains how virtual memory works in the Windows 7 operating system.
Category: The Digestive System What Is The Digestive System 0 What Is The Digestive System The digestive system consists of the Alimentary Canal and various other organs whose primary function is to support the digestive system. The Alimentary Canal is a long tube about 10 meters long, which begins... What is Digestion 0 What is Digestion Eating (and drinking) are the taking in (swallowing) of food and other nourishing material by the body. That is, eating is the range of processes by which an organism takes in food. Digestion is... Digestive System Facts 0 Digestive System Facts The human digestive system is the parts of the body that are involved in turning food and drink into smaller molecules that can be absorbed into the bloodstream and carried by cells to other...
Home Page Greenfield Primary School Welcome to our new school website!!! It's the holidays... ...but don't worry, there are still lots of games you can play to keep your brain ticking over until we come back to school! Why not -  1. Visit the library and choose a new book to read 2. Go into the countryside and build a den 3. Check out these fun maths games - 4. Write an adventure story 5. Go for a walk and try and spot signs that Spring is here! 6. Write Mrs Newark a poem about spring using adjectives and rhyming words Don't forget your homework too!  One of your literacy challenges is to learn a riddle to perform to the class.  Test your brains with this tricky riddle... What am I? I sleep by day. I fly by night. I have no feathers to aid my flight. What am I? (answer = a bat)
Gauss and Weber, telegraph inventors Gauss and Weber, telegraph inventors C019/6897 Rights Managed Request low-res file 530 pixels on longest edge, unwatermarked Request/Download high-res file Uncompressed file size: 52.5MB Downloadable file size: 6.1MB Price image Pricing Please login to use the price calculator Caption: Gauss and Weber, telegraph inventors. At left is German mathematician Carl Friedrich Gauss (1777-1855). Gauss worked in areas such as number theory, analysis, differential geometry, geodesy, electrostatics, astronomy, and optics. At right is German physicist Wilhelm Eduard Weber (1804-1891) who worked on acoustics and wave theories. Gauss and Weber worked together in 1833 on the first electromagnetic telegraph, which connected the observatory (where Gauss worked) with the institute for physics (where Weber worked) in Gottingen, Germany. Artwork from 'History of the Institution of Electrical Engineers 1871-1931' (Appleyard, 1939). Keywords: 1800s, 1939, 19th century, 2, adult, artwork, black-and-white, carl friedrich gauss, carl gauss, caucasian, communication, communications, duo, electrical engineer, electrical engineering, electromagnetic, electromagnetism, engineer, engineering, european, first, german, germany, gottingen, greek inscription, head and shoulders, historical, history, history of the institution of electrical engineers 1871-1931, human, iee, illustration, inventor, inventors, laurel wreath, male, man, mathematical, mathematician, mathematics, monochrome, pair, people, person, physical, physicist, physics, portrait, profile, rollo appleyard, scientist, scientists, side view, technological, technology, telecommunication, telecommunications, telegraph, telegraphic, telegraphy, two, wilhelm eduard weber, wilhelm weber, wreaths
AUSTRALIAN GEOGRAPHY FREEBIE - mapping activity related to Australian State and Territory colours. Great resource for colour coding the states and territories of Australia. Fun and easy activity to gain and keep students attention when learning about the states and territories. Australian animals word search Australian animals word search - I like this as a reminder that something as simple as a word search can be a fun way to familiarise students with different animals possum morning tea Possum Morning Tea Create a magical possum morning tea for the kids without hours of preparation (inspired by the book Possum Magic) Little Priorities: Mem Fox Comprehension Freebies This is the second year we have taught Australia in our first grade rooms! Each grade teac. Possum Magic {book by Mem Fox} Activities This has been sitting on hold for about two months. Somehow - St Patrick's Day, Earth Day, Easter, working and stuff made me forget abou. More ideas
Emperor Huizong of Song Last updated on 20 September 2017 Emperor Huizong of Song (7 June 1082 – 4 June 1135), personal name Zhao Ji, was the eighth emperor of the Song dynasty in China. He is also a very well-known calligrapher. Born as the 11th son of Emperor Shenzong, he ascended the throne in 1100 upon the death of his elder brother and predecessor, Emperor Zhezong, because Emperor Zhezong's only son died prematurely. He lived in luxury, sophistication and art in the first half of his life. In 1126, when the Jurchen-led Jin dynasty invaded the Song dynasty during the Jin–Song Wars, Emperor Huizong abdicated and passed on his throne to his eldest son, Emperor Qinzong, while he assumed the honorary title of Taishang Huang (or "Retired Emperor"). The following year, the Song capital, Bianjing, was conquered by Jin forces in an event historically known as the Jingkang Incident. Emperor Huizong, along with Emperor Qinzong and the rest of their family, were taken captive by the Jurchens and brought back to the Jin capital, Huining Prefecture in 1128. The Jurchen ruler, Emperor Taizong, gave the former Emperor Huizong a title, Duke Hunde (literally "Besotted Duke"), to humiliate him. Emperor Huizong died in Wuguocheng after spending about nine years in captivity. Despite his incompetence in rulership, Emperor Huizong was known for his promotion of Taoism and talents in poetry, painting, calligraphy and music. He sponsored numerous artists at his imperial court, and the catalogue of his collection listed over 6,000 known paintings.[1] Emperor Huizong of Song.png Emperor Huizong of Song.png Emperor Huizong, besides his partaking in state affairs that favoured the reformist party that supported Wang Anshi's New Policies, was a cultured leader who spent much of his time admiring the arts. He was a collector of paintings, calligraphy, and antiques of previous dynasties, building huge collections of each for his amusement. He wrote poems of his own, was known as an avid painter, created his own calligraphy style, had interests in architecture and garden design, and even wrote treatises on medicine and Taoism.[2] He assembled an entourage of painters that were first pre-screened in an examination to enter as official artists of the imperial court, and made reforms to court music.[2] Like many learned men of his age, he was quite a polymath personality, and is even considered to be one of the greatest Chinese artists of all time. However, his reign would be forever scarred by the decisions made (by counsel he received) on handling foreign policy, as the end of his reign marked a period of disaster for the Song Empire. Jurchen invasion Emperor Huizong neglected the military, and the Song dynasty became increasingly weak and at the mercy of foreign invaders, despite his recasting of the symbolic Nine Tripod Cauldrons in 1106 in an attempt to assert his authority.[3] When the Jurchens founded the Jin dynasty and attacked the Khitan-led Liao dynasty to the north of the Song, the Song dynasty allied with the Jin dynasty and attacked the Liao from the south. This succeeded in destroying the Liao, a longtime enemy of the Song. However, an enemy of the even more formidable Jin dynasty was now on the northern border. Not content with the annexation of the Liao domain, and perceiving the weakness of the Song army, the Jurchens soon declared war on their former ally, and by the beginning of 1126 the troops of the Jin "Western Vice-Marshal" Wolibu crossed the Yellow River and came in sight of Bianjing, the capital of the Song Empire. Stricken with panic, Emperor Huizong abdicated on 18 January 1126 in favour of his son, now known as Emperor Qinzong (欽宗), and departed the capital.[4] Momohatozu Huizong.JPG Pigeon on a Peach Branch, by Emperor Huizong Overcoming the walls of Bianjing was a difficult undertaking for the Jurchen cavalry, and this, together with fierce resistance from some Song officials who had not totally lost their nerve, as Emperor Huizong had, resulted in the Jurchens lifting the siege of Bianjing and returning north. The Song Empire, however, had to sign a humiliating treaty with the Jin Empire, agreeing to pay a colossal war indemnity and to give a tribute to the Jurchens every year. From 1126 until 1138, refugees from the Song Empire migrated south towards the Yangtze River valley.[5] But even such humiliating terms could not save the Song dynasty. Within a matter of months, the troops of both Jurchen vice-marshals, Wolibu and Nianhan,[6] were back south again, and this time they were determined to overcome the walls of Bianjing. After a bitter siege, the Jurchens eventually entered Bianjing on 9 January 1127, and many days of looting, rapes, and massacre followed. Emperor Huizong, his son Emperor Qinzong, as well as the entire imperial court and harem were captured by the Jurchens in an event known historically as the Jingkang Incident, and transported north, mostly to the Jin capital of Shangjing (in present-day Harbin). One of the sons of Emperor Huizong managed to escape to southern China where, after many years of struggle, he would establish the Southern Song dynasty, of which he was the first ruler, Emperor Gaozong. Emperors Huizong and Qinzong were demoted to the rank of commoners by the Jurchens on 20 March 1127. Then on 10 May 1127, Emperor Huizong was deported to Heilongjiang, where he spent the last eight years of his life as a captive. In a humiliating episode, in 1128 the two former Song emperors had to venerate the Jin ancestors at their shrine in Shangjing, wearing mourning dress.[7] The Jurchen ruler, Emperor Taizong, granted the two former Song emperors degrading titles to humiliate them: Emperor Huizong was called "Duke Hunde" (昏德公; literally "Besotted Duke") while Emperor Qinzong was called "Marquis Chonghun" (重昏侯; literally "Doubly Besotted Marquis").[7] In 1137, the Jin Empire formally notified the Southern Song Empire about the death of their former Emperor Huizong.[7] Emperor Huizong, who had lived in opulence and art for the first half of his life, died a broken man in faraway northern Heilongjiang in June 1135, at the age of 52. A few years later (1141), as the peace negotiations leading up to the Treaty of Shaoxing between the Jin and the Song empires were proceeding, the Jin Empire posthumously honored the former Emperor Huizong with the neutral-sounding title of "Prince of Tianshui Commandery" (天水郡王), after a commandery in the upper reaches of the Wei River. Art, calligraphy, music, and culture Chong Ning Tongbao 1.JPG Emperor Huizong's calligraphy "Chong Ning Tongbao" Emperor Huizong was a great painter, poet, and calligrapher. He was also a player of the guqin (as exemplified by his famous painting 聽琴圖 Listening to the Qin); he also had a Wanqin Tang (萬琴堂; "10,000 Qin Hall") in his palace. The emperor took huge efforts to search for art masters. He established the "Hanlin Huayuan" (翰林畫院; "Hanlin imperial painting house") where top painters around China shared their best works. The primary subjects of his paintings are birds and flowers. Among his works is Five-Colored Parakeet on Blossoming Apricot Tree. He also recopied Zhang Xuan's painting Court Ladies Preparing Newly Woven Silk, and Emperor Huizong's reproduction is the only copy of that painting that survives today. Emperor Huizong invented the "Slender Gold" (瘦金體) style of calligraphy. The name "Slender Gold" came from the fact that the emperor's writing resembled gold filament, twisted and turned. One of the emperor's era names, Xuanhe, is also used to describe a style of mounting paintings in scroll format. In this style, black borders are added between some of the silk planes. In 1114, following a request from the Goryeo ruler Yejong, Emperor Huizong sent to the palace in the Goryeo capital at Gaeseong a set of musical instruments to be used for royal banquet music. Two years later, in 1116, he sent another, even larger gift of musical instruments (numbering 428 in total) to the Goryeo court, this time yayue instruments, beginning that nation's tradition of aak.[8] Emperor Huizong was also a great tea enthusiast. He wrote the Treatise on Tea, the most detailed and masterful description of the Song sophisticated style of tea ceremony. Meister nach Chang Hs%C3%BCan 001.jpg Emperor Huizong of Song, Ladies making silk, (a remake of an 8th-century original by artist Zhang Xuan) Emperor Huizong of Song, Ting Qin Tu (Chinese: , literally "Listening to the Qin" Emperor Huizong of Song (Poem and Calligraphy) Emperor Huizong of Song, Plum and Birds Emperor Huizong of Song, Golden Pheasant and Cotton Rose Flowers Emperor Huizong of Song, Dragon Stone Emperor Huizong of Song, Cranes 1112 Emperor Huizong of Song, Classic Thousand-character Grass script Titles from birth • Prince of Suining Commandery (遂寧郡王) • Prince of Duan (端王) • Emperor • Emperor Jiaozhu Daojun (教主道君皇帝) • Duke Hunde (昏德公) • Prince of Tiansui Commandery (天水郡王) See also 1. ^ Ebrey, Cambridge, 149. 2. ^ a b Ebrey, 165. 3. ^ Book of Song – Scroll 66 4. ^ Frederick W. Mote (2003). Imperial China: 900-1800. Harvard University Press. p. 53. ISBN 978-0-674-01212-7. 5. ^ Robert Hymes (2000). John Stewart Bowman, ed. Columbia Chronologies of Asian History and Culture. Columbia University Press. p. 33. ISBN 978-0-231-11004-4. 6. ^ Tao (1976). Pages 20–21. 7. ^ a b c Franke (1994), p. 233-234. 8. ^ [1] • Ebrey, Patricia Buckley. (2013). Emperor Huizong (Harvard University Press; 2013) 661 pages; scholarly biography online review • Ebrey, Patricia Buckley. (1999). The Cambridge Illustrated History of China. Cambridge: Cambridge University Press. ISBN 0-521-66991-X (paperback). • Ebrey, Walthall, and Palais (2006). East Asia: A Cultural, Social, and Political History. Boston: Houghton and Mifflin. • Jing-shen Tao (1976) The Jurchen in Twelfth-Century China. University of Washington Press. ISBN 0-295-95514-7. • Herbert Franke, Denis Twitchett. Alien Regimes and Border States, 907–1368 (Cambridge History of China, vol. 6). Cambridge University Press, 1994. ISBN 0-521-24331-9. Partial text on Google Books. • Huiping Pang (2009), "Strange Weather: Art, Politics, and Climate Change at the Court of Northern Song Emperor Huizong," Journal of Song-Yuan Studies, Volume 39, 2009, pp. 1–41. ISSN 1059-3152. Please see: References section in the guqin article for a full list of references used in all qin related articles. Emperor Huizong of Song Born: November 2 1082 Died: June 4 1135 Regnal titles Preceded by Emperor Zhezong Emperor of the Song Dynasty Succeeded by Emperor Qinzong Honorary titles Title last held by Emperor Zhaozong of Tang Retired Emperor of China Title next held by Emperor Gaozong of Song Images, videos and audio are available under their respective licenses.
In this quick tip tutorial, we’ll learn about the following: • How to create a MySQL database • How to create a user that connects to this database • How to do all of the above from the terminal without PHPMyAdmin Now if you were installing WordPress or a PHP application whatsoever for your site, you’ll normally be opted to provide credentials for a database and MySQL user for these apps to make database connections. FYI, I am running a light stack of LAMP on Ubuntu 16.04 which is my preferred local development environment. Before you get this started, open in your terminal and init MySQL terminal typing the following: mysql -u root -p The above code will prompt you to enter your mysql password, which you have provided while configuring your mysql server. There is another way to do this without being prompted to enter the password, while you’re on root, using the -e flag followed by the MySQL query, something like: mysql -u root -e "SHOW DATABASES;" and hopefully it wouldn’t request for a password. Step 1 – Create database You just want to type in the name of your database to the following command: CREATE DATABASE my_database_name; And pressing enter will create your new database named my_database_name. Let’s make sure it is there: You’ll see a tree of databases which you have in your install, among them the one we just created. mysql> show databases; | Database | | information_schema | | bbpm | | mu2 | | my_database_name | | mysql | | performance_schema | | sys | | wp | 8 rows in set (0.06 sec) Great for step 1, the database is there. Step 2 – Create a MySQL user and grant permissions Good, so to usually connect to this database we have to create a mysql user and grant them permissions. Let’s begin by creating the user: CREATE USER 'myuser'@'localhost' IDENTIFIED BY 'mypassword'; • username: The MySQL user username (myuser in this example). • host: To enable this user for remote connections, user ‘%’ instead of ‘localhost’ in the host field • password: The password which the user will need to enter in order to be granted a connection. Leave as empty ” if you are on a local development server. (the password is set to ‘mypassword’ in this example) Replace the text in orange with the user name of your choice, and the password as well. Remember, the password will be used to connect to this database using this user. That will create the user, but yet we want to grant them privileges to perform SQL queries: GRANT ALL PRIVILEGES ON * . * TO 'myuser'@'localhost'; This should give the user full privileges across the MySQL server (i.e all databases). To give permissions in a single database or two, use: GRANT ALL PRIVILEGES ON databasename.* TO 'myuser'@'localhost'; The 2nd wildcard (star) may be used as well to reflect a data table, so in case the privileges should be restricted to a database table you can use it. Lastly, we want to flush the privileges: Great, so all done for step 2, but before that, let’s test this new user and database out to find out! Step 3 – Just a test So as we created the new user, we want to see whether everything’s functional. Remember the username and password you stated above, let’s use them to connect: First, ctrl+d or type in ‘bye’ to disconnect from the mysql session we used with root, in the beginning of this tutorial. Now, let’s connect with out new user: mysql -u myuser -p You’ll be prompted to enter a password, the one you provided in step 2. Connected? Cool! then everything’s normal. mysql> ^DBye samuel@Samuel:~/htdocs$ mysql -u myuser -p Enter password: Your MySQL connection id is 10 Server version: 5.7.17-0ubuntu0.16.04.1 (Ubuntu) Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective mysql> show databases; | Database | | information_schema | | bbpm | | mu2 | | my_database_name | | mysql | | performance_schema | | sys | | wp | 8 rows in set (0.00 sec) mysql> use my_database_name; Database changed mysql> show tables; Empty set (0.00 sec) We now have the database empty with no tables and that is our main point, the apps will opt to ask for a clean database and they append their database tables upon a fresh install, like WordPress, for instance. You could manually create database tables as well, first just make sure you switched to your target database: USE my_database_name; It is always good to follow the manual, here are few resources: Digital Ocean Cheap Cloud SSD Hosting Get a VPS now starting at $5/m, fast and perfect for WordPress and PHP applications Sign Up with $10 Credit
What Does Parent Involvement Look Like in Middle School? As legend has it, kids in middle school ask their parents to drop them off a block away from school, so they aren't seen together at drop-off time. Does this really happen? Yes, sometimes! And it isn't meant to be an insult after your years of hard parenting work. In fact, it may even be a sign of success. If things are going well, your child is going to work hard to "individuate" during the middle school years. This means developing their own sense of self, rooted in but distinct from their childhood sense of total absorption in their family. Neurologically and psychologically, they are awakening to the social world around them, fascinated by what peers are doing, and becoming ever more aware that there are many different versions of one's personal values.  This shakes the sense of self they've developed from their family of origin, and presents a challenge to them - who am I? Should I act like my friend does? What is authentic to me? Some kids, as they go through these intense questions, feel the need to push off against parents. For others, they may individuate with less drama, gradually forming a more distinct personal identity while staying in close relationship with parents. How they proceed says as much about their personality as it does about how they've been raised, so should not necessarily be taken personally by parents.  While the topic of how to parent kids through this phase could fill many a future blog post -- and many a book! -- let's focus on one question in particular: what does all this mean for parent involvement in middle school? If my kid may not want to be seen with me, how can I still contribute to the school, and feel connected to what's going on there? This is one of the most common questions we receive from parents, many of whom are rightly proud that they volunteered in their child's elementary school classroom. But they sense that maybe things are different in middle school.  They're right - whereas in elementary school, highly involved parents contribute meaningfully by volunteering in classrooms, we believe that role shifts in middle school. Now, kids may not want their parents hovering around them, interrupting their work to create a separate sense of self. It's not a coincidence that in many indigenous societies, middle school is the time when young men and women are sent into the wilderness on "Vision Quests" or to perform rituals or tests of skill, and then are welcomed back as adults after - marking this transition in a much clearer way than we do in our society. Instead, the parents' role in middle school is to provide access. Instead of volunteering in school, bring kids into your world. Give a group of interested students a tour of your workplace and explain what goes on there. Take a student (not your own child) on as an apprentice at work. Use your network to find learning opportunities for kids in the real world. Volunteer as an expert reviewer when students give a final presentation that relates to your professional expertise. This is your gift now - rather than entering the child's world, you are opening doors for your child and others so that they can experience what the real world has to offer.   Christopher BalmeComment
Switzerland mun Capital: Bern Continent: Europe Currency: Swiss Franc President: Ueli Maurer Political philosophy: Though Switzerland's politics is slightly complicated, it is interesting. Switzerland is a Directly-democratic directorial federal republic. The Jedi Federal Council of Switzerland is the head of government. Executive power (daily running of the state) is exercised by the government and the federal administration and not by one person. Federal legislative power is with the government and the two chambers of the Federal Assembly. The judiciary is independent of the legislature and executive. Any constitutional change requires a referendum; for any change in law this may be requested. Citizens may challenge any law voted by the federal parliament and may appropriately introduce amendments to the federal constitution, this makes Switzerland the closest nation to direct democracy in the world. TSR:, this provides you with the opportunity to be a small but albeit influential and dominant country politically and economically. Though Switzerland is in Europe it is not a member of the European Union because the people did not want Switzerland to join the EU. Switzerland is politically neutral and has not been at war since 1815, though in the world of MUN neutrality can be hard to maintain . Economy: ‘Foreign Investment driven’ and 'stable'- - Switzerland's economy is one of the most stable economies in the world. Long term monetary security and general political stability has made the nation a wonder for foreign investors. - Switzerland is the 27th best economy in the world. With its imports of machinery, chemicals, watches, textiles and precision instruments going across the world. - It's main export partners are Germany, Italy, France, UK and the US. - It's main import partners are Germany, Italy, France, US, Netherlands and Austria. - Switzerland's banking secrecy is a very controversial element of the country. Switzerland's future In Switzerland, there is a future with the country edefining its relationships with Europe and the EU and trying to reform its banking secrecy to avoid scrutiny from the USA. Switzerland's past times involve armed banking, eating chocolate, drinking fine wine in log cabins. :cool: The current representative of the Swiss Confederation is PierceBrosnan:- (February 2012-Present)
1st P Context CONTEXTBack to First Paper In the first paper I pose the questions Why was the Creature so ugly? Why was it created by parts of different bodies? Is there any hide intention behind these questions, or Mary Shelley simply wrote it just like that? As a starting point Iwill say that Mary was completely conscious of what she was writing. But to answer these questions we have to address to both different origins, the first one is her biography, there’s one script left at this blog but I will sum the main aspects I consider to develop these questions. The most important fact in her life,and the clue to understand Frankenstein is the death of three of her children. That tragedy is focused on the character of the Creature which represents her impossibility of being mother and their own imperfection as they died being just babies, even more the first one didn’t born alive. So when she decided Frankenstein to “built” these creature (because Frankenstein is the doctor, not the Creature he resucitated, but time has made we associate the doctor with the Creature) her intention was to claim for the search of perfection, a perfect human who came from the Death. But the idea of perfectibility is a utopia, that’s why this monster has to be formed by different parts of bodies, to achieve this perfection, but Life is ironic so the most marvellous Creature it was, the most scars it has. These scars remind us we can’t play to be God although we desire doing good. These scars are also used by Mary to condemn racism and jelousy because society dosn’t accept someone who is better than the others and they try to reject these people by teasing, bullying, etc…  (although it has been writen on 1818 we can see things hasn’t changed). We can say that the Scars of Frankenstein are the scars of the society where we live in and they will survive until human being dissapear or take a radical change. At the beggining of this page I was saying there were two origins and here’s the second: The medicine and science discoverings. When someone reads Frankenstein for first time he or she could say Mary Shelley was a visionaire imagine the implantation and a later resurection of a person; probably it’s true but this idea doesn’t appear by magic but is birth in a context in which science and medicine are being developed. Some of the hypothesis running in that time was the implantation of organs and the use of electric impulse to move them, the same method is used nowadays for heart attacks to save lifes. Other discoverings of this time were the anesthesia by William Morton or the vaccinerabies by Louis Pasteur. bibliography conclusion context Mary Shelley Academic year 2009/2010 © a.r.e.a./Dr.Vicente Forés López © Agustín Cacho González Leave a response - Your response: ¡IMPORTANTE! Responde a la pregunta: ¿Cuál es el valor de 10 3 ?
Can Goldfish Live Without Fish Food? | My Aquarium Club That said, goldfish do enjoy chasing live food, so do consider giving it a try if you can! Photo provided by Flickr Koi and goldfish eat a lot, but goldfish are better foragers. If you took two identical ponds and you neglected to feed both ponds equally, the population in the koi pond would die out faster than the population in the goldfish pond. Part of the reason is that koi eat more, so they starve faster. Part of the reason is that goldfish will find food anywhere, including swimming prey like rotifers, fish fry, and insect larva. Koi, on the other hand, tend not to identify or attack small prey like that. Their usual foraging method is bottom sifting, and if the pond has no aggregate or mud on the bottom, there will be no natural forage. Most people would be very surprised by the amount of live fish food that can be found living in the gravel of a properly maintained gravel-bottom pond. Photo provided by Flickr Please, tell me how to feed my fish, when and how much? I live in Ohio. Thanks. While goldfish DO need some rich food to live, how much they eat of it has to be very controlled or they and overweight. Photo provided by FlickrGood things to feed your goldfish include live foods such as frozen bloodworms, brine shrimp and even earthworms from the garden. Photo provided by FlickrLive foods for Goldfish Photo provided by Flickr Goldfish can live for as long as two weeks without food. It is ideal to feed them with fish flakes twice a day, to give goldfish a good staple food for their species. There are specialized fish flakes exclusively for goldfish, so do not make the mistake in giving them tropical fish flakes. The two varieties of flakes are different from each other when it comes to nutritional content.Your goldfish have high need for fresh vegetables, fruit and live food like daphnia or freshwater shrimp. You can feed your goldfish flakes but not as a main source of food. To keep their digestive tract clear you need to give them extra vegetables.There are also live foods that your pet can eat, although extreme care must be observed. Further cultivation of these foods should be left in the hands of the experts, because no one knows exactly what harm these live foods might do to your goldfish.Live foods make for a great alternative to conventional pellets or flakes. Keep in mind that live foods are meats or sources of protein, so you should only feed these to your goldfish 2 or 3 times per week at the very most. Some good options to go with include brine shrimp, daphnia, tubifex worms, glass worms, and aquarium snails. While goldfish have several small teeth in their jaws for gripping and tearing food, a majority of teeth are in the throat. These teeth make it easier for your goldfish to grind up food and essentially eat that long worm whole (though I still recommend chopping up live worms before feeding young goldfish).Freeze dried or frozen goldfish food will be a little more expensive than plain live foods, but they have the advantage of being completely disease free. Keep in mind that you will have to break up the chunks of frozen or freeze dried foods for smaller goldfish to be able to eat them. These foods can come in the form of brine shrimp, blood worms, tubifex worms, krill, plankton, , Cyclops, and daphnia.
The Importance Of Going To The Dental Surgeon Why You have to Go When Something Serious Happens Teach Your Kids Protecting Our Teeth Quit snacking all day How To Make Your Body Ready For Delivery? Benefits of visiting the pregnancy physical therapist Alternate Sources Of Essential Nutrition We are all taught the food pyramid as children in school. This is often our first introduction to health and well-being. The images that we learn then, along with the food items, remain branded in our minds with the result that even after we are introduced to others food items and cuisines later on in life, we often feel bereft when we do not follow the ‘balanced diet’ of our childhood days. Here are some alternate sources of essential nutrients that may better suit the busy lifestyle that we lead today. Carbs and Starch Bread and pasta were the primary sources of carbohydrates and starch when we were younger. Today however, there are plenty of other sources that can give us starch. Rice, both red and white, is a good source of carbohydrates and merely requires boiling in order to be prepared. Because of its high starch and carb content, you only need to eat one cupful to feel full. Other items like rotti, naan and Arabic flat bread, as well as rice noodles from the Far East countries all provide alternate sources of carbs that contain less gluten than bread and other products made of wheat flour. Calories and Energy These are mostly derived from protein contained in meat, poultry and fish. If you are a vegetarian who does not eat any of these items you can consider the best vegan protein powder or soy items. Tofu (bean curd), soy sauce etc. have a lot of plant protein in it. Indian dhal is also a good source. Those who still eat eggs can enjoy the nutritional value they give because eggs are a super pack of energy nutrition.healthy vital greens All Vitamins Vegetables and fruits are the main source of vitamins and minerals and skipping your vital greens is never a good idea. The only alternate source of these is pills and supplements. While doctors may prescribe you enough supplements for a few weeks depending on a deficiency, it is not advisable to depend on pills for your vitamin intake as they can have adverse effects on the liver and kidneys. Ingesting these vitamins through food gives the body time to break it down into ‘bite size’ chunks, while taking them directly through pills does not. Long-term use can result in serious health issues. Scientists and doctors now theorize that calcium is not absolutely essential for the body externally, but as long as we still drink milk there are few popular alternatives out there. Soy milk and almond milk are the two alternate sources of calcium that currently dominate the market. They taste slightly different and have less punch than the animal milk available for popular consumption, but they also have less fat and oil, and is a better option for those battling high cholesterol levels. Physical Exercise Is Very Crucial We all need to be fit and active, take care of ourselves so that we don’t fall sick, because falling sick is not an option these days. As it’s the 21st century, everything’s much different and not like what it used to be a decade ago, because there’s a long list of changes that have happened, the medical industry being one of them. The medical world can also be divided into different categories, so it all adds up. Basically, it’s extremely costly if you fall sick, and if it’s not something you can simply treat at home, and admitting yourself into a hospital is the only option. However, hospitals have improved drastically compared to back then, as they now have state of the art facilities and equipment available just for you, rooms that are built for your comfort and a whole lot more from where that came from. The issue is these private hospitals nowadays are very tricky, because they charge extensively charge for all of the above facilities, from the bed linen to this test and that test and so on, making you see stars when you see the final bill. So considering all these costs that people have to go through just because they’re sick is honestly unreasonable. But the situation is different in most tropical countries, as there are a wide variety of diseases like dengue and viral flu that people frequently get especially when it rains. The rainy season approaches, and as a result every hospital in sight is full. Most people prefer having the option of going for a private hospital because the atmosphere is way better than any public hospital, for that matter. But as most of them are full leaving them with no option to go to a public hospital. They’re signing up for a definite rollercoaster ride because public hospitals don’t really have a good reputation for providing their patients with comfortable bedding, or sometimes even a bed to sleep on. This is why you need to be more careful when it comes to what you eat and your exercise. Think about getting a remedial massage as it’ll relieve the tension in your muscles. People need to think about their general health a lot more, and go for regular walks or jogging. Don’t exert yourself too much otherwise you’ll have to go for sports physio Dee Why.A person’s body can only take so much, so you shouldn’t do too much, but instead do what you can handle, because you’re way better of then. Improve Appearance Of Your Teeth Each and every person wants to have a perfect smile and white teeth. Sadly, only a few ones are lucky and others are not. But, don’t worry much. If you want a change in your not-so-attractive smile, then take the assistance of cosmetic dentistry.  Why and when to consider improving dental aesthetics? The individuals with irregular teeth and less appealing smile choose cosmetic dentistry as the only solution to their problems. Generally, dentists just fill up the cavities and do some other kinds of dental implants Mosman. However, if you have either serious functional issues or health problems, then don’t select cosmetic dentistry.  Know more about cosmetic dentistry A cosmetic dentist cannot only whiten any individual’s teeth, but he or she can make a patient’s smile whiter by using various techniques. In bonding, tooth-colored resins are applied by a dentist to a person’s teeth just to fill up the chips, to cover the remaining stains and for lowering the excessive spaces. Veneers are also used by dentists. Actually, veneers are either plastic or porcelain covers. Veneers make the shape of unsmooth teeth smooth and thereby a person’s smile becomes more appealing. The dentist will create a custom veneer in the laboratory after taking the impression of the patient’s teeth. The dentist can use crowns to improve the shape of your teeth. Crowns are used for restoring and protecting a weak or broken tooth. Additionally, crowns are also used for stabilizing big fillings. Implants are incorporated in cosmetic dentistry however it should be done only by an experienced and skilled specialist. Know these things before taking a decision.  Things to be kept in mind – If you want to whiten your teeth only, then you can try some treatments at home, which are pocket friendly and effective. You just have to buy strips, whitening toothpastes of high quality, brush-on formulas from the medical store. But, you must consult with your dentist before doing the usage of a kit, which have peroxide, a powerful bleaching agent. If you have tooth decay or disease, then you must treat it first. Afterwards you can use a kit to whiten your teeth.  Orthodontist – Some people also take the assistance of an orthodontist. Patients who have misaligned teeth prefer to visit an orthodontist’s chamber. Orthodontists are the ones, who can straighten an individual’s teeth with the help of braces in a proper way.  A regular dentist – You can pay a visit to a regular dentist in your area to get rid of your dental problems. The dentist may know about some of basic cosmetic methods, but not all. If your problem is serious, then he or she may give you a list of reputable dentists. Dealing With An Injury Young people today live very busy lives and work long hard hours to earn enough money to pay for their day to day expenses and their most basic bills without much of a break in between. They cannot usually afford to take time off from work because every day away from work is a day without earnings and for young people that are living on a pay check to pay check basis, this can be a big toll. If you are one of these people and you have recently obtained an injury that is preventing you from going to work, you must be suffering not only physically but you must be extremely stressed out as well. Take time off Even though it might be stressful to take time off because you might be losing out on your earnings, it is vital that you do because this is the only way that you are going to ensure that your injury is going to get cured correctly and fast. You might need to go to a massage therapist and get a sports massage if your injury is a sprain or a tear in a muscle that occurred while you were partaking in a sport or some form of physical activity. This can help to ease the pain and to set the muscle back in place. Depending on the full extent of your injury, you might need to get professional physio done to help to ease the injury and to help to get healed faster. If the injury was obtained while you were at work or while you were working your company will be liable to pay for all of your medical bills and any expenses that you incur as a result of your injury so you do not have to worry about the expenses too much. In fact, you are most likely covered under the company’s medical insurance which would mean that your medical bills, irrespective of how you got the injury will be covered. Find other ways of earning It would be a good idea for you to use your free time to find other ways of earning money on the internet. We live in the age of the internet and social media which means that there are hundreds of ways of earning money without having to leave the comfort of your own bed and it would be a good idea for you to find these methods and start working on them so that you are not too dependent on your job even in the future and you have a mode of earning extra money. Taking Good Care Of Your Pet If you are a pet lover, you might always want to give your pet the best possible life. On the other hand, if you are new to the whole scene it’s important to keep yourself updated. Firstly, to start things off, you could make it a point to look into your home. Before you bring a pet home, it’s important to make it a danger free zone. Since pet’s have a tendency of moving about here and there, dangerous and sharp objects might out their life at risk. Therefore, before you are to bring the pet, you could make it a point to carefully evaluate the home. Once the evaluation has taken place, you could bring your pet home. Furthermore, if you are choosing a pet it’s always good to go with a pet which fits your personality. Individuals have a tendency of choosing pets which doesn’t suit their lifestyle or personality. Going through such a route could bring up problems in the future. For instance if you are an individual who is barely home, you wouldn’t want a pet which is a dog. On the other hand if you are free almost all the time a dog could come in handy. Secondly, it’s important to make sure that the right supplies are available. Pets are just like humans and they do require the right nutrients. As an owner, you need to ensure that the right nutritional values are provided along with the appropriate food. Furthermore, you could schedule Vet visits, every now and then. You could also get all the required medical equipment’s, so that you could keep tabs of your pet’s health. A forehead thermometer in Australia could be purchased to look into the temperature of your pet.Furthermore, a digital thermometer could also come in handy. Some pets do require attention, and it’s important to devote time for them. If you want to get some exercise, you could go for a job with your dog so it could enjoy some time with its owner. Keeping it inside the house might make it feel frustrated and this should be avoided at all times. If you think that it’s dangerous to have your pet inside the house, you could try building a small pet home for your pet. This way it would be safe and it would also give your pet proper shelter. All in all, these are the things which need to be focused upon if you have an idea of bring in a pet. It’s important to be ready both mentally and physically because it can be quite the challenge. Tips To Be Followed After A Tkr Surgery Medical science has come a long way through the sands of time and some of the modern medical and health approaches will surprise you. Many of us are not aware of these advancement because we usually don’t dig deep in to this subject but this is a must-have knowledge, of course. Especially if you are into sports, or if you work with athletes you might be familiar with these terms and surgeries. A knee damage is more common than you think. There can be cases where you find it difficult to perform day to day activities due to a damaged knee. This can be caused by an injury or a disease and sometimes these injuries cause a lot of pain and discomfort. There are, of course, dozens of ways to address this problem but if they were unable to help you, a TKR surgery is the only solution. TKR or a Total Knee Replacement surgery is not exactly a replacement surgery. It is a resurfacing procedure and it involves 4 main steps. First, the joint bone has to be prepared. After that metal implants are positioned. Next step is the patellar resurfacing and this is not required sometimes. Final step is inserting the spacer and this spacer provides lubrication required for movement. After a TKR surgery, there are few tips to be followed, so the surgery can become 100% successful. After resurfacing your knee cap or your patella, you should not move your leg without care. It is recommended to be treated by a good physiotherapist until you restore your health and strength. A good physiotherapist will tell you what to do and what not to do and also, you have to be careful about your food too. That is why consulting an advanced and well experienced physiotherapist is important. First 24 hours Knees are subjected to heavy loads, usually. So it is obvious that after a surgery, you should not subject your knees to loads. That is why the first 24 hours after a surgery is extremely vital. If you are an athlete, you might have a personal sports injury surgeon. If not, you can consult one soon after your surgery. He or she will help you and advice you how to behave in the first 24 hours with the aid of nurses and physiotherapists. Walking aids Usually, doctors will not let you walk after a TKR surgery because a resurfaced knee cannot withstand loads at first. That is why they recommend you walking aids. Some hospitals provide temporary braces and most of the time people use walking canes and/or other similar devices. Erasing Body Art Mistakes Taking measures to get rid of body art Stay Fit In Workplace Perhaps one may think that there is no necessity of doing exercise while staying in office. But, a little warm up and stretching can make your body feel better and boost up your energy level. Besides, doing exercise in office may save you from musculoskeletal injuries that happen due to fatigue, sudden improving muscular balance and so on. In fact, there are lots of good reasons to opt for fitness programme in workplace. Thanks to mobile physiotherapy services offered in Sydney, Melbourne and Brisbane, corporate employers now can find it easier to promote fitness for their employees. How to stay fit in workplace? While you do stretching, it improves the supply of blood and nutrients in joints and soft tissues. With regular stretching the temperature of soft tissues increases and therefore affects the elasticity of those tissues day by day. Most of the joint pain starts for the lack of synovial fluid. Stretching reduces the chance of lacking and increases its motion between joints. Moreover, it minimizes the tightness in tendon muscles. Also, corporate health service providers can help the corporate employees with the right corporate massage that they need to get rid of several problems, like back pain, shoulder pain, etc.Those who face harsh pain while changing postures are advised to stretch their body on regular basis. Stretching lighten the pain they feel while changing postures. It happens with soft tissues that get affected because of sitting in wrong postures. So, by stretching your body you can get rid of from that problem. Unlike human beings there also lies coordination between muscles. If it is interrupted in any way, then you may feel a deep pain through your body; whereas, stretching helps to reduce the chance of interruption between muscles.  With the increment of velocity in nerve system stretching helps to reduce this problem. Therefore helps muscle to work in a proper coordinating manner. These are the ways to stay fit in work place. Remember the more your employees stay fit, the more they can enhance your productivity level. Also, a fit workforce is essential for faster work, growth and ultimately profit. Workplace fitness programs will also help your employees stay away from stress. Stress is one of the dangerous things that can make you weak, less energetic and frightened. Stress will put pressure in your brain. This, in turn, will lead to reduced level of performance. Stress will increase a person’s blood pressure and the heart beat. So, make sure you take the right measure in the right time.
Логическая структура образного представления Роберт Хауэлл. Содиректор. Электронная версия статьи “In this paper I answer the question: what logical form have statements in which a picture is said to represent some object? More exactly, my question is: of what symbolic sentences, expressed in the first-order predicate calculus (perhaps supplemented with modal operators), may such statements in English about pictorial representation be taken to be translations? In asking this question I assume that the various syntactic elements of these symbolic sentences are given the standard sort of semantical interpretation, that some means (however poorly understood) exists of translating symbolic sentences into English, and that the specific symbolic sentences supplied in response to the question expose a maximum amount of logical structure. (I stop at the first-order predicate calculus simply because no further structure obviously relevant to the topic of representation seems exposed by higher-order calculi.) An adequate answer to my question seems needed before any satisfactory analysis of the phenomenon of pictorial representation can be given. Yet the question goes largely undiscussed. The major problem about the logical form of claims like “The Avignon Pietu represents Christ as lying across Mary’s lap’’ is their intensionality. The direct-object construction after ”represents” and the function of “as” in such claims pose further difficulties. These problems tempt one to write off normal statements about representation as hopelessly confused-and thereby badly to obscure our familiar concept of representation. Recent developments in modal logic allow one to begin to resolve such problems without altering that concept, however. I shall argue that a picture represents an actually existing individual as being so-and-so just in case two conditions are met: (i) the individual represented plays a causal role in the production of the picture (and-perhaps-satisfies some further requirement); (ii) that individual occurs in a fixed place in the picture space belonging to the picture and is so-and-so in each state of affairs compatible with what the picture represents. (If the individual represented is nonexistent, only (ii) is required. The reference of “that individual” in (ii) is then-as explained belowto an object which does not exist in our actual world but does exist in the picture’s picture space in those states of affairs compatible with what the picture represents.) After describing in § I the intensionality present in claims about representation, I set out the formal apparatus and notion of picture space needed for these results in §§ II-III. § IV applies the ensuing system to a variety of claims made about pictures. In § V I show how to refine the apparatus of §§ II-IV to characterize features of representation not there treated, and I relate my findings to the task of analyzing pictorial representation. (Thus I suggest in § V what it is for a picture space to belong to a picture.) Although throughout I discuss only pictures, these findings with adjustments should generalize to other kinds of visual representation. A discussion of non-visual systems of representation, however, lies beyond the scope of this paper.” В журн.: Theoria. 1974. Vol. 40. Issue 2, PP. 76–109. Рассылка статей Не пропускайте свежие обновления Социальные сети Вступайте в наши группы
Therapy worksheets communication none therapy worksheets communication none Assertiveness is a communication style in which a person stands up for their own needs and beliefs, while also respecting the needs of others. Assertive. Passive, Aggressive, and Assertive Communication ; "I" Statements Your therapist can help by providing a safe place to practice a communication worksheet.. Therapy worksheets communication none - journey easy Be sure to practice in session, and come up with a specific plan for how a couple will implement the rules. Anger Anxiety Art CBT Communication DBT Depression Education Emotions Goals Grief Motivational Interviewing Parenting and Behavior Positive Psychology Relationships Self-Esteem Stress Substance Use Suicide and Self-Harm Values. Oftentimes, people are shocked at how closely the cycle mirrors their own experience. Even if you're able to text and listen, it can be frustrating if others think you're ignoring them. With practice, you'll learn to communicate more effectively by spotting common errors, and learning techniques to both hear and be heard. To learn more reflections and a few other communication techniques, visit our Communication Techniques Treatment Guide. Professionals who use the tools available on this website should not practice outside of their own areas of competency. therapy worksheets communication none How to deal assertively with criticism. Keep your back straight and imagine your head reaching toward the sky. We suggest asian black woman dating site a prompt for each quadrant that's tailored to the individual or group., therapy worksheets communication none. These changes are all part of the fight-or-flight response, which prepares the person to either confront or flee from the threat. If you pick up on emotion in the person's voice or body language, include that in your reflection. In fact, these communication errors are such a normal part of life, that most of us don't even notice when we're guilty of . Therapeutic vs. Non-Therapeutic Communication Therapy worksheets communication none flying Learning about the Cycle of Abuse can be illuminating for a client who is struggling in an abusive relationship. Maybe they're telling you about their weekend, when you think: "Wow, I can't wait to tell them about what happened to me last Saturday. Your client will act as a defense attorney, prosecutor, and judge, as they compare evidence for and against a single thought. You will probably start by using these skills in a more formal manner, but with enough practice, they'll become a natural part of how you communicate. In the last reflection, the interpretation wasn't entirely correct. These tools are intended to supplement treatment, and are not a replacement for appropriate training. therapy worksheets communication none
What is Space Opera? Wikipedia sums it up nicely. Space opera is a subgenre of science fiction that emphasizes space warfaremelodramatic adventure, set mainly or entirely in outer space and often romance (heroic literature). It usually involves conflict between opponents possessing advanced abilities, futuristic weapons and other sophisticated technology. The term has no relation to music but is instead a play on the term “horse opera“, which was coined during the heyday of silent movies to indicate clichéd and formulaic western movies. Space operas emerged in the 1930s and they continue to be produced in literature, film, comics and video games. Notable space opera books include the Foundation series (1942–1999) by Isaac Asimov et al. and the Ender’s Game series(1985–present) by Orson Scott Card. An early notable space opera film was Flash Gordon (1936-present) created by Alex Raymond. In the late 1970s, the Star Wars franchise (1977–present) created by George Lucas brought a great deal of attention to the genre. Pin It on Pinterest
Can we survive a day without our cell phone? well, we do feel being shipwrecked on an isolated island without it. The technology has advanced so fast and rapidly that our mobile phone which was launched just to receive calls on the move, now has features which makes it as good as a computer. With the evolution of internet and different social networking apps such as WhatsApp, Twitter, Instagram and Facebook, people don’t just communicate but also stay connected regardless of the distance. We are leaving in an era where the internet is no longer a luxury but a necessity. We have many telecom companies coming up with free Internet schemes. Well, not just free internet, some telecom companies have even announced unlimited calling also. The evolution of technology as well the upgradation of technology which innovates the existing technology have picked up speed in the last two decades. This ever evolving and unstoppable process can be related to the ideas which one gets through imagination. Leonardo da Vinci sketched a design of the first ever working model of a helicopter in the 15th century, something really unimaginable at the time, but today, when we see an airplane or a helicopter flying, we don’t really get fascinated. Hundreds of years ago something that was just a mere imagination or an idea, is a reality today. Can you imagine talking face to face with a person on the other side of the globe, just using your cell phone?, it would have sounded like a gadget from the James Bond movies, if I had to say this in the 1980s. Even science fiction films have played a unique role in the process of technological evolution. Well let’s hope that genetic engineering to create dinosaurs as shown in Jurassic Park is not turned into reality. Science fiction films have even taught us that, if used for wrong purposes, science can be an unforgiving destructive force. When it comes to the innovation of military technology, we often have mixed thoughts. When we talk about military technology the first thought that comes to our minds is laser-guided missiles, drones, high-tech sniper guns etc. but military technologies to prevent any danger and to avoid loss of lives have also been developed. Gadgets such as x-ray vision cameras help our soldiers to detect hidden weapons and also movements of terrorists hidden in a room. The need to be safe and the urge to be powerful are the two factors that determine the innovation of military technology. However, one cannot deny that it is the entire humanity which pays the price whenever such technology has fallen in the hands of wrong people. There are many arguments whether this ever evolving innovation of machines and gadgets is making us very dependable on them, to an extent that we cannot survive a day without them. Well, we do feel paralysed when our cell phone gets damaged or lost. Parents complaining about their child spending hours on TV, cell phone or internet is a common scene. Many of us may even not remember the phone numbers due to quick dial facility on the phone. But, some may even argue that, why do things in a hard way when you have a smarter option. It is also true that because of technology there is also a fear of growing unemployment, as works which used to be done manually are now being done by robots. However, this debate will be never ending due to unlimited pros and cons of the technological evolution and it pace. But, it is us who have to realise how to use it wisely. When a person uses a lift, just to reach first or second floor of a building, it means either one is totally dependent on machines or has no faith in his body. So, the best way to conclude will be to say that, technology is a gift “HANDLE WITH CAUTION”. August 14th, 2017 Posted In: Feature Leave a Reply Neutral Opinion RAJ GONSALVES   As usual today when I left from home to drop my daughter to school, I jus.. read more Recent Comments All rights reserved copyright ©2017 Visitor Count: 367585 Designed and maintained by Leigia Solutions
Friday, 2 June 2017 Did You Know- Factors That Keep Bones Healthy What can you do to keep your bones healthy and strong? Related image Bones are truly the emotionally supportive network of the body, so it's super vital to keep them solid and sound. Bones are persistently being separated and reconstructed in modest sums. Before about age 30, when bones regularly achieve crest bone mass, the body is making new bone speedier, yet after age 30, the bone building balance normally moves and more bone is lost than picked up. A few people have a considerable measure of investment funds in their "bone bank" as a result of elements including hereditary qualities, eating regimen and how much bone they developed as adolescents. The characteristic consumption of bone doesn't influence these fortunate ducks too radically. Yet, in those with a littler bone fortune, when the body can't make new bone as quick as the old bone is lost, osteoporosis can set in, making bones end up noticeably powerless and weak and enabling them to crack all the more effortlessly. The illness is most basic in postmenopausal ladies beyond 65 years old and in men beyond 70 years old. Components That Keep Bones Strong 1. The measure of calcium in your eating regimen. An eating regimen low in calcium adds to lessened bone thickness, early bone misfortune and an expanded danger of cracks.  2. Physical movement.  3. Tobacco and liquor utilize.  4. Sexual orientation.  5. Measure.  6. Age.  7. Race and family history.  8. Hormone levels.  Approaches to Build Healthy Bones  Related image Lamentably, some are more probable than others to create osteoporosis and feeble bones as a rule (to be specific white and Asian postmenopausal ladies). Likewise sadly, it's dreadfully hard to change your race, sexual orientation or menopausal status. In any case, never fear — there are a few things that can be switched to knock up bone mass. Here are 10 tips to make stores in your bone bank for a more advantageous future. 1. Know your family history - Similarly as with numerous medicinal conditions, family history is a key pointer of bone wellbeing. Those with a parent or kin who has or had osteoporosis will probably create it. "Along these lines, how's your bone thickness, Grandma?" may appear like an unbalanced question at Thanksgiving supper, however ask at any rate before she passes the sauce. 2. Support calcium utilization - At the point when a great many people think bones, they think calcium. This mineral is basic for the best possible improvement of teeth and bones. (Also it's an immense partner in legitimate muscle work, nerve flagging, hormone emission, and circulatory strain.) Be that as it may, calcium isn't the end-all, be-all bone misfortune cure. The key may be to help the body ingest calcium by matching calcium-rich nourishments with those high in vitamin D. A few reviews on postmenopausal ladies have demonstrated that basically adding calcium alone to the eating regimen doesn't have an enormous effect on bone thickness (however follow-up studies have recommended the inverse). 3. Remember the vitamin D - Where there's calcium, there must be vitamin D: the two cooperate to help the body retain bone-boosting calcium. Support vitamin D utilization by chomping on shrimp, strengthened nourishments like grain and squeezed orange, sardines, eggs (in the yolks) and fish, or select a vitamin D supplement. Greatist Expert Eugene Babenko proposes getting your vitamin D (particularly vitamin D3) levels checked at your next regular checkup, and to talk about the utilization of supplements with your specialist. Image result for What can you do to keep your bones healthy and strong? The body likewise delivers vitamin D when presented to the sun 10 to 15 minutes of introduction three times each week will do. Vitamin D's significance to bone wellbeing has been demonstrated in studies on "occasional bone misfortune"  elderly individuals can lose more bone mass amid the winter as a result of absence of sun introduction. Despite the fact that these and numerous different reviews on bone misfortune taken a gander at elderly individuals particularly, bone wellbeing is about avoidance, so more youthful people ought to get a couple beams to stock up on D. 4. Support bone thickness with vitamin K -Vitamin K is for the most part known for assisting with blood coagulating, however it likewise helps the body make proteins for sound bones. Be that as it may, the correct way vitamin K adds to bone wellbeing is misty. Two reviews on young ladies demonstrated that vitamin K had distinctive impacts: one demonstrated that vitamin K impeded bone turnover, however it didn't have any impact on bone mineral thickness, while the other found the invert. Another review particularly thought about the impacts of vitamins K and D on calcium assimilation in rats, and it turns out the two vitamins function admirably as a group: vitamin D fortified calcium ingestion in the digestion tracts, while vitamin K lessened the measure of calcium discharged by the body. Notwithstanding how vitamin K may help, top off on it with nourishments like kale, broccoli, Swiss chard and spinach. 5. Pump up the potassium -Potassium isn't really known for supporting bone wellbeing: it's a mineral that helps nerves and muscles impart and furthermore helps cells expel squander. In any case, it turns out potassium may kill acids that expel calcium from the body. Contemplates in both pre-and postmenopausal ladies have demonstrated that an eating regimen high in potassium can enhance bone wellbeing. Truth be told, the review including premenopausal ladies demonstrated a 8% distinction in bone thickness between ladies with high potassium consumption and those with low potassium admission. 6. Make practice a need. Truly. Consistent exercise is vital to keep various medical problems under control, and bone wellbeing is no special case. Indeed, carrying on with an inactive way of life is viewed as a hazard calculate for osteoporosis. One review contrasting bone thickness in school ladies and different body weights and movement levels found that competitors with low body weight had the most elevated bone thickness of any gathering in the review, indicating activity (and low body weight) can positively affect bone thickness. 7. Expend less caffeine. Caffeine has some medical advantages, yet tragically not for our bones. A lot of it can meddle with the body's capacity to ingest calcium. One review demonstrated that drinking more than some espresso every day quickened bone misfortune in subjects who additionally didn't devour enough calcium. Another review (but on elderly ladies) demonstrated that more than 18 ounces of espresso for every day can quicken bone misfortune by contrarily cooperating with vitamin D. So appreciate the java, yet keep it with some restraint and devour enough calcium, as well. 8. Cool it on the alcohol. Be that as it may, similar to caffeine, there's no compelling reason to stop completely. While overwhelming liquor utilization can bring about bone misfortune (since it meddles with vitamin D doing its employment), direct utilization (that is one drink for every day for ladies, two every day for men) is fine and late reviews really indicate it might help moderate bone misfortune. Bottoms up! 9. Stop smoking. Here's yet another motivation to lose the cigarettes: various reviews have demonstrated that smoking can keep the body from proficiently engrossing calcium, diminishing bone mass. 10. Try not to be a space explorer. Not to kill any youth dreams, but rather in light of those a really long time of weightlessness and low-calcium diets, space explorers frequently experience the ill effects of space-actuated osteoporosis. Space-anything sounds sort of great, however space bones certainly aren't: space travelers can lose up to 1% to 2% of their bone mass every month on a mission! For the individuals who essentially should visit the moon, there is a conceivable arrangement: two reviews have found that vitamin K can help work back space travelers' lost bone — more than calcium and vitamin D. Food That  Are Useful For Your Bones Image result for Food That Are Useful For Your Bones General population Good sources of calcium include: • milk, cheese and other dairy foods • soya beans • tofu • soya drinks with added calcium • nuts • bread and anything made with fortified flour 1. It is difficult to get all the vitamin D we need from the diet and we get most of our vitamin D from the action of the sun on our skin. 2. Short daily periods of sun exposure without sunscreen from late March/April to the end of September are enough for most people to make enough vitamin D. 3. However, everyone is advised to consider taking a daily vitamin D supplement. 4. Good sources of vitamin D: 5. oily fish, such as salmon, sardines and mackerel 6. eggs 7. fortified fat spreads 8. fortified breakfast cereals 9. some powdered milks If you've been diagnosed with osteoporosis, your doctor may prescribe calcium and vitamin D supplements as well as osteoporosis drug treatments if they have concerns that your calcium intake may be low. Find out more in treating osteoporosis. At-risk groups Image result for EAT Pulses FOR BONE Some groups of the population are at greater risk of not getting enough vitamin D, and the Department of Health recommends that these people should take daily vitamin supplements. These groups are: all babies and young children, from birth to one year of age, exclusively or partially breastfed from six months to five years old unless they are having 500ml or more a day of infant milk formula all children aged one to four years old • people who are frail or housebound • people who are confined indoors, such as a care home • people who usually wear clothes that cover up most their skin when outdoors • people with dark skin such as those of African, African-Caribbean and South Asian origin • Find out more about taking vitamin D supplements. Related image Women lose bone more rapidly for a number of years after the menopause when their ovaries almost stop producing oestrogen, which has a protective effect on bones. There are no specific calcium or vitamin D recommendations for the menopause, however a healthy balanced diet, including calcium and vitamin D, will help slow down the rate of bone loss. Related image 2. Good sources of calcium for vegans include: 3. fortified soya, rice and oat drinks 4. calcium-set tofu 5. sesame seeds and tahini Image result for pulses grains EATING BY GIRL 1. brown and white bread (in the UK calcium is added to white and brown flour by law) 2. dried fruit such as raisins, prunes, figs and dried apricots 3. The vegan diet contains little, if any, vitamin D without fortified foods or supplements so try to get sufficient sunlight exposure during the UK summer. 4. Vegan sources of vitamin D are: 6. fortified fat spreads, breakfast cereals and soya drinks (with vitamin D added) 7. vitamin D supplements 8. During pregnancy and when breastfeeding, women who follow a vegan diet need to make sure they get enough vitamins and minerals for their child to develop healthily. Read vegetarian and vegan mums-to-be for more information. 9. If you're bringing up your baby or child on a vegan diet, you need to ensure they get a wide variety of foods to provide the energy and vitamins they need for growth. Read vegetarian and vegan babies and children for more information. 10. Too much vitamin A 11. Some research has suggested a link between vitamin A and osteoporosis. As a precaution, people who regularly eat liver (a rich source of vitamin A) are advised not to eat liver more than once a week, or take supplements containing retinol (animal form of vitamin A). 12. People at risk of osteoporosis, such as postmenopausal women and older people, are advised to limit their retinol (including those containing fish liver oil) intake to no more than 1.5mg a day by eating less liver and avoiding supplements containing retinol. 13. soya drinks with added calcium. 14. nuts. 15. bread and anything made with fortified flour. 16. fish where you eat the bones, such as sardines and pilchards. Post a Comment
Site hosted by Build your free website today! WESTFIELD QUARRY LINE, 1850 and beyond Westfield, the original Village in the Fayette Valley was build on limestone slabs and blocks, dug out of the top of the hill on the north side of the Volga River, from today's Hwy 150 bridge to the Hwy 93 bridge. Early quarry workers were not stone masons by trade, but local men doing their own building or supplying stone to others for barter.  The early removal of limestone was almost always near the top of a hill were exposure was not right on a cliff face, but where draft animals could get into the area.  It was easier to work from the top down with gravity to help bring the stone down hill, plus often near the top of a hill fractured limestone would be exposed that could be removed by basic hand methods.  The road to the work area was hand cut, dug, re-enforced and right on the edge of the drop-off in many areas.  In the case of the Westfield Quarries, right above the Volga River. The stone used to make the foundations for homes and out-buildings in Westfield was removed by digging and prying, limestone slabs and blocks from the top of the hill on the north side of the Volga River, above the village.  There are six men working this specific site, four men and one dog are shadowy figures digging on the face of the fracture wall.  The entire top of the hill overlooking the river was a serious of pry quarries that ran for about 3/4 mile. Most of the structures would be build of rough-cut lumber from Alexander's and later Templeton's Mill.   Site page links:  In only twenty years the villages of Westfield and Fayette would be platted and built up to between 400-500 people, Upper Iowa University was built, there was an early iron bridge at the north end of Main Street, but river fords were used in all other locations.  At the time of the first use of the Westfield Quarry line, none of the structure on this map was present.  The Fayette area  had several log cabins and settlers along the Volga.  There were no frame buildings of rough cut timber/lumber until 1855.  The area that would become the town of Fayette was being cleared of timber and brush and planted to small field of wheat.  Even the UIU hill was being grazed and planted until the start of the Seminary in 1855. The Westfield quarry line was very active in the 1850's and into the 1860's, and moderately utilized throughout the late 1800's.   You are looking down from the eastern end of the quarry line to the actual ford across the Volga River into the village of Westfield which would have been right in front of you.  The road leading over the top of the hill is the Westfield Trail to the south and the route out onto the prairies toward Maynard and Oelwein.  Grandview Cemetery, which opened in late 1853 on land owned by James Roberston, was a mile to the south along the hill line.  The village of Fayette which did not exist during the first years of development of Westfield from 1850-1854.  In these early years there would be just 10-12 families of small farmers and craftsmen in the Westfield area.  River fords around Westfield-Fayette tended to be a relatively broad expanse across the stream and the team driver would pick what he thought to be the best route.  Oxen and wooden sleds were used to bring the limestone down from the hill top, across the Volga River ford just to the west of the present Hwy 150 Bridge (2000) and then up the back into Westfield.  Westfield was the field area west of Hwy 150 Bridge, south up the hillside from Hwy 93, and west to the Mill Run Bridge (first bridge out of Fayette going west, across the dry run).   Now you are across the Westfield Ford and looking west.  The Westfield Quarry Line runs along the top of the hill on your right, and all the way down the ridge to about the middle of the pic.  In the 1850's the limestone slabs and blocks, pried out of the quarries would be brought down and used for foundations in both Westfield and Fayette.  Around the corner of the hill to the left of the pic, Robert Alexander would be operating his saw and grist mill.  His brother-in-law James Roberston would be farming and buying land in the Fayette valley and hills immediately to the south of Westfield.  By the mid-1850's Templeton would be milling at Westfield and by the 1860's there would be a very large grist mill and woolen mill in front of you, and down in the grassy depression at the end of the tree line on your right. In the 1850's a bridge at Westfield, like the modern Hyw 93 bridge at the right of the pic, was decades in the future.  There were however, three fords to the west leading out of Westfield.  On the right side of the pic (north) you can see the Old Mill Run, as the depression with brush along it.  Robert Alexander's first mill was to the left (south) of the Mill run, and actually back about even with the left edge of the pic.  Just below the Mill Dam was a ford.  Then straight ahead in the center of the pic and across what today is Klock's Island Park, then across the sandy "beach" at the west end of the park was a ford that led up the valley to the west and out on the prairies toward the area south of Randalia.  The third ford was in the area of the bridge on the right of the pic.  This ford led to the northwest up the valley and out on the prairie to Randalia.  Thee was no trail following modern Hwy 93.  Limestone was brought down from the Westfield Quarry Line from both the east and west ends, thus the ford at the right of this pic was also used.  In the early years the road leading up to the quarries was a common route out of Westfield and to the north into Knob Prairie (West Union) and to Randalia.   Viewed from the west end of Klock's Island, looking to the north down the Volga, the Westfield Quarry Line runs the full length of the ridge visible in the pic.  There would have been a ford just this side of the present bridge which would have been used to bring limestone down to Westfield.  The ford to the west would be right at your back.  In the early years the area to your right, Klock's Island would be known as Holmes Pasture, as it was utilized for grazing a small number of cattle.  Robert Alexander's Mill would be to your back, and around the bend of the Volga, upstream about 1/2 mile.   Fractured limestone slabs/blocks would be used for all of the early foundations in the Westfield area.  There were probably some relatively basic lime kilns around the top of the hill in the quarry areas, as lime would be an early necessity and the top of this hill seems to be the major area of quarry activity, and probably remained so into the 1880's and perhaps beyond.  In the later years, draft horse would supplement the use of oxen, and there would be a few more tools available such as larger malls and metal pry's, and sometimes wheel barrels.   Almost no remnants of the limestone foundations in Westfield are left. The have been pushed in or dozed as their structure were abandoned or to plant a small field.  This foundation is across the Volga off the west side of the "beach" at Klock's Island.  In the early years trail to the west forded here and ran up the valley to the left side of this pic and over the hill, and along the hill ridges into the prairies to the south of Randalia.  These foundation stones were part of an early farmstead in the area.  It is likely in the early years, that a craftsman/merchant located along this ford area.  Robert Alexander's Mill would have been to your back as you look at the pic, about 3/8 mile up the Volga.   This is what the first early settlers into the Fayette area looked for, naturally fractured limestone that could be easily removed by pry techniques and in slab sizes easy to move on wooded sleds pulled by oxen to a building construction site.  If one knows what to look for, there are still places on the Westfield Quarry Line where small limestone stacks well over a hundred years old can be found.  This quarry line sits directly over the Volga River, thus there has been no value as pasture and farm land, or it would have been destroyed like almost all other historical areas.  It will be a just a matter of time. You are looking down the Volga River from the west end of the Westfield Quarry Line.  The trail up to the quarries at this end was just to the left of the pic and relatively steep from the valley below, which was a creek bed that drained the tall and wet grass prairies to the northwest.  There were many such small streams feeding the Volga.  The natural watershed was present and a constant flow of clear, clean water into the Volga kept the river flowing at about twice the rate seen today.  As soon as deforestation of the hills and plowing of the prairies occurred the flow rate started to decline, salutation accelerated, and flooding increased, as the water table gradually declined.  Water quality became rapidly unsafe in the first years of settlement in pioneer areas from the biological pollution of the water table from animal and human sewage, then as towns and farms grew chemical pollution increased.  Looking down the ridge in the above picture, the quarry line starts 2/3 the way up the left side of the pic.  The picture below shows the same area in about 1911. You can see the west end of the quarry line just about the men in the above pic.  This is the first bridge across the Volga in the Westfield area and is in the approximate location of the present Hwy 93 bridge.  The dirt road at the west end of this bridge led up the valley to the northwest and toward Randalia.  There still was no road following present Hwy 93 over the hill to the west.  In the early years of the mid 1800's the top of this hill was rapidly denuded of trees.  There was no though of preservation, just use of trees, land, water, rock, etc.  Just below the bridge you can see a good example of a Volga River ford, this being the ford to Randalia and the ford over which stone would be hauled by ox sled.  At the other end of the quarry line there would be a similar trail/ford. In the pic below you see a close up of the exact same area as the 1911 pic above.  The quarry line is exactly in the middle of the pic and runs completely from left to right.  This shot give a little appreciation of the fact these men were leading ox teams on a trial built right on the edge of the limestone bluff above the Volga on the west end of the quarry line.  Even on the eastern the quarries and trail where on the edge of a very steep hill. The trail along the quarry ridge ran right up to the limestone quarry areas so the slabs of limestone could be pried out, sorted and stacked then loaded onto ox sleds.  The tree and brush growth would not have been present during the major use of the quarries.  Everything would have been denuded, and actually one would have been able to stand in Westfield or at Holmes Pasture (Klock's Island) and watched the men and oxen at work.  The quarries out not have been worked constantly, just when building material was needed. The picture below was taken about 1905, from a slightly different angle from the 1911 pic.  You can see the denuded hill top.  The quarry line can be seen through the bridge, about in the middle.  The area of the Volga River Ford is not as overgrown with willows and native forbs, so a better idea of the broad width of a ford can be appreciated.  Both ends of the quarry had a trail up to the quarry line and to the top of the ridge that looked just like the trail below.  Remember this area has been untouched for well over 100 years, so natural movement of leaves, branches, soil, rocks, down hill has smoothed out, or rounded over,  the road in most places. ALEXANDER'S QUARRY, THE MILL, THE VILLAGE--Robert Alexander moved down the Volga River from the Wilcox Cabin area, 2 1/2 miles southwest of present Fayette in 1850 and built the first Mill in the Fayette area just as the Volga comes around the corner of the southeastern hill of what is in 2000, known as Klock's Island Park.  Alexander took ownership of the land and hillside in this area and used the fractured limestone slabs and blocks on the exposed face of the hill just a hundred feet from his mill.  Alexander would have used wooden pry poles and simple hand forged iron hammers and chisels, along with basic hand shovels of wood or iron.  With his basic tool kit pieces of limestone would have been generally hand carried to the mill site on the north edge of the Volga and used for the foundation and support mill, which was built of hand hewn timbers and boards, in its first stage.  As with all mills, other setters/merchants immediately settle in the very near vicinity.  In this case, the Village of Westfield would spring up, initially with just a few lob cabins and rough cut lumber.  Throughout the 1850's construction of homes, stored, shops, mills continued from local stone and lumber.  The Village remained small with the number of families generally running from 10-30, and as Fayette just a mile to the east became more established from the mid-1850's into the 1860's, Westfield was simply absorbed, and the two villages became one, Fayette.  The people of Westfield built their structures from the trees cut off the hill sides and drug down to the village site.  When the saw mill became functional rough cut lumber could be purchased by cash or barter.  Money was always very scarce on the frontier.  In terms of money, people were poor, and survived by self-sufficient skills of building/making nearly everything, plus bartering labor/items.  Rough cut timbers and lumber was often easier to acquire and use than finding/cutting/dragging building logs to the construction site.  Early settlers knew a more permanent structure could be made by building on a stone foundation.  If nothing else just a could of layers of fractured limestone slabs under the timbers would be significantly better than placing the wood on soft/wet ground.  Even better was an actual wall or basement where the limestone was placed deep enough to be below the frost line.  Thus a much more stable building that would not shift and crack.  Also small cellars would remain cool and safer for food storage.  Almost every original foundation build in Westfield is gone today.  As the structures were removed for various reasons. The stone foundations were filled in or dozed out, and the land used for other purposes or crops.  Westfield is gone.    Site page links:  Slabs and blocks were sorted and used as they came out of the fractured layers.  Probably by 1860+, the fractured rock had been removed back enough to expose some large solid limestone faces, and then actual stone masons worked some of the quarry sited above Westfield.   The masons would have known how to use chisels and wedges to "cut" blocks of limestone for constructing whole building from stone, or to make a foundations of blocks cemented with lime mortar.   Quarrying in Fayette from 1850 throughout much of the latter part of the 1800's was  carried out by hand tools and by channeling and wedging, according to the purpose for which the stone is extracted.  The first quarries, and majority of the stone from the Westfield Quarry line was simply taken by "prying" out naturally fractured rod and sorting the pieces.  However, later on, probably in the 1860's, more solid rock farther back in the hill was reached and actual stonemasons removed the rock in more regular sized blocks using hand tools.  Be the 1870's black power was used for blasting and quarrying limestone, but since this method would cause a lot of stone rubble, it was used to remove stone for roads, lime kilns and railroad cuts like the one blasted through the hillside at the southwest end of Fayette to Abutment's Bridge, and the Second Cut three miles to the west of Fayette, over which Hwy 93 travels.  Today both of these rock cuts are abandoned and all but forgotten and unseen, except for an occasional visit by the few remaining people who remember their use up to the 1960's.    Hand tools alone may be used for quarrying stone that lies in easily accessible beds. The principal hand tools are the drill, hammer, and wedge. A row of holes several centimeters apart is made with the hand drill (actually a piece of iron in chisel form hardened on the end and turned in the hand as a heavy short handled hammer was used to hit it over and over),  partly through the layer, or stratum, perpendicular to its plane of stratification and along the line at which it is desired to break the stone. Each hole in a long row is filled with three wedges, shaped so that one may be driven down through the others, the method being known as plug and feathers; by striking each plug a sharp blow with a hammer, hitting them in succession, and by repeating the operation several times, the combined splitting force of the plugs and feathers finally becomes great enough to rupture the rock.  The first stone masons in the valley were tough. patient, hard working men.   By 1855, on the very frontier, Robert Alexander and James Robertson was motivated by the push from Eliz. Robertson Alexander to start the building of a college on a knoll 1/2 miles east of Westfield now owned by James Robertson.   Charles C. West, carpenter and builder, came from Brooklyn, N.Y.,  in 1855 to head the construction a Seminary building that would lead Upper Iowa University and development and dominance of the village of Fayette.  However, until into the 1870's, Westfield would remain a milling, manufacturing and commercial area as it slowly was just absorbed as a part of Fayette.  Upon arrival and discussion of the construction of a Seminary Building for Robertson and Alexander (both were very involved with the M.E. Church), Charles West studied the local timber and stone available for construction.  Apparently the early intentions were to build from locally rough cut timbers, using ruble limestone for foundation. Much like the early frame building our in Westfield at the time but on a bigger scale.  After taking note of the quality of the local limestone, Charles West recommended a switch in construction material and a drastic increase in size of the building due to the ability to produce a large block cut limestone building, if experienced professional stone masons were brought in from the east.  Within weeks a number of stone masons would arrive and start to locate and quarry stone in massive blocks weighing hundreds of pounds, and the Seminary would be started and occupied by 1857.  Charles West built the third frame building in Fayette.  My gggrandfather Reuben Hunt, Sr., arrived from New York in 1855, either with Charles West, or within weeks.  Reuben Hunt would construct, like Charles West, a small frame structure at the south end of Fayette, just at the eastern base of today's College Hill.  Reuben would end the College Hall project either one of the head masons or the head stonemason of the project.  Charles West would finish College Hall as the project chief.  Both men would go on the be major builders in the Fayette valley.  It took many masons to build such a large frontier building as College Hall, so Fayette would be blessed with a force of experienced builders in the early years. All of Reuben Hunts sons learned the mason and building trade, even though they went on to farm, teach, etc., they continued their interest in working with stone throughout their lives. This was typical of other sons of Fayette masons.   Masons also worked in brick and lime mortar and plaster.   SHARPENING TOOLS USED BY THE EARLY STONEMASONS----How did they keep their tools in good working condition ? etc. From my own experience the following may be of help. Tools like pitchers, punches, points and chisels were made from high carbon steel. Often other tools or parts of farm machinery etc. were used. Lengths of hexagonal high carbon steel was also imported from Sheffield, England to Ireland for this purpose. This was cut in 8 inch lengths to make punches. A stonemason working on a simple forge would first heat the high carbon steel so that it could be worked to shape on an anvil. The tool, for instance a punch, was then put back in the fire, heated and withdrawn. Very quickly about 1 inch of the cutting end of the tool was cleaned on a piece of sandstone until it sparkled. About 1 inch of the tool was then dipped in cold water and withdrawn quickly. Standing in a dark place the colours running from the residual heat in the remainder of the tool were now watched as they ran into the cool cutting end. The colours always ran in the same pattern. The colour straw is preferred but hard to see. Straw runs just ahead of purple which is easier to see and is a good indicator where to find straw. When straw reaches the tip of the punch it is quickly dipped in water to fix it at straw. The punch is then stood vertically in a shallow trough of water (cut from stone) and allowed cool. The hardness of the stone and the pace of the work determined how long the punch would last, maybe only twenty minutes on hard granite. When about a quarter of an inch of the punch was worn away it was time to restart the procedure. Too much time at the forge was resented by employers and for that reason stonemasons/stonecutters sometimes had a smithy or forge attached to their house so as to do this work in their own time. Most would not let a blacksmith near their tools. . Patrick McAfee, stonemason The work of Westfield quarrymen is forgotten,  the limestone foundations are gone, the quarry hillside edge has somewhat recovered and basically has been left alone for over one hundred years, even with the encroachment of the plow and dozer right up to its edge.  The quarry line is the lair of some of the native animals of the pioneer days.  Squirrel, raccoon, wood duck and the other small flora and fauna.  Even the whitetail deer and wild turkey,  again are roaming the ridge, after being brought quickly to extinction in Fayette County, Iowa by the habitat destruction of the "white tide."  A few deer were starting to be seen again by the very early 1950's and by the late 1950's there would be an archery hunting season and a short shotgun slug season.  The whitetail, like the turkey and some other game species adapted to the agricultural crops, however basically nothing lives on winter plowed field, tiled and drained of sloughs.  Nearly all of Iowa's natural habitat is gone or drastically changed.   The old Westfield Quarry Line of the 1850's will remain the home of the whitetail, at least for a little longer. Site page links:  [] Fayette History Index []   Iowaz Sitemap  [] Send email  []  Westfield Quarry Album on Click for Hannibal, Missouri Forecast  Click for Fayette, Iowa Forecast Sign our Guest book
Pros and Cons of Genetically improved food Pros and Cons of Genetically improved food Disadvantages and benefits of Genetically altered foodstuff Beginning Genetically changed nutrition (GM) has changed into a lifestyle in modern-day contemporary society. As per Doctor. Keith, genetically adjusted foods are an change in addition to change on herbs genes for meals offer or medical investigation.write my college essay Much more, Dr. Keith says that American citizen plants at present are recognized by swift growth of genetically improved meals surpassing Western Union together with other nations around the world (Aquino, 2013). In spite of features incurred, genetically adjusted foods has built controversy on agricultural adventures and agribusinesses. The aim of this report should be to explore the pros and cons of genetically changed meal. Pros Genetically Improved foodstuff has various advantages to the agribusiness. Genetically changed foodstuff improves the nutrition provide for any growing countries around the world. More so, GM meal aids farmers to curb the high demand through the people. Depending on creation functionality, Genetically Customized food are known to be of higher quality and flavor. A farmer as an example will never be called to apply herbicides and bug sprays when yielding these vegetation and for that reason reducing workforce needed for expanding the crops. Despite higher expense of the seed products, GM food items are often more reasonably priced therefore this promotes economic gains (Poortinga, 2011). As an illustration, a tomato is usually manufactured to stay extended, cleaner, and thereby improving existence rack in the market. This demonstrates GM diet have improved upon meals high quality. Much more, genetically transformed foods includes increased vitamins and minerals, ideal for the locations which may have insufficient source of these vitamins and nutrients. An illustration of this this GM meals is ‘golden rice’ consisting of high amount of vit a. Ultimately, genetically modified vegetation withstand significant temperatures attributable towards the existing GM technological advances hence, delivering good enough produces even less than severe and lousy local weather seasons. Negative aspects Despite the above granted rewards, genetically altered food possesses its own cons. The primary key situation carried up by genetically changed meals is the destruction about the ecosystem. GM technology enforced normally has turned out to be hazardous to varied organisms this also brings down the level of biodiversity. This certainly could be attributable to removing food source for any dog. More so, the GM technologies calls for incorporating anti-biotic capabilities that necessitates the effectiveness against some computer viruses and medical conditions (Poortinga, 2011). When these GM foods are used, the antibiotic remains within our bodies and as a result tends to make prescription antibiotic prescribed medicines less effective. Yet another main problem produced up by genetically revised your meals are the supply of allergic attacks on the overall residents. This comes from GM systems involving combining genes all over totally different species. On top of that, growth in financial importance breaks down when rising genetically improved cuisine. The reason being that some take substantially efforts to motivate economic expansion and very long time for adulthood. In conclusion To conclude, it is recommended to have a look at each of those amazing benefits and potential risks when choosing genetically revised food as well as the GM know-how into consideration. The objective of the report ended up being to discuss the pros and cons of genetically revised meals. Coming from the talk, we master any time instituting muscle size manufacture of genetically altered foods, the results really need to exceed the health risks involved. To a few prolong GM ingredients is useful specially to spots with thin resources precisely where consequences overshadow the achievements. Leave a Reply
Learning how Telomere Length can affect your Future Want create site? Find Free WordPress Themes and plugins. It has been discovered by many experts around the world that the length of a telomere has a connection with many health conditions. Through this amazing discovery, telomere length testing has been popular and available for many people to try in order to find out if they are at risk of a serious disease. This has given a huge breakthrough for many doctors to gain insight in knowing more about a person’s health. It has also helped a lot of patients avoid the risks of getting these dangerous health conditions which are linked to the length of a telomere. If you are planning to take this test, you must be ready and heed any advice given to you by your doctor because it can greatly help your situation. What is the role of a Telomere? Telomeres protect the chromosome whenever the cells divide themselves. This means that the chromosomes do not lose genes during this process, but the downside is that the telomeres become shorter until the cell dies because there is nothing to protect it anymore.  What does knowing a Telomere length got to do with your health? Well, as mentioned above, knowing the length of your telomere can assess your whole body, whether you have some sort of health condition or not. It is the best way to know your biological age. There are a lot of factors that can affect the length of a telomere. A healthy and proper diet can help in slowing down the shortening or the telomere but poor diet and high levels of stress can cause them to shorten faster. What does a Short Telomere mean? Because of a fast shortening of a telomere, your cells will stop replicating and this only means one thing, your cells die. Many cancer patients have been reported to have short telomeres. Measuring your telomere may help the doctor detect if you have cancer. Telomerase is an enzyme which prevents a telomere from shortening making the cell reproduce normally. Telomerase and Cancer Experts are now looking for a way to block telomerase activity in a cancer patient’s body because most of the cells in their body are now cancer cells.  If they continue on replicating or multiplying, cancer spreads all over your body. But it’s like chemotherapy because you are also killing or preventing the good cells from being made. However, this can be a major discovery that will help millions of cancer patients worldwide if they could find a way to block telomerase without affecting the good cells.  Shorter Telomerase, Shorter lives Short telomeres can somehow be related to how long a person lives. Due to the cells not multiplying and just dying, the good cells also die thus risking the immunity and health of a person in question. If you ever have taken a telomere measuring test, the results may vary and can possibly be far from what you have expected. This may mean that due to your bad habits, your telomeres have shortened and resulted to a lot of cells dying. Don’t worry though because you can still try many ways to prevent it. 0 Comments Join the Conversation → Leave a Reply
• Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month Explain how Trotsky contributed to the success of the bolsheviks up untill 1922 Extracts from this document... Sam Pedwell GCSE history coursework Russia question (a). Explain how Trotsky contributed to the success of the bolsheviks up untill 1922. In March 1917 Tsar Nicholas 2nd abdicated his position as ruler of Russia, thereby ending the long reign of tsars before him. He gave way to a provisional government which had many promises for the war torn people of Russia. However the provisional government's reign was short-lived as on the 6th and 7th of November 1917 the Bolshevik party led by Lenin confirmed that they had seized control of Russia. But Lenin and the Bolsheviks undoubtedly would not have been able to achieve all this were it not for the chairman of the military revolutionary committee Leon Trotsky. I think that Trotsky played a key role in the success of the Bolsheviks many times right up until 1922 and Lenin's death. ...read more. The Bolsheviks now had a great advantage in that they had sole use of the transport system and communications, they were able to move around the armies and communicate freely. Though the Bolsheviks had seized power they still needed to maintain it. The people of Russia had grown tired of the long running war that had left them starving and destitute and then civil war broke out again, and it was here that Trotsky played another critical role in the success of the Bolsheviks this time in securing control for the long term. The anti Bolshevik parties such as the Mensheviks whilst supporting many of the Bolshevik core policies wanted them brought about in very different ways and so planned to seize power from the Bolsheviks. ...read more. Around this time the Tsar and indeed the entire Romanov family seemed to just disappear with many rumours that they were all murdered by the Bolsheviks however these rumours were never positively confirmed. I do believe however that the Bolsheviks murdered the Tsar and his family and I believe that this was more of Trotsky's good thinking to eliminate all remnants of previous reigns and bring about the end of the monarchy and the beginning of the idea of the Bolsheviks being the rightful rulers of the soviet. Although some people opposed Trotsky as a true Bolshevik as he had earlier been involved with the Mensheviks he soon proved himself to be a great asset to the success of the Bolsheviks up until 1922 and without him the course of the Bolshevik party would not have been the same. By Sam Pedwell: ?? ?? ?? ?? 1 ...read more. The above preview is unformatted text Found what you're looking for? • Start learning 29% faster today • 150,000+ documents available • Just £6.99 a month Not the one? Search for your essay title... • Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month See related essaysSee related essays 1. Reasons for Napoleon's Success (to 1807). hardship, as did his reduction of the army medical services to save money (he may have declared that the men's health was of paramount importance to him, but the sick and wounded on campaign were left to die). * Despite these well-founded criticisms, some historians still believe that Napoleon was The support from the peasants, army and divisions of the bourgeoisie, as well as the Provisional Governments inability to govern effectively led to a Bolshevik Revolution, led by Lenin. The support of Leon Trotsky, who was released from prison during the Kornilov revolt, and who had been imprisoned during the 1. Blitzkreig coursework Other contributory factors have to be considered to evaluate the importance of Blitzkrieg in these campaigns fully. One other factor is the inferior armed forces of the countries invaded. This was an important in the defeat of Norway, the Norwegian armed forces were tiny compared to the German forces. 2. Lenin and the Bolshevik revolution. The extent to which questions of policy, rather than of previous party alignment, were the deciding factors in individuals' choices of party in 1917 is quite remarkable. Party boundaries were by no means completely rigid in 1917, and a number of veteran socialists chose to abandon their original alignments and join other parties. to boost the morale of the Troops coupled with his grand oratory worked to great effect. Trotsky realised the importance of morale in an army's willingness to fight and ability to perform, and his personal visits to the Troops reassured them of the Revolution they were fighting to protect. 2. Explain Trotsky's Contribution to the Success of the Bolsheviks up to 1922 He succeeded in inspiring many of the men that they were on a communist mission to create a new world. This inspirational ability was very valuable and it kept morale high in the ranks. Trotsky was also very clever in the way he saw that the railways were crucial. Railway stations, post offices, telephone centres, banks, bridges and the engineer's place (the military headquarters), were taken control of one by one. The was little resistance and no shots were fired, however the outcome was no less effective; the Bolsheviks now had controls over communications, and could monitor all movement in, out and around the city. 2. How Did Trotsky Contribute To • Over 160,000 pieces of student written work • Annotated by experienced teachers • Ideas and feedback to improve your own work
• Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month Explore the dramatic effects used by Miller in “The Crucible” Extracts from this document... Explore the dramatic effects used by Miller in "The Crucible" Arthur Miller was born in 1915 in the city of New York. During his mid-teen years the depression hit his family extremely hard and forced Miller to leave high school and attempt to find work. Most of the plays that Miller wrote were based on contempory society but from first sight "The Crucible" seems very different. "The Crucible" was used as an oblique comment on society at that time. At that time communists were being tracked down in an attempt to rid of them. They were made to accomplish a political purity test where their loyalty to America had to be proved. If they failed this test they would have been executed, and this is why Miller wrote about the witch trials of Salem. As Miller himself had communist sympathies, and was himself arrested but later released, he was far too frightened to write directly about how he felt the actions of Joseph McCartney were a disgrace. As the witch trials were very similar he felt it would get his points across. People who had been seen to have skills in witchcraft were also made to take a test but in this case, to prove their loyalty to god. Failure of this test also led to execution. During the time of the Salem witch trials the people had to fulfil the standards of the Puritan religion. The Puritan religion had very strict rules and if these rules were broken they would be seriously punished, such as being beaten or whipped, or in worst case such as using witchcraft, they would be executed. Only plain clothes could be worn. For the women this meant bonnets, old maid dresses and aprons. Men wore top hats, black knee length trousers and black jackets. Both sexes were made to wear clothing with long sleeves and long socks. ...read more. The scene in the woods at the beginning of the film, "The Crucible", gives us the first impression that Abigail is a strong character, which is then proven to be true mainly in the beginning of the play. Her scene where she threatens the girls shows how Abigail over-powers the other girls. The way they don't speak up to her shows they are scared of what she is capable of doing and they don't want to be on the receiving end of it. "Let either of you breathe a word, or the edge of a word, about the other things, and I will come to you in the black of some terrible night and I will bring a pointy reckoning that will shudder you" The power of Abigail's character is definitely shown here by how she blackmails the girls with such a nasty threat. Abigail creates such a high amount of tension in the audience, as she is such a hard character to work out and leaves you questioning what she will do next. She seems very cunning by how she plots revenge on Elizabeth and Proctor and shows no shame of what she is doing. Her strength is not shown just by her threats and how she betrays people but by how strong she is mentally. To be able to threaten friends and ex-lovers etc and still be able to put on an act of such a pleasant, God loving, angel like young girl to others must take an extremely strong, and evil, minded person. The other side we see of Abigail is that of a "whore", in John Proctors words. We are informed of Abigail and John Proctors affair towards the beginning of the play when Abigail tries to seduce Proctor but he turns her down. "I will cut off my hand before I'll ever reach for you again" This shows how Proctor is not scared of Abigail, he seems to think of her as just a little "child" but he underestimates how clever and bitter she really is. ...read more. This is the type of evil that is less likely to be noticed in the play but it is still there as Miller has tried to create a sense of evil from many different actions of the people to keep the tension high and create many dramatic moments! Miller has created many dramatic moments, not just from obscene events such as the hangings or the hysteria of the girls, but also from simple acts such as Proctor and Abigail's confrontation of how they feel. These are all dramatic and cause a lot of tension for the audience but they're all from many different uses of emotions and actions. The main dramatic events came from moments of wickedness and hysteria because, as I said in the last paragraph, they were seen as being more outrageous due to the way of life in that time and were a lot more surprising for the audience. They also seemed a lot more dramatic as they were seen as outrageous for even our day society as they were so cunning and appalling acts of behaviour. I think Miller has got his message across well of the society he was living in at that time with, the hunt for people with communist sympathies, as being just like the acts of mainly the girls and how they have been tracking down innocent people for reasons that are not always harming our society. The communists have not been harming anybodies lives with their beliefs and not all witchcraft is used for bad! In conclusion I think Miller created his Dramatic effects mainly with the use of the girls and their obscene actions. I think he did this very well and overall the amount of dramatic events in the play was what kept the audience interested. The audience were always awaiting the next act of outrageous behaviour. It was what kept the play going and without such dramatic events I feel the play would not have succeeded in making his point about the political purity test being ridiculous and unnecessary. 9/06/2001 Hannah Simpson ...read more. The above preview is unformatted text Found what you're looking for? • Start learning 29% faster today • 150,000+ documents available • Just £6.99 a month Not the one? Search for your essay title... • Join over 1.2 million students every month • Accelerate your learning by 29% • Unlimited access from just £6.99 per month See related essaysSee related essays Related GCSE Arthur Miller essays of dramatic irony as Elizabeth was unaware to tell the truth to the judges to save her husband and herself from losing power in the court and in the community of Salem. Another key action that Elizabeth underwent that had a resultant dramatic effect on the audiences' response towards her about him, the influence of evil can be seen in the play, the tragic hero suffers greatly and as a result is able to see himself and the world more clearly and finds a degree of release when facing death, the central character contains a fatal flaw and the play deals with universal and serious themes. People are accusing other people of taking their money. There is also one of the seven deadly sins in Salem. For example, rivalry between Abigail and Elizabeth. Elizabeth Proctor displays loyalty, when she is brought in and questioned even though she does know of his affair. He still wants to save his name, but for personal and religious, rather than public, reasons. Proctor believes that such integrity will bring him to heaven. Elizabeth's strength and weakness is her husband. I know this because she is upset that he has committed adultery but she forgave him in the end. 1. Crucible : tension fear and hysteria When the villagers of Salem start to find out that many people are getting arrested caused by the fake allegations made towards them, the ones waiting around hoping their names is not mentioned creates the tension and fear towards them. 2. “The Crucible” By Arthur Miller - religion and puritan belief This is another of Abigail's methods of enticing Proctor into resuming their illicit affair. The type of dialogue she chooses suggest that she is basically desperate for the romance once again. She is even prepared to go to the lengths of calling Elizabeth Proctor "a sickly wife" to get him back. Parris - who thinks that they disapprove of him, and wish to 'overthrow' him) although he is, in his own words, '...no saint'. Early on in the play it is revealed that he has committed the crime of lechery - however he confesses this to his wife, and she forgives 2. The Crucible - summary. This event even serves to break the icy exterior of Elizabeth Proctor, who deems that Abigail must be "ripped out of the world." Miller creates a situation of bleak irony in this chapter with the arrest of Rebecca Nurse and Elizabeth Proctor. • Over 160,000 pieces of student written work • Annotated by experienced teachers • Ideas and feedback to improve your own work
John Boyle O’Reilly In January 1868, John Boyle O’Reilly arrived in Fremantle, Western Australia, on board the convict ship Hougoumont. He was not a thief or a murderer, but had been sentenced to 20 years of penal servitude for belonging to the Fenians, a group plotting an armed uprising against British rule in Ireland. Someone has commented that he wasn’t convicted of any crime, except the crime of being Irish. After a month in Fremantle prison, O’Reilly was sent to Bunbury where he worked with a team of convicts who were building a road. A Catholic priest introduced O’Reilly to some Irish settlers at Dardanup, who assisted him to plan an audacious escape. They helped him to hide in the sand dunes on the coast north of Bunbury, from where he was picked up by an American whaling ship. O’Reilly eventually settled amongst the Irish community in Boston, USA where he became a successful newspaper editor and poet. He wrote a novel called Moondyne which is set in Western Australia. Now the beach from where he made his escape is part of the Leschenault Peninsula Conservation Park and a monument has been erected in his memory. John Boyle OReilly 1 Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Acts 4: Generosity Over Socialism Acts 4:32, 34-35 reads: This passage is sometimes used to argue for socialism or even communism, but I would argue otherwise. I would argue that his passage is speaking of generosity more than an economic system. These two ideas of socialism and generosity can go hand in hand but do not necessarily do so. What tends to happen in socialist societies is that the governing body takes, sometimes unfairly, from one group to give to another. For instance, America has some social policies that are paid for by taxes. Most people have not directly opted for the amount of taxation. Therefore, it becomes a political economic situation. I’m not saying that taxes or these policies are necessarily bad. The difference is that instead of people freely giving to help those in need, it is taken from them by the government and then divided out. Even if what is described here is socialism, because, to be fair, socialism is hard to define.[i] The common thing in different forms of socialism is the sharing of goods and profits. Which was happening here in some form or manner. But we need to distinguish two types of Biblical passages: descriptive and prescriptive. Descriptive passages simply describe what was happening. There are plenty of descriptive passages throughout the scripture that are definitely not prescriptive. We can learn from the descriptive passages, though. We learn what we shouldn’t do and sometimes what we should do. A prescriptive passage teaches or commands us to do something. The Ten Commandments tell us how to love God and love others. Acts is mostly a descriptive book of the Bible. It details the acts of the apostles. Luke wrote the Gospel of Luke to describe the events and ministry of Jesus Christ to Theophilus (Luke 1:1-4). Acts is a continuation of Luke’s record of Jesus and the apostles for Theophilus (Acts 1:1). Since it does record a few of Jesus’ teachings and the teachings of the apostles, we can find prescriptive passages within Acts. This particular passage is a descriptive passage, though. It is describing what was happening with the early church just after Jesus’ ascension. It is not necessarily teaching us to sell all that we have and allow the church leaders or government to use the proceeds as they see fit. In Acts 5, Ananias and Sapphira sell the property, but they colluded to lie about the profit so they could keep some for themselves. Peter chastises them for lying and God punishes them. It’s not that they kept some for themselves, because I’m sure if they were at least honest about it, then it would have played out differently for them. They lied to the people, the apostles, and most importantly to God (Acts 5:4). Their deception and greed was what caused their downfall. This passage does not say they were commanded to sell all they had to give to others. Ananias and Sapphira were greedy and this led to their deception and downfall. Likewise, we do not necessarily see that we are commanded to do the same. Instead, we should compare this passage and our lives to Jesus’ Parable of the Good Samaritan (Luke 10:25-37). In this parable that we are all each other’s neighbors and should love and care for one another no matter race, ethnicity, or social class. The Samaritan was generous to the Jew who needed help. He paid any cost to meet his needs by paying for a room, food, and clothes until the Jew was well again. This generosity is what I argue that we learn from this passage in Acts 4 by comparing it to the Parable of the Good Samaritan. Instead of being selfish, the church in Acts decided to be generous to make sure that all received care and had their needs met. I’m not advocating that we go and sell all that we have. If we see a need and can meet it, then we should. Especially if we have excess income. There’s nothing innately wrong with having nice things, but when we would rather spend money on things we need in spite of helping to provide food and shelter to those in need, then we need to reevaluate our priorities. We should be generous with our time and finances so that others do not starve or die from living on the streets. I know I can be cynical at times. I’ve experienced and heard stories of people taking advantage of people and the system instead of working for themselves. We cannot turn a blind eye to the many in need because of a few bad apples, though. Just because a few lie and deceive does not mean that many others don’t actually need help. Instead of legislating for social needs, we should be aware of our neighbors’ (i.e., literal neighbor, fellow Americans, and people of the world) needs and do all that we can to provide for them. [i] If you want to know more, then I suggest Wikipedia. It’s a good source for basic and quick information on topics. If you want to dig deeper in your knowledge and understanding, then I recommend following the footnotes on the Wikipedia article to find books and peer reviewed articles. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Conserve Natural India Sustainable Development in Northern India Visit to Biomass Plant Recently, the interns involved in the Biogas Workshop held in Himachal Pradesh were treated to an extra day of field visits related to renewable energy in Punjab. The biomass plant visit was among the many highlights of this extended workshop. Located near Nakoda, the Green Planet Energy Ltd Biomass Plant produces 7,000 kilowatts of energy per hour (KWh). Assuming the average house utilizes 3 KWh, this one plant produces enough energy to power 2,333 homes every hour. All of this energy is produced through the burning of biomass (organic) waste that would otherwise be burned in farm fields. Full view of the biomass plant with the boiler on the left Benefits of the Biomass Plant: • Alternative to burning biomass in fields, causing air pollution • Saves habitat and ground cover • Produces renewable energy – 2 KG biomass = 1 KW energy • Gives extra income to farmers – 1 rupee = KG of hay or biomass Biogas Plant Process: 1. 1.    Farmers sell biomass waste to the plant 2. 2.    Biomass is dried and compacted 3. 3.    Compacted biomass is loaded onto the belt, leading to the furnace (see Photo 2) 4. 4.    Biomass is used as fuel in boiler, reaching temperatures of 700 degrees Celsius 5. 5.    Boiler heats 30 tons of water each hour (of which 2 tons evaporates, 28 tons reused) 6. 6.    The boiling water creates steam 7. 7.    Steam runs the turbine at 7500 revolutions per minute (RPM) 8. 8.    Turbine produces electricity/power by running the generator Compacted biomass is loaded onto a belt leading to the boiler Waste Products/Emissions from Biomass Plant Processes: Of course, burning the biomass fuel creates waste fumes. The fumes contain particles of carbon monoxide, a poisonous gas for humans to breathe, and carbon dioxide, a greenhouse gas widely considered to be contributing to global warming. The workshop team in front of the electric static precipitator (from left to right: Clement, Adrien, Owen, Gulshan, Biomass Plant Engineers, Ariel, Katrina, Mandy, and Sevil) The Electric Static Precipitator (ESP) presents a solution to this environmental waste dilemma. The ESP processes the gases from the boiler with charged electrodes. These electrodes attract the harmful particles in the fumes, releasing clean oxygen and solidifying the carbon particles into ash. The ash is then used in building materials, such as bricks and roads. 99.4% of the harmful gases are collected through this ESP process. After a full day of field visits, it was not only a highlight, but also a privilege to be shown the inner workings of this biomass plant. By Katrina Sill Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s This entry was posted on June 13, 2013 by in Uncategorized and tagged , , , . %d bloggers like this:
[maht-te-awt-tee] /ˌmɑt tɛˈɔt ti/ [jah-kaw-maw] /ˈdʒɑ kɔ mɔ/ (Show IPA), 1885–1924, Italian socialist leader. Read Also: • Matterate [mat-uh-reyt] /ˈmæt əˌreɪt/ verb (used without object), matterated, matterating. New England, Upstate New York, and Southern U.S.. 1. to fester; suppurate. • Mattered [mat-er] /ˈmæt ər/ noun 1. the substance or substances of which any physical object consists or is composed: the matter of which the earth is made. 2. physical or corporeal substance in general, whether solid, liquid, or gaseous, especially as distinguished from incorporeal substance, as spirit or mind, or from qualities, actions, and the like. […] • Matterhorn [mat-er-hawrn] /ˈmæt ərˌhɔrn/ noun 1. a mountain on the border of Switzerland and Italy, in the Pennine Alps. 14,780 feet (4505 meters). /ˈmætəˌhɔːn/ noun 1. a mountain on the border between Italy and Switzerland, in the Pennine Alps. Height: 4477 m (14 688 ft) French name Mont Cervin Italian name Monte Cervino (ˈmonte tʃerˈviːno) Alpine […] • Matter-in-deed noun, Law. 1. a fact or statement that can be proved or established by a deed or specialty.
Over a million developers have joined DZone. Making Tough Choices With Self-Driving Cars DZone's Guide to Making Tough Choices With Self-Driving Cars MIT unveiled its Moral Machine experiment this month, where you can choose how an automated car reacts in a crisis. See some examples, and consider the problems self-driving cars pose. · IoT Zone Free Resource One of the thorniest issues surrounding driverless cars is the concept of ethics. How do you program ethical dilemmas into a machine? Can it be done? What should a car consider when faced with an impending crash. MIT's Media Lab is curious, too. Specifically, they want to know how humans would apply morality in given situations. Take a look at MIT's Moral Machine page, where you have the opportunity to go through 13 randomized scenarios involving the safety of self-driving cars. The "Instructions" button has the full details, but here's a summation: • A self-driving car is traveling down the street when it detects that its brakes have failed. • The car can detect the approximate identifications of its passengers and nearby pedestrians. • In each of the situations, you must take into consideration the passengers and/or pedestrians involved and decide who lives and who dies. It's important to note that this is more of a thought experiment than anything. "Our goal here is not to judge anyone, but to help the public reflect on important and difficult decisions," says a note on the website.  I'm going to run through a few examples, give my thought process on them, then cut to my final results and my conclusion. But before I start, a couple of points: Caveat #1: I'm basing my decisions only on the information given to me. What I mean is that if a car might run over two people, I'm not going to assume it could continue on, get sideswiped in the intersection, and end up hurting or killing even more people. My assumption is that only the people in the image will be affected. Caveat #2: I'm assuming these people live in vacuums. There are too many unknowns not to. The kids in these scenarios don't have loving parents who would be devastated by their loss, and the average adults don't dote on their five children while donating to charities and volunteering on the weekends. The executives aren't power-hungry maniacs who climbed the corporate ladder on top of the bodies of their colleagues, and the athletes didn't pick on their peers throughout high school. Scenario 1 Image title So, we've got a regular Joe and a male executive driving down the road. The car senses its brakes have gone out just as another ordinary man and a homeless guy start across the street. If the car continues ahead, the pedestrians will die. If the car swerves into a concrete barricade (that's there for some reason), the passengers will die. Who lives? It's a pretty grim question for a human to have to answer, but if we're going to try to translate ethics into 1s and 0s, we need to have a response.  Given that the pedestrians are following the rules and crossing legally, I believe it's up to the car to avoid them. With that rationale, I choose Option 2, dooming the male executive and his passenger. Having fun yet?! Scenario 2 Image title Oh, come on! So, in this scenario, an empty driverless car (I'm guessing an automated delivery truck) is heading down the road when its brakes go out. On the one hand, a man is legally crossing the right side of the street while a boy (let's call him Innocent Jimmy) is jaywalking to get to the island in the middle of the road. Fantastic. Where's the "plow into the concrete barriers" option? So, we're presented with two fairly terrible choices. Do we kill a man who is literally doing everything right? If we do, then Innocent Jimmy's certainly going to have something to tell his classmates on Monday. On the other hand, Innocent Jimmy is breaking the law. He is illegally crossing the road (presumably while shouting, "Pedestrians have the right of way!" like most of my classmates did in college when they did the same thing). This is perhaps the least offensive of all crimes in existence, but he's forcing this truck into a life-and-death situation. I have to assume that these driverless cars are connected to the streetlights to tell who has the right of way. That's the only way this makes any sense, and it also allows for some sort of standardization. Assuming that to be true, pedestrians need to respect that they're not always the top priority, especially when there's a streetlight telling you to wait. With that in mind, in a decision that's certainly going to bar me from holding public office, I choose to spare the adult. Bye, Jimmy! Scenario 3 Image title Oh, thank goodness — something that proves I'm not a psychopath. So, we've got another driverless delivery truck moving down the road when, surprise surprise, its brakes go out. On the one hand, it could keep charging ahead, which would result in the deaths of two adult men, a woman, a boy, and a girl. On the other, it could swerve, which would kill two old men, an old woman, a younger man, and a younger woman. Note that in this scenario, the pedestrians are all crossing legally. That helps avoid an "Innocent Jimmy" situation. This is really a no-brainer — I'm not going to pointlessly kill kids. Really, Jimmy made that car hit him. In this case, I'm clearly going to spare the children. Scenario 4 Image title Well, this is different. This average, ordinary bank robber has politely decided to wait for the light to turn green before crossing the street with his ill-gotten gains. Meanwhile, another bank robber is heading down the road with a female doctor, an old woman, a baby, and a cat. How we've determined that the pedestrian and one of the passengers are criminals is beyond me, but really, that doesn't play a part here. This is actually way deeper than it would seem at first. We're talking about the lives of four people (and a cat) versus the life of one crosser — remember caveat #2, we aren't assuming that this car is going to keep going into the intersection and cause a massive accident. Still, I'm torn. I don't want people to game the system by trying to load their cars up with other people so it gives them priority over a fewer number of legally crossing pedestrians. In this one specific incident, I'm going to choose to hit the pedestrian. But I'm not happy about it. Not like that little punk, Jimmy. The Results I went ahead and completed the rest of my scenarios. In general, I chose to save more lives rather than fewer, I elected to protect pedestrians over passengers, I was very much anti-jaywalking, and I vastly preferred humans over animals. I disagreed with the assessment that I favored criminals over productive members of society: Image title Maybe I'm secretly a jewel thief! Honestly, "social value" didn't really factor into my thinking. Instead, I found myself falling into a few prioritized guidelines: 1. Humans are worth more than animals. 2. Pedestrians have the right of way, except when a stoplight says they don't. If Innocent Jimmy wants to try to dart across the street during a red light, he's going to find out that the laws of physics supersede the laws of man. 3. Saving more lives is preferable to saving fewer lives. 4. Saving younger lives is preferable to saving older lives. (Sorry, Grandma Gates.) 5. If all else is equal, avoid swerving into the other lane. Also, in addition to "Social Value" (how is a car going to know if you're a doctor or a burglar?), there was also one other factor that I disagreed with being measured at all: "Intervention." Image title The test measures whether you preferred to keep the car moving straight ahead or to swerve into the other lane. That's probably useful, and the rest of the community is probably right by preferring to remain in one lane rather than swerving. In general, it's good to have a set pattern in a crisis situation (continuing straight ahead) rather than introducing a sudden sweeping motion that bystanders aren't ready for. But if you'll recall caveat #1, I can only make these decisions based on the information given to me. In that case, it doesn't matter whether the car chooses to intervene — the same groups of people are affected. After all, why couldn't I just choose for the car to push itself up against the concrete barrier on the side of the road until it came to a stop? Are the barriers rigged to explode or something? Besides, isn't that exactly what you want a self-driving car to do? Intervene on your behalf and choose the least devastating course of action? Obviously, people differ on what the lesser of two evils are in these scenarios — that's the point of this experiment — but my stance is that "intervention" didn't play a big part in my thought process because it really didn't matter here. That's why it was my least important priority. That was a lot harder than I thought it'd be. A recurring thought I had during this experiment was, "I never want to be in charge of making these decisions." This was actually a pretty brutal look at myself and my thought processes. At the same time, it brings up a number of ethical and legal questions covered in Nicole Wolfe's article, which I linked at the beginning of this one. In an accident, who is responsible for damages? The manufacturer? The "driver" or owner? The programmer? There's also the idea of placing a value on a human life and making cold, calculated decisions based on dollar figures — then letting a machine act that out. In that case, middle-aged men become basically untouchable because they generally have the highest earning potential. I'm having flashbacks to a civil law course I took in high school where I learned in no uncertain terms that adults were more highly valued than kids — because they earn more money and generally have more responsibilities. Again, it's important to note that these tests aren't meant to judge anyone. They're designed to make you think your way through what are sometimes impossible situations. For instance, one of my later scenarios decided between staying in the same lane, thus killing two old men and a young boy, or swerving into the other lane, killing two old women and a young girl. I was ready to flip a coin before I shrugged and picked the males to die. As per priority 5, if all else is equal, avoid swerving. Also, consider it my apology for the wage gap. But finally, I want to stress that my caveats simply made it possible for me to take these tests. If I had to consider what happened when the car crashed through those pedestrians and then went flying into the intersection, I'd never have gotten anywhere. And the car "intervening" with a swerve becomes a lot less desirable when there is another car in the next lane. But those will absolutely be problems in the real world that need to be considered. So take the test for yourself. See what you'd do in those situations and what your moral code — your "three laws of robotic cars" — pans out to be. See where you draw the line and how you rationalize who lives and who dies. And remember, while this is just an interesting experiment, the answers that developers come up with to these questions won't just be lines of code. They'll become a part of the social contract as long as self-driving vehicles exist. In memory of Innocent Jimmy. self-driving cars ,ethics Opinions expressed by DZone contributors are their own. {{ parent.title || parent.header.title}} {{ parent.tldr }} {{ parent.urlSource.name }}
The Versatility and Functionality of Batch Ovens for Different Industries The Versatility and Functionality of Batch Ovens for Different Industries Aside from their importance in the domestic sector, ovens have industrial functions; however, ovens that perform high end processes are more complicated with temperature controls and a range of temperatures that can change the physical and chemical composition of substances.  When the temperature reaches a predetermined amount of heat in the curing ovens, either powder coating or curing is realized; a prerequisite in the preparation of metals before they are subjected to subsequent processes. What are batch ovens? Batch ovens are similar to the kitchen equipment used for baking bread and cooking; however, the batch ovens can produce relatively larger quantities for a short period of time. These kinds of ovens are usually found in big bakeries and supermarkets where unbaked bread usually passes through a conveyor belt to reduce manual handling. The batch ovens involve varying temperature but almost always it transforms the product to the desired state without losing all of its moisture. It is the function for which it is made for that makes the batch ovens highly different from other industrial ovens that totally eliminates all moisture content. Moisture in the material has a negative effect in the desired output hence the need for the industrial drying oven. The other functions of batch ovens aside from baking large volume of bread While batch ovens are certainly connected to bread and baking, it has other industrial functions like curing, drying, sterilization and other critical applications for different materials. Usually cabinet-like, the batch ovens can be used for clay products for high-speed drying. The cabinet-like batch ovens are smaller compared to walk-in or truck-in ovens that are used for industrial applications. The products that require processing in the batch ovens are brought in either through conveyors, racks, carts or trucks. When conveyors are used, large volume of materials is conveyed immediately throughout the process without need for manual intervention. It is only when there is a small volume required, that materials for processing can be conveyed manually. Industrial ovens and their functions for different manufacturing processes Manufacturers always have a need for industrial ovens to simplify the job of eliminating moisture or drying, preheating, laminating and activating adhesives. The equipment is not only crucial for high volume baking since it is a necessary tool for electronics, semiconductors, food manufacturing and chemical processing. With the controlled temperature, the desired state of the material is easily reached before it is used in production. For example, at a given temperature, food is sterilized and made free from contaminants hence making the processing a lot easier without compromising on quality. Industrial ovens typically get heat through convection or infrared radiation. It produces a balanced temperature throughout the equipment to accomplish ideal outcomes without any variations. However, the ideal oven to suit your industrial requirements may vary according to the specific applications that you require. There is a great demand for the industrial ovens because of their high performance and the different functions that simplifies the job. The best kind thereof is the industrial oven that exactly satisfies all your production requirements.   What You Need To Know About The Automatic Train Wash System An automatic train wash system is equipment specially designed for cleaning trains. Such a system is completely automatic and is devoid of any human control. Programmable Logic Controller commonly known as PLC is what is used to automatically control this equipment. The cleaning of trains by an automatic train wash system is normally done in stages. The first is the pre wash stage. This is where the train is soaked by spraying water on it .Stains of mud, smoke and dusts are soaked by nozzles which discharge water at moderate pressure. This process is usually initiated by sensors mounted on the train. Stage two of the train cleaning process involves use of detergents. Soap and other cleaning fluid is pumped and mixed with water. Since this process is automated and involves chemicals, the pipes and containers used are made using stainless steel. This makes it possible for the system to use liquids of a wide range of pH. Additionally, brushes are placed strategically on the train parts. This makes it possible to clean a wider area. Water mixed with detergent is sprayed over the brushes. Parts below the train are washed by use of high pressure nozzles which spray both water and detergent. Most automatic train wash systems come with two banks. These are water and detergent storage locations. This is an important feature because cleaning process of the train will not be stalled if one bank is under repair. Even when a train uses an automatic washing system, it can still work manually. Automatic mode means the train works fully without any human intervention.However, there are instances when the train cleaning has to be initiated by a person. A good example is when the train is too dirty and there is a long period before the next cleaning time. Due to its complicated nature in design, an automatic train wash system requires expert maintenance in terms of regular testing and repair. Toronto Plasma Cutting Technologies and Why They Matter In Toronto, plasma cutting is a necessity in many industrial markets. Plasma cutting is an advanced laser technology that cuts metal and steel sheets without the hazard of having any debris or pieces leftover. For many industrial companies in Toronto, plasma cutting is the best technology for manufacturing metal or steel products that require precision and specificity. Machines such as computerized numeric cutting systems allow for exact measurements as they are input into the computer that calculates and cuts the metal sheets exactly to your specifications. Plasma cutting involves the blowing out of inert gas through a nozzle. There are many specialized machines in Toronto – plasma cutting machinery even moves fast enough to ensure that melted metal flies away and doesn’t create uneven or rigid edges. For Toronto, plasma cutting technologies are vital for the production of many goods such as: • Vehicle parts • Gardening tools • Aerospace components •  Billets • Bars • Tubes • Plumbing essentials There are also a variety of plasma cutting machines including: • Pilot Arc Type • HF Type • CNC Type • DC Type • TIG welders Toronto plasma cutting grew in popularity in the 1980s and continue to grow as the leading choice for metal cutting technology on the market. Die Cut Foam Inserts Currently, there is a greater industrial development on demand to meet the need of the societies. This development has put into consideration both domestic and external industries. This has been eased by the readily available foams of different categories. The die cut foam inserts have been voted for as it has outdone the other related forms in consideration to its outstanding benefits over the others. The application of die cut foam inserts has gradually increased the chances of getting higher quality products in the current markets. There are Kristoform companies who both educate the interested people and also manufacture the products on their behalf. In general, die cut foam inserts have focused greatly on cases which are of wider varieties. These cases offer maximum protection for goods on transit and gadgets among other products. They are graded in categories and made to full products to meet the expectations of the customer. There are individuals who handle these tasks in homes using simple machinery and lesser techniques. They are known to produce high quality and durable products though they are challenged by tough competition in advanced industries. Among the main benefits is the protection they offer to the users’ goods. This has in turn boosted the safety of touring with less chance of theft since they do not display the content inside with a good example being a suitcase, among others. They also look beautiful and outstanding bringing an effect of pride when traveling for either short or long distances. They fit with the commodity in terms of shape and size. There are many categories of die cut foam inserts which are selected depending on the interest and fit of the customer’s product. This also moves along with color choice. They are durable and long lasting die cut foam inserts. They offer maximum services without wearing out before the intended time. By valariearthur A Beginners Guide to Metal Cutting Bandsaw A metal cutting bandsaw is a powerful tool that enables metalworkers cut metals into its desired shapes and lines. It easily allows one to cut curves for decorative purposes and also in creating piping for different applications. There are different tools used for working on metals but a metal cutter is one of the most versatile equipment that you can use. It is simple equipment yet it requires proper care and handling techniques for your safety and for the tool to last longer. If you are a beginner on using this tool, take a look at the following safety tips: • Keep your eyes protected. Before starting on a metal cutting band saw, make sure that you wear safety glasses or goggles. The tiny particles coming from the metal could get to your eyes and if the band saw blade accidentally snaps, your eyes remain protected. • Choose the right band saw blade for your intended application. There are different metal cutting bandsaw blades. There is one for cutting angles and curves which is typically a narrow blade. If you intend to cut straight lines, a wider blade would be most effective. Narrow blades are easier to work on details and it allows you to get control over the tool. • Changing blades. When changing the blade, make sure that you totally turn the band saw off. For added precaution, unplug the tool from the electric outlet. This way, you can accidentally push the switch on without causing any harmful injury. • Adjusting the blades. Before starting off, adjust the knob to put to the blade on your ideal tightness. Make sure that the blade is not too tight or too loose. Setting the metal cutting bandsaw blade too tight could damage the saw while setting it too loose could make the blade shaky. This could be dangerous since the blade could slip while you are working. • Saw guide. Every band saw comes with guide. It keeps the blade from getting jammed into the metal or material that you are working on. Make sure that the guide is situated at about ¼ of an inch from the metal or material. • Create patterns. To get the right cut and to guide you with your work, draw patterns. You can use chalk on metal while a pencil is suitable for woodworks. • Find a conducive work area.  A suitable work area is important especially if you intend to work on large metal pieces. Clear the area from obstructions and be sure that it is not easily accessible by children or pets. A fitting work area is one that is well ventilated and secluded to other household since working can create noise and other inconveniences. • Cutting metal. When you are ready to use the tool and cut a metal, turn the metal cutting bandsaw on. Wait until it gets to its full speed before you start using it. Keep your hands and fingers away from the tool to avoid injury and accidents. Valve Assemblies Have A Variety of Purposes Valve assemblies are vital for many reasons. Primarily, they are preventative devices. They have been used to help prevent water contaminations by avoiding backflow so that unwanted chemicals or toxins cannot backwash into the main supply – they serve to reduce the prevalence of pollution in portable water supplies. We can see how this can be extremely valuable. Valve assemblies can also be used for air brakes on vehicles and even for back pressure and back siphonage prevention. They are not suitable, however, for hazardous applications. Valve assemblies are used for lesser dangerous purposes such as gas or fluid flow control valves or internal combustion engine valves. Valve assemblies can come in a variety of different sizes – from small and compact to larger valves for bigger industrial purposes – making them valuable for a number of purposes. Furthermore, to ensure their efficacy, most manufacturers check and double check their functionality ensuring that they work properly and will not fail. Valve assemblies are an important component for many industries including the car manufacturing industry to even sprinkler industries. The preventative methods that they allow can be used for many purposes and their ‘double check’ safety feature is what makes them popular in the industrial markets. Why You Might Benefit From Pneumatic Actuators Pneumatic actuators convert energy into mechanical motion. This energy usually comes from compressed air. This is a vital technology, especially in a world that is trying to recycle and preserve as much energy as possible, as a result not exploiting valuable resources. Pneumatic actuators usually consist primarily of very few parts including a piston, a cylinder, and valves or ports. Depending on the type of pneumatic actuators you choose to use, the converted energy can be either linear mechanical motion or rotary mechanical motion. Some makes and models of pneumatic actuators include the following features: • Specialty actuators that combine rotary and linear motion—frequently used for clamping operations • Tie rod cylinders • Rotary actuators • Rodless actuators with magnetic linkage or rotary cylinders • Rodless actuators with mechanical linkage • Pneumatic artificial muscles • Vacuum generators • Grippers Each individual part that makes up pneumatic actuators plays a key role in the process. Pistons ensure that the compressed air moves where it’s supposed to by pushing down a diaphragm that in turn moves the valve that is connected to the actuator itself. Valves can also use different measurement systems to see how much compressed air is being used or passed through. Pneumatic actuators are very popular and are constantly used for a variety of purposes. Check now to see if you could benefit from one! Why CNC Plasma Cutting Is Safer and More Accurate Than Ever CNC plasma cutting is the process of cutting steels and metals of a variety of difference thicknesses.  CNC stands for computer numerical controlled cutting, which is why precision and dependability are guaranteed when using a CNC machine to do plasma cutting. What makes CNC plasma cutting unique is that it doesn’t require tip contact which, as a result, lowers the chances of shield damage. CNC plasma cutting machines can cut up to 150mm thick materials, giving this type of plasma cutting an advantage in the market. A variety of different steel and metal manufacturers depend on the CNC machine for precise cuts made exactly as they want them. Plasma cutting came about in the 1960s and over the years has evolved to become an advanced and computerized technology. What makes this technology unique is that there are no metal shards or debris (like in traditional metal cutting methods) and as result is safer both for your health and your eyes. Although special UV goggle protection is still necessary, there is absolutely no risk of getting any metal pieces in the eyes (which are often too small to even notice or feel, but can be harmful in the future when getting an MRI for instance). Why Custom Foam Products Are Vital For Your Packaging Needs If you are a manufacturer and looking for the safe delivery of your products then you must use safe packaging for your products. Different kinds of packaging materials are available in the market. Foam packaging must be used by you because it can protect your goods in an excellent way. Different kinds of custom foam for your products’ packaging include custom cut, instant foam, bags, peanuts, corners and sheets. Custom foam products provide good protection to your goods. Special machines are used for the cutting of foam, so that products could be fitted perfectly inside the packages. Different kinds of custom foam products are available in the market. These kinds include polyurethane, high density, evlon, high resilience foam, latex rubber foam, supreme, rebond, memory foam, closed cell foam, and dry fast foam. Polyurethane foam can be used as custom foam for the purpose of filling, packing, mattress topper, shipping and costumes. It is low quality foam and there is no guarantee of this product. High density foam can be used for boats, bay windows, sofa cushions, mattresses and camping pads. This foam can also be used as custom foam for many products. Evlon is another kind of foam that is mostly used for upper scale furniture mattresses and seating. High resilience foam can be used in expensive furniture. It is available in different densities and a minimum of 2.5 0 is available in the market. Latex rubber foam is long lasting foam. Its density ranges from 3 lbs/ft³ to 15 lb/ft³. Supreme foam is excellent custom foam. It is mostly used for the casings of computers and cameras. Its density ranges from 1.75 to 1.85. Custom foam products are available in different shapes. These shapes include cylindrical shape, rectangle shape, square shape, prism shape, etc. when you choose a shape, you have to ask for the type of foam and dimensions of a shape then you could be able to get a unit price of that custom foam shape. By valariearthur Everything You Need To Know About Band Saw Blades Types and functions of Different Band Saw Blades Band saw blades are one of the essential tools needed in woodwork or metal works. Without the blade, one cannot possibly cut the items into pieces and shape them according to the woodworker’s design. The band saw is a powerful tool that makes woodworking easier. It is commonly powered by water, wind, animal power, electric motor or steam. Although a band saw is generally used to cut ordinary wood or other materials with curved or irregular shapes, different types of blades are required to make the cutting of various shapes and materials easier. The three basic types of blades for band saw include the following: Carbide Tipped Band Saw Blades This is one of the sturdiest types of band saw blades. One can use it for a longer period and it does not easily break as it is wear resistant. A carbide band saw blade is proven effective even when used on hard to cut materials and even if the material is abrasive. Since a user is not required to change the blades frequently, the carbide tip band saw blade is considered to be cost-effective and it allows users to produce more while using the tool. The blade with carbide tips was invented by Simonds who is also the founder and maker of that popular brand for band saw blades of the same name. The blade is made by welding a ball of carbide on the tooth tip of the blade. Carbon Band Saw Blades This type of band saw blade is popular for its flexibility as it can be used at high speed. Carbon band saw blade is known to resist fatigue. It can be used on small wheel machines among other applications and in addition, band saw blades made of carbon are inexpensive thereby allowing you to replace blades as frequently as you need to. Carbon band saw blades are made out of high carbon steel and they are reliable when it comes to cutting wood, non-ferrous materials such as brass, copper and bronze. The blade is also applicable for cutting composition boards. Carbon band saw blades are available in four types; the furnwoodcarbon band saw blades, friction carbon band saw blades, hard edge carbon band saw blades and simet carbon band saw blades. Bimetal Band Saw Blades Compared to other types of band saw blades, a bimetal band saw blade is considered to be one with the longest life span due to its unique design. The teeth of bimetal band saw blade is made of steel making it come in high speed edge and resistant to fatigue. Because of these qualities, a bimetal band saw blade is known for its longevity even with rigorous and demanding applications. It can also cut different types of materials making it equally versatile in comparison to other types of blades. Extra Tips Before using band saw blades, be sure to check the tool every after cut to prevent malfunctions. Careless usage of the tool can be dangerous especially that the blades are sharp. Use the right types of gears and masks for safety reasons.
Pyramids of Giza Book Details Author  Mervyn L. Johnson Publisher  Leon Tunney-Ware & Mervyn L. Johnson Publication Date   September 24, 2012 Pages  90 Great Pyramid of Giza: Our book will reveal what's never been written before a blueprint packed with simple logical solutions on how the Great Pyramid of Giza was actually completed in a realistic timeframe of less than 7 years. To ensure the pyramid realised its purpose, pharaoh Khufu's final resting place. Pyramid of Giza Facts: The Great pyramid of Giza, supposedly took 20 years to build. This estimated timeframe appears logical on the surface yet when the pyramid of Giza is analysed its purpose proves this timeframe impractical. The most important fact that hasn't been considered is the purpose of the Egyptian Pyramids, tombs, in which to secure the Pharaohs body and facilitate their soul's journey into the afterlife. "Pharaoh Khufu" , with his beliefs and religion created a monument that stands today and is seen as one of the 7 wonders of the world. Their religious beliefs were the governing factor that created the essence that dictated the driving force and the timeframe throughout the whole project from beginning to end. You cannot imagine the consequences on society of the times if they failed to complete the Pharaohs resting place before his death. It's illogical to accept the luxury of a 20 year timeframe or longer when you consider the fact that the average life expectancy of an ancient Egyptian was 35 years. Encompassing this factuality it's inconceivable to work with a 20 year timeframe so there had to be practical solutions that shrank this timetable dramatically. Realistically the pyramid had to be completed within a timeline between 3 to 7 years. Throughout the past 4,500 years people have marvelled at the majestic monuments the ancient Egyptians constructed. Countless theories have been documented, a myriad of investigations undertaken to determine and establish how the pyramids were built. What were their methods? What tools did they use? How many workers were required? The analysis continues up to this present day. Yet one of the most compelling questions that takes precedent is the purpose of the pyramid and the life expectancy of the pharaoh Khufu. One of our readers comments: Customer Reviews
Archaic and Classical Greece Archaic and Classical Greece : A Selection of Ancient Sources in Translation By (author)  , By (author)  List price: US$499.99 Currently unavailable Add to wishlist AbeBooks may have this title (opens in new window). Try AbeBooks Product details Table of contents List of figures; List of maps; Preface; Conventions and abbreviations; Glossary; Weights, measures, money; Introduction I: Greek society; Introduction II: the sources; Part I. The Archaic Period: 1. The development of the polis and its values; 2. Exploration and colonisation; 3. Tyranny; 4. The institutions of the polis; 5. Sparta; 6. Athens; 7. Kleisthenes and the demos; 8. Diversity and unity; 9. The Persian Empire; 10. Persia and the Greeks; Part II. The Fifth Century: 11. The development of Athenian democracy; 12. The Athenian Empire; 13. Athenian political life; 14. The culture of Athens; 15. Economic and social developments in Athens; 16. Athens and Sparta in the Pentekontaetia; 17. The prelude to the Peloponnesian War; Part III. The Peloponnesian War: 18. Spartan strategy in the Archidamian War; 19. Athenian strategy in the Archidamian War; 20. The uneasy peace, 421-416; 21. Athenian politics during the war; 22. Athens and Sicily; 23. The Spartan offensive; 24. The defeat of Athens; 25. Post-war Athens, 404-399; Part IV. The Fourth Century: 26. Spartan imperialism; 27. The resurgence of Athens; 28. Sparta, Athens and Thebes; 29. The polis and its economy; 30. War and revolution; 31. Athenian politics and society; 32. Thessaly and Persia; 33. The rise of Makedonia; 34. Philippos and Greece; Chronological table; Table of rulers; Index of ancient sources; Index of Greek words; Index of names; Index of more
Dismiss Notice Dismiss Notice Join Physics Forums Today! Projectile motion 1. Feb 17, 2006 #1 A stone is prjected with a velocity of 100m/s at an elevation of 30 degrees form a tower 150m high. Find: a. the time of flight ans:12.(4) secs b. the horizontal distance from the tower at which the stone strikes the ground ans: 1.0(8) x 10 3 c. the magnitude and the direction of the velocity of the stone striking the ground. Ans: 114m/s at 40(5) degrees below horizontal 2. jcsd 3. Feb 17, 2006 #2 http://photo-origin.tickle.com/image/69/3/7/O/69373005O558414436.jpg [Broken] Last edited by a moderator: May 2, 2017 4. Feb 17, 2006 #3 User Avatar Science Advisor Homework Helper You set up two equations, as phucnv87 did - one for the horizontal (x) and one for vertical (y). Edit: If you look at the x equation and the y equation, you might notice that they're really the same equation - in x, your start position was 0, so it was omitted; your horizontal acceleration was 0, so that part was omitted, as well. a) You use the quadratic equation to solve the y equation for time. Alternatively, you could use the polynomial function on your calculator, if it's permitted (you really should learn the quadratic equation, so sometimes you're not allowed to use advanced calculators). Alternatively, you could solve your quadratic equation on a slide rule (it works as well as the poynomial function on your calculator, but takes learning an entirely new skill on an instrument that's not made anymore). b) Take your answer for 't' and plug it into the x equation to find the horizontal distance the object travels before striking the ground. c) The only thing phucnv87 left out was how to determine your final velocity: [tex]v_f=v_i + at[/tex] Your initial horizontal velocity is [tex](100 m/s) (cos 30)[/tex] and your initial vertical velocity is [tex](100 m/s)(sin 30)[/tex]. You have no horizontal acceleration, but do have a vertical acceleration. Use the 't' value from a and solve for your x velocity and for your y velocity. That gives you your velocity vector in Cartesian coordinates. Use the Pythagorean Theorem to find the magnitude of the velocity vector. The tangent of your velocity vector is equal to y/x (take the arctangent of y/x to find your direction). Alternatively, you could enter your velocity vector into your calculator as a complex number, with the x component being the real part and the y component the imaginary part. An advanced calculator will have a function that will convert a complex number from the (a + bi) form to polar form, giving the magnitude and direction with no work at all (which is why your class may not allow you to use an advanced calculator). Last edited: Feb 17, 2006 5. Feb 19, 2006 #4 thank you for helping me with my work Similar Discussions: Projectile motion
Origin of Life…From a Comet? As I mentioned from the previous post on the Oort Cloud there are some scientists who are proposing that the components of life traveled on a comet from somewhere deep in the universe, possibly from the Oort Cloud, and then the comet collided with the earth generating a ton of power, and Bang! life was born. As cool as this sounds, it seems pretty science fictiony to me. First, science has almost proven that the right kind of oxygen was not readily available in the universe to form life. Second, even if it was, I have a hard time seeing a bunch of precious molecules and atoms riding on the front of the comet surviving. Comets are super cold. Plus they go very near the sun and are exposed to extreme heat (granted if it hit the earth before it started swinging around the sun…). Then if the comet runs into small rocks and such, the life particles may have a hard time avoiding them. Third, even if they did survive the odds of a comet hitting the earth are super low. One of the most probable rocks in space that could hit the earth is a rock that has a 99.99% chance of missing the earth. And that is one of the few things that will come close to the earth.* It would take billions of years just for a comet to hit the earth let alone for life to evolve… Finally, if the comet did hit earth how would the life survive the impact? Not only that, but how would the earth respond. Scientists today say that if a large mile wide rock were to hit the earth the results would be devastating. Even if it were smaller (which reduces the odds of it hitting the earth) the result would be a lot greater than the effects of an atom bomb. How would simple life survive these results? As you can see, I think it a very outlandish idea much similar to Michael Ruse’s explanation that life rode on the back’s of crystals** This is just one of the many ideas that Atheists are having to postulate in order to maintain their belief that there cannot be a God and that life must have originated by spontaneous generation and then evolved. **- See explanation for the origin of life from Michael Ruse in the movie Expelled. This entry was posted in Science and tagged , , , , by Hudson. Bookmark the permalink. About Hudson Leave a Comment WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s
Know Your Bubbles Know Your Bubbles Author: Apriena Pummer Date created: 2014/11/05 All about Bubbles When it comes to sparkling wines, it is all about the bubbles … literally! The bubbles are referred to as the mousse of the sparkling wine and they will give you a clue as to whether the wine is Champagne or Methode Cap Classique (MCC) or just a sparged sparkling wine. If the bubbles in your glass start off almost invisible and then gradually expand until they reach the surface (similar to beer), then chances are the sparkling wine in question would have been bottle matured with little extra yeast and sugar to make the bubbles. This means that the bottle would either be a Chamapagne, but then only if it originates in Champagne in France, or the South African equivalent – Methode Cap Classique or MCC. If the bubbles are all uniform, similar to what is found in carbonated soft drinks, the chances are that it was sparged. Sparged? A term used to distinguish sparkling wines that were literally just carbonated. The wine is placed in large tank and then carbon dioxide is injected into the wine under pressure. The Champagne or MCC South African equivalent is created by a lengthy and meticulous process. It all begins with a base wine, usually chardonnay or pinot noir blend, that is then bottled with an addition of yeast and a little sugar for a secondary fermentation. These bottles are crown capped with a closure similar to beer caps and placed on riddling racks (special shelves with holes for the neck of the bottle). The extra yeast goes to work to create the magical bubbles for the first three weeks and then die. The sediment of the dead yeast particles, the lees, adds a delicious biscuit type characteristic to the wine for the remainder of the two years of bottle maturation. After aging, the bottle is manipulated, either manually or mechanically, in a process called “remuage”, so that the lees settles in the neck of the bottle. This process requires the bottles to be rotated ever so slightly each day in the riddling rack. After chilling the bottles, the neck is frozen, and the cap removed. The pressure in the bottle forces out the ice containing the lees, and the bottle is quickly corked to maintain the carbon dioxide in the wine. Which is better? The answer…It all depends on the occasion. MCCs or Champagnes fetch much higher prices due to the labour intensive and meticulous process endured to create them. These wines are reserved for very special and decadent occasions. The spurged sparkling wine is usually cheaper and appreciated on a more relaxed occasion. For both types of sparkling wine, the base wine is truly a fundamental component that will heavily influence the final product. At Boucheron we make sure to select the finest of both styles and carry Methode Cap Calssique, imported Champagnes and sparkling wines.
The Pocket Guide to Sheds By: Gordon Thorburn ImageIn this fun little book, the author explores the history of sheds and the culture surrounding them. He explains that for sheds to appear, a highly developed civilization must be in place. Sheds have been used through the ages as storage areas and animal shelters. A culture of Sheddists traces their roots from the dawn of civilization. Today, they retire to their sheds as places of creativity or solitude. As gardeners, most of us have sheds where we store rakes, shovels and other tools, but many of us also incorporate sheds into the theme of our gardens. We proudly display our sheds and use them for any number of activities. From seed starting, to building containers for our plants, our sheds are a vital part of our gardening experience. The author takes us on a delightful tour of British sheds and their owners. We see everything from artist studios to creative little backyard pubs. Sheds are undoubtedly the original ‘man cave', havens from cell phones, computers and television, or... a comfortable place for friends to gather to watch the ball game.Image Shed furnishings tend to be casual and reflect the individualism of the Sheddist who decorated it. Sheds house their collections, and in some instances, are the collection. Many Sheddists find they cannot stop with one shed. Creative carpenters build sheds out of everything from rescued boats, to signal boxes for steam locomotives. Proud British Sheddists show off their individuality and their sheds are singular examples of human creativity. They anticipate the need for more storage space well in advance of actual things to store. The number of items needing storage, generally expands along with the shed. The author quotes Pickford's Law, which states: "The amount of stuff expands to fit the space available." It seems that some things are the same, no matter what part of the world you hail from. ImageThe author admonishes would-be garden Sheddists to make their shed twice as big as they think it should be, to accomodate things that you can't throw away, such as "pieces of copper tubing, celing roses,broken sprayer parts, bags of fertilizer granules that have solidified into concrete,oyster shells,ancient runner bean seeds in a tobacco tin and the pretty glass marble that you found" It sounds like he's had a peek into my shed! Gardeners are Sheddists at heart and it should be fun to see sheds from around the world. In honor of this creative little book, show us your sheds! Find this book and similar titles in the Garden Bookworm.
Friday, December 5, 2008 experimental music Experimental music is a process, not a style. It can be compared to the scientific process used to probe the possibilities for solving a problem. Experimental music sets its goal far in the distance, if it has any goal at all. The primary goal is to keep the experiment alive and moving by playing music with no considerations other than the moment. Musical methods may be changed or improved upon as the nature of the moment or the perceived distant goal becomes more evident. Different styles or instruments may be adopted or abandoned at the drop of a hat. There can be any number of reasons for this, but most importantly excessive thought or pausing is avoided. All that rises eventually converges and then separates again into its original components. An open mindset and love for music as a form of communication helps open up the unlimited possibilities that experimental music allows, but all music, no matter how practiced it is, is experimental to some degree. The process behind experimental music can be successfully applied to all aspects of life. No comments:
CSIS 208 Assignment 1 – PROGRAMMING Create a Visual Basic form like the one below that allows the user to press buttons to change the background and foreground colors of the textbox and update a text box. Your form should have 3buttons, 1 label, and 1 textbox. Name the initial form frmAssignment_1 and put Assignment #1 in its title bar. 1. Name the buttons btnUpdateFont, btnUpdateVerse, btnVerify. The tab order of the buttons should be Update Verse, Update Font, and Update Verify.  The tab should not go to the textbox.  The form should open with the Update Verse button having the focus. 2. Create access keys for the buttons with the “U” underlined for the Update Verse and the F underlined for the Update Font buttons.  Create an access key for the “V” underlined on the Verify button. 3. Name the textbox txtVerse and enter into it the Bible verse from Phil 4:13 as depicted below. The font of the textbox should be something other than the default Microsoft Sans Serif.  The text should be center aligned. 4. When the user clicks the Update Font Button, the background of the textbox should become blue (use Color.Blue), the foreground of the textbox should become red (use Color.Red) and the Background color of the form should become whte (use color.white) 5. When the user clicks the Update verse button, Your favorite verse should be displayed in the txtverse text box. 6. A label should be created called lblVerify.  The label should be created but not show on the load. 7. When the user clicks the Verify button the label text should now be visible to the user.  The label should include your name and your teacher name and the date you finished your project..  **This is a main requirement and the assignment will not be accepted without this detail. Here’s the SOLUTION This entry was posted in Homework Help. Bookmark the permalink. Comments are closed.
Shitoryu Karate Canada – Shitoryu Karaté Canada Kihon, Principles of Basic Techniques    The basic techniques of blocking, punching, striking and kicking are both the beginning of karate and the ultimate goal. Although only a matter of months may be sufficient to learn them, complete mastery may not come even after a lifetime of training. The student must practice regularly, with maximum concentration and effort in the execution of each and every movement. This will not be sufficient, however, unless the techniques are scientifically sound and the training systematic and properly scheduled. To be effective, training must be conducted on the basis of correct physical and physiological principles. It may come as a surprise to many to know that the techniques created and refined through long and continuous practice by the early karate student have been found to accord with modern scientific principles. And the more they are studied, the more this proves to be true. This is not to say that there are no unsolved problems, but these must await further study. Further refinement of karate is quite probable, as techniques are analyzed in an unceasing effort to improve them through a scientific approach. Tanzadeh - Sokuto Yoki Geri In order to benefit from his training, the student should have a good understanding of the following primary points. Form (katachi) Correct form is always closely related to the principles of physics and physiology. Prerequisites of correct form are good balance, a high degree of stability and the order of movements of each part of the body, since movements are made in quick succession in a short period of time. This is specially true in karate because punching and kicking are vital to the art. The need for good balance can be seen particularly in kicking, where the body is usually supported by one leg. To withstand the great impact when a blow is landed, stability of all joints in he arms and hands is necessary. With changing situations and different techniques, the center of gravity changes, shifting to the left, right, front, back. This cannot be done unless the nerves and muscles are well trained. Again, standing on one foot for too long will open one attack, so balance must be constantly shifted from one foot to the other. The karate student must moth avoid giving an opening and be prepared for the next attack. Breathing (kokyo) Breathing is coordinated with the execution of a technique, specifically, inhaling when blocking, exhaling when focusing technique is executed, and inhaling and exhaling when successive techniques are performed. Breathing should not be uniform; it should change with changing situations. When inhaling, fill the lungs full, but when exhaling do not expel all the air. Leave about 20 percent in the lungs. Exhaling completely will leave the body limp. One will not be able to block even a weak blow, nor will be able to prepare for the next movement. Kiai (spirit-meeting or energy-shout) The kiai is the shout at the end of a technique and in conjunction with the expulsion of air (Kime) will maximize the power of the movement. It also had the effect of surprising an opponent and may momentarily paralyze their response. The concept of KI is at the roof of all martial arts and Japanese philosophy. KI is the spirit and energy along with the breath meeting AI at the moment of impact. Developing your KIAI is very important. It is not just a shout or a screech from the throat. If you put your hand on the stomach and cough you will feel the muscles of your abdomen contract. This in fact is the start of your KIAI. First understand the principles and the breathing method Kime as explained, then replace the biting action with your shout ‘KIAI’. It will start as a growl from the pit of the stomach but when completed the sound produced will vary from one to another. Kime (focusing) Without breath there is no life. Without Kime your karate is lifeless. It is essential that you understand that all karate techniques must be performed with Kime. Kime is the focusing of mental energy, breathing and physical force culminating in a single striking point. Karate is not whole without all these elements. The key to Kime is the breathing. Any physical activity requires correct breathing, witch works with the body not against it. The grunts and groans athletes make are not for effect; a student is using his breathing along with his muscles to explode with maximum effect, producing the most potent force possible. No effort is wasted. There are various methods of breathing, but the basic method for beginners is: ‘One breath one technique’. In a relaxed but controlled manner breathe out through a slightly opened mouth, complete the breath and technique at the same moment closing your mouth instantly as if biting. Simultaneously tense the abdomen, locking the rest of your muscles for a fraction of a second before relaxing and breathing in normally. As you tense and lock the muscles of the abdomen, the buttocks should be clenched so that the abdomen lifts up and forward. Hips (Koshi) The hips are located at approximately at the center of the human body, and their movement plays a crucial role in the execution of various types of karate techniques. The lower abdomen, particularly the rotation of the hips, which adds to the power of the upper body, creates the explosive power of the focusing blow. Besides being a source of power, the hips provide the basis for a stable spirit, correct form and maintenance of good balance. In karate, the advice is often given to “punch with your hips”, “kick with your hips”, and “strike with your hips”. Power and Speed Power accumulates with speed. Muscular strength alone will not enable one to excel in the martial arts, or in any sport for that matter. The power of the Kime (Focusing) of a basic karate technique derives from the concentration of maximum force at the moment of impact, and this in turn depends greatly on the speed of the blow or kick. The punch of a highly trained karate student can travel at a speed of thirteen meters per second and generate power equivalent to seven hundred kilograms. Though speed is important, it cannot be effective without control. Speed and power are increased by utilizing the pairing of forces and reaction. For this purpose, an understanding of the dynamics of movement and their application is necessary. Concentration and Relaxation of Power Maximum power is the concentration of the strength of all parts of the body on the target. Not just the strength of the arms and legs. Equally important is the elimination of unnecessary power when executing a technique, which will result in giving greater power where it is needed. Basically, power should start at zero, climax to one hundred on impact, and immediately return to zero. Relaxing unnecessary power does not mean relaxing alertness. One should always be alert and prepared for the next movement. Strengthening of Muscular Power Understanding of theory and principles without strong, well-trained, elastic muscles to execute the techniques is useless. Strengthening muscles requires constant training. It is also describe to know which muscles are used in witch techniques. To the extent that muscles are used specifically, greater effectives can be expected. Conversely, the less muscles are used unnecessary, the less the loss of energy. Muscles operating fully and harmoniously will produce strong and effective techniques. Rhythm and Timing In any sport, the performance of a top athlete is very rhythmical. This applies also in Karate. The timing of various techniques cannot be expressed musically, but it is nonetheless important. The three principal factors are the correct use of power, swiftness or slowness in executing techniques and the stretching and contraction of muscles. The performance of a master is not only powerful but also very rhythmical and beautiful. Acquiring a sense of rhythm and timing is an excellent way to make progress in the art. Hiki te (The withdrawing Hand) The withdrawing hand leads the rotation of the hips. When executing a technique, the withdrawing hand must move strongly, quickly and sufficiently. If not, the technique will not reach its maximum effectiveness. Another important point is that both arms must move at exactly the same time. If the technique is being executed with the right hand, it is usual for the left elbow to be drawn straight back. When striking in a wide arc, the withdrawing arm should also appear as a wide arc. In other words, if the technique is executed in a straight line, the other arm withdraws in a straight line. If the technique is arc like, the other arm travels in an arc. It is not too much to say that with excellent techniques are born strong, fast withdrawing arms.
Excavating “The Last Empire”: Discussing Soviet History and Global History with Serhii Plokhii Why did the Soviet Union collapse? Since the USSR formally ceased to exist on December 26, scores of books have been written on the Soviet dissolution, an event that resulted in the creation of fifteen new states across Eurasia and that current Russian President Vladimir Putin famously called “the greatest geopolitical catastrophe” of the twentieth century. In his new book, The Last Empire: The Final Days of the Soviet Union, Harvard professor Serhii Plokhii offers a definitive account of the end of the Soviet state. Serhii Plokhii's latest book, "The Last Empire" Serhii Plokhii’s latest book, “The Last Empire: The Final Days of the Soviet Union” Based on research in archives in Russia, Ukraine, and the United States interviews with high-level officials, The Last Empire explores the decisions taken in Moscow, Washington, and various Soviet republics between 1989 and 1992 that led to the dissolution of the Soviet experiment. Standing at the center of his story are tensions between Soviet General Secretary Mikhail Gorbachëv and élites in the Ukrainian SSR. Already weakened by pressure from Russian President Boris Yeltsin and an abortive coup, Gorbachëv and his visions for a revitalized Soviet confederation were doomed by the decisive results of a December 1991 Ukrainian referendum in favor of independence. The account of The Last Empire, published by Basic Books this May, might surprise to American readers, many of whom are led to believe that it was decisive action by U.S. President Ronald Reagan and his successor, George H.W. Bush, that led to the collapse of the Soviet Union. But as Plokhii shows through exhaustive research–and interviews with important figures like Brent Scowcroft–the Soviet collapse arose far more due to internal Union dynamics than American foreign policy. By the late 1980s, as Russian–as opposed to “All-Union” Soviet institutions–were granted more power and authority, provincial upstarts like Boris Yeltsin and the Russian reformers around him were able to challenge Gorbachëv and the Communist Party apparatus from the very center of the Soviet Union itself–from Moscow, and from Russia. Faced with challenges not just from Yeltsin but nationalist movements, in particular in the Baltics and the Caucasus, Gorbachëv responded by trying to re-invent the Soviet Union as a “Union of Sovereign States.” But these plans, like alternative plans to dissolve and reincorporate the empire as a “Slavic Union,” always hinged on the inclusion of Ukraine, the second-most populous and second-most important Republic within the Soviet system. Once the botched coup of August 1991 destroyed what was remaining of Gorbachëv’s political authority–and that of the hardliners who sought to replace him and save the Soviet system–the overwhelming December 1 turnout in favor of total Ukrainian independence nixed all hopes for both a revived Soviet Union as well a Slavic Union. A week later, the leaders of Russia, Belarus, and Ukraine–sidelining Gorbachëv–met at a hunting estate in western Belarus to dissolve the Soviet system, leaving only a vague “Commonwealth of Independent States” in its wake. The parallels with today are all too eerie. Following the choice of Ukrainians to cast their lot with a European Union Association Agreement–and not Moscow’s project of a “Eurasian Union” already including Belarus and Kazakhstan–2014 seems to mark the completion of a Ukrainian turn away from empire that began in 1991. The irony of Plokhii’s story, however, is that even as the Ukrainian bid for independence permanently derailed hopes for Soviet reform, it was Russian nationalists like Yeltsin who stood in a position to reap the political capital from the Ukrainian referendum. Today, as Ukraine seeks to turn toward Europe–but faces incredible challenges from a Russia that has both annexed the Crimea and supports rebel movements in Ukrainian territory–understanding the long path taken to 2014 matters more than ever. "The Last Empire" author Serhii Plokhii, professor of History at Harvard University and Director of Harvard's Ukrainian Research Institute “The Last Empire” author Serhii Plokhii, professor of History at Harvard University and Director of Harvard’s Ukrainian Research Institute Plokhii’s personal and scholarly background made him the optimal person to write this book. Born in the Soviet Union and raised in what was then the Ukrainian SSR, Plokhii trained as a specialist in Ukrainian history in one of the Soviet Union’s leading centers for historical scholarship at Dnipropetrovsk University. While originally trained as a specialist in early modern Ukrainian history, over the course of a career spent in Ukraine and Canada before becoming the Mykhailo Hrushevsky Professor of Ukrainian History at Harvard University in 2007, Plokhii has established himself as a scholar whose range spreads across centuries of Ukrainian history. His works prior to The Last Empire include books on the Cossacks, Ukrainian and Russian historiography, the Yalta Conference. No mere specialist on national history, however, Plokhii remains attuned to issues familiar to scholars of global history. Understanding why the Soviet Union–“the last empire,” as Plokhii aptly puts it–lasted so long, whereas European colonial empires collapsed decades earlier demands putting the Soviet experience in a broader global context, as well as questioning categories that may not apply to that Soviet imperial experience. Likewise, the nature of the Soviet collapse, hingeing as it did on questions of federation and sovereignty, forces us to probe the conceptual history of those categories. And as elements of the Russian far right and, indeed, Mr. Putin himself, proclaim that Ukraine is not a “real country,” or that some of Russia’s other neighbors never existed as a state, exploring the Soviet experience through these broader lenses is more urgent than ever. In this installment of Global History Forum, Toynbee Prize Foundation Executive Director Timothy Nunan sat down with Professor Plokhii at his office at Harvard to discuss his road to history, The Last Empire, and Soviet history as global history. GHF: Professor Plokhii, although you were born in Nizhnĭ Novgorod, you actually spent most of your childhood in Zaporizhia. What influence would you say your parents had on your historical interests? Were there any kinds of discussions around the dinner table? Even just the spatial, lived experience of growing up in Zaporizhia in the late 1960s and early 1970s? SP: Well, I’ll start with the family, and I’ll start with my father, who was a vivid reader of memoirs. Memoirs about the Second World War–of course, it was known in the Soviet Union as the Great Patriotic War–and then I was surprised to discover that I’m not unique in my generation to have a father who loved that kind of stuff. In Canada, in Europe, maybe less so in Europe, but certainly north America. Unfortunately, he passed away in 2009, but he was a person who not just read, but at the table, there would be breakfast, or dinner, or something like that–he would talk about it. So he shared what he read then, and the interest in history was there from the very beginning. And I would say that there was some aspect of international history along with that, in the sense that he spent part of the war in occupied Ukraine, in the parts occupied by Germans, by Nazis. And then, in 1944, they moved back to Kamchatka, so that’s where the family was before the war, and then they came to visit grandparents and were caught up in what was going on there. He toward the end of the war, he learned about it while working in Kamchatka as a radio operator and basically that was the effort known as Lend-Lease. Some of his relatives who would serve on the ships that were delivering Lend-Lease from the United States, so there was this understanding and this idea that the Second World War was not just Ukraine, was not just German occupation, but that there were Allies, there was the United States, Canada figured into this somehow. So those were conversations. Another type of discussions about history were grandparents, who remembered the days and again my family, they fled from the famine, they fled to the Far East. That’s how my father was growing up there. I remember that I found out the discussions so non-interesting, because I was going to school already, I was learning the official narrative–Bolsheviks, Lenin–and none of them were members of the Party, none of saw Lenin. GHF: This was an obscure family history, in other words, in your eyes. SP: Right. So they were repeating stories again and again. I now wish that I had stayed and listened–that was the real history. But in my eyes, this was irrelevant. What father was bringing was memories of [Soviet General Georgiĭ] Zhukov, and none of my grandparents were Marshals or anything. So that was in terms of family background. Further, in the 1970s, in Zaporizhia there was the return in some form of the cult of the Cossacks, since this was the homeland of the Cossacks. So there was that interest in history. And history of all different kinds. A rejection of one kind of history–people’s history, history coming from below that was not worth attention. Then there was the history associated with memoirs about the Second World War and would be only generals and Marshals who would get the right to write memoirs. And then this element of late 1960s and 1970s formal Ukrainian revival and Cossacks. So there was twentieth century history, there was the history of early modern Ukraine. So all of these things–I never thought about it before, but all of these things in some way got reflected in what I wrote, in my life. GHF: Moving on to undergraduate at Dnipropetrovsk, there you studied in the kafedra (faculty, department) under the historian Mikola Kovalskiĭ. What would you say was the significance of Kovalskiĭ. for higher education then? How did your eyes open as an undergraduate? SP: I came to the university with this idea that I would study very old-fashioned diplomatic history. So that’s what I was interested in, and the first paper that I was writing was on the British policy in Yugoslavia on the eve of World War II. And I got disappointed in the topic very soon. So, interest in diplomatic history was informed by the fact of the Cold War. There was Brezhnev, there was Nixon, and so on. But when you started reading diplomatic history the way it was presented, how it was published in the Soviet Union, it was so boring. My first encounter with it in this paper, the limited number of sources used … you’re in the provinces, not in Moscow, with no access, and in any case they wouldn’t let students work with the materials of the Soviet Foreign Ministry at that time. So it was a disappointment. So I looked around myself and I saw that there was a group of people who were working on things related to sixteenth and seventeenth century, to local and regional history. Some of them were doing work on the Cossacks, others were working on the sixteenth and seventeenth century. There were languages, the Polish language, and they were using microfilm. There was a group there, a professor–you wanted to be a part of that. That’s how I joined that group. The group was interesting in terms of its founder, who was, his name was Mikola Kovalskii. He himself came from Western Ukraine, for Volhynia. He grew up as a child in inter-war Poland. Polish, Russian, Ukrainian, Yiddish, all of these languages being around. He got his education in L’viv, Lvov, Lviu, Lemberg, and worked on sixteenth and seventeenth century history in particular, in a particular trend that became known as source studies. Source studies was a particular phenomenon. They were very popular in Europe and the Russian Empire at the turn of the twentieth century. It was positivism par excellence. Then, in the late 1950s and 1960s, after the 20th Party Congress [where Soviet leader Nikita Khrushchëv denounced Stalin’s cult of personality], it was revived. People like [Soviet historian Mikhail] Tikhomirov in Moscow. Historians who were trained in the old imperial tradition, and that was a niche where you could also work on themes that would be not directly affected by the Party line and changes in the Party Line. The deeper you go in the past, the more freedom you would get. And also within the parameters of Source studies, the critique of the sources and things like that, you can insulate yourself to the degree possible from the political and the ideological influences of the time. And that was also a person who was first and foremost a teacher. Someone who was interested in students, and students were interested in him. I was already a second-generation in his cohort of people, so I was really more attracted to his younger, to his former students who were wearing jeans at that time as a statement. Interested in rock, in western music. At the same time, he was interested in Ukrainian history and in particular early modern Ukrainian history. What happened between the time I was growing up in Zaporizhia, where there was this cult of the Cossacks, and I entered the university, was 1972, which was a turning year in Ukrainian history. The chief of the Party [Petro Shelest’] was removed on the charges of supporting nationalism, so something that was celebrated in 1971 became basically reactionary in 1972, and I entered university in 1975. So, in a sense, just after I thought I was moving away from political and ideological issues in the sixteenth and seventeenth century, I found myself in the very middle of these disputes again. This interest in the Polish period in Ukrainian history was something that was basically maybe tolerated, but not not welcome. So we had some degree of freedom, but we were also looked at with suspicion. What helped a lot was the fact that the University of Dnipropetrovsk had this extra-territorial status. It wasn’t under the Ukrainian Ministry of Higher Education, where the idea of fighting this ideological deviations, these national deviations, was at the top of the agenda. It was under the All-Union Ministry of Higher Education. They looked at us and said, “OK, those guys were interested in sixteenth and seventeenth century history, it’s OK, who cares.” Hence, in the 1970s, Dnipropetrovsk University, which had had no archives, very limited scholars, very limited access to literature–the libraries which were there were destroyed during the Second World War–emerged as a center of Ukrainian Studies, of early modern Ukrainian studies, because it was this kind of extra-territorial center: within Ukraine, but outside of Kiev’s control. So that’s in terms of background of the person of that professor and the group that was formed around him. Broadly, on the way, basically, how in the academic world, the power of personality matters and that schools and that interest in the work, in history can be done in the most unexpected places because it happened that, I don’t know, if the circumstances are right, resources are available, or that no one tries to crush what is going on there. GHF: Let’s bracket off your career in Moscow and Canada, then, and transition to The Last Empire. As I read it, on the one level, there’s the argument that Bush or Reagan–the Presidential Administrations–didn’t win the Cold War, that it’s about internal dynamics. But this argument about the tension between All-Union institutions and a Ukrainian elite is an incredibly important thread in this book. And I think that for a lot of readers, the surprising thing will be the nature of power-sharing between Dnipropetrovsk elites and Russian élites in Moscow. My question is, would it be accurate to describe the Soviet Union of the late 1970s as a condominium between Eastern Ukrainian elites and Moscow-based Russians? What are the problems in using that term as opposed to empire? SP: Well, I would certainly be prepared to compare the situation in the 1970s in the Soviet Union in terms of the importance of regional elites, in this case Dnipropetrovsk, with the Russian Empire of, let’s say, the last decades of the eighteenth century, where elites from the Hetmanate–people like Alexander Bezborodko were really very influential. So the late Catherine period, Paul’s rule, and Alexander’s rule, where one regional élite–in that particular period, Ukraine–became very important in what was then Petersburg. You see other periods where there would be Baltic Germans who would become very important. Certainly, Russians coming from certain specific groups. From that point of view, the Soviet Union was not different, in a sense, and today’s Russia and Ukraine are not different in that you see very much the periods where one élite that would be formed on the terms of personal loyalty, personal clan or a regional clan would acquire not full control, but informal influence, certainly. And that is the story for the Dnipropetrovsk clan and Brezhnev, for Brezhnev’s era. When I started listing people at the top of the power élite who came from the very same city where I went to university, and where I started to teach, I was surprised myself. So again, Brezhnev himself, the Minister of the Interior [Nikolaĭ Shchelokov], the Deputy Head of the KGB [Georgiĭ Tsinëv], then the head of the KGB, Mr. [Viktor] Chebrikov, all come from Dnipropetrovsk. The former Secretary of the City Party Committee. Ministers and Prime Ministers, [Nikolaĭ] Tikhonov. All of these people came from this pyramid. Now you can look at Gorbachëv’s reforms, and he’s replaced by the Sverdlovsk mafia and Yeltsin. Today, of course, Russia is run by the piterskiy (people from St. Petersburg). Again, there are major differences, but there is the possibility for making parallels for how the Russian Empire was run. And returning to my personal story and the fact that is that Dnipropetrovsk University, because it was an All-Union jurisdiction and certain things that were done that couldn’t be done in other places, the fact that people from Dnipropetrovsk were in Moscow, were in power, certainly helped to open resources. Those resources were, again, the university was getting them directly from the Union Ministry–positions for the scholarships abroad. These were just one of many resources: financial resources, opportunities for traveling abroad, despite the fact that Dnipropetrovsk was a closed city. I’m not sure if you’ve had the chance to see Sergeĭ Zhuk’s book, Rock and Roll in the Rocket City, for example–that’s the story about the closed city, but also open on a certain level. GHF: Now, to come back to The Last Empire, we could run through the events of 1991, but to abstract the narrative, there are almost three themes or tendencies that collide with one another. The first one, which we’ve already discussed, is the Ukrainian Party élite and its relationship with the CPSU [Communist Party of the Soviet Union] in Moscow. Second, which we’ll discuss in a moment, is Russian nationalism and perceived options by a Russian élite for how to modernize either the Soviet Union or a Russian state. The third, which I find a lot towards the end of The Last Empire, has to do with how the Soviet Union begins to think of itself as a confederation of states. That is to say, a shift from a utopian project where the state is supposed to go away, and there’s the Turkmen SSR, the Tajik SSR, but certainly they’ve not at the same level of development as the Russian state or the Ukrainian state. And besides, states are going to disappear, anyway. But it seems interesting that by the late 1960s or 1970s, and certainly when there’s discussions about a “Slavic Union”, or a the idea of a confederative Union with five Central Asian states–states, not SSRs– in effect, there seems to be a shift where SSRs are “state-ified” or are viewed as states in their own right. At what point do you seeing this shift becoming hardened? Is this a shift of autonomy to Brezhnev-era élites? Namely, the idea that non-Slavic Union Republics could have anything less than full sovereignty in the Union. SP: Well, when does this trend start? It’s difficult–it’s an excellent question, but difficult to answer. What we see happening, really, in 1989, in the First All-Union Parliament and the semi-free elections, is the Parliament starts to matter. The way how people vote starts to matter. And what you see in the All-Union Parliament is a battle between these pro-reform forces, where there would be inter-regional groups, mostly from Russia but not only from Russia, also the Baltics. And against them would go traditional Party élites and the votes that they controlled. And this is the first time where you see that on this All-Union Level, Central Asian Republics, they look at them as more than just a place where corruption is coming from. It’s not just the place where the Khlopkovoe Delo [“Cotton Affair,” a corruption scandal involving Uzbekistan] originates. That’s the vote that you can use in these wars and these battles. That’s when they start to pay attention to this. Gorbachëv is using those votes agains the pro-reform groups. Now, I don’t know whether people around Boris Yeltsin and [Yeltsin aide Gennadiĭ] Burbulis and others, whether they start to look at these republics as sates. But they, for the first time, seem to start to think of Russia as a state, trying to basically find a vessel to implement those reforms and realizing that they have to do something with Central Asian Republics and they can’t do anything. The rise in importance of Central Asian deputies–the deputies, not the states–and the Central Asian Party machines controlled by the center force the Russians to start thinking of themselves as a state and trying to achieve their objectives. Realizing that they can’t achieve this through the vessel of the All-Union State. And if Ukrainians are thinking about this traditionally since the 1920s–OK, there were ups and downs–then for Russians, 1989 is the discovery of this potential of a Russian Federation as a state for achieving certain goals that they can’t achieve in the center, at the center. GHF: And I suppose that the dynamic is until August 1991, but also until the Ukrainian referendum, the assumption is that Belarus and Ukraine will be confederated or attached in some way to a Russian state. The fact that you have five Central Asian Party machines rigged to the Russian state doesn’t really matter. But once the political ambition shrinks to just a confederation of Belarus plus Russia, then it starts to weigh on the conservatives that they could potentially be outnumbered by the “Muslim Republics.” A certain idea of statehood for non-Slavs becomes important then, don’t you think? SP: One more thing about the state. In the fall of 1991, this becomes a really important term and concept in the discussions between Gorbachëv and the people around him, and Gorbachëv and Yeltsin. The importance of that concept is possible only to understand in connection with another concept, namely with confederation. There are debates going on over whether this is a state, or whether this is a Union of states. Gorbachëv, to the very end, thinks that this is a state. You can have a sharing of power, but this is one state. And of course the push that is coming from Yeltsin, and from [Leonid] Kravchuk and Ukrainians, is that a confederation is a confederation of states. And that is very clear where the republic as a state is a key concept for anyone except for Gorbachëv. But for Gorbachëv it’s important not to think of them as states. You can call them sovereign, you can call them independent, but their statehood, in his mind, is not recognized, because there is only one state, namely the Soviet Union, even if it appears under a different name. GHF: And if I can recall the name of the reform project, Soyuz Suverennykh Gosudarstv [Union of Sovereign States], correctly, then it gets to another conceptual distinction that you play with in the book. There might not be a direct answer here, but in 1990-1991, for Yeltsin, Gorbachëv, Kravchuk, is there any coherent distinction between “independent” and “sovereign”? SP: Again, I may have created a distinction between these terms for myself that works well in trying to figure out what they’re saying and what they mean. Sovereignty meant really the primacy of the republican laws over Union laws. Independence would mean complete independence. Independence was a scary word for them, for all elites to use it. It wasn’t a scary word for the “national democrats” in Western Ukraine or for their friends in the Baltic States. Then, of course, for Gorbachëv, he’s trying to mix all of that together. Everyone, he says is sovereign, everyone is independent, but this doesn’t destroy the Union. GHF: Not very coherent message, in other words. SP: Right, so the terms are open for all sorts of interpretation, since sovereign means something else in the Soviet concept. Then you introduce the term “independence,” and the word takes on its own meaning, too. It’s almost like Lenin’s term for right of self-determination, which means that it’s a right, but– GHF: You can’t actively secede. It’s like Stalin’s definition of an internationalist as “someone who is ready to defend the USSR without reservation”. But to return to sovereignty and independence … SP: Right. So they negotiate in 1989, 1990, 1991, they negotiate the meaning of these terms. Because it is–you can take the politician or the political party and there would be a different take on it, depending on who you asked. GHF: Back to Ukraine for 1990, 1991. I was listening to a lecture that [ historian of Eastern Europe] Timothy Snyder was giving in Sofia recently. As I was reading The Last Empire, I think I saw a point of connection between the two. I thought of Poland, and what comes to mind are the Polish Revolution, 1982, and the politics of Polish and Ukrainian irredentism. The question is, do you think it would have made a difference if Poland had not had its revolution in 1989, or if the Polish government had not already recognized the territorial integrity of the Ukrainian SSR? In other words, would a politics of Ukrainian sovereignty or self-determination been directed against Poland [and not Moscow] during 1990-1991? Would that have changed events? It seems like one of the salient facts of the Ukrainian 1991 is anti-colonialism that can be directed exclusively towards Moscow, rather than having multiple enemies. SP: Well, first of all a general statement that Poland and developments in Poland are extremely important. When we talk about the fall of the Soviet Union and the most problematic republic of the Soviet Union in 1990 and 1991, we generally talk about the Baltic. The term “Baltics” itself is of very recent creation. The republic that is in the forefront is not just any Batic Republic, but Lithuania, which happened to exist earlier in the form of the Polish-Lithuanian Commonwealth. And then the republic that really makes the continuing existence of the Soviet Union impossible is Ukraine. And present at the moment when they decide to dissolve the Soviet Union is Belarus. Now, what area does this map onto? All of this maps out the old outline of the Polish-Lithuanian Commonwealth. Thinking about the fall of the Soviet Union not using twentieth century terms, but thinking in terms of the Commonwealth map and keeping it in front of you, raises questions that you may not be prepared to answer or even think about. The Polish-Lithuanian Commonwealth superimposed onto present-day political boundaries The Polish-Lithuanian Commonwealth superimposed onto present-day political boundaries It is clear, however, that the position that was taken by Poland after 1989-1990 made this Ukrainian bid for independence very safe, when it comes to the western border. There were claims on Ukrainian territory from Romania, from the west, but there was very little from Poland. And of course, there was a lot of support not just for Lithuania but also for western Ukraine. Poland was the first country that recognized Ukraine within its present borders. So it’s an important factor, but its importance is somewhat obscured by the fact that those things were obvious or taken for granted at the time, so there wasn’t much discussion. The question was kind of closed beforehand. And that’s why the situation of last year came as such a surprise, when you saw Russia and Putin’s Russia united together with very important groups in Poland on the issue of Ukrainian history and Ukrainian nationalism during World War II. The reaction in the Ukrainian liberal camp towards the Poles was basically a reaction of betrayal–not the nationalist groups and the nationalist underground, but in this political game, I mean. GHF: That there must be a political cordon sanitaire against the Russian right. SP: Right, that’s the first time since independence that we came close to this nightmarish scenario of having two enemies, that happened in 2013. And it was a relatively short-lived phenomenon and resolved by the acts of President [Viktor] Yushchenko, who gave the title of “Hero of Ukraine” to Stepan Bandera in 2010. This was disgraceful–Bandera was someone who spread flames of hatred. GHF: Finally, what to make of the role of Belarus in this Eastern European and Soviet story? One thing running through my head was the role that Belarus does end up taking on vis-à-vis Moscow, as part of a Soyuznoe gosudarstvo [“Union State”] with Russia. Are there, or were there, any lessons that Ukraine took from Belarus or from this political configuration between the two states? SP: For much of the 1990s, Belarus represented the path not taken to some Ukrainians. If Ukraine represented the dark side of independence, namely bandit capitalism and oligarchy, then it was easy to project onto Belarus from a distance certain ideas of what the Soviet welfare state had been. GHF: And perhaps we’re seeing darker visions still of what some kind of Russian-led political project would look like today, in Luhansk and Donetsk. Professor Plokhii, one final question before we wrap up: if you had to recommend one book to readers of the Global History Forum as an example of the kind of scholarship you would value, what would it be? SP: As someone who teaches a course on Yalta, and wrote on the topic, I always find myself impressed when I come back to David ReynoldsSix Summits: Six Meetings that Changed the Twentieth Century. GHF: The Last Empire begins with a summit between Bush and Gorbachëv, so I think we’ve come full circle, then. Professor Plokhii, thank you for participating in this installment of the Global History Forum. While a book with the ambition of The Last Empire demands a correspondingly ambitious travel schedule–the next event takes place October 3 at the Woodrow Wilson Center in Washington, D.C.–Plokhii remains attentive to his duties at Harvard and his coming scholarly projects. This semester’s load includes a Ukrainian history course sure to attract more students than usual, as well as a more advanced seminar on Ukrainian history–that, plus a busy schedule of guests and visiting fellows at the Harvard Ukrainian Research Institute, of which Plokhii is the director. But more than wrapping up events associated with the book (an October 3rd event in Washington is the next date), Plokhii thinks about his future projects. Next up, he says, is a history of the nuclear disaster in Chernobyl. He remains conscious of the need to integrate Soviet and Ukrainian history into a broader international discussion. “Methodologically,” he explains, “I didn’t see a problem with integrating Soviet history with Cold War history when I wrote The Last Empire,” he says. The more he looked at the records of the Bush administration, the clearer the need to escape a “great man” approach became. The Bush Administration, he explains, faced real pressure from Ukrainian- and Armenian-American diaspora groups to deal with “their” respective Soviet republics as international actors, a factor that Plokhii successfully covers in The Last Empire. The wreckage of the Chernobyl Atomic Station, site of the worst nuclear disaster in human history after a catastrophic explosion in April 1986 But dealing with the history of a massive ecological crisis, then, is likely to pull Plokhii in even more international directions. The crisis of Chernobyl, he explains, was not only an indictment of the Soviet system, but also raised more global questions about the future of nuclear energy and the inter-connectedness of humanity across the boundaries of the Iron Curtain. The disaster might be traced to specifically Soviet misgovernance, but the radioactive particles released by the explosion of the reactor threatened to cover all of Europe. The connections between then and now run deep and across Europe. Today, it is primarily Western European firms that construct and manage the new “sarcophagus” that is designed to cover the reactor ruins for the next century. Today, too, members of European Green Parties who then rallied around the Chernobyl disaster to demand an end to atomic energy, like Rebecca Harms, are among the most active in protesting the illegal imprisonment of Ukrainians by the Russian government. We look forward to that book, another example of how Plokhii manages to work in a national field while incorporating a global perspective–perhaps the feature of another Global History Forum in the future–but for now we are happy to content ourselves with The Last Empire. We’re pleased to feature its author, Serhii Plokhii, as the latest guest to the Forum. One thought on “Excavating “The Last Empire”: Discussing Soviet History and Global History with Serhii Plokhii” Leave a Reply
Wisdom Teeth Wisdom teeth or Third Molars, are the last teeth to develop in the mouth. Most people have four wisdom teeth, two in the upper jaw and two in the lower jaw. These teeth are commonly called wisdom teeth because they usually come through in our late teens or early twenties, known as the ‘age of wisdom’. If Wisdom Teeth fit comfortably with the rest of your teeth, they can stay and act like others molars for chewing food. A wisdom tooth can become impacted when it is obstructed from fully coming into the mouth by the tooth in front, by the surrounding bone or because of the position that it has developed in. Problems caused by impact wisdsom teeth Wisdom teeth that don’t come through the gum fully are breeding grounds for bacteria and may cause tooth decay. Trapped food or plaque can also cause infection of the overlying gum. This can result in Pain and Swelling and can often affect the neighbouring teeth. Less Frequently, serious problems can arise, such as the formation of cysts or tumours around an impacted tooth, leading to destruction of the surrounding jawbone and neighbouring teeth. These conditions may require complex and extensive treatment. As problems can sometimes develop silently without your knowledge, at TwentyOneDental we recommend Routine Dental Examinations to evaluate problems before they occur. Your initial visit to us would include a thorough Dental Examination of your mouth. and Wisdom Teeth. We take X-rays to determine the position of the wisdom teeth, their condition and the status of the adjacent teeth and bone. Due to the problems associated with impacted Wisdom Teeth, it is often advisable to remove them early. The best time to remove them would be during the teenage years, before the roots of the teeth are fully formed and firmly embedded in the jawbone. Healing is also better during this period, with fewer complications, although they can be removed at any age. Depending on how impacted your tooth is, this can be a simple extraction like any other tooth, or a minor surgical procedure that can usually be performed with little discomfort. The procedure can be performed under local anaesthesia at our Clinic or for more complex cases, general anaesthesia in Hospital. We will advise you on the type most appropriate for your needs. If you think you may have a problem with Wisdom Teeth, please Contact Us or Request a Callback and we will be happy to help. Social media Contact Form • I am not a robot • Please leave this field empty.
The Homeric Hymns Test | Final Test - Easy Buy The Homeric Hymns Lesson Plans Name: _________________________ Period: ___________________ Multiple Choice Questions 1. According to Aphrodite, what will the child she has with Anchises grow to become? (a) A great writer. (b) A great poet. (c) A great warrior. (d) A great philosopher. 2. Who reportedly witnessed the birth of Athena? (a) Gods and animals, but not men. (b) Men and animals, but not gods. (c) Gods and men. (d) Gods, men, and animals. 3. What characteristic does the hymn point out about Hephaistos? (a) His cleverness. (b) His cautiousness. (c) His persuasiveness. (d) His persistence. 4. In the story, how does Aphrodite disguise herself in order to get close to Anchises? (a) As another goddess. (b) As a girl that Anchises once knew. (c) As a mortal girl. (d) As a girl that Anchises knows. 5. Which one of Athena's attributes is the subject of the final Hymn to Athena? (a) Justice. (b) Skill. (c) Industry. (d) War. 6. How many hymns are there to Athena? (a) Two. (b) Three. (c) Four. (d) One. 7. As explained in The Hymn to the Muses, which of the following's work are related to the Muses? (a) Ares. (b) Apollo. (c) Zeus. (d) Poseidon. 8. How is Hestia's presence described in the Hymns to Hestia? (a) Eternal. (b) Comforting. (c) Powerful. (d) Overwhelming. 9. How is Hades first described in The Hymn to Demeter? (a) He who takes from the Earth. (b) He who receives so few. (c) He who receives so many. (d) He who takes what is not theirs. 10. When is Anchises bewitched by Aphrodite's beauty? (a) Immediately. (b) Three days after they meet. (c) One week after they meet. (d) Two days after they meet. 11. How many seeds does Demeter's daughter eat before returning? (a) Five. (b) Two. (c) Three. (d) Four. 12. Whose child does Demeter attempt to make immortal? (a) Metanira. (b) Pasiphae. (c) Marpesia. (d) Pyrrha. 13. Who is Demeter's daughter? (a) Polyhymnia. (b) Persephone. (c) Calliope. (d) Athena. 14. In The Hymn to Aphrodite, what job does Anchises have? (a) He is a sheepherder. (b) He is a soldier. (c) He is a cowherd. (d) He is a poet. 15. As explained in the hymn, how did the witnesses of Athena's birth respond to the event? (a) With fear. (b) With silence. (c) With laughter. (d) With sadness. Short Answer Questions 1. How is Hephaistos described in The Hymn to Hephaistos? 2. Based on the ancient myths, what is known to happen when mortals have affairs with immortals? 3. What job did Hephaistos have, according to the hymn? 4. Based on the information provided in The Hymns to the Dioscuri, who do Castor and Pollux protect? 5. What does the poem in The Third Hymn to Aphrodite describe? (see the answer keys) This section contains 434 words (approx. 2 pages at 300 words per page) Buy The Homeric Hymns Lesson Plans The Homeric Hymns from BookRags. (c)2017 BookRags, Inc. All rights reserved. Follow Us on Facebook
Mars move OFF? Researchers find DEADLY chemicals on Red Planet HUMANITY’S move to Mars may be off after researchers discovered bacteria on the Red Planet which could kill humans. Could the Mars-move be off? Space boffins have been stepping up their efforts recently to get humans to Mars with a view to eventually colonising it, but any plans may have to be scuppered after it was revealed the planet is covered in bacteria which are toxic to humans. The discovery echoes the plot of H G Wells' 1897 novel War of the Worlds, where aliens land on Earth only to die off as they are poisoned by bacteria humans are immune to. The University of Edinburgh research looked at a mix of oxidants, iron oxides, UV energy and chemical compounds called perchlorates and found that they are likely highly damaging to Earth-based living cells. When the perchlorates are mixed with iron oxides and hydrogen peroxides they muster a “toxic cocktail” which leads to a 10-fold increase in the death of cells. mars surfaceGETTY The Martian surface contains deadly bacteria The research could foil any future Mars missions. The team wrote in their study published in Scientific Reports: "The surface of Mars is lethal to vegetative cells and renders much of the surface and near-surface regions uninhabitable.” Humans had hoped to colonise Mars Jennifer Wadsworth, from the UK Centre for Astrobiology and School of Physics and Astronomy, said: “Our findings have important implications for the possible contamination of Mars with bacteria and other materials from space missions. This should be taken into account in designing missions to Mars.” As it stands, Elon Musk’s SpaceX appears to be leading the charge in the race to get people to Mars. SpaceX is aiming to get people to the Red Planet by around 2030, with the first people there being tasked with beginning to build a new civilisation. In a recent report outlining his intentions, Mr Musk said that if each SpaceX flight carries 100 people and there are 1,000 flights, then “it would take 40–100 years to achieve a fully self-sustaining civilisation on Mars”.
Alliance Team NewsletterSunset Learn The Facts Concerning Healthy Water Recommended Book lycopeneThe deep red color that is pren tomatoes, pink grapefruit, guava and watermelon is caused by lycopene, a carotenoid. Other carotenoids include beta-carotene and alpha-carotene, which give carrots their orange color. Carotenoids are fat soluble and so in the human body are found in fatty tissue and transported by lipoproteins. They act as dietary precursors to Vitamin A and aid the immune system. However lycopene has a greater property than food colouring. It is a strong antioxidant, which can help to combat degenerative diseases. It was found that increased concentration of lycopene gave an increased protective effect. However the human body cannot produce this molecule and needs to obtain it from tomatoes in our diet. It helps prevent degenerative diseases by donating its electrons to oxygen free radicals thus quenching and neutralising them before they can damage cells. Free radicals are molecules that have at least one unpaired electron. By donating an electron lycopene can stabilise the free molecule. There have been many recent studies into lycopene so that it can be used to its fullest potential in fighting diseases. It has been seen that lycopene can be used as an anti-carcinogen. Lycopene is a phytochemical, synthesized by plants and microorganisms but not by animals. It is an acyclic isomer of beta-carotene. This highly unsaturated hydrocarbon contains 11 conjugated and 2 unconjugated double bonds, making it longer than any other carotenoid. As a polyene, it undergoes cis-trans isomerization induced by light, thermal energy, and chemical reactions. Lycopene obtained from plants tends to exist in an all-trans configuration, the most thermodynamically stable form. Humans cannot produce lycopene and must ingest fruits, absorb the lycopene, and process it for use in the body. In human plasma, lycopene is present as an isomeric mixture, with 50% as cis isomers. Although best known as an antioxidant, both oxidative and non-oxidative mechanisms are involved in lycopene's bioprotective activity. The nutraceutical activities of carotenoids such as beta-carotene are related to their ability to form vitamin A within the body. Since lycopene lacks a beta-ionone ring structure, it cannot form vitamin A and its biological effects in humans have been attributed to mechanisms other than vitamin A. Lycopene's configuration enables it to inactivate free radicals. Because free radicals are electrochemically imbalanced molecules, they are highly aggressive, ready to react with cell components and cause permanent damage. Oxygen-derived free radicals are the most reactive species. These toxic chemicals are formed naturally as by-products during oxidative cellular metabolism. As an antioxidant, lycopene has a singlet-oxygen-quenching ability twice as high as that of beta-carotene (vitamin A relative) and ten times higher than that of alpha-tocopherol (vitamin E relative). One non-oxidative activity is regulation of gap-junction communication between cells. Lycopene participates in a host of chemical reactions hypothesized to prevent carcinogenesis and atherogenesis by protecting critical cellular biomolecules, including lipids, proteins, and DNA. Lycopene is the most predominant carotenoid in human plasma, present naturally in greater amounts than beta-carotene and other dietary carotenoids. This perhaps indicates its greater biological significance in the human defense system. Its level is affected by several biological and lifestyle factors. Because of its lipophilic nature, lycopene concentrates in low-density and very-low-density lipoprotein fractions of the serum. Lycopene is also found to concentrate in the adrenal, liver, testes, and prostate. However, unlike other carotenoids, lycopene levels in serum or tissues do not correlate well with overall intake of fruits and vegetables. Printable Page>>> Ellagic PlusEllagic Plus contains Lycopene.  To order Ellagic Plus Please visit our online product store here.  Easy and secure shopping. Home | Water  | Robert Smith | Weightloss  |Dr. Pedro Gismondi | Marketing | Networking Dilemma | Shu Li Pouch Health and Fitness Forum web site
FARIDA - Princess Farida Once upon time there was a cute princess called Farida living in a castle with her father, mother and uncle. On the way to the castle there lived many monsters. Each one of them had some gold coins. Although they are monsters they will not hurt. Instead they will give you the gold coins, but if and only if you didn't take any coins from the monster directly before the current one. To marry princess Farida you have to pass all the monsters and collect as many coins as possible. Given the number of gold coins each monster has, calculate the maximum number of coins you can collect on your way to the castle. The first line of input contains the number of test cases. Each test case starts with a number N, the number of monsters, 0 <= N <= 10^4. The next line will have N numbers, number of coins each monster has, 0 <= The number of coins with each monster <= 10^9. Monsters described in the order they are encountered on the way to the castle. For each test case print “Case C: X” without quotes. C is the case number, starting with 1. X is the maximum number of coins you can collect. 1 2 3 4 5 Case 1: 9 Case 2: 10 hide comments horizon121: 2017-08-29 15:28:09 Guyz write the "Case " number got me 1 WA!!Easy dp!!! kxingh: 2017-08-19 12:47:41 cheq for monster=0 nikhil2504: 2017-08-01 02:23:06 Little mistake costed W.A 1 3 5 9 7 10 1 10 100 Consider this tc , if you get W.A. abhi_96: 2017-07-30 08:28:02 it's capital 'C' in case.cost me 1 WA. nietaki: 2017-07-23 18:59:46 There seem to be extra whitespace characters in the input :/ xaer0_: 2017-07-09 13:59:55 n = 0. Good catch from guys in the comments. dp solution with array of size n. jayu_jd: 2017-07-08 06:21:08 Simple Question ! DP 1D array pk201996: 2017-07-05 09:05:05 i am not understanding after checking each and every worst case on my compiler the answers are correct but i got runtime error in spoj.Why?? monukumar: 2017-07-01 20:22:38 Cakewalk!! used a 3*n dp table.. ankit1cool: 2017-06-15 08:49:09 n=0 caused me i runtime so keep that in mind Added by:hossamyosef Time limit:1.237s Source limit:50000B Memory limit:1536MB Cluster: Cube (Intel G860) Languages:All except: ASM64 Resource:FCIS/ASU Local Contest 2013
STAMMER - Stammering Aliens no tags  Dr. Ellie Arroway has established contact with an extraterrestrial civilization. However, all efforts to decode their messages have failed so far because, as luck would have it, they have stumbled upon a race of stuttering aliens! Her team has found out that, in every long enough message, the most important words appear repeated a certain number of times as a sequence of consecutive characters, even in the middle of other words. Furthermore, sometimes they use contractions in an obscure manner. For example, if they need to say bab twice, they might just send the message babab, which has been abbreviated because the second b of the first word can be reused as the first b of the second one. Thus, the message contains possibly overlapping repetitions of the same words over and over again. As a result, Ellie turns to you, S.R. Hadden, for help in identifying the gist of the message. Given an integer m, and a string s, representing the message, your task is to find the longest substring of s that appears at least m times. For example, in the message baaaababababbababbab, the length-5 word babab is contained 3 times, namely at positions 5, 7 and 12 (where indices start at zero). No substring appearing 3 or more times is longer (see the first example from the sample input). On the other hand, no substring appears 11 times or more (see example 2). In case there are several solutions, the substring with the rightmost occurrence is preferred (see example 3). The input contains several test cases. Each test case consists of a line with an integer m (m ≥ 1), the minimum number of repetitions, followed by a line containing a string s of length between m and 40 000, inclusive. All characters in s are lowercase characters from “a” to “z”. The last test case is denoted by m = 0 and must not be processed. Print one line of output for each test case. If there is no solution, output none; otherwise, print two integers in a line, separated by a space. The first integer denotes the maximum length of a substring appearing at least m times; the second integer gives the rightmost possible starting position of such a substring. Sample Input Sample Output 5 12 4 2 Problemsetter: David García Soriano hide comments aristofanis: 2014-12-13 15:20:56 Just reached 100.0 points with this one! Nice problem! Added by:David García Soriano Time limit:5.250s Source limit:50000B Memory limit:1536MB Cluster: Cube (Intel G860) Languages:All except: ASM64 Resource:Soutwestern Europe Regional, SWERC 2009
How to add color into your program on python 2.7.5??? i am a beginner help! hey guys i am start learning to programming right now...don't really now a lot of stuff yet, but immm here is my program so far a = 'Gerrit' b = 'ALBERT' print str(a + ' and ' + b) gerrit and albert is just my friends names... but how can i like add color to there names sothat they don't get print in blue ??? and if any of you are experts in programming can you maybe teach me a few things in python... 1 answer Last reply Best Answer More about add color program python beginner 1. Best answer Here is a source you might find useful: Ask a new question Read More Windows 7
earthlike planets In a revelation that may change our understanding of space forever, the American Astronomical Society announced that five new planets have been discovered orbiting close to their stars, in our own galaxy.  The findings are the works of the $ 591 M Kepler space telescope which has been scanning some 156 thousand stars for planets within 3000 light years of earth. William Borucki of NASA’s Ames Research Center told reporters that four “roaster” planets, ones larger than Neptune, are orbiting extremely close to their stars. The planets are 1.3 to 1.5 times wider than our own Jupiter, while the last one, nicknamed dubbed Kepler-4b, is only about 0.6 times as wide as Jupiter and weighs only about 8 percent as much. Kepler detects planets by spotting light-dipping eclipses of stars by their companion planets. When the planets are closer to the stars, they are easier to detect. However, this usually means they are going to be “roasters” like the ones just discovered. These planets orbit their stars once within every four Earth days. And because of they are so close to their stars, they can reach temperatures above 2,240 degrees Fahrenheit. Kepler scientists hope to find more Earth-like planets in the future. By utilizing the satellite’s optics, the team has determined it will be able to spot any Earth-like planets with 99 percent certainty.  This announcement comes as more than 3,500 astrophysicists, planetary scientists, and science journalists converge on Washington for the 215th meeting of the American Astronomical Society. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Tuned radio frequency receiver From Wikipedia, the free encyclopedia Jump to: navigation, search This 1920s TRF radio manufactured by Signal is constructed on a breadboard Tuning a TRF receiver, like this 5 tube Neutrodyne set from 1924 with two stages of RF amplification, was a complicated process. The three tuned circuits, controlled by the 3 large knobs, had to be tuned in unison to the new station. So tuning in a station was a process of successive approximation. Once a station was found, the numbers on the dials were written down, so it could be found again. Tuning all 3 stages of a TRF set in unison. This 1925 Grebe Synchrophase receiver has thumbwheels instead of knobs which can be turned with a finger, so a third hand is not needed. A tuned radio frequency receiver (or TRF receiver) is a type of radio receiver that is composed of one or more tuned radio frequency (RF) amplifier stages followed by a detector (demodulator) circuit to extract the audio signal and usually an audio frequency amplifier. This type of receiver was popular in the 1920s. Early examples could be tedious to operate because when tuning in a station each stage had to be individually adjusted to the station's frequency, but later models had ganged tuning, the tuning mechanisms of all stages being linked together, and operated by just one control knob. By the mid 1930s, it was replaced by the superheterodyne receiver patented by Edwin Armstrong. The TRF receiver was patented in 1916 by Ernst Alexanderson. His concept was that each stage would amplify the desired signal while reducing the interfering ones. Multiple stages of RF amplification would make the radio more sensitive to weak stations, and the multiple tuned circuits would give it a narrower bandwidth and more selectivity than the single stage receivers common at that time. All tuned stages of the radio must track and tune to the desired reception frequency. This is in contrast to the modern superheterodyne receiver that must only tune the receiver's RF front end and local oscillator to the desired frequencies; all the following stages work at a fixed frequency and do not depend on the desired reception frequency. Antique TRF receivers can often be identified by their cabinets. They typically have a long, low appearance, with a flip-up lid for access to the vacuum tubes and tuned circuits. On their front panels there are typically two or three large dials, each controlling the tuning for one stage. Inside, along with several vacuum tubes, there will be a series of large coils. These will usually be with their axes at right angles to each other to reduce magnetic coupling between them. A problem with the TRF receiver built with triode vacuum tubes was the triode's interelectrode capacitance. The interelectrode capacitance allowed energy in the output circuit to feedback into the input. That feedback could cause instability and oscillation that would frustrate reception and produce squealing or howling noises in the speaker. In 1922, Louis Alan Hazeltine invented the technique of neutralization that uses additional circuitry to partially cancel the effect of the interelectrode capacitance.[1] Neutralization was used in the popular Neutrodyne series of TRF receivers. Under certain conditions, "the neutralization is substantially independent of frequency over a wide frequency band."[2] "Perfect neutralization cannot be maintained in practice over a wide band of frequencies because leakage inductances and stray capacities" are not completely canceled.[3] The later development of the tetrode and pentode vacuum tubes minimized the effect of interelectrode capacitances and could make neutralization unnecessary; the additional electrodes in those tubes shield the plate and grid and minimize feedback.[4] Typical tube layout of a TRF radio Typical Dial Layout of Tuned Radio Frequency Receiver Typical Tuned Radio Frequency receiver component layout How it works[edit] Block diagram of TRF receiver The classic TRF receivers of the 1920s and 30s usually consisted of three sections: • one or more tuned RF amplifier stages. These amplify the signal of the desired station to a level sufficient to drive the detector, while rejecting all other signals picked up by the antenna. • a detector, which extracts the audio (modulation) signal from the radio carrier signal by rectifying it. • optionally, but almost always included, one or more audio amplifier stages which increase the power of the audio signal. Leutz 9-tube receiver from 1927 clearly shows the component parts of a TRF set. Each RF stage is in a separate compartment. Within each compartment can be seen (from top): the triode tube, the interstage coupling coil, and the capacitor attached to its front panel tuning dial. The compartments contain (from left): the 4 RF stages, the detector stage, and the 4 tube audio amplifier. The capacitors could be linked to a common shaft and tuned together, or tuned separately. Each tuned RF stage consists of an amplifying device, a triode (or in later sets a tetrode) vacuum tube, and a tuned circuit which performs the filtering function. The tuned circuit consisted of an air-core RF coupling transformer which also served to couple the signal from the plate circuit of one tube to the input grid circuit of the next tube. One of the windings of the transformer had a variable capacitor connected across it to make a tuned circuit. A variable capacitor (or sometimes a variable coupling coil called a variometer) was used, with a knob on the front panel to tune the receiver. The RF stages usually had identical circuits to simplify design. Each RF stage had to be tuned to the same frequency, so the capacitors had to be tuned in tandem when bringing in a new station. In some later sets the capacitors were "ganged", mounted on the same shaft or otherwise linked mechanically so that the radio could be tuned with a single knob, but in most sets the resonant frequencies of the tuned circuits could not be made to "track" well enough to allow this, and each stage had its own tuning knob.[5] The detector was usually a grid-leak detector. Some sets used a crystal detector (semiconductor diode) instead. Occasionally, a regenerative detector was used, to increase selectivity. Some TRF sets that were listened to with earphones didn't need an audio amplifier, but most sets had one to three transformer-coupled or RC-coupled audio amplifier stages to provide enough power to drive a loudspeaker. Schematic of Six Tube Design using Triode Tubes – Two Radio Frequency Amplifiers, One Grid-Leak Detector, Three Class ‘A’ Audio Amplifiers The schematic diagram shows a typical TRF receiver. This particular example uses six triodes. It has two radio frequency amplifier stages, one grid-leak detector/amplifier and three class ‘A’ audio amplifier stages. There are 3 tuned circuits T1-C1, T2-C2, and T3-C3. The second and third tuning capacitors, C2 and C3, are ganged together (indicated by line linking them) and controlled by a single knob, to simplify tuning. Generally, two or three RF amplifiers were required to filter and amplify the received signal enough for good reception. Advantages and disadvantages[edit] Terman characterizes the TRF's disadvantages as "poor selectivity and low sensitivity in proportion to the number of tubes employed. They are accordingly practically obsolete."[6] Selectivity requires narrow bandwidth, but the bandwidth of a filter with a given Q factor increases with frequency. So to achieve a narrow bandwidth at a high radio frequency required high-Q filters or many filter sections. Achieving constant sensitivity and bandwidth across an entire broadcast band was rarely achieved. In contrast, a superheterodyne receiver translates the incoming high radio frequency to a lower intermediate frequency which does not change. The problem of achieving constant sensitivity and bandwidth over a range of frequencies arises only in one circuit (the first stage) and is therefore considerably simplified. The major problem with the TRF receiver, particularly as a consumer product, was its complicated tuning. All the tuned circuits need to track to keep the narrow bandwidth tuning. Keeping multiple tuned circuits aligned while tuning over a wide frequency range is difficult. In the early TRF sets the operator had to perform that task, as described above. A superheterodyne receiver only needs to track the RF and LO stages; the onerous selectivity requirements are confined to the IF amplifier which is fixed-tuned. During the 1920s, an advantage of the TRF receiver over the regenerative receiver was that, when properly adjusted, it did not radiate interference.[7][8] The popular regenerative receiver, in particular, used a tube with positive feedback operated very close to its oscillation point, so it often acted as a transmitter, emitting a signal at a frequency near the frequency of the station it was tuned to.[7][8] This produced audible heterodynes, shrieks and howls, in other nearby receivers tuned to the same frequency, bringing criticism from neighbors.[7][8] In an urban setting, when several regenerative sets in the same block or apartment house were tuned to a popular station, it could be virtually impossible to hear.[7][8] Britain,[9] and eventually the US, passed regulations that prohibited receivers from radiating spurious signals, which favored the TRF. Modern usage[edit] Although the TRF design has been largely superseded by the superheterodyne receiver, with the advent of semiconductor electronics in the 1960s the design was "resurrected" and used in some simple integrated radio receivers for hobbyist radio projects, kits, and low-end consumer products. One example is the ZN414 TRF radio integrated circuit from Ferranti in 1972 shown below The ZN414; almost a whole TRF radio on a single chip See also[edit] 1. ^ Lee, Thomas H. (2004). The Design of CMOS Radio-Frequency Integrated Circuits (2nd ed.). UK: Cambridge University Press. p. 16. ISBN 0521835399.  2. ^ Terman, Frederick E. (1943), Radio Engineers' Handbook, McGraw-Hill, p. 469  3. ^ Terman, Frederick Emmons (1937), Radio Engineering (second ed.), New York: McGraw-Hill, p. 236  4. ^ Terman (1937, p. 238) states, "Neutralization is always necessary in tuned triode amplifiers for otherwise the input resistance will be so low that oscillations can be expected. It is not employed with pentode and screen-grid amplifiers, however, because the direct-capacity coupling between grid and plate in such tubes is very small." 5. ^ Felix, Edgar H. (July 1927). "Something about single control" (PDF). Radio Broadcast. New York: Doubleday, Page and Co. 11 (3): 151–152. Retrieved January 10, 2015.  6. ^ Terman 1943, p. 658 7. ^ a b c d Glasgow, R. S. (June 1924). "Radiating Receivers" (PDF). Radio In The Home. Philadelphia, PA: Henry M. Neely Publishing Co. 3 (1): 16, 28. Retrieved March 14, 2014. But the interference due to regenerative receivers when in the oscillating condition cannot be eliminated by anything the receiving operator can do. ... All types of regenerative sets will cause the connected aerial to radiate energy if allowed to oscillate.  8. ^ a b c d Ringel, Abraham (November 1922). "The Receiver Radiation Problem and Some Solutions". The Radio Age. 10 (2): 67–69. Retrieved August 22, 2014.  9. ^ "How the Motor Patrol Wars with Bloopers" (PDF). Radio News. New York: Experimenter Publishing Co. 9 (1): 37. July 1927. Retrieved August 23, 2014.  Further reading[edit] • Tomasi, Wayne (2004), Electronic Communications Systems: Fundamentals Through Advanced (5th ed.), Pearson Education, ISBN 9780130494924  External links[edit]
How to get rid of Stink Bugs There are hundreds of varieties of stink bugs, the ones that get the attention, though, are the Asian entries. They arrived on America’s shores in 1998 and spread across the country quickly. They swarm in the walls of homes, and wherever else they can make themselves comfortable. The Asian entries aren’t the only problem causers, though, those native to North America have long caused issues for growers. Most types of stink bugs suck sap, damaging plants and leaving them weak. They aren’t picky, they’re happy to feed of vegetation, as well as fruit and vegetables. How to identify Stink Bugs The stink bug belongs to the Pentatomidae family, there are almost 5000 species in this family. The most common types are dusky, rice, Southern, green, and brown stink bugs. The other types include chust and shield bugs. The majority of them can be identified by their shield, which is a hardened area of the thorax that appears as an armor. Their coloring can be mottled or solid, ranging brown bright green with orange or red trim, or brown and black. They are generally black in the south, while green in the north, and in the areas in between a unique color combination of both. The stink comes from a gland which is located in the thorax, and the smell is described as rotten cilantro. It releases its stink as a defense mechanism, which is difficult for gardeners to contend with, especially if the bugs are in a cluster. Stinkbug Damage They have a voracious appetite, and feed from whatever plants they can find. Their preference is for fleshy fruits, but they adapt. Some stink bugs live on woody plants and cacti in arid climates. Though, they prefer irrigated crops that are commercially raised. The crop damage that is caused by stink bugs is generally cosmetic, however, this can result in spoilage and early decay. Additionally, they leave pin pricks creating blemishes, and inject digest enzymes into the plant that results in discoloration. In leafy crops the damage can be seen in blotches, while corn will have dark spots. How to Control Termites The best methods to control termites are as follows: • You should control any natural litter to deny stink bugs a home during the winter months. • There are predatory insects that prey on stink bugs, so avoid using pesticides, as this will also have an impact on their presence. • Use row covers during stink bug season to stop them from getting access to your crops. If any bugs land on the covers, then drown them in soapy water. • The minute pirate bug, ladybugs, and lacewing bugs prey on stink bugs. • Kaolin clay can suppress stink bugs. The clay attaches to the bugs, which agitates them, causing them to leave. It also coats the fruit and leaves with a film that prevents them from feeding. • Neem oil and insecticidal soap are effective during the early stink bug season. • Stink bugs in your home? Add detergent and an inch of water to a turkey pan. Shine a lamp on the surface overnight, the light will attract stink bugs. The bugs that land in the water will be trapped by the detergent.
Liberty Ancient and Modern in Foucault, Mill and George Grote Long slightly edited extract from work in progress.  More about Mill than Foucault but written in the context of work on Foucault and the history of liberty. John Stuart Mill’s On Liberty (1859) has an important relation  with the work of his friend George Grote on Athenian democracy, a work by a classicist arguing for the modern relevance of Athenian democracy.   Grote even takes on the most notorious aspect of Athenian democracy, ostracisim, to argue that it was necessary for building up the kind of constitutional morality necessary to a stable democracy.  It is the lack of that constitutional morality which is behind the excesses of the French Revolution, in Grote’s argument.  The implication is that for Grote ostracisim does not anticipate the worst aspects of modern democratic revolutions, it is a necessary barrier against those aspects.  A stable democracy may have less need of such devices over time, but that makes them no less necessary in instituting democracy. Against this chance of internal assailants Kleisthênes had to protect the democratical constitution — first, by throwing impediments in their way and rendering it difficult for them to procure the requisite support; next by eliminating them before any violent projects were ripe for execution.  To either the one or the other, it was necessary to provide such a constitution as would not only conciliate the good-will, but kindle the passionate attachment, of the mass of citizens, insomuch that not even any considerable minority should be deliberately inclined to alter it by force.  It was necessary to create in the multitude, and through them to force upon the leading ambitious men, that rare and difficult sentiment which we may term a constitutional morality — a paramount reverence for the forms of the constitution, enforcing obedience to the authorities acting under and within those forms, yet combined with the habit of open speech, or action subject only to definite legal control, and unrestrained censure  of those very authorities as to all their public acts — combined, too with a perfect confidence in the bosom of every citizen, amidst the bitterness of party contest, that the forms of the constitution will be not less sacred in the eyes of his opponents than in his own.  This co-existence of freedom and self-imposed restraint, of obedience to authority with unmeasured censure of the persons exercising it, may be found in the aristocracy of England (since about 1688) as well as in the democracy of the American United States: and because we are familiar with it, we are apt to suppose it a natural sentiment; though there seem to be few sentiments more difficult to establish and diffuse among a community, judging by the experience of history.  We may see how imperfectly it exists at this day in the Swiss Cantons; while the many violences of the first French revolution illustrate, among various other lessons, the fatal effects arising from its absence, even among a people high in the scale of intelligence.  Yet the diffusion of such constitutional morality, not merely among the majority of any community, but throughout the whole, is the indispensable condition of a government at once free and peaceable; since even any powerful and obstinate minority may render the working of free institutions impracticable, without being strong enough to conquer ascendancy for themselves.  Nothing less than unanimity, or so overwhelming a majority as to be tantamount to unanimity, on the cardinal point of respecting constitutional forms, even by those who do not wholly approve of them, can render the excitement of political passion bloodless, and yet expose all the authorities in the State to the full licence of pacific criticism. (Grote 2001, 93) Grote, George (2001) A History of Greece: From the Time of Solon to 403 B.C., Condensed and Edited by J.M. Mitchell and M.O.B. Caspari. London: Routledge (George Routledge 1907, [Based onA History of Greece from the Earliest Period to the Close of the Generation Contemporary with Alexander the Great (12 volumes) In Grote’s interpretation of Athenian democracy, the democracy itself improves the mentality of the people who are now concerned with the common good, and with the private and public actions which go beyond pure egotism.  The suggestion that constitutional morality similar to that in the United States can be found in Athens through the institution of ostracism certainly cuts across a lot of assumptions about contrasts between ancient and modern liberty, direct and representative democracy.  The attribution of ‘constitutional morality’ to the Athenians could be something of an anachronism, certainly if means attributing mid-nineteenth American century attitudes to fifth century BCE Greeks.  One distinction could be in the unwritten laws that Pericles refers to in Thucydides account of his speech.  There is not necessarily a complete break, explicit notions of natural justice, along with less explicit assumptions about right and wrong, in modern societies may give us unwritten laws of a kind.  However, surely Pericles meant something stronger, which can be found for example in Plato’s Phaedo, the idea of the laws of a city as its character, as something distinct from a list of laws, some way in which the city is personified. The tragedies of Periclean (broadly speaking) Athens present us with law as the force of divine powers, and in conflicts between civil and natural law, which are very personalised and are not about adjudication between laws which may appear to conflict.  The ancient sense of law as something divine, archaic, often present in customs rather than written down is something noted by eighteenth century writers, as when Montesquieu talks about the conditions of a democratic republic, with reference to the early stages of antique republics.  Foucault, himself, alluded to this issue, when he refers to the growth of ‘juridification’ in the Middle Ages which he contrasts with style of living and care of the self in antiquity.  So ‘constitutional morality’ in ancient republics refers not only to respects for laws, and the laws which set up institutions along with the limits of law, but also to customs, respect for gods and the ancestors, awareness of the city as unified by its common rituals.  All of these might be taken as aspects of the liberty of the ancients, in Constant’s distinction, but we should also remember that Friedrich Hayek, admirer of  Constant and apparent advocate of liberty in the modern sense was a great advocate of law as distinct from written legislation.  This is another instance where attempts to make an absolute distinction between ancient and modern liberty fail. In Grote, again we have an idea of active liberty attributed to antiquity, but also to modernity.  This is contrasted with Burkean conservatism in which it is assumed that the people will never, as a whole, be concerned with Burkean principles. This inherent quality of democracy adds to the benefit it provides of milder criminal justice, along with better laws and administration.  All of these advantages of democracy elevate the people beyond obedience to authority, and is what gave the Athenians success in war. Stronger expressions cannot be found to depict the rapid improvement wrought in the Athenian people by their new democracy.  Of course this did not arise merely from the suspension of previous cruelties, or from better laws, or better administration.  These, indeed, were essential conditions, but the active transforming cause here was, the principle and system of which such amendments formed the detail: the grand and new idea of the Sovereign people, composed of free and equal citizens — or liberty and equality, to use words which so profoundly moved the French nation half a century ago.  It was this comprehensive political idea which acted with electric effect upon the Athenians, creating within them a host of sentiments, motives, sympathies, and capacities, to which they had been strangers.  Democracy in Grecian antiquity possessed the privilege, not only of kindling an earnest and unanimous attachment to the Constitution in the bosoms of the citizens, but also of creating an energy of public and private action, such as could never be obtained under an oligarchy, where the utmost that could be hoped for was a passive acquiescence and obedience.  Burke has remarked that the mass of the people are generally very indifferent about the theories of government; but such indifference (although improvements in the practical working of all Governments tend to foster it) is hardly to be expected among any people who exhibit decided mental activity and spirit on other matters; and the reverse was unquestionably true, in the year 500 B.C., among the communities of ancient Greece. (Grote 2001, 109) Grote accounts for the strength and liberty of the Athenians, with reference to the shared idea of a sovereign people of free and equal people.  This is certainly attributing the language of early modern contract theorists, particularly Rousseau, to ancient Athens, and probably contains an understanding of antique politics entangled with modern conceptions of sovereignty.  As Foucault notes, equality before law is (isonomia) is fundamental to antique liberty, itself connecting with equality in the right to speak in a public forum (isegoria), and that further connecting with parrhesia.  However, the ancient conception is much more specific, particularistic and opaque, with regard to the unity of an individual people sharing common roots in the city. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
UK discovery could lead to bespoke treatments for patients with advanced cancer Researchers have spotted rare "flag" proteins that act as immune system targets and are displayed on the surface of all of a patient's tumour cells, wherever they might be in the body. Normally they are shielded from the immune system, or missed because rapidly evolving cancers present too many constantly changing targets. Once the omnipresent proteins, or "antigens", are isolated, potent immune system cells called T-cells can be employed as homing missiles to zero in on them and destroy the cancer. Such an approach, which involves mapping the DNA in a patient's tumour sample, would help to overcome the ability of cancers to resist therapies by altering their genetic make-up. The work is at an early stage and so far just two of the special antigens, plus the T-cells that recognise them, have been identified in two lung cancer patients. But the scientists hope to see rapid progress leading to patient trials, and are optimistic about similar targets for other cancers being found. Professor Charles Swanton, from University College London's Cancer Institute, a leading member of the Cancer Research UK-funded team, said: "I will be disappointed if we haven't treated a patient within two years. "Do we think it's going to work? I hope this is going to result in improvements in survival outcomes. If this doesn't work I'll probably hang my hat up and do something else." He pointed out that a tumour evolutionary tree was like a "snowflake or fingerprint", unique to each patient. That presented a problem for clinicians and patients, because as tumours developed the tree grew new branches containing novel genetic mutations which helped the cancer resist treatment. The new research had shown there were potential immunotherapy targets from the "trunk" of the tree that are flagged up on all of a tumour's multiplying cells. Prof Swanton added: "This is exciting ... now we can prioritise and target tumour antigens that are present in every cell, the Achilles heel of these highly complex cancers. One way of exploiting the discovery would be to develop T-cell-activating vaccines based on the antigens, said the researchers, whose findings are reported in the journal Science. Another would be to "fish out" the small number of T-cells in tumours that are naturally primed to recognise the antigens, multiplying them in a laboratory, and returning them to the patient. Currently there are too few of the ready-primed T-cells in patients to make a difference. In the samples analysed by the scientists, they only made up 1% to 2% of the T-cells in a tumour. Another hurdle to be crossed is the way cancer protects itself using proteins that are normally employed to keep the immune system in check and prevent it running out of control. In practice, the new antigen-targeting therapies would have to be accompanied by so-called "checkpoint inhibitors" - drugs that are already being used to treat cancer patients. Professor Peter Johnson, Cancer Research UK's chief clinician, said: "This ... research gives us vital clues about how to specifically tailor treatment for a patient using their immune system. "It gets us closer to knowing why some patients respond to immunotherapy treatment and others don't, and how we might select which patients will benefit the most." The research was also funded by the Rosetrees Trust, set up in 1987 to support life-changing medical science. Experts are increasingly coming round to the idea that the future of cancer treatment is personalised medicine, tailored to small groups of patients or even individuals. A new more effective approach to tackling cancer is desperately needed, Prof Swanton believes. He said 71 new anti-cancer drugs approved by the US Food and Drug Administration (FDA) over a period of 12 months were associated with a typical survival time of no more than two months. On average, each course of treatment cost 100,000 dollars (£70,727). Prof Swanton added: "This is the emperor of all maladies. It's just a massive challenge, because this disease is unlike all other diseases that we see in medicine. We're dealing with an entity that's constantly evolving, constantly adapting, and constantly changing its genome."
Theoretical Background Spectrum A theoretical spectrum is the last possibility for choosing a sky background. This spectrum is shown in Figure 8. Figure 8: A synthetic spectrum of the sky background The fundamental parts of this calculation are the OH-line database [OH-LIN,ROUS00] and the transmission data of the atmosphere [AIRTRA]. The ratio of intensities for two lines may change during the night or from observation to observation. This is the reason why it is possibile to change the relative intensities via an ini-file. The predefined values are adjusted to Mauna Kea's night sky spectrum [SKYBA]. For modeling the sky background, we assume: Then the sky background can be described as: Nsky = $\displaystyle {\frac{{ \mathrm{T} \cdot OH+(1-\mathrm{T}) \cdot BB_{\mathrm{250... ...mathrm{R}}{\mathrm{R}+\mathrm{h}}\right )^2 \cdot \sin^2\mathrm{z} \right )}}}}$ (16) Nsky : number of photons from sky background T : transmission of the atmosphere OH : intensity of the OH-line BBx : blackbody with a temperature x R : earth radius ( $ \sim$ 6378 km) h : hight of emitting layer ( $ \sim$ 100 km) z : zenith distance Andre Germeroth 2014-07-17
Vision Diseases, Disorders & Definitions B Defintions Behçet's Disease of the Eye Other Names Adamantiades What is Behçet's disease? Behçet's disease is an autoimmune disease that results from damage to blood vessels throughout the body, particularly veins. In an autoimmune disease, the immune system attacks and harms the body's own tissues. What causes Behçet's disease? The exact cause is unknown. It is believed that an autoimmune reaction may cause blood vessels to become inflamed, but it is not clear what triggers this reaction. What are the symptoms of Behçet's disease? Behçet's disease affects each person differently. The four most common symptoms are mouth sores, genital sores, inflammation inside of the eye, and skin problems. Inflammation inside of the eye (uveitis, retinitis, and iritis) occurs in more than half of those with Behçet's disease and can cause blurred vision, pain, and redness. Other symptoms may include arthritis, blood clots, and inflammation in the central nervous system and digestive organs. Learn more about Behçet's Disease Bietti's Crystalline Dystrophy Other names Bietti's crystalline corneoretinal dystrophy What is Bietti's Crystalline Dystrophy? Bietti's crystalline dystrophy (BCD) is an inherited eye disease named for Dr. G. B. Bietti, an Italian ophthalmologist, who described three patients with similar symptoms in 1937. The symptoms of BCD include: crystals in the cornea (the clear covering of the eye); yellow, shiny deposits on the retina; and progressive atrophy of the retina, choriocapillaries and choroid (the back layers of the eye). This tends to lead to progressive night blindness and visual field constriction. BCD is a rare disease and appears to be more common in people with Asian ancestry. People with BCD have crystals in some of their white blood cells (lymphocytes) that can be seen by using an electron microscope. Researchers have been unable to determine exactly what substance makes up these crystalline deposits. Their presence does not appear to harm the patient in any other way except to affect vision. What causes Bietti's Crystalline Dystrophy? From family studies, we know that BCD is inherited primarily in an autosomal recessive fashion. This means that an affected person receives one nonworking gene from each of his or her parents. A person who inherits a nonworking gene from only one parent will be a carrier, but will not develop the disease. A person with BCD syndrome will pass on one gene to each of his or her children. However, unless the person has children with another carrier of BCD genes, the individual's children are not at risk for developing the disease. In September 2000, NEI researchers reported that the BCD gene had been localized to chromosome #4. In this region of chromosome #4 there are hundreds of genes. Researchers are now looking for which of the genes in this region of chromosome #4 causes BCD. Finding the gene may shed light on the composition of the crystals found in the corneas of patients with BCD and on what causes the condition. Learn more about Bietti's Crystalline Dystrophy Eyeglass lenses that incorporate two different refractive powers in each lens, usually for near and distance corrections. Binocular vision: Blending, by the brain, of the separate images seen by each eye into one composite image. Also, explained as the simultaneous use of the two eyes. Other Names Granulated eyelids. What is blepharitis? Blepharitis is a common condition that causes inflammation of the eyelids. The condition can be difficult to manage because it tends to recur. What causes blepharitis? Blepharitis occurs in two forms: What other conditions are associated with blepharitis? Complications from blepharitis include: Learn more about Blepharitis Other Names Benign essential blepharospasm, hemifacial spasm. What is Blepharospasm? Blepharospasm is an abnormal, involuntary blinking or spasm of the eyelids. Learn more about Blepharospasm Blind spot: Sightless area within the visual field of a normal eye. Caused by absence of light-sensitive photoreceptors where the optic nerve enters the eye.
carteremborg13's blog A human body contains over 10, 500 microbes — or more than ten times the number of human cellular material! The obtaining, published in PLOS A SINGLE, comes as scientists throughout the world work to understand the complicated relationships between the invisible world” of the microbiota in our bodies and the impact they have on our health and even our moods. Recently, scientists in California found evidence that the bacteria in the stomach play a role in causing Parkinson's Disease. If you're trying to get low fat, having a slow sleeping metabolism works against you. Resting metabolic rate is definitely the calories you burn off when you're not lifting weights, walking, or doing other activities. Even when you're not moving around or consuming, your body still can burn calories. After all, your body has to have fuel to sustain breathing and to keep your heart whipping. Your resting metabolic price makes up 60 to 75% from the calories you burn every day.eating well but losing weight In this content, we discussed the connection between gut microbes and food cravings. Research within the oral microbiota may yet provide more links between microbes and our eating behavior. Functional and structural brain imaging alongside microbiota and metabolite analysis will be essential to enhancing our understanding of the microbiota-brain connection and the impact on human health insurance and disease ( 32 ). While some bacterias contribute to diseases, many do not. In truth, there are numerous bacterial strains we all could take advantage of having more of. At the same time, having certain illnesses can negatively impact the microbiome, although we still have a lot to learn about how this happens exactly. The more we can come to understand how bacteria in the microbiome affect the genes and predispose us to diseases, the better we can personalize treatment approaches and prevent and manage diseases before they're life-threatening. The Sonnenburgs admit that our knowledge of the microbiota is in the infancy and frequently help remind their readers that scientists have a long way to move before we understand most the gut's underlying systems. And none of their particular lifestyle recommendations are nearly so radical as a do-it-yourself fecal transplant — few scientists or doctors would object to the idea that Americans should eat more vegetables, or pet more dogs. But unlike Eisen, they claim that it is imperative that people start caring intended for our long-overlooked bugs, even if we've yet to prove definitively that they will are the lever by which the rest of our health can be regulated. The large intestine (colon) offers a large resident population of microbiota, consisting of at least 1012 organisms per gram of luminal contents. Bad gut floras can in fact trigger disease. If you take the flora of an obese mouse and you put it into a germ free mouse, so one that doesn't have a flora, that germ free mouse becomes obese. Therefore we are planning, right, all of us can learn something from this flora about your personal health. We are moving towards diagnosing people within the contents of your stomach. And so this is becoming done, for instance , for diabetes, or for colon cancer. We will appear at how lifestyle, diet plan, the environment and aging lead to changes in the microbiota, and exactly how these changes may lead to poor health, and also how major alterations in the microbial communities link to chronic diseases. With an ageing population threatening to increase pressures within the health care system, we will have a particular focus on studying the decline of the microbiome during old age group. Ensure your insurance. Check with your insurance provider to see what medical coverage it offers when you're away from house. Find out if any medical care you may receive at your destination can be covered, and whether there are preferred, or in-network, facilities under your plan. You might want to purchase immediate traveler's insurance and medical evacuation coverage. The Essential Association for Medical Assistance to Travelers and the Circumstance. S. Department of State suggest options for people journeying outside the United Claims. Keep the insurance card with you all the time. The word bacteria” may frighten you in first. In fact, we are groomed into viewing bacteria” as a bad factor. We want to avoid it like the plaque. I mean, we purchase cleaning products specifically designed to get rid of bacteria. While you definitely desire to continue cleaning off your countertops and bathroom bowls, gut bacteria is actually a good thing.guten morgen Put your self on restrictions for two solid weeks. Allow your body to heal. This sounds extreme but in the event that you would like to feel good, you have to figure out why you do not. That means taking out everything non-essential and adding it back slowly. Restrict your diet to whole fruits and vegetables, water, lean (organic) proteins, and healthy fat (coconut, olive, or avocado oil). For some pet parents, a trip is zero fun if the four-legged members of the family can't come along. In short, it would not surprise me to learn (from some future study) that severe gut dysbiosis affects the brain/mood therefore far in order to significantly hinder the ability to socialize (follow along and contribute to conversations). And that this gut dysbiosis, if present during a kid's critical development stages, probably directly causes autistic behavior to develop (some kind of cruical social interaction experiences were missed, leading to neurological abnormality of a few kind). Other worthy precautions: To avoid nasty parasitic diseases like schistosomiasis, do not swim or wade in freshwater in developing countries or wherever the sanitation is poor. Pools should be chlorinated. Nevertheless adorable an animal (domestic or wild) may become, keep your distance. Do not touch or feed any animal you don't understand. Some carry rabies. Should you get bitten or scratched by an animal, wash the wound instantly with soap and clean water and, if at all possible, get to a physician quickly. It's staggering to think 65% of Australians are overweight or obese. Weight loss is usually on everyone's lips and it's often heard with the words deprivation, diets and discipline driven by self-discipline. But now the focus is on your gut and the good bacteria that reside there, long regarded as to be your second brain. The 100 trillion bacteria, mould viruses and fungi—your microbiome—are way forward of the game with regards to losing weight.100 trillion bacteria in your gut I had pimples all over my encounter, and my dad who had a similar thing when he was developing up at the same time, he said the only thing that would stop it for him was antibiotics. Now, I am just from a cattle plantation and thus we didn't even talk about changing diet or anything, and I can get rid of this acne, which kept coming back and back and back again. And it was very bad for my self-esteem as a teenager if you are trying to get a first girlfriend or something. Your gut, also known as your gastrointestinal tract, is the tube in your body that carries food from your stomach to your intestines. Your gut hosts millions of species of bacteria. In fact , scientists estimation that there are 100 trillion bacterial cells within your body. That's roughly ten occasions as many cells since the cells that make up your body. The federal government of Canada has developed this booklet to help you protect your health while traveling or living abroad. Yes, really! Dark chocolate contains flavonoids similar to all those found in green tea, and it's part of the heart-healthy, gut-healthy Mediterranean diet. Researchers have found many links between our digestive tract bacteria and organs Your gut microbiome influences your digestion, defense mechanisms, metabolism, and hormones. It even affects neurotransmitters that control mood and brain activity. If your hernia isn't causing any kind of symptoms, your GP may suggest monitoring your condition, but not treating your hernia straightaway. This is known as watchful waiting. Watchful waiting means your treatment is delayed until you need it. The idea is that you see your GP if you have any change in your symptoms. He or the girl will be able to inform you on your treatment options. When it's time for foods, someone with dementia may experience problems with co-ordination, remembering food and also the sequence of meals. This can result in gradual, drawn out meals. It goes to show that medication and the microbiota are carefully linked, ” says Raes. In the event that your gut is most out of whack, provide your gut a break from the inflammatory trigger foods for 30 days.guten tag GORDON: Well, we know what functions certain groups of bacteria are responsible for because we actually required notice of who had been the invaders. And this was that process of invasion by these groups of organisms that collectively are called the bacteroidedes(ph) that were associated with this prevention of the increased weight and metabolic process. The single most significant thing you can do to maintain a healthy immune system is to cultivate a healthy gut. Doing these types of four simple things, will help you optimize healthy flora yielding a strong immune program. The latest research, published in the International Journal of Obesity, shows that people who have stable weight over nine years or lose weight, have a larger amount of different types of microbes in their courage, eat more fibre and have a higher abundance of certain types of gut microbes. Bacterial diversity might explain why several diets work for a few people and not others. Today I found out the human gut contains about 100 trillion bacterial cellular material, about 10 times because many cells as make up the human body. The glycaemic index, however , only steps glucose, however, not fructose. Therefore the glycaemic index can underestimate the sugar contents of foods that have a lot of fructose or table sugar (which is made up of a variety of glucose and fructose). Due to this, the glycaemic index might be lower than expected to get many pastries, fruits, soft drinks and fresh fruit juices, and it does not give details about calories. High body fat snacks, such as nuts, have a low glycaemic index, but they are extremely high in calories. What makes the microbiome so fascinating and frustrating is all this promise, tempered by main unknowns. Microbiologists researching the topic say it's too soon to believe which our bacteria are the solution to everything that troubles all of us. Still, those same professionals are making simple changes in their own lives — particularly when it comes to the meals they eat — to give their bugs a push in the right direction. We all prodded them for the science-backed steps they're taking, all ideas the rest of us can use to make the most of our microbes right right now. Excess acid may not end up being the cause of your problems. Many people who suffer from indigestion, acidity reflux or heartburn think it is because they produce an excessive amount of acid, but it is definitely just as likely that they don't produce enough. This triggers a pressure change in the stomach which allows the sphincter at the top to open, letting the articles pass back out. Eating a little protein at each meal and chewing well both raise acid production. Also try a tea spoon of raw cider vinegar (it must be the type that contains the mother sediment) in a glass of water instantly before you eat. So what exactly is usually a prebiotic? Prebiotics are components of our food that people don't break down and use ourselves, yet rather are used by the bacteria in our gut. Almost everything we eat is divided by the acids and enzymes in our stomach and quickly absorbed by the upper portions of our GI tract (the sections meals ways to immediately after the stomach). Although bacteria could use these nutrients to get food, they usually by no means get a chance to because we absorb it ourselves. There are three exceptions to this: soluble fibres, insoluble fibers and resistant starches. We lack the acids or enzymes in our stomach to break these down and they achieve our GI tract (and gut flora) intact. Particular bacteria generally specialize in consuming one of the three types of fibres, so it is essential to be sure you get most three in what you eat to promote a diverse and healthy gut ecosystem. In case what inulin, FOS, and GOS don't mean much to you, the following foods are rich causes of prebiotics: bananas, honey, whole grains, artichokes, leeks, onions, and garlic. In addition, you can come across prebiotics in fortified foods and beverages. Aim to eat about 2-30 grms per day of prebiotics, which can be attained from eating ¼ of an onion, 1 banana, and about ½ cup whole wheat flour (or something that has been made with ½ glass whole wheat flour. Regarding probiotics, yogurt, buttermilk, kefir, kombucha, kimchi, sauerkraut, miso, tempeh and other fermented foods contain probiotics. If you'd rather get your dose of probiotics in the form of a supplement, go for this.gutted Like people, horses are travelling more and more. Eat light meals so you won't feel uncomfortable, bloated or queasy. Your digestion and body clock can be upset when travelling. On the topic of keeping updated of how the Circumstance. S. impacts other countries, especially if you are in an afflicted country, I would say this: as soon as you can, try to get the local spin on what is definitely going on, because Americans are most times are kept in the dark about the truth of such situations. Do you eat healthy and workout, however still struggle to shed pounds? Have you ever wondered why your skinny friend who seems to be able to eat anything and everything can still fit into her size 2 denims? This reason may rest within your gut bacteria. Most informative post about budget traveling I've examine that provides plenty of insightful options for people. A recently exercised dog will be in an even more relaxed state during any kind of long trip. Your doggie may growl at other people and that's ok. Is actually natural for your puppy to become a little nervous around new people. She's out of her element and may growl. That isn't because she is being aggressive, but since she's a little freaked away and needs reassurance that everything's under control. If you pull her away from the new person, you're indicating that there is something incorrect and she'll freak away more. Again, be relaxed and assertive and show your dog that you might have got it covered. Joe Alcock, a biologist and associate teacher at the University of New Mexico, thinks which our struggles with eating foods rich in sugar and body fat can partly be explained by survival needs of our microbiomes, and asserted so in a 2014 paper in BioEssays Right now there are certain bacteria that thrive on specific kinds of food, Alcock says. Bacteria could be making the foods they desire seem tastier to us, by changing taste receptors.eating well disley From the audio of it, you may think leaky gut only affects the digestive system, yet in reality it may affect more. Because Leaky Gut is so common, and such an enigma, I'm offering a totally free web conferencing on all things leaking gut. Click here to learn more about the webinar. As someone who's carried out their fair share of solo travel, I absolutely understand your girlfriend's motivation behind wanting to carry on her own. I think it's wonderful that she actually is not only beautiful yet clearly strong-minded, independent and adventurous. These are all great qualities that can add a lot to your relationship. Over three months and as many follow-ups, I had developed exhausted my arsenal of strategies to help normalize her blood sugar The girl removed processed carbohydrates, utilized blood sugar-balancing nutrients like chromium and lipoic acid solution, got sufficient sleep, and incorporated burst training and weight resistance into her fitness routine. Now the immune cells come and try to kill the cholesterol but they can't kill it, because is actually not a live bacteria. If you have a normal, healthful pregnancy, it can be safe to fly during most of it. However , discuss your trip plans along with your doctor or midwife before booking your flight. In some high-risk cases, your doctor may advise you to stay near to house throughout your pregnancy. by volunteering, or simply sending us responses on the site. Scientists, teachers, writers, illustrators, and translators are all important to the program. If you are interested in helping with the website we now have a Volunteer page to find the process started. A definitive healthy eating bible. Over 150 nutritious, delicious recipes that are good for the body and mind, and can allow you to look and experience amazing.guten tag Researchers hypothesize that this obese microbiota” may enhance indicators that trigger the amount of energy we harvest from food. This in switch increases the amount of calories from fat absorbed, and therefore weight gain ( 3, 12 ). Three heaped tablespoons of vegetables, beans or pulses like lentils or beans (this includes cooked beans). I possess always been a fan of Lorraine Pascale however I discovered these recipes uninspiring. Presently there was also some difficulty in purchasing some of the ingredients at my local supermarket. Her prior recipes books are better. They help digestion and relax the intestines and stomach and, contribute to emotional rest. Consist of carbohydrates in the meals you eat each day. Healthier sources include wholegrain starchy foods, fruits and vegetables, pulses and some dairy foods. As all carbs affects blood glucose amounts, be conscious of the amounts you eat. Diet plan has a huge effect on health: that's barely ground-breaking. What's more surprising is the very noticeable effect that diet has on the skin. We have a 3D view of nutrition, taste and beauty. With the help of the talented nutritionist, we're here to guide you into good nutrition for your skin's needs! Life and Health Network is a 501(c)(3) non-profit organization dedicated to developing, creating and obtaining compelling, evidence-based life and health media. We believe we had been designed to have the physical, emotional, and religious domains of our lifestyle in balance. Our objective is to inspire and engage the global community to achieve that balance, to live healthier and to live life more abundantly. A person who loves solitary travel is seen because a free spirit. In one proof-of-concept study in 2013, researchers gave a small group of females fermented milk with specific types of bacteria added. After drinking this drink twice a day to get four weeks, the ladies went through a functional MRI while looking at pictures of actors with angry or frightened facial expressions—images that usually trigger the part of the brain involved in processing emotions during a state of alertness. The responses of ladies who also drank the probiotics had been less ‘reflexive' than the control group. Hepatitis B This sexually transmitted disease is usually spread by body liquids and can be prevented by vaccination. The long-term consequences can include liver cancer and cirrhosis. We don't however know exactly what a health-beneficial gut microbiome might look like, though recent study points to the reality that the specific biochemical functions that different bacteria can hold out are more important than the species present inside your gut. Small amounts of supplement K can also become found in meat and dairy foods(NHS 2012). While you don't want diarrhea keeping you in the bathroom your whole trip, obstipation is no less unpleasant. Being unable to have got a bowel movement may cause abdominal pain, discomfort, gas, and bloating. Also, kids of any kind of age can get malaria therefore if you're traveling to a country with a malaria risk, talk to your doctor about antimalarial medicines. The doctor will decide the best preventative medication based on your destination and your child's health position. A. Gut-When I reference gut” I am predominantly speaking about the large intestinal tract. Roughly 10 to the 14th amount of bacterias resides in our whole body, but about 10 to the 13th of this amount harbors in our intestinal flora. Because of the acidic environment that food travels through in our bodies, all the way from the esophagus to the beginning of the small intestine, bacteria avoid find a real home. When your food arrives in the small intestine, there is a modest amount of all those bacteria, about 50 mil per teaspoon, but not really to be outdone, when food arrives at the large intestine, 500 billion microbial cells per teaspoon is the count! I actually have GERD (chronic acidity reflux) pretty badly and if it wasn't to get grains, fibrous fruits, honey, fish, chicken and grass-fed whole milk, there'd end up being almost nothing I may stomach. The things recommended right here would leave me starved and in pain…so, take these recommendations having a grain of salt. Listen to your body and find what works for you, everyone's gut bacteria is different.preparing for an interview Your large intestine is teaming with colonies of bacteria, as many as 100 trillion of them. Salmonella and Campylobacter (which account for many cases of food poisoning in the UK) Clostridium difficile (a risk during and after antibiotics). If we avoid have enough digestive nutrients, we can't break down our food—which means also though we're eating well, we aren't absorbing all that good nutrition. Such great tips! Being sick on a trip is the absolute worst. I think getting enough sleep is usually number one for avoiding sickness; at least for me! A varied, healthy variety of microbiota provides become such a big deal, in fact, that in 08, the National Institutes of Health launched The Human Microbiome Project, a five-year, $115 million project intended to explore microbial bacteria in healthy and not-so-healthy folks. 4th, your gut also provides to eliminate all the toxins produced as byproducts of your metabolism, which your liver dumps into bile. If things get supported up when you are constipated, you are going to become harmful and your health will suffer.preparing for ramadan I have IBS and have noticed some interesting things that resonate with this article whilst using a low FODMAP diet plan. Basically after eating this diet for a few days or a week I tend to, for a few inexplicable reason, crave higher FODMAP foods. medically proven mental activities that will help you to discover your hidden story, eliminate self-sabotage, reprogram your brain to get success, and help you accomplish your goals. Perhaps the next time you have a corporate message to get across I wish you'll stay away from telling a story all prescriptive and corporately and rather be motivated to use a visual metaphor. Doctor. Josh Axe is upon a mission to provide you and your family with the best quality diet tips and healthy tested recipes in the world... Sign up to get VIP access to his eBooks and valuable weekly health tips for FREE! Because you lose essential fluids, salts and nutrients throughout a bout with traveler's diarrhea, you may become dehydrated. Dehydration is especially dangerous for children, older adults and people with weakened immune systems. Prevent processed foods and products high in sugar and carbohydrates, says Axe. Research have shown that both sugar and artificial sweeteners can decrease good bacteria levels in the belly. Maecenas aliquet accumsan Or visit this link or this one
Wednesday, December 10, 2008 Skylab Rescue Mission (SL-R) Skylab is considered the least-remembered part of the Apollo program. If people do recall Skylab, it is likely because of the "sky is falling" fears it evoked in 1979 when it was about to re-enter the Earth's atmosphere. Because it was an uncontrolled re-entry, no one knew how much of it would survive re-entry, or even where or when it would come down. I remember "Skylab pools" with people betting on the date it would come back to Earth. Those who were really paying attention may remember that the entire Skylab project was in serious jeopardy starting 63 seconds after the station's launch, when the meteoroid shield ripped off of the space station and tore off one of the station's two key solar panel wings. The heroic efforts of the first crew to man the station, led by Pete Conrad, led to Skylab becoming habitable and useful for its three long-duration crew stays. The second crew to visit Skylab, commanded by Al Bean, encountered difficulties with their Apollo spacecraft prior to docking, when one of the four quads of reaction control system (RCS) thrusters on the Service Module developed a leak and had to be shut down. A second RCS quad also developed a leak and also had to be disabled. There was deep concern that the Apollo spacecraft, which the crew would need for return to Earth, could not be controlled adequately with half of the RCS thrusters out of action. The 1969 movie "Marooned", followed by the 1970 Apollo 13 near-disaster, were still fresh in people's minds. We didn't want to contemplate a crew of astronauts stranded in orbit. NASA decided to prepare a spacecraft for a potential rescue mission, should it become necessary. A Command Module was adapted to hold five crewmen instead of three. Astronauts Vance Brand and Don Lind were selected as the crew for SL-R, the Skylab Rescue mission. NASA ultimately determined that the Skylab crew would be able to get home safely. Nonetheless, they retained the idea of using a modified ship as a contingency rescue vehicle for the last Skylab crew. The vehicle was rolled out to the launch pad on December 3, 1973. It was ultimately not needed, so it was rolled back to the Vehicle Assembly Building after the conclusion of the last Skylab mission. This CM became the backup CM for the Apollo-Soyuz Test Project (ASTP). It is on display in the visitors center at the Kennedy Space Center. Vance Brand got to fly on the ASTP mission in July 1975. Don Lind wouldn't get his first flight for 11 years, on Space Shuttle mission STS-51-B in 1985. No comments:
Posted: Sunday, April 13, 2008 Spiders are the stuff of numerous horror movies and spooky Halloween tricks. But this is a bad rap! All spiders are predators and almost all spiders are venomous (there is a small group that is not). Their venom is an adaptation for subduing their prey, which is usually an insect, but very large spiders may take small vertebrates too. There are hundreds of species of spider in Alaska, but most of them pose little or no risk to us. Spiders catch their prey in a variety of ways. There are spiders that chase down their prey and others that ambush their victims. Crab spiders lurk in flowers, generally mimicking the color of the flower, and snatch unwitting flower-visiting insects (including pollinators). Other, such as the web-builders, build traps. The spiders we usually notice are the ones that build webs. There are many kinds of web-builders and many styles of web. The common house spider builds messy webs in nooks and corners. In the early morning one might see dozens of "bowl-and-doily" webs, glistening with dew, scattered in bushes and grasses; the tiny builder is usually concealed under part of the web. The most conspicuous and familiar webs belong to the to the orb-weavers. These build the elegant silken webs we sometimes see stretched across a trail or between bushes. These orb-webs are traps for catching flying insects. The basic construction of a typical orb-web is a spiral of sticky silk supported by radiating, non-sticky but stretchy "spokes" that attach the trap to the surrounding vegetation. The orb spider commonly sits at the edge of the web, with one leg touching a strand. When a bug flies into the trap and shakes the web, the spider then rushes out and subdues its prey. The spider typically wraps up the prey in a skein of silk before retiring to eat it. Most orb weavers take down their web and eat it when night is over, thus recycling the protein of the silk to be used in making a new web the next night. But some species leave the web in position and repair it if it gets torn. These spiders typically make their webs conspicuous, by using colored silk or by constructing a patch of white silk in the middle of the web. This so-called stabilimentum has nothing to do with stability (contrary to its name). Its main function seems to be making the web conspicuous so that birds don't fly through it and wreck it: Where there are no birds, the spiders stop making stabilimenta. Some potential prey insects seldom get caught in sticky webs. Moths, for example, flutter vigorously when they blunder into a web and bounce out or slide to the edge of the web. The colored scales on the moth's wings stick to the web and detach from the wing, so the moth itself is free to fly away. Similarly, caddisfly adults have detachable hairs on their wings and allow the caddisfly to escape the sticky web. Some insects, including stinkbugs, spray noxious chemicals when attacked by a predator. Certain spiders bite their prey before wrapping it up in silk and thus get sprayed by the deterrent chemical. Other spiders can deal with this problem by wrapping the prey in silk before biting it and injecting venom. If a stinkbug manages to emit its nasty discharge before getting wrapped up, the attacking spider reacts violently - running rapidly away and energetically cleaning itself. Meanwhile the clever stinkbug spits on the places where the sticky web is in contact with its body or legs. The saliva dilutes the stickiness and makes the strands stiff instead of stretchy. The web is then breakable and the bug can often extricate itself and fly away. Ambush bugs are small, venomous, predatory insects that sometimes get caught in orb webs. When the hungry spider approaches, the ambush bug injects its venom into a leg of the spider. The usual reaction of the spider is to pinch off its own leg. The ambush bug's venom is lethal and the spider saves its life by giving up a leg: a counter-defense to the defense of the prey. People always worry about getting bitten by a spider. Here in Southeast, there are not many spiders that are likely to hurt us with their venom. Most native spiders here are too small and their jaws are too weak to penetrate human skin. A few native species are large enough to inject venom into humans and may also induce an allergic reaction in some people. But the majority of spiders that are likely to cause slow-healing wounds from injection of venom are outsiders, coming here from elsewhere. Famous nasty spiders such as the brown recluse and black widow may come to Southeast in freight, such as carpet and furniture. However, they apparently cannot establish populations here, except temporarily in basements and junk piles. Another unpleasant exotic is the hobo spider (and its relatives), which likes to nest in wooden pallets and can come in with freight. So far, however, the hobo does not seem to be established here. One of the hobo's relatives is established in Wrangell, and possibly in Juneau. We also have the false black widow, lacking the red hourglass figure on the underside of the abdomen. This species is said to be about as nasty as the black widow but less aggressive. In any case, if you see a spider, it is likely to be harmless to you and useful in eating various insects. If you are bitten, and if there is a question about what spider it is, the best plan is to catch it gently and take it to an expert for identification. EEEEK and smash are much less edifying, because a smashed spider cannot be identified and proper treatment is made more difficult. Trending this week: © 2017. All Rights Reserved.  | Contact Us
Tuesday, February 21, 2017 Constructing stopping rule for safety monitoring In many early phase clinical trials, if there is a known risk or theoretically potential risk for patients' safety, it is very common that a DSMB (data safety monitoring board) will be established to review the data on a on-going basis. Usually, there is probably a stopping rule for safety - the stopping rule based on the accumulated safety data that is different from the stopping rule for each individual patient. The stopping rule can be based on the expert's opinion and more commonly can be derived from the statistical standpoint based on the known background rate. Here are some articles about the safety monitoring and the stopping rule for safety: In fact, an easy way to construct a stopping rule is to utilize the hypothesis testing approach. The idea is to rule out that the observed event rate is higher than the background event rate and is to stop the trial if excessive event rate is observed. Here is an example from an early phase clinical trial for ischemic stroke where a known risk for the experimental drug is to cause excessive symptomatic intracranial hemorrhage (SICH). The plan is to enroll and dose up to 20 subjects. The literature reviews reveal that the background rate for SICH in ischemic stroke patients is about 10%. We can then construct a stopping rule based on the background rate for SICH of 10%. The DSMB is empowered to stop the trial whenever they deem fit to protect the safety of patients. DSMB will consider adopting a stopping rule that evaluates the rate of SICH after 5 enrollments, requiring suspension of trial entry if the observed rate of SICH be sufficient to reject the null hypothesis that the true SICH proportion (P) is 10% or less in favor of the (one-sided) alternative hypothesis that the true SCIH proportion is more than 10%. The table below depicts the stopping guidelines. Exact binomial methods are used to compute the p values and confidence limits. One-sided lower 90% confidence limit is calculated. Number of Subjects Enrolled in the Study Number of SICH Needed to Reject Null Hypothesis Observed Rate of SICH (%) One-sided p values Lower 90% Confidence Limit If 2 SICH events are observed in less than and equal to 5 subjects enrolled, the lower confidence limit of 11.22% will be exceeding the 10% background rate. The stopping rule for safety will be triggered and the study should be stopped. The SAS program for calculating the stopping rule will be something like below. Notice that we obtain two-sided 80% confidence interval in order to obtain one-sided 90% lower limit. Try-and-error method can be employed to find the lowest number of SICHs that will have lower 90% confidence limit exceed the background event rate (10%). data stopping;   input scenario SICH $ count;   1 Have 2   1 No   3   2 Have 3   2 No   7   3 Have 4   3 No   11   4 Have 5   4 No   15 proc freq data=stopping;   weight count;   tables SICH /  binomial (p=0.10) alpha=0.20 cl;                     **p=0.10 option indicates the background rate to compare with, here we assume the                         SICH rate of 10%;                     ** Alpha=0.20 to obtain two-sided 80% confidence interval;   exact binomial;  *Obtain the exact p-value;   by scenario; Sunday, February 12, 2017 Can drug be approved without demonstrating efficacy? Pharmaceutical industry is assessing the impact of the Trump administration on regulations in drug approval and drug price. It looks like there will be some government intervention on the drug price after all. It is also likely to have some changes in drug approval process, primarily through the reform in FDA. There have been a lot of buzz around the Trump’s choice for new FDA commissioner. The choice of the new FDA commissioner could be a signal for the future direction in drug regulation. The most discussed candidate is Jim O’Neill and the most discussed topic is his view about the drug approval without efficacy.  I went to the youtube to find the original speech by Jim O’Neill at a biotech conference. At around 18 minutes, he discussed the ways for speeding up the drug approval process “...another great, probably better idea is progressive licensing. We should reform the FDA so that there is an approving drug after the sponsor has demonstrated the safety.  Let people start to use them at their own risk, but not much on the safety. Let demonstrate the efficacy after it has been legalized.”  It is true that FDA may have some bureaucratic practices and has become the roadblock to the drug approval process. A lot of times, FDA is too conservative and too cautious in approving the drugs, this is obvious ever since the Vioxx incidence. Whenever there is any uncertainty (in both safety or efficacy), FDA will rather kill (not approve) a new product. In this way, nobody will blame them for approving an unsafe drug or a drug that is not efficacious. Exceptions are some cases where FDA reluctantly approved the drug because of the pressures from outside (for example, the female Viagra for HSDD in 2015 and eteplirsen for Duchenne Muscular Dystrophy in 2016).   It is likely that FDA reform is needed to cut bureaucratic red tape that slows the progress of science, reduce the time and cost for bringing the next generation of drugs to the market. However, approving a drug without demonstrating the efficacy (with demonstrating only the safety) will not work. It is jumping from one extreme to another. As a matter of fact, it is more difficult to demonstrate a drug’s safety than efficacy just because some of the safety signals require a very large sample size to detect. For diabetes drugs, FDA issued a guidance “Diabetes Mellitus — Evaluating Cardiovascular Risk in New Antidiabetic Therapies to Treat Type 2 Diabetes” with notion that the evaluation is basically based on the meta analysis, not individual study because sample size requirement for detecting the cardiovascular risk is too big for a single trial. Secondly, if a drug can be marketed without demonstrating the efficacy, the market will be full of the products like the ‘snake oil’ – no harm, but no effect. Wonder who will pay for the cost of these drugs in an era that the health insurance cost has come almost unmanageable? Thirdly, the safety assessment is usually full of the subjective component in it. The same safety signal could be viewed as critical by some and as not critical or trivial by others. Recently, a new antibiotics, Solithromycin,was not approved by FDA because the data from the pivotal clinical trials indicated more subjects in Solithromycin group had ALT/AST elevations than the control group. However, this imbalance in ATL/AST elevations could be viewed as not critical because the elevations were transient and disappeared after the use antibiotics was stopped. Considering that the use of solithromycin is usually short-term, the risk for solithromycin causing the liver damage can be viewed as a manageable risk. However, FDA declined the approval of solithromycin anyway even at the time that fighting the antibiotics resistant infections was so critical. My wishful thinking is that FDA will be reformed to speed up the drug approval process by removing some of the regulations, but not go to another extreme to approve a drug without demonstrating the efficacy. To protect the safety of the American people, the clinical trial and drug approval process will remain highly regulated. Even with FDA reform that causes significant reduction in developing time and cost, it will still be a lot more than developing a software.
QVT Tutorial - 2 A metamodel is a model of a model. In our case, the metamodel of the machine simply is a model of the automaton (remember, the automaton itself is a model of a machine). There are many ways to model the automaton, I created two different versions, metamodel MMA and metamodel MMB. The purpose of this tutorial is to transform MMA to MMB. MMA. The root class is "Project", and has a Title. A project can contain multiple Automata. Each Automaton has a Name and contains at least one Location. Each Location has a Name as well, and a boolean attribute IsInitial (whether the location is the initial state or not). The Edges are contained within the Locations. A Location can have multiple outgoingEdges, but an Edge can only have one targetLocation (it is just a line). Furthermore, a Location might contain an Update. An Update can be Urgent, and can contain multiple Variables. The Variable class has attributes Name and Type. Finally, the classes Rectangle, Ellipse and Triangle inherit all properties and containments from Location. Again, this is not really functional, but it serves well for demonstrating some QVT functions later on. Ok, I hope you are still with me. Lets define MMB: MMB. The root class is now called "Model". It has a Name. A model can contain multiple Automata. Each Automaton has a Name, and at least one Mode. Additionally, the Automaton can have multiple Edges (they are now contained within the Automaton). Therefore, an Edge has references to a sourceMode and a targetMode. The Mode class has a name and a boolean attribute InitialState. Furthermore it has the attributes Shape and Dimension: whether it is a Rectangle, Ellipse or Triangle, and their Dimension (Edge, Radius or Side). Finally, a Mode can contain Modifications. Each Modification has a VarName and a VarType. In this metamodel I decided to leave out the Urgent attribute. Please take a moment to convince yourself that both metamodels are models of the same type of automaton (except for the Urgent property. This is to demonstrate that you don't have to transform everything from a metamodel). I recommend that you print both metamodels, because you will need them further on in the tutorial. Continue...
Presentation is loading. Please wait. Presentation is loading. Please wait. Systems diagrams. Similar presentations Presentation on theme: "Systems diagrams."— Presentation transcript: 1 Systems diagrams 2 Positive Feedback Feedback that enhances a change in the system and it is destabilized and pushed to a new equilibrium. This feedback may cause the process to speed up until the system collapses, resulting in a "vicious circle". 3 Example: Positive feedback in a bank account 5 Human population growth 6 Melting permafrost and global warming 7 You try! Warmer global temperatures. Melt more ice and snow. The Earth’s albedo decreases. More energy from the sun is absorbed by the surface of the Earth. 8 Positive feedback Warmer global temperatures Snow and glaciers melt The Earth’s albedo decreases More energy is absorbed by the surface of the Earth 9 Production, consumption and human population You try! 10 Production, consumption and population 11 Climate Change.. Increase in the temperatures can cause more evaporation. Water is a greenhouse gas… 13 Negative Feedback Feedback that tends to neutralize or counteract any deviation from equilibrium, returning the system to a stead-state equilibrium. 14 Negative feedback example 15 Another example: air conditioner 16 You try! Increasing global temperatures. Increases evaporation of water. Increases formation of clouds. More light is reflected by the clouds. The temperature cools. 18 Negative feedback in ecosystems Predator Prey relationships Disease Food supply 20 Complete the diagram with increase/decrease 21 Identify Transformations and transfers in the hydrological cycle below: 22 Which flows will increase from climate change? 24 Answer: 25 Complete this example 1. A small glacier receives an input of 20 units of ice in the form of snowfall each year. As the ice melts, 19 units are lost through run-off, and 2 units through evaporation. (a) Draw a labeled flow diagram showing these processes and their relationships. [3] (b) State what would happen to the glacier if these inputs and outputs were to remain constant for several years. 27 A simplified energy flow diagram for a tropical forest food chain is shown Sketch a simplified energy flow diagram to show how energy flows in a named ecosystem 28 Local ecosystem energy flow sunlight Espino tree Degu and other rodents eats the nuts And so on… 29 Answers the questions about the diagram on the next slide State, giving one reason, what kind of system feedback is illustrated by the descending spiral. [1] (b) Discuss the meaning of the term sustainable development with reference to Figure 2. [2] (c) Evaluate the strengths and limitations of the models shown in Figure 2. 31 Answers (a) positive feedback because the effects of the problem make the problem worse; [1] (b) traditionally defined as development which meets the needs of the current generation without compromising ability of future generations to meet their own needs; but in this context it suggests development which has a positive role in enhancing the environment; and is dependent in some way on a healthy population; [2 max] (c) simple, easy to see the connections; shows clearly how actions in one area can have a knock on effect on the original Development; can distinguish between positive and negative actions and consequences; but far too simple, detail of what constitutes sustainable as opposed to inappropriate development is not clear; exact natures of the causal relationships are not explained; [2 max] 32 Soil degradation in Madagascar – make a model 33 Sample Madagaskar model deforestation Soil left to dry in sun unprotected Erosion from wind and rain Leacing of nutrients Soil becomes degraded 34 Madagascar answers.. protective forest cover removed; directly by logging/farming/mining/industry/settlement; soil exposed to rain and easily washed away/eroded; soil exposed to high temperatures and baked/dried out; nutrients leached away; soil loses fertility and can no longer support plants; soil degraded and useless as a resource for humans; [4 max] Award [3 max] if no climatic factors are mentioned, or the fact that soil is naturally poor. 35 Suggest how the differences in the size of comparable storages of the two ecosystems can be explained in terms of their different climates. 37 answer continued: 38 Which is in a steady state equilibrium? Why? 39 The temperate forest is in steady state equilibrium The flows are all the same size. 40 Draw a labeled flow diagram showing the flows and storages of inorganic nitrogen that normally occur within soil. Show on your diagram how these flows provide a link between the storages of dead organic matter and biomass. 41 Answer: 42 The diagram below shows the energy flow in a river ecosystem in temperate latitudes. All energy values are kJ m−2 yr−1. The system is in steady state equilibrium, calculate the value of X. 43 X = kJ m-2 yr-1 Download ppt "Systems diagrams." Similar presentations Ads by Google
Typical gasoline station“Millions of dollars worth of gasoline is wasted every day by motorists, because simple and inexpensive vehicle maintenance is neglected,” said Rich White, executive director of the Car Care Council. “Loose or missing gas caps, under-inflated tires, worn spark plugs, and dirty air filters all contribute to poor fuel economy.” Fuel-saving tips • Check vehicle gas caps–About 17 percent of the vehicles on the roads have gas caps that are either damaged, loose or are missing altogether, causing 147 million gallons of gas to vaporize every year. • Make sure tires are properly inflated–When tires aren’t inflated properly, it’s like driving with the parking brake on and can cost a mile or two per gallon. • Replace spark plugs regularly–A vehicle can have either four, six, or eight spark plugs, which fire as many as 3 million times every 1,000 miles. That results in a lot of heat, electrical, and chemical erosion. A dirty spark plug also causes misfiring, which wastes fuel. Spark plugs need to be replaced regularly. • Replace dirty air filters–An air filter that is clogged with dirt, dust, and bugs chokes off the air and creates a “rich” mixture–too much gas being burned for the amount of air, which wastes gas and causes the engine to lose power. Replacing a clogged air filter can improve gas mileage by as much as 10 percent, saving about 15 cents a gallon. Gas-saving driving tips • Avoid idling–Sitting idle gets zero miles per gallon. Modern, fuel-injected engines do not need to be warmed up. Letting older vehicles warm up for 30 seconds is sufficient–even in cold weather. Driving slowly the first mile is much gentler on your engine than idling. In fact, idling is one of the harshest things you can do to a car. Idling is also a major cause of pollution in cities. —Some of the above statistics were gathered from a U.S. Department of Energy Web site, www.fueleconomy.gov. Tagged with: Filed under: Save Gas & Earth
These graceful tusks serve as a reminder of the impressive Wooly Mammoth. These majestic animals roamed the earth over 1 million years ago, up to as recently as 4000 years ago. They were one of the largest mammals to ever walk the earth, often standing as high as four meters at the shoulder. The tusks measured as long as 16 feet. Over the millennia, as the mammoth became extinct, glacial deposits buried their giant tusks. Mammoth tusks have been found in Europe, North America and Asia since the end of the last ice age. The Mammoth roamed across the land bridge between Siberia and Alaska during the ice age when parts of Alaska and the Yukon in Canada were free of ice. Mammoth tusks can still be found in creeks and gold claims in Siberia, Alaska and the Yukon. Canada Fossils collects and buys mammoth tusks and then carefully restores them to their original condition. While mammoth tusks of over 60 kilograms are rare, the heaviest mammoth tusk that we have found weighed 111 kilograms (250 pounds). Male mammoth tusks are much thicker and heavier that female mammoth tusks. Baby tusks are scarce. Matched pairs are unique and extremely rare. The finest mammoth tusks are often purchased by museums. Canada Fossils has supplied many museums in Europe, North America, South America and Asia, while other mammoth tusks are now held in private collections in Mexico, the United States, Canada, Europe, Japan, Taiwan, Hong Kong, and many other countries. Mammoth tusks are found with various shapes curves and colours. Each piece is unique and individual. Pricing is based on size, shape, curve, range of colours, and overall appearance. All of our mammoth tusks come with a custom made oak stand with a brass identification plate and a certificate of authenticity. Please contact us directly for our current inventory or use our feedback form. tusks one tusks two
Understanding Cultural Differences Only available on StudyMode • Download(s) : 526 • Published : September 25, 2005 Open Document Text Preview unintentionally offending others. Effective Communication Communication is an area that can be especially challenging for those uninformed about cultural differences. A simple nod of the head or smile may be interpreted as something you had not intended. For example, around the world a smile can relay many emotions, not just happiness or pleasure as in the U.S. In Japan, people smile when they are sad, angry, confused, and happy. Asians smile to show disagreement, anger, confusion, and frustration. Some people from Japan and Asia will not smile for official photos, such as passport photos, because these are considered serious occasions and they do not want to look as though they are not taking the situation seriously. Explain your expectations in regard to time and punctuality. Cultural background influences what people consider to be on time, late, and early. Hall says that every human being is confronted by far more sensory stimuli than can possibly be attended to. Cultures help by screening messages, shaping perceptions and interpretations according to a series of selective filters. In high-context settings, the screens are designed to let in implied meanings arising from the physical setting, relational cues, or shared understandings. In low-context settings, the screens direct attention more to the literal meanings of words and less to the context surrounding the words. All of us engage in both high-context and low-context communication. There are times we "say what we mean, and mean what we say," leaving little to be "read in" to the explicit message. This is low-context communication. At other times, we may infer, imply, insinuate, or deliver with nonverbal cues messages that we want to have conveyed but do not speak. This is high-context communication. Most of the time, we are somewhere nearer the middle of the continuum, relying to some extent on context, but also on the literal meaning of words. 7. Time Orientation: MONOCHRONIC – POLYCHRONIC... tracking img
Climate Is Cited as Key to Extinctions Climatic changes may have led to the die-off of the woolly mammoth, such as this one, whose head and body were excavated from the Siberian tundra. Climatic changes may have led to the die-off of the woolly mammoth, such as this one, whose head and body were excavated from the Siberian tundra. (By Naoki Suzuki -- Japan Association For The 2005 World Exposition Via Ap) By Guy Gugliotta Washington Post Staff Writer Thursday, May 11, 2006 Guthrie, reporting in the journal Nature, dated animal remains in Alaska and the Canadian Yukon, concluding that mammoths and native American horses could not find adequate forage in the forest and went extinct. Today's horses, both domesticated and "wild," are the offspring of animals brought to the New World by Europeans beginning in the 16th century. Guthrie's research brought new insights to the debate about the extinction of large mammal species around the time that humans crossed a land bridge from Asia to populate the Americas. Besides mammoths and horses, the extinctions also include saber-toothed cats, mastodons, giant sloths and other animals. Some scientists advocate an "overkill" theory, in which newly arrived humans rampaged through animal populations unfamiliar with human hunting talents. Others, such as Guthrie, note that the same climatic thaw that allowed humans to cross the land bridge from Asia, also caused a radical change, to vegetation that mammoths and horses could not eat. "I don't think we've reached consensus, but most of us think there were a combination of factors," said University of Nevada at Reno archaeologist Gary Haynes. "Most scientists believe in overkill, but if you ask archaeologists, they would say climate change," because there is very little evidence that humans were killing mammoths and horses in large numbers. Guthrie said he concentrated on collecting radiocarbon dates for the remains of mammoths, horses, elk, bison, moose and humans, focusing on the period from 13,500 years ago to 11,500 years ago. Guthrie said mammoths and horses, unlike elk and bison, were well equipped physically to digest large quantities of low-nutrient grass when the Alaska-Yukon region was cold, treeless and arid. When the thaw came and the rains began, however, the grass became greener and richer, attracting elk and bison. As the rains continued, Guthrie said, evergreen forests began to replace the pasture, trees leached the nutrients from the soil and armed themselves with resins, turpentine and other "defenses" that made them unpalatable as food. Guthrie's studies showed that the horses died off first -- about 12,500 years ago -- while the mammoths lasted a thousand years longer. Elk and bison dwindled dramatically but survived. Moose, the only bark eaters among the animals, appeared unaffected. But "it's a complex picture," Guthrie acknowledged in a telephone interview, because humans arrived while all this was happening. "It might look like humans came in and got rid of the horses and mammoth," Guthrie said, "but why are moose prospering, and elk and bison surviving?" Paleobiologist Anthony J. Stuart of University College London said "the idea of sudden extinction doesn't seem to apply in Alaska and the Yukon," but "personally I think there's some room for human involvement." Climate may have stressed the animals, Stuart said in a telephone interview, "but humans probably finished them off." © 2006 The Washington Post Company
6.3 Variations in Satellite Derived Snow and Ice Coverage in the Northern Hemisphere Tuesday, 24 January 2017: 4:30 PM Conference Center: Skagit 3 (Washington State Convention Center ) Mark R. Anderson, University of Nebraska, Lincoln, NE; and H. Mikulak and D. A. Robinson One of the advantages of using the new MEaSURES Cryospheric dataset is determining the satellite derived extent of snow on land and sea ice on ocean surfaces from the same format for the Northern Hemisphere. The MEaSURES dataset is a combination of several satellite platforms and frequencies. Since the MEaSURES cryospheric dataset is gridded to the EASE-II grid, the extent locations of the snow and sea ice coverage can be compared between two normally independent observations. Therefore, a total areal extent of land snow and sea ice totals can be calculated between 1979 and 2012. The area calculations of snow and ice extent are done by accumulating each grid box reported weekly prior to 1999, and daily since 1999 for the Northern Hemisphere. The extent for the sea ice coverage is than added to the snow extent to give a total extent coverage. The cryospheric total extent coverage, we will call, cryototal for this paper, can then be determined. It should be noted that fresh water lakes as well as the Greenland Ice Sheet are not included in the cryototal area. The yearly cryototal is predominately driven by the maximum snow cover extent in the winter period and the minimum sea ice cover extent in the summer period, though there are variations in the area throughout the annual cycle. The maximum cryototal extents and dates of occurrence are determined by taking the maximum daily/weekly extents between 1 January and 1 June. The annual maximum cryototal extent is approximately 62 million km2, usually occurring by late January through the mid-February for the study period. The snow coverage maximum extent is around 47 million km2 and the sea ice coverage extent would be just under 16 million km2. The cryototal, snow, and sea ice extent maximum areas each year do not vary much throughout the study period and linear regression analyses found no trends in the extent. However, when the date of the maximum area is collected, the dates of the maximum extent have been changing over the study period. With all three parameters, the date of the maximum area has been later in the year throughout the study period. For the maximum cryototal area, earlier years were more likely to have their maximum extent occur in mid-January, while later years had their maximum extent occur closer to the middle to end of February. It should be remembered that the earlier years, pre-1999, the extents are only calculated on a weekly basis which could be effecting the dates, however, the differences should only be fewer than 7 days, which is not the case. The maximum snow and sea ice extents are similar, with little change over time of the total amount of land or sea ice covered. However, linear regression trends for dates of the maximum extent indicate later occurrences in the winter; in January for snow extents, and late February to middle March for sea ice extents.                 The annual minimum cryototal extent for the study period has been declining, especially over the last 10 years of the study. The cryototal extent is around 10 million km2 in 1980 and falls to under 6 million km2 by 2012, with a study mean extent of just under 9 million km2. The decline in the cryototal area is basically a result of the decline in sea ice area extent, which falls from 7 million km2 to under 3 million km2 by the end of the period. The minimum extent of snow cover does not change over the study period. The date of the annual minimum cryototal extent is generally around the end of August to the beginning of September with no trend in the date. The date of the minimum snow extent is the middle of August and also has no trend in the date. Meanwhile, the date of the minimum sea ice area does have a trend, changing from the end of August to the beginning of September for the study period.                  The melt season length, here calculated as the time from the maximum extent to the minimum extent for each parameter.  For the cryototal melt season length, the mean would be 213 days, ranging from 189 to 238 days. There is a very slight linear regression trend from longer cryototal melt seasons in the earlier years compared to the later years. The snow melt season length is very similar to the cryototal length with the mean length being 204 days with a range of 90 days over the study period. The trend is almost identical to the cryototal melt season trend. The sea ice melt season length is approximately 187 days, however, there is no trend indicated in the length of the melt season. This seems counter intuitive since the date of minimum extent is later in the year, indicating a longer melt season, though in reality the maximum sea ice extent date is also later in the year so the length of season stays the same.                 The freeze-up season is indicating similar features in the snow coverage and cryototal area, where the length of the accumulation of snow coverage starts to increase after the end of July until it maximum area during the winter. The length of time for the accumulation of snow to take place has been increasing over the period which follows the decrease in time for the melting. For sea ice extent, the length of time between the minimum area and the maximum area for the following winter is roughly the same length during the period, which corresponds well to the lack of a melt season change.                 In summary, the solar radiation and geographic conditions have a large role on the changes in maximum extents that occurs each year. Minimum extents especially for sea ice coverage are changing compared to the snow cover.  The changes in the timing of the maximum and minimum extents indicates an interesting finding which needs to be further investigated. Furthermore, how each parameter changes because of the other also needs to be investigated. - Indicates paper has been withdrawn from meeting - Indicates an Award Winner
Rock The Vote–Here’s Why No matter who you are voting for today, the important thing is you get out and VOTE!!!!! Too many people struggled and died (seriously) fighting for their right to be enfranchised. As a former high school history teacher and current community college history teacher, let me geek out for a minute today. Women didn’t get the right to vote until 1920 (19th Amendment). The women’s suffrage movement officially started in 1848 with the Seneca Falls Convention, although women had been fighting for their right to have a voice well before that. Most states allowed some women (white, upper class) to vote in some ways prior to the 19th Amendment, however the vast majority was not enfranchised (nationally) until 1920 at the tail end of the Progressive movement. Suffragettes had a two-pronged strategy:  they pursued state-by-state campaigns to win residence-based state suffrage as well as fought for full national suffrage through a constitutional amendment. Green=full suffrage; all other colors=some form of suffrage (orange was only presidential suffrage for instance); light red (mid-atlantic states and Alabama)=no suffrage It was a hard-fought battle. Suffragist activism ranged from protests and leaflets to hunger strikes and 100-mile hikes. As a history teacher if I have time in class I usually love to show the movie Iron Jawed Angels with Hilary Swank, Frances O’Connor, Julia Ormond, Anjelica Huston AND Patrick Demsey. I highly recommend watching this movie (preferably TODAY!) but be warned: it’s pretty graphic since it’s about suffragettes that go on a hunger strike. Here’s the trailer: These were some badass women who fought hard to give me my right to vote today. Although the 19th Amendment meant that all citizens of the United States–men and women–were legally enfranchised, not all citizens were able to exercise their legal right to vote. African American men were given the legal right to vote with the 15th Amendment starting in 1870 during the Reconstruction Period after the Civil War. However, by the middle of the 20th century many black Americans–mostly those living in the South–were disenfranchised due to literacy tests, poll taxes (which also hindered poor Whites), and intimidation (lynching, KKK)–all part of the institution of Jim Crow. Literacy tests were administered at the discretion of the officials in charge of voter registration. If the official wanted a person to pass, he could ask the easiest question on the test–for example, “Who is the president of the United States” Even if someone knew all of the answers to the test, the official could still decide who passed and failed. Only the enforcement of the Voting Rights Act of 1965 invalidated literacy tests. Although literacy tests and poll taxes prevented many from voting, intimidation and fear played the biggest role in disenfranchising African Americans during the Jim Crow era. African Americans found voting risked severe violence, bodily harm, and/or death by lynching. Need I remind everyone that this was a mere 60 years ago? [To accompany this picture, here is Billie Holiday singing Strange Fruit–a poem written by Abel Meeropol, a white Jewish high school teacher protesting lynchings] Mississippi was one of the most violent of all states where Jim Crow was present. If you get a chance, please PLEASE watch Eyes On The Prize episode 5 “Mississippi: Is This America?” I’ve included it via YouTube here. It does such a wonderful job of revealing what happened in Mississippi from 1962 to 1964 as well as Freedom Summer, a campaign during the summer of 1964 in which northern college students traveled down south to work with civil rights organizations like SNCC to try to register as many African American voters as possible. In fact, if you’d like to watch a historically accurate feature film on Freedom Summer and the murder of three young men, watch Mississippi Burning with Gene Hackman. Ready for another trailer? Bottom line today? VOTE. Even if you have to work all day and am tired, hungry, have to wait in a line, have to walk to your polling place or have to take 5 metro rides. People fought for many years for the right that we can all exercise today. I’ll be back later with a New Music Tuesday 🙂 Did you Rock the Vote today??? Subscribe bloglovin 10 Responses to Rock The Vote–Here’s Why 1. Awesome post! I voted absentee about three weeks ago! 2. I’m a Canadian and I’ll be up until the results are through! Great post! 3. katiemoves says: Going to vote later today! Great post- love the history! 4. Joelle says: I am a history teacher too and I love iron Jawed Angels. it is such a powerful movie.I’ve shown parts of it to my classes as well. Great post!! 5. Yvette says: Thanks for posting Claire! 6. Jorie says: Whoa, fascinating post, Claire! I had no idea you were a history teacher. That’s awesome. I absolutely love American history. 7. Melissa says: I was voter #21 at 6:45am lol. #obama2012!!! Great great informative post Claire! :)) 8. jumpeatrun says: Awesome post! I voted first thing in the morning 🙂 Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Apologia GS Module 5 Home > Preview The flashcards below were created by user ToriG on FreezingBlue Flashcards. 1. Define life science A term that encompasses all scientific pursuits related to living organisims 2. Define archaeology The study of past human life as revealed by preserved relics 3. Define artifact 4. Define geology 5. Define paleontology 6. Define Aristotle's dictum 7. Define known age 8. Define dendrochronology 9. Define radiometric dating Using a radioactive process to determine the age of an item. 10. Define absolute age The calculated age of an artifact when a specific dating method is used to determine when the artifact was made. 11. Define the principal of superposition You would use paleontology, because archaeology concentrates on human life. 13. Name the the three tests used to evaluate documents that claim to be historical. The internal test, the external test, and the bibliographic test. 14. Give a brief description of each of the tests used to evaluate documents that claim to be historical. The internal test makes sure that the document does not contradict itself.  The external test makes certain that he document does not contradict other known historical or archaeological facts. The bibliographic test makes certain that the document we have today is essentially the same as the original. 15. In what test is Aristotle's dictum used? Why must we use it? Aristotle's dictum is used in the internal test.  We must use it because what seems to be a contradiction in a document might not be a contradiction.  It might just be our inability to understand the language in which the document was written. Often those who are making the copy or those who are ordering the copy to be made will order changes to be made as well.  Kings have done this in a effort to make themselves or their ancestors look better in history.  Religious groups have been known to do this to make themselves look more important or to make their view look "right". 17. What two things help a document pass the bibliographic test? First, there should be a small time period between when the original was written and when the first available copy was made.  This reduces the chance for changes being made and reduces the number of errors that would be committed during the copy process.  Second, there must me a lot of different copies from a lot of different sources.  If all of the copies agree with one another, then we know that a single copier did not make drastic changes. 18. Does the Bible contain any contradictions that make it fail the internal test? No.  The Bible passes the internal test as well as any document of its time. 19. Does the Bible have any difficult passages that might seem like contradictions? Yes. Because of the difficulty of translating ancient languages, there are some difficult passages.  All documents of history have such passages, however. 20. Why are the two accounts given in Acts 9:7 and Acts 22:9 not contradictory? This is a translation problem.  The verb "hear" used in Acts 9:7 simply means that the men heard sounds.  The verb "hear" used in Acts 22:9 requires that the hearer must actually understand intelligible language.  These verses are actually complementary, then.  The first tells us that the men heard SOUNDS, but the second tells us that the men could not understand those sounds. 21. Why are two genealogies of Christ given in Luke 3 and Matthew 1 not contradictory? One of the genealogies traces Mary's line while the other traces Joseph's line. 22. Why can we say that the Bible passes the external test better than any other document of its time? Because no other work has had so much archaeological evidence compared to it.  The Bible has been tested by archaeology ore than any other documents of history, and it passes with flying colors! 23. Suppose a document passes the internal and bibliographic tests but some of the conclusions of archaeologists go against what the documents says. If the document has some other external support (other historical documents and some archaeological evidence), why should we not automatically say that it fails the external test? Sometimes, it turns out that archaeology is wrong, so you cannot discount the validity of a document if archaeology does not fully agree with it.  Remember, several archaeologists thought that the Bible was wrong on several occasions.  It turns out that it was the archaeologists who were wrong, not the Bible! 24. Why can we say tht the New Testament passes the bibliographic test better than any other document of its time? 25. Does the Old Testament pass the bibliographic test? Yes, the Old Testament passes the bibliographic test just as well as any other document of its time. 26. The age of an ancient settlement is determined by using dendrochronology on some firewood that had been chopped down but never used by inhabitants.  Does the settlement have a known age or an absolute age? The age is absolute, because a dating method was used to determine it. 27. A coffin of a great kin is discovered.  The date of the king's death is recorded in a document of history.  Does the coffin have a known age or an absolute age? The coffin has a know age, because it is referenced in a document of history. 28. If an archaeologist gives an absolute age for an artifact, does that mean we know for certain how old the artifact is? No. Absolute does not meat certain.  Even the most accurate dating method has error in it, and some dating methods can be very unreliable. 29. Why does an archaeologist use master tree ring patterns? Master tree ring patterns help the archeologist determine the age of logs found in ruins.  Master tree ring patterns are cataloged for each region of the world, and they correspond to weather patterns that have already been dated.  If an archaeologist finds a master tree ring pattern on a log, he or she knows when that tree ring pattern was formed and can use that to determine the age of the log. 30. What is the underlying assumption of the Principal of Superposition? The Principle of Superposition assumes that in rock or soil that is layered, the layers were formed one at a time.  This is not necessarily true. 31. Suppose an archaeologist uses dendrochronology to determine that a city was built in 2500 B.C.  Several years later, another archaeologist is digging deeper under the site of the city and, in a lower layer of rock, he finds the remains of another city. Unfortunately, there is nothing that he can use for any dating technique.  He can still conclude something about the age of the city. Assuming that the Principal of Superposition is true in this situation, what can he conclude? He can conclude that the city he found was built before 2500 B.C. Assuming the Principle of Superposition is true, the lower layers of rock are older than the upper layers. Since he found this city in a lower layer of rock, it must be older than the city that was discovered in the upper layer of rock. There are many seemingly unrelated cultures that all a have a worldwide flood tale. If the flood did not really occur, then you have to assume that they all made up the tale independently, because many of the cultures had no contact with one another until well after the tales were written down. Card Set Information Apologia GS Module 5 2013-10-31 18:44:54 general science Study guide for module 5 Show Answers: What would you like to do? Home > Flashcards > Print Preview
29.2.11. Protocols This section gives an overview of how protocols that describe various processes, such as sampling, extraction and scanning, are used in BASE. UML diagram Figure 29.12. Protocols A protocol is something that defines a procedure or recipe for some kind of action, such as sampling, extraction and scanning. In BASE we only store a short name and description. It is possible to attach a file that provides a longer description of the procedure. The procedure described by the protocol may have parameters that are set indepentently each time the protocol is used. It could for example be a temperature, a time or something else. The definition of parameters is done by creating annotation types and attaching them to the protocol. It is only possible to attach annotation types which has the protocolParameter property set to true. The same annotation type can be used for more than one protocol, but only do this if the parameters actually has the same meaning.
Skip to main content The CSMH has two over-arching goals: • Goal 1. Enhance understanding of school mental health policies and programs that are innovative, effective, and culturally and linguistically competent, across the development spectrum (from preschool through post-secondary), across three-tiers of mental health programming (promotion, problem prevention, intervention), and across levels of scale (international, national, state, local). • Goal 2. Enhance implementation of innovative and effective school mental health policies and programs through the dissemination and diffusion of analyses and instructive findings via a comprehensive, multi-faceted, engaging, and creative communications framework that reaches the full array of invested stakeholders in school mental health. We use the term "expanded school mental health" (ESMH) to describe what we believe are the core elements of effective school mental health programs. ESMH programs are developed through partnerships between schools and community agencies to move toward a full continuum of effective mental health promotion, early intervention, and treatment for youth in general and special education. The school-community partnership underlying the ESMH approach strengthens cross-agency collaboration and the sharing of knowledge and resources, and promotes the development of a system of care. Recent findings support that these partnerships promote positive school reform and improved academic and behavioral functioning of students. Through participation in and development of a broad and growing National Community of Practice on School Behavioral Health, the CSMH analyzes diverse sources of information, develops and disseminates policy briefs, and promotes the utilization of knowledge and actions to advance successful and innovative mental health policies and programs in schools.  The CSMH works with a wide range of stakeholders invested in integrated approaches to reduce barriers to student learning, including families, youth, educators, mental health and other child system staff, advocates, legislators, researchers and government officials.  The CSMH will continue to host national and regional conferences to advance research, policy, and practice related to mental health in schools. CSMH Brochure
Monthly Archives: January 2016 Terminalia Arjuna. Ayurvedic Uses: images2                            index3 index4             index5 Homoeopathic uses: There are seven basic movements of raising the head upward. The head and the body should be maintained vertically during sitting. Moving the legs, the right leg is raised until the thigh is parallel to the floor, so that the line of the hips should be parallel to the floor. Cow Dung as Medicine Cow dung is serious stuff in India and to ‘recycle’ the cow’s waste as medicine may sound ridiculous. Cow dung is mentioned in British folk medicine from the early times, so it is not just confined to Asian cultures. The Indians had used cow dung as medicine for centuries in Ayurveda, Extensive research has been done in Ayurveda and the healing properties and health benefits of cow dung are documented in several Hindu texts. It is widely believed that diabetes, cancer, arthritis and even AIDS can be cured with a mixture of cow dung and cow urine. Medical uses of Cow dung: Cow dung medicine dispensing is either in liquid or powder form, and it could be in capsule or tablet. The use of cow dung does not just stop at medicine. You can make soap made from cow dung, which is claimed to be good for dandruff, skin disease, and rid body of bad odors and to make the skin soft. Other uses of Cow dung: Cow dung can be used as patties for cooking. It is also used as a fertilizer. It is said to have natural antiseptic properties. Cow dung is mixed with neem leaves and smeared on the skin and cures boils and heat rash. Cow dung is also a smoke producer and smoldering cow patties can keep mosquitoes away. The anti-bacterial properties of cow dung have been highlighted, where its use as a disinfectant has been mentioned and the use of dung is not restricted to just plastering floors and walls. Cow dung is popularly used as a body pack to detoxify the body. Before the advent of toothpastes and soaps, cow dung was popularly used in various forms to meet these requirements. The ash produced from cow dung was used to clean the teeth and is also known to strengthen the gums. The cow is considered to be a sacred animal and for thousands of years its milk, urine and dung have been used in Ayurveda. Ayurvedic physicians consider it an invaluable tool in Ayurvedic medicine. Pyramid Healing. Pyramid healing is an alternative healing practice that is based on the concept that the shape of the pyramid provides a means of tapping into the healing energy that surrounds every living thing. Pyramids are found in many different cultures, and are often associated with growth, production, and vitality. Practitioners use simple handheld pyramids to direct this pyramid healing power and heal ailments as general fatigue, depression and anxiety, tension, and even the common cold. Methodology of healing: Some healers use blends of scented herbs that are believed to help the patient relax, while others use candles or incense to accomplish the same end. The patient is placed in a room where sunlight is ample. A small pyramid is held in the hand by the practitioner and it is gently applied to the surface of the skin, or hovered just above the skin. Each technique serves as a conduit for energy to correct the imbalance between mind, body, and spirit that is leading to the ailment. Other practitioners include other elements, chant mantras or use gentle music while moving the pyramid over the body, in order to help focus the mind and allow it to connect with the universal consciousness. Pyramid healing can be done without the addition of other techniques. In addition to formal healing sessions, pyramid healing is done with the use of jewellery in the shape of a pyramid. Ideally, the pyramid is constructed using natural elements, such as wood, stone, or even glass blown using the purest sand available, since natural materials are said to be superior conduits of energy. Pyramid therapy is not accepted by Orthodox medical practitioners: Pyramid therapy is controversial and western medical practitioners discount this approach to healing as having nothing more than a placebo effect. However there is a substantial body of anecdotal evidence. Some of those who claim to have received healing from pyramid treatments note that other forms of treatment provided little to no relief. Often, healing does not occur during a single session; this means that the patient is likely to undergo multiple sessions over a period of time before noticing a difference in his or her symptoms. Some useful Homeopathic remedies – Part 101. This remedy suits persons who have to hurry for urination. Dr. Tyler, M.D. Dr. Hughes, L.R.C.P. Nothing equals KREOSOTE 30 for the vomiting in gastric carcinoma. Dr. Custis, M.D. Dr. Tyler, M.D.
History Of Spain Spain [speɪn].(Spanish: España?·i, IPA: [es'paɲa]) or the Kingdom of Spain (Spanish: Reino de España),is a country located mostly in southwestern Europe on the Iberian Peninsula. The Spanish mainland is bordered to the south and east almost entirely by the Mediterranean Sea (except for a small land boundary with Gibraltar); to the north by France, Andorra, and the Bay of Biscay; and to the west by the Atlantic Ocean and Portugal. Spanish territory also includes the Balearic Islands in the Mediterranean, the Canary Islands in the Atlantic Ocean off the African coast, and two autonomous cities in North Africa, Ceuta and Melilla, that border Morocco. With an area of 504,030 km², Spain is the second largest country in Western Europe (after France) and with an average altitude of 650 m, the second highest country in Europe (after Switzerland). Spain is a constitutional monarchy organised as a parliamentary democracy and has been a member of the European Union since 1986, and NATO since 1982. It is a developed country with the eighth largest economy in the world and fifth largest in the EU, based on nominal GDP. Spain is a key site when it comes to studying the human prehistory of Europe. After a long and hard conquest Hispania became one of the Roman Empire's most important regions. During the early Middle Ages it came under Germanic rule. Later it was conquered by Muslim invaders. Through a very long and fitful process, the Christian kingdoms in the north gradually rolled back Muslim rule, finally extinguishing its last remnant in Almería in 1492. The same year Columbus reached the New World, a global empire began. Spain became the strongest kingdom in Europe and leading world power during the 16th century and first half of the 17th century, but continued wars and other problems eventually led to a diminished status. A French invasion of Spain in the early 19th century led to chaos; triggering independence movements that tore apart most of the empire and left the country politically unstable. In the 20th century it suffered a devastating civil war and came under the rule of a dictatorship, leading to years of stagnation, but finishing in a strong economic revival. Democracy was restored in 1978 in the form of a constitutional monarchy. In 1986, Spain joined the European Union; experiencing a cultural renaissance and steady economic growth. Main article: Geography of Spain At 194,884 mi² (504,782 km²), Spain is the world's 51st-largest country. It is some 47,000 km² smaller than France and 81,000 km² larger than the U.S. state of California. Main article: Economy of Spain According to the World Bank, Spain's economy is the eighth largest worldwide and the fifth largest in Europe. As of 2007, absolute GDP was valued at $1.362 trillion according to the CIA Factbook, (see List of countries by GDP (nominal)). The per capita PPP is estimated at $33,700 (2007), ahead of G7 countries like Italy and placing Spain at a similar per capita basis as France or Japan (both with an 2007 estimated at $33,800). The Spanish economy grew 3.8% in 2007 outpacing all G7 members and all the big EU economies for the 3rd consecutive year. The centre-right government of former prime minister José María Aznar worked successfully to gain admission to the group of countries launching the euro in 1999. Unemployment stood at 7.6% in October 2006, a rate that compares favorably to many other European countries, and which is a marked improvement over rates that exceeded 20% in the early 1990s. Perennial weak points of Spain's economy include high inflation,a large underground economy,and an education system which OECD reports place among the poorest for developed countries, together with the United States and UK.Nevertheless, it is expected that the Spanish economy will continue growing above the EU average based on the strengthening of industry, the growth of the global economy and increasing trade with Latin America and Asia. The Spanish economy is credited for having avoided the virtual zero growth rate of some of its largest partners in the EU.In fact, the country's economy has created more than half of all the new jobs in the European Union over the five years ending 2005.The Spanish economy has thus been regarded lately as one of the most dynamic within the EU, attracting significant amounts of foreign investment.During the last four decades the Spanish tourism industry has grown to become the second biggest in the world,worth approximately 40 billion Euros (approx. 5% of GDP) in 2006 More recently, the Spanish economy has benefited greatly from the global real estate boom, with construction representing 16% of GDP and 12% of employment.According to calculations by the German newspaper Die Welt, Spain is on pace to overtake countries like Germany in per capita income by 2011.However, the downside of the real estate boom has been a corresponding rise in the levels of personal debt; as prospective homeowners struggle to meet asking prices, the average level of household debt has tripled in less than a decade. Among lower income groups, the median ratio of indebtedness to income was 125% in 2005. The Spanish Constitution of 1978, in its second article, recognises historic entities ("nationalities", a carefully chosen word in order to avoid the more politically charged "nations") and regions, within the context of the Spanish nation. For some people, Spain's identity consists more of an overlap of different regional identities than of a sole Spanish identity. Indeed, some of the regional identities may even conflict with the Spanish one. Distinct ethnic groups within Spain include the Basques, Catalans, and Galicians. The Hemispheric at the Ciutat de les Arts i les Ciències, Valencia.Main articles: Culture of Spain and UNESCO World Heritage Sites in Spain Related Posts Widget by Hoctro | Jack Book Label: edit post 0 Responses
Friday, 24 June 2016 Democracy and Representation (Written in the immediate aftermath of the vote to leave the EU) Jean-Jacques Rousseau in his book "The Social Contract" (1743) argued that the whole principle of democracy was the hope that a majority of the people, when consulted, would always reach the right decision: the one which was best for the country. If the popular majority reached the wrong decision, he said, then the whole system collapses. Rousseau was writing about what is nowadays called "direct democracy", where the people are consulted about all important decisions, as in the recent referendum. He called the British political system "elective aristocracy", meaning that every so often we choose what leaders we want, and then send them away to make decisions on our behalf until the next election. He did not think such a system was as good, but believed direct democracy could really only work in a small, homogenous community.       Until the current spate of referendums, Britain did not have direct democracy; instead we had government by elected representatives. The great conservative political thinker, Edmund Burke, writing half a century after Rousseau, discussed the vexed question of whether an elected M.P. was under any obligation always to follow the wishes of his constituents. His answer was a strong "No". His argument was that an M.P. was not a mere delegate or mouthpiece: his job was to exercise his judgement to choose a policy which he believed was in the best interests, not only of his constituents, but of the entire country. Should his constituents object to his decisions, they reserved the right to chuck him out at the next election. He could also have added that an M.P. is probably more intelligent than most of his constituents, and is certainly better informed about the issues!     The philosopher Roger Scruton (a philosopher with whom I am not often in agreement!) gave an interesting talk on the radio last week in which he attacked the whole idea of holding a  referendum. It was, he argued, an abdication of responsibility by those elected to lead us. What, after all, is a Prime Minister for, if not make decisions on our behalf to the best of his ability? If he insists on holding a referendum, with a promise to abide by the result, then he is abandoning his decision-making role and reducing himself to a mere functionary or mouthpiece, and may well, as has befallen David Cameron, find himself having to commit to a policy which he believes to be wrong for the country. That is no way for a serious leader to behave! I'm reminded of a story told by the historian A.J.P.Taylor about the 1848 revolution in Paris, where a man was seen running after a crowd of demonstrators, shouting "I'm their leader, I must catch up with them!"   The only reason for a government to hold a referendum is if it expects to win it, thus strenthening its ability to carry through a contentious policy. De Gaulle in France was successful at this, and Hitler was even more so: his more outrageous actions, like the assumption of the Presidency, the remilitaization of the Rhineland and the Anschluss with Austria, were promptly supported by enormous referendum majorities from the populations involved, thereby making it difficult for other countries to take action. The unfortunate David Cameron, by contrast, called a referendum solely to try to paper over a split in the Tory party. He miscalculated severely, and serve him right! Do you recall the A. A. Milne story where Winnie-the-Pooh digs a trap to catch a heffalump, only to fall into it himself? Cameron as Pooh!  Postscript: A friend has pointed out to me that inthe end De Gaulle called one referendum too many, lost it, and had to resign. We could say the same about Cameron. The difference is that De Gaulle's proposal was then abandoned, whereas Cameron has left his successors to implement a policy which all party leaders, all former prime ministers and a large majority of MPs believe is bad for the country. Bizarre! 1 comment: 1. Ta for the insight and Refs sir! Its been a while! Seb
Total Number of words made out of Only =7 Only is a 4 letter short Word starting with O and ending with Y. Below are Total 7 words made out of this word. | Words ending with Only 3 letter Words made out of only 1). yon 2 letter Words made out of only lo no on oy yo Only Meaning :- One alone; single; as- the only man present; his only occupation. Alone in its class; by itself; not associated with others of the same class or kind; as- an only child. Hence- figuratively: Alone- by reason of superiority; preeminent; chief. In one manner or degree; for one purpose alone; simply; merely; barely. Words made from adding one letter in the Beginning of only Words made after changing First letter with any other letter in only Note There are 1 vowel letters and 3 consonant letters in the word only. O is 15th, N is 14th, L is 12th, Y is 25th, Letter of Alphabet series. o, on, onl, y, ly, nly, o no lo y on lon y onl y y ly ny o ly nly o nly o
Tall el-Hammam (Jordanie): Archaeologists Excavate Massive Ancient Gateway Source - http://popular-archaeology.com/issue/september-2012/article/archaeologists-excavate-massive-ancient-gateway-in-jordan A team of archaeologists and excavators are uncovering a site that could be among the largest ancient Bronze Age cities of the Near East. Current efforts are focusing on a massive, newly discovered Middle Bronze II Period (1800 - 1540 BCE) city gate complex and associated structures, part of a nearly impenetrable defensive system that ringed and protected a city that the excavators suggest may have commanded and controlled a group of other nearby ancient settlements.   The city gate was revealed during excavations conducted during January of 2012 under the direction of Dr. Steven Collins of Trinity Southwest University and Yazeed Eylayyan of the Department of Antiquities, Jordan. It was one of a number of major architectural features associated with a massive defensive fortification system built to protect the city. The fortifications boast a 4m-thick city wall which was built on a foundation of large stones up to 5m high and topped by a mudbrick superstructure. The entire construction was reinforced by an earthen/mudbrick rampart/glacis system that sloped outward and downward about 35 to 38 degrees from the city perimeter wall. Based on current excavated evidence and analysis, the newly discovered gateway constitutes the main, monumental gateway leading into the city through these fortifications. Reports Collins, et. al.: "The sheer size and extent of the MB2 (Middle Bronze Age II) defensive system would have been most impressive, and virtually impregnable. Indeed, thus far there are no evidences of conquest-destruction for the duration of the Bronze Age defenses. There's also evidence of a substantial ring-road between the inner face of the MB2 city wall and the first row of houses."[1] The remains of the ancient city encompass an area so large that it dwarfs surrounding ancient settlements that feature finds and structures roughly contemporaneous with the city, and analyses of the city's context, finds, and other data have led associated scholars to suggest that it may have been the hub of a collection of settlements that had relations economically, politically, or in other ways, as a Bronze Age city-state.  The recent discoveries are part of an ongoing excavation project conducted jointly by Trinity Southwest University in Albuquerque, New Mexico, and the Department of Antiquities of the Hashemite Kingdom of Jordan. The site, called Tall el-Hammam, is a large tel located in the southern Jordan River Valley, about 14 kilometers northeast of the Dead Sea. Now entering the 8th season, investigations there have revealed a long occupational history, beginning with the Chalcolithic Period through to Islamic times, with a distinctive occupational gap of at least five centuries following the Middle Bronze period. The reasons for the gap have not been confirmed, and scholars involved with the project are continuing to search for clues.  Archaeologists and a team of students and volunteers will be returning to the site to excavate and explore more of the city gate and other related structures in January, 2013. For more information about the project, see the Tall el-Hammam Excavation Project website.
Britain’s Worst Rail Disaster May 22nd, 2015 At 6.50 in the morning of May 22nd 1915, 100 years ago today, Britain suffered its worst rail crash. More than 200 people died in two crashes involving three trains on the Caledonian Railway at Quintinshill near Gretna in the Scottish borders. A train loaded with 500 soldiers, from the 1/7th (Leith) Battalion the Royal Scots on their way to Liverpool to board a troop ship to Gallipoli, crashed into a stationary passenger train near the border. Then, just one minute later, an express crashed into the wreckage. The demands of the War had led to increased rail traffic. Added to this, the train carriages, pressed into service from the Great Central Railway, were gas lit, as were many trains of the age. The gas was stored in cylinders under the carriages and had been freshly filled before the train left Larbert. The gas cylinders were ignited by the express crashing into the wreckage and the ensuing conflagration was so fierce that the bodies of many soldiers could not be identified. They were buried in a mass grave at Rosebank Cemetery, Edinburgh. Such was the scale of the disaster almost every family in Leith felt its effect. Incredibly, on their return to Edinburgh, the surviving Royal Scots soldiers looked so bedraggled that local children assumed them to be enemy prisoners and taunted them in the street. Responsibility for the crash is still quite contentious, although the signalmen were found responsible at an investigation and jailed, some blame the rail company for failings which led to the crash.
Are School Lunches Healthy? - KCBD NewsChannel 11 Lubbock Are School Lunches Healthy? Are school lunches improving or getting worse? The nutrition action group, Physicians Committee for Responsible Medicine, graded 22 of the country's largest school lunch programs and they found they are getting healthier. Around 96 percent of schools now offer fresh fruit and tossed salads on a regular basis. The problem is getting our kids to eat it. So, the nutrition experts suggest we encourage kids to dip fruits and veggies into a low fat dressing or yogurt at home so they'll be more likely to choose that option at school. Powered by Frankly
Lay it to Heart Jerusalem's Historical Sites Are not All From the Days of Jesus Historians will tell you that all that remains today of the second temple in Jerusalem is the western wall of the temple court. Actually, the Western Wall or Wailing Wall that is found today was built after the destruction of Jerusalem. It is not really the "Western Wall". Other traditional historical sites such as the upper room, eastern gate, and Via Dolorosa in Jerusalem are incorrect. Even the "old city" is not the Jerusalem from the time of the Lord Jesus Christ. They were rebuilt after the destruction of Jerusalem. Jesus Said Not One Stone Would Be Left Upon Another in the Temple In Matthew 24:1-2 we find, "And Jesus went out, and departed from the temple: and his disciples came to him for to shew him the buildings of the temple. And Jesus said unto them, See ye not all these things? verily I say unto you, There shall not be left here one stone upon another, that shall not be thrown down." Luke 21:5-6 reads, "And as some spake of the temple, how it was adorned with goodly stones and gifts, he said, As for these things which ye behold, the days will come, in the which there shall not be left one stone upon another, that shall not be thrown down. Really this would suggest that even the foundations would be torn up. Jesus Also Said Not One Stone Would Be Left Upon Another in Jerusalem Scholars stop with the temple itself and assume that other parts of the city remained. Another passage, however, is more specific and gives us a much better idea of what actually happened. In Luke 19:37, Jesus was at the Mount of Olives. In verse 41, he beheld the city of Jerusalem and wept over it. Then he said: Luke 19: Jesus was talking about Jerusalem. If the name of Jerusalem is substituted for the pronouns it would read: Luke 19: 42Saying, If Jerusalem hadst known, even Jerusalem, at least in this Jerusalem's day, the things which belong unto Jerusalem's peace! but now they are hid from Jerusalem's eyes. 43For the days shall come upon Jerusalem, that Jerusalem's enemies shall cast a trench about Jerusalem, and compass Jerusalem round, and keep Jerusalem in on every side, 44And shall lay Jerusalem even with the ground, and Jerusalem's children within Jerusalem; and they shall not leave in Jerusalem one stone upon another; because Jerusalem knewest not the time of Jerusalem's visitation. Matthew 24 was a follow up to the prophecy about Jerusalem in Luke 19. Micah Prophesied That Jerusalem Would Be Plowed as a Field Before Jesus was born a greater prophecy was given. Micah 3: 10They build up Zion with blood, and Jerusalem with iniquity Plowing the city would tear down every wall and turn up every stone even in pavement. In Jeremiah 26:18 the princes and all the people quoted this prophecy. This was done to the second temple and Jerusalem. When the first temple was destroyed this was not done. Lamentations 1:3-4 says, "Judah is gone into captivity because of affliction, and because of great servitude: she dwelleth among the heathen, she findeth no rest: all her persecutors overtook her between the straits. The ways of Zion do mourn, because none come to the solemn feasts: all her gates are desolate: her priests sigh, her virgins are afflicted, and she is in bitterness." Chapter 2 verse 9 adds, "Her gates are sunk into the ground; he hath destroyed and broken her bars: her king and her princes are among the Gentiles: the law is no more; her prophets also find no vision from the LORD." In Lamentations 2:11, 12, 19, 21, 4:1, 5, 8, 14 and 18 we see the streets referenced. Lamentations 4:1 says, "How is the gold become dim! how is the most fine gold changed! the stones of the sanctuary are poured out in the top of every street." Lamentations 5:2 says, "Our inheritance is turned to strangers, our houses to aliens." After Jerusalem had been taken the gates were broken and had sunk down but there were still remains. There were still streets. Some houses were still standing. Secular history teaches that the emperor Hadrian plowed Jerusalem in 135 AD and even had coins minted to show this. The Western Wall Was Built After the Destruction of Jerusalem The temple was part of Jerusalem. It was not outside the city. The Bible tells us: 5. Psalm 68:29 Because of thy temple at Jerusalem shall kings bring presents unto thee. If Jerusalem was laid even with the ground and not one stone was left upon another, the wall that is at the temple mount today was not a part of Jerusalem in Jesus' day. Furthermore, for one stone not to be left on another then the bottom stones would have to be pulled up. If the building were just dropped the bottom stones could not be pulled up. The top stones and walls would have to be put in another place other than above the foundation. Therefore where the pile of stones is the temple mount was not. It appears the scholars are digging in a trash pile. When the Waqf has dug below the so-called temple mount what have they found? They have found trash. Picture of the western wall with stones still in place Jesus Did not Use the Upper Room Found in Jerusalem Today Jesus celebrated the passover the night before he was crucified. Now called the Lord's supper, this was held in a location often called the upper room. 12And he shall show you a large upper room furnished: there make ready. Jerusalem tour guides have shown people upper rooms in the city and said it was the place where Jesus and his apostles held the last supper. However, because the upper room was in Jerusalem, we know that it was destroyed when the Romans ruined city. Any location you are shown today is a fake. The Disciples Did not Gather Together in any Other Upper Room That Exists Now Yes, there was another upper room in Jerusalem. It was where the apostles waited for the Holy Spirit of God to come. Acts 1:12-13 says, Then returned they unto Jerusalem from the mount called Olivet, which is from Jerusalem a sabbath day's journey. And when they were come in, they went up into an upper room, where abode both Peter, and James, and John, and Andrew, Philip, and Thomas, Bartholomew, and Matthew, James the son of Alphaeus, and Simon Zelotes, and Judas the brother of James. Jerusalem tour guides have shown this room to people as well, but the like the location of the last supper it was destroyed long ago. The Eastern Gate is not From the Ancient Temple or City Ezekiel 44:1-4 says, "Then he brought me back the way of the gate of the outward sanctuary which looketh toward the east; and it was shut. Then said the LORD unto me; This gate shall be shut, it shall not be opened, and no man shall enter in by it; because the LORD, the God of Israel, hath entered in by it, therefore it shall be shut. It is for the prince; the prince, he shall sit in it to eat bread before the LORD; he shall enter by the way of the porch of that gate, and shall go out by the way of the same. Then brought he me the way of the north gate before the house: and I looked, and, behold, the glory of the LORD filled the house of the LORD: and I fell upon my face." Tourists to the city visit what the guides tell them is this gate and are told nobody has entered into it. It is shut and waiting for the Messiah to enter. What they won't tell you is that Ezekiel 44 refers to the second temple not the third temple. See The Third Temple. As part of the second temple it was completely decimated during the days of Emperor Vespasian reigned. Read more on Vespasian. This is another location where scholars, pastors and tour guides are passing ignorance along to the masses. The Via Dolorosa Is a Fake Via Dolorosa is thought to be the street or path Jesus walked on his way to die on the cross for our sins. To read more see Via Dolorosa. It was part of the Old City of Jerusalem which means it was completely destroyed. Even if the buildings were still standing there is not a way to know which path Jesus took. To say you know is a lie. The buildings along the route may be very old but they are not the ones Jesus walked by. Go to the Top The Past Try the wall web cam at Copyright ©2003-2015 Lay it to Heart
Mainframes 360 The one stop destination for System Z professionals Wednesday, July 15, 2009 Introduction to VSAM Files   This post is partially complete and several sections may require editing and proof-reading. The contents on the history of the organization of a VSAM File, CI and CA splits is under updation. Access Methods Each peripheral device such as a disk-drive or a tape cartridge has a different geometry, organization of data. Programs often process the data on a disk/tape. An application program must then contain logic to communicate with various I-O devices. An access method is a software (bunch of tiny programs) to write device independent code. What device drivers are to Windows operating system, access methods are to mainframe zOS. Access methods assume the burden of interacting directly with the hardware. Developers can include high-level business logic, and avoid the gory details of the specific hardware in their program source-code. Access-methods are an interface between the program and the hardware device. VSAM is one of the several access methods in the zOS. VSAM makes it easier for application programs to execute an I/O operation. There are several other access methods - QSAM, BSAM, ISAM etc. QSAM is an access-method used to read/write data from Sequential Files. QSAM stands for Queued Sequential Access Method. QSAM queues records from the file, into an area of the main storage called System buffers. This speeds up the execution of the program. The "V" in VSAM stands for Virtual. VSAM is an access method used to read/write data from direct-access devices, such as disk-drives.
Changing Water in Aquarium Changing Water in Aquarium 2014-04-21T16:35:56+00:00 changing water in aquarium changing water in aquarium Changing water in aquarium is one of the most important aspects of cleaning and maintaining your saltwater aquarium. When waste products accumulates in your aquarium, the quality of water change. Problems will occur and the only way to solve it is physically changing water in aquarium. It will remove the wastes and bring back the valuable trace elements your saltwater need for your fish to survive. How much and how often? There is really no set of rules for when, how often and how much water change should be done. So how do you decide? Here are some recommendations and information that can help you run your own system and routine that works best for you and your saltwater aquarium. Performing 20-30% of water volume per month is the common maintenance recommendation. In most cases 15-20% water change is enough. It is better to perform 10-15% of water volume 2x a month than 20-30% water volume once a month. Changing water in aquarium more frequently are more effective. It can also prevent potential poisoning or over exposure to medication, additives and other chemicals you put on your saltwater aquarium. It also helps in stability of pH balance. Siphoning Water Vacuuming the gravel while water is extracted is also a preferred maintenance method when you change your saltwater and is a good habit. Use gravel cleaner to siphon the saltwater. Other residues, wastes and uneaten foods that settle in your substrate will be gone. changing water in aquarium changing water in aquarium The siphon equipment is designed to remove water and debris without stressing your fish and no aggressive water flow. The gravel in your saltwater aquarium is suctioned up and then tumbled back down. Debris and waste materials are loosened during this process and are siphoned away keeping your tank looking physically clean. Do remember that siphon process maintenance may not be possible in tanks with sand substrate. The surface gravel should be stirred during every partial water change for these reasons: • If you have an undergravel filter, stirring breaks up impacted areas in the filter bed where water flow cannot really pass through. • Stirring puts detritus into suspension where it can be siphoned out with the old water. When you are changing water in aquarium, try to cover as much of the substrate as possible. But don’t rush over the spots. If you can’t cover it all, start at that spot where you left off the next time you change your water. Adding Water Sea Salt Sea Salt The water replacement for your saltwater aquarium must be dechlorinated and mixed before you refill the saltwater in your aquarium. Or you can get a premixed and conditioned saltwater from your local aquarium store. Make sure to aerate the water for about 15 minutes before conducting water change. Don’t forget to check the water temperature that you are about to pour in your saltwater aquarium. It is better to have a warmer saltwater than cooler saltwater or as close to the temperature in your saltwater aquarium as possible. Add the water without disrupting your aquarium or your critters by doing it slowly and carefully. Once the new saltwater is poured, add a high quality water dechlorinator/conditioner to the aquarium. Using water conditioner after each and every water change can help remove chlorine and chloramines that are present in most municipal water. Water out of your tap is usually loaded with chlorine, chloramines, heavy metals, phosphates and other ions. Many of these compounds will harm you fish, so they need to be removed from the water. The process is called water conditioning. You can read more about conditioning tap water here. Another tip is to not be confused with changing water in aquarium is adding water that has evaporated from the aquarium. Depending on the amount of aeration and circulation that you have, you may have more or less water evaporation. When water evaporates, dissolved salts are left behind. This makes the specific gravity of water to increase. Severe problems can occur if significant change of specific gravity happens. The solution for water evaporation is simply adding fresh water, not premixed conditioned saltwater to your aquarium. The water that you need to add should be conditioned tap water. But if you don’t have a lot of evaporation, store-bought bottled/distilled water will do. This way, it will save you time in conditioning tap water. Distilled water is pure water, without additives and toxic compounds. Many aquarium shops sell filtered water specifically for saltwater aquariums. Return from Changing Water in Aquarium to Saltwater Aquarium Maintenance Return to Saltwater Aquarium Online Guide Main Page Spread the love
Sentence Examples • Lewis, however, has shown that the fainter component of the binary system is often the more massive. • Interesting objects in this constellation are: a Geminorum or Castor, a very fine double star of magnitudes 2.0 and 2.8, the fainter component is a spectroscopic binary; i Geminorum, a long period (231 days) variable, the extreme range in magnitude being 3.2 to 4; Geminorum, a short period variable, 10.15 days, the extreme range in magnitude being 3.7 to 4.5; Nova Geminorum, a "new" star discovered in 1903 by H. • Several estimates have been made which agree well together; whether direct use is made of known parallaxes, or comparison is made with binaries of well-determined orbits of the same spectral type as the sun, in which therefore it may be assumed there is the same relation between mass and brilliancy (Gore), the result is found that the sun's magnitude is - 26.5, or the sun is Io n times as brilliant as a first magnitude star; it would follow that the sun viewed from a Centauri would appear as of magnitude 0.7, and from a star of average distance which has a parallax certainly less than o 1 ", it would be at least fainter than the fifth magnitude, or, say, upon the border-line for naked-eye visibility. How would you define fainter? Add your definition here. comments powered by Disqus
Emet m'Tsiyon Thursday, February 02, 2012 What Motivates Arabs & Muslims in the Struggle against Israel? The Muslim religion has been a chief motivating factor for Arabs opposing a Jewish state in the Land of Israel. The Ottoman Empire settled Europeans in Israel in the late 19th century and they were welcomed by the local Muslim Arabs. Why? Because they were Muslims. The Ottoman state, in which Arabs --including Palestinian Arabs-- held high posts was a Sunni Muslim state. When the European great powers at the Congress of Berlin in 1878 assigned Austria-Hungary to take over Bosnia --then as now dominated by the Muslim minority-- from the Ottoman state, many of the Bosnian Muslims did not want to remain in Bosnia that was coming under Austro-Hungarian --that is, infidel-- rule. Thousands of Bosnian Muslims were resettled elsewhere in Ottoman territory, including a couple of thousand in Israel. They were welcomed as fellow Muslims, although they did not speak Arabic and many of them were blonds. On the other hand, Jews were coming to Israel in the same period from many parts of the Jewish Diaspora, from Ukraine, Belarus and Rumania [an Ottoman possession up to 1878] as well as from Yemen, Morocco, Georgia, Bukhara, Iraq and so forth. Indeed, the Arab-Muslims were not so much opposed to Jews immigrating into the country in the 19th century, as they were to Jews having power, Jews not acting like inferior, oppressed and humiliated dhimmis. As long as Jewish immigrants knew their place --their inferior place-- as Jews, and paid the Islamically ordained head tax on non-Muslims, the jizya, they were treated with the usual contempt but not prevented from immigrating. However, the jizya and some of the other disabilities on dhimmis in Muslim law were abolished in the late 19th century due to European pressure on the Ottoman Empire. The local Muslim resentment of Jews increased years after abolition of the jizya and of the full dhimma [parts of the dhimma remained in effect] in the last decade of the century. Abolition of the dhimma was part of the reason for the resentment. When the Arab League secretary general, Abdul-Rahman Azzam Pasha, threatened Jews with war if a Jewish state were set up [October 1947], he spoke in terms of a jihad lasting scores of years, like the crusader wars and the Mongol invasions. He spoke in terms of Muslim volunteers --not only Arabs-- coming from far flung zones of the domain of Islam in order to fight the Jews. Why was this so? Robert Reilly has explained the core motives for Muslim opposition to a Jewish state within any borders. Reilly attempts to: Reilly contradicts the usual hokum about the Arab struggle against Israel being motivated by nationalist causes, hatred of "European colonialists" or "European intruders" [as if the Jews living in Europe were simply considered "Europeans" by the majority of Europeans], and so on. As I noted at the beginning, the Arab Muslims in the country welcomed the settlement of Europeans in the country provided that they were Muslims. The Ottoman Empire sometimes sent natives of Europe to govern parts of the country [not a distinct entity in Ottoman times]. One of these was Ahmad al-Jazzar Pasha. He was not liked but not because he was a native of Europe. So the colonialism charge against the Jews/Israelis is a red herring. Moreover, for many years about half of the Israeli Jewish population has been Oriental Jews, usually defined as Jews from Muslim countries. That didn't make a difference to Arab enemies of Israel. The Oriental Jews were fleeing Muslim lands where they had been oppressed as dhimmis for centuries. The charge of being "Europeans" is another red herring. Likewise, the charge of having a different skin color, of being "white" compared to the "non-white" Arabs made against the Jews. Indeed there is a broad range of skin colors among both Jews and Arabs, and that includes the Ashkenazi Jews who also show a range of skin colors. Reilly has explained the Muslim religious motives which keep Arabs from recognizing and making peace with Israel [here]. That said, some Arabs of Muslim background have supported Israel on Quranic or other grounds. More on one of those Arabs in another post. Labels: , , , , • Great post, ziontruth. I had imagined the conversation among the compilers of the Koran in the 11c, deciding how to wrest the Torah and chosenness from the Jews. I was timed out and lost the post but it's fun to think about and fits perfectly into the fantasiya. Then I think of Rashi and the justice he does to every single word and indeed diacritic he comes across. If there weren't so many Muslims one might think of a giant rescue effort to get them out of their benighted state. By Blogger Ariadne, at 5:25 PM   • so that they leave normal life problem like divorce and and wrest the torah from the Jews if you need more information then link here גירושין By Blogger toyalsmith, at 7:36 AM   By Anonymous pay per head, at 6:32 AM   By Blogger Jenifar, at 8:20 AM   Post a Comment Links to this post: Create a Link << Home
Open Access Numerical computation of hurricane effects on historic coastal hydrology in Southern Florida Ecological Processes20154:4 Received: 1 August 2014 Accepted: 13 December 2014 Published: 12 February 2015 Numerical models are critical for assessing the effects of sea level rise (SLR), hurricanes, and storm surge on vegetation change in the Everglades National Park. The model must be capable of representing short-timescale hydrodynamics, salinity transport, and groundwater interaction. However, there is also a strong need to adapt these numerical models to hindcast past conditions in order to examine long-term effects on the distribution of vegetation that cannot be determined using only the modern record. Based on parameters developed for a numerical model developed for the recent 1996 to 2004 period, a hindcast model was developed to represent sea level and water management for the period of 1926 to 1932, constrained by the limited hydrology and meteorology data available from the historic past. Realistic hurricane-wind and storm surge representations, required for the hindcast model, are based on information synthesized from modern storm data. A series of simulation scenarios with various hurricane representations inserted into both hindcast and recent numerical models were used to assess the utility of the storm representation in the model and compare the two simulations. The comparison of the hindcast and recent models showed differences in the hydrology patterns that are consistent with known differences in water delivery systems and sea level rise. A 30× lower-resolution spatially variable wind grid for the hindcast produced similar results to the original high-resolution full wind grid representation of the recent simulation. Storm effects on hydrologic patterns demonstrated with the simulations show hydrologic processes that could have a long-term effect on vegetation change. The hindcast simulation estimated hydrologic processes for the 1926 to 1932 period. It shows promise as a simulator in long-term ecological studies to test hypotheses based on theoretical or empirical-based studies at larger landscape scales. Hindcast Numerical models Hurricanes Wind fields Storm surge Sea level rise Coastal hydrology Hurricanes and cyclones are major drivers of coastal ecological processes at all levels of biological organization from populations to communities to ecosystems and operate across a hierarchy of spatial and temporal scales (Michener et al. 1997). Hurricane and cyclone effects are receiving greater emphasis and study worldwide with recent high-profile devastating landfall storms (i.e., Hurricane Katrina 2005, Superstorm Sandy 2012, Super Typhoon Haiyan 2013) but also with climate change resulting in rising sea levels and intensification of tropical cyclones (Khairoutdinov and Emanuel 2013) with unpredictable potential effects. Extensive research in the Greater Everglades, Florida, USA (Figure 1), conducted as part of the development of a major project to restore the historical hydrology of this unique system ( has documented the role of changing sea levels and hurricane disturbance on the formation of the Everglades (Ogden et al. 2005; Obeysekera et al. 1999; Davis et al. 2005) and enhanced understanding of many coastal ecological processes. For example, empirical field studies identified the importance of storms on ecosystem structure and function in mangrove estuaries (Davis et al. 2004), the role of mangroves as buffers to storm surge (Zhang et al. 2012), and how storms and sea level rise affect sediment accretion and organic carbon burial rates (Smoak et al. 2013). Theoretical and empirical research on mangrove-marsh and mangrove-forest ecotones have identified processes important to non-linear system dynamics, which relate to ecosystem resilience, tipping points for vegetation regime change, and delayed ecosystem effects on the order of years after a particular salinity event (Teh et al. 2008; Jiang et al. 2012b; Jiang and DeAngelis 2013; Jiang et al. 2012a; Jiang et al. 2014). Results and findings specific to the Everglades have application worldwide. However, additional research is needed, particularly at larger spatial scales to address regional effects (Hopkinson et al. 2008; Heffernan et al. 2014) and at long temporal scales to address non-linear system dynamics due to propagating events within a hierarchy of ecological processes (Peters et al. 2007). Hopkinson et al. (2008) made the case for a continental network of coastal and inland observation sites to monitor and evaluate the influence of sea level rise and windstorms. Although field studies can provide short-term insights, they are limited in their insights to long-term dynamics. Hydrodynamic numerical models at large spatial scales offer a tool to simulate and study the effects of short-term events on long-term processes. Figure 1 Study area in South Florida showing TIME and BISCAYNE model boundary and modern canal distribution. As part of a larger U.S. Geological Survey study focused on ecological interactions in the mangrove estuaries ecosystem fringing the Everglades, an existing numerical model is modified to represent hurricane disturbance. To investigate patterns and processes involved in long-term vegetation change, numerical models are used to simulate hydrologic conditions during the periods of 1926 to 1932 and 1996 to 2004 coincident with vegetation occurrence documented in geo-referenced aerial photos and charts (Smith et al. 2002; Smith et al. 2010). Retrospective analyses of the hindcast output (1926 to 1932) and a time series of past habitat types will be used to identify patterns of ecosystem change and generate and test hypotheses of long-term ecological-hydrological processes. Ultimately, the goal of further research would be to develop simulations of future hydrology to explore scenarios of climate change and adaptive management. However, to realistically simulate future ecological processes and outcomes, it is first necessary to develop a reliable hindcast that accurately reproduces the effects of major storm events. Hydrodynamic simulation of hurricane storm surge can include complex three-dimensional flow and barotropic effects, as in the application of the CH3D-SSMS-integrated storm surge modeling system to the northeast Florida coast (Sheng and Paramygin, 2010). Circulation patterns and inundation are represented in a simulation of Tropical Storm Fay in 2008. When groundwater interactions are of interest, coupled surface-water/groundwater models of the South Florida area have been developed to examine coastal hydrology and related issues. The primary simulator developed for representing hydrodynamic surface-water flow coupled to groundwater in a highly porous aquifer is called Flow and Transport in a Linked Overland/Aquifer Density-Dependent System (FTLOADDS) (Langevin et al. 2005). FTLOADDS links the two-dimensional hydrodynamic flow and transport code SWIFT2D (Swain, 2005) with the widely used three-dimensional groundwater flow and transport code SEAWAT (Guo and Langevin, 2002). Both regimes incorporate the effects of salinity concentration on water density. The capability to simulate surface-water heat transport and temperature was incorporated into the code with the added benefit of cell-by-cell evapotranspiration computations (Swain and Decker, 2010). The FTLOADDS numerical simulator is needed to represent three unique aspects of the South Florida hydrology: (1) the low water-level gradients and flat topography, (2) the highly porous aquifer, and (3) salinity transport in both the surface-water and groundwater systems. The unique capability of FTLOADDS to simulate the full hydrodynamic solution, which is especially suited to dynamic events with substantial inertial forcing, allows for the representation of short-term surface-water transient effects such as tidal changes and wind-driven flux while simulating salinity mixing. With the SWIFT2D/SEAWAT linkage simulating the exchange of surface water with the groundwater, all the important controlling processes including tide, wind, precipitation, evapotranspiration, and surface-water management are represented. In comparison, a simpler surface-water/groundwater model does not have the ability to represent short-term hydrodynamic storm events and other transient phenomena while also simulating the impact of these short-lived and spatially explicit events on long-term and landscape-scale hydrodynamic processes, which are important to the resultant short- and long-term ecological response. Two major applications developed with FTLOADDS are the TIME model of the Everglades National Park area (Wang et al. 2007) and the BISCAYNE model of the eastern urban area and Biscayne Bay (Lohmann et al. 2012). Together, these applications encompass the natural and urban areas of Miami-Dade County (Figure 1). The initial period of simulation was 1996 to 2002 but was later expanded to 1996 to 2004, incorporating a larger variety of annual hydrologic conditions (Swain and Lohmann, US Geological Survey, March 2014, written communication). Applications of FTLOADDS have been utilized to develop surface-water discharges for salinity targets (Swain and James, 2007), examine the effects of ecosystem restoration (Swain et al. 2008, Obeysekera et al. 2011), provide salinity and temperature estimates for manatee habitats (Stith et al. 2011), determine causes of hypersalinity in Biscayne Bay (Lohmann et al. 2012), represent the effects of hydrological restoration scenarios on American crocodiles (Green et al. 2014), and forecast the impact of future precipitation changes and sea level rise in coastal areas (Swain, Stefanova, and Smith, 2014). TIME/BISCAYNE covers an area with a maximum extent of 93 km north-south and 129.5 km east-west. Each model cell is 0.5 × 0.5 km and approximately 55,000 grid cells cover the area. The groundwater simulation has a time step of 1 day whereas the surface water is simulated at a 10-min interval. Model inputs are defined in various time intervals: 30-min tidal levels, 6-h average rainfall, and 4-h average wind. However, the option exists to input spatially variable wind fields for specific periods at any desired time intervals, a useful option for representing storm events. Variables output by the model include groundwater and surface-water salinity, hydroperiod, flow, stage, depth, water temperature, and other time series. There are several challenges involved in modifying TIME/BISCAYNE calibrated to the years 1996 to 2004 (recent) to develop a simulation of past conditions from 1926 to 1932 (hindcast). 1. 1) The lower sea level during the hindcast period compared to recent times must be accounted for in the simulations. The coastal hydrology and inundation must be simulated correctly to provide useful results. 2. 2) Water-delivery schemes were quite different 85 years ago and not as well recorded. Most of the hydraulic structures that control canal flows in the recent simulation were not yet or only in the process of being built in the hindcast period. 3. 3) The recent simulation is parameterized with modern high-resolution observed data and information. However, for the hindcast simulation, there were less observed data with greater uncertainty, requiring the use of modern surrogate data or synthesis of comparable data based on assumed differences between past and present conditions. 4. 4) Representation of major storms with a spatially uniform wind field has been considered adequate for the recent simulation, as there was not a major onshore hurricane event during that interval. A storm in the hindcast simulation, such as the Great Miami Hurricane of 1926, however, involves a strong wind field with high-spatial variability and requires an accommodation to properly represent the wind forcing. 5. 5) Due to the proximity of offshore boundaries in both TIME and BISCAYNE, the model cannot represent the long offshore fetch over which high-wind forces on the ocean surface pile up water against shorelines, producing a storm surge. It is therefore necessary to indirectly represent the effects of the surge at the model boundary. The water level or velocity can be specified at the boundary to induce the proper surge height or surge momentum. 6. 6) The proper temporal scale for the representation of a major storm event is shorter than the 4-h averaged period used for the spatially uniform wind. The center of a hurricane traveling 20 km/h moves 80 km between 4-h time steps, a major portion of the combined TIME/BISCAYNE domain. The model must be capable of resolving finer time steps for the storm event duration and represent the longer time steps for the rest of the simulation. 7. 7) The spatial resolution at which the hurricane processes are represented must be based on the response of the affected hydrologic system. A model depiction with high-spatial resolution of a forcing function may not yield any more information than a depiction with a lower resolution forcing function, because the dynamics of the hydrologic system have a spatial scale that controls the response. Purpose and scope This manuscript documents the development of a hindcast simulation from the TIME/BISCAYNE simulated period 1996 to 2004. The hindcast model simulates storm events for the period of 1926 to 1932 and addresses past sea level and limited hydrology and meteorology data. This time interval was designed to include the 1928 synoptic aerial photo coverage of the South Florida peninsula, which documented past vegetation distributions and surface-water configuration. The simulation opens the possibility of referencing historic and modern vegetation to hydrologic changes. The interval also includes landfall of the Great Miami Hurricane (#7) of 18 September 1926 while several other hurricanes impacted the region providing a range of storms for comparison and future analyses (Figure 2). Model development requires realistic hurricane wind and storm surge representations to the proper spatial and temporal scales. Results are presented from simulations utilizing various hurricane representations to assess efficiency of the storm representations in the hindcast model, as well as to verify and validate the hindcast application. The objective of the hindcast is not to precisely duplicate past conditions, but to represent short-term processes such as storm-induced wind, rain, and surge, along with long-term hydrological variations, that affect ecological processes and ecological response to changes in hydrology. Figure 2 Selected hurricane tracks for South Florida. Figure compares hurricane tracks for the hindcast interval from 1926 to 1932 to the track of Hurricane Wilma in 2005. Storms from 1926 to 1932 were not given official names but numbers. Names provided are names of the storms commonly referred to in historical accounts. Hindcast water-control structures The 1926 to 1932 canal network was significantly less developed than in the 1996 to 2004 period. The only primary canals in place were the Tamiami Canal, Miami Canal, and Snapper Creek Canal along with several shorter coastal canals further south (Renken et al. 2005) (Figure 3). Modern canals were removed from the hindcast simulation by eliminating their leakage connection to groundwater and the associated regulated surface-water outflows. The hydraulic structures built on the primary canals after 1932 also were removed from the hindcast simulation, changing discharges from the coastal structures on Miami Canal and Snapper Creek Canal, S-26 and S-22, respectively. Modern flows are regulated for supply and flood control and, consequently, can be more sporadic and temporally variable than the past unregulated system. One representation of unregulated flows was to distribute the net recorded flows at each coastal canal outflow point as a constant value through the simulation period (Lohmann et al. 2012). With no data available for 1926 to 1932, mean flowrates for 1996 to 2004 were used as surrogates. Figure 3 Study area in South Florida showing the parameters for the hindcast. Study area in South Florida showing model boundary, historic canal distribution, locations of historic topographic changes, and other parameters for the hindcast. Parameters include rainfall stations, surface features, wind field grid, and comparison locations for model results. Rainfall data were accessed from the DBHydro database provided by the South Florida Water Management District: ( ). Hindcast topography The modifications in topography for the 1926 to 1932 simulation are predominantly along the eastern coast (Figure 3) and primarily reflect the resetting of coastal elevations near modern canals to pre-development values. With minimal historic data, no alterations were attempted in the western TIME area, but the elevations near coastal canals were altered to match the adjacent cell elevations. The same leveling process was applied to the site of modern Turkey Point nuclear plant. Hindcast surface-water inflows and tidal levels The estimation of flows across the northern model boundary of the Tamiami Canal for the hindcast was accomplished through the construction of an empirical relationship between recent flow and Lake Okeechobee (location in Figure 1) water levels. Although there have been a number of changes to the system over the years, the recent relation was used to estimate historic flow from historic water levels recorded back to the year 1912. Details of the empirical equation's development are discussed in Appendix 1. Tidal water levels at the remaining boundaries were lowered from the 1996 to 2004 levels to values indicative of the 1926 to 1932 period based on a regression of historical water levels at the Key West Tidal Station, which has continuous record back to the year 1913 and sporadic measurements back to 1846 (Maul and Martin 1993). Tidal data indicate the mean sea level rose at the rate of 2.4 mm/year from 1933 to 2004, a total of 172.8 mm. The mean tidal levels computed for 1926 and 1932 are −0.390- and −0.373-m NAVD88, respectively, based on a −0.20-m mean level for 2004. Historic groundwater conditions are poorly documented and insufficient information exists to define time-variant groundwater levels. The groundwater boundaries along the coastal areas are controlled by the overlying tidal levels and therefore change with the defined sea level. The Miami River was uncontrolled during the hindcast period and probably drained the area around it more than during the recent period. However, overall drainage through the region increased over time, so it is difficult to generalize the overall change to groundwater levels. Data for daily parameters with no historical measures As hydrologic information from this period is limited, the hindcast simulation utilized data from the 1996 to 2004 simulation as a surrogate for the unknown quantities, under the assumption that these time series were at least similar to values in the 1926 to 1932 period and no other assumed values were considered better. This modern time series includes parameters used to compute heat transport and evapotranspiration (ET) (solar radiation, relative humidity, air temperature), the wind field (with a modification discussed below), groundwater-level boundaries, offshore salinities, and tidal water-level fluctuations. A lower sea level in 1926 might mean that groundwater levels are lower inland as well, but the lack of drainage could mean a higher level. Groundwater levels at the coast are more controlled by sea level. Hindcast long-term rainfall Compared to the 107 rainfall gages available for the 1996 to 2004 recent simulation, only a few gages had been constructed by the 1926 to 1932 hindcast period. Rainfall values were averaged from the Coconut Grove 7S Station (Station # 06168) and the Homestead IFAS Station (Station #HB872) shown in Figure 3, referenced through the South Florida Water Management District DBHydro database ( Comparison of daily rainfall between the gages showed data were recorded throughout the 1926 to 1932 period. At least one station was in operation at all times, with the exception of the Great Miami Hurricane aftermath, when both stations were destroyed. In general, these stations provided a consistent measure of precipitation for the area. However, on several occasions, the gages provided substantially different measurements, likely related to the distribution and path of the storms across the model domain. For example, a storm on 7 September 1927 showed rainfall values of 4.1 and 0.39 in., for the Coconut Grove and Homestead gages, respectively. This type of observational difference, known as a correlation distance effect (Székely et al. 2007), is inherent to the limited spatial sampling of historical data. In general, the longer the averaging timescales, the more uniform the spatial distribution of rainfall, so monthly and yearly average tend to be more consistent between rainfall gages. To assess the adequacy of using only two gages to represent past conditions, the data were input into the initial hindcast model and inundation output was mapped and examined on a daily time step to identify sudden inundation signatures indicative of a major rain event. The timing of each event was compared to newspaper and publication reports of past tropical storms. Inundation signatures corresponded with dates of the known major hurricanes in HURDAT, the official National Oceanic and Atmospheric Administration hurricane database (Landsea et al. 2008). Furthermore, the verification process identified major rain events not associated with tropical storms. The most notable was described as the ‘Florida Disturbance’ 27 May to 19 June 1930 (Fish, 1930). It is still one of the largest rainfall events ever recorded in the Miami area when 33.16 in. fell over the 24-day period. Although not associated with major winds and storm surge, such precipitation events can impact terrestrial and perhaps some marine species. Missing rainfall during the 1926 Great Miami Hurricane A major break in the rainfall data occurred when the rain gages were inoperable for 59 days following landfall of the 1926 Great Miami Hurricane. Two different methods to estimate the missing rainfall are discussed below: one based on historic estimates of barometric pressure extrapolated to rainfall, the other based on the forward speed of the storm. Mitchell (1926) reported that from midnight to 6:45 am on 18 September 1926, when the eye came ashore, rainfall was recorded at 0.28 in./h. However, a substantial portion of any hurricane's rainfall occurs in its tail, during which there were no measurements. Barometric pressure recorded from Miami at midnight was 29.5 mb but did not rise back to this level until about 6:00 pm (Mitchell 1926). If 18 h represents the period of rainfall, and the rate is assumed to be 0.28 in./h, then a total rainfall of 5.04 in. was estimated. The alternative method developed by R. H. Kraft (Pfost 2000) is an empirical relationship, 100 divided by the forward speed of the hurricane (knots), which, for modern storms, provides a reasonable estimate of the resulting rainfall amount in inches. One example is Hurricane Andrew, which traveled at about 16 knots and dropped about 7 in. of rain; the Kraft method yielded an estimate of 6.25 in. The Great Miami Hurricane was estimated to travel at 18.75 mile/h (16.3 knots) as it approached Miami and 11.5 mile/h (10.0 knots) after hitting land (Mitchell 1926). This method yields estimates of 6.1 and 10.0 in. of rain from the storm, respectively, with probably more weighting to the lower value, which corresponds to landfall. Considering the previous estimate extrapolated from Mitchell (1926) of 5 in., a 6-in. total rainfall (0.152 m) was input into the simulation for 18 September 1926 as estimated rainfall from the Great Miami Hurricane. Modeling storm surge The method used to approximate storm surge requires modifying the boundary sea level conditions to represent water accumulated from hurricane winds offshore outside the model domain. When approximating surge for a specific hurricane in the recent simulation, the boundary stage conditions were iteratively modified until the simulated stage at coastal river outlets matched measured values. Storm surge estimates for the Great Miami Hurricane were based on information from Mitchell (1926). Tidal water levels were set to values indicative of the hindcast period as discussed previously. The maximum storm surge height was recorded as approximately 8 ft (2.4 m) on the Miami side of Biscayne Bay and also at Miami Beach (Mitchell, 1926). The datum was not specifically defined, so it is assumed to be approximately defined relative to sea level at the time of the storm. These storm surge data were incorporated into the simulated tidal level with linear rises and falls occurring over a 6-h period consistent with the standard time step of weather prediction models (Landsea et al. 2012). Storm wind field representations In the computation of surface-water flow, wind speed is converted to force τ at the water surface in the momentum flux formula: $$ \tau =\theta {\rho}_{\mathrm{air}}{v}^2 $$ where ρ air is the air density, v is the wind velocity vector at 10 m above the surface, and using a drag coefficient θ = 0.0018. This is a nominal value used in previous applications (Wang et al., 2007). Using this relationship, several methods of representing storm wind fields were developed for the hindcast simulation. The spatially uniform wind field defined for the daily simulation can be redefined to better represent large storms, or a spatially variable wind field at a shorter time step based on real wind data from an actual storm can be specified for the duration of the storm. The spatial resolution of the wind field can also be changed to determine the effects on the hydrologic simulation. These methods were compared and contrasted to determine the scale effects of wind fields on hydrologic response. Spatially uniform wind fields The peak velocity and storm duration recorded by Mitchell (1926) were used to make a spatially uniform storm wind field for the Great Miami Hurricane. The documented wind velocity increased to a peak of 56 m/s (125 mile/h) over 5-h period and dropped back to nominal velocities over the next 15 h. This time series was delineated as close as possible within the 4-h intervals of the uniform wind field developed for the recent simulation. Spatially variable wind fields As hurricanes have high-spatial variability in wind speed and direction as they cross land, a spatially variable dataset should improve the ability to simulate these storms events. A historic reconstruction for the Great Miami Hurricane (Landsea et al. 2012) was considered, but not used, as only the wind at the location of the hurricane's eye is reported every 6 h. Instead, an approximation was developed for a modern-era hurricane utilizing data from the 2005 Hurricane Wilma H*Wind Gridded Surface Wind Analysis (Powell et al. 1998), which is a data compilation based primarily on actual observations at sea, on land, from satellites, and from Hurricane Hunter aircraft. Past numerical simulations of storm surge have used wind fields created on the basis of fitting analytical cyclone models (Holland, 1980) or on surface wind field observations from H*Wind analyses of real storms (Zhang et al. 2008, Zhang et al. 2012). Real wind analyses provided more realistic wind velocity input for models, and storm surge output driven by these wind fields was compared with field measurements (Zhang et al. 2008, Zhang et al. 2012) for validation. No modern hurricane faithfully tracked the Great Miami Hurricane; however, Hurricane Wilma in 2005 was similar in spatial scale, and its track across South Florida from southwest to northeast can be compared to that of the Great Miami Hurricane from southeast to northwest when location and wind direction are switched from east to west (Figure 2). Using a real storm wind analysis from the study area provided the opportunity to compare different wind representations in the recent simulation to actual hydrology measurements in the field. Comparing output from the same storm run in both the recent and hindcast simulations allowed assessment of the efficacy of modifications to the recent model to produce a hindcast. Furthermore, using a modern storm provided experience with developing a diversity of known-storm scenarios that could be useful simulations for research and management questions. The process to develop a variable wind field for the Great Miami Hurricane began with downloading the gridded H*Wind data posted for Hurricane Wilma. The wind data are presented as gridded values over an 8° × 8° area centered on the eye of the storm. There are 160 × 160 grid points for the entire area for a spacing of approximately 5.1 km (Figure 4). The TIME and BISCAYNE domains cover about 2% of the entire H*Wind grid, and values from the 5.1-km gridded data were spatially interpolated to the center of each of the 0.5-km grid cells. For Wilma, wind data were available at hourly intervals from 10:30 UTC to 16:30 UTC on 24 October 2005. Only the 7 hourly measurements were used for the analysis. Data values utilized include the location of the gridded wind measurement and the wind speed and direction. Figure 4 Reduced 4 × 4 TIME/BISCAYNE wind grid showing relation to original full resolution H*Wind sample points for Hurricane Wilma. The wind variable presented in the H*Wind data set is the maximum sustained wind speed over a 1-min average, the standard for hurricane wind measurements (Powell et al. 1996). The wind data are initially gathered at a 10-min average measurement but then multiplied by a gust factor to approximate the 1-min standard. The factor increases the value of the 10-min average velocity by approximately 11%. Because the minimum interval for the TIME/BISCAYNE simulations is also a 10-min average, this gust factor was removed by division of the output data values by the standardized gust factor of 1.11 (Powell et al. 1996). In addition to the full resolution wind field described above, a reduced resolution representation was also developed to provide smaller data volume and computational effort for the hindcast. Whereas the full resolution grid bilinearly interpolates the wind data to the 0.5-km TIME/BISCAYNE grid, the reduced resolution grid divided the simulation area equally into a 4 × 4 grid (Figure 4) for a grid cell spacing of approximately 32 km in the east-west direction and 24 km in the north-south direction. The 16 cells formed a 4 × 4 matrix of spatially variable wind values that changed with each of the 7 hourly measurement from the Hurricane Wilma H*Wind analysis during the passage of the storm. Thus, the increase in area and reduction in resolution of each grid cell is approximately 30×. In order to synthesize a spatially variable wind field surrogate for the Great Miami Hurricane, it was noted that the track of Hurricane Wilma from southwest to northeast is reflective of the Great Miami Hurricane from southeast to northwest (Figure 2) when location and wind direction are switched from east to west. The 4 × 4 variable wind grid from Wilma (Figure 4) was transformed in a similar manner, and the resulting wind field represented a storm traveling from southeast to northwest like the Great Miami Hurricane. The transformed time series of wind data from Wilma was scaled in wind speed magnitude and used as a spatially variable surrogate for the Great Miami Hurricane wind field. The peak wind speeds for the Wilma data are approximately 45 m/s (100 mile/h) whereas the peak winds reported for the Great Miami Hurricane were on the order of 56 m/s (125 mile/h) (Mitchell, 1926), so the wind speed data were all multiplied by a factor of 1.25 to approximate the Great Miami Hurricane wind field. Short-term storm representation in long-term simulation The spatially variable wind is defined on a shorter time step (1 h) than the default longer-term spatially uniform wind (4 h). In order to accommodate transitions between these two timescales, the FTLOADDS model code was modified to accept a separate gridded data set for the duration of the storm and use the standard time series of uniform wind for the rest of the time. Negative time step values indicate use of gridded data for storms. The ratio of the wind grid size to the model grid size is specified in the main surface-water input data set (Swain, 2005). Not only can this input format be used to represent a single storm, but the wind data set can be flagged at any time during the simulation and the subsequent array of wind in the gridded wind set will be used. Verification and validation of the new components models TIME/BISCAYNE has been tested thoroughly and calibrated for the recent 1996 to 2004 period by comparison to measured field data (Swain and Lohmann, US Geological Survey, March 2014, written communication). Much of the hindcast 1926 to 1932 simulation input is based, by necessity, on spatial information used in the calibrated recent model. However, the available historic field data for sea level, tidal level, rainfall, and surface-water inflows, although limited, are major drivers of key hydrologic processes. With reasonable depictions of past water control features and more realistic representations of wind fields and storm surge for landfall hurricanes, differences in hydrologic parameters that affect ecological response, such as salinity and percent time inundated, should be apparent in comparisons of output from the hindcast and recent models and should be consistent with expectations from known hydrologic principles and historic observations. Verification and validation of the efficiency of the hindcast modifications can be assessed based on differences between models and not between model output and observations. Furthermore, the time periods and storm events depicted in the simulations were also designed to provide insight into how the variability of hydrologic conditions can affect flow and salinity regimes in coastal surface waters and groundwater. Comparisons of these simulations yield information not possible without numerical modeling. Model simulations The various storm representations were incorporated into both the recent 1996 to 2004 and hindcast 1926 to 1932 simulations to compare and contrast their efficacy in modeling hydrological processes. Table 1 outlines the model simulation scenarios, their parameterization, and the acronym to identify each simulation. The varieties of conditions described in Table 1 lend insight into the effects of the storms, their parameterization, and the other hydrologic conditions that affect the storm's impact. Table 1 Simulation runs, time periods, and storm configurations Simulation run Time period Storm simulated Wind field grid used none (TIME/BISCAYNE daily wind only) Spatially variable, low resolution Spatially variable, high resolution Spatially variable, low resolution none (TIME/BISCAYNE daily wind only) Great Miami Spatially uniform Great Miami Spatially variable, low resolution rotated Each simulation is identified by its acronym describing the time period (R = recent or H = hindcast), the name of the storm represented (W = Wilma, G = Great Miami, or N = none), the type of wind field (U = spatially uniform or V = spatially variable), and the resolution of the wind field (L = low or H = high). Simulation sets for the recent period Simulations of the recent period were needed to examine the effects of a representative modern storm and the efficiency of a reduced wind field representation to approximate a known storm. The original 1996 to 2004 simulation provides a reasonable time series, but does not contain an appropriate modern storm with sufficient hydrologic measurements. Instead, wind, rain, and storm surge representations for Hurricane Wilma, which struck the Everglades on 24 October 2005, were synthetically inserted on 18 September 1996. This is 262 days into the recent simulation, the same point as the 1926 Great Miami Hurricane strike in the hindcast simulation, with a sufficient period following the storm to examine long-term processes such as groundwater and surface-water salinity effects. Rainfall data collected at the modern stations when Hurricane Wilma struck the study area were used to represent storm precipitation. The storm-surge-height time series was obtained from data collected at the Harney River and Shark River sites (Figure 3) during the actual storm. Three wind field scenarios were simulated in the recent experimental set (Table 1): 1. 1) with the 4 × 4 reduced wind data for Hurricane Wilma (Simulation RWVL); 2. 2) the full wind data grid for Wilma, which is on a 5.1-km spacing (Simulation RWVH); and 3. 3) the ‘base’ simulation, which included no spatially variable wind, only the uniform wind from the original daily time step (Simulation RN). Comparison of the three simulations provides information on how much spatial resolution is needed to represent the wind effects on hydrology. The simulations also provide a validation of the wind field and storm surge used in the hydrodynamic models when salinity- and stage- simulated output is compared to empirical data collected during and after Hurricane Wilma. Simulation sets for the hindcast period Four simulations were run in the hindcast experimental set (Table 1): 1. 1) with no simulated wind field for the storm (Simulation HN), 2. 2) the surrogate Great Miami Hurricane with spatially uniform wind field (Simulation HGU), 3. 3) the surrogate Great Miami Hurricane with low-resolution spatially variable wind field (Simulation HGVL), and 4. 4) the modern Wilma low-resolution spatially variable wind field (Simulation HWVL). The comparison of the first three simulations indicates effects based on three representations of the wind field. Including a modern storm in the hindcast period (Simulation HWVL) allows a comparison of the same storm in the two time periods, yielding some insight into the importance of various ambient hydrologic conditions on the response to a particular storm event. Furthermore, the insertion of these major storms at the beginning of the recent and hindcast simulations provides a 7-year period to examine long-term effects to surface-water and groundwater hydrology that is not yet available for any recent, naturally occurring major hurricane in the region. Results and discussion Simulations in the recent period (1996 to 2004) Calibration of Wilma storm surge values to empirical measurements. [Runs RWVL and RWVH] For the recent simulation interval, which included a Hurricane Wilma-type storm (RWVL and RWVH, Table 1), model boundary sea level values were calibrated to measured inland storm surge values for the Shark and Harney Rivers during and following Hurricane Wilma. A Wilma storm-surge height time series was obtained by averaging data collected at the Harney River and Shark River sites (Figure 3) for a 56-h period starting 16 September 1996 (blue line Figure 5). These tidal levels for the storm surge were applied at the western boundary of the recent simulation with the reduced 4 × 4 wind grid (Simulation RWVL, Table 1). Due to wave-energy dissipation between the boundary and coastline, initial surge heights computed at Harney River, shown by the red line (Figure 5), were too small. An iterative process was used to raise the peak boundary surge levels until the modeled response at the two stations matched the measured levels during Wilma. The difference between the measured stage and the simulated stage at Harney was added as a correction to the boundary stage and re-simulated. The new stage (green line, Figure 5) is a much better match to the measured stage and was used to represent a synthetic Wilma storm surge in the hindcast simulation. Figure 5 Measured (blue line) and model computed (red and green lines) surge heights. Effects of different wind field grid resolution [Runs RWVL and RWVH] Both the original full H*Wind grid resolution and the 4 × 4 wind grid for Hurricane Wilma were superimposed on the 1996 to 2004 recent simulation interval on 18 September 1996, the same day of the year as when the Great Miami Hurricane made landfall in South Florida (Table 1 simulations RWVL vs. RWVH). Comparisons between these two model results for salinity averaged for this day (Figure 6) show that the inundation and surface-water salinity distributions after the hurricane are nearly identical in spite of the large difference in resolution of the input wind. There is a difference of several square kilometers in the small dry areas in the northwest area of the model in the midst of the freshwater inundation area, but otherwise, the model run results are nearly identical. These results imply that reduced wind field resolution can be effectively used in representing wind fields in hindcast applications. Figure 6 Inundation and salinity simulated 18 September 1996, induced by synthetic Wilma-type storm with differing wind resolution. Uncolored areas are not inundated. Verification of efficiency of the Wilma storm representation [Runs RWVL and RWVH] The recent simulation allows verification of the hydrodynamic model storm representation by comparing surface-water salinity values recorded at the gaging stations during Hurricane Wilma on 24 October 2005 to results simulated for the same locations from the synthetic Wilma storm on 18 September 1996. Salinity values are shown in Figure 7 for a 72-h interval encompassing the landfall of Hurricane Wilma. Data for two gaging stations were used for comparison: one at the Harney River and the second at the Shark River (Figure 7). The pre-hurricane salinities were higher in the simulated period (1996) compared to the measured data (2005). Despite the different pre-hurricane conditions, the storm processes were so dominant that post-storm observed and simulated results were similar; measured/computed differences pre- and post-surge of 3.76 PSU before and 1.40 PSU after for Harney River and 8.25 PSU before and 2.40 PSU after for Shark River (Figure 7). Furthermore, the period of salinity rise and fall was identical for both the full wind grid RWVH and the reduced 4 × 4 wind grid RWVL. This finding further supports the previous result that simulating variable winds with differing wind resolutions does not seem to produce substantially different results. Coastal flows appear to be more heavily influenced by general wind direction and storm surge rather than small-scale wind variations. Figure 7 Measured salinity at Harney and Shark Rivers and simulated values with differing wind schemes, RWVH and RWVL. Hindcast simulations Efficacy of surrogate variable wind field for the Great Miami Hurricane [Run HGVL] Results described above demonstrate the validity of the storm simulation in the recent environment (1996 to 2004), setting the stage for representing the Great Miami Hurricane in 1926 through the insertion of a surrogate hurricane wind field. The hypothesis was that a transformed time series of wind data from Wilma could be scaled in wind magnitude and used as a spatially variable surrogate for the Great Miami Hurricane wind field, capturing storm processes salient to known hydrological response. The approximated historic wind field of the 1926 storm using the 4 × 4 reduced resolution wind field (Simulation HGVL) at hourly intervals (Figure 8) clearly delineates the eye of the hurricane at hour 2, and the hurricane has largely passed by hour 3. One key directional component was changed in this simulation: the storm tracked from southwest to northeast in the 4 × 4 grid for Hurricane Wilma but was rotated about its north-south axis to correspond with the Great Miami Hurricane storm, which tracked from southeast to northwest. In this transformed dataset, the maximum winds move from the coastal areas of Biscayne Bay through the Everglades northwesterly. Three hours later, the storm center moved almost entirely outside the northwestern boundary of the simulation area (Figure 8). The change was rapid within the first 3 h so that the areas of highest winds along the southeastern model area had some of the lowest winds by the third hour after landfall. Figure 8 Wind fields synthesized for Great Miami Hurricane 1926. Effect of different wind field grid resolutions on hydrological response [Runs HGU, HGVL, and HN] The hindcast period was simulated with three different representations of wind for the 16-h period on 18 September 1926 during the Great Miami Hurricane, described as HGU, HGVL, and HN above. All input parameters for the first two simulations are identical, including storm surge and rainfall, with the exception of the wind field on the day of the hurricane strike. The third simulation does not have the simulated storm surge and storm rainfall, so all hurricane-related phenomena are absent from HN. Simulated surface-water salinity values were compared immediately preceding the storm, the day of landfall, and then several months later for a subset of the model area west of Biscayne Bay where the storm came ashore (Figure 9). Surface-water salinity the day before the hurricane, 17 September 1926, is identical in the three simulations, but at the end of the following day, salinity intrusion from storm surge simulated in HGU and HGVL is clearly higher than in HN (Figure 9). Similarly, the overall freshwater inundation area is larger when the hurricane is simulated, as would be expected from the rainfall rate. The salinity values in the southeastern coastal area are particularly affected by the simulated Great Miami Hurricane as shown in the Figure 9 comparisons. Florida Bay and southern Biscayne Bay are less saline in the two hurricane simulations, primarily because of the storm-related rainfall. Comparison of inundation and salinity for September 18 from simulations HGU and HGVL indicate higher values with the spatially uniform wind field (HGU), which has winds coming from due east for the entire model area. With the counterclockwise rotation of the storm, the spatially variable wind on the southern side of the storm comes from the west, so the uniform wind representation is obviously wrong in this area and the inundation too high (Figure 9 HGU). The difference is seen after 1 month (18 October 1926) where the spatially uniform wind simulation HGU has 1.25 km2 more inundation than HGVL with spatially variable wind. Consequently, the spatially variable wind field produces a representation compatible with the counterclockwise pattern of the hurricane winds. Figure 9 Salinity maps for hurricane and no-hurricane scenarios for the southeast quadrant of model (see Figure 3 ). Florida Bay and southern Biscayne Bay are on figure bottoms and bottom's right, respectively. As expected, simulations without any hurricane wind field (HN) show almost no change in salinity and inundation during the days immediately around landfall. One month later on October 18, substantial differences still exist due to the hurricane. Even after another month, on November 18, the differences in inundation and salinity are still noticeable, although the storm and no-storm simulations are starting to show similarity. An important consideration is that, over the 30 days following the Great Miami Hurricane of 1926, 6.2 in. (15.7 cm) of rain were measured. The equivalent 30-day period after the Wilma-type surrogate storm in 1996 had 9.8 in. (24.9 cm) of rain. The drier conditions in 1926 allow the inundation and salinity affects to remain longer than if there had been additional rainfall. Long-term effects of surface-water and groundwater salinities under three wind field scenarios [Runs HGVL and HN] Besides comparing the areal distribution of salinities after the landfall of the Great Miami Hurricane under the different wind scenarios, the long-term salinity response was also examined. The long-term effects on surface-water and groundwater salinity are shown at a comparison site (model salinity comparison location, Figure 3) in the southeastern quadrant of the model. This onshore area consists of isolated small coastal wetlands, seasonally inundated, where minimal flushing is likely. Simulated surface-water and groundwater salinities at this location are compared for 6 years after the initial landfall of the Great Miami Hurricane in the HGVL simulation (Figure 10). The surface-water salinity is seen to peak early and drop off at a slowing rate for about 36 months. In contrast, the groundwater salinity in the first model layer, computed at a depth of about 1.25 m below land surface, shows a much longer delayed response, peaking at the end of the following dry season. While the lag is present in both the HN and HGVL wind scenarios, the variable wind scenario does not show the effect as strongly as the uniform wind case. Because the spatially variable wind field model provides a more realistic approximation of hurricane processes, it also most likely provides a better assessment of storm surge effects. Figure 10 Salinities in surface water and groundwater predicted for scenarios. Breaks in the surface-water plots indicate times without inundation. The implication from these simulations is that storm surge effects in the aquifer can last for years; however, there is some uncertainty in the actual length of time because numerical model predictions near this coastal area indicate a salinity accuracy of less than 3 PSU for most computed values (Lohmann et al. 2012). Observing when the difference between the salinity with and without the hurricane effects drops below this value (Figure 11) indicates, in certain areas, substantial surface-water effects for at least 2 years and groundwater effects are important for at least 3 years. Moreover, groundwater chloride data collected after Hurricane Andrew from well G-901, which is located slightly further north than the area discussed but still within coastal southeast Miami-Dade County, show a definite increase in salinity for at least 3 months after the 1992 storm and possibly extending out almost to 2 years ( The prolonged salinity effects are most likely due to the local topography providing minimal flushing. Figure 11 Salinity differences between hurricane and no-hurricane scenarios. Comparison of hindcast and recent simulations Comparison of the overall hindcast and recent simulations [Runs HWVL and RN] Mapping the percent of time, during the entire simulation, that each model cell is inundated provides a comparison of the basic characteristics of the two time periods. Substantial differences are seen in plots of percent-time inundated when comparing average daily values from the recent and hindcast intervals (Figure 12). Coastal areas are drier in the hindcast period due to the lower mean sea level, especially in the southwest. Even in the northernmost part of the model, areas are drier in the hindcast simulation, partially due to lower groundwater levels caused by the Miami Canal's uncontrolled drainage present in the hindcast period. However, it is interesting to note that the area just south of the Miami Canal is slightly wetter during the hindcast simulation due to the poorer flood control and fewer control canals at that time (Renken et al. 2005). Figure 12 The percent of time inundated for the 1996 to 2004 simulation and the 1926 to 1932 simulation. Effect of existing conditions and surface-water control features in hydrologic response to the same storm [Runs HWVL, RWVL, and RN] The relative impact of a simulated storm event on the hindcast and recent scenarios can be illustrated by displaying inundation and salinity maps generated for the day following the insertion of a synthetic Hurricane Wilma (HWVL 19 September 1926 and RWVL 19 September 1996, Figure 13). The same storm winds are represented occurring in the two historical periods with differing hydrologic conditions. The distributions of salinity and inundation are the most similar between the two periods on the western coastal area where the storm came ashore; they become more dissimilar when observing further eastward. This dissimilarity is likely related to the more extensive surface-water control network in the east (Figure 13) during the recent period. Although pre-storm conditions and hydrological infrastructure (canals, topography) are substantially different between the two time periods, storm processes largely overcome those differences and the simulations converge in the storm inundation area. This comparison shows that the storm processes salient to hydrological response are captured in the model and appropriate to use in other storm scenarios. The third simulation in the recent period without the hurricane winds, surge, and precipitation (Simulation RN, Figure 13) shows surface-water inundation and salinity conditions if the storm had not occurred. Comparison with Simulation RWVL shows the effects of the hurricane are largely concentrated on the west coast where the storm came ashore. Figure 13 Inundation and salinity following Wilma-type storm in hindcast simulation and recent simulation (uncolored areas are not inundated). Comparison of measured and simulated river salinity values for Wilma-type storm inserted into the recent and hindcast Simulations HWVL and RWVL also provide comparisons of the simulated salinity values at Harney and Shark River sites (Figure 3) during the Wilma-type storm in the recent and hindcast periods (Figure 14). Little difference is seen, but at both locations, the hindcast storm salinity did not peak as high and took longer to wash out than the recent simulation. This observation might suggest more freshwater flow variability was recorded in the recent simulation, which can either be due to more details available in the data record of the recent simulations or that there was actually more variation in the recent interval. Figure 14 Comparison of Harney and Shark River salinity values for Wilma-type storm in hindcast simulation and recent simulation. The hindcast model demonstrated good capabilities of capturing long-term, large-scale hydrological processes while incorporating short-term processes inherent to hurricanes. Despite data input limitations and the lack of historic field measurements to validate the model, comparison of recent and hindcast period simulation experiments (summarized in Table 2) showed similarities and differences expected from known physical principles and empirical studies of past storms (Davis et al. 2004; Wilson et al. 2011). Development of surrogate wind fields from H*Wind analysis of direct observations of Hurricane Wilma provided realistic representations of storm effects and implies that simulations of historical hydrology can be reasonable in spite of the lower resolution data sets associated with historical eras. Output from running the surrogate representation at a shifted time frame in the recent and hindcast simulations showed values similar to field-measured data collected in real time. Inundation signals for rain storms in the hindcast based on 2 rain gages were similar to those in the recent based on 107 gages. These outcomes provide greater confidence that the approximations employed in the hindcast model are valid. Table 2 Comparisons of model simulations and conclusions Simulations compared Purpose of comparison Effects of wind field grid resolution Low resolution wind grid is sufficient to represent hurricanes, saving data and computational effort Effects of spatially uniform wind field grid and spatially variable wind field grid The depiction of hurricane winds as uniform does not provide necessary storm wind geometry Effects of major storms on hydrology Storms can have substantial long-term effects on groundwater salinity with consequences for vegetation Effects of same storm in different time periods Storm effects are quite similar for the same storm in different time periods Hindcast and recent simulation general comparison Historical changes in hydrology are primarily traceable to sea level variability and water-management changes The hindcast model shows promise for use in ecological studies to test hypotheses based on theoretical- or empirical-based studies at larger landscapes and timescales. Processes on a wide range of timescales are represented by the simulations: surface-water flow at 10 min, wind at 1 to 4 h, rain at 6 h to 1 day, and groundwater flow at 1 day, with a multiyear simulation period amenable to the timescale of ecologic changes. With the strong dependence of coastal vegetation composition on salinity, results of the model comparison could provide useful input for a variety of ecological models. The information can be input to any relevant study or application as a difference in surface-water and groundwater salinity between the spatially variable wind hurricane scenario and the no-hurricane scenario. By identifying the salinity difference between model runs, errors in model mean values largely cancel out. This difference can be combined with field-derived information and applied to habitat models, vegetation succession models, and individually-based models to provide realistic storm-induced salinity related evaluations. While the effects of hurricane wind fields on surface-water and groundwater salinity can have an inherent time lag of multiple months or years (Wilson et al. 2011), the effect on coastal vegetation is possibly much slower and of longer duration. Saha et al. (2011) and Jiang et al. (2012) have shown that the population of mangroves and tropical hardwood hammocks can be substantially affected for decades after a salinity event. The balance between the two plant populations heavily depends on soil salinity. Clearly, individual, large storm events must be considered when determining the long-term change in coastal ecology. The results of this study demonstrate that a storm event may have effects on groundwater salinity extending for years, depending on location and in situ hydrology. If hindcast studies integrating this numerical model with ecological models reliably show process and effects in the past, then these methods can be applied with more confidence in forecasting in areas of further research, which have even more data and resolution limitations. Any representation of rare events like hurricanes in a forecast will require generation of random events to represent a storm. Rather than be restricted to random presentations, we believe that users of the model would be better served if they can generate and modify various actual storm scenarios and apply it to a particular area of interest in a series of what-if questions. This is the technique we applied for representation of the missing wind field for the 1926 Great Miami Hurricane. While clearly, no two hurricane wind fields are the same, the simulation of a known storm provides some basis for comparison, given the approximations needed to make a hindcast, which are amplified when making a forecast. The insertion of a synthetic Hurricane Wilma shows the technique works with modern simulations with high-data resolution, giving us more confidence in the hindcast and forecast projections. Scenario planning (Peterson et al. 2003) has been embraced by the National Park Service as a tool to develop management plans under the uncertainty of future climate change (Weeks et al. 2011). Forecasting a range of plausible future conditions and disturbances allows managers to explore multiple strategies for water resource management in response to climate change. hindcast time period with Great Miami Hurricane, spatially Uniform wind field hindcast time period with Great Miami Hurricane, spatially variable wind field at low resolution hindcast time period with no storm hindcast time period with Wilma storm, spatially variable wind field at low resolution recent time period with no storm recent time period with Wilma storm, spatially variable wind field at high resolution recent time period with Wilma storm, spatially variable wind field at low resolution flow and transport in a linked overland/aquifer density-dependent system surface-water integrated flow and transport in two dimensions tides and inflows in mangroves of the everglades Hurricane Wind Analysis System developed by the National Oceanic and Atmospheric Administration's (NOAA) Hurricane Research Division (HRD) (Powell et al. 1998) This research is part of the U.S. Geological Survey (USGS) interdisciplinary research project, Future Impacts of Sea Level Rise on Coastal Habitats and Species (FISCHS), funded by the USGS Ecosystems Mapping, the USGS Greater Everglades Priority Ecosystems Science, and the USGS Climate and Land Use Change - Research and Development Program. FISCHS' team members, who were integrally involved in discussions on the development of the hindcast models, included Don DeAngelis, Ann Foster, Jiang Jiang, Melinda Lohmann, Thomas Smith, Brad Stith, and Zuzanna Zajac. Thomas Smith provided the surface-water salinity and stage data during Hurricane Wilma in 2005, which were used to validate the hydrological model. Authors’ Affiliations U.S. Geological Survey, Caribbean-Florida Water Science Center U.S. Geological Survey, Southeast Ecological Science Center 1. Davis SE III, Cable JE, Childers DL, Coronado-Molina C, Day JW Jr, Hittle CD, Madden CJ, Reyes E, Rudnick D, Sklar F (2004) Importance of storm events in controlling ecosystem structure and function in a Florida Gulf coast estuary. J Coastal Res 20(4):1198–1208View ArticleGoogle Scholar 2. Davis SM, Childers DL, Lorenze JJ, Wanless HR, Hopkins TE (2005) A conceptual model of ecological interations in the mangrove estuaries of the Florida Everglades. Wetlands 25(4):832View ArticleGoogle Scholar 3. Fish GV (1930) Record rainfall for Miami, Florida. Mon Weather Rev 58(6):251–252View ArticleGoogle Scholar 4. Green TW, Slone DH, Swain ED, Cherkiss MS, Lohmann M, Mazzotti FJ, Rice KG (2014) Evaluating effects of Everglades restoration on American crocodile populations in South Florida using a spatially-explicit, stage-based population model. Wetlands 34(Suppl 1):S213–S224View ArticleGoogle Scholar 5. Guo W, Langevin CD (2002) User's guide to SEAWAT: a computer program for simulation of three-dimensional variable-density ground-water flow. In: Techniques of Water-Resources Investigations Book 6, Chapter A7Google Scholar 6. Heffernan JB, Soranno PA, Angilletta MJ, Buckley LB, Gruner DS, Keitt TH, Kellner JR, Kominoski JS, Rocha AV, Xiao J, Harms TK, Goring SJ, Koenig LE, McDowell WH, Powell H, Richardson AD, Stow CA, Vargas R, Weathers KC (2014) Macrosystems ecology: understanding ecological patterns and processes at continental scales. Front Ecol Env 12(1):5–14View ArticleGoogle Scholar 7. Holland GJ (1980) An analytic model of the wind and pressure profiles in hurricanes. Mon Weather Rev 108(8):1212–1218View ArticleGoogle Scholar 8. Hopkinson CS, Lugo AE, Alber M, Covich AP, Van Bloem SJ (2008) Forecasting effects of sea-level rise and wind storms on coastal and inland ecosystems. Front Ecol Env 6(5):255–263View ArticleGoogle Scholar 9. Jiang J, DeAngelis DL (2013) Strong species-environment feedback shapes plant community assembly along environmental gradients. Ecol Evol 3(12):4119–4128, doi:10.1002/ece3.784View ArticleGoogle Scholar 10. Jiang J, DeAngelis DL, Smith TJ, Teh SY, Koh HL (2012a) Spatial pattern formation of coastal vegetation in response to external gradients and positive feedbacks affecting soil porewater salinity: a model study. Landscape Ecol 27:109–119View ArticleGoogle Scholar 11. Jiang J, Gao D, DeAngelis DL (2012b) Towards a theory of ecotone resilience: coastal vegetation on a salinity gradient. Theoretical Pop Ecol 82:27–37Google Scholar 12. Jiang J, DeAngelis DL, Anderson GH, Smith TJ III (2014) Analysis and simulation of propagule dispersal and salinity intrusion from storm surge on the movement of a marsh-mangrove ecotone in South Florida. Estuaries and Coasts 37:24–35, doi:10.1007/s12237-013-9666-4View ArticleGoogle Scholar 13. Khairoutdinov MF, Emanuel KA (2013) Rotating radiative-convective equilibrium simulated by a cloud-resolving model. J Adv Model Earth Sys 5(4):816–825, doi:10.1002/2013ms000253View ArticleGoogle Scholar 14. Landsea CW, Glenn DA, Bredemeyer W, Chenoweth M, Ellis R, Gamache J, Hufstetler L, Mock C, Perez R, Prieto R, Sánchez-Sesma J, Thomas D, Woolcock L (2008) A reanalysis of the 1911–20 Atlantic hurricane database. J Climate 21(10):2138–2168View ArticleGoogle Scholar 15. Landsea CW, Feuer S, Hagen A, Glenn DA, Sims J, Perez R, Chenoweth M, Anderson N (2012) A reanalysis of the 1921-30 Atlantic hurricane database. J Climate 25(3):865–885View ArticleGoogle Scholar 16. Langevin CD, Swain ED, Wolfert MA (2005) Simulation of integrated surface-water/groundwater flow and salinity for a coastal wetland and adjacent estuary. J Hydrol 314:212–234View ArticleGoogle Scholar 17. Lohmann MA, Swain ED, Wang JD, Dixon J (2012) Evaluation of effects of changes in canal management and precipitation patterns on salinity in Biscayne Bay, Florida, using an integrated surface-water/groundwater model. US Geol Surv Sci Invest Rep 5009:94Google Scholar 18. Maul GA, Martin DM (1993) Sea level rise at Key West, Florida, 1846-1992: America's longest instrument record? Geophys Res Lett 20(18):1955–1958, doi:10.1029/93gl02371View ArticleGoogle Scholar 19. Michener WK, Blood E, Bildstein K, Brinson M, Gardner L (1997) Climate change, hurricanes, and tropical storms, and rising sea level in coastal wetlands. Ecol App 7(3):770–801View ArticleGoogle Scholar 20. Mitchell CL (1926) The West Indian hurricane of September 14-22, 1926. Mon Weather Rev 54(10):409–414View ArticleGoogle Scholar 21. Obeysekera J, Browder J, Hornung L, Harwell MA (1999) The natural South Florida system I: climate, geology, and hydrology. Urban Ecosys 3:223–244View ArticleGoogle Scholar 22. Obeysekera J, Kubler L, Ahmed S, Chang ML, Engel V, Langevin CD, Swain ED, Wan Y (2011) Use of hydrologic and hydrodynamic modeling for ecosystem restoration. Crit Rev Environ Sci Technol 41(1):447–488View ArticleGoogle Scholar 23. Ogden JC, Davis SM, Jacobs KJ, Barnes T, Fling HE (2005) The use of conceptual ecological models to guide ecosystem restoration in South Florida. Wetlands 25 (4):795–809Google Scholar 24. Peters DPC, Bestelmeyer BT, Turner MG (2007) Cross-scale interactions and changing pattern-process relationships: consequences for system dynamics. Ecosys 10:790–796View ArticleGoogle Scholar 25. Peterson GD, Cumming GS, Carpenter SR (2003) Scenario planning: a tool for conservation in an uncertain world. Con Biol 17(2):358–366View ArticleGoogle Scholar 26. Pfost RL (2000) Operational tropical cyclone quantitative precipitation forecasting. Natl Weather Digest 24:61–66Google Scholar 27. Powell MD, Houston SH, Reinhold TA (1996) Hurricane Andrew's landfall in South Florida. Part 1: standardizing measurements for documentation of surface wind fields. Weather Forecast 11:304–328View ArticleGoogle Scholar 28. Powell MD, Houston SH, Amat LR, Morisseau-Leroy N (1998) The HRD real-time hurricane wind analysis system. J Wind Eng Ind Aerodynamics 77&78:53–64View ArticleGoogle Scholar 29. Renken RA, Dixon J, Koehmstedt J, Ishman S, Lietz AC, Marella RL, Telis P, Rogers J, Memberg S (2005) Impact of anthropogenic development on coastal ground-water hydrology in southeastern Florida, 1900-2000. US Geol Surv Circ 1275:77Google Scholar 30. Saha AK, Saha S, Sadle J, Jiang J, Ross MS, Price RM, Sternberg LSLO, Wendelberger KS (2011) Sea level rise and South Florida coastal forests. Climatic Change 107(1):81–108View ArticleGoogle Scholar 31. Sheng YP, Paramygin VA (2010) Forecasting storm surge, inundation, and 3D circulation along the Florida coast. Estuarine Coastal Model 2009:744–761, doi:10.1061/41121(388)43View ArticleGoogle Scholar 32. Smith TJ III, Tiling-Range G, Jones J, Nelson P, Foster A, Balentine K (2010) The use of historical charts and photographs in ecosystem restoration: examples from the Everglades Historical Air Photo Project. In: Cowley DC, Standring RA, Abicht MJ (eds) Landscapes through the lens: aerial photographs and the historic environment. Occ Pub Aerial Archaeology Res Group, vol No. 2. Oxbow Books, Oxford, UK. pp 179-191Google Scholar 33. Smith TJ III, Foster AM, Briere PR, Jones JW, Van Arsdall C (2002) Conversion of historical topographic sheets (T-sheets) from paper to digital form. U S Geological Survey Open-File Report 02-204, Florida Everglades and vicinityGoogle Scholar 34. Smoak JM, Breithaupt JL, Smith TJ, Sanders CJ (2013) Sediment accretion and organic carbon burial relative to sea-level rise and storm events in two mangrove forests in Everglades National Park. Catena 104:58–66, doi:10.1016/j.catena.2012.10.009View ArticleGoogle Scholar 35. Stith BM, Reid JP, Langtimm CA, Swain ED, Doyle TJ, Slone DH, Decker JD, Soderqvist LE (2011) Temperature inverted haloclines provide winter warm-water refugia for manatees in southwest Florida. Estuaries Coasts 34:106–119View ArticleGoogle Scholar 36. Swain ED (2005) A model for simulation of surface-water integrated flow and transport in two dimensions: user's guide for application to coastal wetlands. US Geol Surv Open-File Rep 1033:88Google Scholar 37. Swain ED, Decker JD (2010) Measurement-derived heat-budget approaches for simulating coastal wetland temperature with a hydrodynamic model. Wetlands 30(3):635–648, doi:10.1007/s13157-010-0053-7View ArticleGoogle Scholar 38. Swain ED, James DE (2007) Inverse modeling of surface-water discharge to achieve restoration salinity performance measures in Florida Bay, Florida. J Hydrol 351:188–202View ArticleGoogle Scholar 39. Swain ED, Lohmann MA, Decker JD (2008) Hydrologic simulations of water-management scenarios in support of the Comprehensive Everglades Restoration Plan. In: The role of hydrology in water resources management. IAHS Red Book Series, UNESCO/IAHS Symposium, October 2008, Isle of Capri, Napoli, ItalyGoogle Scholar 40. Swain ED, Stefanova L, Smith TJ III (2014) Applying downscaled global climate model data to a hydrodynamic surface-water and groundwater model. Am J Clim Change 3(1):33–49, doi:10.4236/ajcc.2014.31004View ArticleGoogle Scholar 41. Székely GJ, Rizzo ML, Bakirov NK (2007) Measuring and testing dependence by correlation of distances. Ann Stat 35(6):2769–2794View ArticleGoogle Scholar 42. Teh SY, DeAngelis DL, Sternberg LSL, Miralles-Wilhelm F,R, Smith TJ, Koh H-L (2008) A simulation model for projecting changes in salinity concentrations and species dominance in the coastal margin habitats of the Everglades. Ecol Model 213:245–256View ArticleGoogle Scholar 43. Wang JD, Swain ED, Wolfert MA, Langevin CD, James DE, Telis PA (2007) Application of FTLOADDS to simulate flow, salinity, and surface-water stage in the southern Everglades, Florida. US Geol Surv Sci Rep 5010:114Google Scholar 44. Weeks D, Malone P, Welling L (2011) Climate change scenario planning: a tool for managing parks into uncertain futures. Park Sci 28(1):26–33Google Scholar 45. Wilson AM, Moore WS, Boye SB, Anderson JL, Schutte CA (2011) Storm-driven groundwater flow in a salt marsh. Water Resources Res 47(W02535):1–11, doi:10.1029/2010WR009496Google Scholar 46. Zhang K, Xiao C, Shen J (2008) Comparison of the CEST and SLOSH models for storm surge flooding. J of Coastal Res 242:489–499View ArticleGoogle Scholar 47. Zhang K, Liu H, Li Y, Xu H, Shen J, Rhome J, Smith TJ III (2012) The role of mangroves in attenuating storm surges. Estuar Coastal Shelf Sci 102–103:11–23View ArticleGoogle Scholar © Swain et al.; licensee Springer. 2015
Sir Arthur Conan Doyale About  The  Author "Sir Arthur Ignatius Conan Doyle was born on May 22, 1859, in Edinburgh, Scotland. Doyle's literary output was prodigious. During his writing career, he wrote 21 novels and over 150 short stories, and he also published non-fiction, essays, articles, memoirs, and three volumes of poetry. But his magnum opus was undoubtedly Sherlock Holmes. He was a versatile and complex personality; a physician by education, he was also a keen sportsman, a war correspondent, a campaigner for social justice, and an active spiritualist. " Showing 1 to 6 of 6 (1 Pages)
David Ricardo's Discovery of Comparative Advantage History of Political Economy 34.4 (2002) 727-748 [Access article in PDF] David Ricardo's Discovery of Comparative Advantage Roy J. Ruffin There's place and means for every man alive. —William Shakespeare, All's Well That Ends Well David Ricardo (1772–1823) probably discovered the law of comparative advantage around the first two weeks of October 1816. The date itself is not important, but his letters at the time reveal how Ricardo's mind worked when he discovered the law. If my hypothesis is correct, the letters show that his mind ranged over much of the terrain of trade theory—from factor price equalization conditions to the Ricardian model. I also conjecture that the hard part of his discovery was coming up with the key assumption of factor immobility. The logical nature of his proof is reexamined. Given the importance of comparative advantage, how it was discovered may give economists some insight into the process of highly creative thinking. When asked to name a law of economics that is both true and nontrivial, Paul Samuelson named Ricardo's law of comparative advantage. Historians of the law of comparative advantage have turned a relatively simple and beautiful story into a confused tangle of claims of priority, [End Page 727] error, incompleteness, and attribution. It has been said that Robert Torrens (1780–1864) deserves the credit for discovering the law; James Mill (1773–1836) gave the theory to Ricardo; Ricardo had no interest in the law after it appeared; and Ricardo's exposition is deeply incomplete.1 Perhaps conflicting claims are to be expected, given the importance of comparative advantage. It may be the single best illustration of the power of economic analysis to defeat the forces of foolishness. Joseph Schumpeter (1954, 4–5) gave four reasons to study the history of economic thought: for direction, inspiration, insight, and economic methodology. Learning about how Ricardo discovered the law might fit into all of those categories. Moreover, in view of the importance of attribution in the creation of incentives for the future growth of any science, a historical reexamination of the law of comparative advantage may be useful. As Sherwin Rosen (1993) has said in a novel defense of the history of economic thought as an academic discipline, “Comparisons with the past help to set and maintain standards of accomplishment in a profession.” Thus we need to add Rosen's “professional incentives” to Schumpeter's list. As a trade theorist, it is with some trepidation that I dispute the conclusions of scholars in the broader area that is the history of economic thought. But without their scholarly and plausible claims, I would not have had the pleasure of examining when Ricardo discovered comparative advantage. Vilfredo Pareto once said, “Give me an error any time, full of seeds, bursting with its own corrections. You can keep your sterile truth for yourself.” The first section of this essay briefly restates the Ricardian law of comparative advantage, because it will be convenient to have a compact statement before us in our historical journey. In order to indicate the difficulties in the way of discovering comparative advantage, the next [End Page 728] section uses a counterfactual to show that Torrens should not get credit for the law of comparative advantage. In the third section I defend my inference that Ricardo discovered comparative advantage around the first two weeks of October 1816 and show the difference between Ricardo's statement and modern interpretations. The fourth section is devoted to Ricardo's other contributions to trade theory. A final section contains some concluding thoughts. Ricardo's Law of Comparative Advantage: A Modern Statement It is important to begin with a modern statement of Ricardo's law of comparative advantage to fully appreciate Ricardo's own statement and, perhaps, to also understand why some confusion has existed over the nature of his proof. This section fits the definition of a rational reconstruction of Ricardo (Blaug 1999) because, as we shall see later, Ricardo's own exposition was quite different, leading modern interpreters into unjustified claims of logical incompleteness. Consider two countries, home and...
JA Personal Finance JA Personal Finance Students participating in JA Personal Finance recognize the fundamental elements of their personal finances: earnings, saving and investing, budgeting, credit, risk management and giving. They apply these fundamental elements to a personal financial plan that allows them to set specific goals for their lifelong financial needs and desired quality of life. Session One: Plan to Earn 1. Recognize the role income plays in personal finances. 2. Evaluate the effect their educational choices have on lifetime earnings. 3. Describe the importance of planning in making financial decisions. Session Two: Saving for Life 1. Recognize high-dollar items and unexpected costs that require savings. 2. Review key concepts related to successfully saving money. Session Three: The Budget Game 1. Recognize the importance of making and keeping a spending plan. 2. Consider the wide range of expenditures that might make up a monthly budget. Session Four: Credit Choices 1. Recognize the importance of credit as part of personal finances. 2. Express the need to make good credit decisions to avoid costly consequences. Session Five: Savvy Consumer Groups work together to create public service announcements (PSAs) to inform each other of risks they could face in their finances and identify ways to protect themselves from potential loss. 1. Recognize potential risks to their personal finances. 2. Describe appropriate preventive methods to limit potential losses. Program Basics 1. Includes a series of five sessions recommended for high school students. 2. Average time for each session is 45 minutes. 4. Emphasis on making money, spending money wisely through budgeting, saving and investing money, using credit cautiously and protecting one's personal finances. 5. Session-specific, age-appropriate materials provided to increase student interaction and emphasize JA's experiential approach to learning. 6. Correlates to state social studies, English and math standards as well as the Common Core State Standards in English/Language Arts. JA Personal Finance enhances students' learning of the following concepts and skills: • Concepts in budget, budgeting, compound interest, consumer protection, credit, credit cards, credit reports and scores, debt, earning, education, expense, fixed expenses, fraud, identity theft, income, insurance, interest, investing, lifetime earnings, opportunity cost, personal finances, pay yourself first, principal, risk, risk management, saving money, savings, variable expenses. • Skills in analyzing information, categorizing data, creativity, decision making, evaluating alternatives, graphic presentation, oral, visual, and written communication, prioritizing information, read for understanding, using a timeline, working in pairs, teams, and groups. For more information about this program, read the Program Summary.
A Contrast of Power King Herod (Agrippa I) was the grandson of Herod the Great. Given much power and a large kingdom by the Roman emperors, Agrippa I ruled over the region of Judea. In order to placate his Roman benefactors, he was interested in maintaining stability, so he worked to gain the favor of the Jews especially by attacking Christians. That destructive earthly power of Herod is contrasted today with God’s greater power to save. Herod had already executedJames; now he imprisoned Peter with similar intentions. Peter’s situation was dire—not only was he arrested, he was in double chains, flanked by two soldiers, and his prison door was guarded by sentries. What could a small minority of Christians possibly do against such a powerful force like Herod and the Roman guards? But that is just the point. We are given such a clear picture of the world’s power so that we might see more clearly God’s power. The church did the only thing they could: pray! With earnest, unrelenting, into-the-night prayers, that small group of believers poured forth their petitions to God. And remarkably—even to the praying Christians!—Peter was delivered from prison by an angel. None of Herod’s attempts at security worked. The chains fell off, the guards slept on, and locked gates opened. Reunited with his brothers and sisters, Peter understood what happened: “the Lord had brought him out of prison” (v. 17). Finally, God’s power was displayed once more upon Herod. As he reveled in human praise in Caesarea, God struck him dead. Herod, the symbol of earthly power, was nothing against the power of God. Scripture’s words near the end of this chapter summarize it well: “But the word of God continued to spread and flourish” (v. 24). The contrast is complete and the point is clear: God’s power is always greater than the world’s. Apply the Word If God can deliver His people in such a great thing, how much more is He able to save in small things? Perhaps you know someone today who is struggling with difficulties in life. Take time to write a personal note or make a phone call to encourage them with the message of today’s reading. The obstacles may be high, but God’s power is greater than all. BY Bryan Stewart Browse Devotions by Date
Dunning-Kruger effect How many people do you now with Dunning-Kruger effect? :-) The Dunning–Kruger effect is a cognitive bias in which unskilled individuals suffer from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to ametacognitive inability of the unskilled to recognize their ineptitude.[1] Actual competence may weaken self-confidence, as competent individuals may falsely assume that others have an equivalent understanding.
Understanding The Difference Between Asperger’s & High Functioning Autism “Our Children Left Behind” is a my personal blog designed to assist fellow parents, guardians and teachers to find appropriate resources in properly identifying and caring for children on the autism spectrum.  Diagnosing a child’s learning disorder is usually the first step in getting them the proper care and treatment that they need in life. There are many unique challenges that come with raising a child with autism or Asperger’s Syndrome, but that doesn’t change the fact that the children bring a special joy into parents’ lives, and we wouldn’t trade the love and special moments no matter how many challenges there are. As a concerned parent, it makes sense that you want as much information as possible whenever dealing with any type of challenge that is affecting the children you love. Two terms that often come up are high functioning autism (HFA) and Asperger’s Syndrome. click here for more details. Many parents quickly realize how similar these two diagnoses are and find it hard to get clear information about each one. The truth is that there is a lot of overlap between the two, to the point that in many cases HFA and Asperger Syndrome are used interchangeably as a diagnosis. Currently this isn’t correct as they are each a very separate diagnosis but there is also a major debate about whether this is actually the case or not, and there’s a chance that the two conditions will be combined into one in the future. What’s The Difference? The two conditions are similar in many ways, but there are some small differences. Right now the main difference between Asperger’s and high functioning autism tends to be the development of language. Basically if HFA tends to be the diagnosis it is because the child takes much longer to learn language and that development can be really difficult and frustrating for the kid in the beginning. When the diagnosis is Asperger’s, there isn’t an obvious delay in the child learning language, the potential red flags pointing to AS come in other forms later on. How Are These Conditions Like Autism? Children with Asperger’s and HFA both experience many similar traits or challenges early on in life. Both find it very hard to express their feelings, in large part because emotions can be very confusing to them so they’re not always completely sure what they’re feeling, much less how to properly express it. This can make connecting with others very challenging, and reading emotions by holding eye contact, reading people’s faces or gestures, or understanding their emotional signs is just hard. Understanding The Difference Between Asperger's & High Functioning Autism Some other common (though not necessarily guaranteed) behaviors include not being able to hold eye contact, speak without much emotional variance, obsessively interested in one object or subject, or even the flapping of their hands. Children with both AS and HFA often have triggers (whether sight, sound, smell) that can cause a sudden panic attack or rash of sudden extreme behaviors. How Does AS & HFA Differ From “Regular” Autism Cases Children with AS/HFA differ from children who have what’s considered more classic autism. AS/HFA children tend to have normal or even high IQs in many cases. Generally speaking they are often seem like most children, just “a little weird” or “socially awkward in a strange way.” This can be why it sometimes takes so long for healthcare providers to properly diagnose children with either one of these conditions, delaying social training and treatment that could otherwise help. There are challenges, but by paying attention and being prepared with the power of knowledge, you will be able to offer the loving support your children deserve. Comments are closed, but trackbacks and pingbacks are open.
Multiple-use Corn zein-based Biodegradable Resins, Sheets, and Films are an attractive alternative to plastic This technology is a process for preparing biodegradable resins comprised of corn zein and fatty acids and forming the resins into sheets, thin films, and similar products useful in a broad range of food packaging and agricultural applications. Corn zein-based Biodegradable Resins present an environmentally friendly alternative to plastic. Zein resins are new products derived from corn zein. Zein, a family of proteins found in corn, is solvent extracted, mixed with long chain fatty acids, chilled, washed and kneaded to form a moldable biodegradable plastic which can be extruded immediately to form products or pellitized for later use. Pellets can be stored or shipped to plastic mills to be formed into highly useable, edible, biodegradable, environmentally friendly products. • Consumer Replacement for plastic packaging materials such as trash and grocery bags; shrink films used to protect palletized products; food wraps used to prevent spoilage; or disposable food service ware such as plates, bowls, and cups. • Agricultural Weed Control: Rolled films produced from zein resin can be applied to planting beds or placed between row crops to prevent weeds. Since the product is fully biodegradable, there's no need to remove the preventative layer at the end of the growing season; saving time and money. • Cover for Round Hay Bales: Zein-based resin films can be used to protect hay bales from spoiling. Zein-based resins are completely edible; therefore, films do not need to be removed prior to their use. • Horticulture Containers manufactured from zein-based resins go directly from the green-house to a consumer's garden or planting bed, saving disposal of traditional plastic pots. • Multiple End-Use Products: Products manufactured from zein-based resins can be extruded, blown, or injection molded into a wide variety of forms. Examples include trays, bowls, clamshells, films which can be used for wraps and/or laminated, and edible hay bale wrappers. • Desirable Production Characteristics: Zein bioplastics are flexible, tough, heat sealable, able to accept color pigmentation, and producible in varying degrees of oxygen and carbon dioxide permeability. • Fully Biodegradable: Unlike commodity plastics that do not degrade, products manufactured from zein-based resins are completely biodegradable by native soil microflora; leaving no residual materials to dispose of or fear of ingestion by wildlife or production animals. • Abundance of Raw Material: Zein resins are derived from corn. Zein-based resins are categorized by the FDA as "Generally Recognized as Safe" (GRAS): Products manufactured from zein-based resins can be used to package and/or protect food stuffs.
What is dry eye? What are the symptoms of dry eye? The usual symptoms include: · stinging or burning eyes · scratchiness · stringy mucus in or around eyes · excessive eye irritation from smoke or wind · excess tearing · discomfort when wearing contact lenses What is tear film? The tear film consists of three layers: · an oily layer · a watery layer · a layer of mucus What causes dry eye? A wide variety of common medications - both prescription and over-the-counter - can cause dry eye by reducing tear secretion. Be sure to tell your ophthalmologist the names of all the medications you are taking, especially if you are using: · diuretics for high blood pressure · beta-blockers for heart or high blood pressure · antihistamines for allergies · sleeping pills · medications for “nerves” · pain relievers Since these medications are often necessary, the dry eye condition may have to be tolerated or treated with eyedrops called artificial tears.  People with dry eye are often more prone to the toxic side effects of eye medications, including artificial tears. For examples, the preservatives in certain eyedrops and artificial tear preparations can irritate the eye. These people may need special preservative-free artificial tears. How is dry eye diagnosed? An ophthalmologist is usually able to diagnose dry eye by examining the eyes. Sometimes tests that measure tear production are necessary. One test, called the Schirmer tear test, involves placing filter-paper strips under the lower eyelids to measure the rate of tear production under various conditions. Another test uses a diagnostic drop to look for certain patterns of dryness on the surface of the eye. How is dry eye treated? Artificial tears are available without a prescription. There are many brands on the market, so you may want to try several to find the one you like best. Preservative-free eyedrops are available for people who are sensitive to the preservatives in artificial tears. If you need to use artificial tears more than every two hours, preservative-free brands may be better for you. A guide to various artificial tears and their ingredients can be found here. You can use the artificial tears as often as necessary - once or twice a day or as often as several times an hour. Tears evaporate like any other liquid. You can take steps to prevent evaporation. In winter, when indoor heating is in use, a humidifier or a pan of water on the radiator adds moisture to dry air. Wrap-around glasses may reduce the drying effect of the wind, but you should note that they are illegal to wear while driving in some states. A person with dry eye should avoid anything that may cause dryness, such as an overly warm room, hair dryers, or wind. Smoking is especially bothersome. Some people with dry eye complain of “scratchy eyes” when they wake up. This symptom can be treated by using an artificial tear ointment or thick eyedrops at bedtime. Use the smallest amount of ointment necessary for comfort, since the ointment can cause your vision to blur. Dry eye due to a lack of Vitamin A in the diet is rare in the United States but is more common in poorer countries, especially among children. Ointments containing Vitamin A can help dry eye if it is caused by unusual conditions such as Stevens-Johnson syndrome or pemphigoid. Vitamin A supplements do not seem to help people with ordinary dry eye. Now Offering LATISSE! LATISSE® solution is a safe and effective prescription treatment used to grow eyelashes, making them longer, thicker and darker. Click here to learn more or ask us about it today! Dry Eye Treatment Dry eyes are an uncomfortable yet highly treatable problem for many individuals. To find out some of the surprising symptoms of dry eye and how it is treated, click here!
Presentation is loading. Please wait. Presentation is loading. Please wait. Sprinkler Irrigation. Similar presentations Presentation on theme: "Sprinkler Irrigation."— Presentation transcript: 1 Sprinkler Irrigation 2 Definition Pressurized irrigation through devices called sprinklers Sprinklers are usually located on pipes called laterals Water is discharged into the air and hopefully infiltrates near where it lands 3 Types of Systems Single sprinkler Examples: Only one sprinkler that is moved or automatically moves Examples: Single lawn sprinkler Large gun on a trailer that is moved or automatically moves (“traveler”) Often used for irregularly shaped areas Pressure and energy requirements can be high 4 Traveling Volume Gun Sprinkler Irrigating from Lagoon 5 Smaller traveling guns can be used for parks, athletic fields and even home use. 6 Solid Set Laterals are permanently placed (enough to irrigate the entire area) Laterals are usually buried, with risers or pop-up sprinklers Easily automated and popular for turf and some ag/hort applications Capital investment can be high 7 Portable Solid-Set Sprinkler System 8 Fairway Runoff Research Plots at OSU Turf Research Farm 9 Periodically Moved Lateral Single lateral is moved and used in multiple locations Examples: Hand-move Tow-line/skid-tow (lateral is pulled across the field) Side-roll (lateral mounted on wheels that roll to move the lateral) Fairly high labor requirement 10 Side-Roll Sprinkler Lateral in Peanuts 11 Moving Lateral Single lateral moves automatically (mounted on wheeled towers) Examples: Center pivots (lateral pivots in a circle) Linear or lateral move systems (lateral moves in a straight line) Fairly high capital investment 12 Center Pivot System with Spray Pad Sprinklers 13 Lateral move systems (linear move systems) are much like center pivot systems, except both ends of the lateral are allowed to move. They irrigate a large rectangular area. 14 System Components Sprinklers Impact sprinklers Devices (usually brass or plastic) with one or more small diameter nozzles Impact sprinklers Drive or range nozzle (hits sprinkler arm and throws water out farther) Spreader nozzle (optional; Applies more water close to the sprinkler) Trajectory angles Part-circle sprinklers Used in all types of irrigation, but especially agricultural crops 15 Two-nozzle, bronze impact sprinkler Impact Sprinklers Two-nozzle, bronze impact sprinkler Range (Drive) Nozzle Impact Arm Trajectory Angle Spreader Nozzle Bearing 16 Impact Sprinklers RainBird RainBird RainBird 70 17 Pop-up, part-circle impact sprinkler head 18 System Components Cont’d. Spray Pad devices Water jet strikes a plate or pad Pad spreads the water and may be smooth or serrated Popular on center pivot and linear move systems 19 Serrated Deflector Pad Spray Pad Sprinklers Nozzle Smooth Deflector Pad Serrated Deflector Pad 20 System Components Cont’d. Gear-driven rotors (rotary heads) Energy in the water turns a turbine that rotates the nozzle through a gear train Typically used in large, open turf/landscape areas 21 Pop-up, turbine rotor with riser extended 22 Turbine-driven rotor w/ adjustable spray angle 23 Pop-up, turbine rotor complete with swing arm and tee 24 System Components Cont’d. Spray heads Heads do not rotate Nozzle is shaped to irrigate a certain angle of coverage Typically used for small or irregularly shaped areas Pop-up heads are installed flush with ground and rise when pressurized 25 Pop-Up Turbine Rotor Sprinklers in Operation 26 Pop-up spray head with adjustable coverage angle from 1º - 360º 27 Pop-Up Spray Head Full-circle, 4-inch, Pop-up spray head w/ Funny Pipe Riser Pipe Thread-Barb Adapters “Funny Pipe” Riser 28 System Components Cont’d. Laterals Pipelines that provide water to the sprinklers May be below, on, or above the ground Risers Smaller diameter pipes used to bring water from the lateral to the sprinkler Purposes Raises the sprinkler so that the plants won't interfere with the water jet Reduces turbulence of the water stream as it reaches the sprinkler Mainlines and submains Pipelines that supply water to the laterals May serve several laterals simultaneously 29 Sprinkler Performance Discharge Depends on type of sprinkler, nozzle size, and operating pressure qs = discharge (gpm) Cd = discharge coefficient for the nozzle and sprinkler  0.96 D = inside diameter of the nozzle (inches) P = water pressure at the nozzle (psi) 31 Sprinkler Performance Cont’d. Diameter of Coverage Maximum diameter wetted by the sprinkler at a rate that is significant for the intended use Depends on operating pressure and sprinkler and nozzle design (including trajectory angle) 33 Single Sprinkler 34 Overlapped Sprinklers Uniform Application: Overlap  50% of sprinkler wetted diameter Non-uniform Application: Overlap << 50% of sprinkler wetted diameter 35 No wind Elongated parallel pattern 36 Overlapped Sprinklers Contd… Dry zone 37 Maximum Spacing of Sprinklers 38 Application Rate Rectangular sprinkler layout Ar = water application rate (inches/hour) qs = sprinkler discharge rate (gpm) Sl = sprinkler spacing along the lateral (feet) Sm = lateral spacing along the mainline (feet) 39 Equilateral triangular layout S = spacing between sprinklers (feet) Depth of water applied Ig = Ar To Ig = gross depth of water applied per irrigation (inches) To = actual time of operation (hours) 40 Application Rate & Soil Infiltration Rate 41 Sprinkler Example Calculations A sprinkler system irrigates turf grass on a clay loam soil on a 5% slope in a 10 mph South wind. The sprinklers are 5/32”, single-nozzle sprinklers with a 23° trajectory angle operating at 40 psi. The sprinklers are arranged in a 30 ft x 50 ft rectangular spacing with the laterals running East-West. Is the sprinkler system design satisfactory for these conditions? How many hours should the system operate in one zone? 42 Sprinkler Example From Table 11.1: for 5/32” @ 40 psi, qs=4.5 gpm. From Table 11.2: for 40 psi, Dw=88 ft. From Table 11.3: for 8-12 mph wind, Sl max=40% Dw, Sm max=60% Dw 0.4 x 88=35.2 > Sl =30 ft. And 0.6 x 88=52.8  Sm =50 ft Sl and Sm are OK . Note: laterals are perpendicular to wind direction Ar = 96.3 (4.5) = in/hr 30 x 50 From Table 11.4: for Turf, Recommended Max. Ar = in/hr Ar is within the recommended range and is probably OK. 43 Sprinkler Example From Table 2.3: AWC for clay loam= 0.15 in/in From Table 6.3: Rd for turf grass= ft. Assume Rd= 12 in. TAW=AWC x Rd = 0.15 x 12 = 1.8 in For lawn turf assume fd max= 0.50 AD= TAW x fd max = 1.8 x 0.50 = 0.90 To prevent deep percolation loss dnAD Assume Ea = 80%, so dn=0.8 dg , or dg=dn/0.8 = 0.9/0.8=1.125 From Eq dg = Ar To, so To = dg/Ar = 1.125/0.289= 3.9 hrs. 44 Hydraulics of Laterals Review of friction loss in a lateral: Calculate as though it's a mainline Then multiply by multiple outlet factor (Table 7.3) For a large number of sprinklers, this factor is approximately equal to 0.35 This gives total friction loss along the entire lateral length Or use the RainBird Slide Rule to calculate 45 Pressure Variation Along a Lateral General trends Maximum at the inlet and minimum at distal end (assuming level lateral) Linear variation in between? NO! Equations for a level lateral Where: Pi =inlet pressure Pa =average pressure Pd =distal pressure Pl =pressure loss 46 Pressure Distribution 47 Equations for a Sloping Lateral E's are elevations of the ends of the lateral (in feet) Above equations assume half the elevation change occurs upstream of the average pressure point, and half occurs downstream of that point (even if that assumption is not quite true, equations still work pretty well) 48 Allowable Pressure Variation Based on uniformity considerations, recommendation is that (qmax - qmin) not exceed 10% of qavg Because of square root relationship between pressure and discharge, this is the same as saying (Pmax - Pmin) should not exceed 20% of Pavg: Maximum Pl < 0.20 x Pa 53 Maximum Lateral Inflow Constrained by: Maximum allowable pressure variation (more Q = more Pl) Maximum allowable pipeline velocity (more Q = higher velocity) Figure assumes portable Al pipe and Vmax of 10 ft/s 55 Example Problem 57 Other Design and Management Considerations Sprinkler selection qs = minimum sprinkler discharge (gpm) Qc = gross system capacity (gpm/acre) Sl = spacing between sprinklers along the lateral (feet) Sm = spacing between laterals along the mainline (feet) Ns = number of sets required to irrigate the entire area Nl = number of laterals used to irrigate the entire area To = time of actual operation per set (hours) Ts = total set time (hours) Ii = irrigation interval (days) Td = system down time during the irrigation interval (days) 58 Sprinkler Selection, Cont’d. Ns = number of sets required to irrigate the entire area Wf = width of the field or area (feet) Sm = spacing between laterals along the mainline (feet) Note: Choose a combination of nozzle size and operating pressure to provide the desired qs 59 Example Problem 60 50 0.55 5.3 61 Required Lateral Inflow Ql = inflow to the lateral (gpm) L = length of the lateral (feet) Ql must not exceed maximum allowable based on friction loss or velocity System layout Generally best to run the mainline up and down the slope and run the laterals on the contour If laterals must be sloping, best to run them downslope Wind is also a factor (prefer laterals running perpendicular to wind direction; because normally, Sm > Sl) 62 Center Pivot Laterals Area Inside: ac 95.7 ac 75.6 ac 57.9 ac 42.5 ac 29.5 ac 18.9 ac 10.6 ac “Multiple outlet factor" is (higher than in conventional laterals because more water must be conveyed to the distal end) Radius: 128 256 384 512 640 768 896 1024 1152 1280 63 Center Pivot Laterals Cont’d. Use the distal sprinkler as the "benchmark" and then calculate the inlet pressure and the pressure distribution along the lateral (as opposed to stationary laterals, where the average pressure was used determine acceptable friction loss and pressure variation) But linear move lateral is analyzed like a stationary lateral (area irrigated does not change as you move down the lateral) 64 Application Depth The application depth of a continuously moving sprinkler system depends on the water pumping rate, Q; the total acreage irrigated, A; and the time required to cover the area, Ta. The time to cover the irrigated area is adjusted by the “Percent Setting” of the system. On a center pivot, this sets what percent of the time the tower motor on the outermost tower is running- from 0% to 100%. At 100% a ¼-section pivot takes 22 hrs to cover its 125 acre circle. Percent Setting Knob The control panel allows the operator to turn on the system, set its direction of travel (clockwise or counterclockwise) and set the speed of travel (which controls the depth of water applied). The system has automatic shutdowns if the system gets out of alignment or if the water pressure drops too low. 65 Center Pivot Application Depth Center pivot application rate depends on: the area irrigated, A (acres) = L2/13866 where (L= lateral length, ft) the pumping rate, Q (gpm) the actual travel time/revolution, Ta (hours) Ta = 100 (Tmin)/P where Tmin = minimum travel time (normally 22 hr) where P = percent speed setting, (0% - 100%) 66 Center Pivot Application Depth The actual application depth is given by: d = (Q Ta) / (453 A) Example: A 1300-ft long center pivot has a minimum travel time of 21 hrs at its 100% setting and is supplied with a flow rate of 800 gpm. What is the depth of application at a 20% speed setting? A= 13002/13866 = acres Q = 800 gpm Ta = 100 (21)/20 = 105 hrs d = (800 gpm x 105 hrs)/(453 x acres) = 1.52 inches 67 Lateral Move Application Rate Lateral system application rate depends on: The area irrigated, A (acres) = L Dt/43560 where L = lateral length, (ft) where Dt = travel distance of lateral, (ft) The actual system flow rate, (gpm) The actual travel time Ta (hr) = 100 Tmin/P Ta = 100 (Tmin)/P where Tmin = minimum time to move distance Dt, (hr) where P = percent speed setting, (0% - 100%) 68 Lateral Move Application Depth The actual application depth is given by: d = (Q Ta) / (453 A) Example: A 1320-ft long lateral move system has a minimum travel time of 14 hrs at the 100% setting over its travel distance of 2640 ft and is supplied with a flow rate of 600 gpm. What is the depth of application at a 17% speed setting? A= 1320 x 2640/43560 = 80 acres Q = 600 gpm Ta = 100 (14)/17 = hrs d = (600 gpm x hrs)/(453 x 80 acres) = 1.35 inches Download ppt "Sprinkler Irrigation." Similar presentations Ads by Google
Sunday, April 24, 2011 Full auto slingshot crossbow Gatling guns have been the first firearms with a firing rate close to modern machine guns. Their principle is easy: A set of rotating barrels are fired by cranking a wheel. This makes them technically and legally a repeating gun, not a full auto one - but it is close enough. The Slingshot Channel took the challenge to design a rubber powered version of Mr. Gatling's great invention. And here it is: Eight 20 mm balls, on their way to the target in less than half a second. The theoretical firing rate is 960 rounds per minute, slightly faster than that of the popular M16 assault rifle. The video also shows how you can fire single shots with the weapon. A presentation brought to you by The Slingshot Channel! 1 comment: 1. Can you make this shooting arrows?! Something like this: but with multiple shots?! And a bigger one, with 16 arrows in a row :D ?! Slingshot power to you!
Summer Camp Student Age: 7-15 years old Starbugs Summer Camp is a supplemental learning camp that runs during July and August school summer holidays.  The camp is theme-based and separated into Beginner, Intermediate and Advanced level courses.  It offers students more concentrated courses and a plethora of indoor and outdoor activities that include a variety of US culture-content.  Summer camp is usually held on multiple days throughout the week, providing each class with more consistent teacher-student contact time.