text
stringlengths 144
682k
|
|---|
Variable Air Volume Ventilation
Standard practice in California for many years has been use of constant volume systems, which leads to over-ventilation. As a default, many areas of a hospital are reheating all the time. Those areas can be operated as VAV, reducing the need for reheat. This can reduce ventilation.
Cost to implement 💰♦♦♦♦
Carbon reduction potential 🌲🌲🌲🌲
Technical Description
CAV to VAV conversions require redesigning the room ventilation schedule to ensure all space pressurization requirements are met as per applicable code. If terminal units with modulating dampers and VAV capability exist, implementing the measure will only require reprogramming the terminal box minimums, supply and return/exhaust offset, and a final air balance to ensure minimum air changes per hour (ACH) and pressurizations are met.
How does this decarbonize?
Per the ASHRAE Advanced Energy Design Guide for Large Hospitals, CAV reheat systems use the most reheat energy, and they are not recommended. VAV reheat systems reduce reheat energy, especially in unoccupied periods when air change per hour (ach) requirements generally do not apply, but reheat is still often the largest component in energy models of these systems. Depending on core space air change requirements and space load, this may also eliminate the need for reheat in core spaces with the CAV to VAV conversion VAV systems reduce ventilation levels based on each space's demand. Reduced ventilation means less reheat for that air and less overall demand for boiler heating. VAV systems, on average, are 30-40% more energy intensive than VAV systems.
Where has it been done before?
Kaiser Permanente as done that at a number of facilities including South Bay Medical Center, where a demonstration project was completed to convert a CAV system to VAV while monitoring IAQ throughout the facility to ensure air quality was maintained at acceptable levels for occupant safety and comfort. They have also done VAV conversions at Woodland Hills Medical Center.
What are the barriers to successful implementation?
As of the 2019 California Building Code, OSHPD code requires return boxes for VAV systems. Return boxes are a costly addition and will not help the payback for retrofit applications.
Control Strategies
Coming soon.
Design Considerations
Coming soon.
How to implement
Conversion to VAV can be as simple as changing the control programming on a terminal unit or as involved as replacing pneumatic or mechanical terminals with Direct Digital Controls (DDC) VAV terminals. The Kaiser South Bay site required reprogramming the terminal box minimum ventilation levels followed by an air balance.
Financial Model
This measure typically costs $1-5/sf with a payback of 1-5 years.
Calculate the carbon reduction using my data
Coming soon.
|
Finnish teacher writes math book for Japanese kids
Riika Pahka does math drills with her daughter Aura
Riika Pahka does math drills with her daughter Aura
Akiko Yoshinaga / Yomiuri Shimbun Staff Writer
Riikka Pahkala, a former primary school teacher in Finland, recently published an arithmetic drill book for Japanese children in the lower grades of primary school.
The book contains techniques commonly used for teaching arithmetic in Finland, which has been ranked top in the world in the Program for International Student Assessment that is compiled every three years for 15-year-olds by the Organization for Economic Cooperation and Development since 2000.
“Rikka-sensei no Tanoshii Sansu–Tashizan, Hikizan” (Ms. Riikka’s Enjoyable Arithmetic–Addition and Subtraction) contains basic arithmetic taught in the first to the third grades in Japanese primary schools, including addition and subtraction from zero to 100, how to compare the size of figures and how to distinguish even and odd numbers.
The book aims to entertain as it educates. For example, one practice exercise suggests children collect 100 1 yen coins, grains of rice or pieces of candy to concretely grasp the concept of the number. It is illustrated by a popular Finnish artist.
The goal is for children to understand arithmetic as it relates to real life. One question asks: You are planning a party for 10 people, but you have only seven cups and six pieces of cake. How many cups and pieces of cake are you short? Another question is: There are 15 toy cars at a toy shop. If you buy six toy cars as gifts for your friends, how many cars will be left in the shop?
Pahkalas book contains activities such as this one titled let's wipe out pirates
Pahkalas book contains activities such as this one titled let
According to the 2006 PISA survey, Finland was ranked second in applied mathematical skills (Japan was ranked 10th); was top in applied science skills (Japan was 6th); and second in reading (Japan was 15th).
Pahkala, 39, taught for 10 years at a primary school in Finland and obtained a license for special needs education from Helsinki University. Since her husband was transferred to Japan three years ago, she has been living here with her son, 11, and daughter, 6, and sometimes holds lectures and writes about Finnish education.
When Pahkala was a teacher, she held supplementary after-school classes for students who had trouble keeping up with the rest of the class and she checked their progress through e-mail with their parents. In teaching arithmetic, she says she tries to connect it with children’s daily life.
“When I taught what a unit is, I showed my students by measuring a liter of juice in the classroom to show them the actual amount of one liter,” she said. “It’s important for kids in lower grades to get a concrete grasp of figures.”
She recommends using the drill book to review what is taught in class. “I want them to gradually gain a good grasp of arithmetic,” she said.
Pahkala is scheduled to give lecture at a primary school in Koriyama, Fukushima Prefecture, on Nov. 7, and plans to exchange ideas with Japanese teachers afterward. “I’d like to learn more about classroom education in Japan,” she said.
The book, published by Gakken Co., is available at bookstores for 1,365 yen including tax.
(Oct. 27, 2008) Yomiuri Shimbun
3 thoughts on “Finnish teacher writes math book for Japanese kids”
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Can a plant based diet provide enough protein?
How much protein do you get on a plant-based diet?
Do plant-based diets lack protein?
Can you get enough protein from plants to build muscle?
What vegetables have more protein than meat?
Why plant based protein is bad?
Animal Proteins Are Complete, But Plant Proteins Are Not
THIS IS IMPORTANT: What do you say to someone who is vegan?
Your body can produce non-essential amino acids. However, it cannot produce essential amino acids, which need to be obtained through your diet. For optimal health, your body needs all the essential amino acids in the right ratios.
Is plant protein hard on your kidneys?
One hypothesis is that the consumption of plant proteins lowers the production of uremic toxins. “These toxins have been implicated in the progression of CKD,” says Beddhu. “They can also contribute to cardiovascular disease, and death in patients with kidney disease.”
What happens if you eat too much plant protein?
How do vegans get B12?
Who needs most protein?
Athletes with high training volumes:
Highly active people, those training more than 3 times per week, CrossFitters, competitive athletes, bodybuilders, anyone who’s doing a lot of glycolytic activity will perform, recovery and feel better on a high protein diet.
How do vegans get all their nutrients?
Vegans can get protein from nuts, peanut butter, seeds, grains, and legumes. Non-animal products like tofu and soymilk also provide protein. Vegans have to consider getting enough “complete proteins.” A complete protein contains all the amino acids your body needs to help maintain your metabolism.
THIS IS IMPORTANT: Quick Answer: Do vegetarians get sick when they eat meat again?
|
Because our bodies are made up of between 55-75% water, it’s essential we care about the quality and amount of water we drink daily. You can test the quality of your water by inviting a local water treatment company to your home. After you receive the results, you’ll better know if you need to treat your water to be ingesting more pure water with the necessary mineral profile for optimal health. More importantly, the most common recommendation is to drink half your body weight in ounces of water per day. Here’s why.
1. It Reduces Fatigue
If you’re feeling tired, there is a good chance you might be dehydrated. Feeling less energized is often the first sign of dehydration because the lack of water causes the heart to work harder and all the other systems of the body work less efficiently.
1. It Improves Mood
Studies show that even a small amount of dehydration can affect your mood and your ability to think clearly. A good indicator that you are well hydrated is a light yellow or clear colored urine. If you are slightly or severely dehydrated you’ll have yellow to dark yellow colored urine.
1. It Minimizes Headaches and Constipation
A huge contributor to headaches and migraines is lack of water consumption. Drinking water when you first feel a headache coming on should take effect immediately. When the body is dehydrated your body will pull moisture from your stools to make up for the lack of hydration and cause you to become constipated. Drinking your daily water intake will aid your digestion and prevent constipation and its associated discomfort.
1. It Aids Healthy Weight Loss
For many reasons changing your water drinking habits is the very first step toward healthy weight loss. Often when we think our body is hungry, the fact is we’re often only thirsty. You’ll find that drinking 1-2 glasses of water before a meal can suppress that false hunger. Drinking water also promotes fat burning and elimination within the body.
1. It Flushes Toxins
Having adequate supply of water within the body let’s the body sweat and release toxins through urine. Water supports proper liver and kidney function, essential filtering organs. If you are predisposed to kidney stones, water dilutes the salts and minerals that form kidney stones. If it’s safe to say water promotes your health, it’s probably safe to say it prevents illness as well. On top of preventing kidney stones and constipation, other illnesses that can be prevented by getting adequate water are bladder infection, asthma, colds, yeast infections, sleep disturbance, skin issues, high blood pressure, heart disease and more.
What If I Just Purchase Bottled Water?
Pitcher Filters
Reverse Osmosis Filtration
Water Distilling At Home
Solid Block Carbon Filters
People may store water for various reasons: in the case of emergency, to avoid shopping more frequently, to use in their garden or to save money spent on store-bought water to name a few. You may have thought that any container will act as enough of a barrier from toxins and bacteria, that if you store it in a cool, dry place and drink it within an allotted time frame the water will always be safe. Here are things you want to know before beginning to store your own water at home.
Water is Best Stored in Certain Plastics
Water bottle companies and rain barrel makers have the right idea when choosing specific plastics to store water safely. The types of plastics are numbered and the safest for water is #1, #2 and #4. To find out if your containers are one of these three plastics, look for the recycling symbol on the bottom and the number inside it that indicates its plastic type. These plastics are polyethylene based and make the best plastics because they are UV-resistant and food grade. Added benefits of some containers can be non-translucent blue, a color that resists the growth of bacteria and light exposure and indicates by color that it’s safe for human consumption.
Furthermore, drinking water is best from glass containers because they contain none of the chemicals or potentially dangerous materials that plastics contain and can be 100% recycled until the end of time. More importantly to some, the container will not contain any flavors from its previous contents.
Water Containers Should Be Stored Away From Chemicals and Off Concrete
Water should be stored in a cool, dry place, but not any cool, dry place will do. The first thought for many is to store their water in the garage where you have an abundance of space for it. This idea is swell, as long as you place your containers atop some wooden planks to keep it off the ground or concrete. The truth about storing your water in plastics, even the safest plastics is that the porous material can leach in any surrounding substances, inside or outside the bottle. The container can absorb oil, gasoline and even components of your concrete. It can also absorb any flavors, scents or components of anything that was ONCE inside the bottle, so putting your water inside an old soda bottle will taint the water with remnants of soda even if you’ve thoroughly cleaned it.
Water Doesn’t Expire
Fortunately for mankind, water does not “go bad” like food does. For peace of mind you can rotate the water or replace it every 6 months or a year, but it is not necessary. As long as you have picked appropriate containers, sealed them properly and kept them from anything that could leach inside through a plastic you will be just fine. In the case of an emergency, there are ways to purify the water again by boiling it or using bleach. Please do your research before consuming any water you might think has been contaminated in the slightest.
Water is an essential to human life and the first thing you might consider when preparing for an emergency or just making daily life run more smoothly for you and your family. The recommendation for emergency water storage is optimally 2 weeks worth and 1 gallon per day kept for each person. For a couple, 1 gallon kept x 2 for 14 days would be 28 gallons of water. The minimum recommendation is three days worth if that seems more plausible for you and your space!
Contaminants in water
Common Water filtration technologies
Types of water filters
Under-sink Water Filter
Whole-house Water Filters
Salt-free water softener
Water filter certification
Water filter costs
6 Reasons to Drink More Water
Water is considered a building block of life and we are regularly told that we need to be drinking more water. Water has many proven benefits beyond simply quenching one’s thirst. In fact, 70% of the human body is water. It makes up 80% of the blood, and over 75% of the brain. Below are the benefits of water;
REASON #1: Aids in weight loss
For those trying to lose weight, they might find drinking water will help them meet their goals. Water helps with weight loss through several ways. For one thing, many people confuse thirst with hunger. Many individuals who drink more water will discover their appetite is not as strong as it was before making eating less easier. Water will also increase one’s metabolism. Not to mention, drinking water as opposed to high-calorie drinks such as soda will cut calories.
REASON #2: Lubrication
Drinking more water can help people with arthritis and other pains find some relief. Water lubricates the cartilage in joints. When the body is not getting the recommended amount of water, the cartilage in joints, which is water-based, thins and cannot protect the joints the way it should. This causes the bones in the joints to run together causing pain.
REASON #3: Assists in Detoxification
Water aids in the process of eliminating and flushing out toxins and bacteria out of the body. This is among the most critical processes the human body does. Detoxification can help the body fight off disease and get rid of chemicals that could over time wear the body down. Even certain types of cancers and many degenerative diseases have been shown to be less common in people who drink the recommended amount of water.
REASON #4: Nourishes the skin
If you have skin problems, water can likely help repair that problem as well. The skin consists of 70% water, and if you do not drink enough of it, you could find that you will have problems with it. Problems include acne and dry skin. Dry skin on its own can cause additional problems, such as eczema, scaling cracking, and infections.
REASON #5: Enhances Mental health
To have the best optimum mental health, water is necessary. The brain is over 75% water, and it has been shown that a person who suffers from chronic dehydration can have neurological problems. The entire nervous system is a series of small waterways. Less water causes those waterways to thicken. The thickening of those waterways is shown to cause of difficulties.
REASON #6: Restore energy
Average person loses nearby 10 glasses of liquid within day (during processes of diaphoresis, respiration, urination and defecation). Even the slightest dehydration can be wrapped by loss of concentration, headaches, irritability and weariness. Water involved in every type of cellular process in your body, and when you’re dehydrated, they all run less efficiently including your metabolism.
Of course, there are many more health benefits proved to be a result of drinking water. Despite all these advantages, it is assumed that 75% of the United States suffer from chronic. Nearly everybody has access to water, now all that has to be done is to drink it.
Many of us belong to the world’s growing bottled bottle consumers group which is a growing billion dollar industry. Actually, bottled water sales are much more than even milk products, juices or coffee sales. As contributors to this industry we have not only resolved to have filtered water in portable small bottles but also increased the gigantic volume of plastic needed to be recycled globally.
In fact, bottled water is having hazardous impact on our environment, health and surroundings. How many of the bottled water is actually natural spring water’ from the Alps or wherever it is claimed to be from? It is more likely to be bottled in a factory that treats water by adding chemicals to sort of clean the water of harmful impurities to make it safe for drinking. Yes, that is the reality. Add more chemicals and bottle that water so that it is drinkable and market it with the picture of natural spring water sources. Let us look at some of the reasons why you need to break your water bottle habit today.
Is Bottled water what it claims to be?
Mostly the tap water and bottled water may have very less variation in terms of its minerals; chemical composition etc. may be lesser chlorine content. Who knows? If not anything else, for a fact the water in that bottle is absorbing the plastic by just being stored in it and that does not sound healthy either. There is no solid evidence to prove the fact that bottled water is healthier or cleaner than tap water in terms of where is sourced from or how it is actually packaged for consumption.
Tap water is way cheaper than bottled water
When you are not even sure about what is actually different in your bottled water when compared to tap water, why would you want to pay for that? So, what is the business strategy of these bottled water companies? They obviously don’t go to natural spring sources and get that water to the plant for treatment with chemicals. Rather, they just use the readily available tap water and bottle that after treating with more chemicals. Yes, it is a profitable idea.
Recycling issues with plastic water bottles
Globally recycling plastic is being considered serious but despite various measures are being taken but, it is not followed consistently. We are all contributing to this plastic waste and pollution by using that bottled water and not bothering about recycling.
Oil is cheaper than bottled water
When considering big branded bottled water, it way more expensive than even oil. So, though convenient it is not a cheaper option to buy bottled water. When considering crude oil prices globally, bottled water comes out as more expensive. Also, noteworthy is the fact that much oil resources are wasted trying to transport bottled water from one location to another.
Bottled water can be hazardous to health
Water stored in the plastic bottles can have hazardous chemicals leeching in to it that then is consumed by buyers not knowing that they are paying for an unsafe product. Many water treatment plants packaging bottled water may not be strictly adhering to safety regulations. Gradually, consumption of bottled water over time can lead to harmful chemicals ingestion and affect our health. On the other hand tap water does not have leeching of harmful chemicals from plastic and is treated to reduce chemical contaminants. BPA or bisphenol A is a chemical in plastic water bottles that can cause serious health concerns over time.
All the above reasons mentioned above should convince you to add an item to your wish list before next Christmas. Install a water filter system in your home and office. Get rid of your plastic bottled water habit for better health and overall benefit of the environment. Your family will have safer and cleaner water at all times and you will do your health a big favor. Get the economical choice of installing an under the sink water filter in your kitchen to begin with or a whole house water filter system on a larger level for better quality of life. Do your part; for your family and the environment as a whole.
|
Science how to write an abstract
Short essay description
The science project abstract gives a brief snapshot of the important aspects of the experiment, including the problem or hypothesis, process, results and conclusion. Science fairs often require abstracts as part of the display. Learn to write a succinct science project abstract to make a positive impression with your presentation. A science project often includes a detailed report or log of data collected throughout the process. In a science fair setting, judges don't have time to read through the long version of the report.
plastic waste recycling business plan in indiatop mba essay ghostwriters service us
Writing an Abstract for Your Research Paper
literature review consultanttop article editor sites camy favorite cricketer essaywrite engineering dissertation
Examples Of Science Paper Abstract : Research in Ecology How to write a scientific paper Title
If you're preparing a research paper or grant proposal, you'll need to know how to write an abstract. Here's a look at what an abstract is and how to write one. An abstract is a concise summary of an experiment or research project. It should be brief -- typically under words. The purpose of the abstract is to summarize the research paper by stating the purpose of the research, the experimental method, the findings, and the conclusions. The format you'll use for the abstract depends on its purpose. If you're writing for a specific publication or a class assignment, you'll probably need to follow specific guidelines.
cheap analysis essay ghostwriting for hire for universityelectrical safety essaybest descriptive essay proofreading websites for phd
How to Write an Abstract for a Scientific Paper
Please give me some tips for writing the abstract for a social sciences or humanities paper. Information on how to structure an abstract are often found for medical and engineering fields, but not for social sciences and humanities. Asked by Ayumu Saito on 05 Oct, The abstract for a humanities or social sciences paper is generally unstructured, that is, it is not divided into specific sections, such as Introduction, Methods, Results, etc.
pay for botany thesis proposal
how to write russianstatistics ghostwriter siteprofessional cheap essay editor servicetype my personal essay on hillary
Last Updated: March 29, References Approved. To create this article, 10 people, some anonymous, worked to edit and improve it over time. There are 14 references cited in this article, which can be found at the bottom of the page. This article has been viewed , times. Learn more
popular bibliography editing site gb
Comments (8)
1. Lil'Myrie M.
Lil'Myrie M. 07.05.2021
2. Luis K.
Luis K. 11.05.2021
Thanks to research my assignment for all help.
3. [MEMRES-38]
Ace H. 12.05.2021
Thanks a lot for your assistance.
4. Randy B.
Randy B. 12.05.2021
My professor received a good paper.
5. Mgdalhomada S.
Mgdalhomada S. 13.05.2021
Plus, Ive told my friends about AcaDemon and received bonus payments from AcaDemon whenever my friends purchased a paper.
6. [MEMRES-68]
Khalifa H. 14.05.2021
Great quality for low price.
7. [MEMRES-78]
Alejandro D. 15.05.2021
Catrinas edits helped my essays become more cohesive and it was a pleasure to talk with Lorna.
8. Theo C.
Theo C. 17.05.2021
Very easy to work with too.
Comment on
|
What are we supposed to know about the art of schermire?
A rare depiction of a moment where the adversary is hit with full strike, in gioco largo. From Angelo Viggiani’s Lo Schermo
Alessandro Citolini was a 16th century man-of-letters, was a proponent of the Italian language keen on defending the lingua volgare, by composing an alphabet and grammatical descriptions for the Italian language, which remained unpublished, and publishing a work on the subject in 1540. His other published work, the La Tipocosmia (‘Type of the world’, published 1561) is an over five-hundred page work describing various subjects in a brief, catalog-like fashion. The reason why we are interested in Citolini’s work is his possible – though at this point completely speculative – connection to Camillo Agrippa through Annibale Caro. And not just that, but also the fact that Citolini’s type of world includes the type of swordplay as well.
One would wish for a more extensive description on the subject, but we have to be happy to see the little that Citolini gives us. To be honest, I wished any modern encyclopedia would go even this deep in describing the subject. Citolini may not have been a swordsman, but his description follows a familiar theme set also by the men better versed in the subject. Citolini tells us, that in the art of fencing you will see
“…the master, a fencer, a sword, bucklers, the edge of the buckler, gloves, the fencing, and here will be the wide play and narrow, play of the sword, and buckler, of sword and target, of sword and cape, of sword and dagger, of sword alone, of dagger alone, of sword in two hands, of the half-sword, of polearms, and then touching false edge with false edge, true edge with true edge, doing an assault, or two, or more, going to grips, disarming the weapon from hand.”
This listing details many of the terms that are commonly used in the works of Manciolino, Marozzo and the anonymous manuscript. almost as if the entire listing was a summary of the chapters of Achille Marozzo’s Opera Nova. There is also the division that in fencing there will be the *gioco largo*and then the gioco stretto – the wide and narrow play. This division can be found in almost all of the Italian works on swordsmanship starting from Fiore dei Liberi and traversing through Vadi and the Bolognese texts to a few 17th century texts. Regardless of their frequency, their meaning is still the subject of ongoing research and debate.
It is understandable the Citolini doesn’t go into too much detail in describing any of these terms, or words, since the scope of his work seems to be limited to listing expressions that are common among the discussion of a given subject. Looking at the works that are specific to swordplay in nature, we might expect to find more detailed definitions. In the case of the stretto and largo we are unfortunately still without a definite explanation. On the other hand, we have a few places where some attributes of these are clearly defined, and from the examples and pictorial evidence we can interpret a few more conditions that need to apply in each – in fact – we do know what these terms mean, as in the end they are simply words of the Italian language that have their equivalents in English, they are common language and not necessarily technical jargon enclosing the secrets of the art. Largo is wide and stretto is narrow. The distance between the combatants can be narrow or wide, the distance of the swords’ points from the opponent’s person can be wide and narrow. The techniques can be executed wide and they can be executed narrow, and every time one is operating close to the opponent they are obviously stretto. And this is all true, and possible to document from the sources.
What is the big question then? What do we not know? It is sometimes a bit surprising to see some things defined very carefully in the sources, such as some of the strikes, their angles, some of the guards or some of the footwork is sometimes very specifically detailed, especially in the 16th century works. Basically all of the 16th century works begin by defining the two most important aspects of the weapon, its division into the true edge facing away and the false edge facing towards the wielder. Shouldn’t that be obvious? Does it need to be repeated every time, even if all masters agree on the subject (one of the few such things!). Still, notice that I as well decided to define the terms above as well, even if I expect most of you reading this to be familiar with them.
It is easy to get the feeling that some terms and concepts are left without enough detail when some others are well documented. We begin to expect the same level of detail on every subject and concept presented. This of course will not be the case in any work that goes beyond the level of detail used by Citolini. For every work there is a target audience, an expected level of knowledge (like the ability to read in the first place) and so on.
Especially in the Bolognese tradition the beginning by defining the two edges may also be a tradition, something that if left out would render the work inadequate and unprofessional in nature. The division to the two edges is the beginning mark of an artful and scientifically trained swordsman since without this – an understanding of the attributes of the weapon – there will be no art nor science of its use. Now this is me speaking, but the masters who defined the art may well have felt the same way. Defining terms like close play and wide play might not have carried such burden upon them, they might have been closer to, for example, speaking of a disarm. There is no need to define what a disarm is.
What we face today is that most of us as individuals and definitely the community as a whole lacks experience, the experience our ancestors had and from which their written legacy is derived. We may be able to recognize close play from wide, and we may be able to discuss them and use the concepts when fencing or teaching. The questions arise when we are trying to (at least I often find myself falling into this pit) find a precise moment, or a precise sequence of actions that leads to one or the other, while there are possible infinite ways and it was never intended that the terms would be used in such a specific manner. Speculation, yes, and the absence of evidence is not evidence of absence of such use of the terms, but in the light of the evidence we have, we can summarize that gioco largo precedes gioco stretto, both in terms of time and measure. We can also see that gioco stretto involves the point of the sword being towards the opponent.
This is the order of their presentation in Fiore dei Liberi’s Fior di Battaglia, and the anonymous follows the same order. The anonymous is also clear in describing how the narrow play requires the point of the sword to stay in presence, directed towards the opponent’s hand or person, and this is accomplished by using mezzi colpi, half strikes that do not go past the guardie strette, positions where the swords point is fixed toward the opponent, and that these strikes are used when close to the enemy and not far. In Fiore, we can clearly see that his giochi stretti are done by enterin so near the opponent that the point of his sword is no longer a threat.
On the contrary, the wide play is, according to the anonymous, ‘very graceful and beautiful to watch, it pleases infinite men, and its play is more beautiful and more charming than that of narrow play’. Further, ‘…in two ways are the strikes of the sword given, in wide or in narrow play. Every swordsman needs to make sure to learn both; as much to esteem honor as to one’s life. Although wide strikes are done with praise, nevertheless being narrow to the adversary due to ignorance of their secret properties, one will be forced to retreat backwards. Not only will this turn all the favors to the adversary, not only will a great shame sting the heart…’ and almost in the same vein, Antonio Manciolino concludes about the lack of skills in stretto, that ‘…being forced with shame and danger to retreat backwards often gives the victory to the hand of his enemy or at least showing to the spectators his ignorance of the art.’
This is by no means all that is said about the subject in the source literature, and more detailed analysis can be done and would certainly serve the community. We arrive to these terms in other places as well, the stretto, for example refers to ‘close’, or ‘narrow’ as described above. It is therefore not surprising to find Fiore using the word at times when he is discussing the work done with a dagger or unarmed against a dagger. Likewise the Bolognese have a type of plays they call stretti di mezza spada, which Jherek Swanger aptly translates as the “straits of the half-sword”. In these plays the swordsmen and their swords are defined to be similar, or equal, with the blades ‘kissing each other’ and waiting for one of the players to begin to act first.
Again it is not the definition that causes debate, it is not a challenge to place the combatants in the same position so that their swords are touching each other. Even the actions themselves are not always difficult, rather they are simple with a few exceptions that are harder to figure out (the reason for this being the mentioned lack of experience). The question is about in what circumstances would one get into this situation, what leads to a position of crossed swords with similar position between both players?
If you read my translation of Citolini carefully, you will have noticed that the half-sword was mentioned in his list. This is indeed the very same mezza spada that he mentions. Clearly it is important, and clearly it is related to the division of the two different plays as we shall see.
Fiore divides majority of his work on the longsword into gioco largo and gioco stretto. No surprise there, but this is not the only division he makes. He divides the largo into to different crossings of the swords, one done to the points of the swords and the other to the middle (mezza spada, about the translation of the word mezza, besides checking out your dictionary, see for example this pdf). As stated elsewhere in the Pisani-Dossi version of Fior di Battaglia, Fiore divides the sword blade into punta, mezza and tutta, respectively the point (first third from the point towards cross-guard), the middle and the whole. It is only the crossing at mezza spada that can lead into the stretto, with plays flowing from this crossing in both sections.
The difference between the two is, that as the Bolognese emphasize that the stretti di mezza spada begin from a position of equality, either with the true or the false edges of the swords touching, likewise Fiore shows both combatants in the crossing with their right feet forward, and while it can be argued that one of them is with an advantage there is no textual evidence of this in the description. However, the text clearly states that from that instant either one of the combatants can perform the plays that follow. And this is probably the most important thing in the whole debate.
From the onset, before an engagement of blades, there is basically always one who acts first and the other who responds to this action. From here is derived the division primarily into attack and defense, and further into the Italian concept of tempi, Liechtenauer’s vor, indes and nach, to the three functions of a strike given by Joachim Meyer, to invitations, provocations, feints, parries, counterattacks and beats on blades. Analyzed further, we find that an attack needs to be directed towards the person of the adversary, a parry towards the incoming sword, a feint is an action with the potential of an attack to draw a parry, an invitation is a more passive positioning to encourage an attack, a provocation is a more active positioning or an attack done towards the arm or out of measure to draw an attack and so on. Then there are what the Liechtenauer tradition nowadays call master-strikes or secret strikes, actions that blend together a parry and an attack. The Italian equivalent, would be a counterattack or an attack with opposition.
In all this, there is little evidence of what some suggest as the lead-up to an equal crossing or an equal binding of the swords – a mutual attack done at the same time, to the same target of both attackers. Manciolino may be referring to a situation where this might, with luck, work if you are equally skilled with your opponent and don’t know what to do – probably in the case where you can’t expect your plans to work as the opponent is too likely to know what you are doing. Besides that, I can’t really see much of this going on. How do we then end up into a position of equality?
The thing about equality is that it is not good. It is not good to be equal with your opponent, not equally alive, not equally dead, not equally injured and so on. It doesn’t make sense – what kind of a fencing master would teach his students to look for equality? Sure, in formulating a duel equality may be sought, but in reality it is only sought by the institution. From the moment the *cartello *is issued both parties were quick to start exercising in order to increase their inequality in skill and strength. Likewise, in the defendant’s choice of arms it was not equality that was sought for.
From a position of disadvantage getting into an equal position makes more sense, and while not stated this way in any source that I know of, what is said fits to this model of thinking. In Fiore’s case, the crossing in the largo is done with the left foot in front and it is the following strike that is done with a following pass of the right foot. In stretto, this pass is executed (as the text says), but the swords remain crossed. Why has the defender not struck his adversary already?
Those familiar with Fiore will know that he describes positions or actions that he calls remedies. The definition of a remedy, that he gives in the first remedy shown in his dagger work, is that it is a position in which one is safe from the opponent’s attack and is able to strike him. Following from this, it would seem that after failing to immediately acquire these conditions with the initial parry the defender has had to take his pass in order to establish a position of equality from which to continue – to establish the remedy from a position which may have been enough to keep him safe from the attack, but which did not allow him to return a strike. This is in line with Manciolino, who calls for every defense to be followed by an offence. This is also in line with what was discussed above, that finding yourself narrow with your opponent (his point close to you, the distance between you being close – while not one single definitive thing, I think everybody can formulate an idea of the circumstances), if you don’t know how to play in close you are forced to retreat backwards, and as we saw, that was not advisable (retreating itself is not always inadvisable, as Giovanni dall’Agocchie points out. My personal take on this is that dall’Agocchie is doing his passes back early enough and from a situation of disadvantage, but such that the opponent’s blade is out of presence as well. I will leave this discussion to another time as I do not wish to digress too much, and honestly more detailed look into the retreating needs to be done first.).
What exactly went wrong in the defense is not described in the texts, but the idea of following with something else is referred to in the texts at times.
Getting back to the strette di mezza spada described in the Bolognese tradition we are not described how the circumstances are reached. We have a few examples of what actions precede them in some of the assalti (practice/demonstration forms) and the anonymous has five or so plays which end up ‘finding yourself in mezza spada’, some of them leading up to grabbing the blade and a kick to the groin given in response, but in these as well the instruction seems to be vague, suggesting that it does not matter how you got there, but if you got there this is what you do. Not optimal, but it can happen.
Wrapping up I’d like to remind about how dall’Agocchie criticizes those masters who teach the stretto first and leave out the largo, which would seem to be a reference to what we see in the 17th century with the rapier texts, who start by having the point in line and the point is never to depart. There seems to be a difference in emphasis, even Manciolino refers to how with sharp swords you should only use the low guards (which include in this case the ones with the point in presence), and a great deal of the Bolognese swordplay is done with the points close to the opponent. In terms of tempi as moments to harm the opponent, the most valued was however the one where the opponent’s point had traveled past one’s body, following then with a strike. There is no crossing there at all, but the strike is done freely, and if it is without fear of the opponent’s sword it can be done full, if it is followed by a retreat to a safe distance and the fight is never reduced to grips, not even to a crossing of swords (mezza spada), not even speaking of an equal crossing (gioco stretto, or a stretta), that would fall in the anonymous’ definition of a play graceful and beautiful to watch. But how easy is that accomplish? Will your sword remain free and your person in a safe distance at all times? Can you resist the temptation of hitting your opponent’s sword? Are you brave enough not to try to draw him into a committed attack which you could then parry and hit back in return?
This all brings me back to the mentioning of experience, or the lack of it. If we all had twenty years of fencing behind us, and if we had always had teachers with a life-time of experience, and if we were surrounded by villains, professional soldiers, bodyguards, price-fighters and so on I am sure we would be more versed to see when and how the fight is reduced into grips, when we end up in an equal position and why and how the actions from the stretti are to fit into the bigger picture. I am confident that with further study and with the eventual gaining of this experience the mysteries will be solved, at least insofar that we can create our own ideas of largo and stretto, which are correct in their relevant world, do not contradict the old writings (think how the masters referred to ancient sources as prove to their ideas) and that are beautiful and unique to us – not unlike the way each master chose their way of explaining the difference of the true and the false edge.
In the end I’d like to quote a relevant passage from the anonymous:
“This ingenious art of the sword consists in total of a half-turn of the hand or a full one, but this half or full turn of the hand greatly needs to be accompanied by a half-strike or a full one and, this half or a full strike greatly needs to be accompanied by a half-turn of the body, and this half turn of the body greatly needs to be accompanied by a half pass or a full one, and this half or a full pass greatly needs to be accompanied by a half tempo or a full one, and this half or a full tempo greatly needs agility and dexterity, and these greatly need courage, and this courage greatly needs to be accompanied by judgment, and this judgment can not be if not by the way of experience, that is the mother of all things, and the teaching I give.”
You've successfully subscribed to Marozzo.com!
Great! Sign up succesful.
Welcome back! You've successfully signed in.
Success! Check your email for a login link.
Success! Your billing info is updated.
Billing info update failed.
|
We have a monkey to play “Pong” using only his mind
Neuralink, the secret neuroscience startup co-founded by Elon Musk, has been even quieter than usual these days. In other words, until this week when he came out a YouTube video of a monkey appearing to be playing a classic video game Pong with his mind.
The video stars Pager, a 9-year-old macaque monkey who had a Neuralink implanted on either side of his brain about six weeks previously, according to the narrator. And apparently he likes Pong.
Before learning to play the game with his mind, the researchers first conditioned him to use a joystick, rewarding him with “a delicious banana smoothie” through a straw whenever he moved a slider to the side. the screen on some illuminated squares on a grid.
As he maneuvered the joystick and happily sipped his smoothie, Neuralink devices in his brain recorded his brain activity, monitoring more than 2,000 electrodes implanted in the region of Pager’s motor cortex that controls movement of the hand and arm. Researchers could also interface with devices in real time by pairing their phones via Bluetooth.
This Neuralink data was then fed into a “decoding algorithm” to train it to predict the hand movements predicted by Pager in real time based on which neurons were triggered. After a short period of calibration, the decoder understood Pager’s neural patterns well enough that the joystick was no longer needed. The narrator says that even though he is offline, Pager continues to move the cursor using only his mind. He then seems to be playing a game of so-called MindPong with no joystick in sight.
“A monkey is literally playing a video game telepathically using a brain chip !!” Musk said in a tweet sharing the video Thursday.
Over four million people have watched it since then, and it is currently in the top 10 most popular videos on YouTube. If you are interested, Neuralink also shared a video showing what the raw data looks like behind Pager’s neural activity while he’s busy playing.
Musk then discussed future plans for Neuralink’s devices in a series of tweets, echoing the narrator of the video that the ultimate goal of this technology is to allow paralyzed people to use their computers or phones through their minds.
Initial versions of the device “will allow a paralyzed person to use a smartphone with their mind faster than a person using their thumbs,” Musk wrote. “Later versions will be able to derive signals from Neuralinks from the brain to Neuralinks from motor / sensory neuron groups in the body, allowing, for example, paraplegics to walk again.”
In August, Neuralink showed a live demonstration of the Neuralink implant in action, although on pigs rather than monkeys.
“It’s like a Fitbit in your skull with tiny wires,” Musk said at the time.
Musk a proposed a multitude of sci-fi uses for Neuralink Research since the company launched in 2017. They range from more practical examples like treating brain disorders such as Parkinson’s disease, epilepsy and depression and the aforementioned mobility aid for paralyzed people, to the fantastic , that is to say to can coexist with our possible AI overlords.
However, before that can happen, Neuralink will have to overcome a series of regulatory hurdles if it is to ever have the chance to become a medical device approved for human use. In July, Musk announced that the United States Food and Drug Administration had designated Neuralink as a “Revolutionary apparatus”, a statute that should speed up its federal review process. As much as possible, at least, given the government’s frigid pace for this stuff. It could still be years, if not decades, before we see significant progress on the legal front.
In the meantime, maybe Neuralink can teach Pager to play a few more games with his mind. I think they’re missing out on a huge opportunity if the next one isn’t in the Donkey Kong series. Or even better: Monkey escape.
Source link
Leave a Reply
|
Production and recognition bias of stylistic sentences using a story reading task.
Journal Article
Four experiments examined participants' ability to produce surface characteristics of sentences using an on-line story reading task. Participants read a series of stories in which either all, or the majority of sentences were written in the same "style," or surface form. Twice per story, participants were asked to fill in a blank consistent with the story. For sentences that contained three stylistic regularities, participants imitated either all three characteristics (Experiment 2) or two of the three characteristics (Experiment 1), depending on the proportion of in-style sentences. Participants demonstrated a recognition bias for the read style in an unannounced recognition task. When participants read stories in which the two styles were the dative/double object alternation, participants demonstrated a syntactic priming effect in the cloze task, but no consistent recognition bias in a later recognition test (Experiments 3 and 4).
Full Text
Duke Authors
Cited Authors
• Zervakis, J; Rubin, DC
Published Date
• March 2002
Published By
PubMed ID
• 12022791
|
16. Juli 2020
Let’s Talk Water!
“Citizens, environmental organisations, nature, water-using sectors in the economy all need cleaner rivers and lakes, groundwater and bathing waters." - states the European Commission.
As Austria is part of the EU Water Framework Directive, scientists from Austria have been working tirelessly to keep the open waters clean and safe since the 1970's! One of them is Professor Stephan Hann - analytical chemist from BOKU Vienna with 25 years of experience on water quality management and monitoring.
On our walking tour, Professor Hann shared valuable insights with us. The Donaukanal water derives from the Danube river and takes its unique dark green colour due to high concentration of sediments which are not harmful for living organisms! Since the early 2000's, all wastewater streams connected to the Donaukanal are cleaned before they enter the water and the water is monitored on chemical and microbiological compounds. Donaukanal is not a certified bathing water area, this is why information about the safety of swimming in the Donaukanal is not publicly available.
Certified bathing spots such as Neue & Alte Donau are not as fast-flowing as the Donaukanal and this is why biweekly microbiological testing is technically possible there. Would it be possible to apply the bathing water monitoring model to the waters of the Donaukanal?
Well, the answer is not straightforward - if the Donaukanal becomes a certified bathing spot, for monitoring purposes its flow might need to be regulated.
The story of the Donaukanal resembles that of Swiss rivers more - the fast-flowing waters of Rheine and Aare have long been safe for swimmers due to the successful wastewater cleaning plan implemented by the Swiss governmental structures.
Schwimmverein Donaukanal hopes that with the future development of the Donaukanal, the interests and wishes of swimmers will be taken into consideration. But for now, we enjoy swimming in the refreshing water of the Donaukanal and always keep in mind that after heavy rains, it is best to avoid swimming until the water is cleared out again.
|
In Guyana, members of the Wapichan tribe ride motorbikes along bumpy forest roads, drones tucked safely inside their backpacks. They’re heading toward an illegal gold mining operation on the tribe’s land, where workers are clearing away the rainforest and allowing pollutants to run into the Wapichan’s water sources. The drone team will photograph the site from above, creating a mosaic of aerial photos that can be used to defend the tribe’s land in court. The Wapichan tribe built its own fixed-wing drone in 2014 to patrol its territory from above. Gregor MacLennan, a program director for the nonprofit organization Digital Democracy, and tribe members relied on YouTube videos and online forums to help assemble the drone. While MacLennan brought some tools and electronic components with him to Guyana, most of the drone’s body was improvised from materials in the village. In part, so the drone was repairable with whatever was on hand in the event of damage. The drone features a motor mount made of plastic cut from an old beer crate. Since then, the Wapichan program has acquired a few Parrot Bebop quadcopters. And the program has already shown some results: In 2015, a Wapichan drone team spotted an illegal logging operation on the Brazilian border, where settlers often encroach. They also found evidence that the Marudi Mountain gold mine was leaking pollution into Wapichan water sources.
United Nations (U.N.) program Reducing Emissions from Deforestation and Forest Degradation, or UN-REDD.
‘Forensic architecture’ is the name of an emergent academic field we have developed at Goldsmiths. It refers to the production and presentation of architectural evidence—relating to buildings, urban environments—within legal and political processes.
== AI indigenous Content/Resilience == INDIGENOUS AI Indigenous Protocol and Artificial Intelligence Working Group The working group is interested the following questions:
From an Indigenous perspective, what should our relationship with A.I. be? How can Indigenous epistemologies and ontologies contribute to the global conversation regarding society and A.I.? How do we broaden discussions regarding the role of technology in society beyond the largely culturally homogeneous research labs and Silicon Valley startup culture? How do we imagine a future with A.I. that contributes to the flourishing of all humans and non-humans?
Retrieved from ""
|
• Entry
• Reader's guide
• Entries A-Z
• Subject index
One of the fundamental aspects of cognitive development is the acquisition of causal knowledge. Understanding both formal and folk scientific principles involves appreciating the underlying causal structure of the environment and navigating the inferences that knowledge supports. Adults’ knowledge and reasoning is extremely facile; they make predictions, generate explanations, and reason counterfactually. How do children acquire these causal reasoning capacities and the causal knowledge adults possess? This entry provides a road map of the theoretical landscape for answers to these questions, considers the role of various processes that affect causal reasoning, and examines some specific developmental trajectories, focusing on how they relate to scientific reasoning.
Theoretical Landscape
One general approach for causal learning and reasoning is that children possess innate predispositions for domain-specific causal knowledge that allow ...
• Loading...
locked icon
Sign in to access this content
Get a 30 day FREE TRIAL
• Read modern, diverse business cases
• Explore hundreds of books and reference titles
|
Loyalty to Family and Nation
Parashat Balak
Rabbi Shmuel Rabinowitz, Rabbi of the Western Wall and Holy Sites
This week’s Torah portion, Balak, is almost completely about seeing the Jewish nation from the outside.
Loyalty to Family and Nation
It describes Balak, the Moabite king who lives on the eastern side of the Jordan, who fears the Israelites encamped opposite his land. This fear leads him to a famous sorcerer named Balaam who lives in Mesopotamia. After a double negotiation, Balaam agrees to go with Balak’s emissaries in order to curse the Jewish nation. On the way, Balaam has a unique experience with a talking donkey who admonishes him for his deeds. At the end, Balaam arrives in Moab, stands on the mountain, and looks out onto the plain where the Israelites are camped. He tries to curse the nation from the top of the mountain, but surprisingly, the words that come out of his mouth are words of blessing and praise.
The end of the parasha is much less pleasant. It tells us about the nation that was seduced by the daughters of Moab and of the plague that spread through the nation. The reader can’t help but ask himself if there is a connection between the stories. We will see the answer to this question only in two weeks, in Parashat Matot, where we hear Moses say who it was who advised Moab to use the weapon of sexual temptation. It was no other than Balaam himself.
If we listen to Balaam’s words, we can understand his devilish scheme. Balaam understood what the Jewish nation’s unique qualities were and it was those he tried to harm.
When Balaam was at the top of that mountain looking out at the Jewish nation camped in the valley, he expressed his wonderment:
(Numbers 24, 5)
What was Balaam so amazed by when he saw the tents in the Israelites’ camp? The great commentator, Rashi, explains this based on the words of the midrash: “For he saw that the entrances were not facing each other”. Balaam noticed the norms of modesty that were customary in the Jewish nation. He saw that each family made sure not to look into the tent of its neighbor, and he appreciated this. He understood that family values require effort, and he understood that marriage requires effort, restraint, and loyalty.
Balaam noticed something else as well. He defined the Jewish nation with the following sentence:
“…it is a nation that will dwell alone, and will not be reckoned among the nations”
(Ibid 23, 9)
Balaam noticed not only the loyalty exhibited in a marriage or a family, but also that which was national – cultural loyalty. He understood that the value that was the foundation of the Jewish people is loyalty to its unique traditions and values. We know that Balaam was right, because thousands of years after him, we can look back on the history of the Jewish nation. Indeed, the Jews have been amazingly loyal to their values. The Jewish nation that was dispersed all around the world remained the eternal nation due to its values and traditions.
Balaam maliciously tried to destroy the values of modesty and the national uniqueness of the Jewish people. When he saw that he wasn’t able to curse them, he advised the king of Moab to send Moabite girls to seduce the Israelites into promiscuity and idol worship. Balaam discovered the nation’s weak point in that moment in time and tried to destroy its values of morality and faith in this despicable manner.
And we have to admit that Balaam was right. Preserving the values of modesty and family and being careful not to assimilate has protected the Jewish nation for generations. Nowadays, it’s even harder. At a time when permissiveness prevails and values that were clear-cut are now ambiguous, it becomes harder to preserve these values. But if we remember that our very national and cultural existence depends on this, we can have the fortitude to face these challenges, draw courage from the glorious heritage of our forefathers, and bequeath this heritage to future generations.
Today October 26, 2021
End of prayer time:
Mid day:
Loyalty to Family and Nation
Send a Note
Interesting Facts
Loyalty to Family and Nation
Parasha of the Week
Notice for Women's Section in Tunnels
Event Calendar
19 Heshvan 5782
October 25, 2021
15 Heshvan 5782
October 21, 2021
11 Heshvan 5782
October 17, 2021
28 Tishri 5782
October 4, 2021
נא בדוק את החיבור שלך לאינטרנט
Book a tour
Skip to content
|
You inherit gene from your organic parents in certain ways. Among the methods is called autosomal recessive inheritance.
What is autosomal recessive inheritance?
Autosomal recessive inheritance way that the gene in question is situated on one of the autosomes. These space numbered pairs of chromosomes, 1 through 22. Autosomes don"t impact an offspring"s gender. "Recessive" method that 2 nonworking duplicates of the gene are important to have actually the properties or disorder. One is inherited from the mother, and 1 indigenous the father. If you have actually only 1 recessive gene, you are a "carrier" for the properties or disease, however you execute not have any type of health difficulties from "carrying" 1 copy that the gene. Most people don"t understand they lug a recessive gene because that a condition until they have a child with the disease, or castle have an additional family member with the disease. It"s approximated that all world carry about 5 or more recessive genes that cause genetic diseases or conditions. When parents have had actually a child with a recessive characteristics or disease, there is a 1 the end of 4, or 25%, opportunity that, with each succeeding pregnancy, an additional child will be born with the very same trait or disorder. This means that there is a 3 out of 4, or 75%, chance that one more child will not have actually the properties or disease.
Genetic illustration demonstrating autosomal recessive inheritance
What space autosomal recessive disorders?
Mutations (or transforms in the DNA) have arisen over time in different parts of the world. Everyone can carry any type of recessive gene. However, specific ethnic teams are much more likely to carry details recessive genes due to the fact that of where the mutation originated. For example, the gene that reasons Tay-Sachs condition is frequently found in world of Ashkenazi Jewish descent. This populace is from eastern Europe, wherein experts think the mutation originated. The condition also affects those who space not of Ashkenazi Jewish descent.
What are several of the different varieties of autosomal recessive disorders?
Examples that autosomal recessive disorders include cystic fibrosis, sickle cell anemia, and Tay-Sachs disease.
Cystic fibrosis
Cystic fibrosis (CF) is a common, inherited, single-gene disorder mainly discovered in Caucasians. People through CF create abnormally thick and also sticky mucus the can damages body organs. The mucus interrupts the function of an essential organs, particularly the lungs, and also leads come chronic infections. CF also involves the pancreas and also causes diminished absorption of vital nutrients and can cause reproductive mechanism damage. With boosted treatment and management of the disease, influenced people may live well right into adulthood. Ultimately, fatality most often occurs from respiratory failure. Other civilization with variants of CF may have actually only lung involvement, sinusitis, or infertility.
Sickle cabinet anemia
Sickle cabinet anemia is another common, inherited, single-gene disorder uncovered mostly in african Americans. About 1 in 500 African-American babies is born through sickle cell anemia. About 1 in 12 african Americans carries the gene because that this disease. Sickle cell an illness involves the hemoglobin in the red blood cells and also their ability to lug oxygen. Normal red blood cells room smooth, round, and also flexible, prefer the letter "O." They have the right to easily move with the ship in ours bodies. Sickle cells space stiff and sticky. When they shed their oxygen, they form into the shape of a sickle, or the letter "C." these sickle cells have tendency to cluster together and also can"t quickly move through the blood vessels. The cluster causes a blockage and stops the activity of healthy, normal, oxygen-carrying blood. This blockage is what reasons the painful and also damaging symptom of sickle cell disease.
Sickle cell live only for around 15 days. Common hemoglobin cells have the right to live approximately 120 days. Sickle cells danger being destroyed by the spleen since of their shape and also stiffness. The spleen helps filter the blood of infections. Sickle cells acquire "stuck" in this filter and die. As result of the decreased variety of hemoglobin cell circulating in the body, a person with sickle cabinet is chronically anemic. The spleen additionally suffers damages from the sickle cells, which block the healthy oxygen-carrying cells. After repetitive blockages, the spleen is very little and walk not occupational properly. Without a functioning spleen, these civilization are an ext at threat for infections. Infants and young children are at danger for life-threatening infections. Treatment contains prompt emergency care for fevers and also infections, suitable vaccinations, penicillin, and management of anemia.
Tay-Sachs disease
Tay-Sachs condition is a deadly disorder in children (usually by period 5) that causes a progressive degeneration the the central nervous system. It is brought about by the lack of an enzyme called hexosaminidase A (or hex A). There is no hex A, a fat substance build up on the nerve cells in the body, an especially the brain. The process begins early on in pregnancy when the infant is developing. It is not evident until numerous months after ~ the birth.
You are watching: Is sickle cell anemia sex linked
See more: Chaos Essence :: Dark And Light Chaos Essence, Chaos Essence
Come date, there is no cure because that Tay-Sachs. About 1 in 27 persons of europe Ashkenazi Jewish ancestry carries the Tay-Sachs gene.
|
Skip to main content
When the Going Gets Tough, the Tough Get Going
Almost everyone, at least in America, has heard the motto “When the going gets tough, the tough get going.”
It’s an inspirational phrase attributed to American football as a coaching mantra to motivate the players. That phrase has been traced back to the 1950s and although it supposedly began on a football field in Texas, it has been adopted by other team sports as well as other sectors of society, including business settings.
Certainly 2020 started out as a challenging year and nothing has eased in 2021.
Since initial reports surfaced in early 2020, alerting the public about the hazards of COVID-19, practically everyone’s world has been turned upside down on a global scale.
Yet, administrators, staff and Directors at AVEK managed to keep operations going for the past 18 months, armed with the knowledge that water is a basic necessity for humans, animals and plants.
A community without water becomes a ghost town.
Households cannot function without the natural resource. Farms cannot survive because most crops would wither and farm animals would perish. All businesses, from manufacturing to medical offices and clinics to brick-and-mortar stores would be forced to close their doors..
It’s been a difficult time for everyone, beginning with the pandemic, and now coping with an historic drought – one so severe that the last instance occurred more than a century ago.
The drought situation is so grim that the U.S. Congress has been conducting meetings and hearings dedicated to finding solutions while assessing the most vulnerable communities in the nation, with a watchful eye on the western states, and specifically California.
Not only does drought threaten water supplies needed for everyday use, but it also endangers parched lands with dried vegetation, making areas like the Antelope Valley susceptible to wildfires and this Valley has definitely seen its share of scorched trees and blazing mountainsides.
Everyone at AVEK has gone above and beyond their duty to ensure Agency operations run smoothly under the harshest of circumstances.
Because you know the value of water and what it would mean if shortages disrupted the local quality of life, you can set an example as conscientious stewards of the land by adhering to useful water conservation practices. Your friends, family and neighbors can observe the methods you implement, and they just might copy what they see.
Yes, times are tough. But remember, “when the going gets tough, the tough get going.” And that means you.
May contain: plot
Join our mailing list
|
Gardening features from Crocus.co.uk - Umbelliferas
Everyone's in love with frothy planting these days, light and airy concoctions that seem to float through the border like a soft summer breeze. Many of these gauzy beauties are umbellifers, members of the cow parsley tribe. They are blessed with tiny flowers held on domed heads, which are suspended on fine strands that splay out to form open umbrellas. Hence their name.
Good in a Natural Garden
Early-flowering umbellifers tend to have white, or green, or cool-pink flowers and because each individual flower is very tiny they attract hoverflies and flies rather than bees. Hoverflies are mostly advantageous to gardeners because an adult female will lay a single oval egg near aphid colonies. Their larvae, which often resemble translucent maggots, will munch away at the aphids - helping to rid the garden of these annoying pests. Flies are also useful in the garden too: they hone in on green flowers which are largely ignored by other insects, and make excellent pollinators. Most umbellifers are tap-rooted, so tolerate drought once the root gets into the soil - and like all tap-rooted plants, they prefer poorer soils.
Early Season Froth
The earliest of all is our common cow parsley or Queen Anne’s lace, Anthriscus sylvestris, so often seen straddling roadside verges. The refined garden form, ‘Ravenswing’ has dark ferny leaves underpinning tiny white sprays of flower. It enjoys a little shade, not full sun, and the dark stems reach up to 120cm in good soil (4'). It will self seed unless cut down, so generally it’s best grown in a wilder woodland setting as it can have a habit of embedding itself into nearby plants. When it sets seed it will do a 50/50 split. Half the seedlings will come true and show their dark-purple leaves early on. The other half will revert to a wilding and display dark-green lacy foliage. Purists should weed the all-green ones out, or deadhead before seed is set. A more lacy white umbellifer and also a true perennial is the Baltic cow parsley (Cenolophium denudatum). It was dubbed the Chelsea Cow Parsley because it has been used by so many top designers, most famously Tom Stuart-Smith.
Two other umbellifers flower at the same time, and both have cool-pink frothy flowers that could pick up the colour of pink Daphnes or pink montana clematis. Chaerophyllum hirsutum ‘Roseum’ is a pink form of hairy chervil with soft apple-scented foliage. Most umbellifers are edible, although some (like Hemlock) are notoriously deadly. Many are grown for their edible roots or aromatic leaves including carrots, parsnips, sweet Florence fennel, dill, caraway and sweet cicely. Chaerophyllum is easy in a variety of soils and it will thrive in shade or sun, but Pimpinella major ‘Rosea‘ will need a damp patch as it does very poorly in dry positions. It’s happiest in shade and will flower for weeks, looking especially fine close to dark, Cimicifuga foliage such as shade-loving Actaea simplex Atropurpurea Group. This statuesque bugbane has tiered, dark ferny foliage, but doesn’t produce its bottlebrush flowers until late-August.
Statuesque and Architectural
Angelica archangelica, a tall branching sculptural plant topped with rounded umbels of green flower, is happy in a dank corner. It’s supposed to be in flower for first feast day of Saint Michael the Archangel on May 8th, and it often is following a warm spring. It will reach man-height or taller and takes up room, so it’s not for the small plot - and it’s an irreverent self-seeder despite its holy connections. Don’t leave it to smother your garden, but do collect some of the large seeds, because this biennial dies after flowering.
A. archangelica was introduced into Europe in the 16th century and grown for its medicinal and magical properties. It was considered an aphrodisiac, an antidote to poisons, a safeguard against the plague and a protection against witches. The candied stems and roots are still used in various culinary ways - including giving the characteristic flavour to Benedictine. Its Korean cousin, Angelica gigas, bears dark sultry flowers. However it does need warmth and doesn’t flourish in cold gardens. In its native land it is grown by the field-full - as an aphrodisiac.
Positively Aromatic
Many umbellifers have aromatic foliage, a sign that they’re sun lovers. The feathery foliage of fennel smells of aniseed on hot days. Common fennel, Foeniculum vulgare, comes in a green-leaved form, but it’s the bronze-leaved beauty (Foeniculum vulgare 'Giant Bronze') that wins all the plaudits. Both are long lived, very hardy and at their best for foliage in May. They can both be raised from seed.
Find a Hot Spot
Common fennel shouldn’t be confused with the enormous Giant fennel (Ferula communis) which produces a rosette of curly dark-green foliage early in the year before sending up an enormous spike containing many euphorbia-yellow flowers, usually following a warm spell. This Mediterranean plant, although very hardy, loves an arid hotspot. If happy it will top 3m (10ft) and will need staking when it flowers to stop it tumbling over. It looks tremendous behind tall, fiery Crocosmias (such as ‘Lucifer’) and one of its parents C. masoniorum.
Two other umbellifers also like the heat. Seseli gummifera, which oozes a sticky fluid when the stems are damaged, is a biennial with finely divided glaucous foliage that curls over the ground like a puff of smoke. The flowers are white and form globular spheres giving this plant the name of Moon carrot. It’s native to the Crimea, but will only do well in warm positions.
The lax perennial Mathiasella bupleuroides ‘Green Dream’ (made popular by Crocus at Chelsea in 2007) also needs quite a bit of warmth in order to survive winter: the species was collected in sun-baked Mexico in 1954 by an American botanist called Mildred Mathias.
Annual Crowd Pleasers
Umbellifers germinate easily in warm conditions so they are generally sown once the temperatures begin to rise in spring to 50F/12C. However autumn sowing, accomplished in September, gives larger, better established plants. The seeds are pricked out in early spring under glass, with no heat in the same way that sweet peas are. Three good annuals are the glaucous-leaved white lace flower, Orlaya grandiflora, which actually seems to enjoy some shade. Of the two forms of Ammi, the most well known is Ammi majus, often called the Bishop’s Flower. This tall billowing white umbellifer has great charm and it makes a good, frothy cut flower used with sweet peas and other annuals. Ammi visnaga is shorter and more-erect and rather like our wild carrot with heads that curl up as they green and age. When sowing umbellifers with large seeds place them into the compost vertically, not flat, as they are less likely to rot.
Umbellifers in Disguise
Not all umbellifers form an open umbel. Astrantias and Eryngiums are also umbels, with tighter flowers.
|
BMI: A quality indicator of health?
Body Mass Index (BMI) is something that all health and wellness fields have used over the years. It's a measure of body fat based on your height and weight. Click here to get your number and see where you stand on the chart. We'll go over what this method is best used as and if it's really an accurate indicator for peoples level of health. Spoiler- it's NOT. Like many other methods in health and wellness the results are not end all be all.
Here are the placements for your BMI Calculator results:
Underweight BMI Under 18.5
"Normal" BMI is 18.5-25
Overweight BMI is 25-30
Obese BMI is over 30
I don't think they really use it anymore but there was an old fashioned chart that you'd slide your fingers up and down for your weight and left and right at the top for your age. Similar to navigating a map. Once you got your correct numbers you'd slide your fingers to meet results from your selection.
Initially this was a method used by insurance companies to give you rates. How your health and body was for longevity. That doesn't seem like a proper method for the every day person who may be trying to get their health in order.
So, here we go. How accurate is BMI on indicating our level of health? As with most measures BMI isn't the perfect test. Lets take my body for example. I have a higher muscle mass for my size (circumstances like being a child, greater muscle mass, pregnancy, skewed ranges of h can throw the numbers off) so results are going to be skewed for myself. At 5ft 7 in and 170 lbs. my BMI is at 26.6. That puts me in the overweight category- but we know that the result is thrown off because I'm heavier than someone my size who doesn't have as much muscle mass as me. Someone with high visceral fat (stomach fat), same weight and height as me with the 26.6 would be more of a concern right? Not so fast. Yes, people who are overweight/obese may be more susceptible to health risks but there have been studies recently on people who are metabolically healthy obese candidates. This means that they are overweight or obese but there is little to no evidence of metabolic dysfunction- Low liver and visceral fat content, insulin levels functioning properly and great cardiovascular health.
What is BMI good for?
When it comes down to it, I'm not really sure to be honest. I suppose if you take all outside circumstances into consideration (extra muscle, pregnancy, weight loss/elderly) then the results can prove to be accurate. However, that doesn't seem to be the way folks are using it. Instead, using the final number to dictate their level of health without any sort of true knowledge on if it's accurate.
What you SHOULD do with your BMI result:
Throw them out the window I guess! On a serious note- If you have an unusual number that seems high and may concern you, remember that the number doesn't factor in all your circumstances. Go to your primary physician and ask questions. Never hesitate to ask questions so you can learn more about your health status and how to take care of yourself.
The American Cancer Association said:
Featured Posts
Recent Posts
Search By Tags
Follow Us
• Facebook Basic Square
• Twitter Basic Square
• Google+ Basic Square
|
New battery technology
Researchers from Imperial College London and their European partners, including Volvo Car Corporation, are developing a prototype material which can store and discharge electrical energy and which is also strong and lightweight enough to be used for car parts.
Ultimately, they expect that this material could be used in hybrid petrol or electric vehicles to make them lighter, more compact and more energy efficient, enabling drivers to travel for longer distances before needing to recharge their cars.
In the new project, the scientists are planning to develop the composite material so that it can be used to replace the metal flooring in the car boot, called the wheel well, which holds the spare wheel. Volvo is investigating the possibility of fitting this wheel well component into prototype cars for testing purposes.
The team says replacing a metal wheel well with a composite one could enable Volvo to reduce the number of batteries needed to power the electric motor. They believe this could lead to a 15 per cent reduction in the car’s overall weight, which should significantly improve the range of future hybrid cars.
Current hybrid cars consist of an internal combustion engine, which is used when the driver accelerates the car, and an electric motor powered by batteries, which turns on when the car is cruising. The cars need a large number of batteries to power the electric motor, which makes the vehicle heavier, meaning that the car uses up more energy and the batteries need regular recharging at short intervals.
For the first stage of the project, the scientists are planning to further develop their composite material so that it can store more energy. The team will improve the material’s mechanical properties by growing carbon nanotubes on the surface of the carbon fibres, which should also increase the surface area of the material, which would improve its capacity to store more energy.
They are also planning to investigate the most effective method for manufacturing the composite material at an industrial level.
The 3-year European Union funded project includes researchers from the Departments of Chemistry, Aeronautics and Chemical Engineering and Chemical Technology at Imperial College London. European academic and industrial partners include Swerea SICOMP, INASCO Hella, Chalmers, Advanced Composites Group, Nanocyl, Volvo Car Corporation, Bundesanstalt Fur Materialforschung undprufung, ETC Battery and Fuel Cells Sweden.
|
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
Revision notes - Causes of the French Revolution and the Development of the Revolution and the consequences of the Revolution.
Extracts from this document...
The French Revolution (1789) & Vienna Congress (1814/15) * Causes of the French Revolution and the Development of the Revolution and the consequences of the Revolution. * Napoleon Bonaparte * Rise to power * Reforms - Domestic policies * Napoleonic wars What is the French Revolution? It was a war against the absolute monarchy. The French Revolution was not one political movement which was planned and directed by a political party unlike the October revolution. This revolution was a series of development that happened period of time that started from 1789 to 95, which led to the end of the feudal institution and the way that politic was organized for centuries. This revolution was based on certain ideas which directly challenged the ideas of medieval period. Ancien Regime The organization of government and society in France before the revolution is commonly known as the ancien regime, old system. This was a feudal structure based on the medieval idea of hierarchical society, with the king at the top and his subjects in their own place according to their duties, and birth, beneath. Institutions of the Ancien Regime The Monarchy The king in France was the head of the state and ruled as an absolute monarch which meant his power was unlimited. His decision was final and had the right to imprison any one. The legitimacy of his rule originated from the medieval idea of Divine Right which was granted by the religious institution, the church. It was believed that he was the God's representative and his rights cannot be questioned. In this social organization, the political class and the religious institution went hand in hand and enjoyed all the privileges. ...read more.
Parlement Calonne's successor Brienne did nothing more than produce a slightly amended version of Calonne's plan which was no more successful in winning support. The assembly was consequently dissolved in May. Brienne then took out new loan at very high rate of interest and attempted to force his proposals through by presenting them directly to the parlements. The Paris Parlement which spoke for the provincial parlements, remained hostile to the land tax reform. It decreed that it lacked the authority to sanction his change and refused to register necessary edicts. As one last attempt to force the parlements accept the proposal: he sent Paris parlement into exile in August, 1787. The royal action merely brought renewed demonstrations of support for the parlement and the king was force to allow the members to return to the city. As news spread of parlement's stand against unfettered absolutism, supportive crowds gathered in the capital. Its legitimacy slipping away, the crown resorted to using force against the demonstrators leading to more tension. As the tension escalated, so too did calls for the Estate General. The parlementary rebellion spread to parlements through our country. In May 1788, Paris parlements made it clear that Estate General ws the only legal body to sanction any permanent taxation. By summer of 1788, the treasury was almost empty, and the king had no option but to convene the Estate General. The Estate General was a political body to which the three estates sent their representatives. On 5th May 1789, Louis XVI convened the Estate General in the great hall at the king's Palace of Versailles. There were 561 deputies for the first two estates and 578 deputies for the third estate. ...read more.
On 14th July, the Parisian crowd seized muskets and cannons from a weapon store, but could not find enough gunpowder or cartridges to use them. Rumor quickly spread that there might be stores of gunpowder in the old fortress of Bastille. The crowd accompanied by some of the newly formed National Guard gathered at Bastille in search of ammunition. After a tense standoff, a full scale assault took place in which the governor of Bastille Launay was captured, decapitated and his head paraded on a pole around the streets of Paris. Fall of Bastille was a significant mile stone of the revolution. It was stormed for the ammunition and from this came the destruction of a symbol of arbitrary power of the king. What is more, the royal troops had merely stood by some defecting to the crowds. There was now no denying that the king had lost control. Until early 1789, the peasants had played little part in the events leading to the revolution. However, the catastrophic harvest of 1788, the escalating bread prices, and the lay-offs in the textile industry affected them. Food riots were not new and would probably have died out but for the events in Paris. The news of the storming of the Bastille encouraged the peasants rioting against taxes and feudal dues. In this situation of unrest and uncertainty, rumors spread from village to village that the lords of the manors had hired bands of brigands who were on their way to destroy the ripe crops. Caught in a frenzy of fear, peasants in several districts seized hoes and peach forks and attacked the chateaux. They looted the hoarded grains and burnt down documents containing records of manorial dues. Thus the peasant uprisings grew into what came to be known as the Great Fear, which spread through most of France between 20th July and 6th August. ...read more.
The above preview is unformatted text
Found what you're looking for?
• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month
Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
See related essaysSee related essays
Related International Baccalaureate History essays
1. What were the causes of the French Revolution?
The second cause of the French revolution was the Age of Enlightenment and the writings of the philosophers. During the age of enlightenment philosophers emphasized the use of reason as the best method of learning the truth. For example through the Baron de Montesquieu in his "Lettres Persanes" the philosopher
2. Reign of Terror During the French Revolution
Furthermore, the violence created by the revolutionaries during the Terror was not necessary because it perpetuated more violence and made people suffer. Power and violence should not be confused by being the same thing because power appears when power is in danger.
so he has to draw his sources from other people or sources himself. This entails that the information in this paper that is drawn from his book is indirect and not a primary source. This limits the information on the views of the people during the revolution.
2. Analyse the political causes of the Mexican Revolution of 1910
(Haynes, 220) As Diaz had cynically stated, "A dog with a bone in its mouth neither kills not steals" (Davis, 89). Therefore, Diaz had effectively kept the higher class in his pocket with bribes and political promotions at the expense of the peasantry.
1. Mao and China Revision Guide
the officials of GMD were told that they would not be harmed if they worked for the PRC, but once they provided the young PRC with the necessary continuity of administration, they were persecuted as class enemies (Those reactionaries who refused to accept the new China that the Communist government was creating).
In all of 1861 there were 499 riots which required armed intervention. 2. Peasants could not understand why they were being asked to pay for the land that their families had farmed for generations, according to them it was theirs by right.
1. Notes on the Causes of the American Civil War
After a bitter debate the Proviso passed the HoR. 5. The voting was sectional 6. Every southern Democrat and all but 2 southern Whigs voted it down 7. Senator Toombs from Georgia warned that if it passed congress he would be in favor of disunion 8.
2. Analyse the causes of the Spanish Civil War
The policies he reversed included the state payments restored to the church, and their control of the education and the halting of the land distribution program. This led to Catalonia declaring itself independent, causing a rebellion that was put down, so now the Left was feeling threated of other strikes.
• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to
improve your own work
|
A scientist’s guide to life: how to cope with your period
It’s time to talk about ‘that time of the month’. Menstrual researcher Sally King tackles how to deal with your period.
What’s the biggest myth about periods?
That the menstrual cycle repeats itself regularly every 28 days. This is the average length, but there’s a huge healthy range, from 21 to 40 days, and the length typically varies by two to four days each time. It’s a problem because people whose periods don’t fit into a 28-day pattern can feel like there’s something wrong.
Why do some people get such heavy periods?
Average menstrual blood loss is about 30ml to 45ml, or two to three tablespoons per period, but again there’s a range. Technically, anything over 80ml is considered heavy. It’s thought there is a genetic component. Annoyingly, anaemia can also trigger heavier periods, creating a vicious cycle!
Is it a good idea to track periods with an app?
I think everybody should track their cycle for a while to see what’s normal for them. If you have symptoms, it can help your GP to determine if they are related to your cycle or not, and spot signs of other problems. It’s worth saying that cycle tracking alone is not an effective form of contraception!
Need to know…
1. Don’t worry if your cycle is not 28 days. This is only the average.
2. There’s no need to take a break from the pill if you’re happy with it and doing well.
3. Ibuprofen not only helps with pain of cramps, it can also reduce blood flow.
What things does my menstrual cycle affect that I might not realise?
Many chronic health conditions can be triggered or worsened at certain points in the cycle, including migraine, epilepsy, allergies and food intolerances. Asthmatics may find they are wheezier at certain times in their cycle. These connections are well established in clinical research, but they haven’t yet passed into clinical advice for patients.
What’s the best way to deal with period pain?
Anti-inflammatories, like ibuprofen, really help. Not many people realise this, but the time to start taking ibuprofen is two to four days before you expect to start your period.
If you do this, it not only reduces cramping, it also reduces the amount of blood you lose. This can make a big difference for people with painful, heavy periods. Magnesium supplements can help, as can more traditional approaches like exercise and hot water bottles.
© Sofie Lee
© Sofie Lee
Is it okay to take pill packets back to back to avoid a period?
Yes. It may not always prevent bleeding, but it will reduce it. There’s this idea that if you don’t have a regular bleed that you’re somehow accumulating toxins or hormones. This isn’t true. The lining of the womb just doesn’t build up as much in the first place.
Is it a good idea to take a break from the pill?
If you’re on the pill and doing well, there’s no reason to have a health break. Some people worry that the pill can damage future fertility, but this isn’t true. It can take time to get pregnant after coming off the pill but most people regain their natural cycle after three to four months.
Read more from A scientist’s guide to life:
|
Wuhan InstituteVirology
© Hector Retamal/AFP/Getty Images
Aerial view of Wuhan Institute of Virology
Scientists from Wuhan and the US were planning to create new coronaviruses that did not exist in nature by combining the genetic codes of other viruses, proposals show.
Documents of a grant application submitted to the US Defense Advanced Research Projects Agency (Darpa), leaked last month, reveal that the international team of scientists planned to mix genetic data of closely related strains and grow completely new viruses.
A genetics expert working with the World Health Organisation (WHO), who uncovered the plan after studying the proposals in detail, said that if Sars-CoV-2 had been produced in this way, it would explain why a close match has never been found in nature.
So far the closest naturally occurring virus to Sars-CoV-2 is a strain called Banal-52, which was reported from Laos last month and shares 96.8 per cent of the genome. Yet scientists expect a direct ancestor to be around a 99.98 per cent match - and none has been found so far.
The Darpa proposals, leaked to the pandemic origins analysis group Drastic, show the team had planned to take sequences from naturally occurring coronaviruses and use them to create a brand new sequence that was an average of all the strains.
The grant application, submitted in 2018, states:
"This means that they would take various sequences from similar coronaviruses and create a new sequence that is essentially the average of them. It would be a new virus sequence, not a 100 per cent match to anything.
"Then they put that RNA in a cell and recover the virus from it. This creates a virus that has never existed in nature, with a new 'backbone' that didn't exist in nature but is very, very similar as it's the average of natural backbones."
The source said it was noteworthy that the cut-off for generating such an average sequence was viruses that only had five per cent genetic divergence from each other.
Last year, scientists at the Wuhan Institute of Virology said they had found a strain named RaTG13 in bat droppings in a cave in Yunnan province in 2013 which was a 96.1 per cent match to Sars-CoV-2. It means RaTG13 could have been included in a set of viral genomes to help create an average sequence.
The WHO source added:
"If Sars-CoV-2 comes from an artificial consensus sequence composed of genomes with more than 95 per cent similarity to each other... I would predict that we will never find a really good match in nature and just a bunch of close matches across parts of the sequence, which so far is what we are seeing.
"The problem is that those opposed to a lab leak scenario will always just say that we need to sample more, and absence of evidence isn't evidence of absence. Scientists overall are afraid of discussing the issue of the origins due to the political situation. This leaves a small and vocal minority of biased scientists free to spread misinformation."
The proposal was submitted by the British zoologist Peter Daszak on behalf of a consortium which included Daszak EcoHealth Alliance, the Wuhan Institute of Virology, the University of North Carolina and Duke NUS in Singapore.
The plans are in addition to other proposals made in the Darpa documents, including inserting a section into existing viruses to make them more infectious to humans and inoculating wild bats with aerosolised engineered spike proteins from viruses.
Experts said if the ultimate aim of the proposal was to create a pan-coronavirus vaccine, constructing an "ideal" average virus would have been a good starting point.
Mr Daszak, currently a member of the WHO team investigating the pandemic's origins, was also behind a letter published in The Lancet which dismissed suggestions that Covid did not have a natural origin as a conspiracy theory.
The WHO source said he had struggled to raise the issue of a lab leak with other scientists and had been warned not to go on the record with his concerns.
The proposal team has been approached for comment but had not responded at the time of publication.
|
Busy. Please wait.
Log in with Clever
show password
Forgot Password?
Don't have an account? Sign up
Sign up using Clever
Username is available taken
show password
Already a StudyStack user? Log In
Reset Password
Didn't know it?
click below
Knew it?
click below
Don't know
Remaining cards (0)
Normal Size Small Size show me how
Character traits
Commonly used character traits
quirky characterized by peculiar or unexpected traits... usually in a positive way:)
witty showing or characterized by quick and inventive verbal humor.
virtuous having or showing high moral standards.
trustworthy able to be relied on as honest or truthful.
timid showing a lack of courage or confidence; easily frightened.
thoughtful showing consideration for the needs of other people.
tenacious not readily relinquishing a position, principle, or course of action; determined. similar to perseverance and persistence
stoic a person who can endure pain or hardship without showing their feelings or complaining.
shy being reserved or having or showing nervousness or timidity in the company of other people.
serious acting or speaking sincerely and in earnest, rather than in a joking or halfhearted manner.
self-indulgent characterized by doing or tending to do exactly what one wants, especially when this involves pleasure or idleness.
active characterized by action rather than by contemplation or speculation
adventurous willing to take risks or to try out new methods, ideas, or experiences.
aloof not friendly or forthcoming; cool and distant.
ambitious having or showing a strong desire and determination to succeed.
Apathetic having or showing little or no feeling or emotion : SPIRITLESS
Arrogant having or revealing an exaggerated sense of one's own importance or abilities often by an overbearing manner
bossy : inclined to domineer : fond of giving people orders; domineering.
callous feeling or showing no sympathy for others
clever mentally quick and resourceful
compassionate feeling or showing sympathy and concern for others.
confident having or showing assurance and self-reliance,
considerate :houghtful of the rights and feelings of others
courageous not deterred by danger or pain; brave.
curious marked by desire to investigate and learn; eager to know or learn something.
daring bold or courageous; fearless or intrepid; adventurous; bold in action or thought
dependable capable of being counted on in situations; trustworthy and reliable.
determined having a strong feeling that you are going to do something and that you will not allow anyone or anything to stop you; firmly resolved,
diligent characterized by steady, earnest, and energetic effort : having or showing care and conscientiousness in one's work or duties.
dishonest behaving or prone to behave in an untrustworthy or fraudulent way.
easygoing relaxed and tolerant in approach or manner....laid-back
energetic showing or involving great activity or vitality.
extrovert a friendly person who enjoys talking to and being with other people
friendly describes people who are kind, caring, and make you feel comfortable.
funny causing laughter or amusement; humorous.: * can also be used to mean odd or "fishy"
Gentle having or showing a mild, kind, or tender temperament or character.
Greedy having or showing an intense and selfish desire for something, especially wealth or power.
gregarious someone who's very outgoing, sociable, and fond of the company of others
gullible easily duped or cheated.
helpful inclined to assist others in any situation; giving or ready to give help.
honest :free from fraud or deception : LEGITIMATE, TRUTHFUL
humble not proud or haughty : not arrogant or assertive; modest
introvert possessing a reserved or shy nature typically with an inclination to solitude
Impatient not patient : restless or short of temper especially under irritation, delay, or opposition
impulsive acting or doing without forethought; act without thinking decisions through
intelligent having good understanding or a high mental capacity; quick to comprehend; smart, or having the ability to process and understand information
interesting engaging or exciting and holding the attention or curiosity:
kind of a sympathetic or helpful nature ; A helpful and considerate nature
loyal faithful to one's oath, commitments, or obligation
lazy disinclined to activity or exertion : not energetic or vigorous; unwilling to work or use energy.
malicious someone who enjoys hurting or embarrassing others.having or showing a desire to cause harm to someone
mature based on slow careful consideration, having or showing the qualities of an adult person
nurturing to support and encourage, as during a period of training or development, to foster
optimistic feeling or showing hope for the future; a person who thinks the best possible thing will happen, and hopes for it even if it's not likely
outgoing openly friendly and responsive : EXTROVERTED; a friendly, easy personality
patient able to accept or tolerate delays, problems, or suffering without becoming annoyed or anxious
polite having or showing behavior that is respectful and considerate of other people.
persistent continuing firmly or obstinately in a course of action in spite of difficulty or opposition.
pessimistic characterized by the ability or inclination to see only bad outcomes, gloomy, joyless, unhopeful
quick-witted quick in perception and understanding : mentally alert; a knack for coming up with smart comments on the fly
quirky unusual in especially an interesting or appealing way
realistic able to see things as they really are and to deal with them in a practical way,; aware or expressing awareness of things as they really are
reliable able to be counted on, to come through when you need it; dependable;able to be trusted.
responsible worthy of trust; dependable, someone who can be counted on to do what he/she says he/she will do or what he/she should do.
resourceful skilled at solving problems and making decisions on your own: having the ability to find quick and clever ways to overcome difficulties.
rude offensively impolite or ill-mannered.; socially incorrect in behavior
self-centered concerned solely with one's own desires, needs, or interests: concerned excessively or exclusively with oneself
Serious thoughtful or subdued in appearance or manner: lacking in playfulness
Stoic one who can be indifferent to pleasure or pain; calm and almost without any emotion; not showing how/what you're feeling and also accepting whatever is happening.
Created by: gizellewells
Popular Literature sets
Pass complete!
"Know" box contains:
Time elapsed:
restart all cards
|
Home > News > The Association Between Abnormal Eating Behaviors, Body Mass Index, and Waist-to-Height Ratio Among University Students in Malaysia
Read Time: 10 mins
Published Online: December 22nd 2020 US Endocrinology. 2020;16(2):69–73 DOI: https://doi.org/10.17925/USE.2020.16.2.69
Authors: Mona Mohamed Ibrahim Abdalla, Nahla Abduljaleel Alsaidi, Amirah Husna Binti Azman, Arshvin Qumar a/l Thivakaran, Hong Sue Vin. Kirthana a/p Karunakaran, Muhammad Shirazie bin Azmani, Shibani a/p Thyaga Rajan, Tiong Jia Lye, Yeong Kah Hing
Quick Links:
Article Information
Objectives: Transitioning from the home to a new environment exposes university students to unhealthy eating behaviors, which may impact their body mass index (BMI). The purpose of this study was to determine the frequency of these abnormal eating behaviors among the students of the Malaysian Allied Health Sciences Academy (MAHSA) University, Malaysia, gender difference in eating behaviors, and to explore the association of such behaviors with body mass index (BMI), waist circumference, and waist-to-height ratio. Methods: In this cross-sectional study, 300 students from MAHSA University were evaluated for eating habits using the Eating Attitude Test 26 (EAT-26) questionnaire. Their height, weight, and waist circumference were measured, and their BMI and waist-to-height ratio was calculated. Data were analyzed using Statistical Package for the Social Sciences (SPSS), Version 24. Results: Of the 300 students enrolled in the study, 6% scored >20 on the EAT-26, therefore appearing to have abnormal eating behaviors. Most of the students (62.0%) were found to be in the normal weight category according to their BMI measurements. A significant positive correlation was found between EAT-26 score and BMI, and between EAT-26 score and waist-to-height ratio. Female students had higher EAT-26 scores compared to the male students (p=0.01). Conclusions: Female students are at higher risk of developing abnormal eating behaviors than male students, according to this study. Among Malaysian students, the higher the risk of abnormal eating behaviors, the greater the likelihood of having a higher BMI and waist-to-height ratio.
Eating Attitude Test 26 (EAT-26), binge eating disorder, obesity, waist-to-height ratio, body mass index (BMI)
Abnormal eating behaviors involve deliberately adjusting food intake to the point of it being insufficient or excessive, which tends to harm the physical and mental health of an individual.1 The concern often exists amongst students regarding their body image, specifically around being overweight and obese. This ideology may be influenced by societal pressures as a slim body is widely considered to be physically attractive.2,3 An expansive range of techniques to lose weight have been promoted to capitalize on this mindset, including hypocaloric diets, restrictive eating habits, nutritional compounds, pharmaceutical products, and extreme measures to reduce calorie intake, such as skipping meals entirely.4–6 Studies have shown clear associations between the perception of body weight, body image, and the appearance of disturbed eating behaviors among undergraduate universities’ students. 2,3,6,7 The body mass index (BMI) is an anthropometric tool calculated using the height and weight of an individual. It is an easy screening method to identify those who are overweight or obese and thus at greater risk of health problems.
Abnormal eating behaviors are challenging to detect since an individual exhibiting them may not display any obvious signs. An individual who has an abnormal eating behavior may experience physical and mental stress.1,3,5 Adolescents who engage in abnormal eating behaviors are often unaware of the detrimental effects of such behaviors on mental and physical health. This lack of awareness may worsen their health due to the delay in seeking medical advice and leaving the disorder untreated.4,5 This may then cause negative consequences, including increased mortality rate, as shown in anorexia.4,5 In Malaysia, a person’s eating behaviors are rarely assessed. If any abnormal eating behaviors do happen to be identified, addressing them is unlikely to be considered a priority in patient management.8 However, there is evidence to suggest that Malaysians do fear being overweight and desire to be thinner, even when they are classed as having a normal body weight.6,8
Enrolling at university often involves a significant change in lifestyle to accommodate study requirements. These changes, coupled with the stresses associated with university life, can put university students at risk of developing abnormal eating behaviors and of becoming overweight or obese, which may significantly impact their health and quality of life.810 Stress levels may increase as students advance through their studies and are faced with more challenges, greater demands, and increasing responsibilities, which can lead to feelings of insecurity, poor sleep, anxiety, and depression, which can cause and heighten risk for abnormal eating behaviors.810 Determining the prevalence of abnormal eating behaviors in university students and the association between these behaviors and BMI will help authorities, commanding institutions, and researchers to take effective measures to reduce their potentially detrimental effects. The principal aims of the present study were to determine the prevalence of abnormal eating behaviors among students of the Malaysian Allied Health Sciences Academy (MAHSA) University and to explore whether abnormal eating behaviors are associated with BMI, waist circumference, waist-to-height ratio and/or gender.
Research design
A descriptive cross-sectional study was conducted among MAHSA University students from March to May 2019 with the following aims: (1) to determine the association of abnormal eating behaviors with BMI, (2) to determine the prevalence of abnormal eating behaviors, and (3) to determine the demographic and anthropometric characteristics of the students with abnormal eating behaviors.
The target population comprised students enrolled at MAHSA University in Malaysia studying a range of different academic disciplines. A convenient sample of 300 participants was included in this study.
Data collection
Students who agreed to participate in the study were given a set of questionnaires that included a participant information sheet outlining the objectives of the study, study design, methodology, expected outcome, significance of the study, and a statement confirming confidentiality of the collected data , a consent form, a socio-demographic questionnaire, and the Eating Attitude Test 26 (EAT-26) questionnaire. A total of 300 copies of the self-administered questionnaire sets were distributed among students with a 100% response rate. Anthropometric measurements including height, weight, and waist circumference were taken. Using the obtained measurements, the BMI of the respondents was calculated as weight divided by height squared (kg/m2). Waist-to-height ratio was also calculated.
Socio-demographic questionnaire
The socio-demographic questionnaire included information about the demographic characteristics of the students such as their age, gender, university course they study, year of study, and faculty.
Body mass index
The BMI calculation was based upon the BMI chart as suggested by the World Health Organization (WHO). According to the Asian Pacific WHO cut-off points, a BMI score of <18.5 kg/m2 is considered underweight, a BMI of 18.5−24.9 kg/m2 is classed as normal weight, a BMI of 25−29.9 kg/m2 is considered overweight, and a BMI score of ≥30 kg/m2 indicates obesity.11
The Eating Attitude Test 26
The EAT-26 tool (English version) was used to screen for eating-disorder characteristics and behaviors among students. The EAT-26 is widely used and was designed to provide a standardized measure of symptoms and characteristics of abnormal eating behaviors.12 The validity and reliability of the scale items showed internal consistency, and a Cronbach’s alpha of 0.82.
The EAT-26 consists of 26 items. Each item (except the 25th item) has six response options ranging in value from 0 to 3 (“always” = 3; “almost always” = 2; “often” = 1; and “seldom”, “hardly ever”, and “never” = 0). Item 25 has a reversed score (“always”, “nearly always” and “often” = 0; “seldom” = 1; “almost never” = 2; and “never” = 3). The total score of EAT-26 equals the sum of scores for the 26 items. A score of ≥ 20 is defined as being characteristic of a “disordered eating attitude”. The EAT-26 questionnaire also includes five behavioral questions that are used to assist in determining eating behavior over the past 6 months, given before answering the questionnaire. These questions investigate eating “binges”, defined as eating much more than most people would under the same circumstances and the feeling that eating is out of control. It also includes questions to investigate whether a person has made themselves sick (self-induced vomiting) or used laxatives, diet pills, or diuretics to assist in controlling their weight. The behavioral questions investigated whether a person exercised for more than 60 minutes per day to lose or to control his/her weight and whether there had been a weight loss of 10 kg or more in the past 6 months.12
Data analysis
Data entry and analysis were performed utilizing the Statistical Package for the Social Sciences (SPSS), Version 24. Basic descriptive statistics were run for all variables to establish means and standard deviations for variables measured on continuous scales, and frequencies and percentages for categorically measured variables. Correlation analysis was conducted to examine the association between eating behaviors and the BMI of the study participants and an independent t-test was used to determine the association between abnormal eating behaviors and gender; p<0.05 indicates a significant result.
Ethical considerations
The ethics committee of MAHSA University approved the study (approval number: RMC/EC50/2019). Participants signed an informed consent form after the purpose of the study had been explained and were assured about the confidentiality of their responses.
A total of 300 students participated in the study. Among 300 respondents, 193 respondents (64.3%) were female and 107 respondents (35.7%) were male. Most of the students (67.7%) were 20−30 years of age, 36.3% were aged <20 years, and the mean age of the study population was 20.3 ± 1.90 years. Of the students who participated, 30.3% were from the school of medicine, 20.7% were undertaking pre-university studies, 17.0% were studying health and sport sciences, and 12.7% were from the faculty of dentistry. The remaining 19.3% were from other faculties, including nursing, engineering, pharmacy, and business, financial, and hospitality.
The mean BMI was 21.6 ± 4.03 kg/m2. Most of the participants (62.0%; n=186) had a BMI within the normal range, while 22.0% (n=66) were underweight and 12.7% (n=38) were overweight. Only 3.3% (n=10) were obese according to their calculated BMI values. The EAT-26 questionnaire analysis revealed that 6% (n=18) of the students had obtained a score of more than 20, suggesting abnormal eating behaviors (Table 2).12
According to ANOVA test, there was insignificant difference between the groups in the mean score of EAT-26 (Table 3).
The independent t-test revealed that female respondents have a significantly lower waist–height ratio as compared with male respondents (p=0.01), and they scored significantly higher than males in the EAT-26 score (p=0.04). There was no gender difference in BMI of the study sample (Figure 1).
The eating behavior section of the EAT-26 scale indicated that out of the 300 students, 57.8% (n=173) felt that they were eating much more than most people would under the same circumstances and felt that their eating was out of their control. A total of 13.0% (n=39) and 13.3% (n=40) of the students induced vomiting or used laxatives, diet pills or diuretics, at least once within the previous 6 months to control their weight. It was also found that 65.3% of the students (n=196) exercised for more than 60 minutes per day to lose or to control their weight. Only 8.7% (n=26) had lost more than 10 kg in the past 6 months.
Spearman’s rank correlation coefficient was computed to find the relationship between abnormal eating behaviors and BMI, age, height, weight, waist circumference, and waist-to-height ratio. Table 4 denotes that there was no correlation between the abnormal eating behaviors with age, height, weight, and waist circumference. However, a positive correlation was found between abnormal eating behaviors and body mass index (rs=0.14, p=0.015), and between abnormal eating behaviors with waist-to-height ratio (r=0.14, p<0.017), which indicates that an increase in BMI and waist-to-height ratio are associated with an increase in incidence of eating disorders.
To test whether the gender of the participants was associated with significantly different mean EAT-26 scores, an independent t-test was performed. There was a significant difference for gender t (298) = −2.59, p=0.01, with female students having higher scores (9.31 ± 7.79) than male students (7.23 ± 5.95).
The present study reported a 6% prevalence of abnormal eating behaviors among students at MAHSA University. The majority of students (around 79.3% of the study sample) were from medical professional courses such as health and sports sciences, medicine and biomedical sciences, dentistry, pharmacy, nursing, and midwifery. The study findings showed a higher prevalence of abnormal eating behaviors among female students, which could be due to increasing societal pressure for females to maintain a low body weight. The body type many aspire to is to be thinner than ever before, yet the average weight of young women has increased, resulting in a discrepancy between the ideal body image and the actual body size of females, as shown in a study conducted among 657 female university students located in Seoul, Busan, Ulsan, Daejon, Chungcheongnam-do, and Gangwon-do, South Korea.11,12 This study reported lower BMIs in female Korean students than in female European and American Caucasian students; however, the dissatisfaction of female Korean students with their appearance was greater than that of the European and American students, indicating that more female Korean university students were suffering from an eating disorder.12 This is in agreement with another study conducted in an Indian medical school, which reported a 4.7% prevalence of eating disorders, all among females.13 In addition, a study conducted in the USA found a significantly higher prevalence of eating disorder symptoms, such as loss of control over eating, fasting, body avoidance, body checking, and binge eating, among women aged 18–35 years.14 A review of research concluded that although women seem to be at greater risk of developing eating disorders, the prevalence of such a problem is increasing among males, highlighting the importance of evaluating eating disorders among males as well.15,16
Our study showed a significant positive association between abnormal eating behaviors based on the EAT-26 score, BMI, and waist-to-height ratio. However, abnormal eating behaviors did not appear to be significantly related to age, weight, height, and waist circumference. This is contradictory to the findings of the cross-sectional study of disturbed eating attitudes and behaviors among 150 medical students conducted by Panchami et al. in Father Muller Medical College, Mangalore, Karnataka, India in 2016, which reported an absence of significant association between eating disorders and BMI.17 Our findings are also in contrast to those from a study conducted in India among adolescents in which no significant correlation between BMI and eating habits was reported.18 The difference may be due to the difference in age distribution, gender distribution, and demographic factors, and therefore needs further study. The proportion of participants in different categories of BMI was also different. In addition, the sample size that has been used in our study is double the size that was used in the Indian study, which could have contributed to the appearance of the correlation statistically. However, the association between BMI and EAT-26 reported in the current study were in accordance with the findings of a recent study conducted by Yousif et al. in 2019, whereby a significant association between BMI and eating behavior was reported among medical students.19 Disinhibition is an eating behaviour in which the subject tends to overeat in response to stress.19 The association between BMI and disinhibition was also reported in a more recent study conducted in the USA among 176 16-year-old adolescents, which reported that individuals with higher disinhibition had a higher BMI.20 The association between BMI and abnormal eating behaviors highlights the importance of psychiatric care for those with high BMI.21
In terms of predicting the consequences of being overweight or obese, measuring waist circumference and calculating waist-to-height ratio has been demonstrated to be of greater value than assessing BMI.22 The association between abnormal eating behaviors and waist-to-height ratio reported in our study is in agreement with the findings of a study conducted in Croatia among adults aged between 18 and 93 years, which reported that waist-to-height ratio is the most important anthropometric measure in terms of predicting lifestyle and psychological risks for obesity.23 Lifestyle factors such as the availability of convenience and fast food, study time patterns, and staying alone and away from home might contribute to abnormal eating attitudes. Lack of physical activity can also contribute to an increase in body weight and a resulting change in eating habits.24 A study conducted among the adult population in the UK has proved that waist-to-height ratio was able to identify more people at an early risk of the health consequences of obesity than other measures of obesity, such as waist circumference and BMI.25 Many studies have shown that obesity in adult age could be caused by various psychological risk factors during childhood, such as maltreatment, separation of parents or their death, and mental disorders, e.g., early onset major depressive syndrome, binge-eating disorders, and tobacco use.26–36
Limitations of the study and future research
The present study was conducted in one institution, MAHSA University. Future research conducted in a larger sample size that includes students from other institutions and fields of study are recommended to strengthen our conclusions and enable greater generalizability. Carrying out a longitudinal study, whereby the same study sample is observed repeatedly to obtain an accurate result, may also be of value to understand eating behaviors among students. The present study results showed an association between abnormal eating behaviors with BMI and waist-to-height ratio, but not causation; future research is encouraged to examine the causation of abnormal eating behaviors among students. Implementing nutrition and health awareness programs may benefit those who exhibit abnormal eating behaviors. Another limitation of the study is the use of the convenient sampling method; it is recommended to use random sampling in future studies.
In conclusion, among MAHSA students, female students are at greater risk of exhibiting abnormal eating behaviors than male students. The higher the BMI or waist-to-height ratio, the higher the prevalence of abnormal eating behaviors among the students in this Malaysian population.
Article Information:
Mona Mohamed Ibrahim Abdalla, Nahla Abduljaleel Alsaidi, Amirah Husna Binti Azman, Arshvin Qumar a/l Thivakaran, Hong Sue Vin. Kirthana a/p Karunakaran, Muhammad Shirazie bin Azmani, Shibani a/p Thyaga Rajan, Tiong Jia Lye and Yeong Kah Hing have no financial or non-financial relationships or activities to declare in relation to this article.
Compliance With Ethics
The study was approved by the ethics committee of MAHSA University (approval No. RMC/EC50/2019). Informed consent was received from the participants involved in the study.
Review Process
Double-blind peer review.
Mona Mohamed Ibrahim Abdalla, International Medical University, 126, Jln Jalil Perkasa 19, Bukit Jalil, 57000 Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia. E: monamohamed@imu.edu.my
No funding was received in the publication of this article.
This article is freely accessible at touchENDOCRINOLOGY.com © Touch Medical Media 2020.
Special thanks to all participants and the Faculty of Medicine Research Committee at MAHSA University.
1. Porter Starr K, Fischer JG, Johnson MA. Eating behaviors, mental health, and food intake are associated with obesity in older congregate meal participants. J Nutr Gerontol Geriatr. 2014;33:340–56.
2. Boutahar K, Chetoui A, Kaoutar K, et al. Anthropometric status and body image perception among Moroccan university students. Rev Epidemiol Sante Publique. 2019;67:311–7.
3. Silva LPRD, Tucan ARO, Rodrigues EL, et al. Dissatisfaction about body image and associated factors: a study of young undergraduate students. Einstein (Sao Paulo). 2019;17:eAO4642.
4. Amigo I, Fernández C. Effects of diets and their role in weight control. Psychol Health Med. 2007;12:321–7.
5. Steinhausen, H-C. Outcome of eating disorders. Child Adolesc Psychiatr Clin N Am. 2009;18:225–42.
6. Jáuregui-Lobera I, Iglesias Conde A, Sánchez Rodríguez J, et al. Self-perception of weight and physical fitness, body image perception, control weight behaviors and eating behaviors in adolescents. Nutr Hosp. 2018;35:1115–23.
7. Sanlier N, Arslan S, Buyukgenc N, Toka O. Are eating behaviors related with by body mass index, gender and age? Ecol Food Nutr. 2018;57:372–87.
8. Edman JL, Yates A. Eating attitudes among college students in Malaysia: An ethnic and gender comparison. European Eating Disorders Review. 2004;12:190–6.
9. Lyzwinski LN, Caffery L, Bambling M, Edirippulige S. The mindfulness app trial for weight, weight-related behaviors, and stress in university students: Randomized controlled trial. JMIR Mhealth Uhealth. 2019;7:e12210.
10. Sogari G, Velez-Argumedo C, Gómez MI, Mora C. College students and eating habits: a study using an ecological model for healthy behavior. Nutrients. 2018;10:1823.
11. Woo J. A survey of overweight, body shape perception and eating attitude of Korean female university students. J Exerc Nutrition Biochem. 2014;18:287–92.
12. Garner DM, Olmsted MP, Bohr Y, Garfinkel PE. The eating attitudes test: Psychometric features and clinical correlates. Psychol Med. 1982;12:871–8.
13. Babar N, Alam M, Ali SS, et al. Anorexic behaviour and attitudes among female medical and nursing students at a private university hospital. J Pak Med Assoc. 2002;52:272–6.
15. Sangha S, Oliffe JL, Kelly MT, McCuaig F. Eating Disorders in males: How primary care providers can improve recognition, diagnosis, and treatment. Am J Mens Health. 2019;13:1557988319857424.
16. Panchami P, Samuel T. A cross-sectional study of disturbed eating attitudes and behaviours in medical students. Int J Res Med Sci. 2016;4:2830–3.
17. Shashank KJ, Gowda P, Chethan TK. A cross-sectional study to assess the eating disorder among female medical students in a rural medical college of Karnataka state. Ntl J Community Med. 2016;7:524–7.
18. Benazeera UJ. Association between eating habits and body mass index (BMI) of adolescents. Int J Med Sci Public Health. 2014;3:940–3.
19. Yousif MM, Kaddam LA, Humeda HS. Correlation between physical activity, eating behavior and obesity among Sudanese medical students Sudan. BMC Nutrition. 2019;5:6.
20. Lawless M, Shriver LH, Wideman L, et al. Associations between eating behaviors, diet quality and body mass index among adolescents. Eating Behav. 2020;36:101339.
21. Brown KL, LaRose JG, Mezuk B. The relationship between body mass index, binge eating disorder and suicidality. BMC Psychiatry. 2018;18:196.
22. Vieira SA, Ribeiro AQ, Hermsdorff HHM, et al. Waist-to-height ratio index or the prediction of overweight in children. Rev Paul Pediatr. 2018;36:52–8.
23. Tomas Ž, Škaric´ ‐Juric´ T, Zajc Petranovic´ M, et al. Waist to height ratio is the anthropometric index that most appropriately mirrors the lifestyle and psychological risk factors of obesity. Nutr Diet. 2019;76:539–45.
24. Ha SA, Lee SY, Kim KA, et al. Eating habits, physical activity, nutrition knowledge, and self-efficacy by obesity status in upper-grade elementary school students. Nutr Res Pract. 2016;10:597–605.
25. Ashwell M, Gibson S. Waist-to-height ratio as an indicator of ‘early health risk’: simpler and more predictive than using a ‘matrix’ based on BMI and waist circumference. BMJ Open. 2016;6:e010159.
26. Wall MM, Mason SM, Liu J, et al. Childhood psychosocial challenges and risk for obesity in U.S. men and women. Transl Psychiatry2019;9:16.
27. Danese A, Tan M. Childhood maltreatment and obesity: systematic review and meta-analysis. Mol Psychiatry. 2014;19:544–54.
28. Rehkopf DH, Headen I, Hubbard A, et al. Adverse childhood experiences and later life adult obesity and smoking in the United States. Ann Epidemiol2016;26:488–92.e5.
29. Petersen JD, Kyvik KO, Heitmann BL, Vámosi ME. The association between parental separation during childhood and obesity in adulthood: a Danish twin study. Obes Sci Pract. 2016;2:436–43.
30. Alciati A, Gesuele F, Casazza G, Foschi D. The relationship between childhood parental loss and metabolic syndrome in obese subjects. Stress Health. 2013;29:5–13.
32. Mannan M, Mamun A, Doi S, Clavarino A. Prospective associations between depression and obesity for adolescent males and females: a systematic review and meta-analysis of longitudinal studies. PLoS One. 2016;11:e0157240.
33. Pine DS, Cohen P, Brook J, Coplan JD. Psychiatric symptoms in adolescence as predictors of obesity in early adulthood: a longitudinal study. Am J Public Health. 1997;87:1303–10.
34. Berg KC, Crosby RD, Cao L, et al. Negative affect prior to and following overeating-only, loss of control eating-only, and binge eating episodes in obese adults. Int J Eat Disord. 2015;48:641–53.
35. Saarni SE, Pietiläinen K, Kantonen S, et al. Association of smoking in adolescence with abdominal obesity in adulthood: a follow-up study of 5 birth cohorts of Finnish twins. Am J Public Health. 2009;99:348–54.
36. Patel M, Kaufman A, Hunt Y, Nebeling L. Understanding the relationship of cigarette smoking trajectories through adolescence and weight status in young adulthood in the United States. J Adolesc Health2017;61:163–70.
Further Resources
Share this Article
Related Content In Obesity
• Copied to clipboard!
|
Take me here now
A Town Divided
Poole's Bridges
A Barrier and a Highway
Poole is a magnificent natural harbour, and the town is surrounded on three sides by water. Anyone with a suitable boat can easily cast off from Poole's quaysides and head for Newfoundland, the Channel Islands, or the Atlantic coasts of France, Spain and Portugal
Before the bridges were built, however, anyone without a boat (or the money to hire one) was set for a long, long walk if they just wanted to get to Hamworthy. The same water that acted as a highway for shipping was a barrier to road transport.
The early maps show a ferry service providing a crossing between the two settlements. Building bridges across a navigable channel was a big challenge in the age of sailing ships as they had to be made high enough for the masts to pass under.
The first bridging solution was a privately funded wooden toll bridge built by the local MP, William Ponsonby, in 1834. The design was too steep for horses and carts, however.
An iron swing toll bridge replaced the wooden one in 1885, with a section in the middle that could rotate 90 degrees sideways to open a route for ships to squeeze by. It cost a penny for pedestrians to cross.
The swing bridge was bought by Poole council and replaced with a free bascule lifting bridge in 1927. The first opening was a major event, and everyone turned out to watch. Local woman Lil Hale recalls the event in the audio below.
In 2012 an additional lifting bridge called the 'Twin Sails' was opened, giving Poole a landmark structure which references its maritime connections, and fulfilling Lil's prophecy that a second bridge was needed.
Lil Hale talks to her grandchild about the 1927 bridge
show transcript
|
how to pronounce snuff
how to improve pronunciation of snuff
press buttons with phonetic symbols to learn about each sound.
press Play to play an example pronunciation of snuff.
video examples of snuff pronunciation
An example use of snuff in a speech by a native speaker of american english:
“… students up to snuff but they're being …”
meanings of snuff
1. A murder.
2. Snot, mucus.
3. The burning part of a candle wick, or the black, burnt remains of a wick (which must be periodically removed).
4. The act of briskly inhaling by the nose; a sniff, a snort.
5. A form of pornographic film which involves someone actually being murdered.
6. Fine-ground or minced tobacco, dry or moistened, intended for use by placing a pinch behind the lip or beneath the tongue; see also snus.
7. Resentment or skepticism expressed by quickly drawing air through the nose; snuffling; sniffling.
8. Leavings in a glass after drinking; heeltaps.
9. A snort or sniff of fine-ground, powdered, or pulverized tobacco.
10. Smell, scent, odour.
11. Finely ground or pulverized tobacco intended for use by being sniffed or snorted into the nose.
1. To inhale through the nose.
2. To extinguish a candle or oil-lamp flame by covering the burning end of the wick until the flame is suffocated.
3. To trim the burnt part of a candle wick.
4. To kill a person; to snuff out.
5. To turn up the nose and inhale air, as an expression of contempt; hence, to take offence.
words with pronunciation similar to snuff
|
If 64 bit CPU’s all run on a 64 bit x86 architecture, how are they getting faster?
So my question is this, if all modern day computer CPUs (central processing units) more or less have the same or similar clockspeeds from generation to generation as of late, and all run on a 64 bit architecture with an x86 instruction set, what about the processor is being altered or changed to yield performance gains from one gen to the next?
I understand that more cache is available, and transistor sizes are getting smaller and smaller, but at the end of the day, it is still running an x86 instruction set at 64 bits.
So last gens 4 core 4.5 GHz processor should run identically as quickly as a current gen 4 core 4.5 GHz processor theoretically – but that is not the case.
In: Technology
The biggest problem with making current CPUs go faster is feeding them data to work on so they aren’t ever sitting idle. It doesn’t matter if they crunch the numbers in 1 five-billionth of a second if they don’t have the numbers on hand to crunch.
A lot of the Instructions Per Clock (IPC) gains in recent years have come from always having data for the CPU to work on. One common technique that modern CPUs have is that when a program is waiting on something to happen that requires a decision to be made, the CPU will guess what the outcome will be and start executing instructions based upon that guess. This is called branch prediction. The more accurately a CPU can guess the correct branch and the faster that it can reset from a mistake will speed up how much data it can process.
Also, as you alluded to, caches are really important. Having reliable access, quick access to the data means that the CPU spends less time waiting for data to be transferred. One of the big ways that the most recent generation of AMD processors sped up IPC was by making it so that more cores could access the same pool of cache memory. That way there is a higher likelihood that the data it needs is already in cache instead of having to be loaded.
There are a lot of other behind-the-scenes performance improvements that CPUs can implement that don’t involve changing the x64 instruction set.
Even if the operations are the same, you can implement then with different levels of efficiency. Eg, suppose a shift operation. That is, we take a bunch of bits: `00110010` and shift them 1 position to the left: `01100100`. Well, we can do that in different ways. For instance, we could do it digit by digit:
1. Digit 7 moves to digit 8.
2. Digit 6 moves to digit 7
3. Digit 5 moves to digit 6
4. Digit 4 moves to digit 5
5. Digit 3 moves to digit 4
6. Digit 2 moves to digit 3
7. Digit 1 moves to digit 2
8. Fill empty digit 1 with a 0
And that takes us 8 steps. So let’s say 8 clock cycles.
Instead of that you could have 8 copies of the “move digit circuitry”, and perform all of these steps at the same time. Now it takes 1 cycle, but it’s more complex and takes more room. We have 8 times the speed, but it also takes at least 8 times more room.
One thing to add to this answer is that the semiconductor processes used to manufacture these things have gotten a lot better at making really tiny transistors. So N times reduction in feature size leads to an N^2 reduction in area. Now, for the same amount of area, you can play around with chip architectures that increase throughput, such as parallelism. So now we can fit even more cores in a CPU than we could twenty or even ten years ago. So with more cores, we can execute more instructions in the same clock cycle.
The change from 32 to 64 bits did not increase the speed for the most program because it is relatively rare that the operation you do require a lot of operations with integers larger than 4 billion.
Runnin 64 bits operation can in fact be slower than 32 bit is the extra bits are not needed because you need to transfer more data from ram and the bandwidth is limited. It will also limit the number of variables you can fit in the cache memory.
So when you run 64 bits program lots of all integer operation still use the 32 bit operation because they are faster.
The change from 32 to 64 bits is the primary one of memory because not the OS can handle more than 4 gigabyte of RAM that results in around 3 gigabyte of ram. For X86 the change to 64 bit added some other stuff lite more register and that increased the speed.
The cock frequency is also not a good measurement because it only tells you how fast the clock is in the CPU it do not tell you how may the cycle an operation takes. I am not the case that a CPU performed 4.5 billion operations per second if it runs at 4.5 GHz
The Pentium 4 CPU had an architecture optimized for high clock speed. It decided each instruction up to 31 steps. One instruction could start each cycle so 31instruction is run at the same time ad different stag of completion
So it is like if you have an assembly line and move stuff from station to station. It takes time to move stuff between stations. Pentium 4 got to high clock frequency because the amount of work on each stop was quick but is used a lot of the time so just end and start each cycle.
It is also a problem is there there is a step where what is the next instruction depends on the output of a previous. A CPU would need to wait for it do be complete but that takes up to 31 cycles or have to guess so it has done some work if it guesses correctly but need to restart if it guesses incorrect. The impact of an incorrect guess is a lot larger if you split it up into more steps so the Core architecture that followed got a better performance at half the clock frequency.
A CPU today take instruction and break them apart into micro-operations. It then looks as them if they depend on each other. If instructions is independent they are executed at the same time. The CPU has multiple units that does a calculation that can be used at the same time
You can look at AMDs [Zen architecture overview](https://cdn.wccftech.com/wp-content/uploads/2016/08/AMD-Zen-CPU-Architecture-7.png) It can decode 4 instructions for each cycle. It can den send out 6 micro-ops to the part of the CPU that execute them.
It has 4 ALU that is the part that do integer maths and two AGU that handle the transfer to and from memory.
To that, you should add that CPUs today have multiple cores so multiple CPUs in the same chip
Today you have at least 4 core so that is like if you had four Pentium 4 CPUs because they only had a single core.
So there is a loss of improvement that has been done and it is about doing multiple instruction at the same time.
The way in which one CPU model can be faster than another while having the same architecture and running the same program at the same clock frequency is by several clever tricks: 1. Running several instructions at the same time, 2. Using statistics to predict the outcome of troublesome ‘branch’ instructions that usually halt execution completely, 3. Introduce more cores, effectively allowing several programs to run simultaneously, side by side (or many copies of the same program), 4. Having larger on die memory caches for instructions and intermediate calculations, 5. Having faster memory bus speed to allow for faster memory access.
|
discussion post and responses
Junk Bonds
If you have poor credit due to being delinquent on credit card debt or other issues, chances are the bank is going to charge you a higher interest rate on a personal loan, or it might not give you a loan at all. Corporations face the same problems. If a company takes on too much debt or is otherwise considered to be a credit risk, then it also gets low credit ratings. In this case, if it wants to take on more debt it needs to issue what is known as “junk bonds,” or as corporations prefer to call them, “high-yield bonds.”
Whatever you call these types of bonds, their key feature is that they pay higher interest than bonds from a corporation that has a high credit rating. If you have a 401(k) or other retirement investment fund, chances are you have the option to make a portion of your investment in these higher risk/higher return bonds.
Do some research on junk bonds. What kind of controversies do you see with them? Do you think they are a solid investment for your retirement, perhaps no riskier than most investments? Or do they deserve the derogatory term “junk”? Share the links to the articles you find with your classmates, and discuss your opinions as to whether you think the higher interest rate justifies the increased risk.
Module 4 Week 1
Contains unread posts
posted Oct 31, 2018 7:26 PM
Junk Bonds, or high yield bonds refer to bonds that are more speculative in nature, due to the perceived riskiness of the company or organization that issued the bonds (Amadeo, 2018). We know from our readings that the price of a bond is determined not only by the risk free interest rate, but by the risk of the bond issuer, as well as the value of the coupons and final payment given by the bond issuer (Ross, Westerfield, & Jordan, 2007).
In the past, junk bonds were less regulated and other parts of the financial markets, and as such were more vulnerable to schemes, default, etc. (Sviokla, 2009). Furthermore, we know that while there are many more bonds issued than stocks, bonds also tend to be less liquid, or sold and bought less often than stocks are (Ross, Westerfield, & Jordan, 2007). Therefore, due to lack of liquidity, regulation, and transparency, the valuation of junk bonds becomes more difficult than certain stocks. While this is changing in recent times, there is still a way to go (Amadeo, 2018). Like any investment, I believe that good due diligence, risk assessment, diversification, and research is essential before deciding; and junk bonds may be an investment I would consider using for retirement, but only in a portfolio of other investments after plenty of research into the fundamentals of the bonds themselves. In short, some bonds might still be junk, just like some stocks might be, and others might be good investments, it is up to us to find out.
Amadeo, K. (2018, April 14). Junk Bonds, Pros, Cons, and Ratings. Retrieved from The Ballance: https://www.thebalance.com/what-are-junk-bonds-pro…
Ross, S., Westerfield, R., & Jordan, B. (2007). Essentials of Corporate Finance. McGraw Hill.
Sviokla, J. (2009, April 14). A Better Way to Rate Bonds. Retrieved from Harvard Buisness Review: https://hbr.org/2009/04/a-better-way-to-rate-bonds
Response #2
Junk Bonds
Contains unread posts
posted Nov 19, 2018 12:24 PM
High-yield bonds “suffer from an identity crisis” sharing more characteristics with stocks than they sometimes do with bonds (Glassman, 2018). For this reason, they should not necessarily be considered as bad, but merely a different type of investment than other bonds issued by companies with a higher credit rating. Since they are generally considered riskier, they will have a higher yield than other bonds, and can be incorporated smartly into a diversified portfolio.
Junk bonds are not always issued by failing companies with terrible credit as they are sometimes from “companies on the rebound from hard times” (Glassman, 2018) and could prove to be a great investment. Aside from this, junk bonds are often issued by companies that are considered to be fallen angels or “companies that are historically reputable but are experiencing financial problems” (Investopedia, 2018). This, in theory, will reduce the risk of the company defaulting on the debt and your investment receiving no return from either interest or principle.
Gould states that “High yield bonds have a place in well diversified portfolios, but probably should comprise much less than half of the portfolio’s total bond allocation” (2018). Starting with this in mind and with plenty of research into the individual investment, a junk bond or high yield bond can be value added to an investment portfolio.
Thanks for reading,
Glassman, B. (2018, Mar 13). The most confused identity in your portfolio: High yield bonds. Forbes. Retrieved from https://www.forbes.com/sites/advisor/2018/03/13/the-most-confused-identity-in-your-portfolio-high-yield-bonds/#e42dacb2b8b6
Gould, D. P. (2018, July). Advisor insights Are high yield bonds a good investment? Investopedia. Retrieved from https://www.investopedia.com/ask/answers/111414/how-can-i-find-good-investments-among-lower-rated-bonds.asp
Investopedia. (2018, July). Are high yield bonds a good investment? Investopedia. Retrieved from https://www.investopedia.com/ask/answers/111414/how-can-i-find-good-investments-among-lower-rated-bonds.asp
The post discussion post and responses appeared first on Essay Writers.
|
Rapid Learning
Memory Techniques for Med School #8 Memory Palace
Surgical team and patient with "Hi, I'm...." social name stickers
Adding the human touch to the operating room
The Memory Palace (also called the method of loci, or mental walk) is a terrific memory method that was used as far back as ancient Rome, but has been largely underused since the invention of printed books. Neuropsychologist A.R. Luria, in his book “The Mind of a Mnemonist,” describes an amazing patient he followed for many years, who never forgot anything. The patient used the Memory Palace method, which is also praised highly by Joshua Foer, who won the U.S. memory championship and describes the method in his best-selling book “Moonwalking with Einstein.”
In the Memory Palace you simply visualize a walk through a place that you know well. For instance, it may be your home, in which you first encounter a large tree outside, then the front door, then the foyer, then the den on the right, then the kitchen, the bathroom, the bedroom, etc., in succession. You know this sequential list well, simply by the familiarity that you have with your home.
You use this walking list of places to associate each stop along the walk with an item on the list you wish to memorize.
In the case of the 7 cancer signs:
1. A change in bowel or bladder habits
2. A sore that does not heal
3. Unusual bleeding or discharge from any place
4. A lump in the breast or other parts of the body
5. Chronic indigestion or difficulty in swallowing
6. Obvious changes in a wart or mole
7. Persistent coughing or hoarseness
You might associate a cancerous tree, shaped like a “7,” that had a bowel and bladder exploding from its trunk. Continuing the walk:
The fecal matter would land on the door, causing a large sore on the door.
The sore would erode through the door, causing a massive pool of blood and discharge in the foyer.
The den on the right would be filled to the ceiling with lumps.
The advantage of the Memory Palace over the Link and Peg methods is that you can have numerous memory palaces. There then is no problem of confusing one item in a list with the same item in another list (such as a list of drug effects or symptoms of a disease). Just use a different memory palace. Trained mnemonists use hundreds of Memory Palaces. Moreover, you don’t have to memorize the number/letter combinations of the Peg method. You already have ready made pegs through the places you have visited and know well.
Which memory and learning techniques do you find most valuable in your medical studies?
What do you think of eBooks versus print books?
|
Skip to main content
Hello Visitor! Log In
Share |
ARTICLE | | BY Marc Finaud
Marc Finaud
Get Full Text in PDF
If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD), in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems). Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompassing all aspects of security addressed in cooperative and multilateral approaches.
1. Disagreements on the Best Route to Nuclear Disarmament
The ultimate goal of ridding the world of nuclear weapons, expressed in the very first resolution of the United Nations General Assembly, is regularly reaffirmed by all states, including the nuclear powers. It is at the heart of the Non-Proliferation Treaty (NPT) and the commitments adopted at its Review Conferences in 1995, 2000 and 2010. It was solemnly proclaimed by President Obama in his 2009 Prague speech. However, 68 years after Hiroshima and Nagasaki and two decades after the end of the Cold War, the world’snuclear arsenals are still estimated to total more than 17,000 warheads, nearly 94% of which are in the hands of the United States and Russia. This is a real improvement compared to the 65,000 weapons active in 1985, but the fact that all nuclear powers keep modernizing their arsenals and some increase theirs shows how much progress is still needed to achieve the common goal of nuclear disarmament. The firepower of the sole US and Russian deployed nuclear weapons still equals 700 times the explosive firepower of all the bombs exploded during World War II (expressed in tons of TNT).
“If the process of nuclear disarmament has to proceed further or to be initiated, considering the current failures, a new security paradigm will need to be elaborated.”
Because of the primary responsibility of the two main nuclear powers, their bilateral negotiations and agreements have until now remained the principal channel for both preventing further “vertical” proliferation, i.e. ceilings on numbers of delivery vehicles and warheads, and reducing actual stockpiles by dismantlement of delivery vehicles or non-deployment of warheads. This process, started in the early 1970s, did yield the above-mentioned reductions. However, since 1949, in parallel, the number of states having manufactured and exploded nuclear weapons increased from two to eight (with the addition of UK, France, China, India, Pakistan, and North Korea) or nine counting Israel (which has not exploded a nuclear device). While the US and the Soviet Union followed by Russia had begun reducing their stockpiles, some new nuclear weapon-states increased their stockpiles. However, the UK and France also carried out reductions in their smaller arsenals after the end of the Cold War (France is actually the only nuclear power to have cut its total stockpile by half, reduced by one third the number of its active nuclear submarines and airborne weapons, missiles and aircraft, scrapped its land-based component, and dismantled both its testing site and fissile material production site).1
Between the main protagonists of the Cold War, the process of nuclear disarmament, albeit limited, was closely related to an evolution of the global security environment. The relaxation of tensions during the 1970s, followed by Mikhail Gorbachev’s policy of glasnost and perestroika culminating in the collapse of the Soviet Union and the end of the Warsaw Pact facilitated unilateral and bilateral disarmament initiatives. The most effective approach was an incremental building of mutual confidence through direct communication lines, data exchange centres, reciprocal verification of ceilings and dismantlement. The same approach was followed in the conventional domain, with confidence – and security-building measures gradually allowing actual elimination of the most destabilizing heavy armaments in huge quantities in Europe.
If the general political environment and the reduction in the level of potential military confrontation have favoured a sense of strengthened security among the former Cold War enemies, those countries have not felt secure enough to move faster and closer to the goal of nuclear abolition. At the same time, new nuclear powers have emerged and developed their capabilities and stockpiles for reasons of their own. In both categories, if the process of nuclear disarmament has to proceed further or to be initiated, considering the current failures, a new security paradigm will need to be elaborated.
“Even when the actual risk of aggression from any potential enemy tends to disappear, nuclear-weapon states find in the power conferred upon them by nuclear weapons a new reason for maintaining them.”
2. Addressing Motives and Threat Perceptions: Fear and Power
“Reducing the benefits conferred by nuclear weapons in terms of power will thus need to be pursued along with mitigating the justified fears or perceived threats that now justify resorting to nuclear weapons.”
In order to build this new security doctrine, one will need to review the motives which have led governments to join the nuclear club. Basically, those motives can be boiled down to two: fear and power. Even former Cold War protagonists have not drawn all the consequences of the disappearance of their former enemies. Their reliance on nuclear weapons to protect their vital interests is still predicated on a zero-sum game security concept: their security will be preserved only if their potential enemies (even currently undefined) feel insecure and thus dissuaded§ to launch any aggression against them. Nuclear deterrence is based on nuclear powers’ fear of potential enemies and on the latter’s fear of potential damage that should outweigh the benefits of aggression. But, even when the actual risk of aggression from any potential enemy tends to disappear, nuclear-weapon states find in the power conferred upon them by nuclear weapons a new reason for maintaining them. This nostalgia of nineteenth and twentieth-century power politics by a small number of potent states is still prevalent in the minds of leaders who are considering what their countries would become without nuclear weapons. Meanwhile, the world has changed: power comes less from the traditional instruments of state power such as nuclear weapons and more from economic and/or demographic dynamism, capacity for technological innovation, digital transformation, and intellectual influence, qualified by Joseph Nye as soft power.2
In regions of protracted conflict, nuclear weapons have appeared as an attractive means of guaranteeing security in the same zero-sum game approach and combination of fear and power, even if they have played the role of an equalizer of conventional imbalances (like in the case of Israel versus the Arab world and now a potentially nuclear Iran, or Pakistan versus India) and, as for Cold War protagonists, their possession has so far prevented a nuclear war but not direct or proxy conventional wars. While military might has ceased to be the sole criterion of power for western states, emerging countries like India or China cannot conceive asserting themselves without strengthening their military capabilities, including nuclear power. When North Korea and Iran crave for recognition, drawing inspiration from the most powerful country, the US, they develop their nuclear programmes. They cannot ignore the precedents of Iraq and Libya, which became subject to military intervention after they had renounced, voluntarily or not, their WMD programmes.
For both categories of states, reducing the benefits conferred by nuclear weapons in terms of power will thus need to be pursued along with mitigating the justified fears or perceived threats that now justify resorting to nuclear weapons. Of course, this is easier said than done. The UN Security Council has identified the key objective in its historic resolution 1887 which was unanimously adopted at the level of heads of state or government on 24 September 2009: “to seek a safer world for all and to create the conditions for a world without nuclear weapons, in accordance with the goals of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), in a way that promotes international stability, and based on the principle of undiminished security for all.” Several tracks could be pursued simultaneously in that direction.
3. Four Steps Towards Cooperative Security
Cooperative security has been defined as: “a process whereby countries with common interests work jointly through agreed mechanisms to reduce tensions and suspicion, resolve or mitigate disputes, build confidence, enhance economic development prospects, and maintain stability in their regions.”3In order to make progress towards the emergence of such a system and create the conditions for a world without nuclear weapons, four steps should be envisaged.
1. The first one would be to disconnect the permanent membership of the UN Security Council from possession of nuclear weapons. Actually, from 1971 (when the People’s Republic of China joined the Security Council) to 1998 (when India became a nuclear-weapon state), there was a strict equivalence between the status of a Permanent Member (with veto power) and that of a nuclear-weapon state. Obviously, there are other reasons for the attractive character of this coincidence why other countries acquired nuclear weapons. However, if countries such as Germany, Japan, Brazil, and Egypt do become Permanent Members while they do not possess nuclear weapons, this attractiveness would be reduced. It would be demonstrated that it is possible to acquire power and influence over world affairs without a nuclear arsenal. The role currently played by Germany in the “P5+1” negotiations with Iran on its nuclear programme or by Japan in the “Six-Party Talks” with North Korea (beyond both countries’ contribution to the funding of the UN or other organisations) can be a justification in advance for such a move.
2. The second step would consist in vigorously addressing the regional conflicts which fuel nuclear proliferation:
• In South Asia, it is true that India did not become a nuclear-weapon state because of Pakistan (but mainly because of China) while the reverse is true. Therefore, India and China should be encouraged to resolve their disputes including territorial ones, possibly with the mediation of the UN Secretary-General or his envoy, and consider a set of confidence-building measures to move towards cooperative security for their mutual benefit. This could lead to negotiated or unilateral but coordinated steps towards conventional and nuclear disarmament. Between India and Pakistan, although confidence-building measures such as direct communications links and an agreement on the non-attack of nuclear facilities are already being implemented, no major breakthrough can be expected until a negotiated solution to the Kashmir conflict (and other territorial disputes) is achieved. The US, which aggravated Pakistan’s frustration by granting India a nuclear cooperation agreement despite its non-NPT membership, has a critical role to play. Some compensation for Pakistan will need to be found, especially to encourage it to accept a multilateral negotiation on the prohibition of production of fissile material for weapons purposes (“Cut-off Treaty”). Beyond South Asia, it is also clear that persisting tensions between China and the US (mainly about Taiwan) as well as territorial disputes between China and Japan must be addressed to avoid escalation in the Chinese military build-up.
• In the Korean Peninsula, the Six-Party Talks must be revived to ensure the implementation of the 1992 and the 2005 agreements on the denuclearization of the Korean Peninsula. Here too, the US has a crucial role to play to alleviate the fears of the North Korean regime stemming from a perceived policy of regime change and unqualified support to South Korea. With the needed support from China, Pyongyang should be convinced of the benefits it may derive from denuclearization that should outweigh the costs of the status quo, including sanctions and isolation. Beyond that aspect, both Koreas should get incentives for concluding a far-reaching normalization agreement.
• In the Middle East, another volatile region, priority should of course be given to the central issue of a peace agreement between Israel and the Palestinians allowing the recognition of the state of Palestine and consequently the mutual recognition of Israel and all Arab states. It is an illusion to think that anything will happen in the area of arms control or a fortiori disarmament unless this preliminary step is achieved. Beyond that essential milestone, threat perceptions and military asymmetries in the region will still need to be addressed, especially because they are affected by a perception of Western double standards in favour of Israel.4As for Iran, a parallel can be established with North Korea: until Tehran receives some form of recognition for its legitimate regional role from the US, amounting to a definitive abandonment of the regime change policy, Iran will continue to develop the capacity to deter what it perceives as a threat from the US and Israel. Some, like Gen. James Cartwright, go as far as suggesting that the US offer extended deterrence to Iran.5Presumably, this would be part of a Grand Bargain whereby Iran would accept to forego nuclear weapons in exchange for continuing low enrichment of uranium for peaceful purposes. Of course, the best way of ensuring an end to proliferation in the region will be an agreement on a WMD-free zone including Iran and Israel, with external guarantees.6
3. If the US ratified the Comprehensive Nuclear Test Ban Treaty (CTBT), it could have a domino effect on the other key states missing and allow the treaty to enter into force.”
The third step would be, assuming that regional conflicts are addressed to open the way to regional security architectures, to promote synergies between regional and global disarmament. Indeed, even if regional tensions can be reduced by confidence- and security-building measures and commonly agreed constraints on the most destabilizing armaments, one major incentive for regional disarmament should come from global disarmament efforts by the most heavily armed states. The idea is to move from the vicious circle of maintaining nuclear deterrence against current or possible proliferation to a virtuous circle of accompanying de-proliferation with reduced levels of armaments. Any pursuit of the status quo, where the developed nuclear powers keep their nuclear weapons because of the growing threat of developing states’ weapons, may amount to a self-fulfilling prophecy. In other words, letting existing or potential proliferation crises develop may in the end justify maintaining nuclear stockpiles or even building them up, consequently encouraging the proliferating states in their endeavour. How is it possible to avoid a sense of double standards when India is told to disarm while China increases its arsenal? When Pakistan is told to disarm while India benefits from a US nuclear cooperation agreement? When Iran is told to stop its nuclear programme while nothing is done about Israel’s capability? When North Korea is told to disarm while South Korea enjoys US extended deterrence? On the contrary, the power of example may be strong and at minimum must be tried: if the US ratified the Comprehensive Nuclear Test Ban Treaty (CTBT), it could have a domino effect on the other key states missing (China, Egypt, India, Iran, Israel, North Korea, Pakistan) and allow the treaty to enter into force. At least the US would be credible in campaigning for this non-proliferation instrument. If the US and Russia returned to a Reykjavik-typeapproach (elimination of all ballistic missiles and 50% of all strategic weapons within 10 years), the onus would be on the other nuclear powers, including China, the UK, and France to follow suit in taking part in some negotiation. Obviously, all the contentious issues preventing a breakthrough in the negotiations between the US and Russia must be tackled: missile defence and in particular the European Adaptive Phased Approach (still perceived by Russia as a threat to its retaliation capability and thus to strategic stability); weaponization of outer space (related to missile defence capabilities with anti-satellite potential); conventional imbalances to the advantage of NATO, a reversal of the Cold War situation (and the related value of Russian tactical nuclear weapons); Russian fears about US conversion of submarine-launched nuclear-tipped missiles to conventional warheads or the development of new conventional weapons (such as the Prompt Global Strike)7that could be even more destabilizing than nuclear weapons especially if they substituted them in the future.
In order to make progress in the adoption of a new paradigm of cooperative security, the US and Russia should revive and update their Cooperative Threat Reduction Program which has already contributed to a substantial elimination of surplus armaments in Russia. They should also offer their expertise and support to other countries, including the identified regional conflict areas, in jointly implementing arms elimination programmes following the experience of the G-8 Global Partnership against the Spread of Weapons and Materials of Mass Destruction. Sharing in particular good practices and lessons learnt about on-site inspections within disarmament agreements may have a broad confidence-building effect.8
“The concept of security has dramatically evolved. It moved away from the sole protection of states (meaning often regimes or governments) against external threats by military means to ensuring the safety and well-being of individuals.”
4. The fourth step towards cooperative security to facilitate nuclear disarmament will be the adoption of new security doctrines by all current nuclear-weapon states, which they will be able to share with the rest of the world. This will be based on the explicit understanding that, in a 21st century globalised world, the concept of security has dramatically evolved. It has moved away from the sole protection of states(meaning often regimes or governments) against external threats by military means to ensuring the safety and well-being of individuals(some of whom may be threatened even by their own state or government), confronted by multi-faceted transnational challenges. These challenges facing both states and individuals can be traditional “hard security” threats such as terrorism, arms proliferation, organised crime or political violence, requiring effective law enforcement and occasional military instruments. But they are only partial security issues and encompass broader dimensions (social, economic, environmental) like pandemics, climate change, financial crises, uncontrolled migration, technological developments, uneven access to energy, food, water, or natural resources; such challenges necessitate comprehensive, multi-stakeholder approaches within states and, more importantly, multilateral or regional cooperation among states. In any case, none of the above-mentioned threats can be deterred or combated with nuclear weapons. Such weapons are thus increasingly condemned to irrelevance.
The other dimension of the new security environment compared to the one having led to the development of nuclear weapons is the fact that it is less state-centric and relies more on the contributions of non-state actors or factors that can be positive (civil society organisations, private sector, academic or scientific institutions) but also negative (criminal or terrorist organisations, traffickers, industry involved in irresponsible arms trade, uncontrolled private security companies, etc.). Today, there would not be treaties banning antipersonnel landmines or cluster munitions, and tomorrow hopefully an Arms Trade Treaty, without the initiative of and a decisive push from civil society organisations. The implementation of the Chemical Weapons Convention (CWC) would be impossible without the cooperation of the world chemical industry. To prevent the use of biological agents as weapons, cooperation between states, the industry and the scientific community is being developed. In order to launch national debates in nuclear-weapon states on the irrelevance of nuclear deterrence, it is good that former high-ranking military and political leaders now campaign in that direction and express credible views based on experience; more of such debates are needed especially in the countries where nuclear policy has been kept away from public scrutiny.9In the end, civil societies will demand more and more transparency, empowerment, and oversight, as can be seen in the countries undergoing revolutions and transitions. This will be an important component of decision-making towards nuclear disarmament: any particular lobby, whether in the political sphere or the military-industrial establishment, must be aware of the will of the vast majority of people nationally and internationally and should give up the arrogant ambition of ensuring uneducated or uninformed people’s security against their own will. Of course, the real challenge is to convince as a priority the civil society of the nuclear-weapon states and their allies, since in the other states, a majority is already persuaded of the irrelevance and dangers of nuclear deterrence. Needless to say, wherever lobbies have vested interests in maintaining nuclear deterrence, such interests will have to be catered to, by conversion to conventional or civilian work as it was largely done in the Russian industrial-military complex or in South Africa. Costs of such conversion could be shared internationally in the spirit of the G-8 Global Partnership, the results being in the interests of the whole international community.
4. The Conditions for a World without Nuclear Weapons
Once the process has started along these four tracks, it should be easier, especially for nuclear-weapon states and their allies benefiting from extended deterrence to consider that most of the conditions for a world without nuclear weapons mentioned in the UN Security Council resolution 1887 have effectively been fulfilled. In that sense, the nuclear-weapon states would not be credible if they continued to affirm that their ultimate security could still be achieved only with nuclear weapons. The above-mentioned “conditions” would then indeed appear as pre-conditions for moving ahead towards nuclear disarmament.
How to translate this situation into legally binding commitments that would ensure adherence by all the relevant states? Here again, two parallel tracks can be pursued.
• A Convention banning nuclear weapons has been proposed and endorsed by the UN Secretary-General, but is so far rejected by the US, Russia and France. It is true that nuclear-weapon states can have the legitimate impression that one puts the cart before the horse while they conceive nuclear disarmament as an incremental and conditional process. However, in 2008, a worldwide poll showed support for a Convention by 76% of the respondents, including those in nuclear-weapon states.10Without entering into the detail of the pro and con arguments, one can refer to the precedent of chemical and biological weapons despite the specific nature of nuclear weapons. There was first a prohibition of use in war in the 1925 Geneva Protocol; it was of course deemed insufficient and weakened by reservations, but there is no doubt that this prohibition played an important role in limiting the actual resort to such weapons. And the second, much later step was the prohibition of development and possession, in 1972 for biological weapons and 1993 for chemical weapons. It took time to elaborate effective mechanisms, especially for chemical weapons, to ensure confidence in the implementation of the obligations by all states parties. But in the meantime, the universal condemnation of use as well as decreasing military relevance of those weapons convinced most states not to acquire them or to renounce them. The same process could take place with regard to nuclear weapons: in the first phase, a general prohibition of use accepted by all nuclear-weapon states (including the non-NPT parties) would allow temporary possession until sufficient verification of elimination would be negotiated and put into place. International safeguards, for instance on de-alerting or non-deployment of weapons, could be introduced.
• Revival of the concept of general and complete disarmament (GCD) is occasionally proposed.11To the disarmament community, this concept may sometimes seem outdated or completely obsolete if not totally utopian. The fact is that, in Article VI of the NPT, all states parties “undertake to pursue negotiations in good faith” not only on “effective measures relating to cessation of the nuclear arms race at an early date and to nuclear disarmament but also “on a Treaty on general and complete disarmament under strict and effective international control.” It is important to stress that this obligation covers both aspects and that there is no conditionality between the former and the latter. After unsuccessful negotiation attempts during the Cold War, the goal of GCD was put on the agenda of the UN General Assembly in 1959, and appeared in the US-Soviet proposal called the McCloy-Zorin statement.12In that major document, GCD was defined as the goal of ensuring that states will have only “non-nuclear armaments, forces, facilities and establishments […] to maintain internal order and protect the personal security of citizens and to […] support […] a United Nations peace force.” This common goal was eventually adopted at the UN General Assembly Special Session on Disarmament in 1978.13But the Cold War environment and disagreements as the sequence (disarmament first or peace first?) prevented actual negotiations on a single treaty and the route of “partial measures” or the piecemeal approach was chosen, leading to separate multilateral agreements (the Partial Test Ban Treaty, the NPT, the Seabed Treaty, the Biological Weapons Convention, the Environmental Modification Convention, the Convention on Certain Conventional Weapons – CCW, – the CWC, the CTBT). This whole construction complemented the bilateral and regional disarmament treaties (including the nuclear-weapon free zones, or the Conventional Forces in Europe Treaty). In the multilateral framework, further progress was made in the adoption of Protocols to the CCW and the treaties banning antipersonnel and cluster munitions, as well as the UN Programme of Action on Small Arms and Light Weapons, some aspects of which have led to global or regional treaties. However important gaps remain: not all states are party to all instruments and some are non-compliant with their commitments, which may undermine the effectiveness of the treaties (e.g. in the case of the NPT); some critical armaments are not covered, such as missiles, which can be both conventional weapons and delivery vehicles of WMD but are subject only to voluntary transparency measures in the far-from-universal Hague Code of Conduct; military expenditures and arms sales continue to increase, often stimulated by the defence industry and/or state suppliers.
“In order to achieve cooperative security, major changes in the governance of the international system will need to be accelerated.”
One advantage of reviving the concept of GCD would be to offer a comprehensive and holistic view of all the current and potential categories of weapons likely to be used for offensive or destabilizing rather than defensive purposes, and all the interrelationships between them. It could defeat the argument consisting in refusing to deal with one category of weapon because other categories are deemed more threatening or destabilizing. This would force cooperation between policy makers and practitioners as well as non-state stakeholders dealing with only one category or one aspect, which often leads to deadlocks. It would also allow all sorts of mutual concessions and gains across the spectrum of security tools. If Israel felt less threatened by missiles from Iran, it could envisage more easily giving up its nuclear capability; in return, Syria and Egypt could join the ban on chemical weapons and Iran could accept limits of its nuclear programme. Similarly, if Russia felt less threatened by NATO’s conventional superiority and missile defence capabilities, it would be encouraged to reduce its reliance on nuclear weapons, and NATO Allies could in return agree to the withdrawal of US tactical nuclear weapons from Europe while continuing to benefit from extended deterrence in the transition towards nuclear disarmament.
Eventually, the GCD approach would also allow the UN Security Council to fulfil one of its roles according to Article 26 of the UN Charter, i.e. the “establishment of a system of regulation of armaments” “[i]n order to promote the establishment and maintenance of international peace and security with the least diversion for armaments of the world’s human and economic resources.” In sum, it would in fact amount to ensuring for all states defensive capabilities at the lowest possible level of armaments.
5. Conclusion
The world is already moving towards a new paradigm of cooperative security leading states, out of necessity, to cooperate to meet health, environmental and financial challenges. Interdependence means that success by one or a few benefits all, and failure by some endangers many. For this reason, in order to achieve cooperative security, major changes in the governance of the international system will need to be accelerated. Regional security architectures will need strengthening and a long-overdue reform of the UN Security Council will finally render it capable of implementing the concept of collective security which is at the heart of the UN Charter, along with peaceful settlement of disputes and an end to the “scourge of war.”
Ultimately, in such a win-win situation, all states and all stakeholders (apart from the spoilers) would acquire a feeling of global security, much stronger and more sustainable than mere national security dependent on unilateral choices, some of which, like nuclear deterrence, would appear irrelevant or an aberration in cost-effectiveness. This would be the best way of bridging the gap between the realist approach based only on national interests and the multilateralist approach promoting common goods.
1. French Ministry of Foreign Affairs, “France and Nuclear Disarmament”, 2010
2. Pierre Buhler, La puissance au XXIe siècle (Paris : CNRS Éditions, 2011)
3. Michael Moodie, Cooperative Security: Implications for National Security and International Relations. Volume 14 of Cooperative Monitoring Center occasional paper (Livermore: Sandia National Laboratories, 2000)
4. Christian Weidlichet al., “The First Two Steps to Cope Constructively with Military Asymmetries at the Middle East Conference (I) – Security Concepts and Motives behind Weapon Programs in Egypt, Israel, and Syria,” Academic Peace Orchestra Middle East Policy Brief No. 13
5. Diane Barnes, “Ex-Strategic Command Chief Floats Extended Deterrence Offer for Iran,” Global Security Newswire, 7th February 2013
6. Ayman Khalil and Marc Finaud, eds., “The Conference for a Middle East Weapons of Mass Destruction Free Zone – A Synopsis of Engagement of International and Regional Organisations, and Civil Society,” GCSP Report
7. Amy Woolf, “Conventional Global Prompt Strike Long-range Ballistic Missiles: Background and Issues,” Congressional Research Service
8. International Group on Global Security, “On-site Inspections: A Major Arms Control Verification Tool,” GCSP Report
9. Hans Born, “National Governance of Nuclear Weapons: Opportunities and Constraints,” DCAF Policy Papers, no. 15 (2006)
10. "Publics around the World Favor International Agreement to Eliminate All Nuclear Weapons,” World Public Opinion
11. “Strategic Concept for the Removal of Arms and Proliferation (SCRAP),” Centre for International Studies and Diplomacy
12. Randy Rydell, “Nuclear Disarmament and General and Complete Disarmament,” in The Challenge of Abolishing Nuclear Weapons, ed. David Krieger (New York: Transaction Publishers, 2009), 227-242
13. Ibid
* In the author’s previous career as a French diplomat, he was involved in several arms control and disarmament negotiations. He only expresses here his personal views. He wishes to thank Jonathan Granoff and Gustav Lindström for their contribution to this paper, which was presented at the meeting of the Berlin Framework Forum on 21 February 2013.
Federation of American Scientists, “Status of World Nuclear Forces”, Nov. 2012 (
§ In French, deterrence is translated to dissuasion which carries less connotation of terror and relies more on a rational decision to abstain from aggression.
US President Ronald Reagan and Soviet leader Mikhail Gorbachev met in the Icelandic capital in October 1986. Although the discussed ambitious disarmament plan was not finalized because of the disagreement on missile defence (Strategic Defense Initiative), it found some expression in the 1987 Treaty on the elimination of intermediate-range nuclear forces in Europe (INF Treaty).
About the Author(s)
Marc Finaud
Senior Advisor, Emerging Security Challenges Programme,Geneva Centre for Security Policy (GCSP)
|
Skip to content
k-Nearest Neighbours
What is it?
Building a kNN model consists only of storing the training data set
To make predictions for a new data point, the algorithm finds the closest data points the training data set
If using more than one neighbour, use the majority class among the nearest neighbors to assign label
Want to print your doc?
This is not the way.
) instead.
|
Palm Oil Tag
Factors affecting Palm Oil Prices
Palm oil is considered as one of the most highly produced and commercialized product in Malaysia. Malaysia is the second most palm oil producing country in Southeast Asia with a production of 21,000,000 metric tons of crude oil. This accounts just second to Indonesia that produces 36,000,000 metric tons of palm oil.
Palm oil has a very high demand due to the high output per hectare in comparison with other vegetable oil. Palm oil has many uses including food products, cosmetics, toiletries and biodiesel. The versatility of palm oil is just one of the many reasons that contribute to the high demand of crude palm oil. The palm oil industry is currently soaring high with high prices offered for the crude palm oil.
The supply and demand of palm oil plays an important role in affecting the prices of this product. Since oil palm trees are mostly found in the Southeast Asia, in the countries of Indonesia and Malaysia, the changing weathers in these countries affect the prices. During the dry seasons, there is relatively low production of oil palm seeds, leading to low production of palm oil. Therefore, the prices of palm oil increases during this period. Other than that, China and India are the main importers of palm oil. The increasing population growth in these countries contribute to the high demands of palm oil, and therefore, resulting in higher prices.
Oil Palm and Our Lives
Oil palm is one of the most beneficial cultivation products that could be found in Malaysia and other palm oil producing countries. Without noticing much, oil palm actually do play important roles in our lives. The palm oil industry produces edible oil from oil palm fruits. The oil is a good choice for cooking as it maintains its properties even under high temperatures during cooking. This enhances the taste of food while the creaminess and smoothness of the oil makes an excellent cooking ingredient.
Other than edible oil, palm oil is also used in daily personal care items such as bathing soaps, detergents and many other cleaning and beauty products.
Deforestation takes place at high rates for the plantation of oil palm trees. In order to create lands for the cultivation of oil palm, many acres of land are cleared daily around the country. At first, this leads to air pollution and animals lose their habitats. However, as the oil palm trees grow larger, the balance of the ecosystem can be returned. Animals take shelter in the plantations while the carbon cycle is balanced by the growing oil palm trees.
Other than that, millions of job opportunities are created by the oil palm industry. In Malaysia, it is estimated that around a total of one million jobs originate from this industry. These jobs include smallholder farmers, fruits pickers, tree planters, large companies, the import and export companies and various other jobs.
Palm Oil vs Global Food Security
The oil palm tree has many usages. It provides benefits from edible oils to biofuels and biochars while also being a food source for livestock. Therefore, almost all the parts of the fruits can be used to produce a useful product. Since the fruits of an oil palm tree can be used for both food and fuel, there is a debate of food vs fuel on whether to use the fruits more as a food source or as fuel.
Palm oil is a rich source of edible oils. Palm oil is a healthy and versatile substitute for traditional oils. The cholesterol-reducing property of palm oil is one of the most important points that make this oil so famous and widely used. Other than that, palm oil contains antioxidants, vitamin E, and carotenoids which help reduce the risk of cancer and heart diseases.
Other than being used for edible oil production, oil palm is also a good feedstock for biomass, biogas, and biodiesel production. A large amount of the oil palm fruits go to the production of these fuels. The main parts of the oil palm that are used for fuel production are the oil palm fruits, kernels, and shells. High-quality palm oil can be produced from these parts of the plant.
Since the parts used for both fuel and edible oil production are the same, the food vs fuel debate is present. Therefore, as both industries are equally important for the Malaysian economy, a proper balance should be reached in order to produce enough feedstock for the production for both food and fuel respectively.
Malaysian palm oil price up on expectation of better export data
The benchmark palm oil contract for September delivery on the Bursa Malaysia Derivatives Exchange was up 1.2% at 2,047 ringgit ($491) per tonne at the close.
KUALA LUMPUR: Malaysian palm oil futures jumped more than 1% on Wednesday as traders bet upcoming export data would overshoot forecasts.
Cargo surveyors and an independent inspection company had over Saturday and Monday reported more than 15% falls in exports for the June 1-15 period.
“The export rumour for June 1-20 period shows better numbers than in the earlier period,” a futures trader based in Kuala Lumpur said.
In other related oils, the Chicago July soybean oil contract was last up 0.5%.
The September soy oil contract on the Dalian Commodity Exchange fell 1.2% and the Dalian September palm oil contract was also down 0.2%.
Palm oil prices are affected by movements in related edible oils, with which it competes for global market share. – Reuters
Reference: By The Star OnLine – June, 20, 2019 @ 7:02am
|
Common Cause Of Lumbar Pain
Lumbar pain is usually a typical issue with an essential explanation for impairment worldwide. It’s estimated that around 50 % of all people practical knowledge back pain at some point in their everyday life. To help quick analysis, lower back pain is normally believed by most medical professionals to result from comfortable structure damage, with central pain occurring within the backbone, the top returning, or both equally. While this may be genuine in some conditions, most people who suffer from back problems will explain it as being composing of suffering just below the thigh joints, which can means that it’s not the result of soft muscle damage.
The most widespread mechanism which induces upper back pain is unusual or unbalanced backbone bone structure, , involving a decline of mobility within the important joints of the backbone as well as the muscle groups that help those people bones. Spinal decompression might result from several pathological situations, which include painful traumas (like slipping and encountering a wall membrane), degenerative situations like osteo arthritis, and changes in backbone healthy posture attributable to carrying a child, maturing, or sickness. Spinal decompression can also happen as a side effect of discerning surgical treatments. For example, when an operating individual is trim on the shank, the location where the spin is produced, a cuboid bone initiate evolves around the spin and rewrite. The area then begins to drive contrary to the other bones, causing the pack for the surrounding bones. The most common of those circumstances is scoliosis.
Other kinds of back pain involve sciatica pain, which result from a lot of smooth flesh inside the back again location lower back spondylosis, which be a consequence of a lot of muscle size on the lower back joint parts and thoracic store problem, which is caused by a slipped disk in the thoracic region. These problems will not contribute to any modification within the vertebrae components. Moreover, muscle tissue contractions while in the orthopedic technique may cause some kinds of low back pain. These include practicing tennis knee, tendonitis and bursitis cement adhesive capsulitis, as well as the painful effect of “practicing tennis shoulder”.
There are many kinds of issues that causes acute back pain, which includes degenerative back osteo-arthritis, which in turn causes the mid-foot on the spinal column to be less steady or painful and stenosis, which in turn causes a narrowing from the spine and nerves at the bottom of the spine. Both degenerative and stenosis makes it tough to stand up, go walking and relax and slowly move the shape. Spinal decompression can be used for many of these problems, because of the inability on the adjoining tissue and muscle mass to deliver plenty of steadiness.
Muscle contractions may be one of the cause of upper back pain, especially when they appear at nighttime when you are laying toned, as is the case for those who have just completed surgical treatment. Any time you lay chiseled, the gravitational pressure pulls your pelvis up, defining it as tricky to inhale and exhale and resulting in contractions inside surrounding back again muscle groups, which might come to feel such as a “sharpened” bolt. These bankruptcies are not the many possible the signs of a muscle mass spasm, on the other hand. Other symptoms consist of pins and needles and prickling, weak or perhaps hurtful peeing, decrease in bladdermanage and wooziness, absence of equilibrium, calfsuffering and faintness, and throwing up.
Muscle contractions may also be due to natural stress, such as when working out with major physical objects. The symptoms can then change from one individual to a different, for the way considerably anxiety was employed. Because of this, it usually is best if you focus on any back pain you’re going through that has a competent physio. A physiotherapist specializes in the treatment of and examining agony. They will be able to identify explanation for the anguish precisely what therapy is perfect for your ailment. And some signs and symptoms may appear quite critical, they will often simply be an indicator how the affected person continues to be overexerting them selves, or likely basically standing too rapidly, for a brief period of your energy.
There are lots of other more uncommon causes of upper back pain, like osteo arthritis, rheumatoid arthritis, and types of conditions for instance Paget’s illness. While Paget’s disorder is seen weak spot inside muscle tissue and delicate tissue, ankylosing spondylitis is seen as a difference with the spinal joint’s cartilage, contributing to severe a weakness. No matter whether you’ve got ankylosing spondylitis, you should see a physician to access the foot of your backbone suffering. A physician will examine the degree of your condition and assign this delay premature ejaculation pills.
Whether your suffering is due to an acute injuries, recurring motions, or a variety of each, you should bear in mind there are lots of programs accessible for lumbar pain. Should you be affected by the signs of low back pain, consult a professional to find an research of one’s condition. As soon as a medical diagnosis is created, your physio are able to assist you to program care system that provides you with rid of lumbar pain, as well as strengthen your overall health.
If you enjoyed this post and you would such as to get additional information relating to look at here now kindly browse through our own website.
A lot more strategies from highly recommended publishers:
Please click the following internet page
visit the following site
This Web-site
hop over to this web-site
Related Posts
|
1. The effect of paraffin wax embedding on the lability of glycogen in sections has been tested using as material (a) plerocercoid larvae of Ligula intestinalis; (b) rabbit liver.
2. It was found that glycogen in tissues was very impermeable to wax, and where large masses of glycogen occur prolonged embedding is essential.
3. Improperly embedded material lost glycogen easily; it was concluded that this loss takes place during the processes of cutting and flattening sections.
4. The effect of prolonged embedding was to make tissue hard and refractive. This difficulty was overcome by embedding in Steedman's ester wax.
5. Ester wax blocks allowed thin sections of very hard material to be cut with ease.
6. Ester wax sections brought down to water did not lose glycogen even after standing in water for 7 days.
7. It is emphasized that glycogen exists in two forms: an insoluble desmo- form and a soluble lyo- form. It is suggested that the latter does not dissolve from sections in water because its highly branched molecule is held by the coagulated protein network.
This content is only available via PDF.
|
Skip to main content
News Ticker
How to help koalas and bees in bushfire and drought-affected areas
By Mollie Gorman
Play Video. Duration: 31 seconds
Thirsty koala stops cyclist for drink in Adelaide during heatwave (Instagram: Bikebug2019 via Storyful)(Instagram: Bikebug2019 via Storyful)
Share this article
Well-intentioned people wanting to help injured or hungry wildlife after recent bushfires are turning to social media 'tips' that may be doing more harm and good.
Recent social media posts blamed the death of a young koala on being given water from a bottle. It later died from pneumonia.
Is giving bottled water to koalas really bad for them? Should you leave cut watermelon out for bees?
In a nutshell, experts say often the best thing to do if you want to help is to leave containers of pure water out.
Helping honey and native bees
A simple and popular fix for honey bees is said to be sugar water, or cut fruit.
But NSW Department of Primary Industries honey bee specialist Elizabeth Frost said it was counter-productive.
"Beekeepers are the best judge of what their hives' feeding requirements are, and when they supply honey in bulk to a packer, for example, they also need to supply management records of feeds," Ms Frost said.
She said leaving out fruit could encourage birds, which can then spread harmful bacteria. And native bees won't be interested at all.
Instead, she suggested keeping plants flowering for as long as possible, especially in bushfire and drought-affected areas.
"If there are any flowering plants surviving, keep them going, water them … Keep them pruned so that their flowering period is longer," she said.
Bees congregating around a metal tray filled with water and a brick.
One way of helping bees is to provide clean water sources for them with a textured surface to prevent drowning.(ABC Riverina: Moyra Shields)
Ms Frost said for honey bees the most helpful thing to do was to provide clean water.
"No reusing of containers that previously stored pesticides or cleaning chemicals, for example," she said.
A shiny gold native bee on a white tea tree flower.
This native bee of the leioproctus species is an example of a ground nesting bee that will have been affected by bushfires.(Supplied: Bees Business)
Both said it was important to think long term and plant bee-friendly flowers.
"But a lot of our bees are … generalist foragers and they will forage on all sorts of stuff."
Herbs and pot plants are quick to grow and long-flowering plants that both native and honey bees will appreciate.
For longer-term planning, Ms Frost suggested planting eucalyptus trees, bottlebrushes and tea-trees for their appeal to bees and drought-hardiness.
Koala beats the heat
A koala escapes the heat by taking a drink from a bucket of water.(Supplied)
Giving koalas bottled water
Video and photos of thirsty koalas accepting bottled water from firefighters, defence personnel, and cyclists have been commonplace this summer.
But in recent weeks an image of a young koala that died from pneumonia, apparently derived from being given water in that way, has been encouraging people to rethink their approach.
Wantirna Veterinarian Clinic senior veterinarian Alison Brown said well-meaning people could accidentally drown a koala by pouring water down their throat.
"A better option would be to present that water to them from your hands, or from a bowl that the koala can actually lap at their own pace, swallow at their pace.
Chairman of the Australian Koala Foundation Deborah Tabart said people should use common sense.
She said she did not want to discourage people from offering water to koalas in need and one way to help was to leave buckets or trays of water out for any species to access, especially in drought and bushfire-hit areas.
But she said a koala on the ground was "automatically sick".
"If you can wear gloves, if you can be like that lady with her shirt, take your shirt off and put it around the animal so you don't get injured. But the most important thing is just to get them to a vet as fast as you can," she said.
Two kangaroos on the side of the road in a strong orange smoke haze.
Wildlife in smoke-affected areas, like these kangaroos in Talbingo in the Kosciuszko National Park, need supporting after bushfires ravaged their habitat.(ABC Riverina: Mollie Gorman)
Ms Tabart said it was a good idea to always have a blanket and a pair of gloves in the back of the car.
"Especially if you're living in the bush. I would absolutely be prepared [with these items] in the back of your car," she said.
Dr Brown said it was important to stay alert when driving in areas where koalas could be.
|
KEY SCRIPTURE Proverbs 15:13 KJV” A merry heart maketh a cheerful countenance: but by sorrow of the heart the spirit is broken”.
We continue with the fruit of the Spirit. A merry heart is an expression of joy. In the book of Proverbs, there are three instances that it makes mention of a merry heart. All these three have a profound implication to us, and it is worth noting. Proverbs 15:13 says ” A merry heart maketh a cheerful countenance: but by sorrow of the heart the spirit is broken.” This simply means, a joyful heart straightens up the whole body, but a worried mind breaks up his spirit. but, according to Proverbs 18:14. ” The spirit of a man will sustain his infirmity; but a wounded spirit who can bear?” It is your spirit that keeps you holding on in difficult or trying moments. If your spirit is wounded as a result of various life situations, how can you stand up against difficult situations in life? Joy is the strength of the Spirit of man.
The next statement in Proverbs about a joyful heart or merry heart is Proverbs 15:15 “All the days of the afflicted are evil: but he that is of a merry heart hath a continual feast. Life offers both good times and bad times. Bad times can depress or keep one very down., yet the man who chooses to maintain a merry heart will not know any down moments. He has a continued feast. He is the man who declares my life is moving upward and forward, with no down moments. Whether you have an up and down life or a life of constant feast of excitement depends on your decision to maintain a merry heart.
The third and last instant declares “A merry heart doeth good like a medicine: but a broken spirit drieth the bones” Proverbs 17:22 Joy to the whole being is like medicine. It will boost your immune system. Sorrow and worry will dry up the bones. It will poison your system. Worry or joyfulness is a choice. To keep a joyful heart, always turn to what God says in His word and tell yourself, you believe what the word says. Start thanking the Lord and then sing songs to praise him for answered prayers. Refuse to be worried when negative thoughts come to your mind. Just say, ‘my God is in charge and everything is well with me’. Keep singing and making melody in your heart unto the Lord.
I have joy, joy like a river running through my soul. I have no down moments for I have chosen to rejoice
in all situations.
Ephesians 5:19 KJV Speaking to yourselves in psalms and hymns and spiritual songs, singing and making melody in your heart to the Lord;
Philippians 4:6 KJV “Be careful for nothing; but in everything by prayer and supplication with thanksgiving let your requests be made known unto God.”
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
In which year did the JavaScript Programming language come into existence?
This question was previously asked in
SSC CHSL Previous Paper 91 (Held On: 13 Oct 2020 Shift 2)
View all SSC CHSL Papers >
1. 1999
2. 2000
3. 1995
4. 1990
Answer (Detailed Solution Below)
Option 3 : 1995
Detailed Solution
Download Solution PDF
The correct answer is 1995.
• The JavaScript Programming language came into existence in 1995.
Key Points
• JavaScript is a programming language used in web development.
• It was developed by Netscape to add dynamic and interactive elements to websites.
• JavaScript is influenced by Java.
• It is a client-side scripting language.
• A JavaScript code can be inserted anywhere within the HTML of a webpage.
Important Points
• JavaScript is a scripting language that is used to develop websites.
• JavaScript helps to add functionality and behaviors to your website, allowing your website’s visitors to interact with content in many imaginative ways.
• In September 1995, a Netscape programmer named Brandan Eich developed a new scripting language in just 10 days.
|
Scientific American
American publication
Select Citation Style
Thank you for your feedback
Scientific American, American monthly magazine interpreting scientific developments to lay readers, the most highly regarded of its genre. It was founded in New York City in 1845 by Rufus Porter, a New England inventor, as a weekly newspaper describing new inventions. He sold it in 1846 to another inventor, Alfred Ely Beach—who had worked on the New York Sun under his inventor-editor father, Moses Y. Beach—and to a friend, Orson Desaix Munn. The era was rife with invention, and out of the paper’s familiarity with patents and the problems of inventors grew a thriving patent agency giving advice on patent law and procedures to such inventors as Thomas Edison and Samuel F.B. Morse. This in turn strengthened Scientific American. By 1853 its circulation had reached 30,000, and it had begun to report on various sciences—e.g., astronomy and medicine—apart from inventions. The paper early advocated subway transportation and in 1870 actually constructed a pneumatically operated subway of Beach’s design under a section of Broadway. It was operated experimentally for a year.
The paper had used woodcut illustrations since its founding, and it was one of the first to use halftones in the 20th century. It turned increasingly to reporting and explaining science to a curious public. In 1921 it became a monthly journal. Its articles, solidly based on scholarly research, well written, and carefully edited, are accompanied by definitions of scientific terms and by illustrations.
|
Copyright: © BVG
Industry of the future
The topics that will become more relevant for geoscientists in the next decades are diverse and challenging at the same time. Due to the change to a sustainable energy policy, completely new topics and questions arise, such as the final disposal of nuclear waste or CO2 storage. Other important topics are energy storage, battery technology and the associated lithium extraction.
Greener and more digital
The European Union's "Green Deal" makes it clear just how important the topics of "soil and water" are currently becoming. However, raw materials, water, infrastructure and environmental protection now have great national importance in almost all countries. [1] Environmental protection and the sustainable use of raw materials require a rethinking in many classic geoscientific professional fields. In the step towards a climate-neutral society, geosciences play a key role in the human-environment relationship.
Modern information technology is now greatly changing the work of geoscientists. Increasingly powerful databases relieve them of stereotypical routine activities. The production of relevant soil maps and modeling is also becoming easier. Nevertheless, geoinformatics remains a tool of the trade. The demands on the evaluation of data and thus on the technical expertise of each individual geoscientist are constantly growing. Incidentally, this is a competence that can only be automated to a limited extent. [1]
Industry in transition
Germany, like many other countries, is working intensively in the field of renewable energies because the German government's climate policy envisages a significant reduction in the use of fossil fuels over the next 20-30 years. Therefore, jobs, especially in the oil and coal industry, will decrease in the mentioned period if everything works out as politically planned in Germany.
This energy transition will challenge the new generation of oil/coal geoscientists worldwide. Qualified in these topics, but open-minded enough to reorient themselves - if necessary - in other areas of (sustainable) energy and resource procurement. The remaining question for students interested in the traditional fields of the oil and coal industry is how long this transformation will take and when and how quickly the associated job losses will follow in which part of the world. Depending on technological developments, this could happen within a generation of work, or it could take much longer....
[1] www.berufsreport.com/geowissenschaftler-die-zukunftsgaranten/
|
Observation, listening, asking and pulse feeling are the four basic methods in TCM diagnosis. They play an important role in the determination of disease and follow-up treatments. An experienced doctor shall fully understand the importance of these four methods by looking closely into every details of the symptoms, the patient’s physical conditions, and other clinical complications.
These four basic methods in diagnosis are not to be applied in fixed order but interchangeably according to factual conditions. Consideration shall be taken seriously when new symptoms are found or changes in the process have be noted. The exact cause or causes of the disease, its location, and reasons in pathology must be clearly analyzed and set in place before any formal treatment is carried out.
I am going to list only the main elements related to each of these four methods here.
Asking is a process when a doctor inquire about the health conditions of a patient with a specific purpose in mind.
In order to achieve this, a quiet and comfortable place is necessary so that the patient (and or someone who is accompanying him) can be at ease.
A doctor must show his care and kindness towards a patient, taking him as his own family member. A doctor must bear a positive attitude when he makes his inquiries. He should not show any pessimistic mood or gesture in front of a patient.
A doctor shall avoid using any technical terms that are difficult to understand. He is not encouraged to give hints to the patient for any information not related to this diagnosis. His questions shall focus on the main symptoms or causes of the possible disease.
General information to get from the patient might include the age, marriage status, kind of employment, family history of a certain disease, or specific aspects of his lifestyle. Questions related to these aspects are only for the purpose of understanding the real cause of the disease. Life habits like smoking or alcoholic play an important role in a patient’s health.
The main focus of asking shall be the most apparent symptoms: for instance, coughing with fever for 3 days, chest pain or heart discomfort. These inquiries help the doctor to understand the location, the seriousness and timing of the disease.
When asking about the present symptoms, a TCM doctor shall clarify whether they are of cold or heat nature, with or without sweats, the location of pain, whether the patient sleeps well or not, his appetite good or not, his stools normal or not, or menstrual discharge normal or not.
Observation is a process when a doctor looks carefully at the appearance of a patient with a view to understand his health conditions.
TCM holds that the human body is a miniature universe in itself, and a patient’s appearance, especially that of his face and tongue, reflects profound conditions of his inner health.
In order to achieve accuracy in observation, a TCM doctor must ensure his patient is exposed to enough natural brightness of sunshine or clinical light. His knowledge of physiology and anatomy helps his understanding of different parts of the body and their pathological conditions.
By an overall observation, a doctor looks at the spirit, color, form, and movements of the patient’s whole body. The spirit of the eyes, the color of the face, whether the patient has a thin/weak body or fat/strong body, whether his hands and feet can move freely, are all important signs to tell his general health conditions.
Partial observation of looking carefully into specific parts of the body gives the doctor a clearer picture of what the patient is suffering at most.
The size of the head, the condition of the hair, the movement of the mouth, the coating of the tongue, the rotten teeth, the color of the skin, the deformation of the limbs, all tell different stories of a patient’s health conditions.
Conditions of the tongue, wet or dry, white or red, smooth or rough, thin or thick coating, ect, give lots of information of a disease. TCM diagnosis pays special attention to the tongue conditions.
Another important factor to observe is the stool. Whether the patient goes to toilet normally, whether there is blood in stool, whether it is water-like or dark in color, they are all important signs of a possible disease.
Listening and Smelling
Listening and smelling is also very important in diagnosis. Through the voice of a patient, his breaths, speeches, coughs, heart beats, vomiting, burping, sighs, sneezing, abdomen sound, etc, or the smell from the patient’s body, discharged waste, a doctor can detect various complications of a patient.
The sound the patient makes is not only the result of movements of the mouth or nose, it is closely related to the functioning of the lungs, heart or kidney.
Under healthy conditions, the sound we make should be natural, clear, smooth, soft, and quick in responses. Young people and elderly make different sounds, people with different emotions of sadness or anger or happiness make different sounds. The voice of a patient, his snoring, sighs, cries of shock, weakness of breaths, is all different from what is natural. It is not difficult to tell the difference by a careful doctor.
A low and weak voice is generally related to a negative or cold nature symptom. A rough and sore voice often tells an excess of heat or humidity in the body that results in difficulty in breathing.
When a patient is in pain somewhere, like a stomachache or toothache, he makes painful voice or murmuring while toughing his belly or teeth.
When a patient is mentally ill, he speaks without reasoning, or lack of logic. Short of breaths can be a serious problem for the elderly.
Coughing can tell different stories with or without sound, with or without phlegm, dry or sticky phlegm.
Stronger heart beats may be the result of an excess of heat in the liver or high blood pressure; weaker beats my be the result of deficiency of the heart or lung functions.
Water sound in the belly may be the symptoms of cold nature deficiency of the stomach, spleen or intestines. Bowel gas may tell a different story of the same organs.
As to smells of the body, or part of the body, like bad smell of breaths, of sweats, of urine, of discharged waste, or the smell of vomiting, they are signs of different diseases in the liver, stomach, bowel or other digestive organs.
Pulse Feeling
Pulse feeling has a long history in China. Ancient records over 3000 years in the Book of History show some cases of diagnosis by pulse feeling. One of the most famous physicians Li Shizhen recorded 27 kinds of pulses, each relates to different syndromes of patients.
Pulse feeling is based on a philosophy with detailed and careful techniques of diagnosis. The locations of pulse points and their relation to different energy channels reflect the fundamental theory of TCM.
Our heart beats is closely related to pulse movements. Our qi or energy flow and blood flow is moved about the body along with the pulse channels. When the pulses are strong, the qi and blood flow are pushed in a positive way; otherwise, weaker pulses relates to weaker movement of the energy or blood flow.
As our qi and blood flows all across the body, into and out of different organs, detecting the pulse movements is a way to understand the functioning of different organs.
In pulse feeling, the location (most commonly the wrist), timing(morning or afternoon), sex and ages, build of a patient, are all factors for consideration.
Pulse feeling requires an exercise, some time of professional training and experience to put the techniques to test. The study of basic TCM theories helps improve the practice and is necessary for all practitioners to become experts in the job.
Non TCM practitioners are encouraged to learn this technique as well, for the benefits of themselves and the patients.
Talk to you next time.
Please enter your comment!
Please enter your name here
|
Are you eating enough fibre | Jaffa Fruit
Are you eating enough fibre
Spoiler alert: you’re probably not.
Unless you’re tracking the amount of fibre you eat each day, it’s likely you’re not getting enough of it in your diet. The UK Government’s advice on fibre says that adults should aim to eat 30 grams of the stuff each day. Yet many adults struggle to hit this target. It’s thought that, on average, adults in the UK manage only 18 grams.
The same pattern is repeated amongst children. Whilst their recommended daily intake of fibre is lower than that for adults, many children don’t consume enough of it each day.
What is fibre and why is it so important?
Fibre, also known as ‘roughage’, derives from foods that come from plants. It’s found in starchy carbohydrates such as fruit, vegetables, beans and lentils. Quick quiz question: How much fibre is a Jaffa easy peeler?* Answer below ↓
Fibre is an important part of a balanced diet for many reasons. We have known for a long time that fibre is important for our digestive health. It feeds our gut microbiome and helps to prevent us from getting constipated!
In recent years, scientists have uncovered strong evidence to suggest fibre has many other health benefits too. We now know that diets rich in dietary fibre can be linked to a lower risk of stroke, bowel cancer, heart disease and type 2 diabetes.
Eating high-fibre foods also leaves us feeling fuller for longer after we eat. This means a fibre-rich diet can be beneficial if you are trying to reduce the number of calories you’re consuming.
The NHS website has a recommended daily menu to help you hit your fibre target each day.
How can I increase the amount of fibre I’m eating?
The good news is, it’s easy to increase your daily intake of fibre by making a few small changes to your regular eating habits. Fruit, vegetables, wholegrains, beans, pulses, nuts and seeds are the foods you should be looking to eat more of it you want to start eating more fibre.
Some processed foods can also be great sources of fibre. When you’re buying these products, check the nutritional information on the packet to check whether they are ‘high in fibre’. Foods that contain 3 grams of fibre of 100 grams are regarded as a source of fibre and foods with 6 grams per 100 grams can claim to be ‘high in fibre’.
The NHS recommends having a high-fibre breakfast to kick-start your day the right way. A delicious bowl of porridge topped with some chopped nuts, a tablespoon of flax seeds and two Jaffa easy peelers would serve up to 12 grams of fibre. Alternatively, a breakfast of Jaffa orange chia pudding would include over 15 grams of fibre!
Jaffa Orange Chia Pudding
It’s also easy to introduce fibre as a snack into your daily food routine. A small handful of nuts and a piece of fruit can provide you with up to 5 grams of fibre, which will help to keep you feeling full until your next mealtime.
Is all fibre the same?
There are three different types of fibre which each have a different effect on our bodies. A healthy and balanced diet should include sources of each.
Insoluble fibre helps us to have a healthy digestive system. It passes through our bodies without breaking down, and by doing so it helps other foods to move through our bodies too. Good sources of insoluble fibre include wholegrains, vegetables, potatoes with their skin left on and nuts and seeds.
Soluble fibre works differently. It helps to keep things moving and so it helps to prevent constipation. Soluble fibre has also been shown to help lower cholesterol levels. It’s found in oats, rye, beans, pulses, some vegetables and fruit. In fact, two-thirds of the fibre found in Jaffa oranges is soluble (the other third is insoluble).
Resistant starch is the third recognised form of dietary fibre. Unlike insoluble and soluble fibre, resistant fibre isn’t broken down in our small intestine. Instead, it passes into our large intestine where it helps to keep us hydrated, satiated and healthy. It’s found in foods such as bananas, potatoes, rice and beans.
Can I take a fibre supplement?
It is possible to buy fibre supplements from pharmacies and health food shops. However, it’s best to get the fibre you need from whole foods if you can.
The best advice to follow is to eat a varied and colourful diet to increase your intake of all types of fibre! Try to eat fruit, vegetables, wholegrains, beans, nuts and seeds every day and you will soon be meeting your recommended fibre intake.
|
Astrophyllite - Encyclopedia
Class : Silicates
Subclass : Inosilicates
Crystal system : Triclinic
Chemistry : (K,Na)3 (Fe,Mn)7 Ti2Si8O24 (O,OH)7
Rarity : Uncommon
Astrophillite is a complex silicate of iron, potassium and titanium in which iron can be completely replaced by manganese, forming a continuous series with kupletskite ; titanium can also be substituted by niobium or zirconium. It takes its name from the Greek astron (star) and phullon (leaf) because of its foliated look and brilliant luster. It is a classic silicate of alkaline rocks, mainly sodalite and nepheline syenites and their pegmatites, more rarely fenites. It accompanies sodalite, nepheline and aegyrine. Astrophillite resembles a brown biotite : the crystals are usually lamellar with hexagonal or rhombic contours, frequently united in radiating aggregates, with a perfect basal cleavage. The color is brown, sometimes brown-yellow. Unlike micas, astrophyllite crystals are brittle and non-flexible. It is a mineral that can be cut in cabochon for jewelery.
41.00 ct astrophyllite from the Kola Peninsula, Russia
34.50 ct astrophyllite from the Kola Peninsula, Russia
24.80 ct astrophyllite from the Kola Peninsula, Russia
32.00 ct astrophyllite from the Kola Peninsula, Russia
Astrophyllite in the World
Astrophyllite crystals up to 10 cm were found in the alkaline syenites of the Ilimaussaq complex near Narssaq (Greenland), Mount St-Hilaire (Canada), and in the nepheline syenite Kola peninsula in Russia (Lovozero, Khibiny).
Astrophyllite in France
In France, astrophyllite is present in the alkaline granites of southern Corsica (Evisa, near Porto).
Fakes and scams :
No fake inventories for this mineral species.
Hardness : 3
Density : 3.2 to 3.4
Fracture : Irregular
Streak : Brown
TP : Opaque to translucent
IR : 1.680 to 1.730
Birefringence : 0.050
Pleochroism : Weak
Fluorescence : None
Solubility : Hydrofluoric acid
Magnetism : Paramagnetic
Radioactivity : None
|
Golf 101: Rules
Golf 101: Rules
Posted at 12:42 PM, Mar 10, 2021
and last updated 2021-03-16 13:42:57-04
While golf can have a complicated scoring system and many nuanced rules, the standard premise can be boiled down to three rules:
1. Play the ball as it lies.
2. Play the course as you find it
3. If unable to do either rule No. 1 or rule No. 2, do what is fair.
The rules for the Olympic tournament are based off of the standardized rules as set forth by the R&A and USGA - the governing bodies for rules of golf. Prior to 1952, the two organizations had separate rules with the main difference being the size of the standard golf balls, but after 1952 the two groups put in place a unified set of guidelines.
With no referees or umpires supervising each hole, golf largely relies on the honesty and integrity of the individuals competing. Rules dictate that players should conduct themselves in a disciplined manner, display courtesy and sportsmanship to their competitors. This is known as the spirit of golf.
Presently, there are 34 rules with various sub rules and caveats attached to many of them, but the main objective of golf is to hit the ball off of the tee and make it into the hole in as few strokes as possible. Read the full rules here.
In stroke play, the competitor that completes a round (typically 18 holes) in the fewest strokes is the winner of that round. Broken down, the number of shots it takes for a player to make the ball in each hole is tallied and at the completion of a round, the lowest score wins. For Olympic purposes, the lowest cumulative score over four rounds will be declared the winner.
In the event of a tie for first, second or third place at the end of 72 holes, a playoff or multiple playoffs will be used to decide gold, silver and bronze medal-winners.
|
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
Data Management: Past, Present, and Future
Extracts from this document...
Data Management: Past, Present, and Future Jim Gray Microsoft Research June 1996 Technical Report MSR-TR-96-18 Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052 This paper appeared in IEEE Computer 29(10): 38-46 (1996) IEEE: (c) 1996 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Data Management: Past, Present, and Future Jim Gray, Microsoft Research, 301 Howard St. San Francisco, CA 94105, 415-778-8222 Gray@Microsoft.com.DRAFT Abstract: Soon most information will be available at your fingertips, anytime, anywhere. Rapid advances in storage, communications, and processing allow us move all information into Cyberspace. Software to define, search, and visualize online information is also a key to creating and accessing online information. This article traces the evolution of data management systems and outlines current trends. Data management systems began by automating traditional tasks: recording transactions in business, science, and commerce. This data consisted primarily of numbers and character strings. Today these systems provide the infrastructure for much of our society, allowing fast, reliable, secure, and automatic access to data distributed throughout the world. Increasingly these systems automatically design and manage access to the data. The next steps are to automate access to richer forms of data: images, sound, video, maps, and other media. A second major challenge is automatically summarizing and abstracting data in anticipation of user requests. These multi-media databases and tools to access them will be a cornerstone of our move to Cyberspace. 1. Introduction And Overview Figure 1: The six generations of data management, evolving from manual methods, through several stages of automated data management. Computers can now store all forms of information: records, documents, images, sound recordings, videos, scientific data, and many new data formats. ...read more.
Rather than implicitly storing the relationship between flights and trips, a relational system explicitly stores each flight-trip pair as a record in the database. This is the "Segment" table in Figure 2.d. To find all segments reserved for customer Jones going to San Francisco, one would write the SQL query: Select Flight# From City, Flight, Segment, Trip, Customer Where Flight.to = "SF" AND Flight.flight# = Segment.flight# AND Segment.trip# = trip.trip# AND trip.customer# = customer.customer# AND customer.name = "Jones" The English equivalent of this SQL query is: "Find the flight numbers for flights to San Francisco which are a segment of a trip booked by any customer named "Jones." Combine the City, Flight, Segment, Tip, and Customer tables to find this flight." This program may seem complex, but it is vastly simpler than the corresponding navigational program. Given this non-procedural query, the relational database system automatically finds the best way to match up records in the City, Flight, Segment, Trip, and Customer tables. The query does not depend on which relationships are defined. It will continue to work even after the database is logically reorganized. Consequently, it has much better data independence than a navigational query based on the network data model. In addition to improving data independence, relational programs are often five or ten times simpler than the corresponding navigational program. Inspired by Codd's ideas, researchers in academe and industry experimented throughout the 1970's with this new approach to structuring and accessing databases promising dramatically easier data modeling and application programming. The many relational prototypes developed during this period converged on a common model and language. Work at IBM Research led by Ted Codd, Raymond Boyce, and Don Chamberlin and work at UC Berkeley led by Michael Stonebraker gave rise to a language called SQL. This language was first standardized in 1985. There have been two major additions to the standard since then [5], [6]. ...read more.
What are the rights and responsibility of people operating in Cyberspace? Our grandchildren will probably still be wrestling with these societal issues 50 years hence. The technical challenges are more tractable. There is broad consensus within the database community on the main challenges and a research agenda to attach those problems. Every five years, the database community does a self-assessment that outlines this agenda. The most recent self-assessment, called the Lagunita II report [8], emphasizes the following challenges: * Defining the data models for new types (e.g., spatial, temporal, image, ...) and integrating them with the traditional database systems. * Scaling databases in size (to petabytes), space (distributed), and diversity (heterogeneous). * Automatically discovering data trends, patterns, and anomalies (data mining, data analysis). * Integrating (combining) data from multiple sources. * Scripting and managing the flow of work (process) and data in human organizations. * Automating database design and administration. These are challenging problems. Solving them will open up new applications for computers both for organizations and for individuals. These systems will allow us to access and analyze all information from anywhere at any time. This easy access to information will transform the way we do science, the way we manage our businesses, the way we learn, and the way we play. It will both enrich and empower us and future generations. Perhaps the most challenging problem is understanding the data. There is little question that most data will be online - both because it is inexpensive to store the data in computers and because it is convenient to store it in computers. Organizing these huge data archives so that people can easily find the information they need is the real challenge we face. Finding patterns, trends, anomalies, and relevant information from a large database is one of the most exciting new areas of data mangement [7]. Indeed, my hope is that computers will be able to condense and summarize information for us so that we will be spared the drudgery searching through irrelevant data for the nuggets we seek. The solution to this will require contributions from many disciplines. ...read more.
The above preview is unformatted text
Found what you're looking for?
• Start learning 29% faster today
• 150,000+ documents available
• Just £6.99 a month
Not the one? Search for your essay title...
• Join over 1.2 million students every month
• Accelerate your learning by 29%
• Unlimited access from just £6.99 per month
See related essaysSee related essays
Related AS and A Level Computer Science essays
1. Marked by a teacher
3 star(s)
Visualisation of a design is another benefit. We all know how difficult it is to picture an end-product from a paper specification. By creating prototype models and simulations we can improve our understanding of what is to be developed. Once a prototype has been created for a project, it is easy for everyone to gain a 'sneak
2. Marked by a teacher
The software that manages a database is called a Database Management System (DBMS). The ...
3 star(s)
track of the book number; 'Book ID'also appears in the 'Member' table. Assuming that 'Book ID' is a unique identifier, or primary key, of the book table, a foreign key relationship is established by which the book and member tables can subsequently be joined.
1. The Seven Domains of IT Infrastructure
Computer systems connected by hubs contribute to sniffing attacks. Switches that are used to connect systems together can reduce the likelihood of sniffing attacks. The LAN Domain and the WAN Domain is connected by what is known as the LAN-to-WAN Domain. The LAN Domain is a trusted zone and the WAN Domain is an untrusted zone.
2. Information Technology:Programming. A record is a collection of related data which is stored in ...
The file is organized like a One dimensional table on disk where each records is part of the table.The record number acts like a table index to allow you to find the records You can access a record directly or randomly by calculating its location using a mathematical formula and going directly to the record.
1. Explain sequence, selection and iteration as used in computer programming; outline the benefits of ...
These therefore make perfect additions to a program which utilise If statements, loops, or other scenarios where comparisons between data are made. The size of the Boolean in memory depends on the language being used. In .NET, it is 4 bytes (32 bits)
2. System Analysis The aim of the Jewellery store system is to make the work ...
Acceptance Testing Acceptance criteria is the agreement made between the user and the system developer. The acceptance criteria contains a list of important requirements that the system has to satisfy. The tests conducted to check the acceptance criteria are called acceptance testing.
1. Computer systems assignment 1
If it is read by the computer I Click on the icon of CD-drive to explore the content of the CD. After that I look for an icon "Setup" and double click on it to start the installation process. In the main setup window I can see that it is
2. The purpose of this coursework is to design a network for a small to ...
There are different types of licensing available for companies considering the volume of clients on the network the recommended licensing would be the open value subscription. This will give the company the chance of upgrading software during their subscription and being able to change the licensing count.
• Over 160,000 pieces
of student written work
• Annotated by
experienced teachers
• Ideas and feedback to
improve your own work
|
Home > Sample chapters > Programming > Visual Studio and .NET
Discovering the Domain Architecture
• 9/10/2014
We dare say that the software industry moved from one extreme to the other. Decades ago, writing software was inspired by the slogan “model first, code later.” This led to considerable efforts to have a big comprehensive design up front. There’s nothing wrong with an upfront design, except that it is like walking on water. It’s definitely possible if requirements, like water, are frozen.
Maybe because of global warming, requirements hardly ever freeze these days. Subsequently, whomever embarks in an upfront design risks sinking after only a few steps.
Mindful of failures of upfront design, architects and developers moved in the opposite direction: code first, model later. This philosophy, although it is awkward, moves things ahead. It just works, in the end. Adopting this approach makes it hard to fix things and evolve, but it delivers working solutions as soon as possible, and if something was wrong, it will be fixed next. Like it or not, this model works. As our friend Greg Young used to write in his old posts, you should never underestimate the value of working software.
What we’re trying to say, however, is that some middle ground exists, and you get there by crunching knowledge and deeply understanding the domain. Understanding the domain leads to discovering an appropriate architecture. However, it doesn’t have to be a single, top-level architecture for the entire application. As you recognize subdomains, you can model each to subapplications, each coded with the most effective architecture. If it still sounds hard to believe, consider that it’s nothing more than the old motto Divide-et-Impera that—historians report—helped Julius Caesar and Napoleon to rule the world.
|
Question: How Do Singers Write Music?
How do you write singer songwriter?
1. Compose a catchy melody.
2. Use all types of chords.
3. Create a memorable rhythm.
4. Build your song around a riff.
5. Write a song you can play live.
6. Step away from your instrument to write.
7. Get ambitious with song structure.
Who is the richest songwriter?
What famous singers write their own songs?
15 Singers Who Still Write Their Own Hits
• Sam Smith. Smith co- wrote every track on his Grammy-winning debut album In the Lonely Hour (2014) with no more than two additional co-writers (except “Stay with Me” which also features Tom Petty…
• Taylor Swift.
• Beck.
• John Mayer.
• Sia.
• Lady Gaga.
• Pharrell.
• Ellie Goulding.
Why is songwriting so hard?
Why is songwriting so hard? Songwriting is a creative process by nature. As such, there isn’t a specific formula to come up with the answer like there is in algebra, for example. Songwriter’s imaginations can get derailed by outside distractions making it difficult to create song ideas.
Can you make music with just a laptop?
You can make music on a laptop, using appropriate software. However, the less memory on your computer, the less useful a laptop will be for making music. You can record music at home using software on your computer or by using more expensive equipment as part of a home recording studio.
You might be interested: How To Write Sad Music?
Which app is best for making songs?
Ten of the best music – making apps for beginners
• Figure (Free) iOS.
• Sing! Karaoke (Free + IAP)
• Ninja Jamm (Free + IAP) Android / iOS.
• GarageBand (£3.99) iOS.
• Magic Piano (Free + IAP) Android / iOS.
• Loopimal (£2.49) iOS.
• Scape (£8.99) iOS.
• Music Maker Jam (Free + IAP) Android / iOS.
How do you make music at home without equipment?
A digital audio workstation (DAW) is really all you need, which is a software used for recording, editing, and producing music. You can actually download a free DAW to your computer or phone right now and have absolutely everything you need to start on your first track.
What should I start a song with?
• Start with a drum loop.
• Start with a chord progression.
• Start with a groove.
How can I make a song happy?
Leave a Reply
Related Post
|
How Smart Are Sheep?
What is the intelligence level of a sheep?
Sheep have very good memories. They can remember at least 50 individual sheep and humans for years. Contrary to popular belief, sheep are extremely intelligent animals capable of problem solving. They are considered to have a similar IQ level to cattle and are nearly as clever as pigs.
Are sheep intelligent animals?
Reality: Sheep are actually surprisingly intelligent, with impressive memory and recognition skills. They build friendships, stick up for one another in fights, and feel sad when their friends are sent to slaughter. They are also one of the most destructive creatures on the planet.
Are sheep smarter than goats?
Goats tend to be much more independent and curious than sheep, who adhere tightly to flock mentality and can appear aloof to humans. This difference often makes people assume sheep are less intelligent than goats and, I won’t lie, I’ve fallen to using this label as well.
Do sheep Recognise their owners?
Sheep have demonstrated the ability to recognise familiar human faces, according to a study. It shows that sheep possess similar face recognition abilities to primates. Previous studies had shown that sheep could identify other sheep and human handlers that they already knew.
You might be interested: Often asked: How Many People Buy Sheep Products?
What is the stupidest animal?
List of the Dumbest Animals in the World
• Ostrich.
• Flamingo.
• Panda Bear.
• Turkey.
• Jerboa.
• Goblin Shark.
• Sloth.
• Koala.
Can sheep recognize human faces?
The results of our study show that sheep have advanced face-recognition abilities, similar to those of humans and non-human primates. Sheep are able to recognize familiar and unfamiliar human faces.
Can sheep cry tears?
Can sheep survive without humans?
Why do sheep cry at night?
Once the lambs have mothered up (bonded with their mums, to you and me) it is best to get them away from people and out into the fields. This is why at night you will often hear ewes and lambs baaing and bleating to each other, so that they can pair up. This is why they make such a lot of noise at night time.
Why do sheep headbutt humans?
Headbutting is a dominance behavior in sheep. Sheep headbutt to establish dominance. This could be with other sheep or with people. Headbutting usually happens when a pair of rams both think they should be the one in charge of the pasture, so a challenge starts.
You might be interested: Question: What Is Sheep In Spanish?
What is the smartest farm animal?
Pigs are one of the most intelligent species on the planet, just as elephants and dolphins. They learn faster than dogs or primates and their intelligence is compared to that of a three year old child. Cows have excellent problem solving skills that involve logic.
What’s the smartest animal in the world?
The Smartest Animals In The World
• Chimpanzees are better than humans in some memory tasks.
• Goats have excellent long-term memory.
• Elephants can work together.
• Parrots can reproduce sounds of the human language.
• Dolphins can recognize themselves in the mirror.
• New Caledonian crows understand cause-and-effect relationships.
Can sheep Recognise smiles?
Like various other species, including humans, sheep make different vocalizations to communicate different emotions. They also display and recognize emotion by facial expressions and prefer a smile to a frown⁴.
How long can sheep remember faces?
“We know that sheep can not only recognize other sheep, they can remember some faces of sheep for up to two years,” said Keith Kendrick, a neuroscientist at the Babraham Institute in Cambridge, England who authored the study in this week’s issue of the journal Nature.
How can sheep see behind themselves?
Sheep can see behind themselves without turning their heads. Sheep have large rectangular pupils, which provide them with a peripheral and a panoramic vision ranging approximately 270º. This allows them to even see behind themselves without turning their heads.
Leave a Reply
|
Balance Sheet Defined and Explained
A balance sheet is a financial accounting document provided by a publicly traded company to the public interest summarizing the company's assets, liabilities, and capital. In particular, it details the balance of income and expenditure over a period of time.
What is a Balance Sheet
This financial paperwork is very important to the average investor because it shows how well a company is doing financially.
You, as an investor, don't want to invest in a company that isn't doing very well, for instance, holding more liabilities than they can afford.
It's just like looking at your own personal budget. It shows specifics like the worth of assets held, the amount of liabilities owed, the amount of revenue during the reporting period, the amount going to pay off liabilities.
But a company's balance sheet is a lot more complicated and vital to the valuation of their stock price.
A Balance Sheet Can be Summarized into the Following Equation
Assets = Liabilities + Shareholders' Equity
In order for the document to be correct, each part of the equation above must balance out.
An Actual Financial Snapshot from Ford Motor Company
Ford Motor Company Balance Sheet
Overall, it is a picture, at the current time, showing where the company's finances are at that particular moment. It doesn't go into explicit detail. It shows "Inventories - Total" in the Assets, but isn't specific about what all is contained within the Inventories.
It shows no trends, but is a valuable tool when compared against other sheets from other periods or when comparing data from other companies within a particular market sector.
Now this one has five years of data on it, so it can show some kind of trend, primarily, whether the company is growing steadily or remaining pretty much the same throughout the five year time frame.
As you can see, each year's Total Liabilities balance out with the assets.
There are other financial documents included such as a Cash Flow statement and Income Statement and each can tell you a little bit more about the company.
You should always research the company before investing in them. Once all of your signals point toward buying the stock, take a look at the company profile, see what the company does for income, look back in time as far as you can and check out the history of the stock, read the news about the company, and by all means, look over the balance sheet and other financial documents to see if the stock is a strong buy.
Get a free copy of Extreme Stock System. Click here to find out how.
New! Comments
|
What Does Coronavirus Mean for the UK’s Farmed Animals?
We can’t escape the impact of coronavirus, and its effects are changing life as we know it. With entire nations experiencing government-enforced lockdowns and masses of people being told to self-isolate, these are unprecedented times for everyone.
There is some speculation regarding the source of the virus. However, current scientific research leads us to believe that it originated in bats, who passed it to the pangolin, an endangered wild animal eaten as a delicacy in many parts of the world, and this has resulted in the coronavirus pandemic.
Eating animals is deeply engrained into many global cultures and still for many people it is the norm. Despite this, in recent years there has been a significant shift in consumer behavior and veganism has exploded. Increasing numbers of people are understanding the devastating effect that livestock farming and animal products are having on our health, the planet and animals.
Although many people are reducing their consumption of animal products, more than 70 billion animals are farmed and slaughtered worldwide each year for food. As coronavirus has spread across the planet, increasing numbers of people are being forced to work from home or not work at all, in an attempt to contain the spread of the virus.
What impact is coronavirus having on farmed animals in the UK?
Young pigs in a Swedish factory farm. Image credit Jo-Anne McArthur / Djurrattsalliansen.
The National Pig Association (NPA), the UK’s leading pig farming association, has reported that one of its major concerns during the coronavirus pandemic is staff shortages. Their concerns are legitimate as infection rates continue to rise and more workers are forced to self-isolate.
Lobbying from industry organizations like the NPA and National Farmers Union arguing that livestock farmers are critical to the country’s response to the coronavirus outbreak, has resulted in farmers being listed as “key workers,” allowing them to work during lockdown. This also means that regardless of decreased staff numbers, livestock farms, slaughterhouses and processing plants may be running on skeleton staff.
The chicken, egg, pork, beef and dairy industries generally have higher numbers of employees than crop growing farms and typically these workers are in close proximity to each other, usually inside large barns or sheds. Often overcrowded and unsanitary, these environments are a breeding ground for bacteria and disease, resulting in many farmed animals being routinely fed antibiotics to fight off infection. Although many livestock farms use automated machinery to carry out tasks such as feeding and milking, a large number of tasks still require human involvement – including artificial insemination, the administration of medication, washing down stalls and general site maintenance.
The United Kingdom’s government has failed to create new guidelines to protect the welfare of farmed animals during staff shortages. With the peak of the pandemic due in the coming weeks, there is little hope for the welfare of farmed animals as staffing numbers decrease.
Inspections reduced and cancelled
Vegan campaigning charity Viva! have investigated numerous Red Tractor approved farms, including pig, egg-laying, turkey and dairy farms and discovered shocking animal welfare issues across the board. The charity says the scheme is nothing more than an elaborate marketing ploy, leading consumers to believe animals are reared under some of the “highest animal welfare standards” in the world. The Red Tractor label suggests farmed animals have sufficient access to freedoms including “the right living space, food, and water and are healthy” whilst boasting credentials such as food “traceability, safety and animal welfare.”
A cow in an Israeli dairy farm. Image credit Jo-Anne McArthur / We Animals.
Viva!’s high-profile investigation into the Warwickshire-based pig farm, Hogwood, which carried the Red Tractor seal of approval, was found to supply supermarket giant Tesco through pork processors Cranswick PLC. The charity carried out four separate investigations over the course of three years.
On each and every visit they discovered sick and dying animals abandoned in gangways, severely overcrowded sheds festooned in filth and cobwebs and multiple instances of cannibalism as well as widespread ear and tail biting. All of these findings were officially reported to Red Tractor and only on the fourth and final investigation in 2019 did Red Tractor acknowledge the welfare issues and take action by dropping the farm with immediate effect. Whilst these investigations progressed, a Daily Mail article revealed that only one in 1,000 Red tractor inspections went unannounced, providing farmers with the opportunity to make farm conditions presentable and remove evidence of questionable practices in time to welcome inspectors on site, deeming the inspections totally worthless.
On March 20th, 2020, Red Tractor announced its suspension of “physical” inspections as a result of the coronavirus outbreak. The day before this, the Agriculture and Horticulture Development Board (ADHB) declared suspension of its Pig Health Scheme Assessment, which monitors the health of pigs sent to slaughter, until further notice, also because of the coronavirus pandemic. Pig meat conglomerates Tulip Ltd and Cranswick PLC are businesses due to be inspected by the ADHB, both having been exposed by Viva! for horrendous animal welfare breeches in their supply chain. The suspension of inspections in an industry with major existing welfare problems raises the question of how farmed animals will fare during the pandemic. It’s likely that the suspension of inspection schemes such as the ADHB’s will cause concerns about the health of the animals when they are sent to slaughter. This fact seems to have been overlooked by industry.
Increased demand and lower profit margins for farmers
There has been much hysteria and panic caused by the coronavirus pandemic, resulting in masses of people bulk buying and stockpiling food. The meat, egg and dairy industries are experiencing a spike in demand for products. A recent ITV news piece speaks to a Cornish dairy farmer who claims “We have seen a huge demand for milk and meat from people. Industry group ADHB warns “revenues will be seriously reduced, and cash flows stretched” due to increased demand for dairy. A community farm near Mansfield has already reported plans to euthanize animals, claiming they cannot afford to feed the animals. The impact of increased consumer demand is clearly putting a strain on an already struggling industry. When profits are dwindling animal welfare becomes even less of a priority.
Factory-farmed turkeys in Sweden. Image credit Jo-Anne McArthur / Djurrattsalliansen.
Viva!’s founder and director, Juliet Gellatley, explains her concerns for the welfare of farmed animals in these unprecedented times: “The shockingly poor welfare of farmed animals has always been seen by the government and industry as an unfortunate by-product of feeding the masses. Farmed animals are treated as commodities with no regard for their emotions, suffering or their basic right to life. Time and time again Viva!’s investigations have exposed the brutal reality of farming in Britain on free-range, organic and intensive farms.
“Our two most recent investigations have been Red Tractor approved and have exposed shocking animal welfare breaches, demonstrating a total disregard for animal welfare.
“I have grave concerns for farmed animals as the nation focuses on the pandemic. As industry-funded assurance schemes stop their pre-arranged inspections, as ineffective as they are, one can only wonder what atrocities are taking place behind closed doors as staff numbers dwindle and farmers are left to their own devices.”
Farmed animal welfare is a highly contentious subject, with organizations like Viva! demanding an end to all farming and encouraging the world to choose vegan. The meat industry has failed to acknowledge that the farming system is broken and that the myth of British farms having the highest welfare standards is a lie.
As staffing numbers dwindle during this pandemic, which they undoubtedly will, and assurance schemes postpone inspections, our current poor animal welfare standards are likely to become even worse.
Featured image: pigs in a Spanish factory farm. Image credit Jo-Anne McArthur / Animal Equality.
Print Friendly, PDF & Email
About Author
Leave A Reply
|
The plummeting prices of renewable energy come with hidden costs
The low prices of renewable energy globally have made it more affordable than electricity produced from fossil fuels. However, the cost of fusing the renewable energy mix to an electric grid is high due to its diversity. Researchers are still analyzing the possible price of putting renewable energy into an electric grid to facilitate its distribution to consumers. Imperial College London’s Philip Heptonstall and Robert Gross have evaluated the cost of supplying renewable energy to an electric grid for transmission. The two scientists concluded that this process’s real cost is either complicated or depends on other variables in the energy mix. Nevertheless, this cost is still low compared to utilizing fossil fuels to generate electricity.
The two scientists classified the added costs of renewable energy into three classes. First is the dynamic nature of weather patterns risking the estimated cost of a continuous supply. Next is renewable energy’s capacity to overcome the peak demand period considering there will be days when the weather will be unfavorable. Finally, the cost of infusing renewable energy into the current grid may exceed the available capacity. The last variable is of less importance considering many offshore wind power projects are close to metropolitan areas. Therefore, it is hard to fix a figure required to generate renewable energy since these factors may vary depending on renewable energy sources’ location.
For instance, nuclear power plants find their way far from cities to avoid the catastrophic effects that come with them in case of accidents. On the other hand, hydroelectric power depends on the water source’s physical location, making the cost of its integration into the national grid dependent on entirely different factors. Wind and solar energy can surpass fossil fuels if their potential comes out wholly. A study by Heptonstall and Gross identified the UK market as one where these two renewable sources have successfully attempted this noble course. Nevertheless, the UK is also bracing itself for higher costs of generating renewable energy to supplement the coal-fired electricity plants, stopping their operations from paving the way for the uptake of renewables.
Nonetheless, the prices of renewable energy will plummet once their full potential is visible. Additionally, renewables’ price assures that the world would be approaching net-zero carbon emissions since the costs being paid for champion eco-friendliness. To conclude, a flexible grid, high accessibility to renewables, and the availability of storage facilities for this energy will meet the electricity demands when they arise. The pursuance of these technologies to the latter will demonstrate the efficiency of renewable energy and its affordability.
Mechanics are afraid of working on electric vehicles
Veteran mechanic Klaus Uebelacker has the idea that mechanics fear the changes that come with electric vehicles. This mechanic has lived his life around cars working with Mercedes-Benz from the training level to the expert level. He is currently teaching at the Kwantlen Polytechnic University’s automotive program to make more engineers capable of handling both the ICE models and electric vehicles. He understands that electric vehicles pose a new challenge to the mechanics working perfectly on the internal combustion engines. He stated that a few mechanics could work on the hood of an electric vehicle citing the new technology as the basis for his analysis.
Uebelacker explained that the automotive industry must brace itself to handle these new models considering that the pollutive ICE cars face a scrap-off. He cited the electric vehicles’ complexity as the fear for mechanics hoping that car manufacturers can take in more interns to learn the operation, maintenance, and repair of these systems. The veteran attributed his successful completion of the British Columbia Institute of Technology (BCIT) EV maintenance training program to his desire to stroll around new car designs. He managed to see through the program early this year and hopes to utilize his newly acquired skills to train mechanics to operate the electric cars.
Uebelacker observed that the institution is the only place where trainees can face electric vehicles and handle them in their training sessions. The trainees can remove component by component, studying each item before assembling the whole car following the trainers’ assistance. Mubasher Faruki of CleanBC, which is in charge of the BCIT program, explained that the need to minimize pollution from the transportation industry had created the demand for technicians and mechanics who can handle electric vehicles. He said that this initiative would help train the technicians to be versatile with the technology that comes with electric cars. Additionally, the government has given out $10 million to aid technicians’ training to accelerate clean electric vehicles’ uptake.
Uebelacker explained that it was essential for him to receive electric vehicles training to teach the upcoming mechanics and technicians in the industry. He stated that this training would help them avoid electrocution and destruction of valuable elements of the cars in the name of repairing them. Uebelacker revealed that the first model that stirred up his desire to understand an electric vehicle’s operations was General Motors EV1 developed two decades ago. He wanted to understand the technol9gy that these vehicles utilize without emitting gases and hooting excessively.
In conclusion, technicians’ training to run and operate on these vehicles will prepare countries to transition into clean transportation without fear of insufficiency in repair skills. These vehicles’ simplicity makes them a force to reckon with, especially now that society has realized the value of renewable energy.
Why are Electric Cars Expensive?
The existence of electric vehicles has become more common on global roads than it has ever been. Despite their emergence, the price of these cars has remained to be out of budget for many. The total cost of these electric cars is relatively high due to the high actual cost of the rechargeable battery inside the vehicle.
The price of electric cars is largely affected by what’s found in them. An electric car uses a battery similar to that rechargeable lithium-ion battery used on the laptop or phone. The battery used in a car is much bigger to ensure that they can propel the car for long hours for longer distances. The most expensive cell component is the cathode; these electrodes’ main role is to store and release charge. Cathodes are that expensive because the materials needed in them to pack the much energy are very expensive. They are mainly made of metals such as cobalt, lithium, nickel, and manganese. All the above metals need to be mined, processed and then converted into high-purity chemical compounds.
How much do electric cars cost?
As per the current rates and pack sizes of a standard electric vehicle’s average battery, the price can be around $7350. The average market pack cost of $156 per kW hour is still above the standard average of $100 threshold, whereby the total cost of an electric car is supposed to match the cost of a car with an internal-combustion engine. Having a matching price would increase the mass adoption of the electric car into the motor world.
How can the batteries get cheaper?
There are no hopes that the cost shall keep dropping as fast as we think; however, it is believed that the lithium-ion cells are on a recorded track to drop in price to $93 per kilowatt by the year 2024. To get to such prices, it is called for manufacturers to replace the high cost of cobalt cathodes with a cheaper metal such as nickel. The use of nickel comes with double benefit, firstly it is cheaper, and secondly, nickel is known to hold more energy and hence allows the manufacturers to reduce the volume used. On the other hand, there is a disadvantage as cobalt does not overheat or even catch fire easily. This means that manufacturers shall need to make safety adjustments when they use nickel as a substitute for cobalt.
|
Credit: Kim Kastens
Fig. 1. Selected insights from the four themes identified with how geoscientists think and learn. (a) Like the heliocentric view of the solar system (left), the discovery of the brevity of human history within the vastness of geologic time (right) altered humanity’s understanding of its place in the cosmos. (b) In understanding the Earth as a system, feedback loops are a “threshold concept.” Even when the student understands a situation experientially (left), casting it into the symbolic language of flows, reservoirs, and feedbacks (right) remains exceptionally difficult. (c) Learning in the field offers many opportunities for students to experience making “first inscriptions.” Using senses and sensors, students transform the raw material of nature (left) into human artifacts: tractable, transportable symbols on paper (right). (d) Spatial thinking is common in geosciences and presents a stumbling block for students who have come up through an education system that did not develop, assess, or reward spatial skills. The illustrated exercise requires “visual penetrative ability,” which varies widely from student to student. Image credits are located in the supplement to this Eos issue (
Thinking About Time
However, having a long view of time should not be viewed as merely a practical tool for decision makers; philosophically, it is a fundamental aspect of humanity’s self-image. Just as Nicolaus Copernicus’s sixteenth-century discovery of the heliocentric solar system altered perceptions of humanity’s place in the spatial dimensions of the cosmos, so did James Hutton’s eighteenth-century discovery of deep time alter the perception of humans’ place within Earth history. However, the fact that humanity’s planet does not lie at the center of the universe is more widely understood and accepted in Western civilization than is the fact that human history spans only a tiny fraction of geologic time.
Understanding the Earth as a Complex and Complicated System
For understanding the Earth as a complex system, the concept of feedback loops is key. Negative (stabilizing) feedbacks keep the Earth system sufficiently stable that complex forms of life, including humans, can exist. Positive (reinforcing) feedbacks underlie many environmental problems, including loss of biodiversity, global climate change, and degradation of agricultural soils. In education, feedback loops function as a “threshold concept,” a concept difficult to learn but transformative once mastered. Because feedback loops underpin a stable Earth system, fostering a working knowledge of this concept throughout the decision-making populace could increase civilization’s capacity to cope with 21st-century challenges. In spite of its importance, the feedback loop concept is arguably the most under-researched topic in the entire domain of geoscience thinking and learning.
Learning in the Field
A hallmark of the geosciences is that theoretical advances are usually grounded in direct observations of the Earth, oceans, atmosphere, or planets. While it is not accurate to describe the geosciences as merely observational sciences, observations play a central role in geoscientists’ formulation and testing of new ideas and theories.
First, field experiences provide a concentrated opportunity to develop what anthropologists call “professional vision,” the ability to see features that are important to professional practice. Like a criminal investigator at a crime scene, a geoscientist in the field sees differently than a novice at the same scene. Professional vision can be developed through guided apprenticeship, as an expert watches and corrects a novice’s iterative efforts to segment the observed world into meaningful categories (e.g., cloud types or rock units) and to identify features of interest (e.g., rip tides or faults) amid visual complexity. Such mentorship extends beyond the development of observational skill and includes guidance on the use of observational data to test hypotheses. The interplay between observation and testing of ideas is a central feature of a geoscientist’s reasoning, and field experiences may play a critical role in developing this habit of mind.
Second, field experiences provide practice in transforming the raw material of nature into the words, signs, and symbols that geoscientists use to capture and communicate their observations. Ethnographers studying scientists refer to the “cascade of inscriptions” that scientists make, where the term “inscription” encompasses text, diagrams, graphs, tables, maps, equations, etc. The first inscription in the “cascade” transforms an aspect of nature into a human-made artifact; for example, the slope of a rock layer is transformed into a dip and strike symbol on a map, or the chill of the ocean is transformed into a number in degrees Celsius. The same or different scientists then transform the initial inscription into subsequent inscriptions (for example, a geological map or a temperature/salinity graph), and so on toward ever more abstract, transportable, generalized, and integrative inscriptions.
Spatial Thinking
Geoscientists use spatial thinking extensively whenever they acquire, represent, manipulate, or reason about objects, processes, or phenomena in space. Exemplars of the power of spatial thinking include Alfred Wegener’s interpretation in 1915 of the gross patterns of continental geology as a product of continental drift, and Inge Lehmann’s interpretation, published in 1936, that the global distribution of earthquake P and S waves is indicative of a two-layer solid/liquid core. Geoscientists deploy a wide array of specialized spatial representations, using them not only to convey data that are inherently spatial (e.g., maps and cross sections) but also to elucidate relationships between nonspatial variables (e.g., phase diagrams of mineral composition).
A Community of Practice
Reflecting on the nature of geoscience thinking and learning reveals that geoscientists are not merely individuals who know a lot about the oceans, atmosphere, or solid Earth. Geoscientists make up a “community of practice,” who have been shaped by, and now embody, a distinctive suite of experiences, approaches, perspectives, and values. These include taking a long view of time, using temporal and spatial reasoning to formulate hypotheses and answer questions, interpreting observations in terms of a system of intertwined processes rather than a single independent variable, and building cascades of inscriptions that begin with the raw materials of nature and tap into powerful visualization techniques.
Author Information
Citation: Kastens, K. A., C. A. Manduca, C. Cervato, R. Frodeman, C. Goodwin, L. S. Liben, D. W. Mogk, T. C. Spangler, N. A. Stillings, and S. Titus (2009), How geoscientists think and learn, Eos Trans. AGU, 90(31), 265–266, doi:10.1029/2009EO310001.
© 2009. American Geophysical Union. All rights reserved.
© 2009. American Geophysical Union. All rights reserved.
|
Solved by a verified expert:Suppose Z and z stand for alleles of the gene determining length of tail in iguanas. ZZ and Zz result in long tail, and zz results in short tail. Which is true for the offspring of a ZZ male iguana and a Zz female iguana:1.Some of the offspring will have short tails.2.Half of the offspring will have long tails3.None of the offspring will have short tails.4.None of the offspring will have long tails.5.All offspring will have short tails. Cystic fibrosis is a disorder depending on the mutated recessive allele f. Genotypes FF and Ff are healthy, while ff has cystic fibrosis. In the case of a Ff father and a FF mother, what is the probability that their child will have cystic fibrosis?1.100%2.75%3.50%4.25%5.0%In the case of cystic fibrosis, both FF and Ff have a healthy phenotype, but Ff is called a carrier. What is true of the possible offspring of 2 carriers?1.All their offspring will be heterozygous and normal.2.25% of their offspring will be homozygous and 75% heterozygous.3.25% of the offspring will be homozygous recessive, 50% heterozygous, and 25% homozygous dominant.4.50% will be homozygous dominant, and 50% homozygous recessive.Most biological systems have a cellular organization. Although cells come in a wide variety of shapes, most tend to be between1.20 – 100 nanometers2.1 – 5 milimeters3.1 – 50 micrometers4..1 -.5 micrometers5.200 – 1,000 micrometers
|
Trigger points – what are they?
Trigger points are the most common source of muscle pain. There are many factors that affect a trigger point and for best results they should all be identified.
I’m going to put a wild bet out there that everyone has a trigger point in at least one muscle of their body. Some have more than others. Who of you are regularly rubbing their shoulders or elbows? More and more we are sitting at the computer or looking down at our phones (sorry for writing this blog) causing prolonged tension on muscles around the neck and shoulder, resulting in the development of trigger points.
What is a Trigger point?
It is defined as a hypersensitive palpable nodule in taut bands of muscle fibers. Meaning very small bundles of muscle fiber have become contracted/”knotted” due to a chemical imbalance within the tissue. The area is very painful and can cause you to jump or cramp on palpation. It can cause referred pain, weakness and restriction through movement. Which makes doing normal activities and training difficult.
Triger Point diagram
Diagram of trigger points within a muscle
Trigger points of individual muscles have a very specific referred pain pattern and can mimic other problems. For example pain in the forearm and wrist can be referred from Infraspinatus, a shoulder muscle. Without a detailed assessment and clearing other areas this could be misconceived as a tennis elbow.
What causes a trigger point?
A TP can be brought on in a number of ways.
• Poor postures held for a prolonged period, causing certain muscles to work harder while trying to support structures like the head, eventually causing TP’s.
• Repetitive strain on muscles from overuse over multiple days, weeks and months. How many clicks of the mouse or typing are your doing? How much swiping of the smartphone? These repetitive movements take their toll.
• Emotional stress and poor sleep can cause muscle tension. Particularly the neck and shoulder muscles.
• A lack of movement will develop TP’s when sitting or on bed rest for a prolonged time.
• Heavy lifting can cause the development of TP’s when the muscle is placed under excessive loads which it is not familiar with.
• Trauma to a muscle, either as a reflex to pain or overcompensating for the weak and injured structure. This is quite common with car accidents or sports injuries.
Our muscles sit within a biochemical “soup” of hormones, nerve transmitters and chemicals, all affecting the PH and Oxygen levels of the tissue. Your body knows the perfect recipe to keep everything balanced, but when we overload it with one or more of the above, it causes changes to the recipe, resulting in a drop in PH (becoming more acidic) and reduces the oxygen supply. This leads to the development of TP’s.
How do we treat a trigger point?
The following treatments for trigger points will help settle them down, but if we provide the same environment they will return.
• Trigger point release – sustained manual pressure applied to the trigger point causes increased blood flow to remove toxins from the area, interrupts the pattern of pain and spasm and encourages the production of natural pain relieving endorphin’s.
• Trigger point dry needling – There is a growing evidence base for trigger point dry needling. The needling causes local twitch responses which are a central nervous system reflex. This helps disrupt the pain feedback loop but also reset the acidic biochemical “soup” the muscle is sitting in, back to its normal levels.
• Myofascial release – the surrounding tight myofascial tissue that feeds into and over the trigger points could also be restricted, causing further exacerbation of the area. Using this technique will give some length back to these structures and can alleviate the trigger point.
Once the hands on therapy has been applied it is not the end of treatment. The muscles with the TP’s will need to be stretched to help prevent their return. Postural correction and stability exercises for surrounding muscles may need to be followed. Changes ergonomically may need to be enforced to prevent falling back into poor habits. Also looking at ways of alleviating stress through improved sleep, meditation, breathing techniques and increase of general exercise.
All of these factors will need to be considered to provide long lasting benefit and avoid their return.
1. Travell & Simon (1999). Myofascial Pain and Dysfunction: The Trigger Point Manual
2. Shah et al (2008) Uncovering the biochemical milieu of myofascial trigger points using in vivo microdialysis: An application of muscle pain concepts to myofascial pain syndrome. Journal of Bodywork and Movement Therapies
3. Simons, (2008), New Views of Myofascial Trigger Points: Etiology and Diagnosis, Archives of Physical Medicine and Rehabilitation
|
How Often Should You Fertilize the Average Home Lawn?
Fertilizer gives your lawn the nutrients required for healthy growth. The actual amount of fertilizer your lawn requires depends on the type of fertilizer you use and the grass species, as well as environmental factors such as drought and temperature. However, the average lawn typically requires 4 to 6 pounds of nitrogen annually.
Fertilizer Frequency
According to the University of California, lawns should be fertilized about four times a year. The total amount of nitrogen lawns need to grow is typically divided into four applications of 1/2 to 1 pound of nitrogen per 1,000 square feet of lawn per application. Never apply more than 1 pound of nitrogen at any one application to avoid burning your lawn. Apply quick-release fertilizers in four to six week intervals during periods of active growth, and apply slow-release formulas in six to eight week intervals during active growth.
Factors Affecting Fertilizer Needs
Shaded lawns require less nitrogen because shade encourages shoot growth instead of strong root growth, and makes the lawn vulnerable to disease or injury. In shaded areas of lawn, apply half the amount of nitrogen recommended for the average lawn during the spring and fall. During hot, dry conditions, apply fertilizer lightly and infrequently to avoid vigorous growth and to reduce water requirements.
|
An intelligent power devices (IPDs) is a semiconductor power switch with various diagnostic and failure detection features that allow us to reliably provide power to different types of loads.
The modern IPD can offer a few important features, including overcurrent protection, thermal shutdown, open load detection, and the ability to dissipate the demagnetization energy stored in an inductive load. These protection functions can minimize the risk and severity of failures (for example in automotive applications) even in the event of the processing unit malfunction.
Depiction of the differences between an IPD and a MOSFET.
Depiction of the differences between an IPD and a MOSFET. Image used courtesy of ROHM Semiconductor
In this article, we’ll first introduce a new family of IPDs from ROHM Semiconductor and then briefly discuss the common protection functions of an IPD and how they can help us to have a more reliable system.
ROHM’s New High-Side Switch ICs
ROHM Semiconductor recently announced a new family of AEC-Q100 qualified IPDs designed for automotive applications. In addition to more common protection functions, such as overcurrent protection; thermal shutdown; open load detection; and under-voltage lockout, the new IPDs allow users to set an adjustable overcurrent mask time to achieve the optimum protection for a given load.
The new devices are available in both 1- and 2-channel variants with RDS(on) ratings of 4 5mΩ, 70 mΩ, and 9 0mΩ. The company claims that the new IPDs can be used for driving different resistive, inductive, and capacitive loads in automotive applications.
Overcurrent Protection
IPDs can set an adjustable upper limit to the current that flows through the load. This feature allows us to protect both the switch and the load from excessive current. The overcurrent protection feature relies on an accurate current sensing mechanism.
High-performance IPDs can sense the output current with an accuracy in the range of ±3 %. While we can use discrete components to add the current limiting feature to a simple MOSFET switch, it can be very challenging for a discrete solution to achieve the accuracy of an IPD that relies on an integrated current sensing circuitry.
The ability to limit the output current finds use in many applications. For example, in an automotive seat heater, an IPD can be used to limit the maximum current and consequently, the maximum heat that is generated. In this particular application, a large amount of current even for a short period of time can damage the system and even cause dangerous situations for the user.
Another application in which the current limiting feature becomes vitally important is driving large capacitive loads. Charging a large capacitive load can draw inrush currents as high as 100 A. In addition to causing damage to the load and switch, a large transient current can lead to supply voltage droop, which can harm other circuits in the system that are connected to the same power supply.
With an IPD, we can limit the output current to safely drive a capacitive load. The following figure shows three of the capacitive load examples in the automotive applications.
Application diagram of automotive capacitive load driving
Application diagram of automotive capacitive load driving. Image used courtesy of Texas Instruments
Thermal Shutdown
An IPD will shut down as its junction temperature crosses a certain threshold. Note that overcurrent protection discussed above cannot prevent the device from overheating because the dissipated power is related to both the current and the voltage drop across the switch. Even with a limited current value, we can have a high voltage drop, and consequently, an unsafe power dissipation.
IPDs can have two different thermal shutdown mechanisms: absolute thermal shutdown and relative thermal shutdown (sometimes referred to as ΔTj protection). With the absolute thermal shutdown, the device turns off as its temperature goes beyond a typical safe level of about 150°C.
However, the relative thermal shutdown measures the temperature difference between the device and the ambient temperature. The relative thermal shutdown will be triggered if the temperature difference goes above a typical threshold value of about 120°C.
How can relative thermal shutdown be helpful?
A large temperature difference between the switch and the surrounding environment can be an indication of an unreasonably rapid increase in the device temperature. In fact, the device temperature rises so rapidly that it cannot reach a thermal equilibrium with its surrounding environment.
In this case, the relative thermal shutdown disables the output to prevent an imminent failure. Besides, when a short-circuit occurs with an inductive load, the relative thermal shutdown allows us to more reliably dissipate the demagnetization energy of the load
Open Load Detection
With open load detection, we can implement diagnostic features that can recognize broken wires and faulty modules (open-circuit failures).
IPDs can have two different types of open load detection. Some of them can detect an open-circuit failure only when the output transistor is off. As shown below, these IPDs rely on a pull-up resistor between the output and the power supply.
The above circuit monitors output voltage when the output MOSFET is off, allowing it to detect an open load
The above circuit monitors output voltage when the output MOSFET is off, allowing it to detect an open load. Image used courtesy of Toshiba
If a load is present, the output voltage will be below a certain value. However, with an open failure, the output will be very close to the supply voltage.
The second open load detection mechanism is based on accurately measuring the output current (when the switch is on). If the load current goes below a certain level, an open failure situation will be communicated back to the processing unit. This requires information about the normal current value that should flow through the load when there is no open failure.
An example application that can benefit from this diagnostic feature is driving an LED load that consists of multiple LED strings in parallel. If the connection to one of these LED strings is broken, the IPD will sense a change in the output current and signal an open load situation.
The Ability to Dissipate the Demagnetization Energy
When driving inductive loads, such as relays, motors, and solenoids, magnetic energy will be stored in the load. When turning an inductive load off, the stored magnetic energy can create transient voltages as high as hundreds of volts that can severely damage the drive circuitry.
The IPD should have an efficient clamping circuitry that keeps the voltage across the switch below a certain threshold and safely dissipates the stored magnetic energy.
Source: All About Circuits
|
Firstly, we will have to calculate the number of moles. To perform this, we make use of the ideal gas equation
PV = nRT
n = PV/RT
The parameters have the adhering to values according to the question:
P = 780mmHg, we transform this come pascal.
760mHG = 101325pa
780mmHg = xpa
x = (780 * 101325)/760 = 103,991 Pa
V= 400ml = 0.4L
T = 135C = 135 + 273.15 = 408.15K
n = ?
R = 8314.463LPa/K.mol
Substituting this values right into the equation yields the following:
n = (103991 * 0.4)/(8314.463 * 408.15)
= 0.012 mole
Now we understand 1 mole consists of 6.02 * 10^23 molecules, hinvernessgangshow.netce, 0.012moles will contain = 0.012 * 6.02 * 10^23 = 7.38 * 10^21 molecule
You are watching: How many molecules of n2 are in a 400.0 ml container at 780 mm hg and 135°c?
e-lub <12.9K>6 month ago
8 0
Answer: The number of molecules in the container are
To calculation the mole of gas, we usage the equation by right gas i m sorry follows:
P = push of the gas = 780 mmHg
V = Volume the the gas = 400.0 mL = 0.4 together (Conversion factor: 1 together = 1000 mL)
T = Temperature the the gas =
K=408K" alt="135^oC=<135+273>K=408K" align="absmiddle" class="latex-formula">
R = Gas constant =
n = number of moles of gas = ?
Putting values in over equation, we get:
According come mole concept:
1 mole that a compound includes
variety of molecules
So, 0.01226 mole of gas will contain =
variety of molecules
Hinvernessgangshow.netce, the variety of molecules in the container space
You can be interested in
Which of these carbohydrates is a monosaccharide maltose fructose cellulose or lactose
Ginvernessgangshow.netaCL600 <577>
Your answer have to be fructose! :)
7 0
4 months ago
Read 2 an ext answers
Karo-lina-s <1.5K>
Hi!! I think you forgot the image! Make another question and I will perform my best to help!
Just let me understand the following question is asked or friend can offer me the link! :)
8 0
9 months ago
A+B→2C the reaction begins, the researcher documents that the rate of reaction is such that 1 mole of A is consumed every minut
irakobra <83>
From kinetically point of view rate of the reaction depinvernessgangshow.netds on:
speed of the reaction = k
So to rise the rate of the reaction the researcher made this changes:
1. Boost the concinvernessgangshow.nettration the reactants
2. Increase the temperature
3. Add a catalyst to reduced the activation invernessgangshow.netergy that the reaction
Temperature and also activation invernessgangshow.netergy are discovered behind the k consistent and they have an influinvernessgangshow.netce on the reaction speed.
4 0
1 year ago
Read 2 an ext answers
Does sauce one of two people rhyme through avoid, crowd,false,hall,or hawk
Alinvernessgangshow.netkinab <10>
the last letters in the native ryhme and also make similiar sound unlike the other words
7 0
4 month ago
Which radioisotope emits alpha particles?(1) Fe-53 (3) Au-198(2) Sr-90 (4) Pu-239
Anna007 <38>
Answer : alternative 4) Pu-239
Explanation : Plutonium-239 is a radioisotope of the eleminvernessgangshow.nett plutonium which emits alpha particles. The decaying procedure of Pu-239 emits alpha particles. It is widely provided as a nuclear reactor fuel. Pu-239 is additionally used as a major fissile isotope for the production of atom weapons.
3 0
5 month ago
Read 2 more answers
Other questions:
Add answer
mental me
not registered? rapid signup
Your nickname
Login Signup
See more:
What Does Dropping The Soap Mean ? What Dies Dropping The Soap Mean
ask question!
|
What are an excellent conductors under normal conditions?
Good conductors room usually metal, while other conductors with minimal conduction effectiveness are alloy. Penny is an alloy, and gold is a metal. The various other choices, water, plastic, ceramic, and air are examples of poor conductors. Therefore, letters B (a penny), and D (gold) room the conductors under typical conditions.
You are watching: Which of the following are good conductors under normal conditions
Which the the complying with are an excellent conductors under normal conditions inspect all that use answers com?
The answer is.A penny, gold, and also water.
Which that the following are an excellent conductors?
Which of the adhering to are good conductors answers com?
Good conductors conduct electric current very easily because of their cost-free electrons. Part common good conductors are copper, aluminum, gold, and silver.
What space 3 instances of conductors?
The most effective electrical conductors are:
What space 4 examples of conductors?
Examples of Conductors Copper, Brass, Steel, Gold, and Aluminium are good conductors the electricity. We usage them in electrical circuits and systems in the type of wires. Mercury is great liquid conductor. Thus, this product finds usage in plenty of instruments.
Is Salt a conductor?
This is since salt water is a an excellent conductor the electricity. Salt molecules are made of sodium ions and chlorine ions. (An ion is an atom that has an electrical charge due to the fact that it has actually either obtained or lost an electron.)
What materials can electrical energy pass through?
Some products let electrical power pass through them easily. These materials are known as electrical conductors. Countless metals, such together copper, iron and also steel, are great electrical conductors.
Will touching a strength line kill you?
Overhead power lines can carry more than 500,000 volts. Touching among the lines can carry out a path for electricity to the ground and also hurt or kill you.
See more: How To Tell If A Taurus Woman Likes You, How To Get A Taurus Woman To Chase You
Is it safe to go under power lines?
Do not go near downed strength lines! If girlfriend are close to lines which have come down, execute NOT go away! due to the fact that the voltage to reduce in an outside direction from whereby the cable contacts the ground, it way the voltage can be higher at one foot, and also lower in ~ your other foot if they are separated (by walking)
How carry out squirrels operation on power lines?
When squirrels walk on power lines, electrical energy would not take trip from one finish of the cable to the other faster by traveling with the squirrel, therefore the electricity and squirrel both proceed on their paths
What happens as soon as you room electrocuted?
Some electrical shocks deserve to have a lasting affect on your health. Because that example, major burns deserve to leave long-term scars. And if the electrical existing goes through your eyes, you might be left v cataracts. Part shocks can also cause ongoing pain, tingling, numbness, and muscle weakness because of internal injuries.
|
Animals acquire an understanding of the world through experience and instruction. If we touch a hot stove, we burn ourselves and learn to keep our fingers away from glowing red coils. Alternatively, we can avoid the drama of direct experience by heeding the warnings of our parents. Both options are effective and help to guide our future behaviors. And until now, both were believed to require a complex and coordinated nervous system. However, in a recent issue of Proceedings of the Royal Society, Series B, David Vogel and Audrey Dussutour, from Toulouse University in France, show that even brainless slime molds can learn and teach.
Few people would look towards slime molds as the poster-child of intelligence. Yet, over several decades of work, these multi-nucleate bags of goo have been found to be capable of surprising feats of cleverness. They can navigate complex mazes, optimize nutritional challenges and even find their way through a miniature version of the Tokyo subway system; they show swarm, or collective, intelligence. But can they learn?
To test this, Vogel and Dussutour tempted slime molds with a tasty treat that could only be reached by traversing a bridge containing high levels of salt. At first, slime molds hesitated before crossing the salt bridge; they moved across it slowly and haltingly, like dipping a single toe into a frigid sea. However, after repeated exposure, they learned to ignore the noxious, although harmless, stimulus. In other words, they had become habituated to the salt and learned to ignore it so that they could more rapidly reach the food. Further, after the salt was removed, the slime molds forgot what they had learned and reverted to salt aversion; they had recovered their justified caution.
Habituation and recovery may not seem especially advanced. However, they require a form of basic learning coupled to a type of memory. Given this, the team reasoned that this physical memory could potentially be transmissible. When slime molds meet each other they can undergo cellular fusion, whereby the two formerly independent individuals join forces to form a larger single entity. If fused cells can share nuclei and cytoplasm, why not their memories too?
When the team fused a habituated slime mold with an unhabituated one, they found that the unhabituated individual gained the salt habituation of the other. Something, as yet unidentified, thus carried durable memories from one individual to another. But the transfer took some time. If the pair was separated after only an hour of fusion, no transfer occurred, while by 3 h, transfer was complete. Furthermore, habituation persisted in the formerly naive slime mold even after it was separated from its habituated partner, confirming that transferred memories are at least as durable in the recipient slime mold as they are in the donor.
Our world is filled with sensory inputs that we experience and share. But imagine yourself stripped of sight, sound, taste or smell. How would you learn from others? How would you teach what you know? You couldn't simply push your brain, with all its knowledge, into another's head. Yet, this is essentially what slime molds do. By fusing together, they share information. And, as the authors have shown, as more individuals fuse, the faster they learn. But this is also an area filled with questions. Among many others, how are memories formed and carried? Do some individuals cheat by acquiring information while withholding their own hard-won knowledge? Are all memories transmissible? And finally, does any of this matter in nature? I hope the authors are as eager to learn the answers to these questions as I am.
Proc. R. Soc. B.
|
29b — Jesus Was Here (Video)
Archeology Confirms Jesus Was Here —
Even though Jesus lived on Earth more than 2,000 years ago, there still remains strong evidence for assigning exact locations to some of the events of Jesus’ last week.
Three of these Bible locations are:
1) Golgotha — the Place of the Skull where Jesus was crucified
2) A Newly-Hewn Tomb — that Joseph of Arimathea donated for Jesus’ burial
3) The Garden around the Tomb — where Mary Magdalene saw Jesus after he rose from the dead
Take a tour of these three sites in modern Jerusalem and marvel as the details of Scripture come to life.
“Jesus Was Here” Mini Quiz
1) What is the name of the gate in the wall around Jerusalem that is near the Place of the Skull where Jesus was crucified?
2) What two features provide evidence that there was a rock door covering the opening to the tomb exactly like the Scriptures describe?
3) What two features in the garden show that it existed 2000 years ago during the time of Jesus?
My Prayer
Dearest Father, I am amazed! The stories of Jesus’ death and resurrection seem so much more real when I can actually see the likely-locations where they occurred. Thank you for the people in the first century who recorded these events and for the researchers who have studied the locations. Thank you for leading them both. Amen.
Answers: 1) Damascus Gate, 2) There is a trough or channel for the rock to roll in and there are remains of the seal. 3) The ancient cistern and wine press
|
Citizens of Iceland Celebrate Their National Day
The citizens of Iceland today celebrated the anniversary of the founding of their republic.
On June 17, 1944, Iceland declared independence from Denmark and The Republic of Iceland was formed.
June 17 was the chosen date in honro of the birthday of Jon Sigurdsson, or “President Jon,” the leader of the 19th century Icelandic independence movement.
The National Day is celebrated across Iceland with parades, speeches, concerts, dance performances, street artists and ab array of activities for children.
The national day procession in Reykjavik June 17, 2007.
At DC, US Secretary of State Hillary Rodham Clinton sent her best wishes to the people of Iceland as they celebrate their National Day.
She says Iceland and the United States share a long history as allies, partners, and friends.
The United States remains committed to preserving our common defense and working closely together to address some of today’s greatest challenges, she added.
In Afghanistan, both countries are collaborating to create a more stable and prosperous future.
In the Arctic, experts from both countries are conducting research to support sustainable development and better understand climate change, Ms. Clinton said.
Both countries’ students and scientists are working together to better understand and harness geothermal energy.
And around the world, both countries are promoting democratic principles and expanding human rights.
“As you celebrate this special day, know that the United States stands with you. Best wishes for continued peace, prosperity, and happiness.” -Ms. Clinton
For over 100 years the United States has been one of Iceland’s most important trading partners and the United States is the second largest exporter to Iceland following the European Economic Area, and the largest foreign direct investor in the country. In return, Iceland finds a ready market in the United States for its world famous seafood, technology, creative industries, logistics and unique tourist destinations.
On 30th of May this year, during a half-day conference and luncheon hosted by the Icelandic-American Chamber of Commerce (IACC) at the Embassy of Iceland in Washington, D.C., Icelandic and American business and government speakers discussed investment opportunities in Iceland and for Icelandic investors.
The event, held in cooperation with the U.S. Department of State and celebrating 70 successful years of diplomatic relations between the countries, featured speakers covering a range of topics: Iceland’s most promising investment sectors, competitive energy costs, responsible fisheries and tourism.
|
A fish processor in Malawi protects the environment, one stove at a time
March 18, 2019
By Goodwell Thunga
Necessity breeds invention, as the saying goes. This was exactly the case for Vincent Sande, a soft-spoken man who owns a self-built fish processing facility beneath a makeshift shade structure at Chiphole Beach, on the banks of Lake Malawi. Vincent’s site is one of the biggest and busiest at Chiphole, offering most of the major fish processing methods, including sun drying, smoking, parboiling and deep frying. He plays a key role in a supply chain that provides income and nutrition for countless Malawians.
Vincent first connected with Pact’s FISH project when a local FISH partner, Community Initiative for Self-Reliance, or CISER, offered him training in energy-saving fish processing technologies. Funded by USAID, FISH is helping the people of Malawi to rebuild ecosystems, improve biodiversity conservation and adapt to climate change. Through the training, which CISER offers at several busy beaches, Vincent learned to construct and use improved smoking kilns, mobile smoking kilns and energy-saving parboiling stoves.
With some skepticism, Vincent constructed two improved smoking kilns and two parboiling stoves, and he decided to pilot mobile smoking kilns. Seeing how well they performed using far less wood, Vincent was sold. Soon, he’d replaced all 20 of his traditional smoking kilns with improved ones, which look and work similarly but are shorter and have a smaller fire hole.
But instead of stopping there, Vincent was inspired to make further improvements based on his own experience using the new kilns and stoves. For example, because the parboiling stoves were built in an open space using mud, they would be rendered almost useless during Malawi’s rainy season, so Vincent worked on a mobile version made from sheet metal, which turned out to be even more efficient.
The initial improved parboiling stove, and Vincent's modification.
“The amount of fish that takes seven hours to smoke on the traditional smoking kiln is done in five hours when using the static parboiling stove and in four hours when using the mobile parboiling stove,” Vincent explains.
Vincent also learned from his customers that the initial mobile smoking kilns were too tall and too costly, and their rectangular top didn’t fit the type of smoking methods used. So he reduced the kiln’s height and changed the shape to circular. He also replaced the wooden plunks used as the kiln’s skeleton with used bicycle rims, which are cheap and easy to find. And when the fire holes on improved smoking kilns began erroding because they were too fragile, Vincent started fitting metal frames to the fire hole, and he banned the use of large pieces of firewood in his kilns, as these were found to be a key problem.
The initial mobile smoking kiln, and Vincent's modification.
FISH and CISER are now embracing Vincent’s improvements and asked him to name them in recognition of his contributions. He chose to call them HaVi stoves – a combination of the first two letters of his wife Hawa’s name, and the first two letters of his own.
“I am hoping these modifications will increase the number of users,” Vincent says, “and eventually these technologies can save our forests.”
Stay updated. subscribe now.
|
Chip-Based Device For Quantum Computing
Chip-Based Device For Quantum Computing
Researchers have designed a new chip-based device that can shape and steer blue light with no moving parts. The device is the first chip-scale optical phased array (OPA) operating at blue wavelengths using a silicon nitride platform. OPAs function like reconfigurable lenses by enabling arbitrary reconfigurations of 3D light patterns.
The blue phased array platform can rapidly and precisely reconfigure visible light for many emerging applications, spanning holographic displays, quantum information processing, and biological sensing and stimulation. It paves the way for chip-scale light projection across the entire visible range with a large field of view and can miniaturize the current bulky optical systems.
Source: HPCwire
Lost Password
|
Vectorisation is your best friend: replacing many elements in a character vector
[This article was first published on NumberTheory » R stuff, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here)
As with any programming language, R allows you to tackle the same problem in many different ways or styles. These styles differ both in the amount of code, readability, and speed. In this post I want to illustrate this by tackling the following problem. We have a data.frame that contains an ID character column:
n = 9e6
df = data.frame(values = rnorm(n),
ID = rep(LETTERS[1:3], each = n/3),
stringsAsFactors = FALSE)
> head(df)
values ID
1 -0.7355823 A
2 -0.4729925 A
3 -0.7417259 A
4 1.7633367 A
5 -0.3006790 A
6 0.6785947 A
We want to replace all occurrences of A by 'Text for A', and the same for B and C. One approach is to use a combination of a for-loop and some if statements, in a style that looks more like C:
translator_if_for = function(input_vector) {
output_vector = input_vector
for(index in seq_along(input_vector)) {
if(input_vector[index] == 'A') {
output_vector[index] = 'Text for A'
} else if(input_vector[index] == 'B') {
output_vector[index] = 'Text for B'
} else if(input_vector[index] == 'C') {
output_vector[index] = 'Text for C'
dum_if_for = translator_if_for(df$ID)
This kind of imperative programming style is not typically R-like. The first response of an R-aficionado is to suggest using an apply loop. First we construct a helper function:
translator_function = function(element) {
A = 'Text for A',
B = 'Text for B',
C = 'Text for C')
which uses switch in stead of the set of nested if statements. Next we use sapply to call the helper function on each of the elements in df$ID:
dum_switch_sapply = sapply(df$ID, translator_function)
The advantage here is that we use roughly half the amount of code to express the same functionality, and I find the code more readable (seeing it’s purpose at a glance). Readability however is in the eye of the beholder, and some people used to non-functional programming languages might prefer the more explicit for-loop and if statement.
Ofcourse, R also supports vectorisation, which can be of particular interest if you are interested in performance. FOr a vectorised solution, we first create a lookup vector:
translator_vector = c(A = 'Text for A',
B = 'Text for B',
C = 'Text for C')
and subset this vector using df$ID:
dum_vectorized = translator_vector[df$ID]
I encourage you to spend a little time figuring out what this subsetting trick does, as I think it is quite a nice trick. The code of this final solution is even shorter, although it does take some careful consideration on the part of the reader to understand what is happening. Careful naming of variables, or encapsulation in a function can solve this issue.
All three solutions yield the same result:
all.equal(dum_if_for, dum_switch_sapply, check.attributes = FALSE)
all.equal(dum_vectorized, dum_switch_sapply, check.attributes = FALSE)
but how long do they take. For this, we benchmark the three solutions:
res = benchmark(if_for_solution = translator_if_for(df$ID),
function_solution = sapply(df$ID, translator_function),
vector_solution = translator_vector[df$ID],
replications = 10)
test replications elapsed relative user.self sys.self
2 function_solution 10 281.326 79.158 276.235 5.193
1 if_for_solution 10 254.751 71.680 253.358 1.484
3 vector_solution 10 3.554 1.000 3.052 0.504
The benchmark clearly shows that the performance of the vectorised solution is vastly superior to the other two, in the order of 70-80 times faster. In addition, the apply base solution is only a factor 1.10 faster than the for-loop based solution. The take home message: apply-loops are not inherently faster, and vectorisation is your friend!
ps: In this case, making the character vector a factor, and simply replacing the levels is probably much much faster even than using a vectorised substitution. However, the point of the post was to compare different coding styles, and this problem was just a convenient example.
To leave a comment for the author, please follow the link and comment on their blog: NumberTheory » R stuff. offers daily e-mail updates about R news and tutorials about learning R and many other topics. Click here if you're looking to post or find an R/data-science job.
Never miss an update!
Subscribe to R-bloggers to receive
e-mails with the latest R posts.
(You will not see this message again.)
Click here to close (This popup will not appear again)
|
Diseases which are related to blood vessels are called vascular diseases. Blood vessels play an important role in the process of erection. The two chambers of penis (corpora cavernosa,) which run throughout the organ are filled with spongy tissue. The corpora cavernosa are surrounded by a membrane, called the tunica albuginea. The spongy tissue contains smooth muscles, fibrous tissues, spaces, veins, and arteries.The flow of blood creates pressure in the corpora cavernosa, making the penis expand. The tunica albuginea helps to trap the blood in the chambers, thereby sustaining erection.
Any variations in penile arteries like reduction of diameter, hardening of walls etc may cause erectile dysfunction. Conditions like Diabetes mellitus, High blood pressure and high Cholesterol cause significant damage to arteries. Smoking is another cause which harms arteries.
Diabetes Mellitus : Fluctuating levels of blood sugar in diabetes mellitus damage minute arteries and nerves throughtout the body. This impairs flow of nerve impulses and blood causing erectile Dysfunction.
According to ayurvedic text “ashtanga sangraha”, diabetes is caused due to vitiation of vata. pitta, kapha and rakta (blood). Vitiated doshas affect almost all tissues of body in diabetes. According to ayurveda the process of erection occurs due to involvement of vata, pitta and rakta . The process of erection will be normal when vata, pitta and rakta are in normal and balanced condition.Vitiated vata fails to cause normal flow of signals and arousal does not occur. Vitiated pitta and rakta fail to complete the process of blood flow to penis.
High Blood Pressure: It is a known fact that High blood pressure injures small arterioles. Researchers argue that this may be happening in penis also. When small blood vessels of penis get damaged, body tries to repair them. In this process the scar tissues may form on blood vessels reducing the elasticity of penile arteries. This hinders blood flow to spongy tissues of penis. Apart from this High blood pressure affects Hormone balance and nitric acid levels. This may lead to erectile dysfunction. Few claim that erectile dysfunction is caused due to side effects of anti hypertensive medications used by patients.
According to principles of Ayurveda, Hypertension is caused due to imbalance of Vata and pitta. When Vata gets imbalanced it imbalances its 5 subtypes (Vyana, Udana, Samana, Prana, Apaana ). Erection happens when apaanavayu gets stimulated through various factors like sparsha (touch), gandha (pleasant scent), erotic talks etc. It gets associated with tejas (heat of pitta) to cause erection. In Hypertension Erectile dysfunction appears when apanavayu and pitta get vitiated.
A quote in ayurveda says “Hritpaandurogatamakakaamalashrama..." – which means diseases of liver , heart etc cause erectile dysfunction
Smoking: Smoking causes blockage of arteries.Smoking impairs erections and can become a reason for erectile dysfunction. It affects semen and also reduces sperm count and impairs sperm motility. But these are reversed after stopping smoking.
Author's Bio:
This article is copy righted. The author Dr.SavithaSuri is an Ayurvedic Physician and web master of Ayurveda help through ayurveda remedies .Read more at Erectile Dysfunction due to Vascular diseases
|
On detecting terrestrial planets with timing of giant planet transits
title={On detecting terrestrial planets with timing of giant planet transits},
author={Eric Agol and Jason H. Steffen and Re’em Sari and William A. Clarkson},
journal={Monthly Notices of the Royal Astronomical Society},
The transits of a distant star by a planet on a Keplerian orbit occur at time intervals exactly equal to the orbital period. If a second planet orbits the same star, the orbits are not Keplerian and the transits are no longer exactly periodic. We compute the magnitude of the variation in the timing of the transits, St. We investigate analytically several limiting cases: (i) interior perturbing planets with much smaller periods; (ii) exterior perturbing planets on eccentric orbits with much… Expand
Figures and Tables from this paper
The Detection and Characterization of a Nontransiting Planet by Transit Timing Variations
A planetary system with two confirmed planets and one candidate planet discovered with the publicly available data for KOI-872, reminiscent of the orderly arrangement within the solar system, with nearly coplanar and circular orbits. Expand
Planet Detection: Transit Timing Variation
Planet detection from transit timing variations is a method for determining the existence and properties of a planet from the gravitational perturbations it induces on the orbit of another,Expand
Characterizing the Eccentricities of Transiting Extrasolar Planets with Kepler and CoRoT
• E. Ford, K. Colón
• Physics
• Proceedings of the International Astronomical Union
• 2008
Abstract Radial velocity planet searches have revealed that many giant planets have large eccentricities, in striking contrast with the giant planets in the solar system and prior theories of planetExpand
Evidence of Things Not Seen
Transit timing variations (TTVs) in the length of a candidate extrasolar planet's year are used to infer the presence of an unseen planetary companion, but with only weak constraints on the orbital period and companion mass. Expand
Another violation of the orbit-composition pattern is reported: two planets orbiting the same star with orbital distances differing by only 10% and densities differing by a factor of 8, likely a rocky “super-Earth,” whereas the other is more akin to Neptune. Expand
Kepler spacecraft observations of a single Sun-like star are reported that reveal six transiting planets, five with orbital periods between 10 and 47 days and a sixth planet with a longer period, among the smallest for which mass and size have both been measured. Expand
Detection of Laplace-resonant three-planet systems from transit timing variations
Transit timing variations (TTVs) are useful to constrain the existence of perturbing planets, especially in resonant systems where the variations are strongly enhanced. Here we focus onExpand
Kepler-9: A System of Multiple Planets Transiting a Sun-Like Star, Confirmed by Timing Variations
Two Saturn-size planets show variations in the times they take to transit their star due to gravitational interaction, and six radial-velocity observations show that these two planets are the most massive objects orbiting close to the star and substantially improve the estimates of their masses. Expand
The mass of the Mars-sized exoplanet Kepler-138 b from transit timing
The sizes and masses of three planets orbiting Kepler-138, a star much fainter and cooler than the Sun, are reported, determining that the mass of the Mars-sized inner planet, Kepler- 138 b, is Earth masses and its density is grams per cubic centimetre. Expand
Using long-term transit timing to detect terrestrial planets
ABSTRACT We propose that the presence of additional planets in extrasolar planetary systemscan be detected by long-term transit timing studies. If a transiting planet is on aneccentric orbit then theExpand
Orbital Perturbations of Transiting Planets: A Possible Method to Measure Stellar Quadrupoles and to Detect Earth-Mass Planets
The recent discovery of a planetary transit in the star HD 209458, and the subsequent highly precise observation of the transit light curve with Hubble Space Telescope, is encouraging to search forExpand
We compute the detection probability of satel- lites of extrasolar planets with the method of transits, un- der the assumption that the duration of the observations is at least as long as the planetExpand
Survival of Terrestrial Planets in the Presence of Giant Planet Migration
The presence of "hot Jupiters," Jovian-mass planets with very short orbital periods orbiting nearby main-sequence stars, has been proposed to be primarily due to the orbital migration of planetsExpand
The Use of Transit Timing to Detect Terrestrial-Mass Extrasolar Planets
This work shows that timing measurements between successive transits will allow for the detection of additional planets in the system (not necessarily transiting) by their gravitational interaction with the transiting planet. Expand
An extrasolar planet that transits the disk of its parent star
Planets orbiting other stars could in principle be found through the periodic dimming of starlight as a planet moves across—or ‘transits’—the line of sight between the observer and the star.Expand
Extra-solar planets
The discovery of the first extra-solar planet surrounding a main-sequence star was announced in 1995, based on very precise radial velocity (Doppler) measurements. A total of 34 such planets wereExpand
Radial Velocity Detectability of Low-Mass Extrasolar Planets in Close Orbits
Detection of Jupiter-mass companions to nearby solar-type stars with precise radial velocity measurements is now routine, and Doppler surveys are moving toward lower velocity amplitudes. TheExpand
Detection of Planetary Transits Across a Sun-like Star.
High-precision, high-cadence photometric measurements of the star HD 209458 are reported, which is known from radial velocity measurements to have a planetary-mass companion in a close orbit and the detailed shape of the transit curve due to both the limb darkening of thestar and the finite size of the planet is clearly evident. Expand
A Unique Solution of Planet and Star Parameters from an Extrasolar Planet Transit Light Curve
There is a unique solution of the planet and star parameters from a planet transit light curve with two or more transits if the planet has a circular orbit and the light curve is observed in aExpand
Planet-Finding Prospects for the Space Interferometry Mission
The Space Interferometry Mission (SIM) will make precise astrometric measurements that can be used to detect planets around nearby stars. We have simulated SIM observations and estimated the abilityExpand
|
Make a Basic First Aid Kit
Carrying a basic first aid kit when engaging in outdoor adventures is important. Learning how to effectively use each item in your first aid kit is key.
Uses for Basic First Aid Kit: Hiking, Biking, Paddling, Camping, Car Travel and College Students.
2×2 Gauze Pads & 4×4 Gauze Pads: Sterile gauze pads are a must-have for every first-aid kit due to their incredible absorption capabilities, plus they are chemical free. Generally used for minor scrapes, cuts and burns, sterile gauze pads are good for allowing just enough room for the wound to breathe without leaving too much space for air exposure – which can prompt wound infection.
Assorted Bandaids: Adhesive bandages are probably the most used component of most first aid kit. Use these small bandages to cover small lacerations and abrasions. Be sure to change adhesive bandages at least once a day, and always clean the wound before you apply an adhesive bandage.
Triple Antibiotic Cream: Whether it’s a gash caused by shattered glass or a simple paper cut, antibiotic ointment is an ideal addition to your first aid kit. Air exposure is always an issue for fresh scrapes, and applying a thin layer of antibiotic ointment in addition to covering with a dressing will vastly reduce the chances of wound infection occurring.
Rubber Gloves: Exam gloves provide clean fingers for the victim’s benefit and provide a barrier for the rescuer’s benefit.
Tampon: Tactical Adventure Medical Preparedness Outdoors Necessity (T.A.M.P.O.N.). An sterile, ultra-absorbent item that can be used as an improvised wound dressing or to stop a nose bleed.
Self-Adhesive Bandage Roll: Sometimes simply covering a wound with a bandage just won’t do the trick. Adhesive tape is important because it can help wound dressings remain securely fit surrounding the injury. Adhesive tape is also essential for helping apply the necessary pressure a covering needs to collect excess fluid from the wound.
Alcohol Swabs: Used to clean the infected or wounded area before antibiotic ointment or bandages are placed on the area. Alcohol swabs may also be used in conjunction with anesthetic swabs and can be used to sterilize tweezers if needed.
Adhesive Remover Pads: Used to clean and remove the sticky residue left from a bandaid or adhesive bandage.
|
1. The Yamas are the way that we regulate our behaviour in relation to others. The Yamas include ahimsa (non-violence or non-harming), satya (truthfulness), asteya (non-stealing), bramacharya (the controlling of sexual energy), and aparigraha (literally means non-grasping).
2. The Niyamas are rules of personal behavior. They are observances that are important for progression on the path of yoga. The Niyamas include saucha (cleanliness or purification), santosha (contentment), tapas (discipline or austerity), svadhyaya (self study), and Ishvara Pranidhana (literally means depositing yourself in Īśvara, the supreme soul. It is an understanding that there is a higher power).
6. Dharana refers to concentration, which is the ability of the mind to focus entirely in a single direction.
7. Dhyana is the practice of meditation.
8. Samadhi is merging with the divine. It is described as complete absorption of the mind with the object of focus, as if the mind takes the form of the object and in which you lose awareness of your own identity and then Patañjali says “only the form of the object shines.”
|
new year
New Year’s resolutions for children
New Years resolutions can teach children positive ways in which they can alter their behavior. Plus, when you make resolutions as a family, you can build an even stronger bond with your children when improving your entire household
I’ve seen firsthand how my own habits affect my children’s habits. The more screen time that I give myself, the more screen time my children get. When I go outside less, so do my children. Because parenting includes so much leading by example, setting New Year’s resolutions with your children will help both of you grow.
Plus, its fun to see your children start to grow into little adults as they learn to comprehend more aspects of life, such as New Years resolutions. A new year is a great opportunity to start reinforcing healthy behaviors and saying goodbye to unhealthy behaviors.
As you make your resolutions, be sure to make them measurable. For example, instead of saying youll eat healthier, state specific fruit and vegetable goals for each day. Plus, be sure theyre reasonable. So if your child currently only has one fruit or vegetable they like and eat, dont say youll get in four each day. Start with two to be sure its an attainable goal for your child.
Heres a list of New Years resolutions your children can make.
1. Eat more fruits and veggies
A healthier diet starts with eating good foods. The more good foods you eat, the less likely youll be to lean on unhealthy snacks. If you tell children to just stop eating chips, they might be at a loss for what to eat for a snack instead.
So use positive language and instead of removing something from their diet, integrate something into their diet. You can worry about restricting unhealthy snacks later once you have healthy habits.
Part of this resolution falls on parents though. You must be willing to purchase more fruits and vegetables at the grocery store, pack them in school lunches and lead by example. Reach for fruits and vegetables when you are hungry too to show children that this is a good practice for everyone. And remember to make it measurable. Add in just one fruit or veggie to your child’s school lunch or after school snack to start. This way they don’t miss their normal routine entirely and there is still some familiarity for them. Plus, now its measurable instead of just eating more fruits and veggies in general.
2. Play outside more
Set an attainable number for how long youd like your child to play outside. If you can, get the other neighborhood kids involved so that your child has someone to play with while spending more time outdoors.
When you involve others within your child’s peer group, you make the resolution more attainable. Your goal is that all the resolutions that you make with your children are attainable. If they aren’t attainable, you might turn your child off of making resolutions in the future.
If you cant find any of your childs friends to get in on the resolution with them, be sure to join your child outside for the full duration of your goals. Start new outdoor activities and teach your children new outdoor games.
3. Reduce screen time
Estimate how long your child spends with screens each day in total. This includes TV, handheld devices and video games. Cut that number back by 30 minutes and replace the activity with something better for them. This resolution goes hand in hand with going outside more, reading more, or learning a new skill, such as a musical instrument. Do your best to replace the screen time with something fun that you already know your child enjoys. This will make it easier to keep the resolution.And remember, that you model through example. Try to avoid picking up your smartphone while playing with your child, while at the dinner table or when youre enjoying time outside.
4. Do chores without being asked
At times, it feels like all we do as parents is remind children of their chores. Dont forget to make your bed. Its time to empty the dishwasher. Did you feed the dog yet?Encourage children to get into a routine of their daily chores without you having to ask them. The easiest way to set this resolution and to achieve it is to choose activities that you ask your child to do every day. Activities that dont occur every day are naturally more difficult to remember because its harder to get into a routine with them.
Teach children how to build their routines. In the morning, teach them to get dressed, fold their pajamas or put them in the dirty clothes hamper, brush their teeth and make their beds all before joining you at the breakfast table.
If youre looking for an after school routine, teach your children to grab a snack, sit down and complete their homework, and unpack their lunchbox and backpack to prepare for the next day of school.
5. Spend more quality family time
This new year resolve to spend more time together as a family. A tangible way to do this is to set aside one night per week as family night. Pick a game and play it on family night or go to a community event together once a month.
If your children are heavily involved in after-school activities, pick a night where you all play on the soccer field together after one of the games. Or ensure that youre home for one night per week together at the dinner table. Just make sure that whatever you choose to do is something that you can check in on regularly to see how youre doing. Thats one reason to make it a set evening or once per week activity.
Doing New Years resolutions as a family will teach your child that they can always grow and improve. A growth mindset is important. When you lead by example, your children will also see that they arent the only ones that have room for improvement. And youll bond with your children in a special way when you complete growth activities together.
Share this post
Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email
Complete the form to download the E-book
|
The definitive guide to Britain's success in the twenty-first century
About CST
The way forward
25 Year Planning
Marginal Costing
Debt & Economics
Super Fast Track
Imagination – the immensity of our minds
Maths – has predicted many of the key results of the way the Universe works, (a least we think). From Newton’s gravity to Bhor’s atom, from quantum theory to Schrödinger’s cat, black holes, and onto multi-universes and string theory. Many of these have now been experimentally 'proven' yet they were predicted just from our imagination, nothing more.
This is truly clever stuff. For man to have created such mathematical 'understanding' in such a short time (in just 3,000 years of societal living) is quite breathtaking.
These have not been sterile discoveries, they form the basis of our modern technologies, everything from the radio to quantum computers could not have been achieved without such creative understanding of the underlying physics.
So what is the limit of our imaginative brains?
Interestingly, while most of us do not have a good understanding of the mathematics behind quantum theory, we can never-the-less wonder about many aspects of the world and universe generally that we have no experience of and likley never will have.
Yet, as peoples, we either take this for granted, or do not apply this amazing ability to our lives at all. Neither do we help our children extend this natural talent. We have clearly an incredible ability, yet in much of the training and nurturing we provide for our children, we choose to ignore it and concentrate on ‘facts’ and wrote learning as being more important.
This has to be missing a vital part of what truly makes us human, and let us remember - perhaps, the only sentient creature in the universe?
How perverse it would be, if eventually, we found that we are the only sentient creatures? Yet while we have the abilty to create fundamental understanding of the Universe from just our philosophical imagination - we almost disregard our imagination and its true worth. We live mostly without ever using our imagination day to day. What if it were to become second nature for all of us to do this, maybe it would open up new horizons and opportunities?
To highlight just how amazing our brains are consider our dreaming state. Most of us remember vivid dreams, whole new worlds that we create inside our head, to be marvelled at upon waking.
The ‘Lucid Dreamer’ can ‘wake’ within these dreams (we have direct personal experience of this) and can confirm that not only is the dream-world amazing, it is as solid, real, bright and loud as the real world.
In fact, lucid dreamers create a virtual reality that they move within at will, seemingly in real-time and conduct acts such as flying that we have no experience of. To create such a rich, realistic, virtual reality does seem somewhat incredible. However currently, there is very little research into this most amazing ability.
How does the brain achieve such imaginative and complex tasks? How can we nurture these incredible achievements?
How can we teach our youngsters to understand their abilities and like other abilites, practice and improve and use them in new and wondrous ways to improve their lives and help humans to move forward towards a richer twenty second century?
More Reading:
• Approval
• Argument
• Art
• Attack
• Attempt
• Attention
• Attentive
• Attraction
• Authority
• Automatic
|
Right here’s What Market Experts Claim Regarding Biography.
Last modified date
Comments: 0
What is biography? A bio, or just simply bio, is a comprehensive account of the life of a particular individual. It involves a lot more than simply the realities regarding an individual like his/her education and learning, work-related work, family, and more; it portrays a more personal sight of the person’s experiences in life. With the passage of time as well as the buildup of even more information, certain parts of the bio of a certain person come to be less important while others are extra important. This is particularly true if the resource of info is something aside from key resources like primary files.
Bios are divided right into two types: real bios and misconceptions or fictitious bios. True bios are based upon recorded truths regarding a person while in the form of a memoir. On the other hand, fictional biographies are based upon totally fictitious events regarding a specific individual. Although most of the biographies we normally see are based on either real or incorrect, there exists a third type that exists somewhere in between. In this third category, biographies can be divided right into chronological order and combined biographies.
Chronological order of biographies is when the occasions that were covered are arranged in sequential order beginning with the beginning throughout of the individual’s life story. When it pertains to writing a chronology, remember that the author is needed to utilize the word “by” where a title or a few other indication should be apparent. For example, if you will be composing a biography on Martin Luther King, you ought to make use of words “by himself” for the initial person. Likewise, the second individual ought to utilize “a” for his life partner as well as “the” for his spiritual guide. There are some grammatic principles that are complied with in sequential order of bios; therefore, it is constantly far better to examine whether the grammar guidelines are adhered to properly before creating a bio.
Mixed biographies are those bios that are written in similarly as other works like a novel or a narrative. In such situation, the details concerning the person is provided yet some essential details are neglected. It is usually seen that a writer writes an unique as well as includes essential details like the background and individuals involved in the growth of the story. In such instances, biographers as well consist of some vital details however compose them in such a way that the viewers can reason. An additional instance is that of a brief write-up that was contacted convey a crucial concept to readers. Some ideas as well as principles might not be well-known to readers so including them in a biography does not make much sense.
The third category of biographies that is blended as well as refers to imaginary biographies is loosely based upon real occasions. These are typically called as “fiction biographies”. Such fictional bios are usually made use of to convey a concept or to offer information that is interesting to the visitor. Nonetheless, the bio sometimes describes an actual taking place. In this situation, the author will certainly require to justify some realities discussed in the imaginary write-up.
The fourth kind of biographies is written as a memoir of some type. In such cases, the emphasis gets on some certain and also self-contained experience of the writer. Memoirs therefore are the most usual sort of bios. Nonetheless, memoirs as such are not without their very own set of troubles because one needs to carefully account for all the occasions, situations and experiences over an extended period of time.
The 5th and final biographical type is the generic or general background writing. This is possibly the most general category of biographies as it covers almost every discipline from general background, social science to law as well as medicine. Therefore, several categories of biography can be discovered in the basic history composing group.
In case of any problem in identifying the ideal type of bio to write, one can constantly depend upon the bibliography. A well organized set of bios will highlight the key figures and crucial facets of a subject, besides providing an image of the life story as a whole. Thus, even if one can not identify a specific category of biography to create, the bibliographies will certainly help one to a terrific extent in providing a general idea regarding the category of bio. All that continues to be for you to do is to choose the best style and start creating!
Biographies of historical figures and other people with important personal histories are written about specific occasions that took place throughout important time frames. As with other forms of creating, biographies that deal with the lives of somebodies must not include individual details regarding the subjects. Such information will certainly tend to influence the visitor’s viewpoint of the author. Moreover, biographies that contain just the name of a person might not offer sufficient details to effectively translate the subject’s life story. This is why biographies of historical figures are composed chronologically.
When starting the process of assembling a biographical record, some writers start with research study. There are several means to begin this task, depending upon what field of study one is operating in. Some biographies might call for interviewing participants of the based on gain beneficial information from them. Others might like to look online to search for memoirs, biographies, news article, or various other resources of info. Newspapers and publication write-ups frequently feature meetings with the topic, allowing biographers to compile an extensive narrative history of the topic.
After compiling a selection of sources, it is very important to identify the main features that comprise the topic’s life as well as those that make him or her significant. When finishing a biography of somebody who is popular, the biographer needs to have the ability to reason concerning the subject based upon research she or he has actually done. It is additionally practical to work in a location where one has competence. If a freelance writer is attempting to compose a bio of a preferred or prominent political leader, as an example, she or he need to first come to be acquainted with the leader’s politics, personal ideas, remarkable achievements, public habits, and so forth. Then, she or he will certainly have a good basis for writing a well-written biography. personal page
Bios of renowned individuals commonly function as guides for trainees intending to enter jobs that revolve around that individual’s public image. For instance, pupils researching a career in politics might check out bios of well-known politicians to gain a sense of exactly how they regulated themselves as well as exactly how they influenced their nation. A pupil of art or design may check out a bio of an artist to obtain insight right into the techniques that inspired that musician. Bios of prominent individuals can function as a motivation for blogging about a specific subject, yet biographies must constantly be created from the perspective of the biographer.
Leave a Reply
Post comment
|
- Art Gallery -
Cladus: Eukaryota
Supergroup: Opisthokonta
Regnum: Animalia
Subregnum: Eumetazoa
Cladus: Bilateria
Cladus: Nephrozoa
Cladus: Deuterostomia
Phylum: Chordata
Subphylum: Vertebrata
Infraphylum: Gnathostomata
Superclassis: Tetrapoda
Classis: Aves
Subclassis: Carinatae
Infraclassis: Neornithes
Parvclassis: Neognathae
Ordo: Galliformes
Familia: Odontophoridae
Genera: Callipepla - Colinus - Cyrtonyx - Dactylortyx - Dendrortyx - Odontophorus - Oreortyx - Philortyx - Rhynchortyx
Odontophoridae (Gould, 1844)
Vernacular names
Dansk: Topvagtler
Deutsch: Zahnwachteln
English: New World Quails
Español: Cordonices del Neuvo Mundo
The New World quails or Odontophorids are small birds only distantly related to the quails of the Old World, but named for their similar appearance and habits. The American species are in their own family Odontophoridae, whereas the Old World birds are in the pheasant family Phasianidae. The family ranges from Canada through to southern Brazil, and one species, the California Quail, has been successfully introduced to New Zealand. A variety of habitats are used by the family from tropical rainforest to deserts, although few species are capable of surviving at very low temperatures. There are 32 species in nine genera.
The New World quails are shy diurnal birds and generally live on the ground; even the tree quails which roost in high trees generally feed mainly on the ground. They are generalists with regards to their diet, taking insects, seeds, vegetation and tubers. Desert living species in particular take a lot of seeds.
Most of the information about the breeding biology of New World quails comes from North American species, which have been better studied than those of the Neotropics. The family is generally thought to be monogamous, and nest are constructed on the ground. Clutch sizes are large, a situation typical within the Galliformes, ranging from 3–6 eggs for the tree quails and wood quails, and as high as 10-15 for the Northern Bobwhite. Incubation takes between 16-30 days depending on the species. Chicks are precocial and quickly leave the nest to accompany the parents in large family groups.
Northern Bobwhites and California Quail are popular gamebirds with many taken by hunters, but these species have also had their ranges increased in order to meet hunting demand and are not threatened. Some species are threatened by human activity, such as the Bearded Tree Quail of Mexico, which is threatened by habitat loss and illegal hunting.
Family Odontophoridae
* Genus Dendrortyx
o Bearded Tree Quail, Dendrortyx barbatus
o Long-tailed Tree Quail, Dendrortyx macroura
o Buffy-crowned Tree Quail, Dendrortyx leucophrys
* Genus Oreortyx
o Mountain Quail, Oreortyx pictus
* Genus Callipepla
o Scaled Quail, (commonly called Blue Quail) Callipepla squamata
o Elegant Quail, Callipepla douglasii
o California Quail, Callipepla californica
o Gambel's Quail, Callipepla gambelii
* Genus Philortyx
o Banded Quail, Philortyx fasciatus
* Genus Colinus
o Northern Bobwhite, Colinus virginianus
o Black-throated Bobwhite, Colinus nigrogularis
o Spot-bellied Bobwhite, Colinus leucopogon
o Crested Bobwhite, Colinus cristatus
* Genus Odontophorus
o Marbled Wood Quail, Odontophorus gujanensis
o Spot-winged Wood Quail, Odontophorus capueira
o Black-eared Wood Quail, Odontophorus melanotis
o Rufous-fronted Wood Quail, Odontophorus erythrops
o Black-fronted Wood Quail, Odontophorus atrifrons
o Chestnut Wood Quail, Odontophorus hyperythrus
o Dark-backed Wood Quail, Odontophorus melanonotus
o Rufous-breasted Wood Quail, Odontophorus speciosus
o Tacarcuna Wood Quail, Odontophorus dialeucos
o Gorgeted Wood Quail, Odontophorus strophium
o Venezuelan Wood Quail, Odontophorus columbianus
o Black-breasted Wood Quail, Odontophorus leucolaemus
o Stripe-faced Wood Quail, Odontophorus balliviani
o Starred Wood Quail, Odontophorus stellatus
o Spotted Wood Quail, Odontophorus guttatus
* Genus Dactylortyx
o Singing Quail, Dactylortyx thoracicus
* Genus Cyrtonyx
o Montezuma Quail, Cyrtonyx montezumae
o Ocellated Quail, Cyrtonyx ocellatus
* Genus Rhynchortyx
o Tawny-faced Quail, Rhynchortyx cinctus
Biology Encyclopedia
Birds Images
|
- Art Gallery -
Cladus: Eukaryota
Supergroup: Opisthokonta
Regnum: Animalia
Subregnum: Eumetazoa
Cladus: Bilateria
Cladus: Nephrozoa
Cladus: Deuterostomia
Phylum: Chordata
Subphylum: Vertebrata
Infraphylum: Gnathostomata
Superclassis: Tetrapoda
Classis: Mammalia
Subclassis: Theria
Infraclassis: Marsupialia
Ordo: Microbiotheria
Familia: Microbiotheriidae
Microbiotheria Ameghino, 1889
* Dromiciopsia
* Gondawanadelphia
Vernacular names
Italiano: Microbioteri
日本語: ミクロビオテリウム目
Although once thought to be members of the order Didelphimorphia (the order that contains the Virginia Opossum), an accumulation of both anatomical and genetic evidence in recent years has led to the conclusion that microbiotheres are not didelphids at all, but are instead most closely related to the Australasian marsupials; together, the microbiotheres and the Australian orders form the clade Australidelphia. The distant ancestors of the Monito del Monte, it is thought, either remained in what is now South America while others entered Antarctica and eventually Australia during the time when all three continents were joined as part of Gondwana, or else were part of the Australian marsupial fauna which reinvaded South America.
Biology Encyclopedia
Mammals Images
Source: Wikispecies:, Wikipedia All text is available under the terms of the GNU Free Documentation License
|
Salta al contenuto principale
Economic and Political Consequences of the Coronavirus Pandemic in the US
The coronavirus or covid pandemic is the most significant health crisis to affect the world since the Great Influenza or Spanish flu of 1918-20. But it is not just a health crisis. Because the coronavirus is so contagious and so deadly, it has turned into a worldwide economic crisis as countries shut down their economies to protect their citizens, and people decided to stay at home rather than to go outside and spend money.
This webinar will look at the coronavirus pandemic experiences, and the policy responses to the pandemic, in the US. It will focus on the economic, health, political and socio-economic consequences of the 2020-21 coronavirus pandemic from the perspective of the US. As different countries have had different experiences, and employed different policies to deal with this health crisis (with different results), we will make comparisons between the US and other developed nations.
In this webinar we will focus on the Economic and Political Consequences of the Coronavirus Pandemic in the US.
Steven Pressman and Robert Scott will start by focusing on the main economic consequences of the coronavirus pandemic - how it affected economic growth, unemployment, poverty, food insecurity and labor force participation. They will also talk about rising government debt and rising inequality as economic consequences of the coronavirus pandemic.
Then they will move on to talk about some of the political consequences of the pandemic. On the one hand, this includes the possibility of major policy changes that may impact the US for years to come in a positive way. On the other hand, this includes attempts to politicize a health crisis (including denying that the crisis exists, mask rebellion and vaccine skepticism) that may impact the US for years to come in a negative way.
Finally, the webinar will conclude with some speculation about what will come next for the US. This includes some long-run behavioral responses (such as labor supply decisions and changes in the nature of work) as well as policy changes and economic changes due to the end of policies that were enacted in order to reduce the human damage from the health crisis.
This webtalk is made possible thanks to the generous support of the American people through the U.S. Agency for International Development. By managin overseas assistance programmes, USAID provides economic and humanitarian assistance in more than 100 countries around the world.
The contents of this secton are the responsibility of VIS and do not necessarily reflect the view of USAID or the governemnt of the U.S.
Date: October 5, 2021
Time: 4:00 - 5:00 PM CEST
Format: Second of two webinars
Registration: free access (pre-registration required). CLICK HERE to sign up.
The participation certificate will be issued upon request.
Inizio Corso05/10/2021
Scadenza Iscrizioni05/10/2021
Register in advance for this meeting:
|
Does Initializing a Disk Erase Data?
authorPic William Bollson Updated on 2021-10-21 15:41:43 to Hard Drive
Disk not initialized and unallocated is a typical hard disk issue that can interrupt your work. When a hard drive becomes uninitialized, you can’t open your data there. Then, at that point, how to initialize disk without losing data becomes your primary concern. If you have a disk that appears as "Not Initialized" and you are wondering does initializing a disk erase data, don't worry. You can initialize the hard drive without agonizing over it. Here, you will learn all you need to know about initializing a disk and not losing the data saved on that Disk.
disk uninitialized
How to Fix External Hard Drive Not Initialized|Disk Unknow Not Initialized
Free Download
For PC
Secure Download
Free Download
For Mac
Secure Download
Part 1: What Does Initialize Disk Mean?
While adding a new disk to your PC, it won't appear right away. You need to physically initialize the recently added hard drive before working with it. Initializing makes a disk usable by Windows. It lets you make partitions and afterward format the drive for further use.
Old disks with a lot of data additionally should be initialized. That is because of various framework errors. Here, you will learn how do Windows initialize disk and make your PC running again.
Part 2: Why Disk Manager Insists that You Must Initialize a Disk?
You should realize that the "You should initialize a disk" issue may happen to an SSD, hard drive, USB, and so forth. At some point, if your Disk isn't effectively installed or connected with your OS, Windows OS will not have the option to read the gadget, and you might even get the problem/error report. A convenient solution to this issue is to turn off the Disk from your PC, check the SATA and power link, and reconnect it to your PC accurately.
You might see this issue for two reasons:
• The Disk is new, and you will need to initialize the disk to partition it. A while later, format the partition to prepare it for storing data.
• The Disk has been utilized for a while and abruptly becomes uninitialized.
Part 3: Does Initializing a Disk Erase Data?
The MBR (Master Boot Record) is the first sector of an MBR or GPT disk. At that point, when MBR on your Disk is corrupted, you will see your Disk appearing as a disk not initialized. In this manner, initializing a disk intends to modify MBR, which won't delete data on your Disk.
At that point, you need to initialize disk MBR or GPT without losing data. Furthermore, just initializing the Disk will not make the Disk usable once more. Your Disk requires partitions and formatting, which will unquestionably delete your disk data. Due to that reason, people will tell you that initializing a disk might cause data loss on the drive.
Part 4: How to Initialize Disk without Losing Data?
Preparation: Recover Data from Uninitialized Disk Firstly
Before initializing disk, we highly suggest you to retrieve data from the uninitialized disk. The easiest and securest solution is using professional data recovery tool to help you out!
Tenorshare 4DDiG is specialized in data recovery from affected or unrecognized drives or devices. With this tool, you can recover any lost or deleted data from Windows/Mac/USB flash drive/SD card/External hard drive and more with simply 3 steps. The guide underneath will walk you through the steps to recover data from a disk not initialized.
Free Download
For PC
Secure Download
Free Download
For Mac
Secure Download
• Step 1:Select the Uninitialized Disk
• After installing Tenorshare 4DDiG, go to the homepage, which shows Devices and Drives. The uninitialized partition could be named as "Lost Partition" in the user interface and you can select it and thenn click Start to proceed.
select uninitialized disk
• Step 2:Scan the Drive for Files
• 4DDiG promptly scans your chosen drive to look for the lost data. There is an advancement bar showing what amount has been thoroughly checked. Additionally, you can respite or stop the scanning whenever you track down your ideal files to recover.
Then, you can see the scanning result, which shows the number of files that have been found effective. You can click Deep Scan to look deeply for the erased files, which might consume more time.
scan hidden files
• Step 3: Preview and Recover Lost Files
• You can choose your ideal files subject to their category, preview them, and afterward click on “Recover” to get them back from your hard drive.
After clicking on “Recover,” a dropdown box will open, requesting the area you wish to retrieve the files. Select the ideal yet unique location and tap OK. Do not save to a similar area where you lost them because it can cause Disk overwriting and lasting data loss.
recover data from uninitialized disk
How to Initialize Disk?
After you successfully retrieve data from uninialized disk, you can now start initialzing disk with the following steps:
Step 1: Right-click This PC from your desktop and go to Manage > Disk Management.
Step 2: Right-click the Disk that says "Not Initialized" and click on Initialize Disk to make it working again.
Step 3: In the "Initialize Disk" windows, you need to pick MBR or GPT as partition style for the Disk. Then, at that point, tap "OK" to proceed.
how to initialize disk
Partition and Format the Disk
Presently you can make new volumes on your Disk without stressing over losing every one of your files.
Step 2: Click on "New Simple Volume" after right-clicking the unallocated space.
Step 3: Click "Next" to proceed in New Simple Volume Wizard.
Step 4:Follow the wizard to assign the volume size, appoint a drive symbol (alphabet) to the volume, and afterwards format the partition.
partition and format the disk
Part 4. FAQs about Initializing a Disk
1. What will happen if I initialize a disk?
Initializing is possibly required when a disk hasn't been used, i.e. has no filesystems. After a disk initializing, you can make partitions and format them to make a file system. Windows likewise shows this if you put a disk with a filesystem from an OS on it that it doesn't read, like Linux or Mac, and even Xbox One drives.
Note:Just because Windows shows Initialize Disk doesn't mean there is no data on it. It could have an unfamiliar filesystem (Mac or Linux) that Windows doesn't read, and adding it will erase the filesystem.
2. Can you recover data after initializing?
To play out a data recovery after Disk initializing, you might require an expert data recovery utility. Tenorshare 4DDiG is such a program. It empowers you to recover data from all data loss situations in Windows 11/10/8/7. All document types can be upheld by this dependable software like photographs, recordings, and different files.
3. How do I initialize my external hard drive without losing data?
Step 1: Go to Start with the right-click and select Disk Management.
Step 2: In the other window click on the new hard drive. If it is "Offline," change the status to "Online" to Proceed.
Step 3: Then, at that point, right-click on it and select the option "Initialize new disk."
In that way, you can initialize your disk drive without having the risk of losing your precious data. Anyway, we highly suggest to use data recovery tool to retrive your data before initializing external hard drive.
4. How do you fix the "You Must Initialize a Disk" error without losing data?
To fix the "You must initialize a disk" error, you can attempt one of the following five ways:
• Initialize disk drive with Disk Management
• Reinstall the Disk drive of the hard drive
• Reinstall Universal Serial Bus (USB) controllers
• Reset the CMOS Settings
• Check bad sector
Will initialize disk erase data on it? The appropriate response to this query is both "Yes" and No, particularly initializing disk will not eradicate its data. But in the meantime, to utilize the disk drive, you need to add partitions to the disk drive and format it, which will cause a loss of data. Tenorshare 4DDiG Data Recovery Software is the best solution. In this manner, utilizing data recovery software like Tenorshare 4DDiG is necessary if you would prefer not to lose files existing on your hard drive.
(Click to rate this post)
You rated 4.5 ( participated)
|
The PED virus infection has never been detected in Denmark and cannot be transmitted to humans. A new and more aggressive type of the virus has spread from Asia to the American continent and the EU has introduced restrictions in order to avoid further dissemination of the virus.
Porcine epidemic diarrhoea is a virus infection that can affect pigs of all age groups. PED occurred in several European countries in the 1980s and the 1990s but has since disappeared in most countries and has never been found in Denmark.
A more aggressive type has been known for many years in the Middle East but in 2013, PED occurred in the US. The virus spread to many places in the US and to Canada and several South American counties. The virus is genetically related to types from the Middle East and it is assumed that the American virus has come from here. The source of infection or the introduction pathways are unknown although feed ingredients have been suspected. In particular blood plasma used for piglets has been under suspicion as the cause and it has been proved that a part of the dissemination in the US can be attributed to blood plasma.
In 2014, instances of PED were found in Italy and Germany where this virus is quite similar to the American virus but it is not possible to say for certain whether it is the same virus.
What does the Danish pig industry do in order to avoid PED?
The EU has introduced restrictions on blood plasma imported from third-world countries with requirements for heat treatment and six weeks of storage.
SEGES, the Knowledge Centre for Pig Production,has recommended gradual phased elimination of the use of blood plasma in 2015 and has introduced the requirement for phasing out in the DANISH Standard.
What are the symptoms for the pigs?
The principal symptom is severe diarrhoea in almost all pigs. In suckling pigs and pigs that have just been weaned off, the progress is often quite severe with a mortality of between 80 and 100 per cent but in older animals, the mortality is lower.
After 3-4 weeks, the symptoms will abate as immunity is developed in the affected animal and new-born suckling pigs get antibodies through the raw milk from the sow.
PED virus is not contagious for humans.
Read more about PED here:
|
I have grown up in a country where milk is stored in a steel container in the fridge at home. That’s what makes me wonder why milk is not sold that way?
Nowadays the steel container single wall is cheap anyway. Given the fact that steel is infinitely recyclable, I would think it is far cheaper than single-use disposable plastic or even reusable glass. Is there any scientific reason like bacteria formation when stored in steel? Or corrosion due to an acidic nature?
• $\begingroup$ I don't see a reason it would be connected to chemistry of steel. It's just heavy and difficult to process. $\endgroup$
– Mithoron
Jun 4 at 14:26
• 4
$\begingroup$ There is no such thing as "food grade" stainless. There are stainless steels traditionally used in the food industry , primarily 316 and 304. $\endgroup$ Jun 4 at 15:16
• $\begingroup$ PE-coated cartons are designed to be recyclable, and I suspect that the environmental impact of people who don't offer those for recycling is lower than the environmental impact of putting stainless steel into rubbish dumps. Bulk transport of milk is done in stainless steel tanks. $\endgroup$ Jun 4 at 17:08
• 1
$\begingroup$ This question probably makes more sense if you live in a country where bottle recycling is a regular feature $\endgroup$
– Valorum
Jun 4 at 18:10
• 1
$\begingroup$ Your country doing it one way does not mean that it is the best way. Even before reading the Answers, my first thoughts were, "steel is expensive and heavy compared to plastic and paper. (Heck, in Canada, milk is sold in thin plastic bags!!! $\endgroup$
– RonJohn
Jun 4 at 23:45
I believe it is cost. According to 1, food-grade stainless steel works well as a container for milk.
However, the article also says that the wholesale cost of a 0.568 L (19.2 fluid ounce) glass milk bottle in Great Britain was 0.35 £ ($0.50) in 2020.
By contrast, I searched a few wholesale sites, and the least expensive staineless steel water bottle I could find in that size (20 oz.) was $3.19 in quantities >2000[2]. [US cost.]
On the other hand, stainless steel does have a longer lifetime than glass, which reduces the effective cost. But that would only apply if customers actually returned the bottles, which many don't; and the deposit doesn't make up for the cost of the stainless steel container.
1. Tomasz Błażejewski, Stuart RJ Walker, Rukayya Ibrahim Muazu, Rachael H Rothman, Reimagining the milk supply chain: Reusable vessels for bulk delivery, Sustainable Production and Consumption, Volume 27, 2021, DOI: 10.1016/j.spc.2021.02.030.
2. https://www.silkletter.com/venture-20-oz-stainless-steel-sports-bottle.html
• 15
$\begingroup$ Also, plastic is lighter and reduces transport costs. If you ship it far enough, a plastic bottle will save more than its own cost compared to the steel one. This is also an argument for plastic over glass which used to be common. Finally, the recycling of steel is not free. $\endgroup$
– badjohn
Jun 4 at 5:01
• $\begingroup$ @badjohn The article I linked addresses those issues in a lot of detail; though it concerns wholesale, rather than retail, delivery of milk. $\endgroup$
– theorist
Jun 4 at 5:03
• 2
$\begingroup$ Sorry, I didn't follow the links and just read your text. For the benefit of other lazy readers, it might be nice to mention them. $\endgroup$
– badjohn
Jun 4 at 5:05
• 1
$\begingroup$ There are other types of milk containers, like cardboard (with a very thin plastic (polyethylene) coating on the inside) - for instance, used for the majority of milk products where I live. It has started to be recycled here (not just incinerated). Plastic-coated paper $\endgroup$ Jun 4 at 13:40
• 2
$\begingroup$ The other advantage of plastic or glass over steel is that it's transparent - One of the first signs the milk is starting to go bad is curdled lumps clinging to the side of the bottle. With steel, you might not notice that until it starts to smell or the lumps are solid enough to pour out, by which point the milk has already been partly bad for a few days. (Cardboard containers have the same problem, with the added drawback that they don't seal very well and are thus more likely to spoil quickly.) $\endgroup$ Jun 4 at 14:08
Any steel container is going to quickly show wear and dents in it. If you use one thin enough to be cost and weight effective, even more so.
Milk is one of those products that has to look clean and fresh on the shelf. A dented can isn't going to work well in this situation.
• $\begingroup$ That's a really good point. The analysis I cited was for commercial deliveries, where customers are concerned more about practicality than presentation. Retail is an entirely different ballgame. $\endgroup$
– theorist
Jun 4 at 23:12
• $\begingroup$ A dented bottle is also probably not going to get deposit back. We have to be responsible with the bottle and return it in acceptable condition to get full deposit back. This way we can keep bottle in circulation for long and eliminate single use waste. $\endgroup$
– user43325
Jun 5 at 22:28
Glass is very recyclable, but there are additional transport costs associated with the weight and volume overheads of glass containers compared to PE-coated card, and broken glass is more dangerous than broken card.
Milk has a limited use time because there will be bacteria in it, regardless of the packaging used to contain it. Milk which has been filtered to remove (some) bacteria is available (e.g. sold as Cravendale, but even that has a limited lifetime). UHT milk is perhaps not the same product as normal milk, depending on what it's going to be used for.
Bulk transport of milk is done in stainless steel tanks which are cleaned between uses: the re-use of a milk-tanker is pretty-much guaranteed.
Overall, it is cheaper to use PE-coated cartons than any other package for small volumes of milk.
|
ABRASIVE: Substance used to wear away a surface by friction.
ABRASIVE COATING: In closed coat paper, the adhesive is completely coated with abrasive, and in open coat paper, the adhesive is partially exposed, for the abrasive is not put on the paper close together.
ACCUMULATOR: Assembly that acts as a refrigerator storage container to receive liquid, vapor, and refrigerant oil from the evaporator.
ACETYLENE: Gas used for oxyacetylene welding.
ACID CORE: Solder in a tubular wire form in which the interior contains an acid flux. Not used for electrical repair. Rosin flux used for electrical repair.
ACRYLIC RESINS: Synthetic resin that has excellent color retention and clarity and that is used in both lacquer and enamel.
ACTIVATOR: Additive used to speed up the curing of paint resins.
ALTERNATOR: Device on a vehicle that when turned produces electricity
ALUMINUM OXIDE: Sharp and hard abrasive that is made by fusing mineral bauxite at high temperatures.
ALUMINUM BONDING FOAM: Usually used to lower NVH (Noise Vibration and Harshness) characteristics and sealing purposes.
ALUMINUM COUPON: Used to practice and replicate welding needs prior to welding on the actual part(s). Sometimes numerous coupons are needed.
ALUMINUM HEM FLANGE: Creating a bent or an arc in Aluminum that doesn’t create cracking within the panel.
AMBIENT TEMPERATURE: Temperature of the air surrounding an object.
ANTICORROSIVE: Materials applied to metal to give corrosion resistance.
ANTICORROSIVE AND INHIBITOR: Protective coatings applied on metal surfaces to retard or prevent corrosion and said to be anticorrosive or corrosion inhibitive.
ARMREST: Part of the door trim on which the arm may be rested.
ASSEMBLY: A number of auto body parts that are either bolted or welded together forming a single unit.
ATOMIZATION: Breaking up a fluid with an air stream, such as with a spray gun.
ATOMIZE: Air at the gun nozzle breaks up the paint and solvents into fine particles.
AUTOMATIC LOAD-LEVELING SYSTEM: System used on some vehicles to raise the vehicle to counteract the weight of the passengers.
AUTOMATIC PRESSURE SWITCH: Used on a compressor to release the air pressure in the cylinders and/or pressure tank
Back to Top
BACK-SANDING: Technique of sanding a surface to taper the paint film away from the metal repaired area.
BACKFIRE: Malfunctioning of a torch, causing the flame to go out with a loud snap or pop.
BACKHAND WELDING: When the torch, in the case of a right-hand operator, is moved in the opposite way from left to right instead of right to left as in the usual practice.
BAFFLE: Part used in a spray gun to divert the air stream. Also a part of the radiator support on some cars.
BAKING: Application of heat to cure and dry a coating. In automotive refinishing, baking is used to speed up the drying of air-drying lacquers and enamel and is sometimes called force drying. The metal temperature in refinish baking usually does not exceed 180 F (82.2 C).
BANDING: Single coat of paint applied to frame in an area to be sprayed.
BASECOAT/CLEARCOAT: Type of paint coating.
BATTERY: Part used in vehicles to store electrical energy used to start the vehicle.
BELT SANDER: Used in conjunction with thin sandpaper to remove metal material or welds in smaller or tighter areas.
BETTERMENT FACTOR: Term used in the insurance industry when a part such as a tire is replaced, and the insurance company pays for the unworn part and the customer pays for the amount that was worn.
BINDER: Resin used to hold the pigment in a paint film.
BLEEDING: Action whereby the color of a stain or other material works up into succeeding coats and imparts a certain amount of color. This is characteristic of certain red pigments used in lacquers and enamels. A non-bleeding color is one that is not soluble in materials used over it and, consequently, does not work up into succeeding coats. Bad body filler will also cause bleeding.
BLENDING: Mixing together of two or more materials or the gradual shading of paint from one panel to the next to assure color consistency.
BLISTERING: Bubbling up of the paint film in the form of small blisters.
BLUSHING: White or grayish cast that sometimes forms on a lacquer film as it dries, particularly under conditions of hot, humid weather.
BODY FILES: Variety of files used in accurately locating surface irregularities (high and low spots) on damaged areas after they have been “bumped” out. Also used in trimming down solder and plastic filled areas.
BODY SOLDER: Alloy of tin and lead. Its properties may vary but the most common mixture consists of 30% tin and 70% lead or 30/70 solder as it is usually called.
BODY STRAPS: Specially designed straps made out of strong vulcanized belting material equipped with wide hooks that snugly fit around the flanges of various body panels. They are used in repositioning and pulling different assemblies and parts closer together.
BODYING: Thickening in the package, usually due to evaporation of solvents or volatile material because of excessive heat or exposure to air during storage.
BOILING POINT: Temperature at which the vapor pressure of a liquid exceeds the atmospheric pressure and the liquid begins to boil.
BONDING STRIPS: Narrow strips of laminated fiberglass bonded to the inner surface of the replacement panel and the adjoining body panels. When properly installed, the strips greatly strengthen the joint and make alignment of the replacement panel with the rest of the body panels much easier.
BRAKE SYSTEM: Hydraulic system of levers, cylinders, surfaces and fluid used to stop or slow down a vehicle.
BRIDGING: Ability of an enamel or lacquer to cover a crack, void, or other small gap.
BUBBLES, BLISTERS AND BULGES: Damage that occurs on vinyl roof covers.
BUFFING: Technique used to polish an area to remove sanding marks of surface imperfections.
BUFFING COMPOUND: Soft paste containing fine abrasive in a neutral medium, used to eliminate fine scratches and polish the topcoat.
BULL’S-EYE: Edge of a repaired area of a paint film that shows up after a surface has been repainted.
BURNING: Condition resulting from rubbing a topcoat too hard. The heat generated by the friction of the rubbing pad may soften the surface and cause it to stick to the pad, thus permanently marring the finish.
BUTT WELD: Two pieces of similar metal are aligned closely edge to edge. The edges are tack welded first and then by running a good bead are solidly fused together.
Back to Top
CAKING: Gathering of sanding dust into solid cakes sticking to sandpaper. Compare Gumming
CALCIUM CARBIDE: Chemical used to make acetylene gas.
CALIPER: Part of the disk brake mechanism that holds the brake pads.
CAMBER: Inward or outward tilt of the wheel at the top. It is the tire-wearing angle measured in degrees and is the amount the centerline of the wheel is tilted from true vertical.
CARBON DIOXIDE: Gas that can be used for MIG welding when mixed with Argon or other gas.
CARBURIZING FLAME: Used mostly for heating parts and for soldering. It burns more acetylene than oxygen through the torch. Its inner core is whitish in color and has a feather. Sometimes also called a reducing flame.
CASE HARDENING: Surface coating that will dry hard on top and remain more or less soft underneath. Compare Lifting.
CAST: Tendency of one color to look like another.
CASTER: Backward or forward tilt of the king pin or spindle support arm at the top. It is the directional control angle measured in degrees and is the amount the centerline of the spindle support arm is tilted from the true vertical.
CATALYST: Substance that causes or speeds up a chemical reaction when it is mixed with another substance and that does not change by itself.
CAULKING COMPOUND: Semi or slow-drying plastic material used to fill crevices or seal joints.
CAVITY WAX: is an interior-corrosion prevention coating for application to automotive bare or primed metals. Typically applied to door skins, rocker panels, interior quarter panels, frame rails, etc. Designed to remain soft and pliable it will not crack, chip, or peel.
CENTER PLANE OR CENTERLINE: Line in the center of vehicle from which all side measurements are taken.
CENTRIFUGAL PRESSURE SWITCH: Switch used on a compressor to release the pressure in the cylinder.
CHALKING: Formation of soft white powder on the surface of a finish, which may be removed by friction of the finger or similar methods.
CHECKING: Small, irregular cracks going partly or completely through a paint film. Like “alligatoring”, only very fine cracks. Compare Cracking and Crazing.
CHEMICAL STAINING: Spotty staining or discoloration of the paint topcoat caused by atmospheric conditions (acid rain, tree sap, etc.).
CHIPPING: Condition of the finish flaking off or chipping away from the surface underneath.
CHIPPING HAMMER: Special hammer used in removing slag deposits from a weld so that it can be inspected for quality.
CHROMA: Quality of a color that combines hue and saturation.
CLEAN: Opposite of dirty. Describes a color with a bright appearance rather than one that has a drab appearance. The exclusion of black makes colors cleaner.
CLEAR: A coating of paint that has no color.
CLEAR COAT: A clear, shiny coat of paint (e.g. urethane or acrylic enamel) applied over the base or color coat of paint on a vehicle.
CLICK BOND RIVET: Adhesively bonds to the metal sub straight avoiding the need to drill hole for rivets. Prevents NVH and corrosion issues.
CLOSED-COAT DISK: Disk on which the abrasive grains are very densely spaced. Used in disk sanding and polishing repaired sheet metal.
COAT DOUBLE: Two single coats applied one after the other with little or no flash-off time for the first coat.
COAT SINGLE: Coat produced by two passes of a spray gun when one pass overlaps the other 50 percent or by half steps.
COLD CRACKING: Cracking of a paint job resulting from a sudden drop of temperature.
COLD RAZOR KNIFE: Knife used to cut the adhesive of windshields and backlites.
COLLAPSED HINGE BUCKLE: Formed whenever a simple hinge buckle extends and crosses over a stamped-in reinforcing flange, head, or ridge on a flat or reverse-curved (concave) surface of an auto body panel. Will also form when box constructed members and a
COLLAPSED ROLLED BUCKLE: Formed whenever a hinge buckle extends or crosses over into the crowned surface of a panel causing the metal to collapse and shrink severely and a general shortening up in the overall length of the panel to occur.
COLOR COAT: The single stage or BASECOAT that provides the final color of a coating system.
COLOR RETENTION: When a color is exposed to the elements and does not change is said to have good color retention.
COMPARTMENT: Separate enclosure or section, such as the engine, passenger and luggage compartment, in an autobody.
COMPATIBILITY: Ability of two or more materials to blend into a homogeneous mixture and upon drying, a homogeneous film without a subsequent negative chemical reaction.
COMPOUNDING: Use of an abrasive either by hand or machine to smooth out and bring up the gloss of an applied topcoat.
COMPREHENSIVE COVERAGE: Term used to describe a type of insurance protection designed to cover loss from accidental damage caused by other than collision.
COMPRESSOR: Machine used to compress air from atmospheric pressure to a high pressure.
CONDUCTOR: Material such as an electric wire through which electricity flows.
CONE MANDREL: Special attachment used with an abrasive cone in sanding hard-to-get-at concave surfaces around headlights, fender flanges and trim moldings.
CONNECTORS (MALE AND FEMALE): Attachments used in coupling two or more extension tubes together and to the various rams.
CONSTANT VELOCITY JOINT: Type of joint that provides constant, even transfer of power.
CONTACT TIP: Part of the MIG gun through which the welding rod moves.
CONTAMINANTS: Any polish, wax, tree sap, tar, oil, and the like that would damage the paint film or spoil the adhesion of a new paint film.
CONTRACTION: Area that reduces in size.
CONTROL POINTS: Areas in the vehicle body that are used to measure for dimensions or to correct damage.
CONTROLLED HEAT: Heat from an acetylene torch that is usually controlled by the operator.
CONVENTIONAL BODY CONSTRUCTION: Type of construction where the body and frame are two entirely separate units held together at various points by means of body bolts.
CONVERSION COATING: Part of a metal treatment system that modifies a metal substrate to increase adhesion and corrosion protection.
COOLING SYSTEM: System of parts and fluid used to cool the engine.
CORRECTIVE PULL: Application of force to remove collision damage.
CORRECTIVE ACTION REPAIR: Inspecting and analyzing a previous repair that may not have been performed to OEM requirements or standards.
CORROSION: Chemical reaction of oxygen and moisture, or corrosive materials on a metal surface; usually referred to as rusting or oxidation.
CORROSION RESISTANT: Material that resists the effects of corrosion.
COUPLER: Permits the removal of the coupler tube without the loss of hydraulic fluid from the ram making it possible to use the same pump with a variety of rams and spreaders.
COVERAGE: Quality some colors have to cover other colors and the area a certain quantity of paint will cover.
COWL: Front part of the vehicle passenger compartment.
CRACKING: Crevices or ruptures going completely through a film. This is in contrast to alligatoring or checking where crevices slowly work their way down from the surface.
CRATERING: Surface blemishes in a freshly painted surface, usually in the form of small round patches also called fisheyes, usually due to contamination.
CRAWLING: Action of a finishing material when it appears to creep or crawl away from certain spots and leaves them uncoated.
CRAZING: Very fine minute cracks on the surface that is usually interlaced.
CRISSCROSS SEQUENCE: Method of tightening fasteners by using a system of tightening in a side pattern across an opposite of last fastener tightened.
CROSS COAT: Technique used when grinding metal to remove deep scratches by grinding the surface at a 90-degree angle.
CROSS DRAFT BOOTH: Spray booth in which the air flows from the rear section to the front section and is exhausted.
CROSS TUBES: Tubes of iron used with specially designed safety stand to support a vehicle.
CROWN: Term used to describe the high part of a round surface of a panel.
CRUSH ZONE: Part designed to bend or crush when involved in a collision.
CURING: Term used to explain the hardening process of paint or resins.
CUT: “Cut” as applied to surface coating denotes both the dissolving of solid material in a solvent and the reducing of the viscosity of liquid by the addition of a thinner. Can also refer to sanding down a film as in “cut and polish”.
CUTS, SCUFFS, AND GOUGES: Types of damage that occur on vinyl roof covers.
CUTTING TIP: Attachment inserted in an oxyacetylene torch to cut metal with the flame.
Back to Top
DARKEN: By eliminating white, solid colors become darker; eliminating metallic flake makes metallic colors darker.
DATA SHEETS: Sheets that contain the required measurements for straightening the frame or body to specifications.
DATUM LINE: Imaginary line that appears on frame blueprints or charts to help determine correct frame height.
DEDICATED BENCH: Type of frame repair equipment using jigs to align a unibody vehicle.
DEFLECTOR UNIT: Unit used on a rail to deflect the laser beam.
DILUTANTS: Volatile liquids that are not solvent for nitrocellulose. They are used in nitrocellulose lacquer to lower viscosity and give certain other properties.
DINGING: Reshaping and leveling out of damaged metal by means of on and off-the-dolly hammering after the metal has been unlocked and roughed out.
DINGING HAMMER: Specially built hammer used for the removal of the smaller dents on body panels.
DIRECT DAMAGE: Damage that occurs to the area that is in direct contact with the damaging force of impact.
DIRECT PULLING: Pulling on the damage using a direct pull.
DIRT NIBS: Small specks of foreign material in a dried film of finishing material. They should be removed by scuff sanding.
DIRTY: Opposite of “clean”. Describes a color that has a drab appearance rather than one with a bright appearance. The addition of black makes colors “dirty”.
DISINTEGRATION: Dried film of a finishing material completely breaks down.
DISK SANDER: Power sanding tool used for grinding, sanding and polishing repaired metal areas. It is manufactured in either the 7-in. standard or the 7 and 9 in. heavy-duty model and is available with a round, flexible, molded rubber, backing pad 5.7 and 9-inch in diameter.
DISK TRIMMER: Special tool used to cut down a worn-out sanding disk to a somewhat smaller size, giving it a fresh cutting edge.
DOG TRACKING: Condition in which a vehicle’s wheels do not follow in direct line but at an angle.
DOLLY: Tool that is made in different shapes, usually held in one hand on inner side of a dented panel while the outer side is struck with another dolly or dinging hammer.
DOOR PANEL FLANGE: The 90 degree projecting edge all around the edge of a door replacement panel, by means of which the replacement panel is attached to the door frame or inner construction.
DOUBLE HEAD-COAT: Usually called one coat but meaning an application of material sprayed horizontally and immediately followed by an application sprayed vertically. Also called a cross-coat.
DRIERS: Salts of certain metals or metallo-organic compounds, which when added to an enamel, paint, varnish, or oil hasten the drying or hardening of the film through proper ventilation.
DRY SPRAY: This term is used if in applying a finish by spray the atomized paint is not absorbed in the film, leaving a rough, dry finish.
DUCTILITY: Refers to the property whereby a material can be worked, drawn or bent without breaking.
DURABILITY: Life of a paint film.
DUST FREE: Condition when a film has dried so that it will no longer allow dust to penetrate and stick to the finish.
Back to Top
ECT: Engine coolant temperature sensor or its signal circuit.
EGO: Exhaust gas oxygen sensor or its signal circuit.
EGR: Exhaust gas recirculation system that is designed to allow the flow of inert exhaust gases into the combustion chamber to cool the combustion and therefore reduce the amount if nitrous oxides in the exhaust.
ELASTIC LIMIT: Amount that a piece or a metal panel will bend without causing distortion or separation in the structure of the material.
ELASTIC METAL: All V channels, valleys and buckles extending outward from the area of direct damage but not including the extreme outer high ridges that bound them are called elastic metal.
ELECTRIC HOT KNIFE: Type of electrically heated blade used to cut some adhesives.
ELECTRONIC VEHICLE INFORMATION CENTER: Electronic receiving unit that receives information from all the sensors in the vehicle.
EMBLEM: Decorative piece of plastic or metal attached to a vehicle.
ENAMEL: Pigmented alkyd varnish usually characterized by a glossy surface. Dulux is such a pigmented synthetic resin solution.
ENERGY ABSORBER: Device used on bumpers to absorb energy from a collision.
EPOXY RESINS: Resins obtained by the condensing reaction that occurs between phenols and epichlorohydrin.
ESTIMATE: The written determination made by an appraiser or estimator, upon inspection of a damaged vehicle, regarding the cost required to restore the vehicle to the condition it was in prior to the Loss.
ESTIMATE DOCUMENT: Form on which the cost of accomplishing repairs is written; often used as the basis for repairs.
ESTIMATED TIME: Amount of time given to repair or remove and replace an item or part.
ESTIMATING MANUAL: Manual that has the information on the replacement of parts and their standardized lab or times on a vehicle.
ESTIMATOR: An appraiser or insurance company representative who inspects a damaged vehicle and determines the cost required to restore the vehicle to the condition prior to the Loss.
EVAPORATOR: Part on a vehicle with an air-conditioning system that causes the refrigerant liquid under pressure to change to gas.
EXCESS ACETYLENE FLAME: See carburizing flame.
EXHAUST FAN: Fan that moves the air in a spray booth and pushes it out to the atmosphere.
EXHAUST SYSTEM: System of many parts used on motor vehicles to move the gases from the engine to the rear of the vehicle into the atmosphere.
EXPANSION: Condition in which an object becomes bigger.
Back to Top
FACE: Appearance of a color viewed straight on. This term is most often used in comparison to the “pitch” of a color, which is the appearance of the color when viewed at any angle other than 90 degrees. The face color is often different in lightness or darkness.
FACE BAR: Large chrome-plated extrusions that provide protection for both front and rear of an automobile and which are generally held in position by means of brackets bolted to the side rails of the frame.
FADE: Denotes the change in the color of a surface coating where and when such a coating has been subjected to sunlight. It is a dying away or bleaching action.
FALSE STRETCH: Bulge formed in the flatter areas of an outer panel whenever the collapsed rolled buckle in the crowned surface of that panel extends into the flatter, more central portions of the panel (in the area of indirect damage). Even after the damage has been roughed-out and straightened as accurately as possible, false stretch cannot be completely eliminated.
FAN: Spray pattern of a spray gun.
FANNING: Use of pressurized air through a spray gun to speed up the drying time of a paint finish; it is not recommended.
FEATHER, PRIME AND BLOCK SAND: Operations following the panel repair process, which occurs after 150-grit (as defined by some Estimating Vendors) to bring the repaired panel to the condition of a new, undamaged panel for the purpose of refinish. The process allows for a finer sanding of the paint edge around the repaired area (feather), then a primer filler is applied to build back the depth of the feathered area (prime); then a final sanding process of the primer/filler allows for smoothing of imperfections (Block) bringing the area to an undamaged condition for painting.
FEATHEREDGE SPLITTING: Cracks or stretch marks along the featheredge which occur while drying or shortly after the topcoat has been applied over a primer-surfacer.
FEATHEREDGING: Sanding down a surface to a very fine edge; that is when one coat of material is made gradually thinner around the edge until it finally disappears.
FEATHERING: Action of moving a spray gun trigger lightly at each end of a stroke.
FEELING THE METAL: Used in detecting surface irregularities. The repair technician slides the palm of a hand back and forth over the work and is able to detect or feel any hollows or high spots that may be present.
FENCE-OFF: Method of shrinking sequence to prevent a highly stretched metal area from moving.
FENDER FLANGE: Outer rim or bend along the lower edge of a fender that gives shape and strength to the side of the fender.
FERROUS METAL: Any metal composed of or containing iron.
FIBERGLASS: Very fine staple fibers of glass that are spun together; it is used as insulation and for repairs on automobile and truck bodies.
FILING: Pushing or drawing a file back and forth over the surface of the work in order to detect high and low spots (surface irregularities) or to wear down a surface to an exact size and shape.
FILM: A layer of applied coating material.
FINISH COAT: The last coat of paint to be applied will usually determine the amount of gloss.
FISH PLATE: Repairing of a cracked frame rail by first of all welding the cracks and then reinforcing the rail by welding another plate that covers and extends well beyond the repaired area.
FISH-EYE ELIMINATOR: Additive put in paint to prevent the occurrence of fish-eyes in a freshly painted surface.
FISHMOUTH: Part of a window regulator where the drive tape is inserted.
FLAKE: Particles added to a color to achieve a metallic or iridescent finish.
FLAKING: Condition when the finish does not knit properly to the undercoating, causing the finish to chip off the work by breaking into small pieces.
FLAME CUTTING: Use of an oxyacetylene flame to cut metal.
FLANGE: Projecting edge, rim, or bend on the outer edge of a panel that stiffens it.
FLASH-BACK: Malfunctioning of the torch when the flame goes inside the torch and it starts to hiss and squeal.
FLAT: Finish that has no luster or gloss.
FLAT RATE: Piecework method of paying for repair operations.
FLEX HEADS: Sometimes called rubber bases; conform to any contour, and are most often used as a terminal point for pushing against concave surfaces.
FLINT PAPER: Inexpensive but short-working-life abrasive paper, not used extensively in body shops.
FLOOD: Floating of a pigment to the surface of a coating, giving a changed color to the surface and lack of uniformity in color appearance through the film.
FLOP: Appearance of a color when viewed from any angle other than straight on. The flop of a color is also referred to as its pitch. The pitch is often different from the face when working with iridescent colors.
FLOW: Ability of paint droplets to melt or merge together to form a smooth paint film.
FLUID CONTAINERS: Containers designed to store different types of fluids.
FLUID NEEDLE: Part in a spray gun that opens and closes fluid passages.
FLUID NEEDLE ADJUSTMENT: Adjusting the amount of fluid that will go through the opening of the fluid tip.
FLUID TIP: Part of a spray gun that meters and directs the fluid stream.
FLUTTER FOAM: Usually a flexible foam use for NVH applications. Can expand and fill in voids or areas were sealing is needed.
FOG COAT: Thin, highly atomized coat applied in such a way as to obtain a fast flash-off; and thereby achieve a minimum penetration of the thinner into the old finish.
FORCE DRY: See Baking
FORGING: Repair operation used in restoring welded butt joints to as near as possible the same thickness and molecular structure as that possessed by the surrounding sheet metal.
FRAME ALIGNMENT: Procedure by which the frame of a car, truck or bus that has been damaged in an accident, or from wear, is restored to the manufacturer’s specifications.
FRAME GAUGES: Used in determining the type of misalignment that has occurred and also the extent of the damage.
FRAME HORNS: Extending ends of the side rails of a frame to which the bumper brackets are fastened.
FRAME RACK: Equipment used to repair damaged frame and unibody members.
FRONT-END SHEET METAL: All parts from the cowl assembly forward are considered front end sheet metal. This includes the grille, the hood, and right and left fender and the front bumper assembly.
FUSIBLE LINK: Wire designed to open a circuit by melting, when too much current flows through it.
FUSION WELD: Operation in which two pieces of the same kind of metal are made into one is called fusion welding.
Back to Top
GARNET PAPER: Hard, sharp, red abrasive; more expensive than flint paper but will last much longer.
GARNISH MOLDINGS: Moldings that fit around the inside of door, windshield and rear window openings, generally held in position by countersunk metal screws.
GEL: General consistency of a jelly; the material being soft but not free flowing. The term “gel” is generally applied to a vehicle as contrasted to false body caused by pigmentation.
GLASS RUN CHANNEL: Part used in the doors where glass moves up and down that prevents the glass from being damaged.
GLAZING: Application of a filler by means of a putty knife, the material being filled into the depression but scraped off the higher areas.
GLOSS: Shine, sheen, or luster of a dry film.
GRILLE: Open-work structure made out of plastic, die cast, aluminum or stamped out of sheet which covers the air intake opening in front of the radiator, but allows the air to pass freely through it.
GRITTY: A product is said to be gritty when it contains large particles, either from insufficient grinding, which would mean seed, or by the presence of large, hard particles of foreign materials.
GROMMET: Rubber or plastic insulator used to protect electrical wires or other lines from being damaged by the sheet metal edge.
GROUND CABLE: The ground cable clamped to the work allows the electric current produced by the welding machine to flow through the electrode cable and the electrode to the work when the arc is formed. The current completes its circuit by flowing through the ground cable back to the welding machine.
GROUND (ELECTRICITY): Part of the circuit that allows the current to return to the negative (-) terminal of the battery.
GUIDE COAT: Coat of a different color from the other coat is used to serve as a guide coat in rubbing or sanding to determine when a smooth surface has been reached.
GUMMING: Condition where the sandpaper becomes clogged by the abraded surface coating. Compare Caking.
GUN BODY: Part of the spray gun to which all required parts are bolted or attached.
Back to Top
HAIRLINING: Very fine lines or checks on the dried surface coating of a finished material.
HARDENER: Special additive designed to promote a faster cure of the enamel paint film.
HARDNESS: Quality of the paint film that gives it resistance to surface damage.
HATCHBACK: Part used on a vehicle to close the rear section.
HEADER BAR: Framework or inner construction that joins the upper sections of the windshield, pillars, forms the upper portion of the windshield opening and reinforces the turret top panel.
HEADLIGHT: Light used to light the road ahead of a vehicle.
HEADLINING: Different types of materials used to cover the inner surface of the roof in a car.
HIDE GLUE: Made from animal hides and used in making abrasives that can only be used in “dry” sanding and grinding work.
HIDING: The hiding power of a finishing material is a measure of its opacity or its ability to cover solidly over another color as to obscure or prevent the original color from showing through.
HIGH-CROWN METAL: Outward curving portion of a body panel.
HINGE EFFECT: Effect of expansion and contraction that causes the metal to move as if it was on a hinge.
HINGE PILLAR: Framework or inner construction to which the door hinges fasten.
HOLD OUT: Ability of a surface to keep the topcoat from sinking in.
HOOD PANEL: Large metal panel that generally fills in the space between the two fenders and covers over the engine compartment.
HSLA (HIGH STRENGTH LOW ALLOY): Type of steel with low alloy used in the fabricating of certain parts for motor vehicles.
HSS (HIGH STRENGTH STEEL): Type of steel used that is very strong, but is thin and light.
HUE: Basic color that is blue, red, yellow, green, violet, or orange. Hue is used to determine where the color would fall generally on the color wheel.
HUMIDITY: Water vapor present in the air in varying amounts.
HVLP (HIGH VOLUME, LOW PRESSURE): Type of spraying system that uses a high volume and low pressure of atomizing air to apply material to a surface. Reduces over spray of product into the atmosphere.
HYDRAULIC JACKING UNIT: System of using a hydraulic pump, hose, ram, and required attachments to provide the transfer of hydraulic power.
HYDRAULIC OIL: Special type of oil used in hydraulic systems that does not deteriorate or attack the rubber seals in the jack or its hose.
Back to Top
INDIRECT DAMAGE: Any damage that occurs as a result of direct damage.
INDUCTION BAKING: Heat used for baking finishes, induced by electrostatic or electromagnetic means.
INDUSTRIAL FALLOUT: Chemical compounds present in the air which are deposited on the horizontal surfaces of vehicles and which under certain circumstances will affect the finish, particularly metallics.
INNER CONSTRUCTION: Framework and inner panels that hold and reinforce the outer body panels.
INNER SKIRT: Part used in the front section of a vehicle between the upper and lower rails.
INSERT: Fabricated part used to reinforce a section when it is being sectioned.
INTAKE FILTERS: Filters used where the air enters the spray booth to remove the dust in the air stream.
IRIDESCENTS: All colors that contain aluminum, mica, or other particles that impart a metallic appearance to the color. Used interchangeably with the word metallic. Iridescent colors must be carefully matched on the face and the pitch in order to achieve a desirable appearance.
ISOCYANATE: Additive that is part of many paint and plastic hardeners; injurious to the lungs.
Back to Top
JERKY OR FLUTTERING SPRAY: Intermittent amount of fluid delivered by a spray gun; occurs in the suction feed type.
JIG: Mechanical device for holding work in its exact position while it is being welded.
JIG FIXTURE: Usually a rented or Build mechanical device used for holding structural components in its exact position while it is being welded or adhesively bonded.
JIGSAW: Narrow bladed saw usually driven by an electric motor. Used to cut body panels.
Back to Top
KNIT: Adhere or bond together.
Back to Top
LACQUER: Refinishing material that dries by the evaporation of the thinner.
LAP: Point where one coat extends over another.
LAP WELD: Type of weld made by overlapping two pieces of metal and joining them by running a bead along only one of the edges.
LATERAL RUNOUT: Amount a wheel moves from side to side when rotated, due to being bent.
LEAD (TIRE): A pulling condition in a radial tire causing the steering to want to turn to that side when rotated.
LET DOWN PANEL: Panel made by a paint technician with different methods of application and amounts of material, resulting in different shades of the same color.
LEVELING OUT: Flowing or settling to a smooth, uniform surface.
LIFTING: Disruption of a paint film by the application of a succeeding coat, caused by the solvents of the succeeding coat penetrating and partially dissolving or swelling the preceding dried film.
LIGHTEN: Addition of white to make solid colors lighter; the addition of metallic flakes makes metallic colors lighter.
LISTING BOWS: Slightly tempered, bowed steel rods that are inserted into headlinings to keep them in proper position inside the passenger compartment.
LIVERING: Coagulation of paint into a viscous liver-like mass.
LOAD VOLTAGE TEST: Test given to a battery to find its condition.
LOCKSTRIP: Part of a weatherstrip that applies pressure to keep the windshield or glass in position.
LOW-CROWN METAL: Portion of a body panel with just a very small amount of outward curve.
LOWER INNER AND OUTER RAILS: Parts used in the front structure of the vehicle to give the assembly the required strength to hold the other parts.
LUSTER: Gloss of sheen of a finish.
Back to Top
MACPHERSON STRUT: Type of suspension using a lower control arm and an upright shock absorber assembly, spring, and spindle.
MAKEUP AIR: System that brings and heats air from outside to a desired air flow and temperature.
MAP: Manifold Absolute Pressure sensor or its signal circuit.
MASH: Type of frame damage in which a portion of the side rail is bent down causing buckles to be formed on the underside.
MASKING: Application of paper or other material and masking tape to cover an object that must be protected from overspray.
MASKING PAPER: Paper designed to prevent paint bleeding through and resist water soaking to a certain degree.
MASKING TAPE: Special paper that is coated with adhesive used to protect body parts or to attach masking paper to the car.
MASTER CYLINDER: Part of the brake system that stores the brake fluid and when the pedal is depressed, forces the fluid to the cylinders in the wheel assembly.
MATCHING: In painting, to make colors look the same.
METAL CONDITIONER: Acetic acid preparation that is used to prepare metal, remove rust, and etch the metal slightly to provide a good adherence between the metal and the paint.
METAL FINISHING: Operation in which hidden surface irregularities are detected and removed by means of filing and picking the straightened metal unit all low spots have been eliminated and a perfectly smooth and level surface is obtained.
METAL STAMPING: Process of manufacturing auto body parts in which straight sheets of metal are placed in between dies operated by huge presses and die formed or stamped into the finished part.
METALLIC: General term applied to finishes containing aluminum particles.
MIG (METAL INERT GAS WELDING): Continuous welding system that uses the electrical arc, filler wire and gas to protect the weld. Also known as MAW (metal arc welding).
MIG BRAZING: Continuous welding system that uses the electrical arc, silicon bronze filler wire and gas to protect the weld. Used to weld ultra-high strength steel, due to its lower temperature.
MIL: Measure of film thickness equal to 0.001 inches.
MILKINESS: Cloudy, whitish, not clear.
MIST COAT: Light spray coat of volatile solvent by itself or with very little color in it.
MODIFIED UNITIZED BODY CONSTRUCTION: Form of body construction consisting of half frame and half unitized body construction.
MOLDINGS: Metal or plastic parts used to beautify a vehicle or to protect the panels from damage.
MOTTLING: Striped or spotty appearance that occurs in metallics when the flakes flow together because of poor spraying techniques.
MURIATIC ACID: Sometimes called hydrochloric acid. A strong acid used for cleaning metal and when “cut” is used for soldering.
Back to Top
NAMEPLATES: Ornaments with the vehicle’s name that is used to identify the make of the vehicle.
NATURAL MINERAL ABRASIVE: Abrasive made from materials found in nature.
NEUTRAL FLAME: Oxyacetylene flame burning equal parts of acetylene and oxygen.
NITROCELLULOSE: “Gun cotton” or “proxylin”; a compound of nitrogen and cellulose prepared from nitric acid and cotton or wood fiber.
NONELASTIC METAL AREAS: Areas in auto body panels that have been permanently deformed and that will not spring back to their original shape after stresses and strains have been released.
NONFERROUS METALS: Metals that contain no iron.
NORMALIZING: Removing of stresses and strains in metal. This is done by hammering, heating up the metal, or by a combination of both.
Back to Top
OFFSET: Part that has an abrupt change in dimension or profile of an object.
OHMMETER: Electronic gauge used to measure resistance of an electrical circuit or part.
OPAQUE: Impervious to light; not transparent.
OPEN CIRCUIT: Break or open condition in an electric circuit that interrupts current flow.
OPEN COAT: Noncontiguous spacing of the grit on sandpaper or grinding disk.
OPEN TIME: Term used in repairs when the time cannot be estimated and the employee uses a clock to calculate the amount of time required to accomplish the repair.
ORANGE PEEL: Uneven, pebbly surface somewhat resembling the skin of an orange; appears in a paint film that has been applied by spray.
ORBITAL SANDER: Type of sander that uses an orbit motion to accomplish the sanding of different materials.
ORIGINAL FINISH: Paint the car manufacturer applies at the factory.
OVERALL REPAINTING: Refinish repair job in which the whole vehicle is completely repainted.
OVERLAP: Amount of the spray pattern that covers the previous spray swath.
OVERSPRAY: See Dry Spray.
OXIDATION: The act or process of combining with oxygen.
OXIDIZING FLAME: Oxyacetylene flame that uses more oxygen than acetylene in its flame.
OXYACETYLENE WELDING: Process where oxygen and acetylene are burned using a torch to produce a flame hot enough to melt metal.
Back to Top
PAINT ARRESTOR: Filter used to clean the air of paint fumes before it is exhausted.
PAINT FILM: Coating of paint that is applied to a material.
PAINT REMOVER: Fast acting blend of solvent used to remove enamels, lacquers and varnish.
PAINT STRAINER: Filter used to clean paint as it is poured into the gun cup.
PARALLEL CIRUIT: Circuit that provides more than one path for the current to flow.
PARTIAL REPAIR PROCEDURE: Procedure used in painting when only a part of the panel is painted.
PCV: System that controls the flow of crankcase vapors into the engine intake manifold, where they are burned in combustion rather than being discharged into the atmosphere.
PEARL LUSTER: Paint system that uses mica chips to give a pearl effect in the paint film.
PEBBLING: Excessively large orange peel.
PEELING: Loss of bond or adhesion of paint film from the surface to which it is applied.
PENETRATION: Term often used in welding to indicate how deep the weld has penetrated the metal.
PERCHLORETHYLENE: Solvent used in determining whether the finish is acyrlic lacquer, nitrocellulose lacquer, or enamel.
PHENOLIC RESIN: Resin that is based on the reaction between formaldehyde and phenol.
PICKING: Raising up low spots with the sharp pointed end of a pick hammer.
PICKS: Special tools used in the metal finishing operation for raising low spots located in the more central areas of inaccessible body panels.
PIERCING: Small holes in door panels into which special nylon clips used to hold the weatherstrip are forced or pushed in.
PIGMENT: Any fine, insoluble, dry, solid particles used to impart color.
PILING: Heaping, or applying too heavily.
PILLAR / VEHICLE PILLAR: Pillars are the vertical or near vertical supports of a vehicle’s window area or greenhouse—designated respectively as the A, B, C or (in larger cars) D-pillar, moving from the front to rear, in profile view. The consistent alphabetical designation of a car’s pillars provides a common reference for design discussion and critical communication. As an example, rescue teams employ pillar nomenclature to facilitate communication when cutting wrecked vehicles, as when using the jaws of life. The B pillars are sometimes referred to as “posts”
(two-door or four-door post sedan). From Wikipedia, the free encyclopedia (08/2018)
PIN SHRINK: Very small type of shrink used for delicate shrinking purposes.
PINCH WELD FLANGE: Flange that is formed when the framework and outer panels are clamped and spot welded together as found on windshield and rear window openings.
PINCH-WELD PRIMER: Primer used on a pinch weld before applying the adhesive for better adhesion.
PINHOLING AND PITTING: Minute hollows or holes no larger than the head of a pin in a film produced by the bursting of trapped air, moisture, or thinner during drying.
PITCH: Appearance of a color when viewed from any angle other than straight on. Most often used in comparison to the face of a color, which is the appearance of the color when viewed at a 90 degree angle or straight on. Pitch is also referred to as the “flop” of a color. The pitch is often different from the face when working with iridescent colors.
PLASMA TORCH: Arc torch used to cut metal.
PLASTIC FILLER: Compound of resin and fiberglass used to fill dents on car bodies.
PLUNGER: Male threaded part, that acts like a piston moving in and out of the ram body and onto which different lengths of extension tubing and attachments can be connected.
POLYCHROMATIC: Term used by some paint manufacturers for color coats that contain aluminum powder in flake form.
POLYESTER FILLER: Special kind of putty like filler used in filling slight imperfections and low spots on panels.
POLYESTER RESIN: Bonding liquid that forms a good bond with fiberglass surfaces only.
POLYMERIZATION: Drying of enamel by formation of a polymer from monomers.
POLYOLEFIN: A plastic material used to make flexible bumper covers.
POLYURETHANE: Chemical structure used in the production of resins for enamel paint finishes; also used for some plastic bumper covers.
POOR ADHESION: Material that has poor bond to the underlying surface.
POP RIVET: Rivet that uses a mandrel that is pulled out by a special tool to collapse and set a rivet.
POWDERED FIBERGLASS: Processed fiberglass that has been crushed into a powder. It not only gives bulk but also strength to the filler.
POWER STEERING PUMP: Pump driven by the engine which uses fluid to help turn the front wheels.
POWER TRAIN: Motor, transmission, and drive assembly, especially on front-wheel drive vehicles.
PRESSURE FEED GUN: Spray gun equipped with a separate paint container that is pressurized and connected to the spray gun by means of two hoses.
PRIMARY COLORS: Main colors from which other colors are formulated.
PRIMER: Undercoat applied to improve the adhesion of the color coat.
PRIMER COAT: Used in a paint system to improve adhesion; requires sanding.
PRIMER-SEALER: Undercoat that improves the adhesion of the topcoat and seals the old painted surfaces.
PRIMER-SURFACER: High-solid type of primer used to fill small imperfections in a substrate.
PUBLIC LIABILITY: Type of insurance that covers damage that can occur to other people.
PULL PLATES: Several types of special plates that can be bolted, soldered or braze welded onto the damaged panel. The damaged area can then be pulled out by attaching the hydraulic jack to the pull plates in a variety of pulling combinations.
PULL RODS: Rods that are equipped with hooks on one end and handles on the other. The hooked ends are inserted into small holes drilled in areas of direct damage and used in roughly aligning the areas of direct damage before they are soldered or welded.
PUNCHES: Special tools used in driving shafts and pins and in aligning holes in panels so that they can be bolted together. Different punches are used in the metal finishing operation for raising low spots located around the outer edges of inaccessible body panels.
PUSHING: Hydraulic jack set up to push out collision damage.
PUTTY GLAZING: Heavy bodied nitrocellulose or polyester material used to fill small flaws that are in the surface and are too large to be filled by primer surfacer.
PUTTY KNIFE: Special knife used in applying glazing putty.
Back to Top
QUARTER PANEL: Side panel that is generally a quarter of the total length of the vehicle and extends from the rear door to the end of the car.
QUARTZ HALOGEN: Headlight system noted for the extra amount of light it gives a driver if the vehicle is so equipped at night.
QUENCHING: Cooling of a shrink spot or solder fill with a wet rag or sponge.
Back to Top
RADIATOR: Part of the vehicle through which the coolant flows to be cooled.
RAIN OR WATER SPOTTING: Marks on the surface due to rain or water absorption.
RECYCLED PARTS: Parts of a vehicle that have been used and are bought from a recycler.
REDUCE: Lower or make less in consistency; to cut.
REDUCER: Referred to as the volatile substance used to thin the viscosity of enamel prior to application.
REFINISH: Term used to designate that a part or a vehicle is to be repainted.
REFLOW: Heat process used to melt lacquer to produce a better flow or leveling.
REGULATOR (DOOR): Mechanism in a door used to raise and lower the glass.
RELATIVE HUMIDITY: Condition of the atmosphere with reference to its content of water vapor at a given temperature.
RELIEVING: Process of removing and correcting stresses in a panel due to collision damage.
RESPIRATOR: Filtering device worn over the mouth and nose to filter out particles and fumes and prevent them from reaching the lungs.
RETARDER: Slowly evaporating thinner used to retard drying.
RETEXTURE: To apply texture paint over a repaired area
RETRACTOR: Mechanism that pulls a safety belt back into its proper place.
ROCKER PANELS: Assemblies of box type construction located directly below the doors, that are not only spot welded to the cowl assembly in front and to the rear quarter panel assembly at the rear but also to the side of the under body section.
ROLLED BUCKLE: Buckle created by a force that extends over the crowned surface of a panel.
ROAD TEST: From submitter – Operation of a vehicle to test systems for diagnostic functionality or possible remaining issues in need of correction and/or verification of proper function of systems, handling
and performance under normal and anticipated driving conditions. (08/2018)
ROOF RAIL: Reinforcements welded to the pillars and to which the roof panel is welded.
ROSIN: Natural gum or resin; residue of the distillation of crude turpentine.
ROTOR ASSEMBLY: Part of the wheel brake assembly to which hydraulic pressure is applied to stop a vehicle.
RUBBER OR SPACER DAM: Rubber strip installed on the pinch-weld fence to prevent the adhesive from oozing out.
RUBBING AND POLISHING COMPOUND: Special type of abrasive used to smooth out and polish a paint film.
RUN-SAGS: When too many or too heavy coats are applied at one time causing the film to droop under its own weight.
Back to Top
SAG: Type of frame damage in which one or both side rails bend and sag at the cowl causing buckles to be formed on the top of the side rails.
SAND SCRATCH SWELLING: exaggerated reproduction and distortion of the sanding marks in the underlying surface.
SAND SCRATCHES: Reproduction in the topcoat of the sanding marks in the underlying surface.
SANDBLASTER: Piece of equipment used to clean metal using sand and pressurized air.
SANDER: Power driven tool used with abrasives to sand car bodies.
SANDER POLISHER: Power tool used to speed up the rate of polishing or sanding surfaces.
SANDING BLOCK: Hard rubber or plastic flexible block used to provide consistent backing for hand sanding.
SATURATION: Refers to a color’s purity and richness.
SCUFF SAND: To lightly sand a surface with an abrasive pad.
SEALER: Paint product used to prevent bleed through of the previous coat or the sinking in of the new paint, resulting in loss of gloss.
SECTIONING: Process of joining two different sections of a part or vehicle by welding to make one part,
SEEDINESS: Being gritty or sandy or full of small grains.
SELF-CENTERING GAUGE: Gauge used in frame repair that centers at all times as it is pulled out or pushed out.
SEPARATION: Non-uniform mixture.
SERIES CIRCUIT: Circuit through which current flows in an angle continuous path.
SERRATED SADDLE: Attachment used to protect the threads on the extension tubing and the ram plunger. Its serrated face serves as a base that doesn’t slip or slide easily when pressure is applied.
SET-BACK: Term used to indicate that one of the front wheels is farther back than the other.
SETTING UP: Period during which solvent evaporation from the film flowing ceases and the film surface becomes tack free.
SHADE: Variation of a color. Assuming that a color is generally blue, it can have a red shade or a yellow shade as well as being blue. Shade is also called undertone since it describes the subtle tone of a color.
SHAPE: Form to which a metal panel was stamped.
SHIFTING LINKAGE CABLE: Cable used to shift the gears in a vehicle.
SHOCK ABSORBER: Mechanism that uses fluid, pistons, and valves to dampen the oscillation of a vehicle.
SHORT CIRCUIT: Current that flows in a continuous path that bypasses a portion of its intended circuit, usually directly to ground or into another circuit.
SHRINKAGE: Operation by means of which stretched areas on damaged auto body parts and panels are disposed of and brought back to their original shape and size.
SHROUD: Sheet-metal or plastic part used on cars to direct the flow of cooling air.
SILICON CARBIDE: Abrasive made by fusing silica and coke in an electric furnace. The abrasive is very hard, shiny black and iridescent.
SIMPLE HINGE BUCKLE: Formed when flat sheet metal is forced to bend either inward or outward by a damaging force or impact. It is similar to the bending of a hinge on a door and the change in the grain or molecular structure of the metal that occurs will vary greatly, depending on the sharpness of the bend.
SIMPLE ROLLED BUCKLE: Outer ridges formed at either end of a hinge buckle that extends or crosses over into the crowned surface of auto body panel.
SINGLE COAT: Usually referred to as a coat of paint. Once over the surface with each stroke overlapping the previous stroke 50 percent.
SINGLE-STAGE COMPRESSOR: Compressor in which atmospheric air pressure is compressed to container pressure in one operation.
SINKING IN: Term applied when one coat is partially absorbed by the previous one.
SKINNING: Oxidation, hardening or drying of a paint at the surface of the liquid while in its container.
SLIDE HAMMER: Weight that slides along a bar until it hits a stop. The bar usually has attachments to pull dents out, and the impact that results when the weight hits the stop helps to pull the dent out.
SMC (SHEET MOLDED COMPOUND): Fiber plastic type of material that is molded to a certain form and used as an outer panel on a vehicle.
SMEC (SINGLE MODULE ENGINE CONTROLLER: Computer module that controls the functions of the various components of the power train.
SOLDER: Mixture of lead and tin used to fill dents and joints on body panels.
SOLDERING SALTS: Non-acid flux employed in the tinning of metal.
SOLIDS: Part of the paint that does not evaporate and stays on the surface.
SOLUTION: Homogeneous liquid or mixture of two or more chemical substances.
SOLVENCY: Ability or power of causing solution. Ability to dissolve.
SOLVENT: Any liquid in or by which a substance can be dissolved.
SOLVENT POPPING: Blisters that form on a paint film caused by trapped solvents.
SPECIFIC GRAVITY: Weight of a certain amount of liquid compared to the same amount of water at the same constant temperature.
SPEED FILE: Special file that has a straight solid base about 2 inches wide and 17 inches long onto which strips of sandpaper are fastened. This file is used in sanding down solder and plastic filled areas to their final shape and contour.
SPIRIT LEVEL: Instrument used to find if an item is level.
SPLICE CLIP: Joint used to join two or three pieces of wire.
SPOON: Tool that is designed to perform the same work as a dolly, but is thin, wide, and fairly long and can be used in areas that have very little clearance.
SPOT OR PLUG WELDING: Weld made through a hole in a panel.
SPOT REPAIR: Small refinish repair job in which a small section of a panel is refinished.
SPRAY BOOTH: Enclosure used to paint a vehicle that has air moving through it.
SPRAY GUN: Device that mixes paint and compressed air to atomize and control the spray pattern as the paint leaves the fluid needle and cap.
SPREADER ADJUSTMENT VALVE: Valve in a spray gun that adjusts the spray pattern.
SPREADER TOES: Attachments designed to anchor combinations against frame members, braces, and the heads of body bolts.
SPRING HAMMERING: Elimination of a high ridges generally formed at the outer edges of indirect damage by means of hammering them down with a surfacing spoon and bumping hammer.
SPRINGBACK: Amount that a section of a vehicle will move back once the hydraulic pressure is removed.
SQUARING: Operating of straightening a damaged section and equalizing the diagonal measurements to bring the section back to specifications.
SQUEEGEE: Rectangular piece of rubber approx. 2 inches wide and 3 inches long. It is used in applying glazing putty and filler on concave surfaces.
STARTER: Electric motor used to turn the engine to start it.
STATE: To remove the stresses accumulated when distorted by a collision and completely relieved.
STATIC BALANCE: Condition in which a wheel and tire can be rotated and the assembly will not stop at the same place after each rotation.
STATIC LOAD: Load that is exerted by the weight of the vehicle and the frame members, at rest.
STEEL MUSIC WIRE: Wire used in a piano that can be used as a cutting edge to cut adhesive.
STEERING AXLE INCLINIATION: Inward tilt of the king pin or spindle support arm at the top. It is a directional control angle measured in degrees and is the amount the spindle support center line is tilted from the true vertical.
STEERING COLUMN: Mechanism used to steer the vehicle.
STRAIGHT LINE SANDER: Sander that uses a back and forth movement to sand a surface using sandpaper on its shoe.
STRAIGHT TIME: Timing an operation by the elapsed time as punched in on a clock.
STRENGTH: Amount of pigment. High strength bases contain a lot of pigment. The additional pigment gives the bases good hiding.
STRESS: Amount of pressure that is applied to a piece of metal when it is bent and the metal cannot return to its original shape.
STRETCHED: Amount by which a metal surface has become larger or longer.
STRIKER PLATE OR BOLT: Part that is installed on the door frame in which the lock engages to lock the door.
STRIP CAULKING: Sealer sold in the shape of a strip.
STROKING: Motion used when painting with a spray gun.
STRUCTURAL ADHESIVE: Adhesive that is two part or otherwise, used to bond structural components together at a specific range of shear or tear limits usually accompanied by Self Piercing Rivet or Blind Rivet or repair the structure of a plastic part such as a bumper cover.
SUB-ASSEMBLY: An assembly within a multi-level assembly that is available individually from the vehicle manufacturer.
SUBLET: To let work that one has contracted to do to a subordinate contractor.
SUBLET REPAIRS: Repairs to be performed for a negotiated or contract price, or by a subcontractor. All applicable materials, labor, markup, and taxes should be included when a Sublet Repair is indicated.
SUBSTRATE: Surface to be painted whether an old finish or bare metal.
SUCTION-FEED GUN: Spray gun that has the paint container connected directly to it. It is designed to create a vacuum and thus draw the paint from the container.
SUN ROOF PANEL: Panel in the roof panel of a vehicle which can be raised up slightly or slid back in the opening to let the sun rays enter the vehicle.
SUPPLEMENT: A Supplement is created if a change or addition must be made to an estimate where a final print has been produced.
SURFACE DRYING: Drying of the topcoat while the bottom coats have remained soft.
SWEATING: Separation and appearance at the film surface of the oil in lacquer.
SYMMETRICAL: Regular well balanced arrangement of parts and opposite sides of a line or plain or around a center axis.
SYNTHETIC RESIN: Any resin not produced by nature; manmade.
Back to Top
TACK COAT: The first enamel coat. A full coat that is to dry only until it is quite sticky.
TACK RAG: Cloth impregnated with varnish; used as a final cleanup to remove dust before applying the finishing paint.
TACK WELDS: Short welds placed at intervals along a break or the joining edges of two pieces of metal, keeping the metal in alignment while the bead is run.
TACK-FREE: That point of time in drying at which the surface of the film will not fingerprint; yet the film is not dry and hard throughout.
TEE WELD: Welding procedure that forms a T.
TEMPLATE: Pattern made from a part so that another part can be made to the exact same shape.
TENSILE STRENGTH: Amount of axial elongation pressure that can be exerted on a material before it begins to deform.
TENSION PLATES: Metal plates used to pull damaged metal back to its former shape; fastened to the metal surface by using solder or plastic filler.
TEST LIGHT: Usually, a light used to check for voltage or current in a circuit to locate open conditions; the ground cable back to the welding machine.
THERMOPLASTIC: Type of plastic that can be softened with the application of heat, can be reshaped, and can also be welded.
THERMOPLASTIC POLYURETHANE: Plastic that can be softened by applying heat, reshaped and welded.
THERMOSETTING: Type of plastic that is permanently set. It can’t be softened with heat or reshaped or welded. Minor damage can often be repaired with a structural adhesive.
THERMOSTAT: Mechanism used to control heat.
THICKNESS OF FILM: Measurement of a film usually expressed in mils of the distance from top to bottom or at right angles to its surface.
THINNER: Commonly known as a lacquer solvent, which reduces the viscosity of a lacquer to spraying consistency.
TIE RODS: Rod-like component of the steering linkage composed of strong steel tubing that links a steering arm to the center link.
TINNING: Process of applying a thin coat of material to metal to improve adherence.
TINT: Mixture of two or more pigments.
TINTING COLOR: Finishing lacquer or enamel in which only one pigment or color is normally used.
TOE-IN: Distance the front of the front wheels is closer together than the rear of the front wheels.
TOOTH: Roughened surface that affects adhesion of the coating.
TOPCOAT: Last of final color coat.
TORQUE ROD: Type of a spring used to help open and counteract the weight of the trunk lid.
TORQUE STEER: Condition in some front wheel drive vehicles wherein more torque is applied to one wheel than the other.
TOW, FIRST: Accident tow.
TOXICITY: Pertaining to poisonous effect.
TRACKING: When the rear wheels of a vehicle follow the front wheels evenly on each side.
TRAM GAUGES: Gauges used to accurately measure and diagnose body and frame collision damages for all conventional and unitized vehicles.
TRANSAXLE: Drive system used mainly on front wheel drive vehicles.
TRANSFORMER: Equipment used to regulate and clean air used to paint vehicles.
TRANSPARENT: Bases that contain a small amount of pigment. You can see through the base.
TRICOAT PAINT JOB: Paint system that uses a base color coat then a pearl luster coat, followed by a clearcoat.
TRIGGERING: Procedure used on a spray gun to move the trigger.
TRUNK LID: Panel used to close the open area between the quarter-panels.
TURNING RADIUS: Tire wearing angle measured in degrees. The amount one front wheel turns more sharply than the other wheel does on turns.
TURRET TOP: Part of the vehicle that covers the passenger compartment.
TWIST: Type of frame damage in which both side rails are bent out of alignment, so that they do not run horizontally parallel to one another.
TWO-COMPONENT SYSTEM: Materials such as some paints, fillers, and adhesives that require the addition of an additive to accomplish a chemical reaction causing it to harden.
TWO-STAGE COMPRESSOR: Compressor that compresses air to cylinder pressure in two stages using two cylinders.
TWO-TONE: Two different colors used on a single paint job.
Back to Top
UHSS (ULTRAHIGH STRENGTH STEEL): Very high strength steel which is used for parts such as door guard beams.
UHSS Spot Weld Bit (Boron Cutting Bit): Used to cut UHSS spot welds for panel replacement. Cutting oil or lubricate should be used due to the harness of the metal.
UNDERCOAT: Material used to protect the underbody sections of a vehicle.
UNITIZED BODY CONSTRUCTION: Construction in which the frame and body are made out of a large number of sheet metal panels of varying sizes and shapes assembled and welded into a single unit.
UNLOCKING THE METAL: Unfolding and reshaping of the V channels, valleys and buckles as gently as possible, without further stretching, creasing or upsetting the metal.
UPPER RAIL: Part used on top of the shield to increase the strength of the front section.
UPSETTING: Application of heat on metal that is restricted from expanding in all directions and yet allowed to contract in all directions when it cools.
URETHANE ADHESIVE: Plastic type of adhesive.
USED CLIP: Section of a vehicle purchased from a recycler and welded or bolted to a vehicle.
Back to Top
VACUUM PUMP: Pump that creates a vacuum condition, such as on air conditioning systems.
VANDALIZED: Intentional damage to a vehicle.
VAPORIZATION: Process of solvent evaporation.
VEHICLE: Liquid portion of a paint.
VINYL COATED FABRIC: Fabric coated with vinyl material.
VINYL GUARD: Vinyl paint applied to the lower portion of an automobile to protect it from stone bruises.
VINYL-CLAD URETHANE FOAM: Combinations of these materials used as padding on such items as the crash pad on a dash.
VISCOSITY: Thickness of a fluid; resistance to flow.
VOLATILE: Capable of evaporating easily; an area that readily vaporizes
VOLTMETER: Electronic meter used to measure voltage.
Back to Top
WADDLE: Condition caused by some defective radial tires which cause the vehicle to have sideways back and forth motion due to broken or defective belts.
WATER SPOTTING: Condition caused by water evaporating on a paint film before it is thoroughly dry resulting in a dulling of the gloss in spots.
WEATHERING: Change or failure in paint caused by exposure to the weather.
WELDING: Process of joining two pieces of metal to form a single piece of metal.
WET SANDING: Procedure of sanding paint film with sandpaper and water.
WET SPOTS: Discoloration caused where the paint fails to dry and adhere uniformly; caused by grease or finger marks usually.
WHEEL ALIGNMENT: Procedure of aligning wheels to the manufacturer’s specifications.
WHEEL BALANCING: Proper distribution of weight around a tire and wheel assembly to counteract centrifugal forces acting upon the heavy areas in order to maintain a true running wheel perpendicular to its rotating axis.
WHEELHOUSES: Deep curved panels that form the compartments in which the wheels rotate. They are generally bolted to the front fenders and spot welded to the rear quarter panels.
WINDSHIELD: Glass installed on the front of a vehicle to protect the occupants from the elements.
WINDSHIELD HEADER BAR: Reinforcement by which the windshield is supported and to which the roof panel is welded.
WOODGRAIN TRANSFER: Plastic film that has adhesive on one side and a wood grain effect printed on the other side, applied to some motor vehicles.
WORK HARDENING: Process of metal being made harder by rolling or hammering the material.
WRINKLING: Term used when a paint film buckles at its surface causing a shriveled appearance.
Back to Top
YIELD STRENGTH: Resistance a particular type of material possesses to permanent stretching.
Back to Top
ZIRCONIA: Very rugged synthetic abrasive that is used mainly for rough cutting.
ZONE SYSTEM: Method of using a series of zones to enable writing an accurate estimate.
Back to Top
|
Surrealism is one of the most popular and well-known 20th-century art movements. Its chaotic and mysterious imagery, inspired by dreams, fantasies, and the unconscious influenced not only generations of artists but writers and filmmakers as well as fashion, and game design.
Dating mainly from the 1930s to the 1960s and featuring drawing, collage, and various printmaking techniques, many of the works in this exhibition include takes on the human body. In the hands of these artists, faces expand and float, limbs twist and dance, and people turn into monsters, machines, animals, and things in between. Artists in the exhibition include Salvador Dali, Joan Miro, Louise Bourgeois, and Dorothea Tanning, among many others.
|
Question: What is the music of Africa and Latin America?
In fact, here’s a somewhat more complete list of Latin American forms of music with an African basis: bachata, batucada, cha-cha-cha, conga, funk carioca, mambo, tango, pachanga, reggaeton, rumba, son, tropicalia, and zouk…just to name a few. … But in fact, salsa was invented in the United States.
What are the similarities of music of Africa and Latin America?
African-American jazz started in the United States in the 20th century and since has had influence from Latin American rhythms. Similarities and combinations of their style have arisen from their musical contact. Both styles incorporate syncopation in their harmonies and melodies.
What is African Latin music?
We use the term Afro-Latin to describe types of music from Latin American countries that were influenced by the black slave population that came from Africa and was forced to establish itself mostly in major port cities.
IT IS INTERESTING: Quick Answer: What do missionaries do in Africa?
What defines the music of Latin America?
To find out what all the hype is about, let’s look at the five most popular Latin American music genres:
• Salsa. …
• Merengue. …
• Bachata. …
• Tango. …
• Modern Latin American pop music. …
• Share:
What is the difference between African music and Latin American music Brainly?
Answer Expert Verified
African music is closely tied with religion. Their music and songs are used mostly in rituals and religious ceremonies, their music is a way of passing down stories from generation to generation. … Latin-American music is a combination of different schools of thought in music style.
What makes African music unique?
African singers use a wide variety of sounds. The melodies are short, repeated over and over, also include whistles and yodels which is peculiar to African style of music. Soloist often improvises new melodies while the chorus continuous with the original melody creating a polyphonic structure.
What are the 6 Latin American music influenced by African music?
The African musical influence is considered most dominant in widely popular Latin genres like samba, salsa, merengue, bachata, and timba.
What races are Afro Latino?
Afro–Latin Americans or Black Latin Americans (sometimes Afro-Latinos or Afro-Latinx), are Latin Americans of significant or mainly African ancestry. The term Afro–Latin American is not widely used in Latin America outside academic circles.
IT IS INTERESTING: Frequent question: How long does it take to get from Florida to Africa?
It should come as no surprise that Latin music has become so popular over the decades and even more so in recent years. The musical style appeals to people of all ages and backgrounds because of its rhythmic beats and catchy upbeat vibe. It has never mattered if the lyrics were in English, Spanish or both.
Which Latin American country has the best music and why?
Where is Latin American music located?
Latin American music, musical traditions of Mexico, Central America, and the portions of South America and the Caribbean colonized by the Spanish and the Portuguese. These traditions reflect the distinctive mixtures of Native American, African, and European influences that have shifted throughout the region over time.
Why is music important in Latin America?
Music is an important part of understanding the history and people of Latin America. … Africans, enslaved and free, brought new rhythms, dances, songs, and musical practices with them to the Americas as well, creating unique syncretic blends of song, dance, and performance.
Salsa is one of the most popular Latin music genres in the entire world. This vibrant rhythm is the result of several musical influences, which include traditional beats from Cuba and Puerto Rico and other styles such as mambo and Latin boogaloo. Salsa owes its names to this amazing combination of sounds.
IT IS INTERESTING: What are the social and environmental issues in South Africa?
What’s Mexican music called?
How did Latin music influence American culture?
Since World War II, the United States has experienced a strong Latin influence in jazz, pop and hip-hop music. This influence includes the use of African inspired dance rhythms, Latino beats, and a variety of musical instruments. … This musical style first surfaced in Chile, then spread to other parts of Latin America.
Across the Sahara
|
What Almost No One Knows About
How You Can Be Able to Treat Diseases Using Modern Methods
With the increase in technology, there are modern ways that you can use in the treatment of diseases. You find that with the recent industrial revolution there are secure mechanism that you can use in the treatment of various infectious diseases. You know that in case there are infectious diseases you can be able to outline important new strategies and this way you can stay well focused. With new development people are now safer as the spread of complicated maladies for instance cancer is getting down. Verify some of the ways that you can outline easy ideas to keep you well focused, and this is important for you and your family.
The first procedure is stem cell transportation. This involves the transportation of stem cells normally from the bone marrow, umbilical cord or from the peripheral blood. With the new mechanisms, you can even outline ideas that can help you stay in the right form. With lots of autoimmune infections that are making people have a question, you can be able to concur various ideas successfully. There are people who typically have conditions that bother them, and when they end up being disastrous, it ends up being tragic, and this can cause problems.
Nuclear medicine is another treatment method you need to be aware of. You are going to realize that the nuclear treatment has turned out to be commonly used than any other treatment used these days. This kind of therapy uses radioactive material in small amounts for determining and diagnosing the many procedures of diseases and their severity. Many of the most common health problems include; heart disease, endocrine problems, spinal injuries and many different types of problems with health. Without the medical isotopes which are in the radioactive, it would be hard to determine what happens inside there. Once the isotopes have started to work, this is where the cameras and the imaging software tell what is happening and is pinpoint the issue location.
When you haven’t found out about the hormone therapy, you still do not know about an essential treatment yet. Menopause is something that happens to women at the middle age, and that is why they have this hormone therapy method. If during menopause you realize that the estrogen and progesterone are imbalanced, this is when you need to start using the hormone therapy for balancing. It is this treatment technique which helps within to withstand the process of menopause which include; anxiety, sweating and also hot flashes. The hormone therapy has been involved in contemporary treatment used nowadays.
|
Toxic Nutrition
This week we will learn about how companies try to replicate fresh foods in the form of added vitamins and minerals. Causing toxicity, chronic health conditions and even death ☠️
Kibble/canned and even some raw food companies supplement for fresh food by adding “necessary vitamin packets” and often up dosing for lack of bioavailability. Which is where it gets dangerous.
Iodine: Essential for healthy thyroid function. Easily achieved by feeding small oily fish or phytoplankton.
Don’t want to feed fish? Think adding kelp is the answer? Easy does it - so high in iodine it can easily be fed in toxic quantities!
Some times it’s even added to raw food pre mades as an attempt to balance or be able to call it a “SURF” Product.
Iodine induced hyperthyroidism is usually the condition that is caused when supplementing long term for iodine with kelp products. Almost never an issue when feeding whole fresh foods.
Short term iodine toxicity - ie: my dog ate a bottle of kelp. Can show in symptoms such as diarrhea, vomiting, swelling of air ways, turning blue, weak pulse and coma.
Vitamin D supplementation. Perhaps the most dangerous of them all!
Synthetic vitamin D3 (Cholecalciferol) not being very bioavailable as sourced from lanolin. Kibble/canned and some raw food companies need to find a perfect balance of using enough that the amount absorbed needed to regulate the balance and retention of calcium and phosphorus. But not up dosing enough to be toxic over time or immediate consumption.
High levels of vitamin D can cause serious health problems. Vitamin D is a fat soluble vitamin, and unlike water soluble vitamins, when a dog gets too much, the access is not rapidly excreted in their urine. Instead it is stored in fat tissue and the liver.
Excessive vitamin D can lead to kidney failure and even death. Leading us to some of the biggest class action law suits nation wide. Most recently Hill’s Pet Nutrition.
Cholecalciferol is the chemical name for Vit D3 (Most commonly recognized as the main ingredient in most rat poisons) Toxicity over a period of time (in food) can lead to diarrhea, frequent urination, drooling excessively and excessive weight loss and eventually kidney failure. In high concentrated doses (ate a bottle of supplements or rat poison) this process can start in a matter of hours causing almost immediate organ failure.
|
Three (3) Days and Three (3) Nights
“For as Jonas was three days and three nights in the whale’s belly; so shall the Son of man be three days and three nights in the heart of the earth.” Mt. 12:40This either means three full days or is an idiom for parts of three days. It must be the latter, for if it means 72 full hours (3 days and 3 nights) Christ could not rise till after the third day was over and would then have risen on the second day of the week. But we read (Mk 16:9) that He rose on the first day of the week.See also Mt. 16:21; 20:19; Mk. 9:31; 10:34; Lk. 9:22; 18:33; 24:6,7. The phrase therefore does not mean 72 full hours.It was a Jewish maxim that a part stood for the whole, and as Jesus was in the tomb part of the sixth day, all the seventh day, and part of the first day, the phrase “three days and three nights” is used to express this time.Christ was crucified on the day before the Sabbath and rose on the day after the Sabbath. (Lk. 24:21) {H.M.S.Richards, Sr.}
NOTE: If, as some have said, Christ was speaking of the time period extending from Thursday night until Sunday morning, create another problem. Even though this now gives you your 3 literal nights, you now have removed the 3 days, because then you would only have the daylight hours of Friday & Sabbath.The following statement affirms the SDA position that Christ was in the “heart of the earth” from Friday evening until the dark hours of early Sunday morning.
Three Days & Three Nights
Death and Resurrection of Christ
Three questions present themselves in connection with the death of Christ: (1) On what day of the week did He die? (2) What was the connection between that day and the Feast of the Passover? (3) What was the year? This section deals with No. 1. No. 2 is examined in Additional Notes on Matt. 26, Note 1. No. 3 is examined in Section VII.Time Between Crucifixion and Resurrection.—Through the centuries Christendom has been quite agreed that Jesus died on the cross Friday afternoon and rose from the tomb early the next Sunday morning. However, in recent years some have contended that when Christ said He would be “three days and three nights in the heart of the earth” (Matt. 12:40), He meant He would be in the grave 72 hours. On this assumption is built the Wednesday crucifixion theory, which places the resurrection on Sabbath afternoon. (A more recent, less exact, Thursday proposal merely computes: “Thursday plus 3 days equals Sunday.”) Hence we should examine Christ’s statements regarding the matter.When Jesus spoke beforehand of His death and resurrection, He used several phrases concerning “three days,” and once “three days and three nights.” Of course, by modern Western reckoning, if we speak of three days after an event we mean three full days or more. Now three full 24-hour days after Friday afternoon would, strictly speaking, extend to Monday afternoon. But our problem is not what those phrases may mean to Westerners, but what Jesus meant by them and what His Near Eastern hearers understood by them.Meaning of “Day.”—There were various forms of speech used in Christ’s day that do not have the same meaning for us. Some examples of these have already been explained (“600 years old,” “son,” or “brother”; see Vol. I, pp. 181, 182; Vol. II, pp. 136, 137; see on 1 Chron. 2:7).What did Jesus mean by a “day”? He once spoke of the day having 12 hours (John 11:9, 10), referring obviously to the daytime as opposed to the night. This was literally true as Jesus meant it, for when He lived among men the time between sunrise and sunset was divided into 12 equal parts, or “hours,” which “hours” varied in length according to the season. The fact that today we use clock hours of uniform length, in which sunrise and sunset are more or less than 12 sixty-minute hours apart most of the time, does not make Jesus’ statement incorrect. Similarly His phrase “three days” must be interpreted according to what those words meant then to those people, not what they mean to us today.Although “day” was, and is, sometimes used to mean the daylight hours, nevertheless the word, when used in counting a series of days, means in both ancient and modern usage a period including a day and a night. The Greek language, in which the New Testament was written, had a word for “night-day,” nuchtheµmeron (see 2 Cor. 11:25); and Genesis enumerated each successive day of creation as composed of “evening” and “morning.” Jesus’ “three days and three nights” are merely “three [calendar] days,” as then understood.Different Phrases for Same Period.—This is clear from the fact that He refers at different times to the same period—the interval between His death and His resurrection—as “in three days,” “after three days,” on “the third day.” Once, because He is quoting from Jonah (ch. 1:17), He uses the phrase “three days and three nights.” Unless we accuse Jesus of contradicting Himself, we must accept all these phrases as meaning the same period of time. Even the priests and Pharisees who quoted Jesus as predicting His resurrection “after three days,” asked Pilate to have the tomb guarded “until the third day” (not “until after the third day”). Obviously, “after three days” meant “the third day".[1]The following texts mention this three-day period:
“In three days”
“After three days”
“The third day”
Matt. 26:61; 27:40
27:63; 12:40 (and 3 nights)
Mark 14:58 (within)
9:31; 10:34
9:22; 18:33; 24:7, 21, 46
John 2:19-21
What, then, did these various three-day expressions mean? We can find out easily by comparing other passages in the Bible that refer to time periods in similar ways.Three Days, Inclusive.—The question of how long Jesus was in the tomb rose from a modern misunderstanding of inclusive reckoning, the common ancient method of counting. It included both the day (or year) on which any period of time began and also that on which it ended, no matter how small a fraction of the beginning or ending day (or year) was involved. One example of this method is a period (when Shalmaneser besieged Samaria) beginning in the 4th year of Hezekiah and the 7th year of Hoshea, and ending in the 6th year of Hezekiah and the 9th of Hoshea, “at the end of three years” (2 Kings 18:9, 10; see Vol. II, p. 136). It was evidently counted thus: 4, 5, 6 (of Hezekiah’s reign), three years, inclusive.[2]Take another example. We say that a child is not one year old until after he has lived 12 full months from the date of his birth. He becomes one year old as he enters his second year of life, and becomes 2 years old after he completes his second year. Thus a child is called “10 years old” all through his 11th year, and becomes 11 only after he has reached the end of 11 full years. Not so in the Bible. Noah was, literally, “a son of 600 years” “in the six hundredth year” of his life (Gen. 7:6, 11); although his 600 years were not reckoned inclusively (see Vol. I, p. 181 and note), these verses show that in his 600th year his age was considered 600, not 599. A Hebrew baby was circumcised when he was “eight days old” (Gen. 17:12), “the eighth day” (Lev. 12:3; Luke 1:59), or “when eight days were accomplished” (Luke 2:21). The Bible lists several periods of “three days” that ended during, not after, the third day, and thus covered less than three full 24-hour days (see Gen. 42:17–19; cf. 1 Kings 12:5, 12 with 2 Chron. 10:5, 12).Not only among the Hebrews, but also among other ancient peoples, we have examples of inclusive reckoning. This was common in Egypt, Greece, and Rome (see Vol. II, p. 136). It is still found in the Far East today. Even in some countries of Europe a week’s interval is referred to as “eight days,” and a three-day round trip ticket bought on Sunday, for instance, is expected to be used on Tuesday. In modern Japan, until MacArthur’s government changed the system for the convenience of the compilers of vital statistics, a child born in December was a year old for the remainder of the month and became two years old on January 1; “two years old” meant having lived in two calendar years, regardless of how small a fraction of either year was involved.[3]Similarly, in Chinese reckoning a child born late last year is two years old this year (the second calendar year of his life) and will be three years old as soon as next year begins. Obviously, this is not a literal reckoning but is based on a concept of time that comes down from a long cultural usage. Similarly, we must bear in mind the cultural concepts of time that were held in Jesus’ time.Since the common custom of inclusive reckoning is well attested for the Hebrews, for other ancient nations, and in the East down to modern times, it seems wholly unreasonable to understand Jesus’ words about a three-day period in terms of our modern Western mathematical method of reckoning. By common usage His hearers would count the three days successively as:
1. The day of the crucifixion.
2. The day after that event.
3. The “third” day after (by modern count, the second day after).
We cannot insist that when Jesus once said that He would rise after three days (Mark 8:31) He meant after the end of the third full day, or 72 hours. For that He would have said “on the fourth day.” (For the phrase “four days ago” meaning three full days, or at least 72 hours, see on Acts 10:30.)[4]But we are not left with merely an obvious deduction as to what Jesus meant by “third day.” We have it from His own lips. In speaking of Herod on one occasion He said, “Go ye, and tell that fox, Behold, I cast out devils, and I do cures to day and to morrow, and the third day I shall be perfected. Nevertheless I must walk to day, and to morrow, and the day following: for it cannot be that a prophet perish out of Jerusalem” (Luke 13:32, 33). Thus He equated the third day with the day after tomorrow—the third day counted inclusively.Crucifixion on Friday.—What day, we may inquire, was the day on which this three-day prophecy of Jesus was fulfilled? The answer is, “The first day of the week” (Mark 16:9; see on Matt. 28:1). Late “that same day” (Luke 24:1, 13), two disciples met Him on the road to Emmaus, and in talking of the crucifixion of their Master and their own deep disappointment, declared, “To day is the third day since these things were done” (Luke 24:21). Jesus Himself said, when He appeared to the Twelve in the upper room, “Thus it behoved Christ to suffer, and to rise from the dead the third day” (Luke 24:46). As Paul later said, “He rose again the third day according to the scriptures” (1 Cor. 15:4). Sunday, obviously, was the third day.[5]What, then, was the day of the crucifixion, seeing that Sunday was the third day, or the “day after tomorrow”? Obviously, the preceding Friday, the day before the Sabbath. This is in exact accord with Luke’s statement that the women left the embalming unfinished on the day of preparation as the Sabbath drew on, and rested the Sabbath day according to the commandment before returning on the first day of the week (Luke 23:54 to Luke 24:1). They would not have waited several days, as is supposed by those who put Jesus’ death on Wednesday and make the Sabbath here mentioned merely a festival, or ceremonial, sabbath. Besides, the phrase “an high day” is taken by many to indicate that in that year the festival sabbath fell on the weekly Sabbath (see on John 19:31).[6]
[1-6] Nichol, Francis D., The Seventh-day Adventist Bible Commentary, (Washington, D.C.: Review and Herald Publishing Association) 1978.
|
Your question: Can we use span inside anchor tag?
It is perfectly valid (at least by HTML 4.01 and XHTML 1.0 standards) to nest either a inside an or an inside a . i.e. with both HTML 4.01 and XHTML 1.0 doctypes, and both passed validation successfully! Only thing to be aware of is to ensure that you close the tags in the correct order.
Can I put span inside span?
2 Answers. Span is an inline element, therefore having span inside span is valid.
Can span tags be nested?
Nesting span tags is valid HTML. … This includes tags like strong , em , time , and etc, but also additional span tags.
When would you use a span tag?
The HTML <span> tag is used for grouping and applying styles to inline elements. There is a difference between the span tag and the div tag. The span tag is used with inline elements whilst the div tag is used with block-level content.
Can we use DIV inside anchor tag?
It is now possible to put a block-level element inside of an inline element. So now it’s perfectly appropriate to put a ‘div’ or ‘h1’ inside of an ‘a’ element. You can’t put <div> inside <a> – it’s not valid (X)HTML. … Block level elements like <div> can be wrapped by <a> tags in HTML5.
IT IS INTERESTING: Best answer: What is HTML element ID?
What SPAN does in HTML?
What is bootstrap span?
The Bootstrap “span” classes are used in the bootstrap grid system. The documentation shows columns labelled with numbers, each number represents the span class used for this container. … By default there are 12 columns. If you have a span12 , it will be as wide as the container (which may be fluid).
What is SPAN tag in CSS?
The <span> tag is an inline container used to mark up a part of a text, or a part of a document. The <span> tag is easily styled by CSS or manipulated with JavaScript using the class or id attribute. The <span> tag is much like the <div> element, but <div> is a block-level element and <span> is an inline element.
What is the use of nested tags?
Correctly nesting HTML tags prevents HTML errors
If you look at the HTML markup for any webpage today, you will see HTML elements contained within other HTML elements. These elements that are “inside” of other elements are known as nested elements, and they are essential to building any webpage today.
What nested tags?
HTML tags should be “nested” in a proper order, meaning that the tag opened most recently is always the next tag to close. In the following example, the HTML code is nested correctly, and we’ve drawn lines to connect opening and closing tags: The following HTML code sample contains two nesting errors.
IT IS INTERESTING: How do you adjust a table in HTML?
Should I use span or div?
What does P mean in HTML?
What is the difference between P tag and span tag in HTML?
<p> and <div> are block elements by default. <span> is an inline element. Block elements start and end with a new line in the browser while inline elements do not. “Inline” means they are part of the current line.
How do you make a clickable span?
1. Hahaha. Simple and straightforward. …
2. within that function if you add after the first alert $(‘a’,this).click() it will activate click the a link but then it would click the span again automatically, if you click the href directly it would click the span aswell.. – …
3. This does not work in cases like the question.
7 сент. 2010 г.
Is anchor tag a block element?
An anchor (or link) is an example of an inline element. You can put several links in a row, and they will display in a line.
What does Div mean in HTML?
The HTML Content Division element ( <div> ) is the generic container for flow content. It has no effect on the content or layout until styled in some way using CSS (e.g. styling is directly applied to it, or some kind of layout model like Flexbox is applied to its parent element).
IT IS INTERESTING: How do I open an HTML file in Dropbox?
HTML5 Robot
|
The average person consumes in excess of 50 kilograms of sugar per year! Refined sugars are addictive, immunosuppressive and will destroy your body’s ability to regulate blood sugar and insulin metabolism. Anything more than five kilograms of sucrose per year accelerates ageing, creates a breeding ground for yeast and fungus in the gastrointestinal tract, and will leach important minerals from vital organ reserves. So why do we continue to consume so much of it?
Because sugars are hidden in everything. Packaged and processed foods are particularly dangerous because in most cases you aren’t even aware of which sugars you’re eating. Sugars are a form of carbohydrate and are actually built of sugar molecules, called saccharides. There are two forms of carbohydrates, we used to know them as simple and complex carbohydrates, these days they are called high or low GI.
An easy way to get your head around the difference between the good and bad carbs is this:
If it’ s ‘ose’ out it goes!
Simple carbs (high GI) end in the suffix ‘ose’. Check food labels, and if you see an ingredient ending in ‘ose’ it contains simple high GI carbs. The simpler the sugar, the more sweet it is and fruits and honey, which contain fructose, are considered the sweetest. Simple carbohydrates enter your blood stream fast and then your body runs through a series of processes trying to compensate for the rush of energy it is receiving, and it generally ends up over-compensating.
Complex carbs (low GI) are long and complicated strings of simple sugars, which are slower to break down and be digested and are known as starches. Starches don’t cause blood sugar fluctuations the way simple sugars do. They also taste less sweet because they are a larger molecule and don’t easily fit into the sweet receptors of the taste buds like the simple sugars do.
Sugars themselves are not bad for you, but like with all foods, you should try to keep them as close to nature as possible. Go for the less refined and processed sugars, and remember to balance out between the complex and simple sugars. If you want to sweeten foods stick with raw honey, molasses or real maple syrup, which are all closer to nature.
The number of people with Type 2 diabetes in Australia has trebled over the past twenty years and many of them are also overweight. The combination of diabetes and obesity can increase the risks of cardiovascular disease. An underlying chromium deficiency may be contributing to or exacerbating these conditions.
As a naturopath I have seen ever-increasing numbers of clients deficient in chromium. Chromium is an essential nutrient necessary for the normal metabolism of carbohydrates, fats and proteins. A deficiency in chromium can lead to cravings for sweet foods and improper glucose metabolism, causing hypoglycaemia and increasing the chances of obesity or diabetes. The increase in our consumption of refined and processed foods, void of chromium and other minerals, is contributing to this deficiency.
Raising chromium levels in the body can be done by consuming chromium-rich foods such as mushrooms, meats, animal fats, fish, honey, brown sugar, brown grains like whole-wheat and rye breads, grapes and raisins, and brewer’s yeast.
If you think you may be low in chromium check with your local naturopath. In the meantime, know that you are sweet enough and don’t need a diet rich in refined and processed simple sugars.
|
Spook-tacular sale! Save 31% on Premium quarterly »
how can i say that there is rainy and sun
BizainakhamisA1Kwiziq community member
how can i say that there is rainy and sun
Asked 2 years ago
CécileKwiziq team memberCorrect answer
Hi Bizainakhamis,
You could say -
'Il pleut et il y a du soleil en même temps.'
BonnieC1Kwiziq Q&A regular contributor
But isn't the use of "...il fait soleil" one of the phrases (the other being "Il fait du soleil.") that is incorrect and should be replaced (if you will) with "Il y a..." [+ noun] ? I think I read another answer from Cécile that uses the "Il fait... [+partitive +noun]. Is this a regional difference, or a formal/informal/colloquial difference? I have told my students that -- even though examples can be found in multiple texts/guides in my classroom -- "Il fait du soleil.", "Il fait du vent.", etc are absolutely incorrect and sound "strange" to native French speakers. If they shouldn't be used, why are they given as possible answers by Kwiziq staff in this thread? Je ne comprends pas...
how can i say that there is rainy and sun
Sign in to submit your answer
Don't have an account yet? Join today
Ask a question
Find your French level for FREE
Test your French to the CEFR standard
Find your French level
Clever stuff happening!
|
What is Beauty?
It is hard to define beauty objectively since everyone has their own perspective based on life experience, predispositions, and biochemistry. Generally, beauty is immeasurable, but harmony is measurable and it is the most important components of physical beauty.
Many Renaissance artists, including and most famously, Leonardo Da Vinci, used the golden ratio to create some of the most beloved works of art in the world. The golden ratio can also be found in the facial structure of most of the people consider to be beautiful. Why do we find symmetrical faces more beautiful? Much research has gone in to this question, with evidence that even infants prefer symmetrical faces. According to Professor Gordon Patzer’s “The Physical Attractiveness Phenomenon,” there are five predominant features factor into physical attractiveness: Teeth, smile, lips, eyes and nose.
We believe facial aesthetic design is about the harmony of all the elements of the face and how they work together to achieve the beautiful and natural smile. While traditional method of smile design focuses on creating perfectly symmetrical teeth, which in an asymmetrical frame like the face actually creates a disharmony. Natura Dentica use the modern method of smile design because beauty comes in balance and harmony.
Beauty may be subjective, but the harmony of every elements of the face is not, and that is what Natura Dentica can create by using advanced facial mapping techniques and a comprehensive understanding of how human identify beauty.
Better Yet Affordable Dental Care is Our Mission
24/7 service. Same Day Appointments are Available.
(021) 5491212 / (+62) 81 822 3499
Jl. Raya Kby. Lama No.9E Jakarta Selatan
WhatsApp chat
|
What is a modifier and how it works in Japanese? 修飾語(しゅうしょくご)
Can you identify which word is modified by a modifer?
Today, I am going to explain how to tell apart modifiers and other words.
黄色いチューリップがとてもきれい。(The yellow tulip is very nice.)
黄色い チューリップが とても きれい。
Here in this sentence, we have a modifier, 黄色(きいろ)い.
Let’s find which word is modefied by ”黄色い”.
All you need to do is just to put “黄色い” in front of the each sentence.
For example:
1. 黄色い チューリップ(Yellow tulip)
2. 黄色い とても(Yellow very)
3. 黄色い きれい(Yellow nice)
Did you know which one was correct?
The answe is “1”. Any of others do not make sense. So in the sentence, a modifier “yellow” is with a tulip.
To be more precise, ”黄色い” is an adjective, “形容詞(けいようし)”. So, it has to modefiy only nouns, not others.
とても is an adverb, “副詞(ふくし)”, and きれい is an adjective, ”形容詞”.
|
When did Slavs come to Balkans
Slavs - Wikipedi
1. When Slav migrations ended, their first state organizations appeared, each headed by a prince with a treasury and a defense force. In the 7th century, the Frankish merchant Samo supported the Slavs against their Avar rulers and became the ruler of the first known Slav state in Central Europe, Samo's Empire.This early Slavic polity probably did not outlive its founder and ruler, but it was the.
2. Slavs were raiding and plundering Roman lands from their territories north of the Danube river located in what is now southern Romania since around the 490s, but they started to settle south of the Danube (in Balkans proper) only since around 545
3. Slavs settled the Balkans in early 6th century . Something that needs to be specified is that we South Slavs got formed and developed in two different ways . With this being said , we Bulgarians are descending from Slavs who came from sphere today in Ukraine and migrated to the Balkans alongside the Danube
4. Furthermore, when did the Slavs come to Balkans? Slavs came to the Balkans in the 5th and 6th century. People who lived here before them were Thracians, Illyrians, Greeks, Macedonians, Romans. Is Croatia Slavic or Balkan? Geographically Croatia is entirely part of the Balkans along with Slovenia. As for ethnicity there are Slavs and Illyrian-Albanians
5. The original habitat of the Slavs is still a matter of controversy, but scholars believe they populated parts of eastern Europe. They entered the historical record about the 6th century ce , when they expanded westward into the country between the Oder and the Elbe-Saale line, southward into Bohemia , Moravia , Hungary , and the Balkans , and northward along the upper Dnieper River
6. Invasions in the 5th and 6th centuries AD by the Huns, Gepids and Avars broke down Byzantine control of Thrace and the Balkans, and when the Slavs invaded as part of a larger migration in the late 6th century they completely overwhelmed the area, getting as far south as Greece
7. The Sclaveni (in Latin) were early Slavic tribes that raided, invaded the Eastern Roman Empire and settled the Balkans in the Early Middle Ages along with other South Slav tribes. The Sclaveni were mentioned by early Byzantine chroniclers as barbarians having appeared at the Byzantine borders along with the Antes, another Slavic group
Slavic expansion to the Balkans
Slavs descended into the Balkans sometime in the 7th century AD. Serbs, and other modern Balkan Slavic nations were born in the area by a process of integration between some of those Slavs and some of the original inhabitants of that area (Illyrians, Thracians, Paeonians, Greeks, Romans, etc.) This is very hard, as slavs come into Roman sources only by the late date of 518 A.D. Slavs are a people of mystery.The most common theory is that the slavic people originated in the Northern Ukraine around the pripet marshes
When did the Slavs settle in the current Balkans, and who
Slavs were still to come from East. They reached the Balkans centuries after that Strabo died Just Balkan Slavs are Slav and Med mixture and Polish are Slavic and Northern Mixture. Saying Polish are more Slavs than us is just stupid Where did Slavs come from originally One of the main authors of the article, Alena Kushniarevich from the Estonian Biocentre, summed up the findings of the study: We do not see a strong genetic signal in genomes of modern Slavic speakers that would support massive movements of Slavs towards the Balkan peninsula during 700-800 AD
Is a Slavic-union possible? If so what would happen with
Where did the South Slavs come from
The Slavs: I2a-Din was brought to the Balkans by expanding Slavs in the 1st millennium CE. Proponents cite the age of the clade, expert STR diversity analysis by people like Nordtvedt and Verenich, and dispute that history doesn't verify the Slavic expansions This is where modern Hungary is today, separating Southern Slavs from the Northern. Bulgars and Balkans. Bulgars arrived in Balkans a few centuries after the Huns, in 679 AD, lead by Khan Asparuh. The Bulgars founded the First Bulgarian state in the Balkans, but their influence stayed in the ranks of the political and military elite The Slavs, in other words, did not come from the north, but became Slavs only in contact with the Roman frontier [12]. The idea that the people who became labelled the Slavs in the 6th and 7th century were, for the most part, the same people who existed previously has found more support in modern academia
and today's central Croatia and big parts of Slavonia and hinterland of Istra. There was no Croatian Pannonia, it is a falsification of Croatian nationalists. Just check a map why is Zagreb got so small hinterland to it's west (to south east it is logical because of Ottomans and Bosnians before.. How did the growth of nationalism affect the Balkans? Nationalist tension resurrected in the Balkans. The Balkans successfully overthrew the Ottoman Empire, but soon after, the now independent Balkan states yearned for more land & started fighting among themselves. These resulted in a series of wars Yugo-Slav state to the Serbo-Croats and Slovenes may foreshadow a gradual restriction in the future of the term Yugo-Slav to the western branch of the Southern Slavs.-For names of geographical features consult the ethnographic map of the Balkan Peninsula accompanying the paper by Cvijic cited above.-EDIT. NOTE At mass on Christmas Day in 1105, a Bishop Godfrey was said to have refused Holy Communion to any man who had come to church unshaven. By this date the beard was being perceived in Britain as blasphemous and 'unchristian' Northern Slavs grew beards and revered them since ancient times, long before the adoption of Christianity Pan-Slavism was a movement in the mid nineteenth century aimed at unity of all the Slavic peoples. The main focus was in the Balkans where the South Slavs had been ruled and oppressed for centuries by the three great empires, Austria-Hungary, the Ottoman Empire and Venice.It was also used as a political tool by both the Russian Empire and its successor the Soviet Union
The Emperor Constantine III (641) transferred a part of the Slavs from the Balkans (Vardar region) to Asia Minor. There these migrants founded the city of Gordoservon, the name of which gives grounds for supposing that among its founders there were Serbs, and was also known under names Gordoserbon and Servochoria A part of the Dragovites, settled even in the Polog valley. In the second half of the 7 th century, more precisely in the year 675 AD, by the forming of the Second Great Union of the Tribes lead by comes of the Rinhines, Prebond, the Macedonian Slavs, had the best condition and way to form their own medieval state
Ante Popovski, commenting on the arrival of the Slavs in the Balkans and their contacts with the culture of the Ancient Macedonians, writes: Thus, the Ancient Macedonians, through the entire 3rd century A.D. and until their assimilation into another ethnos, did not part either with their own name, or the name of their famous Macedonian homeland The Greeks are not native to the Balkans. The Greeks migrated into the Balkans in multiple waves. The Mycenaean were in Greece as of the 16th cent B.C. followed by the Dorians in the 10th cent B.C. with dates for both people being earlier the further north in the Balkans you are looking at. There were preexisting people there before the Greeks Since the 19th century the Slavs and their apologists have pretended that Slavs always formed the majority in Dalmatia, ever since they first invaded the region in the 7th and 8th centuries, and have used this as a pretext to occupy and annex the region away from Italians. But as has been demonstrated, this is not the case at all The allegation, groundless again, that the Macedonian population was not Slavic at all, is a great and complex historical question. Weather the thesis that the Slavs decided to come down to the Balkans much later, which is defined according to Greenberg's writings as a nomadic - rural settlement is true, is, again, an unconfirmed scientific fact
Slav History & Facts Britannic
Slavs came to the Balkans in the 5th and 6th century. People who lived here before them were Thracians, Illyrians, Greeks, Macedonians, Romans. What does it mean to be Balkan Where did Slavs come from? Close. 1 2 21. Posted by 2 years ago. Archived. Where did Slavs come from? I know their location before immigration to Balkans, Central Europe and Eastern Europe. But what about before that, how did they came to these areas. Is there anyone close to them except Baltic peoples Modern Slavs, both Bulgarians and Macedonians, cannot establish a link with antiquity, as the Slavs entered the Balkans centuries after the demise of the ancient Macedonian kingdom
The Balkan Slavs, a history
What happened to the South Slav's religion after the Ottomans invaded they were forced to give up Christianity What year did the Ottoman Empire come to the Balkans The Arab gold and silver coins excavated in Potoci, near Mostar of the present-day Bosnia-Herzegovina, date back to the time of Marwaan II (744-750 C) which tells of the extensive trade relations the Muslims had with the Balkan nations, first the Albanians and later the Slavs These tribes were later grouped together as Slavs in the sixth century a.d., when they finally came into prominence in Eastern Europe after the Huns were defeated. Modern scholarship will say how the Slavs suddenly appeared and conquered Eastern Europe, but the previously quoted sources show that they were living in Europe long before under different names
Arrival to the Balkans Byzantine sources report that some Serbs migrated southward in the seventh century C.E. and eventually settled in the lands that now make up southern Serbia, Montenegro, Kosovo, Bosnia and Herzegovina Some countries in the Balkans are predominantly Slavic. Others are not. When it comes to Balkan culture, it does have a Slavic influence. The other major influence comes from the Ottoman Empire. It controlled most of the peninsula for nearly five centuries. You'll notice a lot of Turkish origin food, words, and customs in the Balkans
Byzantine Military: Slavs Invade The Roman Balkan
1. Byzantine influence upon the Slavs of Greece and the Balkan Peninsula grew very strong during his reign. So powerful was this influence that the emperor could strip the Bulgar State of close to a quarter of a million of its inhabitants, as he did in 762
2. All together there are about 300 million Slavs in Europe plus millions in diaspora. All Slavs come from one proto-Slavic nation that existed before 6th century in modern-day Ukraine and Eastern Poland. In the early Middle-Ages they spread across half of the Europe
4. ated by Slavs after the fourth century. Frankish and Eastern Roman chroniclers perhaps didn't appreciate this complication, lumping them all together so that, in written works, Wends were Slavs and Slavs were Wends
When did Serbians come to Europe (Balkans)? - Quor
Pan Slavism - the idea that all Slavs everywhere shared a common ethnicity and culture - became prevalent in the late 19th and early 20th centuries. However,the only major Slav power was Russia, and other Slavs in the Balkans therefore looked to Russia for protection and help against Austria and Ottoman Turkey.This meant Russia felt obliged to support them Chronica Slavorum was originally a medieval chronicle which observed life and culture of Slavs, written by Helmold, a Saxon priest and historian. Today Slavorum is focused on international audience to bring them all the information they need about events, travel, culture, history, science, entertainment and food from Slavic cultural and geographical parts of the world
Origins of Polish Slavs - PolishForum
It's situated in the Central Balkan National Park and if you want to see it at its peak of flow, you should go there during the summer season. Add to Favourites Faceboo Pan-Slavism, a movement which crystallized in the mid-19th century, is the political ideology concerned with the advancement of integrity and unity for the Slavic peoples.Its main impact occurred in the Balkans, where non-Slavic empires had ruled the South Slavs for centuries. These were mainly the Byzantine Empire, Austria-Hungary (both as separate entities for most of the period), the. The history of the continent from an African perspective. With hundreds of pages, and multi-media, the BBC investigates the events and characters that have made African history from the origins of. Did ethnonym Slav exist in the XIV century? Yes, in the 6th century AD Procopius mentions Slavs in Byzantine Greek, and he refers to them as Σκλάβοι Sklaboi. The first mention in Old Church Slavonic is from the 9th century and reads: Slověne. So why Serbs and not Slavs
Genetics speaks - Who is who on Balkans COGNIARCHA
By the late 18th century, the Balkans were at a crossroads. TheThe menacing Slavs, of course, were in an ascendancy, first under Austria-Hungary, and much later under Yugoslavia. The Albanians were reluctant to join them, a wise decision, given late 20th century struggles between Bosnians, Serbs and Croats But it didn't come out nationalism in the Balkans, backed by Pan-Slav against Ottoman rule in the Balkans. But what, exactly, did the slogan mean now that Serbia and. South Slavs: Bosniaks • Bosnian medieval kingdom 1180-1463 - Bosnia was de facto independent in the 13 th and 14 th centuries; its difficult terrain and remoteness helped to avoid subordination to either Hungary or Serbia - Bosnian kingdom's Christian church was allied neither with Catholicism nor Orthodoxy (and thus branded as heretical by both these more powerful church. How Nationalism In The Balkans Contributed To The Outbeak Of WW1. Nationalism in the Balkans helped contribute to the outbreak of WWI. Beginning in the late 19th century, the social unrest in the Balkan States became the focal point of many European powers Former Yugoslavia 101: The Balkans Breakup If you're confused about how the former Yugoslavia dissolved after the fall of communism, you're not alone. The country was melded together after World.
tartaria on Tumblr
GENEVA, May 08, 2015 - One of Germany's greatest statesmen Otto von Bismarck, who unified most Germans into the German Empire in 1871 (leaving the Austrians and Swiss-Germans outside the Empire), and the main practitioner of Realpolitik (politics as the art of the possible). Born 1 April 1815 in Schönhausen near Berlin (200th anniversary o Slavs arrive in the Balkans. When it comes to the Battle of Kosovo, [the textbooks] are in the domain of mythology more than in the domain of history, he said To counter this, France fomented uprisings and supported indepdence movements, including in the Balkans - Russian countered this by using the emerging Pan-Slavic ideal - that all Slavs should be united under Russian leadership. The Stew comes to a boil. From 1804 - 1817 Serbia revolted at Ottoman rule for a number of factors: The Serbian Revolutio 2. When did Slavic languages got separated form other Indo-European languages; How did Slavs languages become so much different than other two main Euro groups, the Latin and Germanic; The real meaning and origin of the term Slav 3. What Slavic mythology could reveal about their origin, influences and historical facts 4
The Slave Market, painting (c. 1884) by Jean-Léon Gérôme (source) Can Europeans, and European women in particular, become objects of trade? The idea seems laughable, since the term 'slave trade' almost always brings Africans to mind. Yet there was a time not so long ago when Europe exported slaves on a large scale. Between 1500 and 1650, Eastern Europe exported 1.5 million slaves to. How did the Slavic people go from slaves to conquerors? Today we're going to discuss the origin and history of the Slavic peoples, and just how they managed. How did NASA's Martian rover come to land in a crater named after a tiny Balkan village? February 22, 2021 7.46pm EST. Robert Greenberg,.
The History of Slavs Inferred from Complete Mitochondrial
1. The 11 countries lying on the Balkan Peninsula are called the Balkan states or just the Balkans. This region lies on the southeastern edge of the European continent. Some Balkan countries such as Slovenia, Croatia, Bosnia and Herzegovina, Serbia, and Macedonia were once part of Yugoslavia
2. I think Paradox did quite well when it comes to this, but there are some changes I would suggest- changing the county of one barony, and adding two new duchies to split some very large ones (which, for nice borders sake, might require adding an additional county while cutting one), as well as a possible change in Kingdom borders (which might be the most controversial)- for that reason, I will.
3. The South Slav (Yugo-Slav) groups that became the Slovenes, Croatians, Serbians and Bulgarians entered the Balkans from the north between 500 and 700 AD. They settled in an arc stretching from the head of the Adriatic in the north, southward and eastward to the Black Sea
The Slavs' population grew rapidly thus by the 8th century they had expanded towards the Balkans, Alps, and Volga River. The majority of the Slavs converted to Christianity in the 9h century and occupied most of the medieval Christian states including Bulgaria , Poland , Serbia , Croatia , and Bosnia The Slavs in the Balkans and in the southern districts of the Austro-Hungarians Monarchy are divided philologically into Bulgarians; Stokauans, who include all Serbs, the Slavonic Moslems of Bosnia, and also a large part of the population of Croatia; the Cakauans, who live partly in Dalmatia, Istria, and on the coast of Croatia; the Kajkauans. Slavs were allowed to enter Balkans through the Danube border because as I wrote they came peacefully,they mostly were shepherds who just kept their lambs on mountains.They did not cause problems.Hunns on the other hand,Goths and Avarians were highly undesirable since they caused severe damage deserting whole regions Settlements of Slavs and Byzantine Sovereignty in the Balkans In: Byzantina Mediterranea. Festschrift für Johannes Koder zum 65. Geburtstag, ed. K. BELKE, Wien 2007, 123-135
How the countries of the former Yugoslavia gained their independence and the conflict it caused. In our search for spomeniks, we have travelled extensively through all of the Balkan countries and autonomous regions that used to make up Yugoslavia.In so doing, we have come across many reminders of the so-called Balkan Wars, also known as the Yugoslav Wars, fought in the 1990s and we have tried. The major powers in Europe got involved in the Balkan countries.In 1908 Austria annexed the Ottoman provinces of Bosnia and Herzegovina.These provinces were coveted by Serbia which had become an important power in the Balkans.Serbia was supported by Russia in establishing an United Slav State in the Balkans.Russia opposed Austrian annexation but because of Germany's support to Austria,she was.
How did the Slav term and Macedonians come to be together? User Name: Remember Me? Password Thread Tools: 11-03-2008, 09:43 AM #1: I of Macedon. After the Slav invasion of the Balkans in the sixth century, they remained pagans for about three hundred years. did the Slavs become Latin Croats. Church matters. Had the Turk never come, it is probable that, in Church matters too, the Southern Slavs would have formed one Church, as they would have formed on What was the role of Serbia? Austria? Russia? What was the aim of German policy in July 1914? Did Germany want a general war? The Balkans is the historic name given to the states in southeastern Europe. Only five states in the Balkans were free from being ruled by Turkey. The people that lived in these areas were considered Slavs The South Slavs are a subgroup of Slavic peoples who speak the South Slavic languages.They inhabit a contiguous region in the Balkan Peninsula and the eastern Alps, and in the modern era are geographically separated from the body of West Slavic and East Slavic people by the Romanians, Hungarians, and Austrians in between. The South Slavs today include the nations of Bosniaks, Bulgarians.
Balkan Orthodox Christians (Greeks and Slavs combined at first) were under the authority of the Patriarch of Constantinople. In case of confict, Islamic law and state practice took precedence but otherwise the laws and institutions of the Orthodox millet remained in force (largely unchanged from local customs before the conquest) That more Slavs may have come later in no way alters this fundamental conclusion. The settlement of Slavs in Greece does not, however, mean that the Greek population was completely obliterated. Despite the Slavic flood, the Greeks held their own in eastern Peloponnesus, in central Greece, including Attica (a region which is known to have been a theme as early as 695), and, of course, in the. Who are the Slavs? - Citations and Sources User Name: Remember Me? Password: Page 1 of 48. However, by the end of this period these invaders had established themselves in the Balkans. Bulgars, Slavs & Avars 500-600 New barbarian tribes, the Bulgars and the Slavs were pushed south into the Balkans by the Avars. The Slavs began to infiltrate the Balkans around 500 where Slavs come from; when and where the first Slavic states came into being; the culture of the first Slavs; what Slavs had in common. Nagranie dostępne na portalu epodreczniki.pl Nagranie dźwiękowe abstraktu Slavs appear in historical sources quite late. One of the first writers to mention them was Jordanes, who lived in the 6th century
Myths of Russian History: Does the word 'Slav' derive from
1. Home » did you know » Nostradamus predictions. Nostradamus predictions. NOSTRADAMUS, the French Christian Jew who lived in France in the 16th century, made many forecasts, including the two World Wars. 18 of his 950 quatrains refer to a third world war
2. g Constantine was speaking literally
3. Moreover, these about 500,000 Slavs did not 'flood, settled snugly' aforesaid lands but rather settled in certain areas. This is evident from data in the field of linguistics. So, for the areas between Sirmium and Eastern Thrace and between the Danube and the Peloponnese we have factual grounds to speak only of Slavic enclaves, not of 'endless sea'
The cold facts of what's going on in the Balkan crisis wouldn't necessarily cause any dispassionate observer to come to these sorts of conclusions. In other words, the facts of what's going on in this crisis are being filtered through a world view, which he's displaying to you through these historical records Thanks to science, I now have a third alternative identity: not a Greek who pretends to be a direct descendant of the ancient Greeks, not a Slav from a swamp whose forbears arrived in the Balkans 1,400 years ago, but a Macedonian whose forbears arrived in the Balkans possibly 11,000 years ago Nationalist tensions emerged in the Balkans. Nationalist tensions emerge in the Balkans due to the following reasons. Balkan a region of geographical and ethnic variation consisting modern-day Romania, Bulgaria, Albania, Greece, Macedonia, Croatia, Bosnia-Herzegovina, Slovenia, Serbia and Montenegro who were broadly known as Slavs Turkish and Greek coasts] than in the Balkan Slavs.6 Hosking and Service agree, stating that Pan-Slavism was not a real force. Nor was Pan-Slavism acceptable to practical politics inside Russia itself.7 This statement goes too far however. Orthodox and Slavic ideas did raise Russian interest in the Balkans. But few Tsars or Foreig
When did the Macedonians become Slavs? Yahoo Answer
1. The Beginnings of Panslavism ↑. Since the 16 th century, and especially since the publication of Mavro Orbini's (1563-1614) book Il regno degli Slavi (The Realm of the Slavs, 1601), the idea had spread that the Slavs are a single people and that their vernaculars are dialects of a common language.. In the first decades of the 19 th century, the rapid development of German nationalism.
2. The Myth of Greek Ethnic 'Purity' Macedonia and Greece, John Shea, 1997 pp.77-96. THE GREAT ETHNIC MIX OF GREECE. Just as Macedonia and other Balkan states were invaded by Slavs and other peoples from the north and from within the Balkans themselves, so were the lands that eventually were to become modern Greece
3. Whilst the Nazis did consider the Slavs to be of related blood and therefore Aryans, they did consider the Slavs to be racially inferior to the Germans. This view was quite popular in Austria and Germany in the late 19th and early 20th century
4. On October 17, 1912, following the example of Montenegro, their smaller ally in the tumultuous Balkan region of Europe, Serbia and Greece declare war on th
5. Although the perceived threat for the Albanians in the Balkans comes primarily from Serbs, the Macedonians as well have been added to such a perception in the context of Tito's Yugoslavia. The unfortunate but truthful fact is that Albanophobia is what unites the Slavs, the Orthodox people (Rusi 1999)
6. where did the slavs come from. asia. whom did the slavs settle among. Celtic and germanic tribes. ad ____ and _____ slavs spread. 400s and 500s. slavs were able to resist armies because of _____ in balkan peninsula. mountainous terrain. what happened to the slavs east of balkan peninsula. invasions from mongols in 1200s. AD 106, what did the.
Balkans comes from the Turkish language meaning chain of wooded mountains or 'swampy forest'. Geography Edit. The Balkans are bordered by water on three sides: the Black Sea to the east and branches of the Mediterranean Sea to the south and west (including the Adriatic, Ionian, Aegean and Marmara seas) Despite its current, somewhat sinister connotations, the word Balkan probably comes from a Turkish term meaning, simply, wooded mountains. The Balkan Peninsula has always been a crossroads of cultures. The Illyrians, Greeks, Celts, and Romans had settlements here before the Slavs moved into the region from the north around the seventh century what we're going to talk about in this video are the origins of the Russian people and in particular we're going to talk about the Eastern Slavs who not just modern Russians but also Ukrainians and Belarusian x' view as their ancestors so let's think about the world in the ninth century the early ninth century we see the reign of Charlemagne that we talk about in some depth in other videos as. Alexis P. Vlasto in The Entry of the Slavs into Christendom: An Introduction to the Medieval History of the Slavs (1970) considered that in course of time both Croats and Serbs became the political nuclei of larger areas in the Balkans, dissolving into the mass of Slav tribes already settled in those parts but imposing their own names, while John Van Antwerp Fine Jr. in The Early Medieval.
• Montera bindningar Stadium.
• Sortera månader i Pivot.
• Verksamhetscontroller arbetsuppgifter.
• Indiansmycken stockholm.
• Brownian motion finance.
• B5 S4 K04 turbo Kit.
• Leave swords with trolls Witcher 3.
• Apowersoft Free Online screen Recorder.
• Büro Jobs Traunstein.
• Ta bort bildskärm Windows 10.
• Barbiedockor 1960 talet värde.
• Age of trees.
• Kanin Karlstad.
• Neue Begriffe BTHG.
• VHS köpa.
• Zu viel schreiben vor erstem Date.
• Klotrobinia Höst.
• Geschäftsidee Natur.
• Italienska matbord.
• Hur många sidoytor har ett prisma som har en femhörning som basyta.
• Fotboll skador statistik.
• Skjorta baby.
• Fiskspett med räkor.
• Osann synonym.
• Citat arbete.
• Leonhardi bad tölz parken.
• Amazon Kreditkarte.
• Vortex skill gem.
• Kärlek på lasarett ackord.
• Who called me UK.
• Lunch LiU.
• MTB Hotel.
• Kungliga Operan bar.
• Vorstellungsgespräch warum Lidl.
• Tanz im Kurpark Bad Kreuznach.
• Diabetes insipidus INTERNETMEDICIN.
• Rosamund Pike family.
• Marsha Hunt 2019.
• Similan Islands private tour.
• Svenska klassiker film.
• Regeringens viktigaste proposition.
|
Archive for March, 2011
S04E18: The Prestidigitation Approximation
March 13, 2011
This week, Sheldon could not figure out Howard’s card trick using math. But that was fiction. Playing cards and mathematics go hand in hand. In real life, Sheldon’s analysis may well have worked.
How many ways are there to shuffle a deck of cards? This question is a classic example of a branch of mathematics called combinatorics. The first card can be any, or 1 of 52 possibilities. The second card is more constrained because one card has already been chosen. So it has 1 of 51 possibilities. Now suppose you are asking what is the number of ways the first card is what it is AND that the second card is what it is. In this case AND means multiply the possibilities, so there are 52*51=2,652 different ways to shuffle the first two cards.
Calculating for the rest of the deck is, the combinations are just 52*51*50*40*….*1. The last card has no choice given that it is the only card left so is a factor of “1”. Mathematicians have a shorthand for this result called 52!, or 52 factorial. It is a number so large that even typing it into google won’t give all the digits, even though it is far less than a googol. Instead you can find it on Sheldon’s board:
The number on Sheldon’s board. The number of ways to shuffle a deck of playing cards.
(The last 12 zeroes are not an approximation. There are five tens in between 1 and 52. And the five multiples of 5 always find a multiple of 2 to give another five factors of ten. Since 25 and 50 contribute two extra factors of 5 that find factors of 2, that is why there are 12 zeroes at the end.)
More compactly, this is 8*1067. Or in plain English, the number is “80 unvigintillion”. The British have a different word for it, “80 undecillion” but they don’t even get “a billion” right. The Brits traditionally call a “trillion” a “billion” because they skip over “billion” as a “thousand million”. Since they don’t call a million a “thousand thousand”, consistency is apparently not their strong suit.
(To be fair, the UK switched from this so-called “long-scale” naming convention to the “short scale” one used by the US and others in 1974, but the long scale persists in some countries. And to think they scoff at Americans for not using the metric system.)
In any language it is still a large number. Even if every one of the 7 billion men, women, and children on Earth played one billion card games every year for a billion years, they would not even make a dent in the number of possible shuffled decks of cards.
We may well ask a different question. Has there likely ever been two games played from the same shuffled deck? That is a different exercise in combinatorics. The chance is much higher. The answer is not just the number of games ever played divided by that big number. An example of this effect is the classic question: “What is the chance that in a room of 23 people, two have the same birthday?” You might naively guess 23/365 or 6%. But it turns out to be greater than a 50% chance. Among 57 people, there is a 99% chance that two have the same birthday. Since twins sometimes hang out together and other correlations may be found, the real chance is much higher, but we are assuming everyone’s birthday in the room is independent.
If a 5o% chance seems surprisingly large for one pair among 23 people to have the same birthday, remember we haven’t chosen which day. We are not asking the chance they have your birthday or Britney’s birthday, but that any pair has the same birthday, no matter what day. Luckily, the same question can be asked a more illuminating, way: What is the probability that nobody in the group has the same birthday as each another? If there is 50% chance that none have the same birthday, then there is a 50% some pair does.
Phrased the second way, the odds are more easily calculated. The first person has a no chance of matching on his own with anyone else. The second still has 364 out of 365 chances of not matching. The third has 363 chances in 365. And so on. Multiplying these 23 factors:
(365/365)* (364/365)* (363/365)* (362/365)* (361/365)* (360/365)* (359/365)* (358/365)* (357/365)* (356/365)* (355/365)* (354/365)* (353/365)* (352/365)* (351/365)* (350/365)* (349/365)* (348/365)* (347/365)* (346/365)* (345/365)* (344/365)* (343/365)
= 0.49
That is a 49% chance no pair has the same birthday. And hence, 51% do.
(The occasional presence of February 29, would not change our result much and I ignored the five million people born on that day.)
So back to our problem of what is the chance that no two card games have ever started with the same deck. I’ll start with assumption that every deck was well enough shuffled that they were all independent. Given the number of drunk poker players and the fact that every purchased new deck starts out the same, I know this is a poor assumption. Repeating the birthday calculation for decks of cards — using the big number above — is left for an exercise for the comments.
Martin Gardner wrote an article every month about “recreational mathematics” (Yes, there is such a thing) for the popular magazine Scientific American. Mathematics of card tricks was an expertise of Gardner, just as Sheldon was reckoning on the white boards. Many tricks were published in his 1956 book Mathematics, Magic and Mystery. Here’s one of Martin Gardner’s simpler card tricks based on mathematics that you can now use to amaze and entertain your friends for hours.
Martin Garnder wrote extensively about recreational mathematics, including the mathematics of card tricks. (photo: Colm Mulcahy in the New York Times)
Start with The Cyclic Number trick, which Gardner attributes to Mr. Lloyd Jones of Oakland California (1942). Give your spectator five red cards: 2, 3, 4, 5, and 6. Keep for yourself six black cards: A, 4, 2,8, 5, 7. The magician deals out his cards in a row and has his spectator write down the number: 142857. The player picks one of his cards, say 5, and multiplies the two on a sheet of paper giving in this case 714285. The magician picks up his cards, gives a quick cut and lo and behold, deals out the six cards in order corresponding to the spectator’s multiplication: 714285.
The trick rests on the fact that the number 142857 is cyclic. Multiply it by any number and the result will be the same numbers, in the same order. What else would you expect the reciprocal of a prime number, in this case seven, to do? Math (and a little dexterity faking the cuts and shuffles) is all you need.
Using the mathematical structure of a deck (4 suits, 13 types of cards) leads to a variety of more complex games, including modular arithmetic which was the reason for “mod 4” and “mod 13” on the boards. Pick up Gardner’s book and enjoy.
Sorry this blog post is late because I never did figure out the math behind Howard’s trick.
%d bloggers like this:
|
The Real and the Virtual in the Post-Coronavirus World
Perhaps this is the beginning of another era, where we are well and truly inside the machine.
Ever since human beings stopped being nomadic and settled down in towns and cities, the idea of travel has been associated with adventure, discovery and newness. Even as people and communities developed their sense of belonging by growing roots, the feeling of belonging to a land or culture existed because of the difference and diversity that marked human communities even within the radius of a few kilometres.
Travel allowed one to encounter difference, sometimes in order to discover the self. Indeed, the idea of walking as an integral method of acquiring knowledge and wisdom is germane to our imagination of monks, poets and saints, the bhikshuks, who owned little enough to be able to carry their homes in their hands.
By the 15th century, the technology of travel had advanced enough, along with cartographic and astronomic sciences, for human beings to attempt unchartered explorations into distant lands. These voyages often resulted in encounters between vastly different peoples, languages, food, rituals, practices, religions and world-views. Sometimes they led to colonisation, and violent oppression of the knowledge-systems, ideologies and customs of those who were native to the land.
As advancements in science and technology began to eliminate the uncertainty of long-distance travel, journeys began to be marked by an agenda. The very thought of travel, or undertaking a journey came to require a reason, and it was left to the lot of the vagabonds, the mystics, and the fakirs to journey without a goal.
By the early 20th century, the transition to functioning as modern societies was almost complete, and human beings had become reasonably accustomed to a modern sense of time and movement. By the end of the 19th century, on November 1, 1884, to be precise, Greenwich Mean Time (GMT) had been universally adopted at the International Meridian Conference in Washington, dividing the world into 24 synchronised time zones. The primary reason for this was, of course, to do with travel: in order to avoid accidents and prevent trains from colliding into each other, all clocks had to be perfectly synchronised.
Also read: The Coronavirus Has Rendered the Everyday Injustice of Our Times Dramatic
If the 19th century was preoccupied with the taming of chaos – the establishment of rules and codes to absorb the ‘shocks of modern life’ – the 20th century stood for a spectacular failure of any attempt to do so. Georg Simmel, Siegfried Kracaur and Walter Benjamin, insightful observers of the modern experience in early 20th century Germany, propose that there is a neurological concept of modernity which they describe as a fundamentally different register of subjective experience. They suggest that the modern experience is characterised by the physical and perceptual shocks of the urban environment, a hyper stimulus. The experience is, as visual theorist Ben Singer tells us, “indicative of the radical increase in nervous stimulation and bodily peril experienced in modern societies”.
Hungarian filmmaker Bela Balaz believed that film draws upon the grammar of urban order and chaos in constructing its own language and form. For the first time in human history, recording technologies like the gramophone, photography and cinema, made it possible to exist within a disembodied time and space. Through such recorded sounds and images, one could be transported to another time, another place.
Walter Benjamin suggests that the mechanical or technological intervention into possibilities of human perception, of the relationship between ‘reality’ and representation, hurtle the technologically reproduced image into the realm of politics, making it democratic, accessible, and commonplace. The 20th century cinematic image, in particular, made virtual travel possible for anyone who could afford to buy a movie ticket.
As filmmakers and documentarists experimented with camera and sound technology in the late 19th and early 20th centuries, much of the grammar of cinematic language began to fall into place, often by way of sheer accident. The now-famous account of how a cinematographer’s lodged crank led to the discovery of the possibility of alternative constructions of the experience of time and space, has resulted in the magical time-travel that editors can put spectators through.
The fundamental aspect of projecting film at the speed of 24 frames per second – although a convention which like much else in cinema, got established through a combination of factors, in which chance played the upper hand – draws currency from the standard speed of narrow gauge trains, whose moving window frames animated the world outside at a speed that the human mind could make sense of. Perhaps the possibility of visuality is rooted in the premise of mobility.
Also read: The Coronavirus Crisis Demands Everyone Act Responsibly. So What Happened to the Media?
In Benjamin’s Paris Arcades Project, people walked around, looking at shop-window displays with desiring eyes held in abeyance by resisting purse-strings. In the Punjabi language, gedi’ describes the upper-class practice of going for a car drive – usually with windows rolled down, blasting loud music – with the express (visual) objective of ‘checking out’ young girls and boys. The Romantic poets in industrial England cultivated the discipline of going on long walks, as a method of subjecting themselves to the inspirational and creative visions of nature.
Varieties of mobility, therefore, generate different ways of seeing. Mechanical technologies of the image replace the unfiltered mental images of human vision with recorded and projected images, a double illusion, that has often been explained through theories of psychoanalysis. The virtually unattainable screen image, that elusive object of desire, can perhaps only be possessed by eliminating the distance between the spectator and the image they behold.
Technologies such as Virtual Reality – which initially were made popular as 3D films, adding a third dimension of depth to an otherwise flat image – are relentlessly attempting to translocate the human spectator into the world of images, and simultaneously to give a corporeal dimension to immaterial images by introducing smell and other tactile and sensory aspects of the kind one might experience in a 4-7 D film screening. The push of these new technological tendencies is towards what Scott Bukatman calls ‘terminal identity’, where the merging of humans with technological machines becomes more and more complete. All mobility, in such cases, is virtual, is stationary.
Donna Haraway’s The Cyborg Manifesto makes a lengthy argument about the possibility of the cyborg as a gender-neutral, and therefore gender-equitable mode of existence. The now iconic image of Haraway’s book cover – with a woman of colour at the end of her computer terminal, fingers spread out over a keyboard sitting comfortably amidst sand dunes and pyramids, while a large white feline rests its face over her head, paws draped around her shoulders in comfortable companionship – might seem uncannily like the post-coronavirus world many of us inhabit.
Shifting all modes of work ‘online’, we have been ushered into existing as digital beings, cyborgs, with almost no warning. The lockdown on individual mobility in many countries across the world, has left us with little option but to learn to restrict our movements.
Also read: We Are Fighting an Infodemic in the Time of ‘Coronoia’
Those who are in positions of privilege have the comfort of their homes, technological devices, and a steady supply of food to tide them through this challenging time. The thousands of migrant workers, daily wage labourers, homeless persons, nomadic communities in make-shift ‘homes’, circus artists, and others for whom mobility has been a constant, find themselves in inhuman situations, surrounded by fear and resentment.
Perhaps the cyborg is a death-wish staring at us. Perhaps this is the beginning of another era, where we are well and truly inside the machine; the ghost in the machine was the joke that might have back-fired upon us. The physical immobility being imposed on us is bound to have repercussions on the scopic regimes of our times.
We are already getting used to interacting with our colleagues, students and co-workers as tiny thumbnails on a flat screen, in virtual meeting rooms and classrooms. The only travel one might be able to do now will be that which the camera or digital technology permits. Our realities might become an entirely technologically constructed hyper-reality. We may exist in what Jean Baudrillard called a simulacrum. Bodies engulfed within images, limbs bound by images, buried, like Anarkali that symbol of doomed love, within image-walls whose rubble thickens around us.
Perhaps, it is a second life.
Rashmi Sawhney is a cultural theorist based in Bangalore.
|
Skip to main content
CRISPR 101 eBook CTA
CRISPR Overview
Generating a Knockout Using CRISPR
CRISPR Knockout Diagram
You can use CRISPR to generate knockout cells or animals by co-expressing an endonuclease like Cas9 or Cas12a (also known as Cpf1) and a gRNA specific to the targeted gene. The genomic target can be any ∼20 nucleotide DNA sequence, provided it meets two conditions:
Cas9 undergoes a second conformational change upon target binding that positions the nuclease domains, called RuvC and HNH, to cleave opposite strands of the target DNA. The end result of Cas9-mediated DNA cleavage is a double-strand break (DSB) within the target DNA (∼3-4 nucleotides upstream of the PAM sequence).
Browse Plasmids: Double-Strand Break (Cut)
Enhancing Specificity with Nickases and High Fidelity Enzymes
Diagram of CRISPR knockout via nickase
CRISPR specificity is partially determined by how specific the gRNA targeting sequence is for the genomic target compared to the rest of the genome. Ideally, a gRNA targeting sequence will have perfect homology to the target DNA with no homology elsewhere in the genome. Realistically however, a given gRNA targeting sequence will have additional sites throughout the genome where partial homology exists. These sites are called off-targets and need to be considered when designing a gRNA for your experiment (see Plan Your Experiment below).
Thus, two nickases targeting opposite DNA strands are required to generate a DSB within the target DNA. This requirement for a double nick or dual nickase CRISPR system dramatically increases target specificity, since it’s unlikely that two off-target nicks will be generated close enough to cause a DSB. If high specificity is crucial to your experiment, you might consider using the dual nickase approach to create a double nick-induced DSB. The nickase system can also be combined with HDR-mediated gene editing for specific gene edits.
In 2015, researchers used rational mutagenesis to develop two high fidelity Cas9's: eSpCas9(1.1) and SpCas9-HF1. eSpCas9(1.1) contains alanine substitutions that weaken the interactions between the HNH/RuvC groove and the non-target DNA strand, preventing strand separation and cutting at off-target sites. Similarly, SpCas9-HF1 lowers off-target editing through alanine substitutions that disrupt Cas9's interactions with the DNA phosphate backbone. Another high fidelity Cas9, HypaCas9, was developed in 2017 and contains mutations in the REC3 domain that increase Cas9 proofreading and target discrimination. All three high fidelity enzymes generate less off-target editing than wild type Cas9.
Since then, another generation of high fidelity enzymes have been engineered using cell-based selection approaches. Yeast-based screening systems resulted in evolved Cas9 (evoCas9), which has four mutations in the REC3 domain. evoCas9 has less off-target activity than SpCas9-HF1 or eSpCas9(1.1). Phage-assisted continuous evolution (PACE) methods resulted in xCas9 3.7 which has 7 mutations found in the REC2, REC3, and PAM interacting domains and allows for expanded PAM recognition as well as increased specificity and lower off-target activity. By screening E. coli cells transformed with a pooled library of SpCas9 variants, researchers identified Sniper-Cas, which has less off-target activity than wild type Cas9 and is compatible with truncated gRNAs for increased specificity.
Browse Plasmids: Single-Strand Break (Nick) , Double-Strand Break (Cut)
Making Precise Modifications Using Homology Directed Repair (HDR)
While NHEJ-mediated DSB repair often disrupts the open reading frame of the gene, homology directed repair (HDR) can generate specific nucleotide changes ranging from a single nucleotide change to large insertions like the addition of a fluorophore or tag.
CRISPR diagram of homology directed repair or HDR
Depending on the application, the repair template may be a single-stranded oligonucleotide, double-stranded oligonucleotide, or a double-stranded DNA plasmid. When designing the repair template, do not include the PAM sequence present in the genomic DNA. This step prevents the repair template from being a suitable target for Cas9 cleavage. For example, you could alter the PAM sequence in your HDR template with a silent mutation that does not change the amino acid sequence.
The efficiency of HDR is generally low (<10% of modified alleles). For this reason, many laboratories try to enhance HDR by synchronizing the cells, since HDR takes place during the S and G2 phases of the cell cycle. Chemically or genetically inhibiting genes involved in NHEJ may also increase HDR frequency. Additionally, Cas9-CtIP, a fusion of Cas9 and CtIP, a protein involved in double-stranded break resection, can contribute to increased HDR efficiency.
Browse Plasmids: Endogenous Tagging
CRISPR Base Editing Without Double-Strand Breaks
To overcome low HDR efficiency, researchers have developed two classes of base editors--cytosine base editors (CBEs) and adenine base editors (ABEs).
Cytosine base editors are created by fusing Cas9 nickase or catalytically inactive “dead” Cas9 (dCas9) to a cytidine deaminase like APOBEC. Base editors are targeted to a specific locus by a gRNA, and they can convert cytidine to uridine within a small editing window near the PAM site. Uridine is subsequently converted to thymidine through base excision repair, creating a C to T change (or a G to A on the opposite strand.)
Likewise, adenosine base editors have been engineered to convert adenosine to inosine, which is treated like guanosine by the cell, creating an A to G (or T to C) change. Adenine DNA deaminases do not exist in nature, but have been created by directed evolution of the Escherichia coli TadA, a tRNA adenine deaminase. Like cytosine base editors, the evolved TadA domain is fused to a Cas9 protein to create the adenine base editor.
Both types of base editors are available with multiple Cas9 variants including high fidelity Cas9’s. Further advancements have been made by optimizing expression of the fusions, modifying the linker region between Cas variant and deaminase to adjust the editing window, or adding fusions that increase product purity such as the DNA glycosylase inhibitor (UGI) or the bacteriophage Mu- derived Gam protein (Mu- GAM).
While many base editors are designed to work in a very narrow window proximal to the PAM sequence, some base editing systems create a wide spectrum of single-nucleotide variants (somatic hypermutation) in a wider editing window, and are thus well suited to directed evolution applications. Examples of these base editing systems include targeted AID-mediated mutagenesis (TAM) and CRISPR-X, in which Cas9 is fused to activation-induced cytidine deaminase (AID).
Browse Plasmids: Base Edit
Other CRISPR systems, specifically the Type VI CRISPR enzymes Cas13a/C2c2 and Cas13b, target RNA rather than DNA. Fusing a hyperactive adenosine deaminase that acts on RNA, ADAR2(E488Q), to catalytically dead Cas13b creates a programmable RNA base editor that converts adenosine to inosine in RNA (termed REPAIR). Since inosine is functionally equivalent to guanosine, the result is an A->G change in RNA. The catalytically inactive Cas13b ortholog from Prevotella sp., dPspCas13b, does not appear to require a specific sequence adjacent to the RNA target, making this a very flexible editing system. Editors based on a second ADAR variant, ADAR2(E488Q/T375G), display improved specificity, and editors carrying the delta-984-1090 ADAR truncation retain RNA editing capabilities and are small enough to be packaged in AAV particles.
Browse Plasmids: RNA Editing
Activation or Repression of Target Genes Using CRISPR
Diagram of CRISPR activation or repression
Early experiments demonstrated that targeting dCas9 to transcription start sites was sufficient to repress transcription by blocking initiation. dCas9 can also be fused with transcriptional repressors or activators, and targeting these dCas9 fusion proteins to the promoter region results in robust transcriptional repression (CRISPR interference, or CRISPRi) or activation (CRISPRa) of downstream target genes. The simplest dCas9-based activators and repressors consist of dCas9 fused directly to a single transcriptional activator (e.g. VP64) or repressor (e.g. KRAB; see panel A to the right).
Additionally, more elaborate activation strategies have been developed for more potent activation of target genes in mammalian cells. These include: co-expression of epitope-tagged dCas9 and antibody-activator effector proteins (e.g. SunTag system , panel B); dCas9 fused to several different activation domains in series (e.g. dCas9-VPR, panel C); or co-expression of dCas9-VP64 with a modified scaffold gRNA and additional RNA-binding helper activators (e.g. SAM activators, panel D). Importantly, unlike the genome modifications induced by Cas9 or Cas9 nickase, dCas9-mediated gene activation or repression is reversible, since it does not permanently modify the genomic DNA. dCas9 has also been used for genome-wide screens to activate or repress gene expression in mice and human cells.
In the bacterial realm, activating gene expression is more difficult because of the absence of effective gene activators when fused with molecular DNA binding domains such as dCas9. Recently, synthetic CRISPR-Cas gene activators have been developed for bacteria by using a scaffold RNA that contains the gRNA and an RNA hairpin to recruit activation proteins.
CRISPRi has also been adapted for diverse bacterial species using a modular system called Mobile-CRISPRi. In this system, CRISPRi is introduced into bacteria using conjugation and stably integrated into the chromosome.
Browse Plasmids: Activate, Repress/Interfere
Epigenetic Modifications Using CRISPR
Inactive Cas enzymes can be fused to epigenetic modifiers like p300, LSD1, MQ1, and TET1 to create programmable epigenome-engineering tools. These tools alter gene expression without inducing double-strand breaks by modifying the methylation state of cytosines in a gene’s promoter or by inducing histone acetylation or demethylation. CRISPR epigenetic tools are specific for particular chromatin and DNA modifications, allowing researchers to isolate the effects of a single epigenetic mark.
Browse Plasmids: Epigenetics
Multiplex Genome Engineering with CRISPR
• Modifying multiple genes at once
Current multiplex CRISPR systems enable researchers to target anywhere from 2 to 7 genetic loci by cloning multiple gRNAs into a single plasmid. These multiplex gRNA vectors can conceivably be combined with any of the aforementioned CRISPR derivatives to knock out, activate, or repress target genes. Read more about Cas9 multiplexing and Cas12a (Cpf1) multiplexing.
Browse Plasmids: Multiplex gRNA vectors
Genome-Wide Screens Using CRISPR
The ease of gRNA design and synthesis, as well as the ability to target almost any genomic locus, make CRISPR the ideal genome engineering system for large-scale forward genetic screening. Forward genetic screens are particularly useful for studying diseases or phenotypes for which the underlying genetic cause is not known. In general, the goal of a genetic screen is to generate a large population of cells with mutations in, or activation/repression of, a wide variety of genes and then use these cells to identify the genetic perturbations that result in a desired phenotype.
What are pooled lentiviral CRISPR libraries?
Each CRISPR library is different, as libraries can target anywhere from a single class of genes to every gene in the genome. However, there are several features that are common across most CRISPR libraries. First, each library typically contains ∼3-6 gRNAs per gene to ensure modification of every target gene, so CRISPR libraries contain thousands of unique gRNAs targeting a wide variety of genes. gRNA design for CRISPR libraries is usually optimized to select for gRNAs with high on-target activity and low off-target activity, and libraries may use different algorithms for gRNA design.
Although lentiviral libraries containing Cas9 are the most popular method for CRISPR screening, they are not suitable for all cell types or experiments. Mammalian CRISPR libraries have also been created in AAV backbones for in vivo experiments and in a retroviral backbone for delivery to cells that are poorly transduced by lentivirus. Non-mammalian CRISPR libraries are also available. Additionally, although CRISPR has been less widely used in bacteria due to technical challenges, several bacterial CRISPR libraries have been developed for inhibition using dCas9.
How do you use a CRISPR library?
In the case of DNA libraries, the CRISPR library will be shipped at a concentration that is too low to be used in experiments. Thus, the first step in using your library is to amplify the library (panel C) to increase the total amount of DNA using the protocol specified by the depositing lab. When amplifying the library, it is important to maintain good representation of gRNAs so that the composition of your amplified library matches that of the original library. You'll use next-generation sequencing (NGS) to verify that this is the case. Learn more about library verification.
What can screens tell you?
Browse Libraries: CRISPR Pooled Libraries
Visualize Genomic Loci Using Fluorophores
Multicolor CRISPR imaging allows for simultaneous tracking of multiple genomic loci in living cells. One method uses orthogonal dCas9’s (e.g., S. pyogenes dCas9 and S. aureus dCas9) tagged with different fluorescent proteins. Another method uses gRNAs fused to orthogonal protein-interacting RNA aptamers, which recruit specific orthogonal RBPs tagged with different fluorescent proteins, (CRISPRainbow kit). It has been shown that gRNAs carrying 8 aptamers (CRISPR-Sirius), provide a better stability and enable a signal amplification for better imaging of genomic loci.
Browse Plasmids: Visualize
Purify Genomic Regions Using dCas9
After purification of the locus, molecules associated with the locus can be identified by mass spectrometry (proteins), RNA-sequencing (RNAs), and NGS (other genomic regions). Compared to conventional methods for genomic purification, CRISPR-based purification methods are more straightforward and enable direct identification of molecules associated with a genomic region of interest in vivo.
Browse Plasmids: Purify
RNA Targeting
Type VI CRISPR enzymes such as Cas13 recognize ssRNA rather than dsDNA. Many of these enzymes also have the ability to process crRNA precursors to mature crRNAs. Upon ssRNA recognition by the crRNA, the target RNA is degraded. In bacteria, Cas13 enzymes can also cleave RNAs non-specifically after the initial crRNA-guided cleavage. This promiscuous cleavage activity slows bacterial cell growth and may further protect bacteria from viral pathogens. Based on this feature, a Cas13a-based molecular detection platform, termed SHERLOCK, has been used to differentiate strains of Zika virus, genotype human DNA, and identify tumor mutations within cell-free genomic DNA. This non-specific cleavage does not occur in mammalian cells. Similar to Cas9 and Cas12 , Cas13 can be converted to an RNA-binding protein through mutation of its catalytic domain. Fusions to catalytically inactive Cas13 can be used to modulate RNA editing, for in vivo RNA imaging, or to control alternative splicing. Learn more about Cas13a or Cas13d.
Browse Plasmids: RNA Targeting
Cas9 Alternatives for CRISPR Genome Engineering
To address these limitations, researchers have engineered SpCas9 enzymes with altered PAM specificities using a variety of approaches including phage-assisted evolution and directed mutagenesis. This resulted in the development of several SpCas9-derived variants with non-NGG PAM sequences. Another Cas9 alternative is xCas9, which targets a broad set of PAM sequences, such as NG, GAA, and GAT, while also displaying minimal off-target activity. SpCas9-NG, a variant that recognizes the NG PAM, has increased activity in vitro relative to other Cas9 endonucleases. Read more about Cas9 variants.
Additional Cas9 orthologs from various species bind a variety of PAM sequences. These enzymes may have other characteristics that make them more useful than SpCas9 for specific applications. For example, the relatively large size of SpCas9 (∼4 kb coding sequence) means that plasmids carrying the SpCas9 cDNA cannot be efficiently packaged into adeno-associated virus (AAV). Since the coding sequence for Staphylococcus aureus Cas9 (SaCas9) is ∼1 kb shorter than SpCas9, SaCas9 can be efficiently packaged into AAV. Similar to SpCas9, the SaCas9 endonuclease is capable of modifying target genes in mammalian cells in vitro and in mice in vivo.
Another limitation of SpCas9 is the low efficiency of making specific genetic edits via HDR. For specific point edits, CRISPR base editing is a useful alternative to HDR. For larger edits, Cas12a (Cpf1) may be a better option. Unlike Cas9 nucleases, which create blunt DSBs, Cas12a-mediated DNA cleavage creates DSBs with a short 3′ overhang. Cas12a’s staggered cleavage pattern opens up the possibility of directional gene transfer, analogous to traditional restriction enzyme cloning, which may increase the efficiency of gene editing. Like the Cas9 variants and orthologs described above, Cas12a also expands the range of sites that can be targeted by CRISPR to AT-rich regions or AT-rich genomes that lack the NGG PAM sites favored by SpCas9. Similar to Cas9, Cas12a has also been engineered to recognize different PAM variants.
In order to limit off-target effects of CRISPR-Cas9, researchers use a class of small proteins called Acr (Anti-CRISPR) proteins to control CRISPR activity. Acr proteins are found in phages that have evolved ways to overcome the endogenous CRISPR systems used by various bacteria and archaea to protect against invading nucleic acids, such as phage genomes. Because of this diversity, Acr family members inhibit CRISPR by a variety of mechanisms. Some Acr proteins interfere with DNA binding at the PAM site whereas others interfere with the Cas9 HNH endonuclease domain. Furthermore, Acr proteins can be specific for a particular Cas9 species or can inhibit CRISPR enzymes across multiple bacterial species. For example, AcrIIA2 and AcrIIA4 isolated from Listeria monocytogenes can inhibit CRISPR activity of both LmoCas9 and SpCas9.
Acr proteins are a great way to control when genome editing can happen. For example, Dominik Niopek’s lab developed a way to optogenetically control genome editing by fusing the anti-CRISPR protein AcrIIA4 with the photo-sensitive LOV2 domain. This allows researchers to switch genome editing on and off using light.
Browse Plasmids: Anti-CRISPR
Plan Your CRISPR Experiment
Get Started
• Increase or decrease expression of a target gene?
Select Your Desired Genetic Manipulation
Genetic Manipulation Application Cas9 gRNA Additional Considerations
Select Expression System
• Species of Cas enzyme and gRNA
• Presence of a selectable marker (drug or fluorophore)
• Delivery method
Expression System Components of System Application
Mammalian expression vector
Lentiviral transduction
• Useful for difficult to transfect cell types, can also be used in vivo
• A common choice for conducting genome-wide screens using CRISPR
AAV transduction
• Transient or stable expression of SaCas9 and/or gRNA
• Infects dividing and non-dividing cells
• AAV is the least toxic method for in vivo viral delivery
• Transient expression of CRISPR components
• Expression decreases as RNA is degraded within the cell
• Can be used to generate transgenic embryos
• Transient expression of CRISPR components
• Short window of CRISPR activity may decrease off-target effects
Additional Resources:
Select Your Target Sequence and Design Your gRNA
grna design process diagram
1. Know your cell line/organism and genomic sequence
2. Select gene and genetic element to be manipulated
Browse Plasmids: gRNAs
4. Synthesize and clone desired gRNAs
5. Deliver Cas9 and gRNA
6. Validate genetic modification
Addgene Website & Blog References
Cas Enzymes and PAM Sequences
Species/Variant of Cas9 PAM Sequence*
Streptococcus pyogenes (SP); SpCas9 3' NGG
SpCas9 D1135E variant 3' NGG (reduced NAG binding)
SpCas9 VRER variant 3' NGCG
SpCas9 EQR variant 3' NGAG
SpCas9 VQR variant 3' NGAN or NGNG
xCas9 3' NG, GAA, or GAT
SpCas9-NG 3' NG
AsCpf1 RR variant 5' TYCV
LbCpf1 RR variant 5' TYCV
AsCpf1 RVR variant 5' TATV
Campylobacter jejuni (CJ) 3' NNNNRYAC
Neisseria meningitidis (NM) 3' NNNNGATT
Streptococcus thermophilus (ST) 3' NNAGAAW
Treponema denticola (TD) 3' NAAAAC
Additional Cas9s from various species PAM sequence may not be characterized
*In the table above, 3' and 5' indicate on which end of targeted sequence the PAM is located. The majority of the CRISPR plasmids in Addgene’s collection are from S. pyogenes unless otherwise noted.
Term Definition
Base editor Fusion of a Cas protein to a deaminase that enables direct base conversion in RNA or DNA without a DNA double-strand break
Cas CRISPR Associated Protein, includes nucleases like Cas9 and Cas12a (also known as Cpf1)
gRNA scaffold sequence The sequence within the gRNA that is responsible for Cas9 binding, it does not include the 20 bp spacer/targeting sequence that is used to guide Cas9 to target DNA
Nick A break in only one strand of dsDNA
Target locus Genomic target of the gRNA. The sequence includes the unique ~20 bp target specified by the gRNA plus the genomic PAM sequence
• Enabling genetic analysis of diverse bacteria with Mobile-CRISPRi. 2019. Peters JM, Koo BM, Patino R, Heussler GE, Hearne CC, Qu J, Inclan YF, Hawkins JS, Lu CHS, Silvis MR, Harden MM, Osadnik H, Peters JE, Engel JN, Dutton RJ, Grossman AD, Gross CA, Rosenberg OS. Nat Microbiol. Feb;4(2):244-250. PMID: 30617347
• A highly specific SpCas9 variant is identified by in vivo screening in yeast. 2018. Casini A, Olivieri M, Petris G, Montagna C, Reginato G, Maule G, Lorenzin F, Prandi D, Romanel A, Demichelis F, Inga A, Cereseto A. Nat Biotechnol. Mar;36(3):265-271. PMID: 29431739
• Base editing: precision chemistry on the genome and transcriptome of living cells. 2018. Rees HA, Liu DR. Nat Rev Genet.. Dec;19(12):770-788. PMID: 30323312
• CRISPR base editors: genome editing without double-stranded breaks. 2018. Eid A, Alshareef S, Mahfouz MM. Biochem J. Jun 11;475(11):1955-1964. PMID: 29891532
• CRISPR-Based Technologies: Impact of RNA-Targeting Systems. 2018. Terns MP. Mol Cell. Nov 1;72(3):404-412. PMID: 30388409
• CRISPR-Sirius: RNA scaffolds for signal amplification in genome imaging.. 2018. Ma H, Tu LC, Naseri A, Chung YC, Grunwald D, Zhang S, Pederson T.. Nat Methods. Nov;15(11):928-931. PMID: 30377374
• CtIP fusion to Cas9 enhances transgene integration by homology-dependent repair. 2018. Charpentier M, Khedher AHY, Menoret S, Brion A, Lamribet K, Dardillac E, Boix C, Perrouault L, Tesson L, Geny S, De Cian A, Itier JM, Anegon I, Lopez B, Giovannangeli C, Concordet JP. Nat Commun. Mar 19;9(1):1133. PMID: 29556040
• Directed evolution of CRISPR-Cas9 to increase its specificity. 2018. Lee JK, Jeong E, Lee J, Jung M, Shin E, Kim YH, Lee K, Jung I, Kim D, Kim S, Kim JS. Nat Commun. Aug 6;9(1):3048. PMID: 30082838
• Engineered anti-CRISPR proteins for optogenetic control of CRISPR-Cas9. 2018. Bubeck F, Hoffmann MD, Harteveld Z, Aschenbrenner S, Bietz A, Waldhauer MC, Börner K, Fakhiri J, Schmelas C, Dietz L, Grimm D, Correia BE, Eils R, Niopek D. Nat Methods. Nov;15(11):924-927. PMID: 30377362
• Engineered CRISPR-Cas9 nuclease with expanded targeting space. 2018. Nishimasu H, Shi X, Ishiguro S, Gao L, Hirano S, Okazaki S, Noda T, Abudayyeh OO, Gootenberg JS, Mori H, Oura S, Holmes B, Tanaka M, Seki M, Hirano H, Aburatani H, Ishitani R, Ikawa M, Yachie N, Zhang F, Nureki O. Science. Sep 21;361(6408):1259-1262. PMID: 30166441
• Evolved Cas9 variants with broad PAM compatibility and high DNA specificity.. 2018. Hu JH, Miller SM, Geurts MH, Tang W, Chen L, Sun N, Zeina CM, Gao X, Rees HA, Lin Z, Liu DR. Nature. Apr 5;556(7699):57-63. PMID: 29512652
• Genome-wide CRISPR-dCas9 screens in E. coli identify essential genes and phage host factors. 2018. Rousset F, Cui L, Siouve E, Becavin C, Depardieu F, Bikard D. PLoS Genet. Nov 7;14(11):e1007749. PMID: 30403660
• Optimized libraries for CRISPR-Cas9 genetic screens with multiple modalities. 2018. Sanson KR, Hanna RE, Hegde M, Donovan KF, Strand C, Sullender ME, Vaimberg EW, Goodale A, Root DE, Piccioni F, Doench JG. Nat Commun. Dec 21;9(1):5416. PMID: 30575746
• Synthetic CRISPR-Cas gene activators for transcriptional reprogramming in bacteria. 2018. Dong C, Fontana J, Patel A, Carothers JM, Zalatan JG. Nat Commun. Jun 27;9(1):2489. PMID: 29950558
• A Broad-Spectrum Inhibitor of CRISPR-Cas9. 2017. Harrington LB, Doxzen KW, Ma E, Liu JJ, Knott GJ, Edraki A, Garcia B, Amrani N, Chen JS, Cofsky JC, Kranzusch PJ, Sontheimer EJ, Davidson AR, Maxwell KL, Doudna JA. Cell. Sep 7;170(6):1224-1233.e15. PMID: 28844692
• In Situ Capture of Chromatin Interactions by Biotinylated dCas9. 2017. Liu X, Zhang Y, Chen Y, Li M, Zhou F, Li K, Cao H, Ni M, Liu Y, Gu Z, Dickerson KE, Xie S, Hon GC, Xuan Z, Zhang MQ, Shao Z, Xu J. Cell. Aug 24;170(5):1028-1043.e19. PMID: 28841410
• Inhibition of CRISPR-Cas9 with Bacteriophage Proteins. 2017. Rauch BJ, Silvis MR, Hultquist JF, Waters CS, McGregor MJ, Krogan NJ, Bondy-Denomy J. Cell. Jan 12;168(1-2):150-158.e10. PMID: 28041849
• RNA editing with CRISPR-Cas13. 2017. Cox DBT, Gootenberg JS, Abudayyeh OO, Franklin B, Kellner MJ, Joung J, Zhang F. Science. 358(6366):1019-1027. PMID: 29070703
• RNA targeting with CRISPR-Cas13. 2017. Abudayyeh OO, Gootenberg JS, Essletzbichler P, Han S, Joung J, Belanto JJ, Verdine V, Cox DBT, Kellner MJ, Regev A, Lander ES, Voytas DF, Ting AY, Zhang F. Nature. 550(7675):280-284. PMID: 28976959
• Multiplexed labeling of genomic loci with dCas9 and engineered sgRNAs using CRISPRainbow. 2016. Ma H, Tu LC, Naseri A, Huisman M, Zhang S, Grunwald D, Pederson T. Nat Biotechnol.May;34(5):528-30. PMID: 27088723
|
New Prehistoric “Hobbit” Creature: One of Three Discoveries Suggesting Rapid Evolution of Mammals After Dinosaur Extinction
Research published today in the peer-reviewed Journal of Systematic Palaeontology describes the discovery of three new species of ancient creatures from the dawn of modern mammals, and hints at rapid evolution immediately after the mass extinction of the dinosaurs.
These prehistoric mammals roamed North America during the earliest Paleocene Epoch, within just a few hundred thousand years of the Cretaceous-Paleogene boundary that wiped out the dinosaurs. Their discovery suggests mammals diversified more rapidly after the mass extinction than previously thought.
New-to-science, the creatures discovered are Miniconus jeanninae, Conacodon hettingeri, and Beornus honeyi. They differ in size – ranging up to a modern house cat, which is much larger than the mostly mouse to rat-sized mammals that lived before it alongside the dinosaurs in North America.
Each have a suite of unique dental features that differ from each other.
Beornus honeyi, in particular has been named in homage to The Hobbit character Beorn, due to the appearance of the inflated (puffy) molars (cheek teeth).
The new group belong to a diverse collection of placental mammals called archaic ungulates (or condylarths), primitive ancestors of today’s hoofed mammals (eg, horses, elephants, cows, hippos).
Paleontologists from the University of Colorado in Boulder unearthed parts of lower jaw bones and teeth – which provide insights into the animals’ identity, lifestyle and body size.
The three new species belong to the family Periptychidae that are distinguished from other ‘condylarths’ by their teeth, which have swollen premolars and unusual vertical enamel ridges. Researchers believe that they may have been omnivores because they evolved teeth that would have allowed them to grind up plants as well as meat, however this does not rule out them being exclusively herbivores.
The mass extinction that wiped out the non-avian dinosaurs 66 million years ago is generally acknowledged as the start of the ‘Age of Mammals’ because several types of mammal appeared for the first time immediately afterwards.
As lead author Madelaine Atteberry from the University of Colorado Geological Sciences Department in the USA explains, “When the dinosaurs went extinct, access to different foods and environments enabled mammals to flourish and diversify rapidly in their tooth anatomy and evolve larger body size. They clearly took advantage of this opportunity, as we can see from the radiation of new mammal species that took place in a relatively short amount of time following the mass extinction.”
Atteberry and co-author Jaelyn Eberle, a curator in the Museum of Natural History and Professor of Geological Sciences at the University of Colorado, studied the teeth and lower jaw bones of 29 fossil ‘condylarth’ species to determine the anatomical differences between the species, and used phylogenetic techniques to understand how the species are related to each other and to other early Paleocene ‘condylarths’ in the western United States.
The evidence supports the discovery of these three new species to science.
About the size of a marmot or house cat, Beornus honeyi was the largest; Conacodon hettingeri is similar to other species of Conacodon, but differs in the morphology of its last molar, while Miniconus jeanninae is similar in size to other small, earliest Paleocene ‘condylarths’, but is distinguished by a tiny cusp on its molars called a parastylid.
More news
Related News
|
Breaking News
These are the benefits of eating Peru
These are the benefits of eating Peru
Peru is a sour-sweet fruit. It grows in tropical and subtropical climates. It is white or red on the inside. Gar is a seed. The taste is sweet. Peru is also the food of many birds. Its classical name is Cedium guava. In English, Peru is called guava. Peru has sattvic qualities and is enlightening.
Eating guava after lunch is extremely helpful. Foods are easily digested due to the presence of Vitamin C in it as well as glucose and tannins. Usually when eating Peru, add sandhav and cumin powder. This removes the phlegmatic and aerobic properties of Peru and does not affect Peru.
Ripe guava can be eaten as a vegetable. Peruvian jam, lettuce, chutney, raita and marmalade can also be made. Since all these foods are delicious, you should eat different types of guava for anorexia, loss of appetite, acidosis.
Peel a squash, grate it and grind it in a mixer. Add rose petals, cardamom, granulated sugar and water and make syrup. Vitamin C is found in large quantities in this syrup, which relieves fatigue and creates excitement and reduces inflammation in the body.
If you are suffering from constipation, you should consume guava for three or four days in a row or eat it as a vegetable.
If you extract the guava leaves and hold it in your mouth for a while, you will get rid of toothache, gingivitis and oral disorders.
As guava leaves are appetizing and receptive, diarrhea can be cured by drinking the leaves. Also, if diarrhea occurs due to frequent diarrhea and constipation in the stomach, then by making a poultice of Peruvian leaves and tying it around the anus, the rectum is removed and the swelling is reduced.
Peruvian leaf extract should be taken for leprosy in women.
Children, pregnant women, weak women, lean people should consume Peru regularly. Due to the presence of Vitamin C and other nutrients in it, the body's immune system is strengthened and the body becomes healthy and strong.
Eat drink be cool...
No comments
If You Like This Post ,Then definitely share it and if you want to write a story ,Please Comments ....
Regards ,
Sachin Bhasare
|
What lessons can be learned from the Fitzgerald disaster?
On Behalf of | Oct 26, 2017 | blog
You may captain a cruise ship, a fishing vessel or a cabin cruiser. If you are an experienced sailor, becoming involved in a collision with another ship or small craft may be the furthest thing from your mind, but as we have recently seen, a collision can indeed occur.
In June 2017, the USS Fitzgerald collided with a cargo ship in the sea off Japan. Seven sailors were killed on the destroyer. The question everyone wants to know is: How could this happen?
A crowded sea
The Navy requires officers and sailors to keep “situational awareness,” that is, be aware at all times of what your own ship is doing as well as those that might be in the space up ahead that you intend to occupy. At the time of the accident, the Fitzgerald was in a channel used by many ships going into and out of the Tokyo Bay harbor. Sailors can become so intent on the traffic around them that they lose focus on their own course.
Becoming complacent
On the night of the collision, there was reportedly no moon; it was very dark at 2:30 in the morning, providing further opportunity for the ships to collide. However, on a quiet night, in peaceful conditions at sea, it is easy for sailors with little to do to become complacent.
The human element
It is also possible for a crew on watch to misjudge the speed and direction of another ship relative to their own. The technological advancements on the $1.8 billion Fitzgerald were not enough to keep a terrible accident from happening — simply because there was a human crew on board.
Food for thought
There are several theories as to why this collision occurred. As the investigation is still ongoing, the answers are not yet available. Meanwhile, the unlikely crash and resulting fatalities bring up various issues that could arise for any seaman or captain. Regardless of how small your craft, maintaining good situational awareness and being vigilant at all times are essential requirements in keeping your vessel and everyone on board safe from harm. Preventing loss of life or devastating injury must always be at the top of your mind.
|
Canada Declaration on Electoral Integrity Online
Social media and other online platforms play a meaningful role in promoting a healthy and resilient democracy. They provide a forum for sharing ideas, encouraging innovation, enabling Canadians to engage in dialogue about important issues and facilitating economic opportunity and civic engagement. However, some have used these platforms to spread disinformation in an attempt to undermine free and fair elections and core democratic institutions and aggravate existing societal tensions.
Social media and other online platforms and the Government of Canada recognize their respective responsibilities to help safeguard Canada’s federal general elections. This includes supporting democratic debate and expression online – including healthy political discourse and open public debate – and the importance of continued collaboration to address these challenges head-on. The Declaration acknowledges the role of the Caretaker Convention in Canadian elections and its importance until the results of the election are clear and a new ministry is formed.
To this end, we commit to working together to ensure principles of integrity, transparency and authenticity are in place to support healthy and safe democratic debate and expression online, subject to Canadian laws and consistent with other legal obligations.
Platforms will:
1. Intensify efforts to combat disinformation that poses a threat to Canada’s democratic processes and institutions.
2. Within the framework of the participant parties’ possibilities and tools, collaborate on the protection of democratic processes and institutions in Canada, as appropriate.
3. Promote safeguards that effectively help address cybersecurity incidents and promote cybersecurity, protect against misrepresentation of candidates, parties and other key electoral officials and use its best efforts to safeguard privacy protection.
The Government of Canada will:
1. Ensure that the platforms have clear Government of Canada points-of-contact for matters of concern to Canada’s democratic institutions.
Platforms will:
1. Use its best efforts to promote transparency for regulated political advertising, and build on the requirements outlined in the Canada Elections Act, including helping users understand when and why they are seeing political advertising.
2. Ensure their terms and conditions are easily accessible, communicated in a manner that is easy to understand, and enforced in a fair, consistent and transparent manner.
3. Publicly inform Canadians about their company’s efforts undertaken to safeguard democratic debate and expression on platforms and the wider Internet ecosystem, including policies implemented which advance the commitments of the Declaration.
4. Assist users to better understand the greater context around the information they are seeing and support the presence of trustworthy sources and information on their platforms.
The Government of Canada will:
1. Implement the Critical Election Incident Public Protocol during the caretaker period when the government is expected to show restraint in communications to ensure public announcements on incidents of election interference are clear and impartial.
2. Promote, where possible, lawful information sharing that may assist in detection, identification, or enforcement against malicious actors using the platforms’ products and services.
Platforms will:
1. Work to remove malicious abuses of platforms, such as fake accounts, coordinated inauthentic behaviour and malicious automated accounts.
The Government of Canada will:
1. Work towards improving its communications methods on platforms to enhance the circulation of authoritative and verifiable government information in the Internet ecosystem.
Platforms and the Government of Canada will:
1. Continue to work with civil society, educational institutions and/or other institutions to support efforts aimed at improving critical thinking, digital literacy and cybersecurity practices to promote digital resilience across society.
2. Facilitate the sharing of information on emerging developments and practices that could help protect Canadian democracy within relevant legal mandates.
The Declaration is endorsed by the following companies: Facebook, Google, LinkedIn, Microsoft, TikTok, Twitter and YouTube.
Should other digital communications companies be interested in discussing or supporting the Declaration, please contact the Democratic Institutions Secretariat at
Report a problem or mistake on this page
Please select all that apply:
Thank you for your help!
Date modified:
|
neodymium magnets
, , ,
How are Neodymium magnets made?
Neodymium magnets are technological marvels and the process for creating them is sophisticated and delicate. The main ingredients of a neodymium magnet are neodymium itself, iron, and boron; the chemical compound known as NdFeb. The exact ingredients depend on the grade or strength of magnet being produced. However, the production process for different strength magnets sees the same size different stages required to produce a neodymium magnet. . Step 1 – The Mix Firstly, all the elements to make the chosen grade of magnet are placed into a vacuum induction... Read More
, , ,
How to make a Gauss rifle
At first4magnets, we recently got hold of some super slow motion cameras. Naturally. after having fun using them to film large neodymium magnets squashing things in 2000 frames per second, we thought it would be interesting to shoot a permanent magnet Gauss rifle in slow motion and explain how one works…
|
Home > Universe > Gems | Steven Universe Wiki | Fandom
Gems | Steven Universe Wiki | Fandom
Habboin 11/10/2021 Universe 61
Gems are an extraterrestrial species of "magical", roughly humanoid beings that play a key role in the Steven Universe franchise.5,750 years ago, the Gem Homeworld maintained several outposts on Earth...
Gems are an extraterrestrial species of "magical", roughly humanoid beings that play a key role in the Steven Universe franchise.Gems | Steven Universe Wiki | Fandom
5,750 years ago, the Gem Homeworld maintained several outposts on Earth, with plans to completely colonize the planet, but were driven off by Rose Quartz's rebellion, leaving the Crystal Gems (and various Corrupted Gems) as the only remaining Gems on the planet.
As of Era 3, they are no longer under control of the Great Diamond Authority and the Gem Empire, free to choose their endeavors and purpose without the Caste System.
Gem Characters
Non-fusion Gems
Hybrid Gems
Crystal Gem fusions:Garnet (Ruby and Sapphire)Opal (Amethyst and Pearl)Sugilite (Ruby, Sapphire, and Amethyst)Alexandrite (Ruby, Sapphire, Amethyst, and Pearl)Rainbow Quartz (Pearl and Rose Quartz; permanently inactive)Sardonyx (Pearl, Ruby, and Sapphire)Obsidian (Ruby, Sapphire, Amethyst, Pearl, and Rose Quartz; permanently inactive)Crazy Lace Agate (two unknown Quartzes)Hybrid fusions:Homeworld fusions:Unaligned fusions:Forced fusions:
Minor Gem Characters
Main article: Minor Characters/Gems
Uncorrupted Gems
Gems tend to appear human-like in appearance (some more so than others) and come in a wide array of colors, appearances, sizes, and structures based on their gemstone type. While most Gems seen have two eyes, some Gems or types of Gems only have one eye (e.g. Nephrites, Sapphires, Bixbite, etc.). Their bodies seem to be made up of doll-joint-like segments in their base forms (although this isn't always apparent), and they lack features such as breast forms, nipples, or navels, due to the fact that they do not naturally possess reproductive systems (although they can shapeshift such features). It is unclear whether or not Gems generally have human-like external ears, as the same Gems have been drawn both with[1] and without[2] them in different shots. However, all known Gems have hair or visors that normally cover where their ears would be, and Topaz can hear despite having gemstones in place of both her ears, suggesting that Gems do not need human-like hears to hear - and, as above, they can shapeshift ears if they need them.
Garnet and Amethyst, shapeshifting to play "Steven Tag".
Gems are characterized by the gemstone embedded somewhere on their body, which is analogous to a brain. However, the gem is the only true part of a Gem’s body, the only part that is unchanging and, indeed, the only part of a Gem that can be permanently damaged or killed.
Garnet, altering her form.
Gems' humanoid shapes are projections from their gemstone which can be changed at will, described as being "like a hologram, but with mass," with their only constant feature being their gemstone and color scheme (shapeshifting is generally not permanent, and Gems will return to their "default" form eventually, unless the shapeshifting was done during regeneration).[3] As such, Gems cannot change the size or shape of their gem, which is the limiter of how small a given Gem can be. Gems refer to their physical bodies as 'Illusions.' Gems' physical forms typically have characteristics associated with human femininity, but all Gems are sexless and genderless, with the sole exception being the male half-Gem Steven[4].
Gems get their energy by absorbing light from their surroundings. Rebecca Sugar once described them as "solar-powered robots".[5]
There are a variety of gemstones, which decides a Gem’s basic abilities, general appearance, skills and personality (though Gems are fully capable of growing beyond the functions they were designed with). There are multiple Gems with the same gemstone except for the Diamonds, of which all four are unique. The gemstone of a Gem is what decides their name. The gemstone can be located in many different parts of the body, regardless of Gem.
An example of both Lapis Lazuli's hydrokinesis and the Crystal Gems summoning their weapons.
Typical Gem abilities include inhuman physical strength and durability of varying degrees, weapon-summoning, fusion, the power to store material in a pocket dimension withintheir gemstones, the ability to use their gemstones like a flashlight, and bubble creation. Note that these are not ubiquitous; some Gems, such as Lapis Lazuli, are not able to summon a personal weapon,[6] and Gems created in sub-optimal conditions, such as second era Peridots, lack the same physical strength as other Gems. So far, all Gems with their own weapons have the ability to direct energy through their weapons, such as Garnet using her gauntlets to charge Greg's van, Pearl firing an energy blast from the tip of her spear and Amethyst sending bursts of energy through her whips.
Pearl retreating to her gemstone.
Gems are engineered to adapt to a variety of conditions and cannot die by natural causes, as their bodies are only projections of light. Gems do not have to breathe, eat, drink, or sleep to survive, and they do not age, making them effectively immortal. They can, however, still eat and sleep if they so desire. Their bodies will also automatically alter themselves to fit the conditions of whatever celestial body or spacecraft they are on, such as adjusting mass for gravity. The only way to destroy or "kill" a Gem is to destroy their gemstone. However, a shattered gemstone can be put back together. This has been shown in Fragments and Homeworld Bound, when Steven repaired Jasper after he inadvertently shattered her [7], and Yellow Diamond repaired gems who were part of her cluster experiments. They still retain cracks on their gems, and to cure their effects they need to be healed. When the physical body of a Gem is seriously injured, they will retreat into their gemstone to regenerate. This is one of the only times Gems can make permanent changes to their physical form. The length of the regeneration process can range from minutes to weeks, but a "rushed" regeneration can suffer from physical deformities. Regeneration can be prevented if a gemstone is bubbled or otherwise constricted, such as within a mirror.[8]
Amethyst "glitching"
If a Gem's gemstone is damaged, their physical form will deteriorate and render them incoherent as the gemstone is the true body of the Gem. The only known method of healing a physically damaged Gemstone are the powers of the Diamonds and Rose Quartz. A Gem's gemstone can be used as an energy source, even if damaged. Gem Shards, the remnants of a shattered gemstone, possess a "powerful partial consciousness" which can grant sentience to their containers and have been used to create drone soldiers.[9] Gem Shards have also been forced to fuse together over time to form Cluster Gems.
If a Gems physical form receives sufficient physical damage or is otherwise disrupted it "poofs", turning into a cloud of mist and leaving the gemstone behind, the only permenant forms of damage for Gems are cracking, shattering and corruption. Shattered gems are not dead, but their mind is splintered between the pieces, unable to properly think. Gems that have been corrupted are not damaged physically, but have been afflicted with a corruption that prevents them from thinking or understanding. Because a Gem must actively create their physical form, when a corrupted Gem reforms it instead becomes a monstrous and deformed creature called a Gem Monster, while a damaged Gem will retain their original form, albeit with some slight differences. Shattered Gems will attempt to reform, usually resulting in unintelligent limbs.
Ancient Gems at the Lunar Sea Spire
Examples of Gem language.
There are two known main groups of Gems: Homeworld Gems and the Crystal Gems.Homeworld society is ruled by the autocratic Great Diamond Authority. Its members impose a strict caste system based on the gemstone and maintain their empire by terraforming worlds (and destroying them in the process) through facilities like the Kindergarten. Homeworld society heavily stigmatizes fusion between Gems of different gemstones, and fusion between Gems of the same gemstone is reserved solely for combat (and missions requiring the force of more than one Gem, in the case of Topaz).The Crystal Gems are a rebellious group of Gems established by Rose Quartz who disagree with the customs and principles of Homeworld society, particularly on its perspective toward life. Five thousand years ago, Rose instigated the Rebellion against the Homeworld Gems to protect the Earth. The Crystal Gems were able to successfully drive the Homeworld Gems off-planet. As they withdrew, the Diamonds released a powerful attack, corrupting the majority of the remaining Gems on Earth. Rose, Garnet, Pearl, and Bismuth were the only Crystal Gems to survive.Gem culture is ancient, predating all known human civilizations.
What Earth was projected to look like if the Crystal Gems had lost the war.
Gems have their own written language, which is inscribed on many of their temples, as first seen in Steven's Room in the Pilot, despite every non-Corrupted Gem speaking "English". This may mean that they write in an English-like script, or that written words are in a (moderately) traditional Gem language.Remains of Gem architecture can be seen scattered across the Earth in the form of the structures, such as the Lunar Sea Spire, the Communication Hub, and the Galaxy Warp.
A mural of Yellow Diamond.
Gem civilization is incredibly advanced, capable of creating spaceships, pocket dimensions, and teleporters.Slower than light travel is now considered outdated due to the advent of teleporters. Current Gem technology is described as incomprehensible by Lapis Lazuli.Individuality is not highly valued among Gems. As implied in "Bismuth", this is in part a conviction the Gem elite has forced down upon lesser Gems to limit their potential. While each Gem may exhibit their own unique nuances in personality, they all primarily adhere to the fundamental behavior and preferences of their caste and types. Whatever the case might be, like organic beings, Gems are able to define their own identities and develop unique personalities of their own. The most prime examples of this are the members of the Crystal Gems.Most Gems hold little value for the preciousness of life. Being part of a society where many individuals share the same traits, Gems have come to objectify any life form, organic or Gem. As such, they tend to treat each other and themselves as disposable commodities.Ian and Rebecca stated[citation needed] that this mindset comes from Homeworld propaganda where Gems like Peridot are proud because they know their place, as they think that Homeworld philosophy is the best for everyone; as part of a Gem's indoctrination, they don't question the system because they work within it, going to a bunch of different places and learning about them. They also unknowingly absorb revised history created to edit out what made Homeworld look unsuccessful or imperfect.While there has never been mention of Gems practicing any form of spiritualism or religion, the existence of the Moon Goddess Statue, along with the Sea Shrine and the Pyramid Temple, implies some sort of belief system.According to Emerald, Gems engage in jubilee celebrations.Gem culture does not have a gender binary or a concept of gender.[10][11][12]Gems refer to each other using she/her pronouns but have no particular reason for doing so beyond arbitrary convenience.[13][14]The gendered term "mother" is also applied often to the Gem named Rose Quartz (who gave up her physical form to create Steven Universe), by Gems, humans, and Steven Universe who is half-human and half-Gem.Peridot uses the term "matriarch" when referring to the Great Diamond Authority in "It Could've Been Great".Amethyst refers to Jasper as "sis".It is initially difficult for Gems to comprehend human social customs such as marriage, parents, childhoods, birthdays, or funerals (as particularly evidenced in "Gem Harvest"). Given that Gems do not have a gender binary, and they reproduce by growing new Gems in Kindergartens, they apparently do not form romantic/social bonds comparable to marriage (Garnet's status as a "perma-fusion" is highly irregular). Rose herself admitted that for a long time she did not understand that infant and adult humans are the same species: Gems are created fully formed and with adult-level knowledge, so they do not have a concept of a childhood stage of growing.
Most, if not all, Gems share the following abilities and traits:
Enhanced Condition: Gems can have greater strength, speed, and durability than humans. They can jump longer and higher than even the most athletic humans. The amount varies depending on the Gem type and production quality of the individual Gem - Peridot, a cheaply produced technician, is tough but physically weak, while Jasper, an "ultimate" soldier, can lift an Injector and survive a Gem Warship's explosion.Non-Senescence: Gems do not age or catch physical diseases, and thus do not die of natural causes like humans. However, they can still be killed if their gemstone is shattered, and they are susceptible to mental illness.Bubbling: Gems have the ability to encase an object inside a bubble. The color of the bubble depends on the Gem. The bubbles can be sent to wherever their creator considers "home". If a Gem is inside, it is kept in a form of stasis. These bubbles are entirely independent of their creator's state and seem to be able to exist indefinitely if undisturbed (The various bubbled Corrupted Gems in the Temple have remained stable regardless of the instances when the Crystal Gems have been poofed, and bubbles created by Rose Quartz, such as the bubble which contained Bismuth's gem, continue to exist even after she had become a part of Steven).Shapeshifting: Gems can temporarily alter their physical forms. The more mass the altered form has relative to the Gem's normal form, the harder it is to maintain. Sufficiently skilled Gems can shapeshift into forms with additional functions, such as Amethyst shapeshifting into a working helicopter in "Message Received". Gems produced with fewer resources during the Gem Homeworld's Era 2 appear to lack this ability. As revealed in "A Single Pale Rose", Gems can't alter their coloration but they can change the rotation of their gemstone.Regeneration: When a Gem suffers a fatal injury, they "poof," releasing their physical form and retreating into their gemstone in order to create a new, undamaged form. The amount of time this process takes depends on a number of factors, including whether or not they are changing the appearance of their form. As demonstrated by Amethyst in "Reformed", it is possible for a Gem to rush their regeneration process, but doing so may lead to a number of problems, such as deformed body parts. Regeneration time can range from several seconds, as shown in "Reformed", to a few weeks, such as in Pearl's case in "Steven the Sword Fighter".Gravity Shifting: As stated by Peridot in "It Could've Been Great", Gems' bodies will automatically adjust to different levels of gravity. This is further elaborated on in "Adventures in Light Distortion" where Pearl says that their forms are dependent on the local gravity and air pressure.Weapon-Summoning: Most Gems can summon a tangible weapon from their gemstones. Gems can summon multiple weapons at once, but each non-fusion Gem has only one type of weapon that they can summon.Fusion: Gems can combine their bodies and minds to form a larger and more powerful Gem with all of their components' gemstones on their bodies. Fusion Gems can unfuse willingly or fall apart for a number of reasons, and they can fuse further without unfusing first. Fusions inherit all of their components' weapons, and may combine multiple weapons into new forms - for instance, Opal can combine Pearl's spear and Amethyst's whip to form a bow. Humans can also fuse with half-Gems, as demonstrated in "Alone Together".Gem Storage: Gems can store and withdraw objects from their Gemstones.Photokinesis: Gems can project light from their Gemstones to light up dark places.Unique Abilities: Gems have a wide range of abilities that are exclusive to certain Gem types or individual Gems. These include Rubies' pyrokinetic touch, Sapphires' future vision, Pink Diamond/Rose's healing tears, and Peridot's magnetokinesis.
Gemstone Types
The Gem Homeworld maintains a strict caste system based on the gemstone, with each Gem belonging to a larger "type".
Main article: Caste System
Prime Kindergarten.
Beta Kindergarten.
Homeworld Kindergarten.
Rebecca Sugar has confirmed that Gems do not naturally reproduce[15] and lack reproductive organs by default.
In the short "How Are Gems Made?", it is explained that Gems "aren't born, they are made when some Gems from outer space came here with these big machines! They put the machines on Earth and shot this junk into the ground, and then boom, you pop right out!" In addition, it is revealed that Gems are formed fully developed: "being a weak baby would be a pain, so, they suck up all the good stuff from the ground so we pop out all big and strong." However, this process is not entirely flawless; as put by Peridot in "Too Far", if a Gem is incubated for too long (referred as being "overcooked" by Jasper in "The Return"), it will result in the Gem's humanoid form being inherently abnormal, as in the case of Amethyst, who is much shorter than the typical Quartz. Also, as revealed in "Too Short to Ride", if not enough resources are present during the incubation process, the resulting Gems will be underdeveloped, as in the case of Era 2 Peridots, who are shorter and lack most standard Gem abilities.
In addition to being fully developed physically, they are also fully developed mentally. When they come out of the ground, they already know all that they need to know to do their job, up to and including their initial, immediate orders. Rose Quartz explains in "Greg the Babysitter" that when a Gem is made, it is for a reason. They burst out of the ground with the knowledge of what they are supposed to be, and that is what they generally believe they will be for life.
In "On the Run", it is revealed that the Homeworld Gems invaded Earth several thousand years ago and used the Kindergarten to create new Gems using the method described in "How Are Gems Made?"; and that Amethyst is one such Gem. This process is very harmful to the environment to the point where, if it were allowed to continue, it would lead to "the destruction of all life on Earth," according to Pearl in "Marble Madness". Amethyst refers to all the Gems created through the process, herself included, as "parasites".
While biological reproduction is an alien concept to Gems, some form of it is not impossible for them; while Gems cannot reproduce with each other, they can create Gem-hybrid offspring. Through shape-shifting, they can perfectly replicate the reproductive organs of organic beings for their "human constructs" in order to have sex.[16] Rose Quartz is the only known Gem to have done this, and her son, Steven, inherited her gemstone, without which she could not project a physical form and subsequently "died". Exact details on this are extremely scant; while Rose appeared "pregnant" with Steven, no information is ever revealed as to how Steven's chromosomes were built, or how Rose acquired or constructed an ovum.
Steven asks Peridot what is it like to be created on Homeworld in "Gem Drill". She says she does not remember anything and only had feelings. She describes it as not existing then suddenly existing.
The majority of Gem weapons are medieval: Steven and Rose Quartz's shield, Pearl's spear, Amethyst's whip, Ruby's gauntlet, Jasper's crash-helmet, Eyeball's chisel knife, and the Topazes' maces.This includes fusion weapons: Garnet's gauntlets, Opal's energy bow, Sugilite's flail, Sardonyx's war hammer, and Topaz's mace.The process for each Gem to summon their weapons depends on a different state of mind for each of them.Amethyst places little effort or concentration, claiming that it "just happens" when she needs to summon her weapon.Pearl claims that her process is being perfect and calculated, using the science of a flower petal dancing in the wind to describe how hard work and dedication can help master the properties of one's own gemstone and "perform their own dance."Garnet claims that she summons her gauntlets by linking her mind with the energy of all existing matter, channeling the collective power of the universe through her gem(s), matching her calm and meditative temperament.Steven's means of summoning his shield is still unknown, though it is thought to be caused when he experiences pure joy, having first activated his gem after taking a bite of his favorite ice-cream sandwich, his ability to summon his weapon can also be attributed to the feelings of love and the desire to protect."Say Uncle" reveals that Steven's powers are maternal and that he summons his shield to protect the things he cares about. Though the episode is considered non-canon, the description of how Steven summons his shield seems to be accurate.Ian Jones-Quartey has stated that Steven is the first Gem to use he/him pronouns.Rebecca Sugar and Ian Jones-Quartey have stated that Gems use she/her pronouns by default.[17]This is demonstrated by the Crystal Gems referring to Lapis Lazuli, Peridot, Jasper, and Bismuth all as "she" before knowing them.Although, when regenerating, Gems would be able to take on a "masculine" form and use he/him pronouns if they wish.[18][19]
What appears to be gemstones powering a mechanism in an ancient Gem ship.
Gemstones can be used as a power source, even if damaged.In "Chille Tid", Gems are shown to experience exhaustion and, if they choose to sleep, can dream.In "Coach Steven", Gems are revealed to be able to produce bodily fluids and receive scrapes upon the "skin".Pearl referred to Gems' bodies as "human construct(s)" in "Fusion Cuisine".Ian Jones-Quartey has stated that Gems do possess DNA, and that Rose Quartz is able to pass her traits on to Steven.[20]While this would somewhat contradict Pearl's implication that Gems are inorganic in "Alone Together", it is explained in the Guide to the Crystal Gems that the Gem equivalent to genetic information is stored in the gemstone, and Rose is able to integrate this information with Greg's DNA by giving up her physical form and passing her gem along to Steven.Gems' skin tones are related to the color of their gemstones[21][22] (but do not always match precisely).In the comic series, Pearl has been shown to absorb objects into her gemstone and has gotten sick when she absorbed too many objects into her gem. As of "A Single Pale Rose", she has also used this method of storage in the main show. It is unclear whether other Gems can do this.This ability may be inherent to Pearls specifically, as it would account for Peridot's comments about Pearls being made to hold things.Although, in "Serious Steven", Garnet appears to be storing the temple key in her gemstones, since she has to summon it and was not carrying it with her prior to arriving at the Gem Battlefield.It should also be noted that the comics are of debatable canon when it comes to their relation to the TV show.In "Nightmare Hospital", it is confirmed that Gems do not have a heart or heartbeat.It is implied in "Catch and Release" that Gems produce bodily waste after consuming food (presumably by shapeshifting a digestive system).As revealed in "Message Received", Gems are differentiated from other Gems of their category by identification codes based on "Facet", then "Cut" or "Cabochon". For example, Peridot's specification is Facet-2F5L Cut-5XG, while Nephrite's specification is Facet-413 Cabochon-12.Pearl mentioned in "Last One Out of Beach City" that she could not get a driver's license due to being an alien.This is likely because Pearl is not a legal citizen and thus ineligible for government licensing.According to Rebecca Sugar, blue Gems like Sapphire are created with diplomatic skills.[23] And later in the Ultimate Crossover Fundraiser that blue Gems can be introspective and a little judgmental.[24]She also states that orange Gems are leaner on the active side as they take action.[25]Gems typically have their gemstones exposed in plain view, despite their gemstone being their most vulnerable spot.In "Three Gems and a Baby", Steven would become fussy and try to undo his clothes to expose his gemstone, suggesting there may be a reason why Gems leave their gemstones exposed.In "Adventures in Light Distortion", it is revealed that if a Gem ship is traveling faster than the speed of light, a Gem's 'hard-light' body will fall behind and lose form.Usually, Gems of the same type have identical looking gemstones with the same shape and facets. For example, Rose Quartzes have round pink gemstones with pentagonal facets. However, there are some Gems that deviate from this.There have been Jaspers shown with round gemstones and kite-shaped gemstones.Yellow Diamond and Blue Diamond's gemstones are both diamond-shaped but with slightly different dimensions, while Pink Diamond and White Diamond's gemstones are more like a realistic typical earth-cut diamond.The Crystal Gems' Pearl and Aubergine Pearl has an oval-shaped gemstone, while other Pearls shown have had perfectly round gemstones.While most Amethysts shown have a circular purple gemstone with a hexagonal facet, some Amethysts' gemstones are slightly different shades of purple.In "Gem Heist", one burgundy-colored Amethyst is shown to have a square-faceted gemstone (rather than hexagonal). However, whether or not this was an animation error is unclear.The Rutile Twins' joint gemstone has two long segments conjoined together, implying that normal Rutiles' gemstones consist of just one elongated segment.Gem art and architecture seem to be heavily influenced by Middle-Eastern and Art Deco designs.In the Pilot, the Gems all had visible ears, and in early episodes Amethyst is the only Gem with consistently drawn ears at times where her hair is at a position that shows them. It is unknown why this was changed.Some Gems are based on minerals that, in reality, were named after specific people, creatures, foods, or places (such as Holly Blue Agate, Sugilite, Larimar, Tiger's Eye, Watermelon Tourmaline, or Serpentine) exclusive to Earth. The implications of this, such as whether these Gems are the in-universe reason why such minerals are named so, are unknown.Pearls, however, are the only gems not based on minerals, since in real life pearls are organic matter (specifically calcium carbonate) from oysters and other mollusks, but culturally are considered to have the same value aesthetic properties as gemstones.Rebecca Sugar stated that Gems represent non-binary women like herself. While they do not consider themselves women, they do not mind being thought of as such.[26]A reply by Rebecca Sugar in a Reddit AMA implied that Gems whose color scheme is a combination of two Diamonds' color schemes are created by a joint effort of said Diamonds. The hypothetical Gem in question was Lepidolite who, as a purple Gem, would've been created by both Blue and Pink Diamond.The origin of how Gems were first created is unknown.
↑ http://i.redd.it/36vxsnip5s2z.png↑ http://78.media.tumblr.com/361c1344b7ccd2baead09693a5fdc12f/tumblr_inline_nkq91nf9FU1qdo426.png↑ "What Are Gems?" - Pearl - "Our bodies are actually projections generated by our gemstone. Think of it like a hologram, but with mass."↑ http://www.reddit.com/r/IAmA/comments/2e4gmx/i_am_rebecca_sugar_creator_of_steven_universe_and/cjw8e1p↑ https://www.cbr.com/rebecca-sugar-interview-on-the-end-of-steven-universe/CBR: "Tell us something you haven't told anyone before about any of the Gems."RS: "Wow, that’s a bold request! Have you noticed that they’re all solar-powered robots?"↑ Ian Jones-Quartey on TwitterQ: "What are Lapis and Peridot's weapons?"A: "Lapis' weapon is water control! You'll just have to keep watching to find out more about Peridot."↑ "What Are Gems?" - Pearl - "And if a Gem's gem is shattered completely, they'll cease to be."↑ "What Are Gems?" - Pearl - "And when a Gem is reduced to its gemstone, it can be contained in a bubble or trapped in an object, making it impossible to reform."↑ "Frybo" - Pearl - "These shards have a powerful partial consciousness that has been harnessed by Gems throughout history in order to create semi-sentient drone soldiers with the capacity to follow basic orders."↑ http://ianjq.tumblr.com/post/113794156834"In the world of the show, Gems are an alien species that don’t have a gender binary. They are all the same. (This is very common in fiction. Think of alien species like the Namekians in Dragon Ball.)"↑ https://www.reddit.com/r/IAmA/comments/2e4gmx/i_am_rebecca_sugar_creator_of_steven_universe_and/cjw34bu"The real question is, were/ are there any female crystal gems! And the answer is NO. Gems are Gems!"↑ https://www.reddit.com/r/IAmA/comments/2e4gmx/i_am_rebecca_sugar_creator_of_steven_universe_and/cjw4rfj"Technically, there are no female Gems! There are only Gems!"↑ http://rebeccasugar.tumblr.com/post/113764004948Ian Jones-Quartey: "In the world of the show, gems are an alien species that use feminine pronouns for each other"Rebecca Sugar: "For everyone wondering about Ruby: she is a Gem"↑ https://www.reddit.com/r/IAmA/comments/2e4gmx/i_am_rebecca_sugar_creator_of_steven_universe_and/cjw8ztwQ: "I'm not trying to nitpick, because I am very happy with the gems and who they are, but is there any particular reason they use feminine pronouns if gender is irrelevant to them? I would understand if it were just more convenient."A: "There's a 50 50 chance to use some pronoun on Earth, so why not feminine ones-- it's as convenient as it is arbitrary!"↑ Gem reproduction↑ http://ianjq.tumblr.com/post/113794156834↑ http://rebeccasugar.tumblr.com/post/113764004948↑ https://mobile.twitter.com/ianjq/status/733812617462964225↑ https://twitter.com/ianjq/status/734629837827149824↑ Gem DNA↑ http://ianjq.tumblr.com/post/98516324679"in canon, a Gem’s skin color MUST be related to the color of their gemstone!""Lapis’s skin is blue because the gemstone is blue. Amethyst is purple because the gemstone is purple! Pearl is cream because her Pearl is cream! Garnet is red because etc etc etc!"↑ http://ianjq.tumblr.com/post/98523846249"You’re absolutely correct- for instance, if we had designed the character Pearl to have a yellow-colored pearl on her head, her skin would be a yellow shade! Or if we had chosen a green-colored Garnet she would have greenish skin! The main point was: in canon we don’t give Gems "human" skin colors. The skin is based on whatever gem that character has."↑ 8 Fun Facts About "Steven Universe" That You Haven't Seen In The Show: "If Connie were a gem, I think she would be a gem that is teal...she has the diplomatic skills of blue gem, but she also is able to take action...she would be a gem that would be between blue and green."↑ Ultimate Crossover Fundraiser: "Dipper would be a light blue because he’s "introspective" and "a little judgmental"."↑ Ultimate Crossover Fundraiser: "Mabel would have to be on the pink side for sure. not just for her color scheme but also her attitude. it would probably be- it would be orange. cause it would be like she takes action. a pink orange because she takes action. she’s not like blue gems are all very meditative. lean on the active side."↑ [1], Gizmodo: Steven Universe's Rebecca Sugar on How She Expresses Her Identity Through the Non-binary Crystal Gems
|
Next Article in Journal
Personal Resources and Spiritual Change among Participants’ Hostilities in Ukraine: The Mediating Role of Posttraumatic Stress Disorder and Turn to Religion
Next Article in Special Issue
‘Em Procissão Solene a Deus Orando, para os Batéis Viemos Caminhando’—The Long Ebb-Tide of Catholic Public Piety in the Former-Portuguese Enclave of Macao
Previous Article in Journal
Dōgen on Language and Experience
Previous Article in Special Issue
Liturgical and Pastoral Activity as a Crime in Soviet Ukraine: The Case of Greek Catholic Priest, Roman Bakhtalovskyy, CSsR (1897–1985)
Sacred Trees, Mystic Caves, Holy Wells: Devotional Titles in Spanish Rural Sanctuaries
Department of Moral Theology and Praxis of Christian Life, Faculty of Theology, Comillas Pontifical University, 28015 Madrid, Spain
Academic Editor: Salvador Ryan
Religions 2021, 12(3), 183;
Received: 9 February 2021 / Revised: 5 March 2021 / Accepted: 7 March 2021 / Published: 10 March 2021
This paper explores how local, lived religion has creatively linked spiritual insights and popular devotions in ecologically valuable settings helping generate and preserve the rich Spanish biocultural heritage. Focusing on a selection of Sacred Natural Sites (SNS), mostly Marian sanctuaries, it shows that local “geopiety” and religious creativity have generated “devotional titles” related to vegetation types, geomorphological features, water, and celestial bodies. It also argues that, despite mass migration to urban centers, the questioning of “popular religion” after the Second Vatican Council, and the rapid secularization of Spanish society over the past fifty years, a set of distinctive rituals and public expressions of faith—some of them dating back to the Middle Ages—have remained alive or even thrived in certain rural sanctuaries. These vernacular devotions, however, do not necessarily announce the advent of the postsecular. Finally, it suggests that Protected Area (PA) managers, regional governments, custodians, anthropologists, tourism scholars, and theologians should work together in order to analyze, interpret, and help solve the management challenges highly popular SNS face.
Keywords: sacred natural sites; Catholicism; lived religion; geopiety; landscape management sacred natural sites; Catholicism; lived religion; geopiety; landscape management
1. Introduction
Despite the rapid and complex secularization process of Spanish society over the past five decades (Pérez-Agote 2007, 2012; González-Anleo et al. 2021), certain spiritual traditions, pilgrimages, and rituals have remained surprisingly alive or even experienced a significant revitalization (Maldonado 1996; Lois González 2013). Some of these devotional practices date back to the late medieval or the early modern period, others have a more recent origin, and many are linked to Marian hermitages, chapels, shrines or monasteries considered Sacred Natural Sites (SNS) (Wild and McLeod 2008) in or near Protected Areas (PAs) with high ecological value (Tatay-Nieto and Muñoz-Igualada 2019).
Traditional knowledge, values, narratives, beliefs, taboos, and rituals matter from a strictly conservationist point of view (Berkes 2018; Studley 2018; Frascaroli 2013; Colding and Folke 2001). However, as it has been widely discussed since the publication of Lynn White’s seminal article, “The Historical Roots of Our Ecologic Crisis” (White 1967), spiritual beliefs, doctrinal systems, and religious practices are a double-edged sword with regard to conservation: they carry values, generate worldviews, and shape attitudes that can either preserve or destroy the natural world (McLeod and Palmer 2015; Bhagwat et al. 2011).
Focusing on a selection of Spanish rural sanctuaries, I argue, in line with Elisabeth A. Allison and John Studley, that, despite the historical shortcomings of spiritual movements and religious institutions, “local people can extend an ethic of care to their biophysical surroundings, through the mediation of personified deities” (Allison 2015, p. 502) and lay participation can play a key role in the ritual protection of SNS (Studley 2018). Since sacred places “have the capacity to also foster attachment, devotion, spiritualy, and a certain ‘disposition’, ‘ethos’, and ‘worldview’” (Mazumdar and Mazumdar 2004, p. 387), in order to better understand the conservation potential of Spanish SNS, I explore the symbolic, cultural, and spiritual meaning of sanctuaries placed in natural settings where local, popular devotions have been observed or have even thrived over the past decades.
Surprisingly, despite the profound changes which have occurred in European Catholic countries since Vatican II, some SNS have defied both the secularization of society and the clericalization of religion by means of cultivating a broader understanding of the sacred while generating lively rituals and devotional lay practices rooted in local, folk culture. However, this is not something new; as Per Binde noted, the history of local religion in Catholic Southern Europe “is characterized by a persistent tension between the tendency among practitioners to go beyond the limits of orthodoxy and the wish among the central institutions of the Church to uphold these limits” (2001, p. 21).
This research, thus, resonates with a rapidly expanding body of literature on SNS, but also with the growing academic interest on “lived religion” or “the embodied and enacted forms of spirituality that occur in everyday life” (Ammerman 2014). It also connects with the renewed understanding of “sanctuary” as an appropriate spatial metaphor for the study of contemporary religion (Chappel 2020).
However, when it comes to the current interest in SNS, the spatial turn religion scholars refer to does not necessarily imply a religious revival or the clear evidence of a post-secular trend. Moreover, as Ian Reader has noted, ancient renewed spiritual practices “have not arrested the general decline of church attendance and adherence. Indeed, one might suggest almost the contrary” (Reader 2007, p. 226). In fact, “spaces and objects are imbued with religious meanings in ways that trouble the binaries of public and private, or secular and religious” (Chappel 2020, p. 18). In his extensive review of Spanish sanctuaries, José Miguel Muñoz similarly warned that, “in order not to lose the true meaning of the phenomenon of popular religion, it is important to know that when studying the rural sanctuaries of devotion in Spain, any preconceived idea is broken in the eyes of the researcher because we are close to the ungraspable and intangible, to an unstructured religious world” (2010, p. 447).
Spanish SNS and their surroundings serve today as “multifunctional spaces” (Cànoves et al. 2012) or “servicescapes” (Higgins and Hamilton 2019) where a complex mix of spiritual, cultural, therapeutic, and leisure activities take place (Schnell and Pali 2013). Their nature-related symbolism and the conservation potential of the lively devotional practices that take place in and around these sites remains, however, under-researched. This is certainly the case of highly popular sanctuaries such as El Rocío (Andalusia), Montserrat (Catalonia), Guadalupe (Extremadura) or Covadonga (Asturias).
2. Research Methods
This study builds on and expands previous research on the conservation potential of Spanish SNS (Tatay-Nieto and Muñoz-Igualada 2019). I systematically searched for bibliographical and internet references to hermitages, shrines, chapels, churches, and monasteries placed in rural settings and wilderness areas. Institutional webpages of these sacred sites, essays on history, ethnology, and anthropology as well as travel guidebooks were thoroughly investigated (Abad León 1990; Aldea 1975; Amengual i Batle 1997; Buxó et al. 1989; Caballero Mújica 1999; Carrasco Terriza 1992; Carreres i Péra 1988; Cebrián Franco 1989; Christian 1976, 1981; Delclaux 1991; Fernández-Ladreda 1989; Fernández Sánchez 1994; Ferri Chulio 2000; Iturrate 2000; Fernández Álvarez 1990; Fuixench 2007; González Echegaray 1993; Lisón Tolosana 1976; López Martín 1998; Llamas 1992; Muñoz 2010; Pérez Ollo 1983; Sánchez Ferrer 1995; Torra de Arana 1996).
In this investigation, which is part of a wider research project, I did not use questionnaires or conduct in-depth interviews. I relied on the (both quantitative and qualitative) analysis of the bibliographical secondary sources and on the dialogue (phone conversations and emails) with members of lay fraternities, custodians and local priests. These provided a total of 574 non-urban, mainly Marian sanctuaries with nature-related names or “natural titles” (Table 1, Table 2, Table 3 and Table 4).
A selection of the most popular ones was inventoried with the objective of assessing their spiritual meanings, ritualized traditions, and associated devotional practices. Finally, the religious significance and the theological underpinnings of the most salient nature-related devotions in these sanctuaries were debated with colleagues. The insights gained from the research were also discussed with peers in order to achieve a greater understanding of the interaction between popular piety, local devotions, natural titles, and the conservation potential of rural sanctuaries. Finally, I focused on three highly popular SNS set in PAs—El Rocío, Covadonga, and Montserrat—to illuminate the role some devotions and rituals may have played in their conservation status and religious vitality.
This interdisciplinary research on Spanish SNS, thus, stands at the intersection of several disciplines: anthropology, history, cultural geography, tourism studies, conservation biology, and religious studies. Here, I discuss only some of these intersections. Space does not permit to take up all of them, but they can form the subject of future studies.
3. Local Religion and Marian Sanctuaries in Natural Settings
Spain is the third tourist destination in the world (United Nations World Tourism Organization 2018). Around 83.7 million people visited the country in 2019, setting an all-time record. Although the exact numbers are difficult to estimate, pre-COVID-19 counts by custodians and regional governments show that the most-popular SNS in Spain attracted millions of visitors every year. The sanctuary of El Rocío (4 m), which sits right next to Doñana NP, the sanctuary of Montserrat (3 m) in the Parc Natural de la Muntanya de Montserrat, and the sanctuary of Covadonga (1.5 m) at the entrance of Picos de Europa NP stand among the favorite destinations. The main pilgrimage to El Rocío may draw up to 1 million devotees. Moreover, every weekend, thousands of pilgrims, hikers, climbers, and tourists intermingle by the Benedictine Monastery of Montserrat and near the grotto of Covadonga. All three sacred sites share in common being very active Marian spiritual centers in PAs of high ecological value.
The cult of Mary has been described as “baptised paganism” (Benko 2004, p. 4; McKenna 2011). It was developed by Justin Martyr (100–165 CE) and, since the 4th century, became deeply intertwined with the goddess cult (Artemis, Diana, Isis, Cybel). Mary eventually became Mother of God, ever-virgin, intercessor, mediatrix and Queen of Heaven (Benko 2004; Baring and Cashford 1991). She was refashioned as mother goddess and Magna Mater (as Black Madonna) and associated with fertility, health, earth worship (earth, water, mountains, rocks), and the sacred feminine (Christian 1981). Many Cybel sites were dedicated to Magna Mater and became synonymous with venerating the earth (Benko 2004, pp. 213–14). The development of the Mary cult also involved the “construction of a sacred Marian topography” (Benvenuti 2017, p. 49). Water, fountains, rocks, mountains, caves, and sites previously dedicated to spirits/goddesses became Marian sanctuaries (Curchin 2014, pp. 158–59; Benko 2004, p. 213).
In Spain, animism continued during the Visigothic kingdom and, in the northwest, Celtic cults persisted for many centuries as folk practices, which in some cases were Marianized (Curchin 2014). In the south and the Mediterranean coast, Roman cults were transformed into those of the Saints and the Virgin. All over the peninsula, the Roman Catholic Church raised churches, hermitages and sanctuaries at traditional cultic sites such as springs, rivers, caves, and cliffs where locals paid tribute to pagan gods. In the 13th century, probably influenced by the Cistercian reform, Marian shrines began to proliferate in Spain and overshadowed previous patron saints (Figure 1). Through a complex historical process, popular devotion first universalized the Marian cult—thus, simplifying the diversity of the cult to the saints—but soon after re-localized it again while generating hundreds of distinctive titles or “advocations” (from the Latin advocatio, pleading the cause of another). Many of these advocations, such as Rocío (Dew), Montserrat (Rugged Mountain), Espino (Common hawthorn), Roser (Rose), Peña (Rock), Fuensanta (Holy Well), and Covadonga (or Cova-donga, Cave of the Lady), are nature related.
Later on, from the 16th through the 18th centuries, ecclesiastical authorities, likely influenced by the Golden Legend (Hani 1995), put in writing the history of these enclaves. They became sacred or “enspirited” (Studley 2018, 2019) sites because spiritual-like events occurred there. In most of the accounts, the unexpected discovery of the site by a shepherd and the stories of miracles performed by Mary play a prominent role. As time went by, an increase in the number of wonders and healings helped make the local image popular. When it comes to the origins of Marian apparitions in the wilderness, a distinctive narrative structure has been identified in several studies (Binde 2001).
Joan Prat, for example, concludes his ethnographic analysis of Catalan sanctuaries affirming that “a shepherd, and less frequently a shepherdess, observes the atypical behavior of an ox or bull of his herd, which by roaring or digging, insistently calls attention to its owner or guardian. The latter, intrigued or surprised, begins a systematic search near the source, cave, rock, tree or thorny bush where the inspired animal drives him, and ends up discovering the image of a Virgin” (1989, p. 221).
Like Prat, Frabizio Frascaroli (2016) identified a similar structure in the foundation stories of most “natural shrines” in Central Italy and underlined the symbolic importance of mobile pastoralism in their emergence. In Spain, these shrines also represent a type of “spiritual settlement” of the mountain regions (Garganté and Solà 2017). From a ritualistic perspective, anthropologist Alfredo Rodríguez identified another narrative pattern in his analysis of the miraculous power of Spanish Marian sanctuaries: “The sanctuary is configured as one of the three elements of a certain type of cult, the other two would be the image that is venerated and the miracles that are performed, with a basic scheme that is repeated: the Virgin appears to someone, usually a shepherd, in an unpopulated area, and [later on the shepherd] discovers an image, hidden from time immemorial [...] After a series of vicissitudes, which often include a certain amount of incredulity on the part of the neighbors and local authorities, a sanctuary is erected at the place of the apparition, and then the miracles that increase its fame take place” (Rodríguez 2000, pp. 162–63).
In sum, just as the tree (thorny bush)—rock (cave)—water (fountain) are some of the key natural elements that articulate the sacredness of a SNS (Figure 2), the sanctuaryimagemiracle also configure a complex unity mediated by distinctive, local narratives, devotions, and rituals. According to José María Fuixench, “Water, tree, and rock are elements that have always formed a universal cosmos, wherever a hermit dwells. A trilogy of life where the water symbolized purification; the tree, regeneration; and the rock, immortality” (2007, p. 17).
During the yearly celebrations, these isolated, liminal places become intense centers of social interaction. The historical events that gave birth to the sanctuary are remembered and devotees engage in a “contractual relation” (Arregui 1989; Coggins and Hutchinson 2006) and a ritualized “symbolic exchange” (Prat 1989) that involves candles, food, gifts, and votive offerings such as flowers. Historian of religion Mircea Eliade (1968) noted that, whatever the complexity of a religious feast, it is always a sacred event that took place ab origine and must be ritually reenacted to be kept alive. For Prat, during the festivities Marian images undergo a “process of symbolic condensation” that both humanizes Mary and transmits her heavenly power to heal and transfer certain supernatural virtues to humans. Local narratives, rituals, and devotions are deeply connected to these symbolic exchanges.
4. Pilgrimage, Religious Tourism, Ecotourism, and Secularisation
The powerful attraction of SNS in the secular, Post-Vatican-II era is an intriguing characteristic of the contemporary Spanish religious situation. Nevertheless, we should not rush and be misled by the growing numbers of visitors before drawing conclusions. Tourism scholars have warned over the past three decades that sacred sites and pilgrimage routes are a holy ground and we need to tread carefully.
Valine L. Smith already noted in the 1990s that, “because of the increased secularization of religion in the West, distinctions between pilgrim and tourist are quite diffuse” (Smith 1992, p. 15). Two decades later, María Cruz Porcal (2006) acknowledged the difficulty of drawing a line between pilgrims and tourists in the famous Javieradas pilgrimage to the sanctuary of Saint Francis Xavier (Navarra). More recently, Gemma Cànoves and her team showed in their study of Spanish sacred places that “religious tourism and cultural tourism form a joint trend that is an expression of the commercialization of culture or, more exactly, of religion and popular devotion” (2012, p. 283).
However, this is not just a Western phenomenon. In her comparative study of traditional pilgrimage and modern tourism in the Indian Himalayas, Shalini Singh concluded that, in both religious and secular contexts, “pilgrimages in recent times are fuzzily interpreted […] making it almost impossible to draw a clear distinction between true pilgrims and mainstream tourists”, and a new, emerging type of “environmental pilgrims” (Singh 2005, pp. 221–23). In a similar way, other scholars have more recently argued, in line with the pilgrim-tourist continuum model proposed by Smith, that “spiritual tourism” (Lopez et al. 2017) and “ecotourism” (Yoder 2017) can be interpreted as forms of religious tourism that lie in between (sacred) pilgrimage and (secular) tourism.
Furthermore, from a religious, ritualistic perspective, “setting apart” is central to the practice of sacred-making. This is why, in line with Mircea Eliade (1968) and Roy Rappaport (1971), Siv Ellen Kraft (2011) and Josep Maria Mallarach (2018) have suggested that the legal establishment of PAs that preserve (“set apart”) certain landscapes based on their ecological value can be interpreted as a substitute for ritual and taboo in secular contexts. Legalization, thus, may well have become a substitute for sacralization.
In sum, many different types of visitors (pilgrims, religious tourists, secular tourists, ecotourist, and environmental pilgrims) are being attracted to SNS, although for different reasons (Mantsinen 2020). Contemporary sacred sites around the world have, thus, become complex multifunctional spaces (Higgins and Hamilton 2019), social meeting points, places of rest, secret “regional capitals” (Díez Taboada 1989), therapeutic centers, religious supermarkets (Cànoves et al. 2012), and settings where the spiritual meets the numinous.
5. Geopiety, Nature-Related Devotional Titles, and the Spiritual Significance of Nature
We are all embedded in a network of physical, psychological, and emotional relationships from the moment we are born—not just human relationships, but also relationships with the landscape and the surrounding nature. Local people often exhibit very strong “place attachment” (Mazumdar and Mazumdar 2004) to the landscape and, in some cultures, even engage in the “nurture” of topographic features to appease the numina who inhabit them (Studley 2019). “The cultural and spiritual significance of nature has been defined as the spiritual, cultural, inspirational, aesthetic, historic and social meanings, values, feelings, ideas and associations that natural features and nature in general have for past, present and future generations of people—both individuals and groups. The attributes of nature conveying such significance range from species of flora and fauna to natural features to entire landscapes and waterscapes” (Verschuuren et al. 2021, p. xiv).
Japanese cultural historian Tetsuro Watsuji (1961) argued that our inner landscape somehow correlates and is shaped by the outer, physical landscape. Chinese American humanistic geographer Yi-Fu Tuan also noted that peoples and places are intrinsically bonded. He referred to this universal relationship as “topophilia” (Tuan 1961), only a few years before Erich Fromm first used the word “biophilia” (Fromm 1964). Shortly after, another American cultural geographer, John Kirtland Wright, coined the term “geopiety” (Wright 1966, pp. 251–52). The neologism expresses the worship of, and reverence for certain elements or features of the natural landscape. Wright understood it as a type of religious awareness concerning manifestations of geodiversity.
Following Tuan and Wright, other authors have later suggested that religion is directly influenced by the landscape (Gualteri 1983) or could even be considered a geographical phenomenon. For instance, J. Gary Knowles stressed the practical, action-oriented attachment and reverence for particular places in the environment: “geopiety connotes action and notions of responsiveness towards a place that is regarded as sacred” (Knowles 1992, p. 9). From a sociological perspective, in an effort to analyse behaviour and belief as a cultural whole, Bronislaw Szerszynski (1997) distinguished four types of ecological piety, interpreted as “an orientation to the sacrality of nature embodied in people’s lives” (1997, p. 50). Environmental psychologists have also emphasized that “ties to the sacred provide people with an identification with place which may persist through time and across generations” (Mazumdar and Mazumdar 2004, p. 395). More recently, Singh argued that “the geographical notion of genus loci has been employed to exemplify the fundamental quest for ‘geopiety’ attained through the unification of the pilgrim’s intrinsic belief with its external location” (2005, p. 215).
Yet, this universal quest is more strongly related to certain religions. For Kevin Kiernan, natural landforms, including mountains, rocks, caves, and islands, are regarded as sacred sites in many cultures and “figure prominently in traditional and polytheistic faiths and residually in monotheistic faiths” (Kiernan 2015, p. 177). However, although Christianity explicitly rejects polytheism, “animistic beliefs and images of communion with nature” form an integral part of Catholic “popular religious practices” (Binde 2001, p. 15). Several authors have argued that, as the Marian cult developed in the Iberian Peninsula, it absorbed animism—the Celtic nature spirits and the mother goddess cult—and vestiges remain to this day (Curchin 2014; McKenna 2011). The many natural titles and nature-related devotional practices found across Catholic regions could be regarded, thus, as animistic expressions of popular, local geopiety.
Juan José Cebrián Franco (1989, pp. 301–5) has identified four types of Marian titles in Spain: derived from toponyms, related to traits of the images, focused on details of the miraculous apparition, and linked to aspects of human liberation. For Muñoz (2010, p. 45), these devotional titles are either historical, toponymical, architectural, geographical or floristic. Previous research has shown that forests, trees, shrubs, and flowers played a prominent role in articulating the many plant titles or “verdant advocations” (Tatay-Nieto and Muñoz-Igualada 2019) of Spanish SNS. In fact, out of the 574 nature-related rural chapels, hermitages, shrines, and monasteries analyzed in this study, a significant 73.5% (422) have a vegetation or plant title. The remaining 26.5% (140) of the sanctuaries are named after a geomorphological feature (100), a water-related element (29), a celestial body (15) or—very rarely (Figure 3)—an animal (4). I now turn to analyze the meaning of the most common natural titles.
5.1. Sacred Groves, Church Forests, Holy Trees
Sacred trees and forests represent a long-held tradition across cultures and religions. “There can be no question of the forests as a consecrated place of oracular disclosures; as a place of strange or monstrous or enchanting epiphanies; as the imaginary site of lyric nostalgias and erotic errancy; as a natural sanctuary” (Harrison 1992, p. 121). This is probably why the conservation potential of Indian sacred groves (Bhagwat et al. 2005), Ethiopian church forests (Klepeis et al. 2016), Tibetan old growth trees (Salick et al. 2007) and sacred groves in many cultures around the world is attracting growing academic interest.
In Spain, as in many other industrialized European countries, “tree worship has for the most part disappeared” (Crews 2003, p. 43) and there is not a strong, sacred forest tradition anymore. However, the reverence for trees or “arborphilia” (Greenberg 2015) is still alive in certain settings. Groves and gardens around hermitages, chapels, cemeteries, monasteries, and sanctuaries still share some of the sacredness of the holy sites (Stara et al. 2015; Frascaroli 2013; Vaitkevičius 2009). Forests, springs, and iconic landforms are key natural elements in most Spanish SNS. A few species of trees and shrubs such as roses (Mare de Déu del Roser), holly oaks (Virgen de la Encina), common hawthorns (Nuestra Señora del Espino), elms (Virgen del Olmo), pines (Virgen del Pino), olive trees (Nuestra Señora del Olivo), and grape vines (Virgen de la Vid) stand out as the most common plant-titles (Table 1).
In some local devotions, the flower itself becomes central. For instance, at the Mare de Déu dels Lliris (Mother of God of the Lilies) sanctuary in Alcoy (Alicante), in the Parc Natural del Carrascar de la Font Roja, one of the local custodians noted that, “according to tradition, the image of the virgin miraculously appeared on 21 August, in the middle of summer, when lilies do not usually bloom, among the gorse. When the lily bulb was peeled, the image of the virgin appeared. A second priest peeled another lily, and the image appeared again. Every year, in pilgrimage people go in procession to the oak forest from the village”. One of the monks at Montserrat also mentioned the importance trees and plants play in the Virolai, the hymn of the Virgin of Montserrat. The hymn begins with this verse: “Rosa d’abril, morena de la serra, de Montserrat estel […] Roser del Cel; Cedre gentil, del Líban sou corona, Arbre d’encens. Palmera de Sió...” (Rose of April, Brunette of the Mountain, Star of Montserrat […] Rose Tree of Heaven; Gentle cedar, Crown of Lebanon, Tree of Incense, Palm tree of Sion…).
However, why do so many popular devotions and titles relate Mary to the shrubs and the trees? Several authors have shown that there are many similarities between Artemis—the fertility goddess of Asia Minor, spirit of forests, and deity of the wilderness—and the Virgin Mary (Harrison 1992; Mallarach 2013; Ionescu 2016). In Greek antiquity, the virgin goddess Artemis was “the noumenal spirit of the forests which gives birth to a multiplicity of species (forms) that preserve their originary kinship within the forest’ network of material interdependence” (Harrison 1992, p. 29). The cult of Artemis declined in the 4th century, during the reign of Theodosius, and her temple (in Ephesus) was closed in the early 5th century. This coincided with the veneration of Mary as Theotokos (Mother or God) which was sanctioned at the Council of Ephesus in 431 CE. Similar parallels have been found across Latin America (Damian 1995); for instance, between the Aztec goddess of fertility, sacred trees, and the Virgin (Granziera 2012).
In Christian theology, Mary is not a person of the Holy Trinity, yet intense popular devotion and veneration gave rise to her cult and fostered an impressive iconographic development of her image. In most processions, her images are surrounded by flowers and often the final stretch of the route is carpeted with branches, leaves, and petals (Figure 4).
It is then plausible to argue that early devotion to Mary was influenced by other cults and found inspiration in the universal tree-of-life motif, setting the Virgin’s apparitions in forests, “channeling the life-giving force of trees through the use of arborescent titles” (Tatay-Nieto and Muñoz-Igualada 2019, p. 3). According to Carole M. Cusack, holy groves also represent the site of sacred and social rituals, “the stability of the cosmos and of society” (Cusack 2011, p. 172). The tree, and its derivative, the pillar (also a very popular Spanish Marian devotional title, La Virgen del Pilar), are symbolic indicators of the axis mundi, the center of the world.
The abundance of plant titles in Marian SNS and the scarcity of “animal titles”—eagle (Nuestra Señora del Águila), goat (Santa María de Cabrera), bull (Mare de Déu del Tura), and bee (Virgen de las Abejas), are some of the few exceptions—suggests that Mary may also represent, following Hegel’s juxtaposition, the innocence, quietness, and tranquility of “flower religions” versus the aggressivity, anxiety, and sacrificial dynamic of “animal religions”. Maybe because plants, like Mary, “embody the kind of detachment human beings dream of in their own transcendent aspiration to the other, Beauty, or divinity” (Marder 2013, p. 12).
Yet not only Catholic devotions place the Mother of God on top of trees or hidden in thorny bushes. Vegetation plays a prominent role in ancient and current devotional practices and rituals as well. In Spanish, those who engage in a romería—a short or medium annual pilgrimage to a local sanctuary—are called romeros (literally “rosemary holders”, from the woody, perennial bush with fragrant evergreen leaves Rosmarinus officinalis). Petals, leaves, and branches of different types of plants also blanket the floor ahead of the procession that leads the devotees to the sanctuary (Figure 5). Additionally, of course, bouquets of flowers are usually offered as a sign of gratitude and left at the altar or around the image presiding the sacred site.
5.2. Sacred Mountains, Mystic Caves, Holy Rocks
Across times, cultures, and religions, geographical features and geomorphological forces have implications for the ways native peoples understand themselves and make meaning in relation to their landscape. Most Spanish rural sanctuaries are placed in iconic settings that offer a wonderful panoramic view of the countryside. It is no wonder that “one of the most constant impressions that visitors have when they go to Marian shrines is that they are all—or almost all—located and built in the most privileged places that the surrounding nature offers” (Prat 1989, p. 223). Similarly, Muñoz has argued that, “in the location of the Spanish rural sanctuaries, some clear geographical clichés converge (the mountain, the sickle, the river, the fountain, the island, the peninsula, the singular tree, the hanging stones, the forms of wind origin, etc.)” (2010, p. 537).
Although Christians do not revere natural forms, devotional titles related to landforms and geological features are not uncommon, especially within the Eastern Orthodox Church. They express a type of local, affective connection to particular traits of the landscape, a sort of indigenous geopiety towards the (Christianized) genus loci. In Spain, rocks (Peña, Roca, Berrocal, Muskilda), valleys (Valle, Val), mountains (Montaña, Monte, Mont, Monsacro, Monsalud, Toro, Moncayo, Bellmunt, Sierra), meadows (Vega, Soto), caves (Santa Cova de Montserrat, Covadonga, Cueva, Balma), hills (Pueyo, Puy, Puig), fields (Campo), plains (Llano), paths (Camino), and mountain passes (Puerto, Coll) stand out among the most popular geomorphological and landscape Marian titles (Table 2).
Devotional titles related to the sun (Nuestra Señora de Sonsoles), the moon (La Virgen de la Luna), the stars (La Virgen de la Estrella), and light (Nuestra Señora de la Luz) are much less frequent, but still can be found in rural sanctuaries (Table 3).
For thousands of years, religions around the world have used caves as spaces for protection, meditation, art, and burials. As Verschuuren et al. affirm, “many caves were used already in pre-Christian times as dwellings, burials, worship sites, and shelters for mobile pastoralism (transhumance). After Christianization, they have been revered as hermitages and sites of divine apparitions” (2021, p. 62). This has been certainly the case in Spain, where some very important SNS are placed in caves (Figure 6). As one of the custodians at the Santuario de Covadonga affirmed, “the hierophanic elements of the mountain, the cave, and the water play an important role in the (local) religiosity. The image of the Virgin of Covadonga is venerated inside the cave”. Likewise, at the Virgen de la Cueva Santa (Virgin of the Holy Cave) sanctuary in Altura (Castellón), the local priest underlined the importence of Cueva (cave) as an advocation or Marian title and brought to the fore the fact that she was the Patroness of Speleologists.
In a recent study on the Cave-Sanctuary of Cueva Santa del Cabriel (Central-Eastern Spain), Sonia Machause and her team found that, from the Late Chalcolithic to the present day, the ritual use of the cave has only been interrupted during two periods. Additionally, even then, “it is tempting to think that some notion of sanctity persisted among the people living in the surrounding areas” (Machause et al. 2019, p. 72). They also argue, in line with previous research, that “the physical characteristics of the cave […] impart an intrinsic sensory power to the site, helping to create a strong ritual atmosphere” (p. 62).
Across pilgrimage routes and SNS throughout the world, rocks and pebbles (Figure 7) have ritual significance (Sneath 2006). Heaps of small stones and cairns are commonly found at many sacred wells. In the hermitage of San Andrés de Teixido (Saint Andrew of the Yew) on the Northern Galician coast, romeros used to throw stones at particular sites forming humilladeros or milladoiros—large mounds or piles of stones—near the sanctuary or at particular crossroads (Figure 8). This ancient, pre-Roman practice acquired penitential meaning during the Christian era.
After a period of decline, stone piling is coming back among contemporary pilgrims around the world, reaching the religious and agnostics alike. In a recent study conducted in Western Ireland on modern and medieval pilgrimage practices, Ryan Lash suggests that, whereas in medieval times “pilgrims’ contribution to the formation of the complexes by depositing quartz pebbles would have enhanced this sense of shared participation in ascetic devotion”, today, through “embodied encounters with stones”, contemporary pilgrims are generating new “enchantments” (Lash 2018, p. 297).
In sum, rocks, trees, and water are easily “enspirited” (Studley 2018) and become settings for ritual practices. They are key elements that articulate the sacredness of SNS. In fact, their symbolism is closely related.
5.3. Holy Wells, Sacred Fountains, Mystic Dew
The existence of holy wells and sacred fountains is a global phenomenon that spans geographies, cultures, and religions. As one of the leading experts on the topic, Gary R. Varner, puts it: “Sacred wells have been with humankind for thousands of years. Their symbolism of wisdom, holiness, and healing and divine feminine power mixes with the darker aspects of life and death, the underworld and the underworld’s denizens. There are thousands of holy wells, streams, rivers and lakes throughout the world, in some locations undoubtedly still secret” (Varner 2009, p. 151).
Ronan Foley has also noted that “well settings are often framed by streams, stones and trees, which act as markers of a connection between the grounded earth and the sky” (Foley 2010, p. 470). In Spain, most holy wells and sacred fountains sit right by a chapel or a hermitage and are surrounded by trees. The life-giving character of fountains makes them “sites of powerful sacred and symbolic meanings for local communities” (Allison 2015). Like in Tronchón (Teruel), where the custodian of the Santuario de la Virgen del Tremedal (literally, Virgin of the Swampy Terrain), said –using the present tense– that “the virgin appears on top of a rock and works three miracles: she gives the one-armed shepherd back his arm, offers a treasure for the construction of the hermitage, and makes water spring from the rock”.
In Christian countries, “over several hundred years, mysterious ladies in white and the Virgin Mary have been reported at or near many holy wells” (Varner 2009, p. 145). Certainly, this has been the case all over Spain (Table 4). Water-related Marian titles are common and refer to fountains (Aguas vivas, Fuencisla, Hontanares), holy springs (Fuensanta, Aguas Santas), hot springs (Caldas), dew (Rocío), swamp (Tremedal), or snow (Nieves). There are also a few sacred sites named after a river (Río), sea (Mar), lake (Lago), and seaport (Puerto).
The stories, rituals, and devotions developed around holy springs are usually bound to the therapeutic power of the water. Lourdes, in Southern France, stands out as a paradigmatic case of this connection. Although, in other less well-known sites, the link is also present. In his study of Spanish rural sanctuaries, José Ignacio De Arana has noted: “An important group of these [devotions] are related to […] certain places that already possessed healing virtues for pagan peoples. For thousands of years, and in all cultures, some places on earth enjoyed mysterious powers to alleviate all the ailments of the body or some in particular […] But above all, these are springs whose water is capable, either ingested or applied externally, of modifying our organism by making its ills disappear” (De Arana Amurrio 1997, p. 586).
The many stories, rituals, and traditions developed around the highly popular Spanish Marian title Virgen de la Salud (Our Lady of Health) connect local devotions to water and healing. However, there are other, non-therapeutic uses of holy water in SNS. For example, in Covadonga the waters of the torrents that pass through the cave are collected in the Fuente del Matrimonio (Marriage Fountain), a goblet-shaped fountain in which, according to tradition, young women who drink from it will soon be married (Figure 9). In Montserrat, one of the many devotional titles of the Virgin, “Mística Font de l’Aigua de la Vida” (Mystical Source of the Water of Life), also expresses the close connection between water and Mary in the popular imagination.
Paradoxically, the only sacred site named after dew (Virgen del Rocío), one of the rarest Marian natural titles, became the most popular of all Spanish SNS (Figure 10). The sanctuary is built “in a chosen place, at the edge of the marshes and at the edge of the current of water called Madre de las Marismas (Mother of the Marshes)” (Aldea 1975, p. 2234). Another title of this same Virgin is Reina de las Marismas (Queen of the Marshes).
In the baroque mentality, holy water from heaven was a divine remedy for drought. This is the reason why, in a plenary agreement of the town of Almonte held in 1726, the city hall decided to ask its Patroness to bring the “Santo Rocío de sus aguas” (The Holy Dew of its waters). Nowadays, even though modern irrigation systems pump underground water during dry years, devotion to the Madre de las Marismas has not declined. On the contrary, it has increased substantially over the last decades, attracting ever larger numbers of pilgrims, since, as Antonio Ariño wrote three decades ago, “old rituals with a clear agrarian functionality (a plea for rain) are taken up again in a different socioeconomic context and are transformed into symbols of a real or longed-for identity” (Ariño 1989, p. 483).
6. Discussion and Conclusions
Since there is already evidence that the most visited Spanish rural sanctuaries are placed in or near PAs of high ecological value (Tatay-Nieto and Muñoz-Igualada 2019) and have been established and maintained by local communities for centuries, if not millennia, it seems plausible to argue that folk traditions, popular devotions, and religious rituals have functioned as conduits for collective (environmental) ethical behavior. Eugene N. Anderson, an American cultural ecologist, concluded from his research on indigenous peoples in several continents that environmental management requires both a strong, simple ethical code and some form of religion that involves people emotionally (1996, p. 162). The question that remains, however, is whether custodians and local communities could actively promote ecological awareness and work along with environmental managers in order to protect these sites in an age of mass tourism and ecological decline.
Unfortunately, recent research on the relationship between SNS, pilgrimage and tourism shows that “there is a disconnect between religious views of the environment and the actions of pilgrims and religious tourists, who, because of their views of the sacred nature of their travels, blame other tourists and travelers for the environmental ills at sacred sites” (Olsen 2020, p. 33). However, Olsen also argues that, when faith leaders emphasize the ecological impacts of spiritual journeys, pilgrims and religious tourists become more environmentally sensitive. Therefore, what can we conclude after analyzing the many natural titles and some of the lively devotional practices that take place in Spanish rural sanctuaries?
First, given the global trend to interpret religious beliefs, narratives, and practices in the light of contemporary environmental concerns and the high ecological value of SNS and their surroundings, these sanctuaries are being increasingly perceived by the conservation community as key biocultural repositories that enable both the conservation of biodiversity and the survival of local forms of knowledge, traditions, and rituals. There is, thus, room to affirm that religion serves as a “natural vehicle for carrying messages about conservation and wise management” (Anderson 1996, p. 82).
Second, SNS, even when they become primarily tourist destinations, are never completely secular. They still posses a spiritus loci and undergo a sacralisation process that links the environment, history and local identity. “Attachment to the sacred, forged through visits, rituals, stories, and artifacts […] can link a diverse and dispersed community of believers in a collective bond” (Mazumdar and Mazumdar 2004, p. 395). The many nature-related titles described in this study as well as the narratives, rituals, and devotional practices that take place in these rural sanctuaries not only express “place attachment”, but also a type of local “geopiety” or “topophilia”. Since SNS and beautiful landscapes are increasingly considered “natural amenities” and “spiritual resources” (Ferguson and Tamburello 2015) used by the population to (re)connect with the sacred, they could prove valuable venues for possible partnerships between PAs managers, custodians, and local communities.
Third, if “setting apart” is central to the practice of sacred-making, then the legal establishment of PAs can be interpreted as a substitute for ritual and taboo in our secular age. We may also wonder whether judicial processes are replacing ancient rituals leading to a different type of re-sacralization outside the control of both institutional religion and political authorities. This may well have been the case in highly popular Spanish SNS that have witnessed an unprecedented increase in the number of visitors since they were declared PAs.
Fourth, many sacred sites are under increasing pressure around the world due to a variety of reasons, including the commercialization of culture and the mutation of religious beliefs. In Spain, the rise in mass tourism and the revitalization of certain spiritual practices, rituals, and devotions in some SNS after the Second Vatican Council represents a complex challenge to managers and custodians alike. This renewed interest is, thus, a double-edged sword that could generate a sense of sacredness, “geopiety”, and respect towards the natural world or further deteriorate these fragile enclaves. There is already evidence that Spanish SNS have promoted conservation. Yet, care needs to be taken to actively preserve these sites based on their religious and cultural symbolism. Otherwise, the increase in visitors may harm their surrounding environments.
Fifth, the pre-COVID-19 growth of pilgrimage and the interest in visiting sacred sites in Spain is a complex and ambiguous phenomenon that may reflect, despite its spiritual appearance, a secular trend. Pilgrims, religious tourists, cultural tourists, and ecotourists flock to certain SNS en masse, but perceive them in different ways. Since the role of sustainable tourism in supporting conservation is becoming increasingly important, PA managers, custodians, regional governments, anthropologists, cultural geographers, tourism scholars, and theologians should work together in order to analyze, interpret, and help solve the management challenges highly popular SNS face.
This study is not free from limitations. It only comprises a preliminary examination of some Spanish SNS. For a more comprehensive understanding of the interaction between rural sanctuaries, local religion, tourism, and conservation, there is a need to research other places and conduct in-depth interviews with PAs managers, custodians, and visitors.
This research received funding from the Universidad Pontificia Comillas research project: “Sitios naturales sagrados y espacios naturales protegidos: explorando experiencias de los actores e interacciones entre dos lógicas de conservación de la Naturaleza a través del estudio del caso del Monasterio del Paular en el P.N. de la Sierra del Guadarrama”.
Informed Consent Statement
Informed consent was obtained from all subjects involved in the study.
The author thanks Liza Zogib, Salvador Ryan, Amparo Merino, and Josep-Maria Mallarach for providing constructive comments, which improved the article.
Conflicts of Interest
The author declares no conflict of interest.
1. Abad León, Felipe. 1990. Guía para Visitar los Santuarios Marianos de La Rioja. Madrid: Encuentro Ediciones. [Google Scholar]
2. Aldea, Quintín. 1975. Santuarios. In Diccionario de Historia Eclesiástica de España IV. Edited by Quintín Aldea, Tomás Marín and José Vives. Madrid: C.S.I.C., pp. 2207–381. [Google Scholar]
3. Allison, Elizabeth A. 2015. The spiritual significance of glaciers in an age of climate change. WIREs Clim Change 6: 493–508. [Google Scholar] [CrossRef]
4. Amengual i Batle, Josep. 1997. Guía para Visitar los Santuarios Marianos de Baleares. Madrid: Encuentro Ediciones. [Google Scholar]
5. Ammerman, Nancy T. 2014. Finding Religion in Everyday Life. Sociology of Religion 75: 189–207. [Google Scholar] [CrossRef]
6. Anderson, Eugene N. 1996. Ecologies of the Heart. Emotion, Belief, and the Environment. Oxford: Oxford University Press. [Google Scholar]
7. Ariño, Antonio. 1989. Las relaciones entre las asociaciones festeras y la institución eclesiástica. Una aproximación a la lógica de la religión popular. In La Religiosidad Popular. III. Hermandades, Romerías y Santuarios. Edited by Carlos Álvarez Santaló, María Jesús Buxó and Salvador Rodríguez Becerra. Barcelona: Anthropos, pp. 471–84. [Google Scholar]
8. Arregui, Gurutzi. 1989. Rituales de protección en ermitas y santuarios de Bizkaia (País Vasco). In La religiosidad Popular. III. Hermandades, Romerías y Santuarios. Edited by Carlos Álvarez Santaló, María Jesús Buxó and Salvador Rodríguez Becerra. Barcelona: Anthropos, pp. 327–37. [Google Scholar]
9. Baring, Anne, and Jules Cashford. 1991. The Myth of the Goddess: Evolution of an Image. London: Penguin Books. [Google Scholar]
10. Benko, Stephen. 2004. The Virgin Goddess: Studies in the Pagan and Christian Roots of Mariology. Leiden: Brill. [Google Scholar]
11. Benvenuti, Anna. 2017. Shrines and Holy Places in Tuscany between Pilgrimage and Religious Tourism: The Difficult Relationship between Knowledge and Valorization. Almatourism 16: 39–50. [Google Scholar]
12. Berkes, Fikret. 2018. Sacred Ecology. London: Routledge. [Google Scholar]
13. Bhagwat, Shonil A., Alison A. Ormsby, and Claudia Rutte. 2011. The Role of Religion in Linking Conservation and Development. Challenges and Opportunities. Journal for the Study of Religion, Nature & Culture 5: 29–60. [Google Scholar]
14. Bhagwat, Shonil A., Cheppudira G. Kushalappa, Paul H. Williams, and Nick D. Brown. 2005. A Landscape Approach to Biodiversity Conservation of Sacred Groves in the Western Ghats of India. Conservation Biology 19: 1853–62. [Google Scholar] [CrossRef]
15. Binde, Per. 2001. Nature in Roman Catholic Tradition. Anthropological Quarterly 74: 15–27. [Google Scholar] [CrossRef]
16. Buxó, María Jesús, Salvador Rodríguez, and Carlos Álvarez Santaló, eds. 1989. La Religiosidad Popular. Antropología e Historia. Barcelona: Anthropos. [Google Scholar]
17. Caballero Mújica, Francisco. 1999. Guía para Visitar los Santuarios Marianos de Canarias. Madrid: Encuentro Ediciones. [Google Scholar]
18. Cànoves, Gemma, Francesc Romagosa, Asunción Blanco, and Gerda K. Priestley. 2012. Religious tourism and sacred places in Spain: old practices, new forms of tourism. International Journal of Tourism Anthropology 2: 282–98. [Google Scholar] [CrossRef]
19. Carrasco Terriza, Manuel Jesús. 1992. Guía para Visitar los Santuarios Marianos de Andalucía Occidental. Madrid: Encuentro Ediciones. [Google Scholar]
20. Carreres i Péra, Joan. 1988. Guía para Visitar los Santuarios Marianos de Cataluña. Madrid: Encuentro Ediciones. [Google Scholar]
21. Cebrián Franco, Juan José. 1989. Guía para Visitar los Santuarios Marianos de Galicia. Madrid: Encuentro Ediciones. [Google Scholar]
22. Chappel, James. 2020. The Logic of Sanctuary: Towards a New Spatial Metaphor for the Study of Global Religion. Journal of the American Academy of Religion 88: 15–34. [Google Scholar] [CrossRef]
23. Christian, William. 1976. De los santos a María: panorama de las devociones a santuarios españoles desde el principio de la Edad Media hasta nuestros días. In Temas de Antropología Española. Edited by Carmelo Lisón Tolosana. Madrid: Akal, pp. 49–105. [Google Scholar]
24. Christian, William. 1981. Local Religion in Sixteenth Century Spain. Princeton: Princeton University Press. [Google Scholar]
25. Coggins, Chris, and Teresa Hutchinson. 2006. The Political Ecology of Geopiety: Nature Conservation in Tibetan Communities of Northwest Yunnan. Asian Geographer 25: 85–107. [Google Scholar] [CrossRef]
26. Colding, Johan, and Carl Folke. 2001. Social Taboos: “Invisible” Systems of Local Resource Management and Biological Conservation. Ecological Applications 11: 584–600. [Google Scholar]
27. Crews, Judith. 2003. Forest and tree symbolism in folklore. Unasylva 54: 37–43. [Google Scholar]
28. Curchin, Leonard. 2014. Roman Spain: Conquest and Assimilation. London: Routledge. [Google Scholar]
29. Cusack, Carole M. 2011. The Sacred Tree: Ancient and Medieval Manifestations. Newcastle Upon Tyne: Cambridge Scholars Publishing. [Google Scholar]
30. Damian, Carol. 1995. The Virgin of the Andes: Art and Ritual in Colonial Cuzco. Hadley: Greenfield Press. [Google Scholar]
31. De Arana Amurrio, José Ignacio. 1997. Devoción a los santos curadores. In Religiosidad Popular en España. Actas del Simposium (I). Madrid: Ediciones Escurialenses, pp. 581–605. [Google Scholar]
32. Delclaux, Federico. 1991. Guía para Visitar los Santuarios Marianos de Madrid. Madrid: Encuentro Ediciones. [Google Scholar]
33. Díez Taboada, Juan María. 1989. La significación de los santuarios. In La Religiosidad Popular. III. Hermandades, Romerías y Santuarios. Edited by Carlos Álvarez Santaló, María Jesús Buxó and Salvador Rodríguez Becerra. Barcelona: Anthropos, pp. 268–81. [Google Scholar]
34. Eliade, Mircea. 1968. The Sacred and the Profane: The Nature of Religion. Marrickville: Harcourt. [Google Scholar]
35. Ferguson, Todd W., and Jeffrey A. Tamburello. 2015. The Natural Environment as a Spiritual Resource: A Theory of Regional Variation in Religious Adherence. Sociology of Religion 76: 295–314. [Google Scholar] [CrossRef]
36. Fernández Álvarez, Florentino. 1990. Guía para Visitar los Santuarios Marianos de Asturias. Madrid: Encuentro Ediciones. [Google Scholar]
37. Fernández Sánchez, Teodoro. 1994. Guía para Visitar los Santuarios Marianos de Extremadura. Madrid: Encuentro Ediciones. [Google Scholar]
38. Fernández-Ladreda, Clara. 1989. Guía para Visitar los Santuarios Marianos de Navarra. Madrid: Encuentro Ediciones. [Google Scholar]
39. Ferri Chulio, Andrés de Sales. 2000. Guía para Visitar los Santuarios Marianos de Valencia y Murcia. Madrid: Encuentro Ediciones. [Google Scholar]
40. Foley, Ronan. 2010. Performing health in place: The holy well as a therapeutic assemblage. Health & Place 17: 470–79. [Google Scholar] [CrossRef]
41. Frascaroli, Fabrizio. 2013. Catholicism and Conservation: The Potential of Sacred Natural Sites for Biodiversity Management in Central Italy. Human Ecology 41: 587–601. [Google Scholar] [CrossRef]
42. Frascaroli, Fabrizio. 2016. Shepherds, Rituals, and the Sacred. Worldviews 20: 272–85. [Google Scholar] [CrossRef]
43. Fromm, Erich. 1964. The Heart of Man, Its Genius for Good and Evil. New York: Harper & Row. [Google Scholar]
44. Fuixench, José María. 2007. Santuarios Rupestres de España. Rincones de Leyenda. Zaragoza: Prames. [Google Scholar]
45. Garganté, Maria, and Xavier Solà. 2017. Santuaris, Ermites i Capelles a l’època del Barroc: Geografia Sagrada de la Muntanya Catalana. Barcelona: Diputació de Barcelona. [Google Scholar]
46. González Echegaray, María del Carmen. 1993. Guía para Visitar los Santuarios Marianos de Cantabria. Madrid: Encuentro Ediciones. [Google Scholar]
47. González-Anleo, Juan María, Ignacio Megías, Juan Carlos Ballesteros, Ariana Pérez, and Elena Rodríguez. 2021. Jóvenes Españoles 2021. Ser Joven en Tiempos de Pandemia. Madrid: Fundación SM. [Google Scholar]
48. Granziera, Patrizia. 2012. The Worship of Mary in Mexico: Sacred Trees, Christian Crosses, and the Body of the Goddess. Toronto Journal of Theology 28: 43–60. [Google Scholar] [CrossRef]
49. Greenberg, Joy Horner. 2015. From sacred grove to dark wood to re-enchanted forest: the evolution of arborphilia as neo-romantic environmental ethics (Part I). Journal for the Study of Religion, Nature and Culture 9: 376–413. [Google Scholar] [CrossRef]
50. Gualteri, Antonio R. 1983. Landscape, consciousness, and culture. Religious Studies 19: 161–74. [Google Scholar] [CrossRef]
51. Hani, Jean. 1995. La Vierge Noire et le Mystère Marial. Paris: Guy Trédaniel Éditeur. [Google Scholar]
52. Harrison, Robert. 1992. Forests: The Shadow of Civilization. Chicago: University of Chicago Press. [Google Scholar]
53. Higgins, Leighanne, and Kathy Hamilton. 2019. Therapeutic Servicescapes and Market-Mediated Performances of Emotional Suffering. Journal of Consumer Research 45: 1230–53. [Google Scholar] [CrossRef]
54. Ionescu, Carla. 2016. The Enduring Goddess. Artemis and Mary, Mother of Jesus. Ph.D. dissertation, York University, Toronto, ON, Canada. [Google Scholar]
55. Iturrate, José. 2000. Guía para Visitar los Santuarios Marianos de los Territorios Históricos de Álava, Guipúzcoa y Vizcaya. Madrid: Encuentro Ediciones. [Google Scholar]
56. Kiernan, Kevin. 2015. Landforms as Sacred Places: Implications for Geodiversity and Geoheritage. Geoheritage 7: 177–93. [Google Scholar] [CrossRef]
57. Klepeis, Peter, Izabela A. Orlowska, Eliza F. Kent, Catherine L. Cardelús, Peter Scull, Alemayehu Wassie Eshete, and Carrie Woods. 2016. Ethiopian Church Forests: A Hybrid Model of Protection. Human Ecology 44: 715–30. [Google Scholar] [CrossRef]
58. Knowles, J. Gary. 1992. Geopiety, the Concept of Sacred Place: Reflections on an Outdoor Education Experience. The Journal of Experiential Education 15: 6–12. [Google Scholar] [CrossRef]
59. Kraft, Siv Ellen. 2011. The making of a sacred mountain. Meanings of nature and sacredness in Sápmi and northern Norway. Religion 40: 53–61. [Google Scholar] [CrossRef]
60. Lash, Ryan. 2018. Enchantments of stone: Confronting other-than- human agency in Irish pilgrimage practices. Journal of Social Archaeology 18: 284–305. [Google Scholar] [CrossRef]
61. Lisón Tolosana, Carmelo, ed. 1976. Temas de Antropología Española. Madrid: Akal. [Google Scholar]
62. Llamas, Enrique. 1992. Guía para Visitar los Santuarios Marianos de Castilla-León. Madrid: Encuentro Ediciones. [Google Scholar]
63. Lois González, Rubén C. 2013. The Camino de Santiago and its contemporary renewal: Pilgrims, tourists and territorial identities. Culture and Religion 14: 8–22. [Google Scholar] [CrossRef]
64. López Martín, Juan. 1998. Guía para Visitar los Santuarios Marianos de Andalucía Oriental. Madrid: Encuentro Ediciones. [Google Scholar]
65. Lopez, Lucrezia, Rubén Camilo Lois González, and Belén M. Castro Fernández. 2017. Spiritual tourism on the way of Saint James the current situation. Tourism Management Perspectives 24: 225–34. [Google Scholar] [CrossRef]
66. Machause, Sonia, César Esteban, and Fernando Moya Muñoz. 2019. Enduring Sacred Places: The Astronomical Orientation of the Iberian Cave-Sanctuary of Cueva Santa del Cabriel in Spain. Journal of Skyscape Archaeology 5: 56–78. [Google Scholar] [CrossRef]
67. Maldonado, Luis. 1996. La religiosidad popular en la actualidad y en el futuro próximo de la vida española. Sociedad y Utopía 8: 151–66. [Google Scholar]
68. Mallarach, Josep Maria. 2013. Història dels valors dels boscos vells i madurs a Europa i Catalunya, i els reptes de la seva preservació. In Reptes per Preservar els Boscos Madurs a Catalunya. Edited by Josep Maria Mallarach, Josep Vila and Joan Montserrat. Barcelona: Institució Catalana d’Història Natural—Associació Silene, pp. 21–37. [Google Scholar]
69. Mallarach, Josep Maria. 2018. Espais naturals protegits i espiritualitat a l’Europa d’inicis del segle vint. In Art i Natura al Tombant del Segle XX. Edited by Teresa-Montserrat Sala and Irene Gras. Barcelona: Universitat de Barcelona, pp. 15–34. [Google Scholar]
70. Mantsinen, Teemu T. 2020. Pilgrimage as a Reproduction of Sacred Landscape in Finnish Karelia and the Russian Border Zone. Temenos 56: 7–32. [Google Scholar] [CrossRef]
71. Marder, Michael. 2013. Plant Thinking. A Philosophy of Vegetal Life. New York: Columbia University Press. [Google Scholar]
72. Mazumdar, Shampa, and Sanjoy Mazumdar. 2004. Religion and place attachment: A study of sacred places. Journal of Environmental Psychology 24: 385–97. [Google Scholar] [CrossRef]
73. McKenna, Stephen. 2011. Paganism and Pagan Survivals in Spain up to the Fall of the Visigothic Kingdon. Calgary: Theophania Publishing. [Google Scholar]
74. McLeod, Elisabeth, and Martin Palmer. 2015. Why Conservation Needs Religion. Coastal Management 43: 238–52. [Google Scholar] [CrossRef]
75. Muñoz, José Miguel. 2010. Arquitectura, Urbanismo y Paisaje en los Santuarios Rurales Españoles. Madrid: Gea Patrimonio. [Google Scholar]
76. Olsen, Daniel H. 2020. Pilgrimage, Religious Tourism, Biodiversity, and Natural Sacred Sites. In Religious Tourism and the Environment. Edited by Kiran A. Shinde and Daniel H. Olsen. Boston: CABI, pp. 23–41. [Google Scholar]
77. Pérez Ollo, Fernando. 1983. Ermitas de Navarra. Pamplona: Caja de Ahorros de Navarra. [Google Scholar]
78. Pérez-Agote, Alfonso. 2007. El proceso de secularización en la sociedad española. Revista CIDOB d’Afers Internacionals 77: 65–82. [Google Scholar]
79. Pérez-Agote, Alfonso. 2012. Cambio Religioso en España: Los Avatares de la Secularización. Madrid: CIS. [Google Scholar]
80. Porcal, María Cruz. 2006. Turismo cultural, turismo religioso y peregrinaciones en Navarra. Las Javieradas como caso de estudio. Cuadernos de Turismo 18: 103–34. [Google Scholar]
81. Prat, Joan. 1989. Los santuarios marianos en Cataluña: Una aproximación desde la etnografía. In La Religiosidad Popular. III. Hermandades, Romerías y Santuarios. Edited by Carlos Álvarez Santaló, María Jesús Buxó and Salvador Rodríguez Becerra. Barcelona: Anthropos, pp. 211–52. [Google Scholar]
82. Rappaport, Roy. 1971. The Sacred in Human Evolution. Annual Review of Ecology and Systematics 2: 23–44. [Google Scholar] [CrossRef]
83. Reader, Ian. 2007. Pilgrimage Growth in the Modern World: Meanings and Implications. Religion 37: 210–29. [Google Scholar] [CrossRef]
84. Rodríguez, Alfredo. 2000. Prácticas religiosas y ciclo reproductivo femenino en la España del Antiguo Régimen a través de los relatos de los milagros de la virgen. In Religiosidad Popular y Modelos de Identidad en España y América. Edited by J. Carlos Vizuete Mendoza and Palma Martínez-Burgos García. Cuenca: Ediciones Universidad de Castilla la Mancha, pp. 153–73. [Google Scholar]
85. Salick, Jan, Anthony Amend, Danica Anderson, Kurt Hoffmeister, Bee Gunn, and Fang Zhendong. 2007. Tibetan sacred sites conserve old growth trees and cover in the eastern Himalayas. Biodiversity and Conservation 16: 693–706. [Google Scholar] [CrossRef]
86. Sánchez Ferrer, José. 1995. Guía para Visitar los Santuarios Marianos de Castilla-La Mancha. Madrid: Encuentro Ediciones. [Google Scholar]
87. Schnell, Tatjana, and Sarah Pali. 2013. Pilgrimage today: the meaning-making potential of ritual. Mental Health, Religion & Culture 16: 887–902. [Google Scholar] [CrossRef]
88. Singh, Shalini. 2005. Secular pilgrimages and sacred tourism in the Indian Himalayas. GeoJournal 64: 215–23. [Google Scholar] [CrossRef]
89. Smith, Valene L. 1992. Introduction. The Quest in Guest. Annals of Tourism Research 19: 1–17. [Google Scholar] [CrossRef]
90. Sneath, David. 2006. Ritual Idioms and Spatial Orders: Comparing the Rites for Mongolian and Tibetan "Local Deities". In The Mongolia-Tibet Interface. Edited by Uradyn Bulag and Hildegard Diemberger. Leiden: Brill, pp. 135–58. [Google Scholar]
91. Stara, Kalliopi, Rigas Tsiakiris, and Jennifer L. G. Wong. 2015. The Trees of the Sacred Natural Sites of Zagori, NW Greece. Landscape Research 40: 884–904. [Google Scholar] [CrossRef]
92. Studley, John. 2018. The Ritual Protection of Enspirited Sacred Natural Sites on the Tibetan Plateau and the Optimization of Lay Participation. Journal for the Study of Religion, Nature & Culture 12: 354–83. [Google Scholar]
93. Studley, John. 2019. Indigenous Sacred Natural Sites and Spiritual Governance. The Legal Case for Juristic Personhood. London: Routledge. [Google Scholar]
94. Szerszynski, Bronislaw. 1997. The Varieties of Ecological Piety. Worldviews 1: 37–55. [Google Scholar] [CrossRef]
95. Tatay-Nieto, Jaime, and Jaime Muñoz-Igualada. 2019. Popular Religion, Sacred Natural Sites, and “Marian Verdant Advocations” in Spain. Religions 10: 46. [Google Scholar] [CrossRef]
96. Torra de Arana, Eduardo. 1996. Guía para Visitar los Santuarios Marianos de Aragón. Madrid: Encuentro Ediciones. [Google Scholar]
97. Tuan, Yi-Fu. 1961. Topophilia: or, Sudden Encounter with the Landscape. Landscape 11: 29–32. [Google Scholar]
98. United Nations World Tourism Organization. 2018. Tourism Highlights. Available online: (accessed on 15 January 2021).
99. Vaitkevičius, Vykintas. 2009. The sacred groves of the Balts: Lost history and modern research. Folklore 42: 81–94. [Google Scholar] [CrossRef]
100. Varner, Gary R. 2009. Sacred Wells: A Study in the History, Meaning, and Mythology of Holy Wells and Waters. New York: Algora. [Google Scholar]
101. Verschuuren, Bas, Josep-Maria Mallarach, Edwin Bernbaum, Jeremy Spoon, Steve Brown, Radhika Borde, Jessica Brown, Mark Calamia, Nora Mitchell, Mark Infield, and et al. 2021. Cultural and Spiritual Significance of Nature. Guidance for Protected and Conserved Area Governance and Management. Best Practice Protected Area Guidelines Series No. 32; Gland: IUCN. [Google Scholar]
102. Watsuji, Tetsuro. 1961. Climate and Culture: A Philosophical Study. Tokyo: Hokuseido Press. [Google Scholar]
103. White, Lynn. 1967. The Historical Roots of Our Ecologic Crisis. Science 155: 1203–7. [Google Scholar] [CrossRef]
104. Wild, Robert, and Christopher McLeod, eds. 2008. Sacred Natural Sites: Guidelines for Protected Area Managers. Gland: IUCN. [Google Scholar]
105. Wright, John Kirtland. 1966. Human Nature in Geography: Fourteen Papers, 1925–1965. Cambridge: Harvard University Press. [Google Scholar]
106. Yoder, Scot D. 2017. Ecotourism, Religious Tourism, and Religious Naturalism. Journal for the Study of Religion, Nature & Culture 11: 291–314. [Google Scholar]
Figure 1. The 13th century Virgen de la Peña (Virgin of the Rock) chapel and hermitage in Aniés, Aragón (Photo: Jaime Tatay).
Religions 12 00183 g001
Figure 2. The Yebra de Basa Hermitic complex near Santa Orosia, Aragón. (Photo: Jaime Tatay).
Religions 12 00183 g002
Figure 3. San Martín de la Val de Onsera (Saint Martin of the Bear Valley) is the only SNS named after an animal in the Aragonese Pre-Pyrenees (Photo: Jaime Tatay).
Religions 12 00183 g003
Figure 4. The patroness of the Pyrenees, la Mare de Déu de Núria, is carried to her sanctuary on 1 September 2016, the feast of St. Giles, patron saint of shepherds (Photo: Josep Maria Mallarach).
Religions 12 00183 g004
Figure 5. The impressive monastic complex of Montserrat is surrounded by mountains and forests (Photo: Pixabay).
Religions 12 00183 g005
Figure 6. The chapel of Covadonga (Photo: Lourdes Álvarez).
Religions 12 00183 g006
Figure 7. Stone heaps along the Camino de Santiago (Photo: Pixabay).
Religions 12 00183 g007
Figure 8. Over the years, pilgrims along the Camino de Santiago have left thousands of stones and pebbles forming large humilladeros, like the one sitting under La Cruz de Ferro (Photo: Alejandro Coma).
Religions 12 00183 g008
Figure 9. Fuente del Matrimonio (Photo: Archivo del Santuario de Covadonga).
Religions 12 00183 g009
Figure 10. Pilgrims on their way to El Rocío (Photo: José Luís Roca).
Religions 12 00183 g010
Table 1. Marian titles related to plants.
Table 1. Marian titles related to plants.
RoseRoser, Rosa64
Holly oakEncina, Encinar, Encinillas, Carrasco, Carrascal, Lluc38
Common hawthornEspino, Espinar, Arantzazu30
Field elmOlmo, Olmeda, Olmacedo, Oms, Omedes24
OliveOliva, Olivar, Olivares22
PinePino, Pinar, Pinarejo22
Common grape vineVid, Viña, Viñedo, Parral, Vinyet, Raïmat20
Elmleaf blackberryZarza, Zarzuela, Zarzaquemada, Navalazarza18
RosemaryRomero, Romeral9
WillowSalcedo, Salceda, Salcedón, Sargar, Saz8
ReedJuncal, Junquera, Junqueres, Xunqueira7
HeathBrezo, Brezales, Bruguers6
Table 2. Marian titles related to geomorphological features.
Table 2. Marian titles related to geomorphological features.
Rock/StonePeña, Berrocal, Muskilda, Peñitas, Piedraescrita, Peñas Albas, Peñarrota, Peñahora, Roca, Rocamayor, Saliente, Llosar20
MountainMontaña, Monte, Montemayor, Montesclaros, Montserrat, Mont, Sierra, Monfragüe, Mont, Monsacro, Monsalud, Toro, Moncayo, Bellmunt17
ValleyValle, Val, Roncesvalles, Vallivana, Valmayor, Valvanera, Valdesalce, Navahonda, Miravalles13
MeadowVega, Soto10
CaveCueva, Cueva Santa, Covadonga, Balma, Cova, Cuevita8
HillPueyo, Puy, Puig, Puig-graciós, Tura6
PlainLlano, Llana, Llanos4
Mountain PassPuerto, Colls3
RavineHoz, Tallat3
Table 3. Marian titles related to light and celestial bodies.
Table 3. Marian titles related to light and celestial bodies.
Table 4. Marian titles related to water.
Table 4. Marian titles related to water.
FountainFuente, Fuentesanta, Fuencisla, Valdefuentes, Caldas, Aguas Santas, Aguas Vivas, Hontanares13
Back to TopTop
|
A GPU or Graphics Processing Unit is a dedicated processor often used to handle accelerating the renderings of images, video, and 2D or 3D animations. As newer technologies are being developed, the GPU is being utilized to handle data for deep learning, allowing for things like cancer strand research, AI, autonomous driving, speech and face recognition.
There are two main forms that a GPU can take. One is a discrete physical add-on card for a PC, most commonly referred to as a Graphics Card, that you can buy and plug into your computer via a PCI Express slot. Another is an Integrated Graphics Processor (IGP) or Accelerated Processing Unit (APU). An IGP can be found integrated into a CPU or attached directly to a motherboard.
A dedicated graphics card offers far more performance then an IGP. It has a CPU with many more specialized cores to process the data, faster ram, and even power, leaving more room for the CPU and system to process additional tasks. Because it is a physical card, you are able to upgrade this part if you need more performance. With an IGP it shares all of its resources directly with the CPU and the system, hitting its max performance limits much faster.
There are two main GPU companies for PCs, AMD and NVIDIA, with possibly Intel getting in on the discrete card game in the near future. NVIDIA currently offers the best performing high end GPUs on the market and was first to feature real-time ray tracing. AMDs offerings are geared towards the mainstream 1080p scene with great performance for the price. Both may be showing off new hardware by this holiday or at least the beginning of next year.
How do you choose the right GPU for you? A good place to start researching is going to be the software you use the most. Many companies will have a list of minimum or recommended specifications, which will tell you exactly what is needed. I would suggest looking at their recommended specs, upgrading or downgrading from there, depending on your budget. Another great tool for games would be SystemRequirementsLab.com. It can scan your current hardware and compare game specifications for you.
Check out AMD and NVIDIA GPUs here:
AMD GPUs on Amazon
NVIDIA GPUs by EVGA on Amazon
Don’t Stop Here
More To Explore
What is RAM?
RAM is short for Random-Access Memory. It’s a super fast component that can temporarily store information for the CPU to use or call back on.
What is a CPU?
CPU stands for Central Processing Unit, or can simply be called a Processor. It is the essential part of a computer that processes data from
Father’s Day 2020 Weekend Sales!
Whether for you or the father in your life there is no reason to not take advantage of these sales found on Amazon. First up,
|
Why vegetarian eat fish?
Some people may also eat fish for its health benefits. Fish and seafood are rich in protein and provide numerous vitamins and minerals, including zinc and vitamin B12, which are vital for your immune and nervous systems. It can be difficult to get enough of these nutrients on a strict vegetarian diet ( 2 , 3, 4 ).
Do vegetarians eat fish and eggs?
Ovo-vegetarian diets exclude meat, poultry, seafood and dairy products, but allow eggs. Lacto-ovo vegetarian diets exclude meat, fish and poultry, but allow dairy products and eggs.
Why do vegetarians not eat meat?
Why Choose a Vegetarian Diet Many vegetarians, for example, avoid meat because they do not want animals killed or harmed. These individuals may object to the treatment of animals raised on industrial farms. The environment is an additional concern for some vegetarians.
Why do vegetarians eat fish but not meat?
What is a vegetarian that eats fish?
Can vegetarians eat cheese?
Although there are different types of vegetarians, cheese is often considered vegetarian-friendly. However, certain cheeses contain animal rennet, which contains enzymes commonly sourced from the lining of animal stomachs. … Look for vegan cheese, as well as dairy cheese made with plant-based rennet.
Can vegetarians eat bread?
Do humans need meat?
What are the disadvantages of being vegetarian?
1. It’s Difficult to Eat Enough Protein.
2. Vegetarian’s Meal Choices Can Seem Limited.
3. Eating Out Can Be a Challenge.
4. Dinner Engagements Require Explaining Your Eating Preferences.
5. Family and Friends Will Have Different Eating Habits.
6. Traditions for Holidays May Need to Change.
Is it healthy to be a vegetarian?
Many studies agree that a vegetarian diet can offer a range of health benefits. Studies show that a vegan or vegetarian diet may reduce the risk of cardiovascular disease and various types of cancer. A non-meat diet may also reduce the risk of metabolic syndrome, which includes obesity and type 2 diabetes.
Is Pescetarian better than vegetarian?
Can vegetarians eat marshmallows?
Technically, marshmallows aren’t vegetarian. They contain gelatin, which is an animal protein. … Generally though, marshmallows fall into the non-vegetarian category. Gelatin is made up of the ligaments, tendons, and skin of animals, predominantly pigs and cows, which are boiled to extract a protein called collagen.
Can you eat pasta as a vegetarian?
Can vegetarians eat tuna?
The short answer: No, vegetarians cannot eat tuna because it is a type of fish in which the flesh is eaten. Vegetarians, by definition, abstain from eating the flesh from all animals including fish and seafood. … Other than eating seafood, pescatarians typically follow a vegetarian diet.
Why being vegetarian is bad for you?
Do vegetarians eat egg?
Well, the short answer is yes! Unless they are vegan (meaning they don’t eat dairy products, eggs, or any other products which are derived from animals), some vegetarians do eat eggs and belong to a group known as lacto-ovo-vegetarians which according to the Vegetarian Society is the most common type of meatless diet.
Can you eat cheese pizza as a vegetarian?
Do vegetarians live longer?
Can vegetarians eat icecream?
Even ice cream isn’t safe for vegetarians. Castoreum, a musky brown liquid that beavers use to mark their territory, has a rich vanilla-like scent that some companies use to flavor vanilla ice cream without using artificial flavoring.
|
How are robots improving pharmaceutical processing?
By Emily Newton, Editor-in-Chief at Revolutionized
Robots are positively impacting numerous manufacturing industries, especially since they enable increased productivity and fewer errors. Here are some compelling ways that pharmaceutical robots have improved processing in the sector.
Improving Output During Times of Increased Demand
The COVID-19 pandemic placed pharmaceutical companies in the spotlight and gave them primary roles for helping the world through a crisis. As researchers found effective treatments for the virus, it became crucial to get them to the people who needed them, and do that as fast as possible.
Robots played a central role in helping that happen. In one instance, a pharmaceutical company tasked them with filling, labelling, and inspecting bottles of COVID-19 medicine. The system reportedly fills 50 vials each minute and can run without stopping for 60 minutes A human only steps in to replenish supplies as needed.
The setup can also handle variations, such as different sizes of vials or several fill levels. Thus, the manufacturer could use the same machine for packaging different doses. A pair of scales within the robot weighs each vial before capping it, verifying that each container has the correct amount before the next step in the process begins.
COVID-19 presented a circumstance where pharmaceutical processors needed to meet greater demands in a relatively short timeframe. However, other instances could arise, too, such as if a company takes on a large client with especially stringent requirements. Robots open new opportunities in such cases.
However, company leaders must keep in mind that any efforts to apply robots or any similar new technologies typically will not give the expected results immediately. Instead, it often takes time to show employees how the technology will help them and train them on any process changes.
Setting a strong foundation like that will get everyone well-equipped to embrace and get excited about what’s new rather than feeling overwhelmed by it.
Reducing Contamination to Keep Operations Running Smoothly
Pharmaceutical processing plants must uphold strict procedures to avoid contamination that could slow production. Robots can help meet those requirements. Sometimes, that means using filtration systems on the machines. For example, the medical and chemical processing industries often use hydraulic filters. Those fit onto hydraulic robots and eliminate particulate matter from the machines’ hydraulic lines.
Pharmaceutical plants may also implement robots into processing measures with the explicit goal of targeting contaminants. In one research study, a group developed a robotic vacuum cleaner for compounding pharmacies.
It had cleaning modes that involved brushing, mopping, and ultraviolet light. Experiments with the device involved simulating contamination occurring through regular usage and events where the contamination happened due to an unexpected event.
The results showed that the robot either eliminated or showed a 932-fold reduction in high and low water-soluble active pharmaceutical ingredients that caused chemical contamination. Such outcomes occurred after a single-step cleaning mode, which suggests that the robot got the job done both quickly and effectively.
Company leaders who want to take a similar approach should identify the most likely contamination sources, then assess whether robots could target those. Robotic machines are most often parts of extensive cleaning processes rather than used for handling every step.
Thus, a smart approach is to identify areas where current approaches for contamination reduction fall short or those with high human error rates.
Improving Syringe-Handling Methods for Better Productivity
A crucial step in pharmaceutical processing occurs when products get moved into trays, preparing them for later areas on a production line. Humans usually handle this responsibility, known as retraying, when the products involve syringes. However, robots often manage products in blister packs.
A relatively new development uses a 3D camera to detect syringe locations. It then sends those coordinates to a two-armed robot that retrieves the medication containers. Since the bot has two arms, it can grip in parallel and do it twice as fast as humans deployed to do the same role.
In another instance, Irish company Ward Automation engineered a robot to test, label, and palletize syringes. It can handle 600 of them per minute. The robot’s design represents a departure from the company’s previous method of making machines custom-built for an individual client’s needs.
This new option suits any pharmaceutical company currently making syringes. Ward Automation’s plans relate to taking this standardized platform outside of Ireland and broadening its potential reach. It also illuminates the extent of possibilities for people interested in investing in pharmaceutical robots.
Any pre-purchase planning should include specifics such as whether to purchase something standardized or customized. Moreover, company leaders may need to investigate combining multiple technologies to get the desired results. In this section’s first example, the robot would not have successfully picked syringes without the 3D camera’s information.
Pharmaceutical Robots Helping Companies Compete
Succeeding in pharmaceutical processing requires achieving numerous aims, such as keeping output levels high, exercising robust quality control, and eliminating activities that could introduce unacceptable impurities into products.
Robots are not the universal solution to all those needs, but if used strategically, they can assist companies in becoming competitive for the first time or maintaining a competitive advantage.
Choosing appropriate pharmaceutical robots to meet a company’s needs means assessing factors like the available budget, factory floor space, the number and type of products produced, and a facility’s current average output. Knowing those specifications will facilitate selecting the best robots to aid a company now and into the future.
Related Articles
|
RadInfo Logo
Ultrasound - Prostate
Ultrasound of the prostate uses sound waves to produce pictures of a man's prostate gland and to help diagnose symptoms such as difficulty urinating or an elevated blood test result. It's also used to investigate a nodule found during a rectal exam, detect abnormalities, and determine whether the gland is enlarged. Ultrasound is safe, noninvasive, and does not use ionizing radiation.
This procedure requires little to no special preparation. Leave jewelry at home and wear loose, comfortable clothing. You may be asked to wear a gown and to lie on your side with your knees toward your chest. To obtain high-quality images, an ultrasound transducer – a plastic cylinder about the size of a finger – is inserted short distance into the rectum. If a biopsy is planned, you may be told to avoid aspirin and other blood thinners for seven to 10 days prior to the procedure. You may be instructed to use an enema to clean out your bowel.
What is Ultrasound Imaging of the Prostate?
Ultrasound imaging is a noninvasive medical test that helps physicians diagnose and treat medical conditions. It is safe and painless. It produces pictures of the inside of the body using sound waves. Ultrasound imaging is also called sonography. It uses a small probe called a transducer and gel placed directly on the skin. High-frequency sound waves travel from the probe through the gel into the body. The probe collects the sounds that bounce back. A computer uses those sound waves to create an image. Ultrasound exams do not use radiation (x-rays). Because ultrasound captures images in real-time, it can show the structure and movement of the body's internal organs. The images can also show blood flowing through blood vessels.
Prostate ultrasound, also called transrectal ultrasound, provides images of a man's prostate gland and surrounding tissue. The exam typically requires insertion of an ultrasound probe into the rectum of the patient. The probe sends and receives sound waves through the wall of the rectum into the prostate gland which is situated right in front of the rectum.
What are some common uses of the procedure?
A transrectal ultrasound of the prostate gland is performed to:
• detect disorders within the prostate.
• determine whether the prostate is enlarged, also known as benign prostatic hyperplasia (BPH), with measurements acquired as needed for any treatment planning.
• detect an abnormal growth within the prostate.
• help diagnose the cause of a man's infertility.
A transrectal ultrasound of the prostate gland is typically used to help diagnose symptoms such as:
• a nodule felt by a physician during a routine physical exam or prostate cancer screening exam.
• an elevated blood test result.
• difficulty urinating.
Because ultrasound provides real-time images, it also can be used to guide procedures such as needle biopsies, in which a needle is used to sample cells (tissue) from an abnormal area in the prostate gland for later laboratory testing.
How should I prepare?
You may need to change into a gown for the procedure.
You may be instructed to avoid taking blood thinners, such as aspirin, for seven to 10 days prior to the procedure if a biopsy is planned. An enema may be taken two to four hours before the ultrasound to clean out the bowel.
What does the equipment look like?
For ultrasound procedures such as transrectal exams that require insertion of an imaging probe, also called a transducer, the device is covered and lubricated with a gel.
How does the procedure work?
Ultrasound imaging uses the same principles as the sonar that bats, ships, and fishermen use. When a sound wave strikes an object, it bounces back or echoes. By measuring these echo waves, it is possible to determine how far away the object is as well as its size, shape, and consistency. This includes whether the object is solid or filled with fluid.
Doctors use ultrasound to detect changes in the appearance of organs, tissues, and vessels and to detect abnormal masses, such as tumors.
In an ultrasound exam, a transducer both sends the sound waves and records the echoing (returning) waves. When the transducer is pressed against the skin, it sends small pulses of inaudible, high-frequency sound waves into the body. As the sound waves bounce off internal organs, fluids and tissues, the sensitive receiver in the transducer records tiny changes in the sound's pitch and direction. A computer instantly measures these signature waves and displays them as real-time pictures on a monitor. The technologist typically captures one or more frames of the moving pictures as still images. They may also save short video loops of the images.
The same principles apply to ultrasound procedures such as transrectal ultrasound which require insertion of a special imaging probe or transducer into the body.
How is the procedure performed?
In men, the prostate gland is located directly in front of the rectum, so the ultrasound exam is performed transrectally in order to position the imaging probe as close to the prostate gland as possible.
For a transrectal ultrasound, you will be asked to lie on your side with your knees bent. A disposable protective cover is placed over the transducer, it is lubricated, inserted through the anus and placed into the rectum.
The images are obtained from different angles to get the best view of the prostate gland.
If a suspicious lesion is identified with ultrasound or with a rectal examination, an ultrasound-guided biopsy can be performed. This procedure involves advancing a needle into the prostate gland while the radiologist watches the needle placement with ultrasound. A small amount of tissue is taken for microscopic examination.
A prostate-specific antigen (PSA) test, which measures the amount of PSA in the blood, may be administered to determine if a patient is at high risk for cancer. In this case, a biopsy is performed and an ultrasound probe is used to guide the biopsy to specific regions of the prostate gland.
When the exam is complete, the technologist may ask you to dress and wait while they review the ultrasound images.
This ultrasound examination is usually completed in less than 20 minutes.
What will I experience during and after the procedure?
Ultrasound exams that insert the transducer into a body cavity may produce minimal discomfort.
If no biopsy is necessary, transrectal ultrasound of the prostate is similar to or may have less discomfort than a rectal exam performed by your doctor.
If a biopsy is necessary, additional discomfort (due to the needle insertion) is usually minimal. This is because the rectal wall is relatively insensitive to the pain in the region of the prostate. A biopsy will add time to the procedure.
Rarely, a small amount of blood may be present in the sperm or urine following the procedure.
Who interprets the results and how do I get them?
A radiologist, a doctor trained to supervise and interpret radiology exams, will analyze the images. The radiologist will send a signed report to the doctor who requested the exam. Your doctor will then share the results with you. In some cases, the radiologist may discuss results with you after the exam.
You may need a follow-up exam. If so, your doctor will explain why. Sometimes a follow-up exam further evaluates a potential issue with more views or a special imaging technique. It may also see if there has been any change in an issue over time. Follow-up exams are often the best way to see if treatment is working or if a problem needs attention.
What are the benefits vs. risks?
• Ultrasound imaging uses no ionizing radiation.
• Ultrasound scanning may be able to give a clearer picture of soft tissues that do not show up well on x-ray images.
• Ultrasound provides real-time imaging. This makes it a good tool for guiding minimally invasive procedures such as needle biopsies and fluid aspiration.
What are the limitations of Prostate Ultrasound Imaging?
Men who have had the tail end of their bowel (rectum) removed during prior surgery are not good candidates for ultrasound of the prostate gland because this type of ultrasound typically requires placing a probe into the rectum. However, the radiologist may attempt to examine the prostate gland by placing a regular ultrasound imaging probe on the perineal skin of the patient, between the legs and behind the scrotum of the patient. Sometimes the gland can be examined by ultrasound this way, but the images may not be as detailed as with the transrectal probe. An MRI of the pelvis may be obtained as an alternative imaging test, because it may be obtained with an external (phased array) receiver coil.
Which test, procedure or treatment is best for me?
Additional Information and Resources
RTAnswers.org: Radiation Therapy for Prostate Cancer
This page was reviewed on January, 28, 2020
Radiologist and patient consultation. View full size with caption
Sponsored By
Please note
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.